diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3870.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3870.json index 20ca13510a9..09150495124 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3870.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3870.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3870", "sourceIdentifier": "cve@mitre.org", "published": "2014-05-27T13:55:06.410", - "lastModified": "2014-05-28T14:02:00.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:01.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/126782/wpbib2html-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67589", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3871.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3871.json index 7e86546bceb..25955f0d50d 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3871.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3871.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3871", "sourceIdentifier": "cve@mitre.org", "published": "2014-05-27T13:55:07.037", - "lastModified": "2015-09-29T18:48:10.150", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:01.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,39 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://geodesicsolutions.com/changelog/7.3/changelog.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/106364", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/126329/GeoCore-MAX-DB-7.3.3-Blind-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/58308", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67078", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3872.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3872.json index 6b24b041ed4..77b83e0c9a3 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3872.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3872.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3872", "sourceIdentifier": "cve@mitre.org", "published": "2014-05-27T13:55:07.207", - "lastModified": "2023-04-26T19:27:52.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:02.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -105,6 +104,22 @@ { "url": "http://www.securityfocus.com/bid/67310", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/58254", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67310", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3873.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3873.json index acc6fe73415..1214e221036 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3873.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3873.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3873", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-10T14:55:10.287", - "lastModified": "2014-06-24T14:41:48.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:02.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -106,6 +105,26 @@ { "url": "http://www.securitytracker.com/id/1030325", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/58627", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A12.ktrace.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030325", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3876.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3876.json index ea0ccc1aa63..13d62b3c648 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3876.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3876.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3876", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:12.897", - "lastModified": "2014-06-18T18:24:11.403", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:02.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://fex.rus.uni-stuttgart.de/fex.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.lsexperts.de/advisories/lse-2014-05-22.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3877.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3877.json index 86af11ed2d9..299108272f9 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3877.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3877.json @@ -2,10 +2,8 @@ "id": "CVE-2014-3877", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:12.960", - "lastModified": "2014-06-18T18:27:01.340", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\n\n\"CWE-184: Incomplete Blacklist\"", + "lastModified": "2024-11-21T02:09:02.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +92,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://fex.rus.uni-stuttgart.de/fex.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.lsexperts.de/advisories/lse-2014-05-22.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\n\n\"CWE-184: Incomplete Blacklist\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3878.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3878.json index c0bb3730535..5f10c9578c2 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3878.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3878.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3878", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T17:55:06.807", - "lastModified": "2015-08-31T18:28:54.140", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:02.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,32 @@ { "url": "http://www.securitytracker.com/id/1030335", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/126948/IPSwitch-IMail-12.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/19", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030335", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3880.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3880.json index 88187ecc618..c09acd5cb88 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3880.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3880.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3880", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-10T14:55:10.477", - "lastModified": "2014-06-21T04:41:46.037", + "lastModified": "2024-11-21T02:09:03.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -101,6 +100,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/59034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2952", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freebsd.org/security/advisories/FreeBSD-EN-14%3A06.exec.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3881.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3881.json index f0946e04319..798c1c5fd66 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3881.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3881.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3881", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-06-28T00:55:03.487", - "lastModified": "2014-06-30T14:57:01.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:03.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000064", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN36259412/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN80006084/995199/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000064", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3882.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3882.json index 3146ed173c3..cc1e941e030 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3882.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3882.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3882", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-06-25T11:19:22.230", - "lastModified": "2014-06-25T14:35:14.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:03.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -130,6 +129,29 @@ "tags": [ "Patch" ] + }, + { + "url": "http://12net.jp/news/n20140623_01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN05329568/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/plugins/login-rebuilder/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3883.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3883.json index 1b3048412c1..b609290df7d 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3883.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3883.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3883", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-06-21T15:55:05.103", - "lastModified": "2014-06-23T17:19:51.780", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:03.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -459,6 +458,18 @@ { "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN48805624/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3884.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3884.json index f14f9bde076..86943a7d98c 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3884.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3884.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3884", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-20T11:12:50.433", - "lastModified": "2014-07-22T22:55:14.520", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:03.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -461,6 +460,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN92737498/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3885.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3885.json index d98e665eaeb..8418aa8cad5 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3885.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3885.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3885", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-20T11:12:50.480", - "lastModified": "2014-07-22T22:54:54.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:03.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN49974594/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000059", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3886.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3886.json index 0c70c338465..1d33ce20d28 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3886.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3886.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3886", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-20T11:12:50.527", - "lastModified": "2014-07-22T22:54:18.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:03.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -126,6 +125,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN02213197/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3888.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3888.json index 8bec28e3678..bc242523d91 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3888.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3888.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3888", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-10T11:06:28.880", - "lastModified": "2015-10-08T15:15:10.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:04.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", + "baseScore": 8.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -367,6 +366,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-189-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/108756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127382/Yokogawa-CS3000-BKFSim_vhfd.exe-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0002E.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3889.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3889.json index 023022eb5e7..3ac4262409e 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3889.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3889.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3889", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-02T14:55:06.017", - "lastModified": "2014-07-11T17:58:03.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:04.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -100,6 +99,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN85571806/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3890.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3890.json index 337dbe57205..96d375905f5 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3890.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3890.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3890", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-02T14:55:06.080", - "lastModified": "2014-07-11T17:57:02.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:04.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,20 @@ "tags": [ "Patch" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN35998716/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000066", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3891.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3891.json index 4082624f0ff..0759909b644 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3891.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3891.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3891", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-09T11:07:02.133", - "lastModified": "2014-07-09T18:17:07.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:04.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -882,6 +881,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN35376006/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000071", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.rimarts.co.jp/index-j.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3892.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3892.json index 4b60b109a70..6b13e08af44 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3892.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3892.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3892", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-20T11:12:50.573", - "lastModified": "2015-09-02T16:56:15.973", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:04.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "http://www.securityfocus.com/bid/68724", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN36028879/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000080", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68724", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3894.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3894.json index 0539c237862..3259dc41ed2 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3894.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3894.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3894", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-20T11:12:50.620", - "lastModified": "2014-08-04T16:06:36.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:04.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN41028866/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3895.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3895.json index 88890c11933..487aacaf3f9 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3895.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3895.json @@ -2,10 +2,8 @@ "id": "CVE-2014-3895", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-29T20:55:08.583", - "lastModified": "2014-07-30T18:48:14.953", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://jvn.jp/en/jp/JVN94592501/index.html\n\n\"Products Affected\n\n TS-WLCAM firmware version 1.06 and earlier\n TS-WLCAM/V firmware version 1.06 and earlier\n TS-WPTCAM firmware version 1.08 and earlier\n TS-PTCAM firmware version 1.08 and earlier\n TS-PTCAM/POE firmware version 1.08 and earlier\n TS-WLC2 firmware version 1.02 and earlier\"", + "lastModified": "2024-11-21T02:09:04.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -240,6 +238,22 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN94592501/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000087", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.iodata.jp/support/information/2014/qwatch/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://jvn.jp/en/jp/JVN94592501/index.html\n\n\"Products Affected\n\n TS-WLCAM firmware version 1.06 and earlier\n TS-WLCAM/V firmware version 1.06 and earlier\n TS-WPTCAM firmware version 1.08 and earlier\n TS-PTCAM firmware version 1.08 and earlier\n TS-PTCAM/POE firmware version 1.08 and earlier\n TS-WLC2 firmware version 1.02 and earlier\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3896.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3896.json index 768dd7e03f7..3e493a9aa1b 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3896.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3896.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3896", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-29T20:55:08.647", - "lastModified": "2018-12-18T14:31:14.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:04.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,30 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN42511610/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.acmailer.jp/info/de.cgi?id=52", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3897.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3897.json index 050cd1d830f..93dc32b809f 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3897.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3897.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3897", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-07-29T20:55:08.693", - "lastModified": "2014-07-30T19:03:46.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:04.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN85748534/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000088", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.din.or.jp/~hideyuki/home/cgi/mailer.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3898.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3898.json index 9f2860c577f..4f488de83e1 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3898.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3898.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3898", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-14T05:01:49.803", - "lastModified": "2015-12-04T16:21:57.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:05.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,32 @@ { "url": "http://secunia.com/advisories/59210", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jp.fujitsu.com/platform/server/primequest/products/2000/catalog/manual/support/note_140729_svom.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jp.fujitsu.com/platform/server/primergy/note/page20.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN22534185/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000091", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59210", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-38xx/CVE-2014-3899.json b/CVE-2014/CVE-2014-38xx/CVE-2014-3899.json index 75ee42216a1..ddd9bc59c54 100644 --- a/CVE-2014/CVE-2014-38xx/CVE-2014-3899.json +++ b/CVE-2014/CVE-2014-38xx/CVE-2014-3899.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3899", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-12T05:01:03.917", - "lastModified": "2014-08-12T18:31:52.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:05.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000085", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN32726697/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000085", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3900.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3900.json index d19f4bd182e..9d91993d939 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3900.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3900.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3900", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-17T18:55:01.747", - "lastModified": "2014-09-08T17:54:55.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:05.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,25 @@ { "url": "http://piwigo.org/dev/changeset/28678", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN09717399/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://piwigo.org/bugs/view.php?id=3089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://piwigo.org/dev/changeset/28678", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3901.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3901.json index 41389456937..ddeba84bcc3 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3901.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3901.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3901", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-12T23:55:04.003", - "lastModified": "2023-04-25T15:42:57.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:05.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN07957080/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3902.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3902.json index 246bb740336..7237ed624ce 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3902.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3902.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3902", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-15T11:15:44.153", - "lastModified": "2014-08-15T20:38:32.823", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:05.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN27702217/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000098", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.ameba", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.cyberagent.co.jp/info/detail/id=9185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3903.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3903.json index 1f5a9d02d4b..12171bd9236 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3903.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3903.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3903", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-19T11:16:59.103", - "lastModified": "2017-07-17T13:18:02.360", + "lastModified": "2024-11-21T02:09:05.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -131,6 +130,25 @@ { "url": "https://wpvulndb.com/vulnerabilities/7534", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jayj.dk/security/JVN27531188.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN27531188/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000100", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7534", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3904.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3904.json index 32ae5d9f052..779f383cfe3 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3904.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3904.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3904", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-17T18:55:01.793", - "lastModified": "2014-09-08T17:51:48.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:05.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN48039501/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3905.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3905.json index 1a459930217..829c987efc3 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3905.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3905.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3905", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-17T18:55:01.827", - "lastModified": "2014-09-08T17:51:19.260", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:05.867", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN04455183/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000096", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3906.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3906.json index 4772bf12bfa..a948f26917d 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3906.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3906.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3906", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-19T11:16:59.150", - "lastModified": "2014-08-19T17:13:11.810", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:05.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000099", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN20812625/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000099", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3907.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3907.json index 7fa39868bcc..d181f71f2db 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3907.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3907.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3907", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-26T14:55:05.970", - "lastModified": "2014-08-27T16:27:00.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:06.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -447,6 +446,21 @@ "tags": [ "Patch" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN94409737/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/plugins/wysija-newsletters/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3908.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3908.json index 08d10d0ad71..ca225847b7d 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3908.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3908.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3908", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-08-30T09:55:05.313", - "lastModified": "2014-09-02T18:04:50.450", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:06.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000102", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN17637243/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000102", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3909.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3909.json index 3d7242395d4..a01f0abd4f3 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3909.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3909.json @@ -2,10 +2,8 @@ "id": "CVE-2014-3909", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-05T17:55:06.797", - "lastModified": "2014-09-08T14:45:33.100", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-384: Session Fixation", + "lastModified": "2024-11-21T02:09:06.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -191,6 +189,25 @@ "tags": [ "Patch" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN49672671/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000084", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.falconsc.com/service/product/patch/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } - ] + ], + "evaluatorComment": "CWE-384: Session Fixation" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3910.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3910.json index 1acb669993a..c2f8c1c8cdb 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3910.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3910.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3910", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-05T17:55:06.830", - "lastModified": "2014-11-19T00:56:18.810", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:06.473", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -91,6 +90,21 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000103", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN50367052/995292/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN50367052/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000103", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3911.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3911.json index c87ad8c4b98..c46490b113f 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3911.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3911.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3911", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-11T14:55:09.097", - "lastModified": "2014-06-12T16:24:36.663", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:06.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -103,6 +102,37 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-172/", "source": "cve@mitre.org" + }, + { + "url": "http://update.websamsung.net/Tools/iPOLiS%20Device%20Manager/iPOLiS%20Device%20Manager_v1.8.7_setup_Full.zip", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-167/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-168/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-170/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-171/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-172/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3912.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3912.json index a1ec2223a7f..3316a17ec28 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3912.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3912.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3912", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T17:55:07.090", - "lastModified": "2014-06-06T13:17:47.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:06.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ "tags": [ "Patch" ] + }, + { + "url": "http://www.securityfocus.com/bid/67823", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-169", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3913.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3913.json index 7c185b49dbc..3c362fb5e14 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3913.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3913.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3913", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-04T14:55:05.137", - "lastModified": "2015-08-31T18:29:18.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:06.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-160", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127152/Ericom-AccessNow-Server-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.ericom.com/security-ERM-2014-610.asp", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-160", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3914.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3914.json index 151df821c33..7c9a4605907 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3914.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3914.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3914", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-07T11:13:36.157", - "lastModified": "2014-08-07T17:44:36.603", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:07.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,33 @@ { "url": "http://zerodayinitiative.com/advisories/ZDI-14-166/", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/33807", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-161/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-163/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-165/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-166/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3915.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3915.json index a824feec904..bfa4c062258 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3915.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3915.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3915", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-11T14:55:09.190", - "lastModified": "2014-06-12T16:58:43.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:07.213", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-164/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/67780", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-164/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3916.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3916.json index d41f30a5e5c..bd9a69eb868 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3916.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3916.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3916", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-16T17:59:04.253", - "lastModified": "2019-08-08T14:43:53.293", + "lastModified": "2024-11-21T02:09:07.357", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93505", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/362", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.ruby-lang.org/issues/9709", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93505", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3917.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3917.json index b5dc0e9384e..dca42b9e6c1 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3917.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3917.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3917", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T17:55:07.307", - "lastModified": "2021-07-15T19:16:09.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:07.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -221,6 +220,50 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102571", "source": "cve@mitre.org" + }, + { + "url": "http://article.gmane.org/gmane.linux.kernel/1713179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1143.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1281.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/05/29/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2335-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102571", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3920.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3920.json index bb663c75b66..a1e792e8123 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3920.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3920.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3920", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T14:55:08.097", - "lastModified": "2018-10-09T19:47:32.453", + "lastModified": "2024-11-21T02:09:07.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -117,6 +116,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://kanboard.net/news", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532619/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3921.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3921.json index 1c5d3fb844c..daf2ca1b2c2 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3921.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3921.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3921", "sourceIdentifier": "cve@mitre.org", "published": "2014-05-30T14:55:09.363", - "lastModified": "2014-06-24T17:21:19.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:07.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/126763/WordPress-Simple-Popup-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67562", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3922.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3922.json index 890f3367382..23c657e94ed 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3922.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3922.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3922", "sourceIdentifier": "cve@mitre.org", "published": "2014-05-30T14:55:09.677", - "lastModified": "2016-09-06T13:21:08.203", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:08.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,51 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/126847/InterScan-Messaging-Security-Virtual-Appliance-8.5.1.1516-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/May/164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/58491", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67726", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030318", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://vimeo.com/96757096", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3923.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3923.json index 5da838c05c7..0ab795b5d82 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3923.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3923.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3923", "sourceIdentifier": "cve@mitre.org", "published": "2014-05-30T14:55:09.833", - "lastModified": "2014-06-25T17:59:21.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:08.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/May/157", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://websecurity.com.ua/7183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3924.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3924.json index b17e0476b52..a8c730585af 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3924.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3924.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3924", "sourceIdentifier": "cve@mitre.org", "published": "2014-05-30T14:55:09.910", - "lastModified": "2014-07-17T05:07:14.840", + "lastModified": "2024-11-21T02:09:08.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,44 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/58917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58919", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67649", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030296", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030297", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.webmin.com/changes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.webmin.com/uchanges.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3925.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3925.json index 27599708419..f2b66636291 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3925.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3925.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3925", "sourceIdentifier": "secalert@redhat.com", "published": "2014-06-01T04:29:34.923", - "lastModified": "2016-04-06T12:53:38.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:08.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -128,6 +127,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/05/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/05/30/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2845-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3932.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3932.json index 8acb0cf72cb..31a75669ad8 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3932.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3932.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3932", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-02T14:55:03.327", - "lastModified": "2014-06-03T10:49:20.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:09.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/58878", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140521-CoSoSys_Endpoint_Protector_Multiple_Vulnerabilities_v10_wo_poc.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3933.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3933.json index d10ece8599c..fb7f6ce7b24 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3933.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3933.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3933", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-02T14:55:03.637", - "lastModified": "2015-09-02T16:56:37.223", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:09.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -109,6 +108,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/58399", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67545", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/2267475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://drupal.org/node/2267485", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3934.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3934.json index 74a0e787c89..60164acd098 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3934.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3934.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3934", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-02T14:55:04.043", - "lastModified": "2014-06-03T11:03:58.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:09.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/126803/phpnuke83news-sql.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67656", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3935.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3935.json index 26d2af3f21c..1668c21072b 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3935.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3935.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3935", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-02T14:55:04.107", - "lastModified": "2014-06-03T11:08:59.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:09.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/126701", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67460", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3936.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3936.json index 68cec641295..deeb146fa4e 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3936.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3936.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3936", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-02T14:55:04.263", - "lastModified": "2023-04-26T19:27:52.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:10.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -183,6 +182,49 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127427/D-Link-HNAP-Request-Remote-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/58728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.devttys0.com/2014/05/hacking-the-d-link-dsp-w215-smart-plug", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3937.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3937.json index 1935eff9f23..4323d29c3a1 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3937.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3937.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3937", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-02T15:55:11.763", - "lastModified": "2014-06-03T15:09:04.850", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:10.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -259,6 +258,13 @@ "tags": [ "Patch" ] + }, + { + "url": "http://wordpress.org/plugins/contextual-related-posts/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3938.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3938.json index 892813a06fd..09aafc1a9ec 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3938.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3938.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3938", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-23T14:55:05.977", - "lastModified": "2014-07-23T17:14:20.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:10.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -85,6 +84,14 @@ { "url": "http://secunia.com/secunia_research/2014-6/", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/58000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/secunia_research/2014-6/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3939.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3939.json index 7291316753e..87618978e19 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3939.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3939.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3939", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-23T14:55:06.023", - "lastModified": "2014-07-23T17:19:22.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:10.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -85,6 +84,14 @@ { "url": "http://secunia.com/secunia_research/2014-7/", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/58000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/secunia_research/2014-7/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3940.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3940.json index 0562491cffb..defa60befd4 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3940.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3940.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3940", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T17:55:07.573", - "lastModified": "2021-07-15T19:16:09.750", + "lastModified": "2024-11-21T02:09:10.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 4.0, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -193,6 +192,42 @@ { "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0290.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1272.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/02/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67786", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1104097", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lkml.org/lkml/2014/3/18/784", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3941.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3941.json index fcdc4451a3e..0316fe4dfbf 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3941.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3941.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3941", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-03T14:55:10.910", - "lastModified": "2017-12-29T02:29:22.440", + "lastModified": "2024-11-21T02:09:10.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -543,6 +542,33 @@ { "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3942.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3942.json index 72fa0497cef..e9f5be8ecbe 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3942.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3942.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3942", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-03T14:55:10.990", - "lastModified": "2017-12-29T02:29:22.533", + "lastModified": "2024-11-21T02:09:11.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -495,6 +494,25 @@ { "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3943.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3943.json index d3d73ef6997..ba0b67f4b57 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3943.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3943.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3943", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-03T14:55:11.067", - "lastModified": "2017-12-29T02:29:22.627", + "lastModified": "2024-11-21T02:09:11.200", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -539,6 +538,29 @@ { "url": "http://www.securityfocus.com/bid/67625", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67625", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3944.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3944.json index 220c2d48721..84eb5b454a0 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3944.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3944.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3944", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-03T14:55:11.130", - "lastModified": "2014-06-04T15:15:16.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:11.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,21 @@ { "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3945.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3945.json index 6323caa7527..96865e32dda 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3945.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3945.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3945", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-03T14:55:11.207", - "lastModified": "2014-06-04T15:24:19.577", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:11.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -1012,6 +1011,21 @@ { "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3946.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3946.json index a1535f16454..6a08ac52425 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3946.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3946.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3946", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-03T14:55:11.287", - "lastModified": "2014-06-04T15:26:45.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:11.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -111,6 +110,21 @@ { "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3947.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3947.json index bab248f4504..4042eab86a1 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3947.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3947.json @@ -2,10 +2,8 @@ "id": "CVE-2014-3947", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:08.757", - "lastModified": "2014-10-10T05:22:29.770", + "lastModified": "2024-11-21T02:09:11.840", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Vendor advisory - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-007/", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -136,6 +134,15 @@ { "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-007/", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/extensions/repository/view/powermail", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-007/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Vendor advisory - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-007/" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3948.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3948.json index 4c9d53a7bea..c1e66192c4b 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3948.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3948.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3948", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-04T14:55:05.403", - "lastModified": "2014-06-05T17:33:03.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:11.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -148,6 +147,25 @@ { "url": "http://www.openwall.com/lists/oss-security/2014/06/03/3", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/58909", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/powermail", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/03/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3949.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3949.json index 7b3adbdb725..f13ab83e294 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3949.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3949.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3949", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-04T14:55:05.467", - "lastModified": "2014-06-05T17:32:21.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:12.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -275,6 +274,25 @@ { "url": "http://www.openwall.com/lists/oss-security/2014/06/03/3", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/58592", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/gridelements", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-008", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/03/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3951.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3951.json index f42eed4959a..31f459d3530 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3951.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3951.json @@ -2,10 +2,8 @@ "id": "CVE-2014-3951", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-21T22:55:03.627", - "lastModified": "2014-08-21T23:14:11.237", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", + "lastModified": "2024-11-21T02:09:12.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +90,22 @@ { "url": "http://www.securitytracker.com/id/1030458", "source": "cve@mitre.org" + }, + { + "url": "http://mail-index.netbsd.org/source-changes/2014/06/24/msg055822.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14:15.iconv.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030458", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3952.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3952.json index 6039c56e57e..cf32864a390 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3952.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3952.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3952", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-15T14:55:09.793", - "lastModified": "2017-08-29T01:34:49.500", + "lastModified": "2024-11-21T02:09:12.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94448", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030539", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94448", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3953.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3953.json index 9da9289ad20..2d01b9e2749 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3953.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3953.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3953", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-15T14:55:09.840", - "lastModified": "2014-11-19T03:01:37.533", + "lastModified": "2024-11-21T02:09:12.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -105,6 +104,25 @@ { "url": "http://www.securitytracker.com/id/1030539", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030539", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3954.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3954.json index 55a388c3889..65f927e646a 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3954.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3954.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3954", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-27T15:55:24.157", - "lastModified": "2019-03-18T15:35:23.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:12.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -157,6 +156,17 @@ "tags": [ "Patch" ] + }, + { + "url": "http://www.securitytracker.com/id/1031098", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A20.rtsold.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3955.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3955.json index b2ec10a7277..501b85fb7f8 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3955.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3955.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3955", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-27T15:55:24.500", - "lastModified": "2019-03-18T15:35:23.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:12.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -186,6 +185,21 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/61865", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031099", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:21.routed.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3956.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3956.json index a0001f3c0f9..0ace4b49d0d 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3956.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3956.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3956", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-04T11:19:13.890", - "lastModified": "2017-12-29T02:29:22.723", + "lastModified": "2024-11-21T02:09:13.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -475,6 +474,102 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0270.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/57455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58628", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030331", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3959.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3959.json index aad62acb1cf..fa9da2673e0 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3959.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3959.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3959", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-03T14:55:11.490", - "lastModified": "2016-10-19T16:45:15.223", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:13.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -241,6 +240,41 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/58969", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15296.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67771", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030319", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030320", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3960.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3960.json index 97b09008a1d..2ae8aaa8f69 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3960.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3960.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3960", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-04T14:55:06.560", - "lastModified": "2014-06-05T13:30:39.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:13.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -299,6 +298,18 @@ { "url": "http://www.securityfocus.com/bid/67774", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/58748", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opennms.org/documentation/ReleaseNotesStable.html#opennms-1.12.7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67774", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3961.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3961.json index a6873dfef00..33a7e9ba53c 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3961.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3961.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3961", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-04T14:55:07.047", - "lastModified": "2024-02-14T01:17:43.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:13.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -156,6 +155,50 @@ "Exploit", "URL Repurposed" ] + }, + { + "url": "http://osvdb.org/show/osvdb/107626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/126878/WordPress-Participants-Database-1.5.4.8-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33613", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67769", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/participants-database/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.yarubo.com/advisories/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3962.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3962.json index 9449faa64e6..32cb1d34ca1 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3962.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3962.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3962", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-04T14:55:07.107", - "lastModified": "2014-06-18T04:33:07.340", + "lastModified": "2024-11-21T02:09:13.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "http://www.securityfocus.com/bid/67766", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/126866/Videos-Tube-1.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58844", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33514", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67766", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3963.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3963.json index f3c2cc2bf58..eb38a87f87d 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3963.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3963.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3963", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-04T14:55:07.187", - "lastModified": "2014-06-05T17:35:43.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:13.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -80,6 +79,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://owncloud.org/about/security/advisories/oC-SA-2014-009/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3966.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3966.json index f42f1b8aa4d..8d464b13a39 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3966.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3966.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3966", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-06T14:55:05.227", - "lastModified": "2017-12-29T02:29:22.800", + "lastModified": "2024-11-21T02:09:13.997", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -288,6 +287,42 @@ { "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65501", "source": "cve@mitre.org" + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-May/000151.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/58834", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/04/15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030364", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65501", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3967.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3967.json index 4a381a32ff8..fcadade2d49 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3967.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3967.json @@ -2,10 +2,8 @@ "id": "CVE-2014-3967", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T20:55:06.517", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-11-21T02:09:14.167", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\n\n\"CWE-476: NULL Pointer Dereference\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 5.5, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.1, @@ -187,6 +185,47 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134739.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/04/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030322", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-96.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\n\n\"CWE-476: NULL Pointer Dereference\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3968.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3968.json index a3f8e3f9635..7483db7bf6c 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3968.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3968.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3968", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T20:55:06.580", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-11-21T02:09:14.330", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 5.5, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.1, @@ -190,6 +189,50 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134739.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/04/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030322", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-96.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3969.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3969.json index 9b5727eeef6..59f26c85811 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3969.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3969.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3969", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T20:55:06.657", - "lastModified": "2018-10-30T16:26:53.700", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:14.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 7.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.4, @@ -115,6 +114,45 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/58975", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/04/14", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67819", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030333", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-98.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3970.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3970.json index 5cb1c207d68..4e0eaf4a20f 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3970.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3970.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3970", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-11T14:55:09.423", - "lastModified": "2017-01-07T03:00:07.333", + "lastModified": "2024-11-21T02:09:14.637", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -142,6 +141,37 @@ { "url": "http://www.securityfocus.com/bid/67814", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0440.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.freedesktop.org/archives/pulseaudio-discuss/2014-May/020740.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/429", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67814", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3971.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3971.json index 85bb4ea5cab..a47e59a5d57 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3971.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3971.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3971", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-25T11:59:00.037", - "lastModified": "2014-12-29T16:47:41.450", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:14.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://github.com/mongodb/mongo/commit/c151e0660b9736fe66b224f1129a16871165251b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://jira.mongodb.org/browse/SERVER-13753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3973.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3973.json index 66fad1d57cd..fda7b1c56d8 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3973.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3973.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3973", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T17:55:07.823", - "lastModified": "2014-06-06T13:55:42.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:15.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -217,6 +216,26 @@ "Exploit", "Patch" ] + }, + { + "url": "http://frontaccounting.com/wb3/pages/posts/release-2.3.21201.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/58848", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/p/frontaccounting/mercurial/ci/7ab9e443a8eb9d1b03cbed33006b7665bda9383e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3974.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3974.json index 8b8bbce218e..cdf37d49f15 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3974.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3974.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3974", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T17:55:08.340", - "lastModified": "2014-06-06T14:54:15.303", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:15.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://bot24.blogspot.com/2014/05/auracms-30-cross-site-scripting-local.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/107554", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/126843/AuraCMS-3.0-Cross-Site-Scripting-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/58850", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3975.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3975.json index aa9e3471626..f3a7ba3c218 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3975.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3975.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3975", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T17:55:08.417", - "lastModified": "2014-06-06T14:56:30.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:15.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://bot24.blogspot.com/2014/05/auracms-30-cross-site-scripting-local.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/107555", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/126843/AuraCMS-3.0-Cross-Site-Scripting-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3976.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3976.json index 2661b8a1ebb..835c37362f4 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3976.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3976.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3976", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-05T17:55:08.870", - "lastModified": "2015-09-02T17:01:14.123", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:15.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -116,6 +115,46 @@ { "url": "http://www.securityfocus.com/bid/66588", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/105354", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Apr/16", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/57640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/32702", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/66588", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3977.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3977.json index 2db2649519b..99757d45cb5 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3977.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3977.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3977", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-08T23:55:04.103", - "lastModified": "2021-08-31T15:44:01.470", + "lastModified": "2024-11-21T02:09:15.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -209,6 +208,54 @@ { "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3977/", "source": "cve@mitre.org" + }, + { + "url": "http://aix.software.ibm.com/aix/efixes/security/libodm_advisory.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127067/IBM-AIX-6.1.8-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60299", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60303", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV60314", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030401", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3977/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3978.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3978.json index 59dff50a304..34457a745c7 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3978.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3978.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3978", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T16:55:07.697", - "lastModified": "2014-10-24T12:53:33.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:15.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "https://breaking.technology/advisories/CVE-2014-3978.txt", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127785/TomatoCart-1.x-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://breaking.technology/advisories/CVE-2014-3978.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3980.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3980.json index 152f6f51da8..4423c95cc0f 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3980.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3980.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3980", "sourceIdentifier": "secalert@redhat.com", "published": "2014-06-11T14:55:09.517", - "lastModified": "2014-06-12T17:37:22.710", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:16.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -107,6 +106,22 @@ { "url": "https://github.com/ueno/libfep/commit/293d9d3f", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/05/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/06/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67903", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ueno/libfep/commit/293d9d3f", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3981.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3981.json index 09183b10b63..a7d52c60834 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3981.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3981.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3981", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-08T18:55:06.030", - "lastModified": "2023-11-07T02:20:21.543", + "lastModified": "2024-11-21T02:09:16.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -106,6 +105,14 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=141390017113542&w=2", "source": "cve@mitre.org", @@ -173,6 +180,101 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=91bcadd85e20e50d3f8c2e9721327681640e6f16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141390017113542&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/06/12", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=67390", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1104978", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3982.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3982.json index 0fd0a89576e..fdf56d2864b 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3982.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3982.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3982", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-08T18:55:06.593", - "lastModified": "2014-06-09T17:14:32.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:16.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -111,6 +110,25 @@ { "url": "http://openwall.com/lists/oss-security/2014/06/07/3", "source": "cve@mitre.org" + }, + { + "url": "http://cisofy.com/files/lynis-1.5.5.tar.gz", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/05/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/06/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3984.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3984.json index 3abaa6a0ec7..a06a53f51c4 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3984.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3984.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3984", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-06T14:55:05.790", - "lastModified": "2023-11-07T02:20:21.613", + "lastModified": "2024-11-21T02:09:16.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -159,6 +158,33 @@ { "url": "http://www.ubuntu.com/usn/USN-2244-1", "source": "cve@mitre.org" + }, + { + "url": "http://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v0.8.12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/news.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2244-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3985.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3985.json index 3d26b8c31aa..91a6910c363 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3985.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3985.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3985", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T18:55:06.213", - "lastModified": "2020-09-28T14:57:26.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:16.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -149,6 +148,64 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00039.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/496", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67152", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1085618", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/miniupnp/miniupnp/commit/3a87aa2f10bd7f1408e1849bdb59c41dd63a9fe9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201701-41", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3986.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3986.json index 5b75a6c60bd..220f0d8c45f 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3986.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3986.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3986", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-08T18:55:06.673", - "lastModified": "2014-06-09T17:23:07.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:16.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -112,6 +111,26 @@ { "url": "http://seclists.org/fulldisclosure/2014/Jun/21", "source": "cve@mitre.org" + }, + { + "url": "http://cisofy.com/files/lynis-1.5.5.tar.gz", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/05/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/06/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/21", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3988.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3988.json index e2724b65158..9bfc97f578e 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3988.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3988.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3988", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T01:59:00.080", - "lastModified": "2014-12-03T18:37:37.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:17.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://github.com/sunhater/kcfinder/issues/40", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3991.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3991.json index e9c5db03827..0edc0a68087 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3991.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3991.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3991", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T14:55:04.307", - "lastModified": "2022-11-17T17:21:59.260", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:17.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127389/Dolibarr-CMS-3.5.3-SQL-Injection-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3992.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3992.json index 8231101c8f7..129e85dfa82 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3992.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3992.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3992", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T14:55:04.337", - "lastModified": "2022-11-17T17:21:59.260", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:17.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127389/Dolibarr-CMS-3.5.3-SQL-Injection-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3994.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3994.json index 31e3d1128db..c398ecef6e8 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3994.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3994.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3994", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-16T18:55:09.433", - "lastModified": "2016-08-23T14:49:05.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:17.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -141,8 +140,8 @@ "url": "https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -150,16 +149,80 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { "url": "https://github.com/djblets/djblets/commit/e2c79117efd925636acd871a5f473512602243cf", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/494", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/498", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/58691", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67932", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://code.google.com/p/reviewboard/issues/detail?id=3406", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://github.com/djblets/djblets/commit/77a68c03cd619a0996f3f37337b8c39ca6643d6e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://github.com/djblets/djblets/commit/e2c79117efd925636acd871a5f473512602243cf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" ] } ] diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3995.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3995.json index 6edbe8b7b79..0d5fb6535b6 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3995.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3995.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3995", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-16T18:55:09.497", - "lastModified": "2014-06-17T14:22:48.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:17.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,40 @@ "tags": [ "Patch" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/498", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58691", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/djblets/djblets/commit/50000d0bbb983fa8c097b588d06b64df8df483bd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/djblets/djblets/commit/77ac64642ad530bf69e390c51fc6fdcb8914c8e7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/djblets/djblets/commit/e2c79117efd925636acd871a5f473512602243cf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3996.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3996.json index 66193504eb5..332cc17ba7e 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3996.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3996.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3996", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T15:59:00.073", - "lastModified": "2015-08-28T15:48:41.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:17.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -161,6 +160,45 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127973/ManageEngine-Password-Manager-MetadataServlet.dat-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/55", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/85", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3997.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3997.json index 3c64704b172..e829ed20db6 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3997.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3997.json @@ -2,9 +2,8 @@ "id": "CVE-2014-3997", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T15:59:01.353", - "lastModified": "2019-07-16T12:23:04.847", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:18.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -515,6 +514,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/55", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/85", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc_pmp_it360_sqli.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/msf_modules/manageengine_dc_pmp_sqli.rb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4002.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4002.json index 203f0bbb564..238c69df7fc 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4002.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4002.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4002", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T14:55:08.473", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:09:18.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -129,6 +128,44 @@ { "url": "https://security.gentoo.org/glsa/201509-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00034.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59203", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://svn.cacti.net/viewvc?view=rev&revision=7451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://svn.cacti.net/viewvc?view=rev&revision=7452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2970", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201509-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4003.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4003.json index cc58ecec712..9f71186b540 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4003.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4003.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4003", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-09T20:55:08.497", - "lastModified": "2018-10-09T19:47:33.220", + "lastModified": "2024-11-21T02:09:18.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,34 @@ { "url": "https://service.sap.com/sap/support/notes/1939334", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/126986/SAP-SLD-Information-Tampering.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/37", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532331/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67923", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1939334", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4004.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4004.json index e2ce4d5a34a..2627473f56d 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4004.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4004.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4004", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-09T20:55:08.980", - "lastModified": "2014-06-18T04:33:12.013", + "lastModified": "2024-11-21T02:09:18.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://service.sap.com/sap/support/notes/1791081", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.layersevensecurity.com/docs/Layer%20Seven%20Security_Advisory_February%202014.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1791081", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4005.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4005.json index fa97d40ac81..5b0337f8a85 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4005.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4005.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4005", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-09T20:55:09.043", - "lastModified": "2014-06-18T04:33:12.153", + "lastModified": "2024-11-21T02:09:19.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://service.sap.com/sap/support/notes/1768049", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.layersevensecurity.com/docs/Layer%20Seven%20Security_Advisory_February%202014.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1768049", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4006.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4006.json index ce8fbe7eca1..0829383c897 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4006.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4006.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4006", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-09T20:55:09.107", - "lastModified": "2014-06-18T04:33:12.370", + "lastModified": "2024-11-21T02:09:19.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://service.sap.com/sap/support/notes/1920323", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.layersevensecurity.com/docs/Layer%20Seven%20Security_Advisory_February%202014.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1920323", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4007.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4007.json index 1e6cab48bef..b3e67bd48f8 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4007.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4007.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4007", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-09T20:55:09.183", - "lastModified": "2014-06-18T04:33:12.527", + "lastModified": "2024-11-21T02:09:19.377", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://service.sap.com/sap/support/notes/1915873", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1915873", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4008.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4008.json index 0960515ea41..b86f4ac2cce 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4008.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4008.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4008", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-09T20:55:09.247", - "lastModified": "2014-06-18T04:33:12.700", + "lastModified": "2024-11-21T02:09:19.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://service.sap.com/sap/support/notes/1914777", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1914777", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4009.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4009.json index 3166b0928c3..f03ebb127ea 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4009.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4009.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4009", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-09T20:55:09.307", - "lastModified": "2014-06-18T04:33:12.857", + "lastModified": "2024-11-21T02:09:19.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://service.sap.com/sap/support/notes/1911174", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1911174", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4010.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4010.json index b588e1a7f95..78875b50778 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4010.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4010.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4010", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-09T20:55:09.387", - "lastModified": "2014-06-18T04:33:13.027", + "lastModified": "2024-11-21T02:09:19.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://service.sap.com/sap/support/notes/1795463", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1795463", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4011.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4011.json index e7bda36fbda..177955d9f0a 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4011.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4011.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4011", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-09T20:55:09.447", - "lastModified": "2014-06-18T04:33:13.200", + "lastModified": "2024-11-21T02:09:19.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://service.sap.com/sap/support/notes/1789569", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1789569", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4012.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4012.json index a03b4d99102..548441ccb33 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4012.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4012.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4012", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-09T20:55:09.510", - "lastModified": "2014-06-18T04:33:13.370", + "lastModified": "2024-11-21T02:09:20.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://service.sap.com/sap/support/notes/1738965", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1738965", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4013.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4013.json index 6d30dfff0df..51b6a31b0d7 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4013.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4013.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4013", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-14T14:55:06.983", - "lastModified": "2014-07-14T18:08:52.620", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:20.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 4.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.4, @@ -127,6 +126,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/58936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-07032014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4014.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4014.json index ef02b7b59b5..a7861d62eb3 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4014.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4014.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4014", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-23T11:21:17.793", - "lastModified": "2023-11-07T02:20:21.913", + "lastModified": "2024-11-21T02:09:20.410", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 6.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -144,6 +143,78 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=23adbe12ef7d3d4195e80800ab36b37bee28cd03", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59220", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33824", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/10/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67988", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030394", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107966", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/23adbe12ef7d3d4195e80800ab36b37bee28cd03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://source.android.com/security/bulletin/2016-12-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4017.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4017.json index b20202bece6..890f978d897 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4017.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4017.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4017", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-10T14:55:10.537", - "lastModified": "2014-07-22T19:05:29.620", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:20.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/126781/WordPress-Conversion-Ninja-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4018.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4018.json index 69247d1fc41..42d0f56e746 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4018.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4018.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4018", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-16T14:19:03.823", - "lastModified": "2014-07-16T17:44:57.847", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:20.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33803", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4020.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4020.json index 53a35ce09f2..9a38be3f819 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4020.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4020.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4020", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T16:55:08.233", - "lastModified": "2023-11-07T02:20:22.003", + "lastModified": "2024-11-21T02:09:21.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -135,6 +134,35 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beb119f911a698d44f4baa06d888bb1e775983bc", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00049.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10030", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9999", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beb119f911a698d44f4baa06d888bb1e775983bc", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4021.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4021.json index 2a4119c0fd4..d5b1b682e17 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4021.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4021.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4021", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T19:55:04.920", - "lastModified": "2018-10-30T16:26:53.700", + "lastModified": "2024-11-21T02:09:21.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 2.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.7 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.1, @@ -254,6 +253,74 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-0926-1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-0926.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60130", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX140984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-100.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4022.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4022.json index f3900871aeb..6ecc23350e8 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4022.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4022.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4022", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-09T14:55:03.607", - "lastModified": "2018-10-30T16:26:53.700", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:21.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 2.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.7 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.1, @@ -95,6 +94,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/59523", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68184", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4023.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4023.json index 1e85d427ed0..b992d5d5ac6 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4023.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4023.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4023", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-28T14:55:05.987", - "lastModified": "2015-08-28T15:49:41.780", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:21.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -964,6 +963,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securitytracker.com/id/1030776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/500/sol15532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140828-F5_BIG-IP_Reflected_XSS_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4027.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4027.json index e21367e92b4..be8fa5e3a62 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4027.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4027.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4027", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-23T11:21:18.700", - "lastModified": "2023-11-07T02:20:22.100", + "lastModified": "2024-11-21T02:09:21.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 2.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.4, @@ -418,6 +417,108 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/59134", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/59777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61310", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2335-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108744", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4030.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4030.json index 7950a1ab6ab..2079cf2be94 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4030.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4030.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4030", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-25T20:55:07.067", - "lastModified": "2014-06-26T14:25:38.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:22.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -142,6 +141,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/64", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/59173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/plugins/jw-player-plugin-for-wordpress/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://security.dxw.com/advisories/jw-player-for-flash-html5-video/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4031.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4031.json index fccda371b30..eb7b60fc694 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4031.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4031.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4031", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-15T14:55:10.670", - "lastModified": "2014-07-15T19:17:18.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:22.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -127,6 +126,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/58936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-07032014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4032.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4032.json index 735878220ed..5df884a8d6a 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4032.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4032.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4032", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-11T14:55:09.580", - "lastModified": "2014-06-18T04:33:13.653", + "lastModified": "2024-11-21T02:09:22.427", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "http://www.securityfocus.com/bid/67729", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/126856/Fiyo-CMS-1.5.7-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/58833", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67729", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4033.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4033.json index 90b6a52cacc..36b99a4afed 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4033.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4033.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4033", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-11T14:55:09.643", - "lastModified": "2014-06-12T17:46:47.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:22.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://github.com/epignosis/efront_open_source/issues/5", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127006/eFront-3.6.14.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33697", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67946", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/epignosis/efront_open_source/issues/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4034.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4034.json index 06c710302c1..fca0ddf3e8b 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4034.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4034.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4034", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-11T14:55:09.987", - "lastModified": "2017-08-29T01:34:49.623", + "lastModified": "2024-11-21T02:09:22.733", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -167,6 +166,102 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100588", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127005/ZeroCMS-1.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130192/ZeroCMS-1.3.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/379", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/380", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59182", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/02/addition-for-advisory-sroeadv-2015-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33702", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "VDB Entry" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5186.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100588", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4035.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4035.json index 4889dede7b6..514194e27f6 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4035.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4035.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4035", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-11T14:55:10.067", - "lastModified": "2019-08-12T21:15:12.827", + "lastModified": "2024-11-21T02:09:22.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "http://www.securityfocus.com/bid/67914", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/126949/BSI-Advance-Hotel-Booking-System-2.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/154024/BSI-Advance-Hotel-Booking-System-2.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67914", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4036.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4036.json index 6cb3a7cd1cd..045cb88011d 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4036.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4036.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4036", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-11T14:55:10.127", - "lastModified": "2014-06-12T18:19:05.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:23.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/126909/ImpressCMS-1.3.6.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4037.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4037.json index eb2431c6519..5e08c26163b 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4037.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4037.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4037", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-11T14:55:10.893", - "lastModified": "2015-08-28T15:51:09.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:23.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ { "url": "http://www.securitytracker.com/id/1030413", "source": "cve@mitre.org" + }, + { + "url": "http://ckeditor.com/blog/FCKeditor-2.6.11-Released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/126902/FCKeditor-2.6.10-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030413", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4038.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4038.json index 4c8843f7da3..a1aa30be375 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4038.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4038.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4038", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T15:55:06.177", - "lastModified": "2017-01-07T03:00:07.897", + "lastModified": "2024-11-21T02:09:23.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -157,6 +156,57 @@ "tags": [ "Issue Tracking" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0383.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1320.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=882667", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109371", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4039.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4039.json index 2f69e9eb670..6f53d8504c9 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4039.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4039.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4039", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T15:55:06.237", - "lastModified": "2017-01-07T03:00:07.957", + "lastModified": "2024-11-21T02:09:23.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -150,6 +149,50 @@ "tags": [ "Issue Tracking" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0383.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1320.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109371", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4040.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4040.json index 6654f8b4dba..1619d9d79d9 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4040.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4040.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4040", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T15:55:06.317", - "lastModified": "2015-03-12T01:59:41.690", + "lastModified": "2024-11-21T02:09:23.660", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "http://rhn.redhat.com/errata/RHSA-2015-0384.html", "source": "cve@mitre.org" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0384.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4043.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4043.json index d7a2df35cce..4d4a9251e01 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4043.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4043.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4043", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-06T23:55:08.530", - "lastModified": "2023-11-07T02:20:22.317", + "lastModified": "2024-11-21T02:09:23.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -154,6 +153,73 @@ { "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Jun/18", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Sep/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:152", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109263", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93784", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/bugtraq/2019/Jun/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/bugtraq/2019/Sep/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4044.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4044.json index 8512c29cd37..5cef950311b 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4044.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4044.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4044", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T14:55:07.500", - "lastModified": "2023-11-07T02:20:22.460", + "lastModified": "2024-11-21T02:09:23.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "http://www.securityfocus.com/bid/68003", "source": "cve@mitre.org" + }, + { + "url": "http://gerrit.openafs.org/#change%2C11283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/12/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68003", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4045.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4045.json index c5fdf1978d3..431f0730a0e 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4045.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4045.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4045", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T14:55:07.830", - "lastModified": "2018-10-09T19:47:33.767", + "lastModified": "2024-11-21T02:09:24.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -147,6 +146,22 @@ { "url": "http://www.securityfocus.com/archive/1/532414/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127087/Asterisk-Project-Security-Advisory-AST-2014-005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532414/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4046.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4046.json index e9760ed2886..2384b2642ea 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4046.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4046.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4046", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T14:55:07.893", - "lastModified": "2018-10-09T19:47:34.047", + "lastModified": "2024-11-21T02:09:24.273", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html\n\n\"CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -373,6 +371,23 @@ { "url": "http://www.securityfocus.com/archive/1/532419/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127088/Asterisk-Project-Security-Advisory-AST-2014-006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532419/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html\n\n\"CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4047.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4047.json index 0fc9ce09d65..366bcdf1ce2 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4047.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4047.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4047", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T14:55:07.953", - "lastModified": "2018-10-09T19:47:34.407", + "lastModified": "2024-11-21T02:09:24.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1207,6 +1206,22 @@ { "url": "http://www.securityfocus.com/archive/1/532415/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127089/Asterisk-Project-Security-Advisory-AST-2014-007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532415/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4048.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4048.json index 5eb93d3852e..cead6c39cc9 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4048.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4048.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4048", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T14:55:08.017", - "lastModified": "2018-10-09T19:47:34.937", + "lastModified": "2024-11-21T02:09:24.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -148,6 +147,22 @@ { "url": "http://www.securityfocus.com/archive/1/532416/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127090/Asterisk-Project-Security-Advisory-AST-2014-008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532416/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4049.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4049.json index 4b12306201b..d0b73052105 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4049.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4049.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4049", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T19:55:05.683", - "lastModified": "2022-08-29T20:05:23.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:24.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -211,6 +210,14 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html", "source": "cve@mitre.org", @@ -347,6 +354,199 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00051.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59270", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59418", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59496", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59652", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60998", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/13/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108447", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/php/php-src/commit/b34d7849ed90ced9345f8ea1c59bc8d101c18468", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4050.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4050.json index 64f74bb71dd..6cdfd5704ae 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4050.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4050.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4050", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.520", - "lastModified": "2018-10-12T22:06:49.970", + "lastModified": "2024-11-21T02:09:24.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94984", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94984", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4051.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4051.json index 526e92d3421..c4a756874d9 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4051.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4051.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4051", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.553", - "lastModified": "2018-10-12T22:06:50.453", + "lastModified": "2024-11-21T02:09:25.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -106,6 +105,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94985", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94985", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4052.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4052.json index f024ec00c2b..c314a7467c0 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4052.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4052.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4052", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.600", - "lastModified": "2018-10-12T22:06:51.033", + "lastModified": "2024-11-21T02:09:25.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94986", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94986", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4055.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4055.json index 25ccd32b7d8..cbfcd3c3afa 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4055.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4055.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4055", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.647", - "lastModified": "2018-10-12T22:06:51.610", + "lastModified": "2024-11-21T02:09:25.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94987", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94987", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4056.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4056.json index 8ae0d64f8de..ead805f56ed 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4056.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4056.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4056", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.693", - "lastModified": "2018-10-12T22:06:52.267", + "lastModified": "2024-11-21T02:09:25.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -111,6 +110,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94988", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94988", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4057.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4057.json index bd56c21ae2d..1ba3255219d 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4057.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4057.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4057", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.740", - "lastModified": "2018-10-12T22:06:52.830", + "lastModified": "2024-11-21T02:09:25.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94989", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69130", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94989", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4058.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4058.json index c80d1e41309..8d04022fbb8 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4058.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4058.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4058", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.787", - "lastModified": "2018-10-12T22:06:53.407", + "lastModified": "2024-11-21T02:09:25.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4059.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4059.json index bd92ea79e00..cf63b38b543 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4059.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4059.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4059", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:09.293", - "lastModified": "2018-10-12T22:06:53.893", + "lastModified": "2024-11-21T02:09:25.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95507", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95507", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4060.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4060.json index 5df5340047a..1d40329d5b0 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4060.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4060.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4060", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.833", - "lastModified": "2019-05-14T17:03:54.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:25.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -198,6 +197,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/60671", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69093", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-043", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4061.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4061.json index 3eb9eba4bdd..f6e1d700513 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4061.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4061.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4061", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.880", - "lastModified": "2018-10-12T22:06:54.720", + "lastModified": "2024-11-21T02:09:26.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -125,6 +124,25 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-044", "source": "secure@microsoft.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/08/12/assessing-risk-for-the-august-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030716", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-044", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4062.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4062.json index 89ea97b85a8..6333168f5dc 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4062.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4062.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4062", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.927", - "lastModified": "2018-10-12T22:06:55.063", + "lastModified": "2024-11-21T02:09:26.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-046", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-046", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4063.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4063.json index dfe81a4fb8b..a87deecd558 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4063.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4063.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4063", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:07.973", - "lastModified": "2018-10-12T22:06:55.393", + "lastModified": "2024-11-21T02:09:26.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69132", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4064.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4064.json index 9e4f0641755..051d5efb6d0 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4064.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4064.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4064", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:08.020", - "lastModified": "2019-05-13T19:09:02.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:26.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -149,6 +148,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/60673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69144", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4065.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4065.json index ee1e87a7dfb..e18dec491ad 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4065.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4065.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4065", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:09.357", - "lastModified": "2018-10-12T22:06:56.237", + "lastModified": "2024-11-21T02:09:26.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4067.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4067.json index 95b934c8138..559371d0b73 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4067.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4067.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4067", "sourceIdentifier": "secure@microsoft.com", "published": "2014-08-12T21:55:08.067", - "lastModified": "2018-10-12T22:06:56.627", + "lastModified": "2024-11-21T02:09:26.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4068.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4068.json index 882990f5776..fe6c195a8ca 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4068.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4068.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4068", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:09.513", - "lastModified": "2018-10-12T22:06:57.017", + "lastModified": "2024-11-21T02:09:26.847", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95544", "source": "secure@microsoft.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/09/09/assessing-risk-for-the-september-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69586", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030821", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95544", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4070.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4070.json index f277ce3effc..daf5797f0d2 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4070.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4070.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4070", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:09.607", - "lastModified": "2018-10-12T22:06:57.550", + "lastModified": "2024-11-21T02:09:26.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95546", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030821", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95546", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4071.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4071.json index 56904cc049e..104091d1b1f 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4071.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4071.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4071", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:09.637", - "lastModified": "2018-10-12T22:06:58.033", + "lastModified": "2024-11-21T02:09:27.093", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +90,27 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95547", "source": "secure@microsoft.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/09/09/assessing-risk-for-the-september-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69592", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030821", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95547", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4072.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4072.json index 61c68aa5b82..bbb019f3f3a 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4072.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4072.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4072", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:09.717", - "lastModified": "2018-10-12T22:06:58.643", + "lastModified": "2024-11-21T02:09:27.207", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -127,6 +126,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-053", "source": "secure@microsoft.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/09/09/assessing-risk-for-the-september-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030819", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-053", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4073.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4073.json index 56e7a4b397e..05da9932f7c 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4073.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4073.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4073", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:07.380", - "lastModified": "2018-10-12T22:06:59.097", + "lastModified": "2024-11-21T02:09:27.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -124,6 +123,29 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-057", "source": "secure@microsoft.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/10/14/more-details-about-cve-2014-4073-elevation-of-privilege-vulnerability.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60969", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031021", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-057", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4074.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4074.json index ba2bd9d7ade..d61a7d26802 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4074.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4074.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4074", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:09.763", - "lastModified": "2019-05-13T19:02:38.460", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:27.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -128,6 +127,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/69593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030820", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-054", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95542", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4075.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4075.json index 383b1945607..87725394cfa 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4075.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4075.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4075", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:07.427", - "lastModified": "2018-10-12T22:07:00.050", + "lastModified": "2024-11-21T02:09:27.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -114,6 +113,29 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-059", "source": "secure@microsoft.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60971", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70352", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031023", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-059", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4076.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4076.json index a2552f23a72..4be0b3d84a5 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4076.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4076.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4076", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:04.530", - "lastModified": "2018-10-12T22:07:00.533", + "lastModified": "2024-11-21T02:09:27.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -104,6 +103,29 @@ { "url": "https://www.exploit-db.com/exploits/37755/", "source": "secure@microsoft.com" + }, + { + "url": "http://www.exploit-db.com/exploits/35936", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/114532", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70976", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37755/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4077.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4077.json index 9b73faedc57..6e3b2206be6 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4077.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4077.json @@ -2,13 +2,8 @@ "id": "CVE-2014-4077", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:04.637", - "lastModified": "2024-06-28T17:28:11.117", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-05-25", - "cisaActionDue": "2022-06-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft IME Japanese Privilege Escalation Vulnerability", + "lastModified": "2024-11-21T02:09:27.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-05-25", + "cisaActionDue": "2022-06-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft IME Japanese Privilege Escalation Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -161,6 +160,40 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-november-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031196", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031197", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-078", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4078.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4078.json index 012a8297aeb..c9062b1bb99 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4078.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4078.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4078", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:04.670", - "lastModified": "2018-10-12T22:07:01.317", + "lastModified": "2024-11-21T02:09:27.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-076", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-076", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4079.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4079.json index 603a80d136c..4c75d76cd7f 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4079.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4079.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4079", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:09.840", - "lastModified": "2018-10-12T22:07:01.613", + "lastModified": "2024-11-21T02:09:28.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95509", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95509", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4080.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4080.json index d90bae0018f..6606f9b0438 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4080.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4080.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4080", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:10.433", - "lastModified": "2018-10-12T22:07:01.970", + "lastModified": "2024-11-21T02:09:28.133", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95510", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95510", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4081.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4081.json index dcefc07755c..8334718827e 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4081.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4081.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4081", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:10.480", - "lastModified": "2018-10-12T22:07:02.363", + "lastModified": "2024-11-21T02:09:28.243", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95511", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69584", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95511", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4082.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4082.json index 1a0300f9121..cdc7bf20e47 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4082.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4082.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4082", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:10.560", - "lastModified": "2018-10-12T22:07:02.863", + "lastModified": "2024-11-21T02:09:28.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -107,6 +106,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95512", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69585", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95512", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4083.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4083.json index 4dcd2f082ca..96df110aac7 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4083.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4083.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4083", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:10.620", - "lastModified": "2018-10-12T22:07:03.300", + "lastModified": "2024-11-21T02:09:28.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95513", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69587", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95513", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4084.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4084.json index ea56890b375..bcb8de00055 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4084.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4084.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4084", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:10.667", - "lastModified": "2018-10-12T22:07:03.783", + "lastModified": "2024-11-21T02:09:28.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95514", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95514", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4085.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4085.json index 3a2bdc4eedc..b2577b1e935 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4085.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4085.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4085", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:10.747", - "lastModified": "2018-10-12T22:07:04.253", + "lastModified": "2024-11-21T02:09:28.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95515", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69589", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95515", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4086.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4086.json index 7215a21a8be..a7651cc95b7 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4086.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4086.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4086", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:10.810", - "lastModified": "2018-10-12T22:07:04.753", + "lastModified": "2024-11-21T02:09:28.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95516", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95516", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4087.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4087.json index 132413bc12d..dfa6efd7cac 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4087.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4087.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4087", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:22.823", - "lastModified": "2018-10-12T22:07:05.160", + "lastModified": "2024-11-21T02:09:28.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95517", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69591", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95517", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4088.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4088.json index 9995e3a2a6c..c02c1ba0bc4 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4088.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4088.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4088", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:22.903", - "lastModified": "2018-10-12T22:07:05.533", + "lastModified": "2024-11-21T02:09:29.023", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95518", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95518", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4089.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4089.json index 5ffb8f9a7b5..8ff43cdeb3e 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4089.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4089.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4089", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:22.967", - "lastModified": "2018-10-12T22:07:06.003", + "lastModified": "2024-11-21T02:09:29.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95519", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69596", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95519", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4090.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4090.json index 631fde69821..01339523fe9 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4090.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4090.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4090", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:23.043", - "lastModified": "2018-10-12T22:07:06.517", + "lastModified": "2024-11-21T02:09:29.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95520", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69597", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95520", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4091.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4091.json index 03f34d8b483..6a660def28a 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4091.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4091.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4091", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:23.137", - "lastModified": "2018-10-12T22:07:07.017", + "lastModified": "2024-11-21T02:09:29.357", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95521", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69598", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95521", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4092.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4092.json index 0be281643b6..adbe779d513 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4092.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4092.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4092", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:23.200", - "lastModified": "2018-10-12T22:07:07.487", + "lastModified": "2024-11-21T02:09:29.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -102,6 +101,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95522", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69599", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95522", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4093.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4093.json index 8d7bfd3af16..6b57cccfe7f 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4093.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4093.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4093", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:23.277", - "lastModified": "2018-10-12T22:07:08.017", + "lastModified": "2024-11-21T02:09:29.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95523", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69600", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95523", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4094.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4094.json index f81da886ff3..f35aa1dd660 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4094.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4094.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4094", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:23.933", - "lastModified": "2018-10-12T22:07:08.487", + "lastModified": "2024-11-21T02:09:29.677", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95524", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69602", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95524", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4095.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4095.json index d54fcca605d..ab4b8db8f03 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4095.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4095.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4095", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.013", - "lastModified": "2018-10-12T22:07:08.973", + "lastModified": "2024-11-21T02:09:29.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95525", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95525", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4096.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4096.json index d4d630afcd7..b724296509b 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4096.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4096.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4096", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.090", - "lastModified": "2018-10-12T22:07:09.473", + "lastModified": "2024-11-21T02:09:29.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95526", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69601", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95526", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4097.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4097.json index 1deb836d39a..92fbebc7e42 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4097.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4097.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4097", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.167", - "lastModified": "2018-10-12T22:07:10.020", + "lastModified": "2024-11-21T02:09:30.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95527", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95527", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4098.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4098.json index 492394d9b80..ff24deb2b6e 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4098.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4098.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4098", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.230", - "lastModified": "2018-10-12T22:07:10.440", + "lastModified": "2024-11-21T02:09:30.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -102,6 +101,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95528", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95528", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-40xx/CVE-2014-4099.json b/CVE-2014/CVE-2014-40xx/CVE-2014-4099.json index 5820ca5aaa5..55a2b30af4e 100644 --- a/CVE-2014/CVE-2014-40xx/CVE-2014-4099.json +++ b/CVE-2014/CVE-2014-40xx/CVE-2014-4099.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4099", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.310", - "lastModified": "2018-10-12T22:07:10.910", + "lastModified": "2024-11-21T02:09:30.267", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95529", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95529", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4100.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4100.json index 4230b7a01f7..93c301ce01a 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4100.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4100.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4100", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.387", - "lastModified": "2018-10-12T22:07:11.410", + "lastModified": "2024-11-21T02:09:30.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95530", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95530", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4101.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4101.json index 763b288f210..1fc28ec9d3c 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4101.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4101.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4101", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.450", - "lastModified": "2018-10-12T22:07:11.847", + "lastModified": "2024-11-21T02:09:30.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95531", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95531", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4102.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4102.json index 0a97e098e30..491cec7ccce 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4102.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4102.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4102", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.527", - "lastModified": "2018-10-12T22:07:12.410", + "lastModified": "2024-11-21T02:09:30.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95532", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95532", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4103.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4103.json index 6dcb2c77651..ac33f2664e6 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4103.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4103.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4103", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.607", - "lastModified": "2018-10-12T22:07:12.877", + "lastModified": "2024-11-21T02:09:30.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95533", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95533", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4104.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4104.json index 8e699306797..94f470f7cbf 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4104.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4104.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4104", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.667", - "lastModified": "2018-10-12T22:07:13.363", + "lastModified": "2024-11-21T02:09:30.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95534", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95534", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4105.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4105.json index 99105893852..3be1ed32ceb 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4105.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4105.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4105", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.917", - "lastModified": "2018-10-12T22:07:13.863", + "lastModified": "2024-11-21T02:09:30.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69613", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4106.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4106.json index 1fe13036414..34e40644586 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4106.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4106.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4106", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:24.980", - "lastModified": "2018-10-12T22:07:14.207", + "lastModified": "2024-11-21T02:09:31.097", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4107.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4107.json index 19e3ff36c7c..102fd2b7a8d 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4107.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4107.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4107", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:25.433", - "lastModified": "2018-10-12T22:07:14.487", + "lastModified": "2024-11-21T02:09:31.237", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69618", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4108.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4108.json index aa2d98315d6..80c004cce26 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4108.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4108.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4108", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:25.497", - "lastModified": "2018-10-12T22:07:14.783", + "lastModified": "2024-11-21T02:09:31.357", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69617", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4109.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4109.json index 71b9b556a90..29f77458ec1 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4109.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4109.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4109", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:31.450", - "lastModified": "2018-10-12T22:07:15.097", + "lastModified": "2024-11-21T02:09:31.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4110.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4110.json index 70af1a7f46a..76cc04c13d5 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4110.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4110.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4110", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:31.497", - "lastModified": "2018-10-12T22:07:15.363", + "lastModified": "2024-11-21T02:09:31.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4111.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4111.json index 982d2122a1c..842b794e413 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4111.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4111.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4111", "sourceIdentifier": "secure@microsoft.com", "published": "2014-09-10T01:55:31.573", - "lastModified": "2018-10-12T22:07:15.707", + "lastModified": "2024-11-21T02:09:31.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/69615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4113.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4113.json index 0596739303f..1a021297691 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4113.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4113.json @@ -2,13 +2,8 @@ "id": "CVE-2014-4113", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:07.473", - "lastModified": "2024-07-02T16:57:12.317", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-05-04", - "cisaActionDue": "2022-05-25", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Win32k Privilege Escalation Vulnerability", + "lastModified": "2024-11-21T02:09:31.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-05-04", + "cisaActionDue": "2022-05-25", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Win32k Privilege Escalation Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -236,6 +235,95 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-a-windows-kernel-mode-vulnerability-cve-2014-4113/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Not Applicable" + ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/113167", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.com/files/131964/Windows-8.0-8.1-x64-TrackPopupMenu-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/60970", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70364", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/sam-b/CVE-2014-4113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37064/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/39666/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4114.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4114.json index a63b1076c9c..e4d15d5c404 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4114.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4114.json @@ -2,13 +2,8 @@ "id": "CVE-2014-4114", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:07.817", - "lastModified": "2024-07-16T17:23:54.207", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-03", - "cisaActionDue": "2022-03-24", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Windows Object Linking & Embedding (OLE) Remote Code Execution Vulnerability", + "lastModified": "2024-11-21T02:09:32.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-03", + "cisaActionDue": "2022-03-24", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Windows Object Linking & Embedding (OLE) Remote Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -222,6 +221,86 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-windows-zero-day-vulnerability-cve-2014-4114-aka-sandworm/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/113140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60972", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.isightpartners.com/2014/10/cve-2014-4114/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70419", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4115.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4115.json index 0728d1701df..5a5661ce74d 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4115.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4115.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4115", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:07.863", - "lastModified": "2019-02-26T14:04:02.400", + "lastModified": "2024-11-21T02:09:32.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -100,6 +99,25 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-063", "source": "secure@microsoft.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60975", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70343", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-063", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4116.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4116.json index 70253d8aeb4..18c29471b63 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4116.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4116.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4116", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:04.717", - "lastModified": "2018-10-12T22:07:18.737", + "lastModified": "2024-11-21T02:09:32.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-073", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-073", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4117.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4117.json index a296f63c7c0..5fbfa8e6ec0 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4117.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4117.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4117", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:07.897", - "lastModified": "2018-10-12T22:07:18.973", + "lastModified": "2024-11-21T02:09:32.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -138,6 +137,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-061", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70360", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-061", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4118.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4118.json index cbb99ae24ec..f470c5b5dff 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4118.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4118.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4118", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:04.780", - "lastModified": "2019-05-14T14:04:37.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:32.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -142,6 +141,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1031187", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-067", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4121.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4121.json index 640bac11d7a..c3d51b2502d 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4121.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4121.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4121", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:07.943", - "lastModified": "2018-10-12T22:07:19.567", + "lastModified": "2024-11-21T02:09:32.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-057", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60969", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70351", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031021", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-057", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4122.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4122.json index 2fd530cadcd..5b9b56bf5aa 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4122.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4122.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4122", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:07.990", - "lastModified": "2018-10-12T22:07:19.940", + "lastModified": "2024-11-21T02:09:32.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-057", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60969", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031021", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-057", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4123.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4123.json index 7719c7c3ddb..d0d91aaae44 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4123.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4123.json @@ -2,13 +2,8 @@ "id": "CVE-2014-4123", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.037", - "lastModified": "2024-06-28T17:25:19.543", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-05-25", - "cisaActionDue": "2022-06-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Internet Explorer Privilege Escalation Vulnerability", + "lastModified": "2024-11-21T02:09:32.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-05-25", + "cisaActionDue": "2022-06-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Internet Explorer Privilege Escalation Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -348,6 +347,47 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70326", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4124.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4124.json index e882fc60894..46b64861762 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4124.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4124.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4124", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.083", - "lastModified": "2018-10-12T22:07:20.847", + "lastModified": "2024-11-21T02:09:33.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70349", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4126.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4126.json index e0bb65d2f66..51503ace507 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4126.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4126.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4126", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.130", - "lastModified": "2018-10-12T22:07:21.287", + "lastModified": "2024-11-21T02:09:33.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70328", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1078", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4127.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4127.json index d8f2f76c77e..7a599880194 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4127.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4127.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4127", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.177", - "lastModified": "2018-10-12T22:07:21.817", + "lastModified": "2024-11-21T02:09:33.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70329", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4128.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4128.json index 5c5589c6fae..74272770134 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4128.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4128.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4128", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.223", - "lastModified": "2018-10-12T22:07:22.223", + "lastModified": "2024-11-21T02:09:33.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -128,6 +127,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70330", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1076", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4129.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4129.json index 9b1f574f121..c5418976ede 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4129.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4129.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4129", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.270", - "lastModified": "2018-10-12T22:07:22.770", + "lastModified": "2024-11-21T02:09:33.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70331", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4130.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4130.json index af7b2adb377..a09955ebef6 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4130.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4130.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4130", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.317", - "lastModified": "2018-10-12T22:07:23.193", + "lastModified": "2024-11-21T02:09:33.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70332", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4132.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4132.json index c94b95561a7..4ed6e3b5ad2 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4132.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4132.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4132", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.347", - "lastModified": "2018-10-12T22:07:23.567", + "lastModified": "2024-11-21T02:09:33.833", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -103,6 +102,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70334", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1077", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4133.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4133.json index 0f9aacdecb4..3d8fb1b77d2 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4133.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4133.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4133", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.410", - "lastModified": "2018-10-12T22:07:24.083", + "lastModified": "2024-11-21T02:09:33.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70335", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4134.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4134.json index 6de8a3abc48..6effabd3256 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4134.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4134.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4134", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.457", - "lastModified": "2018-10-12T22:07:24.537", + "lastModified": "2024-11-21T02:09:34.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70336", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4137.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4137.json index 85d74ff10f4..47634eb1360 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4137.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4137.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4137", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.503", - "lastModified": "2018-10-12T22:07:25.003", + "lastModified": "2024-11-21T02:09:34.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70339", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4138.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4138.json index 3c2292064a0..e8c677122b3 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4138.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4138.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4138", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.550", - "lastModified": "2018-10-12T22:07:25.427", + "lastModified": "2024-11-21T02:09:34.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -99,6 +98,34 @@ { "url": "https://www.exploit-db.com/exploits/40960/", "source": "secure@microsoft.com" + }, + { + "url": "http://blog.skylined.nl/20161221001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/140258/Microsoft-Internet-Explorer-11-MSHTML-CPasteCommand-ConvertBitmaptoPng-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70340", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/40960/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4140.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4140.json index fe72d306e3f..4951a892e12 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4140.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4140.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4140", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.597", - "lastModified": "2018-10-12T22:07:26.113", + "lastModified": "2024-11-21T02:09:34.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70325", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4141.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4141.json index 5231e1fa783..8ee2c8daaa2 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4141.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4141.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4141", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.647", - "lastModified": "2018-10-12T22:07:26.503", + "lastModified": "2024-11-21T02:09:34.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -106,6 +105,26 @@ { "url": "https://www.exploit-db.com/exploits/40685/", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/60968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70342", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/40685/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4143.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4143.json index 54a8e453dcc..56146b0865e 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4143.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4143.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4143", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:04.827", - "lastModified": "2018-10-12T22:07:26.910", + "lastModified": "2024-11-21T02:09:34.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -104,6 +103,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4148.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4148.json index 8937e570bbc..5e73c23ad45 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4148.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4148.json @@ -2,13 +2,8 @@ "id": "CVE-2014-4148", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-15T10:55:08.693", - "lastModified": "2024-06-28T17:24:23.353", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-05-25", - "cisaActionDue": "2022-06-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Windows Remote Code Execution Vulnerability", + "lastModified": "2024-11-21T02:09:35.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-05-25", + "cisaActionDue": "2022-06-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Windows Remote Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -186,6 +185,45 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/60970", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70429", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96995", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4149.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4149.json index f2f18741ff1..7268f5b5a89 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4149.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4149.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4149", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:04.857", - "lastModified": "2018-10-12T22:07:27.817", + "lastModified": "2024-11-21T02:09:35.160", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -121,6 +120,21 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-072", "source": "secure@microsoft.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/11/11/ms14-072-net-remoting-elevation-of-privilege-vulnerability.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-072", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4151.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4151.json index 4120a6edbfa..dcda3aabb62 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4151.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4151.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4151", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T19:55:06.623", - "lastModified": "2014-06-19T18:55:50.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:35.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,21 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-205/", "source": "cve@mitre.org" + }, + { + "url": "http://forums.alienvault.com/discussion/2806", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59112", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-205/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4152.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4152.json index 4583a56b4a1..94f66beb1a6 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4152.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4152.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4152", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T19:55:06.683", - "lastModified": "2014-06-19T18:57:37.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:35.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,21 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-206/", "source": "cve@mitre.org" + }, + { + "url": "http://forums.alienvault.com/discussion/2806", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59112", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-206/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4153.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4153.json index 84b6271b701..c74bde5c99b 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4153.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4153.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4153", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T19:55:06.747", - "lastModified": "2014-06-19T18:59:04.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:35.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,21 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-207/", "source": "cve@mitre.org" + }, + { + "url": "http://forums.alienvault.com/discussion/2806", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59112", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-207/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4154.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4154.json index 78a81c9a23f..e279cca60c7 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4154.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4154.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4154", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-16T14:19:03.870", - "lastModified": "2014-07-16T17:49:06.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:35.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33803", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4155.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4155.json index 669a5f1d721..49e3365b10f 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4155.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4155.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4155", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-19T14:55:08.050", - "lastModified": "2014-07-18T05:24:04.523", + "lastModified": "2024-11-21T02:09:35.993", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127129/ZTE-WXV10-W300-Disclosure-CSRF-Default.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33803", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://osandamalith.wordpress.com/2014/06/15/zte-wxv10-w300-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4157.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4157.json index ef2fb9f3d37..2f0d78e7b53 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4157.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4157.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4157", "sourceIdentifier": "security@debian.org", "published": "2014-06-23T11:21:19.217", - "lastModified": "2023-11-07T02:20:26.500", + "lastModified": "2024-11-21T02:09:36.307", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -104,8 +103,8 @@ "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751417", "source": "security@debian.org", "tags": [ - "Mailing List", "Issue Tracking", + "Mailing List", "Third Party Advisory" ] }, @@ -116,6 +115,50 @@ "Exploit", "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=137f7df8cead00688524c82360930845396b8a21", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/16/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/17/17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/137f7df8cead00688524c82360930845396b8a21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4158.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4158.json index adc37fa3832..59fb5071d94 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4158.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4158.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4158", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-13T14:55:16.417", - "lastModified": "2015-09-02T17:03:58.760", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:36.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,39 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/108090", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/70808", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/126332/Kolibri-2.0-Stack-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34059", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4159.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4159.json index 432738a69cf..a427fbb2b4b 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4159.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4159.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4159", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-13T14:55:17.947", - "lastModified": "2016-12-16T02:59:03.177", + "lastModified": "2024-11-21T02:09:36.590", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/601.html\n\n\"CWE-601: URL Redirection to Untrusted Site ('Open Redirect')\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +89,26 @@ { "url": "https://service.sap.com/sap/support/notes/1946420", "source": "cve@mitre.org" + }, + { + "url": "http://blog.emaze.net/2014/05/sap-multiple-vulnerabilities.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67997", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1946420", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/601.html\n\n\"CWE-601: URL Redirection to Untrusted Site ('Open Redirect')\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4160.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4160.json index f69ff6f4af2..faf5d3722d9 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4160.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4160.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4160", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-13T14:55:18.023", - "lastModified": "2014-06-21T04:41:59.490", + "lastModified": "2024-11-21T02:09:36.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://service.sap.com/sap/support/notes/1932505", "source": "cve@mitre.org" + }, + { + "url": "http://blog.emaze.net/2014/05/sap-multiple-vulnerabilities.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67995", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1932505", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4161.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4161.json index fb4f63cf195..5fe765a1bac 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4161.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4161.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4161", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-13T14:55:18.087", - "lastModified": "2014-06-16T14:33:49.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:36.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://service.sap.com/sap/support/notes/1946420", "source": "cve@mitre.org" + }, + { + "url": "http://blog.emaze.net/2014/05/sap-multiple-vulnerabilities.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58889", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1946420", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4162.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4162.json index 04da77154c7..9c0e085fec1 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4162.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4162.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4162", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-16T18:55:09.713", - "lastModified": "2014-07-17T05:07:29.683", + "lastModified": "2024-11-21T02:09:37.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/107449", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/126812/Zyxel-P-660HW-T1-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58513", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33518", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4163.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4163.json index ebb1002568b..458dcfa9d9b 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4163.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4163.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4163", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-16T18:55:09.777", - "lastModified": "2014-06-17T14:39:32.850", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:37.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/62", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4164.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4164.json index d21183f7d02..3165228554b 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4164.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4164.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4164", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-16T18:55:09.963", - "lastModified": "2015-12-04T16:21:42.793", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:37.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Vulnerabilidad de XSS en AlgoSec FireFlow 6.3-b230 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una firma de usuario en SelfService/Prefs.html." } ], - "vendorComments": [ - { - "organization": "AlgoSec", - "comment": "This vulnerability has been fixed in AlgoSec FireFlow version 6.3 and on. \nCustomers should upgrade to FireFlow version 6.3-b119 or later, 6.4-b170 or later, or any version of 6.5 or 6.6. \nNote that FireFlow 6.4 and below are already past their end-of-support date, and AlgoSec recommends that customers upgrade to a supported version. As of July 2014 the latest generally available version is 6.6.", - "lastModified": "2014-08-06T09:01:07.687" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +77,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127001/AlogoSec-FireFlow-6.3-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + } + ], + "vendorComments": [ + { + "organization": "AlgoSec", + "comment": "This vulnerability has been fixed in AlgoSec FireFlow version 6.3 and on. \nCustomers should upgrade to FireFlow version 6.3-b119 or later, 6.4-b170 or later, or any version of 6.5 or 6.6. \nNote that FireFlow 6.4 and below are already past their end-of-support date, and AlgoSec recommends that customers upgrade to a supported version. As of July 2014 the latest generally available version is 6.6.", + "lastModified": "2014-08-06T09:01:07.687" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4165.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4165.json index 9e0ea1d3e50..1b8fa71b5fd 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4165.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4165.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4165", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-16T18:55:10.027", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:37.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,36 @@ { "url": "http://www.securitytracker.com/id/1030437", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0168.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127043/ntop-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68002", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030437", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4166.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4166.json index f16063e84a7..d5428439490 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4166.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4166.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4166", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-16T18:55:10.323", - "lastModified": "2014-06-17T14:58:16.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:37.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "http://www.securityfocus.com/bid/68019", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/108052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127074/SHOUTcast-DNAS-2.2.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33714", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68019", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4167.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4167.json index 3f14f2668b8..b2b2ee0f28a 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4167.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4167.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4167", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T14:55:04.587", - "lastModified": "2018-10-22T17:07:29.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:37.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -143,6 +142,36 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/572", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59533", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2255-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/neutron/+bug/1309195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4168.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4168.json index d93970cf37d..3cff23b2455 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4168.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4168.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4168", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T17:55:06.140", - "lastModified": "2014-07-07T14:49:48.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:37.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -151,6 +150,30 @@ { "url": "https://github.com/yarrick/iodine/blob/b715be5cf3978fbe589b03b09c9398d0d791f850/CHANGELOG", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/59417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/16/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/18/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751834", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/yarrick/iodine/blob/b715be5cf3978fbe589b03b09c9398d0d791f850/CHANGELOG", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4171.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4171.json index 3e5d1cfc7bf..f7e53d348c0 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4171.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4171.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4171", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-23T11:21:20.403", - "lastModified": "2018-12-18T14:38:03.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:38.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -192,6 +191,111 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=linux-mm-commits&m=140303745420549&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://ozlabs.org/~akpm/mmots/broken-out/shmem-fix-faulting-into-a-hole-while-its-punched.patch", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1318.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/18/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68157", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2335-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1111180", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4174.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4174.json index 233f8102f90..c4fa79a17cf 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4174.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4174.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4174", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T16:55:08.360", - "lastModified": "2014-06-19T17:16:07.923", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:38.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -122,6 +121,42 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk-1.10/wiretap/libpcap.c?r1=53123&r2=53122&pathrev=53123", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=53123", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8808", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9390", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4187.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4187.json index c62491690f2..40f094436cc 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4187.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4187.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4187", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T14:55:08.080", - "lastModified": "2018-10-09T19:47:35.220", + "lastModified": "2024-11-21T02:09:38.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://www.securityfocus.com/archive/1/532432/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127098/ClipBucket-CMS-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532432/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4188.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4188.json index 4b4ac2c2b66..1535aba40fc 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4188.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4188.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4188", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T14:55:08.517", - "lastModified": "2015-09-02T17:04:20.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:38.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,25 @@ { "url": "http://www.securityfocus.com/bid/68015", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/58528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58899", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-013/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68015", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4189.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4189.json index 6dfa00d8827..1459068d338 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4189.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4189.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4189", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T14:55:08.597", - "lastModified": "2015-09-02T17:05:08.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:39.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,25 @@ { "url": "http://www.securityfocus.com/bid/68015", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/58528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58899", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-013/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68015", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4190.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4190.json index 9405b7c3ea0..4b36e6de076 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4190.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4190.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4190", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T14:55:08.940", - "lastModified": "2014-06-18T17:06:34.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:39.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -290,6 +289,17 @@ { "url": "http://www.securityfocus.com/bid/67907", "source": "cve@mitre.org" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-343218.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67907", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4191.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4191.json index ddc46395349..df02f038e96 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4191.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4191.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4191", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T15:55:06.613", - "lastModified": "2021-11-30T19:04:22.517", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "As with CVE-2007-6755 this vulnerability has been scored with the assumption the relationship between P and Q is known to the attacker. Please see CVE-2007-6755 [link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6755] more information.", + "lastModified": "2024-11-21T02:09:39.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +78,15 @@ { "url": "http://dualec.org/DualECTLS.pdf", "source": "cve@mitre.org" + }, + { + "url": "http://dualec.org/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://dualec.org/DualECTLS.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As with CVE-2007-6755 this vulnerability has been scored with the assumption the relationship between P and Q is known to the attacker. Please see CVE-2007-6755 [link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6755] more information." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4192.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4192.json index 629338c48fa..c4711f9c735 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4192.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4192.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4192", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T15:55:06.690", - "lastModified": "2021-11-30T19:04:22.523", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "As with CVE-2007-6755 this vulnerability has been scored with the assumption the relationship between P and Q is known to the attacker. Please see CVE-2007-6755 [link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6755] more information.", + "lastModified": "2024-11-21T02:09:39.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +78,15 @@ { "url": "http://dualec.org/DualECTLS.pdf", "source": "cve@mitre.org" + }, + { + "url": "http://dualec.org/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://dualec.org/DualECTLS.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As with CVE-2007-6755 this vulnerability has been scored with the assumption the relationship between P and Q is known to the attacker. Please see CVE-2007-6755 [link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6755] more information." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4193.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4193.json index 69e58abb558..272266c5e3f 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4193.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4193.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4193", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-17T15:55:06.753", - "lastModified": "2021-11-30T18:26:15.267", + "lastModified": "2024-11-21T02:09:39.610", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "As with CVE-2007-6755 this vulnerability has been scored with the assumption the relationship between P and Q is known to the attacker. Please see CVE-2007-6755 [link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6755] more information.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -84,6 +82,19 @@ { "url": "http://www.securityfocus.com/bid/68191", "source": "cve@mitre.org" + }, + { + "url": "http://dualec.org/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://dualec.org/DualECTLS.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68191", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As with CVE-2007-6755 this vulnerability has been scored with the assumption the relationship between P and Q is known to the attacker. Please see CVE-2007-6755 [link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6755] more information." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4194.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4194.json index aa6055770fe..8eb1c5cf091 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4194.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4194.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4194", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-09T14:55:03.967", - "lastModified": "2015-09-02T17:05:59.713", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:39.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/68134", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127164/ZeroCMS-1.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68134", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4195.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4195.json index e30fdfa4ede..48ebea3b32a 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4195.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4195.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4195", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T14:55:08.597", - "lastModified": "2014-07-09T01:29:32.493", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:39.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127262/ZeroCMS-1.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4197.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4197.json index a5c6f3d622d..9608fbafe2b 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4197.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4197.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4197", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:07.547", - "lastModified": "2014-08-22T17:12:05.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:40.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/59319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-009.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-41xx/CVE-2014-4199.json b/CVE-2014/CVE-2014-41xx/CVE-2014-4199.json index 2173767b544..dca3544655c 100644 --- a/CVE-2014/CVE-2014-41xx/CVE-2014-4199.json +++ b/CVE-2014/CVE-2014-41xx/CVE-2014-4199.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4199", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-28T15:14:09.127", - "lastModified": "2017-08-29T01:34:51.810", + "lastModified": "2024-11-21T02:09:40.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:C", + "baseScore": 6.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -116,6 +115,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95493", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/71", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/110458", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95493", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4200.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4200.json index 3796d24428f..cf88be2aad5 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4200.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4200.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4200", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-28T15:14:09.173", - "lastModified": "2017-08-29T01:34:51.857", + "lastModified": "2024-11-21T02:09:40.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.7 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -116,6 +115,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95494", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/71", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69410", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95494", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4201.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4201.json index 52c7560b139..2b4281d891c 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4201.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4201.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4201", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.297", - "lastModified": "2018-10-09T19:47:35.423", + "lastModified": "2024-11-21T02:09:40.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -108,6 +107,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94552", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94552", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4202.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4202.json index e2210cc3890..12a58ce60a4 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4202.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4202.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4202", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.357", - "lastModified": "2018-10-09T19:47:35.983", + "lastModified": "2024-11-21T02:09:40.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94553", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94553", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4203.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4203.json index a5faf6b0944..e832a018a0f 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4203.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4203.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4203", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.403", - "lastModified": "2018-10-09T19:47:36.530", + "lastModified": "2024-11-21T02:09:41.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 4.1, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 2.7, @@ -111,6 +110,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94564", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68568", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94564", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4204.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4204.json index 36c5d8a3d7c..e0970828d70 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4204.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4204.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4204", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.437", - "lastModified": "2018-10-09T19:47:37.250", + "lastModified": "2024-11-21T02:09:41.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -102,6 +101,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94580", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030586", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94580", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4205.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4205.json index f2ea9ee5400..b78144d4e91 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4205.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4205.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4205", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.513", - "lastModified": "2018-10-09T19:47:37.860", + "lastModified": "2024-11-21T02:09:41.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94585", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030585", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94585", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4206.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4206.json index 99b34b2fc1a..2da40609ca1 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4206.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4206.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4206", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.560", - "lastModified": "2018-10-09T19:47:38.483", + "lastModified": "2024-11-21T02:09:41.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -107,6 +106,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94568", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68582", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94568", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4207.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4207.json index c7ece5205ae..e618609931a 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4207.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4207.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4207", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.607", - "lastModified": "2022-08-26T16:13:12.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:41.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -265,6 +264,99 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/60425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94624", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4208.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4208.json index 9ef8a16baa8..9855719ebb2 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4208.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4208.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4208", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.640", - "lastModified": "2022-05-13T14:57:17.197", + "lastModified": "2024-11-21T02:09:41.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -95,6 +94,10 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://seclists.org/fulldisclosure/2014/Dec/23", "source": "secalert_us@oracle.com" @@ -189,6 +192,113 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94607", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94607", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4209.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4209.json index 30cb551e895..60329de8d8b 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4209.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4209.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4209", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.687", - "lastModified": "2022-05-13T14:57:17.203", + "lastModified": "2024-11-21T02:09:41.973", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -124,6 +122,14 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" @@ -258,6 +264,166 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94596", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68639", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94596", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4210.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4210.json index 7157c3dc928..f64035ec804 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4210.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4210.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4210", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.733", - "lastModified": "2018-10-09T19:47:47.593", + "lastModified": "2024-11-21T02:09:42.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94554", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94554", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4211.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4211.json index e02b2f931c1..9d6330ef862 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4211.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4211.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4211", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.780", - "lastModified": "2018-10-09T19:47:48.093", + "lastModified": "2024-11-21T02:09:42.320", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -107,6 +106,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94551", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58739", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94551", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4212.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4212.json index 0d9ea2fe9b9..d5c07877bb0 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4212.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4212.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4212", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.827", - "lastModified": "2018-10-09T19:47:48.720", + "lastModified": "2024-11-21T02:09:42.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94556", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68638", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94556", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4213.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4213.json index 295828094d1..15e2bc4ba4b 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4213.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4213.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4213", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.873", - "lastModified": "2018-10-09T19:47:49.517", + "lastModified": "2024-11-21T02:09:42.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94571", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68648", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94571", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4214.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4214.json index f35ed80b5f7..e02fb5cf772 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4214.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4214.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4214", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.920", - "lastModified": "2018-10-09T19:47:50.030", + "lastModified": "2024-11-21T02:09:42.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:M/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.4, @@ -221,6 +220,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94627", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94627", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4215.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4215.json index ff9b109cc1b..2dbf28bbecd 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4215.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4215.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4215", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:15.967", - "lastModified": "2018-10-09T19:47:50.923", + "lastModified": "2024-11-21T02:09:42.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -111,6 +110,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94609", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68569", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94609", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4216.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4216.json index 8fd77561f16..7eab8101ab1 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4216.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4216.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4216", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.013", - "lastModified": "2022-05-13T14:57:17.213", + "lastModified": "2024-11-21T02:09:43.757", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +106,10 @@ } ], "references": [ + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" @@ -116,6 +118,10 @@ "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://seclists.org/fulldisclosure/2014/Dec/23", "source": "secalert_us@oracle.com" @@ -182,6 +188,90 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94591", "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94591", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4217.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4217.json index 41a2e1a60e0..33105fbfe47 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4217.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4217.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4217", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.060", - "lastModified": "2018-10-09T19:47:53.517", + "lastModified": "2024-11-21T02:09:44.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94558", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68644", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94558", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4218.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4218.json index 8bb9ad66542..718a46c7c67 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4218.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4218.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4218", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.107", - "lastModified": "2022-05-13T14:57:17.087", + "lastModified": "2024-11-21T02:09:44.150", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -124,6 +122,14 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" @@ -258,6 +264,166 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94599", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94599", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4219.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4219.json index c56f6df9502..aeca1d4ef56 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4219.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4219.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4219", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.153", - "lastModified": "2022-05-13T14:57:17.093", + "lastModified": "2024-11-21T02:09:44.353", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -114,6 +112,10 @@ "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", "source": "secalert_us@oracle.com" @@ -244,6 +246,158 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94589", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68620", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94589", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4220.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4220.json index 058f6f45b07..d7c381d0f6c 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4220.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4220.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4220", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.200", - "lastModified": "2022-05-13T14:57:17.100", + "lastModified": "2024-11-21T02:09:44.557", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +94,10 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://seclists.org/fulldisclosure/2014/Dec/23", "source": "secalert_us@oracle.com" @@ -182,6 +184,106 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94598", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94598", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4221.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4221.json index d410cb23643..f2a9d472133 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4221.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4221.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4221", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.247", - "lastModified": "2022-05-13T14:57:17.110", + "lastModified": "2024-11-21T02:09:44.737", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +94,10 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://seclists.org/fulldisclosure/2014/Dec/23", "source": "secalert_us@oracle.com" @@ -194,6 +196,118 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94604", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68571", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94604", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4222.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4222.json index 93fb3a020c5..62a7d1fe210 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4222.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4222.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4222", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.310", - "lastModified": "2018-10-09T19:48:08.643", + "lastModified": "2024-11-21T02:09:44.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -111,6 +110,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94561", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59204", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68652", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030594", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94561", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4223.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4223.json index 24ae95155ce..bd9dceffad4 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4223.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4223.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4223", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.357", - "lastModified": "2022-05-13T14:57:17.117", + "lastModified": "2024-11-21T02:09:45.053", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -78,6 +76,10 @@ } ], "references": [ + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" @@ -132,6 +134,66 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94594", "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94594", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4224.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4224.json index 1fbad2a63a8..ebf05b123e1 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4224.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4224.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4224", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.403", - "lastModified": "2018-10-09T19:48:10.517", + "lastModified": "2024-11-21T02:09:45.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -121,6 +120,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94610", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68574", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94610", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4225.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4225.json index 7f95bbf3a2d..62d9b31eee4 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4225.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4225.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4225", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.450", - "lastModified": "2018-10-09T19:48:11.203", + "lastModified": "2024-11-21T02:09:45.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -106,6 +105,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94608", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68566", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94608", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4226.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4226.json index f9dd48ee42f..29570718a2c 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4226.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4226.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4226", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.497", - "lastModified": "2018-10-09T19:48:11.907", + "lastModified": "2024-11-21T02:09:45.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -111,6 +110,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94579", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59396", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68585", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030586", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94579", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4227.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4227.json index 02afde4497b..8dc63839e9d 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4227.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4227.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4227", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.547", - "lastModified": "2022-05-13T14:57:17.123", + "lastModified": "2024-11-21T02:09:45.623", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -110,6 +108,10 @@ "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", "source": "secalert_us@oracle.com" @@ -216,6 +218,130 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94588", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94588", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4228.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4228.json index 6f23142d64e..f600b59cabe 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4228.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4228.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4228", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.593", - "lastModified": "2018-10-09T19:48:15.893", + "lastModified": "2024-11-21T02:09:45.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -296,6 +295,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94613", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68601", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94613", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4229.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4229.json index 3b5da64dfa2..e335e3815f8 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4229.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4229.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4229", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.640", - "lastModified": "2018-10-09T19:48:16.547", + "lastModified": "2024-11-21T02:09:45.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -131,6 +130,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94574", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59322", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030582", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94574", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4230.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4230.json index ba6065d5875..ce8313e140f 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4230.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4230.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4230", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.687", - "lastModified": "2018-10-09T19:48:17.220", + "lastModified": "2024-11-21T02:09:46.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94583", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030585", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4231.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4231.json index a91d5baf3e2..4a838798865 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4231.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4231.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4231", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.733", - "lastModified": "2018-10-09T19:48:17.860", + "lastModified": "2024-11-21T02:09:46.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94582", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030585", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94582", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4232.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4232.json index f412c094d9a..a72b22f4ea8 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4232.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4232.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4232", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T05:10:16.780", - "lastModified": "2018-10-09T19:48:18.487", + "lastModified": "2024-11-21T02:09:46.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -133,6 +132,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94614", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94614", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4233.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4233.json index 53c62c54661..d355b224da4 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4233.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4233.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4233", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:09.623", - "lastModified": "2018-10-09T19:48:19.063", + "lastModified": "2024-11-21T02:09:46.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -196,6 +195,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94625", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68598", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94625", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4234.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4234.json index 8c004953f5c..810255068d6 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4234.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4234.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4234", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:09.687", - "lastModified": "2018-10-09T19:48:19.893", + "lastModified": "2024-11-21T02:09:46.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -136,6 +135,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94575", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59322", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030582", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94575", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4235.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4235.json index 560986f00cd..153ef6c7487 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4235.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4235.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4235", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:09.733", - "lastModified": "2018-10-09T19:48:20.580", + "lastModified": "2024-11-21T02:09:46.847", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -118,6 +117,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94572", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94572", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4236.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4236.json index a44af73dbf6..8870e5e4e45 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4236.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4236.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4236", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:09.780", - "lastModified": "2018-10-09T19:48:21.127", + "lastModified": "2024-11-21T02:09:46.993", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -115,6 +114,45 @@ { "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/56910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4237.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4237.json index d3fa6baa20d..8c71c77b5c7 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4237.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4237.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4237", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:09.827", - "lastModified": "2018-10-09T19:48:21.847", + "lastModified": "2024-11-21T02:09:47.147", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -115,6 +114,45 @@ { "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/56910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68627", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4238.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4238.json index f68f57405d7..d501abe80f7 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4238.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4238.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4238", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:09.873", - "lastModified": "2018-10-09T19:48:22.580", + "lastModified": "2024-11-21T02:09:47.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -196,6 +195,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94623", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68587", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94623", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4239.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4239.json index aba4f028e42..1411096cd57 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4239.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4239.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4239", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:09.920", - "lastModified": "2018-10-09T19:48:23.393", + "lastModified": "2024-11-21T02:09:47.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -121,6 +120,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94569", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68631", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94569", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4240.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4240.json index 792312fe4d7..c03dfb4a543 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4240.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4240.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4240", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:09.967", - "lastModified": "2018-10-09T19:48:24.110", + "lastModified": "2024-11-21T02:09:47.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -196,6 +195,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94626", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68602", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94626", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4241.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4241.json index b5e2d8578f3..c01da2650dc 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4241.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4241.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4241", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:09.997", - "lastModified": "2018-10-09T19:48:24.957", + "lastModified": "2024-11-21T02:09:47.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -147,6 +146,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94559", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94559", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4242.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4242.json index 9ed9c1197b3..3ef420af595 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4242.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4242.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4242", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.047", - "lastModified": "2018-10-09T19:48:25.533", + "lastModified": "2024-11-21T02:09:47.943", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94557", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68641", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94557", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4243.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4243.json index c9f79f5fa1d..264eaaee85c 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4243.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4243.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4243", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.093", - "lastModified": "2022-09-21T20:10:44.470", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:48.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:M/C:N/I:N/A:P", + "baseScore": 2.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -226,6 +225,83 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68611", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94628", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4244.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4244.json index 7adcbd72783..d6917ce3421 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4244.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4244.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4244", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.140", - "lastModified": "2022-05-13T14:57:17.130", + "lastModified": "2024-11-21T02:09:48.257", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -144,6 +142,14 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" @@ -430,6 +436,318 @@ { "url": "https://www.ibm.com/support/docview.wss?uid=swg21680418", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60326", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60335", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60497", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60846", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61254", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61294", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61469", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61846", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62314", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681966", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683338", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683429", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683438", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685122", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685178", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688893", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21683518", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ibm.com/support/docview.wss?uid=swg21680418", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4245.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4245.json index 7fcdd9f0edf..54373549ddb 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4245.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4245.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4245", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.170", - "lastModified": "2018-10-09T19:48:41.893", + "lastModified": "2024-11-21T02:09:48.503", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -129,6 +128,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94540", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/56910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68617", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94540", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4246.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4246.json index bbabe45ef11..716f344c1a7 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4246.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4246.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4246", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.217", - "lastModified": "2018-10-09T19:48:42.800", + "lastModified": "2024-11-21T02:09:48.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -111,6 +110,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94567", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59303", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68586", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94567", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4247.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4247.json index a8a00756e9e..1d0bddc0281 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4247.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4247.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4247", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.263", - "lastModified": "2022-05-13T14:57:17.140", + "lastModified": "2024-11-21T02:09:48.800", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +110,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94592", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94592", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4248.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4248.json index fe12abc92ee..d6711db2de1 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4248.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4248.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4248", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.310", - "lastModified": "2018-10-09T19:48:44.267", + "lastModified": "2024-11-21T02:09:48.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:S/C:P/I:N/A:N", + "baseScore": 1.0, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.0 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 1.5, @@ -118,6 +117,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94573", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68653", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94573", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4249.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4249.json index 6d0cba0b6f0..45dbe7bdda1 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4249.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4249.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4249", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.357", - "lastModified": "2018-10-09T19:48:44.817", + "lastModified": "2024-11-21T02:09:49.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +101,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94550", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94550", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4250.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4250.json index 0524ca6ca04..e81b132965d 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4250.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4250.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4250", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.407", - "lastModified": "2018-10-09T19:48:45.427", + "lastModified": "2024-11-21T02:09:49.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -107,6 +106,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94586", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68630", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030585", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94586", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4251.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4251.json index c7b4125f254..65c8913a081 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4251.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4251.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4251", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.437", - "lastModified": "2018-10-09T19:48:46.033", + "lastModified": "2024-11-21T02:09:49.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -111,6 +110,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94560", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59204", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030594", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94560", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4252.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4252.json index 4b54321eb0f..7bab825cf86 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4252.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4252.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4252", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.483", - "lastModified": "2022-05-13T14:57:17.147", + "lastModified": "2024-11-21T02:09:49.517", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -124,6 +122,14 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" @@ -258,6 +264,166 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94600", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94600", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4253.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4253.json index ee46cf9d130..f3aea6c0918 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4253.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4253.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4253", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.530", - "lastModified": "2018-10-09T19:48:51.363", + "lastModified": "2024-11-21T02:09:49.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94555", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68634", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94555", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4254.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4254.json index eac58bbf268..76935d967fd 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4254.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4254.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4254", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.577", - "lastModified": "2018-10-09T19:48:51.927", + "lastModified": "2024-11-21T02:09:49.847", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94545", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68591", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94545", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4255.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4255.json index efad0fc5e48..65a73df702c 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4255.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4255.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4255", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.623", - "lastModified": "2018-10-09T19:48:52.457", + "lastModified": "2024-11-21T02:09:49.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94544", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94544", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4256.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4256.json index 1a529024d9c..a0be9a9f9aa 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4256.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4256.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4256", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.670", - "lastModified": "2018-10-09T19:48:52.973", + "lastModified": "2024-11-21T02:09:50.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94549", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68589", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94549", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4257.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4257.json index d6afde306d3..c42b7ff6302 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4257.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4257.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4257", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.717", - "lastModified": "2018-10-09T19:48:53.533", + "lastModified": "2024-11-21T02:09:50.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.1 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -107,6 +106,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94541", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58739", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94541", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4258.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4258.json index 64f52160c95..b773484d19f 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4258.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4258.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4258", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.747", - "lastModified": "2022-07-18T18:43:03.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:50.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -356,6 +355,98 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94620", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4259.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4259.json index d2a7058317e..19aabd82ce2 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4259.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4259.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4259", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:01.273", - "lastModified": "2016-12-07T03:00:39.200", + "lastModified": "2024-11-21T02:09:50.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -88,6 +87,18 @@ { "url": "http://www.securitytracker.com/id/1031583", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4260.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4260.json index 1c20d5c6602..bdd72fa2b9b 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4260.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4260.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4260", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.810", - "lastModified": "2022-07-19T17:03:27.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:50.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -276,6 +275,98 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68573", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94621", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4261.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4261.json index 2beb7e035e5..8e628531500 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4261.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4261.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4261", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.857", - "lastModified": "2018-10-09T19:48:57.223", + "lastModified": "2024-11-21T02:09:50.917", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies only when VirtualBox is running on a Windows host operating system.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -459,6 +457,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94612", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94612", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies only when VirtualBox is running on a Windows host operating system.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4262.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4262.json index 50f8ea72761..9ad1d2a1884 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4262.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4262.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4262", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.907", - "lastModified": "2022-05-13T14:57:17.220", + "lastModified": "2024-11-21T02:09:51.077", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -124,6 +122,14 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" @@ -258,6 +264,166 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94595", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68599", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94595", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4263.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4263.json index 1d9282508ba..59489fe5146 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4263.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4263.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4263", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.953", - "lastModified": "2022-05-13T14:57:17.230", + "lastModified": "2024-11-21T02:09:51.283", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to Diffie-Hellman key agreement in client and server deployment of Java.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -144,6 +142,14 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" @@ -446,6 +452,334 @@ { "url": "https://www.ibm.com/support/docview.wss?uid=swg21680418", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60180", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60326", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60335", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60497", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60839", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60846", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61254", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61294", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61469", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61846", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62314", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681966", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683338", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683429", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683438", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685122", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685178", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688893", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691089", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096529", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21681644", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21683518", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ibm.com/support/docview.wss?uid=swg21680418", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to Diffie-Hellman key agreement in client and server deployment of Java.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4264.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4264.json index 16582359cf5..85b84c8696d 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4264.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4264.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4264", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:10.997", - "lastModified": "2022-05-13T14:57:17.240", + "lastModified": "2024-11-21T02:09:51.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ } ], "references": [ + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" @@ -153,6 +156,77 @@ { "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10083", "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60326", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10083", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4265.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4265.json index 310ca2d223c..d53f86b90ee 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4265.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4265.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4265", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:11.047", - "lastModified": "2022-05-13T14:57:17.250", + "lastModified": "2024-11-21T02:09:51.683", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +108,14 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" @@ -220,6 +226,138 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94597", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68632", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94597", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4266.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4266.json index 1242e8ce6fe..98c62796773 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4266.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4266.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4266", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:11.077", - "lastModified": "2022-05-13T14:57:17.153", + "lastModified": "2024-11-21T02:09:51.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,10 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://seclists.org/fulldisclosure/2014/Dec/23", "source": "secalert_us@oracle.com" @@ -201,6 +204,125 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94601", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68596", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2014:0902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94601", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4267.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4267.json index ed15f205b63..a9af5096b8e 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4267.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4267.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4267", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:11.123", - "lastModified": "2018-10-09T19:49:35.897", + "lastModified": "2024-11-21T02:09:52.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94547", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68597", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94547", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4268.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4268.json index db871f2ec3e..e4a743e010a 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4268.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4268.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4268", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:11.170", - "lastModified": "2022-05-13T14:57:17.160", + "lastModified": "2024-11-21T02:09:52.200", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -124,6 +122,14 @@ "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", "source": "secalert_us@oracle.com" @@ -226,6 +232,134 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94602", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852886808946&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=140852974709252&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94602", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html\n\n\"Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4269.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4269.json index eeeb6682def..c1bbcafcd0e 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4269.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4269.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4269", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:11.217", - "lastModified": "2018-10-09T19:49:39.707", + "lastModified": "2024-11-21T02:09:52.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -111,6 +110,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94566", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59289", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94566", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4270.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4270.json index 134e412e6dc..f495b1fb646 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4270.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4270.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4270", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:11.263", - "lastModified": "2018-10-09T19:49:40.363", + "lastModified": "2024-11-21T02:09:52.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -111,6 +110,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94565", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59289", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68600", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94565", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4271.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4271.json index 7bede6fdbd5..cc96ca7f4b4 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4271.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4271.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4271", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-07-17T11:17:11.297", - "lastModified": "2018-10-09T19:49:41.067", + "lastModified": "2024-11-21T02:09:52.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -111,6 +110,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94562", "source": "secalert_us@oracle.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94562", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4274.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4274.json index 47dbaf4e0da..da962f49e9f 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4274.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4274.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4274", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.307", - "lastModified": "2022-08-29T20:52:54.130", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:53.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 4.1, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 2.7, @@ -150,6 +149,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4275.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4275.json index 17dd0fb2176..3bb7e1c8662 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4275.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4275.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4275", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.353", - "lastModified": "2015-11-06T15:48:41.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:53.187", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4276.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4276.json index 8f4cb3574e9..1b36594730b 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4276.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4276.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4276", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.400", - "lastModified": "2015-11-06T15:48:59.503", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:53.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70561", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4277.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4277.json index 2b52936a713..667b0262073 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4277.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4277.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4277", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.447", - "lastModified": "2015-11-06T15:49:11.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:53.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70539", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4278.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4278.json index ec529387575..43e921b2bde 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4278.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4278.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4278", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.493", - "lastModified": "2015-11-05T16:23:51.113", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:53.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -111,6 +110,26 @@ { "url": "http://www.securitytracker.com/id/1031042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70475", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4279.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4279.json index 039cf59c815..da5d4fb1dd2 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4279.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4279.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4279", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:02.367", - "lastModified": "2016-06-24T15:38:33.780", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:53.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -83,6 +82,18 @@ { "url": "http://www.securitytracker.com/id/1031577", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031577", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4280.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4280.json index bd49f8db52e..9383453c979 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4280.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4280.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4280", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.540", - "lastModified": "2015-11-06T15:49:22.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:53.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70543", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4281.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4281.json index 7065b12e30f..2be8de1d949 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4281.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4281.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4281", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.587", - "lastModified": "2015-11-05T16:24:16.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:53.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,26 @@ { "url": "http://www.securitytracker.com/id/1031042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4282.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4282.json index f7e22d67d4e..cd97dea2740 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4282.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4282.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4282", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.637", - "lastModified": "2015-11-06T15:24:07.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:54.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70520", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4283.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4283.json index 74294ff4abc..269f193ce49 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4283.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4283.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4283", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.697", - "lastModified": "2015-11-06T15:49:32.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:54.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4284.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4284.json index dbbaaa6fc44..29ae736287f 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4284.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4284.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4284", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.743", - "lastModified": "2015-11-06T15:49:50.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:54.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70554", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4285.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4285.json index 434b916c47d..13121082702 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4285.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4285.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4285", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.777", - "lastModified": "2015-11-05T16:26:19.610", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:54.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4287.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4287.json index 55409235fa0..3b4134b8638 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4287.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4287.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4287", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.823", - "lastModified": "2022-08-26T16:14:56.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:54.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -165,6 +164,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70517", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4288.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4288.json index dcb9fcaca99..c38a488273a 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4288.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4288.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4288", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.870", - "lastModified": "2022-05-13T14:35:14.593", + "lastModified": "2024-11-21T02:09:54.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -116,6 +115,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", "source": "secalert_us@oracle.com" @@ -175,6 +178,94 @@ { "url": "http://www.securityfocus.com/bid/70470", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70470", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4289.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4289.json index b9926ae5b55..9d961e381a9 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4289.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4289.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4289", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.917", - "lastModified": "2016-05-18T18:16:09.810", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html, \"2014-October-20 - Removed 12.1.0.2 from the affected versions list for CVE-2014-6544 and CVE-2014-4289", + "lastModified": "2024-11-21T02:09:54.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:N", + "baseScore": 3.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -99,6 +97,19 @@ { "url": "http://www.securityfocus.com/bid/70541", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70541", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html, \"2014-October-20 - Removed 12.1.0.2 from the affected versions list for CVE-2014-6544 and CVE-2014-4289" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4290.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4290.json index 6d8e60fbb84..7df650b7806 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4290.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4290.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4290", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:06.977", - "lastModified": "2016-05-18T17:55:37.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:54.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70501", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70501", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4291.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4291.json index b69a21bd016..1b757aecb95 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4291.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4291.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4291", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.027", - "lastModified": "2016-05-11T18:12:59.423", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:55.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70500", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70500", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4292.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4292.json index 7cf2c511ab0..a546cd35716 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4292.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4292.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4292", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.073", - "lastModified": "2016-05-11T18:13:06.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:55.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70499", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70499", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4293.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4293.json index 178edd1106a..24ff94ff4fd 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4293.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4293.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4293", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.137", - "lastModified": "2016-05-11T18:13:22.550", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:55.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70490", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70490", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4294.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4294.json index 464f1bab664..44a5e6a2dfb 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4294.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4294.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4294", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.183", - "lastModified": "2015-11-05T16:25:32.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:55.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70508", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70508", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4295.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4295.json index 5e03d891006..9ff23998e00 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4295.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4295.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4295", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.227", - "lastModified": "2015-11-05T16:27:33.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:55.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70498", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70498", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4296.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4296.json index 782d9183e31..cc9efad41bd 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4296.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4296.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4296", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.260", - "lastModified": "2016-05-11T18:13:15.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:55.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70504", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70504", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4297.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4297.json index 2c96dd171c0..e582e559443 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4297.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4297.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4297", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.307", - "lastModified": "2016-05-11T18:12:49.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:55.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70502", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70502", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4298.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4298.json index 01fa46f309d..895af0c5b44 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4298.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4298.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4298", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.370", - "lastModified": "2015-11-05T16:29:22.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:55.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70524", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70524", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-42xx/CVE-2014-4299.json b/CVE-2014/CVE-2014-42xx/CVE-2014-4299.json index affe3e1add1..2a59259bf74 100644 --- a/CVE-2014/CVE-2014-42xx/CVE-2014-4299.json +++ b/CVE-2014/CVE-2014-42xx/CVE-2014-4299.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4299", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.400", - "lastModified": "2015-11-05T16:27:50.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:55.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70526", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70526", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4300.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4300.json index 7d8fd51e5ba..46a1a230025 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4300.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4300.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4300", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.463", - "lastModified": "2015-11-05T16:28:40.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:56.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70527", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70527", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4301.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4301.json index d44fade9058..ed8d7ee606c 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4301.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4301.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4301", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:13.307", - "lastModified": "2016-09-06T13:38:35.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:56.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -208,6 +207,37 @@ "Exploit", "Patch" ] + }, + { + "url": "http://secunia.com/advisories/59177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68047", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/Eugeny/ajenti/commit/d3fc5eb142ff16d55d158afb050af18d5ff09120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://www.netsparker.com/critical-xss-vulnerabilities-in-ajenti", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4302.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4302.json index 514b6949100..5d5ad98f03a 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4302.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4302.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4302", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:13.383", - "lastModified": "2014-06-18T18:53:24.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:56.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127050/HAM3D-Shop-Engine-CMS-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4303.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4303.json index d76dd31375c..856c8369dcb 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4303.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4303.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4303", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:13.507", - "lastModified": "2016-09-06T13:33:10.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:56.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -143,6 +142,38 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://secunia.com/advisories/58828", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://drupal.org/node/2269483", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://drupal.org/node/2284415", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4304.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4304.json index 95f8ac5ced2..9efdc9a33ac 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4304.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4304.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4304", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:13.557", - "lastModified": "2016-09-06T13:31:43.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:56.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/59002", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.netsparker.com/critical-xss-vulnerability-in-sql-buddy", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4305.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4305.json index 3f47d5912e3..b3537d0046d 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4305.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4305.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4305", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:13.617", - "lastModified": "2014-06-19T14:13:34.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:56.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,14 @@ { "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140528-0_NICE_Recording_eXpress_Multiple_critical_vulnerabilities_v10.txt", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/126858/NICE-Recording-eXpress-6.x-Root-Backdoor-XSS-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140528-0_NICE_Recording_eXpress_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4306.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4306.json index 096f819657c..2ee2dad2fdb 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4306.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4306.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4306", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:13.680", - "lastModified": "2014-06-19T14:17:10.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:56.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ { "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140606-0_WebTitan_Multiple_Vulnerabilities_v10.txt", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140606-0_WebTitan_Multiple_Vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4307.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4307.json index e1d8cf4a74e..f88b50d13ff 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4307.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4307.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4307", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:13.757", - "lastModified": "2014-06-19T14:18:22.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:57.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/126984/WebTitan-4.01-Build-68-SQL-Injection-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140606-0_WebTitan_Multiple_Vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4308.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4308.json index 12bfda83b79..122aef44464 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4308.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4308.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4308", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:13.820", - "lastModified": "2014-06-19T14:21:45.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:57.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/126858/NICE-Recording-eXpress-6.x-Root-Backdoor-XSS-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140528-0_NICE_Recording_eXpress_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4309.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4309.json index ba997e31085..821882fbe2f 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4309.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4309.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4309", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-18T14:55:13.883", - "lastModified": "2014-06-21T04:42:02.070", + "lastModified": "2024-11-21T02:09:57.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127044/Openfiler-NAS-SAN-Appliance-2.99-XSS-Traversal-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4310.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4310.json index 23df8b440c0..11971215042 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4310.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4310.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4310", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.493", - "lastModified": "2016-05-11T18:13:38.613", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:57.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70505", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70505", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4311.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4311.json index 9ad40c2bdb6..def879ebaac 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4311.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4311.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4311", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T02:55:10.993", - "lastModified": "2014-11-05T03:50:51.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:57.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -93,6 +92,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128511/Epicor-Password-Disclosure-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34864", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4312.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4312.json index 2e9782d67ce..7ae2d5a980e 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4312.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4312.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4312", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T14:55:07.977", - "lastModified": "2017-08-29T01:34:56.530", + "lastModified": "2024-11-21T02:09:57.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -132,6 +131,66 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96793", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/112464", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/112465", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/112466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/112467", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/112469", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/112470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/112471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128511/Epicor-Password-Disclosure-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34864", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70192", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96793", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4313.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4313.json index 606d156d8fd..dc87e3c7522 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4313.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4313.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4313", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T14:55:08.027", - "lastModified": "2017-08-29T01:34:56.577", + "lastModified": "2024-11-21T02:09:57.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96842", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128564/Epicor-Procurement-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/21", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70227", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96842", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4322.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4322.json index 9888a8169c2..1569e1b48f5 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4322.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4322.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4322", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T15:59:00.053", - "lastModified": "2020-08-14T18:25:22.550", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:58.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -81,6 +80,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.codeaurora.org/projects/security-advisories/memory-corruption-qseecom-driver-cve-2014-4322", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4323.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4323.json index 94041d029fb..f13e9b5f331 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4323.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4323.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4323", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T11:59:00.063", - "lastModified": "2020-08-14T18:20:44.343", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:58.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,13 @@ "tags": [ "Broken Link" ] + }, + { + "url": "https://www.codeaurora.org/projects/security-advisories/improper-input-validation-mdp-driver-when-processing-color-maps", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4325.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4325.json index eed01b75386..39f6fc81989 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4325.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4325.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4325", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T01:55:03.147", - "lastModified": "2014-08-28T01:35:49.083", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:58.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -78,6 +77,13 @@ "tags": [ "Patch" ] + }, + { + "url": "https://www.codeaurora.org/projects/security-advisories/fastboot-boot-command-bypasses-signature-verification-cve-2014-4325", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4326.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4326.json index cff22a2341a..ec6b0288b48 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4326.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4326.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4326", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-22T14:55:09.550", - "lastModified": "2019-06-17T15:48:25.623", + "lastModified": "2024-11-21T02:09:58.433", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -216,6 +215,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.elasticsearch.org/blog/logstash-1-4-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532841/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.elastic.co/community/security/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4329.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4329.json index 3e37de11d6d..21a48b8d287 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4329.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4329.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4329", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-19T10:50:05.380", - "lastModified": "2017-08-29T01:34:56.657", + "lastModified": "2024-11-21T02:09:58.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ { "url": "https://svn.ntop.org/bugzilla/show_bug.cgi?id=379", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127329/Ntop-NG-1.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.ntop.org/ndpi/released-ndpi-1-5-1-and-ntopng-1-2-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/66456", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://svn.ntop.org/bugzilla/show_bug.cgi?id=379", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4330.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4330.json index e72afd83471..c89fe5eeae2 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4330.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4330.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4330", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T16:55:06.543", - "lastModified": "2018-10-09T19:49:42.067", + "lastModified": "2024-11-21T02:09:58.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -164,6 +163,82 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0406.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/84", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/692", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/61441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533543/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2916-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://metacpan.org/pod/distribution/Data-Dumper/Changes", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.lsexperts.de/advisories/lse-2014-06-10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4331.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4331.json index 2eecce8291e..06eced87841 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4331.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4331.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4331", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-19T20:55:04.437", - "lastModified": "2018-10-09T19:49:43.693", + "lastModified": "2024-11-21T02:09:58.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127404/OctavoCMS-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.attrition.org/pipermail/vim/2014-July/002773.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532701/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68469", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4333.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4333.json index 8f21a1d8aa9..73c71fe9607 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4333.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4333.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4333", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-19T14:55:08.130", - "lastModified": "2018-10-09T19:49:44.050", + "lastModified": "2024-11-21T02:09:59.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -176,6 +175,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.boonex.com/forums/topic/Medium-Risk-Security-Vulnerability-in-Dolphin-7-1.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532468/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23216", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4334.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4334.json index 7c32cbfba13..5b7f66c1c67 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4334.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4334.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4334", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-19T14:55:08.537", - "lastModified": "2014-06-20T17:51:30.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:59.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -110,6 +109,34 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127133/Ubisoft-Rayman-Legends-1.2.103716-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33804", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68080", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5187.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4335.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4335.json index 6c6155c69a6..70161b07460 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4335.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4335.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4335", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-19T14:55:08.597", - "lastModified": "2014-06-20T17:54:09.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:59.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/68079", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127128/BarracudaDrive-6.7.2-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68079", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4336.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4336.json index e9a707c6072..8729ce6a4d9 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4336.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4336.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4336", "sourceIdentifier": "secalert@redhat.com", "published": "2014-06-22T21:55:03.457", - "lastModified": "2018-01-03T13:45:38.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:59.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 5.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -95,6 +94,29 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/04/25/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/19/12", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4337.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4337.json index d4ad61f2d5d..925d3efd9e2 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4337.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4337.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4337", "sourceIdentifier": "secalert@redhat.com", "published": "2014-06-22T21:55:03.520", - "lastModified": "2018-01-08T15:22:12.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:59.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,42 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/19/12", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1795.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68122", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4338.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4338.json index fb8f848e280..17c41e88e66 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4338.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4338.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4338", "sourceIdentifier": "secalert@redhat.com", "published": "2014-06-22T21:55:03.690", - "lastModified": "2018-01-08T15:22:19.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:59.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -117,6 +116,51 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/04/25/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/19/12", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1795.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.linuxfoundation.org/show_bug.cgi?id=1204", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4341.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4341.json index 4a0ea9c7f2a..b0c1bc33430 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4341.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4341.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4341", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-20T11:12:50.823", - "lastModified": "2021-02-02T19:00:48.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:09:59.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -316,6 +315,115 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0345.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59102", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60448", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-53.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:165", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68909", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030706", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94904", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4342.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4342.json index 71eb181565c..3503119ae73 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4342.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4342.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4342", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-20T11:12:50.870", - "lastModified": "2020-01-21T15:46:47.197", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:00.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -348,9 +347,101 @@ { "url": "https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73", "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0345.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59102", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/60082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:165", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68908", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030706", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94903", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ "Issue Tracking", + "Patch", "Third Party Advisory" ] } diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4343.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4343.json index dfc117c35b0..04e34aa1b6e 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4343.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4343.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4343", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-14T05:01:49.897", - "lastModified": "2020-01-21T15:46:47.197", + "lastModified": "2024-11-21T02:10:00.187", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -263,10 +261,101 @@ "url": "https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f", "source": "cve@mitre.org", "tags": [ + "Issue Tracking", "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0345.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-53.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/109390", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121876", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4344.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4344.json index aab8a6d6e57..bf8ac3568bc 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4344.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4344.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4344", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-14T05:01:49.943", - "lastModified": "2020-01-21T15:46:47.197", + "lastModified": "2024-11-21T02:10:00.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -263,8 +262,99 @@ "url": "https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc", "source": "cve@mitre.org", "tags": [ + "Issue Tracking", "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0345.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7970", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15561.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/109389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69160", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121877", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ "Issue Tracking", + "Patch", "Third Party Advisory" ] } diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4345.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4345.json index 6c89be8d738..580d23f6873 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4345.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4345.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4345", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-14T05:01:50.817", - "lastModified": "2020-01-21T15:46:47.197", + "lastModified": "2024-11-21T02:10:00.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -339,6 +338,129 @@ { "url": "https://github.com/krb5/krb5/pull/181", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0345.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1255.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136640.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137056.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1255.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59415", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61314", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61353", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-53.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/109908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69168", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/pull/181", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4346.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4346.json index f4a1780eebf..a4c4a374c45 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4346.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4346.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4346", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-16T14:19:03.997", - "lastModified": "2018-10-09T19:49:44.347", + "lastModified": "2024-11-21T02:10:00.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -149,6 +148,45 @@ { "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-2_Citrix_NetScaler_Multiple_Vulnerabilities_v10.txt", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/77", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX140863", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532802/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030573", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94493", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-2_Citrix_NetScaler_Multiple_Vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4347.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4347.json index 2ea94a17a5e..2e6146425cb 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4347.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4347.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4347", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-16T14:19:04.043", - "lastModified": "2018-10-09T19:49:45.333", + "lastModified": "2024-11-21T02:10:00.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -159,6 +158,45 @@ { "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-2_Citrix_NetScaler_Multiple_Vulnerabilities_v10.txt", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/77", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX140863", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532802/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68537", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030573", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-2_Citrix_NetScaler_Multiple_Vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4348.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4348.json index 10a15980d02..a27195d86f0 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4348.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4348.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4348", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-25T11:19:22.497", - "lastModified": "2015-09-02T17:06:24.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:01.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -114,6 +113,34 @@ "Exploit", "Patch" ] + }, + { + "url": "http://phpmyadmin.net/home_page/security/PMASA-2014-2.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68201", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/cb7c703c03f656debcea2a16468bd53660fc888e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/d18a2dd9faad7e0e96df799b59e16ef587afb838", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4349.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4349.json index ffc42b32cf7..ee4f0bdc582 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4349.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4349.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4349", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-25T11:19:22.573", - "lastModified": "2015-09-02T17:11:09.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:01.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -207,6 +206,42 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00045.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://phpmyadmin.net/home_page/security/PMASA-2014-3.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68205", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/d4f754c937f9e2c0beadff5b2e38215dde1d6a79", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/daa98d0c7ed24b529dc5df0d5905873acd0b00be", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4350.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4350.json index 3fadcc8ef00..0bcbc1e8dfd 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4350.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4350.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4350", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.467", - "lastModified": "2017-08-29T01:34:57.327", + "lastModified": "2024-11-21T02:10:01.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -129,6 +128,29 @@ { "url": "https://support.apple.com/kb/HT6493", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6493", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4351.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4351.json index a23c7af12bc..eb5b043d0b4 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4351.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4351.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4351", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:12.793", - "lastModified": "2017-08-29T01:34:57.390", + "lastModified": "2024-11-21T02:10:01.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031065", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6493", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4352.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4352.json index 96bfb788c1e..ec5292bf687 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4352.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4352.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4352", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:08.547", - "lastModified": "2017-08-29T01:34:57.453", + "lastModified": "2024-11-21T02:10:01.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96084", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69932", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96084", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4353.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4353.json index de588e0965a..054b5626c6a 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4353.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4353.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4353", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:08.593", - "lastModified": "2017-08-29T01:34:57.500", + "lastModified": "2024-11-21T02:10:01.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96095", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96095", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4354.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4354.json index c7617739e3d..0f5cd9ae143 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4354.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4354.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4354", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:08.627", - "lastModified": "2017-08-29T01:34:57.563", + "lastModified": "2024-11-21T02:10:01.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 5.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96089", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69943", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96089", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4356.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4356.json index a5fdd05c050..052895733fe 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4356.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4356.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4356", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:08.673", - "lastModified": "2017-08-29T01:34:57.623", + "lastModified": "2024-11-21T02:10:01.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96081", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96081", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4357.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4357.json index 58a26a00e25..2e3812e1fb1 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4357.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4357.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4357", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:08.720", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:02.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -195,6 +194,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96107", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69930", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96107", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4361.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4361.json index 1f19fcb113a..69d2004aa65 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4361.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4361.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4361", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:08.797", - "lastModified": "2017-08-29T01:34:57.750", + "lastModified": "2024-11-21T02:10:02.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96094", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69949", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96094", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4362.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4362.json index 514c0c364cc..0340ef0774b 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4362.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4362.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4362", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:08.843", - "lastModified": "2017-08-29T01:34:57.813", + "lastModified": "2024-11-21T02:10:03.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96104", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96104", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4363.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4363.json index e2bb132180b..242b740a7a8 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4363.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4363.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4363", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:08.877", - "lastModified": "2019-07-16T12:20:47.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:03.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -157,6 +156,66 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61306", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69909", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4364.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4364.json index 8cb660e5134..7f6e3da42f3 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4364.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4364.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4364", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:08.923", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:03.313", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.6, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.2, "impactScore": 4.0 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -228,6 +227,49 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69913", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96097", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4366.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4366.json index fad6be62b06..27b6df04725 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4366.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4366.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4366", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:08.970", - "lastModified": "2017-08-29T01:34:58.047", + "lastModified": "2024-11-21T02:10:03.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96098", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69914", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96098", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4367.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4367.json index 2dc905efcc3..4ac39e3519e 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4367.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4367.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4367", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.017", - "lastModified": "2017-08-29T01:34:58.107", + "lastModified": "2024-11-21T02:10:03.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96091", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69945", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96091", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4368.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4368.json index 92f94d6d660..fccc4233972 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4368.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4368.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4368", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.063", - "lastModified": "2017-08-29T01:34:58.157", + "lastModified": "2024-11-21T02:10:03.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96105", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69926", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96105", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4369.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4369.json index 986e8110937..aa78979ef6b 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4369.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4369.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4369", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.110", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:03.800", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -196,6 +194,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96106", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96106", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4371.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4371.json index 4dfefebd9ad..f81ae4920fe 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4371.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4371.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4371", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.140", - "lastModified": "2019-11-07T15:36:57.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:03.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -267,6 +266,94 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69919", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96100", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4372.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4372.json index a853be7ba92..2a13246b409 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4372.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4372.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4372", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.187", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:04.087", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -195,6 +194,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96082", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69923", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96082", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4373.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4373.json index 49e89574fb9..5172d1c9fd6 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4373.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4373.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4373", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.233", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:04.197", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,6 +22,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -31,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -46,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -245,6 +243,50 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4374.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4374.json index 0809688ee83..1d7a4fe2962 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4374.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4374.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4374", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.280", - "lastModified": "2017-08-29T01:34:58.467", + "lastModified": "2024-11-21T02:10:04.327", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -168,6 +166,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96077", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69905", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96077", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4375.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4375.json index 564bcc1f9f2..1a425690a6e 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4375.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4375.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4375", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.327", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:04.440", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,6 +22,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -31,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -46,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -245,6 +243,50 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96090", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4376.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4376.json index ed9b0399734..65fd34c10a1 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4376.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4376.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4376", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.497", - "lastModified": "2017-08-29T01:34:58.593", + "lastModified": "2024-11-21T02:10:04.560", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +118,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96051", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69906", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=31", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96051", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4377.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4377.json index 12950c5d24b..a209a2f4a02 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4377.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4377.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4377", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.377", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:04.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -219,6 +218,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96076", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69903", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96076", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4378.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4378.json index 9377696e8e8..4c00922cdc1 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4378.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4378.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4378", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.423", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:04.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -215,6 +214,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96079", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96079", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4379.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4379.json index 7556249a7ba..efe66d31a7f 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4379.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4379.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4379", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.470", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:04.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.1 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -218,6 +217,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96080", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69921", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4380.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4380.json index cc20829b698..e2c53e36fd8 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4380.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4380.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4380", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.517", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:05.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -233,6 +232,60 @@ { "url": "https://support.apple.com/kb/HT6535", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4381.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4381.json index 35cfe7abe79..e2047870cba 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4381.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4381.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4381", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.563", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:05.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -222,6 +221,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96083", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69931", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96083", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4383.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4383.json index c9c8f895983..97b18e73198 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4383.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4383.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4383", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.610", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:05.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -195,6 +194,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96088", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69941", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96088", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4384.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4384.json index dd8571b968b..20f615dc569 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4384.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4384.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4384", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.657", - "lastModified": "2017-08-29T01:34:59.140", + "lastModified": "2024-11-21T02:10:05.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96087", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69940", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96087", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4386.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4386.json index 049c5947ba1..40245d61baf 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4386.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4386.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4386", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.703", - "lastModified": "2017-08-29T01:34:59.203", + "lastModified": "2024-11-21T02:10:05.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96085", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96085", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4388.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4388.json index dae184d160d..19e13ae583e 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4388.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4388.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4388", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.733", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:05.713", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -251,6 +250,56 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4389.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4389.json index 4281c6cb9c6..c5448523553 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4389.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4389.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4389", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.780", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:05.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -229,6 +228,56 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96112", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96112", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4390.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4390.json index a913bb4b4ac..5e81795568a 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4390.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4390.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4390", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.547", - "lastModified": "2017-08-29T01:34:59.390", + "lastModified": "2024-11-21T02:10:05.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96052", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4391.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4391.json index d4abd05dfa6..6600944d2f1 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4391.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4391.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4391", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:12.840", - "lastModified": "2017-08-29T01:34:59.437", + "lastModified": "2024-11-21T02:10:06.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97644", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4393.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4393.json index 14f2ccb3671..d313c22f710 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4393.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4393.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4393", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.593", - "lastModified": "2017-08-29T01:34:59.483", + "lastModified": "2024-11-21T02:10:06.223", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96053", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96053", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4394.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4394.json index e0e424821d3..4db392823fc 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4394.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4394.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4394", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.640", - "lastModified": "2017-08-29T01:34:59.547", + "lastModified": "2024-11-21T02:10:06.330", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -119,6 +118,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96054", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=28", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96054", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4395.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4395.json index 34a8bb02cfe..426db7d23b8 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4395.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4395.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4395", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.687", - "lastModified": "2017-08-29T01:34:59.593", + "lastModified": "2024-11-21T02:10:06.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -119,6 +118,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96055", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=29", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96055", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4396.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4396.json index 566e190dfad..4a7100e6ecc 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4396.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4396.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4396", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.717", - "lastModified": "2017-08-29T01:34:59.657", + "lastModified": "2024-11-21T02:10:06.543", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -119,6 +118,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96056", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69892", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=30", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4397.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4397.json index 067b91474ed..73afc02ba2d 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4397.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4397.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4397", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.763", - "lastModified": "2017-08-29T01:34:59.703", + "lastModified": "2024-11-21T02:10:06.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -119,6 +118,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96057", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69893", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=30", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96057", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4398.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4398.json index 2ee7084aebc..f81f5246dc5 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4398.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4398.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4398", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.810", - "lastModified": "2017-08-29T01:34:59.750", + "lastModified": "2024-11-21T02:10:06.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -119,6 +118,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96058", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=32", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96058", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-43xx/CVE-2014-4399.json b/CVE-2014/CVE-2014-43xx/CVE-2014-4399.json index 2330d45ea1a..dd9c07f3208 100644 --- a/CVE-2014/CVE-2014-43xx/CVE-2014-4399.json +++ b/CVE-2014/CVE-2014-43xx/CVE-2014-4399.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4399", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.843", - "lastModified": "2017-08-29T01:34:59.813", + "lastModified": "2024-11-21T02:10:06.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -119,6 +118,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96059", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=30", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96059", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4400.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4400.json index 84e79dcfeca..89ce9d6d00f 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4400.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4400.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4400", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.890", - "lastModified": "2017-08-29T01:34:59.857", + "lastModified": "2024-11-21T02:10:06.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -119,6 +118,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96060", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=30", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96060", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4401.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4401.json index 661978dcf8d..29bf19313d7 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4401.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4401.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4401", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.937", - "lastModified": "2017-08-29T01:34:59.920", + "lastModified": "2024-11-21T02:10:07.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -119,6 +118,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96061", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=30", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96061", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4402.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4402.json index 70f86261eeb..4224976cc90 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4402.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4402.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4402", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:03.983", - "lastModified": "2017-08-29T01:34:59.967", + "lastModified": "2024-11-21T02:10:07.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -114,6 +113,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96063", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96063", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4403.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4403.json index 30ab7e9b07d..058141fda89 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4403.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4403.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4403", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:04.013", - "lastModified": "2017-08-29T01:35:00.030", + "lastModified": "2024-11-21T02:10:07.297", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96064", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96064", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4404.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4404.json index 5b414235159..6e338965c6f 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4404.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4404.json @@ -2,13 +2,8 @@ "id": "CVE-2014-4404", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.827", - "lastModified": "2024-07-24T16:04:19.063", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-02-10", - "cisaActionDue": "2022-08-10", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple OS X Heap-Based Buffer Overflow Vulnerability", + "lastModified": "2024-11-21T02:10:07.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-02-10", + "cisaActionDue": "2022-08-10", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Apple OS X Heap-Based Buffer Overflow Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -209,6 +208,98 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69947", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4405.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4405.json index 58a13ca5c61..65cce42a693 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4405.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4405.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4405", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.877", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:07.550", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -234,6 +232,61 @@ { "url": "https://support.apple.com/kb/HT6535", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69938", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4406.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4406.json index b860c9388e3..04425df530b 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4406.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4406.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4406", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:04.060", - "lastModified": "2017-09-16T01:29:00.687", + "lastModified": "2024-11-21T02:10:07.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 6.1, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -192,6 +191,44 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61307", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6448", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.cloudscan.me/2014/09/cve-2014-4406-apple-sa-2014-09-17-5-os.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69935", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030870", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6536", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4407.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4407.json index a82dab63bb3..fcf9f343073 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4407.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4407.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4407", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.923", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:07.797", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-665: Improper Initialization", "descriptions": [ { "lang": "en", @@ -24,6 +22,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -31,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.3, - "baseSeverity": "LOW" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 1.4 @@ -46,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -245,6 +243,50 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69912", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96078", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-665: Improper Initialization" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4408.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4408.json index fbb1ef40230..5398fd45500 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4408.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4408.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4408", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:09.970", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:07.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -222,6 +221,49 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69939", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4409.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4409.json index cedc096ff1b..c994d47647c 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4409.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4409.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4409", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.017", - "lastModified": "2017-08-29T01:35:00.453", + "lastModified": "2024-11-21T02:10:08.067", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -153,6 +152,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96074", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN45442753/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004316.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6440", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96074", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4410.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4410.json index c1b3d660180..10528f78100 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4410.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4410.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4410", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.063", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:08.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -230,6 +229,57 @@ { "url": "https://support.apple.com/kb/HT6537", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69881", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69966", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6537", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4411.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4411.json index 7618d723491..2614c7ab64b 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4411.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4411.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4411", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.110", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:08.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -230,6 +229,57 @@ { "url": "https://support.apple.com/kb/HT6537", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69881", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69970", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6537", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4412.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4412.json index 528a991dc31..2b9ca322aeb 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4412.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4412.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4412", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.157", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:08.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -234,6 +233,61 @@ { "url": "https://support.apple.com/kb/HT6537", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69881", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-41", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6537", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4413.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4413.json index 4254bfa3f7f..d3cd92171b5 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4413.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4413.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4413", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.203", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:08.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -230,6 +229,57 @@ { "url": "https://support.apple.com/kb/HT6537", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69881", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96033", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-41", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6537", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4414.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4414.json index 2be4555e732..d7e3f9e5caf 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4414.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4414.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4414", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.250", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:08.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -230,6 +229,57 @@ { "url": "https://support.apple.com/kb/HT6537", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69881", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-41", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6537", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4415.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4415.json index 41fa555b090..6b6872f4c94 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4415.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4415.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4415", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.297", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:08.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -230,6 +229,53 @@ { "url": "https://support.apple.com/kb/HT6537", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69881", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6537", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4416.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4416.json index 21842da6679..513dcdc7094 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4416.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4416.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4416", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:04.107", - "lastModified": "2017-08-29T01:35:01.187", + "lastModified": "2024-11-21T02:10:09.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -119,6 +118,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96062", "source": "product-security@apple.com" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=34", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96062", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4417.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4417.json index 5b006bb8d24..a7f35a9e974 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4417.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4417.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4417", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:12.870", - "lastModified": "2017-08-29T01:35:01.267", + "lastModified": "2024-11-21T02:10:09.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97625", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4418.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4418.json index e8ddc0fd34f..29be15d2c1b 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4418.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4418.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4418", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.343", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:09.237", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -228,6 +227,49 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69946", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4419.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4419.json index a4a1d4afdc6..585a0ca9960 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4419.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4419.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4419", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.407", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:09.373", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-665: Improper Initialization", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -228,6 +226,55 @@ { "url": "https://support.apple.com/kb/HT6535", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-665: Improper Initialization" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4420.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4420.json index 1d46eba8dcd..88967915db4 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4420.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4420.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4420", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.437", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:09.510", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-665: Improper Initialization", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -228,6 +226,55 @@ { "url": "https://support.apple.com/kb/HT6535", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69927", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-665: Improper Initialization" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4421.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4421.json index 511f0b45490..fc204556c1c 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4421.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4421.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4421", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.500", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:09.630", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-665: Improper Initialization", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -228,6 +226,55 @@ { "url": "https://support.apple.com/kb/HT6535", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-665: Improper Initialization" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4422.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4422.json index b9910e9dc85..8192d529e56 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4422.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4422.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4422", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.547", - "lastModified": "2019-03-08T16:06:31.107", + "lastModified": "2024-11-21T02:10:09.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.1, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.2, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -228,6 +227,49 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69911", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96096", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4423.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4423.json index 4e72982aed2..56efcf9f001 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4423.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4423.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4423", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-18T10:55:10.593", - "lastModified": "2017-08-29T01:35:01.657", + "lastModified": "2024-11-21T02:10:09.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -141,6 +140,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96099", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96099", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4424.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4424.json index 57105bc10b3..b7b6b908cbb 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4424.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4424.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4424", "sourceIdentifier": "product-security@apple.com", "published": "2014-09-19T10:55:04.153", - "lastModified": "2017-08-29T01:35:01.703", + "lastModified": "2024-11-21T02:10:10.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -174,6 +173,48 @@ { "url": "https://support.apple.com/kb/HT6536", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61307", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6448", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030869", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6536", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4425.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4425.json index d07015a5aa7..483d7e9d93f 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4425.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4425.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4425", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:12.933", - "lastModified": "2017-08-29T01:35:01.750", + "lastModified": "2024-11-21T02:10:10.113", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70630", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4426.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4426.json index c703ba959f0..6b23e475967 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4426.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4426.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4426", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.137", - "lastModified": "2017-08-29T01:35:02.047", + "lastModified": "2024-11-21T02:10:10.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -109,6 +108,43 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4427.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4427.json index 6c4fac2a302..6a988c08894 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4427.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4427.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4427", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.247", - "lastModified": "2017-08-29T01:35:02.157", + "lastModified": "2024-11-21T02:10:10.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4428.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4428.json index eb10da62525..48f19ae0d5d 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4428.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4428.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4428", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.277", - "lastModified": "2017-08-29T01:35:02.217", + "lastModified": "2024-11-21T02:10:10.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -119,6 +118,53 @@ { "url": "https://support.apple.com/kb/HT6542", "source": "product-security@apple.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61825", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61827", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533747", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97641", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT6541", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6542", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4430.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4430.json index 73cc3f0a0bf..1093623be74 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4430.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4430.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4430", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.307", - "lastModified": "2017-08-29T01:35:02.267", + "lastModified": "2024-11-21T02:10:10.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.7 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70628", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97639", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4431.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4431.json index 6d1d1f58f35..902d4c82f08 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4431.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4431.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4431", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.353", - "lastModified": "2017-08-29T01:35:02.313", + "lastModified": "2024-11-21T02:10:10.687", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97638", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4432.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4432.json index 928e33de16f..9eb3a905be6 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4432.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4432.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4432", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.387", - "lastModified": "2017-08-29T01:35:02.373", + "lastModified": "2024-11-21T02:10:10.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.7 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70632", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4433.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4433.json index 1963261a364..157d8a832fb 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4433.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4433.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4433", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.433", - "lastModified": "2017-08-29T01:35:02.420", + "lastModified": "2024-11-21T02:10:10.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70620", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97634", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4434.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4434.json index 29686fc3908..ed35a3ce2be 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4434.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4434.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4434", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.463", - "lastModified": "2017-08-29T01:35:02.483", + "lastModified": "2024-11-21T02:10:11.013", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70618", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4435.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4435.json index 643e7a46517..3f4605c5b21 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4435.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4435.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4435", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.497", - "lastModified": "2017-08-29T01:35:02.530", + "lastModified": "2024-11-21T02:10:11.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70638", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4436.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4436.json index 2a09f847301..5d62027f9dc 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4436.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4436.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4436", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.527", - "lastModified": "2017-08-29T01:35:02.593", + "lastModified": "2024-11-21T02:10:11.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4437.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4437.json index b581bd6614c..23972ec6e65 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4437.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4437.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4437", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.637", - "lastModified": "2017-08-29T01:35:02.657", + "lastModified": "2024-11-21T02:10:11.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70627", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97631", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4438.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4438.json index 73f733e77d2..cac595d08b1 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4438.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4438.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4438", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.667", - "lastModified": "2017-08-29T01:35:02.703", + "lastModified": "2024-11-21T02:10:11.450", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97630", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4439.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4439.json index fec63670a35..f01ab321d69 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4439.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4439.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4439", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.713", - "lastModified": "2017-08-29T01:35:02.767", + "lastModified": "2024-11-21T02:10:11.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4440.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4440.json index d44d35f2dd1..0349de608ac 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4440.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4440.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4440", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.760", - "lastModified": "2017-08-29T01:35:02.860", + "lastModified": "2024-11-21T02:10:11.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -110,6 +109,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70631", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97628", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4441.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4441.json index 1f4e178c24c..93943d2a657 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4441.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4441.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4441", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.793", - "lastModified": "2017-08-29T01:35:02.907", + "lastModified": "2024-11-21T02:10:11.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97627", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4442.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4442.json index ab54c412e6b..ad539bd2ece 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4442.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4442.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4442", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.840", - "lastModified": "2017-08-29T01:35:02.967", + "lastModified": "2024-11-21T02:10:11.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97632", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4443.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4443.json index df901033387..28f1e9c8eff 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4443.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4443.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4443", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.887", - "lastModified": "2017-08-29T01:35:03.017", + "lastModified": "2024-11-21T02:10:11.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70625", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4444.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4444.json index 21877c8ce2d..63928dd6942 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4444.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4444.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4444", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.917", - "lastModified": "2017-08-29T01:35:03.077", + "lastModified": "2024-11-21T02:10:12.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -91,6 +90,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4446.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4446.json index e1ab09d7f59..3bebba535c7 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4446.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4446.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4446", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.963", - "lastModified": "2017-08-29T01:35:03.123", + "lastModified": "2024-11-21T02:10:12.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -91,6 +90,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031071", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6536", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4447.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4447.json index e526a8006cb..6f49d2a5c2f 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4447.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4447.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4447", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-18T01:55:13.997", - "lastModified": "2017-08-29T01:35:03.170", + "lastModified": "2024-11-21T02:10:13.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -91,6 +90,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031071", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97646", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6536", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4448.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4448.json index 4f2e2785e51..c79616d7a8f 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4448.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4448.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4448", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-22T10:55:02.607", - "lastModified": "2017-08-29T01:35:03.233", + "lastModified": "2024-11-21T02:10:13.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533747", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70661", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97664", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4449.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4449.json index 2a13d438d53..420e19927ff 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4449.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4449.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4449", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-22T10:55:02.670", - "lastModified": "2017-08-29T01:35:03.297", + "lastModified": "2024-11-21T02:10:13.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61825", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533747", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4450.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4450.json index 4a886e58119..a9adecc0270 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4450.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4450.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4450", "sourceIdentifier": "product-security@apple.com", "published": "2014-10-22T10:55:02.717", - "lastModified": "2017-08-29T01:35:03.360", + "lastModified": "2024-11-21T02:10:13.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533747", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70660", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97666", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4451.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4451.json index 8cefa2bed19..5423902cf1c 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4451.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4451.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4451", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:00.123", - "lastModified": "2017-08-29T01:35:03.420", + "lastModified": "2024-11-21T02:10:13.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -121,6 +120,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6590", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4452.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4452.json index 764ec7417a2..3509a7db553 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4452.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4452.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4452", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:01.403", - "lastModified": "2019-07-16T12:22:18.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:13.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -251,6 +250,120 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62504", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031231", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98771", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/en-us/HT204418", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT204420", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT6590", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT6592", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4453.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4453.json index d232bbed895..ba10c4308ac 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4453.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4453.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4453", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:02.670", - "lastModified": "2017-08-29T01:35:03.577", + "lastModified": "2024-11-21T02:10:13.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -584,6 +583,62 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031230", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98782", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6590", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT6591", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4455.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4455.json index 5b9ee2815d5..bea2228d900 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4455.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4455.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4455", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:03.747", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:13.930", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -215,6 +213,83 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98773", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204420", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6590", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT6592", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4457.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4457.json index 20f9b251e3e..4b4c432b64d 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4457.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4457.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4457", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:04.903", - "lastModified": "2017-08-29T01:35:03.703", + "lastModified": "2024-11-21T02:10:14.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6590", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4458.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4458.json index 4e0486561dd..553ebda125a 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4458.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4458.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4458", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:05.733", - "lastModified": "2017-08-29T01:35:03.767", + "lastModified": "2024-11-21T02:10:14.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -531,6 +530,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031230", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98785", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6591", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4459.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4459.json index 7b1eb1db56a..f1c0d7e60f0 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4459.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4459.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4459", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:06.747", - "lastModified": "2019-07-16T12:22:39.063", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free\n\nPer an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\nPer an Apple Security Advisory Apple Safari before versions 8.0.1, 7.1.1 and 6.2.1 were also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration.", + "lastModified": "2024-11-21T02:10:14.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -265,6 +263,120 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62503", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71144", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031230", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98784", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/en-us/HT204419", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT6591", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free\n\nPer an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\nPer an Apple Security Advisory Apple Safari before versions 8.0.1, 7.1.1 and 6.2.1 were also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4460.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4460.json index 5a3d6505bcf..ccab1378244 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4460.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4460.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4460", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:07.810", - "lastModified": "2017-08-29T01:35:03.967", + "lastModified": "2024-11-21T02:10:14.440", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per an Apple Security Advisory Apple iOS before 8.3.1 was also vulnerable.\nPer an Apple Security Advisory Apple OS X before versions 10.8.5, 10.9.5, 10.10 and 10.10.1 were also vulnerable.\n", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -584,6 +582,57 @@ { "url": "https://support.apple.com/en-us/HT6591", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031230", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98783", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6591", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per an Apple Security Advisory Apple iOS before 8.3.1 was also vulnerable.\nPer an Apple Security Advisory Apple OS X before versions 10.8.5, 10.9.5, 10.10 and 10.10.1 were also vulnerable.\n" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4461.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4461.json index 18f4c10517f..abedf617c88 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4461.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4461.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4461", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:08.747", - "lastModified": "2019-03-08T16:06:31.810", + "lastModified": "2024-11-21T02:10:14.570", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per an Apple Security Advisory Apple OS X before versions 10.8.6, 10.9.6, 10.10.0 and 10.10.1 were also vulnerable.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -239,6 +237,66 @@ { "url": "https://support.apple.com/en-us/HT6592", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98774", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204420", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6590", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT6592", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per an Apple Security Advisory Apple OS X before versions 10.8.6, 10.9.6, 10.10.0 and 10.10.1 were also vulnerable." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4462.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4462.json index 4a87e22a3a3..5f01026e00b 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4462.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4462.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4462", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:09.687", - "lastModified": "2019-03-08T16:06:31.810", + "lastModified": "2024-11-21T02:10:14.687", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 5.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -194,6 +193,52 @@ { "url": "https://support.apple.com/en-us/HT6592", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62505", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98772", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6592", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4463.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4463.json index 1a5312cfb35..63a61846d2b 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4463.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4463.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4463", "sourceIdentifier": "product-security@apple.com", "published": "2014-11-18T11:59:10.733", - "lastModified": "2017-08-29T01:35:04.187", + "lastModified": "2024-11-21T02:10:14.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -121,6 +120,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71141", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98778", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT204418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/en-us/HT6590", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4465.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4465.json index 4352fb3a905..3c353d5c47e 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4465.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4465.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4465", "sourceIdentifier": "product-security@apple.com", "published": "2014-12-10T21:59:03.257", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration.", + "lastModified": "2024-11-21T02:10:14.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -157,6 +155,49 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4466.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4466.json index 270e4d0e35e..9513d4629d1 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4466.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4466.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4466", "sourceIdentifier": "product-security@apple.com", "published": "2014-12-10T21:59:04.227", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:15.050", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -227,6 +225,68 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4467.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4467.json index 49985f99abd..c7d4e065ee1 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4467.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4467.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4467", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:07.877", - "lastModified": "2015-02-02T15:05:55.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:15.177", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4468.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4468.json index 72b6a0065bf..31c278a02b5 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4468.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4468.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4468", "sourceIdentifier": "product-security@apple.com", "published": "2014-12-10T21:59:05.210", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:15.287", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -227,6 +225,68 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4469.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4469.json index 2799d470881..33e82dde4b2 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4469.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4469.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4469", "sourceIdentifier": "product-security@apple.com", "published": "2014-12-10T21:59:06.180", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:15.413", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -227,6 +225,68 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4470.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4470.json index a300996d003..5d2620f89df 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4470.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4470.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4470", "sourceIdentifier": "product-security@apple.com", "published": "2014-12-10T21:59:07.273", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:15.537", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -227,6 +225,68 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71462", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per an Apple Security Advisory Apple TV before 7.0.3 was also vulnerable.\nPer an Apple Security Advisory Apple iOS before 8.1.3 was also vulnerable.\n\nThese product additions are reflected in the vulnerable configuration." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4471.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4471.json index 58d50b08088..d15ba8aea24 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4471.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4471.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4471", "sourceIdentifier": "product-security@apple.com", "published": "2014-12-10T21:59:08.287", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:15.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -226,6 +225,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71438", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4472.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4472.json index eea73afe1a3..6f6b1188bdd 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4472.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4472.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4472", "sourceIdentifier": "product-security@apple.com", "published": "2014-12-10T21:59:09.447", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:15.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -226,6 +225,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4473.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4473.json index 6a32996f5a9..47ed7df7efe 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4473.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4473.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4473", "sourceIdentifier": "product-security@apple.com", "published": "2014-12-10T21:59:10.460", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:15.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -226,6 +225,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71444", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4474.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4474.json index f93d11a1f12..a50ab81d4fd 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4474.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4474.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4474", "sourceIdentifier": "product-security@apple.com", "published": "2014-12-10T21:59:11.397", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:16.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -226,6 +225,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71449", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4475.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4475.json index 141a02ddb97..f1dabd08bd0 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4475.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4475.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4475", "sourceIdentifier": "product-security@apple.com", "published": "2014-12-10T21:59:12.383", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:16.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -226,6 +225,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71451", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4476.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4476.json index eda18327cdd..2a77ceb9fdf 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4476.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4476.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4476", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:10.110", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:16.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -240,6 +239,71 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204243", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72329", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4477.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4477.json index f0067ed132a..7df639c2e8f 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4477.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4477.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4477", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:11.047", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:16.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -240,6 +239,71 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204243", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72331", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4479.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4479.json index a4967160320..3d98de23b39 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4479.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4479.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4479", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:12.030", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:16.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -240,6 +239,71 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204243", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72330", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4480.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4480.json index cf6ca2a7393..9e65e1cc14b 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4480.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4480.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4480", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:12.860", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:16.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -114,6 +113,42 @@ { "url": "http://www.securitytracker.com/id/1031652", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031652", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4481.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4481.json index 4722ea5b239..d7dd9e357ca 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4481.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4481.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4481", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:13.703", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:16.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -130,6 +129,52 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4483.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4483.json index d6a9087bf20..c6e63e5a9c7 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4483.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4483.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4483", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:14.593", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:16.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -130,6 +129,52 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4484.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4484.json index a7fbab33ad4..0c80b63dbf4 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4484.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4484.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4484", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:15.547", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:17.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,52 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4485.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4485.json index 88e0cea30d2..eef5eb4af36 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4485.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4485.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4485", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:16.500", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:17.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,52 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4486.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4486.json index f9378ba804e..1d7e17b1ca6 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4486.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4486.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4486", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:17.437", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", + "lastModified": "2024-11-21T02:10:17.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +125,49 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4487.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4487.json index f1f9ed0927f..0772644f6eb 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4487.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4487.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4487", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:18.377", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:17.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,52 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4488.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4488.json index 4b4a537d512..cef8f84c052 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4488.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4488.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4488", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:19.233", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:17.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,52 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4489.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4489.json index fb9baa61c95..d7ab0306d5d 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4489.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4489.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4489", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:20.093", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", + "lastModified": "2024-11-21T02:10:17.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -131,6 +129,53 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4491.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4491.json index 46d6355f379..d0f5e6b8af0 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4491.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4491.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4491", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:20.923", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:17.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -130,6 +129,52 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4492.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4492.json index 561d93d7a7e..0b41399f7aa 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4492.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4492.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4492", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:21.733", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:17.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -145,6 +144,67 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/134393/Mac-OS-X-Networkd-XPC-Type-Confusion-Sandbox-Escape.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35847", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/114862", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=92", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4493.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4493.json index 4a9bfefd300..1d6eefa3db4 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4493.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4493.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4493", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:22.517", - "lastModified": "2015-11-17T16:24:51.883", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:18.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ { "url": "http://www.securitytracker.com/id/1031652", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031652", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4494.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4494.json index 22d5874f60f..b03ba8235d3 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4494.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4494.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4494", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:23.453", - "lastModified": "2015-11-17T16:25:07.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:18.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "http://www.securitytracker.com/id/1031652", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031652", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4495.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4495.json index 4f50ce8962b..ce59f1799cb 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4495.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4495.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4495", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:24.437", - "lastModified": "2019-03-08T16:06:31.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:18.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,52 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4496.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4496.json index 03c07cbaece..29db566a8c2 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4496.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4496.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4496", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:25.297", - "lastModified": "2019-03-08T16:06:31.747", + "lastModified": "2024-11-21T02:10:18.447", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -135,6 +134,63 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031652", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204413", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4497.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4497.json index 7c9a19745eb..fed482b5011 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4497.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4497.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4497", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:26.250", - "lastModified": "2015-11-30T19:20:15.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:18.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4498.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4498.json index 9c63a3c725a..3e04b0149af 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4498.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4498.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4498", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:27.187", - "lastModified": "2015-10-09T20:47:05.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:18.683", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:N", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 4.7 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -94,6 +93,28 @@ { "url": "https://trmm.net/Thunderstrike", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trmm.net/Thunderstrike", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-44xx/CVE-2014-4499.json b/CVE-2014/CVE-2014-44xx/CVE-2014-4499.json index ef04838af5c..a5f7b67132b 100644 --- a/CVE-2014/CVE-2014-44xx/CVE-2014-4499.json +++ b/CVE-2014/CVE-2014-44xx/CVE-2014-4499.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4499", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:27.970", - "lastModified": "2015-11-30T19:20:29.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:18.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -90,6 +89,24 @@ { "url": "http://www.securitytracker.com/id/1031650", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4501.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4501.json index c4892282b16..c5ffe960045 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4501.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4501.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4501", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-23T14:55:06.070", - "lastModified": "2014-07-23T18:07:16.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:18.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -233,6 +232,40 @@ "tags": [ "Patch" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/118", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ckolivas/cgminer/commit/e1c5050734123973b99d181c45e74b2cbb00272e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/luke-jr/bfgminer/commit/c80ad8548251eb0e15329fc240c89070640c9d79", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/sgminer-dev/sgminer/commit/78cc408369bdbbd440196c93574098d1482efbce", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/sgminer-dev/sgminer/commit/b65574bef233474e915fdf18614aa211e31cc6c2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4502.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4502.json index 4a0903d4566..7ee34d64c12 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4502.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4502.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4502", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-23T14:55:06.117", - "lastModified": "2015-08-28T16:21:40.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:19.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -215,6 +214,42 @@ { "url": "https://github.com/sgminer-dev/sgminer/issues/258", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ckolivas/cgminer/commit/e1c5050734123973b99d181c45e74b2cbb00272e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/luke-jr/bfgminer/commit/ff7f30129f15f7a2213f8ced0cd65c9a331493d9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/sgminer-dev/sgminer/commit/bac5831b355f916e0696b7bbcccfc51c057b729a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/sgminer-dev/sgminer/issues/258", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4503.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4503.json index edb835e13cb..f6108d27397 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4503.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4503.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4503", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-23T14:55:06.180", - "lastModified": "2014-07-23T18:25:30.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:19.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -294,6 +293,18 @@ "Exploit", "Patch" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/sgminer-dev/sgminer/commit/910c36089940e81fb85c65b8e63dcd2fac71470c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4505.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4505.json index 18bb534038c..f4ed9578d4f 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4505.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4505.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4505", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-20T14:55:07.593", - "lastModified": "2014-07-17T05:07:35.073", + "lastModified": "2024-11-21T02:10:19.377", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -139,6 +138,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/59379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68106", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2286121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2288353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4506.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4506.json index 9348e5e44ba..e53b0fc7ff6 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4506.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4506.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4506", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-20T14:55:07.653", - "lastModified": "2016-05-18T18:37:58.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:19.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -121,6 +120,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/59367", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2288415", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2288417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2288429", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4507.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4507.json index 279c017aa9e..66d01e7e5b1 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4507.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4507.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4507", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-20T14:55:07.717", - "lastModified": "2014-06-23T15:05:57.227", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:19.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,13 @@ "tags": [ "Patch" ] + }, + { + "url": "http://projects.theforeman.org/issues/6086", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4508.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4508.json index f3e42738e16..6e19e33a528 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4508.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4508.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4508", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-23T11:21:20.687", - "lastModified": "2020-11-12T22:15:10.657", + "lastModified": "2024-11-21T02:10:19.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -174,6 +173,93 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://article.gmane.org/gmane.linux.kernel/1726110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/20/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/58964", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/20/10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2020/11/12/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68126", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4509.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4509.json index 3d66e6afe42..e4e6b774eba 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4509.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4509.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4509", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-21T15:55:05.417", - "lastModified": "2018-09-27T21:30:05.490", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html\n\n\"CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')\"", + "lastModified": "2024-11-21T02:10:19.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -87,6 +85,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://download.novell.com/Download?buildid=5XLmBl54_Rg~", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68139", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html\n\n\"CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4510.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4510.json index fdf0b547d19..4069161f360 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4510.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4510.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4510", "sourceIdentifier": "security@debian.org", "published": "2014-10-06T23:55:08.903", - "lastModified": "2014-10-08T01:37:52.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:20.113", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,36 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1111807", "source": "security@debian.org" + }, + { + "url": "http://anonscm.debian.org/cgit/apt-cacher-ng/apt-cacher-ng.git/diff/?id=6f08e6a3995d1bed4e837889a3945b6dc650f6ad", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/602", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/net-misc/apt-cacher-ng/files/apt-cacher-ng-0.7.26-CVE-2014-4510.patch?view=markup", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1111807", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4511.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4511.json index b5802c69164..1be491db218 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4511.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4511.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4511", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-22T14:55:09.770", - "lastModified": "2023-11-07T02:20:35.017", + "lastModified": "2024-11-21T02:10:20.227", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-77: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +125,46 @@ { "url": "https://groups.google.com/forum/#%21topic/gitlist/Hw_KdZfA4js", "source": "cve@mitre.org" + }, + { + "url": "http://hatriot.github.io/blog/2014/06/29/gitlist-rce/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127281/Gitlist-0.4.0-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127364/Gitlist-Unauthenticated-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33990", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://groups.google.com/forum/#%21topic/gitlist/Hw_KdZfA4js", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-77: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4513.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4513.json index e9426d987fa..9649284885f 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4513.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4513.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4513", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.017", - "lastModified": "2014-07-01T18:34:48.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:20.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,14 @@ "Exploit", "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-activehelper-livehelp-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4514.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4514.json index e9fd48c38dc..7576d1e607e 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4514.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4514.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4514", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:06.140", - "lastModified": "2015-01-24T01:36:50.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:20.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-alipay-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/847094", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4515.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4515.json index 6faa6151fac..ff94c928a7c 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4515.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4515.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4515", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.067", - "lastModified": "2015-08-28T16:21:59.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:20.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-anyfont-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68314", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4516.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4516.json index 1bb2faca654..932678094c3 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4516.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4516.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4516", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.113", - "lastModified": "2014-07-02T13:24:27.710", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:20.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-bic-media-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4517.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4517.json index 576827ffeb2..d9f404791af 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4517.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4517.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4517", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:06.187", - "lastModified": "2015-01-07T13:55:28.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:20.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-cbi-referral-manager-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4518.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4518.json index 29b907d73d2..7f59b8d27ae 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4518.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4518.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4518", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.160", - "lastModified": "2014-07-02T13:32:25.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:21.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-contactme-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4520.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4520.json index 2d6f5053548..4e75a1daa48 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4520.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4520.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4520", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.300", - "lastModified": "2015-08-28T16:22:17.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:21.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ "Exploit", "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-dmca-watermarker-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=904684%40dmca-watermarker&old=549072%40dmca-watermarker", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4521.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4521.json index c6cdaa05b75..943baa8ce2c 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4521.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4521.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4521", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.347", - "lastModified": "2014-07-02T13:59:45.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:21.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -284,6 +283,18 @@ { "url": "http://wordpress.org/plugins/dsidxpress/changelog", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-dsidxpress-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://wordpress.org/plugins/dsidxpress/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4522.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4522.json index 64f42a770d7..de602b38397 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4522.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4522.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4522", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:08.143", - "lastModified": "2014-07-11T17:55:07.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:21.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-dssearchagent-wordpress-edition-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4524.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4524.json index 5f8041a2a34..9992d1bb568 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4524.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4524.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4524", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:08.300", - "lastModified": "2014-07-11T17:55:29.043", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:21.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=842687%40easy-post-types&old=806912%40easy-post-types&sfp_email=&sfph_mail=", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-easy-post-types-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/easy-post-types/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=842687%40easy-post-types&old=806912%40easy-post-types&sfp_email=&sfph_mail=", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4526.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4526.json index 6c6ea018181..1f1b6dbc2bd 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4526.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4526.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4526", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:08.550", - "lastModified": "2014-07-11T17:54:15.083", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:22.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-efence-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4527.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4527.json index 192b4a09dea..188443f909a 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4527.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4527.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4527", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:08.580", - "lastModified": "2014-07-11T17:59:04.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:22.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=843064%40envialosimple-email-marketing-y-newsletters-gratis&old=839677%40envialosimple-email-marketing-y-newsletters-gratis&sfp_email=&sfph_mail=", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-envialosimple-email-marketing-y-newsletters-gratis-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=843064%40envialosimple-email-marketing-y-newsletters-gratis&old=839677%40envialosimple-email-marketing-y-newsletters-gratis&sfp_email=&sfph_mail=", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4528.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4528.json index 98ffc295aa5..be266419caf 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4528.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4528.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4528", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.393", - "lastModified": "2014-07-02T14:59:55.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:22.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-fbpromotions-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4529.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4529.json index cead22f45a4..c14e5bcb125 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4529.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4529.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4529", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:08.627", - "lastModified": "2014-07-11T17:53:42.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:22.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-flash-photo-gallery-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4531.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4531.json index c7ba4e6241c..00b8f630012 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4531.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4531.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4531", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:08.677", - "lastModified": "2014-07-11T17:57:42.150", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:22.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-game-tabs-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4532.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4532.json index 50445f96451..5663626fd63 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4532.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4532.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4532", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:08.753", - "lastModified": "2014-07-11T17:58:40.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:23.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-garagesale-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/garagesale/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4533.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4533.json index e06eb77aaf2..6dcec5aa998 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4533.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4533.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4533", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.440", - "lastModified": "2014-07-02T15:04:35.790", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:23.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-geo-redirector-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4534.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4534.json index 53f4e7520af..44772a63636 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4534.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4534.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4534", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.063", - "lastModified": "2014-07-09T18:39:57.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:23.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-html5-video-player-with-playlist-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4537.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4537.json index 72fb5738920..c31c8ad61d5 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4537.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4537.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4537", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:08.830", - "lastModified": "2014-07-11T17:37:13.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:23.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-keyword-strategy-internal-links-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4538.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4538.json index 5c47e912f03..b0bfa03cb9a 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4538.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4538.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4538", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.487", - "lastModified": "2014-07-02T15:18:17.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:23.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-malware-finder-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4540.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4540.json index 7d0d489467c..f6087a5a02c 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4540.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4540.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4540", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:08.877", - "lastModified": "2014-07-11T17:35:52.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:24.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-oleggo-livestream-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4541.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4541.json index c9647e7a9ba..f052095c858 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4541.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4541.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4541", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:08.927", - "lastModified": "2014-07-11T17:35:34.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:24.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-omfg-mobile-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4542.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4542.json index 090edbf715f..b97e6300fa2 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4542.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4542.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4542", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.003", - "lastModified": "2014-07-11T17:33:08.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:24.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-ooorl-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4543.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4543.json index bdcc60341d6..0b3e6c09db7 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4543.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4543.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4543", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.080", - "lastModified": "2015-08-28T16:25:55.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:24.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-pay-per-media-player-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68447", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4545.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4545.json index 7eb0a0bc2bd..44751061eae 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4545.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4545.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4545", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.533", - "lastModified": "2015-08-28T16:26:09.210", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:24.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-proquoter-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68318", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4546.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4546.json index 3a7c62fe37f..58c00db0673 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4546.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4546.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4546", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.110", - "lastModified": "2014-07-09T18:42:00.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:24.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-rezgo-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4547.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4547.json index 13e02d27260..570864ca462 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4547.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4547.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4547", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.143", - "lastModified": "2014-07-11T17:31:09.463", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:25.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=848542%40rezgo-online-booking&old=748531%40rezgo-online-booking&sfp_email=&sfph_mail=#file500", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-rezgo-online-booking-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=848542%40rezgo-online-booking&old=748531%40rezgo-online-booking&sfp_email=&sfph_mail=#file500", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4549.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4549.json index 157abeabfb6..7d728989e78 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4549.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4549.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4549", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.187", - "lastModified": "2015-08-28T16:26:23.333", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:25.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,31 @@ { "url": "https://github.com/wp-plugins/sagepay-direct-for-woocommerce-payment-gateway/commit/9c6cf939c6c25377c285439b92ef2bb5ebda9db6", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-sagepay-direct-for-woocommerce-payment-gateway-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/sagepay-direct-for-woocommerce-payment-gateway/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/65355", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/wp-plugins/sagepay-direct-for-woocommerce-payment-gateway/commit/9c6cf939c6c25377c285439b92ef2bb5ebda9db6", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4551.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4551.json index af88975224c..a57fa095628 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4551.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4551.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4551", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.207", - "lastModified": "2014-07-10T15:39:28.753", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:25.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-social-connect-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4552.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4552.json index aa8a5892bab..04457a310e1 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4552.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4552.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4552", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.283", - "lastModified": "2014-07-10T15:39:09.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:25.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-spotlightyour-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4554.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4554.json index fdd1b52cf54..4b7a46716dd 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4554.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4554.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4554", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.237", - "lastModified": "2015-08-28T16:26:39.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:26.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "http://www.securityfocus.com/bid/65141", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/ss-downloads/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/65141", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4555.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4555.json index 1ea380dbb0e..d89c92a2697 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4555.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4555.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4555", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.297", - "lastModified": "2014-07-09T18:42:52.300", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:26.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-style-it-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4556.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4556.json index 97ad98946bc..b2484f261a8 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4556.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4556.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4556", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.580", - "lastModified": "2014-07-02T16:20:04.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:26.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-swipe-hq-checkout-for-eshop-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4557.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4557.json index 9aefbaf37e3..f9e91c1b144 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4557.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4557.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4557", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.363", - "lastModified": "2014-07-10T14:52:20.933", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:26.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-swipe-hq-checkout-for-jigoshop-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4560.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4560.json index 61bceaad986..ab84b713134 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4560.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4560.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4560", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.410", - "lastModified": "2014-07-10T14:51:26.993", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:26.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-toolpage-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4563.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4563.json index f856bfd6dc7..51c05c44971 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4563.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4563.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4563", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.327", - "lastModified": "2014-07-09T01:45:40.870", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:27.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-url-cloak-encrypt-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4564.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4564.json index 0736225160b..763208e44b4 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4564.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4564.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4564", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.627", - "lastModified": "2014-07-02T16:23:25.503", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:27.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-validated-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4565.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4565.json index 38132979150..c70b06a46d5 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4565.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4565.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4565", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.377", - "lastModified": "2014-07-09T16:04:57.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:27.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-verification-code-for-comments-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4566.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4566.json index b056f3a3ca1..c595fc62e38 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4566.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4566.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4566", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.457", - "lastModified": "2014-07-10T14:50:38.490", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:27.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-verweise-wordpress-twitter-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4568.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4568.json index 5e9edf8e6c1..900d9590565 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4568.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4568.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4568", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.503", - "lastModified": "2014-07-10T14:50:18.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:27.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=839990%40video-posts-webcam-recorder&old=686450%40video-posts-webcam-recorder&sfp_email=&sfph_mail=", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-video-posts-webcam-recorder-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=839990%40video-posts-webcam-recorder&old=686450%40video-posts-webcam-recorder&sfp_email=&sfph_mail=", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4569.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4569.json index a2f49a7aa6f..0c32a5e7ba2 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4569.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4569.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4569", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.673", - "lastModified": "2015-08-28T16:26:54.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:27.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -131,6 +130,25 @@ "Exploit", "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-videowhisper-live-streaming-integration-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68321", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=833654%40videowhisper-live-streaming-integration&old=833649%40videowhisper-live-streaming-integration&sfp_email=&sfph_mail=", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4570.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4570.json index 1abd5cc418f..3a97f48e448 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4570.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4570.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4570", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.567", - "lastModified": "2015-08-28T16:34:17.277", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:28.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=839980%40videowhisper-video-presentation&old=600781%40videowhisper-video-presentation&sfp_email=&sfph_mail=#file4", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-videowhisper-video-presentation-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69511", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=839980%40videowhisper-video-presentation&old=600781%40videowhisper-video-presentation&sfp_email=&sfph_mail=#file4", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4571.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4571.json index ef88d4ec2b3..ac32b8c66a0 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4571.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4571.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4571", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.423", - "lastModified": "2015-08-28T16:34:31.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:28.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-vn-calendar-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68359", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4572.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4572.json index 80e364ea776..7f82b65eb44 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4572.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4572.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4572", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.613", - "lastModified": "2014-07-10T15:12:01.677", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:28.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-votecount-for-balatarin-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4573.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4573.json index 72bf73bffed..668c5cdb27d 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4573.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4573.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4573", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.660", - "lastModified": "2014-07-10T15:08:32.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:28.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-walk-score-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4574.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4574.json index 44e739ce2d9..a378db390f5 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4574.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4574.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4574", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.707", - "lastModified": "2014-07-11T17:53:19.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:28.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=844373%40webengage&old=788585%40webengage&sfp_email=&sfph_mail=", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-webengage-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/webengage/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=844373%40webengage&old=788585%40webengage&sfp_email=&sfph_mail=", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4575.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4575.json index 5645268abce..e4e5789ebb5 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4575.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4575.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4575", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.720", - "lastModified": "2014-07-02T16:54:50.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:28.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wikipop-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4576.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4576.json index c0d47e82046..e19861ed5e6 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4576.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4576.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4576", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.753", - "lastModified": "2014-07-11T17:37:50.693", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:28.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wordpress-social-login-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4577.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4577.json index a0fb3017e8d..684781c14c7 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4577.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4577.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4577", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:06.313", - "lastModified": "2014-11-06T12:38:34.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:29.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-amasin-the-amazon-affiliate-shop-local-file-inclusion", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://plugins.svn.wordpress.org/wp-amasin-the-amazon-affiliate-shop/trunk/readme.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4578.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4578.json index 51233877047..4ff33cdcaf6 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4578.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4578.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4578", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.800", - "lastModified": "2014-07-09T19:00:12.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:29.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-app-maker-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4579.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4579.json index cd6fe3d8e6e..556eaa1603e 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4579.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4579.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4579", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.847", - "lastModified": "2014-07-10T18:42:44.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:29.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-appointments-schedules-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4580.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4580.json index 0c41d19762c..82ebe96b42f 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4580.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4580.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4580", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.893", - "lastModified": "2014-07-09T19:00:36.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:29.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-blipbot-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4581.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4581.json index de0ee3907fb..50156f2a384 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4581.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4581.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4581", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.470", - "lastModified": "2014-07-10T14:51:05.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:29.623", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wpcb-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4582.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4582.json index c798d93c63d..94e8209dbed 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4582.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4582.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4582", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:09.957", - "lastModified": "2014-07-09T18:55:53.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:29.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-consultant-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4583.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4583.json index 3eca215e16c..fe966966930 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4583.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4583.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4583", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.767", - "lastModified": "2014-07-02T16:59:26.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:29.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-contact-sidebar-widget-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4584.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4584.json index da81d0edecc..0c0c08a0c62 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4584.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4584.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4584", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.817", - "lastModified": "2014-07-02T17:09:19.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:30.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-easybooking-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4585.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4585.json index b6c8fef705e..66de5faac19 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4585.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4585.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4585", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.863", - "lastModified": "2014-07-02T17:12:40.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:30.177", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-facethumb-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4586.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4586.json index 1a793f42f24..bc3bdddbc5f 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4586.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4586.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4586", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-27T22:55:10.220", - "lastModified": "2014-10-31T00:41:58.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:30.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4587.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4587.json index a97230188e8..1c6502d1d06 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4587.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4587.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4587", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:10.003", - "lastModified": "2015-08-28T16:34:44.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:30.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-guestmap-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68403", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4588.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4588.json index 1398aa9d496..8bdd038cd4f 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4588.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4588.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4588", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:10.050", - "lastModified": "2014-07-10T18:11:54.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:30.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wphotfiles-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4589.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4589.json index 4b2d2062526..a41129dc6a4 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4589.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4589.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4589", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:10.097", - "lastModified": "2017-08-29T01:35:04.267", + "lastModified": "2024-11-21T02:10:30.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94398", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-media-player-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94398", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4590.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4590.json index 5912d45aa7c..7daa2408b1c 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4590.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4590.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4590", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:10.160", - "lastModified": "2014-07-09T18:59:37.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:30.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-microblogs-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4591.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4591.json index 3df438c42c6..665bff77dfd 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4591.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4591.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4591", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.530", - "lastModified": "2014-07-11T17:28:43.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:30.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-picasa-image-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4593.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4593.json index 196c0fcb6a6..0e86fd3404c 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4593.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4593.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4593", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:10.207", - "lastModified": "2014-07-10T17:54:16.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:31.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wppm-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4594.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4594.json index b541b6ec09b..4e642269f1e 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4594.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4594.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4594", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:10.253", - "lastModified": "2015-08-28T16:34:58.413", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:31.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-responsive-preview-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/wp-responsive-preview/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68408", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4595.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4595.json index 91f45ae2b07..9a5dab820a9 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4595.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4595.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4595", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:10.300", - "lastModified": "2014-07-09T18:53:22.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:31.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-restful-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4596.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4596.json index 022841e700a..ca219f9c3ca 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4596.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4596.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4596", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:10.347", - "lastModified": "2015-08-28T16:35:14.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:31.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wpsnapapp-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4597.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4597.json index 3c56deeceec..fe2862e2dee 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4597.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4597.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4597", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.657", - "lastModified": "2014-07-11T17:33:34.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:31.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-social-invitations-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=848497%40wp-social-invitations&old=829444%40wp-social-invitations&sfp_email=&sfph_mail=#file239", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4598.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4598.json index 39b83c1c044..502ae9df088 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4598.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4598.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4598", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:10.410", - "lastModified": "2015-09-02T17:12:35.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:31.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ { "url": "https://plugins.trac.wordpress.org/changeset/846043", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-tmkm-amazon-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/846043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-45xx/CVE-2014-4599.json b/CVE-2014/CVE-2014-45xx/CVE-2014-4599.json index 2d50e030122..b0464a604dd 100644 --- a/CVE-2014/CVE-2014-45xx/CVE-2014-4599.json +++ b/CVE-2014/CVE-2014-45xx/CVE-2014-4599.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4599", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:10.457", - "lastModified": "2014-07-09T18:51:56.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:32.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-ttisbdir-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4600.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4600.json index 72ec6381ada..f9bb22658fa 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4600.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4600.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4600", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:11.003", - "lastModified": "2014-07-09T18:51:28.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:32.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,17 @@ { "url": "http://plugins.svn.wordpress.org/wp-ultimate-email-marketer/trunk/Readme.txt", "source": "cve@mitre.org" + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-ultimate-email-marketer-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://plugins.svn.wordpress.org/wp-ultimate-email-marketer/trunk/Readme.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4601.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4601.json index ac7d3169ee0..44ed0190eb7 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4601.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4601.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4601", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:11.050", - "lastModified": "2014-07-10T17:53:37.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:32.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wu-rating-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4602.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4602.json index 558cba0372e..7c12cc6f66f 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4602.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4602.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4602", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-01T14:55:05.910", - "lastModified": "2014-07-02T17:40:45.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:32.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-xen-carousel-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4603.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4603.json index 1af8c6006e5..7a645e4ae22 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4603.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4603.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4603", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:11.127", - "lastModified": "2015-09-02T17:15:48.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:32.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-yahoo-updates-for-wordpress-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4604.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4604.json index 77020a80744..7a092652d5f 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4604.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4604.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4604", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:11.190", - "lastModified": "2014-07-09T18:49:46.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:32.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-your-text-manager-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4605.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4605.json index 8dbde4f9e1c..b036444a7cd 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4605.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4605.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4605", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T18:55:11.253", - "lastModified": "2014-07-09T18:48:18.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:32.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-zdstats-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4606.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4606.json index 0cab800fc9b..bfb65d90665 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4606.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4606.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4606", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.703", - "lastModified": "2014-07-09T18:45:46.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:33.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-zeenshare-a3-cross-site-scripting-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4608.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4608.json index 95771275525..d000221a37b 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4608.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4608.json @@ -2,7 +2,7 @@ "id": "CVE-2014-4608", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T04:22:15.310", - "lastModified": "2024-08-06T12:15:20.573", + "lastModified": "2024-11-21T02:10:33.310", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -293,6 +293,165 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60174", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oberhumer.com/opensource/lzo/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/26/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68214", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2416-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2417-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2418-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2419-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2420-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2421-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113899", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/206a81c18401c0cde6e579164f752c4b147324ce", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://www.securitymouse.com/lms-2014-06-16-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4611.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4611.json index f4bc2e9de82..520a678f649 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4611.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4611.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4611", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T04:22:15.623", - "lastModified": "2023-11-07T02:20:35.810", + "lastModified": "2024-11-21T02:10:33.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -251,6 +250,185 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206204a1162b995e2185275167b22468c00d6b36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59567", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59770", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://twitter.com/djrbliss/statuses/484931749013495809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://twitter.com/djrbliss/statuses/485042901399789568", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/26/24", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030491", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112436", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://code.google.com/p/lz4/issues/detail?id=52", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://code.google.com/p/lz4/source/detail?r=118", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://lists.apache.org/thread.html/r0038b5836e3bc91af3ff93721c0fc55d6543afab8cec47df7361fa0e%40%3Ccommon-dev.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r0addc410fdd680330054deb526323edb29e869e8d1097593f538e208%40%3Ccommon-issues.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r229456b1fa718e329232bd7ceca4bd3e81ac55f2ec4db7314f1d7fcb%40%3Ccommon-commits.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r31eb601a8415525fa4a77b2f624c09be3550599898468ab96d508f90%40%3Ccommon-issues.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r35b9f26c8ad91094d37bea0256012aeb065e32ff73dda5f934fefeb3%40%3Ccommon-issues.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r5c9b4826bbd8933e4688db62f6ed9008cabb8f26bcea84d4e309caf7%40%3Ccommon-issues.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r62f398f40f522cf59cfd89428835d4ca633a9764d82e4b7a12c37add%40%3Ccommon-issues.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r6794c8ff8f339d95a80415b0afbe71d5eda1b97bdaca19bec78d0f8f%40%3Ccommon-commits.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r6c998e1a47c1c3fba61a80d0dcc4b39c7fc452400c7051f685b76c0b%40%3Ccommon-issues.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r8e0111cd64a455b0a33ab12a50fba724a0218f283c759f16da8864c2%40%3Ccommon-issues.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/ra72a62803eeabb6a8dc65032ca81b13ab75c271e4dff2df27c2915bb%40%3Ccommon-issues.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rb301598bf24ecb6f4ce405c2a2ae23905fc4dce64277c020fc3883e5%40%3Ccommon-issues.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rf4cb13d6ee891dfe2307389c8c6594a0cb10d9efb72be8bd2f97cb76%40%3Ccommon-issues.hadoop.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.securitymouse.com/lms-2014-06-16-5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://www.securitymouse.com/lms-2014-06-16-6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4614.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4614.json index 5f9983d082e..1335dc429f2 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4614.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4614.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4614", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T20:55:06.877", - "lastModified": "2014-07-09T18:37:55.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:34.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -407,6 +406,21 @@ { "url": "http://seclists.org/oss-sec/2014/q2/623", "source": "cve@mitre.org" + }, + { + "url": "http://piwigo.org/bugs/view.php?id=0003055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://piwigo.org/releases/2.6.2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/623", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4615.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4615.json index 190e3ee24f9..f89f0c208c7 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4615.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4615.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4615", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-19T18:55:02.873", - "lastModified": "2017-01-07T03:00:21.867", + "lastModified": "2024-11-21T02:10:34.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -243,6 +242,42 @@ { "url": "http://www.ubuntu.com/usn/USN-2311-1", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1050.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60736", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60766", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/23/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/24/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/25/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68149", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2311-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4617.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4617.json index 791986f3996..25af9d78379 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4617.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4617.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4617", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-25T11:19:22.637", - "lastModified": "2023-11-07T02:20:36.077", + "lastModified": "2024-11-21T02:10:34.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -483,6 +482,72 @@ { "url": "http://www.ubuntu.com/usn/USN-2258-1", "source": "cve@mitre.org" + }, + { + "url": "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=014b2103fcb12f261135e3954f26e9e07b39e342", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59213", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59351", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59534", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2967", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2968", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2258-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4618.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4618.json index f43e51a13a7..ff63e004273 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4618.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4618.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4618", "sourceIdentifier": "security_alert@emc.com", "published": "2014-08-20T11:17:14.530", - "lastModified": "2017-08-29T01:35:04.343", + "lastModified": "2024-11-21T02:10:35.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -142,6 +141,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95368", "source": "security_alert@emc.com" + }, + { + "url": "http://secunia.com/advisories/60571", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533162/30/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69273", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95368", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4619.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4619.json index 5e740c8dc51..6bf31b9e7b0 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4619.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4619.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4619", "sourceIdentifier": "security_alert@emc.com", "published": "2014-08-28T01:55:03.467", - "lastModified": "2017-08-29T01:35:04.407", + "lastModified": "2024-11-21T02:10:35.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -115,6 +114,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95483", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-08/0133.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128005/RSA-Identity-Management-And-Governance-Authentication-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60281", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69411", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030759", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95483", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4620.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4620.json index 75ea88893bd..2b709a7628d 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4620.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4620.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4620", "sourceIdentifier": "security_alert@emc.com", "published": "2014-10-25T10:55:06.023", - "lastModified": "2017-08-29T01:35:04.467", + "lastModified": "2024-11-21T02:10:35.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -115,6 +114,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97756", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0145.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128841/EMC-NetWorker-Module-For-MEDITECH-NMMEDI-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61952", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70726", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031116", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97756", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4621.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4621.json index 4b66d3731fb..1b8a637e657 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4621.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4621.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4621", "sourceIdentifier": "security_alert@emc.com", "published": "2014-09-17T10:55:07.057", - "lastModified": "2017-08-29T01:35:04.517", + "lastModified": "2024-11-21T02:10:35.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -142,6 +141,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95989", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61251", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030855", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95989", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4622.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4622.json index 25f341308ed..95766cba52d 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4622.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4622.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4622", "sourceIdentifier": "security_alert@emc.com", "published": "2014-09-17T10:55:07.107", - "lastModified": "2017-08-29T01:35:04.577", + "lastModified": "2024-11-21T02:10:35.533", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -142,6 +141,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95990", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-09/0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61251", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69819", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030855", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95990", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4623.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4623.json index 65628290a12..ede89da7780 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4623.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4623.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4623", "sourceIdentifier": "security_alert@emc.com", "published": "2014-10-25T10:55:06.087", - "lastModified": "2017-08-29T01:35:04.657", + "lastModified": "2024-11-21T02:10:35.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97757", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0146.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128842/EMC-Avamar-Weak-Password-Storage.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70732", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031117", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97757", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4624.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4624.json index 1bf346e80e4..b085172bb4f 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4624.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4624.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4624", "sourceIdentifier": "security_alert@emc.com", "published": "2014-10-25T10:55:06.117", - "lastModified": "2018-10-09T19:49:46.257", + "lastModified": "2024-11-21T02:10:35.760", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -130,6 +129,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97729", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0147.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128843/EMC-Avamar-Sensitive-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128850/VMware-Security-Advisory-2014-0011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61663", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533813/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70709", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031114", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031118", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97729", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4626.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4626.json index 841ec638dc2..a20c3663450 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4626.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4626.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4626", "sourceIdentifier": "security_alert@emc.com", "published": "2014-12-17T01:59:00.067", - "lastModified": "2014-12-17T19:15:20.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:35.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -120,6 +119,34 @@ { "url": "https://docs.google.com/spreadsheets/d/1DiiUPCPvmaliWcfwPSc36y2mDvuidkDKQBWqaIuJi0A/edit?usp=sharing", "source": "security_alert@emc.com" + }, + { + "url": "http://www.kb.cert.org/vuls/id/315340", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/386056", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/874632", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1DiiUPCPvmaliWcfwPSc36y2mDvuidkDKQBWqaIuJi0A/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4627.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4627.json index 07b281167e6..95321e0845d 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4627.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4627.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4627", "sourceIdentifier": "security_alert@emc.com", "published": "2014-11-07T11:55:03.283", - "lastModified": "2022-04-22T19:49:39.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:36.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -136,6 +135,47 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-11/0028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128986/RSA-Web-Threat-Detection-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70955", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031172", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98523", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4628.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4628.json index bfa75a85f67..c00b86f4b83 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4628.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4628.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4628", "sourceIdentifier": "security_alert@emc.com", "published": "2014-12-12T18:59:01.427", - "lastModified": "2014-12-15T19:31:33.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:36.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +109,10 @@ { "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0075.html", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0075.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4629.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4629.json index 8b284bd945e..6a377ebafc1 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4629.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4629.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4629", "sourceIdentifier": "security_alert@emc.com", "published": "2014-12-06T15:59:01.640", - "lastModified": "2018-10-09T19:49:47.240", + "lastModified": "2024-11-21T02:10:36.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -111,6 +110,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99085", "source": "security_alert@emc.com" + }, + { + "url": "http://packetstormsecurity.com/files/129376/EMC-Documentum-Content-Server-Insecure-Direct-Object-Reference.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534135/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031298", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99085", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4630.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4630.json index cb00b0de72d..2ef28898f89 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4630.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4630.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4630", "sourceIdentifier": "security_alert@emc.com", "published": "2014-12-30T15:59:00.063", - "lastModified": "2021-12-09T18:31:28.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:36.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,28 @@ "tags": [ "Technical Description" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0169.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72534", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://secure-resumption.com/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4631.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4631.json index af6746e74d7..a031b443001 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4631.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4631.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4631", "sourceIdentifier": "security_alert@emc.com", "published": "2014-12-08T11:59:05.953", - "lastModified": "2018-10-09T19:49:47.707", + "lastModified": "2024-11-21T02:10:36.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -132,6 +131,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99086", "source": "security_alert@emc.com" + }, + { + "url": "http://www.securityfocus.com/archive/1/534136/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031297", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99086", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4632.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4632.json index 9bbfb7b16a2..bacce333895 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4632.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4632.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4632", "sourceIdentifier": "security_alert@emc.com", "published": "2015-02-01T02:59:00.050", - "lastModified": "2017-08-29T01:35:05.000", + "lastModified": "2024-11-21T02:10:36.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -115,6 +114,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100866", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031664", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100866", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4633.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4633.json index d22af315835..5d38c3bbd0c 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4633.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4633.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4633", "sourceIdentifier": "security_alert@emc.com", "published": "2014-12-12T18:59:02.397", - "lastModified": "2014-12-16T17:39:35.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:36.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,10 @@ { "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0073.html", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0073.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4634.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4634.json index c4797a396b1..eb04d4cd263 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4634.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4634.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4634", "sourceIdentifier": "security_alert@emc.com", "published": "2014-12-30T15:59:01.483", - "lastModified": "2015-03-24T20:51:08.763", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-428: Unquoted Search Path or Element", + "lastModified": "2024-11-21T02:10:36.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -133,6 +131,11 @@ { "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0170.html", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-12/0170.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-428: Unquoted Search Path or Element" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4635.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4635.json index 83af7b59de3..ef6c8dc7e03 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4635.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4635.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4635", "sourceIdentifier": "security_alert@emc.com", "published": "2015-01-07T02:59:16.107", - "lastModified": "2016-12-07T03:00:40.967", + "lastModified": "2024-11-21T02:10:36.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "http://www.securitytracker.com/id/1031497", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031497", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4636.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4636.json index e910d950933..7a5836369f3 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4636.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4636.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4636", "sourceIdentifier": "security_alert@emc.com", "published": "2015-01-07T02:59:17.157", - "lastModified": "2016-12-07T03:00:41.997", + "lastModified": "2024-11-21T02:10:37.013", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "http://www.securitytracker.com/id/1031497", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031497", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4637.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4637.json index f4c7bc702ec..cb47f844855 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4637.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4637.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4637", "sourceIdentifier": "security_alert@emc.com", "published": "2015-01-07T02:59:18.063", - "lastModified": "2016-12-07T03:00:43.013", + "lastModified": "2024-11-21T02:10:37.120", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -85,6 +83,19 @@ { "url": "http://www.securitytracker.com/id/1031497", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031497", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4638.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4638.json index f7a49cf8e32..0a430fa10ff 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4638.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4638.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4638", "sourceIdentifier": "security_alert@emc.com", "published": "2015-01-07T02:59:18.857", - "lastModified": "2016-12-07T03:00:44.043", + "lastModified": "2024-11-21T02:10:37.227", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ { "url": "http://www.securitytracker.com/id/1031497", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031497", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4639.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4639.json index 7be4674cf70..1f8291d5e17 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4639.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4639.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4639", "sourceIdentifier": "security_alert@emc.com", "published": "2015-01-07T02:59:19.717", - "lastModified": "2017-08-29T01:35:05.063", + "lastModified": "2024-11-21T02:10:37.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99636", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129822/EMC-Documentum-Web-Development-Kit-XSS-CSRF-Redirection-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031497", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99636", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4643.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4643.json index a31ab93f891..d8147a1cb41 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4643.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4643.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4643", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-25T20:55:07.710", - "lastModified": "2014-06-26T14:30:31.607", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:37.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/108051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127075/Core-FTP-LE-2.2-Heap-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/58818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4644.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4644.json index 1d442960613..61f8b43e77a 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4644.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4644.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4644", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-25T20:55:07.770", - "lastModified": "2015-01-12T07:10:50.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:37.623", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "http://www.securityfocus.com/bid/68141", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/108452", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68141", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4645.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4645.json index 68e922c2563..6cf1d84e29b 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4645.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4645.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4645", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-25T20:55:07.833", - "lastModified": "2023-04-26T18:55:30.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:37.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/33822", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68144", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4646.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4646.json index 8d2740201d7..a5d41b173ea 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4646.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4646.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4646", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-07T14:55:04.287", - "lastModified": "2014-07-08T15:12:11.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:37.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-214", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/59494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.foxitsoftware.com/support/security_bulletins.php#FRD-20", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-214", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4647.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4647.json index 7383a9067be..deb9438917d 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4647.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4647.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4647", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-07T11:13:36.297", - "lastModified": "2017-08-29T01:35:05.123", + "lastModified": "2024-11-21T02:10:38.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94480", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/68489", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-224/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94480", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4648.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4648.json index 28b24dab318..5a668190fde 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4648.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4648.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4648", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-28T15:55:08.177", - "lastModified": "2014-06-30T15:22:31.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:38.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://piwigo.org/forum/viewtopic.php?id=24009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://piwigo.org/releases/2.6.3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4649.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4649.json index 5fc898b44b0..a199e24fd0e 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4649.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4649.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4649", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-28T15:55:08.240", - "lastModified": "2014-06-30T22:10:07.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:38.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -99,6 +98,14 @@ { "url": "http://piwigo.org/bugs/view.php?id=3089", "source": "cve@mitre.org" + }, + { + "url": "http://piwigo.org/bugs/changelog_page.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://piwigo.org/bugs/view.php?id=3089", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4652.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4652.json index 248d3720af7..3b22319b616 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4652.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4652.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4652", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T04:22:15.687", - "lastModified": "2023-11-07T02:20:37.160", + "lastModified": "2024-11-21T02:10:38.670", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -235,6 +234,114 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=07f4d9d74a04aa7c72c5dae0ef97565f28f17b92", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1272.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59434", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/26/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2335-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113406", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94412", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/07f4d9d74a04aa7c72c5dae0ef97565f28f17b92", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4653.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4653.json index 1d11d5679cc..1f504726f71 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4653.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4653.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4653", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T04:22:15.747", - "lastModified": "2023-11-07T02:20:37.247", + "lastModified": "2024-11-21T02:10:38.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -203,6 +202,107 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fd9f26e4eca5d08a27d12c0933fceef76ed9663d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59434", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/26/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2335-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/fd9f26e4eca5d08a27d12c0933fceef76ed9663d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4654.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4654.json index 60fac8f9e0c..3ed3ab5cc64 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4654.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4654.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4654", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T04:22:15.793", - "lastModified": "2023-11-07T02:20:37.433", + "lastModified": "2024-11-21T02:10:39.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -203,6 +202,107 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59434", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/26/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68162", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2335-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113445", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4655.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4655.json index 7802a764516..32b0cd5a477 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4655.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4655.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4655", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T04:22:15.937", - "lastModified": "2023-11-07T02:20:37.623", + "lastModified": "2024-11-21T02:10:39.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -211,6 +210,115 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59434", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/26/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68162", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1036763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2335-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113445", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4656.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4656.json index cb43616fdf9..7e576d5835a 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4656.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4656.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4656", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T04:22:15.997", - "lastModified": "2023-11-07T02:20:37.807", + "lastModified": "2024-11-21T02:10:39.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -269,6 +268,133 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=883a1d49f0d77d30012f114b2e19fc141beb3e8e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ac902c112d90a89e59916f751c2745f4dbdbb4bd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0087.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59434", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/26/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1038201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2335-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113470", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/883a1d49f0d77d30012f114b2e19fc141beb3e8e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/ac902c112d90a89e59916f751c2745f4dbdbb4bd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://source.android.com/security/bulletin/2017-04-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4661.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4661.json index bb40d628ccb..3c5bc51e87e 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4661.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4661.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4661", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T01:55:09.353", - "lastModified": "2019-10-09T23:10:57.480", + "lastModified": "2024-11-21T02:10:40.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04441391", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/683972", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70286", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04441391", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04441391", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4663.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4663.json index 45e206443bb..7b4e9acbf6f 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4663.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4663.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4663", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-15T14:55:10.730", - "lastModified": "2014-07-15T19:25:46.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:40.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,41 @@ { "url": "https://code.google.com/p/timthumb/source/detail?r=219", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127192/TimThumb-2.8.13-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/117", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59558", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33851", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://code.google.com/p/timthumb/issues/detail?id=485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/timthumb/source/detail?r=219", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4664.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4664.json index 164f8279f29..73be4581bbb 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4664.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4664.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4664", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:08.617", - "lastModified": "2018-10-09T19:49:48.130", + "lastModified": "2024-11-21T02:10:40.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -155,6 +154,40 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://hacktivity.websecgeeks.com/word-press-firewall-plugin-xss/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533907/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70911", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70915", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.wordfence.com/blog/2014/06/security-fix-wordfence-5-1-4/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://wordpress.org/plugins/wordfence/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4667.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4667.json index 6e7486fe322..7fc34722bd1 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4667.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4667.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4667", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T04:22:16.060", - "lastModified": "2023-11-07T02:20:37.960", + "lastModified": "2024-11-21T02:10:40.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -268,6 +267,137 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d3217b15a19a4779c39b212358a5c71d725822ee", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3069.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59790", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2992", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/27/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68224", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2335-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113967", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4668.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4668.json index adbc385eadf..aae11595792 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4668.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4668.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4668", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T04:14:17.233", - "lastModified": "2017-01-03T02:59:06.140", + "lastModified": "2024-11-21T02:10:40.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -173,6 +172,42 @@ { "url": "https://github.com/cherokee/webserver/commit/fbda667221c51f0aa476a02366e0cf66cb012f88", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0181.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155776.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156190.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/28/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/06/28/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:225", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68249", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/cherokee/webserver/commit/fbda667221c51f0aa476a02366e0cf66cb012f88", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4669.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4669.json index 52a0defd553..271e37f9105 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4669.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4669.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4669", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-28T15:55:08.490", - "lastModified": "2015-12-18T19:05:25.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:40.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -86,6 +85,21 @@ { "url": "http://www.securityfocus.com/bid/68200", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127239/HP-Enterprise-Maps-1.00-Authenticated-XXE-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68200", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4670.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4670.json index 1f3319df1af..f7d2b989ca4 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4670.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4670.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4670", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T11:06:28.990", - "lastModified": "2017-01-07T03:00:22.867", + "lastModified": "2024-11-21T02:10:40.940", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -263,6 +261,67 @@ { "url": "https://support.apple.com/HT204659", "source": "cve@mitre.org" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1326.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1327.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60696", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3008", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=67538", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4671.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4671.json index df523b3a6f7..e0991ffdcbb 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4671.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4671.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4671", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-09T05:04:24.960", - "lastModified": "2015-09-22T18:47:40.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:41.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -367,6 +366,44 @@ { "url": "http://www.securitytracker.com/id/1030533", "source": "cve@mitre.org" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-17.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-0860.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59774", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59837", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201407-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68457", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030533", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4672.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4672.json index b83a01d8189..8e2fb6885b4 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4672.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4672.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4672", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T17:55:06.377", - "lastModified": "2014-07-24T05:01:23.010", + "lastModified": "2024-11-21T02:10:41.260", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "per http://www.yiiframework.com/news/78/yii-1-1-15-is-released-security-fix/:\n\n\"Note that the issue only affects 1.1.14. All previous releases are not affected\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +77,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.yiiframework.com/news/78/yii-1-1-15-is-released-security-fix/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "per http://www.yiiframework.com/news/78/yii-1-1-15-is-released-security-fix/:\n\n\"Note that the issue only affects 1.1.14. All previous releases are not affected\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4682.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4682.json index 7837712e803..22d41fd7229 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4682.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4682.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4682", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-24T14:55:08.020", - "lastModified": "2014-07-25T14:27:43.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:41.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -155,6 +154,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4683.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4683.json index f53610ab4bf..8904a104c23 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4683.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4683.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4683", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-24T14:55:08.050", - "lastModified": "2014-07-25T14:37:19.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:41.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -155,6 +154,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4684.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4684.json index f033eabe48f..c30c5cf14df 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4684.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4684.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4684", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-24T14:55:08.097", - "lastModified": "2014-07-25T14:42:45.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:41.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -155,6 +154,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4685.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4685.json index ce945a99a6b..6fa9155aece 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4685.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4685.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4685", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-24T14:55:08.143", - "lastModified": "2014-07-25T14:49:24.540", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:42.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -155,6 +154,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4686.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4686.json index 44571271ea1..7004da2fa98 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4686.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4686.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4686", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-24T14:55:08.190", - "lastModified": "2014-07-25T14:59:40.003", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-798: CWE-798: Use of Hard-coded Credentials", + "lastModified": "2024-11-21T02:10:42.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -156,6 +154,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-214365.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-798: CWE-798: Use of Hard-coded Credentials" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4687.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4687.json index 0889511270e..5310a9a182b 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4687.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4687.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4687", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T10:35:25.813", - "lastModified": "2019-05-30T14:57:54.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:42.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://pfsense.org/security/advisories/pfSense-SA-14_09.webgui.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4688.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4688.json index cd4fbc3f9e0..bb8246e7024 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4688.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4688.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4688", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T10:35:25.860", - "lastModified": "2019-05-30T14:57:54.887", + "lastModified": "2024-11-21T02:10:42.490", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html\n\n\"CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')\"", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -84,6 +82,18 @@ { "url": "https://www.exploit-db.com/exploits/43560/", "source": "cve@mitre.org" + }, + { + "url": "https://pfsense.org/security/advisories/pfSense-SA-14_10.webgui.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/43560/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html\n\n\"CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4689.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4689.json index 1bbf4ef70ce..1b306291ed5 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4689.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4689.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4689", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T10:35:25.893", - "lastModified": "2019-05-30T14:57:54.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:42.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://pfsense.org/security/advisories/pfSense-SA-14_11.webgui.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4690.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4690.json index c444d6ddf76..c9f039ab4e9 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4690.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4690.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4690", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T10:35:25.940", - "lastModified": "2019-05-30T14:57:54.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:42.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://pfsense.org/security/advisories/pfSense-SA-14_11.webgui.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4691.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4691.json index 48e448410d3..a75ebb9ec5e 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4691.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4691.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4691", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T10:35:25.987", - "lastModified": "2019-05-30T14:57:54.887", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/384.html\n\n\"CWE-384: Session Fixation\"", + "lastModified": "2024-11-21T02:10:42.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +78,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://pfsense.org/security/advisories/pfSense-SA-14_12.webgui.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/384.html\n\n\"CWE-384: Session Fixation\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4692.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4692.json index e1c8c368c66..c0c5ffb20d5 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4692.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4692.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4692", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T10:35:26.033", - "lastModified": "2019-05-30T14:57:54.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:43.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://pfsense.org/security/advisories/pfSense-SA-14_12.webgui.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4693.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4693.json index f90accf6161..3ef600273a3 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4693.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4693.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4693", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T10:35:26.080", - "lastModified": "2019-05-30T14:57:55.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:43.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://pfsense.org/security/advisories/pfSense-SA-14_13.packages.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4694.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4694.json index ef8a5fa6747..124e3888b9a 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4694.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4694.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4694", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T10:35:26.127", - "lastModified": "2019-05-30T14:57:55.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:43.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://pfsense.org/security/advisories/pfSense-SA-14_13.packages.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4695.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4695.json index cdffc7c8d5c..1f06bd0f735 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4695.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4695.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4695", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T10:35:26.157", - "lastModified": "2019-05-30T14:57:55.027", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/601.html\n\n\"CWE-601: URL Redirection to Untrusted Site ('Open Redirect')\"", + "lastModified": "2024-11-21T02:10:43.447", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +89,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://pfsense.org/security/advisories/pfSense-SA-14_13.packages.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/601.html\n\n\"CWE-601: URL Redirection to Untrusted Site ('Open Redirect')\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4696.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4696.json index 616b34a5af1..ae54a825e6b 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4696.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4696.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4696", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-02T10:35:26.207", - "lastModified": "2019-05-30T14:57:55.027", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/601.html\n\n\"CWE-601: URL Redirection to Untrusted Site ('Open Redirect')\"", + "lastModified": "2024-11-21T02:10:43.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +89,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://pfsense.org/security/advisories/pfSense-SA-14_13.packages.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/601.html\n\n\"CWE-601: URL Redirection to Untrusted Site ('Open Redirect')\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4698.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4698.json index 553ee49770c..f5430503913 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4698.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4698.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4698", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T11:06:29.037", - "lastModified": "2023-01-19T16:35:30.013", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:10:43.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -174,6 +172,100 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1326.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1327.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/54553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/59831", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=67539", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-46xx/CVE-2014-4699.json b/CVE-2014/CVE-2014-46xx/CVE-2014-4699.json index 0c58ed50a9c..0edd6e1f317 100644 --- a/CVE-2014/CVE-2014-46xx/CVE-2014-4699.json +++ b/CVE-2014/CVE-2014-46xx/CVE-2014-4699.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4699", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-09T11:07:03.477", - "lastModified": "2024-02-16T20:27:25.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:43.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -400,6 +399,253 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-0924.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/07/05/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/07/08/16", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/07/08/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/59633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59639", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59654", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60220", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60380", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2972", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34134", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/04/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/108754", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2266-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2267-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2268-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2269-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2270-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2271-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2272-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2273-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2274-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115927", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.97", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4700.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4700.json index dfcd3e1386c..1c3b9f65fd1 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4700.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4700.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4700", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T14:55:04.650", - "lastModified": "2018-12-18T14:42:18.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:44.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 4.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.4, @@ -139,6 +138,45 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/59889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.citrix.com/article/CTX139591", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68530", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030566", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94460", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4701.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4701.json index 4f509b7e4fe..9135884bdc0 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4701.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4701.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4701", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T16:59:05.330", - "lastModified": "2016-11-28T19:12:27.633", + "lastModified": "2024-11-21T02:10:44.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -121,6 +120,55 @@ { "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html", "source": "cve@mitre.org" + }, + { + "url": "http://legalhackers.com/advisories/nagios-check_dhcp.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org&utm_medium=News+Post&utm_content=Nagios%20Plugins%202.0.2%20Released&utm_campaign=Nagios%20Plugins", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/May/74", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/58751", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67433", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4702.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4702.json index 9891e09f9ec..5bb40aa0675 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4702.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4702.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4702", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T16:59:07.393", - "lastModified": "2016-11-28T19:12:28.790", + "lastModified": "2024-11-21T02:10:44.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -100,6 +99,34 @@ { "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html", "source": "cve@mitre.org" + }, + { + "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org&utm_medium=News+Post&utm_content=Nagios%20Plugins%202.0.2%20Released&utm_campaign=Nagios%20Plugins", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/58751", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4703.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4703.json index 8d6ff124715..7d61e369971 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4703.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4703.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4703", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T16:59:08.597", - "lastModified": "2016-11-28T19:12:29.667", + "lastModified": "2024-11-21T02:10:45.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,29 @@ { "url": "http://www.securityfocus.com/bid/76810", "source": "cve@mitre.org" + }, + { + "url": "http://nagios-plugins.org/nagios-plugins-2-0-3-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/141", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/76810", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4710.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4710.json index c57bac39bec..783705dc153 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4710.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4710.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4710", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-29T14:55:05.500", - "lastModified": "2015-08-28T16:35:33.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:45.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127634/ZeroCMS-1.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://community.qualys.com/blogs/securitylabs/2014/07/24/yet-another-zerocms-cross-site-scripting-vulnerability-cve-2014-4710", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4715.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4715.json index 82e350c0d88..4b586275672 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4715.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4715.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4715", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T04:22:16.123", - "lastModified": "2014-07-17T05:07:46.153", + "lastModified": "2024-11-21T02:10:45.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,26 @@ { "url": "https://code.google.com/p/lz4/source/detail?r=119", "source": "cve@mitre.org" + }, + { + "url": "http://blog.securitymouse.com/2014/07/i-was-wrong-proving-lz4-exploitable.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://fastcompression.blogspot.fr/2014/07/software-vulnerabilities-how-it-works.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59770", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/lz4/issues/detail?id=134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/lz4/source/detail?r=119", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4716.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4716.json index 058ce2b0f38..a4e3529ddb2 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4716.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4716.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4716", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T14:55:08.847", - "lastModified": "2014-07-07T13:57:16.420", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:45.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/108397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127244/Thomson-TWG87OUIR-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/33866", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4717.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4717.json index 88bf8ce40be..7b30caedb93 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4717.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4717.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4717", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T14:55:09.283", - "lastModified": "2022-11-15T17:34:29.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:46.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -270,6 +269,34 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/127238/WordPress-Simple-Share-Buttons-Adder-4.4-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.dxw.com/advisories/csrf-and-stored-xss-in-simple-share-buttons-adder", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/simple-share-buttons-adder/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4718.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4718.json index e062a4b3ef1..6f0fdc1d9b4 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4718.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4718.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4718", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T14:55:09.643", - "lastModified": "2014-07-07T14:10:07.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:46.173", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -128,6 +127,47 @@ { "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5188.php", "source": "cve@mitre.org" + }, + { + "url": "http://lunarcms.com/Get.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/108350", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/108351", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127188/Lunar-CMS-3.3-CSRF-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/59411", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33830", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5188.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4719.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4719.json index c75badd130e..e9bc3199429 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4719.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4719.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4719", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-03T14:55:09.690", - "lastModified": "2014-07-07T14:15:12.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:46.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -153,6 +152,17 @@ { "url": "http://www.securityfocus.com/bid/68155", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127177/User-Friendly-SVN-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68155", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4720.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4720.json index 8451f242c1c..5a5276b6844 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4720.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4720.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4720", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-06T23:55:02.050", - "lastModified": "2014-07-07T14:52:15.107", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-185: CWE-185: Incorrect Regular Expression", + "lastModified": "2024-11-21T02:10:46.473", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -251,6 +249,15 @@ { "url": "https://github.com/rjbs/Email-Address/blob/master/Changes", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q2/563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/rjbs/Email-Address/blob/master/Changes", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-185: CWE-185: Incorrect Regular Expression" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4721.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4721.json index 924d8f5c699..5eb86a24830 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4721.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4721.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4721", "sourceIdentifier": "security@debian.org", "published": "2014-07-06T23:55:02.707", - "lastModified": "2023-01-19T16:14:09.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:46.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -208,6 +207,107 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/54553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/59794", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/59831", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://twitter.com/mikispag/statuses/485713462258302976", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=67498", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4722.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4722.json index 195f3a5db15..d606320dfbf 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4722.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4722.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4722", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-07T14:55:04.490", - "lastModified": "2018-10-09T19:49:48.630", + "lastModified": "2024-11-21T02:10:46.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/127295/OCS-Inventory-NG-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532664/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68292", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4723.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4723.json index fcfafad77f4..abc607f56fe 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4723.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4723.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4723", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-07T14:55:04.537", - "lastModified": "2014-07-08T15:27:41.390", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:46.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127293/WordPress-Easy-Banners-1.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4724.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4724.json index 58d575599e4..903264df198 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4724.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4724.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4724", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-07T14:55:04.583", - "lastModified": "2015-12-19T02:02:18.720", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:47.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/68279", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127291/WordPress-Custom-Banners-1.2.2.2-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68279", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4725.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4725.json index 09de96e323f..09b69374faf 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4725.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4725.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4725", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-27T18:55:05.027", - "lastModified": "2014-07-28T19:18:25.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:47.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -442,6 +441,36 @@ "tags": [ "Patch" ] + }, + { + "url": "http://arstechnica.com/security/2014/07/mass-exploit-of-wordpress-plugin-backdoors-sites-running-joomla-magento-too/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://blog.sucuri.net/2014/07/mailpoet-vulnerability-exploited-in-the-wild-breaking-thousands-of-wordpress-sites.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://blog.sucuri.net/2014/07/malware-infection-breaking-wordpress-sites.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/08/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/wysija-newsletters/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4726.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4726.json index 7093cc9a4b9..8fc617fd457 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4726.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4726.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4726", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-27T18:55:05.103", - "lastModified": "2014-07-28T19:21:09.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:47.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -428,6 +427,17 @@ "tags": [ "Patch" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/08/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/wysija-newsletters/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4727.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4727.json index ade19b56a6d..3006b43b106 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4727.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4727.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4727", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T16:55:06.607", - "lastModified": "2018-10-09T19:49:48.910", + "lastModified": "2024-11-21T02:10:47.473", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -114,6 +113,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96139", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128343/TP-LINK-WDR4300-XSS-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/80", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533499/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533501/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96139", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4728.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4728.json index e263af41675..e4d19798e6b 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4728.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4728.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4728", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T16:55:06.653", - "lastModified": "2018-10-09T19:49:49.567", + "lastModified": "2024-11-21T02:10:47.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -114,6 +113,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96140", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128343/TP-LINK-WDR4300-XSS-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/80", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533499/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533501/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70037", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96140", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4734.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4734.json index 31ae3ab6dbb..bec5baf3b8d 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4734.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4734.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4734", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-21T14:55:06.630", - "lastModified": "2018-10-09T19:49:50.207", + "lastModified": "2024-11-21T02:10:47.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127499/e107-2.0-alpha2-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532801/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68674", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/e107inc/e107/commit/f80e417bb3e7ab5c1a89ea9ddd2cd060f54464e1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23220", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4735.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4735.json index 69f7d70d4e1..f6d9e3d49be 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4735.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4735.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4735", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-12T14:55:07.143", - "lastModified": "2018-10-09T19:49:50.613", + "lastModified": "2024-11-21T02:10:47.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -115,6 +114,29 @@ { "url": "https://www.htbridge.com/advisory/HTB23221", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128140/MyWebSQL-3.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533337/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95719", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23221", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4736.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4736.json index 980a81cd26b..3bae31ac6e9 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4736.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4736.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4736", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-24T14:55:08.317", - "lastModified": "2018-10-09T19:49:51.067", + "lastModified": "2024-11-21T02:10:48.057", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127594/E2-2844-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532867/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68843", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23222", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4737.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4737.json index 2a160f31617..91f9ebf0815 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4737.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4737.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4737", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T14:55:08.557", - "lastModified": "2018-10-09T19:49:51.363", + "lastModified": "2024-11-21T02:10:48.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -128,6 +127,37 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128519/Textpattern-4.5.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://textpattern.com/weblog/379/textpattern-cms-457-released-ten-years-on", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533596/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96802", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23223", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4738.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4738.json index 20dfec167a1..855d70185b0 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4738.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4738.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4738", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T20:55:02.890", - "lastModified": "2017-08-29T01:35:05.640", + "lastModified": "2024-11-21T02:10:48.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -139,6 +138,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94649", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/59882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-14-012/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030556", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94649", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4741.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4741.json index 21150f55b04..4c967e0f93b 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4741.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4741.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4741", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-09T14:55:04.060", - "lastModified": "2014-07-10T13:49:53.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:48.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127370/xClassified-1.2-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68438", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4742.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4742.json index 8bf7a31659d..06d0d3b8feb 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4742.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4742.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4742", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-09T14:55:04.247", - "lastModified": "2014-07-10T14:05:00.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:48.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -160,6 +159,29 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/59540", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kajona.de/en/Development/Changelog/Changelog-V4-5/changelog_45.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/kajona/kajonacms/commit/8f1b18150cc2a8f27c96d9c4f94a81022fbb61e3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://www.netsparker.com/critical-xss-vulnerability-in-kajonacms", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4743.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4743.json index 26c79725446..15a8077a0bf 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4743.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4743.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4743", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-09T14:55:04.297", - "lastModified": "2015-10-06T02:43:15.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:48.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -157,6 +156,26 @@ "Exploit", "Patch" ] + }, + { + "url": "http://secunia.com/advisories/59540", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kajona.de/en/Development/Changelog/Changelog-V4-5/changelog_45.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68498", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/kajona/kajonacms/commit/4a07f949c171da6aa9a6e6c19421b0df16297180", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4744.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4744.json index 10cf6abcb0f..e3564f74bc0 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4744.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4744.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4744", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-09T14:55:04.343", - "lastModified": "2019-12-16T15:25:11.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:48.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -217,6 +216,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/59539", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68500", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/osTicket/osTicket-1.8/releases/tag/v1.9.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.netsparker.com/critical-xss-vulnerabilities-in-osticket/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4746.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4746.json index c9d81fecc45..5f3d6bdbbc0 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4746.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4746.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4746", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-12T05:01:03.950", - "lastModified": "2017-08-29T01:35:05.703", + "lastModified": "2024-11-21T02:10:49.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -100,6 +99,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94348", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI21858", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680230", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030669", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94348", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4747.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4747.json index 57a512a2225..4811f32b794 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4747.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4747.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4747", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-07-26T15:55:03.700", - "lastModified": "2017-01-07T03:00:23.133", + "lastModified": "2024-11-21T02:10:49.200", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -131,6 +130,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-0747.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127830/IBM-Sametime-Meet-Server-8.5-Password-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21679221", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4748.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4748.json index e0724f9f4ce..1bd286a7139 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4748.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4748.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4748", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-07-26T15:55:03.777", - "lastModified": "2017-08-29T01:35:05.797", + "lastModified": "2024-11-21T02:10:49.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -139,6 +138,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94350", "source": "psirt@us.ibm.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-0747.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127831/IBM-Sametime-Meet-Server-8.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60202", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21679221", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94350", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4749.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4749.json index 5599d355211..7fddda02389 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4749.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4749.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4749", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-20T11:17:14.720", - "lastModified": "2017-08-29T01:35:05.860", + "lastModified": "2024-11-21T02:10:49.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94351", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020224", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94351", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4750.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4750.json index 232454b0e0f..ff7d9dde075 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4750.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4750.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4750", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-20T11:17:14.767", - "lastModified": "2017-08-29T01:35:05.907", + "lastModified": "2024-11-21T02:10:49.573", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -96,6 +95,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94352", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020223", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69299", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94352", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4751.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4751.json index 88f94018b36..07868a6684e 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4751.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4751.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4751", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-12T05:01:03.997", - "lastModified": "2017-08-29T01:35:05.953", + "lastModified": "2024-11-21T02:10:49.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94353", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94353", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4752.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4752.json index 8691ad05248..e7528af0558 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4752.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4752.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4752", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-23T22:55:03.653", - "lastModified": "2015-11-27T18:13:06.557", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-798: Use of Hard-coded Credentials", + "lastModified": "2024-11-21T02:10:49.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -469,6 +467,18 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/54512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096232", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-798: Use of Hard-coded Credentials" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4756.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4756.json index ec866ec3393..062757a93f3 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4756.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4756.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4756", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-10T10:55:07.927", - "lastModified": "2017-08-29T01:35:06.000", + "lastModified": "2024-11-21T02:10:49.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -105,6 +104,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94444", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60709", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24038045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94444", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4757.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4757.json index 8130570f961..df447fcfabf 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4757.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4757.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4757", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-12T00:55:03.703", - "lastModified": "2017-08-29T01:35:06.063", + "lastModified": "2024-11-21T02:10:50.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -97,6 +96,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94456", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21679144", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94456", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4758.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4758.json index 873b893b628..d0425f07041 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4758.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4758.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4758", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-04T10:55:07.503", - "lastModified": "2017-08-29T01:35:06.110", + "lastModified": "2024-11-21T02:10:50.143", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -176,6 +175,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94485", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60851", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR50215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680795", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94485", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4759.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4759.json index e10ca19f8e9..db6e2df45d1 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4759.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4759.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4759", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-04T10:55:07.550", - "lastModified": "2017-08-29T01:35:06.170", + "lastModified": "2024-11-21T02:10:50.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -100,6 +99,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94486", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR50871", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94486", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4760.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4760.json index ef19355a9a5..3b66bfc0002 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4760.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4760.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4760", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-12T05:01:04.043", - "lastModified": "2017-08-29T01:35:06.217", + "lastModified": "2024-11-21T02:10:50.363", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -171,6 +169,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94657", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60597", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI19877", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680230", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030669", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94657", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4761.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4761.json index e5fd9752246..68c1aa2085f 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4761.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4761.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4761", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-10T10:55:07.400", - "lastModified": "2017-08-29T01:35:06.280", + "lastModified": "2024-11-21T02:10:50.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -505,6 +504,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94658", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI22104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684652", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94658", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4762.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4762.json index 7ceaa89c1c4..2da632892a3 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4762.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4762.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4762", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-12T01:55:07.153", - "lastModified": "2017-08-29T01:35:06.343", + "lastModified": "2024-11-21T02:10:50.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -176,6 +175,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94659", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61204", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI21973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681998", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94659", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4763.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4763.json index 6b55bf6a88a..51b80c7d69d 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4763.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4763.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4763", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-15T14:55:11.650", - "lastModified": "2017-08-29T01:35:06.390", + "lastModified": "2024-11-21T02:10:50.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -99,6 +98,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94660", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21679930", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685574", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69798", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94660", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4764.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4764.json index dff5e682cda..de26691b444 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4764.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4764.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4764", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-22T01:55:08.433", - "lastModified": "2017-08-29T01:35:06.437", + "lastModified": "2024-11-21T02:10:50.817", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -175,6 +174,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94723", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI21189", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69301", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94723", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4765.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4765.json index 821c67c47c1..07d8f40c830 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4765.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4765.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4765", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-02T00:55:03.763", - "lastModified": "2017-08-29T01:35:06.500", + "lastModified": "2024-11-21T02:10:50.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -318,6 +317,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94757", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94757", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4766.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4766.json index 5a8c0362a43..e90f37f8284 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4766.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4766.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4766", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-23T01:55:16.437", - "lastModified": "2017-08-29T01:35:06.547", + "lastModified": "2024-11-21T02:10:51.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -106,6 +105,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94793", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61847", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94793", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4767.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4767.json index 0c3d8db0f6a..940401b6d0e 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4767.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4767.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4767", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-22T01:55:08.513", - "lastModified": "2017-08-29T01:35:06.593", + "lastModified": "2024-11-21T02:10:51.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -115,6 +114,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94832", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI21284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69297", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94832", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4769.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4769.json index 9e959db5122..1beae64faf9 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4769.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4769.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4769", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-05T11:55:06.277", - "lastModified": "2019-09-30T16:19:41.927", + "lastModified": "2024-11-21T02:10:51.410", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -195,6 +193,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94836", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR49897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR50553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685464", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70872", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94836", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4770.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4770.json index 1f0fc2ec917..35fc6a08507 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4770.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4770.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4770", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-23T22:55:03.857", - "lastModified": "2017-08-29T01:35:06.733", + "lastModified": "2024-11-21T02:10:51.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -701,6 +700,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95209", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI23055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/573356", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69981", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95209", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4771.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4771.json index f45cdaf21a2..39915030271 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4771.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4771.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4771", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-13T02:59:00.033", - "lastModified": "2017-08-29T01:35:06.797", + "lastModified": "2024-11-21T02:10:51.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -207,6 +206,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94842", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV69190", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94842", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4774.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4774.json index c395164a253..3f23f46b6e2 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4774.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4774.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4774", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:00.077", - "lastModified": "2015-05-26T17:04:04.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:51.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701389", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4775.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4775.json index ca248f8138e..f5c7ea0e0fb 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4775.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4775.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4775", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-17T23:55:07.027", - "lastModified": "2017-08-29T01:35:06.860", + "lastModified": "2024-11-21T02:10:51.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -108,6 +107,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94917", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681640", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94917", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4776.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4776.json index b8b8a763347..35077c3a845 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4776.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4776.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4776", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-20T10:59:00.073", - "lastModified": "2017-01-03T02:59:06.203", + "lastModified": "2024-11-21T02:10:52.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -97,6 +96,22 @@ { "url": "http://www.securitytracker.com/id/1032256", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21713641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032256", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4778.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4778.json index 05c5674b704..6fab6e1e098 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4778.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4778.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4778", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:02.543", - "lastModified": "2015-05-26T17:04:33.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:52.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701389", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4781.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4781.json index 4d120b209ce..76cd4ea7f69 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4781.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4781.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4781", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-13T02:59:01.580", - "lastModified": "2017-08-29T01:35:06.937", + "lastModified": "2024-11-21T02:10:52.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -93,6 +92,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95028", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95028", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4783.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4783.json index 6e896422a85..006af56302a 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4783.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4783.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4783", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-10T10:55:07.973", - "lastModified": "2017-08-29T01:35:07.000", + "lastModified": "2024-11-21T02:10:52.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95030", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95030", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4784.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4784.json index 2b9d47150cb..75e2b0503e0 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4784.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4784.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4784", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-10T10:55:08.020", - "lastModified": "2017-08-29T01:35:07.063", + "lastModified": "2024-11-21T02:10:52.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +109,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95031", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4785.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4785.json index d497d86b8a2..0fa90d11408 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4785.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4785.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4785", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-10T10:55:08.067", - "lastModified": "2017-08-29T01:35:07.110", + "lastModified": "2024-11-21T02:10:52.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -110,6 +109,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95032", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69694", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4786.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4786.json index a15a0cbb629..b3159422f50 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4786.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4786.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4786", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-10T10:55:08.097", - "lastModified": "2017-08-29T01:35:07.157", + "lastModified": "2024-11-21T02:10:52.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -110,6 +109,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95033", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69720", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95033", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4787.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4787.json index 64d50ef7d1f..9260be1b78a 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4787.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4787.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4787", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-10T10:55:08.143", - "lastModified": "2017-08-29T01:35:07.217", + "lastModified": "2024-11-21T02:10:52.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -110,6 +109,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95034", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69722", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95034", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4788.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4788.json index 93d219430c6..09f2c85b2ca 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4788.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4788.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4788", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-10T10:55:08.190", - "lastModified": "2017-08-29T01:35:07.267", + "lastModified": "2024-11-21T02:10:53.013", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95058", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95058", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4789.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4789.json index 85333182979..dffe6d23e81 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4789.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4789.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4789", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-10T10:55:08.237", - "lastModified": "2017-08-29T01:35:07.327", + "lastModified": "2024-11-21T02:10:53.117", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-384: Session Fixation", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +101,23 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95059", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95059", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-384: Session Fixation" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4790.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4790.json index 7a9449fa0f0..896c9d979b2 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4790.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4790.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4790", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-26T10:55:04.607", - "lastModified": "2017-08-29T01:35:07.390", + "lastModified": "2024-11-21T02:10:53.227", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -214,6 +213,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93195", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/60480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681277", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93195", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4792.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4792.json index 0f4f02adb1f..88a8640afa0 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4792.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4792.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4792", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-12T01:55:07.200", - "lastModified": "2017-08-29T01:35:07.453", + "lastModified": "2024-11-21T02:10:53.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -416,6 +415,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95204", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61204", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI23334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681998", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95204", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-47xx/CVE-2014-4793.json b/CVE-2014/CVE-2014-47xx/CVE-2014-4793.json index e9b88620c0e..6f71d5c1e00 100644 --- a/CVE-2014/CVE-2014-47xx/CVE-2014-4793.json +++ b/CVE-2014/CVE-2014-47xx/CVE-2014-4793.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4793", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-02T00:55:03.797", - "lastModified": "2017-08-29T01:35:07.500", + "lastModified": "2024-11-21T02:10:53.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95208", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685526", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95208", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4801.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4801.json index 850259f7119..4e4049ffd77 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4801.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4801.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4801", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-19T02:59:00.077", - "lastModified": "2017-08-29T01:35:07.593", + "lastModified": "2024-11-21T02:10:53.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -193,6 +192,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95303", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692615", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95303", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4802.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4802.json index 97bbb53d685..568ea89a7fa 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4802.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4802.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4802", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-07T10:55:04.183", - "lastModified": "2017-08-29T01:35:07.657", + "lastModified": "2024-11-21T02:10:53.667", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -125,6 +124,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95304", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR50984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684771", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95304", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4803.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4803.json index 0b91421c165..447ebe5c6f6 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4803.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4803.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4803", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-13T02:59:02.563", - "lastModified": "2017-08-29T01:35:07.703", + "lastModified": "2024-11-21T02:10:53.773", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -144,6 +142,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95305", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695925", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95305", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4804.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4804.json index 25285d7b730..5b9f7071ee9 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4804.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4804.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4804", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-14T02:59:00.067", - "lastModified": "2017-08-29T01:35:07.767", + "lastModified": "2024-11-21T02:10:53.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95306", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695931", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95306", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4805.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4805.json index 01cb33d08c3..87a52e992eb 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4805.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4805.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4805", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-04T10:55:07.597", - "lastModified": "2017-08-29T01:35:07.813", + "lastModified": "2024-11-21T02:10:53.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -128,6 +127,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95307", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT03761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030806", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95307", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4806.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4806.json index f9cb491a7a9..e2ec6c7e972 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4806.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4806.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4806", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-08-29T09:55:08.353", - "lastModified": "2021-06-11T14:47:43.210", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:54.093", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -151,6 +150,29 @@ "VDB Entry", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682642", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95354", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4807.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4807.json index 53a7c86ae46..70b7daac851 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4807.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4807.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4807", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-23T00:59:00.097", - "lastModified": "2017-08-29T01:35:07.937", + "lastModified": "2024-11-21T02:10:54.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -122,6 +121,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95355", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/59549", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4808.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4808.json index faa7e989c92..20f34e02d5b 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4808.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4808.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4808", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-28T19:55:02.870", - "lastModified": "2017-08-29T01:35:07.983", + "lastModified": "2024-11-21T02:10:54.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -170,6 +169,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95375", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/59740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI25993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70757", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95375", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4809.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4809.json index 26aa4df4621..9fa2640ee51 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4809.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4809.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4809", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-03T01:55:07.237", - "lastModified": "2017-08-29T01:35:08.047", + "lastModified": "2024-11-21T02:10:54.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -180,6 +179,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95376", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61294", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV64915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95376", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4810.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4810.json index 8491e7189c7..731ba11d8c4 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4810.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4810.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4810", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-05T11:55:06.327", - "lastModified": "2017-08-29T01:35:08.123", + "lastModified": "2024-11-21T02:10:54.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95386", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684608", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95386", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4811.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4811.json index 0d4bf77c0d2..9d622ce6421 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4811.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4811.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4811", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-12T01:55:07.513", - "lastModified": "2017-08-29T01:35:08.187", + "lastModified": "2024-11-21T02:10:54.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -376,6 +375,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61075", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004846", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69771", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95387", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4812.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4812.json index fb1e840907b..53f3891d463 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4812.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4812.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4812", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-26T18:55:05.033", - "lastModified": "2017-08-29T01:35:08.233", + "lastModified": "2024-11-21T02:10:54.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 1.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.8 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.2, @@ -152,6 +151,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95388", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686844", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95388", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4813.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4813.json index 0439925e494..b8bbc6f4997 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4813.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4813.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4813", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-13T02:59:03.533", - "lastModified": "2017-08-29T01:35:08.297", + "lastModified": "2024-11-21T02:10:54.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -309,6 +308,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95389", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695652", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95389", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4814.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4814.json index 25967726068..694362afa1f 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4814.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4814.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4814", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-28T19:55:02.917", - "lastModified": "2017-08-29T01:35:08.373", + "lastModified": "2024-11-21T02:10:55.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -175,6 +174,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95391", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/59740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI24622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95391", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4815.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4815.json index 1530df42ee9..b13629e0521 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4815.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4815.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4815", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-12T03:03:18.267", - "lastModified": "2017-08-29T01:35:08.437", + "lastModified": "2024-11-21T02:10:55.147", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-384: Session Fixation", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +81,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95401", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95401", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-384: Session Fixation" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4816.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4816.json index 93645b3e871..81923c8ccbc 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4816.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4816.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4816", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-23T22:55:03.903", - "lastModified": "2017-08-29T01:35:08.500", + "lastModified": "2024-11-21T02:10:55.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -701,6 +700,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95402", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI23055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/573356", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95402", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4817.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4817.json index 316454a8f4d..37b9aa7d12e 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4817.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4817.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4817", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-18T23:59:00.097", - "lastModified": "2017-08-29T01:35:08.577", + "lastModified": "2024-11-21T02:10:55.383", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -504,6 +503,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95444", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04884", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686874", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95444", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4818.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4818.json index 5f1e4e12224..2b79da11fc0 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4818.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4818.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4818", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-24T20:59:00.050", - "lastModified": "2015-11-30T19:20:48.460", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:55.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -150,6 +149,25 @@ { "url": "http://www.securitytracker.com/id/1031795", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT06016", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72771", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031795", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4819.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4819.json index f58f44371ba..412e31babd8 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4819.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4819.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4819", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-18T10:55:11.063", - "lastModified": "2017-08-29T01:35:08.640", + "lastModified": "2024-11-21T02:10:55.617", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -140,6 +139,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95456", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61356", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT03097", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95456", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4820.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4820.json index eea613b7024..e860d02cbe6 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4820.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4820.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4820", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-18T10:55:11.110", - "lastModified": "2017-08-29T01:35:08.687", + "lastModified": "2024-11-21T02:10:55.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95457", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT03567", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682696", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95457", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4821.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4821.json index 5394933323d..65ac9306e65 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4821.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4821.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4821", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-28T19:55:02.963", - "lastModified": "2017-08-29T01:35:08.733", + "lastModified": "2024-11-21T02:10:55.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -171,6 +170,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95466", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI27710", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70755", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95466", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4822.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4822.json index 4d8c1c07b4e..45b8d1c9317 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4822.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4822.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4822", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:14.013", - "lastModified": "2017-08-29T01:35:08.797", + "lastModified": "2024-11-21T02:10:55.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -125,6 +124,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95467", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/59921", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04023", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686339", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95467", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4823.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4823.json index 4caca0d96fa..711f41934bb 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4823.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4823.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4823", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-03T01:55:07.313", - "lastModified": "2017-08-29T01:35:08.860", + "lastModified": "2024-11-21T02:10:56.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -230,6 +229,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95573", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61294", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV64910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV64919", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684466", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95573", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4824.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4824.json index 16da6319dd5..409821b7323 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4824.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4824.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4824", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-18T10:55:11.157", - "lastModified": "2017-08-29T01:35:08.953", + "lastModified": "2024-11-21T02:10:56.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95574", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684448", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95574", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4825.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4825.json index 2ef841f22c5..1cbb817a5e0 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4825.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4825.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4825", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:14.060", - "lastModified": "2017-08-29T01:35:09.030", + "lastModified": "2024-11-21T02:10:56.313", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95575", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95575", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4826.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4826.json index c3a4d52d8de..034f5597e84 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4826.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4826.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4826", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-18T10:55:11.203", - "lastModified": "2017-08-29T01:35:09.077", + "lastModified": "2024-11-21T02:10:56.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95576", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684448", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95576", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4827.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4827.json index 5e448657d63..4add123e7dc 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4827.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4827.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4827", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:14.090", - "lastModified": "2017-08-29T01:35:09.140", + "lastModified": "2024-11-21T02:10:56.533", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95577", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95577", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4828.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4828.json index e3c960f1573..656e7da9f6b 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4828.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4828.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4828", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:14.137", - "lastModified": "2017-08-29T01:35:09.187", + "lastModified": "2024-11-21T02:10:56.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95578", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95578", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4829.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4829.json index 099fa714737..88b33f948e2 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4829.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4829.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4829", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-28T02:59:01.270", - "lastModified": "2017-08-29T01:35:09.297", + "lastModified": "2024-11-21T02:10:56.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -183,6 +182,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95579", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691211", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95579", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4830.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4830.json index 16f21f4fdf6..1a938765415 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4830.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4830.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4830", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:14.200", - "lastModified": "2017-08-29T01:35:09.343", + "lastModified": "2024-11-21T02:10:56.857", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95580", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95580", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4831.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4831.json index 88232495632..db05e0d0ca3 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4831.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4831.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4831", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-28T02:59:02.723", - "lastModified": "2017-08-29T01:35:09.407", + "lastModified": "2024-11-21T02:10:56.970", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -143,6 +142,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95581", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691211", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95581", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4832.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4832.json index da960b02529..75bb4ae0804 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4832.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4832.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4832", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-28T02:59:03.800", - "lastModified": "2017-08-29T01:35:09.467", + "lastModified": "2024-11-21T02:10:57.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -183,6 +182,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95582", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691211", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95582", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4833.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4833.json index 4adfc1c9757..8cc4b38a42f 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4833.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4833.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4833", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:14.230", - "lastModified": "2017-08-29T01:35:09.517", + "lastModified": "2024-11-21T02:10:57.207", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -87,6 +86,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95583", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4834.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4834.json index 85964aae9eb..14b833787ab 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4834.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4834.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4834", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-05T11:55:06.373", - "lastModified": "2019-09-30T16:19:41.927", + "lastModified": "2024-11-21T02:10:57.320", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -195,6 +193,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95628", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR49897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR50553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685464", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70870", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95628", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4835.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4835.json index 7aca270d960..fc2ac3ef763 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4835.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4835.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4835", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-17T11:59:03.157", - "lastModified": "2017-08-29T01:35:09.640", + "lastModified": "2024-11-21T02:10:57.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -95,6 +94,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95629", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95629", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4836.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4836.json index e56f8268b2f..8a28f3d409a 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4836.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4836.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4836", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:15.247", - "lastModified": "2017-08-29T01:35:09.687", + "lastModified": "2024-11-21T02:10:57.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -131,6 +130,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95630", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686240", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95630", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4837.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4837.json index 1c57505a291..da0f428b638 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4837.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4837.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4837", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:15.293", - "lastModified": "2017-08-29T01:35:09.750", + "lastModified": "2024-11-21T02:10:57.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -131,6 +130,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95631", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95631", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4838.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4838.json index fce668ea10b..f166990f77c 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4838.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4838.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4838", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:15.340", - "lastModified": "2017-08-29T01:35:09.797", + "lastModified": "2024-11-21T02:10:57.780", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -131,6 +130,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95634", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95634", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4839.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4839.json index 1153ea9878a..3b54792b743 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4839.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4839.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4839", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-29T10:55:04.540", - "lastModified": "2017-08-29T01:35:09.890", + "lastModified": "2024-11-21T02:10:57.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -117,6 +116,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95635", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95635", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4840.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4840.json index 9cf5b4be38b..03924b0c622 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4840.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4840.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4840", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:15.387", - "lastModified": "2017-08-29T01:35:09.937", + "lastModified": "2024-11-21T02:10:57.997", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -131,6 +130,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95636", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686230", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95636", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4844.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4844.json index 59c75c2be53..3b49b849bb5 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4844.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4844.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4844", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-17T00:59:00.063", - "lastModified": "2017-08-29T01:35:10.017", + "lastModified": "2024-11-21T02:10:58.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -144,6 +143,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95724", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51286", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21690554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95724", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4845.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4845.json index 530159cabec..14a53247142 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4845.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4845.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4845", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T14:55:04.397", - "lastModified": "2015-08-07T18:20:02.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:58.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127289/WordPress-Bannerman-0.2.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68278", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4846.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4846.json index 07ad93ad224..af2292bb637 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4846.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4846.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4846", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T14:55:04.443", - "lastModified": "2015-09-02T17:19:16.260", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:58.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127288/WordPress-ml-slider-2.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68283", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4847.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4847.json index de7be573ef4..fcfb3d11e5f 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4847.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4847.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4847", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T16:55:05.657", - "lastModified": "2015-09-02T17:19:37.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:58.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127292/WordPress-Random-Banner-1.1.2.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4848.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4848.json index a36950f2034..63c9c6178cf 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4848.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4848.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4848", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T16:55:05.703", - "lastModified": "2015-09-02T17:21:28.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:58.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127290/WordPress-Blogstand-Smart-Banner-1.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68282", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4849.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4849.json index 9f48be2e3e9..06ba30774f4 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4849.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4849.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4849", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T16:55:05.737", - "lastModified": "2014-07-10T17:42:19.423", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:58.867", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127358/FoeCMS-XSS-SQL-Injection-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4850.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4850.json index 827bbb8f402..a65ee316bb7 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4850.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4850.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4850", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T16:55:05.783", - "lastModified": "2014-07-10T17:51:22.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:58.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127358/FoeCMS-XSS-SQL-Injection-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4851.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4851.json index 606305c4503..29ea9b5d3e3 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4851.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4851.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4851", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T16:55:05.830", - "lastModified": "2014-07-10T17:54:19.747", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:10:59.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +77,14 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127358/FoeCMS-XSS-SQL-Injection-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4852.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4852.json index c06c43cebf2..fd4831f9e3a 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4852.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4852.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4852", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T16:55:06.017", - "lastModified": "2014-07-11T00:08:26.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:59.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/68437", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127371/Atom-CMS-Shell-Upload-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68437", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4853.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4853.json index 17b1da2bffe..a60795afe90 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4853.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4853.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4853", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T16:55:06.203", - "lastModified": "2014-07-11T00:10:59.870", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:59.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -154,6 +153,28 @@ { "url": "https://github.com/opendocman/opendocman/issues/163", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127330/OpenDocMan-1.2.7.2-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opendocman.com/opendocman-v1-2-7-3-release-notes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/opendocman/opendocman/commit/d202ef3def8674be61a3e4ccbe28beba4953b7ce", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/opendocman/opendocman/issues/163", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4854.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4854.json index 6af66d5ddcc..74520a58157 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4854.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4854.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4854", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T16:55:06.250", - "lastModified": "2015-09-16T19:29:18.903", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:59.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127287/WordPress-Construction-Mode-1.8-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4855.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4855.json index a48da2a567a..3a02a5e1ee3 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4855.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4855.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4855", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T16:55:06.533", - "lastModified": "2014-07-11T00:42:54.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:59.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,17 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/59357", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/plugins/polylang/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4856.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4856.json index d0d5e112f94..99567923e8d 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4856.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4856.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4856", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-10T16:55:06.563", - "lastModified": "2014-07-11T00:49:58.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:59.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/59323", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/plugins/polldaddy/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4857.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4857.json index e52935c29f3..4286c4fffe6 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4857.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4857.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4857", "sourceIdentifier": "cret@cert.org", "published": "2014-07-26T15:55:04.277", - "lastModified": "2014-07-28T19:05:18.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:10:59.973", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://forum.gurock.com/topic/1652/testrail-313-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/669804", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4858.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4858.json index 0161e06a8ae..0de93627a0c 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4858.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4858.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4858", "sourceIdentifier": "cret@cert.org", "published": "2014-07-26T11:11:57.457", - "lastModified": "2015-10-06T02:33:54.010", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:00.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -108,6 +107,18 @@ { "url": "http://www.securityfocus.com/bid/68899", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/394540", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68899", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4862.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4862.json index b0eb5221a69..b31e7424d59 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4862.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4862.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4862", "sourceIdentifier": "cret@cert.org", "published": "2014-09-05T17:55:06.907", - "lastModified": "2014-09-08T17:23:42.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:00.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,17 @@ { "url": "https://community.rapid7.com/community/metasploit/blog/2014/08/21/more-snmp-information-leaks-cve-2014-4862-and-cve-2014-4863", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/259548", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://community.rapid7.com/community/metasploit/blog/2014/08/21/more-snmp-information-leaks-cve-2014-4862-and-cve-2014-4863", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4863.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4863.json index 70a43ab7f8b..e3c4b790274 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4863.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4863.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4863", "sourceIdentifier": "cret@cert.org", "published": "2014-09-05T17:55:06.953", - "lastModified": "2014-09-08T17:11:09.140", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:00.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/855836", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://community.rapid7.com/community/metasploit/blog/2014/08/21/more-snmp-information-leaks-cve-2014-4862-and-cve-2014-4863", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4864.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4864.json index 34961923b24..9039431d626 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4864.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4864.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4864", "sourceIdentifier": "cret@cert.org", "published": "2014-09-10T10:55:08.347", - "lastModified": "2014-09-10T17:45:25.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:00.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/396212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4865.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4865.json index 8b95acb4dea..d06974515ee 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4865.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4865.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4865", "sourceIdentifier": "cret@cert.org", "published": "2014-09-10T18:55:02.927", - "lastModified": "2015-08-28T16:36:03.210", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:00.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/38", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/241508", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4867.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4867.json index 9915c9f5358..0ce87923fbd 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4867.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4867.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4867", "sourceIdentifier": "cret@cert.org", "published": "2014-10-10T10:55:07.493", - "lastModified": "2014-10-15T15:22:44.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:00.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 6.8, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -109,6 +108,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/280844", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4868.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4868.json index 95c172dad2f..52d7cb121dd 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4868.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4868.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4868", "sourceIdentifier": "cret@cert.org", "published": "2014-10-07T10:55:04.290", - "lastModified": "2014-10-07T23:00:29.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:01.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -101,6 +100,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/111588", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4869.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4869.json index 094b8a76bd4..792b400f220 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4869.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4869.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4869", "sourceIdentifier": "cret@cert.org", "published": "2014-10-07T10:55:04.337", - "lastModified": "2014-10-07T23:02:39.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:01.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -101,6 +100,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/111588", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4870.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4870.json index 8faa2db3d59..f6480896c8c 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4870.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4870.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4870", "sourceIdentifier": "cret@cert.org", "published": "2014-10-07T10:55:04.387", - "lastModified": "2014-10-07T23:02:10.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:01.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -101,6 +100,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/111588", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4871.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4871.json index 1be615ba0ae..9343b3e1546 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4871.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4871.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4871", "sourceIdentifier": "cret@cert.org", "published": "2014-10-07T10:55:04.433", - "lastModified": "2015-10-06T02:38:29.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:01.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,18 @@ { "url": "http://www.securityfocus.com/bid/70253", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/941108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70253", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4872.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4872.json index f059ed5593f..58f086e4142 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4872.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4872.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4872", "sourceIdentifier": "cret@cert.org", "published": "2014-10-10T10:55:07.523", - "lastModified": "2023-08-02T19:00:25.903", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-306: Missing Authentication for Critical Function", + "lastModified": "2024-11-21T02:11:01.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +94,31 @@ "Broken Link", "Third Party Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/121036", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-306: Missing Authentication for Critical Function" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4873.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4873.json index 732ae5f920f..3caf2c7aae1 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4873.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4873.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4873", "sourceIdentifier": "cret@cert.org", "published": "2014-10-10T10:55:07.570", - "lastModified": "2023-08-02T16:20:01.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:01.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/121036", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70268", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4874.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4874.json index 73a601fe856..f3ea0ea6964 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4874.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4874.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4874", "sourceIdentifier": "cret@cert.org", "published": "2014-10-10T10:55:07.617", - "lastModified": "2023-08-02T16:19:55.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:01.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,30 @@ "Broken Link", "Third Party Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/121036", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4877.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4877.json index 614ba5f9f33..e3daf15ce7a 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4877.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4877.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4877", "sourceIdentifier": "cret@cert.org", "published": "2014-10-29T10:55:05.417", - "lastModified": "2017-02-17T02:59:00.467", + "lastModified": "2024-11-21T02:11:02.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -214,6 +213,113 @@ { "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10106", "source": "cret@cert.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0431.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1764.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201411-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/685996", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70751", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2393-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1139181", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/rapid7/metasploit-framework/pull/4088", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10106", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4880.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4880.json index ece784f5f19..7e78ab813cf 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4880.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4880.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4880", "sourceIdentifier": "cret@cert.org", "published": "2014-12-08T11:59:07.127", - "lastModified": "2014-12-08T16:00:09.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:02.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129187/Hikvision-DVR-RTSP-Request-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35356", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4881.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4881.json index becad555818..eda44a966d8 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4881.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4881.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4881", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.427", - "lastModified": "2014-11-14T14:04:48.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:02.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/230145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4883.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4883.json index 43511d79370..90cc21f104a 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4883.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4883.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4883", "sourceIdentifier": "cret@cert.org", "published": "2014-11-28T02:59:04.677", - "lastModified": "2015-01-08T19:56:52.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:02.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/lwip.git/commit/?id=9fb46e120655ac481b2af8f865d5ae56c39b831a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/210620", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4884.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4884.json index cbf34ca2927..21a71101da1 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4884.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4884.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4884", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.173", - "lastModified": "2014-11-10T17:18:52.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:02.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/904489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4885.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4885.json index 99c37795615..baaf44e0f3c 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4885.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4885.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4885", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.233", - "lastModified": "2014-11-10T17:24:34.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:02.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/918657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4887.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4887.json index db34d091874..bf92cd815f7 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4887.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4887.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4887", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.280", - "lastModified": "2014-11-14T14:15:20.113", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:03.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/472321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4888.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4888.json index 2a5e1520668..5191e1741ec 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4888.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4888.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4888", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.327", - "lastModified": "2014-11-14T14:15:21.613", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:03.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/806633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4889.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4889.json index e473037f1c4..d941a45772a 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4889.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4889.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4889", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.377", - "lastModified": "2014-11-14T14:15:23.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:03.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/771257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4890.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4890.json index 38700abc49a..3eb33bf7051 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4890.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4890.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4890", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.423", - "lastModified": "2014-11-14T14:15:25.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:03.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/722857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4891.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4891.json index 8c671778604..945dc4b4268 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4891.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4891.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4891", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.470", - "lastModified": "2014-11-14T14:15:26.960", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:03.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/587953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4892.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4892.json index 2c070ebec3c..a2bd565d0ae 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4892.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4892.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4892", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.517", - "lastModified": "2014-11-14T14:15:28.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:03.837", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/200753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4894.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4894.json index 2dd7598f2e8..90ba94b6dab 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4894.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4894.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4894", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.563", - "lastModified": "2014-11-14T14:15:30.397", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:03.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/540257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4895.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4895.json index 5859035e9c0..5e0ba102dfb 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4895.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4895.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4895", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.610", - "lastModified": "2014-11-14T14:15:31.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:04.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/117329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4896.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4896.json index ccae3c1912f..304806e6744 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4896.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4896.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4896", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.657", - "lastModified": "2014-11-14T14:15:33.383", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:04.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/449353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4897.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4897.json index 48c40bdc440..2d8b532b05f 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4897.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4897.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4897", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.703", - "lastModified": "2014-11-14T14:15:34.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:04.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/480153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4898.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4898.json index 94b32a421f3..15603f23bed 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4898.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4898.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4898", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.750", - "lastModified": "2014-11-14T14:15:36.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:04.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/439409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4899.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4899.json index 25ade918f8c..4bb9a22d3f9 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4899.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4899.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4899", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.797", - "lastModified": "2014-11-14T14:15:37.883", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:04.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/876241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4900.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4900.json index 21cb204ad3b..38eccc92400 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4900.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4900.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4900", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.860", - "lastModified": "2014-11-14T14:15:39.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:04.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/428673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4901.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4901.json index e49bf989211..d2875b73d0d 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4901.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4901.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4901", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.907", - "lastModified": "2014-11-14T14:15:40.853", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:05.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/560497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4903.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4903.json index f3401d54e48..3a6eba0966e 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4903.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4903.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4903", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:03.953", - "lastModified": "2014-11-14T14:15:42.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:05.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/793257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4904.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4904.json index a74cba0062e..8804cd42178 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4904.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4904.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4904", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.000", - "lastModified": "2014-11-14T14:15:44.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:05.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/430345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4905.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4905.json index 0a829bcdcdd..dd40ab69944 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4905.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4905.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4905", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.047", - "lastModified": "2014-11-14T14:15:46.010", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:05.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/750753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4906.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4906.json index e232c3450d5..be2fc6bcb74 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4906.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4906.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4906", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.093", - "lastModified": "2014-11-14T14:15:48.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:05.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/825289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4907.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4907.json index 40f6c033b5b..685ddf1c502 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4907.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4907.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4907", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T11:08:22.760", - "lastModified": "2014-07-17T05:07:50.183", + "lastModified": "2024-11-21T02:11:05.947", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -224,6 +223,48 @@ { "url": "https://bugs.op5.com/view.php?id=8761", "source": "cve@mitre.org" + }, + { + "url": "http://docs.pnp4nagios.org/pnp-0.6/dwnld", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/07/11/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/p/pnp4nagios/code/ci/f846a6c9d007ca2bee05359af747619151195fc9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.op5.com/blog/news/op5-monitor-6-3-1-release-notes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68350", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.op5.com/view.php?id=8761", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4908.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4908.json index ee0b819d5ee..ce619917a28 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4908.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4908.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4908", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T11:08:22.823", - "lastModified": "2014-07-11T14:49:20.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:06.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -195,6 +194,34 @@ "Exploit", "Patch" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/07/11/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68352", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/lingej/pnp4nagios/commit/cb925073edeeb97eb4ce61a86cdafccc9b87f9bb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/lingej/pnp4nagios/commit/e4a19768a5c5e5b1276caf3dd5bb721a540ec014", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4909.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4909.json index 77be430e8a0..6e26fcb99e7 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4909.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4909.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4909", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-29T14:55:07.703", - "lastModified": "2014-11-14T03:06:21.653", + "lastModified": "2024-11-21T02:11:06.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -672,6 +671,76 @@ { "url": "https://twitter.com/benhawkes/statuses/484378151959539712", "source": "cve@mitre.org" + }, + { + "url": "http://inertiawar.com/submission.go", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135539.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60527", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/10/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/11/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/108997", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2279-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=516822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118290", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.transmissionbt.com/wiki/Changes#version-2.84", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://twitter.com/benhawkes/statuses/484378151959539712", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4910.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4910.json index 18a917be0e7..bafec6a0194 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4910.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4910.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4910", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-24T14:55:09.440", - "lastModified": "2017-08-29T01:35:10.077", + "lastModified": "2024-11-21T02:11:06.403", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -91,6 +90,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94746", "source": "cve@mitre.org" + }, + { + "url": "http://lists.x.org/archives/xorg-commit/2014-July/036840.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/108851", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/39", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94746", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4911.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4911.json index 5184459e85d..e634a9def62 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4911.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4911.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4911", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-22T14:55:09.817", - "lastModified": "2015-12-04T16:21:05.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:06.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -223,6 +222,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/60215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2981", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4927.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4927.json index 30c9b950a6e..04b2f1b5f49 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4927.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4927.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4927", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-24T14:55:09.520", - "lastModified": "2023-04-26T18:55:30.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:07.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -156,6 +155,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/109356", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127544/ACME-micro_httpd-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34102", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68746", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4929.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4929.json index bfefa29f4c8..1413fab94c0 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4929.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4929.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4929", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-20T14:55:06.173", - "lastModified": "2014-08-21T14:44:52.587", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:07.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -206,6 +205,25 @@ { "url": "http://www.securityfocus.com/bid/68975", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0301.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://owncloud.org/security/advisory/?id=oc-sa-2014-018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68975", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4930.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4930.json index d597f1f7e48..68db000bce3 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4930.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4930.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4930", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-29T13:55:04.347", - "lastModified": "2020-03-26T14:15:11.917", + "lastModified": "2024-11-21T02:11:07.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,18 @@ { "url": "http://www.securityfocus.com/bid/69420", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128012/ManageEngine-EventLog-Analyzer-7-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/74", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69420", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4936.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4936.json index 7af108a3d72..909d42ff849 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4936.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4936.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4936", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:02.827", - "lastModified": "2016-12-07T03:00:46.090", + "lastModified": "2024-11-21T02:11:08.053", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -99,6 +98,17 @@ { "url": "http://packetstormsecurity.com/files/130244/Malwarebytes-Anti-Malware-Anti-Exploit-Update-Remote-Code-Execution.html", "source": "cve@mitre.org" + }, + { + "url": "http://blog.0x3a.com/post/104954032239/cve-2014-4936-malwarebytes-anti-malware-and", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130244/Malwarebytes-Anti-Malware-Anti-Exploit-Update-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4937.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4937.json index 7547ee4dc95..92b29b8e920 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4937.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4937.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4937", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T20:55:03.157", - "lastModified": "2014-07-14T18:29:45.683", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:08.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-bookx-local-file-inclusion/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4938.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4938.json index 24a178cb76a..49ff880f31d 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4938.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4938.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4938", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T20:55:03.203", - "lastModified": "2014-07-14T17:42:08.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:08.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-rss-poster-a1-injection/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4939.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4939.json index 6004bc903fb..3a94cf016c5 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4939.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4939.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4939", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T20:55:03.250", - "lastModified": "2014-07-14T18:27:54.990", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:08.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-enl-newsletter-a1-injection/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4940.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4940.json index c4efb555532..57c77ce11f0 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4940.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4940.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4940", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T20:55:03.420", - "lastModified": "2014-07-14T18:25:01.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:08.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ "Exploit", "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-tera-chart-local-file-inclusion/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=851874%40tera-charts&old=799253%40tera-charts&sfp_email=&sfph_mail=", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4941.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4941.json index c432a5d8678..8867435a314 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4941.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4941.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4941", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T20:55:03.453", - "lastModified": "2014-07-14T18:20:50.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:08.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-cross-rss-local-file-inclusion/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4942.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4942.json index db05dcbb3a7..73c2ad5dadb 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4942.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4942.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4942", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-11T20:55:03.500", - "lastModified": "2014-07-14T18:12:38.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:08.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -106,6 +105,20 @@ "tags": [ "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-wp-easycart-information-disclosure/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=829290%40wp-easycart&old=827627%40wp-easycart&sfp_email=&sfph_mail=", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4943.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4943.json index 82318e9e6a1..62640df5bd6 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4943.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4943.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4943", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-19T19:55:08.230", - "lastModified": "2024-01-19T17:50:47.343", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:09.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -345,6 +344,178 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-0924.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/109277", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59790", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60071", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60220", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60380", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2992", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030610", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1119458", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/3cf521f7dc87c031617fd47e4b7aa2593c2f3daf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4944.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4944.json index 83a3281aac5..6b5ad09f440 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4944.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4944.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4944", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-14T14:55:07.293", - "lastModified": "2014-07-14T18:15:23.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:09.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127407/WordPress-BSK-PDF-Manager-1.3.2-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68488", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4945.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4945.json index bf413e9887b..66d353f5eb1 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4945.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4945.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4945", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-14T14:55:07.527", - "lastModified": "2014-07-14T18:25:42.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:09.383", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -283,6 +282,36 @@ { "url": "https://github.com/horde/horde/blob/c0144ac03814a8c2cf6fc5ac0d1af2653e9ee139/imp/docs/CHANGES", "source": "cve@mitre.org" + }, + { + "url": "http://lists.horde.org/archives/announce/2014/001019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.horde.org/archives/announce/2014/001025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59770", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59772", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/horde/horde/blob/4513649810f13a32f1193bdeed76f7d85a5efa05/bundles/webmail/docs/CHANGES", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/horde/horde/blob/c0144ac03814a8c2cf6fc5ac0d1af2653e9ee139/imp/docs/CHANGES", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4946.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4946.json index e8407bbd12a..be1f7acf499 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4946.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4946.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4946", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-14T14:55:07.590", - "lastModified": "2014-07-14T18:34:58.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:09.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -280,6 +279,33 @@ { "url": "https://github.com/horde/horde/blob/c0144ac03814a8c2cf6fc5ac0d1af2653e9ee139/imp/docs/CHANGES", "source": "cve@mitre.org" + }, + { + "url": "http://lists.horde.org/archives/announce/2014/001019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.horde.org/archives/announce/2014/001025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59770", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59772", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/horde/horde/blob/4513649810f13a32f1193bdeed76f7d85a5efa05/bundles/webmail/docs/CHANGES", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/horde/horde/blob/c0144ac03814a8c2cf6fc5ac0d1af2653e9ee139/imp/docs/CHANGES", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4947.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4947.json index 38aeead936b..00bdbda5dc5 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4947.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4947.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4947", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-22T20:55:02.123", - "lastModified": "2017-08-29T01:35:10.280", + "lastModified": "2024-11-21T02:11:09.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94631", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/60027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX140984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94631", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4948.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4948.json index 6b8037d4e90..c2ab5f3335e 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4948.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4948.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4948", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-22T20:55:02.170", - "lastModified": "2017-08-29T01:35:10.327", + "lastModified": "2024-11-21T02:11:09.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94632", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/60027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX140984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68660", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94632", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4954.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4954.json index 7a06a798519..1ef7b3a52f0 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4954.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4954.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4954", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-20T11:12:51.150", - "lastModified": "2015-09-03T14:54:49.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:10.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -111,6 +110,21 @@ { "url": "https://github.com/phpmyadmin/phpmyadmin/commit/57475371a5b515c83bfc1bb2efcdf3ddb14787ed", "source": "cve@mitre.org" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-4.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68798", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/57475371a5b515c83bfc1bb2efcdf3ddb14787ed", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4955.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4955.json index a6fc93ddeec..a3309bcb050 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4955.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4955.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4955", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-20T11:12:51.197", - "lastModified": "2015-09-03T14:56:39.823", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:10.213", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -279,6 +278,29 @@ { "url": "https://github.com/phpmyadmin/phpmyadmin/commit/10014d4dc596b9e3a491bf04f3e708cf1887d5e1", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00045.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/10014d4dc596b9e3a491bf04f3e708cf1887d5e1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4958.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4958.json index 1fb10c4a60e..beb1d68acbf 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4958.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4958.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4958", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-26T21:55:06.407", - "lastModified": "2015-09-16T19:30:20.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:10.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,22 @@ { "url": "http://www.securityfocus.com/archive/1/533537/30/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://blogs.telerik.com/blogs/14-09-24/securing-radeditor-content-and-preventing-xss-attacks", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://maverickblogging.com/disclosing-cve-2014-4958-stored-attribute-based-cross-site-scripting-xss-vulnerability-in-telerik-ui-for-asp-net-ajax-radeditor-control/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128414/Telerik-ASP.NET-AJAX-RadEditor-Control-2014.1.403.35-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533537/30/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4960.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4960.json index 4b99f51d2c7..544f5b7c261 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4960.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4960.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4960", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-21T14:55:06.800", - "lastModified": "2015-10-06T02:37:30.113", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:10.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -194,6 +193,24 @@ { "url": "http://www.securityfocus.com/bid/68676", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127497/Joomla-Youtube-Gallery-4.1.7-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68676", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4962.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4962.json index 79a8f1d31dd..b1ade338124 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4962.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4962.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4962", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-15T14:55:10.777", - "lastModified": "2018-10-09T19:49:51.817", + "lastModified": "2024-11-21T02:11:10.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "http://www.securityfocus.com/archive/1/532726/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/38", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532726/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4963.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4963.json index 3a5d633bbd9..4b4f9d620e8 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4963.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4963.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4963", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-15T14:55:10.827", - "lastModified": "2018-10-09T19:49:51.990", + "lastModified": "2024-11-21T02:11:10.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,14 @@ { "url": "http://www.securityfocus.com/archive/1/532726/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/38", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532726/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4964.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4964.json index 4317edcfdc1..64db0bec275 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4964.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4964.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4964", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-15T14:55:10.873", - "lastModified": "2018-10-09T19:49:52.177", + "lastModified": "2024-11-21T02:11:11.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "http://www.securityfocus.com/archive/1/532726/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/38", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532726/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4965.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4965.json index d8b23b8a3b1..d019ee35ca9 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4965.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4965.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4965", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-15T14:55:10.920", - "lastModified": "2018-10-09T19:49:52.380", + "lastModified": "2024-11-21T02:11:11.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94465", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/38", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532726/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94465", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4971.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4971.json index 0a545cced42..51287e78081 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4971.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4971.json @@ -2,10 +2,8 @@ "id": "CVE-2014-4971", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-26T15:55:04.387", - "lastModified": "2018-10-12T22:07:28.240", + "lastModified": "2024-11-21T02:11:11.677", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-123: Write-what-where Condition\n\nCWE-123: Write-what-where Condition", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -179,6 +177,114 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127535/Microsoft-XP-SP3-BthPan.sys-Arbitrary-Write-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127536/Microsoft-XP-SP3-MQAC.sys-Arbitrary-Write-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128674/Microsoft-Bluetooth-Personal-Area-Networking-BthPan.sys-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/96", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/97", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/60974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34112", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/109387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532843/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532844/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68764", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.korelogic.com/Resources/Advisories/KL-001-2014-002.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.korelogic.com/Resources/Advisories/KL-001-2014-003.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-123: Write-what-where Condition\n\nCWE-123: Write-what-where Condition" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4973.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4973.json index af194b88f65..54e130c740d 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4973.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4973.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4973", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-23T15:55:06.480", - "lastModified": "2014-09-24T14:53:29.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:11.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -157,6 +156,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/52", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4973/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4974.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4974.json index 85724e21b17..8833962265e 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4974.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4974.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4974", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T16:55:06.450", - "lastModified": "2017-08-29T01:35:10.453", + "lastModified": "2024-11-21T02:11:12.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -92,6 +91,26 @@ { "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4974/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128874/ESET-7.0-Kernel-Memory-Leak.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/118", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70770", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4974/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4975.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4975.json index 2ecfbf80090..23f2f3b36e0 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4975.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4975.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4975", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-15T20:59:01.453", - "lastModified": "2017-08-29T01:35:10.577", + "lastModified": "2024-11-21T02:11:12.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -308,6 +307,102 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94706", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0472.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1913.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1914.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3157", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/09/13", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68474", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2397-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.ruby-lang.org/issues/10019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118158", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94706", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4976.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4976.json index 93ab03c6de9..d3f4b986d2f 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4976.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4976.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4976", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-16T14:19:04.323", - "lastModified": "2018-03-12T17:23:48.680", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:12.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -118,6 +117,53 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/127429/Dell-Sonicwall-Scrutinizer-11.01-Code-Execution-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/44", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68495", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94438", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://gist.github.com/brandonprry/36b4b8df1cde279a9305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://gist.github.com/brandonprry/76741d9a0d4f518fe297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4977.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4977.json index 66c28abec57..53835d26150 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4977.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4977.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4977", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-16T14:19:04.370", - "lastModified": "2018-03-12T17:23:58.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:12.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -134,6 +133,69 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/127429/Dell-Sonicwall-Scrutinizer-11.01-Code-Execution-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/137098/Dell-SonicWALL-Scrutinizer-11.01-methodDetail-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/44", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68495", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94439", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://gist.github.com/brandonprry/36b4b8df1cde279a9305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://gist.github.com/brandonprry/76741d9a0d4f518fe297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/39836/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4979.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4979.json index 8b2449f6538..ae8d0bcce7a 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4979.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4979.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4979", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-26T11:11:57.660", - "lastModified": "2017-01-07T03:00:24.897", + "lastModified": "2024-11-21T02:11:12.817", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://support.apple.com/kb/HT6493", "source": "cve@mitre.org" + }, + { + "url": "http://support.apple.com/kb/HT6443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68852", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030638", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-264/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT6493", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4980.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4980.json index 7ba414cdb63..83fe8deca58 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4980.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4980.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4980", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-23T14:55:06.307", - "lastModified": "2018-10-09T19:49:54.473", + "lastModified": "2024-11-21T02:11:12.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -131,6 +130,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/127532/Tenable-Nessus-5.2.7-Parameter-Tampering-Authentication-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.halock.com/blog/cve-2014-4980-parameter-tampering-nessus-web-ui/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/109376", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532839/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68782", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.tenable.com/security/tns-2014-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4986.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4986.json index 05c6cf35ae5..64427f75b87 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4986.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4986.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4986", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-20T11:12:51.243", - "lastModified": "2016-12-22T02:59:16.500", + "lastModified": "2024-11-21T02:11:13.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -283,6 +282,33 @@ { "url": "https://security.gentoo.org/glsa/201505-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00045.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-6.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68803", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/29a1f56495a7d1d98da31a614f23c0819a606a4d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-49xx/CVE-2014-4987.json b/CVE-2014/CVE-2014-49xx/CVE-2014-4987.json index 7cca6f4f351..aed0779ac91 100644 --- a/CVE-2014/CVE-2014-49xx/CVE-2014-4987.json +++ b/CVE-2014/CVE-2014-49xx/CVE-2014-4987.json @@ -2,9 +2,8 @@ "id": "CVE-2014-4987", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-20T11:12:51.290", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-11-21T02:11:13.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -229,6 +228,39 @@ { "url": "https://security.gentoo.org/glsa/201505-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00045.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60397", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-7.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68804", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/395265e9937beb21134626c01a21f44b28e712e5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5005.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5005.json index e4a142d3d54..93a52ae66db 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5005.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5005.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5005", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:06.877", - "lastModified": "2020-01-17T22:15:11.547", + "lastModified": "2024-11-21T02:11:15.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,35 @@ { "url": "https://www.manageengine.com/products/desktop-central/remote-code-execution.html", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/110643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/88", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34594", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc9_file_upload.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.manageengine.com/products/desktop-central/remote-code-execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5006.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5006.json index 95b5f960423..e046144261b 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5006.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5006.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5006", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:06.923", - "lastModified": "2020-01-17T22:15:12.140", + "lastModified": "2024-11-21T02:11:15.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ { "url": "https://www.manageengine.com/products/desktop-central/remote-code-execution.html", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/110644", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/88", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34594", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_dc9_file_upload.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.manageengine.com/products/desktop-central/remote-code-execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5015.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5015.json index af367da107a..35bd0c8f347 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5015.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5015.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5015", "sourceIdentifier": "security@debian.org", "published": "2014-07-24T14:55:09.583", - "lastModified": "2017-08-29T01:35:10.953", + "lastModified": "2024-11-21T02:11:17.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -301,6 +300,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94751", "source": "security@debian.org" + }, + { + "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-007.txt.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/180", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.eterna.com.au/bozohttpd/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.eterna.com.au/bozohttpd/CHANGES", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/109283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68752", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94751", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5016.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5016.json index 0a2bc7160d6..6299a7bd12d 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5016.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5016.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5016", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-21T14:55:07.113", - "lastModified": "2014-07-22T13:58:23.813", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:17.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "Exploit", "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/LimeSurvey/LimeSurvey/commit/d23fbbd6c8434169967cf8bd2c5a4a0b569c352a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5017.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5017.json index 72fbc4a385b..f309e165b08 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5017.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5017.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5017", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-21T14:55:07.160", - "lastModified": "2014-07-22T14:01:32.023", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:17.383", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ "Exploit", "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/LimeSurvey/LimeSurvey/commit/9938bcd1df8ea27052557c722a67b00c0e7d6cb6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5018.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5018.json index f735e960813..09fcd797eb7 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5018.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5018.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5018", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-21T14:55:07.207", - "lastModified": "2014-07-22T14:01:41.993", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-184: Incomplete Blacklist", + "lastModified": "2024-11-21T02:11:17.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +85,22 @@ "Exploit", "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/127369/Lime-Survey-2.05-Build-140618-XSS-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/LimeSurvey/LimeSurvey/commit/3a6dd6b44cef2fa3f96f403e1cb971d8d0d694b5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } - ] + ], + "evaluatorComment": "CWE-184: Incomplete Blacklist" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5019.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5019.json index 5f395fc934d..9c8427304be 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5019.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5019.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5019", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-22T14:55:10.003", - "lastModified": "2014-07-22T19:00:15.103", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:17.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -518,6 +517,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/SA-CORE-2014-003", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5020.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5020.json index 44b1fbb3d97..d9422a7cabb 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5020.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5020.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5020", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-22T14:55:10.050", - "lastModified": "2014-07-22T19:03:38.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:17.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -303,6 +302,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/SA-CORE-2014-003", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5021.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5021.json index 8e18aeefb8e..e1eeb43d740 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5021.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5021.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5021", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-22T14:55:10.083", - "lastModified": "2014-07-22T19:10:21.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:17.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -517,6 +516,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/SA-CORE-2014-003", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5022.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5022.json index 4ac79a68782..eb801da27a5 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5022.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5022.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5022", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-22T14:55:10.130", - "lastModified": "2014-07-22T19:21:44.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:18.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -302,6 +301,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-2983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/SA-CORE-2014-003", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5023.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5023.json index 1f2a937cd38..1ff5cf5cb0b 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5023.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5023.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5023", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-22T14:55:10.177", - "lastModified": "2014-07-22T15:20:56.900", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection'", + "lastModified": "2024-11-21T02:11:18.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +77,14 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://hatriot.github.io/blog/2014/06/29/gitlist-rce/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection'" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5024.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5024.json index 976dbb37c54..cb165a7662e 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5024.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5024.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5024", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-24T14:55:09.910", - "lastModified": "2018-03-12T17:24:32.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:18.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,47 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/127575/SonicWALL-GMS-7.2-Build-7221.1701-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/125", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68829", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.software.dell.com/product-notification/128245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5025.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5025.json index 6e4a677552e..609e7464bb4 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5025.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5025.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5025", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T17:55:06.150", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:11:18.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -112,8 +111,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch", "Issue Tracking", + "Patch", "Vendor Advisory" ] }, @@ -155,6 +154,55 @@ { "url": "https://security.gentoo.org/glsa/201509-03", "source": "cve@mitre.org" + }, + { + "url": "http://bugs.cacti.net/view.php?id=2456", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00034.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68759", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94814", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201509-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5026.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5026.json index 8725e93b93f..63f4006917d 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5026.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5026.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5026", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T17:55:06.197", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:11:18.713", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -162,6 +161,62 @@ { "url": "https://security.gentoo.org/glsa/201509-03", "source": "cve@mitre.org" + }, + { + "url": "http://bugs.cacti.net/view.php?id=2456", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00034.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68759", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201509-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5027.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5027.json index d1971d8cf36..52c70ceaecd 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5027.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5027.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5027", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-25T19:55:04.363", - "lastModified": "2015-11-27T18:39:22.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:18.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -303,6 +302,43 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/207", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/219", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68858", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.reviewboard.org/docs/releasenotes/reviewboard/1.7.27", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.reviewboard.org/docs/releasenotes/reviewboard/2.0.4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.reviewboard.org/news/2014/07/22/review-board-1-7-27-and-2-0-3-security-releases", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5029.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5029.json index 44d18ddc858..77abbcc9094 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5029.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5029.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5029", "sourceIdentifier": "security@debian.org", "published": "2014-07-29T14:55:07.780", - "lastModified": "2017-01-07T03:00:25.037", + "lastModified": "2024-11-21T02:11:19.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 1.5, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 2.7, @@ -140,6 +139,50 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0313.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60509", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2990", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2341-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cups.org/str.php?L4455", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5030.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5030.json index 9e51e75d6a1..093a5893a99 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5030.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5030.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5030", "sourceIdentifier": "security@debian.org", "published": "2014-07-29T14:55:07.827", - "lastModified": "2017-01-07T03:00:25.100", + "lastModified": "2024-11-21T02:11:19.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -171,6 +170,50 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0313.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60509", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2990", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2341-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cups.org/str.php?L4455", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5031.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5031.json index ef0ae643358..f18fde9691e 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5031.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5031.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5031", "sourceIdentifier": "security@debian.org", "published": "2014-07-29T14:55:07.877", - "lastModified": "2017-01-07T03:00:25.163", + "lastModified": "2024-11-21T02:11:19.403", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -171,6 +170,50 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0313.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60509", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2990", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2341-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cups.org/str.php?L4455", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5032.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5032.json index d1056bea33c..02c0fccf7ec 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5032.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5032.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5032", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T18:59:00.073", - "lastModified": "2015-04-15T15:19:01.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:19.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ { "url": "https://forge.indepnet.net/issues/4984", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.glpi-project.org/spip.php?page=annonce&id_breve=325", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://forge.indepnet.net/issues/4984", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5033.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5033.json index 80c54d4e7a2..aafe69594bb 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5033.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5033.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5033", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-19T18:55:03.233", - "lastModified": "2014-10-16T07:22:55.077", + "lastModified": "2024-11-21T02:11:19.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -315,6 +314,53 @@ { "url": "http://www.ubuntu.com/usn/USN-2304-1", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1359.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60385", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kde.org/info/security/advisory-20140730-1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2304-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5035.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5035.json index fffdba3696e..bb0951acc97 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5035.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5035.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5035", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-26T14:55:06.033", - "lastModified": "2018-10-09T19:49:54.990", + "lastModified": "2024-11-21T02:11:19.963", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +86,23 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95254", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127843/Opendaylight-1.0-Local-File-Inclusion-Remote-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/34", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533114/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95254", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5036.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5036.json index e2f67e15f49..63c8f8c8bc4 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5036.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5036.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5036", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-05T14:55:03.553", - "lastModified": "2014-09-08T14:32:10.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:20.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -96,6 +95,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/60359", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60712", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.eucalyptus.com/resources/security/advisories/esa-23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5037.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5037.json index 5118673e083..12a6c22d741 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5037.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5037.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5037", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-07T19:55:03.747", - "lastModified": "2014-11-10T13:32:04.303", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:20.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -88,6 +87,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.eucalyptus.com/resources/security/advisories/esa-25", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5038.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5038.json index fef8f5b4a7e..dd1ec13690f 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5038.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5038.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5038", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-07T19:55:03.793", - "lastModified": "2014-11-10T13:37:10.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:20.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -159,6 +158,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.eucalyptus.com/resources/security/advisories/esa-26", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5045.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5045.json index fb82ba5db7d..9af3543a655 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5045.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5045.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5045", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-01T11:13:09.460", - "lastModified": "2023-11-07T02:20:42.420", + "lastModified": "2024-11-21T02:11:20.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 6.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -157,6 +156,66 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=295dc39d941dc2ae53d5c170365af4c9d5c16212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/24/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68862", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122472", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/295dc39d941dc2ae53d5c170365af4c9d5c16212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5073.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5073.json index 3718d3e4846..ecd89818f9e 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5073.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5073.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5073", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-29T16:55:11.013", - "lastModified": "2017-08-29T01:35:11.203", + "lastModified": "2024-11-21T02:11:21.867", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -132,6 +130,51 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95319", "source": "cve@mitre.org" + }, + { + "url": "http://disse.cting.org/2014/07/30/vmturbo-operation-manager-remote-command-execution/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127864/VMTurbo-Operations-Manager-4.6-vmtadmin.cgi-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/58880", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/secunia_research/2014-8/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34335", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/109572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95319", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5074.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5074.json index 3c3fea44536..8772a75155c 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5074.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5074.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5074", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-17T23:55:07.650", - "lastModified": "2018-05-25T01:29:00.367", + "lastModified": "2024-11-21T02:11:22.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -163,6 +162,30 @@ { "url": "https://www.exploit-db.com/exploits/44693/", "source": "cve@mitre.org" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-310688.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310688.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-226-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/44693/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5075.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5075.json index a82543b66e7..86147e1894f 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5075.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5075.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5075", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-25T21:55:04.177", - "lastModified": "2016-11-28T19:12:33.010", + "lastModified": "2024-11-21T02:11:22.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,22 @@ { "url": "http://www.securityfocus.com/bid/69064", "source": "cve@mitre.org" + }, + { + "url": "http://op-co.de/CVE-2014-5075.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1176.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69064", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5076.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5076.json index 50813d8630f..a49880e43ba 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5076.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5076.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5076", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-02T10:55:04.637", - "lastModified": "2014-09-02T19:13:12.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:22.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://www.youtube.com/watch?v=MF9lrh1kpDs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5077.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5077.json index d255d6bd490..f476766aaeb 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5077.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5077.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5077", "sourceIdentifier": "secalert@redhat.com", "published": "2014-08-01T11:13:09.507", - "lastModified": "2023-05-19T16:50:38.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:22.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -351,6 +350,169 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1be9a950c646c9092fb3618197f7b6bfb50e82aa", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1668.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1763.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60430", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60744", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62563", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/26/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2334-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2335-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2358-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2359-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95134", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5082.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5082.json index a235bad9516..f1fc6246fe5 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5082.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5082.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5082", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T18:55:05.730", - "lastModified": "2015-11-04T16:32:56.260", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:22.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -108,6 +107,17 @@ { "url": "http://www.exploit-db.com/exploits/34189", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34189", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5088.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5088.json index d8d753330d1..dac56102a44 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5088.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5088.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5088", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T18:55:05.777", - "lastModified": "2015-09-16T19:31:00.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:23.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/69012", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69012", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5089.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5089.json index 5af647d7b35..0e83cb005e8 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5089.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5089.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5089", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T18:55:05.823", - "lastModified": "2014-08-07T12:12:04.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:23.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5090.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5090.json index 630a6f2454f..253a8167143 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5090.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5090.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5090", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T18:55:05.870", - "lastModified": "2014-08-07T12:13:38.153", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:23.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5094.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5094.json index 1514d12b588..782b75e5448 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5094.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5094.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5094", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T15:55:04.543", - "lastModified": "2017-08-29T01:35:11.390", + "lastModified": "2024-11-21T02:11:24.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95114", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127719/Status2k-XSS-SQL-Injection-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95114", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5097.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5097.json index d2a2e72311c..9bdb8e849c6 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5097.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5097.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5097", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:07.673", - "lastModified": "2018-10-09T19:49:55.350", + "lastModified": "2024-11-21T02:11:24.667", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127943/ArticleFR-3.0.4-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533183/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69307", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-50xx/CVE-2014-5098.json b/CVE-2014/CVE-2014-50xx/CVE-2014-5098.json index 1dbf50dd433..b312bd9367b 100644 --- a/CVE-2014/CVE-2014-50xx/CVE-2014-5098.json +++ b/CVE-2014/CVE-2014-50xx/CVE-2014-5098.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5098", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T15:55:04.807", - "lastModified": "2018-10-09T19:49:55.693", + "lastModified": "2024-11-21T02:11:24.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/127854/Jamroom-5.2.6-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533120/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69219", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23224", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.jamroom.net/the-jamroom-network/networkmarket/43/search?expanded_changelog=1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5100.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5100.json index 9855182c1ae..b0525d664fc 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5100.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5100.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5100", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-25T19:55:04.987", - "lastModified": "2017-08-29T01:35:11.437", + "lastModified": "2024-11-21T02:11:24.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -130,6 +129,64 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94690", "source": "cve@mitre.org" + }, + { + "url": "http://omeka.org/blog/2014/07/16/omeka-2-2-1-security-update-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://omeka.org/codex/Release_Notes_for_2.2.1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127523/Omeka-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34100", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68707", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/codes/omeka_csrfxss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5193.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94690", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5101.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5101.json index 927c58c8da3..4e27bc31bef 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5101.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5101.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5101", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-25T19:55:05.037", - "lastModified": "2014-08-04T15:29:25.050", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:25.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/68519", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127431/WeBid-1.1.1-Cross-Site-Scripting-LDAP-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68519", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5102.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5102.json index a62f6a5a649..57fd9f77ffa 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5102.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5102.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5102", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-25T19:55:07.050", - "lastModified": "2015-10-06T02:36:42.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:25.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -138,6 +137,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/127537/vBulletin-5.1.2-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.pcworld.com/article/2455500/emergency-vbulletin-patch-fixes-dangerous-sql-injection-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68709", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/4097503-security-patch-release-for-vbulletin-5-0-4-5-0-5-5-1-0-5-1-1-and-5-1-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5103.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5103.json index 8dfda9c787c..e13690d5ff4 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5103.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5103.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5103", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-25T19:55:07.097", - "lastModified": "2020-03-26T14:15:12.417", + "lastModified": "2024-11-21T02:11:25.450", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "http://www.securityfocus.com/bid/68854", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127568/EventLog-Analyzer-9.0-Build-9000-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532856/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68854", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5104.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5104.json index 62b14386d26..a75c702f4a2 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5104.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5104.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5104", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-28T15:55:03.837", - "lastModified": "2014-07-29T13:04:46.570", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:25.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127521/OL-Commerce-2.1.1-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68719", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5105.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5105.json index 006270e92d3..05a598a2952 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5105.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5105.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5105", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-28T15:55:03.883", - "lastModified": "2014-07-29T13:05:37.980", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:25.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127521/OL-Commerce-2.1.1-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68719", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5106.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5106.json index 387fdb70f8c..a995e35a797 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5106.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5106.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5106", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-28T15:55:03.960", - "lastModified": "2020-06-03T14:54:57.137", + "lastModified": "2024-11-21T02:11:25.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -143,6 +142,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94693", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/532822/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94693", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5107.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5107.json index 23689853f22..900c8b9e7db 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5107.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5107.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5107", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-28T15:55:04.273", - "lastModified": "2021-07-15T20:42:50.310", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:26.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -171,6 +170,36 @@ "Broken Link", "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/show/osvdb/109269", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127493/Concrete-5.6.2.1-REFERER-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68685", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.concrete5.org/documentation/background/version_history/5-6-3-release-notes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5108.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5108.json index 8d8d7924c97..b7a84b80a74 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5108.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5108.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5108", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-28T15:55:04.320", - "lastModified": "2021-07-15T20:42:50.310", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:26.173", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -171,6 +170,36 @@ "Broken Link", "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/show/osvdb/109273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127493/Concrete-5.6.2.1-REFERER-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68685", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.concrete5.org/documentation/background/version_history/5-6-3-release-notes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5109.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5109.json index 0b7d8d02bee..2cae006eab9 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5109.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5109.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5109", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-28T15:55:04.383", - "lastModified": "2023-01-31T19:13:35.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:26.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ "tags": [ "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94718", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5110.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5110.json index d7ddea521cf..716cba979aa 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5110.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5110.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5110", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-28T15:55:04.430", - "lastModified": "2023-01-31T19:13:41.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:26.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ "tags": [ "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94719", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5111.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5111.json index 9a747ff19bd..6c7d5cbdb2a 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5111.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5111.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5111", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-28T15:55:04.477", - "lastModified": "2022-04-18T09:37:06.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:26.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5112.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5112.json index ba8cc8031d8..dba3e8344d3 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5112.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5112.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5112", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-28T15:55:04.507", - "lastModified": "2022-04-18T09:37:06.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:26.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5113.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5113.json index b48e2ee6b2d..d6c795c827d 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5113.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5113.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5113", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-28T15:55:04.570", - "lastModified": "2014-07-29T14:18:13.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:26.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127545/MyConnection-Server-MCS-9.7i-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://treadstonesecurity.blogspot.ca/2014/07/myconnection-server-mcs-reflective-xss.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5114.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5114.json index 6d8d4c61ca6..b551e244bbe 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5114.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5114.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5114", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-29T14:55:07.907", - "lastModified": "2014-07-30T17:02:32.653", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')", + "lastModified": "2024-11-21T02:11:27.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +84,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127431/WeBid-1.1.1-Cross-Site-Scripting-LDAP-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68519", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-90: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5115.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5115.json index 3726de30d1b..b5bcd35c66d 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5115.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5115.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5115", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-29T14:55:07.953", - "lastModified": "2014-08-27T05:37:20.580", + "lastModified": "2024-11-21T02:11:27.160", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127642/DirPHP-1.0-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34173", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5116.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5116.json index 472ef984edf..6691d7711e5 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5116.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5116.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5116", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-29T14:55:08.127", - "lastModified": "2014-07-30T17:18:48.997", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference\n", + "lastModified": "2024-11-21T02:11:27.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +85,22 @@ { "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9761", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/33384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/107083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9761", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference\n" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5117.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5117.json index 7b00833c742..15776b652e1 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5117.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5117.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5117", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-30T16:55:07.073", - "lastModified": "2017-01-07T03:00:25.787", + "lastModified": "2024-11-21T02:11:27.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -718,6 +717,37 @@ { "url": "https://trac.torproject.org/projects/tor/ticket/1038", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/60084", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.torproject.org/pipermail/tor-announce/2014-July/000093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.torproject.org/pipermail/tor-announce/2014-July/000094.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://lists.torproject.org/pipermail/tor-talk/2014-July/034180.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.torproject.org/projects/tor/ticket/1038", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5119.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5119.json index 9cfc1a82d3f..f9e5abb7de3 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5119.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5119.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5119", "sourceIdentifier": "secalert@redhat.com", "published": "2014-08-29T16:55:11.513", - "lastModified": "2023-02-13T00:42:19.853", + "lastModified": "2024-11-21T02:11:27.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -248,6 +247,167 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0092.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/69", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60358", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61074", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61093", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-5119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3012", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/13/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68983", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69738", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=96", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://rhn.redhat.com/errata/RHSA-2014-1110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201602-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17187", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5120.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5120.json index e5120fab771..1017eca2c64 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5120.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5120.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5120", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-23T01:55:02.103", - "lastModified": "2016-10-26T02:00:09.597", + "lastModified": "2024-11-21T02:11:27.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -445,6 +444,45 @@ { "url": "https://support.apple.com/HT204659", "source": "cve@mitre.org" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1327.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=67730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5121.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5121.json index 5a1e7a11bd1..24786820753 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5121.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5121.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5121", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:07.767", - "lastModified": "2024-05-21T12:29:46.173", + "lastModified": "2024-11-21T02:11:28.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "http://www.securitytracker.com/id/1030752", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127959/ArcGIS-For-Server-10.1.1-XSS-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533189/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030752", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5122.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5122.json index 72c228cb2bb..030b8ea9482 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5122.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5122.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5122", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:07.843", - "lastModified": "2024-05-21T12:29:46.173", + "lastModified": "2024-11-21T02:11:28.227", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +86,23 @@ { "url": "http://www.securitytracker.com/id/1030752", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127959/ArcGIS-For-Server-10.1.1-XSS-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533189/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69341", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030752", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5127.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5127.json index d2110187538..d6e816f5880 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5127.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5127.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5127", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-29T13:55:04.393", - "lastModified": "2018-10-09T19:49:57.207", + "lastModified": "2024-11-21T02:11:28.360", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +86,23 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95568", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128013/Encore-Discovery-Solution-4.3-Open-Redirect-Session-Token-In-URL.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533233/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95568", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5128.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5128.json index 1d6839db6eb..5720ed28d79 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5128.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5128.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5128", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-29T13:55:04.457", - "lastModified": "2018-10-09T19:49:57.583", + "lastModified": "2024-11-21T02:11:28.503", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95570", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128013/Encore-Discovery-Solution-4.3-Open-Redirect-Session-Token-In-URL.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533233/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95570", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5129.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5129.json index afe1927a432..e1c06dbed35 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5129.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5129.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5129", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T15:55:04.083", - "lastModified": "2019-03-11T19:36:19.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:28.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/128157/ProjectDox-8.1-XSS-User-Enumeration-Ciphertext-Reuse.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533345/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95734", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5136.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5136.json index 55c2fe2e1f4..3933750156b 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5136.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5136.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5136", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-02T14:55:03.417", - "lastModified": "2018-10-09T19:49:59.177", + "lastModified": "2024-11-21T02:11:29.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://www.securityfocus.com/bid/69466", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/533267/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69466", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5137.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5137.json index f42fe867ba6..83aaf708a32 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5137.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5137.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5137", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-02T14:55:03.463", - "lastModified": "2018-10-09T19:49:59.367", + "lastModified": "2024-11-21T02:11:29.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -75,6 +74,10 @@ { "url": "http://www.securityfocus.com/archive/1/533267/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/533267/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5139.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5139.json index 9fe184e0b21..600a24322b5 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5139.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5139.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5139", "sourceIdentifier": "cret@cert.org", "published": "2014-08-13T23:55:07.717", - "lastModified": "2023-11-07T02:20:43.020", + "lastModified": "2024-11-21T02:11:29.627", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -144,6 +142,14 @@ "url": "http://marc.info/?l=bugtraq&m=142350350616251&w=2", "source": "cret@cert.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142350350616251&w=2", + "source": "cret@cert.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142495837901899&w=2", + "source": "cret@cert.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142495837901899&w=2", "source": "cret@cert.org" @@ -164,6 +170,14 @@ "url": "http://marc.info/?l=bugtraq&m=142624679706236&w=2", "source": "cret@cert.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142624679706236&w=2", + "source": "cret@cert.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142624719706349&w=2", + "source": "cret@cert.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142624719706349&w=2", "source": "cret@cert.org" @@ -172,6 +186,10 @@ "url": "http://marc.info/?l=bugtraq&m=142660345230545&w=2", "source": "cret@cert.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142660345230545&w=2", + "source": "cret@cert.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142791032306609&w=2", "source": "cret@cert.org" @@ -318,6 +336,218 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-008.txt.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142350350616251&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142350350616251&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142495837901899&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142495837901899&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142624590206005&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142624619906067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142624619906067&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142624679706236&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142624679706236&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142624719706349&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142624719706349&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142660345230545&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142660345230545&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142791032306609&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143290437727362&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143290522027658&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59700", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59710", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60022", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60221", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60493", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60803", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60810", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60921", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61017", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61100", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61184", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61392", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61775", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61959", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-39.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15567.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686997", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2998", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.tenable.com/security/tns-2014-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=80bd7b41b30af6ee96f519e629463583318de3b0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=83764a989dcc87fbea337da5f8f86806fe767b7e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-September/000196.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:18.openssl.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20140806.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5146.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5146.json index 2f137fae4e1..b552e659525 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5146.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5146.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5146", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:08.283", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:11:30.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -175,6 +174,60 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136980.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136981.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69198", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030723", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-97.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5147.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5147.json index 7db2f369b41..01d03868c17 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5147.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5147.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5147", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-29T16:55:11.780", - "lastModified": "2018-10-30T16:26:53.700", + "lastModified": "2024-11-21T02:11:30.297", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:S/C:N/I:N/A:C", + "baseScore": 4.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 2.5, @@ -88,6 +87,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1030724", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5148.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5148.json index 25a3a91dd11..3a49f3b132c 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5148.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5148.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5148", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-26T20:55:03.180", - "lastModified": "2017-08-29T01:35:11.907", + "lastModified": "2024-11-21T02:11:30.450", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -100,6 +99,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95233", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/59934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69189", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xenproject.org/xsa/advisory-103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95233", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5149.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5149.json index cc67b1d4724..3b52fdc9f08 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5149.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5149.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5149", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:08.343", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:11:30.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -175,6 +174,60 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136980.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136981.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69199", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030723", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-97.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5158.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5158.json index 4ac3379b251..ab68d702de4 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5158.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5158.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5158", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-21T14:55:05.803", - "lastModified": "2014-08-21T16:49:13.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:30.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -217,6 +216,21 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-273/", "source": "cve@mitre.org" + }, + { + "url": "http://forums.alienvault.com/discussion/2559/security-advisory-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-272/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-273/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5159.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5159.json index 1afddaee7e9..e3b9d19a2a1 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5159.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5159.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5159", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-21T14:55:05.850", - "lastModified": "2014-08-21T16:52:27.390", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:30.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -213,6 +212,17 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-271/", "source": "cve@mitre.org" + }, + { + "url": "http://forums.alienvault.com/discussion/2559/security-advisory-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-271/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5160.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5160.json index b35c35c0799..c6269b195b7 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5160.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5160.json @@ -2,7 +2,7 @@ "id": "CVE-2014-5160", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-01T11:13:09.790", - "lastModified": "2024-08-06T12:15:31.283", + "lastModified": "2024-11-21T02:11:31.067", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +91,14 @@ { "url": "http://zerodayinitiative.com/advisories/ZDI-14-263/", "source": "cve@mitre.org" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-262/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-263/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5161.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5161.json index 07ad1ecea72..045e638ee01 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5161.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5161.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5161", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-01T11:13:10.163", - "lastModified": "2023-11-07T02:20:43.307", + "lastModified": "2024-11-21T02:11:31.207", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -142,6 +141,37 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=16f8ba1bed579344df373bf38fff552ab8baf380", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/57593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-08.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=16f8ba1bed579344df373bf38fff552ab8baf380", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5162.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5162.json index 1a491cf4ce5..012defb4cbd 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5162.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5162.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5162", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-01T11:13:10.210", - "lastModified": "2023-11-07T02:20:43.360", + "lastModified": "2024-11-21T02:11:31.367", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -142,6 +141,37 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=16f8ba1bed579344df373bf38fff552ab8baf380", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/57593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-08.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=16f8ba1bed579344df373bf38fff552ab8baf380", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5163.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5163.json index d3cf5502936..c06180bebd9 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5163.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5163.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5163", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-01T11:13:10.290", - "lastModified": "2023-11-07T02:20:43.433", + "lastModified": "2024-11-21T02:11:31.527", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -153,6 +152,48 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dd7134d907350ccc574cdec596f4162860912bb9", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/57593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10216", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3fc441e7a5008640c68ec985e669d5092414a519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dd7134d907350ccc574cdec596f4162860912bb9", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5164.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5164.json index 130c367dc62..6029f206f7c 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5164.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5164.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5164", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-01T11:13:10.337", - "lastModified": "2023-11-07T02:20:43.577", + "lastModified": "2024-11-21T02:11:31.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -149,6 +148,44 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ba6eb5c72ffe82ca0e51c7083240975a5b118ad2", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/57593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9795", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ba6eb5c72ffe82ca0e51c7083240975a5b118ad2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5165.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5165.json index 32cb9c0a261..84f4e0ad918 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5165.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5165.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5165", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-01T11:13:10.383", - "lastModified": "2023-11-07T02:20:43.647", + "lastModified": "2024-11-21T02:11:31.847", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -146,6 +145,41 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=17a552666b50896a9b9dde8ee6a1052e7f9a622e", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/57593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-11.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10187", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=17a552666b50896a9b9dde8ee6a1052e7f9a622e", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5169.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5169.json index a7513d4170b..2192aaadae4 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5169.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5169.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5169", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T17:55:06.493", - "lastModified": "2014-10-24T18:11:47.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:31.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -98,6 +97,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/31/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/31/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68974", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2311887", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2312609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5171.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5171.json index 0b0bfd2e8e1..8a457061f29 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5171.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5171.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5171", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-31T14:55:04.097", - "lastModified": "2023-12-21T04:14:54.460", + "lastModified": "2024-11-21T02:11:32.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -99,6 +98,34 @@ { "url": "https://service.sap.com/sap/support/notes/1963932", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127666/SAP-HANA-XS-Missing-Encryption.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/149", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-021", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532940/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1963932", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5172.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5172.json index 31f00e469fd..22cf7d46260 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5172.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5172.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5172", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-31T14:55:04.143", - "lastModified": "2018-10-09T19:50:00.053", + "lastModified": "2024-11-21T02:11:32.433", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,42 @@ { "url": "https://service.sap.com/sap/support/notes/1993349", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59634", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532941/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68952", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1993349", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5173.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5173.json index 893bfa244c5..bc7b2dc5fe1 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5173.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5173.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5173", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-31T14:55:04.190", - "lastModified": "2023-12-21T04:14:54.460", + "lastModified": "2024-11-21T02:11:32.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,34 @@ { "url": "https://service.sap.com/sap/support/notes/1964428", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127667/SAP-HANA-IU5-SDK-Authentication-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532944/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94931", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1964428", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5174.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5174.json index f059979a85d..b8ef32fecb7 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5174.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5174.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5174", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-31T14:55:04.237", - "lastModified": "2017-08-29T01:35:12.157", + "lastModified": "2024-11-21T02:11:32.733", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -103,6 +102,38 @@ { "url": "https://service.sap.com/sap/support/notes/1974016", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127671/SAP-Netweaver-Business-Warehouse-Missing-Authorization.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/154", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-026", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94921", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1974016", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5175.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5175.json index b1fed5387b3..3e28bace6ac 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5175.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5175.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5175", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-31T14:55:04.300", - "lastModified": "2017-08-29T01:35:12.203", + "lastModified": "2024-11-21T02:11:32.883", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,34 @@ { "url": "https://service.sap.com/sap/support/notes/1778940", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/151", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-023", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68949", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94932", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1778940", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5176.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5176.json index 3b342d90706..5ef3b4699c5 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5176.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5176.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5176", "sourceIdentifier": "cve@mitre.org", "published": "2014-07-31T14:55:04.347", - "lastModified": "2018-10-09T19:50:01.617", + "lastModified": "2024-11-21T02:11:33.037", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-798: Use of Hard-coded Credentials", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -108,6 +106,43 @@ { "url": "https://service.sap.com/sap/support/notes/1929473", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127669/SAP-FI-Manager-Self-Service-Hardcoded-Username.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/152", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-024", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532945/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94923", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1929473", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-798: Use of Hard-coded Credentials" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5177.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5177.json index 8592d3aed1a..ed288260737 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5177.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5177.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5177", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-03T18:55:05.693", - "lastModified": "2019-04-22T17:48:00.643", + "lastModified": "2024-11-21T02:11:33.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 1.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.2 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -247,6 +246,42 @@ { "url": "http://www.ubuntu.com/usn/USN-2366-1", "source": "cve@mitre.org" + }, + { + "url": "http://libvirt.org/news.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-0560.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.libvirt.org/2014/0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2366-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5178.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5178.json index 3715a1b97aa..d9592a249c7 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5178.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5178.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5178", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T18:55:06.090", - "lastModified": "2018-10-09T19:50:02.317", + "lastModified": "2024-11-21T02:11:33.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94887", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127622/Easy-File-Sharing-Persistent-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/60524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/532897/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94887", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5179.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5179.json index ad010a22040..5a542155a81 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5179.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5179.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5179", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T18:55:06.277", - "lastModified": "2017-09-08T01:29:04.260", + "lastModified": "2024-11-21T02:11:33.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/68861", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94870", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2308503", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5180.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5180.json index 63033267919..ce371d375af 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5180.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5180.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5180", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T19:55:04.180", - "lastModified": "2014-08-07T12:30:21.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:33.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -86,6 +85,21 @@ "Exploit", "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-hdw-player-video-player-video-gallery-a1-injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=900030%40hdw-player-video-player-video-gallery&old=798976%40hdw-player-video-player-video-gallery&sfp_email=&sfph_mail=", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5181.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5181.json index a9735445150..996183485d4 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5181.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5181.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5181", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T19:55:04.213", - "lastModified": "2014-08-07T12:42:43.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:33.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-lastfm-rotation-local-file-inclusion", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5182.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5182.json index 2fa3f6fc199..963d45183f6 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5182.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5182.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5182", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T19:55:04.273", - "lastModified": "2014-08-07T12:46:24.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:33.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -93,6 +92,28 @@ "Exploit", "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-yawpp-a1-injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/yawpp/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=834445%40yawpp&old=824042%40yawpp&sfp_email=&sfph_mail=#file36", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5183.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5183.json index bc7318ec07a..925d7266115 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5183.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5183.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5183", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T19:55:04.320", - "lastModified": "2014-08-07T13:30:45.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:34.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -92,6 +91,21 @@ "Exploit", "Patch" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-simple-retail-menus-a1-injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=861170%40simple-retail-menus&old=728969%40simple-retail-menus&sfp_email=&sfph_mail=#file1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5184.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5184.json index 83de00811d7..b4451079ed8 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5184.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5184.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5184", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T19:55:04.367", - "lastModified": "2014-08-07T13:06:02.500", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:34.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-stripshow-a1-injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5185.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5185.json index 6656b051c0c..4bb5b9e4502 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5185.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5185.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5185", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T19:55:04.400", - "lastModified": "2014-08-07T13:14:16.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:34.387", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-quartz-a1-injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5186.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5186.json index 95583cf8f25..94a525da858 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5186.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5186.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5186", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T19:55:04.447", - "lastModified": "2014-08-07T13:22:43.563", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:34.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-all-video-gallery-a1-injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5187.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5187.json index b98a5176265..73d79b95e5e 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5187.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5187.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5187", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-06T19:55:04.493", - "lastModified": "2014-08-07T13:25:38.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:34.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-tom-m8te-local-file-inclusion", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5188.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5188.json index c95d9133fb7..476609c05ea 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5188.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5188.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5188", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-07T11:13:36.577", - "lastModified": "2017-09-08T01:29:04.307", + "lastModified": "2024-11-21T02:11:34.793", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95024", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127672/Lyris-ListManagerWeb-8.95a-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68973", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://xerosecurity.com/?p=94", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95024", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5189.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5189.json index 3e17e3c482f..7e29c687aa7 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5189.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5189.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5189", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-07T11:13:36.733", - "lastModified": "2017-09-08T01:29:04.357", + "lastModified": "2024-11-21T02:11:34.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94912", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/109642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127640/WordPress-Lead-Octopus-Power-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68934", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94912", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5190.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5190.json index 831ac656418..191037a05e0 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5190.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5190.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5190", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-07T11:13:36.780", - "lastModified": "2017-09-08T01:29:04.417", + "lastModified": "2024-11-21T02:11:35.107", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95104", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127723/WordPress-SI-CAPTCHA-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95104", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5191.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5191.json index 5bddcb5f667..9073f483b95 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5191.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5191.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5191", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-07T11:13:37.063", - "lastModified": "2015-09-08T17:51:49.773", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:35.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,22 @@ { "url": "http://www.securityfocus.com/bid/69161", "source": "cve@mitre.org" + }, + { + "url": "http://ckeditor.com/node/136981", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69161", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5192.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5192.json index 023bb4ad70a..8b0195d2e9f 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5192.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5192.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5192", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-07T11:13:37.110", - "lastModified": "2017-09-08T01:29:04.463", + "lastModified": "2024-11-21T02:11:35.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95016", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/34189", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95016", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5193.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5193.json index a465e4ab916..4386fd81aba 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5193.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5193.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5193", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-07T11:13:37.157", - "lastModified": "2015-12-04T16:18:00.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:35.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/109799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/109800", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34189", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5194.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5194.json index c25912c8b65..6214d358806 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5194.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5194.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5194", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-07T11:13:37.203", - "lastModified": "2020-10-27T16:15:12.330", + "lastModified": "2024-11-21T02:11:35.723", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/159715/Sphider-Search-Engine-1.3.6-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34189", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5195.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5195.json index 648102a0900..0e96cfb17b1 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5195.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5195.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5195", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-07T11:13:37.360", - "lastModified": "2017-09-08T01:29:04.510", + "lastModified": "2024-11-21T02:11:35.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -119,6 +118,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95199", "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/109788", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2303-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/unity/7.2/+bug/1349128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95199", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5196.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5196.json index fb326443f01..9fc494eef35 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5196.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5196.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5196", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-12T20:55:03.713", - "lastModified": "2015-12-04T16:17:12.343", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:36.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/60590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/plugins/improved-user-search-in-backend/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.dxw.com/advisories/csrf-and-xss-in-improved-user-search-allow-execution-of-arbitrary-javascript-in-wordpress-admin-area/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5197.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5197.json index 396c0b0fb31..51f6edaefa3 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5197.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5197.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5197", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-12T20:55:03.917", - "lastModified": "2014-08-13T18:29:42.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:36.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -97,6 +96,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/59940", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030690", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.splunk.com/view/SP-CAAAM9H", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5198.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5198.json index 4a97a78ac60..356c17a9b87 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5198.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5198.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5198", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-12T20:55:03.963", - "lastModified": "2014-08-13T18:28:50.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:36.283", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/59940", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030690", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.splunk.com/view/SP-CAAAM9H", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-51xx/CVE-2014-5199.json b/CVE-2014/CVE-2014-51xx/CVE-2014-5199.json index cf17db54c31..d6f2df3b102 100644 --- a/CVE-2014/CVE-2014-51xx/CVE-2014-5199.json +++ b/CVE-2014/CVE-2014-51xx/CVE-2014-5199.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5199", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-12T20:55:04.010", - "lastModified": "2014-08-13T18:40:31.903", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:36.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/60520", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/plugins/wp-file-upload/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5200.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5200.json index 1833fda8fd4..ba7e6c5f32f 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5200.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5200.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5200", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-12T20:55:04.057", - "lastModified": "2017-09-08T01:29:04.573", + "lastModified": "2024-11-21T02:11:36.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94916", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127639", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94916", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5201.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5201.json index 8a0890860a3..2b7e32e9863 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5201.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5201.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5201", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-12T20:55:04.290", - "lastModified": "2015-09-08T17:53:07.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:36.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127533/WordPress-Gallery-Objects-0.4-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.homelab.it/index.php/2014/07/18/wordpress-gallery-objects-0-4-sql-injection/#sthash.ftMVwBVK.dpbs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5202.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5202.json index 7ea2de59203..c72aebb5d99 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5202.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5202.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5202", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-12T23:55:04.407", - "lastModified": "2014-08-13T17:38:28.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:36.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -92,6 +91,27 @@ "tags": [ "Patch" ] + }, + { + "url": "http://downloads.wordpress.org/plugin/compfight.1.5.zip", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127430/WordPress-Compfight-1.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/compfight/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5203.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5203.json index 9123c228080..7d56c8f2846 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5203.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5203.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5203", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-18T11:15:26.357", - "lastModified": "2014-08-28T18:06:14.533", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:36.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/08/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://core.trac.wordpress.org/changeset/29389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/08/wordpress-3-9-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5204.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5204.json index 75610ca25ae..4c6834eaf1b 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5204.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5204.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5204", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-18T11:15:26.403", - "lastModified": "2015-11-25T20:21:45.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:37.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/08/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://core.trac.wordpress.org/changeset/29384", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/08/wordpress-3-9-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5205.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5205.json index f814d67c4ea..31d3ba2b5cd 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5205.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5205.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5205", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-18T11:15:26.450", - "lastModified": "2014-11-14T03:06:39.750", + "lastModified": "2024-11-21T02:11:37.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/08/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://core.trac.wordpress.org/changeset/29408", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/08/wordpress-3-9-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5206.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5206.json index 48374c48f76..cde99bcef82 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5206.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5206.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5206", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-18T11:15:27.107", - "lastModified": "2023-11-07T02:20:43.970", + "lastModified": "2024-11-21T02:11:37.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -165,6 +164,57 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a6138db815df5ee542d848318e5dae681590fccd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/13/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69214", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2317-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2318-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/a6138db815df5ee542d848318e5dae681590fccd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5207.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5207.json index 4854d038e3b..b10fbbeb418 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5207.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5207.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5207", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-18T11:15:27.153", - "lastModified": "2023-11-07T02:20:44.047", + "lastModified": "2024-11-21T02:11:37.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 6.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -184,6 +183,98 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9566d6742852c527bf5af38af5cbb878dad75705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/110055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/352", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34923", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/13/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69216", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2317-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2318-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95266", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/9566d6742852c527bf5af38af5cbb878dad75705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5208.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5208.json index 4acac98ce9e..d2cb92cf23f 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5208.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5208.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5208", "sourceIdentifier": "cret@cert.org", "published": "2014-12-22T17:59:00.063", - "lastModified": "2014-12-22T19:27:03.713", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:37.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -236,6 +235,28 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0003E.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://community.rapid7.com/community/metasploit/blog/2014/08/09/r7-2014-10-disclosure-yokogawa-centum-cs3000-bkbcopydexe-file-system-access", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-260-01A", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5210.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5210.json index b5de871a57c..0a539a97d37 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5210.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5210.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5210", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-21T14:55:05.897", - "lastModified": "2014-08-21T16:57:37.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:37.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -231,6 +230,25 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-295/", "source": "cve@mitre.org" + }, + { + "url": "http://forums.alienvault.com/discussion/2690", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69239", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-294/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-295/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5211.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5211.json index 61fb4942213..e41a6f30720 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5211.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5211.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5211", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:59:00.057", - "lastModified": "2015-01-28T16:08:34.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:38.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,42 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-008/", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62467", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.attachmate.com/techdocs/1708.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.attachmate.com/techdocs/2288.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.attachmate.com/techdocs/2501.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.attachmate.com/techdocs/2502.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-008/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5212.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5212.json index 399571af447..7761814200f 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5212.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5212.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5212", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T18:59:00.057", - "lastModified": "2015-11-13T16:51:16.570", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:38.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ { "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141219-0_NetIQ_eDirectory_iMonitor_XSS_Memory_Disclosure_v10.txt", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031408", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=904134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.novell.com/support/kb/doc.php?id=3426981", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141219-0_NetIQ_eDirectory_iMonitor_XSS_Memory_Disclosure_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5213.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5213.json index 7d664dc81ea..9e92f54cb1b 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5213.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5213.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5213", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T18:59:01.103", - "lastModified": "2015-11-13T16:51:57.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:38.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031408", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=904135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.novell.com/support/kb/doc.php?id=3426981", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141219-0_NetIQ_eDirectory_iMonitor_XSS_Memory_Disclosure_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5214.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5214.json index 949bbe2b461..33d7fa60fac 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5214.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5214.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5214", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-23T11:59:00.047", - "lastModified": "2021-04-09T16:36:15.873", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", + "lastModified": "2024-11-21T02:11:38.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -106,6 +104,36 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/78", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.novell.com/support/kb/doc.php?id=7015993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-2_Novell_NetIQ_Access_Manager_Multiple_Vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5215.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5215.json index f6ae4ad189c..6fe240cca5e 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5215.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5215.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5215", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-23T11:59:01.267", - "lastModified": "2021-04-09T16:36:15.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:38.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -105,6 +104,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/78", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.novell.com/support/kb/doc.php?id=7015995", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-2_Novell_NetIQ_Access_Manager_Multiple_Vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5216.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5216.json index a7dd888c308..9db6bd48883 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5216.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5216.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5216", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-23T11:59:02.220", - "lastModified": "2021-04-09T16:36:15.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:38.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,43 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/78", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.novell.com/support/kb/doc.php?id=7015994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://www.novell.com/support/kb/doc.php?id=7015996", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-2_Novell_NetIQ_Access_Manager_Multiple_Vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5217.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5217.json index b1485f47f46..bd734887c26 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5217.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5217.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5217", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-23T11:59:03.157", - "lastModified": "2021-04-09T16:36:15.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:38.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/78", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.novell.com/support/kb/doc.php?id=7015997", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-2_Novell_NetIQ_Access_Manager_Multiple_Vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5231.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5231.json index 80fa561ec3d..a09653f1138 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5231.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5231.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5231", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-14T11:59:00.053", - "lastModified": "2015-11-13T16:52:17.800", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:39.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -95,6 +94,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1031546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-311299.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5232.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5232.json index 2f5691cddc1..03cfefa4760 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5232.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5232.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5232", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-14T11:59:01.587", - "lastModified": "2015-11-13T16:52:38.230", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:39.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -95,6 +94,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1031546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-311299.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5233.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5233.json index c629b55936a..695352508aa 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5233.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5233.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5233", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-14T11:59:02.507", - "lastModified": "2015-11-13T16:53:16.803", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:39.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -95,6 +94,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1031546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-311299.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5234.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5234.json index 2e72534d2a1..080ea2ceb37 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5234.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5234.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5234", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-17T14:55:03.447", - "lastModified": "2018-10-09T19:50:02.647", + "lastModified": "2024-11-21T02:11:39.780", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -145,6 +144,29 @@ { "url": "http://www.securityfocus.com/bid/69796", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://software.open-xchange.com/OX6/doc/Release_Notes_for_Patch_Release_2112_7.6.0_2014-08-25.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533443/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69796", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5235.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5235.json index 15bf430736d..05edf4fe379 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5235.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5235.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5235", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-17T14:55:03.497", - "lastModified": "2018-10-09T19:50:02.990", + "lastModified": "2024-11-21T02:11:39.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -145,6 +144,29 @@ { "url": "http://www.securityfocus.com/bid/69792", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://software.open-xchange.com/OX6/doc/Release_Notes_for_Patch_Release_2112_7.6.0_2014-08-25.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533443/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69792", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5237.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5237.json index 37432c29910..3c257764c1d 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5237.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5237.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5237", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T15:59:04.297", - "lastModified": "2018-12-18T14:42:36.063", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)", + "lastModified": "2024-11-21T02:11:40.213", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -130,6 +128,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/128257/Open-Xchange-7.6.0-XSS-SSRF-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://software.open-xchange.com/OX6/doc/Release_Notes_for_Patch_Release_2112_7.6.0_2014-08-25.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533443/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } - ] + ], + "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5239.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5239.json index 63a6a6043b6..29f623a4d4a 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5239.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5239.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5239", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-14T05:01:50.863", - "lastModified": "2015-12-04T16:19:59.103", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:40.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -110,6 +109,24 @@ { "url": "http://www.securitytracker.com/id/1030733", "source": "cve@mitre.org" + }, + { + "url": "http://jvn.jp/en/jp/JVN72950786/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000086", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030733", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5240.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5240.json index ecf34662275..074c172b6c2 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5240.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5240.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5240", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-18T11:15:27.200", - "lastModified": "2015-11-25T20:22:11.533", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:40.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -262,6 +261,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/08/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://core.trac.wordpress.org/changeset/29398", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/08/wordpress-3-9-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5241.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5241.json index 65d6e3f393b..a27e38d32c0 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5241.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5241.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5241", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T17:55:02.813", - "lastModified": "2017-01-07T03:00:27.180", + "lastModified": "2024-11-21T02:11:40.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -350,6 +349,39 @@ { "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0309.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/08/14/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59738", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=68187", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5242.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5242.json index c201640f230..7f13e7f9b9f 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5242.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5242.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5242", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T17:55:02.860", - "lastModified": "2015-09-08T17:55:33.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:40.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -149,6 +148,34 @@ { "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0309.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/08/14/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=66608", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5243.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5243.json index a95bbaebf65..1698f1dda8c 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5243.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5243.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5243", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T17:55:02.907", - "lastModified": "2017-01-07T03:00:27.243", + "lastModified": "2024-11-21T02:11:41.113", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -349,6 +348,38 @@ { "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0309.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/08/14/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59738", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65778", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5246.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5246.json index c4596119f14..b09b56def0b 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5246.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5246.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5246", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:08.610", - "lastModified": "2017-09-08T01:29:04.730", + "lastModified": "2024-11-21T02:11:41.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -109,6 +108,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95337", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/110146", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127905/Tenda-A5s-Router-Authentication-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95337", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5247.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5247.json index eb59d8dd76e..4402b6a529d 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5247.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5247.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5247", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-29T16:55:12.030", - "lastModified": "2023-11-07T02:20:47.390", + "lastModified": "2024-11-21T02:11:41.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -190,6 +189,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95256", "source": "cve@mitre.org" + }, + { + "url": "http://git.ganeti.org/?p=ganeti.git%3Ba=commit%3Bh=a89f62e2db9ccf715d64d1a6322474b54d2d9ae0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127851/Ganeti-Insecure-Archive-Permission.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/370", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ocert.org/advisories/ocert-2014-006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533119/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69186", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95256", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5248.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5248.json index 18e519811e1..d2fec0183a5 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5248.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5248.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5248", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-14T18:47:06.817", - "lastModified": "2014-08-14T18:55:32.060", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:41.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -154,6 +153,18 @@ { "url": "http://secunia.com/advisories/59707", "source": "cve@mitre.org" + }, + { + "url": "http://blog.mybb.com/2014/08/04/mybb-1-6-15-released-security-maintenance-release", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59707", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5249.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5249.json index 7125b84c51d..df0f48790ee 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5249.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5249.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5249", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-14T18:47:07.240", - "lastModified": "2017-09-08T01:29:04.840", + "lastModified": "2024-11-21T02:11:41.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/69091", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95146", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2316023", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2316025", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2316717", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5250.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5250.json index c9353e7ebe8..6676b843a34 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5250.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5250.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5250", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-14T18:47:07.287", - "lastModified": "2014-08-14T19:36:55.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:41.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -126,6 +125,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/69091", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2316023", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2316025", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2316717", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5251.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5251.json index 291e4a64383..1c52308410c 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5251.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5251.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5251", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T14:55:07.033", - "lastModified": "2014-10-10T05:23:50.467", + "lastModified": "2024-11-21T02:11:41.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -111,6 +110,26 @@ { "url": "https://bugs.launchpad.net/keystone/+bug/1347961", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1121.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2324-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/keystone/+bug/1347961", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5252.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5252.json index 536a868fd86..6cbf4720d3a 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5252.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5252.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5252", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T14:55:07.067", - "lastModified": "2014-10-10T05:23:50.623", + "lastModified": "2024-11-21T02:11:42.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -111,6 +110,26 @@ { "url": "https://bugs.launchpad.net/keystone/+bug/1348820", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1121.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2324-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/keystone/+bug/1348820", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5253.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5253.json index 4d14485c19b..7c528e060fd 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5253.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5253.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5253", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T14:55:07.113", - "lastModified": "2014-10-10T05:23:50.767", + "lastModified": "2024-11-21T02:11:42.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -111,6 +110,26 @@ { "url": "https://bugs.launchpad.net/keystone/+bug/1349597", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1121.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2324-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/keystone/+bug/1349597", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5256.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5256.json index a7964a0f0a0..ac640b4dedc 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5256.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5256.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5256", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-05T17:55:07.283", - "lastModified": "2015-05-12T02:01:35.050", + "lastModified": "2024-11-21T02:11:42.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -387,6 +386,37 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0516.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://blog.nodejs.org/2014/07/31/v8-memory-corruption-stack-overflow/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684769", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/joyent/node/commit/530af9cb8e700e7596b3ec812bad123c9fa06356", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5257.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5257.json index 7b23d226d9e..f29d09afb9c 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5257.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5257.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5257", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:08.880", - "lastModified": "2018-10-09T19:50:04.100", + "lastModified": "2024-11-21T02:11:42.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128978/Forma-Lms-1.2.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sourceforge.net/projects/forma/files/version%201.x/formalms-v1.2.1-p01.zip/download", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533905/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70914", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23226", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5258.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5258.json index 9bec47eed3b..8c0bd7e0f46 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5258.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5258.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5258", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T18:55:06.187", - "lastModified": "2018-10-09T19:50:04.443", + "lastModified": "2024-11-21T02:11:42.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -104,6 +103,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128301/webEdition-6.3.8.0-Path-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533465/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.webedition.org/de/aktuelles/webedition-cms/webEdition-6.3.9-Beta-erschienen", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.webedition.org/de/webedition-cms/versionshistorie/webedition-6/version-6.3.9.0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5259.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5259.json index 8dc17bf4fe1..055e01e842d 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5259.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5259.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5259", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-12T14:55:07.317", - "lastModified": "2018-10-09T19:50:04.817", + "lastModified": "2024-11-21T02:11:43.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,42 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://forum.blackcat-cms.org/viewtopic.php?f=2&t=263", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128141/BlackCat-CMS-1.0.3-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533336/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69551", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95717", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23228", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5260.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5260.json index f281f228048..2bdf98828af 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5260.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5260.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5260", "sourceIdentifier": "security@debian.org", "published": "2014-08-16T04:39:55.723", - "lastModified": "2014-09-08T17:49:15.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:43.177", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:C", + "baseScore": 6.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -103,6 +102,22 @@ { "url": "https://metacpan.org/source/AMBS/XML-DT-0.66/Changes", "source": "security@debian.org" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/08/15/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/756566", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://metacpan.org/diff/file?target=AMBS/XML-DT-0.64/&source=AMBS/XML-DT-0.63/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://metacpan.org/source/AMBS/XML-DT-0.66/Changes", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5261.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5261.json index 59aef013fb9..bbc3949d3c6 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5261.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5261.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5261", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:09.080", - "lastModified": "2017-09-08T01:29:04.963", + "lastModified": "2024-11-21T02:11:43.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -167,6 +166,41 @@ { "url": "https://security.gentoo.org/glsa/201607-05", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/351", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/386", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://svn.cacti.net/viewvc?view=rev&revision=7454", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3007", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69213", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1127165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201607-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5262.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5262.json index 351ac20295f..371c450bd08 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5262.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5262.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5262", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:09.173", - "lastModified": "2017-09-08T01:29:05.027", + "lastModified": "2024-11-21T02:11:43.433", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -167,6 +166,41 @@ { "url": "https://security.gentoo.org/glsa/201607-05", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/351", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/386", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://svn.cacti.net/viewvc?view=rev&revision=7454", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3007", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69213", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1127165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201607-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5263.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5263.json index 904672a2355..19e7902dd8f 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5263.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5263.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5263", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-26T14:55:06.080", - "lastModified": "2023-11-07T02:20:47.583", + "lastModified": "2024-11-21T02:11:43.583", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1126543", "source": "cve@mitre.org" + }, + { + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=3afca1d6d413592c2b78cf28f52fa24a586d8f56", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/04/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/16/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2409-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1126543", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5265.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5265.json index 6504e5d5117..efe302e69ce 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5265.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5265.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5265", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-18T11:15:27.433", - "lastModified": "2015-11-25T20:38:42.413", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:43.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -729,6 +728,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://cgit.drupalcode.org/drupal/diff/includes/xmlrpc.inc?id=1849830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://core.trac.wordpress.org/changeset/29404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/08/wordpress-3-9-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/SA-CORE-2014-004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5266.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5266.json index ce4c2d86489..f864234ba57 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5266.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5266.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5266", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-18T11:15:27.497", - "lastModified": "2015-11-25T20:39:20.337", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:43.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -731,6 +730,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://cgit.drupalcode.org/drupal/diff/includes/xmlrpc.inc?id=1849830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://cgit.drupalcode.org/drupal/diff/modules/openid/xrds.inc?id=1849830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://core.trac.wordpress.org/changeset/29404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/08/wordpress-3-9-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/SA-CORE-2014-004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5267.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5267.json index 32f1a8ab0c1..382f9902e3c 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5267.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5267.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5267", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T14:55:08.890", - "lastModified": "2014-10-10T05:23:53.517", + "lastModified": "2024-11-21T02:11:44.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -526,6 +525,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://cgit.drupalcode.org/drupal/diff/modules/openid/xrds.inc?id=1849830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/08/16/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-2999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/SA-CORE-2014-004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5268.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5268.json index 84ea0f4616c..abfedc5f867 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5268.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5268.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5268", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T16:59:00.077", - "lastModified": "2014-12-01T18:57:11.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:44.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2316065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2316747", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5269.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5269.json index 53d15cb2b27..aceb777f92f 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5269.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5269.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5269", "sourceIdentifier": "security@debian.org", "published": "2014-09-04T17:55:06.060", - "lastModified": "2014-09-08T14:47:51.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:44.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -108,6 +107,42 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://api.metacpan.org/source/MIYAGAWA/Plack-1.0031/Changes", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137099.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137115.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/384", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/109928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/avar/Plack/commit/bc1731dbb53850c380875ad683cd87c8ec99eee3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/plack/Plack/issues/405", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5270.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5270.json index bd3931494ff..b2c65c21977 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5270.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5270.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5270", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T01:55:10.383", - "lastModified": "2017-11-04T01:29:01.223", + "lastModified": "2024-11-21T02:11:44.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -161,6 +160,40 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/08/16/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.cs.tau.ac.il/~tromer/handsoff/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3024", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5271.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5271.json index c94b8b6eaf0..ce14deab118 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5271.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5271.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5271", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-03T16:55:05.573", - "lastModified": "2023-11-07T02:20:47.697", + "lastModified": "2024-11-21T02:11:44.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -493,6 +492,26 @@ { "url": "https://www.ffmpeg.org/security.html", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=52b81ff4635c077b2bc8b8d3637d933b6629d803", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/111725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5272.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5272.json index 65ffa99f984..b9efe21a743 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5272.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5272.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5272", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-03T16:55:06.073", - "lastModified": "2023-11-07T02:20:47.773", + "lastModified": "2024-11-21T02:11:44.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -268,6 +267,22 @@ { "url": "https://www.ffmpeg.org/security.html", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=abc1fa7c5a1dca1345b9471b81cfcda00c56220d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/16/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5273.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5273.json index c2c77adbfa1..f21ced6c06f 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5273.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5273.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5273", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T01:55:08.717", - "lastModified": "2014-10-16T07:23:33.003", + "lastModified": "2024-11-21T02:11:45.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -346,6 +345,61 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00045.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-8.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/2c45d7caa614afd71dbe3d0f7270f51ce5569614", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/3ffc967fb60cf2910cc2f571017e977558c67821", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/647c9d12e33a6b64e1c3ff7487f72696bdf2dccb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/90ddeecf60fc029608b972e490b735f3a65ed0cb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/cd9f302bf7f91a160fe7080f9a612019ef847f1c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5274.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5274.json index 245bf7f7429..ccf8e5cda49 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5274.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5274.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5274", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T01:55:08.777", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:46.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -244,6 +243,29 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00045.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-9.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/0cd293f5e13aa245e4a57b8d373597cc0e421b6f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5275.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5275.json index 2b5b3b266f2..7bcfa8b9633 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5275.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5275.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5275", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T16:55:09.293", - "lastModified": "2017-09-08T01:29:05.073", + "lastModified": "2024-11-21T02:11:46.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95127", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-08/0026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127775/Pro-Chat-Rooms-8.2.0-XSS-Shell-Upload-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34275", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/109829", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95127", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5276.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5276.json index 5a90b207bb2..cbb7151576a 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5276.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5276.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5276", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T16:55:09.340", - "lastModified": "2017-09-08T01:29:05.137", + "lastModified": "2024-11-21T02:11:46.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95126", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-08/0026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127775/Pro-Chat-Rooms-8.2.0-XSS-Shell-Upload-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34275", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95126", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5277.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5277.json index 74118b3dafb..1059f71297e 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5277.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5277.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5277", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-17T16:59:01.480", - "lastModified": "2023-11-07T02:20:47.880", + "lastModified": "2024-11-21T02:11:46.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,14 @@ { "url": "https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5284.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5284.json index e499905eeaf..517e5a30ebe 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5284.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5284.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5284", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T01:59:04.763", - "lastModified": "2014-12-02T14:08:15.310", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:47.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129111/OSSEC-2.8-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35234", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/ossec/ossec-hids/releases/tag/2.8.1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5285.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5285.json index b1d50ec6cf5..3bb3a099804 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5285.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5285.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5285", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-04T10:55:07.893", - "lastModified": "2014-09-05T14:45:40.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:47.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -136,6 +135,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.tibco.com/assets/bltdb348db4de625c6f/2014-006-Spotfire-advisory-cm-including3.X_v4.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.tibco.com/mk/advisory.jsp", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5286.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5286.json index ccc1e0438d7..84470151855 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5286.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5286.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5286", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T02:59:28.633", - "lastModified": "2015-02-19T19:05:29.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:47.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -144,6 +143,24 @@ { "url": "http://www.tibco.com/services/support/advisories/activematrix-advisory_20150218", "source": "cve@mitre.org" + }, + { + "url": "http://www.tibco.com/assets/blt1b18947cad32d1c4/2014-007-advisory.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.tibco.com/mk/advisory.jsp", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.tibco.com/services/support/advisories/activematrix-advisory_20150218", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5297.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5297.json index 42dd1efca2b..8086b4b7692 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5297.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5297.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5297", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T01:55:11.087", - "lastModified": "2018-10-09T19:50:05.270", + "lastModified": "2024-11-21T02:11:48.043", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "http://cwe.mitre.org/data/definitions/918.html 'CWE-918: Server-Side Request Forgery (SSRF)'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -109,6 +107,39 @@ "tags": [ "Patch" ] + }, + { + "url": "http://karmainsecurity.com/KIS-2014-09", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128352/X2Engine-4.1.7-PHP-Object-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/77", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533513/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://x2community.com/topic/1804-important-security-patch/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } - ] + ], + "evaluatorComment": "http://cwe.mitre.org/data/definitions/918.html 'CWE-918: Server-Side Request Forgery (SSRF)'" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-52xx/CVE-2014-5298.json b/CVE-2014/CVE-2014-52xx/CVE-2014-5298.json index d0f8d4fe34a..b80a6030d54 100644 --- a/CVE-2014/CVE-2014-52xx/CVE-2014-5298.json +++ b/CVE-2014/CVE-2014-52xx/CVE-2014-5298.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5298", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T01:55:11.210", - "lastModified": "2018-10-09T19:50:05.617", + "lastModified": "2024-11-21T02:11:48.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,30 @@ { "url": "https://github.com/X2Engine/X2Engine/blob/master/CHANGELOG.md", "source": "cve@mitre.org" + }, + { + "url": "http://karmainsecurity.com/KIS-2014-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128353/X2Engine-4.1.7-Unrestricted-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/78", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533514/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/X2Engine/X2Engine/blob/master/CHANGELOG.md", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5300.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5300.json index 5efb6aba198..ce854bbb24e 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5300.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5300.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5300", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:03.750", - "lastModified": "2018-10-09T19:50:05.943", + "lastModified": "2024-11-21T02:11:48.330", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96699", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128483/Moab-Dynamic-Configuration-Authentication-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.adaptivecomputing.com/security-advisory/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533574/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96699", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5307.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5307.json index 8113d87c9a1..1d980fc959b 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5307.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5307.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5307", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-26T14:55:06.127", - "lastModified": "2018-10-09T19:50:07.647", + "lastModified": "2024-11-21T02:11:48.793", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -105,6 +104,30 @@ { "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5307/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127948/Panda-Security-2014-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/53", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533182/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95382", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5307/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5308.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5308.json index a58e7935377..822029d24d4 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5308.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5308.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5308", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T17:55:03.937", - "lastModified": "2014-10-09T12:55:22.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:48.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -121,6 +120,56 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/112524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128521/TestLink-1.9.11-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/13", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34863", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70207", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gitorious.org/testlink-ga/testlink-code/commit/7a099737b4c739bf083df016c0a99f66dd8ac0b3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5308", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5313.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5313.json index c3e7cbbb0e7..a7c7ccc56f0 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5313.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5313.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5313", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-10T10:55:08.393", - "lastModified": "2014-09-10T17:43:15.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:49.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -107,6 +106,21 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000104", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN73357573/370331/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN73357573/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000104", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5314.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5314.json index 57fd641c999..2069a65cbe4 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5314.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5314.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5314", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-11-24T02:59:00.083", - "lastModified": "2014-12-30T21:22:00.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:49.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -133,6 +132,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN14691234/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000130", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62248", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cs.cybozu.co.jp/2014/1110-2.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5315.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5315.json index c51676b1493..53b6fc9e0d3 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5315.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5315.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5315", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-26T10:55:04.560", - "lastModified": "2017-09-08T01:29:05.433", + "lastModified": "2024-11-21T02:11:49.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -217,6 +216,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95958", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN84376800/244523/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN84376800/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95958", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5316.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5316.json index 38696f10baa..aeb4de53b5b 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5316.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5316.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5316", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-22T01:55:05.230", - "lastModified": "2015-09-08T18:01:15.813", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:49.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -275,6 +274,29 @@ { "url": "http://www.securityfocus.com/bid/69985", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://dotclear.org/blog/post/2014/08/18/Dotclear-2.6.4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN61637002/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69985", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5317.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5317.json index 5048af3cb01..b94c9d5865b 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5317.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5317.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5317", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-18T10:55:11.407", - "lastModified": "2015-09-02T17:20:35.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:49.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -109,6 +108,25 @@ { "url": "http://www.securityfocus.com/bid/69870", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN36205251/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000106", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php365.com/information.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5318.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5318.json index 6068cbd480f..0c1c15f0123 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5318.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5318.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5318", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-26T10:55:04.620", - "lastModified": "2017-01-07T03:00:27.367", + "lastModified": "2024-11-21T02:11:49.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,22 @@ { "url": "https://www.facebook.com/jigbrowserplus", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN80531230/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70146", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.facebook.com/jigbrowserplus", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5319.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5319.json index 9959427406c..79c3d355f6f 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5319.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5319.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5319", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-26T10:55:04.653", - "lastModified": "2015-07-29T16:48:55.813", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:49.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,31 @@ { "url": "http://www.securityfocus.com/bid/70147", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN16485017/995479/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN16485017/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000107", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70147", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5320.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5320.json index ca809b60b47..d2137f3b766 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5320.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5320.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5320", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-22T01:55:05.293", - "lastModified": "2014-09-22T15:29:48.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:49.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000109", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN08994136/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000109", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5321.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5321.json index cbfdcc94cc4..c394a929d32 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5321.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5321.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5321", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-22T01:55:05.357", - "lastModified": "2014-09-22T13:52:29.043", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:49.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,17 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000114", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN85812843/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000114", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5322.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5322.json index ca8a5625b60..bb32f1c45c4 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5322.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5322.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5322", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-22T01:55:06.463", - "lastModified": "2015-07-29T16:50:15.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:50.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,25 @@ { "url": "http://www.securitytracker.com/id/1030880", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN53579095/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000113", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030880", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5323.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5323.json index 4d2a37dddd7..8f0829b76ad 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5323.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5323.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5323", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-24T00:55:02.917", - "lastModified": "2014-10-04T23:56:52.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:50.187", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -86,6 +85,21 @@ { "url": "https://play.google.com/store/apps/details?id=jp.co.yukoyuko.android.yukoyuko_android", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN04560253/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.co.yukoyuko.android.yukoyuko_android", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5324.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5324.json index a71e95a634e..9900d63ea80 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5324.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5324.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5324", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-09-26T10:55:04.700", - "lastModified": "2014-09-27T02:58:13.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:50.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000112", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN87863382/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000112", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5325.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5325.json index f3e8eb71620..05af19fd25e 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5325.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5325.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5325", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-11-24T02:59:01.897", - "lastModified": "2016-11-28T19:12:36.387", + "lastModified": "2024-11-21T02:11:50.410", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,18 @@ { "url": "http://www.securityfocus.com/bid/71093", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN91502163/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000117", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71093", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5326.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5326.json index 395c164da11..eeee1b60e1b 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5326.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5326.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5326", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-11-24T02:59:03.160", - "lastModified": "2014-11-24T15:39:51.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:50.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN52422792/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5327.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5327.json index f2a3c424b2c..4c43a435586 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5327.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5327.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5327", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-10-12T01:55:16.653", - "lastModified": "2014-10-15T14:33:29.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:50.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -99,6 +98,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN58417930/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-373056.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5328.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5328.json index df19911fd0e..21b062ef017 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5328.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5328.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5328", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-10-12T01:55:25.310", - "lastModified": "2014-10-15T15:32:29.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:50.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN63587560/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-373056.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5330.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5330.json index ce9fe0f4227..406cd267fcc 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5330.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5330.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5330", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-10-19T01:55:15.420", - "lastModified": "2015-07-29T16:50:35.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:50.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "http://www.securityfocus.com/bid/70610", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN87373393/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70610", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5331.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5331.json index d69e416e618..5800daca165 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5331.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5331.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5331", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-10-19T01:55:15.467", - "lastModified": "2015-07-29T16:50:53.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:51.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "http://www.securityfocus.com/bid/70605", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN66285408/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000122", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70605", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5332.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5332.json index 0bb7fb2a50e..bcbbd4268fd 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5332.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5332.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5332", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-06T11:59:03.467", - "lastModified": "2016-09-20T03:56:46.313", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:51.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -85,6 +84,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://googleprojectzero.blogspot.com/2015/01/exploiting-nvmap-to-escape-chrome.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3618", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5333.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5333.json index dd444ca43bd..c010e1ca49b 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5333.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5333.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5333", "sourceIdentifier": "psirt@adobe.com", "published": "2014-08-19T11:16:59.853", - "lastModified": "2017-09-08T01:29:05.527", + "lastModified": "2024-11-21T02:11:51.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -425,6 +424,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95418", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://miki.it/blog/2014/8/15/adobe-really-fixed-rosetta-flash-today/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95418", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5335.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5335.json index 11d11060237..b9ee1c6bdaf 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5335.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5335.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5335", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T16:55:03.353", - "lastModified": "2018-10-09T19:50:08.083", + "lastModified": "2024-11-21T02:11:51.590", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -76,6 +75,10 @@ { "url": "http://www.securityfocus.com/archive/1/533197/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/533197/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5336.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5336.json index fd0961b2561..b20e94f8634 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5336.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5336.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5336", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-26T14:55:06.470", - "lastModified": "2020-03-26T14:25:06.063", + "lastModified": "2024-11-21T02:11:51.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -379,6 +378,38 @@ "Exploit", "Patch" ] + }, + { + "url": "http://monkey-project.com/Announcements/v1.5.3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/412", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60783", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95336", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/monkey/monkey/commit/b2d0e6f92310bb14a15aa2f8e96e1fb5379776dd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5337.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5337.json index 3d40836bb8b..d06681c9d4c 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5337.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5337.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5337", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-29T13:55:05.410", - "lastModified": "2018-11-19T19:38:54.233", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:51.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -169,6 +168,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/60584", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5338.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5338.json index 749623a612d..d51778731f7 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5338.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5338.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5338", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:09.297", - "lastModified": "2018-10-09T19:50:08.193", + "lastModified": "2024-11-21T02:11:52.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -129,6 +128,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383", "source": "cve@mitre.org" + }, + { + "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982&HTML=yes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5339.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5339.json index 6c9c0ebeb25..19a9c9280f4 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5339.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5339.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5339", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-02T14:55:03.637", - "lastModified": "2018-10-09T19:50:08.663", + "lastModified": "2024-11-21T02:11:52.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -122,6 +121,26 @@ { "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5340.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5340.json index 28810767265..15d65993960 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5340.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5340.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5340", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-02T14:55:03.683", - "lastModified": "2018-10-09T19:50:08.943", + "lastModified": "2024-11-21T02:11:52.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -122,6 +121,26 @@ { "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5341.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5341.json index 1403a815adc..867f29d0aeb 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5341.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5341.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5341", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:00.057", - "lastModified": "2015-02-05T15:20:08.403", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:52.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2014-019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5342.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5342.json index 798e9178637..1b38f8a5cb5 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5342.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5342.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5342", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T18:59:00.097", - "lastModified": "2014-11-19T19:11:06.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:52.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-10282014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5343.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5343.json index 5f1818a0c57..6944ab20cf1 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5343.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5343.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5343", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-19T18:55:03.343", - "lastModified": "2017-09-08T01:29:05.713", + "lastModified": "2024-11-21T02:11:52.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -323,6 +322,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95173", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127777/Feng-Office-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95173", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5344.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5344.json index feae755efe9..2efa84f2d7c 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5344.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5344.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5344", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-19T18:55:03.390", - "lastModified": "2014-08-20T17:07:47.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:52.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -303,6 +302,17 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/60530", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/plugins/mobiloud-mobile-app-plugin/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5345.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5345.json index 6446dd3a57b..1426c853e73 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5345.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5345.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5345", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-19T19:55:04.567", - "lastModified": "2014-08-20T17:17:00.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:53.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -253,6 +252,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/35", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69205", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/disqus-comment-system/other_notes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.nikcub.com/posts/multiple-vulnerabilities-in-disqus-wordpress-plugin", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5346.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5346.json index 5649295e6a6..5ffd505a909 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5346.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5346.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5346", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-19T19:55:04.613", - "lastModified": "2014-08-20T17:18:44.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:53.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/46", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://vexatioustendencies.com/csrf-in-disqus-wordpress-plugin-v2-77", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5347.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5347.json index 3a0f7131622..3f4055923b0 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5347.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5347.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5347", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-19T19:55:04.753", - "lastModified": "2017-09-08T01:29:05.793", + "lastModified": "2024-11-21T02:11:53.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -279,6 +278,58 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127852/Disqus-2.7.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/35", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34336", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69205", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95289", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gist.github.com/nikcub/cb5dc7a5464276c8424a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/disqus-comment-system/other_notes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.nikcub.com/posts/multiple-vulnerabilities-in-disqus-wordpress-plugin", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5348.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5348.json index 56cc3b309af..f42eee2fa44 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5348.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5348.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5348", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-19T19:55:04.800", - "lastModified": "2014-08-20T17:26:17.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:53.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/41", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69243", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5349.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5349.json index d5242d101ae..78d071db025 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5349.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5349.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5349", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-19T19:55:04.877", - "lastModified": "2014-08-20T17:36:21.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:53.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5190.php", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/108605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33951", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5190.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5350.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5350.json index 76888de3b38..41abfa1c149 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5350.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5350.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5350", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-19T19:55:05.067", - "lastModified": "2014-08-20T17:55:39.393", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:53.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/78", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.bitdefender.com/support/how-to-configure-iptables-firewall-rules-on-gravityzone-for-restricting-outside-access-to-mongodatabase-1265.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-3_Bitdefender_GravityZone_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5351.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5351.json index afed5933057..3ba052b656a 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5351.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5351.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5351", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T01:55:11.307", - "lastModified": "2020-01-21T15:46:49.820", + "lastModified": "2024-11-21T02:11:53.993", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -131,6 +130,66 @@ { "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0477.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-53.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:224", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70380", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2498-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97028", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5352.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5352.json index 8c38e38cad1..b4519d88f51 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5352.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5352.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5352", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T11:59:00.047", - "lastModified": "2020-01-21T15:46:57.183", + "lastModified": "2024-11-21T02:11:54.160", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -176,6 +174,66 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0794.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72495", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2498-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/82dc33da50338ac84c7b4102dc6513d897d0506a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5353.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5353.json index 33bbf4b757f..5fab41f228c 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5353.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5353.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5353", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T23:59:00.073", - "lastModified": "2021-02-02T18:57:13.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:54.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -375,6 +374,104 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0536.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155828.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0794.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71679", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031376", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2498-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5354.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5354.json index 6d24b31f194..20b191292de 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5354.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5354.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5354", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T23:59:01.247", - "lastModified": "2020-01-21T15:46:49.820", + "lastModified": "2024-11-21T02:11:54.500", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -107,6 +105,27 @@ { "url": "https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031376", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2498-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5355.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5355.json index 3f48c43cfce..e523fa59c7d 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5355.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5355.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5355", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-20T11:59:00.060", - "lastModified": "2020-01-21T15:46:59.103", + "lastModified": "2024-11-21T02:11:54.640", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -410,6 +408,50 @@ { "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html", "source": "cve@mitre.org" + }, + { + "url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=8050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0794.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74042", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2810-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/102bb6ebf20f9174130c85c3b052ae104e5073ec", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5356.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5356.json index aa86990f0e9..c9edea5dd19 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5356.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5356.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5356", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T14:55:07.160", - "lastModified": "2017-01-07T03:00:27.507", + "lastModified": "2024-11-21T02:11:54.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -145,6 +144,34 @@ { "url": "https://bugs.launchpad.net/glance/+bug/1315321", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1337.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1338.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1685.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/21/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2322-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/glance/+bug/1315321", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5359.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5359.json index 2fee8119dbd..28f9a4cacc5 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5359.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5359.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5359", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:04.247", - "lastModified": "2014-12-17T19:30:32.603", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:54.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://appcheck-ng.com/safenet-sas-owa-agent-directory-traversal-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.safenet-inc.com/technical-support/security-updates/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5360.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5360.json index 7a5a5785a3b..8e393e4d82c 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5360.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5360.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5360", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:00.047", - "lastModified": "2016-04-07T13:40:37.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:55.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Vulnerabilidad de XSS en la interfaz de administraci\u00f3n en LANDESK Management Suite anterior a 9.6 SP1 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro AMTVersion en remote/serverlist_grouptree.aspx." } ], - "vendorComments": [ - { - "organization": "LANDESK", - "comment": "The vulnerability described in CVE-2014-5360 was fixed in Landesk Management Suit (LDMS) version: 9.5 SP3, 9.6 SP1, 10.0. LDMS Customers are encouraged to upgrade to the listed versions or newer", - "lastModified": "2016-04-07T09:40:37.930" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +78,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + } + ], + "vendorComments": [ + { + "organization": "LANDESK", + "comment": "The vulnerability described in CVE-2014-5360 was fixed in Landesk Management Suit (LDMS) version: 9.5 SP3, 9.6 SP1, 10.0. LDMS Customers are encouraged to upgrade to the listed versions or newer", + "lastModified": "2016-04-07T09:40:37.930" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5361.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5361.json index 3ab4435cac3..e82bfb10f93 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5361.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5361.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5361", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T15:59:00.090", - "lastModified": "2018-10-09T19:50:09.240", + "lastModified": "2024-11-21T02:11:55.267", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "M\u00faltiples vulnerabilidades de CSRF en Landesk Management Suite 9.6 y anteriores permiten a atacantes remotos secuestrar la autenticaci\u00f3n de administradores para solicitudes que (1) inician, (2) paran o (3) reinician a trav\u00e9s de una solicitud a remote/serverServices.aspx." } ], - "vendorComments": [ - { - "organization": "LANDESK", - "comment": "The vulnerability described in CVE-2014-5361 was fixed in Landesk Management Suit (LDMS) version: 9.5 SP3, 9.6 SP1, 10.0.\nLDMS Customers are encouraged to upgrade to the listed versions or newer\n", - "lastModified": "2016-04-07T09:37:59.197" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +82,24 @@ { "url": "http://www.securityfocus.com/archive/1/535286/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131496/Landesk-Management-Suite-9.5-RFI-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535286/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "LANDESK", + "comment": "The vulnerability described in CVE-2014-5361 was fixed in Landesk Management Suit (LDMS) version: 9.5 SP3, 9.6 SP1, 10.0.\nLDMS Customers are encouraged to upgrade to the listed versions or newer\n", + "lastModified": "2016-04-07T09:37:59.197" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5368.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5368.json index 9daba69d31f..946e115bacc 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5368.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5368.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5368", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:09.377", - "lastModified": "2017-09-08T01:29:05.917", + "lastModified": "2024-11-21T02:11:55.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95374", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/407", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69278", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95374", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5369.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5369.json index 6062a7e1404..9f2107158e2 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5369.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5369.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5369", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-08T14:55:03.030", - "lastModified": "2016-12-22T02:59:16.843", + "lastModified": "2024-11-21T02:11:55.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,56 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60779", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60887", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61854", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/p/enigmail/bugs/294/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://sourceforge.net/p/enigmail/forum/support/thread/3e7268a4/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/18/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/22/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://advisories.mageia.org/MGASA-2014-0421.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5370.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5370.json index d362f4b7599..cf013f5b71f 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5370.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5370.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5370", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T15:59:01.200", - "lastModified": "2016-08-18T14:59:06.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:55.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -108,6 +107,42 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131504/BlueDragon-CFChart-Servlet-7.1.1.17759-Directory-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/49", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/119527", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36815/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5370/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5375.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5375.json index d08fd075bbf..f41fa8a6271 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5375.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5375.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5375", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:03.797", - "lastModified": "2018-10-09T19:50:11.270", + "lastModified": "2024-11-21T02:11:56.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96698", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128484/Moab-User-Impersonation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.adaptivecomputing.com/security-advisory/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533576/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70174", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96698", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5376.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5376.json index c74434d993a..40667790738 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5376.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5376.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5376", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:03.843", - "lastModified": "2018-10-09T19:50:12.443", + "lastModified": "2024-11-21T02:11:56.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96700", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128485/Moab-Insecure-Message-Signing-Authentication-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.adaptivecomputing.com/security-advisory/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533577/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96700", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5377.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5377.json index 85e9a57b2dc..dc5067e6c92 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5377.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5377.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5377", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-04T17:55:06.670", - "lastModified": "2018-10-09T19:50:14.053", + "lastModified": "2024-11-21T02:11:56.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -127,6 +126,61 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128019/ManageEngine-DeviceExpert-5.9-Credential-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/75", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/84", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.manageengine.com/products/device-expert/release-notes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533250/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69443", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/me_deviceexpert-5.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5382.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5382.json index ca650cebaec..90bae43d233 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5382.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5382.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5382", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-20T14:55:06.203", - "lastModified": "2014-08-21T14:51:43.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:56.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/40", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140710-2_Schrack_Technik_Microcontrol_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5383.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5383.json index ac27768ee19..9b10f8861fd 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5383.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5383.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5383", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-21T14:55:05.947", - "lastModified": "2015-09-08T18:18:32.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:56.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -226,6 +225,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://forums.alienvault.com/discussion/2690", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67312", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5384.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5384.json index 49e517084e4..50de97f942a 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5384.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5384.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5384", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-21T22:55:03.690", - "lastModified": "2014-08-21T23:16:19.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:57.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,21 @@ { "url": "http://www.securitytracker.com/id/1030458", "source": "cve@mitre.org" + }, + { + "url": "http://mail-index.netbsd.org/source-changes/2014/06/24/msg055822.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14:15.iconv.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030458", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5385.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5385.json index 7f7a8ce91d7..db9936c2b1c 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5385.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5385.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5385", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-21T23:55:02.227", - "lastModified": "2018-10-09T19:50:15.867", + "lastModified": "2024-11-21T02:11:57.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "http://www.securityfocus.com/archive/1/532726/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/38", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532726/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5386.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5386.json index 537975385fb..2725bae9e95 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5386.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5386.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5386", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-28T15:59:02.237", - "lastModified": "2014-12-30T15:33:33.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:57.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -76,6 +75,10 @@ { "url": "https://github.com/facebook/hhvm/commit/ab6fdeb84fb090b48606b6f7933028cfe7bf3a5e", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/facebook/hhvm/commit/ab6fdeb84fb090b48606b6f7933028cfe7bf3a5e", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5387.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5387.json index 1f2055ee348..2a13f3fc8ca 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5387.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5387.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5387", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:05.417", - "lastModified": "2020-07-06T19:45:53.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:57.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -249,6 +248,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128946/EllisLab-ExpressionEngine-Core-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70875", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://ellislab.com/expressionengine/user-guide/about/changelog.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5388.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5388.json index ecf8a781362..ac14f94664c 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5388.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5388.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5388", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-15T21:59:05.397", - "lastModified": "2023-02-13T00:42:19.923", + "lastModified": "2024-11-21T02:11:57.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -146,6 +145,50 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fa365d7cd11185237471823a5a33d36765454e16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/438", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2409-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132956", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://lists.gnu.org/archive/html/qemu-devel/2014-08/msg03338.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5389.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5389.json index 2245a359fda..caebb79f126 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5389.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5389.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5389", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-06T14:55:10.830", - "lastModified": "2015-11-02T18:03:12.333", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:57.683", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -105,6 +104,35 @@ { "url": "https://wordpress.org/plugins/content-audit/changelog", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128525/WordPress-Content-Audit-1.6-Blind-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70214", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.dxw.com/advisories/blind-sqli-vulnerability-in-content-audit-could-allow-a-privileged-attacker-to-exfiltrate-password-hashes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/content-audit/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5391.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5391.json index 9655a36481a..bc6c7d1c977 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5391.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5391.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5391", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T15:55:04.690", - "lastModified": "2018-10-09T19:50:16.227", + "lastModified": "2024-11-21T02:11:57.817", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -132,6 +131,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95797", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128180/JobScheduler-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.christian-schneider.net/advisories/CVE-2014-5391.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533372/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69660", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.sos-berlin.com/modules/news/article.php?storyid=73", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.sos-berlin.com/modules/news/article.php?storyid=74", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://change.sos-berlin.com/browse/JS-1203", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95797", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5392.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5392.json index 567d3344ab1..d5f40b70630 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5392.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5392.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5392", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-23T15:55:08.167", - "lastModified": "2018-10-09T19:50:16.943", + "lastModified": "2024-11-21T02:11:57.947", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -122,6 +120,36 @@ { "url": "https://change.sos-berlin.com/browse/JS-1204", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128181/JobScheduler-XML-eXternal-Entity-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.christian-schneider.net/advisories/CVE-2014-5392.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533374/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.sos-berlin.com/modules/news/article.php?storyid=73", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://change.sos-berlin.com/browse/JS-1204", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5393.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5393.json index 3da52a36d56..51700fbe29a 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5393.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5393.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5393", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T15:55:04.753", - "lastModified": "2018-10-09T19:50:17.350", + "lastModified": "2024-11-21T02:11:58.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -132,6 +131,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95796", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128192/JobScheduler-Path-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.christian-schneider.net/advisories/CVE-2014-5393.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533373/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.sos-berlin.com/modules/news/article.php?storyid=73", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sos-berlin.com/modules/news/article.php?storyid=74", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://change.sos-berlin.com/browse/JS-1205", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95796", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5395.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5395.json index 7b2d56cb1b5..2017a73e762 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5395.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5395.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5395", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T15:59:00.087", - "lastModified": "2019-01-08T11:29:00.270", + "lastModified": "2024-11-21T02:11:58.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -167,6 +166,21 @@ { "url": "https://www.exploit-db.com/exploits/46092/", "source": "cve@mitre.org" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-360246.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69162", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/46092/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5396.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5396.json index bc4b01678e6..865b0fa4de0 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5396.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5396.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5396", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-22T14:55:09.437", - "lastModified": "2014-08-28T00:44:02.150", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-798: Use of Hard-coded Credentials", + "lastModified": "2024-11-21T02:11:58.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +97,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/40", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140710-2_Schrack_Technik_Microcontrol_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-798: Use of Hard-coded Credentials" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5397.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5397.json index 02e07f7ccea..a8f1923c241 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5397.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5397.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5397", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-08-28T01:55:03.543", - "lastModified": "2015-10-21T16:21:41.030", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:58.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,17 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.securityfocus.com/bid/69418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-238-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5398.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5398.json index faf9f66b3e5..61f5c50184c 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5398.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5398.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5398", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-08-28T01:55:03.607", - "lastModified": "2014-08-28T15:22:13.070", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorImpact": "Per: https://ics-cert.us-cert.gov/advisories/ICSA-14-238-02\n\n\"WIS may allow access to local resources (files and internal resources) via unsafe parsing of XML external entities. By using specially crafted XML files, an attacker can cause these products to send the contents of local remote resources to the attacker\u2019s server or cause a denial of service of the system. This vulnerability is not exploitable remotely and cannot be exploited without user interaction. The exploit is only triggered when a local user runs the vulnerable application and loads the malformed XML files.\"", + "lastModified": "2024-11-21T02:11:58.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -99,6 +97,14 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-238-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } - ] + ], + "evaluatorImpact": "Per: https://ics-cert.us-cert.gov/advisories/ICSA-14-238-02\n\n\"WIS may allow access to local resources (files and internal resources) via unsafe parsing of XML external entities. By using specially crafted XML files, an attacker can cause these products to send the contents of local remote resources to the attacker\u2019s server or cause a denial of service of the system. This vulnerability is not exploitable remotely and cannot be exploited without user interaction. The exploit is only triggered when a local user runs the vulnerable application and loads the malformed XML files.\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-53xx/CVE-2014-5399.json b/CVE-2014/CVE-2014-53xx/CVE-2014-5399.json index b96cb9d7228..bafabb3922d 100644 --- a/CVE-2014/CVE-2014-53xx/CVE-2014-5399.json +++ b/CVE-2014/CVE-2014-53xx/CVE-2014-5399.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5399", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-08-28T01:55:03.653", - "lastModified": "2015-11-02T18:06:00.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:58.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,18 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.securityfocus.com/bid/69416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-238-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5400.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5400.json index 1c1ddd8f469..2b3ed9fe729 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5400.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5400.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5400", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-04-03T10:59:00.070", - "lastModified": "2015-04-03T15:09:23.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:58.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-090-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5403.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5403.json index 7c61c2b1774..6c76da0c786 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5403.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5403.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5403", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-04-03T10:59:01.227", - "lastModified": "2015-04-03T15:09:52.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:59.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-090-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5405.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5405.json index f08b6faa551..97b975bf0d8 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5405.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5405.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5405", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-04-03T10:59:02.290", - "lastModified": "2015-07-24T14:51:00.063", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorImpact": "Per https://ics-cert.us-cert.gov/advisories/ICSA-15-090-03:\n\n\u201cThe MedNet software contains plaintext storage of passwords for the SQL database that may allow an attacker to compromise the MedNet SQL server and gain administrative access to the workstation.\u201d\n\nBased on this information, the score has been adjusted. For additional information or questions please contact ICS-CERT (contact information available via advisory link).", + "lastModified": "2024-11-21T02:11:59.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -81,6 +79,15 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-090-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } - ] + ], + "evaluatorImpact": "Per https://ics-cert.us-cert.gov/advisories/ICSA-15-090-03:\n\n\u201cThe MedNet software contains plaintext storage of passwords for the SQL database that may allow an attacker to compromise the MedNet SQL server and gain administrative access to the workstation.\u201d\n\nBased on this information, the score has been adjusted. For additional information or questions please contact ICS-CERT (contact information available via advisory link)." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5407.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5407.json index ca998b32ce1..097683ea8df 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5407.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5407.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5407", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-09-15T14:55:11.697", - "lastModified": "2014-09-15T18:12:54.823", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:59.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-254-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5408.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5408.json index 7db802b5d79..7e50d266b32 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5408.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5408.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5408", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-11-05T11:55:06.437", - "lastModified": "2015-08-06T14:56:31.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:59.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.securityfocus.com/bid/70851", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-303-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5409.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5409.json index 16a6a4af6a3..bbf0a4b5b97 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5409.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5409.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5409", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-14T01:59:00.067", - "lastModified": "2015-03-16T16:26:28.807", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-330: Use of Insufficiently Random Values", + "lastModified": "2024-11-21T02:11:59.727", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -84,6 +82,19 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://libraries.ge.com/download?fileid=642886573101&entity_id=31955841101&sid=101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-041-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "CWE-330: Use of Insufficiently Random Values" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5410.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5410.json index 73a4f449482..08b583f3b37 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5410.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5410.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5410", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-10-03T18:55:06.077", - "lastModified": "2014-10-06T18:41:37.173", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:59.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-254-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5411.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5411.json index 6936487c42b..d7730302797 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5411.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5411.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5411", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-09-18T10:55:11.640", - "lastModified": "2018-12-31T14:23:16.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:11:59.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -119,6 +118,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-259-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5412.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5412.json index 06139fca0b5..c7e42ad9f57 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5412.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5412.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5412", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-09-18T10:55:11.687", - "lastModified": "2018-12-31T14:23:16.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:00.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-259-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5413.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5413.json index 7c0af7df2eb..fba5e03a24e 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5413.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5413.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5413", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-09-18T10:55:11.733", - "lastModified": "2018-12-31T14:23:16.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:00.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-259-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5417.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5417.json index cf23eb9d462..f46baab37ff 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5417.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5417.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5417", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-11-05T11:55:06.827", - "lastModified": "2015-08-06T15:05:48.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:00.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -139,6 +138,25 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-1404-lantime-web-interface-cross-site-scripting-vulnerability.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70847", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-275-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5418.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5418.json index 9f9521e62b1..df2d8d5f5c8 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5418.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5418.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5418", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-01-17T02:59:01.223", - "lastModified": "2015-01-21T17:36:08.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:00.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -267,6 +266,21 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.gedigitalenergy.com/products/support/multilink/MLSB1214.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-013-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5419.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5419.json index 91947a2d1cc..89d6ccb5221 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5419.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5419.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5419", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-01-17T02:59:02.600", - "lastModified": "2015-01-21T15:54:59.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:00.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -267,6 +266,21 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.gedigitalenergy.com/products/support/multilink/MLSB1214.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-013-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5420.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5420.json index 235ff881a99..304fb46e87b 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5420.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5420.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5420", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-10-19T01:55:15.513", - "lastModified": "2014-10-24T17:59:27.783", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:00.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -78,6 +77,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-288-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5421.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5421.json index d9a2c4d8fd8..5a175611b78 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5421.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5421.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5421", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-10-19T01:55:15.560", - "lastModified": "2014-10-22T19:19:38.823", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:01.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:P", + "baseScore": 6.8, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -78,6 +77,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-288-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5422.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5422.json index 132e39d33ec..e3e0f8362c6 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5422.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5422.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5422", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-10-19T01:55:15.590", - "lastModified": "2014-10-22T19:21:54.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:01.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:P", + "baseScore": 9.7, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "PARTIAL", - "baseScore": 9.7 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-288-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5423.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5423.json index cf699d6e938..7eabe8690e8 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5423.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5423.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5423", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-10-19T01:55:15.637", - "lastModified": "2014-10-22T19:23:04.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:01.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -78,6 +77,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-288-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5424.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5424.json index 41047d1321e..8e3540436e5 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5424.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5424.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5424", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-11-14T00:59:00.133", - "lastModified": "2014-11-14T15:33:43.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:01.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-294-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5425.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5425.json index 0700aae8603..3118cb27e34 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5425.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5425.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5425", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-10-19T01:55:15.670", - "lastModified": "2014-10-22T18:15:49.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:01.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-289-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5426.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5426.json index 0ad2c7053ef..ca113e7f8f5 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5426.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5426.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5426", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-11-27T15:59:00.083", - "lastModified": "2014-11-28T15:13:24.783", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:01.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.opcsupport.com/link/portal/4164/4590/Article/3004/SECURITY-NOTIFICATION-OPC-Server-for-SCADA-DNP3-SN-2014-10-14-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-329-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5427.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5427.json index 7ba63639721..bb581ed6a71 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5427.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5427.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5427", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-29T10:59:00.070", - "lastModified": "2015-03-30T17:06:10.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:01.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -58,6 +57,22 @@ { "operator": "AND", "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:johnsoncontrols:metsys:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BDC187CE-F056-4AA3-AF88-995D8E3E57A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:johnsoncontrols:metsys:6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "CFCA2025-A2B3-4500-923B-817C45917FB8" + } + ] + }, { "operator": "OR", "negate": false, @@ -118,22 +133,6 @@ "matchCriteriaId": "32087E10-7003-4129-A1EB-98551BFDFF7F" } ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:johnsoncontrols:metsys:4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BDC187CE-F056-4AA3-AF88-995D8E3E57A7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:johnsoncontrols:metsys:6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "CFCA2025-A2B3-4500-923B-817C45917FB8" - } - ] } ] } @@ -146,6 +145,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5428.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5428.json index 15c15ab530d..bf62731be7e 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5428.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5428.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5428", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-29T10:59:01.400", - "lastModified": "2015-03-30T18:45:25.753", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", + "lastModified": "2024-11-21T02:12:01.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -147,6 +145,15 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5429.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5429.json index 6205f8f0ac4..d79f6af99b0 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5429.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5429.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5429", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-12-06T15:59:03.047", - "lastModified": "2014-12-08T19:30:31.673", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:01.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -111,6 +110,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-303-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5430.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5430.json index b15ca8909ee..d1da9bb9405 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5430.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5430.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5430", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-11-07T11:55:03.767", - "lastModified": "2014-11-07T16:10:59.713", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": " CWE-427: Uncontrolled Search Path Element ", + "lastModified": "2024-11-21T02:12:02.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -94,6 +92,14 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-308-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } - ] + ], + "evaluatorComment": " CWE-427: Uncontrolled Search Path Element " } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5437.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5437.json index 1f0290e38e4..c3129a5deb2 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5437.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5437.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5437", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-17T18:59:00.067", - "lastModified": "2014-12-18T17:58:26.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:02.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,14 @@ { "url": "http://seclists.org/fulldisclosure/2014/Dec/58", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/57", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/58", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5438.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5438.json index 41a63b3ecf8..da5ea896e56 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5438.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5438.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5438", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-17T18:59:01.300", - "lastModified": "2014-12-18T17:58:54.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:03.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -88,6 +87,10 @@ { "url": "http://seclists.org/fulldisclosure/2014/Dec/58", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/58", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5440.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5440.json index d04d15ce30f..d27559c32d6 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5440.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5440.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5440", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-12T14:55:07.363", - "lastModified": "2017-09-08T01:29:06.277", + "lastModified": "2024-11-21T02:12:03.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95675", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128064/MX-SmartTimer-13.18.5.11-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/83", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95675", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5441.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5441.json index 154154cee98..693d3db5f47 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5441.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5441.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5441", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-12T14:55:07.470", - "lastModified": "2014-09-16T18:49:13.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:03.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,25 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/127978/Fatt-Free-CRM-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/fatfreecrm/fat_free_crm/commit/95464495f1e3e714d5c295fe621af5d2e0d4238d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/fatfreecrm/fat_free_crm/wiki/XSS-vulnerability-%2826th-August-2014%29", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5444.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5444.json index e3653fb098d..a4f4927b0e2 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5444.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5444.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5444", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T14:55:09.093", - "lastModified": "2014-10-02T00:19:06.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:03.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ "tags": [ "Patch" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=713247", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.gnome.org/browse/geary/commit/?h=geary-0.6&id=55f06a7bdcedb7efde6a516bde626ea28793ca7e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5445.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5445.json index 734476590ff..d864c4ee59a 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5445.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5445.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5445", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-04T17:59:00.067", - "lastModified": "2019-07-15T17:45:58.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:03.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -165,6 +164,83 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129336/ManageEngine-Netflow-Analyzer-IT360-File-Download.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory", + "VDB Entry", + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534122/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534141/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71404", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/rapid7/metasploit-framework/pull/4282", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_netflow_it360_file_dl.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/cve-2014-5445-cve-2014-5446-fix-for-arbitrary-file-download", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5446.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5446.json index 4fbf356404b..f2e98ec8bff 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5446.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5446.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5446", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-04T17:59:01.817", - "lastModified": "2019-07-15T17:45:58.473", + "lastModified": "2024-11-21T02:12:04.153", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -194,6 +193,54 @@ "Exploit", "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/129336/ManageEngine-Netflow-Analyzer-IT360-File-Download.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534122/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534141/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71404", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99046", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_netflow_it360_file_dl.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/cve-2014-5445-cve-2014-5446-fix-for-arbitrary-file-download", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5447.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5447.json index 2b5b2a7de8a..cf3a1e93639 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5447.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5447.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5447", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T15:55:04.857", - "lastModified": "2015-11-17T16:28:02.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:04.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -96,6 +95,26 @@ { "url": "http://www.securityfocus.com/bid/69362", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0380.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/444", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:182", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69362", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5448.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5448.json index ea00bc0c39c..0d028a90080 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5448.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5448.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5448", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T15:55:04.917", - "lastModified": "2017-09-08T01:29:06.463", + "lastModified": "2024-11-21T02:12:04.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -95,6 +94,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95452", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0380.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/444", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:182", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69365", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95452", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5449.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5449.json index 68f6d9065df..2bc5615ca8e 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5449.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5449.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5449", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T15:55:04.967", - "lastModified": "2017-09-08T01:29:06.510", + "lastModified": "2024-11-21T02:12:04.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -100,6 +99,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95453", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0380.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/444", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:182", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69369", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95453", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5451.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5451.json index 389f4ee8b06..197119d2a97 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5451.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5451.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5451", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T18:55:06.233", - "lastModified": "2018-10-09T19:50:19.710", + "lastModified": "2024-11-21T02:12:04.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128302/MODX-Revolution-2.3.1-pl-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533466/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69884", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/modxcms/revolution/commit/e36f80f18e9514204bf2ce82747c8adf7e47a9c9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5452.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5452.json index 140dfb394ec..2964b509afa 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5452.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5452.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5452", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-02T10:55:04.667", - "lastModified": "2016-12-22T02:59:16.907", + "lastModified": "2024-11-21T02:12:05.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,39 @@ { "url": "http://www.securitytracker.com/id/1033511", "source": "cve@mitre.org" + }, + { + "url": "http://gforge.hl7.org/gf/project/strucdoc/frs/?action=FrsReleaseView&release_id=1088", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://motorcycleguy.blogspot.com/2014/04/hl7-cda-stylesheet-patches.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://smartplatforms.org/2014/04/security-vulnerabilities-in-ccda-display/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033511", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5453.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5453.json index a4823eb151f..070509a6334 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5453.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5453.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5453", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T16:55:04.510", - "lastModified": "2014-08-26T15:16:05.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:05.187", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -92,6 +91,21 @@ { "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5191.php", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/108726", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5191.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5454.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5454.json index e77e6c66ebf..4108e36bd36 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5454.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5454.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5454", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T16:55:04.947", - "lastModified": "2017-09-08T01:29:06.557", + "lastModified": "2024-11-21T02:12:05.340", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -80,6 +78,15 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95351", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127866/SAS-Visual-Analytics-6.4M1-Arbitrary-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95351", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5455.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5455.json index 614b80d020e..0485e629230 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5455.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5455.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5455", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T16:55:04.977", - "lastModified": "2020-06-01T15:15:10.840", + "lastModified": "2024-11-21T02:12:05.480", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-428: Unquoted Search Path or Element", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -120,6 +118,50 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://osvdb.org/show/osvdb/109007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127439/OpenVPN-Private-Tunnel-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34037", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5192.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/CVEProject/cvelist/pull/3909", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/CVEProject/cvelist/pull/3909/commits/ace34f1cf94602f31760d3eb7ae68e17df8f914d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05325943", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-428: Unquoted Search Path or Element" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5456.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5456.json index 13296b9ba6f..8926f2a62e6 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5456.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5456.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5456", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T16:55:05.650", - "lastModified": "2015-08-06T16:28:04.287", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:05.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -120,6 +119,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/60759", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2323983", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2324681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5457.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5457.json index 1b979a24b5a..8c4706ab730 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5457.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5457.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5457", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T16:55:05.697", - "lastModified": "2014-08-26T17:21:48.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:05.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -180,6 +179,22 @@ { "url": "http://seclists.org/fulldisclosure/2014/Jul/61", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/57", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/58", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/59", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/61", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5458.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5458.json index cb6b92f60f6..349664da440 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5458.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5458.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5458", "sourceIdentifier": "cve@mitre.org", "published": "2014-08-25T16:55:05.743", - "lastModified": "2015-11-02T18:07:11.450", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:05.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/49", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/geir54/php-sqrl/blob/0fa574520a1843a33a84c3985f934e84af6f2042/sqrl_verify.php#L39-59", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/geir54/php-sqrl/issues/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5459.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5459.json index aa148af9b53..650b9cdd3a7 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5459.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5459.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5459", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-27T10:55:05.167", - "lastModified": "2021-03-29T14:38:58.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:06.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -152,6 +151,46 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00055.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/27/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759282", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5460.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5460.json index 2eef5e3ba17..cc94dd8ef11 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5460.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5460.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5460", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T15:55:05.223", - "lastModified": "2018-10-09T19:50:20.117", + "lastModified": "2024-11-21T02:12:06.317", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -149,6 +148,53 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/128069/WordPress-Slideshow-Gallery-1.4.6-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/60074", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://whitexploit.blogspot.mx/2014/08/wordpress-slideshow-gallery-146-shell.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34514", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533281/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/slideshow-gallery/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5461.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5461.json index 6c5ddfdd74d..a4e2393b383 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5461.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5461.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5461", "sourceIdentifier": "secalert@redhat.com", "published": "2014-09-04T17:55:07.763", - "lastModified": "2023-05-03T12:15:13.397", + "lastModified": "2024-11-21T02:12:06.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -292,6 +291,112 @@ { "url": "https://security.gentoo.org/glsa/202305-23", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0414.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60869", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61411", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3016", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.lua.org/bugs.html#5.2.2-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:144", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/21/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/21/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/27/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69342", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2338-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201701-53", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/202305-23", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5462.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5462.json index 1b5671cfdd0..3c05dd95119 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5462.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5462.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5462", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:00.073", - "lastModified": "2018-08-23T18:29:00.217", + "lastModified": "2024-11-21T02:12:06.660", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -97,6 +96,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129403/OpenEMR-4.1.2-7-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/24", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/openemr/openemr/issues/1782", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5462/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5464.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5464.json index 2142f9d8583..126af96358b 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5464.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5464.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5464", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-08T14:55:03.187", - "lastModified": "2018-10-09T19:50:20.867", + "lastModified": "2024-11-21T02:12:06.817", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -140,6 +139,69 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95461", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/110437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127995/ntopng-1.2.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/65", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/22", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/28", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/60096", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34419", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.ntop.org/ndpi/released-ndpi-1-5-1-and-ntopng-1-2-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533222/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533332/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69385", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95461", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5465.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5465.json index 6f99a8a2c11..ee1829215cd 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5465.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5465.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5465", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-03T19:55:03.937", - "lastModified": "2014-09-03T20:15:36.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:07.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -130,6 +129,49 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128024/WordPress-ShortCode-1.1-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/download-shortcode/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://wordpress.org/support/topic/plugin-download-shortcode-security-issue", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/support/topic/vulnerability-5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34436", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5466.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5466.json index c3e2aab3bb7..faf3d2f8015 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5466.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5466.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5466", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:05.700", - "lastModified": "2014-12-17T19:31:00.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:07.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -184,6 +183,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.splunk.com/view/SP-CAAANST", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5471.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5471.json index 0794660f580..b0d840a78d4 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5471.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5471.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5471", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-01T01:55:28.530", - "lastModified": "2023-11-07T02:20:50.287", + "lastModified": "2024-11-21T02:12:07.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 4.0, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -185,6 +184,114 @@ "Exploit", "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722450701342&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722544401658&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1318.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0695.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0782.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0803.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/450", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/27/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69396", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2354-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2355-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2356-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2357-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2358-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2359-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1134099", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=88", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-54xx/CVE-2014-5472.json b/CVE-2014/CVE-2014-54xx/CVE-2014-5472.json index 1bbb3d557fb..b1cd9581254 100644 --- a/CVE-2014/CVE-2014-54xx/CVE-2014-5472.json +++ b/CVE-2014/CVE-2014-54xx/CVE-2014-5472.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5472", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-01T01:55:28.593", - "lastModified": "2023-11-07T02:20:50.383", + "lastModified": "2024-11-21T02:12:07.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 4.0, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -181,6 +180,110 @@ "Exploit", "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722450701342&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722544401658&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1318.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0695.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0782.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0803.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/27/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2354-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2355-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2356-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2357-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2358-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2359-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1134099", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=88", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95556", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5501.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5501.json index dfa74714cab..001c6279573 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5501.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5501.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5501", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-07T14:55:06.717", - "lastModified": "2014-10-08T14:44:03.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:08.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -89,6 +88,17 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-334/", "source": "cve@mitre.org" + }, + { + "url": "http://kb.cyberoam.com/default.asp?id=3049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-334/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5502.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5502.json index 7fe45e873ba..9481b923b71 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5502.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5502.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5502", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-07T14:55:06.767", - "lastModified": "2014-10-08T14:44:44.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:08.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -101,6 +100,29 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-333/", "source": "cve@mitre.org" + }, + { + "url": "http://kb.cyberoam.com/default.asp?id=3049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-328/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-331/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-332/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-333/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5503.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5503.json index bc580f95d52..0767b8315ba 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5503.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5503.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5503", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-07T14:55:06.813", - "lastModified": "2014-10-08T14:52:18.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:08.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,17 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-329/", "source": "cve@mitre.org" + }, + { + "url": "http://kb.cyberoam.com/default.asp?id=3049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-329/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5504.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5504.json index 3f6a8ab6339..b76e0d4b28f 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5504.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5504.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5504", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-04T17:55:08.467", - "lastModified": "2014-09-08T17:00:51.870", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:08.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,14 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-303/", "source": "cve@mitre.org" + }, + { + "url": "http://www.solarwinds.com/documentation/lem/docs/releasenotes/releasenotes.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-303/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5505.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5505.json index 58be6fc5d5d..e4cfe9884ee 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5505.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5505.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5505", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-04T17:55:08.887", - "lastModified": "2017-09-08T01:29:06.870", + "lastModified": "2024-11-21T02:12:08.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,30 @@ { "url": "https://service.sap.com/sap/support/notes/1999142", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60877", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69558", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-301/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1999142", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5506.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5506.json index dd57ce18f5d..c58a41682d5 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5506.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5506.json @@ -2,10 +2,8 @@ "id": "CVE-2014-5506", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-04T17:55:08.937", - "lastModified": "2017-01-07T03:00:27.850", + "lastModified": "2024-11-21T02:12:08.897", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +90,27 @@ { "url": "https://service.sap.com/sap/support/notes/1999142", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61016", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69557", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-302/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1999142", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5507.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5507.json index 0825f2e8739..2dd051a23a5 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5507.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5507.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5507", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-03T16:55:06.493", - "lastModified": "2017-09-08T01:29:06.917", + "lastModified": "2024-11-21T02:12:09.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97749", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128806/iBackup-10.0.0.32-Local-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35040", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70724", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97749", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5508.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5508.json index bca46757991..2f84cf31376 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5508.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5508.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5508", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-05T14:55:03.977", - "lastModified": "2014-09-08T16:27:51.960", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:09.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -89,6 +88,24 @@ { "url": "http://www.securityfocus.com/bid/69454", "source": "cve@mitre.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/28/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/30/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69454", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5519.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5519.json index 9493f50c4b8..583023243ac 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5519.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5519.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5519", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:04.083", - "lastModified": "2014-11-13T22:51:05.900", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:09.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -114,6 +113,49 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/110576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128031/PhpWiki-Ploticus-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/77", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/456", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/60293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5520.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5520.json index b0b5fce7566..755275e136c 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5520.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5520.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5520", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-26T20:55:03.417", - "lastModified": "2014-10-31T01:11:41.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:09.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -110,6 +109,45 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128030/XRMS-Blind-SQL-Injection-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/78", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/27/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/29/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69446", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5521.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5521.json index ca9c77bac74..d1bdbcfb451 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5521.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5521.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5521", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-02T14:55:03.857", - "lastModified": "2014-09-03T14:15:52.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:09.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -100,6 +99,35 @@ { "url": "http://www.openwall.com/lists/oss-security/2014/08/29/1", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128030/XRMS-Blind-SQL-Injection-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/78", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/27/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/29/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5524.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5524.json index 37c692a258a..44e46513461 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5524.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5524.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5524", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:09.337", - "lastModified": "2014-09-09T14:47:45.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:10.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/199345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5525.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5525.json index 342df6a9d19..442f1ca81d2 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5525.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5525.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5525", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:09.430", - "lastModified": "2014-09-09T14:55:04.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:10.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/935465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5526.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5526.json index c5d0af34683..1007beb1686 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5526.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5526.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5526", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:09.523", - "lastModified": "2014-09-09T16:40:16.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:10.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/571145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5527.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5527.json index aee467d8bc8..3087cf6fc04 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5527.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5527.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5527", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:09.617", - "lastModified": "2014-09-09T14:56:28.680", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:10.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/123577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5528.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5528.json index 6a27fc078fe..4eae0f361a3 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5528.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5528.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5528", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:09.713", - "lastModified": "2014-09-26T16:14:04.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:10.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/157457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5529.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5529.json index 1111febdee6..63944419d39 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5529.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5529.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5529", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:09.807", - "lastModified": "2014-09-09T15:04:24.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:10.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/943033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5531.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5531.json index 1484d785421..473c738689f 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5531.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5531.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5531", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:10.007", - "lastModified": "2014-09-09T16:39:40.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:11.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/371825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5532.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5532.json index 3f3447e1a95..a968ea72364 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5532.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5532.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5532", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:10.103", - "lastModified": "2014-09-09T15:20:06.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:11.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/748553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5534.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5534.json index 0e91d40802a..229dae493db 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5534.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5534.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5534", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:10.167", - "lastModified": "2014-09-09T18:07:34.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:11.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/991961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5535.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5535.json index 3c15de40c90..06cb7fa3791 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5535.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5535.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5535", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:10.257", - "lastModified": "2014-09-09T15:30:10.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:11.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/946729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5536.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5536.json index 86bc2b3d907..4c4684ee534 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5536.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5536.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5536", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:10.367", - "lastModified": "2014-09-09T16:26:28.920", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:11.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/960369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5537.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5537.json index fcdbd4a646f..2078bc102b6 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5537.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5537.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5537", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:10.430", - "lastModified": "2014-09-09T17:47:04.780", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:11.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/736145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5538.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5538.json index 1f8d08024ee..54a29d5f848 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5538.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5538.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5538", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:10.557", - "lastModified": "2014-09-09T16:31:49.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:12.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/114601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5539.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5539.json index e58cbf6353e..0b5088be4ba 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5539.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5539.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5539", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:10.633", - "lastModified": "2014-09-09T16:39:13.563", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:12.283", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/947785", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5540.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5540.json index b8af44fa993..8da7ea19184 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5540.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5540.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5540", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:12.947", - "lastModified": "2014-09-09T16:43:04.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:12.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/113105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5541.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5541.json index 07c575a4679..4090875578c 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5541.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5541.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5541", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:13.023", - "lastModified": "2014-09-09T16:44:50.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:12.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/636617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5542.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5542.json index be701a892ba..5baa95fa978 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5542.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5542.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5542", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:13.133", - "lastModified": "2014-09-09T16:51:57.553", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:12.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/638641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5543.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5543.json index c3373fc2fa8..c1ec6b9ff46 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5543.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5543.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5543", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:13.243", - "lastModified": "2014-09-09T17:37:42.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:12.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/171273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5544.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5544.json index 74c6bd75d3b..917bd4789b7 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5544.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5544.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5544", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:13.337", - "lastModified": "2014-09-09T16:56:21.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:13.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/533657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5545.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5545.json index 7155d91664c..c46190d8556 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5545.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5545.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5545", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:13.430", - "lastModified": "2014-11-06T16:34:43.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:13.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/744769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5546.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5546.json index 5559dd5b8fe..39375b8a515 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5546.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5546.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5546", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:13.587", - "lastModified": "2014-09-09T17:37:16.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:13.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/205329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5547.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5547.json index 40f0357f21d..1229e38ed12 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5547.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5547.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5547", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:13.713", - "lastModified": "2014-09-09T17:40:18.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:13.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/704553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5548.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5548.json index 539f84852e7..ec13c478623 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5548.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5548.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5548", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:13.820", - "lastModified": "2014-09-09T17:36:36.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:13.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/857673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5549.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5549.json index 75870106175..15079562b77 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5549.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5549.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5549", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:13.917", - "lastModified": "2014-09-09T17:36:17.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:13.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/397257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5550.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5550.json index 177fd0d6850..d9ae623c6a7 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5550.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5550.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5550", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:14.133", - "lastModified": "2014-09-09T17:35:58.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:14.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/372089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5551.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5551.json index 4ff2420d2d2..492b8b8b1f6 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5551.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5551.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5551", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:14.257", - "lastModified": "2014-09-09T17:35:36.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:14.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/663545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5552.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5552.json index 8f1ef57a36f..85afd7e4d72 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5552.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5552.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5552", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:14.367", - "lastModified": "2014-09-09T17:35:18.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:14.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/734473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5553.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5553.json index d318db70971..bb19a6cc274 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5553.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5553.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5553", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:14.447", - "lastModified": "2014-09-09T17:52:03.693", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:14.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -83,13 +82,32 @@ "url": "http://www.kb.cert.org/vuls/id/582497", "source": "cret@cert.org", "tags": [ - "US Government Resource", - "Third Party Advisory" + "Third Party Advisory", + "US Government Resource" ] }, { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/455073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5554.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5554.json index 914a4c1ab58..d9c21a399fa 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5554.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5554.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5554", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:14.540", - "lastModified": "2014-09-09T17:44:22.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:14.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/388721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5555.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5555.json index 73b2e1bbca4..ecebecdb3c8 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5555.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5555.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5555", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:14.650", - "lastModified": "2014-09-09T17:48:12.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:14.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/409577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5556.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5556.json index b4186717a02..af12cc81e1c 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5556.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5556.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5556", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:14.727", - "lastModified": "2014-09-09T17:48:55.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:15.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/478657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5557.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5557.json index ebfbf76cda5..b8013fc0f62 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5557.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5557.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5557", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:14.837", - "lastModified": "2014-09-09T17:57:48.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:15.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/646561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5558.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5558.json index 9b3825a32c1..770b7882ae8 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5558.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5558.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5558", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:14.947", - "lastModified": "2014-09-09T18:02:55.663", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:15.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/599745", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5559.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5559.json index 2f6767bd077..f21eb857d98 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5559.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5559.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5559", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:15.007", - "lastModified": "2014-09-09T18:04:57.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:15.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/433337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5560.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5560.json index 8f5890d380f..fe919ca22e5 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5560.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5560.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5560", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:15.117", - "lastModified": "2014-09-09T18:10:10.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:15.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/586457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5561.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5561.json index 80fcd11311e..bf06b3bbb09 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5561.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5561.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5561", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:15.243", - "lastModified": "2014-09-09T18:09:10.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:16.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/147953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5562.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5562.json index 714a2abbf71..830da8cd79d 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5562.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5562.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5562", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:15.320", - "lastModified": "2014-09-09T18:51:13.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:16.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/889969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5563.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5563.json index c9f57009c73..85578eb4de8 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5563.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5563.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5563", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:15.587", - "lastModified": "2014-11-09T13:45:31.773", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:16.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/325977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5564.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5564.json index 5ddfd97fca4..98c580df7de 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5564.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5564.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5564", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:15.667", - "lastModified": "2014-09-09T18:14:55.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:16.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/610393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5565.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5565.json index 81602020ba2..dc8db17ee79 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5565.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5565.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5565", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:15.773", - "lastModified": "2014-09-09T18:33:02.300", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:16.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/454809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5566.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5566.json index 3f046c2615f..dbb49a2b367 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5566.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5566.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5566", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:15.867", - "lastModified": "2014-09-09T18:39:19.810", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:16.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/805753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5567.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5567.json index 8729062625c..8014f7187f1 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5567.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5567.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5567", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:15.977", - "lastModified": "2014-09-09T18:41:47.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:17.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/768001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5568.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5568.json index 0e86a17c62a..ad9ed7821ab 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5568.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5568.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5568", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:16.070", - "lastModified": "2014-09-09T18:46:07.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:17.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/836289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5569.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5569.json index 43d8db00567..fd3d3d72657 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5569.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5569.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5569", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:16.167", - "lastModified": "2014-09-09T18:50:27.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:17.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/661873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5570.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5570.json index 5a381a2bf51..0e61c5918a3 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5570.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5570.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5570", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:16.273", - "lastModified": "2014-09-09T18:50:33.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:17.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/812177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5571.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5571.json index e6295d6d1fc..85e39f0db92 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5571.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5571.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5571", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:16.353", - "lastModified": "2014-09-09T18:56:31.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:17.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/374729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5572.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5572.json index da45afec805..2d8532b306f 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5572.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5572.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5572", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:16.463", - "lastModified": "2014-09-09T19:03:02.300", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:18.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/342257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5573.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5573.json index f981fd94d70..cd98f0645f5 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5573.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5573.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5573", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:16.557", - "lastModified": "2014-09-09T19:01:40.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:18.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/887857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5574.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5574.json index 270c4c487dd..8d8bd456200 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5574.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5574.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5574", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:16.680", - "lastModified": "2014-09-09T19:18:44.673", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:18.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/315329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5576.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5576.json index 6571a236eb1..fb12f7c77d7 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5576.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5576.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5576", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:16.807", - "lastModified": "2014-09-09T19:13:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:18.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/179457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5577.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5577.json index bee26bb28cf..223236392c8 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5577.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5577.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5577", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:16.883", - "lastModified": "2014-11-19T01:36:02.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:18.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -91,6 +90,26 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/286817", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5578.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5578.json index a1b3030c3ff..9bebb5cafd9 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5578.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5578.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5578", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:17.007", - "lastModified": "2015-11-04T17:55:25.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:18.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -91,6 +90,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/881785", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5579.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5579.json index 0d22b1d99ea..66ae14d5452 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5579.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5579.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5579", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:17.117", - "lastModified": "2017-07-11T14:35:11.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:19.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -93,6 +92,28 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/547385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5580.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5580.json index df4b81de959..06c7b6b1663 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5580.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5580.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5580", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:17.213", - "lastModified": "2014-09-09T20:25:28.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:19.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/328969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5581.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5581.json index 91a13f23886..d9a53cfe9ef 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5581.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5581.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5581", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:17.320", - "lastModified": "2014-09-09T20:19:46.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:19.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/205065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5582.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5582.json index a3d22b38711..e5350a2709b 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5582.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5582.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5582", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:17.400", - "lastModified": "2014-09-09T20:37:07.563", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:19.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/826345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5583.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5583.json index ee151464f3e..0ca50520c91 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5583.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5583.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5583", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:17.507", - "lastModified": "2014-09-09T21:03:33.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:19.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/236305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5584.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5584.json index 82f901d359f..7d259de2ec2 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5584.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5584.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5584", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:17.667", - "lastModified": "2014-09-12T03:05:27.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:20.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/403857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5585.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5585.json index 569ced907c1..7e4dce9477e 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5585.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5585.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5585", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:17.773", - "lastModified": "2014-11-09T21:03:50.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:20.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/630633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5586.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5586.json index 2f3f9b9bf1a..be40ab13f64 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5586.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5586.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5586", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:17.853", - "lastModified": "2014-09-10T00:23:52.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:20.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/839985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5587.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5587.json index 883844b2e25..36728a1ccbe 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5587.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5587.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5587", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:17.930", - "lastModified": "2014-11-09T21:10:01.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:20.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/835585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5588.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5588.json index 3b973280590..2235992ac32 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5588.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5588.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5588", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:18.040", - "lastModified": "2014-11-13T22:29:29.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:20.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/768529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5589.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5589.json index b0a5373f588..d6dcfbd5470 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5589.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5589.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5589", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:18.167", - "lastModified": "2014-09-10T00:55:37.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:20.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/988353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5590.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5590.json index 523f744c8b6..a6cfe3ec72a 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5590.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5590.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5590", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:18.260", - "lastModified": "2014-11-13T22:37:28.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:21.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/370681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5591.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5591.json index f83bc6d5c89..2b9ac74fab6 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5591.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5591.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5591", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:18.383", - "lastModified": "2014-09-10T01:13:58.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:21.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/397081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5592.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5592.json index 58b1f8e78e8..3a6f2bcd3ab 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5592.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5592.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5592", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:18.493", - "lastModified": "2014-09-10T01:22:07.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:21.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/803465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5593.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5593.json index f18156a512c..3c2165fbabd 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5593.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5593.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5593", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:18.557", - "lastModified": "2014-09-10T01:33:19.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:21.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -87,6 +86,22 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/607137", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5594.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5594.json index 72e2444ddeb..b9ea09a6c46 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5594.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5594.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5594", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:19.883", - "lastModified": "2014-09-10T01:36:07.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:21.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/184209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5595.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5595.json index 897dd76de17..2d0b135f621 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5595.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5595.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5595", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:19.993", - "lastModified": "2014-09-10T01:47:19.010", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:21.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/360121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5596.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5596.json index 23847d99dc9..3f1490e05c8 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5596.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5596.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5596", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:28.353", - "lastModified": "2014-09-10T01:55:45.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:22.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/192657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5597.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5597.json index 02f0fbf48cc..96cf1c3becb 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5597.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5597.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5597", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:28.477", - "lastModified": "2014-09-10T01:59:11.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:22.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/824145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5598.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5598.json index 950d3db3c9d..4784058ff1a 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5598.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5598.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5598", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:28.557", - "lastModified": "2014-09-10T02:01:04.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:22.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/524945", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-55xx/CVE-2014-5599.json b/CVE-2014/CVE-2014-55xx/CVE-2014-5599.json index a93b9e99554..ed3663bc340 100644 --- a/CVE-2014/CVE-2014-55xx/CVE-2014-5599.json +++ b/CVE-2014/CVE-2014-55xx/CVE-2014-5599.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5599", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:29.227", - "lastModified": "2014-09-10T02:01:55.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:22.623", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/645681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5600.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5600.json index fe1f07a86fa..7dd153cba0a 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5600.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5600.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5600", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:29.337", - "lastModified": "2014-09-10T02:02:49.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:22.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/334425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5601.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5601.json index d12c6749649..0f1b7a78acc 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5601.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5601.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5601", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:29.417", - "lastModified": "2014-09-10T02:04:06.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:22.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/503385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5602.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5602.json index ae5aba5af30..8efe003750f 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5602.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5602.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5602", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:29.570", - "lastModified": "2014-09-10T02:05:00.603", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:23.103", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/539729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5603.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5603.json index c91a6fd515f..f95bd0c37d4 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5603.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5603.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5603", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:29.697", - "lastModified": "2014-09-10T02:07:50.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:23.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/686513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5604.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5604.json index 032780ecec1..c72b6db4127 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5604.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5604.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5604", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:29.773", - "lastModified": "2014-09-10T02:14:13.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:23.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -87,6 +86,22 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/370769", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5605.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5605.json index 2c6470d8a5f..3bb93996c2f 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5605.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5605.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5605", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:29.867", - "lastModified": "2014-09-12T03:04:29.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:23.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/744857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5606.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5606.json index 7c6deb1031d..b6e051ae751 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5606.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5606.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5606", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:29.963", - "lastModified": "2017-11-30T15:26:04.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:23.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -93,6 +92,28 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/680529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5607.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5607.json index ca104fa3f4f..7ea4784a301 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5607.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5607.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5607", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:30.040", - "lastModified": "2017-11-30T15:26:33.923", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:23.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -94,6 +93,29 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/585841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5608.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5608.json index 64b89bcffe2..5c822c5ffa9 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5608.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5608.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5608", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:30.150", - "lastModified": "2014-09-11T17:09:16.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:24.113", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/313833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5609.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5609.json index 0a26177dd9d..75de2d5776f 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5609.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5609.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5609", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:30.260", - "lastModified": "2014-09-11T17:08:47.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:24.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/587073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5610.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5610.json index 4224c560e9a..a9b201bdb99 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5610.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5610.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5610", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:30.367", - "lastModified": "2014-09-11T15:51:54.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:24.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/525561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5611.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5611.json index e20d2fbdb50..15f0e8ffb1a 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5611.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5611.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5611", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:30.447", - "lastModified": "2014-09-11T17:08:16.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:24.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/247305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5612.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5612.json index 7a5d904de6d..4d259127b21 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5612.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5612.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5612", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:30.557", - "lastModified": "2014-09-11T17:07:42.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:24.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/707457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5613.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5613.json index 1d7050772fe..3e40ed6e032 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5613.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5613.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5613", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:30.650", - "lastModified": "2014-09-11T17:00:20.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:24.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/692497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5614.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5614.json index 6d6eaaaf6fb..f0f9048d9a4 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5614.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5614.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5614", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:30.743", - "lastModified": "2014-09-11T16:59:46.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:25.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/737553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5615.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5615.json index 738dbb189ff..85f31885b2e 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5615.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5615.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5615", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:30.867", - "lastModified": "2014-09-11T15:17:43.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:25.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/588481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5616.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5616.json index 275c6a37208..105f782a13f 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5616.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5616.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5616", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:30.963", - "lastModified": "2014-09-11T01:58:19.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:25.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/817105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5617.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5617.json index 0f7793932b4..5488676d148 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5617.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5617.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5617", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:31.070", - "lastModified": "2014-09-11T01:58:03.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:25.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/459297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5618.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5618.json index a0ce0e6de98..1638378f96e 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5618.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5618.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5618", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:31.150", - "lastModified": "2014-09-11T01:57:40.503", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:25.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/164409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5620.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5620.json index 44ad2af490a..2e91b99a1d6 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5620.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5620.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5620", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:31.383", - "lastModified": "2014-09-11T01:57:03.533", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:25.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/602913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5621.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5621.json index a17001398f9..0585f30682d 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5621.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5621.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5621", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:31.493", - "lastModified": "2014-09-11T01:56:45.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:26.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/295617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5622.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5622.json index efe5b78cbde..80fc44eb5be 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5622.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5622.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5622", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:31.603", - "lastModified": "2014-09-11T01:56:22.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:26.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/282857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5623.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5623.json index 3e1781b12a2..8127c18bf63 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5623.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5623.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5623", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:31.713", - "lastModified": "2014-09-11T01:56:02.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:26.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/637673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5624.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5624.json index 95c06447d23..29a320abbf5 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5624.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5624.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5624", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:31.820", - "lastModified": "2014-09-11T01:55:44.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:26.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/904753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5625.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5625.json index 143c6e6b4b8..43a8c063d9a 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5625.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5625.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5625", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:31.963", - "lastModified": "2014-09-10T23:17:41.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:26.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/105449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5626.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5626.json index f586abf8cdc..82bb1605e44 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5626.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5626.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5626", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:32.070", - "lastModified": "2014-09-10T23:19:13.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:26.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/734561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5627.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5627.json index 6f21a112d65..8f05bc905bc 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5627.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5627.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5627", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:32.150", - "lastModified": "2014-09-10T23:21:36.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:27.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/520633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5628.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5628.json index 28ee242aa5f..454f76ad16c 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5628.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5628.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5628", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:32.260", - "lastModified": "2014-09-10T23:22:22.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:27.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/695577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5629.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5629.json index 6965d65f1f4..663ea526c3b 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5629.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5629.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5629", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:32.353", - "lastModified": "2014-09-10T23:27:28.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:27.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/327649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5630.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5630.json index 7582baf9332..d8b5bb4a5e2 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5630.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5630.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5630", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:32.447", - "lastModified": "2014-09-10T23:29:07.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:27.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/985713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5631.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5631.json index 0ebb699653e..67798d5ad5b 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5631.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5631.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5631", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:32.510", - "lastModified": "2014-09-10T23:29:44.790", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:27.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/565689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5632.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5632.json index d29544174e6..f50dc7af369 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5632.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5632.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5632", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:32.867", - "lastModified": "2014-09-10T23:30:40.823", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:27.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/615761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5633.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5633.json index 4efbbfb1f8e..72331805611 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5633.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5633.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5633", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:32.993", - "lastModified": "2014-09-10T23:32:54.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:28.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/814377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5634.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5634.json index 1b17978d7ce..5b8fc450032 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5634.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5634.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5634", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:33.117", - "lastModified": "2014-09-10T23:34:18.620", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:28.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/650873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5635.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5635.json index ffc0e28f1b6..4c75a132d34 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5635.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5635.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5635", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:33.227", - "lastModified": "2014-09-10T23:34:56.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:28.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/348417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5636.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5636.json index 6598abba111..ebb54caebb0 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5636.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5636.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5636", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:33.307", - "lastModified": "2014-09-10T23:38:05.577", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:28.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/512713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5637.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5637.json index 867f9621867..325dd891899 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5637.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5637.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5637", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:33.417", - "lastModified": "2014-09-10T23:38:56.780", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:28.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/716257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5638.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5638.json index 793ab6d929b..37726dabde1 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5638.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5638.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5638", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:33.523", - "lastModified": "2014-09-10T23:39:34.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:28.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/444865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5639.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5639.json index 36a0964dcea..dc14460c3ff 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5639.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5639.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5639", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:33.633", - "lastModified": "2014-09-11T00:47:40.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:29.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/741777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5640.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5640.json index 834a95e812e..96a70d29c6a 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5640.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5640.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5640", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:33.697", - "lastModified": "2017-07-11T14:04:07.393", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:29.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -93,6 +92,28 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/596049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5641.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5641.json index e2555f973c9..eb619ff95bd 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5641.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5641.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5641", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:33.837", - "lastModified": "2014-09-11T00:49:30.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:29.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/714937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5642.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5642.json index 41cb92c454f..8857cc75ff5 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5642.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5642.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5642", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:33.930", - "lastModified": "2014-09-11T00:50:41.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:29.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/148217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5643.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5643.json index 69d3dda879c..f66b484b6c1 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5643.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5643.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5643", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:34.040", - "lastModified": "2014-09-11T00:51:30.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:29.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/507873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5644.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5644.json index 047bf627b17..9a7413d460b 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5644.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5644.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5644", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:34.150", - "lastModified": "2014-09-11T00:52:15.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:29.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/272385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5645.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5645.json index d9b855d99d9..0a96e08b47d 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5645.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5645.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5645", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:34.273", - "lastModified": "2014-09-11T00:55:50.980", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:30.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/171097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5646.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5646.json index 664ef9bee01..8b046c9df55 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5646.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5646.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5646", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:34.383", - "lastModified": "2017-07-11T14:28:41.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:30.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -94,6 +93,29 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/206913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5647.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5647.json index 2a299c658d2..b3ee3c9675f 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5647.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5647.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5647", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:34.493", - "lastModified": "2014-09-11T00:58:31.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:30.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/290865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5648.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5648.json index 852af5ff362..82cd882f7ff 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5648.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5648.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5648", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:34.617", - "lastModified": "2017-07-11T14:52:24.587", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:30.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -93,6 +92,28 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/235425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5649.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5649.json index 5174366dd7e..56c75559883 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5649.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5649.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5649", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:34.743", - "lastModified": "2014-09-11T01:00:24.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:30.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/686689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5650.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5650.json index d24a8e478b8..3ca345f9dfc 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5650.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5650.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5650", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:34.837", - "lastModified": "2014-09-11T01:07:21.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:30.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/698217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5651.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5651.json index 0727c243f7a..869db20a4ad 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5651.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5651.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5651", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:34.963", - "lastModified": "2014-09-11T01:08:10.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:31.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/414153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5652.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5652.json index b92c1b591cb..d13653910ca 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5652.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5652.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5652", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:35.070", - "lastModified": "2014-09-11T01:12:28.497", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:31.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/884689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5653.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5653.json index 332ee144b07..3e29b8b9e94 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5653.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5653.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5653", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:35.167", - "lastModified": "2014-09-11T01:13:05.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:31.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/993545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5654.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5654.json index 46dfa43b586..1645bb27cc7 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5654.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5654.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5654", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:35.260", - "lastModified": "2014-09-11T01:14:02.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:31.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/218177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5655.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5655.json index f9db57ac73b..959fefec90e 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5655.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5655.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5655", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:35.367", - "lastModified": "2014-09-11T01:16:40.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:31.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/543249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5656.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5656.json index 4520c5a3fb3..402dd26d613 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5656.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5656.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5656", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:35.477", - "lastModified": "2014-09-11T01:20:44.790", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:31.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/677185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5657.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5657.json index b8f78294c2e..721f3d7882c 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5657.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5657.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5657", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:35.603", - "lastModified": "2014-09-11T01:21:23.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:32.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/976385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5658.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5658.json index 7bef8baa6a8..cc096209b92 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5658.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5658.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5658", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:35.697", - "lastModified": "2014-09-11T01:22:01.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:33.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/297993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5659.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5659.json index 6590398d576..d636ed303e4 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5659.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5659.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5659", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:35.790", - "lastModified": "2014-09-11T01:22:45.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:33.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/870521", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5660.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5660.json index 77e2ecc6c30..ca814885b49 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5660.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5660.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5660", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:35.867", - "lastModified": "2014-09-11T01:23:26.227", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:33.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/156225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5661.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5661.json index 3f5e447740d..bab310c02fb 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5661.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5661.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5661", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:36.070", - "lastModified": "2014-09-11T01:26:32.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:33.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/298433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5662.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5662.json index f678f098a84..13bf9c6d191 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5662.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5662.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5662", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:36.180", - "lastModified": "2014-09-11T01:27:37.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:33.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/678681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5663.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5663.json index dc979461259..fa661a1e3b8 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5663.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5663.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5663", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:36.273", - "lastModified": "2014-09-11T01:28:23.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:34.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/926137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5664.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5664.json index 68c90636644..42f871f039b 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5664.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5664.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5664", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:36.367", - "lastModified": "2014-09-11T01:30:09.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:34.187", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -83,13 +82,32 @@ "url": "http://www.kb.cert.org/vuls/id/582497", "source": "cret@cert.org", "tags": [ - "US Government Resource", - "Third Party Advisory" + "Third Party Advisory", + "US Government Resource" ] }, { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/194329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5665.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5665.json index e354bf9e839..cfc5b8f09d8 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5665.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5665.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5665", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.507", - "lastModified": "2014-12-03T19:46:28.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:34.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/188873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5666.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5666.json index 5419196378d..6f3ca6808b1 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5666.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5666.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5666", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:36.447", - "lastModified": "2014-09-11T01:31:18.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:34.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/429641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5667.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5667.json index 5da17f1477a..357002c68b5 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5667.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5667.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5667", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:36.727", - "lastModified": "2017-07-11T14:43:45.973", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:34.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -93,6 +92,28 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/274585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5668.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5668.json index cb0f6657f36..89ad994d86e 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5668.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5668.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5668", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:36.853", - "lastModified": "2014-09-11T01:32:53.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:34.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/804257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5669.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5669.json index cc396bac3fb..401031a104c 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5669.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5669.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5669", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:36.977", - "lastModified": "2014-09-11T01:33:44.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:35.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/977969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5670.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5670.json index 80c30596a12..1b2132abc7a 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5670.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5670.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5670", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:37.070", - "lastModified": "2014-09-11T01:35:46.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:35.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/274057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5671.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5671.json index 2feb60ffa45..f9739ba5c42 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5671.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5671.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5671", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:37.180", - "lastModified": "2014-09-11T01:37:47.300", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:35.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/591297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5672.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5672.json index 3f6e86d771f..94a612a607a 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5672.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5672.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5672", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:38.133", - "lastModified": "2014-09-11T01:42:30.570", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:35.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/660905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5673.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5673.json index 0a1120ebbe2..8ef212dc84f 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5673.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5673.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5673", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:38.260", - "lastModified": "2014-09-11T01:43:40.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:35.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/625529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5674.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5674.json index a0b4b2cddd6..6cbadb47d79 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5674.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5674.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5674", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:38.337", - "lastModified": "2014-09-11T01:45:26.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:35.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/989497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5675.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5675.json index 45c9b69da24..da446b802e6 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5675.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5675.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5675", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:47.367", - "lastModified": "2014-09-11T01:53:59.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:36.093", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/476193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5676.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5676.json index 94596a9a045..7cddf260bd4 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5676.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5676.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5676", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:47.493", - "lastModified": "2014-09-11T13:24:05.277", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:36.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/524769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5677.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5677.json index 9fa2f347b19..2382e6274d9 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5677.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5677.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5677", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:47.587", - "lastModified": "2014-09-11T13:11:18.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:36.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/344193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5678.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5678.json index 32094caa762..2e1ebdce318 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5678.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5678.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5678", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:47.697", - "lastModified": "2014-09-11T13:12:11.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:36.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/921209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5679.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5679.json index b4ad5e2e3c5..ae032248a25 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5679.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5679.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5679", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:47.807", - "lastModified": "2014-09-11T13:18:07.670", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:36.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/408169", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5680.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5680.json index de7abe9317e..e050c4fe443 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5680.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5680.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5680", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:47.930", - "lastModified": "2014-09-11T15:17:12.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:36.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/650961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5681.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5681.json index 5029d339ebe..b26fd66b3dc 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5681.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5681.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5681", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.087", - "lastModified": "2014-09-11T14:06:35.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:37.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/605905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5682.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5682.json index 2b543f1f010..0f1a41817b4 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5682.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5682.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5682", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.180", - "lastModified": "2014-09-11T13:55:09.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:37.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/383617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5683.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5683.json index 1fa753b13fe..c20dd58286c 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5683.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5683.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5683", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.290", - "lastModified": "2014-09-11T13:52:50.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:37.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/188697", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5684.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5684.json index 188aac80b40..eaf78a6b78a 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5684.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5684.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5684", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.383", - "lastModified": "2014-09-11T13:54:21.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:37.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/197145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5685.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5685.json index f78a725d540..c2603b78f3a 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5685.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5685.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5685", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.463", - "lastModified": "2014-09-11T15:16:44.713", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:37.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/654921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5686.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5686.json index 822ade0a0e4..7aedbc90f2b 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5686.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5686.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5686", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.557", - "lastModified": "2014-09-12T01:55:49.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:37.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/520897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5687.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5687.json index ce00adfd612..3319b4a80e9 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5687.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5687.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5687", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.617", - "lastModified": "2014-09-11T14:15:08.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:38.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/336449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5688.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5688.json index ffd72d78a72..1e3877e8384 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5688.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5688.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5688", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.713", - "lastModified": "2014-09-12T01:57:47.140", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:38.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/941801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5689.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5689.json index 3a5212b99b4..7eec60f55a9 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5689.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5689.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5689", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.790", - "lastModified": "2014-09-12T01:59:11.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:38.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/806457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5690.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5690.json index a33020ac1cf..d9fa75224e9 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5690.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5690.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5690", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.883", - "lastModified": "2014-09-12T02:00:28.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:38.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/518785", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5691.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5691.json index 9a3b63ac309..df5869c6a11 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5691.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5691.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5691", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T01:55:48.977", - "lastModified": "2014-09-12T02:02:28.503", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:38.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/126217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5692.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5692.json index 68fb1889a5d..c56eaffa9df 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5692.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5692.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5692", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:07.847", - "lastModified": "2014-09-12T02:08:14.230", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:38.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/692585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5693.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5693.json index 3dd6db13043..a1cfaed5170 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5693.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5693.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5693", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:07.910", - "lastModified": "2014-09-12T02:09:23.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:39.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/869729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5694.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5694.json index 12810a84648..9c549a81c4c 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5694.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5694.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5694", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:07.957", - "lastModified": "2014-09-12T02:10:47.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:39.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/182449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5695.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5695.json index fa4dbb58bec..f584d8670c1 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5695.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5695.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5695", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.020", - "lastModified": "2014-09-12T02:11:29.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:39.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/580825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5696.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5696.json index f756a515cb9..332dcb11748 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5696.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5696.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5696", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.067", - "lastModified": "2014-09-12T02:12:23.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:39.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/148041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5697.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5697.json index 2947963178f..deaa8dcafcb 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5697.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5697.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5697", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.130", - "lastModified": "2014-09-12T02:13:15.313", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:39.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/259185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5698.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5698.json index dd2a47d3a1f..7f33aaad573 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5698.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5698.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5698", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.160", - "lastModified": "2014-09-12T02:14:03.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:39.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/493617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-56xx/CVE-2014-5699.json b/CVE-2014/CVE-2014-56xx/CVE-2014-5699.json index 04e0a5097e1..a74e875de20 100644 --- a/CVE-2014/CVE-2014-56xx/CVE-2014-5699.json +++ b/CVE-2014/CVE-2014-56xx/CVE-2014-5699.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5699", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.207", - "lastModified": "2014-09-12T02:17:01.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:40.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/956233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5700.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5700.json index a986fe996f9..925af416698 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5700.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5700.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5700", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.270", - "lastModified": "2014-09-12T02:18:08.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:40.173", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/622625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5701.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5701.json index f70b09414e5..effbb794f2a 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5701.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5701.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5701", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.317", - "lastModified": "2014-09-12T02:18:59.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:40.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/120497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5702.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5702.json index 0a0fa2e3a7c..b5d91456e12 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5702.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5702.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5702", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.363", - "lastModified": "2014-09-12T02:19:50.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:40.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/588217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5703.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5703.json index 9a60daed0ff..c606eec1e5b 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5703.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5703.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5703", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.410", - "lastModified": "2014-09-12T02:20:45.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:40.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/679385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5704.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5704.json index e4eaa1f7fb7..ebdf2a97d64 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5704.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5704.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5704", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.473", - "lastModified": "2016-06-17T02:00:14.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:40.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -94,6 +93,29 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/889617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5705.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5705.json index 230f6afbca6..67d28b4cd62 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5705.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5705.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5705", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.520", - "lastModified": "2014-09-12T02:22:50.393", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:41.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/710889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5706.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5706.json index d8225254d44..2ce8a20f712 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5706.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5706.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5706", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.567", - "lastModified": "2014-09-12T02:23:41.833", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:41.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/868409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5707.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5707.json index 64e97bd3140..22770ef3f44 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5707.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5707.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5707", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.630", - "lastModified": "2014-09-12T02:24:29.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:41.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/611449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5708.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5708.json index c7e70353422..004b052d81f 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5708.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5708.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5708", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.677", - "lastModified": "2014-09-12T02:25:39.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:41.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/403681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5709.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5709.json index a8b5bf37961..d76707da7e2 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5709.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5709.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5709", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.723", - "lastModified": "2014-09-12T02:26:40.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:41.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/251265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5710.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5710.json index 879a70e7832..63b7b79ac61 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5710.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5710.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5710", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.787", - "lastModified": "2014-09-12T02:37:25.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:41.867", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/319993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5711.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5711.json index fcd0d8cd265..7fbad1cde34 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5711.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5711.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5711", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.833", - "lastModified": "2014-09-12T02:38:35.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:42.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/318321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5712.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5712.json index 06fb279f9d2..60974869cef 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5712.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5712.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5712", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.880", - "lastModified": "2014-09-12T02:39:23.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:42.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/382913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5713.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5713.json index 1d975d490f1..bd063f7949a 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5713.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5713.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5713", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.943", - "lastModified": "2014-09-12T02:42:13.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:42.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/171361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5714.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5714.json index 7856e1db9f2..54a2cfea09c 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5714.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5714.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5714", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:08.990", - "lastModified": "2014-09-12T02:43:09.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:42.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/940129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5715.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5715.json index 5d5337a0e08..24ac662ed56 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5715.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5715.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5715", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.037", - "lastModified": "2014-09-12T02:44:01.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:42.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/420489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5716.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5716.json index fa4717fae28..a0b7857505f 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5716.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5716.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5716", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.097", - "lastModified": "2014-09-12T02:44:49.783", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:42.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/301425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5717.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5717.json index 9a8ccc20e1b..23d51e83ca9 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5717.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5717.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5717", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.160", - "lastModified": "2014-09-12T02:45:33.970", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:43.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/401569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5719.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5719.json index fae26db7295..cb8487509d7 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5719.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5719.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5719", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.257", - "lastModified": "2014-09-12T02:47:34.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:43.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/255225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5720.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5720.json index d1c698be43d..e7ba71e2775 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5720.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5720.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5720", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.303", - "lastModified": "2014-09-12T02:49:06.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:43.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/867177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5721.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5721.json index 60f6fea9ead..f1ad8575af8 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5721.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5721.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5721", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.363", - "lastModified": "2014-09-12T02:50:36.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:43.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/290513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5722.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5722.json index 919a59d0c9f..a608f738903 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5722.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5722.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5722", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.410", - "lastModified": "2014-09-12T02:51:34.150", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:43.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/825905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5723.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5723.json index c95076a943d..6747227b512 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5723.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5723.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5723", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.457", - "lastModified": "2014-09-12T02:52:15.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:43.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/797657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5724.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5724.json index c174c2f7be6..a6a80b723da 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5724.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5724.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5724", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.507", - "lastModified": "2014-09-12T02:53:10.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:44.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/627641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5725.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5725.json index c6d99f39235..bfb636a5dff 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5725.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5725.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5725", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.567", - "lastModified": "2014-09-12T02:54:15.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:44.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/535417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5726.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5726.json index 2dea4cad017..b6175cbf091 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5726.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5726.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5726", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.613", - "lastModified": "2014-09-12T02:55:31.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:44.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/263585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5727.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5727.json index 4d3a28bc3b3..ec801c121fc 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5727.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5727.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5727", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.660", - "lastModified": "2014-09-12T02:57:10.483", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:44.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/751193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5728.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5728.json index 8493bd59365..371730f370f 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5728.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5728.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5728", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.723", - "lastModified": "2014-09-12T02:57:56.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:44.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/722241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5729.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5729.json index 870230a903f..110f12a2ede 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5729.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5729.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5729", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.770", - "lastModified": "2014-09-12T02:58:46.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:44.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/842977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5730.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5730.json index b6d14ee42e8..7a8fdc96a17 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5730.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5730.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5730", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.817", - "lastModified": "2014-09-12T02:59:56.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:45.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/972513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5731.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5731.json index d09bd323e6b..7ba5937a31f 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5731.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5731.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5731", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.880", - "lastModified": "2014-09-12T03:01:07.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:45.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/151121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5732.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5732.json index df02ee6f6d8..2582eb1a7e3 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5732.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5732.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5732", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.927", - "lastModified": "2014-12-10T18:21:13.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:45.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/398929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5733.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5733.json index 75a2f5875cd..4ab30ca7655 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5733.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5733.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5733", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:09.990", - "lastModified": "2014-09-12T03:02:49.663", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:45.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/911441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5734.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5734.json index 4e6c694d4fc..98988a56ec7 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5734.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5734.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5734", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.053", - "lastModified": "2014-09-12T03:03:41.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:45.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/741161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5735.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5735.json index 8ddbfb5d738..8d79caf37d0 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5735.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5735.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5735", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.100", - "lastModified": "2014-09-12T02:56:17.420", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:45.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/624209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5736.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5736.json index ac5d1f0627d..62e3ae4cfdd 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5736.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5736.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5736", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.147", - "lastModified": "2014-09-15T17:48:40.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:46.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/113457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5737.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5737.json index a33a91dbb3f..64001f78d83 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5737.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5737.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5737", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.207", - "lastModified": "2014-09-15T18:52:20.460", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:46.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/629401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5738.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5738.json index 5d511d0d9d7..d06f304a95e 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5738.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5738.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5738", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.270", - "lastModified": "2014-09-16T01:24:28.890", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:46.837", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/558385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5739.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5739.json index d6b12d3ca64..50285666fee 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5739.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5739.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5739", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.317", - "lastModified": "2014-09-16T01:24:03.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:47.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/449177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5740.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5740.json index a684f649ec0..ffb1d7544df 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5740.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5740.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5740", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.380", - "lastModified": "2014-09-16T01:21:41.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:47.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/231113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5741.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5741.json index 40610ff1824..60d22463439 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5741.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5741.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5741", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.427", - "lastModified": "2014-09-16T01:25:22.343", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:47.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/783313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5742.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5742.json index 4baf74105ff..2a781d80897 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5742.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5742.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5742", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.490", - "lastModified": "2014-09-16T14:52:31.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:47.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/954473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5743.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5743.json index 3cbf1af79fd..0a515deb075 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5743.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5743.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5743", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.553", - "lastModified": "2014-09-16T14:52:09.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:47.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/561025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5744.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5744.json index 7f1c2122df5..001d6bec12b 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5744.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5744.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5744", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.600", - "lastModified": "2014-09-16T14:51:40.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:47.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -83,13 +82,32 @@ "url": "http://www.kb.cert.org/vuls/id/582497", "source": "cret@cert.org", "tags": [ - "US Government Resource", - "Third Party Advisory" + "Third Party Advisory", + "US Government Resource" ] }, { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/449617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5745.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5745.json index 570dc1ed25c..1a71587909a 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5745.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5745.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5745", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.660", - "lastModified": "2014-09-16T13:49:57.803", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:48.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/169865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5746.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5746.json index 90f3bc9dd6e..aee29ea6d07 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5746.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5746.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5746", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.707", - "lastModified": "2014-09-16T13:49:09.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:48.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/159129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5747.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5747.json index 527a528dee5..9db88cc8ae0 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5747.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5747.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5747", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.757", - "lastModified": "2014-09-16T13:48:13.380", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:48.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/743801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5748.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5748.json index 7c3b8933a8d..98ab1d7870f 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5748.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5748.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5748", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.817", - "lastModified": "2014-09-16T13:48:49.677", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:48.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -83,13 +82,32 @@ "url": "http://www.kb.cert.org/vuls/id/582497", "source": "cret@cert.org", "tags": [ - "US Government Resource", - "Third Party Advisory" + "Third Party Advisory", + "US Government Resource" ] }, { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/559969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5749.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5749.json index 1a884bc5b7e..35be17b3fa6 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5749.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5749.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5749", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.863", - "lastModified": "2014-09-16T13:50:19.803", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:48.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -83,13 +82,32 @@ "url": "http://www.kb.cert.org/vuls/id/582497", "source": "cret@cert.org", "tags": [ - "US Government Resource", - "Third Party Advisory" + "Third Party Advisory", + "US Government Resource" ] }, { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/304593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5750.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5750.json index 074d03e983c..24efb729404 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5750.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5750.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5750", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.927", - "lastModified": "2014-09-16T14:19:07.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:48.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/546945", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5751.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5751.json index e2bbd1d6cd9..2d7a8c4cab7 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5751.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5751.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5751", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:10.973", - "lastModified": "2014-09-16T14:18:36.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:49.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/354049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5752.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5752.json index fa0cf623b95..8eb8a07fd97 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5752.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5752.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5752", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.037", - "lastModified": "2014-09-16T14:50:21.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:49.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/467305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5753.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5753.json index 4c6b7f8b1a3..29172d02579 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5753.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5753.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5753", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.100", - "lastModified": "2014-09-16T14:51:11.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:49.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/121905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5754.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5754.json index 3fcb0646a59..700752b6a55 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5754.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5754.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5754", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.147", - "lastModified": "2014-09-16T14:50:51.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:49.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/136689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5755.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5755.json index b240b2b17f2..ee1dcd81d6d 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5755.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5755.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5755", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.207", - "lastModified": "2014-09-16T14:57:34.260", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:49.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/820537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5756.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5756.json index b2acb6cc541..fc28f1f7a87 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5756.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5756.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5756", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.270", - "lastModified": "2014-09-16T18:25:45.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:49.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/987209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5757.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5757.json index daab0e899c2..cdf5c6df7fe 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5757.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5757.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5757", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.317", - "lastModified": "2014-09-16T18:25:20.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:50.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/859697", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5758.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5758.json index 7a152ff6f71..57bd4a3bce6 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5758.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5758.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5758", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.380", - "lastModified": "2014-09-16T18:24:51.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:50.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/815521", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5759.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5759.json index e85cc9358ce..09e888306fa 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5759.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5759.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5759", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.427", - "lastModified": "2014-09-16T18:24:30.260", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:50.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/862689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5760.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5760.json index 1af03df8ac1..556f79280f9 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5760.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5760.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5760", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.490", - "lastModified": "2014-09-16T18:23:43.197", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:50.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/638993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5761.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5761.json index 2e37b755da0..cfc20bb6994 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5761.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5761.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5761", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.537", - "lastModified": "2014-09-16T18:23:11.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:50.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/823001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5762.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5762.json index e56f854e08e..dc252566476 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5762.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5762.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5762", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.600", - "lastModified": "2014-09-16T18:22:54.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:50.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/154729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5763.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5763.json index 0e503b42f3e..46b3e23a33a 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5763.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5763.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5763", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.647", - "lastModified": "2014-09-16T18:22:34.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:51.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/572113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5764.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5764.json index 2106d7a1f5f..02cb29e5a6c 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5764.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5764.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5764", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.707", - "lastModified": "2014-09-16T18:22:13.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:51.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/752161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5765.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5765.json index a2bce9685b4..54c9fa09054 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5765.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5765.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5765", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.757", - "lastModified": "2014-09-16T18:21:50.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:51.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/219145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5766.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5766.json index 29109bac2c4..7055b34e50a 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5766.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5766.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5766", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.817", - "lastModified": "2014-09-16T18:21:31.713", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:51.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/287873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5767.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5767.json index 2c2bff0337e..162922c4229 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5767.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5767.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5767", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.863", - "lastModified": "2014-09-16T18:21:08.587", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:51.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/800385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5768.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5768.json index a18000820a7..d30e7c252ba 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5768.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5768.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5768", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.927", - "lastModified": "2014-09-16T18:20:48.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:51.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/606961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5769.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5769.json index d5353fdeec4..f1ff7be999a 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5769.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5769.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5769", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:11.973", - "lastModified": "2014-09-16T18:20:03.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:52.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/259361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5770.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5770.json index 99f57b5ecaa..68c8a5b4a79 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5770.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5770.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5770", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.037", - "lastModified": "2014-09-16T01:22:37.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:52.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/718105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5771.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5771.json index 2c6e150135b..3e650abc471 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5771.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5771.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5771", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.083", - "lastModified": "2014-09-16T18:19:44.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:52.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/498017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5772.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5772.json index 1688afccdb0..4f121764876 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5772.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5772.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5772", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.147", - "lastModified": "2014-09-16T18:19:07.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:52.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -91,6 +90,26 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/520105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5773.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5773.json index 448cc189649..e7e4cb588fc 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5773.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5773.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5773", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.193", - "lastModified": "2014-09-16T18:17:50.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:52.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/424889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5774.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5774.json index b68c860f9ca..bc6421a12e6 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5774.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5774.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5774", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.257", - "lastModified": "2014-09-17T12:53:27.823", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:52.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/946377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5775.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5775.json index 10074e2d60b..ffb509dc83c 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5775.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5775.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5775", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.317", - "lastModified": "2014-09-17T12:53:54.793", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:53.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/441697", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5776.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5776.json index 88a51841d12..fac80e02100 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5776.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5776.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5776", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.363", - "lastModified": "2015-02-05T17:37:54.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:53.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "La aplicaci\u00f3n PlayMemories Online (tambi\u00e9n conocido como jp.co.sony.tablet.PersonalSpace) 4.2.0.05070 para Android no verifica los certificados X.509 de los servidores SSL, lo que permite a atacantes man-in-the-middle falsificar servidores y obtener informaci\u00f3n sensible a trav\u00e9s de un certificado manipulado." } ], - "vendorComments": [ - { - "organization": "The Secure@Sony Team", - "comment": "Remediation: Fixed the vulnerability in Playmemories online version 4.3.1 and the latest version 4.4.0", - "lastModified": "2015-02-05T12:36:22.350" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -97,6 +89,32 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/358009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "The Secure@Sony Team", + "comment": "Remediation: Fixed the vulnerability in Playmemories online version 4.3.1 and the latest version 4.4.0", + "lastModified": "2015-02-05T12:36:22.350" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5777.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5777.json index d95a907d4a5..19a7cd2bd04 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5777.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5777.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5777", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.427", - "lastModified": "2014-09-17T12:55:04.403", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:53.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/437913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5778.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5778.json index 52327e45a7b..d9969123a36 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5778.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5778.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5778", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.473", - "lastModified": "2014-09-17T12:55:48.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:53.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/538849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5779.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5779.json index f6e98ebbd07..e4232fb01eb 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5779.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5779.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5779", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.537", - "lastModified": "2014-09-17T12:52:43.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:53.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/481913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5780.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5780.json index 43e74959cd0..112c8d8c147 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5780.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5780.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5780", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.600", - "lastModified": "2014-09-17T12:57:43.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:53.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/325361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5781.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5781.json index 704a62f3ebf..1036e8c7c11 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5781.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5781.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5781", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.647", - "lastModified": "2014-09-17T12:59:17.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:54.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/905457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5782.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5782.json index d72b76e21f3..4a4d9cdf257 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5782.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5782.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5782", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.707", - "lastModified": "2014-09-17T13:00:30.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:54.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/721185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5783.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5783.json index 3400c202764..64d8a522a41 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5783.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5783.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5783", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.757", - "lastModified": "2014-09-17T16:05:19.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:54.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/574489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5784.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5784.json index 881b40fbcdd..c0263759c14 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5784.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5784.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5784", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.817", - "lastModified": "2014-09-17T16:07:34.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:54.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/114865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5785.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5785.json index 515f8f511ec..a87c48f72dd 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5785.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5785.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5785", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.880", - "lastModified": "2014-09-17T16:11:13.620", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:54.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/986153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5786.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5786.json index 0d523868a4a..4ac44e28671 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5786.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5786.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5786", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:12.927", - "lastModified": "2014-09-17T16:04:04.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:54.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/490625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5787.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5787.json index d7560b858f7..77fbab7953e 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5787.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5787.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5787", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.053", - "lastModified": "2014-09-17T18:58:10.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:55.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/752689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5788.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5788.json index bc95f3646e1..a96fbd6bcaf 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5788.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5788.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5788", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.113", - "lastModified": "2014-09-17T16:15:54.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:55.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/460705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5789.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5789.json index 14de2034a56..372b001acda 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5789.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5789.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5789", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.160", - "lastModified": "2014-09-17T16:17:20.500", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:55.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/890321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5790.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5790.json index 5196af20c1a..9788c1d68b1 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5790.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5790.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5790", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.223", - "lastModified": "2014-09-19T01:28:43.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:55.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/785953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5791.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5791.json index 2ca0c961d5c..6340ed41c1f 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5791.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5791.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5791", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.287", - "lastModified": "2014-09-19T01:28:11.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:55.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/654041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5792.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5792.json index 85ef4a12621..0dad2e66a11 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5792.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5792.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5792", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.333", - "lastModified": "2014-09-17T18:57:49.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:55.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/532953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5793.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5793.json index 294aa2d80bd..9186bea5d9c 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5793.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5793.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5793", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.397", - "lastModified": "2014-09-17T18:57:05.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:56.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/477777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5794.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5794.json index 1a4700a8eed..9ddd214b5b8 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5794.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5794.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5794", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.457", - "lastModified": "2014-09-17T18:56:18.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:56.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/254961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5796.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5796.json index 72d28b1268f..c73a838c0eb 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5796.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5796.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5796", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.507", - "lastModified": "2014-09-17T18:54:46.410", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:56.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/304505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5797.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5797.json index 5bd79250fbc..f16ee4a4588 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5797.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5797.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5797", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.567", - "lastModified": "2014-09-17T18:56:42.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:56.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/971369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5798.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5798.json index 23848a46b88..401e6783422 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5798.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5798.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5798", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.613", - "lastModified": "2014-09-17T18:55:13.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:56.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/100961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-57xx/CVE-2014-5799.json b/CVE-2014/CVE-2014-57xx/CVE-2014-5799.json index 1acdfa6292c..02a66b8307a 100644 --- a/CVE-2014/CVE-2014-57xx/CVE-2014-5799.json +++ b/CVE-2014/CVE-2014-57xx/CVE-2014-5799.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5799", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.677", - "lastModified": "2014-09-17T18:55:57.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:56.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/824409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5800.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5800.json index 1f1429c892a..4c8acc797ed 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5800.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5800.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5800", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.740", - "lastModified": "2014-09-17T18:55:35.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:57.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/123137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5801.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5801.json index 0ff149bceec..6890e13b113 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5801.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5801.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5801", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.787", - "lastModified": "2014-09-17T18:54:09.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:57.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/220465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5802.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5802.json index 6d82da5acd8..22eb649eb22 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5802.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5802.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5802", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.850", - "lastModified": "2014-09-17T18:53:49.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:57.493", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/726113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5803.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5803.json index 0d99d3e543b..694b1130799 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5803.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5803.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5803", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.897", - "lastModified": "2014-09-19T01:27:39.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:57.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/770289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5804.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5804.json index f4494fcb279..5f983cdf595 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5804.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5804.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5804", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:13.957", - "lastModified": "2014-09-19T01:27:04.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:57.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/977617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5805.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5805.json index fb76e219657..9c4df92cff9 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5805.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5805.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5805", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.020", - "lastModified": "2014-09-19T01:26:14.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:58.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/401217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5806.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5806.json index db6b5a865c2..686cee96b41 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5806.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5806.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5806", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.067", - "lastModified": "2014-09-18T18:52:02.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:58.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/971897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5807.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5807.json index 5f5d2f73329..d9b810c1f51 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5807.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5807.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5807", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.130", - "lastModified": "2014-09-19T19:39:55.100", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:58.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -76,8 +75,8 @@ "url": "http://www.kb.cert.org/vuls/id/582497", "source": "cret@cert.org", "tags": [ - "US Government Resource", - "Third Party Advisory" + "Third Party Advisory", + "US Government Resource" ] }, { @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/991081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5808.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5808.json index 66dbbedd07f..e638f3c0940 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5808.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5808.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5808", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.177", - "lastModified": "2014-09-20T23:35:35.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:58.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/890145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5809.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5809.json index ca204d1e56e..abc11e059fc 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5809.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5809.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5809", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.553", - "lastModified": "2014-09-25T18:26:53.310", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:58.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/123313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5810.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5810.json index c69ed35572a..13267bb36b7 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5810.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5810.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5810", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.240", - "lastModified": "2014-09-20T23:36:26.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:58.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/507785", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5811.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5811.json index bc33a5324cd..3aeeafd2344 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5811.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5811.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5811", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.303", - "lastModified": "2014-09-20T23:37:33.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:59.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/297641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5812.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5812.json index 140ca53bef0..27b72601ed9 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5812.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5812.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5812", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.363", - "lastModified": "2014-09-20T23:39:19.480", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:59.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/469945", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5813.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5813.json index 3947d11d601..fefa990acbf 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5813.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5813.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5813", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.410", - "lastModified": "2014-09-20T23:40:07.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:59.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/657825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5815.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5815.json index 50de4e15f50..8e702522e9c 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5815.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5815.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5815", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.473", - "lastModified": "2014-09-20T23:44:12.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:59.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/919713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5816.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5816.json index 8a55b288263..74fa37b2232 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5816.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5816.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5816", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.537", - "lastModified": "2014-09-20T23:42:29.497", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:59.767", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/356337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5817.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5817.json index f4a6ddb1ce8..cbc96fc78e6 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5817.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5817.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5817", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.600", - "lastModified": "2014-09-20T23:43:22.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:12:59.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/701033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5818.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5818.json index 2603a66ee69..916ed0afa3a 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5818.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5818.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5818", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.647", - "lastModified": "2014-09-20T23:45:22.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:00.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/349033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5819.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5819.json index 24545c07f18..f458cd8d191 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5819.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5819.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5819", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.707", - "lastModified": "2014-09-20T23:46:12.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:00.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/230233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5820.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5820.json index c8dcb15e908..406be2b55cc 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5820.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5820.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5820", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.770", - "lastModified": "2014-09-20T23:47:16.673", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:00.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/437473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5821.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5821.json index 82d74eea881..e516c89ec2b 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5821.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5821.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5821", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.833", - "lastModified": "2014-09-20T23:50:20.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:00.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/725849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5822.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5822.json index ac7227bd15f..032ac43e41e 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5822.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5822.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5822", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.880", - "lastModified": "2014-09-20T23:52:00.380", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:00.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/660641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5823.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5823.json index 6f06a849e33..1185e9455e9 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5823.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5823.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5823", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:14.943", - "lastModified": "2014-09-20T23:58:14.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:00.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/592089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5824.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5824.json index db468938703..2fce5c837d5 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5824.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5824.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5824", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.020", - "lastModified": "2014-09-21T00:02:55.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:01.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/546505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5825.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5825.json index 7e60d90cdf3..820a3f8b373 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5825.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5825.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5825", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.083", - "lastModified": "2014-09-21T00:05:55.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:01.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/257953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5826.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5826.json index 4bde465568f..310926fb563 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5826.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5826.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5826", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.147", - "lastModified": "2014-09-21T01:16:15.287", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:01.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/423041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5827.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5827.json index a09acb8e9fd..7cb68a42600 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5827.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5827.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5827", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.193", - "lastModified": "2014-09-21T01:15:07.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:01.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/452433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5828.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5828.json index 6df5ec6a1bb..d20b6349460 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5828.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5828.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5828", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.257", - "lastModified": "2014-09-21T01:14:25.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:01.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/719249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5829.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5829.json index c80197c2695..fb7333998b4 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5829.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5829.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5829", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.317", - "lastModified": "2014-09-21T01:13:41.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:02.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/917425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5830.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5830.json index 71f1a6dc202..4b802cbcf0a 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5830.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5830.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5830", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.363", - "lastModified": "2014-09-21T01:12:56.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:02.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/263673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5831.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5831.json index 2765e26094e..1b5f3a451d0 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5831.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5831.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5831", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.427", - "lastModified": "2014-09-21T01:11:47.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:02.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/744681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5832.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5832.json index 3a70d49c590..67acfaef5c8 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5832.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5832.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5832", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.490", - "lastModified": "2014-09-21T01:11:00.847", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:02.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/711329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5833.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5833.json index bbad9b9e2b2..e882c6f2442 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5833.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5833.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5833", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.537", - "lastModified": "2014-09-21T01:10:22.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:02.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/678769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5834.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5834.json index 04e0b665244..c6cdf6f8a3b 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5834.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5834.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5834", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.600", - "lastModified": "2014-09-21T01:08:58.063", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:02.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/274849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5835.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5835.json index 16c8e9b8344..92b332c4b71 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5835.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5835.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5835", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.660", - "lastModified": "2014-09-21T01:07:55.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:03.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/476281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5836.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5836.json index a22eb209f7a..5edeb19d8ed 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5836.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5836.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5836", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.723", - "lastModified": "2014-09-21T01:06:43.313", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:03.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/459913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5837.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5837.json index e1d3e715066..db6ba4abe1e 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5837.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5837.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5837", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.770", - "lastModified": "2014-09-21T01:05:21.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:03.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/638201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5838.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5838.json index 18c05b9c4ec..f1eca589cd9 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5838.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5838.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5838", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.833", - "lastModified": "2014-09-21T01:04:34.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:03.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/442665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5839.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5839.json index 7f1097c32c2..32194acb87a 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5839.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5839.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5839", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.897", - "lastModified": "2014-09-21T01:03:53.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:03.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/143377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5840.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5840.json index f51fbc2c680..4528af0000e 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5840.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5840.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5840", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:15.957", - "lastModified": "2014-09-21T01:59:05.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:03.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/503561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5841.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5841.json index 45a3e9b261c..02131fb8463 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5841.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5841.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5841", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.007", - "lastModified": "2014-09-21T02:03:38.903", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:04.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/735705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5842.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5842.json index 313f92a5083..2b0b2b22d74 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5842.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5842.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5842", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.067", - "lastModified": "2014-09-21T02:05:27.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:04.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/662137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5843.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5843.json index fb34ee831bb..96089d58f1c 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5843.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5843.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5843", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.130", - "lastModified": "2014-09-21T02:06:35.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:04.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/839457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5844.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5844.json index b339a55d359..4ab669d3803 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5844.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5844.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5844", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.193", - "lastModified": "2014-09-21T02:13:20.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:04.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/157281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5845.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5845.json index efb0ba9c4f2..8a1e1325afb 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5845.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5845.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5845", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.240", - "lastModified": "2014-09-21T02:23:07.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:04.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/597369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5846.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5846.json index 85a7db7aef2..5df93acf0d3 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5846.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5846.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5846", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.303", - "lastModified": "2014-09-21T02:24:48.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:04.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/648321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5847.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5847.json index b04d8b309f1..b0ddfa837d8 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5847.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5847.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5847", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.363", - "lastModified": "2014-09-21T01:55:03.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:05.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/564897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5848.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5848.json index c9698ad5629..00e0d2ea54e 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5848.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5848.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5848", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.427", - "lastModified": "2015-11-10T18:57:11.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:05.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/480065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5849.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5849.json index c79682d0ebd..015aa77eefe 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5849.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5849.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5849", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.490", - "lastModified": "2014-09-21T01:53:22.003", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:05.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/632833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5850.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5850.json index b8ce47987f6..e61e3b0130c 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5850.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5850.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5850", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.537", - "lastModified": "2014-09-21T22:00:51.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:05.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/854241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5851.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5851.json index b75b141c89e..e933869090c 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5851.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5851.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5851", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.600", - "lastModified": "2014-09-21T22:01:56.583", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:05.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/131585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5852.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5852.json index a52adccde62..f29e50c4ccd 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5852.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5852.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5852", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.660", - "lastModified": "2014-09-21T22:03:12.990", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:06.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -76,8 +75,8 @@ "url": "http://www.kb.cert.org/vuls/id/582497", "source": "cret@cert.org", "tags": [ - "US Government Resource", - "Third Party Advisory" + "Third Party Advisory", + "US Government Resource" ] }, { @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/796249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5853.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5853.json index c844e56f97f..d7381f730e4 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5853.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5853.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5853", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.723", - "lastModified": "2014-09-21T22:04:02.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:06.187", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/676657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5854.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5854.json index f2e434c41eb..75cfa8f83b1 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5854.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5854.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5854", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.787", - "lastModified": "2014-09-21T22:04:51.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:06.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/525825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5855.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5855.json index 8458136b67a..2e1b741c0c4 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5855.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5855.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5855", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.850", - "lastModified": "2014-09-21T22:05:30.990", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:06.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/440289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5856.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5856.json index 7dc9ef2e829..eedbb57ebca 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5856.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5856.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5856", "sourceIdentifier": "cret@cert.org", "published": "2014-09-09T10:55:16.897", - "lastModified": "2014-09-21T22:06:28.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:06.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/579065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5857.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5857.json index 44955b25f0c..e83a217e4c1 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5857.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5857.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5857", "sourceIdentifier": "cret@cert.org", "published": "2014-09-10T10:55:08.440", - "lastModified": "2014-09-21T23:28:11.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:06.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/217737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5858.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5858.json index 0826fcf3695..059fe659a78 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5858.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5858.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5858", "sourceIdentifier": "cret@cert.org", "published": "2014-09-10T10:55:08.487", - "lastModified": "2014-09-21T23:31:44.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:07.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/715465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5859.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5859.json index 9e28b86624c..7c1b5e4d101 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5859.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5859.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5859", "sourceIdentifier": "cret@cert.org", "published": "2014-09-10T10:55:08.550", - "lastModified": "2014-09-21T23:34:26.497", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:07.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/560761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5860.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5860.json index 982994bb18e..3d237ca4788 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5860.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5860.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5860", "sourceIdentifier": "cret@cert.org", "published": "2014-09-10T10:55:08.583", - "lastModified": "2014-09-21T23:33:49.060", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:07.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/900617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5861.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5861.json index 0a83eb39ca4..8fc74e5e785 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5861.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5861.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5861", "sourceIdentifier": "cret@cert.org", "published": "2014-09-10T10:55:08.630", - "lastModified": "2014-09-21T23:30:36.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:07.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/165729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5862.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5862.json index c056ff3ab4e..10b1d7cc5fe 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5862.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5862.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5862", "sourceIdentifier": "cret@cert.org", "published": "2014-09-10T10:55:08.677", - "lastModified": "2014-09-21T23:20:07.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:07.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/184297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5863.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5863.json index 94ee1a9aefe..5f99f7b1883 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5863.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5863.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5863", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.300", - "lastModified": "2014-09-21T23:23:51.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:07.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/693817", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5864.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5864.json index 80e52a8f84e..00c9cfd6dbb 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5864.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5864.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5864", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.363", - "lastModified": "2014-09-22T00:03:12.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:08.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/313921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5865.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5865.json index 7d0dc25959a..030d3111e06 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5865.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5865.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5865", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.410", - "lastModified": "2014-09-22T00:04:44.410", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:08.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/807513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5866.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5866.json index 84a8aa3e9fe..5655184ef36 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5866.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5866.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5866", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.457", - "lastModified": "2014-09-22T00:02:28.550", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:08.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/142233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5867.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5867.json index e203d5cf01e..f023d2ffb93 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5867.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5867.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5867", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.503", - "lastModified": "2014-09-22T00:01:54.847", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:08.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/520545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5868.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5868.json index 48eae9317d1..cdb0f171f86 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5868.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5868.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5868", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.550", - "lastModified": "2014-09-21T23:57:35.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:08.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/698569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5869.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5869.json index 918dce5c0a7..6f81c4d5a5d 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5869.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5869.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5869", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.597", - "lastModified": "2014-09-22T00:00:53.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:09.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/682641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5870.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5870.json index 2719e8826c3..efd909acba5 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5870.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5870.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5870", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.643", - "lastModified": "2014-09-21T23:58:21.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:09.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/885041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5871.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5871.json index 4580bf7ce31..ca82d0551bc 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5871.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5871.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5871", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.690", - "lastModified": "2014-09-22T01:08:29.227", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:09.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/786745", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5872.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5872.json index 893c5b32117..e1ad0f61d90 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5872.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5872.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5872", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.737", - "lastModified": "2014-09-22T01:07:37.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:09.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/487281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5873.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5873.json index 7d81cb44873..0bbcb42ea60 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5873.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5873.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5873", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.783", - "lastModified": "2014-09-22T01:07:00.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:09.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/803553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5874.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5874.json index c624534b656..1e94cf0a885 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5874.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5874.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5874", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.830", - "lastModified": "2014-09-22T01:06:23.660", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:09.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/438001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5875.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5875.json index ddd540b6a50..d36c06a06bf 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5875.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5875.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5875", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.877", - "lastModified": "2014-09-22T01:05:43.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:10.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/387049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5876.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5876.json index 70bc6eb14e7..1b77d669f63 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5876.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5876.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5876", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.910", - "lastModified": "2020-02-24T15:02:08.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:10.283", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/633273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5877.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5877.json index 72f82e2ee51..eb4c30a0629 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5877.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5877.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5877", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:02.957", - "lastModified": "2014-09-22T01:03:39.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:10.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/354753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5878.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5878.json index 02cf9b1e834..c9793fb569e 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5878.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5878.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5878", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T10:55:03.003", - "lastModified": "2014-09-22T01:03:06.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:10.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/685105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5879.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5879.json index f6b785d0269..3c399ad2b34 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5879.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5879.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5879", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T16:55:02.490", - "lastModified": "2014-09-22T17:31:50.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:10.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/467833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5881.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5881.json index a4ca56c077c..e160206a169 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5881.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5881.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5881", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T16:55:02.567", - "lastModified": "2015-12-18T19:55:33.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:11.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -105,6 +104,40 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://jvn.jp/en/jp/JVN48270605/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/228385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5882.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5882.json index 4a39e7cca36..085a9209b21 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5882.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5882.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5882", "sourceIdentifier": "cret@cert.org", "published": "2014-09-11T16:55:02.617", - "lastModified": "2014-09-22T17:33:33.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:11.177", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/911705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5883.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5883.json index 9d0a43227be..f0c9c9c2978 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5883.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5883.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5883", "sourceIdentifier": "cret@cert.org", "published": "2014-09-12T16:55:02.163", - "lastModified": "2014-09-22T17:34:29.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:11.347", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/482969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5884.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5884.json index 600cc852824..ee6bb620810 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5884.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5884.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5884", "sourceIdentifier": "cret@cert.org", "published": "2014-09-12T16:55:02.210", - "lastModified": "2014-09-22T17:35:14.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:11.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/841657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5885.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5885.json index ce6a6d8517f..ea94e7dd8ab 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5885.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5885.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5885", "sourceIdentifier": "cret@cert.org", "published": "2014-09-12T16:55:02.257", - "lastModified": "2014-09-22T17:36:05.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:11.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/741337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5886.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5886.json index 33cb09534f0..121ecd19ea0 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5886.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5886.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5886", "sourceIdentifier": "cret@cert.org", "published": "2014-09-12T16:55:02.303", - "lastModified": "2014-09-22T17:36:52.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:11.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/352289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5887.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5887.json index b683a6ae6cc..e417ed2f4ec 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5887.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5887.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5887", "sourceIdentifier": "cret@cert.org", "published": "2014-09-12T16:55:02.350", - "lastModified": "2014-09-22T17:37:35.853", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:12.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/490713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5888.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5888.json index b52131602f5..9dc3df8901c 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5888.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5888.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5888", "sourceIdentifier": "cret@cert.org", "published": "2014-09-12T16:55:02.397", - "lastModified": "2014-09-22T17:38:36.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:12.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/584961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5889.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5889.json index 136ecd47385..75b0a293124 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5889.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5889.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5889", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:11.760", - "lastModified": "2014-09-22T17:40:35.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:12.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/209553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5890.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5890.json index 05606412b20..c4ce3549830 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5890.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5890.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5890", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:11.807", - "lastModified": "2014-09-22T17:41:23.700", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:12.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/953153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5891.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5891.json index 1bb69b03d4f..9d781aab4d4 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5891.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5891.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5891", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:11.853", - "lastModified": "2014-09-22T17:42:58.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:12.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/814553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5892.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5892.json index 1c961701f47..e090bc00568 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5892.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5892.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5892", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:11.900", - "lastModified": "2014-09-22T17:43:48.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:12.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/495729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5893.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5893.json index 086d6cfb9b0..afd6b4fb188 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5893.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5893.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5893", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:11.947", - "lastModified": "2014-09-22T17:44:46.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:13.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/301689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5894.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5894.json index 14566e330bc..fe21a802637 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5894.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5894.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5894", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:11.993", - "lastModified": "2017-07-11T14:06:19.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:13.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -93,6 +92,28 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/932209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5895.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5895.json index 6bb261d7039..37afbce0b0f 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5895.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5895.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5895", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.040", - "lastModified": "2014-09-22T17:46:29.410", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:13.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/528289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5896.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5896.json index 1a126e2ef35..31bc005f9ff 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5896.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5896.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5896", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.087", - "lastModified": "2014-09-22T17:47:20.660", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:13.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/519313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5897.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5897.json index 62fbafec56c..0399b5b04c3 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5897.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5897.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5897", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.137", - "lastModified": "2014-09-22T17:48:19.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:13.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/663721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5898.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5898.json index d4ebcfd560b..cee889dd873 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5898.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5898.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5898", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.183", - "lastModified": "2014-09-22T17:49:08.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:13.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/236481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-58xx/CVE-2014-5899.json b/CVE-2014/CVE-2014-58xx/CVE-2014-5899.json index cfdce0a1014..3ea44de803a 100644 --- a/CVE-2014/CVE-2014-58xx/CVE-2014-5899.json +++ b/CVE-2014/CVE-2014-58xx/CVE-2014-5899.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5899", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.227", - "lastModified": "2014-09-22T18:58:30.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:14.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/773897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5900.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5900.json index 637255a358b..40743dc889b 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5900.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5900.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5900", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.277", - "lastModified": "2014-09-22T18:24:11.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:14.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/692233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5901.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5901.json index 6fb0b428e53..678827778c7 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5901.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5901.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5901", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.323", - "lastModified": "2014-09-23T00:19:54.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:14.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/433425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5902.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5902.json index 642e0cd7921..7bc444a8c40 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5902.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5902.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5902", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.370", - "lastModified": "2014-09-22T18:45:14.587", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:14.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/533833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5903.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5903.json index 5bce034c338..7c0ed27dfad 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5903.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5903.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5903", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.433", - "lastModified": "2014-09-23T00:21:36.263", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:14.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/823529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5904.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5904.json index 2fe4bdc4f10..9ece2f10b49 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5904.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5904.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5904", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.477", - "lastModified": "2014-09-23T00:22:22.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:14.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/216505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5905.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5905.json index d9ad957c728..5e1d0a18f93 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5905.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5905.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5905", "sourceIdentifier": "cret@cert.org", "published": "2014-09-15T14:55:12.540", - "lastModified": "2014-09-23T00:23:04.233", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:15.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/924905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5906.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5906.json index af6e0ba86a5..1ebbe1b0271 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5906.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5906.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5906", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.230", - "lastModified": "2014-09-23T00:24:01.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:15.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/779969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5907.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5907.json index 8e1396ab5c9..7462fd98339 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5907.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5907.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5907", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.277", - "lastModified": "2014-09-23T00:27:58.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:15.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/549057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5908.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5908.json index 913a3170c89..9bceb7590d1 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5908.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5908.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5908", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.323", - "lastModified": "2014-09-23T00:37:27.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:15.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/871489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5909.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5909.json index f5982e6dd50..35315e094ae 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5909.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5909.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5909", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.370", - "lastModified": "2014-09-23T01:09:51.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:15.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/894985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5910.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5910.json index 4bd73b174c5..54f8524b2f6 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5910.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5910.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5910", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.417", - "lastModified": "2014-09-23T01:03:51.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:15.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/532865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5911.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5911.json index 4edd080dd7d..79714abdcea 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5911.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5911.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5911", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.463", - "lastModified": "2014-09-23T01:09:11.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:16.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/809889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5912.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5912.json index 409f0cc033b..266f4e00d1d 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5912.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5912.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5912", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.527", - "lastModified": "2014-09-23T01:08:32.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:16.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/744505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5913.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5913.json index abf5d1bf2d6..e0ba77c5ec3 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5913.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5913.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5913", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.573", - "lastModified": "2014-09-23T01:07:54.503", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:16.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/972337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5914.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5914.json index 3d59e6875b7..236c53d7dcb 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5914.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5914.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5914", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.620", - "lastModified": "2014-09-23T01:07:13.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:16.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/201633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5915.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5915.json index 960df61f6ae..bc6425909fa 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5915.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5915.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5915", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.667", - "lastModified": "2014-09-23T01:06:29.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:16.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/179897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5916.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5916.json index 97828672c94..66a9ab03126 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5916.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5916.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5916", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.713", - "lastModified": "2014-09-23T01:05:50.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:17.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/485081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5917.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5917.json index f0d86433e47..880f9ac41af 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5917.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5917.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5917", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.760", - "lastModified": "2014-09-23T16:26:47.463", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:17.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/133081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5918.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5918.json index 6f7023b81cd..7b58e0e1dd5 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5918.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5918.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5918", "sourceIdentifier": "cret@cert.org", "published": "2014-09-17T10:55:07.807", - "lastModified": "2014-09-23T01:05:14.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:17.433", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/673841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5919.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5919.json index 8fdfb826bb7..60d795c79e3 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5919.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5919.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5919", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:11.923", - "lastModified": "2014-09-23T01:04:31.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:17.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/361177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5920.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5920.json index 1f56dc3ec42..396ef804ba2 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5920.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5920.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5920", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:11.953", - "lastModified": "2014-09-23T01:03:18.483", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:17.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/756297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5921.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5921.json index bd5d6e1876a..3e86da8dbde 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5921.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5921.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5921", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.000", - "lastModified": "2014-09-23T16:28:44.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:17.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/388105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5922.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5922.json index f2f5ed2c333..69b3b00ffec 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5922.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5922.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5922", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.063", - "lastModified": "2014-09-23T16:29:39.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:18.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/974361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5923.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5923.json index e694dab4b52..639bf012fa9 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5923.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5923.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5923", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.093", - "lastModified": "2014-09-23T16:30:41.813", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:18.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/266225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5924.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5924.json index 0081c037921..479b35d6dc1 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5924.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5924.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5924", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.173", - "lastModified": "2014-09-23T16:32:11.550", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:18.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/775569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5925.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5925.json index 64f0c4292a7..db8b1ebe79c 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5925.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5925.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5925", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.220", - "lastModified": "2014-09-23T16:32:54.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:18.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/172593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5926.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5926.json index 537dcb4c82e..02a60816d83 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5926.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5926.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5926", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.267", - "lastModified": "2014-09-23T16:41:15.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:18.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/450409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5927.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5927.json index ff3550dbb0c..c2f84a41c5a 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5927.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5927.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5927", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.313", - "lastModified": "2014-09-23T16:45:17.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:18.973", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/317705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5928.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5928.json index 210bc891532..4bd75c04317 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5928.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5928.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5928", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.343", - "lastModified": "2014-09-23T16:46:11.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:19.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/425065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5929.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5929.json index 022fea729c7..25baaeb10a6 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5929.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5929.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5929", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.407", - "lastModified": "2014-09-23T16:46:56.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:19.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/797305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5930.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5930.json index 7cc1d971af3..61bba940027 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5930.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5930.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5930", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.470", - "lastModified": "2014-09-23T16:47:40.847", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:19.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/617961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5931.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5931.json index ec4bd87c1c0..51b95ac4abf 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5931.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5931.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5931", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.517", - "lastModified": "2014-09-23T16:48:27.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:19.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/963273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5932.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5932.json index e72d2e27ff3..3e7718024dd 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5932.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5932.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5932", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.563", - "lastModified": "2014-09-23T16:49:34.960", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:19.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/316561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5933.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5933.json index 2efd8d96ff6..14f2d0b24ea 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5933.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5933.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5933", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.610", - "lastModified": "2014-09-23T16:50:33.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:20.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/152089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5934.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5934.json index a9505d095d9..4e007b56126 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5934.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5934.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5934", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.673", - "lastModified": "2014-09-23T16:51:34.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:20.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/220201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5935.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5935.json index a70ccd671a0..fc4e29a41fc 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5935.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5935.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5935", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.720", - "lastModified": "2014-09-23T16:52:24.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:20.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/721977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5936.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5936.json index 1aa52e2079e..a9fe843a64c 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5936.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5936.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5936", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.767", - "lastModified": "2014-09-23T16:53:10.920", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:20.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/703937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5937.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5937.json index dbdb2561767..d8d0449cd47 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5937.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5937.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5937", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.813", - "lastModified": "2014-09-23T16:54:03.013", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:20.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/640665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5938.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5938.json index 8e217eca709..ac30ffebd71 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5938.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5938.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5938", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.860", - "lastModified": "2014-09-23T16:54:50.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:20.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/481561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5939.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5939.json index 87c7f2a2385..8b342b8a825 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5939.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5939.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5939", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.923", - "lastModified": "2014-09-23T16:55:36.063", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:21.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/364081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5940.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5940.json index d3021bda460..aba59cd14ae 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5940.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5940.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5940", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:12.970", - "lastModified": "2014-09-23T18:50:44.497", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:21.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/620953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5941.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5941.json index ca79cd706da..5b2d6c36e03 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5941.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5941.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5941", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.030", - "lastModified": "2014-09-23T18:51:30.123", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:21.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/731657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5942.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5942.json index 0bd9eb20a92..e86a5f84a9e 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5942.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5942.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5942", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.077", - "lastModified": "2014-09-23T18:52:21.670", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:21.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/111257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5943.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5943.json index 74e252fdbfa..5389fbb2736 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5943.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5943.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5943", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.127", - "lastModified": "2014-09-23T18:54:25.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:21.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/115217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5944.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5944.json index 313bafbd027..964f60a30ad 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5944.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5944.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5944", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.187", - "lastModified": "2014-09-23T18:55:13.673", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:21.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/753657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5945.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5945.json index 2d1600569a9..512ddded20d 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5945.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5945.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5945", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.233", - "lastModified": "2014-09-24T01:34:05.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:22.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/999001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5946.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5946.json index 411950ea88f..6d7aef0832b 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5946.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5946.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5946", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.280", - "lastModified": "2014-09-24T01:33:37.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:22.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/191073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5947.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5947.json index f65263b14e5..aae5d2a873d 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5947.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5947.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5947", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.343", - "lastModified": "2014-09-23T21:05:51.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:22.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/505321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5948.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5948.json index e64e8f829f4..e5c024a4284 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5948.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5948.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5948", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.390", - "lastModified": "2014-09-23T21:03:20.587", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:22.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/474521", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5949.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5949.json index 3064511d774..222f7b6de88 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5949.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5949.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5949", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.437", - "lastModified": "2014-09-23T21:02:44.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:22.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/486665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5950.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5950.json index 16d459e0e68..93ba93f6d15 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5950.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5950.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5950", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.500", - "lastModified": "2014-09-24T01:33:10.693", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:22.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/393209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5951.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5951.json index 0e0d2253840..f93c73fd0b6 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5951.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5951.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5951", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.547", - "lastModified": "2014-09-24T01:34:29.853", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:23.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/690561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5952.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5952.json index 8372f8da4ca..122aeb3fc48 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5952.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5952.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5952", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.593", - "lastModified": "2014-09-24T01:35:14.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:23.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/693641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5953.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5953.json index 31f1d2d81de..20a388b5b4f 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5953.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5953.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5953", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.640", - "lastModified": "2014-09-24T01:38:13.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:23.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/618929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5954.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5954.json index dc883471e66..1ae198d0b79 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5954.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5954.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5954", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.703", - "lastModified": "2014-09-24T01:41:13.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:23.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/970577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5955.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5955.json index 41003461832..fdaae11e77f 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5955.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5955.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5955", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.750", - "lastModified": "2014-09-24T01:42:15.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:23.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/421809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5956.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5956.json index 37cd7406e4e..0d932d8075f 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5956.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5956.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5956", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.797", - "lastModified": "2014-09-24T01:43:30.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:24.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/628609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5957.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5957.json index 925bc34131f..7c85a177728 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5957.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5957.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5957", "sourceIdentifier": "cret@cert.org", "published": "2014-09-18T10:55:13.843", - "lastModified": "2014-09-24T01:44:31.800", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:24.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/816929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5958.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5958.json index cb39ecd9ef6..8f3ae8324d8 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5958.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5958.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5958", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.327", - "lastModified": "2014-09-24T01:45:35.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:24.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/229881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5959.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5959.json index 183be88c339..de0fa909930 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5959.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5959.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5959", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.373", - "lastModified": "2014-10-02T18:14:18.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:24.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/447329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5960.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5960.json index 9806cac7cf5..b6935804cbc 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5960.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5960.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5960", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.420", - "lastModified": "2014-09-24T02:26:04.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:24.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/557681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5961.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5961.json index d0d04b8ba1e..db741ead151 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5961.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5961.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5961", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.467", - "lastModified": "2014-09-24T02:27:05.460", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:24.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/847729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5962.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5962.json index f575c64f04e..3b25d818ab4 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5962.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5962.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5962", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.513", - "lastModified": "2014-09-25T01:24:29.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:25.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/440377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5963.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5963.json index 3fe69f55f9a..b030384eb59 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5963.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5963.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5963", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.560", - "lastModified": "2014-09-25T01:22:31.450", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:25.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/668385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5964.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5964.json index a47c65cd991..b1c39e5bcd7 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5964.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5964.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5964", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.607", - "lastModified": "2014-09-25T01:21:42.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:25.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/474697", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5965.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5965.json index 2528e52b527..bbc5537031e 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5965.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5965.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5965", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.640", - "lastModified": "2014-09-25T01:19:15.833", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:25.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/256897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5966.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5966.json index dce9e91a3f0..fca7bad72bb 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5966.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5966.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5966", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.687", - "lastModified": "2014-09-24T15:32:41.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:25.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/471793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5967.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5967.json index a598f557c52..c8918a510e9 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5967.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5967.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5967", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.733", - "lastModified": "2014-09-24T15:31:44.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:25.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/386873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5968.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5968.json index d53befde927..0777b04b98c 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5968.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5968.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5968", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.797", - "lastModified": "2014-09-24T15:18:38.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:26.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/710185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5969.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5969.json index 5fa031ddfca..0a1f6bf30a3 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5969.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5969.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5969", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.827", - "lastModified": "2014-09-24T15:18:14.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:26.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/800561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5970.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5970.json index 84813a32300..da321eba167 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5970.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5970.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5970", "sourceIdentifier": "cret@cert.org", "published": "2014-09-19T10:55:04.890", - "lastModified": "2014-09-23T17:49:30.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:26.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/355897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5971.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5971.json index 041a3da1dfc..5812de9f1bb 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5971.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5971.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5971", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.600", - "lastModified": "2014-09-23T17:48:31.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:26.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/849577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5972.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5972.json index a57f46ac01c..c4003ecbdf2 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5972.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5972.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5972", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.197", - "lastModified": "2014-12-03T19:45:50.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:26.767", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/822297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5973.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5973.json index 1f09971ffaf..d07e1a575fd 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5973.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5973.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5973", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.247", - "lastModified": "2014-09-23T17:44:30.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:26.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/990641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5974.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5974.json index d4213bfeb21..f2370ea969b 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5974.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5974.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5974", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.293", - "lastModified": "2014-09-23T17:43:41.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:27.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/826521", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5975.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5975.json index 90f6778e7c9..3cf7b12928a 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5975.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5975.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5975", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.340", - "lastModified": "2014-09-23T17:29:41.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:27.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/650609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5976.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5976.json index 81690a48b1a..47380696c42 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5976.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5976.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5976", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.387", - "lastModified": "2014-09-23T17:43:02.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:27.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/366897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5977.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5977.json index a2fcfb19a10..0ce5cb4f681 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5977.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5977.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5977", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.433", - "lastModified": "2014-09-23T17:47:20.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:27.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/335041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5978.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5978.json index 22fcb031ddd..c0c0c0da4f2 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5978.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5978.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5978", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.480", - "lastModified": "2014-09-23T17:46:15.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:27.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/864273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5979.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5979.json index 5ee67f9d14c..0cd24e4717e 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5979.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5979.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5979", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.527", - "lastModified": "2014-09-23T17:28:07.423", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:28.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/716697", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5980.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5980.json index a99f179a616..891075b8db6 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5980.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5980.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5980", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.573", - "lastModified": "2014-09-23T17:26:28.780", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:28.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/286729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5981.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5981.json index 2918e1aaea4..79c11802b7b 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5981.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5981.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5981", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.620", - "lastModified": "2014-09-23T17:25:30.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:28.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/315593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5982.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5982.json index 28d4e8423da..cf382bd7a0d 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5982.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5982.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5982", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.647", - "lastModified": "2014-09-23T17:18:47.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:28.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/761313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5983.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5983.json index 525d1023044..09ce0074f4e 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5983.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5983.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5983", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.693", - "lastModified": "2017-07-11T14:29:47.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:28.747", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -94,6 +93,29 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/779529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5984.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5984.json index c2f905609e7..ce114a692a4 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5984.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5984.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5984", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.740", - "lastModified": "2014-09-23T17:23:07.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:28.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/930273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5985.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5985.json index 7b24c914f59..24ba8ed3363 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5985.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5985.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5985", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.683", - "lastModified": "2014-09-25T12:50:23.783", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:29.113", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/566921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5986.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5986.json index ed05fcc0a9c..5a9d5e985eb 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5986.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5986.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5986", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.730", - "lastModified": "2014-09-25T12:58:32.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:29.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/114337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5987.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5987.json index b08933a181f..b251a2ea124 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5987.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5987.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5987", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.777", - "lastModified": "2014-09-25T16:31:41.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:29.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/336537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5988.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5988.json index 0dab1fa58b9..d3fa1c63b3a 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5988.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5988.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5988", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.823", - "lastModified": "2014-09-25T16:19:19.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:29.623", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/374025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5989.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5989.json index 4fe98e6b599..b8e492488f8 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5989.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5989.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5989", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.870", - "lastModified": "2014-09-25T16:20:07.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:29.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/704113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5990.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5990.json index a47edcc34ff..f01d8bf1f85 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5990.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5990.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5990", "sourceIdentifier": "cret@cert.org", "published": "2014-09-20T10:55:05.917", - "lastModified": "2014-09-23T20:08:38.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:29.973", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/258657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5991.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5991.json index 7495fc17928..19a213e6325 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5991.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5991.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5991", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.787", - "lastModified": "2014-09-23T20:23:43.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:30.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/397345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5992.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5992.json index 3e1fc1a0641..7af6cbe61e9 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5992.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5992.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5992", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.833", - "lastModified": "2014-12-03T19:46:09.973", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:30.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/735793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5993.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5993.json index f14603f5b6f..211d0f69617 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5993.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5993.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5993", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.897", - "lastModified": "2014-09-23T20:23:08.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:30.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/594377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5994.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5994.json index 902f34655dc..3cf9d25a7c0 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5994.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5994.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5994", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.927", - "lastModified": "2014-09-23T20:03:25.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:30.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/164321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5995.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5995.json index 03c5bbea9f9..81952417992 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5995.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5995.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5995", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:06.977", - "lastModified": "2014-09-23T20:04:52.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:30.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/399193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5996.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5996.json index 8488c3a2a87..505d4e866cc 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5996.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5996.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5996", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.023", - "lastModified": "2014-09-23T20:06:45.083", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:31.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/989673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5997.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5997.json index 56b2e0791ef..78eb5f59e2d 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5997.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5997.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5997", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.070", - "lastModified": "2014-09-23T20:13:15.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:31.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/319465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5998.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5998.json index 058a63075ba..e5458cd4dbb 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5998.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5998.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5998", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.117", - "lastModified": "2014-09-23T20:13:56.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:31.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/209113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-59xx/CVE-2014-5999.json b/CVE-2014/CVE-2014-59xx/CVE-2014-5999.json index eeee10d6553..1903c085e09 100644 --- a/CVE-2014/CVE-2014-59xx/CVE-2014-5999.json +++ b/CVE-2014/CVE-2014-59xx/CVE-2014-5999.json @@ -2,9 +2,8 @@ "id": "CVE-2014-5999", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.163", - "lastModified": "2014-09-23T20:10:42.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:31.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/207089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6000.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6000.json index d22bf7aac4c..5c49cddccb6 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6000.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6000.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6000", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.210", - "lastModified": "2014-09-23T20:53:34.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:31.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/517641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6001.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6001.json index 0e98cf8ba3d..acac3c69221 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6001.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6001.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6001", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.273", - "lastModified": "2014-09-23T20:59:27.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:31.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/476897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6002.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6002.json index 322b36d802a..8df1e14681a 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6002.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6002.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6002", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.303", - "lastModified": "2014-09-23T21:01:02.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:32.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/450057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6003.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6003.json index ceb71307da0..8ec516d0c07 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6003.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6003.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6003", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.350", - "lastModified": "2014-09-23T21:00:16.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:32.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/728929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6004.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6004.json index 51126c21c49..fdf0730d7d1 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6004.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6004.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6004", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.397", - "lastModified": "2014-09-23T20:58:20.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:32.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/913553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6005.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6005.json index b25d731f33a..115229c1474 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6005.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6005.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6005", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.460", - "lastModified": "2014-09-23T20:57:36.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:32.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/131673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6006.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6006.json index f0f574daf95..70ae0ba1364 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6006.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6006.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6006", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.507", - "lastModified": "2017-11-30T12:54:31.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:32.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -93,6 +92,28 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/993633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6007.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6007.json index bb73417af00..e9a098773cc 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6007.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6007.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6007", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.553", - "lastModified": "2014-09-23T20:56:07.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:33.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/816137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6008.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6008.json index f3eea128ae5..d7614cec2b9 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6008.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6008.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6008", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.600", - "lastModified": "2014-09-23T20:55:31.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:33.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/386697", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6009.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6009.json index 33b6a4dd320..e4aad160f81 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6009.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6009.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6009", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.647", - "lastModified": "2014-09-23T20:54:54.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:34.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/510073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6010.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6010.json index e0691ab257e..a943826c120 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6010.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6010.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6010", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.693", - "lastModified": "2014-09-23T20:54:15.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:34.263", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/958169", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6011.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6011.json index 073221aa602..957bf19606a 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6011.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6011.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6011", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.727", - "lastModified": "2014-09-24T01:26:51.890", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:34.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/507961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6012.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6012.json index 89493401c1c..a4d842df002 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6012.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6012.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6012", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.757", - "lastModified": "2014-09-24T01:32:21.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:34.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/150505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6013.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6013.json index 7328e90e8e7..edf09b16bcd 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6013.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6013.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6013", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.803", - "lastModified": "2014-09-24T01:31:38.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:34.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/308377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6014.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6014.json index b4cb33a1d4a..d82fbabbd6a 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6014.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6014.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6014", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.850", - "lastModified": "2014-09-24T01:31:00.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:34.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/821065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6015.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6015.json index 31d12310a09..bdbe32e2bdf 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6015.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6015.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6015", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.897", - "lastModified": "2014-09-24T01:27:27.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:35.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/528817", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6016.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6016.json index fb3eae9991e..82b4e76a879 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6016.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6016.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6016", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:07.943", - "lastModified": "2014-09-24T01:30:23.287", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:35.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/513769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6017.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6017.json index 242ea6dbae8..4eb1736e4bd 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6017.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6017.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6017", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.007", - "lastModified": "2014-09-24T01:29:49.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:35.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/896305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6018.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6018.json index 111f88de1cb..5c4eeb79999 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6018.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6018.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6018", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.053", - "lastModified": "2014-09-24T01:29:12.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:35.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/725937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6019.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6019.json index 825bc2813a7..cf29d47a504 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6019.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6019.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6019", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.100", - "lastModified": "2014-09-24T01:28:34.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:35.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/342345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6020.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6020.json index 70cecc936c7..4705d272dac 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6020.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6020.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6020", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.147", - "lastModified": "2014-09-24T01:28:00.563", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:36.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/202601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6021.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6021.json index 1614d300fb4..92d214512a8 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6021.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6021.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6021", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.193", - "lastModified": "2014-09-25T18:29:32.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:36.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/239385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6022.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6022.json index 13b62fe69a2..f690fdb531b 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6022.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6022.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6022", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.240", - "lastModified": "2014-09-25T18:30:39.840", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:36.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/115657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6023.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6023.json index 2a26449ec7e..8f402e516a6 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6023.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6023.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6023", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.303", - "lastModified": "2014-09-25T18:31:23.903", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:36.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/352641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6024.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6024.json index 0d8903bccb9..3cb27063b2c 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6024.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6024.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6024", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-09T01:55:49.447", - "lastModified": "2014-09-12T02:06:37.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:36.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -104,6 +103,29 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cve@mitre.org" + }, + { + "url": "http://www.fireeye.com/blog/technical/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/208585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6025.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6025.json index 68e8542f48a..841b448d8ce 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6025.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6025.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6025", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-09T10:55:17.160", - "lastModified": "2014-09-21T22:07:34.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:36.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -94,6 +93,29 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cve@mitre.org" + }, + { + "url": "http://www.fireeye.com/blog/technical/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/775305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6028.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6028.json index dfaded1ccea..3ffbffa2378 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6028.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6028.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6028", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-05T14:55:04.270", - "lastModified": "2020-01-30T15:48:35.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:37.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/29/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/02/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759573", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6029.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6029.json index 84ab4908e7e..c47907cf9c1 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6029.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6029.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6029", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-05T14:55:04.317", - "lastModified": "2020-01-30T15:48:35.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:37.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -90,6 +89,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/29/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/02/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759573", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6030.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6030.json index 4279b6c3d0f..b23fdeb3105 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6030.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6030.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6030", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T18:55:06.293", - "lastModified": "2014-11-06T19:49:14.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:37.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -91,6 +90,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128296/ClassApps-SelectSurvey.net-4.124.004-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/62", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6032.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6032.json index 31846ee527b..08100d1bf2e 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6032.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6032.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6032", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-01T23:55:09.587", - "lastModified": "2017-09-08T01:29:07.073", + "lastModified": "2024-11-21T02:13:37.963", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -1089,6 +1087,64 @@ { "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-6033/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128915/F5-Big-IP-11.3.0.39.0-XML-External-Entity-Injection-1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/130", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70834", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98402", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15605.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-6032/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-6033/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6034.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6034.json index 878e789bd0f..826557aaea8 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6034.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6034.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6034", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-04T17:59:02.863", - "lastModified": "2014-12-05T13:45:42.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:38.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -178,6 +177,27 @@ "tags": [ "Patch" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6035.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6035.json index 73031c998cc..cf63ad582af 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6035.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6035.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6035", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-04T17:59:03.767", - "lastModified": "2014-12-05T13:33:00.720", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:38.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,27 @@ "tags": [ "Patch" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6036.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6036.json index 44f735063d9..9e6831d182c 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6036.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6036.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6036", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-04T17:59:04.673", - "lastModified": "2019-07-15T17:45:58.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:38.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +128,27 @@ "tags": [ "Patch" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/servlet-vulnerability-fix", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6037.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6037.json index 671f302cf2e..51c39210f7a 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6037.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6037.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6037", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-26T19:55:04.907", - "lastModified": "2020-03-26T14:15:12.497", + "lastModified": "2024-11-21T02:13:38.613", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -140,6 +139,70 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/110642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128102/ManageEngine-EventLog-Analyzer-9.9-Authorization-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/86", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/20", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34519", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69482", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/rapid7/metasploit-framework/pull/3732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.mogwaisecurity.de/advisories/MSA-2014-01.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6040.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6040.json index 4882e34ec53..d211b0d38bf 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6040.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6040.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6040", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-05T16:59:09.910", - "lastModified": "2023-02-13T00:42:20.830", + "lastModified": "2024-11-21T02:13:39.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -273,6 +272,67 @@ { "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6", "source": "secalert@redhat.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62100", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62146", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2432-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/08/29/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/02/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69472", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201602-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17325", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6041.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6041.json index 09737e2209a..1513a3460ac 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6041.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6041.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6041", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-02T10:55:04.730", - "lastModified": "2017-09-08T01:29:07.137", + "lastModified": "2024-11-21T02:13:39.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,41 @@ { "url": "https://news.ycombinator.com/item?id=8325807", "source": "cve@mitre.org" + }, + { + "url": "http://www.rafayhackingarticles.net/2014/08/android-browser-same-origin-policy.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://android.googlesource.com/platform/external/webkit/+/1368e05e8875f00e8d2529fe6050d08b55ea4d87", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://android.googlesource.com/platform/external/webkit/+/7e4405a7a12750ee27325f065b9825c25b40598c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://community.rapid7.com/community/metasploit/blog/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://news.ycombinator.com/item?id=8321185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://news.ycombinator.com/item?id=8325807", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6043.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6043.json index bfd94cfb999..dae21c469d0 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6043.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6043.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6043", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T15:55:05.333", - "lastModified": "2020-03-26T15:15:12.273", + "lastModified": "2024-11-21T02:13:40.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -119,6 +118,49 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128102/ManageEngine-EventLog-Analyzer-9.9-Authorization-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Aug/86", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "US Government Resource" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34519", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69482", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.mogwaisecurity.de/advisories/MSA-2014-01.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6051.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6051.json index e28a3d0d9d0..b27cbf3f3d5 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6051.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6051.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6051", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T16:55:07.010", - "lastModified": "2020-10-23T13:15:12.627", + "lastModified": "2024-11-21T02:13:41.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -195,8 +194,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "US Government Resource", - "Third Party Advisory" + "Third Party Advisory", + "US Government Resource" ] }, { @@ -247,6 +246,111 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0113.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/639", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61506", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ocert.org/advisories/ocert-2014-007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/25/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://usn.ubuntu.com/4587-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.kde.org/info/security/advisory-20140923-1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6052.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6052.json index 79c32d68b0e..e7acf6f467b 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6052.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6052.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6052", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:04.033", - "lastModified": "2020-10-23T13:15:13.063", + "lastModified": "2024-11-21T02:13:42.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -197,8 +196,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -212,6 +211,96 @@ { "url": "https://usn.ubuntu.com/4587-1/", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/639", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61506", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61682", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-2365-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ocert.org/advisories/ocert-2014-007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/25/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70091", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://usn.ubuntu.com/4587-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6053.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6053.json index de969456abc..5b7041a4bda 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6053.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6053.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6053", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:05.643", - "lastModified": "2020-10-23T13:15:13.203", + "lastModified": "2024-11-21T02:13:42.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -162,8 +161,8 @@ "url": "https://github.com/newsoft/libvncserver/commit/6037a9074d52b1963c97cb28ea1096c7c14cbf28", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -189,6 +188,88 @@ { "url": "https://usn.ubuntu.com/4587-1/", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/639", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61682", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2365-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ocert.org/advisories/ocert-2014-007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/25/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/newsoft/libvncserver/commit/6037a9074d52b1963c97cb28ea1096c7c14cbf28", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://usn.ubuntu.com/4573-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://usn.ubuntu.com/4587-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6054.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6054.json index a5bc6d666ea..dd5e829a5ad 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6054.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6054.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6054", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-06T14:55:11.643", - "lastModified": "2020-10-23T13:15:13.390", + "lastModified": "2024-11-21T02:13:42.613", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -166,8 +165,8 @@ "url": "https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -181,6 +180,80 @@ { "url": "https://usn.ubuntu.com/4587-1/", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/639", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61682", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ocert.org/advisories/ocert-2014-007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/25/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2365-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://usn.ubuntu.com/4587-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6055.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6055.json index 912f5d7420b..8ba9e4a9014 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6055.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6055.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6055", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T16:55:07.057", - "lastModified": "2020-10-23T13:15:13.517", + "lastModified": "2024-11-21T02:13:42.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -204,16 +203,16 @@ "url": "https://github.com/newsoft/libvncserver/commit/06ccdf016154fde8eccb5355613ba04c59127b2e", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { "url": "https://github.com/newsoft/libvncserver/commit/f528072216dec01cee7ca35d94e171a3b909e677", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -232,8 +231,116 @@ "url": "https://www.kde.org/info/security/advisory-20140923-1.txt", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0113.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/639", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ocert.org/advisories/ocert-2014-007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/25/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70096", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/newsoft/libvncserver/commit/06ccdf016154fde8eccb5355613ba04c59127b2e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://github.com/newsoft/libvncserver/commit/f528072216dec01cee7ca35d94e171a3b909e677", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://usn.ubuntu.com/4587-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.kde.org/info/security/advisory-20140923-1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" ] } ] diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6060.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6060.json index 5162e5e10f5..472f59bc5d4 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6060.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6060.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6060", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-04T17:55:09.060", - "lastModified": "2016-06-23T11:56:41.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:43.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -592,6 +591,41 @@ "tags": [ "Patch" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0334.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://roy.marples.name/projects/dhcpcd/ci/1d2b93aa5ce25a8a710082fe2d36a6bf7f5794d5?sbs=0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://source.android.com/security/bulletin/2016-04-02.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/30/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/01/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68970", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.462420", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6064.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6064.json index d3b369742cf..e21c48342a9 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6064.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6064.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6064", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-02T14:55:03.997", - "lastModified": "2018-12-18T14:42:44.563", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: https://kc.mcafee.com/corporate/index?page=content&id=SB10080\n\n\"Affected Versions:\n\n 7.3.2.8 and earlier\n 7.4.1.3 and earlier\"", + "lastModified": "2024-11-21T02:13:43.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +101,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1030675", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95690", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10080", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: https://kc.mcafee.com/corporate/index?page=content&id=SB10080\n\n\"Affected Versions:\n\n 7.3.2.8 and earlier\n 7.4.1.3 and earlier\"" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6070.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6070.json index 4426f52bb27..fde30f624b2 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6070.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6070.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6070", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:04.443", - "lastModified": "2017-09-08T01:29:07.340", + "lastModified": "2024-11-21T02:13:43.687", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -129,6 +128,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95677", "source": "cve@mitre.org" + }, + { + "url": "http://loganalyzer.adiscon.com/downloads/loganalyzer-3-6-6-v3-stable", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128121/LogAnalyzer-3.6.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34525", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95677", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6074.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6074.json index 0236c48e11a..5fee7be12a2 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6074.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6074.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6074", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-10T10:55:08.723", - "lastModified": "2017-09-08T01:29:07.387", + "lastModified": "2024-11-21T02:13:43.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95726", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683551", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95726", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6075.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6075.json index 2acfd780d15..a029b2f86ad 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6075.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6075.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6075", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-28T02:59:05.817", - "lastModified": "2017-09-08T01:29:07.450", + "lastModified": "2024-11-21T02:13:44.087", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -183,6 +182,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95727", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691211", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95727", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6076.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6076.json index e8e39b0447a..1d96e556880 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6076.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6076.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6076", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:00.067", - "lastModified": "2017-09-08T01:29:07.510", + "lastModified": "2024-11-21T02:13:44.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95729", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95729", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6077.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6077.json index 6dbe540ee56..ce1989585d9 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6077.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6077.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6077", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:01.457", - "lastModified": "2017-09-08T01:29:07.573", + "lastModified": "2024-11-21T02:13:44.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95730", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95730", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6078.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6078.json index fc195d3703b..b6ee4b0b253 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6078.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6078.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6078", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:02.410", - "lastModified": "2017-09-08T01:29:07.620", + "lastModified": "2024-11-21T02:13:44.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95762", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95762", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6079.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6079.json index 3f41b7808d6..7c7e166dcae 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6079.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6079.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6079", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-03T01:55:07.407", - "lastModified": "2017-09-08T01:29:07.713", + "lastModified": "2024-11-21T02:13:44.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -238,6 +237,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95763", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61294", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV64910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV64919", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684466", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95763", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6080.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6080.json index 8ec0f4f8ad4..1c940386692 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6080.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6080.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6080", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:03.443", - "lastModified": "2017-09-08T01:29:07.777", + "lastModified": "2024-11-21T02:13:44.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95767", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95767", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6082.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6082.json index 158492b15ed..370f430b36b 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6082.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6082.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6082", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:04.537", - "lastModified": "2017-09-08T01:29:07.823", + "lastModified": "2024-11-21T02:13:44.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -118,6 +117,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95809", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61945", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691601", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95809", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6083.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6083.json index 4ce9f8bf42a..5d84d076fbb 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6083.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6083.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6083", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:05.473", - "lastModified": "2017-09-08T01:29:07.887", + "lastModified": "2024-11-21T02:13:44.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95810", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95810", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6084.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6084.json index c111b663da6..61a4c285a3c 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6084.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6084.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6084", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:06.443", - "lastModified": "2017-09-08T01:29:07.933", + "lastModified": "2024-11-21T02:13:44.970", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95811", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95811", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6086.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6086.json index 45db39ab336..8ee69257518 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6086.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6086.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6086", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:07.473", - "lastModified": "2017-09-08T01:29:07.997", + "lastModified": "2024-11-21T02:13:45.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95813", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95813", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6087.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6087.json index a110b63edcc..8042ad574af 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6087.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6087.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6087", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:08.473", - "lastModified": "2017-09-08T01:29:08.057", + "lastModified": "2024-11-21T02:13:45.200", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95813", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95813", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6088.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6088.json index 99596496287..d877066d042 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6088.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6088.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6088", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:09.507", - "lastModified": "2017-09-08T01:29:08.107", + "lastModified": "2024-11-21T02:13:45.313", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95860", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95860", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6089.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6089.json index 32a02648421..1f03606db8c 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6089.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6089.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6089", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:10.413", - "lastModified": "2017-09-08T01:29:08.167", + "lastModified": "2024-11-21T02:13:45.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -107,6 +106,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95860", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV67581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684475", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95860", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6090.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6090.json index 068ff7419ea..a1b54cdd7cb 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6090.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6090.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6090", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-27T11:59:00.807", - "lastModified": "2015-04-27T17:00:12.463", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:45.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697726", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6091.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6091.json index 0b0804eece2..4b5789e20c6 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6091.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6091.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6091", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-09-23T21:55:04.990", - "lastModified": "2017-09-08T01:29:08.230", + "lastModified": "2024-11-21T02:13:45.653", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -108,6 +107,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95869", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684930", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95869", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6092.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6092.json index 8fb1bb542aa..85b8b30ad50 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6092.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6092.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6092", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-27T11:59:02.433", - "lastModified": "2015-04-27T17:46:00.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:45.767", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -140,6 +139,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697742", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6093.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6093.json index 993b09b741a..3d639846d5c 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6093.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6093.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6093", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-26T02:59:00.090", - "lastModified": "2017-09-08T01:29:08.293", + "lastModified": "2024-11-21T02:13:45.883", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -126,6 +125,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95921", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/59752", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60912", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI24678", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031359", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95921", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6095.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6095.json index 9d90c499d8d..1cb83366b9b 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6095.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6095.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6095", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-18T01:59:00.140", - "lastModified": "2017-09-08T01:29:08.370", + "lastModified": "2024-11-21T02:13:45.993", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -125,6 +124,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95943", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689779", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95943", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6096.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6096.json index ec578cd8946..72750c92c32 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6096.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6096.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6096", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-18T01:59:01.703", - "lastModified": "2017-09-08T01:29:08.433", + "lastModified": "2024-11-21T02:13:46.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95944", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689779", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95944", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6097.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6097.json index ffa9d714b21..4554875c192 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6097.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6097.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6097", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-08T11:55:02.600", - "lastModified": "2017-09-08T01:29:08.497", + "lastModified": "2024-11-21T02:13:46.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -99,6 +98,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95945", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT03786", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684812", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95945", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6098.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6098.json index 8476a94f7f7..ed4c58a6504 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6098.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6098.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6098", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-18T01:59:02.843", - "lastModified": "2017-09-08T01:29:08.543", + "lastModified": "2024-11-21T02:13:46.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -125,6 +124,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95961", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689779", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95961", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-60xx/CVE-2014-6099.json b/CVE-2014/CVE-2014-60xx/CVE-2014-6099.json index 8184b62adb9..8c409774661 100644 --- a/CVE-2014/CVE-2014-60xx/CVE-2014-6099.json +++ b/CVE-2014/CVE-2014-60xx/CVE-2014-6099.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6099", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-26T18:55:05.080", - "lastModified": "2017-09-08T01:29:08.607", + "lastModified": "2024-11-21T02:13:46.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT03935", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT03936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-01.ibm.com/support/docview.wss?uid=swg21685345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6100.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6100.json index 96caec8e822..02eb44a7757 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6100.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6100.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6100", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:15.717", - "lastModified": "2017-09-08T01:29:08.683", + "lastModified": "2024-11-21T02:13:46.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -491,6 +490,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96005", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61061", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686581", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6101.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6101.json index 90448e74021..4982775e644 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6101.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6101.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6101", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-31T10:55:02.283", - "lastModified": "2017-09-08T01:29:08.747", + "lastModified": "2024-11-21T02:13:46.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -156,6 +155,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96024", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61804", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51211", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51507", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687967", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96024", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6102.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6102.json index d940151fb69..fa324f62689 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6102.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6102.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6102", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-17T01:59:00.053", - "lastModified": "2017-09-08T01:29:08.807", + "lastModified": "2024-11-21T02:13:47.013", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per an IBM Security Bulletin IBM identifies access vector as local", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -319,6 +317,19 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96141", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695597", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96141", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per an IBM Security Bulletin IBM identifies access vector as local" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6105.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6105.json index 7310acf9d46..8d2fee6a1e0 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6105.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6105.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6105", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-18T01:59:04.030", - "lastModified": "2017-09-08T01:29:08.870", + "lastModified": "2024-11-21T02:13:47.137", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96144", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689779", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96144", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6107.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6107.json index 94b3918709d..0ea111e43f7 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6107.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6107.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6107", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-18T01:59:05.203", - "lastModified": "2017-09-08T01:29:08.933", + "lastModified": "2024-11-21T02:13:47.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96150", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689779", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96150", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6110.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6110.json index 5e4a5d74d18..d227a7e2b17 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6110.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6110.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6110", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-18T01:59:06.217", - "lastModified": "2017-09-08T01:29:08.997", + "lastModified": "2024-11-21T02:13:47.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -121,6 +120,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96179", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689779", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96179", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6113.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6113.json index 84b86a4e45c..2a4476ba55c 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6113.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6113.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6113", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-16T00:59:01.760", - "lastModified": "2017-09-08T01:29:09.057", + "lastModified": "2024-11-21T02:13:48.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96210", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692516", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96210", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6114.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6114.json index 916ad75a5d4..8def460997a 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6114.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6114.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6114", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-11T11:59:10.307", - "lastModified": "2017-09-08T01:29:09.120", + "lastModified": "2024-11-21T02:13:48.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +101,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96211", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691815", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96211", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6115.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6115.json index 80ad145ad2c..8d03dce6049 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6115.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6115.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6115", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-24T20:59:01.270", - "lastModified": "2015-02-25T16:48:19.330", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:48.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697034", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6116.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6116.json index 6939d1ca807..bca59c31669 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6116.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6116.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6116", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-19T01:55:15.747", - "lastModified": "2017-09-08T01:29:09.167", + "lastModified": "2024-11-21T02:13:48.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96213", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61064", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96213", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6119.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6119.json index 53995e288b1..af7e92c3593 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6119.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6119.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6119", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-23T02:59:00.047", - "lastModified": "2017-09-08T01:29:09.230", + "lastModified": "2024-11-21T02:13:48.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -124,6 +123,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96720", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96720", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6121.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6121.json index 6d10845ea10..033c36c252e 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6121.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6121.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6121", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-23T02:59:01.233", - "lastModified": "2017-09-08T01:29:09.277", + "lastModified": "2024-11-21T02:13:48.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -116,6 +115,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96722", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96722", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6122.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6122.json index 1ffb0ea8250..8ac1ba704ea 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6122.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6122.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6122", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-23T02:59:02.357", - "lastModified": "2017-09-08T01:29:09.340", + "lastModified": "2024-11-21T02:13:48.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -116,6 +115,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96723", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96723", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6123.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6123.json index 6a78edd7b07..b10f2d598fe 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6123.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6123.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6123", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-29T02:59:00.050", - "lastModified": "2017-09-08T01:29:09.387", + "lastModified": "2024-11-21T02:13:49.107", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -157,6 +156,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96724", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692999", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96724", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6125.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6125.json index 2d5b0af59db..121061ae77b 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6125.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6125.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6125", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-28T19:55:03.027", - "lastModified": "2017-09-08T01:29:09.450", + "lastModified": "2024-11-21T02:13:49.227", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96782", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI26889", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70759", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96782", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6126.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6126.json index cafa2db6e8b..d21eebdd1e5 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6126.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6126.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6126", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-28T19:55:03.073", - "lastModified": "2017-09-08T01:29:09.497", + "lastModified": "2024-11-21T02:13:49.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96783", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI26889", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21684651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96783", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6129.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6129.json index 2f46df409c9..80c16910136 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6129.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6129.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6129", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-18T10:59:00.073", - "lastModified": "2015-03-18T15:04:55.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:49.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -569,6 +568,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698247", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6130.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6130.json index 3a7c0a5a01d..c53ca714d95 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6130.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6130.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6130", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-04T18:55:06.793", - "lastModified": "2017-09-08T01:29:09.543", + "lastModified": "2024-11-21T02:13:49.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96810", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688840", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/432608", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70871", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96810", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6131.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6131.json index aa63be70616..6c7fd53aed6 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6131.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6131.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6131", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-18T10:59:01.197", - "lastModified": "2015-03-18T17:00:47.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:49.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -569,6 +568,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698247", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6132.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6132.json index dd1b18339bb..cd43ac1d880 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6132.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6132.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6132", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:01.417", - "lastModified": "2017-09-08T01:29:09.607", + "lastModified": "2024-11-21T02:13:49.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -215,6 +214,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96812", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61805", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV64000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693379", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96812", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6133.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6133.json index 69dd13ae112..245f1a77ac0 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6133.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6133.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6133", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-26T18:55:05.127", - "lastModified": "2017-09-08T01:29:09.653", + "lastModified": "2024-11-21T02:13:49.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -91,6 +90,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96813", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LI78229", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96813", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6134.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6134.json index 1eac94ee42b..72de79ec6bc 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6134.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6134.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6134", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-25T01:59:03.767", - "lastModified": "2015-03-25T20:47:58.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:50.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 1.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.2 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -195,6 +194,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6135.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6135.json index 1677c5cccae..4b11bd4e421 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6135.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6135.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6135", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-23T02:59:03.453", - "lastModified": "2017-09-08T01:29:09.700", + "lastModified": "2024-11-21T02:13:50.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96815", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96815", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6136.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6136.json index 1c3e21b4e89..b1ce9653a8b 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6136.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6136.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6136", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-02T01:59:00.047", - "lastModified": "2017-09-08T01:29:09.747", + "lastModified": "2024-11-21T02:13:50.383", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -152,6 +151,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96816", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96816", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6137.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6137.json index ed3ab756f61..888d4d3d055 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6137.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6137.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6137", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-16T00:59:04.043", - "lastModified": "2017-09-08T01:29:09.807", + "lastModified": "2024-11-21T02:13:50.503", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96817", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692516", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96817", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6138.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6138.json index b25e84a014f..1142b57e23a 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6138.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6138.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6138", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-12T11:59:01.377", - "lastModified": "2017-09-08T01:29:09.857", + "lastModified": "2024-11-21T02:13:50.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -91,6 +90,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96852", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96852", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6139.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6139.json index 84cff2b7cc2..318b29cfb79 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6139.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6139.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6139", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-13T02:59:04.347", - "lastModified": "2015-02-17T12:35:28.203", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:50.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -89,6 +88,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51391", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6140.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6140.json index d34472869c5..99501601dda 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6140.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6140.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6140", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-06T15:59:04.997", - "lastModified": "2018-10-09T19:50:22.007", + "lastModified": "2024-11-21T02:13:50.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,46 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129349/IBM-Endpoint-Manager-For-Mobile-Devices-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691701", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534131/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71424", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-012/-unauthenticated-remote-code-execution-in-ibm-endpoint-manager-mobile-device-management-components", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6141.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6141.json index d67d8d527e6..4c0c7bbcaa1 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6141.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6141.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6141", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-02T01:59:01.373", - "lastModified": "2017-09-08T01:29:09.917", + "lastModified": "2024-11-21T02:13:50.997", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -242,6 +241,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96911", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690932", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96911", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6143.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6143.json index 0f7e403b902..7b8c7c03c10 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6143.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6143.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6143", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-11T16:59:01.507", - "lastModified": "2017-09-08T01:29:09.980", + "lastModified": "2024-11-21T02:13:51.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -91,6 +90,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96913", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96913", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6144.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6144.json index 40102b6c462..b89eec3a553 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6144.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6144.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6144", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-13T01:59:18.350", - "lastModified": "2015-11-19T19:01:09.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:51.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -198,6 +197,18 @@ { "url": "http://www.securitytracker.com/id/1031885", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031885", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6145.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6145.json index fef0cc841cb..a317c4f9e24 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6145.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6145.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6145", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-12T11:59:02.610", - "lastModified": "2017-09-08T01:29:10.027", + "lastModified": "2024-11-21T02:13:51.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -102,6 +101,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96915", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96915", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6146.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6146.json index 7e822db7d7c..8be8a7d42ad 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6146.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6146.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6146", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-08T11:55:02.630", - "lastModified": "2017-09-08T01:29:10.073", + "lastModified": "2024-11-21T02:13:51.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -100,6 +99,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96916", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62190", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04337", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96916", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6147.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6147.json index 7c20ef82fc9..6943acb31ea 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6147.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6147.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6147", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-19T02:59:33.977", - "lastModified": "2017-09-08T01:29:10.120", + "lastModified": "2024-11-21T02:13:51.637", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -112,6 +111,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96917", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5097120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96917", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6148.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6148.json index 19be0415000..5bf551dbc95 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6148.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6148.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6148", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-31T10:55:02.330", - "lastModified": "2017-09-08T01:29:10.183", + "lastModified": "2024-11-21T02:13:51.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -191,6 +190,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96918", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61785", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688549", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70842", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96918", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6149.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6149.json index 45f5fb93045..7cf638d6b05 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6149.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6149.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6149", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-29T10:55:05.447", - "lastModified": "2017-09-08T01:29:10.230", + "lastModified": "2024-11-21T02:13:51.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -186,6 +185,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96919", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688296", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70805", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96919", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6150.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6150.json index 2127adf4bb5..a7e4368f22b 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6150.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6150.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6150", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-31T10:55:02.377", - "lastModified": "2017-09-08T01:29:10.293", + "lastModified": "2024-11-21T02:13:52.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -132,6 +131,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96920", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61785", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688424", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96920", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6151.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6151.json index b5149377a87..f772d6a4bd7 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6151.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6151.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6151", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-25T10:55:06.540", - "lastModified": "2017-09-08T01:29:10.340", + "lastModified": "2024-11-21T02:13:52.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -99,6 +98,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97033", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61899", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI27417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97033", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6152.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6152.json index cbedc656308..446b494da95 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6152.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6152.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6152", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-10-25T10:55:06.587", - "lastModified": "2017-09-08T01:29:10.403", + "lastModified": "2024-11-21T02:13:52.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -99,6 +98,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97034", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61899", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI27417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70729", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97034", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6153.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6153.json index dd687683e86..ffc0acd1abd 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6153.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6153.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6153", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:02.493", - "lastModified": "2017-09-08T01:29:10.463", + "lastModified": "2024-11-21T02:13:52.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -214,6 +213,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97622", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV64010", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693379", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693389", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97622", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6154.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6154.json index c26a20ef211..af05afb4c11 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6154.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6154.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6154", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-13T02:59:05.330", - "lastModified": "2017-09-08T01:29:10.510", + "lastModified": "2024-11-21T02:13:52.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -110,6 +109,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97677", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97677", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6155.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6155.json index 4564c3b99dd..3653ce13aef 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6155.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6155.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6155", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:03.447", - "lastModified": "2017-09-08T01:29:10.573", + "lastModified": "2024-11-21T02:13:52.727", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -144,6 +143,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97678", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61805", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV63585", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693389", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97678", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6158.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6158.json index 7d63be028ac..cb91570383f 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6158.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6158.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6158", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-10T02:59:26.380", - "lastModified": "2017-09-08T01:29:10.620", + "lastModified": "2024-11-21T02:13:52.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -159,6 +158,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97707", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/61956", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693292", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97707", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6159.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6159.json index 1e298214763..30af959884f 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6159.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6159.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6159", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-08T11:55:02.677", - "lastModified": "2017-09-08T01:29:10.683", + "lastModified": "2024-11-21T02:13:52.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -132,6 +131,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97708", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04730", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05074", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05132", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97708", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6160.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6160.json index c377ddeb698..dd00f89a6c2 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6160.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6160.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6160", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-29T02:59:01.363", - "lastModified": "2017-09-08T01:29:10.747", + "lastModified": "2024-11-21T02:13:53.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -103,6 +102,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97709", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV63498", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693389", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97709", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6161.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6161.json index da1d35de851..73c2f9df107 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6161.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6161.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6161", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-08T11:55:02.727", - "lastModified": "2017-09-08T01:29:10.793", + "lastModified": "2024-11-21T02:13:53.243", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97710", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62168", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21689130", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97710", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6163.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6163.json index d3cfb360fb0..9562cb9638b 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6163.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6163.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6163", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-11T16:59:02.490", - "lastModified": "2017-09-08T01:29:10.857", + "lastModified": "2024-11-21T02:13:53.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -91,6 +90,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97712", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97712", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6164.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6164.json index 8b7e006d35b..aa5f8596f74 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6164.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6164.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6164", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:11.413", - "lastModified": "2017-09-08T01:29:10.917", + "lastModified": "2024-11-21T02:13:53.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -166,6 +165,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97713", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI23430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97713", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6166.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6166.json index a64f6253c9a..ecc3c538eb2 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6166.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6166.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6166", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:12.303", - "lastModified": "2017-09-08T01:29:10.963", + "lastModified": "2024-11-21T02:13:53.600", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CCWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -171,6 +169,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97746", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI25310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI28632", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97746", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CCWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6167.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6167.json index d159e88a6c2..07d405075e3 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6167.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6167.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6167", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:13.147", - "lastModified": "2017-09-08T01:29:11.027", + "lastModified": "2024-11-21T02:13:53.733", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -321,6 +320,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97748", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI23819", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97748", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6168.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6168.json index b67aa992e0e..629bbb97d20 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6168.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6168.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6168", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-29T02:59:02.487", - "lastModified": "2017-09-08T01:29:11.090", + "lastModified": "2024-11-21T02:13:53.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -147,6 +146,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97752", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692907", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97752", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6170.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6170.json index 53eabe56e7e..fe70523d9e9 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6170.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6170.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6170", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-02T01:59:02.593", - "lastModified": "2017-09-08T01:29:11.153", + "lastModified": "2024-11-21T02:13:54.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -181,6 +180,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98309", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT01929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690725", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98309", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6171.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6171.json index 8a4ce628ff7..38ea4f463b6 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6171.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6171.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6171", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-19T02:59:01.623", - "lastModified": "2017-09-08T01:29:11.217", + "lastModified": "2024-11-21T02:13:54.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -169,6 +168,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98383", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI29134", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692107", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98383", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6172.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6172.json index d8cec9cc07f..7dc6dfb2f78 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6172.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6172.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6172", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-21T15:17:01.197", - "lastModified": "2017-09-08T01:29:11.277", + "lastModified": "2024-11-21T02:13:54.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -116,6 +115,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98417", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LI78291", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694460", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031613", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98417", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6173.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6173.json index aa1bf8aa2e5..9bf87691612 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6173.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6173.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6173", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-19T02:59:02.860", - "lastModified": "2017-09-08T01:29:11.340", + "lastModified": "2024-11-21T02:13:54.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -124,6 +123,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98418", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR50241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98418", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6174.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6174.json index 33ec64b58aa..9c22ab3a757 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6174.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6174.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6174", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:14.163", - "lastModified": "2017-09-08T01:29:11.387", + "lastModified": "2024-11-21T02:13:54.590", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -321,6 +320,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98486", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI27152", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98486", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6176.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6176.json index e904a90a2e9..a61bdcc589f 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6176.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6176.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6176", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-16T23:59:02.463", - "lastModified": "2017-09-08T01:29:11.480", + "lastModified": "2024-11-21T02:13:54.847", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -179,6 +178,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98488", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690780", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031382", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98488", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6177.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6177.json index a93d1d6fd7d..519f400abd2 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6177.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6177.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6177", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:04.370", - "lastModified": "2017-09-08T01:29:11.527", + "lastModified": "2024-11-21T02:13:54.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -128,6 +127,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98492", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV24386", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98492", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6178.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6178.json index 0b3e4bcd9f9..19beb3de409 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6178.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6178.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6178", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:05.430", - "lastModified": "2017-09-08T01:29:11.590", + "lastModified": "2024-11-21T02:13:55.103", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -123,6 +122,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98514", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV51765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98514", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6179.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6179.json index 54927be5f1f..9e6f187ec8b 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6179.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6179.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6179", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:06.353", - "lastModified": "2017-09-08T01:29:11.653", + "lastModified": "2024-11-21T02:13:55.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -118,6 +117,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98516", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV51859", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98516", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6180.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6180.json index e28683aa354..9add7cf5bd0 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6180.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6180.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6180", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:07.180", - "lastModified": "2017-09-08T01:29:11.700", + "lastModified": "2024-11-21T02:13:55.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -118,6 +117,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98515", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV01657", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98515", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6181.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6181.json index 5a3b38bf6ee..7ae0656db97 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6181.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6181.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6181", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:08.103", - "lastModified": "2017-09-08T01:29:11.747", + "lastModified": "2024-11-21T02:13:55.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -106,6 +105,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98517", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV25285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98517", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6182.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6182.json index cd6012ee075..f7d1b23b7a4 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6182.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6182.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6182", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-17T00:59:01.220", - "lastModified": "2017-09-08T01:29:11.807", + "lastModified": "2024-11-21T02:13:55.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -129,6 +128,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98518", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51234", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21692540", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98518", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6183.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6183.json index 8fc00e5d4ef..8216543be9d 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6183.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6183.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6183", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-23T00:59:01.817", - "lastModified": "2017-09-08T01:29:11.873", + "lastModified": "2024-11-21T02:13:55.713", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -246,6 +245,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98519", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690823", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98519", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6184.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6184.json index 26b822ed839..f9d05e43900 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6184.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6184.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6184", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-22T02:59:00.060", - "lastModified": "2021-09-08T17:19:30.890", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:55.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -137,6 +136,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05707", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695878", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6185.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6185.json index a022cfe6621..8ac4e535e84 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6185.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6185.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6185", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-13T02:59:06.157", - "lastModified": "2017-09-08T01:29:11.933", + "lastModified": "2024-11-21T02:13:55.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -192,6 +191,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98521", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05713", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695715", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98521", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6186.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6186.json index 2cbcc987ef3..5846514a6ef 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6186.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6186.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6186", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:09.040", - "lastModified": "2017-09-08T01:29:11.980", + "lastModified": "2024-11-21T02:13:56.087", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -177,6 +176,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98549", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV26309", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693379", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98549", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6187.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6187.json index f2f7744a3dd..2cbdd12c76f 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6187.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6187.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6187", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:09.900", - "lastModified": "2017-09-08T01:29:12.043", + "lastModified": "2024-11-21T02:13:56.207", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -181,6 +180,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98553", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV26727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693379", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71906", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98553", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6188.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6188.json index 246a3417c52..076d3ff9348 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6188.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6188.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6188", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-24T11:59:10.993", - "lastModified": "2017-09-08T01:29:12.107", + "lastModified": "2024-11-21T02:13:56.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -182,6 +181,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98553", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV26727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693379", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21693387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98553", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6190.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6190.json index 9a42d40ca4a..4b023f424dc 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6190.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6190.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6190", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:03.607", - "lastModified": "2015-05-26T17:54:58.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:56.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700480", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6192.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6192.json index c6d34577de3..726ba663a92 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6192.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6192.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6192", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:04.717", - "lastModified": "2015-05-26T17:05:02.343", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:56.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -153,6 +152,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700252", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6193.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6193.json index 8d6a32b2c7a..255ce620712 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6193.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6193.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6193", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-19T02:59:03.873", - "lastModified": "2017-09-08T01:29:12.153", + "lastModified": "2024-11-21T02:13:56.957", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-91: XML Injection (aka Blind XPath Injection)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -98,6 +96,23 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98567", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI28699", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692107", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98567", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-91: XML Injection (aka Blind XPath Injection)" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6194.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6194.json index 7efce8d5322..f9e0f8836ba 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6194.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6194.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6194", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-17T01:59:01.317", - "lastModified": "2017-09-08T01:29:12.217", + "lastModified": "2024-11-21T02:13:57.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -318,6 +317,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98605", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98605", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6195.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6195.json index 8d6f95b4b82..749ce13fff8 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6195.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6195.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6195", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-14T02:59:01.333", - "lastModified": "2023-02-14T15:51:38.987", + "lastModified": "2024-11-21T02:13:57.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -394,6 +393,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98607", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98607", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6196.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6196.json index ccde08a5f3b..f815d6c85ec 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6196.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6196.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6196", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-11-26T02:59:01.373", - "lastModified": "2017-09-08T01:29:12.357", + "lastModified": "2024-11-21T02:13:57.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -183,6 +182,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98608", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/59546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO82672", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO82673", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO82674", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO82675", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LO82676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98608", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6197.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6197.json index 2fc4b0acb09..0fd1d0dec3a 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6197.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6197.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6197", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-17T11:59:04.093", - "lastModified": "2017-09-08T01:29:12.417", + "lastModified": "2024-11-21T02:13:57.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -135,6 +134,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98609", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693542", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98609", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-61xx/CVE-2014-6199.json b/CVE-2014/CVE-2014-61xx/CVE-2014-6199.json index 4cc3b38e1c8..05541b7d3e4 100644 --- a/CVE-2014/CVE-2014-61xx/CVE-2014-6199.json +++ b/CVE-2014/CVE-2014-61xx/CVE-2014-6199.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6199", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-10T02:59:27.273", - "lastModified": "2017-09-08T01:29:12.480", + "lastModified": "2024-11-21T02:13:57.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -148,6 +147,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98650", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693131", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6209.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6209.json index 8d16baf958f..9d6cd903935 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6209.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6209.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6209", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-12T16:59:00.067", - "lastModified": "2018-09-27T10:29:00.400", + "lastModified": "2024-11-21T02:13:57.873", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -133,6 +132,53 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98684", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04786", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05644", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05646", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690787", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71729", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1034571", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98684", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6210.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6210.json index 4c689158157..256fc08f752 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6210.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6210.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6210", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-12T16:59:01.427", - "lastModified": "2018-09-27T10:29:01.293", + "lastModified": "2024-11-21T02:13:58.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -129,6 +128,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98685", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC96934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT04138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05651", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05652", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71730", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1034572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98685", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6211.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6211.json index 93c3752ce18..b082b563087 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6211.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6211.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6211", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-20T01:59:59.890", - "lastModified": "2019-09-30T16:19:41.927", + "lastModified": "2024-11-21T02:13:58.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -196,6 +195,26 @@ { "url": "http://www.securitytracker.com/id/1032248", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52117", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883875", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032248", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6212.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6212.json index d3eeb6d00c3..e7bca2ee97b 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6212.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6212.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6212", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-10T02:59:28.227", - "lastModified": "2017-09-08T01:29:12.667", + "lastModified": "2024-11-21T02:13:58.247", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -424,6 +422,19 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98689", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693069", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98689", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6214.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6214.json index 8b88d39078b..0a8a0774f19 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6214.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6214.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6214", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-13T01:59:19.537", - "lastModified": "2015-08-11T17:51:33.083", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:58.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "http://www.securitytracker.com/id/1031880", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI34987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031880", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6215.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6215.json index 2c5c24e3045..680d89ada29 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6215.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6215.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6215", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-11T23:59:00.093", - "lastModified": "2017-09-08T01:29:12.730", + "lastModified": "2024-11-21T02:13:58.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -156,6 +155,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98802", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI24434", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21691458", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98802", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6221.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6221.json index ee4ffba294c..2eb727f597b 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6221.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6221.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6221", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-06T00:59:00.033", - "lastModified": "2016-11-28T19:12:44.187", + "lastModified": "2024-11-21T02:13:58.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N", + "baseScore": 9.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 9.4 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -267,6 +266,22 @@ { "url": "http://www.securitytracker.com/id/1032026", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698893", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032026", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6228.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6228.json index d262407ed7e..ad52fca4c43 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6228.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6228.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6228", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-28T15:59:03.050", - "lastModified": "2014-12-30T15:34:11.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:59.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -76,6 +75,10 @@ { "url": "https://github.com/facebook/hhvm/commit/1f91e076a585118495b976a413c1df40f6fd3d41", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/facebook/hhvm/commit/1f91e076a585118495b976a413c1df40f6fd3d41", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6229.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6229.json index c4a41c5e944..88d0281bee7 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6229.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6229.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6229", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-28T15:59:04.143", - "lastModified": "2014-12-30T15:34:41.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:59.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "https://github.com/facebook/hhvm/commit/7135ec229882370a00411aa50030eada6034cc1b", "source": "cve@mitre.org" + }, + { + "url": "http://hhvm.com/blog/6239/hhvm-3-3-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/facebook/hhvm/commit/7135ec229882370a00411aa50030eada6034cc1b", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6230.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6230.json index c68828bfb7d..ef71b2985c4 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6230.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6230.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6230", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-25T00:55:03.867", - "lastModified": "2022-12-23T14:32:44.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:13:59.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/60", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.dxw.com/advisories/vulnerability-in-wp-ban-allows-visitors-to-bypass-the-ip-blacklist-in-some-configurations/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/wp-ban/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6231.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6231.json index ae1428f6fe6..471d187d35e 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6231.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6231.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6231", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:04.740", - "lastModified": "2017-09-08T01:29:12.793", + "lastModified": "2024-11-21T02:13:59.613", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95700", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/60888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/cwt_feedit", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95700", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6232.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6232.json index 14fa4ef55af..c2f3f22ca33 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6232.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6232.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6232", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:04.787", - "lastModified": "2017-09-08T01:29:12.857", + "lastModified": "2024-11-21T02:13:59.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -99,6 +98,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95701", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/60886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/eu_ldap", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95701", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6233.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6233.json index 92cf745dd1f..9ca4223bc1c 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6233.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6233.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6233", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:04.850", - "lastModified": "2017-09-08T01:29:12.917", + "lastModified": "2024-11-21T02:13:59.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95703", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/60876", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/flatmgr", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69561", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95703", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6234.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6234.json index 7a67d9438d5..b1e92454ed3 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6234.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6234.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6234", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:04.897", - "lastModified": "2017-09-08T01:29:12.967", + "lastModified": "2024-11-21T02:14:00.027", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95704", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/60874", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/jh_opengraphprotocol", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69566", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95704", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6235.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6235.json index 57adff31206..5d8dd0ce0f0 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6235.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6235.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6235", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:04.943", - "lastModified": "2017-09-08T01:29:13.027", + "lastModified": "2024-11-21T02:14:00.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95706", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/extensions/repository/view/ke_dompdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95706", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6236.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6236.json index 44566c80d88..abadef99bdd 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6236.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6236.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6236", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:04.990", - "lastModified": "2017-09-08T01:29:13.073", + "lastModified": "2024-11-21T02:14:00.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95707", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/60873", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/lumophpinclude", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69569", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95707", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6237.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6237.json index 8d62008fa16..2de1a3ad0c8 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6237.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6237.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6237", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:05.037", - "lastModified": "2017-09-08T01:29:13.137", + "lastModified": "2024-11-21T02:14:00.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95708", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69567", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95708", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6238.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6238.json index 2468a01d5bf..87cfee099ba 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6238.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6238.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6238", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:05.083", - "lastModified": "2017-09-08T01:29:13.183", + "lastModified": "2024-11-21T02:14:00.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95709", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69570", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95709", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6239.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6239.json index 522a1a0ec0b..9ad6bff0055 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6239.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6239.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6239", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:05.163", - "lastModified": "2014-09-11T19:48:15.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:00.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -116,6 +115,25 @@ { "url": "http://www.securityfocus.com/bid/69564", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/extensions/repository/view/st_address_map", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69564", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6240.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6240.json index aab40f8e70c..48644a9f168 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6240.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6240.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6240", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:05.223", - "lastModified": "2014-09-11T17:06:34.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:00.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "http://www.securityfocus.com/bid/69571", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69571", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6241.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6241.json index 890a9fb2868..5a8b967f0d5 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6241.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6241.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6241", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-11T14:16:05.270", - "lastModified": "2017-09-08T01:29:13.247", + "lastModified": "2024-11-21T02:14:01.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95713", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/60867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/wt_directory", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69568", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95713", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6242.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6242.json index 40b03e09e00..2d3c30f03e4 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6242.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6242.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6242", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-02T14:55:04.823", - "lastModified": "2018-10-09T19:50:22.537", + "lastModified": "2024-11-21T02:14:01.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -115,6 +114,49 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128419/All-In-One-WP-Security-3.8.2-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34781", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533519/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96204", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23231", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6243.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6243.json index 9e2ed57d57b..6c6fe837c94 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6243.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6243.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6243", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T14:55:08.603", - "lastModified": "2018-10-09T19:50:23.443", + "lastModified": "2024-11-21T02:14:01.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128621/WordPress-EWWW-Image-Optimizer-2.0.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533641/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70190", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/ewww-image-optimizer/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23234", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6251.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6251.json index 7d6fe03e4c4..9ef7aa416c7 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6251.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6251.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6251", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-25T00:55:03.927", - "lastModified": "2014-10-27T15:04:17.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:01.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -76,6 +75,10 @@ { "url": "http://seclists.org/fulldisclosure/2014/Oct/29", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/29", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6252.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6252.json index 89430b42a76..2d9b5ba4534 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6252.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6252.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6252", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-05T14:55:05.270", - "lastModified": "2018-12-10T19:29:04.390", + "lastModified": "2024-11-21T02:14:01.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -96,6 +95,26 @@ { "url": "https://service.sap.com/sap/support/notes/2018221", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-011-sap-netweaver-dispatcher-buffer-overflow-rce-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/2018221", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6253.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6253.json index f5c67e6d214..a7fc6d93cb3 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6253.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6253.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6253", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:06.817", - "lastModified": "2016-03-21T13:16:08.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:01.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "M\u00faltiples vulnerabilidades de CSRF en Zenoss Core hasta 5 Beta 3 permiten a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios arbitrarios, tambi\u00e9n conocido como ZEN-12653." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in versions 5.1.2 and 4.2.4.SP863. Will be also addressed in next 425 maintenance release.", - "lastModified": "2016-03-21T09:16:08.353" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -186,6 +178,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in versions 5.1.2 and 4.2.4.SP863. Will be also addressed in next 425 maintenance release.", + "lastModified": "2016-03-21T09:16:08.353" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6254.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6254.json index 51466e535b2..a15ee2d7af5 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6254.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6254.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6254", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:07.800", - "lastModified": "2014-12-16T14:06:13.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:01.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -182,6 +181,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6255.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6255.json index 0b5477e6ef4..21d315ea942 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6255.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6255.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6255", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:08.660", - "lastModified": "2016-03-21T15:43:37.927", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:14:02.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -16,13 +14,6 @@ "value": "Vulnerabilidad de redirecci\u00f3n abierta en el formulario de inicio de sesi\u00f3n en Zenoss Core anterior a 4.2.5 SP161 permite a atacantes remotos redirigir usuarios a sitios web arbitrarios y realizar ataques de phishing a trav\u00e9s del par\u00e1metro came_from, tambi\u00e9n conocido como ZEN-11998." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in versions 5.0, 4.2.5.SP167, and 4.2.4.SP555", - "lastModified": "2016-03-21T11:43:37.927" - } - ], "metrics": { "cvssMetricV2": [ { @@ -31,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -170,6 +161,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in versions 5.0, 4.2.5.SP167, and 4.2.4.SP555", + "lastModified": "2016-03-21T11:43:37.927" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6256.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6256.json index 37bf8d1c222..ced714e6de2 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6256.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6256.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6256", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:09.613", - "lastModified": "2016-03-21T15:44:57.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:02.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 permite a atacantes remotos evadir las restricciones de acceso y colocar ficheros en un directorio con acceso p\u00fablico de (1) lectura o (2) ejecuci\u00f3n a trav\u00e9s de una acci\u00f3n move, tambi\u00e9n conocido como ZEN-15386." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in 5.0", - "lastModified": "2016-03-21T11:44:57.293" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -185,6 +177,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in 5.0", + "lastModified": "2016-03-21T11:44:57.293" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6257.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6257.json index a75ca0e2ce4..2976c113387 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6257.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6257.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6257", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:10.753", - "lastModified": "2016-03-21T15:51:08.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:02.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 permite a atacantes remotos evadir las restricciones de acceso mediante el uso de una URL endpoint web para invocar un m\u00e9todo de ayudante de objetos (object helper), tambi\u00e9n conocido como ZEN-15407." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in 5.1.2", - "lastModified": "2016-03-21T11:51:08.240" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in 5.1.2", + "lastModified": "2016-03-21T11:51:08.240" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6258.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6258.json index fe870bf21fa..c54fb25a366 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6258.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6258.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6258", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:11.660", - "lastModified": "2016-03-21T15:58:24.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:02.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Un endpoint no especificado en Zenoss Core hasta 5 Beta 3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU) mediante la provocaci\u00f3n de un intento de emparejamiento de expresiones regulares arbitrarias, tambi\u00e9n conocido como ZEN-15411." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in versions 5.1.1, 4.2.5.SP650, and 4.2.4.SP854", - "lastModified": "2016-03-21T11:58:24.537" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in versions 5.1.1, 4.2.5.SP650, and 4.2.4.SP854", + "lastModified": "2016-03-21T11:58:24.537" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6259.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6259.json index e97211a7046..4c59623813c 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6259.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6259.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6259", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:12.580", - "lastModified": "2016-03-21T15:59:22.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:02.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 no detecta correctamente la recursi\u00f3n durante la expansi\u00f3n de entidades, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria y CPU) a trav\u00e9s de un documento XML manipulado que contiene un n\u00famero grande de referencias de entidad anidadas, tambi\u00e9n conocido como ZEN-15414, un problema similar a CVE-2003-1564." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in versions 5.1.1, 4.2.5.SP650, and 4.2.4.SP854", - "lastModified": "2016-03-21T11:59:22.187" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in versions 5.1.1, 4.2.5.SP650, and 4.2.4.SP854", + "lastModified": "2016-03-21T11:59:22.187" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6260.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6260.json index 4ce8161708f..2e667e7d274 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6260.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6260.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6260", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:13.503", - "lastModified": "2016-03-21T16:00:20.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:02.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 no requiere una contrase\u00f1a para modificar la cadena de comandos del paginador, lo que permite a atacantes remotos ejecutar comandos arbitrarios o causar una denegaci\u00f3n de servicio (interrupci\u00f3n de paginaci\u00f3n) mediante el aprovechamiento de una estaci\u00f3n de trabajo desatendida, tambi\u00e9n conocido como ZEN-15412." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in versions 5.1.1, 4.2.5.SP650, and 4.2.4.SP854", - "lastModified": "2016-03-21T12:00:20.787" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in versions 5.1.1, 4.2.5.SP650, and 4.2.4.SP854", + "lastModified": "2016-03-21T12:00:20.787" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6261.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6261.json index c4ac152d66a..b46869b2974 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6261.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6261.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6261", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:14.347", - "lastModified": "2016-03-21T16:01:15.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:03.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 no implementa correctamente la caracteristica comprobar para actualizaciones (Check For Updates), lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante (1) la falsificaci\u00f3n del servidor callhome o (2) el uso de un sitio web manipulado que est\u00e1 visitado durante una acci\u00f3n de inicio de sesi\u00f3n, tambi\u00e9n conocido como ZEN-12657." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in 5.1.2", - "lastModified": "2016-03-21T12:01:15.387" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in 5.1.2", + "lastModified": "2016-03-21T12:01:15.387" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6268.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6268.json index aed8cc60f27..fb35cdf3df7 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6268.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6268.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6268", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-12T15:59:02.443", - "lastModified": "2017-09-08T01:29:13.433", + "lastModified": "2024-11-21T02:14:03.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -100,6 +99,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95837", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/69753", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030829", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-107.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95837", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6269.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6269.json index a3d6a84f4d8..03b419be65b 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6269.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6269.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6269", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T14:55:11.453", - "lastModified": "2023-11-07T02:20:57.473", + "lastModified": "2024-11-21T02:14:03.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -137,6 +136,37 @@ { "url": "http://www.openwall.com/lists/oss-security/2014/09/09/23", "source": "cve@mitre.org" + }, + { + "url": "http://article.gmane.org/gmane.comp.web.haproxy/17726", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://article.gmane.org/gmane.comp.web.haproxy/18097", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commitdiff%3Bh=b4d05093bc89f71377230228007e69a1434c1a0c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1292.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61507", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/09/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6270.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6270.json index ebd594aaf2d..af1c6a5098b 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6270.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6270.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6270", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-12T14:55:07.907", - "lastModified": "2017-09-08T01:29:13.510", + "lastModified": "2024-11-21T02:14:03.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1051,6 +1050,76 @@ { "url": "https://security.gentoo.org/glsa/201607-01", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/542", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/550", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69686", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2921-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=895773", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1139967", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95873", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201607-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6271.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6271.json index d70ce9c1074..088b5e1dea9 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6271.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6271.json @@ -2,13 +2,8 @@ "id": "CVE-2014-6271", "sourceIdentifier": "security@debian.org", "published": "2014-09-24T18:48:04.477", - "lastModified": "2024-07-24T16:47:47.667", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-01-28", - "cisaActionDue": "2022-07-28", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability", + "lastModified": "2024-11-21T02:14:03.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-01-28", + "cisaActionDue": "2022-07-28", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -2615,6 +2614,22 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "security@debian.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", + "source": "security@debian.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", "source": "security@debian.org", @@ -2631,6 +2646,30 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "security@debian.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "security@debian.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "security@debian.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", "source": "security@debian.org", @@ -2663,6 +2702,22 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=142719845423222&w=2", + "source": "security@debian.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "security@debian.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", "source": "security@debian.org", @@ -3619,6 +3674,1392 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0388.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN55667175/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Vendor Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1293.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1294.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141216207813411&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141216668515282&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141235957116749&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141319209015420&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141330425327438&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383138121313&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383353622268&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383465822787&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141694386919794&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142546741516006&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142719845423222&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142719845423222&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142805027510172&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/58200", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59272", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59907", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60034", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60063", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60325", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60947", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61128", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61283", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61291", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61312", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61328", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61442", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61471", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61485", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61503", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61542", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61547", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61550", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61552", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61565", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61603", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61643", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61654", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61676", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61700", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61703", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61711", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61715", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61780", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61816", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61855", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62228", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62312", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62343", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT6495", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.novell.com/security/cve/CVE-2014-6271.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3032", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/252743", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://www.novell.com/support/kb/doc.php?id=7015701", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.novell.com/support/kb/doc.php?id=7015721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70103", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2362-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/ncas/alerts/TA14-268A", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/articles/1200223", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/node/1200223", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "https://kb.bluecoat.com/index?page=content&id=SA82", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.citrix.com/article/CTX200217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.citrix.com/article/CTX200223", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/34879/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37816/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/38849/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/39918/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/40619/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/40938/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/42938/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.suse.com/support/shellshock/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6273.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6273.json index 7bfeb9c0e15..3427e7ffec8 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6273.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6273.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6273", "sourceIdentifier": "security@debian.org", "published": "2014-09-30T14:55:11.517", - "lastModified": "2020-01-08T15:22:40.690", + "lastModified": "2024-11-21T02:14:04.503", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96151", "source": "security@debian.org" + }, + { + "url": "http://secunia.com/advisories/61605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61710", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3031", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70075", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2353-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96151", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6277.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6277.json index 6a2f7ecf1a4..7c83ce658cd 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6277.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6277.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6277", "sourceIdentifier": "security@debian.org", "published": "2014-09-27T22:55:02.660", - "lastModified": "2018-08-09T01:29:01.437", + "lastModified": "2024-11-21T02:14:04.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -315,6 +314,18 @@ "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", "source": "security@debian.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "security@debian.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "security@debian.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "security@debian.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", "source": "security@debian.org" @@ -323,6 +334,14 @@ "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", "source": "security@debian.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", + "source": "security@debian.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "security@debian.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", "source": "security@debian.org" @@ -335,6 +354,10 @@ "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", "source": "security@debian.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "security@debian.org" + }, { "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "source": "security@debian.org" @@ -646,6 +669,470 @@ { "url": "https://www.suse.com/support/shellshock/", "source": "security@debian.org" + }, + { + "url": "http://jvn.jp/en/jp/JVN55667175/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383353622268&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383465822787&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60024", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60325", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60433", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61065", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61291", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61328", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61641", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61703", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61780", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61857", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62343", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.novell.com/security/cve/CVE-2014-6277.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.novell.com/support/kb/doc.php?id=7015721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2380-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.bluecoat.com/index?page=content&id=SA82", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX200217", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX200223", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/support/shellshock/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6278.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6278.json index 21a3c0e280c..7f4ea736281 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6278.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6278.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6278", "sourceIdentifier": "security@debian.org", "published": "2014-09-30T10:55:04.723", - "lastModified": "2021-11-17T22:15:36.700", + "lastModified": "2024-11-21T02:14:05.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -306,6 +305,18 @@ "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", "source": "security@debian.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "security@debian.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "security@debian.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "security@debian.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", "source": "security@debian.org" @@ -314,6 +325,10 @@ "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", "source": "security@debian.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "security@debian.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", "source": "security@debian.org" @@ -322,6 +337,10 @@ "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", "source": "security@debian.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "security@debian.org" + }, { "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "source": "security@debian.org" @@ -649,6 +668,469 @@ { "url": "https://www.suse.com/support/shellshock/", "source": "security@debian.org" + }, + { + "url": "http://jvn.jp/en/jp/JVN55667175/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383353622268&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383465822787&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60024", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60325", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60433", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61065", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61291", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61328", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61641", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61703", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61780", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61857", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62343", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.novell.com/security/cve/CVE-2014-6278.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.novell.com/support/kb/doc.php?id=7015721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2380-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.bluecoat.com/index?page=content&id=SA82", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security-tracker.debian.org/tracker/CVE-2014-6278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX200217", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX200223", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/39568/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/39887/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/support/shellshock/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6280.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6280.json index 240976e3050..2cb681c0120 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6280.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6280.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6280", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T14:55:06.763", - "lastModified": "2018-10-09T19:51:20.630", + "lastModified": "2024-11-21T02:14:05.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://blog.osclass.org/2014/09/15/osclass-3-4-2-ready-download", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128286/OsClass-3.4.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533457/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/osclass/Osclass/commit/c163bf5910d0d36424d7fc678da6b03a0e443435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.netsparker.com/xss-vulnerabilities-in-osclass/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6283.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6283.json index 4dd444a0e61..229dc440716 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6283.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6283.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6283", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-17T23:55:03.933", - "lastModified": "2017-09-08T01:29:13.793", + "lastModified": "2024-11-21T02:14:05.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -120,6 +119,45 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://blog.spiderlabs.com/2014/09/cve-2014-6283-sap-ase-missing-authorization-checks-and-arbitrary-code-execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://scn.sap.com/docs/DOC-55451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99935", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/2044220", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Vendor Advisory" + ] + }, + { + "url": "https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-013.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6287.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6287.json index 837e47eb81d..cde4a05ce65 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6287.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6287.json @@ -2,13 +2,8 @@ "id": "CVE-2014-6287", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-07T10:55:04.493", - "lastModified": "2021-02-26T21:56:10.323", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-25", - "cisaActionDue": "2022-04-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Rejetto HTTP File Server (HFS) Remote Code Execution Vulnerability", + "lastModified": "2024-11-21T02:14:05.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-25", + "cisaActionDue": "2022-04-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Rejetto HTTP File Server (HFS) Remote Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -159,6 +158,66 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/135122/Rejetto-HTTP-File-Server-2.3.x-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/160264/Rejetto-HttpFileServer-2.3.x-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/161503/HFS-HTTP-File-Server-2.3.x-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/251276", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://github.com/rapid7/metasploit-framework/pull/3793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/39161/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6288.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6288.json index 350f220cdb2..1e02e99f131 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6288.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6288.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6288", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:08.820", - "lastModified": "2014-10-10T05:24:48.333", + "lastModified": "2024-11-21T02:14:05.970", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-006/, only version 2.0.0 - 2.0.10 are vulnerable.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -133,6 +131,18 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/extensions/repository/view/powermail", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-006/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-006/, only version 2.0.0 - 2.0.10 are vulnerable." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6289.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6289.json index aa5ac11a6d0..6ff4c4df006 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6289.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6289.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6289", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:08.867", - "lastModified": "2014-10-06T17:22:35.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:06.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/extensions/repository/view/pt_extbase", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/yag", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-005/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6290.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6290.json index c7419b77df3..3d333c761b4 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6290.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6290.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6290", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:08.913", - "lastModified": "2014-10-06T16:26:18.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:06.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -122,6 +121,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/extensions/repository/view/tt_news", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-003/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6291.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6291.json index 1f7911da935..f7ce5780376 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6291.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6291.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6291", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:08.960", - "lastModified": "2017-09-08T01:29:13.857", + "lastModified": "2024-11-21T02:14:06.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95799", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95799", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6292.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6292.json index 55e4c8d92f0..d1777e9b077 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6292.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6292.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6292", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:09.007", - "lastModified": "2022-02-03T19:31:36.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:06.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -127,6 +126,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/extensions/repository/view/femanager", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6293.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6293.json index 45aaa6d28b3..7af472a0b5b 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6293.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6293.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6293", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:09.053", - "lastModified": "2014-10-06T17:39:53.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:06.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/extensions/repository/view/ke_stats", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6294.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6294.json index 7ee57699128..5bb95857af9 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6294.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6294.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6294", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:09.100", - "lastModified": "2014-10-06T17:46:49.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:06.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6295.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6295.json index be59f1be195..3ee046fca5e 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6295.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6295.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6295", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:09.147", - "lastModified": "2014-10-06T17:46:45.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:07.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/extensions/repository/view/wec_map", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6296.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6296.json index 782319d20ad..a69eb88c357 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6296.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6296.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6296", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:09.197", - "lastModified": "2014-10-06T17:46:56.337", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:07.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/extensions/repository/view/wec_map", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6297.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6297.json index 6ee327fdd28..acae26b392c 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6297.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6297.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6297", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:09.240", - "lastModified": "2014-10-06T17:09:21.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:07.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -157,6 +156,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/extensions/repository/view/mm_forum", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6298.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6298.json index 9ff66b08be4..5c96618f6b1 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6298.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6298.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6298", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:09.273", - "lastModified": "2014-10-06T17:09:01.153", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:07.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -157,6 +156,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/extensions/repository/view/mm_forum", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-62xx/CVE-2014-6299.json b/CVE-2014/CVE-2014-62xx/CVE-2014-6299.json index c25e814b0a5..570ced711c8 100644 --- a/CVE-2014/CVE-2014-62xx/CVE-2014-6299.json +++ b/CVE-2014/CVE-2014-62xx/CVE-2014-6299.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6299", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T14:55:09.320", - "lastModified": "2014-10-06T18:02:49.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:07.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -157,6 +156,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/extensions/repository/view/mm_forum", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6300.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6300.json index d03d18f3bc6..bae9f9dc3f4 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6300.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6300.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6300", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-08T11:55:02.927", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-11-21T02:14:07.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -320,6 +319,30 @@ { "url": "https://security.gentoo.org/glsa/201505-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-10.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/33b39f9f1dd9a4d27856530e5ac004e23b30e8ac", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6301.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6301.json index 9c3dafc76a4..7b186c9698c 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6301.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6301.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6301", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T11:59:01.313", - "lastModified": "2015-02-19T18:52:49.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:08.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "http://twitter.com/d_gianni/statuses/562628862648270849/photo/1", "source": "cve@mitre.org" + }, + { + "url": "http://licensing.pnmsoft.com/documents/Security%20Bulletins/Security%20Bulletin%202014-1.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://twitter.com/d_gianni/statuses/562628862648270849/photo/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6302.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6302.json index 3cd95ea8c34..b34262b7d9e 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6302.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6302.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6302", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T11:59:02.987", - "lastModified": "2015-02-19T18:53:16.237", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", + "lastModified": "2024-11-21T02:14:08.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -84,6 +82,18 @@ { "url": "http://twitter.com/d_gianni/statuses/562628862648270849/photo/1", "source": "cve@mitre.org" + }, + { + "url": "http://licensing.pnmsoft.com/documents/Security%20Bulletins/Security%20Bulletin%202014-1.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://twitter.com/d_gianni/statuses/562628862648270849/photo/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6303.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6303.json index 35a7f51b0bc..3e88789adaa 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6303.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6303.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6303", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T11:59:03.937", - "lastModified": "2015-02-19T18:53:54.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:08.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "http://twitter.com/d_gianni/statuses/562628862648270849/photo/1", "source": "cve@mitre.org" + }, + { + "url": "http://licensing.pnmsoft.com/documents/Security%20Bulletins/Security%20Bulletin%202014-1.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://twitter.com/d_gianni/statuses/562628862648270849/photo/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6304.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6304.json index 84338ee1995..1cb01a357c8 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6304.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6304.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6304", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T11:59:04.750", - "lastModified": "2015-02-19T18:54:17.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:08.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "http://twitter.com/d_gianni/statuses/562628862648270849/photo/1", "source": "cve@mitre.org" + }, + { + "url": "http://licensing.pnmsoft.com/documents/Security%20Bulletins/Security%20Bulletin%202014-1.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://twitter.com/d_gianni/statuses/562628862648270849/photo/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6308.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6308.json index 712a89fd396..5b8dbdb4c47 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6308.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6308.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6308", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T14:55:06.827", - "lastModified": "2018-10-09T19:51:21.007", + "lastModified": "2024-11-21T02:14:08.667", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,32 @@ { "url": "https://www.netsparker.com/lfi-vulnerability-in-osclass/", "source": "cve@mitre.org" + }, + { + "url": "http://blog.osclass.org/2014/09/15/osclass-3-4-2-ready-download/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128285/OsClass-3.4.1-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533456/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/osclass/Osclass/commit/c163bf5910d0d36424d7fc678da6b03a0e443435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.netsparker.com/lfi-vulnerability-in-osclass/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6312.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6312.json index 12d51634c86..703c4aec172 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6312.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6312.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6312", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-15T14:55:08.683", - "lastModified": "2014-10-22T17:33:23.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:09.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -135,6 +134,39 @@ { "url": "https://wordpress.org/plugins/login-sidebar-widget/changelog", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/111700", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/111757", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/58", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34762", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.dxw.com/advisories/csrfxss-vulnerablity-in-login-widget-with-shortcode-allows-unauthenticated-attackers-to-do-anything-an-admin-can-do", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/login-sidebar-widget/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6313.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6313.json index b4883428a68..13a4ce4ae99 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6313.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6313.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6313", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-14T14:55:06.287", - "lastModified": "2014-10-22T14:58:22.163", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:09.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -166,6 +165,25 @@ { "url": "https://wordpress.org/plugins/woocommerce/changelog", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/59", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/61377", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.dxw.com/advisories/reflected-xss-in-woocommerce-excelling-ecommerce-allows-attackers-ability-to-do-almost-anything-an-admin-user-can-do", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/woocommerce/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6315.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6315.json index b159b27ce74..0e0d9646342 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6315.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6315.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6315", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T14:55:08.760", - "lastModified": "2018-10-09T19:51:21.457", + "lastModified": "2024-11-21T02:14:09.573", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,43 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128518/WordPress-Photo-Gallery-1.1.30-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/61649", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533595/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70204", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?new=986500", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23232", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6316.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6316.json index 2cb53a5f7fb..cc9f4cd06e7 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6316.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6316.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6316", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T11:59:03.610", - "lastModified": "2017-09-08T01:29:13.967", + "lastModified": "2024-11-21T02:14:09.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,47 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/931", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/03/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/e66ecc9f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17648", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6317.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6317.json index 79698a59133..532676c9eaa 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6317.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6317.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6317", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:04.903", - "lastModified": "2019-05-15T13:17:20.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:09.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -149,6 +148,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-november-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6318.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6318.json index 4222d4bcedc..64004f3b782 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6318.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6318.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6318", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:04.950", - "lastModified": "2019-05-14T14:11:33.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:10.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -151,6 +150,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-november-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70981", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-074", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6319.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6319.json index 76450a33818..8ee29d95187 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6319.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6319.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6319", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:00.067", - "lastModified": "2018-10-12T22:07:31.253", + "lastModified": "2024-11-21T02:14:10.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-075", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-075", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6321.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6321.json index 5024de11e0f..ab98be79262 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6321.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6321.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6321", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:04.997", - "lastModified": "2019-10-09T23:11:27.700", + "lastModified": "2024-11-21T02:14:10.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -144,6 +143,15 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=142384364031268&w=2", + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://secunia.com/advisories/59800", "source": "secure@microsoft.com", @@ -190,6 +198,79 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://blog.beyondtrust.com/triggering-ms14-066", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142384364031268&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142384364031268&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59800", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/505120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70954", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitysift.com/exploiting-ms14-066-cve-2014-6321-aka-winshock/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/ncas/alerts/TA14-318A", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-066", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6322.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6322.json index 4caae227b7c..8402430c1d5 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6322.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6322.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6322", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.060", - "lastModified": "2019-05-15T13:22:02.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:10.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -152,6 +151,37 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/59968", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70978", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-071", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6323.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6323.json index 7ccdaeb61e5..593507c6ad7 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6323.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6323.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6323", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.107", - "lastModified": "2018-10-12T22:07:32.723", + "lastModified": "2024-11-21T02:14:10.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6324.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6324.json index 06293155c0f..7ade8a1b248 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6324.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6324.json @@ -2,13 +2,8 @@ "id": "CVE-2014-6324", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-18T23:59:02.503", - "lastModified": "2024-07-16T17:48:24.083", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-25", - "cisaActionDue": "2022-04-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Kerberos Key Distribution Center (KDC) Privilege Escalation Vulnerability", + "lastModified": "2024-11-21T02:14:10.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-25", + "cisaActionDue": "2022-04-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Kerberos Key Distribution Center (KDC) Privilege Escalation Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -154,6 +153,14 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=142350249315918&w=2", + "source": "secure@microsoft.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://secunia.com/advisories/62556", "source": "secure@microsoft.com", @@ -194,6 +201,71 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/11/18/additional-information-about-cve-2014-6324.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Vendor Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142350249315918&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142350249315918&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70958", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031237", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.us-cert.gov/ncas/alerts/TA14-323A", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-068", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6325.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6325.json index 346adb6b098..c8047cc8c7d 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6325.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6325.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6325", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:01.457", - "lastModified": "2018-10-12T22:07:33.787", + "lastModified": "2024-11-21T02:14:10.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-075", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-075", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6326.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6326.json index 8eb7123733f..f219fad902b 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6326.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6326.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6326", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:02.487", - "lastModified": "2018-10-12T22:07:33.957", + "lastModified": "2024-11-21T02:14:10.883", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-075", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-075", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6327.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6327.json index efb74047a44..fc3c286e1a9 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6327.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6327.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6327", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:03.503", - "lastModified": "2018-10-12T22:07:34.097", + "lastModified": "2024-11-21T02:14:10.997", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6328.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6328.json index e7e8dbb4187..94f473b4543 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6328.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6328.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6328", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:04.567", - "lastModified": "2018-10-12T22:07:34.287", + "lastModified": "2024-11-21T02:14:11.103", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6329.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6329.json index 2ced8f763bb..e650865da33 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6329.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6329.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6329", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:05.567", - "lastModified": "2018-10-12T22:07:34.427", + "lastModified": "2024-11-21T02:14:11.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6330.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6330.json index a9f79180e81..956c1234d24 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6330.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6330.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6330", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:06.627", - "lastModified": "2018-10-12T22:07:34.583", + "lastModified": "2024-11-21T02:14:11.330", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6331.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6331.json index 36aeb830ba3..2756e384ed1 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6331.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6331.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6331", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.153", - "lastModified": "2018-10-12T22:07:34.770", + "lastModified": "2024-11-21T02:14:11.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -166,6 +165,25 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-077", "source": "secure@microsoft.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-november-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70938", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031195", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-077", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6332.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6332.json index 2c6f47fb6d5..cbeab45d99d 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6332.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6332.json @@ -2,13 +2,8 @@ "id": "CVE-2014-6332", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.200", - "lastModified": "2019-05-15T13:30:56.027", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-25", - "cisaActionDue": "2022-04-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Windows Object Linking & Embedding (OLE) Automation Array Remote Code Execution Vulnerability", + "lastModified": "2024-11-21T02:14:11.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -46,6 +41,10 @@ } ] }, + "cisaExploitAdd": "2022-03-25", + "cisaActionDue": "2022-04-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Windows Object Linking & Embedding (OLE) Automation Array Remote Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -267,6 +266,143 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/134053/Avant-Browser-Lite-Ultimate-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/134061/The-World-Browser-3.0-Final-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/134062/HTML-Compiler-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/134064/Microsoft-Compiled-HTML-Help-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/134079/Winamp-Bento-Browser-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://securityintelligence.com/ibm-x-force-researcher-finds-significant-vulnerability-in-microsoft-windows", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/158647", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70952", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031184", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.us-cert.gov/ncas/alerts/TA14-318B", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-064", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://forsec.nl/wp-content/uploads/2014/11/ms14_064_ie_olerce.rb_.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37668/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37800/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/38500/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/38512/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6333.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6333.json index 68040e00d64..56a5fdd8a0a 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6333.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6333.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6333", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.247", - "lastModified": "2018-10-12T22:07:36.957", + "lastModified": "2024-11-21T02:14:11.723", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-069", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/59867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031189", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-069", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6334.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6334.json index ce35338af99..cefba9b9bf3 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6334.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6334.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6334", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.297", - "lastModified": "2018-10-12T22:07:37.363", + "lastModified": "2024-11-21T02:14:11.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-069", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/59867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70962", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031189", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-069", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6335.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6335.json index 104347ae05a..d43e87b470d 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6335.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6335.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6335", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.343", - "lastModified": "2018-10-12T22:07:37.770", + "lastModified": "2024-11-21T02:14:11.970", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-069", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/59867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70963", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031189", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-069", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6336.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6336.json index 9801606ba47..a2026f3749e 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6336.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6336.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6336", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:07.597", - "lastModified": "2018-10-12T22:07:38.207", + "lastModified": "2024-11-21T02:14:12.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -80,6 +79,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-075", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-075", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6337.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6337.json index ca622bd1abc..c68fb8634bc 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6337.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6337.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6337", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.403", - "lastModified": "2018-10-12T22:07:38.410", + "lastModified": "2024-11-21T02:14:12.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70337", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6339.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6339.json index 2e4cf07d0b8..166539337a2 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6339.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6339.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6339", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.450", - "lastModified": "2018-10-12T22:07:38.803", + "lastModified": "2024-11-21T02:14:12.320", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6340.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6340.json index 4af708d71b9..b669f05d310 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6340.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6340.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6340", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.497", - "lastModified": "2018-10-12T22:07:39.177", + "lastModified": "2024-11-21T02:14:12.433", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70941", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6341.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6341.json index 157ecd84f94..f8d7b38d33d 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6341.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6341.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6341", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.560", - "lastModified": "2018-10-12T22:07:39.520", + "lastModified": "2024-11-21T02:14:12.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70338", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6342.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6342.json index a71bfcf5fc7..7e52c89c25a 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6342.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6342.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6342", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.607", - "lastModified": "2018-10-12T22:07:39.880", + "lastModified": "2024-11-21T02:14:12.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70341", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6343.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6343.json index b7cdad9b5c7..6aef9cf2d77 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6343.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6343.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6343", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.670", - "lastModified": "2018-10-12T22:07:40.160", + "lastModified": "2024-11-21T02:14:12.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70344", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6344.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6344.json index 6f6eedbf3b4..b6e4c37668b 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6344.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6344.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6344", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.717", - "lastModified": "2018-10-12T22:07:40.427", + "lastModified": "2024-11-21T02:14:12.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6345.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6345.json index 0d329afd3b8..13b80cda860 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6345.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6345.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6345", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.763", - "lastModified": "2018-10-12T22:07:40.740", + "lastModified": "2024-11-21T02:14:13.013", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6346.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6346.json index cec3c92446e..33c356ed1e2 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6346.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6346.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6346", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.810", - "lastModified": "2018-10-12T22:07:41.007", + "lastModified": "2024-11-21T02:14:13.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70946", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6347.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6347.json index e7bac101382..c02d13a810c 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6347.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6347.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6347", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.857", - "lastModified": "2018-10-12T22:07:41.303", + "lastModified": "2024-11-21T02:14:13.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70347", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6348.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6348.json index 5488a35814a..90ed5cd2dc1 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6348.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6348.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6348", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.920", - "lastModified": "2018-10-12T22:07:41.647", + "lastModified": "2024-11-21T02:14:13.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70348", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6349.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6349.json index f7a4b8fef7b..9baf1766631 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6349.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6349.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6349", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:05.967", - "lastModified": "2018-10-12T22:07:42.020", + "lastModified": "2024-11-21T02:14:13.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70939", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6350.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6350.json index ecaf8cbbec5..ebf2b111a93 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6350.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6350.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6350", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:06.013", - "lastModified": "2018-10-12T22:07:42.317", + "lastModified": "2024-11-21T02:14:13.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70940", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Vendor Advisory" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6351.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6351.json index e68110bc8fc..b5c03783f46 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6351.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6351.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6351", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:06.060", - "lastModified": "2018-10-12T22:07:42.693", + "lastModified": "2024-11-21T02:14:13.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -106,6 +105,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70323", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6352.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6352.json index 71a9c4fbaab..b770d8d8867 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6352.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6352.json @@ -2,13 +2,8 @@ "id": "CVE-2014-6352", "sourceIdentifier": "secure@microsoft.com", "published": "2014-10-22T14:55:06.247", - "lastModified": "2024-07-24T16:20:19.387", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-02-25", - "cisaActionDue": "2022-08-25", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Windows Code Injection Vulnerability", + "lastModified": "2024-11-21T02:14:13.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-02-25", + "cisaActionDue": "2022-08-25", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Windows Code Injection Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -207,6 +206,71 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-november-2014-security-updates.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61803", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://twitter.com/ohjeongwook/statuses/524795124270653440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70690", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-064", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97714", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/3010060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6353.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6353.json index 377b562e5d2..841fddf31d7 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6353.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6353.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6353", "sourceIdentifier": "secure@microsoft.com", "published": "2014-11-11T22:55:06.107", - "lastModified": "2018-10-12T22:07:43.943", + "lastModified": "2024-11-21T02:14:14.013", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -103,6 +102,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/70333", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6355.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6355.json index 22635fe8d44..233e7a1f001 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6355.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6355.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6355", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:08.457", - "lastModified": "2019-02-26T14:04:02.387", + "lastModified": "2024-11-21T02:14:14.243", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -125,6 +124,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-085", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-085", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6356.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6356.json index d9e00d645b5..370136a4936 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6356.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6356.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6356", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:09.300", - "lastModified": "2018-10-12T22:07:44.850", + "lastModified": "2024-11-21T02:14:14.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -85,6 +84,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-081", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-081", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6357.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6357.json index 8cbeeb8b4da..5015415ef59 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6357.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6357.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6357", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:10.207", - "lastModified": "2018-10-12T22:07:45.037", + "lastModified": "2024-11-21T02:14:14.467", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -146,6 +144,11 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-081", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-081", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6360.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6360.json index 4fff56e3837..7d40de784c2 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6360.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6360.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6360", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:11.237", - "lastModified": "2018-10-12T22:07:45.257", + "lastModified": "2024-11-21T02:14:14.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -90,6 +89,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-083", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-083", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6361.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6361.json index 37eb04392de..fc315b441f8 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6361.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6361.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6361", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:12.330", - "lastModified": "2018-10-12T22:07:45.413", + "lastModified": "2024-11-21T02:14:14.723", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -100,6 +99,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-083", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-083", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6362.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6362.json index 61e44343627..f6f2dabea8c 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6362.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6362.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6362", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T02:59:04.637", - "lastModified": "2018-10-12T22:07:45.600", + "lastModified": "2024-11-21T02:14:14.840", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +102,19 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-013", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72467", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-013", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6363.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6363.json index 690434791d6..b2a6c312074 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6363.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6363.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6363", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:13.440", - "lastModified": "2018-10-12T22:07:45.943", + "lastModified": "2024-11-21T02:14:14.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -138,6 +137,26 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-084", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/40721/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6364.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6364.json index feb96797fbb..ad83d0a32cf 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6364.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6364.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6364", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:14.533", - "lastModified": "2018-10-30T16:27:52.233", + "lastModified": "2024-11-21T02:14:15.090", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -111,6 +109,11 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-082", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-082", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6365.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6365.json index 74ea20e4575..463ad2f420d 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6365.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6365.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6365", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:15.347", - "lastModified": "2018-10-12T22:07:46.647", + "lastModified": "2024-11-21T02:14:15.207", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6366.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6366.json index b1b3f0dc30f..72c4cd0965e 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6366.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6366.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6366", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:16.207", - "lastModified": "2018-10-12T22:07:46.817", + "lastModified": "2024-11-21T02:14:15.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -80,6 +79,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6368.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6368.json index 3a8fc72f0a2..9aed8586423 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6368.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6368.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6368", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:17.067", - "lastModified": "2018-10-12T22:07:46.990", + "lastModified": "2024-11-21T02:14:15.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6369.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6369.json index b106409ab06..990a86ed6e1 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6369.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6369.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6369", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:18.003", - "lastModified": "2018-10-12T22:07:47.177", + "lastModified": "2024-11-21T02:14:15.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -89,6 +88,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/71452", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6373.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6373.json index da811d2da15..e43ddc29eba 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6373.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6373.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6373", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:18.783", - "lastModified": "2018-10-12T22:07:47.367", + "lastModified": "2024-11-21T02:14:15.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6374.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6374.json index d4ce688bfef..6fd502691f1 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6374.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6374.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6374", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:19.660", - "lastModified": "2018-10-12T22:07:47.553", + "lastModified": "2024-11-21T02:14:15.857", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -100,6 +99,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6375.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6375.json index c4d9c07c1f7..a4b78f8b9d3 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6375.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6375.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6375", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:20.707", - "lastModified": "2018-10-12T22:07:47.693", + "lastModified": "2024-11-21T02:14:15.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6376.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6376.json index 6f9f69e7eed..cfc8b7f305a 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6376.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6376.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6376", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:21.707", - "lastModified": "2018-10-12T22:07:47.880", + "lastModified": "2024-11-21T02:14:16.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6377.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6377.json index cd90f4e7028..f6dd4ce93af 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6377.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6377.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6377", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-14T14:55:06.337", - "lastModified": "2017-09-08T01:29:14.073", + "lastModified": "2024-11-21T02:14:16.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -111,6 +110,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/70368", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6378.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6378.json index 87b817756f8..5eb5565b8cb 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6378.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6378.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6378", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-14T14:55:06.383", - "lastModified": "2017-09-08T01:29:14.120", + "lastModified": "2024-11-21T02:14:16.377", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -195,6 +194,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/70363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031008", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96906", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10652", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6379.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6379.json index a198065d3b2..d5962e9d09e 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6379.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6379.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6379", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-14T14:55:06.413", - "lastModified": "2017-09-08T01:29:14.217", + "lastModified": "2024-11-21T02:14:16.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -190,6 +189,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/70365", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031010", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96905", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10654", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6380.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6380.json index 392754dd839..273b91c605b 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6380.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6380.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6380", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-14T14:55:06.460", - "lastModified": "2017-09-08T01:29:14.260", + "lastModified": "2024-11-21T02:14:16.733", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -176,6 +175,26 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/70369", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96904", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10655", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6381.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6381.json index 6383ee79975..aa3516f2b59 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6381.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6381.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6381", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T15:59:03.057", - "lastModified": "2014-12-16T13:54:08.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:16.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -186,6 +185,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/71612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031360", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6382.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6382.json index 7f33c2669ce..0040d7cacbe 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6382.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6382.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6382", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T16:59:02.967", - "lastModified": "2015-02-04T05:03:08.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:17.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -179,6 +178,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6383.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6383.json index 0ede1d6f309..e3b16a44f9a 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6383.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6383.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6383", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T16:59:04.467", - "lastModified": "2015-01-26T19:35:16.607", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:17.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72071", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031549", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10666", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6384.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6384.json index 97f8efddae2..749e10abf28 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6384.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6384.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6384", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T16:59:05.343", - "lastModified": "2015-01-26T19:35:42.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:17.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -296,6 +295,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031547", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10667", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6385.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6385.json index 4739ef5b7ea..3e9a4422252 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6385.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6385.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6385", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T16:59:06.077", - "lastModified": "2015-01-26T19:37:47.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:17.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -402,6 +401,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72072", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10668", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6386.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6386.json index f49c8f9256e..f7471843675 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6386.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6386.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6386", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T16:59:07.000", - "lastModified": "2015-01-26T19:38:14.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:17.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -271,6 +270,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10670", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6387.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6387.json index 5ed97a9cffb..496fa9493a9 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6387.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6387.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6387", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-22T14:55:06.637", - "lastModified": "2021-01-12T18:05:59.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:17.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -202,6 +201,26 @@ { "url": "http://www.openwall.com/lists/oss-security/2014/09/13/1", "source": "cve@mitre.org" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=17640", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/12/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/12/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/13/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6389.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6389.json index 6ef5906d015..2c1b7022300 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6389.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6389.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6389", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-06T23:55:08.950", - "lastModified": "2017-09-08T01:29:14.323", + "lastModified": "2024-11-21T02:14:17.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96791", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128526/PHPCompta-NOALYSS-6.7.1-5638-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34861", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96791", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6392.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6392.json index f0b2eb533cd..96c90e1997d 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6392.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6392.json @@ -2,7 +2,7 @@ "id": "CVE-2014-6392", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-15T14:55:12.587", - "lastModified": "2024-08-06T13:15:27.023", + "lastModified": "2024-11-21T02:14:18.120", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +87,10 @@ { "url": "http://seclists.org/fulldisclosure/2014/Sep/13", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6394.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6394.json index 8ce91fca0f1..cce69bd9e98 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6394.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6394.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6394", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T17:55:05.123", - "lastModified": "2017-09-08T01:29:14.403", + "lastModified": "2024-11-21T02:14:18.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -190,6 +189,69 @@ { "url": "https://support.apple.com/HT205217", "source": "cve@mitre.org" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687263", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/24/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/30/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70100", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/visionmedia/send/pull/59", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://nodesecurity.io/advisories/send-directory-traversal", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205217", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6395.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6395.json index c8168ad2780..a68eedf7e43 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6395.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6395.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6395", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:06.033", - "lastModified": "2020-02-26T13:35:52.343", + "lastModified": "2024-11-21T02:14:18.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,26 @@ { "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/commit/e3abe7d7585ecc420a7cab73313216613aadad5a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-63xx/CVE-2014-6396.json b/CVE-2014/CVE-2014-63xx/CVE-2014-6396.json index 6f3c0235819..1fc5625e9f7 100644 --- a/CVE-2014/CVE-2014-63xx/CVE-2014-6396.json +++ b/CVE-2014/CVE-2014-63xx/CVE-2014-6396.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6396", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:07.347", - "lastModified": "2020-02-26T13:35:52.343", + "lastModified": "2024-11-21T02:14:18.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,26 @@ { "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71697", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/commit/e3abe7d7585ecc420a7cab73313216613aadad5a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6407.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6407.json index 4b703ecd7c8..07607578259 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6407.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6407.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6407", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T15:59:04.337", - "lastModified": "2014-12-15T19:36:08.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:18.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -109,6 +108,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/24/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.docker.com/v1.3/release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6408.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6408.json index f125bb0bc3f..e19851e9f4c 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6408.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6408.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6408", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T15:59:06.150", - "lastModified": "2014-12-15T19:36:46.870", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:19.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/24/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.docker.com/v1.3/release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6409.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6409.json index 7099b7915b1..bddd8e09505 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6409.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6409.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6409", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-06T23:55:08.997", - "lastModified": "2017-09-08T01:29:14.467", + "lastModified": "2024-11-21T02:14:19.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96122", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128321/M-Monit-3.2.2-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/71", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34718", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96122", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6410.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6410.json index 44c1f210920..77d3a84e8cb 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6410.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6410.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6410", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-28T10:55:10.423", - "lastModified": "2023-11-07T02:21:00.947", + "lastModified": "2024-11-21T02:14:19.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -154,6 +153,73 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c03aa9f6e1f938618e6db2e23afef0574efeeb65", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722450701342&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722544401658&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1318.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/15/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2374-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2375-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2376-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2377-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2378-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2379-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141809", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/c03aa9f6e1f938618e6db2e23afef0574efeeb65", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6414.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6414.json index 2d06cfb9103..13689bbce77 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6414.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6414.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6414", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-02T14:55:04.887", - "lastModified": "2018-10-19T18:54:23.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:19.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -153,6 +152,57 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1686.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1785.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1786.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62299", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/15/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2408-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/neutron/+bug/1357379", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6416.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6416.json index d9a148e9198..729570393fd 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6416.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6416.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6416", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-28T10:55:10.580", - "lastModified": "2023-11-07T02:21:01.040", + "lastModified": "2024-11-21T02:14:20.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -206,6 +205,85 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tracker.ceph.com/issues/8979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/15/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69805", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2376-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2377-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2378-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2379-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6417.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6417.json index eb3bd84c462..3ef8baf2fc2 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6417.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6417.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6417", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-28T10:55:10.627", - "lastModified": "2023-11-07T02:21:01.200", + "lastModified": "2024-11-21T02:14:20.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -177,6 +176,83 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tracker.ceph.com/issues/8979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tracker.ceph.com/issues/9560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/15/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2376-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2377-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2378-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2379-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142072", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6418.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6418.json index fb25ddf00da..d81e76051f9 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6418.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6418.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6418", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-28T10:55:10.673", - "lastModified": "2023-11-07T02:21:01.263", + "lastModified": "2024-11-21T02:14:20.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -205,6 +204,84 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tracker.ceph.com/issues/8979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://tracker.ceph.com/issues/9561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/15/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2376-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2377-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2378-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2379-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6421.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6421.json index 47eac2398bd..211469fd40e 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6421.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6421.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6421", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.137", - "lastModified": "2023-11-07T02:21:01.367", + "lastModified": "2024-11-21T02:14:20.647", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -165,6 +163,55 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-12.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6422.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6422.json index a060f37c454..14aa5f7134b 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6422.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6422.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6422", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.183", - "lastModified": "2023-11-07T02:21:01.447", + "lastModified": "2024-11-21T02:14:20.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -172,6 +171,62 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-12.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=04c05a21e34cec326f1aff2f5f8a6e74e1ced984", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6423.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6423.json index a04c04a386a..6083dac0095 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6423.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6423.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6423", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.230", - "lastModified": "2023-11-07T02:21:01.540", + "lastModified": "2024-11-21T02:14:20.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -177,6 +176,62 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9112a099d7cc2cd924b7c667bf27f6e112b970c6", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10333", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9112a099d7cc2cd924b7c667bf27f6e112b970c6", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6424.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6424.json index 4bbbba7cc77..54bf586d3e1 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6424.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6424.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6424", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.277", - "lastModified": "2023-11-07T02:21:01.690", + "lastModified": "2024-11-21T02:14:21.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -165,6 +164,50 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=44698259b1f5865c60323acaf2a633654a2abe81", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10370", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=44698259b1f5865c60323acaf2a633654a2abe81", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6425.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6425.json index fe621a03beb..b1b343031f9 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6425.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6425.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6425", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.323", - "lastModified": "2023-11-07T02:21:01.770", + "lastModified": "2024-11-21T02:14:21.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -111,6 +110,46 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c10396dbbf782a576bc1f9a931cf86090cec3878", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-15.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10353", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c10396dbbf782a576bc1f9a931cf86090cec3878", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6426.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6426.json index a139ab467c0..9d4a5151a15 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6426.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6426.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6426", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.370", - "lastModified": "2023-11-07T02:21:01.837", + "lastModified": "2024-11-21T02:14:21.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,30 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d9e5021fe79973d00ddd8fcef0bbefbaae63dd0f", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d9e5021fe79973d00ddd8fcef0bbefbaae63dd0f", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6427.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6427.json index ffe6f1d934d..f3f847b2722 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6427.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6427.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6427", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.433", - "lastModified": "2023-11-07T02:21:01.910", + "lastModified": "2024-11-21T02:14:21.537", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -165,6 +164,50 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=73959159dbf34b4a0b50fbd19e05cb1b470be9b0", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-17.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10381", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=73959159dbf34b4a0b50fbd19e05cb1b470be9b0", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6428.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6428.json index d62be7207f4..248205ba592 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6428.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6428.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6428", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.480", - "lastModified": "2023-11-07T02:21:01.987", + "lastModified": "2024-11-21T02:14:21.677", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -177,6 +176,62 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=433a444d148f86f2562f804d25a57d00dc277cc0", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=433a444d148f86f2562f804d25a57d00dc277cc0", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6429.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6429.json index a2b84a6cbd8..0547fcf74b0 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6429.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6429.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6429", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.527", - "lastModified": "2023-11-07T02:21:02.063", + "lastModified": "2024-11-21T02:14:21.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -177,6 +176,62 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6430.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6430.json index a34d4364cc6..65fa1f801e1 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6430.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6430.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6430", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.573", - "lastModified": "2023-11-07T02:21:02.137", + "lastModified": "2024-11-21T02:14:21.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -177,6 +176,62 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6431.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6431.json index 6573177f920..b64c6794935 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6431.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6431.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6431", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.620", - "lastModified": "2023-11-07T02:21:02.210", + "lastModified": "2024-11-21T02:14:22.137", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -177,6 +176,62 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6432.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6432.json index e63c2a7d99a..11670fb667f 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6432.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6432.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6432", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-20T10:55:06.667", - "lastModified": "2023-11-07T02:21:02.280", + "lastModified": "2024-11-21T02:14:22.297", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -177,6 +176,62 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2", "source": "cve@mitre.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47c592938ba9f0caeacc4c2ccadb370e72f293a2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6433.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6433.json index 6a74d72f374..1691be0f511 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6433.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6433.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6433", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-07T14:55:06.860", - "lastModified": "2014-10-08T15:00:14.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:22.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-347/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-347/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6434.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6434.json index 9617e62f311..5122ac9c509 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6434.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6434.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6434", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-07T14:55:06.907", - "lastModified": "2014-10-08T15:02:21.993", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:22.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-348/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-348/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6439.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6439.json index 1a99a26cfcf..0d5f0dbd305 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6439.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6439.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6439", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T01:55:11.430", - "lastModified": "2018-10-09T19:51:23.537", + "lastModified": "2024-11-21T02:14:23.343", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128556/Elasticsearch-1.3.x-CORS-Issue.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.elasticsearch.org/blog/elasticsearch-1-4-0-beta-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533602/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.elastic.co/community/security/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6445.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6445.json index 8873843338d..cafa88a8edf 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6445.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6445.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6445", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-26T21:55:07.050", - "lastModified": "2014-09-30T15:06:45.900", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:23.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -129,6 +128,14 @@ { "url": "https://wordpress.org/plugins/contact-form-7-integrations/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://research.g0blin.co.uk/cve-2014-6445/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/contact-form-7-integrations/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6446.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6446.json index b4e393bc3bc..cff6a242469 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6446.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6446.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6446", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-26T21:55:07.097", - "lastModified": "2015-10-01T17:08:44.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:23.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -188,6 +187,38 @@ "tags": [ "Patch" ] + }, + { + "url": "http://osvdb.org/show/osvdb/112171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131002/Wordpress-InfusionSoft-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://research.g0blin.co.uk/cve-2014-6446/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34925", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/infusionsoft/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6452.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6452.json index aa4ade1bcc8..8fc48aef688 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6452.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6452.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6452", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.557", - "lastModified": "2014-10-24T07:28:12.653", + "lastModified": "2024-11-21T02:14:24.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70528", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70528", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6453.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6453.json index ec47fffccc7..04677ee6209 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6453.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6453.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6453", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.603", - "lastModified": "2015-11-17T15:38:16.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:25.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6454.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6454.json index 2623c9d63f4..b3ffddd142d 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6454.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6454.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6454", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.650", - "lastModified": "2015-11-13T16:55:15.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:25.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70529", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70529", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6455.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6455.json index ec491e6229c..a90d9aa6f64 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6455.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6455.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6455", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.697", - "lastModified": "2015-11-13T16:55:30.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:25.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70473", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70473", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6456.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6456.json index e141e8be66c..da3dd1e0082 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6456.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6456.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6456", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.760", - "lastModified": "2020-09-08T13:00:34.710", + "lastModified": "2024-11-21T02:14:25.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -103,6 +102,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", "source": "secalert_us@oracle.com" @@ -146,6 +149,70 @@ { "url": "http://www.securityfocus.com/bid/70522", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70522", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6457.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6457.json index 7b7abfa4498..5a7deb4ba0f 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6457.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6457.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6457", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.790", - "lastModified": "2022-05-13T14:57:17.313", + "lastModified": "2024-11-21T02:14:25.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -181,6 +180,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", "source": "secalert_us@oracle.com" @@ -328,6 +331,202 @@ { "url": "http://www.ubuntu.com/usn/USN-2388-2", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61631", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692299", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70538", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6458.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6458.json index 19058eedb2e..a5089b96ff7 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6458.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6458.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6458", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.853", - "lastModified": "2022-05-13T14:35:15.657", + "lastModified": "2024-11-21T02:14:25.653", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -111,6 +110,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", "source": "secalert_us@oracle.com" @@ -174,6 +177,98 @@ { "url": "http://www.securityfocus.com/bid/70460", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70460", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6459.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6459.json index c3f53692142..f7b4af2688f 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6459.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6459.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6459", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.900", - "lastModified": "2014-11-19T03:02:32.727", + "lastModified": "2024-11-21T02:14:25.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,22 @@ { "url": "http://www.securitytracker.com/id/1031034", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70491", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031034", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6460.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6460.json index 4cb816fb8f2..da05a3b564c 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6460.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6460.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6460", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.947", - "lastModified": "2015-11-06T15:15:52.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:25.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -101,6 +100,26 @@ { "url": "http://www.securitytracker.com/id/1031044", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61701", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70555", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031044", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6461.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6461.json index ac8abfc45d5..1b9dae78a9b 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6461.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6461.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6461", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:07.993", - "lastModified": "2015-11-06T15:15:13.993", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:26.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031043", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61724", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70534", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6462.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6462.json index 96962a5e7dd..26a4a95050b 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6462.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6462.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6462", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.027", - "lastModified": "2015-11-06T15:14:43.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:26.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "http://www.securityfocus.com/bid/70477", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61767", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70477", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6463.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6463.json index 0b781efda0b..165d028da96 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6463.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6463.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6463", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.087", - "lastModified": "2022-09-20T20:29:16.103", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:26.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:M/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.4, @@ -180,6 +179,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70532", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6464.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6464.json index fb4ae53afaa..c15a5848863 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6464.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6464.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6464", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.137", - "lastModified": "2022-08-26T16:15:04.173", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:26.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -195,6 +194,67 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201411-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6465.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6465.json index 2a9e0f555bd..45fb71bf9a9 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6465.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6465.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6465", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.183", - "lastModified": "2015-11-06T15:10:35.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:26.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C", + "baseScore": 6.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -83,6 +82,18 @@ { "url": "http://www.securityfocus.com/bid/70573", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70573", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6466.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6466.json index d5ba3279f62..60c5f3faf79 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6466.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6466.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6466", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.230", - "lastModified": "2022-05-13T14:35:35.207", + "lastModified": "2024-11-21T02:14:26.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -116,6 +115,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://secunia.com/advisories/61609", "source": "secalert_us@oracle.com" @@ -139,6 +142,58 @@ { "url": "http://www.securityfocus.com/bid/70484", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70484", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6467.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6467.json index ea678e0e786..b59e21389c0 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6467.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6467.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6467", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.290", - "lastModified": "2015-11-06T15:15:31.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:26.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70514", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70514", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6468.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6468.json index 80ad51306c3..da05e600a61 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6468.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6468.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6468", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.337", - "lastModified": "2020-09-08T12:29:40.483", + "lastModified": "2024-11-21T02:14:26.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -116,6 +115,46 @@ { "url": "http://www.securityfocus.com/bid/70488", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692299", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70488", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6469.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6469.json index 1b347671323..2758681478c 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6469.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6469.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6469", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.387", - "lastModified": "2022-06-30T19:52:03.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:27.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -208,6 +207,65 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201411-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70446", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6470.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6470.json index 4db8aa3cbd9..9c30465c878 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6470.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6470.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6470", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.433", - "lastModified": "2015-11-06T15:57:23.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:27.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 6.8, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70551", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6471.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6471.json index 7911294a4e7..f28ac023272 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6471.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6471.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6471", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.480", - "lastModified": "2015-11-04T18:14:28.403", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:27.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,26 @@ { "url": "http://www.securitytracker.com/id/1031042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70447", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6472.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6472.json index 79b610de398..94bafb346e5 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6472.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6472.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6472", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.540", - "lastModified": "2015-11-04T18:14:56.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:27.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -120,6 +119,30 @@ { "url": "http://www.securitytracker.com/id/1031042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70457", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6473.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6473.json index 8ad56154794..c9270bebf02 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6473.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6473.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6473", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.587", - "lastModified": "2015-11-06T15:57:36.413", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:27.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -96,6 +95,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6474.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6474.json index bbe049ed778..9d1dbd3fca8 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6474.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6474.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6474", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.637", - "lastModified": "2022-09-16T19:56:16.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:27.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -136,6 +135,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6475.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6475.json index 3162d225ed2..e8defb380b2 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6475.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6475.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6475", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.683", - "lastModified": "2015-11-06T15:09:10.333", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:27.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -101,6 +100,26 @@ { "url": "http://www.securitytracker.com/id/1031044", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61701", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70566", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031044", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6476.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6476.json index aa131627b81..82a28c9b258 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6476.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6476.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6476", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.730", - "lastModified": "2020-09-08T13:00:34.710", + "lastModified": "2024-11-21T02:14:27.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", "source": "secalert_us@oracle.com" @@ -146,6 +149,70 @@ { "url": "http://www.securityfocus.com/bid/70531", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70531", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6477.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6477.json index 491faf5bb92..c2f2af540cb 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6477.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6477.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6477", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-11-23T19:59:00.097", - "lastModified": "2017-09-08T01:29:14.527", + "lastModified": "2024-11-21T02:14:28.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99937", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99937", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6478.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6478.json index 002655acab2..1de840a6bc0 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6478.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6478.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6478", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.790", - "lastModified": "2022-08-29T20:50:12.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:28.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -203,6 +202,44 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6479.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6479.json index 81da9955b5a..1fabc7818f0 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6479.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6479.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6479", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.823", - "lastModified": "2015-11-04T18:15:09.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:28.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -105,6 +104,30 @@ { "url": "http://www.securitytracker.com/id/1031042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6480.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6480.json index e33af71a00e..bcd8b8d5cc2 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6480.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6480.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6480", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:03.477", - "lastModified": "2016-12-07T03:00:57.750", + "lastModified": "2024-11-21T02:14:28.433", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:M/C:C/I:C/A:C", + "baseScore": 6.5, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "MULTIPLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 2.5, @@ -88,6 +87,18 @@ { "url": "http://www.securitytracker.com/id/1031583", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6481.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6481.json index 7509e916c96..2f2dcf65e32 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6481.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6481.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6481", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:04.460", - "lastModified": "2016-12-07T03:00:58.767", + "lastModified": "2024-11-21T02:14:28.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "http://www.securitytracker.com/id/1031583", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6482.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6482.json index 849ecc187ae..44a8d7d7e9d 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6482.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6482.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6482", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.870", - "lastModified": "2015-11-06T15:08:04.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:28.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -96,6 +95,26 @@ { "url": "http://www.securitytracker.com/id/1031044", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61701", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70558", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031044", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6483.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6483.json index 694bdc41f14..6fcf7115be0 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6483.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6483.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6483", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.917", - "lastModified": "2015-11-06T15:07:37.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:28.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -84,6 +83,18 @@ { "url": "http://www.securityfocus.com/bid/70480", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70480", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6484.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6484.json index 5f59d1867d5..292a7a9f051 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6484.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6484.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6484", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:08.963", - "lastModified": "2022-08-26T16:04:30.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:28.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -165,6 +164,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70455", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6485.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6485.json index 5826b528e43..e3f119bf851 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6485.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6485.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6485", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T15:55:09.027", - "lastModified": "2020-09-08T12:29:40.483", + "lastModified": "2024-11-21T02:14:29.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -95,6 +94,30 @@ { "url": "http://www.securityfocus.com/bid/70519", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61632", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70519", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6486.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6486.json index ca77081f40d..bf46b81166e 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6486.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6486.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6486", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:05.623", - "lastModified": "2015-11-06T15:10:03.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:29.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031044", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61717", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70568", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031044", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6487.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6487.json index 860035139bf..d3c183458f6 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6487.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6487.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6487", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:05.670", - "lastModified": "2015-11-09T19:05:23.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:29.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -98,6 +97,18 @@ { "url": "http://www.securityfocus.com/bid/70458", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70458", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6488.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6488.json index 9a6f19b29a4..aeabf4b06f6 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6488.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6488.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6488", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:05.717", - "lastModified": "2015-11-06T15:10:56.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:29.383", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -146,6 +145,26 @@ { "url": "http://www.securitytracker.com/id/1031041", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031041", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6489.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6489.json index dd01ac2cc0c..8e00660cb62 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6489.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6489.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6489", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:05.763", - "lastModified": "2022-07-13T14:13:50.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:29.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -114,6 +113,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70525", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6490.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6490.json index 3b8886b804b..3488d1cf594 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6490.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6490.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6490", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:05.797", - "lastModified": "2015-11-06T15:57:49.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:29.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6491.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6491.json index eb803063bd9..d8d72e54697 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6491.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6491.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6491", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:05.840", - "lastModified": "2022-07-01T14:17:14.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:29.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -203,6 +202,74 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201411-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70444", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6492.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6492.json index a46b186ad62..62b6d2553f1 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6492.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6492.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6492", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:05.887", - "lastModified": "2022-05-13T14:35:35.163", + "lastModified": "2024-11-21T02:14:29.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -128,6 +127,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", "source": "secalert_us@oracle.com" @@ -187,6 +190,94 @@ { "url": "http://www.securityfocus.com/bid/70456", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70456", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6493.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6493.json index bfac8c8cb4c..152f2fddc56 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6493.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6493.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6493", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:05.937", - "lastModified": "2022-05-13T14:35:35.183", + "lastModified": "2024-11-21T02:14:30.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -111,6 +110,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", "source": "secalert_us@oracle.com" @@ -170,6 +173,94 @@ { "url": "http://www.securityfocus.com/bid/70468", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70468", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6494.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6494.json index 1fb09d81d13..9127d435ff0 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6494.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6494.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6494", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:05.983", - "lastModified": "2022-08-29T20:50:06.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:30.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -221,6 +220,72 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201411-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6495.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6495.json index 6a9c63a6585..6c850ca9bb6 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6495.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6495.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6495", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.030", - "lastModified": "2022-08-29T20:49:55.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:30.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -203,6 +202,44 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70496", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6496.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6496.json index caad54a56b6..50cd2ce733b 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6496.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6496.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6496", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.077", - "lastModified": "2022-08-29T20:50:20.680", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:30.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -224,6 +223,65 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201411-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70469", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6497.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6497.json index 8abf9690d86..89bec196a2b 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6497.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6497.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6497", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.107", - "lastModified": "2015-11-06T15:58:08.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:30.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70557", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6498.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6498.json index 4ae0d9b0556..72856bb21de 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6498.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6498.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6498", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.153", - "lastModified": "2015-11-06T15:17:28.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:30.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -126,6 +125,26 @@ { "url": "http://www.securitytracker.com/id/1031043", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70542", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-64xx/CVE-2014-6499.json b/CVE-2014/CVE-2014-64xx/CVE-2014-6499.json index f3a476d03cd..cae23578684 100644 --- a/CVE-2014/CVE-2014-64xx/CVE-2014-6499.json +++ b/CVE-2014/CVE-2014-64xx/CVE-2014-6499.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6499", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.200", - "lastModified": "2015-11-06T15:16:54.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:30.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70463", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70463", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6500.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6500.json index a8eace06249..87bd43b4ea9 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6500.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6500.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6500", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.247", - "lastModified": "2022-07-01T14:15:54.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:30.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -203,6 +202,74 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201411-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6501.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6501.json index 16821536a64..5698eea4b01 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6501.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6501.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6501", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.297", - "lastModified": "2015-11-06T15:58:16.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:31.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70509", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6502.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6502.json index 9fc867661b5..c1a26c9158d 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6502.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6502.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6502", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.343", - "lastModified": "2022-05-13T14:57:17.323", + "lastModified": "2024-11-21T02:14:31.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -151,6 +150,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", "source": "secalert_us@oracle.com" @@ -286,6 +289,190 @@ { "url": "http://www.ubuntu.com/usn/USN-2388-2", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6503.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6503.json index f362a84fc15..15e098de03a 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6503.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6503.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6503", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.390", - "lastModified": "2022-05-13T14:35:15.740", + "lastModified": "2024-11-21T02:14:31.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -111,6 +110,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", "source": "secalert_us@oracle.com" @@ -170,6 +173,94 @@ { "url": "http://www.securityfocus.com/bid/70518", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70518", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6504.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6504.json index b7987272727..8a3df569267 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6504.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6504.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6504", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.437", - "lastModified": "2022-05-13T14:57:17.330", + "lastModified": "2024-11-21T02:14:31.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -122,6 +121,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", "source": "secalert_us@oracle.com" @@ -229,6 +232,138 @@ { "url": "http://www.ubuntu.com/usn/USN-2388-2", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70564", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6505.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6505.json index 9c85343f26f..85da6f8d841 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6505.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6505.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6505", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.483", - "lastModified": "2022-08-26T16:11:35.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:31.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -165,6 +164,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70516", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6506.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6506.json index 08c84e6585f..f398f516f2c 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6506.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6506.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6506", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.513", - "lastModified": "2022-05-13T14:57:17.337", + "lastModified": "2024-11-21T02:14:31.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -151,6 +150,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", "source": "secalert_us@oracle.com" @@ -286,6 +289,190 @@ { "url": "http://www.ubuntu.com/usn/USN-2388-2", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70556", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6507.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6507.json index 024707cb67d..1bb65bcca44 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6507.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6507.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6507", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.560", - "lastModified": "2022-08-29T20:50:16.093", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:31.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -208,6 +207,65 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201411-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70550", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6508.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6508.json index d524704f3cb..e120c29aebe 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6508.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6508.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6508", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.607", - "lastModified": "2014-11-19T03:02:49.290", + "lastModified": "2024-11-21T02:14:32.087", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70549", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6509.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6509.json index aaeec02f732..1bddd3f03a8 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6509.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6509.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6509", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:05.443", - "lastModified": "2016-12-07T03:00:59.813", + "lastModified": "2024-11-21T02:14:32.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -83,6 +82,18 @@ { "url": "http://www.securitytracker.com/id/1031583", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6510.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6510.json index 2721ce98f88..67c368c1074 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6510.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6510.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6510", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:06.443", - "lastModified": "2016-12-07T03:01:00.937", + "lastModified": "2024-11-21T02:14:32.320", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -83,6 +82,18 @@ { "url": "http://www.securitytracker.com/id/1031583", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6511.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6511.json index 0d3de10b548..8bf0a891bc4 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6511.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6511.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6511", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.657", - "lastModified": "2022-05-13T14:35:35.230", + "lastModified": "2024-11-21T02:14:32.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -141,6 +140,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", "source": "secalert_us@oracle.com" @@ -276,6 +279,190 @@ { "url": "http://www.ubuntu.com/usn/USN-2388-2", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6512.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6512.json index 760ae8bb087..4fe5662cba0 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6512.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6512.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6512", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.700", - "lastModified": "2022-05-13T14:57:20.743", + "lastModified": "2024-11-21T02:14:32.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -176,6 +175,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", "source": "secalert_us@oracle.com" @@ -319,6 +322,198 @@ { "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10092", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61631", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70567", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10092", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6513.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6513.json index 565a846b405..3450682c23f 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6513.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6513.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6513", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.747", - "lastModified": "2022-05-13T14:57:20.750", + "lastModified": "2024-11-21T02:14:32.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -125,6 +124,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://secunia.com/advisories/61609", "source": "secalert_us@oracle.com" @@ -164,6 +167,78 @@ { "url": "http://www.ubuntu.com/usn/USN-2388-2", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70569", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6514.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6514.json index cb5cf96d7b2..e9f3b25dba7 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6514.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6514.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6514", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:07.367", - "lastModified": "2016-11-28T19:12:48.747", + "lastModified": "2024-11-21T02:14:32.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -102,6 +101,22 @@ { "url": "http://www.securitytracker.com/id/1031572", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72166", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031572", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6515.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6515.json index 8d6f19b74e2..1b4d772b1f3 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6515.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6515.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6515", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.797", - "lastModified": "2022-05-13T14:35:35.300", + "lastModified": "2024-11-21T02:14:33.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -111,6 +110,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", "source": "secalert_us@oracle.com" @@ -170,6 +173,94 @@ { "url": "http://www.securityfocus.com/bid/70565", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70565", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6516.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6516.json index 76018e98898..369898508cf 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6516.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6516.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6516", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.857", - "lastModified": "2015-11-06T15:17:11.833", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:33.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031047", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61698", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70571", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031047", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6517.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6517.json index 40cdf77cc65..95699fd259c 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6517.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6517.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6517", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.907", - "lastModified": "2022-05-13T14:57:20.757", + "lastModified": "2024-11-21T02:14:33.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -137,6 +136,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", "source": "secalert_us@oracle.com" @@ -252,6 +255,146 @@ { "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10092", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61631", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10092", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6518.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6518.json index dd7072dd619..fd56aa60be3 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6518.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6518.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6518", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:08.320", - "lastModified": "2016-12-07T03:01:02.017", + "lastModified": "2024-11-21T02:14:33.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", + "baseScore": 6.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -88,6 +87,18 @@ { "url": "http://www.securitytracker.com/id/1031583", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6519.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6519.json index 2cd2adf91c9..20ef9b4faaf 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6519.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6519.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6519", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.937", - "lastModified": "2022-05-13T14:57:20.890", + "lastModified": "2024-11-21T02:14:33.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -107,6 +106,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", "source": "secalert_us@oracle.com" @@ -206,6 +209,130 @@ { "url": "http://www.ubuntu.com/usn/USN-2388-2", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70570", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6520.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6520.json index 987c73af42b..d44920eb4e6 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6520.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6520.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6520", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:06.983", - "lastModified": "2022-08-26T15:59:15.103", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:33.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -158,6 +157,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70510", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6521.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6521.json index 51b545fdb2b..5e4ea8e604c 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6521.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6521.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6521", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:09.240", - "lastModified": "2016-12-07T11:22:00.577", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:34.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -87,6 +86,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6522.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6522.json index f76e9a2cd58..7e96decb451 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6522.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6522.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6522", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.030", - "lastModified": "2015-11-09T19:05:51.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:34.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,18 @@ { "url": "http://www.securityfocus.com/bid/70472", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70472", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6523.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6523.json index 1cc131e1aaa..f33c1f8d905 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6523.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6523.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6523", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.077", - "lastModified": "2015-11-04T18:15:51.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:34.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -106,6 +105,26 @@ { "url": "http://www.securitytracker.com/id/1031042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6524.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6524.json index 632348e339e..c2a480505df 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6524.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6524.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6524", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:10.273", - "lastModified": "2016-12-07T23:38:27.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:34.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -87,6 +86,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6525.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6525.json index faf782f98b6..fe2b073de88 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6525.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6525.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6525", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:11.210", - "lastModified": "2016-06-17T02:00:26.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:34.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -108,6 +107,18 @@ { "url": "http://www.securitytracker.com/id/1031579", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031579", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6526.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6526.json index 961aa976085..e84d5d22341 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6526.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6526.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6526", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:12.117", - "lastModified": "2016-06-17T02:00:27.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:34.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6527.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6527.json index 28f486a15da..62ab64f33df 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6527.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6527.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6527", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.123", - "lastModified": "2020-09-08T13:00:34.710", + "lastModified": "2024-11-21T02:14:34.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -93,6 +92,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", "source": "secalert_us@oracle.com" @@ -148,6 +151,82 @@ { "url": "http://www.ubuntu.com/usn/USN-2388-2", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70560", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6528.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6528.json index 2a12d507b19..5e0be416ad4 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6528.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6528.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6528", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T14:59:12.960", - "lastModified": "2016-06-24T15:38:52.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:34.973", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -88,6 +87,18 @@ { "url": "http://www.securitytracker.com/id/1031578", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6529.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6529.json index 425e325e2bb..6480ec8aa42 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6529.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6529.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6529", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.170", - "lastModified": "2014-11-19T03:02:50.587", + "lastModified": "2024-11-21T02:14:35.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 6.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.2, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70513", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6530.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6530.json index 3e27680317c..ea325da5bfd 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6530.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6530.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6530", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.217", - "lastModified": "2022-07-18T18:47:02.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:35.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -180,6 +179,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70486", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6531.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6531.json index cf1bc4e6ccb..e17c60e0094 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6531.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6531.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6531", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.263", - "lastModified": "2022-05-13T14:57:20.720", + "lastModified": "2024-11-21T02:14:35.410", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -151,6 +150,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", "source": "secalert_us@oracle.com" @@ -286,6 +289,190 @@ { "url": "http://www.ubuntu.com/usn/USN-2388-2", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6532.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6532.json index cfc04b3e1f2..8bb4378d65b 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6532.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6532.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6532", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.310", - "lastModified": "2022-05-13T14:35:35.100", + "lastModified": "2024-11-21T02:14:35.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -171,6 +170,86 @@ { "url": "http://www.securityfocus.com/bid/70507", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70507", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6533.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6533.json index eb770bc88eb..64ef344fa6d 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6533.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6533.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6533", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.357", - "lastModified": "2015-11-06T15:16:37.100", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:35.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "http://www.securitytracker.com/id/1031043", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70537", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6534.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6534.json index 012ef5e95f7..749ac820c75 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6534.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6534.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6534", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.407", - "lastModified": "2015-11-09T19:06:15.480", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:35.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70449", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70449", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6535.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6535.json index 8b91a5c3d67..6da20eb221c 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6535.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6535.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6535", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.453", - "lastModified": "2015-11-13T16:57:46.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:36.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,26 @@ { "url": "http://www.securitytracker.com/id/1031044", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61701", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031044", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6536.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6536.json index 1b261dddb84..b02797f8c91 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6536.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6536.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6536", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.500", - "lastModified": "2015-11-10T16:29:21.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:36.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031043", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61724", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70521", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6537.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6537.json index aa86651b055..ffc038c6a15 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6537.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6537.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6537", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.530", - "lastModified": "2015-11-09T19:06:34.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:36.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70492", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70492", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6538.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6538.json index 8d7d27e6a42..95e595b03f4 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6538.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6538.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6538", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.577", - "lastModified": "2015-11-09T19:06:48.953", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:36.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70495", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70495", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6539.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6539.json index 469ac9db5e6..0772da65388 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6539.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6539.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6539", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.623", - "lastModified": "2015-11-04T18:15:22.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:36.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,30 @@ { "url": "http://www.securitytracker.com/id/1031042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70450", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6540.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6540.json index 58bdbe40115..097f7ad1bef 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6540.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6540.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6540", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.670", - "lastModified": "2014-11-19T03:02:52.007", + "lastModified": "2024-11-21T02:14:36.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -294,6 +293,26 @@ { "url": "http://www.securitytracker.com/id/1031034", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61582", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70493", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031034", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6541.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6541.json index b784645c018..9c5eb233966 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6541.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6541.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6541", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:00.057", - "lastModified": "2016-11-28T19:12:49.810", + "lastModified": "2024-11-21T02:14:36.820", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nThis vulnerability is only applicable on a Windows operating system. The CVSS score is 6.3 for Database versions prior to 12c. The CVSS is 3.5 (Confidentiality is \"Partial+\") for Database 12c.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:N/A:N", + "baseScore": 6.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -108,6 +106,23 @@ { "url": "http://www.securitytracker.com/id/1031572", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031572", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nThis vulnerability is only applicable on a Windows operating system. The CVSS score is 6.3 for Database versions prior to 12c. The CVSS is 3.5 (Confidentiality is \"Partial+\") for Database 12c." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6542.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6542.json index 37bbe6c0c77..f1f862e7dfa 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6542.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6542.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6542", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.717", - "lastModified": "2015-11-09T19:07:04.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:36.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70515", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70515", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6543.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6543.json index 7157429dbab..f44e4a17284 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6543.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6543.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6543", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.767", - "lastModified": "2015-11-10T16:18:39.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:37.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:N", + "baseScore": 3.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031043", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61724", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70545", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6544.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6544.json index bc1cf6e4ce5..ea92708a1cb 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6544.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6544.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6544", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.813", - "lastModified": "2016-05-11T18:13:30.973", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html, \"2014-October-20 - Removed 12.1.0.2 from the affected versions list for CVE-2014-6544 and CVE-2014-4289", + "lastModified": "2024-11-21T02:14:37.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:N", + "baseScore": 3.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -99,6 +97,19 @@ { "url": "http://www.securityfocus.com/bid/70553", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70553", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html, \"2014-October-20 - Removed 12.1.0.2 from the affected versions list for CVE-2014-6544 and CVE-2014-4289" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6545.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6545.json index 039c68cfd63..b9512b83983 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6545.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6545.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6545", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.873", - "lastModified": "2015-11-17T15:37:29.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:37.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70467", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70467", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6546.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6546.json index fe03911c8a5..8bc0af5b78e 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6546.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6546.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6546", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.920", - "lastModified": "2014-10-24T07:28:36.670", + "lastModified": "2024-11-21T02:14:37.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70453", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70453", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6547.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6547.json index 2768685214e..a00f3fd4649 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6547.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6547.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6547", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:07.967", - "lastModified": "2016-05-11T18:12:35.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:37.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70536", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70536", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6548.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6548.json index 19e88760734..faf81f0257c 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6548.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6548.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6548", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:01.447", - "lastModified": "2016-06-24T15:55:41.017", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nPlease refer to My Oracle Support Note 1962206.1 for instructions on how to address this issue.", + "lastModified": "2024-11-21T02:14:37.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -80,6 +78,15 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nPlease refer to My Oracle Support Note 1962206.1 for instructions on how to address this issue." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6549.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6549.json index 92f0b87c864..dd2576a1da3 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6549.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6549.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6549", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:02.667", - "lastModified": "2022-05-13T14:57:20.737", + "lastModified": "2024-11-21T02:14:37.783", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "As per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -109,6 +107,39 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72137", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6550.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6550.json index d7eb6e2cd77..18ff532067b 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6550.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6550.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6550", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.017", - "lastModified": "2015-11-04T18:15:38.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:37.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "http://www.securitytracker.com/id/1031042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6551.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6551.json index 84e3b52ec14..2e5c05b89d3 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6551.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6551.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6551", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.063", - "lastModified": "2022-09-15T21:04:27.100", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:38.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -180,6 +179,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70462", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6552.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6552.json index d66db9ebb10..5ce4f7ae654 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6552.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6552.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6552", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.110", - "lastModified": "2015-11-10T16:30:00.203", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:38.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,22 @@ { "url": "http://www.securityfocus.com/bid/70452", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61767", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70452", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6553.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6553.json index b86a141f4da..4c92cd62ad6 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6553.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6553.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6553", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.157", - "lastModified": "2015-11-10T16:21:32.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:38.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,22 @@ { "url": "http://www.securityfocus.com/bid/70483", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61767", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70483", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6554.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6554.json index 0b37b20ab22..503fe0dbdad 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6554.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6554.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6554", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.203", - "lastModified": "2015-11-13T16:58:04.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:38.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -92,6 +91,22 @@ { "url": "http://www.securityfocus.com/bid/70494", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61767", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70494", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6555.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6555.json index f327c45423e..c7b9aa17661 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6555.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6555.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6555", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.250", - "lastModified": "2022-07-18T18:47:19.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:38.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -193,6 +192,65 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201411-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70530", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6556.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6556.json index 91e9529ec9d..b2e4aa86809 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6556.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6556.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6556", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:03.807", - "lastModified": "2016-06-24T15:55:34.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:38.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -108,6 +107,18 @@ { "url": "http://www.securitytracker.com/id/1031579", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031579", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6557.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6557.json index 59e00bc5eb3..6a04ffb604c 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6557.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6557.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6557", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.297", - "lastModified": "2015-11-13T16:58:25.540", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:38.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -108,6 +107,22 @@ { "url": "http://www.securitytracker.com/id/1031041", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031041", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6558.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6558.json index b08b268dda0..7b68404ea38 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6558.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6558.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6558", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.343", - "lastModified": "2022-05-13T14:57:20.730", + "lastModified": "2024-11-21T02:14:38.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -171,6 +170,10 @@ "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", "source": "secalert_us@oracle.com" @@ -314,6 +317,198 @@ { "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10092", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141775382904016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61631", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70544", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2386-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2388-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10092", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6559.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6559.json index 092455c4e64..fdcb2e7d462 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6559.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6559.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6559", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.390", - "lastModified": "2022-08-29T20:50:35.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:39.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -231,6 +230,72 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201411-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70487", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6560.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6560.json index c1a68e1ab28..2df18ad05a8 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6560.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6560.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6560", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.437", - "lastModified": "2014-10-24T07:28:40.217", + "lastModified": "2024-11-21T02:14:39.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70482", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70482", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6561.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6561.json index c94257b05a2..feba69dc1e6 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6561.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6561.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6561", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.483", - "lastModified": "2015-11-04T18:17:02.700", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:39.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,26 @@ { "url": "http://www.securitytracker.com/id/1031042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/61781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6562.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6562.json index 20cec315ce9..2d728dd4fe3 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6562.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6562.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6562", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.530", - "lastModified": "2020-09-08T12:29:40.483", + "lastModified": "2024-11-21T02:14:39.557", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,42 @@ { "url": "http://www.securityfocus.com/bid/70523", "source": "secalert_us@oracle.com" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70523", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6563.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6563.json index c706c8c4e80..08406ed7325 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6563.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6563.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6563", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.577", - "lastModified": "2014-10-24T07:28:41.217", + "lastModified": "2024-11-21T02:14:39.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/70465", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70465", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6564.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6564.json index 1af9bd6e2c2..09551854c02 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6564.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6564.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6564", "sourceIdentifier": "secalert_us@oracle.com", "published": "2014-10-15T22:55:08.627", - "lastModified": "2022-08-26T16:11:48.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:39.837", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -144,6 +143,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70511", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6565.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6565.json index 2c0d7e56ca2..1f66030d538 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6565.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6565.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6565", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:04.727", - "lastModified": "2016-06-24T15:56:01.987", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:39.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "http://www.securitytracker.com/id/1031573", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031573", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6566.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6566.json index 5e5a7d9e293..d373d933471 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6566.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6566.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6566", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:05.680", - "lastModified": "2016-06-24T15:54:45.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:40.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031577", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031577", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6567.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6567.json index ad91aa7416b..3a21f95c7f5 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6567.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6567.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6567", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:06.527", - "lastModified": "2016-11-28T19:12:50.827", + "lastModified": "2024-11-21T02:14:40.203", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nThe CVSS Score is 9.0 only on Windows for Database versions prior to 12c. The CVSS Base Score is 6.5 (Confidentiality, Integrity and Availability are Partial+) for Database 12c on Windows and for all versions of Database on Linux, Unix and other platforms.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -115,6 +113,30 @@ { "url": "http://www.securitytracker.com/id/1031572", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.databaseforensics.com/Oracle_Jan2015_CPU.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031572", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nThe CVSS Score is 9.0 only on Windows for Database versions prior to 12c. The CVSS Base Score is 6.5 (Confidentiality, Integrity and Availability are Partial+) for Database 12c on Windows and for all versions of Database on Linux, Unix and other platforms." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6568.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6568.json index a775edda8f4..ea88be24146 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6568.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6568.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6568", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:07.527", - "lastModified": "2022-09-16T19:56:20.463", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:40.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -434,6 +433,136 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62728", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3135", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031581", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2480-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6569.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6569.json index 7f5ebe40497..d9755ac3d68 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6569.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6569.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6569", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:08.527", - "lastModified": "2016-06-24T15:56:08.003", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:40.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6570.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6570.json index 1e6372b8d19..9893a801191 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6570.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6570.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6570", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:09.463", - "lastModified": "2016-12-07T03:01:05.483", + "lastModified": "2024-11-21T02:14:40.637", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -83,6 +82,18 @@ { "url": "http://www.securitytracker.com/id/1031583", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6571.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6571.json index 8281e5fdb39..22f3b270efe 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6571.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6571.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6571", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:10.383", - "lastModified": "2016-06-24T15:56:14.160", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:40.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6572.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6572.json index 179d702bd4e..31a24fe0bce 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6572.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6572.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6572", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:11.370", - "lastModified": "2016-06-24T15:30:26.553", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:40.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,18 @@ { "url": "http://www.securitytracker.com/id/1031579", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031579", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6573.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6573.json index d1d3e6f87f0..77c278b2ef9 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6573.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6573.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6573", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:12.277", - "lastModified": "2016-06-24T15:55:55.813", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:41.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6574.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6574.json index 5a774a92daa..b8d62ea40dd 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6574.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6574.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6574", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:13.463", - "lastModified": "2016-06-24T15:54:59.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:41.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "http://www.securitytracker.com/id/1031576", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031576", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6575.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6575.json index 047d70b6534..0330a158e33 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6575.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6575.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6575", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:14.527", - "lastModified": "2016-12-07T03:01:06.453", + "lastModified": "2024-11-21T02:14:41.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,18 @@ { "url": "http://www.securitytracker.com/id/1031583", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6576.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6576.json index abec39a6ed4..7d53b5c7981 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6576.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6576.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6576", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:15.353", - "lastModified": "2016-06-24T18:35:17.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:41.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -94,6 +93,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6577.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6577.json index f3a31111b8c..ec1e5c3917e 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6577.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6577.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6577", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:16.213", - "lastModified": "2016-11-28T19:12:51.920", + "lastModified": "2024-11-21T02:14:41.517", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nThe CVSS score is 6.8 only on Windows for Database versions prior to 12c. The CVSS is 4.0 (Confidentiality is \"Partial+\") for Database 12c on Windows and for all versions of Database on Linux, Unix and other platforms.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -110,6 +108,30 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://blog.netspi.com/advisory-xxe-injection-oracle-database-cve-2014-6577/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nThe CVSS score is 6.8 only on Windows for Database versions prior to 12c. The CVSS is 4.0 (Confidentiality is \"Partial+\") for Database 12c on Windows and for all versions of Database on Linux, Unix and other platforms." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6578.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6578.json index 85e9d225eb9..de1dea60580 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6578.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6578.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6578", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:17.057", - "lastModified": "2016-11-28T19:12:52.953", + "lastModified": "2024-11-21T02:14:41.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -102,6 +101,22 @@ { "url": "http://www.securitytracker.com/id/1031572", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72149", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031572", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6579.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6579.json index eb1ff969604..7979fe65f5b 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6579.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6579.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6579", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:17.900", - "lastModified": "2016-06-27T14:30:16.920", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:41.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -88,6 +87,18 @@ { "url": "http://www.securitytracker.com/id/1031577", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031577", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6580.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6580.json index 96273c9a9b1..eb938459712 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6580.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6580.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6580", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:18.930", - "lastModified": "2016-06-23T11:54:03.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:41.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6581.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6581.json index 3ea068ed240..5ce7208733d 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6581.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6581.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6581", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:19.727", - "lastModified": "2016-06-23T11:55:16.093", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:42.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -128,6 +127,18 @@ { "url": "http://www.securitytracker.com/id/1031579", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031579", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6582.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6582.json index bd72c81e232..0e9b1483aeb 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6582.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6582.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6582", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:20.493", - "lastModified": "2016-06-23T11:57:12.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:42.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -128,6 +127,18 @@ { "url": "http://www.securitytracker.com/id/1031579", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031579", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6583.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6583.json index 3ab5806c141..e5e2865a80c 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6583.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6583.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6583", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:21.320", - "lastModified": "2016-06-23T12:03:06.753", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:42.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -113,6 +112,18 @@ { "url": "http://www.securitytracker.com/id/1031579", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031579", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6584.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6584.json index 90ed6311d6e..969599c2753 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6584.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6584.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6584", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:22.070", - "lastModified": "2016-06-23T11:55:26.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:42.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -84,6 +83,18 @@ { "url": "http://www.securitytracker.com/id/1031594", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031594", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6585.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6585.json index 5c9cb106298..ea1712ce2e9 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6585.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6585.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6585", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:22.820", - "lastModified": "2022-05-13T14:57:20.857", + "lastModified": "2024-11-21T02:14:42.537", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "per: \"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\"\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -128,6 +126,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -215,6 +217,119 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3323", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "per: \"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\"\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6586.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6586.json index 59aa0bf0837..0c17a4276a0 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6586.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6586.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6586", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:23.743", - "lastModified": "2016-06-23T11:55:51.093", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:42.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031577", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031577", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6587.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6587.json index 9f935410974..e04d9659523 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6587.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6587.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6587", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:24.587", - "lastModified": "2022-05-13T14:57:20.863", + "lastModified": "2024-11-21T02:14:42.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -117,6 +116,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -192,6 +195,106 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72168", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6588.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6588.json index db6a9ccc126..2636fbadd77 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6588.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6588.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6588", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:25.307", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:14:42.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 3.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.2 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.1, @@ -107,6 +106,21 @@ { "url": "https://security.gentoo.org/glsa/201612-27", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-27", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6589.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6589.json index 292bc1c3496..757f150ed3b 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6589.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6589.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6589", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:26.070", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:14:43.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 3.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.2 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.1, @@ -107,6 +106,21 @@ { "url": "https://security.gentoo.org/glsa/201612-27", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-27", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6590.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6590.json index 3fd98df7df3..507245dfc35 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6590.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6590.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6590", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:26.853", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:14:43.207", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 3.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.2 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.1, @@ -107,6 +106,21 @@ { "url": "https://security.gentoo.org/glsa/201612-27", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-27", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6591.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6591.json index 5e6350bb0ab..2304ddfed26 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6591.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6591.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6591", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:27.603", - "lastModified": "2022-05-13T14:57:20.870", + "lastModified": "2024-11-21T02:14:43.350", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -128,6 +126,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -211,6 +213,115 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72175", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6592.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6592.json index bde5aa6bcd4..8750aa2f5a6 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6592.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6592.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6592", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:28.510", - "lastModified": "2016-06-17T02:01:06.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:43.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -79,6 +78,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6593.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6593.json index 9e65a5978b7..4ba63b7e092 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6593.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6593.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6593", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:29.337", - "lastModified": "2022-05-13T14:57:20.880", + "lastModified": "2024-11-21T02:14:43.603", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: \"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\"\n\nApplies to client and server deployment of JSSE.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -168,6 +166,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -259,6 +261,123 @@ { "url": "https://www.exploit-db.com/exploits/38641/", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/134251/Java-Secure-Socket-Extension-JSSE-SKIP-TLS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72169", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/38641/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: \"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\"\n\nApplies to client and server deployment of JSSE." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6594.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6594.json index 1a69d7fa758..f6c363d733a 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6594.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6594.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6594", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:30.180", - "lastModified": "2016-06-23T11:52:35.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:43.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "http://www.securitytracker.com/id/1031589", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031589", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6595.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6595.json index fe60a72233d..408f72c8cb8 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6595.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6595.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6595", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:31.023", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:14:43.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 3.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.2 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.1, @@ -107,6 +106,21 @@ { "url": "https://security.gentoo.org/glsa/201612-27", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-27", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6596.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6596.json index a68f7b17bf4..577ece135b7 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6596.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6596.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6596", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:32.117", - "lastModified": "2016-06-23T12:00:00.340", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:44.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1031578", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6597.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6597.json index 6c9a1adeca0..be722a38365 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6597.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6597.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6597", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T15:28:33.023", - "lastModified": "2016-06-23T12:03:14.800", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:44.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -92,6 +91,17 @@ { "url": "http://www.securitytracker.com/id/1031577", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031577", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6598.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6598.json index 6bb0bf5a02d..ab36d724242 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6598.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6598.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6598", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:01.123", - "lastModified": "2016-06-23T11:53:26.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:44.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -93,6 +92,18 @@ { "url": "http://www.securitytracker.com/id/1031590", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031590", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-65xx/CVE-2014-6599.json b/CVE-2014/CVE-2014-65xx/CVE-2014-6599.json index befa53364bc..78d62fbcb8a 100644 --- a/CVE-2014/CVE-2014-65xx/CVE-2014-6599.json +++ b/CVE-2014/CVE-2014-65xx/CVE-2014-6599.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6599", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:02.107", - "lastModified": "2016-06-23T11:55:07.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:44.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1031578", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6600.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6600.json index 5508ff6c54b..cb3da686a28 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6600.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6600.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6600", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:03.060", - "lastModified": "2016-12-07T03:01:08.563", + "lastModified": "2024-11-21T02:14:44.543", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -83,6 +82,18 @@ { "url": "http://www.securitytracker.com/id/1031583", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6601.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6601.json index 722df01aff1..fbd6ee17113 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6601.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6601.json @@ -2,10 +2,8 @@ "id": "CVE-2014-6601", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:03.903", - "lastModified": "2022-05-13T14:57:20.763", + "lastModified": "2024-11-21T02:14:44.660", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -188,6 +186,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -255,6 +257,99 @@ { "url": "https://security.gentoo.org/glsa/201603-14", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72132", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets." } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6602.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6602.json index 7d2673f2e49..c421476d609 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6602.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6602.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6602", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-22T01:55:06.557", - "lastModified": "2017-09-08T01:29:14.590", + "lastModified": "2024-11-21T02:14:44.833", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:N", + "baseScore": 6.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 6.6 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -94,6 +93,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96195", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128320/Nokia-Asha-501-Lock-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96195", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6603.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6603.json index 578c31cdede..7b9feb81f33 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6603.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6603.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6603", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-07T14:55:07.517", - "lastModified": "2018-10-09T19:51:23.957", + "lastModified": "2024-11-21T02:14:44.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -131,6 +130,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96157", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139630.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139821.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128382/Suricata-2.0.3-Out-Of-Bounds-Access.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/79", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533515/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96157", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6607.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6607.json index dba1222b889..8a9ac1376fb 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6607.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6607.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6607", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-06T23:55:09.060", - "lastModified": "2014-10-07T23:18:47.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:45.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128321/M-Monit-3.2.2-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/71", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34718", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6609.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6609.json index e86f49730c8..1f8b64c0023 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6609.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6609.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6609", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:01.447", - "lastModified": "2014-11-26T21:51:09.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:45.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -154,6 +153,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6610.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6610.json index 1ff01cc9e55..7f59c6d5137 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6610.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6610.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6610", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:02.573", - "lastModified": "2014-11-26T21:33:43.760", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:45.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -399,6 +398,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6611.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6611.json index 968d02ee90c..7350d699eae 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6611.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6611.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6611", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-25T10:55:06.743", - "lastModified": "2015-01-28T00:40:07.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:46.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -151,6 +150,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61013", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.blackberry.com/btsc/kb36360", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6618.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6618.json index 6dd506e7d54..13be50564c8 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6618.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6618.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6618", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T16:55:07.107", - "lastModified": "2017-09-08T01:29:14.717", + "lastModified": "2024-11-21T02:14:46.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96163", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128336/Your-Online-Shop-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96163", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6619.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6619.json index 938dcc32318..96fd634c807 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6619.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6619.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6619", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T16:55:07.230", - "lastModified": "2017-09-08T01:29:14.777", + "lastModified": "2024-11-21T02:14:46.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96159", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/112019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34760", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96159", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6620.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6620.json index 035f97d0316..d0c75ca5d68 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6620.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6620.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6620", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-07T19:55:04.230", - "lastModified": "2014-11-10T13:38:19.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:47.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-10282014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6621.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6621.json index f2831f4ac74..2526caa6c3d 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6621.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6621.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6621", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T18:59:01.453", - "lastModified": "2014-11-19T19:16:23.003", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:48.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-10282014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6622.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6622.json index 64352448837..12bf7df0ccb 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6622.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6622.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6622", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T18:59:02.627", - "lastModified": "2014-11-19T19:17:01.163", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:48.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-10282014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6623.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6623.json index 47b785f8891..b769d3b5f6a 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6623.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6623.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6623", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-07T19:55:04.277", - "lastModified": "2014-11-10T13:39:48.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:48.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-10282014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6624.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6624.json index 6b441903014..8e82e3031eb 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6624.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6624.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6624", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T18:59:03.597", - "lastModified": "2017-09-08T01:29:14.840", + "lastModified": "2024-11-21T02:14:49.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -96,6 +95,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98877", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/61916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-10282014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98877", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6625.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6625.json index 9f11f1dd3e6..4ae52d98c7d 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6625.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6625.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6625", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T18:59:04.797", - "lastModified": "2014-11-19T19:34:53.010", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:49.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-10282014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6626.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6626.json index a85669d63ed..da055fc3c06 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6626.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6626.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6626", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T18:59:06.003", - "lastModified": "2014-11-19T19:22:27.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:49.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-10282014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6627.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6627.json index 498db9569a9..c7ae5021c14 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6627.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6627.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6627", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T18:59:07.017", - "lastModified": "2014-11-19T19:30:56.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:49.767", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-10282014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6628.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6628.json index 4ccd6cd4b30..fda0bc6c9fd 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6628.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6628.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6628", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-28T14:59:00.063", - "lastModified": "2015-05-29T14:46:28.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:50.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-006.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6631.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6631.json index 75342a66957..42d757039f7 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6631.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6631.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6631", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:04.203", - "lastModified": "2014-10-09T18:07:25.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:50.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -122,6 +121,17 @@ { "url": "http://secunia.com/advisories/61606", "source": "cve@mitre.org" + }, + { + "url": "http://developer.joomla.org/security/593-20140901-core-xss-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61606", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6632.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6632.json index 30b3978e7d8..84d8175a83a 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6632.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6632.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6632", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:04.250", - "lastModified": "2014-10-09T16:46:40.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:50.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -238,6 +237,18 @@ { "url": "http://secunia.com/advisories/61638", "source": "cve@mitre.org" + }, + { + "url": "http://developer.joomla.org/security/594-20140902-core-unauthorised-logins.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61638", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6635.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6635.json index 7436b2b1fe5..2577f6a44d4 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6635.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6635.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6635", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-26T20:55:03.477", - "lastModified": "2017-09-08T01:29:14.887", + "lastModified": "2024-11-21T02:14:50.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96158", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128335/Exponent-CMS-2.3.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96158", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6636.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6636.json index fff4003f0cb..77b6192e533 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6636.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6636.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6636", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.333", - "lastModified": "2014-12-15T19:37:23.713", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:51.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/858553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6637.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6637.json index 26918c0e8f0..0aa8562b571 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6637.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6637.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6637", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.397", - "lastModified": "2014-09-26T13:36:54.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:51.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/308465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6638.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6638.json index 8ac55299667..c0e51861761 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6638.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6638.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6638", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.443", - "lastModified": "2014-09-26T14:22:24.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:51.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/394617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6639.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6639.json index 654026144b9..25b4d411f6c 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6639.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6639.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6639", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.490", - "lastModified": "2014-09-26T14:04:02.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:51.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/417937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6640.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6640.json index 1e56c30a92d..c13bd4e9417 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6640.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6640.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6640", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.537", - "lastModified": "2014-09-26T14:11:17.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:51.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/395409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6641.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6641.json index 7bcb7736afd..e53e4fc02f8 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6641.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6641.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6641", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.583", - "lastModified": "2014-09-26T14:16:23.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:52.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/205417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6642.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6642.json index 64fbc5c4c2b..93d0a644702 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6642.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6642.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6642", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.647", - "lastModified": "2014-09-26T14:15:35.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:52.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/238329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6643.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6643.json index ff6b03da2cd..18f92004029 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6643.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6643.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6643", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.693", - "lastModified": "2014-09-26T14:13:05.847", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:52.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/331169", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6645.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6645.json index 3fa06646038..79804df7ad2 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6645.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6645.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6645", "sourceIdentifier": "cret@cert.org", "published": "2014-09-22T10:55:08.740", - "lastModified": "2014-09-26T14:18:52.920", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:52.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/438881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6646.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6646.json index 4e26b387b04..42c35926471 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6646.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6646.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6646", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:06.763", - "lastModified": "2014-10-24T07:28:45.640", + "lastModified": "2024-11-21T02:14:53.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/188257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6647.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6647.json index 65eaeea6085..8fc8d4ea425 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6647.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6647.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6647", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:06.827", - "lastModified": "2014-09-26T14:35:33.677", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:53.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/675161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6648.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6648.json index e77b4274dd7..4d05d32d434 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6648.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6648.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6648", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:06.873", - "lastModified": "2014-09-26T14:31:43.113", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:53.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/758497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6649.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6649.json index 27c43b233f2..6b77c1c9cde 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6649.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6649.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6649", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:06.920", - "lastModified": "2014-09-26T14:28:54.587", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:53.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/916369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6650.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6650.json index 0bb47161272..0bae020f536 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6650.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6650.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6650", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:06.967", - "lastModified": "2014-09-26T14:45:27.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:53.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/976209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6651.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6651.json index e0f6063ea87..71de2a3659e 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6651.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6651.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6651", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.013", - "lastModified": "2014-09-26T14:46:07.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:54.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/886537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6652.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6652.json index 6cfd49d5330..fb9d5650282 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6652.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6652.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6652", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.060", - "lastModified": "2014-09-26T14:51:37.793", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:54.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/215185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6653.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6653.json index 4a72588e537..de26460d576 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6653.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6653.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6653", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.107", - "lastModified": "2014-09-26T14:53:37.253", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:54.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/222577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6654.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6654.json index de6e4996295..38f3d32d288 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6654.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6654.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6654", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.170", - "lastModified": "2014-09-26T15:03:42.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:54.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/900529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6655.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6655.json index 06632ca5f71..5a86e7a71ec 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6655.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6655.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6655", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.247", - "lastModified": "2014-09-26T15:05:32.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:54.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/991257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6656.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6656.json index 6ba15b8268f..ea9763963ff 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6656.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6656.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6656", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.293", - "lastModified": "2014-09-26T15:12:24.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:55.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/856441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6657.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6657.json index c676070e83a..842e77499d5 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6657.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6657.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6657", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.340", - "lastModified": "2014-09-26T15:23:38.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:55.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/655009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6658.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6658.json index 6972f89173d..e73417db965 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6658.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6658.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6658", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.387", - "lastModified": "2014-09-26T15:24:24.570", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:55.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/975681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6659.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6659.json index 3759cac609d..049022aad1b 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6659.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6659.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6659", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.437", - "lastModified": "2014-09-26T15:34:56.553", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:55.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/896041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6660.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6660.json index 0db29f3484b..2ee5871f608 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6660.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6660.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6660", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.497", - "lastModified": "2014-09-26T15:36:17.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:55.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/851425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6661.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6661.json index f17aa1273ee..5816bbb0044 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6661.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6661.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6661", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.527", - "lastModified": "2014-09-26T15:55:07.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:56.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/476721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6662.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6662.json index 9ae6f4073ea..eef442ba235 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6662.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6662.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6662", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.590", - "lastModified": "2014-09-26T16:47:57.253", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:56.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/724617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6663.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6663.json index e3300847f70..c260c74241c 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6663.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6663.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6663", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.637", - "lastModified": "2014-09-26T17:58:23.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:56.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/622801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6664.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6664.json index b2eb394e9ef..ae481a1202a 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6664.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6664.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6664", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.687", - "lastModified": "2014-09-29T17:59:43.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:56.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/356161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6665.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6665.json index a1e44893302..23de6bfcd16 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6665.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6665.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6665", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.733", - "lastModified": "2014-09-29T01:34:54.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:56.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/691177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6666.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6666.json index 3def8057189..bd9e6cb9d2b 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6666.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6666.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6666", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.777", - "lastModified": "2014-09-29T01:38:41.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:57.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/589537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6667.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6667.json index aad0f057a7b..6533be5d97c 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6667.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6667.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6667", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.827", - "lastModified": "2014-10-03T12:19:15.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:57.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/956145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6668.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6668.json index cbd6155692e..f46609e4733 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6668.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6668.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6668", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.873", - "lastModified": "2014-09-29T01:49:34.987", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:57.493", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/207001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6669.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6669.json index e520cf3c923..8d353af7d3d 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6669.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6669.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6669", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.937", - "lastModified": "2014-09-29T01:50:26.023", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:57.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/324481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6670.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6670.json index 7854f54a066..26e448cb57a 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6670.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6670.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6670", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:07.983", - "lastModified": "2014-09-29T01:36:40.773", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:57.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/185529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6671.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6671.json index 45898167403..9578429aafe 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6671.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6671.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6671", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.027", - "lastModified": "2014-09-29T01:51:30.260", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:58.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/341201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6672.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6672.json index de75c78a11b..1b0e7cbd14d 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6672.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6672.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6672", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.077", - "lastModified": "2014-09-29T01:52:29.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:58.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/524241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6673.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6673.json index bd440158b64..37673353757 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6673.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6673.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6673", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.123", - "lastModified": "2014-10-03T12:22:02.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:58.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/949017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6674.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6674.json index 20f15154d3b..2afe474804c 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6674.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6674.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6674", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.170", - "lastModified": "2014-10-03T12:22:59.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:59.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/825993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6675.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6675.json index 2b6cd43c361..bb5151dea0d 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6675.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6675.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6675", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.217", - "lastModified": "2014-09-29T01:53:42.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:59.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/680441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6676.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6676.json index c7bdb45088b..42f1ff37492 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6676.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6676.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6676", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.277", - "lastModified": "2014-09-29T01:56:25.003", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:59.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/807161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6677.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6677.json index 6c4424e0a35..4deafd47134 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6677.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6677.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6677", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.327", - "lastModified": "2014-09-29T01:57:39.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:14:59.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/143641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6678.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6678.json index 6ae7bfa4055..4f80b867324 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6678.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6678.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6678", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.373", - "lastModified": "2014-09-29T01:58:35.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:00.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/701209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6679.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6679.json index 321beb95685..1236156d7c9 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6679.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6679.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6679", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.437", - "lastModified": "2014-10-03T12:23:46.130", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:00.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/374817", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6680.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6680.json index 4c4fdeb37e4..e7110fb4899 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6680.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6680.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6680", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.483", - "lastModified": "2014-10-03T12:25:20.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:00.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/365841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6681.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6681.json index d66ed5f4e9b..42986938530 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6681.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6681.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6681", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.527", - "lastModified": "2014-09-29T01:59:34.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:00.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/447505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6682.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6682.json index 0f0cc98f174..9dec212ddcf 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6682.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6682.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6682", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.577", - "lastModified": "2014-10-03T12:26:07.080", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:01.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/497401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6683.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6683.json index b0b1ef69bcd..b28d35e6795 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6683.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6683.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6683", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.637", - "lastModified": "2014-09-29T02:00:23.833", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:01.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/945057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6684.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6684.json index 44c38b2c368..fba635c64ec 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6684.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6684.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6684", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.687", - "lastModified": "2014-09-29T02:01:12.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:01.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/710097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6685.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6685.json index cf63eddcdf6..adb1864e0bb 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6685.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6685.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6685", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.733", - "lastModified": "2014-09-29T02:02:00.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:01.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/814201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6686.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6686.json index 88c56271e4e..fff684ba08d 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6686.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6686.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6686", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.777", - "lastModified": "2014-10-03T12:26:58.383", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:01.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/757265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6687.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6687.json index 1929d80e073..14a61dc7c41 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6687.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6687.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6687", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.840", - "lastModified": "2014-10-04T23:46:14.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:02.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/658353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6688.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6688.json index 01207f902c0..d3debb8b27d 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6688.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6688.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6688", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.887", - "lastModified": "2014-10-04T23:46:59.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:02.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/549145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6689.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6689.json index 14eedf2ec07..2d421dd8c7f 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6689.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6689.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6689", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.937", - "lastModified": "2014-10-04T23:47:53.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:02.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/149273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6690.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6690.json index f022d3f47b4..f764b7fd159 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6690.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6690.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6690", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:08.983", - "lastModified": "2014-10-04T23:48:44.490", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:02.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/127537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6691.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6691.json index 2231da8f7b3..6ed4b4a5423 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6691.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6691.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6691", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:09.060", - "lastModified": "2014-10-04T23:49:53.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:02.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/172857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6692.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6692.json index 3a402ee3d16..ff491a83bda 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6692.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6692.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6692", "sourceIdentifier": "cret@cert.org", "published": "2014-09-23T10:55:09.107", - "lastModified": "2014-10-04T23:53:01.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:03.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/453929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6693.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6693.json index 8a2a15b1f09..5de6db77df6 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6693.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6693.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6693", "sourceIdentifier": "cret@cert.org", "published": "2014-09-24T01:55:12.923", - "lastModified": "2014-10-04T23:57:32.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:03.383", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/913025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6694.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6694.json index e33b8f7dbbb..b871a062e25 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6694.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6694.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6694", "sourceIdentifier": "cret@cert.org", "published": "2014-09-24T01:55:13.000", - "lastModified": "2014-10-04T23:58:21.607", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:03.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/708073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6695.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6695.json index bc0680fcec3..8f1f871453e 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6695.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6695.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6695", "sourceIdentifier": "cret@cert.org", "published": "2014-09-24T01:55:13.063", - "lastModified": "2014-10-04T23:59:12.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:03.793", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/217649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6696.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6696.json index 72bb35b3f01..3c7191e79a9 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6696.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6696.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6696", "sourceIdentifier": "cret@cert.org", "published": "2014-09-24T01:55:13.127", - "lastModified": "2014-10-05T00:00:01.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:04.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/266665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6697.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6697.json index 8238d115e06..2b11d54c4eb 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6697.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6697.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6697", "sourceIdentifier": "cret@cert.org", "published": "2014-09-24T01:55:13.187", - "lastModified": "2014-10-05T00:01:35.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:04.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/845969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6698.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6698.json index 381b7d43d16..9fd50dbbec3 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6698.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6698.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6698", "sourceIdentifier": "cret@cert.org", "published": "2014-09-24T01:55:13.267", - "lastModified": "2014-10-05T00:04:43.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:04.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/355721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-66xx/CVE-2014-6699.json b/CVE-2014/CVE-2014-66xx/CVE-2014-6699.json index 937a1166a22..d0466ea07de 100644 --- a/CVE-2014/CVE-2014-66xx/CVE-2014-6699.json +++ b/CVE-2014/CVE-2014-66xx/CVE-2014-6699.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6699", "sourceIdentifier": "cret@cert.org", "published": "2014-09-24T01:55:13.330", - "lastModified": "2014-10-05T00:06:28.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:04.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/964417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6700.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6700.json index 874089b16e3..23c681b2210 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6700.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6700.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6700", "sourceIdentifier": "cret@cert.org", "published": "2014-09-24T01:55:13.407", - "lastModified": "2014-10-05T00:07:29.380", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:04.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/949809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6701.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6701.json index cf190058d76..28a3d79080f 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6701.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6701.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6701", "sourceIdentifier": "cret@cert.org", "published": "2014-09-24T01:55:13.470", - "lastModified": "2014-10-05T00:08:22.933", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:04.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/234369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6702.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6702.json index 240230e2ff5..bb0fb417c8d 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6702.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6702.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6702", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:02.647", - "lastModified": "2014-10-05T00:09:11.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:05.187", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/361705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6703.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6703.json index 03e53d8afbe..21349710e27 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6703.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6703.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6703", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:02.710", - "lastModified": "2014-10-05T00:12:12.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:05.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/680881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6704.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6704.json index 8d077c3f161..cfd20708f90 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6704.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6704.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6704", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:02.773", - "lastModified": "2014-10-05T00:14:25.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:05.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/320081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6705.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6705.json index c204e923ca8..357b92a7903 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6705.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6705.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6705", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:02.850", - "lastModified": "2014-10-05T00:15:09.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:05.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/704729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6706.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6706.json index c9bc932562d..c7afb01398f 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6706.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6706.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6706", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:03.070", - "lastModified": "2014-11-14T13:58:30.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:05.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/621129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6707.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6707.json index e3f2f466fbb..fb87d87f04e 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6707.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6707.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6707", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:03.133", - "lastModified": "2014-11-14T13:58:32.227", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:06.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/140297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6708.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6708.json index c721246b2cf..a956caa9d1f 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6708.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6708.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6708", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:03.210", - "lastModified": "2014-10-05T00:13:17.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:06.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/563225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6709.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6709.json index 29d40130d8f..eddf65ffc2e 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6709.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6709.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6709", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:03.303", - "lastModified": "2014-11-14T13:58:33.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:06.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/895689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6710.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6710.json index f074cc02f5b..55f0ae7c788 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6710.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6710.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6710", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:03.490", - "lastModified": "2014-11-14T13:58:35.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:06.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/867705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6711.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6711.json index aa5f7e486ab..0e196653a42 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6711.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6711.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6711", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:03.553", - "lastModified": "2014-11-14T13:58:36.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:06.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/735265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6712.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6712.json index 5ef756afc29..9bdc9095f7c 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6712.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6712.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6712", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:03.617", - "lastModified": "2014-11-14T13:58:38.277", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:07.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/791497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6713.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6713.json index e62fe200075..10da2db9706 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6713.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6713.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6713", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:03.803", - "lastModified": "2014-11-14T14:26:04.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:07.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/979201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6714.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6714.json index 65e2d5abf8f..ae659b5a12d 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6714.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6714.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6714", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:03.867", - "lastModified": "2014-11-14T13:58:39.683", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:07.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/289017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6715.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6715.json index c82a2100f16..4f538fcb3f1 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6715.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6715.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6715", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:03.943", - "lastModified": "2014-11-14T13:58:41.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:07.793", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/968377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6716.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6716.json index 752254499bf..7088b7af9cb 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6716.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6716.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6716", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:04.023", - "lastModified": "2014-11-14T13:58:43.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:07.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/546857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6717.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6717.json index 5dff202d9e2..0ba9cf05709 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6717.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6717.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6717", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:04.180", - "lastModified": "2014-11-14T13:58:45.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:08.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/220729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6718.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6718.json index 1cbb3ec1fea..ee438208b63 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6718.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6718.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6718", "sourceIdentifier": "cret@cert.org", "published": "2014-09-25T01:55:04.273", - "lastModified": "2014-11-14T13:58:46.760", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:08.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/244313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6719.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6719.json index f8dc58b6d2b..8ec092662a2 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6719.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6719.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6719", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:04.870", - "lastModified": "2014-11-14T13:58:48.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:08.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/418025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6720.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6720.json index e94a4b91f6b..ceeeefe00ea 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6720.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6720.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6720", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:04.917", - "lastModified": "2014-09-26T15:34:11.660", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:08.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/580033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6721.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6721.json index 4063778bce7..57f93637e2c 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6721.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6721.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6721", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:04.967", - "lastModified": "2014-11-14T13:58:49.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:08.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/819305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6722.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6722.json index 00da98d2355..e78dbf73a90 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6722.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6722.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6722", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.013", - "lastModified": "2014-11-14T13:58:51.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:09.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/764569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6723.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6723.json index d0d6d6b452f..661d6c89d7f 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6723.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6723.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6723", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.060", - "lastModified": "2014-11-14T13:58:53.123", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:09.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/589009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6724.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6724.json index 28592348097..44585c6c2ae 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6724.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6724.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6724", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.107", - "lastModified": "2014-11-14T13:58:54.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:09.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/709657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6725.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6725.json index 5344be252c8..f55e9809797 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6725.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6725.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6725", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.153", - "lastModified": "2014-11-14T13:58:56.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:09.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/165905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6726.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6726.json index 7e021509add..eeed8254545 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6726.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6726.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6726", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.200", - "lastModified": "2014-09-26T14:44:39.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:10.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -90,6 +89,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/832505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6727.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6727.json index 394743b8d80..17ffe5811af 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6727.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6727.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6727", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.263", - "lastModified": "2014-11-14T13:58:57.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:10.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/441873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6728.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6728.json index cfb38fb96f0..17890c0b748 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6728.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6728.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6728", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.310", - "lastModified": "2014-11-14T13:58:58.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:10.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/855473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6729.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6729.json index 8cda936e0e3..c79d3e98098 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6729.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6729.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6729", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.357", - "lastModified": "2014-11-14T13:59:00.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:10.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/748465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6730.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6730.json index 35d6ce8a517..5a7d9000ccb 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6730.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6730.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6730", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.403", - "lastModified": "2014-11-14T13:59:02.060", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:10.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/653249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6731.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6731.json index b2a123aef44..7f84372b3c3 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6731.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6731.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6731", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.450", - "lastModified": "2014-11-14T13:59:03.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:10.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/367337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6732.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6732.json index 0acc64ee382..a51e7c0e632 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6732.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6732.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6732", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.497", - "lastModified": "2014-11-14T13:59:05.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:11.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/940833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6733.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6733.json index d81047671ec..f41f35b0fcb 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6733.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6733.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6733", "sourceIdentifier": "cret@cert.org", "published": "2014-09-26T10:55:05.543", - "lastModified": "2014-11-14T13:45:43.990", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:11.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/175057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6734.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6734.json index 6023eec3b54..7adfddc3397 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6734.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6734.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6734", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:02.547", - "lastModified": "2014-11-14T13:59:06.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:11.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/592265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6735.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6735.json index e920eeff5e8..7b375325a6a 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6735.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6735.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6735", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:02.610", - "lastModified": "2014-11-14T13:59:08.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:11.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/586897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6736.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6736.json index ee6c69f81d2..aa3a9dd2118 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6736.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6736.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6736", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:02.687", - "lastModified": "2014-11-14T13:59:09.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:11.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/959137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6737.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6737.json index 2bac5eccaa2..79456050bdf 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6737.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6737.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6737", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:02.767", - "lastModified": "2014-11-14T13:59:11.203", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:12.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/243257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6738.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6738.json index 1891daa2fba..baac9e46644 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6738.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6738.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6738", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:02.843", - "lastModified": "2014-11-14T13:59:12.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:12.187", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/532777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6739.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6739.json index 86826ba900c..9e433e3489d 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6739.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6739.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6739", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:02.923", - "lastModified": "2014-11-14T13:59:14.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:12.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/915401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6740.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6740.json index 8717e8a52b5..1c64be5de43 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6740.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6740.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6740", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:03.000", - "lastModified": "2014-11-14T13:59:18.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:12.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/952009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6741.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6741.json index c3e5218300d..f775dd82ce1 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6741.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6741.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6741", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:03.063", - "lastModified": "2014-11-14T13:59:20.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:12.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/316209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6742.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6742.json index a32bb459335..599edbb3605 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6742.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6742.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6742", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:03.140", - "lastModified": "2014-11-14T13:59:21.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:12.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/512361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6743.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6743.json index 5165e3d868a..8637225e3cc 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6743.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6743.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6743", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:03.203", - "lastModified": "2014-11-14T14:27:15.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:13.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/436329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6744.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6744.json index fc01feff69e..fc3d2be879a 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6744.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6744.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6744", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:03.280", - "lastModified": "2014-11-14T13:59:23.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:13.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/398049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6745.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6745.json index 7b74eecebbd..5baaff95937 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6745.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6745.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6745", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:03.360", - "lastModified": "2014-11-14T13:59:24.800", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:13.473", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/493793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6746.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6746.json index ed946c1124a..87fa9233cba 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6746.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6746.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6746", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:03.423", - "lastModified": "2014-11-14T13:59:26.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:13.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/228913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6747.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6747.json index 3ad1f78aa36..c1828e8a829 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6747.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6747.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6747", "sourceIdentifier": "cret@cert.org", "published": "2014-09-27T01:55:03.517", - "lastModified": "2014-11-14T13:59:27.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:13.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/439497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6748.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6748.json index 95ff9f2e02b..a1dcc0e30e9 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6748.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6748.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6748", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:05.597", - "lastModified": "2014-11-14T13:59:29.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:14.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/518609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6749.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6749.json index 857a3b68642..9cb6f45bb31 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6749.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6749.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6749", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:05.677", - "lastModified": "2014-11-14T13:59:30.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:14.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/109849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6750.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6750.json index d0d688a6d96..aa2b919e34d 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6750.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6750.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6750", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:05.753", - "lastModified": "2014-11-14T14:28:08.197", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:14.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/483233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6751.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6751.json index b79b3e99884..a1929ee4f10 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6751.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6751.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6751", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:05.833", - "lastModified": "2014-11-14T13:59:32.330", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:14.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/108881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6752.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6752.json index e754046deeb..1d2e34c97b6 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6752.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6752.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6752", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:05.910", - "lastModified": "2014-11-14T13:59:33.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:14.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/124193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6753.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6753.json index e766b6c478a..74868057fdb 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6753.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6753.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6753", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:06.003", - "lastModified": "2014-11-14T13:59:35.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:14.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/433513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6754.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6754.json index 1e7c62f35f3..f9055e7bda6 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6754.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6754.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6754", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:06.067", - "lastModified": "2014-11-14T13:59:36.987", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:15.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/159481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6755.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6755.json index 47006510a43..96044b57e6d 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6755.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6755.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6755", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:06.130", - "lastModified": "2014-11-14T13:59:38.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:15.387", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/381153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6756.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6756.json index ed1c936d4b0..066d093bd71 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6756.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6756.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6756", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:06.193", - "lastModified": "2014-11-14T13:59:40.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:15.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/534097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6757.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6757.json index 1f1fffb5f32..93184960767 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6757.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6757.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6757", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:06.253", - "lastModified": "2014-11-14T13:59:41.520", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:15.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/910385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6758.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6758.json index 61c56aaa175..68af062be10 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6758.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6758.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6758", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:06.317", - "lastModified": "2014-11-14T13:59:43.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:15.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/190897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6759.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6759.json index 897472d14c3..b03f7b324c0 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6759.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6759.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6759", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:06.397", - "lastModified": "2014-11-14T13:59:44.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:16.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/895865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6760.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6760.json index c4093096c39..c726c8c25cc 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6760.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6760.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6760", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:06.473", - "lastModified": "2014-11-14T13:59:46.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:16.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/234721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6761.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6761.json index e91d78e8060..41f82c1a28c 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6761.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6761.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6761", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.097", - "lastModified": "2014-11-14T13:59:47.553", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:16.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/482089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6762.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6762.json index 9cc4697e4e5..5e335407cd6 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6762.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6762.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6762", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.177", - "lastModified": "2014-11-14T13:59:49.100", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:16.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/283473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6763.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6763.json index 0c0e4493379..0192690d926 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6763.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6763.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6763", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.427", - "lastModified": "2014-11-14T13:59:50.710", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:16.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/590065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6764.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6764.json index 8a4bb01cc25..09902cef2cc 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6764.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6764.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6764", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.490", - "lastModified": "2014-11-14T13:59:52.397", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:17.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/576689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6765.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6765.json index 91f384d5e0c..3d271b823ac 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6765.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6765.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6765", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.567", - "lastModified": "2014-11-14T13:59:54.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:17.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/494937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6766.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6766.json index 6b48254464e..a100cc5f040 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6766.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6766.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6766", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.647", - "lastModified": "2014-11-14T13:59:55.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:17.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/750049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6767.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6767.json index c8f1edf7af5..590492ffd65 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6767.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6767.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6767", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.723", - "lastModified": "2014-11-14T13:35:42.877", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:17.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/811825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6768.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6768.json index ed9e25e8c5f..dd28225c02d 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6768.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6768.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6768", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.800", - "lastModified": "2014-11-14T13:59:56.993", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:17.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/610745", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6769.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6769.json index 32cef2d72f2..4d178237ba1 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6769.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6769.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6769", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.880", - "lastModified": "2014-11-14T13:59:58.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:18.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/995833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6770.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6770.json index bba788c8db3..fc61d820a56 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6770.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6770.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6770", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.943", - "lastModified": "2014-11-14T14:00:00.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:18.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/991345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6771.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6771.json index 11cd3a51b88..53ba771b851 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6771.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6771.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6771", "sourceIdentifier": "cret@cert.org", "published": "2014-09-28T01:55:07.990", - "lastModified": "2014-11-14T14:00:01.773", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:18.387", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/853361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6772.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6772.json index b0cfc789b64..d9e239e6da2 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6772.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6772.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6772", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:14.293", - "lastModified": "2014-11-14T14:00:07.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:18.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/780937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6773.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6773.json index c715360b618..19c80c4be51 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6773.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6773.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6773", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:14.340", - "lastModified": "2014-11-14T14:00:11.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:18.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/762017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6774.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6774.json index fa4b7f62c62..fd60ef8b8d0 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6774.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6774.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6774", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:14.513", - "lastModified": "2014-11-14T14:00:18.277", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:18.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/697601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6775.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6775.json index b2e85148261..ac06eb1aa76 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6775.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6775.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6775", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:14.573", - "lastModified": "2014-11-14T14:00:19.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:19.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/384585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6776.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6776.json index f07aec51d24..d76d8635624 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6776.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6776.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6776", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:14.653", - "lastModified": "2014-11-14T14:00:23.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:19.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/549937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6777.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6777.json index 4eafd75e4eb..684ef241cf9 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6777.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6777.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6777", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:14.730", - "lastModified": "2014-11-14T14:00:26.497", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:19.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/376577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6778.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6778.json index 173e90659ef..3903dc7ecaa 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6778.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6778.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6778", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:15.653", - "lastModified": "2014-11-14T14:00:27.810", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:19.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/120673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6779.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6779.json index 5460a978177..f3203b04d54 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6779.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6779.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6779", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:15.717", - "lastModified": "2014-11-14T14:00:29.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:19.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/781201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6780.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6780.json index 13454e53f0d..2e3532032a1 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6780.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6780.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6780", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:15.903", - "lastModified": "2014-11-14T13:42:28.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:20.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/407729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6781.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6781.json index b4715a86444..690651a7256 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6781.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6781.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6781", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:15.980", - "lastModified": "2014-11-14T14:00:30.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:20.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/421193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6782.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6782.json index c01fe16bd57..292d3109a7d 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6782.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6782.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6782", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:16.060", - "lastModified": "2014-11-14T14:00:32.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:20.473", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/126745", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6783.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6783.json index d74b5244bfd..733372b3c9c 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6783.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6783.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6783", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:16.153", - "lastModified": "2014-11-14T14:00:34.013", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:20.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/241849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6784.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6784.json index 087594d3bb9..938e7dabb31 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6784.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6784.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6784", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:16.217", - "lastModified": "2014-11-14T14:00:35.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:20.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/515705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6785.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6785.json index d5dd74cd8c5..a6ff9f9090d 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6785.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6785.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6785", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:16.403", - "lastModified": "2014-11-14T14:00:36.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:21.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/836553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6786.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6786.json index 5dc25f04302..bd22fd764f5 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6786.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6786.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6786", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:16.467", - "lastModified": "2014-11-14T14:00:38.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:21.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/424009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6787.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6787.json index c5b3910a389..b058f438fe9 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6787.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6787.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6787", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:16.560", - "lastModified": "2014-11-14T14:00:39.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:21.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/690033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6788.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6788.json index 6aa5378281c..5330576fb70 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6788.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6788.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6788", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:16.717", - "lastModified": "2014-11-14T14:00:41.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:21.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/359065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6789.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6789.json index daccc3e532f..2c957497d3a 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6789.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6789.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6789", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:16.777", - "lastModified": "2014-11-14T14:00:43.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:21.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/756033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6790.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6790.json index 5e74323553f..398bdd93789 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6790.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6790.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6790", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:16.857", - "lastModified": "2014-11-14T14:00:44.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:21.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/599393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6791.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6791.json index dca23bf793b..a9c8e905763 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6791.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6791.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6791", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:16.933", - "lastModified": "2014-11-14T14:00:46.093", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:22.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/322809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6792.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6792.json index e3bc551e120..0a80dee9149 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6792.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6792.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6792", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.027", - "lastModified": "2014-11-19T01:57:58.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:22.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/601153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6793.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6793.json index b5986f41480..09642e685ef 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6793.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6793.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6793", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.090", - "lastModified": "2014-11-14T14:00:49.140", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:22.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/778649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6794.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6794.json index 1f37a9688b2..cc40a3ec1bb 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6794.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6794.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6794", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.200", - "lastModified": "2014-11-14T14:00:50.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:22.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/891377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6795.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6795.json index 68ab02d2906..54a3b472192 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6795.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6795.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6795", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.277", - "lastModified": "2014-11-14T14:00:52.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:22.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/796073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6796.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6796.json index 2702f151e7c..3838263aab3 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6796.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6796.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6796", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.327", - "lastModified": "2014-11-14T14:00:53.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:23.047", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/745121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6797.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6797.json index 32f98e13379..cb3aedbefb8 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6797.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6797.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6797", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.433", - "lastModified": "2014-11-14T14:00:55.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:23.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/389425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6798.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6798.json index 9675d7b60b8..078e0570381 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6798.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6798.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6798", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.513", - "lastModified": "2014-11-14T14:00:56.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:23.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/762897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-67xx/CVE-2014-6799.json b/CVE-2014/CVE-2014-67xx/CVE-2014-6799.json index 3fdf97adde6..a6e9e51bab5 100644 --- a/CVE-2014/CVE-2014-67xx/CVE-2014-6799.json +++ b/CVE-2014/CVE-2014-67xx/CVE-2014-6799.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6799", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.577", - "lastModified": "2021-04-09T17:11:14.180", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:23.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/481297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6800.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6800.json index b129bf26f01..c7c5dc1668a 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6800.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6800.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6800", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.810", - "lastModified": "2014-11-14T14:01:00.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:23.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/154025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6801.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6801.json index eb64c5f56a4..59fdedf32ec 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6801.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6801.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6801", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.903", - "lastModified": "2014-11-14T14:01:01.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:23.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/106329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6802.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6802.json index 3ff390aee7b..2a722ccb15b 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6802.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6802.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6802", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:17.967", - "lastModified": "2014-11-14T14:01:03.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:24.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/539113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6803.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6803.json index cf3e01fb2e2..87c67345b1f 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6803.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6803.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6803", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:18.043", - "lastModified": "2014-11-14T14:01:04.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:24.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/918481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6804.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6804.json index aa07984853e..05f223a1d27 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6804.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6804.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6804", "sourceIdentifier": "cret@cert.org", "published": "2014-09-29T01:55:18.123", - "lastModified": "2014-11-14T14:01:06.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:24.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/959401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6805.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6805.json index ec74a12441e..829088d51fa 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6805.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6805.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6805", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:04.877", - "lastModified": "2014-11-14T14:01:08.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:24.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/555041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6806.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6806.json index c4c9a86d9ed..69dc73a4388 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6806.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6806.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6806", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:04.927", - "lastModified": "2014-11-14T14:01:09.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:24.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/787625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6807.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6807.json index 79132aa9eef..9c72fa45713 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6807.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6807.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6807", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:04.973", - "lastModified": "2014-11-14T14:01:11.223", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:25.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/428849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6808.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6808.json index fea803a710f..b38c711757f 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6808.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6808.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6808", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.037", - "lastModified": "2014-11-14T14:01:12.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:25.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/132025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6810.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6810.json index d2db7c28495..f49bea66ad5 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6810.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6810.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6810", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.067", - "lastModified": "2014-11-14T14:01:14.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:25.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/998561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6812.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6812.json index f361f394386..a48b432c53c 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6812.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6812.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6812", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.127", - "lastModified": "2014-11-14T14:01:15.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:25.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/607665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6813.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6813.json index e77cfb116b4..9e195d36579 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6813.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6813.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6813", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.177", - "lastModified": "2014-11-14T14:01:17.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:25.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/814817", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6814.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6814.json index 6b22fd072a5..28a339dc0f9 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6814.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6814.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6814", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.207", - "lastModified": "2014-11-14T14:01:18.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:26.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/365577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6815.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6815.json index ca337073241..1e418bae06c 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6815.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6815.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6815", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.253", - "lastModified": "2014-11-14T14:01:20.223", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:26.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/249681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6816.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6816.json index e0c89c5c376..840418e259f 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6816.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6816.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6816", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.300", - "lastModified": "2014-11-14T14:01:21.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:26.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/401305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6817.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6817.json index ac18ba229f2..2b3947631af 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6817.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6817.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6817", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.347", - "lastModified": "2014-11-14T14:01:23.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:26.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/322545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6818.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6818.json index bb510778938..c12911e1a96 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6818.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6818.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6818", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.393", - "lastModified": "2014-11-14T14:01:24.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:26.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/536913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6819.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6819.json index fb9cb7b7f5c..e07c59a32e4 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6819.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6819.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6819", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.457", - "lastModified": "2014-11-14T14:01:26.303", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:27.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/625881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6820.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6820.json index e7265da3ef8..19f0ad895b6 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6820.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6820.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6820", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.503", - "lastModified": "2014-11-14T14:01:27.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:27.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/580913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6821.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6821.json index 1a637601b41..2f80bef7968 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6821.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6821.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6821", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.550", - "lastModified": "2014-11-14T14:01:29.287", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:27.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/991433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6822.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6822.json index 2bdc695564e..e323756cb4c 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6822.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6822.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6822", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.597", - "lastModified": "2014-11-14T14:01:30.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:27.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/473289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6823.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6823.json index 3e6b60fa39f..db3a9a98a70 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6823.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6823.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6823", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.643", - "lastModified": "2014-11-14T14:01:32.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:27.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/393649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6824.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6824.json index aeb06589693..62cc94042ce 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6824.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6824.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6824", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.690", - "lastModified": "2014-11-14T14:01:33.790", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:27.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/742481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6825.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6825.json index 0d8a89b0792..549b22f3f0c 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6825.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6825.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6825", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.737", - "lastModified": "2014-11-14T14:01:35.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:28.113", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/957289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6826.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6826.json index 3911e02e21d..755f8ae6025 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6826.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6826.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6826", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.787", - "lastModified": "2014-11-14T14:01:36.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:28.287", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/741249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6827.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6827.json index d84b5bfb399..cbc5202c222 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6827.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6827.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6827", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.833", - "lastModified": "2014-11-14T14:01:38.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:28.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/358185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6828.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6828.json index a1a26794830..4255abb7b53 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6828.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6828.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6828", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.877", - "lastModified": "2014-11-14T14:01:40.103", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:28.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/321665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6829.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6829.json index 35a0b77e5db..9234157b92c 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6829.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6829.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6829", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.927", - "lastModified": "2014-11-14T14:01:41.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:28.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/934321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6830.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6830.json index 7b14a64872e..12d9288de8b 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6830.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6830.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6830", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:05.973", - "lastModified": "2014-11-14T14:01:43.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:29.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/712825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6831.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6831.json index d064f6a3137..7536f130955 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6831.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6831.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6831", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:06.037", - "lastModified": "2014-11-14T14:01:44.603", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:29.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/635737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6832.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6832.json index a9c9bb57c60..eed1ea5fba6 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6832.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6832.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6832", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:06.083", - "lastModified": "2014-11-14T14:01:46.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:29.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/505761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6833.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6833.json index 8338345d481..9d8a7be755c 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6833.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6833.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6833", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:06.127", - "lastModified": "2014-11-14T14:01:47.587", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:29.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/996889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6834.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6834.json index 86e247e4efc..dc1832f8a1a 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6834.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6834.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6834", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:06.177", - "lastModified": "2014-11-14T15:23:44.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:29.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/262529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6835.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6835.json index c9728df9aff..c72b63bb9aa 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6835.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6835.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6835", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:06.223", - "lastModified": "2014-11-14T14:01:51.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:29.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/813145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6836.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6836.json index 5debe1f493a..d92a6c21412 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6836.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6836.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6836", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T10:55:06.270", - "lastModified": "2014-11-14T14:29:16.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:30.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/847817", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6837.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6837.json index be5b816add1..e1684d0e6c3 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6837.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6837.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6837", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:02.700", - "lastModified": "2014-11-14T14:01:53.903", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:30.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/883633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6838.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6838.json index ce9708f0990..bd2e1c7afc1 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6838.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6838.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6838", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:02.760", - "lastModified": "2014-11-14T14:01:55.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:30.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/167577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6839.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6839.json index 2867756bd72..b0f8ec9cfdf 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6839.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6839.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6839", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:02.807", - "lastModified": "2014-11-14T14:01:57.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:30.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/671641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6840.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6840.json index 95184221fc4..a72fa9cae96 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6840.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6840.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6840", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:02.857", - "lastModified": "2014-11-14T14:01:58.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:30.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/541929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6841.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6841.json index eef4ccff354..7d4696ae54e 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6841.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6841.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6841", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:02.903", - "lastModified": "2014-11-14T14:02:00.060", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:31.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/201457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6842.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6842.json index b00d28387d0..a852b352c7f 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6842.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6842.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6842", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:02.950", - "lastModified": "2014-11-14T14:02:01.577", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:31.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/698921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6843.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6843.json index 8f8843f0ab9..29ffe8a93d0 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6843.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6843.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6843", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:02.997", - "lastModified": "2014-11-14T14:02:03.043", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:31.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/803641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6844.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6844.json index e74fd636a8b..41d8248566b 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6844.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6844.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6844", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:03.057", - "lastModified": "2014-11-14T14:02:04.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:31.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/717401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6845.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6845.json index 706f1c509be..1a9644d0bbd 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6845.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6845.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6845", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:03.107", - "lastModified": "2014-11-14T14:02:06.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:31.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/318849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6846.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6846.json index 6f72151e630..8b11e7948a7 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6846.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6846.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6846", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:03.153", - "lastModified": "2014-11-14T14:02:07.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:32.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/300105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6847.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6847.json index 53df89f9f09..ee454ff6965 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6847.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6847.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6847", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:03.217", - "lastModified": "2014-11-14T14:02:09.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:32.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/279689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6848.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6848.json index e116d797e5b..0535d529db2 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6848.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6848.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6848", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:03.263", - "lastModified": "2014-11-14T14:02:11.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:32.387", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/954825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6850.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6850.json index 5196942ef5d..34f5bbb93c1 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6850.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6850.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6850", "sourceIdentifier": "cret@cert.org", "published": "2014-09-30T17:55:03.307", - "lastModified": "2014-11-14T14:02:12.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:32.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/497841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6851.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6851.json index 17c7e68b017..86a6b12ddfb 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6851.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6851.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6851", "sourceIdentifier": "cret@cert.org", "published": "2014-10-01T01:55:12.093", - "lastModified": "2014-11-14T14:02:17.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:32.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/336889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6852.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6852.json index 64e59947d2a..1cdc08d134b 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6852.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6852.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6852", "sourceIdentifier": "cret@cert.org", "published": "2014-10-01T01:55:12.170", - "lastModified": "2014-11-14T14:02:18.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:32.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/943473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6853.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6853.json index a836694685e..fa56a31abf3 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6853.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6853.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6853", "sourceIdentifier": "cret@cert.org", "published": "2014-10-01T01:55:12.310", - "lastModified": "2014-11-14T14:02:20.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:33.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/715905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6854.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6854.json index efe51f877af..fc1edef4202 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6854.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6854.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6854", "sourceIdentifier": "cret@cert.org", "published": "2014-10-01T01:55:12.390", - "lastModified": "2014-11-14T14:02:21.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:33.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/672609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6855.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6855.json index f4b4b3dc39c..e098ad3cc28 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6855.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6855.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6855", "sourceIdentifier": "cret@cert.org", "published": "2014-10-01T01:55:12.467", - "lastModified": "2014-11-14T14:02:23.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:33.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/410897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6856.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6856.json index 7ccb9d47110..58c8793aaf6 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6856.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6856.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6856", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:05.750", - "lastModified": "2014-11-14T14:02:24.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:33.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/777769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6857.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6857.json index ab6a7226dd5..551ef26f423 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6857.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6857.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6857", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:05.827", - "lastModified": "2014-11-14T14:02:26.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:33.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/730777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6858.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6858.json index a8bc5a99df2..756c7cb2084 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6858.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6858.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6858", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:05.873", - "lastModified": "2014-11-14T14:02:27.783", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:34.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/873337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6859.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6859.json index 19e89fc513d..c373ece441c 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6859.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6859.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6859", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:05.920", - "lastModified": "2014-11-14T14:02:29.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:34.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/139505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6860.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6860.json index 968693b8f08..c0543e08f01 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6860.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6860.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6860", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:05.967", - "lastModified": "2014-11-14T14:02:30.753", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:34.433", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/785513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6861.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6861.json index 063882d0a4b..fe829bd4a71 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6861.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6861.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6861", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.017", - "lastModified": "2014-11-14T14:02:32.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:34.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/901585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6862.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6862.json index 405bdbd1032..1af579e2355 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6862.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6862.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6862", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.060", - "lastModified": "2014-11-14T14:02:33.753", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:34.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/244137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6863.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6863.json index 9bb366d219c..8572c1a081e 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6863.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6863.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6863", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.107", - "lastModified": "2014-11-14T14:02:36.503", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:34.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/413625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6864.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6864.json index eade40b867e..9363e0f8ac7 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6864.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6864.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6864", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.157", - "lastModified": "2014-11-14T14:02:38.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:35.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/327737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6865.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6865.json index d6587d4a7ca..eea02b0cdba 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6865.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6865.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6865", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.203", - "lastModified": "2014-11-14T14:02:39.503", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:35.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/518257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6866.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6866.json index a0f4a924f0b..ba461e9bc73 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6866.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6866.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6866", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.250", - "lastModified": "2014-11-14T14:02:40.877", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:35.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/660201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6867.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6867.json index 208b5ae080f..427411f8518 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6867.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6867.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6867", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.297", - "lastModified": "2014-11-14T14:02:42.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:35.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/919361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6868.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6868.json index 5067ac73e8f..62675000bb4 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6868.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6868.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6868", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.343", - "lastModified": "2014-11-14T14:02:43.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:35.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/981313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6869.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6869.json index bc6aa5ada98..b5ec4583b81 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6869.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6869.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6869", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.390", - "lastModified": "2014-11-14T15:30:34.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:36.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/703849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6870.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6870.json index df90e7dfd2e..549c32ee3ee 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6870.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6870.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6870", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.453", - "lastModified": "2014-11-14T14:02:46.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:36.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/889881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6871.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6871.json index cc0101eab08..219620e88ce 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6871.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6871.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6871", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.483", - "lastModified": "2014-11-14T14:02:48.300", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:36.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/705345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6872.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6872.json index 869eb594d9c..bfc57c0e254 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6872.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6872.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6872", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.530", - "lastModified": "2014-11-14T14:02:49.803", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:36.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/382649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6873.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6873.json index 99cd3f95de5..07927f22a50 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6873.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6873.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6873", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.577", - "lastModified": "2014-11-14T14:02:51.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:36.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/318585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6874.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6874.json index 24ea1a53d81..5eaddf31e7b 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6874.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6874.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6874", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.623", - "lastModified": "2014-11-14T14:02:52.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:36.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/880817", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6875.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6875.json index fb42f5115c3..0efb0cf3be9 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6875.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6875.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6875", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.687", - "lastModified": "2014-11-14T14:02:54.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:37.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/979553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6876.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6876.json index f19625c9e90..dcc0c6a3ee1 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6876.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6876.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6876", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.733", - "lastModified": "2014-11-14T14:02:55.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:37.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/636705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6877.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6877.json index 0bd5700737f..db7cc45e456 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6877.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6877.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6877", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.780", - "lastModified": "2014-11-14T14:02:57.023", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:37.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/315417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6878.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6878.json index 8bcaab76bb6..68f16be604e 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6878.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6878.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6878", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.827", - "lastModified": "2014-11-14T14:02:58.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:37.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/740721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6879.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6879.json index 396504560f9..643b5a2b1e6 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6879.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6879.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6879", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.873", - "lastModified": "2014-11-14T14:03:00.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:37.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/275641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6880.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6880.json index 9e001aebf24..9d36a7ae5e1 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6880.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6880.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6880", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.920", - "lastModified": "2014-11-14T14:03:01.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:38.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/648673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6881.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6881.json index f37ea674093..2f998b38d1b 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6881.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6881.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6881", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:06.967", - "lastModified": "2014-10-16T07:27:09.123", + "lastModified": "2024-11-21T02:15:38.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "La aplicaci\u00f3n PNC Virtual Wallet (tambi\u00e9n conocido como com.pnc.ecommerce.mobile.vw.android) 2.1.1 para Android no verifica los certificados X.509 de los servidores SSL, lo que permite a atacantes man-in-the-middle falsificar servidores y obtener informaci\u00f3n sensible a trav\u00e9s de un certificado manipulado." } ], - "vendorComments": [ - { - "organization": "PNC", - "comment": "The PNC Virtual Wallet (aka com.pnc.ecommerce.mobile.vw.android application 2.1.1 for Android has been replaced by PNC Virtual Wallet 2.2. Version 2.1.1 is no longer available for use.\"\n", - "lastModified": "2014-10-08T13:39:01.687" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -105,6 +97,39 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/168457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "PNC", + "comment": "The PNC Virtual Wallet (aka com.pnc.ecommerce.mobile.vw.android application 2.1.1 for Android has been replaced by PNC Virtual Wallet 2.2. Version 2.1.1 is no longer available for use.\"\n", + "lastModified": "2014-10-08T13:39:01.687" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6882.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6882.json index eb362aeb561..10135663d52 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6882.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6882.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6882", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:07.017", - "lastModified": "2014-11-14T14:03:03.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:38.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/249417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6883.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6883.json index e8c7e44452c..12949a2e8df 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6883.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6883.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6883", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:07.063", - "lastModified": "2014-11-14T14:03:04.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:38.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/373057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6884.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6884.json index cd5e2325ee8..e2919b554a0 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6884.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6884.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6884", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:07.107", - "lastModified": "2014-11-14T14:03:06.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:38.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/563313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6885.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6885.json index 05eed2d4228..3876d143b4b 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6885.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6885.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6885", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:07.170", - "lastModified": "2014-11-14T14:33:22.013", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:38.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/274409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6886.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6886.json index 62ffbf59a6a..f959b24ed58 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6886.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6886.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6886", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:07.203", - "lastModified": "2014-11-14T14:03:07.790", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:39.093", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/943209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6887.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6887.json index 875dd8a2296..1c0266c9162 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6887.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6887.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6887", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:03.867", - "lastModified": "2014-11-14T14:04:15.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:39.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/898329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6888.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6888.json index 44278914f1a..0310ce69d8f 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6888.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6888.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6888", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:07.250", - "lastModified": "2014-11-14T14:03:09.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:39.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/277577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6889.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6889.json index 1d8853e1b35..816f2426477 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6889.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6889.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6889", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:07.327", - "lastModified": "2014-11-14T14:03:10.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:39.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/427089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6890.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6890.json index a7cadf189ec..f767378e52c 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6890.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6890.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6890", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:07.357", - "lastModified": "2014-11-14T14:34:29.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:39.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/367777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6891.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6891.json index 31efa8914c1..536f5722c36 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6891.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6891.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6891", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:04.367", - "lastModified": "2014-11-14T14:04:17.253", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:40.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/589977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6892.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6892.json index 7206dd5e71a..cd06c10c000 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6892.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6892.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6892", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:07.407", - "lastModified": "2014-11-14T14:03:12.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:40.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/141265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6893.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6893.json index 72757424f58..fbccfc11237 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6893.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6893.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6893", "sourceIdentifier": "cret@cert.org", "published": "2014-10-02T10:55:07.453", - "lastModified": "2014-11-14T14:03:13.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:40.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/781025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6894.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6894.json index 119b330b262..b148e9d6efc 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6894.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6894.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6894", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:07.500", - "lastModified": "2014-11-14T14:03:15.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:40.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/577041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6895.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6895.json index fba65e95f0b..24bd5a6bc57 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6895.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6895.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6895", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:07.610", - "lastModified": "2014-11-14T14:03:16.883", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:40.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/531985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6896.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6896.json index 6d91e129315..a2ae3bd1a05 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6896.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6896.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6896", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:07.690", - "lastModified": "2014-11-14T14:03:18.337", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:40.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/281009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6897.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6897.json index eab3d559d45..ff171330437 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6897.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6897.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6897", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:07.737", - "lastModified": "2014-11-14T14:03:20.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:41.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/970665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6898.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6898.json index 7d1fafc4073..6ca19cec9aa 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6898.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6898.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6898", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:07.847", - "lastModified": "2014-11-14T14:03:22.137", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:41.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/670057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-68xx/CVE-2014-6899.json b/CVE-2014/CVE-2014-68xx/CVE-2014-6899.json index 85ab6e53daa..1d89c7910b5 100644 --- a/CVE-2014/CVE-2014-68xx/CVE-2014-6899.json +++ b/CVE-2014/CVE-2014-68xx/CVE-2014-6899.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6899", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:07.923", - "lastModified": "2014-11-14T14:03:23.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:41.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/905193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6900.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6900.json index f9de351930a..fc22c7d5222 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6900.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6900.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6900", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:08.000", - "lastModified": "2014-11-14T14:03:25.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:41.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/363289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6901.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6901.json index 07d95e1db54..456805bc075 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6901.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6901.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6901", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:08.267", - "lastModified": "2014-11-14T14:03:26.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:41.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/857145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6902.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6902.json index 6362d49c9c3..1fd4ef11411 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6902.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6902.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6902", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:08.347", - "lastModified": "2014-11-14T14:03:28.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:42.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/968289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6903.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6903.json index b43a976a528..5aed932de3b 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6903.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6903.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6903", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:08.423", - "lastModified": "2014-11-14T14:03:29.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:42.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/215273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6904.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6904.json index 9f1369e0508..bd2505830d3 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6904.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6904.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6904", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:04.443", - "lastModified": "2014-11-14T14:04:18.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:42.387", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/479537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6905.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6905.json index 12ee7cef193..a9f8f598bb0 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6905.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6905.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6905", "sourceIdentifier": "cret@cert.org", "published": "2014-10-03T01:55:08.503", - "lastModified": "2014-11-14T14:03:31.043", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:42.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/895249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6906.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6906.json index ad60edaa083..0c5c5422e34 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6906.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6906.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6906", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:02.537", - "lastModified": "2014-11-14T14:03:32.607", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:42.747", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/438969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6907.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6907.json index 3be2f6ef21d..963b4223253 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6907.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6907.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6907", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:02.600", - "lastModified": "2014-11-14T14:03:34.123", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:42.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/455865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6908.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6908.json index 6da90af5594..bd608661f1f 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6908.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6908.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6908", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:02.647", - "lastModified": "2014-11-14T14:03:35.683", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:43.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/948753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6909.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6909.json index f98bfb941ed..78e7500da5d 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6909.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6909.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6909", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:02.693", - "lastModified": "2014-11-14T14:03:37.263", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:43.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/569297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6910.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6910.json index 189a5506278..322c03326c5 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6910.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6910.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6910", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:02.740", - "lastModified": "2014-11-14T14:03:38.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:43.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/805137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6911.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6911.json index cba530fbcf7..86a144289b3 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6911.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6911.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6911", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:02.787", - "lastModified": "2014-11-14T14:03:40.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:43.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/871313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6912.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6912.json index 78b4788a467..45eed80171e 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6912.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6912.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6912", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:02.833", - "lastModified": "2014-11-14T14:03:41.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:43.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/382561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6913.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6913.json index 3af62d22aa7..2fee36c6f0a 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6913.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6913.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6913", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:02.880", - "lastModified": "2014-11-14T14:03:43.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:44.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/420929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6914.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6914.json index bc13c6f6769..e13b0bc9550 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6914.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6914.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6914", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:02.927", - "lastModified": "2014-11-14T14:03:44.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:44.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/182185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6916.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6916.json index c34adbbb7be..f584ec17fc9 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6916.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6916.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6916", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:02.990", - "lastModified": "2014-11-14T14:03:46.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:44.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/799329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6917.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6917.json index 3dd2be0e23f..0c5ec8b9d33 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6917.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6917.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6917", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.037", - "lastModified": "2014-11-14T14:03:47.953", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:44.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/939601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6918.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6918.json index 918055a0b1a..2076c65d14b 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6918.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6918.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6918", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.083", - "lastModified": "2014-11-14T14:03:49.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:44.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/299841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6919.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6919.json index 1bdeeca47c7..0339c9ce1ab 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6919.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6919.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6919", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.130", - "lastModified": "2014-11-14T14:03:51.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:44.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/542369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6920.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6920.json index 02cff88c9a9..8179392545f 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6920.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6920.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6920", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.160", - "lastModified": "2014-11-14T14:03:52.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:45.113", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/520985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6921.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6921.json index b639ba6d455..a8de2c8e9d5 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6921.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6921.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6921", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.207", - "lastModified": "2014-11-14T14:03:54.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:45.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/373849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6922.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6922.json index a66c0b3e8ba..f8b0f8c6389 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6922.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6922.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6922", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.257", - "lastModified": "2014-11-14T14:03:55.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:45.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/662841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6923.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6923.json index 2bf9156c1d1..983f6c790bb 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6923.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6923.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6923", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.303", - "lastModified": "2014-11-14T14:03:57.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:45.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/278193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6924.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6924.json index a2678bb6376..b1c421e2e40 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6924.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6924.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6924", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.350", - "lastModified": "2014-11-14T14:03:58.923", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:45.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/666801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6925.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6925.json index d3344379724..95b8a569ab1 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6925.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6925.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6925", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.397", - "lastModified": "2014-11-14T14:04:00.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:46.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/625705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6926.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6926.json index 4c3f99d99fc..5f6b7c04334 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6926.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6926.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6926", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.443", - "lastModified": "2014-11-14T14:04:01.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:46.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/827577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6927.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6927.json index 72af587ce91..974e3dbbd01 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6927.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6927.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6927", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.490", - "lastModified": "2014-11-14T14:35:34.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:46.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/279777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6928.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6928.json index 4fb3467a595..ea240659d0f 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6928.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6928.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6928", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.537", - "lastModified": "2014-11-14T14:04:03.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:46.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/943121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6929.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6929.json index 64d0e797017..114aed008e7 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6929.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6929.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6929", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.583", - "lastModified": "2014-11-14T14:04:05.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:46.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/104657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6930.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6930.json index b7086a5b5e6..adca052edb0 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6930.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6930.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6930", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.630", - "lastModified": "2014-11-14T14:04:06.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:46.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/951217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6931.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6931.json index 73b0a6a3396..e3c64eaf60a 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6931.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6931.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6931", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.677", - "lastModified": "2014-11-14T14:04:08.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:47.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/404297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6932.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6932.json index 4391edf5172..0eede476918 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6932.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6932.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6932", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.723", - "lastModified": "2014-11-14T14:04:09.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:47.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/655625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6933.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6933.json index e081843dbc6..25be73c66bd 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6933.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6933.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6933", "sourceIdentifier": "cret@cert.org", "published": "2014-10-04T10:55:03.787", - "lastModified": "2014-11-14T14:04:11.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:47.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/766593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6934.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6934.json index 1d80419971f..73aa9345b36 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6934.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6934.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6934", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:13.507", - "lastModified": "2014-11-14T14:04:20.333", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:47.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/398577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6935.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6935.json index 7bceab53d1d..80a36e0b985 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6935.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6935.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6935", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:13.570", - "lastModified": "2014-11-14T14:04:21.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:47.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/768793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6936.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6936.json index bcf4fd37ecc..7e42821a944 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6936.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6936.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6936", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:13.647", - "lastModified": "2014-11-14T14:04:23.410", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:48.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/112753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6937.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6937.json index 598ed446529..ab20b540dbc 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6937.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6937.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6937", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:13.743", - "lastModified": "2014-11-14T14:04:24.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:48.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/907041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6938.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6938.json index 9cf249753d3..0a11f6795b1 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6938.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6938.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6938", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:13.960", - "lastModified": "2014-11-14T14:04:26.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:48.493", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/242289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6939.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6939.json index 426a222a8ba..0f32bbfe264 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6939.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6939.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6939", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:14.040", - "lastModified": "2014-11-14T14:04:28.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:48.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/556625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6940.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6940.json index d90b21cb61d..1bfa00a2d3d 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6940.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6940.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6940", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:14.117", - "lastModified": "2014-11-14T14:04:30.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:48.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/253289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6941.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6941.json index 331f55337bb..f2e26b75b9b 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6941.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6941.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6941", "sourceIdentifier": "cret@cert.org", "published": "2014-10-11T01:55:14.367", - "lastModified": "2014-11-14T14:04:32.287", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:49.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/220641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6942.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6942.json index 7add06affd1..2271c39061f 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6942.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6942.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6942", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:08.800", - "lastModified": "2014-11-14T14:04:33.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:49.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/910649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6943.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6943.json index 705b25d667a..4bb86089d60 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6943.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6943.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6943", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:08.847", - "lastModified": "2014-11-14T14:04:35.303", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:49.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/383441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6944.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6944.json index 74edb92400c..d7d25b5e92d 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6944.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6944.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6944", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:08.897", - "lastModified": "2014-11-14T14:04:36.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:49.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/869817", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6945.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6945.json index 2bb5e2ffc4c..742c491847e 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6945.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6945.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6945", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:08.943", - "lastModified": "2014-11-14T14:04:38.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:49.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/185793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6946.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6946.json index b4cc78cac5c..67700495ce1 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6946.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6946.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6946", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:09.007", - "lastModified": "2014-11-14T14:36:27.060", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:49.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/283561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6947.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6947.json index 99e8cd9977c..9ee452d2d76 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6947.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6947.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6947", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:09.050", - "lastModified": "2014-11-14T14:04:39.773", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:50.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/133961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6948.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6948.json index 47e4cd1a58f..6040812bf28 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6948.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6948.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6948", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:09.097", - "lastModified": "2014-11-14T14:04:41.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:50.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/286289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6949.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6949.json index b34b4571619..d7eab7eef32 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6949.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6949.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6949", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:09.147", - "lastModified": "2014-11-14T14:04:42.790", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:50.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/173121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6950.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6950.json index beaa8fe3754..13308661290 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6950.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6950.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6950", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:09.193", - "lastModified": "2014-11-14T14:04:44.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:50.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/481825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6951.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6951.json index a90131194c9..4286c179c3b 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6951.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6951.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6951", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:09.240", - "lastModified": "2014-11-14T14:04:45.853", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:50.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/321753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6952.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6952.json index 1cae889aa28..5d34a9c2e2f 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6952.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6952.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6952", "sourceIdentifier": "cret@cert.org", "published": "2014-10-15T10:55:09.287", - "lastModified": "2014-11-14T14:04:47.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:51.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/209465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6953.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6953.json index b722f45c3ea..1c0cbb30011 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6953.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6953.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6953", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.470", - "lastModified": "2014-11-14T14:04:50.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:51.287", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/495025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6954.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6954.json index c63d548b6f3..604dbcfa0ac 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6954.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6954.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6954", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.517", - "lastModified": "2014-11-14T14:37:28.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:51.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/289545", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6955.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6955.json index 7f5a3421526..2c686589482 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6955.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6955.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6955", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.567", - "lastModified": "2014-11-14T14:04:51.853", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:51.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/988001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6956.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6956.json index 42ecf6f251a..34a9ac3a3a9 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6956.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6956.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6956", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.613", - "lastModified": "2014-11-14T14:04:53.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:51.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/735617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6957.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6957.json index 71eb6badd42..bcf0eb9fc8a 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6957.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6957.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6957", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.660", - "lastModified": "2014-11-14T14:04:54.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:52.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/354841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6958.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6958.json index f2075c81f0e..5697895dd20 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6958.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6958.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6958", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.707", - "lastModified": "2014-11-14T14:04:56.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:52.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/644449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6959.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6959.json index 2bf44f5919a..4fe08e74cc0 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6959.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6959.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6959", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.753", - "lastModified": "2014-11-14T14:04:58.043", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:52.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/199609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6960.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6960.json index a4d7c3b10fe..832a2bb4e3b 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6960.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6960.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6960", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.800", - "lastModified": "2014-11-14T14:04:59.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:52.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/730073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6961.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6961.json index 1d17292cc6d..4c16e68c640 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6961.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6961.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6961", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.847", - "lastModified": "2014-11-14T14:05:01.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:52.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/315505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6962.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6962.json index 878353c85a7..70e487b2cc8 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6962.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6962.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6962", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.893", - "lastModified": "2014-11-14T14:05:02.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:53.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/366457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6963.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6963.json index 1da901146c5..8385fefce7a 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6963.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6963.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6963", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:08.940", - "lastModified": "2014-11-14T14:05:04.277", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:53.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/269921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6964.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6964.json index 012d062a507..e9b05a7b5e0 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6964.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6964.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6964", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.003", - "lastModified": "2014-11-14T14:05:05.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:53.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/589273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6965.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6965.json index 5d1fa89dba9..cfa5796a7bf 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6965.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6965.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6965", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.050", - "lastModified": "2014-11-14T14:05:07.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:53.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/824761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6966.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6966.json index bb193a18028..a99c5de9bdd 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6966.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6966.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6966", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.097", - "lastModified": "2014-11-14T14:05:08.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:53.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/402889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6967.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6967.json index 776417c2d6e..7a735da3465 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6967.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6967.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6967", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.143", - "lastModified": "2014-11-14T14:05:10.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:53.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/732185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6968.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6968.json index f357fd650c4..08ace8bf2db 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6968.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6968.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6968", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.207", - "lastModified": "2014-11-14T14:05:11.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:54.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/113545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6969.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6969.json index ff91aa4688b..fcfc54e16be 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6969.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6969.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6969", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.253", - "lastModified": "2014-11-14T14:05:13.310", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:54.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/130265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6970.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6970.json index 9dbfab4532f..ca5744c9724 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6970.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6970.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6970", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.300", - "lastModified": "2014-11-14T14:05:14.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:54.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/795545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6971.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6971.json index d9d76d8d9a1..0573b17c47c 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6971.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6971.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6971", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.330", - "lastModified": "2014-11-14T14:05:16.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:54.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/921561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6972.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6972.json index 4217359bfa1..f10e017de5a 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6972.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6972.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6972", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.393", - "lastModified": "2014-11-14T15:22:46.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:54.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/751369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6973.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6973.json index 0884444dc73..014c52abf02 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6973.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6973.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6973", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.440", - "lastModified": "2014-11-14T14:05:19.233", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:55.103", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/543689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6974.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6974.json index 8cbad7589e7..77d04e22110 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6974.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6974.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6974", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.503", - "lastModified": "2014-11-14T14:05:20.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:55.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/827401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6975.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6975.json index 0cb6e40e7f1..0f836feb0cd 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6975.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6975.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6975", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.550", - "lastModified": "2014-11-14T14:05:22.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:55.473", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/913201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6976.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6976.json index a439f81c59b..26d182e77fa 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6976.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6976.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6976", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.597", - "lastModified": "2014-11-14T14:05:23.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:55.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/648145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6977.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6977.json index 122a51ad5e6..a5097e83494 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6977.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6977.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6977", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.643", - "lastModified": "2014-11-14T14:05:25.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:55.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/970753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6978.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6978.json index 40476a73ac6..7b9347d4718 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6978.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6978.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6978", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.690", - "lastModified": "2014-11-14T14:05:26.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:56.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/642337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6979.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6979.json index 637ab9a898e..2159d34a905 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6979.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6979.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6979", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.753", - "lastModified": "2014-11-14T14:05:28.093", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:56.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/714145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6980.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6980.json index aa94d5a94a6..fda63544adb 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6980.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6980.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6980", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.800", - "lastModified": "2014-11-14T14:05:29.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:56.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/431929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6981.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6981.json index 1cd61148319..0c13211a8bb 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6981.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6981.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6981", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.847", - "lastModified": "2014-11-14T14:05:31.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:56.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/298873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6982.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6982.json index 95a6a7edb29..d5830b7be48 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6982.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6982.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6982", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.893", - "lastModified": "2014-11-14T15:31:37.423", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:56.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/422689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6983.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6983.json index fbe453f8005..8e18233aa44 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6983.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6983.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6983", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.940", - "lastModified": "2014-11-14T14:05:34.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:56.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/833121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6984.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6984.json index c84ab9fd27e..f034a3c268e 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6984.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6984.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6984", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:09.987", - "lastModified": "2014-11-14T14:05:35.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:57.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/632305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6985.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6985.json index c62fe89d7f9..bd5844aa0fb 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6985.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6985.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6985", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.033", - "lastModified": "2014-11-14T14:05:37.393", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:57.347", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/895601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6986.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6986.json index 7eb2b6db878..718f4be4f27 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6986.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6986.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6986", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.097", - "lastModified": "2014-11-14T14:05:39.253", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:57.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/504969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6987.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6987.json index 220eb45b2e3..1bb92ccc719 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6987.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6987.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6987", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.143", - "lastModified": "2014-11-14T14:05:41.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:57.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/194153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6988.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6988.json index 4665e3125f5..48f1315ca99 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6988.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6988.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6988", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.190", - "lastModified": "2014-11-14T14:05:42.613", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:57.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/726201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6989.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6989.json index 4219d101f0c..fd62117a6c4 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6989.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6989.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6989", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.253", - "lastModified": "2014-11-14T14:05:44.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:58.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/307321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6990.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6990.json index c3af943925e..7634a1073a6 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6990.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6990.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6990", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.317", - "lastModified": "2014-11-14T14:05:45.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:58.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/561289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6991.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6991.json index 25c49a0f619..7de322f5b82 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6991.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6991.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6991", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.363", - "lastModified": "2014-11-14T14:05:47.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:58.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/194417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6992.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6992.json index 93f98465fc5..4aa9e3e132b 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6992.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6992.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6992", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.410", - "lastModified": "2014-11-14T14:05:48.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:58.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/623241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6993.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6993.json index 7c3796412ba..7c2f423a2e9 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6993.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6993.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6993", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.457", - "lastModified": "2014-11-14T14:05:49.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:58.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/269569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6994.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6994.json index 978e86bb5b4..1525dec3e38 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6994.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6994.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6994", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.503", - "lastModified": "2014-11-14T14:05:51.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:58.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/277665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6995.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6995.json index 37402939a26..67a9728ed2e 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6995.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6995.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6995", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.550", - "lastModified": "2014-11-14T14:05:52.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:59.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/308641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6996.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6996.json index 67f98783c78..0a9053e0a9b 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6996.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6996.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6996", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.580", - "lastModified": "2014-11-14T14:05:54.380", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:59.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/176201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6997.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6997.json index d2c4fd7b9d0..6f2a6dd7da5 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6997.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6997.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6997", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.627", - "lastModified": "2014-11-14T14:05:55.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:59.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/590153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6998.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6998.json index e93480b4c6b..759da9e94ce 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6998.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6998.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6998", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.660", - "lastModified": "2014-11-14T14:05:57.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:59.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/113017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-69xx/CVE-2014-6999.json b/CVE-2014/CVE-2014-69xx/CVE-2014-6999.json index 6b59b56ea99..87f844bd1a2 100644 --- a/CVE-2014/CVE-2014-69xx/CVE-2014-6999.json +++ b/CVE-2014/CVE-2014-69xx/CVE-2014-6999.json @@ -2,9 +2,8 @@ "id": "CVE-2014-6999", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.707", - "lastModified": "2014-11-14T14:05:58.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:15:59.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/697689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7000.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7000.json index 33f6d6421dd..efad8e843ef 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7000.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7000.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7000", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.737", - "lastModified": "2014-11-14T14:06:00.413", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:00.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/194593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7001.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7001.json index 9b27d0c6564..7c33c2bab06 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7001.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7001.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7001", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.770", - "lastModified": "2014-11-14T14:06:01.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:00.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/113897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7002.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7002.json index 8f909aaf155..36090c51f41 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7002.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7002.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7002", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.817", - "lastModified": "2014-11-14T14:06:03.413", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:00.433", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/389777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7003.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7003.json index 4e96b013408..80f676b010e 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7003.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7003.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7003", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.847", - "lastModified": "2014-11-14T14:06:04.960", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:00.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/719337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7004.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7004.json index 53966eabab0..1853c20d487 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7004.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7004.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7004", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.893", - "lastModified": "2014-11-14T14:06:06.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:00.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/896833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7005.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7005.json index 66a63342988..b323f852d21 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7005.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7005.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7005", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.927", - "lastModified": "2014-11-14T14:06:07.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:00.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/995393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7006.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7006.json index f029605f0d5..16807884a7c 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7006.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7006.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7006", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:10.973", - "lastModified": "2014-11-14T14:06:09.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:01.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/930361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7007.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7007.json index da5b580df37..e3f1f73fca9 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7007.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7007.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7007", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.020", - "lastModified": "2014-11-14T14:06:10.960", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:01.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/646121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7008.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7008.json index d50a00c99e8..cc2ee87720c 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7008.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7008.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7008", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.080", - "lastModified": "2014-11-14T14:06:12.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:01.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/138097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7009.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7009.json index 1b8cd247aba..76ea371a72b 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7009.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7009.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7009", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.127", - "lastModified": "2014-11-14T14:06:13.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:01.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/741425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7010.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7010.json index 5eb115715d4..3713f16f923 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7010.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7010.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7010", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.177", - "lastModified": "2014-11-14T14:06:15.460", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:01.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/391009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7011.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7011.json index 2c83a56445f..2ccb0e24d09 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7011.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7011.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7011", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.237", - "lastModified": "2014-11-14T14:06:16.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:02.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/370945", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7012.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7012.json index b7d04b4c012..0d25e3d14b2 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7012.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7012.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7012", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.283", - "lastModified": "2014-11-14T14:06:18.460", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:02.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/366545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7013.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7013.json index 9fa8ea5891a..873e89045c9 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7013.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7013.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7013", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.330", - "lastModified": "2014-11-14T14:06:19.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:02.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/132113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7015.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7015.json index 9cc748c374a..42ec937cd4e 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7015.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7015.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7015", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.377", - "lastModified": "2014-11-14T14:06:21.493", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:02.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/826785", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7016.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7016.json index 0b8aca30b93..d78c58eced9 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7016.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7016.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7016", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.440", - "lastModified": "2014-11-14T14:06:23.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:02.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/955793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7017.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7017.json index dfac98a1be4..35ed170c25e 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7017.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7017.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7017", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.487", - "lastModified": "2014-11-14T14:06:24.540", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:03.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/760609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7018.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7018.json index 9c4619c657b..eca2789ad47 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7018.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7018.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7018", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.550", - "lastModified": "2014-11-14T14:06:26.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:03.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/473993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7019.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7019.json index cb4e11856b8..7b272f4e6aa 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7019.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7019.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7019", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.597", - "lastModified": "2014-11-14T14:06:27.540", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:03.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/259273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7020.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7020.json index 04869b7a4c8..3466879c478 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7020.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7020.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7020", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.643", - "lastModified": "2014-11-14T14:06:29.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:03.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/379481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7021.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7021.json index cac88b0d787..d27fae97827 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7021.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7021.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7021", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.690", - "lastModified": "2014-11-14T14:06:30.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:03.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/484993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7022.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7022.json index 67a71658845..b52a0ef2555 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7022.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7022.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7022", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.753", - "lastModified": "2014-11-14T14:06:32.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:03.973", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/748289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7023.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7023.json index f17623b98a5..b11017df88c 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7023.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7023.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7023", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.800", - "lastModified": "2014-11-14T14:06:33.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:04.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/418905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7024.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7024.json index 6c81e9f049b..0fd3296f277 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7024.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7024.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7024", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.847", - "lastModified": "2014-11-14T14:06:35.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:04.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/885657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7025.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7025.json index 3274e639672..7d7c1df8caf 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7025.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7025.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7025", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.910", - "lastModified": "2014-11-14T14:06:36.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:04.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/628345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7026.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7026.json index b534b3fd440..670b5ec84ae 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7026.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7026.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7026", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:11.957", - "lastModified": "2014-11-14T14:06:37.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:04.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/505409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7027.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7027.json index 4ff63c5b7ef..53b81455106 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7027.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7027.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7027", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.003", - "lastModified": "2014-11-14T14:06:39.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:04.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/125865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7028.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7028.json index b75eaf6de74..7c2ed72c306 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7028.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7028.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7028", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.067", - "lastModified": "2014-11-14T14:06:41.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:05.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/742129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7029.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7029.json index 7e931150f23..5e7621cc925 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7029.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7029.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7029", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.113", - "lastModified": "2014-11-14T14:06:42.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:05.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/623065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7030.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7030.json index 0ab57dcbf8a..47ec04880d4 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7030.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7030.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7030", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.160", - "lastModified": "2014-11-14T14:06:44.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:05.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/700769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7031.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7031.json index 913c7495a17..2f2a6919e42 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7031.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7031.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7031", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.223", - "lastModified": "2014-11-14T14:06:45.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:05.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/139417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7032.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7032.json index 63167054c09..a29e90bf037 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7032.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7032.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7032", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.270", - "lastModified": "2014-11-14T14:06:47.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:05.793", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/667681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7033.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7033.json index 196193498ff..2cc1b806d5b 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7033.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7033.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7033", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.317", - "lastModified": "2014-11-14T14:06:49.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:05.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/829513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7034.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7034.json index 7ec1b6b9e41..be57f08eba6 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7034.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7034.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7034", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.377", - "lastModified": "2014-11-14T14:06:50.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:06.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/369097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7035.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7035.json index 53fcde5031d..153dca6998e 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7035.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7035.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7035", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.427", - "lastModified": "2014-11-14T14:06:52.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:06.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/862425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7036.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7036.json index c1725494a23..0f9787cb157 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7036.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7036.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7036", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.487", - "lastModified": "2014-11-14T14:06:53.810", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:06.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/754185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7037.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7037.json index 58c0e2b0734..11d3da3668b 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7037.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7037.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7037", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.537", - "lastModified": "2014-11-14T14:06:55.310", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:06.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/655185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7038.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7038.json index 773eb970a77..f07b5cfe0ec 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7038.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7038.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7038", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.597", - "lastModified": "2014-12-29T18:24:19.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:06.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/763865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7039.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7039.json index 754b8d5416d..ead8c645602 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7039.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7039.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7039", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.643", - "lastModified": "2014-11-14T14:06:58.313", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:07.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/667329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7040.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7040.json index 586ae40e198..1ec2957fba3 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7040.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7040.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7040", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.707", - "lastModified": "2014-11-14T14:06:59.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:07.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/611097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7041.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7041.json index 283efedaf33..f21e4c8e3b1 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7041.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7041.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7041", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.753", - "lastModified": "2014-11-14T14:07:01.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:07.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/373233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7042.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7042.json index f5159775c23..85082ad20a2 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7042.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7042.json @@ -2,7 +2,7 @@ "id": "CVE-2014-7042", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.817", - "lastModified": "2024-08-06T13:15:35.490", + "lastModified": "2024-11-21T02:16:07.637", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -96,6 +96,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/898593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7043.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7043.json index e62545fb67f..4d46c5847c8 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7043.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7043.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7043", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.863", - "lastModified": "2014-11-14T14:07:04.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:07.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/817281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7044.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7044.json index 8d844f85049..c75fa95ded7 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7044.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7044.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7044", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.910", - "lastModified": "2014-11-14T17:10:15.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:08.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/418113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7045.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7045.json index 1b8b24cc2a0..31f31cc8d75 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7045.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7045.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7045", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:12.987", - "lastModified": "2014-11-14T14:07:07.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:08.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/265433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7046.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7046.json index 228f32aec83..b8bcbb93a8e 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7046.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7046.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7046", "sourceIdentifier": "cret@cert.org", "published": "2014-10-10T01:55:11.507", - "lastModified": "2014-11-14T14:04:12.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:08.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/625793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7047.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7047.json index 091bf5d6b50..f44aa723878 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7047.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7047.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7047", "sourceIdentifier": "cret@cert.org", "published": "2014-10-10T01:55:11.617", - "lastModified": "2014-11-14T14:04:14.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:08.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/503649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7048.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7048.json index 618e8ba4737..0595e1be7f9 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7048.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7048.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7048", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:13.037", - "lastModified": "2014-11-14T14:07:08.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:09.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/328353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7049.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7049.json index d80c43ac8c6..8835c611345 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7049.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7049.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7049", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:13.097", - "lastModified": "2014-11-14T14:07:10.203", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:09.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/976737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7050.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7050.json index df19a45f281..a13457de1aa 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7050.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7050.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7050", "sourceIdentifier": "cret@cert.org", "published": "2014-10-16T19:55:13.143", - "lastModified": "2014-11-14T14:07:11.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:10.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/621569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7052.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7052.json index ce3560dd961..423814206d8 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7052.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7052.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7052", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:10.613", - "lastModified": "2014-11-14T14:08:13.480", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:10.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/702969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7053.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7053.json index 4edbd6a5426..8881cf23278 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7053.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7053.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7053", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:15.793", - "lastModified": "2014-11-14T14:07:13.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:10.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/548793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7054.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7054.json index 396df17be7f..dcc7fa23bdf 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7054.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7054.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7054", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:15.827", - "lastModified": "2014-11-14T14:07:15.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:10.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/795369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7055.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7055.json index e058ea77ea3..2f8ea9119f3 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7055.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7055.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7055", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:15.857", - "lastModified": "2014-11-14T14:07:16.720", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:10.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/428233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7056.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7056.json index 15d82c38e8b..a0eecdb33f7 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7056.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7056.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7056", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:10.677", - "lastModified": "2014-11-14T14:08:14.933", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:10.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/537705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7057.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7057.json index 8136d9c912f..8dc6c735051 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7057.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7057.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7057", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:15.903", - "lastModified": "2014-11-14T14:07:18.253", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:11.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/981929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7058.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7058.json index f2630c6ac48..a2ae2e83d44 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7058.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7058.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7058", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:15.950", - "lastModified": "2014-11-14T14:07:19.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:11.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/687305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7059.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7059.json index 3a474a1bd06..201ca4ba328 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7059.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7059.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7059", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:15.997", - "lastModified": "2014-11-14T14:07:21.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:11.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/119617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7060.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7060.json index b30dc2d872b..40dca4435e6 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7060.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7060.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7060", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.043", - "lastModified": "2014-11-14T14:07:22.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:11.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/228473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7061.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7061.json index 927df39d707..df2f5fba20b 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7061.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7061.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7061", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.090", - "lastModified": "2014-11-14T14:07:24.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:11.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/942505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7062.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7062.json index 9f1ff468c43..357fa6c3d46 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7062.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7062.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7062", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.137", - "lastModified": "2014-11-14T14:07:25.503", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:12.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/179985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7063.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7063.json index dd5a34e3d95..c1aed0829df 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7063.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7063.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7063", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.183", - "lastModified": "2014-11-14T14:07:27.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:12.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/602209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7064.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7064.json index 46df980e1b2..454ebab127c 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7064.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7064.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7064", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.230", - "lastModified": "2014-11-14T14:07:28.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:12.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/117681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7065.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7065.json index bfe785fc536..eaeec1175ef 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7065.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7065.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7065", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.293", - "lastModified": "2014-11-14T14:07:30.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:12.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/367689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7066.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7066.json index e9389a4ff75..6feb825b728 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7066.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7066.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7066", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.340", - "lastModified": "2014-11-14T14:07:31.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:12.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/835409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7067.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7067.json index 71806417fb7..5f9f2104d56 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7067.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7067.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7067", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.387", - "lastModified": "2014-11-14T14:07:33.380", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:12.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/959489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7068.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7068.json index dc6445d43d7..d91266e919d 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7068.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7068.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7068", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.433", - "lastModified": "2014-11-14T14:07:34.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:13.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/234545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7069.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7069.json index 22ccbef9375..f0a7923a8bc 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7069.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7069.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7069", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.497", - "lastModified": "2014-11-14T14:07:36.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:13.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/604761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7070.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7070.json index 62e95c5ad60..e33314873c8 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7070.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7070.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7070", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:10.707", - "lastModified": "2014-11-14T14:08:16.403", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:13.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/301249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7071.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7071.json index e7f883c34ac..8e137f06259 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7071.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7071.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7071", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.543", - "lastModified": "2014-11-14T14:07:38.333", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:13.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/736321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7072.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7072.json index c8e223d377b..97367d96bba 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7072.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7072.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7072", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.623", - "lastModified": "2014-11-14T14:07:39.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:13.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/562433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7073.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7073.json index cf1b17f834d..d0f4c076966 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7073.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7073.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7073", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.670", - "lastModified": "2014-11-14T14:38:30.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:14.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/619545", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7075.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7075.json index 4dc9663f334..10bfb7b09cb 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7075.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7075.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7075", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:10.753", - "lastModified": "2014-11-14T14:08:17.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:14.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/460353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7076.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7076.json index f70a1e759dd..0cc60473bfc 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7076.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7076.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7076", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.717", - "lastModified": "2014-11-14T14:07:41.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:14.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/669617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7077.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7077.json index 012ba6baa73..6ca52fc6eb8 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7077.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7077.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7077", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.763", - "lastModified": "2014-11-14T14:07:42.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:14.623", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/831009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7078.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7078.json index c90ef3bfc7b..1c3da9206f5 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7078.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7078.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7078", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.810", - "lastModified": "2014-11-14T14:07:44.383", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:14.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/189665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7079.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7079.json index 7227dd8f1d1..a2de812f259 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7079.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7079.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7079", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:10.817", - "lastModified": "2014-11-14T14:08:19.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:14.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/322633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7080.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7080.json index a61a224fc52..c980877bfb9 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7080.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7080.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7080", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:10.863", - "lastModified": "2014-11-14T14:08:20.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:15.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/311193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7082.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7082.json index 08b15bb992d..3d1b924b929 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7082.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7082.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7082", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.857", - "lastModified": "2014-11-14T14:07:45.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:15.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/808305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7083.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7083.json index 150bceacb77..e25dd0453e2 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7083.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7083.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7083", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:10.910", - "lastModified": "2014-11-14T14:08:22.450", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:15.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/541049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7084.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7084.json index a8de961624d..d4053dd427f 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7084.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7084.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7084", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:10.957", - "lastModified": "2014-11-14T14:08:23.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:15.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/347097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7085.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7085.json index 78230f49cdf..82406605a9b 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7085.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7085.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7085", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.903", - "lastModified": "2014-11-14T14:07:47.337", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:15.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/150769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7086.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7086.json index ef3b17056e1..6f9b44111f6 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7086.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7086.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7086", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.933", - "lastModified": "2014-11-14T14:07:48.790", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:16.113", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/433601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7087.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7087.json index c06b570c459..64f8dbc0bc6 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7087.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7087.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7087", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:16.997", - "lastModified": "2014-11-14T14:07:50.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:16.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/152529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7088.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7088.json index ceee77465f0..b2d59d029de 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7088.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7088.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7088", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:17.027", - "lastModified": "2014-11-14T14:07:51.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:16.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/200929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7089.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7089.json index 10310abda27..b1fbc44b92d 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7089.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7089.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7089", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:17.077", - "lastModified": "2014-11-14T14:07:53.150", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:16.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/462289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7090.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7090.json index f3bbee4d2ef..c5034ca2027 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7090.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7090.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7090", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:17.497", - "lastModified": "2014-11-14T14:07:54.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:16.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/996801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7091.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7091.json index b91e023b927..075277d46a1 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7091.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7091.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7091", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:17.827", - "lastModified": "2014-11-14T14:07:56.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:17.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/732361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7092.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7092.json index 7cc1853697b..ffdfc7a47b1 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7092.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7092.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7092", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:17.887", - "lastModified": "2014-11-14T14:07:58.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:17.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/784985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7093.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7093.json index fa72868f0d9..49aa165e84d 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7093.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7093.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7093", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:17.933", - "lastModified": "2014-11-14T14:07:59.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:17.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/384761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7098.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7098.json index e00c16b10c8..6cfe9695901 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7098.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7098.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7098", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:17.980", - "lastModified": "2014-11-14T14:08:01.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:17.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/388897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-70xx/CVE-2014-7099.json b/CVE-2014/CVE-2014-70xx/CVE-2014-7099.json index e8e585a001b..0093df8e563 100644 --- a/CVE-2014/CVE-2014-70xx/CVE-2014-7099.json +++ b/CVE-2014/CVE-2014-70xx/CVE-2014-7099.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7099", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:18.027", - "lastModified": "2014-11-14T14:08:02.933", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:17.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/752073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7100.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7100.json index b1f8f81d034..391e60ed2e9 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7100.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7100.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7100", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.003", - "lastModified": "2014-11-14T14:08:25.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:18.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/853273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7101.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7101.json index 8e94396dd42..75d70e3c3a6 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7101.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7101.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7101", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:18.077", - "lastModified": "2014-11-14T14:08:04.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:18.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/374377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7102.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7102.json index 71aa9d25779..3f8db309873 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7102.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7102.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7102", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:18.123", - "lastModified": "2014-11-14T14:08:05.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:18.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/766153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7103.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7103.json index 208714a4136..08ef9115365 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7103.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7103.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7103", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:18.183", - "lastModified": "2014-11-14T14:08:07.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:18.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/643481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7104.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7104.json index 3771477cfbe..f2690cb9f1b 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7104.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7104.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7104", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:18.230", - "lastModified": "2014-11-14T14:08:08.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:18.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/722769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7106.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7106.json index 9242c978021..f0873a3ec79 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7106.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7106.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7106", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:18.277", - "lastModified": "2014-11-14T14:08:10.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:18.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/713353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7107.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7107.json index a6d3ecec3f9..c18c63d3434 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7107.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7107.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7107", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T01:55:18.340", - "lastModified": "2014-11-14T14:08:11.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:19.187", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/974625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7108.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7108.json index b6635a32f9f..7e86a96f6d6 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7108.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7108.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7108", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.050", - "lastModified": "2014-11-14T14:08:27.030", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:19.383", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/352729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7109.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7109.json index 5305cd68049..106f6cfc487 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7109.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7109.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7109", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.097", - "lastModified": "2014-11-14T14:08:28.577", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:19.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/483497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7111.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7111.json index c0ddc45326f..1002107e76b 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7111.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7111.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7111", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.143", - "lastModified": "2014-11-14T14:08:30.060", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:19.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/601857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7113.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7113.json index 34d53d9cf1d..eb3f2e9e2aa 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7113.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7113.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7113", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.190", - "lastModified": "2014-11-14T14:08:31.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:20.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/690913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7115.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7115.json index f5ea8d3e99b..978752b54c0 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7115.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7115.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7115", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.237", - "lastModified": "2014-11-14T14:08:33.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:20.263", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/794929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7116.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7116.json index 866a0a4f49e..e94804c9944 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7116.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7116.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7116", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.283", - "lastModified": "2014-11-14T14:08:34.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:20.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/181129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7117.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7117.json index 413b2cccb14..8f8eb1370ab 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7117.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7117.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7117", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.330", - "lastModified": "2014-11-14T14:08:36.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:20.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/932473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7118.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7118.json index fcdfcefaf30..f2fc3d79740 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7118.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7118.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7118", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.377", - "lastModified": "2014-11-14T14:08:37.610", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:20.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/141793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7119.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7119.json index 85742a9ccaa..415914b1d9b 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7119.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7119.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7119", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.427", - "lastModified": "2014-11-14T14:08:39.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:21.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/803377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7120.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7120.json index 8584a5bf365..bd46c8297d0 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7120.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7120.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7120", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.473", - "lastModified": "2014-11-14T14:08:40.673", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:21.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/775657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7121.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7121.json index 717bd9bb4cb..8ba6ca469a2 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7121.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7121.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7121", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.520", - "lastModified": "2014-11-14T14:08:42.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:21.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/558121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7122.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7122.json index 4523e523d60..75664f73007 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7122.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7122.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7122", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.580", - "lastModified": "2014-11-14T14:08:43.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:21.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/605377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7123.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7123.json index 256bddb53ab..e232bd04f9b 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7123.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7123.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7123", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.627", - "lastModified": "2014-11-14T14:08:45.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:21.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/709481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7124.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7124.json index 9115941b507..85d79caea9b 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7124.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7124.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7124", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.677", - "lastModified": "2014-11-14T14:08:46.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:21.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/442841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7125.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7125.json index 651b9dd57c2..80a1380144e 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7125.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7125.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7125", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.723", - "lastModified": "2014-11-14T14:08:48.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:22.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/599481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7127.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7127.json index bdae6c14079..0c54c90e612 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7127.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7127.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7127", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.770", - "lastModified": "2014-11-14T14:08:49.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:22.387", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/946553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7128.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7128.json index b1d597d394c..c62e14c7408 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7128.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7128.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7128", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.817", - "lastModified": "2014-11-14T14:08:51.160", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:22.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/723297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7129.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7129.json index f07dda3d820..c20c898ff74 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7129.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7129.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7129", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.863", - "lastModified": "2014-11-14T14:08:52.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:22.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/634505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7131.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7131.json index 44a352fa2fe..48bbba8ef32 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7131.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7131.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7131", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.910", - "lastModified": "2014-11-14T14:08:54.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:22.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/424097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7132.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7132.json index 044be24c9f8..ba3ffc1ba0f 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7132.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7132.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7132", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:11.957", - "lastModified": "2014-11-14T14:08:55.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:23.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/151825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7134.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7134.json index 22fea29202f..cba7b57d171 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7134.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7134.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7134", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.020", - "lastModified": "2014-11-14T14:08:57.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:23.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/432193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7135.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7135.json index 05c18a99b3f..15a77ee107f 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7135.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7135.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7135", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.067", - "lastModified": "2014-11-14T14:08:58.677", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:23.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/732273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7136.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7136.json index b7736c1f724..f569c9c4928 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7136.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7136.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7136", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T15:59:07.073", - "lastModified": "2014-12-15T19:50:07.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:23.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -93,6 +92,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129474/K7-Computing-Multiple-Products-K7FWFilt.sys-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/47", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7136/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7137.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7137.json index bb51902debc..021617470ca 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7137.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7137.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7137", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T15:59:01.523", - "lastModified": "2018-10-09T19:51:25.287", + "lastModified": "2024-11-21T02:16:23.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129175/Dolibarr-ERP-And-CRM-3.5.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/56", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534020/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71189", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7137/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7138.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7138.json index a8a7ce6f637..87c344f2866 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7138.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7138.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7138", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:14.363", - "lastModified": "2018-10-09T19:51:25.693", + "lastModified": "2024-11-21T02:16:24.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,46 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128626/WordPress-Google-Calendar-Events-2.0.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533640/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70370", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/pderksen/WP-Google-Calendar-Events/commit/a701ceeb410bdda9d96c9d3d12104630df5d5b43", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://wordpress.org/plugins/google-calendar-events/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23235", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7139.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7139.json index 335535ba66a..abe7785413f 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7139.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7139.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7139", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T14:55:08.823", - "lastModified": "2018-10-09T19:51:26.270", + "lastModified": "2024-11-21T02:16:24.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128625/WordPress-Contact-Form-DB-2.8.13-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533642/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70374", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/contact-form-7-to-database-extension/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7140.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7140.json index 719c9faa8b3..1bca670c5aa 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7140.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7140.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7140", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T14:55:04.133", - "lastModified": "2015-11-25T20:35:15.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:24.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,17 @@ { "url": "http://www.securitytracker.com/id/1031129", "source": "cve@mitre.org" + }, + { + "url": "http://support.citrix.com/article/CTX200206", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031129", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7141.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7141.json index 60a4b7b4cea..55191a17f29 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7141.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7141.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7141", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:03.557", - "lastModified": "2016-11-28T19:12:54.170", + "lastModified": "2024-11-21T02:16:24.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -513,6 +512,53 @@ { "url": "https://bugzilla.novell.com/show_bug.cgi?id=891268", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/539", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2422-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69688", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.squid-cache.org/Advisories/SQUID-2014_4.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=891268", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7142.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7142.json index baa65c10843..f7044029485 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7142.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7142.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7142", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:04.950", - "lastModified": "2016-11-28T19:12:55.373", + "lastModified": "2024-11-21T02:16:24.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -572,6 +571,77 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/539", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/613", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/626", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60242", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-2422-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70022", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.squid-cache.org/Advisories/SQUID-2014_4.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=891268", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7144.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7144.json index 033f733940d..a7ccc87d580 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7144.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7144.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7144", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-02T14:55:04.917", - "lastModified": "2016-11-28T19:12:56.453", + "lastModified": "2024-11-21T02:16:25.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,44 @@ "tags": [ "Patch" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1783.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1784.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62709", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/25/51", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2705-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/python-keystoneclient/+bug/1353315", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7145.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7145.json index 41831c71537..5b6a65e433e 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7145.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7145.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7145", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-28T10:55:10.720", - "lastModified": "2023-11-07T02:21:12.543", + "lastModified": "2024-11-21T02:16:25.200", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -186,8 +185,58 @@ "url": "https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" + ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=18f39e7be0121317550d03e267e3ebd4dbfbb3ce", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/22/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69867", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2394-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" ] } ] diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7146.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7146.json index 0b60410ed17..622960b95f6 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7146.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7146.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7146", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-18T15:59:02.500", - "lastModified": "2017-09-08T01:29:15.013", + "lastModified": "2024-11-21T02:16:25.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -109,6 +108,44 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=17725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/84017535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/bed19db9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7152.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7152.json index a43ade46470..36a9070f258 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7152.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7152.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7152", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-26T21:55:07.143", - "lastModified": "2014-09-30T17:14:00.620", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:25.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -147,6 +146,17 @@ { "url": "https://wordpress.org/plugins/yikes-inc-easy-mailchimp-extender/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://research.g0blin.co.uk/cve-2014-7152/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/yikes-inc-easy-mailchimp-extender/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7153.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7153.json index f498c8a23fd..455e900cf12 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7153.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7153.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7153", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-22T14:55:02.817", - "lastModified": "2014-09-22T15:17:58.113", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:25.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128118/WordPress-Huge-IT-Image-Gallery-1.0.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7154.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7154.json index 2b2bc025da4..3baedbbd527 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7154.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7154.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7154", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-02T14:55:05.073", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-11-21T02:16:25.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -264,6 +263,69 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140418.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140483.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61501", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-42.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030887", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7155.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7155.json index 79f071e44ad..6be1af1be4b 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7155.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7155.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7155", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-02T14:55:05.120", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-11-21T02:16:26.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 5.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -390,6 +389,84 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140418.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140483.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61858", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-42.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX200218", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-105.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7156.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7156.json index 266fda79e23..c5d13bdfb88 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7156.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7156.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7156", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-02T14:55:05.167", - "lastModified": "2018-10-30T16:26:53.700", + "lastModified": "2024-11-21T02:16:26.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -217,6 +216,62 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140418.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140483.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61858", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-42.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX200218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030889", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7157.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7157.json index 86d717b5cf1..83db4077d2f 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7157.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7157.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7157", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-02T14:55:05.217", - "lastModified": "2017-09-08T01:29:15.073", + "lastModified": "2024-11-21T02:16:26.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96701", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128459/Exinda-WAN-Optimization-Suite-7.0.0-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96701", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7158.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7158.json index 445358e5074..62a32938e96 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7158.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7158.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7158", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-02T14:55:05.260", - "lastModified": "2017-09-08T01:29:15.137", + "lastModified": "2024-11-21T02:16:26.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96702", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128459/Exinda-WAN-Optimization-Suite-7.0.0-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96702", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7169.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7169.json index ad4b9464627..697ce8e3b2c 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7169.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7169.json @@ -2,13 +2,8 @@ "id": "CVE-2014-7169", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-25T01:55:04.367", - "lastModified": "2024-07-24T16:47:57.690", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-01-28", - "cisaActionDue": "2022-07-28", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability", + "lastModified": "2024-11-21T02:16:26.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-01-28", + "cisaActionDue": "2022-07-28", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -2579,6 +2578,20 @@ "Mailing List" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", "source": "cve@mitre.org", @@ -2593,6 +2606,27 @@ "Mailing List" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", "source": "cve@mitre.org", @@ -2614,6 +2648,13 @@ "Mailing List" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=142805027510172&w=2", "source": "cve@mitre.org", @@ -3431,6 +3472,1190 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0393.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN55667175/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1306.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3075.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3077.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-3078.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141216207813411&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141216668515282&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141235957116749&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141319209015420&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141330425327438&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383138121313&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383353622268&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383465822787&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141694386919794&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142805027510172&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1306.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/58200", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/59272", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/59737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/59907", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60034", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60063", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60325", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60947", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61128", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61283", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61291", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61312", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61328", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61442", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61471", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61479", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61485", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61503", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61550", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61552", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61565", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61603", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61618", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61619", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61622", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61626", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61643", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61654", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61676", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61700", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61703", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61711", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61715", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61780", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61816", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61855", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62228", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62312", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62343", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://support.apple.com/kb/HT6495", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.novell.com/security/cve/CVE-2014-7169.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://twitter.com/taviso/statuses/514887394294652929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/252743", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.novell.com/support/kb/doc.php?id=7015701", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.novell.com/support/kb/doc.php?id=7015721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/24/32", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2363-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2363-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/ncas/alerts/TA14-268A", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/articles/1200223", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/node/1200223", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://kb.bluecoat.com/index?page=content&id=SA82", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://support.apple.com/kb/HT6535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.citrix.com/article/CTX200217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.citrix.com/article/CTX200223", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/34879/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.suse.com/support/shellshock/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7170.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7170.json index 1e790a90a9d..6ec2971ea1c 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7170.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7170.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7170", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-17T19:59:01.290", - "lastModified": "2019-07-11T14:03:33.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:27.263", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -78,6 +77,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2014-7170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7176.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7176.json index 3754c03ab92..363ae02700f 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7176.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7176.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7176", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:06.137", - "lastModified": "2017-09-08T01:29:15.200", + "lastModified": "2024-11-21T02:16:27.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -118,6 +117,52 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35098", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70773", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98307", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.tuleap.org/recent-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7177.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7177.json index d4cbe9127a7..09297f6d612 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7177.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7177.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7177", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:05.783", - "lastModified": "2017-09-08T01:29:15.263", + "lastModified": "2024-11-21T02:16:28.033", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -117,6 +115,51 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/113680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70771", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98308", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git&a=blob&h=aed26cbae81410a981c4615bd7da1518f31c50d0&hb=29cbe3557a07c74f3d910648b8c5307e8faef65a&f=ChangeLog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tuleap.net/plugins/tracker/?aid=7458", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7177/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.tuleap.org/recent-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7178.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7178.json index 05b1dc42805..73ab6aa6b51 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7178.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7178.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7178", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-28T15:59:00.090", - "lastModified": "2014-12-17T02:46:29.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:28.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7178/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.tuleap.org/recent-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7180.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7180.json index 9a74ae711dc..1c34b2d5330 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7180.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7180.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7180", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-25T00:55:04.320", - "lastModified": "2017-09-08T01:29:15.323", + "lastModified": "2024-11-21T02:16:28.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -121,6 +120,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97735", "source": "cve@mitre.org" + }, + { + "url": "http://docs.electric-cloud.com/commander_doc/5_0_3/HTML5/ReleaseNotes/commander_releasenotes.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128819/ElectricCommander-4.2.4.71224-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.secureworks.com/advisories/SWRX-2014-010/SWRX-2014-010.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.secureworks.com/cyber-threat-intelligence/advisories/SWRX-2014-010/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70722", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97735", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7181.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7181.json index f953baa4d62..ad2241b8e50 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7181.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7181.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7181", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:14.410", - "lastModified": "2018-10-09T19:52:17.757", + "lastModified": "2024-11-21T02:16:28.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://www.htbridge.com/advisory/HTB23237", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128693/WordPress-MaxButtons-1.26.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533700/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/maxbuttons/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23237", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7182.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7182.json index 9e97ffe8e66..2fd19da88a8 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7182.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7182.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7182", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-22T14:55:06.700", - "lastModified": "2023-05-26T15:00:51.330", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:28.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,46 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128694/WordPress-WP-Google-Maps-6.0.26-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533699/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70597", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://wordpress.org/plugins/wp-google-maps/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product", + "Release Notes" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23236", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7183.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7183.json index 4fbf3534182..a8b2ee8de02 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7183.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7183.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7183", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-22T14:55:06.810", - "lastModified": "2018-10-09T19:52:18.493", + "lastModified": "2024-11-21T02:16:28.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,45 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/128768/LiteCart-1.1.2.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Nov/84", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533748/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.netsparker.com/xss-vulnerabilities-in-litecart/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7185.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7185.json index 348fb9ddd3d..36822d613b3 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7185.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7185.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7185", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T17:55:05.187", - "lastModified": "2019-10-25T11:53:59.117", + "lastModified": "2024-11-21T02:16:28.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -210,6 +209,78 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://bugs.python.org/issue21831", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139663.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1330.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/23/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/25/47", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70089", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146026", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7186.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7186.json index 21e3c175edb..0c03d8d4f4a 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7186.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7186.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7186", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-28T19:55:06.223", - "lastModified": "2018-10-09T19:52:19.070", + "lastModified": "2024-11-21T02:16:29.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -307,6 +306,14 @@ "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "cve@mitre.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", "source": "cve@mitre.org" @@ -315,6 +322,18 @@ "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "cve@mitre.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "cve@mitre.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", "source": "cve@mitre.org" @@ -323,6 +342,10 @@ "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", "source": "cve@mitre.org" @@ -331,6 +354,10 @@ "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "cve@mitre.org" + }, { "url": "http://openwall.com/lists/oss-security/2014/09/25/32", "source": "cve@mitre.org", @@ -709,6 +736,537 @@ { "url": "https://www.suse.com/support/shellshock/", "source": "cve@mitre.org" + }, + { + "url": "http://jvn.jp/en/jp/JVN55667175/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383138121313&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141694386919794&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/09/25/32", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/09/26/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/09/28/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60024", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60433", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61065", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61291", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61328", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61618", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61641", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61703", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61711", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61780", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61873", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62228", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62343", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.novell.com/security/cve/CVE-2014-7186.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.novell.com/support/kb/doc.php?id=7015721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2364-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.bluecoat.com/index?page=content&id=SA82", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX200217", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX200223", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/support/shellshock/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7187.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7187.json index 000371b6337..b77c56c0d2b 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7187.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7187.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7187", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-28T19:55:06.270", - "lastModified": "2018-10-09T19:52:54.273", + "lastModified": "2024-11-21T02:16:29.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -315,10 +314,26 @@ "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "cve@mitre.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "cve@mitre.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", "source": "cve@mitre.org" @@ -327,6 +342,10 @@ "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", "source": "cve@mitre.org" @@ -335,6 +354,10 @@ "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "cve@mitre.org" + }, { "url": "http://openwall.com/lists/oss-security/2014/09/25/32", "source": "cve@mitre.org", @@ -701,6 +724,525 @@ { "url": "https://www.suse.com/support/shellshock/", "source": "cve@mitre.org" + }, + { + "url": "http://jvn.jp/en/jp/JVN55667175/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383138121313&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141694386919794&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/09/25/32", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/09/26/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/09/28/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60024", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60433", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61065", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61291", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61328", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61618", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61641", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61703", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61855", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61857", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61873", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62343", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.novell.com/security/cve/CVE-2014-7187.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.novell.com/support/kb/doc.php?id=7015721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2364-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.bluecoat.com/index?page=content&id=SA82", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX200217", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX200223", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/support/shellshock/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7188.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7188.json index ca60badfeaa..52c0421c031 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7188.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7188.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7188", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-02T14:55:05.293", - "lastModified": "2018-10-30T16:26:53.700", + "lastModified": "2024-11-21T02:16:29.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -218,6 +217,78 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96785", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140199.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140418.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140483.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61664", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61858", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-42.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX200218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX201794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70198", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1030936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-108.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96785", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7189.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7189.json index 546e21cb21f..844b2ff316d 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7189.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7189.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7189", "sourceIdentifier": "security@ubuntu.com", "published": "2014-10-07T14:55:07.860", - "lastModified": "2023-11-07T02:21:13.457", + "lastModified": "2024-11-21T02:16:30.013", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -122,6 +121,22 @@ { "url": "https://groups.google.com/forum/#%21msg/golang-nuts/eeOHNw_shwU/OHALUmroA5kJ", "source": "security@ubuntu.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/26/28", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70156", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21msg/golang-nuts/eeOHNw_shwU/OHALUmroA5kJ", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7190.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7190.json index dcecec8d941..fc91d893735 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7190.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7190.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7190", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T16:55:07.277", - "lastModified": "2014-10-01T19:30:45.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:30.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "http://www.securityfocus.com/bid/70163", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128455/Openfiler-2.99.1-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/109", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70163", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7191.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7191.json index fa36ccf704e..5b7b08ad86e 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7191.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7191.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7191", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-19T01:55:21.560", - "lastModified": "2017-09-08T01:29:15.590", + "lastModified": "2024-11-21T02:16:30.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -115,6 +114,49 @@ { "url": "https://nodesecurity.io/advisories/qs_dos_memory_exhaustion", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/60026", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687263", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2016:1380", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96729", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/visionmedia/node-querystring/issues/104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://nodesecurity.io/advisories/qs_dos_memory_exhaustion", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7192.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7192.json index 34fdd253863..2423006cffe 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7192.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7192.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7192", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-11T11:59:11.633", - "lastModified": "2017-09-08T01:29:15.653", + "lastModified": "2024-11-21T02:16:30.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690815", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/substack/node-syntax-error/commit/9aa4e66eb90ec595d2dba55e6f9c2dd9a668b309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://nodesecurity.io/advisories/syntax-error-potential-script-injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7193.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7193.json index 3133a16c931..b050a6f02b0 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7193.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7193.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7193", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-25T11:59:01.413", - "lastModified": "2021-07-19T15:19:59.683", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:30.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://nodesecurity.io/advisories/crumb_cors_token_disclosure", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7194.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7194.json index c2bbc8c598d..8a28a1d521c 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7194.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7194.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7194", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T02:59:02.800", - "lastModified": "2014-11-21T14:58:57.503", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:30.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -135,6 +134,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.tibco.com/assets/blt7454ec3ae638d8c4/mft-advisory-20141029-008.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.tibco.com/mk/advisory.jsp", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7195.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7195.json index 54483cf310c..00a03c0a283 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7195.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7195.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7195", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T02:59:04.503", - "lastModified": "2014-11-21T15:42:36.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:30.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -146,6 +145,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.tibco.com/assets/blta5b5c969aff51474/2014-009-spotfire-advisory.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.tibco.com/mk/advisory.jsp", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-71xx/CVE-2014-7199.json b/CVE-2014/CVE-2014-71xx/CVE-2014-7199.json index f93ac06e9c5..86cdd6c759a 100644 --- a/CVE-2014/CVE-2014-71xx/CVE-2014-7199.json +++ b/CVE-2014/CVE-2014-71xx/CVE-2014-7199.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7199", "sourceIdentifier": "cve@mitre.org", "published": "2014-09-30T14:55:11.827", - "lastModified": "2014-10-04T05:21:46.947", + "lastModified": "2024-11-21T02:16:31.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -281,6 +280,36 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/61666", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/27/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=69008", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://gerrit.wikimedia.org/r/#/c/162777/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-September/000161.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7200.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7200.json index aeb3fd4b306..2b3909e3865 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7200.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7200.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7200", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T14:55:09.527", - "lastModified": "2014-10-22T14:22:41.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:31.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128446/Typo3-JobControl-2.14.0-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/89", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-012", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70155", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mogwaisecurity.de/advisories/MSA-2014-02.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7201.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7201.json index e1fa6bc25e6..50f7747491f 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7201.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7201.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7201", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T14:55:09.573", - "lastModified": "2014-10-22T14:26:18.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:31.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/128446/Typo3-JobControl-2.14.0-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/89", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70155", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mogwaisecurity.de/advisories/MSA-2014-02.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7202.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7202.json index 474c2670d22..9fa4ffbdc05 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7202.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7202.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7202", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:04.313", - "lastModified": "2017-09-08T01:29:15.717", + "lastModified": "2024-11-21T02:16:31.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,42 @@ { "url": "https://github.com/zeromq/libzmq/pull/1188", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/754", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62262", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/zeromq/libzmq/issues/1190", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/zeromq/libzmq/pull/1188", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7203.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7203.json index 51df8497008..39fd95b6258 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7203.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7203.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7203", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:04.360", - "lastModified": "2017-09-08T01:29:15.763", + "lastModified": "2024-11-21T02:16:31.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -127,6 +126,42 @@ { "url": "https://github.com/zeromq/libzmq/pull/1189", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/754", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62262", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/zeromq/libzmq/issues/1191", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/zeromq/libzmq/pull/1189", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7204.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7204.json index c87b95cad2a..66922253ddf 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7204.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7204.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7204", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-07T14:55:08.250", - "lastModified": "2016-08-30T14:10:07.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:32.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -138,8 +137,8 @@ "url": "http://sourceforge.net/p/ctags/code/791/", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -178,6 +177,58 @@ "Exploit", "Issue Tracking" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0415.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://sourceforge.net/p/ctags/code/791/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3042", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:178", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/29/40", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2371-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742605", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7205.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7205.json index 82ff192929e..e6529f3e7a9 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7205.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7205.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7205", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T17:55:05.217", - "lastModified": "2019-07-16T12:20:55.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:32.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -118,6 +117,52 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/09/30/10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70180", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/hapijs/bassmaster/commit/b751602d8cb7194ee62a61e085069679525138c4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://nodesecurity.io/advisories/bassmaster_js_injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/40689/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7206.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7206.json index f9a93863cb0..3fffd99737f 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7206.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7206.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7206", "sourceIdentifier": "security@debian.org", "published": "2014-10-15T14:55:09.073", - "lastModified": "2020-01-08T15:22:54.567", + "lastModified": "2024-11-21T02:16:32.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -135,6 +134,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96951", "source": "security@debian.org" + }, + { + "url": "http://secunia.com/advisories/61158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61333", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61768", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2370-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=763780", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96951", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7207.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7207.json index fa43ec69022..05e706e2061 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7207.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7207.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7207", "sourceIdentifier": "security@debian.org", "published": "2014-11-10T11:55:08.080", - "lastModified": "2014-12-24T03:00:46.897", + "lastModified": "2024-11-21T02:16:32.570", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -456,6 +454,31 @@ { "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766195", "source": "security@debian.org" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3060", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/02/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2417-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2418-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766195", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7208.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7208.json index 81c62aeac4a..94efb0deecd 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7208.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7208.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7208", "sourceIdentifier": "security@debian.org", "published": "2014-12-19T15:59:08.253", - "lastModified": "2021-05-14T19:57:00.300", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:32.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -88,6 +87,22 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/77", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7209.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7209.json index c5ddb3be8fd..2442717f595 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7209.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7209.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7209", "sourceIdentifier": "security@debian.org", "published": "2015-01-06T15:59:02.663", - "lastModified": "2017-09-08T01:29:15.950", + "lastModified": "2024-11-21T02:16:32.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99570", "source": "security@debian.org" + }, + { + "url": "http://secunia.com/advisories/61892", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3114", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/31/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99570", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7217.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7217.json index 96a8320bbbc..875a6729ca3 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7217.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7217.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7217", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-03T01:55:08.563", - "lastModified": "2016-04-04T13:15:00.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:33.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -309,6 +308,34 @@ { "url": "https://github.com/phpmyadmin/phpmyadmin/commit/c1a3f85fbd1a9569646e7cf1b791325ae82c7961", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-11.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/304fb2b645b36a39e03b954fdbd567173ebe6448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/c1a3f85fbd1a9569646e7cf1b791325ae82c7961", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7226.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7226.json index 4a12fe75c2a..fc648da0e93 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7226.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7226.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7226", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-10T01:55:11.743", - "lastModified": "2014-10-10T19:59:58.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:33.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,31 @@ { "url": "http://www.securityfocus.com/bid/70216", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128532/HTTP-File-Server-2.3a-2.3b-2.3c-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34852", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.rejetto.com/forum/hfs-~-http-file-server/new-version-2-3d/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70216", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7228.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7228.json index 684557a69d3..5a1e6ad7b5a 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7228.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7228.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7228", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-03T22:55:08.413", - "lastModified": "2016-05-09T15:36:26.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:34.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -312,6 +311,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://developer.joomla.org/security/595-20140903-core-remote-file-inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://websec.wordpress.com/2014/10/05/joomla-3-3-4-akeeba-kickstart-remote-code-execution-cve-2014-7228/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.akeebabackup.com/home/news/1605-security-update-sep-2014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7229.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7229.json index 2224f96a2e2..f569e147b03 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7229.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7229.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7229", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:04.407", - "lastModified": "2014-10-09T20:52:48.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:34.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -228,6 +227,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://developer.joomla.org/security/596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7230.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7230.json index 3ccd4b14c59..0be29b0cdc6 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7230.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7230.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7230", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:04.453", - "lastModified": "2018-11-16T15:29:42.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:34.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -183,6 +182,51 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1939.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/853", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2405-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/oslo-incubator/+bug/1343604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96725", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7231.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7231.json index c214fea6961..e15b89e90ec 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7231.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7231.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7231", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:04.500", - "lastModified": "2018-11-16T15:28:56.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:34.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -162,6 +161,45 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1939.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q3/853", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70184", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.launchpad.net/oslo.utils/+bug/1345233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96726", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7235.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7235.json index afb5438e382..71adb3ab8d1 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7235.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7235.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7235", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-07T14:55:09.093", - "lastModified": "2019-12-10T16:01:50.690", + "lastModified": "2024-11-21T02:16:34.997", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -205,6 +204,34 @@ { "url": "https://www.exploit-db.com/exploits/41005/", "source": "cve@mitre.org" + }, + { + "url": "http://community.freepbx.org/t/critical-freepbx-rce-vulnerability-all-versions-cve-2014-7235/24536", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128516/FreePBX-Authentication-Bypass-Account-Creation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61601", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/FreePBX/fw_ari/commit/f294b4580ce725ca3c5e692d86e63d40cef4d836", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/41005/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7237.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7237.json index 495ce1306b3..da8eb701471 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7237.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7237.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7237", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T00:55:06.997", - "lastModified": "2017-09-08T01:29:16.167", + "lastModified": "2024-11-21T02:16:35.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -109,6 +108,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96952", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/45", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-7237", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96952", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7241.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7241.json index afbbe39f3cb..fc89f2eb5f1 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7241.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7241.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7241", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-19T11:59:00.057", - "lastModified": "2014-12-19T14:07:45.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:35.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "https://play.google.com/store/apps/details?id=jp.co.tsutaya.android.ranking", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN97384696/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.co.tsutaya.android.ranking", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7243.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7243.json index 64ed9004313..ea087e25695 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7243.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7243.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7243", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-05T17:59:00.073", - "lastModified": "2015-10-28T18:11:30.340", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:36.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -113,6 +112,18 @@ { "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000140.html", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN71762315/995312/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN71762315/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7246.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7246.json index 54a3a800fff..41b351f3c68 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7246.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7246.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7246", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-11-14T00:59:01.383", - "lastModified": "2015-02-10T18:09:15.920", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:36.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -139,6 +138,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN65559247/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sources.forgerock.org/changelog/openam/?cs=11248", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://forgerock.org/2014/11/openam-security-advisory-201404/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7247.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7247.json index f704f74d6d5..5fe772337c2 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7247.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7247.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7247", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-11-26T02:59:02.637", - "lastModified": "2015-02-24T16:18:01.973", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:36.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -168,6 +167,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN16318793/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000131", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.justsystems.com/jp/info/js14003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7248.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7248.json index 95ba6eb524c..0339046c1c8 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7248.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7248.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7248", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-11-15T02:59:00.143", - "lastModified": "2014-11-17T13:45:19.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:36.433", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN89852154/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ipa.go.jp/security/vuln/iLogScanner/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7249.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7249.json index 1f72d58a45b..f53bac90ac9 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7249.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7249.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7249", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-19T11:59:01.400", - "lastModified": "2014-12-19T17:13:09.670", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:36.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -749,6 +748,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN22440986/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.allied-telesis.co.jp/support/list/faq/vuls/20141111aen.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7250.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7250.json index fd0c0edb5f1..13bd4c856e8 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7250.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7250.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7250", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-12T03:03:47.817", - "lastModified": "2014-12-12T20:28:21.973", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:36.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -105,6 +104,24 @@ { "url": "https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=195243", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN07930208/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000134", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=195243", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7251.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7251.json index 6793b0b7e1b..167582ffdce 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7251.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7251.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7251", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-06T15:59:06.060", - "lastModified": "2017-09-08T01:29:16.217", + "lastModified": "2024-11-21T02:16:36.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:P", + "baseScore": 3.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.2 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.1, @@ -110,6 +109,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99018", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN54775800/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000141.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.yokogawa.com/dcs/security/ysar/YSAR-14-0004E.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7252.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7252.json index 9bf72a50b1b..001b00b5b80 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7252.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7252.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7252", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-05T17:59:01.087", - "lastModified": "2014-12-08T13:55:38.113", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:36.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -174,6 +173,22 @@ { "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000137.html", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN67792023/397327/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN67792023/995312/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN67792023/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000137.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7253.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7253.json index a6552631efb..9763a2869ef 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7253.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7253.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7253", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-05T17:59:02.103", - "lastModified": "2014-12-08T13:54:39.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:37.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -107,6 +106,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN06302787/995312/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN06302787/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000138.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7254.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7254.json index 6db9cc8af76..561794b35c7 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7254.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7254.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7254", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-05T17:59:03.103", - "lastModified": "2014-12-08T13:58:35.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:37.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -83,6 +82,18 @@ { "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000139.html", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN61593104/995312/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN61593104/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000139.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7255.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7255.json index 8bf3c0c5f92..1bbc2340d2c 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7255.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7255.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7255", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-05T17:59:03.993", - "lastModified": "2020-07-31T11:13:20.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:37.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -216,6 +215,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN21907573/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.seil.jp/support/security/a01510.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7256.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7256.json index 621b8353d0d..af7ffef93fb 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7256.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7256.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7256", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-05T17:59:05.197", - "lastModified": "2015-10-28T18:14:20.903", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:37.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -592,6 +591,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN04895240/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.seil.jp/support/security/a01511.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7258.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7258.json index 020677ae9db..a31390c0aea 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7258.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7258.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7258", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-05T17:59:06.213", - "lastModified": "2014-12-05T19:50:20.333", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:37.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN12798709/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000147.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kent-web.com/bbs/clipbbs.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7259.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7259.json index c60bb38244c..0cf94f35ed7 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7259.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7259.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7259", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-05T17:59:07.120", - "lastModified": "2014-12-05T19:46:04.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:37.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ { "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000148.html", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN24909891/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7260.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7260.json index a1af1ae58b9..91df19ab7a6 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7260.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7260.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7260", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-12T00:59:00.170", - "lastModified": "2014-12-12T20:30:27.993", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:37.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN16406395/360573/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN16406395/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000143", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7261.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7261.json index 746670ebc3a..49ef9265fda 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7261.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7261.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7261", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-12T00:59:01.327", - "lastModified": "2014-12-12T20:31:45.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:38.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN89613370/360573/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN89613370/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000144", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7262.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7262.json index d54cf567ae6..ec995bcf483 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7262.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7262.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7262", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-12T00:59:02.420", - "lastModified": "2014-12-12T17:14:13.920", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:38.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN98097877/360573/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN98097877/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7263.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7263.json index b9e7c589e9e..c13144d0ad2 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7263.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7263.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7263", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-12T00:59:03.467", - "lastModified": "2014-12-12T17:14:42.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:38.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000146", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN87910097/360573/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN87910097/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000146", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7264.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7264.json index 3ed5fa54020..0b95ccce201 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7264.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7264.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7264", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-11T23:59:01.437", - "lastModified": "2014-12-12T14:21:38.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:38.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -100,6 +99,34 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://chyrp.net/2014/11/18/chyrp-251-security-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN13160869/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000149", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/chyrp/chyrp/commit/43d1b6b266363ae7545d5d49851034eaeec7bebb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7265.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7265.json index 30ef924ec12..af0f4652478 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7265.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7265.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7265", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-12T11:59:04.813", - "lastModified": "2014-12-12T20:32:18.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:38.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN61181790/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7266.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7266.json index d7c1ccedbfb..37c2e2fe51d 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7266.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7266.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7266", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-01T15:59:00.057", - "lastModified": "2015-02-02T22:50:50.260", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:38.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -108,6 +107,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN13566542/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://cs.cybozu.co.jp/2015/001245.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7267.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7267.json index 8d272954036..573f5063167 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7267.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7267.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7267", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-19T11:59:03.150", - "lastModified": "2014-12-19T18:58:30.760", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:38.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -92,6 +91,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN09289074/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000151", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.ricksoft.jp/document/pages/viewpage.action?pageId=172425369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7268.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7268.json index 2efad01277b..b7effac0077 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7268.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7268.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7268", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2014-12-19T11:59:04.447", - "lastModified": "2014-12-19T18:59:01.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:38.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN76515134/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000152", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.ricksoft.jp/document/pages/viewpage.action?pageId=172425369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7269.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7269.json index 49919704dca..f1b71feb024 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7269.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7269.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7269", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-01T15:59:01.917", - "lastModified": "2015-02-04T03:33:28.540", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:38.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -218,6 +217,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN77792759/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7270.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7270.json index 2e57ab78ff2..8dc693cd7a8 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7270.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7270.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7270", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-01T15:59:03.323", - "lastModified": "2015-02-11T16:42:06.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:39.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -217,6 +216,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN32631078/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7273.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7273.json index 831854b0c10..4892e7f1a4f 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7273.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7273.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7273", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T01:55:05.517", - "lastModified": "2014-12-19T19:14:18.030", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:39.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -396,6 +395,26 @@ { "url": "http://www.debian.org/security/2014/dsa-3091", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/10/07/33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pyropus.ca/software/getmail/CHANGELOG", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61229", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3091", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7274.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7274.json index 374b20a436a..fcee28d0d12 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7274.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7274.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7274", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T01:55:05.753", - "lastModified": "2014-12-22T04:09:18.610", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:39.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "http://www.debian.org/security/2014/dsa-3091", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/10/07/33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pyropus.ca/software/getmail/CHANGELOG", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61229", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3091", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7275.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7275.json index 502d8e00279..bc0dc56b961 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7275.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7275.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7275", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T01:55:05.830", - "lastModified": "2014-12-22T04:10:02.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:39.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -396,6 +395,26 @@ { "url": "http://www.debian.org/security/2014/dsa-3091", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/10/07/33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pyropus.ca/software/getmail/CHANGELOG", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61229", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3091", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7277.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7277.json index be83075b032..52a66770bc8 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7277.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7277.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7277", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-04T10:55:03.833", - "lastModified": "2017-09-08T01:29:16.277", + "lastModified": "2024-11-21T02:16:39.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96891", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128551/ZyXEL-SBG-3300-Security-Gateway-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/19", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96891", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7278.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7278.json index 1044fc93b16..7f7b4b59c11 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7278.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7278.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7278", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-04T10:55:03.880", - "lastModified": "2017-09-08T01:29:16.340", + "lastModified": "2024-11-21T02:16:40.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -106,6 +105,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96892", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128550/ZyXEL-SBG-3300-Security-Gateway-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/20", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96892", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7280.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7280.json index f1fbe7d6744..02cee83d6fe 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7280.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7280.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7280", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:07.673", - "lastModified": "2015-09-08T18:20:33.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:40.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -118,6 +117,52 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/112728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128579/Nessus-Web-UI-2.3.3-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/26", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70274", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.tenable.com/security/tns-2014-08", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.thesecurityfactory.be/permalink/nessus-stored-xss.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7281.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7281.json index 65043c30e06..f219cc4cb7c 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7281.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7281.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7281", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-23T14:55:02.367", - "lastModified": "2014-10-24T13:02:07.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:40.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/113308", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128671/Tenda-A32-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/34969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7283.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7283.json index d3ea060faf0..894671216ac 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7283.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7283.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7283", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T10:55:08.013", - "lastModified": "2023-11-07T02:21:16.187", + "lastModified": "2024-11-21T02:16:40.760", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -149,6 +148,68 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c88547a8119e3b581318ab65e9b72f27f23e641d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=linux-xfs&m=139590613002926&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1943.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/01/29", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70261", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1148777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/c88547a8119e3b581318ab65e9b72f27f23e641d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7284.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7284.json index 3e4fa6ecfe7..59c713fdbea 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7284.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7284.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7284", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T10:55:08.263", - "lastModified": "2023-11-07T02:21:16.257", + "lastModified": "2024-11-21T02:16:40.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -171,6 +170,36 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3d4405226d27b3a215e4d03cfa51f536244e5de7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/01/19", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1148788", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/3d4405226d27b3a215e4d03cfa51f536244e5de7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://web.archive.org/web/20141002163852/http://secondlookforensics.com/ngro-linux-kernel-bug/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7285.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7285.json index fccc0fd08c2..ce4349a6707 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7285.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7285.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7285", "sourceIdentifier": "secure@symantec.com", "published": "2014-12-17T16:59:00.067", - "lastModified": "2017-01-03T02:59:12.377", + "lastModified": "2024-11-21T02:16:41.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://karmainsecurity.com/KIS-2014-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130612/Symantec-Web-Gateway-5-restore.php-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/36263", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71620", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031386", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20141216_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7286.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7286.json index 04ab192f1c9..a8f1f521a35 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7286.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7286.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7286", "sourceIdentifier": "secure@symantec.com", "published": "2014-12-22T15:59:00.053", - "lastModified": "2019-02-26T14:04:00.980", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:41.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -111,6 +110,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/71727", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031421", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20141219_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7287.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7287.json index 592ddf7459e..e3d51548f70 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7287.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7287.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7287", "sourceIdentifier": "secure@symantec.com", "published": "2015-02-01T02:59:01.520", - "lastModified": "2017-09-08T01:29:16.387", + "lastModified": "2024-11-21T02:16:41.277", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +101,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100762", "source": "secure@symantec.com" + }, + { + "url": "http://www.securityfocus.com/bid/72307", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031673", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150129_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100762", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7288.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7288.json index 8317ad7a52d..996ae6ca88f 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7288.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7288.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7288", "sourceIdentifier": "secure@symantec.com", "published": "2015-02-01T02:59:02.583", - "lastModified": "2017-09-08T01:29:16.433", + "lastModified": "2024-11-21T02:16:41.383", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -106,6 +105,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100763", "source": "secure@symantec.com" + }, + { + "url": "http://www.exploit-db.com/exploits/35949", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/117766", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72308", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031673", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150129_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100763", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7289.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7289.json index 124efff596a..b06bcfb293a 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7289.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7289.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7289", "sourceIdentifier": "secure@symantec.com", "published": "2015-01-21T15:17:02.353", - "lastModified": "2021-08-04T18:56:05.773", + "lastModified": "2024-11-21T02:16:41.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -109,6 +108,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/91", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534527/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150119_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7290.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7290.json index 00b623af757..772720cbdde 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7290.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7290.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7290", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T15:59:00.087", - "lastModified": "2017-09-08T01:29:16.497", + "lastModified": "2024-11-21T02:16:41.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98705", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129114/Atlas-Systems-Aeon-3.5-3.6-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/32", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/xss-vulnerability/cve-2014-7290-atlas-systems-aeon-xss-cross-site-scripting-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98705", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7291.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7291.json index 2970ecd7065..3e0dbb337c7 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7291.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7291.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7291", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T15:59:05.390", - "lastModified": "2017-09-08T01:29:16.543", + "lastModified": "2024-11-21T02:16:41.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99000", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/90", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-7291-springshare-libcal-xss-cross-site-scripting-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99000", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7292.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7292.json index 54acb0f1d6b..e5974952730 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7292.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7292.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7292", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-23T14:55:02.417", - "lastModified": "2017-09-08T01:29:16.590", + "lastModified": "2024-11-21T02:16:41.887", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +109,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97667", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128749/Newtelligence-dasBlog-2.3-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/91", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.tetraph.com/blog/cves/cve-2014-7292-newtelligence-dasblog-open-redirect-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97667", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7293.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7293.json index 38205b964f8..0c07ce6b767 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7293.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7293.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7293", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:00.100", - "lastModified": "2015-01-05T21:05:41.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:42.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,14 @@ { "url": "http://tetraph.com/security/cves/cve-2014-7293-ex-libris-patron-directory-services-pds-xss-cross-site-scripting-security-vulnerability/", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-7293-ex-libris-patron-directory-services-pds-xss-cross-site-scripting-security-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7294.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7294.json index 1c192c01744..112165fd296 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7294.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7294.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7294", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:01.397", - "lastModified": "2015-01-05T21:06:20.053", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:16:42.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +83,19 @@ { "url": "http://tetraph.com/security/cves/cve-2014-7294-ex-libris-patron-directory-services-pds-open-redirect-security-vulnerability/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129756/Ex-Libris-Patron-Directory-Services-2.1-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-7294-ex-libris-patron-directory-services-pds-open-redirect-security-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7295.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7295.json index 52e853bb335..30d805dfd28 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7295.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7295.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7295", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-07T14:55:09.687", - "lastModified": "2015-08-06T16:28:35.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:42.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -294,6 +293,33 @@ { "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-October/000163.html", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/67", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61752", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3046", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=70672", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-October/000163.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7296.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7296.json index 29fde1126f6..13a902b4de6 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7296.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7296.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7296", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:05.017", - "lastModified": "2014-10-10T01:28:26.877", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:42.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/70240", "source": "cve@mitre.org" + }, + { + "url": "http://spagoworld.org/jira/browse/SPAGOBI-1885", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70240", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7297.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7297.json index bd9230492d4..13214e0aa56 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7297.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7297.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7297", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T10:55:08.450", - "lastModified": "2020-01-10T01:15:08.960", + "lastModified": "2024-11-21T02:16:42.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ { "url": "https://wpvulndb.com/vulnerabilities/9809", "source": "cve@mitre.org" + }, + { + "url": "http://themeforest.net/item/enfold-responsive-multipurpose-theme/4519990", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://wpvulndb.com/vulnerabilities/9809", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7298.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7298.json index 37e940329e4..3369116c599 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7298.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7298.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7298", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-24T10:55:05.073", - "lastModified": "2014-10-24T14:00:21.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:42.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -118,6 +117,18 @@ { "url": "https://exploithub.com/centrify-data-leakage.html", "source": "cve@mitre.org" + }, + { + "url": "http://twitter.com/travemme/statuses/525298393971564544", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.centrify.com/support/announcements.asp#20141014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exploithub.com/centrify-data-leakage.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-72xx/CVE-2014-7299.json b/CVE-2014/CVE-2014-72xx/CVE-2014-7299.json index ffce74af7b2..47473c87ed6 100644 --- a/CVE-2014/CVE-2014-72xx/CVE-2014-7299.json +++ b/CVE-2014/CVE-2014-72xx/CVE-2014-7299.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7299", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T01:55:06.143", - "lastModified": "2014-10-08T17:38:50.137", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:42.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-10072014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7300.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7300.json index 13a96dd5b66..60b7104e639 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7300.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7300.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7300", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-25T21:59:02.937", - "lastModified": "2016-08-31T15:08:43.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:42.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -137,8 +136,47 @@ "url": "https://git.gnome.org/browse/gnome-shell/commit/?id=f02b007337e61436aaa0e81a86ad707b6d277378", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/09/29/17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0535.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=737456", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://git.gnome.org/browse/gnome-shell/commit/?id=a72dca361080ffc9f45ff90188a7cf013c3c4013", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://git.gnome.org/browse/gnome-shell/commit/?id=f02b007337e61436aaa0e81a86ad707b6d277378", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" ] } ] diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7307.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7307.json index c9df048c5df..cada8bc1af4 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7307.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7307.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7307", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.113", - "lastModified": "2014-11-14T14:09:00.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:43.543", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/159657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7309.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7309.json index 0b744017eee..7a847b8f38f 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7309.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7309.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7309", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.160", - "lastModified": "2014-11-14T14:09:01.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:43.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/245985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7310.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7310.json index 4d0107f9cb8..454d508a2d0 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7310.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7310.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7310", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.223", - "lastModified": "2014-11-14T14:09:03.130", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:43.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/976033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7313.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7313.json index f10f11d693a..7478959c6fd 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7313.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7313.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7313", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.270", - "lastModified": "2014-11-14T14:09:04.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:44.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/831977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7314.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7314.json index af5959706d1..c01fd9855b6 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7314.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7314.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7314", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.317", - "lastModified": "2014-11-14T14:09:06.380", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:44.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/991521", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7315.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7315.json index 97bb3a94093..1041ad1d458 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7315.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7315.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7315", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.363", - "lastModified": "2014-11-14T14:09:08.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:44.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/247217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7316.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7316.json index a039125601e..007d32e62e3 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7316.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7316.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7316", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.410", - "lastModified": "2014-11-14T14:09:09.553", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:44.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/987297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7317.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7317.json index 4fe32772c7d..53d9d2dbac0 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7317.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7317.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7317", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.473", - "lastModified": "2014-11-14T14:09:11.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:44.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/153673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7320.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7320.json index 721753fa740..06228a1f21d 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7320.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7320.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7320", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.520", - "lastModified": "2014-11-14T14:09:12.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:45.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/586633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7321.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7321.json index 8e37542d4a1..19ba22cc400 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7321.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7321.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7321", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.580", - "lastModified": "2014-11-14T14:09:14.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:45.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/408433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7323.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7323.json index c0286b37569..2de80ae133b 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7323.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7323.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7323", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.627", - "lastModified": "2014-11-14T14:09:15.587", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:45.447", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/942769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7325.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7325.json index f1c65ff5a7a..a04936f700d 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7325.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7325.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7325", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.677", - "lastModified": "2014-11-14T14:09:17.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:45.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/456393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7326.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7326.json index 5c3aef84660..3c3ba4e86ec 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7326.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7326.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7326", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.737", - "lastModified": "2014-11-14T14:09:18.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:45.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/554865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7327.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7327.json index 644b0b0ab29..fc6c45e778e 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7327.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7327.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7327", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.787", - "lastModified": "2014-11-14T14:09:20.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:46.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/656329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7328.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7328.json index 6aea7d5129c..b14d4607a2e 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7328.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7328.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7328", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.830", - "lastModified": "2014-11-14T14:09:21.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:46.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/556361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7329.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7329.json index f9db195364f..56be4feed84 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7329.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7329.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7329", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.877", - "lastModified": "2014-11-14T14:09:23.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:46.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/908273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7330.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7330.json index 3c88955ac80..ceca3e90257 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7330.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7330.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7330", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.927", - "lastModified": "2014-11-14T14:09:24.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:46.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/117065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7331.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7331.json index efb0e0294cb..349dacee496 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7331.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7331.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7331", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:12.987", - "lastModified": "2014-11-14T14:09:26.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:46.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/938457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7333.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7333.json index 181f3b0e954..da516b48498 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7333.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7333.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7333", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.037", - "lastModified": "2014-11-14T14:09:27.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:46.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/618049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7334.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7334.json index b1ac57de24c..c17595d6d2a 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7334.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7334.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7334", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.080", - "lastModified": "2014-11-14T14:09:29.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:47.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/396025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7335.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7335.json index 81ba5ceeba2..cc4dc5ed918 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7335.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7335.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7335", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.127", - "lastModified": "2014-11-14T14:09:30.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:47.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/706049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7336.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7336.json index a19903c80b8..1522f3a6ef7 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7336.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7336.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7336", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.177", - "lastModified": "2014-11-14T14:09:32.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:47.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/331961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7337.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7337.json index 2adf9ed55f4..e3c9effc90b 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7337.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7337.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7337", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.223", - "lastModified": "2014-11-14T14:09:33.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:47.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/901673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7338.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7338.json index 5b54150c07f..ff02bb933e2 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7338.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7338.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7338", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.287", - "lastModified": "2014-11-14T14:09:35.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:47.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/159393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7339.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7339.json index 3666364c4ca..69595427bd6 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7339.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7339.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7339", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.330", - "lastModified": "2014-11-14T14:09:36.493", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:48.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/379657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7340.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7340.json index 9534523cd7d..b40c44d957a 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7340.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7340.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7340", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.377", - "lastModified": "2014-11-14T14:09:38.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:48.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/197409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7341.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7341.json index 95f48d6de9a..5a2c4fa7e58 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7341.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7341.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7341", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.440", - "lastModified": "2014-11-14T14:09:39.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:48.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/318937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7342.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7342.json index b2c219d3706..450d31ca73e 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7342.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7342.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7342", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.487", - "lastModified": "2014-11-14T14:09:41.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:49.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/297465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7344.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7344.json index bcaaeb04c0f..dd7b87c9d4d 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7344.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7344.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7344", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.537", - "lastModified": "2014-11-14T14:09:42.620", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:49.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/219409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7345.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7345.json index 689ffe66741..ee2c17f75ce 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7345.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7345.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7345", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.597", - "lastModified": "2014-11-14T14:09:44.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:49.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/791233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7346.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7346.json index 5125bb7da9c..d64d3e214d6 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7346.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7346.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7346", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.643", - "lastModified": "2014-11-14T14:09:45.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:49.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/189225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7348.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7348.json index b63f47aac61..1d11a540d4a 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7348.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7348.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7348", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.690", - "lastModified": "2014-11-14T14:09:47.153", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:49.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/150153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7351.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7351.json index 8628a86072e..1b9d1b5c373 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7351.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7351.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7351", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.737", - "lastModified": "2014-11-14T14:09:48.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:50.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/410105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7352.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7352.json index 959a0b084f8..a505bef3748 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7352.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7352.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7352", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.800", - "lastModified": "2014-11-14T14:39:32.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:50.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/444337", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7353.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7353.json index 588cc3db805..c8c112f3441 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7353.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7353.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7353", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.847", - "lastModified": "2014-11-14T14:09:50.137", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:50.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/369273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7354.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7354.json index cb3e33dac53..e9e5f390f9e 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7354.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7354.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7354", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.893", - "lastModified": "2014-11-14T14:09:51.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:50.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/949985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7357.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7357.json index c9a0955fb09..fd5d7fe65b0 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7357.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7357.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7357", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:13.940", - "lastModified": "2014-11-14T14:09:53.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:50.867", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/147513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7358.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7358.json index a8d08ae45af..f1a03829e32 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7358.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7358.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7358", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.003", - "lastModified": "2014-11-14T14:09:54.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:51.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/469857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7359.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7359.json index 26c22e1b518..e9ca5e301ca 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7359.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7359.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7359", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.050", - "lastModified": "2014-11-14T14:09:56.123", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:51.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/587249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7360.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7360.json index c966052d051..c70b4a9fe81 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7360.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7360.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7360", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.097", - "lastModified": "2014-11-14T14:09:57.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:51.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/726377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7361.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7361.json index aa087a7fc9c..c687e971b26 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7361.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7361.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7361", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.143", - "lastModified": "2014-11-14T14:09:59.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:51.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/714585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7362.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7362.json index eb15225a3a2..151e9ff43f3 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7362.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7362.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7362", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.207", - "lastModified": "2014-11-14T14:10:00.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:51.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/388633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7364.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7364.json index b8d0bd84c0d..40d9d786760 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7364.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7364.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7364", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.253", - "lastModified": "2014-11-14T14:10:02.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:52.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/680793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7366.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7366.json index 0c2e53d91d6..4a1f71143e7 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7366.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7366.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7366", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.300", - "lastModified": "2014-11-14T14:10:03.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:52.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/798185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7367.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7367.json index 6d932aa2d0d..dbe97dfd7c2 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7367.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7367.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7367", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.347", - "lastModified": "2014-11-14T14:10:05.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:52.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/761401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7368.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7368.json index 6b0bcc53db1..8906b02e71e 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7368.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7368.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7368", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.410", - "lastModified": "2014-11-14T14:10:06.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:52.623", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/174881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7369.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7369.json index dc4db902526..35d8ad55457 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7369.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7369.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7369", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.473", - "lastModified": "2014-11-14T14:10:08.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:52.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/710273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7370.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7370.json index aea12076df6..bf3063caf03 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7370.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7370.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7370", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.520", - "lastModified": "2014-11-14T14:10:09.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:53.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/449265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7371.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7371.json index 6f832f42acf..4207f5c25d9 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7371.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7371.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7371", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.567", - "lastModified": "2014-11-14T14:10:11.673", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:53.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/827225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7372.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7372.json index 4e0981057bb..b5ba168857f 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7372.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7372.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7372", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.630", - "lastModified": "2014-11-14T14:10:13.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:53.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/448913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7373.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7373.json index ed41ec6f0a8..92489dfa390 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7373.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7373.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7373", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.677", - "lastModified": "2014-11-14T14:10:14.877", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:53.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/462465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7374.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7374.json index ea29066e107..158df5b4087 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7374.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7374.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7374", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.737", - "lastModified": "2014-11-14T14:10:16.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:53.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/231201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7375.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7375.json index bf9cddfbbe8..49663e7143e 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7375.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7375.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7375", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.787", - "lastModified": "2014-11-14T14:10:18.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:53.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/281889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7376.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7376.json index 47681517988..3e51355639f 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7376.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7376.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7376", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.833", - "lastModified": "2014-11-14T14:10:19.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:54.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/383529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7378.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7378.json index 7229eb63c09..c72d77bc250 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7378.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7378.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7378", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.893", - "lastModified": "2014-11-14T14:10:21.470", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:54.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/757529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7379.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7379.json index 198dfadd0b3..0785833336c 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7379.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7379.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7379", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.940", - "lastModified": "2014-11-14T14:10:22.970", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:54.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/542457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7380.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7380.json index b2104ec3b1e..c271b83c5ee 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7380.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7380.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7380", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:14.987", - "lastModified": "2014-11-14T14:10:24.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:54.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/921297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7382.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7382.json index 0cda0dffaa7..a947657295f 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7382.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7382.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7382", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.050", - "lastModified": "2014-11-14T14:10:25.970", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:54.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/772137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7384.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7384.json index 53428b1dd61..9e452919fc9 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7384.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7384.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7384", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.097", - "lastModified": "2014-11-14T14:10:27.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:55.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/785073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7385.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7385.json index afa627f3d98..168a54d2570 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7385.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7385.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7385", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.160", - "lastModified": "2014-11-14T14:10:29.003", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:55.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/852041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7387.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7387.json index 9dbe567a02d..3a730b92b0e 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7387.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7387.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7387", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.207", - "lastModified": "2014-11-14T14:10:30.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:55.493", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/348329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7388.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7388.json index 0f4e2104ab5..ada82a887ad 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7388.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7388.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7388", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.270", - "lastModified": "2014-11-14T14:10:32.113", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:55.683", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/542633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7389.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7389.json index 7a88e0922be..93011d1edc7 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7389.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7389.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7389", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.333", - "lastModified": "2014-11-14T14:10:33.613", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:55.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/555129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7390.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7390.json index 6419a9aa62e..6fc77a23fcc 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7390.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7390.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7390", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.380", - "lastModified": "2014-11-14T14:10:35.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:56.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/120321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7391.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7391.json index 04d9224a121..3bd1d2a163e 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7391.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7391.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7391", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.440", - "lastModified": "2014-11-14T14:10:36.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:56.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/161945", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7392.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7392.json index 6b5e2e9e4f7..6aae4d0e3fc 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7392.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7392.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7392", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.487", - "lastModified": "2014-11-14T14:10:38.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:56.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/539201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7393.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7393.json index 632303e79ad..903cb432cba 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7393.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7393.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7393", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.537", - "lastModified": "2014-11-14T14:10:39.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:56.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/613121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7394.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7394.json index 1a0b8db1807..048d71fb389 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7394.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7394.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7394", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.597", - "lastModified": "2014-11-14T14:10:41.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:56.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/536121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7395.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7395.json index 19f140edf59..c541218e7c7 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7395.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7395.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7395", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.643", - "lastModified": "2014-11-14T14:10:42.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:57.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/611537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7396.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7396.json index ae42db25101..b87bbe3a754 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7396.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7396.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7396", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.707", - "lastModified": "2014-11-14T14:10:44.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:57.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/902025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7397.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7397.json index d04c800768a..420e11c7bdf 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7397.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7397.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7397", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.753", - "lastModified": "2014-11-14T14:10:45.773", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:57.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/650081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7398.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7398.json index ad8d965e8b1..e9bb7a72a99 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7398.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7398.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7398", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.800", - "lastModified": "2014-11-14T14:10:47.303", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:57.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/674985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-73xx/CVE-2014-7399.json b/CVE-2014/CVE-2014-73xx/CVE-2014-7399.json index 4dd6d7cc4f2..3dce08fc851 100644 --- a/CVE-2014/CVE-2014-73xx/CVE-2014-7399.json +++ b/CVE-2014/CVE-2014-73xx/CVE-2014-7399.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7399", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.863", - "lastModified": "2014-11-14T14:10:48.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:57.747", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/236041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7402.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7402.json index b3813b46f33..1d1d138d652 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7402.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7402.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7402", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.910", - "lastModified": "2014-11-14T14:10:50.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:57.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/278369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7403.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7403.json index 341b77da1d1..4a1b969184e 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7403.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7403.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7403", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:15.973", - "lastModified": "2014-11-14T14:10:51.773", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:58.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/937929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7405.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7405.json index 4f80d053339..2de249e2e0d 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7405.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7405.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7405", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.037", - "lastModified": "2014-11-14T14:10:53.227", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:58.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/708865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7406.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7406.json index 2998fa19971..2bdeab75c28 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7406.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7406.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7406", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.083", - "lastModified": "2014-11-14T14:10:54.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:58.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/615057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7407.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7407.json index 92d47a355b5..411b82ce48a 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7407.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7407.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7407", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.143", - "lastModified": "2014-11-14T14:10:56.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:58.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/731569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7408.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7408.json index bed5d5f56ea..191649ca291 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7408.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7408.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7408", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.190", - "lastModified": "2014-11-14T14:10:57.743", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:58.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/820009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7409.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7409.json index 653b38e6250..f2f5b17e362 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7409.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7409.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7409", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.237", - "lastModified": "2014-11-14T14:10:59.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:59.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/511481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7410.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7410.json index fe1f7bb9abf..bbb98520d3e 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7410.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7410.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7410", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.300", - "lastModified": "2014-11-14T14:11:00.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:59.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/307761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7413.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7413.json index b94c620eece..1e39b02f929 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7413.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7413.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7413", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.347", - "lastModified": "2014-11-14T14:11:02.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:59.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/716785", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7414.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7414.json index 64b7840517f..3385d243c13 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7414.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7414.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7414", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.410", - "lastModified": "2014-11-14T14:11:03.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:59.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/467481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7415.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7415.json index f6ee48be277..dd22b32e37b 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7415.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7415.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7415", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.457", - "lastModified": "2014-11-14T14:11:05.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:16:59.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/866561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7416.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7416.json index 93ae0ab901d..124dfdd5aa0 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7416.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7416.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7416", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.520", - "lastModified": "2014-11-14T14:11:06.853", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:00.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/175937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7417.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7417.json index a02d87b9e4e..bff9ce87587 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7417.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7417.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7417", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.567", - "lastModified": "2014-11-14T14:11:08.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:00.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/171713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7418.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7418.json index bfb36b3dd3e..5fc064ce818 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7418.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7418.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7418", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.630", - "lastModified": "2014-11-14T14:11:09.760", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:00.447", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/413713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7419.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7419.json index 3e1bb6ff900..bb901ff0136 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7419.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7419.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7419", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.677", - "lastModified": "2014-11-14T14:11:11.230", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:00.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/827049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7420.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7420.json index 871f087239f..e090145bd89 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7420.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7420.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7420", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.737", - "lastModified": "2014-11-14T14:11:12.683", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:00.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/353433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7421.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7421.json index 96b4082eb96..f6c48cbdc99 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7421.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7421.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7421", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.787", - "lastModified": "2014-11-14T14:11:14.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:01.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/244577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7422.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7422.json index 496fb323f5a..ed38b3f0b80 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7422.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7422.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7422", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.847", - "lastModified": "2014-11-14T14:11:15.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:01.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/739929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7423.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7423.json index 499b0632094..510bea585ab 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7423.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7423.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7423", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.897", - "lastModified": "2014-11-14T14:11:17.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:01.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/763161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7424.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7424.json index c619e80fe89..89aca817fb6 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7424.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7424.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7424", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:16.957", - "lastModified": "2014-11-14T14:11:18.840", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:01.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/483761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7425.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7425.json index 1a725600d01..7bf2fe7df8a 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7425.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7425.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7425", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.003", - "lastModified": "2014-11-14T14:11:20.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:01.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/992225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7427.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7427.json index de1e00117c7..164df5e16de 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7427.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7427.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7427", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.067", - "lastModified": "2014-11-14T15:24:42.103", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:02.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/853449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7428.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7428.json index 7f1381ef924..965fa6e5847 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7428.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7428.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7428", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.113", - "lastModified": "2014-11-14T14:11:23.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:02.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/808569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7430.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7430.json index 1a2c43a2b65..689ffb9ff76 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7430.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7430.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7430", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.177", - "lastModified": "2014-11-14T14:11:25.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:02.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/214129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7431.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7431.json index fa43380aa21..6ba5858b791 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7431.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7431.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7431", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.223", - "lastModified": "2014-11-14T14:11:26.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:02.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/308729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7432.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7432.json index 9bd68ae4635..e126b5b5045 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7432.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7432.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7432", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.287", - "lastModified": "2014-11-14T14:11:28.403", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:02.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/908185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7433.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7433.json index ff283c841a5..9bcd36878c9 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7433.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7433.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7433", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.333", - "lastModified": "2014-11-14T14:11:29.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:02.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/702353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7434.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7434.json index 10844f967ba..7fbdaef0daf 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7434.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7434.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7434", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.397", - "lastModified": "2014-11-14T14:11:31.497", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:03.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/200577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7435.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7435.json index ea93115759a..6123ac9d697 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7435.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7435.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7435", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.440", - "lastModified": "2014-11-14T14:11:32.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:03.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/152177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7436.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7436.json index 22a333f1402..c6ae3b3b386 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7436.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7436.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7436", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.503", - "lastModified": "2014-11-14T14:11:34.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:03.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/247745", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7437.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7437.json index 4a2a1bc2321..821ecf7c190 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7437.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7437.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7437", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.567", - "lastModified": "2014-11-14T14:11:35.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:03.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/937753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7439.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7439.json index cd7538c8a8b..634395cc7d4 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7439.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7439.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7439", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.613", - "lastModified": "2014-11-14T14:40:24.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:04.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/356865", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7441.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7441.json index 8f9261dcbf9..63abe8e4ca8 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7441.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7441.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7441", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.677", - "lastModified": "2014-11-14T15:18:55.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:04.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/529257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7443.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7443.json index c0609d40b76..75861e411a3 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7443.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7443.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7443", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.737", - "lastModified": "2014-11-14T15:26:29.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:04.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/893753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7444.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7444.json index 03514586c78..ae96313f313 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7444.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7444.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7444", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.787", - "lastModified": "2014-11-14T14:11:40.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:04.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/394177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7445.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7445.json index 7a1c7f065bc..26dcdaad0f3 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7445.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7445.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7445", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.847", - "lastModified": "2014-11-14T14:11:42.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:04.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/401921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7446.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7446.json index 1f4775edca7..edb882a8149 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7446.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7446.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7446", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.897", - "lastModified": "2014-11-14T15:29:05.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:05.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/101049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7447.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7447.json index 07ebf69c4f3..09a3f0b9d29 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7447.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7447.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7447", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:17.957", - "lastModified": "2014-11-14T14:11:45.030", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:05.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/174529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7448.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7448.json index 886c5988314..fbe3ba66844 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7448.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7448.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7448", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.020", - "lastModified": "2014-11-14T14:11:46.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:05.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/226713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7449.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7449.json index 0bf68eef62f..0ac36b1b9de 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7449.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7449.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7449", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.067", - "lastModified": "2014-11-14T14:11:48.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:05.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/723737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7450.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7450.json index 79fa6456fca..6a1f53db1da 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7450.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7450.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7450", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.130", - "lastModified": "2014-11-14T14:11:49.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:05.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/992401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7452.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7452.json index 65913529cf3..43bd3b806ce 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7452.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7452.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7452", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.177", - "lastModified": "2014-11-14T14:11:51.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:05.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/211489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7454.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7454.json index b106bf41698..50d7b7ba3ca 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7454.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7454.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7454", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.237", - "lastModified": "2014-11-14T14:11:52.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:06.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/709217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7455.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7455.json index 799d1f8be5a..09b700afeac 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7455.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7455.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7455", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.300", - "lastModified": "2014-11-14T14:11:54.063", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:06.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/692673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7456.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7456.json index 788685f09c8..837cfc80580 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7456.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7456.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7456", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.347", - "lastModified": "2014-11-14T14:11:55.550", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:06.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/415737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7457.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7457.json index ada97d8ad4a..0a013d88c38 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7457.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7457.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7457", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.410", - "lastModified": "2014-11-14T14:11:57.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:06.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/382737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7458.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7458.json index 8025af17676..a131dd3531d 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7458.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7458.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7458", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.457", - "lastModified": "2014-11-14T14:11:58.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:07.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/957113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7459.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7459.json index 9d926db7838..a2f8b7f6a06 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7459.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7459.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7459", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.520", - "lastModified": "2014-11-14T14:12:00.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:07.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/841745", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7460.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7460.json index aca00b5adc3..2237c24e612 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7460.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7460.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7460", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.583", - "lastModified": "2014-11-14T14:41:12.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:07.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/815873", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7461.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7461.json index 9cdcaed408e..42059ad092a 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7461.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7461.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7461", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.630", - "lastModified": "2014-11-14T14:12:01.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:07.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/896657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7462.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7462.json index 6f2dd7d3fda..ef4a13f9f46 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7462.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7462.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7462", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.693", - "lastModified": "2014-11-22T02:59:26.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:07.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/642073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7463.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7463.json index 0e7a1e13500..5c9ed43248f 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7463.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7463.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7463", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.753", - "lastModified": "2014-11-22T03:00:59.773", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:07.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/284969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7464.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7464.json index cca6110621d..f1c8e0af541 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7464.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7464.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7464", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.817", - "lastModified": "2014-11-22T03:00:08.130", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:08.177", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/152265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7465.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7465.json index 833af51c6cd..522b9f99aa4 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7465.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7465.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7465", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.863", - "lastModified": "2014-11-22T03:00:42.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:08.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/617521", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7466.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7466.json index 154690f0c4c..a641c7b2a31 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7466.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7466.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7466", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.927", - "lastModified": "2014-11-14T14:12:07.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:08.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/730161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7467.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7467.json index 60f8042566f..ed2e9d3c92b 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7467.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7467.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7467", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:18.990", - "lastModified": "2014-11-14T14:12:09.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:08.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/413009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7468.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7468.json index e449b63b15e..6dcf0a410d1 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7468.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7468.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7468", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:19.037", - "lastModified": "2014-11-14T14:12:10.973", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:08.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/235953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7469.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7469.json index 98b4a87cdcb..6176242a62d 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7469.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7469.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7469", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:19.097", - "lastModified": "2014-11-18T17:34:59.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:09.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/789825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7470.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7470.json index ff83793f089..9c2d40c6e33 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7470.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7470.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7470", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:19.147", - "lastModified": "2014-11-14T14:12:13.973", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:09.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/844385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7471.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7471.json index a85c6f7bd8f..ee0ac7f6caf 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7471.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7471.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7471", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:19.207", - "lastModified": "2014-11-14T14:12:15.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:09.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/736409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7472.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7472.json index e9c68846380..55b4ea82361 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7472.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7472.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7472", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:19.270", - "lastModified": "2014-11-14T14:12:17.223", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:09.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/619105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7475.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7475.json index d262a1bd680..f508daa44d2 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7475.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7475.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7475", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:19.317", - "lastModified": "2014-11-14T14:12:18.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:09.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/975417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7476.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7476.json index 8fab1d32b1b..0bbb99150f5 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7476.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7476.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7476", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:19.380", - "lastModified": "2014-11-14T14:12:20.303", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:10.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/493177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7478.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7478.json index 686a34c3ef0..bd7e331eb7f 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7478.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7478.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7478", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:19.443", - "lastModified": "2014-11-14T14:12:21.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:10.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/625969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7481.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7481.json index 37667739d15..9c41585c823 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7481.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7481.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7481", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:19.503", - "lastModified": "2014-11-14T14:12:23.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:11.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/892961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7483.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7483.json index b1c6636f34c..2622946d5b2 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7483.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7483.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7483", "sourceIdentifier": "cret@cert.org", "published": "2014-10-19T10:55:19.550", - "lastModified": "2014-11-14T14:12:24.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:11.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/793521", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7484.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7484.json index a9289b1352d..9a1598de299 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7484.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7484.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7484", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:07.827", - "lastModified": "2014-11-14T14:12:26.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:11.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/608369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7485.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7485.json index 644f106904c..cecd901cd5d 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7485.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7485.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7485", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:07.873", - "lastModified": "2014-11-14T14:12:27.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:12.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/102193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7486.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7486.json index de0e5934e88..009bba19eb6 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7486.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7486.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7486", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:07.920", - "lastModified": "2014-11-14T14:12:29.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:12.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/345425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7487.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7487.json index 7e8d972a585..dd97808e602 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7487.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7487.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7487", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:07.967", - "lastModified": "2014-11-14T14:12:30.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:12.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/739137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7488.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7488.json index c2c2dc47709..f0cd2b2b636 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7488.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7488.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7488", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.013", - "lastModified": "2014-11-14T14:12:31.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:12.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/597897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7490.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7490.json index c2926f44c6a..43ed6f3dd50 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7490.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7490.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7490", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.060", - "lastModified": "2014-11-14T14:12:33.570", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:13.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/876681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7491.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7491.json index 5514ae23827..9d0410f4816 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7491.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7491.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7491", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.107", - "lastModified": "2014-11-14T14:12:35.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:13.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/879849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7492.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7492.json index 836f159ae99..05fdcf0d5c6 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7492.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7492.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7492", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.153", - "lastModified": "2014-11-14T14:12:37.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:13.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/719865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7493.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7493.json index db93acad312..384f69fd6dc 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7493.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7493.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7493", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.200", - "lastModified": "2014-11-14T14:12:38.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:14.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/275817", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7494.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7494.json index f88fb13d627..91c709a437a 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7494.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7494.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7494", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.247", - "lastModified": "2014-11-14T14:12:40.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:14.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/510161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7495.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7495.json index 58fb6a7ea86..cb16d76d845 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7495.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7495.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7495", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.310", - "lastModified": "2014-11-14T15:21:59.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:14.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/325625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7497.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7497.json index 744848956b0..53f07e220eb 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7497.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7497.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7497", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.357", - "lastModified": "2014-11-14T14:12:43.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:15.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/588305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7498.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7498.json index 57a5848f799..cbc8d41e31c 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7498.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7498.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7498", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.403", - "lastModified": "2014-11-14T14:12:45.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:15.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/148393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-74xx/CVE-2014-7499.json b/CVE-2014/CVE-2014-74xx/CVE-2014-7499.json index dec9da59cd5..aae40a89c2f 100644 --- a/CVE-2014/CVE-2014-74xx/CVE-2014-7499.json +++ b/CVE-2014/CVE-2014-74xx/CVE-2014-7499.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7499", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.450", - "lastModified": "2014-11-14T14:12:46.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:15.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/256545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7501.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7501.json index 32baad3bb42..d3c43a56ada 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7501.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7501.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7501", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.497", - "lastModified": "2014-11-14T14:12:47.980", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:15.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/946465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7502.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7502.json index a5dd8f25a40..e81201038de 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7502.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7502.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7502", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.547", - "lastModified": "2014-11-14T14:12:49.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:15.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/343137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7505.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7505.json index 1091823ff17..863e5a6ea31 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7505.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7505.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7505", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.590", - "lastModified": "2014-11-14T14:12:50.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:16.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/244401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7506.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7506.json index 9dac9ceb4b0..f4dc616de95 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7506.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7506.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7506", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.637", - "lastModified": "2014-11-14T14:12:52.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:16.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/125601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7507.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7507.json index d04df0656e1..70f77e65bfa 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7507.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7507.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7507", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.687", - "lastModified": "2014-11-14T14:12:54.137", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:16.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/510337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7508.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7508.json index 598613f3ab5..38e477969e3 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7508.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7508.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7508", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.733", - "lastModified": "2014-11-14T14:12:55.683", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:16.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/856617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7509.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7509.json index 13cc9dc3fdb..7cec78adad5 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7509.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7509.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7509", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.797", - "lastModified": "2014-11-14T14:12:57.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:16.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/507697", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7510.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7510.json index b872aedf37f..9db0c443a89 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7510.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7510.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7510", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.840", - "lastModified": "2014-11-14T14:12:58.793", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:17.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/700857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7513.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7513.json index 62cbacc81fd..fde7cb8703d 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7513.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7513.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7513", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.887", - "lastModified": "2014-11-14T14:13:00.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:17.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/474609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7515.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7515.json index 3c279fd3dba..d346fd48aa7 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7515.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7515.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7515", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.950", - "lastModified": "2014-11-14T14:13:02.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:17.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/216241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7516.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7516.json index d47773c4170..690cf71f56f 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7516.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7516.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7516", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:08.983", - "lastModified": "2014-11-14T14:13:03.607", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:17.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/863217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7517.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7517.json index f5ddcf0faa3..68cd2ce9fc6 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7517.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7517.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7517", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.030", - "lastModified": "2014-11-14T14:13:05.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:17.973", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/796601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7518.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7518.json index e9ec147a1b5..be22da372e5 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7518.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7518.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7518", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.090", - "lastModified": "2014-11-14T14:13:06.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:18.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/600097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7519.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7519.json index d4e53b29c0b..f2b5b61ccaf 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7519.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7519.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7519", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.137", - "lastModified": "2014-11-14T14:13:08.123", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:18.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/416177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7520.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7520.json index c4fc41ae7a2..7ca2c811045 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7520.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7520.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7520", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.187", - "lastModified": "2014-11-14T14:13:09.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:18.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/422425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7521.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7521.json index 0f3d02eeba7..f1e782eb69c 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7521.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7521.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7521", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.233", - "lastModified": "2014-11-14T14:13:11.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:18.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/180337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7522.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7522.json index 507260b651a..26f1cca116c 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7522.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7522.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7522", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.280", - "lastModified": "2014-11-14T14:13:12.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:18.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/227241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7523.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7523.json index 383a2fb2c15..48107574c58 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7523.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7523.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7523", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.327", - "lastModified": "2014-11-14T14:13:14.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:19.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/579681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7524.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7524.json index ed4cdd742f7..74c7f2f418a 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7524.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7524.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7524", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.387", - "lastModified": "2014-11-14T14:13:15.563", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:19.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/682817", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7525.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7525.json index eb68204eefe..27f4d871675 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7525.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7525.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7525", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.437", - "lastModified": "2014-11-14T14:13:17.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:19.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/803025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7526.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7526.json index 91c6759d2d8..21a8e15b14b 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7526.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7526.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7526", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.483", - "lastModified": "2014-11-14T14:13:18.483", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:19.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/310577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7527.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7527.json index 089c786db38..b56eec0b8c9 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7527.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7527.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7527", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.530", - "lastModified": "2014-11-17T18:32:28.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:19.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/726289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7528.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7528.json index 0d3b516368e..7dc2e9f69e8 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7528.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7528.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7528", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.593", - "lastModified": "2014-11-14T14:13:21.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:19.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/924113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7529.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7529.json index 16cd334025d..2bbd2282810 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7529.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7529.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7529", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.637", - "lastModified": "2014-11-14T14:13:23.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:20.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/743361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7530.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7530.json index 8b5bd6b5704..352d492a551 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7530.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7530.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7530", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.687", - "lastModified": "2014-11-14T14:13:24.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:20.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/192481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7532.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7532.json index 14318e1ff70..eed1ef06802 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7532.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7532.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7532", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.733", - "lastModified": "2014-11-14T14:13:26.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:20.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/151209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7533.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7533.json index 6df058d65a8..9a8c98bc643 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7533.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7533.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7533", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.780", - "lastModified": "2014-11-14T14:13:27.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:20.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/396729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7534.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7534.json index 30d637eb67d..df817a83816 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7534.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7534.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7534", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.843", - "lastModified": "2014-11-14T14:13:29.300", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:20.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/984393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7535.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7535.json index 48319b2b592..fc15745b5ad 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7535.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7535.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7535", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.887", - "lastModified": "2014-11-14T14:13:30.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:21.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/945849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7536.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7536.json index 0e4848c261e..3088cdc3b75 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7536.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7536.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7536", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.937", - "lastModified": "2014-11-14T14:13:32.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:21.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/366985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7538.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7538.json index 67e2da08505..9ba8fff8ddb 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7538.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7538.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7538", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:09.997", - "lastModified": "2014-11-14T14:13:33.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:21.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/323425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7539.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7539.json index 76b4aa50692..a781b9e10bd 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7539.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7539.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7539", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.047", - "lastModified": "2015-02-11T16:50:03.780", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:21.683", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/372969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7542.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7542.json index 424cb469994..d31d146d010 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7542.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7542.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7542", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.093", - "lastModified": "2014-11-14T14:13:36.753", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:21.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/749169", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7543.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7543.json index 6b331816882..3d9615d8659 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7543.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7543.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7543", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.140", - "lastModified": "2014-11-14T14:13:38.393", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:22.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/724969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7544.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7544.json index c7bd9957c48..d4ddb399cd8 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7544.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7544.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7544", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.187", - "lastModified": "2014-11-14T14:13:39.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:22.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/508577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7546.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7546.json index 912fdf0b005..fc3f5c03d86 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7546.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7546.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7546", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.247", - "lastModified": "2014-11-14T14:13:41.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:22.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/768089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7547.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7547.json index 1a5e268eaa0..ca400cbaad3 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7547.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7547.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7547", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.297", - "lastModified": "2014-11-14T14:13:43.380", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:22.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/785601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7550.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7550.json index c7fb184c5d9..7fc0feb36ea 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7550.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7550.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7550", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.343", - "lastModified": "2014-11-14T14:45:35.230", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:22.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/463609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7551.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7551.json index b37cc96f46e..74ad338cea4 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7551.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7551.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7551", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.390", - "lastModified": "2014-11-14T14:13:45.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:23.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/927897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7552.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7552.json index 64ffd17e273..4e91e54c17f 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7552.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7552.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7552", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.450", - "lastModified": "2014-11-14T14:13:46.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:23.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/848609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7553.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7553.json index 215f21807ef..eec4d3cc641 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7553.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7553.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7553", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.497", - "lastModified": "2014-11-14T14:13:48.553", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:23.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/438441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7554.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7554.json index e74ece0a92e..5c7eaf82d00 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7554.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7554.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7554", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.547", - "lastModified": "2014-11-14T14:13:50.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:23.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/673401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7555.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7555.json index ec604a82670..aadfc53987f 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7555.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7555.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7555", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.607", - "lastModified": "2014-11-14T14:13:51.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:23.793", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/855825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7557.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7557.json index 6a539161453..373164e0aa6 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7557.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7557.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7557", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.653", - "lastModified": "2014-11-14T14:13:53.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:24.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/757881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7558.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7558.json index 33a65314188..8f140e679b8 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7558.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7558.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7558", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.700", - "lastModified": "2014-11-14T14:13:54.583", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:24.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/969081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7559.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7559.json index af72a55b8e4..38be7f7e4ae 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7559.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7559.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7559", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.747", - "lastModified": "2014-11-14T14:13:56.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:24.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/652281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7560.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7560.json index 0168c690a97..b76c49dc82d 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7560.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7560.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7560", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.797", - "lastModified": "2014-11-14T14:13:57.553", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:24.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/178753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7562.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7562.json index 5e0a3d63075..ec44306a858 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7562.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7562.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7562", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.857", - "lastModified": "2014-11-14T14:13:59.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:24.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/511129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7563.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7563.json index fca3b02e887..1e4c569814d 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7563.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7563.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7563", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.903", - "lastModified": "2014-11-14T14:14:00.490", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:24.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/358537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7564.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7564.json index 71ac6dedf92..b1c56cc8915 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7564.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7564.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7564", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:10.950", - "lastModified": "2014-11-14T14:14:02.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:25.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/701297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7565.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7565.json index 622a86979c8..1114b4243ef 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7565.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7565.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7565", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.013", - "lastModified": "2014-11-14T14:14:03.493", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:25.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/150241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7566.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7566.json index 04847c2823c..2b87915eaee 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7566.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7566.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7566", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.077", - "lastModified": "2014-11-14T14:14:04.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:25.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/275993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7567.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7567.json index 7d0cc2d54e2..8b05b7b1b67 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7567.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7567.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7567", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.123", - "lastModified": "2014-11-14T14:14:06.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:25.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/744417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7568.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7568.json index cfc4576cf9d..cc7308666ad 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7568.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7568.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7568", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.170", - "lastModified": "2014-11-14T14:14:07.960", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:25.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/746705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7569.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7569.json index 902b0672a4e..fa83ccb9ab6 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7569.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7569.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7569", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.233", - "lastModified": "2014-11-14T14:14:09.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:26.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/426473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7570.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7570.json index 037dc5fdf4e..6e9ef7e37af 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7570.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7570.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7570", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.280", - "lastModified": "2014-11-14T15:25:38.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:26.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/195385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7571.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7571.json index cc0a2ce1a6b..c001bc6db96 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7571.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7571.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7571", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.327", - "lastModified": "2014-11-14T14:47:01.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:26.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/197057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7572.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7572.json index bff2ab3b4bb..150772bcf1b 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7572.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7572.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7572", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.390", - "lastModified": "2014-11-14T14:14:12.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:26.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/999089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7573.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7573.json index fda3e46952b..b00e77c8853 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7573.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7573.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7573", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.437", - "lastModified": "2014-11-14T14:14:13.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:26.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/599833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7575.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7575.json index 797fe1fc4c0..fea1829d77d 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7575.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7575.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7575", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.483", - "lastModified": "2014-11-14T14:14:15.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:27.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/223017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7576.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7576.json index 409bdda8294..5dfed963b86 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7576.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7576.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7576", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.547", - "lastModified": "2014-11-14T14:14:16.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:27.263", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/105097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7577.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7577.json index a6d23a9ed73..47c1356f8ee 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7577.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7577.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7577", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.593", - "lastModified": "2014-11-14T14:14:18.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:27.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/177521", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7578.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7578.json index 4b187c75040..c4d8e7b0924 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7578.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7578.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7578", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.640", - "lastModified": "2014-11-14T14:14:19.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:27.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/238769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7580.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7580.json index e056c8502d9..13381d0f53e 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7580.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7580.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7580", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.700", - "lastModified": "2014-11-14T14:14:21.463", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:27.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/741073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7581.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7581.json index fbba9b0b082..401dbbc57b0 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7581.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7581.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7581", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.747", - "lastModified": "2014-11-14T14:14:22.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:28.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/356777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7582.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7582.json index 5365302074e..1814317dd21 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7582.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7582.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7582", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.797", - "lastModified": "2014-11-14T14:14:24.480", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:28.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/168369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7584.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7584.json index 5c763c4be8f..6771cfc3b4c 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7584.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7584.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7584", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.843", - "lastModified": "2014-11-14T14:14:26.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:28.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/356073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7585.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7585.json index 38a0c9d448a..7f78d7db8cc 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7585.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7585.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7585", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.903", - "lastModified": "2014-11-14T14:14:28.060", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:28.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/777681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7587.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7587.json index f8e894a471a..d416c36bd87 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7587.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7587.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7587", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:11.950", - "lastModified": "2014-11-14T14:14:30.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:28.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/846233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7589.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7589.json index 5ab63791471..b243166a8c4 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7589.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7589.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7589", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.013", - "lastModified": "2014-11-14T14:14:31.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:28.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/116977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7590.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7590.json index 679597e3061..e8421d3a2f7 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7590.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7590.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7590", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.060", - "lastModified": "2014-11-14T14:14:33.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:29.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/913905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7591.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7591.json index 3d5248fcf74..5b5b1cb7091 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7591.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7591.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7591", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.107", - "lastModified": "2014-11-14T14:14:35.920", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:29.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/460881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7592.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7592.json index 1ad38016282..2c0d96bef90 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7592.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7592.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7592", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.170", - "lastModified": "2014-11-14T14:14:37.420", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:29.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/649113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7593.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7593.json index 5585017cf81..f4d17c8da8c 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7593.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7593.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7593", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.217", - "lastModified": "2014-11-14T14:14:38.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:29.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/452609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7595.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7595.json index 129e3d201e0..352514f0ccc 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7595.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7595.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7595", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.280", - "lastModified": "2014-11-14T14:14:40.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:29.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/717489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7596.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7596.json index 81feae52dc8..070ed81b54f 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7596.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7596.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7596", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.327", - "lastModified": "2014-11-14T14:14:41.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:30.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/455161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7597.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7597.json index 6ef397e8da0..2d997981203 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7597.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7597.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7597", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.373", - "lastModified": "2014-11-14T14:14:43.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:30.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/399105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-75xx/CVE-2014-7598.json b/CVE-2014/CVE-2014-75xx/CVE-2014-7598.json index d5b113899c4..497b65b6ca9 100644 --- a/CVE-2014/CVE-2014-75xx/CVE-2014-7598.json +++ b/CVE-2014/CVE-2014-75xx/CVE-2014-7598.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7598", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.437", - "lastModified": "2014-11-14T14:14:44.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:30.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/904841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7602.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7602.json index 7d06a90e2a0..2c4f063944f 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7602.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7602.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7602", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.483", - "lastModified": "2014-11-14T14:14:46.500", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:30.747", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/880993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7603.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7603.json index 1c8854fe429..9d78f6152d5 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7603.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7603.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7603", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.547", - "lastModified": "2014-11-14T14:14:47.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:30.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/715993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7604.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7604.json index 3e5f6456c6f..f7af01db59d 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7604.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7604.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7604", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.593", - "lastModified": "2014-11-14T14:14:49.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:31.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/969257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7605.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7605.json index 36f1adaa637..794b5f1f857 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7605.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7605.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7605", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.653", - "lastModified": "2014-11-14T14:14:51.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:31.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/387137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7606.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7606.json index 03e2a6b23f7..ec866295619 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7606.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7606.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7606", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.700", - "lastModified": "2014-11-14T14:14:52.970", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:31.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/468009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7607.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7607.json index b3619fe1b54..a638ace6fd7 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7607.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7607.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7607", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.747", - "lastModified": "2014-11-14T14:14:54.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:31.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/801969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7608.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7608.json index bd7ef2a6e5f..3eb3d78ab1c 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7608.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7608.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7608", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.810", - "lastModified": "2014-11-14T14:14:56.330", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:31.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/770465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7609.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7609.json index efb966e4d43..a579248e01b 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7609.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7609.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7609", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.857", - "lastModified": "2014-11-14T14:14:57.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:32.113", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/577217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7610.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7610.json index 116761a3628..fe96391326e 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7610.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7610.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7610", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.920", - "lastModified": "2014-11-14T14:14:59.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:32.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/499513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7611.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7611.json index 3be7664d0d0..e7175bc3436 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7611.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7611.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7611", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:12.967", - "lastModified": "2014-11-14T14:15:00.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:32.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/600713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7612.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7612.json index 50348635178..8946643778a 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7612.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7612.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7612", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.030", - "lastModified": "2014-11-14T14:15:02.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:32.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/176289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7613.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7613.json index d9c3d9405be..e3c3d1a667a 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7613.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7613.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7613", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.093", - "lastModified": "2014-11-14T14:15:03.753", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:32.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/506465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7614.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7614.json index 5f34b86742d..bacb1b858ee 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7614.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7614.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7614", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.140", - "lastModified": "2014-11-14T14:15:05.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:33.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/763601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7616.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7616.json index fd2eda83b41..d56806d74d7 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7616.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7616.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7616", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.200", - "lastModified": "2014-11-14T14:15:06.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:33.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/576425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7617.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7617.json index 964c1e17c94..a00f6e159ed 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7617.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7617.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7617", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.247", - "lastModified": "2014-11-14T14:15:08.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:33.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/117857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7618.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7618.json index 0ee8b3cabd8..30151eef4d7 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7618.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7618.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7618", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.310", - "lastModified": "2014-11-14T14:15:09.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:33.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/484113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7620.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7620.json index d5dc6ee5cce..ed1d22a055a 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7620.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7620.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7620", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.357", - "lastModified": "2014-11-14T14:15:12.613", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:33.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/669793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7621.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7621.json index 61eb220059f..d2a13be621c 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7621.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7621.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7621", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.420", - "lastModified": "2014-11-14T14:15:14.113", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:34.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/175849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7622.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7622.json index 3c1142d99e7..39043beff62 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7622.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7622.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7622", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.467", - "lastModified": "2014-11-14T14:15:15.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:34.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/970049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7624.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7624.json index efa4d2804dc..35074e788e3 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7624.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7624.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7624", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.513", - "lastModified": "2014-11-14T14:15:17.113", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:34.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/109585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7626.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7626.json index 95f7d90c553..d1f414c0eeb 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7626.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7626.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7626", "sourceIdentifier": "cret@cert.org", "published": "2014-10-20T10:55:13.577", - "lastModified": "2014-11-14T14:15:18.613", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:34.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/344281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7628.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7628.json index 7d4a4e23574..3e8b9d01e55 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7628.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7628.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7628", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.140", - "lastModified": "2014-11-14T14:15:50.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:34.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/287081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7629.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7629.json index 15c6f15fff9..fc14f5ac892 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7629.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7629.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7629", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.187", - "lastModified": "2014-11-14T14:15:51.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:35.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/953505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7630.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7630.json index daf660b0cc1..3bc939d9c75 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7630.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7630.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7630", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.250", - "lastModified": "2014-11-14T14:15:53.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:35.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/542017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7631.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7631.json index 91be8f234ac..3fe20dc337c 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7631.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7631.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7631", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.297", - "lastModified": "2014-11-14T14:15:54.853", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:35.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/242641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7632.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7632.json index cff5ac8b9a3..8bbb66c353c 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7632.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7632.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7632", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.343", - "lastModified": "2014-11-14T15:19:59.180", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:35.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/787361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7633.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7633.json index abf25da68ae..99253f75187 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7633.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7633.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7633", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.390", - "lastModified": "2014-11-14T14:15:57.840", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:35.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/371913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7634.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7634.json index 5596341cffb..b0208ac0669 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7634.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7634.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7634", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.437", - "lastModified": "2014-11-14T14:15:59.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:36.093", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/537881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7636.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7636.json index 5c9a25d2801..05016ee3957 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7636.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7636.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7636", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.483", - "lastModified": "2014-11-14T14:16:00.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:36.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/545801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7638.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7638.json index c676baa9e47..0ee97dcedc4 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7638.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7638.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7638", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.530", - "lastModified": "2014-11-14T14:16:02.497", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:36.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/734385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7640.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7640.json index 905c2f484ee..b81ef85c315 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7640.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7640.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7640", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.577", - "lastModified": "2014-11-14T14:16:04.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:36.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/534625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7642.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7642.json index 8f64c0914bc..a684ee808cb 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7642.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7642.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7642", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.627", - "lastModified": "2014-11-14T14:16:05.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:36.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/948137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7643.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7643.json index 068e14ff2d5..0cf484f81e2 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7643.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7643.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7643", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.673", - "lastModified": "2014-11-14T14:16:07.263", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:37.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/450497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7644.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7644.json index 29bcba3bf72..45ddb4e6d28 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7644.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7644.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7644", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.733", - "lastModified": "2014-11-14T14:16:08.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:37.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/962217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7646.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7646.json index 132b792d58f..482a78f3192 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7646.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7646.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7646", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.780", - "lastModified": "2014-11-14T14:16:10.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:37.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/143201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7647.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7647.json index c396db04f95..73fe4a875f3 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7647.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7647.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7647", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.827", - "lastModified": "2014-11-14T14:16:11.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:37.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/945761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7648.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7648.json index ba033251613..34a5b79fd5e 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7648.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7648.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7648", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.877", - "lastModified": "2014-11-14T14:16:13.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:37.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/216065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7649.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7649.json index fc5e915badf..1802ac10959 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7649.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7649.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7649", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.937", - "lastModified": "2014-11-14T14:16:14.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:38.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/950689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7650.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7650.json index af22aed766c..32396409685 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7650.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7650.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7650", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:04.983", - "lastModified": "2014-11-14T14:16:16.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:38.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/174265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7652.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7652.json index 28733425102..c3c2eecfd1b 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7652.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7652.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7652", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.030", - "lastModified": "2014-11-14T14:16:17.890", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:38.493", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/671377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7655.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7655.json index 0b6536df7e8..7664a5da626 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7655.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7655.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7655", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.077", - "lastModified": "2014-11-14T14:16:19.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:38.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/212721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7656.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7656.json index 95508420cdc..a04e56682b8 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7656.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7656.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7656", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.127", - "lastModified": "2014-11-14T14:16:20.953", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:38.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/866121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7659.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7659.json index ae35d419ee6..68080ca2baf 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7659.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7659.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7659", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.173", - "lastModified": "2014-11-14T14:16:22.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:39.113", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/327473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7660.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7660.json index e0a48574737..95c9a09ed4d 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7660.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7660.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7660", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.233", - "lastModified": "2014-11-14T14:16:23.890", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:39.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/347977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7661.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7661.json index 5f80b82d3f0..6f539cb51fc 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7661.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7661.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7661", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.280", - "lastModified": "2014-11-14T14:16:25.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:39.493", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/334073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7663.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7663.json index 6ce9b5fd62b..69bf0e42c7f 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7663.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7663.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7663", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.327", - "lastModified": "2014-11-14T14:16:26.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:39.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/505849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7664.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7664.json index 54ba9d1077c..61470ea2e09 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7664.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7664.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7664", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.377", - "lastModified": "2014-11-14T15:28:15.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:39.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/123665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7666.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7666.json index 17484747148..f0b0916308b 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7666.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7666.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7666", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.437", - "lastModified": "2014-11-14T14:16:29.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:40.093", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/147425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7667.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7667.json index 95c4cc7e0a8..db325892494 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7667.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7667.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7667", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.483", - "lastModified": "2014-11-14T14:16:31.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:40.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/810241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7668.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7668.json index f28e636023e..82f5840e184 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7668.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7668.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7668", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.530", - "lastModified": "2014-11-14T14:16:32.813", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:40.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/742217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7670.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7670.json index 0a26118e1f8..c4d346aec1c 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7670.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7670.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7670", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.577", - "lastModified": "2014-11-14T14:47:50.877", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:40.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/237713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7671.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7671.json index e4c16d87a89..c584dc3a1a8 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7671.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7671.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7671", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.640", - "lastModified": "2014-11-14T14:16:34.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:40.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/945145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7674.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7674.json index b40f9fbc7b2..0026432f64b 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7674.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7674.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7674", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.687", - "lastModified": "2014-11-14T14:16:35.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:41.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/567977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7676.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7676.json index 501c1786b7d..7918bf7d82b 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7676.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7676.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7676", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.737", - "lastModified": "2014-11-14T14:16:37.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:41.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/945937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7677.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7677.json index 7a91b7c2db6..8b4f857bdea 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7677.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7677.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7677", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.780", - "lastModified": "2014-11-14T14:16:38.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:41.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/538673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7681.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7681.json index 47097137c8e..6eade94faf7 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7681.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7681.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7681", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.843", - "lastModified": "2014-11-14T14:16:40.410", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:41.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/909593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7682.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7682.json index e7cfc4b8d08..586ff411f75 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7682.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7682.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7682", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.890", - "lastModified": "2014-11-14T14:16:44.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:41.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/416969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7683.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7683.json index 41bc18b4b64..7586127c9d8 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7683.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7683.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7683", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.937", - "lastModified": "2014-11-14T14:16:46.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:42.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/424537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7685.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7685.json index ec9717bce2e..eb92ad764c9 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7685.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7685.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7685", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:05.987", - "lastModified": "2014-11-14T14:16:47.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:42.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/564809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7686.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7686.json index 29d652d08df..5f3d312c7b9 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7686.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7686.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7686", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.047", - "lastModified": "2014-11-14T14:16:49.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:42.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/774161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7688.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7688.json index 4b9110a614a..4c34f1ae9d8 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7688.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7688.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7688", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.093", - "lastModified": "2014-11-14T14:16:50.990", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:42.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/598249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7689.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7689.json index 3695b033ea8..a370532a130 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7689.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7689.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7689", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.140", - "lastModified": "2014-11-14T14:16:52.520", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:42.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/780585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7690.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7690.json index dd07f6e4ea0..9871375c57d 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7690.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7690.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7690", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.187", - "lastModified": "2014-11-14T14:16:53.973", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:43.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/894457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7691.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7691.json index b58529560a8..70e8d85a779 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7691.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7691.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7691", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.237", - "lastModified": "2014-11-14T14:16:55.490", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:43.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/318497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7692.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7692.json index ab1e01e698f..3a0b4854088 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7692.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7692.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7692", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.297", - "lastModified": "2014-11-14T14:16:57.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:43.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/911793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7693.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7693.json index 0b109249b1f..0ea51e68fc8 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7693.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7693.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7693", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.343", - "lastModified": "2014-11-14T14:16:58.833", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:43.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/510777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7694.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7694.json index a768c7d9c3c..5d6f3df8161 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7694.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7694.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7694", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.390", - "lastModified": "2014-11-14T14:17:00.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:43.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/138185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7695.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7695.json index be3e45f01a0..30ab7a40a06 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7695.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7695.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7695", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.453", - "lastModified": "2014-11-14T14:17:01.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:44.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/896217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7696.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7696.json index 52cc197bc25..943fe37bc40 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7696.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7696.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7696", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.500", - "lastModified": "2014-11-14T14:17:03.397", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:44.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/386345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7697.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7697.json index c5d927ab283..3b2c9c88be8 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7697.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7697.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7697", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.547", - "lastModified": "2014-11-14T14:17:04.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:44.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/203305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-76xx/CVE-2014-7698.json b/CVE-2014/CVE-2014-76xx/CVE-2014-7698.json index 5ebfdf4a616..0a9fcfca4e6 100644 --- a/CVE-2014/CVE-2014-76xx/CVE-2014-7698.json +++ b/CVE-2014/CVE-2014-76xx/CVE-2014-7698.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7698", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.593", - "lastModified": "2014-11-14T14:17:06.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:44.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/657297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7700.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7700.json index 8dd234e0497..3450434640b 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7700.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7700.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7700", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.640", - "lastModified": "2014-11-14T14:17:07.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:44.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/770025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7701.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7701.json index 97da2561547..89f10f35617 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7701.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7701.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7701", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.703", - "lastModified": "2014-11-14T14:17:09.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:44.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/881345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7702.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7702.json index a95d31e97bf..8d31cfcb049 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7702.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7702.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7702", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.750", - "lastModified": "2014-11-14T14:17:11.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:45.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/367865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7703.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7703.json index b8509764940..c14426cdf25 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7703.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7703.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7703", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.797", - "lastModified": "2014-11-14T14:17:12.883", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:45.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/643833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7705.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7705.json index 797bb89d4cb..75720cafacf 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7705.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7705.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7705", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.860", - "lastModified": "2014-11-14T14:17:14.413", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:45.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/553985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7707.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7707.json index eca2801e891..a4ed75b6ec2 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7707.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7707.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7707", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.907", - "lastModified": "2014-11-14T14:17:15.900", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:45.727", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/319905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7708.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7708.json index b151d26278f..3f306e550fe 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7708.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7708.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7708", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:06.953", - "lastModified": "2014-11-14T14:17:17.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:45.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/904577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7710.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7710.json index 4363257f519..96047689365 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7710.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7710.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7710", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.017", - "lastModified": "2014-11-14T14:17:18.900", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:46.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/742569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7712.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7712.json index 7a558040065..960e683f00c 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7712.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7712.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7712", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.063", - "lastModified": "2014-11-14T14:17:20.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:46.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/858289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7713.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7713.json index d0673e510ed..6bd3993a354 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7713.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7713.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7713", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.110", - "lastModified": "2014-11-14T14:17:21.900", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:46.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/609337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7714.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7714.json index 160c487dd98..898e8e76ea5 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7714.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7714.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7714", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.173", - "lastModified": "2014-11-14T14:17:23.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:46.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/489393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7715.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7715.json index 8e96760f0aa..15ab189bbd3 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7715.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7715.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7715", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.220", - "lastModified": "2014-11-14T14:17:24.933", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:46.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/714673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7716.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7716.json index 5c50ffd181e..bc31fd2270c 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7716.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7716.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7716", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.283", - "lastModified": "2014-11-14T14:17:26.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:47.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/585225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7717.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7717.json index 4584999d377..586d20b512f 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7717.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7717.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7717", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.330", - "lastModified": "2014-11-14T14:17:27.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:47.287", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/557505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7718.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7718.json index e4ce1c6aa1a..b8ac05dfa83 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7718.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7718.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7718", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.390", - "lastModified": "2014-11-14T14:48:54.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:47.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/406409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7719.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7719.json index 643d2305100..85bc9c9e052 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7719.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7719.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7719", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.437", - "lastModified": "2014-11-14T14:17:29.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:47.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/836641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7720.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7720.json index 3d64496986c..1c16018e2a0 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7720.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7720.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7720", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.487", - "lastModified": "2014-11-14T14:17:30.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:47.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/438617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7721.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7721.json index 31a53ae70fe..7570e3b189c 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7721.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7721.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7721", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.547", - "lastModified": "2014-11-14T14:17:32.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:48.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/949633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7722.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7722.json index 96330d04fdc..e5f660d0d56 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7722.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7722.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7722", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.593", - "lastModified": "2014-11-14T14:17:33.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:48.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/223897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7723.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7723.json index 8412f1cc243..553ea8694c3 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7723.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7723.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7723", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.640", - "lastModified": "2014-11-14T14:17:35.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:48.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/727609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7724.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7724.json index e35be592494..4cfc0d78f0e 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7724.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7724.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7724", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.703", - "lastModified": "2014-11-14T14:17:36.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:48.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/338913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7725.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7725.json index fbd3c5c8b6c..4149779648a 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7725.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7725.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7725", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.750", - "lastModified": "2014-11-14T14:17:38.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:48.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/399017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7726.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7726.json index 21749391c57..1a83c039bee 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7726.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7726.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7726", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.797", - "lastModified": "2014-11-14T14:17:39.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:49.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/851073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7727.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7727.json index e3e2afebd4e..f71f8e65c3d 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7727.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7727.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7727", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.860", - "lastModified": "2014-11-14T14:17:41.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:49.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/928513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7728.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7728.json index 8eba0da996c..73c3bcef174 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7728.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7728.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7728", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.907", - "lastModified": "2014-11-14T14:17:42.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:49.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/149537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7731.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7731.json index c16431274ad..af869a380d8 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7731.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7731.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7731", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:07.970", - "lastModified": "2015-02-11T16:54:10.500", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:49.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/899209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7733.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7733.json index 945a2ea864d..469dfcb3965 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7733.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7733.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7733", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.017", - "lastModified": "2014-11-14T14:17:45.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:49.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/671465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7734.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7734.json index 7efc9b1470f..369d63aa67f 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7734.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7734.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7734", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.080", - "lastModified": "2014-11-14T14:17:47.390", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:50.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/736233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7735.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7735.json index e087bf4a278..e3e85c1839e 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7735.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7735.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7735", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.127", - "lastModified": "2014-11-14T14:17:48.920", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:50.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/871665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7737.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7737.json index d5ba85161b8..5e6f683727d 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7737.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7737.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7737", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.173", - "lastModified": "2014-11-14T14:49:51.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:50.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/895337", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7739.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7739.json index 76084b17141..affe63cd455 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7739.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7739.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7739", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.237", - "lastModified": "2014-11-14T14:17:50.607", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:50.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/567009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7740.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7740.json index c2afd279954..d13e4eb9d32 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7740.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7740.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7740", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.283", - "lastModified": "2014-11-14T14:17:52.060", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:50.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/789473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7741.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7741.json index c9ac714e30a..137ff90ba2d 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7741.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7741.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7741", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.343", - "lastModified": "2014-11-14T14:17:53.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:51.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/563137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7742.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7742.json index 66ad95fe405..0b69f68802d 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7742.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7742.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7742", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.390", - "lastModified": "2014-11-14T14:17:55.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:51.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/725673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7743.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7743.json index d1fd6a31553..121f8e971a7 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7743.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7743.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7743", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.453", - "lastModified": "2014-11-14T14:17:56.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:51.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/331785", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7744.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7744.json index ee71f459e4f..467951a699b 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7744.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7744.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7744", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.500", - "lastModified": "2014-11-14T14:17:58.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:51.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/789913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7745.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7745.json index 75935c1bfbb..c9b637d0de1 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7745.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7745.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7745", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.563", - "lastModified": "2014-11-14T14:17:59.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:51.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/577129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7746.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7746.json index 08e4ba4603b..3fd3ee9c7d4 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7746.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7746.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7746", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.610", - "lastModified": "2014-11-14T14:18:00.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:52.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/731305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7748.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7748.json index c3457836731..bfa8edeb651 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7748.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7748.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7748", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.657", - "lastModified": "2014-11-14T14:18:02.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:52.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/283297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7749.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7749.json index 138af048b87..a38891d2747 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7749.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7749.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7749", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.720", - "lastModified": "2014-11-14T14:18:03.890", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:52.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/846585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7750.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7750.json index 8d22e66228c..5f3aa56a8be 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7750.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7750.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7750", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.783", - "lastModified": "2014-11-14T14:18:05.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:52.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/888561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7751.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7751.json index e24d60deed2..75b0b7056f4 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7751.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7751.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7751", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.830", - "lastModified": "2014-11-14T14:18:06.923", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:52.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/586985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7752.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7752.json index 40021e1fa0a..211993331f7 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7752.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7752.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7752", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.890", - "lastModified": "2014-11-14T14:18:08.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:53.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/994601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7753.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7753.json index a14f2350fb7..d642e44b989 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7753.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7753.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7753", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:08.953", - "lastModified": "2014-11-14T14:18:09.847", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:53.263", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/762281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7754.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7754.json index 346ad9aa0da..b71a20413f1 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7754.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7754.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7754", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.000", - "lastModified": "2014-11-14T14:18:11.313", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:53.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/317089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7755.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7755.json index e6ff2c63311..96e56e02ae6 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7755.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7755.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7755", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.063", - "lastModified": "2014-11-14T14:18:12.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:53.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/442049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7756.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7756.json index b0510635600..117a18eefe9 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7756.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7756.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7756", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.110", - "lastModified": "2014-11-14T14:18:14.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:53.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/336009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7757.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7757.json index 5425939e568..60853022c2b 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7757.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7757.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7757", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.157", - "lastModified": "2014-11-14T14:18:15.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:54.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/756737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7758.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7758.json index 3d7ff406880..2b245c63f77 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7758.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7758.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7758", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.220", - "lastModified": "2014-11-14T14:18:17.393", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:54.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/857233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7759.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7759.json index e72a21e1318..46fd617870e 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7759.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7759.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7759", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.267", - "lastModified": "2014-11-14T14:18:18.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:54.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/173385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7760.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7760.json index d1563c3d48d..04de330d59a 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7760.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7760.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7760", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.330", - "lastModified": "2014-11-14T14:18:20.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:54.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/749785", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7761.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7761.json index a5bc198a991..75d895f650e 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7761.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7761.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7761", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.390", - "lastModified": "2014-11-14T14:18:22.333", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:54.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/246777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7762.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7762.json index 8caf6da6eb7..498dc78dd44 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7762.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7762.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7762", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.437", - "lastModified": "2014-11-14T15:27:22.397", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:54.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/262177", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7763.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7763.json index 4eb4b768c86..534fe78eb4f 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7763.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7763.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7763", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.500", - "lastModified": "2014-11-14T14:18:25.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:55.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/446977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7764.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7764.json index 1687768ea68..6367b2579a7 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7764.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7764.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7764", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.547", - "lastModified": "2014-11-14T14:18:26.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:55.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/247041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7765.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7765.json index fec6aad25fd..d401bc6b536 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7765.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7765.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7765", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.610", - "lastModified": "2014-11-14T14:18:28.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:55.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/501449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7766.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7766.json index 22cab5f8caf..de4ad6330e7 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7766.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7766.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7766", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.657", - "lastModified": "2014-11-14T14:18:29.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:55.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/356689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7767.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7767.json index 4fe27dc873e..6ba2aefb0c4 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7767.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7767.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7767", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.720", - "lastModified": "2014-11-14T14:53:15.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:55.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/563577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7768.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7768.json index bc3ce2a3adf..b7a0e392ae8 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7768.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7768.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7768", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.767", - "lastModified": "2014-11-14T14:18:31.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:56.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/623329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7769.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7769.json index b451038be41..d8c73ae446a 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7769.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7769.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7769", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.847", - "lastModified": "2014-11-14T14:18:33.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:56.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/506729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7770.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7770.json index 2cb63f649e2..b371e6a79b1 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7770.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7770.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7770", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.890", - "lastModified": "2014-11-14T14:18:34.490", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:56.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/205769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7771.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7771.json index 220a8b50093..5409a082960 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7771.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7771.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7771", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.937", - "lastModified": "2014-11-14T14:18:36.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:56.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/984569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7772.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7772.json index 31cb65fedb4..b28369b8fe1 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7772.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7772.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7772", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:09.987", - "lastModified": "2014-11-14T14:18:37.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:56.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/329057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7773.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7773.json index be3bdd5337b..c55a7bcedf8 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7773.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7773.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7773", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.047", - "lastModified": "2014-11-14T14:18:38.990", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:57.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/178137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7774.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7774.json index 72c2f5362c3..d219c59c4e5 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7774.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7774.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7774", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.097", - "lastModified": "2014-11-14T14:54:14.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:57.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -92,6 +91,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/807337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7775.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7775.json index fb355597ff7..c46f8520c99 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7775.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7775.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7775", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.157", - "lastModified": "2014-11-14T14:18:40.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:57.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/612945", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7776.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7776.json index da8834ab4ba..2043bc675fb 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7776.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7776.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7776", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.220", - "lastModified": "2014-11-14T14:18:42.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:57.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/852217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7777.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7777.json index 8e9304ac731..8e4a4f8b1b5 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7777.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7777.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7777", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.267", - "lastModified": "2014-11-19T01:36:32.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:57.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/678945", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7778.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7778.json index 4111cc0f572..02e726b6927 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7778.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7778.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7778", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.330", - "lastModified": "2014-11-14T14:18:45.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:58.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/807073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7779.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7779.json index 82d52fa7d5c..9ee1e848a4d 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7779.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7779.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7779", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.377", - "lastModified": "2014-11-14T14:55:00.337", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:58.213", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/211577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7780.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7780.json index 7018ea26968..e43101d21c4 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7780.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7780.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7780", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.437", - "lastModified": "2014-11-14T14:18:46.540", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:58.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/680969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7781.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7781.json index 71b214cf1b5..7779a0a90ce 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7781.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7781.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7781", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.487", - "lastModified": "2014-11-14T14:18:47.993", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:58.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/997329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7782.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7782.json index 7e09b8551ba..f088f9dfc97 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7782.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7782.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7782", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.547", - "lastModified": "2015-02-04T05:04:00.660", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:58.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/383969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7783.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7783.json index addd1f18fe4..8b7e109d5f2 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7783.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7783.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7783", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.610", - "lastModified": "2014-11-14T14:18:51.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:58.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/296761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7784.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7784.json index 7039ee21381..a8d0515bb61 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7784.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7784.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7784", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.657", - "lastModified": "2014-11-14T14:18:52.493", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:59.173", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/974713", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7785.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7785.json index 8ad94d95773..1fd913cda2f 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7785.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7785.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7785", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.720", - "lastModified": "2014-11-14T14:18:54.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:59.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/699361", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7786.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7786.json index eb0d2356d67..15d16b64a58 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7786.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7786.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7786", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.767", - "lastModified": "2014-11-14T14:18:55.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:59.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/510249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7787.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7787.json index 88d45d92008..ff7d1b89001 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7787.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7787.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7787", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.830", - "lastModified": "2014-11-14T14:18:56.993", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:59.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/649377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7788.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7788.json index d6e6031cadb..c78f29e9514 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7788.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7788.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7788", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.893", - "lastModified": "2014-11-14T14:18:58.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:17:59.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/663281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7789.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7789.json index d158bdfaa8b..e88ab10464a 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7789.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7789.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7789", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:10.937", - "lastModified": "2014-11-14T14:19:00.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:00.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/267369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7791.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7791.json index 582f72b054a..6843525c6f7 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7791.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7791.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7791", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.000", - "lastModified": "2014-11-14T14:19:01.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:00.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/538937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7793.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7793.json index c9f5ee315ac..2ed3c5ae9ef 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7793.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7793.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7793", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.047", - "lastModified": "2014-11-14T14:19:03.010", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:00.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/747321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7794.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7794.json index 34e941c7aac..81aafb7431f 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7794.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7794.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7794", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.110", - "lastModified": "2014-11-14T14:19:04.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:00.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/753217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7795.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7795.json index fa38992a442..8ad311bacd8 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7795.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7795.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7795", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.157", - "lastModified": "2014-11-14T14:19:05.870", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:00.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/859257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7796.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7796.json index 10633e2a15c..72ec0770f86 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7796.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7796.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7796", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.220", - "lastModified": "2014-11-22T03:03:42.677", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:01.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/503825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7797.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7797.json index b2ed2b1a856..66bb6359a7a 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7797.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7797.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7797", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.283", - "lastModified": "2014-11-14T14:19:08.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:01.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/307849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7798.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7798.json index 91c54d8c003..dd35694c442 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7798.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7798.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7798", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.347", - "lastModified": "2014-11-14T14:19:10.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:01.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/317353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-77xx/CVE-2014-7799.json b/CVE-2014/CVE-2014-77xx/CVE-2014-7799.json index 9d6289490de..5eaea365b3c 100644 --- a/CVE-2014/CVE-2014-77xx/CVE-2014-7799.json +++ b/CVE-2014/CVE-2014-77xx/CVE-2014-7799.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7799", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.393", - "lastModified": "2014-11-14T14:19:11.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:01.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/671993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7800.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7800.json index 00eb3ae783b..60344952b68 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7800.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7800.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7800", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.453", - "lastModified": "2014-11-14T14:19:13.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:01.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/284089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7802.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7802.json index a995b7abbb3..106a5c2bb35 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7802.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7802.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7802", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.500", - "lastModified": "2014-11-14T14:19:14.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:02.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/851953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7803.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7803.json index aa8d9f88807..da3f94b2dec 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7803.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7803.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7803", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.563", - "lastModified": "2014-11-14T14:19:15.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:02.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/634945", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7804.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7804.json index 95d80b72ef0..af962b8614d 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7804.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7804.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7804", "sourceIdentifier": "cret@cert.org", "published": "2014-10-21T10:55:11.610", - "lastModified": "2014-11-14T14:19:17.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:02.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ { "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/896129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7807.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7807.json index 152327bbd08..0f0ca97e337 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7807.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7807.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7807", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:00.063", - "lastModified": "2018-10-09T19:53:28.727", + "lastModified": "2024-11-21T02:18:02.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,14 @@ { "url": "http://www.securityfocus.com/archive/1/534176/100/0/threaded", "source": "secalert@redhat.com" + }, + { + "url": "http://support.citrix.com/article/CTX200285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534176/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7809.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7809.json index fae56d76d63..46ffbd6187a 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7809.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7809.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7809", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:01.347", - "lastModified": "2018-10-09T19:53:28.947", + "lastModified": "2024-11-21T02:18:03.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -356,6 +355,41 @@ { "url": "http://www.securitytracker.com/id/1031309", "source": "secalert@redhat.com" + }, + { + "url": "http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://struts.apache.org/docs/s2-023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534175/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031309", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7811.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7811.json index 541ac847559..9e79062c1c4 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7811.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7811.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7811", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-15T15:59:01.687", - "lastModified": "2023-02-13T00:42:20.953", + "lastModified": "2024-11-21T02:18:03.450", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -107,6 +106,21 @@ { "url": "http://secunia.com/advisories/62183", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62183", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7812.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7812.json index 90762aea704..c19b346fe38 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7812.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7812.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7812", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-15T15:59:02.780", - "lastModified": "2023-02-13T00:42:21.067", + "lastModified": "2024-11-21T02:18:03.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -106,6 +105,21 @@ { "url": "http://secunia.com/advisories/62183", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62183", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7814.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7814.json index 2fcf8b7430e..921b29eb8d2 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7814.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7814.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7814", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-16T16:59:07.767", - "lastModified": "2023-02-13T00:42:21.370", + "lastModified": "2024-11-21T02:18:03.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://secunia.com/advisories/62255", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62255", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7815.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7815.json index 0f0d1fa7717..df0cded6e1f 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7815.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7815.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7815", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-14T15:59:01.497", - "lastModified": "2023-02-13T00:42:21.433", + "lastModified": "2024-11-21T02:18:03.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -317,6 +316,89 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e6908bfe8e07f2b452e78e677da1b45b1c0f6829", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0349.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0624.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61484", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62143", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62144", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.citrix.com/article/CTX200892", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3066", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3067", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2409-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7816.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7816.json index 1de5c6b614b..991b9673366 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7816.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7816.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7816", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-01T15:59:06.610", - "lastModified": "2015-03-04T16:41:08.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:04.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -125,6 +124,35 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71328", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://issues.jboss.org/browse/UNDERTOW-338", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://issues.jboss.org/browse/WFLY-4020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7817.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7817.json index 23c01954341..036a1392567 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7817.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7817.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7817", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T15:59:01.637", - "lastModified": "2023-02-13T00:42:21.650", + "lastModified": "2024-11-21T02:18:04.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -219,6 +218,89 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0092.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/730", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62100", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62146", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2432-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98852", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201602-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17625", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7818.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7818.json index 78de94523af..394ed05d7b8 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7818.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7818.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7818", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-08T11:55:02.977", - "lastModified": "2019-08-08T15:43:52.230", + "lastModified": "2024-11-21T02:18:04.337", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -773,6 +772,18 @@ { "url": "https://puppet.com/security/cve/cve-2014-7829", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://puppet.com/security/cve/cve-2014-7829", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7819.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7819.json index 3a491e322b9..2edf07dc50f 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7819.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7819.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7819", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-08T11:55:03.023", - "lastModified": "2023-02-13T00:42:25.267", + "lastModified": "2024-11-21T02:18:04.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -211,6 +210,52 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00105.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00111.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/doAVp0YaTqY/aHFngBqNBoAJ", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wQBeGXqGs3E/JqUMB6fhh3gJ", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7821.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7821.json index 78ac35051ad..a5145cfcbec 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7821.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7821.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7821", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T15:59:02.797", - "lastModified": "2023-02-13T00:42:25.673", + "lastModified": "2024-11-21T02:18:04.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -179,6 +178,71 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155351.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2014-November/000303.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1938.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1942.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62586", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/neutron/+bug/1378450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98818", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7822.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7822.json index 41c1341b5a7..5eed5922406 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7822.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7822.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7822", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-16T10:59:00.070", - "lastModified": "2023-02-13T00:42:25.770", + "lastModified": "2024-11-21T02:18:04.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -156,6 +155,90 @@ { "url": "https://www.exploit-db.com/exploits/36743/", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0207652cbe27d1f962050737848e5ad4671958", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0164.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0674.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0694.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/117810", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72347", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2541-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2542-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2543-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2544-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/8d0207652cbe27d1f962050737848e5ad4671958", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36743/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7823.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7823.json index 6ea1d16c8fe..5925ef006b5 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7823.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7823.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7823", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-13T21:32:04.547", - "lastModified": "2017-01-03T02:59:12.767", + "lastModified": "2024-11-21T02:18:04.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -161,6 +160,45 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60010", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62303", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.libvirt.org/2014/0007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2404-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7824.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7824.json index 9c5cdc8394a..c34332c085c 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7824.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7824.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7824", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-18T15:59:04.017", - "lastModified": "2023-12-27T16:36:58.353", + "lastModified": "2024-11-21T02:18:05.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -268,6 +267,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98576", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0457.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3099", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:176", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/10/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2425-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.freedesktop.org/show_bug.cgi?id=85105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98576", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7825.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7825.json index 2aa9b387625..9e2a7044062 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7825.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7825.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7825", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-10T11:55:08.127", - "lastModified": "2023-02-13T00:42:32.963", + "lastModified": "2024-11-21T02:18:05.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -205,6 +204,74 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=086ba77a6db00ed858ff07451bedee197df868c9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1943.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0290.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/06/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70972", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161565", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98557", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/086ba77a6db00ed858ff07451bedee197df868c9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7826.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7826.json index f8fab1a4681..2e492dc18ac 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7826.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7826.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7826", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-10T11:55:08.173", - "lastModified": "2023-02-13T00:42:33.107", + "lastModified": "2024-11-21T02:18:05.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -241,6 +240,90 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=086ba77a6db00ed858ff07451bedee197df868c9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1943.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0290.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/06/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70971", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161565", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/086ba77a6db00ed858ff07451bedee197df868c9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7827.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7827.json index 2fef832dca0..0788940857d 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7827.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7827.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7827", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-13T15:59:04.263", - "lastModified": "2017-09-08T01:29:17.073", + "lastModified": "2024-11-21T02:18:05.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -116,6 +115,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100889", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0215.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0216.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0217.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0850.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031741", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100889", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7828.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7828.json index aafc294e093..a02371be560 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7828.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7828.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7828", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-19T18:59:08.097", - "lastModified": "2017-09-08T01:29:17.137", + "lastModified": "2024-11-21T02:18:05.573", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -131,6 +130,41 @@ { "url": "https://www.redhat.com/archives/freeipa-users/2014-November/msg00077.html", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freeipa.org/page/Releases/4.1.1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70932", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1160871", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://fedorahosted.org/freeipa/ticket/4690", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.redhat.com/archives/freeipa-devel/2014-November/msg00068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.redhat.com/archives/freeipa-users/2014-November/msg00077.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7829.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7829.json index 26966b090fe..a4a04f44866 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7829.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7829.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7829", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-18T23:59:03.427", - "lastModified": "2019-08-08T15:43:52.230", + "lastModified": "2024-11-21T02:18:05.687", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -800,6 +799,25 @@ { "url": "https://puppet.com/security/cve/cve-2014-7829", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://puppet.com/security/cve/cve-2014-7829", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7830.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7830.json index 4ca7c91cdaa..b25a8192da9 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7830.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7830.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7830", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:00.100", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:05.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -185,6 +184,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47865", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275147", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7831.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7831.json index 1806fea4494..13b614cc074 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7831.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7831.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7831", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:01.520", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:05.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -181,6 +180,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47766", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7832.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7832.json index 1cbdd881166..3b38743b592 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7832.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7832.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7832", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:02.600", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:06.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -181,6 +180,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47921", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275154", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7833.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7833.json index c121e368763..b2f8cae501f 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7833.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7833.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7833", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:03.757", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:06.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -181,6 +180,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47697", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275155", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7834.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7834.json index 0ba6e7716af..6ebccbcac46 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7834.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7834.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7834", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:04.727", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:06.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -181,6 +180,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-45303", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275159", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7835.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7835.json index d0ca33fe9b8..a553c6cd344 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7835.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7835.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7835", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:05.837", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:06.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -178,6 +177,22 @@ { "url": "https://moodle.org/mod/forum/discuss.php?d=275161", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275161", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7836.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7836.json index 6c2c9f278ce..6b5d9030461 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7836.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7836.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7836", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:06.947", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:06.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -184,6 +183,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47924", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275162", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7837.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7837.json index c427da470f2..2e6b8a64248 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7837.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7837.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7837", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:07.913", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:06.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -184,6 +183,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275163", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7838.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7838.json index 21ecaaf71c3..708e7951a98 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7838.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7838.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7838", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:08.917", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:06.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -184,6 +183,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-48019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7839.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7839.json index 6d9715d9cdc..f9e419cbd22 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7839.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7839.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7839", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-25T15:59:01.467", - "lastModified": "2015-04-23T01:59:36.727", + "lastModified": "2024-11-21T02:18:06.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0773.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0850.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.jboss.org/browse/RESTEASY-1130", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7840.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7840.json index 123142299e8..9760f851218 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7840.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7840.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7840", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-12T15:59:08.073", - "lastModified": "2023-02-13T00:42:33.533", + "lastModified": "2024-11-21T02:18:07.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -210,6 +209,47 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=0be839a2701369f669532ea5884c15bead1c6e08", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0349.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0624.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://thread.gmane.org/gmane.comp.emulators.qemu/306117", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99194", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7841.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7841.json index 42503ba0de0..637e1953bd3 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7841.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7841.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7841", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-30T01:59:03.493", - "lastModified": "2023-02-13T00:42:34.773", + "lastModified": "2024-11-21T02:18:07.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1178,6 +1177,97 @@ { "url": "https://support.f5.com/kb/en-us/solutions/public/16000/000/sol16016.html", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40607cbe270a9e8360907cb1e62ddf0736e4864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-3004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-3005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0087.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0284.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0285.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0695.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62597", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62735", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/13/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163087", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/e40607cbe270a9e8360907cb1e62ddf0736e4864", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/16000/000/sol16016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7842.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7842.json index de213e8d775..36053660237 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7842.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7842.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7842", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-30T01:59:04.587", - "lastModified": "2023-02-13T00:42:34.887", + "lastModified": "2024-11-21T02:18:07.357", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -1164,6 +1163,83 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62326", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62336", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/13/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71078", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163762", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7843.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7843.json index 5e2cc58a550..4d55a837a22 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7843.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7843.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7843", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-30T01:59:05.570", - "lastModified": "2023-02-13T00:42:35.690", + "lastModified": "2024-11-21T02:18:07.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -111,6 +110,45 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=97fc15436b36ee3956efad83e22a557991f7d19d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/13/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163744", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/97fc15436b36ee3956efad83e22a557991f7d19d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7845.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7845.json index d9485f53147..b1c32a3dcf3 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7845.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7845.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7845", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:10.027", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:07.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -184,6 +183,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275152", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7846.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7846.json index e3f286f2acd..a3e61b42fe5 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7846.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7846.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7846", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:11.120", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:07.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -184,6 +183,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47965", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275157", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7847.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7847.json index 12fcbe1ae27..31fd1b8c912 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7847.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7847.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7847", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:12.150", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:08.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -184,6 +183,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275158", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7848.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7848.json index 1c5954fa4f3..172e7e831b9 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7848.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7848.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7848", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-24T11:59:13.260", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:08.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -184,6 +183,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275160", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7849.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7849.json index ebad3f3da83..bb76cb3692c 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7849.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7849.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7849", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-13T15:59:05.403", - "lastModified": "2017-09-08T01:29:17.277", + "lastModified": "2024-11-21T02:18:08.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -156,6 +155,56 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100890", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0215.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0216.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0217.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0920.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031741", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1165170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100890", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7850.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7850.json index 994b2b0633a..6c8e2d175ce 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7850.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7850.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7850", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-28T15:59:01.807", - "lastModified": "2015-02-17T14:36:43.483", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:08.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -127,6 +126,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144848.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1165280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://fedorahosted.org/freeipa/ticket/4742", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7852.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7852.json index b2cf0bdd7d3..6fa90229a85 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7852.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7852.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7852", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-11T15:59:00.070", - "lastModified": "2017-01-03T02:59:13.033", + "lastModified": "2024-11-21T02:18:08.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031363", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1973.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031363", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7853.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7853.json index 14c9afdc6af..4364de3771d 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7853.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7853.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7853", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-13T15:59:06.260", - "lastModified": "2017-09-08T01:29:17.323", + "lastModified": "2024-11-21T02:18:08.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -130,6 +129,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100891", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0215.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0216.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0217.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0920.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031741", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100891", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7861.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7861.json index abc20052010..0137e5f2501 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7861.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7861.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7861", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-05T10:55:05.553", - "lastModified": "2014-10-10T05:25:21.510", + "lastModified": "2024-11-21T02:18:09.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://zerodayinitiative.com/advisories/ZDI-14-346/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/70249", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-346/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7864.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7864.json index 75239828ebb..3094d50a02a 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7864.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7864.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7864", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T16:59:00.060", - "lastModified": "2018-10-09T19:53:32.680", + "lastModified": "2024-11-21T02:18:10.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -172,6 +171,42 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130162/ManageEngine-File-Download-Content-Disclosure-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/114", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534575/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100555", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_failservlet.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/vulnerabilities-in-failoverhelperservlet", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7866.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7866.json index 83492efc714..116d29a0183 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7866.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7866.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7866", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T18:59:00.077", - "lastModified": "2019-07-15T17:45:58.473", + "lastModified": "2024-11-21T02:18:10.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -195,6 +194,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/fix-for-remote-code-execution-via-file-upload-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7867.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7867.json index 645c4ae574d..6ed5ddb36c0 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7867.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7867.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7867", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-04T17:59:05.737", - "lastModified": "2019-07-15T17:45:58.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:10.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -118,6 +117,13 @@ "tags": [ "Patch" ] + }, + { + "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7868.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7868.json index 27b7857bb87..a985f529747 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7868.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7868.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7868", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-04T17:59:06.720", - "lastModified": "2019-07-15T17:45:58.473", + "lastModified": "2024-11-21T02:18:10.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -151,6 +150,46 @@ "Exploit", "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/129037/ManageEngine-OpManager-Social-IT-Plus-IT360-File-Upload-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533946/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71002", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.zoho.com/portal/manageengine/helpcenter/articles/sql-injection-vulnerability-fix", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7869.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7869.json index 0dc9d5027f2..3e1e261483a 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7869.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7869.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7869", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-06T14:55:12.470", - "lastModified": "2014-10-07T17:33:21.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:10.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -99,6 +98,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/58307", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2253103", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2254853", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7870.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7870.json index b2224d18e5c..3f389d75e7b 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7870.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7870.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7870", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-06T14:55:12.517", - "lastModified": "2014-10-07T23:15:40.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:10.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -221,6 +220,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Apr/41", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2231531", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2231533", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2231665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7871.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7871.json index 375b500e4a6..49bcd444805 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7871.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7871.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7871", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T15:59:02.820", - "lastModified": "2018-10-09T19:53:34.213", + "lastModified": "2024-11-21T02:18:10.873", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -96,6 +95,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98563", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129020/OX-App-Suite-7.6.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533936/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70982", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98563", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7874.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7874.json index 7c09da9d6b5..b9efddc55e5 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7874.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7874.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7874", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2014-10-19T01:55:21.607", - "lastModified": "2017-09-08T01:29:17.497", + "lastModified": "2024-11-21T02:18:11.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -114,6 +113,30 @@ { "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04476799", "source": "hp-security-alert@hp.com" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04476799", + "source": "hp-security-alert@hp.com" + }, + { + "url": "http://secunia.com/advisories/60945", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97024", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04476799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04476799", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7875.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7875.json index 33e839cfe58..680de1cbf60 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7875.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7875.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7875", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2014-11-04T18:55:07.437", - "lastModified": "2017-09-08T01:29:17.557", + "lastModified": "2024-11-21T02:18:11.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -112,6 +111,43 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04483249", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70863", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04483249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04483249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7876.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7876.json index bcdd290feb8..e1a0d65dc88 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7876.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7876.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7876", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-31T10:59:00.073", - "lastModified": "2019-10-09T23:11:59.170", + "lastModified": "2024-11-21T02:18:11.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,35 @@ "tags": [ "Broken Link" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04486432", + "source": "hp-security-alert@hp.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031972", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04486432", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04486432", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7877.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7877.json index 0781773a1e8..0b74579253e 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7877.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7877.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7877", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2014-10-30T10:55:06.770", - "lastModified": "2017-09-08T01:29:17.607", + "lastModified": "2024-11-21T02:18:11.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -91,6 +90,34 @@ { "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04491186", "source": "hp-security-alert@hp.com" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04491186", + "source": "hp-security-alert@hp.com" + }, + { + "url": "http://secunia.com/advisories/61196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70808", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98382", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04491186", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04491186", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7878.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7878.json index aef7b1e3eb2..2e81ed8d4dd 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7878.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7878.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7878", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2014-11-14T00:59:02.637", - "lastModified": "2017-09-08T01:29:17.667", + "lastModified": "2024-11-21T02:18:11.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04500238", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04500238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04500238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7879.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7879.json index 8fd9d9ef8b5..e87a558b117 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7879.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7879.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7879", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2014-12-10T21:59:13.320", - "lastModified": "2019-10-09T23:11:59.450", + "lastModified": "2024-11-21T02:18:11.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -89,6 +88,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04511778", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04511778", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04511778", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7880.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7880.json index d29a09adfc7..60585d8f0c8 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7880.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7880.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7880", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2014-12-17T16:59:01.223", - "lastModified": "2017-01-03T02:59:13.093", + "lastModified": "2024-11-21T02:18:11.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -84,6 +83,34 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04530570", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031387", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04530570", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04530570", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7881.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7881.json index d759e59aae1..11655a724e9 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7881.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7881.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7881", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-01-15T22:59:00.053", - "lastModified": "2019-10-09T23:11:59.607", + "lastModified": "2024-11-21T02:18:11.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,31 @@ "tags": [ "Not Applicable" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04537915", + "source": "hp-security-alert@hp.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62162", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04537915", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04537915", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7882.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7882.json index 6eaa93898ea..6844e43b89f 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7882.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7882.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7882", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-02-02T01:59:03.873", - "lastModified": "2017-09-08T01:29:17.717", + "lastModified": "2024-11-21T02:18:12.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -112,6 +111,13 @@ } ], "references": [ + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04539443", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04539443", "source": "hp-security-alert@hp.com", @@ -134,6 +140,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100642", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04539443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04539443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100642", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7883.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7883.json index c94acf7614d..b0c6683c5dc 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7883.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7883.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7883", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-02-15T20:59:00.120", - "lastModified": "2019-10-09T23:11:59.827", + "lastModified": "2024-11-21T02:18:12.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,43 @@ "tags": [ "Not Applicable" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04553906", + "source": "hp-security-alert@hp.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/867593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04553906", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04553906", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7884.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7884.json index 63ca0f5c3e1..b1ee05d6ee9 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7884.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7884.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7884", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-14T01:59:02.987", - "lastModified": "2019-10-09T23:11:59.983", + "lastModified": "2024-11-21T02:18:12.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -94,6 +93,43 @@ "tags": [ "Broken Link" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04562193", + "source": "hp-security-alert@hp.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/868948", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04562193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04562193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7885.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7885.json index 4a3ab891130..74f82294aa1 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7885.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7885.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7885", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-14T01:59:05.610", - "lastModified": "2019-10-09T23:12:00.077", + "lastModified": "2024-11-21T02:18:12.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04562193", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/868948", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04562193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04562193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7888.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7888.json index 9d7a0455318..69e0b6f46b3 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7888.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7888.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7888", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-09T17:59:00.063", - "lastModified": "2019-10-09T23:12:00.187", + "lastModified": "2024-11-21T02:18:12.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7889.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7889.json index e03a34222ea..5989c1c74d7 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7889.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7889.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7889", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-09T17:59:01.877", - "lastModified": "2019-10-09T23:12:00.343", + "lastModified": "2024-11-21T02:18:12.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7890.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7890.json index 85e03567b76..68a6cdde282 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7890.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7890.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7890", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-09T17:59:02.987", - "lastModified": "2019-10-09T23:12:00.513", + "lastModified": "2024-11-21T02:18:12.733", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7891.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7891.json index 42cfa756d52..5a4ce8ee8ce 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7891.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7891.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7891", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-09T17:59:03.890", - "lastModified": "2019-10-09T23:12:00.623", + "lastModified": "2024-11-21T02:18:12.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7892.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7892.json index 792f5c08398..ff5b981765f 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7892.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7892.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7892", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-09T17:59:04.907", - "lastModified": "2019-10-09T23:12:00.747", + "lastModified": "2024-11-21T02:18:12.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -125,6 +124,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7893.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7893.json index 77bdb49a3b6..eeb5443b650 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7893.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7893.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7893", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-09T17:59:05.847", - "lastModified": "2019-10-09T23:12:01.140", + "lastModified": "2024-11-21T02:18:13.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7894.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7894.json index 62089ca7ef1..0570c8c26b1 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7894.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7894.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7894", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-09T17:59:06.597", - "lastModified": "2019-10-09T23:12:01.280", + "lastModified": "2024-11-21T02:18:13.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7895.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7895.json index aeb88b36c85..3215313931d 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7895.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7895.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7895", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-09T17:59:07.453", - "lastModified": "2019-10-09T23:12:01.373", + "lastModified": "2024-11-21T02:18:13.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7896.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7896.json index 7e7f0cb8d93..72b38c42d2f 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7896.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7896.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7896", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-03T11:59:00.057", - "lastModified": "2015-03-12T02:00:32.270", + "lastModified": "2024-11-21T02:18:13.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,22 @@ { "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04582371", "source": "hp-security-alert@hp.com" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04582371", + "source": "hp-security-alert@hp.com" + }, + { + "url": "http://www.securitytracker.com/id/1031828", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04582371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04582371", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7897.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7897.json index 357e88ecc91..3ccb81bec6b 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7897.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7897.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7897", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-09T17:59:08.500", - "lastModified": "2019-10-09T23:12:01.547", + "lastModified": "2024-11-21T02:18:13.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7898.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7898.json index 772bf500f58..ebe4aa21fb8 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7898.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7898.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7898", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-09T17:59:09.470", - "lastModified": "2019-10-09T23:12:01.687", + "lastModified": "2024-11-21T02:18:13.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-78xx/CVE-2014-7899.json b/CVE-2014/CVE-2014-78xx/CVE-2014-7899.json index da7964110ac..3bc67bb427f 100644 --- a/CVE-2014/CVE-2014-78xx/CVE-2014-7899.json +++ b/CVE-2014/CVE-2014-78xx/CVE-2014-7899.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7899", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:00.090", - "lastModified": "2023-11-07T02:21:46.450", + "lastModified": "2024-11-21T02:18:13.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ { "url": "https://src.chromium.org/viewvc/chrome?revision=279232&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1894.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71160", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=389734", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/chrome?revision=279232&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7900.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7900.json index 0276b4f9f78..a2d14c418bf 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7900.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7900.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7900", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:01.450", - "lastModified": "2023-11-07T02:21:46.723", + "lastModified": "2024-11-21T02:18:13.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,30 @@ { "url": "https://pdfium.googlesource.com/pdfium/+/1b04ea3b0fbae3be3ae6b3824c5e0dadc0e73d44", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=406868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98788", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://pdfium.googlesource.com/pdfium/+/1b04ea3b0fbae3be3ae6b3824c5e0dadc0e73d44", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7901.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7901.json index d89f0f9ac29..245b0682fb0 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7901.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7901.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7901", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:02.637", - "lastModified": "2023-11-07T02:21:47.160", + "lastModified": "2024-11-21T02:18:13.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,30 @@ { "url": "https://pdfium.googlesource.com/pdfium/+/e93d5341d87c54713a9632c8823288fa901a3b78", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=413375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98789", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://pdfium.googlesource.com/pdfium/+/e93d5341d87c54713a9632c8823288fa901a3b78", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7902.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7902.json index dc5960733b2..a6e1f38faf5 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7902.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7902.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7902", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:03.577", - "lastModified": "2023-11-07T02:21:47.577", + "lastModified": "2024-11-21T02:18:14.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98790", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=414504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98790", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7903.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7903.json index 079d0c7c41e..535a86a4830 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7903.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7903.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7903", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:04.653", - "lastModified": "2023-11-07T02:21:48.020", + "lastModified": "2024-11-21T02:18:14.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,30 @@ { "url": "https://pdfium.googlesource.com/pdfium/+/4dc95e74e1acc75f4eab08bc771874cd2a9c3a9b", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=414525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://pdfium.googlesource.com/pdfium/+/4dc95e74e1acc75f4eab08bc771874cd2a9c3a9b", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7904.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7904.json index 16bfc2d8463..6c5181e5bb3 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7904.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7904.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7904", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:05.733", - "lastModified": "2023-11-07T02:21:48.270", + "lastModified": "2024-11-21T02:18:14.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98792", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1894.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71166", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=418161", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98792", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7905.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7905.json index 4c1037b0316..445a082221e 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7905.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7905.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7905", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:06.733", - "lastModified": "2023-11-07T02:21:48.683", + "lastModified": "2024-11-21T02:18:14.417", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98793", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71162", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=421817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98793", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7906.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7906.json index ab0d12d11a3..9d17942bfcf 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7906.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7906.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7906", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:07.920", - "lastModified": "2023-11-07T02:21:49.197", + "lastModified": "2024-11-21T02:18:14.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98794", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1894.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/src/+/3a2cf7d1376ae33054b878232fb38b8fbed29e31", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=423030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98794", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7907.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7907.json index c9e40b692ad..a75fd57ddf4 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7907.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7907.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7907", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:08.937", - "lastModified": "2023-11-07T02:21:49.437", + "lastModified": "2024-11-21T02:18:14.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -108,6 +107,42 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=184185&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1894.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=424453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98795", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=184185&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7908.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7908.json index 97fc207f49f..5e4918fd307 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7908.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7908.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7908", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:09.887", - "lastModified": "2023-11-07T02:21:49.920", + "lastModified": "2024-11-21T02:18:14.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -108,6 +107,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98796", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1894.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71168", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/src/+/b2006ac87cec58363090e7d5e10d5d9e3bbda9f9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=425980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98796", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7909.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7909.json index ee68ae0e78f..39a6a89f673 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7909.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7909.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7909", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:10.747", - "lastModified": "2023-11-07T02:21:50.370", + "lastModified": "2024-11-21T02:18:14.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -108,6 +107,42 @@ { "url": "https://skia.googlesource.com/skia/+/1c577cd3ee331944b9061ee0eec147b211ee563c", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1894.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71167", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=391001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://skia.googlesource.com/skia/+/1c577cd3ee331944b9061ee0eec147b211ee563c", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7910.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7910.json index c85698492ff..4328aa773ac 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7910.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7910.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7910", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-11-19T11:59:11.890", - "lastModified": "2023-11-07T02:21:50.770", + "lastModified": "2024-11-21T02:18:14.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -224,6 +223,158 @@ { "url": "https://www.exploit-db.com/exploits/34879/", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1894.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71161", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=337071", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=340387", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=389451", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=391001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=397396", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=408426", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=409454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=409508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=411159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=411162", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=411165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=413743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=413744", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=414134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=415407", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=417210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=417329", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=421090", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=421321", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=421504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=421720", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=421981", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=422482", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=423030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=423891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=424215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=424999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=425151", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=425152", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=433500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98798", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/34879/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7911.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7911.json index 96c4ab165c9..96186244792 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7911.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7911.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7911", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-12-15T18:59:15.520", - "lastModified": "2023-11-07T02:21:51.250", + "lastModified": "2024-11-21T02:18:15.143", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -300,6 +299,14 @@ { "url": "https://android.googlesource.com/platform/libcore/+/738c833d38d41f8f76eb7e77ab39add82b1ae1e2", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/51", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://android.googlesource.com/platform/libcore/+/738c833d38d41f8f76eb7e77ab39add82b1ae1e2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7922.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7922.json index aa023ee966a..533c776a846 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7922.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7922.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7922", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-02-23T02:59:00.057", - "lastModified": "2023-11-07T02:21:54.023", + "lastModified": "2024-11-21T02:18:16.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,14 @@ { "url": "https://gist.github.com/isciurus/df4d7edd9c3efb4a0753", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://isciurus.blogspot.com/2015/01/android-app-with-full-control-over-your.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gist.github.com/isciurus/df4d7edd9c3efb4a0753", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7923.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7923.json index 8a53a6ca55f..f4e875c07ee 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7923.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7923.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7923", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:00.053", - "lastModified": "2023-11-07T02:21:54.320", + "lastModified": "2024-11-21T02:18:16.343", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -258,6 +257,86 @@ { "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://bugs.icu-project.org/trac/ticket/11370", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=430353", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/726973003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7924.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7924.json index 6d54e5e3dbf..df1aa07ce6b 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7924.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7924.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7924", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:05.990", - "lastModified": "2023-11-07T02:21:54.787", + "lastModified": "2024-11-21T02:18:16.527", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -121,6 +119,55 @@ { "url": "https://codereview.chromium.org/774593004", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=435880", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/774593004", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7925.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7925.json index d141cd4df3b..a95469f0c63 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7925.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7925.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7925", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:06.943", - "lastModified": "2023-11-07T02:21:55.257", + "lastModified": "2024-11-21T02:18:16.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -128,6 +127,62 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=186914&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=434136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/802593004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=186482&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=186914&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7926.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7926.json index 41db535501b..7e7306a1bca 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7926.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7926.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7926", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:07.943", - "lastModified": "2023-11-07T02:21:55.760", + "lastModified": "2024-11-21T02:18:16.780", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -258,6 +257,86 @@ { "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://bugs.icu-project.org/trac/ticket/11369", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=422824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/726973003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7927.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7927.json index 5890d50ae12..424c30c1410 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7927.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7927.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7927", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:08.880", - "lastModified": "2023-11-07T02:21:56.203", + "lastModified": "2024-11-21T02:18:16.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,54 @@ { "url": "https://codereview.chromium.org/824843002", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=444695", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/824843002", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7928.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7928.json index f8241beea7f..68a547cfe42 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7928.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7928.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7928", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:09.837", - "lastModified": "2023-11-07T02:21:56.580", + "lastModified": "2024-11-21T02:18:17.103", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,54 @@ { "url": "https://codereview.chromium.org/737383002", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=435073", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/737383002", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7929.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7929.json index a4fcc980ff9..ea7345bb5ad 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7929.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7929.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7929", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:10.867", - "lastModified": "2023-11-07T02:21:57.003", + "lastModified": "2024-11-21T02:18:17.243", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,54 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=187458&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=443115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=187458&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7930.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7930.json index c6c57ef3d33..abd1a0da8a4 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7930.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7930.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7930", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:11.977", - "lastModified": "2023-11-07T02:21:57.423", + "lastModified": "2024-11-21T02:18:17.373", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -121,6 +119,55 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=187435&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=442806", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=187435&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7931.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7931.json index 2a5740f4bd8..9e8dc573b0e 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7931.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7931.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7931", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:12.943", - "lastModified": "2023-11-07T02:21:57.880", + "lastModified": "2024-11-21T02:18:17.493", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,54 @@ { "url": "https://codereview.chromium.org/813023002", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=442710", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/813023002", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7932.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7932.json index 4e4211b0dec..1919ec1ae98 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7932.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7932.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7932", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:13.820", - "lastModified": "2023-11-07T02:21:58.287", + "lastModified": "2024-11-21T02:18:17.617", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -121,6 +119,55 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=185670&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=429666", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=185670&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7933.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7933.json index 784a7036c95..cde6e75b398 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7933.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7933.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7933", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:14.740", - "lastModified": "2023-11-07T02:21:58.700", + "lastModified": "2024-11-21T02:18:17.733", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -137,6 +135,55 @@ { "url": "https://code.google.com/p/chromium/issues/detail?id=427266", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=490a3ebf36821b81f73e34ad3f554cb523dd2682", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=427266", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7934.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7934.json index 88c7dd5c66c..9d42f488850 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7934.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7934.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7934", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:15.600", - "lastModified": "2023-11-07T02:21:59.107", + "lastModified": "2024-11-21T02:18:17.863", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -125,6 +123,59 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=185598&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=427249", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=185504&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=185598&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7935.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7935.json index a8643b937f3..d0aa83bd843 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7935.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7935.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7935", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:16.523", - "lastModified": "2023-11-07T02:21:59.500", + "lastModified": "2024-11-21T02:18:17.990", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -113,6 +111,47 @@ { "url": "https://codereview.chromium.org/692203002", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=402957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/692203002", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7936.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7936.json index 09c692041d6..c3addc4f592 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7936.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7936.json @@ -2,10 +2,8 @@ "id": "CVE-2014-7936", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:17.460", - "lastModified": "2023-11-07T02:21:59.960", + "lastModified": "2024-11-21T02:18:18.113", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +111,47 @@ { "url": "https://codereview.chromium.org/752153005", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=428561", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/752153005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7937.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7937.json index e5d37bafca7..02da6b21b1f 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7937.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7937.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7937", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:18.380", - "lastModified": "2023-11-07T02:22:00.443", + "lastModified": "2024-11-21T02:18:18.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -144,6 +143,62 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=8c50704ebf1777bee76772c4835d9760b3721057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/third_party/ffmpeg/+/d4608b7c83f56b17f14fdd94990341f62bb52f92", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=419060", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7938.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7938.json index 95e31569c3c..ea79dc8d27a 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7938.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7938.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7938", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:19.333", - "lastModified": "2023-11-07T02:22:00.863", + "lastModified": "2024-11-21T02:18:18.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -116,6 +115,50 @@ { "url": "https://code.google.com/p/chromium/issues/detail?id=416323", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=416323", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7939.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7939.json index c3ed72adc20..8bf792cf5b8 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7939.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7939.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7939", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:20.117", - "lastModified": "2023-11-07T02:22:01.230", + "lastModified": "2024-11-21T02:18:18.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -173,6 +172,42 @@ { "url": "https://code.google.com/p/chromium/issues/detail?id=399951", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=399951", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7940.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7940.json index ab8c2267166..c4d287a06f3 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7940.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7940.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7940", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:20.880", - "lastModified": "2023-11-07T02:22:01.640", + "lastModified": "2024-11-21T02:18:18.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -160,6 +159,78 @@ { "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=433866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7941.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7941.json index 87656fa8bfe..58f0134ad26 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7941.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7941.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7941", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:21.727", - "lastModified": "2023-11-07T02:22:02.063", + "lastModified": "2024-11-21T02:18:18.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -177,6 +176,46 @@ { "url": "https://codereview.chromium.org/697863002", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=428557", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/697863002", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7942.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7942.json index eb0e40e37f6..fcee14e0c57 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7942.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7942.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7942", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:22.523", - "lastModified": "2023-11-07T02:22:02.437", + "lastModified": "2024-11-21T02:18:18.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -201,6 +200,50 @@ { "url": "https://code.google.com/p/chromium/issues/detail?id=426762", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=426762", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7943.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7943.json index 48e7005748c..096a49e7f03 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7943.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7943.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7943", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:23.367", - "lastModified": "2023-11-07T02:22:02.793", + "lastModified": "2024-11-21T02:18:19.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -201,6 +200,50 @@ { "url": "https://code.google.com/p/chromium/issues/detail?id=422492", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=422492", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7944.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7944.json index 8b360d84917..b63082a76b6 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7944.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7944.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7944", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:24.257", - "lastModified": "2023-11-07T02:22:03.240", + "lastModified": "2024-11-21T02:18:19.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -112,6 +111,46 @@ { "url": "https://pdfium.googlesource.com/pdfium/+/6cf012af4954807255ce7cdb5b92a20f74d34e6d", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=418881", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://pdfium.googlesource.com/pdfium/+/6cf012af4954807255ce7cdb5b92a20f74d34e6d", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7945.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7945.json index d1fe7e1ed37..d3e07ae7d6f 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7945.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7945.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7945", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:25.163", - "lastModified": "2023-11-07T02:22:03.730", + "lastModified": "2024-11-21T02:18:19.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -112,6 +111,46 @@ { "url": "https://pdfium.googlesource.com/pdfium/+/767aebbef641a89498deebc29369a078207b4dcc", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=414310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://pdfium.googlesource.com/pdfium/+/767aebbef641a89498deebc29369a078207b4dcc", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7946.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7946.json index 318a6e2d7a0..6339d2c2599 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7946.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7946.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7946", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:26.053", - "lastModified": "2023-11-07T02:22:04.260", + "lastModified": "2024-11-21T02:18:19.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -120,6 +119,54 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=187509&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=414109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=187509&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7947.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7947.json index d7149b5a7d3..bbbedec1073 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7947.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7947.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7947", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:26.913", - "lastModified": "2023-11-07T02:22:04.810", + "lastModified": "2024-11-21T02:18:19.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -112,6 +111,46 @@ { "url": "https://pdfium.googlesource.com/pdfium/+/66d6538c0a97cff550cafdfeaebe8a3f0efbad89", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=430566", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://pdfium.googlesource.com/pdfium/+/66d6538c0a97cff550cafdfeaebe8a3f0efbad89", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7948.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7948.json index 160aa4e6469..eb0100a88ee 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7948.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7948.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7948", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:27.770", - "lastModified": "2023-11-07T02:22:05.237", + "lastModified": "2024-11-21T02:18:19.643", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -128,6 +127,62 @@ { "url": "https://codereview.chromium.org/725573004", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=414026", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/579593003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/645123003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/725573004", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7956.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7956.json index a9109a92f6c..a04a3922776 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7956.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7956.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7956", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:03.733", - "lastModified": "2018-10-09T19:53:35.853", + "lastModified": "2024-11-21T02:18:20.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ { "url": "http://www.securityfocus.com/bid/71995", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/26", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534437/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71995", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7957.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7957.json index 041e13096ec..6b76d75ef2f 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7957.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7957.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7957", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:04.717", - "lastModified": "2018-10-09T19:53:36.167", + "lastModified": "2024-11-21T02:18:20.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/129890/WordPress-Pods-2.4.3-CSRF-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/26", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534437/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/pods/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7958.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7958.json index 27917f2ca6b..fca3714e38e 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7958.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7958.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7958", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:08.913", - "lastModified": "2021-12-16T18:20:47.253", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:20.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -414,6 +413,39 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533904/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://wordpress.org/plugins/bulletproof-security/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7959.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7959.json index 98d94c5b634..3288ca9d86d 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7959.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7959.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7959", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:08.977", - "lastModified": "2021-12-15T21:02:41.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:20.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -414,6 +413,39 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533904/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70918", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://wordpress.org/plugins/bulletproof-security/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7960.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7960.json index d6180dcba8c..e94c0299748 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7960.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7960.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7960", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-17T15:55:06.713", - "lastModified": "2017-09-08T01:29:18.497", + "lastModified": "2024-11-21T02:18:20.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -119,6 +118,53 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0835.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0836.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/07/39", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/08/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2704-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/swift/+bug/1365350", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7967.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7967.json index de0e3f0286d..50608148a8e 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7967.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7967.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7967", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-10-08T10:55:07.080", - "lastModified": "2023-11-07T02:22:06.137", + "lastModified": "2024-11-21T02:18:21.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,10 @@ { "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7968.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7968.json index 772eeade88e..7ff32fffdb3 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7968.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7968.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7968", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-22T14:55:07.013", - "lastModified": "2014-10-23T14:39:38.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:21.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1150812", "source": "cve@mitre.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/08/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/08/18", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/08/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1150812", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7970.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7970.json index a1ef7441b61..109c50753bd 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7970.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7970.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7970", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T10:55:08.497", - "lastModified": "2020-08-14T18:14:52.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:21.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -254,6 +253,131 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60174", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/08/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70319", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1030991", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.spinics.net/lists/linux-fsdevel/msg79153.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2419-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2420-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2514-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:1842", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:2077", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d0826019e529f21c84687521d03f60cd241ca7d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7975.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7975.json index e3ac76579c4..79fde32dd64 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7975.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7975.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7975", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T10:55:09.263", - "lastModified": "2020-08-14T18:15:24.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:21.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -272,6 +271,154 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ef3a56b1c466629cd0bf482b09c7b0e5a085bb5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60174", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62634", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://thread.gmane.org/gmane.linux.kernel.stable/109312", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/08/22", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70314", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031180", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2415-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2416-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2417-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2418-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2419-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2420-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2421-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:1842", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:2077", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7978.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7978.json index 7afccb9d68e..acb4aeb9191 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7978.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7978.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7978", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T18:55:04.493", - "lastModified": "2017-09-08T01:29:18.793", + "lastModified": "2024-11-21T02:18:21.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -97,6 +96,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/57829", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/66782", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92537", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2236251", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2236797", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7979.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7979.json index 65bf793211b..321ead7cdbb 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7979.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7979.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7979", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T18:55:04.553", - "lastModified": "2017-09-08T01:29:18.840", + "lastModified": "2024-11-21T02:18:21.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -97,6 +96,32 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/57828", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/66768", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/2236811", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92530", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2236255", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7980.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7980.json index 1263ad74a15..7a2e129b5ab 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7980.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7980.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7980", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T18:55:04.617", - "lastModified": "2014-10-09T15:47:56.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:21.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -135,6 +134,35 @@ "tags": [ "Patch" ] + }, + { + "url": "http://drupal.org/node/2254925", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/58318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67175", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2254835", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2254837", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7981.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7981.json index 58406916ef2..35485826815 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7981.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7981.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7981", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:05.063", - "lastModified": "2014-10-10T01:32:06.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:22.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +122,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://developer.joomla.org/security/578-20140301-core-sql-injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7982.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7982.json index 20b6864bb5c..48d7a2f2da5 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7982.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7982.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7982", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:05.110", - "lastModified": "2014-10-10T01:50:21.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:22.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -243,6 +242,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://developer.joomla.org/security/580-20140303-core-xss-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7983.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7983.json index b2e420017cf..fdb80f0f5ee 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7983.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7983.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7983", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:05.157", - "lastModified": "2014-10-10T01:43:17.563", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:22.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://developer.joomla.org/security/579-20140302-core-xss-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7984.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7984.json index 6e7b36f92a6..0d558cd2753 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7984.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7984.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7984", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-08T19:55:05.203", - "lastModified": "2014-10-10T01:49:00.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:22.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -240,6 +239,10 @@ { "url": "http://developer.joomla.org/security/581-20140304-core-unauthorised-logins.html", "source": "cve@mitre.org" + }, + { + "url": "http://developer.joomla.org/security/581-20140304-core-unauthorised-logins.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7985.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7985.json index 67ace43b731..51deb6eacb4 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7985.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7985.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7985", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:06.377", - "lastModified": "2018-10-09T19:53:37.323", + "lastModified": "2024-11-21T02:18:22.643", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://blog.espocrm.com/news/espocrm-2-6-0-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533844/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7986.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7986.json index e9eeba25cd8..b5b10bf2d62 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7986.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7986.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7986", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:06.440", - "lastModified": "2018-10-09T19:53:37.713", + "lastModified": "2024-11-21T02:18:22.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://blog.espocrm.com/news/espocrm-2-6-0-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533844/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70811", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7987.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7987.json index 9c2ffb55135..d87df16b429 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7987.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7987.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7987", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:06.487", - "lastModified": "2018-10-09T19:53:38.120", + "lastModified": "2024-11-21T02:18:22.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://blog.espocrm.com/news/espocrm-2-6-0-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128888/EspoCRM-2.5.2-XSS-LFI-Access-Control.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533844/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70806", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7988.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7988.json index d9a451e80bf..6a24e2457f0 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7988.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7988.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7988", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-07T11:55:03.813", - "lastModified": "2017-09-08T01:29:18.903", + "lastModified": "2024-11-21T02:18:23.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98493", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62106", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7988", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36340", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98493", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7989.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7989.json index 1d57c4a780a..0f93d22965e 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7989.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7989.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7989", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-07T11:55:03.860", - "lastModified": "2017-09-08T01:29:18.967", + "lastModified": "2024-11-21T02:18:23.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 6.8, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -125,6 +124,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98530", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7989", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70969", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031178", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98530", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7990.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7990.json index 1541819317a..384640d63d4 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7990.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7990.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7990", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-07T11:55:03.907", - "lastModified": "2017-09-08T01:29:19.013", + "lastModified": "2024-11-21T02:18:23.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 6.8, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -120,6 +119,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98529", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7990", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36351", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98529", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7991.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7991.json index 64e98fa4733..e532338b712 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7991.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7991.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7991", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-14T00:59:03.807", - "lastModified": "2017-09-08T01:29:19.073", + "lastModified": "2024-11-21T02:18:23.403", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98574", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7991", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71013", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031181", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98574", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7992.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7992.json index f980290bd3e..f6878717986 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7992.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7992.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7992", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-18T01:59:07.217", - "lastModified": "2017-09-08T01:29:19.120", + "lastModified": "2024-11-21T02:18:23.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98724", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7992", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36453", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031220", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98724", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7993.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7993.json index ea109abd9ad..26dc07f4357 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7993.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7993.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7993", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-24T00:59:00.063", - "lastModified": "2014-12-24T15:28:35.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:23.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -151,6 +150,17 @@ { "url": "https://dashboard.meraki.com/firmware_security", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36797", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://dashboard.meraki.com/firmware_security", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7994.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7994.json index 9d2faaa6351..e2edd85a9c9 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7994.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7994.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7994", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-24T00:59:01.547", - "lastModified": "2014-12-24T15:38:44.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:23.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -151,6 +150,17 @@ { "url": "https://dashboard.meraki.com/firmware_security", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36798", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://dashboard.meraki.com/firmware_security", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7995.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7995.json index 750b1b39bbd..a5c99c5f6d3 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7995.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7995.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7995", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-24T00:59:02.423", - "lastModified": "2014-12-24T20:17:33.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:23.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -151,6 +150,17 @@ { "url": "https://dashboard.meraki.com/firmware_security", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36799", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://dashboard.meraki.com/firmware_security", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7996.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7996.json index 792208eee86..785a221b748 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7996.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7996.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7996", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-18T23:59:04.567", - "lastModified": "2017-09-08T01:29:19.183", + "lastModified": "2024-11-21T02:18:23.947", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98769", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7996", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36456", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98769", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7997.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7997.json index 8fa605fddeb..6e3c11c86a7 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7997.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7997.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7997", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-15T02:59:01.517", - "lastModified": "2017-09-08T01:29:19.263", + "lastModified": "2024-11-21T02:18:24.057", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -203,6 +202,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7998.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7998.json index a2f45a404fb..5853b72f4e5 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7998.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7998.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7998", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-15T02:59:02.893", - "lastModified": "2017-09-08T01:29:19.310", + "lastModified": "2024-11-21T02:18:24.163", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -203,6 +202,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031219", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-79xx/CVE-2014-7999.json b/CVE-2014/CVE-2014-79xx/CVE-2014-7999.json index 21226387fbc..99cb89e1845 100644 --- a/CVE-2014/CVE-2014-79xx/CVE-2014-7999.json +++ b/CVE-2014/CVE-2014-79xx/CVE-2014-7999.json @@ -2,9 +2,8 @@ "id": "CVE-2014-7999", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-24T00:59:03.343", - "lastModified": "2014-12-24T20:17:49.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:24.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 7.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 5.1, @@ -151,6 +150,17 @@ { "url": "https://dashboard.meraki.com/firmware_security", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36800", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://dashboard.meraki.com/firmware_security", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8000.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8000.json index 9020af79cbb..854267f9746 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8000.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8000.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8000", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-21T02:59:05.630", - "lastModified": "2017-09-08T01:29:19.370", + "lastModified": "2024-11-21T02:18:24.383", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -101,6 +100,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98786", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62558", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36467", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031240", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98786", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8001.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8001.json index 3c41360da26..f72eb9fe50b 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8001.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8001.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8001", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-25T17:59:00.080", - "lastModified": "2014-11-26T20:21:37.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:24.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,21 @@ "tags": [ "Patch" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36500", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/cisco/openh264/pull/1088/files", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8002.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8002.json index 73a0a183b58..fca8db53b31 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8002.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8002.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8002", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-25T17:59:01.627", - "lastModified": "2014-11-26T20:24:27.010", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:24.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,21 @@ "tags": [ "Patch" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36501", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/cisco/openh264/pull/1096/files", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8003.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8003.json index 037e2440aa3..ebc06470fd6 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8003.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8003.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8003", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-10T21:59:14.303", - "lastModified": "2015-01-24T02:17:29.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:24.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -86,6 +85,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8003", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36562", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8004.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8004.json index 39896c83d73..1c99f6c696c 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8004.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8004.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8004", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-25T17:59:03.003", - "lastModified": "2017-09-08T01:29:19.417", + "lastModified": "2024-11-21T02:18:24.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98923", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98923", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8005.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8005.json index 8c05994467a..271d80943b1 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8005.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8005.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8005", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-11-26T02:59:04.450", - "lastModified": "2017-09-08T01:29:19.480", + "lastModified": "2024-11-21T02:18:24.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98937", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8005", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36532", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031262", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98937", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8006.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8006.json index 7e1a16e7e30..2b43591a876 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8006.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8006.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8006", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-17T00:59:02.330", - "lastModified": "2014-12-17T20:32:32.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:25.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8006", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8007.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8007.json index 22ee7cf21d4..c87870b3859 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8007.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8007.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8007", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-20T00:59:01.290", - "lastModified": "2017-01-03T02:59:15.437", + "lastModified": "2024-11-21T02:18:25.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031416", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031416", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8008.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8008.json index bbbf2ed7568..d6799634b36 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8008.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8008.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8008", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-22T14:01:14.913", - "lastModified": "2017-01-03T02:59:15.487", + "lastModified": "2024-11-21T02:18:25.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,25 @@ { "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=37111", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8008", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72263", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=37111", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8009.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8009.json index f24dfb05f58..146ddb90368 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8009.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8009.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8009", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-10T21:59:15.337", - "lastModified": "2015-01-24T02:19:23.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:25.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36640", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8010.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8010.json index c500199210b..f8c4bae76e7 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8010.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8010.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8010", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-10T21:59:16.290", - "lastModified": "2017-01-03T02:59:15.533", + "lastModified": "2024-11-21T02:18:25.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031339", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031339", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8012.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8012.json index 2fdd642bb08..ef20ae280d2 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8012.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8012.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8012", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-18T16:59:15.223", - "lastModified": "2023-08-11T18:54:47.730", + "lastModified": "2024-11-21T02:18:25.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031395", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8012", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031395", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8013.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8013.json index 65d2ec93d41..c8324325503 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8013.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8013.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8013", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-03T22:59:00.050", - "lastModified": "2015-11-04T19:28:40.613", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:25.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -86,6 +85,21 @@ { "url": "http://www.securitytracker.com/id/1031685", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8013", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72393", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031685", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8014.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8014.json index b6657c6bd35..ea1ddb9c90d 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8014.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8014.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8014", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-18T16:59:16.817", - "lastModified": "2017-01-03T02:59:15.640", + "lastModified": "2024-11-21T02:18:25.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031396", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8014", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031396", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8015.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8015.json index 698b4b4bc49..80f7c7f242c 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8015.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8015.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8015", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-22T19:59:00.053", - "lastModified": "2017-01-03T02:59:15.720", + "lastModified": "2024-11-21T02:18:25.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031423", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031423", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8016.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8016.json index 13adfddf36f..c74dc82a0d1 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8016.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8016.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8016", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-19T02:59:04.813", - "lastModified": "2014-12-19T13:50:18.720", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:26.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8016", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8017.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8017.json index 8b8c0d1230e..6823d53ded8 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8017.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8017.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8017", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-22T19:59:01.287", - "lastModified": "2017-01-03T02:59:15.783", + "lastModified": "2024-11-21T02:18:26.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "http://www.securitytracker.com/id/1031425", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71767", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031425", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8018.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8018.json index 0bcef0b8b85..58350a417dc 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8018.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8018.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8018", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-22T19:59:02.303", - "lastModified": "2017-01-03T02:59:15.830", + "lastModified": "2024-11-21T02:18:26.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "http://www.securitytracker.com/id/1031424", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71771", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031424", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8019.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8019.json index a7c48798383..15d8440659b 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8019.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8019.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8019", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-20T00:59:02.460", - "lastModified": "2017-01-03T02:59:15.890", + "lastModified": "2024-11-21T02:18:26.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031417", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031417", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8020.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8020.json index eb63c25ad21..07ebdefcb17 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8020.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8020.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8020", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-10T02:59:29.147", - "lastModified": "2017-09-08T01:29:19.543", + "lastModified": "2024-11-21T02:18:26.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100573", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71975", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031520", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100573", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8021.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8021.json index 4991b5acce0..16f68d07c40 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8021.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8021.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8021", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-03T22:59:01.253", - "lastModified": "2017-09-08T01:29:19.607", + "lastModified": "2024-11-21T02:18:26.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +109,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100666", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37323", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72475", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100666", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8022.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8022.json index 554df57d914..6e1a87505ca 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8022.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8022.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8022", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-15T22:59:01.413", - "lastModified": "2017-09-08T01:29:19.667", + "lastModified": "2024-11-21T02:18:26.677", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=37045", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031560", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100664", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=37045", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8023.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8023.json index c7fac99a345..0ea53808baf 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8023.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8023.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8023", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-17T01:59:02.270", - "lastModified": "2017-09-08T01:29:19.730", + "lastModified": "2024-11-21T02:18:26.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100922", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72618", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031755", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100922", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8024.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8024.json index a981dd69834..57a86e4cad6 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8024.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8024.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8024", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-23T02:59:04.453", - "lastModified": "2017-01-03T02:59:16.157", + "lastModified": "2024-11-21T02:18:26.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=36870", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71770", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=36870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8025.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8025.json index 4573e865141..f07ce3618c8 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8025.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8025.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8025", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-23T02:59:05.670", - "lastModified": "2017-01-03T02:59:16.220", + "lastModified": "2024-11-21T02:18:27.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=36871", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71768", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=36871", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8026.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8026.json index 050674f6d41..6c49e53353e 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8026.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8026.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8026", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-12-23T02:59:06.593", - "lastModified": "2017-01-03T02:59:16.283", + "lastModified": "2024-11-21T02:18:27.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=36872", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8026", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71769", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=36872", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8027.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8027.json index a422c16aa20..6f20b61db5d 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8027.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8027.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8027", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-09T02:59:03.383", - "lastModified": "2017-09-08T01:29:19.793", + "lastModified": "2024-11-21T02:18:27.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100558", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031516", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100558", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8028.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8028.json index ed1c0633900..b76f7cf9df6 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8028.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8028.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8028", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-09T02:59:04.397", - "lastModified": "2017-09-08T01:29:19.857", + "lastModified": "2024-11-21T02:18:27.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100553", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8028", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71946", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031515", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100553", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8029.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8029.json index 574cd9c273b..c221ce85cb9 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8029.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8029.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8029", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-09T02:59:05.257", - "lastModified": "2017-09-08T01:29:19.903", + "lastModified": "2024-11-21T02:18:27.470", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +93,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100548", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100548", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8030.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8030.json index 63d73c16358..113de815d84 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8030.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8030.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8030", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-09T02:59:06.023", - "lastModified": "2017-09-08T01:29:19.967", + "lastModified": "2024-11-21T02:18:27.573", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100574", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8030", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71945", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100574", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8031.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8031.json index 1b05cd9aae8..052a345b21e 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8031.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8031.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8031", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-09T02:59:06.773", - "lastModified": "2017-09-08T01:29:20.027", + "lastModified": "2024-11-21T02:18:27.677", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100575", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8031", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71943", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100575", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8032.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8032.json index 7fc51b1f347..8af5dca9714 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8032.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8032.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8032", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-09T02:59:07.727", - "lastModified": "2017-09-08T01:29:20.073", + "lastModified": "2024-11-21T02:18:27.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100564", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8032", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100564", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8033.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8033.json index aff77627413..600d8e65338 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8033.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8033.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8033", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-09T02:59:08.587", - "lastModified": "2017-09-08T01:29:20.137", + "lastModified": "2024-11-21T02:18:27.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100572", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/60279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100572", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8034.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8034.json index 70b18a972d1..59abeb23444 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8034.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8034.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8034", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-15T22:59:02.727", - "lastModified": "2017-09-08T01:29:20.183", + "lastModified": "2024-11-21T02:18:28.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100552", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8034", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36990", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031543", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100552", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8035.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8035.json index fbc97e04ca8..36dc88b831a 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8035.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8035.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8035", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-10T02:59:30.070", - "lastModified": "2017-09-08T01:29:20.230", + "lastModified": "2024-11-21T02:18:28.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100662", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100662", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8036.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8036.json index fc2011780af..1ea62483ca1 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8036.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8036.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8036", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-10T02:59:30.977", - "lastModified": "2017-09-08T01:29:20.277", + "lastModified": "2024-11-21T02:18:28.227", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100571", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/60330", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8036", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71982", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100571", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8068.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8068.json index dbcf5ea404b..80592eb7176 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8068.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8068.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8068", "sourceIdentifier": "psirt@adobe.com", "published": "2014-10-09T10:55:02.833", - "lastModified": "2017-09-08T01:29:20.323", + "lastModified": "2024-11-21T02:18:28.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97696", "source": "psirt@adobe.com" + }, + { + "url": "http://arstechnica.com/security/2014/10/adobes-e-book-reader-sends-your-reading-logs-back-to-adobe-in-plain-text/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61551", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://the-digital-reader.com/2014/10/06/adobe-spying-users-collecting-data-ebook-libraries/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://twitter.com/AdobeSecurity/statuses/519826275008282624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97696", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8069.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8069.json index 557b409b914..7c3000ad098 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8069.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8069.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8069", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-14T14:55:06.757", - "lastModified": "2014-10-21T18:00:57.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:28.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "http://packetstormsecurity.com/files/128641/Pagekit-0.8.7-Cross-Site-Scripting-Open-Redirect.html", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128641/Pagekit-0.8.7-Cross-Site-Scripting-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8070.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8070.json index eb98b5898ab..7638c90d728 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8070.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8070.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8070", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-14T14:55:06.803", - "lastModified": "2014-10-21T18:07:20.157", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": " CWE-601: URL Redirection to Untrusted Site ('Open Redirect') ", + "lastModified": "2024-11-21T02:18:28.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -76,6 +74,11 @@ { "url": "http://packetstormsecurity.com/files/128641/Pagekit-0.8.7-Cross-Site-Scripting-Open-Redirect.html", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128641/Pagekit-0.8.7-Cross-Site-Scripting-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": " CWE-601: URL Redirection to Untrusted Site ('Open Redirect') " } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8071.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8071.json index b0ff87ad30a..50728f0cb61 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8071.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8071.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8071", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-23T14:55:02.493", - "lastModified": "2017-09-08T01:29:20.417", + "lastModified": "2024-11-21T02:18:29.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97690", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128748/OpenMRS-2.1-Access-Bypass-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70664", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97690", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8072.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8072.json index 681ef8e232f..32cd751c880 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8072.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8072.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8072", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-23T14:55:02.587", - "lastModified": "2017-09-08T01:29:20.467", + "lastModified": "2024-11-21T02:18:29.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97693", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128748/OpenMRS-2.1-Access-Bypass-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70664", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97693", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8073.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8073.json index f73bc18cbf2..28607233092 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8073.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8073.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8073", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-23T14:55:02.650", - "lastModified": "2017-09-08T01:29:20.513", + "lastModified": "2024-11-21T02:18:29.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97692", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128748/OpenMRS-2.1-Access-Bypass-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70664", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97692", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8074.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8074.json index 5dd82719d10..b21a2fb0076 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8074.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8074.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8074", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-17T15:55:07.227", - "lastModified": "2016-04-04T13:15:07.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:29.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,21 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-362/", "source": "cve@mitre.org" + }, + { + "url": "http://www.foxitsoftware.com/support/security_bulletins.php#FRD-22", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-362/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8075.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8075.json index 43fbe51f6e3..220ebeb709f 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8075.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8075.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8075", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-09T14:55:06.093", - "lastModified": "2017-09-08T01:29:20.573", + "lastModified": "2024-11-21T02:18:29.670", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -100,6 +99,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/102655", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/65236", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2184845", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8076.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8076.json index c64a38527b5..705916cf427 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8076.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8076.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8076", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-09T14:55:06.203", - "lastModified": "2017-09-08T01:29:20.620", + "lastModified": "2024-11-21T02:18:29.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -168,6 +167,28 @@ "tags": [ "Patch" ] + }, + { + "url": "http://drupal.org/node/2248145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/58233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92755", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2248095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8077.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8077.json index 9f0a9489a3c..d07ed455d4e 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8077.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8077.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8077", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-09T14:55:06.250", - "lastModified": "2017-09-08T01:29:20.683", + "lastModified": "2024-11-21T02:18:29.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -144,6 +143,39 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/54611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/65998", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2210619", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2210621", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2211381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8078.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8078.json index 20fb5def422..7b42b9a51ac 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8078.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8078.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8078", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-09T14:55:06.297", - "lastModified": "2017-09-08T01:29:20.747", + "lastModified": "2024-11-21T02:18:30.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -252,6 +251,42 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/57402", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/2231671", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2231191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2231197", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2231199", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8079.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8079.json index 5f91fde18a5..6e4db7c5491 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8079.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8079.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8079", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-09T14:55:06.357", - "lastModified": "2017-09-08T01:29:20.793", + "lastModified": "2024-11-21T02:18:30.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -111,6 +110,36 @@ "tags": [ "Patch" ] + }, + { + "url": "http://osvdb.org/103261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/56876", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/65523", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/2194135", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91154", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2193987", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8080.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8080.json index ba79886a12a..cf28e148ca5 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8080.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8080.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8080", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-03T16:55:07.790", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-11-21T02:18:30.393", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -337,6 +335,91 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0443.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1911.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1913.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1914.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62748", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70935", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2397-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8081.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8081.json index 3ec8c897f4e..db11974cff3 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8081.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8081.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8081", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:07.517", - "lastModified": "2018-10-09T19:53:38.510", + "lastModified": "2024-11-21T02:18:30.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -111,6 +110,45 @@ { "url": "https://gitorious.org/testlink-ga/testlink-code/commit/a519da3a45d80077e4eab957eb793b03652f57dc", "source": "cve@mitre.org" + }, + { + "url": "http://karmainsecurity.com/KIS-2014-11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://mantis.testlink.org/view.php?id=6651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533798/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70711", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gitorious.org/testlink-ga/testlink-code/commit/a519da3a45d80077e4eab957eb793b03652f57dc", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8082.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8082.json index 700ae242cad..86da4b32ad8 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8082.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8082.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8082", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:07.580", - "lastModified": "2018-10-09T19:53:39.137", + "lastModified": "2024-11-21T02:18:30.713", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,53 @@ { "url": "https://gitorious.org/testlink-ga/testlink-code/commit/c943e7a397f03e1f60b096c7e6eb94fdefd8a569", "source": "cve@mitre.org" + }, + { + "url": "http://karmainsecurity.com/KIS-2014-12", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://mantis.testlink.org/view.php?id=6651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128824/TestLink-1.9.12-Path-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/106", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533799/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70713", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gitorious.org/testlink-ga/testlink-code/commit/c943e7a397f03e1f60b096c7e6eb94fdefd8a569", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8083.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8083.json index 57d51a27b59..e0ab2c15a28 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8083.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8083.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8083", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:03.857", - "lastModified": "2018-10-09T19:53:39.807", + "lastModified": "2024-11-21T02:18:30.857", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,34 @@ { "url": "http://www.securityfocus.com/bid/71840", "source": "cve@mitre.org" + }, + { + "url": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://karmainsecurity.com/KIS-2014-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129775/Osclass-3.4.2-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/132", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534359/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71840", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8084.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8084.json index 1f579eb4788..7fe5a579941 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8084.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8084.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8084", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:07.620", - "lastModified": "2018-10-09T19:53:40.277", + "lastModified": "2024-11-21T02:18:30.993", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,34 @@ { "url": "http://www.securityfocus.com/bid/71841", "source": "cve@mitre.org" + }, + { + "url": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://karmainsecurity.com/KIS-2014-15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534360/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71841", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8085.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8085.json index 924abb859bf..743a562dedd 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8085.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8085.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8085", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:08.637", - "lastModified": "2018-10-09T19:53:40.760", + "lastModified": "2024-11-21T02:18:31.127", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +95,31 @@ { "url": "http://www.securityfocus.com/bid/71842", "source": "cve@mitre.org" + }, + { + "url": "http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://karmainsecurity.com/KIS-2014-16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129777/Osclass-3.4.2-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534361/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71842", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8086.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8086.json index 7e290be26b0..4e9ba0d418f 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8086.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8086.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8086", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T10:55:09.590", - "lastModified": "2020-08-14T18:16:04.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:31.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 4.7, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.0, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -200,6 +199,97 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0290.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0694.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/09/25", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70376", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.spinics.net/lists/linux-ext4/msg45683.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.spinics.net/lists/linux-ext4/msg45685.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96922", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://lkml.org/lkml/2014/10/8/545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://lkml.org/lkml/2014/10/9/129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8088.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8088.json index 2d08dbab4eb..c60e203f4ea 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8088.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8088.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8088", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-22T14:55:07.967", - "lastModified": "2017-11-04T01:29:01.270", + "lastModified": "2024-11-21T02:18:31.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -200,6 +199,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97038", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141070.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/10/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70378", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97038", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8090.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8090.json index b384257fc58..2e0d5b5d219 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8090.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8090.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8090", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-21T15:59:04.243", - "lastModified": "2017-01-03T02:59:17.017", + "lastModified": "2024-11-21T02:18:31.870", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -286,6 +284,95 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0472.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1911.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1913.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1914.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62748", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71230", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2412-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8091.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8091.json index b5fa403b965..2b6969c2161 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8091.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8091.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8091", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:02.657", - "lastModified": "2023-02-13T00:42:37.047", + "lastModified": "2024-11-21T02:18:32.013", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -139,6 +137,58 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71597", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8092.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8092.json index 4d460471a4c..47a65478291 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8092.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8092.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8092", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:04.847", - "lastModified": "2023-02-13T00:42:37.457", + "lastModified": "2024-11-21T02:18:32.187", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-190: Integer Overflow or Wraparound", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -143,6 +141,62 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-190: Integer Overflow or Wraparound" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8093.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8093.json index d55a33d3573..50449936bb2 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8093.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8093.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8093", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:05.860", - "lastModified": "2023-02-13T00:42:37.837", + "lastModified": "2024-11-21T02:18:32.333", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-190: Integer Overflow or Wraparound", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -154,6 +152,58 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71596", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-190: Integer Overflow or Wraparound" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8094.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8094.json index b583921c896..831da77382c 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8094.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8094.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8094", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:06.863", - "lastModified": "2023-02-13T00:42:38.443", + "lastModified": "2024-11-21T02:18:32.497", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-190: Integer Overflow or Wraparound", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -942,6 +940,62 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71601", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-190: Integer Overflow or Wraparound" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8095.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8095.json index d358487d5c3..d269e09c971 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8095.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8095.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8095", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:07.753", - "lastModified": "2023-02-13T00:42:38.590", + "lastModified": "2024-11-21T02:18:32.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -150,6 +149,54 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71599", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8096.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8096.json index ab634dd2a97..3ed53618213 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8096.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8096.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8096", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:08.923", - "lastModified": "2023-02-13T00:42:38.713", + "lastModified": "2024-11-21T02:18:32.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -177,6 +176,76 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71598", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8097.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8097.json index f71de73cec3..1735aa81006 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8097.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8097.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8097", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:09.830", - "lastModified": "2023-02-13T00:42:38.827", + "lastModified": "2024-11-21T02:18:32.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -135,6 +134,54 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8098.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8098.json index 3acdcc1bcd6..69f07bfba71 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8098.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8098.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8098", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:10.737", - "lastModified": "2023-02-13T00:42:38.947", + "lastModified": "2024-11-21T02:18:33.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -196,6 +195,85 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3610", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71606", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-80xx/CVE-2014-8099.json b/CVE-2014/CVE-2014-80xx/CVE-2014-8099.json index 90a59ec1e03..7f03c37f4db 100644 --- a/CVE-2014/CVE-2014-80xx/CVE-2014-8099.json +++ b/CVE-2014/CVE-2014-80xx/CVE-2014-8099.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8099", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:11.957", - "lastModified": "2023-02-13T00:42:39.540", + "lastModified": "2024-11-21T02:18:33.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -142,6 +141,46 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71600", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8100.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8100.json index 9f71641a099..e6ac1c3a2e8 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8100.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8100.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8100", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:13.050", - "lastModified": "2023-02-13T00:42:39.663", + "lastModified": "2024-11-21T02:18:33.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -150,6 +149,54 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71602", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8101.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8101.json index 61e09a08b50..c5e541796c9 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8101.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8101.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8101", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:13.877", - "lastModified": "2023-02-13T00:42:39.790", + "lastModified": "2024-11-21T02:18:33.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -146,6 +145,50 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8102.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8102.json index 182dbf994c7..b39a46e63d2 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8102.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8102.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8102", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:14.753", - "lastModified": "2023-02-13T00:42:40.290", + "lastModified": "2024-11-21T02:18:33.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -150,6 +149,54 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0532.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8103.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8103.json index 16994e4c100..44b86a43966 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8103.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8103.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8103", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-10T15:59:15.753", - "lastModified": "2023-02-13T00:42:40.393", + "lastModified": "2024-11-21T02:18:33.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -161,6 +160,26 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/61947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8104.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8104.json index 04b80c5f38d..9b89d84662d 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8104.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8104.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8104", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-03T18:59:00.063", - "lastModified": "2020-05-12T14:21:35.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:33.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -858,6 +857,48 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0512.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:139", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2430-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8105.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8105.json index 32812bac8ff..1bc5af416e1 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8105.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8105.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8105", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-10T14:59:00.070", - "lastModified": "2023-02-13T00:42:40.520", + "lastModified": "2024-11-21T02:18:34.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -132,6 +131,26 @@ { "url": "http://rhn.redhat.com/errata/RHSA-2015-0628.html", "source": "secalert@redhat.com" + }, + { + "url": "http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-2-27.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-3-9.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153991.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0416.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8106.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8106.json index 8109b5a07b7..ec011710a9b 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8106.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8106.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8106", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-08T16:59:01.370", - "lastModified": "2023-02-13T00:42:40.813", + "lastModified": "2024-11-21T02:18:34.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -185,6 +184,84 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99126", "source": "secalert@redhat.com" + }, + { + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=bf25983345ca44aec3dd92c57142be45452bd38a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=d3532a0db02296e687711b8cdc7791924efccea0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.gnu.org/archive/html/qemu-devel/2014-12/msg00508.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0349.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0624.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0643.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0795.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0867.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0868.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0891.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60364", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX200892", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3088", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/04/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99126", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8108.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8108.json index 3fb80f0ae15..403ac59544b 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8108.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8108.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8108", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-18T15:59:01.350", - "lastModified": "2017-01-03T02:59:18.097", + "lastModified": "2024-11-21T02:18:34.343", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -609,6 +607,49 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://subversion.apache.org/security/CVE-2014-8108-advisory.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2721-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204427", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8109.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8109.json index 50ddd11f3cd..db1b69ffe7b 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8109.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8109.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8109", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-29T23:59:00.053", - "lastModified": "2023-02-13T00:42:40.890", + "lastModified": "2024-11-21T02:18:34.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -330,6 +329,154 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Mailing List" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Mailing List" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159352.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/28/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73040", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2523-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174077", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/apache/httpd/commit/3f1693d558d0758f829c8b53993f1749ddf6ffcb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57204", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205219", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8110.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8110.json index 5883072ea54..fe68aeb19a0 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8110.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8110.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8110", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-12T16:59:00.050", - "lastModified": "2023-02-13T00:42:42.083", + "lastModified": "2024-11-21T02:18:34.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -183,6 +182,33 @@ { "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E", "source": "secalert@redhat.com" + }, + { + "url": "http://activemq.apache.org/security-advisories.data/CVE-2014-8110-announcement.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62649", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100724", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8111.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8111.json index d4a3841e172..9de587bf89f 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8111.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8111.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8111", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-21T17:59:01.510", - "lastModified": "2023-11-07T02:22:15.097", + "lastModified": "2024-11-21T02:18:34.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -128,6 +127,62 @@ { "url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0846.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0847.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0848.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0849.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1641.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1642.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8112.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8112.json index e3bc79a0514..9585e3312a5 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8112.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8112.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8112", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-10T14:59:01.600", - "lastModified": "2023-02-13T00:42:44.870", + "lastModified": "2024-11-21T02:18:34.970", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -316,6 +315,26 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172729", "source": "secalert@redhat.com" + }, + { + "url": "http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-2-27.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-3-9.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153991.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0416.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172729", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8114.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8114.json index 0afedeef80e..7f7c3ef0c09 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8114.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8114.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8114", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-20T16:59:02.430", - "lastModified": "2019-04-12T19:29:00.223", + "lastModified": "2024-11-21T02:18:35.133", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,28 @@ { "url": "https://github.com/uberfire/uberfire/commit/21ec50eb15", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0234.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0235.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/88199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/uberfire/uberfire/commit/21ec50eb15", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8115.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8115.json index 1860150da49..a072dea3a70 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8115.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8115.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8115", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-20T16:59:03.290", - "lastModified": "2015-03-23T16:53:32.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:35.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -94,6 +93,24 @@ { "url": "https://github.com/droolsjbpm/kie-wb-distributions/commit/90eed433d3", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0234.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0235.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/droolsjbpm/kie-wb-distributions/commit/90eed433d3", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8116.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8116.json index 86fabe53043..1b152d20344 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8116.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8116.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8116", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-17T19:59:02.637", - "lastModified": "2018-01-05T02:29:54.040", + "lastModified": "2024-11-21T02:18:35.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -180,24 +179,24 @@ "url": "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", "source": "secalert@redhat.com", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { "url": "https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8", "source": "secalert@redhat.com", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { "url": "https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6", "source": "secalert@redhat.com", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -206,6 +205,91 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0760.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/1056", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71700", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031344", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2494-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8117.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8117.json index af881ec68ae..7f515ec60cf 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8117.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8117.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8117", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-17T19:59:05.353", - "lastModified": "2018-01-05T02:29:54.103", + "lastModified": "2024-11-21T02:18:35.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -188,16 +187,16 @@ "url": "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", "source": "secalert@redhat.com", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { "url": "https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c", "source": "secalert@redhat.com", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -206,6 +205,90 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0760.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/1056", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71692", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031344", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2494-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2535-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/file/file/blob/00cef282a902a4a6709bbbbb933ee397768caa38/ChangeLog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8118.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8118.json index fecb805c935..3f83850e7ca 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8118.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8118.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8118", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-16T18:59:06.733", - "lastModified": "2023-02-13T00:42:48.030", + "lastModified": "2024-11-21T02:18:35.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -639,6 +638,33 @@ { "url": "https://security.gentoo.org/glsa/201811-22", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0529.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1976.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:251", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201811-22", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8120.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8120.json index 193c4aae42e..c22a12fbcf1 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8120.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8120.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8120", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-18T15:59:02.587", - "lastModified": "2023-02-13T00:43:11.030", + "lastModified": "2024-11-21T02:18:35.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -83,6 +82,17 @@ { "url": "http://rhn.redhat.com/errata/RHSA-2014-2000.html", "source": "secalert@redhat.com" + }, + { + "url": "http://icedtea.classpath.org/pipermail/thermostat-announce/2014-December/000013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8121.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8121.json index a91ea165363..1df37ed0c11 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8121.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8121.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8121", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-27T14:59:03.353", - "lastModified": "2023-02-13T00:43:11.447", + "lastModified": "2024-11-21T02:18:36.023", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -204,6 +203,78 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0327.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2016/dsa-3480", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73038", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2985-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2985-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1165192", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201602-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://sourceware.org/ml/libc-alpha/2015-02/msg00617.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8122.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8122.json index fa829a2ff64..51acb4fddb2 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8122.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8122.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8122", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-13T15:59:07.400", - "lastModified": "2017-09-08T01:29:21.263", + "lastModified": "2024-11-21T02:18:36.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -158,6 +157,82 @@ { "url": "https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0215.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0216.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0217.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0773.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0850.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0920.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031741", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100892", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/victims/victims-cve-db/blob/master/database/java/2014/8122.yaml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8123.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8123.json index f5467b21c66..4ea02fc01a3 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8123.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8123.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8123", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-05T16:59:10.830", - "lastModified": "2014-12-05T17:20:14.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:36.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ { "url": "http://www.securityfocus.com/bid/71386", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/01/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/02/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71386", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8124.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8124.json index ae217ab27e5..4b74ece91e0 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8124.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8124.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8124", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-12T15:59:09.557", - "lastModified": "2023-02-13T00:43:19.807", + "lastModified": "2024-11-21T02:18:36.417", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -184,6 +183,65 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147520.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2014-December/000308.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0839.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0845.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/61186", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/horizon/+bug/1394370", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8125.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8125.json index 965d484e45b..ed1d15599d0 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8125.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8125.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8125", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-21T17:59:02.603", - "lastModified": "2015-05-26T17:56:16.943", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", + "lastModified": "2024-11-21T02:18:36.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +97,27 @@ { "url": "https://github.com/droolsjbpm/jbpm/commit/713e8073ecf45623cfc5c918c5cbf700203f46e5", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0850.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/droolsjbpm/drools/commit/c48464c3b246e6ef0d4cd0dbf67e83ccd532c6d3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/droolsjbpm/jbpm/commit/713e8073ecf45623cfc5c918c5cbf700203f46e5", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8131.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8131.json index dacdcb2575d..ee29d37ecf5 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8131.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8131.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8131", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-06T15:59:04.727", - "lastModified": "2015-01-06T18:57:12.013", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:37.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.libvirt.org/2014/0008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8132.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8132.json index 756a26a0184..bb25ac6134e 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8132.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8132.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8132", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-29T00:59:00.060", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:18:37.503", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -291,6 +289,91 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147367.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147452.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147464.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60838", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2016/dsa-3488", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.libssh.org/2014/12/19/libssh-0-6-4-security-and-bugfix-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2478-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1158089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201606-12", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8133.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8133.json index d531d7c1877..23f772e17a9 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8133.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8133.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8133", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-17T11:59:00.070", - "lastModified": "2023-02-13T00:43:26.857", + "lastModified": "2024-11-21T02:18:37.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -2313,6 +2312,82 @@ { "url": "https://github.com/torvalds/linux/commit/41bdc78544b8a93a9c6814b8bbbfef966272abbe", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=41bdc78544b8a93a9c6814b8bbbfef966272abbe", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1272.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62801", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2490-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2491-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2492-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2493-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/41bdc78544b8a93a9c6814b8bbbfef966272abbe", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8134.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8134.json index 335346d306f..455f1efe0bf 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8134.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8134.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8134", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-12T18:59:03.317", - "lastModified": "2023-02-13T00:43:29.740", + "lastModified": "2024-11-21T02:18:37.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.3, - "baseSeverity": "LOW" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 1.4 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -272,6 +271,119 @@ { "url": "https://support.f5.com/csp/article/K17120?utm_source=f5support&%3Butm_medium=RSS", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-8134.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62336", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71650", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.spinics.net/lists/kvm/msg111458.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1400314", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=909078", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172765", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://support.f5.com/csp/article/K17120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.f5.com/csp/article/K17120?utm_source=f5support&%3Butm_medium=RSS", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8135.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8135.json index 7467da9bf3a..865322b209a 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8135.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8135.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8135", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-19T15:59:09.173", - "lastModified": "2023-02-13T00:43:34.073", + "lastModified": "2024-11-21T02:18:37.960", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -95,6 +93,30 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=87b9437f8951f9d24f9a85c6bbfff0e54df8c984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.libvirt.org/2014/0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087104", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8136.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8136.json index 32c84c7a200..13803b1ce5b 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8136.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8136.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8136", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-19T15:59:10.377", - "lastModified": "2023-02-13T00:43:41.873", + "lastModified": "2024-11-21T02:18:38.067", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -223,6 +222,63 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=2bdcd29c713dfedd813c89f56ae98f6f3898313d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0323.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:070", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2867-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8137.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8137.json index fe313935978..687814d2a37 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8137.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8137.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8137", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-24T18:59:01.713", - "lastModified": "2018-01-05T02:29:54.243", + "lastModified": "2024-11-21T02:18:38.190", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -181,6 +179,95 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0539.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0698.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1713.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61747", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3106", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71742", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2483-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2483-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ocert.org/advisories/ocert-2014-012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8138.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8138.json index c41ca341c65..5db845298cc 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8138.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8138.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8138", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-24T18:59:02.933", - "lastModified": "2018-01-05T02:29:54.337", + "lastModified": "2024-11-21T02:18:38.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -179,6 +178,94 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0539.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0698.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1713.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61747", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3106", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2483-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2483-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ocert.org/advisories/ocert-2014-012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8142.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8142.json index 21b35535253..c444c51e47b 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8142.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8142.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8142", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-20T11:59:00.057", - "lastModified": "2023-11-07T02:22:15.750", + "lastModified": "2024-11-21T02:18:38.793", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -315,6 +313,10 @@ "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -373,6 +375,86 @@ { "url": "https://security.gentoo.org/glsa/201503-03", "source": "secalert@redhat.com" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=630f9c33c23639de85c3fd306b209b538b73b4c9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3117", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=68594", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175718", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8143.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8143.json index 86856a5b5d3..b98c74c8712 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8143.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8143.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8143", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-17T02:59:03.617", - "lastModified": "2017-09-08T01:29:21.340", + "lastModified": "2024-11-21T02:18:38.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -335,6 +334,60 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62594", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.416326", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2481-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://download.samba.org/pub/samba/patches/security/samba-4.0.23-CVE-2014-8143.patch", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://download.samba.org/pub/samba/patches/security/samba-4.1.15-CVE-2014-8143.patch", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100596", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.samba.org/samba/security/CVE-2014-8143", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8144.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8144.json index 4872bae10f8..55fafa35e6c 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8144.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8144.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8144", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-31T22:59:02.630", - "lastModified": "2017-09-08T01:29:21.403", + "lastModified": "2024-11-21T02:18:39.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "https://github.com/doorkeeper-gem/doorkeeper/blob/master/CHANGELOG.md", "source": "secalert@redhat.com" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/1076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99342", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/doorkeeper-gem/doorkeeper/blob/master/CHANGELOG.md", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8145.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8145.json index 63a43b62d94..a57db8a6b05 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8145.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8145.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8145", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-31T22:59:03.617", - "lastModified": "2019-03-01T23:17:24.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:39.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -174,6 +173,73 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0561.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129699/SoX-14.4.1-Heap-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3112", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.ocert.org/advisories/ocert-2014-010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71774", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00034.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-30", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8146.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8146.json index 4eb4a7d321f..74d5f043c86 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8146.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8146.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8146", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-25T22:59:00.067", - "lastModified": "2019-04-23T19:29:19.757", + "lastModified": "2024-11-21T02:18:39.330", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -154,8 +153,8 @@ "url": "http://seclists.org/fulldisclosure/2015/May/14", "source": "secalert@redhat.com", "tags": [ - "Mailing List", "Exploit", + "Mailing List", "Third Party Advisory" ] }, @@ -241,6 +240,141 @@ { "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.icu-project.org/trac/changeset/37162", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2015/05/05/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/14", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3323", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/602540", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205221", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8147.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8147.json index 59adb2e6a4a..de031fa99d7 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8147.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8147.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8147", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-25T22:59:01.927", - "lastModified": "2023-11-07T02:22:15.890", + "lastModified": "2024-11-21T02:18:39.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -128,8 +127,8 @@ "url": "http://seclists.org/fulldisclosure/2015/May/14", "source": "secalert@redhat.com", "tags": [ - "Mailing List", "Exploit", + "Mailing List", "Third Party Advisory" ] }, @@ -205,6 +204,117 @@ { "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.icu-project.org/trac/changeset/37080", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2015/05/05/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/14", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3323", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/602540", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8148.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8148.json index 14e683b36fe..2a625fbe6e2 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8148.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8148.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8148", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-26T15:59:00.050", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:39.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -113,6 +112,28 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00051.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/05/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8150.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8150.json index 0265323d3fc..fecfa869308 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8150.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8150.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8150", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-15T15:59:06.047", - "lastModified": "2018-01-05T02:29:54.430", + "lastModified": "2024-11-21T02:18:39.917", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -781,6 +779,106 @@ { "url": "https://support.apple.com/kb/HT205031", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://curl.haxx.se/docs/adv_20150108B.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147856.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147876.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62075", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62361", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3122", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:021", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032768", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2474-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-47", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8151.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8151.json index 7615c66e7ae..46485e59926 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8151.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8151.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8151", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-15T15:59:07.670", - "lastModified": "2017-07-01T01:29:07.907", + "lastModified": "2024-11-21T02:18:40.093", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-295: Improper Certificate Validation", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -160,6 +158,34 @@ { "url": "https://support.apple.com/kb/HT205031", "source": "secalert@redhat.com" + }, + { + "url": "http://curl.haxx.se/docs/adv_20150108A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-47", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-295: Improper Certificate Validation" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8152.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8152.json index e78b91bd82a..4fa770b0fa1 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8152.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8152.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8152", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-21T18:59:04.840", - "lastModified": "2023-11-07T02:22:16.033", + "lastModified": "2024-11-21T02:18:40.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -112,6 +111,37 @@ { "url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E", "source": "secalert@redhat.com" + }, + { + "url": "http://santuario.apache.org/secadv.data/CVE-2014-8152.txt.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/181", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031556", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8153.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8153.json index cf7946ba4ea..3e0c0f0493c 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8153.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8153.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8153", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-15T15:59:08.607", - "lastModified": "2015-01-16T00:37:24.223", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:40.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -114,6 +113,29 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169408", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-January/000320.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/neutron/+bug/1398779", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/neutron/+bug/1399172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169408", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8154.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8154.json index c812d382070..4cd82a0b3d1 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8154.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8154.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8154", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-27T20:59:12.947", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:40.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,21 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181404", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00069.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177840", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181404", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8157.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8157.json index 2633517c788..d2b8aa78a14 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8157.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8157.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8157", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-26T15:59:04.550", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:18:40.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -203,6 +202,82 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179282", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0074.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0698.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ocert.org/advisories/ocert-2015-001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72296", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2483-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2483-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179282", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8158.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8158.json index c750c4ef8a9..3e847d29bb4 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8158.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8158.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8158", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-26T15:59:09.580", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:18:40.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -195,6 +194,74 @@ { "url": "http://www.ubuntu.com/usn/USN-2483-2", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0074.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0698.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ocert.org/advisories/ocert-2015-001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2483-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2483-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8159.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8159.json index 5b5017a7d1f..bbe3f132eb2 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8159.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8159.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8159", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-16T10:59:01.880", - "lastModified": "2024-06-06T19:46:16.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:40.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -370,6 +369,204 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152747.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0674.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0695.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0726.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0751.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0782.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0783.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0803.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0870.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0919.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3237", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032224", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2525-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2526-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2527-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2528-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2529-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2530-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2561-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8160.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8160.json index 2ca3be57dac..ca7bbd3588b 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8160.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8160.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8160", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-02T11:59:02.660", - "lastModified": "2023-02-13T00:43:57.847", + "lastModified": "2024-11-21T02:18:41.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -438,6 +437,167 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0284.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0290.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0674.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72061", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.spinics.net/lists/netfilter-devel/msg33430.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2514-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182059", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/db29a9508a9246e77087c5531e45b2c88ec6988b", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8162.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8162.json index 372457d9745..e02318781c8 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8162.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8162.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8162", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-14T14:59:05.653", - "lastModified": "2023-02-13T00:44:04.957", + "lastModified": "2024-11-21T02:18:41.387", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +101,22 @@ { "url": "http://www.securityfocus.com/bid/74595", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0957.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74595", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8165.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8165.json index e40e41f9928..a1676708a2a 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8165.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8165.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8165", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-19T15:59:05.237", - "lastModified": "2023-02-13T00:44:07.593", + "lastModified": "2024-11-21T02:18:41.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100788", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-2607.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/p/powerpc-utils/mailman/message/32884230/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/09/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72537", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1073139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100788", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8169.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8169.json index 47fff339554..d6de9d9f3cc 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8169.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8169.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8169", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-18T16:59:00.063", - "lastModified": "2023-02-13T00:44:12.453", + "lastModified": "2024-11-21T02:18:42.137", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -158,6 +157,46 @@ "tags": [ "Issue Tracking" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1344.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2579-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192565", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=917977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8172.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8172.json index d3ae90984eb..fca8aea2389 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8172.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8172.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8172", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-16T10:59:02.990", - "lastModified": "2023-02-13T00:44:18.660", + "lastModified": "2024-11-21T02:18:42.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -96,6 +95,30 @@ { "url": "https://github.com/torvalds/linux/commit/eee5cc2702929fd41cce28058dc6d6717f723f87", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eee5cc2702929fd41cce28058dc6d6717f723f87", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0290.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0694.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/09/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/eee5cc2702929fd41cce28058dc6d6717f723f87", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-81xx/CVE-2014-8173.json b/CVE-2014/CVE-2014-81xx/CVE-2014-8173.json index d94fa74b7fe..8a89e4eed0b 100644 --- a/CVE-2014/CVE-2014-81xx/CVE-2014-8173.json +++ b/CVE-2014/CVE-2014-81xx/CVE-2014-8173.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8173", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-16T10:59:03.943", - "lastModified": "2023-12-22T20:17:47.843", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", + "lastModified": "2024-11-21T02:18:42.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -124,6 +122,50 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee53664bda169f519ce3c6a22d378f0b946c8178", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0290.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0694.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/ee53664bda169f519ce3c6a22d378f0b946c8178", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8240.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8240.json index b1d3a5b4b67..21527db364a 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8240.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8240.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8240", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:14.583", - "lastModified": "2017-09-08T01:29:21.573", + "lastModified": "2024-11-21T02:18:44.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +122,38 @@ { "url": "https://security.gentoo.org/glsa/201612-36", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/300", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70391", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151307", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-36", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8243.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8243.json index c31d6d6673d..59112a71e7d 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8243.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8243.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8243", "sourceIdentifier": "cret@cert.org", "published": "2014-11-01T10:55:02.790", - "lastModified": "2014-11-04T02:38:06.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:45.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -346,6 +345,16 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/447516", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8244.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8244.json index beacc6e633d..1ae9656b529 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8244.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8244.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8244", "sourceIdentifier": "cret@cert.org", "published": "2014-11-01T10:55:02.853", - "lastModified": "2014-11-04T02:42:20.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:45.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -346,6 +345,16 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/447516", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8246.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8246.json index 873aa367c5e..0a5df0ee9c2 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8246.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8246.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8246", "sourceIdentifier": "cret@cert.org", "published": "2014-12-16T23:59:03.607", - "lastModified": "2021-04-12T14:14:24.010", + "lastModified": "2024-11-21T02:18:45.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,33 @@ { "url": "http://www.securityfocus.com/archive/1/534246/100/0/threaded", "source": "cret@cert.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/55", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securitytracker.com/id?1031375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/343060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534246/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8247.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8247.json index c23a54a462b..b8699267796 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8247.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8247.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8247", "sourceIdentifier": "cret@cert.org", "published": "2014-12-16T23:59:05.153", - "lastModified": "2021-04-12T14:14:24.010", + "lastModified": "2024-11-21T02:18:45.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,33 @@ { "url": "http://www.securityfocus.com/archive/1/534246/100/0/threaded", "source": "cret@cert.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/55", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securitytracker.com/id?1031375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/343060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534246/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8248.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8248.json index 574958fff50..ddff9f573d5 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8248.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8248.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8248", "sourceIdentifier": "cret@cert.org", "published": "2014-12-16T23:59:06.260", - "lastModified": "2021-04-12T14:14:24.010", + "lastModified": "2024-11-21T02:18:45.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -99,6 +98,33 @@ { "url": "http://www.securityfocus.com/archive/1/534246/100/0/threaded", "source": "cret@cert.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/55", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securitytracker.com/id?1031375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/343060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534246/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8266.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8266.json index 6ac81a9f272..9f09edea087 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8266.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8266.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8266", "sourceIdentifier": "cret@cert.org", "published": "2015-02-01T02:59:03.503", - "lastModified": "2015-02-02T22:55:17.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:45.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -81,6 +80,15 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/546340", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8267.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8267.json index d43a2f5898f..a035ae3b2a8 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8267.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8267.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8267", "sourceIdentifier": "cret@cert.org", "published": "2015-02-01T02:59:04.473", - "lastModified": "2015-02-02T22:56:49.677", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:46.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -81,6 +80,15 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/546340", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8268.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8268.json index 8a1a6871275..57df3d3fd8f 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8268.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8268.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8268", "sourceIdentifier": "cret@cert.org", "published": "2015-02-01T02:59:05.410", - "lastModified": "2015-02-02T23:20:31.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:46.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -81,6 +80,15 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/546340", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8269.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8269.json index e9905ca413b..5442476f652 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8269.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8269.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8269", "sourceIdentifier": "cret@cert.org", "published": "2014-12-13T00:59:01.273", - "lastModified": "2014-12-16T14:54:15.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:46.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-424/", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/659684", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-423/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-424/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8270.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8270.json index 07019bd2998..0822b131336 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8270.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8270.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8270", "sourceIdentifier": "cret@cert.org", "published": "2014-12-12T11:59:05.657", - "lastModified": "2023-08-02T19:00:29.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:46.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://support.numarasoftware.com/support/articles.asp?how=%20AND%20&mode=detail&kcriteria=7508&ID=7654", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-419/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8272.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8272.json index 1b1c4cc9a01..9a5f5951a31 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8272.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8272.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8272", "sourceIdentifier": "cret@cert.org", "published": "2014-12-19T11:59:05.290", - "lastModified": "2015-02-05T20:13:24.463", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-330: Use of Insufficiently Random Values", + "lastModified": "2024-11-21T02:18:46.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -143,6 +141,30 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.exploit-db.com/exploits/35770", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/843044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/BLUU-9RDQHM", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "CWE-330: Use of Insufficiently Random Values" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8275.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8275.json index c689b984b66..7660e24882f 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8275.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8275.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8275", "sourceIdentifier": "cret@cert.org", "published": "2015-01-09T02:59:09.413", - "lastModified": "2017-11-15T02:29:05.437", + "lastModified": "2024-11-21T02:18:46.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -238,6 +237,14 @@ "url": "http://marc.info/?l=bugtraq&m=142496289803847&w=2", "source": "cret@cert.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496289803847&w=2", + "source": "cret@cert.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142720981827617&w=2", + "source": "cret@cert.org" + }, { "url": "http://marc.info/?l=bugtraq&m=142720981827617&w=2", "source": "cret@cert.org" @@ -360,6 +367,177 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496179803395&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496289803847&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496289803847&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142720981827617&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142720981827617&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721102728110&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142895206924048&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050205101530&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050254401665&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71935", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033378", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa88", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX216642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150108.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8293.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8293.json index c80240d0531..5ad4a9eb637 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8293.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8293.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8293", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-15T14:55:09.137", - "lastModified": "2014-10-22T13:05:30.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:47.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "http://packetstormsecurity.com/files/128479/AllMyGuests-0.4.1-XSS-SQL-Injection-Insecure-Cookie-Handling.html", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128479/AllMyGuests-0.4.1-XSS-SQL-Injection-Insecure-Cookie-Handling.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8294.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8294.json index 37212cbbbb0..ef1c6e67739 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8294.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8294.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8294", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-15T14:55:09.183", - "lastModified": "2014-10-22T13:44:22.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:47.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -75,6 +74,10 @@ { "url": "http://packetstormsecurity.com/files/128479/AllMyGuests-0.4.1-XSS-SQL-Injection-Insecure-Cookie-Handling.html", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128479/AllMyGuests-0.4.1-XSS-SQL-Injection-Insecure-Cookie-Handling.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8295.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8295.json index 4c051c4fb42..4b6adcbe644 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8295.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8295.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8295", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-15T14:55:09.213", - "lastModified": "2014-10-22T01:40:58.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:47.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/112418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128480/Bacula-web-5.2.10-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34851", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8296.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8296.json index e5e8b399d8e..3bb123c0e3d 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8296.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8296.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8296", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T14:55:03.543", - "lastModified": "2017-09-08T01:29:21.620", + "lastModified": "2024-11-21T02:18:47.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -133,6 +132,28 @@ "tags": [ "Patch" ] + }, + { + "url": "http://osvdb.org/102909", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2189751", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2191765", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8298.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8298.json index fe9630a28e0..7c503eedee4 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8298.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8298.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8298", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T15:59:16.580", - "lastModified": "2016-10-26T02:00:41.397", + "lastModified": "2024-11-21T02:18:47.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -154,6 +153,17 @@ { "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "source": "cve@mitre.org" + }, + { + "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3610", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8301.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8301.json index 90a13a6200d..7e8c683261c 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8301.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8301.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8301", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:16.940", - "lastModified": "2014-10-23T14:10:50.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:47.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.splunk.com/view/SP-CAAANHS", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8302.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8302.json index 23e4bbb352d..20d358f734c 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8302.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8302.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8302", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:16.987", - "lastModified": "2014-10-23T14:14:40.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:48.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -182,6 +181,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1030994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.splunk.com/view/SP-CAAANHS", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8303.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8303.json index a2c9de80deb..d8743f48e26 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8303.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8303.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8303", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:17.037", - "lastModified": "2014-10-23T14:15:17.520", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:48.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -127,6 +126,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1030994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.splunk.com/view/SP-CAAANHS", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8304.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8304.json index cfa59b94082..36510a7af18 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8304.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8304.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8304", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:17.380", - "lastModified": "2014-10-21T02:43:11.423", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:48.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,14 @@ { "url": "http://websecurity.com.ua/7276", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/54", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://websecurity.com.ua/7276", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8305.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8305.json index b83925749a9..6f270f01f6f 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8305.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8305.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8305", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:17.690", - "lastModified": "2014-12-16T17:25:49.700", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:18:48.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +85,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/55", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.quantumleap.it/cart-engine-3-0-multiple-vulnerabilities-sql-injection-reflected-xss-open-redirect/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8306.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8306.json index 000209106bb..9bf7c0fd80e 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8306.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8306.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8306", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:17.737", - "lastModified": "2014-12-16T17:26:12.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:48.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/55", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.quantumleap.it/cart-engine-3-0-multiple-vulnerabilities-sql-injection-reflected-xss-open-redirect", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8307.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8307.json index 1200ab52697..b899a63c552 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8307.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8307.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8307", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:17.787", - "lastModified": "2014-12-16T17:26:50.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:48.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Sep/55", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.quantumleap.it/cart-engine-3-0-multiple-vulnerabilities-sql-injection-reflected-xss-open-redirect", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8308.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8308.json index 86b70872a59..52892596989 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8308.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8308.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8308", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:19.753", - "lastModified": "2018-10-09T19:53:42.370", + "lastModified": "2024-11-21T02:18:48.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -109,6 +108,44 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128602/SAP-BusinessObjects-Persistent-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/41", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533649/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70290", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96873", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1941562", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8309.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8309.json index a838315b23c..c9f6ae8fa56 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8309.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8309.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8309", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:19.817", - "lastModified": "2018-10-09T19:53:43.027", + "lastModified": "2024-11-21T02:18:49.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -115,6 +114,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/42", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-029", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533647/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96874", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/2001109", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8310.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8310.json index 97477e7d229..da853238e20 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8310.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8310.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8310", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:19.880", - "lastModified": "2018-10-09T19:53:43.637", + "lastModified": "2024-11-21T02:18:50.163", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -109,6 +108,44 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128600/SAP-Business-Objects-Denial-Of-Service-Via-CORBA.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/40", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533646/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70308", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96875", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/2001106", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8311.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8311.json index 61d8705dbae..0b0a44f88e0 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8311.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8311.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8311", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:19.943", - "lastModified": "2018-10-09T19:53:44.323", + "lastModified": "2024-11-21T02:18:50.313", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Improper Authorization (CWE-285)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -99,6 +97,34 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128601/SAP-Business-Objects-Information-Disclosure-Via-CORBA.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/39", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533648/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96876", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1998990", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Improper Authorization (CWE-285)" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8312.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8312.json index e0432801390..67f142cfa6f 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8312.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8312.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8312", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:19.990", - "lastModified": "2022-10-06T15:20:09.903", + "lastModified": "2024-11-21T02:18:50.460", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Improper Authorization (CWE-285)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -114,6 +112,49 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128603/SAP-Business-Warehouse-Missing-Authorization-Check.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/38", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-033", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533645/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96877", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1967780", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Improper Authorization (CWE-285)" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8313.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8313.json index 7e9f7acd4c2..93bb597fd88 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8313.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8313.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8313", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:20.050", - "lastModified": "2018-10-09T19:53:45.637", + "lastModified": "2024-11-21T02:18:50.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -109,6 +108,44 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-55451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/36", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-028", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533643/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96879", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/2015446", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8314.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8314.json index 3757880dc04..dde701a4357 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8314.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8314.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8314", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:20.113", - "lastModified": "2018-10-09T19:53:46.353", + "lastModified": "2024-11-21T02:18:50.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,41 @@ { "url": "https://service.sap.com/sap/support/notes/2009696", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://scn.sap.com/docs/DOC-55451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/37", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533644/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70307", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96878", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/2009696", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8315.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8315.json index 77842d66e79..fc0d9912357 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8315.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8315.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8315", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:20.177", - "lastModified": "2018-10-09T19:53:47.603", + "lastModified": "2024-11-21T02:18:50.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/48", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.csnc.ch/misc/files/advisories/CSNC-2013-016_SAP_BusinessObjects_Explorer_Port-Scanning.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533672/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70382", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96935", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1908562", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8316.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8316.json index 3fdf67ad604..443744c962c 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8316.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8316.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8316", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-16T19:55:20.240", - "lastModified": "2018-10-09T19:53:48.587", + "lastModified": "2024-11-21T02:18:51.040", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +117,54 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128633/SAP-BusinessObjects-Explorer-14.0.5-XXE-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://scn.sap.com/docs/DOC-55451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/50", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.csnc.ch/misc/files/advisories/CSNC-2013-018_SAP_BusinessObjects_Explorer_XXE.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533673/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70384", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1908531", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8317.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8317.json index 0988712fd11..429e89cdbbf 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8317.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8317.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8317", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-17T14:55:02.953", - "lastModified": "2017-09-08T01:29:22.263", + "lastModified": "2024-11-21T02:18:51.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -149,6 +148,39 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/56882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/65525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/2194621", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2194011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2194013", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8318.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8318.json index 127ca25d306..b170672bdd4 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8318.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8318.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8318", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-17T14:55:03.157", - "lastModified": "2017-09-08T01:29:22.323", + "lastModified": "2024-11-21T02:18:51.337", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -315,6 +314,50 @@ "tags": [ "Patch" ] + }, + { + "url": "http://osvdb.org/103262", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/56860", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/65528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/2194671", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91156", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2194175", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2194181", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2194183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8319.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8319.json index dc8010e3e17..0207fe18af9 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8319.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8319.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8319", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-17T14:55:03.220", - "lastModified": "2017-09-08T01:29:22.387", + "lastModified": "2024-11-21T02:18:51.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -151,6 +150,36 @@ "tags": [ "Patch" ] + }, + { + "url": "http://osvdb.org/103264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/56857", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/65527", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/2194809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2194401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8320.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8320.json index 70173387c42..bd21b5841dc 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8320.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8320.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8320", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-17T14:55:03.267", - "lastModified": "2017-09-08T01:29:22.450", + "lastModified": "2024-11-21T02:18:51.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -232,6 +231,42 @@ "tags": [ "Patch" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Apr/41", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/57373", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/2231665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92347", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2231531", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2231533", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8325.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8325.json index 8de00429ac0..7f00d8a7655 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8325.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8325.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8325", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-22T14:55:08.137", - "lastModified": "2014-10-23T15:51:33.813", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:52.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -140,6 +139,29 @@ { "url": "http://www.securityfocus.com/bid/70645", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/extensions/repository/view/cal", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-013/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70645", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8326.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8326.json index 710e9334292..51ca2bdce5a 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8326.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8326.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8326", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T11:55:07.027", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:52.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -381,6 +380,36 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-12.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70731", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/7b8962dede7631298c81e2c1cd267b81f1e08a8c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/bd68c54d1beeef79d237e8bfda44690834012a76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8327.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8327.json index d8da14f0031..4ab5fa998cd 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8327.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8327.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8327", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-27T15:55:25.157", - "lastModified": "2017-09-08T01:29:22.513", + "lastModified": "2024-11-21T02:18:52.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97668", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/extensions/repository/view/fal_sftp", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-014/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97668", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8329.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8329.json index 241dbe40f66..8f4dab5ecf6 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8329.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8329.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8329", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T15:55:05.010", - "lastModified": "2014-10-23T00:02:08.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:53.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,14 @@ { "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140710-2_Schrack_Technik_Microcontrol_Multiple_critical_vulnerabilities_v10.txt", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/40", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140710-2_Schrack_Technik_Microcontrol_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8330.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8330.json index 3fa1dc2b403..4f93ac48bbd 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8330.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8330.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8330", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T16:55:09.387", - "lastModified": "2014-10-22T23:35:35.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:53.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127827/Espo-CRM-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8331.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8331.json index edf7d2c5d10..d34a8742405 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8331.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8331.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8331", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T16:55:09.730", - "lastModified": "2017-09-08T01:29:22.560", + "lastModified": "2024-11-21T02:18:53.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95198", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/109885", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-360246.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95198", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8333.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8333.json index 971362ab4bb..33fccbeff93 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8333.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8333.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8333", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:07.907", - "lastModified": "2019-04-22T17:48:00.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:53.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -63,14 +62,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B152EDF3-3140-4343-802F-F4F1C329F5C3" } ] }, @@ -79,9 +73,14 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B152EDF3-3140-4343-802F-F4F1C329F5C3" + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" } ] } @@ -143,6 +142,44 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2014-October/000298.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0843.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0844.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60531", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/nova/+bug/1359138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8334.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8334.json index d71467c7047..9e7b97ec46f 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8334.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8334.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8334", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:10.517", - "lastModified": "2018-10-09T19:53:50.743", + "lastModified": "2024-11-21T02:18:53.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -130,6 +129,64 @@ "tags": [ "Patch" ] + }, + { + "url": "http://osvdb.org/show/osvdb/113508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128785/WordPress-Database-Manager-2.7.1-Command-Injection-Credential-Leak.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/99", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/365", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/410", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533763/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-dbmanager-2.7.1/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/wp-dbmanager/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8339.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8339.json index f4242ccbb81..232ae29e723 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8339.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8339.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8339", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:06.200", - "lastModified": "2018-10-09T19:53:51.603", + "lastModified": "2024-11-21T02:18:54.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98393", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128909/Nuevolabs-Nuevoplayer-For-Clipshare-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533847/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70833", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.youtube.com/watch?v=_-oOI1LnEdk", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98393", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8340.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8340.json index daa88575c3e..dd40df53f48 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8340.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8340.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8340", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:07.607", - "lastModified": "2018-10-09T19:53:52.040", + "lastModified": "2024-11-21T02:18:54.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "http://www.securityfocus.com/archive/1/534184/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129445/phpTrafficA-2.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534184/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8346.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8346.json index 77a10e02d25..fc434c77700 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8346.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8346.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8346", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-24T10:55:05.133", - "lastModified": "2014-10-24T14:24:35.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:54.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://www.youtube.com/watch?v=Q3adkpOEjyI", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.youtube.com/watch?v=YufuOYQoDOY", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8349.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8349.json index 8bd9a180252..4289090ab2a 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8349.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8349.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8349", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T16:59:03.290", - "lastModified": "2015-08-06T16:39:43.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:54.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -84,6 +83,18 @@ { "url": "http://www.securitytracker.com/id/1031255", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129199/Liferay-Portal-6.2-EE-SP8-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/61", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031255", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8350.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8350.json index 50b36731103..16a8dd218ae 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8350.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8350.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8350", "sourceIdentifier": "security@debian.org", "published": "2014-11-03T16:55:08.010", - "lastModified": "2017-09-08T01:29:22.747", + "lastModified": "2024-11-21T02:18:55.087", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -608,6 +607,47 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725", "source": "security@debian.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0468.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/420", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/421", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70708", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8351.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8351.json index b46aa210e88..c57b3418b97 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8351.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8351.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8351", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:09.023", - "lastModified": "2017-09-08T01:29:22.793", + "lastModified": "2024-11-21T02:18:55.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,31 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/128960/CNIL-CookieViz-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/LaboCNIL/CookieViz/commit/489b6050f6c53fe7b24c4bed3eeb9c25543960e2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8352.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8352.json index 86287d708f1..1768d554945 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8352.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8352.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8352", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:09.070", - "lastModified": "2017-09-08T01:29:22.857", + "lastModified": "2024-11-21T02:18:55.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/128960/CNIL-CookieViz-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98452", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/LaboCNIL/CookieViz/commit/489b6050f6c53fe7b24c4bed3eeb9c25543960e2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8359.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8359.json index 32e2a16e37e..45d9874e490 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8359.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8359.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8359", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-13T21:32:05.907", - "lastModified": "2017-09-08T01:29:22.917", + "lastModified": "2024-11-21T02:18:56.360", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-376152.htm, the Access Vector is Network", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -126,6 +124,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97682", "source": "cve@mitre.org" + }, + { + "url": "http://osandamalith.wordpress.com/2014/10/20/escalating-local-privileges-using-mobile-partner/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128767/Huawei-Mobile-Partner-DLL-Hijacking.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-376152.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70671", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97682", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-376152.htm, the Access Vector is Network" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8360.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8360.json index 2a4419abd33..3ef165876b4 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8360.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8360.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8360", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T18:59:01.713", - "lastModified": "2015-04-15T15:21:22.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:56.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ { "url": "https://forge.indepnet.net/issues/5101", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tlk.tuxfamily.org/doku.php?id=writeup:cve-2014-8360-en", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.glpi-project.org/spip.php?page=annonce&id_breve=330", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://forge.indepnet.net/issues/5101", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8361.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8361.json index f32b69afa03..e67bba61c3c 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8361.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8361.json @@ -2,13 +2,8 @@ "id": "CVE-2014-8361", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-01T15:59:01.287", - "lastModified": "2024-06-27T18:35:21.117", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2023-09-18", - "cisaActionDue": "2023-10-09", - "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", - "cisaVulnerabilityName": "Realtek SDK Improper Input Validation Vulnerability", + "lastModified": "2024-11-21T02:18:56.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2023-09-18", + "cisaActionDue": "2023-10-09", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Realtek SDK Improper Input Validation Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -984,6 +983,74 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN47580234/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN67456944/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74330", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-155/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37169/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8363.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8363.json index 1f9a2ae261d..72107ffc393 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8363.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8363.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8363", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T17:55:06.540", - "lastModified": "2014-10-25T00:21:23.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:56.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127771/WordPress-WPSS-0.62-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8364.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8364.json index 0cde94ae108..17837001fd3 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8364.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8364.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8364", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T17:55:06.587", - "lastModified": "2014-10-24T12:58:26.160", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:57.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127770/WordPress-WPSS-0.62-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8365.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8365.json index ba8ab53a867..576e2eca20b 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8365.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8365.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8365", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T18:55:03.633", - "lastModified": "2014-10-24T12:51:44.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:57.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://seclists.org/fulldisclosure/2014/Jun/40", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127003/Xornic-Contact-Us-Form-CAPTCHA-Bypass-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/40", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8366.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8366.json index b7a8a7ebad6..bde17bf6afc 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8366.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8366.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8366", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-20T18:55:03.883", - "lastModified": "2020-09-03T12:05:51.713", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:57.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,24 @@ { "url": "http://secunia.com/advisories/59114", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127284/openSIS-5.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jun/151", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/59114", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8367.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8367.json index 62ccc0a51b8..cd25a4b7abb 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8367.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8367.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8367", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T15:59:02.763", - "lastModified": "2018-12-18T17:27:39.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:57.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,29 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/62602", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-11192014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98870", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8368.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8368.json index 81d0f4bd68e..91b8f603924 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8368.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8368.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8368", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T15:59:03.780", - "lastModified": "2018-12-20T17:51:41.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:57.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -102,6 +101,28 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/62578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aid-11192014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98871", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8369.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8369.json index 9cf3b587b25..ee878d89618 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8369.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8369.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8369", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-10T11:55:08.737", - "lastModified": "2023-11-07T02:22:34.917", + "lastModified": "2024-11-21T02:18:57.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -243,6 +242,115 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3d32e4dbe71374a6780eaf51d719d76f9a9bf22f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0674.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62326", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62336", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3093", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/24/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70747", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70749", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1156518", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/3d32e4dbe71374a6780eaf51d719d76f9a9bf22f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://lkml.org/lkml/2014/10/24/460", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8370.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8370.json index e68993d20b2..94b501ea26d 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8370.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8370.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8370", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-29T18:59:00.047", - "lastModified": "2017-09-08T01:29:23.120", + "lastModified": "2024-11-21T02:18:58.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -265,6 +264,70 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100933", "source": "cve@mitre.org" + }, + { + "url": "http://jvn.jp/en/jp/JVN88252465/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/62551", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62669", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72338", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031642", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031643", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100933", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8371.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8371.json index ced194e3b96..51de200b674 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8371.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8371.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8371", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T11:59:08.250", - "lastModified": "2018-10-09T19:53:52.510", + "lastModified": "2024-11-21T02:18:58.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8372.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8372.json index f42bf048619..83d4cc946e9 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8372.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8372.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8372", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-11T15:59:01.443", - "lastModified": "2014-12-12T14:00:03.030", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:58.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/44", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8373.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8373.json index 06b49ea97ad..faf21fa772b 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8373.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8373.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8373", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-11T15:59:03.647", - "lastModified": "2018-10-09T19:53:52.730", + "lastModified": "2024-11-21T02:18:58.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -118,6 +117,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129455/VMware-Security-Advisory-2014-0013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61169", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534186/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031323", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8375.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8375.json index a2896113be4..19e0818b4a7 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8375.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8375.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8375", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T14:55:04.243", - "lastModified": "2015-08-06T16:41:02.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:58.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -89,6 +88,24 @@ { "url": "http://www.securityfocus.com/bid/69181", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127833/WordPress-GB-Gallery-Slideshow-1.5-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.homelab.it/index.php/2014/08/10/wordpress-gb-gallery-slideshow", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69181", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8376.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8376.json index 12857e4cbf9..edc5613800c 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8376.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8376.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8376", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:08.297", - "lastModified": "2015-01-07T14:22:33.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:58.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/60758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69343", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2324303", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2324689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8377.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8377.json index e39fa2c3e74..75c2a7e73b7 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8377.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8377.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8377", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:08.610", - "lastModified": "2017-09-08T01:29:23.167", + "lastModified": "2024-11-21T02:18:58.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95414", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127946/Webasyst-Shop-Script-5.2.2.30933-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95414", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8378.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8378.json index 7435f34e100..4de727a18e9 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8378.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8378.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8378", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:08.640", - "lastModified": "2017-09-08T01:29:23.230", + "lastModified": "2024-11-21T02:18:59.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -107,6 +106,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/60688", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69227", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2320027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2320613", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8379.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8379.json index 652be55ce46..95e77738a80 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8379.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8379.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8379", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:08.703", - "lastModified": "2014-12-16T20:00:55.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:59.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/60734", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/69340", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2324777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2324813", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8380.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8380.json index d6367c0e08c..e97551ef645 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8380.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8380.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8380", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-21T15:55:08.767", - "lastModified": "2017-09-03T01:29:01.310", + "lastModified": "2024-11-21T02:18:59.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://www.exploit-db.com/exploits/40997/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/126813/Splunk-6.1.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/67655", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/40997/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8381.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8381.json index 2bbca5c5998..d8b58def0b4 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8381.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8381.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8381", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-22T14:55:08.200", - "lastModified": "2017-09-08T01:29:23.277", + "lastModified": "2024-11-21T02:18:59.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97649", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128725/Megapolis.Portal-Manager-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/77", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://websecurity.com.ua/7398/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97649", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8383.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8383.json index bc4c584121a..1ddfef1bc07 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8383.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8383.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8383", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:00.073", - "lastModified": "2015-05-19T16:25:58.073", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Missing Authentication for Critical Function", + "lastModified": "2024-11-21T02:18:59.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +104,29 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/131661/InFocus-IN3128HD-Projector-Missing-Authentication.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/88", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.coresecurity.com/advisories/infocus-in3128hd-projector-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Missing Authentication for Critical Function" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8384.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8384.json index 490b524c25b..d35192cdfb8 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8384.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8384.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8384", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:01.637", - "lastModified": "2015-05-19T16:31:16.713", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Missing Authentication for Critical Function", + "lastModified": "2024-11-21T02:18:59.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C", + "baseScore": 9.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +104,29 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/131661/InFocus-IN3128HD-Projector-Missing-Authentication.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/88", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.coresecurity.com/advisories/infocus-in3128hd-projector-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Missing Authentication for Critical Function" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8385.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8385.json index 1083804ff6c..d359e0e1512 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8385.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8385.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8385", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-13T02:59:07.127", - "lastModified": "2015-02-13T23:20:16.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:18:59.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -112,6 +111,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-041-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8386.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8386.json index 5bbd99e280c..4820ef54f19 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8386.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8386.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8386", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-20T15:59:00.047", - "lastModified": "2015-01-21T17:38:41.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:00.113", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/57", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.coresecurity.com/advisories/advantech-adamView-buffer-overflow", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35503", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8387.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8387.json index 7306f9fdd86..f55255e190c 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8387.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8387.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8387", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:01.687", - "lastModified": "2018-10-09T19:53:53.150", + "lastModified": "2024-11-21T02:19:00.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -108,6 +107,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/58", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.coresecurity.com/advisories/advantech-eki-6340-command-injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534021/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71192", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8388.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8388.json index 2b4f38e43bc..a3e4245a361 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8388.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8388.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8388", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T02:59:07.270", - "lastModified": "2014-11-24T14:09:54.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:00.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -79,6 +78,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-324-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8390.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8390.json index da1584007ed..e93838ba907 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8390.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8390.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8390", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-03T10:59:03.150", - "lastModified": "2018-10-09T19:54:00.963", + "lastModified": "2024-11-21T02:19:00.703", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -104,6 +103,38 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.coresecurity.com/advisories/schneider-vampset-stack-and-heap-buffer-overflow", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-084-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535142/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73405", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-092-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8394.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8394.json index 56780ea699b..32ee3cfbcf0 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8394.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8394.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8394", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:09.637", - "lastModified": "2018-10-09T19:54:10.497", + "lastModified": "2024-11-21T02:19:01.130", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -88,6 +86,23 @@ { "url": "http://www.securityfocus.com/bid/72004", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/advisories/corel-software-dll-hijacking", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534452/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72004", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8395.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8395.json index 6e2993248ca..f549bdf44b4 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8395.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8395.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8395", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:10.623", - "lastModified": "2018-10-09T19:54:10.760", + "lastModified": "2024-11-21T02:19:01.267", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -88,6 +86,23 @@ { "url": "http://www.securityfocus.com/bid/72006", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/advisories/corel-software-dll-hijacking", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534452/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72006", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8396.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8396.json index af4a4783385..cec52fe427d 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8396.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8396.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8396", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:11.637", - "lastModified": "2018-10-09T19:54:11.010", + "lastModified": "2024-11-21T02:19:01.410", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -88,6 +86,23 @@ { "url": "http://www.securityfocus.com/bid/72007", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/advisories/corel-software-dll-hijacking", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534452/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72007", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8397.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8397.json index 772e049e35c..6357cbd5b56 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8397.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8397.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8397", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:12.593", - "lastModified": "2018-10-09T19:54:11.260", + "lastModified": "2024-11-21T02:19:01.553", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -93,6 +91,23 @@ { "url": "http://www.securityfocus.com/bid/72009", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/advisories/corel-software-dll-hijacking", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534452/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8398.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8398.json index 3cd7857ded5..9b2f83747fc 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8398.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8398.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8398", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:13.437", - "lastModified": "2018-10-09T19:54:13.573", + "lastModified": "2024-11-21T02:19:01.693", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -88,6 +86,23 @@ { "url": "http://www.securityfocus.com/bid/72010", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/advisories/corel-software-dll-hijacking", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534452/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72010", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-83xx/CVE-2014-8399.json b/CVE-2014/CVE-2014-83xx/CVE-2014-8399.json index c0bc56e66ad..0ad8a4b49a5 100644 --- a/CVE-2014/CVE-2014-83xx/CVE-2014-8399.json +++ b/CVE-2014/CVE-2014-83xx/CVE-2014-8399.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8399", "sourceIdentifier": "security@ubuntu.com", "published": "2014-10-31T14:55:10.643", - "lastModified": "2014-11-03T20:45:46.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:01.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -86,6 +85,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2392-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/desrt/systemd-shim/commit/d2e91c118f6128875274a638007702d1cc665893", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8412.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8412.json index c0331cdaee4..e9764034711 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8412.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8412.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8412", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:04.140", - "lastModified": "2019-07-16T12:22:45.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:01.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -166,6 +165,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8413.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8413.json index d4f54ca4e12..12e1f93ed07 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8413.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8413.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8413", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:05.310", - "lastModified": "2019-07-16T12:22:49.330", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:02.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8414.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8414.json index f5f300fcf19..bde894a60bf 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8414.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8414.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8414", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:06.403", - "lastModified": "2014-12-30T21:18:32.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:02.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -130,6 +129,14 @@ { "url": "http://seclists.org/fulldisclosure/2014/Nov/67", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/67", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8415.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8415.json index 04232ef316c..dd633edec79 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8415.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8415.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8415", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:07.327", - "lastModified": "2019-07-16T12:22:52.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:02.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8416.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8416.json index 23199c4483f..6382def9eb4 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8416.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8416.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8416", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:08.343", - "lastModified": "2019-07-16T12:22:55.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:02.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8417.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8417.json index 23601f5ee23..bb67f557374 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8417.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8417.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8417", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:09.343", - "lastModified": "2019-07-16T12:22:57.470", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:02.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -144,6 +143,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8418.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8418.json index cd6a6460e39..8cf5ed50909 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8418.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8418.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8418", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:10.157", - "lastModified": "2019-07-16T12:23:00.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:02.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -184,6 +183,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8419.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8419.json index 1b434bebcf3..ff955d88677 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8419.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8419.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8419", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:06.107", - "lastModified": "2018-10-09T19:54:15.713", + "lastModified": "2024-11-21T02:19:03.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -80,6 +79,14 @@ { "url": "http://www.securityfocus.com/archive/1/534079/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129234/CodeMeter-Weak-Service-Permissions.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534079/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8420.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8420.json index 0d55d636516..8a4e68e1dea 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8420.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8420.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8420", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T15:59:04.637", - "lastModified": "2018-03-12T17:25:44.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:03.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -131,6 +130,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/71241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-385/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98911", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "https://support.software.dell.com/product-notification/136814", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8423.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8423.json index 95459c44fd8..a9406c4da82 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8423.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8423.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8423", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-28T15:59:03.150", - "lastModified": "2014-11-28T18:00:48.010", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:03.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -76,6 +75,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-389/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-389/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8424.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8424.json index 289de0a34f1..b9e5279952e 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8424.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8424.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8424", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-28T15:59:04.433", - "lastModified": "2014-11-28T18:04:19.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:03.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -76,6 +75,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-388/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-388/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8425.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8425.json index de945c91c5d..6e921755840 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8425.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8425.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8425", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-28T15:59:05.323", - "lastModified": "2014-11-28T18:17:20.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:03.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -76,6 +75,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-387/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-387/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8429.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8429.json index d792b40c344..d6c357692de 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8429.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8429.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8429", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-28T15:59:06.323", - "lastModified": "2018-10-09T19:54:16.823", + "lastModified": "2024-11-21T02:19:04.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534096/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23240", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8437.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8437.json index e23b37a81b3..d5c0b339748 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8437.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8437.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8437", "sourceIdentifier": "psirt@adobe.com", "published": "2014-11-11T23:55:02.597", - "lastModified": "2018-12-20T17:51:50.953", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:04.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -212,6 +211,37 @@ "tags": [ "VDB Entry" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-24.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71036", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98628", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8438.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8438.json index 8296a409d06..5a90b0f9f1d 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8438.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8438.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8438", "sourceIdentifier": "psirt@adobe.com", "published": "2014-11-11T23:55:02.643", - "lastModified": "2018-12-20T17:52:19.487", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:19:04.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -214,6 +212,39 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-24.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98619", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8439.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8439.json index 94d17960ce1..858cd1ed05a 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8439.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8439.json @@ -2,13 +2,8 @@ "id": "CVE-2014-8439", "sourceIdentifier": "psirt@adobe.com", "published": "2014-11-25T23:59:00.053", - "lastModified": "2021-09-22T14:22:20.497", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-05-25", - "cisaActionDue": "2022-06-15", - "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", - "cisaVulnerabilityName": "Adobe Flash Player Dereferenced Pointer Vulnerability", + "lastModified": "2024-11-21T02:19:04.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -46,6 +41,10 @@ } ] }, + "cisaExploitAdd": "2022-05-25", + "cisaActionDue": "2022-06-15", + "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", + "cisaVulnerabilityName": "Adobe Flash Player Dereferenced Pointer Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -261,6 +260,85 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-22.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1915.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031259", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98932", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.f-secure.com/weblog/archives/00002768.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8440.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8440.json index 3b21907deda..3703c8cf402 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8440.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8440.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8440", "sourceIdentifier": "psirt@adobe.com", "published": "2014-11-11T23:55:02.690", - "lastModified": "2018-12-20T17:52:24.987", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:04.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -229,6 +228,54 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-24.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71047", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98615", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36880/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8441.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8441.json index ae745a0fa85..502fa01c7cf 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8441.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8441.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8441", "sourceIdentifier": "psirt@adobe.com", "published": "2014-11-11T23:55:02.737", - "lastModified": "2018-12-20T17:52:35.140", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:05.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -213,6 +212,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-24.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98616", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8442.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8442.json index c67411ddeeb..7df57fd8fa6 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8442.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8442.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8442", "sourceIdentifier": "psirt@adobe.com", "published": "2014-11-11T23:55:02.783", - "lastModified": "2018-12-20T17:52:48.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:05.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -213,6 +212,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-24.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71040", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98630", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8443.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8443.json index 40697adeacd..e02f680ae5e 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8443.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8443.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8443", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:17.413", - "lastModified": "2018-12-20T17:52:57.610", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:05.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -140,6 +139,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-27.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8445.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8445.json index 011bbdcf5db..a02ac7b3726 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8445.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8445.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8445", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:18.337", - "lastModified": "2014-12-12T00:43:44.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:05.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8446.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8446.json index c5f77a02f83..411b570f02d 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8446.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8446.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8446", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:19.117", - "lastModified": "2014-12-12T01:15:46.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:05.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8447.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8447.json index 400709292d3..a56df1397af 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8447.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8447.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8447", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:20.023", - "lastModified": "2014-12-12T01:18:22.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:05.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8448.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8448.json index 8d34b964b3c..75dd89245f9 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8448.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8448.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8448", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:20.837", - "lastModified": "2014-12-12T01:19:36.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:05.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8449.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8449.json index f2f3bd1ccfd..3b5a89d7a75 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8449.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8449.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8449", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:21.710", - "lastModified": "2014-12-12T04:04:55.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:05.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8451.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8451.json index 8ea044496bb..1759c10f97a 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8451.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8451.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8451", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:22.540", - "lastModified": "2014-12-12T01:21:37.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:06.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8452.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8452.json index decba98d302..dba3f472ba3 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8452.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8452.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8452", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:23.493", - "lastModified": "2014-12-12T01:30:39.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:06.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8453.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8453.json index dd4fff7c79a..bb09ff9d0aa 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8453.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8453.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8453", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:24.383", - "lastModified": "2014-12-12T01:26:15.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:06.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8454.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8454.json index 009b3312e83..2eeaccfc2e4 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8454.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8454.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8454", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:25.413", - "lastModified": "2014-12-12T01:31:45.283", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:19:06.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -388,6 +386,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8455.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8455.json index 9f308fbf8fe..f20c59e3c35 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8455.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8455.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8455", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:26.493", - "lastModified": "2014-12-12T01:32:33.927", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:19:06.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -388,6 +386,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8456.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8456.json index 03facfe8a99..9341ef20fe5 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8456.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8456.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8456", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:27.307", - "lastModified": "2014-12-12T01:33:50.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:06.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8457.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8457.json index 712b627d22c..dda9943f351 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8457.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8457.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8457", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:28.257", - "lastModified": "2014-12-12T01:34:39.663", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:07.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8458.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8458.json index 5b20d2f85ab..cd42753e597 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8458.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8458.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8458", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:29.180", - "lastModified": "2014-12-12T01:35:35.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:07.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8459.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8459.json index 4e0dbc25d84..f3a160f0bc7 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8459.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8459.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8459", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:30.023", - "lastModified": "2014-12-12T01:36:24.010", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:07.283", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8460.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8460.json index 6a9342183c2..079fcb2a133 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8460.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8460.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8460", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:30.790", - "lastModified": "2014-12-12T01:36:58.823", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:07.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8461.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8461.json index b563c1fcb7b..a431cfeb45d 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8461.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8461.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8461", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:31.680", - "lastModified": "2014-12-12T01:39:37.577", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:07.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8469.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8469.json index f38e886367f..e76641b5939 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8469.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8469.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8469", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T15:59:05.557", - "lastModified": "2017-09-08T01:29:23.777", + "lastModified": "2024-11-21T02:19:07.673", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98727", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129153/PHPFox-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/50", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35274", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71180", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98727", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8471.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8471.json index d59ac443b15..99d6ae8012f 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8471.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8471.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8471", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T20:55:04.090", - "lastModified": "2017-09-08T01:29:23.840", + "lastModified": "2024-11-21T02:19:07.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98534", "source": "cve@mitre.org" + }, + { + "url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141103-01-security-notice-for-ca-cloud-service-management.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70919", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031214", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98534", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8472.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8472.json index 2998bf1e2b1..a626467b004 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8472.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8472.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8472", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T20:55:04.137", - "lastModified": "2017-09-08T01:29:23.887", + "lastModified": "2024-11-21T02:19:07.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98535", "source": "cve@mitre.org" + }, + { + "url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141103-01-security-notice-for-ca-cloud-service-management.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70923", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031214", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98535", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8473.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8473.json index 37fe636407f..76625055ec8 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8473.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8473.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8473", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T20:55:04.187", - "lastModified": "2017-09-08T01:29:23.933", + "lastModified": "2024-11-21T02:19:08.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98536", "source": "cve@mitre.org" + }, + { + "url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141103-01-security-notice-for-ca-cloud-service-management.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031214", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98536", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8474.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8474.json index 3881f8d8aa2..99a3fd3afd4 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8474.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8474.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8474", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T20:55:04.233", - "lastModified": "2017-09-08T01:29:23.997", + "lastModified": "2024-11-21T02:19:08.313", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +91,27 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98537", "source": "cve@mitre.org" + }, + { + "url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141103-01-security-notice-for-ca-cloud-service-management.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70926", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031214", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98537", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8475.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8475.json index 6971653d4d5..6dc8c2c46e6 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8475.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8475.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8475", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-18T15:59:05.360", - "lastModified": "2017-09-08T01:29:24.060", + "lastModified": "2024-11-21T02:19:08.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128972/FreeBSD-Security-Advisory-sshd-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61440", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70913", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031168", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98491", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A24.sshd.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8476.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8476.json index c65f9e47b3a..28825474669 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8476.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8476.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8476", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-13T21:32:07.703", - "lastModified": "2014-11-14T15:01:54.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:08.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -150,6 +149,25 @@ { "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A25.setlogin.asc", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/61118", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3070", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A25.setlogin.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8478.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8478.json index d9337a43f22..9190b8a4dc2 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8478.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8478.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8478", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T17:59:00.060", - "lastModified": "2020-02-10T15:15:19.247", + "lastModified": "2024-11-21T02:19:08.760", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -148,6 +147,17 @@ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-321046.pdf", "source": "cve@mitre.org" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-321046.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-321046.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8479.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8479.json index a15f203f559..aa310ba0ac2 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8479.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8479.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8479", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T17:59:01.323", - "lastModified": "2020-02-10T15:15:19.527", + "lastModified": "2024-11-21T02:19:08.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -148,6 +147,17 @@ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-321046.pdf", "source": "cve@mitre.org" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-321046.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-321046.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8480.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8480.json index 6f95c2f7ac0..29ee97f3269 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8480.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8480.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8480", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-10T11:55:09.720", - "lastModified": "2023-11-07T02:22:36.153", + "lastModified": "2024-11-21T02:19:09.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -102,6 +101,36 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3f6f1480d86bf9fc16c160d803ab1d006e3058d5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://thread.gmane.org/gmane.comp.emulators.kvm.devel/128427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/23/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70710", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1156615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/3f6f1480d86bf9fc16c160d803ab1d006e3058d5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8481.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8481.json index 853e4080918..c69f6107bc6 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8481.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8481.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8481", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-10T11:55:09.767", - "lastModified": "2023-11-07T02:22:36.230", + "lastModified": "2024-11-21T02:19:09.200", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -102,6 +101,36 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a430c9166312e1aa3d80bce32374233bdbfeba32", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62042", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://thread.gmane.org/gmane.comp.emulators.kvm.devel/128427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/23/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1156615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/a430c9166312e1aa3d80bce32374233bdbfeba32", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8483.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8483.json index 88dc367816a..857364904c7 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8483.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8483.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8483", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:09.523", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-125: Out-of-bounds Read", + "lastModified": "2024-11-21T02:19:09.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -206,9 +204,92 @@ "url": "https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" + ] + }, + { + "url": "http://bugs.quassel-irc.org/issues/1314", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61932", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62261", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3063", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3068", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2401-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" ] } - ] + ], + "evaluatorComment": "CWE-125: Out-of-bounds Read" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8484.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8484.json index c19bb7608f5..bb3e052c3bb 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8484.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8484.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8484", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:00.083", - "lastModified": "2023-11-07T02:22:36.300", + "lastModified": "2024-11-21T02:19:09.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -223,6 +222,102 @@ { "url": "https://sourceware.org/git/?p=binutils-gdb.git%3Ba=commit%3Bh=bd25671c6f202c4a5108883caa2adb24ff6f361f", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145262.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145328.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145742.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/10/23/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/62241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62746", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/26/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70714", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2496-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1156272", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-24", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17509", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://sourceware.org/git/?p=binutils-gdb.git%3Ba=commit%3Bh=bd25671c6f202c4a5108883caa2adb24ff6f361f", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8485.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8485.json index 263fa8e4ffd..2bdbb9b6427 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8485.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8485.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8485", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:01.410", - "lastModified": "2023-11-07T02:22:36.377", + "lastModified": "2024-11-21T02:19:09.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -224,6 +223,103 @@ { "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=493a33860c71cac998f1a56d6d87d6faa801fbaa", "source": "cve@mitre.org" + }, + { + "url": "http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Press/Media Coverage" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145262.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145328.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145742.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62746", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/26/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70741", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2496-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157276", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-24", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17510", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=493a33860c71cac998f1a56d6d87d6faa801fbaa", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8487.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8487.json index fa51b3b6f4b..10309678575 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8487.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8487.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8487", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T15:59:01.317", - "lastModified": "2018-10-09T19:54:17.997", + "lastModified": "2024-11-21T02:19:09.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534739/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72714", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8488.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8488.json index 0731acac633..7d3191b4f12 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8488.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8488.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8488", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T01:59:00.073", - "lastModified": "2015-09-03T14:57:26.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:10.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -115,6 +114,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156526.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156564.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156596.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8489.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8489.json index 9ca8d4f61e7..c04d99a1e3a 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8489.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8489.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8489", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T15:59:10.697", - "lastModified": "2014-12-16T13:54:43.200", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:19:10.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -84,6 +82,19 @@ { "url": "http://tetraph.com/security/cves/cve-2014-8489-ping-identity-corporation-pingfederate-6-10-1-sp-endpoints-dest-redirect-privilege-escalation-security-vulnerability/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129454/PingFederate-6.10.1-SP-Endpoints-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/35", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-8489-ping-identity-corporation-pingfederate-6-10-1-sp-endpoints-dest-redirect-privilege-escalation-security-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8493.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8493.json index ca26da57c69..7109c98ac8e 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8493.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8493.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8493", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:01.987", - "lastModified": "2017-09-08T01:29:24.120", + "lastModified": "2024-11-21T02:19:10.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -122,6 +121,45 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129139/ZTE-ZXHN-H108L-Access-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/46", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35272", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35276", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98733", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://projectzero.gr/en/2014/11/zte-zxhn-h108l-authentication-bypass/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8494.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8494.json index 8f284f738b9..ac02b809054 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8494.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8494.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8494", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-03T16:55:08.057", - "lastModified": "2017-09-08T01:29:24.183", + "lastModified": "2024-11-21T02:19:10.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98315", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128868/ESTsoft-ALUpdate-8.5.1.0.0-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98315", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8495.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8495.json index 1b467385f94..e86238190ff 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8495.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8495.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8495", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:10.860", - "lastModified": "2017-09-08T01:29:24.230", + "lastModified": "2024-11-21T02:19:11.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -117,6 +116,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98337", "source": "cve@mitre.org" + }, + { + "url": "http://support.citrix.com/article/CTX200260", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98337", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8496.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8496.json index f18cd0fe7c8..70e7b9be22a 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8496.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8496.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8496", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T00:59:00.073", - "lastModified": "2014-12-10T18:29:33.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:11.173", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://www.youtube.com/watch?v=La9nMeVCtt4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8498.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8498.json index ff7893a09af..dd6bfa07c64 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8498.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8498.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8498", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-17T16:59:02.823", - "lastModified": "2019-07-16T12:22:14.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:11.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -134,6 +133,62 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/114483", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/18", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71016", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-84xx/CVE-2014-8499.json b/CVE-2014/CVE-2014-84xx/CVE-2014-8499.json index 318371bd527..70098801e8d 100644 --- a/CVE-2014/CVE-2014-84xx/CVE-2014-8499.json +++ b/CVE-2014/CVE-2014-84xx/CVE-2014-8499.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8499", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-17T16:59:04.010", - "lastModified": "2017-09-08T01:29:24.357", + "lastModified": "2024-11-21T02:19:11.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -123,6 +122,51 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/114484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/114485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129036/Password-Manager-Pro-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/18", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98597", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_pmp_privesc.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8500.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8500.json index 9a81023b337..ef5c20813af 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8500.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8500.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8500", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-11T02:59:00.077", - "lastModified": "2017-01-03T02:59:19.830", + "lastModified": "2024-11-21T02:19:11.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -429,6 +428,14 @@ "url": "http://marc.info/?l=bugtraq&m=142180687100892&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142180687100892&w=2", + "source": "cve@mitre.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144000632319155&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=144000632319155&w=2", "source": "cve@mitre.org" @@ -506,6 +513,139 @@ { "url": "https://support.apple.com/HT205219", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0524.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-002.txt.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142180687100892&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142180687100892&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144000632319155&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144000632319155&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0078.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62064", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62122", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securitytracker.com/id?1031311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2437-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3094", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/264212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.isc.org/article/AA-01216/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20190730-0002/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205219", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8501.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8501.json index dde2c13fc11..1680e302c0d 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8501.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8501.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8501", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:03.020", - "lastModified": "2023-11-07T02:22:36.613", + "lastModified": "2024-11-21T02:19:11.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -238,6 +237,117 @@ { "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e1e19887abd24aeb15066b141cdff5541e0ec8e", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145262.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145328.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145742.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147346.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147354.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148427.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/26/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/31/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2496-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162570", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-24", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17512", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e1e19887abd24aeb15066b141cdff5541e0ec8e", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8502.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8502.json index 54274c46ef4..70a7d2d46b0 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8502.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8502.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8502", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:04.067", - "lastModified": "2023-11-07T02:22:36.690", + "lastModified": "2024-11-21T02:19:12.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -238,6 +237,117 @@ { "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5a4b0ccc20ba30caef53b01bee2c0aaa5b855339", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145262.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145328.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145742.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147346.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147354.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148427.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/31/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70869", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2496-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162594", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-24", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17512", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5a4b0ccc20ba30caef53b01bee2c0aaa5b855339", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8503.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8503.json index 3a9d90b55ae..90f1a52463d 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8503.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8503.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8503", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:05.020", - "lastModified": "2023-11-07T02:22:36.770", + "lastModified": "2024-11-21T02:19:12.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -242,6 +241,121 @@ { "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=0102ea8cec5fc509bba6c91df61b7ce23a799d32", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145262.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145328.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145742.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147346.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147354.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148427.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62746", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/31/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70868", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2496-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162607", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-24", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17512", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=0102ea8cec5fc509bba6c91df61b7ce23a799d32", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8504.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8504.json index 5928e4c057c..3a0bf1c5ccb 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8504.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8504.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8504", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:06.147", - "lastModified": "2023-11-07T02:22:36.850", + "lastModified": "2024-11-21T02:19:12.377", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -256,6 +255,135 @@ { "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=708d7d0d11f0f2d776171979aa3479e8e12a38a0", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145262.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145328.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145742.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147346.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147354.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148427.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62746", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/27/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/27/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/31/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2496-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162621", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-24", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17510", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=708d7d0d11f0f2d776171979aa3479e8e12a38a0", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8505.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8505.json index 46c128a0fe9..66d18784d61 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8505.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8505.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8505", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-28T14:55:06.423", - "lastModified": "2017-09-08T01:29:24.417", + "lastModified": "2024-11-21T02:19:12.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97031", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128644/Etiko-CMS-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8506.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8506.json index 5b809a25ec8..d51089650aa 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8506.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8506.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8506", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-28T14:55:06.487", - "lastModified": "2017-09-08T01:29:24.467", + "lastModified": "2024-11-21T02:19:12.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97030", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128644/Etiko-CMS-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97030", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8507.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8507.json index 825e6c983d8..7e2568ff302 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8507.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8507.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8507", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:16.690", - "lastModified": "2015-08-06T16:41:30.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:12.837", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -324,6 +323,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129283/Android-WAPPushManager-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/86", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xteam.baidu.com/?p=167", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://android.googlesource.com/platform/frameworks/base/+/48ed835468c6235905459e6ef7df032baf3e4df6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8508.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8508.json index 16f9194dcdc..e98287bf069 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8508.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8508.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8508", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:10.100", - "lastModified": "2015-08-06T16:44:22.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:12.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-371/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/70892", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-371/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8509.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8509.json index 8cdaac55d72..2d331365e88 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8509.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8509.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8509", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:11.143", - "lastModified": "2014-11-03T20:56:33.140", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:13.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/bid/70812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-370/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/bittorrent/bootstrap-dht/commit/bbc0b7191e3f48461ca6e5b1b34bdf4b3f1e79a9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8510.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8510.json index 42048105956..8ef4c1d995d 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8510.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8510.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8510", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-07T19:55:04.557", - "lastModified": "2014-11-10T13:42:29.113", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:13.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-373/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-373/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8511.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8511.json index b3bbb5d37c5..93055a21fb4 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8511.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8511.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8511", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-27T15:59:00.057", - "lastModified": "2015-02-02T16:49:22.903", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:13.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-344-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8512.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8512.json index 970feaca214..b2d7c33b6ed 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8512.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8512.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8512", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-27T15:59:01.857", - "lastModified": "2014-12-29T23:11:59.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:13.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,23 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-344-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8513.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8513.json index ea3b8b3f501..4e6bf563d29 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8513.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8513.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8513", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-27T15:59:02.777", - "lastModified": "2014-12-29T23:12:32.693", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:13.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-344-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8514.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8514.json index 89c17f58471..a9555a0ed7b 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8514.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8514.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8514", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-27T15:59:03.823", - "lastModified": "2016-12-31T02:59:14.200", + "lastModified": "2024-11-21T02:19:13.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,27 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-344-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71710", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8515.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8515.json index e857831d1cf..5fa263967bb 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8515.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8515.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8515", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T15:59:11.977", - "lastModified": "2014-12-16T03:30:20.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:14.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8517.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8517.json index ffe8733ada3..05326e46437 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8517.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8517.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8517", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-17T16:59:05.213", - "lastModified": "2017-11-06T02:29:00.227", + "lastModified": "2024-11-21T02:19:14.307", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -245,6 +244,50 @@ { "url": "https://www.exploit-db.com/exploits/43112/", "source": "cve@mitre.org" + }, + { + "url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/464", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62028", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201611-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/43112/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8518.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8518.json index 4daf70a3238..1d240b2346e 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8518.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8518.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8518", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.297", - "lastModified": "2014-11-19T03:03:01.713", + "lastModified": "2024-11-21T02:19:14.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -179,6 +178,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8519.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8519.json index 05456fd3bba..4f2aa72b970 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8519.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8519.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8519", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.360", - "lastModified": "2014-10-30T14:45:31.300", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:14.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -89,6 +88,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8520.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8520.json index 6a375ccba85..761371030a7 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8520.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8520.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8520", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.407", - "lastModified": "2017-09-08T01:29:24.527", + "lastModified": "2024-11-21T02:19:14.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +101,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/70815", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98433", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8521.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8521.json index 60604982d15..0546042f803 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8521.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8521.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8521", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.453", - "lastModified": "2014-10-30T15:23:52.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:14.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8522.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8522.json index 9a9d620a20a..66d20f433d4 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8522.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8522.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8522", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.500", - "lastModified": "2014-10-30T15:18:08.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:15.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8523.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8523.json index 8e6023e47e1..eac495d1533 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8523.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8523.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8523", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.547", - "lastModified": "2014-10-30T15:17:14.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:15.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8524.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8524.json index c8efb6afa16..16b6260fdc1 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8524.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8524.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8524", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.610", - "lastModified": "2014-10-30T15:16:21.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:15.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8525.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8525.json index 14c731d762d..47efd3f4437 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8525.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8525.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8525", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.643", - "lastModified": "2017-09-08T01:29:24.590", + "lastModified": "2024-11-21T02:19:15.427", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +101,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/70823", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8526.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8526.json index 825d43a1ced..19adddee704 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8526.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8526.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8526", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.690", - "lastModified": "2014-10-30T15:30:42.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:15.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8527.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8527.json index 7f1663927ef..86113ce743b 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8527.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8527.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8527", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.737", - "lastModified": "2014-10-30T15:29:30.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:15.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8528.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8528.json index 247588ccdff..816abb69102 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8528.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8528.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8528", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.783", - "lastModified": "2014-10-30T15:28:40.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:15.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8529.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8529.json index 7cc3fa654a5..5a730bce3c7 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8529.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8529.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8529", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.830", - "lastModified": "2014-10-30T15:26:50.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:15.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8530.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8530.json index 16e39ab73a7..885935a2226 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8530.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8530.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8530", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.860", - "lastModified": "2014-10-30T15:24:52.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:16.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8531.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8531.json index e0006387cd5..22038521c9a 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8531.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8531.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8531", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.907", - "lastModified": "2017-09-08T01:29:24.637", + "lastModified": "2024-11-21T02:19:16.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -102,6 +101,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/70831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98432", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8532.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8532.json index ff9da3f890e..f85205e1cbb 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8532.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8532.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8532", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:04.953", - "lastModified": "2014-10-30T15:33:15.973", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:16.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8533.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8533.json index a495b3564b6..31b68393857 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8533.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8533.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8533", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:05.000", - "lastModified": "2014-10-30T15:35:29.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:16.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8534.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8534.json index c050146e810..9587e6fbfd4 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8534.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8534.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8534", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:05.047", - "lastModified": "2014-10-30T14:44:21.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:16.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -89,6 +88,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8535.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8535.json index 1791a4d211e..6423011b812 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8535.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8535.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8535", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:05.097", - "lastModified": "2014-10-30T14:41:11.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:16.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -89,6 +88,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8536.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8536.json index 6a29f969c35..293c5c39765 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8536.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8536.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8536", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:05.143", - "lastModified": "2017-09-08T01:29:24.700", + "lastModified": "2024-11-21T02:19:16.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -97,6 +96,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/70840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8537.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8537.json index 504efa9d95c..fc9edad0525 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8537.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8537.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8537", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T14:55:05.190", - "lastModified": "2017-09-08T01:29:24.763", + "lastModified": "2024-11-21T02:19:17.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -97,6 +96,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/70835", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8538.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8538.json index a4e05e0c979..67c49d31083 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8538.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8538.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8538", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-29T18:55:01.783", - "lastModified": "2014-11-14T14:58:02.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:17.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -89,6 +88,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/200313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8539.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8539.json index de7967b84aa..8d5f953e6ee 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8539.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8539.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8539", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T15:59:06.837", - "lastModified": "2018-10-09T19:54:20.823", + "lastModified": "2024-11-21T02:19:17.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ { "url": "https://www.htbridge.com/advisory/HTB23241", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129171/Joomla-Simple-Email-Form-1.8.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534017/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23241", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8541.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8541.json index bdcde06e76d..19295bc00c7 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8541.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8541.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8541", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T11:55:07.840", - "lastModified": "2023-11-07T02:22:37.153", + "lastModified": "2024-11-21T02:19:17.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -623,6 +622,22 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=5c378d6a6df8243f06c87962b873bd563e58cd39", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2944-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8542.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8542.json index b08bb2aa408..f4e5938bac4 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8542.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8542.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8542", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T11:55:07.887", - "lastModified": "2023-11-07T02:22:37.220", + "lastModified": "2024-11-21T02:19:17.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -134,6 +133,38 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=105654e376a736d243aef4a1d121abebce912e6b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2534-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8543.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8543.json index 9bc6470fed8..8769fa1efb2 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8543.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8543.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8543", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T11:55:07.937", - "lastModified": "2023-11-07T02:22:37.313", + "lastModified": "2024-11-21T02:19:18.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -626,6 +625,25 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=8b0e96e1f21b761ca15dbb470cd619a1ebf86c3e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2534-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8544.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8544.json index 53a01ff40d6..88442fef562 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8544.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8544.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8544", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T11:55:07.983", - "lastModified": "2023-11-07T02:22:37.400", + "lastModified": "2024-11-21T02:19:18.297", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -623,6 +622,22 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=e1c0cfaa419aa5d320540d5a1b3f8fd9b82ab7e5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2534-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8545.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8545.json index 9602280bf3c..2df4309e25d 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8545.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8545.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8545", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T11:55:08.030", - "lastModified": "2023-11-07T02:22:37.480", + "lastModified": "2024-11-21T02:19:18.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -604,6 +603,18 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=3e2b745020c2dbf0201fe7df3dad9e7e0b2e1bb6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8546.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8546.json index 47e695a164e..57ab8604f40 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8546.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8546.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8546", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T11:55:08.077", - "lastModified": "2023-11-07T02:22:37.570", + "lastModified": "2024-11-21T02:19:18.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -604,6 +603,18 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=e7e5114c506957f40aafd794e06de1a7e341e9d5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8547.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8547.json index bda94d8486c..b100a2e30af 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8547.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8547.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8547", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T11:55:08.123", - "lastModified": "2023-11-07T02:22:37.653", + "lastModified": "2024-11-21T02:19:18.780", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -623,6 +622,22 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=8f1457864be8fb9653643519dea1c6492f1dde57", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2534-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8548.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8548.json index 2afac015d22..eed887ce137 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8548.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8548.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8548", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T11:55:08.170", - "lastModified": "2023-11-07T02:22:37.737", + "lastModified": "2024-11-21T02:19:18.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -623,6 +622,22 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=c727401aa9d62335e89d118a5b4e202edf39d905", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2534-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8549.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8549.json index f5f513f033f..0ae47fed0f6 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8549.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8549.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8549", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T11:55:08.217", - "lastModified": "2023-11-07T02:22:37.820", + "lastModified": "2024-11-21T02:19:19.097", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -604,6 +603,18 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=550f3e9df3410b3dd975e590042c0d83e20a8da3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8551.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8551.json index f9f402c61fc..02b111bb4bb 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8551.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8551.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8551", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T11:59:00.093", - "lastModified": "2014-11-26T16:53:19.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:19.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -183,6 +182,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8552.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8552.json index c66f90c4ce3..cb5f20c038d 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8552.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8552.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8552", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T11:59:01.373", - "lastModified": "2014-11-26T16:54:50.050", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:19.387", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -183,6 +182,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8553.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8553.json index 275c1b27d0b..18c2ddd4680 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8553.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8553.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8553", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-17T19:59:06.417", - "lastModified": "2017-09-08T01:29:24.823", + "lastModified": "2024-11-21T02:19:19.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -107,6 +106,41 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171783", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/f779e3d4394a0638d822849863c4098421d911c5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17243", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8554.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8554.json index 0ba0f3d4de9..fd2fe0892f5 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8554.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8554.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8554", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-13T21:32:11.063", - "lastModified": "2021-01-12T18:05:59.507", + "lastModified": "2024-11-21T02:19:19.677", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -481,6 +480,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98457", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/487", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=16880", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=17812", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70856", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98457", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8555.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8555.json index 9cae2be7e8f..f0d91b949c5 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8555.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8555.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8555", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-12T16:55:07.060", - "lastModified": "2015-10-05T21:45:17.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:19.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ { "url": "https://www.xlabs.com.br/blog/?p=256", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129052/Progress-OpenEdge-11.2-Directory-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35127", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35207", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.xlabs.com.br/blog/?p=256", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8557.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8557.json index ca2d1d7aab1..24672bba174 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8557.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8557.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8557", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-13T21:32:12.487", - "lastModified": "2017-09-08T01:29:24.950", + "lastModified": "2024-11-21T02:19:19.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98532", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129009/JExperts-Tecnologia-Channel-Software-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70967", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98532", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8558.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8558.json index 372e93bbc1f..4cfe1eefa4f 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8558.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8558.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8558", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T15:59:06.013", - "lastModified": "2014-11-26T18:50:45.463", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:20.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129010/JExperts-Tecnologia-Channel-Software-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8559.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8559.json index 229cdb867ac..a42c0ccb674 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8559.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8559.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8559", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-10T11:55:09.813", - "lastModified": "2020-08-13T17:42:43.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:20.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -429,6 +428,251 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1976.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1978.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/30/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70854", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1034051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2492-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2493-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=946e51f2bf37f1656916eb75bd0742ba33983c28", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ca5358ef75fc69fee5322a38a340f5739d997c10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://lkml.org/lkml/2014/10/25/171", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://lkml.org/lkml/2014/10/25/179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://lkml.org/lkml/2014/10/25/180", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://lkml.org/lkml/2014/10/26/101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://lkml.org/lkml/2014/10/26/116", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://lkml.org/lkml/2014/10/26/128", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://lkml.org/lkml/2014/10/26/129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://support.f5.com/csp/article/K05211147", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8564.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8564.json index 8b372048075..45c2d15692a 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8564.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8564.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8564", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-13T21:32:13.427", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:20.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -632,6 +631,47 @@ "tags": [ "Issue Tracking" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00084.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1846.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59991", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62294", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161443", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8566.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8566.json index 7d56b488ccd..f57639b361b 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8566.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8566.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8566", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-15T21:59:06.897", - "lastModified": "2019-12-27T16:08:47.953", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:21.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1803.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1803.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/UNINETT/mod_auth_mellon/releases/tag/v0.8.1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://postlister.uninett.no/sympa/arc/modmellon/2014-11/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8567.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8567.json index 79fd39f0cc3..b7dc374db61 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8567.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8567.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8567", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-14T15:59:02.607", - "lastModified": "2019-07-09T12:29:11.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:21.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C", + "baseScore": 9.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -156,6 +155,50 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-1803.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1803.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62094", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62125", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/UNINETT/mod_auth_mellon/commit/0f5b4fd860fa7e3a6c47201637aab05395f32647", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://postlister.uninett.no/sympa/arc/modmellon/2014-11/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8577.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8577.json index 6f80da198ee..6f660483b12 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8577.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8577.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8577", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T14:55:11.783", - "lastModified": "2017-09-08T01:29:25.013", + "lastModified": "2024-11-21T02:19:21.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -77,8 +76,8 @@ "url": "http://blog.croogo.org/blog/croogo-210-released", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory", - "Patch" + "Patch", + "Vendor Advisory" ] }, { @@ -118,6 +117,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96991", "source": "cve@mitre.org" + }, + { + "url": "http://blog.croogo.org/blog/croogo-210-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128639/Croogo-2.0.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34959", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/113109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/113110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/113111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/113113", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zeroscience.mk/en/vulnerabilities/ZSL-2014-5201.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96991", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8578.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8578.json index 7a13d462dfd..9b136a21a18 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8578.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8578.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8578", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-31T15:55:04.337", - "lastModified": "2021-03-09T15:07:11.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:22.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -125,6 +124,30 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/07/08/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68456", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.launchpad.net/horizon/+bug/1320235", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8580.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8580.json index 8214eff9082..b6356afa864 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8580.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8580.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8580", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-07T19:55:04.697", - "lastModified": "2017-09-08T01:29:25.073", + "lastModified": "2024-11-21T02:19:22.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -206,6 +205,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98661", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62114", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX200254", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98661", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8582.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8582.json index 49d777f6d07..d5cf794529c 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8582.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8582.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8582", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-01T23:55:09.823", - "lastModified": "2017-09-08T01:29:25.153", + "lastModified": "2024-11-21T02:19:22.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -159,6 +158,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98384", "source": "cve@mitre.org" + }, + { + "url": "http://docs.fortinet.com/uploaded/files/2164/FortiADC-E-4.0.5-GA-Release-Notes.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61866", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-14-032/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98384", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8583.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8583.json index c26a23335a0..0ece65a8e02 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8583.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8583.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8583", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:08.543", - "lastModified": "2017-07-01T01:29:08.513", + "lastModified": "2024-11-21T02:19:22.653", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -116,6 +115,50 @@ { "url": "https://security.gentoo.org/glsa/201612-49", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0513.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://modwsgi.readthedocs.org/en/latest/release-notes/version-4.2.4.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/06/19/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/04/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2431-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1111034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-49", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8584.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8584.json index 1921ef02fe7..b97e87e121a 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8584.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8584.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8584", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:06.247", - "lastModified": "2014-12-11T13:46:34.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:22.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://wordpress.org/plugins/player/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8585.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8585.json index 752d38c8bde..7ea6fc95bb8 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8585.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8585.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8585", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:06.310", - "lastModified": "2020-05-05T12:21:05.580", + "lastModified": "2024-11-21T02:19:22.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -601,6 +600,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98318", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128852/WordPress-Download-Manager-Arbitrary-File-Download.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70764", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98318", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8586.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8586.json index f117d39db6a..f432b2ec8ff 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8586.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8586.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8586", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:06.357", - "lastModified": "2017-09-08T01:29:25.263", + "lastModified": "2024-11-21T02:19:23.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97766", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/113670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128814/WordPress-CP-Multi-View-Event-Calendar-1.01-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70718", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97766", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8587.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8587.json index 4c1986c4246..c7c868d752a 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8587.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8587.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8587", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:07.310", - "lastModified": "2023-10-03T15:48:10.677", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:23.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -128,6 +127,34 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/57606", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://service.sap.com/sap/support/notes/2067859", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "https://twitter.com/SAP_Gsupport/status/522401681997570048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8588.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8588.json index b032f50a720..7eb16230703 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8588.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8588.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8588", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:07.637", - "lastModified": "2018-12-10T19:29:04.607", + "lastModified": "2024-11-21T02:19:23.450", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://service.sap.com/sap/support/notes/2067972", "source": "cve@mitre.org" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/2067972", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8589.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8589.json index d814076db5f..c2869f5aeb7 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8589.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8589.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8589", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:07.683", - "lastModified": "2018-12-10T19:29:04.810", + "lastModified": "2024-11-21T02:19:23.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://twitter.com/SAP_Gsupport/status/522779507372339200", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-014-saprouter-integer-overflow-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/2037492", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://twitter.com/SAP_Gsupport/status/522779507372339200", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8590.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8590.json index 24c6fe9274b..0e81b1efba3 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8590.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8590.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8590", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:07.730", - "lastModified": "2018-12-10T19:29:05.013", + "lastModified": "2024-11-21T02:19:23.730", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +94,31 @@ { "url": "https://service.sap.com/sap/support/notes/2045176", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71023", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-015-sap-netweaver-as-java-xxe/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/2045176", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8591.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8591.json index 861eee4da9d..84672ffd5f1 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8591.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8591.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8591", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:07.777", - "lastModified": "2018-12-10T19:29:05.280", + "lastModified": "2024-11-21T02:19:23.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -107,6 +106,37 @@ { "url": "https://twitter.com/SAP_Gsupport/status/524138333065449472", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71030", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-016-sap-netweaver-httpd-partial-http-post-requests-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98582", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1966655", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://twitter.com/SAP_Gsupport/status/524138333065449472", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8592.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8592.json index fdd26209464..6a65aa0b6ad 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8592.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8592.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8592", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:07.827", - "lastModified": "2018-12-10T19:29:05.640", + "lastModified": "2024-11-21T02:19:24.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -112,6 +111,42 @@ { "url": "https://twitter.com/SAP_Gsupport/status/523111735637864448", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1986725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://twitter.com/SAP_Gsupport/status/523111735637864448", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8593.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8593.json index 099263f0edc..4abfe38e2fe 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8593.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8593.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8593", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T16:55:06.527", - "lastModified": "2017-09-08T01:29:25.480", + "lastModified": "2024-11-21T02:19:24.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96841", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128565/Allomani-Weblinks-1.0-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70255", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96841", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8594.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8594.json index 6168820f695..d7d638d3671 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8594.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8594.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8594", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T18:59:10.533", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:19:24.313", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 5.4, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -239,6 +238,54 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62672", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71149", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-109.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98767", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8595.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8595.json index fd726662bee..c7ebd0efdba 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8595.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8595.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8595", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T18:59:11.707", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:19:24.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -308,6 +307,63 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62537", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62672", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX200288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX201794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71151", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98768", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8596.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8596.json index e46bf215a70..f5f1f6a3ded 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8596.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8596.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8596", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-17T16:59:06.370", - "lastModified": "2017-10-03T01:29:00.450", + "lastModified": "2024-11-21T02:19:24.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -112,6 +111,47 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/112419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129053/PHP-Fusion-7.02.07-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/133869/PHP-Fusion-7.02.07-Blind-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Oct/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35206", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71053", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.xlabs.com.br/blog/?p=282", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8598.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8598.json index 2429b07115a..132c38728ba 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8598.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8598.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8598", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-18T15:59:06.750", - "lastModified": "2017-09-08T01:29:25.730", + "lastModified": "2024-11-21T02:19:24.947", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -106,6 +105,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=17780", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/07/28", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98573", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/80a15487", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8600.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8600.json index f9cc5237b17..2d288de6b1a 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8600.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8600.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8600", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T11:59:09.233", - "lastModified": "2018-10-30T16:27:34.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:25.093", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -139,6 +138,36 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/54", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-2414-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71190", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8600/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8601.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8601.json index c3045a14420..5af3eea32e3 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8601.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8601.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8601", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T15:59:17.410", - "lastModified": "2016-09-06T14:30:17.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:25.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -132,6 +131,51 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://doc.powerdns.com/md/security/powerdns-advisory-2014-02/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3096", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/264212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031310", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8602.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8602.json index 1af7ea3198b..f66047db312 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8602.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8602.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8602", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-11T02:59:03.233", - "lastModified": "2016-11-28T19:13:26.333", + "lastModified": "2024-11-21T02:19:25.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -159,6 +158,58 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://unbound.net/downloads/patch_cve_2014_8602.diff", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/264212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71589", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2484-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://unbound.net/downloads/CVE-2014-8602.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8608.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8608.json index 786b99084c3..2f1d69783dc 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8608.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8608.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8608", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T15:59:12.883", - "lastModified": "2016-12-16T02:59:03.367", + "lastModified": "2024-11-21T02:19:26.267", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -98,6 +96,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129470/K7-Computing-Multiple-Products-Null-Pointer-Dereference.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/45", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8608/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8609.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8609.json index 115f1802485..f54eb7dcdb3 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8609.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8609.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8609", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:18.067", - "lastModified": "2014-12-16T18:15:13.620", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:26.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -180,6 +179,34 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129281/Android-Settings-Pendingintent-Leak.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/81", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://xteam.baidu.com/?p=158", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/f5d3e74ecc2b973941d8adbe40c6b23094b5abb7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8610.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8610.json index f297988564e..8e8a9d0119b 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8610.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8610.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8610", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-15T18:59:19.037", - "lastModified": "2014-12-16T20:06:17.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:26.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -331,6 +330,45 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129282/Android-SMS-Resend.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/85", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xteam.baidu.com/?p=164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://android.googlesource.com/platform/packages/apps/Mms/+/008d6202fca4002a7dfe333f22377faa73585c67", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/joswr1ght/drozer-modules/blob/master/whfs/smsdraftsend.py", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8612.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8612.json index 6099c0a113b..ee15690185e 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8612.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8612.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8612", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T16:59:01.397", - "lastModified": "2018-10-09T19:54:22.667", + "lastModified": "2024-11-21T02:19:26.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -122,6 +121,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/107", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.coresecurity.com/advisories/freebsd-kernel-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534563/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72342", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031648", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15:02.kmem.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8613.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8613.json index 7013edc1e7b..b895b914edf 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8613.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8613.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8613", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T16:59:02.600", - "lastModified": "2015-02-04T05:09:45.440", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", + "lastModified": "2024-11-21T02:19:27.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +95,22 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72345", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031649", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15:03.sctp.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8616.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8616.json index 333721f3ef0..ec311f27359 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8616.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8616.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8616", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:00.097", - "lastModified": "2017-01-03T02:59:20.347", + "lastModified": "2024-11-21T02:19:27.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,29 @@ { "url": "http://www.securitytracker.com/id/1032265", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-005/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032262", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032265", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8617.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8617.json index 992c5c3c51b..6f1e3a89bc8 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8617.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8617.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8617", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-04T19:59:00.047", - "lastModified": "2015-11-19T17:43:09.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:27.433", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -170,6 +169,24 @@ { "url": "http://www.securitytracker.com/id/1031859", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-005/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031859", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8618.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8618.json index f4857c37320..5d1dcee3c8b 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8618.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8618.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8618", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:01.377", - "lastModified": "2017-01-03T02:59:20.407", + "lastModified": "2024-11-21T02:19:27.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -115,6 +114,17 @@ { "url": "http://www.securitytracker.com/id/1032265", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-005/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032265", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8619.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8619.json index 6933e2c9993..0e06f4de06d 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8619.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8619.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8619", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:02.643", - "lastModified": "2017-01-03T02:59:20.457", + "lastModified": "2024-11-21T02:19:27.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -142,6 +141,17 @@ { "url": "http://www.securitytracker.com/id/1032307", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-005/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032307", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8622.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8622.json index a74152388d7..cc9ce9bda32 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8622.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8622.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8622", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-05T23:55:02.037", - "lastModified": "2014-11-06T19:09:38.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:28.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -92,6 +91,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://downloads.wordpress.org/plugin/compfight.1.5.zip", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127430/WordPress-Compfight-1.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/compfight/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8625.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8625.json index b70d3a6e492..6b4375a1348 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8625.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8625.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8625", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-20T15:59:01.437", - "lastModified": "2017-09-08T01:29:25.793", + "lastModified": "2024-11-21T02:19:28.163", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -109,6 +108,43 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98551", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/539", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/551", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98551", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8626.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8626.json index 56659fe88ba..de36bb85b26 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8626.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8626.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8626", "sourceIdentifier": "secalert@redhat.com", "published": "2014-11-23T02:59:00.087", - "lastModified": "2023-11-07T02:22:39.440", + "lastModified": "2024-11-21T02:19:28.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -137,6 +136,41 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155607", "source": "secalert@redhat.com" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c818d0d01341907fee82bdb81cab07b7d93bb9db", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/06/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1824.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1825.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=45226", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155607", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8627.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8627.json index 910a7b60037..f91ca1bba5e 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8627.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8627.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8627", "sourceIdentifier": "security@opentext.com", "published": "2014-11-24T15:59:11.060", - "lastModified": "2023-11-07T02:22:39.503", + "lastModified": "2024-11-21T02:19:28.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "https://polarssl.org/tech-updates/releases/polarssl-1.3.9-released", "source": "security@opentext.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61220", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://polarssl.org/tech-updates/releases/polarssl-1.3.9-released", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8629.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8629.json index a6caf3141cb..af4838a1c0e 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8629.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8629.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8629", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-19T15:59:01.570", - "lastModified": "2017-09-08T01:29:25.840", + "lastModified": "2024-11-21T02:19:28.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98704", "source": "cve@mitre.org" + }, + { + "url": "http://blog.pandorafms.org/?p=3271", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129112/Pandora-FMS-5.1SP1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/35", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98704", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8630.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8630.json index 97f894b22fd..896b617262d 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8630.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8630.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8630", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-01T15:59:04.353", - "lastModified": "2017-01-03T02:59:20.563", + "lastModified": "2024-11-21T02:19:28.833", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -305,8 +304,8 @@ "url": "http://www.bugzilla.org/security/4.0.15/", "source": "security@mozilla.org", "tags": [ - "Patch", "Issue Tracking", + "Patch", "Vendor Advisory" ] }, @@ -325,6 +324,49 @@ { "url": "https://security.gentoo.org/glsa/201607-11", "source": "security@mozilla.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.bugzilla.org/security/4.0.15/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201607-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8631.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8631.json index 8e3815ad6cc..07e21413fab 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8631.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8631.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8631", "sourceIdentifier": "security@mozilla.org", "published": "2014-12-11T11:59:12.960", - "lastModified": "2016-12-22T02:59:19.737", + "lastModified": "2024-11-21T02:19:28.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,25 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-91.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=821573", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8632.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8632.json index fab0697ac1b..8f61852d0fd 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8632.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8632.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8632", "sourceIdentifier": "security@mozilla.org", "published": "2014-12-11T11:59:13.837", - "lastModified": "2016-12-22T02:59:19.783", + "lastModified": "2024-11-21T02:19:29.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,25 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2014-91.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1050340", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8634.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8634.json index 49972479541..8121fda6a8c 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8634.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8634.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8634", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:03.397", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T02:19:29.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -302,6 +301,169 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62259", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62273", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62315", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62657", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3132", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2015-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031534", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2460-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1109889", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1111737", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8635.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8635.json index 91a501b5de8..8455a6395df 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8635.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8635.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8635", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:04.680", - "lastModified": "2017-01-03T02:59:20.860", + "lastModified": "2024-11-21T02:19:29.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -195,6 +194,113 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62657", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2015-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031534", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1026774", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1027300", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1054538", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1067473", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1070962", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072130", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072871", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1098583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8636.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8636.json index 2025c048eb3..6d3773bca6d 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8636.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8636.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8636", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:05.570", - "lastModified": "2017-09-08T01:29:25.997", + "lastModified": "2024-11-21T02:19:29.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -167,6 +166,85 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130972/Firefox-Proxy-Prototype-Privileged-Javascript-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2015-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=987794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8637.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8637.json index 43531c1e7a0..df051d20e62 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8637.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8637.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8637", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:06.383", - "lastModified": "2017-09-08T01:29:26.060", + "lastModified": "2024-11-21T02:19:29.670", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -167,6 +166,85 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2015-02.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1094536", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8638.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8638.json index b8dea3469ac..5d6a41296d9 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8638.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8638.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8638", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:07.163", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T02:19:29.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -298,6 +297,165 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62259", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62273", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62315", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62657", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3132", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2015-03.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031534", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2460-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1080987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99958", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8639.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8639.json index b63daafbfdb..c7388887f45 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8639.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8639.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8639", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:07.930", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T02:19:29.973", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-384: Session Fixation", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -299,6 +297,166 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62259", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62273", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62315", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62657", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3132", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2015-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72046", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031534", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2460-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1095859", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99959", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-384: Session Fixation" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8640.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8640.json index 8e3dedfc33e..a39fc2141a3 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8640.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8640.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8640", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:08.697", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:19:30.133", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -175,6 +174,73 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2015-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1100409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99960", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8641.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8641.json index 33d30eaa5f4..a42c85f4b41 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8641.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8641.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8641", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:09.727", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T02:19:30.280", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -231,6 +229,114 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62273", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62293", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2015-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1108455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8642.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8642.json index 8f3a8bef6b2..a93b41a0d47 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8642.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8642.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8642", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:10.633", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:19:30.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -175,6 +174,73 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2015-08.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72042", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079658", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99963", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8643.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8643.json index 737661a659d..570e78468e0 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8643.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8643.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8643", "sourceIdentifier": "security@mozilla.org", "published": "2015-01-14T11:59:11.647", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:19:30.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 7.1 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -147,6 +146,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99962", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2014/mfsa2015-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72043", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1117140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99962", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8651.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8651.json index 522688f7c38..d029b23084c 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8651.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8651.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8651", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-06T21:59:00.077", - "lastModified": "2016-12-07T03:01:20.377", + "lastModified": "2024-11-21T02:19:30.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -127,6 +126,45 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143781.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144034.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/04/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70904", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2402-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.kde.org/info/security/advisory-20141106-1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8652.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8652.json index 7533bda71ff..007c4c54196 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8652.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8652.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8652", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-10T11:55:09.970", - "lastModified": "2014-11-14T13:44:20.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:31.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "http://seclists.org/fulldisclosure/2014/Jul/69", "source": "cve@mitre.org" + }, + { + "url": "http://firebitsbr.wordpress.com/2014/07/16/vsla-security-advisory-fire-scada-dos-2013-001-http-dos-requests-flooding-crash-device-vulnerabilities-elipse-e3-scada-plc/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/69", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8653.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8653.json index 5332b8cd3d5..f90ecce2c29 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8653.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8653.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8653", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:10.757", - "lastModified": "2017-09-08T01:29:26.573", + "lastModified": "2024-11-21T02:19:31.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98328", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/113839", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70762", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98328", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8654.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8654.json index 997a0d5ee25..47d71853a4a 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8654.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8654.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8654", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:10.803", - "lastModified": "2017-09-08T01:29:26.637", + "lastModified": "2024-11-21T02:19:31.337", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -133,6 +132,51 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98329", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/113840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/113841", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/113842", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/113843", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70762", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98329", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8655.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8655.json index fd366159a44..0c637bed286 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8655.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8655.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8655", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:10.850", - "lastModified": "2017-09-08T01:29:26.700", + "lastModified": "2024-11-21T02:19:31.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -114,6 +113,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98331", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/113837", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70762", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98331", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8656.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8656.json index e9448fdde89..537f5520926 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8656.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8656.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8656", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:10.913", - "lastModified": "2014-11-06T19:20:36.130", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:31.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -113,6 +112,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/113836", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8657.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8657.json index 118f7724fbc..b508089629a 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8657.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8657.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8657", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:10.960", - "lastModified": "2017-09-08T01:29:26.763", + "lastModified": "2024-11-21T02:19:31.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -117,6 +116,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98330", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/113838", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98330", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8658.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8658.json index 0c2a9e16275..8b1ff643ca7 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8658.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8658.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8658", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:11.350", - "lastModified": "2018-10-09T19:54:25.150", + "lastModified": "2024-11-21T02:19:31.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -233,6 +232,43 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://demo.refinedwiki.com/display/rwot/Version+4.0.12", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/128907/Confluence-RefinedWiki-Original-Theme-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533845/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70798", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98401", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141029-1_RefinedWiki-OriginalTheme_Persistent-Cross-Site-Scripting_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8659.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8659.json index 3abd3147258..956c2e45508 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8659.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8659.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8659", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.240", - "lastModified": "2018-12-10T19:29:06.157", + "lastModified": "2024-11-21T02:19:32.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0002052082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8660.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8660.json index fa5e5b9dba7..86898cd5758 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8660.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8660.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8660", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.287", - "lastModified": "2018-12-10T19:29:06.250", + "lastModified": "2024-11-21T02:19:32.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -83,6 +82,18 @@ { "url": "https://service.sap.com/sap/support/notes/1906212", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1906212", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8661.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8661.json index 29c9fe45029..f57dd00b398 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8661.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8661.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8661", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.337", - "lastModified": "2014-11-07T03:04:02.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:32.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "http://service.sap.com/sap/support/notes/0002043404", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0002043404", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8662.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8662.json index 87a98af8176..687e36bc9ba 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8662.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8662.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8662", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.383", - "lastModified": "2014-11-07T03:09:39.500", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:32.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "http://service.sap.com/sap/support/notes/0002076845", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0002076845", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8663.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8663.json index a9ccce40191..356bacc850d 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8663.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8663.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8663", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.430", - "lastModified": "2014-11-07T03:17:19.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:32.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "http://service.sap.com/sap/support/notes/0001965819", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0001965819", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8664.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8664.json index 175ec87c066..938c56500b6 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8664.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8664.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8664", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.477", - "lastModified": "2017-09-08T01:29:26.887", + "lastModified": "2024-11-21T02:19:32.857", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98611", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0001810405", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71025", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98611", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8665.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8665.json index 2c10ace01d4..2471c36cf4c 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8665.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8665.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8665", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.523", - "lastModified": "2014-11-07T03:31:47.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:33.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "http://service.sap.com/sap/support/notes/0002018682", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0002018682", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8666.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8666.json index 4a5e6bf8dfe..518309182c1 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8666.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8666.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8666", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.570", - "lastModified": "2014-11-07T03:36:48.870", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:33.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "http://service.sap.com/sap/support/notes/0002011395", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0002011395", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8667.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8667.json index 8134a763c78..2e36e3b2540 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8667.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8667.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8667", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.617", - "lastModified": "2014-11-07T03:39:49.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:33.287", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://service.sap.com/sap/support/notes/0002069676", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0002069676", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8668.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8668.json index 3605497f21c..763fe6697d3 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8668.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8668.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8668", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.663", - "lastModified": "2017-09-08T01:29:26.950", + "lastModified": "2024-11-21T02:19:33.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98612", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0002022179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98612", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8669.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8669.json index 7c0eeb15139..5816d114b4c 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8669.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8669.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8669", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.710", - "lastModified": "2014-11-07T03:45:21.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:33.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "http://service.sap.com/sap/support/notes/0001872638", "source": "cve@mitre.org" + }, + { + "url": "http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0001835691", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.sap.com/sap/support/notes/0001872638", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8670.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8670.json index 2a24d0187fa..c952d7439dc 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8670.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8670.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8670", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-06T15:55:14.773", - "lastModified": "2017-09-08T01:29:27.013", + "lastModified": "2024-11-21T02:19:33.723", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": " CWE-601: URL Redirection to Untrusted Site ('Open Redirect') ", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +85,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98476", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128958/vBulletin-4.2.1-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70906", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98476", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": " CWE-601: URL Redirection to Untrusted Site ('Open Redirect') " } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8671.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8671.json index 540a2875435..c5c307fa52b 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8671.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8671.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8671", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-07T11:55:03.953", - "lastModified": "2015-10-28T17:56:12.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:33.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://arxiv.org/abs/1410.7756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://arxiv.org/pdf/1410.7756v1.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8672.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8672.json index 4e70bee4b7b..2cf8be37594 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8672.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8672.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8672", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-07T11:55:04.000", - "lastModified": "2015-05-12T17:30:03.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:33.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://arxiv.org/abs/1410.7756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://arxiv.org/pdf/1410.7756v1.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8678.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8678.json index cd1ef19d1ad..1eecab972d0 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8678.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8678.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8678", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T15:59:07.137", - "lastModified": "2015-02-17T15:22:44.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:34.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -76,6 +75,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-386/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-386/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8680.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8680.json index 97fbcedd24f..cea1d29545d 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8680.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8680.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8680", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-11T02:59:05.530", - "lastModified": "2019-07-30T18:15:12.350", + "lastModified": "2024-11-21T02:19:34.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 5.4, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -98,6 +97,24 @@ { "url": "https://security.netapp.com/advisory/ntap-20190730-0002/", "source": "cve@mitre.org" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kb.isc.org/article/AA-01217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20190730-0002/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8681.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8681.json index faced3d4d44..7443fba87e8 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8681.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8681.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8681", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T15:59:08.133", - "lastModified": "2017-09-08T01:29:27.073", + "lastModified": "2024-11-21T02:19:35.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -133,6 +132,42 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://gogs.io/docs/intro/change_log.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/31", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35237", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98695", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8682.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8682.json index db3a0560a10..09ebdf21237 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8682.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8682.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8682", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T15:59:09.773", - "lastModified": "2018-10-09T19:54:28.557", + "lastModified": "2024-11-21T02:19:35.277", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -144,6 +143,53 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://gogs.io/docs/intro/change_log.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129117/Gogs-Repository-Search-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/33", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533995/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71187", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98694", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/gogits/gogs/commit/0c5ba4573aecc9eaed669e9431a70a5d9f184b8d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8683.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8683.json index 5b3da3b3761..c49fbbbfaff 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8683.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8683.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8683", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-21T15:59:10.853", - "lastModified": "2018-10-09T19:54:29.183", + "lastModified": "2024-11-21T02:19:35.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98693", "source": "cve@mitre.org" + }, + { + "url": "http://gogs.io/docs/intro/change_log.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/34", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533996/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98693", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-86xx/CVE-2014-8690.json b/CVE-2014/CVE-2014-86xx/CVE-2014-8690.json index 279e36b7a1a..691d53c639e 100644 --- a/CVE-2014/CVE-2014-86xx/CVE-2014-8690.json +++ b/CVE-2014/CVE-2014-86xx/CVE-2014-8690.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8690", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:06.580", - "lastModified": "2017-09-08T01:29:27.263", + "lastModified": "2024-11-21T02:19:36.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -144,6 +143,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100877", "source": "cve@mitre.org" + }, + { + "url": "http://exponentcms.lighthouseapp.com/projects/61783/tickets/1230-universal-cross-site-scripting-in-exponent-cms-231-and-prior", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/118263", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/118345", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130382/Exponent-CMS-2.3.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36059", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exponentcms.org/news/show/title/corrected-security-patches-released-for-v2-1-4-v2-2-3-and-v2-3-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031775", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100877", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8709.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8709.json index 9aee8d92a52..f9b79fc2808 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8709.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8709.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8709", "sourceIdentifier": "security@opentext.com", "published": "2014-11-10T11:55:10.017", - "lastModified": "2023-11-07T02:22:42.030", + "lastModified": "2024-11-21T02:19:37.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -144,6 +143,58 @@ { "url": "https://source.android.com/security/bulletin/2017-03-01.html", "source": "security@opentext.com" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=338f977f4eb441e69bb9a46eaa0ac715c931a67f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0290.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1272.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/09/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1037968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/338f977f4eb441e69bb9a46eaa0ac715c931a67f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://source.android.com/security/bulletin/2017-03-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8710.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8710.json index a64a0ad7e46..dc7fb6583b0 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8710.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8710.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8710", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-23T02:59:01.460", - "lastModified": "2023-11-07T02:22:42.290", + "lastModified": "2024-11-21T02:19:37.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -182,6 +181,57 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2bd15c7cefcf87aa6b2d9d53477f0ece897ba620", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60290", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-20.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10662", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2bd15c7cefcf87aa6b2d9d53477f0ece897ba620", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8711.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8711.json index d605ff56906..30d4974c1f4 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8711.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8711.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8711", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-23T02:59:02.807", - "lastModified": "2023-11-07T02:22:42.463", + "lastModified": "2024-11-21T02:19:37.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -186,6 +185,61 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8f62bb7cce5a82baa543b14800fd7c12548b497a", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60290", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10582", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8def8ef9c40189472a46d9b1ad95289780e09af5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8f62bb7cce5a82baa543b14800fd7c12548b497a", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8712.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8712.json index 77f02dcfc92..ddb4f6eb72b 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8712.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8712.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8712", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-23T02:59:03.993", - "lastModified": "2023-11-07T02:22:42.527", + "lastModified": "2024-11-21T02:19:37.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -182,6 +181,57 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=41f6923b3049dfb57bef544a4c580f256f807e85", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60290", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71071", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-22.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10628", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=41f6923b3049dfb57bef544a4c580f256f807e85", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8713.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8713.json index c8b2613c6c5..b1fa19061b8 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8713.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8713.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8713", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-23T02:59:05.007", - "lastModified": "2023-11-07T02:22:42.597", + "lastModified": "2024-11-21T02:19:38.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -186,6 +185,61 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b9988e2bbfc7c6c41ef82c559bd11a8c19170491", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60290", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71073", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-22.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b9988e2bbfc7c6c41ef82c559bd11a8c19170491", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8714.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8714.json index 0983aaa41b4..7664dcfde94 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8714.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8714.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8714", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-23T02:59:05.900", - "lastModified": "2023-11-07T02:22:42.673", + "lastModified": "2024-11-21T02:19:38.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -190,6 +189,65 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bc2726578156f3608960fc65ce1f691639e6addc", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145658.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60290", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71072", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2014-23.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10596", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1463db37d9bbc9cd532afdf2817caaf8eb367831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bc2726578156f3608960fc65ce1f691639e6addc", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8724.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8724.json index 4f5e974cdde..c1775407be5 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8724.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8724.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8724", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:11.173", - "lastModified": "2023-05-26T17:46:26.677", + "lastModified": "2024-11-21T02:19:38.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129626/W3-Total-Cache-0.9.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534266/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/w3-total-cache/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.secuvera.de/advisories/secuvera-SA-2014-01.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8727.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8727.json index a29ce3570a4..239db8d5a83 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8727.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8727.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8727", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-17T16:59:07.433", - "lastModified": "2017-09-08T01:29:27.387", + "lastModified": "2024-11-21T02:19:39.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:N/I:C/A:C", + "baseScore": 6.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -109,6 +108,43 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129084/F5-BIG-IP-10.1.0-Directory-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35222", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/product/relnote_11_0_0_ltm.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13109.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8728.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8728.json index bdaeadd2e59..212977fa275 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8728.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8728.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8728", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:00.087", - "lastModified": "2014-12-05T15:50:42.553", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:39.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/35214", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8730.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8730.json index a7f8942d489..915e7d88db4 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8730.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8730.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8730", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T00:59:01.293", - "lastModified": "2017-01-03T02:59:21.893", + "lastModified": "2024-11-21T02:19:39.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -938,6 +937,68 @@ { "url": "https://www.imperialviolet.org/2014/12/08/poodleagain.html", "source": "cve@mitre.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144372772101168&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62167", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62224", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62388", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693271", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693337", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693495", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/09/27", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://devcentral.f5.com/articles/cve-2014-8730-padding-issue-8151", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.lenovo.com/product_security/poodle", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.lenovo.com/us/en/product_security/poodle", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.imperialviolet.org/2014/12/08/poodleagain.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8732.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8732.json index a38d4cc149f..2e406815541 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8732.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8732.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8732", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-17T16:59:08.573", - "lastModified": "2018-10-09T19:54:40.043", + "lastModified": "2024-11-21T02:19:39.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98639", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129090/PHPMemcachedAdmin-1.2.2-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533969/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533981/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98639", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8733.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8733.json index 2a2d362889c..d6c676b1833 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8733.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8733.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8733", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T19:59:00.053", - "lastModified": "2015-02-11T17:20:03.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:39.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -88,6 +87,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cloudera.com/content/cloudera/en/documentation/security-bulletins/Security-Bulletin/csb_topic_2.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8734.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8734.json index 462a19812ef..2f596a2e4c1 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8734.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8734.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8734", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-12T16:55:07.793", - "lastModified": "2017-09-08T01:29:27.573", + "lastModified": "2024-11-21T02:19:39.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -101,6 +100,25 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2365259", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2365685", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8735.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8735.json index ce2faca2d1f..dc54741ef59 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8735.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8735.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8735", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-12T16:55:07.857", - "lastModified": "2019-07-16T12:21:21.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:40.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -320,6 +319,30 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2360953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2360955", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2361611", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8736.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8736.json index ac24971750a..b64b8ea842b 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8736.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8736.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8736", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-12T16:55:07.903", - "lastModified": "2014-11-13T14:24:03.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:40.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2357279", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2357295", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8737.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8737.json index 04a40de2993..169e33aef4c 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8737.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8737.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8737", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:07.097", - "lastModified": "2023-11-07T02:22:42.837", + "lastModified": "2024-11-21T02:19:40.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -249,6 +248,128 @@ { "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=dd9b91de2149ee81d47f708e7b0bbf57da10ad42", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145256.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145352.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145746.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147346.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147354.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148427.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148438.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/13/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70908", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2496-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162655", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-24", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17533", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17552", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=dd9b91de2149ee81d47f708e7b0bbf57da10ad42", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8738.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8738.json index 5151b7454cb..06005d358ae 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8738.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8738.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8738", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:14.297", - "lastModified": "2023-11-07T02:22:42.920", + "lastModified": "2024-11-21T02:19:40.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -243,6 +242,112 @@ { "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bb0d867169d7e9743d229804106a8fbcab7f3b3f", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147346.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147354.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148427.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148438.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3123", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/05/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/13/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2496-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-24", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17533", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bb0d867169d7e9743d229804106a8fbcab7f3b3f", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8743.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8743.json index acc91784c2c..517c539ea6f 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8743.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8743.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8743", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T18:55:02.743", - "lastModified": "2017-09-08T01:29:27.637", + "lastModified": "2024-11-21T02:19:41.167", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -137,6 +136,32 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/56790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/65677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/2200453", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2013653", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8744.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8744.json index f2222750522..f86c6411a09 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8744.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8744.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8744", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T18:55:02.790", - "lastModified": "2017-09-08T01:29:27.683", + "lastModified": "2024-11-21T02:19:41.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -147,6 +146,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/57459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/66327", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2220545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2221481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8745.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8745.json index 28d983bf7cc..c060349bcca 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8745.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8745.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8745", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T18:55:02.853", - "lastModified": "2017-09-08T01:29:27.747", + "lastModified": "2024-11-21T02:19:41.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -236,6 +235,36 @@ "tags": [ "Patch" ] + }, + { + "url": "http://drupal.org/node/2248077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/58209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92754", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2247919", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2247921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8746.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8746.json index d9ecfef791f..58b1ae91ce9 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8746.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8746.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8746", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T18:55:02.900", - "lastModified": "2017-09-08T01:29:27.793", + "lastModified": "2024-11-21T02:19:41.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -98,6 +97,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/57831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92529", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2236259", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2236821", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8747.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8747.json index f369ff414fe..4535e26b46e 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8747.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8747.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8747", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T18:55:03.057", - "lastModified": "2017-09-08T01:29:27.857", + "lastModified": "2024-11-21T02:19:41.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -151,6 +150,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/103288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/56861", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/65524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91151", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2194777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2194877", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8748.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8748.json index af8356fdbda..138d944e019 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8748.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8748.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8748", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-13T18:55:03.103", - "lastModified": "2014-10-16T02:24:11.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:41.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -98,6 +97,28 @@ "tags": [ "Patch" ] + }, + { + "url": "http://osvdb.org/102354", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/56521", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/2179085", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2172167", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8749.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8749.json index d67fdabf521..cf93dbad0cc 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8749.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8749.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8749", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T15:59:07.877", - "lastModified": "2014-12-01T18:31:22.373", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)", + "lastModified": "2024-11-21T02:19:42.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -85,6 +83,19 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/bulletproof-security/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8750.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8750.json index f4a1ef54b56..89f1ec4ffa2 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8750.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8750.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8750", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-15T14:55:09.637", - "lastModified": "2018-11-16T15:06:16.980", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:42.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -146,6 +145,64 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2014-October/000293.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1689.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1781.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1782.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/14/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/70182", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.launchpad.net/nova/+bug/1357372", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8751.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8751.json index 40bf85df98b..f20e0a942ca 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8751.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8751.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8751", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:09.530", - "lastModified": "2014-12-17T19:42:03.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:42.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://seclists.org/fulldisclosure/2014/Dec/34", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129443/goYWP-WebPress-13.00.06-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/34", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8752.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8752.json index 99149f12304..51169e3687b 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8752.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8752.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8752", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:00.060", - "lastModified": "2015-01-03T01:31:30.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:42.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "http://www.securityfocus.com/bid/71738", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/84", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-8752-jce-tech-video-niche-script-xss-cross-site-scripting-security-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71738", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8754.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8754.json index 4ea05e97ab9..a997d2b34f3 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8754.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8754.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8754", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:01.383", - "lastModified": "2017-09-08T01:29:27.903", + "lastModified": "2024-11-21T02:19:42.743", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +86,23 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98990", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129290/WordPress-Ad-Manager-1.1.2-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/93", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-8754-wordpress-ad-manager-plugin-dest-redirect-privilege-escalation/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98990", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8755.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8755.json index 5a6e955cacf..4488b459afb 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8755.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8755.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8755", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-17T15:55:08.430", - "lastModified": "2014-12-16T20:07:25.397", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:42.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-364/", "source": "cve@mitre.org" + }, + { + "url": "http://security.panasonic.com/pss/security/library/howto_update_NCV.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-364/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8756.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8756.json index 1673e8a4297..7e0e76462ff 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8756.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8756.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8756", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-17T15:55:08.963", - "lastModified": "2021-11-09T19:59:00.140", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:43.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://panasonic.net/pcc/cgi-bin/products/netwkcam/download_us/tbookmarka_m.cgi?m=%20&mm=2010073014092324", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Patch" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-363/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8757.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8757.json index 5c578ec2c10..e4e980b99e9 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8757.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8757.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8757", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-17T15:59:00.047", - "lastModified": "2018-10-09T19:54:43.527", + "lastModified": "2024-11-21T02:19:43.177", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -102,6 +101,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100733", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130286/LG-On-Screen-Phone-Authentication-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/26", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534643/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72544", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100733", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8760.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8760.json index d409ec49877..bc97883bc0b 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8760.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8760.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8760", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-25T00:55:05.210", - "lastModified": "2015-09-10T15:56:32.570", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:43.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -113,6 +112,47 @@ "tags": [ "Patch" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0417.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://mail.jabber.org/pipermail/operators/2014-October/002438.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:207", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:175", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70415", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1153839", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/processone/ejabberd/commit/7bdc1151b", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8761.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8761.json index 530bd3c70a8..e3e474a3c73 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8761.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8761.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8761", "sourceIdentifier": "secalert@redhat.com", "published": "2014-10-22T14:55:08.247", - "lastModified": "2015-09-10T15:56:52.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:43.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -100,6 +99,34 @@ { "url": "https://github.com/splitbrain/dokuwiki/issues/765", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0438.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3059", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/16/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.dokuwiki.org/index.php?do=details&task_id=2647#comment6204", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/splitbrain/dokuwiki/issues/765", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8762.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8762.json index a359562445d..0fe1d807507 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8762.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8762.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8762", "sourceIdentifier": "secalert@redhat.com", "published": "2014-10-22T14:55:08.293", - "lastModified": "2016-04-04T13:15:16.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:43.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -100,6 +99,34 @@ { "url": "https://github.com/splitbrain/dokuwiki/issues/765", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0438.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3059", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/16/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/splitbrain/dokuwiki/issues/765", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8763.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8763.json index ab0068fe0ed..9f7354bc02a 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8763.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8763.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8763", "sourceIdentifier": "secalert@redhat.com", "published": "2014-10-22T14:55:08.373", - "lastModified": "2016-07-15T15:19:32.613", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:43.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -120,6 +119,34 @@ { "url": "https://github.com/splitbrain/dokuwiki/pull/868", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0438.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3059", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freelists.org/post/dokuwiki/Fwd-Dokuwiki-maybe-security-issue-Null-byte-poisoning-in-LDAP-authentication", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/16/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/splitbrain/dokuwiki/pull/868", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8764.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8764.json index 6d1f4fbeadc..1fd627ce320 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8764.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8764.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8764", "sourceIdentifier": "secalert@redhat.com", "published": "2014-10-22T14:55:08.420", - "lastModified": "2016-07-15T15:19:57.987", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:43.947", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -120,6 +119,34 @@ { "url": "https://github.com/splitbrain/dokuwiki/pull/868", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0438.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3059", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freelists.org/post/dokuwiki/Fwd-Dokuwiki-maybe-security-issue-Null-byte-poisoning-in-LDAP-authentication", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/10/16/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/splitbrain/dokuwiki/pull/868", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8765.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8765.json index 30d0ee8da7e..297b6024486 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8765.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8765.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8765", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-14T14:55:07.337", - "lastModified": "2014-10-22T15:08:43.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:44.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -229,6 +228,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/57030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/65830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2205755", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2205767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8766.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8766.json index cb068259d41..c8d3b5c4179 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8766.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8766.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8766", "sourceIdentifier": "cve@mitre.org", "published": "2014-10-14T14:55:07.727", - "lastModified": "2017-09-08T01:29:28.013", + "lastModified": "2024-11-21T02:19:44.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96843", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128565/Allomani-Weblinks-1.0-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70255", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96843", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8767.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8767.json index a5038eae380..7cad9ec93d2 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8767.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8767.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8767", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:04.723", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:19:44.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -233,6 +232,71 @@ { "url": "https://support.apple.com/kb/HT205031", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0503.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/47", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:240", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534011/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2433-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8768.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8768.json index 42e9a2c40c9..6d0fc7762cc 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8768.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8768.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8768", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:05.863", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:19:44.503", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -242,6 +241,70 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98766", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129156/tcpdump-4.6.2-Geonet-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/48", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35359", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534010/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71155", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2433-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98766", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8769.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8769.json index 99c58686438..cd826d87e4a 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8769.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8769.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8769", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:06.897", - "lastModified": "2018-10-09T19:54:45.917", + "lastModified": "2024-11-21T02:19:44.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -246,6 +245,71 @@ { "url": "https://support.apple.com/kb/HT205031", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0503.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129157/tcpdump-4.6.2-AOVD-Unreliable-Output.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/49", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:240", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534009/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2433-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98764", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8770.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8770.json index 47f9a121799..2386a70f8b3 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8770.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8770.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8770", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-13T21:32:14.520", - "lastModified": "2019-07-16T12:21:26.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:44.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -88,6 +87,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://osvdb.org/show/osvdb/113848", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35052", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8771.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8771.json index 5c34a25f859..8343e70b8f5 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8771.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8771.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8771", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T18:59:01.753", - "lastModified": "2014-12-05T15:35:48.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:44.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://hacktivity.websecgeeks.com/x3-cms-xss-and-csrf/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.x3cms.net/en/news/article/8bb9a4f84d956653b4daa19ee7c529fa/x3_cms_0.5.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8772.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8772.json index 4ca18d0ce12..b510dd5c31a 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8772.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8772.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8772", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T18:59:02.987", - "lastModified": "2014-12-05T15:28:41.013", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:45.093", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -90,6 +89,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://hacktivity.websecgeeks.com/x3-cms-xss-and-csrf/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.x3cms.net/en/news/article/8bb9a4f84d956653b4daa19ee7c529fa/x3_cms_0.5.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8773.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8773.json index 3f1105ef775..a1b7dc3848c 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8773.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8773.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8773", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T18:59:03.987", - "lastModified": "2019-10-22T17:23:37.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:45.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -222,6 +221,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://forums.modx.com/thread/92152/critical-login-xss-csrf-revolution-2-2-1-4-and-prior", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://hacktivity.websecgeeks.com/modx-csrf-and-xss/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8774.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8774.json index e62602ad1f4..4fc1678ee78 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8774.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8774.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8774", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T18:59:05.563", - "lastModified": "2019-10-22T17:23:37.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:45.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -222,6 +221,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://forums.modx.com/thread/92152/critical-login-xss-csrf-revolution-2-2-1-4-and-prior", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://hacktivity.websecgeeks.com/modx-csrf-and-xss/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8775.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8775.json index d3921f01360..9fff0928f81 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8775.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8775.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8775", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T18:59:06.970", - "lastModified": "2019-10-22T17:23:37.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:45.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -222,6 +221,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://forums.modx.com/thread/92152/critical-login-xss-csrf-revolution-2-2-1-4-and-prior", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://hacktivity.websecgeeks.com/modx-csrf-and-xss/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8779.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8779.json index f89f95100aa..c63534981d3 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8779.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8779.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8779", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:01.187", - "lastModified": "2018-10-09T19:54:47.230", + "lastModified": "2024-11-21T02:19:45.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 7.1 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,26 @@ { "url": "http://www.securityfocus.com/bid/72359", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130174/Pexip-Infinity-Non-Unique-SSH-Host-Keys.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.pexip.com/sites/pexip/files/Pexip_Security_Bulletin_2015-01-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534576/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72359", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8788.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8788.json index 0028c50853e..4df084d8346 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8788.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8788.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8788", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:02.510", - "lastModified": "2014-12-05T15:47:51.850", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:46.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -109,6 +108,18 @@ { "url": "http://support.gleamtech.com/kb/a10/version-history-of-filevista.aspx", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129304/FileVista-Path-Leakage-Path-Write-Modification.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/87", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.gleamtech.com/kb/a10/version-history-of-filevista.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8789.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8789.json index 59883d67192..7728f71d2df 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8789.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8789.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8789", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:03.557", - "lastModified": "2014-12-05T15:50:04.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:46.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -84,6 +83,18 @@ { "url": "http://support.gleamtech.com/kb/a10/version-history-of-filevista.aspx", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129304/FileVista-Path-Leakage-Path-Write-Modification.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/87", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.gleamtech.com/kb/a10/version-history-of-filevista.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8790.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8790.json index 21a1d65a2e3..e2728dbfe48 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8790.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8790.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8790", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-20T15:59:02.767", - "lastModified": "2018-10-30T16:27:48.750", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", + "lastModified": "2024-11-21T02:19:46.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -151,6 +149,36 @@ { "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/944", "source": "cve@mitre.org" + }, + { + "url": "http://get-simple.info/start/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://karmainsecurity.com/KIS-2014-17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129778/GetSimple-CMS-3.3.4-XML-External-Entity-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/135", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/944", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8791.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8791.json index 221494c172e..638683c947f 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8791.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8791.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8791", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T01:59:05.887", - "lastModified": "2018-10-09T19:54:47.653", + "lastModified": "2024-11-21T02:19:46.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -100,6 +99,35 @@ { "url": "http://www.securityfocus.com/bid/71335", "source": "cve@mitre.org" + }, + { + "url": "http://karmainsecurity.com/KIS-2014-13", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534105/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71335", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8793.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8793.json index 94828f20349..eb00a3e4a1a 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8793.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8793.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8793", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:12.457", - "lastModified": "2018-10-09T19:54:47.980", + "lastModified": "2024-11-21T02:19:46.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -114,6 +113,48 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129621/Revive-Adserver-3.0.5-Cross-Site-Scripting-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129622/Revive-Adserver-3.0.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.revive-adserver.com/security/revive-sa-2014-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534264/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534269/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71718", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/revive-adserver/revive-adserver/commit/2be73f9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23242", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-87xx/CVE-2014-8799.json b/CVE-2014/CVE-2014-87xx/CVE-2014-8799.json index 98a53614bfe..d2d507a123c 100644 --- a/CVE-2014/CVE-2014-87xx/CVE-2014-8799.json +++ b/CVE-2014/CVE-2014-87xx/CVE-2014-8799.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8799", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-28T15:59:07.417", - "lastModified": "2020-02-05T16:09:23.660", + "lastModified": "2024-11-21T02:19:46.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://security.szurek.pl/dukapress-252-path-traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35346", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98943", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/1024640/dukapress", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://wordpress.org/plugins/dukapress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8800.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8800.json index 0e3c7763a68..871e3393678 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8800.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8800.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8800", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T15:59:02.510", - "lastModified": "2014-12-05T19:17:43.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:46.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/show/osvdb/115231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.szurek.pl/nextend-facebook-connect-1459-xss.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35439", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/nextend-facebook-connect/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8801.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8801.json index 240e5e25ec9..1bcf04e8bb4 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8801.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8801.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8801", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-28T15:59:09.150", - "lastModified": "2021-03-23T22:13:58.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:47.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +128,63 @@ "Release Notes", "Third Party Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129189/Paid-Memberships-Pro-1.7.14.2-Path-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://security.szurek.pl/paid-memberships-pro-17142-path-traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35303", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.paidmembershipspro.com/2014/11/critical-security-update-pmpro-v1-7-15/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71293", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98805", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://wordpress.org/plugins/paid-memberships-pro/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8802.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8802.json index abcf53ed444..e275e62efce 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8802.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8802.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8802", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-23T15:59:00.053", - "lastModified": "2015-01-26T12:56:42.870", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:47.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62351", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.szurek.pl/pie-register-2013-privilege-escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/pie-register/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8809.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8809.json index becdf813768..83df789cd0a 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8809.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8809.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8809", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:03.917", - "lastModified": "2018-10-30T16:27:51.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:47.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://security.szurek.pl/wp-symposium-1410-multiple-xss-and-sql-injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.wpsymposium.com/release-information-for-v14-11/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8810.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8810.json index e7a571b4b6a..5f299f6f0d2 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8810.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8810.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8810", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:05.387", - "lastModified": "2018-10-30T16:27:51.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:47.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -97,6 +96,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.szurek.pl/wp-symposium-1410-multiple-xss-and-sql-injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.wpsymposium.com/2014/11/release-information-for-v14-11/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8816.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8816.json index 22c1c028ca7..6a51804eb0c 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8816.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8816.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8816", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:28.750", - "lastModified": "2017-09-08T01:29:28.387", + "lastModified": "2024-11-21T02:19:47.670", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100495", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100495", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8817.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8817.json index 9621525a873..f1dd50efacd 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8817.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8817.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8817", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:29.577", - "lastModified": "2017-09-08T01:29:28.450", + "lastModified": "2024-11-21T02:19:47.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100496", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=80", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100496", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8819.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8819.json index ab4fb514e0f..86060e908db 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8819.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8819.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8819", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:30.453", - "lastModified": "2017-09-08T01:29:28.497", + "lastModified": "2024-11-21T02:19:47.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100500", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100500", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8820.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8820.json index 83d695b6813..66e3f5325e9 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8820.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8820.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8820", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:31.280", - "lastModified": "2017-09-08T01:29:28.560", + "lastModified": "2024-11-21T02:19:48.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100501", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100501", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8821.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8821.json index 7d440bc4018..ef8f80a320e 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8821.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8821.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8821", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:32.140", - "lastModified": "2017-09-08T01:29:28.620", + "lastModified": "2024-11-21T02:19:48.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100502", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100502", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8822.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8822.json index dfe093692c6..08a70e84799 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8822.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8822.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8822", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:32.937", - "lastModified": "2017-09-08T01:29:28.683", + "lastModified": "2024-11-21T02:19:48.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100513", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100513", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8823.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8823.json index 0e598f1ffc5..766173facf6 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8823.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8823.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8823", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:33.797", - "lastModified": "2017-09-08T01:29:28.730", + "lastModified": "2024-11-21T02:19:48.383", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.7 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -107,6 +106,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100514", "source": "product-security@apple.com" + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100514", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8824.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8824.json index 286a54bf2dd..39f400e0ca2 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8824.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8824.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8824", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:34.640", - "lastModified": "2017-09-08T01:29:28.810", + "lastModified": "2024-11-21T02:19:48.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100516", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100516", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8825.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8825.json index e50f36ffbcb..d4a3f27ddfa 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8825.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8825.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8825", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:35.470", - "lastModified": "2017-09-08T01:29:28.870", + "lastModified": "2024-11-21T02:19:48.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100517", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100517", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8826.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8826.json index f6280c85f86..a73b86f1cd9 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8826.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8826.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8826", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:36.313", - "lastModified": "2020-07-17T18:15:12.470", + "lastModified": "2024-11-21T02:19:48.733", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -128,6 +127,62 @@ { "url": "https://www.ampliasecurity.com/advisories/os-x-gatekeeper-bypass-vulnerability.html", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130147/OS-X-Gatekeeper-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/117659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534567/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72341", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ampliasecurity.com/advisories/os-x-gatekeeper-bypass-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8827.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8827.json index 43cbd19637d..46901444de3 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8827.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8827.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8827", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:37.187", - "lastModified": "2017-09-08T01:29:28.980", + "lastModified": "2024-11-21T02:19:48.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100521", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100521", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8828.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8828.json index df33078af22..002f1791ccd 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8828.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8828.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8828", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:38.077", - "lastModified": "2017-09-08T01:29:29.043", + "lastModified": "2024-11-21T02:19:49.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100522", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100522", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8829.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8829.json index 3c0ca95f979..c6ec3f54363 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8829.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8829.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8829", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:39.047", - "lastModified": "2017-09-08T01:29:29.090", + "lastModified": "2024-11-21T02:19:49.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100523", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100523", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8830.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8830.json index 68c0b3a9bec..a84e1318c23 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8830.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8830.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8830", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:40.220", - "lastModified": "2017-09-08T01:29:29.137", + "lastModified": "2024-11-21T02:19:49.237", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,36 @@ { "url": "https://support.apple.com/HT204659", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8831.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8831.json index d63670aea8e..b48c8ed79d3 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8831.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8831.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8831", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:41.140", - "lastModified": "2017-09-08T01:29:29.200", + "lastModified": "2024-11-21T02:19:49.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100526", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100526", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8832.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8832.json index 8ce01d6839e..9bc42096771 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8832.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8832.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8832", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:42.030", - "lastModified": "2017-09-08T01:29:29.247", + "lastModified": "2024-11-21T02:19:49.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100528", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100528", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8833.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8833.json index d0e4d8c72e2..95e4828de5f 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8833.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8833.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8833", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:43.000", - "lastModified": "2017-09-08T01:29:29.323", + "lastModified": "2024-11-21T02:19:49.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100529", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100529", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8834.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8834.json index c0b8c4b0a7a..a15a665cc10 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8834.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8834.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8834", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:43.860", - "lastModified": "2017-09-08T01:29:29.387", + "lastModified": "2024-11-21T02:19:49.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -98,6 +97,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100531", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100531", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8835.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8835.json index 8be8e33aabb..b598839ba08 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8835.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8835.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8835", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:44.673", - "lastModified": "2017-09-08T01:29:29.450", + "lastModified": "2024-11-21T02:19:49.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -123,6 +122,53 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100530", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/135701/OS-X-Sysmond-XPC-Type-Confusion-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35742/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71992", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100530", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8836.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8836.json index d9e6acb3e32..522e8694dbc 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8836.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8836.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8836", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:45.750", - "lastModified": "2017-09-08T01:29:29.513", + "lastModified": "2024-11-21T02:19:49.943", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100490", "source": "product-security@apple.com" + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100490", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8837.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8837.json index 8595fa9113c..daff2f65c68 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8837.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8837.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8837", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:46.687", - "lastModified": "2017-09-08T01:29:29.560", + "lastModified": "2024-11-21T02:19:50.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100491", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100491", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8838.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8838.json index 23ff02acf71..cdc4ed7a56f 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8838.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8838.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8838", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:47.627", - "lastModified": "2017-09-08T01:29:29.620", + "lastModified": "2024-11-21T02:19:50.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100525", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100525", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8839.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8839.json index 1e56d940221..c695abbc111 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8839.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8839.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8839", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:48.423", - "lastModified": "2017-09-08T01:29:29.667", + "lastModified": "2024-11-21T02:19:51.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +101,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100527", "source": "product-security@apple.com" + }, + { + "url": "http://heise.de/newsticker/meldung/Datenschutzpanne-in-Mac-OS-X-Yosemite-2514198.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://securitytracker.com/id/1031521", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/HT204244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.theregister.co.uk/2015/01/10/spotlight_caught_spreading_your_delicates/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100527", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8840.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8840.json index a5cda5bfbea..8a558c0f552 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8840.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8840.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8840", "sourceIdentifier": "product-security@apple.com", "published": "2015-01-30T11:59:49.470", - "lastModified": "2017-09-08T01:29:29.730", + "lastModified": "2024-11-21T02:19:51.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100533", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/HT204245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031652", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-15-010/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100533", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8866.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8866.json index 10ab60595e5..dc66a762c58 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8866.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8866.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8866", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T15:59:08.797", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:19:51.723", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -312,6 +311,77 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62672", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://support.citrix.com/article/CTX200288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX201794", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71332", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-111.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8867.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8867.json index 4042de05906..76c205cd5ae 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8867.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8867.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8867", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T15:59:09.780", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:19:51.883", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -228,6 +227,82 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0783.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62672", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://support.citrix.com/article/CTX200288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX201794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71331", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xenproject.org/xsa/advisory-112.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8868.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8868.json index d09be3c238a..686ebc9feec 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8868.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8868.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8868", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-07T21:59:00.070", - "lastModified": "2018-10-09T19:54:49.260", + "lastModified": "2024-11-21T02:19:52.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534128/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.redteam-pentesting.de/advisories/rt-sa-2014-011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8869.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8869.json index e67b3c87b5f..2c5a1ee7907 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8869.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8869.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8869", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:15.200", - "lastModified": "2018-10-09T19:54:49.467", + "lastModified": "2024-11-21T02:19:52.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,39 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/31", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534449/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71997", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.tapatalk.com/threads/tapatalk-for-woltlab-plugin-release-announcement-and-changelog.19540", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2014-015/-cross-site-scripting-in-tapatalk-plugin-for-woltlab-burning-board-4-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8870.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8870.json index 10ef04a0b21..b74712d1749 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8870.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8870.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8870", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:16.623", - "lastModified": "2018-10-09T19:54:49.793", + "lastModified": "2024-11-21T02:19:52.340", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +105,22 @@ { "url": "http://www.securityfocus.com/bid/71998", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/32", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534450/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71998", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8874.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8874.json index b18f4928bae..a1b898c1bd1 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8874.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8874.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8874", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:04.633", - "lastModified": "2018-10-09T19:54:50.510", + "lastModified": "2024-11-21T02:19:52.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534126/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.redteam-pentesting.de/advisories/rt-sa-2014-009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8875.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8875.json index 98db9eab147..8de92b28292 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8875.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8875.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8875", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:13.580", - "lastModified": "2018-10-09T19:54:50.730", + "lastModified": "2024-11-21T02:19:53.080", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -93,6 +91,27 @@ { "url": "http://www.securityfocus.com/bid/71721", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129621/Revive-Adserver-3.0.5-Cross-Site-Scripting-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.revive-adserver.com/security/revive-sa-2014-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534264/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71721", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8877.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8877.json index 721bfe1f0de..bcec4864947 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8877.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8877.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8877", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T18:59:00.063", - "lastModified": "2018-10-09T19:54:50.997", + "lastModified": "2024-11-21T02:19:53.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -110,6 +109,29 @@ { "url": "https://downloadsmanager.cminds.com/release-notes/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129183/WordPress-CM-Download-Manager-2.0.0-Code-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.itas.vn/news/code-injection-in-cm-download-manager-plugin-66.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534037/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71204", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://downloadsmanager.cminds.com/release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8884.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8884.json index e3a2e92725c..3db3cf62f79 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8884.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8884.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8884", "sourceIdentifier": "security@opentext.com", "published": "2014-11-30T01:59:06.557", - "lastModified": "2023-11-07T02:22:49.827", + "lastModified": "2024-11-21T02:19:53.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", + "baseScore": 6.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -1127,6 +1126,46 @@ { "url": "https://github.com/torvalds/linux/commit/f2e323ec96077642d397bb1c355def536d489d16", "source": "security@opentext.com" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f2e323ec96077642d397bb1c355def536d489d16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0290.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0782.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/14/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164266", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/f2e323ec96077642d397bb1c355def536d489d16", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8890.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8890.json index 96ac331b0b5..36a3b13904e 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8890.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8890.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8890", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:17.803", - "lastModified": "2017-09-08T01:29:29.793", + "lastModified": "2024-11-21T02:19:54.160", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -128,6 +127,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99009", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI29911", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71834", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033384", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8891.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8891.json index 07d6dad5a62..4c66971e82e 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8891.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8891.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8891", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-06T23:59:00.077", - "lastModified": "2019-07-16T12:23:10.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:54.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -201,6 +200,106 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_February_2015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8892.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8892.json index c7b48f49c75..955e91b8b20 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8892.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8892.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8892", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-06T23:59:01.217", - "lastModified": "2019-07-16T12:23:13.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:54.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -208,6 +207,113 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_February_2015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73259", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8893.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8893.json index cb1b78d86cc..56323f1d902 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8893.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8893.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8893", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-29T01:59:00.060", - "lastModified": "2017-09-08T01:29:29.857", + "lastModified": "2024-11-21T02:19:54.533", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -117,6 +116,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99012", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62674", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99012", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8894.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8894.json index 4ed253be2ca..a0591f2165b 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8894.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8894.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8894", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-29T01:59:01.450", - "lastModified": "2017-09-08T01:29:29.950", + "lastModified": "2024-11-21T02:19:54.633", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -122,6 +120,27 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99013", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62674", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694772", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72408", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99013", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8895.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8895.json index 7ac3de8edca..ca08937ee7f 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8895.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8895.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8895", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-29T01:59:02.577", - "lastModified": "2017-09-08T01:29:29.997", + "lastModified": "2024-11-21T02:19:54.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99014", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62674", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694771", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99014", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8896.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8896.json index acbf5f29eda..ad2784a4d47 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8896.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8896.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8896", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-22T16:59:00.050", - "lastModified": "2017-09-08T01:29:30.060", + "lastModified": "2024-11-21T02:19:54.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -187,6 +186,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99049", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692176", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99049", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8897.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8897.json index 9188a66f8b6..3fb29445d75 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8897.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8897.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8897", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-22T16:59:01.737", - "lastModified": "2017-09-08T01:29:30.107", + "lastModified": "2024-11-21T02:19:54.947", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -187,6 +186,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99050", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692176", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99050", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8898.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8898.json index 0818cea8549..7f8f0640ab3 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8898.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8898.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8898", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-22T16:59:02.880", - "lastModified": "2017-09-08T01:29:30.167", + "lastModified": "2024-11-21T02:19:55.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -187,6 +186,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99051", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692176", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99051", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-88xx/CVE-2014-8899.json b/CVE-2014/CVE-2014-88xx/CVE-2014-8899.json index 5048e1b2442..a3699ddd0e1 100644 --- a/CVE-2014/CVE-2014-88xx/CVE-2014-8899.json +++ b/CVE-2014/CVE-2014-88xx/CVE-2014-8899.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8899", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-22T16:59:03.847", - "lastModified": "2017-09-08T01:29:30.230", + "lastModified": "2024-11-21T02:19:55.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -184,6 +183,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99052", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692176", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8901.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8901.json index ace9436922c..66059d21d34 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8901.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8901.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8901", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-18T16:59:18.770", - "lastModified": "2018-09-28T10:29:00.807", + "lastModified": "2024-11-21T02:19:55.357", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -126,6 +125,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99110", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05933", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05938", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05939", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71734", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99110", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8902.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8902.json index a1f293d02bc..3853b9ef3e6 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8902.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8902.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8902", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-12-19T02:59:06.217", - "lastModified": "2017-09-08T01:29:30.357", + "lastModified": "2024-11-21T02:19:55.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -167,6 +166,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99150", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI29956", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21692107", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99150", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8904.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8904.json index 3d75085dd22..47c52d4f990 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8904.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8904.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8904", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-15T22:59:03.820", - "lastModified": "2021-08-31T15:44:01.620", + "lastModified": "2024-11-21T02:19:55.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -254,6 +253,49 @@ { "url": "https://www.exploit-db.com/exploits/38576/", "source": "psirt@us.ibm.com" + }, + { + "url": "http://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62195", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV67907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV67908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV68070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV68082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV68478", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031596", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/38576/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8909.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8909.json index bffcadc100e..504ee406683 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8909.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8909.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8909", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-13T02:59:08.267", - "lastModified": "2017-09-08T01:29:30.467", + "lastModified": "2024-11-21T02:19:55.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -152,6 +151,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99250", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI30620", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694738", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99250", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8911.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8911.json index 667f275dead..2f487907360 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8911.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8911.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8911", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-14T02:59:32.707", - "lastModified": "2017-09-08T01:29:30.527", + "lastModified": "2024-11-21T02:19:56.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99252", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99252", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8913.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8913.json index 22159633a53..9652e4314de 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8913.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8913.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8913", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-21T15:17:03.557", - "lastModified": "2017-09-08T01:29:30.577", + "lastModified": "2024-11-21T02:19:56.297", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -134,6 +133,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99284", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62205", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51742", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693239", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99284", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8914.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8914.json index bc4bf4671be..64a4e6f3450 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8914.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8914.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8914", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-21T15:17:04.697", - "lastModified": "2017-09-08T01:29:30.637", + "lastModified": "2024-11-21T02:19:56.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -142,6 +141,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99285", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62205", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51836", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52103", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693239", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99285", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8917.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8917.json index 593a4eeb694..b1f638eb188 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8917.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8917.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8917", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-28T22:59:00.047", - "lastModified": "2017-09-08T01:29:30.700", + "lastModified": "2024-11-21T02:19:56.617", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -177,6 +176,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99303", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62837", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694693", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696013", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72903", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032376", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99303", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8918.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8918.json index 6c61575ff55..deff39bc7c8 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8918.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8918.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8918", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-02T01:59:04.983", - "lastModified": "2017-09-08T01:29:30.763", + "lastModified": "2024-11-21T02:19:56.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -152,6 +151,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99304", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99304", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8920.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8920.json index 83fb5eeb4f0..ca19febe36d 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8920.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8920.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8920", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-01-28T22:59:01.030", - "lastModified": "2017-09-08T01:29:30.810", + "lastModified": "2024-11-21T02:19:56.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -97,6 +96,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99311", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/62532", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020518", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99311", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8921.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8921.json index 9c47a10fa6b..c9d1864604a 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8921.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8921.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8921", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-02T02:59:00.050", - "lastModified": "2015-03-03T17:45:00.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:56.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690582", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8923.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8923.json index 4b4ca2d4b77..7d0f27ca37e 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8923.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8923.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8923", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-25T01:59:11.220", - "lastModified": "2016-08-31T15:17:48.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:57.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -86,6 +85,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699902", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8924.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8924.json index 65f57030cb7..60a3350191c 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8924.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8924.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8924", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-20T10:59:01.353", - "lastModified": "2017-01-03T02:59:22.110", + "lastModified": "2024-11-21T02:19:57.167", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -109,6 +107,19 @@ { "url": "http://www.securitytracker.com/id/1032275", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882820", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032275", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8925.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8925.json index daf1b6915a0..c37f0511ee2 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8925.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8925.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8925", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-25T01:59:12.173", - "lastModified": "2015-03-25T20:51:54.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:57.283", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -314,6 +313,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699148", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8926.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8926.json index 31a45a0caed..eba987d9464 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8926.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8926.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8926", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:05.700", - "lastModified": "2015-05-26T17:51:17.620", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:57.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882695", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8927.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8927.json index 97faf576bdd..5dc03f9a3ca 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8927.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8927.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8927", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:06.763", - "lastModified": "2015-05-26T17:55:14.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:57.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882695", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8948.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8948.json index e0cdb17d442..e4c6b20f53a 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8948.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8948.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8948", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-16T11:59:04.947", - "lastModified": "2014-11-17T16:30:07.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:58.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/106301", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Apr/265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/58094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33076", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8949.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8949.json index a8c3e2a366b..168bf0fafc9 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8949.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8949.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8949", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-16T11:59:05.933", - "lastModified": "2014-11-18T02:04:07.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:59.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -120,6 +119,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/106301", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Apr/265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/58094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/33076", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8950.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8950.json index 57a7b5fc553..d431d52befa 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8950.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8950.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8950", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-16T17:59:05.517", - "lastModified": "2017-09-08T01:29:30.857", + "lastModified": "2024-11-21T02:19:59.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98935", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/58487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98763", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98935", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8951.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8951.json index 31dd6bfba52..b8ea5334c11 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8951.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8951.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8951", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-16T17:59:07.020", - "lastModified": "2017-09-08T01:29:30.917", + "lastModified": "2024-11-21T02:19:59.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -105,6 +104,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/58487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98761", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk100505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8952.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8952.json index 738a2ab401e..0e21f0df31b 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8952.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8952.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8952", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-16T17:59:08.050", - "lastModified": "2017-09-08T01:29:30.967", + "lastModified": "2024-11-21T02:19:59.583", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -120,6 +119,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/58487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/67993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98762", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk100431", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8953.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8953.json index b03c47b3bc8..c9f8e1be6e3 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8953.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8953.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8953", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-17T16:59:09.603", - "lastModified": "2017-09-08T01:29:31.013", + "lastModified": "2024-11-21T02:19:59.723", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98631", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129102/Whos-Who-Script-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98631", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8954.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8954.json index 55b4b4a01b1..6f070725429 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8954.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8954.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8954", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-17T16:59:10.607", - "lastModified": "2015-08-06T16:45:11.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:19:59.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "http://www.securityfocus.com/bid/71172", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129104/phpSound-Music-Sharing-Platform-1.0.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35198", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71172", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8955.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8955.json index 3b9fbb977fe..14ff07684cb 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8955.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8955.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8955", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-17T16:59:11.573", - "lastModified": "2017-09-08T01:29:31.060", + "lastModified": "2024-11-21T02:20:00.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98469", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128957/WordPress-Clean-And-Simple-Contact-Form-4.4.0-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98469", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8956.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8956.json index 8241f442c82..b78e78c27aa 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8956.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8956.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8956", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T15:59:13.777", - "lastModified": "2014-12-16T03:32:42.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:00.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -93,6 +92,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129472/K7-Computing-Multiple-Products-K7Sentry.sys-Out-Of-Bounds-Write.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/46", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8956/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8958.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8958.json index c356e01a23d..6ba11a9fdf5 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8958.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8958.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8958", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-30T11:59:00.087", - "lastModified": "2016-12-22T02:59:20.783", + "lastModified": "2024-11-21T02:20:00.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -391,6 +390,66 @@ { "url": "https://security.gentoo.org/glsa/201505-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3382", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:228", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-13.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/1bc04ec95038f2356ad33752090001bf1c047208", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/2a3b7393d1d5a8ba0543699df94a08a0f5728fe0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/2ffdbf2d7daa0b92541d8b754e2afac555d3ed21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/d32da348c4de2379482a48661ce968a55eebe5c4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8959.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8959.json index 726095305a7..2f768321f1b 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8959.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8959.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8959", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-30T11:59:01.743", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:20:00.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -407,6 +406,42 @@ { "url": "https://security.gentoo.org/glsa/201505-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:228", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-14.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71247", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/80cd40b6687a6717860d345d6eb55bef2908e961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8960.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8960.json index 46995d0aa3d..ca5947f69b0 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8960.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8960.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8960", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-30T11:59:02.777", - "lastModified": "2016-12-22T02:59:20.923", + "lastModified": "2024-11-21T02:20:00.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -271,6 +270,36 @@ { "url": "https://security.gentoo.org/glsa/201505-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:228", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-15.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/9364e2eee5681681caf7205c0933bc18af11e233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8961.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8961.json index f4bea23bc20..e8f6368e631 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8961.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8961.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8961", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-30T11:59:03.603", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:20:00.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -304,6 +303,44 @@ { "url": "https://security.gentoo.org/glsa/201505-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:228", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-16.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71245", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/b99b6b6672ff2419f05b05740c80c7a23c1da994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8962.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8962.json index c2f32f06de1..c95591ea4a3 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8962.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8962.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8962", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:07.057", - "lastModified": "2023-11-07T02:22:52.513", + "lastModified": "2024-11-21T02:20:01.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,61 @@ { "url": "https://git.xiph.org/?p=flac.git%3Ba=commit%3Bh=5b3033a2b355068c11fe637e14ac742d273f076e", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0499.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00034.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129261/libFLAC-1.3.0-Stack-Overflow-Heap-Overflow-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0767.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:239", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ocert.org/advisories/ocert-2014-008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534083/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2426-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.xiph.org/?p=flac.git%3Ba=commit%3Bh=5b3033a2b355068c11fe637e14ac742d273f076e", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8964.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8964.json index bbdd293cd4e..7f29239613f 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8964.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8964.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8964", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:10.747", - "lastModified": "2022-08-04T19:58:40.263", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:01.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -356,6 +355,128 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0534.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://bugs.exim.org/show_bug.cgi?id=1546", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0330.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.exim.org/viewvc/pcre?view=revision&revision=1513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:002", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/21/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71206", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166147", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201607-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8966.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8966.json index b3777fab733..c4dfde75fe4 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8966.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8966.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8966", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-11T00:59:22.487", - "lastModified": "2018-10-12T22:07:48.067", + "lastModified": "2024-11-21T02:20:01.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -85,6 +84,10 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8967.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8967.json index b1e3ddd7bc8..fd1c197d75f 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8967.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8967.json @@ -2,10 +2,8 @@ "id": "CVE-2014-8967", "sourceIdentifier": "secure@microsoft.com", "published": "2014-12-15T18:59:19.957", - "lastModified": "2015-10-30T19:01:00.500", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:20:01.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +78,15 @@ { "url": "http://zerodayinitiative.com/advisories/ZDI-14-403/", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/71483", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-14-403/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8986.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8986.json index cf4d0f4d8c2..630cf4a961d 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8986.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8986.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8986", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:13.327", - "lastModified": "2017-01-03T02:59:22.173", + "lastModified": "2024-11-21T02:20:02.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -122,6 +121,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/15/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/15/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/15/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/19/20", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/cabacdc291c251bfde0dc2a2c945c02cef41bf40", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8988.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8988.json index 8d274567553..9019ed24a19 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8988.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8988.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8988", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:14.373", - "lastModified": "2017-09-08T01:29:31.120", + "lastModified": "2024-11-21T02:20:02.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -106,6 +105,41 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=17742", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98731", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/5f0b150b", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8989.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8989.json index c1af9775050..c112134bfda 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8989.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8989.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8989", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-30T01:59:07.570", - "lastModified": "2017-01-03T02:59:22.313", + "lastModified": "2024-11-21T02:20:02.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -1130,6 +1129,49 @@ { "url": "http://www.ubuntu.com/usn/USN-2518-1", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://thread.gmane.org/gmane.linux.man/7385/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/20/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71154", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8990.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8990.json index b546e9c8192..a7f394ef7e4 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8990.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8990.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8990", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T16:59:11.707", - "lastModified": "2017-07-01T01:29:08.797", + "lastModified": "2024-11-21T02:20:02.660", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -163,8 +162,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -172,21 +171,101 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { "url": "https://github.com/axkibe/lsyncd/issues/220", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { "url": "https://security.gentoo.org/glsa/201702-05", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145114.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145131.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62321", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3130", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/19/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/20/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/axkibe/lsyncd/commit/18f02ad013b41a72753912155ae2ba72f2a53e52", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://github.com/axkibe/lsyncd/commit/e6016b3748370878778b8f0b568d5281cc248aa4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://github.com/axkibe/lsyncd/issues/220", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201702-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8991.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8991.json index 008abce9867..9a59616d929 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8991.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8991.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8991", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:15.640", - "lastModified": "2021-03-15T16:17:41.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:02.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -135,6 +134,53 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/19/17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/20/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725847", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/pypa/pip/pull/2122", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8992.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8992.json index e4d01a2a46a..b2065fcbd07 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8992.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8992.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8992", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-22T19:59:03.383", - "lastModified": "2019-10-22T17:23:41.210", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:03.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://github.com/modxcms/revolution/issues/12161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8993.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8993.json index 73c6496ad09..f8891ee31f1 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8993.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8993.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8993", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-07T18:59:01.370", - "lastModified": "2018-10-09T19:54:52.980", + "lastModified": "2024-11-21T02:20:03.147", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,22 @@ { "url": "http://www.securitytracker.com/id/1031488", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129811/Open-Xchange-Server-6-OX-AppSuite-7.6.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534383/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031488", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8994.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8994.json index f0cfd968980..9563969da40 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8994.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8994.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8994", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-28T15:59:10.417", - "lastModified": "2017-09-08T01:29:31.183", + "lastModified": "2024-11-21T02:20:03.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -88,6 +87,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98849", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/679", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/701", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98849", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8995.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8995.json index 00be2dfc730..6dbc32921e5 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8995.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8995.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8995", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:03.830", - "lastModified": "2017-09-08T01:29:31.230", + "lastModified": "2024-11-21T02:20:03.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98775", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129135/Maarch-LetterBox-2.8-Insecure-Cookie-Handling.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/114772", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98775", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8996.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8996.json index 9476ff283ee..f9a82367d35 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8996.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8996.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8996", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:05.000", - "lastModified": "2017-09-08T01:29:31.293", + "lastModified": "2024-11-21T02:20:03.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98738", "source": "cve@mitre.org" + }, + { + "url": "http://blog.nibbleblog.com/post/nibbleblog-v4.0.2-coffee/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129133/Nibbleblog-4.0.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/38", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98738", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8997.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8997.json index a3e04e8f799..be67689216f 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8997.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8997.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8997", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:06.687", - "lastModified": "2017-09-08T01:29:31.340", + "lastModified": "2024-11-21T02:20:03.733", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98662", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129108/Digi-Online-Examination-System-2.0-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35223", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98662", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8998.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8998.json index bc73e74e0a9..f594c1c27b6 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8998.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8998.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8998", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:07.907", - "lastModified": "2017-09-08T01:29:31.403", + "lastModified": "2024-11-21T02:20:03.883", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -163,6 +162,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98513", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/128964/X7-Chat-2.0.5-lib-message.php-preg_replace-PHP-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98513", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-89xx/CVE-2014-8999.json b/CVE-2014/CVE-2014-89xx/CVE-2014-8999.json index 26a5c9a9813..36d409c1d3c 100644 --- a/CVE-2014/CVE-2014-89xx/CVE-2014-8999.json +++ b/CVE-2014/CVE-2014-89xx/CVE-2014-8999.json @@ -2,9 +2,8 @@ "id": "CVE-2014-8999", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:09.033", - "lastModified": "2014-11-24T13:58:05.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:04.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -97,6 +96,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129134/XOOPS-2.5.6-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/39", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71117", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xoops.org/modules/news/article.php?storyid=6658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9000.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9000.json index c1c2da84e91..c60802ee5f1 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9000.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9000.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9000", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:10.347", - "lastModified": "2014-11-20T15:00:44.677", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:04.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -99,6 +98,34 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/128799", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/107", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/98", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.mulesoft.org/documentation/display/current/Mule+Enterprise+Management+Console+Security+Update", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9001.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9001.json index abb242bfe03..ce23586dbaf 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9001.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9001.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9001", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:11.393", - "lastModified": "2014-11-20T15:09:04.390", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:04.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9002.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9002.json index cbe7688dbea..1c81bee95e4 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9002.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9002.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9002", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:12.393", - "lastModified": "2017-09-08T01:29:31.467", + "lastModified": "2024-11-21T02:20:04.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98644", "source": "cve@mitre.org" + }, + { + "url": "http://i.imgur.com/gjbZhXZ.png", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129091/Lantronix-xPrintServer-Remote-Command-Execution-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/24", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98644", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9003.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9003.json index 4c201a91f53..6dba5369a26 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9003.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9003.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9003", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:13.393", - "lastModified": "2017-09-08T01:29:31.513", + "lastModified": "2024-11-21T02:20:04.667", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98645", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129091/Lantronix-xPrintServer-Remote-Command-Execution-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/24", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98645", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9004.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9004.json index d466bb2ce21..fdd257f6f60 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9004.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9004.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9004", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:14.360", - "lastModified": "2017-09-08T01:29:31.560", + "lastModified": "2024-11-21T02:20:04.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98742", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/35193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98742", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9005.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9005.json index ae1cb0f8bf7..e333f3939d4 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9005.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9005.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9005", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:15.237", - "lastModified": "2017-09-08T01:29:31.620", + "lastModified": "2024-11-21T02:20:04.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98746", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/35193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98746", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9006.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9006.json index edd0c6721f8..02244504054 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9006.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9006.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9006", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T13:55:16.143", - "lastModified": "2017-09-08T01:29:31.667", + "lastModified": "2024-11-21T02:20:05.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98649", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129082/Monstra-3.0.1-Bruteforce-Mitigation-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98649", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9015.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9015.json index 81e54df7039..64795d80f02 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9015.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9015.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9015", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:16.857", - "lastModified": "2018-12-20T17:53:11.393", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:05.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -139,6 +138,50 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/59164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59814", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/20/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/20/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://www.drupal.org/SA-CORE-2014-006", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9016.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9016.json index e3d3b46b0a3..99a07245d86 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9016.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9016.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9016", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:17.920", - "lastModified": "2021-04-20T12:50:47.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:05.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -163,6 +162,74 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/59164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59814", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/20/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/20/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/21/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://www.drupal.org/SA-CORE-2014-006", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2378367", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2378375", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9017.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9017.json index 915b3ca8c96..2c4d0510295 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9017.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9017.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9017", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-11T14:59:02.830", - "lastModified": "2017-10-12T17:40:49.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:05.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -104,6 +103,38 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130723/OpenKM-Stored-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/48", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/51", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://youtu.be/3jBQFAAq23k", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9018.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9018.json index ec2147868c3..a92f0931345 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9018.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9018.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9018", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T18:59:08.017", - "lastModified": "2017-09-08T01:29:31.730", + "lastModified": "2024-11-21T02:20:05.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -117,6 +116,51 @@ { "url": "https://trac.xiph.org/ticket/2089", "source": "cve@mitre.org" + }, + { + "url": "http://icecast.org/news/icecast-release-2_4_1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/19/23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/20/22", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98991", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.xiph.org/ticket/2087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://trac.xiph.org/ticket/2089", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9019.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9019.json index cbe15e79ca1..69f56cddbc7 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9019.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9019.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9019", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:07.847", - "lastModified": "2018-10-09T19:54:53.277", + "lastModified": "2024-11-21T02:20:06.103", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98585", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533930/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98585", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9020.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9020.json index aa37b01c082..56d486faa6f 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9020.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9020.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9020", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:08.973", - "lastModified": "2018-10-09T19:54:53.717", + "lastModified": "2024-11-21T02:20:06.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +109,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98584", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129017/ZTE-ZXDSL-831-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533930/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533931/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98584", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9021.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9021.json index 17a720c785d..66313e96489 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9021.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9021.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9021", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:10.147", - "lastModified": "2018-10-09T19:54:54.293", + "lastModified": "2024-11-21T02:20:06.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98565", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129017/ZTE-ZXDSL-831-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/533931/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98565", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9022.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9022.json index d2042339287..d5ea68dc3ce 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9022.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9022.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9022", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:11.240", - "lastModified": "2014-11-20T19:15:46.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:06.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -137,6 +136,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2373471", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2373473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2373973", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9023.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9023.json index 95f631b2d6c..5aadd5018f7 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9023.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9023.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9023", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:12.503", - "lastModified": "2016-06-02T02:19:42.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:06.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -115,6 +114,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2337623", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2344363", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9024.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9024.json index c1882544280..2a89b08670f 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9024.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9024.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9024", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:13.443", - "lastModified": "2014-11-20T19:05:59.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:06.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2353451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2378279", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9025.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9025.json index 7a43682b8f4..cf6cf53c2cd 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9025.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9025.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9025", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:14.457", - "lastModified": "2014-11-21T13:02:31.670", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:06.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -150,6 +149,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2336327", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2336357", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9026.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9026.json index dbc7a31f93b..4d576bd6918 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9026.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9026.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9026", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:15.660", - "lastModified": "2014-11-21T02:43:26.583", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:07.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -180,6 +179,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2336109", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2336259", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9027.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9027.json index e939f8313a9..0224c80500e 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9027.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9027.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9027", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-20T17:50:16.583", - "lastModified": "2017-09-08T01:29:31.933", + "lastModified": "2024-11-21T02:20:07.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98590", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98590", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9028.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9028.json index 38a2885d8e1..f9b09d60a92 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9028.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9028.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9028", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:08.183", - "lastModified": "2023-11-07T02:22:57.310", + "lastModified": "2024-11-21T02:20:07.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,61 @@ { "url": "https://git.xiph.org/?p=flac.git%3Ba=commit%3Bh=fcf0ba06ae12ccd7c67cee3c8d948df15f946b85", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0499.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00034.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129261/libFLAC-1.3.0-Stack-Overflow-Heap-Overflow-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0767.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:239", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ocert.org/advisories/ocert-2014-008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534083/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2426-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.xiph.org/?p=flac.git%3Ba=commit%3Bh=fcf0ba06ae12ccd7c67cee3c8d948df15f946b85", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9029.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9029.json index e9bc35a843b..676353f3d65 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9029.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9029.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9029", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:03.200", - "lastModified": "2018-10-09T19:54:55.560", + "lastModified": "2024-11-21T02:20:07.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -151,6 +150,85 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99125", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0514.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129393/JasPer-1.900.1-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0698.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61747", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62828", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3089", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:247", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ocert.org/advisories/ocert-2014-009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/04/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534153/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71476", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2434-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2434-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167537", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99125", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9030.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9030.json index 0ad03cc594d..58574542e30 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9030.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9030.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9030", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T15:59:19.047", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:20:07.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -314,6 +313,59 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62672", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71207", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-113.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98853", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9031.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9031.json index 1cf8e5ed653..779175d5620 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9031.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9031.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9031", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T23:59:01.270", - "lastModified": "2015-10-05T21:43:29.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:07.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -152,6 +151,46 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0493.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://klikki.fi/adv/wordpress.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/25/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/62", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9032.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9032.json index 4b51a2a32f2..2734500d726 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9032.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9032.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9032", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T23:59:02.677", - "lastModified": "2015-10-05T21:41:48.663", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:08.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -114,6 +113,34 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0493.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/25/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71236", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9033.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9033.json index 2476aca892c..2aac6ca8bc0 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9033.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9033.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9033", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T23:59:03.817", - "lastModified": "2015-11-02T18:11:41.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:08.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,41 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0493.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://core.trac.wordpress.org/changeset/30418", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/25/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9034.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9034.json index b07966e390d..33e5d985ced 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9034.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9034.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9034", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T23:59:05.177", - "lastModified": "2016-04-04T13:15:32.333", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:08.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -152,6 +151,41 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0493.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://core.trac.wordpress.org/changeset/30467", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/25/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9035.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9035.json index 08915aa3bd9..841406b7168 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9035.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9035.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9035", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T23:59:06.227", - "lastModified": "2016-04-04T13:16:52.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:08.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -169,6 +168,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0493.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/25/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71236", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9036.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9036.json index 2ac64041957..040f0cf4dc5 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9036.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9036.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9036", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T23:59:07.163", - "lastModified": "2016-04-04T13:17:57.587", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:08.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -169,6 +168,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0493.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/25/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71236", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9037.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9037.json index 7f93540ef74..d5b5004f7f2 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9037.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9037.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9037", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T23:59:08.193", - "lastModified": "2016-06-30T16:58:39.460", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:08.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -182,8 +181,36 @@ "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory", - "Patch" + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0493.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/25/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" ] } ] diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9038.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9038.json index 79df67e54a3..3f64531c0c5 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9038.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9038.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9038", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T23:59:09.287", - "lastModified": "2015-10-05T21:40:15.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:08.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -152,6 +151,41 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0493.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/25/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://core.trac.wordpress.org/changeset/30444", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9039.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9039.json index 1e03e40e3df..54d9767f553 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9039.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9039.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9039", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-25T23:59:10.443", - "lastModified": "2016-06-30T17:06:17.933", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:09.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -192,6 +191,41 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0493.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://core.trac.wordpress.org/changeset/30431", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/25/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9041.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9041.json index 9c3a581c17e..a31abcf5830 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9041.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9041.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9041", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:01.527", - "lastModified": "2015-02-05T14:19:27.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:09.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -214,6 +213,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2014-027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9042.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9042.json index 6a0eaf24a28..fe3d7765e1e 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9042.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9042.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9042", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:02.620", - "lastModified": "2015-02-05T15:20:32.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:09.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -214,6 +213,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2014-028", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9043.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9043.json index 5a41a411093..3ad36f289bd 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9043.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9043.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9043", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:03.620", - "lastModified": "2015-02-05T15:21:12.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:09.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -214,6 +213,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2014-020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9044.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9044.json index 2282a254ef1..1d1821e769a 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9044.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9044.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9044", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:04.387", - "lastModified": "2015-02-05T15:22:26.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:09.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2014-021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9045.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9045.json index f5e2b9f6e24..a4db128d3f5 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9045.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9045.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9045", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:05.260", - "lastModified": "2015-02-05T16:15:30.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:09.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -199,6 +198,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2014-022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9046.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9046.json index 16350fad11e..8da36d48dc7 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9046.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9046.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9046", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:06.197", - "lastModified": "2015-02-05T16:15:49.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:09.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -214,6 +213,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2014-023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9047.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9047.json index 052435385f2..6efae11cdcc 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9047.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9047.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9047", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:07.027", - "lastModified": "2015-02-05T16:18:06.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:10.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -214,6 +213,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2014-026", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9048.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9048.json index 297d1555260..8582e7848c1 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9048.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9048.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9048", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:07.917", - "lastModified": "2015-02-05T16:18:42.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:10.263", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -214,6 +213,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2014-024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9049.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9049.json index 6bf32da419b..d9458368c1a 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9049.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9049.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9049", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:08.667", - "lastModified": "2015-02-05T16:19:19.803", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:10.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -118,6 +117,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2014-025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9050.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9050.json index cdfdfe3fd86..fb6514cac5c 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9050.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9050.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9050", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T15:59:10.797", - "lastModified": "2015-04-30T02:01:22.070", + "lastModified": "2024-11-21T02:20:10.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -620,6 +619,64 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://blog.clamav.net/2014/11/clamav-0985-has-been-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144979.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62542", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/22/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2423-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/vrtadmin/clamav-devel/commit/fc3794a54d2affe5770c1f876484a871c783e91e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9057.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9057.json index eecde857f07..15bab3a1274 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9057.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9057.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9057", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:12.840", - "lastModified": "2015-11-17T04:12:03.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:10.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -189,6 +188,28 @@ { "url": "https://www.debian.org/security/2015/dsa-3183", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/61227", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://movabletype.org/documentation/appendices/release-notes/6.0.6.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://movabletype.org/news/2014/12/6.0.6.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.debian.org/security/2015/dsa-3183", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9059.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9059.json index c96beb3976c..e768bd36270 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9059.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9059.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9059", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T11:59:14.183", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:10.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -188,6 +187,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47966", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275146", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9060.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9060.json index edc2f36f891..24dbd638041 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9060.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9060.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9060", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-24T11:59:15.137", - "lastModified": "2020-12-01T14:54:45.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:11.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -181,6 +180,25 @@ { "url": "https://moodle.org/mod/forum/discuss.php?d=275165", "source": "cve@mitre.org" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47927", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=275165", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9065.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9065.json index 26887a2845b..b7ec32c738c 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9065.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9065.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9065", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:08.037", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:11.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:S/C:N/I:N/A:C", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 2.7, @@ -137,6 +136,51 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/08/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71544", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-114.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9066.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9066.json index 5c2de5a1e3f..2342af8bb60 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9066.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9066.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9066", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:09.193", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:20:11.317", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -120,6 +119,34 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/08/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-114.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9087.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9087.json index 8e4a38e3140..8b94e810222 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9087.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9087.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9087", "sourceIdentifier": "security@debian.org", "published": "2014-12-01T15:59:11.797", - "lastModified": "2023-05-18T18:08:04.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:11.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -237,6 +236,86 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0498.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2014q4/000359.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60189", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3078", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:234", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:151", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71285", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2427-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://blog.fuzzing-project.org/2-Buffer-overflow-and-other-minor-issues-in-GnuPG-and-libksba-TFPA-0012014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9089.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9089.json index 3de1fcafa1e..7549821207d 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9089.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9089.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9089", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-28T15:59:11.260", - "lastModified": "2017-01-03T02:59:22.503", + "lastModified": "2024-11-21T02:20:11.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -124,6 +123,43 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/25/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/26/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71298", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/b0021673ab23249244119bde3c7fcecd4daa4e7f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9090.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9090.json index 6d84c6a7034..c52702d62ef 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9090.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9090.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9090", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-30T01:59:08.460", - "lastModified": "2023-11-07T02:22:57.570", + "lastModified": "2024-11-21T02:20:11.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -1122,6 +1121,41 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f442be2fb22be02cafa606f1769fa1e6f894441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62336", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/26/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9091.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9091.json index 9be5188ce7d..4f140e929c0 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9091.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9091.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9091", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T15:59:19.597", - "lastModified": "2014-12-11T18:24:34.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:11.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -102,6 +101,36 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://icecast.org/news/icecast-release-2_4_0/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2014-12/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/802", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168146", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.xiph.org/changeset/19137/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9093.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9093.json index ce59b4d977b..aa60d8a925a 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9093.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9093.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9093", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:09.153", - "lastModified": "2016-12-03T03:02:02.467", + "lastModified": "2024-11-21T02:20:12.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -175,6 +174,54 @@ { "url": "https://security.gentoo.org/glsa/201603-05", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144836.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3163", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/19/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/26/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2578-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.freedesktop.org/show_bug.cgi?id=86449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201603-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9094.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9094.json index d949c555137..92c9175fc82 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9094.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9094.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9094", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:10.277", - "lastModified": "2019-06-05T11:29:00.233", + "lastModified": "2024-11-21T02:20:12.403", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "http://www.securityfocus.com/bid/68525", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/65", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://websecurity.com.ua/7152/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/108579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68525", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9095.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9095.json index 71e7cbde317..32d392bac99 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9095.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9095.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9095", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:11.200", - "lastModified": "2017-11-08T02:29:00.943", + "lastModified": "2024-11-21T02:20:12.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,28 @@ { "url": "http://www.securityfocus.com/bid/68722", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127525/Raritan-PowerIQ-Unauthenticated-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/79", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/60138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/68722", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9096.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9096.json index dd01026a820..604a5d63c75 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9096.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9096.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9096", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:12.200", - "lastModified": "2014-11-28T13:53:59.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:12.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ { "url": "https://github.com/Pligg/pligg-cms/commit/efb967b944375cd3ea3cd84c80d86d339dbe030e", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127615/Pligg-2.0.1-SQL-Injection-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68893", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Pligg/pligg-cms/commit/4891c4d8742b9dabd67e7250840e3434865aebed", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Pligg/pligg-cms/commit/efb967b944375cd3ea3cd84c80d86d339dbe030e", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9097.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9097.json index 391e21b72b9..08b0a695456 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9097.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9097.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9097", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:13.293", - "lastModified": "2014-11-28T14:10:46.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:12.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/127611/WordPress-Video-Gallery-2.5-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wordpress.org/plugins/contus-video-gallery/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68883", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9098.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9098.json index 98a54e04880..413f564b9f3 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9098.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9098.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9098", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:14.217", - "lastModified": "2014-11-28T14:14:07.100", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:12.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/68883", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127611/WordPress-Video-Gallery-2.5-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68883", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-90xx/CVE-2014-9099.json b/CVE-2014/CVE-2014-90xx/CVE-2014-9099.json index b0b12902633..2788bbdd35e 100644 --- a/CVE-2014/CVE-2014-90xx/CVE-2014-9099.json +++ b/CVE-2014/CVE-2014-90xx/CVE-2014-9099.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9099", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:15.153", - "lastModified": "2014-11-26T21:55:22.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:13.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/68954", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68954", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9100.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9100.json index a78a688c0d1..64675a51a9c 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9100.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9100.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9100", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:16.120", - "lastModified": "2014-11-26T21:55:55.440", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:13.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/68954", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127658/WordPress-WhyDoWork-AdSense-1.2-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68954", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9101.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9101.json index 181bdedd0a3..d8d50133159 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9101.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9101.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9101", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:17.043", - "lastModified": "2015-02-18T18:53:35.180", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:13.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -138,6 +137,58 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/109622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/109623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/109624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/109625", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/127652/Oxwall-1.7.0-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/127690/SkaDate-Lite-2.0-CSRF-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/34190", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68971", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5195.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5197.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9102.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9102.json index 93b2726cc25..da4e138f35e 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9102.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9102.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9102", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:17.997", - "lastModified": "2014-12-05T16:53:55.813", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:13.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -97,6 +96,31 @@ { "url": "http://www.securityfocus.com/bid/68956", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127683/Joomla-Kunena-Forum-3.0.5-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.kunena.org/blog/139-kunena-3-0-6-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kunena.org/docs/Kunena_3.0.6_Read_Me", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68956", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9103.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9103.json index 0e7d8aedfde..b02f7832e92 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9103.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9103.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9103", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:18.950", - "lastModified": "2014-12-05T16:53:06.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:13.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,32 @@ { "url": "http://www.securityfocus.com/bid/68956", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/127684/joomlakunena305-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.kunena.org/blog/139-kunena-3-0-6-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.kunena.org/docs/Kunena_3.0.6_Read_Me", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/68956", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9104.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9104.json index 48189cf6384..f75e965a37b 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9104.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9104.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9104", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-26T15:59:19.920", - "lastModified": "2018-10-09T19:54:57.060", + "lastModified": "2024-11-21T02:20:13.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://openvpn.net/index.php/access-server/security-advisories.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Jul/76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/532795/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-1_OpenVPN_Access_Server_Desktop_Client_Remote_Code_Execution_via_CSRF_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.youtube.com/watch?v=qhgysgfvQh8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9112.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9112.json index 3e9c10615f9..a62d386f8a8 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9112.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9112.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9112", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:05.760", - "lastModified": "2017-09-08T01:29:32.120", + "lastModified": "2024-11-21T02:20:13.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -169,6 +168,89 @@ "Exploit", "Issue Tracking" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/74", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60167", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/62145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/25/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/26/20", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71248", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2456-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://savannah.gnu.org/bugs/?43709", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9113.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9113.json index e20e08bd824..a199bd05202 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9113.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9113.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9113", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:07.010", - "lastModified": "2014-12-15T16:27:42.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:14.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "CCH Wolters Kluwer ProSystem fx Engagement (tambi\u00e9n conocido como PFX Engagement) 7.1 y anteriores utiliza permisos d\u00e9biles (usuarios autenticados: modificar y escribir) para los ficheros de servicio (1) Pfx.Engagement.WcfServices, (2) PFXEngDesktopService, (3) PFXSYNPFTService, y (4) P2EWinService en PFX Engagement\\, lo que permite a usuarios locales obtener privilegios LocalSystem a trav\u00e9s de un fichero troyano." } ], - "vendorComments": [ - { - "organization": "CCH Group", - "comment": "A security update has been released on 12/03/2014 to address the vulnerability in CCH Wolters Kluwer ProSystem fx Engagement. This update corrects the permissions on necessary application services. Please see the online release bulletin for instructions on how to apply the security update. \nhttps://support.cch.com/updates/Engagement/pdf/Services%20Security%20Update%20-%20Release%20Bulletin%20-%20US.pdf", - "lastModified": "2014-12-15T13:55:03.083" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,6 +86,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129323/CCH-Wolters-Kluwer-PFX-Engagement-7.1-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.information-paradox.net/2014/11/cve-2014-9113-cch-wolters-kluwer-pfx.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + } + ], + "vendorComments": [ + { + "organization": "CCH Group", + "comment": "A security update has been released on 12/03/2014 to address the vulnerability in CCH Wolters Kluwer ProSystem fx Engagement. This update corrects the permissions on necessary application services. Please see the online release bulletin for instructions on how to apply the security update. \nhttps://support.cch.com/updates/Engagement/pdf/Services%20Security%20Update%20-%20Release%20Bulletin%20-%20US.pdf", + "lastModified": "2014-12-15T13:55:03.083" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9115.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9115.json index 08e3ab28d66..39e0203a234 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9115.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9115.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9115", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-23T11:59:04.110", - "lastModified": "2014-12-23T19:12:08.460", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:14.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -147,6 +146,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://piwigo.org/dev/changeset/30563/trunk/include/functions_rate.inc.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://piwigo.org/forum/viewtopic.php?id=24850", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://piwigo.org/releases/2.7.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9116.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9116.json index 3055be92e5e..56b686accbc 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9116.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9116.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9116", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:08.150", - "lastModified": "2018-10-30T16:27:37.717", + "lastModified": "2024-11-21T02:20:14.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -217,6 +216,102 @@ { "url": "https://security.gentoo.org/glsa/201701-04", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0509.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://dev.mutt.org/trac/ticket/3716", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3083", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:078", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/27/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/27/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71334", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031266", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168463", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201701-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9117.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9117.json index baaca89adeb..d52e18c0c5e 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9117.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9117.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9117", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-06T21:59:02.547", - "lastModified": "2017-09-08T01:29:32.247", + "lastModified": "2024-11-21T02:20:14.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -107,6 +106,41 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/26/19", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/27/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71321", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/7bb78e45", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17811", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9119.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9119.json index 8273e79b67a..4882463d283 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9119.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9119.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9119", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T22:59:04.583", - "lastModified": "2017-09-08T01:29:32.293", + "lastModified": "2024-11-21T02:20:15.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/1059", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99368", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7726", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9120.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9120.json index 48d92b6aa98..d61f4caf9cd 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9120.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9120.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9120", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T15:59:20.830", - "lastModified": "2018-11-08T20:49:39.263", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:15.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://dev.subrion.org/versions/130", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "https://www.netsparker.com/xss-vulnerability-in-subrion-cms/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9129.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9129.json index f7818106071..7b5ecf5253d 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9129.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9129.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9129", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T15:59:04.137", - "lastModified": "2023-02-02T17:54:42.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:15.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129357/WordPress-CM-Download-Manager-2.0.6-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534132/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71418", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://downloadsmanager.cminds.com/release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9130.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9130.json index 4c98add215a..375a9230b6d 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9130.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9130.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9130", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:04.450", - "lastModified": "2017-12-09T02:29:03.967", + "lastModified": "2024-11-21T02:20:15.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -209,6 +208,139 @@ { "url": "https://puppet.com/security/cve/cve-2014-9130", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0508.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0100.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0100.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0112.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0260.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62174", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62176", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62774", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:060", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/28/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/28/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/29/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71349", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2461-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2461-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2461-3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://puppet.com/security/cve/cve-2014-9130", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9134.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9134.json index 8a0380fe05b..4040721e2b0 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9134.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9134.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9134", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:01.587", - "lastModified": "2014-12-05T16:58:07.673", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", + "lastModified": "2024-11-21T02:20:15.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +94,18 @@ { "url": "http://www.securityfocus.com/bid/69806", "source": "cve@mitre.org" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-396206.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/69806", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9135.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9135.json index 24c9329d95f..39494f0de94 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9135.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9135.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9135", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:14.533", - "lastModified": "2017-09-08T01:29:32.403", + "lastModified": "2024-11-21T02:20:16.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99283", "source": "cve@mitre.org" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-397472.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99283", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9140.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9140.json index 0999656d473..1e4b9306907 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9140.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9140.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9140", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T16:59:12.910", - "lastModified": "2018-10-09T19:54:57.967", + "lastModified": "2024-11-21T02:20:16.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -138,6 +137,72 @@ { "url": "https://support.apple.com/kb/HT205031", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0511.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/tcpdump/2014/q4/72", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3086", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:240", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534829/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2433-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/the-tcpdump-group/tcpdump/commit/0f95d441e4b5d7512cc5c326c8668a120e048eda", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9141.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9141.json index d3f36b2cfb8..e2adbbb7bbe 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9141.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9141.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9141", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T01:59:01.330", - "lastModified": "2014-12-17T16:17:56.877", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:16.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -83,6 +82,17 @@ { "url": "http://www.information-paradox.net/2014/12/cve-2014-9141-thomson-reuters-fixed.html", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/35423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.information-paradox.net/2014/12/cve-2014-9141-thomson-reuters-fixed.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9142.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9142.json index 4bd3f8eee9c..1da3e37b503 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9142.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9142.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9142", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T15:59:05.043", - "lastModified": "2018-10-09T19:54:59.183", + "lastModified": "2024-11-21T02:20:16.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "http://www.securityfocus.com/archive/1/534143/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129374/ADSL2-2.05.C29GV-XSS-URL-Redirect-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35462", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534143/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9143.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9143.json index 42d77e33807..13252220928 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9143.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9143.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9143", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T15:59:06.010", - "lastModified": "2018-10-09T19:54:59.450", + "lastModified": "2024-11-21T02:20:16.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "http://www.securityfocus.com/archive/1/534143/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129374/ADSL2-2.05.C29GV-XSS-URL-Redirect-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35462", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534143/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9144.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9144.json index 1f05d1512d4..a16dc6dec4c 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9144.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9144.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9144", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T15:59:07.043", - "lastModified": "2018-10-09T19:54:59.717", + "lastModified": "2024-11-21T02:20:17.037", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "http://www.securityfocus.com/archive/1/534143/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129374/ADSL2-2.05.C29GV-XSS-URL-Redirect-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35462", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534143/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9145.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9145.json index 49c5b6023de..39fd09ca80e 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9145.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9145.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9145", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T14:59:00.053", - "lastModified": "2015-04-15T13:20:08.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:17.177", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9146.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9146.json index 71eb35e46ea..19bbbe99bc0 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9146.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9146.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9146", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T14:59:01.303", - "lastModified": "2015-04-15T15:11:49.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:17.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131165/FiyoCMS-2.0.1.8-XSS-SQL-Injection-URL-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9150.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9150.json index 45bdc86897f..f3f4612f3be 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9150.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9150.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9150", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-30T02:59:00.087", - "lastModified": "2014-12-17T16:35:51.743", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:17.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -204,6 +203,18 @@ { "url": "https://code.google.com/p/google-security-research/issues/detail?id=103", "source": "cve@mitre.org" + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=103", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9151.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9151.json index 9754ae8d43b..a4b0ddeabf8 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9151.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9151.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9151", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T16:59:01.277", - "lastModified": "2014-12-01T19:08:59.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:17.867", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2344389", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2344423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9152.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9152.json index b8710a876fe..4e743e88dce 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9152.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9152.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9152", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T16:59:02.463", - "lastModified": "2014-12-01T19:04:46.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:18.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://cgit.drupalcode.org/services/commit/?id=809aafa", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2344389", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2344423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9153.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9153.json index 5112425c453..7367c75dfc8 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9153.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9153.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9153", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T16:59:03.973", - "lastModified": "2014-12-01T19:07:27.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:18.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2344389", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2344423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9154.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9154.json index e3f5cac60b0..200ebcb0fc3 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9154.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9154.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9154", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T16:59:05.067", - "lastModified": "2014-12-05T16:32:24.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:18.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -140,6 +139,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2320693", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2320741", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9155.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9155.json index 4a26c83c785..7d888da32c5 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9155.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9155.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9155", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T16:59:06.017", - "lastModified": "2014-12-05T16:10:56.670", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:18.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -122,6 +121,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2330759", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2330763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2332169", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9156.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9156.json index c9f7cf88d53..031f36c4b87 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9156.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9156.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9156", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-01T16:59:07.030", - "lastModified": "2014-12-01T19:15:55.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:18.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -93,6 +92,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://cgit.drupalcode.org/filefield/commit/?id=3a97fe1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2304517", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2304561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9157.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9157.json index 25fae565214..eb2a0c1bd1e 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9157.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9157.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9157", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:03.243", - "lastModified": "2024-07-19T13:02:55.980", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:18.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -170,6 +169,84 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0520.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/784", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/872", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3098", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:248", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:187", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71283", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9158.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9158.json index 035ba784717..1c8142630e3 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9158.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9158.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9158", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:32.617", - "lastModified": "2014-12-12T01:40:25.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:18.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9159.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9159.json index 6b5c079b56d..bd51199398f 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9159.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9159.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9159", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:33.430", - "lastModified": "2014-12-12T01:40:55.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:18.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -387,6 +386,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9160.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9160.json index 87c40fd5fcf..cb4cee3455c 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9160.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9160.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9160", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:00.097", - "lastModified": "2017-01-03T02:59:22.783", + "lastModified": "2024-11-21T02:20:19.067", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -372,6 +371,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9161.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9161.json index 7e3cf3a224a..5b4f69b0c2f 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9161.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9161.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9161", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-30T11:59:50.610", - "lastModified": "2017-01-03T02:59:22.860", + "lastModified": "2024-11-21T02:20:19.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -467,6 +466,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=149", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/134394/Adobe-Reader-X-XI-Out-Of-Bounds-Read.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74600", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9162.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9162.json index 9e0c8d09ae0..56c1119375c 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9162.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9162.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9162", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:34.227", - "lastModified": "2018-12-20T17:53:41.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:19.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -140,6 +139,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-27.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9163.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9163.json index d88748b19f4..a6b8d882b08 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9163.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9163.json @@ -2,13 +2,8 @@ "id": "CVE-2014-9163", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:35.163", - "lastModified": "2018-12-20T17:53:32.830", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-04-13", - "cisaActionDue": "2022-05-04", - "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", - "cisaVulnerabilityName": "Adobe Flash Player Stack-Based Buffer Overflow Vulnerability", + "lastModified": "2024-11-21T02:20:19.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -46,6 +41,10 @@ } ] }, + "cisaExploitAdd": "2022-04-13", + "cisaActionDue": "2022-05-04", + "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", + "cisaVulnerabilityName": "Adobe Flash Player Stack-Based Buffer Overflow Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -144,6 +143,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-27.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9164.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9164.json index b451370a21b..493b4ed11c8 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9164.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9164.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9164", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:36.257", - "lastModified": "2018-12-20T17:53:19.847", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:19.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -140,6 +139,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-27.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9165.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9165.json index f9a65e458a7..16059c7446c 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9165.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9165.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9165", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:37.040", - "lastModified": "2014-12-12T01:45:28.383", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:20:19.623", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -388,6 +386,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9166.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9166.json index b267cc7a774..4f45451f466 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9166.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9166.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9166", "sourceIdentifier": "psirt@adobe.com", "published": "2014-12-10T21:59:37.947", - "lastModified": "2020-09-04T14:05:38.223", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:19.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -164,6 +163,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/coldfusion/apsb14-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9173.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9173.json index bc05c89415f..1e372394c38 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9173.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9173.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9173", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:09.557", - "lastModified": "2017-09-08T01:29:32.527", + "lastModified": "2024-11-21T02:20:19.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/115044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.szurek.pl/google-doc-embedder-2514-sql-injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35371", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/1023572/google-document-embedder", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9174.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9174.json index 7672b1e5857..d6edad58f11 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9174.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9174.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9174", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:10.743", - "lastModified": "2017-09-08T01:29:32.590", + "lastModified": "2024-11-21T02:20:20.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,29 @@ { "url": "https://wpvulndb.com/vulnerabilities/7692", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/71330", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99053", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://twitter.com/yoast/status/537569224307511296", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7692", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9175.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9175.json index 12d665d8a58..c1da849aa19 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9175.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9175.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9175", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:12.103", - "lastModified": "2017-09-08T01:29:32.637", + "lastModified": "2024-11-21T02:20:20.217", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98928", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129232/WordPress-wpDataTables-1.5.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35340", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.homelab.it/index.php/2014/11/23/wordpress-wpdatatables-sql-injection-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71271", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98928", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9176.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9176.json index c92873e9eb5..62118426e6f 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9176.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9176.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9176", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:13.040", - "lastModified": "2017-09-08T01:29:32.700", + "lastModified": "2024-11-21T02:20:20.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98986", "source": "cve@mitre.org" + }, + { + "url": "http://h4x0resec.blogspot.com/2014/11/wordpress-sexy-squeeze-pages-plugin.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129285/WordPress-Sexy-Squeeze-Pages-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98986", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9177.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9177.json index df33b37617b..b1b97bc6345 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9177.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9177.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9177", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:14.243", - "lastModified": "2017-09-08T01:29:32.763", + "lastModified": "2024-11-21T02:20:20.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://h4x0resec.blogspot.com/2014/11/wordpress-html5-mp3-player-with.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129286/WordPress-Html5-Mp3-Player-Full-Path-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/html5-mp3-player-with-playlist/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9178.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9178.json index 7dac0ac8776..e02de601613 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9178.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9178.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9178", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:15.213", - "lastModified": "2018-10-09T19:54:59.967", + "lastModified": "2024-11-21T02:20:20.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98897", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129212/WordPress-SP-Client-Document-Manager-2.4.1-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.itas.vn/news/itas-team-phat-hien-nhieu-lo-hong-sql-injection-trong-sp-client-document-manager-plugin-67.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534041/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98897", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9179.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9179.json index 7189ee8fc45..ec184c1348e 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9179.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9179.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9179", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:16.197", - "lastModified": "2014-12-03T19:08:07.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:20.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129103/WordPress-SupportEzzy-Ticket-System-1.2.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9180.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9180.json index 07d5a8b90bf..4ba0b1a17b0 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9180.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9180.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9180", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:17.087", - "lastModified": "2014-12-03T19:58:40.883", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:20:20.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -79,6 +77,14 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129087/Eleanor-CMS-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9181.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9181.json index 9fce10e044b..08d67a39e34 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9181.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9181.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9181", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T16:59:18.087", - "lastModified": "2021-12-10T16:58:44.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:21.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/531290", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://forums.plex.tv/index.php/topic/62832-plex-media-server/?p=583250", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140228-1_Plex_Media_Server_Authentication_bypass_local_file_disclosure_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9182.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9182.json index a32f27e5935..b956527dda5 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9182.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9182.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9182", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T18:59:00.087", - "lastModified": "2014-12-03T18:39:25.743", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:21.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129042/Anchor-CMS-0.9.2-Header-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9183.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9183.json index b2fd917d9e1..b46212ac4e0 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9183.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9183.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9183", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T18:59:01.277", - "lastModified": "2014-12-03T18:41:57.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:21.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -75,6 +74,10 @@ { "url": "http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9184.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9184.json index fe533604c96..5cf540af6e4 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9184.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9184.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9184", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-02T18:59:02.353", - "lastModified": "2014-12-03T19:00:36.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:21.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129015/ZTE-ZXDSL-831CII-Insecure-Direct-Object-Reference.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9185.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9185.json index 03c6fed9505..3200e1cce84 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9185.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9185.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9185", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:15.767", - "lastModified": "2018-10-09T19:55:00.467", + "lastModified": "2024-11-21T02:20:21.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -101,6 +100,35 @@ { "url": "https://github.com/Awilum/monstra-cms/issues/351", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129624/Morfy-CMS-1.05-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/70", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534271/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=1367", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/Awilum/monstra-cms/issues/351", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9188.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9188.json index e67d794a52f..800b06e2c7d 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9188.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9188.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9188", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-12-27T15:59:04.887", - "lastModified": "2014-12-29T23:15:03.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:21.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:P/A:P", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 9.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,23 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-344-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-350-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9190.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9190.json index 4fb3d0c9651..cade63c0d71 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9190.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9190.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9190", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-01-10T02:59:33.693", - "lastModified": "2015-01-12T21:34:14.610", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:22.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,18 @@ { "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000104.pdf", "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-008-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000104.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9191.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9191.json index 66c6d98204a..de65d8674ee 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9191.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9191.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9191", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-01-10T02:59:34.693", - "lastModified": "2016-12-08T03:06:26.910", + "lastModified": "2024-11-21T02:20:22.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -95,6 +94,29 @@ { "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-237-01", "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "http://www.securityfocus.com/bid/71952", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www2.emersonprocess.com/siteadmincenter/PM%20Central%20Web%20Documents/EMR%20EPM14001-1.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-008-01A", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-237-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9192.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9192.json index 6da3b3a281d..b9f303bb4a8 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9192.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9192.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9192", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-12-11T15:59:04.773", - "lastModified": "2019-02-01T18:06:44.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:22.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,22 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.securityfocus.com/bid/71591", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://ics-cert.us-cert.gov//advisories/ICSA-14-343-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9193.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9193.json index 5db45738787..3655eac8ad0 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9193.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9193.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9193", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-12-20T00:59:03.633", - "lastModified": "2014-12-22T15:35:56.060", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:22.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -122,6 +121,21 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-352-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9194.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9194.json index 7a285f4d609..dffbd949c1e 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9194.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9194.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9194", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-01-17T02:59:04.710", - "lastModified": "2015-03-24T16:49:07.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:22.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-14-345-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9195.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9195.json index 0a7900db0f2..c755c8b1289 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9195.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9195.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9195", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-01-17T02:59:05.630", - "lastModified": "2018-11-29T14:43:56.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:22.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-013-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37066/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9197.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9197.json index 18671ae4875..d8d70b43a00 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9197.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9197.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9197", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-01-27T19:59:00.040", - "lastModified": "2015-01-28T18:52:02.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:23.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,14 @@ "Patch", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-020-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9198.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9198.json index 491e5d06b69..df04fc007e6 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9198.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9198.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9198", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-01-27T19:59:10.810", - "lastModified": "2019-04-15T12:30:07.633", + "lastModified": "2024-11-21T02:20:23.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,22 @@ "Patch", "US Government Resource" ] + }, + { + "url": "http://www.securityfocus.com/bid/72258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/77765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-020-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-91xx/CVE-2014-9199.json b/CVE-2014/CVE-2014-91xx/CVE-2014-9199.json index 777e6726b46..0074e7d39f4 100644 --- a/CVE-2014/CVE-2014-91xx/CVE-2014-9199.json +++ b/CVE-2014/CVE-2014-91xx/CVE-2014-9199.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9199", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-01-17T02:59:06.520", - "lastModified": "2015-01-21T21:06:32.130", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:23.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-013-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9200.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9200.json index 528fc84d3ed..05a2390a3da 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9200.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9200.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9200", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-02-01T15:59:06.197", - "lastModified": "2016-12-31T02:59:14.593", + "lastModified": "2024-11-21T02:20:23.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -105,6 +104,25 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-009-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72335", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-027-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9203.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9203.json index 268a69bd7ae..9802edd703c 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9203.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9203.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9203", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-02-07T15:59:00.050", - "lastModified": "2015-02-09T19:26:44.123", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:23.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -111,6 +110,21 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.geoilandgas.com/securityadvisory", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-036-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9204.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9204.json index c3cc8b6ae4e..846074bb2ba 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9204.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9204.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9204", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-05-17T01:59:00.080", - "lastModified": "2018-04-10T15:44:35.230", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:23.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -87,6 +86,21 @@ "tags": [ "Permissions Required" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-111-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/646324", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9205.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9205.json index 68cb1a89e0c..9e5cc528ea5 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9205.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9205.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9205", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-29T10:59:02.727", - "lastModified": "2015-03-30T18:46:19.227", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:23.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,25 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.promotic.eu/en/pmdoc/News.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-091/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-062-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9206.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9206.json index a50a347bc65..ff7a5167b4c 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9206.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9206.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9206", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-14T01:59:06.610", - "lastModified": "2016-08-26T18:55:50.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:24.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -87,6 +86,21 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_File_Id=745435959&p_File_Name=SEVD-2015-050-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-055-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9207.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9207.json index b35fa0aa56f..a6e617d1798 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9207.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9207.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9207", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-14T01:59:08.220", - "lastModified": "2015-08-06T16:46:08.910", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", + "lastModified": "2024-11-21T02:20:24.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -92,6 +90,15 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-069-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9209.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9209.json index 1d6863fa8ae..056f48d56f1 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9209.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9209.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9209", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-31T01:59:19.783", - "lastModified": "2015-03-31T17:02:49.090", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", + "lastModified": "2024-11-21T02:20:24.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -91,6 +89,19 @@ { "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/646323", "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-062-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/646323", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9212.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9212.json index b9dc66303f9..5f5e6dee5d6 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9212.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9212.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9212", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T15:59:07.947", - "lastModified": "2014-12-06T01:38:31.303", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:24.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129372/Altitude-uAgent-Altitude-uCI-7.5-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9215.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9215.json index f963c2b8a74..18245e53b0c 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9215.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9215.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9215", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T15:59:08.980", - "lastModified": "2018-10-09T19:55:00.870", + "lastModified": "2024-11-21T02:20:24.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.itas.vn/news/ITAS-Team-discovered-SQL-Injection-in-PBBoard-CMS-68.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534149/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.youtube.com/watch?v=AQiGvH5xrJg", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9217.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9217.json index bd2909b7ae9..6995a558bfc 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9217.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9217.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9217", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T11:59:10.360", - "lastModified": "2017-09-08T01:29:32.857", + "lastModified": "2024-11-21T02:20:24.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -89,6 +88,23 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99571", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/1130", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.graylog2.org/news/post/0010-graylog2-v0-92", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99571", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9218.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9218.json index d43ce44db0e..7ef788b5593 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9218.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9218.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9218", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T11:59:11.877", - "lastModified": "2017-09-08T01:29:32.917", + "lastModified": "2024-11-21T02:20:25.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -372,6 +371,47 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3382", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-17.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71434", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/095729d81205f15f40d216d25917017da4c2fff8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/1ac863c7573d12012374d5d41e5c7dc5505ea6e1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/62b2c918d26cc78d1763945e3d44d1a63294a819", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9219.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9219.json index 893db86eb25..4a0d655e1d6 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9219.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9219.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9219", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T11:59:13.233", - "lastModified": "2017-09-08T01:29:32.980", + "lastModified": "2024-11-21T02:20:25.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -178,6 +177,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2014-18.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99137", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/9b2479b7216dd91a6cc2f231c0fd6b85d457f6e2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9220.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9220.json index 04277e5381d..4d8d18f9430 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9220.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9220.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9220", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T01:59:02.503", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:25.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -239,6 +238,43 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147753.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00039.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/11/30/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openvas.org/OVSA20141128.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.alienvault.com/forums/discussion/4415/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9221.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9221.json index 3b9858cb318..e3d446b8818 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9221.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9221.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9221", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-07T19:59:01.137", - "lastModified": "2023-11-07T02:23:00.090", + "lastModified": "2024-11-21T02:20:25.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -302,6 +301,77 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153825.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62071", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62663", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://strongswan.org/blog/2015/01/05/strongswan-5.2.2-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://strongswan.org/blog/2015/01/05/strongswan-denial-of-service-vulnerability-%28cve-2014-9221%29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3118", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2450-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9222.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9222.json index 1145927ff18..9437d7113c1 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9222.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9222.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9222", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:06.607", - "lastModified": "2018-08-31T10:29:00.290", + "lastModified": "2024-11-21T02:20:25.733", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -114,6 +113,48 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://mis.fortunecook.ie/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/87", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-407666.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/561444", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/105173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.allegrosoft.com/allegro-software-urges-manufacturers-to-maintain-firmware-for-highest-level-of-embedded-device-security/news-press.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9223.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9223.json index c5694903088..4fd6940f79f 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9223.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9223.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9223", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:07.730", - "lastModified": "2016-09-06T13:44:32.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:25.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://mis.fortunecook.ie/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-407666.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.allegrosoft.com/allegro-software-urges-manufacturers-to-maintain-firmware-for-highest-level-of-embedded-device-security/news-press.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9224.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9224.json index 2f18f0c0cc1..d0380f5b81a 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9224.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9224.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9224", "sourceIdentifier": "secure@symantec.com", "published": "2015-01-21T15:17:05.747", - "lastModified": "2021-08-04T18:56:05.773", + "lastModified": "2024-11-21T02:20:26.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -109,6 +108,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/91", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534527/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150119_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9225.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9225.json index 871094efae5..4be7490b2d0 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9225.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9225.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9225", "sourceIdentifier": "secure@symantec.com", "published": "2015-01-21T15:17:06.777", - "lastModified": "2021-08-04T18:56:05.773", + "lastModified": "2024-11-21T02:20:26.143", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -109,6 +108,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/91", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534527/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150119_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9226.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9226.json index 3972600857d..e3acd24e626 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9226.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9226.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9226", "sourceIdentifier": "secure@symantec.com", "published": "2015-01-21T15:17:07.713", - "lastModified": "2021-08-04T18:56:05.773", + "lastModified": "2024-11-21T02:20:26.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -109,6 +108,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130060/Symantec-SDCS-SA-SCSP-XSS-Bypass-SQL-Injection-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/91", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534527/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150119_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9234.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9234.json index e88b161023f..5276dbd831a 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9234.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9234.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9234", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:04.290", - "lastModified": "2014-12-05T14:12:19.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:26.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -101,6 +100,24 @@ { "url": "http://websecurity.com.ua/7250/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129138/D-Link-DCS-2103-Directory-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/42", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://websecurity.com.ua/7250/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9235.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9235.json index 38d72cb00df..d1256fa764a 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9235.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9235.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9235", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:05.197", - "lastModified": "2014-12-05T14:10:46.923", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:27.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129141/Zoph-0.9.1-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/45", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9236.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9236.json index 7d840aaa9fd..4688a98c607 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9236.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9236.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9236", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:06.040", - "lastModified": "2014-12-05T14:05:32.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:27.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129141/Zoph-0.9.1-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/45", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9237.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9237.json index c9cca54ac0b..451c7cfc566 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9237.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9237.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9237", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:07.070", - "lastModified": "2014-12-05T14:04:50.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:27.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129129/Proticaret-E-Commerce-Script-3.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/43", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9238.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9238.json index bd7ca80fe29..e5150c496e8 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9238.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9238.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9238", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:08.057", - "lastModified": "2017-09-09T01:29:01.470", + "lastModified": "2024-11-21T02:20:27.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -105,6 +104,28 @@ { "url": "http://www.securityfocus.com/bid/71484", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129138/D-Link-DCS-2103-Directory-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/42", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://websecurity.com.ua/7250/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71484", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9239.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9239.json index b041d3866db..c5f86a71b75 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9239.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9239.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9239", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:08.963", - "lastModified": "2020-06-03T14:54:57.137", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:27.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -210,6 +209,25 @@ { "url": "http://seclists.org/fulldisclosure/2014/Nov/20", "source": "cve@mitre.org" + }, + { + "url": "http://community.invisionpower.com/blogs/entry/9704-active-security-exploit/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://community.invisionpower.com/blogs/entry/9705-ipboard-33x-34x-security-update/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/20", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9240.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9240.json index 8546187482b..3f58a072e71 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9240.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9240.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9240", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:10.400", - "lastModified": "2014-12-05T13:56:03.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:27.793", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://blog.mybb.com/2014/11/13/mybb-1-8-2-released-security-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129109/MyBB-1.8.1-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9241.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9241.json index 19b9205298e..3c704042211 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9241.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9241.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9241", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:11.587", - "lastModified": "2014-12-05T13:55:17.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:27.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://blog.mybb.com/2014/11/13/mybb-1-8-2-released-security-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129109/MyBB-1.8.1-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9242.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9242.json index e4ae19faebe..847629e8f8b 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9242.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9242.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9242", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:12.557", - "lastModified": "2014-12-05T13:54:38.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:28.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129140/WebsiteBaker-2.8.3-XSS-SQL-Injection-HTTP-Response-Splitting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/44", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9243.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9243.json index 39739862911..89e860a3119 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9243.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9243.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9243", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-03T21:59:13.463", - "lastModified": "2014-12-05T13:50:55.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:28.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129140/WebsiteBaker-2.8.3-XSS-SQL-Injection-HTTP-Response-Splitting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/44", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9245.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9245.json index f44dd6e6fcd..2c1b1ed1323 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9245.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9245.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9245", "sourceIdentifier": "cret@cert.org", "published": "2014-12-15T18:59:20.787", - "lastModified": "2016-03-21T16:03:23.103", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:28.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 permite a atacantes remotos obtener informaci\u00f3n sensible mediante el intento de una acci\u00f3n de renombrar un producto con un nombre nuevo inv\u00e1lido y posteriormente la lectura de una traza de pila, tal y como fue demostrado por informaci\u00f3n de URL interna, tambi\u00e9n conocido como ZEN-15382." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in 5.0. Will be addressed in next 425 maintenance release.", - "lastModified": "2016-03-21T12:03:23.103" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in 5.0. Will be addressed in next 425 maintenance release.", + "lastModified": "2016-03-21T12:03:23.103" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9247.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9247.json index e02740b8d10..bf269b68ca9 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9247.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9247.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9247", "sourceIdentifier": "cret@cert.org", "published": "2014-12-15T18:59:21.800", - "lastModified": "2016-03-21T16:20:02.023", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:28.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 permite a usuarios remotos autenticados obtener informaci\u00f3n sensible de (1)cuentas de usuarios, (2) direcciones de email, y (3) role mediante la visita a la p\u00e1gina ZenUsers (tambi\u00e9n conocido como User Manager), tambi\u00e9n conocido como ZEN-15389." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in versions 5.1.1, 4.2.5.SP650, and 4.2.4.SP854", - "lastModified": "2016-03-21T12:20:02.023" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in versions 5.1.1, 4.2.5.SP650, and 4.2.4.SP854", + "lastModified": "2016-03-21T12:20:02.023" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9248.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9248.json index ad7f23b66a9..d7487f65875 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9248.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9248.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9248", "sourceIdentifier": "cret@cert.org", "published": "2014-12-15T18:59:22.863", - "lastModified": "2016-03-21T16:21:33.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:28.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 no requiere contrase\u00f1as complejas, lo que facilita a atacantes remotos obtener el acceso a trav\u00e9s de un ataque de fuerza bruta, tambi\u00e9n conocido como ZEN-15406." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in 5.1.1", - "lastModified": "2016-03-21T12:21:33.283" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in 5.1.1", + "lastModified": "2016-03-21T12:21:33.283" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9249.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9249.json index aae2ab86d96..3792a1aa723 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9249.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9249.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9249", "sourceIdentifier": "cret@cert.org", "published": "2014-12-15T18:59:23.847", - "lastModified": "2016-03-21T16:22:25.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:28.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "La configuraci\u00f3n por defecto de Zenoss Core anterior a 5 permite a atacantes remotos leer o modificar informaci\u00f3n de la base de datos mediante la conexi\u00f3n a puertos abiertos no especificados, tambi\u00e9n conocido como ZEN-15408." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in 5.0.", - "lastModified": "2016-03-21T12:22:25.257" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -169,6 +161,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in 5.0.", + "lastModified": "2016-03-21T12:22:25.257" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9250.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9250.json index 39329113d12..8e4e896e70c 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9250.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9250.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9250", "sourceIdentifier": "cret@cert.org", "published": "2014-12-15T18:59:24.893", - "lastModified": "2016-03-21T16:23:32.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:28.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 no incluye el indicador HTTPOnly en una cabecera Set-Cookie para la cookie de autenticaci\u00f3n, lo que facilita a atacantes remotos obtener informaci\u00f3n de credenciales a trav\u00e9s del acceso de secuencias de comandos a esta cookie, tambi\u00e9n conocido como ZEN-10418." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in versions 5.0 and 4.2.5.SP80", - "lastModified": "2016-03-21T12:23:32.640" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in versions 5.0 and 4.2.5.SP80", + "lastModified": "2016-03-21T12:23:32.640" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9251.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9251.json index 8645d1c52d3..81766495252 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9251.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9251.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9251", "sourceIdentifier": "cret@cert.org", "published": "2014-12-15T18:59:25.847", - "lastModified": "2016-03-21T16:31:49.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:29.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 utiliza un algoritmo d\u00e9bil para crear hashes de contrase\u00f1as, lo que facilita a atacantes dependientes de contexto obtener valores en texto plano a trav\u00e9s de un ataque de fuerza bruta sobre los valores de hash, tambi\u00e9n conocido como ZEN-15413." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in 5.1.1", - "lastModified": "2016-03-21T12:31:49.427" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in 5.1.1", + "lastModified": "2016-03-21T12:31:49.427" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9252.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9252.json index baf234b51a9..d276244294b 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9252.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9252.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9252", "sourceIdentifier": "cret@cert.org", "published": "2014-12-15T18:59:26.817", - "lastModified": "2016-03-21T16:36:16.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:29.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Zenoss Core hasta 5 Beta 3 almacena contrase\u00f1as en texto plano en la base de datos de la sesi\u00f3n, lo que podr\u00eda permitir a usuarios locales obtener informaci\u00f3n sensible mediante la lectura de las entradas en la base de datos, tambi\u00e9n conocido como ZEN-15416." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in 5.1.1", - "lastModified": "2016-03-21T12:36:16.473" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -189,6 +181,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in 5.1.1", + "lastModified": "2016-03-21T12:36:16.473" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9253.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9253.json index e3db6aaa1c8..0b6182a05f9 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9253.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9253.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9253", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-17T18:59:02.533", - "lastModified": "2017-09-08T01:29:33.043", + "lastModified": "2024-11-21T02:20:29.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -133,8 +132,8 @@ "url": "https://github.com/splitbrain/dokuwiki/commit/778ddf6f2cd9ed38b9db2d73e823b8c21243a960", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -143,6 +142,62 @@ "tags": [ "Release Notes" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0540.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/1050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://security.szurek.pl/dokuwiki-20140929a-xss.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71671", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99291", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/splitbrain/dokuwiki/commit/778ddf6f2cd9ed38b9db2d73e823b8c21243a960", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://www.dokuwiki.org/changes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9254.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9254.json index e87224636ec..c0df6599e3b 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9254.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9254.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9254", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:02.140", - "lastModified": "2015-01-03T01:30:19.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:29.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.szurek.pl/minibb-31-blind-sql-injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.minibb.com/forums/news-9/blind-sql-injection-fix-6430.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9258.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9258.json index 29ebf56f603..645ab9d7d13 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9258.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9258.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9258", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:17.017", - "lastModified": "2015-04-18T01:59:34.683", + "lastModified": "2024-11-21T02:20:29.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -122,6 +121,56 @@ { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/115957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61367", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.szurek.pl/glpi-085-blind-sql-injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35528", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.glpi-project.org/spip.php?page=annonce&id_breve=334&lang=en", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:167", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9261.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9261.json index a207c9b020a..0a66c32a5d2 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9261.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9261.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9261", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-23T16:59:00.070", - "lastModified": "2020-02-18T18:20:01.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:29.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/show/osvdb/119412", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130739/Codoforum-2.5.1-Arbitrary-File-Download.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://security.szurek.pl/codoforum-251-arbitrary-file-download.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36320", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://codoforum.com/documentation/roadmap", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9263.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9263.json index 3564b46fe15..6da80cdae34 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9263.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9263.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9263", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:05.357", - "lastModified": "2014-12-23T17:17:27.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:30.173", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,30 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-397/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/71488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-393/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-394/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-395/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-396/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-397/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9264.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9264.json index 4ac6fdf9bfa..750ffc1910b 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9264.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9264.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9264", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-11T15:59:05.757", - "lastModified": "2014-12-12T17:15:08.610", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:30.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-415/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-412/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-413/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-414/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-415/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9265.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9265.json index e75957f517e..4b1ab4d8335 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9265.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9265.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9265", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:06.793", - "lastModified": "2014-12-09T18:50:37.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:30.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-401/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/71486", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-401/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9266.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9266.json index 6f6599ccaae..983bf431732 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9266.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9266.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9266", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:07.823", - "lastModified": "2014-12-23T17:13:37.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:30.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-400/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/71489", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-400/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9267.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9267.json index ff379d4a8b4..5bd23825147 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9267.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9267.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9267", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:08.760", - "lastModified": "2014-12-09T18:48:53.287", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:30.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://support.ptc.com/appserver/cs/view/solution.jsp?n=CS181001", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/71491", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-398/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-399/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.ptc.com/appserver/cs/view/solution.jsp?n=CS181001", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9268.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9268.json index 26c4198e4f6..63abc32223c 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9268.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9268.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9268", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:09.793", - "lastModified": "2015-12-16T19:00:54.173", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:30.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/", "source": "cve@mitre.org" + }, + { + "url": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9269.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9269.json index 21bb200e0e2..b8127de2f55 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9269.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9269.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9269", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:01.117", - "lastModified": "2021-01-12T18:05:59.507", + "lastModified": "2024-11-21T02:20:31.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -313,6 +312,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/511564cc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17890", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9270.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9270.json index 9e3cc2f4408..a1bce5b9d82 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9270.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9270.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9270", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:10.747", - "lastModified": "2021-01-12T18:05:59.507", + "lastModified": "2024-11-21T02:20:31.207", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -336,6 +335,41 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71372", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/0bff06ec", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17583", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9271.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9271.json index e311c4f9321..98c0d87b0d6 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9271.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9271.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9271", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:02.587", - "lastModified": "2021-03-04T20:30:55.123", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:31.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -353,6 +352,61 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/867", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/902", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/924", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/9fb8cf36f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17874", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9272.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9272.json index 79845da4f79..701c0f3b52f 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9272.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9272.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9272", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:03.553", - "lastModified": "2021-01-12T18:05:59.507", + "lastModified": "2024-11-21T02:20:31.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -303,6 +302,33 @@ { "url": "https://www.mantisbt.org/bugs/view.php?id=17297", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/05378e00", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17297", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9273.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9273.json index 674bb970566..4318a4fa1a8 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9273.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9273.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9273", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-08T16:59:11.947", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:20:31.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -195,8 +194,8 @@ "source": "secalert@redhat.com", "tags": [ "Exploit", - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -204,8 +203,8 @@ "source": "secalert@redhat.com", "tags": [ "Exploit", - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -218,6 +217,87 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0301.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1378.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/25/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/04/14", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167756", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/libguestfs/hivex/commit/357f26fa64fd1d9ccac2331fe174a8ee9c607adb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.redhat.com/archives/libguestfs/2014-October/msg00235.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9274.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9274.json index 6218eacaaf5..42563b86cd4 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9274.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9274.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9274", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:10.037", - "lastModified": "2016-12-22T02:59:21.250", + "lastModified": "2024-11-21T02:20:31.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -166,6 +165,50 @@ { "url": "https://security.gentoo.org/glsa/201507-06", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0533.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62811", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:007", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/04/15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9275.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9275.json index 7daec786feb..dcb8f26ed2d 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9275.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9275.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9275", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:11.050", - "lastModified": "2016-12-22T02:59:21.313", + "lastModified": "2024-11-21T02:20:32.023", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -112,6 +111,46 @@ { "url": "https://security.gentoo.org/glsa/201507-06", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0533.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62811", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:007", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/03/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/04/15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9276.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9276.json index 62e63532f58..16561ea4db4 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9276.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9276.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9276", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-04T21:59:01.353", - "lastModified": "2015-01-06T14:16:03.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:32.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -301,6 +300,30 @@ { "url": "https://phabricator.wikimedia.org/T73111", "source": "cve@mitre.org" + }, + { + "url": "http://securitytracker.com/id?1031301", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/03/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/04/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T73111", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9277.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9277.json index 63aceeff775..e9a9a7d67dc 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9277.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9277.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9277", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-04T21:59:02.650", - "lastModified": "2015-01-06T16:46:13.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:32.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -308,6 +307,37 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://securitytracker.com/id?1031301", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2014/dsa-3100", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/03/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/04/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T73478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9278.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9278.json index b4e62bac1ad..4718cfc2aee 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9278.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9278.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9278", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-06T15:59:07.920", - "lastModified": "2017-09-08T01:29:33.167", + "lastModified": "2024-11-21T02:20:32.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -120,6 +119,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99090", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0425.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://thread.gmane.org/gmane.comp.encryption.kerberos.general/15855", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/02/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/04/17", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71420", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mindrot.org/show_bug.cgi?id=1867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169843", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99090", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9279.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9279.json index c714896786e..8ea88e661ec 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9279.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9279.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9279", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:12.917", - "lastModified": "2021-01-12T18:05:59.507", + "lastModified": "2024-11-21T02:20:32.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -327,6 +326,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/863", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=17877", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71359", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/0826cef8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9280.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9280.json index 7493b895592..ff59b83719e 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9280.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9280.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9280", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:13.807", - "lastModified": "2017-09-08T01:29:33.277", + "lastModified": "2024-11-21T02:20:32.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -110,6 +109,44 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/923", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=17875", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71361", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99016", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/599364b2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9281.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9281.json index ee3d2b1361d..5e7be8c5e5c 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9281.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9281.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9281", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:12.083", - "lastModified": "2017-09-08T01:29:33.340", + "lastModified": "2024-11-21T02:20:33.160", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,45 @@ { "url": "https://www.mantisbt.org/bugs/view.php?id=17876", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/867", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/913", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99038", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/e5fc835a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17876", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9282.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9282.json index 111d5497b48..c8fcebcaab6 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9282.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9282.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9282", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-24T20:59:02.503", - "lastModified": "2015-02-25T17:14:19.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:33.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN42768331/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9283.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9283.json index 92fd6e655e0..55dbe2d4a68 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9283.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9283.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9283", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-03T11:59:01.337", - "lastModified": "2015-03-03T17:47:37.100", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:33.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ { "url": "https://wordpress.org/plugins/captcha/changelog/", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN93727681/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://wordpress.org/plugins/captcha/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9292.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9292.json index cfb306736e1..4ac5e2972d5 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9292.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9292.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9292", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-05T22:59:00.067", - "lastModified": "2014-12-08T18:51:32.607", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)", + "lastModified": "2024-11-21T02:20:33.793", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +78,14 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://codevigilant.com/disclosure/wp-plugin-jrss-widget-ssrfxspa/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9293.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9293.json index 23d4f47d69f..ca27f6fee86 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9293.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9293.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9293", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-20T02:59:00.053", - "lastModified": "2021-11-17T22:15:37.470", + "lastModified": "2024-11-21T02:20:33.933", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-332: Insufficient Entropy in PRNG", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +99,10 @@ "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=144182594518755&w=2", "source": "cve@mitre.org" @@ -167,6 +169,105 @@ { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0541.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://bk1.ntp.org/ntp-dev/ntpd/ntp_config.c?PAGE=diffs&REV=4b6089c5KXhXqZqocF0DMXnQQsjOuw", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://bugs.ntp.org/show_bug.cgi?id=2665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142469153211996&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142590659431171&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144182594518755&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.ntp.org/bin/view/Main/SecurityNotice", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/852879", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71757", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04916783", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-332: Insufficient Entropy in PRNG" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9294.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9294.json index 9294d946110..0fffaa2fe8d 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9294.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9294.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9294", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-20T02:59:01.587", - "lastModified": "2021-11-17T22:15:38.177", + "lastModified": "2024-11-21T02:20:34.133", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +99,10 @@ "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=144182594518755&w=2", "source": "cve@mitre.org" @@ -167,6 +169,105 @@ { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0541.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://bk1.ntp.org/ntp-dev/util/ntp-keygen.c?PAGE=diffs&REV=4eae1b72298KRoBQmX-y8URCiRPH5g", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://bugs.ntp.org/show_bug.cgi?id=2666", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142469153211996&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142590659431171&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144182594518755&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.ntp.org/bin/view/Main/SecurityNotice", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/852879", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71762", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04916783", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9295.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9295.json index 7e24810408e..69e315f5b53 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9295.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9295.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9295", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-20T02:59:02.693", - "lastModified": "2021-11-17T22:15:38.877", + "lastModified": "2024-11-21T02:20:34.317", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -126,6 +125,10 @@ "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=144182594518755&w=2", "source": "cve@mitre.org" @@ -200,6 +203,138 @@ { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0541.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acc4dN1TbM1tRJrbPcA4yc1aTdA", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acdf3tUSFizXcv_X4b77Jt_Y-cg", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acf55dxKfhb6MuYQwzu8eDlS97g", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://bugs.ntp.org/show_bug.cgi?id=2667", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://bugs.ntp.org/show_bug.cgi?id=2668", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://bugs.ntp.org/show_bug.cgi?id=2669", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142469153211996&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142590659431171&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144182594518755&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.ntp.org/bin/view/Main/SecurityNotice", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/852879", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71761", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-417665.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04916783", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-92xx/CVE-2014-9296.json b/CVE-2014/CVE-2014-92xx/CVE-2014-9296.json index e01268b8322..c1dd6f81176 100644 --- a/CVE-2014/CVE-2014-92xx/CVE-2014-9296.json +++ b/CVE-2014/CVE-2014-92xx/CVE-2014-9296.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9296", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-20T02:59:03.837", - "lastModified": "2021-11-17T22:15:39.130", + "lastModified": "2024-11-21T02:20:34.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -100,6 +99,10 @@ "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=144182594518755&w=2", "source": "cve@mitre.org" @@ -158,6 +161,96 @@ { "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0541.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548ad06feXHK1HlZoY-WZVyynwvwAg", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://bugs.ntp.org/show_bug.cgi?id=2670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142590659431171&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142853370924302&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144182594518755&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.ntp.org/bin/view/Main/SecurityNotice", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/852879", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141222-ntpd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9300.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9300.json index 1a9e1d1937a..792b5bf6b8a 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9300.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9300.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9300", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-07T21:59:01.367", - "lastModified": "2015-02-17T15:51:22.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:34.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/bugtraq/2014/Jul/72", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-0_Alfresco_Community_Edition_Multiple_SSRF_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9301.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9301.json index b7cc8445c18..79fec507b31 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9301.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9301.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9301", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-07T21:59:02.570", - "lastModified": "2015-02-17T15:29:28.307", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)", + "lastModified": "2024-11-21T02:20:34.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +85,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/bugtraq/2014/Jul/72", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-0_Alfresco_Community_Edition_Multiple_SSRF_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9302.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9302.json index 748719e4515..4a7fde1a0e7 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9302.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9302.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9302", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-07T21:59:03.727", - "lastModified": "2014-12-09T20:06:35.503", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)", + "lastModified": "2024-11-21T02:20:35.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +85,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/bugtraq/2014/Jul/72", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-0_Alfresco_Community_Edition_Multiple_SSRF_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9303.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9303.json index c8dd629cd99..6e579d9a2fd 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9303.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9303.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9303", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-07T21:59:04.710", - "lastModified": "2018-10-09T19:55:02.200", + "lastModified": "2024-11-21T02:20:35.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534128/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.redteam-pentesting.de/advisories/rt-sa-2014-011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9304.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9304.json index 262bc0fac95..445c62f1e6f 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9304.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9304.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9304", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-07T21:59:05.757", - "lastModified": "2021-12-10T16:58:44.180", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:35.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/531290", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://forums.plex.tv/index.php/topic/62832-plex-media-server/?p=583250", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140228-1_Plex_Media_Server_Authentication_bypass_local_file_disclosure_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9305.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9305.json index 417ae8147dc..b14bac9b015 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9305.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9305.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9305", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:14.777", - "lastModified": "2014-12-09T18:21:00.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:35.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -105,6 +104,39 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/show/osvdb/115286", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129395/Cart66-Lite-WordPress-Ecommerce-1.5.1.17-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://security.szurek.pl/cart66-lite-wordpress-ecommerce-15117-blind-sql-injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35459", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/cart66-lite/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9308.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9308.json index 12d4a83e473..0b3642ed238 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9308.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9308.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9308", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:17.450", - "lastModified": "2015-01-16T16:29:21.680", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", + "lastModified": "2024-11-21T02:20:35.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -109,6 +107,43 @@ "tags": [ "Patch" ] + }, + { + "url": "http://osvdb.org/show/osvdb/116806", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129875/WordPress-Shopping-Cart-3.0.4-Unrestricted-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://security.szurek.pl/wordpress-shopping-cart-304-unrestricted-file-upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/wp-easycart/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9311.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9311.json index 46e1ebcb884..83bd1b00b4c 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9311.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9311.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9311", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T14:59:02.257", - "lastModified": "2015-04-15T15:15:13.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:36.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -93,6 +92,27 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/131321/WordPress-Shareaholic-7.6.0.3-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://security.szurek.pl/shareaholic-7603-xss.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/shareaholic/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9316.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9316.json index 351657967dc..5fa58f35382 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9316.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9316.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9316", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:14.067", - "lastModified": "2023-11-07T02:23:03.690", + "lastModified": "2024-11-21T02:20:36.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -139,6 +138,18 @@ { "url": "https://www.ffmpeg.org/security.html", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=0eecf40935b22644e6cd74c586057237ecfd6844", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9317.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9317.json index 515533185ed..b5578e9f2ab 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9317.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9317.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9317", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:16.177", - "lastModified": "2023-11-07T02:23:03.743", + "lastModified": "2024-11-21T02:20:36.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -146,6 +145,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=79ceaf827be0b070675d4cd0a55c3386542defd8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9318.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9318.json index 8f94ea5daf1..b21cbff706a 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9318.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9318.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9318", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:17.083", - "lastModified": "2023-11-07T02:23:03.820", + "lastModified": "2024-11-21T02:20:36.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -142,6 +141,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=1d3a3b9f8907625b361420d48fe05716859620ff", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9319.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9319.json index 38e7cad50d0..b4277e8c114 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9319.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9319.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9319", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:18.113", - "lastModified": "2023-11-07T02:23:03.913", + "lastModified": "2024-11-21T02:20:36.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -142,6 +141,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=ea38e5a6b75706477898eb1e6582d667dbb9946c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9322.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9322.json index 98f48852bd9..7c9e35cddd3 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9322.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9322.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9322", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-17T11:59:02.383", - "lastModified": "2023-11-07T02:23:04.003", + "lastModified": "2024-11-21T02:20:37.153", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -374,6 +373,174 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f442be2fb22be02cafa606f1769fa1e6f894441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722450701342&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722544401658&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/115919", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-1998.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-2031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62336", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://source.android.com/security/bulletin/2016-04-02.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36266", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2491-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172806", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://help.joyent.com/entries/98788667-Security-Advisory-ZDI-CAN-3263-ZDI-CAN-3284-and-ZDI-CAN-3364-Vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9323.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9323.json index 01fe4b5a9ad..28409bb0ac7 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9323.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9323.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9323", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:14.357", - "lastModified": "2021-03-05T15:23:15.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:37.347", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -180,6 +179,57 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0523.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://tracker.firebirdsql.org/browse/CORE-4630", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3109", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.firebirdsql.org/en/news/security-updates-for-v2-1-and-v2-5-series-66011/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:172", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://usn.ubuntu.com/3929-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9324.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9324.json index cf5d7664bb1..383bd3af618 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9324.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9324.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9324", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:18.503", - "lastModified": "2017-01-03T02:59:23.970", + "lastModified": "2024-11-21T02:20:37.503", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -248,6 +247,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/59875", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62662", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:043", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.otrs.com/security-advisory-2014-06-incomplete-access-control/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9325.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9325.json index 341d53dc505..d0a72fc332d 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9325.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9325.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9325", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:03.157", - "lastModified": "2015-01-03T01:29:25.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:37.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,34 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129654/TWiki-6.0.1-QUERYSTRING-QUERYPARAMSTRING-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/81", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-9325", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031399", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9326.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9326.json index 3c094a3c465..9541c5236a0 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9326.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9326.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9326", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:03.630", - "lastModified": "2017-01-03T02:59:24.050", + "lastModified": "2024-11-21T02:20:37.797", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-295: Improper Certificate Validation", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -383,6 +381,18 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1032305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/16000/000/sol16090.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-295: Improper Certificate Validation" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9328.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9328.json index e8ce1fb58e6..4488e26b8e4 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9328.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9328.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9328", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:02.577", - "lastModified": "2017-01-03T02:59:24.127", + "lastModified": "2024-11-21T02:20:37.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -143,6 +142,57 @@ { "url": "https://security.gentoo.org/glsa/201512-08", "source": "cve@mitre.org" + }, + { + "url": "http://blog.clamav.net/2015/01/clamav-0986-has-been-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148950.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148958.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62536", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62757", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securitytracker.com/id/1031672", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72372", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2488-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9330.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9330.json index d4fbbd1c552..1fa61578f28 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9330.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9330.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9330", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-20T15:59:04.423", - "lastModified": "2018-01-05T02:29:55.133", + "lastModified": "2024-11-21T02:20:38.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -111,6 +110,46 @@ { "url": "https://security.gentoo.org/glsa/201701-16", "source": "cve@mitre.org" + }, + { + "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-1546.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-1547.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/97", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3273", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71789", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-16", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9331.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9331.json index 2518842182d..33e51ff14a0 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9331.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9331.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9331", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T16:59:01.657", - "lastModified": "2018-10-09T19:55:02.433", + "lastModified": "2024-11-21T02:20:38.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,36 @@ { "url": "http://www.securityfocus.com/bid/72464", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130219/ManageEngine-Desktop-Central-9-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35980", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.manageengine.com/products/desktop-central/cve20149331-cross-site-request-forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534604/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72464", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9334.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9334.json index 7afb41f63c4..da7519c5fe9 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9334.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9334.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9334", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:08.760", - "lastModified": "2017-09-08T01:29:33.387", + "lastModified": "2024-11-21T02:20:38.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99474", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129623/WordPress-Bird-Feeder-1.2.3-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/69", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=1372", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9335.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9335.json index a8639665d30..bab4ebb7d93 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9335.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9335.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9335", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:19.487", - "lastModified": "2017-09-08T01:29:33.450", + "lastModified": "2024-11-21T02:20:38.537", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99502", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129575/WordPress-DandyID-Services-ID-1.5.9-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99502", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9336.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9336.json index b8663113c2a..e26508e9084 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9336.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9336.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9336", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:20.300", - "lastModified": "2014-12-22T12:45:49.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:38.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129576/WordPress-iTwitter-WP-0.04-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/72", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9337.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9337.json index 6cc688c9e24..2d79d012823 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9337.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9337.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9337", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:21.127", - "lastModified": "2014-12-22T12:47:41.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:38.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129577/Mikiurl-WordPress-Eklentisi-2.0-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9338.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9338.json index 0db73cf558a..5135b5e64ec 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9338.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9338.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9338", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:21.910", - "lastModified": "2014-12-22T12:48:08.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:38.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129578/WordPress-O2Tweet-0.0.4-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9339.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9339.json index 95ea98c5e84..6185a93d03c 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9339.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9339.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9339", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:22.753", - "lastModified": "2014-12-22T12:48:58.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:39.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129580/WordPress-SPNbabble-1.4.1-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9340.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9340.json index aff91ae86ad..2f8c9baa43c 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9340.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9340.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9340", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:23.503", - "lastModified": "2014-12-22T12:49:24.833", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:39.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129581/WordPress-wpCommentTwit-0.5-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9341.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9341.json index c799144439c..82e6e5785f7 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9341.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9341.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9341", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:24.300", - "lastModified": "2014-12-22T12:49:52.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:39.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129582/WordPress-yURL-ReTwitt-WP-1.4-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9342.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9342.json index 21d98ba5382..2668c3f0bc2 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9342.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9342.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9342", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T11:59:14.233", - "lastModified": "2021-05-03T11:15:07.657", + "lastModified": "2024-11-21T02:20:39.537", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15939.html", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534137/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/csp/article/K15939", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15939.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9343.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9343.json index 2afdfdf4c67..ebe247d3e44 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9343.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9343.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9343", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:15.870", - "lastModified": "2017-09-08T01:29:33.513", + "lastModified": "2024-11-21T02:20:39.690", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +100,37 @@ { "url": "https://github.com/GlobizSolutions/snowfox/releases", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/114850", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129162/Snowfox-CMS-1.0-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5206.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/GlobizSolutions/snowfox/commit/55a8e44a9d9a9a788cc1cde6baf0c2c67e0c736a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/GlobizSolutions/snowfox/releases", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9344.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9344.json index a19221a62d6..dd8fdbba77f 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9344.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9344.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9344", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:16.840", - "lastModified": "2017-09-08T01:29:33.560", + "lastModified": "2024-11-21T02:20:39.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ "tags": [ "Patch" ] + }, + { + "url": "http://osvdb.org/show/osvdb/114819", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129164/Snowfox-CMS-1.0-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5205.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/GlobizSolutions/snowfox/releases", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9345.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9345.json index e3e0c1086b7..999c09ec5ae 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9345.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9345.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9345", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:17.730", - "lastModified": "2014-12-09T21:49:10.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:40.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/115317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129390/Advertise-With-Pleasure-AWP-6.6-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35463", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9346.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9346.json index 44b8d63833d..b926567031e 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9346.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9346.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9346", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:18.713", - "lastModified": "2019-06-26T17:43:55.300", + "lastModified": "2024-11-21T02:20:40.177", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -138,6 +137,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/60511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2385933", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2386615", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9347.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9347.json index 64415d54097..71dc17d8442 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9347.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9347.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9347", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:19.653", - "lastModified": "2017-09-08T01:29:33.667", + "lastModified": "2024-11-21T02:20:40.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99005", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/115038", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35365", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9348.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9348.json index d9b7d2cd66c..7b6c115ee8d 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9348.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9348.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9348", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:20.637", - "lastModified": "2017-09-08T01:29:33.717", + "lastModified": "2024-11-21T02:20:40.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98951", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129229/RobotStats-1.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35344", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98951", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9349.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9349.json index aafe8d79edf..0504793f7cb 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9349.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9349.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9349", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:21.447", - "lastModified": "2017-09-08T01:29:33.763", + "lastModified": "2024-11-21T02:20:40.613", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98950", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129230/RobotStats-1.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35342", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98950", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9350.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9350.json index e7ec0e847b2..886cb0b0f27 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9350.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9350.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9350", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-08T16:59:22.370", - "lastModified": "2017-09-08T01:29:33.827", + "lastModified": "2024-11-21T02:20:40.760", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -113,6 +112,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98927", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129227/TP-Link-TL-WR740N-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35345", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/115017", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5210.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98927", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9351.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9351.json index f51728408c7..efb89bc1723 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9351.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9351.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9351", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:19.113", - "lastModified": "2014-12-10T16:56:45.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:40.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -113,6 +112,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145172.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145173.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145650.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71301", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/teeworlds/teeworlds/commit/a766cb44bcffcdb0b88e776d01c5ee1323d44f85", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.teeworlds.com/?page=news&id=11200", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9352.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9352.json index 100391c98ae..7e896038ee1 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9352.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9352.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9352", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-09T23:59:20.147", - "lastModified": "2018-10-09T19:55:02.903", + "lastModified": "2024-11-21T02:20:41.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141031-0_Scalix_Web_Access_XXE_v10.txt", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533861/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141031-0_Scalix_Web_Access_XXE_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9353.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9353.json index e7e03b81b17..d80230eb014 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9353.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9353.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9353", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T11:59:05.403", - "lastModified": "2015-02-06T16:06:56.100", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:41.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kb.netapp.com/support/index?page=content&id=9010020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9354.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9354.json index 8c49a0180a5..a8995eb960f 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9354.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9354.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9354", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T11:59:06.590", - "lastModified": "2015-02-09T14:04:24.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:41.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kb.netapp.com/support/index?page=content&id=9010021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9355.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9355.json index 48641987e10..f39e9f4f55a 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9355.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9355.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9355", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:25.253", - "lastModified": "2019-07-10T18:03:02.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:41.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,17 @@ { "url": "http://secunia.com/advisories/61265", "source": "cve@mitre.org" + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2014-9355", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61265", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9357.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9357.json index 4bf1619a071..1f907a53db8 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9357.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9357.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9357", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:15.950", - "lastModified": "2023-11-07T02:23:04.363", + "lastModified": "2024-11-21T02:20:41.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9358.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9358.json index 8f42d1848f2..b22fbb53d14 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9358.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9358.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9358", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:16.843", - "lastModified": "2023-11-07T02:23:04.413", + "lastModified": "2024-11-21T02:20:41.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ { "url": "https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534215/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9360.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9360.json index 7a750801b7c..e460760a313 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9360.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9360.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9360", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T15:59:23.597", - "lastModified": "2018-10-09T19:55:03.543", + "lastModified": "2024-11-21T02:20:42.030", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -89,6 +87,19 @@ { "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141031-0_Scalix_Web_Access_XXE_v10.txt", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Oct/133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/533861/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141031-0_Scalix_Web_Access_XXE_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9361.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9361.json index 0f5bf0cde01..1baa10d82ed 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9361.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9361.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9361", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T20:59:00.070", - "lastModified": "2014-12-11T13:49:30.813", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:42.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2299467", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2300369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9362.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9362.json index bc5e28735b1..59570643e2f 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9362.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9362.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9362", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T20:59:01.510", - "lastModified": "2014-12-11T18:56:30.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:42.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -121,6 +120,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2295975", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2296511", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9363.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9363.json index 35df50a7049..8ef0130b881 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9363.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9363.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9363", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T20:59:02.617", - "lastModified": "2014-12-11T17:34:46.403", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:20:42.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -122,6 +120,22 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2295975", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2296511", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9364.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9364.json index 1274828b8a7..52de92e8f8d 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9364.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9364.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9364", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-10T20:59:03.697", - "lastModified": "2014-12-11T17:36:33.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:42.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.drupal.org/node/2299467", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2300369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9365.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9365.json index c290a850cf4..103d11681f1 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9365.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9365.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9365", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T11:59:07.063", - "lastModified": "2019-10-25T11:53:59.117", + "lastModified": "2024-11-21T02:20:42.697", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-295: Improper Certificate Validation", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -577,6 +575,66 @@ { "url": "https://www.python.org/downloads/release/python-279/", "source": "cve@mitre.org" + }, + { + "url": "http://bugs.python.org/issue22417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71639", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2016:1166", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:1162", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:1868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.python.org/dev/peps/pep-0476/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://www.python.org/downloads/release/python-279/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-295: Improper Certificate Validation" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9367.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9367.json index 6fa84021a2d..0961b127b87 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9367.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9367.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9367", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:04.170", - "lastModified": "2015-01-03T01:28:02.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:42.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,34 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129655/TWiki-6.0.0-6.0.1-WebSearch-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/82", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-9367", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9368.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9368.json index 75202571bfb..a27a7aa550e 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9368.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9368.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9368", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:26.220", - "lastModified": "2014-12-22T12:50:14.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:43.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129579/WordPress-twitterDash-2.1-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9369.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9369.json index c4f6062cbe3..151b13f65ae 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9369.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9369.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9369", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-07T02:59:00.067", - "lastModified": "2015-03-09T15:09:42.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:43.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -147,6 +146,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-335471.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9371.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9371.json index 6281ecf4273..092933df523 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9371.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9371.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9371", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:17.843", - "lastModified": "2015-03-07T03:30:36.313", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:43.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -76,6 +75,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-420/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-420/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9372.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9372.json index c6f0d7885a1..0f594ecfbe3 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9372.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9372.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9372", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:18.890", - "lastModified": "2015-02-17T15:16:10.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:43.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-421/", "source": "cve@mitre.org" + }, + { + "url": "http://www.manageengine.com/products/passwordmanagerpro/release-notes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-421/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9373.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9373.json index 6751994f690..96281b3414a 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9373.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9373.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9373", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-16T18:59:20.077", - "lastModified": "2014-12-17T19:50:34.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:43.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -75,6 +74,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-422/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-422/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9374.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9374.json index 9179d6db250..b3511e1ec46 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9374.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9374.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9374", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-12T15:59:14.883", - "lastModified": "2018-10-09T19:55:03.777", + "lastModified": "2024-11-21T02:20:43.697", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -517,6 +515,47 @@ { "url": "http://www.securitytracker.com/id/1031345", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2014-019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129473/Asterisk-Project-Security-Advisory-AST-2014-019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/48", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60251", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534197/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031345", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9375.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9375.json index b7c4cc22649..a7a1d77c505 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9375.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9375.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9375", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:00.057", - "lastModified": "2015-02-17T20:16:18.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:43.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-046/", "source": "cve@mitre.org" + }, + { + "url": "http://support.lexmark.com/index?page=content&id=TE677", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-046/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9376.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9376.json index af52eea176e..caafa95f016 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9376.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9376.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9376", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:27.097", - "lastModified": "2020-02-26T13:35:55.470", + "lastModified": "2024-11-21T02:20:43.997", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-191: Integer Underflow (Wrap or Wraparound)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +102,39 @@ { "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71696", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/pull/602", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/pull/605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/pull/606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/pull/609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-191: Integer Underflow (Wrap or Wraparound)" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9377.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9377.json index 85029fe8325..4bd0aa8e082 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9377.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9377.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9377", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:27.987", - "lastModified": "2020-02-26T13:35:55.470", + "lastModified": "2024-11-21T02:20:44.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71690", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/pull/603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9378.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9378.json index cb612ade912..d5a68962097 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9378.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9378.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9378", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:28.940", - "lastModified": "2020-02-26T13:35:55.470", + "lastModified": "2024-11-21T02:20:44.277", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,30 @@ { "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71695", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/pull/604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/pull/610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9379.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9379.json index 1df5fe77c3a..ae060629c0a 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9379.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9379.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9379", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:29.863", - "lastModified": "2020-02-26T13:35:55.470", + "lastModified": "2024-11-21T02:20:44.410", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71698", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/pull/607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9380.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9380.json index 267552c9a80..1811c47b9c5 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9380.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9380.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9380", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:30.660", - "lastModified": "2020-02-26T13:35:55.470", + "lastModified": "2024-11-21T02:20:44.543", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71691", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Ettercap/ettercap/pull/608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9381.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9381.json index 4b1add591a2..6e9b7751a64 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9381.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9381.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9381", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:31.567", - "lastModified": "2020-02-26T13:35:55.470", + "lastModified": "2024-11-21T02:20:44.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,8 +87,8 @@ "url": "https://github.com/Ettercap/ettercap/pull/609", "source": "cve@mitre.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -102,6 +101,37 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534248/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71693", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/Ettercap/ettercap/pull/609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9385.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9385.json index c2570923372..337aad6525f 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9385.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9385.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9385", "sourceIdentifier": "cret@cert.org", "published": "2014-12-15T18:59:27.723", - "lastModified": "2016-03-21T16:15:50.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:44.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Vulnerabilidad de CSRF en Zenoss Core hasta 5 Beta 3 permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios arbitrarios para solicitudes que provocan la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de una subida de ZenPack, tambi\u00e9n conocido como ZEN-15388." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in 5.0.", - "lastModified": "2016-03-21T12:15:50.807" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -185,6 +177,25 @@ { "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in 5.0.", + "lastModified": "2016-03-21T12:15:50.807" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9386.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9386.json index 137bde7f80b..1b66a978f91 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9386.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9386.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9386", "sourceIdentifier": "cret@cert.org", "published": "2014-12-15T18:59:28.630", - "lastModified": "2016-03-21T16:17:15.147", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-384: Session Fixation", + "lastModified": "2024-11-21T02:20:45.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -16,13 +14,6 @@ "value": "Zenoss Core anterior a 4.2.5 SP161 configura una vida infinita para la cookie de identificaci\u00f3n de la sesi\u00f3n, lo que facilita a atacantes remotos secuestrar sesiones mediante el aprovechamiento de una estaci\u00f3n de trabajo desatendida, tambi\u00e9n conocido como ZEN-12691." } ], - "vendorComments": [ - { - "organization": "Zenoss", - "comment": "Addressed in versions 5.0, 4.2.5.SP273, and 4.2.4.SP854", - "lastModified": "2016-03-21T12:17:15.147" - } - ], "metrics": { "cvssMetricV2": [ { @@ -31,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -170,6 +161,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/449452", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.google.com/spreadsheets/d/1dHAc4PxUbs-4Dxzm1wSCE0sMz5UCMY6SW3PlMHSyuuQ/edit?usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + } + ], + "evaluatorComment": "CWE-384: Session Fixation", + "vendorComments": [ + { + "organization": "Zenoss", + "comment": "Addressed in versions 5.0, 4.2.5.SP273, and 4.2.4.SP854", + "lastModified": "2016-03-21T12:17:15.147" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9387.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9387.json index 6642a4b286e..dfe08592c73 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9387.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9387.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9387", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-17T19:59:07.527", - "lastModified": "2018-10-09T19:55:06.917", + "lastModified": "2024-11-21T02:20:45.217", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "http://www.securityfocus.com/archive/1/534249/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/60", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.onapsis.com/research/security-advisories/sap-business-objects-search-token-privilege-escalation-via-corba", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534249/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9388.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9388.json index 36598810475..02c5baf16ea 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9388.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9388.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9388", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-17T19:59:08.587", - "lastModified": "2017-01-03T02:59:24.173", + "lastModified": "2024-11-21T02:20:45.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17878", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9389.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9389.json index ee8403ea539..a5cb3de5d0e 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9389.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9389.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9389", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:09.480", - "lastModified": "2015-01-06T16:46:57.693", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:45.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.sonatype.org/advisories/archive/2014-12-23-Nexus/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://support.sonatype.com/entries/84705937-CVE-2014-9389-Nexus-Security-Advisory-Directory-Traversal", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9391.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9391.json index c8f56058ba3..7854acae419 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9391.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9391.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9391", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:05.093", - "lastModified": "2015-01-03T01:26:35.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:45.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129637/WordPress-gSlideShow-0.1-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9392.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9392.json index 458a12cba21..e2eab555446 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9392.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9392.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9392", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:05.907", - "lastModified": "2015-01-03T01:24:29.157", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:45.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129638/WordPress-PictoBrowser-0.3.1-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9393.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9393.json index 2c44a6d05c4..c103dabadbf 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9393.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9393.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9393", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:06.733", - "lastModified": "2017-09-08T01:29:33.870", + "lastModified": "2024-11-21T02:20:46.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99482", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129639/WordPress-Twitter-0.7-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99482", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9394.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9394.json index 4888137a8b7..a0b6d354937 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9394.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9394.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9394", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:07.560", - "lastModified": "2017-09-08T01:29:33.933", + "lastModified": "2024-11-21T02:20:46.267", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99437", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129640/WordPress-PWG-Random-1.11-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99437", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9395.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9395.json index ff39ab25b23..afb62854a7d 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9395.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9395.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9395", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:08.467", - "lastModified": "2015-01-03T01:22:54.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:46.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129641/WordPress-Simplelife-1.2-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9396.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9396.json index 5d603c78f33..a8da1b81b61 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9396.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9396.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9396", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:09.327", - "lastModified": "2017-09-08T01:29:33.980", + "lastModified": "2024-11-21T02:20:46.573", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99395", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129642/WordPress-SimpleFlickr-3.0.3-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99395", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9397.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9397.json index bf26ee6ec07..5cae31cb56d 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9397.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9397.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9397", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:10.233", - "lastModified": "2017-09-08T01:29:34.043", + "lastModified": "2024-11-21T02:20:46.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99380", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129643/WordPress-twimp-wp-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99380", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9398.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9398.json index 18b7936185a..9fe7483f5ba 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9398.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9398.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9398", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:11.170", - "lastModified": "2015-01-03T01:18:29.870", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:46.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129644/WordPress-Twitter-LiveBlog-1.1.2-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-93xx/CVE-2014-9399.json b/CVE-2014/CVE-2014-93xx/CVE-2014-9399.json index d9af12db41b..ccd495555b3 100644 --- a/CVE-2014/CVE-2014-93xx/CVE-2014-9399.json +++ b/CVE-2014/CVE-2014-93xx/CVE-2014-9399.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9399", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:12.060", - "lastModified": "2015-01-03T01:17:54.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:47.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129645/WordPress-TweetScribe-1.1-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9400.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9400.json index d8466293484..0d82ab731bd 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9400.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9400.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9400", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:13.077", - "lastModified": "2017-09-08T01:29:34.090", + "lastModified": "2024-11-21T02:20:47.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99355", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129646/WordPress-WP-Unique-Article-Header-Image-1.0-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9401.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9401.json index 881e1de981a..35ee2881df3 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9401.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9401.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9401", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T21:59:14.077", - "lastModified": "2017-09-08T01:29:34.137", + "lastModified": "2024-11-21T02:20:47.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99427", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129647/WordPress-WP-Limit-Posts-Automatically-0.7-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99427", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9402.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9402.json index a57458a2deb..824fce342f6 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9402.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9402.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9402", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-24T15:59:02.520", - "lastModified": "2023-02-13T00:45:18.867", + "lastModified": "2024-11-21T02:20:47.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -171,6 +170,65 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Jun/18", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Sep/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/18/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2519-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2018:0805", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/bugtraq/2019/Jun/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/bugtraq/2019/Sep/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201602-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17630", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9403.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9403.json index eb5af93c2ed..9311c190f04 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9403.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9403.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9403", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:32.457", - "lastModified": "2015-09-29T00:31:41.397", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", + "lastModified": "2024-11-21T02:20:47.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -104,6 +102,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2014-0543.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/57795", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:013", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/18/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/66926", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/znc/znc/blob/master/ChangeLog.md", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/znc/znc/issues/528", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9406.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9406.json index 533dd041cbe..fc406f78092 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9406.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9406.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9406", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-18T15:59:03.913", - "lastModified": "2014-12-18T19:44:31.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:47.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://seclists.org/fulldisclosure/2014/Dec/57", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/57", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9407.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9407.json index fa8e9c15a62..74612ba377f 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9407.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9407.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9407", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:33.410", - "lastModified": "2014-12-19T19:15:58.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:48.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.revive-adserver.com/security/revive-sa-2014-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9408.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9408.json index a6070649c3a..ecd54e6e1ef 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9408.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9408.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9408", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-19T15:59:34.253", - "lastModified": "2018-10-09T19:55:07.153", + "lastModified": "2024-11-21T02:20:48.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -135,6 +134,28 @@ { "url": "http://www.securityfocus.com/bid/71674", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129585/Ekahau-Real-Time-Location-System-RC4-Cipher-Stream-Reuse-Weak-Key-Derivation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.modzero.ch/advisories/MZ-14-01-Ekahau-RTLS.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534241/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71674", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9412.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9412.json index b42e3a03b76..55816c15863 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9412.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9412.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9412", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-23T11:59:05.250", - "lastModified": "2021-04-09T16:36:15.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:48.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129658/NetIQ-Access-Manager-4.0-SP1-XSS-CSRF-XXE-Injection-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/78", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.novell.com/support/kb/doc.php?id=7015994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-2_Novell_NetIQ_Access_Manager_Multiple_Vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9413.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9413.json index 544b9b3905e..9864d159d1a 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9413.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9413.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9413", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:10.057", - "lastModified": "2017-09-08T01:29:34.183", + "lastModified": "2024-11-21T02:20:48.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129500/WordPress-IP-Ban-1.2.3-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/simple-ip-ban/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9414.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9414.json index 0cae2fdf222..c9aab1844e6 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9414.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9414.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9414", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:11.073", - "lastModified": "2023-05-26T17:46:26.677", + "lastModified": "2024-11-21T02:20:49.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,50 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://mazinahmed1.blogspot.com/2014/12/w3-total-caches-w3totalfail.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129512/W3-Total-Cache-0.9.4-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/67", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/61562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534250/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99352", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/wp-plugins/w3-total-cache/commit/9a1cc9f70558282e135eb3120d271448c75b28dd#diff-86a10b31ab115483fe8111bedac14d15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/w3-total-cache/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9415.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9415.json index 727e3a55076..bb6b5400ab4 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9415.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9415.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9415", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:12.543", - "lastModified": "2019-05-20T17:29:00.313", + "lastModified": "2024-11-21T02:20:49.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -84,6 +83,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/152965/Huawei-eSpace-1.1.11.103-Unicode-Stack-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-406589.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9416.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9416.json index fee907b6b7c..232cdfb5b8a 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9416.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9416.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9416", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:13.403", - "lastModified": "2019-05-20T17:29:00.423", + "lastModified": "2024-11-21T02:20:49.307", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -84,6 +82,18 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/152966/Huawei-eSpace-1.1.11.103-DLL-Hijacking.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-406589.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9417.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9417.json index 5113a75dde7..7541169529c 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9417.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9417.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9417", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:14.167", - "lastModified": "2019-05-20T17:29:00.500", + "lastModified": "2024-11-21T02:20:49.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/152967/Huawei-eSpace-1.1.11.103-Meeting-Image-File-Format-Handling-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-406589.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9418.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9418.json index 179c200e864..06938d824aa 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9418.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9418.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9418", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-24T18:59:14.980", - "lastModified": "2019-05-20T17:29:00.563", + "lastModified": "2024-11-21T02:20:49.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/152968/Huawei-eSpace-1.1.11.103-Meeting-Heap-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-406589.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9419.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9419.json index 182334a59ac..a57390ce29d 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9419.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9419.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9419", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-26T00:59:00.053", - "lastModified": "2023-11-07T02:23:04.887", + "lastModified": "2024-11-21T02:20:49.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -151,6 +150,85 @@ { "url": "https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e", "source": "cve@mitre.org" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f647d7c155f069c1a068030255c300663516420e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1081.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/25/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2541-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2542-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177260", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9420.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9420.json index fe0bfe7659b..f55039f11bd 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9420.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9420.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9420", "sourceIdentifier": "secalert@redhat.com", "published": "2014-12-26T00:59:01.680", - "lastModified": "2023-02-13T00:45:21.630", + "lastModified": "2024-11-21T02:20:49.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -179,6 +178,113 @@ { "url": "https://source.android.com/security/bulletin/2017-01-01.html", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f54e18f1b831c92f6512d2eedb224cd63d607d3d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1081.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1137.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1138.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62801", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/25/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2490-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2491-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2492-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2493-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175235", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/f54e18f1b831c92f6512d2eedb224cd63d607d3d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://source.android.com/security/bulletin/2017-01-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9421.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9421.json index 155663fadc1..1ebdf11318f 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9421.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9421.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9421", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T11:59:05.593", - "lastModified": "2020-01-21T15:46:57.183", + "lastModified": "2024-11-21T02:20:50.053", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -176,6 +174,66 @@ { "url": "https://github.com/krb5/krb5/commit/a197e92349a4aa2141b5dff12e9dd44c2a2166e3", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0794.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2498-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/a197e92349a4aa2141b5dff12e9dd44c2a2166e3", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9422.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9422.json index 4ea9db7f0b6..77f6f4971bf 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9422.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9422.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9422", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T11:59:06.657", - "lastModified": "2020-01-21T15:46:57.183", + "lastModified": "2024-11-21T02:20:50.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:C", + "baseScore": 6.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -175,6 +174,65 @@ { "url": "https://github.com/krb5/krb5/commit/6609658db0799053fbef0d7d0aa2f1fd68ef32d8", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0794.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2498-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/6609658db0799053fbef0d7d0aa2f1fd68ef32d8", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9423.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9423.json index b31de94b124..79561f13bdc 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9423.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9423.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9423", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T11:59:07.500", - "lastModified": "2020-01-21T15:46:57.183", + "lastModified": "2024-11-21T02:20:50.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -171,6 +170,61 @@ { "url": "https://github.com/krb5/krb5/commit/5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2498-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9424.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9424.json index 06f3e6324aa..11589b16bda 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9424.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9424.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9424", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-29T00:59:01.827", - "lastModified": "2014-12-30T15:35:22.727", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", + "lastModified": "2024-11-21T02:20:50.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -81,6 +79,15 @@ { "url": "https://github.com/robertbachmann/openbsd-libssl/commit/62a110d447bb8c16a4c69629e28a42e8c39fd7e0", "source": "cve@mitre.org" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=202", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/robertbachmann/openbsd-libssl/commit/62a110d447bb8c16a4c69629e28a42e8c39fd7e0", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9425.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9425.json index 60f80660097..742b9b907e9 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9425.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9425.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9425", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T02:59:00.060", - "lastModified": "2023-11-07T02:23:05.040", + "lastModified": "2024-11-21T02:20:50.663", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -174,6 +172,85 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=24125f0f26f3787c006e4a51611ba33ee3b841cb", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2bcf69d073190e4f032d883f3416dea1b027a39e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=fbf3a6bc1abcc8a5b5226b0ad9464c37f11ddbd6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2014/12/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71800", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=68676", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9426.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9426.json index 04e6270eee9..b90e7adece2 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9426.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9426.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9426", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T02:59:01.217", - "lastModified": "2024-10-29T15:35:02.883", + "lastModified": "2024-11-21T02:20:50.830", "vulnStatus": "Modified", "cveTags": [ { @@ -30,6 +30,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -37,9 +39,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 7.3, - "baseSeverity": "HIGH" + "availabilityImpact": "LOW" }, "exploitabilityScore": 3.9, "impactScore": 3.4 @@ -52,13 +52,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +120,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=a72cd07f2983dc43a6bb35209dc4687852e53c09", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=ef89ab2f99fbd9b7b714556d4f1f50644eb54191", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=68665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9427.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9427.json index 1605131afe5..ab3dc4533aa 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9427.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9427.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9427", "sourceIdentifier": "security@debian.org", "published": "2015-01-03T02:59:00.050", - "lastModified": "2023-11-07T02:23:05.237", + "lastModified": "2024-11-21T02:20:51.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1166,6 +1165,81 @@ { "url": "https://support.apple.com/HT205267", "source": "security@debian.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=f9ad3086693fce680fbe246e4a45aa92edd2ac35", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2014/12/31/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2015/01/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2015/01/03/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71833", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=68618", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9428.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9428.json index d15f3cc470c..6e8f6c31037 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9428.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9428.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9428", "sourceIdentifier": "security@debian.org", "published": "2015-01-02T21:59:00.063", - "lastModified": "2023-11-07T02:23:05.363", + "lastModified": "2024-11-21T02:20:51.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -179,6 +178,98 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://bugs.debian.org/774155", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5b6698b0e4a37053de35cc24ee695b98a7eb712b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/31/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.spinics.net/lists/netdev/msg309425.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/5b6698b0e4a37053de35cc24ee695b98a7eb712b", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://lists.open-mesh.org/pipermail/b.a.t.m.a.n/2014-November/012561.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9429.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9429.json index 75749d663c3..c67dc2c7de8 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9429.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9429.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9429", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T22:59:05.507", - "lastModified": "2017-09-08T01:29:34.293", + "lastModified": "2024-11-21T02:20:52.217", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99404", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99404", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9430.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9430.json index 4e999633c2a..4f69b8d89f5 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9430.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9430.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9430", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T22:59:06.273", - "lastModified": "2017-09-08T01:29:34.340", + "lastModified": "2024-11-21T02:20:52.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99404", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99404", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9431.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9431.json index dc690d83753..4e4981a35ae 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9431.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9431.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9431", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T22:59:07.083", - "lastModified": "2017-09-08T01:29:34.403", + "lastModified": "2024-11-21T02:20:52.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99403", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129698/SmoothWall-3.1-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99403", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9432.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9432.json index 264bac6d228..f69d61e5b92 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9432.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9432.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9432", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T22:59:08.083", - "lastModified": "2018-10-09T19:55:08.043", + "lastModified": "2024-11-21T02:20:52.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,46 @@ { "url": "https://github.com/s9y/Serendipity/commit/36cde3030aaa27a46bf94086e062dfe56b60230b", "source": "cve@mitre.org" + }, + { + "url": "http://blog.s9y.org/archives/259-Serendipity-2.0-rc2-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129709/CMS-Serendipity-2.0-rc1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2014/12/bericht-zu-sroeadv-2014-02.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534315/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99464", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/s9y/Serendipity/commit/36cde3030aaa27a46bf94086e062dfe56b60230b", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9433.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9433.json index ad0507c8932..98b8e6d0580 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9433.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9433.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9433", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T22:59:09.567", - "lastModified": "2018-10-09T19:55:08.560", + "lastModified": "2024-11-21T02:20:52.793", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -136,6 +135,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99497", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129713/CMS-Contenido-4.9.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/61396", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sroesemann.blogspot.de/2014/12/report-for-advisory-sroeadv-2014-03.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.contenido.org/de/cms/CONTENIDO/News/index-c-2044-3.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534320/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99497", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9434.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9434.json index afeb6aec769..8247c1356ff 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9434.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9434.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9434", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T19:59:03.173", - "lastModified": "2015-01-05T21:07:42.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:52.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/131", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-08.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71822", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9435.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9435.json index 9a1397ccdb7..721afc9498b 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9435.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9435.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9435", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T19:59:04.280", - "lastModified": "2015-01-05T21:08:23.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:53.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/131", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-08.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71822", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9436.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9436.json index fad0cb9de67..21f9f4e2465 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9436.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9436.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9436", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T19:59:05.187", - "lastModified": "2017-09-08T01:29:34.577", + "lastModified": "2024-11-21T02:20:53.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99456", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129705/SysAid-Server-Arbitrary-File-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/99", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99456", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9437.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9437.json index 364cf73fefc..036f691a960 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9437.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9437.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9437", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T19:59:06.250", - "lastModified": "2017-09-08T01:29:34.637", + "lastModified": "2024-11-21T02:20:53.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99510", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129509", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99510", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9438.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9438.json index c31955ed5e0..76b0b3fd938 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9438.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9438.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9438", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T19:59:07.187", - "lastModified": "2017-09-08T01:29:34.683", + "lastModified": "2024-11-21T02:20:53.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129619/vBulletin-Moderator-Control-Panel-4.2.2-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99472", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://rstforums.com/forum/88810-csrf-vbulletin-modcp.rst", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9439.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9439.json index ec6713f35a2..a9aaaeef19a 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9439.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9439.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9439", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T19:59:08.547", - "lastModified": "2017-09-08T01:29:34.747", + "lastModified": "2024-11-21T02:20:53.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99532", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/35626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99532", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9440.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9440.json index d8f18a01d62..75d8467407a 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9440.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9440.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9440", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T19:59:09.577", - "lastModified": "2017-09-08T01:29:34.810", + "lastModified": "2024-11-21T02:20:53.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99531", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129789/PHP-Address-Book-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35591", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99531", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9441.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9441.json index 780352f0072..31e0b8b34ec 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9441.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9441.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9441", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T19:59:10.563", - "lastModified": "2017-09-08T01:29:34.857", + "lastModified": "2024-11-21T02:20:53.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99490", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129507", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99490", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9442.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9442.json index 5071899815e..3771c66c4b6 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9442.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9442.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9442", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T19:59:11.407", - "lastModified": "2015-01-05T21:15:49.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:54.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -94,6 +93,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://research.g0blin.co.uk/g0blin-00022/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/cart66-lite/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9443.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9443.json index 669e1bef643..a8a88056dce 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9443.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9443.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9443", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T19:59:12.657", - "lastModified": "2015-01-05T21:16:11.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:54.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61744", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/relevanssi/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9444.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9444.json index 0eb46dc4b84..3e9d1fc02cb 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9444.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9444.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9444", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:02.587", - "lastModified": "2015-01-05T21:17:38.903", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:54.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "http://www.securityfocus.com/bid/71808", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129749/WordPress-Frontend-Uploader-0.9.2-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/122", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71808", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9445.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9445.json index 5ddda9b88cf..78f28ed259f 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9445.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9445.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9445", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:03.647", - "lastModified": "2017-09-08T01:29:34.917", + "lastModified": "2024-11-21T02:20:54.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99366", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/35584", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99365", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99366", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9446.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9446.json index 003bd9e9c78..409721b9e46 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9446.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9446.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9446", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:04.930", - "lastModified": "2015-01-06T03:00:39.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:54.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,37 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=13425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://koha-community.org/koha-3-16-6-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://koha-community.org/koha-3-18-2-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71803", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9447.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9447.json index 0fd10e80381..ac5d0e470eb 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9447.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9447.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9447", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:06.447", - "lastModified": "2015-04-18T01:59:42.700", + "lastModified": "2024-11-21T02:20:54.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,53 @@ { "url": "https://lists.fedorahosted.org/pipermail/elfutils-devel/2014-December/004499.html", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148321.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148326.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62560", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62661", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/29/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71804", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.fedorahosted.org/cgit/elfutils.git/commit/?id=147018e729e7c22eeabf15b82d26e4bf68a0d18e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://lists.fedorahosted.org/pipermail/elfutils-devel/2014-December/004499.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9448.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9448.json index fe4d80e1a1e..72ea877685c 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9448.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9448.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9448", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:07.633", - "lastModified": "2015-01-06T03:03:17.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:54.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/81080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9449.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9449.json index cddf1def408..abb38ff9799 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9449.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9449.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9449", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:08.647", - "lastModified": "2017-11-10T02:29:01.403", + "lastModified": "2024-11-21T02:20:54.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -128,6 +127,48 @@ { "url": "https://security.gentoo.org/glsa/201507-03", "source": "cve@mitre.org" + }, + { + "url": "http://dev.exiv2.org/issues/960", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "http://dev.exiv2.org/projects/exiv2/repository/diff?rev=3264&rev_to=3263", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148382.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71912", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2454-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9450.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9450.json index 73eca40ea3e..85f8e2e7f6d 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9450.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9450.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9450", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:09.710", - "lastModified": "2015-01-06T03:05:24.713", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:55.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -384,6 +383,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61554", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zabbix.com/rn1.8.22.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zabbix.com/rn2.0.14.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zabbix.com/rn2.2.8.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.zabbix.com/browse/ZBX-8582", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9451.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9451.json index c9a9482905a..2eb74c3ac1b 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9451.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9451.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9451", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:11.007", - "lastModified": "2017-09-08T01:29:34.997", + "lastModified": "2024-11-21T02:20:55.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71736", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99334", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-0_VDG_Security_SENSE_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9452.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9452.json index 4c6dea505bb..626f1f27085 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9452.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9452.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9452", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:12.023", - "lastModified": "2017-09-08T01:29:35.060", + "lastModified": "2024-11-21T02:20:55.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71736", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99331", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-0_VDG_Security_SENSE_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9453.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9453.json index 806c272f11b..7b510e0f15f 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9453.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9453.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9453", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:12.960", - "lastModified": "2017-09-08T01:29:35.107", + "lastModified": "2024-11-21T02:20:55.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99421", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129502/WordPress-Simple-Visitor-Stat-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99421", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9454.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9454.json index 3db59b8969a..1207b7f2b94 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9454.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9454.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9454", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:14.057", - "lastModified": "2017-09-08T01:29:35.167", + "lastModified": "2024-11-21T02:20:55.727", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129503/WordPress-Simple-Sticky-Footer-1.3.2-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99374", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/simple-sticky-footer/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9455.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9455.json index 5b905b62be7..700ebb8e30a 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9455.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9455.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9455", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:15.087", - "lastModified": "2015-01-06T12:14:22.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:55.867", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129451/ClassAd-3.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9456.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9456.json index 1edc4c755e1..f149eeaf4d1 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9456.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9456.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9456", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:16.163", - "lastModified": "2019-04-15T12:30:07.850", + "lastModified": "2024-11-21T02:20:56.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/88191", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/35589", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/88191", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9457.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9457.json index ffafa480444..6f4938c13f2 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9457.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9457.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9457", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:17.087", - "lastModified": "2015-01-05T23:41:59.340", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:56.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/35625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9458.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9458.json index 36fed215ecb..30a36e174f3 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9458.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9458.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9458", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:17.993", - "lastModified": "2019-04-15T12:30:07.913", + "lastModified": "2024-11-21T02:20:56.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/61863", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/87981", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hex-rays.com/bugbounty.shtml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.hex-rays.com/vulnfix.shtml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9459.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9459.json index db8d1a36a5f..3fce3449f11 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9459.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9459.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9459", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:19.087", - "lastModified": "2015-01-14T02:59:01.860", + "lastModified": "2024-11-21T02:20:56.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://github.com/e107inc/e107/commit/9249f892b1e635979db2a830393694fb73531080", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129751/e107-2.0-Alpha2-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/124", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/e107inc/e107/commit/9249f892b1e635979db2a830393694fb73531080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9460.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9460.json index 13463995251..0ef695e6db9 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9460.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9460.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9460", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T20:59:20.180", - "lastModified": "2017-09-08T01:29:35.230", + "lastModified": "2024-11-21T02:20:56.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ { "url": "https://wordpress.org/plugins/wp-vipergb/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129501/WordPress-WP-ViperGB-1.3.10-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99439", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99440", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/wp-vipergb/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9461.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9461.json index 9961077d60e..76e7af1584a 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9461.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9461.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9461", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-02T22:59:01.303", - "lastModified": "2015-01-05T20:05:25.410", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:56.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -87,6 +86,21 @@ { "url": "https://wordpress.org/plugins/cart66-lite/changelog/", "source": "cve@mitre.org" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://research.g0blin.co.uk/g0blin-00021/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/cart66-lite/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9462.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9462.json index 5007f203a01..caf5124ae5a 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9462.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9462.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9462", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-31T14:59:03.437", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:20:56.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -126,6 +125,40 @@ { "url": "https://security.gentoo.org/glsa/201612-19", "source": "cve@mitre.org" + }, + { + "url": "http://chargen.matasano.com/chargen/2015/3/17/this-new-vulnerability-mercurial-command-injection-cve-2014-9462.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mercurial.selenic.com/wiki/WhatsNew", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/119816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9464.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9464.json index 4789774c2f9..62eb8de9ad3 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9464.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9464.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9464", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-03T22:59:00.083", - "lastModified": "2015-01-05T18:31:24.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:57.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://github.com/microweber/microweber/commit/4ee09f9dda35cd1b15daa351f335c2a4a0538d29", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.youtube.com/watch?v=SSE8Xj_-QaQ", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9465.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9465.json index 1549ff3ffe8..95504c9d6e4 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9465.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9465.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9465", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:08.500", - "lastModified": "2016-04-07T21:09:33.500", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:57.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -275,6 +274,59 @@ { "url": "https://jira.zarafa.com/browse/ZCP-12596", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0049.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://download.zarafa.com/community/beta/7.1/changelog-7.1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://download.zarafa.com/community/beta/7.2/changelog-7.2.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156112.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156228.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.robert-scheck.de/cve-2014-9465-zarafa/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/07/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1139442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://jira.zarafa.com/browse/ZCP-12596", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9466.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9466.json index 81d687227a8..da28195b630 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9466.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9466.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9466", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-17T15:59:01.750", - "lastModified": "2018-10-09T19:55:09.090", + "lastModified": "2024-11-21T02:20:57.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -101,6 +100,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100867", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130379/Open-Xchange-Server-6-OX-AppSuite-7.6.1-Exposure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534695/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72587", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031744", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100867", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9468.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9468.json index 6b17e7702bf..d01b085c80a 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9468.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9468.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9468", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:10.313", - "lastModified": "2017-09-20T01:29:00.610", + "lastModified": "2024-11-21T02:20:57.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,18 @@ { "url": "http://www.securitytracker.com/id/1033434", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/70", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-9468-instantasp-instantforum-net-multiple-xss-cross-site-scripting-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033434", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9471.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9471.json index e06bf3ab6cd..4c635cc5711 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9471.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9471.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9471", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T16:59:08.593", - "lastModified": "2020-12-08T15:18:46.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:58.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -175,6 +174,84 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=16872", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62226", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-2473-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/25/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/25/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-22", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9472.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9472.json index 9116c50f304..7ac5438d082 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9472.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9472.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9472", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:02.667", - "lastModified": "2016-08-23T17:45:51.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:58.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -377,6 +376,42 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3176", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72832", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9473.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9473.json index e80ec484f77..00308ed4e4c 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9473.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9473.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9473", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T00:59:00.047", - "lastModified": "2015-01-08T19:06:48.267", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", + "lastModified": "2024-11-21T02:20:58.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -81,6 +79,15 @@ { "url": "https://wordpress.org/plugins/cforms2/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534349/30/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/cforms2/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9475.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9475.json index 7339c1bc218..e80e62e5f31 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9475.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9475.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9475", "sourceIdentifier": "security@debian.org", "published": "2015-01-16T16:59:09.920", - "lastModified": "2015-09-17T18:14:14.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:58.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -320,6 +319,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2014/dsa-3110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9476.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9476.json index 3206610652d..ff40548e6ac 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9476.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9476.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9476", "sourceIdentifier": "security@debian.org", "published": "2015-01-16T16:59:10.983", - "lastModified": "2015-09-17T18:14:52.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:58.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -323,6 +322,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T77028", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9477.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9477.json index 073e774556b..1f2d0d1537a 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9477.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9477.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9477", "sourceIdentifier": "security@debian.org", "published": "2015-01-16T16:59:11.983", - "lastModified": "2015-01-20T14:22:55.680", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:59.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -319,6 +318,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T77624", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9478.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9478.json index 222e5d0c046..6e14307acc2 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9478.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9478.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9478", "sourceIdentifier": "security@debian.org", "published": "2015-01-16T16:59:13.063", - "lastModified": "2015-01-20T14:24:36.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:59.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -319,6 +318,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T73111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9479.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9479.json index e0df7cc32b5..30ee3dbda31 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9479.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9479.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9479", "sourceIdentifier": "security@debian.org", "published": "2015-01-16T16:59:14.157", - "lastModified": "2015-01-20T14:25:00.050", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:59.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -319,6 +318,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T76195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9480.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9480.json index 57eddeec911..6914a8c3c78 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9480.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9480.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9480", "sourceIdentifier": "security@debian.org", "published": "2015-01-16T16:59:15.140", - "lastModified": "2015-01-20T14:25:43.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:20:59.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -319,6 +318,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T69180", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9488.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9488.json index 14759fb3967..9e1cb5d6888 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9488.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9488.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9488", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T18:59:02.887", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:00.337", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -112,6 +111,26 @@ { "url": "https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0139.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159449.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00077.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9490.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9490.json index 194fa36a76e..4aca2f5bc78 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9490.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9490.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9490", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-20T15:59:05.577", - "lastModified": "2023-11-07T02:23:06.087", + "lastModified": "2024-11-21T02:21:00.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ { "url": "https://groups.google.com/forum/#%21topic/getsentry/Cz5bih0ZY1U", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99687", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21topic/getsentry/Cz5bih0ZY1U", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9491.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9491.json index e8101785976..ac05d2356e9 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9491.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9491.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9491", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-20T15:59:06.627", - "lastModified": "2017-09-08T01:29:35.480", + "lastModified": "2024-11-21T02:21:00.793", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +86,23 @@ { "url": "https://www.illumos.org/issues/5421", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/27", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99686", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/illumos/illumos-gate/commit/d65686849024838243515b5c40ae2c479460b4b5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.illumos.org/issues/5421", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9493.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9493.json index bdfd8c3e82c..61da1587c06 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9493.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9493.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9493", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-07T19:59:02.573", - "lastModified": "2019-02-01T18:09:20.413", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:00.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -145,6 +144,51 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2014-December/000317.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0246.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.launchpad.net/glance/+bug/1400966", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://security.openstack.org/ossa/OSSA-2014-041.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9494.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9494.json index 55c2e09deff..9ffda7416b6 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9494.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9494.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9494", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-20T15:59:08.233", - "lastModified": "2023-11-07T02:23:06.197", + "lastModified": "2024-11-21T02:21:01.113", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,25 @@ { "url": "https://groups.google.com/forum/#%21topic/rabbitmq-users/DMkypbSvIyM", "source": "secalert@redhat.com" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/30", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.rabbitmq.com/release-notes/README-3.4.0.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99685", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21topic/rabbitmq-users/DMkypbSvIyM", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9495.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9495.json index 4093e59cff0..aa3cfc2affa 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9495.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9495.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9495", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-10T19:59:00.047", - "lastModified": "2016-10-18T03:45:18.687", + "lastModified": "2024-11-21T02:21:01.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -280,6 +279,53 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/p/png-mng/mailman/message/33172831/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/p/png-mng/mailman/message/33173461/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/04/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/10/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/10/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71820", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031444", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT206167", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9496.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9496.json index 393dc288bee..efa60e27889 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9496.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9496.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9496", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T16:59:16.030", - "lastModified": "2020-11-20T17:34:08.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:01.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -243,6 +242,97 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62320", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/04/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71796", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2832-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/erikd/libsndfile/commit/dbe14f00030af5d3577f4cabbf9861db59e9c378", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/erikd/libsndfile/issues/93", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://seclists.org/bugtraq/2019/Apr/23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9498.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9498.json index a7000e6fec3..8e3f21346b4 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9498.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9498.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9498", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:04.493", - "lastModified": "2015-01-12T19:08:39.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:01.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -130,6 +129,35 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/04/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2386011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2386013", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2386387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9499.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9499.json index 8fa80f9435d..847020a68cd 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9499.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9499.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9499", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:05.790", - "lastModified": "2017-09-08T01:29:35.590", + "lastModified": "2024-11-21T02:21:01.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -97,6 +96,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/04/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99678", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2390191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2390839", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9500.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9500.json index d1a942ff84f..0f0b86e82c4 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9500.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9500.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9500", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:06.647", - "lastModified": "2015-01-12T19:09:14.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:02.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/04/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2390699", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2390849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9501.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9501.json index 0b40e43cc90..873fa7af654 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9501.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9501.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9501", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:07.570", - "lastModified": "2015-01-12T19:09:57.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:02.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -98,6 +97,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/04/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2390097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2390897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9505.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9505.json index 84555460d51..b5630ee5caa 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9505.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9505.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9505", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:08.397", - "lastModified": "2017-09-08T01:29:35.653", + "lastModified": "2024-11-21T02:21:02.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -123,6 +122,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/04/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2391119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2395015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9506.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9506.json index f05ef24a72f..e9e9eb846fc 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9506.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9506.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9506", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-04T21:59:03.603", - "lastModified": "2017-01-03T02:59:24.580", + "lastModified": "2024-11-21T02:21:02.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -98,6 +97,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/changelog_page.php?version_id=191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=9885", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9507.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9507.json index 6e321355c96..c11811341a2 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9507.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9507.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9507", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-04T21:59:04.963", - "lastModified": "2015-01-14T02:59:02.050", + "lastModified": "2024-11-21T02:21:03.133", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -292,6 +291,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T72901", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9508.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9508.json index b84ae6fdf96..e4a118c262b 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9508.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9508.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9508", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-04T21:59:05.887", - "lastModified": "2016-11-28T19:14:03.887", + "lastModified": "2024-11-21T02:21:03.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -668,6 +667,18 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9509.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9509.json index 6ea153d1027..3e333c0b975 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9509.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9509.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9509", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-04T21:59:07.120", - "lastModified": "2015-01-06T14:42:09.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:03.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -664,6 +663,14 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9510.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9510.json index 909906fc9ad..5e235e5c59c 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9510.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9510.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9510", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:09.210", - "lastModified": "2015-01-13T01:49:29.583", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:03.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,25 @@ "tags": [ "Patch" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.secureworks.com/cyber-threat-intelligence/advisories/SWRX-2015-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71913", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.tp-link.com/en/support/download/?model=TL-WR840N&version=V1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9512.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9512.json index 8be099ed413..70cc7d65000 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9512.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9512.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9512", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-12T16:59:01.457", - "lastModified": "2020-07-28T20:15:12.060", + "lastModified": "2024-11-21T02:21:03.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -180,6 +179,85 @@ { "url": "https://support.apple.com/kb/HT211289", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00041.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00095.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00112.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/76093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1034786", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2879-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xteam.baidu.com/?p=169", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.samba.org/show_bug.cgi?id=10977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201605-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT211168", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT211170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT211171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT211175", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT211289", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9516.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9516.json index 56639372b30..910ea72c4f9 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9516.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9516.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9516", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:10.823", - "lastModified": "2015-01-06T16:48:32.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:04.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/116553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9517.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9517.json index 989155c8d96..f83d251b5d8 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9517.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9517.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9517", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:11.650", - "lastModified": "2023-11-17T20:01:31.690", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:04.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -63,9 +62,10 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:dlink:dcs-2103:-:*:*:*:*:*:*:*", - "matchCriteriaId": "41038110-D9D6-4BC3-9416-4A95F8D9ABDD" + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dcs-2103_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.20", + "matchCriteriaId": "D716F4C2-28F6-4DBC-AA18-28F436AC8904" } ] }, @@ -74,10 +74,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:dlink:dcs-2103_firmware:*:*:*:*:*:*:*:*", - "versionEndExcluding": "1.20", - "matchCriteriaId": "D716F4C2-28F6-4DBC-AA18-28F436AC8904" + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dcs-2103:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41038110-D9D6-4BC3-9416-4A95F8D9ABDD" } ] } @@ -109,6 +108,31 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129609/D-Link-DCS-2103-Brute-Force-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/85", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://websecurity.com.ua/7288/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9518.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9518.json index 64225dc31b6..be09f6496bc 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9518.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9518.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9518", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:12.777", - "lastModified": "2015-01-06T17:37:17.063", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:04.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,21 @@ { "url": "http://www.securityfocus.com/bid/71772", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/61831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71772", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9519.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9519.json index e6c4b5ab427..3388bb0ef5e 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9519.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9519.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9519", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:13.777", - "lastModified": "2020-11-30T14:58:45.100", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:04.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ { "url": "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/43", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9520.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9520.json index fc0504d8b74..e73cf19c645 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9520.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9520.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9520", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:16.387", - "lastModified": "2020-11-30T14:58:49.383", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:05.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ { "url": "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/43", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9521.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9521.json index 8d35508de67..fa6ba239b1f 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9521.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9521.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9521", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:17.197", - "lastModified": "2020-11-30T14:58:49.383", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:05.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ { "url": "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/43", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9522.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9522.json index 42af8ba879e..776d462e88f 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9522.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9522.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9522", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:18.137", - "lastModified": "2018-10-09T19:55:09.497", + "lastModified": "2024-11-21T02:21:05.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,39 @@ { "url": "http://www.securityfocus.com/bid/71676", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/115944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129586/CMS-Papoo-6.0.0-Revision-4701-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2014/12/bericht-zu-advisory-sroeadv-2014-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35551", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534243/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71676", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9523.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9523.json index 88224903bc4..a81f81956fb 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9523.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9523.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9523", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:19.167", - "lastModified": "2015-01-06T16:55:57.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:05.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129499/WordPress-Our-Team-Showcase-1.2-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9524.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9524.json index 23061ac6832..7626962cbed 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9524.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9524.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9524", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:20.073", - "lastModified": "2015-01-06T16:57:47.140", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:05.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129506/WordPress-Facebook-Like-Box-2.8.2-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/61557", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/cardoza-facebook-like-box/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9525.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9525.json index 2088fcf87d8..67304f76137 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9525.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9525.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9525", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T20:59:20.917", - "lastModified": "2017-09-08T01:29:35.763", + "lastModified": "2024-11-21T02:21:05.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99377", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129510/WordPress-Timed-Popup-1.3-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99376", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99377", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9526.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9526.json index 912961a99a3..f565b6096de 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9526.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9526.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9526", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-05T21:59:00.060", - "lastModified": "2021-07-15T20:42:44.600", + "lastModified": "2024-11-21T02:21:06.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99264", "source": "cve@mitre.org" + }, + { + "url": "http://morxploit.com/morxploits/morxconxss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129446/Concrete5-CMS-5.7.2-5.7.2.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/38", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534189/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99264", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9527.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9527.json index ce369dc917b..678eca4e81d 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9527.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9527.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9527", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-06T15:59:05.727", - "lastModified": "2017-02-11T02:59:00.433", + "lastModified": "2024-11-21T02:21:06.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -115,6 +114,34 @@ { "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://poi.apache.org/changes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61953", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/77726", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2016:1135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9528.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9528.json index ab755b75813..6fdd5210630 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9528.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9528.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9528", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-06T15:59:06.930", - "lastModified": "2017-09-08T01:29:35.887", + "lastModified": "2024-11-21T02:21:06.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,35 @@ { "url": "https://github.com/humhub/humhub/commit/febb89ab823d0bd6246c6cf460addabb6d7a01d4", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129440/Humhub-0.10.0-rc.1-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/31", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35510", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99272", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/humhub/humhub/commit/febb89ab823d0bd6246c6cf460addabb6d7a01d4", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9529.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9529.json index ab1c10e4967..21fc9d07a55 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9529.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9529.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9529", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T21:59:00.050", - "lastModified": "2024-03-14T19:58:34.480", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:06.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -494,6 +493,176 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a3a8784454692dd72e5d5d34dcdab17b4420e74c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1137.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1138.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3128", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/06/10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71880", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1036763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2511-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2512-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2514-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179813", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/a3a8784454692dd72e5d5d34dcdab17b4420e74c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9556.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9556.json index 90679b7ecf1..3f9c527de7b 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9556.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9556.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9556", "sourceIdentifier": "security@debian.org", "published": "2015-02-03T16:59:05.063", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:07.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,37 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0052.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62793", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/01/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/07/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9559.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9559.json index d04d7b7900a..bc1252d5e2b 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9559.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9559.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9559", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:06.157", - "lastModified": "2015-02-04T03:37:56.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:07.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,14 @@ { "url": "http://tetraph.com/security/cves/cve-2014-9559-snipsnap-xss-cross-site-scripting-security-vulnerabilities/", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-9559-snipsnap-xss-cross-site-scripting-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9560.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9560.json index 0b3f4e85d32..736b7814ef1 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9560.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9560.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9560", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:18.577", - "lastModified": "2015-01-16T16:30:21.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:07.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "http://www.securityfocus.com/bid/71986", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129888/SoftBB-0.1.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/20", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-9560-softbb-net-softbb-sql-injection-security-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71986", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9561.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9561.json index beed4981380..632ca9758ed 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9561.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9561.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9561", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:19.623", - "lastModified": "2015-01-16T16:30:34.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:07.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "http://www.securityfocus.com/bid/71987", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129889/SoftBB-0.1.3-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/21", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-9561-softbb-net-softbb-xss-cross-site-scripting-security-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71987", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9562.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9562.json index df766df6eec..c907d409c48 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9562.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9562.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9562", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:09.510", - "lastModified": "2015-02-05T16:08:44.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:07.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "http://tetraph.com/security/cves/cve-2014-9562-optimalsite-content-management-system-cms-xss-cross-site-scripting-security-vulnerabilities/", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/cves/cve-2014-9562-optimalsite-content-management-system-cms-xss-cross-site-scripting-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9566.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9566.json index 283b68c3757..9f16fc2382c 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9566.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9566.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9566", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-10T14:59:02.757", - "lastModified": "2015-03-11T19:19:27.490", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:08.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -157,6 +156,49 @@ { "url": "https://github.com/rapid7/metasploit-framework/pull/4836", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/118746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130637/Solarwinds-Orion-Service-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/18", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://volatile-minds.blogspot.com/2015/02/authenticated-stacked-sql-injection-in.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36262", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.solarwinds.com/documentation/orion/docs/releasenotes/releasenotes.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/rapid7/metasploit-framework/pull/4836", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9567.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9567.json index a1fe9fea279..18cae275685 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9567.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9567.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9567", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-07T18:59:02.730", - "lastModified": "2017-09-08T01:29:36.217", + "lastModified": "2024-11-21T02:21:08.760", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -170,6 +169,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99548", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/116469", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129759/ProjectSend-Arbitrary-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35424", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35660", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99548", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9568.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9568.json index 09af3d6bfc9..9bace913004 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9568.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9568.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9568", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:07.470", - "lastModified": "2019-07-11T14:35:34.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:08.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -88,6 +87,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2014-9568", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9569.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9569.json index 229bc27bb27..bfaf6ca78ef 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9569.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9569.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9569", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-07T19:59:03.933", - "lastModified": "2024-02-14T01:17:43.863", + "lastModified": "2024-11-21T02:21:09.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ "Exploit", "URL Repurposed" ] + }, + { + "url": "http://secunia.com/advisories/62017", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031509", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.senseofsecurity.com.au/advisories/SOS-14-005", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9570.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9570.json index 62acdbe9f0d..7d9da0b3c8b 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9570.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9570.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9570", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:20.547", - "lastModified": "2018-10-09T19:55:10.247", + "lastModified": "2024-11-21T02:21:09.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534477/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9571.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9571.json index ebf692c066e..1cc39c41102 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9571.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9571.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9571", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-26T15:59:10.550", - "lastModified": "2017-09-08T01:29:36.263", + "lastModified": "2024-11-21T02:21:09.367", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -118,6 +117,47 @@ { "url": "https://www.mantisbt.org/bugs/view.php?id=17938", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/156", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/132cd6d0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/6d47c047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23243", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17938", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9572.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9572.json index 7b1d9e32455..7710db1d417 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9572.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9572.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9572", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-26T15:59:11.643", - "lastModified": "2017-09-08T01:29:36.327", + "lastModified": "2024-11-21T02:21:09.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17939", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9573.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9573.json index 1f174cdbe73..e23f1f2a7c6 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9573.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9573.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9573", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-26T15:59:12.597", - "lastModified": "2017-09-08T01:29:36.387", + "lastModified": "2024-11-21T02:21:09.677", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -115,6 +114,44 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/157", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/69c2d28d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/7cc4539f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17940", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9574.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9574.json index 1f384cc60d3..dbc36060f78 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9574.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9574.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9574", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:08.657", - "lastModified": "2017-09-08T01:29:36.433", + "lastModified": "2024-11-21T02:21:09.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://fluxbb.org/forums/viewtopic.php?id=8203", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9575.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9575.json index 228badeff83..e02f89ee8f8 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9575.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9575.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9575", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T15:59:00.047", - "lastModified": "2015-01-08T19:43:42.520", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:09.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -100,6 +99,34 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://vdgsecurity.com/downloads/software/?file=1.+DIVA+2.3%2F2.+Changelog+2.3.16.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-0_VDG_Security_SENSE_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9576.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9576.json index a55ad8c735b..388c7cfc75a 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9576.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9576.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9576", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T15:59:01.563", - "lastModified": "2015-01-08T19:44:57.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:10.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-0_VDG_Security_SENSE_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9577.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9577.json index fa51bda85fe..6791e856305 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9577.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9577.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9577", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T15:59:02.610", - "lastModified": "2015-01-08T19:50:15.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:10.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-0_VDG_Security_SENSE_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9578.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9578.json index a878de12a45..5b02de3d966 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9578.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9578.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9578", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T15:59:03.530", - "lastModified": "2017-03-07T02:59:00.203", + "lastModified": "2024-11-21T02:21:10.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-0_VDG_Security_SENSE_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9579.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9579.json index 70c8d56056d..7236cb5efe1 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9579.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9579.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9579", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T15:59:04.390", - "lastModified": "2015-01-08T19:54:27.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:10.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Dec/76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-0_VDG_Security_SENSE_Multiple_critical_vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9580.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9580.json index 5a49c1389f8..25c8927b31e 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9580.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9580.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9580", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T19:59:00.057", - "lastModified": "2017-09-08T01:29:36.497", + "lastModified": "2024-11-21T02:21:10.780", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99550", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129666", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35582", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99550", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9581.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9581.json index 5670e433e44..a658c0ebf3b 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9581.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9581.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9581", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T20:59:00.057", - "lastModified": "2015-01-11T02:59:28.117", + "lastModified": "2024-11-21T02:21:10.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/35585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9582.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9582.json index a239423d0f7..7c473eeefee 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9582.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9582.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9582", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T20:59:01.277", - "lastModified": "2015-01-11T02:59:29.103", + "lastModified": "2024-11-21T02:21:11.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/35585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9583.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9583.json index 322a931828e..ba2648f14cc 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9583.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9583.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9583", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T20:59:02.243", - "lastModified": "2018-04-27T01:29:00.617", + "lastModified": "2024-11-21T02:21:11.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -137,6 +136,35 @@ { "url": "https://www.exploit-db.com/exploits/44524/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129815/ASUSWRT-3.0.0.4.376_1071-LAN-Backdoor-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/jduck/asus-cmd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.t-mobile.com/docs/DOC-21994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/44524/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9584.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9584.json index 5b1ab121292..4c955c9400a 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9584.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9584.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9584", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-09T21:59:01.533", - "lastModified": "2023-02-13T00:45:22.080", + "lastModified": "2024-11-21T02:21:11.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -519,6 +518,203 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e2024624e678f0ebb916e6192bd23c1f9fdf696", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1137.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1138.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3128", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/09/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71883", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2511-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2512-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2514-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/4e2024624e678f0ebb916e6192bd23c1f9fdf696", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9585.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9585.json index 70d575d7703..3605bf34fcb 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9585.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9585.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9585", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T21:59:02.720", - "lastModified": "2023-11-07T02:23:06.927", + "lastModified": "2024-11-21T02:21:11.590", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -485,6 +484,179 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/luto/linux.git%3Ba=commit%3Bh=bc3b94c31d65e761ddfe150d02932c65971b74e2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/tip/tip.git%3Ba=commit%3Bh=fbe1bf140671619508dfa575d74a185ae53c5dbb", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148480.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1081.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1778.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1787.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/12/09/10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/09/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71990", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2514-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9587.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9587.json index f5fdf6c1698..adff54e35d0 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9587.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9587.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9587", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:21.547", - "lastModified": "2015-01-16T17:19:05.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:11.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,30 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179780", "source": "cve@mitre.org" + }, + { + "url": "http://roundcube.net/news/2014/12/18/update-1.0.4-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71909", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=534766", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179780", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9593.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9593.json index 979e1c4982e..edfa9976dca 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9593.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9593.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9593", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:23.357", - "lastModified": "2015-01-16T18:34:29.713", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:12.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -107,6 +106,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://docs.cloudstack.apache.org/projects/cloudstack-release-notes/en/4.3.2/about.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://docs.cloudstack.apache.org/projects/cloudstack-release-notes/en/4.4.2/fixed_issues.html#issues-fixed-in-release", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.apache.org/jira/browse/CLOUDSTACK-7952", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9594.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9594.json index db1312d50ca..d49439a5452 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9594.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9594.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9594", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:24.687", - "lastModified": "2018-12-10T19:29:06.437", + "lastModified": "2024-11-21T02:21:12.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -88,6 +87,18 @@ { "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-025-sap-kernel-rce-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9595.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9595.json index 5d0a478874a..c2682597215 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9595.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9595.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9595", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:25.763", - "lastModified": "2018-12-10T19:29:06.530", + "lastModified": "2024-11-21T02:21:12.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -88,6 +87,18 @@ { "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-14-024-sap-kernel-rce-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-december-2014/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9596.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9596.json index 098d74149e0..e18ed4c7e59 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9596.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9596.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9596", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T23:59:00.053", - "lastModified": "2015-01-16T18:31:00.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:12.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -127,6 +126,21 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://us2.campaign-archive1.com/?u=8c9cff2e712e3b7d09a07ecef&id=21f059b3ab", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/117604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9597.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9597.json index 76769bbd54d..3682d96570d 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9597.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9597.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9597", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T15:17:08.573", - "lastModified": "2024-02-14T01:17:43.863", + "lastModified": "2024-11-21T02:21:12.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://trac.videolan.org/vlc/ticket/13389", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/72", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.binarysniper.net/2015/01/vlc-media-player-215-memory-corruption.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201603-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.videolan.org/vlc/attachment/ticket/13389/windbglog.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.videolan.org/vlc/ticket/13389", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9598.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9598.json index 3da8537b810..aa77184765d 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9598.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9598.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9598", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T15:17:10.027", - "lastModified": "2024-02-14T01:17:43.863", + "lastModified": "2024-11-21T02:21:12.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://trac.videolan.org/vlc/ticket/13390", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/72", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.binarysniper.net/2015/01/vlc-media-player-215-memory-corruption.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201603-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.videolan.org/vlc/attachment/ticket/13390/windbglog.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.videolan.org/vlc/ticket/13390", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9599.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9599.json index 84b2459e24e..55c3dd97c04 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9599.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9599.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9599", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T15:59:00.047", - "lastModified": "2017-09-08T01:29:36.560", + "lastModified": "2024-11-21T02:21:12.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,54 @@ { "url": "https://twitter.com/SecLists/status/554937224366546944", "source": "cve@mitre.org" + }, + { + "url": "http://b2evolution.net/downloads/5-2-1-stable", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129940/CMS-b2evolution-5.2.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/48", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://twitter.com/SecLists/status/554937224366546944", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9600.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9600.json index e3015f193ee..d0e80cab646 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9600.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9600.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9600", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T15:59:01.687", - "lastModified": "2017-09-08T01:29:36.607", + "lastModified": "2024-11-21T02:21:13.000", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -83,6 +81,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99833", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129764/iExplorer-3.6.3.0-DLL-Hijacking.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99833", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9601.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9601.json index 9c4186752a0..2ad44bde07c 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9601.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9601.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9601", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T16:59:17.123", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:13.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -153,6 +152,52 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148442.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00056.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://pillow.readthedocs.org/releasenotes/2.7.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/77758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/python-pillow/Pillow/pull/1060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.djangoproject.com/weblog/2015/jan/02/pillow-security-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9602.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9602.json index da2c2e927cf..3101f81e7b9 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9602.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9602.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9602", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T20:59:00.057", - "lastModified": "2023-11-07T02:23:08.543", + "lastModified": "2024-11-21T02:21:13.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=93a5a16f136d095d23610f57bdad10ba88120fba", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9603.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9603.json index a48c2713e44..3ab9a6336ca 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9603.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9603.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9603", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T20:59:01.200", - "lastModified": "2023-11-07T02:23:08.603", + "lastModified": "2024-11-21T02:21:13.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=3030fb7e0d41836f8add6399e9a7c7b740b48bfd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9604.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9604.json index 9091c9b1ac6..dff9b210afa 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9604.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9604.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9604", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T20:59:02.247", - "lastModified": "2023-11-07T02:23:08.667", + "lastModified": "2024-11-21T02:21:13.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,18 @@ { "url": "https://security.gentoo.org/glsa/201603-06", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=3881606240953b9275a247a1c98a567f3c44890f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2534-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9620.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9620.json index 10788810c7b..f2ba437d931 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9620.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9620.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9620", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T18:59:05.937", - "lastModified": "2018-06-16T01:29:00.507", + "lastModified": "2024-11-21T02:21:15.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -183,6 +182,53 @@ { "url": "https://usn.ubuntu.com/3686-1/", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mx.gw.com/pipermail/file/2014/001653.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mx.gw.com/pipermail/file/2015/001660.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0760.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/17/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://usn.ubuntu.com/3686-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9621.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9621.json index be89b4a16cb..f6098ad46de 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9621.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9621.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9621", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T18:59:07.153", - "lastModified": "2018-06-16T01:29:00.663", + "lastModified": "2024-11-21T02:21:15.997", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -127,6 +126,37 @@ { "url": "https://usn.ubuntu.com/3686-1/", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mx.gw.com/pipermail/file/2014/001654.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mx.gw.com/pipermail/file/2015/001660.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/17/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/file/file/commit/65437cee25199dbd385fb35901bc0011e164276c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://usn.ubuntu.com/3686-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9622.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9622.json index 95e627704c4..651d84bfd7f 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9622.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9622.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9622", "sourceIdentifier": "security@debian.org", "published": "2015-01-21T18:59:08.170", - "lastModified": "2017-07-01T01:29:09.450", + "lastModified": "2024-11-21T02:21:16.153", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,47 @@ { "url": "https://security.gentoo.org/glsa/201701-09", "source": "security@debian.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2014/Nov/36", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/62155", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/17/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.freedesktop.org/show_bug.cgi?id=66670", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=472888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201701-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9623.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9623.json index c1bff0d2936..a52503479b9 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9623.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9623.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9623", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-23T15:59:06.537", - "lastModified": "2016-12-07T03:01:39.207", + "lastModified": "2024-11-21T02:21:16.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -146,6 +145,45 @@ { "url": "https://security.openstack.org/ossa/OSSA-2015-003.html", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0644.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0837.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0838.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/18/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/glance/+bug/1383973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/glance/+bug/1398830", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.openstack.org/ossa/OSSA-2015-003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9632.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9632.json index 70e55476a34..bf6935e1b23 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9632.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9632.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9632", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:00.057", - "lastModified": "2019-02-01T18:07:55.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:17.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -134,6 +133,43 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://packetstormsecurity.com/files/130248/AVG-Internet-Security-2015.0.5315-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://www.avg.com/eu-en/avg-release-notes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://www.greyhathacker.net/?p=818", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/113824", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9633.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9633.json index 7b4c36c80b8..9f41912eeb5 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9633.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9633.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9633", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:09.703", - "lastModified": "2015-02-04T16:39:35.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:17.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://forums.comodo.com/news-announcements-feedback-cb/comodo-backup-44123-released-t107293.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130094/Comodo-Backup-4.4.0.0-NULL-Pointer-Dereference.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9636.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9636.json index 29da71a3845..875e72ff650 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9636.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9636.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9636", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:06.757", - "lastModified": "2019-12-16T20:24:14.587", + "lastModified": "2024-11-21T02:21:18.103", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -196,6 +195,66 @@ { "url": "https://security.gentoo.org/glsa/201611-01", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148792.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148849.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/1131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/489", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2014/q4/496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62738", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62751", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3152", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71825", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2489-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201611-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9638.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9638.json index 3688387af9d..799e08e3eb9 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9638.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9638.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9638", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-23T15:59:07.523", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-369: Divide By Zero", + "lastModified": "2024-11-21T02:21:18.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -137,6 +135,42 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150543.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150570.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/78", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/21/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72290", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.xiph.org/ticket/2137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-369: Divide By Zero" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9639.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9639.json index 7f6d05310da..5a4126efa21 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9639.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9639.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9639", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-23T15:59:09.163", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-190: Integer Overflow or Wraparound", + "lastModified": "2024-11-21T02:21:18.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -137,6 +135,42 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150543.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150570.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/78", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/21/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72295", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.xiph.org/ticket/2136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-190: Integer Overflow or Wraparound" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9640.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9640.json index 34e1571b817..c01c08030b0 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9640.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9640.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9640", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-23T15:59:10.117", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:18.670", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,38 @@ { "url": "https://trac.xiph.org/ticket/2009", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0051.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148852.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/21/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.xiph.org/changeset/19117", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.xiph.org/ticket/2009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9641.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9641.json index 1fb7a229043..70f2abe00c3 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9641.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9641.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9641", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:08.757", - "lastModified": "2015-02-09T16:02:16.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:18.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -97,6 +96,31 @@ { "url": "http://www.osvdb.org/115514", "source": "cve@mitre.org" + }, + { + "url": "http://esupport.trendmicro.com/en-us/home/pages/technical-support/1106233.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35962", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.greyhathacker.net/?p=818", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/115514", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9642.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9642.json index 003ec50c3f3..7d0be468f54 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9642.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9642.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9642", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:10.057", - "lastModified": "2015-02-09T16:09:34.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:18.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -129,6 +128,38 @@ { "url": "http://www.osvdb.org/114478", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130247/BullGuard-14.1.285.4-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.bullguard.com/about/release-notes.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.greyhathacker.net/?p=818", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/114478", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9643.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9643.json index 62a5ca2732a..efa51aad01b 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9643.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9643.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9643", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:11.477", - "lastModified": "2015-02-09T16:09:53.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:19.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -122,6 +121,31 @@ { "url": "http://www.osvdb.org/113007", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35992", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.greyhathacker.net/?p=818", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/113007", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9644.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9644.json index ac091c69822..634c8a77b0f 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9644.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9644.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9644", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-02T11:59:03.660", - "lastModified": "2023-11-07T02:23:09.017", + "lastModified": "2024-11-21T02:21:19.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -277,6 +276,141 @@ "tags": [ "Permissions Required" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4943ba16bbc2db05115707b3ff7b4874e9e3c560", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/24/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72320", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2514-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2543-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2544-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2545-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2546-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190546", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/4943ba16bbc2db05115707b3ff7b4874e9e3c560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9646.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9646.json index 044b08cce1a..6a55b98f3a2 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9646.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9646.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9646", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T19:59:11.933", - "lastModified": "2015-02-21T03:01:40.627", + "lastModified": "2024-11-21T02:21:19.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -95,6 +94,29 @@ { "url": "https://codereview.chromium.org/741993002", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=434964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/741993002", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9647.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9647.json index 71752dc0f03..af92cb9e801 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9647.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9647.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9647", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:00:28.930", - "lastModified": "2015-02-21T03:01:41.597", + "lastModified": "2024-11-21T02:21:19.850", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +94,30 @@ { "url": "https://pdfium.googlesource.com/pdfium/+/facd0157ce975158da1659fb58a16c1308bd553b", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=410326", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://pdfium.googlesource.com/pdfium/+/facd0157ce975158da1659fb58a16c1308bd553b", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9648.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9648.json index 63eb606e072..8e7ce54f9e6 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9648.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9648.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9648", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:01:43.627", - "lastModified": "2015-02-21T03:01:42.547", + "lastModified": "2024-11-21T02:21:20.003", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ { "url": "https://code.google.com/p/chromium/issues/detail?id=449894", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=331571", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449894", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9649.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9649.json index 7ab5c2b62a0..78eec30c3d1 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9649.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9649.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9649", "sourceIdentifier": "security@ubuntu.com", "published": "2015-01-27T20:02:39.637", - "lastModified": "2023-11-07T02:23:09.137", + "lastModified": "2024-11-21T02:21:20.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -309,6 +308,29 @@ { "url": "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs", "source": "security@ubuntu.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0308.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/21/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.rabbitmq.com/release-notes/README-3.4.1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/76084", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9650.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9650.json index 53a380ff3ee..46e7f865a49 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9650.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9650.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9650", "sourceIdentifier": "security@ubuntu.com", "published": "2015-01-27T20:03:15.080", - "lastModified": "2023-11-07T02:23:09.237", + "lastModified": "2024-11-21T02:21:20.307", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -314,6 +312,34 @@ { "url": "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs", "source": "security@ubuntu.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0308.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/21/13", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.rabbitmq.com/release-notes/README-3.4.1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/76091", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21topic/rabbitmq-users/-3Z2FyGtXhs", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9652.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9652.json index 24a780d789b..864ed908451 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9652.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9652.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9652", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:01.347", - "lastModified": "2017-07-01T01:29:09.687", + "lastModified": "2024-11-21T02:21:20.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -402,6 +401,90 @@ { "url": "https://support.apple.com/HT205267", "source": "cve@mitre.org" + }, + { + "url": "http://bugs.gw.com/view.php?id=398", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2015/02/05/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72505", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=68735", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/patch-display.php?bug=68735&patch=bug68735.patch&revision=1420309079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-42", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9653.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9653.json index f9281b6cd42..6092d8b3bd0 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9653.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9653.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9653", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:03.583", - "lastModified": "2018-06-16T01:29:00.837", + "lastModified": "2024-11-21T02:21:20.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -393,6 +392,66 @@ { "url": "https://usn.ubuntu.com/3686-1/", "source": "cve@mitre.org" + }, + { + "url": "http://bugs.gw.com/view.php?id=409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mx.gw.com/pipermail/file/2014/001649.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2015/02/05/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0760.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72516", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/file/file/commit/445c8fb0ebff85195be94cd9f7e1df89cade5c7f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-42", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://usn.ubuntu.com/3686-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9656.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9656.json index 0daca6aeff5..290766f46dd 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9656.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9656.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9656", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:15.163", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:21.357", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -244,6 +243,88 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=196", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f0292bb9920aa1dbfed5f53861e7c7a89b35833a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9657.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9657.json index 64eb8766868..e2dff9939ea 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9657.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9657.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9657", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:19.647", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:21.543", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -340,6 +339,99 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=eca0f067068020870a429fe91f6329e499390d55", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9658.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9658.json index 84dad68f943..59b8e3ca3e4 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9658.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9658.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9658", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:20.647", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:21.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -340,6 +339,99 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=194", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f70d9342e65cd2cb44e9f26b6d7edeedf191fc6c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9659.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9659.json index 173e3d95897..da34eb7180a 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9659.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9659.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9659", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:21.633", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:21.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -228,6 +227,67 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=190", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2cdc4562f873237f1c77d43540537c7a721d3fd8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9660.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9660.json index 2545c5cb40f..76c90b6ff6e 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9660.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9660.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9660", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:22.680", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:22.077", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -341,6 +339,100 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=af8346172a7b573715134f7a51e6c5c60fa7f2ab", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9661.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9661.json index 395dca91466..bc443b36cb8 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9661.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9661.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9661", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:23.587", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:22.263", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -295,6 +293,74 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=187", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3788187e0c396952cd7d905c6c61f3ff8e84b2b4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=42fcd6693ec7bd6ffc65ddc63e74287a65dda669", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/134396/FreeType-2.5.3-Type42-Parsing-Use-After-Free.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9662.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9662.json index 8b4a9308811..223842d6a28 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9662.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9662.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9662", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:24.537", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:22.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -205,6 +204,49 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5f201ab5c24cb69bc96b724fd66e739928d6c5e2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9663.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9663.json index 55b81fb2c7c..4d5704cb732 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9663.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9663.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9663", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:25.490", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:22.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -340,6 +339,99 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=184", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9bd20b7304aae61de5d50ac359cf27132bafd4c1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9664.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9664.json index 4d014e8a29a..dcc8e8e04c1 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9664.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9664.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9664", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:26.413", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:22.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -346,6 +345,105 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=73be9f9ab67842cfbec36ee99e8d2301434c84ca", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=dd89710f0f643eb0f99a3830e0712d26c7642acd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9665.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9665.json index 9f75f4104b8..f7d81cc6881 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9665.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9665.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9665", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:27.337", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:23.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -190,6 +189,49 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=168", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=54abd22891bd51ef8b533b24df53b3019b5cee81", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b3500af717010137046ec4076d1e1c0641e33727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9666.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9666.json index 78a0dcdbd94..76f37e3dae5 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9666.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9666.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9666", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:28.193", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:23.207", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -333,6 +332,92 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=167", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=257c270bd25e15890190a28a1456e7623bba4439", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9667.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9667.json index dfa6f9480a7..43e5ad0c3bf 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9667.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9667.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9667", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:29.133", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:23.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -319,6 +318,98 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=677ddf4f1dc1b36cef7c7ddd59a14c508f4b1891", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9668.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9668.json index 0fc7749cd82..279a985bb7b 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9668.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9668.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9668", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:29.977", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:23.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -186,6 +185,45 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f46add13895337ece929b18bb8f036431b3fb538", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9669.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9669.json index 400ebadfbf5..af3cf5e09c2 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9669.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9669.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9669", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:30.850", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:23.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -340,6 +339,99 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=163", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=602040b1112c9f94d68e200be59ea7ac3d104565", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9670.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9670.json index 148a52ef9a2..d565a59d46e 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9670.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9670.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9670", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:31.693", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:23.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -340,6 +339,99 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=158", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ef1eba75187adfac750f326b563fe543dd5ff4e6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9671.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9671.json index ae28914a9e7..bbe8f245634 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9671.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9671.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9671", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:32.617", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:24.130", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -307,6 +305,86 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=157", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0e2f5d518c60e2978f26400d110eff178fa7e3c3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9672.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9672.json index 1c35b51e948..f5c5d0043d9 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9672.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9672.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9672", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:33.663", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:24.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -238,6 +237,82 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=155", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=18a8f0d9943369449bc4de92d411c78fb08d616c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/134395/FreeType-2.5.3-Mac-FOND-Resource-Parsing-Out-Of-Bounds-Read-From-Stack.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9673.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9673.json index 89bc8dc348f..0853edb007b 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9673.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9673.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9673", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:34.647", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:24.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -285,6 +284,84 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=154", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=35252ae9aa1dd9343e9f4884e9ddb1fee10ef415", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9674.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9674.json index 9cc6cc1365f..6f4be1e5785 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9674.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9674.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9674", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:35.633", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:24.710", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-190: Integer Overflow or Wraparound", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -331,6 +329,105 @@ { "url": "https://security.gentoo.org/glsa/201503-05", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=240c94a185cd8dae7d03059abec8a5662c35ecd3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=cd4a5a26e591d01494567df9dec7f72d59551f6e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2016/dsa-3461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-190: Integer Overflow or Wraparound" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9675.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9675.json index 42c0f0ff247..1d5a3182265 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9675.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9675.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9675", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-08T11:59:36.490", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:24.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -323,6 +322,102 @@ { "url": "https://source.android.com/security/bulletin/2016-11-01.html", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=151", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2c4832d30939b45c05757f0a05128ce64c4cacc7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2739-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://source.android.com/security/bulletin/2016-11-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9676.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9676.json index acfe6267f6d..3d71fa7f2dd 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9676.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9676.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9676", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-28T01:59:00.073", - "lastModified": "2016-11-30T02:59:08.390", + "lastModified": "2024-11-21T02:21:25.093", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +82,18 @@ { "url": "https://security.gentoo.org/glsa/201606-09", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/38", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201606-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9679.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9679.json index 15ff46bd88f..5860575194a 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9679.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9679.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9679", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:11.313", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:21:25.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -230,6 +229,117 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150171.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150177.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1123.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3172", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/10/15", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/12/12", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72594", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031776", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2520-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201607-06", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.cups.org/str.php?L4551", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9682.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9682.json index cc7f4469760..9ca9bfd2e83 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9682.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9682.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9682", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-28T01:59:01.963", - "lastModified": "2015-03-02T20:26:09.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:25.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ { "url": "https://github.com/skoranga/node-dns-sync/issues/1", "source": "cve@mitre.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2014/11/11/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/skoranga/node-dns-sync/issues/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9683.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9683.json index 4372716dbc9..f27f82c9768 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9683.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9683.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9683", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-03T11:59:02.417", - "lastModified": "2023-11-07T02:23:09.753", + "lastModified": "2024-11-21T02:21:26.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -169,6 +168,78 @@ { "url": "https://github.com/torvalds/linux/commit/942080643bce061c3dd9d5718d3b745dcb39a8bc", "source": "cve@mitre.org" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=942080643bce061c3dd9d5718d3b745dcb39a8bc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1272.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/17/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031860", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2541-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2542-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/942080643bce061c3dd9d5718d3b745dcb39a8bc", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9684.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9684.json index 0a0affd6979..1ad34d38828 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9684.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9684.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9684", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T15:59:03.537", - "lastModified": "2017-01-03T02:59:27.127", + "lastModified": "2024-11-21T02:21:26.357", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72692", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/glance/+bug/1371118", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9685.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9685.json index 9e29f9feb19..6b21751efcd 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9685.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9685.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9685", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-25T22:59:00.047", - "lastModified": "2020-06-04T13:16:46.677", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:26.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,26 @@ { "url": "http://www.securitytracker.com/id/1031822", "source": "cve@mitre.org" + }, + { + "url": "http://vanillaforums.org/discussion/27540/vanilla-2-1-1-important-security-bug-release", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://vanillaforums.org/discussion/27541/vanilla-2-0-18-12-security-release-for-old-2-0-18-installs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031822", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9687.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9687.json index 2bd4b3ec745..d5759eb004e 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9687.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9687.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9687", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-16T14:59:00.067", - "lastModified": "2016-12-06T02:59:27.990", + "lastModified": "2024-11-21T02:21:26.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +101,36 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/10/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/17/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/28/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2524-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/ecryptfs/+bug/906550", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9688.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9688.json index 6bc9fbac734..71307178b9e 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9688.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9688.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9688", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-05T16:59:00.053", - "lastModified": "2015-03-05T18:00:12.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:26.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -76,6 +75,10 @@ { "url": "https://wordpress.org/plugins/ninja-forms/changelog/", "source": "cve@mitre.org" + }, + { + "url": "https://wordpress.org/plugins/ninja-forms/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-96xx/CVE-2014-9689.json b/CVE-2014/CVE-2014-96xx/CVE-2014-9689.json index 5970cb818a1..af736a82af9 100644 --- a/CVE-2014/CVE-2014-96xx/CVE-2014-9689.json +++ b/CVE-2014/CVE-2014-96xx/CVE-2014-9689.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9689", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T00:59:02.450", - "lastModified": "2015-03-09T17:51:13.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:27.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ { "url": "https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/michalevsky", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=421691", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=463349", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://crypto.stanford.edu/gyrophone/files/gyromic.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/michalevsky", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9705.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9705.json index 4f9b552a57d..b0613c1d817 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9705.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9705.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9705", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:04.567", - "lastModified": "2018-01-05T02:29:57.697", + "lastModified": "2024-11-21T02:21:28.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -410,6 +409,104 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2015/03/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://svn.php.net/viewvc/pecl/enchant/trunk/enchant.c?r1=317600&r2=335803", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3195", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2535-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=68552", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201606-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23252", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9706.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9706.json index f64e5fa9b5f..b2ef64b9249 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9706.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9706.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9706", "sourceIdentifier": "security@debian.org", "published": "2015-03-31T14:59:04.860", - "lastModified": "2023-11-07T02:23:09.983", + "lastModified": "2024-11-21T02:21:29.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -121,6 +120,40 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154523.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154551.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3206", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/21/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/22/26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.samba.org/?p=jelmer/dulwich.git%3Ba=commitdiff%3Bh=091638be3c89f46f42c3b1d57dc1504af5729176", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.launchpad.net/dulwich-users/msg00827.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9707.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9707.json index a429e4e6827..59b39317b35 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9707.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9707.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9707", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-31T14:59:06.250", - "lastModified": "2018-10-09T19:55:10.497", + "lastModified": "2024-11-21T02:21:29.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -136,6 +135,36 @@ { "url": "https://github.com/embedthis/goahead/issues/106", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/157", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535027/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/embedthis/goahead/issues/106", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9708.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9708.json index 61c9b913606..6f80bd286fd 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9708.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9708.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9708", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-31T14:59:07.313", - "lastModified": "2023-06-22T19:49:41.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:29.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -2477,6 +2476,25 @@ "VDB Entry" ] }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/19", + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/158", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, { "url": "http://seclists.org/fulldisclosure/2015/Mar/158", "source": "cve@mitre.org", @@ -2577,6 +2595,144 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/158", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/158", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/28/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/06/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535028/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/archive/1/535028/100/1400/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73407", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1037007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/embedthis/appweb/commit/7e6a925f5e86a19a7934a94bbd6959101d0b84eb#diff-7ca4d62c70220e0e226e7beac90c95d9L17348", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Patch" + ] + }, + { + "url": "https://github.com/embedthis/appweb/issues/413", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://security.paloaltonetworks.com/CVE-2014-9708", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved?language=en_US", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9709.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9709.json index d3d68a98bbe..db9674ff7c4 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9709.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9709.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9709", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:05.677", - "lastModified": "2022-11-09T03:04:19.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:29.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -213,6 +212,14 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://php.net/ChangeLog-5.php", "source": "cve@mitre.org", @@ -342,6 +349,183 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3215", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73306", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033703", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2987-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bitbucket.org/libgd/gd-libgd/commits/47eb44b2e90ca88a08dca9f9a1aa9041e9587f43", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=68601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188639", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201606-10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201607-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9710.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9710.json index d8838ab7f8e..57f2aac8e9b 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9710.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9710.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9710", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-27T10:59:00.063", - "lastModified": "2024-07-17T15:28:07.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:29.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -155,6 +154,61 @@ "tags": [ "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/24/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032418", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9711.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9711.json index 574034824a3..190aca875ea 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9711.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9711.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9711", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-25T14:59:00.063", - "lastModified": "2018-10-09T19:55:11.637", + "lastModified": "2024-11-21T02:21:30.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -161,6 +160,71 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130903/Websense-Explorer-Report-Scheduler-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130905/Websense-Reporting-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534915/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534917/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.websense.com/support/article/kbarticle/v7-8-3-About-Hotfix-02-for-Web-Security-Solutions", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-01-for-Web-Security-Solutions", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.securify.nl/advisory/SFY20140911/cross_site_scripting_vulnerability_in_websense_explorer_report_scheduler.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.securify.nl/advisory/SFY20140914/multiple_cross_site_scripting_vulnerabilities_in_websense_reporting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9712.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9712.json index 5924168e6e3..c6f63aa55a5 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9712.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9712.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9712", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:04.603", - "lastModified": "2016-06-23T12:00:12.700", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:30.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/v7-8-3-About-Hotfix-03-for-V-Series-Appliance", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.websense.com/support/article/kbarticle/v7-8-4-About-Hotfix-01-for-V-Series-Appliance", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9713.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9713.json index 8f2d840a72e..ace1349c746 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9713.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9713.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9713", "sourceIdentifier": "security@debian.org", "published": "2015-04-01T14:59:00.067", - "lastModified": "2016-12-22T02:59:22.157", + "lastModified": "2024-11-21T02:21:30.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -189,6 +188,29 @@ { "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406", "source": "security@debian.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/29/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73217", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2742-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9714.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9714.json index ee24c740d21..d43a4b728cb 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9714.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9714.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9714", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:00.070", - "lastModified": "2016-06-24T15:55:49.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:30.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,41 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74061", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/facebook/hhvm/commit/324701c9fd31beb4f070f1b7ef78b115fbdfec34", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/facebook/hhvm/issues/4283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T85851", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9715.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9715.json index ba56256a88e..307ad8ca43d 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9715.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9715.json @@ -2,10 +2,8 @@ "id": "CVE-2014-9715", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T10:59:02.267", - "lastModified": "2023-11-07T02:23:10.130", + "lastModified": "2024-11-21T02:21:30.750", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -121,6 +119,55 @@ { "url": "https://github.com/torvalds/linux/commit/223b02d923ecd7c84cf9780bb3686f455d279279", "source": "cve@mitre.org" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=223b02d923ecd7c84cf9780bb3686f455d279279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=netfilter-devel&m=140112364215200&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1534.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1564.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/08/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73953", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032415", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/223b02d923ecd7c84cf9780bb3686f455d279279", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9716.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9716.json index 5309fe38994..9384791bb02 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9716.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9716.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9716", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-08T14:59:00.100", - "lastModified": "2019-01-30T17:56:46.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:21:30.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,37 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/kogmbh/WebODF/blob/master/ChangeLog.md", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/kogmbh/WebODF/pull/851", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-002", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-97xx/CVE-2014-9718.json b/CVE-2014/CVE-2014-97xx/CVE-2014-9718.json index 874bd60b286..4f239b3100f 100644 --- a/CVE-2014/CVE-2014-97xx/CVE-2014-9718.json +++ b/CVE-2014/CVE-2014-97xx/CVE-2014-9718.json @@ -2,9 +2,8 @@ "id": "CVE-2014-9718", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-21T16:59:00.077", - "lastModified": "2023-02-13T00:45:32.650", + "lastModified": "2024-11-21T02:21:31.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -307,6 +306,22 @@ { "url": "http://www.securityfocus.com/bid/73316", "source": "secalert@redhat.com" + }, + { + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3251bdcf1c67427d964517053c3d185b46e618e8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2015/04/20/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3259", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73316", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0001.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0001.json index 39955dde7f5..139ffc6b884 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0001.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0001.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0001", "sourceIdentifier": "secure@microsoft.com", "published": "2015-01-13T22:59:00.050", - "lastModified": "2018-10-12T22:07:48.240", + "lastModified": "2024-11-21T02:22:09.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -120,6 +119,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99514", "source": "secure@microsoft.com" + }, + { + "url": "http://packetstormsecurity.com/files/134392/Microsoft-Windows-8.1-Ahcache.sys-NtApphelpCacheControl-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71927", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99513", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99514", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0002.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0002.json index 5ba2a7b686a..506c1dec327 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0002.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0002.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0002", "sourceIdentifier": "secure@microsoft.com", "published": "2015-01-13T22:59:01.253", - "lastModified": "2018-10-12T22:07:49.053", + "lastModified": "2024-11-21T02:22:09.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -141,6 +140,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99524", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/61277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://twitter.com/sambowne/statuses/550384131683520512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zdnet.com/article/google-discloses-unpatched-windows-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=118", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99523", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99524", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0003.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0003.json index 364f96a712c..665370bba6e 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0003.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0003.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0003", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:28.763", - "lastModified": "2019-05-14T19:39:48.313", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:10.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -150,6 +149,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/72457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100430", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0004.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0004.json index 2ad5fffd1b9..74bffdfd761 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0004.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0004.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0004", "sourceIdentifier": "secure@microsoft.com", "published": "2015-01-13T22:59:02.597", - "lastModified": "2019-02-26T14:04:02.387", + "lastModified": "2024-11-21T02:22:10.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -148,6 +147,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99520", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/61927", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71967", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/google-security-research/issues/detail?id=123", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99520", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0005.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0005.json index 56866daf491..5f31feafec2 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0005.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0005.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0005", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:00.087", - "lastModified": "2019-05-08T22:03:15.720", + "lastModified": "2024-11-21T02:22:10.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 4.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -131,6 +130,36 @@ { "url": "https://www.samba.org/samba/history/samba-4.2.10.html", "source": "secure@microsoft.com" + }, + { + "url": "http://packetstormsecurity.com/files/130773/Windows-Pass-Through-Authentication-Methods-Improper-Validation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/60", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/advisories/windows-pass-through-authentication-methods-improper-validation", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.samba.org/samba/history/samba-4.2.10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0006.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0006.json index 8c9fda3ea8c..238ec5249d9 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0006.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0006.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0006", "sourceIdentifier": "secure@microsoft.com", "published": "2015-01-13T22:59:03.580", - "lastModified": "2019-02-26T14:04:02.387", + "lastModified": "2024-11-21T02:22:10.427", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:C/A:N", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 6.1 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -140,6 +139,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99522", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/62098", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62184", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71930", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99521", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99522", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0008.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0008.json index 08f0eb52aba..a72654a5d9a 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0008.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0008.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0008", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:29.607", - "lastModified": "2019-10-29T19:15:13.547", + "lastModified": "2024-11-21T02:22:10.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -151,8 +150,8 @@ "url": "http://www.securityfocus.com/bid/72477", "source": "secure@microsoft.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -185,6 +184,65 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/155002/Microsoft-Windows-Server-2012-Group-Policy-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/787252", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72477", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031719", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100426", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.jasadvisors.com/additonal-jasbug-security-exploit-info/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0009.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0009.json index 0313fb126d8..4ecd616b063 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0009.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0009.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0009", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:30.700", - "lastModified": "2019-10-29T19:15:13.890", + "lastModified": "2024-11-21T02:22:10.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -161,6 +160,41 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/155007/Microsoft-Windows-Server-2012-Group-Policy-Security-Feature-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72476", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031722", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-014", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0010.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0010.json index 016b70fef5a..9ff5b6f4000 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0010.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0010.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0010", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:31.480", - "lastModified": "2019-05-15T17:04:22.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:10.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -151,6 +150,31 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://code.google.com/p/google-security-research/issues/detail?id=128", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72461", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0011.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0011.json index 002e0dbf1a6..1eccd02f447 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0011.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0011.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0011", "sourceIdentifier": "secure@microsoft.com", "published": "2015-01-13T22:59:04.470", - "lastModified": "2019-02-26T14:04:02.387", + "lastModified": "2024-11-21T02:22:10.943", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:N", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 4.7 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -140,6 +139,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99527", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/62154", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71960", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031531", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-008", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99526", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99527", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0012.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0012.json index e8d994f6e12..7eb23e844e4 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0012.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0012.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0012", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:32.230", - "lastModified": "2018-11-20T20:29:31.673", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:11.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -110,6 +109,45 @@ "tags": [ "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/72473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031726", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1034652", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100428", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0014.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0014.json index b2e8945fe5e..191270d130c 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0014.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0014.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0014", "sourceIdentifier": "secure@microsoft.com", "published": "2015-01-13T22:59:05.580", - "lastModified": "2019-02-26T14:04:02.387", + "lastModified": "2024-11-21T02:22:11.223", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -135,6 +134,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99518", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/61580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031523", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99518", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0015.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0015.json index 27e0f080264..2d8c0c7c3d2 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0015.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0015.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0015", "sourceIdentifier": "secure@microsoft.com", "published": "2015-01-13T22:59:06.363", - "lastModified": "2019-02-26T14:04:02.387", + "lastModified": "2024-11-21T02:22:11.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-007", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/62148", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031532", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-007", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0016.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0016.json index d363ab1c125..197ff028291 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0016.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0016.json @@ -2,13 +2,8 @@ "id": "CVE-2015-0016", "sourceIdentifier": "secure@microsoft.com", "published": "2015-01-13T22:59:07.190", - "lastModified": "2024-07-02T12:18:05.317", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-05-25", - "cisaActionDue": "2022-06-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Windows TS WebProxy Directory Traversal Vulnerability", + "lastModified": "2024-11-21T02:22:11.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-05-25", + "cisaActionDue": "2022-06-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Windows TS WebProxy Directory Traversal Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -211,6 +210,80 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2015-0016-escaping-the-internet-explorer-sandbox/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130201/MS15-004-Microsoft-Remote-Desktop-Services-Web-Proxy-IE-Sandbox-Escape.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/62076", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35983", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71965", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031524", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99515", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99516", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0017.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0017.json index 73aa966a23d..dd5975ae68d 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0017.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0017.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0017", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:34.527", - "lastModified": "2018-10-12T22:07:57.897", + "lastModified": "2024-11-21T02:22:11.637", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72402", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0018.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0018.json index bd6ff3fce1a..746d92b7807 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0018.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0018.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0018", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:35.387", - "lastModified": "2018-10-12T22:07:58.210", + "lastModified": "2024-11-21T02:22:11.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0019.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0019.json index 3372e9d194b..d804ab850d5 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0019.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0019.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0019", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:36.153", - "lastModified": "2018-10-12T22:07:58.570", + "lastModified": "2024-11-21T02:22:11.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0020.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0020.json index b0f959f9d13..7021870d164 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0020.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0020.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0020", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:36.917", - "lastModified": "2018-10-12T22:07:58.927", + "lastModified": "2024-11-21T02:22:12.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72426", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0021.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0021.json index 00d10f6c589..f801dc26eb4 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0021.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0021.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0021", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:37.683", - "lastModified": "2018-10-12T22:07:59.303", + "lastModified": "2024-11-21T02:22:12.143", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -103,6 +102,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72436", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0022.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0022.json index abfd7dfea90..10474c36dde 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0022.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0022.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0022", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:38.450", - "lastModified": "2018-10-12T22:07:59.617", + "lastModified": "2024-11-21T02:22:13.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0023.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0023.json index 46a565b720e..2efacdfacea 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0023.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0023.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0023", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:39.183", - "lastModified": "2018-10-12T22:07:59.880", + "lastModified": "2024-11-21T02:22:13.857", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -76,8 +75,8 @@ "url": "http://www.securityfocus.com/bid/72438", "source": "secure@microsoft.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -99,6 +98,34 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/72438", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1090", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0025.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0025.json index 15c15a05e50..a342b477caa 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0025.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0025.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0025", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:39.950", - "lastModified": "2018-10-12T22:08:00.287", + "lastModified": "2024-11-21T02:22:13.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72439", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0026.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0026.json index e9236492bdd..6c27593c9a9 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0026.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0026.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0026", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:40.793", - "lastModified": "2018-10-12T22:08:00.587", + "lastModified": "2024-11-21T02:22:14.103", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72440", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0027.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0027.json index e7fd0c0e64d..c3dc965f014 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0027.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0027.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0027", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:41.590", - "lastModified": "2018-10-12T22:08:00.927", + "lastModified": "2024-11-21T02:22:14.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0028.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0028.json index ffc5d3a56b2..c4bf2ae833d 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0028.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0028.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0028", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:42.387", - "lastModified": "2018-10-12T22:08:01.273", + "lastModified": "2024-11-21T02:22:14.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0029.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0029.json index 36151c57ab4..46eb26a94df 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0029.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0029.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0029", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:43.183", - "lastModified": "2018-10-12T22:08:01.507", + "lastModified": "2024-11-21T02:22:14.450", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72443", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0030.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0030.json index 6a192d5c345..54fa8af7e5a 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0030.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0030.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0030", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:43.950", - "lastModified": "2018-10-12T22:08:01.740", + "lastModified": "2024-11-21T02:22:14.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72444", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0031.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0031.json index fa41ba809c7..a38fc7bc3c4 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0031.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0031.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0031", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:44.667", - "lastModified": "2018-10-12T22:08:01.990", + "lastModified": "2024-11-21T02:22:14.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0032.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0032.json index d9a7242c33f..a9424046765 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0032.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0032.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0032", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:01.290", - "lastModified": "2018-10-12T22:08:02.303", + "lastModified": "2024-11-21T02:22:14.793", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -128,6 +127,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-019", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031887", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-019", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0035.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0035.json index 45aa4c744f5..f463f9eef1e 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0035.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0035.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0035", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:45.467", - "lastModified": "2018-10-12T22:08:02.897", + "lastModified": "2024-11-21T02:22:14.947", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72447", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0036.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0036.json index 29e6ec54c01..f1a2f442653 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0036.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0036.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0036", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:46.217", - "lastModified": "2018-10-12T22:08:03.257", + "lastModified": "2024-11-21T02:22:15.057", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0037.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0037.json index dd2ac081b7a..ded50cf818d 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0037.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0037.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0037", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:46.997", - "lastModified": "2018-10-12T22:08:03.663", + "lastModified": "2024-11-21T02:22:15.167", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0038.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0038.json index fa380954da9..a218697d847 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0038.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0038.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0038", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:47.763", - "lastModified": "2018-10-12T22:08:04.023", + "lastModified": "2024-11-21T02:22:15.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0039.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0039.json index 90ad4390813..ca1e2c5d6d1 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0039.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0039.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0039", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:48.497", - "lastModified": "2018-10-12T22:08:04.383", + "lastModified": "2024-11-21T02:22:15.410", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0040.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0040.json index 90d07a815ba..f7fe5ad4eed 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0040.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0040.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0040", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:49.277", - "lastModified": "2018-10-12T22:08:04.633", + "lastModified": "2024-11-21T02:22:15.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -95,6 +94,30 @@ { "url": "https://www.exploit-db.com/exploits/40757/", "source": "secure@microsoft.com" + }, + { + "url": "http://blog.skylined.nl/20161114001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/539752/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72410", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/40757/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0041.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0041.json index f4c0f1b11b1..e36d957e9b8 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0041.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0041.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0041", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:50.137", - "lastModified": "2018-10-12T22:08:05.163", + "lastModified": "2024-11-21T02:22:15.637", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72411", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0042.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0042.json index 0bfe558bc16..8972b535e81 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0042.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0042.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0042", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:50.870", - "lastModified": "2018-10-12T22:08:05.443", + "lastModified": "2024-11-21T02:22:15.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72412", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0043.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0043.json index f8b51988d21..f269eb88fc3 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0043.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0043.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0043", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:51.667", - "lastModified": "2018-10-12T22:08:05.787", + "lastModified": "2024-11-21T02:22:15.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -98,6 +97,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72413", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0044.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0044.json index 1b2058aadb4..5293346d8df 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0044.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0044.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0044", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:52.527", - "lastModified": "2018-10-12T22:08:06.087", + "lastModified": "2024-11-21T02:22:15.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0045.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0045.json index 94a374e3c50..b93c0b8e7fb 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0045.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0045.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0045", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:53.387", - "lastModified": "2018-10-12T22:08:06.383", + "lastModified": "2024-11-21T02:22:16.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72415", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0046.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0046.json index 360bf65ebf2..1f3322ae6c4 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0046.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0046.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0046", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:54.137", - "lastModified": "2018-10-12T22:08:06.727", + "lastModified": "2024-11-21T02:22:16.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0048.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0048.json index 161a70afda4..194bc9f9214 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0048.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0048.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0048", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:54.857", - "lastModified": "2018-10-12T22:08:07.117", + "lastModified": "2024-11-21T02:22:16.317", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0049.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0049.json index 0f1d6a33a5b..dacc6406e4e 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0049.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0049.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0049", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:55.870", - "lastModified": "2018-10-12T22:08:07.477", + "lastModified": "2024-11-21T02:22:16.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0050.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0050.json index abf0b7026f2..ff8aaeafec6 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0050.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0050.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0050", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:56.700", - "lastModified": "2018-10-12T22:08:07.850", + "lastModified": "2024-11-21T02:22:16.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -104,6 +103,34 @@ { "url": "https://www.exploit-db.com/exploits/40841/", "source": "secure@microsoft.com" + }, + { + "url": "http://blog.skylined.nl/20161122001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2016/Nov/135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/539808/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/40841/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0051.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0051.json index dc07c7ba3f7..ca5b88cad64 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0051.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0051.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0051", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:57.577", - "lastModified": "2018-10-12T22:08:08.740", + "lastModified": "2024-11-21T02:22:16.673", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0052.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0052.json index 8526da0b723..089aa7ae9ad 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0052.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0052.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0052", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:58.417", - "lastModified": "2018-10-12T22:08:09.053", + "lastModified": "2024-11-21T02:22:16.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72420", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0053.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0053.json index 8a33931c184..79e79382164 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0053.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0053.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0053", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:00:59.230", - "lastModified": "2018-10-12T22:08:09.383", + "lastModified": "2024-11-21T02:22:16.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72421", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0054.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0054.json index 4a09da430a7..78e00f24bb7 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0054.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0054.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0054", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:00.060", - "lastModified": "2018-10-12T22:08:09.740", + "lastModified": "2024-11-21T02:22:17.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72478", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0055.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0055.json index c0223fc9ccc..fffe0a7a0e5 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0055.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0055.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0055", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:00.917", - "lastModified": "2018-10-12T22:08:10.023", + "lastModified": "2024-11-21T02:22:17.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0056.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0056.json index 7c53fe0bfe4..6a669395eb0 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0056.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0056.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0056", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:02.320", - "lastModified": "2018-10-12T22:08:10.367", + "lastModified": "2024-11-21T02:22:17.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0057.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0057.json index 9fa6437fc99..16382087feb 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0057.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0057.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0057", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:01.763", - "lastModified": "2019-05-14T18:50:39.423", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:17.347", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -158,6 +157,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/72466", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100431", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/39035/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0058.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0058.json index 66730c75b4e..75daa7fe5b8 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0058.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0058.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0058", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:02.527", - "lastModified": "2019-05-14T18:51:42.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:17.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,8 +93,8 @@ "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-010", "source": "secure@microsoft.com", "tags": [ - "Vendor Advisory", - "Patch" + "Patch", + "Vendor Advisory" ] }, { @@ -105,6 +104,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/72468", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100432", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0059.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0059.json index 01f3e5cf089..2c9fed4c1e8 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0059.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0059.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0059", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:03.370", - "lastModified": "2019-05-14T18:58:33.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:17.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -135,6 +134,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/72470", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0060.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0060.json index c9f9ca63067..0b023ad0d8a 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0060.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0060.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0060", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:04.217", - "lastModified": "2019-05-14T19:01:07.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:17.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -150,6 +149,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/72472", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100434", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0061.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0061.json index 86e97d0c980..a1c4315fbef 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0061.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0061.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0061", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:04.950", - "lastModified": "2019-05-14T19:10:54.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:17.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -166,6 +165,46 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/72456", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031725", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-016", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100436", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0062.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0062.json index 4e6e8d06531..ab888d06b70 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0062.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0062.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0062", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:05.717", - "lastModified": "2019-05-14T18:34:21.100", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:17.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -158,6 +157,53 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/62840", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72458", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031724", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100437", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100438", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0063.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0063.json index ec6a7b97ab1..9fe82a95820 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0063.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0063.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0063", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:06.433", - "lastModified": "2023-10-03T15:36:12.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:18.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -179,6 +178,44 @@ "tags": [ "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/62808", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72460", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031720", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-012", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100439", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0064.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0064.json index 231eecaf59f..dd26fd7dcc5 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0064.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0064.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0064", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:07.200", - "lastModified": "2018-10-12T22:08:14.727", + "lastModified": "2024-11-21T02:22:18.163", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -181,6 +180,26 @@ { "url": "https://www.exploit-db.com/exploits/37967/", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/62808", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72463", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031720", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37967/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0065.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0065.json index d2cd56a1427..36193b3a710 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0065.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0065.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0065", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:07.967", - "lastModified": "2018-10-12T22:08:15.367", + "lastModified": "2024-11-21T02:22:18.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://www.exploit-db.com/exploits/37966/", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/62808", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72465", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031720", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37966/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0066.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0066.json index 7d860316034..e80bb33e698 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0066.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0066.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0066", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:08.700", - "lastModified": "2018-10-12T22:08:15.867", + "lastModified": "2024-11-21T02:22:18.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0067.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0067.json index 43da504b088..1db7cd40bcb 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0067.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0067.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0067", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:09.467", - "lastModified": "2018-10-12T22:08:16.163", + "lastModified": "2024-11-21T02:22:18.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -98,6 +97,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0068.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0068.json index 466b8e6e6c7..239ecad7e0e 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0068.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0068.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0068", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:10.247", - "lastModified": "2018-10-12T22:08:16.447", + "lastModified": "2024-11-21T02:22:18.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72424", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0069.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0069.json index 7b5f1732cb5..8049ad2faf6 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0069.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0069.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0069", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:10.967", - "lastModified": "2018-10-12T22:08:16.837", + "lastModified": "2024-11-21T02:22:18.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0070.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0070.json index be38b47a5dc..1ecb1e8c74f 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0070.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0070.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0070", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:11.730", - "lastModified": "2018-10-12T22:08:17.133", + "lastModified": "2024-11-21T02:22:18.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0071.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0071.json index 33a3ce7ef28..9698cc06579 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0071.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0071.json @@ -2,13 +2,8 @@ "id": "CVE-2015-0071", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:12.497", - "lastModified": "2024-07-02T12:18:20.457", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-05-25", - "cisaActionDue": "2022-06-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Internet Explorer ASLR Bypass Vulnerability", + "lastModified": "2024-11-21T02:22:18.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-05-25", + "cisaActionDue": "2022-06-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Internet Explorer ASLR Bypass Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -254,6 +253,32 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72455", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031723", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0072.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0072.json index d9501180e80..bd11b156021 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0072.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0072.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0072", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-07T19:59:07.723", - "lastModified": "2018-10-12T22:08:17.727", + "lastModified": "2024-11-21T02:22:19.087", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -135,6 +134,60 @@ { "url": "https://nakedsecurity.sophos.com/2015/02/04/internet-explorer-has-a-cross-site-scripting-zero-day-bug/", "source": "secure@microsoft.com" + }, + { + "url": "http://community.websense.com/blogs/securitylabs/archive/2015/02/05/another-day-another-zero-day-internet-explorer-s-turn-cve-2015-0072.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://innerht.ml/blog/ie-uxss.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130308/Microsoft-Internet-Explorer-Universal-XSS-Proof-Of-Concept.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62658", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.pcworld.com/article/2879372/dangerous-ie-vulnerability-opens-door-to-powerful-phishing-attacks.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534662/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72489", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://nakedsecurity.sophos.com/2015/02/04/internet-explorer-has-a-cross-site-scripting-zero-day-bug/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0073.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0073.json index efa53517b6b..ee52c60e366 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0073.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0073.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0073", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:03.197", - "lastModified": "2019-05-14T18:36:50.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:19.213", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72908", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031899", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0074.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0074.json index ced4e8451ea..13942cd6619 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0074.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0074.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0074", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:04.027", - "lastModified": "2019-05-14T19:21:39.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:19.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72892", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0075.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0075.json index d5416f21bb5..4896211602a 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0075.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0075.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0075", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:04.980", - "lastModified": "2018-10-12T22:08:19.853", + "lastModified": "2024-11-21T02:22:19.447", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-025", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031899", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-025", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0076.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0076.json index 3aa945b8ec5..ffbd0b3537c 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0076.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0076.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0076", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:06.027", - "lastModified": "2019-05-14T18:38:11.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:19.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -145,6 +144,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72918", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031894", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0077.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0077.json index e20413ecc79..13c3c5af7fa 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0077.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0077.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0077", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:07.013", - "lastModified": "2019-05-14T18:58:58.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:19.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0078.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0078.json index 091b6b7f569..c942fbdfbc0 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0078.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0078.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0078", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:07.997", - "lastModified": "2019-05-14T19:01:47.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:19.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -120,6 +119,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72902", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0079.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0079.json index db6be124595..2775b3019e6 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0079.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0079.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0079", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:08.920", - "lastModified": "2019-05-14T18:53:41.210", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:19.893", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1031892", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-030", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0080.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0080.json index 4f3183ee7da..95501fe1003 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0080.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0080.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0080", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:09.827", - "lastModified": "2019-05-14T18:52:28.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:19.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72909", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031898", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0081.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0081.json index 7f3d5868f8c..8fd35908c02 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0081.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0081.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0081", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:10.750", - "lastModified": "2019-05-14T18:51:25.300", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:20.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72886", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031890", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0084.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0084.json index 2524051a7e8..1d819f0440a 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0084.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0084.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0084", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:11.657", - "lastModified": "2019-05-14T19:23:08.660", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:20.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -135,6 +134,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031893", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-028", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0085.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0085.json index 016fa8cc7e0..18578209cdc 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0085.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0085.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0085", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:12.533", - "lastModified": "2018-10-12T22:08:22.460", + "lastModified": "2024-11-21T02:22:20.383", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -220,6 +218,15 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0086.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0086.json index 41df6b1f3c1..bf776460762 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0086.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0086.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0086", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:13.347", - "lastModified": "2018-10-12T22:08:22.710", + "lastModified": "2024-11-21T02:22:20.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -144,6 +143,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0087.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0087.json index e0b3add778a..242b1095cf2 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0087.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0087.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0087", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:14.253", - "lastModified": "2019-05-14T19:25:36.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:20.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72893", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0088.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0088.json index 9301aaba2b7..e076af9f247 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0088.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0088.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0088", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:15.050", - "lastModified": "2019-05-14T19:06:56.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:20.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72898", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0089.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0089.json index 662622bf66b..5491da9a84e 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0089.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0089.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0089", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:15.863", - "lastModified": "2019-05-14T19:10:16.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:20.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72896", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0090.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0090.json index d7aa356d679..5f6e5723aa1 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0090.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0090.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0090", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:16.723", - "lastModified": "2019-05-14T19:07:22.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:20.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72904", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0091.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0091.json index 103c8337082..f7149765108 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0091.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0091.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0091", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:17.693", - "lastModified": "2019-05-14T19:08:44.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:21.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0092.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0092.json index cf2fd4b18f2..84d5ea2d514 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0092.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0092.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0092", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:18.927", - "lastModified": "2019-05-14T19:09:03.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:21.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72906", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0093.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0093.json index 092de7ff2fd..1083ee0cb72 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0093.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0093.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0093", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:20.037", - "lastModified": "2019-05-14T19:06:18.497", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:21.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72907", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0094.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0094.json index 759b3f7a4c7..48e0d7c71ce 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0094.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0094.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0094", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:20.883", - "lastModified": "2019-05-14T19:26:37.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:21.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -142,6 +141,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1031897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0095.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0095.json index ad9a9c602d0..aa756469bf2 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0095.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0095.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0095", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:21.790", - "lastModified": "2019-05-14T19:53:32.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:21.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:C", + "baseScore": 5.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72936", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0096.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0096.json index 32f233406ce..bb8dafffbd3 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0096.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0096.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0096", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:22.760", - "lastModified": "2019-05-14T19:47:14.040", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:21.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72894", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031890", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0097.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0097.json index da633cbc5c9..66ec5a1ba14 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0097.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0097.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0097", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:23.540", - "lastModified": "2018-10-12T22:08:26.150", + "lastModified": "2024-11-21T02:22:21.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -113,6 +112,18 @@ { "url": "https://www.exploit-db.com/exploits/37657/", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37657/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0098.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0098.json index 306be31c7ff..bc9c75e9107 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0098.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0098.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0098", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:00.077", - "lastModified": "2018-10-12T22:08:26.477", + "lastModified": "2024-11-21T02:22:21.883", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-701: Weaknesses Introduced During Design", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,6 +92,15 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-037", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032112", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-701: Weaknesses Introduced During Design" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0099.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0099.json index f1d6bcd7988..e3077b0edb9 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0099.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0099.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0099", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:24.543", - "lastModified": "2018-10-12T22:08:26.743", + "lastModified": "2024-11-21T02:22:21.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0100.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0100.json index 1d1f0f6b72f..4b2a6e3f7ad 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0100.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0100.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0100", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:25.403", - "lastModified": "2018-10-12T22:08:27.070", + "lastModified": "2024-11-21T02:22:22.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72926", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0103.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0103.json index 98e766d1498..253d762c6c0 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0103.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0103.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0103", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-24T00:59:00.077", - "lastModified": "2015-03-24T14:46:36.277", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:22.433", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -201,6 +200,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR50457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21693270", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0105.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0105.json index 90adb29e4f6..9b1455b19fb 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0105.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0105.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0105", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-24T00:59:01.233", - "lastModified": "2015-03-24T14:54:44.173", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:22.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -208,6 +207,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR50162", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR50607", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0106.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0106.json index 8de91dc5b71..caf86a203d9 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0106.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0106.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0106", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-24T00:59:02.407", - "lastModified": "2015-03-24T14:53:54.253", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:22.793", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -321,6 +320,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR50795", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694935", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0108.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0108.json index c8b664d78bf..46aed812e69 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0108.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0108.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0108", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-18T02:59:00.047", - "lastModified": "2017-09-08T01:29:37.840", + "lastModified": "2024-11-21T02:22:23.013", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -182,6 +181,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99605", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99605", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0109.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0109.json index 7bab5f5f680..adbf8932608 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0109.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0109.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0109", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-18T02:59:01.423", - "lastModified": "2017-09-08T01:29:37.903", + "lastModified": "2024-11-21T02:22:23.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -182,6 +181,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99606", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21694974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99606", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0113.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0113.json index 9a61b2d2b0f..76ebfb0664e 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0113.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0113.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0113", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-27T11:59:03.280", - "lastModified": "2015-04-27T17:48:46.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:23.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -574,6 +573,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882770", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0117.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0117.json index d133760ced0..a42ead0e8ec 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0117.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0117.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0117", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-06T00:59:01.207", - "lastModified": "2019-10-16T12:40:30.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:23.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0119.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0119.json index 4968b7160e1..2d660cf69d9 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0119.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0119.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0119", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-06T00:59:02.267", - "lastModified": "2015-04-06T16:49:43.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:24.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -110,6 +109,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699645", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0120.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0120.json index 365dd632f63..14781877462 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0120.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0120.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0120", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:07.810", - "lastModified": "2015-05-26T18:00:13.533", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:24.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -129,6 +128,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700549", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0122.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0122.json index 1f2408c9f64..d9d8c8c77db 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0122.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0122.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0122", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-13T01:59:22.897", - "lastModified": "2016-12-03T03:02:17.313", + "lastModified": "2024-11-21T02:22:24.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -187,6 +186,22 @@ { "url": "http://www.securitytracker.com/id/1031884", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698253", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031884", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0123.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0123.json index 7560b7b1b04..0eeedaba8e9 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0123.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0123.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0123", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-13T01:59:23.850", - "lastModified": "2016-12-03T03:02:18.470", + "lastModified": "2024-11-21T02:22:24.583", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -187,6 +186,22 @@ { "url": "http://www.securitytracker.com/id/1031884", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698253", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031884", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0124.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0124.json index 7bf82b53641..87690a2c771 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0124.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0124.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0124", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-18T10:59:02.353", - "lastModified": "2016-12-03T03:02:19.627", + "lastModified": "2024-11-21T02:22:24.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -207,6 +206,22 @@ { "url": "http://www.securitytracker.com/id/1031885", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696927", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031885", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0125.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0125.json index fc1591f26fe..af268cf8f0c 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0125.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0125.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0125", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-18T10:59:03.323", - "lastModified": "2016-12-03T03:02:20.720", + "lastModified": "2024-11-21T02:22:24.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -188,6 +187,18 @@ { "url": "http://www.securityfocus.com/bid/73105", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73105", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0128.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0128.json index 062ccd513b7..a9062bff89b 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0128.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0128.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0128", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-18T10:59:04.183", - "lastModified": "2016-11-28T19:15:58.897", + "lastModified": "2024-11-21T02:22:25.143", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -203,6 +202,18 @@ { "url": "http://www.securitytracker.com/id/1031885", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697126", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031885", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0129.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0129.json index 6b0f0e752a1..061fb4c2531 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0129.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0129.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0129", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-13T01:59:24.740", - "lastModified": "2015-09-11T15:42:06.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:25.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -133,6 +132,18 @@ { "url": "http://www.securitytracker.com/id/1031886", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696856", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031886", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0132.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0132.json index cc10f419f58..cc19242d1a6 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0132.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0132.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0132", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-18T10:59:05.247", - "lastModified": "2015-03-18T16:13:19.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:25.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -254,6 +253,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698248", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0133.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0133.json index 878e8ef0903..de5d79345bf 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0133.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0133.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0133", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-13T01:59:25.647", - "lastModified": "2015-09-11T15:45:40.367", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", + "lastModified": "2024-11-21T02:22:25.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +86,23 @@ { "url": "http://www.securitytracker.com/id/1031881", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696242", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031881", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0134.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0134.json index 06a89447484..0ec18d52d29 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0134.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0134.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0134", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-06T00:59:03.317", - "lastModified": "2019-10-16T12:40:30.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:25.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0135.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0135.json index da0a316ac50..e562d0d40fc 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0135.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0135.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0135", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-21T16:59:01.233", - "lastModified": "2019-10-16T12:40:30.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:25.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,18 @@ { "url": "http://www.securitytracker.com/id/1032151", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701647", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032151", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0136.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0136.json index 84dfc40d744..1d17dab41ee 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0136.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0136.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0136", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-24T00:59:03.233", - "lastModified": "2015-03-24T14:28:53.453", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:26.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -133,6 +132,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020608", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0137.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0137.json index cc5a299b5b7..5582dfbef93 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0137.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0137.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0137", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-24T00:59:04.017", - "lastModified": "2015-03-24T15:11:58.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:26.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020611", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0138.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0138.json index 87dbee86ab3..afbf7164e2e 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0138.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0138.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0138", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-25T01:59:17.923", - "lastModified": "2017-01-03T02:59:27.957", + "lastModified": "2024-11-21T02:22:26.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -826,6 +825,65 @@ { "url": "http://www.securityfocus.com/bid/73326", "source": "psirt@us.ibm.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21698703", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73326", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0139.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0139.json index 1e25dd06f90..e1bfad0effa 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0139.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0139.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0139", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-13T01:59:26.583", - "lastModified": "2015-09-11T15:50:33.197", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:26.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -97,6 +96,22 @@ { "url": "http://www.securitytracker.com/id/1031880", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI33329", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031880", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0140.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0140.json index a3511dc537d..d91ccd4a941 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0140.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0140.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0140", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:08.667", - "lastModified": "2015-05-26T18:01:04.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:26.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697746", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0146.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0146.json index b07f8d67e2a..49a0900f367 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0146.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0146.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0146", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-18T10:59:06.197", - "lastModified": "2015-03-18T14:51:03.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:27.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -119,6 +118,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696594", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0149.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0149.json index 119e755f1ec..7f60e1f5e9a 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0149.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0149.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0149", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-18T10:59:06.963", - "lastModified": "2015-03-18T14:52:07.253", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:27.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1LI78430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696693", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0156.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0156.json index 4679d92e61d..7f0a89c49a8 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0156.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0156.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0156", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:09.590", - "lastModified": "2015-05-27T12:33:01.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:27.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -405,6 +404,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT06812", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52420", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0158.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0158.json index bf1032501f9..82bb951406c 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0158.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0158.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0158", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-24T02:01:38.807", - "lastModified": "2015-09-29T00:33:26.063", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:28.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -219,6 +218,39 @@ { "url": "http://www.securitytracker.com/id/1031964", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52322", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR52355", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696378", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031964", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0160.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0160.json index 02ff8c1e020..502dbd80845 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0160.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0160.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0160", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:10.730", - "lastModified": "2015-05-26T18:01:50.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:28.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -138,6 +137,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699470", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0161.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0161.json index 60f3e96c8db..6beb3bf6b1d 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0161.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0161.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0161", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:11.577", - "lastModified": "2015-05-26T18:02:24.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:28.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -138,6 +137,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699470", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0167.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0167.json index 529fe4dc75d..2c2a4638249 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0167.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0167.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0167", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-02-20T16:59:04.227", - "lastModified": "2017-09-08T01:29:37.967", + "lastModified": "2024-11-21T02:22:28.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/fraywing/textAngular/releases/tag/v1.3.7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0168.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0168.json index aa24d56b9bc..58342d56507 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0168.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0168.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0168", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:12.357", - "lastModified": "2015-05-26T18:02:42.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:28.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -138,6 +137,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699470", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0169.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0169.json index d41c4e9a44d..397819f531f 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0169.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0169.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0169", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:13.340", - "lastModified": "2015-05-26T18:03:17.533", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:28.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -138,6 +137,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699470", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0170.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0170.json index 573bec0fb10..518569916f6 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0170.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0170.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0170", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:14.310", - "lastModified": "2015-05-26T18:03:54.093", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:29.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -138,6 +137,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699470", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0171.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0171.json index f2788b28ed5..295c44c6246 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0171.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0171.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0171", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:15.247", - "lastModified": "2015-05-26T14:59:52.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:29.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -138,6 +137,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699470", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0174.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0174.json index ff890d0dac9..b454fdb310e 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0174.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0174.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0174", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-27T12:59:00.093", - "lastModified": "2015-11-30T19:47:21.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:29.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -122,6 +121,22 @@ { "url": "http://www.securitytracker.com/id/1032190", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI21072", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697368", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032190", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0175.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0175.json index d773b48cbbb..a510119b6cc 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0175.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0175.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0175", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-27T12:59:01.500", - "lastModified": "2015-11-30T19:47:44.887", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:29.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -122,6 +121,22 @@ { "url": "http://www.securitytracker.com/id/1032190", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI33008", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697368", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032190", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0176.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0176.json index b1c8913b6c0..c4e1918fa15 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0176.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0176.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0176", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-27T11:59:04.187", - "lastModified": "2017-02-08T14:26:17.520", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:29.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699549", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032200", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0177.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0177.json index c7b4bd1d081..7fc01a32ee1 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0177.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0177.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0177", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-13T01:59:27.460", - "lastModified": "2015-09-11T15:42:57.607", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:29.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -87,6 +86,22 @@ { "url": "http://www.securitytracker.com/id/1031880", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI35228", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031880", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0178.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0178.json index 342aa4afc20..04d8dfd8bdc 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0178.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0178.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0178", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-18T10:59:07.853", - "lastModified": "2015-03-18T14:52:38.910", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:29.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696864", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0179.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0179.json index a2e479080ba..7a8c427696b 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0179.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0179.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0179", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-06T00:59:04.360", - "lastModified": "2019-10-16T12:40:30.513", + "lastModified": "2024-11-21T02:22:30.057", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -111,6 +110,26 @@ { "url": "https://www.exploit-db.com/exploits/42605/", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/42605/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0180.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0180.json index 481c822666f..1de6f11835d 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0180.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0180.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0180", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T14:59:16.230", - "lastModified": "2015-05-26T17:57:50.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:30.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -112,6 +111,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1JR51665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697306", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0189.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0189.json index 9d1c0fdeb61..c4ecba82406 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0189.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0189.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0189", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-20T10:59:02.243", - "lastModified": "2017-01-03T02:59:28.003", + "lastModified": "2024-11-21T02:22:30.320", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -121,6 +120,26 @@ { "url": "http://www.securitytracker.com/id/1032374", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT05869", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032374", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0197.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0197.json index da4fd64f8a0..a061f0e6742 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0197.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0197.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0197", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-24T02:01:39.620", - "lastModified": "2016-12-31T02:59:15.747", + "lastModified": "2024-11-21T02:22:31.167", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -86,8 +85,8 @@ "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1022062", "source": "psirt@us.ibm.com", "tags": [ - "Vendor Advisory", - "Patch" + "Patch", + "Vendor Advisory" ] }, { @@ -101,6 +100,26 @@ { "url": "http://www.securitytracker.com/id/1032880", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1022062", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21902662", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032880", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0198.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0198.json index 663703d7427..a24e4a576c3 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0198.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0198.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0198", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-24T02:01:40.463", - "lastModified": "2016-12-31T02:59:15.797", + "lastModified": "2024-11-21T02:22:31.297", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,26 @@ { "url": "http://www.securitytracker.com/id/1032880", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1022062", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21902662", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032880", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-01xx/CVE-2015-0199.json b/CVE-2015/CVE-2015-01xx/CVE-2015-0199.json index 3118ce3d437..add20137427 100644 --- a/CVE-2015/CVE-2015-01xx/CVE-2015-0199.json +++ b/CVE-2015/CVE-2015-01xx/CVE-2015-0199.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0199", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-03-24T02:01:41.247", - "lastModified": "2016-12-31T02:59:15.843", + "lastModified": "2024-11-21T02:22:31.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -101,6 +100,26 @@ { "url": "http://www.securitytracker.com/id/1032880", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1022062", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21902662", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032880", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0201.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0201.json index 373252c39bd..9b35ff4d3bd 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0201.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0201.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0201", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-10T14:59:04.350", - "lastModified": "2022-04-11T17:18:31.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:31.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://pivotal.io/security/cve-2015-0201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0202.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0202.json index a7a63c2202e..4a60a3a49a5 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0202.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0202.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0202", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-08T18:59:00.077", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:22:31.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -177,6 +176,37 @@ { "url": "https://security.gentoo.org/glsa/201610-05", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://subversion.apache.org/security/CVE-2015-0202-advisory.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/76446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032100", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2721-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201610-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0204.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0204.json index 6f8075e5003..5869ebb33de 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0204.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0204.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0204", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-09T02:59:10.287", - "lastModified": "2018-07-19T01:29:01.700", + "lastModified": "2024-11-21T02:22:32.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -270,6 +269,14 @@ "url": "http://marc.info/?l=bugtraq&m=142496289803847&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496289803847&w=2", + "source": "secalert@redhat.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142720981827617&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142720981827617&w=2", "source": "secalert@redhat.com" @@ -286,6 +293,10 @@ "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -467,6 +478,288 @@ { "url": "https://www.openssl.org/news/secadv_20150319.txt", "source": "secalert@redhat.com" + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496179803395&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496289803847&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496289803847&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142720981827617&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142720981827617&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721102728110&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142895206924048&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144043644216842&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050205101530&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050254401665&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0849.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-1650.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.novell.com/security/cve/CVE-2015-0204.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/91787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033378", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa88", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa91", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99707", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://freakattack.com/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX216642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150108.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0205.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0205.json index d92a91a67aa..8ef1246caf9 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0205.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0205.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0205", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-09T02:59:11.273", - "lastModified": "2017-11-15T02:29:05.890", + "lastModified": "2024-11-21T02:22:32.377", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -338,6 +337,153 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721102728110&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050205101530&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050254401665&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71941", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/91787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033378", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa88", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99708", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX216642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150108.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0206.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0206.json index 1fc32c06628..c1a31afe2fd 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0206.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0206.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0206", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-09T02:59:12.117", - "lastModified": "2017-10-20T01:29:04.393", + "lastModified": "2024-11-21T02:22:32.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -318,6 +317,133 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721102728110&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050205101530&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050254401665&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71940", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/91787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033378", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa88", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99704", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openssl/openssl/commit/103b171d8fc282ef435f8de9afbf7782e312961f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150108.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0207.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0207.json index 8a5875fe2b3..c12e8215595 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0207.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0207.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0207", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:00.067", - "lastModified": "2023-11-07T02:23:19.273", + "lastModified": "2024-11-21T02:22:32.803", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -207,6 +205,127 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202351", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=819418110b6fff4a7b96f01a5d68f71df3e3b736", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0208.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0208.json index b942b4ad781..c4a15c32040 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0208.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0208.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0208", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:01.350", - "lastModified": "2023-11-07T02:23:19.350", + "lastModified": "2024-11-21T02:22:33.020", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -207,6 +205,127 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73230", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=4b22cce3812052fe64fc3f6d58d8cc884e3cb834", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0209.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0209.json index 792b81cb63d..9ac5bec8793 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0209.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0209.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0209", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:02.617", - "lastModified": "2023-11-07T02:23:19.410", + "lastModified": "2024-11-21T02:22:33.237", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -286,6 +284,10 @@ "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -416,6 +418,194 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142841429220765&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050254401665&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-1089.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73239", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2537-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/articles/1384453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196737", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX216642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0219.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0219.json index 529165e2735..59a3ec120fe 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0219.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0219.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0219", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-16T16:59:18.657", - "lastModified": "2016-12-22T02:59:22.860", + "lastModified": "2024-11-21T02:22:34.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -198,6 +197,67 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62309", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62718", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2469-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0220.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0220.json index e1edb18e26f..cf7b37e0f63 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0220.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0220.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0220", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-16T16:59:19.563", - "lastModified": "2016-12-22T02:59:22.940", + "lastModified": "2024-11-21T02:22:34.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -219,6 +218,58 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62309", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62718", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2469-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0221.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0221.json index cec7d18c0c1..72e18e1770a 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0221.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0221.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0221", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-16T16:59:20.420", - "lastModified": "2016-12-22T02:59:23.000", + "lastModified": "2024-11-21T02:22:34.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -228,6 +227,67 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62309", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62718", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2469-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0222.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0222.json index 356e6b44328..9d51711c6c4 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0222.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0222.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0222", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-16T16:59:21.217", - "lastModified": "2016-12-22T02:59:23.080", + "lastModified": "2024-11-21T02:22:35.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -219,6 +218,58 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62309", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2469-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.djangoproject.com/weblog/2015/jan/13/security/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0223.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0223.json index 8e9829927d9..6d09650321f 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0223.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0223.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0223", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-02T16:59:03.567", - "lastModified": "2018-01-05T02:29:58.337", + "lastModified": "2024-11-21T02:22:35.243", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ { "url": "https://access.redhat.com/errata/RHBA-2016:1500", "source": "secalert@redhat.com" + }, + { + "url": "http://packetstormsecurity.com/files/130106/Apache-Qpid-0.30-Anonymous-Action-Prevention.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2015/Jan/122", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHBA-2016:1500", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0225.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0225.json index dd616e4f1df..775e8c656ff 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0225.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0225.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0225", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-03T14:59:00.070", - "lastModified": "2023-11-07T02:23:19.760", + "lastModified": "2024-11-21T02:22:35.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -280,6 +279,30 @@ { "url": "http://www.securitytracker.com/id/1034002", "source": "secalert@redhat.com" + }, + { + "url": "http://packetstormsecurity.com/files/131249/Apache-Cassandra-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1947.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mail-archive.com/user%40cassandra.apache.org/msg41819.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535154/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73478", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1034002", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0227.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0227.json index 255df3e2937..ddbb696844e 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0227.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0227.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0227", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-12T16:59:02.627", - "lastModified": "2018-10-04T10:29:01.137", + "lastModified": "2024-11-21T02:22:35.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -139,6 +138,58 @@ { "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0773.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0846.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0847.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0848.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0849.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1176.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1177.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ws.apache.org/wss4j/advisories/CVE-2015-0227.txt.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72557", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100837", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03900en_us", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0228.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0228.json index afa6db3086c..81271840535 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0228.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0228.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0228", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-08T02:59:00.073", - "lastModified": "2023-11-07T02:23:19.863", + "lastModified": "2024-11-21T02:22:35.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -252,6 +251,121 @@ { "url": "https://support.apple.com/kb/HT205031", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0099.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1666.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x/CHANGES", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/91787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032967", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2523-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/apache/httpd/commit/643f0fcf3b8ab09a68f0ecd2aa37aafeda3e63ef", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/apache/httpd/commit/78eb3b9235515652ed141353d98c239237030410", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205219", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0231.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0231.json index 611849f581e..45bf659f2c9 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0231.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0231.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0231", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-27T20:03:41.097", - "lastModified": "2016-12-31T02:59:15.997", + "lastModified": "2024-11-21T02:22:36.180", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -509,6 +507,10 @@ "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -588,6 +590,111 @@ { "url": "https://support.apple.com/HT205267", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3195", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72539", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=68710", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/php/php-src/commit/b585a3aed7880a5fa5c18e2b838fc96f40e075bd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201606-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0232.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0232.json index 47068659644..5461d43f52d 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0232.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0232.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0232", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-27T20:04:11.307", - "lastModified": "2023-11-07T02:23:20.520", + "lastModified": "2024-11-21T02:22:36.370", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-824: Access of Uninitialized Pointer", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -588,6 +586,107 @@ { "url": "https://support.apple.com/HT205267", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=21bc7464f454fec18a9ec024c738f195602fee2a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2fc178cf448d8e1b95d1314e47eeef610729e0df", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=55001de6d8c6ed2aada870a76de1e4b4558737bf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3195", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72541", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=68799", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185472", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-824: Access of Uninitialized Pointer" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0235.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0235.json index 1c81c54363d..1a21b7f0ebb 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0235.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0235.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0235", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-28T19:59:00.063", - "lastModified": "2024-02-14T01:17:43.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:36.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -369,6 +368,15 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=142721102728110&w=2", + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=142722450701342&w=2", "source": "secalert@redhat.com", @@ -387,6 +395,15 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=142781412222323&w=2", + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=143145428124857&w=2", "source": "secalert@redhat.com", @@ -984,6 +1001,703 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0090.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2015-0092.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142296726407499&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721102728110&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142721102728110&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722450701342&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142781412222323&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=142781412222323&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143145428124857&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0126.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Jun/18", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2021/Sep/0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2022/Jun/36", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/269", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/274", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62517", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62640", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62667", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62680", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62690", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62691", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62692", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62715", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62758", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62812", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62813", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62816", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62870", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62871", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62879", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62883", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695695", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695774", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695835", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695860", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696131", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696243", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696526", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696602", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21696618", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "URL Repurposed" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:039", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2021/05/04/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534845/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72325", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/91787", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032909", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Permissions Required" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa90", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10100", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://seclists.org/bugtraq/2019/Jun/14", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20150127-0001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205375", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.f-secure.com/en/web/labs_global/fsc-2015-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.sophos.com/en-us/support/knowledgebase/121879.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0236.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0236.json index b2f209dfa03..613aaa1f40d 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0236.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0236.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0236", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-29T15:59:00.060", - "lastModified": "2023-02-12T23:15:29.867", + "lastModified": "2024-11-21T02:22:37.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -273,6 +272,60 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0323.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62766", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.libvirt.org/2015/0001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:070", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2867-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0237.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0237.json index f1ea697b98c..4a58fe7b913 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0237.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0237.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0237", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-01T15:59:02.457", - "lastModified": "2023-02-12T23:15:29.960", + "lastModified": "2024-11-21T02:22:37.377", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,17 @@ { "url": "http://www.securitytracker.com/id/1032231", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0888.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032231", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0239.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0239.json index 29eacea3687..2af75f49ca8 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0239.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0239.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0239", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-02T11:59:04.693", - "lastModified": "2023-02-13T00:45:44.713", + "lastModified": "2024-11-21T02:22:37.637", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -291,6 +290,135 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3747379accba8e95d70cec0eae0582c8c182050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://permalink.gmane.org/gmane.linux.kernel.commits.head/502245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1272.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/27/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72842", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2514-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2516-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2517-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186448", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/f3747379accba8e95d70cec0eae0582c8c182050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0240.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0240.json index 225a4e81885..e58eb695dfe 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0240.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0240.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0240", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-24T01:59:00.050", - "lastModified": "2023-02-13T00:45:47.043", + "lastModified": "2024-11-21T02:22:37.833", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -613,6 +612,14 @@ "url": "http://marc.info/?l=bugtraq&m=142722696102151&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142722696102151&w=2", + "source": "secalert@redhat.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143039217203031&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143039217203031&w=2", "source": "secalert@redhat.com" @@ -722,6 +729,160 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0084.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722696102151&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142722696102151&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143039217203031&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143039217203031&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0249.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0250.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0251.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0252.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0253.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0254.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0255.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0256.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0257.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72711", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031783", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.360345", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2508-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/articles/1346913", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191325", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.lenovo.com/product_security/samba_remote_vuln", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.lenovo.com/us/en/product_security/samba_remote_vuln", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36741/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.samba.org/samba/security/CVE-2015-0240", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0245.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0245.json index f6d5898f536..3162e0c5f47 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0245.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0245.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0245", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-13T15:59:08.337", - "lastModified": "2023-12-27T16:36:58.353", + "lastModified": "2024-11-21T02:22:38.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -350,6 +349,30 @@ { "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3161", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:176", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/09/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0247.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0247.json index a8370217375..27150459e09 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0247.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0247.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0247", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-17T15:59:02.983", - "lastModified": "2018-10-09T19:55:33.920", + "lastModified": "2024-11-21T02:22:38.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -212,6 +211,81 @@ { "url": "https://security.gentoo.org/glsa/201701-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0061.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3166", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ocert.org/advisories/ocert-2015-002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534633/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72520", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2507-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0248.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0248.json index 9e9c9808962..ea59acdffd2 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0248.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0248.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0248", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-08T18:59:01.827", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:22:38.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -499,6 +498,79 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033214", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2721-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201610-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0250.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0250.json index 7d1287f3b8e..75f631c533d 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0250.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0250.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0250", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-24T17:59:00.070", - "lastModified": "2017-11-04T01:29:01.910", + "lastModified": "2024-11-21T02:22:39.153", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -167,6 +165,60 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0138.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0041.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3205", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:203", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://xmlgraphics.apache.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0251.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0251.json index 89af0cdda38..f69909979f3 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0251.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0251.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0251", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-08T18:59:02.843", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:22:39.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -548,6 +547,83 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jun/32", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://subversion.apache.org/security/CVE-2015-0251-advisory.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74259", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1033214", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2721-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201610-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0252.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0252.json index 4a8e7300ca2..8166f8d7c66 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0252.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0252.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0252", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-24T17:59:01.507", - "lastModified": "2023-02-05T21:10:03.387", + "lastModified": "2024-11-21T02:22:39.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -179,6 +178,73 @@ { "url": "https://www.exploit-db.com/exploits/36906/", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152882.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153094.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153829.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153887.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153903.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153923.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131756/Apache-Xerces-C-XML-Parser-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1193.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032254", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xerces.apache.org/xerces-c/secadv/CVE-2015-0252.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://shibboleth.net/community/advisories/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36906/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0254.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0254.json index a36aa55d1b9..924527f79ac 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0254.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0254.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0254", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-09T14:59:04.263", - "lastModified": "2023-11-07T02:23:21.340", + "lastModified": "2024-11-21T02:22:39.837", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -199,6 +197,113 @@ { "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mail-archives.apache.org/mod_mbox/tomcat-taglibs-user/201502.mbox/%3C82207A16-6348-4DEE-877E-F7B87292576A%40apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130575/Apache-Standard-Taglibs-1.2.1-XXE-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1695.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-1838.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-1839.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-1840.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-1841.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534772/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1034934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2551-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2016:1376", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/8a20e48acb2a40be5130df91cf9d39d8ad93181989413d4abcaa4914%40%3Cdev.tomcat.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r6c93d8ade3788dbc00f5a37238bc278e7d859f2446b885460783a16f%40%3Cpluto-dev.portals.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rc1686f6196bb9063bf26577a21b8033c19c1a30e5a9159869c8f3d38%40%3Cpluto-dev.portals.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rf1179e6971bc46f0f68879a9a10cc97ad4424451b0889aeef04c8077%40%3Cpluto-scm.portals.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rfc2bfd99c340dafd501676693cd889c1f9f838b97bdd0776a8f5557d%40%3Cdev.tomcat.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.oracle.com//security-alerts/cpujul2021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0255.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0255.json index 71676e12d44..6123b736958 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0255.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0255.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0255", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-13T15:59:09.367", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:22:40.097", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -153,6 +152,62 @@ { "url": "https://security.gentoo.org/glsa/201504-06", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0073.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0797.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3160", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2500-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2015-02-10/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0257.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0257.json index 3d440d81d1a..ecc1bbcba91 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0257.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0257.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0257", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-01T15:59:03.800", - "lastModified": "2023-02-12T23:15:30.157", + "lastModified": "2024-11-21T02:22:40.267", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -83,6 +82,17 @@ { "url": "http://www.securitytracker.com/id/1032231", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0888.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032231", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0259.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0259.json index 6bf01588d0f..63b269ed4d9 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0259.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0259.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0259", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-01T14:59:01.380", - "lastModified": "2023-02-13T00:46:05.350", + "lastModified": "2024-11-21T02:22:40.493", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -125,6 +124,41 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-March/000341.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0790.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0843.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0844.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/nova/+bug/1409142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0260.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0260.json index b01a2628f8f..73fd4c7166a 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0260.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0260.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0260", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-16T15:59:01.293", - "lastModified": "2020-05-28T16:58:54.290", + "lastModified": "2024-11-21T02:22:40.617", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -108,6 +107,37 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72573", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kallithea-scm.org/security/cve-2015-0260.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://rhodecode.com/blog/rhodecode-enterprise-security-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0261.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0261.json index 5d1a3a5d8f3..094445b80b6 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0261.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0261.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0261", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-24T17:59:02.790", - "lastModified": "2018-10-09T19:55:36.997", + "lastModified": "2024-11-21T02:22:40.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -136,6 +135,70 @@ { "url": "https://security.gentoo.org/glsa/201510-04", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0114.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153834.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153999.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:182", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534829/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2580-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:1871", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0267.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0267.json index 90b11b7479c..5ce2f24b7e7 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0267.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0267.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0267", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-19T18:59:00.090", - "lastModified": "2023-02-12T23:15:30.287", + "lastModified": "2024-11-21T02:22:41.370", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-61: UNIX Symbolic Link (Symlink) Following", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -84,6 +82,18 @@ { "url": "http://www.securityfocus.com/bid/74622", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0986.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74622", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-61: UNIX Symbolic Link (Symlink) Following" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0268.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0268.json index 23d1c46bef3..eae36060880 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0268.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0268.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0268", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-16T15:59:03.183", - "lastModified": "2018-10-30T16:26:52.653", + "lastModified": "2024-11-21T02:22:41.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100868", "source": "secalert@redhat.com" + }, + { + "url": "http://www.securityfocus.com/bid/72591", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100868", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0271.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0271.json index 4b9e6fdd1d1..6f8d17ffd5b 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0271.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0271.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0271", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-10T14:59:05.523", - "lastModified": "2023-02-13T00:46:08.943", + "lastModified": "2024-11-21T02:22:41.830", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per this link this vulnerability requires authentication.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +96,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0840.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0841.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per this link this vulnerability requires authentication." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0273.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0273.json index f968d8801d9..36ccdefa719 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0273.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0273.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0273", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-30T10:59:06.507", - "lastModified": "2023-11-07T02:23:22.293", + "lastModified": "2024-11-21T02:22:42.160", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -346,6 +344,10 @@ "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -428,6 +430,126 @@ { "url": "https://support.apple.com/HT205375", "source": "secalert@redhat.com" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=71335e6ebabc1b12c057d8017fd811892ecdfd24", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3195", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72701", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031945", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2535-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=68942", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194730", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201606-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205375", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0274.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0274.json index 73cebbbc8cc..27030c202d5 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0274.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0274.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0274", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-16T10:59:05.007", - "lastModified": "2024-02-15T18:55:03.743", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:42.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -132,6 +131,65 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8275cdd0e7ac550dcce2b3ef6d2fb3b808c1ae59", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0290.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0694.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031853", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2543-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2544-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195248", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/8275cdd0e7ac550dcce2b3ef6d2fb3b808c1ae59", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0278.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0278.json index 072ecc4000a..50a0d90f666 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0278.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0278.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0278", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-18T15:59:02.713", - "lastModified": "2023-02-12T23:15:30.490", + "lastModified": "2024-11-21T02:22:42.857", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -150,6 +149,53 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0186.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:228", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/libuv/libuv/commit/66ab38918c911bcff025562cf06237d7fedaba0c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/libuv/libuv/pull/215", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://groups.google.com/forum/#%21msg/libuv/0JZxwLMtsMI/jraczskYWWQJ", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.fedoraproject.org/pipermail/package-announce/2015-February/150526.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201611-10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0279.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0279.json index 42c99080bb5..6469e769ddc 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0279.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0279.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0279", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-26T14:59:00.070", - "lastModified": "2019-07-23T20:15:11.000", + "lastModified": "2024-11-21T02:22:42.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,54 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN56297719/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-001959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/153734/Tufin-Secure-Change-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0719.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Jul/21", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2020/Mar/21", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0282.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0282.json index a33c13fbf78..0fd50e080f8 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0282.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0282.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0282", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-24T17:59:04.007", - "lastModified": "2018-01-05T02:29:59.227", + "lastModified": "2024-11-21T02:22:43.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ { "url": "http://www.securitytracker.com/id/1032148", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1457.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3191", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gnutls.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032148", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0283.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0283.json index c578d476d4c..2a92cdfc036 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0283.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0283.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0283", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-30T14:59:00.070", - "lastModified": "2023-02-13T00:46:32.437", + "lastModified": "2024-11-21T02:22:43.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,30 @@ { "url": "https://git.fedorahosted.org/cgit/slapi-nis.git/commit/?id=6573f91c95f7a353ad3bdf2fe95b0c15932aa097", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0728.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73377", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195729", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.fedorahosted.org/cgit/slapi-nis.git/commit/?id=6573f91c95f7a353ad3bdf2fe95b0c15932aa097", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0285.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0285.json index 3c75d7c2c9d..fe4ebe19887 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0285.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0285.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0285", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:03.723", - "lastModified": "2023-11-07T02:23:23.110", + "lastModified": "2024-11-21T02:22:43.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -213,6 +212,133 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73234", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202410", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=e1b568dd2462f7cacf98f3d117936c34e2849a6b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0286.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0286.json index cf4e655d8b0..6fbd0a8e17d 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0286.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0286.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0286", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:04.677", - "lastModified": "2023-11-07T02:23:23.180", + "lastModified": "2024-11-21T02:22:43.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -297,6 +296,10 @@ "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -443,6 +446,221 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142841429220765&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050254401665&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73225", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2537-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/articles/1384453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202366", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX216642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0287.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0287.json index 24ebf5d2eea..ee1bfe93ce5 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0287.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0287.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0287", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:05.770", - "lastModified": "2023-11-07T02:23:23.300", + "lastModified": "2024-11-21T02:22:43.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -301,6 +300,10 @@ "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -431,6 +434,209 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142841429220765&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73227", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2537-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/articles/1384453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202380", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX216642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0288.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0288.json index d5455a44590..12d35f9b72b 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0288.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0288.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0288", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:06.880", - "lastModified": "2023-11-07T02:23:23.427", + "lastModified": "2024-11-21T02:22:44.170", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -290,6 +288,10 @@ "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -420,6 +422,198 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142841429220765&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050254401665&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2537-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/articles/1384453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=28a00bcd8e318da18031b2ac8778c64147cd54f9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://rt.openssl.org/Ticket/Display.html?id=3708&user=guest&pass=guest", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX216642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0289.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0289.json index 1bd2ce73600..0ab9868b02c 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0289.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0289.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0289", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:07.833", - "lastModified": "2023-11-07T02:23:23.550", + "lastModified": "2024-11-21T02:22:44.390", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -290,6 +288,10 @@ "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -412,6 +414,190 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142841429220765&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2537-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/articles/1384453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202384", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c0334c2c92dd1bc3ad8138ba6e74006c3631b0f9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0290.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0290.json index 015c308d11b..31edfd84672 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0290.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0290.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0290", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:08.787", - "lastModified": "2023-11-07T02:23:23.670", + "lastModified": "2024-11-21T02:22:44.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -206,6 +205,126 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73226", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=77c77f0a1b9f15b869ca3342186dfbedd1119d0e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0291.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0291.json index 07b8fd052c9..7c157c2be2b 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0291.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0291.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0291", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:09.660", - "lastModified": "2023-11-07T02:23:23.747", + "lastModified": "2024-11-21T02:22:44.830", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -213,6 +211,133 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73235", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202338", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=76343947ada960b6269090638f5391068daee88d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0292.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0292.json index 2ca0e703f41..d983e42d987 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0292.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0292.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0292", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:10.690", - "lastModified": "2023-11-07T02:23:23.813", + "lastModified": "2024-11-21T02:22:45.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -202,6 +201,10 @@ "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -319,6 +322,152 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73228", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2537-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/articles/1384453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=d0666f289ac013094bbbf547bfbcd616199b7d2d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://rt.openssl.org/Ticket/Display.html?id=2608&user=guest&pass=guest", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX216642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0293.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0293.json index 9e3eb1fccb7..88e75388c06 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0293.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0293.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0293", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:11.537", - "lastModified": "2023-11-07T02:23:23.900", + "lastModified": "2024-11-21T02:22:45.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -325,6 +324,10 @@ "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "secalert@redhat.com" @@ -451,6 +454,229 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213830203296&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0716.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0752.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0800.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:063", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2537-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/articles/1384453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=86f8fb0e344d62454f8daf3e15236b2b59210756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX216642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0295.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0295.json index 195beedf913..d223f6e4d6a 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0295.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0295.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0295", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-25T14:59:01.720", - "lastModified": "2018-10-30T16:27:34.687", + "lastModified": "2024-11-21T02:22:45.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -155,6 +154,49 @@ { "url": "http://www.ubuntu.com/usn/USN-2626-1", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150800.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150940.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151034.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151121.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151138.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151352.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.qt-project.org/pipermail/announce/2015-February/000059.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73029", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2626-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0297.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0297.json index 127769c0c6e..519273a81f6 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0297.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0297.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0297", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-24T14:59:06.000", - "lastModified": "2015-10-05T21:33:54.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:45.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032181", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0862.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032181", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0301.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0301.json index 962ba242970..46b9c75d7fb 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0301.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0301.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0301", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-13T23:59:00.053", - "lastModified": "2017-09-08T01:29:38.607", + "lastModified": "2024-11-21T02:22:46.207", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -310,6 +309,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0302.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0302.json index 1faf25e4383..61db72126e5 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0302.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0302.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0302", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-13T23:59:01.320", - "lastModified": "2017-09-08T01:29:38.700", + "lastModified": "2024-11-21T02:22:46.367", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -310,6 +309,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0303.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0303.json index 2c16953d8d3..81c733c4391 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0303.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0303.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0303", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-13T23:59:02.460", - "lastModified": "2017-09-08T01:29:38.777", + "lastModified": "2024-11-21T02:22:46.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -311,6 +310,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0304.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0304.json index e99f8e00fe8..a9c59a928ee 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0304.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0304.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0304", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-13T23:59:03.397", - "lastModified": "2017-09-08T01:29:38.840", + "lastModified": "2024-11-21T02:22:46.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -316,6 +315,54 @@ { "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0305.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0305.json index 27975eeb951..5ff15b5c521 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0305.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0305.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0305", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-13T23:59:04.397", - "lastModified": "2017-09-08T01:29:38.917", + "lastModified": "2024-11-21T02:22:46.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -308,6 +307,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72033", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0306.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0306.json index 2e579b4a664..9c5d69673a0 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0306.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0306.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0306", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-13T23:59:05.227", - "lastModified": "2017-09-08T01:29:38.997", + "lastModified": "2024-11-21T02:22:46.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -312,6 +311,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0307.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0307.json index b6fb920c944..44b7e11660c 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0307.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0307.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0307", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-13T23:59:06.070", - "lastModified": "2017-09-08T01:29:39.077", + "lastModified": "2024-11-21T02:22:47.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -312,6 +311,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0308.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0308.json index d0cb1ed4f74..97d2e0bde96 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0308.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0308.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0308", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-13T23:59:06.977", - "lastModified": "2017-09-08T01:29:39.183", + "lastModified": "2024-11-21T02:22:47.210", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -312,6 +310,51 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72039", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0309.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0309.json index 91ec9eb9f8c..9c7aa19e929 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0309.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0309.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0309", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-13T23:59:07.883", - "lastModified": "2017-09-08T01:29:39.263", + "lastModified": "2024-11-21T02:22:47.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -311,6 +310,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72038", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0310.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0310.json index 52984995a40..2235278815a 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0310.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0310.json @@ -2,13 +2,8 @@ "id": "CVE-2015-0310", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-23T21:59:00.050", - "lastModified": "2015-11-13T17:08:35.050", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-05-25", - "cisaActionDue": "2022-06-15", - "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", - "cisaVulnerabilityName": "Adobe Flash Player ASLR Bypass Vulnerability", + "lastModified": "2024-11-21T02:22:47.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -46,6 +41,10 @@ } ] }, + "cisaExploitAdd": "2022-05-25", + "cisaActionDue": "2022-06-15", + "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", + "cisaVulnerabilityName": "Adobe Flash Player ASLR Bypass Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -217,6 +216,42 @@ { "url": "http://www.securitytracker.com/id/1031609", "source": "psirt@adobe.com" + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-02.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62452", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62601", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62660", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031609", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0311.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0311.json index 0d16e61b169..0f6f2c25a0c 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0311.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0311.json @@ -2,13 +2,8 @@ "id": "CVE-2015-0311", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-23T21:59:04.897", - "lastModified": "2024-07-02T17:41:45.947", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-04-13", - "cisaActionDue": "2022-05-04", - "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", - "cisaVulnerabilityName": "Adobe Flash Player Remote Code Execution Vulnerability", + "lastModified": "2024-11-21T02:22:47.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-04-13", + "cisaActionDue": "2022-05-04", + "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", + "cisaVulnerabilityName": "Adobe Flash Player Remote Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -386,6 +385,111 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsa15-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-03.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://malware.dontneedcoffee.com/2015/01/unpatched-vulnerability-0day-in-flash.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62432", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62543", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62650", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62660", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62740", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72283", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031597", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0312.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0312.json index 4c8127f82f9..28eaa0c9deb 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0312.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0312.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0312", "sourceIdentifier": "psirt@adobe.com", "published": "2015-01-28T22:59:01.937", - "lastModified": "2021-09-08T17:19:29.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:47.727", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -291,6 +290,66 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-03.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62432", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62543", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62660", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72343", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031634", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100394", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0313.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0313.json index 74aa51fbce8..778e6149693 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0313.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0313.json @@ -2,13 +2,8 @@ "id": "CVE-2015-0313", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-02T19:59:00.053", - "lastModified": "2024-07-02T17:41:33.407", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-04-13", - "cisaActionDue": "2022-05-04", - "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", - "cisaVulnerabilityName": "Adobe Flash Player Use-After-Free Vulnerability", + "lastModified": "2024-11-21T02:22:47.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-04-13", + "cisaActionDue": "2022-05-04", + "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", + "cisaVulnerabilityName": "Adobe Flash Player Use-After-Free Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -422,6 +421,132 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/131189/Adobe-Flash-Player-ByteArray-With-Workers-Use-After-Free.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/62528", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.osvdb.org/117853", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72429", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031686", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsa15-02.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36579/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0314.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0314.json index 1822f76d745..d343368d0fe 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0314.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0314.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0314", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:00.060", - "lastModified": "2017-09-08T01:29:39.513", + "lastModified": "2024-11-21T02:22:48.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100700", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0315.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0315.json index 717193a87cf..19c6eac6ef4 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0315.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0315.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0315", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:01.373", - "lastModified": "2017-09-08T01:29:39.577", + "lastModified": "2024-11-21T02:22:48.120", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -248,6 +246,67 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100697", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0316.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0316.json index 9deaf9c9762..f814161eff5 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0316.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0316.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0316", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:02.387", - "lastModified": "2017-09-08T01:29:39.637", + "lastModified": "2024-11-21T02:22:48.243", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100701", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0317.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0317.json index 18a908fbdcc..e2c8b36c7de 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0317.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0317.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0317", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:03.200", - "lastModified": "2017-09-08T01:29:39.717", + "lastModified": "2024-11-21T02:22:48.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0318.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0318.json index d0661acc1f2..f5b1bb9fd58 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0318.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0318.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0318", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:03.950", - "lastModified": "2017-09-08T01:29:39.777", + "lastModified": "2024-11-21T02:22:48.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100702", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0319.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0319.json index 1f8afdbe1bc..85326004387 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0319.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0319.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0319", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:04.873", - "lastModified": "2017-09-08T01:29:39.857", + "lastModified": "2024-11-21T02:22:48.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100707", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0320.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0320.json index 476a0445b9e..ce077121754 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0320.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0320.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0320", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:05.733", - "lastModified": "2017-09-08T01:29:39.920", + "lastModified": "2024-11-21T02:22:48.720", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -248,6 +246,67 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100698", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0321.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0321.json index f6206b093ff..9a2386d1c51 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0321.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0321.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0321", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:06.717", - "lastModified": "2017-09-08T01:29:39.997", + "lastModified": "2024-11-21T02:22:48.847", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100703", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0322.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0322.json index 91638598e73..739c170f08f 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0322.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0322.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0322", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:07.670", - "lastModified": "2017-09-08T01:29:40.060", + "lastModified": "2024-11-21T02:22:48.973", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -248,6 +246,67 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100699", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0323.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0323.json index d9cc43c07d2..395ca2ad443 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0323.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0323.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0323", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:08.513", - "lastModified": "2017-09-08T01:29:40.137", + "lastModified": "2024-11-21T02:22:49.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100708", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0324.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0324.json index c337d5f104d..7374bf5d5f1 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0324.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0324.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0324", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:09.327", - "lastModified": "2017-09-08T01:29:40.217", + "lastModified": "2024-11-21T02:22:49.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100710", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0325.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0325.json index f415d1ab4cb..65b8959ef63 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0325.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0325.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0325", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:10.233", - "lastModified": "2017-09-08T01:29:40.277", + "lastModified": "2024-11-21T02:22:49.360", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -244,6 +242,63 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100711", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0326.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0326.json index 7555e91ef74..057b49ad254 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0326.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0326.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0326", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:11.263", - "lastModified": "2017-09-08T01:29:40.357", + "lastModified": "2024-11-21T02:22:49.487", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -244,6 +242,63 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100712", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0327.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0327.json index a9634680ca1..0a4ac6b1a88 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0327.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0327.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0327", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:12.123", - "lastModified": "2017-09-08T01:29:40.420", + "lastModified": "2024-11-21T02:22:49.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100709", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0328.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0328.json index 357823ef2f7..1433d9bba5f 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0328.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0328.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0328", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:12.997", - "lastModified": "2017-09-08T01:29:40.480", + "lastModified": "2024-11-21T02:22:49.750", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -244,6 +242,63 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100713", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0329.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0329.json index 7f1cd735364..241c55ff6f6 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0329.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0329.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0329", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:13.903", - "lastModified": "2017-09-08T01:29:40.560", + "lastModified": "2024-11-21T02:22:49.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100704", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0330.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0330.json index 97a02e74729..9d35add8f8a 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0330.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0330.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0330", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-06T00:59:14.733", - "lastModified": "2017-09-08T01:29:40.637", + "lastModified": "2024-11-21T02:22:50.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -247,6 +246,66 @@ { "url": "https://technet.microsoft.com/library/security/2755801", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/2755801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0331.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0331.json index b3c8471ecde..3431d9d5f3a 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0331.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0331.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0331", "sourceIdentifier": "psirt@adobe.com", "published": "2015-02-21T11:59:00.060", - "lastModified": "2017-01-03T02:59:31.440", + "lastModified": "2024-11-21T02:22:50.123", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -204,6 +202,23 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72698", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0332.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0332.json index 68dd4a1f17a..94c41a4795c 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0332.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0332.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0332", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:00.067", - "lastModified": "2017-07-01T01:29:12.077", + "lastModified": "2024-11-21T02:22:50.243", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -232,6 +231,46 @@ { "url": "https://security.gentoo.org/glsa/201503-09", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0333.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0333.json index 96f3f11658a..7406760b9f8 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0333.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0333.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0333", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:01.207", - "lastModified": "2017-07-01T01:29:12.157", + "lastModified": "2024-11-21T02:22:50.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -228,6 +227,42 @@ { "url": "https://security.gentoo.org/glsa/201503-09", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0334.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0334.json index 0461ce10574..5104a89fdc4 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0334.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0334.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0334", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:02.287", - "lastModified": "2017-07-01T01:29:12.233", + "lastModified": "2024-11-21T02:22:50.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -228,6 +227,42 @@ { "url": "https://security.gentoo.org/glsa/201503-09", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0335.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0335.json index 75ba68a67de..90787974e9d 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0335.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0335.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0335", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:03.287", - "lastModified": "2017-07-01T01:29:12.297", + "lastModified": "2024-11-21T02:22:50.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -228,6 +227,42 @@ { "url": "https://security.gentoo.org/glsa/201503-09", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0336.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0336.json index f5f83e0a4d7..8b0cefa10bb 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0336.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0336.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0336", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:04.083", - "lastModified": "2017-07-01T01:29:12.343", + "lastModified": "2024-11-21T02:22:50.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -171,9 +170,10 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", - "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.2.202.442", + "matchCriteriaId": "A56E1EE0-23BB-4DF6-9AED-EB27A506071A" } ] }, @@ -182,10 +182,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "11.2.202.442", - "matchCriteriaId": "A56E1EE0-23BB-4DF6-9AED-EB27A506071A" + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" } ] } @@ -236,6 +235,50 @@ { "url": "https://www.exploit-db.com/exploits/36962/", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73084", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36962/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0337.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0337.json index 5cd531499d9..7fd2002691d 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0337.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0337.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0337", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:05.003", - "lastModified": "2017-07-01T01:29:12.407", + "lastModified": "2024-11-21T02:22:50.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -228,6 +227,42 @@ { "url": "https://security.gentoo.org/glsa/201503-09", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0338.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0338.json index 9a194dd3ead..6f2ca7eceaf 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0338.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0338.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0338", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:06.067", - "lastModified": "2017-07-01T01:29:12.483", + "lastModified": "2024-11-21T02:22:50.953", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-190: Integer Overflow or Wraparound", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -229,6 +227,43 @@ { "url": "https://security.gentoo.org/glsa/201503-09", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-190: Integer Overflow or Wraparound" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0339.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0339.json index c85401b32f3..e2cfd5c25d8 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0339.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0339.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0339", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:06.973", - "lastModified": "2017-07-01T01:29:12.547", + "lastModified": "2024-11-21T02:22:51.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -228,6 +227,42 @@ { "url": "https://security.gentoo.org/glsa/201503-09", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0340.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0340.json index 21dc55256b4..bcf24cc569a 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0340.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0340.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0340", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:08.020", - "lastModified": "2017-07-01T01:29:12.607", + "lastModified": "2024-11-21T02:22:51.187", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -229,6 +227,43 @@ { "url": "https://security.gentoo.org/glsa/201503-09", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0341.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0341.json index 471d356bfe9..86abe4a15ed 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0341.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0341.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0341", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:08.927", - "lastModified": "2017-07-01T01:29:12.670", + "lastModified": "2024-11-21T02:22:51.310", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -229,6 +227,43 @@ { "url": "https://security.gentoo.org/glsa/201503-09", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0342.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0342.json index b196c7c7112..e895ae76a46 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0342.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0342.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0342", "sourceIdentifier": "psirt@adobe.com", "published": "2015-03-13T17:59:09.893", - "lastModified": "2017-07-01T01:29:12.733", + "lastModified": "2024-11-21T02:22:51.430", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -229,6 +227,43 @@ { "url": "https://security.gentoo.org/glsa/201503-09", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0345.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0345.json index 20adccf4ef9..81c7cd01f67 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0345.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0345.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0345", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-15T10:59:00.080", - "lastModified": "2020-09-04T14:05:43.617", + "lastModified": "2024-11-21T02:22:51.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1032106", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/coldfusion/apsb15-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0346.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0346.json index 1c6d54755c8..bf055d7d60c 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0346.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0346.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0346", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:00.067", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:51.880", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -320,6 +318,59 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0347.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0347.json index 43d9451eaa2..e08a4debc2c 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0347.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0347.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0347", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:01.363", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:52.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -63,9 +62,10 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", - "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.2.202.451", + "matchCriteriaId": "EB3AED03-5107-4120-8815-55FF8EE41498" } ] }, @@ -74,10 +74,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "11.2.202.451", - "matchCriteriaId": "EB3AED03-5107-4120-8815-55FF8EE41498" + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" } ] } @@ -161,22 +160,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" - } - ] - }, { "operator": "OR", "negate": false, @@ -263,6 +246,22 @@ "matchCriteriaId": "1BC4FAD0-4A54-4EDF-BE39-28138B34E719" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] } ] } @@ -319,6 +318,58 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0348.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0348.json index f290db0caba..704f1875c2a 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0348.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0348.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0348", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:02.350", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:52.153", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,22 +97,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" - } - ] - }, { "operator": "OR", "negate": false, @@ -200,6 +183,22 @@ "matchCriteriaId": "1BC4FAD0-4A54-4EDF-BE39-28138B34E719" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] } ] }, @@ -211,9 +210,10 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", - "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", + "versionEndIncluding": "11.2.202.451", + "matchCriteriaId": "EB3AED03-5107-4120-8815-55FF8EE41498" } ] }, @@ -222,10 +222,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "11.2.202.451", - "matchCriteriaId": "EB3AED03-5107-4120-8815-55FF8EE41498" + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" } ] } @@ -315,6 +314,54 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0349.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0349.json index 75283a36d2d..ed41e6f3256 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0349.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0349.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0349", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:03.537", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:52.293", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -59,22 +57,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" - } - ] - }, { "operator": "OR", "negate": false, @@ -161,6 +143,22 @@ "matchCriteriaId": "1BC4FAD0-4A54-4EDF-BE39-28138B34E719" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] } ] }, @@ -320,6 +318,59 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74064", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0350.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0350.json index 06addd079bf..79697eb0dee 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0350.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0350.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0350", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:04.427", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:52.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -319,6 +318,58 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0351.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0351.json index cc3392a0bfa..4e16aadb026 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0351.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0351.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0351", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:05.397", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:52.590", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -320,6 +318,59 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74064", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0352.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0352.json index 9bf0cf2e037..ee9190cc54e 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0352.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0352.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0352", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:06.273", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:52.723", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -319,6 +318,58 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0353.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0353.json index 5d946e447a7..11a9abe96c0 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0353.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0353.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0353", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:07.257", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:52.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -319,6 +318,58 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0354.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0354.json index 98afe690010..1b1a0543f19 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0354.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0354.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0354", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:08.117", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:52.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -319,6 +318,58 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0355.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0355.json index 3af37425a31..aa3b6c83b91 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0355.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0355.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0355", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:08.960", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:53.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -319,6 +318,58 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0356.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0356.json index 0ce4a284d5a..4a3ce7ba417 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0356.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0356.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0356", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:10.037", - "lastModified": "2017-01-03T02:59:32.533", + "lastModified": "2024-11-21T02:22:53.260", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -229,6 +227,43 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0357.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0357.json index d8c2765c71e..dca7c669482 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0357.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0357.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0357", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:10.897", - "lastModified": "2017-01-03T02:59:32.613", + "lastModified": "2024-11-21T02:22:53.383", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -228,6 +227,42 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0358.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0358.json index a2fc254e43b..f94ff5b059f 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0358.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0358.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0358", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:11.803", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:53.607", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -320,6 +318,59 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74064", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0359.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0359.json index 4037a7ca08e..6d68aa8d43e 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0359.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0359.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0359", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:12.680", - "lastModified": "2017-10-07T01:29:00.507", + "lastModified": "2024-11-21T02:22:54.493", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -233,6 +231,47 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0360.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0360.json index 2a2c65e9354..a9fce1cd507 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0360.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0360.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0360", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:13.477", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:22:54.613", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -319,6 +318,58 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0361.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0361.json index dfa53a9b443..e6c92445447 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0361.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0361.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0361", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-07T19:59:05.107", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:22:54.737", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -190,6 +188,50 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148241.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031498", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0362.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0362.json index d601c0635f9..4f7ad73ef3f 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0362.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0362.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0362", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:10.543", - "lastModified": "2017-09-08T01:29:40.683", + "lastModified": "2024-11-21T02:22:54.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100076", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100076", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0363.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0363.json index a6e757dacdc..e11035a8478 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0363.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0363.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0363", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:11.513", - "lastModified": "2017-09-08T01:29:40.730", + "lastModified": "2024-11-21T02:22:55.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100128", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72203", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100128", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0364.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0364.json index dc59147a21e..7a8db59b51c 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0364.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0364.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0364", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:12.467", - "lastModified": "2017-09-08T01:29:40.793", + "lastModified": "2024-11-21T02:22:55.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100133", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100133", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0365.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0365.json index 3eac0f29a5a..db8848d824a 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0365.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0365.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0365", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:13.373", - "lastModified": "2017-09-08T01:29:40.840", + "lastModified": "2024-11-21T02:22:55.237", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100122", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72190", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100122", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0366.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0366.json index 34960447097..060da2a94bc 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0366.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0366.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0366", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:14.200", - "lastModified": "2017-09-08T01:29:40.903", + "lastModified": "2024-11-21T02:22:55.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100118", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72180", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100118", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0367.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0367.json index 50bd300fc46..2d139747f57 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0367.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0367.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0367", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:14.967", - "lastModified": "2017-09-08T01:29:40.950", + "lastModified": "2024-11-21T02:22:55.467", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nPlease refer to My Oracle Support Note 1952939.1 for instructions on how to address this issue.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -107,6 +105,27 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100077", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62473", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100077", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nPlease refer to My Oracle Support Note 1952939.1 for instructions on how to address this issue." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0368.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0368.json index a119c82a90e..c82f998ca9a 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0368.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0368.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0368", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:15.747", - "lastModified": "2017-09-08T01:29:41.013", + "lastModified": "2024-11-21T02:22:55.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -130,6 +129,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100105", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72123", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100105", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0369.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0369.json index ad293f2c207..9a924b47ae3 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0369.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0369.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0369", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:16.670", - "lastModified": "2017-09-08T01:29:41.060", + "lastModified": "2024-11-21T02:22:55.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100123", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100123", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0370.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0370.json index 7f80e00aec2..41c07dd055a 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0370.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0370.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0370", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:17.420", - "lastModified": "2017-09-08T01:29:41.107", + "lastModified": "2024-11-21T02:22:55.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -114,6 +113,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100072", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72171", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031572", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100072", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0371.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0371.json index fa521caafb1..19e545d6202 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0371.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0371.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0371", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:18.403", - "lastModified": "2017-09-08T01:29:41.170", + "lastModified": "2024-11-21T02:22:55.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -106,6 +105,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100070", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100070", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0372.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0372.json index bf94cdf2bfa..1d946ea504c 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0372.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0372.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0372", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:19.233", - "lastModified": "2017-09-08T01:29:41.217", + "lastModified": "2024-11-21T02:22:56.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100078", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62476", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100078", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0373.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0373.json index 1123bf8408e..ec126b887c2 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0373.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0373.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0373", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:20.217", - "lastModified": "2017-09-08T01:29:41.263", + "lastModified": "2024-11-21T02:22:56.177", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nThis brings the OJVM component of Database in line with Java SE security fixes delivered as of January CPU 2015.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -112,6 +110,27 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100067", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100067", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nThis brings the OJVM component of Database in line with Java SE security fixes delivered as of January CPU 2015." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0374.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0374.json index cb47e1d85ba..4e6333eca63 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0374.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0374.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0374", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:21.123", - "lastModified": "2022-09-20T20:44:15.890", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:56.287", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -422,6 +421,144 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62728", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3135", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031581", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2480-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0375.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0375.json index ed6e98b243b..1cce04478db 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0375.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0375.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0375", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:21.967", - "lastModified": "2017-09-08T01:29:41.387", + "lastModified": "2024-11-21T02:22:56.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100164", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100164", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0376.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0376.json index 93a71da86aa..3c714eb1af2 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0376.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0376.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0376", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:22.840", - "lastModified": "2016-06-29T15:06:57.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:56.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "http://www.securityfocus.com/bid/72189", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72189", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0377.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0377.json index 90be4cee761..586520bbacf 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0377.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0377.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0377", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:23.687", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:22:56.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:S/C:N/I:N/A:C", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 2.7, @@ -431,6 +430,41 @@ { "url": "https://security.gentoo.org/glsa/201612-27", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62694", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72219", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100176", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-27", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0378.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0378.json index 7daad495193..1fba52625aa 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0378.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0378.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0378", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:24.543", - "lastModified": "2017-09-08T01:29:41.513", + "lastModified": "2024-11-21T02:22:56.857", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -99,6 +98,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100174", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72147", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100174", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0379.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0379.json index 487f02fbf34..ab8925bf13a 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0379.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0379.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0379", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:25.373", - "lastModified": "2017-09-08T01:29:41.590", + "lastModified": "2024-11-21T02:22:56.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100111", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100111", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0380.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0380.json index b6b18241385..7ca215f920b 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0380.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0380.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0380", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:26.170", - "lastModified": "2017-09-08T01:29:41.653", + "lastModified": "2024-11-21T02:22:57.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -136,6 +135,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100101", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72236", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100101", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0381.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0381.json index 1960fa6daa8..ce169474061 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0381.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0381.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0381", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:26.950", - "lastModified": "2022-08-30T17:30:08.483", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:57.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -447,6 +446,143 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62728", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3135", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72214", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031581", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2480-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0382.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0382.json index 775091cbaf7..e31d309f208 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0382.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0382.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0382", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:27.763", - "lastModified": "2022-08-30T17:36:47.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:57.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -454,6 +453,150 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62728", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3135", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72200", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031581", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2480-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0383.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0383.json index 3fda5333813..dd60ee0f3f2 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0383.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0383.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0383", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:28.467", - "lastModified": "2022-05-13T14:57:20.773", + "lastModified": "2024-11-21T02:22:57.637", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nApplies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:C", + "baseScore": 5.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 5.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -265,6 +263,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -336,6 +338,115 @@ { "url": "https://security.gentoo.org/glsa/201603-14", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158791.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158810.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72155", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100148", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nApplies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0384.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0384.json index 7194d2f514c..9b867b65d09 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0384.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0384.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0384", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:29.230", - "lastModified": "2017-09-08T01:29:41.950", + "lastModified": "2024-11-21T02:22:57.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100134", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72221", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100134", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0385.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0385.json index 4aa73b1f7fd..7fddb58b440 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0385.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0385.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0385", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:30.137", - "lastModified": "2017-09-08T01:29:41.997", + "lastModified": "2024-11-21T02:22:57.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -96,6 +95,30 @@ { "url": "https://security.gentoo.org/glsa/201504-05", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72229", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100190", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0386.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0386.json index fcfd7a69d17..5e6127e4925 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0386.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0386.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0386", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:30.920", - "lastModified": "2016-06-23T17:54:55.607", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:58.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "http://www.securityfocus.com/bid/72193", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72193", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0387.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0387.json index c134492f70d..31226945a84 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0387.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0387.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0387", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:31.687", - "lastModified": "2017-09-08T01:29:42.060", + "lastModified": "2024-11-21T02:22:58.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100126", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72198", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100126", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0388.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0388.json index b89668475b0..981648521fe 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0388.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0388.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0388", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:32.527", - "lastModified": "2017-09-08T01:29:42.123", + "lastModified": "2024-11-21T02:22:58.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100130", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100130", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0389.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0389.json index cb0883f13c4..cd15f031b6c 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0389.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0389.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0389", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:33.480", - "lastModified": "2016-06-23T17:55:24.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:58.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -83,6 +82,18 @@ { "url": "http://www.securityfocus.com/bid/72199", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72199", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0390.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0390.json index b8a4b8aabfc..dc17b78e399 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0390.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0390.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0390", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:34.387", - "lastModified": "2017-09-08T01:29:42.183", + "lastModified": "2024-11-21T02:22:58.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -136,6 +135,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100138", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72247", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031591", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100138", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0391.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0391.json index 96d37478a29..08721e31222 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0391.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0391.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0391", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:35.183", - "lastModified": "2022-08-26T16:03:49.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:22:58.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -334,6 +333,106 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62728", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72205", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031581", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100186", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0392.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0392.json index bb321213e8c..4626a151544 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0392.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0392.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0392", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:36.137", - "lastModified": "2017-09-08T01:29:42.310", + "lastModified": "2024-11-21T02:22:58.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100119", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72182", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100119", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0393.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0393.json index 00c805cbbda..53919d3db75 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0393.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0393.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0393", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:36.933", - "lastModified": "2017-09-08T01:29:42.373", + "lastModified": "2024-11-21T02:22:58.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -123,6 +122,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100097", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.databaseforensics.com/Oracle_Jan2015_CPU.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72230", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100097", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0394.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0394.json index c4c0d773a46..544cfdffc5f 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0394.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0394.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0394", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:38.137", - "lastModified": "2017-09-08T01:29:42.433", + "lastModified": "2024-11-21T02:22:59.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100115", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100115", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0395.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0395.json index 8b9065fe953..c026e237f5c 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0395.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0395.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0395", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:38.903", - "lastModified": "2022-05-13T14:57:20.900", + "lastModified": "2024-11-21T02:22:59.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -197,6 +196,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -280,6 +283,114 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0396.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0396.json index c9d77cd57bb..daf7f9d7ff7 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0396.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0396.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0396", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:39.637", - "lastModified": "2017-09-08T01:29:42.560", + "lastModified": "2024-11-21T02:22:59.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100073", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031570", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100073", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0397.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0397.json index d6cd6ef28c9..528a4bde31d 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0397.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0397.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0397", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:40.387", - "lastModified": "2017-09-08T01:29:42.623", + "lastModified": "2024-11-21T02:22:59.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -95,6 +94,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100173", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100173", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0398.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0398.json index 8c6832ce600..00a8711db2b 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0398.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0398.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0398", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:41.170", - "lastModified": "2017-09-08T01:29:42.683", + "lastModified": "2024-11-21T02:22:59.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100129", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72207", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100129", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-03xx/CVE-2015-0399.json b/CVE-2015/CVE-2015-03xx/CVE-2015-0399.json index cd88d4a2f88..1ee1f5fbae3 100644 --- a/CVE-2015/CVE-2015-03xx/CVE-2015-0399.json +++ b/CVE-2015/CVE-2015-03xx/CVE-2015-0399.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0399", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:41.920", - "lastModified": "2017-01-03T02:59:33.817", + "lastModified": "2024-11-21T02:22:59.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -92,6 +91,22 @@ { "url": "http://www.securityfocus.com/bid/72204", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62475", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72204", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0400.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0400.json index 22a8d21f61b..32e08c1b6f8 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0400.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0400.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0400", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:42.747", - "lastModified": "2022-05-13T14:57:20.910", + "lastModified": "2024-11-21T02:22:59.733", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "As per Oracle:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\n\n\nhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -163,6 +161,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -210,6 +212,79 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100149", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As per Oracle:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\n\n\nhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0401.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0401.json index cc06c3a2718..32410de081f 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0401.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0401.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0401", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:43.577", - "lastModified": "2017-01-03T02:59:33.957", + "lastModified": "2024-11-21T02:22:59.873", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -88,6 +87,18 @@ { "url": "http://www.securityfocus.com/bid/72212", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72212", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0402.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0402.json index ee859881219..ee830006d2e 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0402.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0402.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0402", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:44.577", - "lastModified": "2017-09-08T01:29:42.810", + "lastModified": "2024-11-21T02:22:59.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100121", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100121", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0403.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0403.json index 9a815828ad9..1cdb9d0f253 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0403.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0403.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0403", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:45.387", - "lastModified": "2022-05-13T14:57:20.920", + "lastModified": "2024-11-21T02:23:00.110", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "As per Oracle:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\n\n\nhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -125,6 +123,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -176,6 +178,75 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72148", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As per Oracle:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\n\n\nhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0404.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0404.json index d733b53f3fc..002e8255dff 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0404.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0404.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0404", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:46.137", - "lastModified": "2017-09-08T01:29:42.920", + "lastModified": "2024-11-21T02:23:00.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100100", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72224", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100100", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0405.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0405.json index f1d35c20e67..a760f0eff5b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0405.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0405.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0405", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:00.077", - "lastModified": "2023-09-12T14:45:07.473", + "lastModified": "2024-11-21T02:23:00.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -121,6 +120,25 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0406.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0406.json index 85d83e89649..1ac30e06ce7 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0406.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0406.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0406", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:46.950", - "lastModified": "2022-05-13T14:57:20.787", + "lastModified": "2024-11-21T02:23:00.477", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "As per http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +123,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -176,6 +178,75 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72154", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As per http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0407.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0407.json index d48b2d4411c..24ff1e9ae18 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0407.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0407.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0407", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:47.793", - "lastModified": "2022-05-13T14:57:20.793", + "lastModified": "2024-11-21T02:23:00.620", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "As per Oracle:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -188,6 +186,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -271,6 +273,115 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72162", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As per Oracle:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0408.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0408.json index 5632efd9d9d..9864e91b8cc 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0408.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0408.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0408", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:48.577", - "lastModified": "2022-05-13T14:57:20.803", + "lastModified": "2024-11-21T02:23:00.780", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "As per Oracle:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\n\n\nhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\n", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -198,6 +196,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -280,6 +282,114 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As per Oracle:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.\n\n\nhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\n" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0409.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0409.json index a6b662b6dab..0767361e199 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0409.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0409.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0409", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:49.310", - "lastModified": "2017-09-08T01:29:43.217", + "lastModified": "2024-11-21T02:23:00.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -137,6 +136,40 @@ { "url": "https://security.gentoo.org/glsa/201504-05", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72223", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031581", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0410.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0410.json index 1b357f4619d..f231213fd12 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0410.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0410.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0410", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T18:59:50.153", - "lastModified": "2022-05-13T14:57:20.810", + "lastModified": "2024-11-21T02:23:01.080", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nApplies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -238,6 +236,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -325,6 +327,119 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100151", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://source.android.com/security/bulletin/2016-11-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\n\nApplies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0411.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0411.json index a14e4e06bf1..7161a90e5bb 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0411.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0411.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0411", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:00.063", - "lastModified": "2022-07-01T14:14:30.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:01.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -323,6 +322,149 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62728", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3135", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031581", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2480-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0412.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0412.json index e1e2b32c750..2281844869d 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0412.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0412.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0412", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:01.123", - "lastModified": "2022-05-13T14:57:20.827", + "lastModified": "2024-11-21T02:23:01.463", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "As per Oracle:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -188,6 +186,10 @@ "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", "source": "secalert_us@oracle.com" @@ -267,6 +269,111 @@ { "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142496355704097&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2486-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As per Oracle:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0413.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0413.json index a7f702e9494..051193e1714 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0413.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0413.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0413", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:02.187", - "lastModified": "2022-05-13T14:57:20.837", + "lastModified": "2024-11-21T02:23:01.630", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "As per http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -164,6 +162,59 @@ { "url": "https://security.gentoo.org/glsa/201507-14", "source": "secalert_us@oracle.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142607790919348&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72176", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2487-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100156", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As per http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html:\n\nApplies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0414.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0414.json index c923b6a80d2..7cb2e16d034 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0414.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0414.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0414", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:03.030", - "lastModified": "2017-01-03T19:00:07.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:01.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -92,6 +91,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72220", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0415.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0415.json index 315e0e575f3..cd55e107f48 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0415.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0415.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0415", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:03.873", - "lastModified": "2017-09-08T01:29:43.577", + "lastModified": "2024-11-21T02:23:01.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -99,6 +98,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100102", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100102", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0416.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0416.json index 1cc7fcb6f2b..72badbde2f4 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0416.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0416.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0416", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:04.733", - "lastModified": "2017-09-08T01:29:43.637", + "lastModified": "2024-11-21T02:23:02.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -103,6 +102,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100109", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62498", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72128", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031576", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100109", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0417.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0417.json index 6755bbf7d3f..49012616a90 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0417.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0417.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0417", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:05.687", - "lastModified": "2017-09-08T01:29:43.700", + "lastModified": "2024-11-21T02:23:02.143", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -96,6 +95,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100131", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100131", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0418.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0418.json index af5985a6d8b..01db3ca2537 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0418.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0418.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0418", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:06.500", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:02.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -429,6 +428,38 @@ { "url": "https://security.gentoo.org/glsa/201612-27", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62694", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100182", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-27", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0419.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0419.json index bdfd7bca020..a5c88fd2589 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0419.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0419.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0419", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:07.327", - "lastModified": "2017-09-08T01:29:43.827", + "lastModified": "2024-11-21T02:23:02.403", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100125", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100125", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0420.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0420.json index 8803cc5cc65..cd52a576c0c 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0420.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0420.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0420", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:08.110", - "lastModified": "2017-01-03T02:59:35.287", + "lastModified": "2024-11-21T02:23:02.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "http://www.securityfocus.com/bid/72225", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72225", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0421.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0421.json index be56493b463..9707ee9e0e0 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0421.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0421.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0421", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:08.983", - "lastModified": "2022-05-13T14:57:20.897", + "lastModified": "2024-11-21T02:23:02.660", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "As per Oracle:\n\nApplies to installation process on client deployment of Java.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -124,6 +122,39 @@ { "url": "https://security.gentoo.org/glsa/201507-14", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100146", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-14", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "As per Oracle:\n\nApplies to installation process on client deployment of Java." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0422.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0422.json index 019c96c00f5..d4a0d3b15d5 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0422.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0422.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0422", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:09.907", - "lastModified": "2017-09-08T01:29:43.933", + "lastModified": "2024-11-21T02:23:02.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -130,6 +129,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100108", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100108", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0423.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0423.json index b484c36e3a1..62cf31dac3d 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0423.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0423.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0423", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:01.327", - "lastModified": "2023-09-12T14:45:07.473", + "lastModified": "2024-11-21T02:23:02.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -162,6 +161,35 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0424.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0424.json index 36f839c05ae..25bb0ff9899 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0424.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0424.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0424", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:10.827", - "lastModified": "2017-09-08T01:29:43.997", + "lastModified": "2024-11-21T02:23:03.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:C", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 7.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -92,6 +91,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100158", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72181", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031594", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100158", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0425.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0425.json index d2d3171a36a..76c5788ca01 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0425.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0425.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0425", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:11.687", - "lastModified": "2017-09-08T01:29:44.043", + "lastModified": "2024-11-21T02:23:03.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100120", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100120", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0426.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0426.json index fdb4e1ef875..9d8712485c9 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0426.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0426.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0426", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:12.563", - "lastModified": "2017-01-03T02:59:35.597", + "lastModified": "2024-11-21T02:23:03.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,18 @@ { "url": "http://www.securityfocus.com/bid/72235", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72235", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0427.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0427.json index 1affb5c4a46..bc29e30f95b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0427.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0427.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0427", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:13.547", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:03.417", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 3.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.2 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.1, @@ -115,6 +114,29 @@ { "url": "https://security.gentoo.org/glsa/201612-27", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100181", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-27", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0428.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0428.json index efa50170c26..7a473447ca4 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0428.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0428.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0428", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:14.420", - "lastModified": "2017-09-08T01:29:44.137", + "lastModified": "2024-11-21T02:23:03.533", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -96,6 +95,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100169", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100169", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0429.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0429.json index a3329effb01..eb2a255a065 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0429.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0429.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0429", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:15.373", - "lastModified": "2017-09-08T01:29:44.200", + "lastModified": "2024-11-21T02:23:03.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -96,6 +95,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100172", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100172", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0430.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0430.json index 9f0a593f975..270ad8c6a0c 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0430.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0430.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0430", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:16.203", - "lastModified": "2017-09-08T01:29:44.247", + "lastModified": "2024-11-21T02:23:03.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -100,6 +99,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100175", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72141", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031583", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100175", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0431.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0431.json index f81e7642cd3..02010bfadc8 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0431.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0431.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0431", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:17.017", - "lastModified": "2017-09-08T01:29:44.310", + "lastModified": "2024-11-21T02:23:03.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100107", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100107", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0432.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0432.json index 863568b177b..74b25eec909 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0432.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0432.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0432", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:17.797", - "lastModified": "2022-08-29T20:57:09.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:04.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -366,6 +365,140 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62728", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3135", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031581", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2480-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100187", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0433.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0433.json index c95f77e09e9..d5dbef42e4d 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0433.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0433.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0433", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:02.623", - "lastModified": "2022-08-26T16:03:57.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:04.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -427,6 +426,108 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2575-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0434.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0434.json index 3c80c61aa51..6cd5da3433f 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0434.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0434.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0434", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:18.640", - "lastModified": "2017-09-08T01:29:44.433", + "lastModified": "2024-11-21T02:23:04.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100081", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62473", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72226", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100081", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0435.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0435.json index b666677994b..95b4dd387e8 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0435.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0435.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0435", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:19.483", - "lastModified": "2017-09-08T01:29:44.497", + "lastModified": "2024-11-21T02:23:04.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -130,6 +129,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100104", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/62506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72122", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100104", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0436.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0436.json index 9c04fa8d3d6..9a580c79878 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0436.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0436.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0436", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:20.390", - "lastModified": "2017-09-08T01:29:44.560", + "lastModified": "2024-11-21T02:23:04.670", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100136", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72249", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031589", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100136", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0437.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0437.json index 6dca5b60624..fc89432684b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0437.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0437.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0437", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-01-21T19:59:21.267", - "lastModified": "2022-05-13T14:57:20.847", + "lastModified": "2024-11-21T02:23:04.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -123,6 +122,38 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72146", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0438.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0438.json index ce98cab93ca..d6d706b2221 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0438.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0438.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0438", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:03.687", - "lastModified": "2023-09-12T14:45:07.473", + "lastModified": "2024-11-21T02:23:04.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -121,6 +120,25 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0439.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0439.json index 7b445ec6407..aae779eca9f 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0439.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0439.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0439", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:04.577", - "lastModified": "2017-01-03T02:59:36.427", + "lastModified": "2024-11-21T02:23:05.027", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -128,6 +127,32 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0440.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0440.json index 490dcc0ed7e..7956dd65945 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0440.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0440.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0440", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:05.373", - "lastModified": "2015-04-17T19:13:38.753", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:05.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0441.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0441.json index de055bf0240..b9850ae360d 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0441.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0441.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0441", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:06.327", - "lastModified": "2022-08-26T16:04:02.173", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:05.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -369,6 +368,86 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2575-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0447.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0447.json index d1be76e9dfe..8332985a795 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0447.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0447.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0447", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:07.250", - "lastModified": "2017-01-03T19:34:34.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:05.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0448.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0448.json index 542d6930e30..875e82b62bf 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0448.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0448.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0448", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:08.173", - "lastModified": "2017-01-03T19:04:57.987", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:05.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -87,6 +86,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0449.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0449.json index 761427bf39b..fc13364ef52 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0449.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0449.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0449", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:08.953", - "lastModified": "2017-01-03T19:00:35.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:06.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032131", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0450.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0450.json index 627d0898a84..bf984fd79cf 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0450.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0450.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0450", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:09.907", - "lastModified": "2017-01-03T02:59:36.753", + "lastModified": "2024-11-21T02:23:06.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032131", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032131", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0451.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0451.json index 192772347cc..92635de2a6b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0451.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0451.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0451", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:10.737", - "lastModified": "2017-01-03T02:59:36.817", + "lastModified": "2024-11-21T02:23:06.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032131", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032131", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0452.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0452.json index b47a9432ae1..e241520d69c 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0452.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0452.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0452", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:11.563", - "lastModified": "2017-09-09T01:29:01.533", + "lastModified": "2024-11-21T02:23:06.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "http://www.securityfocus.com/bid/74127", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74127", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0453.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0453.json index 2e8d7496a38..e2adcb640e7 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0453.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0453.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0453", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:12.517", - "lastModified": "2017-01-03T02:59:36.863", + "lastModified": "2024-11-21T02:23:06.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032125", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032125", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0455.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0455.json index 27e8e0955e9..b3d2df4e2bd 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0455.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0455.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0455", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:13.470", - "lastModified": "2017-01-03T02:59:36.910", + "lastModified": "2024-11-21T02:23:06.640", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: The CVSS score is 6.8 only on Windows for Database versions prior to 12c. The CVSS is 4.0 (Confidentiality is \"Partial+\") for Database 12c on Windows and for all versions of Database on Linux, Unix and other platforms. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +101,18 @@ { "url": "http://www.securitytracker.com/id/1032118", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032118", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: The CVSS score is 6.8 only on Windows for Database versions prior to 12c. The CVSS is 4.0 (Confidentiality is \"Partial+\") for Database 12c on Windows and for all versions of Database on Linux, Unix and other platforms. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0456.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0456.json index d4154d95d6c..293e2a34b0b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0456.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0456.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0456", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:14.360", - "lastModified": "2017-01-03T02:59:36.973", + "lastModified": "2024-11-21T02:23:06.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032131", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032131", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0457.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0457.json index 734f7fe41b6..9c4a9ee47ef 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0457.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0457.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0457", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:15.190", - "lastModified": "2017-01-03T02:59:37.020", + "lastModified": "2024-11-21T02:23:06.857", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: The CVSS score is 9.0 only on Windows for Database versions prior to 12c. The CVSS is 6.5 (Confidentiality, Integrity and Availability is \"Partial+\") for Database 12c on Windows and for all versions of Database on Linux, Unix and other platforms. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -104,6 +102,19 @@ { "url": "http://www.securitytracker.com/id/1032118", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032118", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: The CVSS score is 9.0 only on Windows for Database versions prior to 12c. The CVSS is 6.5 (Confidentiality, Integrity and Availability is \"Partial+\") for Database 12c on Windows and for all versions of Database on Linux, Unix and other platforms. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0458.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0458.json index 42709f88e36..97f48b770ea 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0458.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0458.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0458", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:16.080", - "lastModified": "2022-05-13T14:57:20.990", + "lastModified": "2024-11-21T02:23:06.967", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -216,6 +214,106 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0858.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74141", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0459.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0459.json index fd72ef9a1ea..48b3b1ba480 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0459.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0459.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0459", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:16.877", - "lastModified": "2022-05-13T14:57:20.997", + "lastModified": "2024-11-21T02:23:07.130", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -249,6 +247,114 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0858.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0460.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0460.json index eebf4e96b0c..8ac16e739c5 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0460.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0460.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0460", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:17.817", - "lastModified": "2022-05-13T14:57:21.007", + "lastModified": "2024-11-21T02:23:07.300", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -194,6 +192,94 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0158.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0806.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0807.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0808.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0809.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0858.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74097", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2573-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2574-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0461.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0461.json index 4ecb59e4894..00f89a8f387 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0461.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0461.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0461", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:18.863", - "lastModified": "2017-01-03T02:59:37.380", + "lastModified": "2024-11-21T02:23:07.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:C/A:N", + "baseScore": 7.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 7.0 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032131", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032131", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0462.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0462.json index 269a7f17faf..21a9c955818 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0462.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0462.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0462", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:19.690", - "lastModified": "2017-01-03T02:59:37.427", + "lastModified": "2024-11-21T02:23:07.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -122,6 +121,17 @@ { "url": "http://www.securitytracker.com/id/1032124", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032124", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0463.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0463.json index df407d249ab..53435bed7ec 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0463.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0463.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0463", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:20.630", - "lastModified": "2017-01-03T02:59:37.487", + "lastModified": "2024-11-21T02:23:07.677", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -117,6 +116,17 @@ { "url": "http://www.securitytracker.com/id/1032124", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032124", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0464.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0464.json index 3f4c9451653..6d53c9adcaa 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0464.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0464.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0464", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:21.397", - "lastModified": "2017-01-03T02:59:37.537", + "lastModified": "2024-11-21T02:23:07.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -122,6 +121,17 @@ { "url": "http://www.securitytracker.com/id/1032124", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032124", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0465.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0465.json index b9877f2f820..6ff5afe18d4 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0465.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0465.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0465", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:22.223", - "lastModified": "2017-01-03T02:59:37.583", + "lastModified": "2024-11-21T02:23:07.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -122,6 +121,17 @@ { "url": "http://www.securitytracker.com/id/1032124", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032124", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0466.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0466.json index 4e584257c90..37d4bde5b2c 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0466.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0466.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0466", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:23.037", - "lastModified": "2017-09-09T01:29:01.580", + "lastModified": "2024-11-21T02:23:08.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,21 @@ { "url": "http://www.securitytracker.com/id/1032128", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032128", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0469.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0469.json index 9d03f488bc1..17277980c61 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0469.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0469.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0469", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:23.957", - "lastModified": "2022-05-13T14:57:21.050", + "lastModified": "2024-11-21T02:23:08.380", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -258,6 +256,158 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0158.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0806.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0807.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0808.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0809.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0858.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74072", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2573-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2574-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0470.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0470.json index 40a19f00fb6..6cc9f223046 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0470.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0470.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0470", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:24.817", - "lastModified": "2022-05-13T14:57:21.057", + "lastModified": "2024-11-21T02:23:08.543", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +118,50 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0809.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74149", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0471.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0471.json index dd2b1e1a3ce..c1157dcc9bf 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0471.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0471.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0471", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:25.707", - "lastModified": "2017-01-03T02:59:37.880", + "lastModified": "2024-11-21T02:23:08.667", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -91,6 +90,21 @@ { "url": "http://www.securitytracker.com/id/1032132", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032132", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0472.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0472.json index 4211f110ab1..adfa7704529 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0472.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0472.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0472", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:26.537", - "lastModified": "2017-01-03T02:59:37.927", + "lastModified": "2024-11-21T02:23:08.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032125", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032125", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0473.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0473.json index ae7ecea1071..5e023b2f2a9 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0473.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0473.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0473", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:27.693", - "lastModified": "2017-01-03T02:59:37.987", + "lastModified": "2024-11-21T02:23:08.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032122", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032122", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0474.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0474.json index 280f4f0a5f1..874b42fcb3b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0474.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0474.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0474", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:28.570", - "lastModified": "2017-01-03T02:59:38.050", + "lastModified": "2024-11-21T02:23:08.980", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS Base Score would increase to 6.8. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 1.5, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 2.7, @@ -97,6 +95,22 @@ { "url": "http://www.securitytracker.com/id/1032131", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032131", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS Base Score would increase to 6.8. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0475.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0475.json index 097674431ab..67fdb270135 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0475.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0475.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0475", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:29.427", - "lastModified": "2017-01-03T02:59:38.097", + "lastModified": "2024-11-21T02:23:09.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032126", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032126", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0476.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0476.json index 0873eaee6be..0f34d4d2b13 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0476.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0476.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0476", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:30.273", - "lastModified": "2015-04-17T17:57:24.873", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per Oracle: Please refer to My Oracle Support Note 215187.1 for instructions on upgrading to SQLT version 12.1.11. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", + "lastModified": "2024-11-21T02:23:09.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -80,6 +78,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per Oracle: Please refer to My Oracle Support Note 215187.1 for instructions on upgrading to SQLT version 12.1.11. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0477.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0477.json index 3b7435106cf..76ec003af4b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0477.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0477.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0477", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:31.180", - "lastModified": "2022-05-13T14:57:21.063", + "lastModified": "2024-11-21T02:23:09.300", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -258,6 +256,158 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0158.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0806.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0807.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0808.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0809.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0858.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2573-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2574-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0478.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0478.json index 52e39cb1f42..102eb1534c5 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0478.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0478.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0478", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:32.100", - "lastModified": "2022-05-13T14:57:21.070", + "lastModified": "2024-11-21T02:23:09.470", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -285,6 +283,170 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0158.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0806.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0807.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0808.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0809.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0858.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1035517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2573-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2574-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0479.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0479.json index 620996d288b..08ba2297d6f 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0479.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0479.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0479", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:32.993", - "lastModified": "2017-01-03T02:59:38.410", + "lastModified": "2024-11-21T02:23:09.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -92,6 +91,17 @@ { "url": "http://www.securitytracker.com/id/1032118", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032118", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0480.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0480.json index 83b880ec929..c12a3a92667 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0480.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0480.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0480", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:33.807", - "lastModified": "2022-05-13T14:57:21.077", + "lastModified": "2024-11-21T02:23:09.760", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -258,6 +256,158 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0158.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0806.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0807.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0808.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0809.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0858.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2573-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2574-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0482.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0482.json index 133cf0d1c0e..ec7fc4f04f6 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0482.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0482.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0482", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:34.587", - "lastModified": "2017-01-03T02:59:38.583", + "lastModified": "2024-11-21T02:23:09.963", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032131", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032131", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0483.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0483.json index d8842990c89..0cdef6417af 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0483.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0483.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0483", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:35.447", - "lastModified": "2017-01-03T02:59:38.630", + "lastModified": "2024-11-21T02:23:10.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -102,6 +101,17 @@ { "url": "http://www.securitytracker.com/id/1032118", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032118", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0484.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0484.json index a683f3177e9..b40e11e9cb4 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0484.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0484.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0484", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:36.260", - "lastModified": "2022-05-13T14:57:21.017", + "lastModified": "2024-11-21T02:23:10.183", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -161,6 +159,46 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0485.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0485.json index 4a9e3467398..8286fedc20d 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0485.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0485.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0485", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:37.117", - "lastModified": "2017-01-03T02:59:38.753", + "lastModified": "2024-11-21T02:23:10.313", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032125", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032125", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0486.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0486.json index 6e995db36c4..4c8b716f658 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0486.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0486.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0486", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:37.977", - "lastModified": "2022-05-13T14:57:21.023", + "lastModified": "2024-11-21T02:23:10.427", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +121,38 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0487.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0487.json index 92128e0749c..4f473d9018b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0487.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0487.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0487", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:38.777", - "lastModified": "2017-01-03T02:59:38.880", + "lastModified": "2024-11-21T02:23:10.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032125", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032125", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0488.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0488.json index df3ca29e897..1f6b7d2f8a9 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0488.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0488.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0488", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:39.727", - "lastModified": "2022-05-13T14:57:21.030", + "lastModified": "2024-11-21T02:23:10.650", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client and server deployment of JSSE. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -285,6 +283,170 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0158.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0806.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0807.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0808.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0809.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0858.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2573-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2574-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client and server deployment of JSSE. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0489.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0489.json index 902f99b94a3..2f75706029e 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0489.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0489.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0489", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:40.527", - "lastModified": "2017-01-03T02:59:39.050", + "lastModified": "2024-11-21T02:23:10.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 1.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.2 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032129", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032129", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0490.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0490.json index 2c5aac6fee1..4876ee61832 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0490.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0490.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0490", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:41.370", - "lastModified": "2017-01-03T02:59:39.113", + "lastModified": "2024-11-21T02:23:10.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032124", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032124", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0491.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0491.json index 7f989911861..eaa7392af5b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0491.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0491.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0491", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:42.230", - "lastModified": "2022-05-13T14:57:21.037", + "lastModified": "2024-11-21T02:23:11.040", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -259,6 +257,114 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0858.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0492.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0492.json index 0cecf2b0c76..194bf8d8d6b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0492.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0492.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0492", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:43.043", - "lastModified": "2022-05-13T14:57:21.047", + "lastModified": "2024-11-21T02:23:11.190", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -181,6 +179,46 @@ { "url": "https://security.gentoo.org/glsa/201603-11", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0857.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0493.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0493.json index 9844bc34adc..b549e2a53ff 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0493.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0493.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0493", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:43.857", - "lastModified": "2018-10-09T19:55:38.483", + "lastModified": "2024-11-21T02:23:11.313", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per Oracle: Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS Base Score would increase to 6.8. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 1.5, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 2.7, @@ -105,6 +103,30 @@ { "url": "http://www.securitytracker.com/id/1032131", "source": "secalert_us@oracle.com" + }, + { + "url": "http://packetstormsecurity.com/files/131494/Oracle-Outside-In-ibpsd2.dll-PSD-File-Processing-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535285/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032131", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per Oracle: Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS Base Score would increase to 6.8. (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0494.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0494.json index 3718e661ddc..29112c7916b 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0494.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0494.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0494", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:44.637", - "lastModified": "2017-01-03T02:59:39.410", + "lastModified": "2024-11-21T02:23:11.427", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,17 @@ { "url": "http://www.securitytracker.com/id/1032128", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032128", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0495.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0495.json index bf8e682c179..06292938829 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0495.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0495.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0495", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:45.450", - "lastModified": "2015-04-20T17:40:05.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:11.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0496.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0496.json index 1326afa52f9..e27236c6535 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0496.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0496.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0496", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:46.293", - "lastModified": "2017-01-03T02:59:39.457", + "lastModified": "2024-11-21T02:23:11.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032125", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032125", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0497.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0497.json index f78eccf3154..985acd560fb 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0497.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0497.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0497", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:47.263", - "lastModified": "2017-01-03T02:59:39.503", + "lastModified": "2024-11-21T02:23:11.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032125", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032125", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0498.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0498.json index 14d1487b7bf..0ed5e7b6788 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0498.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0498.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0498", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:48.230", - "lastModified": "2017-01-03T02:59:39.567", + "lastModified": "2024-11-21T02:23:11.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:M/C:N/I:N/A:P", + "baseScore": 1.7, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.7 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.2, @@ -91,6 +90,25 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-04xx/CVE-2015-0499.json b/CVE-2015/CVE-2015-04xx/CVE-2015-0499.json index f04866d48f9..0319bf4e49f 100644 --- a/CVE-2015/CVE-2015-04xx/CVE-2015-0499.json +++ b/CVE-2015/CVE-2015-04xx/CVE-2015-0499.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0499", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:48.997", - "lastModified": "2022-09-20T20:44:25.953", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:11.973", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -404,6 +403,116 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2575-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0500.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0500.json index 9b1bc044239..452dff34839 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0500.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0500.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0500", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:49.810", - "lastModified": "2017-01-03T02:59:39.707", + "lastModified": "2024-11-21T02:23:12.160", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -166,6 +165,39 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0501.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0501.json index 6aa0635dc05..070fff7ac77 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0501.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0501.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0501", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:50.653", - "lastModified": "2022-07-19T17:01:31.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:12.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:M/C:N/I:N/A:C", + "baseScore": 5.7, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -408,6 +407,109 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2575-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0502.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0502.json index b78dbbafe45..ab8228659c1 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0502.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0502.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0502", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:51.437", - "lastModified": "2017-01-03T02:59:40.067", + "lastModified": "2024-11-21T02:23:12.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032127", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032127", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0503.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0503.json index 1d2ada0a54c..67a9bbdd99b 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0503.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0503.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0503", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:52.297", - "lastModified": "2017-01-03T02:59:40.113", + "lastModified": "2024-11-21T02:23:12.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -91,6 +90,25 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0504.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0504.json index 062d0e6b4d3..83779483ded 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0504.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0504.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0504", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:53.200", - "lastModified": "2017-01-03T02:59:40.160", + "lastModified": "2024-11-21T02:23:12.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032129", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032129", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0505.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0505.json index d8675dba5e8..c458f08fbc2 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0505.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0505.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0505", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:54.107", - "lastModified": "2022-09-16T19:56:23.933", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:12.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -420,6 +419,122 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74112", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2575-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0506.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0506.json index dcdcd161dd1..9cd70a617a9 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0506.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0506.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0506", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:54.983", - "lastModified": "2017-01-03T02:59:40.287", + "lastModified": "2024-11-21T02:23:13.003", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -91,6 +90,25 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0507.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0507.json index 417f7fd00a0..a21b900668d 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0507.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0507.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0507", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:55.767", - "lastModified": "2017-01-03T02:59:40.333", + "lastModified": "2024-11-21T02:23:13.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -91,6 +90,25 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0508.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0508.json index 8b4a4eaa89f..8b2bb7c6dbe 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0508.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0508.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0508", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:56.577", - "lastModified": "2017-01-03T02:59:40.397", + "lastModified": "2024-11-21T02:23:13.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -91,6 +90,25 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0509.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0509.json index e0233ebef29..ba9696657ca 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0509.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0509.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0509", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:57.377", - "lastModified": "2017-01-03T02:59:40.457", + "lastModified": "2024-11-21T02:23:13.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032123", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032123", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0510.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0510.json index 3952c11df4c..67d0b7cbab7 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0510.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0510.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0510", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:58.157", - "lastModified": "2015-04-17T17:38:26.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:13.447", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0511.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0511.json index c9c326adb67..656cf83bbff 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0511.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0511.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0511", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:58.923", - "lastModified": "2017-01-03T02:59:40.490", + "lastModified": "2024-11-21T02:23:13.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:M/C:N/I:N/A:P", + "baseScore": 2.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -91,6 +90,25 @@ { "url": "https://security.gentoo.org/glsa/201507-19", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0512.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0512.json index b683cec55ca..d5b4de84092 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0512.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0512.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0512", "sourceIdentifier": "security_alert@emc.com", "published": "2015-02-02T01:59:05.810", - "lastModified": "2015-09-17T16:33:08.677", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:23:13.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +83,19 @@ { "url": "http://www.securitytracker.com/id/1031684", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0147.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72374", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031684", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0513.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0513.json index 30aeabe84b3..cda1213f0ce 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0513.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0513.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0513", "sourceIdentifier": "security_alert@emc.com", "published": "2015-01-21T15:17:11.387", - "lastModified": "2017-01-03T02:59:40.550", + "lastModified": "2024-11-21T02:23:13.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -107,6 +106,25 @@ { "url": "http://www.securitytracker.com/id/1031567", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0092.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72259", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031567", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0514.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0514.json index fcf5ff12b2f..95de981bcab 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0514.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0514.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0514", "sourceIdentifier": "security_alert@emc.com", "published": "2015-01-21T15:17:12.807", - "lastModified": "2018-10-09T19:55:38.903", + "lastModified": "2024-11-21T02:23:13.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -122,6 +121,40 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0092.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130910/EMC-M-R-Watch4net-Insecure-Credential-Storage.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/112", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534923/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031567", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.securify.nl/advisory/SFY20141101/emc_m_r__watch4net__data_storage_collector_credentials_are_not_properly_protected.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0515.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0515.json index 1bd25d17692..0a96891e27f 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0515.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0515.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0515", "sourceIdentifier": "security_alert@emc.com", "published": "2015-01-21T15:17:13.713", - "lastModified": "2017-01-03T02:59:40.707", + "lastModified": "2024-11-21T02:23:13.970", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -108,6 +106,26 @@ { "url": "http://www.securitytracker.com/id/1031567", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0092.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72256", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031567", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0516.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0516.json index 25da07271be..4108a3014b4 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0516.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0516.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0516", "sourceIdentifier": "security_alert@emc.com", "published": "2015-01-21T15:17:14.543", - "lastModified": "2018-10-09T19:55:39.483", + "lastModified": "2024-11-21T02:23:14.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -115,6 +114,33 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-01/0092.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/116", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534929/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72255", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031567", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.securify.nl/advisory/SFY20141105/path_traversal_vulnerability_in_emc_m_r__watch4net__mib_browser.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0517.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0517.json index a92987a80ab..3a857390f73 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0517.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0517.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0517", "sourceIdentifier": "security_alert@emc.com", "published": "2015-02-14T15:59:00.060", - "lastModified": "2017-09-08T01:29:44.700", + "lastModified": "2024-11-21T02:23:14.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -118,6 +117,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100874", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-02/0031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72501", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031693", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100874", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0518.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0518.json index c72d4633add..0dbb8ce5334 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0518.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0518.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0518", "sourceIdentifier": "security_alert@emc.com", "published": "2015-02-14T15:59:01.407", - "lastModified": "2017-09-08T01:29:44.763", + "lastModified": "2024-11-21T02:23:14.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -111,13 +110,40 @@ "url": "http://www.securitytracker.com/id/1031693", "source": "security_alert@emc.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100875", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-02/0031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72502", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031693", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100875", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0519.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0519.json index e6cea205c53..971a10c2f68 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0519.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0519.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0519", "sourceIdentifier": "security_alert@emc.com", "published": "2015-02-14T15:59:02.670", - "lastModified": "2017-09-08T01:29:44.827", + "lastModified": "2024-11-21T02:23:14.410", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -95,6 +94,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100748", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2015-02/0043.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130284/EMC-Captiva-Capture-Sensitive-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100748", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0521.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0521.json index 31d56004483..3d9cdbe4e6d 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0521.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0521.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0521", "sourceIdentifier": "security_alert@emc.com", "published": "2015-03-12T10:59:00.050", - "lastModified": "2015-09-11T15:44:03.917", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:14.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -90,6 +89,18 @@ { "url": "http://www.securitytracker.com/id/1031912", "source": "security_alert@emc.com" + }, + { + "url": "http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2015/Mar/47", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031912", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0522.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0522.json index 7d9585154a9..95a53f25a2c 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0522.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0522.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0522", "sourceIdentifier": "security_alert@emc.com", "published": "2015-03-12T10:59:01.317", - "lastModified": "2015-09-11T15:44:58.383", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:14.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,18 @@ { "url": "http://www.securitytracker.com/id/1031912", "source": "security_alert@emc.com" + }, + { + "url": "http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2015/Mar/47", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031912", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0523.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0523.json index 677e1ace4bb..3d1bb06bc77 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0523.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0523.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0523", "sourceIdentifier": "security_alert@emc.com", "published": "2015-03-12T10:59:02.567", - "lastModified": "2016-08-24T19:26:26.800", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:14.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -102,6 +101,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/bugtraq/2015/Mar/47", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031912", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0524.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0524.json index b8679d4c07f..790c63cc1f1 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0524.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0524.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0524", "sourceIdentifier": "security_alert@emc.com", "published": "2015-03-12T10:59:03.583", - "lastModified": "2018-10-09T19:55:39.950", + "lastModified": "2024-11-21T02:23:14.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,29 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2015/Mar/40", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534930/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.securify.nl/advisory/SFY20141113/emc_secure_remote_services_virtual_edition_provisioning_component_is_affected_by_sql_injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0525.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0525.json index ecde56c64c4..ee3430b5839 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0525.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0525.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0525", "sourceIdentifier": "security_alert@emc.com", "published": "2015-03-12T10:59:04.583", - "lastModified": "2019-02-01T18:14:02.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:14.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,45 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/bugtraq/2015/Mar/40", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/118", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534928/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.securify.nl/advisory/SFY20141112/command_injection_vulnerability_in_emc_secure_remote_services_virtual_edition.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0527.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0527.json index b305160af7d..96e07b5ade9 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0527.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0527.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0527", "sourceIdentifier": "security_alert@emc.com", "published": "2015-03-24T00:59:04.953", - "lastModified": "2015-07-28T15:19:40.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:15.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -79,6 +78,14 @@ { "url": "http://seclists.org/bugtraq/2015/Mar/134", "source": "security_alert@emc.com" + }, + { + "url": "http://packetstormsecurity.com/files/130959/EMC-Documentum-xMS-Sensitive-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2015/Mar/134", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0528.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0528.json index eb2a65416b9..97124db6621 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0528.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0528.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0528", "sourceIdentifier": "security_alert@emc.com", "published": "2015-03-29T10:59:04.243", - "lastModified": "2016-08-24T19:28:46.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:15.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -133,6 +132,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/131035/EMC-Isilon-OneFS-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/bugtraq/2015/Mar/162", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0529.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0529.json index 85474871e6c..4bb34ac0a36 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0529.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0529.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0529", "sourceIdentifier": "security_alert@emc.com", "published": "2015-04-05T01:59:00.070", - "lastModified": "2016-08-23T18:00:22.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:15.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/131250/EMC-PowerPath-Virtual-Appliance-Undocumented-User-Accounts.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/bugtraq/2015/Apr/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0530.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0530.json index dc585a7f2cd..e31634f2de3 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0530.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0530.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0530", "sourceIdentifier": "security_alert@emc.com", "published": "2015-04-17T01:59:24.543", - "lastModified": "2017-01-03T02:59:40.817", + "lastModified": "2024-11-21T02:23:15.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -235,6 +234,14 @@ { "url": "http://www.securitytracker.com/id/1032147", "source": "security_alert@emc.com" + }, + { + "url": "http://seclists.org/bugtraq/2015/Apr/103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032147", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0531.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0531.json index 31e28b7e3f3..e01fc2c5d45 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0531.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0531.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0531", "sourceIdentifier": "security_alert@emc.com", "published": "2015-05-07T01:59:00.090", - "lastModified": "2016-04-01T01:04:33.933", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:15.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ { "url": "http://www.securitytracker.com/id/1032238", "source": "security_alert@emc.com" + }, + { + "url": "http://packetstormsecurity.com/files/131748/EMC-SourceOne-Email-Management-Account-Lockout-Policy.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2015/May/22", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032238", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0532.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0532.json index b022effb66a..a908513b7aa 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0532.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0532.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0532", "sourceIdentifier": "security_alert@emc.com", "published": "2015-05-01T10:59:00.073", - "lastModified": "2016-04-01T01:05:07.263", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:15.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,18 @@ { "url": "http://www.securitytracker.com/id/1032218", "source": "security_alert@emc.com" + }, + { + "url": "http://packetstormsecurity.com/files/131710/RSA-IMG-6.9-6.9.1-Insecure-Password-Reset.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2015/Apr/204", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032218", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0538.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0538.json index a9e1b76151f..e667c6600bf 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0538.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0538.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0538", "sourceIdentifier": "security_alert@emc.com", "published": "2015-05-07T01:59:01.247", - "lastModified": "2016-04-01T12:47:21.953", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:16.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,26 @@ { "url": "http://www.securitytracker.com/id/1032237", "source": "security_alert@emc.com" + }, + { + "url": "http://packetstormsecurity.com/files/131749/EMC-AutoStart-5.4.3-5.5.0-Packet-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2015/May/25", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/581276", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032237", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0540.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0540.json index cf039f59bd9..3cc76ec97a5 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0540.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0540.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0540", "sourceIdentifier": "security_alert@emc.com", "published": "2015-05-25T19:59:00.063", - "lastModified": "2015-05-27T13:50:45.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:16.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,10 @@ { "url": "http://seclists.org/bugtraq/2015/May/98", "source": "security_alert@emc.com" + }, + { + "url": "http://seclists.org/bugtraq/2015/May/98", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0552.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0552.json index 9b13f2feecd..26c804d3373 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0552.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0552.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0552", "sourceIdentifier": "security@debian.org", "published": "2015-01-15T15:59:26.623", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:17.683", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -114,6 +113,29 @@ { "url": "https://bugzilla.gnome.org/show_bug.cgi?id=742331", "source": "security@debian.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/05/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774580", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=742331", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0553.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0553.json index 221de087dc1..a5dd61d270b 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0553.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0553.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0553", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T15:28:33.917", - "lastModified": "2015-01-22T21:00:58.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:17.793", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,48 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130008/CMS-Websitebaker-2.8.3-SP3-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/70", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-03.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-03_4.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72104", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://twitter.com/sroesemann/status/555397239229911040", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0554.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0554.json index 5369580d864..037bafbacda 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0554.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0554.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0554", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T18:59:50.917", - "lastModified": "2015-01-23T20:43:03.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:18.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:C", + "baseScore": 9.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129828/Pirelli-ADSL2-2-Wireless-Router-P.DGA4001N-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0555.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0555.json index e2f996555f7..3f030a93e9f 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0555.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0555.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0555", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T15:59:04.660", - "lastModified": "2016-04-01T01:05:18.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:18.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131421/Samsung-iPOLiS-1.12.2-ReadConfigValue-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/81", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0556.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0556.json index 718d2d81d01..8fe542433c8 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0556.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0556.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0556", "sourceIdentifier": "security@debian.org", "published": "2015-04-08T18:59:03.797", - "lastModified": "2017-07-01T01:29:12.983", + "lastModified": "2024-11-21T02:23:18.320", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -146,6 +145,55 @@ { "url": "https://security.gentoo.org/glsa/201612-15", "source": "security@debian.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3213", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:201", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/05/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71860", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774434", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-15", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0557.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0557.json index 31265cf5cae..6ccfe51eec6 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0557.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0557.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0557", "sourceIdentifier": "security@debian.org", "published": "2015-04-08T18:59:04.890", - "lastModified": "2017-07-01T01:29:13.047", + "lastModified": "2024-11-21T02:23:18.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -140,6 +139,49 @@ { "url": "https://security.gentoo.org/glsa/201612-15", "source": "security@debian.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3213", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:201", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/03/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/05/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-15", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0559.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0559.json index b2fd2bcb3f4..e9b1b259802 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0559.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0559.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0559", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-10T02:59:38.023", - "lastModified": "2023-11-07T02:23:27.630", + "lastModified": "2024-11-21T02:23:18.703", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -185,6 +183,30 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e843c6797db98bfceab382d5d7e76727e1014f5e", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10720", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e843c6797db98bfceab382d5d7e76727e1014f5e", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0560.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0560.json index 7202e19d9c4..23dbe3438d7 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0560.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0560.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0560", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-10T02:59:38.990", - "lastModified": "2023-11-07T02:23:27.697", + "lastModified": "2024-11-21T02:23:18.847", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -184,6 +183,29 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a442a1c0e815fd61416cf408bd74d85a042ccc6a", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10806", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a442a1c0e815fd61416cf408bd74d85a042ccc6a", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0561.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0561.json index b8f85c34471..a08567177d4 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0561.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0561.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0561", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-10T02:59:39.913", - "lastModified": "2023-11-07T02:23:27.753", + "lastModified": "2024-11-21T02:23:18.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -215,6 +214,45 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8e96830156bea314207b97315ccebd605317f142", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62612", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-02.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10773", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8e96830156bea314207b97315ccebd605317f142", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0562.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0562.json index 7ec2cb73a9f..e4431e3aa77 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0562.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0562.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0562", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-10T02:59:40.757", - "lastModified": "2023-11-07T02:23:27.820", + "lastModified": "2024-11-21T02:23:19.150", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -197,6 +195,62 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a559f2a050947f793c00159c0cd4d30f403f217c", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62673", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3141", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:022", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71921", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-03.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a559f2a050947f793c00159c0cd4d30f403f217c", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0563.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0563.json index 60f134d4135..00b915a155e 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0563.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0563.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0563", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-10T02:59:41.553", - "lastModified": "2023-11-07T02:23:27.883", + "lastModified": "2024-11-21T02:23:19.313", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -208,6 +207,53 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=854157883bd1972e012c65c0418a9732ef5d9fb0", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:022", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10823", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=611cfd00c283e7a77a2f1fd89c01b0b9f691411b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=854157883bd1972e012c65c0418a9732ef5d9fb0", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0564.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0564.json index 1d1106aaf43..bb922ba0cf4 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0564.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0564.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0564", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-10T02:59:42.397", - "lastModified": "2023-11-07T02:23:27.957", + "lastModified": "2024-11-21T02:23:19.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -273,6 +272,78 @@ { "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d3581aecda62d2a51ea7088fd46975415b03ec57", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62612", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://secunia.com/advisories/62673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3141", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:022", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d3581aecda62d2a51ea7088fd46975415b03ec57", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0577.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0577.json index 9a87d92f3e9..3ac3baad659 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0577.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0577.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0577", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-14T19:59:01.600", - "lastModified": "2017-09-08T01:29:44.873", + "lastModified": "2024-11-21T02:23:21.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62289", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031544", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100556", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0578.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0578.json index 61c5c58ec92..826f342ab3e 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0578.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0578.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0578", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-14T19:59:02.740", - "lastModified": "2023-08-11T18:54:47.730", + "lastModified": "2024-11-21T02:23:21.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 5.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -109,6 +108,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72718", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031542", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100549", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=37022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0579.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0579.json index 061fb69d7b4..370967aba01 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0579.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0579.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0579", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-14T19:59:03.633", - "lastModified": "2017-01-06T17:41:19.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:21.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -106,6 +105,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=37007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0580.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0580.json index 6c5ddd956c6..70ebf4b3e9f 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0580.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0580.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0580", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-12T01:59:21.593", - "lastModified": "2017-09-08T01:29:44.997", + "lastModified": "2024-11-21T02:23:21.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -91,6 +90,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100812", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150211-csacs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031740", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100812", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0581.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0581.json index fbd9e014d09..d411c5b33f1 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0581.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0581.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0581", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-28T22:59:02.937", - "lastModified": "2015-09-17T16:32:49.990", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", + "lastModified": "2024-11-21T02:23:21.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -88,6 +86,22 @@ { "url": "http://www.securitytracker.com/id/1031658", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-psc-xmlee", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72350", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031658", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0582.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0582.json index d05bb1f91da..5ce19bddbc5 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0582.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0582.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0582", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-10T02:59:43.367", - "lastModified": "2017-09-08T01:29:45.060", + "lastModified": "2024-11-21T02:23:21.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99995", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0582", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031539", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99995", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0583.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0583.json index a792a46b035..2e1b3527c19 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0583.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0583.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0583", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-14T19:59:04.867", - "lastModified": "2017-09-08T01:29:45.123", + "lastModified": "2024-11-21T02:23:21.670", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100565", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0583", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100565", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0584.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0584.json index cde9a92dc4c..903cabc9c16 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0584.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0584.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0584", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-20T02:59:00.067", - "lastModified": "2015-11-27T19:17:57.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:21.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/72696", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0584", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72696", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0586.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0586.json index 626e69faa04..ed27e9729c4 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0586.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0586.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0586", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-28T22:59:04.153", - "lastModified": "2017-09-08T01:29:45.183", + "lastModified": "2024-11-21T02:23:21.873", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -118,6 +117,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100660", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0586", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37171", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100660", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0588.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0588.json index f3e49cd013a..57c2d94d95a 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0588.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0588.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0588", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-15T22:59:05.460", - "lastModified": "2017-09-08T01:29:45.247", + "lastModified": "2024-11-21T02:23:21.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100657", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62352", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0588", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031559", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100657", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0589.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0589.json index 678694730cf..92ae555ce89 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0589.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0589.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0589", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-07T15:59:06.143", - "lastModified": "2017-09-08T01:29:45.293", + "lastModified": "2024-11-21T02:23:22.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -104,6 +103,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100719", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150204-wbx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72493", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031692", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100719", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0590.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0590.json index 894b5c01dc6..3ed14a4b23b 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0590.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0590.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0590", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-17T11:59:05.030", - "lastModified": "2017-09-08T01:29:45.357", + "lastModified": "2024-11-21T02:23:22.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100576", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0590", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031558", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100576", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0591.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0591.json index a1a68e78b1b..48b71e23e1c 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0591.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0591.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0591", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-01-15T22:59:06.507", - "lastModified": "2017-09-08T01:29:45.403", + "lastModified": "2024-11-21T02:23:22.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100661", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0591", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100661", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0592.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0592.json index 401e3b16d94..4a689e5a377 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0592.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0592.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0592", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-12T01:59:22.717", - "lastModified": "2017-09-08T01:29:45.450", + "lastModified": "2024-11-21T02:23:22.417", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -139,6 +138,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100758", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0592", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37416", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031713", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100758", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0593.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0593.json index c1898eb9012..2e3b3d0ad0e 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0593.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0593.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0593", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-13T02:59:09.063", - "lastModified": "2017-09-08T01:29:45.513", + "lastModified": "2024-11-21T02:23:22.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -98,6 +97,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100757", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0593", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72549", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100757", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0594.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0594.json index 797228ffeda..820b12889fc 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0594.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0594.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0594", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-27T02:59:32.353", - "lastModified": "2015-11-02T18:31:56.057", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:22.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,25 @@ { "url": "http://www.securitytracker.com/id/1031814", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0594", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72793", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031813", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031814", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0595.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0595.json index 00e258d5d85..1c1c5c16ae8 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0595.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0595.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0595", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-02T01:59:06.670", - "lastModified": "2017-09-08T01:29:45.577", + "lastModified": "2024-11-21T02:23:22.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100667", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62686", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0595", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72370", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031676", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100667", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0596.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0596.json index 1e1512de9e8..2ca9d3327ff 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0596.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0596.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0596", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-02T01:59:07.890", - "lastModified": "2017-09-08T01:29:45.637", + "lastModified": "2024-11-21T02:23:22.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +109,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100665", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/61797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0596", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37239", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72371", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031677", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100665", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0597.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0597.json index 65b52dcc48f..9afe65c2725 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0597.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0597.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0597", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-02T01:59:08.950", - "lastModified": "2017-09-08T01:29:45.700", + "lastModified": "2024-11-21T02:23:22.947", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100658", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0597", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37240", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72373", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031678", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100658", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0598.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0598.json index 3fca6b25d39..867921a2110 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0598.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0598.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0598", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-06T03:00:11.673", - "lastModified": "2015-11-02T18:32:13.800", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per this link, authentication is required.", + "lastModified": "2024-11-21T02:23:23.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -88,6 +86,18 @@ { "url": "http://www.securitytracker.com/id/1031842", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0598", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031842", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per this link, authentication is required." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-05xx/CVE-2015-0599.json b/CVE-2015/CVE-2015-05xx/CVE-2015-0599.json index 7161f725f54..93e425e3d00 100644 --- a/CVE-2015/CVE-2015-05xx/CVE-2015-0599.json +++ b/CVE-2015/CVE-2015-05xx/CVE-2015-0599.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0599", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-03T22:59:02.317", - "lastModified": "2017-09-08T01:29:45.747", + "lastModified": "2024-11-21T02:23:23.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100614", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62762", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0599", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37324", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72509", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100614", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0600.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0600.json index 2f5f68e1ad4..0ba86dbd157 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0600.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0600.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0600", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-07T15:59:07.237", - "lastModified": "2017-09-08T01:29:45.810", + "lastModified": "2024-11-21T02:23:23.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -111,6 +110,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100726", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37341", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100726", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0601.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0601.json index 51b89af6641..15a1012cfbd 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0601.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0601.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0601", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-07T04:59:05.047", - "lastModified": "2017-09-08T01:29:45.887", + "lastModified": "2024-11-21T02:23:23.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -134,6 +133,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100617", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37344", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72483", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100617", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0602.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0602.json index b79c0d0ee46..b24f72193b2 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0602.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0602.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0602", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-07T15:59:08.207", - "lastModified": "2017-09-08T01:29:45.933", + "lastModified": "2024-11-21T02:23:23.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -111,6 +110,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100615", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0602", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37342", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72482", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100615", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0603.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0603.json index a83625d8f1c..61342802093 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0603.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0603.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0603", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-07T04:59:06.467", - "lastModified": "2017-09-08T01:29:45.997", + "lastModified": "2024-11-21T02:23:23.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -111,6 +110,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100619", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0603", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37345", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100619", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0604.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0604.json index 5cd0f1f2632..3a8f8fe0116 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0604.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0604.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0604", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-07T04:59:07.797", - "lastModified": "2017-09-08T01:29:46.043", + "lastModified": "2024-11-21T02:23:23.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -136,6 +135,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100620", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62761", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37346", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100620", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0605.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0605.json index a8abdef880c..cf02c17a83f 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0605.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0605.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0605", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-07T04:59:09.000", - "lastModified": "2018-10-30T16:27:22.513", + "lastModified": "2024-11-21T02:23:23.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +109,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/62829", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0605", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37384", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100695", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0606.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0606.json index ad4b661dd92..5969c6e96a2 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0606.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0606.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0606", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-12T01:59:23.703", - "lastModified": "2017-09-08T01:29:46.170", + "lastModified": "2024-11-21T02:23:23.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100810", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0606", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031717", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100810", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0607.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0607.json index 7c46d46f11e..d92b39b35c0 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0607.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0607.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0607", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-06T03:00:13.470", - "lastModified": "2015-03-06T16:17:32.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:24.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -143,6 +142,28 @@ { "url": "http://www.securitytracker.com/id/1031817", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0607", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37711", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031817", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0608.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0608.json index 253980c3244..4d0271594a9 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0608.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0608.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0608", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-12T01:59:25.047", - "lastModified": "2017-09-08T01:29:46.230", + "lastModified": "2024-11-21T02:23:24.163", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -143,6 +142,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100808", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0608", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37421", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72566", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031731", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100808", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0609.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0609.json index 3c1cf3d4c33..7402f9a8b50 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0609.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0609.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0609", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-16T00:59:05.010", - "lastModified": "2017-09-08T01:29:46.277", + "lastModified": "2024-11-21T02:23:24.277", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -143,6 +142,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100809", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0609", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37420", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72564", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031731", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100809", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0610.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0610.json index 5fc71c57e81..c74b97c6f42 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0610.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0610.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0610", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-12T01:59:26.233", - "lastModified": "2017-09-08T01:29:46.340", + "lastModified": "2024-11-21T02:23:24.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100807", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0610", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031732", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100807", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0611.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0611.json index 868f89886cb..a9b30ef2c86 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0611.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0611.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0611", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-12T01:59:27.187", - "lastModified": "2017-09-08T01:29:46.387", + "lastModified": "2024-11-21T02:23:24.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -119,6 +118,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100806", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0611", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37430", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72568", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031733", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100806", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0612.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0612.json index 5b0764ca1c3..37f406cf8de 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0612.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0612.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0612", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T18:59:00.067", - "lastModified": "2015-09-29T19:32:57.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:24.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -167,6 +166,17 @@ { "url": "http://www.securitytracker.com/id/1032010", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032010", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0613.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0613.json index be834709c78..8649cd137fa 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0613.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0613.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0613", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T18:59:01.490", - "lastModified": "2015-09-29T19:32:43.423", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:24.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -182,6 +181,17 @@ { "url": "http://www.securitytracker.com/id/1032010", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032010", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0614.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0614.json index f163d749d02..c9a0750daaf 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0614.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0614.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0614", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T18:59:02.693", - "lastModified": "2015-09-29T19:32:18.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:24.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -182,6 +181,17 @@ { "url": "http://www.securitytracker.com/id/1032010", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032010", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0615.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0615.json index 632a7b53026..90dc42a6370 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0615.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0615.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0615", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T18:59:03.787", - "lastModified": "2015-09-29T19:31:47.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:24.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -182,6 +181,17 @@ { "url": "http://www.securitytracker.com/id/1032010", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032010", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0616.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0616.json index 4c547fd31d1..0ea9dce27ed 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0616.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0616.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0616", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T18:59:04.757", - "lastModified": "2015-09-29T19:31:33.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:25.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -172,6 +171,17 @@ { "url": "http://www.securitytracker.com/id/1032010", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032010", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0617.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0617.json index 7d74a4227e4..0beae63de5b 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0617.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0617.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0617", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-18T02:59:02.470", - "lastModified": "2017-09-08T01:29:46.450", + "lastModified": "2024-11-21T02:23:25.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100923", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031754", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100923", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0618.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0618.json index 5e7e000fdc7..62fcfae25ac 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0618.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0618.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0618", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-21T11:59:01.327", - "lastModified": "2015-11-27T19:18:36.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:25.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -123,6 +122,21 @@ { "url": "http://www.securitytracker.com/id/1031778", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72713", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031778", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0619.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0619.json index bdacb25c5b4..efec7316c12 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0619.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0619.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0619", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-12T01:59:38.500", - "lastModified": "2023-08-11T18:54:47.730", + "lastModified": "2024-11-21T02:23:25.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100864", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0619", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031745", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100864", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0620.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0620.json index 4daba27939a..afdf1288c9d 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0620.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0620.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0620", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-18T02:59:03.860", - "lastModified": "2017-09-08T01:29:46.543", + "lastModified": "2024-11-21T02:23:25.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -104,6 +103,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100924", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0620", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37491", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031753", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100924", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0621.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0621.json index 0852139ab22..9593a9adb8e 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0621.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0621.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0621", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-18T02:59:04.737", - "lastModified": "2017-09-08T01:29:46.607", + "lastModified": "2024-11-21T02:23:25.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100936", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0621", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37495", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100936", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0622.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0622.json index b130567ad4c..68a563c36d8 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0622.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0622.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0622", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-19T00:59:00.070", - "lastModified": "2015-02-19T19:32:14.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:25.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0622", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0623.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0623.json index 18f9fe2a864..56027e419b2 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0623.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0623.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0623", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-19T00:59:01.227", - "lastModified": "2015-02-19T20:00:14.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:25.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0623", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0624.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0624.json index 7b9e0dffb0e..f132edf1d55 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0624.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0624.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0624", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-21T11:59:02.920", - "lastModified": "2018-10-30T16:27:22.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:25.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,32 @@ { "url": "http://www.securitytracker.com/id/1031782", "source": "ykramarz@cisco.com" + }, + { + "url": "http://packetstormsecurity.com/files/130525/Cisco-Ironport-AsyncOS-HTTP-Header-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0624", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72702", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031782", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0626.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0626.json index bd4214e7250..47da6e65fb5 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0626.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0626.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0626", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-19T00:59:02.273", - "lastModified": "2015-02-19T19:59:55.080", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:25.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0626", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0628.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0628.json index 6d47b6b9c05..4b5fd6b9144 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0628.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0628.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0628", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-20T02:59:01.723", - "lastModified": "2015-02-20T18:37:13.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:26.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0628", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0631.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0631.json index a392ac2d8e9..e0afdebfcb1 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0631.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0631.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0631", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-21T11:59:04.027", - "lastModified": "2015-03-04T17:14:15.987", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:26.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -153,6 +152,21 @@ { "url": "http://www.securitytracker.com/id/1031780", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0631", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72700", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031780", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0632.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0632.json index 42c5cc7a9da..46e804fd877 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0632.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0632.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0632", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-27T02:59:33.247", - "lastModified": "2015-11-02T18:30:21.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:26.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 5.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -91,6 +90,21 @@ { "url": "http://www.securitytracker.com/id/1031816", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0632", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031816", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0633.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0633.json index c5b6ab4692c..23cf51748fd 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0633.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0633.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0633", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-26T01:59:00.063", - "lastModified": "2019-04-15T12:30:08.180", + "lastModified": "2024-11-21T02:23:26.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", + "baseScore": 6.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -304,6 +303,32 @@ { "url": "http://www.securitytracker.com/id/1031796", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0633", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37575", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72760", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/85711", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031796", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0634.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0634.json index a3d176f9e45..03398ee43f7 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0634.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0634.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0634", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-15T01:59:01.957", - "lastModified": "2017-01-06T17:20:36.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:26.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,29 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38811", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74647", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0635.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0635.json index f05c7d59e9f..2feba9713db 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0635.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0635.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0635", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:00.067", - "lastModified": "2015-10-01T17:13:36.103", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:26.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -302,6 +301,17 @@ { "url": "http://www.securitytracker.com/id/1031982", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031982", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0636.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0636.json index f53bc594af3..e37ee26d8b2 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0636.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0636.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0636", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:02.473", - "lastModified": "2015-10-01T17:13:51.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:26.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -232,6 +231,17 @@ { "url": "http://www.securitytracker.com/id/1031982", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031982", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0637.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0637.json index 91dd75856b0..ca2c8380ddd 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0637.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0637.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0637", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:03.427", - "lastModified": "2015-10-01T17:14:04.900", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:26.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -292,6 +291,17 @@ { "url": "http://www.securitytracker.com/id/1031982", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ani", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031982", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0638.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0638.json index 735ba94de51..187d7d62567 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0638.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0638.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0638", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:04.443", - "lastModified": "2015-09-04T18:50:50.547", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:26.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -232,6 +231,17 @@ { "url": "http://www.securitytracker.com/id/1031983", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-wedge", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031983", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0639.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0639.json index a3ce1c5aeb9..f95290ab209 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0639.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0639.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0639", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:05.410", - "lastModified": "2015-09-04T18:51:05.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:27.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -132,6 +131,17 @@ { "url": "http://www.securitytracker.com/id/1031981", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031981", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0640.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0640.json index af40fc97cb0..2ffe8049b33 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0640.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0640.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0640", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:06.270", - "lastModified": "2015-09-04T18:51:13.420", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:27.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -317,6 +316,17 @@ { "url": "http://www.securitytracker.com/id/1031981", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031981", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0641.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0641.json index 0cf2bb5de99..26ae1ba8a12 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0641.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0641.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0641", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:07.020", - "lastModified": "2015-09-04T18:51:27.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:27.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -287,6 +286,17 @@ { "url": "http://www.securitytracker.com/id/1031981", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031981", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0642.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0642.json index 3009c79d2f8..068a18222a3 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0642.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0642.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0642", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:07.927", - "lastModified": "2017-05-12T01:29:00.217", + "lastModified": "2024-11-21T02:23:27.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -518,6 +517,28 @@ { "url": "http://www.securitytracker.com/id/1031978", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ikev2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37816", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73333", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031978", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0643.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0643.json index caf02ba23d1..0e502e6bf94 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0643.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0643.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0643", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:08.847", - "lastModified": "2017-05-12T01:29:00.293", + "lastModified": "2024-11-21T02:23:27.583", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -413,6 +412,28 @@ { "url": "http://www.securitytracker.com/id/1031978", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-ikev2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37815", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73333", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031978", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0644.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0644.json index 6276471d1f5..d22a3763ece 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0644.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0644.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0644", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:09.847", - "lastModified": "2015-09-04T18:55:13.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:27.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -152,6 +151,17 @@ { "url": "http://www.securitytracker.com/id/1031981", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031981", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0645.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0645.json index 116a828cf80..002ee9087ec 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0645.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0645.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0645", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:10.753", - "lastModified": "2015-09-04T18:57:06.397", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:27.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -277,6 +276,17 @@ { "url": "http://www.securitytracker.com/id/1031981", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-iosxe", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031981", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0646.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0646.json index 4076c0b3cbd..a0e410d742d 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0646.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0646.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0646", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:11.613", - "lastModified": "2017-05-12T01:29:00.357", + "lastModified": "2024-11-21T02:23:27.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -271,6 +270,21 @@ { "url": "http://www.securitytracker.com/id/1031980", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-tcpleak", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73340", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031980", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0647.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0647.json index 57730e4fa54..a466f21f48a 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0647.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0647.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0647", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:12.473", - "lastModified": "2015-03-26T18:26:26.130", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:28.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -368,6 +367,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0648.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0648.json index e67f4cfaca5..34916870489 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0648.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0648.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0648", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:13.270", - "lastModified": "2015-03-26T17:52:58.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:28.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -378,6 +377,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0649.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0649.json index 169172416f2..492415bd162 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0649.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0649.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0649", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:14.037", - "lastModified": "2015-03-27T07:33:16.003", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:28.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -298,6 +297,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-cip", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0650.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0650.json index fc2f590941f..03ff325cc07 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0650.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0650.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0650", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:14.990", - "lastModified": "2015-09-04T18:57:35.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:28.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -202,6 +201,17 @@ { "url": "http://www.securitytracker.com/id/1031979", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150325-mdns", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031979", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0651.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0651.json index 68a06491d4a..b86f6b1e790 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0651.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0651.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0651", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-27T02:59:34.167", - "lastModified": "2015-11-02T18:29:56.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:28.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "http://www.securitytracker.com/id/1031815", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72796", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031815", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0652.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0652.json index bd6be5d4caa..6019aa3ff1c 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0652.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0652.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0652", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-13T01:59:31.523", - "lastModified": "2015-09-11T15:45:22.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:28.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,17 @@ { "url": "http://www.securitytracker.com/id/1031910", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-vcs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031910", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0653.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0653.json index 0e9c188dd5c..0a07c4bfc99 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0653.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0653.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0653", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-13T01:59:32.427", - "lastModified": "2019-06-11T19:03:00.210", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:28.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -137,6 +136,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-vcs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0654.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0654.json index 5fac1728d37..32ceee30630 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0654.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0654.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0654", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-13T01:59:33.240", - "lastModified": "2015-09-11T15:50:15.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:28.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,17 @@ { "url": "http://www.securitytracker.com/id/1031908", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150311-ips", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031908", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0655.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0655.json index 8aa1427af8c..fe37ce8e172 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0655.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0655.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0655", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-02-28T02:59:11.830", - "lastModified": "2015-11-02T18:29:41.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:28.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "http://www.securitytracker.com/id/1031820", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0655", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031820", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0656.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0656.json index 0ebebfa4fc5..0acc56b5130 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0656.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0656.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0656", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-04T02:59:00.053", - "lastModified": "2015-11-02T18:29:23.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:29.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,17 @@ { "url": "http://www.securitytracker.com/id/1031827", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0656", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031827", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0657.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0657.json index fca5cc5077c..4a8f7c9b1d1 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0657.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0657.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0657", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-06T03:00:14.377", - "lastModified": "2015-11-02T18:29:11.927", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:29.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031841", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031841", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0658.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0658.json index 47235dea905..566c521ad70 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0658.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0658.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0658", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-28T01:59:49.210", - "lastModified": "2015-10-22T14:37:19.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:29.213", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 7.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 5.5, @@ -722,6 +721,17 @@ { "url": "http://www.securitytracker.com/id/1031992", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38062", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031992", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0659.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0659.json index be677a3c6cf..05caa64e7d4 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0659.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0659.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0659", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-06T03:00:15.237", - "lastModified": "2015-11-02T18:28:57.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:29.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031845", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031845", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0660.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0660.json index cf240ecb6ef..e3741a563c7 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0660.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0660.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0660", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-14T01:59:09.033", - "lastModified": "2015-10-28T02:17:57.233", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:29.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031924", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0660", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031924", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0661.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0661.json index 7f077553ad7..1a765bf0ff5 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0661.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0661.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0661", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-06T03:00:16.110", - "lastModified": "2015-11-02T18:28:12.293", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:29.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031843", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031843", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0662.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0662.json index df48088558a..413e150d86b 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0662.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0662.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0662", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-17T02:01:47.693", - "lastModified": "2015-10-28T02:17:33.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:29.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -83,6 +82,17 @@ { "url": "http://www.securitytracker.com/id/1031933", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37860", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031933", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0663.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0663.json index cb35a848920..aaf49e4b4c9 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0663.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0663.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0663", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-17T02:01:49.007", - "lastModified": "2015-10-28T02:17:01.397", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:29.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", + "baseScore": 6.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -83,6 +82,17 @@ { "url": "http://www.securitytracker.com/id/1031930", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37863", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031930", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0664.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0664.json index e26e2fb49be..22c882a63c8 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0664.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0664.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0664", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-18T23:59:00.067", - "lastModified": "2015-09-10T16:05:39.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:29.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -83,6 +82,17 @@ { "url": "http://www.securitytracker.com/id/1031932", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37861", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031932", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0665.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0665.json index b5574c3e896..83d6334820a 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0665.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0665.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0665", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-17T02:01:49.867", - "lastModified": "2015-10-28T02:16:45.083", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:29.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", + "baseScore": 6.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -83,6 +82,17 @@ { "url": "http://www.securitytracker.com/id/1031931", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37862", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031931", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0666.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0666.json index d755faefbdc..046769c5e62 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0666.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0666.json @@ -2,13 +2,8 @@ "id": "CVE-2015-0666", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T10:59:04.290", - "lastModified": "2015-09-29T19:31:23.037", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-25", - "cisaActionDue": "2022-04-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Cisco Prime Data Center Network Manager (DCNM) Directory Traversal Vulnerability", + "lastModified": "2024-11-21T02:23:30.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -46,6 +41,10 @@ } ] }, + "cisaExploitAdd": "2022-03-25", + "cisaActionDue": "2022-04-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Cisco Prime Data Center Network Manager (DCNM) Directory Traversal Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -102,6 +101,17 @@ { "url": "http://www.securitytracker.com/id/1032009", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-dcnm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032009", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0667.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0667.json index 4a845cc66fd..d1261256d43 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0667.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0667.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0667", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-18T23:59:01.330", - "lastModified": "2015-09-10T16:06:04.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:30.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,17 @@ { "url": "http://www.securitytracker.com/id/1031939", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031939", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0668.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0668.json index e49c4b85e0f..d33bff4a988 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0668.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0668.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0668", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-20T01:59:00.063", - "lastModified": "2015-10-01T17:15:16.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:30.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1031968", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37934", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031968", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0669.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0669.json index 1f672911719..2e62fa519fa 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0669.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0669.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0669", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-21T01:59:00.090", - "lastModified": "2015-10-01T17:15:35.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:30.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1031967", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37935", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031967", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0670.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0670.json index ecc2700e007..4c386508e68 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0670.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0670.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0670", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-21T01:59:01.560", - "lastModified": "2015-10-22T14:40:06.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:30.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -176,6 +175,17 @@ { "url": "http://www.securitytracker.com/id/1031969", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37946", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031969", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0671.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0671.json index 3fc148e11c1..13d62bc2300 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0671.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0671.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0671", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-20T01:59:01.687", - "lastModified": "2015-03-20T14:46:31.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:30.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=37947", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0672.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0672.json index 2640d6807c5..e2b25b28d04 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0672.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0672.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0672", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:15.740", - "lastModified": "2015-09-04T18:58:02.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:30.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,17 @@ { "url": "http://www.securitytracker.com/id/1031970", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38006", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031970", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0673.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0673.json index 4e40478bd61..df75d2410c0 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0673.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0673.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0673", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-26T10:59:16.503", - "lastModified": "2015-09-04T18:58:56.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:30.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031971", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031971", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0675.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0675.json index af599709d1b..4e31d2fd207 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0675.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0675.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0675", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-13T01:59:00.063", - "lastModified": "2022-05-26T15:11:51.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:30.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -192,6 +191,17 @@ { "url": "http://www.securitytracker.com/id/1032045", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032045", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0676.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0676.json index 174043156dc..2e822b48c9f 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0676.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0676.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0676", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-13T01:59:01.953", - "lastModified": "2023-08-15T14:52:02.310", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:31.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -1282,6 +1281,17 @@ { "url": "http://www.securitytracker.com/id/1032045", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032045", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0677.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0677.json index e3036d03bcf..90e579be9c4 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0677.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0677.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0677", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-13T01:59:03.033", - "lastModified": "2023-08-15T14:52:02.310", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:31.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -427,6 +426,17 @@ { "url": "http://www.securitytracker.com/id/1032045", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032045", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0678.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0678.json index 8adce0612a1..b08a8596285 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0678.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0678.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0678", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-11T01:59:00.087", - "lastModified": "2015-10-01T17:16:20.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:31.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -192,6 +191,17 @@ { "url": "http://www.securitytracker.com/id/1032046", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-cxfp", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032046", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0679.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0679.json index f82ef39ba1e..7218c77abda 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0679.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0679.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0679", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-28T01:59:53.083", - "lastModified": "2021-04-15T18:54:58.583", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:31.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1031990", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38076", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031990", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0680.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0680.json index 32d5aaded64..2bd7d4db66a 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0680.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0680.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0680", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-03-28T01:59:53.833", - "lastModified": "2015-11-30T19:48:02.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:31.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1031991", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031991", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0682.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0682.json index 5891e64e62c..b2f6778c517 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0682.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0682.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0682", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T10:59:06.337", - "lastModified": "2015-10-28T02:16:33.223", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:31.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032002", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032002", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0683.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0683.json index 602a9741c71..3c48bb79147 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0683.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0683.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0683", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T10:59:07.227", - "lastModified": "2015-09-29T19:31:06.410", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:31.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032003", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38118", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032003", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0684.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0684.json index a8a798f6f2d..f1d2c499c23 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0684.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0684.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0684", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T10:59:07.960", - "lastModified": "2015-09-29T19:30:54.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:32.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032001", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38114", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032001", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0685.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0685.json index 120ebec5202..7fe7dbcbef3 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0685.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0685.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0685", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T02:00:24.317", - "lastModified": "2015-09-29T19:30:42.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:32.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "http://www.securitytracker.com/id/1032004", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032004", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0686.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0686.json index 33240db9fe4..ecdccbd84c4 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0686.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0686.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0686", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T02:00:25.097", - "lastModified": "2015-09-29T19:29:20.383", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:32.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C", + "baseScore": 6.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -124,6 +123,17 @@ { "url": "http://www.securitytracker.com/id/1032021", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032021", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0687.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0687.json index fb9c70626bb..cc6259e8f32 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0687.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0687.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0687", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-03T02:00:25.910", - "lastModified": "2015-09-29T19:28:03.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:32.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C", + "baseScore": 6.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -129,6 +128,17 @@ { "url": "http://www.securitytracker.com/id/1032022", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38194", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032022", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0688.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0688.json index 56a7e67fe80..6015971a01b 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0688.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0688.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0688", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-04T01:59:02.593", - "lastModified": "2015-09-29T19:27:50.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:32.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -124,6 +123,17 @@ { "url": "http://www.securitytracker.com/id/1032023", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032023", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0690.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0690.json index 8fd689618a7..9c5105c5ef0 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0690.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0690.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0690", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-07T02:00:21.297", - "lastModified": "2015-09-29T19:27:40.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:32.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,17 @@ { "url": "http://www.securitytracker.com/id/1032024", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38222", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032024", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0691.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0691.json index bf627bf2d41..c8f09c6b0a2 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0691.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0691.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0691", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-17T01:59:25.420", - "lastModified": "2017-01-06T16:05:14.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:32.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -49,11 +48,11 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-78" }, { "lang": "en", - "value": "CWE-78" + "value": "CWE-264" } ] } @@ -271,6 +270,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150415-csd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0692.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0692.json index 03627bd5b66..cebde31fca9 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0692.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0692.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0692", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-11T01:59:02.633", - "lastModified": "2017-01-06T17:20:39.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:32.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0693.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0693.json index aabd8f8f6ec..eec463a5686 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0693.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0693.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0693", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-15T10:59:01.393", - "lastModified": "2017-01-06T17:12:58.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:32.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38306", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0694.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0694.json index 00e8dfc9e5a..4e6fed44742 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0694.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0694.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0694", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-11T01:59:03.803", - "lastModified": "2015-09-29T19:27:29.840", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:33.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,17 @@ { "url": "http://www.securitytracker.com/id/1032059", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38292", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032059", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0695.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0695.json index 8dbd1473a9a..b6aa6ccdf99 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0695.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0695.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0695", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-17T01:59:26.263", - "lastModified": "2017-01-06T15:29:26.277", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:33.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -175,6 +174,29 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150415-iosxr", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74162", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032139", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0696.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0696.json index ffdbed796cb..5fcdc04d5cf 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0696.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0696.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0696", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-15T10:59:02.423", - "lastModified": "2017-01-06T17:09:37.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:33.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -151,6 +150,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38349", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0697.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0697.json index d2521131ec4..4e736e2c4e3 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0697.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0697.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0697", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-15T10:59:03.533", - "lastModified": "2017-01-06T16:32:24.160", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:33.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -156,6 +155,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38350", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0698.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0698.json index a52f4e7c781..e9337762228 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0698.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0698.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0698", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-15T10:59:04.580", - "lastModified": "2017-01-06T17:09:40.850", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:33.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38351", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032135", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-06xx/CVE-2015-0699.json b/CVE-2015/CVE-2015-06xx/CVE-2015-0699.json index efbb56f0d64..b1b81775591 100644 --- a/CVE-2015/CVE-2015-06xx/CVE-2015-0699.json +++ b/CVE-2015/CVE-2015-06xx/CVE-2015-0699.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0699", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-15T10:59:05.440", - "lastModified": "2017-01-06T16:31:52.810", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:33.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38366", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032134", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0700.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0700.json index d5ee9d56044..4ae9556626d 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0700.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0700.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0700", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-17T01:59:27.030", - "lastModified": "2017-01-06T16:06:04.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:33.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38403", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032163", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0701.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0701.json index 88dfd9e37cd..e7914de4e57 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0701.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0701.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0701", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-07T01:59:02.323", - "lastModified": "2016-11-28T19:17:01.440", + "lastModified": "2024-11-21T02:23:33.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -111,6 +110,21 @@ { "url": "http://www.securitytracker.com/id/1032267", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150506-ucsc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74491", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032267", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0702.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0702.json index 374bc427017..27bbc2aa946 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0702.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0702.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0702", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-21T02:59:00.997", - "lastModified": "2017-01-06T15:29:36.823", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:33.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -90,6 +89,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38455", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032165", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0703.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0703.json index df3af96f3de..d2f7f4f39dd 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0703.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0703.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0703", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-21T02:59:03.887", - "lastModified": "2017-01-06T15:52:16.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:34.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38459", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0704.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0704.json index f515839b467..483c1ed2551 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0704.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0704.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0704", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-22T01:59:00.083", - "lastModified": "2017-01-06T16:29:04.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:34.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38460", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032334", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0705.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0705.json index ec344407862..ace44e4983e 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0705.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0705.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0705", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-22T01:59:01.413", - "lastModified": "2017-01-06T15:30:25.660", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:34.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,36 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38461", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74258", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032335", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0706.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0706.json index 0eadea41790..013f3a9121e 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0706.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0706.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0706", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-23T02:00:16.257", - "lastModified": "2015-04-23T16:49:02.237", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:23:34.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +87,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38486", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0707.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0707.json index 4481619d3ba..76f3746af3b 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0707.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0707.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0707", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-23T02:00:17.193", - "lastModified": "2015-04-23T16:48:19.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:34.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -83,6 +82,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38487", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0708.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0708.json index b478ed0bb07..a8ad323217e 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0708.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0708.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0708", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-29T01:59:00.073", - "lastModified": "2015-09-10T16:03:37.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:34.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -137,6 +136,17 @@ { "url": "http://www.securitytracker.com/id/1032210", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38543", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032210", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0709.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0709.json index bb6ff01c675..343dfc91aa1 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0709.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0709.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0709", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-29T01:59:01.353", - "lastModified": "2015-09-10T16:04:03.620", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:34.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -102,6 +101,17 @@ { "url": "http://www.securitytracker.com/id/1032211", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38544", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032211", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0710.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0710.json index bde46963f78..43f3255d40c 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0710.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0710.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0710", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-29T01:59:02.247", - "lastModified": "2015-09-10T16:05:51.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:34.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032212", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38549", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032212", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0711.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0711.json index 53dee9cfc2b..b41af31e1ac 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0711.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0711.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0711", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-04-29T01:59:03.183", - "lastModified": "2015-09-10T16:07:19.700", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:34.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,17 @@ { "url": "http://www.securitytracker.com/id/1032213", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38557", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032213", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0712.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0712.json index 449878ab0c3..e93ef247ff4 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0712.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0712.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0712", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-01T10:59:01.153", - "lastModified": "2015-09-10T16:08:13.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:35.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,17 @@ { "url": "http://www.securitytracker.com/id/1032219", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38580", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032219", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0713.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0713.json index 62f2ed100f5..c0e1bc44e9f 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0713.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0713.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0713", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-25T00:59:01.357", - "lastModified": "2015-05-26T17:47:03.403", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:35.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -283,6 +282,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tp", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0714.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0714.json index b01bbf92886..4c82d7a7d05 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0714.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0714.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0714", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-02T14:59:00.103", - "lastModified": "2015-09-10T16:09:37.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:35.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,17 @@ { "url": "http://www.securitytracker.com/id/1032222", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38607", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032222", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0715.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0715.json index a99285f906e..069e77fa845 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0715.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0715.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0715", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-07T01:59:03.433", - "lastModified": "2015-09-10T16:09:57.660", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:35.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032260", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38674", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032260", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0716.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0716.json index 29506c73bc4..c105369d8e0 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0716.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0716.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0716", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-07T01:59:04.420", - "lastModified": "2015-09-10T16:10:12.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:35.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id/1032259", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38675", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032259", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0717.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0717.json index 6781fa5c0d9..39d2cac43bb 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0717.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0717.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0717", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-16T14:59:00.063", - "lastModified": "2017-01-06T16:28:59.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:35.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -90,6 +89,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032278", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0722.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0722.json index 564d59cb758..29a96802bcb 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0722.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0722.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0722", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-25T00:59:02.637", - "lastModified": "2015-05-26T17:40:56.050", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:36.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -373,6 +372,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150513-tc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0723.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0723.json index 1a36515fcfb..c1e8250407e 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0723.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0723.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0723", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-16T14:59:01.203", - "lastModified": "2017-01-06T16:05:02.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:36.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -96,6 +95,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38749", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032277", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0724.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0724.json index 9f2f3a52e96..a144337378d 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0724.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0724.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0724", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-15T01:59:03.173", - "lastModified": "2017-01-06T17:09:43.883", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:36.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032304", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0726.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0726.json index 8911a059e8f..35154b121b4 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0726.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0726.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0726", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-16T14:59:02.187", - "lastModified": "2021-04-16T17:27:07.230", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:36.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -149,6 +148,29 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38789", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032327", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0727.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0727.json index 8c6195a4735..6b0914f06f9 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0727.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0727.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0727", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-15T01:59:04.127", - "lastModified": "2017-01-06T15:30:58.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:36.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38788", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032326", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0728.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0728.json index 297fa48e8ad..11bf066fefc 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0728.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0728.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0728", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-15T01:59:05.283", - "lastModified": "2017-01-06T17:12:05.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:36.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38808", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032328", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0729.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0729.json index 5271b81c819..74e73510262 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0729.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0729.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0729", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-16T14:59:03.093", - "lastModified": "2017-01-06T17:13:57.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:36.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38864", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032338", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0730.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0730.json index 7e30b03e0ca..b095563b963 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0730.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0730.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0730", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-16T14:59:03.953", - "lastModified": "2017-01-06T15:30:55.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:36.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032339", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0731.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0731.json index 1eb8c837eff..4ab60e972ce 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0731.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0731.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0731", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-16T02:01:44.637", - "lastModified": "2017-01-06T17:13:11.330", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:37.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -91,6 +90,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0734.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0734.json index 31776884bf4..4c4d82e4264 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0734.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0734.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0734", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-15T01:59:06.143", - "lastModified": "2018-10-30T16:27:22.403", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:37.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38866", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032333", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0735.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0735.json index c91db3aa566..b2fb20c9abb 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0735.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0735.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0735", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-17T01:59:01.237", - "lastModified": "2017-01-06T15:31:08.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:37.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38868", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032340", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0736.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0736.json index 925d2bc14ee..e78b3dcebf1 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0736.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0736.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0736", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-16T02:01:45.667", - "lastModified": "2017-01-06T17:12:55.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:37.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38869", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032336", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0738.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0738.json index 6ab259577c2..a218fc2014e 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0738.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0738.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0738", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-17T01:59:02.113", - "lastModified": "2017-01-06T17:12:51.063", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:37.793", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38884", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032349", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0739.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0739.json index 245d15fb37c..7c3a5bc18ea 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0739.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0739.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0739", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-19T02:00:18.917", - "lastModified": "2017-01-06T17:09:12.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:37.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -146,6 +145,29 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74709", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032359", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0740.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0740.json index d2934dd2b5a..aa7b747e288 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0740.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0740.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0740", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-20T00:59:00.077", - "lastModified": "2017-01-06T17:03:22.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:38.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032367", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0741.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0741.json index 78a122aa7c6..ba92c4d2ad4 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0741.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0741.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0741", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-21T10:59:00.067", - "lastModified": "2017-01-06T17:03:08.377", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:38.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38927", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74754", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032380", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0742.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0742.json index 55d5cfa6d98..dd763516144 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0742.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0742.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0742", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-21T10:59:02.067", - "lastModified": "2023-08-15T15:37:09.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:38.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -144,6 +143,29 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74750", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0746.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0746.json index 427005b35f7..0dd5b24c755 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0746.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0746.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0746", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-22T00:59:00.097", - "lastModified": "2016-04-06T12:47:42.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:38.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id/1032387", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38946", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032387", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0750.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0750.json index 99a6695ba23..b4d405fcf24 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0750.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0750.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0750", "sourceIdentifier": "ykramarz@cisco.com", "published": "2015-05-23T01:59:00.077", - "lastModified": "2015-05-26T17:40:04.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:39.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -133,6 +132,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0777.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0777.json index 830d6684a7a..b8f25fb1f9b 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0777.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0777.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0777", "sourceIdentifier": "security@opentext.com", "published": "2015-04-05T21:59:00.077", - "lastModified": "2023-11-07T02:23:29.723", + "lastModified": "2024-11-21T02:23:42.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -127,6 +126,30 @@ { "url": "https://bugzilla.novell.com/show_bug.cgi?id=917830", "source": "security@opentext.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73921", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=917830", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0778.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0778.json index 01a72dff8cd..da485057967 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0778.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0778.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0778", "sourceIdentifier": "security@opentext.com", "published": "2015-03-16T14:59:01.127", - "lastModified": "2023-11-07T02:23:29.970", + "lastModified": "2024-11-21T02:23:42.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -146,6 +145,38 @@ { "url": "https://security.gentoo.org/glsa/201603-02", "source": "security@opentext.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154257.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154267.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73114", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=901643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0797.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0797.json index 6467bd8c45a..1fdc3cd7e17 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0797.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0797.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0797", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:00.070", - "lastModified": "2024-10-22T13:54:41.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:43.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -414,6 +413,109 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0988.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3260", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3264", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-47.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1080995", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201512-07", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0798.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0798.json index 0629378b52e..0442599388f 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0798.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0798.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0798", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-08T10:59:00.063", - "lastModified": "2016-12-07T13:36:15.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:43.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -136,6 +135,43 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-43.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1147597", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-07xx/CVE-2015-0799.json b/CVE-2015/CVE-2015-07xx/CVE-2015-0799.json index 609bb663da0..f6344245a94 100644 --- a/CVE-2015/CVE-2015-07xx/CVE-2015-0799.json +++ b/CVE-2015/CVE-2015-07xx/CVE-2015-0799.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0799", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-08T10:59:01.500", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:44.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -148,6 +147,37 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-44.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2557-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1148328", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0800.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0800.json index d6dfd96e0f4..085762a3453 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0800.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0800.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0800", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:01.503", - "lastModified": "2016-10-04T02:02:07.240", + "lastModified": "2024-11-21T02:23:44.217", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,25 @@ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1110212", "source": "security@mozilla.org" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-41.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1110212", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0801.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0801.json index 3ade73120a6..e9f4da1a361 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0801.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0801.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0801", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:02.643", - "lastModified": "2024-10-22T13:54:41.943", + "lastModified": "2024-11-21T02:23:44.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -210,6 +209,77 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0771.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-40.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2552-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1146339", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0802.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0802.json index 4a798447292..54f1f3611d8 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0802.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0802.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0802", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:03.787", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:44.493", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -152,6 +151,41 @@ { "url": "https://www.exploit-db.com/exploits/37958/", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-42.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1124898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37958/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0803.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0803.json index a4cd6482870..918eba96d25 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0803.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0803.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0803", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:04.800", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:44.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -148,6 +147,37 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-39.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1134561", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0804.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0804.json index 5c5eb5dea30..18089b763b9 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0804.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0804.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0804", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:05.647", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:44.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -148,6 +147,37 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-39.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1134560", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0805.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0805.json index 33877f95f6c..98aac447244 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0805.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0805.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0805", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:06.550", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:44.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -148,6 +147,37 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-38.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1135511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0806.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0806.json index 4053f2d921b..b6544a4dc08 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0806.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0806.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0806", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:07.317", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:45.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -148,6 +147,37 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-38.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1099437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0807.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0807.json index aa3fa24e686..a6d34362123 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0807.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0807.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0807", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:08.147", - "lastModified": "2024-10-22T13:54:41.943", + "lastModified": "2024-11-21T02:23:45.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -209,6 +208,77 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0771.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-37.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73457", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2552-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1111834", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0808.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0808.json index 3b399a376c6..20932f26f52 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0808.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0808.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0808", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:09.003", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:45.337", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -148,6 +147,37 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-36.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1109552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0810.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0810.json index 0a06ca860d9..de5cdb60ba9 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0810.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0810.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0810", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:09.863", - "lastModified": "2016-12-07T03:02:20.887", + "lastModified": "2024-11-21T02:23:45.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,29 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-35.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1125013", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0811.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0811.json index 2bb14d1f24f..3e87269f2d9 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0811.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0811.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0811", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:10.723", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:45.590", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -148,6 +147,37 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-34.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1132468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0812.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0812.json index 45289933469..65f8a76093a 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0812.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0812.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0812", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:11.490", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:45.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -147,6 +146,37 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-32.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1128126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0813.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0813.json index f73107fc7fd..33c04b7f0a6 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0813.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0813.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0813", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:12.303", - "lastModified": "2017-01-03T02:59:43.333", + "lastModified": "2024-11-21T02:23:45.847", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -168,6 +166,78 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0771.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-31.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73463", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2552-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1106596", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0814.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0814.json index 9ec7561bb10..4cc6ef99841 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0814.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0814.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0814", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:13.100", - "lastModified": "2016-12-07T03:02:25.137", + "lastModified": "2024-11-21T02:23:45.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -146,6 +145,81 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1005991", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1111327", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1116306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1127012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1130150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1132342", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1133909", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1136397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1137624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1138391", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0815.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0815.json index 7c7f6f1e6ef..aa984738a2b 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0815.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0815.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0815", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:13.957", - "lastModified": "2017-01-03T02:59:43.410", + "lastModified": "2024-11-21T02:23:46.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -163,6 +162,85 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0771.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2552-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1036515", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1137326", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1138199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0816.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0816.json index da262b745f0..a5641bff357 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0816.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0816.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0816", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-01T10:59:14.910", - "lastModified": "2017-09-17T01:29:01.170", + "lastModified": "2024-11-21T02:23:46.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -159,6 +158,81 @@ { "url": "https://www.exploit-db.com/exploits/37958/", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0771.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-33.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2550-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2552-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1144991", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37958/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0817.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0817.json index b4d030f0b50..5a5fef5f437 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0817.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0817.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0817", "sourceIdentifier": "security@mozilla.org", "published": "2015-03-24T00:59:05.843", - "lastModified": "2024-10-22T13:54:41.943", + "lastModified": "2024-11-21T02:23:46.417", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -183,6 +182,61 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0718.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3201", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73263", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031958", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2538-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1145255", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0818.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0818.json index 285f4c9194c..f49465f24af 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0818.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0818.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0818", "sourceIdentifier": "security@mozilla.org", "published": "2015-03-24T00:59:07.250", - "lastModified": "2024-10-22T13:54:41.943", + "lastModified": "2024-11-21T02:23:46.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -188,6 +187,61 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0718.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3201", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031959", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2538-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1144988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0819.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0819.json index 582862ab73d..3731d67a732 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0819.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0819.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0819", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:00.047", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:46.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1331,6 +1330,65 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72759", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0820.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0820.json index 276beb3afa2..a9493a05e67 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0820.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0820.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0820", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:01.267", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:46.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -1323,6 +1322,57 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-27.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72757", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1125389", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0821.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0821.json index 03386d26df4..ed6ef838d28 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0821.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0821.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0821", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:02.360", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:47.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1331,6 +1330,65 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-25.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72758", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1111960", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0822.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0822.json index 13d70f621b8..acd4e0a0e52 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0822.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0822.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0822", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:03.437", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T02:23:47.237", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1399,6 +1398,97 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0265.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0266.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0642.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3174", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-24.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2506-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1110557", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0823.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0823.json index 685755518bf..8ce22ec4d4f 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0823.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0823.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0823", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:04.377", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:47.417", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1348,13 +1346,81 @@ "url": "https://github.com/khaledhosny/ots/commit/003c62d28ae438aa8943cb31535563397f838a2c", "source": "security@mozilla.org", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-23.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72754", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1098497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/khaledhosny/ots/commit/003c62d28ae438aa8943cb31535563397f838a2c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0824.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0824.json index 0bedaf59fa4..d625d1fc71f 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0824.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0824.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0824", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:05.203", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:47.590", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1331,6 +1330,65 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-22.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1095925", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0825.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0825.json index 92b002418b2..6f037e094b2 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0825.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0825.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0825", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:06.110", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:47.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1311,6 +1310,45 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72751", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1092370", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0826.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0826.json index 764b03ce21c..dd5595acc0f 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0826.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0826.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0826", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:07.047", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:47.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1311,6 +1310,45 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-20.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72750", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1092363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0827.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0827.json index 065b354d9f1..0d0281b0583 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0827.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0827.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0827", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:08.063", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T02:23:48.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1399,6 +1398,97 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0265.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0266.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0642.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3174", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72755", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2506-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1117304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0828.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0828.json index 1c0b2ccf273..7a5f6b2fdbd 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0828.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0828.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0828", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:08.907", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:48.320", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1325,6 +1323,69 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72744", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1030667", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=988675", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0829.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0829.json index 45dc46ee241..11e762a8747 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0829.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0829.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0829", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:10.017", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:48.503", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1349,6 +1348,68 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-17.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72741", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1128939", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0830.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0830.json index 2937023052c..0d9b9dc5908 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0830.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0830.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0830", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:10.937", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:48.723", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1311,6 +1310,45 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72745", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1110488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0831.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0831.json index 1f0618cc521..6f16d1014f6 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0831.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0831.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0831", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:11.780", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T02:23:48.937", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1495,6 +1493,158 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0265.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0266.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0642.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3174", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72746", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031792", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2506-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1130541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0832.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0832.json index 85a4affef35..9f56b70a417 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0832.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0832.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0832", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:12.720", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:49.107", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1307,6 +1306,41 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72752", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1065909", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0833.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0833.json index f1aaa6474e0..3272efa9bd9 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0833.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0833.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0833", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:13.673", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T02:23:49.263", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -1413,6 +1411,50 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-12.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72747", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=945192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0834.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0834.json index ae104d5e506..58cf8ada33b 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0834.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0834.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0834", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:14.563", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:23:49.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1311,6 +1310,45 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-15.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1098314", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0835.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0835.json index 83e354e7bbe..230903dbd8e 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0835.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0835.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0835", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:15.407", - "lastModified": "2016-12-22T02:59:29.330", + "lastModified": "2024-11-21T02:23:49.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1318,6 +1317,97 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-11.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72748", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1072760", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1092947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1114058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1114569", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1118894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1119019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1122387", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1125734", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1127206", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1127246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0836.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0836.json index 2cfa29d995e..c34958c9fb4 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0836.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0836.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0836", "sourceIdentifier": "security@mozilla.org", "published": "2015-02-25T11:59:16.297", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T02:23:49.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1435,6 +1434,133 @@ { "url": "https://security.gentoo.org/glsa/201504-01", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0265.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0266.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0642.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3174", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-11.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72742", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2505-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2506-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1096138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1107009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1111243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1111248", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1115776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1117406", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1119579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1123882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1124018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1128196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0838.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0838.json index ce792f3cd5a..c25440a744f 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0838.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0838.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0838", "sourceIdentifier": "security@debian.org", "published": "2015-03-31T14:59:08.173", - "lastModified": "2015-04-01T03:09:39.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:50.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3206", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.launchpad.net/dulwich-users/msg00829.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0840.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0840.json index ac76e65bd96..0fd56794ba6 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0840.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0840.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0840", "sourceIdentifier": "security@debian.org", "published": "2015-04-13T14:59:01.367", - "lastModified": "2017-01-03T02:59:43.630", + "lastModified": "2024-11-21T02:23:50.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -249,6 +248,28 @@ "tags": [ "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2566-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0844.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0844.json index 5ef3d37ab78..f51a7f08f8d 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0844.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0844.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0844", "sourceIdentifier": "security@debian.org", "published": "2015-04-14T18:59:03.997", - "lastModified": "2016-06-28T18:21:34.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:50.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -396,6 +395,36 @@ { "url": "http://www.debian.org/security/2015/dsa-3218", "source": "security@debian.org" + }, + { + "url": "http://forums.wesnoth.org/viewtopic.php?t=41870", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://forums.wesnoth.org/viewtopic.php?t=41872", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3218", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0845.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0845.json index 2e4ae945a52..96b5d039811 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0845.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0845.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0845", "sourceIdentifier": "security@debian.org", "published": "2015-04-17T17:59:00.063", - "lastModified": "2015-10-09T17:25:47.310", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:50.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -179,6 +178,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3227", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://movabletype.org/news/2015/04/movable_type_608_and_5213_released_to_close_security_vulnera.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0846.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0846.json index 4498c975682..03459aae124 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0846.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0846.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0846", "sourceIdentifier": "security@debian.org", "published": "2015-04-24T14:59:07.220", - "lastModified": "2015-04-27T15:11:47.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:50.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "https://github.com/jamesturk/django-markupfield/blob/master/CHANGELOG", "source": "security@debian.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3230", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/jamesturk/django-markupfield/blob/master/CHANGELOG", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0862.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0862.json index aa955d3d1c7..36b2e463c9d 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0862.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0862.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0862", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-18T18:59:01.583", - "lastModified": "2015-01-20T17:45:26.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:52.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.rabbitmq.com/news.html#2015-01-08T10:14:05+0100", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0866.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0866.json index 3130ccc77e7..ac975f975a2 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0866.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0866.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0866", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T15:59:00.050", - "lastModified": "2018-10-09T19:55:40.733", + "lastModified": "2024-11-21T02:23:52.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534564/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72349", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://forums.manageengine.com/topic/security-update-for-supportcenter-plus", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23247", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0867.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0867.json index d3b8c478aee..d2505eae8df 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0867.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0867.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0867", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-01-21T15:17:15.307", - "lastModified": "2015-01-23T20:37:34.227", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:53.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN88559134/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000006", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.synck.com/blogs/news/weblog_1420694040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0868.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0868.json index 592833e3737..9eb3f86a3aa 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0868.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0868.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0868", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-01T15:59:07.463", - "lastModified": "2015-02-03T04:02:23.253", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", + "lastModified": "2024-11-21T02:23:53.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +92,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN94502417/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000008", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.t-okada.com/cgi-bin/sb2_data/sb2_data_news.cgi?action=data_list&cat=16#495", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0869.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0869.json index a8b60a0a523..81f0d3aa4c1 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0869.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0869.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0869", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-01T15:59:08.743", - "lastModified": "2015-02-04T17:31:34.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:53.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN27142693/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.iodata.jp/support/information/2015/np-bbrm/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0870.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0870.json index de93fbd842d..ae53f6d1282 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0870.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0870.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0870", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-01T02:59:06.147", - "lastModified": "2015-02-03T04:13:07.403", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:53.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,35 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN33735535/995592/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN33735535/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.nishishi.com/cgi/newsclip/20150130.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0871.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0871.json index bc61ef17a7c..47173adcd3a 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0871.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0871.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0871", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-07T15:59:09.190", - "lastModified": "2015-02-09T19:25:45.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:53.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN17480391/995116/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN17480391/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0873.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0873.json index a7fd8c98454..cf32743e54c 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0873.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0873.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0873", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-13T02:59:09.970", - "lastModified": "2015-02-13T23:34:02.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:53.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN96155055/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0875.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0875.json index 1edd49a00d4..304ba9ce799 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0875.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0875.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0875", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-15T02:59:00.037", - "lastModified": "2015-02-20T01:56:25.903", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:53.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 1.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.8 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.2, @@ -92,6 +91,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN48659722/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000016", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.okb.co.jp/okdirect/sp_passbook/information01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0876.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0876.json index 9ce5775a092..ef44160351c 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0876.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0876.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0876", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-04-07T02:00:39.937", - "lastModified": "2015-04-07T14:12:27.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:54.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "https://github.com/sauruscms/Saurus-CMS-Community-Edition/commit/1bc272874a86eaab99dccd00b29177423fd83877", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN18387086/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/sauruscms/Saurus-CMS-Community-Edition/commit/1bc272874a86eaab99dccd00b29177423fd83877", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0877.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0877.json index 2b6b48238d9..e5325106d74 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0877.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0877.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0877", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-04-06T01:59:00.073", - "lastModified": "2015-04-06T16:55:48.963", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", + "lastModified": "2024-11-21T02:23:54.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -129,6 +127,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN73261710/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.jp/projects/cb-moyuku/news/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0878.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0878.json index 6ebeb2cafb5..ed06b9243cc 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0878.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0878.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0878", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-20T11:59:01.187", - "lastModified": "2015-02-20T18:39:59.013", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:54.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN77294617/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.almail.com/vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0879.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0879.json index 2d5a1672c3d..3589fd21bb7 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0879.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0879.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0879", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-20T11:59:02.733", - "lastModified": "2015-02-20T18:40:17.700", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:54.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN55365709/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.almail.com/vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0880.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0880.json index 1ad71a6c120..8fd3f13a726 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0880.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0880.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0880", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-20T11:59:03.733", - "lastModified": "2015-03-24T13:56:09.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:54.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN93318392/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.almail.com/vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0881.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0881.json index 58061198221..4fa37f01681 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0881.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0881.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0881", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-20T11:59:04.840", - "lastModified": "2015-03-04T17:13:07.110", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')", + "lastModified": "2024-11-21T02:23:54.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +85,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN64455813/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0882.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0882.json index cb2f8ce7702..b52ea80a5eb 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0882.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0882.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0882", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-27T02:59:35.010", - "lastModified": "2017-12-07T21:33:25.403", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:55.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -122,6 +121,37 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN44544694/281242/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN44544694/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/zencart-ja/zc-v1-series/commit/022949bd09444d7e58703cc537dbbd5744c381b8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0883.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0883.json index 91fe2f3b2cd..3e822716f4d 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0883.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0883.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0883", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-27T02:59:35.777", - "lastModified": "2015-02-27T17:34:25.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:55.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN30135729/995637/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN30135729/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000026", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.synck.com/blogs/news/weblog_1424791052.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0884.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0884.json index 1990a0bdffd..a10cade934d 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0884.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0884.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0884", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-28T02:59:33.767", - "lastModified": "2015-11-19T17:00:02.763", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-428: Unquoted Search Path or Element", + "lastModified": "2024-11-21T02:23:55.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -124,6 +122,31 @@ { "url": "http://www.support.toshiba.com/sscontent?contentId=4007187", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/vu/JVNVU99205169/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/632140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031825", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.support.toshiba.com/sscontent?contentId=4007185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.support.toshiba.com/sscontent?contentId=4007187", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-428: Unquoted Search Path or Element" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0885.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0885.json index 99223b4ab16..4604ec094d6 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0885.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0885.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0885", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-28T02:59:35.047", - "lastModified": "2015-09-24T16:46:37.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:55.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -116,6 +115,35 @@ { "url": "http://www.debian.org/security/2015/dsa-3192", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://checkpw.sourceforge.net/checkpw/changes.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN34790526/995575/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN34790526/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000032", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3192", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0886.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0886.json index 9516e125fbe..553aef33cf8 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0886.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0886.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0886", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-28T02:59:35.987", - "lastModified": "2023-11-07T02:23:35.823", + "lastModified": "2024-11-21T02:23:56.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -163,6 +162,72 @@ { "url": "https://lists.apache.org/thread.html/re330cfe9e5d84e3f7da8ace23ec32f38cb3fbd328bf177badd7ad942%40%3Ccommits.cassandra.apache.org%3E", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN77718330/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151496.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151786.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151797.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mindrot.org/projects/jBCrypt/news/rel04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mindrot.org/show_bug.cgi?id=2097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://lists.apache.org/thread.html/rbd23e3ac8113b4da0a025c0e45170b6ec317383a1cf06090c2c717aa%40%3Ccommits.cassandra.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rd5c2256b8dc9935e4bb5e9be90adce58408054bb42523730a40c5548%40%3Ccommits.cassandra.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/re330cfe9e5d84e3f7da8ace23ec32f38cb3fbd328bf177badd7ad942%40%3Ccommits.cassandra.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0887.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0887.json index 2c418b4b23b..e624b978653 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0887.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0887.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0887", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-28T02:59:37.923", - "lastModified": "2015-03-04T17:20:43.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:56.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -1170,6 +1169,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN63949115/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.seil.jp/support/security/a01541.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0888.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0888.json index b922df9613b..db8d5326188 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0888.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0888.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0888", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-28T02:59:39.000", - "lastModified": "2015-03-02T20:56:02.223", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:56.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN62298871/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000028", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kent-web.com/bbs/clipbbs.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0889.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0889.json index 93df9122a83..70dbfbd08f4 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0889.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0889.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0889", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-02-28T02:59:40.267", - "lastModified": "2015-03-02T20:54:05.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:56.473", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN88862608/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kent-web.com/bbs/joyful.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0890.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0890.json index e5854ba1149..c36c1832cad 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0890.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0890.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0890", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-03T11:59:04.900", - "lastModified": "2015-03-03T18:01:18.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:56.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ { "url": "https://wordpress.org/plugins/google-captcha/changelog/", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN55063777/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000030", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://wordpress.org/plugins/google-captcha/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0891.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0891.json index 5c8c5dfbf88..d840f05d163 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0891.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0891.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0891", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-05T01:59:00.047", - "lastModified": "2015-03-23T16:16:26.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:56.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN63687798/995638/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN63687798/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000034", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0892.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0892.json index c1bfa15126b..bfd12def2dc 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0892.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0892.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0892", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-05T01:59:01.470", - "lastModified": "2015-03-23T15:57:42.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:56.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN09871547/995638/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN09871547/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0893.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0893.json index dbc8ea4f65c..2aca26d41d4 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0893.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0893.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0893", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-05T01:59:02.580", - "lastModified": "2015-03-23T16:16:40.700", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:56.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN91016415/995638/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN91016415/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000036", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0894.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0894.json index abfa9a169c9..b2e6e225969 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0894.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0894.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0894", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-07T02:59:01.537", - "lastModified": "2015-03-09T13:21:58.930", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:57.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -93,6 +92,27 @@ "tags": [ "Patch" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN30832515/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000037", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0895.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0895.json index d2ac2763124..85c0a470abf 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0895.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0895.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0895", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-07T02:59:02.723", - "lastModified": "2015-03-09T15:09:16.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:57.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,27 @@ "tags": [ "Patch" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN87204433/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000038", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0896.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0896.json index 8fa5698ef20..9c92d7956d7 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0896.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0896.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0896", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-18T23:59:02.517", - "lastModified": "2015-03-19T13:41:37.083", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:57.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://extplorer.net/news/16", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN97099798/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000039", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-08xx/CVE-2015-0898.json b/CVE-2015/CVE-2015-08xx/CVE-2015-0898.json index e585cff975e..1b69235e069 100644 --- a/CVE-2015/CVE-2015-08xx/CVE-2015-0898.json +++ b/CVE-2015/CVE-2015-08xx/CVE-2015-0898.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0898", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-21T01:59:02.700", - "lastModified": "2015-03-27T07:35:38.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:57.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -161,6 +160,35 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN39175666/221504/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN39175666/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.futomi.com/library/info/2015/20150319.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0900.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0900.json index 82e61e42e18..c970314385a 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0900.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0900.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0900", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-31T10:59:01.480", - "lastModified": "2015-03-31T17:06:28.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:57.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN74547976/995592/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN74547976/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000043", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.nishishi.com/cgi/ftsb/20150321.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0901.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0901.json index 0404a81e6a4..56dbc530e2d 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0901.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0901.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0901", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-03-31T10:59:03.963", - "lastModified": "2017-07-17T13:18:03.563", + "lastModified": "2024-11-21T02:23:57.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "https://wpvulndb.com/vulnerabilities/7872", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN97281747/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7872", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0902.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0902.json index 0a6a76006a0..941526008cf 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0902.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0902.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0902", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-04-03T10:59:08.867", - "lastModified": "2015-04-03T15:15:24.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:58.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN75615300/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000046", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0903.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0903.json index eedafa33183..46ebeacf455 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0903.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0903.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0903", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-04-03T10:59:10.257", - "lastModified": "2015-04-06T16:57:11.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:58.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -205,6 +204,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN58784309/294291/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN58784309/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0905.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0905.json index 96b42a9b350..a3569f247e7 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0905.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0905.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0905", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-04-08T01:59:00.077", - "lastModified": "2015-11-24T18:10:58.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:58.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "http://www.securitytracker.com/id/1032041", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN71903938/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000047", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/projects/bblog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032041", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0906.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0906.json index 1ca45063c9b..eb4afa04fb4 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0906.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0906.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0906", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-04-15T10:59:06.253", - "lastModified": "2015-04-15T19:01:22.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:58.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -119,6 +118,28 @@ { "url": "http://www7a.biglobe.ne.jp/~schezo/", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN02527990/414318/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN02527990/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www7a.biglobe.ne.jp/~schezo/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0907.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0907.json index e2bfb90ca76..70a128f5e91 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0907.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0907.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0907", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-04-15T10:59:07.253", - "lastModified": "2015-04-15T20:16:39.447", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:58.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -122,6 +121,31 @@ { "url": "http://www7a.biglobe.ne.jp/~schezo/", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN12329472/414318/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN12329472/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www7a.biglobe.ne.jp/~schezo/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0910.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0910.json index 42655285b7a..0dff648b528 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0910.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0910.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0910", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-04-24T01:59:00.083", - "lastModified": "2015-04-24T16:51:42.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:58.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -197,6 +196,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://dounokouno.com/2015/04/20/transmitmail-%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN26860747/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000054", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0911.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0911.json index ce34a124c2c..fc835a208fb 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0911.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0911.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0911", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-04-24T01:59:01.613", - "lastModified": "2015-04-24T16:52:07.297", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:58.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -197,6 +196,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://dounokouno.com/2015/04/20/transmitmail-%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN41653647/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0912.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0912.json index 126e006fdcd..1e08a404f17 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0912.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0912.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0912", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-05-01T10:59:02.153", - "lastModified": "2015-05-01T14:22:36.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:58.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN67520407/995657/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN67520407/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0913.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0913.json index 7fd8915f0c0..fe7ca01a121 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0913.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0913.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0913", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-05-01T10:59:03.170", - "lastModified": "2015-05-04T12:59:47.110", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:59.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN07538357/995657/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN07538357/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000061", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0914.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0914.json index 011c3f73716..db8e0e4c6b5 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0914.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0914.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0914", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-05-01T10:59:04.043", - "lastModified": "2015-05-01T14:23:49.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:59.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN96439865/995657/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN96439865/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000062", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0915.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0915.json index f0d574dfa7f..4429fe54e0d 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0915.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0915.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0915", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-05-22T00:59:01.393", - "lastModified": "2015-05-22T14:09:21.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:59.263", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN20133698/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000063", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.maildealer.jp/announce/150511.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0916.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0916.json index bb60a546121..9c703c2eb9e 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0916.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0916.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0916", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-05-22T00:59:02.783", - "lastModified": "2015-05-22T14:09:40.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:59.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -94,6 +93,28 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN18957556/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000064", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.cacti.net/release_notes_0_8_6f.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0917.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0917.json index a0c9b34661c..3e1dae60d55 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0917.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0917.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0917", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T15:59:05.297", - "lastModified": "2015-01-08T19:54:44.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:59.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ { "url": "https://www.kajona.de/de/News/newsdetails.Security-update-to-module-system.newsDetail.22ac42054aa88a07826c.html", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129826/Kajona-CMS-4.6-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/kajona/kajonacms/commit/563d39c327606232e480602f7b36ea6cb31bc6f7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.kajona.de/de/News/newsdetails.Security-update-to-module-system.newsDetail.22ac42054aa88a07826c.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0918.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0918.json index 835a50a7c1c..b2246dd4603 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0918.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0918.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0918", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T15:59:06.720", - "lastModified": "2015-01-08T19:55:17.137", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:59.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://forum.sefrengo.org/index.php?showtopic=3360", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129825/Sefrengo-CMS-1.6.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0919.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0919.json index 6784908c8f9..e366275bc0f 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0919.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0919.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0919", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T15:59:07.970", - "lastModified": "2015-01-08T19:55:29.857", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:23:59.747", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,34 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://forum.sefrengo.org/index.php?showtopic=3360", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/129824/Sefrengo-CMS-1.6.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0920.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0920.json index 055238bafad..72ab35065a9 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0920.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0920.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0920", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T15:59:08.877", - "lastModified": "2017-09-08T01:29:46.670", + "lastModified": "2024-11-21T02:23:59.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99614", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129804/WordPress-Banner-Effect-Header-1.2.6-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99613", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99614", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0921.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0921.json index 34bf336edc8..ceb3e89b4ab 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0921.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0921.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0921", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:10.600", - "lastModified": "2017-09-08T01:29:46.747", + "lastModified": "2024-11-21T02:24:00.047", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -142,6 +140,56 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129827/McAfee-ePolicy-Orchestrator-Authenticated-XXE-Credential-Exposure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/37", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/61922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gist.github.com/brandonprry/692e553975bf29aeaf2c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0922.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0922.json index 3f3086f5534..5d9f340fe1d 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0922.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0922.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0922", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-09T18:59:11.540", - "lastModified": "2017-09-08T01:29:46.810", + "lastModified": "2024-11-21T02:24:00.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -134,6 +133,48 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129827/McAfee-ePolicy-Orchestrator-Authenticated-XXE-Credential-Exposure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/37", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72298", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99949", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gist.github.com/brandonprry/692e553975bf29aeaf2c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0923.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0923.json index 780dd2d64fe..e7ac8710e8f 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0923.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0923.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0923", "sourceIdentifier": "cret@cert.org", "published": "2015-02-14T03:01:17.927", - "lastModified": "2015-02-17T17:11:49.160", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", + "lastModified": "2024-11-21T02:24:00.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +92,14 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/377644", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0924.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0924.json index f6b8695d3b9..2346787b596 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0924.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0924.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0924", "sourceIdentifier": "cret@cert.org", "published": "2015-01-17T11:59:06.127", - "lastModified": "2017-05-27T01:29:00.607", + "lastModified": "2024-11-21T02:24:00.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/936356", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0925.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0925.json index 37d50aed639..85a0ac14ee8 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0925.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0925.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0925", "sourceIdentifier": "cret@cert.org", "published": "2015-01-22T14:02:59.803", - "lastModified": "2015-01-24T02:26:31.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:00.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/110652", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0926.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0926.json index 6061e3b00bb..f1a4ea023f3 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0926.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0926.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0926", "sourceIdentifier": "cret@cert.org", "published": "2015-02-01T02:59:07.567", - "lastModified": "2015-02-03T15:20:38.383", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:00.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 6.8, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/637068", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0929.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0929.json index 969fdf13ca4..bfbcaa6abd1 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0929.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0929.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0929", "sourceIdentifier": "cret@cert.org", "published": "2015-02-03T22:59:03.173", - "lastModified": "2015-02-04T17:33:26.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:00.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/522460", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0930.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0930.json index 7f339151478..866bea162bc 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0930.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0930.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0930", "sourceIdentifier": "cret@cert.org", "published": "2015-02-03T22:59:03.940", - "lastModified": "2015-02-04T17:35:10.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:01.043", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/522460", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0931.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0931.json index 3f804c259d1..c0cf560744d 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0931.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0931.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0931", "sourceIdentifier": "cret@cert.org", "published": "2015-02-14T03:01:19.033", - "lastModified": "2015-02-17T17:17:34.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:01.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/377644", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0932.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0932.json index 231db9ec1b1..9fc7676d18c 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0932.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0932.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0932", "sourceIdentifier": "cret@cert.org", "published": "2015-04-05T01:59:01.163", - "lastModified": "2015-04-15T17:02:00.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:01.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -128,6 +127,33 @@ { "url": "http://www.wired.com/2015/03/big-vulnerability-hotel-wi-fi-router-puts-guests-risk/", "source": "cret@cert.org" + }, + { + "url": "http://blog.cylance.com/spear-team-cve-2015-0932", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.antlabs.com/index.php?option=com_content&view=article&id=195:rsync-remote-file-system-access-vulnerability-cve-2015-0932&catid=54:advisories&Itemid=133", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/930956", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.wired.com/2015/03/big-vulnerability-hotel-wi-fi-router-puts-guests-risk/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0933.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0933.json index 9339a022acc..4f6d45d2d17 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0933.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0933.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0933", "sourceIdentifier": "cret@cert.org", "published": "2015-03-04T02:59:02.113", - "lastModified": "2015-03-04T19:09:01.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:01.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/302668", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0934.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0934.json index a99a6dc0c36..ba4cd4839d5 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0934.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0934.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0934", "sourceIdentifier": "cret@cert.org", "published": "2015-03-04T02:59:03.240", - "lastModified": "2015-03-04T19:10:01.063", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:01.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/302668", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0935.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0935.json index 7a0134deab1..827d2c516e8 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0935.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0935.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0935", "sourceIdentifier": "cret@cert.org", "published": "2015-05-25T19:59:01.360", - "lastModified": "2017-09-07T01:29:00.337", + "lastModified": "2024-11-21T02:24:01.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,23 @@ { "url": "https://www.exploit-db.com/exploits/39958/", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/978652", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74460", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/39958/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0937.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0937.json index cfafeaa1fe2..97ccdae22c8 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0937.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0937.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0937", "sourceIdentifier": "cret@cert.org", "published": "2015-04-17T01:59:27.903", - "lastModified": "2016-12-08T03:07:01.447", + "lastModified": "2024-11-21T02:24:01.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "https://bto.bluecoat.com/security-advisory/sa94", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/274244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa94", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0938.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0938.json index 9d5117fca9f..d11f6a5a191 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0938.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0938.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0938", "sourceIdentifier": "cret@cert.org", "published": "2015-04-17T01:59:28.873", - "lastModified": "2016-12-08T03:07:02.367", + "lastModified": "2024-11-21T02:24:02.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -77,13 +76,25 @@ "url": "http://www.kb.cert.org/vuls/id/274244", "source": "cret@cert.org", "tags": [ - "US Government Resource", - "Third Party Advisory" + "Third Party Advisory", + "US Government Resource" ] }, { "url": "https://bto.bluecoat.com/security-advisory/sa94", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/274244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa94", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0941.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0941.json index c4de8042942..0a4fc63214b 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0941.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0941.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0941", "sourceIdentifier": "cret@cert.org", "published": "2015-03-22T01:59:00.063", - "lastModified": "2015-03-24T16:11:18.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:02.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/894897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0950.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0950.json index f26ee2c3cf1..85c00636afe 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0950.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0950.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0950", "sourceIdentifier": "cret@cert.org", "published": "2015-04-05T01:59:03.837", - "lastModified": "2015-04-06T17:03:06.397", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:02.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/924124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://blog.x-cart.com/5-1-11-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0951.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0951.json index 4e12e8e9782..9123b4ebc86 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0951.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0951.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0951", "sourceIdentifier": "cret@cert.org", "published": "2015-04-05T01:59:05.100", - "lastModified": "2015-04-06T17:07:21.830", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:02.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -88,6 +87,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/924124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://blog.x-cart.com/5-1-11-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0961.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0961.json index 027e0d58eeb..7906551dfd1 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0961.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0961.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0961", "sourceIdentifier": "cret@cert.org", "published": "2015-05-25T22:59:02.880", - "lastModified": "2015-05-27T13:54:36.710", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-295: Improper Certificate Validation", + "lastModified": "2024-11-21T02:24:02.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +100,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/534407", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://techlib.barracuda.com/BWF/UpdateSSLCerts", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.barracuda.com/support/techalerts", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-295: Improper Certificate Validation" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0962.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0962.json index 8a36e2a51ed..9f3d0ba7537 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0962.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0962.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0962", "sourceIdentifier": "cret@cert.org", "published": "2015-05-25T22:59:04.037", - "lastModified": "2015-05-27T13:58:43.973", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:02.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,35 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/534407", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://techlib.barracuda.com/BWF/UpdateSSLCerts", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.barracuda.com/support/techalerts", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0967.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0967.json index 825c09dae2a..a20e9310bac 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0967.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0967.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0967", "sourceIdentifier": "cret@cert.org", "published": "2015-04-18T02:00:04.687", - "lastModified": "2015-04-20T17:42:39.160", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:02.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/697316", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0968.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0968.json index 6010c18b63f..33fa826a38b 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0968.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0968.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0968", "sourceIdentifier": "cret@cert.org", "published": "2015-04-18T02:00:05.903", - "lastModified": "2015-04-20T17:44:42.970", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", + "lastModified": "2024-11-21T02:24:03.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -81,6 +79,15 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/697316", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0969.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0969.json index cecca2ecb57..2b10a272e46 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0969.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0969.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0969", "sourceIdentifier": "cret@cert.org", "published": "2015-04-18T02:00:06.717", - "lastModified": "2015-04-20T17:45:42.577", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:03.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/697316", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0970.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0970.json index 55f4e8494a5..710e5704016 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0970.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0970.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0970", "sourceIdentifier": "cret@cert.org", "published": "2015-04-18T02:00:07.513", - "lastModified": "2019-09-27T16:44:28.233", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:03.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/697316", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0971.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0971.json index 4d52475e3ba..b17ee08e3e2 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0971.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0971.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0971", "sourceIdentifier": "cret@cert.org", "published": "2015-05-14T14:59:06.840", - "lastModified": "2015-05-15T15:13:25.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:03.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,18 @@ { "url": "http://www.debian.org/security/2015/dsa-3254", "source": "cret@cert.org" + }, + { + "url": "http://suricata-ids.org/2015/05/06/suricata-2-0-8-available/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3254", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0973.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0973.json index a4bb69fe2a5..a8037a1add4 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0973.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0973.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0973", "sourceIdentifier": "cret@cert.org", "published": "2015-01-18T18:59:03.020", - "lastModified": "2024-07-19T14:15:04.343", + "lastModified": "2024-11-21T02:24:03.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -310,6 +309,68 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62725", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://sourceforge.net/p/png-mng/mailman/message/33173461/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/10/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/10/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240719-0005/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT206167", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0976.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0976.json index 6ab2006e71e..2eef385620a 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0976.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0976.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0976", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-04-03T10:59:11.333", - "lastModified": "2015-04-03T15:16:34.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:04.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-090-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0977.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0977.json index 70273f4a830..1cd4b847aa6 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0977.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0977.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0977", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-02-27T02:59:37.183", - "lastModified": "2015-02-27T17:41:21.397", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:04.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-057-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0978.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0978.json index 4928d871698..7e8d3f76c52 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0978.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0978.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0978", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-14T01:59:10.860", - "lastModified": "2015-03-16T18:29:54.637", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path\n", + "lastModified": "2024-11-21T02:24:04.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -85,6 +83,15 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-069-04A", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path\n" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0979.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0979.json index 5378b9c63a0..6e18f2b0f97 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0979.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0979.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0979", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-14T01:59:11.877", - "lastModified": "2015-03-16T18:34:25.583", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:04.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-069-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0980.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0980.json index 5bcd675703b..a4a60bf3d78 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0980.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0980.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0980", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-14T01:59:12.797", - "lastModified": "2015-03-16T18:35:17.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:04.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-069-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0981.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0981.json index 387df99086a..5cda1ea7b80 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0981.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0981.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0981", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-14T01:59:13.720", - "lastModified": "2015-03-16T18:35:51.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:04.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-069-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0982.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0982.json index d9697d38a1c..a032d004e67 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0982.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0982.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0982", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-14T01:59:14.657", - "lastModified": "2022-02-02T02:07:38.720", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:04.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,23 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_File_Id=755516404&p_File_Name=SEVD-2015-065-01+Pelco+DS-NVs+Video+Mgmt+SW.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-071-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0984.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0984.json index 284691b2516..ba29ace6836 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0984.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0984.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0984", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-31T01:59:36.910", - "lastModified": "2016-04-06T12:47:05.940", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Further research has revealed that this vulnerability allows authenticated shell access as an administrator. The score has been updated to properly reflect this.", + "lastModified": "2024-11-21T02:24:04.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -134,6 +132,26 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/79", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-076-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://www.outpost24.com/hacking-industrial-control-systems-case-study-falcon/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "Further research has revealed that this vulnerability allows authenticated shell access as an administrator. The score has been updated to properly reflect this." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0985.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0985.json index f2b7a57edf7..971d65eb39d 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0985.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0985.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0985", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-31T01:59:37.693", - "lastModified": "2015-03-31T17:10:30.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:05.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-076-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0986.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0986.json index 6818133e403..1b23f57a678 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0986.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0986.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0986", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-05-26T15:59:00.073", - "lastModified": "2016-12-08T03:07:03.273", + "lastModified": "2024-11-21T02:24:05.177", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.moxa.com/support/download.aspx?d_id=2114", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73960", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-392", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-097-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0990.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0990.json index 091c04eb9b3..97a93feecf7 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0990.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0990.json @@ -2,10 +2,8 @@ "id": "CVE-2015-0990", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-04-03T10:59:12.227", - "lastModified": "2015-04-03T15:17:54.550", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", + "lastModified": "2024-11-21T02:24:05.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -79,9 +77,19 @@ "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch", - "US Government Resource", - "Third Party Advisory" + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-090-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" ] } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0991.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0991.json index 970b0ea38e1..71afa3b92d4 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0991.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0991.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0991", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-04-03T10:59:13.317", - "lastModified": "2015-04-03T15:18:16.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:05.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-090-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0992.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0992.json index 9b78ad57922..be28e12f358 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0992.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0992.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0992", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-04-03T10:59:14.413", - "lastModified": "2015-04-03T19:28:17.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:05.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -79,6 +78,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-090-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0993.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0993.json index 415def49de8..16d7558863d 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0993.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0993.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0993", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-04-03T10:59:15.427", - "lastModified": "2015-04-03T19:31:22.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:05.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-090-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0994.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0994.json index a9f1a67f7c1..8c293174e09 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0994.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0994.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0994", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-04-03T10:59:16.363", - "lastModified": "2015-04-03T19:32:06.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:06.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -79,6 +78,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-090-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0995.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0995.json index 7db7d744e0c..d8da9904e0e 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0995.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0995.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0995", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-04-03T10:59:17.347", - "lastModified": "2015-04-03T19:32:31.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:06.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-090-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0996.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0996.json index 8fbec38ee11..72896a8b328 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0996.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0996.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0996", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-29T10:59:05.383", - "lastModified": "2021-05-14T15:24:42.063", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:06.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -102,6 +101,30 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-054-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-054-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-085-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0997.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0997.json index 7f0410f0b14..10bdb35d373 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0997.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0997.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0997", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-29T10:59:06.647", - "lastModified": "2021-05-14T15:25:03.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:06.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +101,30 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-054-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-054-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-085-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0998.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0998.json index 2d7dbe66959..274874e82ae 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0998.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0998.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0998", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-29T10:59:07.460", - "lastModified": "2021-05-14T15:24:55.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:06.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -102,6 +101,30 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-054-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-054-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-085-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-09xx/CVE-2015-0999.json b/CVE-2015/CVE-2015-09xx/CVE-2015-0999.json index 3390aedf5c2..d4862b60ad7 100644 --- a/CVE-2015/CVE-2015-09xx/CVE-2015-0999.json +++ b/CVE-2015/CVE-2015-09xx/CVE-2015-0999.json @@ -2,9 +2,8 @@ "id": "CVE-2015-0999", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-03-29T10:59:08.477", - "lastModified": "2021-05-14T15:23:43.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:06.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -102,6 +101,30 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-054-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-054-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-085-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1008.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1008.json index 8dc7add84e9..6416c20bfb1 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1008.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1008.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1008", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-05-26T01:59:00.180", - "lastModified": "2016-04-06T12:47:24.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:29.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -91,6 +90,25 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://community.emerson.com/process/emerson-exchange/operateandmanage/deltav/deltav_security/b/securitynotificationblog/archive/2015/04/16/dsn15003-2-ams-device-management-sql-injection-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74774", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-111-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1013.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1013.json index 3cd8eb667ee..d8eb2aab626 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1013.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1013.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1013", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2015-05-26T01:59:01.743", - "lastModified": "2015-05-27T16:44:25.970", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:29.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -91,6 +90,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-132-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://techsupport.osisoft.com/Troubleshooting/Alerts/AL00280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1026.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1026.json index 6496d4ba611..d3e8ce1e6ff 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1026.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1026.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1026", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-11T14:59:04.017", - "lastModified": "2018-10-09T19:55:41.077", + "lastModified": "2024-11-21T02:24:30.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "http://www.securityfocus.com/archive/1/534833/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130737/Manage-Engine-AD-Audit-Manager-Plus-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534833/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1028.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1028.json index be7a8830a7c..531cbf6ceea 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1028.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1028.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1028", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T15:28:35.167", - "lastModified": "2023-04-26T19:27:52.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:30.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -111,6 +110,34 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/35747", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35750", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35751", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.xlabs.com.br/blog/?p=339", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1029.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1029.json index a99fa738518..7a9acf6eef6 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1029.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1029.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1029", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T16:59:22.093", - "lastModified": "2019-07-11T13:44:52.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:30.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -200,6 +199,17 @@ { "url": "http://secunia.com/advisories/62328", "source": "cve@mitre.org" + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2015-1029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62328", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1030.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1030.json index 759e066f128..64987ebc246 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1030.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1030.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1030", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-20T15:59:09.360", - "lastModified": "2015-02-04T05:17:31.017", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:30.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62123", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.privoxy.org/announce.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1031.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1031.json index 01a4c7301f7..36fbd7ee904 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1031.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1031.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1031", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T19:59:01.257", - "lastModified": "2015-03-04T19:10:17.720", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:24:30.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +94,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62123", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3133", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.privoxy.org/announce.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1032.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1032.json index aa2e6e6c940..2feb609a8e7 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1032.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1032.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1032", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T15:28:36.930", - "lastModified": "2018-10-09T19:55:41.280", + "lastModified": "2024-11-21T02:24:30.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ { "url": "http://www.securityfocus.com/archive/1/534502/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130007/Kiwix-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sourceforge.net/p/kiwix/bugs/763/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sourceforge.net/p/kiwix/kiwix/ci/d1af5f0375c6db24d4071acf4806735725fd206e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534502/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1038.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1038.json index ac0ce78ccee..89aa43525ff 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1038.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1038.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1038", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T18:59:51.763", - "lastModified": "2017-09-08T01:29:46.873", + "lastModified": "2024-11-21T02:24:31.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -174,6 +173,69 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99970", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173245.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174245.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3289", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71890", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774660", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99970", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1039.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1039.json index 83c55181178..ee98f5efdbc 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1039.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1039.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1039", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:27.857", - "lastModified": "2015-01-15T22:45:10.183", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:31.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71931", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ZF-Commons/ZfcUser/commit/baf0e460", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ZF-Commons/ZfcUser/issues/550", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1040.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1040.json index 209bc29f3ad..59f711b7e7d 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1040.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1040.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1040", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:28.827", - "lastModified": "2015-01-15T22:46:19.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:31.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -110,6 +109,45 @@ { "url": "https://github.com/bedita/bedita/issues/566", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129865/CMS-BEdita-3.4.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/16", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/115", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/bedita/bedita/issues/566", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1041.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1041.json index 4576317d248..d37fd5fd83e 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1041.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1041.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1041", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:29.763", - "lastModified": "2017-09-08T01:29:46.933", + "lastModified": "2024-11-21T02:24:31.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -131,6 +130,66 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/129872/CMS-e107-1.0.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/18", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/e107inc/e107v1/issues/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1042.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1042.json index f9781feace9..9ef1c553467 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1042.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1042.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1042", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T20:59:00.060", - "lastModified": "2021-01-12T18:05:59.507", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:24:31.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -202,6 +200,37 @@ { "url": "https://www.mantisbt.org/bugs/view.php?id=17997", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130142/Mantis-BugTracker-1.2.19-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/10/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mantisbt.org/bugs/view.php?id=17997", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1043.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1043.json index 390f8c5569c..f03ba969ea6 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1043.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1043.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1043", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-29T18:59:02.657", - "lastModified": "2017-09-08T01:29:47.013", + "lastModified": "2024-11-21T02:24:31.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -198,6 +197,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100934", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62551", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031644", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100934", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1044.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1044.json index 53e9e06f4bf..aa370b5a43c 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1044.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1044.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1044", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-29T18:59:03.657", - "lastModified": "2017-09-08T01:29:47.077", + "lastModified": "2024-11-21T02:24:32.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -214,6 +213,54 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100935", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62551", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62569", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62669", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72336", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031645", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031646", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2015-0001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100935", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1048.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1048.json index 6e38e75113c..c3610030cea 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1048.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1048.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1048", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T17:59:02.293", - "lastModified": "2020-02-10T15:15:19.653", + "lastModified": "2024-11-21T02:24:32.427", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +94,18 @@ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-597212.pdf", "source": "cve@mitre.org" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-597212.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-597212.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1049.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1049.json index 2994d000812..7328d844e02 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1049.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1049.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1049", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T15:59:01.973", - "lastModified": "2020-02-10T14:15:12.063", + "lastModified": "2024-11-21T02:24:32.573", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -135,6 +134,17 @@ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-954136.pdf", "source": "cve@mitre.org" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-954136.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-954136.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1050.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1050.json index 2cc8648ba4d..13911e1bb55 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1050.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1050.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1050", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:30.687", - "lastModified": "2018-10-09T19:55:41.607", + "lastModified": "2024-11-21T02:24:32.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99907", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129911/F5-BIG-IP-Application-Security-Manager-ASM-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/43", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534459/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031551", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99907", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1051.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1051.json index c279270988c..45df31c7d0e 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1051.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1051.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1051", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:31.577", - "lastModified": "2016-08-23T17:28:46.477", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:24:32.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -154,6 +152,44 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148782.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148800.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71925", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.drupal.org/node/2402779", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403351", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1052.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1052.json index 80b932a89ab..a4e06bf1d66 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1052.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1052.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1052", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-15T15:59:32.403", - "lastModified": "2015-01-15T22:47:42.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:33.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,41 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129917/CMS-PHPKit-WCMS-1.6.6-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/25", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2014-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1053.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1053.json index 29e09a3e5c9..2be73ec8704 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1053.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1053.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1053", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T15:59:02.703", - "lastModified": "2017-09-08T01:29:47.183", + "lastModified": "2024-11-21T02:24:33.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,57 @@ { "url": "https://github.com/croogo/croogo/issues/599", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129916/CMS-Croogo-2.2.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/24", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-02.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-02.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71999", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://blog.croogo.org/blog/croogo-221-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/croogo/croogo/issues/599", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1054.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1054.json index 2dc1d9a10a0..e0f6b9a00d1 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1054.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1054.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1054", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T15:59:03.627", - "lastModified": "2017-09-08T01:29:47.247", + "lastModified": "2024-11-21T02:24:33.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -101,6 +100,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99615", "source": "cve@mitre.org" + }, + { + "url": "http://codecanyon.net/item/crea8social-php-social-networking-platform-v31/9211270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://codecanyon.net/item/crea8social-php-social-networking-platform-v31/9211270/support", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116732", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129816/Crea8Social-2.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35691", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99615", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1055.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1055.json index 2137cac3bb3..06293851673 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1055.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1055.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1055", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T15:59:05.030", - "lastModified": "2019-07-08T16:23:34.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:33.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/72015", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/36", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72015", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1056.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1056.json index 283bcc23475..8e355e5d7e5 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1056.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1056.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1056", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T15:59:06.077", - "lastModified": "2018-10-09T19:55:42.043", + "lastModified": "2024-11-21T02:24:33.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99906", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129841/Brother-MFC-J4410DW-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534398/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71911", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99906", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1057.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1057.json index 3c096495674..747fa208b6b 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1057.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1057.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1057", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T15:59:07.017", - "lastModified": "2017-09-08T01:29:47.373", + "lastModified": "2024-11-21T02:24:33.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99627", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/116692", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35679", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99627", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1058.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1058.json index 06e1622210f..118891cc2ff 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1058.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1058.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1058", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T15:59:07.923", - "lastModified": "2017-09-08T01:29:47.420", + "lastModified": "2024-11-21T02:24:34.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,51 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99617", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/116716", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116717", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116718", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116719", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116720", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129812/AdaptCMS-3.0.3-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35710", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5218.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99617", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1059.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1059.json index 4e093b9f958..4555f3bd593 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1059.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1059.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1059", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T15:59:08.970", - "lastModified": "2017-09-08T01:29:47.480", + "lastModified": "2024-11-21T02:24:34.217", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99616", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/116722", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129814/AdaptCMS-3.0.3-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35710", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://zeroscience.mk/en/vulnerabilities/ZSL-2015-5220.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99616", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1060.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1060.json index 6a9590b7ef6..100733f9bcd 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1060.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1060.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1060", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-16T15:59:10.030", - "lastModified": "2017-09-08T01:29:47.560", + "lastModified": "2024-11-21T02:24:34.373", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +99,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99618", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/116721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129813/AdaptCMS-3.0.3-HTTP-Referer-Header-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35710", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5219.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99618", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1061.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1061.json index ab9a308118a..c8b6af23392 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1061.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1061.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1061", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-12T10:59:05.567", - "lastModified": "2019-03-08T16:06:31.997", + "lastModified": "2024-11-21T02:24:34.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -158,6 +157,60 @@ { "url": "https://support.apple.com/kb/HT204563", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204413", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204426", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204563", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1062.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1062.json index 0770b46e8d8..4ba2da1222f 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1062.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1062.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1062", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-12T10:59:06.880", - "lastModified": "2019-03-08T16:06:31.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:34.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -120,6 +119,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204426", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1063.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1063.json index e783d4644c9..1be8722a857 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1063.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1063.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1063", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-12T10:59:07.863", - "lastModified": "2015-09-11T15:49:45.573", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", + "lastModified": "2024-11-21T02:24:34.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +89,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1064.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1064.json index cf2f479dba8..feff511fab8 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1064.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1064.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1064", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-12T10:59:08.787", - "lastModified": "2015-09-11T15:48:52.670", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:35.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1065.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1065.json index 509570d04e3..708fbe9ae72 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1065.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1065.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1065", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-12T10:59:09.990", - "lastModified": "2016-12-08T03:07:05.977", + "lastModified": "2024-11-21T02:24:35.200", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -128,6 +127,46 @@ { "url": "https://support.apple.com/kb/HT204563", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73007", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204413", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204563", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1066.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1066.json index 2350300227e..ccfbe5ba713 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1066.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1066.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1066", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-12T10:59:11.317", - "lastModified": "2015-09-11T15:51:19.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:35.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031869", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204413", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1067.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1067.json index 54dbafd6415..431c165bd39 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1067.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1067.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1067", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-11T01:59:00.063", - "lastModified": "2019-03-08T16:06:31.997", + "lastModified": "2024-11-21T02:24:35.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -191,6 +190,93 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031829", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031830", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://freakattack.com/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.apple.com/HT204413", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204426", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1068.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1068.json index 89b1a472db0..581c48667b0 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1068.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1068.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1068", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:00.063", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:35.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -255,6 +254,66 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1069.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1069.json index 1a2d397e99b..84123600b2b 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1069.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1069.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1069", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:01.533", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:35.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -285,6 +284,80 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1070.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1070.json index 56ed0adf02e..71f9004290a 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1070.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1070.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1070", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:02.487", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:36.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -252,6 +251,63 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1071.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1071.json index fa0a69535de..fc5cf5d95e8 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1071.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1071.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1071", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:03.360", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:36.153", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -263,6 +262,74 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2937-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1072.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1072.json index 12f4693db25..1619a7783a3 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1072.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1072.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1072", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:04.313", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:36.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -255,6 +254,66 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1073.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1073.json index 159f78753d0..1f0585cd99b 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1073.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1073.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1073", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:05.190", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:36.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -255,6 +254,66 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1074.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1074.json index 63137525557..60bcfa29f2a 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1074.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1074.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1074", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:06.283", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:36.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -255,6 +254,66 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1075.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1075.json index b46dd13a851..9a994a4ddc6 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1075.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1075.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1075", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:07.487", - "lastModified": "2015-07-28T15:16:33.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:36.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -195,6 +194,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1076.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1076.json index d60adde00a8..d03887b62ac 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1076.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1076.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1076", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:08.440", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:36.873", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -263,6 +262,74 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2937-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1077.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1077.json index 47a15684535..c31a0a3e25f 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1077.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1077.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1077", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:09.207", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:37.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -256,6 +255,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1078.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1078.json index be2d7edfbdc..e9ad88bf9ef 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1078.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1078.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1078", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:10.127", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:37.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -256,6 +255,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1079.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1079.json index af2492d2c6e..cabf9284fc0 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1079.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1079.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1079", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:10.987", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:37.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -256,6 +255,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1080.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1080.json index a79fd3ea2c0..4d2aba4ec75 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1080.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1080.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1080", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:11.767", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:37.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -256,6 +255,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1081.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1081.json index cacfa680d11..76d768be303 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1081.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1081.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1081", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:12.580", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:37.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -264,6 +263,75 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2937-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1082.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1082.json index f07dcd98c09..3625c59b3d8 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1082.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1082.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1082", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:13.407", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:37.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -256,6 +255,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1083.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1083.json index 58094fba711..feeff9c7be8 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1083.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1083.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1083", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:14.330", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:37.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -267,6 +266,78 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2937-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1084.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1084.json index 19bf67de3c5..3437e876f22 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1084.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1084.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1084", "sourceIdentifier": "product-security@apple.com", "published": "2015-03-18T22:59:15.127", - "lastModified": "2015-09-30T17:39:28.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:38.047", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -195,6 +194,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204560", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1085.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1085.json index 668c9fa30b3..e7e8bba051d 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1085.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1085.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1085", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:01.597", - "lastModified": "2017-01-03T02:59:43.973", + "lastModified": "2024-11-21T02:24:38.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1086.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1086.json index 4f7c9c77164..0dc6ae5789c 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1086.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1086.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1086", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:02.703", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:38.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -120,6 +119,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1087.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1087.json index 5091384c911..874e5a90c08 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1087.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1087.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1087", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:03.737", - "lastModified": "2017-01-03T02:59:44.020", + "lastModified": "2024-11-21T02:24:38.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1088.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1088.json index 6fc10ac771b..cc589bbc581 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1088.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1088.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1088", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:04.830", - "lastModified": "2017-01-03T02:59:44.083", + "lastModified": "2024-11-21T02:24:38.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1089.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1089.json index f0993eb80ec..160a3eb74c0 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1089.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1089.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1089", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:05.953", - "lastModified": "2017-01-03T02:59:44.147", + "lastModified": "2024-11-21T02:24:38.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -124,6 +123,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1090.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1090.json index d441d05eafe..107adbb7856 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1090.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1090.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1090", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:06.830", - "lastModified": "2017-01-03T02:59:44.207", + "lastModified": "2024-11-21T02:24:38.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1091.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1091.json index db531d5fb71..a1ed6c3f791 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1091.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1091.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1091", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:07.767", - "lastModified": "2017-01-03T02:59:44.257", + "lastModified": "2024-11-21T02:24:38.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1092.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1092.json index aa110850316..08bd86565e7 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1092.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1092.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1092", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:08.657", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:39.093", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')\n", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +127,47 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')\n" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1093.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1093.json index 0d7e3def7e9..bfe1216d7d4 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1093.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1093.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1093", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:09.640", - "lastModified": "2019-01-31T19:11:18.410", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:39.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -141,6 +140,59 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1094.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1094.json index 56283bd57ae..387f2c944f9 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1094.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1094.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1094", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:10.627", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:39.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -128,6 +127,46 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1095.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1095.json index 030f9b68138..fe2b59e2e5b 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1095.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1095.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1095", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:11.610", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:39.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -150,6 +149,52 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1096.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1096.json index 66256a7885a..e1e874fcede 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1096.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1096.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1096", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:12.640", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:39.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -154,6 +153,56 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1097.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1097.json index b7fd3ca4dcd..2062178785b 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1097.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1097.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1097", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:13.577", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:39.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -124,6 +123,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1098.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1098.json index f562589ec3e..2eba3fa3466 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1098.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1098.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1098", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:14.500", - "lastModified": "2019-09-27T18:42:26.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:39.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.3, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.3, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -156,6 +155,52 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-10xx/CVE-2015-1099.json b/CVE-2015/CVE-2015-10xx/CVE-2015-1099.json index 1ab2eedd493..26a4da9ab13 100644 --- a/CVE-2015/CVE-2015-10xx/CVE-2015-1099.json +++ b/CVE-2015/CVE-2015-10xx/CVE-2015-1099.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1099", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:15.407", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:40.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 4.0, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -154,6 +153,56 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1100.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1100.json index 594ce0b2294..24fad511b14 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1100.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1100.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1100", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:16.357", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:40.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:C", + "baseScore": 5.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -168,6 +167,70 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://m00nbsd.net/garbage/Mac-OS-X_Fat-DoS.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36814/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1101.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1101.json index ed0413e7e47..df2bd18a0f0 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1101.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1101.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1101", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:17.310", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:40.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -151,6 +150,53 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1102.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1102.json index 6be1e762c59..cf508f1fe3c 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1102.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1102.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1102", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:18.203", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:40.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -154,6 +153,56 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1103.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1103.json index 7d8869cf99f..f95e1c4f59d 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1103.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1103.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1103", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:19.157", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:40.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -154,6 +153,56 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1104.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1104.json index 0dba53d412d..38a7f1dd6ba 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1104.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1104.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1104", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:20.047", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:40.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -154,6 +153,56 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1105.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1105.json index 83fbb2de9c0..9ac7bcce1fd 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1105.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1105.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1105", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:20.903", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:40.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -154,6 +153,56 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1106.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1106.json index ef9b4377534..665bf8318bd 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1106.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1106.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1106", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:21.857", - "lastModified": "2017-01-03T02:59:44.613", + "lastModified": "2024-11-21T02:24:41.107", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1107.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1107.json index 158daa9ca9a..854c9b7faa1 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1107.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1107.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1107", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:22.843", - "lastModified": "2017-01-03T02:59:44.770", + "lastModified": "2024-11-21T02:24:41.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1108.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1108.json index c38e574f322..923a6c07c48 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1108.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1108.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1108", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:23.670", - "lastModified": "2017-01-03T02:59:44.990", + "lastModified": "2024-11-21T02:24:41.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1109.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1109.json index 14c94ced206..b5ec02deb58 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1109.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1109.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1109", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:24.483", - "lastModified": "2017-01-03T02:59:45.053", + "lastModified": "2024-11-21T02:24:41.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1110.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1110.json index ad37ec84ea7..715688896ff 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1110.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1110.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1110", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:25.543", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:41.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -124,6 +123,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1111.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1111.json index 56141956fa6..14e03395579 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1111.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1111.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1111", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:26.420", - "lastModified": "2017-01-03T02:59:45.160", + "lastModified": "2024-11-21T02:24:41.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1112.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1112.json index b750f17afa5..4248dd61b63 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1112.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1112.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1112", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:27.403", - "lastModified": "2015-11-30T19:48:37.803", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:41.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -205,6 +204,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1113.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1113.json index 7529344b13c..6d0c4d9c6de 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1113.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1113.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1113", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:28.263", - "lastModified": "2017-01-03T02:59:45.223", + "lastModified": "2024-11-21T02:24:41.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1114.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1114.json index 99fbf12020d..9af2e2ed874 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1114.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1114.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1114", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:29.123", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:42.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -124,6 +123,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1115.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1115.json index 5ba04b66473..cb6d163bb01 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1115.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1115.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1115", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:29.933", - "lastModified": "2017-01-03T02:59:45.333", + "lastModified": "2024-11-21T02:24:42.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1116.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1116.json index e7da13abd38..e23b8dae8cc 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1116.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1116.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1116", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:30.887", - "lastModified": "2017-01-03T02:59:45.380", + "lastModified": "2024-11-21T02:24:42.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1117.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1117.json index aaf484a7cf7..2d5da7e66ab 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1117.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1117.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1117", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:31.747", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:42.473", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -154,6 +153,56 @@ { "url": "https://support.apple.com/kb/HT204870", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1118.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1118.json index 83c8ff1bfe5..1ff923a4cb5 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1118.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1118.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1118", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:32.513", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:42.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -150,6 +149,52 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1119.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1119.json index 52c54dc75bf..e04bc0d86d3 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1119.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1119.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1119", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:33.527", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:42.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -270,6 +269,71 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1120.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1120.json index bbfcf3e5df9..4f1cda101b5 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1120.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1120.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1120", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:34.387", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:42.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -271,6 +270,72 @@ { "url": "https://support.apple.com/kb/HT204949", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2937-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1121.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1121.json index b4a1425048d..87492053ffa 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1121.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1121.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1121", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:35.277", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:43.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -270,6 +269,71 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1122.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1122.json index b45f4b9be2c..b6e73191dde 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1122.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1122.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1122", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:36.293", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:43.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -282,6 +281,83 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2937-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1123.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1123.json index a7dddaab6e3..5680b4d2940 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1123.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1123.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1123", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:37.137", - "lastModified": "2019-03-08T16:06:32.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:43.433", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1124.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1124.json index 25652d7edb4..bcac16aa5cf 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1124.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1124.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1124", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:38.043", - "lastModified": "2019-03-08T16:06:32.170", + "lastModified": "2024-11-21T02:24:43.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -270,6 +269,71 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204662", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1125.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1125.json index da3e53468d7..c4af8e50284 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1125.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1125.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1125", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:38.807", - "lastModified": "2015-09-11T17:57:13.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:43.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1126.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1126.json index 8a2ac31a59d..71eada980de 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1126.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1126.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1126", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:39.713", - "lastModified": "2015-09-11T17:57:26.173", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:43.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -205,6 +204,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT204661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1127.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1127.json index 0d70484d4da..e8723830ecd 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1127.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1127.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1127", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:40.497", - "lastModified": "2016-12-03T03:03:05.743", + "lastModified": "2024-11-21T02:24:43.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -183,6 +182,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2937-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1128.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1128.json index 256fa6e8aac..dc3e565b0b0 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1128.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1128.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1128", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:41.353", - "lastModified": "2015-09-11T17:58:20.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:44.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -175,6 +174,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1129.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1129.json index 669f51a2fb1..d55325ab08b 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1129.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1129.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1129", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:42.150", - "lastModified": "2015-09-29T19:27:12.043", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:44.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -205,6 +204,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1130.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1130.json index bac2dfb6fcb..cb9d1c40804 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1130.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1130.json @@ -2,13 +2,8 @@ "id": "CVE-2015-1130", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:43.073", - "lastModified": "2015-09-17T17:41:02.383", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-02-10", - "cisaActionDue": "2022-08-10", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple OS X Authentication Bypass Vulnerability", + "lastModified": "2024-11-21T02:24:44.383", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -46,6 +41,10 @@ } ] }, + "cisaExploitAdd": "2022-02-10", + "cisaActionDue": "2022-08-10", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Apple OS X Authentication Bypass Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -112,6 +111,42 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/120418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36692/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1131.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1131.json index 4339795edd5..faa078cc974 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1131.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1131.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1131", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:43.837", - "lastModified": "2019-01-31T19:44:24.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:44.530", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -103,6 +102,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1132.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1132.json index e9a938cbaba..173fb4e4b45 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1132.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1132.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1132", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:44.650", - "lastModified": "2019-01-31T19:45:07.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:44.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1133.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1133.json index ef8f35b80fd..ccdba12dacb 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1133.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1133.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1133", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:45.447", - "lastModified": "2019-01-31T19:45:24.660", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:44.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -103,6 +102,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1134.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1134.json index 9b6b7bbad5d..619bfce86c3 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1134.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1134.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1134", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:46.447", - "lastModified": "2019-01-31T19:45:40.270", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:44.927", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -103,6 +102,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1135.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1135.json index b89f0cf082d..8ddd323e9bc 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1135.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1135.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1135", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:47.213", - "lastModified": "2019-01-31T19:46:01.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:45.103", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -101,6 +100,35 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1136.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1136.json index 50c0af0c44d..3ae98e850f2 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1136.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1136.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1136", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:47.977", - "lastModified": "2019-01-31T19:46:14.257", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:24:45.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +102,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1137.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1137.json index 19432daf4b4..47e90efccc6 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1137.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1137.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1137", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:48.760", - "lastModified": "2019-01-31T19:48:15.007", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", + "lastModified": "2024-11-21T02:24:45.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -104,6 +102,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1138.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1138.json index d30c2ffcc75..89fe0b629a7 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1138.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1138.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1138", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:49.573", - "lastModified": "2015-09-17T17:47:15.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:45.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -97,6 +96,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1139.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1139.json index 91f6d4cd0ed..07d873d40c2 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1139.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1139.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1139", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:50.447", - "lastModified": "2019-01-31T19:48:39.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:45.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1140.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1140.json index b902e99c894..d8f8a153ea4 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1140.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1140.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1140", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:51.277", - "lastModified": "2019-01-31T19:39:20.263", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:45.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -102,6 +101,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1141.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1141.json index cfdd1b8f3ba..614054859d9 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1141.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1141.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1141", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:52.197", - "lastModified": "2015-09-17T18:39:24.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:45.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1142.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1142.json index b79187ce904..6b8c3650cac 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1142.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1142.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1142", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:53.010", - "lastModified": "2015-09-17T18:39:47.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:45.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1143.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1143.json index 61a1cbda858..91a81fce0d3 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1143.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1143.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1143", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:53.807", - "lastModified": "2019-01-31T19:27:57.370", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')", + "lastModified": "2024-11-21T02:24:46.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -104,6 +102,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1144.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1144.json index ce18367c588..b36c5b1510d 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1144.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1144.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1144", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:54.697", - "lastModified": "2015-09-17T18:42:10.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:46.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1145.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1145.json index 1a4608c3f47..9f98dfd2bbd 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1145.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1145.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1145", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:55.557", - "lastModified": "2019-01-31T19:27:08.777", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:46.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -103,6 +102,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1146.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1146.json index 4dae7657e22..c46a8f61b18 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1146.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1146.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1146", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:56.460", - "lastModified": "2019-01-31T19:25:56.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:46.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -103,6 +102,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1147.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1147.json index 9b81971dfa0..e7e6ee29c0c 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1147.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1147.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1147", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:57.367", - "lastModified": "2019-01-31T19:24:26.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:46.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1148.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1148.json index 68835fcce44..2333c3af7a4 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1148.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1148.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1148", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:58.243", - "lastModified": "2015-09-17T18:43:13.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:46.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73982", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1149.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1149.json index fb30bcfd818..2a9d0187e32 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1149.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1149.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1149", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-10T14:59:59.100", - "lastModified": "2015-09-11T17:58:43.063", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:46.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204663", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1150.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1150.json index e229770ce2c..c1d486d4daf 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1150.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1150.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1150", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-28T22:59:00.077", - "lastModified": "2016-04-01T01:05:29.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:46.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1151.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1151.json index 3ff3af9dca4..639ae394e5d 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1151.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1151.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1151", "sourceIdentifier": "product-security@apple.com", "published": "2015-04-28T22:59:01.030", - "lastModified": "2016-04-01T01:05:40.783", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:47.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1152.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1152.json index d68cddc64c2..db4b8481bd3 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1152.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1152.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1152", "sourceIdentifier": "product-security@apple.com", "published": "2015-05-08T00:59:00.077", - "lastModified": "2016-12-03T03:03:06.900", + "lastModified": "2024-11-21T02:24:47.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -269,6 +268,76 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/May/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204941", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204826", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205221", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1153.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1153.json index 9a2f83989c7..1ca8082554c 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1153.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1153.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1153", "sourceIdentifier": "product-security@apple.com", "published": "2015-05-08T00:59:01.577", - "lastModified": "2016-12-03T03:03:08.040", + "lastModified": "2024-11-21T02:24:47.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -273,6 +272,80 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/May/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204941", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74523", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2937-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204826", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205221", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1154.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1154.json index aecd97f8c68..c13d072e739 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1154.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1154.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1154", "sourceIdentifier": "product-security@apple.com", "published": "2015-05-08T00:59:02.717", - "lastModified": "2015-07-13T17:56:13.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:47.433", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -213,6 +212,36 @@ { "url": "https://support.apple.com/kb/HT204949", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/May/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74526", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204826", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT204949", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1155.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1155.json index 03f0eb5710d..bf3fcf33ddb 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1155.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1155.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1155", "sourceIdentifier": "product-security@apple.com", "published": "2015-05-08T00:59:03.953", - "lastModified": "2017-01-03T02:59:45.443", + "lastModified": "2024-11-21T02:24:47.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -231,6 +230,54 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/May/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204941", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74527", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2937-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204826", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1156.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1156.json index 3e8e7186774..7189b94eb7e 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1156.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1156.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1156", "sourceIdentifier": "product-security@apple.com", "published": "2015-05-08T00:59:04.907", - "lastModified": "2016-11-28T19:17:22.007", + "lastModified": "2024-11-21T02:24:47.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -213,6 +212,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/May/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT204941", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204826", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1157.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1157.json index 48154a285c9..10f002c33d7 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1157.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1157.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1157", "sourceIdentifier": "product-security@apple.com", "published": "2015-05-28T01:59:00.077", - "lastModified": "2016-11-28T19:17:23.147", + "lastModified": "2024-11-21T02:24:47.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -227,6 +226,95 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://9to5mac.com/2015/05/27/how-to-fix-ios-text-message-bug-crash-reboot/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT204941", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibtimes.co.uk/apple-ios-bug-sees-message-app-crash-iphone-reboot-simply-by-receiving-message-1503083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.reddit.com/r/apple/comments/37e8c1/malicious_text_message/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.reddit.com/r/apple/comments/37enow/about_the_latest_iphone_security_vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.reddit.com/r/explainlikeimfive/comments/37edde/eli5_how_that_text_you_can_send_to_friends_turns/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/75491", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032408", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zanzebek.com/a-simple-text-message-can-ruin-any-iphone/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://ghostbin.com/paste/zws9m", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205221", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1164.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1164.json index 8a9b8efd759..3fae4536fe0 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1164.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1164.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1164", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T15:28:37.790", - "lastModified": "2017-09-08T01:29:47.607", + "lastModified": "2024-11-21T02:24:48.283", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +91,27 @@ { "url": "https://github.com/expressjs/serve-static/issues/26", "source": "cve@mitre.org" + }, + { + "url": "http://nodesecurity.io/advisories/serve-static-open-redirect", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72064", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/expressjs/serve-static/issues/26", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1165.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1165.json index 04d5402526d..7064e4d6957 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1165.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1165.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1165", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:05.417", - "lastModified": "2015-10-28T02:16:09.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:48.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -325,6 +324,25 @@ { "url": "http://www.debian.org/security/2015/dsa-3176", "source": "cve@mitre.org" + }, + { + "url": "http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3176", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1169.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1169.json index 560bef91efd..32dbf4ff0e2 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1169.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1169.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1169", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T20:59:01.763", - "lastModified": "2015-02-11T19:47:17.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:48.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130053/CAS-Server-3.5.2-LDAP-Authentication-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/87", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/Jasig/cas/commit/7de61b4c6244af9ff8e75a2c92a570f3b075309c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Jasig/cas/pull/411", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.jasig.org/browse/CAS-1429", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1170.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1170.json index 53111cf3e96..351c1fd15a0 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1170.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1170.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1170", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-06T23:59:02.263", - "lastModified": "2016-12-08T03:07:22.887", + "lastModified": "2024-11-21T02:24:48.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -99,6 +98,10 @@ "url": "http://marc.info/?l=bugtraq&m=143013598825091&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=143013598825091&w=2", + "source": "cve@mitre.org" + }, { "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3634", "source": "cve@mitre.org", @@ -117,6 +120,37 @@ { "url": "https://support.lenovo.com/us/en/product_security/nvidia_windows_privilege", "source": "cve@mitre.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=142781493222653&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143013598825091&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143013598825091&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3634", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032013", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.lenovo.com/product_security/nvidia_windows_privilege", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.lenovo.com/us/en/product_security/nvidia_windows_privilege", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1172.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1172.json index 4b20114c90d..2f25275f774 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1172.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1172.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1172", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-11T19:59:00.057", - "lastModified": "2017-07-17T13:18:04.047", + "lastModified": "2024-11-21T02:24:49.033", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +83,19 @@ { "url": "https://wpvulndb.com/vulnerabilities/7784", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130282/WordPress-Holding-Pattern-0.6-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7784", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1175.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1175.json index 618e52d56fb..9f84f8a2d42 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1175.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1175.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1175", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-22T16:59:00.057", - "lastModified": "2018-10-09T19:55:42.467", + "lastModified": "2024-11-21T02:24:49.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100013", "source": "cve@mitre.org" + }, + { + "url": "http://octogence.com/advisories/cve-2015-1175-xss-prestashop/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130026/Prestashop-1.6.0.9-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534511/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100013", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1176.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1176.json index 8cdbfb30fda..85abd6315ed 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1176.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1176.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1176", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-23T15:59:11.070", - "lastModified": "2018-10-09T19:55:42.873", + "lastModified": "2024-11-21T02:24:49.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,32 @@ { "url": "https://github.com/osTicket/osTicket-1.8/releases/tag/v1.9.5", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130057/osTicket-1.9.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534526/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72276", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/osTicket/osTicket-1.8/pull/1639", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/osTicket/osTicket-1.8/releases/tag/v1.9.5", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1178.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1178.json index 446fbd49ad3..cda92f1a30a 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1178.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1178.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1178", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-26T15:59:13.423", - "lastModified": "2018-10-09T19:55:43.530", + "lastModified": "2024-11-21T02:24:49.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ { "url": "http://www.securityfocus.com/bid/72275", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130061/X-CART-e-Commerce-5.1.8-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534529/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72275", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1179.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1179.json index 48442f8ff90..7a4e573304f 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1179.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1179.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1179", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-26T15:59:14.330", - "lastModified": "2018-10-09T19:55:43.793", + "lastModified": "2024-11-21T02:24:50.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "http://www.securityfocus.com/archive/1/534530/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130062/Mango-Automation-SCADA-HMI-2.4.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534530/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1180.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1180.json index 08182aa9a19..d1ceea6a1eb 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1180.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1180.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1180", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-23T15:59:12.087", - "lastModified": "2018-10-09T19:55:43.983", + "lastModified": "2024-11-21T02:24:50.227", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/archive/1/534531/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130063/EventSentry-3.1.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534531/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1182.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1182.json index eee76684e42..40eae5f0b39 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1182.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1182.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1182", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:59:14.277", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:24:50.367", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-824: Access of Uninitialized Pointer", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -305,6 +303,45 @@ { "url": "https://security.gentoo.org/glsa/201801-15", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148829.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148903.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201801-15", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-824: Access of Uninitialized Pointer" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1188.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1188.json index 34cafc14a9b..3a75820a079 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1188.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1188.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1188", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-20T18:59:04.823", - "lastModified": "2021-01-05T17:43:25.920", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:50.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,14 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/103", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1191.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1191.json index 6678fbde7c9..9025da38c3d 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1191.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1191.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1191", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T18:59:52.840", - "lastModified": "2016-12-03T03:03:11.230", + "lastModified": "2024-11-21T02:24:50.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,33 @@ { "url": "https://github.com/madler/pigz/commit/fdad1406b3ec809f4954ff7cdf9e99eb18c2458f", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/18/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774978", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/madler/pigz/commit/fdad1406b3ec809f4954ff7cdf9e99eb18c2458f", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1192.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1192.json index 1dad0382de7..143ada79c59 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1192.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1192.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1192", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T18:59:53.747", - "lastModified": "2015-01-23T21:40:58.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:50.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/62203", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/18/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774989", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1193.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1193.json index 23e5eb5cde2..84ce3f9559d 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1193.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1193.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1193", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T18:59:54.577", - "lastModified": "2015-01-23T21:49:20.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:51.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/18/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774716", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1194.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1194.json index 867866f170c..6159997dbfb 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1194.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1194.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1194", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T18:59:55.357", - "lastModified": "2015-01-23T21:56:17.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:51.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/18/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774716", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1195.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1195.json index 48dcc861b91..d176fbcfccd 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1195.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1195.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1195", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T18:59:56.090", - "lastModified": "2019-02-04T18:52:44.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:51.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -132,6 +131,58 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-January/000325.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62169", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/15/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/18/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71976", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.launchpad.net/ossa/+bug/1408663", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1196.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1196.json index 4bc629b3810..3b8f6fee6c6 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1196.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1196.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1196", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-21T18:59:57.217", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:24:51.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -161,6 +160,61 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99967", "source": "secalert@redhat.com" + }, + { + "url": "http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/173", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72074", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182154", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99967", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-11xx/CVE-2015-1197.json b/CVE-2015/CVE-2015-11xx/CVE-2015-1197.json index 6dee348b1ec..0d258cd327c 100644 --- a/CVE-2015/CVE-2015-11xx/CVE-2015-1197.json +++ b/CVE-2015/CVE-2015-11xx/CVE-2015-1197.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1197", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:12.377", - "lastModified": "2023-12-27T15:15:43.853", + "lastModified": "2024-11-21T02:24:51.670", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-61: UNIX Symbolic Link (Symlink) Following", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -125,6 +123,60 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0080.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:066", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/07/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/18/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/12/21/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/12/27/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71914", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2906-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-61: UNIX Symbolic Link (Symlink) Following" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1200.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1200.json index 40130d8fac3..53d24ae5ea9 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1200.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1200.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1200", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-23T15:59:12.990", - "lastModified": "2023-11-07T02:24:04.873", + "lastModified": "2024-11-21T02:24:52.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -95,6 +94,30 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XDCG7YJRDOR66V3WJDQPLMFSDULQDADC/", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100207", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3UCBCIN6M5EXFET4RGQTVSSL5S57XCH/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBKV7AT6O3FGQ735PFOGQ4Q5VODMSHE5/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XDCG7YJRDOR66V3WJDQPLMFSDULQDADC/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1201.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1201.json index 458276e0719..637dd04ea3e 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1201.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1201.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1201", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-20T15:59:10.390", - "lastModified": "2015-01-22T17:33:03.570", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:52.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -76,6 +75,10 @@ { "url": "http://secunia.com/advisories/62123", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62123", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1204.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1204.json index 0f54ed5c644..a5f6ba694d9 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1204.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1204.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1204", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T15:28:39.180", - "lastModified": "2015-01-23T21:08:21.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:52.447", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/62034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/wp-slimstat/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7744", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1205.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1205.json index d56a46dce7a..50365d61b66 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1205.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1205.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1205", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-01-22T22:59:28.617", - "lastModified": "2023-11-07T02:24:05.020", + "lastModified": "2024-11-21T02:24:52.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -276,6 +275,174 @@ { "url": "https://support.apple.com/HT205221", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=327070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=334448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=410030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=411026", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=411156", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=413530", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=422765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=423899", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=425040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=425151", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=428828", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=429134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=429139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=431187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=431603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=432209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=434723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=435514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=435815", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=437655", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=438363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=439319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=440572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=440913", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=441834", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=443274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=443333", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=446076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205221", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1209.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1209.json index bd305377a1d..9ba9c91f51a 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1209.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1209.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1209", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-02-06T11:59:07.497", - "lastModified": "2023-11-07T02:24:06.480", + "lastModified": "2024-11-21T02:24:53.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -245,6 +244,66 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=188788&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72497", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031709", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2495-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=447906", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=188788&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1210.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1210.json index 36783ad926a..5cc26f8b97a 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1210.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1210.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1210", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-02-06T11:59:08.433", - "lastModified": "2023-11-07T02:24:06.807", + "lastModified": "2024-11-21T02:24:53.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -245,6 +244,66 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=189365&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72497", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031709", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2495-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=453979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100716", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=189365&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1211.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1211.json index 4a44151ee45..d9cbdf2281a 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1211.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1211.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1211", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-02-06T11:59:09.247", - "lastModified": "2023-11-07T02:24:07.283", + "lastModified": "2024-11-21T02:24:53.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -245,6 +244,66 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100717", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72497", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031709", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2495-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=453982", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/889323002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100717", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1212.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1212.json index 97ecf00b728..f5c358e50f5 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1212.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1212.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1212", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-02-06T11:59:10.403", - "lastModified": "2023-11-07T02:24:07.680", + "lastModified": "2024-11-21T02:24:53.557", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -265,6 +264,86 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72497", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031709", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2495-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=427303", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=438365", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=445679", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=446459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=451684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=451918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=455225", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1213.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1213.json index ca3e0d49866..e93dd4fe6bc 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1213.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1213.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1213", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:04.230", - "lastModified": "2023-11-07T02:24:08.210", + "lastModified": "2024-11-21T02:24:53.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,34 @@ { "url": "https://skia.googlesource.com/skia/+/6af314724f51ad79a640844536c667bb83de5690", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=448423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://skia.googlesource.com/skia/+/6af314724f51ad79a640844536c667bb83de5690", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1214.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1214.json index e8cefd720d8..98c4f62f98c 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1214.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1214.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1214", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:05.527", - "lastModified": "2023-11-07T02:24:08.620", + "lastModified": "2024-11-21T02:24:53.833", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -150,6 +149,34 @@ { "url": "https://skia.googlesource.com/skia/+/23d432080cb8506bf8e371b1637ce8f2de9c0c05", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=445810", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://skia.googlesource.com/skia/+/23d432080cb8506bf8e371b1637ce8f2de9c0c05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1215.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1215.json index 4ee8ef36ad6..5828e5e1448 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1215.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1215.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1215", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:06.887", - "lastModified": "2023-11-07T02:24:09.033", + "lastModified": "2024-11-21T02:24:53.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -146,6 +145,30 @@ { "url": "https://security.gentoo.org/glsa/201503-12", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=445809", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1216.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1216.json index aa949d40c94..33690d15cbb 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1216.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1216.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1216", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:08.137", - "lastModified": "2023-11-07T02:24:09.457", + "lastModified": "2024-11-21T02:24:54.080", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -151,6 +149,35 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=189574&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=454954", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=189574&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1217.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1217.json index 1fddf572efb..fba4dfde6ee 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1217.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1217.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1217", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:09.387", - "lastModified": "2023-11-07T02:24:10.000", + "lastModified": "2024-11-21T02:24:54.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -158,6 +157,42 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=189796&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=456192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/910683002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/958543002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=189796&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1218.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1218.json index 440833efac1..07b040991c2 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1218.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1218.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1218", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:10.903", - "lastModified": "2023-11-07T02:24:10.387", + "lastModified": "2024-11-21T02:24:54.333", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -151,6 +149,35 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=189886&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=456059", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=189886&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1219.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1219.json index c0425bc3a7d..eb9b83fd0d3 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1219.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1219.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1219", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:12.123", - "lastModified": "2023-11-07T02:24:10.770", + "lastModified": "2024-11-21T02:24:54.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -150,6 +149,34 @@ { "url": "https://skia.googlesource.com/skia/+/2ff257bd95c732b9cebc3aac03fbed72d6e6082a", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=446164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://skia.googlesource.com/skia/+/2ff257bd95c732b9cebc3aac03fbed72d6e6082a", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1220.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1220.json index 6327f77e16f..0690d681811 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1220.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1220.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1220", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:13.327", - "lastModified": "2023-11-07T02:24:11.150", + "lastModified": "2024-11-21T02:24:54.570", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -151,6 +149,35 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=188423&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=437651", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=188423&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1221.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1221.json index bc09b1f5ab2..d48410bfc83 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1221.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1221.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1221", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:14.653", - "lastModified": "2023-11-07T02:24:11.570", + "lastModified": "2024-11-21T02:24:54.700", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -105,6 +103,39 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=190035&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=455368", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=190021&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=190035&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1222.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1222.json index 2449e5f5a90..4af73ab19b1 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1222.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1222.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1222", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:15.903", - "lastModified": "2023-11-07T02:24:11.990", + "lastModified": "2024-11-21T02:24:54.823", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +99,35 @@ { "url": "https://security.gentoo.org/glsa/201503-12", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=448082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/798883005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1223.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1223.json index f3edae22bdf..bb4dc347732 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1223.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1223.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1223", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:17.043", - "lastModified": "2023-11-07T02:24:12.370", + "lastModified": "2024-11-21T02:24:54.950", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +99,35 @@ { "url": "https://security.gentoo.org/glsa/201503-12", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/blink.git/+/de1fee41e2c1bbfea7a564ad81e0b511a462fe0b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=454231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1224.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1224.json index 466a76e95d8..4348cb36ba1 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1224.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1224.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1224", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:17.887", - "lastModified": "2023-11-07T02:24:12.823", + "lastModified": "2024-11-21T02:24:55.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -100,6 +99,34 @@ { "url": "https://security.gentoo.org/glsa/201503-12", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449958", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/858303002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1225.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1225.json index 0b97ec9b8e3..b6095fb071a 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1225.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1225.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1225", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:18.793", - "lastModified": "2023-11-07T02:24:13.233", + "lastModified": "2024-11-21T02:24:55.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,26 @@ { "url": "https://security.gentoo.org/glsa/201503-12", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=446033", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1226.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1226.json index 502f451a048..9df5201d5d5 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1226.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1226.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1226", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:19.637", - "lastModified": "2023-11-07T02:24:13.643", + "lastModified": "2024-11-21T02:24:55.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,30 @@ { "url": "https://security.gentoo.org/glsa/201503-12", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=456841", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/910053002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1227.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1227.json index e9fac75884e..64bc3d73486 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1227.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1227.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1227", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:20.420", - "lastModified": "2023-11-07T02:24:14.110", + "lastModified": "2024-11-21T02:24:55.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=189816&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=450389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=189585&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=189816&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1228.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1228.json index 684e7f6d54c..dce524dcf11 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1228.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1228.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1228", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:21.233", - "lastModified": "2023-11-07T02:24:14.500", + "lastModified": "2024-11-21T02:24:55.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -150,6 +149,34 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=188180&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=444707", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=188180&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1229.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1229.json index be0746943d8..8da254d2fbb 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1229.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1229.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1229", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:22.090", - "lastModified": "2023-11-07T02:24:15.040", + "lastModified": "2024-11-21T02:24:55.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -150,6 +149,34 @@ { "url": "https://security.gentoo.org/glsa/201503-12", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=431504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/769043003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1230.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1230.json index 3690f7dee61..e2cad7cf81c 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1230.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1230.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1230", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:22.903", - "lastModified": "2023-11-07T02:24:15.450", + "lastModified": "2024-11-21T02:24:56.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -150,6 +149,34 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=189006&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=189006&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1231.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1231.json index 3167349b3eb..f022293a721 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1231.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1231.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1231", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:23.763", - "lastModified": "2023-11-07T02:24:15.910", + "lastModified": "2024-11-21T02:24:56.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -262,6 +261,146 @@ { "url": "https://security.gentoo.org/glsa/201503-12", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=383777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=404300", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=406871", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=421499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=426762", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=429379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=429679", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=433078", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=437636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=438364", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=438638", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=439877", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=442756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=445831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=448056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=450653", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=450654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=451685", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=451753", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=451755", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=452324", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=452455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=453126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=453994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=459115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=460145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=463349", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1232.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1232.json index 10ca1ee0ee6..9d8a2072b4c 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1232.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1232.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1232", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-03-09T00:59:27.280", - "lastModified": "2023-11-07T02:24:16.440", + "lastModified": "2024-11-21T02:24:56.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ { "url": "https://security.gentoo.org/glsa/201503-12", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=456516", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/907793002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1233.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1233.json index 60664852ea9..7e2381b11d7 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1233.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1233.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1233", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-01T21:59:00.067", - "lastModified": "2023-11-07T02:24:16.857", + "lastModified": "2024-11-21T02:24:57.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,42 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0778.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2556-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=469058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1234.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1234.json index 2eee27184a7..295d4a3a260 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1234.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1234.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1234", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-01T21:59:01.237", - "lastModified": "2023-11-07T02:24:17.330", + "lastModified": "2024-11-21T02:24:57.163", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -134,6 +133,46 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0778.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73486", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2556-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=468936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1016193003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1235.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1235.json index b4c0757d176..a2311020045 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1235.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1235.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1235", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:00.073", - "lastModified": "2023-11-07T02:24:17.750", + "lastModified": "2024-11-21T02:24:57.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -152,6 +151,46 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=190980&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/USN-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=456518", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=190980&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1236.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1236.json index c5ee7b9d0dc..ec20ea47626 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1236.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1236.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1236", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:01.493", - "lastModified": "2023-11-07T02:24:18.080", + "lastModified": "2024-11-21T02:24:57.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -152,6 +151,46 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=189527&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=313939", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=189527&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1237.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1237.json index ed5b97c2ba6..ea11593d637 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1237.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1237.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1237", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:02.477", - "lastModified": "2023-11-07T02:24:18.463", + "lastModified": "2024-11-21T02:24:57.597", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -153,6 +151,47 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=461191", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1007123003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1238.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1238.json index 3f4da7032ba..7aae193797a 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1238.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1238.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1238", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:03.853", - "lastModified": "2023-11-07T02:24:19.087", + "lastModified": "2024-11-21T02:24:57.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -148,6 +147,42 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=445808", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1240.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1240.json index bd5a64e1621..cacca8ebc87 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1240.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1240.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1240", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:04.837", - "lastModified": "2023-11-07T02:24:20.103", + "lastModified": "2024-11-21T02:24:58.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -152,6 +151,46 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=463599", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/978193003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1241.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1241.json index d495ce9aecc..b78c92d0e24 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1241.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1241.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1241", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:05.773", - "lastModified": "2024-01-26T18:56:55.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:24:58.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -288,6 +287,107 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=418402", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://codereview.chromium.org/628763003", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://codereview.chromium.org/660663002", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://codereview.chromium.org/717573004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://codereview.chromium.org/868123002", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1242.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1242.json index 9618407a1e7..338af9284f9 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1242.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1242.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1242", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:06.757", - "lastModified": "2023-11-07T02:24:20.857", + "lastModified": "2024-11-21T02:24:58.267", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -173,6 +171,51 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=460917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1000893003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1019033004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1243.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1243.json index 2aaccf4637e..d4a651cc87c 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1243.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1243.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1243", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-01T10:59:05.043", - "lastModified": "2023-11-07T02:24:21.317", + "lastModified": "2024-11-21T02:24:58.390", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -183,6 +181,47 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=192655&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0921.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2582-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=453279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=192655&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1244.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1244.json index fab7a6033a2..696872a059e 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1244.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1244.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1244", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:07.757", - "lastModified": "2023-11-07T02:24:21.753", + "lastModified": "2024-11-21T02:24:58.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -152,6 +151,46 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromium.googlesource.com/chromium/src/net/+/2359906c4fdfa9d44b045755d23fe5327c10e010", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=455215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1245.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1245.json index 0d29699c0da..b35d5f62f38 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1245.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1245.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1245", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:08.617", - "lastModified": "2023-11-07T02:24:22.167", + "lastModified": "2024-11-21T02:24:58.650", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +122,43 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=444957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/831283002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1246.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1246.json index bafc469fb61..b25403901d0 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1246.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1246.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1246", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:09.727", - "lastModified": "2023-11-07T02:24:22.587", + "lastModified": "2024-11-21T02:24:58.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,42 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=437399", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1247.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1247.json index e10d498dd36..ac1b09c17bf 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1247.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1247.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1247", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:10.537", - "lastModified": "2023-11-07T02:24:22.970", + "lastModified": "2024-11-21T02:24:58.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,42 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=429838", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/917313004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1248.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1248.json index 9d28648de1f..283486476d1 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1248.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1248.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1248", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:11.443", - "lastModified": "2023-11-07T02:24:23.383", + "lastModified": "2024-11-21T02:24:59.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -119,6 +118,38 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=380663", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1249.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1249.json index f5d292a3b5e..d4ea09ec82b 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1249.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1249.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1249", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-04-19T10:59:12.240", - "lastModified": "2023-11-07T02:24:23.860", + "lastModified": "2024-11-21T02:24:59.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -244,6 +243,138 @@ { "url": "https://code.google.com/p/chromium/issues/detail?id=476786", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=389595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=400339", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=403665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=424957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=430533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=436564", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=439992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=442670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=444198", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=445305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=447889", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=448299", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=451058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=451059", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=452794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=456636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=458776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=458870", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=460939", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=462319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=464594", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=465586", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=469082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=469756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=474254", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=476786", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1250.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1250.json index 38b282a0f73..03de7f7c462 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1250.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1250.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1250", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-01T10:59:05.983", - "lastModified": "2023-11-07T02:24:24.353", + "lastModified": "2024-11-21T02:24:59.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -194,6 +193,58 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_28.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0921.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2582-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=453553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=458191", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=473688", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=475749", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=481777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1251.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1251.json index a27abc952ff..7a0958dac66 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1251.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1251.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1251", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:03.260", - "lastModified": "2023-11-07T02:24:24.873", + "lastModified": "2024-11-21T02:24:59.453", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -136,6 +134,55 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://blog.skylined.nl/20161123001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2016/Nov/136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/539824/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-15-236/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=481015", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1252.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1252.json index de7ae899b82..095f2386499 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1252.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1252.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1252", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:04.370", - "lastModified": "2023-11-07T02:24:25.303", + "lastModified": "2024-11-21T02:24:59.590", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +122,42 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=474029", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1061053002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1253.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1253.json index 311a0a51db0..3e82fa57d89 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1253.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1253.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1253", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:05.557", - "lastModified": "2023-11-07T02:24:25.653", + "lastModified": "2024-11-21T02:24:59.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +122,42 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=191807&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=464552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=191807&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1254.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1254.json index 5bc26abffa3..1d0e2cff31e 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1254.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1254.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1254", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:06.650", - "lastModified": "2023-11-07T02:24:26.037", + "lastModified": "2024-11-21T02:24:59.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,42 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=192658&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=444927", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=192658&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1255.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1255.json index 479d7eabccc..9bb35e2c0a3 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1255.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1255.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1255", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:07.650", - "lastModified": "2023-11-07T02:24:26.437", + "lastModified": "2024-11-21T02:24:59.980", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +122,43 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=473253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1071063005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1256.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1256.json index cbc81a67801..1439161fb1d 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1256.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1256.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1256", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:08.823", - "lastModified": "2023-11-07T02:24:26.870", + "lastModified": "2024-11-21T02:25:00.117", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -128,6 +126,47 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=194421&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=478549", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1098913004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=194421&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1257.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1257.json index ee0764dc0dd..fdca6d7e06e 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1257.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1257.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1257", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:09.760", - "lastModified": "2023-11-07T02:24:27.287", + "lastModified": "2024-11-21T02:25:00.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,46 @@ { "url": "https://src.chromium.org/viewvc/blink?view=rev&revision=193911", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=468519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?view=rev&revision=193571", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?view=rev&revision=193911", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1258.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1258.json index d5f4eae1f25..4d83f864d9a 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1258.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1258.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1258", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:10.667", - "lastModified": "2023-11-07T02:24:27.810", + "lastModified": "2024-11-21T02:25:00.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -135,6 +134,54 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168803.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166975.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167428.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=450939", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1106303002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1259.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1259.json index 435f14c7166..f1aef446277 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1259.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1259.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1259", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:11.713", - "lastModified": "2023-11-07T02:24:28.217", + "lastModified": "2024-11-21T02:25:00.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -119,6 +118,38 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=468167", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1260.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1260.json index f3ce86b2fe3..6a2d57beab2 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1260.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1260.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1260", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:12.540", - "lastModified": "2023-11-07T02:24:28.633", + "lastModified": "2024-11-21T02:25:00.663", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -124,6 +122,43 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=474370", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1075833002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1261.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1261.json index 8b28353bd0d..8dec7ace704 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1261.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1261.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1261", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:13.400", - "lastModified": "2023-11-07T02:24:29.010", + "lastModified": "2024-11-21T02:25:00.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -127,6 +126,46 @@ { "url": "https://codereview.chromium.org/1077483002", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=466351", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1011383005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1056743002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1077483002", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1262.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1262.json index 46bd2db847d..1c4b5867b0d 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1262.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1262.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1262", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:14.370", - "lastModified": "2023-11-07T02:24:29.440", + "lastModified": "2024-11-21T02:25:00.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +122,42 @@ { "url": "https://src.chromium.org/viewvc/blink?revision=194541&view=revision", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=476647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://src.chromium.org/viewvc/blink?revision=194541&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1263.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1263.json index 2fda0e19b6f..6dd2d91542f 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1263.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1263.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1263", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:15.307", - "lastModified": "2023-11-07T02:24:29.700", + "lastModified": "2024-11-21T02:25:01.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,42 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=479162", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/1056103005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1264.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1264.json index cb8974483f8..fffa8ebee3b 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1264.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1264.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1264", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:16.213", - "lastModified": "2023-11-07T02:24:30.343", + "lastModified": "2024-11-21T02:25:01.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -119,6 +118,38 @@ { "url": "https://security.gentoo.org/glsa/201506-04", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=481015", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-12xx/CVE-2015-1265.json b/CVE-2015/CVE-2015-12xx/CVE-2015-1265.json index 3951f0cb8b6..c0ee398822c 100644 --- a/CVE-2015/CVE-2015-12xx/CVE-2015-1265.json +++ b/CVE-2015/CVE-2015-12xx/CVE-2015-1265.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1265", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:17.197", - "lastModified": "2023-11-07T02:24:30.747", + "lastModified": "2024-11-21T02:25:01.317", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -187,6 +186,106 @@ { "url": "https://www.exploit-db.com/exploits/37766/", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=413534", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=445741", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=448057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=454157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=458026", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=464642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=464792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=465426", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=467372", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=467644", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=474784", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=475070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=476107", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=484270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=485412", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=485419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=489518", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201506-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37766/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1305.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1305.json index d6db6c9dedf..9e206171215 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1305.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1305.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1305", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:12.540", - "lastModified": "2017-09-08T01:29:48.217", + "lastModified": "2024-11-21T02:25:07.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -120,6 +119,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130177/McAfee-Data-Loss-Prevention-Endpoint-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.greyhathacker.net/?p=818", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/show/osvdb/117345", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100602", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1306.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1306.json index 569179f9b4b..05e7f0489e0 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1306.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1306.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1306", "sourceIdentifier": "security@debian.org", "published": "2015-01-22T15:59:00.140", - "lastModified": "2015-11-19T17:00:57.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:07.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -272,6 +271,42 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0085.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62387", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/20/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sympa.org/security_advisories", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1307.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1307.json index 3267bd66743..01dabf3cfb1 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1307.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1307.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1307", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-26T15:59:15.267", - "lastModified": "2015-01-26T19:40:38.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:07.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/22/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.kde.org/info/security/advisory-20150122-1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1308.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1308.json index 6c4ee07d2cc..714cd0037c9 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1308.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1308.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1308", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-26T15:59:16.317", - "lastModified": "2015-01-26T19:40:58.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:07.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,22 @@ { "url": "https://www.kde.org/info/security/advisory-20150122-2.txt", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/22/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.kde.org/info/security/advisory-20150122-2.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1309.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1309.json index aa1ef10e87f..ea265c849de 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1309.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1309.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1309", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-22T16:59:04.120", - "lastModified": "2022-10-06T15:20:09.903", + "lastModified": "2024-11-21T02:25:08.080", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -85,6 +83,19 @@ { "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/62469", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-001-sap-netweaver-ecatt_display_xmlstring_remote-xxe/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1310.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1310.json index 9caf0347954..92c404fc7ae 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1310.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1310.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1310", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-22T16:59:05.337", - "lastModified": "2018-12-10T19:29:06.780", + "lastModified": "2024-11-21T02:25:08.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -75,6 +74,10 @@ { "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", "source": "cve@mitre.org" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1311.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1311.json index ddaa6cef0ef..a7a8dd5a423 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1311.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1311.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1311", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-22T16:59:07.497", - "lastModified": "2023-12-21T04:14:54.460", + "lastModified": "2024-11-21T02:25:08.403", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -75,6 +74,10 @@ { "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", "source": "cve@mitre.org" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1312.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1312.json index 46b54366d26..d44dc3aef3e 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1312.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1312.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1312", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-22T16:59:08.620", - "lastModified": "2018-12-10T19:29:06.890", + "lastModified": "2024-11-21T02:25:08.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -75,6 +74,10 @@ { "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", "source": "cve@mitre.org" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1314.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1314.json index 673caafee4b..90df491fd5b 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1314.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1314.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1314", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-16T23:59:01.370", - "lastModified": "2015-04-17T18:07:05.493", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:08.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -87,6 +86,21 @@ { "url": "http://seclists.org/fulldisclosure/2015/Jan/94", "source": "cve@mitre.org" + }, + { + "url": "http://dnlongen.blogspot.com/2015/01/usaa-mobile-app-gives-away-your-account.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130067/USAA-Mobile-App-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/94", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1315.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1315.json index cd4a37d5cb4..f7a71abdf77 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1315.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1315.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1315", "sourceIdentifier": "security@ubuntu.com", "published": "2015-02-23T17:59:00.057", - "lastModified": "2015-02-24T17:04:45.847", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:09.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -116,6 +115,26 @@ { "url": "https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/580961/comments/120", "source": "security@ubuntu.com" + }, + { + "url": "http://www.conostix.com/pub/adv/CVE-2015-1315-Info-ZIP-unzip-Out-of-bounds_Write.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/17/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2502-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/580961/comments/120", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1317.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1317.json index b7947fbfbd9..9766e06a21b 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1317.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1317.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1317", "sourceIdentifier": "security@ubuntu.com", "published": "2015-04-08T18:59:05.750", - "lastModified": "2015-09-29T00:38:52.317", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:25:09.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +104,15 @@ { "url": "https://bugs.launchpad.net/oxide/+bug/1431484", "source": "security@ubuntu.com" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2556-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/oxide/+bug/1431484", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1318.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1318.json index e96a009ef85..02b6f2169c0 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1318.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1318.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1318", "sourceIdentifier": "security@ubuntu.com", "published": "2015-04-17T17:59:01.420", - "lastModified": "2018-02-08T02:29:00.270", + "lastModified": "2024-11-21T02:25:09.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -186,6 +185,36 @@ { "url": "https://www.exploit-db.com/exploits/43971/", "source": "security@ubuntu.com" + }, + { + "url": "http://www.osvdb.org/120803", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2569-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/apport/%2Bbug/1438758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://launchpad.net/apport/trunk/2.17.1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36782/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/43971/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1321.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1321.json index d701e8ab481..1b8d2094d6f 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1321.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1321.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1321", "sourceIdentifier": "security@ubuntu.com", "published": "2015-04-29T20:59:00.077", - "lastModified": "2015-04-30T18:27:28.467", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:25:09.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +100,11 @@ { "url": "http://www.ubuntu.com/usn/USN-2570-1", "source": "security@ubuntu.com" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1322.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1322.json index da2b38a231a..a660a06e2a3 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1322.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1322.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1322", "sourceIdentifier": "security@ubuntu.com", "published": "2015-04-29T20:59:01.247", - "lastModified": "2016-05-26T13:48:48.450", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:09.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -105,6 +104,14 @@ { "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/network-manager/%2Bbug/1449245", "source": "security@ubuntu.com" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2581-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/network-manager/%2Bbug/1449245", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1345.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1345.json index 4051e538bf5..afe763230de 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1345.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1345.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1345", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-12T16:59:03.707", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:25:13.057", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -127,6 +126,37 @@ { "url": "http://www.securityfocus.com/bid/72281", "source": "cve@mitre.org" + }, + { + "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=19563", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/grep.git/commit/?id=83a95bd8c8561875b948cadd417c653dbe7ef2e2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1447.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/22/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72281", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1346.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1346.json index 459b0deb544..0e65459a82a 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1346.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1346.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1346", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-22T22:59:29.520", - "lastModified": "2017-09-08T01:29:48.277", + "lastModified": "2024-11-21T02:25:13.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -159,6 +158,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62383", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2476-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100361", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1347.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1347.json index 846f87d0f03..79e00e292ba 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1347.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1347.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1347", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-23T15:59:14.147", - "lastModified": "2015-01-26T13:49:55.650", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:13.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,14 @@ { "url": "https://github.com/osTicket/osTicket-1.8/releases/tag/v1.9.5.1", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/osTicket/osTicket-1.8/commit/b38b3ca7235002137cc9ff74b3c24a4a78c9c2d1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/osTicket/osTicket-1.8/releases/tag/v1.9.5.1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1348.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1348.json index eb558ec30e7..adfe0a4a854 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1348.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1348.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1348", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:10.733", - "lastModified": "2015-02-04T16:40:28.240", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:13.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -116,6 +115,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.arubanetworks.com/support/alerts/aruba-psa-2015-001.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1349.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1349.json index 8a5d84104b1..d9dca54680e 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1349.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1349.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1349", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T03:01:22.287", - "lastModified": "2018-10-30T16:27:02.577", + "lastModified": "2024-11-21T02:25:13.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 5.4, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -559,6 +558,10 @@ "url": "http://marc.info/?l=bugtraq&m=143740940810833&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=143740940810833&w=2", + "source": "cve@mitre.org" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2015-0672.html", "source": "cve@mitre.org" @@ -601,6 +604,85 @@ { "url": "https://support.apple.com/HT205219", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0082.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150904.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150905.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143740940810833&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143740940810833&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0672.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2503-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193820", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.isc.org/article/AA-01235", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://kb.juniper.net/JSA10783", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10116", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205219", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1351.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1351.json index ba90c89189c..ae3888a5343 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1351.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1351.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1351", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:07.867", - "lastModified": "2023-11-07T02:24:48.360", + "lastModified": "2024-11-21T02:25:14.073", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -229,6 +227,99 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=777c39f4042327eac4b63c7ee87dc1c7a09a3115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2015/01/24/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=68677", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201606-10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1352.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1352.json index f7a835f673d..5d56da83ba4 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1352.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1352.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1352", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:08.770", - "lastModified": "2023-11-07T02:24:48.433", + "lastModified": "2024-11-21T02:25:14.290", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -124,6 +122,14 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://openwall.com/lists/oss-security/2015/01/24/9", "source": "cve@mitre.org", @@ -189,6 +195,101 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=124fb22a13fafa3648e4e15b4f207c7096d8155e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2015/01/24/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71932", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=68741", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201606-10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1355.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1355.json index a257836d341..e5f4f30b9bb 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1355.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1355.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1355", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-18T02:59:05.737", - "lastModified": "2015-02-18T18:35:40.870", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:14.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-234789.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1356.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1356.json index fcae19156a4..2f4bda6eb41 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1356.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1356.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1356", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-18T02:59:06.703", - "lastModified": "2015-02-18T18:37:01.150", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:14.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-234789.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1357.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1357.json index 12c30733093..d5da1aff807 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1357.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1357.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1357", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T15:59:03.240", - "lastModified": "2015-02-04T05:19:39.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:14.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +128,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-753139.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1358.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1358.json index 6e16913d2d6..81cffd7da3f 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1358.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1358.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1358", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-18T02:59:07.813", - "lastModified": "2016-11-30T02:59:19.423", + "lastModified": "2024-11-21T02:25:14.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,32 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.securityfocus.com/bid/72625", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1036090", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-526760.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-543623.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-161-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1359.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1359.json index fe842f73472..956b06c7c0a 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1359.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1359.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1359", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:12.900", - "lastModified": "2015-02-21T03:02:33.703", + "lastModified": "2024-11-21T02:25:15.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ { "url": "https://codereview.chromium.org/656463006", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=421196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/656463006", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1360.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1360.json index 528a359d409..b0757fd0bdf 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1360.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1360.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1360", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:14.527", - "lastModified": "2015-02-21T03:02:34.750", + "lastModified": "2024-11-21T02:25:15.307", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ { "url": "https://codereview.chromium.org/636233008", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=416289", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.chromium.org/636233008", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1361.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1361.json index a55e6cb5509..48b1955f852 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1361.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1361.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1361", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:15.900", - "lastModified": "2015-02-21T03:02:35.767", + "lastModified": "2024-11-21T02:25:15.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ { "url": "https://code.google.com/p/chromium/issues/detail?id=449894", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://src.chromium.org/viewvc/blink?view=revision&revision=183296", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=411329", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=449894", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1362.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1362.json index 74045c95c09..c94696d2e94 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1362.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1362.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1362", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:17.137", - "lastModified": "2015-01-28T16:17:39.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:15.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130037/Exif-Pilot-4.7.2-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35870", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1363.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1363.json index 1721a63d9f0..57a750870b9 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1363.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1363.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1363", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:18.213", - "lastModified": "2015-01-28T16:03:07.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:15.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130066/articleFR-CMS-3.0.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.itas.vn/news/itas-team-found-out-XSS-vulnerability-in-articlefr-cms-73.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1364.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1364.json index 2edd786d748..1b1d848dcdc 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1364.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1364.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1364", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:19.807", - "lastModified": "2015-01-28T15:53:42.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:15.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/81", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.itas.vn/news/itas-team-found-out-a-sql-injection-vulnerability-in-articlefr-cms-72.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1365.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1365.json index 5ce990ee002..2a57d3caadc 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1365.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1365.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1365", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:21.040", - "lastModified": "2018-10-09T19:55:45.233", + "lastModified": "2024-11-21T02:25:16.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -127,6 +126,61 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/117147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/75", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35846", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/25/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534505/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=1067992%40pixabay-images%2Ftrunk%2Fpixabay-images.php&old=926633%40pixabay-images%2Ftrunk%2Fpixabay-images.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/pixabay-images/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.mogwaisecurity.de/advisories/MSA-2015-01.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1366.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1366.json index ef5f5cfeb5b..e0da11cdfa9 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1366.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1366.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1366", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:22.573", - "lastModified": "2018-10-09T19:55:46.123", + "lastModified": "2024-11-21T02:25:16.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,46 @@ { "url": "https://www.mogwaisecurity.de/advisories/MSA-2015-01.txt", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/117144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/75", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35846", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/25/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534505/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73931", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100039", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=1067992%40pixabay-images%2Ftrunk%2Fpixabay-images.php&old=926633%40pixabay-images%2Ftrunk%2Fpixabay-images.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mogwaisecurity.de/advisories/MSA-2015-01.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1367.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1367.json index 7fc66172145..cc1e7e93f51 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1367.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1367.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1367", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:23.730", - "lastModified": "2018-10-09T19:55:46.967", + "lastModified": "2024-11-21T02:25:16.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100043", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/129990/CatBot-0.4.2-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/63", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534490/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=1408", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1368.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1368.json index b13c6d26b7f..092e31251e8 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1368.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1368.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1368", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:25.197", - "lastModified": "2018-10-09T19:55:47.450", + "lastModified": "2024-11-21T02:25:16.583", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -129,6 +128,63 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/116961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116962", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116963", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129944/Ansible-Tower-2.0.2-XSS-Privilege-Escalation-Authentication-Missing.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/52", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35786", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534464/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72023", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150113-1_Ansible-Tower_multiple-vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1369.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1369.json index 6111d7ea0d4..907a939191a 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1369.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1369.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1369", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-27T20:04:26.557", - "lastModified": "2015-01-28T19:35:13.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:16.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/sequelize/sequelize/pull/2919", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://nodesecurity.io/advisories/sequelize-sql-injection-order", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1370.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1370.json index 58db37fafd5..358fd202778 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1370.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1370.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1370", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-27T20:04:27.963", - "lastModified": "2015-01-28T19:39:15.917", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-184: Incomplete Blacklist", + "lastModified": "2024-11-21T02:25:16.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +93,29 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/chjj/marked/issues/492", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://nodesecurity.io/advisories/marked_vbscript_injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-184: Incomplete Blacklist" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1371.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1371.json index bb204a52ac6..923fe94285f 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1371.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1371.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1371", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:29.073", - "lastModified": "2015-01-28T04:13:01.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:17.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,35 @@ { "url": "https://github.com/JRogaishio/ferretCMS/issues/63", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/98", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/23/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/JRogaishio/ferretCMS/issues/63", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1372.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1372.json index 66ffadc0da5..b9c3ce40ee5 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1372.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1372.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1372", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:30.183", - "lastModified": "2015-01-28T04:13:27.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:17.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,35 @@ { "url": "https://github.com/JRogaishio/ferretCMS/issues/63", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/98", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/23/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/JRogaishio/ferretCMS/issues/63", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1373.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1373.json index 4560095539f..9b0e789ee72 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1373.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1373.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1373", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:31.340", - "lastModified": "2015-01-28T02:24:27.563", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:17.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,35 @@ { "url": "https://github.com/JRogaishio/ferretCMS/issues/63", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/98", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/23/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/JRogaishio/ferretCMS/issues/63", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1374.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1374.json index b2634b46d05..c47da975d06 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1374.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1374.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1374", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-27T20:04:32.403", - "lastModified": "2015-01-28T02:24:48.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:17.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "https://github.com/JRogaishio/ferretCMS/issues/63", "source": "cve@mitre.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/23/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/JRogaishio/ferretCMS/issues/63", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1375.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1375.json index 54c33d55ee2..c9f625f7308 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1375.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1375.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1375", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-28T11:59:00.040", - "lastModified": "2018-10-09T19:55:48.513", + "lastModified": "2024-11-21T02:25:17.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -109,6 +108,43 @@ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=1067992%40pixabay-images%2Ftrunk%2Fpixabay-images.php&old=926633%40pixabay-images%2Ftrunk%2Fpixabay-images.php", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/75", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35846", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/25/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/117146", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534505/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=1067992%40pixabay-images%2Ftrunk%2Fpixabay-images.php&old=926633%40pixabay-images%2Ftrunk%2Fpixabay-images.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1376.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1376.json index eaad8d86b4a..45638a52722 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1376.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1376.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1376", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-28T11:59:07.307", - "lastModified": "2018-10-09T19:55:49.047", + "lastModified": "2024-11-21T02:25:17.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -105,6 +104,39 @@ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=1067992%40pixabay-images%2Ftrunk%2Fpixabay-images.php&old=926633%40pixabay-images%2Ftrunk%2Fpixabay-images.php", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130017/WordPress-Pixarbay-Images-2.3-XSS-Bypass-Upload-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/75", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35846", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/25/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534505/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=1067992%40pixabay-images%2Ftrunk%2Fpixabay-images.php&old=926633%40pixabay-images%2Ftrunk%2Fpixabay-images.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1377.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1377.json index d6d5c68f905..7cda85a2dff 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1377.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1377.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1377", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T20:59:03.217", - "lastModified": "2015-02-11T19:45:04.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:17.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.webmin.com/changes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.webmin.com/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1380.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1380.json index 38273e58df0..8b70789e264 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1380.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1380.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1380", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:11.750", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:25:18.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -162,6 +161,61 @@ { "url": "http://www.securityfocus.com/bid/72355", "source": "cve@mitre.org" + }, + { + "url": "http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/ChangeLog?revision=1.197&view=markup", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Third Party Advisory" + ] + }, + { + "url": "http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/currentjcc.c/?r1=1.433&r2=1.434", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62899", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/26/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/27/20", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1381.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1381.json index 5663c99d013..09338afa545 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1381.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1381.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1381", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:12.687", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:18.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -139,6 +138,38 @@ { "url": "http://www.openwall.com/lists/oss-security/2015/01/27/20", "source": "cve@mitre.org" + }, + { + "url": "http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/ChangeLog?revision=1.197&view=markup", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/pcrs.c?r1=1.46&r2=1.47", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62775", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62899", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/26/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/27/20", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1382.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1382.json index 08de116b3b8..ee0ab18a260 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1382.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1382.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1382", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:13.563", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:18.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -139,6 +138,38 @@ { "url": "http://www.openwall.com/lists/oss-security/2015/01/27/20", "source": "cve@mitre.org" + }, + { + "url": "http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/ChangeLog?revision=1.197&view=markup", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/parsers.c?r1=1.297&r2=1.298", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62775", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62899", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/26/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/27/20", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1383.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1383.json index cf3e28a44c4..4c44caac71f 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1383.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1383.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1383", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T15:59:04.113", - "lastModified": "2024-09-25T13:10:58.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:18.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/113", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/27/26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/geo-mashup/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1384.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1384.json index f4b0f084ad0..77a1261d683 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1384.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1384.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1384", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:14.437", - "lastModified": "2018-10-09T19:55:49.513", + "lastModified": "2024-11-21T02:25:19.027", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534592/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/banner-effect-header/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.netsparker.com/cve-2015-1384-xss-vulnerability-in-banner-effect-header/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1385.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1385.json index 3197b3449c2..68c7dd33b79 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1385.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1385.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1385", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T15:59:05.020", - "lastModified": "2023-06-15T19:57:37.947", + "lastModified": "2024-11-21T02:25:19.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,42 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130155/Blubrry-PowerPress-6.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/130", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534577/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72362", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/powerpress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.netsparker.com/cve-2015-1385-xss-vulnerability-in-blubrry-powerpress/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1388.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1388.json index 8fc88f7895e..19a0b66f7c9 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1388.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1388.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1388", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-24T17:59:05.523", - "lastModified": "2015-03-26T13:15:37.900", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:19.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -264,6 +263,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1393.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1393.json index 2671260139a..48fac2b8c6a 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1393.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1393.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1393", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T15:59:07.160", - "lastModified": "2019-07-08T16:23:37.147", + "lastModified": "2024-11-21T02:25:20.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534569/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/1074134/photo-gallery", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1397.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1397.json index e04250ab061..4c66376d72b 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1397.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1397.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1397", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-29T22:59:00.080", - "lastModified": "2015-05-12T02:03:26.630", + "lastModified": "2024-11-21T02:25:20.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://blog.sucuri.net/2015/04/magento-shoplift-supee-5344-exploits-in-the-wild.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1398.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1398.json index 820e39911e1..a4d73b05fe1 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1398.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1398.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1398", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-29T22:59:01.533", - "lastModified": "2015-05-12T02:03:27.600", + "lastModified": "2024-11-21T02:25:21.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,25 @@ { "url": "http://www.securitytracker.com/id/1032194", "source": "cve@mitre.org" + }, + { + "url": "http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032194", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-13xx/CVE-2015-1399.json b/CVE-2015/CVE-2015-13xx/CVE-2015-1399.json index 606e81e4da9..84ac7ccd22d 100644 --- a/CVE-2015/CVE-2015-13xx/CVE-2015-1399.json +++ b/CVE-2015/CVE-2015-13xx/CVE-2015-1399.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1399", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-29T22:59:02.407", - "lastModified": "2016-04-01T18:36:50.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:21.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,25 @@ { "url": "http://www.securitytracker.com/id/1032194", "source": "cve@mitre.org" + }, + { + "url": "http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032194", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1400.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1400.json index a4e9a5afc3e..2fb9b21916d 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1400.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1400.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1400", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:16.063", - "lastModified": "2015-02-04T16:58:43.390", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:21.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,34 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130179/NPDS-CMS-Revolution-13-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://websecgeeks.com/npds-cms-sql-injection/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.npds.org/viewtopic.php?topic=26189&forum=12", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.npds.org/viewtopic.php?topic=26233&forum=12", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1402.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1402.json index 26fe5af8d56..2dba5ff4599 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1402.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1402.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1402", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:19.577", - "lastModified": "2015-02-04T05:23:50.233", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:21.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ { "url": "http://www.securityfocus.com/bid/71984", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/27/31", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71984", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1403.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1403.json index 59f7fa19507..c077d51f30a 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1403.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1403.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1403", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:20.530", - "lastModified": "2015-02-04T05:16:12.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:21.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,25 @@ { "url": "http://www.securityfocus.com/bid/71984", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/27/31", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71984", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1404.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1404.json index fbcb9004530..1d286d11a51 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1404.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1404.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1404", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:21.640", - "lastModified": "2015-02-04T05:24:15.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:21.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ { "url": "http://www.securityfocus.com/bid/71985", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-003/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/27/31", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71985", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1405.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1405.json index 2e867ebcb12..12f17e50ce5 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1405.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1405.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1405", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:22.593", - "lastModified": "2015-02-04T05:13:45.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:22.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,25 @@ { "url": "http://www.securityfocus.com/bid/71985", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2015-003/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/11/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/27/31", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71985", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1414.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1414.json index 0a0b662dfec..8245233337b 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1414.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1414.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1414", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-27T15:59:00.053", - "lastModified": "2019-05-30T14:57:55.370", + "lastModified": "2024-11-21T02:25:22.227", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-190: Integer Overflow or Wraparound", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -173,6 +171,48 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3175", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031798", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10107", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15:04.igmp.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.pfsense.org/security/advisories/pfSense-SA-15_02.igmp.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-190: Integer Overflow or Wraparound" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1415.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1415.json index 87df709480e..8c4ee0e5751 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1415.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1415.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1415", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:00.007", - "lastModified": "2018-10-09T19:55:50.513", + "lastModified": "2024-11-21T02:25:22.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -130,6 +129,29 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/131338/FreeBSD-10.x-ZFS-encryption.key-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535209/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032042", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15:08.bsdinstall.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1419.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1419.json index a839a873db4..6eecd2dbff8 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1419.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1419.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1419", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-28T11:59:08.417", - "lastModified": "2024-07-17T15:31:01.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:23.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -114,6 +113,28 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00041.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62415", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1420.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1420.json index bb888848b76..59f7a601cf4 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1420.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1420.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1420", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-16T10:59:06.007", - "lastModified": "2016-12-28T02:59:03.993", + "lastModified": "2024-11-21T02:25:23.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -143,6 +142,62 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187534", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=linux-kernel&m=142247707318982&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72357", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2660-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2661-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2665-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2667-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187534", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1421.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1421.json index 098100e05dc..201237db784 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1421.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1421.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1421", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-16T10:59:06.880", - "lastModified": "2023-11-07T02:24:49.410", + "lastModified": "2024-11-21T02:25:23.313", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -311,6 +309,157 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=600ddd6825543962fb807884169e57b580dba208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0726.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0751.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0782.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1082.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/15", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72356", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032172", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2541-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2542-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2545-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2546-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2562-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2563-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196581", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/600ddd6825543962fb807884169e57b580dba208", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1422.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1422.json index 1df9f09d29f..a43de001dc3 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1422.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1422.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1422", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-29T15:59:01.187", - "lastModified": "2017-09-08T01:29:48.590", + "lastModified": "2024-11-21T02:25:23.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,43 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99977", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/116967", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116969", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/116970", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129929/Gecko-CMS-2.2-2.3-CSRF-XSS-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5222.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99977", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1423.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1423.json index 02ac09d4739..75d4162740f 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1423.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1423.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1423", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-29T15:59:02.857", - "lastModified": "2017-09-08T01:29:48.653", + "lastModified": "2024-11-21T02:25:23.643", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -105,6 +104,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99976", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/116968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129929/Gecko-CMS-2.2-2.3-CSRF-XSS-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5222.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99976", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1424.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1424.json index 570baa48017..6a3a4629639 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1424.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1424.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1424", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-29T15:59:03.920", - "lastModified": "2017-09-08T01:29:48.717", + "lastModified": "2024-11-21T02:25:23.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99974", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/116966", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/129929/Gecko-CMS-2.2-2.3-CSRF-XSS-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5222.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99974", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1426.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1426.json index 388905fb654..e3e6d21725e 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1426.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1426.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1426", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:01.680", - "lastModified": "2019-07-11T13:00:07.330", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:24.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -423,6 +422,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2015-1426", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json index dc307fcf7a0..d93ecff838a 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json @@ -2,13 +2,8 @@ "id": "CVE-2015-1427", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-17T15:59:04.560", - "lastModified": "2024-07-16T17:56:22.883", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-25", - "cisaActionDue": "2022-04-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability", + "lastModified": "2024-11-21T02:25:24.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-25", + "cisaActionDue": "2022-04-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -186,6 +185,72 @@ "Not Applicable", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130368/Elasticsearch-1.3.7-1.4.2-Sandbox-Escape-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130784/ElasticSearch-Unauthenticated-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.elasticsearch.com/blog/elasticsearch-1-4-3-1-3-8-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534689/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:0868", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100850", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.elastic.co/community/security/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1428.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1428.json index a89c4d62614..0ddc514afd9 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1428.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1428.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1428", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:23.453", - "lastModified": "2018-10-09T19:55:51.513", + "lastModified": "2024-11-21T02:25:24.393", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ { "url": "https://github.com/sefrengo-cms/sefrengo-1.x/commit/22c0d16bfd715631ed317cc990785ccede478f07", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/35972", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.itas.vn/news/itas-team-found-out-multiple-sql-injection-vulnerabilities-in-sefrengo-cms-v1-6-1-74.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534593/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/sefrengo-cms/sefrengo-1.x/commit/0b1edd4b22a47743eff7cfaf884ba2a4e06e15eb", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/sefrengo-cms/sefrengo-1.x/commit/22c0d16bfd715631ed317cc990785ccede478f07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1431.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1431.json index ebf8c139048..ea771323f81 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1431.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1431.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1431", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T17:59:00.057", - "lastModified": "2017-09-08T01:29:48.873", + "lastModified": "2024-11-21T02:25:24.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,38 @@ { "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/373", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72405", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpbb/phpbb/commit/eaeb88133f1f028fa06f0ebe5639668436fd469e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpbb/phpbb/pull/3316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-25", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tracker.phpbb.com/browse/PHPBB3-13531", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1432.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1432.json index facb6b498a7..97486f66412 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1432.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1432.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1432", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T17:59:01.290", - "lastModified": "2017-09-08T01:29:48.933", + "lastModified": "2024-11-21T02:25:24.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,38 @@ { "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/373", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72399", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100671", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpbb/phpbb/commit/23069a13e203985ab124d1139e8de74b12778449", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpbb/phpbb/pull/3311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-25", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://tracker.phpbb.com/browse/PHPBB3-13526", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1433.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1433.json index 042addf6764..9afd30bc1e8 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1433.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1433.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1433", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:24.983", - "lastModified": "2018-10-30T16:27:35.843", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:25.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -144,6 +143,46 @@ { "url": "http://www.securityfocus.com/bid/72401", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149877.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://roundcube.net/news/2015/01/24/security-update-1.0.5/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://trac.roundcube.net/changeset/786aa0725/github", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://trac.roundcube.net/ticket/1490227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/31/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72401", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1434.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1434.json index 6a92c852d7d..54ad7260d9f 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1434.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1434.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1434", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:04.480", - "lastModified": "2019-03-13T15:54:02.003", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:25.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -121,6 +120,55 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://mylittleforum.net/forum/index.php?id=8182", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130356/My-Little-Forum-2.3.3-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534681/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72575", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100855", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23248", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1435.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1435.json index 3943743ad74..f3b3b53d3a4 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1435.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1435.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1435", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:06.277", - "lastModified": "2019-03-13T16:14:22.137", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:25.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,55 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://mylittleforum.net/forum/index.php?id=8182", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130356/My-Little-Forum-2.3.3-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534681/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72582", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100856", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23248", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1436.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1436.json index 9b1f750a773..f2a4f9072d1 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1436.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1436.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1436", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:07.120", - "lastModified": "2019-03-13T15:52:46.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:25.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,54 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130355/WordPress-Easing-Slider-2.2.0.6-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534680/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72572", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100861", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "https://wordpress.org/plugins/easing-slider/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1437.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1437.json index de58a1f5562..cdde539e1a5 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1437.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1437.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1437", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T16:59:03.123", - "lastModified": "2018-10-09T19:55:53.373", + "lastModified": "2024-11-21T02:25:25.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -114,6 +113,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100566", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130187/Asus-RT-N10-Plus-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534579/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534580/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534612/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72369", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100566", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1441.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1441.json index 373e42c9809..19430c8def3 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1441.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1441.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1441", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:26.563", - "lastModified": "2015-02-04T17:02:32.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:25.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -166,6 +165,45 @@ { "url": "http://www.securityfocus.com/bid/72400", "source": "cve@mitre.org" + }, + { + "url": "http://piwigo.org/forum/viewtopic.php?id=25016", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://piwigo.org/releases/2.5.6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://piwigo.org/releases/2.6.5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://piwigo.org/releases/2.7.3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/62606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72400", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1442.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1442.json index ec74ad121e9..53d363aa884 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1442.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1442.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1442", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:13.603", - "lastModified": "2015-02-09T14:14:34.497", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:26.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,56 @@ { "url": "http://www.securityfocus.com/bid/72398", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130192/ZeroCMS-1.3.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/379", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/380", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/02/addition-for-advisory-sroeadv-2015-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72398", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1444.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1444.json index f24e4432e80..2e919d4a196 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1444.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1444.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1444", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:14.697", - "lastModified": "2019-02-04T21:24:33.980", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:26.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,36 @@ "tags": [ "VDB Entry" ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/376", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.fli4l.de/fileadmin/fli4l/security/advisory-FFL-1113.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100610", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1448.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1448.json index 3048599b4d5..100d5325c33 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1448.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1448.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1448", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T15:59:08.317", - "lastModified": "2015-02-04T05:27:01.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:26.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -129,6 +128,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-753139.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1449.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1449.json index 19f8c6cfb45..6d54aa1a4f1 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1449.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1449.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1449", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T15:59:09.223", - "lastModified": "2015-02-04T05:27:31.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:26.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -129,6 +128,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-753139.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1450.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1450.json index acaf9017fb9..2c7e0c3fdcf 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1450.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1450.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1450", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T15:59:10.067", - "lastModified": "2015-02-04T05:27:50.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:27.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130122/Restaurantbiller-SQL-Injection-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1451.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1451.json index 1c6c355fd5f..3b1e98b2a43 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1451.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1451.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1451", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T16:59:04.553", - "lastModified": "2015-02-19T18:58:47.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:27.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -100,6 +99,35 @@ { "url": "http://www.securityfocus.com/bid/72383", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/125", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/61661", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiOS_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72383", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1452.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1452.json index a4699fa96bc..65d6ff3764f 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1452.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1452.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1452", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T16:59:05.520", - "lastModified": "2015-02-19T18:59:16.610", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:27.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "http://www.securityfocus.com/bid/72383", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/61661", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiOS_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72383", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1453.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1453.json index 8bdcf9c4093..a9b1e935317 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1453.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1453.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1453", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T16:59:06.457", - "lastModified": "2015-11-30T19:49:23.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:27.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ { "url": "http://www.securityfocus.com/bid/72383", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiClient_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72383", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1454.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1454.json index 6b038c410da..c16949611ee 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1454.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1454.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1454", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-02T16:59:07.287", - "lastModified": "2019-02-05T18:13:48.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:27.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 7.1 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -110,6 +109,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa89", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1455.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1455.json index 09008996326..be85e796fd0 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1455.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1455.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1455", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:27.563", - "lastModified": "2015-02-19T18:59:27.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:27.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "http://www.securityfocus.com/bid/72378", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-003/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiAuthenticator_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72378", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1456.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1456.json index b3b801cca1c..0b13836dd1d 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1456.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1456.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1456", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:28.437", - "lastModified": "2015-02-19T18:59:40.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:27.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,25 @@ { "url": "http://www.securityfocus.com/bid/72378", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-003/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiAuthenticator_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72378", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1457.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1457.json index 63d4a485070..333b5405024 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1457.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1457.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1457", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:29.250", - "lastModified": "2017-09-08T01:29:49.293", + "lastModified": "2024-11-21T02:25:28.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100560", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-003/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiAuthenticator_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72378", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100560", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1458.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1458.json index 1f673f90a17..7135f71e071 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1458.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1458.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1458", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:30.063", - "lastModified": "2017-09-08T01:29:49.340", + "lastModified": "2024-11-21T02:25:28.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100559", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiAuthenticator_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72378", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100559", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1459.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1459.json index 93fb9040f09..c32321041d7 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1459.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1459.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1459", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:31.030", - "lastModified": "2017-09-08T01:29:49.403", + "lastModified": "2024-11-21T02:25:28.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100561", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/62836", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-003/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiAuthenticator_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72378", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100561", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1460.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1460.json index 0acae7a6624..c963525cf89 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1460.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1460.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1460", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:32.000", - "lastModified": "2015-02-04T17:51:51.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:28.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -131,6 +130,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-411975.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1461.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1461.json index a688bdb8ca1..2e22cada705 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1461.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1461.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1461", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:33.220", - "lastModified": "2016-12-07T18:09:31.960", + "lastModified": "2024-11-21T02:25:28.673", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,41 @@ { "url": "https://security.gentoo.org/glsa/201512-08", "source": "cve@mitre.org" + }, + { + "url": "http://blog.clamav.net/2015/01/clamav-0986-has-been-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148950.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148958.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62536", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securitytracker.com/id/1031672", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1462.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1462.json index 2afc5ca40db..77c0c51da7e 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1462.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1462.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1462", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:34.093", - "lastModified": "2016-12-07T18:09:33.100", + "lastModified": "2024-11-21T02:25:28.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,41 @@ { "url": "https://security.gentoo.org/glsa/201512-08", "source": "cve@mitre.org" + }, + { + "url": "http://blog.clamav.net/2015/01/clamav-0986-has-been-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148950.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148958.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62536", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securitytracker.com/id/1031672", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1463.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1463.json index 0a8e1ec27f0..0953a39ea40 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1463.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1463.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1463", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T16:59:34.937", - "lastModified": "2016-12-07T18:09:34.193", + "lastModified": "2024-11-21T02:25:28.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,33 @@ { "url": "https://security.gentoo.org/glsa/201512-08", "source": "cve@mitre.org" + }, + { + "url": "http://blog.clamav.net/2015/01/clamav-0986-has-been-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148950.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148958.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1464.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1464.json index 15604a0886b..831cae2edc8 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1464.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1464.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1464", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:06.450", - "lastModified": "2015-10-28T02:15:51.970", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:29.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -161,6 +160,25 @@ { "url": "http://www.debian.org/security/2015/dsa-3176", "source": "cve@mitre.org" + }, + { + "url": "http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3176", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1465.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1465.json index 127c4a06230..0de88268111 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1465.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1465.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1465", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-05T21:59:01.233", - "lastModified": "2023-11-07T02:24:49.790", + "lastModified": "2024-11-21T02:25:29.287", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -228,6 +227,108 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=df4d92549f23e1c037e83323aff58a21b3de7fe0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/03/13", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1036763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2545-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2546-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2562-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2563-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183744", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/df4d92549f23e1c037e83323aff58a21b3de7fe0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1467.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1467.json index f2ac86417b5..ce7fdc8f407 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1467.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1467.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1467", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:15.820", - "lastModified": "2018-10-09T19:55:54.247", + "lastModified": "2024-11-21T02:25:29.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100668", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130242/Fork-CMS-3.8.5-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.fork-cms.com/blog/detail/fork-3.8.6-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534616/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100668", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1469.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1469.json index eff9eb37549..09ac43dc93a 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1469.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1469.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1469", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-03T22:59:05.067", - "lastModified": "2015-02-04T17:53:27.097", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:29.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -92,6 +91,14 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/522460", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1471.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1471.json index 09fd859605f..e7d673bba75 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1471.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1471.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1471", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-12T16:59:05.050", - "lastModified": "2015-02-13T20:57:29.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:29.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -108,6 +107,43 @@ { "url": "https://github.com/delta/pragyan/issues/206", "source": "cve@mitre.org" + }, + { + "url": "http://pastebin.com/ip2gGYuS", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/18", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/402", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-11.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/02/advisory-for-sroeadv-2015-11.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/delta/pragyan/commit/c93bc100ec93fc78940fbdca9b6b009101858309", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/delta/pragyan/issues/206", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1472.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1472.json index 2651e59656b..11295636886 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1472.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1472.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1472", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-08T10:59:02.673", - "lastModified": "2023-11-07T02:24:49.893", + "lastModified": "2024-11-21T02:25:29.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -158,6 +157,62 @@ { "url": "https://sourceware.org/ml/libc-alpha/2015-02/msg00119.html", "source": "cve@mitre.org" + }, + { + "url": "http://openwall.com/lists/oss-security/2015/02/04/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Jun/18", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Sep/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2519-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/bugtraq/2019/Jun/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/bugtraq/2019/Sep/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201602-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/ml/libc-alpha/2015-02/msg00119.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1473.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1473.json index 61eb75ab31d..c43d9ac9ad3 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1473.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1473.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1473", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-08T10:59:03.627", - "lastModified": "2023-11-07T02:24:49.967", + "lastModified": "2024-11-21T02:25:30.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -122,6 +121,26 @@ { "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06", "source": "cve@mitre.org" + }, + { + "url": "http://openwall.com/lists/oss-security/2015/02/04/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2519-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1474.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1474.json index 25a175b37d3..9be300d3239 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1474.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1474.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1474", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T00:59:06.467", - "lastModified": "2017-09-29T01:34:48.013", + "lastModified": "2024-11-21T02:25:30.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,51 @@ { "url": "https://www.blackhat.com/docs/us-15/materials/us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege.pdf", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130778/Google-Android-Integer-Oveflow-Heap-Corruption.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/63", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72788", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031875", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://www.blackhat.com/docs/us-15/materials/us-15-Gong-Fuzzing-Android-System-Services-By-Binder-Call-To-Escalate-Privilege.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1475.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1475.json index e16bf9e29f6..56a9450fd20 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1475.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1475.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1475", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T16:59:04.107", - "lastModified": "2017-09-08T01:29:49.513", + "lastModified": "2024-11-21T02:25:30.393", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100616", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130220/My-Little-Forum-2.3.3-2.2-1.7-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/xss-vulnerability/my-little-forum-multiple-xss-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100616", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1476.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1476.json index b16fe1f9dec..d37fba4d845 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1476.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1476.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1476", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T16:59:05.373", - "lastModified": "2015-02-04T19:40:11.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:30.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/117569", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/117570", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130073/ecommerceMajor-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35878", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1477.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1477.json index 8e5cf431dd5..a171fcc12da 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1477.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1477.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1477", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T16:59:06.297", - "lastModified": "2015-02-04T19:54:25.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:30.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/117567", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130093/JClassifiedsManager-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35911", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1478.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1478.json index c1f51dac1c6..774ed34cb9f 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1478.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1478.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1478", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T16:59:07.187", - "lastModified": "2015-02-04T19:54:46.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:30.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/117568", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130093/JClassifiedsManager-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35911", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1479.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1479.json index be1c47332e4..f114a292870 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1479.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1479.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1479", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T16:59:08.030", - "lastModified": "2015-02-06T20:40:06.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:30.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -107,6 +106,41 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130079/ManageEngine-ServiceDesk-9.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35890", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.manageengine.com/products/service-desk/readme-9.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.rewterz.com/vulnerabilities/manageengine-servicedesk-sql-injection-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72299", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1480.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1480.json index 62dfacceb3c..aa468a95555 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1480.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1480.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1480", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T16:59:09.187", - "lastModified": "2018-10-09T19:55:54.623", + "lastModified": "2024-11-21T02:25:31.147", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -112,6 +111,46 @@ { "url": "http://www.securityfocus.com/bid/72302", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/117499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130081/ManageEngine-ServiceDesk-Plus-9.0-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35904", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.manageengine.com/products/service-desk/readme-9.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.rewterz.com/vulnerabilities/manageengine-servicedesk-plus-user-privileges-management-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534538/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72302", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1481.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1481.json index f6108e2c398..f1429bc1dbd 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1481.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1481.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1481", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:10.293", - "lastModified": "2018-10-09T19:55:55.107", + "lastModified": "2024-11-21T02:25:31.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -104,6 +103,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129944/Ansible-Tower-2.0.2-XSS-Privilege-Escalation-Authentication-Missing.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/52", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35786", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534464/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150113-1_Ansible-Tower_multiple-vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1482.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1482.json index b8318c6ae10..2d7b0916f22 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1482.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1482.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1482", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-04T18:59:11.387", - "lastModified": "2018-10-09T19:55:55.467", + "lastModified": "2024-11-21T02:25:31.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/129944/Ansible-Tower-2.0.2-XSS-Privilege-Escalation-Authentication-Missing.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/52", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35786", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534464/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150113-1_Ansible-Tower_multiple-vulnerabilities_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1483.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1483.json index d0ba223df7a..5dee4020392 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1483.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1483.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1483", "sourceIdentifier": "secure@symantec.com", "published": "2015-03-06T03:00:25.423", - "lastModified": "2015-03-12T14:24:32.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:31.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -113,6 +112,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72737", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150302_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1484.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1484.json index d6db4ca8436..80ad390f3a2 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1484.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1484.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1484", "sourceIdentifier": "secure@symantec.com", "published": "2015-04-22T10:59:00.067", - "lastModified": "2017-01-03T02:59:48.053", + "lastModified": "2024-11-21T02:25:31.773", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -92,6 +90,22 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150410_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1494.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1494.json index 6184200eb77..7d1f736ccc5 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1494.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1494.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1494", "sourceIdentifier": "secalert@redhat.com", "published": "2015-02-17T15:59:05.623", - "lastModified": "2021-09-13T10:46:48.023", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:33.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -131,6 +130,65 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://blog.sucuri.net/2015/02/zero-day-in-the-fancybox-for-wordpress-plugin.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/118543", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/05/10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72506", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/1082625/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://wordpress.org/plugins/fancybox-for-wordpress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://wordpress.org/support/topic/possible-malware-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1495.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1495.json index 3ae355e5071..addc55b5bed 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1495.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1495.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1495", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:08.137", - "lastModified": "2015-02-17T17:54:11.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:33.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-033/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-034/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://portal.motorolasolutions.com/Support/US-EN/Resolution?solutionId=87666", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1496.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1496.json index 452e4a4edfb..860be0b7b4d 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1496.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1496.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1496", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:09.463", - "lastModified": "2015-02-17T17:55:25.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:33.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -90,6 +89,25 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-035/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-036/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-037/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://portal.motorolasolutions.com/Support/US-EN/Resolution?solutionId=87666", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1497.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1497.json index 5afa0bb7f9c..87f2bf9440a 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1497.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1497.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1497", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:10.463", - "lastModified": "2017-09-03T01:29:01.467", + "lastModified": "2024-11-21T02:25:33.557", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,47 @@ { "url": "https://www.exploit-db.com/exploits/40491/", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/118382", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130459/HP-Client-Automation-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36169", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36206", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-038/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/40491/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1498.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1498.json index 5d82e88d00f..60391e2ba9d 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1498.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1498.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1498", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:11.590", - "lastModified": "2016-05-18T22:36:31.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:33.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-039/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://radiasupport.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1499.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1499.json index ddcbb154ff2..31e15d72c50 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1499.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1499.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1499", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:12.700", - "lastModified": "2017-09-08T01:29:49.560", + "lastModified": "2024-11-21T02:25:33.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100918", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-041/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100918", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1500.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1500.json index c432285767f..f35c20bb5b4 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1500.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1500.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1500", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:13.573", - "lastModified": "2015-02-17T17:32:31.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:34.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-044/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-042/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-044/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1501.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1501.json index 00aa1735400..e145ae277a8 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1501.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1501.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1501", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:14.417", - "lastModified": "2015-02-17T17:33:00.540", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:34.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-043/", "source": "cve@mitre.org" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-043/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1512.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1512.json index 2f95fb36e95..780953a2b50 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1512.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1512.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1512", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:17.163", - "lastModified": "2017-09-08T01:29:49.623", + "lastModified": "2024-11-21T02:25:34.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130119/FancyFon-FAMOC-3.16.5-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100410", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2014-011.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1513.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1513.json index 6968f87f902..5e28d3d56c4 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1513.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1513.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1513", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:18.367", - "lastModified": "2017-09-08T01:29:49.687", + "lastModified": "2024-11-21T02:25:34.667", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100582", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130194/SIPhone-Enterprise-PBX-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100582", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1514.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1514.json index f65c7c47167..25c2c4f3d22 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1514.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1514.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1514", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-06T15:59:19.353", - "lastModified": "2018-10-09T19:55:55.797", + "lastModified": "2024-11-21T02:25:34.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130117/FancyFon-FAMOC-3.16.5-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534552/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2014-010.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1515.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1515.json index 2d8eb93c071..fc52eb805d0 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1515.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1515.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1515", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:13.737", - "lastModified": "2015-02-21T01:23:36.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:34.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -82,6 +81,17 @@ { "url": "http://www.osvdb.org/117996", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/36052", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/117996", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1517.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1517.json index 66c2ac13ce7..ec2e503ce96 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1517.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1517.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1517", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-20T16:59:05.163", - "lastModified": "2018-10-09T19:55:56.013", + "lastModified": "2024-11-21T02:25:35.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -102,6 +101,36 @@ { "url": "http://www.securityfocus.com/bid/72664", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130440/Piwigo-2.7.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://piwigo.org/forum/viewtopic.php?id=25179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://piwigo.org/releases/2.7.4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534723/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72664", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1518.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1518.json index 457fd1b6c71..8de6b99d47b 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1518.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1518.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1518", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-11T19:59:01.197", - "lastModified": "2018-10-09T19:55:56.373", + "lastModified": "2024-11-21T02:25:35.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ { "url": "http://www.securityfocus.com/archive/1/534661/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130322/Radexscript-CMS-2.2.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/39", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.itas.vn/news/itas-team-found-out-a-sql-injection-vulnerability-in-redaxscript-2-2-0-cms-75.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534661/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1545.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1545.json index 7dd18f9eedd..384eea846d3 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1545.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1545.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1545", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-12T16:59:06.143", - "lastModified": "2023-11-07T02:24:50.533", + "lastModified": "2024-11-21T02:25:37.720", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -16,13 +14,6 @@ "value": "La funci\u00f3n deref_parseCtrl en servers/slapd/overlays/deref.c en OpenLDAP 2.4.13 hasta 2.4.40 permite a atacantes remotos causar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda) a trav\u00e9s de una lista de atributos vac\u00eda en un control de referencia en una solicitud de b\u00fasqueda." } ], - "vendorComments": [ - { - "organization": "openldap.org", - "comment": "Note that the deref overlay is not enabled by default, so this vulnerability only affects sites that have explicitly configured their servers to load and enable the overlay. Since this overlay has never been documented, there are no sites outside of the OpenLDAP developer community with a legitimate reason to enable this module.", - "lastModified": "2015-02-25T11:33:12.727" - } - ], "metrics": { "cvssMetricV2": [ { @@ -31,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -290,6 +281,90 @@ { "url": "https://support.apple.com/kb/HT210788", "source": "cve@mitre.org" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Dec/26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:074", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc562c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openldap.org/its/?findid=8027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032399", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/bugtraq/2019/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT210788", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference", + "vendorComments": [ + { + "organization": "openldap.org", + "comment": "Note that the deref overlay is not enabled by default, so this vulnerability only affects sites that have explicitly configured their servers to load and enable the overlay. Since this overlay has never been documented, there are no sites outside of the OpenLDAP developer community with a legitimate reason to enable this module.", + "lastModified": "2015-02-25T11:33:12.727" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1546.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1546.json index b1cea29c666..368587d685c 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1546.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1546.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1546", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-12T16:59:07.097", - "lastModified": "2023-11-07T02:24:50.620", + "lastModified": "2024-11-21T02:25:37.930", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE - CWE-415: Double Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -147,6 +145,47 @@ { "url": "https://support.apple.com/HT204659", "source": "cve@mitre.org" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:073", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=2f1a2dd329b91afe561cd06b872d09630d4edb6a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openldap.org/its/?findid=8046", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776991", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100938", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT204659", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE - CWE-415: Double Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1548.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1548.json index 32a6e3d8b97..05db611d93c 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1548.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1548.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1548", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T19:59:02.677", - "lastModified": "2016-12-22T02:59:34.440", + "lastModified": "2024-11-21T02:25:38.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ { "url": "http://www.securityfocus.com/bid/73450", "source": "cve@mitre.org" + }, + { + "url": "http://itinsight.hu/en/posts/articles/2015-01-23-mini-httpd/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73450", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1558.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1558.json index aa65aa5aa6d..ea8b6a4137d 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1558.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1558.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1558", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-09T11:59:00.067", - "lastModified": "2018-10-09T19:55:56.797", + "lastModified": "2024-11-21T02:25:38.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -255,6 +254,25 @@ { "url": "http://www.securitytracker.com/id/1031661", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2015-001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/116", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534573/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031661", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1559.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1559.json index 8d742efeffb..573525eac1d 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1559.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1559.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1559", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T17:59:02.183", - "lastModified": "2017-09-08T01:29:49.873", + "lastModified": "2024-11-21T02:25:39.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100735", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/30", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/468", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/475", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.efrontlearning.net/download", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100735", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1562.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1562.json index 165d9fd1116..31ce4cd5e6d 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1562.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1562.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1562", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-09T11:59:06.117", - "lastModified": "2015-02-09T19:16:57.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:39.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,35 @@ { "url": "https://github.com/sauruscms/Saurus-CMS-Community-Edition/commit/8dec044d0fdabcb9b04e58037623385a97b0d288", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/112", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/report-for-advisory-sroeadv-2015-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/28/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/sauruscms/Saurus-CMS-Community-Edition/commit/8dec044d0fdabcb9b04e58037623385a97b0d288", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1563.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1563.json index c1257176320..234f22ec527 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1563.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1563.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1563", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-09T11:59:08.160", - "lastModified": "2018-10-30T16:26:53.700", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:39.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -214,6 +213,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72766", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031663", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1564.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1564.json index ba878866bfd..dac9c4a7c2c 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1564.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1564.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1564", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-09T17:59:00.077", - "lastModified": "2015-02-09T19:28:43.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:39.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/79", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secupent.com/exploit/WebGUI-7.10.29-XSS.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1565.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1565.json index b4041d9881c..320780b2366 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1565.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1565.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1565", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-09T17:59:05.373", - "lastModified": "2015-02-09T19:29:06.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:40.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -170,6 +169,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/62584", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS15-001/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1566.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1566.json index 82b3e398590..4235bb109fc 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1566.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1566.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1566", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-09T17:59:10.687", - "lastModified": "2015-02-09T19:28:40.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:40.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/62832", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.dnnsoftware.com/platform/manage/security-center", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1567.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1567.json index b1235235fd0..d6175bc1188 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1567.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1567.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1567", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-09T17:59:12.670", - "lastModified": "2017-09-08T01:29:49.920", + "lastModified": "2024-11-21T02:25:40.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2415219", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2415885", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1568.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1568.json index ee18c331a0b..3ffddd75f59 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1568.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1568.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1568", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-09T17:59:13.623", - "lastModified": "2017-09-08T01:29:49.967", + "lastModified": "2024-11-21T02:25:40.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100628", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2415219", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2415885", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1569.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1569.json index 4c87906667e..d6177ed4914 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1569.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1569.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1569", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T20:59:04.077", - "lastModified": "2015-02-11T19:44:15.410", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:40.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiClient_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1570.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1570.json index 334e35ae246..d03ee3f28e4 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1570.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1570.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1570", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T20:59:05.200", - "lastModified": "2015-02-11T19:35:06.533", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:40.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiClient_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1571.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1571.json index aa6ed092df2..52bddcb6d24 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1571.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1571.json @@ -2,7 +2,7 @@ "id": "CVE-2015-1571", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-10T20:59:06.263", - "lastModified": "2024-08-06T05:15:34.607", + "lastModified": "2024-11-21T02:25:40.910", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +99,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/125", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiOS_Multiple_Vulnerabilities.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1572.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1572.json index bd83261c0e5..df1e66a595e 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1572.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1572.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1572", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T15:59:05.660", - "lastModified": "2017-11-08T02:29:01.083", + "lastModified": "2024-11-21T02:25:41.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -172,6 +171,61 @@ { "url": "https://security.gentoo.org/glsa/201507-22", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3166", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:068", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72709", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2507-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-22", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1574.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1574.json index 31d30b20f90..a2ad2c08884 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1574.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1574.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1574", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-15T20:59:01.620", - "lastModified": "2018-10-09T19:55:57.700", + "lastModified": "2024-11-21T02:25:41.393", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -101,6 +100,36 @@ { "url": "http://www.securityfocus.com/archive/1/534703/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://hmarco.org/bugs/google_email_app_4.2.2_denial_of_service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2015/02/10/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2015/02/12/15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130388/Google-Email-4.4.2.0200-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/58", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534703/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1575.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1575.json index 1e801aec424..98681c0b1e6 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1575.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1575.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1575", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-11T19:59:02.917", - "lastModified": "2015-02-12T17:51:58.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:41.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130292/u5CMS-3.9.3-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5223.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1576.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1576.json index a76734bf4b3..3c16b49d439 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1576.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1576.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1576", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-11T19:59:03.917", - "lastModified": "2015-02-12T17:52:23.413", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:41.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130326/u5CMS-3.9.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5225.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1577.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1577.json index 9b7e7a2fce1..e1719d649ad 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1577.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1577.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1577", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-11T19:59:04.823", - "lastModified": "2015-02-12T17:53:25.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:41.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -93,6 +92,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130325/u5CMS-3.9.3-Arbitrary-File-Deletion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36026", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5226.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1578.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1578.json index dd782647fec..94f0424912c 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1578.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1578.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1578", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-11T19:59:05.573", - "lastModified": "2015-02-12T17:53:47.947", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:25:41.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +85,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130317/u5CMS-3.9.3-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5227.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1579.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1579.json index fc85e6314e1..d8eb75fd734 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1579.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1579.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1579", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-11T19:59:06.417", - "lastModified": "2017-07-17T13:18:04.157", + "lastModified": "2024-11-21T02:25:42.147", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "https://wpvulndb.com/vulnerabilities/7540", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/36039", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7540", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1580.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1580.json index 92cd62abb05..acc4621179d 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1580.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1580.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1580", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-11T19:59:07.227", - "lastModified": "2015-02-12T17:54:54.743", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:42.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130314/WordPress-Redirection-Page-1.2-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1581.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1581.json index d16d6f5ff7d..80aa4b66088 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1581.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1581.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1581", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-11T19:59:08.227", - "lastModified": "2015-02-12T17:55:14.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:42.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130316/WordPress-Mobile-Domain-1.5.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1582.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1582.json index 4d11a3e9715..6e6282a27bc 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1582.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1582.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1582", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-11T19:59:09.260", - "lastModified": "2015-02-12T17:55:44.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:42.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,20 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/130318/WordPress-Spider-Facebook-1.0.10-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/spider-facebook/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1585.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1585.json index ed8667d9ca8..816ffd9dbe4 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1585.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1585.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1585", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:14.673", - "lastModified": "2018-10-09T19:55:58.153", + "lastModified": "2024-11-21T02:25:42.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ { "url": "https://github.com/fatfreecrm/fat_free_crm/wiki/CSRF-Vulnerability-%28CVE-2015-1585%29", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130410/Fat-Free-CRM-0.13.5-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534709/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/fatfreecrm/fat_free_crm/wiki/CSRF-Vulnerability-%28CVE-2015-1585%29", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1587.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1587.json index c3f923e1442..c7af2d5a39c 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1587.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1587.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1587", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:15.547", - "lastModified": "2015-02-21T01:33:49.950", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", + "lastModified": "2024-11-21T02:25:43.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +102,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://asylum.seraum.com/Security-Alert-GED-ECM-Maarch-Critical-Vulnerabilities.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/113928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130383/Maarch-LetterBox-2.8-Unrestricted-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1589.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1589.json index 779e05d10a3..8226688b3cd 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1589.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1589.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1589", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:02.727", - "lastModified": "2017-09-08T01:29:50.077", + "lastModified": "2024-11-21T02:25:43.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100879", "source": "cve@mitre.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/12/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/12/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100879", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1592.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1592.json index 27580027a6e..56644e443f9 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1592.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1592.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1592", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:16.580", - "lastModified": "2019-10-09T00:20:52.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:43.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -170,6 +169,60 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/12/17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/12/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72606", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100912", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.debian.org/security/2015/dsa-3183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1593.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1593.json index 632e14a0a8e..0aaadb834b2 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1593.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1593.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1593", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-16T10:59:07.727", - "lastModified": "2023-11-07T02:24:51.093", + "lastModified": "2024-11-21T02:25:44.013", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -165,6 +164,99 @@ { "url": "https://lkml.org/lkml/2015/1/7/811", "source": "cve@mitre.org" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e7c22d447bb6d7e37bfe39ff658486ae78e8d77", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://hmarco.org/bugs/linux-ASLR-integer-overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1137.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1138.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1221.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2560-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2561-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2562-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2563-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2564-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2565-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2019:3517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/4e7c22d447bb6d7e37bfe39ff658486ae78e8d77", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://lkml.org/lkml/2015/1/7/811", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1594.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1594.json index 2ff10c98a37..8ffa9ac0aae 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1594.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1594.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1594", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-07T02:59:03.803", - "lastModified": "2016-08-24T19:55:04.207", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", + "lastModified": "2024-11-21T02:25:44.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -171,6 +169,22 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1032039", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-451236.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1595.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1595.json index 7171a9eabed..19bfc54cade 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1595.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1595.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1595", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-07T02:59:04.943", - "lastModified": "2015-07-15T15:07:32.277", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:44.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-185226.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1596.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1596.json index c660b4fede2..272e758daa4 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1596.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1596.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1596", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-07T02:59:05.833", - "lastModified": "2015-03-09T15:23:47.180", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:44.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-185226.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1597.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1597.json index 836157ebf33..f322d34778c 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1597.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1597.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1597", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-07T02:59:06.707", - "lastModified": "2015-03-09T15:15:52.173", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:44.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-185226.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1598.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1598.json index 84cbba08d00..e79add1a9cd 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1598.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1598.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1598", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-07T02:59:07.457", - "lastModified": "2015-03-09T15:17:36.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:44.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-185226.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-15xx/CVE-2015-1599.json b/CVE-2015/CVE-2015-15xx/CVE-2015-1599.json index cbb5e00f08a..21e36914590 100644 --- a/CVE-2015/CVE-2015-15xx/CVE-2015-1599.json +++ b/CVE-2015/CVE-2015-15xx/CVE-2015-1599.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1599", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-07T02:59:08.397", - "lastModified": "2015-03-09T15:57:16.423", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:44.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-185226.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1601.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1601.json index 56977e59248..a4d7746d922 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1601.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1601.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1601", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-06T01:59:01.667", - "lastModified": "2016-11-28T19:18:22.457", + "lastModified": "2024-11-21T02:25:45.227", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,22 @@ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-487246.pdf", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/72691", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-315836.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-487246.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1602.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1602.json index 5b073c04166..bba221d1a65 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1602.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1602.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1602", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-06T01:59:03.090", - "lastModified": "2015-04-23T04:54:15.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:45.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -90,6 +89,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-315836.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1603.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1603.json index ab0b05146fd..c27951bcfaa 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1603.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1603.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1603", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:17.563", - "lastModified": "2015-02-21T01:38:27.337", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:45.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -133,6 +132,67 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/50", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/02/report-for-advisory-sroeadv-2015-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/14/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72605", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/kneecht/adminsystems/issues/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/kneecht/adminsystems/releases/tag/4.0.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1604.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1604.json index 65932778331..7c4efd2e2f5 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1604.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1604.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1604", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:18.610", - "lastModified": "2015-02-21T01:40:33.790", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:45.690", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -129,6 +128,63 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/50", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/02/report-for-advisory-sroeadv-2015-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/14/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72605", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/kneecht/adminsystems/issues/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/kneecht/adminsystems/releases/tag/4.0.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1605.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1605.json index 969b2b71392..70bdbedfb25 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1605.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1605.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1605", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T15:59:07.613", - "lastModified": "2015-02-25T16:58:46.123", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:45.837", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-049/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/72697", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-048/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-049/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1608.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1608.json index a2d70f0082d..4cb732901ef 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1608.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1608.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1608", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T02:59:00.060", - "lastModified": "2016-12-31T02:59:20.453", + "lastModified": "2024-11-21T02:25:46.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -91,6 +90,26 @@ { "url": "http://www.securityfocus.com/bid/72518", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/669156", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/BLUU-9RUTH4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72518", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1609.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1609.json index e616b852f4e..1d2a487ea4b 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1609.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1609.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1609", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T14:59:02.210", - "lastModified": "2017-07-01T01:29:13.530", + "lastModified": "2024-11-21T02:25:46.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -151,6 +150,30 @@ { "url": "https://security.gentoo.org/glsa/201611-13", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152493.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153690.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1034466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.splunk.com/view/SP-CAAAPC3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://jira.mongodb.org/browse/SERVER-17264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201611-13", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1613.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1613.json index ed80cf2fc2c..39fc68ae66d 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1613.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1613.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1613", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:15.417", - "lastModified": "2015-02-17T17:13:41.533", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:47.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://rhodecode.com/blog/rhodecode-enterprise-security-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1614.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1614.json index e45c5124896..95b6e5abd6f 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1614.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1614.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1614", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:19.610", - "lastModified": "2018-10-09T19:55:59.280", + "lastModified": "2024-11-21T02:25:47.317", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100926", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130404/WordPress-Image-Metadata-Cruncher-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534711/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534718/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100926", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1616.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1616.json index 33ac24978fc..8229a8a2843 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1616.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1616.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1616", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-17T15:59:07.217", - "lastModified": "2015-02-18T18:56:09.010", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:47.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10098", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1617.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1617.json index a57c7ffd483..b9d552c806a 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1617.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1617.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1617", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-17T15:59:08.263", - "lastModified": "2015-02-18T18:56:23.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:47.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10098", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1618.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1618.json index d81cc25d06b..4cce240a5f0 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1618.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1618.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1618", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-17T15:59:09.170", - "lastModified": "2015-02-18T18:56:38.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:47.767", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10098", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1619.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1619.json index 8e43c88d1d3..e8c94f0eeb9 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1619.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1619.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1619", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-17T15:59:10.107", - "lastModified": "2015-02-18T18:57:00.027", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:47.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -159,6 +158,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10099", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1621.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1621.json index 7ed5f5c63ca..0c0e134425f 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1621.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1621.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1621", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-17T15:59:11.077", - "lastModified": "2015-02-18T17:56:46.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:48.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -91,6 +90,25 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2423681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2424405", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1622.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1622.json index aad7debe44a..4c81e01d6e8 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1622.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1622.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1622", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:26.200", - "lastModified": "2018-10-12T22:08:27.337", + "lastModified": "2024-11-21T02:25:48.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72927", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1623.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1623.json index 6000da362b5..b30ee228e56 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1623.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1623.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1623", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:27.170", - "lastModified": "2018-10-12T22:08:27.680", + "lastModified": "2024-11-21T02:25:48.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72928", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1624.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1624.json index ffbaf628994..925ebcb44dd 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1624.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1624.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1624", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:28.060", - "lastModified": "2018-10-12T22:08:27.947", + "lastModified": "2024-11-21T02:25:48.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -106,6 +105,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1625.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1625.json index 2052d84efd2..1bac6380a10 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1625.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1625.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1625", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:29.030", - "lastModified": "2018-10-12T22:08:28.257", + "lastModified": "2024-11-21T02:25:48.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -116,6 +115,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72923", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1626.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1626.json index 184f77f9dd7..6514445d106 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1626.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1626.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1626", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:29.967", - "lastModified": "2018-10-12T22:08:28.617", + "lastModified": "2024-11-21T02:25:48.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72930", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1627.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1627.json index 2f328bd0c12..bb4c00d9488 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1627.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1627.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1627", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:30.827", - "lastModified": "2018-10-12T22:08:28.963", + "lastModified": "2024-11-21T02:25:48.847", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72932", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1628.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1628.json index 78e8c02a34b..42f26f1ff57 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1628.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1628.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1628", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:31.720", - "lastModified": "2018-10-12T22:08:29.273", + "lastModified": "2024-11-21T02:25:48.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-026", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031900", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-026", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1629.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1629.json index 232eb1cefe0..6b9548f34a4 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1629.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1629.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1629", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:32.503", - "lastModified": "2018-10-12T22:08:29.523", + "lastModified": "2024-11-21T02:25:49.067", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-026", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031900", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-026", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1630.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1630.json index 8e784b18be0..16df482d9e0 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1630.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1630.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1630", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:33.317", - "lastModified": "2018-10-12T22:08:29.743", + "lastModified": "2024-11-21T02:25:49.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-026", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031900", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-026", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1631.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1631.json index 3bf4c3e833e..ca1b8756b8b 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1631.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1631.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1631", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:34.113", - "lastModified": "2018-10-12T22:08:30.057", + "lastModified": "2024-11-21T02:25:49.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -84,6 +83,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-026", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031900", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-026", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1632.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1632.json index 3e1bafe76e2..70403605dab 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1632.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1632.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1632", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:34.877", - "lastModified": "2018-10-12T22:08:30.290", + "lastModified": "2024-11-21T02:25:49.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-026", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031900", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-026", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1633.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1633.json index 25c84180a85..aedc8a7b73b 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1633.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1633.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1633", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:35.833", - "lastModified": "2018-10-12T22:08:30.557", + "lastModified": "2024-11-21T02:25:49.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -114,6 +113,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1634.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1634.json index 86f1f49bb70..2f85f5ee56c 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1634.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1634.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1634", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:36.567", - "lastModified": "2018-10-12T22:08:30.930", + "lastModified": "2024-11-21T02:25:49.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/72931", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json index 66b69fa90eb..fba597cafe2 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json @@ -2,13 +2,8 @@ "id": "CVE-2015-1635", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:01.263", - "lastModified": "2019-05-14T19:53:21.813", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-02-10", - "cisaActionDue": "2022-08-10", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft HTTP.sys Remote Code Execution Vulnerability", + "lastModified": "2024-11-21T02:25:49.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -46,6 +41,10 @@ } ] }, + "cisaExploitAdd": "2022-02-10", + "cisaActionDue": "2022-08-10", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft HTTP.sys Remote Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -163,6 +162,64 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/131463/Microsoft-Windows-HTTP.sys-Proof-Of-Concept.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.osvdb.org/120629", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74013", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032109", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-034", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36773/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36776/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1636.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1636.json index 00b0601c963..5e4b2832ec8 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1636.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1636.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1636", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-11T10:59:37.350", - "lastModified": "2018-10-12T22:08:31.947", + "lastModified": "2024-11-21T02:25:49.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -104,6 +103,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1031895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1637.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1637.json index 5d9ec7c1446..bd1e1232b21 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1637.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1637.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1637", "sourceIdentifier": "secure@microsoft.com", "published": "2015-03-06T17:59:00.070", - "lastModified": "2021-04-07T17:15:11.950", + "lastModified": "2024-11-21T02:25:50.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -169,6 +168,49 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://web.archive.org/web/20150321220028/https://freakattack.com/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72965", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-031", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://freakattack.com/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://technet.microsoft.com/library/security/3046015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1638.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1638.json index fb21eff5f61..77d0a7a6530 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1638.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1638.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1638", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:02.310", - "lastModified": "2019-05-08T22:03:15.720", + "lastModified": "2024-11-21T02:25:50.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-040", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-040", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1639.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1639.json index 5573ad942e9..4f5aefe897c 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1639.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1639.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1639", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:03.343", - "lastModified": "2018-10-12T22:08:33.010", + "lastModified": "2024-11-21T02:25:50.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1640.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1640.json index d8b5bacf8e4..d9c5bb0b1e1 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1640.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1640.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1640", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:04.420", - "lastModified": "2018-10-12T22:08:33.273", + "lastModified": "2024-11-21T02:25:50.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-036", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-036", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json index 2113fb3cb33..99a265f6c1e 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json @@ -2,13 +2,8 @@ "id": "CVE-2015-1641", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:05.250", - "lastModified": "2024-07-24T17:06:41.523", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2021-11-03", - "cisaActionDue": "2022-05-03", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Office Memory Corruption Vulnerability", + "lastModified": "2024-11-21T02:25:50.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2021-11-03", + "cisaActionDue": "2022-05-03", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Office Memory Corruption Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -178,6 +177,32 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73995", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032104", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1643.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1643.json index 35a6b4c668c..31fa6574d5d 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1643.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1643.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1643", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:06.267", - "lastModified": "2019-05-14T19:59:23.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:50.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -147,6 +146,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1032113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-038", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1644.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1644.json index eb0e60f100c..430f0aa6c77 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1644.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1644.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1644", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:07.187", - "lastModified": "2019-05-14T20:10:07.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:50.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -155,6 +154,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73998", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032113", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-038", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1645.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1645.json index a75de13b2cf..9a70fa03e4d 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1645.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1645.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1645", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:08.157", - "lastModified": "2019-02-26T14:04:02.400", + "lastModified": "2024-11-21T02:25:51.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -112,6 +111,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-035", "source": "secure@microsoft.com" + }, + { + "url": "http://packetstormsecurity.com/files/131457/Microsoft-Windows-GDI-MRSETDIBITSTODEVICE-bPlay-EMF-Parsing-Memory-Corruption.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535272/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-035", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1646.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1646.json index 154e68691d7..162c6886398 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1646.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1646.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1646", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:09.063", - "lastModified": "2018-10-12T22:08:35.133", + "lastModified": "2024-11-21T02:25:51.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-039", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032114", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-039", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1647.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1647.json index e73e3814939..3d76cf03f16 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1647.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1647.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1647", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:09.923", - "lastModified": "2019-05-14T18:51:38.177", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:51.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -92,6 +91,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1032117", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-042", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1648.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1648.json index 6d38e9d2a39..a7212a30ec5 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1648.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1648.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1648", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:10.827", - "lastModified": "2018-10-12T22:08:35.680", + "lastModified": "2024-11-21T02:25:51.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -114,6 +113,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-041", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032116", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-041", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1649.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1649.json index 739d6556f84..192ef82d5ba 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1649.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1649.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1649", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:11.767", - "lastModified": "2018-10-12T22:08:35.930", + "lastModified": "2024-11-21T02:25:51.463", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -130,6 +128,15 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1650.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1650.json index 31b97833ffd..ee104405985 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1650.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1650.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1650", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:12.657", - "lastModified": "2018-10-12T22:08:36.150", + "lastModified": "2024-11-21T02:25:51.593", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -130,6 +128,15 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1651.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1651.json index bb2a42932c5..75cf245a06b 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1651.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1651.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1651", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:13.407", - "lastModified": "2018-10-12T22:08:36.383", + "lastModified": "2024-11-21T02:25:51.710", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -90,6 +88,15 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1652.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1652.json index 9c7b7e4d9ee..0a875c9afa0 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1652.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1652.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1652", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:14.283", - "lastModified": "2018-10-12T22:08:36.680", + "lastModified": "2024-11-21T02:25:51.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -116,6 +115,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/73990", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1653.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1653.json index e6c3c1a9ca1..cc48c3a48f6 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1653.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1653.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1653", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:15.063", - "lastModified": "2018-10-12T22:08:36.993", + "lastModified": "2024-11-21T02:25:51.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-036", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-036", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1657.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1657.json index 4aae4070448..cd09aa2146f 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1657.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1657.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1657", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:15.890", - "lastModified": "2018-10-12T22:08:37.227", + "lastModified": "2024-11-21T02:25:52.103", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -89,6 +88,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1658.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1658.json index e991f6d7478..db94b7a5812 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1658.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1658.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1658", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:01.410", - "lastModified": "2018-10-12T22:08:37.527", + "lastModified": "2024-11-21T02:25:52.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74504", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1659.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1659.json index 623d9ca8f89..e86eab22498 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1659.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1659.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1659", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:16.703", - "lastModified": "2018-10-12T22:08:37.883", + "lastModified": "2024-11-21T02:25:52.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/73994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1660.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1660.json index cb4a0d3f62e..d23bccd1ea3 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1660.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1660.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1660", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:17.673", - "lastModified": "2018-10-12T22:08:38.227", + "lastModified": "2024-11-21T02:25:52.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1661.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1661.json index 2946c89d884..c39639c35dc 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1661.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1661.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1661", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:18.500", - "lastModified": "2018-10-12T22:08:38.493", + "lastModified": "2024-11-21T02:25:52.583", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74006", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1662.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1662.json index 9b8cd336d9d..ea27b0d998a 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1662.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1662.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1662", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:19.347", - "lastModified": "2018-10-12T22:08:38.837", + "lastModified": "2024-11-21T02:25:52.703", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1665.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1665.json index 4d78f764932..d2fc85dc6c8 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1665.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1665.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1665", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:20.297", - "lastModified": "2018-10-12T22:08:39.040", + "lastModified": "2024-11-21T02:25:52.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1666.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1666.json index 9c1e01a8308..a37c95e304d 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1666.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1666.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1666", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:21.157", - "lastModified": "2018-10-12T22:08:39.400", + "lastModified": "2024-11-21T02:25:52.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -104,6 +103,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1667.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1667.json index 4d5a39fe183..815d715d16f 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1667.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1667.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1667", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:22.063", - "lastModified": "2018-10-12T22:08:39.633", + "lastModified": "2024-11-21T02:25:53.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -94,6 +93,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1668.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1668.json index 8f5e7f010b8..8e1e98311db 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1668.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1668.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1668", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:22.907", - "lastModified": "2018-10-12T22:08:39.947", + "lastModified": "2024-11-21T02:25:53.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032108", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1670.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1670.json index c92ea23808b..568aef1531d 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1670.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1670.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1670", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:02.643", - "lastModified": "2018-10-12T22:08:40.290", + "lastModified": "2024-11-21T02:25:53.337", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,26 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-044", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74485", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-044", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json index 211c2329c1d..886bb91b17b 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json @@ -2,13 +2,8 @@ "id": "CVE-2015-1671", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:03.910", - "lastModified": "2024-06-28T17:26:19.513", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-05-25", - "cisaActionDue": "2022-06-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Windows Remote Code Execution Vulnerability", + "lastModified": "2024-11-21T02:25:53.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-05-25", + "cisaActionDue": "2022-06-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Windows Remote Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -328,6 +327,32 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74490", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1672.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1672.json index 206c6972a6e..115d00a0421 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1672.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1672.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1672", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:04.957", - "lastModified": "2018-10-12T22:08:40.900", + "lastModified": "2024-11-21T02:25:53.590", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-674: Uncontrolled Recursion", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -122,6 +120,27 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-048", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74482", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-048", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-674: Uncontrolled Recursion" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1673.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1673.json index bd1db444d1b..bf6d04aa217 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1673.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1673.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1673", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:06.003", - "lastModified": "2018-10-12T22:08:41.260", + "lastModified": "2024-11-21T02:25:53.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -118,6 +117,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-048", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032297", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-048", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1674.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1674.json index c4fac8fc099..ed8942b6690 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1674.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1674.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1674", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:06.973", - "lastModified": "2019-05-14T20:30:42.203", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:53.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -129,6 +128,39 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/74488", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032292", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-052", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37052/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1675.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1675.json index 5e5d1cd92f0..7ded5508c84 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1675.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1675.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1675", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:07.787", - "lastModified": "2019-05-13T20:21:00.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:53.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -132,6 +131,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1032280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1676.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1676.json index a1c60d900d3..b6795e28390 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1676.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1676.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1676", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:08.583", - "lastModified": "2019-05-13T19:55:41.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:54.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74483", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032294", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1677.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1677.json index ed94fe4b1a9..359ff6d6a77 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1677.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1677.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1677", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:09.537", - "lastModified": "2019-05-13T20:17:59.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:54.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74494", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032294", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1678.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1678.json index e915393203c..1871cc614cf 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1678.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1678.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1678", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:10.317", - "lastModified": "2019-05-13T20:24:32.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:54.347", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74495", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032294", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1679.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1679.json index 43f3e6f1b3d..4e03b81f98f 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1679.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1679.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1679", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:11.287", - "lastModified": "2019-05-13T20:30:17.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:54.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74496", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032294", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1680.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1680.json index 508e8525054..5c4dd24ee71 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1680.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1680.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1680", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:12.130", - "lastModified": "2019-05-15T17:01:00.790", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:54.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032294", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1681.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1681.json index abfb273ea5c..7e03dad0367 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1681.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1681.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1681", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:13.037", - "lastModified": "2019-05-14T13:21:44.990", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:54.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -145,6 +144,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74486", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032286", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-054", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1682.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1682.json index 3ef3e23da24..b6a633f1bc5 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1682.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1682.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1682", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:13.943", - "lastModified": "2018-10-12T22:08:44.213", + "lastModified": "2024-11-21T02:25:54.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -198,6 +197,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-046", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032295", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-046", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1683.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1683.json index d4533ce34d9..15fbadedbe0 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1683.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1683.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1683", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:14.880", - "lastModified": "2018-10-12T22:08:44.650", + "lastModified": "2024-11-21T02:25:54.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-046", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032295", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-046", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1684.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1684.json index 3935f1826c8..6afd6c7ab55 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1684.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1684.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1684", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:15.977", - "lastModified": "2018-10-12T22:08:44.917", + "lastModified": "2024-11-21T02:25:55.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -127,6 +126,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-053", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74522", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-053", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1685.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1685.json index b7010febff1..e6ca1d73de8 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1685.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1685.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1685", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:16.833", - "lastModified": "2018-10-12T22:08:45.417", + "lastModified": "2024-11-21T02:25:55.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74516", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1686.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1686.json index 6f33eb80026..620097509db 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1686.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1686.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1686", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:17.710", - "lastModified": "2018-10-12T22:08:45.680", + "lastModified": "2024-11-21T02:25:55.320", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -127,6 +126,22 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-053", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74530", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-053", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1688.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1688.json index 4f978ed64a0..0e581353c2a 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1688.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1688.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1688", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:18.537", - "lastModified": "2018-10-12T22:08:46.400", + "lastModified": "2024-11-21T02:25:55.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1689.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1689.json index 9797b70c4a7..ee9dcc0efda 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1689.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1689.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1689", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:19.693", - "lastModified": "2018-10-12T22:08:46.777", + "lastModified": "2024-11-21T02:25:55.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1691.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1691.json index 88dc9e20f16..47e4dd750e5 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1691.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1691.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1691", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:20.757", - "lastModified": "2018-10-12T22:08:47.120", + "lastModified": "2024-11-21T02:25:55.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74507", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1692.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1692.json index e5fde2dd741..72aef4b5d3a 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1692.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1692.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1692", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:21.740", - "lastModified": "2018-10-12T22:08:47.477", + "lastModified": "2024-11-21T02:25:55.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1694.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1694.json index cb0abd4275f..09c7e16fe7b 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1694.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1694.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1694", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:22.680", - "lastModified": "2018-10-12T22:08:47.870", + "lastModified": "2024-11-21T02:25:56.137", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1695.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1695.json index 8ce0e41580b..799c2c7ee7f 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1695.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1695.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1695", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:23.820", - "lastModified": "2019-05-14T20:45:13.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:56.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -132,6 +131,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id/1032280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1696.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1696.json index a1a2bdf23c0..ab8d316c080 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1696.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1696.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1696", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:24.727", - "lastModified": "2019-05-16T16:30:28.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:56.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -129,8 +128,8 @@ "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-045", "source": "secure@microsoft.com", "tags": [ - "Vendor Advisory", - "Patch" + "Patch", + "Vendor Advisory" ] }, { @@ -140,6 +139,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securitytracker.com/id/1032280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1697.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1697.json index daf068dfd48..97a4f178104 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1697.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1697.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1697", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:25.587", - "lastModified": "2019-05-15T18:13:26.793", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:56.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -140,6 +139,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securitytracker.com/id/1032280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1096", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1698.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1698.json index 4b50216e8b6..3090509b77f 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1698.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1698.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1698", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:26.460", - "lastModified": "2019-05-15T18:17:29.790", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:56.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -140,6 +139,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securitytracker.com/id/1032280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1699.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1699.json index 08d35fc4eca..8f62754961f 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1699.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1699.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1699", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:27.290", - "lastModified": "2019-05-14T20:51:20.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:56.767", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -129,8 +128,24 @@ "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-045", "source": "secure@microsoft.com", "tags": [ - "Vendor Advisory", - "Patch" + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" ] } ] diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1700.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1700.json index 32212e12195..8cb870eac4b 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1700.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1700.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1700", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:28.070", - "lastModified": "2018-10-12T22:08:49.777", + "lastModified": "2024-11-21T02:25:56.943", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -104,6 +103,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-047", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032296", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-047", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json index e23fb889c12..e0831d6eb11 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json @@ -2,13 +2,8 @@ "id": "CVE-2015-1701", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-21T10:59:00.073", - "lastModified": "2024-07-16T17:34:33.033", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-03", - "cisaActionDue": "2022-03-24", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Win32k Privilege Escalation Vulnerability", + "lastModified": "2024-11-21T02:25:57.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-03", + "cisaActionDue": "2022-03-24", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Win32k Privilege Escalation Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -183,6 +182,72 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2020/May/34", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://twitter.com/symantec/statuses/590208710527549440", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032155", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37049/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37367/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1702.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1702.json index 7fe0dde99c6..b11daa4413f 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1702.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1702.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1702", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:29.163", - "lastModified": "2019-05-15T16:56:02.190", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:57.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74492", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032299", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1703.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1703.json index 4beeb8d500f..1302c1e5b1c 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1703.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1703.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1703", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:30.070", - "lastModified": "2018-10-12T22:08:51.230", + "lastModified": "2024-11-21T02:25:57.963", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74520", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1704.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1704.json index a111512cab9..f6e6c22bd6d 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1704.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1704.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1704", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:30.930", - "lastModified": "2018-10-12T22:08:51.573", + "lastModified": "2024-11-21T02:25:58.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74521", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1705.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1705.json index 5abc64efc78..5e4c48a3e3a 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1705.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1705.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1705", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:31.820", - "lastModified": "2018-10-12T22:08:51.980", + "lastModified": "2024-11-21T02:25:58.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74509", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1706.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1706.json index 5ba1272f445..ac931e34c9d 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1706.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1706.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1706", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:32.837", - "lastModified": "2018-10-12T22:08:52.353", + "lastModified": "2024-11-21T02:25:58.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74510", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1708.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1708.json index 982f89661a8..be89b21d2d3 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1708.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1708.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1708", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:33.727", - "lastModified": "2018-10-12T22:08:52.667", + "lastModified": "2024-11-21T02:25:58.447", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1709.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1709.json index 6602a16cce8..46df9093ee4 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1709.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1709.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1709", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:34.573", - "lastModified": "2018-10-12T22:08:52.997", + "lastModified": "2024-11-21T02:25:58.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -103,6 +102,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1710.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1710.json index bfbf9f322c8..a747afd9e32 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1710.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1710.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1710", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:35.447", - "lastModified": "2018-10-12T22:08:53.387", + "lastModified": "2024-11-21T02:25:58.687", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74513", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1711.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1711.json index adfa01b7631..3f66e277262 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1711.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1711.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1711", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:36.260", - "lastModified": "2018-10-12T22:08:53.777", + "lastModified": "2024-11-21T02:25:58.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1712.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1712.json index a9198f6fd11..b14b397b3fa 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1712.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1712.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1712", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:37.087", - "lastModified": "2018-10-12T22:08:54.103", + "lastModified": "2024-11-21T02:25:58.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74515", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1713.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1713.json index 4e6d2d69418..b866b2cfd99 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1713.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1713.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1713", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:37.887", - "lastModified": "2018-10-12T22:08:54.400", + "lastModified": "2024-11-21T02:25:59.027", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74518", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1714.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1714.json index a8d8b65efea..2c69c1a124b 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1714.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1714.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1714", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:38.853", - "lastModified": "2018-10-12T22:08:54.697", + "lastModified": "2024-11-21T02:25:59.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74505", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1715.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1715.json index 38e653d82f2..f3220076f28 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1715.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1715.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1715", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:39.790", - "lastModified": "2018-10-12T22:08:54.997", + "lastModified": "2024-11-21T02:25:59.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -80,6 +79,14 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-049", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securitytracker.com/id/1032298", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-049", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1716.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1716.json index 19be0d82178..887420d44a2 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1716.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1716.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1716", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:40.573", - "lastModified": "2019-05-15T16:02:39.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:25:59.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -150,6 +149,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032283", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1717.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1717.json index 60f40b03db5..649f130cb57 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1717.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1717.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1717", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:41.433", - "lastModified": "2018-10-12T22:08:55.587", + "lastModified": "2024-11-21T02:25:59.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1718.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1718.json index dc938804871..aae3b9527f8 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1718.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1718.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1718", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:42.340", - "lastModified": "2018-10-12T22:08:55.947", + "lastModified": "2024-11-21T02:25:59.617", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/74607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1773.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1773.json index 74abefcb944..8957074cbf4 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1773.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1773.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1773", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-08T01:59:01.187", - "lastModified": "2015-10-05T21:33:11.160", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:05.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ { "url": "https://helpx.adobe.com/security/products/flex/apsb15-08.html", "source": "secalert@redhat.com" + }, + { + "url": "http://seclists.org/bugtraq/2015/Apr/42", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73954", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032107", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flex/apsb15-08.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1774.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1774.json index 002ccf28adc..5ace6a70ee8 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1774.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1774.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1774", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-28T14:59:00.077", - "lastModified": "2022-02-07T16:32:02.450", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:06.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -277,6 +276,100 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156582.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157550.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1458.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3236", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openoffice.org/security/cves/CVE-2015-1774.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74338", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032205", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032206", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2578-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201603-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.libreoffice.org/about-us/security/advisories/cve-2015-1774/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1094", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1782.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1782.json index 0d4526b3688..83fc034f457 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1782.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1782.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1782", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-13T14:59:00.083", - "lastModified": "2023-02-13T00:46:46.077", + "lastModified": "2024-11-21T02:26:07.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -162,6 +161,56 @@ { "url": "http://www.securityfocus.com/bid/73061", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151943.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152362.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153933.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3182", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.libssh2.org/adv_20150311.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:148", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73061", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1787.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1787.json index f4f5f35c004..cab943e038c 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1787.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1787.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1787", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-19T22:59:12.473", - "lastModified": "2023-11-07T02:24:55.487", + "lastModified": "2024-11-21T02:26:07.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -206,6 +205,126 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa92", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202406", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b19d8143212ae5fbc9cebfd51c01f802fabccd33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201503-11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.openssl.org/news/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1798.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1798.json index c7a6fc9001d..8a76ce0de82 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1798.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1798.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1798", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-08T10:59:04.610", - "lastModified": "2023-02-12T23:15:30.947", + "lastModified": "2024-11-21T02:26:10.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 1.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.8 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.2, @@ -97,6 +96,10 @@ "url": "http://marc.info/?l=bugtraq&m=143213867103400&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143213867103400&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2015-1459.html", "source": "secalert@redhat.com" @@ -163,6 +166,101 @@ { "url": "https://security.gentoo.org/glsa/201509-01", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.ntp.org/show_bug.cgi?id=2779", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213867103400&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213867103400&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1459.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3223", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/374268", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:202", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2567-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10114", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201509-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1799.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1799.json index cc09b9735bd..568821a9c26 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1799.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1799.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1799", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-08T10:59:05.717", - "lastModified": "2018-01-05T02:30:00.447", + "lastModified": "2024-11-21T02:26:10.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 4.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -101,6 +100,10 @@ "url": "http://marc.info/?l=bugtraq&m=143213867103400&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=143213867103400&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=145750740530849&w=2", "source": "secalert@redhat.com" @@ -175,6 +178,113 @@ { "url": "https://security.gentoo.org/glsa/201509-01", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.ntp.org/show_bug.cgi?id=2781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213867103400&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143213867103400&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=145750740530849&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1459.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38275", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3222", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3223", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/374268", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:202", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2567-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10114", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201509-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1802.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1802.json index ecc690cd036..33839ddb20a 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1802.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1802.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1802", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-20T14:59:00.093", - "lastModified": "2016-12-22T02:59:35.190", + "lastModified": "2024-11-21T02:26:10.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -176,6 +175,73 @@ { "url": "https://security.gentoo.org/glsa/201507-21", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0113.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152497.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152838.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1708.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031935", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2536-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2015-03-17/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-21", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1803.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1803.json index 43b0077b4ba..b78d04aa251 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1803.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1803.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1803", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-20T14:59:02.403", - "lastModified": "2016-12-31T02:59:23.123", + "lastModified": "2024-11-21T02:26:10.673", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -180,6 +178,74 @@ { "url": "https://security.gentoo.org/glsa/201507-21", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0113.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152497.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152838.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1708.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031935", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2536-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2015-03-17/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-21", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1804.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1804.json index 4182f5516b6..306845187c5 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1804.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1804.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1804", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-20T14:59:03.403", - "lastModified": "2016-12-31T02:59:23.203", + "lastModified": "2024-11-21T02:26:10.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -180,6 +179,77 @@ { "url": "https://security.gentoo.org/glsa/201507-21", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0113.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152497.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152838.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00074.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1708.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031935", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2536-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.x.org/wiki/Development/Security/Advisory-2015-03-17/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-21", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1815.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1815.json index ecb79c36c86..6cf8ca61a85 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1815.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1815.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1815", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-30T14:59:03.757", - "lastModified": "2023-02-13T00:47:06.383", + "lastModified": "2024-11-21T02:26:12.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -143,6 +142,62 @@ { "url": "https://www.exploit-db.com/exploits/36564/", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154427.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154444.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154147.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0729.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/26/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/119966", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73374", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203352", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/stealth/troubleshooter", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36564/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1821.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1821.json index d8ffab05555..bd9570712be 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1821.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1821.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1821", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-16T14:59:01.663", - "lastModified": "2023-02-13T00:47:10.323", + "lastModified": "2024-11-21T02:26:13.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -111,6 +110,30 @@ { "url": "https://security.gentoo.org/glsa/201507-01", "source": "secalert@redhat.com" + }, + { + "url": "http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3222", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1822.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1822.json index aeb13293be6..ba9a64c80b6 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1822.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1822.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1822", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-16T14:59:03.023", - "lastModified": "2023-02-13T00:47:16.263", + "lastModified": "2024-11-21T02:26:13.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -111,6 +110,30 @@ { "url": "https://security.gentoo.org/glsa/201507-01", "source": "secalert@redhat.com" + }, + { + "url": "http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3222", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73956", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1827.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1827.json index 200c0f35ecb..2b55b22a071 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1827.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1827.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1827", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-30T14:59:04.727", - "lastModified": "2023-02-12T23:15:31.143", + "lastModified": "2024-11-21T02:26:13.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0728.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73376", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://fedorahosted.org/freeipa/ticket/4908", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1842.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1842.json index 00a13ac0474..ef019e75663 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1842.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1842.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1842", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-10T15:00:02.007", - "lastModified": "2023-02-13T00:47:19.560", + "lastModified": "2024-11-21T02:26:15.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,40 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201875", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0789.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0791.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0830.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0831.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0832.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201875", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1843.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1843.json index af9c287bf18..cead1ba5bac 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1843.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1843.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1843", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-06T15:59:00.073", - "lastModified": "2016-07-26T01:59:04.310", + "lastModified": "2024-11-21T02:26:15.337", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206443", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0776.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206443", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1845.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1845.json index 965d38eef74..ff55af71192 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1845.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1845.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1845", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-19T18:59:01.247", - "lastModified": "2016-08-02T14:42:20.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:15.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,31 @@ "tags": [ "Issue Tracking" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73693", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207645", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1846.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1846.json index bfc705a3053..3213d653dd5 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1846.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1846.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1846", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-19T18:59:02.683", - "lastModified": "2016-08-02T14:43:10.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:15.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,31 @@ "tags": [ "Issue Tracking" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73686", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207647", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1848.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1848.json index b9ff887f148..3f902837068 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1848.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1848.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1848", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-14T14:59:07.897", - "lastModified": "2023-11-07T02:24:58.063", + "lastModified": "2024-11-21T02:26:15.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -163,6 +162,47 @@ "Exploit", "Issue Tracking" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0980.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0990.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74623", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/attachment.cgi?id=1009855", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1852.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1852.json index c643ea09349..5420ccf4c60 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1852.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1852.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1852", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-17T17:59:02.653", - "lastModified": "2023-02-13T00:47:21.937", + "lastModified": "2024-11-21T02:26:16.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -136,6 +135,44 @@ { "url": "https://bugs.launchpad.net/keystonemiddleware/+bug/1411063", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-April/000350.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1685.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74187", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2705-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/keystonemiddleware/+bug/1411063", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1856.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1856.json index 444dec1866f..9e182984752 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1856.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1856.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1856", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-17T17:59:03.887", - "lastModified": "2018-01-05T02:30:00.680", + "lastModified": "2024-11-21T02:26:16.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -154,6 +153,63 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163113.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-April/000349.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1681.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1684.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1845.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1846.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74182", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2704-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/swift/+bug/1430645", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1858.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1858.json index ba3d81eb868..f074197cd58 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1858.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1858.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1858", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-12T19:59:04.880", - "lastModified": "2021-06-16T12:44:00.727", + "lastModified": "2024-11-21T02:26:17.027", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -204,6 +203,73 @@ { "url": "https://security.gentoo.org/glsa/201603-10", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.qt-project.org/pipermail/announce/2015-April/000067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2626-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.qt-project.org/#/c/108312/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201603-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1859.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1859.json index e5e1ad21ac4..e0798337a91 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1859.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1859.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1859", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-12T19:59:05.957", - "lastModified": "2021-06-16T12:44:00.727", + "lastModified": "2024-11-21T02:26:17.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -201,6 +200,70 @@ { "url": "https://security.gentoo.org/glsa/201603-10", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.qt-project.org/pipermail/announce/2015-April/000067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74307", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2626-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1860.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1860.json index 7eedf667d8e..33df54b6104 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1860.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1860.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1860", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-12T19:59:06.957", - "lastModified": "2021-06-16T12:44:00.727", + "lastModified": "2024-11-21T02:26:17.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -207,8 +206,8 @@ "url": "http://www.securityfocus.com/bid/74302", "source": "secalert@redhat.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -225,6 +224,94 @@ { "url": "https://security.gentoo.org/glsa/201603-10", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155947.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156761.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156937.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.qt-project.org/pipermail/announce/2015-April/000067.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74302", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2626-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://codereview.qt-project.org/#/c/108248/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201603-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1863.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1863.json index 0703eeba44a..d6d0927b436 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1863.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1863.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1863", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-28T14:59:01.293", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:26:17.590", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 5.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -284,6 +283,84 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/131598/Android-wpa_supplicant-Heap-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1090.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/82", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://security.alibaba.com/blog/blog.htm?spm=0.0.0.0.p1ECc3&id=19", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535353/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74296", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032192", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2577-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201606-17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1868.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1868.json index 92bd832cff3..99e380630d6 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1868.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1868.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1868", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-18T15:59:05.823", - "lastModified": "2016-12-28T02:59:05.243", + "lastModified": "2024-11-21T02:26:18.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -245,6 +244,70 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3307", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74306", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032220", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1874.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1874.json index 85b9dcee963..f9a25126d7e 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1874.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1874.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1874", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T16:59:00.073", - "lastModified": "2016-08-04T03:17:10.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:18.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,42 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/130654/WordPress-Contact-Form-DB-2.8.29-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72964", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.dxw.com/advisories/csrf-in-contact-form-db-allows-attacker-to-delete-all-stored-form-submissions/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/contact-form-7-to-database-extension/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1875.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1875.json index 460b37b99f0..5428474aa61 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1875.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1875.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1875", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-11T14:59:05.173", - "lastModified": "2016-08-04T03:17:28.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:18.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130698/Elastix-2.5.0-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36305/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1879.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1879.json index 1b6b9240fdd..d509928c15e 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1879.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1879.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1879", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-19T15:59:20.440", - "lastModified": "2015-02-20T18:49:30.713", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:19.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/130309/WordPress-Google-Doc-Embedder-2.5.18-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72547", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/google-document-embedder/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1880.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1880.json index f2e34243e71..d6dccd42a55 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1880.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1880.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1880", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:08.053", - "lastModified": "2017-01-03T18:39:40.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:19.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -128,6 +127,53 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-005/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74652", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032261", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032262", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032264", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1881.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1881.json index 757b65e687f..ba370390c28 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1881.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1881.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1881", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T15:59:08.567", - "lastModified": "2017-01-03T02:59:51.897", + "lastModified": "2024-11-21T02:26:19.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72694", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/glance/+bug/1420696", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1882.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1882.json index 09ded2ff7e8..89baa71ce96 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1882.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1882.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1882", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-27T12:59:02.593", - "lastModified": "2016-08-04T03:18:06.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:19.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -134,6 +133,34 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI33357", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697368", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74222", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032190", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1885.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1885.json index 5989f28c187..5caa67976d4 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1885.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1885.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1885", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-27T12:59:03.470", - "lastModified": "2016-12-22T02:59:35.847", + "lastModified": "2024-11-21T02:26:20.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -279,6 +278,34 @@ { "url": "http://www.securitytracker.com/id/1032190", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI33202", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI36211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21697368", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74219", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032190", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1886.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1886.json index 8ae31764b95..8042ebdd313 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1886.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1886.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1886", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-27T11:59:05.110", - "lastModified": "2016-08-04T03:22:48.120", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:20.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -179,6 +178,34 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI37356", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701566", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74216", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032189", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1889.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1889.json index 615df70de52..2eda07829ce 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1889.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1889.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1889", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-22T10:59:01.643", - "lastModified": "2017-01-03T02:59:51.943", + "lastModified": "2024-11-21T02:26:20.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -92,6 +91,17 @@ { "url": "http://www.securitytracker.com/id/1032150", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700654", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032150", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1890.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1890.json index 093510e1cdd..e9475974795 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1890.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1890.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1890", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-06T00:59:05.300", - "lastModified": "2016-08-04T03:25:01.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:21.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -87,6 +86,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg3T1022077", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73918", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1892.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1892.json index d03b6b082d7..0f8d9548c44 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1892.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1892.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1892", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-01T02:00:32.220", - "lastModified": "2016-08-04T03:25:56.670", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:21.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -134,6 +133,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV70911", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV70913", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21699497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/550620", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73683", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1893.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1893.json index dbf539d1066..0554f4dbd53 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1893.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1893.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1893", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-06T00:59:06.893", - "lastModified": "2016-08-04T03:26:17.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:21.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,8 +92,8 @@ "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701337", "source": "psirt@us.ibm.com", "tags": [ - "Vendor Advisory", - "Patch" + "Patch", + "Vendor Advisory" ] }, { @@ -112,6 +111,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IT07841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701337", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1894.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1894.json index 69b758c86b2..fe1a64fc43c 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1894.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1894.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1894", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T00:59:03.557", - "lastModified": "2016-08-04T03:26:33.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:21.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700768", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74441", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1895.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1895.json index 12e05c9df5b..07239e8a086 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1895.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1895.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1895", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T00:59:04.747", - "lastModified": "2016-08-04T03:26:54.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:21.473", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700768", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74442", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1896.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1896.json index 6f8f4706592..6de7d87a15f 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1896.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1896.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1896", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T00:59:05.747", - "lastModified": "2016-12-08T18:56:30.100", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:21.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -140,6 +139,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700536", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1093", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1897.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1897.json index f255da6567f..67dae67d8df 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1897.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1897.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1897", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-15T10:59:08.207", - "lastModified": "2016-12-08T18:56:38.430", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:21.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -125,6 +124,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032102", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1092", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1898.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1898.json index 8727371db57..98778c6eb75 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1898.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1898.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1898", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-15T10:59:09.347", - "lastModified": "2016-12-08T18:56:43.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:21.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -123,6 +122,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700539", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74036", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032102", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1091", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-18xx/CVE-2015-1899.json b/CVE-2015/CVE-2015-18xx/CVE-2015-1899.json index 8aa220c06ed..34342f9adc3 100644 --- a/CVE-2015/CVE-2015-18xx/CVE-2015-1899.json +++ b/CVE-2015/CVE-2015-18xx/CVE-2015-1899.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1899", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T00:59:06.807", - "lastModified": "2015-05-26T16:38:20.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:21.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI37139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700066", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-19xx/CVE-2015-1902.json b/CVE-2015/CVE-2015-19xx/CVE-2015-1902.json index cb5f0869539..d9b77357971 100644 --- a/CVE-2015/CVE-2015-19xx/CVE-2015-1902.json +++ b/CVE-2015/CVE-2015-19xx/CVE-2015-1902.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1902", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-20T10:59:18.120", - "lastModified": "2019-10-16T12:40:30.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:22.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +122,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74597", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032376", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-19xx/CVE-2015-1903.json b/CVE-2015/CVE-2015-19xx/CVE-2015-1903.json index 736dbbb95d7..c44a7b4bf48 100644 --- a/CVE-2015/CVE-2015-19xx/CVE-2015-1903.json +++ b/CVE-2015/CVE-2015-19xx/CVE-2015-1903.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1903", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-20T10:59:19.073", - "lastModified": "2019-10-16T12:40:30.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:22.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +122,38 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74598", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032376", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-194", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-19xx/CVE-2015-1907.json b/CVE-2015/CVE-2015-19xx/CVE-2015-1907.json index 6e477ce612c..ae642e2bade 100644 --- a/CVE-2015/CVE-2015-19xx/CVE-2015-1907.json +++ b/CVE-2015/CVE-2015-19xx/CVE-2015-1907.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1907", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-08T01:59:01.347", - "lastModified": "2016-11-30T02:59:57.837", + "lastModified": "2024-11-21T02:26:22.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -112,6 +111,22 @@ { "url": "http://www.securitytracker.com/id/1032257", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882666", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032257", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-19xx/CVE-2015-1908.json b/CVE-2015/CVE-2015-19xx/CVE-2015-1908.json index ddd2578d018..9d6403931d3 100644 --- a/CVE-2015/CVE-2015-19xx/CVE-2015-1908.json +++ b/CVE-2015/CVE-2015-19xx/CVE-2015-1908.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1908", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-04-27T11:59:06.360", - "lastModified": "2016-11-30T02:59:59.040", + "lastModified": "2024-11-21T02:26:23.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -171,6 +170,26 @@ { "url": "http://www.securitytracker.com/id/1032189", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI37661", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21701566", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032189", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-19xx/CVE-2015-1909.json b/CVE-2015/CVE-2015-19xx/CVE-2015-1909.json index 20f8dbae896..3b6a5f06699 100644 --- a/CVE-2015/CVE-2015-19xx/CVE-2015-1909.json +++ b/CVE-2015/CVE-2015-19xx/CVE-2015-1909.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1909", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T00:59:07.903", - "lastModified": "2015-05-26T16:37:51.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:23.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700754", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-19xx/CVE-2015-1910.json b/CVE-2015/CVE-2015-19xx/CVE-2015-1910.json index dcf8f3cfa2e..bd18dae321c 100644 --- a/CVE-2015/CVE-2015-19xx/CVE-2015-1910.json +++ b/CVE-2015/CVE-2015-19xx/CVE-2015-1910.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1910", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T00:59:08.980", - "lastModified": "2015-05-26T16:34:25.873", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:23.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -89,6 +88,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700741", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-19xx/CVE-2015-1911.json b/CVE-2015/CVE-2015-19xx/CVE-2015-1911.json index a9369d88ede..8038524d3ca 100644 --- a/CVE-2015/CVE-2015-19xx/CVE-2015-1911.json +++ b/CVE-2015/CVE-2015-19xx/CVE-2015-1911.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1911", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T00:59:09.807", - "lastModified": "2016-11-30T03:00:00.103", + "lastModified": "2024-11-21T02:26:23.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "http://www.securityfocus.com/bid/74224", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21700864", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74224", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-19xx/CVE-2015-1915.json b/CVE-2015/CVE-2015-19xx/CVE-2015-1915.json index 7f4cddaa30b..4b1929655e5 100644 --- a/CVE-2015/CVE-2015-19xx/CVE-2015-1915.json +++ b/CVE-2015/CVE-2015-19xx/CVE-2015-1915.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1915", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T00:59:10.760", - "lastModified": "2016-11-30T03:00:02.587", + "lastModified": "2024-11-21T02:26:23.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,26 @@ { "url": "http://www.securityfocus.com/bid/74193", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV72069", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21882571", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74193", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-19xx/CVE-2015-1920.json b/CVE-2015/CVE-2015-19xx/CVE-2015-1920.json index 4524c72963e..6a91612dc7a 100644 --- a/CVE-2015/CVE-2015-19xx/CVE-2015-1920.json +++ b/CVE-2015/CVE-2015-19xx/CVE-2015-1920.json @@ -2,9 +2,8 @@ "id": "CVE-2015-1920", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-20T00:59:01.217", - "lastModified": "2017-01-03T17:37:37.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:24.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -487,6 +486,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI38302", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883573", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74439", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032249", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-19xx/CVE-2015-1921.json b/CVE-2015/CVE-2015-19xx/CVE-2015-1921.json index ced159c67ab..02968540aba 100644 --- a/CVE-2015/CVE-2015-19xx/CVE-2015-1921.json +++ b/CVE-2015/CVE-2015-19xx/CVE-2015-1921.json @@ -2,10 +2,8 @@ "id": "CVE-2015-1921", "sourceIdentifier": "psirt@us.ibm.com", "published": "2015-05-25T00:59:11.730", - "lastModified": "2016-08-17T19:11:11.687", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:26:24.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -101,6 +99,26 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI38632", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21884060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2033.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2033.json index cc1e456b3a9..7de6ca741f5 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2033.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2033.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2033", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-20T11:59:05.687", - "lastModified": "2016-11-30T03:00:39.517", + "lastModified": "2024-11-21T02:26:37.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ { "url": "https://support.infoblox.com/app/answers/detail/a_id/3666/kw/NETMRI-23483", "source": "cve@mitre.org" + }, + { + "url": "http://unsecurityresearch.com/index.php?option=com_content&view=article&id=46&Itemid=53", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.infoblox.com/app/answers/detail/a_id/3666/kw/NETMRI-23483", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2034.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2034.json index c26641f1596..b44d16b29f8 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2034.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2034.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2034", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-20T16:59:06.350", - "lastModified": "2016-11-30T03:00:40.610", + "lastModified": "2024-11-21T02:26:37.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -119,6 +118,53 @@ { "url": "http://www.securityfocus.com/bid/72690", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130432/CMS-Piwigo-2.7.3-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://piwigo.org/forum/viewtopic.php?id=25179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://piwigo.org/releases/2.7.4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/73", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/02/report-for-advisory-sroeadv-2015-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72690", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2035.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2035.json index abab782f01d..9afa5de689a 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2035.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2035.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2035", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-20T16:59:07.397", - "lastModified": "2016-11-30T03:00:41.517", + "lastModified": "2024-11-21T02:26:37.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -124,6 +123,58 @@ { "url": "http://www.securityfocus.com/bid/72689", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130432/CMS-Piwigo-2.7.3-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://piwigo.org/forum/viewtopic.php?id=25179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://piwigo.org/releases/2.7.4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/73", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/02/report-for-advisory-sroeadv-2015-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72689", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2039.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2039.json index 92709e8946c..62c6b1bb5cf 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2039.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2039.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2039", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-20T16:59:08.227", - "lastModified": "2017-09-08T01:29:50.230", + "lastModified": "2024-11-21T02:26:37.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100814", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130306/WordPress-Acobot-Live-Chat-And-Contact-Form-2.0-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100813", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100814", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2040.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2040.json index d2ca7d6c92b..607e8590113 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2040.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2040.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2040", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-20T16:59:09.100", - "lastModified": "2017-09-08T01:29:50.293", + "lastModified": "2024-11-21T02:26:38.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100818", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130311/WordPress-Contact-Form-DB-2.8.26-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100818", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2041.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2041.json index 44d2cddf15d..f9faf66cc1c 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2041.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2041.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2041", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T10:59:01.120", - "lastModified": "2023-11-07T02:25:03.137", + "lastModified": "2024-11-21T02:26:38.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -212,6 +211,116 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3237", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/20/19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2560-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2561-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2562-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2563-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2564-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2565-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195350", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2042.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2042.json index c929c099c12..a48c7c5da7c 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2042.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2042.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2042", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T10:59:02.307", - "lastModified": "2023-11-07T02:25:03.267", + "lastModified": "2024-11-21T02:26:38.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -124,6 +123,58 @@ { "url": "https://github.com/torvalds/linux/commit/db27ebb111e9f69efece08e4cb6a34ff980f8896", "source": "cve@mitre.org" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db27ebb111e9f69efece08e4cb6a34ff980f8896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/20/20", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72730", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2560-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2561-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2562-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2563-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2564-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2565-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195355", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/db27ebb111e9f69efece08e4cb6a34ff980f8896", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2043.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2043.json index 099af87611b..9b5eb1e0979 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2043.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2043.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2043", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-25T22:59:01.297", - "lastModified": "2015-02-26T19:07:02.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:38.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130490/MyConnection-Server-8.2b-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2044.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2044.json index bb38139e2da..88faf8f1b4c 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2044.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2044.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2044", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-12T14:59:00.073", - "lastModified": "2018-10-30T16:26:53.700", + "lastModified": "2024-11-21T02:26:38.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -284,6 +283,54 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX200484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3181", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72954", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031806", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031836", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-423503.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-121.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2045.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2045.json index 47f6b25f923..f72df56f2e2 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2045.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2045.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2045", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-12T14:59:01.367", - "lastModified": "2018-10-30T16:26:53.700", + "lastModified": "2024-11-21T02:26:38.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -348,6 +347,78 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX200484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3181", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031806", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031837", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-423503.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2047.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2047.json index 0c61802a02a..86b3c8df039 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2047.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2047.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2047", "sourceIdentifier": "security@debian.org", "published": "2015-02-23T17:59:03.667", - "lastModified": "2016-11-30T03:00:44.707", + "lastModified": "2024-11-21T02:26:39.107", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -571,6 +570,41 @@ { "url": "https://review.typo3.org/#/c/37013/", "source": "security@debian.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/22/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/22/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72763", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://review.typo3.org/#/c/37013/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2048.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2048.json index 36e5d770b0e..dfa9bde0507 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2048.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2048.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2048", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:05.290", - "lastModified": "2023-04-26T19:27:52.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:39.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2049.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2049.json index 64cba17d587..cd8c63f85b8 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2049.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2049.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2049", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:06.557", - "lastModified": "2023-04-26T19:27:52.350", + "lastModified": "2024-11-21T02:26:39.380", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -104,6 +102,26 @@ { "url": "https://www.exploit-db.com/exploits/39192/", "source": "cve@mitre.org" + }, + { + "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/377348", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/39192/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2050.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2050.json index bd1d453d55d..1591316231a 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2050.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2050.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2050", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:07.463", - "lastModified": "2023-04-26T19:27:52.350", + "lastModified": "2024-11-21T02:26:39.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,25 @@ { "url": "http://www.securityfocus.com/bid/73143", "source": "cve@mitre.org" + }, + { + "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/184100", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73143", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json index eff48d32287..ce7aed57a10 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2051.json @@ -2,13 +2,8 @@ "id": "CVE-2015-2051", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:08.320", - "lastModified": "2024-07-24T16:05:08.900", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-02-10", - "cisaActionDue": "2022-08-10", - "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", - "cisaVulnerabilityName": "D-Link DIR-645 Router Remote Code Execution Vulnerability", + "lastModified": "2024-11-21T02:26:39.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -47,6 +42,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -54,9 +51,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -69,13 +64,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +83,10 @@ } ] }, + "cisaExploitAdd": "2022-02-10", + "cisaActionDue": "2022-08-10", + "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", + "cisaVulnerabilityName": "D-Link DIR-645 Router Remote Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -175,6 +174,41 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72623", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74870", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37171/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2052.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2052.json index 5c5023ddab4..deed5fda995 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2052.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2052.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2052", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:09.243", - "lastModified": "2023-04-26T19:27:52.350", + "lastModified": "2024-11-21T02:26:39.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,18 @@ { "url": "http://www.securityfocus.com/bid/72623", "source": "cve@mitre.org" + }, + { + "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72623", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2053.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2053.json index c3528ac3f53..78e13209433 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2053.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2053.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2053", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:10.167", - "lastModified": "2016-11-30T03:00:45.767", + "lastModified": "2024-11-21T02:26:40.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74873", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031821", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10094", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2054.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2054.json index e2cc9ba0b60..1f762af2925 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2054.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2054.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2054", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:11.150", - "lastModified": "2016-11-30T03:00:46.893", + "lastModified": "2024-11-21T02:26:40.163", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +91,18 @@ { "url": "http://www.securityfocus.com/bid/74875", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jan/58", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74875", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-93: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2055.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2055.json index 69459d21343..7280ef09eb5 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2055.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2055.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2055", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-23T17:59:12.167", - "lastModified": "2016-11-30T03:00:47.767", + "lastModified": "2024-11-21T02:26:40.307", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,17 @@ { "url": "http://www.securityfocus.com/bid/74876", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/35859", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74876", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2061.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2061.json index f18bb86c0e8..c290a821860 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2061.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2061.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2061", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:07.373", - "lastModified": "2016-11-30T03:00:49.877", + "lastModified": "2024-11-21T02:26:40.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "https://support.ptc.com/appserver/cs/view/solution.jsp?n=CS172389", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/72836", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-051/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.ptc.com/appserver/cs/view/solution.jsp?n=CS172389", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2063.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2063.json index d4df729ef7a..2b3c0399702 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2063.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2063.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2063", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:09.217", - "lastModified": "2015-04-09T18:23:46.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:41.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3178", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/24/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775003", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2064.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2064.json index f72b78eedd8..f597f1386c7 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2064.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2064.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2064", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T17:59:00.050", - "lastModified": "2016-12-31T02:59:23.920", + "lastModified": "2024-11-21T02:26:41.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "http://www.securityfocus.com/bid/72684", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/66", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securityrelated.blogspot.com/2015/02/dlguard-multiple-xss-cross-site.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/xss-vulnerability/dlguard-multiple-xss-cross-site-scripting-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72684", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2065.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2065.json index 4984f86a7fc..2404a32fa7e 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2065.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2065.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2065", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T17:59:01.253", - "lastModified": "2016-11-30T03:00:50.877", + "lastModified": "2024-11-21T02:26:41.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ { "url": "https://wordpress.org/plugins/contus-video-gallery/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130371/WordPress-Video-Gallery-2.7-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/118419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/contus-video-gallery/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2066.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2066.json index 9950e4251f3..283d0f93e97 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2066.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2066.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2066", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T17:59:02.800", - "lastModified": "2016-12-31T02:59:23.967", + "lastModified": "2024-11-21T02:26:41.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "http://www.securityfocus.com/bid/72683", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/69", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securityrelated.blogspot.com/2015/02/dlguard-sql-injection-security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/sql-injection-vulnerability/dlguard-sql-injection-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72683", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2067.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2067.json index 85e620582c3..6b13c51d327 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2067.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2067.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2067", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T17:59:03.817", - "lastModified": "2020-07-06T15:07:39.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:41.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,32 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35996", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2068.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2068.json index 8b003b60f0a..bc193400617 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2068.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2068.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2068", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T17:59:04.817", - "lastModified": "2020-07-06T15:06:37.483", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:41.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/35996", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74879", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2069.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2069.json index 90df97b6b07..ea19be6c5f5 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2069.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2069.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2069", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T17:59:05.817", - "lastModified": "2016-11-30T03:00:54.113", + "lastModified": "2024-11-21T02:26:41.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ { "url": "https://wordpress.org/plugins/woocommerce/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130458/WordPress-WooCommerce-2.2.10-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/75", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74885", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/woocommerce/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2070.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2070.json index 14934498ee3..9c8f9b66bff 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2070.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2070.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2070", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T17:59:06.897", - "lastModified": "2016-11-30T03:00:55.207", + "lastModified": "2024-11-21T02:26:42.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,35 @@ { "url": "http://www.securityfocus.com/bid/74883", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/118356", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-Injection-File-Read.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/47", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74883", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2071.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2071.json index 210455a9048..e503576bd18 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2071.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2071.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2071", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T17:59:07.940", - "lastModified": "2016-11-30T03:00:56.190", + "lastModified": "2024-11-21T02:26:42.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -100,6 +99,35 @@ { "url": "http://www.securityfocus.com/bid/74887", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/118357", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-Injection-File-Read.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/47", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74887", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2072.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2072.json index cd329b7793e..d1b09f0b6cc 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2072.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2072.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2072", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-27T15:59:01.273", - "lastModified": "2018-10-09T19:56:01.937", + "lastModified": "2024-11-21T02:26:42.417", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,28 @@ { "url": "http://www.securityfocus.com/bid/72773", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/91", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534747/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72773", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2075.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2075.json index 56f62668621..2280aeb9301 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2075.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2075.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2075", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-27T15:59:02.320", - "lastModified": "2018-10-09T19:56:02.233", + "lastModified": "2024-11-21T02:26:42.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,34 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/130522/SAP-Business-Objects-Unauthorized-Audit-Information-Delete.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/95", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534751/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72778", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2076.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2076.json index 1f848232871..18a8f1bc5e1 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2076.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2076.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2076", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-27T15:59:03.257", - "lastModified": "2018-10-09T19:56:02.623", + "lastModified": "2024-11-21T02:26:43.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "http://www.securityfocus.com/bid/72775", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130523/SAP-Business-Objects-Unauthorized-Audit-Information-Access.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/94", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534750/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72775", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2077.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2077.json index 41202437cbf..8ff54634b6c 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2077.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2077.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2077", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T23:59:00.063", - "lastModified": "2016-12-31T02:59:24.047", + "lastModified": "2024-11-21T02:26:43.177", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -137,6 +136,72 @@ { "url": "https://www.facebook.com/notes/protect-the-graph/windows-ssl-interception-gone-wild/1570074729899339", "source": "cve@mitre.org" + }, + { + "url": "http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html#.VOq6Yfn8Fp4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://blog.erratasec.com/2015/02/some-notes-on-superfish.html#.VOq6Yvn8Fp4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marcrogers.org/2015/02/19/lenovo-installs-adware-on-customer-laptops-and-compromises-all-ssl/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://news.lenovo.com/article_display.cfm?article_id=1929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.lenovo.com/us/en/product_security/superfish", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/529496", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031779", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.theguardian.com/technology/2015/feb/19/lenovo-accused-compromising-user-security-installing-adware-pcs-superfish", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA15-051A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.wired.com/2015/02/lenovo-superfish/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://blog.filippo.io/komodia-superfish-ssl-validation-is-broken/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.facebook.com/notes/protect-the-graph/windows-ssl-interception-gone-wild/1570074729899339", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2078.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2078.json index dffe5afcb75..8fbcf3a1f61 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2078.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2078.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2078", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-24T23:59:03.390", - "lastModified": "2015-02-28T02:59:46.500", + "lastModified": "2024-11-21T02:26:43.343", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,45 @@ { "url": "https://www.facebook.com/notes/protect-the-graph/windows-ssl-interception-gone-wild/1570074729899339", "source": "cve@mitre.org" + }, + { + "url": "http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html#.VOq6Yfn8Fp4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://blog.erratasec.com/2015/02/some-notes-on-superfish.html#.VOq6Yvn8Fp4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/529496", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031779", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA15-051A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://blog.filippo.io/komodia-superfish-ssl-validation-is-broken/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.facebook.com/notes/protect-the-graph/windows-ssl-interception-gone-wild/1570074729899339", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2082.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2082.json index 91e9e5c1a2b..a5bfab7c414 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2082.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2082.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2082", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-25T22:59:02.673", - "lastModified": "2018-10-09T19:56:03.843", + "lastModified": "2024-11-21T02:26:43.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ { "url": "http://www.securityfocus.com/bid/74896", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130396/UNIT4-Prosoft-HRMS-8.14.230.47-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534705/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74896", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2083.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2083.json index c928980d6f9..fe928342e6c 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2083.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2083.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2083", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-25T22:59:03.923", - "lastModified": "2016-11-30T03:00:58.223", + "lastModified": "2024-11-21T02:26:43.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/74898", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130441/Ilch-CMS-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74898", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2084.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2084.json index b7197228dbf..c446094d8c0 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2084.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2084.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2084", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-25T22:59:04.877", - "lastModified": "2016-11-30T03:00:59.240", + "lastModified": "2024-11-21T02:26:45.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ { "url": "https://wordpress.org/plugins/easy-social-icons/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130461/WordPress-Easy-Social-Icons-1.2.2-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74893", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/easy-social-icons/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2086.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2086.json index 6c3ea5eb89a..c032107c0a0 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2086.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2086.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2086", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-26T15:59:00.057", - "lastModified": "2015-02-26T19:14:49.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:45.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -92,6 +91,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72671", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2428749", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2428799", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2087.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2087.json index e8b8dbf9392..632802e2343 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2087.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2087.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2087", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-26T15:59:01.260", - "lastModified": "2015-02-27T17:43:49.587", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", + "lastModified": "2024-11-21T02:26:45.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -92,6 +90,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72674", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2427069", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2428793", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2088.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2088.json index 5174dd5396e..ce5b7452067 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2088.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2088.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2088", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-26T15:59:02.260", - "lastModified": "2015-02-26T19:15:04.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:46.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72678", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2428483", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2428853", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2089.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2089.json index 151f98fa20d..cd69a553e85 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2089.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2089.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2089", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-26T15:59:03.353", - "lastModified": "2016-11-30T03:01:00.333", + "lastModified": "2024-11-21T02:26:46.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/bid/74894", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130313/WordPress-Cross-Slide-2.0.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74894", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2090.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2090.json index a2cf0112c59..91a5b4bcfb8 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2090.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2090.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2090", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-26T15:59:04.370", - "lastModified": "2016-11-30T03:01:01.457", + "lastModified": "2024-11-21T02:26:46.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,32 @@ { "url": "https://wordpress.org/plugins/wp-survey-and-poll/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/118218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130381/WordPress-Survey-And-Poll-1.1.7-Blind-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36054", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/wp-survey-and-poll/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2091.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2091.json index 67079c0d18a..94ac32dbc44 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2091.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2091.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2091", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-13T14:59:02.020", - "lastModified": "2017-09-19T01:36:55.890", + "lastModified": "2024-11-21T02:26:46.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,25 @@ { "url": "https://security.gentoo.org/glsa/201709-04", "source": "cve@mitre.org" + }, + { + "url": "http://issues.outoforder.cc/view.php?id=93", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578663", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201709-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2092.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2092.json index 4eab7f18b7d..b681ece0d74 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2092.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2092.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2092", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:10.433", - "lastModified": "2016-11-28T19:19:23.937", + "lastModified": "2024-11-21T02:26:46.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-053/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/72840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-053/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2093.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2093.json index 8952f0782fd..575068959ff 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2093.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2093.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2093", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:11.653", - "lastModified": "2016-11-30T03:01:02.443", + "lastModified": "2024-11-21T02:26:46.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-054/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/72839", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-054/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2094.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2094.json index 81ba6cc357c..6d249a99360 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2094.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2094.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2094", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:12.497", - "lastModified": "2016-11-30T03:01:03.410", + "lastModified": "2024-11-21T02:26:46.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -118,6 +117,53 @@ { "url": "https://www.exploit-db.com/exploits/36517/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131069/WebGate-WinRDS-2.0.8-StopSiteAllChannel-Stack-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/118905", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/118906", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/118907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/118908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72841", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-071/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-072/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-073/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-074/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36517/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2095.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2095.json index e249f2a018a..2cce3daf091 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2095.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2095.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2095", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:13.480", - "lastModified": "2016-11-30T03:01:04.443", + "lastModified": "2024-11-21T02:26:47.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-070/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/73222", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-070/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2096.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2096.json index d3073e4036b..12c8faf0841 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2096.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2096.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2096", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:14.340", - "lastModified": "2016-11-30T03:01:05.567", + "lastModified": "2024-11-21T02:26:47.217", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +78,15 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-069/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/72849", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-069/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2097.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2097.json index 90d9c99947b..1f791da7fae 100644 --- a/CVE-2015/CVE-2015-20xx/CVE-2015-2097.json +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2097.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2097", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T14:59:15.170", - "lastModified": "2016-11-30T03:01:06.567", + "lastModified": "2024-11-21T02:26:47.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -128,6 +127,63 @@ { "url": "https://www.exploit-db.com/exploits/36607/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131072/WebGate-eDVR-Manager-Stack-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/90", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/118893", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/118896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/118902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72835", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-059/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-062/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-068/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36505/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36602/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36607/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2101.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2101.json index 88922a1d807..9a2dd12a719 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2101.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2101.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2101", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-27T15:59:04.133", - "lastModified": "2019-06-14T13:30:00.530", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:48.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,38 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72670", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.drupal.org/node/2428503", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2428505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://www.drupal.org/node/2428815", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2102.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2102.json index c64b8bce27c..93d278323f2 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2102.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2102.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2102", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-27T15:59:05.257", - "lastModified": "2018-10-09T19:56:04.107", + "lastModified": "2024-11-21T02:26:48.167", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,32 @@ { "url": "http://www.securityfocus.com/bid/72879", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/118667", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130485/Clipbucket-2.7.0.4.v2929-rc3-Blind-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36156", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534790/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72879", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2103.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2103.json index e0d65636a81..9f3e092284c 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2103.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2103.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2103", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-27T15:59:06.460", - "lastModified": "2018-10-09T19:56:04.497", + "lastModified": "2024-11-21T02:26:48.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "http://www.securityfocus.com/archive/1/534710/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130403/Cosmoshop-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534710/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2106.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2106.json index 523540ce3d2..034a81212e0 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2106.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2106.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2106", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-31T10:59:04.997", - "lastModified": "2016-11-30T03:01:08.727", + "lastModified": "2024-11-21T02:26:48.473", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,39 @@ "tags": [ "Not Applicable" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04582368", + "source": "hp-security-alert@hp.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73324", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04582368", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04582368", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2107.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2107.json index ed46371f149..b0c878be414 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2107.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2107.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2107", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-14T01:59:15.533", - "lastModified": "2019-10-09T23:13:28.237", + "lastModified": "2024-11-21T02:26:48.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 6.8, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -84,6 +83,13 @@ } ], "references": [ + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04588084", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04588084", "source": "hp-security-alert@hp.com", @@ -94,6 +100,24 @@ { "url": "http://www.securitytracker.com/id/1031870", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04588084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04588084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031870", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2108.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2108.json index cb971082e99..8e9c1676e19 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2108.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2108.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2108", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-31T10:59:05.917", - "lastModified": "2016-11-30T03:01:09.867", + "lastModified": "2024-11-21T02:26:48.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,39 @@ "tags": [ "Not Applicable" ] + }, + { + "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04595417", + "source": "hp-security-alert@hp.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73320", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031987", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04595417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04595417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2109.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2109.json index ceaaa916cf2..907bd54ae38 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2109.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2109.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2109", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-03-31T10:59:06.870", - "lastModified": "2016-11-30T03:01:11.007", + "lastModified": "2024-11-21T02:26:48.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04595607", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73323", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04595607", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04595607", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2110.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2110.json index 885898f0f57..af0cce057d3 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2110.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2110.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2110", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-05-25T17:59:00.093", - "lastModified": "2019-10-09T23:13:28.487", + "lastModified": "2024-11-21T02:26:48.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04594015", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04594015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04594015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2111.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2111.json index e450977a0bb..683c931df55 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2111.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2111.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2111", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-04-04T01:59:03.563", - "lastModified": "2016-11-30T03:01:12.163", + "lastModified": "2024-11-21T02:26:49.013", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -110,6 +109,34 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04626732", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04626732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04626732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2112.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2112.json index f43bf178f5f..d30df2f26a7 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2112.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2112.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2112", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-04-14T22:59:14.307", - "lastModified": "2019-10-09T23:13:28.657", + "lastModified": "2024-11-21T02:26:49.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -130,6 +129,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04629160", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04629160", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04629160", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2113.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2113.json index ed939538f48..1af472bf1bd 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2113.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2113.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2113", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-04-14T22:59:15.400", - "lastModified": "2019-10-09T23:13:28.847", + "lastModified": "2024-11-21T02:26:49.237", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04629160", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04629160", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04629160", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2114.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2114.json index 805ef37c541..2c23dde900a 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2114.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2114.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2114", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-04-14T22:59:16.163", - "lastModified": "2016-11-30T03:01:13.100", + "lastModified": "2024-11-21T02:26:49.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04634535", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04634535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04634535", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2115.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2115.json index e2b8cf0cd29..8e7b170f2fb 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2115.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2115.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2115", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-04-27T16:59:00.093", - "lastModified": "2016-12-03T03:04:03.003", + "lastModified": "2024-11-21T02:26:49.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 2.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.7 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.1, @@ -88,6 +87,34 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04633710", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74336", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04633710", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04633710", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2116.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2116.json index 7a61c79b118..bdb185370b4 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2116.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2116.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2116", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-04-27T12:59:04.377", - "lastModified": "2016-12-03T03:04:04.050", + "lastModified": "2024-11-21T02:26:49.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -102,6 +101,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04636829", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74249", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032162", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04636829", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04636829", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2117.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2117.json index c173d998f42..56a5d3acb12 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2117.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2117.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2117", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-04-27T12:59:05.360", - "lastModified": "2016-12-03T03:04:04.987", + "lastModified": "2024-11-21T02:26:49.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,39 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04626974", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-15-154/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04626974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04626974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2118.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2118.json index dcc41f297e5..245668541be 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2118.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2118.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2118", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-05-25T17:59:01.310", - "lastModified": "2019-10-09T23:13:29.173", + "lastModified": "2024-11-21T02:26:49.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -109,6 +108,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04649315", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2120.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2120.json index 11affb5ec0c..c3eba8e0f58 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2120.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2120.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2120", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-05-25T14:59:17.230", - "lastModified": "2016-12-31T02:59:24.110", + "lastModified": "2024-11-21T02:26:49.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:P/A:C", + "baseScore": 8.7, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 8.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -97,6 +96,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04688784", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74801", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-239", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04688784", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04688784", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2121.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2121.json index 8bae0ae381a..637487683af 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2121.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2121.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2121", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-05-25T17:59:02.280", - "lastModified": "2016-12-03T03:04:07.097", + "lastModified": "2024-11-21T02:26:50.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,35 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04657310", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-15-192/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04657310", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04657310", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2122.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2122.json index 22ed6ada479..2f1d41259b9 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2122.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2122.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2122", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-05-25T14:59:18.153", - "lastModified": "2016-12-03T03:04:08.253", + "lastModified": "2024-11-21T02:26:50.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04657823", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04657823", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04657823", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2123.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2123.json index 18a3e7b46dc..68f91303888 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2123.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2123.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2123", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2015-05-25T17:59:03.310", - "lastModified": "2016-12-03T03:04:09.270", + "lastModified": "2024-11-21T02:26:50.237", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -95,6 +94,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04683599", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74819", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04683599", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04683599", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2149.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2149.json index 83de588e299..02f2b5dd348 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2149.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2149.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2149", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-18T14:59:00.077", - "lastModified": "2016-06-23T17:55:37.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:52.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -113,6 +112,47 @@ { "url": "http://www.securitytracker.com/id/1031953", "source": "cve@mitre.org" + }, + { + "url": "http://blog.mybb.com/2015/02/15/mybb-1-8-4-released-feature-update-security-maintenance-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/80", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/629", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sroesemann.blogspot.de/2015/02/sroeadv-2015-15.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72738", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031953", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2150.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2150.json index d10e249cf02..0ca2155699f 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2150.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2150.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2150", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-12T14:59:02.633", - "lastModified": "2023-11-07T02:25:09.333", + "lastModified": "2024-11-21T02:26:52.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -334,6 +333,93 @@ { "url": "https://seclists.org/bugtraq/2019/Aug/18", "source": "cve@mitre.org" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=af6fc858a35b90e89ea7a7ee58e66628c55c776b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155804.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155908.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152747.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031806", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2631-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2632-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-423503.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-120.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196266", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/af6fc858a35b90e89ea7a7ee58e66628c55c776b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/bugtraq/2019/Aug/18", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2151.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2151.json index aca49498a3a..090b35830ba 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2151.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2151.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2151", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-12T14:59:03.837", - "lastModified": "2018-10-30T16:26:53.700", + "lastModified": "2024-11-21T02:26:52.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -356,6 +355,86 @@ { "url": "https://security.gentoo.org/glsa/201604-03", "source": "cve@mitre.org" + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX200484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3181", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73015", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031806", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031903", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-423503.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-123.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201604-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2152.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2152.json index ab569acc752..6e0b9d9aa8f 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2152.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2152.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2152", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-18T16:59:02.483", - "lastModified": "2018-10-30T16:26:52.560", + "lastModified": "2024-11-21T02:26:53.137", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -154,6 +153,63 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152483.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152588.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152776.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73068", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031806", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031919", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-119.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2153.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2153.json index 58c7f039090..e1087768b54 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2153.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2153.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2153", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-24T17:59:06.913", - "lastModified": "2018-10-09T19:56:04.717", + "lastModified": "2024-11-21T02:26:53.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -140,6 +139,74 @@ { "url": "https://www.exploit-db.com/exploits/37663/", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0114.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153834.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153999.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:182", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534829/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2580-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:1871", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201795", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37663/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2154.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2154.json index 30fad3e2d20..90c17c039ec 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2154.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2154.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2154", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-24T17:59:07.820", - "lastModified": "2018-10-09T19:56:06.200", + "lastModified": "2024-11-21T02:26:53.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -136,6 +135,70 @@ { "url": "https://security.gentoo.org/glsa/201510-04", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0114.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153834.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153999.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:182", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534829/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73017", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2580-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:1871", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2155.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2155.json index d26490eacc2..c084fa1797f 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2155.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2155.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2155", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-24T17:59:08.883", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:26:53.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -237,6 +236,101 @@ { "url": "https://security.gentoo.org/glsa/201510-04", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0114.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153834.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:125", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:182", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534829/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73021", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2580-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:1871", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201798", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201510-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2157.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2157.json index b5000b26e19..147dd0f7b61 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2157.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2157.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2157", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:05.697", - "lastModified": "2019-03-21T17:04:58.450", + "lastModified": "2024-11-21T02:26:53.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -219,6 +218,54 @@ { "url": "http://www.securityfocus.com/bid/72825", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151790.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151839.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151933.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/private-key-not-wiped-2.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3190", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/28/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/28/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72825", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2165.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2165.json index 8a9e110ed02..d3aa146f151 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2165.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2165.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2165", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-06T15:59:01.137", - "lastModified": "2019-06-14T13:39:47.423", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:54.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,23 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/131232/Ericsson-Drutt-MSDP-Report-Viewer-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73933", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2166.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2166.json index ec2241d8428..794dd01b2e0 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2166.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2166.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2166", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-06T15:59:02.213", - "lastModified": "2016-12-03T03:04:13.723", + "lastModified": "2024-11-21T02:26:54.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,21 @@ { "url": "https://www.exploit-db.com/exploits/36619/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131233/Ericsson-Drutt-MSDP-Instance-Monitor-Directory-Traversal-File-Access.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36619/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2167.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2167.json index e9f2215d259..9fef7b40972 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2167.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2167.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2167", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-06T15:59:03.167", - "lastModified": "2016-12-03T03:04:14.833", + "lastModified": "2024-11-21T02:26:54.510", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +91,18 @@ { "url": "http://www.securityfocus.com/bid/73934", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131230/Ericsson-Drutt-MSDP-3PI-Manager-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73934", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2170.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2170.json index 00b8ce3e418..40ab9e93ae2 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2170.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2170.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2170", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:09.287", - "lastModified": "2017-01-03T02:59:52.740", + "lastModified": "2024-11-21T02:26:54.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -126,6 +125,30 @@ { "url": "https://security.gentoo.org/glsa/201512-08", "source": "cve@mitre.org" + }, + { + "url": "http://blog.clamav.net/2015/04/clamav-0987-has-been-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2594-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74443", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2171.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2171.json index e03f4bedbf8..58626359288 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2171.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2171.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2171", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T14:59:05.943", - "lastModified": "2016-12-03T03:04:18.053", + "lastModified": "2024-11-21T02:26:54.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,25 @@ { "url": "https://github.com/slimphp/Slim/issues/1034", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/70087", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slimframework.com/2015/03/01/version-260.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/slimphp/Slim/issues/1034", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2172.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2172.json index 93e3ac0cd1f..927782bec20 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2172.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2172.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2172", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T14:59:07.070", - "lastModified": "2019-02-05T18:24:59.563", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:55.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -148,6 +147,74 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0093.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152994.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153266.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72827", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/splitbrain/dokuwiki/commit/4970ad24ce49ec76a0ee67bca7594f918ced2f5f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/splitbrain/dokuwiki/issues/1056", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.dokuwiki.org/changes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2177.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2177.json index 7824fbbfa39..fa037673c52 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2177.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2177.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2177", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-07T02:59:09.160", - "lastModified": "2018-06-02T01:29:00.467", + "lastModified": "2024-11-21T02:26:55.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -114,6 +113,37 @@ { "url": "https://www.exploit-db.com/exploits/44802/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/72973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032040", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-987029.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-987029.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-064-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/44802/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2182.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2182.json index 31a1cd72775..4e52ed6ae5e 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2182.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2182.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2182", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-11T14:59:06.110", - "lastModified": "2015-03-11T19:38:08.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:55.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -136,6 +135,71 @@ { "url": "https://github.com/ZeusCart/zeuscart/issues/28", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/68756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/89", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secpod.org/advisories/SECPOD_ZeusCart_XSS.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secpod.org/blog/?p=109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-12.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36159", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/ZeusCart/zeuscart/issues/28", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2183.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2183.json index e08fc60f9a7..7fec3963b40 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2183.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2183.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2183", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-10T14:59:06.397", - "lastModified": "2015-07-28T15:05:21.760", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:56.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,50 @@ { "url": "https://github.com/ZeusCart/zeuscart/issues/28", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/89", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-12.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/ZeusCart/zeuscart/issues/28", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2184.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2184.json index bb811d6f472..36db6ff2939 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2184.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2184.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2184", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-10T14:59:07.460", - "lastModified": "2015-03-11T14:55:06.483", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:56.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -121,6 +120,56 @@ { "url": "https://github.com/ZeusCart/zeuscart/issues/28", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130487/Zeuscart-4-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/89", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/oss-sec/2015/q1/727", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sroesemann.blogspot.de/2015/01/sroeadv-2015-12.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36159", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72761", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ZeusCart/zeuscart/issues/28", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2187.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2187.json index 99a4410674b..8612b0b4428 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2187.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2187.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2187", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-08T02:59:01.637", - "lastModified": "2023-11-07T02:25:10.480", + "lastModified": "2024-11-21T02:26:56.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -137,6 +136,37 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72940", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031858", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9952", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1a3dd349233a4ee3e69295c8e79f9a216027037e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2188.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2188.json index c7ed3012a3c..e72458cd3a5 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2188.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2188.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2188", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-08T02:59:02.870", - "lastModified": "2023-11-07T02:25:10.563", + "lastModified": "2024-11-21T02:26:56.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -302,6 +301,82 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031858", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10844", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b204ff4846fe84b7789893c6b1d9afbdecac5b5d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2189.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2189.json index f856b766c43..1d7e1821f68 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2189.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2189.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2189", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-08T02:59:03.870", - "lastModified": "2023-11-07T02:25:10.667", + "lastModified": "2024-11-21T02:26:56.817", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -306,6 +305,86 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031858", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-08.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a835c85e3d662343d7283f1dcdacb8a11d1d0727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2190.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2190.json index f02e4fca157..f5205f319b7 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2190.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2190.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2190", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-08T02:59:04.870", - "lastModified": "2023-11-07T02:25:10.770", + "lastModified": "2024-11-21T02:26:57.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -169,6 +168,54 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72938", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031858", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10983", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d1865e000ebedf49fc0d9f221a11d6af74360837", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2191.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2191.json index ba82a3e7980..fcaa015e894 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2191.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2191.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2191", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-08T02:59:05.777", - "lastModified": "2023-11-07T02:25:10.847", + "lastModified": "2024-11-21T02:26:57.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -276,6 +275,76 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72941", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031858", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=608cf324b3962877e9699f3e81e8f82ac9f1ea14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2192.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2192.json index 7256b2efa63..485b202de42 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2192.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2192.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2192", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-08T02:59:06.760", - "lastModified": "2023-11-07T02:25:10.947", + "lastModified": "2024-11-21T02:26:57.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -137,6 +136,37 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031858", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-11.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11024", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35ca6c051adb28c321db54cc138f18637977c9a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2194.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2194.json index 146c9c4d282..f186168d256 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2194.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2194.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2194", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-03T19:59:00.060", - "lastModified": "2016-12-03T03:04:20.287", + "lastModified": "2024-11-21T02:26:57.490", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -87,6 +85,22 @@ { "url": "https://wpvulndb.com/vulnerabilities/7795", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130397/WordPress-Fusion-3.1-Arbitrary-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/75341", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7795", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2195.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2195.json index 764810b6fef..ac1861f3a5d 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2195.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2195.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2195", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-03T19:59:01.297", - "lastModified": "2018-10-09T19:56:09.077", + "lastModified": "2024-11-21T02:26:57.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -75,6 +74,10 @@ { "url": "http://www.securityfocus.com/archive/1/534773/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/archive/1/534773/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2196.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2196.json index 7e5b64323d4..96ee08629cb 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2196.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2196.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2196", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-03T19:59:02.467", - "lastModified": "2015-03-04T19:11:55.953", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:57.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/36061", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2197.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2197.json index ae99edc3f50..63df10f1a50 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2197.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2197.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2197", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-03T19:59:03.607", - "lastModified": "2015-03-04T19:13:23.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:58.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -91,6 +90,25 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72806", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2437885", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2437905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2198.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2198.json index bea4a824962..f4d6aa97e67 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2198.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2198.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2198", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-03T19:59:04.653", - "lastModified": "2015-03-04T19:13:39.313", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:58.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://sourceforge.net/p/beehiveforum/news/2015/02/beehive-forum-145-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/36154", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-21xx/CVE-2015-2199.json b/CVE-2015/CVE-2015-21xx/CVE-2015-2199.json index 9d5a54a3c4c..054080f755b 100644 --- a/CVE-2015/CVE-2015-21xx/CVE-2015-2199.json +++ b/CVE-2015/CVE-2015-21xx/CVE-2015-2199.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2199", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-03T19:59:05.717", - "lastModified": "2015-03-04T19:14:02.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:26:59.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,32 @@ { "url": "http://www.wonderplugin.com/wordpress-audio-player/", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/118508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/118509", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.szurek.pl/wonderplugin-audio-player-20-blind-sql-injection-and-xss.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36086", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.wonderplugin.com/wordpress-audio-player/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2206.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2206.json index 061da71ae22..438d7daff12 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2206.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2206.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2206", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T17:59:10.283", - "lastModified": "2016-12-28T02:59:07.247", + "lastModified": "2024-11-21T02:27:00.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -420,6 +419,65 @@ { "url": "https://github.com/phpmyadmin/phpmyadmin/commit/b2f1e895038a5700bf8e81fb9a5da36cbdea0eeb", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151331.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151914.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151931.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3382", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:186", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2015-1.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72949", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031871", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/b2f1e895038a5700bf8e81fb9a5da36cbdea0eeb", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2208.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2208.json index a9b301058a0..238b388e1e4 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2208.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2208.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2208", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-12T14:59:04.883", - "lastModified": "2015-03-12T16:42:18.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:00.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,41 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130685/PHPMoAdmin-1.1.2-Remote-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36251", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/04/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/04/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2209.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2209.json index 3f408f627fa..4a771fc0469 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2209.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2209.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2209", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-04T20:59:00.047", - "lastModified": "2016-12-03T03:04:21.303", + "lastModified": "2024-11-21T02:27:00.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "http://www.securityfocus.com/bid/72685", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Feb/67", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/full-path-disclosure-vulnerability/dlguard-full-path-disclosure-information-leakage-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72685", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2214.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2214.json index 565949145c8..4a4cff8d5c0 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2214.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2214.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2214", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-05T15:59:00.063", - "lastModified": "2016-12-03T03:04:22.397", + "lastModified": "2024-11-21T02:27:00.963", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ { "url": "http://www.securityfocus.com/bid/72854", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130583/NetCat-CMS-5.01-3.12-Full-Path-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/full-path-disclosure-vulnerability/netcat-cms-full-path-disclosure-information-disclosure-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72854", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2215.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2215.json index b7307bc4af1..574915f878d 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2215.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2215.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2215", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-05T15:59:01.233", - "lastModified": "2015-03-05T17:29:29.113", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:27:01.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +81,18 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/72803", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2437965", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2216.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2216.json index a9dddd9383d..5383c47a022 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2216.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2216.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2216", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-05T15:59:02.517", - "lastModified": "2016-12-03T03:04:23.443", + "lastModified": "2024-11-21T02:27:01.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ { "url": "https://wpvulndb.com/vulnerabilities/7818", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130595/WordPress-Photocrati-Theme-4.x.x-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36242", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74854", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7818", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2217.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2217.json index fbf65a76fba..6fad738f2ac 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2217.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2217.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2217", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-10T14:59:08.350", - "lastModified": "2018-10-09T19:56:09.437", + "lastModified": "2024-11-21T02:27:01.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://github.com/PHP-Outburst/myUPB/issues/17", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130684/Ultimate-PHP-Board-UPB-2.2.7-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534796/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72991", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Halamix2/MyUPB/blob/8b00a8f6ea999d22c22b081f4a144f51ec7225b0/changelog.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/PHP-Outburst/myUPB/issues/17", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2218.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2218.json index 3df26ef12e6..637c7f8eda3 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2218.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2218.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2218", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-05T16:59:01.163", - "lastModified": "2016-12-03T03:04:25.553", + "lastModified": "2024-11-21T02:27:01.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,39 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/show/osvdb/118510", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/118511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.szurek.pl/wonderplugin-audio-player-20-blind-sql-injection-and-xss.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36086", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74851", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wonderplugin.com/wordpress-audio-player/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2219.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2219.json index a8dd59beccd..5a73b1301e4 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2219.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2219.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2219", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:10.587", - "lastModified": "2016-12-03T03:04:26.663", + "lastModified": "2024-11-21T02:27:01.687", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -91,6 +90,25 @@ { "url": "http://www.securityfocus.com/bid/74649", "source": "cve@mitre.org" + }, + { + "url": "http://securitytracker.com/id/1032268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.lenovo.com/us/en/product_security/lsu_privilege", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ioactive.com/pdfs/Lenovo_System_Update_Multiple_Privilege_Escalations.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74649", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2220.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2220.json index 12d534912df..84a8a3fa04a 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2220.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2220.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2220", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-05T16:59:02.570", - "lastModified": "2018-10-09T19:56:09.843", + "lastModified": "2024-11-21T02:27:01.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ { "url": "https://wordpress.org/plugins/ninja-forms/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130369/WordPress-Ninja-Forms-2.8.8-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534687/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74857", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/ninja-forms/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2221.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2221.json index 400e98fcb55..9051876a9bf 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2221.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2221.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2221", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:12.243", - "lastModified": "2017-01-03T02:59:52.803", + "lastModified": "2024-11-21T02:27:01.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -126,6 +125,30 @@ { "url": "https://security.gentoo.org/glsa/201512-08", "source": "cve@mitre.org" + }, + { + "url": "http://blog.clamav.net/2015/04/clamav-0987-has-been-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2594-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74443", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2222.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2222.json index b2502cfc285..28edd0e71ae 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2222.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2222.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2222", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:13.117", - "lastModified": "2017-01-03T02:59:52.833", + "lastModified": "2024-11-21T02:27:02.133", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -126,6 +125,30 @@ { "url": "https://security.gentoo.org/glsa/201512-08", "source": "cve@mitre.org" + }, + { + "url": "http://blog.clamav.net/2015/04/clamav-0987-has-been-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2594-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74443", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2223.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2223.json index 7a3805b3f02..c2b6c5a6305 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2223.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2223.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2223", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T14:59:03.333", - "lastModified": "2018-10-09T19:56:10.170", + "lastModified": "2024-11-21T02:27:02.330", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://security.paloaltonetworks.com/CVE-2015-2223", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131182/Palo-Alto-Traps-Server-3.1.2.1546-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535113/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73704", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.paloaltonetworks.com/CVE-2015-2223", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2233.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2233.json index 7eebace0ea9..9ac941e11c9 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2233.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2233.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2233", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:14.070", - "lastModified": "2016-12-03T03:04:32.193", + "lastModified": "2024-11-21T02:27:02.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -91,6 +90,25 @@ { "url": "http://www.securityfocus.com/bid/74642", "source": "cve@mitre.org" + }, + { + "url": "http://securitytracker.com/id/1032268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.lenovo.com/us/en/product_security/lsu_privilege", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ioactive.com/pdfs/Lenovo_System_Update_Multiple_Privilege_Escalations.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74642", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2234.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2234.json index 68b27fbaf4c..115fad4790e 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2234.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2234.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2234", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:15.027", - "lastModified": "2017-01-03T02:59:52.880", + "lastModified": "2024-11-21T02:27:02.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -91,6 +90,25 @@ { "url": "http://www.securityfocus.com/bid/74634", "source": "cve@mitre.org" + }, + { + "url": "http://securitytracker.com/id/1032268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.lenovo.com/us/en/product_security/lsu_privilege", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ioactive.com/pdfs/Lenovo_System_Update_Multiple_Privilege_Escalations.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74634", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2237.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2237.json index d0b88c62583..28aaba292c1 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2237.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2237.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2237", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-12T17:59:00.077", - "lastModified": "2018-10-09T19:56:10.497", + "lastModified": "2024-11-21T02:27:02.997", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://www.exploit-db.com/exploits/36306/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130696/Betster-1.0.4-SQL-Injection-Authentication-Bypass.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534816/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36306/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2238.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2238.json index dc1b98622e3..e9a677799c1 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2238.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2238.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2238", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T00:59:28.810", - "lastModified": "2016-11-18T19:05:04.933", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:03.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -122,6 +121,20 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2239.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2239.json index 427b195e5f5..b9ea00da8f9 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2239.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2239.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2239", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T00:59:29.793", - "lastModified": "2016-12-03T03:04:34.383", + "lastModified": "2024-11-21T02:27:03.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ { "url": "https://code.google.com/p/chromium/issues/detail?id=463349", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74855", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=256724", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=463349", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2241.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2241.json index 1a5b783b461..15ed06996c7 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2241.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2241.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2241", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-12T14:59:05.870", - "lastModified": "2016-12-03T03:04:35.397", + "lastModified": "2024-11-21T02:27:03.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.djangoproject.com/ticket/24461", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://www.djangoproject.com/weblog/2015/mar/09/security-releases/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2242.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2242.json index b50dc979a1b..907fada53fe 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2242.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2242.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2242", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T17:59:11.500", - "lastModified": "2015-03-10T17:29:25.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:03.603", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "http://tetraph.com/security/sql-injection-vulnerability/webshop-hun-v1-062s-sql-injection-security-vulnerabilities/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130656/Webshop-Hun-1.062S-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/27", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/sql-injection-vulnerability/webshop-hun-v1-062s-sql-injection-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2243.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2243.json index 10341f5e7ae..bae9e418850 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2243.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2243.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2243", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T17:59:12.687", - "lastModified": "2015-03-10T17:29:55.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:03.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "http://tetraph.com/security/directory-traversal-vulnerability/webshop-hun-v1-062s-directory-traversal-security-vulnerabilities/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130653/Webshop-Hun-1.062S-Directory-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/directory-traversal-vulnerability/webshop-hun-v1-062s-directory-traversal-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2244.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2244.json index 795b6926c22..58c0410d828 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2244.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2244.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2244", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-09T17:59:13.627", - "lastModified": "2015-03-10T17:30:08.343", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:03.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "http://tetraph.com/security/xss-vulnerability/webshop-hun-v1-062s-xss-cross-site-scripting-security-vulnerabilities/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130648/Webshop-Hun-1.062S-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/25", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/xss-vulnerability/webshop-hun-v1-062s-xss-cross-site-scripting-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2247.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2247.json index b5491946d1e..335f784c5ff 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2247.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2247.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2247", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T17:59:00.070", - "lastModified": "2015-04-13T21:51:04.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:04.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -87,6 +86,22 @@ { "url": "https://twitter.com/rich0H/status/576484574504439808", "source": "cve@mitre.org" + }, + { + "url": "http://www.theregister.co.uk/2014/12/19/hack_hijacks_boosted_skateboards_kills_hipsters/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://speakerdeck.com/richo/building-a-hipster-catapult-or-how2own-your-skateboard", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://twitter.com/aphyr/status/576502129264738304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://twitter.com/rich0H/status/576484574504439808", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2248.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2248.json index fde2c61242e..820dcd7f608 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2248.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2248.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2248", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-01T15:59:04.803", - "lastModified": "2018-03-12T16:47:12.363", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:04.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -128,6 +127,55 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/131762/Dell-SonicWALL-Secure-Remote-Access-7.5-8.0-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.scip.ch/en/?vuldb.75111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73098", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.software.dell.com/product-notification/151370?productName=SonicWALL%20SRA%20Series", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36940/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2250.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2250.json index 7c579591496..e46121a2186 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2250.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2250.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2250", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-15T18:59:00.087", - "lastModified": "2018-10-09T19:56:10.747", + "lastModified": "2024-11-21T02:27:05.243", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -109,6 +108,43 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131882/Concrete5-5.7.3.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/51", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535531/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74651", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.concrete5.org/documentation/developers/5.7/background/version-history/5-7-4-release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.netsparker.com/cve-2015-2250-multiple-xss-vulnerabilities-identified-in-concrete5/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2264.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2264.json index 1ff2776d486..fafc449d40c 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2264.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2264.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2264", "sourceIdentifier": "cret@cert.org", "published": "2015-03-13T01:59:34.007", - "lastModified": "2015-03-13T19:00:29.593", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path\n", + "lastModified": "2024-11-21T02:27:06.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -81,6 +79,15 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/794095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path\n" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2265.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2265.json index 4c11a31f05a..d381ef1812a 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2265.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2265.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2265", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-24T17:59:09.727", - "lastModified": "2016-12-28T02:59:07.323", + "lastModified": "2024-11-21T02:27:06.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -125,6 +124,39 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7333", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2532-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://bugs.linuxfoundation.org/show_bug.cgi?id=1265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2275.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2275.json index 53e3e731716..95280675a22 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2275.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2275.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2275", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-12T17:59:02.560", - "lastModified": "2018-10-09T19:56:11.217", + "lastModified": "2024-11-21T02:27:07.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,46 @@ { "url": "http://www.securityfocus.com/bid/73053", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130766/Community-Gallery-2.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/65", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36368", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.itas.vn/news/itas-team-found-out-a-stored-xss-vulnerability-in-burning-board-community-gallery-77.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/119455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534841/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73053", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2281.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2281.json index 7044c99744a..f95330592de 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2281.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2281.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2281", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-19T14:59:00.070", - "lastModified": "2018-10-09T19:56:13.467", + "lastModified": "2024-11-21T02:27:08.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -112,6 +111,47 @@ { "url": "https://www.exploit-db.com/exploits/36422/", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.coresecurity.com/advisories/fortinet-single-sign-on-stack-overflow", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.fortiguard.com/advisory/2015-02-27-fsso-stack-based-buffer-overflow", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-006/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/119719", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534918/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73206", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36422/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2284.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2284.json index 8b30480e43c..466e66a470e 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2284.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2284.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2284", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-24T17:59:11.070", - "lastModified": "2015-03-25T21:13:12.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:08.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,13 @@ "tags": [ "Patch" ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-107/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2285.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2285.json index 46ae3f2dbef..9885dcfae2c 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2285.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2285.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2285", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-12T14:59:07.027", - "lastModified": "2015-03-13T14:05:22.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:08.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -113,6 +112,35 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130587/Ubuntu-Vivid-Upstart-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.halfdog.net/Security/2015/UpstartLogrotationPrivilegeEscalation/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugs.launchpad.net/ubuntu/+source/upstart/+bug/1425685", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2289.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2289.json index c59e1030e41..d30de6c2c8d 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2289.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2289.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2289", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-23T16:59:01.773", - "lastModified": "2018-10-09T19:56:14.530", + "lastModified": "2024-11-21T02:27:09.277", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -102,6 +101,36 @@ { "url": "https://github.com/s9y/Serendipity/commit/a30886d3bb9d8eeb6698948864c77caaa982435d", "source": "cve@mitre.org" + }, + { + "url": "http://blog.s9y.org/archives/263-Serendipity-2.0.1-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130838/Serendipity-CMS-2.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534871/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/s9y/Serendipity/commit/a30886d3bb9d8eeb6698948864c77caaa982435d", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2292.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2292.json index a1ef3a835a8..2c9679cccbe 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2292.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2292.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2292", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-17T15:59:00.063", - "lastModified": "2016-12-03T03:04:42.790", + "lastModified": "2024-11-21T02:27:09.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -165,6 +164,49 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/73", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031920", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/wordpress-seo/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36413/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://yoast.com/wordpress-seo-security-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2293.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2293.json index 350a4bea778..e9db2d37418 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2293.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2293.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2293", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-17T15:59:01.847", - "lastModified": "2015-03-18T16:13:37.877", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:09.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -158,6 +157,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/73", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031920", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/wordpress-seo/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wpvulndb.com/vulnerabilities/7841", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://yoast.com/wordpress-seo-security-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2294.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2294.json index 94269e46459..86fd047b4a8 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2294.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2294.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2294", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:02.863", - "lastModified": "2019-05-30T14:57:55.183", + "lastModified": "2024-11-21T02:27:09.857", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,39 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/131022/pfSense-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534987/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73344", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36506/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23251", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.pfsense.org/security/advisories/pfSense-SA-15_03.webgui.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2295.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2295.json index 09f0f8dce9f..d6aa66064b8 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2295.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2295.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2295", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:03.133", - "lastModified": "2019-05-30T14:57:55.183", + "lastModified": "2024-11-21T02:27:10.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,36 @@ { "url": "https://www.pfsense.org/security/advisories/pfSense-SA-15_04.webgui.asc", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131022/pfSense-2.2-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534987/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73344", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36506/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23251", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.pfsense.org/security/advisories/pfSense-SA-15_04.webgui.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2296.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2296.json index c4fbf7a3fce..283acf30b5b 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2296.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2296.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2296", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-18T16:59:03.517", - "lastModified": "2021-03-18T13:19:51.930", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-384: Session Fixation", + "lastModified": "2024-11-21T02:27:10.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -192,6 +190,42 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0120.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153594.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/14/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/15/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2531-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://warehouse.python.org/project/requests/2.6.0/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-384: Session Fixation" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2301.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2301.json index 882d57a53e8..5a86625f290 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2301.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2301.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2301", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:10.630", - "lastModified": "2023-11-07T02:25:12.740", + "lastModified": "2024-11-21T02:27:10.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -225,6 +224,14 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "cve@mitre.org", @@ -364,6 +371,190 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=b2cf3f064b8f5efef89bb084521b61318c71781b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2015/03/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List" + ] + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3198", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73037", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2535-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=68901", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194747", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201606-10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2304.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2304.json index 6a63b9f85a9..aa5369bc026 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2304.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2304.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2304", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-15T19:59:00.070", - "lastModified": "2023-11-07T02:25:12.960", + "lastModified": "2024-11-21T02:27:10.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -162,6 +161,61 @@ { "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3180", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/07/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/16/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1035996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2549-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/libarchive/libarchive/pull/110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2305.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2305.json index 2f2637c6115..5394757d1d3 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2305.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2305.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2305", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:11.663", - "lastModified": "2022-08-16T13:29:48.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:10.973", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -213,6 +212,14 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://openwall.com/lists/oss-security/2015/02/07/14", "source": "cve@mitre.org", @@ -316,6 +323,173 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://blog.clamav.net/2015/04/clamav-0987-has-been-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2015/02/07/14", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2015/03/11/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/695940", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72611", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031947", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2572-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2594-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2314.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2314.json index 6e4338fc5c8..d63bcbbcfb8 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2314.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2314.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2314", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-17T15:59:02.797", - "lastModified": "2018-10-09T19:56:16.013", + "lastModified": "2024-11-21T02:27:11.723", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -108,6 +107,42 @@ { "url": "http://www.securityfocus.com/archive/1/534862/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://klikki.fi/adv/wpml.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/71", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wpml.org/2015/03/wpml-security-update-bug-and-fix/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/119541", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534862/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2315.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2315.json index 639b9e002d8..bccd30adb93 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2315.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2315.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2315", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-17T15:59:04.813", - "lastModified": "2018-10-09T19:56:16.483", + "lastModified": "2024-11-21T02:27:11.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,38 @@ { "url": "http://www.securityfocus.com/archive/1/534862/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://klikki.fi/adv/wpml.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/71", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wpml.org/2015/03/wpml-security-update-bug-and-fix/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534862/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2316.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2316.json index b77ec1a6b52..7674b0926a2 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2316.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2316.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2316", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-25T14:59:02.940", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:27:11.993", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -306,6 +305,46 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73322", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2539-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2317.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2317.json index 9ac704ae0b0..9c0f712a159 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2317.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2317.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2317", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-25T14:59:04.377", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:27:12.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -423,6 +422,67 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155421.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160263.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2539-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3204", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.djangoproject.com/weblog/2015/mar/18/security-releases/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2331.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2331.json index ff0a68bfc4c..0ce6c8f8abc 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2331.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2331.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2331", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:12.727", - "lastModified": "2023-11-07T02:25:13.380", + "lastModified": "2024-11-21T02:27:13.997", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -420,6 +419,10 @@ "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", "source": "cve@mitre.org" @@ -458,6 +461,100 @@ { "url": "https://support.apple.com/HT205267", "source": "cve@mitre.org" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=ef8fc4b53d92fbfcd8ef1abbd6f2f5fe2c4a11e5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://hg.nih.at/libzip/rev/9f11d54f692e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154266.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154276.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154666.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155299.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155622.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153983.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143403519711434&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3198", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=69253", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2332.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2332.json index b9e55eb4560..ba290a2aab4 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2332.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2332.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2332", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-18T14:59:01.903", - "lastModified": "2016-12-03T03:04:52.837", + "lastModified": "2024-11-21T02:27:14.147", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ { "url": "http://www.securitytracker.com/id/1031953", "source": "cve@mitre.org" + }, + { + "url": "http://blog.mybb.com/2015/02/15/mybb-1-8-4-released-feature-update-security-maintenance-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031953", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2333.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2333.json index a0cb956e6b4..53e35f3dadf 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2333.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2333.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2333", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-18T14:59:02.873", - "lastModified": "2016-12-03T03:04:53.870", + "lastModified": "2024-11-21T02:27:14.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ { "url": "http://www.securitytracker.com/id/1031953", "source": "cve@mitre.org" + }, + { + "url": "http://blog.mybb.com/2015/02/15/mybb-1-8-4-released-feature-update-security-maintenance-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73213", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031953", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2334.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2334.json index 9cd093c6977..5b2276d515a 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2334.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2334.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2334", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-18T14:59:03.827", - "lastModified": "2016-12-03T03:04:54.900", + "lastModified": "2024-11-21T02:27:14.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ { "url": "http://www.securitytracker.com/id/1031953", "source": "cve@mitre.org" + }, + { + "url": "http://blog.mybb.com/2015/02/15/mybb-1-8-4-released-feature-update-security-maintenance-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73214", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031953", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2335.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2335.json index 58651f5299d..6324cf76a03 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2335.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2335.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2335", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-18T14:59:04.733", - "lastModified": "2016-12-03T03:04:56.057", + "lastModified": "2024-11-21T02:27:14.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ { "url": "http://www.securitytracker.com/id/1031953", "source": "cve@mitre.org" + }, + { + "url": "http://blog.mybb.com/2015/02/15/mybb-1-8-4-released-feature-update-security-maintenance-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031953", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2346.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2346.json index ea335808f62..ab8ce1555e3 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2346.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2346.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2346", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:06.777", - "lastModified": "2016-12-03T03:05:05.793", + "lastModified": "2024-11-21T02:27:15.837", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -84,6 +82,18 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131459/Huawei-SEQ-Analyst-XXE-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/42", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2347.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2347.json index a420df6b9af..47158190d29 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2347.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2347.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2347", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-08T14:59:01.400", - "lastModified": "2015-05-11T15:12:02.753", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:15.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,34 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131460/Huawei-SEQ-Analyst-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/43", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/hw-424267.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://drive.google.com/folderview?id=0B-LWHbwdK3P9fnBlLWZqWlZqNnB0b2xHWFpYUWt3bmY3Y0lPUHVLNm9VTUlFcWhYTHlZSUU&usp=sharing", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2348.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2348.json index 28495771017..208799acbc9 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2348.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2348.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2348", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:14.710", - "lastModified": "2023-11-07T02:25:14.463", + "lastModified": "2024-11-21T02:27:16.107", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -463,6 +462,81 @@ { "url": "https://support.apple.com/HT205267", "source": "cve@mitre.org" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=1291d6bbee93b6109eb07e8f7916ff1b7fcc13e1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73434", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2572-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=69207", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201606-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2349.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2349.json index da4b1332479..c3ed63cfe15 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2349.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2349.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2349", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-19T14:59:01.243", - "lastModified": "2015-09-29T00:41:21.953", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:16.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ { "url": "http://www.securityfocus.com/bid/73063", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130751/SuperWebMailer-5.50.0.01160-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/55", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/xss-vulnerability/superwebmailer-5-50-0-01160-xss-cross-site-scripting-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73063", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2350.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2350.json index a95ac51bb90..f699508396f 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2350.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2350.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2350", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-19T14:59:02.557", - "lastModified": "2015-09-24T18:12:26.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:16.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "http://www.securityfocus.com/bid/73013", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130722/MikroTik-RouterOS-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/49", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73013", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2351.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2351.json index a7160611c1a..f6928f75246 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2351.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2351.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2351", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-19T14:59:03.663", - "lastModified": "2018-10-09T19:56:16.890", + "lastModified": "2024-11-21T02:27:16.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130812/Alkacon-OpenCms-9.5.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/75", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534867/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73112", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/alkacon/opencms-core/issues/304", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2352.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2352.json index f528d74377f..743b40c3cef 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2352.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2352.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2352", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-19T14:59:04.650", - "lastModified": "2016-12-03T03:05:09.123", + "lastModified": "2024-11-21T02:27:16.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ { "url": "http://www.securitytracker.com/id/1031953", "source": "cve@mitre.org" + }, + { + "url": "http://blog.mybb.com/2015/02/15/mybb-1-8-4-released-feature-update-security-maintenance-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031953", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2559.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2559.json index ea2129c8012..94d04619451 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2559.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2559.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2559", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-25T14:59:05.453", - "lastModified": "2019-02-05T18:52:06.460", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:36.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -117,6 +116,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3200", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73219", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.drupal.org/SA-CORE-2015-001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2562.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2562.json index 1dd67b0962c..3f0d544efbb 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2562.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2562.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2562", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-20T14:59:04.327", - "lastModified": "2016-12-03T03:05:12.670", + "lastModified": "2024-11-21T02:27:36.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ { "url": "https://www.exploit-db.com/exploits/36439/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130896/Joomla-ECommerce-WD-1.2.5-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/123", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36439/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2563.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2563.json index e9972b5dbbc..2a5095d3574 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2563.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2563.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2563", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-20T14:59:05.357", - "lastModified": "2015-03-23T13:30:28.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:36.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,18 @@ { "url": "http://tetraph.com/security/sql-injection-vulnerability/vastal-i-tech-phpvid-1-2-3-sql-injection-security-vulnerabilities/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130754/Vastal-I-tech-phpVID-1.2.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/58", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tetraph.com/security/sql-injection-vulnerability/vastal-i-tech-phpvid-1-2-3-sql-injection-security-vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2564.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2564.json index a39773b072c..059147c76fa 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2564.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2564.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2564", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-20T14:59:06.437", - "lastModified": "2018-10-09T19:56:17.967", + "lastModified": "2024-11-21T02:27:36.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -107,6 +106,42 @@ { "url": "http://www.securityfocus.com/archive/1/534832/100/0/threaded", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/119169", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130691/ProjectSend-r561-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/30", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36303", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.itas.vn/news/itas-team-found-out-a-SQL-Injection-vulnerability-in-projectsend-r561-76.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534832/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2565.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2565.json index decc9cc64b5..6ace3e13a31 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2565.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2565.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2565", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T16:59:59.783", - "lastModified": "2017-01-03T18:02:05.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:37.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -119,6 +118,29 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74080", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032129", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2566.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2566.json index 03dfcb87d12..71a4cbff30a 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2566.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2566.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2566", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:00.610", - "lastModified": "2017-01-03T18:11:36.520", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:37.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:M/C:N/I:N/A:P", + "baseScore": 2.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "MULTIPLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -131,6 +130,35 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2567.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2567.json index 31345adbaeb..bf297405d6d 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2567.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2567.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2567", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:01.563", - "lastModified": "2017-01-03T18:39:24.333", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:37.283", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -131,6 +130,35 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2568.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2568.json index ab34558b810..1343e3576a6 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2568.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2568.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2568", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:02.563", - "lastModified": "2022-08-04T19:58:49.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:37.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -445,6 +444,116 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2575-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2570.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2570.json index 15a1872a9b6..f49282187e5 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2570.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2570.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2570", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:03.440", - "lastModified": "2017-01-03T18:37:36.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:37.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -110,6 +109,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74116", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2571.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2571.json index dbf37b2de98..202658d0f9f 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2571.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2571.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2571", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:04.220", - "lastModified": "2022-09-08T21:00:55.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:37.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -420,6 +419,122 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2575-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2572.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2572.json index 10b2cce7b65..f7a0788654f 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2572.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2572.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2572", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:04.957", - "lastModified": "2017-01-03T18:40:32.623", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:37.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -128,6 +127,50 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131507/Oracle-Hyperion-Smart-View-For-Office-11.1.2.3.000-DoS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/120680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74071", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032123", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36783/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2573.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2573.json index 30bc430a91a..9a88a3c7433 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2573.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2573.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2573", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:05.707", - "lastModified": "2022-09-08T21:01:04.380", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:38.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -406,6 +405,108 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1629.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1647.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1665.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74078", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2575-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-19", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2574.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2574.json index e60fffc0b20..7058351a730 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2574.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2574.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2574", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:06.487", - "lastModified": "2017-01-04T16:24:18.133", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:38.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -95,6 +94,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2575.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2575.json index 39ea02ea599..ac412c27928 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2575.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2575.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2575", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:07.253", - "lastModified": "2017-11-10T02:29:01.607", + "lastModified": "2024-11-21T02:27:38.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -165,6 +164,54 @@ { "url": "https://security.netapp.com/advisory/ntap-20150417-0003/", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.debian.org/security/2016/dsa-3621", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20150417-0003/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2576.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2576.json index d8cedb2faeb..3e57c0a86b8 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2576.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2576.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2576", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:07.987", - "lastModified": "2017-01-03T18:39:30.163", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per Oracle: This vulnerability is only applicable on Windows operating system (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)", + "lastModified": "2024-11-21T02:27:38.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -127,6 +125,31 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } - ] + ], + "evaluatorComment": "Per Oracle: This vulnerability is only applicable on Windows operating system (http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html)" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2577.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2577.json index 2b43e1d4280..33e18c5bde9 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2577.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2577.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2577", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:08.770", - "lastModified": "2017-01-03T18:21:30.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:38.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -95,6 +94,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74122", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2578.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2578.json index a4a4e44a6a7..834486b9e6b 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2578.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2578.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2578", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:09.473", - "lastModified": "2017-01-03T18:39:17.723", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:38.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -95,6 +94,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74143", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2579.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2579.json index 9f95f530f8f..822a61b06f7 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2579.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2579.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2579", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-04-16T17:00:10.300", - "lastModified": "2016-12-03T03:05:18.890", + "lastModified": "2024-11-21T02:27:38.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -86,6 +85,21 @@ { "url": "http://www.securitytracker.com/id/1032130", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74113", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032130", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2666.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2666.json index 718092d477b..4a7b67caee2 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2666.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2666.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2666", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T10:59:04.813", - "lastModified": "2024-03-14T19:59:23.823", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:48.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -166,6 +165,56 @@ "tags": [ "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153329.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1534.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/20/18", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032414", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204722", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2667.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2667.json index 45c0e335d8f..943d13fc35a 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2667.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2667.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2667", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:07.760", - "lastModified": "2016-12-03T03:05:35.877", + "lastModified": "2024-11-21T02:27:48.863", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -83,6 +81,18 @@ { "url": "http://www.securityfocus.com/bid/74710", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131731/GNS3-1.2.3-DLL-Hijacking.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74710", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2668.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2668.json index 5ce23474625..baacd060d01 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2668.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2668.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2668", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:15.930", - "lastModified": "2017-01-03T02:59:53.693", + "lastModified": "2024-11-21T02:27:48.997", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -126,6 +125,30 @@ { "url": "https://security.gentoo.org/glsa/201512-08", "source": "cve@mitre.org" + }, + { + "url": "http://blog.clamav.net/2015/04/clamav-0987-has-been-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2594-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74472", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2676.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2676.json index cbe3e5b8418..2e25db88f15 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2676.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2676.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2676", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-23T16:59:03.617", - "lastModified": "2016-12-03T03:05:38.080", + "lastModified": "2024-11-21T02:27:49.793", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,31 @@ { "url": "http://www.securityfocus.com/bid/73294", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/42", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://websecurity.com.ua/7644/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73294", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2677.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2677.json index a89c58fa0f8..a0a6ec7ca28 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2677.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2677.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2677", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-23T16:59:04.883", - "lastModified": "2018-10-09T19:56:18.453", + "lastModified": "2024-11-21T02:27:49.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -102,6 +101,36 @@ { "url": "http://www.securitytracker.com/id/1031962", "source": "cve@mitre.org" + }, + { + "url": "http://ocportal.com/site/news/view/new-releases/ocportal-9-0-17-released.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ocportal.com/site/news/view/security_issues/xss-vulnerability-patch.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130729/ocPortal-9.0.16-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534817/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031962", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2678.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2678.json index aab1d952af9..3cd5b6486ea 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2678.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2678.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2678", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-23T16:59:05.963", - "lastModified": "2016-12-03T03:05:39.237", + "lastModified": "2024-11-21T02:27:50.067", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,47 @@ { "url": "https://github.com/semplon/GeniXCMS/issues/7", "source": "cve@mitre.org" + }, + { + "url": "http://blog.metalgenix.com/genixcms-v0-0-2-release-security-and-bug-fixes/17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/119394", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130771/GeniXCMS-0.0.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73301", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5233.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/semplon/GeniXCMS/commit/698245488343396185b1b49e7482ee5b25541815", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/semplon/GeniXCMS/issues/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2679.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2679.json index 146715493e1..514de49c812 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2679.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2679.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2679", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-23T16:59:07.570", - "lastModified": "2016-12-03T03:05:40.313", + "lastModified": "2024-11-21T02:27:50.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,61 @@ { "url": "https://github.com/semplon/GeniXCMS/issues/7", "source": "cve@mitre.org" + }, + { + "url": "http://blog.metalgenix.com/genixcms-v0-0-2-release-security-and-bug-fixes/17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://blog.metalgenix.com/update-security-fix-and-add-newsletter-module/16", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/119392", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/119393", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130770/GeniXCMS-0.0.1-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73297", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5232.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/semplon/GeniXCMS/commit/698245488343396185b1b49e7482ee5b25541815", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/semplon/GeniXCMS/issues/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2680.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2680.json index 624dc67a1c6..1d07dd99ccf 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2680.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2680.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2680", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-23T16:59:08.540", - "lastModified": "2016-12-03T03:05:41.423", + "lastModified": "2024-11-21T02:27:50.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,57 @@ { "url": "https://github.com/semplon/GeniXCMS/issues/7", "source": "cve@mitre.org" + }, + { + "url": "http://blog.metalgenix.com/genixcms-v0-0-2-release-security-and-bug-fixes/17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://blog.metalgenix.com/update-security-fix-and-add-newsletter-module/16", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/show/osvdb/119391", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/130772/GeniXCMS-0.0.1-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73299", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5234.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/semplon/GeniXCMS/commit/698245488343396185b1b49e7482ee5b25541815", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/semplon/GeniXCMS/issues/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2681.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2681.json index 005c3bd3bfa..78cf1fb40d1 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2681.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2681.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2681", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-23T16:59:09.523", - "lastModified": "2016-12-03T03:05:42.517", + "lastModified": "2024-11-21T02:27:50.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,31 @@ { "url": "http://www.securityfocus.com/bid/73296", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/42", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://websecurity.com.ua/7644/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73296", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2682.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2682.json index b6cfa6b7b94..b105d1ef86c 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2682.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2682.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2682", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-26T14:59:01.540", - "lastModified": "2019-02-05T18:15:00.493", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:27:50.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -131,6 +130,61 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130928/Citrix-Command-Center-Configuration-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/126", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://support.citrix.com/article/CTX200584", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1031993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36441/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.securify.nl/advisory/SFY20140802/citrix_command_center_allows_downloading_of_configuration_files.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2683.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2683.json index 2b1880364c4..8860b62282f 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2683.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2683.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2683", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-26T14:59:02.663", - "lastModified": "2018-10-09T19:56:18.843", + "lastModified": "2024-11-21T02:27:50.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -110,6 +109,40 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130930/Citrx-Command-Center-Advent-JMX-Servlet-Accessible.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX200584", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534933/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.securify.nl/advisory/SFY20140804/advent_jmx_servlet_of_citrx_command_center_is_accessible_to_unauthenticated_users.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2684.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2684.json index 721951f49a3..2cae18a0918 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2684.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2684.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2684", "sourceIdentifier": "security@debian.org", "published": "2015-03-31T14:59:09.030", - "lastModified": "2016-12-03T03:05:45.643", + "lastModified": "2024-11-21T02:27:50.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -102,6 +101,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3207", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73314", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://shibboleth.net/community/advisories/secadv_20150319.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-26xx/CVE-2015-2694.json b/CVE-2015/CVE-2015-26xx/CVE-2015-2694.json index a33a794fabf..c0fd52243df 100644 --- a/CVE-2015/CVE-2015-26xx/CVE-2015-2694.json +++ b/CVE-2015/CVE-2015-26xx/CVE-2015-2694.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2694", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-25T19:59:02.407", - "lastModified": "2020-01-21T15:46:59.103", + "lastModified": "2024-11-21T02:27:51.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -122,6 +121,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=8160", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2810-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/e3b5a5e5267818c97750b266df50b6a3d4649604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2701.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2701.json index 083893dcebe..7577d3136f7 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2701.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2701.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2701", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-25T14:59:06.453", - "lastModified": "2016-12-03T03:05:46.817", + "lastModified": "2024-11-21T02:27:52.670", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "http://www.securityfocus.com/bid/72658", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/show/osvdb/119632", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/36358", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72658", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2702.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2702.json index 8c1f6c85108..3573c2942b1 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2702.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2702.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2702", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-25T14:59:07.347", - "lastModified": "2018-10-09T19:56:19.810", + "lastModified": "2024-11-21T02:27:52.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -119,6 +118,36 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130898/Websense-Email-Security-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534909/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73345", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.securify.nl/advisory/SFY20140905/websense_email_security_vulnerable_to_persistent_cross_site_scripting_in_audit_log_details_view.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2703.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2703.json index fcbef26bbb3..1371605f62e 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2703.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2703.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2703", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-25T14:59:08.173", - "lastModified": "2018-10-09T19:56:20.343", + "lastModified": "2024-11-21T02:27:52.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,54 @@ { "url": "https://www.securify.nl/advisory/SFY20140916/error_messages_of_websense_content_gateway_are_vulnerable_to_cross_site_scripting.html", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/130902/Websense-Data-Security-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130908/Websense-Content-Gateway-Error-Message-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/106", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534912/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534914/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.securify.nl/advisory/SFY20140910/cross_site_scripting_vulnerability_in_websense_data_security_block_page.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.securify.nl/advisory/SFY20140916/error_messages_of_websense_content_gateway_are_vulnerable_to_cross_site_scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2704.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2704.json index b0a6807c3b8..f86f912ffb2 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2704.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2704.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2704", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:08.777", - "lastModified": "2016-12-03T03:05:48.987", + "lastModified": "2024-11-21T02:27:53.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155862.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157358.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73352", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.freedesktop.org/show_bug.cgi?id=89207", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2706.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2706.json index 96141963462..deeb2bb5e71 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2706.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2706.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2706", "sourceIdentifier": "security@mozilla.org", "published": "2015-04-27T11:59:07.237", - "lastModified": "2016-12-07T18:10:21.967", + "lastModified": "2024-11-21T02:27:53.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,45 @@ { "url": "https://security.gentoo.org/glsa/201512-10", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00044.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-45.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74247", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2571-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1141081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json index 13a7f27af53..3ad987775c1 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2708.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2708", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:01.367", - "lastModified": "2024-10-22T13:54:41.943", + "lastModified": "2024-11-21T02:27:53.383", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -278,6 +277,86 @@ { "url": "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0988.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-46.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2602-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2603-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1120655", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1143299", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1151139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1152177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2709.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2709.json index c3e367f5d67..8963470dee2 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2709.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2709.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2709", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:02.337", - "lastModified": "2023-09-12T14:55:31.563", + "lastModified": "2024-11-21T02:27:53.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -186,6 +185,85 @@ { "url": "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-46.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2602-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1111251", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1117977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1128064", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1135066", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1143194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1146101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1149526", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1153688", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1155474", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json index a5f1c9237fd..543d1c9305a 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2710.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2710", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:03.383", - "lastModified": "2024-10-22T13:54:41.943", + "lastModified": "2024-11-21T02:27:53.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -269,6 +268,77 @@ { "url": "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0988.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-48.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2602-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2603-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1149542", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2711.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2711.json index 6038f0a9053..8e878343db0 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2711.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2711.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2711", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:04.430", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:27:53.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,37 @@ { "url": "https://security.gentoo.org/glsa/201605-06", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-49.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2602-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1113431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2712.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2712.json index b7a3a0bf26a..461acf44493 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2712.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2712.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2712", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:05.350", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:27:53.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +122,37 @@ { "url": "https://security.gentoo.org/glsa/201605-06", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-50.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2602-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1152280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json index f8cffc1155d..93cc2637ed6 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2713.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2713", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:06.240", - "lastModified": "2024-10-22T13:54:41.943", + "lastModified": "2024-11-21T02:27:53.980", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -270,6 +268,78 @@ { "url": "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0988.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-51.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2602-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2603-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1153478", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2714.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2714.json index 54b15283a20..7d1a38e8c85 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2714.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2714.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2714", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:07.133", - "lastModified": "2017-01-03T02:59:54.333", + "lastModified": "2024-11-21T02:27:54.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -108,6 +107,29 @@ { "url": "https://security.gentoo.org/glsa/201605-06", "source": "security@mozilla.org" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-52.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1149094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2715.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2715.json index d9c4c83cebf..89d477f3cd7 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2715.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2715.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2715", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:08.117", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:27:54.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,37 @@ { "url": "https://security.gentoo.org/glsa/201605-06", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-53.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2602-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=988698", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json index de3949deeb0..c056fc6fb20 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2716.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2716", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:09.117", - "lastModified": "2024-10-22T13:54:41.943", + "lastModified": "2024-11-21T02:27:54.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -308,6 +307,101 @@ { "url": "https://www.tenable.com/security/tns-2016-20", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0988.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-54.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2602-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2603-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1140537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.tenable.com/security/tns-2016-20", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2717.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2717.json index 173dd99eebc..cd1b7b19367 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2717.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2717.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2717", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:10.037", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:27:54.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,37 @@ { "url": "https://security.gentoo.org/glsa/201605-06", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-55.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2602-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1154683", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2718.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2718.json index 20b9bdcccbf..3764d3c54b5 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2718.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2718.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2718", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:11.087", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:27:54.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,37 @@ { "url": "https://security.gentoo.org/glsa/201605-06", "source": "security@mozilla.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-56.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2602-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1146724", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201605-06", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2720.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2720.json index 0978fc7d77a..bfbe8a98535 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2720.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2720.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2720", "sourceIdentifier": "security@mozilla.org", "published": "2015-05-14T10:59:11.897", - "lastModified": "2017-01-03T02:59:54.803", + "lastModified": "2024-11-21T02:27:54.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -88,6 +87,22 @@ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1127481", "source": "security@mozilla.org" + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1127481", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2746.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2746.json index 5677f13cdc2..b58f1b793a5 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2746.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2746.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2746", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-26T14:59:03.727", - "lastModified": "2018-10-09T19:56:21.157", + "lastModified": "2024-11-21T02:27:58.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -110,6 +109,39 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130899/Websense-Appliance-Manager-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534910/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/October-2014-Hotfix-Summary-for-Websense-Solutions", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36423/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.securify.nl/advisory/SFY20140906/command_injection_vulnerability_in_network_diagnostics_tool_of_websense_appliance_manager.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2747.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2747.json index 4c40eb8f917..3854d98191c 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2747.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2747.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2747", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-26T14:59:04.930", - "lastModified": "2018-10-09T19:56:21.623", + "lastModified": "2024-11-21T02:27:58.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130897/Websense-Data-Security-DLP-Incident-Forensics-Preview-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534908/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.securify.nl/advisory/SFY20140904/websense_data_security_dlp_incident_forensics_preview_is_vulnerable_to_cross_site_scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2748.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2748.json index 093f40e2a75..1f6965a3317 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2748.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2748.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2748", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-26T14:59:05.773", - "lastModified": "2018-10-09T19:56:21.953", + "lastModified": "2024-11-21T02:27:58.330", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130901/Websense-Explorer-Missing-Access-Control.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/107", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534913/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.securify.nl/advisory/SFY20140909/missing_access_control_on_websense_explorer_web_folder.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2751.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2751.json index c498d4d0d41..95fa919f25c 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2751.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2751.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2751", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:05.677", - "lastModified": "2018-10-30T16:26:53.700", + "lastModified": "2024-11-21T02:27:58.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -167,6 +166,52 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154574.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154579.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155198.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73443", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031997", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-127.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2752.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2752.json index 8e1a13fb016..7b517a160cf 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2752.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2752.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2752", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:06.693", - "lastModified": "2018-10-30T16:26:53.700", + "lastModified": "2024-11-21T02:27:58.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -166,6 +165,56 @@ { "url": "https://security.gentoo.org/glsa/201504-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154574.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154579.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155198.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-125.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2753.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2753.json index 5b1c5a75b45..4bff229b0c4 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2753.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2753.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2753", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-31T14:59:10.267", - "lastModified": "2016-12-03T03:05:52.190", + "lastModified": "2024-11-21T02:27:59.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -117,6 +116,36 @@ { "url": "https://www.gaia-gis.it/fossil/freexl/fdiff?v1=2e167b337481dda3&v2=61618ce51a9b0c15&sbs=1", "source": "cve@mitre.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3208", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/25/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/27/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73330", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201606-15", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.gaia-gis.it/fossil/freexl/fdiff?v1=2e167b337481dda3&v2=61618ce51a9b0c15&sbs=1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2754.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2754.json index 1ac26c862fa..76b41bbf0ff 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2754.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2754.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2754", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-31T14:59:11.627", - "lastModified": "2017-11-08T02:29:01.147", + "lastModified": "2024-11-21T02:27:59.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -114,6 +113,33 @@ { "url": "https://www.gaia-gis.it/fossil/freexl/fdiff?v1=2e167b337481dda3&v2=61618ce51a9b0c15&sbs=1", "source": "cve@mitre.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/25/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/27/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73330", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201606-15", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.gaia-gis.it/fossil/freexl/fdiff?v1=2e167b337481dda3&v2=61618ce51a9b0c15&sbs=1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2755.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2755.json index a4400eeb64b..198b5a3a097 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2755.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2755.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2755", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:07.803", - "lastModified": "2018-10-09T19:56:22.357", + "lastModified": "2024-11-21T02:28:00.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,39 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.com/files/130960/WordPress-AB-Google-Map-Travel-CSRF-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/131155/WordPress-Google-Map-Travel-3.4-XSS-CSRF.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534954/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535026/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/ab-google-map-travel/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2756.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2756.json index e50e1a0f588..1b16676999b 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2756.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2756.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2756", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:08.757", - "lastModified": "2018-10-30T16:26:53.700", + "lastModified": "2024-11-21T02:28:00.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -221,6 +220,61 @@ { "url": "https://support.citrix.com/article/CTX206006", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154574.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154579.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155198.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.nongnu.org/archive/html/qemu-devel/2015-03/msg06179.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX201145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3259", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031998", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2608-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-126.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX206006", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2757.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2757.json index 511d0700d3d..06a411d4155 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2757.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2757.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2757", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:07.273", - "lastModified": "2016-12-03T03:05:55.613", + "lastModified": "2024-11-21T02:28:00.427", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73399", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2758.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2758.json index f0149142ca6..8722c17c6e0 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2758.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2758.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2758", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:08.303", - "lastModified": "2016-12-03T03:05:56.707", + "lastModified": "2024-11-21T02:28:00.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2759.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2759.json index 38afc00f8a9..246178041d4 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2759.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2759.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2759", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:09.133", - "lastModified": "2016-12-03T03:05:58.597", + "lastModified": "2024-11-21T02:28:00.703", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2760.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2760.json index b11380dbf71..79ead488a38 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2760.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2760.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2760", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:10.163", - "lastModified": "2016-12-03T03:06:00.130", + "lastModified": "2024-11-21T02:28:00.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2761.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2761.json index 280154c5b6b..f7c37574ad6 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2761.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2761.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2761", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:10.960", - "lastModified": "2016-12-03T03:06:01.287", + "lastModified": "2024-11-21T02:28:00.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2762.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2762.json index d5678c58681..103688f933b 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2762.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2762.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2762", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:11.787", - "lastModified": "2016-12-03T03:06:02.410", + "lastModified": "2024-11-21T02:28:01.097", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73412", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2763.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2763.json index daaa288855f..5b92ab2e532 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2763.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2763.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2763", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:12.553", - "lastModified": "2016-12-03T03:06:03.520", + "lastModified": "2024-11-21T02:28:01.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73415", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2764.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2764.json index a6cd179c47a..a3119d77218 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2764.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2764.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2764", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:13.320", - "lastModified": "2016-12-03T03:06:04.630", + "lastModified": "2024-11-21T02:28:01.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73424", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2765.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2765.json index 896193313d4..e5a36924b29 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2765.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2765.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2765", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:14.163", - "lastModified": "2016-12-03T03:06:05.710", + "lastModified": "2024-11-21T02:28:01.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2766.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2766.json index c6c39a9f44d..2b106e62f77 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2766.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2766.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2766", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:14.943", - "lastModified": "2016-12-03T03:06:06.770", + "lastModified": "2024-11-21T02:28:01.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73426", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2767.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2767.json index cf875facd18..c507b673380 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2767.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2767.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2767", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:15.880", - "lastModified": "2016-12-03T03:06:07.927", + "lastModified": "2024-11-21T02:28:01.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2768.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2768.json index 3e8d61bd8b3..86b7e3a5715 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2768.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2768.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2768", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:16.773", - "lastModified": "2016-12-03T03:06:08.943", + "lastModified": "2024-11-21T02:28:01.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73429", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2769.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2769.json index d91dc233a2f..a621f4c0d82 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2769.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2769.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2769", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:17.553", - "lastModified": "2015-03-30T19:46:00.303", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:02.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2770.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2770.json index b2f086035d2..b7e9622c88a 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2770.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2770.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2770", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:18.460", - "lastModified": "2015-03-30T19:46:53.337", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:02.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2771.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2771.json index a28d2e22e18..3b6ea53e453 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2771.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2771.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2771", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:19.367", - "lastModified": "2016-12-03T03:06:09.927", + "lastModified": "2024-11-21T02:28:02.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -89,6 +88,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2772.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2772.json index 419daa7876d..6aacd038a7c 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2772.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2772.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2772", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:20.177", - "lastModified": "2016-12-03T03:06:10.913", + "lastModified": "2024-11-21T02:28:02.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73439", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2773.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2773.json index 7edc5f50f80..f05cac24ae9 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2773.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2773.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2773", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-27T14:59:21.130", - "lastModified": "2016-12-03T03:06:11.883", + "lastModified": "2024-11-21T02:28:02.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/73406", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2775.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2775.json index 71791fe1555..e29b6e4ce30 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2775.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2775.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2775", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:02.397", - "lastModified": "2016-12-24T02:59:10.977", + "lastModified": "2024-11-21T02:28:02.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -161,6 +160,60 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154911.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156742.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1153.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1417.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3214", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032033", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2558-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/mailman/+bug/1437145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://mail.python.org/pipermail/mailman-announce/2015-March/000209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://mail.python.org/pipermail/mailman-developers/2015-March/024871.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://mail.python.org/pipermail/mailman-developers/2015-March/024875.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2776.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2776.json index 854cb3bd684..af117ab761d 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2776.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2776.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2776", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-31T14:59:12.530", - "lastModified": "2016-12-03T03:06:15.037", + "lastModified": "2024-11-21T02:28:03.057", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,40 @@ { "url": "https://www.gaia-gis.it/fossil/freexl/fdiff?v1=2e167b337481dda3&v2=61618ce51a9b0c15&sbs=1", "source": "cve@mitre.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3208", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/25/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/27/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/27/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73330", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201606-15", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.gaia-gis.it/fossil/freexl/fdiff?v1=2e167b337481dda3&v2=61618ce51a9b0c15&sbs=1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2778.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2778.json index 373ffe3d77a..1f0e75afc8c 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2778.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2778.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2778", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:04.210", - "lastModified": "2016-12-03T03:06:15.947", + "lastModified": "2024-11-21T02:28:03.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,30 @@ { "url": "https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/20/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/27/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/28/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2779.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2779.json index 435d27c4999..e0904b0b0c0 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2779.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2779.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2779", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:05.147", - "lastModified": "2016-12-03T03:06:16.960", + "lastModified": "2024-11-21T02:28:03.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ { "url": "https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158666.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/20/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/27/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/28/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2781.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2781.json index d36c2f9a482..1d1aa7515ab 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2781.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2781.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2781", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T14:59:04.537", - "lastModified": "2018-10-09T19:56:22.907", + "lastModified": "2024-11-21T02:28:03.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "http://www.securityfocus.com/bid/73941", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131297/HotExBilling-Manager-73-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/18", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535186/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73941", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2782.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2782.json index 59b6cb8fe9e..2f7ac9ca2a9 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2782.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2782.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2782", "sourceIdentifier": "security@debian.org", "published": "2015-04-08T18:59:06.767", - "lastModified": "2017-07-01T01:29:15.357", + "lastModified": "2024-11-21T02:28:03.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -170,6 +169,65 @@ { "url": "https://security.gentoo.org/glsa/201612-15", "source": "security@debian.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/28/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/29/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73413", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-15", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2785.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2785.json index 10a9ef873ce..a4e32a5e016 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2785.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2785.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2785", "sourceIdentifier": "secalert@redhat.com", "published": "2015-03-29T21:59:02.610", - "lastModified": "2015-03-30T19:17:38.793", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:04.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852481", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/06/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852481", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2786.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2786.json index fa8297d0332..d9dfb6ae722 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2786.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2786.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2786", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-29T21:59:03.643", - "lastModified": "2016-12-03T03:06:21.353", + "lastModified": "2024-11-21T02:28:04.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ { "url": "http://www.securityfocus.com/bid/73394", "source": "cve@mitre.org" + }, + { + "url": "http://blog.mybb.com/2015/02/15/mybb-1-8-4-released-feature-update-security-maintenance-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73394", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2787.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2787.json index 2939c7c5fe8..58c55a2cbc7 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2787.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2787.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2787", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T10:59:15.663", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:28:04.520", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -528,6 +526,106 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1066.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1218.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2572-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=68976", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://gist.github.com/smalyshev/eea9eafc7c88a4a6d10d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201606-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2788.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2788.json index a8ec6e8378f..54dffd5a1ea 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2788.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2788.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2788", "sourceIdentifier": "security@debian.org", "published": "2015-04-14T18:59:05.840", - "lastModified": "2016-12-03T03:06:23.773", + "lastModified": "2024-11-21T02:28:04.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -111,6 +110,30 @@ { "url": "https://metacpan.org/source/DAM/DBD-Firebird-1.19/Changes", "source": "security@debian.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3219", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/30/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/30/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://metacpan.org/source/DAM/DBD-Firebird-1.19/Changes", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2789.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2789.json index 8ffc411b8e0..ceb80c0392c 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2789.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2789.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2789", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T14:59:09.053", - "lastModified": "2016-12-03T03:06:24.853", + "lastModified": "2024-11-21T02:28:04.823", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -108,8 +106,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -147,6 +145,52 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://packetstormsecurity.com/files/130840/Foxit-Reader-7.0.6.1126-Privilege-Escalation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36390", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.foxitsoftware.com/support/security_bulletins.php#FRD-25", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73432", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031879", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5235.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2790.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2790.json index 55992f04786..6e50912e501 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2790.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2790.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2790", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T14:59:10.600", - "lastModified": "2016-12-03T03:06:25.993", + "lastModified": "2024-11-21T02:28:04.970", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -140,6 +139,62 @@ { "url": "http://www.securitytracker.com/id/1031877", "source": "cve@mitre.org" + }, + { + "url": "http://protekresearchlab.com/PRL-2015-02/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://protekresearchlab.com/prl-2015-01prl-foxit-products-gif-conversion-memory-corruption-vulnerabilities-lzwminimumcodesize/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://securitytracker.com/id/1031878", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/36334", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/36335", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.foxitsoftware.com/support/security_bulletins.php#FRD-23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.foxitsoftware.com/support/security_bulletins.php#FRD-24", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/119302", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/119303", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1031877", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2791.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2791.json index 2af13e83600..fa1b233a0cb 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2791.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2791.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2791", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T14:59:11.630", - "lastModified": "2018-10-09T19:56:23.233", + "lastModified": "2024-11-21T02:28:05.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://klikki.fi/adv/wpml.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130810/WordPress-WPML-XSS-Deletion-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/71", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/534862/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wpml.org/2015/03/wpml-security-update-bug-and-fix/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-27xx/CVE-2015-2792.json b/CVE-2015/CVE-2015-27xx/CVE-2015-2792.json index 6b94ca6be39..421d92644e0 100644 --- a/CVE-2015/CVE-2015-27xx/CVE-2015-2792.json +++ b/CVE-2015/CVE-2015-27xx/CVE-2015-2792.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2792", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-30T14:59:12.600", - "lastModified": "2015-03-31T17:30:25.310", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:05.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,34 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://klikki.fi/adv/wpml.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130839/WordPress-WPML-Missing-Authentication.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/79", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://wpml.org/2015/03/wpml-security-update-bug-and-fix/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2806.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2806.json index 093adfef6ba..7ebe469b70b 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2806.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2806.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2806", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:05.960", - "lastModified": "2023-11-07T02:25:26.320", + "lastModified": "2024-11-21T02:28:06.847", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -249,6 +248,113 @@ { "url": "https://security.gentoo.org/glsa/201509-04", "source": "cve@mitre.org" + }, + { + "url": "http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=4d4f992826a4962790ecd0cce6fbba4a415ce149", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3220", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/29/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/03/31/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73436", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032080", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2559-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:1860", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201509-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2808.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2808.json index 9d31461d86b..5f5116f4ff5 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2808.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2808.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2808", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T02:00:35.097", - "lastModified": "2023-09-07T17:15:37.500", + "lastModified": "2024-11-21T02:28:07.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -365,9 +364,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", - "matchCriteriaId": "88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898" + "vulnerable": true, + "criteria": "cpe:2.3:a:suse:manager:1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "2C9E2D37-9F56-49E0-BB28-56FB755CE078" } ] }, @@ -376,9 +375,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:a:suse:manager:1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "2C9E2D37-9F56-49E0-BB28-56FB755CE078" + "vulnerable": false, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", + "matchCriteriaId": "88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898" } ] } @@ -417,14 +416,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC" + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", + "matchCriteriaId": "D4840254-CC76-4113-BC61-360BD15582B9" } ] }, @@ -433,9 +427,14 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "D4840254-CC76-4113-BC61-360BD15582B9" + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC" } ] } @@ -449,9 +448,11 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AB54B753-F066-4387-B0C3-43E647A42EBE" + "vulnerable": true, + "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "xcp", + "versionEndExcluding": "xcp_1121", + "matchCriteriaId": "9DBE3B60-DED8-4F47-A60F-410ECB873BAE" } ] }, @@ -460,11 +461,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*", - "versionStartIncluding": "xcp", - "versionEndExcluding": "xcp_1121", - "matchCriteriaId": "9DBE3B60-DED8-4F47-A60F-410ECB873BAE" + "vulnerable": false, + "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB54B753-F066-4387-B0C3-43E647A42EBE" } ] } @@ -478,9 +477,11 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1846C0CA-AE13-435F-BF91-EEE0CC311DD5" + "vulnerable": true, + "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "xcp", + "versionEndExcluding": "xcp_1121", + "matchCriteriaId": "5BBD38A2-1B17-4B28-9FE1-6D62A6337C12" } ] }, @@ -489,11 +490,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*", - "versionStartIncluding": "xcp", - "versionEndExcluding": "xcp_1121", - "matchCriteriaId": "5BBD38A2-1B17-4B28-9FE1-6D62A6337C12" + "vulnerable": false, + "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1846C0CA-AE13-435F-BF91-EEE0CC311DD5" } ] } @@ -507,9 +506,11 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C2EDCD99-9677-45A7-9221-3A6A41917A7C" + "vulnerable": true, + "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "xcp", + "versionEndExcluding": "xcp_1121", + "matchCriteriaId": "5884F45B-F822-46B9-A0DC-6B59A3C3E7E0" } ] }, @@ -518,11 +519,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*", - "versionStartIncluding": "xcp", - "versionEndExcluding": "xcp_1121", - "matchCriteriaId": "5884F45B-F822-46B9-A0DC-6B59A3C3E7E0" + "vulnerable": false, + "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EDCD99-9677-45A7-9221-3A6A41917A7C" } ] } @@ -536,9 +535,11 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9581ABD4-5ED6-4EC5-8A0B-1D7A449C10D5" + "vulnerable": true, + "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "xcp", + "versionEndExcluding": "xcp_1121", + "matchCriteriaId": "9ED7A13F-9510-4FA0-96A6-D2D34D49545F" } ] }, @@ -547,11 +548,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*", - "versionStartIncluding": "xcp", - "versionEndExcluding": "xcp_1121", - "matchCriteriaId": "9ED7A13F-9510-4FA0-96A6-D2D34D49545F" + "vulnerable": false, + "criteria": "cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9581ABD4-5ED6-4EC5-8A0B-1D7A449C10D5" } ] } @@ -972,9 +971,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2E756FE8-F106-4BFD-B33B-CC198363D2FD" + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F01C05D-6937-4FAD-A0E1-6168EE1D7CE4" } ] }, @@ -983,9 +982,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:huawei:quidway_s9300_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4F01C05D-6937-4FAD-A0E1-6168EE1D7CE4" + "vulnerable": false, + "criteria": "cpe:2.3:h:huawei:quidway_s9300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E756FE8-F106-4BFD-B33B-CC198363D2FD" } ] } @@ -1867,6 +1866,22 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=143741441012338&w=2", + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143817021313142&w=2", + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=143817021313142&w=2", "source": "cve@mitre.org", @@ -1883,6 +1898,22 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=143817899717054&w=2", + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143818140118771&w=2", + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=143818140118771&w=2", "source": "cve@mitre.org", @@ -1971,6 +2002,14 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2", + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", "source": "cve@mitre.org", @@ -2480,6 +2519,801 @@ { "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/", "source": "cve@mitre.org" + }, + { + "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143456209711959&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143629696317098&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143741441012338&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143741441012338&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143817021313142&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143817021313142&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143817899717054&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143817899717054&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143818140118771&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143818140118771&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144043644216842&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144059660127919&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144059703728085&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144060576831314&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144060606031437&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144069189622016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144102017024820&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144104533800819&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144104565600964&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21883640", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21903565", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3316", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3339", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454055", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73684", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/91787", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032599", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032707", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032708", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032734", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032788", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032858", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032868", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032990", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033071", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033072", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033386", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033415", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033431", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033432", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1036222", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2696-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2706-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kb.juniper.net/JSA10783", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10163", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] + }, + { + "url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2809.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2809.json index ae922ace74d..221424e6c67 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2809.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2809.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2809", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T02:00:35.970", - "lastModified": "2016-07-29T19:08:16.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:07.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +91,26 @@ { "url": "http://www.securityfocus.com/bid/73683", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/550620", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/BLUU-9TLSHD", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73683", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2810.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2810.json index ade9f11372f..7d7fa94a50d 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2810.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2810.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2810", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-15T22:59:00.093", - "lastModified": "2016-12-03T03:06:32.493", + "lastModified": "2024-11-21T02:28:07.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,14 @@ { "url": "http://www.securityfocus.com/bid/74153", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/bugtraq/2015/Apr/89", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74153", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2811.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2811.json index 8a76948881c..c7528926a1c 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2811.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2811.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2811", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:09.973", - "lastModified": "2018-12-10T19:29:06.983", + "lastModified": "2024-11-21T02:28:07.837", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +90,27 @@ { "url": "https://erpscan.io/advisories/erpscan-15-006-sap-netweaver-portal-reportxmlviewer-xxe/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/132358/SAP-NetWeaver-Portal-7.31-XXE-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jun/64", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535827/100/800/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73691", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-006-sap-netweaver-portal-reportxmlviewer-xxe/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2812.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2812.json index e1f9874d44f..0a40247210d 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2812.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2812.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2812", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:11.037", - "lastModified": "2018-12-10T19:29:07.357", + "lastModified": "2024-11-21T02:28:07.983", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +86,23 @@ { "url": "https://erpscan.io/advisories/erpscan-15-004-sap-netweaver-portal-xmlvalidationcomponent-xxe/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/132356/SAP-NetWeaver-Portal-7.31-XXE-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jun/62", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535826/100/800/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-004-sap-netweaver-portal-xmlvalidationcomponent-xxe/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2813.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2813.json index 9e7957b3310..d1a383027b8 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2813.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2813.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2813", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:11.990", - "lastModified": "2018-12-10T19:29:07.560", + "lastModified": "2024-11-21T02:28:08.123", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -92,6 +90,27 @@ { "url": "https://erpscan.io/advisories/erpscan-15-005-sap-mobile-platform-xxe/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/132357/SAP-Mobile-Platform-2.3-XXE-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jun/63", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535828/100/800/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73692", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-005-sap-mobile-platform-xxe/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2814.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2814.json index 889bd76c74f..e3f37707372 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2814.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2814.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2814", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:12.803", - "lastModified": "2018-12-10T19:29:07.733", + "lastModified": "2024-11-21T02:28:08.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -84,6 +83,14 @@ { "url": "https://erpscan.io/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/73701", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-002-sap-mobile-healthcare-emr-v2-unauthorized-access/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2815.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2815.json index 5a65490dd5b..dfbccb0b6fd 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2815.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2815.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2815", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:13.770", - "lastModified": "2018-12-10T19:29:07.797", + "lastModified": "2024-11-21T02:28:08.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -96,6 +95,26 @@ { "url": "https://erpscan.io/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/132353/SAP-NetWeaver-Dispatcher-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jun/61", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535825/100/800/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2816.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2816.json index bbcd780d151..3bb993405db 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2816.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2816.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2816", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:14.707", - "lastModified": "2018-12-10T19:29:07.967", + "lastModified": "2024-11-21T02:28:08.537", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://erpscan.io/advisories/erpscan-15-009-sap-afaria-7-xclistener-missing-authorization-check/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/132363/SAP-Afaria-7-Missing-Authorization-Check.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jun/67", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535830/100/800/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73708", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-009-sap-afaria-7-xclistener-missing-authorization-check/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2817.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2817.json index 26df4fe5e46..b73af15dcb3 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2817.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2817.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2817", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:15.553", - "lastModified": "2018-12-10T19:29:08.107", + "lastModified": "2024-11-21T02:28:08.673", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://erpscan.io/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/132359/SAP-Management-Console-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jun/65", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535829/100/800/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2818.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2818.json index cfff6ad4b6f..ad4f22e577d 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2818.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2818.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2818", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:16.333", - "lastModified": "2018-12-10T19:29:08.233", + "lastModified": "2024-11-21T02:28:08.817", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')\n", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +78,15 @@ { "url": "https://erpscan.io/advisories/erpscan-15-011-sap-mobile-platform-xxe", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/73896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-011-sap-mobile-platform-xxe", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-611: Improper Restriction of XML External Entity Reference ('XXE')\n" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2819.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2819.json index b54d55a5781..9fafe52fb72 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2819.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2819.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2819", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:17.207", - "lastModified": "2018-12-10T19:29:08.310", + "lastModified": "2024-11-21T02:28:08.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,26 @@ { "url": "https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jun/68", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535831/100/800/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2820.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2820.json index c47e813c920..dc72177c500 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2820.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2820.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2820", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:18.117", - "lastModified": "2018-12-10T19:29:08.467", + "lastModified": "2024-11-21T02:28:09.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://erpscan.io/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/132362/SAP-Afaria-7-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Jun/66", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535832/100/800/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-008-sap-afaria-7-xclistener-buffer-overflow/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2821.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2821.json index 5bcf1b2b30a..8c5b6504ec5 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2821.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2821.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2821", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-01T14:59:19.207", - "lastModified": "2016-12-03T03:06:44.527", + "lastModified": "2024-11-21T02:28:09.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -108,6 +107,18 @@ { "url": "http://www.securityfocus.com/bid/73700", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-neos/typo3-neos-sa-2015-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73700", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2822.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2822.json index 0027cf2fe01..5e7d463697a 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2822.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2822.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2822", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-08T16:59:00.067", - "lastModified": "2016-11-28T19:21:57.340", + "lastModified": "2024-11-21T02:28:09.383", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,22 @@ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-487246.pdf", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/74028", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-487246.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-487246.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2823.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2823.json index 590c6696a46..5f09ab8b698 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2823.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2823.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2823", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-08T16:59:01.270", - "lastModified": "2016-11-28T19:21:58.403", + "lastModified": "2024-11-21T02:28:09.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -156,6 +155,22 @@ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-487246.pdf", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/74040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-487246.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-487246.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2824.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2824.json index 5909249e1f3..112a4661b87 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2824.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2824.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2824", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-06T15:59:04.087", - "lastModified": "2018-10-09T19:56:28.280", + "lastModified": "2024-11-21T02:28:09.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -132,6 +131,62 @@ { "url": "https://www.exploit-db.com/exploits/36613/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131280/WordPress-Simple-Ads-Manager-2.5.94-2.5.96-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.itas.vn/news/ITAS-Team-found-out-multiple-critical-vulnerabilities-in-Hakin9-IT-Security-Magazine-78.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535165/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535168/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73698", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/1136202/simple-ads-manager", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/simple-ads-manager/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36613/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2825.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2825.json index 2049c512fa9..d5a34cb89a5 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2825.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2825.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2825", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T15:59:02.543", - "lastModified": "2016-12-03T03:06:46.747", + "lastModified": "2024-11-21T02:28:09.850", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -105,6 +103,39 @@ { "url": "https://www.exploit-db.com/exploits/36614/", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131282/WordPress-Simple-Ads-Manager-2.5.94-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.itas.vn/news/ITAS-Team-found-out-multiple-critical-vulnerabilities-in-Hakin9-IT-Security-Magazine-78.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/simple-ads-manager/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36614/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2827.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2827.json index 0e1d351a702..71124c26798 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2827.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2827.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2827", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-08T01:59:03.717", - "lastModified": "2021-04-12T14:17:22.530", + "lastModified": "2024-11-21T02:28:10.147", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,25 @@ { "url": "http://www.securityfocus.com/bid/73963", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20150407-01-security-notice-for-ca-spectrum.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535205/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73963", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2828.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2828.json index c6bd72f7957..be1e99ab72c 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2828.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2828.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2828", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-08T01:59:04.843", - "lastModified": "2021-04-12T14:17:22.530", + "lastModified": "2024-11-21T02:28:10.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -95,6 +94,25 @@ { "url": "http://www.securityfocus.com/bid/73957", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131330/Security-Notice-For-CA-Spectrum.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20150407-01-security-notice-for-ca-spectrum.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535205/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73957", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2829.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2829.json index 09030e5ab6f..6d71aad85ac 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2829.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2829.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2829", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:16.887", - "lastModified": "2017-01-03T02:59:55.380", + "lastModified": "2024-11-21T02:28:10.433", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,22 @@ { "url": "http://www.securitytracker.com/id/1032242", "source": "cve@mitre.org" + }, + { + "url": "http://support.citrix.com/article/CTX200861", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74473", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032242", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2830.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2830.json index 1c22884bc3c..bccfb001acd 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2830.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2830.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2830", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T10:59:06.127", - "lastModified": "2023-11-07T02:25:26.630", + "lastModified": "2024-11-21T02:28:10.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -174,6 +173,73 @@ { "url": "https://github.com/torvalds/linux/commit/956421fbb74c3a6261903f3836c0740187cf038b", "source": "cve@mitre.org" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=956421fbb74c3a6261903f3836c0740187cf038b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1137.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1138.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1221.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/02/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032413", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2631-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2632-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208598", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/956421fbb74c3a6261903f3836c0740187cf038b", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2831.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2831.json index 5b9ba1b9c87..e0f80dcb725 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2831.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2831.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2831", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T18:59:06.963", - "lastModified": "2016-12-03T03:06:51.043", + "lastModified": "2024-11-21T02:28:10.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -91,6 +90,26 @@ { "url": "https://github.com/kmatheussen/das_watchdog/commit/bd20bb02e75e2c0483832b52f2577253febfb690", "source": "cve@mitre.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3221", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/02/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/kmatheussen/das_watchdog/commit/bd20bb02e75e2c0483832b52f2577253febfb690", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2838.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2838.json index 6af6c64fe70..a3c137f2988 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2838.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2838.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2838", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-03T14:59:01.240", - "lastModified": "2018-10-09T19:56:30.203", + "lastModified": "2024-11-21T02:28:10.873", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,36 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130937/Citrix-NITRO-SDK-Command-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534936/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36442/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.securify.nl/advisory/SFY20140806/command_injection_vulnerability_in_citrix_nitro_sdk_xen_hotfix_page.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2839.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2839.json index f2368a1b3d7..06974241d88 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2839.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2839.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2839", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-03T14:59:02.303", - "lastModified": "2018-10-09T19:56:30.670", + "lastModified": "2024-11-21T02:28:11.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130931/Citrix-NITRO-SDK-xen_hotfix-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534935/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.securify.nl/advisory/SFY20140805/citrix_nitro_sdk_xen_hotfix_page_is_vulnerable_to_cross_site_scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2840.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2840.json index cebe03bc38e..c2409de69f8 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2840.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2840.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2840", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-03T14:59:03.303", - "lastModified": "2018-10-09T19:56:31.077", + "lastModified": "2024-11-21T02:28:11.137", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/130936/Citrix-NetScaler-VPX-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/130", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/534934/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73342", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.securify.nl/advisory/SFY20140807/citrix_netscaler_vpx_help_pages_are_vulnerable_to_cross_site_scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2841.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2841.json index 34478520379..2f8f32f5630 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2841.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2841.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2841", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-03T14:59:04.287", - "lastModified": "2016-12-03T03:06:55.090", + "lastModified": "2024-11-21T02:28:11.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://www.exploit-db.com/exploits/36369/", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Mar/95", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://securitytracker.com/id/1031928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36369/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2842.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2842.json index d8dbad66598..b2ecfd0ce4f 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2842.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2842.json @@ -2,10 +2,8 @@ "id": "CVE-2015-2842", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:17.853", - "lastModified": "2018-10-09T19:56:31.483", + "lastModified": "2024-11-21T02:28:11.413", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +101,33 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://goautodial.org/news/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535319/100/1100/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74281", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36807/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2843.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2843.json index 25b8339eb66..c40bd8c9bd7 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2843.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2843.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2843", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:19.057", - "lastModified": "2018-10-09T19:56:31.873", + "lastModified": "2024-11-21T02:28:11.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,36 @@ { "url": "https://www.exploit-db.com/exploits/42296/", "source": "cve@mitre.org" + }, + { + "url": "http://goautodial.org/news/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535319/100/1100/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74281", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36807/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/42296/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2844.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2844.json index d4abd798f83..27492bbf175 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2844.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2844.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2844", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:19.933", - "lastModified": "2018-10-09T19:56:32.343", + "lastModified": "2024-11-21T02:28:11.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -102,6 +101,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://goautodial.org/news/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535319/100/1100/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74281", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36807/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2845.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2845.json index bcab34595d7..456b44e8ecb 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2845.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2845.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2845", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:20.917", - "lastModified": "2018-10-09T19:56:32.717", + "lastModified": "2024-11-21T02:28:11.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,36 @@ { "url": "https://www.exploit-db.com/exploits/42296/", "source": "cve@mitre.org" + }, + { + "url": "http://goautodial.org/news/21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535319/100/1100/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74281", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36807/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/42296/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-28xx/CVE-2015-2846.json b/CVE-2015/CVE-2015-28xx/CVE-2015-2846.json index bd0da9f31a3..03bba468110 100644 --- a/CVE-2015/CVE-2015-28xx/CVE-2015-2846.json +++ b/CVE-2015/CVE-2015-28xx/CVE-2015-2846.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2846", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:03.287", - "lastModified": "2016-12-03T03:07:00.717", + "lastModified": "2024-11-21T02:28:11.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-115/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/73906", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-115/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2922.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2922.json index 76a333aea0e..507f2e3e5b2 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2922.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2922.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2922", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T10:59:06.987", - "lastModified": "2023-11-07T02:25:27.527", + "lastModified": "2024-11-21T02:28:19.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -259,6 +258,113 @@ { "url": "https://github.com/torvalds/linux/commit/6fd99094de2b83d1d4c8457f2c83483b2828e75a", "source": "cve@mitre.org" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fd99094de2b83d1d4c8457f2c83483b2828e75a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155804.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155854.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155908.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1221.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1534.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1564.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3237", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/04/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74315", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203712", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/6fd99094de2b83d1d4c8457f2c83483b2828e75a", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2926.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2926.json index f87bec02afe..39997ed7ad2 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2926.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2926.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2926", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T14:59:05.600", - "lastModified": "2018-10-09T19:56:33.577", + "lastModified": "2024-11-21T02:28:19.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ { "url": "http://www.securityfocus.com/bid/74046", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131332/phpTrafficA-2.3-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535212/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74046", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2931.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2931.json index 7209ca807ff..76332bf9f80 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2931.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2931.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2931", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:04.443", - "lastModified": "2016-12-07T18:10:54.283", + "lastModified": "2024-11-21T02:28:20.307", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -347,6 +346,41 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T85850", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2932.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2932.json index fed2b1db72c..3182aa65c60 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2932.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2932.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2932", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:05.413", - "lastModified": "2016-12-07T18:10:55.410", + "lastModified": "2024-11-21T02:28:20.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -344,6 +343,38 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T86711", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2933.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2933.json index a95a8ea8ac5..af817f4cf96 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2933.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2933.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2933", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:06.350", - "lastModified": "2016-12-07T18:10:56.567", + "lastModified": "2024-11-21T02:28:20.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -343,6 +342,37 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T73394", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2934.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2934.json index 2ad256ea640..836c4702ec6 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2934.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2934.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2934", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:07.380", - "lastModified": "2016-12-07T18:10:57.690", + "lastModified": "2024-11-21T02:28:20.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -344,6 +343,38 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T88310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2935.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2935.json index 4ccb7055795..f0392ce6fe5 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2935.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2935.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2935", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:08.303", - "lastModified": "2016-12-07T18:10:58.787", + "lastModified": "2024-11-21T02:28:20.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -344,6 +343,38 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T85349", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2936.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2936.json index 8b5ba5c3178..a2763f3d06f 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2936.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2936.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2936", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:09.287", - "lastModified": "2016-12-07T18:10:59.800", + "lastModified": "2024-11-21T02:28:21.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,38 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T64685", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2937.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2937.json index 9d64182a878..7651eba3b80 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2937.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2937.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2937", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:10.460", - "lastModified": "2016-12-07T18:11:00.833", + "lastModified": "2024-11-21T02:28:21.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -344,6 +343,38 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T71210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2938.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2938.json index ebf2e159c2b..2d0d0227004 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2938.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2938.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2938", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:11.427", - "lastModified": "2016-12-07T18:11:01.973", + "lastModified": "2024-11-21T02:28:21.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -344,6 +343,38 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T85855", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2939.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2939.json index 2ee4affcd69..f68b2e5e945 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2939.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2939.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2939", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:12.380", - "lastModified": "2016-12-07T18:11:03.067", + "lastModified": "2024-11-21T02:28:21.533", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,38 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T85113", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2940.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2940.json index 65bbaed9b52..e57e72603d2 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2940.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2940.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2940", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:13.520", - "lastModified": "2016-12-07T18:11:04.270", + "lastModified": "2024-11-21T02:28:21.677", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,38 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T85858", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2941.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2941.json index 3983fadc6fb..b70ec75e020 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2941.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2941.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2941", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:14.460", - "lastModified": "2016-12-07T18:11:05.317", + "lastModified": "2024-11-21T02:28:21.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -343,6 +342,37 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T85851", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2942.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2942.json index e6cd271bb09..10d2fc8d5da 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2942.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2942.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2942", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-13T14:59:15.367", - "lastModified": "2016-12-07T18:11:06.490", + "lastModified": "2024-11-21T02:28:21.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -343,6 +342,37 @@ { "url": "https://security.gentoo.org/glsa/201510-05", "source": "cve@mitre.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://phabricator.wikimedia.org/T85848", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201510-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2945.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2945.json index ca645c6558f..b69d54024e4 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2945.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2945.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2945", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-05-25T17:59:04.327", - "lastModified": "2015-05-27T16:53:48.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:22.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN64459670/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000067", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.h-fj.com/blog/archives/2015/05/15-112843.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-29xx/CVE-2015-2946.json b/CVE-2015/CVE-2015-29xx/CVE-2015-2946.json index 99f82685afd..f027a684679 100644 --- a/CVE-2015/CVE-2015-29xx/CVE-2015-2946.json +++ b/CVE-2015/CVE-2015-29xx/CVE-2015-2946.json @@ -2,9 +2,8 @@ "id": "CVE-2015-2946", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2015-05-25T19:59:03.547", - "lastModified": "2016-12-03T03:07:17.203", + "lastModified": "2024-11-21T02:28:22.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ { "url": "http://www.securityfocus.com/bid/74781", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN93976566/995630/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN93976566/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000068", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ocf.or.jp/top/topix/027.shtml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74781", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3002.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3002.json index fb66d535d60..331f5b0577d 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3002.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3002.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3002", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:07.117", - "lastModified": "2016-12-03T03:07:49.567", + "lastModified": "2024-11-21T02:28:29.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -258,6 +257,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032091", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10672", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3003.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3003.json index 7a62afb2c66..56a60b79843 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3003.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3003.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3003", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:07.943", - "lastModified": "2016-12-03T03:07:50.710", + "lastModified": "2024-11-21T02:28:29.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -311,6 +310,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74023", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10674", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3004.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3004.json index 623656453d6..e9b486bcf3a 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3004.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3004.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3004", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:08.693", - "lastModified": "2016-12-03T03:07:51.727", + "lastModified": "2024-11-21T02:28:29.417", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -321,6 +320,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74017", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032090", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10675", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3005.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3005.json index 7b40b47e737..8a30bf3c2e6 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3005.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3005.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3005", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:09.477", - "lastModified": "2016-12-03T03:07:52.740", + "lastModified": "2024-11-21T02:28:29.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -228,6 +227,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74016", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032089", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10677", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3008.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3008.json index 67966358a65..352268a4d9d 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3008.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3008.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3008", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:10.240", - "lastModified": "2018-10-09T19:56:37.577", + "lastModified": "2024-11-21T02:28:30.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1719,6 +1718,49 @@ { "url": "http://www.securitytracker.com/id/1032052", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0153.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2015-003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162260.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131364/Asterisk-Project-Security-Advisory-AST-2015-003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/22", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2016/dsa-3700", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:206", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535222/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74022", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3011.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3011.json index 8efe0021199..04052b2e960 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3011.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3011.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3011", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-08T14:59:02.617", - "lastModified": "2016-12-03T03:07:56.227", + "lastModified": "2024-11-21T02:28:30.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -117,6 +116,24 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3012.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3012.json index f465832c4b5..c1dfb1a84cb 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3012.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3012.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3012", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-08T14:59:03.540", - "lastModified": "2019-02-11T19:39:32.810", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:30.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -143,6 +142,50 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74445", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/kogmbh/WebODF/blob/master/ChangeLog.md", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/kogmbh/WebODF/pull/849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/kogmbh/WebODF/pull/850/files", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-002", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3013.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3013.json index 2b8cfd13ce5..4411c085806 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3013.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3013.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3013", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-08T14:59:04.573", - "lastModified": "2019-02-07T15:02:05.970", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:30.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -118,6 +117,37 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-003", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://owncloud.org/security/advisory/?id=oc-sa-2015-004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3026.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3026.json index a7549555e7a..a55fd76d55d 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3026.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3026.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3026", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-29T20:59:02.123", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:28:30.853", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -187,6 +185,86 @@ "Exploit", "Issue Tracking" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163859.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164061.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164074.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3239", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/08/11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/08/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201508-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.xiph.org/changeset/27abfbbd688df3e3077b535997330aa06603250f/icecast-server", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://trac.xiph.org/ticket/2191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3027.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3027.json index 05c98a1ac4a..9754be37a91 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3027.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3027.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3027", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-10T15:00:11.443", - "lastModified": "2016-12-03T03:07:58.243", + "lastModified": "2024-11-21T02:28:31.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/73987", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.apple.com/HT204663", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3028.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3028.json index fe8f82e69dc..538645860ef 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3028.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3028.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3028", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-08T18:59:07.673", - "lastModified": "2015-04-09T18:26:14.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:31.177", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10112", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3029.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3029.json index 16addad5980..0ac3da34dd7 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3029.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3029.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3029", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-08T18:59:08.750", - "lastModified": "2015-04-09T18:26:34.253", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:31.323", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10112", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3030.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3030.json index 9c53380477b..35e8680197a 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3030.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3030.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3030", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-08T18:59:09.780", - "lastModified": "2015-04-09T18:27:19.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:31.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10112", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json index 2b62e5424e9..78e9c42fddb 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json @@ -2,13 +2,8 @@ "id": "CVE-2015-3035", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-22T01:59:02.553", - "lastModified": "2024-07-16T17:58:47.867", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-25", - "cisaActionDue": "2022-04-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "TP-Link Multiple Archer Devices Directory Traversal Vulnerability", + "lastModified": "2024-11-21T02:28:31.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 3.6 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-25", + "cisaActionDue": "2022-04-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "TP-Link Multiple Archer Devices Directory Traversal Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -564,6 +563,127 @@ "Exploit", "Not Applicable" ] + }, + { + "url": "http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/26", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535240/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmware", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3036.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3036.json index 761031695a0..11c578765cb 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3036.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3036.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3036", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-21T01:59:27.087", - "lastModified": "2016-12-08T03:08:21.660", + "lastModified": "2024-11-21T02:28:31.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -119,6 +118,54 @@ { "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt", "source": "cve@mitre.org" + }, + { + "url": "http://blog.sec-consult.com/2015/05/kcodes-netusb-how-small-taiwanese.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131987/KCodes-NetUSB-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/133919/NetUSB-Stack-Buffer-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/74", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Oct/50", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/177092", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74724", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032377", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/38454/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/38566/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3038.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3038.json index a0c050f4fde..187e47443e0 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3038.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3038.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3038", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:16.960", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:28:31.947", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -319,6 +318,58 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3039.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3039.json index b914aadfd4d..3ed476c727b 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3039.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3039.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3039", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:17.757", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:28:32.073", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -320,6 +318,59 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74064", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3040.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3040.json index dec01747cf8..bd2f2fd8cf2 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3040.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3040.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3040", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:18.617", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:28:32.227", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -315,6 +314,54 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3041.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3041.json index 745417f8dba..2a57df1e81f 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3041.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3041.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3041", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:19.603", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:28:32.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -319,6 +318,58 @@ { "url": "https://security.gentoo.org/glsa/201504-07", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3042.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3042.json index ccc90412f79..46558e35881 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3042.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3042.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3042", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:20.463", - "lastModified": "2018-10-30T16:27:37.467", + "lastModified": "2024-11-21T02:28:32.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -323,6 +322,62 @@ { "url": "https://www.exploit-db.com/exploits/37839/", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37839/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json index 6b00d725797..fc19e5a8dd4 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json @@ -2,13 +2,8 @@ "id": "CVE-2015-3043", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:21.323", - "lastModified": "2024-07-16T17:34:42.773", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-03", - "cisaActionDue": "2022-03-24", - "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", - "cisaVulnerabilityName": "Adobe Flash Player Memory Corruption Vulnerability", + "lastModified": "2024-11-21T02:28:32.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-03", + "cisaActionDue": "2022-03-24", + "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", + "cisaVulnerabilityName": "Adobe Flash Player Memory Corruption Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -332,6 +331,88 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74062", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37536/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3044.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3044.json index 932ce2ace5b..8358503612c 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3044.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3044.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3044", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:22.197", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:28:32.817", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -335,6 +334,74 @@ { "url": "https://security.gentoo.org/glsa/201505-02", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0813.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74065", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201504-07", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3046.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3046.json index 97e7e0c8c55..1d16498a283 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3046.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3046.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3046", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:43.213", - "lastModified": "2017-01-05T20:09:52.370", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:32.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -384,6 +383,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3047.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3047.json index ec65e7ba906..e6c084db98c 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3047.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3047.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3047", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:44.120", - "lastModified": "2017-01-03T20:03:30.573", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-476: NULL Pointer Dereference", + "lastModified": "2024-11-21T02:28:33.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -385,6 +383,31 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-476: NULL Pointer Dereference" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3048.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3048.json index 92e3467d26d..6a991a8997a 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3048.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3048.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3048", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:44.980", - "lastModified": "2017-01-05T20:09:36.993", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:33.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -384,6 +383,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74603", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3049.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3049.json index d0aae1634fc..c7c6298f325 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3049.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3049.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3049", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:45.887", - "lastModified": "2017-01-03T20:03:19.337", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:33.387", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -384,6 +383,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3050.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3050.json index abfef9db14d..d8abfc1e168 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3050.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3050.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3050", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:46.840", - "lastModified": "2017-01-03T19:58:21.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:33.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -384,6 +383,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3051.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3051.json index f57c6efade0..e080940680f 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3051.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3051.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3051", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:47.700", - "lastModified": "2017-01-03T20:03:51.983", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:33.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -384,6 +383,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3052.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3052.json index 429c0ee29ee..9abe6a6b29f 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3052.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3052.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3052", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:48.527", - "lastModified": "2017-01-03T20:03:25.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:33.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -384,6 +383,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3053.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3053.json index 39177d36725..a108f7e6153 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3053.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3053.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3053", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:49.387", - "lastModified": "2017-01-05T20:03:33.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:33.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74602", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-215", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3054.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3054.json index 34aa0d42811..ee291e2a100 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3054.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3054.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3054", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:50.247", - "lastModified": "2017-01-05T19:53:21.097", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2024-11-21T02:28:34.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -393,6 +391,39 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74602", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-214", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3055.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3055.json index 667f709194a..0a2aa4e55a7 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3055.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3055.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3055", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:51.077", - "lastModified": "2017-01-05T20:03:01.753", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:34.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74602", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3056.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3056.json index ebc35622511..aeeb7731674 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3056.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3056.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3056", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:52.027", - "lastModified": "2017-01-03T19:39:04.780", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:34.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3057.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3057.json index 5d7a3128799..18f29096037 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3057.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3057.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3057", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:52.903", - "lastModified": "2017-01-03T19:46:38.063", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:34.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3058.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3058.json index 99600660a85..02e4c827d4b 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3058.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3058.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3058", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:53.747", - "lastModified": "2017-01-03T19:38:49.307", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:34.683", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74618", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-211", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3059.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3059.json index 54472f6cd37..639af13bde7 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3059.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3059.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3059", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:54.590", - "lastModified": "2017-01-05T20:09:25.163", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:34.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -381,8 +380,8 @@ "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-212", "source": "psirt@adobe.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74602", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3060.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3060.json index 333dbe352a5..871576f99a4 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3060.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3060.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3060", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:55.467", - "lastModified": "2017-01-03T19:02:37.577", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:34.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-208", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3061.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3061.json index 59c4839b985..2b140daa509 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3061.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3061.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3061", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:56.357", - "lastModified": "2017-01-05T19:53:23.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:35.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-206", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3062.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3062.json index 58375a0a151..2085d14f989 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3062.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3062.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3062", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:57.247", - "lastModified": "2017-01-05T19:53:36.553", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:35.287", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-207", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3063.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3063.json index 89a3cda0ecd..26710d082a9 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3063.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3063.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3063", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:58.137", - "lastModified": "2017-01-05T19:54:33.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:35.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-203", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3064.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3064.json index c7f9962c226..986d70e301f 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3064.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3064.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3064", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T10:59:59.233", - "lastModified": "2017-01-05T19:53:55.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:35.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-204", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3065.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3065.json index 4607a8aead0..2cc2d0406f0 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3065.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3065.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3065", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:00.217", - "lastModified": "2017-01-05T20:09:20.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:35.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -373,8 +372,8 @@ "url": "http://www.securitytracker.com/id/1032284", "source": "psirt@adobe.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-199", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3066.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3066.json index 8fa730caa91..de4880efb07 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3066.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3066.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3066", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:01.233", - "lastModified": "2017-01-05T20:09:17.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:35.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-200", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3067.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3067.json index 3d7abb791c0..395711e31c7 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3067.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3067.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3067", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:02.157", - "lastModified": "2017-01-05T19:48:53.937", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:35.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3068.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3068.json index 6a8ce5a6c25..a7b74856d65 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3068.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3068.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3068", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:03.030", - "lastModified": "2017-01-05T20:06:13.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:36.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -373,8 +372,8 @@ "url": "http://www.securitytracker.com/id/1032284", "source": "psirt@adobe.com", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-202", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3069.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3069.json index cd9c2625b67..b5a3f05279c 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3069.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3069.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3069", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:03.873", - "lastModified": "2017-01-05T20:06:04.090", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:36.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-205", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3070.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3070.json index 7134c95210e..76c21ef778e 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3070.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3070.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3070", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:04.717", - "lastModified": "2017-01-05T20:16:59.210", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:36.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -384,6 +383,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3071.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3071.json index 8037c3f5580..26f667a3216 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3071.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3071.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3071", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:05.530", - "lastModified": "2017-01-05T20:14:46.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:36.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3072.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3072.json index 3d4b773dca9..1b3fa880163 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3072.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3072.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3072", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:06.327", - "lastModified": "2017-01-05T20:14:38.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:36.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-196", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3073.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3073.json index 8c7543036b8..d3dcf06a21d 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3073.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3073.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3073", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:07.123", - "lastModified": "2017-01-05T20:06:01.730", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:36.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -401,6 +400,47 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-197", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/38344/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3074.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3074.json index 02aae1b00e5..3f02a8701d7 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3074.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3074.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3074", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:08.047", - "lastModified": "2017-01-05T20:04:10.700", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:36.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -392,6 +391,38 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-198", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3075.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3075.json index 8ec2f0646c1..3aed5cee02c 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3075.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3075.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3075", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:08.923", - "lastModified": "2017-01-05T20:12:19.420", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:37.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -384,6 +383,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74602", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3076.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3076.json index d9ad9099bfe..7fdf764ef5f 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3076.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3076.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3076", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:09.687", - "lastModified": "2017-01-05T20:14:51.520", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:28:37.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -384,6 +383,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/reader/apsb15-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3077.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3077.json index 06e362883f0..0f0c95aa503 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3077.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3077.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3077", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:10.453", - "lastModified": "2017-01-03T02:59:58.537", + "lastModified": "2024-11-21T02:28:37.333", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -262,6 +260,43 @@ { "url": "https://security.gentoo.org/glsa/201505-02", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3078.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3078.json index 0788cc59037..5c82b7c3bd7 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3078.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3078.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3078", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:11.233", - "lastModified": "2017-01-03T02:59:58.633", + "lastModified": "2024-11-21T02:28:37.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -261,6 +260,42 @@ { "url": "https://security.gentoo.org/glsa/201505-02", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3079.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3079.json index b83af70cee5..7b1d2a2445e 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3079.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3079.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3079", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:12.000", - "lastModified": "2017-01-03T02:59:58.727", + "lastModified": "2024-11-21T02:28:37.590", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -261,6 +260,42 @@ { "url": "https://security.gentoo.org/glsa/201505-02", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3080.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3080.json index 0922213dabe..81d5dddd3c8 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3080.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3080.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3080", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:12.783", - "lastModified": "2017-09-17T01:29:02.687", + "lastModified": "2024-11-21T02:28:37.710", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -266,6 +264,47 @@ { "url": "https://www.exploit-db.com/exploits/37853/", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37853/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3081.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3081.json index 257480e1506..5c5b72d81d5 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3081.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3081.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3081", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:13.563", - "lastModified": "2017-09-17T01:29:02.763", + "lastModified": "2024-11-21T02:28:37.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -261,6 +260,42 @@ { "url": "https://www.exploit-db.com/exploits/37842/", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74613", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37842/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3082.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3082.json index 10b6a9468da..fa58b0ec76b 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3082.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3082.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3082", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:14.343", - "lastModified": "2017-09-17T01:29:02.827", + "lastModified": "2024-11-21T02:28:37.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -265,6 +264,46 @@ { "url": "https://www.exploit-db.com/exploits/37840/", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37840/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3083.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3083.json index 67293f37eee..98c0c5cdedf 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3083.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3083.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3083", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:15.187", - "lastModified": "2017-09-17T01:29:02.907", + "lastModified": "2024-11-21T02:28:38.087", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -265,6 +264,46 @@ { "url": "https://www.exploit-db.com/exploits/37841/", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37841/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3084.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3084.json index 56236a46c12..6fc4ce87535 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3084.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3084.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3084", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:15.987", - "lastModified": "2017-01-03T02:59:59.193", + "lastModified": "2024-11-21T02:28:38.227", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -262,6 +260,43 @@ { "url": "https://security.gentoo.org/glsa/201505-02", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3085.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3085.json index 868c2b9a854..a5e0a4aa6ec 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3085.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3085.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3085", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:16.830", - "lastModified": "2017-01-03T02:59:59.303", + "lastModified": "2024-11-21T02:28:38.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -269,6 +268,50 @@ { "url": "https://security.gentoo.org/glsa/201505-02", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-216/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3086.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3086.json index ef02b2405c3..bf413be3677 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3086.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3086.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3086", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:17.627", - "lastModified": "2017-01-03T02:59:59.397", + "lastModified": "2024-11-21T02:28:38.480", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -262,6 +260,43 @@ { "url": "https://security.gentoo.org/glsa/201505-02", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3087.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3087.json index effaf4bddf2..41bb57cafbb 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3087.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3087.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3087", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:18.500", - "lastModified": "2017-09-17T01:29:02.983", + "lastModified": "2024-11-21T02:28:38.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -265,6 +264,46 @@ { "url": "https://www.exploit-db.com/exploits/37843/", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37843/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3088.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3088.json index e8bd4592a92..ea34c5c5bc7 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3088.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3088.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3088", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:19.267", - "lastModified": "2017-09-17T01:29:03.047", + "lastModified": "2024-11-21T02:28:38.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -265,6 +264,46 @@ { "url": "https://www.exploit-db.com/exploits/37844/", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37844/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3089.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3089.json index 19108e0bd7f..020e54b475f 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3089.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3089.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3089", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:20.033", - "lastModified": "2017-09-17T01:29:03.123", + "lastModified": "2024-11-21T02:28:38.873", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -265,6 +264,46 @@ { "url": "https://www.exploit-db.com/exploits/37845/", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37845/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3090.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3090.json index e26c2cc96c7..1c647bd2806 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3090.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3090.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3090", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:21.097", - "lastModified": "2017-01-03T03:00:00.037", + "lastModified": "2024-11-21T02:28:39.003", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -261,6 +260,42 @@ { "url": "https://security.gentoo.org/glsa/201505-02", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3091.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3091.json index 0756f71b3f0..4106fca178e 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3091.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3091.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3091", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:21.987", - "lastModified": "2017-01-03T03:00:00.117", + "lastModified": "2024-11-21T02:28:39.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -261,6 +260,42 @@ { "url": "https://security.gentoo.org/glsa/201505-02", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74617", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3092.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3092.json index e97e946dcd5..3faef5b28ce 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3092.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3092.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3092", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:22.767", - "lastModified": "2017-01-03T03:00:00.210", + "lastModified": "2024-11-21T02:28:39.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -261,6 +260,42 @@ { "url": "https://security.gentoo.org/glsa/201505-02", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74617", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3093.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3093.json index d19d4047410..51b8725c9d3 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3093.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3093.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3093", "sourceIdentifier": "psirt@adobe.com", "published": "2015-05-13T11:00:23.533", - "lastModified": "2017-09-17T01:29:03.187", + "lastModified": "2024-11-21T02:28:39.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -265,6 +264,46 @@ { "url": "https://www.exploit-db.com/exploits/37846/", "source": "psirt@adobe.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74605", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201505-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37846/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-31xx/CVE-2015-3141.json b/CVE-2015/CVE-2015-31xx/CVE-2015-3141.json index 566ce79bf69..69b2bd77ef1 100644 --- a/CVE-2015/CVE-2015-31xx/CVE-2015-3141.json +++ b/CVE-2015/CVE-2015-31xx/CVE-2015-3141.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3141", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-20T19:59:02.450", - "lastModified": "2016-12-03T03:08:30.403", + "lastModified": "2024-11-21T02:28:45.543", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/121847", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131844/Xeams-4.5-Build-5755-CSRF-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36949/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-31xx/CVE-2015-3143.json b/CVE-2015/CVE-2015-31xx/CVE-2015-3143.json index 51d9d175ae5..080d1e7c486 100644 --- a/CVE-2015/CVE-2015-31xx/CVE-2015-3143.json +++ b/CVE-2015/CVE-2015-31xx/CVE-2015-3143.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3143", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-24T14:59:08.187", - "lastModified": "2018-01-05T02:30:04.773", + "lastModified": "2024-11-21T02:28:45.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -984,6 +983,107 @@ { "url": "https://support.apple.com/kb/HT205031", "source": "secalert@redhat.com" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0179.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://curl.haxx.se/docs/adv_20150422A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=145612005512270&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74299", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2591-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201509-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-31xx/CVE-2015-3144.json b/CVE-2015/CVE-2015-31xx/CVE-2015-3144.json index 69bbd5d7e31..8c852406a01 100644 --- a/CVE-2015/CVE-2015-31xx/CVE-2015-3144.json +++ b/CVE-2015/CVE-2015-31xx/CVE-2015-3144.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3144", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-24T14:59:09.203", - "lastModified": "2018-10-17T01:29:22.930", + "lastModified": "2024-11-21T02:28:45.997", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "The previous CVSS assessment 7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P) was provided at the time of initial analysis based on the best available published information at that time. The score has been updated to reflect the impact to Oracle products per Oracle Critical Patch Update Advisory - October 2015 . Other products listed as vulnerable may or may not be similarly impacted.\n\nAlso Per Oracle Critical Patch Update Advisory - October 2015 -\nThis fix also addresses CVE-2014-3707, CVE-2014-8150, CVE-2015-3153 and CVE-2015-3236. The CVSS score is 9.0 if MySQL Enterprise Monitor runs with admin or root privileges. The score would be 6.5 if MySQL Enterprise Monitor runs with non-admin privileges and the impact on Confidentiality, Integrity and Availability would be Partial+. The Sub-Component for version 3.0.x is 'Proxy/Aggregator'.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -265,6 +263,78 @@ { "url": "https://support.apple.com/kb/HT205031", "source": "secalert@redhat.com" + }, + { + "url": "http://curl.haxx.se/docs/adv_20150422D.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74300", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2591-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201509-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "The previous CVSS assessment 7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P) was provided at the time of initial analysis based on the best available published information at that time. The score has been updated to reflect the impact to Oracle products per Oracle Critical Patch Update Advisory - October 2015 . Other products listed as vulnerable may or may not be similarly impacted.\n\nAlso Per Oracle Critical Patch Update Advisory - October 2015 -\nThis fix also addresses CVE-2014-3707, CVE-2014-8150, CVE-2015-3153 and CVE-2015-3236. The CVSS score is 9.0 if MySQL Enterprise Monitor runs with admin or root privileges. The score would be 6.5 if MySQL Enterprise Monitor runs with non-admin privileges and the impact on Confidentiality, Integrity and Availability would be Partial+. The Sub-Component for version 3.0.x is 'Proxy/Aggregator'." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-31xx/CVE-2015-3145.json b/CVE-2015/CVE-2015-31xx/CVE-2015-3145.json index a077e5af1e6..867bdc8a334 100644 --- a/CVE-2015/CVE-2015-31xx/CVE-2015-3145.json +++ b/CVE-2015/CVE-2015-31xx/CVE-2015-3145.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3145", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-24T14:59:10.157", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:28:46.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -468,6 +467,132 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0179.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://curl.haxx.se/docs/adv_20150422C.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3232", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74303", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032232", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2591-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201509-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-31xx/CVE-2015-3148.json b/CVE-2015/CVE-2015-31xx/CVE-2015-3148.json index 2d3a6bfc1a9..c017c05d03b 100644 --- a/CVE-2015/CVE-2015-31xx/CVE-2015-3148.json +++ b/CVE-2015/CVE-2015-31xx/CVE-2015-3148.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3148", "sourceIdentifier": "secalert@redhat.com", "published": "2015-04-24T14:59:11.000", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:28:46.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1058,6 +1057,142 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0179.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://curl.haxx.se/docs/adv_20150422B.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155957.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156250.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156945.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157188.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=145612005512270&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3232", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:219", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:220", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74301", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032232", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2591-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201509-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-31xx/CVE-2015-3153.json b/CVE-2015/CVE-2015-31xx/CVE-2015-3153.json index 19960a7a7d9..78184250d5c 100644 --- a/CVE-2015/CVE-2015-31xx/CVE-2015-3153.json +++ b/CVE-2015/CVE-2015-31xx/CVE-2015-3153.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3153", "sourceIdentifier": "secalert@redhat.com", "published": "2015-05-01T15:59:05.817", - "lastModified": "2018-10-17T01:29:25.897", + "lastModified": "2024-11-21T02:28:47.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -253,6 +252,90 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://curl.haxx.se/docs/adv_20150429.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3240", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74408", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032233", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2591-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT205031", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-32xx/CVE-2015-3293.json b/CVE-2015/CVE-2015-32xx/CVE-2015-3293.json index 6d2d556e7b2..b88e40a614b 100644 --- a/CVE-2015/CVE-2015-32xx/CVE-2015-3293.json +++ b/CVE-2015/CVE-2015-32xx/CVE-2015-3293.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3293", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-14T18:59:07.947", - "lastModified": "2017-01-03T03:00:00.837", + "lastModified": "2024-11-21T02:29:05.613", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -147,6 +146,17 @@ { "url": "http://www.securitytracker.com/id/1032185", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-009/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032185", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-32xx/CVE-2015-3294.json b/CVE-2015/CVE-2015-32xx/CVE-2015-3294.json index c1b7c64842e..2a8efa4acea 100644 --- a/CVE-2015/CVE-2015-32xx/CVE-2015-3294.json +++ b/CVE-2015/CVE-2015-32xx/CVE-2015-3294.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3294", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-08T14:59:05.527", - "lastModified": "2023-11-07T02:25:36.117", + "lastModified": "2024-11-21T02:29:05.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -146,6 +145,65 @@ { "url": "https://security.gentoo.org/glsa/201512-01", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2015q2/009382.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2015q2/009387.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=ad4a8ff7d9097008d7623df8543df435bfddeac8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3251", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535354/100/1100/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74452", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032195", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2593-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201512-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3300.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3300.json index 05701f6fde5..b79ef5764f2 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3300.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3300.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3300", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-14T14:59:08.900", - "lastModified": "2018-10-09T19:56:50.360", + "lastModified": "2024-11-21T02:29:06.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -128,6 +127,62 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/121438", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/121469", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/121470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/121471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/show/osvdb/121472", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535396/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/thecartpress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36860/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23254", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3301.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3301.json index 878fd96bd35..60ee93957d6 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3301.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3301.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3301", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-14T14:59:10.087", - "lastModified": "2018-10-09T19:56:51.250", + "lastModified": "2024-11-21T02:29:06.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -112,6 +111,46 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/show/osvdb/121439", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535396/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/thecartpress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36860/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23254", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3306.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3306.json index 25bf72b2811..b3ee0ac68b1 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3306.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3306.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3306", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:10.743", - "lastModified": "2021-05-26T20:15:08.027", + "lastModified": "2024-11-21T02:29:07.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -133,6 +132,68 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157581.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131505/ProFTPd-1.3.5-File-Copy.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131555/ProFTPd-1.3.5-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131567/ProFTPd-CPFR-CPTO-Proof-Of-Concept.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/132218/ProFTPD-1.3.5-Mod_Copy-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/162777/ProFTPd-1.3.5-Remote-Command-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3263", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.rapid7.com/db/modules/exploit/unix/ftp/proftpd_modcopy_exec", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36742/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36803/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3310.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3310.json index 72334db9b7b..0445ec14d2c 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3310.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3310.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3310", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-24T14:59:11.860", - "lastModified": "2020-02-24T15:55:38.160", + "lastModified": "2024-11-21T02:29:07.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -134,6 +133,38 @@ { "url": "https://security.gentoo.org/glsa/201701-50", "source": "cve@mitre.org" + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0173.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00147.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3228", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:222", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2595-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782450", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-50", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3319.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3319.json index 852d4758100..d7de0de7f4d 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3319.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3319.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3319", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-16T14:59:03.913", - "lastModified": "2018-10-09T19:56:52.233", + "lastModified": "2024-11-21T02:29:09.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "http://www.securityfocus.com/bid/74205", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/131297/HotExBilling-Manager-73-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/18", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535186/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74205", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3320.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3320.json index b112684aaec..ebc553fe209 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3320.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3320.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3320", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-16T23:59:02.323", - "lastModified": "2017-01-18T02:59:00.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:09.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -88,6 +87,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74196", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.lenovo.com/us/en/product_security/usbenhancedkeyboard", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3322.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3322.json index 2795a12a5cc..a5a29962eda 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3322.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3322.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3322", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-16T23:59:03.557", - "lastModified": "2017-01-18T02:59:00.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:09.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -212,6 +211,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74198", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://support.lenovo.com/us/en/product_security/ts_bios_pw", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3323.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3323.json index 6fd719243d8..3ac957505f8 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3323.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3323.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3323", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-16T23:59:04.620", - "lastModified": "2016-12-06T02:59:54.617", + "lastModified": "2024-11-21T02:29:09.660", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -115,6 +114,17 @@ { "url": "http://www.securityfocus.com/bid/74197", "source": "cve@mitre.org" + }, + { + "url": "http://support.lenovo.com/us/en/product_security/tsm_weak_pw", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74197", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3324.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3324.json index 8775c480215..6f7dfac235b 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3324.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3324.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3324", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-16T23:59:05.540", - "lastModified": "2016-12-06T02:59:55.667", + "lastModified": "2024-11-21T02:29:09.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -115,6 +114,18 @@ { "url": "http://www.securityfocus.com/bid/74199", "source": "cve@mitre.org" + }, + { + "url": "http://support.lenovo.com/us/en/product_security/tsm_weak_pw", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74199", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3325.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3325.json index 94198ee3a43..bbf8ab5ea45 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3325.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3325.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3325", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-15T18:59:01.667", - "lastModified": "2015-06-25T15:50:09.833", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:09.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131801/WordPress-WP-Symposium-15.1-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37080/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3326.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3326.json index 2fec0a31e65..03c48e5f5bb 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3326.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3326.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3326", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-14T00:59:03.647", - "lastModified": "2017-01-03T03:00:01.100", + "lastModified": "2024-11-21T02:29:10.123", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-330: Use of Insufficiently Random Values", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +94,26 @@ { "url": "http://www.securitytracker.com/id/1032323", "source": "cve@mitre.org" + }, + { + "url": "http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://esupport.trendmicro.com/solution/en-US/1109669.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74661", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032323", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-330: Use of Insufficiently Random Values" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3331.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3331.json index 8f859f97060..b7103523938 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3331.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3331.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3331", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T10:59:07.987", - "lastModified": "2023-11-07T02:25:36.660", + "lastModified": "2024-11-21T02:29:10.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -278,6 +277,128 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccfe8c3f7e52ae83155cb038753f4c75b774ca8a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1081.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1199.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3237", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/14/16", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032416", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2631-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2632-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213322", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/ccfe8c3f7e52ae83155cb038753f4c75b774ca8a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3332.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3332.json index a9864ab2092..76815fec3c8 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3332.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3332.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3332", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T10:59:08.860", - "lastModified": "2016-04-11T18:54:08.853", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:10.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -107,6 +106,26 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951", "source": "cve@mitre.org" + }, + { + "url": "http://article.gmane.org/gmane.linux.network/359588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/14/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.debian.org/782515", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213951", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3333.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3333.json index 396df27222b..890239984e4 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3333.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3333.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3333", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-19T10:59:13.287", - "lastModified": "2017-01-03T03:00:01.180", + "lastModified": "2024-11-21T02:29:11.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -151,6 +150,29 @@ { "url": "http://www.securityfocus.com/bid/74221", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-2570-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74221", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3334.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3334.json index d88af1b6a53..e79955cdbfb 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3334.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3334.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3334", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-19T10:59:14.223", - "lastModified": "2018-10-30T16:27:37.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:11.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,44 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74225", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=433170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3335.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3335.json index 85922471d72..16e9901ece9 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3335.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3335.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3335", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-19T10:59:15.083", - "lastModified": "2018-10-30T16:27:37.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:11.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +122,37 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/72715", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=455839", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3336.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3336.json index bf1933b9ea2..2046fa1a2e4 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3336.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3336.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3336", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-19T10:59:16.037", - "lastModified": "2018-10-30T16:27:37.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:11.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -145,6 +144,44 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://code.google.com/p/chromium/issues/detail?id=455953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3337.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3337.json index cf270ba59e0..cf5bbe5dd90 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3337.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3337.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3337", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-01T15:59:06.850", - "lastModified": "2015-06-25T16:07:10.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:11.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,40 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131646/Elasticsearch-Directory-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535385", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.elastic.co/community/security", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37054/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3339.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3339.json index 1c95488ed20..3a72622eabe 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3339.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3339.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3339", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T10:59:11.047", - "lastModified": "2023-11-07T02:25:36.860", + "lastModified": "2024-11-21T02:29:11.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 6.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -167,6 +166,81 @@ { "url": "https://github.com/torvalds/linux/commit/8b01fc86b9f425899f8a3a8fc1c47d73c2c20543", "source": "cve@mitre.org" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157897.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158804.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1272.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/20/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032412", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/8b01fc86b9f425899f8a3a8fc1c47d73c2c20543", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3340.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3340.json index 1d026b85c4c..714e0daedec 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3340.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3340.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3340", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-28T14:59:02.560", - "lastModified": "2018-10-30T16:27:37.717", + "lastModified": "2024-11-21T02:29:12.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -318,6 +317,83 @@ { "url": "https://security.gentoo.org/glsa/201604-03", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156979.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3414", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74248", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032158", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201604-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3342.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3342.json index eee0e7b9df0..5f2a2965779 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3342.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3342.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3342", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:02.373", - "lastModified": "2015-04-23T04:56:38.507", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "lastModified": "2024-11-21T02:29:12.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +94,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72365", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2407145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407347", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3343.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3343.json index ce287856d11..569d70e101e 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3343.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3343.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3343", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:03.467", - "lastModified": "2016-12-06T03:00:05.103", + "lastModified": "2024-11-21T02:29:12.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72630", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2402393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3344.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3344.json index 167ef0bf1d5..cb14e8b6021 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3344.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3344.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3344", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:04.403", - "lastModified": "2016-12-06T03:00:06.073", + "lastModified": "2024-11-21T02:29:12.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -236,6 +235,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72631", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2403305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403333", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3345.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3345.json index 0a136101265..f80b9963c03 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3345.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3345.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3345", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:05.263", - "lastModified": "2016-12-31T02:59:29.517", + "lastModified": "2024-11-21T02:29:12.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72634", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2402517", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403343", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3346.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3346.json index fb8558b63bd..fe19d7111a6 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3346.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3346.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3346", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:06.390", - "lastModified": "2016-12-06T03:00:07.120", + "lastModified": "2024-11-21T02:29:12.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2402905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403375", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3347.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3347.json index 42350cef392..bdefb133914 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3347.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3347.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3347", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:07.343", - "lastModified": "2016-12-06T03:00:08.120", + "lastModified": "2024-11-21T02:29:13.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71926", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2402643", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403447", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3348.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3348.json index 5bcbce78544..f909bc50730 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3348.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3348.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3348", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:08.280", - "lastModified": "2016-12-06T03:00:09.073", + "lastModified": "2024-11-21T02:29:13.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71926", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2402643", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403447", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3349.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3349.json index 0f06da3b378..8502716028c 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3349.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3349.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3349", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:09.153", - "lastModified": "2016-12-06T03:00:10.027", + "lastModified": "2024-11-21T02:29:13.313", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2402825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403445", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3350.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3350.json index a122c02ca6c..98084e31153 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3350.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3350.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3350", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:10.123", - "lastModified": "2016-12-06T03:00:10.950", + "lastModified": "2024-11-21T02:29:13.450", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2403013", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3351.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3351.json index 83208ca8a7d..98e6b9f0366 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3351.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3351.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3351", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:11.060", - "lastModified": "2016-12-06T03:00:11.903", + "lastModified": "2024-11-21T02:29:13.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2402767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403463", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3352.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3352.json index 34898b2575b..ea155c130ed 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3352.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3352.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3352", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:12.047", - "lastModified": "2016-12-06T03:00:12.840", + "lastModified": "2024-11-21T02:29:13.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71958", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2402745", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2402749", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403487", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3353.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3353.json index 7aa6b315db6..bd77ac168f1 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3353.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3353.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3353", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:13.093", - "lastModified": "2016-12-06T03:00:13.857", + "lastModified": "2024-11-21T02:29:13.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71962", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2403057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403489", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3354.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3354.json index 6f87d78251a..9a4828f1622 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3354.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3354.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3354", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:14.030", - "lastModified": "2016-12-06T03:00:14.793", + "lastModified": "2024-11-21T02:29:14.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -117,6 +116,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72114", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2406803", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2406811", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3355.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3355.json index 9db03efea12..1ef6ad25e78 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3355.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3355.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3355", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:14.997", - "lastModified": "2016-12-06T03:00:15.747", + "lastModified": "2024-11-21T02:29:14.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,33 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/71954", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72114", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2402839", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3356.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3356.json index 61b01161d5a..10f9d0b0b50 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3356.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3356.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3356", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:15.903", - "lastModified": "2016-12-06T03:00:16.763", + "lastModified": "2024-11-21T02:29:14.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2406949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3357.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3357.json index a7b79cfc794..4f4f7685ab6 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3357.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3357.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3357", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:16.857", - "lastModified": "2015-04-22T22:16:14.487", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:14.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -113,6 +112,32 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2406803", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2406811", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3358.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3358.json index f5d46d005b9..f16352d7661 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3358.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3358.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3358", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:17.950", - "lastModified": "2016-12-06T03:00:17.763", + "lastModified": "2024-11-21T02:29:14.650", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +94,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2406949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3359.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3359.json index dc4ea0311e7..bb6f3bc3246 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3359.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3359.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3359", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:19.030", - "lastModified": "2016-12-06T03:00:18.717", + "lastModified": "2024-11-21T02:29:14.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72112", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2406827", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407329", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3360.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3360.json index b306acd48e5..42e4b2baf10 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3360.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3360.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3360", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:19.950", - "lastModified": "2016-12-06T03:00:19.717", + "lastModified": "2024-11-21T02:29:16.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72113", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2406869", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407315", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3361.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3361.json index 09f04cc0420..7e718be7df6 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3361.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3361.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3361", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:20.827", - "lastModified": "2019-02-07T16:31:40.557", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:16.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -117,6 +116,43 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.securityfocus.com/bid/71959", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.drupal.org/node/2402855", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2402859", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2403459", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3362.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3362.json index 833f2bd8591..8dd996db608 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3362.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3362.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3362", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:21.873", - "lastModified": "2016-12-06T03:00:21.687", + "lastModified": "2024-11-21T02:29:16.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72117", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2407047", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407341", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3363.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3363.json index 077f1e5265e..d99dda60db8 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3363.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3363.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3363", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:22.797", - "lastModified": "2016-12-06T03:00:22.653", + "lastModified": "2024-11-21T02:29:16.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72118", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2407147", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407357", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3364.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3364.json index fdcc8107a98..f8ed284313c 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3364.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3364.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3364", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:23.747", - "lastModified": "2016-12-06T03:00:23.607", + "lastModified": "2024-11-21T02:29:16.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2407261", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3365.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3365.json index 9a55a9aac66..538994866a5 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3365.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3365.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3365", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:24.593", - "lastModified": "2016-12-06T03:00:24.543", + "lastModified": "2024-11-21T02:29:16.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -87,6 +86,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2407401", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3366.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3366.json index b51968eb3a9..6d6073dc337 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3366.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3366.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3366", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:25.483", - "lastModified": "2016-12-06T03:00:25.467", + "lastModified": "2024-11-21T02:29:17.060", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per the advisory: \"A malicious user could cause a user to delete alfresco nodes by getting the user's browser to make a request to a specially-crafted URL while the user was logged in.\" Only integrity and availability are affected.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +94,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74273", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2411501", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2411523", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per the advisory: \"A malicious user could cause a user to delete alfresco nodes by getting the user's browser to make a request to a specially-crafted URL while the user was logged in.\" Only integrity and availability are affected." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3367.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3367.json index 0ec4736e020..e06771d6e5a 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3367.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3367.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3367", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:26.390", - "lastModified": "2016-12-06T03:00:26.437", + "lastModified": "2024-11-21T02:29:17.200", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per the advisory: \"A malicious user could cause an administrator to restore, publish and unpublish patterns by getting the administrator's browser to make a request to a specially-crafted URL.\" Only integrity and availability are affected.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +94,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2411507", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2411539", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per the advisory: \"A malicious user could cause an administrator to restore, publish and unpublish patterns by getting the administrator's browser to make a request to a specially-crafted URL.\" Only integrity and availability are affected." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3368.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3368.json index eb6380ae38e..2f541f187ff 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3368.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3368.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3368", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:27.297", - "lastModified": "2016-12-06T03:00:27.327", + "lastModified": "2024-11-21T02:29:17.343", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -107,6 +106,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2407783", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2407785", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2411527", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3369.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3369.json index 6e39044ee0f..960af8716a4 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3369.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3369.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3369", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:28.217", - "lastModified": "2016-12-06T03:00:28.263", + "lastModified": "2024-11-21T02:29:17.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -107,6 +106,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2409767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2409769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2411573", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3370.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3370.json index b1cbd7fbd4a..7b39670616b 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3370.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3370.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3370", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:29.093", - "lastModified": "2016-12-06T03:00:29.200", + "lastModified": "2024-11-21T02:29:17.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2415541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2415899", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3371.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3371.json index 0056ef47181..a6ebd32329a 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3371.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3371.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3371", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:29.937", - "lastModified": "2016-12-06T03:00:30.093", + "lastModified": "2024-11-21T02:29:17.793", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +94,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2415541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2415899", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3372.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3372.json index 5e2102af876..d6305705469 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3372.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3372.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3372", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:30.843", - "lastModified": "2016-12-06T03:00:30.983", + "lastModified": "2024-11-21T02:29:17.943", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2415541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2415899", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3373.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3373.json index 6526350278c..ecb3ee976a5 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3373.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3373.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3373", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:31.733", - "lastModified": "2016-12-06T03:00:31.890", + "lastModified": "2024-11-21T02:29:18.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,33 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://cgit.drupalcode.org/aws_amazon/commit/?id=9377a26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2415457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2415873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3374.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3374.json index 9859bfa3473..930f6dc0b6e 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3374.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3374.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3374", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:32.593", - "lastModified": "2016-12-06T03:00:32.890", + "lastModified": "2024-11-21T02:29:18.230", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per the advisory: \"A malicious user can cause an administrator to enable and disable corners by getting the administrator's browser to make a request to a specially-crafted URL while the administrator is logged in.\" Only integrity and availability are affected.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +86,23 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74275", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2411741", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per the advisory: \"A malicious user can cause an administrator to enable and disable corners by getting the administrator's browser to make a request to a specially-crafted URL while the administrator is logged in.\" Only integrity and availability are affected." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3375.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3375.json index ec71de3624d..987a0053832 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3375.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3375.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3375", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:33.467", - "lastModified": "2016-12-06T03:00:33.797", + "lastModified": "2024-11-21T02:29:18.380", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per the advisory: \"A malicious attacker can delete matching rules from the list by getting the administrator's browser to make a request to a specially-crafted URL while the administrator is logged in.\" Only integrity and availability are affected", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +106,37 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2411269", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2411271", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2411737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per the advisory: \"A malicious attacker can delete matching rules from the list by getting the administrator's browser to make a request to a specially-crafted URL while the administrator is logged in.\" Only integrity and availability are affected" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3376.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3376.json index 30904410411..0ba1e7676da 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3376.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3376.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3376", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T16:59:34.233", - "lastModified": "2016-12-06T03:00:34.750", + "lastModified": "2024-11-21T02:29:18.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2410399", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2411579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3378.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3378.json index d41287be053..e45b614a3ee 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3378.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3378.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3378", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:00.110", - "lastModified": "2016-12-31T02:59:29.577", + "lastModified": "2024-11-21T02:29:18.687", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -225,6 +223,44 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2424101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2424103", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2424403", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3379.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3379.json index 9535abffaa8..82577acdf8c 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3379.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3379.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3379", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:01.327", - "lastModified": "2015-04-23T16:40:23.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:18.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -220,6 +219,39 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424097", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2424101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2424103", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2424403", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3380.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3380.json index dc6b3d95063..9657df61b51 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3380.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3380.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3380", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:02.547", - "lastModified": "2016-12-06T03:00:35.623", + "lastModified": "2024-11-21T02:29:19.003", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per the advisory: \"A malicious user can cause an administrator to enable and disable modules by getting the administrator's browser to make a request to a specially-crafted URL.\" Only integrity and availability are affected.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +87,23 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72617", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per the advisory: \"A malicious user can cause an administrator to enable and disable modules by getting the administrator's browser to make a request to a specially-crafted URL.\" Only integrity and availability are affected." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3381.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3381.json index 6ab2e0b349e..a5c28bfc27e 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3381.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3381.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3381", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:03.577", - "lastModified": "2016-12-06T03:00:36.563", + "lastModified": "2024-11-21T02:29:19.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -88,6 +87,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424419", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3382.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3382.json index ff43f6fc8e0..07fcd13dad5 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3382.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3382.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3382", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:04.670", - "lastModified": "2016-12-06T03:00:37.517", + "lastModified": "2024-11-21T02:29:19.327", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per the advisory: \"A malicious user can cause another user to add/remove nodes of the basket by getting his browser to make a request to a specially-crafted URL.\" Only integrity and availability are affected.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +86,22 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424419", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per the advisory: \"A malicious user can cause another user to add/remove nodes of the basket by getting his browser to make a request to a specially-crafted URL.\" Only integrity and availability are affected." } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3383.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3383.json index d32dd0c9ace..cc630a80ad1 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3383.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3383.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3383", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:05.670", - "lastModified": "2016-12-06T03:00:38.407", + "lastModified": "2024-11-21T02:29:19.470", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +87,23 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424419", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3384.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3384.json index 12044441020..3f7849502e6 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3384.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3384.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3384", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:06.717", - "lastModified": "2016-12-06T03:00:39.313", + "lastModified": "2024-11-21T02:29:19.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -87,6 +86,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3385.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3385.json index 898cfea0f6b..c14b966448d 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3385.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3385.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3385", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:07.627", - "lastModified": "2016-12-06T03:00:40.187", + "lastModified": "2024-11-21T02:29:19.760", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72586", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424411", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2424439", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3386.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3386.json index 21c3e110cd7..caab16bd36e 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3386.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3386.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3386", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:08.517", - "lastModified": "2016-12-06T03:00:41.077", + "lastModified": "2024-11-21T02:29:19.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -88,6 +87,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424349", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3387.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3387.json index 2a9a1bf33b6..bc179d7eb9c 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3387.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3387.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3387", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:09.483", - "lastModified": "2016-12-06T03:00:41.970", + "lastModified": "2024-11-21T02:29:20.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -95,6 +94,29 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424059", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2424355", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3388.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3388.json index deeddb7b96f..ca1c7728b8d 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3388.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3388.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3388", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:10.360", - "lastModified": "2016-12-06T03:00:43.173", + "lastModified": "2024-11-21T02:29:20.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/13/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2424435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3389.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3389.json index 3c25a946eb3..75a9291f59c 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3389.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3389.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3389", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:11.407", - "lastModified": "2017-09-08T01:29:50.357", + "lastModified": "2024-11-21T02:29:20.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -92,6 +91,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/05/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74271", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100653", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2420119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3390.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3390.json index c9342b6f2fb..de077ef9750 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3390.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3390.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3390", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:12.407", - "lastModified": "2017-09-08T01:29:50.403", + "lastModified": "2024-11-21T02:29:20.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -91,6 +90,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/05/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72570", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100655", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2420161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3391.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3391.json index 603ef05b2ac..1d07a551fc5 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3391.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3391.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3391", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:13.377", - "lastModified": "2018-04-07T01:29:00.877", + "lastModified": "2024-11-21T02:29:20.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,33 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/05/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72569", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100672", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2420121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2420139", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3392.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3392.json index 5dc436cad35..94f4903cd92 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3392.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3392.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3392", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:14.407", - "lastModified": "2017-09-08T01:29:50.527", + "lastModified": "2024-11-21T02:29:20.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -99,6 +98,33 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/05/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72567", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2419971", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2420099", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3393.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3393.json index 16a5cac00ab..0f7993c375d 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3393.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3393.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3393", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-21T18:59:15.233", - "lastModified": "2017-09-08T01:29:50.577", + "lastModified": "2024-11-21T02:29:20.890", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +98,34 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/02/05/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/72563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100656", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2419483", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2420089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-33xx/CVE-2015-3397.json b/CVE-2015/CVE-2015-33xx/CVE-2015-3397.json index 841f8449ea6..fa169120ed3 100644 --- a/CVE-2015/CVE-2015-33xx/CVE-2015-3397.json +++ b/CVE-2015/CVE-2015-33xx/CVE-2015-3397.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3397", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-14T00:59:04.883", - "lastModified": "2016-12-06T03:00:51.313", + "lastModified": "2024-11-21T02:29:21.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ "tags": [ "Patch" ] + }, + { + "url": "http://www.securityfocus.com/bid/74663", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.yiiframework.com/news/86/yii-2-0-4-is-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/yiisoft/yii2/blob/2.0.4/framework/CHANGELOG.md", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3404.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3404.json index cf6965b61f7..6c52aa402ba 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3404.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3404.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3404", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-22T22:59:00.063", - "lastModified": "2016-12-06T03:00:52.457", + "lastModified": "2024-11-21T02:29:21.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,33 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/21/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.drupal.org/node/2407081", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.drupal.org/node/2415947", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3407.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3407.json index 4df50eb1ead..3e32fcbdeb4 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3407.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3407.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3407", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-19T18:59:03.667", - "lastModified": "2017-11-04T01:29:04.410", + "lastModified": "2024-11-21T02:29:21.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -126,6 +125,30 @@ { "url": "https://metacpan.org/changes/distribution/Module-Signature", "source": "cve@mitre.org" + }, + { + "url": "http://ubuntu.com/usn/usn-2607-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/23/17", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://metacpan.org/changes/distribution/Module-Signature", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3408.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3408.json index e72b431e5c8..af86dba7595 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3408.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3408.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3408", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-19T18:59:05.277", - "lastModified": "2017-11-04T01:29:04.473", + "lastModified": "2024-11-21T02:29:22.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -126,6 +125,30 @@ { "url": "https://metacpan.org/changes/distribution/Module-Signature", "source": "cve@mitre.org" + }, + { + "url": "http://ubuntu.com/usn/usn-2607-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/23/17", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://metacpan.org/changes/distribution/Module-Signature", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3409.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3409.json index f297cee39e6..5c9fe1b13e1 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3409.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3409.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3409", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-19T18:59:06.293", - "lastModified": "2017-11-04T01:29:04.537", + "lastModified": "2024-11-21T02:29:22.233", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-426: Untrusted Search Path", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -131,6 +129,35 @@ { "url": "https://metacpan.org/changes/distribution/Module-Signature", "source": "cve@mitre.org" + }, + { + "url": "http://ubuntu.com/usn/usn-2607-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/23/17", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/73937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/audreyt/module-signature/commit/c41e8885b862b9fce2719449bc9336f0bea658ef", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://metacpan.org/changes/distribution/Module-Signature", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-426: Untrusted Search Path" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3414.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3414.json index 21246a59fc4..d9ac6326405 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3414.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3414.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3414", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-24T17:59:00.067", - "lastModified": "2022-08-16T13:32:25.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:22.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -275,6 +274,118 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1635.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/31", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3252", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74228", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033703", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2698-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.sqlite.org/src/info/eddc05e7bb31fae74daa86e0504a3478b99fa0f2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3415.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3415.json index a5fcb56c9a1..1a298b0e0a2 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3415.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3415.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3415", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-24T17:59:01.377", - "lastModified": "2022-08-16T13:33:26.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:22.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -275,6 +274,118 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1635.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/31", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3252", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74228", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033703", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2698-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.sqlite.org/src/info/02e3c88fbf6abdcf3975fb0fb71972b0ab30da30", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3416.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3416.json index 483efaa2735..ac1c8006e70 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3416.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3416.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3416", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-24T17:59:02.363", - "lastModified": "2022-08-16T13:28:40.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:23.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -284,6 +283,125 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1634.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1635.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/31", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3252", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:217", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74228", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033703", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.sqlite.org/src/info/c494171f77dc2e5e04cb6d865e688448f04e5920", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2698-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201507-05", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.apple.com/HT205267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3417.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3417.json index 8df9edb0199..2dc95e69cc8 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3417.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3417.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3417", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-24T17:59:03.393", - "lastModified": "2023-11-07T02:25:37.947", + "lastModified": "2024-11-21T02:29:23.327", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -135,6 +133,54 @@ { "url": "https://security.gentoo.org/glsa/201705-08", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/31", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3288", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032198", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://git.libav.org/?p=libav.git%3Ba=blob%3Bf=Changelog%3Bhb=refs/tags/v11.4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/FFmpeg/FFmpeg/commit/e8714f6f93d1a32f4e4655209960afcf4c185214", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201705-08", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-416: Use After Free" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3427.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3427.json index ae5a42a1e7d..6b0a95b959c 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3427.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3427.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3427", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-14T14:59:11.140", - "lastModified": "2016-12-06T03:00:54.720", + "lastModified": "2024-11-21T02:29:24.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -102,6 +101,21 @@ { "url": "http://www.securityfocus.com/bid/74339", "source": "cve@mitre.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.quassel-irc.org/node/127", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74339", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3435.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3435.json index 3339ebcee52..c43d575ace7 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3435.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3435.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3435", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-01T15:59:08.007", - "lastModified": "2016-12-06T03:00:56.973", + "lastModified": "2024-11-21T02:29:25.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-157/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/74400", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-156/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-157/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3446.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3446.json index 9845aaea9f0..ce2e347f1b9 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3446.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3446.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3446", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-01T15:59:08.897", - "lastModified": "2016-12-06T03:01:03.863", + "lastModified": "2024-11-21T02:29:26.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-161/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.alienvault.com/forums/discussion/4415/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3447.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3447.json index 1f488e16a54..ce7500a85f3 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3447.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3447.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3447", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-29T20:59:04.623", - "lastModified": "2018-10-09T19:56:55.453", + "lastModified": "2024-11-21T02:29:26.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -115,6 +114,43 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/97", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535393/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74406", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032204", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=1359", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3448.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3448.json index 7d801d076ae..a3b55fffb07 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3448.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3448.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3448", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-29T20:59:06.173", - "lastModified": "2016-12-06T03:01:05.943", + "lastModified": "2024-11-21T02:29:26.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -88,6 +87,22 @@ { "url": "https://github.com/rest-client/rest-client/issues/349", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/117461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74415", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/rest-client/rest-client/issues/349", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3451.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3451.json index 891c6ec4711..b9db728922f 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3451.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3451.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3451", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:21.827", - "lastModified": "2020-04-29T13:17:10.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:27.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -240,6 +239,94 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0199.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://cpansearch.perl.org/src/SHLOMIF/XML-LibXML-2.0119/Changes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157448.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157740.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3243", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:231", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/25/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/04/30/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74333", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2592-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30/raw/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3455.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3455.json index 295e12ec5be..d39a8b2b0fc 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3455.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3455.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3455", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:11.650", - "lastModified": "2019-12-27T16:08:55.810", + "lastModified": "2024-11-21T02:29:27.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -517,6 +516,72 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://advisories.mageia.org/MGASA-2015-0191.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183598.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-09/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-2378.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:230", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74438", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032221", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.squid-cache.org/Advisories/SQUID-2015_1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3456.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3456.json index fb826865bd3..36662fde2f1 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3456.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3456.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3456", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-13T18:59:00.157", - "lastModified": "2023-11-07T02:25:38.537", + "lastModified": "2024-11-21T02:29:27.637", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Though the VENOM vulnerability is also agnostic of the guest operating system, an attacker (or an attacker\u2019s malware) would need to have administrative or root privileges in the guest operating system in order to exploit VENOM", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 7.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 5.1, @@ -181,6 +179,10 @@ "url": "http://marc.info/?l=bugtraq&m=143229451215900&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=143229451215900&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=143387998230996&w=2", "source": "cve@mitre.org" @@ -320,6 +322,203 @@ { "url": "https://www.suse.com/security/cve/CVE-2015-3456.html", "source": "cve@mitre.org" + }, + { + "url": "http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=e907746266721f305d67bc0718795fedee2e824c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158072.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143229451215900&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143229451215900&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=143387998230996&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0998.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0999.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX201078", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://venom.crowdstrike.com/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3259", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3262", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2608-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xenbits.xen.org/xsa/advisory-133.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/articles/1444903", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa95", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/JSA10783", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10118", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201602-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201604-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201612-27", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.lenovo.com/us/en/product_security/venom", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/37053/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/security/cve/CVE-2015-3456.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Though the VENOM vulnerability is also agnostic of the guest operating system, an attacker (or an attacker\u2019s malware) would need to have administrative or root privileges in the guest operating system in order to exploit VENOM" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3457.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3457.json index 1831d91e960..c561cae66e3 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3457.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3457.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3457", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-29T22:59:03.253", - "lastModified": "2016-12-06T03:01:10.083", + "lastModified": "2024-11-21T02:29:27.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,26 @@ { "url": "http://www.securitytracker.com/id/1032230", "source": "cve@mitre.org" + }, + { + "url": "http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74420", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032230", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3458.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3458.json index f8d27f49790..9d00afd1b27 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3458.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3458.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3458", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-29T22:59:04.113", - "lastModified": "2016-12-06T03:01:11.223", + "lastModified": "2024-11-21T02:29:27.970", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -99,6 +98,29 @@ { "url": "http://www.securitytracker.com/id/1032230", "source": "cve@mitre.org" + }, + { + "url": "http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74412", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032230", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-34xx/CVE-2015-3459.json b/CVE-2015/CVE-2015-34xx/CVE-2015-3459.json index 7a70031d169..c54a213ee75 100644 --- a/CVE-2015/CVE-2015-34xx/CVE-2015-3459.json +++ b/CVE-2015/CVE-2015-34xx/CVE-2015-3459.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3459", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-29T23:59:00.057", - "lastModified": "2017-01-03T19:16:30.773", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:28.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -148,6 +147,65 @@ "tags": [ "Press/Media Coverage" ] + }, + { + "url": "http://hextechsecurity.com/?p=123", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://imgur.com/CEAnZjj", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://imgur.com/JHiWSqd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm446809.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74414", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://twitter.com/dyngnosis/status/592671049487142913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Press/Media Coverage" + ] + }, + { + "url": "https://twitter.com/dyngnosis/status/592743461977219072", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Press/Media Coverage" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3610.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3610.json index 1f57879c93d..fe7c7493c08 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3610.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3610.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3610", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-07T10:59:00.093", - "lastModified": "2015-05-07T14:26:42.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:28.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -79,6 +78,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-311412.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3620.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3620.json index 2f7a1e83d2b..31d0acce65c 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3620.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3620.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3620", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:23.043", - "lastModified": "2018-10-09T19:56:55.827", + "lastModified": "2024-11-21T02:29:29.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -196,6 +195,51 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/131766/Fortinet-FortiAnalyzer-FortiManager-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/13", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.fortiguard.com/advisory/FG-IR-15-005/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535452/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74646", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032262", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3622.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3622.json index eef3830c97f..7b053f61bf3 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3622.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3622.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3622", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:24.043", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T02:29:30.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -164,6 +163,68 @@ { "url": "https://security.gentoo.org/glsa/201509-04", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/Apr/109", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2604-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2017:1860", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201509-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3627.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3627.json index 298777786e6..1b5aa0764a1 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3627.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3627.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3627", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:14.930", - "lastModified": "2023-11-07T02:25:39.687", + "lastModified": "2024-11-21T02:29:30.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -94,6 +93,22 @@ { "url": "https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/28", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3629.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3629.json index 1ce6f0ab9de..d5f368ccbbe 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3629.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3629.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3629", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:15.807", - "lastModified": "2024-02-02T02:07:17.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:31.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -148,6 +147,46 @@ "tags": [ "Permissions Required" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/28", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74558", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3630.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3630.json index 7e27855d99d..4c35072fd72 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3630.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3630.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3630", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:16.807", - "lastModified": "2023-11-07T02:25:39.820", + "lastModified": "2024-11-21T02:29:31.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -92,6 +91,26 @@ { "url": "https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/28", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74566", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3631.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3631.json index 40176532236..868d97846ac 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3631.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3631.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3631", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:17.760", - "lastModified": "2023-11-07T02:25:39.880", + "lastModified": "2024-11-21T02:29:31.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -88,6 +87,22 @@ { "url": "https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/28", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3632.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3632.json index e480b42c15e..b208888d873 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3632.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3632.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3632", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-01T15:59:10.070", - "lastModified": "2017-01-03T03:00:02.397", + "lastModified": "2024-11-21T02:29:31.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -128,6 +127,50 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.com/files/131685/Foxit-Reader-7.1.3.320-Memory-Corruption.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://protekresearchlab.com/PRL-2015-05/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.foxitsoftware.com/support/security_bulletins.php#FRD-27", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032229", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/36859/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3633.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3633.json index f3322190d67..6efe54f8f46 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3633.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3633.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3633", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-01T15:59:12.477", - "lastModified": "2017-01-03T03:00:02.447", + "lastModified": "2024-11-21T02:29:31.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,26 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.foxitsoftware.com/support/security_bulletins.php#FRD-26", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74418", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032228", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3644.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3644.json index 6b29e258959..aa050ace3eb 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3644.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3644.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3644", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-14T00:59:06.147", - "lastModified": "2016-12-28T02:59:14.043", + "lastModified": "2024-11-21T02:29:33.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -156,6 +155,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3299", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032324", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.stunnel.org/CVE-2015-3644.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3646.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3646.json index d15a4d3e198..03363b25c7f 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3646.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3646.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3646", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T19:59:26.263", - "lastModified": "2020-06-02T19:04:33.107", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:29:33.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -126,6 +125,37 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-May/000356.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74456", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.launchpad.net/keystone/+bug/1443598", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3647.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3647.json index 3f78a88adf4..b45c20ca91e 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3647.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3647.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3647", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-21T20:59:01.623", - "lastModified": "2018-10-09T19:56:57.000", + "lastModified": "2024-11-21T02:29:33.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,39 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131976/WordPress-WP-Photo-Album-Plus-6.1.2-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535575/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74741", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/wp-photo-album-plus/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23257", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-38xx/CVE-2015-3808.json b/CVE-2015/CVE-2015-38xx/CVE-2015-3808.json index 053c45267f6..68a99c28049 100644 --- a/CVE-2015/CVE-2015-38xx/CVE-2015-3808.json +++ b/CVE-2015/CVE-2015-38xx/CVE-2015-3808.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3808", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:01.760", - "lastModified": "2023-11-07T02:25:41.560", + "lastModified": "2024-11-21T02:29:54.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -114,6 +113,29 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/74628", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-12.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-38xx/CVE-2015-3809.json b/CVE-2015/CVE-2015-38xx/CVE-2015-3809.json index a5611eade8c..25005763f6e 100644 --- a/CVE-2015/CVE-2015-38xx/CVE-2015-3809.json +++ b/CVE-2015/CVE-2015-38xx/CVE-2015-3809.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3809", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:02.900", - "lastModified": "2023-11-07T02:25:41.617", + "lastModified": "2024-11-21T02:29:54.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -118,6 +117,33 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74632", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-12.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-38xx/CVE-2015-3810.json b/CVE-2015/CVE-2015-38xx/CVE-2015-3810.json index 2edeca1a8fc..d092733a872 100644 --- a/CVE-2015/CVE-2015-38xx/CVE-2015-3810.json +++ b/CVE-2015/CVE-2015-38xx/CVE-2015-3810.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3810", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:04.057", - "lastModified": "2023-11-07T02:25:41.673", + "lastModified": "2024-11-21T02:29:54.403", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -122,6 +121,37 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10989", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4ee6bcbd2e03a25f1e6b0239558d9edeaf8040c0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-38xx/CVE-2015-3811.json b/CVE-2015/CVE-2015-38xx/CVE-2015-3811.json index 25c29dbd44f..b485f747bec 100644 --- a/CVE-2015/CVE-2015-38xx/CVE-2015-3811.json +++ b/CVE-2015/CVE-2015-38xx/CVE-2015-3811.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3811", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:05.027", - "lastModified": "2023-11-07T02:25:41.730", + "lastModified": "2024-11-21T02:29:54.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -236,6 +235,51 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2017-0631.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6fc6aa0b4efc1a1c3d7a2e3b5189e888fb6ccc2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-38xx/CVE-2015-3812.json b/CVE-2015/CVE-2015-38xx/CVE-2015-3812.json index f4bf619af61..8aab2da46e1 100644 --- a/CVE-2015/CVE-2015-38xx/CVE-2015-3812.json +++ b/CVE-2015/CVE-2015-38xx/CVE-2015-3812.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3812", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:06.010", - "lastModified": "2023-11-07T02:25:41.793", + "lastModified": "2024-11-21T02:29:54.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -219,8 +218,8 @@ "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088", "source": "cve@mitre.org", "tags": [ - "Patch", "Issue Tracking", + "Patch", "Vendor Advisory" ] }, @@ -231,6 +230,56 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2017-0631.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-15.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8ccc2a6add29823a0ff0492fc50372449007e7b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-38xx/CVE-2015-3813.json b/CVE-2015/CVE-2015-38xx/CVE-2015-3813.json index c86c4e42a7e..76a5a204069 100644 --- a/CVE-2015/CVE-2015-38xx/CVE-2015-3813.json +++ b/CVE-2015/CVE-2015-38xx/CVE-2015-3813.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3813", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:07.307", - "lastModified": "2023-11-07T02:25:41.867", + "lastModified": "2024-11-21T02:29:54.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -126,6 +125,41 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2017-0631.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11129", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35f2ccb4433718416551cc7a85afb0860529d57", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-38xx/CVE-2015-3814.json b/CVE-2015/CVE-2015-38xx/CVE-2015-3814.json index 8702e9c821a..24c43db1dcd 100644 --- a/CVE-2015/CVE-2015-38xx/CVE-2015-3814.json +++ b/CVE-2015/CVE-2015-38xx/CVE-2015-3814.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3814", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:08.167", - "lastModified": "2023-11-07T02:25:41.930", + "lastModified": "2024-11-21T02:29:55.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -219,6 +218,44 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74631", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-17.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e243b0041328980a9bbd43bb8a8166d7422f9096", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-38xx/CVE-2015-3815.json b/CVE-2015/CVE-2015-38xx/CVE-2015-3815.json index ef57653c874..eba33962d20 100644 --- a/CVE-2015/CVE-2015-38xx/CVE-2015-3815.json +++ b/CVE-2015/CVE-2015-38xx/CVE-2015-3815.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3815", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:09.150", - "lastModified": "2023-11-07T02:25:41.997", + "lastModified": "2024-11-21T02:29:55.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -122,6 +121,37 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74630", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-38xx/CVE-2015-3885.json b/CVE-2015/CVE-2015-38xx/CVE-2015-3885.json index 31000211b71..84c3188add6 100644 --- a/CVE-2015/CVE-2015-38xx/CVE-2015-3885.json +++ b/CVE-2015/CVE-2015-38xx/CVE-2015-3885.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3885", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-19T18:59:07.277", - "lastModified": "2018-10-09T19:56:57.780", + "lastModified": "2024-11-21T02:30:01.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -158,6 +157,77 @@ { "url": "https://security.gentoo.org/glsa/201706-17", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162084.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159469.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159479.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159518.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159579.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159625.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159665.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159083.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159123.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ocert.org/advisories/ocert-2015-006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/535513/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/LibRaw/LibRaw/commit/4606c28f494a750892c5c1ac7903e62dd1c6fdb5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/rawstudio/rawstudio/commit/983bda1f0fa5fa86884381208274198a620f006e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201701-54", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201706-17", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3902.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3902.json index 171dc2f9875..7649c5d31c8 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3902.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3902.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3902", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:10.370", - "lastModified": "2016-12-28T02:59:15.277", + "lastModified": "2024-11-21T02:30:03.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -374,6 +373,34 @@ { "url": "https://github.com/phpmyadmin/phpmyadmin/commit/ee92eb9bab8e2d546756c1d4aec81ec7c8e44b83", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2015/dsa-3382", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2015-2.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74657", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/ee92eb9bab8e2d546756c1d4aec81ec7c8e44b83", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3903.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3903.json index ac0aa4032df..bd34489cdb5 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3903.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3903.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3903", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:11.447", - "lastModified": "2018-10-09T19:56:59.843", + "lastModified": "2024-11-21T02:30:03.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -392,6 +391,52 @@ { "url": "https://github.com/phpmyadmin/phpmyadmin/commit/5ebc4daf131dd3bd646326267f3e765d0249bbb4", "source": "cve@mitre.org" + }, + { + "url": "http://cxsecurity.com/issue/WLB-2015050095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3382", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2015-3.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535547/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74660", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/5ebc4daf131dd3bd646326267f3e765d0249bbb4", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3906.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3906.json index e5901842b38..d2cfbb56d3b 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3906.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3906.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3906", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T15:59:12.323", - "lastModified": "2023-11-07T02:25:42.753", + "lastModified": "2024-11-21T02:30:03.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -114,6 +113,29 @@ { "url": "https://security.gentoo.org/glsa/201510-03", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/74837", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2015-18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201510-03", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3910.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3910.json index 148c86ac152..36623544e17 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3910.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3910.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3910", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2015-05-20T10:59:19.933", - "lastModified": "2023-11-07T02:25:42.830", + "lastModified": "2024-11-21T02:30:04.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,18 @@ { "url": "http://www.securityfocus.com/bid/74730", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2015/05/stable-channel-update_19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74730", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3911.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3911.json index cc26ec8500a..a146288c0b8 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3911.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3911.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3911", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-21T19:59:00.077", - "lastModified": "2015-05-22T14:05:17.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:04.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,17 @@ { "url": "http://www.securityfocus.com/bid/74434", "source": "cve@mitre.org" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-425408.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74434", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3912.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3912.json index b2a9c903086..a4722f28516 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3912.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3912.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3912", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-21T19:59:01.327", - "lastModified": "2015-05-22T14:05:42.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:04.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -111,6 +110,17 @@ { "url": "http://www.securityfocus.com/bid/74397", "source": "cve@mitre.org" + }, + { + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-425435.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74397", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3921.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3921.json index 0a6cbfe9fa5..dd7fda2de4c 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3921.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3921.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3921", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T18:59:00.070", - "lastModified": "2023-11-07T02:25:43.543", + "lastModified": "2024-11-21T02:30:05.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -88,6 +87,22 @@ { "url": "http://www.securitytracker.com/id/1032558", "source": "cve@mitre.org" + }, + { + "url": "http://forum.coppermine-gallery.net/index.php/topic%2C78194.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/132004/Coppermine-Gallery-1.5.34-XSS-Open-Redirection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74872", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032558", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3922.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3922.json index 979d2763d42..2f3b9371b8a 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3922.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3922.json @@ -2,10 +2,8 @@ "id": "CVE-2015-3922", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T18:59:01.977", - "lastModified": "2023-11-07T02:25:43.600", + "lastModified": "2024-11-21T02:30:05.210", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +87,23 @@ { "url": "http://www.securitytracker.com/id/1032558", "source": "cve@mitre.org" + }, + { + "url": "http://forum.coppermine-gallery.net/index.php/topic%2C78194.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/132004/Coppermine-Gallery-1.5.34-XSS-Open-Redirection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74869", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032558", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')" } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3978.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3978.json index 2a452d7e187..7a507fe7213 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3978.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3978.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3978", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T20:59:00.113", - "lastModified": "2018-12-10T19:29:08.687", + "lastModified": "2024-11-21T02:30:11.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -87,6 +86,22 @@ { "url": "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/", "source": "cve@mitre.org" + }, + { + "url": "http://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74625", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3979.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3979.json index ed09a3703e5..b1fd0c112fd 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3979.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3979.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3979", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T20:59:01.287", - "lastModified": "2017-01-03T03:00:02.743", + "lastModified": "2024-11-21T02:30:11.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "http://www.securitytracker.com/id/1032309", "source": "cve@mitre.org" + }, + { + "url": "http://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032309", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3980.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3980.json index ec3c38dbc91..fe81a2d3cbb 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3980.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3980.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3980", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T20:59:02.520", - "lastModified": "2017-01-03T03:00:02.803", + "lastModified": "2024-11-21T02:30:11.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "http://www.securitytracker.com/id/1032309", "source": "cve@mitre.org" + }, + { + "url": "http://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032309", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3981.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3981.json index 694438ada52..9a870237ac2 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3981.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3981.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3981", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-12T20:59:03.677", - "lastModified": "2018-12-10T19:29:08.797", + "lastModified": "2024-11-21T02:30:12.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/74627", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032308", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/press-center/blog/sap-security-notes-april-2015/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3983.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3983.json index 2be7035fbca..a822333ee00 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3983.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3983.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3983", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-14T14:59:12.513", - "lastModified": "2016-12-31T02:59:30.533", + "lastModified": "2024-11-21T02:30:12.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,34 @@ { "url": "https://bugzilla.redhat.com/attachment.cgi?id=1009855", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0980.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-0990.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74682", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/attachment.cgi?id=1009855", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3986.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3986.json index d15840d6fe6..b8322ce1607 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3986.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3986.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3986", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-14T14:59:13.550", - "lastModified": "2018-10-09T19:57:00.733", + "lastModified": "2024-11-21T02:30:12.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,39 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131673/WordPress-TheCartPress-1.3.9-XSS-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/535396/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/thecartpress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/36860/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23254", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3987.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3987.json index 0dcd4cf5826..1847ee433cd 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3987.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3987.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3987", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-14T14:59:14.507", - "lastModified": "2019-02-11T16:11:19.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:12.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -99,6 +98,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74685", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10115", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3988.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3988.json index 65e235d9e30..260287f54d9 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3988.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3988.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3988", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-19T18:59:08.510", - "lastModified": "2016-12-24T02:59:15.917", + "lastModified": "2024-11-21T02:30:12.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -122,6 +121,42 @@ { "url": "https://security.openstack.org/ossa/OSSA-2015-009.html", "source": "cve@mitre.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1679.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/05/12/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2015/05/14/14", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74666", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.openstack.org/ossa/OSSA-2015-009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3989.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3989.json index 4230a4a59ee..6507d40cb45 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3989.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3989.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3989", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-15T18:59:02.963", - "lastModified": "2016-12-06T03:01:46.933", + "lastModified": "2024-11-21T02:30:13.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/74699", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.concrete5.org/documentation/developers/5.7/background/version-history/5-7-4-release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3990.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3990.json index c2cc8371e17..e3d0209fa0d 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3990.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3990.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3990", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2015-05-20T18:59:05.793", - "lastModified": "2023-11-07T02:25:44.987", + "lastModified": "2024-11-21T02:30:13.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -122,6 +121,22 @@ { "url": "https://support.software.dell.com/product-notification/152178", "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "http://www.securityfocus.com/bid/74756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1032373", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-231/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.software.dell.com/product-notification/152178", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-39xx/CVE-2015-3999.json b/CVE-2015/CVE-2015-39xx/CVE-2015-3999.json index f8b9b0f2979..dc2bdee2381 100644 --- a/CVE-2015/CVE-2015-39xx/CVE-2015-3999.json +++ b/CVE-2015/CVE-2015-39xx/CVE-2015-3999.json @@ -2,9 +2,8 @@ "id": "CVE-2015-3999", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-20T18:59:07.200", - "lastModified": "2015-05-21T17:14:20.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:14.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -204,6 +203,14 @@ { "url": "http://www.securityfocus.com/bid/74714", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/72", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74714", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4000.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4000.json index 1184ecaf484..364d211f45e 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4000.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4000.json @@ -2,9 +2,8 @@ "id": "CVE-2015-4000", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-21T00:59:00.087", - "lastModified": "2024-10-22T13:42:14.500", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:14.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 3.7, - "baseSeverity": "LOW" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.2, "impactScore": 1.4 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -820,6 +819,14 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=143880121627664&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=144043644216842&w=2", "source": "cve@mitre.org", @@ -892,6 +899,14 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2", + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://marc.info/?l=bugtraq&m=145409266329539&w=2", "source": "cve@mitre.org", @@ -1697,8 +1712,8 @@ "url": "http://www.securitytracker.com/id/1033760", "source": "cve@mitre.org", "tags": [ - "VDB Entry", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -2065,6 +2080,1654 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143506486712441&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143557934009303&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143558092609708&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143628304012255&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143637549705650&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143655800220052&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143880121627664&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=143880121627664&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144043644216842&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144050121701297&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144060576831314&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144060606031437&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144061542602287&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144069189622016&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144102017024820&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144104533800819&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=145409266329539&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2015/05/20/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1072.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1185.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1197.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1485.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1486.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1488.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1544.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1604.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-1624.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT204941", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT204942", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.citrix.com/article/CTX201114", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959325", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959453", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959517", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959530", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959539", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959636", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21959812", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21960191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21961717", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962455", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21962739", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21958984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21959132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960194", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960380", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21960418", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21962816", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-304.ibm.com/support/docview.wss?uid=swg21967893", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3300", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3316", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3324", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2015/dsa-3339", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2016/dsa-3688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.fortiguard.com/advisory/2015-05-20-logjam-attack", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-70.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74733", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/91787", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032474", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032476", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032637", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032645", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032647", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032648", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032650", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032652", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032653", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032654", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032655", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032656", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032699", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032702", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032727", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032759", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032778", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032783", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032784", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032856", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032864", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032865", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032871", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032884", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032932", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1032960", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033064", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033067", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033208", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033222", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033341", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033416", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033430", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033433", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033513", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033760", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033891", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1033991", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1034087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1034728", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1034884", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1036218", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1040630", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2656-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2656-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2673-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2696-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2706-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bto.bluecoat.com/security-advisory/sa98", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1138554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10122", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://openssl.org/news/secadv/20150611.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://puppet.com/security/cve/CVE-2015-4000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201506-02", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201512-10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201603-11", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201701-46", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20150619-0001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.citrix.com/article/CTX216642", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://weakdh.org/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://weakdh.org/imperfect-forward-secrecy.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21959745", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.openssl.org/news/secadv_20150611.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.oracle.com/security-alerts/cpujan2021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.suse.com/security/cve/CVE-2015-4000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4016.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4016.json index 0e0b0363ae0..254253426a0 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4016.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4016.json @@ -2,9 +2,8 @@ "id": "CVE-2015-4016", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-20T18:59:08.247", - "lastModified": "2022-02-07T19:43:59.803", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:16.283", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://store.steampowered.com/news/16801/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74735", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-233/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4018.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4018.json index 7653cb64cb0..14799b2799d 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4018.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4018.json @@ -2,9 +2,8 @@ "id": "CVE-2015-4018", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-21T20:59:02.623", - "lastModified": "2015-06-25T16:22:24.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:16.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -101,6 +100,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/131974/WordPress-FeedWordPress-2015.0426-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/75", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://wordpress.org/plugins/feedwordpress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37067/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4062.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4062.json index 8cd4c32502a..8b6e00df3c8 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4062.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4062.json @@ -2,9 +2,8 @@ "id": "CVE-2015-4062", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T18:59:03.023", - "lastModified": "2015-05-28T14:54:38.603", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:22.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/132038/WordPress-NewStatPress-0.9.8-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74773", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/newstatpress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37107/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4063.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4063.json index f5bde785ac8..cf438a17cc7 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4063.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4063.json @@ -2,9 +2,8 @@ "id": "CVE-2015-4063", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T18:59:04.163", - "lastModified": "2015-05-28T14:55:12.653", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:22.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -98,6 +97,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/132038/WordPress-NewStatPress-0.9.8-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74773", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/newstatpress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37107/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4064.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4064.json index 46e03c473d5..b68a21317f6 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4064.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4064.json @@ -2,9 +2,8 @@ "id": "CVE-2015-4064", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T18:59:05.273", - "lastModified": "2015-05-28T14:56:46.797", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:23.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/132037/WordPress-Landing-Pages-1.8.4-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/landing-pages/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37108/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4065.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4065.json index 0d008fd73f3..88879d86b64 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4065.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4065.json @@ -2,9 +2,8 @@ "id": "CVE-2015-4065", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T18:59:06.523", - "lastModified": "2015-05-28T14:57:33.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:23.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -98,6 +97,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/132037/WordPress-Landing-Pages-1.8.4-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/landing-pages/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37108/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4066.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4066.json index 09f67224a14..e8efd293f0a 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4066.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4066.json @@ -2,9 +2,8 @@ "id": "CVE-2015-4066", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-27T18:59:07.523", - "lastModified": "2021-08-19T16:27:34.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T02:30:23.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.com/files/132036/WordPress-GigPress-2.3.8-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/74747", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wordpress.org/plugins/gigpress/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/37109/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4091.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4091.json index 8273de161e3..e23df4d1b52 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4091.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4091.json @@ -2,9 +2,8 @@ "id": "CVE-2015-4091", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T14:59:00.070", - "lastModified": "2018-12-10T19:29:08.890", + "lastModified": "2024-11-21T02:30:26.023", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://erpscan.io/advisories/erpscan-15-013-sap-netweaver-as-java-cim-upload-xxe", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/133122/SAP-NetWeaver-AS-Java-XXE-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/96", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/536239/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74850", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-013-sap-netweaver-as-java-cim-upload-xxe", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4092.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4092.json index 6c6c877ac9c..1c923b8b231 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4092.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4092.json @@ -2,9 +2,8 @@ "id": "CVE-2015-4092", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-26T14:59:01.790", - "lastModified": "2018-12-10T19:29:09.047", + "lastModified": "2024-11-21T02:30:26.177", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://erpscan.io/advisories/erpscan-15-012-sap-afaria-7-xcomms-bof", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2015/May/96", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/536238/100/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/74797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://erpscan.io/advisories/erpscan-15-012-sap-afaria-7-xcomms-bof", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 4bb5d338a7e..55679cf6879 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-22T19:12:10.918177+00:00 +2024-11-22T23:11:09.202836+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD @@ -44,33 +44,33 @@ Recently added CVEs: `0` ### CVEs modified in the last Commit -Recently modified CVEs: `7999` - -- [CVE-2014-3760](CVE-2014/CVE-2014-37xx/CVE-2014-3760.json) (`2024-11-21T02:08:47.453`) -- [CVE-2014-3761](CVE-2014/CVE-2014-37xx/CVE-2014-3761.json) (`2024-11-21T02:08:47.603`) -- [CVE-2014-3775](CVE-2014/CVE-2014-37xx/CVE-2014-3775.json) (`2024-11-21T02:08:48.480`) -- [CVE-2014-3776](CVE-2014/CVE-2014-37xx/CVE-2014-3776.json) (`2024-11-21T02:08:48.627`) -- [CVE-2014-3783](CVE-2014/CVE-2014-37xx/CVE-2014-3783.json) (`2024-11-21T02:08:49.650`) -- [CVE-2014-3787](CVE-2014/CVE-2014-37xx/CVE-2014-3787.json) (`2024-11-21T02:08:49.950`) -- [CVE-2014-3788](CVE-2014/CVE-2014-37xx/CVE-2014-3788.json) (`2024-11-21T02:08:50.097`) -- [CVE-2014-3789](CVE-2014/CVE-2014-37xx/CVE-2014-3789.json) (`2024-11-21T02:08:50.237`) -- [CVE-2014-3791](CVE-2014/CVE-2014-37xx/CVE-2014-3791.json) (`2024-11-21T02:08:50.527`) -- [CVE-2014-3792](CVE-2014/CVE-2014-37xx/CVE-2014-3792.json) (`2024-11-21T02:08:51.367`) -- [CVE-2014-3801](CVE-2014/CVE-2014-38xx/CVE-2014-3801.json) (`2024-11-21T02:08:52.437`) -- [CVE-2014-3802](CVE-2014/CVE-2014-38xx/CVE-2014-3802.json) (`2024-11-21T02:08:52.577`) -- [CVE-2014-3803](CVE-2014/CVE-2014-38xx/CVE-2014-3803.json) (`2024-11-21T02:08:52.720`) -- [CVE-2014-3806](CVE-2014/CVE-2014-38xx/CVE-2014-3806.json) (`2024-11-21T02:08:53.183`) -- [CVE-2014-3807](CVE-2014/CVE-2014-38xx/CVE-2014-3807.json) (`2024-11-21T02:08:53.323`) -- [CVE-2014-3808](CVE-2014/CVE-2014-38xx/CVE-2014-3808.json) (`2024-11-21T02:08:53.483`) -- [CVE-2014-3841](CVE-2014/CVE-2014-38xx/CVE-2014-3841.json) (`2024-11-21T02:08:57.977`) -- [CVE-2014-3842](CVE-2014/CVE-2014-38xx/CVE-2014-3842.json) (`2024-11-21T02:08:58.117`) -- [CVE-2014-3843](CVE-2014/CVE-2014-38xx/CVE-2014-3843.json) (`2024-11-21T02:08:58.260`) -- [CVE-2014-3844](CVE-2014/CVE-2014-38xx/CVE-2014-3844.json) (`2024-11-21T02:08:58.400`) -- [CVE-2014-3845](CVE-2014/CVE-2014-38xx/CVE-2014-3845.json) (`2024-11-21T02:08:58.533`) -- [CVE-2014-3846](CVE-2014/CVE-2014-38xx/CVE-2014-3846.json) (`2024-11-21T02:08:58.673`) -- [CVE-2014-3848](CVE-2014/CVE-2014-38xx/CVE-2014-3848.json) (`2024-11-21T02:08:58.813`) -- [CVE-2014-3849](CVE-2014/CVE-2014-38xx/CVE-2014-3849.json) (`2024-11-21T02:08:58.977`) -- [CVE-2014-3867](CVE-2014/CVE-2014-38xx/CVE-2014-3867.json) (`2024-11-21T02:09:01.410`) +Recently modified CVEs: `5999` + +- [CVE-2015-3911](CVE-2015/CVE-2015-39xx/CVE-2015-3911.json) (`2024-11-21T02:30:04.553`) +- [CVE-2015-3912](CVE-2015/CVE-2015-39xx/CVE-2015-3912.json) (`2024-11-21T02:30:04.707`) +- [CVE-2015-3921](CVE-2015/CVE-2015-39xx/CVE-2015-3921.json) (`2024-11-21T02:30:05.050`) +- [CVE-2015-3922](CVE-2015/CVE-2015-39xx/CVE-2015-3922.json) (`2024-11-21T02:30:05.210`) +- [CVE-2015-3978](CVE-2015/CVE-2015-39xx/CVE-2015-3978.json) (`2024-11-21T02:30:11.490`) +- [CVE-2015-3979](CVE-2015/CVE-2015-39xx/CVE-2015-3979.json) (`2024-11-21T02:30:11.663`) +- [CVE-2015-3980](CVE-2015/CVE-2015-39xx/CVE-2015-3980.json) (`2024-11-21T02:30:11.837`) +- [CVE-2015-3981](CVE-2015/CVE-2015-39xx/CVE-2015-3981.json) (`2024-11-21T02:30:12.010`) +- [CVE-2015-3983](CVE-2015/CVE-2015-39xx/CVE-2015-3983.json) (`2024-11-21T02:30:12.373`) +- [CVE-2015-3986](CVE-2015/CVE-2015-39xx/CVE-2015-3986.json) (`2024-11-21T02:30:12.560`) +- [CVE-2015-3987](CVE-2015/CVE-2015-39xx/CVE-2015-3987.json) (`2024-11-21T02:30:12.770`) +- [CVE-2015-3988](CVE-2015/CVE-2015-39xx/CVE-2015-3988.json) (`2024-11-21T02:30:12.940`) +- [CVE-2015-3989](CVE-2015/CVE-2015-39xx/CVE-2015-3989.json) (`2024-11-21T02:30:13.117`) +- [CVE-2015-3990](CVE-2015/CVE-2015-39xx/CVE-2015-3990.json) (`2024-11-21T02:30:13.283`) +- [CVE-2015-3999](CVE-2015/CVE-2015-39xx/CVE-2015-3999.json) (`2024-11-21T02:30:14.483`) +- [CVE-2015-4000](CVE-2015/CVE-2015-40xx/CVE-2015-4000.json) (`2024-11-21T02:30:14.667`) +- [CVE-2015-4016](CVE-2015/CVE-2015-40xx/CVE-2015-4016.json) (`2024-11-21T02:30:16.283`) +- [CVE-2015-4018](CVE-2015/CVE-2015-40xx/CVE-2015-4018.json) (`2024-11-21T02:30:16.650`) +- [CVE-2015-4062](CVE-2015/CVE-2015-40xx/CVE-2015-4062.json) (`2024-11-21T02:30:22.843`) +- [CVE-2015-4063](CVE-2015/CVE-2015-40xx/CVE-2015-4063.json) (`2024-11-21T02:30:22.993`) +- [CVE-2015-4064](CVE-2015/CVE-2015-40xx/CVE-2015-4064.json) (`2024-11-21T02:30:23.150`) +- [CVE-2015-4065](CVE-2015/CVE-2015-40xx/CVE-2015-4065.json) (`2024-11-21T02:30:23.307`) +- [CVE-2015-4066](CVE-2015/CVE-2015-40xx/CVE-2015-4066.json) (`2024-11-21T02:30:23.453`) +- [CVE-2015-4091](CVE-2015/CVE-2015-40xx/CVE-2015-4091.json) (`2024-11-21T02:30:26.023`) +- [CVE-2015-4092](CVE-2015/CVE-2015-40xx/CVE-2015-4092.json) (`2024-11-21T02:30:26.177`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5ec9fe9b802..bc31ba5abc4 100644 --- a/_state.csv +++ b/_state.csv @@ -56182,414 +56182,414 @@ CVE-2012-4890,0,0,552e0bee8b2a61315842416f2f25e9d3fe6d8bcaa2ea90707d9254c1fdb76e CVE-2012-4891,0,0,cbf2c3bc0d00570b9834c240af9016693c66a53c3e65f7a613e19ecba46dd602,2024-11-21T01:43:41.823000 CVE-2012-4892,0,0,21e6e11f7ac1df57e5d93cb9f7a941df01698adee884d9a46a0b0a54b3b90e0c,2024-11-21T01:43:41.970000 CVE-2012-4893,0,0,7ae7a7991cb992a7d4550b1aa4a705bfbe6c9d4e6a86413fe07f2ad81c9c1312,2024-11-21T01:43:42.123000 -CVE-2012-4894,0,1,5505f3c1afd522811719c02f1cb7462ca103caa65a776776dd94103e604151e4,2024-11-21T01:43:42.273000 -CVE-2012-4895,0,1,7f22698cd9ec5192270451a09202693cdb661daedc4310710b25125225ff0a5f,2024-11-21T01:43:42.413000 -CVE-2012-4896,0,1,83bd72c471d2acec8e83fcec324de5e4f2d7d22a10da685993b9513764c6a776,2024-11-21T01:43:42.560000 -CVE-2012-4897,0,1,353f0ee7069a58bec60f439bb77e4f77e9f35ca90d98a7fa1b65c8c990e2eeb7,2024-11-21T01:43:42.700000 -CVE-2012-4898,0,1,55668e0cc9737b2c16e827cdfeb635e1321618e6e8764e4873151168c02c6f30,2024-11-21T01:43:42.850000 -CVE-2012-4899,0,1,4dc2b4c687c41e9e11e140e07d0b0d790ee8b7db1efc696795a9dbd2c56fa1f6,2024-11-21T01:43:42.963000 +CVE-2012-4894,0,0,5505f3c1afd522811719c02f1cb7462ca103caa65a776776dd94103e604151e4,2024-11-21T01:43:42.273000 +CVE-2012-4895,0,0,7f22698cd9ec5192270451a09202693cdb661daedc4310710b25125225ff0a5f,2024-11-21T01:43:42.413000 +CVE-2012-4896,0,0,83bd72c471d2acec8e83fcec324de5e4f2d7d22a10da685993b9513764c6a776,2024-11-21T01:43:42.560000 +CVE-2012-4897,0,0,353f0ee7069a58bec60f439bb77e4f77e9f35ca90d98a7fa1b65c8c990e2eeb7,2024-11-21T01:43:42.700000 +CVE-2012-4898,0,0,55668e0cc9737b2c16e827cdfeb635e1321618e6e8764e4873151168c02c6f30,2024-11-21T01:43:42.850000 +CVE-2012-4899,0,0,4dc2b4c687c41e9e11e140e07d0b0d790ee8b7db1efc696795a9dbd2c56fa1f6,2024-11-21T01:43:42.963000 CVE-2012-4900,0,0,f1573b5a466a7cc03846c8bf22735630b52c3a59578f3dff6a8273a568190bb7,2020-01-27T17:51:42.757000 CVE-2012-4901,0,0,679daec26d17287a55849ec8f24a32e54c333060a0cb3d1ecae855b022df24bd,2017-10-05T01:29:02.353000 CVE-2012-4902,0,0,3aedd20615eb0bb7e0ea29515273fc8b29846a05532814909895b200334824fd,2017-10-05T01:29:02.400000 -CVE-2012-4903,0,1,c57fad92fca089fc2e81c50f798d85516b074c87095b9540f7bb03ed61226fe7,2024-11-21T01:43:43.557000 -CVE-2012-4904,0,1,fd912c3ab36dc3d3ed971601e92e39366499fe6c656d9d99134c6829ec5b0575,2024-11-21T01:43:43.693000 -CVE-2012-4905,0,1,6156730313528776806499b8ad5d397205685c246a00a97b78b8bb10e3ee72d2,2024-11-21T01:43:43.830000 -CVE-2012-4906,0,1,b34e50e8442757bf52b5436c55d0c9d0a1409b83eeccc18722bb935769de43de,2024-11-21T01:43:43.970000 -CVE-2012-4907,0,1,03cf9774af1497e11ffd3a35bb16e8548693c41df9cc6018e1cdfa164ec97dff,2024-11-21T01:43:44.100000 -CVE-2012-4908,0,1,5f5c93c9793a82cdb95d46623f68bbae472408e13aa5e21df1c1582a072f247f,2024-11-21T01:43:44.243000 -CVE-2012-4909,0,1,0e4cbbfa96ae4b237812185ffbac32e9161fbe44a055aaf8db90b04be08435bc,2024-11-21T01:43:44.380000 +CVE-2012-4903,0,0,c57fad92fca089fc2e81c50f798d85516b074c87095b9540f7bb03ed61226fe7,2024-11-21T01:43:43.557000 +CVE-2012-4904,0,0,fd912c3ab36dc3d3ed971601e92e39366499fe6c656d9d99134c6829ec5b0575,2024-11-21T01:43:43.693000 +CVE-2012-4905,0,0,6156730313528776806499b8ad5d397205685c246a00a97b78b8bb10e3ee72d2,2024-11-21T01:43:43.830000 +CVE-2012-4906,0,0,b34e50e8442757bf52b5436c55d0c9d0a1409b83eeccc18722bb935769de43de,2024-11-21T01:43:43.970000 +CVE-2012-4907,0,0,03cf9774af1497e11ffd3a35bb16e8548693c41df9cc6018e1cdfa164ec97dff,2024-11-21T01:43:44.100000 +CVE-2012-4908,0,0,5f5c93c9793a82cdb95d46623f68bbae472408e13aa5e21df1c1582a072f247f,2024-11-21T01:43:44.243000 +CVE-2012-4909,0,0,0e4cbbfa96ae4b237812185ffbac32e9161fbe44a055aaf8db90b04be08435bc,2024-11-21T01:43:44.380000 CVE-2012-4910,0,0,3f4c18dcffd8ed06f82880c7d889ed2d2bdc942b8c3dd3af455edf7c0270666a,2023-11-07T02:12:06.023000 CVE-2012-4911,0,0,f0977879154dd3dce9ec3bc8cf5241dce2fb3631100af32dd49d39ae919fa1d3,2023-11-07T02:12:06.253000 -CVE-2012-4912,0,1,e8070ae3e8823cccccc15d2a9b85732b97d27baaac3275ca1cda527718b34a87,2024-11-21T01:43:44.550000 -CVE-2012-4914,0,1,934cf4b39140061f266b8c22a99cc4a6a4472b96aad5886c7a200bbb921e4eb1,2024-11-21T01:43:44.660000 +CVE-2012-4912,0,0,e8070ae3e8823cccccc15d2a9b85732b97d27baaac3275ca1cda527718b34a87,2024-11-21T01:43:44.550000 +CVE-2012-4914,0,0,934cf4b39140061f266b8c22a99cc4a6a4472b96aad5886c7a200bbb921e4eb1,2024-11-21T01:43:44.660000 CVE-2012-4915,0,0,63ac46cb73432da7eab4fcc1f9cbe7eb0f1da2a2c178dc9bb37b14b94ea93caf,2017-08-29T01:32:25.227000 -CVE-2012-4917,0,1,315c8f9f82fb1c3fa394a5145e47a783a425d65a6dced6d8bd95d62c75408131,2024-11-21T01:43:44.867000 -CVE-2012-4918,0,1,90abbc319e4b08d4f0d22d9749b94add39e335756a20fdffad783fb24920c01a,2024-11-21T01:43:44.973000 +CVE-2012-4917,0,0,315c8f9f82fb1c3fa394a5145e47a783a425d65a6dced6d8bd95d62c75408131,2024-11-21T01:43:44.867000 +CVE-2012-4918,0,0,90abbc319e4b08d4f0d22d9749b94add39e335756a20fdffad783fb24920c01a,2024-11-21T01:43:44.973000 CVE-2012-4919,0,0,23541cbd276f1116058d9a9b26fa9f4e379c15b17609b34785149f57b3ebbdff,2020-01-24T21:09:24.607000 -CVE-2012-4920,0,1,8b2c81e23131e8e66c30ec249866a94040de5863848d761ca5d8e6cada58d0cc,2024-11-21T01:43:45.180000 -CVE-2012-4921,0,1,4909ece778700a56a5eb282d28c1b0e841603416a7aac7dbd34e05be2c700379,2024-11-21T01:43:45.290000 -CVE-2012-4922,0,1,56a303515a99bb3b67b98918cd34cb5b5ef02774a222ef60f232192585957534,2024-11-21T01:43:45.397000 -CVE-2012-4923,0,1,06e84c60df236bf8741da66746d6028adcbd324542ede7545078ea35c3a9b34e,2024-11-21T01:43:45.560000 -CVE-2012-4924,0,1,e34b2e5512dee2ba87e5c472de02b2c61e08aae2a0817bcf7447ff84310d1c14,2024-11-21T01:43:45.697000 -CVE-2012-4925,0,1,899336c6bda837f1c9ae7c438c90826d64658373252eb0c4e4f0d3cc9fb86eed,2024-11-21T01:43:45.843000 -CVE-2012-4926,0,1,8f7a74159d7d832a6ecd8681d805ae0bcb5de2b9cf7c7338204ef1bfffe3fcf8,2024-11-21T01:43:45.993000 -CVE-2012-4927,0,1,35045862f78e41e302b262641742d8d639a14cb8476cb8cb6f916432eb48b81e,2024-11-21T01:43:46.123000 -CVE-2012-4928,0,1,e692469bf5e5c4230be8e062ab12b91e313015c9dafa3514a573e0448aa34ee7,2024-11-21T01:43:46.267000 -CVE-2012-4929,0,1,36d0cb8c0cb325995873a8803b6aea1f11ad31c2fa8e961adb2b9e19d9da427c,2024-11-21T01:43:46.407000 -CVE-2012-4930,0,1,2d7dd821180f88e539220ca6341f85ddddfd8318a054063de986b51059056629,2024-11-21T01:43:46.573000 -CVE-2012-4932,0,1,8e7953b00f268003586a0e643759d9e3311b897bf61d5c7675e0d70d3a3b77a2,2024-11-21T01:43:46.720000 -CVE-2012-4933,0,1,0f0133b9b5db8824221bbbcbb8187d5e1825570ad026066f44066e5bf0366235,2024-11-21T01:43:46.847000 -CVE-2012-4934,0,1,8b5fd9f802aacdac061805eb6b9302d5e22e985f162d00d2e285883e9d6e7950,2024-11-21T01:43:46.940000 -CVE-2012-4935,0,1,8fdcd91a1b38a5ee528a72423e08bb0a34a1044c191f9f19632f17036775697f,2024-11-21T01:43:47.047000 -CVE-2012-4936,0,1,a13c14ecc497808796d258f3d1fe95264666cfdcb4d98c2cd42f856e73b15da7,2024-11-21T01:43:47.147000 -CVE-2012-4937,0,1,440404d077b55ea074961387d15af1c808fa768992e3bf53f8450da47efef626,2024-11-21T01:43:47.250000 -CVE-2012-4938,0,1,219f3c9b87687f6cc38aff044d333d313b0ce8a711cdf1e5a89adaaf81a77090,2024-11-21T01:43:47.360000 -CVE-2012-4939,0,1,996a29c7e336aaba409cad4c1eacddff17cb424821e2f0d8ed00cf5b96f9a8a1,2024-11-21T01:43:47.460000 -CVE-2012-4940,0,1,7b08f211e676ed426c433c8e096009810f1f99b02d71ce0e9e8553f23c0f9e4e,2024-11-21T01:43:47.570000 -CVE-2012-4941,0,1,94930be8863f259d50f36a33cddaf180b1c0bb4d8cbaf699c98d769277f033df,2024-11-21T01:43:47.673000 -CVE-2012-4942,0,1,70a68d78353a8ea90f51c45ab148eb6cff8c1bcf29e8e3d7bdaff7ea0c204315,2024-11-21T01:43:47.770000 -CVE-2012-4943,0,1,f646e4a12b2fef5683815e613ea42129c8ca48ae18be665284264100dac23667,2024-11-21T01:43:47.867000 -CVE-2012-4944,0,1,7fb7024d5cc52dbbdedc72b515887ebaf7fd68edbdac1aab8e1c06ea08ef5369,2024-11-21T01:43:47.967000 -CVE-2012-4945,0,1,ab4944d3c9eff0b68f814278ad3d34bd2aba79bdd6f9cb14fbe8df3d5a2f06f0,2024-11-21T01:43:48.070000 -CVE-2012-4946,0,1,6f19e93459af2b2c54bbbd05880c51268cbea8a86d2bb0e34f6ea44ca1d0de31,2024-11-21T01:43:48.163000 -CVE-2012-4947,0,1,002b03383eb48671594a863956956849298d1e55d337badd4e04c22db0130357,2024-11-21T01:43:48.267000 -CVE-2012-4948,0,1,2a1bad78b56a784afddc14983025a2601fce42513e9b494c35f8080a6cec08d9,2024-11-21T01:43:48.363000 -CVE-2012-4949,0,1,332c4765744d5160781bbce09bdea8abaeca0e642afbbd034b5ab7239d118869,2024-11-21T01:43:48.467000 -CVE-2012-4950,0,1,edc14f4fa5be79ad00e620801549bf2ba5748c0c36b0dc67e3cc76c23dbbe772,2024-11-21T01:43:48.580000 -CVE-2012-4951,0,1,ba8a697dee29eb32630b0a5b8f7eee325c16bd755c7e076eb36affccf01b049e,2024-11-21T01:43:48.680000 -CVE-2012-4952,0,1,ef76bf7bec5ad2b5039e4fe41cbf70bf537a5a099875f216722575b5458122bc,2024-11-21T01:43:48.773000 -CVE-2012-4953,0,1,387b4e90f97a6d93b8943a2854bdf9079b13278c2432a5440567b61b497ba5b8,2024-11-21T01:43:48.877000 -CVE-2012-4954,0,1,14ed573fe97680a9b1bc5caaeb58d984b5e90267447449232e359cf76104425f,2024-11-21T01:43:48.980000 -CVE-2012-4955,0,1,16c4dce05a3aa315cc222254757da1ee4c63d3bbc78953f25e87ece930a11004,2024-11-21T01:43:49.093000 -CVE-2012-4956,0,1,723b7566444904a6886236df3865a3c9ee1070c3db4f90ffe2c6dca1f78c4acd,2024-11-21T01:43:49.203000 -CVE-2012-4957,0,1,c4c63a72dd49031c19d353114a8375a5192c3b7558d9b5e960a565d534865486,2024-11-21T01:43:49.303000 -CVE-2012-4958,0,1,e748ad300f167bf27a5ac40b8b356009abec19862d2a8762c2b2c125ac08f148,2024-11-21T01:43:49.400000 -CVE-2012-4959,0,1,3a97a2b2839baab669031cbb6dd0ffb98905a6044c1565625ed2f036b8e78a57,2024-11-21T01:43:49.500000 -CVE-2012-4960,0,1,768f29dbd8b5238aeb8de34378febe83f1b7afca8b833fabd2221fb74acaeaad,2024-11-21T01:43:49.593000 -CVE-2012-4964,0,1,56b1b52c825d63dad2f31233a42861d2139a86e21cd4dc775a5b54083c6c1068,2024-11-21T01:43:49.710000 +CVE-2012-4920,0,0,8b2c81e23131e8e66c30ec249866a94040de5863848d761ca5d8e6cada58d0cc,2024-11-21T01:43:45.180000 +CVE-2012-4921,0,0,4909ece778700a56a5eb282d28c1b0e841603416a7aac7dbd34e05be2c700379,2024-11-21T01:43:45.290000 +CVE-2012-4922,0,0,56a303515a99bb3b67b98918cd34cb5b5ef02774a222ef60f232192585957534,2024-11-21T01:43:45.397000 +CVE-2012-4923,0,0,06e84c60df236bf8741da66746d6028adcbd324542ede7545078ea35c3a9b34e,2024-11-21T01:43:45.560000 +CVE-2012-4924,0,0,e34b2e5512dee2ba87e5c472de02b2c61e08aae2a0817bcf7447ff84310d1c14,2024-11-21T01:43:45.697000 +CVE-2012-4925,0,0,899336c6bda837f1c9ae7c438c90826d64658373252eb0c4e4f0d3cc9fb86eed,2024-11-21T01:43:45.843000 +CVE-2012-4926,0,0,8f7a74159d7d832a6ecd8681d805ae0bcb5de2b9cf7c7338204ef1bfffe3fcf8,2024-11-21T01:43:45.993000 +CVE-2012-4927,0,0,35045862f78e41e302b262641742d8d639a14cb8476cb8cb6f916432eb48b81e,2024-11-21T01:43:46.123000 +CVE-2012-4928,0,0,e692469bf5e5c4230be8e062ab12b91e313015c9dafa3514a573e0448aa34ee7,2024-11-21T01:43:46.267000 +CVE-2012-4929,0,0,36d0cb8c0cb325995873a8803b6aea1f11ad31c2fa8e961adb2b9e19d9da427c,2024-11-21T01:43:46.407000 +CVE-2012-4930,0,0,2d7dd821180f88e539220ca6341f85ddddfd8318a054063de986b51059056629,2024-11-21T01:43:46.573000 +CVE-2012-4932,0,0,8e7953b00f268003586a0e643759d9e3311b897bf61d5c7675e0d70d3a3b77a2,2024-11-21T01:43:46.720000 +CVE-2012-4933,0,0,0f0133b9b5db8824221bbbcbb8187d5e1825570ad026066f44066e5bf0366235,2024-11-21T01:43:46.847000 +CVE-2012-4934,0,0,8b5fd9f802aacdac061805eb6b9302d5e22e985f162d00d2e285883e9d6e7950,2024-11-21T01:43:46.940000 +CVE-2012-4935,0,0,8fdcd91a1b38a5ee528a72423e08bb0a34a1044c191f9f19632f17036775697f,2024-11-21T01:43:47.047000 +CVE-2012-4936,0,0,a13c14ecc497808796d258f3d1fe95264666cfdcb4d98c2cd42f856e73b15da7,2024-11-21T01:43:47.147000 +CVE-2012-4937,0,0,440404d077b55ea074961387d15af1c808fa768992e3bf53f8450da47efef626,2024-11-21T01:43:47.250000 +CVE-2012-4938,0,0,219f3c9b87687f6cc38aff044d333d313b0ce8a711cdf1e5a89adaaf81a77090,2024-11-21T01:43:47.360000 +CVE-2012-4939,0,0,996a29c7e336aaba409cad4c1eacddff17cb424821e2f0d8ed00cf5b96f9a8a1,2024-11-21T01:43:47.460000 +CVE-2012-4940,0,0,7b08f211e676ed426c433c8e096009810f1f99b02d71ce0e9e8553f23c0f9e4e,2024-11-21T01:43:47.570000 +CVE-2012-4941,0,0,94930be8863f259d50f36a33cddaf180b1c0bb4d8cbaf699c98d769277f033df,2024-11-21T01:43:47.673000 +CVE-2012-4942,0,0,70a68d78353a8ea90f51c45ab148eb6cff8c1bcf29e8e3d7bdaff7ea0c204315,2024-11-21T01:43:47.770000 +CVE-2012-4943,0,0,f646e4a12b2fef5683815e613ea42129c8ca48ae18be665284264100dac23667,2024-11-21T01:43:47.867000 +CVE-2012-4944,0,0,7fb7024d5cc52dbbdedc72b515887ebaf7fd68edbdac1aab8e1c06ea08ef5369,2024-11-21T01:43:47.967000 +CVE-2012-4945,0,0,ab4944d3c9eff0b68f814278ad3d34bd2aba79bdd6f9cb14fbe8df3d5a2f06f0,2024-11-21T01:43:48.070000 +CVE-2012-4946,0,0,6f19e93459af2b2c54bbbd05880c51268cbea8a86d2bb0e34f6ea44ca1d0de31,2024-11-21T01:43:48.163000 +CVE-2012-4947,0,0,002b03383eb48671594a863956956849298d1e55d337badd4e04c22db0130357,2024-11-21T01:43:48.267000 +CVE-2012-4948,0,0,2a1bad78b56a784afddc14983025a2601fce42513e9b494c35f8080a6cec08d9,2024-11-21T01:43:48.363000 +CVE-2012-4949,0,0,332c4765744d5160781bbce09bdea8abaeca0e642afbbd034b5ab7239d118869,2024-11-21T01:43:48.467000 +CVE-2012-4950,0,0,edc14f4fa5be79ad00e620801549bf2ba5748c0c36b0dc67e3cc76c23dbbe772,2024-11-21T01:43:48.580000 +CVE-2012-4951,0,0,ba8a697dee29eb32630b0a5b8f7eee325c16bd755c7e076eb36affccf01b049e,2024-11-21T01:43:48.680000 +CVE-2012-4952,0,0,ef76bf7bec5ad2b5039e4fe41cbf70bf537a5a099875f216722575b5458122bc,2024-11-21T01:43:48.773000 +CVE-2012-4953,0,0,387b4e90f97a6d93b8943a2854bdf9079b13278c2432a5440567b61b497ba5b8,2024-11-21T01:43:48.877000 +CVE-2012-4954,0,0,14ed573fe97680a9b1bc5caaeb58d984b5e90267447449232e359cf76104425f,2024-11-21T01:43:48.980000 +CVE-2012-4955,0,0,16c4dce05a3aa315cc222254757da1ee4c63d3bbc78953f25e87ece930a11004,2024-11-21T01:43:49.093000 +CVE-2012-4956,0,0,723b7566444904a6886236df3865a3c9ee1070c3db4f90ffe2c6dca1f78c4acd,2024-11-21T01:43:49.203000 +CVE-2012-4957,0,0,c4c63a72dd49031c19d353114a8375a5192c3b7558d9b5e960a565d534865486,2024-11-21T01:43:49.303000 +CVE-2012-4958,0,0,e748ad300f167bf27a5ac40b8b356009abec19862d2a8762c2b2c125ac08f148,2024-11-21T01:43:49.400000 +CVE-2012-4959,0,0,3a97a2b2839baab669031cbb6dd0ffb98905a6044c1565625ed2f036b8e78a57,2024-11-21T01:43:49.500000 +CVE-2012-4960,0,0,768f29dbd8b5238aeb8de34378febe83f1b7afca8b833fabd2221fb74acaeaad,2024-11-21T01:43:49.593000 +CVE-2012-4964,0,0,56b1b52c825d63dad2f31233a42861d2139a86e21cd4dc775a5b54083c6c1068,2024-11-21T01:43:49.710000 CVE-2012-4965,0,0,36d7f9e37b0b33c899dfd4a1b7b9b454168a067603dafdb0868a64ecd2c10e1b,2023-11-07T02:12:06.817000 CVE-2012-4966,0,0,88c54e7fd6512221959050752515a896b780d5e49ee846e17c321703a4957268,2023-11-07T02:12:07.050000 CVE-2012-4967,0,0,79a7781b10bf06e09fb002682997c1033f95c225dfc701bc5274101d3fceb8c3,2023-11-07T02:12:07.267000 -CVE-2012-4968,0,1,d9831b4d35e7390abf9ee4a68924d7a3648686c88b335010c81221982f15b18a,2024-11-21T01:43:49.847000 -CVE-2012-4969,0,1,46e23651da1172a8bb6a80b100717b7e5514f140c12d98256b5ea584834971a3,2024-11-21T01:43:49.980000 -CVE-2012-4970,0,1,8a9c558ade8bdd36b01ce3d3a0f77b1e3b1971d1931b1f0d350762d443e0cc76,2024-11-21T01:43:50.137000 -CVE-2012-4971,0,1,b64a394d2461e0019ba8d95b94b4ac9d8094588bc2547519d4e01aaf375e0ed5,2024-11-21T01:43:50.280000 -CVE-2012-4972,0,1,7a0132e3c8dc512c285352d43d41259651b883470836c12d5734d5b13d496dc7,2024-11-21T01:43:50.410000 -CVE-2012-4974,0,1,39f2ebdb2927d7dbdbda130f3622dedaf8aeb2d7d55a1ef805dac613fa3777dc,2024-11-21T01:43:50.540000 -CVE-2012-4975,0,1,2e0679fb85aa56a73bdba1d8d59e38edd8537c7d2a4ac1450fbcd678cab00717,2024-11-21T01:43:50.660000 -CVE-2012-4976,0,1,2a0cba9e53f2a2ade968d80145c37f1f9eb53ea8960912ca80482e439d31b05f,2024-11-21T01:43:50.783000 -CVE-2012-4977,0,1,42ae7d7f204283a3b6a1a521526219c191faa06b63cfae0040fb8fc65e7fb092,2024-11-21T01:43:50.907000 +CVE-2012-4968,0,0,d9831b4d35e7390abf9ee4a68924d7a3648686c88b335010c81221982f15b18a,2024-11-21T01:43:49.847000 +CVE-2012-4969,0,0,46e23651da1172a8bb6a80b100717b7e5514f140c12d98256b5ea584834971a3,2024-11-21T01:43:49.980000 +CVE-2012-4970,0,0,8a9c558ade8bdd36b01ce3d3a0f77b1e3b1971d1931b1f0d350762d443e0cc76,2024-11-21T01:43:50.137000 +CVE-2012-4971,0,0,b64a394d2461e0019ba8d95b94b4ac9d8094588bc2547519d4e01aaf375e0ed5,2024-11-21T01:43:50.280000 +CVE-2012-4972,0,0,7a0132e3c8dc512c285352d43d41259651b883470836c12d5734d5b13d496dc7,2024-11-21T01:43:50.410000 +CVE-2012-4974,0,0,39f2ebdb2927d7dbdbda130f3622dedaf8aeb2d7d55a1ef805dac613fa3777dc,2024-11-21T01:43:50.540000 +CVE-2012-4975,0,0,2e0679fb85aa56a73bdba1d8d59e38edd8537c7d2a4ac1450fbcd678cab00717,2024-11-21T01:43:50.660000 +CVE-2012-4976,0,0,2a0cba9e53f2a2ade968d80145c37f1f9eb53ea8960912ca80482e439d31b05f,2024-11-21T01:43:50.783000 +CVE-2012-4977,0,0,42ae7d7f204283a3b6a1a521526219c191faa06b63cfae0040fb8fc65e7fb092,2024-11-21T01:43:50.907000 CVE-2012-4980,0,0,ca36d1c6cb9e643b484bb62d91f123cb4fc7bfa6673297033a25924d4f56b19a,2019-12-30T15:39:38.867000 CVE-2012-4981,0,0,8834eaa2e79d1aacbf8909dabb4c39a24961df360fba85b172df352e42968cc7,2020-01-30T14:33:21.323000 -CVE-2012-4982,0,1,dca34eeab7ce68e25d889db3c8dcc056507d8901af6b0df388b771dc0cd59c55,2024-11-21T01:43:51.353000 -CVE-2012-4983,0,1,d340bc7da3bd9d1708a7ce761aedabb460d7fb7fb50dab4cf5faba802789fb5d,2024-11-21T01:43:51.480000 -CVE-2012-4985,0,1,aa9cc4d22d2c13d99e872babc55879bcfd7e029879fbd5cd9f6c6e43a569ccd6,2024-11-21T01:43:51.610000 -CVE-2012-4987,0,1,fea71b49e561e8a9db49d38eb1c884548e180629bd90536f3a229695649f363b,2024-11-21T01:43:51.750000 +CVE-2012-4982,0,0,dca34eeab7ce68e25d889db3c8dcc056507d8901af6b0df388b771dc0cd59c55,2024-11-21T01:43:51.353000 +CVE-2012-4983,0,0,d340bc7da3bd9d1708a7ce761aedabb460d7fb7fb50dab4cf5faba802789fb5d,2024-11-21T01:43:51.480000 +CVE-2012-4985,0,0,aa9cc4d22d2c13d99e872babc55879bcfd7e029879fbd5cd9f6c6e43a569ccd6,2024-11-21T01:43:51.610000 +CVE-2012-4987,0,0,fea71b49e561e8a9db49d38eb1c884548e180629bd90536f3a229695649f363b,2024-11-21T01:43:51.750000 CVE-2012-4988,0,0,3f124d3af6465628347d14e4413ae32f33629d77aba8cf83f7ab563fee002437,2017-10-05T01:29:02.447000 -CVE-2012-4989,0,1,61100a24d9433aae7e1c841d52a0fa36a32f7bd36ecdeae8801ac538fa77c60c,2024-11-21T01:43:52.040000 -CVE-2012-4990,0,1,27cbc373d1511d1f7a61cfc56db605332d497dee1d74e18f6026f05f8aead81f,2024-11-21T01:43:52.190000 -CVE-2012-4991,0,1,a5b65fe8063cd78d29e85bd9b34476d9ec652d97ba25b306c5a8665fa864c27b,2024-11-21T01:43:52.333000 -CVE-2012-4992,0,1,5c0ed26abbcfb8683e613cb5a3ac3c7f88fed3a3f09b59eeb0bb25dd2239565e,2024-11-21T01:43:52.463000 -CVE-2012-4993,0,1,c93fdf835b39605ca588865028708af89146f41e777d3a6b812d4681e20ff759,2024-11-21T01:43:52.603000 -CVE-2012-4994,0,1,260e84fc6349e0164f3b1b9c5cdb07f05bbd5305c8348aa9b04af4ac47fc75e4,2024-11-21T01:43:52.737000 -CVE-2012-4995,0,1,daa59c07246b9d74857274a07668314edb78b31fefaf7bad0d7b3995ad722115,2024-11-21T01:43:52.877000 -CVE-2012-4996,0,1,3c2df607b96b8c8b86046df73aa59f9697d54cd86d983411316f0c88e341c762,2024-11-21T01:43:53.013000 -CVE-2012-4997,0,1,7a359db250e45d9d5635a582ee87c9af2cd2b5a4edd72a2c695415fe7d14d9da,2024-11-21T01:43:53.160000 -CVE-2012-4998,0,1,91b34cadb9c3f62e36e2fc547a52e4b6cdd215a8fbcc3e79ff433dff6286d748,2024-11-21T01:43:53.293000 -CVE-2012-4999,0,1,fa885fe37dfd7d94d24f764b24acb9f0ab475a795efd542c3239275b63517c87,2024-11-21T01:43:53.430000 -CVE-2012-5000,0,1,901622300e3440c2a5e914c83b309c727be6a055efaffcfc81dd57eee1a91ee7,2024-11-21T01:43:53.553000 -CVE-2012-5001,0,1,a892cf54f24d9ee1dd0bda0e8c9d28e5f554d85ac92fe5aa15b41df74a1dd854,2024-11-21T01:43:53.703000 -CVE-2012-5002,0,1,c87627d231233983fb05eeccb8e20c544fb16cb0d2b1016a58bfb5988d5d73a4,2024-11-21T01:43:53.843000 -CVE-2012-5003,0,1,614ca4c864e6cdd6fee985b4f8f8a305c8d01a17f55b34b8caeda34368c36ba2,2024-11-21T01:43:53.983000 -CVE-2012-5004,0,1,993c855b1d27005729377f2ea89db422f457fa13aee4fca6ac53c893ffcd88b1,2024-11-21T01:43:54.120000 -CVE-2012-5005,0,1,20980b4b0e7c4a37d6a845fe034d3bc97936a193dad91f14bd5c7641ac492d8a,2024-11-21T01:43:54.260000 -CVE-2012-5006,0,1,e614b6d182cc0c8b0c80c11fad2d649d6fdfd33476332e099e24eb902086f592,2024-11-21T01:43:54.397000 -CVE-2012-5007,0,1,47b70073ab48442433893244a8131b2606926caa1a3bc4858a27038bc9a37805,2024-11-21T01:43:54.550000 +CVE-2012-4989,0,0,61100a24d9433aae7e1c841d52a0fa36a32f7bd36ecdeae8801ac538fa77c60c,2024-11-21T01:43:52.040000 +CVE-2012-4990,0,0,27cbc373d1511d1f7a61cfc56db605332d497dee1d74e18f6026f05f8aead81f,2024-11-21T01:43:52.190000 +CVE-2012-4991,0,0,a5b65fe8063cd78d29e85bd9b34476d9ec652d97ba25b306c5a8665fa864c27b,2024-11-21T01:43:52.333000 +CVE-2012-4992,0,0,5c0ed26abbcfb8683e613cb5a3ac3c7f88fed3a3f09b59eeb0bb25dd2239565e,2024-11-21T01:43:52.463000 +CVE-2012-4993,0,0,c93fdf835b39605ca588865028708af89146f41e777d3a6b812d4681e20ff759,2024-11-21T01:43:52.603000 +CVE-2012-4994,0,0,260e84fc6349e0164f3b1b9c5cdb07f05bbd5305c8348aa9b04af4ac47fc75e4,2024-11-21T01:43:52.737000 +CVE-2012-4995,0,0,daa59c07246b9d74857274a07668314edb78b31fefaf7bad0d7b3995ad722115,2024-11-21T01:43:52.877000 +CVE-2012-4996,0,0,3c2df607b96b8c8b86046df73aa59f9697d54cd86d983411316f0c88e341c762,2024-11-21T01:43:53.013000 +CVE-2012-4997,0,0,7a359db250e45d9d5635a582ee87c9af2cd2b5a4edd72a2c695415fe7d14d9da,2024-11-21T01:43:53.160000 +CVE-2012-4998,0,0,91b34cadb9c3f62e36e2fc547a52e4b6cdd215a8fbcc3e79ff433dff6286d748,2024-11-21T01:43:53.293000 +CVE-2012-4999,0,0,fa885fe37dfd7d94d24f764b24acb9f0ab475a795efd542c3239275b63517c87,2024-11-21T01:43:53.430000 +CVE-2012-5000,0,0,901622300e3440c2a5e914c83b309c727be6a055efaffcfc81dd57eee1a91ee7,2024-11-21T01:43:53.553000 +CVE-2012-5001,0,0,a892cf54f24d9ee1dd0bda0e8c9d28e5f554d85ac92fe5aa15b41df74a1dd854,2024-11-21T01:43:53.703000 +CVE-2012-5002,0,0,c87627d231233983fb05eeccb8e20c544fb16cb0d2b1016a58bfb5988d5d73a4,2024-11-21T01:43:53.843000 +CVE-2012-5003,0,0,614ca4c864e6cdd6fee985b4f8f8a305c8d01a17f55b34b8caeda34368c36ba2,2024-11-21T01:43:53.983000 +CVE-2012-5004,0,0,993c855b1d27005729377f2ea89db422f457fa13aee4fca6ac53c893ffcd88b1,2024-11-21T01:43:54.120000 +CVE-2012-5005,0,0,20980b4b0e7c4a37d6a845fe034d3bc97936a193dad91f14bd5c7641ac492d8a,2024-11-21T01:43:54.260000 +CVE-2012-5006,0,0,e614b6d182cc0c8b0c80c11fad2d649d6fdfd33476332e099e24eb902086f592,2024-11-21T01:43:54.397000 +CVE-2012-5007,0,0,47b70073ab48442433893244a8131b2606926caa1a3bc4858a27038bc9a37805,2024-11-21T01:43:54.550000 CVE-2012-5010,0,0,d75b338b4fd176d756786ff090273c9c8595658727a11bfc7e809749375fdb7e,2023-08-11T19:03:30.373000 -CVE-2012-5014,0,1,47ec351d11b415319be5525f748ffda3dbefcafbebe7985a934fe85df1fa284a,2024-11-21T01:43:54.837000 -CVE-2012-5017,0,1,a70277e81b67459c7bfb043a8849921377c06649f078ced12ac18e694f5a2848,2024-11-21T01:43:54.940000 +CVE-2012-5014,0,0,47ec351d11b415319be5525f748ffda3dbefcafbebe7985a934fe85df1fa284a,2024-11-21T01:43:54.837000 +CVE-2012-5017,0,0,a70277e81b67459c7bfb043a8849921377c06649f078ced12ac18e694f5a2848,2024-11-21T01:43:54.940000 CVE-2012-5030,0,0,9962741b4bb50c453b39db42a716a7a48691baf26586dc04ba5c919919bdcc4b,2017-08-04T16:04:32.653000 -CVE-2012-5032,0,1,e9bb01a525cfd5f8f6de39d8add9cd442d229a66de628e81f954f1b96036603a,2024-11-21T01:43:55.157000 -CVE-2012-5036,0,1,4712902191244dea593e4571631b5e337cfa5c4c4df1df8d6f4d57462dadb529,2024-11-21T01:43:55.263000 -CVE-2012-5037,0,1,9da399cb75d61a440208f3dc6c1df9ec73079b109be95cd0ebee056329472ff9,2024-11-21T01:43:55.370000 -CVE-2012-5039,0,1,e4a5172e81a7350d88f6ef8d1a6c43bd69b616bdb30d5bca4cad3fb57f4f6b13,2024-11-21T01:43:55.470000 -CVE-2012-5044,0,1,fa5793b01ddec477019328b294a058e50a22481698dcd73c6771c267eb0c0d61,2024-11-21T01:43:55.573000 -CVE-2012-5048,0,1,36b5eeef71a0775bcb45bab6ebdba6d09e98e4c74124967d42256b46bf947177,2024-11-21T01:43:55.680000 -CVE-2012-5049,0,1,862263304b0156236fa774aa5642c377efe3132896ba0615f0dbbd808d89f592,2024-11-21T01:43:55.827000 -CVE-2012-5050,0,1,17aaa8ef71795c8c06570eb13aa64735bcad5e7fb8160fee60f19b57ec8e3984,2024-11-21T01:43:55.963000 -CVE-2012-5051,0,1,85d86b1ab6b42866f102db36cba24ad0939fba54e653969d79956766e5a85ad2,2024-11-21T01:43:56.110000 -CVE-2012-5053,0,1,55d63c666e622e185ff6b6a071b9af6eae917ee41d8f58ad6c4103c54a514623,2024-11-21T01:43:56.247000 -CVE-2012-5054,0,1,bfe37b8726a9f5186c7432e8b351ccd88842e1a79a33f250facbc62d25485510,2024-11-21T01:43:56.397000 -CVE-2012-5055,0,1,b9d371a86c0b48e907356684155bc7b9954a737ccbf81118fc9d35fbcdd77c09,2024-11-21T01:43:56.507000 +CVE-2012-5032,0,0,e9bb01a525cfd5f8f6de39d8add9cd442d229a66de628e81f954f1b96036603a,2024-11-21T01:43:55.157000 +CVE-2012-5036,0,0,4712902191244dea593e4571631b5e337cfa5c4c4df1df8d6f4d57462dadb529,2024-11-21T01:43:55.263000 +CVE-2012-5037,0,0,9da399cb75d61a440208f3dc6c1df9ec73079b109be95cd0ebee056329472ff9,2024-11-21T01:43:55.370000 +CVE-2012-5039,0,0,e4a5172e81a7350d88f6ef8d1a6c43bd69b616bdb30d5bca4cad3fb57f4f6b13,2024-11-21T01:43:55.470000 +CVE-2012-5044,0,0,fa5793b01ddec477019328b294a058e50a22481698dcd73c6771c267eb0c0d61,2024-11-21T01:43:55.573000 +CVE-2012-5048,0,0,36b5eeef71a0775bcb45bab6ebdba6d09e98e4c74124967d42256b46bf947177,2024-11-21T01:43:55.680000 +CVE-2012-5049,0,0,862263304b0156236fa774aa5642c377efe3132896ba0615f0dbbd808d89f592,2024-11-21T01:43:55.827000 +CVE-2012-5050,0,0,17aaa8ef71795c8c06570eb13aa64735bcad5e7fb8160fee60f19b57ec8e3984,2024-11-21T01:43:55.963000 +CVE-2012-5051,0,0,85d86b1ab6b42866f102db36cba24ad0939fba54e653969d79956766e5a85ad2,2024-11-21T01:43:56.110000 +CVE-2012-5053,0,0,55d63c666e622e185ff6b6a071b9af6eae917ee41d8f58ad6c4103c54a514623,2024-11-21T01:43:56.247000 +CVE-2012-5054,0,0,bfe37b8726a9f5186c7432e8b351ccd88842e1a79a33f250facbc62d25485510,2024-11-21T01:43:56.397000 +CVE-2012-5055,0,0,b9d371a86c0b48e907356684155bc7b9954a737ccbf81118fc9d35fbcdd77c09,2024-11-21T01:43:56.507000 CVE-2012-5056,0,0,3b07855e7b457472fdbfa360e4f8d669d6430a3fa452ea848965d33bee97fc9f,2014-06-04T17:15:23.240000 CVE-2012-5057,0,0,710e51ab082201321489e09d43d340e9512e1df59797994680443c2076b01cef,2014-06-04T17:19:18.147000 -CVE-2012-5058,0,1,bfe87d60582aa4a314b19519675f44cf61006f50cade0c8a0480a88f78c4e615,2024-11-21T01:43:56.920000 -CVE-2012-5059,0,1,b82eccae237aad460510e3c07ea66e9b60a1dae41c9ee35253312c815222a353,2024-11-21T01:43:57.033000 -CVE-2012-5060,0,1,756d890e4f8eabbcd9f03a0128b2991d7f8a94e2a427ec92dcfd322899aff61d,2024-11-21T01:43:57.157000 -CVE-2012-5061,0,1,0562e1960868280eecaf17e6ee2d65d73639d4bf6ba14a3457b16e22951eca86,2024-11-21T01:43:57.293000 -CVE-2012-5062,0,1,1a580a93031b7265a7b64e3c68bda3587b7b5b76371ea5748fac8f9b3915ec12,2024-11-21T01:43:57.403000 -CVE-2012-5063,0,1,af481cedb3fd304719bebe37438a4e87c1326f063d5f9e07da6c26bfff5e0fa0,2024-11-21T01:43:57.507000 -CVE-2012-5064,0,1,f2668c0d21e23e2ec49e5565d263678dd552957f1481c287b610936543c46122,2024-11-21T01:43:57.613000 -CVE-2012-5065,0,1,3278a22b048850cd62767b01a7a73ff4bbf6067656281c70b9bcad4805649e70,2024-11-21T01:43:57.733000 -CVE-2012-5066,0,1,74e57be31bbe33cbf0caee0f647ea4932b2cbbab26557d91605cc1c92497646a,2024-11-21T01:43:57.847000 -CVE-2012-5067,0,1,f6f358db49e5ee73ab2e3422ac0e5985bcb7baf30a20a61e3549fa70aa455182,2024-11-21T01:43:57.960000 -CVE-2012-5068,0,1,015b087a897c3ef4cdeabfc4eeb335bc7fad201ffdabeb23dcab1770032eac25,2024-11-21T01:43:58.077000 -CVE-2012-5069,0,1,b66059b80b5f0195b9dcc0da1def3be16481656ac5b21381b3b685a63ed9f436,2024-11-21T01:43:58.230000 -CVE-2012-5070,0,1,f4517684eb5e3005eeafec3370b7f98bc111d2d8bdd34e912c0d5ac833a1aa8e,2024-11-21T01:43:58.410000 -CVE-2012-5071,0,1,0e65cc2b97dd3390a9930c0a62af19e2050937a6fe4362233fd671fabbcd5daf,2024-11-21T01:43:58.560000 -CVE-2012-5072,0,1,dc585b43616f04d97198b07a84180bf6282b3d1acb82170ea307cd01c3e5fd72,2024-11-21T01:43:58.757000 -CVE-2012-5073,0,1,9849c633101cbbc4490d1cbaf92fa37ef3fd94bdc57607e0b741cec4f538e004,2024-11-21T01:43:58.927000 -CVE-2012-5074,0,1,e34474ca41fab212a016e35b69009f64673d864225395f94bc6fc2326ecbf93b,2024-11-21T01:43:59.100000 -CVE-2012-5075,0,1,a15279f4b9a39faa50329b15e699c7ca92188539a5b8f004e09541941cf68874,2024-11-21T01:43:59.223000 -CVE-2012-5076,0,1,ead0666ec861c8dbc06ef60aae749425e8cfbf8ff3c53ffbd3f7793fb64dec26,2024-11-21T01:43:59.393000 -CVE-2012-5077,0,1,2bb88b1b97fdeb848630bc05f3b903830182350a62f1ca065882b5d5a35c969f,2024-11-21T01:43:59.510000 -CVE-2012-5078,0,1,79edf860db475bb6978ef7583c70f6d14f72fdd1cd09185c7c2d675ee62ae321,2024-11-21T01:43:59.673000 -CVE-2012-5079,0,1,f2a322c21f64bbbd95f7363618ab2c76738e702bbc34761b80c60160c841a5ba,2024-11-21T01:43:59.780000 -CVE-2012-5080,0,1,ef0a24f311ae61fee3f1e6c2a12fb3c09c692dba6af5e171b484f05a8f74311c,2024-11-21T01:43:59.947000 -CVE-2012-5081,0,1,0088d395509d11c4456214135bcbc61a01c0022c7a28babefda7812b359ffb6e,2024-11-21T01:44:00.067000 -CVE-2012-5082,0,1,158020fa0e91b4dbcd9b49ee43ca8162be6a293e62d6b928d2f82ced64f5dd4b,2024-11-21T01:44:00.243000 -CVE-2012-5083,0,1,418a143d3391cef6994fa72775283b56bceac4d9f8cc632bb6d71ed6b0f1477d,2024-11-21T01:44:00.353000 -CVE-2012-5084,0,1,37205a034fe8275188f35a32e42ef7d94b3b54a02f966a8365b9a44ccd085591,2024-11-21T01:44:00.523000 -CVE-2012-5085,0,1,f838b7e35a0b2b298e3301c92a4438438f6764c52ce59b1bf34e061975a2244f,2024-11-21T01:44:00.703000 -CVE-2012-5086,0,1,add71c9edd8e4a4581b8544b1bd993ab603f7d2fb4d9c2952e9c07d323e33877,2024-11-21T01:44:00.867000 -CVE-2012-5087,0,1,7edf4967afa529b46e509fc3b156d7cf6fb4548769498dad78cf41f8828d36f3,2024-11-21T01:44:01.027000 -CVE-2012-5088,0,1,f995b946a8e87d9ff07a7e82caee74c377b4c120b4d4188f8f2a0147c8d6ae61,2024-11-21T01:44:01.170000 -CVE-2012-5089,0,1,881c9bac2d58760927c4c6e77c75d67676068e1b42f3d8abad1807946dcf3a69,2024-11-21T01:44:01.350000 -CVE-2012-5090,0,1,c801be825bf93206baf0d5eeccd9ca0b99ea7141f6651c818ea8ee478bb1c56a,2024-11-21T01:44:01.533000 -CVE-2012-5091,0,1,1a9aec513a6001e23f9a9b1bdc7c4fba80d918c2bc89f99bcbfbaa87a7bd177b,2024-11-21T01:44:01.650000 -CVE-2012-5092,0,1,4f48864ee7b769f82c1c69d963f30334682a955e9528a7d75e9f5302d01a5bb0,2024-11-21T01:44:01.773000 -CVE-2012-5093,0,1,e37bcbd9855734567dc1a8d060f433a77073bf99708d1210140d6c79c0308359,2024-11-21T01:44:01.897000 -CVE-2012-5094,0,1,d7a6148ce132ae964587b369a4e890469bbe0396d49172e588aca842f2cb0b98,2024-11-21T01:44:02.017000 -CVE-2012-5095,0,1,060b927a40e96ffe6b44f768cfc4941b0c164effd3865657892ba88f090c1749,2024-11-21T01:44:02.137000 -CVE-2012-5096,0,1,9fcd4bce948e9e0ea4a96c5ce316080efe9cfaf749588912d1cc769958f2e34f,2024-11-21T01:44:02.260000 -CVE-2012-5097,0,1,11f43c2a394c25f65ee5cf63fa049464e09c1d203c77f53d847065b2a880833c,2024-11-21T01:44:02.413000 -CVE-2012-5098,0,1,bc4e1de23a4de9e668804c6d14e551930ffca0e3c8f1372d44d6845bad66e57a,2024-11-21T01:44:02.540000 -CVE-2012-5099,0,1,db7ae8282f4e8fb58c745551a3a720b706268f5fccdec4e07749e43d197f6715,2024-11-21T01:44:02.687000 -CVE-2012-5100,0,1,8ced062d637596632ec670672d94053b604689dacb5b80b181a9a0dacb63e144,2024-11-21T01:44:02.833000 -CVE-2012-5101,0,1,df823f39dd121cb75336de1bed3f708d4bb01d0c8b420fd21f924d871a21af7b,2024-11-21T01:44:02.980000 -CVE-2012-5102,0,1,9f24fcecbaaaec084c00d71afa9b5f317414deff54da6d07443489abc373283b,2024-11-21T01:44:03.133000 -CVE-2012-5103,0,1,d04d5042e9cb0ec953fe5fe7f1b5dd0ba3e17b3d1ae506731059e1b83deb0843,2024-11-21T01:44:03.283000 -CVE-2012-5104,0,1,626593b3f16b0a9e28e7275491c3c194d48809fe86e2cc7005c901fea61118db,2024-11-21T01:44:03.430000 -CVE-2012-5105,0,1,a40971f3365a77ea24eb6e13f8b8d68955a109f223cd01ceb4b2e2b3b27911a0,2024-11-21T01:44:03.583000 +CVE-2012-5058,0,0,bfe87d60582aa4a314b19519675f44cf61006f50cade0c8a0480a88f78c4e615,2024-11-21T01:43:56.920000 +CVE-2012-5059,0,0,b82eccae237aad460510e3c07ea66e9b60a1dae41c9ee35253312c815222a353,2024-11-21T01:43:57.033000 +CVE-2012-5060,0,0,756d890e4f8eabbcd9f03a0128b2991d7f8a94e2a427ec92dcfd322899aff61d,2024-11-21T01:43:57.157000 +CVE-2012-5061,0,0,0562e1960868280eecaf17e6ee2d65d73639d4bf6ba14a3457b16e22951eca86,2024-11-21T01:43:57.293000 +CVE-2012-5062,0,0,1a580a93031b7265a7b64e3c68bda3587b7b5b76371ea5748fac8f9b3915ec12,2024-11-21T01:43:57.403000 +CVE-2012-5063,0,0,af481cedb3fd304719bebe37438a4e87c1326f063d5f9e07da6c26bfff5e0fa0,2024-11-21T01:43:57.507000 +CVE-2012-5064,0,0,f2668c0d21e23e2ec49e5565d263678dd552957f1481c287b610936543c46122,2024-11-21T01:43:57.613000 +CVE-2012-5065,0,0,3278a22b048850cd62767b01a7a73ff4bbf6067656281c70b9bcad4805649e70,2024-11-21T01:43:57.733000 +CVE-2012-5066,0,0,74e57be31bbe33cbf0caee0f647ea4932b2cbbab26557d91605cc1c92497646a,2024-11-21T01:43:57.847000 +CVE-2012-5067,0,0,f6f358db49e5ee73ab2e3422ac0e5985bcb7baf30a20a61e3549fa70aa455182,2024-11-21T01:43:57.960000 +CVE-2012-5068,0,0,015b087a897c3ef4cdeabfc4eeb335bc7fad201ffdabeb23dcab1770032eac25,2024-11-21T01:43:58.077000 +CVE-2012-5069,0,0,b66059b80b5f0195b9dcc0da1def3be16481656ac5b21381b3b685a63ed9f436,2024-11-21T01:43:58.230000 +CVE-2012-5070,0,0,f4517684eb5e3005eeafec3370b7f98bc111d2d8bdd34e912c0d5ac833a1aa8e,2024-11-21T01:43:58.410000 +CVE-2012-5071,0,0,0e65cc2b97dd3390a9930c0a62af19e2050937a6fe4362233fd671fabbcd5daf,2024-11-21T01:43:58.560000 +CVE-2012-5072,0,0,dc585b43616f04d97198b07a84180bf6282b3d1acb82170ea307cd01c3e5fd72,2024-11-21T01:43:58.757000 +CVE-2012-5073,0,0,9849c633101cbbc4490d1cbaf92fa37ef3fd94bdc57607e0b741cec4f538e004,2024-11-21T01:43:58.927000 +CVE-2012-5074,0,0,e34474ca41fab212a016e35b69009f64673d864225395f94bc6fc2326ecbf93b,2024-11-21T01:43:59.100000 +CVE-2012-5075,0,0,a15279f4b9a39faa50329b15e699c7ca92188539a5b8f004e09541941cf68874,2024-11-21T01:43:59.223000 +CVE-2012-5076,0,0,ead0666ec861c8dbc06ef60aae749425e8cfbf8ff3c53ffbd3f7793fb64dec26,2024-11-21T01:43:59.393000 +CVE-2012-5077,0,0,2bb88b1b97fdeb848630bc05f3b903830182350a62f1ca065882b5d5a35c969f,2024-11-21T01:43:59.510000 +CVE-2012-5078,0,0,79edf860db475bb6978ef7583c70f6d14f72fdd1cd09185c7c2d675ee62ae321,2024-11-21T01:43:59.673000 +CVE-2012-5079,0,0,f2a322c21f64bbbd95f7363618ab2c76738e702bbc34761b80c60160c841a5ba,2024-11-21T01:43:59.780000 +CVE-2012-5080,0,0,ef0a24f311ae61fee3f1e6c2a12fb3c09c692dba6af5e171b484f05a8f74311c,2024-11-21T01:43:59.947000 +CVE-2012-5081,0,0,0088d395509d11c4456214135bcbc61a01c0022c7a28babefda7812b359ffb6e,2024-11-21T01:44:00.067000 +CVE-2012-5082,0,0,158020fa0e91b4dbcd9b49ee43ca8162be6a293e62d6b928d2f82ced64f5dd4b,2024-11-21T01:44:00.243000 +CVE-2012-5083,0,0,418a143d3391cef6994fa72775283b56bceac4d9f8cc632bb6d71ed6b0f1477d,2024-11-21T01:44:00.353000 +CVE-2012-5084,0,0,37205a034fe8275188f35a32e42ef7d94b3b54a02f966a8365b9a44ccd085591,2024-11-21T01:44:00.523000 +CVE-2012-5085,0,0,f838b7e35a0b2b298e3301c92a4438438f6764c52ce59b1bf34e061975a2244f,2024-11-21T01:44:00.703000 +CVE-2012-5086,0,0,add71c9edd8e4a4581b8544b1bd993ab603f7d2fb4d9c2952e9c07d323e33877,2024-11-21T01:44:00.867000 +CVE-2012-5087,0,0,7edf4967afa529b46e509fc3b156d7cf6fb4548769498dad78cf41f8828d36f3,2024-11-21T01:44:01.027000 +CVE-2012-5088,0,0,f995b946a8e87d9ff07a7e82caee74c377b4c120b4d4188f8f2a0147c8d6ae61,2024-11-21T01:44:01.170000 +CVE-2012-5089,0,0,881c9bac2d58760927c4c6e77c75d67676068e1b42f3d8abad1807946dcf3a69,2024-11-21T01:44:01.350000 +CVE-2012-5090,0,0,c801be825bf93206baf0d5eeccd9ca0b99ea7141f6651c818ea8ee478bb1c56a,2024-11-21T01:44:01.533000 +CVE-2012-5091,0,0,1a9aec513a6001e23f9a9b1bdc7c4fba80d918c2bc89f99bcbfbaa87a7bd177b,2024-11-21T01:44:01.650000 +CVE-2012-5092,0,0,4f48864ee7b769f82c1c69d963f30334682a955e9528a7d75e9f5302d01a5bb0,2024-11-21T01:44:01.773000 +CVE-2012-5093,0,0,e37bcbd9855734567dc1a8d060f433a77073bf99708d1210140d6c79c0308359,2024-11-21T01:44:01.897000 +CVE-2012-5094,0,0,d7a6148ce132ae964587b369a4e890469bbe0396d49172e588aca842f2cb0b98,2024-11-21T01:44:02.017000 +CVE-2012-5095,0,0,060b927a40e96ffe6b44f768cfc4941b0c164effd3865657892ba88f090c1749,2024-11-21T01:44:02.137000 +CVE-2012-5096,0,0,9fcd4bce948e9e0ea4a96c5ce316080efe9cfaf749588912d1cc769958f2e34f,2024-11-21T01:44:02.260000 +CVE-2012-5097,0,0,11f43c2a394c25f65ee5cf63fa049464e09c1d203c77f53d847065b2a880833c,2024-11-21T01:44:02.413000 +CVE-2012-5098,0,0,bc4e1de23a4de9e668804c6d14e551930ffca0e3c8f1372d44d6845bad66e57a,2024-11-21T01:44:02.540000 +CVE-2012-5099,0,0,db7ae8282f4e8fb58c745551a3a720b706268f5fccdec4e07749e43d197f6715,2024-11-21T01:44:02.687000 +CVE-2012-5100,0,0,8ced062d637596632ec670672d94053b604689dacb5b80b181a9a0dacb63e144,2024-11-21T01:44:02.833000 +CVE-2012-5101,0,0,df823f39dd121cb75336de1bed3f708d4bb01d0c8b420fd21f924d871a21af7b,2024-11-21T01:44:02.980000 +CVE-2012-5102,0,0,9f24fcecbaaaec084c00d71afa9b5f317414deff54da6d07443489abc373283b,2024-11-21T01:44:03.133000 +CVE-2012-5103,0,0,d04d5042e9cb0ec953fe5fe7f1b5dd0ba3e17b3d1ae506731059e1b83deb0843,2024-11-21T01:44:03.283000 +CVE-2012-5104,0,0,626593b3f16b0a9e28e7275491c3c194d48809fe86e2cc7005c901fea61118db,2024-11-21T01:44:03.430000 +CVE-2012-5105,0,0,a40971f3365a77ea24eb6e13f8b8d68955a109f223cd01ceb4b2e2b3b27911a0,2024-11-21T01:44:03.583000 CVE-2012-5106,0,0,d6c1a0a484a6e0939dcd17cf2a73c2019631313ffc7c821bf60b8e9c2a3ddd4f,2017-08-29T01:32:30.197000 -CVE-2012-5108,0,1,a951ed9d5c4379a084cd4541b0c1fc919ea1954c54d4471d73c7ad7bd27311d5,2024-11-21T01:44:03.877000 -CVE-2012-5109,0,1,1cee07ff1c617597718763e68d51195f1f0e5751f63def7fedf993d7ddb85fc5,2024-11-21T01:44:03.993000 -CVE-2012-5110,0,1,52075c07c3727fff378fbd309e4b550191b159c1728a69d41cf1adb191c2e3a2,2024-11-21T01:44:04.120000 -CVE-2012-5111,0,1,f081711cd342708a7b68f7e9f4e7a1e2e360d98bad84c98b81ec140c6fc95f54,2024-11-21T01:44:04.247000 -CVE-2012-5112,0,1,8e52f9753475965ab9d8c55d563062829d2c3df32d3bf2d5912ea7ab528f5c41,2024-11-21T01:44:04.367000 -CVE-2012-5115,0,1,26d531aeebda604baadaf245f1c3bd6daecfdb83b700a68af8847332ae286b69,2024-11-21T01:44:04.500000 -CVE-2012-5116,0,1,f2dd7104f5aacf3adb70c79c8eb2a5068b9fda17b11866f81b8196989c11b155,2024-11-21T01:44:04.630000 -CVE-2012-5117,0,1,74fd15fbb4158a0758c82badfc77043f878e53c47176a0bcac1475afcc4ca36d,2024-11-21T01:44:04.750000 -CVE-2012-5118,0,1,07b7a3b9ebea583953b8bce4a08094347fdd1c332dc5a777513abd589f3cc695,2024-11-21T01:44:04.867000 -CVE-2012-5119,0,1,40b1229b6cfd72da6c402ca6a7b3da6344743a9b24ba7d1b93bcc799741b3e01,2024-11-21T01:44:04.993000 -CVE-2012-5120,0,1,408f7a83e8eb419e1fd412ce7b7879f240164677dabde12bc8201aadfd51a33d,2024-11-21T01:44:05.120000 -CVE-2012-5121,0,1,5e5935434929e522a9f25dd6c81495ab8d9e703841ff853fb1a8842a6ec30ae1,2024-11-21T01:44:05.263000 -CVE-2012-5122,0,1,db3985d5f6baeadd654facc5763f280d17a747006032bcb7c95ca64ed8b9a13d,2024-11-21T01:44:05.387000 -CVE-2012-5123,0,1,4a44d411c07547d21c5479215f37f59c9b58c026fc6f29d1e37bb0a340070721,2024-11-21T01:44:05.517000 -CVE-2012-5124,0,1,29e23eb8269a6d05f986ce57ad30bd9436340e518073dcc8822ee2b5b7a52f15,2024-11-21T01:44:05.637000 -CVE-2012-5125,0,1,7aa30d66367a909635a03500fad1245265ce65b1f205e828dc514ea5d1af6ded,2024-11-21T01:44:05.753000 -CVE-2012-5126,0,1,12ed9734655e883a862777f4c9adda1a3372d0ae4272a0d83203e8557c146043,2024-11-21T01:44:05.887000 -CVE-2012-5127,0,1,3bd5633c0903d1aed2c516fed2c3441063fe9e5bceb5f9f245096dca8245b7ca,2024-11-21T01:44:06.013000 -CVE-2012-5128,0,1,dc96a7c031c1b55887803b4b0b59d4aa54e2b5b0a3baf923cc463e515c5cda77,2024-11-21T01:44:06.140000 -CVE-2012-5129,0,1,0e247c7dd632b2f2f347810ff4d70ea67e867ec3a43e284bcca90ed17f914f30,2024-11-21T01:44:06.270000 -CVE-2012-5130,0,1,3e11ab81a4d4226c5897a53e9637999ea935064b7be2962ee3e96891e61927bf,2024-11-21T01:44:06.390000 -CVE-2012-5131,0,1,7c950a29f3332bd9a9973cf719f159488818f2989a03e138d1a55cc2ef372e4d,2024-11-21T01:44:06.550000 -CVE-2012-5132,0,1,513d2acbe7729d6421371568bad46be309e2f93ce50fc337a1089ab1d7abd762,2024-11-21T01:44:06.680000 -CVE-2012-5133,0,1,8eb61a8a9356b973341de62047c8715ca5afd011f28231e3f815113c61c18d6e,2024-11-21T01:44:06.810000 -CVE-2012-5134,0,1,ca93a009d0a0ad00c3b620d8d0f68367e94dfb808719a31a9d218fa458e9151e,2024-11-21T01:44:06.940000 -CVE-2012-5135,0,1,ebd6b1bf06c722a8e814a2b9014b078dbefb96392bc15aee24d6da989fe15639,2024-11-21T01:44:07.100000 -CVE-2012-5136,0,1,0b922f39f1d7a6d988befaef480545f9ddc82f5d76f3dffbccd28dd6a99f39bc,2024-11-21T01:44:07.240000 -CVE-2012-5137,0,1,937320f6d35474fecbbea60032fc75c8073d28fa2f15fd5d5de4024704d02b41,2024-11-21T01:44:07.373000 -CVE-2012-5138,0,1,7a751fcab9456cae21bf0abfe754b06d35d5c0807936891b6fe731cca3407fc1,2024-11-21T01:44:07.513000 -CVE-2012-5139,0,1,79cb9e3f37398ddb2203bbd3ced73797c3db88d417b385c49bc202b63afb1e13,2024-11-21T01:44:07.647000 -CVE-2012-5140,0,1,0a7b7c8ffb6bc3af3132cc714c3a499ec1738ecc8f040d458b28d994b12732a9,2024-11-21T01:44:07.780000 -CVE-2012-5141,0,1,090bc059e3ee212f32fb9c572a9745ca8185fdece50abacff2a51e6287ec0168,2024-11-21T01:44:07.913000 -CVE-2012-5142,0,1,4346ef5881885ea07deaf51070e379a404c318bbf427aae9fba06bea4f2b6d20,2024-11-21T01:44:08.040000 -CVE-2012-5143,0,1,1c63fcd4d6e085522454e4265bb7b93f54f5bcce6799971fa5b5cef19a080bf0,2024-11-21T01:44:08.167000 -CVE-2012-5144,0,1,46348b5e13b55835b132f1e3c8e13623a2dc294371e52eaca68367a6febfbd97,2024-11-21T01:44:08.300000 -CVE-2012-5145,0,1,94208fb683c52234bf02ed1fe45b8679e9119b45d8c08c3773dbc9ed97a67cdd,2024-11-21T01:44:08.443000 -CVE-2012-5146,0,1,7004fec85299adf13e07caa64a797817dc2ea3bfc13ba0c04603469dd2361754,2024-11-21T01:44:08.587000 -CVE-2012-5147,0,1,e6d5f3f732a91c3ed665c8eca97597845a13de68473844cc2ad6e425d99b07a3,2024-11-21T01:44:08.720000 -CVE-2012-5148,0,1,7f16c59b7ca260002b4d0dfada7e69589ea1165ea7a5069568e4a9f768400696,2024-11-21T01:44:08.847000 -CVE-2012-5149,0,1,189d684f50fde96046c4d21a96883c23e409812ea2cdd505dc0769d4d8815fbc,2024-11-21T01:44:08.980000 -CVE-2012-5150,0,1,d0b1400cbb909aaf9e779ed173fa6b621a55224ee7240576a180538b23f979a0,2024-11-21T01:44:09.130000 -CVE-2012-5151,0,1,2a360b1751ba57a2067065afff452136512484189364168b6831eb11decdf7a1,2024-11-21T01:44:09.267000 -CVE-2012-5152,0,1,7f55c0b357b746a0ac666b8390d9cfde74a3dca8c78f6e1a04bde8b363de8259,2024-11-21T01:44:09.400000 -CVE-2012-5153,0,1,ad866a76941627bb64ecd28409abd1957a81c412b5f73ab00449abcdaa5a7f8a,2024-11-21T01:44:09.530000 -CVE-2012-5154,0,1,f827bcebc5373470bc79a688e4e87c67696cd83bbdf0de70ed814d4cff7a2cdc,2024-11-21T01:44:09.660000 -CVE-2012-5155,0,1,3f9f4d8b2ec1af00e14429863e6a096412d6690888ba44bf92d2a7049179ae86,2024-11-21T01:44:09.813000 -CVE-2012-5156,0,1,62be26fadb5e23a32f6f71e04416a0608b4b596bf4616007f7b81bea42bac88c,2024-11-21T01:44:09.947000 -CVE-2012-5157,0,1,d4b0f0f2d4f3a8596248e38d5df08d6938ba7805d17082d681581a57584ebed2,2024-11-21T01:44:10.077000 -CVE-2012-5158,0,1,d8f7c5dbba2cece4c6e978878236b92b2bfcadb67af571b43cc4fb032805d91f,2024-11-21T01:44:10.210000 -CVE-2012-5159,0,1,0ec3a010e370ba6f57e04dd36c96bafb3fa09a4f99c2164c894bbe61933b6ece,2024-11-21T01:44:10.360000 -CVE-2012-5161,0,1,7141467d416898ba55b82adea279b2e68d407280197af3a70a667dc6ad1b1285,2024-11-21T01:44:10.503000 -CVE-2012-5162,0,1,e5ae84ca5ef4579f895c957074f585f80c7afb0d2f87245f16ebb4eb0a8ca0f5,2024-11-21T01:44:10.657000 -CVE-2012-5163,0,1,87fd7dded45a9da9efac5542070f5498db92a911ec57cc90c3f0454eb60f58f2,2024-11-21T01:44:10.803000 -CVE-2012-5164,0,1,5643b5f3e883b9e9896225f2e1148ad55b34f1e198378c77441561b3ab5b8e68,2024-11-21T01:44:10.947000 -CVE-2012-5166,0,1,8708ab93cb4f3eb8ec87ec0472afd9e36436c937c051bb9710cc1e604b949f10,2024-11-21T01:44:11.100000 -CVE-2012-5167,0,1,db675a44ba21a6e7b1cc537b8d095d139cf3ba50430944ebc778701e60bcfb7f,2024-11-21T01:44:11.313000 -CVE-2012-5168,0,1,a5bb28ed655e444baa523efe2d186cb55b07a8b2bb9c3033a1d205419802c720,2024-11-21T01:44:11.463000 -CVE-2012-5169,0,1,a027a8939e9ee1d865e8f51d062919c80d56cd4ac784ddffc0daf371f781da9f,2024-11-21T01:44:11.630000 -CVE-2012-5170,0,1,dd0e665b1fe4aa8d54ba4b6075b32615d9edf225c8ba7601f1ce0daf107c8962,2024-11-21T01:44:11.800000 -CVE-2012-5171,0,1,0f3f2b18dac097af15eca72aae525a327c23d288f3eabbc2a3ba8328b599bcce,2024-11-21T01:44:11.923000 -CVE-2012-5172,0,1,5fd3575b61839047be01dc4cb4701f10e5fec13b6ddd115ea342855441e62e4e,2024-11-21T01:44:12.043000 -CVE-2012-5173,0,1,47a5090dc73dc544c80d6f55ab6d173ee6900b80e33b82c1c9a7e780030f5e45,2024-11-21T01:44:12.157000 -CVE-2012-5174,0,1,fa77618dac333d58604dbda54dc938eb404939dc92b33bfb5599d8b317d2ded4,2024-11-21T01:44:12.267000 -CVE-2012-5175,0,1,eaf2a9aeb068c2a92195177c4452b801f9f181f5dc23881c9d40d3a5864d3ea5,2024-11-21T01:44:12.370000 -CVE-2012-5176,0,1,2b1e7dec96bac9d8e186924ea6b54f8a844b9a212c6b10c3b46210fb05c439f9,2024-11-21T01:44:12.473000 -CVE-2012-5177,0,1,773bd5e15fa0d5cd1ea6bf1a017ecd4022b5848745c66b1665a1cf8ae4660364,2024-11-21T01:44:12.577000 -CVE-2012-5178,0,1,2cc564145e4c8d10670bcc6b8829e01218c4bf136cbb59289eac322e5e28f51f,2024-11-21T01:44:12.683000 -CVE-2012-5179,0,1,74a2d6db61366667c79cb41325546b449fadab2a2bfd9b6c5d3eed7c30a2ca84,2024-11-21T01:44:12.787000 -CVE-2012-5180,0,1,9d6fab3f608a54d5640e299d2b55a5f23c6b1bcc25df1583a861a03a431d5c9a,2024-11-21T01:44:12.900000 -CVE-2012-5181,0,1,f2191bc6f4f7dbce6c01e0265e95e823f4ce810eaf0f92adc455db39fed99968,2024-11-21T01:44:13.003000 -CVE-2012-5182,0,1,6065f61e620dea97727d7f15ccf5a3d4ecae8d03c537c496b17a09956c5c56b1,2024-11-21T01:44:13.113000 -CVE-2012-5183,0,1,031133ac55c7e3a8f4c65c0d0c4389d105ba5486227dbd62720dd28735829235,2024-11-21T01:44:13.220000 -CVE-2012-5184,0,1,ea78c3b4c316902af3ae0cee05f2b6f8d689157cea59879d245c05d109a7a335,2024-11-21T01:44:13.323000 -CVE-2012-5185,0,1,9ed92d16895c8adbdec0eb61ad07db8578baf934b10d38e9f8bd2ffe3d7e3866,2024-11-21T01:44:13.430000 -CVE-2012-5186,0,1,8308b5875df90583c8ab4bd3bc05d92a4feda0bbab07eb0cb640677ed7810cbe,2024-11-21T01:44:13.527000 -CVE-2012-5187,0,1,ac9173e58e1e34e9742fea80ce554e40dfd8be60f38b403909200d9ef368450b,2024-11-21T01:44:13.627000 -CVE-2012-5188,0,1,57c692dfb7d978961d610e293f061cbe646141235183f8e3cbbbe72f097c9af2,2024-11-21T01:44:13.730000 +CVE-2012-5108,0,0,a951ed9d5c4379a084cd4541b0c1fc919ea1954c54d4471d73c7ad7bd27311d5,2024-11-21T01:44:03.877000 +CVE-2012-5109,0,0,1cee07ff1c617597718763e68d51195f1f0e5751f63def7fedf993d7ddb85fc5,2024-11-21T01:44:03.993000 +CVE-2012-5110,0,0,52075c07c3727fff378fbd309e4b550191b159c1728a69d41cf1adb191c2e3a2,2024-11-21T01:44:04.120000 +CVE-2012-5111,0,0,f081711cd342708a7b68f7e9f4e7a1e2e360d98bad84c98b81ec140c6fc95f54,2024-11-21T01:44:04.247000 +CVE-2012-5112,0,0,8e52f9753475965ab9d8c55d563062829d2c3df32d3bf2d5912ea7ab528f5c41,2024-11-21T01:44:04.367000 +CVE-2012-5115,0,0,26d531aeebda604baadaf245f1c3bd6daecfdb83b700a68af8847332ae286b69,2024-11-21T01:44:04.500000 +CVE-2012-5116,0,0,f2dd7104f5aacf3adb70c79c8eb2a5068b9fda17b11866f81b8196989c11b155,2024-11-21T01:44:04.630000 +CVE-2012-5117,0,0,74fd15fbb4158a0758c82badfc77043f878e53c47176a0bcac1475afcc4ca36d,2024-11-21T01:44:04.750000 +CVE-2012-5118,0,0,07b7a3b9ebea583953b8bce4a08094347fdd1c332dc5a777513abd589f3cc695,2024-11-21T01:44:04.867000 +CVE-2012-5119,0,0,40b1229b6cfd72da6c402ca6a7b3da6344743a9b24ba7d1b93bcc799741b3e01,2024-11-21T01:44:04.993000 +CVE-2012-5120,0,0,408f7a83e8eb419e1fd412ce7b7879f240164677dabde12bc8201aadfd51a33d,2024-11-21T01:44:05.120000 +CVE-2012-5121,0,0,5e5935434929e522a9f25dd6c81495ab8d9e703841ff853fb1a8842a6ec30ae1,2024-11-21T01:44:05.263000 +CVE-2012-5122,0,0,db3985d5f6baeadd654facc5763f280d17a747006032bcb7c95ca64ed8b9a13d,2024-11-21T01:44:05.387000 +CVE-2012-5123,0,0,4a44d411c07547d21c5479215f37f59c9b58c026fc6f29d1e37bb0a340070721,2024-11-21T01:44:05.517000 +CVE-2012-5124,0,0,29e23eb8269a6d05f986ce57ad30bd9436340e518073dcc8822ee2b5b7a52f15,2024-11-21T01:44:05.637000 +CVE-2012-5125,0,0,7aa30d66367a909635a03500fad1245265ce65b1f205e828dc514ea5d1af6ded,2024-11-21T01:44:05.753000 +CVE-2012-5126,0,0,12ed9734655e883a862777f4c9adda1a3372d0ae4272a0d83203e8557c146043,2024-11-21T01:44:05.887000 +CVE-2012-5127,0,0,3bd5633c0903d1aed2c516fed2c3441063fe9e5bceb5f9f245096dca8245b7ca,2024-11-21T01:44:06.013000 +CVE-2012-5128,0,0,dc96a7c031c1b55887803b4b0b59d4aa54e2b5b0a3baf923cc463e515c5cda77,2024-11-21T01:44:06.140000 +CVE-2012-5129,0,0,0e247c7dd632b2f2f347810ff4d70ea67e867ec3a43e284bcca90ed17f914f30,2024-11-21T01:44:06.270000 +CVE-2012-5130,0,0,3e11ab81a4d4226c5897a53e9637999ea935064b7be2962ee3e96891e61927bf,2024-11-21T01:44:06.390000 +CVE-2012-5131,0,0,7c950a29f3332bd9a9973cf719f159488818f2989a03e138d1a55cc2ef372e4d,2024-11-21T01:44:06.550000 +CVE-2012-5132,0,0,513d2acbe7729d6421371568bad46be309e2f93ce50fc337a1089ab1d7abd762,2024-11-21T01:44:06.680000 +CVE-2012-5133,0,0,8eb61a8a9356b973341de62047c8715ca5afd011f28231e3f815113c61c18d6e,2024-11-21T01:44:06.810000 +CVE-2012-5134,0,0,ca93a009d0a0ad00c3b620d8d0f68367e94dfb808719a31a9d218fa458e9151e,2024-11-21T01:44:06.940000 +CVE-2012-5135,0,0,ebd6b1bf06c722a8e814a2b9014b078dbefb96392bc15aee24d6da989fe15639,2024-11-21T01:44:07.100000 +CVE-2012-5136,0,0,0b922f39f1d7a6d988befaef480545f9ddc82f5d76f3dffbccd28dd6a99f39bc,2024-11-21T01:44:07.240000 +CVE-2012-5137,0,0,937320f6d35474fecbbea60032fc75c8073d28fa2f15fd5d5de4024704d02b41,2024-11-21T01:44:07.373000 +CVE-2012-5138,0,0,7a751fcab9456cae21bf0abfe754b06d35d5c0807936891b6fe731cca3407fc1,2024-11-21T01:44:07.513000 +CVE-2012-5139,0,0,79cb9e3f37398ddb2203bbd3ced73797c3db88d417b385c49bc202b63afb1e13,2024-11-21T01:44:07.647000 +CVE-2012-5140,0,0,0a7b7c8ffb6bc3af3132cc714c3a499ec1738ecc8f040d458b28d994b12732a9,2024-11-21T01:44:07.780000 +CVE-2012-5141,0,0,090bc059e3ee212f32fb9c572a9745ca8185fdece50abacff2a51e6287ec0168,2024-11-21T01:44:07.913000 +CVE-2012-5142,0,0,4346ef5881885ea07deaf51070e379a404c318bbf427aae9fba06bea4f2b6d20,2024-11-21T01:44:08.040000 +CVE-2012-5143,0,0,1c63fcd4d6e085522454e4265bb7b93f54f5bcce6799971fa5b5cef19a080bf0,2024-11-21T01:44:08.167000 +CVE-2012-5144,0,0,46348b5e13b55835b132f1e3c8e13623a2dc294371e52eaca68367a6febfbd97,2024-11-21T01:44:08.300000 +CVE-2012-5145,0,0,94208fb683c52234bf02ed1fe45b8679e9119b45d8c08c3773dbc9ed97a67cdd,2024-11-21T01:44:08.443000 +CVE-2012-5146,0,0,7004fec85299adf13e07caa64a797817dc2ea3bfc13ba0c04603469dd2361754,2024-11-21T01:44:08.587000 +CVE-2012-5147,0,0,e6d5f3f732a91c3ed665c8eca97597845a13de68473844cc2ad6e425d99b07a3,2024-11-21T01:44:08.720000 +CVE-2012-5148,0,0,7f16c59b7ca260002b4d0dfada7e69589ea1165ea7a5069568e4a9f768400696,2024-11-21T01:44:08.847000 +CVE-2012-5149,0,0,189d684f50fde96046c4d21a96883c23e409812ea2cdd505dc0769d4d8815fbc,2024-11-21T01:44:08.980000 +CVE-2012-5150,0,0,d0b1400cbb909aaf9e779ed173fa6b621a55224ee7240576a180538b23f979a0,2024-11-21T01:44:09.130000 +CVE-2012-5151,0,0,2a360b1751ba57a2067065afff452136512484189364168b6831eb11decdf7a1,2024-11-21T01:44:09.267000 +CVE-2012-5152,0,0,7f55c0b357b746a0ac666b8390d9cfde74a3dca8c78f6e1a04bde8b363de8259,2024-11-21T01:44:09.400000 +CVE-2012-5153,0,0,ad866a76941627bb64ecd28409abd1957a81c412b5f73ab00449abcdaa5a7f8a,2024-11-21T01:44:09.530000 +CVE-2012-5154,0,0,f827bcebc5373470bc79a688e4e87c67696cd83bbdf0de70ed814d4cff7a2cdc,2024-11-21T01:44:09.660000 +CVE-2012-5155,0,0,3f9f4d8b2ec1af00e14429863e6a096412d6690888ba44bf92d2a7049179ae86,2024-11-21T01:44:09.813000 +CVE-2012-5156,0,0,62be26fadb5e23a32f6f71e04416a0608b4b596bf4616007f7b81bea42bac88c,2024-11-21T01:44:09.947000 +CVE-2012-5157,0,0,d4b0f0f2d4f3a8596248e38d5df08d6938ba7805d17082d681581a57584ebed2,2024-11-21T01:44:10.077000 +CVE-2012-5158,0,0,d8f7c5dbba2cece4c6e978878236b92b2bfcadb67af571b43cc4fb032805d91f,2024-11-21T01:44:10.210000 +CVE-2012-5159,0,0,0ec3a010e370ba6f57e04dd36c96bafb3fa09a4f99c2164c894bbe61933b6ece,2024-11-21T01:44:10.360000 +CVE-2012-5161,0,0,7141467d416898ba55b82adea279b2e68d407280197af3a70a667dc6ad1b1285,2024-11-21T01:44:10.503000 +CVE-2012-5162,0,0,e5ae84ca5ef4579f895c957074f585f80c7afb0d2f87245f16ebb4eb0a8ca0f5,2024-11-21T01:44:10.657000 +CVE-2012-5163,0,0,87fd7dded45a9da9efac5542070f5498db92a911ec57cc90c3f0454eb60f58f2,2024-11-21T01:44:10.803000 +CVE-2012-5164,0,0,5643b5f3e883b9e9896225f2e1148ad55b34f1e198378c77441561b3ab5b8e68,2024-11-21T01:44:10.947000 +CVE-2012-5166,0,0,8708ab93cb4f3eb8ec87ec0472afd9e36436c937c051bb9710cc1e604b949f10,2024-11-21T01:44:11.100000 +CVE-2012-5167,0,0,db675a44ba21a6e7b1cc537b8d095d139cf3ba50430944ebc778701e60bcfb7f,2024-11-21T01:44:11.313000 +CVE-2012-5168,0,0,a5bb28ed655e444baa523efe2d186cb55b07a8b2bb9c3033a1d205419802c720,2024-11-21T01:44:11.463000 +CVE-2012-5169,0,0,a027a8939e9ee1d865e8f51d062919c80d56cd4ac784ddffc0daf371f781da9f,2024-11-21T01:44:11.630000 +CVE-2012-5170,0,0,dd0e665b1fe4aa8d54ba4b6075b32615d9edf225c8ba7601f1ce0daf107c8962,2024-11-21T01:44:11.800000 +CVE-2012-5171,0,0,0f3f2b18dac097af15eca72aae525a327c23d288f3eabbc2a3ba8328b599bcce,2024-11-21T01:44:11.923000 +CVE-2012-5172,0,0,5fd3575b61839047be01dc4cb4701f10e5fec13b6ddd115ea342855441e62e4e,2024-11-21T01:44:12.043000 +CVE-2012-5173,0,0,47a5090dc73dc544c80d6f55ab6d173ee6900b80e33b82c1c9a7e780030f5e45,2024-11-21T01:44:12.157000 +CVE-2012-5174,0,0,fa77618dac333d58604dbda54dc938eb404939dc92b33bfb5599d8b317d2ded4,2024-11-21T01:44:12.267000 +CVE-2012-5175,0,0,eaf2a9aeb068c2a92195177c4452b801f9f181f5dc23881c9d40d3a5864d3ea5,2024-11-21T01:44:12.370000 +CVE-2012-5176,0,0,2b1e7dec96bac9d8e186924ea6b54f8a844b9a212c6b10c3b46210fb05c439f9,2024-11-21T01:44:12.473000 +CVE-2012-5177,0,0,773bd5e15fa0d5cd1ea6bf1a017ecd4022b5848745c66b1665a1cf8ae4660364,2024-11-21T01:44:12.577000 +CVE-2012-5178,0,0,2cc564145e4c8d10670bcc6b8829e01218c4bf136cbb59289eac322e5e28f51f,2024-11-21T01:44:12.683000 +CVE-2012-5179,0,0,74a2d6db61366667c79cb41325546b449fadab2a2bfd9b6c5d3eed7c30a2ca84,2024-11-21T01:44:12.787000 +CVE-2012-5180,0,0,9d6fab3f608a54d5640e299d2b55a5f23c6b1bcc25df1583a861a03a431d5c9a,2024-11-21T01:44:12.900000 +CVE-2012-5181,0,0,f2191bc6f4f7dbce6c01e0265e95e823f4ce810eaf0f92adc455db39fed99968,2024-11-21T01:44:13.003000 +CVE-2012-5182,0,0,6065f61e620dea97727d7f15ccf5a3d4ecae8d03c537c496b17a09956c5c56b1,2024-11-21T01:44:13.113000 +CVE-2012-5183,0,0,031133ac55c7e3a8f4c65c0d0c4389d105ba5486227dbd62720dd28735829235,2024-11-21T01:44:13.220000 +CVE-2012-5184,0,0,ea78c3b4c316902af3ae0cee05f2b6f8d689157cea59879d245c05d109a7a335,2024-11-21T01:44:13.323000 +CVE-2012-5185,0,0,9ed92d16895c8adbdec0eb61ad07db8578baf934b10d38e9f8bd2ffe3d7e3866,2024-11-21T01:44:13.430000 +CVE-2012-5186,0,0,8308b5875df90583c8ab4bd3bc05d92a4feda0bbab07eb0cb640677ed7810cbe,2024-11-21T01:44:13.527000 +CVE-2012-5187,0,0,ac9173e58e1e34e9742fea80ce554e40dfd8be60f38b403909200d9ef368450b,2024-11-21T01:44:13.627000 +CVE-2012-5188,0,0,57c692dfb7d978961d610e293f061cbe646141235183f8e3cbbbe72f097c9af2,2024-11-21T01:44:13.730000 CVE-2012-5189,0,0,8f41a7861d9bbf5a8ab26cbe935ad9ba9cc79cc45786194edeabe6a75a01bb56,2023-11-07T02:12:28.973000 CVE-2012-5190,0,0,8cc248cbb19c605d8ef6839df63a4f9cfbc901e3091a48a009982194fc89dfe5,2020-01-29T15:44:48.100000 -CVE-2012-5192,0,1,abc37625cffad0a0b12d13ee63903d4aba345ac4bf57ed8c1c1b00917020a5af,2024-11-21T01:44:13.977000 +CVE-2012-5192,0,0,abc37625cffad0a0b12d13ee63903d4aba345ac4bf57ed8c1c1b00917020a5af,2024-11-21T01:44:13.977000 CVE-2012-5193,0,0,aac74468edf1e192723c3902bf9f868a04c44a02e5495b9a31a1c0e90a052051,2019-11-15T21:14:43.150000 -CVE-2012-5195,0,1,9f2fa06b2cc01f9c53b6420cde2712f8edb37f6606d71e845923f73625380f0a,2024-11-21T01:44:14.243000 -CVE-2012-5196,0,1,1bd896791017e6973c12f2a739be53dfdaef0b5e636f8028ac56493f0cc36cf0,2024-11-21T01:44:14.403000 -CVE-2012-5197,0,1,dee9addaf732168bd5792422d4b7708586963debb8e034197074218e02bb7335,2024-11-21T01:44:14.530000 -CVE-2012-5198,0,1,736b97eabc99c2df2f69aa132e547cdbf7f9d47f06c09449ff720460868b93eb,2024-11-21T01:44:14.663000 -CVE-2012-5199,0,1,53376c095648db2b3c637a7412b9146cee1d076b9f17934276aed8270220406b,2024-11-21T01:44:14.763000 -CVE-2012-5200,0,1,1195cee8f2c1f50450104c26ea9bcba5e5f16cfaeacec19581a2d2a6b5ca1427,2024-11-21T01:44:14.860000 -CVE-2012-5201,0,1,df74667fa2282b9aa8a01bfc444ff75fc2b6ca8f7d6ab375a895c5eb989bc642,2024-11-21T01:44:14.963000 -CVE-2012-5202,0,1,877a4efa224699e82f2d1e8d2fdf3769b5a3d4db1f2909d84ed4ffb34911492d,2024-11-21T01:44:15.063000 -CVE-2012-5203,0,1,b219b40ae1df465a99325b03091486bf3ef5ee33d2f8daa869744cb58421208a,2024-11-21T01:44:15.163000 -CVE-2012-5204,0,1,d2495ef49d40d774a28df6dd03919bcd762c7305b3ff6c93947179223e48a64c,2024-11-21T01:44:15.267000 -CVE-2012-5205,0,1,4f38148bb48cf4701e7c2fa35f4d9cdb7b24895d20aee27a3c6c4fa527c3c0e5,2024-11-21T01:44:15.367000 -CVE-2012-5206,0,1,e75b73802a4955ca55b0b57a28dcc21408dcaff07a71ed54394761966100283b,2024-11-21T01:44:15.473000 -CVE-2012-5207,0,1,3db4f8c4c59694bd0e0ccd1b0d85f7081dad67ded4912fb435b8c6d3ec20f7aa,2024-11-21T01:44:15.580000 -CVE-2012-5208,0,1,657e6308d18d03327f2505d882bf0affce97ccec800e983b7135e69c6237f259,2024-11-21T01:44:15.683000 -CVE-2012-5209,0,1,ac11955426da39a9751562e819b882f679229c5e6a31ab6b9293d957691504ff,2024-11-21T01:44:15.790000 -CVE-2012-5210,0,1,6f1345e05a75835f9f2ab36b7faac970de0569090c810f9193f2429e43fd70f9,2024-11-21T01:44:15.893000 -CVE-2012-5211,0,1,33486c3955d8b14904c856a0b034998d021fefcb7a2ac7a6783a70e4351385f7,2024-11-21T01:44:15.993000 -CVE-2012-5212,0,1,9f572ad5a1565d7cc7765bc50775db3a6604301cf7f4566f390772e3abdf0354,2024-11-21T01:44:16.090000 -CVE-2012-5213,0,1,1ef22718271c59e2b2b565dafbebad48a1a38b1efca340341bc8b0eb7a6a0c17,2024-11-21T01:44:16.197000 -CVE-2012-5214,0,1,97231ba040041e8723430513535de908eaa40354cb42723b92edb61ba787b561,2024-11-21T01:44:16.303000 -CVE-2012-5215,0,1,54a1084534b0ac7bbd2c55c699203df8742e1f7f1696a9c255868ea33b253316,2024-11-21T01:44:16.400000 -CVE-2012-5216,0,1,3f38bdc2cadec1ec44a9c4bb4f91722588f0ece698a960d201a965a0fddb81d0,2024-11-21T01:44:16.510000 -CVE-2012-5217,0,1,282bf80210e25bddd1d632b9fb13c69094a1dc013da03bcb7a800ff68569b19d,2024-11-21T01:44:16.627000 -CVE-2012-5218,0,1,bad09e3ab9f9eecf5b43ce1d23594831a7168880dbe15df8144680dbb1f0097e,2024-11-21T01:44:16.727000 -CVE-2012-5219,0,1,db686187b55cfe6f1fdd756ad0470945e8b938038d62da9394dbb0cd1e3c719c,2024-11-21T01:44:16.850000 -CVE-2012-5220,0,1,7a68c6b77b38a44b966bdc26d5e26030aa648dc4fd3d0f9150445847abb9ca1c,2024-11-21T01:44:16.957000 -CVE-2012-5221,0,1,da0310971025b64a308bff5b993d7c2c78e3252bf43331cecff5b33093ff97ab,2024-11-21T01:44:17.060000 -CVE-2012-5222,0,1,9ac7a33149a7c7c7e505f231e7cb4040915d5f6c975342190835b460ef8c8426,2024-11-21T01:44:17.173000 -CVE-2012-5223,0,1,7975710501d7a6d54c5654cd6539c45ee87b18bd46920bdc4553d6361b3fdd80,2024-11-21T01:44:17.277000 -CVE-2012-5224,0,1,0d0da1b251bd8545908ff3dc71744d9e86c2c8ef7e78953fffeb0e66aca76206,2024-11-21T01:44:17.430000 -CVE-2012-5225,0,1,6b4ffe7b74279148a2dda845f3b35b6b6ee16d892f91079c1eab873d4a49fb57,2024-11-21T01:44:17.560000 -CVE-2012-5226,0,1,b5d6f900d8cd67a425ed61f0d778bbc3fb27c42dd6c9a04d9c6fd67124d8d1c8,2024-11-21T01:44:17.700000 -CVE-2012-5227,0,1,2d6e88b6d684fc3ea40509fac1183574a1291d6eee7ccb6e382697a501be0137,2024-11-21T01:44:17.830000 -CVE-2012-5228,0,1,43364a6091bd746840a1ec7d728af95f63d2676ffc7727261b9497545a093735,2024-11-21T01:44:17.960000 -CVE-2012-5229,0,1,9a7b43a502c8c030e6bf46c2e4154b3c19c013d31883ac32c108cf84b30ebe8f,2024-11-21T01:44:18.110000 -CVE-2012-5230,0,1,fddc56b89dc254bbf89d205c31409b1d0d2e7bdbd139a671a68504c540c96a94,2024-11-21T01:44:18.250000 -CVE-2012-5231,0,1,db137a8778e45efc7ecff151d46ccece6a773f9a8771c3f72e4e77932371bc04,2024-11-21T01:44:18.387000 -CVE-2012-5232,0,1,48c0a94120dc9c17a9bd6811f433b7f1a27e86d5a9f64c156f6ca1ba1d479c47,2024-11-21T01:44:18.533000 -CVE-2012-5233,0,1,8148edbd246a11351d34c33e44eb9ade27052382e5f59c790cfa4ae4f7f7a6fe,2024-11-21T01:44:18.680000 -CVE-2012-5234,0,1,8af3e5cca2adf030525cadc0f9c33edf6f92bb6edb34a8c3aeae1e8458f44cda,2024-11-21T01:44:18.817000 +CVE-2012-5195,0,0,9f2fa06b2cc01f9c53b6420cde2712f8edb37f6606d71e845923f73625380f0a,2024-11-21T01:44:14.243000 +CVE-2012-5196,0,0,1bd896791017e6973c12f2a739be53dfdaef0b5e636f8028ac56493f0cc36cf0,2024-11-21T01:44:14.403000 +CVE-2012-5197,0,0,dee9addaf732168bd5792422d4b7708586963debb8e034197074218e02bb7335,2024-11-21T01:44:14.530000 +CVE-2012-5198,0,0,736b97eabc99c2df2f69aa132e547cdbf7f9d47f06c09449ff720460868b93eb,2024-11-21T01:44:14.663000 +CVE-2012-5199,0,0,53376c095648db2b3c637a7412b9146cee1d076b9f17934276aed8270220406b,2024-11-21T01:44:14.763000 +CVE-2012-5200,0,0,1195cee8f2c1f50450104c26ea9bcba5e5f16cfaeacec19581a2d2a6b5ca1427,2024-11-21T01:44:14.860000 +CVE-2012-5201,0,0,df74667fa2282b9aa8a01bfc444ff75fc2b6ca8f7d6ab375a895c5eb989bc642,2024-11-21T01:44:14.963000 +CVE-2012-5202,0,0,877a4efa224699e82f2d1e8d2fdf3769b5a3d4db1f2909d84ed4ffb34911492d,2024-11-21T01:44:15.063000 +CVE-2012-5203,0,0,b219b40ae1df465a99325b03091486bf3ef5ee33d2f8daa869744cb58421208a,2024-11-21T01:44:15.163000 +CVE-2012-5204,0,0,d2495ef49d40d774a28df6dd03919bcd762c7305b3ff6c93947179223e48a64c,2024-11-21T01:44:15.267000 +CVE-2012-5205,0,0,4f38148bb48cf4701e7c2fa35f4d9cdb7b24895d20aee27a3c6c4fa527c3c0e5,2024-11-21T01:44:15.367000 +CVE-2012-5206,0,0,e75b73802a4955ca55b0b57a28dcc21408dcaff07a71ed54394761966100283b,2024-11-21T01:44:15.473000 +CVE-2012-5207,0,0,3db4f8c4c59694bd0e0ccd1b0d85f7081dad67ded4912fb435b8c6d3ec20f7aa,2024-11-21T01:44:15.580000 +CVE-2012-5208,0,0,657e6308d18d03327f2505d882bf0affce97ccec800e983b7135e69c6237f259,2024-11-21T01:44:15.683000 +CVE-2012-5209,0,0,ac11955426da39a9751562e819b882f679229c5e6a31ab6b9293d957691504ff,2024-11-21T01:44:15.790000 +CVE-2012-5210,0,0,6f1345e05a75835f9f2ab36b7faac970de0569090c810f9193f2429e43fd70f9,2024-11-21T01:44:15.893000 +CVE-2012-5211,0,0,33486c3955d8b14904c856a0b034998d021fefcb7a2ac7a6783a70e4351385f7,2024-11-21T01:44:15.993000 +CVE-2012-5212,0,0,9f572ad5a1565d7cc7765bc50775db3a6604301cf7f4566f390772e3abdf0354,2024-11-21T01:44:16.090000 +CVE-2012-5213,0,0,1ef22718271c59e2b2b565dafbebad48a1a38b1efca340341bc8b0eb7a6a0c17,2024-11-21T01:44:16.197000 +CVE-2012-5214,0,0,97231ba040041e8723430513535de908eaa40354cb42723b92edb61ba787b561,2024-11-21T01:44:16.303000 +CVE-2012-5215,0,0,54a1084534b0ac7bbd2c55c699203df8742e1f7f1696a9c255868ea33b253316,2024-11-21T01:44:16.400000 +CVE-2012-5216,0,0,3f38bdc2cadec1ec44a9c4bb4f91722588f0ece698a960d201a965a0fddb81d0,2024-11-21T01:44:16.510000 +CVE-2012-5217,0,0,282bf80210e25bddd1d632b9fb13c69094a1dc013da03bcb7a800ff68569b19d,2024-11-21T01:44:16.627000 +CVE-2012-5218,0,0,bad09e3ab9f9eecf5b43ce1d23594831a7168880dbe15df8144680dbb1f0097e,2024-11-21T01:44:16.727000 +CVE-2012-5219,0,0,db686187b55cfe6f1fdd756ad0470945e8b938038d62da9394dbb0cd1e3c719c,2024-11-21T01:44:16.850000 +CVE-2012-5220,0,0,7a68c6b77b38a44b966bdc26d5e26030aa648dc4fd3d0f9150445847abb9ca1c,2024-11-21T01:44:16.957000 +CVE-2012-5221,0,0,da0310971025b64a308bff5b993d7c2c78e3252bf43331cecff5b33093ff97ab,2024-11-21T01:44:17.060000 +CVE-2012-5222,0,0,9ac7a33149a7c7c7e505f231e7cb4040915d5f6c975342190835b460ef8c8426,2024-11-21T01:44:17.173000 +CVE-2012-5223,0,0,7975710501d7a6d54c5654cd6539c45ee87b18bd46920bdc4553d6361b3fdd80,2024-11-21T01:44:17.277000 +CVE-2012-5224,0,0,0d0da1b251bd8545908ff3dc71744d9e86c2c8ef7e78953fffeb0e66aca76206,2024-11-21T01:44:17.430000 +CVE-2012-5225,0,0,6b4ffe7b74279148a2dda845f3b35b6b6ee16d892f91079c1eab873d4a49fb57,2024-11-21T01:44:17.560000 +CVE-2012-5226,0,0,b5d6f900d8cd67a425ed61f0d778bbc3fb27c42dd6c9a04d9c6fd67124d8d1c8,2024-11-21T01:44:17.700000 +CVE-2012-5227,0,0,2d6e88b6d684fc3ea40509fac1183574a1291d6eee7ccb6e382697a501be0137,2024-11-21T01:44:17.830000 +CVE-2012-5228,0,0,43364a6091bd746840a1ec7d728af95f63d2676ffc7727261b9497545a093735,2024-11-21T01:44:17.960000 +CVE-2012-5229,0,0,9a7b43a502c8c030e6bf46c2e4154b3c19c013d31883ac32c108cf84b30ebe8f,2024-11-21T01:44:18.110000 +CVE-2012-5230,0,0,fddc56b89dc254bbf89d205c31409b1d0d2e7bdbd139a671a68504c540c96a94,2024-11-21T01:44:18.250000 +CVE-2012-5231,0,0,db137a8778e45efc7ecff151d46ccece6a773f9a8771c3f72e4e77932371bc04,2024-11-21T01:44:18.387000 +CVE-2012-5232,0,0,48c0a94120dc9c17a9bd6811f433b7f1a27e86d5a9f64c156f6ca1ba1d479c47,2024-11-21T01:44:18.533000 +CVE-2012-5233,0,0,8148edbd246a11351d34c33e44eb9ade27052382e5f59c790cfa4ae4f7f7a6fe,2024-11-21T01:44:18.680000 +CVE-2012-5234,0,0,8af3e5cca2adf030525cadc0f9c33edf6f92bb6edb34a8c3aeae1e8458f44cda,2024-11-21T01:44:18.817000 CVE-2012-5236,0,0,8ac2fc0218de5f5b5590c22dc5aab82a2334087078c7a8bb0fe184ca4af19e31,2023-11-07T02:12:29.503000 -CVE-2012-5237,0,1,deb22ed6f369588bd1b7900a95eb480f45d835ccd54061b6b80a23cb47988f66,2024-11-21T01:44:18.977000 -CVE-2012-5238,0,1,30ce74b5373b616221b4e28ee8b5528527f1eb1b6a9162a801582dfa088df840,2024-11-21T01:44:19.120000 +CVE-2012-5237,0,0,deb22ed6f369588bd1b7900a95eb480f45d835ccd54061b6b80a23cb47988f66,2024-11-21T01:44:18.977000 +CVE-2012-5238,0,0,30ce74b5373b616221b4e28ee8b5528527f1eb1b6a9162a801582dfa088df840,2024-11-21T01:44:19.120000 CVE-2012-5239,0,0,4905a295a7eb8fff7cef70825403d570c73747d77fc67f72eac7828486ce8593,2023-11-07T02:12:29.553000 -CVE-2012-5240,0,1,12a4072e5308382cc0b26ca64f5ae525ad6da685eea0c2f5befa3a0c05286535,2024-11-21T01:44:19.277000 +CVE-2012-5240,0,0,12a4072e5308382cc0b26ca64f5ae525ad6da685eea0c2f5befa3a0c05286535,2024-11-21T01:44:19.277000 CVE-2012-5242,0,0,af91212204b339952910de70c1f5f24f45417d3d9e683870ec3e65fb8b698ac3,2014-10-24T17:57:36.080000 CVE-2012-5243,0,0,4838cd80b7f57a78956f78c9ee24382f50a24f6de214fc6dadd7b14d5afd6857,2014-10-24T17:26:22.240000 CVE-2012-5244,0,0,305522d0de64b7c9d438ea2f89a6d5ae56dbee75a345b4563e41ee0870f440ed,2017-08-29T01:32:33.353000 -CVE-2012-5248,0,1,6562b4600a24a63fad808112928eaaecacd48d48b2d1d961d69930f18d201845,2024-11-21T01:44:19.813000 -CVE-2012-5249,0,1,2814b611d0e8e15f1d85206f2ee046eeb50e5dd7470304f16c5946cc5d6a3443,2024-11-21T01:44:19.940000 -CVE-2012-5250,0,1,261fc98e9993d08b4bca7d99e0a6c253b4de69bb698bd223f5a9d5e160b791f8,2024-11-21T01:44:20.070000 -CVE-2012-5251,0,1,4daeb81fc07b3f610941ff9f7d4f0cdfa98dcc4e65b7c6a88f9f6c397d66a03d,2024-11-21T01:44:20.203000 -CVE-2012-5252,0,1,0c46cc18af3e057c6b04b9f5b4c79de24b4922358e0e252c05acd31a5d040f00,2024-11-21T01:44:20.340000 -CVE-2012-5253,0,1,c91922f8f2531f60c700ffb834ece1a0182d77e99c58c160868eb11c589a3385,2024-11-21T01:44:20.470000 -CVE-2012-5254,0,1,01cb22bb19d20e3e3d271af8dc9b3e565d6a76e6faac9e29e1499d6fbdebaf60,2024-11-21T01:44:20.610000 -CVE-2012-5255,0,1,aec821e9716fa6bfd6b9c04b22e2abe19e664b415eb8deb693dba32bd1e6144c,2024-11-21T01:44:20.730000 -CVE-2012-5256,0,1,5f6f2556b5e209f4dbeab90054dffb799c1c2f3d84dc29ffaa1d4c461ab2f676,2024-11-21T01:44:20.857000 -CVE-2012-5257,0,1,e492623abb5f1a93cb5be43e2205760af89f9363d7b8163e4fdb7abbcf931ddc,2024-11-21T01:44:20.990000 -CVE-2012-5258,0,1,618626e59748c350dab8aa8313fc2c316314dd8be1e60aef554cd054218eef78,2024-11-21T01:44:21.120000 -CVE-2012-5259,0,1,b6490192d3d7f82e5f2d7aa8f706919d9ca96c20e2c67149800d1c4e267249fe,2024-11-21T01:44:21.250000 -CVE-2012-5260,0,1,9a19fc5e20813d5f87151a4f9051db1365d64d2865e89b5fd34a85b2003b10f1,2024-11-21T01:44:21.390000 -CVE-2012-5261,0,1,f19cdbd6919167fa8253f99d6637bc46b6c0237b569977213fe9c286da4f5cff,2024-11-21T01:44:21.523000 -CVE-2012-5262,0,1,7bfc553271b9ac98deae38e7f42db540e038969b6770aca5ab7c0bb80ef1eb7c,2024-11-21T01:44:21.653000 -CVE-2012-5263,0,1,741018755f963297787f718042a186c8b3008f94f9cc70ab5f56feefbb83f7d1,2024-11-21T01:44:21.793000 -CVE-2012-5264,0,1,1f60691e69dfc362874e8784d7073fb3dc0855a4fbfb43cbf3447316a12b7bf9,2024-11-21T01:44:21.953000 -CVE-2012-5265,0,1,bffec4c2f9a12334b4cc645a1ba7f67a6410bd8d92d87a698fd17a4d76c01e65,2024-11-21T01:44:22.100000 -CVE-2012-5266,0,1,596e4f628aa9e7c29114c60234f560e9247a77913c067f52814a6a46aed85733,2024-11-21T01:44:22.230000 -CVE-2012-5267,0,1,8aec7f44c6b62a809473e734e372dce38e72fb1c92e31cbc63c0cd518f18f3b7,2024-11-21T01:44:22.360000 -CVE-2012-5268,0,1,40dbf5982953d00c1fd2d5d18c441dc15e944675569f1040fbf1992c002777ba,2024-11-21T01:44:22.497000 -CVE-2012-5269,0,1,a57a56d02234429d30a17b28be03b71fe2a6d39728049b0c4c992db06da8b0fb,2024-11-21T01:44:22.630000 -CVE-2012-5270,0,1,d81db7fb3cd4f9d4d97fff9b95c900f11fe8e3215f20d7a601077755b9a168a6,2024-11-21T01:44:22.763000 -CVE-2012-5271,0,1,889e7801edc5631c02f1fef388f32822e3e2ab5b513813627239e7077077e698,2024-11-21T01:44:22.900000 -CVE-2012-5272,0,1,1b98ca13421b468b77919add21b5007c892593130585ffd13131b48ca93fb62a,2024-11-21T01:44:23.030000 -CVE-2012-5273,0,1,b8852f7c53710edd113f5ffd111a8eee91f73e276cbad5143ed5c223853a6595,2024-11-21T01:44:23.163000 -CVE-2012-5274,0,1,c182863b78d9d2d4f8dbb43f7435396b775791b7d62d3a626a8a9858c19a0610,2024-11-21T01:44:23.280000 -CVE-2012-5275,0,1,9213ec57caa58d0afb28da47b4fc7c9f3a80c871fe5dff06a615f08ca5c6b11f,2024-11-21T01:44:23.413000 -CVE-2012-5276,0,1,6537aac3e77378e5b8e8b3d62c5a598b326f6990c336042ce1f57c3175bb43e7,2024-11-21T01:44:23.550000 -CVE-2012-5277,0,1,242c29dac93d9ff85b037109d9179c6af31cd7b76c37da7bbe25c25ec8e14db4,2024-11-21T01:44:23.677000 -CVE-2012-5278,0,1,a19d9215d8115fc76dfbf14928e7fdf04e28b5a2d229c6e735d388aef2a4aa19,2024-11-21T01:44:23.800000 -CVE-2012-5279,0,1,14a2e86942dc526eb08e47b3bc5fc06526889e4f08f7bce50dfa813bf6abc43e,2024-11-21T01:44:23.930000 -CVE-2012-5280,0,1,1d088f456b29f684f8aec50e5a5f0343351bc70cc79f0d41b759b02f26f46e02,2024-11-21T01:44:24.057000 +CVE-2012-5248,0,0,6562b4600a24a63fad808112928eaaecacd48d48b2d1d961d69930f18d201845,2024-11-21T01:44:19.813000 +CVE-2012-5249,0,0,2814b611d0e8e15f1d85206f2ee046eeb50e5dd7470304f16c5946cc5d6a3443,2024-11-21T01:44:19.940000 +CVE-2012-5250,0,0,261fc98e9993d08b4bca7d99e0a6c253b4de69bb698bd223f5a9d5e160b791f8,2024-11-21T01:44:20.070000 +CVE-2012-5251,0,0,4daeb81fc07b3f610941ff9f7d4f0cdfa98dcc4e65b7c6a88f9f6c397d66a03d,2024-11-21T01:44:20.203000 +CVE-2012-5252,0,0,0c46cc18af3e057c6b04b9f5b4c79de24b4922358e0e252c05acd31a5d040f00,2024-11-21T01:44:20.340000 +CVE-2012-5253,0,0,c91922f8f2531f60c700ffb834ece1a0182d77e99c58c160868eb11c589a3385,2024-11-21T01:44:20.470000 +CVE-2012-5254,0,0,01cb22bb19d20e3e3d271af8dc9b3e565d6a76e6faac9e29e1499d6fbdebaf60,2024-11-21T01:44:20.610000 +CVE-2012-5255,0,0,aec821e9716fa6bfd6b9c04b22e2abe19e664b415eb8deb693dba32bd1e6144c,2024-11-21T01:44:20.730000 +CVE-2012-5256,0,0,5f6f2556b5e209f4dbeab90054dffb799c1c2f3d84dc29ffaa1d4c461ab2f676,2024-11-21T01:44:20.857000 +CVE-2012-5257,0,0,e492623abb5f1a93cb5be43e2205760af89f9363d7b8163e4fdb7abbcf931ddc,2024-11-21T01:44:20.990000 +CVE-2012-5258,0,0,618626e59748c350dab8aa8313fc2c316314dd8be1e60aef554cd054218eef78,2024-11-21T01:44:21.120000 +CVE-2012-5259,0,0,b6490192d3d7f82e5f2d7aa8f706919d9ca96c20e2c67149800d1c4e267249fe,2024-11-21T01:44:21.250000 +CVE-2012-5260,0,0,9a19fc5e20813d5f87151a4f9051db1365d64d2865e89b5fd34a85b2003b10f1,2024-11-21T01:44:21.390000 +CVE-2012-5261,0,0,f19cdbd6919167fa8253f99d6637bc46b6c0237b569977213fe9c286da4f5cff,2024-11-21T01:44:21.523000 +CVE-2012-5262,0,0,7bfc553271b9ac98deae38e7f42db540e038969b6770aca5ab7c0bb80ef1eb7c,2024-11-21T01:44:21.653000 +CVE-2012-5263,0,0,741018755f963297787f718042a186c8b3008f94f9cc70ab5f56feefbb83f7d1,2024-11-21T01:44:21.793000 +CVE-2012-5264,0,0,1f60691e69dfc362874e8784d7073fb3dc0855a4fbfb43cbf3447316a12b7bf9,2024-11-21T01:44:21.953000 +CVE-2012-5265,0,0,bffec4c2f9a12334b4cc645a1ba7f67a6410bd8d92d87a698fd17a4d76c01e65,2024-11-21T01:44:22.100000 +CVE-2012-5266,0,0,596e4f628aa9e7c29114c60234f560e9247a77913c067f52814a6a46aed85733,2024-11-21T01:44:22.230000 +CVE-2012-5267,0,0,8aec7f44c6b62a809473e734e372dce38e72fb1c92e31cbc63c0cd518f18f3b7,2024-11-21T01:44:22.360000 +CVE-2012-5268,0,0,40dbf5982953d00c1fd2d5d18c441dc15e944675569f1040fbf1992c002777ba,2024-11-21T01:44:22.497000 +CVE-2012-5269,0,0,a57a56d02234429d30a17b28be03b71fe2a6d39728049b0c4c992db06da8b0fb,2024-11-21T01:44:22.630000 +CVE-2012-5270,0,0,d81db7fb3cd4f9d4d97fff9b95c900f11fe8e3215f20d7a601077755b9a168a6,2024-11-21T01:44:22.763000 +CVE-2012-5271,0,0,889e7801edc5631c02f1fef388f32822e3e2ab5b513813627239e7077077e698,2024-11-21T01:44:22.900000 +CVE-2012-5272,0,0,1b98ca13421b468b77919add21b5007c892593130585ffd13131b48ca93fb62a,2024-11-21T01:44:23.030000 +CVE-2012-5273,0,0,b8852f7c53710edd113f5ffd111a8eee91f73e276cbad5143ed5c223853a6595,2024-11-21T01:44:23.163000 +CVE-2012-5274,0,0,c182863b78d9d2d4f8dbb43f7435396b775791b7d62d3a626a8a9858c19a0610,2024-11-21T01:44:23.280000 +CVE-2012-5275,0,0,9213ec57caa58d0afb28da47b4fc7c9f3a80c871fe5dff06a615f08ca5c6b11f,2024-11-21T01:44:23.413000 +CVE-2012-5276,0,0,6537aac3e77378e5b8e8b3d62c5a598b326f6990c336042ce1f57c3175bb43e7,2024-11-21T01:44:23.550000 +CVE-2012-5277,0,0,242c29dac93d9ff85b037109d9179c6af31cd7b76c37da7bbe25c25ec8e14db4,2024-11-21T01:44:23.677000 +CVE-2012-5278,0,0,a19d9215d8115fc76dfbf14928e7fdf04e28b5a2d229c6e735d388aef2a4aa19,2024-11-21T01:44:23.800000 +CVE-2012-5279,0,0,14a2e86942dc526eb08e47b3bc5fc06526889e4f08f7bce50dfa813bf6abc43e,2024-11-21T01:44:23.930000 +CVE-2012-5280,0,0,1d088f456b29f684f8aec50e5a5f0343351bc70cc79f0d41b759b02f26f46e02,2024-11-21T01:44:24.057000 CVE-2012-5281,0,0,65afde1ab8e37af63101a46098f9a9183ba7f341dbc73dea13c9d232442b7b78,2023-11-07T02:12:29.887000 CVE-2012-5282,0,0,cb6327aec90ababe1ea514e696f8fb2784b1a7d6eb60fd2125f73a0aefc1b4fa,2023-11-07T02:12:30.153000 CVE-2012-5283,0,0,483f5281cdc3f653b6cae7a35b2897b341ac0e6fc484d1a2362f49d7007cd3cc,2023-11-07T02:12:30.403000 CVE-2012-5284,0,0,8ecfb70fbaf1409ca4c591512135f40aca7b226cefde402cbe9b6ebbfbe442bd,2023-11-07T02:12:30.620000 -CVE-2012-5285,0,1,a14c186cca0ba27e9dcd63c58a5bb438c42782270a2bb01d5597a41aad6b031e,2024-11-21T01:44:24.243000 -CVE-2012-5286,0,1,59fad3bf7339f97c15c23480025f8738cef7c9f0a4afce898191f888fd62f3ca,2024-11-21T01:44:24.357000 -CVE-2012-5287,0,1,f7d94b1e2455338fe4578fabf83a5f8a9940c171f29c8300ffaf5b3266ba54c5,2024-11-21T01:44:24.487000 -CVE-2012-5288,0,1,6860a9522aa49e2ed35b88674649afd0207aa18388003f32b545a0c9cb1f1f70,2024-11-21T01:44:24.617000 -CVE-2012-5289,0,1,1af6ee00a9b55c3925a2f9e322c4634674d73d84402ea099b14aaa241f70db72,2024-11-21T01:44:24.753000 -CVE-2012-5290,0,1,d612ac68c3e5eb073f37d2305459935aed5f971a634c89dcf47b256308c4a1b8,2024-11-21T01:44:24.883000 -CVE-2012-5291,0,1,1985df5ee6b1cd54c1808961dbc2f76b02b3602c2d6a202e5bf2a4c82a637ecd,2024-11-21T01:44:25.013000 -CVE-2012-5292,0,1,e2bc186087bd1e2929ecc3409033f55666d2e81ce8dee223b17705af8bc0384d,2024-11-21T01:44:25.143000 -CVE-2012-5293,0,1,e134564aac7ede067be2e794f9fa049d696f5641fe34619f2926534b3bf2238c,2024-11-21T01:44:25.270000 -CVE-2012-5294,0,1,b21a1ba40d1ce711eca634dd530ce3942016cbb0f6f1486d5e3c135481e6eadb,2024-11-21T01:44:25.407000 -CVE-2012-5295,0,1,a58f31ad5840e930941ec4f2a85cf6fe8b3cee471872d64ed955a3c87c301f78,2024-11-21T01:44:25.540000 -CVE-2012-5296,0,1,fd8671596c1d2ef16e42e17e701a55b4b1d8f507e305841c48f371cd8043750d,2024-11-21T01:44:25.670000 -CVE-2012-5297,0,1,e46dccd1f2192ddf63c97d700dbe8890999fa614f9ea690aac03ac781c9c7d64,2024-11-21T01:44:25.810000 -CVE-2012-5298,0,1,a104995112270fe7d93d02a8ddc57bd4eeff33e9f443ad9e2e2d0b4ba732e924,2024-11-21T01:44:25.940000 -CVE-2012-5299,0,1,2fafb5fb3502ff89be9fc0dfb2961514f99a3cd58a5ba869db10ff271b730f7c,2024-11-21T01:44:26.070000 -CVE-2012-5300,0,1,f2a3aaa8867b1a9a1ea34e7e0b64f2a75648d2f0aa17ca51383e624aa09836bd,2024-11-21T01:44:26.203000 -CVE-2012-5301,0,1,9032f2edd4b4d3e78017f0533044e4895c39164c0ea9aa2a8f0c729b72ffafeb,2024-11-21T01:44:26.333000 -CVE-2012-5302,0,1,e53a685b03e8a2ae1060f223c8269292753e1676239e1c6f9850cf31dc876a4d,2024-11-21T01:44:26.477000 -CVE-2012-5303,0,1,645fa3520b24eab6a3b0823336258b3103100c369cffa96da9ed3b19a76a5d5f,2024-11-21T01:44:26.593000 -CVE-2012-5304,0,1,3ce6b51ad1cfe2482e3751b63db927b445bf939ce77cb8aebc034f6cd57f3406,2024-11-21T01:44:26.720000 -CVE-2012-5305,0,1,2396da18245a61287b71efa9859199cb9b188ac81dd9977ca63323c28fc66756,2024-11-21T01:44:26.843000 -CVE-2012-5306,0,1,cfe88b63d9fbae8382843476bc94f728988e50cab30d1582635963ea09dbabdd,2024-11-21T01:44:26.977000 -CVE-2012-5307,0,1,ed0679e71ae7e7276a4dbd5037648a54b8ce8ad582ef26f3da496ea165e258c1,2024-11-21T01:44:27.137000 -CVE-2012-5308,0,1,f93ae31339e5df514849008e969dccce59c0e8f1bc9699ae88aeffa98df4c6b1,2024-11-21T01:44:27.280000 -CVE-2012-5309,0,1,208671d625fad804b41259f76710346d097e91941df2d4dfc98734efa9ba4b79,2024-11-21T01:44:27.413000 -CVE-2012-5310,0,1,c16dbcabe765a13bbf6690df47addeac0c8f74d03cf2705751e1a1d1627ed510,2024-11-21T01:44:27.560000 +CVE-2012-5285,0,0,a14c186cca0ba27e9dcd63c58a5bb438c42782270a2bb01d5597a41aad6b031e,2024-11-21T01:44:24.243000 +CVE-2012-5286,0,0,59fad3bf7339f97c15c23480025f8738cef7c9f0a4afce898191f888fd62f3ca,2024-11-21T01:44:24.357000 +CVE-2012-5287,0,0,f7d94b1e2455338fe4578fabf83a5f8a9940c171f29c8300ffaf5b3266ba54c5,2024-11-21T01:44:24.487000 +CVE-2012-5288,0,0,6860a9522aa49e2ed35b88674649afd0207aa18388003f32b545a0c9cb1f1f70,2024-11-21T01:44:24.617000 +CVE-2012-5289,0,0,1af6ee00a9b55c3925a2f9e322c4634674d73d84402ea099b14aaa241f70db72,2024-11-21T01:44:24.753000 +CVE-2012-5290,0,0,d612ac68c3e5eb073f37d2305459935aed5f971a634c89dcf47b256308c4a1b8,2024-11-21T01:44:24.883000 +CVE-2012-5291,0,0,1985df5ee6b1cd54c1808961dbc2f76b02b3602c2d6a202e5bf2a4c82a637ecd,2024-11-21T01:44:25.013000 +CVE-2012-5292,0,0,e2bc186087bd1e2929ecc3409033f55666d2e81ce8dee223b17705af8bc0384d,2024-11-21T01:44:25.143000 +CVE-2012-5293,0,0,e134564aac7ede067be2e794f9fa049d696f5641fe34619f2926534b3bf2238c,2024-11-21T01:44:25.270000 +CVE-2012-5294,0,0,b21a1ba40d1ce711eca634dd530ce3942016cbb0f6f1486d5e3c135481e6eadb,2024-11-21T01:44:25.407000 +CVE-2012-5295,0,0,a58f31ad5840e930941ec4f2a85cf6fe8b3cee471872d64ed955a3c87c301f78,2024-11-21T01:44:25.540000 +CVE-2012-5296,0,0,fd8671596c1d2ef16e42e17e701a55b4b1d8f507e305841c48f371cd8043750d,2024-11-21T01:44:25.670000 +CVE-2012-5297,0,0,e46dccd1f2192ddf63c97d700dbe8890999fa614f9ea690aac03ac781c9c7d64,2024-11-21T01:44:25.810000 +CVE-2012-5298,0,0,a104995112270fe7d93d02a8ddc57bd4eeff33e9f443ad9e2e2d0b4ba732e924,2024-11-21T01:44:25.940000 +CVE-2012-5299,0,0,2fafb5fb3502ff89be9fc0dfb2961514f99a3cd58a5ba869db10ff271b730f7c,2024-11-21T01:44:26.070000 +CVE-2012-5300,0,0,f2a3aaa8867b1a9a1ea34e7e0b64f2a75648d2f0aa17ca51383e624aa09836bd,2024-11-21T01:44:26.203000 +CVE-2012-5301,0,0,9032f2edd4b4d3e78017f0533044e4895c39164c0ea9aa2a8f0c729b72ffafeb,2024-11-21T01:44:26.333000 +CVE-2012-5302,0,0,e53a685b03e8a2ae1060f223c8269292753e1676239e1c6f9850cf31dc876a4d,2024-11-21T01:44:26.477000 +CVE-2012-5303,0,0,645fa3520b24eab6a3b0823336258b3103100c369cffa96da9ed3b19a76a5d5f,2024-11-21T01:44:26.593000 +CVE-2012-5304,0,0,3ce6b51ad1cfe2482e3751b63db927b445bf939ce77cb8aebc034f6cd57f3406,2024-11-21T01:44:26.720000 +CVE-2012-5305,0,0,2396da18245a61287b71efa9859199cb9b188ac81dd9977ca63323c28fc66756,2024-11-21T01:44:26.843000 +CVE-2012-5306,0,0,cfe88b63d9fbae8382843476bc94f728988e50cab30d1582635963ea09dbabdd,2024-11-21T01:44:26.977000 +CVE-2012-5307,0,0,ed0679e71ae7e7276a4dbd5037648a54b8ce8ad582ef26f3da496ea165e258c1,2024-11-21T01:44:27.137000 +CVE-2012-5308,0,0,f93ae31339e5df514849008e969dccce59c0e8f1bc9699ae88aeffa98df4c6b1,2024-11-21T01:44:27.280000 +CVE-2012-5309,0,0,208671d625fad804b41259f76710346d097e91941df2d4dfc98734efa9ba4b79,2024-11-21T01:44:27.413000 +CVE-2012-5310,0,0,c16dbcabe765a13bbf6690df47addeac0c8f74d03cf2705751e1a1d1627ed510,2024-11-21T01:44:27.560000 CVE-2012-5311,0,0,3793e9e2f3ebfb166b9559f5fc4d85343bee254e28a481ae315217450e0892b0,2023-11-07T02:12:31.027000 -CVE-2012-5312,0,1,8539134027e2419a24a1efb8e4fefa6ac476ab82d57448a0ca852a630d42b87c,2024-11-21T01:44:27.727000 -CVE-2012-5313,0,1,4f6cfa1e93078169e9e17dab2b8db540f9a2a1aad069a83d9177631cffb0a70b,2024-11-21T01:44:27.857000 -CVE-2012-5314,0,1,b79594328832feaf255dc43eee9fce552378cafe3e60736747a4d4699fcdd92b,2024-11-21T01:44:27.987000 -CVE-2012-5315,0,1,58f19e8f396c3373cc0b3b4f68baae5834bca3f267ccf9207a1df86efcba0cca,2024-11-21T01:44:28.120000 -CVE-2012-5316,0,1,a9230615d0796254cc1df9d90b767a8cd44be7051e4437b18f612ffd5c659c49,2024-11-21T01:44:28.253000 -CVE-2012-5317,0,1,6c922c7c6028701432544e264a2ca9e04738576536159471115a52b84bb53e9d,2024-11-21T01:44:28.390000 -CVE-2012-5318,0,1,6c59c54d6e75b408904dbcc7c57cde44f0c5a662d1fb8c98ce6b126f59f0f4bb,2024-11-21T01:44:28.523000 -CVE-2012-5319,0,1,f61acbfa7499f7d2f09511985b4bfb8562ac1de800ffde54d2c8388d566f442d,2024-11-21T01:44:28.663000 -CVE-2012-5320,0,1,700f44b15c44a7eb20d3068ffd923f9af3bf1464dcc5b3438de63664c8dcbcac,2024-11-21T01:44:28.800000 -CVE-2012-5321,0,1,21013f5b4dd38590885ad2e3660874a65bad2eeb166e59ba601dfdb32e2c0ad7,2024-11-21T01:44:28.940000 -CVE-2012-5322,0,1,ebb13f6933138c2375c3c53bd7570ad3144f88bd564eebc65fd8525b3f305467,2024-11-21T01:44:29.073000 -CVE-2012-5323,0,1,3619301d993c5094e25275bdecdd852f979c0f6a435b590d37f1ed62d238b1f8,2024-11-21T01:44:29.213000 -CVE-2012-5324,0,1,dbb43be46ddcce084720fedda853868184da8a998cde59df98e9dd6392d0c4c6,2024-11-21T01:44:29.350000 -CVE-2012-5325,0,1,ef7296c96e1e7637c292a183c8a702ace79d570dd9f0f7375ad7c8caa48a0af4,2024-11-21T01:44:29.493000 -CVE-2012-5326,0,1,c7bf2d0ecf1895771bf598d1d471645bbdddd5fcf7b367bf75fa3dc2ddd0fd5c,2024-11-21T01:44:29.630000 -CVE-2012-5327,0,1,5a3ee820560946f1717f1e254fa3f03a73ce0803de3cb1110f8cb0c1b4ebf799,2024-11-21T01:44:30.430000 -CVE-2012-5328,0,1,9fd99c8186d52bd305729836e4ae4e1a18e7f1a682ed3c29afceb5ec88191345,2024-11-21T01:44:30.870000 -CVE-2012-5329,0,1,3aefb2d0c90008e8051549a629e8bed35c781b8a5497a1525d20fe7ac5cbd966,2024-11-21T01:44:31.023000 -CVE-2012-5330,0,1,7f4b9c5a18929cdcf323aed44a5fa7fcc38062121824d52321b5b5b738fb57c0,2024-11-21T01:44:31.157000 -CVE-2012-5331,0,1,dd0f37fcef360d4ca6f9ee16ccbef8db2c552e9bbf0df5bbca68f0ca0f8971e8,2024-11-21T01:44:31.297000 -CVE-2012-5332,0,1,54c3e15ee00dde65cccdc07484cbf3129672fda14ba30c5f340ccb9e83881c52,2024-11-21T01:44:31.437000 -CVE-2012-5333,0,1,889883c36c879bf657d8f7e5c80bb56cf64ab03bb44544c9d0c949ed219f3465,2024-11-21T01:44:31.577000 -CVE-2012-5334,0,1,2bebfa7170767270bcb5e9b80d31933f5f273ca9a9eb9992145b960823814c91,2024-11-21T01:44:31.710000 -CVE-2012-5335,0,1,636b9673a79735b4d9de0814c946382b67b10f0bb00b764cafe804b97b483118,2024-11-21T01:44:31.860000 +CVE-2012-5312,0,0,8539134027e2419a24a1efb8e4fefa6ac476ab82d57448a0ca852a630d42b87c,2024-11-21T01:44:27.727000 +CVE-2012-5313,0,0,4f6cfa1e93078169e9e17dab2b8db540f9a2a1aad069a83d9177631cffb0a70b,2024-11-21T01:44:27.857000 +CVE-2012-5314,0,0,b79594328832feaf255dc43eee9fce552378cafe3e60736747a4d4699fcdd92b,2024-11-21T01:44:27.987000 +CVE-2012-5315,0,0,58f19e8f396c3373cc0b3b4f68baae5834bca3f267ccf9207a1df86efcba0cca,2024-11-21T01:44:28.120000 +CVE-2012-5316,0,0,a9230615d0796254cc1df9d90b767a8cd44be7051e4437b18f612ffd5c659c49,2024-11-21T01:44:28.253000 +CVE-2012-5317,0,0,6c922c7c6028701432544e264a2ca9e04738576536159471115a52b84bb53e9d,2024-11-21T01:44:28.390000 +CVE-2012-5318,0,0,6c59c54d6e75b408904dbcc7c57cde44f0c5a662d1fb8c98ce6b126f59f0f4bb,2024-11-21T01:44:28.523000 +CVE-2012-5319,0,0,f61acbfa7499f7d2f09511985b4bfb8562ac1de800ffde54d2c8388d566f442d,2024-11-21T01:44:28.663000 +CVE-2012-5320,0,0,700f44b15c44a7eb20d3068ffd923f9af3bf1464dcc5b3438de63664c8dcbcac,2024-11-21T01:44:28.800000 +CVE-2012-5321,0,0,21013f5b4dd38590885ad2e3660874a65bad2eeb166e59ba601dfdb32e2c0ad7,2024-11-21T01:44:28.940000 +CVE-2012-5322,0,0,ebb13f6933138c2375c3c53bd7570ad3144f88bd564eebc65fd8525b3f305467,2024-11-21T01:44:29.073000 +CVE-2012-5323,0,0,3619301d993c5094e25275bdecdd852f979c0f6a435b590d37f1ed62d238b1f8,2024-11-21T01:44:29.213000 +CVE-2012-5324,0,0,dbb43be46ddcce084720fedda853868184da8a998cde59df98e9dd6392d0c4c6,2024-11-21T01:44:29.350000 +CVE-2012-5325,0,0,ef7296c96e1e7637c292a183c8a702ace79d570dd9f0f7375ad7c8caa48a0af4,2024-11-21T01:44:29.493000 +CVE-2012-5326,0,0,c7bf2d0ecf1895771bf598d1d471645bbdddd5fcf7b367bf75fa3dc2ddd0fd5c,2024-11-21T01:44:29.630000 +CVE-2012-5327,0,0,5a3ee820560946f1717f1e254fa3f03a73ce0803de3cb1110f8cb0c1b4ebf799,2024-11-21T01:44:30.430000 +CVE-2012-5328,0,0,9fd99c8186d52bd305729836e4ae4e1a18e7f1a682ed3c29afceb5ec88191345,2024-11-21T01:44:30.870000 +CVE-2012-5329,0,0,3aefb2d0c90008e8051549a629e8bed35c781b8a5497a1525d20fe7ac5cbd966,2024-11-21T01:44:31.023000 +CVE-2012-5330,0,0,7f4b9c5a18929cdcf323aed44a5fa7fcc38062121824d52321b5b5b738fb57c0,2024-11-21T01:44:31.157000 +CVE-2012-5331,0,0,dd0f37fcef360d4ca6f9ee16ccbef8db2c552e9bbf0df5bbca68f0ca0f8971e8,2024-11-21T01:44:31.297000 +CVE-2012-5332,0,0,54c3e15ee00dde65cccdc07484cbf3129672fda14ba30c5f340ccb9e83881c52,2024-11-21T01:44:31.437000 +CVE-2012-5333,0,0,889883c36c879bf657d8f7e5c80bb56cf64ab03bb44544c9d0c949ed219f3465,2024-11-21T01:44:31.577000 +CVE-2012-5334,0,0,2bebfa7170767270bcb5e9b80d31933f5f273ca9a9eb9992145b960823814c91,2024-11-21T01:44:31.710000 +CVE-2012-5335,0,0,636b9673a79735b4d9de0814c946382b67b10f0bb00b764cafe804b97b483118,2024-11-21T01:44:31.860000 CVE-2012-5336,0,0,af4c1f05220f8e6be7dcc8efa0215a82c2807d1b2e9e41bce5bfae914539355b,2014-06-04T17:28:23.457000 -CVE-2012-5337,0,1,7a3e62e4dcde332259887f1fee46114afed9cdc3dfb3c6f0e44371df20ebd9b6,2024-11-21T01:44:32.170000 -CVE-2012-5338,0,1,593678ac3db8a07e88b3f6aa0f417692d90c4a662d8456135b8dd1f700ea63e8,2024-11-21T01:44:32.330000 -CVE-2012-5339,0,1,35e57d682556c8b3ee37fbb825ba62f586ea565deebcb64201bee3e778ded21c,2024-11-21T01:44:32.483000 +CVE-2012-5337,0,0,7a3e62e4dcde332259887f1fee46114afed9cdc3dfb3c6f0e44371df20ebd9b6,2024-11-21T01:44:32.170000 +CVE-2012-5338,0,0,593678ac3db8a07e88b3f6aa0f417692d90c4a662d8456135b8dd1f700ea63e8,2024-11-21T01:44:32.330000 +CVE-2012-5339,0,0,35e57d682556c8b3ee37fbb825ba62f586ea565deebcb64201bee3e778ded21c,2024-11-21T01:44:32.483000 CVE-2012-5340,0,0,3a5675fdde26160f7fb96b362c91d9be4b7492e2dbd7200a618f598cb9f6565e,2024-09-12T18:15:05.503000 -CVE-2012-5341,0,1,c1141fbed62726addadfc9a19b5b2e394daadd8b0be4a26fe3495caf16be4898,2024-11-21T01:44:32.820000 -CVE-2012-5342,0,1,553c86186fdab9208c58a0e85068391541930c7dc5f298294665c73a14188549,2024-11-21T01:44:32.970000 -CVE-2012-5343,0,1,4bb9f9b9685b9e53c4cf1a1c9140d1b3abf0156ecd745ba483a2fd687016f57f,2024-11-21T01:44:33.110000 -CVE-2012-5344,0,1,3ab89676f411bfca9484a5703b3d7b3484dd4137e9dc9348cb8c028f35ef30c4,2024-11-21T01:44:33.250000 -CVE-2012-5345,0,1,6e8e2cc4795b3b52f917438c8e5cf2182589d44a89825f1e022cd4fc42ac06ee,2024-11-21T01:44:33.383000 -CVE-2012-5346,0,1,1c592139973ed6edacbfbe117bdbefa6466df50b2b814268168b6dc44ff2a10b,2024-11-21T01:44:33.510000 -CVE-2012-5347,0,1,1a8c88d722b91b92a8ae726d11eb950735cb4b129df08b13ae56c6d616c6f60d,2024-11-21T01:44:33.647000 -CVE-2012-5348,0,1,4f4d6756c09536307c084bd05dddbf26e4eaf474978f1835452733fc0c005991,2024-11-21T01:44:33.773000 -CVE-2012-5349,0,1,b096ab592ebfa88e32b63fd7c88611d8480668290e87bbd195f9d1b62139b13b,2024-11-21T01:44:33.903000 -CVE-2012-5350,0,1,a1578840aa9e498ee64fcf9d2fbb5a42caf4e73ebe59cbd6a457aeb9c32407ed,2024-11-21T01:44:34.040000 -CVE-2012-5351,0,1,13302d193c52c803bf3d8cea126b24d9971c2d043f14026dcc95f00a4d8db1bb,2024-11-21T01:44:34.180000 -CVE-2012-5352,0,1,c08e74bdd44fdd34387cec1196aecc9dc82d9b8948185bcc0bee4a51b88e3f65,2024-11-21T01:44:34.317000 -CVE-2012-5353,0,1,8b4b1236e941c89c9c7ef98f6884e6f8ef282996e2c2d1830a2c158c3c14b13b,2024-11-21T01:44:34.450000 -CVE-2012-5354,0,1,303c9b65eb46181d024fe7627c4984c8bb9a64b36deaaba47a71b9480d33521a,2024-11-21T01:44:34.580000 -CVE-2012-5355,0,1,4f842dafe769bbb19ed8ebe6ca51fae2fa03623477134d0e8fb25cceb12edaaf,2024-11-21T01:44:34.720000 -CVE-2012-5356,0,1,f643859de321d6dd19e378f60a4ee824ccba5387d673e594b1f024ab2c1dd2a7,2024-11-21T01:44:34.863000 +CVE-2012-5341,0,0,c1141fbed62726addadfc9a19b5b2e394daadd8b0be4a26fe3495caf16be4898,2024-11-21T01:44:32.820000 +CVE-2012-5342,0,0,553c86186fdab9208c58a0e85068391541930c7dc5f298294665c73a14188549,2024-11-21T01:44:32.970000 +CVE-2012-5343,0,0,4bb9f9b9685b9e53c4cf1a1c9140d1b3abf0156ecd745ba483a2fd687016f57f,2024-11-21T01:44:33.110000 +CVE-2012-5344,0,0,3ab89676f411bfca9484a5703b3d7b3484dd4137e9dc9348cb8c028f35ef30c4,2024-11-21T01:44:33.250000 +CVE-2012-5345,0,0,6e8e2cc4795b3b52f917438c8e5cf2182589d44a89825f1e022cd4fc42ac06ee,2024-11-21T01:44:33.383000 +CVE-2012-5346,0,0,1c592139973ed6edacbfbe117bdbefa6466df50b2b814268168b6dc44ff2a10b,2024-11-21T01:44:33.510000 +CVE-2012-5347,0,0,1a8c88d722b91b92a8ae726d11eb950735cb4b129df08b13ae56c6d616c6f60d,2024-11-21T01:44:33.647000 +CVE-2012-5348,0,0,4f4d6756c09536307c084bd05dddbf26e4eaf474978f1835452733fc0c005991,2024-11-21T01:44:33.773000 +CVE-2012-5349,0,0,b096ab592ebfa88e32b63fd7c88611d8480668290e87bbd195f9d1b62139b13b,2024-11-21T01:44:33.903000 +CVE-2012-5350,0,0,a1578840aa9e498ee64fcf9d2fbb5a42caf4e73ebe59cbd6a457aeb9c32407ed,2024-11-21T01:44:34.040000 +CVE-2012-5351,0,0,13302d193c52c803bf3d8cea126b24d9971c2d043f14026dcc95f00a4d8db1bb,2024-11-21T01:44:34.180000 +CVE-2012-5352,0,0,c08e74bdd44fdd34387cec1196aecc9dc82d9b8948185bcc0bee4a51b88e3f65,2024-11-21T01:44:34.317000 +CVE-2012-5353,0,0,8b4b1236e941c89c9c7ef98f6884e6f8ef282996e2c2d1830a2c158c3c14b13b,2024-11-21T01:44:34.450000 +CVE-2012-5354,0,0,303c9b65eb46181d024fe7627c4984c8bb9a64b36deaaba47a71b9480d33521a,2024-11-21T01:44:34.580000 +CVE-2012-5355,0,0,4f842dafe769bbb19ed8ebe6ca51fae2fa03623477134d0e8fb25cceb12edaaf,2024-11-21T01:44:34.720000 +CVE-2012-5356,0,0,f643859de321d6dd19e378f60a4ee824ccba5387d673e594b1f024ab2c1dd2a7,2024-11-21T01:44:34.863000 CVE-2012-5357,0,0,2e2c57413d4499cf79db96241f1fb905167daabe733b465eef2b459d1ea52647,2017-11-18T17:39:58.597000 CVE-2012-5358,0,0,9049d7bc50b4969f1ec1eaa33e2c4fcf17aa3ddfd3bcee845d345e80ecb85331,2017-11-18T17:40:10.270000 CVE-2012-5359,0,0,c01912a46ce2016a55df92bc9c989f0f0530c14d654b58d115b2a157e83ebbb2,2018-02-23T15:58:57.383000 @@ -56600,70 +56600,70 @@ CVE-2012-5363,0,0,8f4fce0c896c23c44371f60ef5aedbfc3f556306c33ff39449b1aac8fc1141 CVE-2012-5364,0,0,ea29292835c6031a272b32dcc91a36bfa67df6d249bdb080e3d6349bdba99773,2020-02-28T15:46:22.190000 CVE-2012-5365,0,0,197f1fe751792128dcd1d5fcd81cd1dc3894b4fa4455df0c84f0b169cc98546d,2020-02-25T19:30:04.390000 CVE-2012-5366,0,0,a4f8cef01659282008697f1bffbdf84b7e34d8c48f4eae2ebdae8842b0fa123f,2020-02-25T19:33:47.650000 -CVE-2012-5367,0,1,115cd98117cd9903d8288ee73bbfe68db59e24a1f049e212991fc4b6f543b245,2024-11-21T01:44:36.417000 -CVE-2012-5368,0,1,d77e5f5e4038119c70c5c67b82b65348a74b7de5f5e85db580d9436b92488ac7,2024-11-21T01:44:36.547000 -CVE-2012-5370,0,1,066f1a8538ff98011cbc5402ce93b3f9d4563929772dbbd76af00006d36e4570,2024-11-21T01:44:36.677000 -CVE-2012-5371,0,1,e441a8d96370531f5f820611968ce178729845485fe7b15bc3c3f6ee1b370aa4,2024-11-21T01:44:36.817000 -CVE-2012-5372,0,1,f957cc67d7be7a5c726defeadc6a7a4a0953c502f51da74a81f115fd937103cc,2024-11-21T01:44:36.960000 -CVE-2012-5373,0,1,a0afb2d8acc5eea55a2aed089cc480c48b81a22036245083be590a92fb8f7a16,2024-11-21T01:44:37.100000 -CVE-2012-5374,0,1,b21d894b1ef9ea4182f939f173379d8e03d08e2bd1652d9155b80c7cd8569166,2024-11-21T01:44:37.237000 -CVE-2012-5375,0,1,9b29826eda04333811adf572dbd3b2aff46c0d4a4977cce0a8ecb2cf7962f988,2024-11-21T01:44:37.423000 -CVE-2012-5376,0,1,f348e127a96eaa940286beb6fe837b5a21f7621bafe1b7fc1df2c0cc80f824bc,2024-11-21T01:44:37.597000 -CVE-2012-5377,0,1,3e0fb4d615bd9d2a20bb15d9414f28f980cf24cb51d6ec1243e4604e8fb3d86f,2024-11-21T01:44:37.737000 -CVE-2012-5378,0,1,b73f61f02fb97e48c103c18d4e7dff246e770d059ea064f13ed23a6d1e964fa8,2024-11-21T01:44:37.877000 -CVE-2012-5379,0,1,a57fb004b930ab178776cab681f1e12bb58b0bef531fbc072cfa6b5aec0ca03a,2024-11-21T01:44:38.017000 -CVE-2012-5380,0,1,655fb636988651a0a20ae4dd97db8235db3a21a250f057c822b6e0bfa4c76ce5,2024-11-21T01:44:38.157000 -CVE-2012-5381,0,1,70555346a348e0f4aa0d8af7ea9882c03064e9988ba254eae2fa76397b82ff60,2024-11-21T01:44:38.360000 -CVE-2012-5382,0,1,2dae4e5245b245a6a85e2f33cdfbb1fb169a4e409110fcf890d2945775c19b01,2024-11-21T01:44:38.483000 -CVE-2012-5383,0,1,d0a303dd72d2ff762571df2015312c5852dc2642e905de940113c95f4dea99a8,2024-11-21T01:44:38.630000 -CVE-2012-5384,0,1,82481df172ebf6b38ef9383b6d5ed2ecdeba2db868e16117457ec5c03e1cfc42,2024-11-21T01:44:38.760000 -CVE-2012-5385,0,1,9c6d3c2679ef07c013352462b86e1f61b20455e3df69c5e20e8c589e26e4263f,2024-11-21T01:44:38.890000 -CVE-2012-5386,0,1,0128de77dd6b84a51c5dabfa07b3a4f5c8b4fb71f61a461a0646f29ecc5cfb03,2024-11-21T01:44:39.023000 -CVE-2012-5387,0,1,cb6ae8941b7624c5805687b96296135763197703d8e8f429e6326c10c25485c7,2024-11-21T01:44:39.150000 -CVE-2012-5388,0,1,1ecc0be1c274d8128453e637d0ea910a4be4c69daa6e5d3550a1fc76d77e61d8,2024-11-21T01:44:39.280000 +CVE-2012-5367,0,0,115cd98117cd9903d8288ee73bbfe68db59e24a1f049e212991fc4b6f543b245,2024-11-21T01:44:36.417000 +CVE-2012-5368,0,0,d77e5f5e4038119c70c5c67b82b65348a74b7de5f5e85db580d9436b92488ac7,2024-11-21T01:44:36.547000 +CVE-2012-5370,0,0,066f1a8538ff98011cbc5402ce93b3f9d4563929772dbbd76af00006d36e4570,2024-11-21T01:44:36.677000 +CVE-2012-5371,0,0,e441a8d96370531f5f820611968ce178729845485fe7b15bc3c3f6ee1b370aa4,2024-11-21T01:44:36.817000 +CVE-2012-5372,0,0,f957cc67d7be7a5c726defeadc6a7a4a0953c502f51da74a81f115fd937103cc,2024-11-21T01:44:36.960000 +CVE-2012-5373,0,0,a0afb2d8acc5eea55a2aed089cc480c48b81a22036245083be590a92fb8f7a16,2024-11-21T01:44:37.100000 +CVE-2012-5374,0,0,b21d894b1ef9ea4182f939f173379d8e03d08e2bd1652d9155b80c7cd8569166,2024-11-21T01:44:37.237000 +CVE-2012-5375,0,0,9b29826eda04333811adf572dbd3b2aff46c0d4a4977cce0a8ecb2cf7962f988,2024-11-21T01:44:37.423000 +CVE-2012-5376,0,0,f348e127a96eaa940286beb6fe837b5a21f7621bafe1b7fc1df2c0cc80f824bc,2024-11-21T01:44:37.597000 +CVE-2012-5377,0,0,3e0fb4d615bd9d2a20bb15d9414f28f980cf24cb51d6ec1243e4604e8fb3d86f,2024-11-21T01:44:37.737000 +CVE-2012-5378,0,0,b73f61f02fb97e48c103c18d4e7dff246e770d059ea064f13ed23a6d1e964fa8,2024-11-21T01:44:37.877000 +CVE-2012-5379,0,0,a57fb004b930ab178776cab681f1e12bb58b0bef531fbc072cfa6b5aec0ca03a,2024-11-21T01:44:38.017000 +CVE-2012-5380,0,0,655fb636988651a0a20ae4dd97db8235db3a21a250f057c822b6e0bfa4c76ce5,2024-11-21T01:44:38.157000 +CVE-2012-5381,0,0,70555346a348e0f4aa0d8af7ea9882c03064e9988ba254eae2fa76397b82ff60,2024-11-21T01:44:38.360000 +CVE-2012-5382,0,0,2dae4e5245b245a6a85e2f33cdfbb1fb169a4e409110fcf890d2945775c19b01,2024-11-21T01:44:38.483000 +CVE-2012-5383,0,0,d0a303dd72d2ff762571df2015312c5852dc2642e905de940113c95f4dea99a8,2024-11-21T01:44:38.630000 +CVE-2012-5384,0,0,82481df172ebf6b38ef9383b6d5ed2ecdeba2db868e16117457ec5c03e1cfc42,2024-11-21T01:44:38.760000 +CVE-2012-5385,0,0,9c6d3c2679ef07c013352462b86e1f61b20455e3df69c5e20e8c589e26e4263f,2024-11-21T01:44:38.890000 +CVE-2012-5386,0,0,0128de77dd6b84a51c5dabfa07b3a4f5c8b4fb71f61a461a0646f29ecc5cfb03,2024-11-21T01:44:39.023000 +CVE-2012-5387,0,0,cb6ae8941b7624c5805687b96296135763197703d8e8f429e6326c10c25485c7,2024-11-21T01:44:39.150000 +CVE-2012-5388,0,0,1ecc0be1c274d8128453e637d0ea910a4be4c69daa6e5d3550a1fc76d77e61d8,2024-11-21T01:44:39.280000 CVE-2012-5389,0,0,09b1eb94eb6bdb2a33c068a5efc428c8d44dd2253f6faad80129e873fdcbfee8,2020-01-28T21:02:49.230000 CVE-2012-5390,0,0,dae6b20c9a2f8e571949977549eb16dfefd6a291baeedbf06638c064eba64c8b,2014-06-09T13:18:03.410000 CVE-2012-5391,0,0,9edd839e7286735211dbab879fe93320bbd6336f407531a61d2c0195ea0f57e2,2017-08-29T01:32:40.510000 -CVE-2012-5394,0,1,789b1074a95509728af2bcbb530fca5b636b939923792750ef55f935285eb99a,2024-11-21T01:44:39.807000 +CVE-2012-5394,0,0,789b1074a95509728af2bcbb530fca5b636b939923792750ef55f935285eb99a,2024-11-21T01:44:39.807000 CVE-2012-5395,0,0,53d5df85d2531f748f7764006e3583fc3e6c1169b7a57363320e36c6cabc865b,2014-06-03T12:09:00.360000 -CVE-2012-5409,0,1,eabc282cca82f4201b5af708a84c0380445625a584d4af04e99ece06093aa2b5,2024-11-21T01:44:40.070000 -CVE-2012-5415,0,1,d7838be50ccc216775e29407ad135b8d24cd052c5c280f5cbea90c54e2389728,2024-11-21T01:44:40.197000 -CVE-2012-5416,0,1,7f0d3914b2f21504c1e9284be522b9386aad33974f60f6f022b1a27a2356d0b6,2024-11-21T01:44:40.293000 -CVE-2012-5417,0,1,bab135f914c431386c8c760cea2932017d68db30ab937a0990997b8c64e6ef5d,2024-11-21T01:44:40.393000 -CVE-2012-5419,0,1,ea4aaf06c092eb4659447c211f5e720a8c15007da94768e6ab56604619dc537a,2024-11-21T01:44:40.497000 -CVE-2012-5422,0,1,5d519edac942b44b83042014f804229ce8810fb09121b43efa6df7a58d70e83b,2024-11-21T01:44:40.593000 -CVE-2012-5424,0,1,c73498366bb18088fb6be554dab9c48c358dc59c9d4899475cd52345e7a7dd8f,2024-11-21T01:44:40.700000 -CVE-2012-5427,0,1,613c1bb743ec92624579335cf2ee8056a06afea2ca2537b1e67063c905f86059,2024-11-21T01:44:40.803000 -CVE-2012-5429,0,1,382a34970150ff679f8ef06313913d3156b9624380015bbe1e9d3eb7a50a8b34,2024-11-21T01:44:40.900000 -CVE-2012-5444,0,1,68ef5b971e6258913b0ffb7631e7daf081168624176665f0dd8a6103372478d3,2024-11-21T01:44:41 -CVE-2012-5445,0,1,1b8a8aa1f4153ec0ddb20e43c5cdd155baea0214b61a4e4b14dcf69feb62e835,2024-11-21T01:44:41.100000 -CVE-2012-5450,0,1,21e1dcd57ce2bc5561aa3ffdf834b60cc79ba3a4c4b831b31a3cb40f88853b64,2024-11-21T01:44:41.220000 +CVE-2012-5409,0,0,eabc282cca82f4201b5af708a84c0380445625a584d4af04e99ece06093aa2b5,2024-11-21T01:44:40.070000 +CVE-2012-5415,0,0,d7838be50ccc216775e29407ad135b8d24cd052c5c280f5cbea90c54e2389728,2024-11-21T01:44:40.197000 +CVE-2012-5416,0,0,7f0d3914b2f21504c1e9284be522b9386aad33974f60f6f022b1a27a2356d0b6,2024-11-21T01:44:40.293000 +CVE-2012-5417,0,0,bab135f914c431386c8c760cea2932017d68db30ab937a0990997b8c64e6ef5d,2024-11-21T01:44:40.393000 +CVE-2012-5419,0,0,ea4aaf06c092eb4659447c211f5e720a8c15007da94768e6ab56604619dc537a,2024-11-21T01:44:40.497000 +CVE-2012-5422,0,0,5d519edac942b44b83042014f804229ce8810fb09121b43efa6df7a58d70e83b,2024-11-21T01:44:40.593000 +CVE-2012-5424,0,0,c73498366bb18088fb6be554dab9c48c358dc59c9d4899475cd52345e7a7dd8f,2024-11-21T01:44:40.700000 +CVE-2012-5427,0,0,613c1bb743ec92624579335cf2ee8056a06afea2ca2537b1e67063c905f86059,2024-11-21T01:44:40.803000 +CVE-2012-5429,0,0,382a34970150ff679f8ef06313913d3156b9624380015bbe1e9d3eb7a50a8b34,2024-11-21T01:44:40.900000 +CVE-2012-5444,0,0,68ef5b971e6258913b0ffb7631e7daf081168624176665f0dd8a6103372478d3,2024-11-21T01:44:41 +CVE-2012-5445,0,0,1b8a8aa1f4153ec0ddb20e43c5cdd155baea0214b61a4e4b14dcf69feb62e835,2024-11-21T01:44:41.100000 +CVE-2012-5450,0,0,21e1dcd57ce2bc5561aa3ffdf834b60cc79ba3a4c4b831b31a3cb40f88853b64,2024-11-21T01:44:41.220000 CVE-2012-5451,0,0,f4a291cd8daddaa767ebcd2d1e195b236c57c61d023c6a136fbb5391c99fb9a8,2015-04-27T14:37:55.860000 -CVE-2012-5452,0,1,bcd145191cbe0762a834a286cc5b38d12a0a7ae7ae3366154728fb6e66c4b874,2024-11-21T01:44:41.497000 -CVE-2012-5453,0,1,6a2cbbc27f5c456613a858c5dbfd1e0b356dda26e2acd6f021dc47d90fccf605,2024-11-21T01:44:41.627000 -CVE-2012-5454,0,1,5c9967203495a4aa3dfa759f46b13e19dff22ca453e93102882bba4268c78118,2024-11-21T01:44:41.763000 -CVE-2012-5455,0,1,df6e81e92eb47d41453424d9fca16c80e9b5052e1ed34793cbdc2d9032d7e725,2024-11-21T01:44:41.917000 -CVE-2012-5456,0,1,d91f27e13ea3919a4f979215aed53683bbb4772b7a5e477c9e841a6bb222c734,2024-11-21T01:44:42.053000 -CVE-2012-5458,0,1,cd5a955a002313a8f2908031a8997b84d49abc919a10fc16febd46670061727d,2024-11-21T01:44:42.190000 -CVE-2012-5459,0,1,b327256d0111b636ff4da6928358de102a542e668a4177b1c9a7bff2ea07c1f0,2024-11-21T01:44:42.327000 -CVE-2012-5460,0,1,bab5637d416aa4791666b003b373ca3b4903a7b1b892a7bfbc1772fb99943c64,2024-11-21T01:44:42.477000 -CVE-2012-5468,0,1,0bc2f14a7888c5eecf4947253ec835c076214ab9a2f3914d4075c17d9c10c731,2024-11-21T01:44:42.620000 -CVE-2012-5469,0,1,2e109a7731af47dd3312be4ad6d8ebf81d86067fb45405151d104b7bcbf68cd3,2024-11-21T01:44:42.763000 -CVE-2012-5470,0,1,1da0c6a4d84ad692cafeba575cb853fa04434154cbca09f0363c1d2af8082edb,2024-11-21T01:44:42.903000 -CVE-2012-5471,0,1,7d893851606e12c37727cb5ebd33ba4fa09206d71876fb7dc6a2c70276eb5e12,2024-11-21T01:44:43.047000 -CVE-2012-5472,0,1,d86b5178d2908ad0ef73571c437e30c4ca2cd516a475c45d6baead256199792d,2024-11-21T01:44:43.160000 -CVE-2012-5473,0,1,c6453c03e586dd66d25298e016f9951f267648afcd6aed55d9e0da74a9bf99c5,2024-11-21T01:44:43.260000 +CVE-2012-5452,0,0,bcd145191cbe0762a834a286cc5b38d12a0a7ae7ae3366154728fb6e66c4b874,2024-11-21T01:44:41.497000 +CVE-2012-5453,0,0,6a2cbbc27f5c456613a858c5dbfd1e0b356dda26e2acd6f021dc47d90fccf605,2024-11-21T01:44:41.627000 +CVE-2012-5454,0,0,5c9967203495a4aa3dfa759f46b13e19dff22ca453e93102882bba4268c78118,2024-11-21T01:44:41.763000 +CVE-2012-5455,0,0,df6e81e92eb47d41453424d9fca16c80e9b5052e1ed34793cbdc2d9032d7e725,2024-11-21T01:44:41.917000 +CVE-2012-5456,0,0,d91f27e13ea3919a4f979215aed53683bbb4772b7a5e477c9e841a6bb222c734,2024-11-21T01:44:42.053000 +CVE-2012-5458,0,0,cd5a955a002313a8f2908031a8997b84d49abc919a10fc16febd46670061727d,2024-11-21T01:44:42.190000 +CVE-2012-5459,0,0,b327256d0111b636ff4da6928358de102a542e668a4177b1c9a7bff2ea07c1f0,2024-11-21T01:44:42.327000 +CVE-2012-5460,0,0,bab5637d416aa4791666b003b373ca3b4903a7b1b892a7bfbc1772fb99943c64,2024-11-21T01:44:42.477000 +CVE-2012-5468,0,0,0bc2f14a7888c5eecf4947253ec835c076214ab9a2f3914d4075c17d9c10c731,2024-11-21T01:44:42.620000 +CVE-2012-5469,0,0,2e109a7731af47dd3312be4ad6d8ebf81d86067fb45405151d104b7bcbf68cd3,2024-11-21T01:44:42.763000 +CVE-2012-5470,0,0,1da0c6a4d84ad692cafeba575cb853fa04434154cbca09f0363c1d2af8082edb,2024-11-21T01:44:42.903000 +CVE-2012-5471,0,0,7d893851606e12c37727cb5ebd33ba4fa09206d71876fb7dc6a2c70276eb5e12,2024-11-21T01:44:43.047000 +CVE-2012-5472,0,0,d86b5178d2908ad0ef73571c437e30c4ca2cd516a475c45d6baead256199792d,2024-11-21T01:44:43.160000 +CVE-2012-5473,0,0,c6453c03e586dd66d25298e016f9951f267648afcd6aed55d9e0da74a9bf99c5,2024-11-21T01:44:43.260000 CVE-2012-5474,0,0,715327af86c815e605c03dbe676a464fa3e2ef19d0df703990557d10ac34eb3e,2021-03-09T14:45:56.717000 CVE-2012-5475,0,0,a9606c94105cb6a52a50c814814fd450eb784c717585561a19159d7829e27323,2023-11-07T02:12:32.680000 CVE-2012-5476,0,0,138cab6ad3726e29e33bf5fb2ac967c24bd7f58c03098d0565abd9488646c9e7,2020-01-09T20:46:01.933000 -CVE-2012-5477,0,1,4ceb6827016e65b5d616c849359f39cd9637e5da219d4b8e0f3172d97b20daae,2024-11-21T01:44:43.603000 -CVE-2012-5478,0,1,9a8487f833adc707bf4fc520c6b0751534e30077af71b4f86620825db3f7b781,2024-11-21T01:44:43.707000 -CVE-2012-5479,0,1,32762a22b26724f18ccb48e9b6b0a9033fc745f7080fdddc73e2a3ed5b753763,2024-11-21T01:44:43.830000 -CVE-2012-5480,0,1,537173dbdd0ba42927de528351d834b2f515ed8fc1a135c4ccce18e207903fcd,2024-11-21T01:44:43.940000 -CVE-2012-5481,0,1,bdb22dc4dfe13bcd762eea0545eb570237f07b1107659c6a9afd52ad73ddd314,2024-11-21T01:44:44.050000 -CVE-2012-5482,0,1,906b0d087199ee8a83f082976ef212b496126bea5b02c155e5fb25fb79618792,2024-11-21T01:44:44.163000 -CVE-2012-5483,0,1,fb9fc2b7152c0fe9afb13def7e02860bc4a9a9d2d9f6d06700b4f29727d93a14,2024-11-21T01:44:44.287000 -CVE-2012-5484,0,1,6cc736596f76162c46ae317923cae47ca65e1da281ea2b29c716d990a84562ee,2024-11-21T01:44:44.390000 +CVE-2012-5477,0,0,4ceb6827016e65b5d616c849359f39cd9637e5da219d4b8e0f3172d97b20daae,2024-11-21T01:44:43.603000 +CVE-2012-5478,0,0,9a8487f833adc707bf4fc520c6b0751534e30077af71b4f86620825db3f7b781,2024-11-21T01:44:43.707000 +CVE-2012-5479,0,0,32762a22b26724f18ccb48e9b6b0a9033fc745f7080fdddc73e2a3ed5b753763,2024-11-21T01:44:43.830000 +CVE-2012-5480,0,0,537173dbdd0ba42927de528351d834b2f515ed8fc1a135c4ccce18e207903fcd,2024-11-21T01:44:43.940000 +CVE-2012-5481,0,0,bdb22dc4dfe13bcd762eea0545eb570237f07b1107659c6a9afd52ad73ddd314,2024-11-21T01:44:44.050000 +CVE-2012-5482,0,0,906b0d087199ee8a83f082976ef212b496126bea5b02c155e5fb25fb79618792,2024-11-21T01:44:44.163000 +CVE-2012-5483,0,0,fb9fc2b7152c0fe9afb13def7e02860bc4a9a9d2d9f6d06700b4f29727d93a14,2024-11-21T01:44:44.287000 +CVE-2012-5484,0,0,6cc736596f76162c46ae317923cae47ca65e1da281ea2b29c716d990a84562ee,2024-11-21T01:44:44.390000 CVE-2012-5485,0,0,eecb51393a3a25ed0036db6ac1e1ec355624a72e81c2fcc71546964196ba66a1,2023-02-13T04:35:34.227000 CVE-2012-5486,0,0,46e626432b5be6aa231542ba380ffd5c8b0882f1ff10b7b30b3c4d83d24ce9d1,2023-02-13T04:36:14.770000 CVE-2012-5487,0,0,98149c32a0f9e065812f2f0306202fec90273a7d942e203ba6b5418a91c74ec0,2014-10-01T14:28:43.953000 @@ -56688,89 +56688,89 @@ CVE-2012-5505,0,0,43142893ad8f2e79ffb4a6b9fef117f152afa09dc428f63acd9e4ea7d53271 CVE-2012-5506,0,0,a305c497b2ea68a98e8ee77ef6c0cccbab877accaeb739db60182c6d0d59fe50,2014-10-02T18:12:23.853000 CVE-2012-5507,0,0,9ce00a94269741a6b88c85c6716c1da856d415cacfcb32c212d3ccf821c9b8bf,2014-10-02T18:25:06.290000 CVE-2012-5508,0,0,781f191a5654d617dcf4baff3b4735cdb4b7bc0cd3619a7d8634838786fea625,2023-11-07T02:12:33.197000 -CVE-2012-5509,0,1,649a8cd74076fb3c43d935e0d6bb5902f7167936b1b6232472e529917ce2befa,2024-11-21T01:44:47.420000 -CVE-2012-5510,0,1,a6ddef84d254d4204a862679b09466228a0d3cb2b74da1959ae85df712858af5,2024-11-21T01:44:47.533000 -CVE-2012-5511,0,1,89a86a9b68b24263be00f446fad027d53036334e181accab8d66937dd8d75024,2024-11-21T01:44:47.700000 -CVE-2012-5512,0,1,95b8da925a2bc84c630b2d2fcb4f4b943edb91c0077a0f907f56246849e8c56b,2024-11-21T01:44:47.823000 -CVE-2012-5513,0,1,13f74f6b403e7a3382d490e86441271168efae0b18ece4f7ae7d9491af96ab6a,2024-11-21T01:44:47.937000 -CVE-2012-5514,0,1,1a027b9e646cf36d9aae3c362635289f38d2d679ca26fa34c7a4078d391be2a2,2024-11-21T01:44:48.073000 -CVE-2012-5515,0,1,d0fc32e438e6f3dbd956342819f79ecb520784eb89b5e1c6ae627ce84fcdf3c2,2024-11-21T01:44:48.207000 -CVE-2012-5516,0,1,1b05c1fa26c2d6bd22746c22a68697b17c0effe1545550614dbcc7a248fa3b6d,2024-11-21T01:44:48.347000 -CVE-2012-5517,0,1,31c78ca1a17bdd6e2e34883ec33228c2e1f188ecaba92f024c9855b7fd360df9,2024-11-21T01:44:48.453000 +CVE-2012-5509,0,0,649a8cd74076fb3c43d935e0d6bb5902f7167936b1b6232472e529917ce2befa,2024-11-21T01:44:47.420000 +CVE-2012-5510,0,0,a6ddef84d254d4204a862679b09466228a0d3cb2b74da1959ae85df712858af5,2024-11-21T01:44:47.533000 +CVE-2012-5511,0,0,89a86a9b68b24263be00f446fad027d53036334e181accab8d66937dd8d75024,2024-11-21T01:44:47.700000 +CVE-2012-5512,0,0,95b8da925a2bc84c630b2d2fcb4f4b943edb91c0077a0f907f56246849e8c56b,2024-11-21T01:44:47.823000 +CVE-2012-5513,0,0,13f74f6b403e7a3382d490e86441271168efae0b18ece4f7ae7d9491af96ab6a,2024-11-21T01:44:47.937000 +CVE-2012-5514,0,0,1a027b9e646cf36d9aae3c362635289f38d2d679ca26fa34c7a4078d391be2a2,2024-11-21T01:44:48.073000 +CVE-2012-5515,0,0,d0fc32e438e6f3dbd956342819f79ecb520784eb89b5e1c6ae627ce84fcdf3c2,2024-11-21T01:44:48.207000 +CVE-2012-5516,0,0,1b05c1fa26c2d6bd22746c22a68697b17c0effe1545550614dbcc7a248fa3b6d,2024-11-21T01:44:48.347000 +CVE-2012-5517,0,0,31c78ca1a17bdd6e2e34883ec33228c2e1f188ecaba92f024c9855b7fd360df9,2024-11-21T01:44:48.453000 CVE-2012-5518,0,0,d520c52026e045d22fea6414c0f9611eee5544aac0f4a1252015c4581308cecb,2019-12-09T17:00:28.327000 -CVE-2012-5519,0,1,0a23d2b1f5271d0f3b572d6aa3d79c2ac1e221aa4211df833354901ed7f65112,2024-11-21T01:44:48.700000 -CVE-2012-5520,0,1,e2e358b09a9d06306e6e1a168c619e93d4047baef81e9f63eaa890647ff2baa7,2024-11-21T01:44:48.823000 +CVE-2012-5519,0,0,0a23d2b1f5271d0f3b572d6aa3d79c2ac1e221aa4211df833354901ed7f65112,2024-11-21T01:44:48.700000 +CVE-2012-5520,0,0,e2e358b09a9d06306e6e1a168c619e93d4047baef81e9f63eaa890647ff2baa7,2024-11-21T01:44:48.823000 CVE-2012-5521,0,0,6934710b6c6effc62f974c5f850dfb600b99d7e32deba3f2c534b28ee6d5448f,2020-08-18T15:05:57.593000 -CVE-2012-5522,0,1,17691dc0162d71e79fdd1e75c50329e34e4aa606bfc25e3c4512a005671e7587,2024-11-21T01:44:49.067000 -CVE-2012-5523,0,1,a3c19ca0149bf37b2eeb73021fe92cb987a038c341d28bfdf18f8a649ea2a17a,2024-11-21T01:44:49.197000 -CVE-2012-5524,0,1,d1084f8b693ff1910b39a99c6d9b7522e50b7708e2ebe4a138d3c0fe99112984,2024-11-21T01:44:49.320000 -CVE-2012-5525,0,1,e6e776cfd8e7eadc63e664f81b8b0db3a1e36323360a685c042f3846ed8e54d6,2024-11-21T01:44:49.433000 -CVE-2012-5526,0,1,311b64832c4f40e620cabfe7712df78a4abcd262acff10a4177420973cc8d09e,2024-11-21T01:44:49.547000 +CVE-2012-5522,0,0,17691dc0162d71e79fdd1e75c50329e34e4aa606bfc25e3c4512a005671e7587,2024-11-21T01:44:49.067000 +CVE-2012-5523,0,0,a3c19ca0149bf37b2eeb73021fe92cb987a038c341d28bfdf18f8a649ea2a17a,2024-11-21T01:44:49.197000 +CVE-2012-5524,0,0,d1084f8b693ff1910b39a99c6d9b7522e50b7708e2ebe4a138d3c0fe99112984,2024-11-21T01:44:49.320000 +CVE-2012-5525,0,0,e6e776cfd8e7eadc63e664f81b8b0db3a1e36323360a685c042f3846ed8e54d6,2024-11-21T01:44:49.433000 +CVE-2012-5526,0,0,311b64832c4f40e620cabfe7712df78a4abcd262acff10a4177420973cc8d09e,2024-11-21T01:44:49.547000 CVE-2012-5527,0,0,93dd0409545bb63e9f2d083550fd4ffffd13bd0d5a53fd603e4c13a05753f6d9,2019-12-11T16:00:41.527000 CVE-2012-5528,0,0,dd87a0f2109bcea948dc199b0678f4aa61273d1242f05b3260ce06a673fd4f07,2023-11-07T02:12:33.483000 -CVE-2012-5529,0,1,19f9023ace709c8f5ad1e55a0167dba0e14efe6fd3614b3f02cff1c8bfe5cbd0,2024-11-21T01:44:49.793000 -CVE-2012-5530,0,1,33ed32abcefbd2e20a819a4533e94800d0620251ce31cfe653b26d6e65405338,2024-11-21T01:44:49.900000 -CVE-2012-5531,0,1,db3d31d19972c981bb70d796b711e77e8bfcb1c39bac69da2510263ed9c81aaa,2024-11-21T01:44:50.010000 -CVE-2012-5532,0,1,242f4331b96078592627f09504fd51e7bfa654a6eb39c4906bb12097be8b160b,2024-11-21T01:44:50.113000 -CVE-2012-5533,0,1,6944ce25c4dda94bfbc80d0dbcbb91fec490113f020cab0a3b9d54bd6513cbf1,2024-11-21T01:44:50.250000 -CVE-2012-5534,0,1,e15016a5aa02aa35ea9a87b708dfd051361e7dd0646cec81b2a2c8aba7587b2a,2024-11-21T01:44:50.380000 +CVE-2012-5529,0,0,19f9023ace709c8f5ad1e55a0167dba0e14efe6fd3614b3f02cff1c8bfe5cbd0,2024-11-21T01:44:49.793000 +CVE-2012-5530,0,0,33ed32abcefbd2e20a819a4533e94800d0620251ce31cfe653b26d6e65405338,2024-11-21T01:44:49.900000 +CVE-2012-5531,0,0,db3d31d19972c981bb70d796b711e77e8bfcb1c39bac69da2510263ed9c81aaa,2024-11-21T01:44:50.010000 +CVE-2012-5532,0,0,242f4331b96078592627f09504fd51e7bfa654a6eb39c4906bb12097be8b160b,2024-11-21T01:44:50.113000 +CVE-2012-5533,0,0,6944ce25c4dda94bfbc80d0dbcbb91fec490113f020cab0a3b9d54bd6513cbf1,2024-11-21T01:44:50.250000 +CVE-2012-5534,0,0,e15016a5aa02aa35ea9a87b708dfd051361e7dd0646cec81b2a2c8aba7587b2a,2024-11-21T01:44:50.380000 CVE-2012-5535,0,0,d0a27de3a8a1d045fb13f4b48abdc110188879e7e3a19408be4f18c0907016aa,2019-12-09T15:40:03.903000 -CVE-2012-5536,0,1,e66a497b39e66ff2c89b77a8aefb59734b8874de60549603d80359b1304e519d,2024-11-21T01:44:50.617000 -CVE-2012-5537,0,1,aa56470d6e67c5989f2ba5f8bb86e5a5d6cc28fe9792a1f6463b48586504045d,2024-11-21T01:44:50.727000 -CVE-2012-5538,0,1,7f030390a94486a72dc4333aa0186aed3394f3cef35f6b0ae78713f943428862,2024-11-21T01:44:50.833000 -CVE-2012-5539,0,1,265d8d9a0e7e66ea12e80261d6b16f1e57e93679e5236c622e51a5e4d498a3f3,2024-11-21T01:44:50.947000 -CVE-2012-5540,0,1,2439a7bae3baeb6e3caa25bf476fa395fabd575681ea222cc666f7b9b8b6ff2d,2024-11-21T01:44:51.057000 -CVE-2012-5541,0,1,c263ef44d656c3917fce4337dca823761e1559f6e327d7710ca64fcf6a1b2bec,2024-11-21T01:44:51.180000 -CVE-2012-5542,0,1,3474ca8898c9dd89a2c5f7a3d2e47b65380db9b22201a0ccfa827ba207d07daf,2024-11-21T01:44:51.303000 -CVE-2012-5543,0,1,f58e4423402020833aa27eecea49d219fb3683577b08bc1c83f0da51e4b4784d,2024-11-21T01:44:51.427000 -CVE-2012-5544,0,1,b87acaa2489e519165e2caa16a64c39000aa09c4217794f41086c1058d22cf89,2024-11-21T01:44:51.540000 -CVE-2012-5545,0,1,d49fb3b1c90ae70ff05ff07e4e2a678a663cf5d8ff870208bef0ea8d683c232b,2024-11-21T01:44:51.670000 +CVE-2012-5536,0,0,e66a497b39e66ff2c89b77a8aefb59734b8874de60549603d80359b1304e519d,2024-11-21T01:44:50.617000 +CVE-2012-5537,0,0,aa56470d6e67c5989f2ba5f8bb86e5a5d6cc28fe9792a1f6463b48586504045d,2024-11-21T01:44:50.727000 +CVE-2012-5538,0,0,7f030390a94486a72dc4333aa0186aed3394f3cef35f6b0ae78713f943428862,2024-11-21T01:44:50.833000 +CVE-2012-5539,0,0,265d8d9a0e7e66ea12e80261d6b16f1e57e93679e5236c622e51a5e4d498a3f3,2024-11-21T01:44:50.947000 +CVE-2012-5540,0,0,2439a7bae3baeb6e3caa25bf476fa395fabd575681ea222cc666f7b9b8b6ff2d,2024-11-21T01:44:51.057000 +CVE-2012-5541,0,0,c263ef44d656c3917fce4337dca823761e1559f6e327d7710ca64fcf6a1b2bec,2024-11-21T01:44:51.180000 +CVE-2012-5542,0,0,3474ca8898c9dd89a2c5f7a3d2e47b65380db9b22201a0ccfa827ba207d07daf,2024-11-21T01:44:51.303000 +CVE-2012-5543,0,0,f58e4423402020833aa27eecea49d219fb3683577b08bc1c83f0da51e4b4784d,2024-11-21T01:44:51.427000 +CVE-2012-5544,0,0,b87acaa2489e519165e2caa16a64c39000aa09c4217794f41086c1058d22cf89,2024-11-21T01:44:51.540000 +CVE-2012-5545,0,0,d49fb3b1c90ae70ff05ff07e4e2a678a663cf5d8ff870208bef0ea8d683c232b,2024-11-21T01:44:51.670000 CVE-2012-5546,0,0,cf5ce3266da1883eb5a7df7aad41348da4d5f4314a83e06a498af841180e0413,2023-11-07T02:12:34.130000 -CVE-2012-5547,0,1,78063446cb6726deb8868b13cbbf320b9dede7eed6cae1936afc20229aa02a29,2024-11-21T01:44:51.803000 -CVE-2012-5548,0,1,9f8caee7f74627b9b1a1d3c2c70fb3617eed104910159aa2bc13878345f0826f,2024-11-21T01:44:51.923000 -CVE-2012-5549,0,1,b59fccc816233b07c4692b4dae00a711a01898b95a0cd285c65e3ff0797ae482,2024-11-21T01:44:52.033000 -CVE-2012-5550,0,1,1c087ad6c8dd569e5fbf1b33d12c218bd07ca1a4d102a36830f8fe5540934218,2024-11-21T01:44:52.143000 -CVE-2012-5551,0,1,fdaf8bc6eda42a9cac648cb883d923a88d628af227a9df32d3bdd4691ec1671d,2024-11-21T01:44:52.250000 -CVE-2012-5552,0,1,c63adab2fc1a0eba46ca6fd0f911d75403a1429c177106ea48644cbec9180c19,2024-11-21T01:44:52.363000 -CVE-2012-5553,0,1,b8755685c806d4272aab1568d6eef77f6e68abd1579ee6f962922145f87c5478,2024-11-21T01:44:52.490000 -CVE-2012-5554,0,1,81c92d69edc9fed14b6c1d5782db13ccb85fc944172adcc8657315da41147145,2024-11-21T01:44:52.610000 +CVE-2012-5547,0,0,78063446cb6726deb8868b13cbbf320b9dede7eed6cae1936afc20229aa02a29,2024-11-21T01:44:51.803000 +CVE-2012-5548,0,0,9f8caee7f74627b9b1a1d3c2c70fb3617eed104910159aa2bc13878345f0826f,2024-11-21T01:44:51.923000 +CVE-2012-5549,0,0,b59fccc816233b07c4692b4dae00a711a01898b95a0cd285c65e3ff0797ae482,2024-11-21T01:44:52.033000 +CVE-2012-5550,0,0,1c087ad6c8dd569e5fbf1b33d12c218bd07ca1a4d102a36830f8fe5540934218,2024-11-21T01:44:52.143000 +CVE-2012-5551,0,0,fdaf8bc6eda42a9cac648cb883d923a88d628af227a9df32d3bdd4691ec1671d,2024-11-21T01:44:52.250000 +CVE-2012-5552,0,0,c63adab2fc1a0eba46ca6fd0f911d75403a1429c177106ea48644cbec9180c19,2024-11-21T01:44:52.363000 +CVE-2012-5553,0,0,b8755685c806d4272aab1568d6eef77f6e68abd1579ee6f962922145f87c5478,2024-11-21T01:44:52.490000 +CVE-2012-5554,0,0,81c92d69edc9fed14b6c1d5782db13ccb85fc944172adcc8657315da41147145,2024-11-21T01:44:52.610000 CVE-2012-5555,0,0,2570a57eb32df7a9de180f11c3e2f771a35a11843e5dabe2b0007433feff40e1,2023-11-07T02:12:34.460000 -CVE-2012-5556,0,1,2bd4f25677fa1bb7dcc5422763f7559809927b724021ea06c3710a6c5897f907,2024-11-21T01:44:52.750000 -CVE-2012-5557,0,1,f92cc986bbb9c2bf1976f108ea24ca836e2243233391903b53ccbccfc237754f,2024-11-21T01:44:52.890000 +CVE-2012-5556,0,0,2bd4f25677fa1bb7dcc5422763f7559809927b724021ea06c3710a6c5897f907,2024-11-21T01:44:52.750000 +CVE-2012-5557,0,0,f92cc986bbb9c2bf1976f108ea24ca836e2243233391903b53ccbccfc237754f,2024-11-21T01:44:52.890000 CVE-2012-5558,0,0,0ae1aa1945637fc3241477f176aeb2b0827d836da53f992e7dc93b5d4f1b7e15,2020-01-14T16:17:08.187000 -CVE-2012-5559,0,1,030c2dfda2d7da04d143d99755a66beaad33ed0279619fe988841e5b3283ec31,2024-11-21T01:44:53.140000 +CVE-2012-5559,0,0,030c2dfda2d7da04d143d99755a66beaad33ed0279619fe988841e5b3283ec31,2024-11-21T01:44:53.140000 CVE-2012-5560,0,0,76e662d6297c0e3f18a0e361c0c6a96ec9b797c114c3e82e521d49a304fbf2a8,2014-06-24T16:27:58.050000 -CVE-2012-5561,0,1,e032f949189a8a8cd93e6e571853af3370c83b5514ce0a6a3a34be770c9c2a7d,2024-11-21T01:44:53.370000 +CVE-2012-5561,0,0,e032f949189a8a8cd93e6e571853af3370c83b5514ce0a6a3a34be770c9c2a7d,2024-11-21T01:44:53.370000 CVE-2012-5562,0,0,694379082e82a62603c234e326ad40fc64d66bbffd3f0bcb469fe749ea9fbd64,2019-12-13T21:35:16.030000 -CVE-2012-5563,0,1,685a00fa3213724c74433b078aac278512c8e23ce865bb44513987ca3afc16cb,2024-11-21T01:44:53.587000 -CVE-2012-5564,0,1,c17dd29768b089c381954fbf1e1435775644904931e2a9610ee01d40f5485558,2024-11-21T01:44:53.717000 -CVE-2012-5565,0,1,c2a6575224770d1555ac2ae69b40d277fc39b4332839305c194ecf77d0dc2923,2024-11-21T01:44:53.833000 -CVE-2012-5566,0,1,25a82d08a7427993bd114e53b065eed2a98b201d9284e4c073edda7a6de99bb1,2024-11-21T01:44:53.960000 -CVE-2012-5567,0,1,9ba86a46b7ee98c67769f45a92b3773c1338d0d8cdd8977a5bf4c366e5c1372a,2024-11-21T01:44:54.090000 -CVE-2012-5568,0,1,880c80a825a13dd3458d0c92887adbb906d124167dffdcaa29ffd2a8894ce90b,2024-11-21T01:44:54.230000 -CVE-2012-5569,0,1,9cc6c9432af84eabde6e42470c17776272852ec4b8915b6ac9bd172cf10a571a,2024-11-21T01:44:54.367000 +CVE-2012-5563,0,0,685a00fa3213724c74433b078aac278512c8e23ce865bb44513987ca3afc16cb,2024-11-21T01:44:53.587000 +CVE-2012-5564,0,0,c17dd29768b089c381954fbf1e1435775644904931e2a9610ee01d40f5485558,2024-11-21T01:44:53.717000 +CVE-2012-5565,0,0,c2a6575224770d1555ac2ae69b40d277fc39b4332839305c194ecf77d0dc2923,2024-11-21T01:44:53.833000 +CVE-2012-5566,0,0,25a82d08a7427993bd114e53b065eed2a98b201d9284e4c073edda7a6de99bb1,2024-11-21T01:44:53.960000 +CVE-2012-5567,0,0,9ba86a46b7ee98c67769f45a92b3773c1338d0d8cdd8977a5bf4c366e5c1372a,2024-11-21T01:44:54.090000 +CVE-2012-5568,0,0,880c80a825a13dd3458d0c92887adbb906d124167dffdcaa29ffd2a8894ce90b,2024-11-21T01:44:54.230000 +CVE-2012-5569,0,0,9cc6c9432af84eabde6e42470c17776272852ec4b8915b6ac9bd172cf10a571a,2024-11-21T01:44:54.367000 CVE-2012-5570,0,0,08b4a5dcf09c6032d1e674238f8be84f05c09f7b043d6de1da8af833244be410,2020-03-16T19:50:03.573000 -CVE-2012-5571,0,1,84f81c89fd289590e7f872b45e907d03c2843b072f40df2c10d5d2f4f4806e1d,2024-11-21T01:44:54.593000 +CVE-2012-5571,0,0,84f81c89fd289590e7f872b45e907d03c2843b072f40df2c10d5d2f4f4806e1d,2024-11-21T01:44:54.593000 CVE-2012-5572,0,0,283f51d5a95077a45efb1c8a0d95f6a328b3b1d4d8e726eea34de3512b7d3a05,2014-06-24T17:07:07.270000 -CVE-2012-5573,0,1,8c13afe9fad1a1098252018caad7a165945d25898404f794902fbdc1c7ec389e,2024-11-21T01:44:54.833000 -CVE-2012-5574,0,1,27a1cc634a1aa3e9a6dbf45fad24ce3310c26d6d3e48dead775e79f339a46773,2024-11-21T01:44:54.963000 -CVE-2012-5575,0,1,5d05367c722a504179480dd0e8d7dae1ba94c14cb8d6e066edfd8579e7d98bf5,2024-11-21T01:44:55.097000 -CVE-2012-5576,0,1,754e11197ac836de7756243c9e0124d03dd805bd22b1ae0f1a76c8709f96959d,2024-11-21T01:44:55.233000 +CVE-2012-5573,0,0,8c13afe9fad1a1098252018caad7a165945d25898404f794902fbdc1c7ec389e,2024-11-21T01:44:54.833000 +CVE-2012-5574,0,0,27a1cc634a1aa3e9a6dbf45fad24ce3310c26d6d3e48dead775e79f339a46773,2024-11-21T01:44:54.963000 +CVE-2012-5575,0,0,5d05367c722a504179480dd0e8d7dae1ba94c14cb8d6e066edfd8579e7d98bf5,2024-11-21T01:44:55.097000 +CVE-2012-5576,0,0,754e11197ac836de7756243c9e0124d03dd805bd22b1ae0f1a76c8709f96959d,2024-11-21T01:44:55.233000 CVE-2012-5577,0,0,dcf37f5b2dfa3670f588848e0a19ebc0b8d0c63de3781f894fd2a7b0ac014838,2019-10-31T20:11:38.153000 CVE-2012-5578,0,0,2bb8ff850a9a0ca05cabfbfb7d979edc498fef023f130f865572425898266fe4,2019-12-04T15:55:55.940000 CVE-2012-5579,0,0,978f26a2b878630ccc1be9ecc111464b96bc73b0e1f30af6f12aed5495ac8fa1,2023-11-07T02:12:34.930000 CVE-2012-5580,0,0,2578264d8234f4d2d4d72c60ac0d125dbfac794adeb39f1575821dd9b5aa69e6,2017-08-29T01:32:42.887000 -CVE-2012-5581,0,1,8ca4b65e40cac560fa0f8e359256872311ac15b466b0860f7d51efc7ebc982de,2024-11-21T01:44:55.727000 +CVE-2012-5581,0,0,8ca4b65e40cac560fa0f8e359256872311ac15b466b0860f7d51efc7ebc982de,2024-11-21T01:44:55.727000 CVE-2012-5582,0,0,6d4526d7ef9bd8145335bdeb51172487fd790222cb6ec0c64f0e4dacab1c923c,2019-12-09T17:10:48.370000 CVE-2012-5583,0,0,f900a643429ed54a2d53969219c5939062a3028abee189699c2ee61e82a654c9,2019-12-30T12:59:24.217000 -CVE-2012-5584,0,1,c09a76005b1037715554df23c80109bf4df197b6b04cbcdce4bfb5c4d80bc947,2024-11-21T01:44:56.083000 -CVE-2012-5585,0,1,f1364717c1f237ba58cb2892d257cefcd49c1bcefbd34efa46c191dcfac52e1c,2024-11-21T01:44:56.190000 -CVE-2012-5586,0,1,1eb9efe6a79c9cfd0e9e2c955cf8a7e1934c5c79b8853857847e5e59fde4dbe3,2024-11-21T01:44:56.303000 -CVE-2012-5587,0,1,8e1d2d619f657d802604c0472b867838110eae76c37063a3816550d37ed477bd,2024-11-21T01:44:56.420000 -CVE-2012-5588,0,1,7faf06811e074c0caf54c0427786fc97914ccadeb96d3b0c660c9e7b6e475476,2024-11-21T01:44:56.530000 -CVE-2012-5589,0,1,30fdc86c250cb92f1859641a9c8a81f6962334072b745afe18e320f92655dd96,2024-11-21T01:44:56.633000 -CVE-2012-5590,0,1,644206db0b9990a5b46212dd65bb6bf467655dcd5b4338f3cdcc25e55788db5a,2024-11-21T01:44:56.757000 -CVE-2012-5591,0,1,e9b635d098917fad7caa9245f2c1c03cc50bc7688f334bc0d0e1f53b8484fd08,2024-11-21T01:44:56.867000 +CVE-2012-5584,0,0,c09a76005b1037715554df23c80109bf4df197b6b04cbcdce4bfb5c4d80bc947,2024-11-21T01:44:56.083000 +CVE-2012-5585,0,0,f1364717c1f237ba58cb2892d257cefcd49c1bcefbd34efa46c191dcfac52e1c,2024-11-21T01:44:56.190000 +CVE-2012-5586,0,0,1eb9efe6a79c9cfd0e9e2c955cf8a7e1934c5c79b8853857847e5e59fde4dbe3,2024-11-21T01:44:56.303000 +CVE-2012-5587,0,0,8e1d2d619f657d802604c0472b867838110eae76c37063a3816550d37ed477bd,2024-11-21T01:44:56.420000 +CVE-2012-5588,0,0,7faf06811e074c0caf54c0427786fc97914ccadeb96d3b0c660c9e7b6e475476,2024-11-21T01:44:56.530000 +CVE-2012-5589,0,0,30fdc86c250cb92f1859641a9c8a81f6962334072b745afe18e320f92655dd96,2024-11-21T01:44:56.633000 +CVE-2012-5590,0,0,644206db0b9990a5b46212dd65bb6bf467655dcd5b4338f3cdcc25e55788db5a,2024-11-21T01:44:56.757000 +CVE-2012-5591,0,0,e9b635d098917fad7caa9245f2c1c03cc50bc7688f334bc0d0e1f53b8484fd08,2024-11-21T01:44:56.867000 CVE-2012-5592,0,0,f8a0612427e1cb0810b450f0ab2fa96be6f24407428eddf2a55080a41153ac8c,2023-11-07T02:12:35.280000 CVE-2012-5593,0,0,bd3be09e41703e721f3d26afb447672d7bfad5841609101eba8df05fe03c21ce,2023-11-07T02:12:35.503000 CVE-2012-5594,0,0,a17b335714f2a10cc00a1483e6bf5815438339121ae4944f98551fa749ca3c31,2023-11-07T02:12:35.720000 @@ -56782,96 +56782,96 @@ CVE-2012-5599,0,0,c02bcf0806aa6371c8f2280100030b591135a38dfbf5ca3930f2bf5e414ee3 CVE-2012-5600,0,0,1913ba315d3a80e6746b53339bd0ab5f94f318e62d314354601cbf906a3f8519,2023-11-07T02:12:37.030000 CVE-2012-5601,0,0,5a9cfc5455759316f55e3656313f0edbe854028f487102d37c1be22add4a0048,2023-11-07T02:12:37.253000 CVE-2012-5602,0,0,2cb5a678da587a26e1cc072c2bf21a0b7bb94062f76b4fb87e155c3391a9a127,2023-11-07T02:12:37.483000 -CVE-2012-5603,0,1,fa4a64ce5b3104870c7ce3932570a26fda7c61079ec6edef294da81fd17ac9ca,2024-11-21T01:44:57.130000 -CVE-2012-5604,0,1,24a3b328523b6edd1c3476dc4629c6a2021e0f2dd56e570b26d6aac8816370b7,2024-11-21T01:44:57.243000 -CVE-2012-5605,0,1,8fb1273b9901379c982f14b8af9de0ae796224ba0287d10bc37713725bccb630,2024-11-21T01:44:57.350000 -CVE-2012-5606,0,1,b96346325a40122115735f7b8a2782495065afb46b1ef235d9feea46fa224038,2024-11-21T01:44:57.457000 -CVE-2012-5607,0,1,2b7dcacbf19ef548438eb4c2a772e24e6f72de81c09f2dc70738420125c0ab60,2024-11-21T01:44:57.567000 -CVE-2012-5608,0,1,18b8d5a392f15e04c039b38fba38b0b10603a341ac8d435582edcdbfba0a0cba,2024-11-21T01:44:57.670000 -CVE-2012-5609,0,1,76d7180cd75f651e9cd8d97f1bd04ac063b79bc7f841c032f07a82910c8334c7,2024-11-21T01:44:57.780000 -CVE-2012-5610,0,1,7ff0339003620009aae00ee029e61be8b3a9c4f8b68781f5dd60944d0e8fc51e,2024-11-21T01:44:57.907000 -CVE-2012-5611,0,1,cbc8955fe5dc46a65b01ad7cb1fc70cd9fab2648cd70acefcdde9436c576fc06,2024-11-21T01:44:58.063000 -CVE-2012-5612,0,1,fed48379b843e870d597d81bfa26f1f20f1c9a3939b9128e2df2447273f40c17,2024-11-21T01:44:58.247000 -CVE-2012-5613,0,1,d42a8842e26930830fa9d1832ed657bf9a1b653ce9294cf1f5214ea0caa968bc,2024-11-21T01:44:58.403000 -CVE-2012-5614,0,1,1587c916ec5d1ab3a97fb1268b876448e4e3bb2c143b21fbff6a2538642b1f90,2024-11-21T01:44:58.547000 -CVE-2012-5615,0,1,1ecb91cfff7ea36fabaf8b1e32d28a052d98b8545f3e4b7f4b9b3bdf3bda66bf,2024-11-21T01:44:58.720000 -CVE-2012-5616,0,1,91c975bf33ad07769d145c6823537d1c1d45c64367c2100bbf00859d7cd13fb2,2024-11-21T01:44:58.833000 +CVE-2012-5603,0,0,fa4a64ce5b3104870c7ce3932570a26fda7c61079ec6edef294da81fd17ac9ca,2024-11-21T01:44:57.130000 +CVE-2012-5604,0,0,24a3b328523b6edd1c3476dc4629c6a2021e0f2dd56e570b26d6aac8816370b7,2024-11-21T01:44:57.243000 +CVE-2012-5605,0,0,8fb1273b9901379c982f14b8af9de0ae796224ba0287d10bc37713725bccb630,2024-11-21T01:44:57.350000 +CVE-2012-5606,0,0,b96346325a40122115735f7b8a2782495065afb46b1ef235d9feea46fa224038,2024-11-21T01:44:57.457000 +CVE-2012-5607,0,0,2b7dcacbf19ef548438eb4c2a772e24e6f72de81c09f2dc70738420125c0ab60,2024-11-21T01:44:57.567000 +CVE-2012-5608,0,0,18b8d5a392f15e04c039b38fba38b0b10603a341ac8d435582edcdbfba0a0cba,2024-11-21T01:44:57.670000 +CVE-2012-5609,0,0,76d7180cd75f651e9cd8d97f1bd04ac063b79bc7f841c032f07a82910c8334c7,2024-11-21T01:44:57.780000 +CVE-2012-5610,0,0,7ff0339003620009aae00ee029e61be8b3a9c4f8b68781f5dd60944d0e8fc51e,2024-11-21T01:44:57.907000 +CVE-2012-5611,0,0,cbc8955fe5dc46a65b01ad7cb1fc70cd9fab2648cd70acefcdde9436c576fc06,2024-11-21T01:44:58.063000 +CVE-2012-5612,0,0,fed48379b843e870d597d81bfa26f1f20f1c9a3939b9128e2df2447273f40c17,2024-11-21T01:44:58.247000 +CVE-2012-5613,0,0,d42a8842e26930830fa9d1832ed657bf9a1b653ce9294cf1f5214ea0caa968bc,2024-11-21T01:44:58.403000 +CVE-2012-5614,0,0,1587c916ec5d1ab3a97fb1268b876448e4e3bb2c143b21fbff6a2538642b1f90,2024-11-21T01:44:58.547000 +CVE-2012-5615,0,0,1ecb91cfff7ea36fabaf8b1e32d28a052d98b8545f3e4b7f4b9b3bdf3bda66bf,2024-11-21T01:44:58.720000 +CVE-2012-5616,0,0,91c975bf33ad07769d145c6823537d1c1d45c64367c2100bbf00859d7cd13fb2,2024-11-21T01:44:58.833000 CVE-2012-5617,0,0,3d970241c0f351abdf348e89c73dba2a2983ed4b069f527cb462d17dc0733ab8,2021-06-02T13:35:31.513000 CVE-2012-5618,0,0,61e935a1ce51e6bfcc436404608aa3c3e35ddc6b8770f67944200a31d6f04a6a,2020-02-12T15:52:27.970000 CVE-2012-5619,0,0,92afe80493433d52bd2a496d111e77fad8a1868e7a94b0e1947c01769e1eefce,2014-09-30T17:47:07.543000 CVE-2012-5620,0,0,e59a7d5e1a60a7bab195c4bb9825e7d5968b380bec7d101537e16790adba39f6,2023-11-07T02:12:37.963000 CVE-2012-5621,0,0,976234fd9ec9e33778aab27737c6b214424d136ced04682aa9a9ff25d5a21102,2017-08-29T01:32:43.247000 -CVE-2012-5622,0,1,e537bd2d148cfc96eed749da651203db89532a8f07d773822352981384229e16,2024-11-21T01:44:59.430000 +CVE-2012-5622,0,0,e537bd2d148cfc96eed749da651203db89532a8f07d773822352981384229e16,2024-11-21T01:44:59.430000 CVE-2012-5623,0,0,497559bf5c9b829dae293dcd0eec9c903d1f0b6280d83ec7edd517776e8e8463,2020-03-10T17:31:21.017000 -CVE-2012-5624,0,1,0918732565f9576cb3bae60abdfd2b562d81098afd5e64aa4cdff1f8452ca439,2024-11-21T01:44:59.663000 -CVE-2012-5625,0,1,2dd24a1180c0458b89473ff8e4f5d7935468479859f3de7abbc8ffed9ca3075e,2024-11-21T01:44:59.797000 +CVE-2012-5624,0,0,0918732565f9576cb3bae60abdfd2b562d81098afd5e64aa4cdff1f8452ca439,2024-11-21T01:44:59.663000 +CVE-2012-5625,0,0,2dd24a1180c0458b89473ff8e4f5d7935468479859f3de7abbc8ffed9ca3075e,2024-11-21T01:44:59.797000 CVE-2012-5626,0,0,121a3dca5774c9a0f1d182cff9fa524b81c7c63f049f1aa7850b6e5427625b0f,2020-02-05T17:45:36.683000 -CVE-2012-5627,0,1,61436c25ae3788102128ead405d8410a76cb648ddd7fc70eae30d6700f850095,2024-11-21T01:45:00.053000 +CVE-2012-5627,0,0,61436c25ae3788102128ead405d8410a76cb648ddd7fc70eae30d6700f850095,2024-11-21T01:45:00.053000 CVE-2012-5628,0,0,86ba9eb726ee6f0057282239ca13ceee0ac57314c918652132e71ef8ba9b288e,2018-06-07T17:19:53.460000 -CVE-2012-5629,0,1,1251baa360f8c4f20e80dfa3f74db8df22e8f818425353fd95a1a51ccfa765ee,2024-11-21T01:45:00.287000 +CVE-2012-5629,0,0,1251baa360f8c4f20e80dfa3f74db8df22e8f818425353fd95a1a51ccfa765ee,2024-11-21T01:45:00.287000 CVE-2012-5630,0,0,d4b84dd104e7a1605d5adcf9d840373b68d746f54727964bdd307221c9041004,2019-12-04T15:43:30.810000 CVE-2012-5631,0,0,b638dc989b9ce07e00105dd3077ab1c48783aa239510ae3c868125b9517f49ba,2019-12-09T15:07:25.720000 CVE-2012-5632,0,0,4246b4371c08a6c956cf06b1faafd3c66845bbc941220b49289b2ddd9b9f89c6,2023-11-07T02:12:38.370000 -CVE-2012-5633,0,1,31b2be206556605a3cda511bd18938c145b82237c2cc3158ea064f8ef369e2a8,2024-11-21T01:45:00.657000 -CVE-2012-5634,0,1,c4ccc3ce266f97005e56bd225830ea1fd96e903c0458d55f88eaa62da57f4d0f,2024-11-21T01:45:00.807000 -CVE-2012-5635,0,1,250fa72c08bd1e075bd81e646a92bdcff4dafbd83bf81f9fc0b3e40da48e62a4,2024-11-21T01:45:00.917000 +CVE-2012-5633,0,0,31b2be206556605a3cda511bd18938c145b82237c2cc3158ea064f8ef369e2a8,2024-11-21T01:45:00.657000 +CVE-2012-5634,0,0,c4ccc3ce266f97005e56bd225830ea1fd96e903c0458d55f88eaa62da57f4d0f,2024-11-21T01:45:00.807000 +CVE-2012-5635,0,0,250fa72c08bd1e075bd81e646a92bdcff4dafbd83bf81f9fc0b3e40da48e62a4,2024-11-21T01:45:00.917000 CVE-2012-5636,0,0,9dc0e014e2a8ced84c78cb5b94d49fb0acd4de27ab628d6a3a2b112581ea29d7,2017-11-18T16:08:36.783000 CVE-2012-5637,0,0,e31b1b47da8bff267ddd514b3968788f516ec494349bc877f0c376cc71b37765,2023-11-07T02:12:38.633000 -CVE-2012-5638,0,1,e41d0aaa7689647f395ea6b72528278f627c7b87e3e446b8ad51a13137ed08e3,2024-11-21T01:45:01.197000 +CVE-2012-5638,0,0,e41d0aaa7689647f395ea6b72528278f627c7b87e3e446b8ad51a13137ed08e3,2024-11-21T01:45:01.197000 CVE-2012-5639,0,0,5ccb5439619aea2d309dbf7556990243001bc41acc18911ad06a4ccda4c565bc,2024-01-04T00:15:10.050000 CVE-2012-5640,0,0,68009aa97aee6114980497a339ea6bbbdaf39267b22fd69b5d7bc2a501e8ccc7,2019-12-04T16:18:40.117000 -CVE-2012-5641,0,1,9cd7cd9a01e1a9c76b93532072f21cd8630353e77472f1030faab7b2cbf39f33,2024-11-21T01:45:01.600000 -CVE-2012-5642,0,1,b1a962b5a8a6d6c66223f7c868d253cf2f5f686b9f8a7db98d14598866f5300a,2024-11-21T01:45:01.733000 -CVE-2012-5643,0,1,81373993c39d6256f93295a5fed7ecb6adbd164b505da0292053c95f59096749,2024-11-21T01:45:01.867000 +CVE-2012-5641,0,0,9cd7cd9a01e1a9c76b93532072f21cd8630353e77472f1030faab7b2cbf39f33,2024-11-21T01:45:01.600000 +CVE-2012-5642,0,0,b1a962b5a8a6d6c66223f7c868d253cf2f5f686b9f8a7db98d14598866f5300a,2024-11-21T01:45:01.733000 +CVE-2012-5643,0,0,81373993c39d6256f93295a5fed7ecb6adbd164b505da0292053c95f59096749,2024-11-21T01:45:01.867000 CVE-2012-5644,0,0,d969312d9abffa0825e22287d3a533d4d9e31a460a193114b7d42c07327c56eb,2020-08-18T15:05:57.937000 CVE-2012-5645,0,0,1d8727df9375dcef7f64d4ed39ecb7360b10e31071d6c99720461ec3b0c17bbc,2020-01-03T17:46:23.457000 -CVE-2012-5646,0,1,f4675864fc5e9b12cb41c964317fa0311fa87fcc3035a14925686be319c80a3a,2024-11-21T01:45:02.310000 -CVE-2012-5647,0,1,93ae576a2a0069e7757e025d96b071fc4b6a4edafa862a3f8c68c8f7829e4af3,2024-11-21T01:45:02.437000 -CVE-2012-5648,0,1,440e76426f70e4dd32acc996122ecfc4e06f1554c678fcaf7735f8aa6ab6220d,2024-11-21T01:45:02.547000 -CVE-2012-5649,0,1,d3581b31879cf10928625e2593497a6d6f2d168c49dd695d5432449a04fdbfa1,2024-11-21T01:45:02.680000 -CVE-2012-5650,0,1,88ea2b47e37c67f24191c190fac31b936caee89b00ca5948efd6f029f3fbea61,2024-11-21T01:45:02.827000 -CVE-2012-5651,0,1,625e8fb74a3fc52deb7bf23c0ca75b2c3daf406ca4d0f8ee94c9d90417a12fd6,2024-11-21T01:45:02.957000 -CVE-2012-5652,0,1,670c2912ad895e4377ca7b985bb910abeca71a4ef84a16efbadc71b0c9aa700d,2024-11-21T01:45:03.113000 -CVE-2012-5653,0,1,57c347831dff0a1bcdf103457c2e2c62a725aaf42d521e468a7423e4ba8639c1,2024-11-21T01:45:03.250000 -CVE-2012-5654,0,1,c68a48b921cc80690a73f5c8c9910796e8de097c535eb15b4d6d8bb0c2a901d8,2024-11-21T01:45:03.440000 -CVE-2012-5655,0,1,3ee170d3c2ca66f28d52412c84e6da75f00a2278c09b83faf18b09cd034b974a,2024-11-21T01:45:03.573000 -CVE-2012-5656,0,1,2ed7202e0cb77a9aed66415e946f8cc08c9d6c4fe3c9af477577d054e50a2462,2024-11-21T01:45:03.713000 -CVE-2012-5657,0,1,6cb242e77b8a68cec239e9e22887bcf732e77a6bc9f709777a41dff36ceb1e59,2024-11-21T01:45:03.850000 -CVE-2012-5658,0,1,fd7ff925df88bcd726e9448318288c4b1d5ba052985e890ed519a88916021fa1,2024-11-21T01:45:03.983000 -CVE-2012-5659,0,1,39c516a2bc1b3d01c831508faec5520a4d61db27766dff30c6ffe1a9af42b6e1,2024-11-21T01:45:04.107000 -CVE-2012-5660,0,1,49fe1e11c28e22a090fc680be965bcacab723c95f592413265eac49e7261eb2b,2024-11-21T01:45:04.230000 +CVE-2012-5646,0,0,f4675864fc5e9b12cb41c964317fa0311fa87fcc3035a14925686be319c80a3a,2024-11-21T01:45:02.310000 +CVE-2012-5647,0,0,93ae576a2a0069e7757e025d96b071fc4b6a4edafa862a3f8c68c8f7829e4af3,2024-11-21T01:45:02.437000 +CVE-2012-5648,0,0,440e76426f70e4dd32acc996122ecfc4e06f1554c678fcaf7735f8aa6ab6220d,2024-11-21T01:45:02.547000 +CVE-2012-5649,0,0,d3581b31879cf10928625e2593497a6d6f2d168c49dd695d5432449a04fdbfa1,2024-11-21T01:45:02.680000 +CVE-2012-5650,0,0,88ea2b47e37c67f24191c190fac31b936caee89b00ca5948efd6f029f3fbea61,2024-11-21T01:45:02.827000 +CVE-2012-5651,0,0,625e8fb74a3fc52deb7bf23c0ca75b2c3daf406ca4d0f8ee94c9d90417a12fd6,2024-11-21T01:45:02.957000 +CVE-2012-5652,0,0,670c2912ad895e4377ca7b985bb910abeca71a4ef84a16efbadc71b0c9aa700d,2024-11-21T01:45:03.113000 +CVE-2012-5653,0,0,57c347831dff0a1bcdf103457c2e2c62a725aaf42d521e468a7423e4ba8639c1,2024-11-21T01:45:03.250000 +CVE-2012-5654,0,0,c68a48b921cc80690a73f5c8c9910796e8de097c535eb15b4d6d8bb0c2a901d8,2024-11-21T01:45:03.440000 +CVE-2012-5655,0,0,3ee170d3c2ca66f28d52412c84e6da75f00a2278c09b83faf18b09cd034b974a,2024-11-21T01:45:03.573000 +CVE-2012-5656,0,0,2ed7202e0cb77a9aed66415e946f8cc08c9d6c4fe3c9af477577d054e50a2462,2024-11-21T01:45:03.713000 +CVE-2012-5657,0,0,6cb242e77b8a68cec239e9e22887bcf732e77a6bc9f709777a41dff36ceb1e59,2024-11-21T01:45:03.850000 +CVE-2012-5658,0,0,fd7ff925df88bcd726e9448318288c4b1d5ba052985e890ed519a88916021fa1,2024-11-21T01:45:03.983000 +CVE-2012-5659,0,0,39c516a2bc1b3d01c831508faec5520a4d61db27766dff30c6ffe1a9af42b6e1,2024-11-21T01:45:04.107000 +CVE-2012-5660,0,0,49fe1e11c28e22a090fc680be965bcacab723c95f592413265eac49e7261eb2b,2024-11-21T01:45:04.230000 CVE-2012-5661,0,0,d37b1db1afb88d55a6f57a9c29ad343d7e96ce0ac042206798e760c759618c8b,2023-11-07T02:12:39.070000 CVE-2012-5662,0,0,9519fa13e0f345328ffaaa06a353c5d6b0e8ac6e7ba0ed3396ef0663cb84a3a3,2017-08-29T01:32:43.823000 CVE-2012-5663,0,0,1a8a9822905819adee189333006a1167e99d650f359d19d626763e5209da9810,2020-01-10T15:41:15.403000 CVE-2012-5664,0,0,8bf33dd36a1b598c31ba0cc218c38313fccb4433f864afa1e9603f7a933e8a1a,2023-11-07T02:12:39.333000 -CVE-2012-5665,0,1,e90e5144dba6667f082b57131aa52b1e488bbabf1be2dff5420c62f639eff506,2024-11-21T01:45:04.640000 -CVE-2012-5666,0,1,f04a990daa3f2034e1646cf6335dfc3c0ef9df0759b4effb51c0c5d78a570eb1,2024-11-21T01:45:04.767000 -CVE-2012-5667,0,1,68d2ff38eed7b1d42b6fab1dffb6489567ae3fcf3d33e012ce152d0fae350d4e,2024-11-21T01:45:04.893000 -CVE-2012-5668,0,1,34f49be206b8f9aca07bf46175fdb5f695a1b5325b085fc9a4f5b7cc460e7204,2024-11-21T01:45:05.040000 -CVE-2012-5669,0,1,6ee0908384255710125a4acfb344dbf8e4a0c13ebaf59463500436d180b9b850,2024-11-21T01:45:05.187000 -CVE-2012-5670,0,1,3f05bfae1ff63eeb163c9393ea4554815a55ab36d0ba7ad210210674bd7f74ba,2024-11-21T01:45:05.320000 -CVE-2012-5671,0,1,e25c0d9b5c14121f4dd10ef89df5b412b7332c19a0c17b88c3a5fc91ed665eb4,2024-11-21T01:45:05.460000 -CVE-2012-5672,0,1,7d35f48d1e0b1b3721bd4d48829320901e0590bd9adf63f5b355e6ef032c8ad1,2024-11-21T01:45:05.637000 -CVE-2012-5673,0,1,e52b25de0169a3f486adc1ea777a8e80f14ac4e23d850be22aefd5b643ddb4bb,2024-11-21T01:45:05.780000 -CVE-2012-5674,0,1,bb2a61de02dd0a4c979450baab462a846c02eb43b770400d07c9431d1b662c0b,2024-11-21T01:45:05.897000 -CVE-2012-5675,0,1,924ce1f1f3f636ca19c8af436bb268ec1d7a8d4e46c5ec270395ba14f690c37d,2024-11-21T01:45:06.017000 -CVE-2012-5676,0,1,dc670757082a2f34ac70e9d327a4834b7499511ad422c29ce79593ed39c636ca,2024-11-21T01:45:06.127000 -CVE-2012-5677,0,1,1db5e89e9b5b4d4e2ace569dc24c7ef83059101775708025911275ec1d3ea178,2024-11-21T01:45:06.267000 -CVE-2012-5678,0,1,62c289dce0324d9f4e19f155b397d64d72a9de3234c9582681a71528532ea036,2024-11-21T01:45:06.393000 -CVE-2012-5679,0,1,5dfdfda1d7eacd36624610e29776ff755a9c4e87d9f7f9b915af313376418166,2024-11-21T01:45:06.520000 -CVE-2012-5680,0,1,8e21df8498faf946dd9a6c8d8d468317cc4188ce509de13f1ac9e35fc9c91d0a,2024-11-21T01:45:06.637000 +CVE-2012-5665,0,0,e90e5144dba6667f082b57131aa52b1e488bbabf1be2dff5420c62f639eff506,2024-11-21T01:45:04.640000 +CVE-2012-5666,0,0,f04a990daa3f2034e1646cf6335dfc3c0ef9df0759b4effb51c0c5d78a570eb1,2024-11-21T01:45:04.767000 +CVE-2012-5667,0,0,68d2ff38eed7b1d42b6fab1dffb6489567ae3fcf3d33e012ce152d0fae350d4e,2024-11-21T01:45:04.893000 +CVE-2012-5668,0,0,34f49be206b8f9aca07bf46175fdb5f695a1b5325b085fc9a4f5b7cc460e7204,2024-11-21T01:45:05.040000 +CVE-2012-5669,0,0,6ee0908384255710125a4acfb344dbf8e4a0c13ebaf59463500436d180b9b850,2024-11-21T01:45:05.187000 +CVE-2012-5670,0,0,3f05bfae1ff63eeb163c9393ea4554815a55ab36d0ba7ad210210674bd7f74ba,2024-11-21T01:45:05.320000 +CVE-2012-5671,0,0,e25c0d9b5c14121f4dd10ef89df5b412b7332c19a0c17b88c3a5fc91ed665eb4,2024-11-21T01:45:05.460000 +CVE-2012-5672,0,0,7d35f48d1e0b1b3721bd4d48829320901e0590bd9adf63f5b355e6ef032c8ad1,2024-11-21T01:45:05.637000 +CVE-2012-5673,0,0,e52b25de0169a3f486adc1ea777a8e80f14ac4e23d850be22aefd5b643ddb4bb,2024-11-21T01:45:05.780000 +CVE-2012-5674,0,0,bb2a61de02dd0a4c979450baab462a846c02eb43b770400d07c9431d1b662c0b,2024-11-21T01:45:05.897000 +CVE-2012-5675,0,0,924ce1f1f3f636ca19c8af436bb268ec1d7a8d4e46c5ec270395ba14f690c37d,2024-11-21T01:45:06.017000 +CVE-2012-5676,0,0,dc670757082a2f34ac70e9d327a4834b7499511ad422c29ce79593ed39c636ca,2024-11-21T01:45:06.127000 +CVE-2012-5677,0,0,1db5e89e9b5b4d4e2ace569dc24c7ef83059101775708025911275ec1d3ea178,2024-11-21T01:45:06.267000 +CVE-2012-5678,0,0,62c289dce0324d9f4e19f155b397d64d72a9de3234c9582681a71528532ea036,2024-11-21T01:45:06.393000 +CVE-2012-5679,0,0,5dfdfda1d7eacd36624610e29776ff755a9c4e87d9f7f9b915af313376418166,2024-11-21T01:45:06.520000 +CVE-2012-5680,0,0,8e21df8498faf946dd9a6c8d8d468317cc4188ce509de13f1ac9e35fc9c91d0a,2024-11-21T01:45:06.637000 CVE-2012-5681,0,0,59efcd661b8717701821fd306e55468de567bd9b2b026f96fd55f0cfd9bc1193,2023-11-07T02:12:39.730000 CVE-2012-5682,0,0,dc1ed99ce449daac25da6133fd63cd6eea10ccae46d9b9b0b000c3355ccc8d3d,2023-11-07T02:12:39.950000 CVE-2012-5683,0,0,80e8ff05a295c7f6ae9d80a673b03828af9209a55d52b8d65915d3ecb232a494,2017-08-29T01:32:44.150000 CVE-2012-5684,0,0,6ec689426cc1f158d670dcfe04c0588618f0896299b7f7f049f7ce7a7504e660,2017-08-29T01:32:44.230000 CVE-2012-5685,0,0,7a91ac8fa316ae2d2639faef2b2206ed3684375d563dde13e0ae7d0fd1de50e8,2014-08-14T18:13:05.830000 CVE-2012-5686,0,0,f3208fcd315a1e8ed9412be6d71f0d33ed93d36aaa450456ab6587b9d56da7d4,2020-02-06T18:09:43.287000 -CVE-2012-5687,0,1,152ea953ec4e22a3c758289b511996ae69ddcd61b586ee4e1e10f327e4e83ff1,2024-11-21T01:45:07.427000 -CVE-2012-5688,0,1,1d877e7cd6b2ea019f0e0c6bf35ef76f8812d874d5a7f98cfe8c23156586d236,2024-11-21T01:45:07.587000 -CVE-2012-5689,0,1,2c57b51f84d07dd276070f5b39449475adbe40bec472b7d51913b5d12d825e43,2024-11-21T01:45:07.787000 -CVE-2012-5690,0,1,48de292aa0e663e85e42be8a078eeb3f45f44563cae3e4ce8e407c85f03c223d,2024-11-21T01:45:07.947000 -CVE-2012-5691,0,1,a3c1924a2fd9e7e2b4dce65f4818f6c16ce7fd63e19b3c65bbe8b11a1f2e0c42,2024-11-21T01:45:08.087000 -CVE-2012-5692,0,1,0b8f14a78b185dbd2a74bd482a5234ac6a1a413149e0a6e1a7b6f19e9c38d818,2024-11-21T01:45:08.240000 +CVE-2012-5687,0,0,152ea953ec4e22a3c758289b511996ae69ddcd61b586ee4e1e10f327e4e83ff1,2024-11-21T01:45:07.427000 +CVE-2012-5688,0,0,1d877e7cd6b2ea019f0e0c6bf35ef76f8812d874d5a7f98cfe8c23156586d236,2024-11-21T01:45:07.587000 +CVE-2012-5689,0,0,2c57b51f84d07dd276070f5b39449475adbe40bec472b7d51913b5d12d825e43,2024-11-21T01:45:07.787000 +CVE-2012-5690,0,0,48de292aa0e663e85e42be8a078eeb3f45f44563cae3e4ce8e407c85f03c223d,2024-11-21T01:45:07.947000 +CVE-2012-5691,0,0,a3c1924a2fd9e7e2b4dce65f4818f6c16ce7fd63e19b3c65bbe8b11a1f2e0c42,2024-11-21T01:45:08.087000 +CVE-2012-5692,0,0,0b8f14a78b185dbd2a74bd482a5234ac6a1a413149e0a6e1a7b6f19e9c38d818,2024-11-21T01:45:08.240000 CVE-2012-5693,0,0,1cbe834af55b495a66db4afd7b825a30e3a8b0043adea73e1382b0df3817bffb,2020-01-17T15:17:01.877000 CVE-2012-5694,0,0,56623acc06d0cc886ec940356f08abeedb45082c290a005a177c8e51fdef371e,2014-12-16T17:21:35.257000 CVE-2012-5695,0,0,7125bb00eefde7bd911f4dd9acb1b2b495cc533be7cdd7048decad64b2ace18c,2017-08-29T01:32:44.370000 @@ -56882,337 +56882,337 @@ CVE-2012-5699,0,0,a0edcd592c9d837a9dbf1f87535dcab8f254a92ac8091500796cc3b018b519 CVE-2012-5700,0,0,f6acb9c5551c27e0b481bb11f6ca74ef329dd6672068beda2af4983a7262877e,2017-08-29T01:32:44.480000 CVE-2012-5701,0,0,134b7a29683365cc5ef7d04293a77f7fe869e55f060a217cd0be03894f67ac13,2017-08-29T01:32:44.557000 CVE-2012-5702,0,0,f08bd8a2fbfd414c1a4c0cfb44185a04478ea9c8b414a96a24e8b068cf728b55,2017-08-29T01:32:44.603000 -CVE-2012-5703,0,1,3564b93bdaed7be76d6b3d9aef521a71a79935d27a34ecb1a38853f91dca538a,2024-11-21T01:45:09.793000 -CVE-2012-5704,0,1,a76b750ff126f162bda1e2ed12ddb2c918d60cbe641eb69304693dc377b308c3,2024-11-21T01:45:09.937000 -CVE-2012-5705,0,1,d4facc0c4213d0396d6fb87171a2058a0cd690946a54c57aeeee9457fff3130f,2024-11-21T01:45:10.073000 -CVE-2012-5717,0,1,04f4f3e510bab6a50783dee593504b1ab3327e61bdc6b918538d39c72941a4a3,2024-11-21T01:45:10.223000 -CVE-2012-5723,0,1,68eb728e2e80ad8881a06a3ef1520547af792bcb0e8d9d0dd9b331042c1b93bd,2024-11-21T01:45:10.337000 -CVE-2012-5744,0,1,245a0bd3d7a7fcd25556cf9e320b6877e63e8b630a230e883160832ea440d660,2024-11-21T01:45:10.450000 -CVE-2012-5756,0,1,a3189f80ae7d3e6f0464aa4f437036e6568d465b301ec0d0a4ea9196b1f54c0b,2024-11-21T01:45:10.553000 -CVE-2012-5757,0,1,fa567e90a40b4a5ca7068401cc91ff3fc81d295ac7055e5eb84cc05383ae657b,2024-11-21T01:45:10.663000 -CVE-2012-5758,0,1,db6a91a22dd2bf0ef3ac3cd2445645e665300ad9db8b6a0b7c298b7130f0ba26,2024-11-21T01:45:10.777000 -CVE-2012-5759,0,1,416d3c8bc0c7d3fa3196d56e58f7688778e143290733f397f91ce0ee65d9d01c,2024-11-21T01:45:10.890000 -CVE-2012-5760,0,1,86f17e07491ea3cc634ce440163391aef5152541d1f769e95be28d1ab90b0731,2024-11-21T01:45:11 -CVE-2012-5761,0,1,d0bb5bd15c780f50458bb35a8cd77f449705886401e27bf8d1a699fe74f1f92a,2024-11-21T01:45:11.103000 -CVE-2012-5762,0,1,e4cde0dc5d57594723a7daf0ad3e1a6d785536f4e3d2408b435db18b248a9c5e,2024-11-21T01:45:11.217000 -CVE-2012-5763,0,1,96557acc37f0dae18c915fc633c07b93af5a56bd7f6aca436606756ff9ac9277,2024-11-21T01:45:11.327000 -CVE-2012-5765,0,1,1a8681558f05ea9a6057236a8adc0f94edd6609ba819496ecccc940854d828f1,2024-11-21T01:45:11.430000 -CVE-2012-5766,0,1,459217816d0ec2b0149e34ae12464cc4dd54f8aae5ad244e8c1b0252470d91bd,2024-11-21T01:45:11.543000 -CVE-2012-5767,0,1,9617ab659ead41f42acfb935d730e098b1a04e3dab73e5988d7f44a3febe9154,2024-11-21T01:45:11.647000 -CVE-2012-5769,0,1,6ffff93bb4e68c54687344cbc14814b66a460768c0e59aa505e639e518563ba9,2024-11-21T01:45:11.757000 -CVE-2012-5770,0,1,55203cedc623a39c0478d3efbfaa6265ece1091eb2d71b7e515b75fddc3b7dd1,2024-11-21T01:45:11.867000 +CVE-2012-5703,0,0,3564b93bdaed7be76d6b3d9aef521a71a79935d27a34ecb1a38853f91dca538a,2024-11-21T01:45:09.793000 +CVE-2012-5704,0,0,a76b750ff126f162bda1e2ed12ddb2c918d60cbe641eb69304693dc377b308c3,2024-11-21T01:45:09.937000 +CVE-2012-5705,0,0,d4facc0c4213d0396d6fb87171a2058a0cd690946a54c57aeeee9457fff3130f,2024-11-21T01:45:10.073000 +CVE-2012-5717,0,0,04f4f3e510bab6a50783dee593504b1ab3327e61bdc6b918538d39c72941a4a3,2024-11-21T01:45:10.223000 +CVE-2012-5723,0,0,68eb728e2e80ad8881a06a3ef1520547af792bcb0e8d9d0dd9b331042c1b93bd,2024-11-21T01:45:10.337000 +CVE-2012-5744,0,0,245a0bd3d7a7fcd25556cf9e320b6877e63e8b630a230e883160832ea440d660,2024-11-21T01:45:10.450000 +CVE-2012-5756,0,0,a3189f80ae7d3e6f0464aa4f437036e6568d465b301ec0d0a4ea9196b1f54c0b,2024-11-21T01:45:10.553000 +CVE-2012-5757,0,0,fa567e90a40b4a5ca7068401cc91ff3fc81d295ac7055e5eb84cc05383ae657b,2024-11-21T01:45:10.663000 +CVE-2012-5758,0,0,db6a91a22dd2bf0ef3ac3cd2445645e665300ad9db8b6a0b7c298b7130f0ba26,2024-11-21T01:45:10.777000 +CVE-2012-5759,0,0,416d3c8bc0c7d3fa3196d56e58f7688778e143290733f397f91ce0ee65d9d01c,2024-11-21T01:45:10.890000 +CVE-2012-5760,0,0,86f17e07491ea3cc634ce440163391aef5152541d1f769e95be28d1ab90b0731,2024-11-21T01:45:11 +CVE-2012-5761,0,0,d0bb5bd15c780f50458bb35a8cd77f449705886401e27bf8d1a699fe74f1f92a,2024-11-21T01:45:11.103000 +CVE-2012-5762,0,0,e4cde0dc5d57594723a7daf0ad3e1a6d785536f4e3d2408b435db18b248a9c5e,2024-11-21T01:45:11.217000 +CVE-2012-5763,0,0,96557acc37f0dae18c915fc633c07b93af5a56bd7f6aca436606756ff9ac9277,2024-11-21T01:45:11.327000 +CVE-2012-5765,0,0,1a8681558f05ea9a6057236a8adc0f94edd6609ba819496ecccc940854d828f1,2024-11-21T01:45:11.430000 +CVE-2012-5766,0,0,459217816d0ec2b0149e34ae12464cc4dd54f8aae5ad244e8c1b0252470d91bd,2024-11-21T01:45:11.543000 +CVE-2012-5767,0,0,9617ab659ead41f42acfb935d730e098b1a04e3dab73e5988d7f44a3febe9154,2024-11-21T01:45:11.647000 +CVE-2012-5769,0,0,6ffff93bb4e68c54687344cbc14814b66a460768c0e59aa505e639e518563ba9,2024-11-21T01:45:11.757000 +CVE-2012-5770,0,0,55203cedc623a39c0478d3efbfaa6265ece1091eb2d71b7e515b75fddc3b7dd1,2024-11-21T01:45:11.867000 CVE-2012-5771,0,0,0bd2f5935d36b2b844920838878846f87daa9560c74017b1a437db027369b268,2023-11-07T02:12:40.457000 CVE-2012-5772,0,0,d05175f9ea34bdce8db9b9d62ed90a36cae260731abd352cc7b557ed57ab18ad,2023-11-07T02:12:40.677000 CVE-2012-5773,0,0,6942259e473846b5ff4436801854e6ff639cd85fce0fbdf215e4bd8d2d442b40,2023-11-07T02:12:40.890000 CVE-2012-5774,0,0,4ba47412e4a542a50635e269caed9c1d3adfabd53224c8853b2b628efb073b10,2023-11-07T02:12:41.100000 CVE-2012-5775,0,0,a7f082015b9db4258cad0f66772ad7a3877d07fb4cfbf293f98de2fa184b3c9d,2023-11-07T02:12:41.327000 CVE-2012-5776,0,0,30c7b8c344d80ff5dee89c8110677c72df3bf09262f4dd33691a7f43de7b0f6c,2020-01-31T13:32:07.093000 -CVE-2012-5777,0,1,5ef84e98f883bec342f6afda0f86ca661367d58fdc71c6f2aeb9f499d7b2d754,2024-11-21T01:45:12.197000 -CVE-2012-5780,0,1,74fab3fc3c82e5b1e708970ecc8afe8c8fc6cf97cae04cbb8950c1d085510904,2024-11-21T01:45:12.330000 -CVE-2012-5781,0,1,8ec544322387e852fbfe832fb46a6a62e150fa58819a2326189379a2fa28ea8e,2024-11-21T01:45:12.463000 -CVE-2012-5782,0,1,057738fd0e32727640f58c2e9919c70c1fb4d3d788394de0a04c9f12badd8d43,2024-11-21T01:45:12.617000 -CVE-2012-5783,0,1,4184f29c8031f3bce2c994ffdf1c7e16091e2cc740b51826b60c895ff067b0e4,2024-11-21T01:45:12.763000 -CVE-2012-5784,0,1,9ea4a2d5d248c55fc8146311238335e3517b8115658b8ab7fe46451d29cf6c39,2024-11-21T01:45:12.957000 -CVE-2012-5785,0,1,f4d5dca5f18fadfb5246fd89095d090377729877544ebdb0811c989956fc1a3a,2024-11-21T01:45:13.140000 -CVE-2012-5786,0,1,123e4a823f715972e666e52abf4db42137edc74acefd772fae893da76c78f1e6,2024-11-21T01:45:13.290000 -CVE-2012-5787,0,1,95b443fd409fe75bf88f603dfb2046d06f8de06325afbb624899b8d5b5919270,2024-11-21T01:45:13.447000 -CVE-2012-5788,0,1,42eb408069d16aad362569701967360351402155d621041e8c922d29d95b80c5,2024-11-21T01:45:13.597000 -CVE-2012-5789,0,1,54168594d8ab7d094f4af6d6cf761530abc6b5d30573ff2371d7bef4ce0e39a0,2024-11-21T01:45:13.743000 -CVE-2012-5790,0,1,ea321493cce4705764b7c2fea5ab9b410160180de4839c07bfb7f1630a947650,2024-11-21T01:45:13.910000 -CVE-2012-5791,0,1,441f4252b6a8dea678fb9cce2e050fae658dab2e95aca733cccdc39c4f9ab4c1,2024-11-21T01:45:14.047000 -CVE-2012-5792,0,1,14b1d53aa988d97e5f91b6d5d8e8631e264669a3a762cc035a578361ec6c563e,2024-11-21T01:45:14.177000 -CVE-2012-5793,0,1,8e320bcceab785fa4bc6c9e6bec71c1f6783a79ea631ed46895a3fc1ed591883,2024-11-21T01:45:14.317000 -CVE-2012-5794,0,1,cb95ff166cd04d754f9a0356afffd2e6679da44da888f2c36dee7b4f230138b5,2024-11-21T01:45:14.453000 -CVE-2012-5795,0,1,2f6b0292ffb45de50ab5a4793c54564c2ac3e37ce945d4a5eae3220d278d399d,2024-11-21T01:45:14.600000 -CVE-2012-5796,0,1,061f4c22e11bd0c7edb314e5fddf2cc567c0fcb10c85fbde81c94e1e19aa2495,2024-11-21T01:45:14.737000 -CVE-2012-5797,0,1,c603f11414badd6caefcc986df9cb27c04a6be72212f55b39739a0289813b840,2024-11-21T01:45:14.873000 -CVE-2012-5798,0,1,57470ce7b3df045a7defafee8c8ffd9d2686183df8e112eebd8bfa38a0a2b9b7,2024-11-21T01:45:15.027000 -CVE-2012-5799,0,1,c6de6313885c8f28b78ac45e4d848861227feb9bd0ae9d44a8e51458a00c9b9e,2024-11-21T01:45:15.163000 -CVE-2012-5800,0,1,65045dda659438fab0edf4f2597c1089a3e47b349c44c77bc6f063defcece33b,2024-11-21T01:45:15.303000 -CVE-2012-5801,0,1,2fbc64ef32cd82b3c2963cb76cc0a6bd5344d31c2330177c072a9695bd260ddf,2024-11-21T01:45:15.443000 -CVE-2012-5802,0,1,a9bc651ddf9bbd17317570fe618cc5089e3e10e6dc20aa5f0f2247947f009f9a,2024-11-21T01:45:15.580000 -CVE-2012-5803,0,1,4ec31b55bb5a479985d2916c818e34852b4edee58b1a98c9a97cff47614d81d1,2024-11-21T01:45:15.710000 -CVE-2012-5804,0,1,55e5281edda15f0668e003d4394aa7c8ac871b0a19147f6377435c3099aaeed3,2024-11-21T01:45:15.843000 -CVE-2012-5805,0,1,ea7ea6dddbc8887be634cd2efc76cc1e5e0e24a8bcde66a65328f51cac87b42a,2024-11-21T01:45:15.990000 -CVE-2012-5806,0,1,e25e798f0c1627c1e7a84c3cce1d1ba78e8afb806acbe5715a120c86ef9d00ee,2024-11-21T01:45:16.137000 -CVE-2012-5807,0,1,0e7fb21cebe7bba52aa848cdd2c94cef590f52cc82a4eb5e508ef800ca00d9c2,2024-11-21T01:45:16.280000 -CVE-2012-5808,0,1,b59951e28913c40d752a2396282369c6396ca55d1050a31f4edec44e2fa62f2a,2024-11-21T01:45:16.430000 -CVE-2012-5809,0,1,47fc6ce15a835a296dfd018e4f9978eef0fbb2361a3db8272d8302c49e06500d,2024-11-21T01:45:16.570000 -CVE-2012-5810,0,1,3b673dd129661aa3dbe269251663ee013d660b27ee4ad02e0629bc21a2ef6ce3,2024-11-21T01:45:16.700000 -CVE-2012-5811,0,1,7756f3912bdb5b85454ba7bf0557c153e912264626f45d6ba407b280be0e3090,2024-11-21T01:45:16.847000 -CVE-2012-5812,0,1,4f382bdddb5eb9ad30cf35dc91899389035195c233e50ed3b84be6a093246981,2024-11-21T01:45:16.977000 -CVE-2012-5813,0,1,a8277c930111acc55baf65da511a6c8a7c3596b259b50fb19bb377b393a8714d,2024-11-21T01:45:17.113000 -CVE-2012-5814,0,1,ab1c9d66beae153cc649a92615d0019ee2039079fc2a297d2c1ac6a5debdac35,2024-11-21T01:45:17.243000 -CVE-2012-5815,0,1,8300b1df444723893112d9a16b58fe54728f0f69236f1f00cc0b3c8750b97211,2024-11-21T01:45:17.387000 -CVE-2012-5816,0,1,5fd51308c66ebd2d9ef433ce653952fb526da3be30c545af89b5351ca3c47826,2024-11-21T01:45:17.527000 -CVE-2012-5817,0,1,d66e6913da6b06d1a39a341b8ad96da4f77b0d1c8e0fc486b5f52b1a1c72fa78,2024-11-21T01:45:17.670000 -CVE-2012-5818,0,1,ef09dc2591d37a16fc23d1c680e8c9f29d2d700e2a4883c0ccb2484e6de2f375,2024-11-21T01:45:17.830000 -CVE-2012-5819,0,1,8437b020f1f2d23b79470467a5b72b5da224d11723071ae05eb8335afe3a3133,2024-11-21T01:45:17.960000 -CVE-2012-5820,0,1,78df313b49835c17ee575235b9a8eb672fce426affbc64506df10b9a8edc6ddf,2024-11-21T01:45:18.110000 -CVE-2012-5821,0,1,054072876dfb4dc3994cd5e17fb759ba0f06b520d697b9e501088176588e2244,2024-11-21T01:45:18.257000 -CVE-2012-5822,0,1,3561df362ad71a2c3e649c482724609662313709a227c13ba52f99d4f11c505d,2024-11-21T01:45:18.413000 -CVE-2012-5823,0,1,f90337a34067030cc9753d151c88d601dd213f2691288f5e002d388ccc10dec1,2024-11-21T01:45:18.550000 -CVE-2012-5824,0,1,7c900af36b2636b1d6574837b4acef053b7989396d1ec4585aa0f815b06627df,2024-11-21T01:45:18.703000 -CVE-2012-5825,0,1,ce9b5d3b68de9f221eb7842838ae44f3c69211544f1459599dc43cc6db20966a,2024-11-21T01:45:18.847000 -CVE-2012-5827,0,1,37b2eff8c4f1d13a62181f1ffe08eadbb02d483ab748d647b40cd8caaebfea1a,2024-11-21T01:45:19.007000 +CVE-2012-5777,0,0,5ef84e98f883bec342f6afda0f86ca661367d58fdc71c6f2aeb9f499d7b2d754,2024-11-21T01:45:12.197000 +CVE-2012-5780,0,0,74fab3fc3c82e5b1e708970ecc8afe8c8fc6cf97cae04cbb8950c1d085510904,2024-11-21T01:45:12.330000 +CVE-2012-5781,0,0,8ec544322387e852fbfe832fb46a6a62e150fa58819a2326189379a2fa28ea8e,2024-11-21T01:45:12.463000 +CVE-2012-5782,0,0,057738fd0e32727640f58c2e9919c70c1fb4d3d788394de0a04c9f12badd8d43,2024-11-21T01:45:12.617000 +CVE-2012-5783,0,0,4184f29c8031f3bce2c994ffdf1c7e16091e2cc740b51826b60c895ff067b0e4,2024-11-21T01:45:12.763000 +CVE-2012-5784,0,0,9ea4a2d5d248c55fc8146311238335e3517b8115658b8ab7fe46451d29cf6c39,2024-11-21T01:45:12.957000 +CVE-2012-5785,0,0,f4d5dca5f18fadfb5246fd89095d090377729877544ebdb0811c989956fc1a3a,2024-11-21T01:45:13.140000 +CVE-2012-5786,0,0,123e4a823f715972e666e52abf4db42137edc74acefd772fae893da76c78f1e6,2024-11-21T01:45:13.290000 +CVE-2012-5787,0,0,95b443fd409fe75bf88f603dfb2046d06f8de06325afbb624899b8d5b5919270,2024-11-21T01:45:13.447000 +CVE-2012-5788,0,0,42eb408069d16aad362569701967360351402155d621041e8c922d29d95b80c5,2024-11-21T01:45:13.597000 +CVE-2012-5789,0,0,54168594d8ab7d094f4af6d6cf761530abc6b5d30573ff2371d7bef4ce0e39a0,2024-11-21T01:45:13.743000 +CVE-2012-5790,0,0,ea321493cce4705764b7c2fea5ab9b410160180de4839c07bfb7f1630a947650,2024-11-21T01:45:13.910000 +CVE-2012-5791,0,0,441f4252b6a8dea678fb9cce2e050fae658dab2e95aca733cccdc39c4f9ab4c1,2024-11-21T01:45:14.047000 +CVE-2012-5792,0,0,14b1d53aa988d97e5f91b6d5d8e8631e264669a3a762cc035a578361ec6c563e,2024-11-21T01:45:14.177000 +CVE-2012-5793,0,0,8e320bcceab785fa4bc6c9e6bec71c1f6783a79ea631ed46895a3fc1ed591883,2024-11-21T01:45:14.317000 +CVE-2012-5794,0,0,cb95ff166cd04d754f9a0356afffd2e6679da44da888f2c36dee7b4f230138b5,2024-11-21T01:45:14.453000 +CVE-2012-5795,0,0,2f6b0292ffb45de50ab5a4793c54564c2ac3e37ce945d4a5eae3220d278d399d,2024-11-21T01:45:14.600000 +CVE-2012-5796,0,0,061f4c22e11bd0c7edb314e5fddf2cc567c0fcb10c85fbde81c94e1e19aa2495,2024-11-21T01:45:14.737000 +CVE-2012-5797,0,0,c603f11414badd6caefcc986df9cb27c04a6be72212f55b39739a0289813b840,2024-11-21T01:45:14.873000 +CVE-2012-5798,0,0,57470ce7b3df045a7defafee8c8ffd9d2686183df8e112eebd8bfa38a0a2b9b7,2024-11-21T01:45:15.027000 +CVE-2012-5799,0,0,c6de6313885c8f28b78ac45e4d848861227feb9bd0ae9d44a8e51458a00c9b9e,2024-11-21T01:45:15.163000 +CVE-2012-5800,0,0,65045dda659438fab0edf4f2597c1089a3e47b349c44c77bc6f063defcece33b,2024-11-21T01:45:15.303000 +CVE-2012-5801,0,0,2fbc64ef32cd82b3c2963cb76cc0a6bd5344d31c2330177c072a9695bd260ddf,2024-11-21T01:45:15.443000 +CVE-2012-5802,0,0,a9bc651ddf9bbd17317570fe618cc5089e3e10e6dc20aa5f0f2247947f009f9a,2024-11-21T01:45:15.580000 +CVE-2012-5803,0,0,4ec31b55bb5a479985d2916c818e34852b4edee58b1a98c9a97cff47614d81d1,2024-11-21T01:45:15.710000 +CVE-2012-5804,0,0,55e5281edda15f0668e003d4394aa7c8ac871b0a19147f6377435c3099aaeed3,2024-11-21T01:45:15.843000 +CVE-2012-5805,0,0,ea7ea6dddbc8887be634cd2efc76cc1e5e0e24a8bcde66a65328f51cac87b42a,2024-11-21T01:45:15.990000 +CVE-2012-5806,0,0,e25e798f0c1627c1e7a84c3cce1d1ba78e8afb806acbe5715a120c86ef9d00ee,2024-11-21T01:45:16.137000 +CVE-2012-5807,0,0,0e7fb21cebe7bba52aa848cdd2c94cef590f52cc82a4eb5e508ef800ca00d9c2,2024-11-21T01:45:16.280000 +CVE-2012-5808,0,0,b59951e28913c40d752a2396282369c6396ca55d1050a31f4edec44e2fa62f2a,2024-11-21T01:45:16.430000 +CVE-2012-5809,0,0,47fc6ce15a835a296dfd018e4f9978eef0fbb2361a3db8272d8302c49e06500d,2024-11-21T01:45:16.570000 +CVE-2012-5810,0,0,3b673dd129661aa3dbe269251663ee013d660b27ee4ad02e0629bc21a2ef6ce3,2024-11-21T01:45:16.700000 +CVE-2012-5811,0,0,7756f3912bdb5b85454ba7bf0557c153e912264626f45d6ba407b280be0e3090,2024-11-21T01:45:16.847000 +CVE-2012-5812,0,0,4f382bdddb5eb9ad30cf35dc91899389035195c233e50ed3b84be6a093246981,2024-11-21T01:45:16.977000 +CVE-2012-5813,0,0,a8277c930111acc55baf65da511a6c8a7c3596b259b50fb19bb377b393a8714d,2024-11-21T01:45:17.113000 +CVE-2012-5814,0,0,ab1c9d66beae153cc649a92615d0019ee2039079fc2a297d2c1ac6a5debdac35,2024-11-21T01:45:17.243000 +CVE-2012-5815,0,0,8300b1df444723893112d9a16b58fe54728f0f69236f1f00cc0b3c8750b97211,2024-11-21T01:45:17.387000 +CVE-2012-5816,0,0,5fd51308c66ebd2d9ef433ce653952fb526da3be30c545af89b5351ca3c47826,2024-11-21T01:45:17.527000 +CVE-2012-5817,0,0,d66e6913da6b06d1a39a341b8ad96da4f77b0d1c8e0fc486b5f52b1a1c72fa78,2024-11-21T01:45:17.670000 +CVE-2012-5818,0,0,ef09dc2591d37a16fc23d1c680e8c9f29d2d700e2a4883c0ccb2484e6de2f375,2024-11-21T01:45:17.830000 +CVE-2012-5819,0,0,8437b020f1f2d23b79470467a5b72b5da224d11723071ae05eb8335afe3a3133,2024-11-21T01:45:17.960000 +CVE-2012-5820,0,0,78df313b49835c17ee575235b9a8eb672fce426affbc64506df10b9a8edc6ddf,2024-11-21T01:45:18.110000 +CVE-2012-5821,0,0,054072876dfb4dc3994cd5e17fb759ba0f06b520d697b9e501088176588e2244,2024-11-21T01:45:18.257000 +CVE-2012-5822,0,0,3561df362ad71a2c3e649c482724609662313709a227c13ba52f99d4f11c505d,2024-11-21T01:45:18.413000 +CVE-2012-5823,0,0,f90337a34067030cc9753d151c88d601dd213f2691288f5e002d388ccc10dec1,2024-11-21T01:45:18.550000 +CVE-2012-5824,0,0,7c900af36b2636b1d6574837b4acef053b7989396d1ec4585aa0f815b06627df,2024-11-21T01:45:18.703000 +CVE-2012-5825,0,0,ce9b5d3b68de9f221eb7842838ae44f3c69211544f1459599dc43cc6db20966a,2024-11-21T01:45:18.847000 +CVE-2012-5827,0,0,37b2eff8c4f1d13a62181f1ffe08eadbb02d483ab748d647b40cd8caaebfea1a,2024-11-21T01:45:19.007000 CVE-2012-5828,0,0,b047ea24854707421d2b46e32f72854643dc515ed6a1600aa6841566c55db6bb,2020-02-14T17:09:40.083000 -CVE-2012-5829,0,1,a22c9c838fe3e2ee02dd622ef090a1835f2338bbc3f4298f610b6261e5332c5f,2024-11-21T01:45:19.307000 -CVE-2012-5830,0,1,d782ce49971cd70200e8ba47810dc3bc5d764ae145cbbf1e3c95ec6449088ed2,2024-11-21T01:45:19.537000 +CVE-2012-5829,0,0,a22c9c838fe3e2ee02dd622ef090a1835f2338bbc3f4298f610b6261e5332c5f,2024-11-21T01:45:19.307000 +CVE-2012-5830,0,0,d782ce49971cd70200e8ba47810dc3bc5d764ae145cbbf1e3c95ec6449088ed2,2024-11-21T01:45:19.537000 CVE-2012-5831,0,0,e8799c64cd9a7c817fb7970606e58cf5c17d99e9e08880ea25bd972fb730da32,2023-11-07T02:12:42.050000 CVE-2012-5832,0,0,8c52ea9bb18086988d47107b6ec87f0bc0ede6de36258a72c2c15dfe313583be,2023-11-07T02:12:42.357000 -CVE-2012-5833,0,1,e1a3e6f7336c459431cb785b8663fd541af7cebc0b00da32db3cb7d07e5c9b2d,2024-11-21T01:45:19.770000 +CVE-2012-5833,0,0,e1a3e6f7336c459431cb785b8663fd541af7cebc0b00da32db3cb7d07e5c9b2d,2024-11-21T01:45:19.770000 CVE-2012-5834,0,0,ffcdcdc166957e5645ef105d300b9c6678174f8ecb81369640a72bfa0cd254cc,2023-11-07T02:12:42.600000 -CVE-2012-5835,0,1,221485505c55b6829bc70a5f867b6db1ffe63bd0ed4c4b0e910dc477b6a66a0e,2024-11-21T01:45:19.987000 -CVE-2012-5836,0,1,4ab6863bb21773aa50ead77e23f74a3703a64409e5628fa502566e7a3295df63,2024-11-21T01:45:20.187000 -CVE-2012-5837,0,1,e24153a076265082c08335edfad1e593033795877cd66e76d2885e2d0d8a3d5a,2024-11-21T01:45:20.370000 -CVE-2012-5838,0,1,dc4e16f2ae37d0147c0989ab5cb62843b5b273594ad562a4be5025f2b1c87c15,2024-11-21T01:45:20.543000 -CVE-2012-5839,0,1,c491de37057537edc809ab064e02a9a440ee14ac535aaa7b6ac83793beddbf3f,2024-11-21T01:45:20.733000 -CVE-2012-5840,0,1,4e8da2779c9f3bb510145eeeaedb2e875d3afa2c8ad6165973b1ab45802deede,2024-11-21T01:45:20.957000 -CVE-2012-5841,0,1,ecec460b6890be7df468c9adcb15e456f57b6f8994de5bb201d4b826d8bfed65,2024-11-21T01:45:21.170000 -CVE-2012-5842,0,1,aa1acf53985726dccf7c0717836a2a6e4a0cda91e6dd0bfed5b4a4afdbf33f29,2024-11-21T01:45:21.377000 -CVE-2012-5843,0,1,48c5b3ee46a8ee1421e90a0ca23f922298d3af6da46f79dd1ff2ab291c84e98b,2024-11-21T01:45:21.603000 +CVE-2012-5835,0,0,221485505c55b6829bc70a5f867b6db1ffe63bd0ed4c4b0e910dc477b6a66a0e,2024-11-21T01:45:19.987000 +CVE-2012-5836,0,0,4ab6863bb21773aa50ead77e23f74a3703a64409e5628fa502566e7a3295df63,2024-11-21T01:45:20.187000 +CVE-2012-5837,0,0,e24153a076265082c08335edfad1e593033795877cd66e76d2885e2d0d8a3d5a,2024-11-21T01:45:20.370000 +CVE-2012-5838,0,0,dc4e16f2ae37d0147c0989ab5cb62843b5b273594ad562a4be5025f2b1c87c15,2024-11-21T01:45:20.543000 +CVE-2012-5839,0,0,c491de37057537edc809ab064e02a9a440ee14ac535aaa7b6ac83793beddbf3f,2024-11-21T01:45:20.733000 +CVE-2012-5840,0,0,4e8da2779c9f3bb510145eeeaedb2e875d3afa2c8ad6165973b1ab45802deede,2024-11-21T01:45:20.957000 +CVE-2012-5841,0,0,ecec460b6890be7df468c9adcb15e456f57b6f8994de5bb201d4b826d8bfed65,2024-11-21T01:45:21.170000 +CVE-2012-5842,0,0,aa1acf53985726dccf7c0717836a2a6e4a0cda91e6dd0bfed5b4a4afdbf33f29,2024-11-21T01:45:21.377000 +CVE-2012-5843,0,0,48c5b3ee46a8ee1421e90a0ca23f922298d3af6da46f79dd1ff2ab291c84e98b,2024-11-21T01:45:21.603000 CVE-2012-5844,0,0,b3fc53b3f5f736434d5c0a940e1033f4a77340d1ad79c6c33ce6a0489baf9710,2023-11-07T02:12:42.997000 CVE-2012-5845,0,0,52421a8cc1a7e56cc730af98ac5868b134c496461a51eab1ded53b26f0d6bd35,2023-11-07T02:12:43.220000 CVE-2012-5846,0,0,293c765d9bbec76316e616d29cb7fcf84895e8987d32cc4458fd70dc76a65c59,2023-11-07T02:12:43.430000 CVE-2012-5847,0,0,490be5938436680c1205012b8c56fca867f5b6852598e55a70a2d2cbcd62a526,2023-11-07T02:12:43.630000 CVE-2012-5848,0,0,51fc4b299103acaca6696cd75e85db30ee9cf8e07dd19f4d0164dbd2e450ec7b,2023-11-07T02:12:43.840000 CVE-2012-5849,0,0,4899c4e376c4cba33eb97138ef356440ed13b3a5be98d73832bbb380b53d7b8c,2015-05-15T13:27:15.277000 -CVE-2012-5851,0,1,d45b106a8b66fe48b50d057fd7f8570bb8bd1349e09a8b05a6aab29db6d5ddab,2024-11-21T01:45:22.053000 +CVE-2012-5851,0,0,d45b106a8b66fe48b50d057fd7f8570bb8bd1349e09a8b05a6aab29db6d5ddab,2024-11-21T01:45:22.053000 CVE-2012-5853,0,0,be4e79b53386d625f460ca5354e13699626c761dac9b4c5215ccef98967269dc,2019-06-24T17:30:21.317000 -CVE-2012-5854,0,1,1fc3c49bdd6edc7389fccc8b8613feee7d11986a2e47e749f061236a5bdcc10c,2024-11-21T01:45:22.367000 -CVE-2012-5855,0,1,deea5d339e504a8cb4ac5e226ea0d9ac50398715f4a38be79871382e66c8247c,2024-11-21T01:45:22.520000 -CVE-2012-5856,0,1,408243acef5924a1695d857141fe14455d8479fe518ec3467de8920279eb8ad6,2024-11-21T01:45:22.670000 -CVE-2012-5858,0,1,abd3dda390bbd775cc46a792741df687b764a80263d47156158e1f29d498aaf2,2024-11-21T01:45:22.807000 -CVE-2012-5859,0,1,6247cbcb457e3d128f24654951106c17fe02639f00347f93ba790b03d5ee1200,2024-11-21T01:45:22.950000 -CVE-2012-5860,0,1,2d90fc96c412b02c531018e348e678c1e46eaf1456916687e4a0230cd9e38073,2024-11-21T01:45:23.090000 -CVE-2012-5861,0,1,8003d5ad5c9b892d78f092c623525746df1f33c988e1961e52d98e16184a5e53,2024-11-21T01:45:23.233000 -CVE-2012-5862,0,1,232f089fcdecfc0dc80e12eee4f04954860809460c49ec2994fb430164e8be34,2024-11-21T01:45:23.357000 -CVE-2012-5863,0,1,9c8b98d449ec77c056343299e58b16bed224e9b670f55aa5cd2263c619da5e6f,2024-11-21T01:45:23.473000 -CVE-2012-5864,0,1,b3469ad8a4e9cb8db0c77f29fab8ee0b3d10599178a557386eba8a6939229cc0,2024-11-21T01:45:23.600000 +CVE-2012-5854,0,0,1fc3c49bdd6edc7389fccc8b8613feee7d11986a2e47e749f061236a5bdcc10c,2024-11-21T01:45:22.367000 +CVE-2012-5855,0,0,deea5d339e504a8cb4ac5e226ea0d9ac50398715f4a38be79871382e66c8247c,2024-11-21T01:45:22.520000 +CVE-2012-5856,0,0,408243acef5924a1695d857141fe14455d8479fe518ec3467de8920279eb8ad6,2024-11-21T01:45:22.670000 +CVE-2012-5858,0,0,abd3dda390bbd775cc46a792741df687b764a80263d47156158e1f29d498aaf2,2024-11-21T01:45:22.807000 +CVE-2012-5859,0,0,6247cbcb457e3d128f24654951106c17fe02639f00347f93ba790b03d5ee1200,2024-11-21T01:45:22.950000 +CVE-2012-5860,0,0,2d90fc96c412b02c531018e348e678c1e46eaf1456916687e4a0230cd9e38073,2024-11-21T01:45:23.090000 +CVE-2012-5861,0,0,8003d5ad5c9b892d78f092c623525746df1f33c988e1961e52d98e16184a5e53,2024-11-21T01:45:23.233000 +CVE-2012-5862,0,0,232f089fcdecfc0dc80e12eee4f04954860809460c49ec2994fb430164e8be34,2024-11-21T01:45:23.357000 +CVE-2012-5863,0,0,9c8b98d449ec77c056343299e58b16bed224e9b670f55aa5cd2263c619da5e6f,2024-11-21T01:45:23.473000 +CVE-2012-5864,0,0,b3469ad8a4e9cb8db0c77f29fab8ee0b3d10599178a557386eba8a6939229cc0,2024-11-21T01:45:23.600000 CVE-2012-5865,0,0,172a3e491aa90e26e151684f9e119d3e7d1b458c43f66ec0d4e4e76710d16ccd,2017-08-29T01:32:49.573000 CVE-2012-5866,0,0,b0547fc7c7093b03da8799e79c139a2d48e0ba81b02841b0f80522238f895b4f,2017-08-29T01:32:49.620000 CVE-2012-5867,0,0,d2df303ad8a0d213c9e946eded7de9ada39753488702268faba5b4eb7e1ff617,2020-01-28T20:15:59.450000 -CVE-2012-5868,0,1,9b947d9330aa3a7a96795260d9f2bde5b61721bfbe2ad1c901944484b60660b9,2024-11-21T01:45:24.193000 +CVE-2012-5868,0,0,9b947d9330aa3a7a96795260d9f2bde5b61721bfbe2ad1c901944484b60660b9,2024-11-21T01:45:24.193000 CVE-2012-5872,0,0,f4684fc01cd09c78924a0e8173b0e1f3d679c53165836fc220f3328d87181595,2023-05-05T17:29:16.587000 CVE-2012-5873,0,0,57c21ca0c8e010311f5549ceb506ac9ec72bd14aea08c524a71a12fe78f8877c,2023-05-08T13:37:47.017000 -CVE-2012-5874,0,1,e1f56938418577b66830d7c7a46fb308d516731a6e4d4b1f74fe41e576ca9487,2024-11-21T01:45:24.623000 -CVE-2012-5875,0,1,04d3c6f030c99f38f839b154546c5074086651830af0c93c1885b785cbf3e274,2024-11-21T01:45:24.790000 +CVE-2012-5874,0,0,e1f56938418577b66830d7c7a46fb308d516731a6e4d4b1f74fe41e576ca9487,2024-11-21T01:45:24.623000 +CVE-2012-5875,0,0,04d3c6f030c99f38f839b154546c5074086651830af0c93c1885b785cbf3e274,2024-11-21T01:45:24.790000 CVE-2012-5876,0,0,93c3eb7f7c904348bdccdc75fa862e7539a7dd17fdc8ab92f67249f20e2a8db9,2017-08-29T01:32:49.683000 CVE-2012-5877,0,0,84126fb41bfd679f829d1cadcbdb0f2a6d9ba3eb49663ef6b6279393d6482d58,2017-08-29T01:32:49.747000 CVE-2012-5878,0,0,aaf7bd947e90acd8cc5ff6531ea4233a021982db3f0d34a88c0867bbab1ac0e4,2020-01-15T17:06:17.963000 -CVE-2012-5879,0,1,d9db8ee40c4af2f93adf88bff3d5b2987c63dec9e0eead0b612df8b5375a7d70,2024-11-21T01:45:25.390000 -CVE-2012-5881,0,1,23e7d344282d95dc91faf926b192c5321c750ebd71ae507bb500a693d8180a90,2024-11-21T01:45:25.540000 -CVE-2012-5882,0,1,15a6276ded7a60eb29923e44a505e8b6dffc645534f495ba03b307e7a25e52cd,2024-11-21T01:45:25.687000 -CVE-2012-5883,0,1,db2e67f23814d060f35b60069566312329e0c3c173801beffb8e6067d51fed45,2024-11-21T01:45:25.850000 -CVE-2012-5884,0,1,ac2709b6efc1624df7caf861f6ff705b422dab97a080a82333575f64bc7d85bc,2024-11-21T01:45:26 -CVE-2012-5885,0,1,d1460671941a8a39c5599bfdc99da3205b9af1bdc03d372b21f48f8558a3779b,2024-11-21T01:45:26.140000 -CVE-2012-5886,0,1,d6e69f2f6b3db4c675ccf4a90807c9173b461922262b93a06deac9839d51272d,2024-11-21T01:45:26.327000 -CVE-2012-5887,0,1,a2c83371e122996a19b45b2b36a0e2fa0bfbce0442248529335562a77ceb7d6f,2024-11-21T01:45:26.517000 -CVE-2012-5888,0,1,420cb69fd67793df224bcabb8d440b4fa32fc162b72e0d36478e488767abf4d7,2024-11-21T01:45:26.710000 -CVE-2012-5889,0,1,13349283ee9d438e4a99e5a920a95286d4d3b8fb849b3348dfef2fde95740556,2024-11-21T01:45:26.853000 -CVE-2012-5890,0,1,86d988b630d645c2a33a2fa9fd2226ae4afd9c18ac171cc087f553c0cb6a70d1,2024-11-21T01:45:27.017000 -CVE-2012-5891,0,1,91f613459602437fab2860d5916c3347968087875ddc00bae4ead4ae64ee048f,2024-11-21T01:45:27.163000 -CVE-2012-5892,0,1,550aff5175a2c10e925a120e5af3fbc58fe7aeee05033aa3b5c6343e29c628ad,2024-11-21T01:45:27.310000 -CVE-2012-5893,0,1,663818faf511cf7dc254dcc5efdb0742e73eb46f8aa9637b69ee1c583c03590d,2024-11-21T01:45:27.457000 -CVE-2012-5894,0,1,d8d17f9a7508108eb1026c42ec0b46fcb3a8d2ccb607f7754c5fea100bceb67e,2024-11-21T01:45:27.597000 -CVE-2012-5895,0,1,089159edf687e41db973dd13a0419b462e957c2e1a9e24880a20f7ad4127236e,2024-11-21T01:45:27.737000 -CVE-2012-5896,0,1,4cfa5da1fbfc2fb833a523346b59d1fdc7ccdfa07001440259610b51b604fab0,2024-11-21T01:45:27.883000 -CVE-2012-5897,0,1,15b85e1ad21b20bd3455c8dfd1b0c3b939f6f209ccc5ed156b43fdd9bb60fd46,2024-11-21T01:45:28.030000 -CVE-2012-5898,0,1,503c6791e4aadee7b4c3ff57e02b84202799087a257cbbb54cdedfbcc4d0636b,2024-11-21T01:45:28.173000 -CVE-2012-5899,0,1,ab3483406df867a7b2cf6451c700f8a6fc15cae097abe979298ab250b1ff29bf,2024-11-21T01:45:28.320000 -CVE-2012-5900,0,1,493537c926b5f5b7d491c2583379038861930154085b99896414682b7236c6e1,2024-11-21T01:45:28.463000 -CVE-2012-5901,0,1,3a10d1aa05182f05f3bf36d53f4231145c727c699cf686ab106c9c22d6f2a97d,2024-11-21T01:45:28.610000 -CVE-2012-5902,0,1,530b5cd492f48e424a3624a6600fd011697d8bceb1096b36130ab6d43ee92436,2024-11-21T01:45:28.767000 -CVE-2012-5903,0,1,7c70cfe1296639603ee183d29c25bf63ad651ac6c8ae7429178e51b0650a4b9b,2024-11-21T01:45:28.910000 -CVE-2012-5904,0,1,7e312ad72c0638ba52a502b7043137a00ab20b97b7160941747c01ed00fcdaf4,2024-11-21T01:45:29.063000 -CVE-2012-5905,0,1,e780e104ff13db130f64481cd2ae6d16138f89c3d21e0aada3e72cbda54e6841,2024-11-21T01:45:29.233000 -CVE-2012-5906,0,1,e43bc58fb5570cbaf237930cf57712fda0ef708d23aa3b1a95d8da7557afb9fe,2024-11-21T01:45:29.390000 -CVE-2012-5907,0,1,b76864e9525b3f77b29949205dacee8fbdae6f834aa88922ccb39153a0ab557c,2024-11-21T01:45:29.540000 -CVE-2012-5908,0,1,55f53fb054fc9be4fecb00e158e965361ac45f1abd77c7b5442d341407d6764c,2024-11-21T01:45:29.700000 -CVE-2012-5909,0,1,c8c99fb49fd8daf7a614b5bd7d760251c8c412706d3922e471c31814481a858c,2024-11-21T01:45:29.847000 -CVE-2012-5910,0,1,f70f05980602f8a91bdf3ad73b3a2435832367aa626afc0f6270a18a2f37962d,2024-11-21T01:45:30.007000 -CVE-2012-5911,0,1,cd8b9d1b93eccdf81bde0d237fc58490f2dfd3e7f6d138b5cb0d0fd4c1fe4828,2024-11-21T01:45:30.153000 -CVE-2012-5912,0,1,ae7fc9ada26a98d2b0d3bb726b6f44bf4442374e4619516402ade87307a36437,2024-11-21T01:45:30.303000 -CVE-2012-5913,0,1,054f1d8f39a15b52d0d41c09b589496de6be5e978db94a83a205c61b099d6567,2024-11-21T01:45:30.450000 -CVE-2012-5914,0,1,da533c102e05ecde20730e787e362b19a62e8e19fed26e95903c3979aff12998,2024-11-21T01:45:30.597000 -CVE-2012-5915,0,1,2c6f6f1a5014c4fd4028bf5423e79cd1691090b982f371c641febfd6b23e9be5,2024-11-21T01:45:30.747000 -CVE-2012-5916,0,1,49de792f9a42d346a7e0fcd490c3b405961d746fc7a4b2f13c77465a7215c040,2024-11-21T01:45:30.900000 -CVE-2012-5917,0,1,f6bdff3ab8df3c2c2ef0043e653e2eafa817d59cc51f269a1d4d1e6c9a5620a7,2024-11-21T01:45:31.073000 -CVE-2012-5918,0,1,361095c2a4a3a70abe771f91751585d38a1d77f4c7085aabac49bc32552b6359,2024-11-21T01:45:31.863000 -CVE-2012-5919,0,1,58eb3b34e436aa68672d020d5358e35862f692574756a5eeb5c87b1d8e029dda,2024-11-21T01:45:32.430000 -CVE-2012-5920,0,1,b796c40f3e346df2547acf3fc6eef2a188eb17d7dac78c2350c19a84ee15df83,2024-11-21T01:45:32.577000 -CVE-2012-5930,0,1,e420ce6b1bee2916cc0cc6250219848840e79e8a53bee7acdb2a3e7c29f44bbd,2024-11-21T01:45:32.723000 -CVE-2012-5931,0,1,0902e67a6728481d9c45b6aa1432ee4acc45399ce2978109b639cbee9d9e207f,2024-11-21T01:45:32.867000 -CVE-2012-5932,0,1,388f0abb3b565b55d853a1efee53d80c5854ae20839f3f4672d9f0ab53e2d319,2024-11-21T01:45:33.030000 -CVE-2012-5936,0,1,36540765b36be95ae5da8389643d4680be04e3f9a372518a284bfbf308e682b1,2024-11-21T01:45:33.177000 -CVE-2012-5937,0,1,4536aca1cee6bd89a80562a4632858b8af0c9043df022aa449f3dd672d26e32e,2024-11-21T01:45:33.297000 -CVE-2012-5938,0,1,132a17f86d9367236f372611dd22cbba2eb0c3e22aba945bbcf75becc4b6496f,2024-11-21T01:45:33.413000 -CVE-2012-5939,0,1,98ac6a732a96778f7538b5f7a96f829a15185f539c3aa1f6e330dd1c4927b497,2024-11-21T01:45:33.523000 -CVE-2012-5940,0,1,8ae5dfb33a1c1bd1304abe45567bcc166b22a48ca02bddd5613b04b2ddd48e46,2024-11-21T01:45:33.633000 -CVE-2012-5941,0,1,b3b9ed88a79b256adc2dadd46c5c85378f454fa267f8df2a4a8c276815418f7b,2024-11-21T01:45:33.740000 -CVE-2012-5942,0,1,60bb49e532af96d116af483c362f883d0c8aac371a673f782007b7b5e1e21ad5,2024-11-21T01:45:33.880000 -CVE-2012-5943,0,1,bcbf9b1c4e506245a3096d383d6c389a58d0b676c02b250e1be019ae6a006907,2024-11-21T01:45:34.010000 -CVE-2012-5945,0,1,0f4ce2967f45208e0b005e8fc1176748b3034b3edbc1477e842c7515c7fa3aef,2024-11-21T01:45:34.130000 -CVE-2012-5946,0,1,4d9849b85b6a96da4e509cf9cfa67ae61998b34db680a985142b5103fe86065c,2024-11-21T01:45:34.253000 -CVE-2012-5947,0,1,fa7e8af67fc21eeb9878a3a05b782d2a820c2855838fc6d6b276cec8188728c9,2024-11-21T01:45:34.387000 -CVE-2012-5948,0,1,61752eebfc93121ae6041eb505075ef335907382ca29694bb3a28d2e1143f4db,2024-11-21T01:45:34.503000 -CVE-2012-5949,0,1,7048ea649e758cc40fe36c16bd8f363c9d2bca2c99296efd77ac19e2bc312f29,2024-11-21T01:45:34.620000 -CVE-2012-5950,0,1,96525d7bb2fd095dc85ea3aed065820f3c9f54cfe3f7255a60b08f0cd7a071de,2024-11-21T01:45:34.747000 -CVE-2012-5951,0,1,243dc5e4150051992f72ec7211d133fe24e6267f85ee0cbcfb609cb253120e2e,2024-11-21T01:45:34.860000 -CVE-2012-5952,0,1,e7b97345b456905d742eeb5172d200943acbd100e4a2ef714f0d66867cba7bca,2024-11-21T01:45:35.020000 -CVE-2012-5953,0,1,ec6796c468234dd7496347e17b50d91e7e79468905d697b1b7704204ce6edb8f,2024-11-21T01:45:35.153000 -CVE-2012-5954,0,1,b3acc9e70e003430ad22c2b12a414cdd02cd36b887ac5ad0edcc3ed850ec1fe2,2024-11-21T01:45:35.283000 -CVE-2012-5955,0,1,c0e538090c62ce46061c2b136409ce5b3a385c9b30d59b3435c3e0b695cb4296,2024-11-21T01:45:35.417000 -CVE-2012-5956,0,1,18f15fd4c516ad8b6c674f3c9f5bc58cce33bc7ed791f213e333671209f4748e,2024-11-21T01:45:35.543000 -CVE-2012-5958,0,1,03506e840a8cc67d8bcbbfd2fb4dac91a0d909cf68080eefdd8023bd712f19b7,2024-11-21T01:45:35.673000 -CVE-2012-5959,0,1,d5cfe3b4aed98a76be9fa2d3e77fc74e8c159b037a3fb5d50c44e5f6a5f07464,2024-11-21T01:45:35.850000 -CVE-2012-5960,0,1,d22512c59f7916a6ca6254c480982478667d9db3a4afaddd172c2708d76ef6eb,2024-11-21T01:45:36.017000 -CVE-2012-5961,0,1,02d8d55ae6689108c5d64267898367ab0f1df1738a031050ac9703f6c7c41646,2024-11-21T01:45:36.173000 -CVE-2012-5962,0,1,5487dbf7c4b5726c204611bb98ae84b91e0e433a3df2497a81a6125f88bd4e70,2024-11-21T01:45:36.323000 -CVE-2012-5963,0,1,405235422447d76bb958d1ab1420a3fedd01ea6fad929c29bb45df8c24f59255,2024-11-21T01:45:36.460000 -CVE-2012-5964,0,1,a9bd6bbd5234ed53b787bf47bd8a5b881b1cf30e3908e658dc6506b6fa7935a7,2024-11-21T01:45:36.603000 -CVE-2012-5965,0,1,3131ddd1c0c53d3555e75e6f5a4f413f6b0a73c48bf91f1ea28ac7602a58cf3f,2024-11-21T01:45:36.730000 -CVE-2012-5966,0,1,0cc7d2dcccf043a6bfb23038f01c7cfe393315d74078bbc756a8045988cf5cd2,2024-11-21T01:45:36.877000 -CVE-2012-5967,0,1,fff6d74a2da8106470e88eca9a3d42a5bfc771ccd3f251cc749cf07f921fbd4d,2024-11-21T01:45:36.997000 -CVE-2012-5968,0,1,2b4d53e4178d3b277af05c8abad94bae812d43762b7bad1177c3aff9693176f0,2024-11-21T01:45:37.120000 -CVE-2012-5969,0,1,e9fa611351b9b5f7f61c12e62da49d14232e3953f740207f9e7445d42bc34d2a,2024-11-21T01:45:37.240000 -CVE-2012-5970,0,1,05d45f61e1a603b9b742a971113e18c1853171b53bd39a5208f4da1c4f4f9ad1,2024-11-21T01:45:37.353000 -CVE-2012-5972,0,1,bf463830384569f60d1fba4b65361ec9fadcb2a06514a11781b69f3c902493d3,2024-11-21T01:45:37.467000 -CVE-2012-5973,0,1,0b1628873ae06bedbfa357d143945427c5e508be94d48d53f2d594fc10fda726,2024-11-21T01:45:37.587000 -CVE-2012-5975,0,1,be59ee2afd4b19ebe730e7042c6308c5ac2729d1e500ef6d2910898f7a77c305,2024-11-21T01:45:37.737000 -CVE-2012-5976,0,1,fcbe46f3cc4af189bb5be43e37461372f68cf0a5244def196b2f52ff2cdc03c0,2024-11-21T01:45:37.900000 -CVE-2012-5977,0,1,28325a6451689ac3747129b65e31f01ed3bc0d85441522f27c75e61acbb27790,2024-11-21T01:45:38.077000 -CVE-2012-5978,0,1,81ee23cf70365c61056867740d3e0a87baee473ba158bfc834a30a5eeb22cb58,2024-11-21T01:45:38.250000 +CVE-2012-5879,0,0,d9db8ee40c4af2f93adf88bff3d5b2987c63dec9e0eead0b612df8b5375a7d70,2024-11-21T01:45:25.390000 +CVE-2012-5881,0,0,23e7d344282d95dc91faf926b192c5321c750ebd71ae507bb500a693d8180a90,2024-11-21T01:45:25.540000 +CVE-2012-5882,0,0,15a6276ded7a60eb29923e44a505e8b6dffc645534f495ba03b307e7a25e52cd,2024-11-21T01:45:25.687000 +CVE-2012-5883,0,0,db2e67f23814d060f35b60069566312329e0c3c173801beffb8e6067d51fed45,2024-11-21T01:45:25.850000 +CVE-2012-5884,0,0,ac2709b6efc1624df7caf861f6ff705b422dab97a080a82333575f64bc7d85bc,2024-11-21T01:45:26 +CVE-2012-5885,0,0,d1460671941a8a39c5599bfdc99da3205b9af1bdc03d372b21f48f8558a3779b,2024-11-21T01:45:26.140000 +CVE-2012-5886,0,0,d6e69f2f6b3db4c675ccf4a90807c9173b461922262b93a06deac9839d51272d,2024-11-21T01:45:26.327000 +CVE-2012-5887,0,0,a2c83371e122996a19b45b2b36a0e2fa0bfbce0442248529335562a77ceb7d6f,2024-11-21T01:45:26.517000 +CVE-2012-5888,0,0,420cb69fd67793df224bcabb8d440b4fa32fc162b72e0d36478e488767abf4d7,2024-11-21T01:45:26.710000 +CVE-2012-5889,0,0,13349283ee9d438e4a99e5a920a95286d4d3b8fb849b3348dfef2fde95740556,2024-11-21T01:45:26.853000 +CVE-2012-5890,0,0,86d988b630d645c2a33a2fa9fd2226ae4afd9c18ac171cc087f553c0cb6a70d1,2024-11-21T01:45:27.017000 +CVE-2012-5891,0,0,91f613459602437fab2860d5916c3347968087875ddc00bae4ead4ae64ee048f,2024-11-21T01:45:27.163000 +CVE-2012-5892,0,0,550aff5175a2c10e925a120e5af3fbc58fe7aeee05033aa3b5c6343e29c628ad,2024-11-21T01:45:27.310000 +CVE-2012-5893,0,0,663818faf511cf7dc254dcc5efdb0742e73eb46f8aa9637b69ee1c583c03590d,2024-11-21T01:45:27.457000 +CVE-2012-5894,0,0,d8d17f9a7508108eb1026c42ec0b46fcb3a8d2ccb607f7754c5fea100bceb67e,2024-11-21T01:45:27.597000 +CVE-2012-5895,0,0,089159edf687e41db973dd13a0419b462e957c2e1a9e24880a20f7ad4127236e,2024-11-21T01:45:27.737000 +CVE-2012-5896,0,0,4cfa5da1fbfc2fb833a523346b59d1fdc7ccdfa07001440259610b51b604fab0,2024-11-21T01:45:27.883000 +CVE-2012-5897,0,0,15b85e1ad21b20bd3455c8dfd1b0c3b939f6f209ccc5ed156b43fdd9bb60fd46,2024-11-21T01:45:28.030000 +CVE-2012-5898,0,0,503c6791e4aadee7b4c3ff57e02b84202799087a257cbbb54cdedfbcc4d0636b,2024-11-21T01:45:28.173000 +CVE-2012-5899,0,0,ab3483406df867a7b2cf6451c700f8a6fc15cae097abe979298ab250b1ff29bf,2024-11-21T01:45:28.320000 +CVE-2012-5900,0,0,493537c926b5f5b7d491c2583379038861930154085b99896414682b7236c6e1,2024-11-21T01:45:28.463000 +CVE-2012-5901,0,0,3a10d1aa05182f05f3bf36d53f4231145c727c699cf686ab106c9c22d6f2a97d,2024-11-21T01:45:28.610000 +CVE-2012-5902,0,0,530b5cd492f48e424a3624a6600fd011697d8bceb1096b36130ab6d43ee92436,2024-11-21T01:45:28.767000 +CVE-2012-5903,0,0,7c70cfe1296639603ee183d29c25bf63ad651ac6c8ae7429178e51b0650a4b9b,2024-11-21T01:45:28.910000 +CVE-2012-5904,0,0,7e312ad72c0638ba52a502b7043137a00ab20b97b7160941747c01ed00fcdaf4,2024-11-21T01:45:29.063000 +CVE-2012-5905,0,0,e780e104ff13db130f64481cd2ae6d16138f89c3d21e0aada3e72cbda54e6841,2024-11-21T01:45:29.233000 +CVE-2012-5906,0,0,e43bc58fb5570cbaf237930cf57712fda0ef708d23aa3b1a95d8da7557afb9fe,2024-11-21T01:45:29.390000 +CVE-2012-5907,0,0,b76864e9525b3f77b29949205dacee8fbdae6f834aa88922ccb39153a0ab557c,2024-11-21T01:45:29.540000 +CVE-2012-5908,0,0,55f53fb054fc9be4fecb00e158e965361ac45f1abd77c7b5442d341407d6764c,2024-11-21T01:45:29.700000 +CVE-2012-5909,0,0,c8c99fb49fd8daf7a614b5bd7d760251c8c412706d3922e471c31814481a858c,2024-11-21T01:45:29.847000 +CVE-2012-5910,0,0,f70f05980602f8a91bdf3ad73b3a2435832367aa626afc0f6270a18a2f37962d,2024-11-21T01:45:30.007000 +CVE-2012-5911,0,0,cd8b9d1b93eccdf81bde0d237fc58490f2dfd3e7f6d138b5cb0d0fd4c1fe4828,2024-11-21T01:45:30.153000 +CVE-2012-5912,0,0,ae7fc9ada26a98d2b0d3bb726b6f44bf4442374e4619516402ade87307a36437,2024-11-21T01:45:30.303000 +CVE-2012-5913,0,0,054f1d8f39a15b52d0d41c09b589496de6be5e978db94a83a205c61b099d6567,2024-11-21T01:45:30.450000 +CVE-2012-5914,0,0,da533c102e05ecde20730e787e362b19a62e8e19fed26e95903c3979aff12998,2024-11-21T01:45:30.597000 +CVE-2012-5915,0,0,2c6f6f1a5014c4fd4028bf5423e79cd1691090b982f371c641febfd6b23e9be5,2024-11-21T01:45:30.747000 +CVE-2012-5916,0,0,49de792f9a42d346a7e0fcd490c3b405961d746fc7a4b2f13c77465a7215c040,2024-11-21T01:45:30.900000 +CVE-2012-5917,0,0,f6bdff3ab8df3c2c2ef0043e653e2eafa817d59cc51f269a1d4d1e6c9a5620a7,2024-11-21T01:45:31.073000 +CVE-2012-5918,0,0,361095c2a4a3a70abe771f91751585d38a1d77f4c7085aabac49bc32552b6359,2024-11-21T01:45:31.863000 +CVE-2012-5919,0,0,58eb3b34e436aa68672d020d5358e35862f692574756a5eeb5c87b1d8e029dda,2024-11-21T01:45:32.430000 +CVE-2012-5920,0,0,b796c40f3e346df2547acf3fc6eef2a188eb17d7dac78c2350c19a84ee15df83,2024-11-21T01:45:32.577000 +CVE-2012-5930,0,0,e420ce6b1bee2916cc0cc6250219848840e79e8a53bee7acdb2a3e7c29f44bbd,2024-11-21T01:45:32.723000 +CVE-2012-5931,0,0,0902e67a6728481d9c45b6aa1432ee4acc45399ce2978109b639cbee9d9e207f,2024-11-21T01:45:32.867000 +CVE-2012-5932,0,0,388f0abb3b565b55d853a1efee53d80c5854ae20839f3f4672d9f0ab53e2d319,2024-11-21T01:45:33.030000 +CVE-2012-5936,0,0,36540765b36be95ae5da8389643d4680be04e3f9a372518a284bfbf308e682b1,2024-11-21T01:45:33.177000 +CVE-2012-5937,0,0,4536aca1cee6bd89a80562a4632858b8af0c9043df022aa449f3dd672d26e32e,2024-11-21T01:45:33.297000 +CVE-2012-5938,0,0,132a17f86d9367236f372611dd22cbba2eb0c3e22aba945bbcf75becc4b6496f,2024-11-21T01:45:33.413000 +CVE-2012-5939,0,0,98ac6a732a96778f7538b5f7a96f829a15185f539c3aa1f6e330dd1c4927b497,2024-11-21T01:45:33.523000 +CVE-2012-5940,0,0,8ae5dfb33a1c1bd1304abe45567bcc166b22a48ca02bddd5613b04b2ddd48e46,2024-11-21T01:45:33.633000 +CVE-2012-5941,0,0,b3b9ed88a79b256adc2dadd46c5c85378f454fa267f8df2a4a8c276815418f7b,2024-11-21T01:45:33.740000 +CVE-2012-5942,0,0,60bb49e532af96d116af483c362f883d0c8aac371a673f782007b7b5e1e21ad5,2024-11-21T01:45:33.880000 +CVE-2012-5943,0,0,bcbf9b1c4e506245a3096d383d6c389a58d0b676c02b250e1be019ae6a006907,2024-11-21T01:45:34.010000 +CVE-2012-5945,0,0,0f4ce2967f45208e0b005e8fc1176748b3034b3edbc1477e842c7515c7fa3aef,2024-11-21T01:45:34.130000 +CVE-2012-5946,0,0,4d9849b85b6a96da4e509cf9cfa67ae61998b34db680a985142b5103fe86065c,2024-11-21T01:45:34.253000 +CVE-2012-5947,0,0,fa7e8af67fc21eeb9878a3a05b782d2a820c2855838fc6d6b276cec8188728c9,2024-11-21T01:45:34.387000 +CVE-2012-5948,0,0,61752eebfc93121ae6041eb505075ef335907382ca29694bb3a28d2e1143f4db,2024-11-21T01:45:34.503000 +CVE-2012-5949,0,0,7048ea649e758cc40fe36c16bd8f363c9d2bca2c99296efd77ac19e2bc312f29,2024-11-21T01:45:34.620000 +CVE-2012-5950,0,0,96525d7bb2fd095dc85ea3aed065820f3c9f54cfe3f7255a60b08f0cd7a071de,2024-11-21T01:45:34.747000 +CVE-2012-5951,0,0,243dc5e4150051992f72ec7211d133fe24e6267f85ee0cbcfb609cb253120e2e,2024-11-21T01:45:34.860000 +CVE-2012-5952,0,0,e7b97345b456905d742eeb5172d200943acbd100e4a2ef714f0d66867cba7bca,2024-11-21T01:45:35.020000 +CVE-2012-5953,0,0,ec6796c468234dd7496347e17b50d91e7e79468905d697b1b7704204ce6edb8f,2024-11-21T01:45:35.153000 +CVE-2012-5954,0,0,b3acc9e70e003430ad22c2b12a414cdd02cd36b887ac5ad0edcc3ed850ec1fe2,2024-11-21T01:45:35.283000 +CVE-2012-5955,0,0,c0e538090c62ce46061c2b136409ce5b3a385c9b30d59b3435c3e0b695cb4296,2024-11-21T01:45:35.417000 +CVE-2012-5956,0,0,18f15fd4c516ad8b6c674f3c9f5bc58cce33bc7ed791f213e333671209f4748e,2024-11-21T01:45:35.543000 +CVE-2012-5958,0,0,03506e840a8cc67d8bcbbfd2fb4dac91a0d909cf68080eefdd8023bd712f19b7,2024-11-21T01:45:35.673000 +CVE-2012-5959,0,0,d5cfe3b4aed98a76be9fa2d3e77fc74e8c159b037a3fb5d50c44e5f6a5f07464,2024-11-21T01:45:35.850000 +CVE-2012-5960,0,0,d22512c59f7916a6ca6254c480982478667d9db3a4afaddd172c2708d76ef6eb,2024-11-21T01:45:36.017000 +CVE-2012-5961,0,0,02d8d55ae6689108c5d64267898367ab0f1df1738a031050ac9703f6c7c41646,2024-11-21T01:45:36.173000 +CVE-2012-5962,0,0,5487dbf7c4b5726c204611bb98ae84b91e0e433a3df2497a81a6125f88bd4e70,2024-11-21T01:45:36.323000 +CVE-2012-5963,0,0,405235422447d76bb958d1ab1420a3fedd01ea6fad929c29bb45df8c24f59255,2024-11-21T01:45:36.460000 +CVE-2012-5964,0,0,a9bd6bbd5234ed53b787bf47bd8a5b881b1cf30e3908e658dc6506b6fa7935a7,2024-11-21T01:45:36.603000 +CVE-2012-5965,0,0,3131ddd1c0c53d3555e75e6f5a4f413f6b0a73c48bf91f1ea28ac7602a58cf3f,2024-11-21T01:45:36.730000 +CVE-2012-5966,0,0,0cc7d2dcccf043a6bfb23038f01c7cfe393315d74078bbc756a8045988cf5cd2,2024-11-21T01:45:36.877000 +CVE-2012-5967,0,0,fff6d74a2da8106470e88eca9a3d42a5bfc771ccd3f251cc749cf07f921fbd4d,2024-11-21T01:45:36.997000 +CVE-2012-5968,0,0,2b4d53e4178d3b277af05c8abad94bae812d43762b7bad1177c3aff9693176f0,2024-11-21T01:45:37.120000 +CVE-2012-5969,0,0,e9fa611351b9b5f7f61c12e62da49d14232e3953f740207f9e7445d42bc34d2a,2024-11-21T01:45:37.240000 +CVE-2012-5970,0,0,05d45f61e1a603b9b742a971113e18c1853171b53bd39a5208f4da1c4f4f9ad1,2024-11-21T01:45:37.353000 +CVE-2012-5972,0,0,bf463830384569f60d1fba4b65361ec9fadcb2a06514a11781b69f3c902493d3,2024-11-21T01:45:37.467000 +CVE-2012-5973,0,0,0b1628873ae06bedbfa357d143945427c5e508be94d48d53f2d594fc10fda726,2024-11-21T01:45:37.587000 +CVE-2012-5975,0,0,be59ee2afd4b19ebe730e7042c6308c5ac2729d1e500ef6d2910898f7a77c305,2024-11-21T01:45:37.737000 +CVE-2012-5976,0,0,fcbe46f3cc4af189bb5be43e37461372f68cf0a5244def196b2f52ff2cdc03c0,2024-11-21T01:45:37.900000 +CVE-2012-5977,0,0,28325a6451689ac3747129b65e31f01ed3bc0d85441522f27c75e61acbb27790,2024-11-21T01:45:38.077000 +CVE-2012-5978,0,0,81ee23cf70365c61056867740d3e0a87baee473ba158bfc834a30a5eeb22cb58,2024-11-21T01:45:38.250000 CVE-2012-5979,0,0,5e884af14ae1aa4407cf8ee38946f8399146bcd553e8b3c83123b4fcd73dfbcc,2023-11-07T02:12:44.943000 -CVE-2012-5990,0,1,9c3ecd904b744a3787235f4ac44a4348b2a5176e783a421402162db6f409d78d,2024-11-21T01:45:38.420000 -CVE-2012-5991,0,1,fe6cc583614c682c8110a3d951ae120adc18d8ed3a47b033a399b8cd3584173a,2024-11-21T01:45:38.530000 -CVE-2012-5992,0,1,b253500bd6254e0b8cd1f467cc233a8d977f42e72ee282ea706a4d6ee51d8761,2024-11-21T01:45:38.653000 -CVE-2012-6007,0,1,897b03def6753166f99172ed5305b2177530f490885eb0f47aaff09149b5b927,2024-11-21T01:45:38.773000 -CVE-2012-6026,0,1,5f87a215fda02052a2d6cbcbc92a4475ab11ef206fc02d54fe50aadce3b18a97,2024-11-21T01:45:38.897000 -CVE-2012-6029,0,1,b5bc57a13196e1a49c6bc38da55db8002e124a7311f114ee66cd95979c90aeff,2024-11-21T01:45:39.020000 -CVE-2012-6030,0,1,27d121a5d76c0398e86be6ff7692c067cef2f0cba01fdb77871d2fd81c59c63c,2024-11-21T01:45:39.140000 -CVE-2012-6031,0,1,c9e9c03e32f4c7ab3762818611fe349cd8ece3c522f6da0e37f5bbbe13cfbd4a,2024-11-21T01:45:39.330000 -CVE-2012-6032,0,1,a553abe5b1b943bdb93bc66758504fd34cfa6cbe58e23145150e9457ce1b76f4,2024-11-21T01:45:39.500000 -CVE-2012-6033,0,1,ddab1dbe283fe45da03434cc47684173190224122f107b7edcff42f495407f48,2024-11-21T01:45:39.673000 -CVE-2012-6034,0,1,9d64522912c52bc11b3523eff97d6511191cc83a783ed9e7967289576d75d8d9,2024-11-21T01:45:39.830000 -CVE-2012-6035,0,1,8ba0e1997a984221534a17b75f7250fe22812b52ab9ba2891fb23d4161a30a50,2024-11-21T01:45:40 -CVE-2012-6036,0,1,67e4d8a1e64600851fd174cb10bce749a2b0663c48e8ab7f60507a4422da5426,2024-11-21T01:45:40.163000 -CVE-2012-6037,0,1,8c74bcd3ee0cec9c42ac19d85036bf61320ee048b4a4cedd7050a035020dbe7b,2024-11-21T01:45:40.333000 -CVE-2012-6038,0,1,2cd193fe890b735ed3f0b66205b0fb4ffc4dc356d0658ff371c64f44b0d823ae,2024-11-21T01:45:40.490000 -CVE-2012-6039,0,1,f1966816703c1e99675d5738fda411564f696ac4f4622f1959a319f3d0ae19f7,2024-11-21T01:45:40.657000 -CVE-2012-6040,0,1,42fd3100d8066017fc4cda848ee509e7c7670eb107d53c971639e882ccbeff74,2024-11-21T01:45:40.797000 -CVE-2012-6041,0,1,7a40add1bf0ef0fb864b3dcc92408eacb3c1d0ae7bb905bdf48ce38149ce49ac,2024-11-21T01:45:40.953000 -CVE-2012-6042,0,1,3660734561794902add47a26cf4928e0ed9677d80df7f1a1c0995b6371f96a0d,2024-11-21T01:45:41.100000 -CVE-2012-6043,0,1,5a13736fc089c9bc2d285cb1edda81a77416de50d6a7e7081cf350fe074ca6cd,2024-11-21T01:45:41.247000 -CVE-2012-6044,0,1,d21701343e1465a55063674431539f9a6e3d9efb305d7a7bf37f287e021b4bcd,2024-11-21T01:45:41.400000 -CVE-2012-6045,0,1,feb4fdbae7fc17f0f7531f58bb4fe414b6ec33dd05c61aa7bc652f6a33642b15,2024-11-21T01:45:41.553000 -CVE-2012-6046,0,1,7388eab2c0385d2222d036159ae1ab3958989af5bca17d078a88d38a9dd8f38b,2024-11-21T01:45:41.700000 -CVE-2012-6047,0,1,c2ab5731608638e282da84d9b3c87c5eb0125c53d1183bc7426de2253e0f10bc,2024-11-21T01:45:41.867000 -CVE-2012-6048,0,1,80001b5b903f73acc7851753bd3566798b9fd3c49e159855479da95fa5ac5b6f,2024-11-21T01:45:42.010000 -CVE-2012-6049,0,1,fbfcdcb210829d54134f5e9ddd7ab8b319d835417902f240b4c6af5cf8b7ee49,2024-11-21T01:45:42.157000 -CVE-2012-6050,0,1,c942e68cf9bf7b6c4856e7a5a12a88c7f939f7b379d9476782289b0170cedd06,2024-11-21T01:45:42.310000 -CVE-2012-6051,0,1,41e069e2eaf873cca51e72ccac951cdaa32470533a564bd20c7b79b747e00aad,2024-11-21T01:45:42.453000 -CVE-2012-6052,0,1,0314a1c685774515b942e6a9286de47efd62084321d6dec7716ba9236f20afca,2024-11-21T01:45:42.600000 -CVE-2012-6053,0,1,7e5f0517b8b5772e2f8975f0b9c55345f2ebc89fc60154924d2c11341a93c6b7,2024-11-21T01:45:42.750000 -CVE-2012-6054,0,1,3897803bd5245c388d892c2ac10cade54dea4dfb0748505faa46a4a2503dd4f6,2024-11-21T01:45:42.910000 -CVE-2012-6055,0,1,87490d1219a5385d4134577dc688c6b1681d23b3819d1dff07ed4fa573097464,2024-11-21T01:45:43.067000 -CVE-2012-6056,0,1,0d053832ece4aab13bf9d30b92ce9ec4c9374c6d0cf0083969ad6336bf012cfe,2024-11-21T01:45:43.220000 -CVE-2012-6057,0,1,046628f406ed647f9ac0b7578805451fb3f27b77f27c69dbad3a2b80a4a74c3a,2024-11-21T01:45:43.383000 -CVE-2012-6058,0,1,1f06e020b64b686bbcceeeb14b16b82f679ac9117236f3cbba227b669f3da77b,2024-11-21T01:45:43.540000 -CVE-2012-6059,0,1,6c378ceda231a5ed80b030ccff18b6141acf5c6088563c54b25726fef178348a,2024-11-21T01:45:43.700000 -CVE-2012-6060,0,1,d952a9bb71db75358f2867d4b662f5e78b1fb758f4d0525acc2a6052e771211e,2024-11-21T01:45:43.850000 -CVE-2012-6061,0,1,0a1a2319fd41e6609884fd2061d3865d815b0fb4105a58746c2a81e584730dc6,2024-11-21T01:45:44.010000 -CVE-2012-6062,0,1,3abbcb22b0df775ce8e5b0f07855d363ec037030d384fab239329766d29d1828,2024-11-21T01:45:44.173000 -CVE-2012-6063,0,1,5cbd49bc302595cfe7312cfe2e83f65a25077f36e52b54b8556555f9d021cb1d,2024-11-21T01:45:44.330000 -CVE-2012-6064,0,1,ae539834e0740e4bd31ebe072d66d24a69b3e4aa9b60967de33c391f8f87c129,2024-11-21T01:45:44.497000 -CVE-2012-6065,0,1,f2c2aaeb7aaa9bb86eae515c80fa6eb8470b1dc9560c96190ecc397fe89138ee,2024-11-21T01:45:44.660000 -CVE-2012-6066,0,1,eb02d1cc64f8fc522a28f7c4e01c53ca786f7e77082e1a327ab9fc079a6c79c4,2024-11-21T01:45:44.830000 -CVE-2012-6067,0,1,dd76ae174055b250f024a76a29f13ac87513acbec283975ba3534ceb968b6fdb,2024-11-21T01:45:44.993000 -CVE-2012-6068,0,1,6a0f9edf0ed715d575b4528bfd5e8581c6d42c5476fd909558ea0a7412b7f9b8,2024-11-21T01:45:45.140000 -CVE-2012-6069,0,1,ce0190e221c04cdef7f4ecce40b65a70909c1ba95fc487101bfdc7dc975a9901,2024-11-21T01:45:45.267000 +CVE-2012-5990,0,0,9c3ecd904b744a3787235f4ac44a4348b2a5176e783a421402162db6f409d78d,2024-11-21T01:45:38.420000 +CVE-2012-5991,0,0,fe6cc583614c682c8110a3d951ae120adc18d8ed3a47b033a399b8cd3584173a,2024-11-21T01:45:38.530000 +CVE-2012-5992,0,0,b253500bd6254e0b8cd1f467cc233a8d977f42e72ee282ea706a4d6ee51d8761,2024-11-21T01:45:38.653000 +CVE-2012-6007,0,0,897b03def6753166f99172ed5305b2177530f490885eb0f47aaff09149b5b927,2024-11-21T01:45:38.773000 +CVE-2012-6026,0,0,5f87a215fda02052a2d6cbcbc92a4475ab11ef206fc02d54fe50aadce3b18a97,2024-11-21T01:45:38.897000 +CVE-2012-6029,0,0,b5bc57a13196e1a49c6bc38da55db8002e124a7311f114ee66cd95979c90aeff,2024-11-21T01:45:39.020000 +CVE-2012-6030,0,0,27d121a5d76c0398e86be6ff7692c067cef2f0cba01fdb77871d2fd81c59c63c,2024-11-21T01:45:39.140000 +CVE-2012-6031,0,0,c9e9c03e32f4c7ab3762818611fe349cd8ece3c522f6da0e37f5bbbe13cfbd4a,2024-11-21T01:45:39.330000 +CVE-2012-6032,0,0,a553abe5b1b943bdb93bc66758504fd34cfa6cbe58e23145150e9457ce1b76f4,2024-11-21T01:45:39.500000 +CVE-2012-6033,0,0,ddab1dbe283fe45da03434cc47684173190224122f107b7edcff42f495407f48,2024-11-21T01:45:39.673000 +CVE-2012-6034,0,0,9d64522912c52bc11b3523eff97d6511191cc83a783ed9e7967289576d75d8d9,2024-11-21T01:45:39.830000 +CVE-2012-6035,0,0,8ba0e1997a984221534a17b75f7250fe22812b52ab9ba2891fb23d4161a30a50,2024-11-21T01:45:40 +CVE-2012-6036,0,0,67e4d8a1e64600851fd174cb10bce749a2b0663c48e8ab7f60507a4422da5426,2024-11-21T01:45:40.163000 +CVE-2012-6037,0,0,8c74bcd3ee0cec9c42ac19d85036bf61320ee048b4a4cedd7050a035020dbe7b,2024-11-21T01:45:40.333000 +CVE-2012-6038,0,0,2cd193fe890b735ed3f0b66205b0fb4ffc4dc356d0658ff371c64f44b0d823ae,2024-11-21T01:45:40.490000 +CVE-2012-6039,0,0,f1966816703c1e99675d5738fda411564f696ac4f4622f1959a319f3d0ae19f7,2024-11-21T01:45:40.657000 +CVE-2012-6040,0,0,42fd3100d8066017fc4cda848ee509e7c7670eb107d53c971639e882ccbeff74,2024-11-21T01:45:40.797000 +CVE-2012-6041,0,0,7a40add1bf0ef0fb864b3dcc92408eacb3c1d0ae7bb905bdf48ce38149ce49ac,2024-11-21T01:45:40.953000 +CVE-2012-6042,0,0,3660734561794902add47a26cf4928e0ed9677d80df7f1a1c0995b6371f96a0d,2024-11-21T01:45:41.100000 +CVE-2012-6043,0,0,5a13736fc089c9bc2d285cb1edda81a77416de50d6a7e7081cf350fe074ca6cd,2024-11-21T01:45:41.247000 +CVE-2012-6044,0,0,d21701343e1465a55063674431539f9a6e3d9efb305d7a7bf37f287e021b4bcd,2024-11-21T01:45:41.400000 +CVE-2012-6045,0,0,feb4fdbae7fc17f0f7531f58bb4fe414b6ec33dd05c61aa7bc652f6a33642b15,2024-11-21T01:45:41.553000 +CVE-2012-6046,0,0,7388eab2c0385d2222d036159ae1ab3958989af5bca17d078a88d38a9dd8f38b,2024-11-21T01:45:41.700000 +CVE-2012-6047,0,0,c2ab5731608638e282da84d9b3c87c5eb0125c53d1183bc7426de2253e0f10bc,2024-11-21T01:45:41.867000 +CVE-2012-6048,0,0,80001b5b903f73acc7851753bd3566798b9fd3c49e159855479da95fa5ac5b6f,2024-11-21T01:45:42.010000 +CVE-2012-6049,0,0,fbfcdcb210829d54134f5e9ddd7ab8b319d835417902f240b4c6af5cf8b7ee49,2024-11-21T01:45:42.157000 +CVE-2012-6050,0,0,c942e68cf9bf7b6c4856e7a5a12a88c7f939f7b379d9476782289b0170cedd06,2024-11-21T01:45:42.310000 +CVE-2012-6051,0,0,41e069e2eaf873cca51e72ccac951cdaa32470533a564bd20c7b79b747e00aad,2024-11-21T01:45:42.453000 +CVE-2012-6052,0,0,0314a1c685774515b942e6a9286de47efd62084321d6dec7716ba9236f20afca,2024-11-21T01:45:42.600000 +CVE-2012-6053,0,0,7e5f0517b8b5772e2f8975f0b9c55345f2ebc89fc60154924d2c11341a93c6b7,2024-11-21T01:45:42.750000 +CVE-2012-6054,0,0,3897803bd5245c388d892c2ac10cade54dea4dfb0748505faa46a4a2503dd4f6,2024-11-21T01:45:42.910000 +CVE-2012-6055,0,0,87490d1219a5385d4134577dc688c6b1681d23b3819d1dff07ed4fa573097464,2024-11-21T01:45:43.067000 +CVE-2012-6056,0,0,0d053832ece4aab13bf9d30b92ce9ec4c9374c6d0cf0083969ad6336bf012cfe,2024-11-21T01:45:43.220000 +CVE-2012-6057,0,0,046628f406ed647f9ac0b7578805451fb3f27b77f27c69dbad3a2b80a4a74c3a,2024-11-21T01:45:43.383000 +CVE-2012-6058,0,0,1f06e020b64b686bbcceeeb14b16b82f679ac9117236f3cbba227b669f3da77b,2024-11-21T01:45:43.540000 +CVE-2012-6059,0,0,6c378ceda231a5ed80b030ccff18b6141acf5c6088563c54b25726fef178348a,2024-11-21T01:45:43.700000 +CVE-2012-6060,0,0,d952a9bb71db75358f2867d4b662f5e78b1fb758f4d0525acc2a6052e771211e,2024-11-21T01:45:43.850000 +CVE-2012-6061,0,0,0a1a2319fd41e6609884fd2061d3865d815b0fb4105a58746c2a81e584730dc6,2024-11-21T01:45:44.010000 +CVE-2012-6062,0,0,3abbcb22b0df775ce8e5b0f07855d363ec037030d384fab239329766d29d1828,2024-11-21T01:45:44.173000 +CVE-2012-6063,0,0,5cbd49bc302595cfe7312cfe2e83f65a25077f36e52b54b8556555f9d021cb1d,2024-11-21T01:45:44.330000 +CVE-2012-6064,0,0,ae539834e0740e4bd31ebe072d66d24a69b3e4aa9b60967de33c391f8f87c129,2024-11-21T01:45:44.497000 +CVE-2012-6065,0,0,f2c2aaeb7aaa9bb86eae515c80fa6eb8470b1dc9560c96190ecc397fe89138ee,2024-11-21T01:45:44.660000 +CVE-2012-6066,0,0,eb02d1cc64f8fc522a28f7c4e01c53ca786f7e77082e1a327ab9fc079a6c79c4,2024-11-21T01:45:44.830000 +CVE-2012-6067,0,0,dd76ae174055b250f024a76a29f13ac87513acbec283975ba3534ceb968b6fdb,2024-11-21T01:45:44.993000 +CVE-2012-6068,0,0,6a0f9edf0ed715d575b4528bfd5e8581c6d42c5476fd909558ea0a7412b7f9b8,2024-11-21T01:45:45.140000 +CVE-2012-6069,0,0,ce0190e221c04cdef7f4ecce40b65a70909c1ba95fc487101bfdc7dc975a9901,2024-11-21T01:45:45.267000 CVE-2012-6070,0,0,943e32560bd946c06d9a92670af542dada80ac8e5045ab27102674b16772c172,2019-11-22T14:06:40.643000 CVE-2012-6071,0,0,86a1a23cebc89273dd06d651c42a458b9dcbbc47693ea92fa8258800391d6dc4,2020-08-18T15:05:58.063000 -CVE-2012-6072,0,1,66ad835342634dd45ebb58beffee0d312e1b9099035995d026455c2c9382aafa,2024-11-21T01:45:45.633000 -CVE-2012-6073,0,1,995e15e0b979e3353943dbfe46579d41c710cc7cd4b2fcaec2584950addd2498,2024-11-21T01:45:45.763000 -CVE-2012-6074,0,1,36628461bcd6bcb550801d39ba954d7c8908e7463d314012c7e495d11dbf6316,2024-11-21T01:45:45.893000 -CVE-2012-6075,0,1,4c4209aec1d6f5e30f57f36880989c7bd4038cade694f10fce6050246e79449b,2024-11-21T01:45:46.030000 -CVE-2012-6076,0,1,3e75fa0756448a2b0e8da2696dfeb5d24d5bc83ec0a050ac8121d1953d9ae906,2024-11-21T01:45:46.203000 +CVE-2012-6072,0,0,66ad835342634dd45ebb58beffee0d312e1b9099035995d026455c2c9382aafa,2024-11-21T01:45:45.633000 +CVE-2012-6073,0,0,995e15e0b979e3353943dbfe46579d41c710cc7cd4b2fcaec2584950addd2498,2024-11-21T01:45:45.763000 +CVE-2012-6074,0,0,36628461bcd6bcb550801d39ba954d7c8908e7463d314012c7e495d11dbf6316,2024-11-21T01:45:45.893000 +CVE-2012-6075,0,0,4c4209aec1d6f5e30f57f36880989c7bd4038cade694f10fce6050246e79449b,2024-11-21T01:45:46.030000 +CVE-2012-6076,0,0,3e75fa0756448a2b0e8da2696dfeb5d24d5bc83ec0a050ac8121d1953d9ae906,2024-11-21T01:45:46.203000 CVE-2012-6077,0,0,67b94969b696a3ab313dd76208d8277a39f70807a6cf380506bdfde4c65e9b9c,2023-05-26T17:46:26.677000 CVE-2012-6078,0,0,3177724c9df4f97d6bef8784b294b314ca3f20f4785cbdc5651b6ca331bb8b74,2023-05-26T17:46:26.677000 CVE-2012-6079,0,0,23562357f02467ccd5947e3a9980f7d6c0b8e3b26f1440fd20c80b666310b61a,2023-05-26T17:46:26.677000 -CVE-2012-6080,0,1,a726c4c5e707ac0352caf237361c3c3e2c8095678077529e00564abdd0fbd4f6,2024-11-21T01:45:46.720000 -CVE-2012-6081,0,1,dd876b415ae71060f05762b88cff6038563cb6135901301b0cfdc91572c5bf12,2024-11-21T01:45:46.843000 -CVE-2012-6082,0,1,1bdca502c8630908ff8f1e864cd8b20ba77a3a91a995a129c85d92069e52b67f,2024-11-21T01:45:46.983000 +CVE-2012-6080,0,0,a726c4c5e707ac0352caf237361c3c3e2c8095678077529e00564abdd0fbd4f6,2024-11-21T01:45:46.720000 +CVE-2012-6081,0,0,dd876b415ae71060f05762b88cff6038563cb6135901301b0cfdc91572c5bf12,2024-11-21T01:45:46.843000 +CVE-2012-6082,0,0,1bdca502c8630908ff8f1e864cd8b20ba77a3a91a995a129c85d92069e52b67f,2024-11-21T01:45:46.983000 CVE-2012-6083,0,0,03d5d107609f6ccb17787e08b0cac62cec147c46bd15a4c91850e6b882898a40,2020-01-27T14:00:22.410000 -CVE-2012-6084,0,1,f16a1979a6bfff699d1f7c6f2421ada29489c11313a145a67d27424946a6e872,2024-11-21T01:45:47.253000 -CVE-2012-6085,0,1,6fb0c01692282ae68dfe36786fe2d94b6563a676046add6ae551566f82ef7e58,2024-11-21T01:45:47.393000 -CVE-2012-6086,0,1,abf1f433bb1a8ede72c0b0cd73958c3d5643e40f276489532f2edf08778d4ab6,2024-11-21T01:45:47.530000 -CVE-2012-6087,0,1,34866cb3c210334628d97888636a61122009bb21a2fd71d7ef75962d9ccfe365,2024-11-21T01:45:47.640000 -CVE-2012-6088,0,1,c13a77b4ff4fb7833d26b39ee22f7253a38c0f1b659e4e05c8196ad17d69f5e8,2024-11-21T01:45:47.760000 -CVE-2012-6089,0,1,113db952795b9c1502c348823bb823698c2cf7f8a118724354ababe59f672617,2024-11-21T01:45:47.887000 -CVE-2012-6090,0,1,fd722d109d791162083cb82ddb093d771c44ad544e54b5038b49a114a1a7c4b4,2024-11-21T01:45:48.020000 +CVE-2012-6084,0,0,f16a1979a6bfff699d1f7c6f2421ada29489c11313a145a67d27424946a6e872,2024-11-21T01:45:47.253000 +CVE-2012-6085,0,0,6fb0c01692282ae68dfe36786fe2d94b6563a676046add6ae551566f82ef7e58,2024-11-21T01:45:47.393000 +CVE-2012-6086,0,0,abf1f433bb1a8ede72c0b0cd73958c3d5643e40f276489532f2edf08778d4ab6,2024-11-21T01:45:47.530000 +CVE-2012-6087,0,0,34866cb3c210334628d97888636a61122009bb21a2fd71d7ef75962d9ccfe365,2024-11-21T01:45:47.640000 +CVE-2012-6088,0,0,c13a77b4ff4fb7833d26b39ee22f7253a38c0f1b659e4e05c8196ad17d69f5e8,2024-11-21T01:45:47.760000 +CVE-2012-6089,0,0,113db952795b9c1502c348823bb823698c2cf7f8a118724354ababe59f672617,2024-11-21T01:45:47.887000 +CVE-2012-6090,0,0,fd722d109d791162083cb82ddb093d771c44ad544e54b5038b49a114a1a7c4b4,2024-11-21T01:45:48.020000 CVE-2012-6091,0,0,d14787d1a6b976df8963446fc47977f5ac7cd9088d5ee3ecfefdb39f161aea10,2020-02-21T13:20:58.850000 -CVE-2012-6092,0,1,34cd3d71f787d01068b67175b35187b045e76604c3aa0786d17be834dfef4e5c,2024-11-21T01:45:48.280000 -CVE-2012-6093,0,1,6173b926beb7ed192a49beafa77f5712a6a8f3d47a9948d80c1e9cf60fed25f5,2024-11-21T01:45:48.413000 +CVE-2012-6092,0,0,34cd3d71f787d01068b67175b35187b045e76604c3aa0786d17be834dfef4e5c,2024-11-21T01:45:48.280000 +CVE-2012-6093,0,0,6173b926beb7ed192a49beafa77f5712a6a8f3d47a9948d80c1e9cf60fed25f5,2024-11-21T01:45:48.413000 CVE-2012-6094,0,0,90464db1315856e24c82f686c42ad4e42175ac44bab19ce43b9db5e8dfe17da0,2020-11-16T20:46:04.037000 -CVE-2012-6095,0,1,7f27f3048fdb185749fd46f9f82df294d87ba63fa670811f49b828b8131c8310,2024-11-21T01:45:48.703000 -CVE-2012-6096,0,1,f171b27148c197f5e8bb871514839a455b34b97d274e6a5311578de635e5f036,2024-11-21T01:45:48.840000 -CVE-2012-6097,0,1,24546532cc8919fdc648b1ad2504a4ebd8155ad4063209e0b1b8b00f95639ca5,2024-11-21T01:45:48.980000 -CVE-2012-6098,0,1,d7f406ce534ea6f4f98f77a08db9cfe2589999937c4998387b2190777646d82a,2024-11-21T01:45:49.100000 -CVE-2012-6099,0,1,3cefb796b4e85c0da02e3ef5fac55abee5da1c3741fe38c52f8ca5f69d1f8dd3,2024-11-21T01:45:49.257000 -CVE-2012-6100,0,1,045630981bf26250361c57373430e8d9b0c81146f8169428e91bdd75477d54cd,2024-11-21T01:45:49.380000 -CVE-2012-6101,0,1,eaf95715ef170e3cb470663722fc6fa1b3059271def5ade8f1f8dcdaf607e0a2,2024-11-21T01:45:49.527000 -CVE-2012-6102,0,1,2fa8bccf6759fb58c4b951fb39d5fec013bc2344ea2c0c1ec2ea09f079fced32,2024-11-21T01:45:49.660000 -CVE-2012-6103,0,1,1d6bd160dd613c83bece492db03d2076001a6a209167f0b6fd94a158cef125c3,2024-11-21T01:45:49.770000 -CVE-2012-6104,0,1,239f08bd04fc5c709e589f1e2f6dde457b7dc1337866175c926abdfde41f1d5a,2024-11-21T01:45:49.880000 -CVE-2012-6105,0,1,1fb9ede22753b9145f82bbc710dc05d62cf0484f2d0ed46e3c9085e2282fb805,2024-11-21T01:45:50.003000 -CVE-2012-6106,0,1,84ec76007a8b7e8ee41dd573a36a4f69e8d8bde90322941ed39c2884cc74cd1a,2024-11-21T01:45:50.130000 +CVE-2012-6095,0,0,7f27f3048fdb185749fd46f9f82df294d87ba63fa670811f49b828b8131c8310,2024-11-21T01:45:48.703000 +CVE-2012-6096,0,0,f171b27148c197f5e8bb871514839a455b34b97d274e6a5311578de635e5f036,2024-11-21T01:45:48.840000 +CVE-2012-6097,0,0,24546532cc8919fdc648b1ad2504a4ebd8155ad4063209e0b1b8b00f95639ca5,2024-11-21T01:45:48.980000 +CVE-2012-6098,0,0,d7f406ce534ea6f4f98f77a08db9cfe2589999937c4998387b2190777646d82a,2024-11-21T01:45:49.100000 +CVE-2012-6099,0,0,3cefb796b4e85c0da02e3ef5fac55abee5da1c3741fe38c52f8ca5f69d1f8dd3,2024-11-21T01:45:49.257000 +CVE-2012-6100,0,0,045630981bf26250361c57373430e8d9b0c81146f8169428e91bdd75477d54cd,2024-11-21T01:45:49.380000 +CVE-2012-6101,0,0,eaf95715ef170e3cb470663722fc6fa1b3059271def5ade8f1f8dcdaf607e0a2,2024-11-21T01:45:49.527000 +CVE-2012-6102,0,0,2fa8bccf6759fb58c4b951fb39d5fec013bc2344ea2c0c1ec2ea09f079fced32,2024-11-21T01:45:49.660000 +CVE-2012-6103,0,0,1d6bd160dd613c83bece492db03d2076001a6a209167f0b6fd94a158cef125c3,2024-11-21T01:45:49.770000 +CVE-2012-6104,0,0,239f08bd04fc5c709e589f1e2f6dde457b7dc1337866175c926abdfde41f1d5a,2024-11-21T01:45:49.880000 +CVE-2012-6105,0,0,1fb9ede22753b9145f82bbc710dc05d62cf0484f2d0ed46e3c9085e2282fb805,2024-11-21T01:45:50.003000 +CVE-2012-6106,0,0,84ec76007a8b7e8ee41dd573a36a4f69e8d8bde90322941ed39c2884cc74cd1a,2024-11-21T01:45:50.130000 CVE-2012-6107,0,0,d0c04bc7ca33710ee92244723b2a24bbb9578abe98f52eed67bc5ea413fe0340,2023-02-13T04:37:57.107000 -CVE-2012-6108,0,1,e47b44164d3a6517e50fab583de4a7f39a9a2c8fbff7b2a54df1958a5dbf00da,2024-11-21T01:45:50.387000 -CVE-2012-6109,0,1,092e9bad0f9c91bc63a0347850bb7bcb6c2d3f121b4eeeb431f5688690d82d77,2024-11-21T01:45:50.510000 +CVE-2012-6108,0,0,e47b44164d3a6517e50fab583de4a7f39a9a2c8fbff7b2a54df1958a5dbf00da,2024-11-21T01:45:50.387000 +CVE-2012-6109,0,0,092e9bad0f9c91bc63a0347850bb7bcb6c2d3f121b4eeeb431f5688690d82d77,2024-11-21T01:45:50.510000 CVE-2012-6110,0,0,364b564ecf944fb915c6f3683944aae2c021627c9783f892b73bf0d926cb2b98,2017-08-29T01:32:54.447000 CVE-2012-6111,0,0,4ab55811225372025ef084da280094bf35b6612ed921fbffc33b6a5271a86584,2020-01-02T15:24:52.830000 -CVE-2012-6112,0,1,da6c9d61c24f099071005147c8c954ca77e984ce0f12b8961665d9b69241bf5c,2024-11-21T01:45:50.903000 -CVE-2012-6113,0,1,7446a279ba5766a104e909dddfb43249f351448167fc6e52365e3cf007c8a2e4,2024-11-21T01:45:51.040000 +CVE-2012-6112,0,0,da6c9d61c24f099071005147c8c954ca77e984ce0f12b8961665d9b69241bf5c,2024-11-21T01:45:50.903000 +CVE-2012-6113,0,0,7446a279ba5766a104e909dddfb43249f351448167fc6e52365e3cf007c8a2e4,2024-11-21T01:45:51.040000 CVE-2012-6114,0,0,27eb221854fbbcae02aa803059329fa54127bdc6714b8a71bd11f390dad2c199,2020-02-07T17:54:39.403000 -CVE-2012-6115,0,1,be0940048cae6268dd71bf63a8b1a3a2e0273719879e1c8fce9f902daeb44cf2,2024-11-21T01:45:51.280000 -CVE-2012-6116,0,1,15ed487ddcc33cc272b981f31fe8773e87471dd57b22e4dfc22984f09d77b1ff,2024-11-21T01:45:51.400000 -CVE-2012-6117,0,1,2f26d2f5caf56c82da46388305a892f24c3189a1092e3ddb39cfe363c43b0b28,2024-11-21T01:45:51.533000 -CVE-2012-6118,0,1,5a32c891746cf281567b319d4aca09628238b14322fe7e607c5f9484446c45b4,2024-11-21T01:45:51.653000 -CVE-2012-6119,0,1,2aa71f56dd728f3a2474df8b840f49f364c52f965376df0ec5006297a48e8d6d,2024-11-21T01:45:51.760000 -CVE-2012-6120,0,1,47b9268aab9a92b4e3bb206ae2f3ad4e896a80cd45901fa4431c1853a192ed88,2024-11-21T01:45:51.880000 -CVE-2012-6121,0,1,de1ceebc1229ccb97a4397d8403eb1e9281abafaee58060ee81be0b69c522b5d,2024-11-21T01:45:51.993000 +CVE-2012-6115,0,0,be0940048cae6268dd71bf63a8b1a3a2e0273719879e1c8fce9f902daeb44cf2,2024-11-21T01:45:51.280000 +CVE-2012-6116,0,0,15ed487ddcc33cc272b981f31fe8773e87471dd57b22e4dfc22984f09d77b1ff,2024-11-21T01:45:51.400000 +CVE-2012-6117,0,0,2f26d2f5caf56c82da46388305a892f24c3189a1092e3ddb39cfe363c43b0b28,2024-11-21T01:45:51.533000 +CVE-2012-6118,0,0,5a32c891746cf281567b319d4aca09628238b14322fe7e607c5f9484446c45b4,2024-11-21T01:45:51.653000 +CVE-2012-6119,0,0,2aa71f56dd728f3a2474df8b840f49f364c52f965376df0ec5006297a48e8d6d,2024-11-21T01:45:51.760000 +CVE-2012-6120,0,0,47b9268aab9a92b4e3bb206ae2f3ad4e896a80cd45901fa4431c1853a192ed88,2024-11-21T01:45:51.880000 +CVE-2012-6121,0,0,de1ceebc1229ccb97a4397d8403eb1e9281abafaee58060ee81be0b69c522b5d,2024-11-21T01:45:51.993000 CVE-2012-6122,0,0,b50bfd2effbf23541fe97073ee2d9f756cd86ff4f0b49f5a1be0cb8979015f7b,2019-11-05T16:30:59.643000 CVE-2012-6123,0,0,80fbfbd3dc0dbae35475350f0c9ea693860e4f00161a59bf8de7668c9d9ce365,2020-08-18T15:05:57.937000 CVE-2012-6124,0,0,1e96098dafce891d219422c0d4a8ec24533bfa8957262d1947ca09b9b3a7c888,2019-11-06T15:42:08.310000 CVE-2012-6125,0,0,59945ab73495c504a6a40af0af81ed18d18f8246ad5ca3d870fc78e38105ba42,2019-11-05T15:17:13.520000 CVE-2012-6126,0,0,9d548d44e87298ccfa7d03599e7062a6f7faf460d325704f6029bcbbfb5e2973,2023-11-07T02:12:45.837000 CVE-2012-6127,0,0,99104bf1ad9ee54ecb7a44fe3c02b21bbe6c04e8a1d20d628ca33e5bbb714ac1,2023-11-07T02:12:46.047000 -CVE-2012-6128,0,1,78c55aa042c1c892c5bd37559b46bf8bc1aa3dd81c0d80ce68e384f4bc1caf22,2024-11-21T01:45:52.703000 -CVE-2012-6129,0,1,7118e5ab5196ad1481c1726ab6eb573554d42e42d5d0e91524a3aaa72278f29e,2024-11-21T01:45:52.837000 -CVE-2012-6130,0,1,f18f947cccce481f9f6c9c61feb93ae92f0e36acc57442944af2ba2344250088,2024-11-21T01:45:52.980000 -CVE-2012-6131,0,1,4189e210037b5df8cf77d5b6a9525e8bffc08c2c55790ec3e432bd596de7a207,2024-11-21T01:45:53.107000 -CVE-2012-6132,0,1,857427fb29e9df76246b7adc1f8f1f2f24963f268385d46723bcbe2646e3d609,2024-11-21T01:45:53.233000 +CVE-2012-6128,0,0,78c55aa042c1c892c5bd37559b46bf8bc1aa3dd81c0d80ce68e384f4bc1caf22,2024-11-21T01:45:52.703000 +CVE-2012-6129,0,0,7118e5ab5196ad1481c1726ab6eb573554d42e42d5d0e91524a3aaa72278f29e,2024-11-21T01:45:52.837000 +CVE-2012-6130,0,0,f18f947cccce481f9f6c9c61feb93ae92f0e36acc57442944af2ba2344250088,2024-11-21T01:45:52.980000 +CVE-2012-6131,0,0,4189e210037b5df8cf77d5b6a9525e8bffc08c2c55790ec3e432bd596de7a207,2024-11-21T01:45:53.107000 +CVE-2012-6132,0,0,857427fb29e9df76246b7adc1f8f1f2f24963f268385d46723bcbe2646e3d609,2024-11-21T01:45:53.233000 CVE-2012-6133,0,0,276839c6212eab7529d5dfec4b62462abcdb1ca35ba52f4a2683d3c2b9f14418,2020-01-31T20:48:56.553000 -CVE-2012-6134,0,1,0a64fb0e157abef85ece5226eea33909be11a941eedbbbaebdc0a0f902373664,2024-11-21T01:45:53.487000 +CVE-2012-6134,0,0,0a64fb0e157abef85ece5226eea33909be11a941eedbbbaebdc0a0f902373664,2024-11-21T01:45:53.487000 CVE-2012-6135,0,0,8ebb3b58b6bb2e3a3461b473348a66d748b159e615f1934bcc4e0979c00074e5,2019-11-21T15:42:39.337000 CVE-2012-6136,0,0,c6697f6c64277097b4655f9df6b80752ae5fa5eac50e072031253e5533d0a72a,2020-08-18T15:05:57.937000 -CVE-2012-6137,0,1,b69451928e620c97ac70f3cc148e0e8eac1b89dce12eb6649dcdaaafb94497e6,2024-11-21T01:45:53.857000 +CVE-2012-6137,0,0,b69451928e620c97ac70f3cc148e0e8eac1b89dce12eb6649dcdaaafb94497e6,2024-11-21T01:45:53.857000 CVE-2012-6138,0,0,bd34b654f6d5599e74ab621bbd1a613c7efa2d9b32274a9a8b8b56bb7072473d,2023-11-07T02:12:46.340000 -CVE-2012-6139,0,1,04ef1604f8d9a1128e1df043fc7145105264e8499d6076971ea35d0522d006b6,2024-11-21T01:45:53.987000 -CVE-2012-6140,0,1,a090d310301133945f6350d98e867c4173a85ef1bd02e9adb0adfb1aaf3e4428,2024-11-21T01:45:54.150000 +CVE-2012-6139,0,0,04ef1604f8d9a1128e1df043fc7145105264e8499d6076971ea35d0522d006b6,2024-11-21T01:45:53.987000 +CVE-2012-6140,0,0,a090d310301133945f6350d98e867c4173a85ef1bd02e9adb0adfb1aaf3e4428,2024-11-21T01:45:54.150000 CVE-2012-6141,0,0,d579ab31a082559a10fdf48e334aad4c462274487d9f0c1910a1179dcf5dcacc,2017-08-29T01:32:54.997000 CVE-2012-6142,0,0,7d5e791bbe081e0f8d3c6e24082ae49fff90658904e41d92a094352cc2a51abf,2017-08-29T01:32:55.043000 CVE-2012-6143,0,0,86a9dc86aab894a6df6e65bb1f946d080102587c15adee431e65c2200c8bcfb0,2017-08-29T01:32:55.090000 -CVE-2012-6144,0,1,964f1cdd0cf26f5903303f2706c6b2579ddb95458acb7af687de00404c6f7be7,2024-11-21T01:45:54.620000 -CVE-2012-6145,0,1,9de8801c1c1dc3303036094ed95040b2b6c370c17a0bec1059e9bfe2cab7d701,2024-11-21T01:45:54.750000 -CVE-2012-6146,0,1,feb783ed415b4ee3c2c8619ba1624dfbe21e87ba8fd6529d0cda61e5890e6158,2024-11-21T01:45:54.887000 -CVE-2012-6147,0,1,740fcee44b183a8b2937038e17a41b110faaa723ec0a70664864c4ae4ecf8885,2024-11-21T01:45:55 -CVE-2012-6148,0,1,0c386bb1aa8a298c912aba4c28fc4014bf2e59a54ce3eace9e5544f0844da049,2024-11-21T01:45:55.127000 -CVE-2012-6149,0,1,2ecf5e19232615f573dda24b26f581515ab706ebbd70a30147f325782ba5ac64,2024-11-21T01:45:55.247000 -CVE-2012-6150,0,1,d0b0baf5a1b76db3049c0cc0e22b9a5adc7fb03b89bb9d6ed167071aa70d9f5d,2024-11-21T01:45:55.370000 -CVE-2012-6151,0,1,2d4d5497e919ab7c6b2d75001dcfcfd842a35f674b24a6e824376437c34f91d9,2024-11-21T01:45:55.530000 -CVE-2012-6152,0,1,10e4e20260864b70e5f6261edd8cd7911a8f9aab82796e5bb09616b1df97f872,2024-11-21T01:45:55.663000 +CVE-2012-6144,0,0,964f1cdd0cf26f5903303f2706c6b2579ddb95458acb7af687de00404c6f7be7,2024-11-21T01:45:54.620000 +CVE-2012-6145,0,0,9de8801c1c1dc3303036094ed95040b2b6c370c17a0bec1059e9bfe2cab7d701,2024-11-21T01:45:54.750000 +CVE-2012-6146,0,0,feb783ed415b4ee3c2c8619ba1624dfbe21e87ba8fd6529d0cda61e5890e6158,2024-11-21T01:45:54.887000 +CVE-2012-6147,0,0,740fcee44b183a8b2937038e17a41b110faaa723ec0a70664864c4ae4ecf8885,2024-11-21T01:45:55 +CVE-2012-6148,0,0,0c386bb1aa8a298c912aba4c28fc4014bf2e59a54ce3eace9e5544f0844da049,2024-11-21T01:45:55.127000 +CVE-2012-6149,0,0,2ecf5e19232615f573dda24b26f581515ab706ebbd70a30147f325782ba5ac64,2024-11-21T01:45:55.247000 +CVE-2012-6150,0,0,d0b0baf5a1b76db3049c0cc0e22b9a5adc7fb03b89bb9d6ed167071aa70d9f5d,2024-11-21T01:45:55.370000 +CVE-2012-6151,0,0,2d4d5497e919ab7c6b2d75001dcfcfd842a35f674b24a6e824376437c34f91d9,2024-11-21T01:45:55.530000 +CVE-2012-6152,0,0,10e4e20260864b70e5f6261edd8cd7911a8f9aab82796e5bb09616b1df97f872,2024-11-21T01:45:55.663000 CVE-2012-6153,0,0,dcb3ee52986e89e38a9896ea2c2322d66fa4bba873f27f2787d4949456d67c35,2018-01-05T02:29:33.070000 CVE-2012-6154,0,0,16aa920ab2c8330434e9c504153e029288984d8f776f4630f54352209936d0a8,2023-11-07T02:12:46.693000 CVE-2012-6155,0,0,145dcb907caa4d8be197d4c79e5b3c39d8bb385c65dae92f04e761de0db64043,2023-11-07T02:12:46.903000 @@ -57330,13 +57330,13 @@ CVE-2012-6266,0,0,78a845a0e567dab0bb46091dbbaa1e8e400207a29f43faf58f27ce353854d8 CVE-2012-6267,0,0,4c80e959c20920d6e63e52cc6e579436deb2d69de681286eb71f16ce0d6ab25c,2023-11-07T02:13:12.290000 CVE-2012-6268,0,0,9898ef0bebe837c10e4931b532c7d46044cfcf82950f63f489f0eae59bc0e905,2023-11-07T02:13:12.503000 CVE-2012-6269,0,0,a53a9b763594c7b34702cee36c56e478fad1153e85d12ff923babcd5b7eb21a2,2023-11-07T02:13:12.730000 -CVE-2012-6270,0,1,1b6db9db4ae5e249f29132e8a16020b6a352b6569e190a94da0bc1da4ed10b0a,2024-11-21T01:45:57.440000 -CVE-2012-6271,0,1,504c53d53d12facb11f3af2a87e487f6e2517064e676a306cac4852d1dc66eab,2024-11-21T01:45:57.563000 -CVE-2012-6272,0,1,bf3ffb2c501469ae581ad8486959f11be43c978a00bbd9664781c87a88dab632,2024-11-21T01:45:57.693000 -CVE-2012-6273,0,1,aac422f8340f93e480968d3a65da14be9512908072157c40e743ccb88239faa2,2024-11-21T01:45:57.793000 -CVE-2012-6274,0,1,903c8d3e6fa903f284c97480d3a05c9ed7f3f20d3c292a3330c1d7cf6a470505,2024-11-21T01:45:57.897000 -CVE-2012-6275,0,1,24d701123ad06d5be9ad7a2ab38ab285b6265e7242445a2eb133d9cce1d9f16c,2024-11-21T01:45:58.003000 -CVE-2012-6276,0,1,8794e1ed5eb324ff0ae16d5da0a80d0547765fac263d2c19de8decbe9c7ddeb7,2024-11-21T01:45:58.107000 +CVE-2012-6270,0,0,1b6db9db4ae5e249f29132e8a16020b6a352b6569e190a94da0bc1da4ed10b0a,2024-11-21T01:45:57.440000 +CVE-2012-6271,0,0,504c53d53d12facb11f3af2a87e487f6e2517064e676a306cac4852d1dc66eab,2024-11-21T01:45:57.563000 +CVE-2012-6272,0,0,bf3ffb2c501469ae581ad8486959f11be43c978a00bbd9664781c87a88dab632,2024-11-21T01:45:57.693000 +CVE-2012-6273,0,0,aac422f8340f93e480968d3a65da14be9512908072157c40e743ccb88239faa2,2024-11-21T01:45:57.793000 +CVE-2012-6274,0,0,903c8d3e6fa903f284c97480d3a05c9ed7f3f20d3c292a3330c1d7cf6a470505,2024-11-21T01:45:57.897000 +CVE-2012-6275,0,0,24d701123ad06d5be9ad7a2ab38ab285b6265e7242445a2eb133d9cce1d9f16c,2024-11-21T01:45:58.003000 +CVE-2012-6276,0,0,8794e1ed5eb324ff0ae16d5da0a80d0547765fac263d2c19de8decbe9c7ddeb7,2024-11-21T01:45:58.107000 CVE-2012-6277,0,0,54e9d5bd1d17494df811b57be884c3badc56fbc6a3c953e3cf23342ec654b1bb,2020-03-04T20:18:25.227000 CVE-2012-6278,0,0,9e54bde7784119189ca77642e4ebd83796e4df0810d70d5bfdb8de2755cfe68f,2023-11-07T02:13:13.073000 CVE-2012-6279,0,0,20cce3dd42a54ed07ddc6722d09175e0f9fc2fa9d9ac4767cbc3467a44aff1ca,2023-11-07T02:13:13.293000 @@ -57350,51 +57350,51 @@ CVE-2012-6286,0,0,2c605c663fd7e8c5004f9a753fc740559f8b1e53cb3453f22bce045b2f8dc8 CVE-2012-6287,0,0,a46abee02e91a345e99e6266a083c855dbab6a4ec772b2202038ee554840558f,2023-11-07T02:13:15.103000 CVE-2012-6288,0,0,c3d55e235283c77a6f2e81a512d1a560519a5988eb896432473f27d33bd80d14,2023-11-07T02:13:15.350000 CVE-2012-6289,0,0,c755fde9396b17db71ed2dc331be3c9e3ecbd5a5b06d0e30dd025b274a944157,2023-11-07T02:13:15.567000 -CVE-2012-6290,0,1,31d14a9184fa39006130c697312305f163bbda0e3eae298659a89d55d78282a4,2024-11-21T01:45:58.510000 +CVE-2012-6290,0,0,31d14a9184fa39006130c697312305f163bbda0e3eae298659a89d55d78282a4,2024-11-21T01:45:58.510000 CVE-2012-6297,0,0,4820f8efe6c5eb545d846993f3de9989c3d1418284006b8e665df8663cf0c185,2020-02-11T18:53:05.647000 -CVE-2012-6298,0,1,b1fb46daa0ac2a9191344302ba737c110e9fe71d197f280ef54e411950c7b136,2024-11-21T01:45:58.803000 -CVE-2012-6299,0,1,884d6a70caf6289af6b396f479e7c22bd613e3ffb3409b885ce34dfd9cbb3956,2024-11-21T01:45:58.937000 -CVE-2012-6301,0,1,4dbc4ef97cb948b7ec6f5165a09793255b694b2f38af1e80aa8c28ed29624c7e,2024-11-21T01:45:59.080000 +CVE-2012-6298,0,0,b1fb46daa0ac2a9191344302ba737c110e9fe71d197f280ef54e411950c7b136,2024-11-21T01:45:58.803000 +CVE-2012-6299,0,0,884d6a70caf6289af6b396f479e7c22bd613e3ffb3409b885ce34dfd9cbb3956,2024-11-21T01:45:58.937000 +CVE-2012-6301,0,0,4dbc4ef97cb948b7ec6f5165a09793255b694b2f38af1e80aa8c28ed29624c7e,2024-11-21T01:45:59.080000 CVE-2012-6302,0,0,96ce769a8540a0833804526bb488353ab945426410f6f35f25de3314b41682e3,2020-02-01T17:35:31.097000 -CVE-2012-6303,0,1,188ec5f030dcdd3b4299300d618eb1d681f58856db30cd0f79df9d01651a70ad,2024-11-21T01:45:59.367000 +CVE-2012-6303,0,0,188ec5f030dcdd3b4299300d618eb1d681f58856db30cd0f79df9d01651a70ad,2024-11-21T01:45:59.367000 CVE-2012-6306,0,0,a8c7087366ee427e4a513c3056c5b8776c3496ba3d3bfb429f1a9524a68fb601,2020-02-10T15:53:13.087000 CVE-2012-6307,0,0,e84e1db4dce697bd51c06cb1f3a40f3b21de6fdb99964e4082b818c83c0ea435,2020-02-10T15:24:20.943000 CVE-2012-6309,0,0,46a29e104b769f63746a66a03c8701f4b00f99d7fcbcaabe04e4811834689931,2020-02-10T15:16:52.767000 -CVE-2012-6312,0,1,b62500e7e8f807176c1e06dbacc5c753c7e3a8ddea256562bf67e85826d0fd4e,2024-11-21T01:46:00.003000 -CVE-2012-6313,0,1,bdfc4cc1d5783f588adaba683316a378e2e12b7da4940654cfe7269cb1690102,2024-11-21T01:46:00.160000 -CVE-2012-6314,0,1,039da3c3d25907f732c9009e09a23c62855847bf22d7b8003cfe478e0c121a62,2024-11-21T01:46:00.320000 +CVE-2012-6312,0,0,b62500e7e8f807176c1e06dbacc5c753c7e3a8ddea256562bf67e85826d0fd4e,2024-11-21T01:46:00.003000 +CVE-2012-6313,0,0,bdfc4cc1d5783f588adaba683316a378e2e12b7da4940654cfe7269cb1690102,2024-11-21T01:46:00.160000 +CVE-2012-6314,0,0,039da3c3d25907f732c9009e09a23c62855847bf22d7b8003cfe478e0c121a62,2024-11-21T01:46:00.320000 CVE-2012-6315,0,0,42f5fd5f38e0d0ba1994e4487afd47034ad887fc3e03278d89830c9031ac24b3,2023-11-07T02:13:15.967000 CVE-2012-6316,0,0,cdad98917855498762cb513e0270715c7b629cd3c510b44439a85e0a5c36a061,2014-10-01T18:01:27.793000 -CVE-2012-6324,0,1,ead530755b913b9876d2b83a0e47b4d05c0e252f9f68f6b3b48dd9102f24ebb7,2024-11-21T01:46:00.617000 -CVE-2012-6325,0,1,cc1f3941c94bd1c8af4ce10c0c0ac449f50a650c360eefc4dcc518a55dc8d966,2024-11-21T01:46:00.757000 -CVE-2012-6326,0,1,382f5990f2df233157389fe4808079c15c8fa8d944800b42701555f136a57ece,2024-11-21T01:46:00.893000 +CVE-2012-6324,0,0,ead530755b913b9876d2b83a0e47b4d05c0e252f9f68f6b3b48dd9102f24ebb7,2024-11-21T01:46:00.617000 +CVE-2012-6325,0,0,cc1f3941c94bd1c8af4ce10c0c0ac449f50a650c360eefc4dcc518a55dc8d966,2024-11-21T01:46:00.757000 +CVE-2012-6326,0,0,382f5990f2df233157389fe4808079c15c8fa8d944800b42701555f136a57ece,2024-11-21T01:46:00.893000 CVE-2012-6327,0,0,7da95b87f2ff33d42077a4e41bac21b6a94e898094c9c478505e5f9392e19e8c,2023-11-07T02:13:16.020000 CVE-2012-6328,0,0,5b2a112902d37960c9c60bdd626d53669883bd313dbf7a876eb036f339be7f8d,2023-11-07T02:13:16.240000 -CVE-2012-6329,0,1,38141a6a9145495486f21ac7c381b07cc4181415f1798dbcee83df152ce49095,2024-11-21T01:46:01.063000 -CVE-2012-6330,0,1,6441496880b5e250d525106738b74fc67001d41dcec286d39126113fa4561c51,2024-11-21T01:46:01.247000 -CVE-2012-6333,0,1,16e8ebe33bde960b49a1fe578dd2213c160716474fe8c99958773e0104b659f6,2024-11-21T01:46:01.403000 -CVE-2012-6334,0,1,7ce8625dd9c88cb3e9b5333d3b02f7829aa12f4cb739519431327f63234fdae0,2024-11-21T01:46:01.567000 -CVE-2012-6335,0,1,6b148dd7fc94b54eb360ffffaf7afac1a6e08ab80e111d1e4317e1a8119a60a8,2024-11-21T01:46:01.703000 -CVE-2012-6336,0,1,f88752480664647fc7efed8e3cbb5e31517160723ee5202aae86a8e5b443b67f,2024-11-21T01:46:01.830000 -CVE-2012-6337,0,1,6a1033f8069c25308f1f0a15520754a9d45e3bd98ef349e0cef15c055a7c8aea,2024-11-21T01:46:01.960000 -CVE-2012-6339,0,1,cf5016f68f13e2ce29785a7a061c34e2584ec01acea3f44d001a709176bb63cc,2024-11-21T01:46:02.097000 +CVE-2012-6329,0,0,38141a6a9145495486f21ac7c381b07cc4181415f1798dbcee83df152ce49095,2024-11-21T01:46:01.063000 +CVE-2012-6330,0,0,6441496880b5e250d525106738b74fc67001d41dcec286d39126113fa4561c51,2024-11-21T01:46:01.247000 +CVE-2012-6333,0,0,16e8ebe33bde960b49a1fe578dd2213c160716474fe8c99958773e0104b659f6,2024-11-21T01:46:01.403000 +CVE-2012-6334,0,0,7ce8625dd9c88cb3e9b5333d3b02f7829aa12f4cb739519431327f63234fdae0,2024-11-21T01:46:01.567000 +CVE-2012-6335,0,0,6b148dd7fc94b54eb360ffffaf7afac1a6e08ab80e111d1e4317e1a8119a60a8,2024-11-21T01:46:01.703000 +CVE-2012-6336,0,0,f88752480664647fc7efed8e3cbb5e31517160723ee5202aae86a8e5b443b67f,2024-11-21T01:46:01.830000 +CVE-2012-6337,0,0,6a1033f8069c25308f1f0a15520754a9d45e3bd98ef349e0cef15c055a7c8aea,2024-11-21T01:46:01.960000 +CVE-2012-6339,0,0,cf5016f68f13e2ce29785a7a061c34e2584ec01acea3f44d001a709176bb63cc,2024-11-21T01:46:02.097000 CVE-2012-6340,0,0,04ca4dd33d8c539dc58289811cb0733aebde56b344950ef41170257a31da615a,2020-02-11T18:33:08.280000 CVE-2012-6341,0,0,21d69edec0452ed64792a949836e715e3e720722b9faab45588f639d93803d88,2020-02-12T16:15:41.817000 -CVE-2012-6342,0,1,2c11cbf8dbf6d7acfbcf5bdca57ae482fd91346ef77310e4baf9793e2e12afe9,2024-11-21T01:46:02.563000 +CVE-2012-6342,0,0,2c11cbf8dbf6d7acfbcf5bdca57ae482fd91346ef77310e4baf9793e2e12afe9,2024-11-21T01:46:02.563000 CVE-2012-6344,0,0,d02313f0dc8ab26de83f378ad1b83f59cc6bf846fa083feaf6ec3aebb254f0ba,2020-01-27T13:37:58.273000 CVE-2012-6345,0,0,23377a6f467046c16872a40c3fd1fef8594556db038840389caec5fc268802d9,2020-01-27T14:38:39.810000 CVE-2012-6346,0,0,3be5768e41e6acd577c1d7ce4babdde64c1a04a3e4600963819abb72b011217e,2018-02-27T19:43:52.713000 CVE-2012-6347,0,0,b14f8a6bfec989adf2dd8496fc5585d2401c5089896219b8a457f563b601d840,2018-02-27T15:59:00.140000 -CVE-2012-6348,0,1,cccc7d4402f0d12df93ecca087469862785af7af5e646ae7df26cad319300ae8,2024-11-21T01:46:03.287000 -CVE-2012-6349,0,1,a94619e7d4c69581f1a34d075f7e88186602f52cbc482e417861b02e100d4c7e,2024-11-21T01:46:03.440000 -CVE-2012-6350,0,1,8435a2070d4890bccae41bde2344a2a2d5421d12cc2a5bc50d59322c780715b4,2024-11-21T01:46:03.540000 -CVE-2012-6352,0,1,6f76e132973965c89b197f871809bd72d0ce3a68948cc1a4b32c69c790b001fe,2024-11-21T01:46:03.650000 -CVE-2012-6354,0,1,b063af38a088a2afea8b206a32cb52b0b7512d8762a598965d322f2179f60479,2024-11-21T01:46:03.753000 -CVE-2012-6355,0,1,7562a320de061b70dba296de71908f0a1c868ee2c4cf6632526af0b9db38dd46,2024-11-21T01:46:03.880000 -CVE-2012-6356,0,1,4aa7c827871e768b5ec6b49dc4232e40c27041af19841fdb9aa6f5c999820170,2024-11-21T01:46:04.007000 -CVE-2012-6357,0,1,3ae7c0ab69e65b7647ef00a454f0e37e0bc6e83fab558dd256ed72123a216cd6,2024-11-21T01:46:04.120000 -CVE-2012-6359,0,1,2531838e5270c7895131b86f06000aa53a1025c7184c4771571cb6673c9b069b,2024-11-21T01:46:04.240000 -CVE-2012-6360,0,1,8c63751492f2772a0bcd89d648ee03b47086d7a0c753b24a6800662c3c09d5e4,2024-11-21T01:46:04.360000 +CVE-2012-6348,0,0,cccc7d4402f0d12df93ecca087469862785af7af5e646ae7df26cad319300ae8,2024-11-21T01:46:03.287000 +CVE-2012-6349,0,0,a94619e7d4c69581f1a34d075f7e88186602f52cbc482e417861b02e100d4c7e,2024-11-21T01:46:03.440000 +CVE-2012-6350,0,0,8435a2070d4890bccae41bde2344a2a2d5421d12cc2a5bc50d59322c780715b4,2024-11-21T01:46:03.540000 +CVE-2012-6352,0,0,6f76e132973965c89b197f871809bd72d0ce3a68948cc1a4b32c69c790b001fe,2024-11-21T01:46:03.650000 +CVE-2012-6354,0,0,b063af38a088a2afea8b206a32cb52b0b7512d8762a598965d322f2179f60479,2024-11-21T01:46:03.753000 +CVE-2012-6355,0,0,7562a320de061b70dba296de71908f0a1c868ee2c4cf6632526af0b9db38dd46,2024-11-21T01:46:03.880000 +CVE-2012-6356,0,0,4aa7c827871e768b5ec6b49dc4232e40c27041af19841fdb9aa6f5c999820170,2024-11-21T01:46:04.007000 +CVE-2012-6357,0,0,3ae7c0ab69e65b7647ef00a454f0e37e0bc6e83fab558dd256ed72123a216cd6,2024-11-21T01:46:04.120000 +CVE-2012-6359,0,0,2531838e5270c7895131b86f06000aa53a1025c7184c4771571cb6673c9b069b,2024-11-21T01:46:04.240000 +CVE-2012-6360,0,0,8c63751492f2772a0bcd89d648ee03b47086d7a0c753b24a6800662c3c09d5e4,2024-11-21T01:46:04.360000 CVE-2012-6362,0,0,12b896f2b92fead7c261b74e81ba18f0cfa9995e784b7b72f9ee300ca8a0d206,2023-11-07T02:13:16.650000 CVE-2012-6363,0,0,074e3b0ccf4437e1e75587a0c3061c1bb667c32a75810669ffb302134a6d0994,2023-11-07T02:13:16.873000 CVE-2012-6364,0,0,01f258d637c3ca38fa3d8aa658197533dca654cce9cdd640df55a2ad75478af1,2023-11-07T02:13:17.090000 @@ -57402,13 +57402,13 @@ CVE-2012-6365,0,0,345c2d7c2e7bf6802f6d607133bc2ab19d2b859e57507d01ec993f513f0c9d CVE-2012-6366,0,0,7dc0d42415e6b30c3e7453dbedeb056dfc380405d41df2c914f3881af007d82b,2023-11-07T02:13:17.527000 CVE-2012-6367,0,0,f6d6decb25e7c979b3f2032eec4f53248d61a6dfaf181d77e5e9b9f3461526db,2023-11-07T02:13:17.750000 CVE-2012-6368,0,0,95161f09d3e1206c2b83d38504a4f8f77451925ef4bfc9efa91849f9b0898b37,2023-11-07T02:13:17.970000 -CVE-2012-6369,0,1,aaa04cb3bf8533761710b9c858da43a64063e7f680a13648227aaa4b5a067d5e,2024-11-21T01:46:04.577000 -CVE-2012-6371,0,1,63549e4300d07c2c39f17362d17f6d822ee0b68ec4acb8d701d4da326d77c3f5,2024-11-21T01:46:04.723000 -CVE-2012-6392,0,1,70e8a09124df1bfb6c2f206d2d80edf2f32da53a6089b692827ad24cd528204d,2024-11-21T01:46:04.873000 -CVE-2012-6395,0,1,e96807cc206ccc0ea6b6b8302b12047b462fb8535b8aea28675df2c51f565a22,2024-11-21T01:46:05.030000 -CVE-2012-6396,0,1,1b93ca79f7746b281685c1832a8197fee37e03d9e0d0de6cd7f0a8bd977d553a,2024-11-21T01:46:05.167000 -CVE-2012-6397,0,1,c213d875a899c3c3bd905b3370d66bf356eaefa2de4d59799f97083fe9616b18,2024-11-21T01:46:05.290000 -CVE-2012-6399,0,1,8e7c5bf59c67670ed5e1c74d92fa737d3337517e5ef82106d94f7ce00b55ad24,2024-11-21T01:46:05.410000 +CVE-2012-6369,0,0,aaa04cb3bf8533761710b9c858da43a64063e7f680a13648227aaa4b5a067d5e,2024-11-21T01:46:04.577000 +CVE-2012-6371,0,0,63549e4300d07c2c39f17362d17f6d822ee0b68ec4acb8d701d4da326d77c3f5,2024-11-21T01:46:04.723000 +CVE-2012-6392,0,0,70e8a09124df1bfb6c2f206d2d80edf2f32da53a6089b692827ad24cd528204d,2024-11-21T01:46:04.873000 +CVE-2012-6395,0,0,e96807cc206ccc0ea6b6b8302b12047b462fb8535b8aea28675df2c51f565a22,2024-11-21T01:46:05.030000 +CVE-2012-6396,0,0,1b93ca79f7746b281685c1832a8197fee37e03d9e0d0de6cd7f0a8bd977d553a,2024-11-21T01:46:05.167000 +CVE-2012-6397,0,0,c213d875a899c3c3bd905b3370d66bf356eaefa2de4d59799f97083fe9616b18,2024-11-21T01:46:05.290000 +CVE-2012-6399,0,0,8e7c5bf59c67670ed5e1c74d92fa737d3337517e5ef82106d94f7ce00b55ad24,2024-11-21T01:46:05.410000 CVE-2012-6401,0,0,d94580d3f38cf33346c45a1d2ffa04809374685fd91e655742ce686aa34e19da,2023-11-07T02:13:18.250000 CVE-2012-6402,0,0,9e2ce90278ee228dd7df37f74adbced30e9c20b8d243413eaa08017bdbb8794f,2023-11-07T02:13:18.587000 CVE-2012-6403,0,0,75c77500768a7758a9993ff2d91b2fb4356de74ef4f58522b29ac5ff08f6dc6a,2023-11-07T02:13:18.817000 @@ -57430,45 +57430,45 @@ CVE-2012-6418,0,0,7d1235a48ab7975332f214a8863c6d4ce5a21eded60c03a77108545f22d48c CVE-2012-6419,0,0,02137fa40a155c2d8cab0151c66bf48f362e7787ef36ac08c0e743e7dbca60b5,2023-11-07T02:13:22.427000 CVE-2012-6420,0,0,dee1d156a3a649f87c9f181594908a2d92b2e8521dbc9f936c6eaa7fdbbd0044,2023-11-07T02:13:22.650000 CVE-2012-6421,0,0,fad5eca6c4e9ddc11f119e7d858d1acc4e742e1572162ba660d2c2030c2d6319,2023-11-07T02:13:22.873000 -CVE-2012-6422,0,1,e7651d80ee172c1477bddd1e5aa242b78119c2015570320981186018f9250b79,2024-11-21T01:46:05.800000 -CVE-2012-6426,0,1,51c6fc15ede1ce2f1ed5b828a56198b89697bdb3b4222e672f2090a372fb6121,2024-11-21T01:46:05.963000 -CVE-2012-6427,0,1,bbb67555f802084e558a3153997312ddfee9edeab59a8a163722e71945a5874d,2024-11-21T01:46:06.113000 -CVE-2012-6428,0,1,346548cf55b9281eb3c2f38fdca5888593cc47f2c2d9e745c008c40e6a7ae8fc,2024-11-21T01:46:06.240000 -CVE-2012-6429,0,1,16434a82b923be7d8dab3cc60a95d3bc14735947ef2bcca1a9a8f46a3cd20414,2024-11-21T01:46:06.367000 -CVE-2012-6430,0,1,a662b9865e65cfafd28a5d052fe718397e8d7a110d951650d3075c1a504a9b61,2024-11-21T01:46:06.550000 -CVE-2012-6431,0,1,8e9cfed0609a6ae45d80aed359747f4b721d064a6c06f89208e2fab10855d62f,2024-11-21T01:46:06.700000 -CVE-2012-6432,0,1,41f008419bb4dbca28add3ca72ed7ec74f27a9bb1c6d4b47d966a2a9ab166f50,2024-11-21T01:46:06.843000 -CVE-2012-6433,0,1,c57f052a6dc28678c3c241b7d3e7e0acd8efce862bdfca814af8b14157f999d9,2024-11-21T01:46:07 -CVE-2012-6434,0,1,7a974e6a941d3c8b6e53f3038ae1e897554549cbb1f22f303c3fed7ba0df5e40,2024-11-21T01:46:07.140000 -CVE-2012-6435,0,1,2d2fd7b7a210db2abeef5cef52f8477a23878dda702d2b81b84c9970dd72f30a,2024-11-21T01:46:07.287000 -CVE-2012-6436,0,1,0a043a93d8b0c58f1a4e65e8c627da0e9f04c12a7fb61b4b87f982ed33031c9a,2024-11-21T01:46:07.403000 -CVE-2012-6437,0,1,c2cfe5457cb64db8868efc80da6de84365b7eb357fdca3ec4c813388334caef0,2024-11-21T01:46:07.530000 -CVE-2012-6438,0,1,0c0969a2a5a85798d0c886ec5ffa70094c2e2abbbd0df73c31b4783eb73552d5,2024-11-21T01:46:07.650000 -CVE-2012-6439,0,1,f9249004e83d48d75d54ca85cee4879d4d0ca530a2f19d1e99ad1efdfdead357,2024-11-21T01:46:07.773000 -CVE-2012-6440,0,1,fe1d8464f21a3a930260d3c2749c48fafdaba29a06f7d279080d9eece61db6df,2024-11-21T01:46:07.900000 -CVE-2012-6441,0,1,02fff69a4884be134ba32493721f8b0962c62a5d977c1528b4e9b4251e8631be,2024-11-21T01:46:08.013000 -CVE-2012-6442,0,1,e4521f5c0888ba245ca0ddd7ccac1308d079ecc6010c52be188f262fd9c58d02,2024-11-21T01:46:08.137000 -CVE-2012-6447,0,1,4f31eef5c4f600430ea43b41dc5dc56c8ac14a9c8e281cea913ce7e491ae6b9b,2024-11-21T01:46:08.267000 +CVE-2012-6422,0,0,e7651d80ee172c1477bddd1e5aa242b78119c2015570320981186018f9250b79,2024-11-21T01:46:05.800000 +CVE-2012-6426,0,0,51c6fc15ede1ce2f1ed5b828a56198b89697bdb3b4222e672f2090a372fb6121,2024-11-21T01:46:05.963000 +CVE-2012-6427,0,0,bbb67555f802084e558a3153997312ddfee9edeab59a8a163722e71945a5874d,2024-11-21T01:46:06.113000 +CVE-2012-6428,0,0,346548cf55b9281eb3c2f38fdca5888593cc47f2c2d9e745c008c40e6a7ae8fc,2024-11-21T01:46:06.240000 +CVE-2012-6429,0,0,16434a82b923be7d8dab3cc60a95d3bc14735947ef2bcca1a9a8f46a3cd20414,2024-11-21T01:46:06.367000 +CVE-2012-6430,0,0,a662b9865e65cfafd28a5d052fe718397e8d7a110d951650d3075c1a504a9b61,2024-11-21T01:46:06.550000 +CVE-2012-6431,0,0,8e9cfed0609a6ae45d80aed359747f4b721d064a6c06f89208e2fab10855d62f,2024-11-21T01:46:06.700000 +CVE-2012-6432,0,0,41f008419bb4dbca28add3ca72ed7ec74f27a9bb1c6d4b47d966a2a9ab166f50,2024-11-21T01:46:06.843000 +CVE-2012-6433,0,0,c57f052a6dc28678c3c241b7d3e7e0acd8efce862bdfca814af8b14157f999d9,2024-11-21T01:46:07 +CVE-2012-6434,0,0,7a974e6a941d3c8b6e53f3038ae1e897554549cbb1f22f303c3fed7ba0df5e40,2024-11-21T01:46:07.140000 +CVE-2012-6435,0,0,2d2fd7b7a210db2abeef5cef52f8477a23878dda702d2b81b84c9970dd72f30a,2024-11-21T01:46:07.287000 +CVE-2012-6436,0,0,0a043a93d8b0c58f1a4e65e8c627da0e9f04c12a7fb61b4b87f982ed33031c9a,2024-11-21T01:46:07.403000 +CVE-2012-6437,0,0,c2cfe5457cb64db8868efc80da6de84365b7eb357fdca3ec4c813388334caef0,2024-11-21T01:46:07.530000 +CVE-2012-6438,0,0,0c0969a2a5a85798d0c886ec5ffa70094c2e2abbbd0df73c31b4783eb73552d5,2024-11-21T01:46:07.650000 +CVE-2012-6439,0,0,f9249004e83d48d75d54ca85cee4879d4d0ca530a2f19d1e99ad1efdfdead357,2024-11-21T01:46:07.773000 +CVE-2012-6440,0,0,fe1d8464f21a3a930260d3c2749c48fafdaba29a06f7d279080d9eece61db6df,2024-11-21T01:46:07.900000 +CVE-2012-6441,0,0,02fff69a4884be134ba32493721f8b0962c62a5d977c1528b4e9b4251e8631be,2024-11-21T01:46:08.013000 +CVE-2012-6442,0,0,e4521f5c0888ba245ca0ddd7ccac1308d079ecc6010c52be188f262fd9c58d02,2024-11-21T01:46:08.137000 +CVE-2012-6447,0,0,4f31eef5c4f600430ea43b41dc5dc56c8ac14a9c8e281cea913ce7e491ae6b9b,2024-11-21T01:46:08.267000 CVE-2012-6448,0,0,91ca366daa94a0cef86e97276b59cb7c5b2ed8498973f4037a2b1d7b41ab65dc,2020-01-29T20:34:43.920000 CVE-2012-6449,0,0,0e2cafcb4a18d4e3045513b1ba6cba20c27167e360ff3ef2a244778db46f41b8,2020-02-13T14:40:49.230000 CVE-2012-6451,0,0,8d42ea3ba4cb3aa86606dfaed45b4a0531a397f3c4d61fd61e1a827bbc1355c1,2020-01-30T21:02:02.093000 CVE-2012-6452,0,0,7989dc8bd3f80ab02fa6e385c31d5f3274dae238b65d3f503275b1e2e68bf288,2017-08-29T01:32:56.463000 -CVE-2012-6453,0,1,5da8d3643e93fe5e71e6ecd230e8ae85f125495f4c011d0f1ac2d34fbbd8e2a4,2024-11-21T01:46:09.003000 -CVE-2012-6458,0,1,254eb2d2bf46c6c88d4bc0ce53567ae96b58bbf1dee941d2eed4c9518baca905,2024-11-21T01:46:09.143000 -CVE-2012-6459,0,1,5571dcc761a6092b3430d420a6a9db01aeb0f96125f59b45cd5592045dc6394d,2024-11-21T01:46:09.287000 -CVE-2012-6460,0,1,2d8ccba3c0dfc63b03ad32d5b11e0f9cf5878461f68134466a36ded66de4d6ef,2024-11-21T01:46:09.433000 -CVE-2012-6461,0,1,ad112d973996cf0f1e944b40a2de5633fb44fda12794a2c2968c8f3fe0efd5a9,2024-11-21T01:46:09.600000 -CVE-2012-6462,0,1,3657296e4f0a85040ed9fff4b2e735ef56a8b90b26db8283ce7ddaa702c62cbd,2024-11-21T01:46:09.770000 -CVE-2012-6463,0,1,3d35570f044eb84b49383a302b6d2c28c03f751a4ce105726937d104b6b45261,2024-11-21T01:46:09.970000 -CVE-2012-6464,0,1,7f39b5dce81685526d8d5af97a5e59a8a186a9f8a4c0eae6e0c3b03e9c8821e4,2024-11-21T01:46:10.140000 -CVE-2012-6465,0,1,09e19d6c7db658889e68e6ee70d6a6965323cf1ced5e76136a6018ffc2c99b18,2024-11-21T01:46:10.313000 -CVE-2012-6466,0,1,976b7eb5c5cadb420a58af3a048546fbc85e9694ec601cbd87abac0563535d0e,2024-11-21T01:46:10.487000 -CVE-2012-6467,0,1,ae757a8f5ef14890884b3336ae61048abc99828b1e071658a85740f45d30e21f,2024-11-21T01:46:10.660000 -CVE-2012-6468,0,1,b6f90fab3368411c9b117199d8e31f77f03d1f5c01e1c9e50b462c1c68ba72d9,2024-11-21T01:46:10.827000 -CVE-2012-6469,0,1,c74a4b05f1d5d9c1279890cccc2402de62a58e88dde0130ec73bcec749eee644,2024-11-21T01:46:11.010000 -CVE-2012-6470,0,1,9ce80cf94790cf7f0e15af1de00f36d0f1535797ead23bde8deffd178dd33dec,2024-11-21T01:46:11.187000 -CVE-2012-6471,0,1,2a4fcfcff169944e29a86136f32b46642e590a324b1801f5427e0c3d2007c448,2024-11-21T01:46:11.350000 -CVE-2012-6472,0,1,1cc273eeff92cf7c6ba9e5b5e4c37ec13d4cffb3aa703d0d618f354732bdf744,2024-11-21T01:46:11.520000 +CVE-2012-6453,0,0,5da8d3643e93fe5e71e6ecd230e8ae85f125495f4c011d0f1ac2d34fbbd8e2a4,2024-11-21T01:46:09.003000 +CVE-2012-6458,0,0,254eb2d2bf46c6c88d4bc0ce53567ae96b58bbf1dee941d2eed4c9518baca905,2024-11-21T01:46:09.143000 +CVE-2012-6459,0,0,5571dcc761a6092b3430d420a6a9db01aeb0f96125f59b45cd5592045dc6394d,2024-11-21T01:46:09.287000 +CVE-2012-6460,0,0,2d8ccba3c0dfc63b03ad32d5b11e0f9cf5878461f68134466a36ded66de4d6ef,2024-11-21T01:46:09.433000 +CVE-2012-6461,0,0,ad112d973996cf0f1e944b40a2de5633fb44fda12794a2c2968c8f3fe0efd5a9,2024-11-21T01:46:09.600000 +CVE-2012-6462,0,0,3657296e4f0a85040ed9fff4b2e735ef56a8b90b26db8283ce7ddaa702c62cbd,2024-11-21T01:46:09.770000 +CVE-2012-6463,0,0,3d35570f044eb84b49383a302b6d2c28c03f751a4ce105726937d104b6b45261,2024-11-21T01:46:09.970000 +CVE-2012-6464,0,0,7f39b5dce81685526d8d5af97a5e59a8a186a9f8a4c0eae6e0c3b03e9c8821e4,2024-11-21T01:46:10.140000 +CVE-2012-6465,0,0,09e19d6c7db658889e68e6ee70d6a6965323cf1ced5e76136a6018ffc2c99b18,2024-11-21T01:46:10.313000 +CVE-2012-6466,0,0,976b7eb5c5cadb420a58af3a048546fbc85e9694ec601cbd87abac0563535d0e,2024-11-21T01:46:10.487000 +CVE-2012-6467,0,0,ae757a8f5ef14890884b3336ae61048abc99828b1e071658a85740f45d30e21f,2024-11-21T01:46:10.660000 +CVE-2012-6468,0,0,b6f90fab3368411c9b117199d8e31f77f03d1f5c01e1c9e50b462c1c68ba72d9,2024-11-21T01:46:10.827000 +CVE-2012-6469,0,0,c74a4b05f1d5d9c1279890cccc2402de62a58e88dde0130ec73bcec749eee644,2024-11-21T01:46:11.010000 +CVE-2012-6470,0,0,9ce80cf94790cf7f0e15af1de00f36d0f1535797ead23bde8deffd178dd33dec,2024-11-21T01:46:11.187000 +CVE-2012-6471,0,0,2a4fcfcff169944e29a86136f32b46642e590a324b1801f5427e0c3d2007c448,2024-11-21T01:46:11.350000 +CVE-2012-6472,0,0,1cc273eeff92cf7c6ba9e5b5e4c37ec13d4cffb3aa703d0d618f354732bdf744,2024-11-21T01:46:11.520000 CVE-2012-6473,0,0,4dc55c9102c80a86c2e62b8ec812d41c964d7aecf66f5172794b806a573c0f62,2023-11-07T02:13:23.437000 CVE-2012-6474,0,0,04cd334fd37eda98178b8b4efa282109872022aa1db637f2116d86d48aa06447,2023-11-07T02:13:23.663000 CVE-2012-6475,0,0,6fbff5216dc6d6a112f9a847fd69e77fc689a67d6cdad617089c8496ace2a9cf,2023-11-07T02:13:23.880000 @@ -57489,162 +57489,162 @@ CVE-2012-6489,0,0,a40a5e8b13dd72b03acefb07f1e43295aad9c225b42303f6e89869a9b00849 CVE-2012-6490,0,0,7187e3379cf7521dd6a7e6dfa5b73c9ab4028d3a7763502fb33ac857a9931da4,2023-11-07T02:13:27.283000 CVE-2012-6491,0,0,f47c55ef3c74b554ebb237247462a1aedde6d4ca8bf63187a1fa8dee628343ab,2023-11-07T02:13:27.500000 CVE-2012-6492,0,0,3224758a749141822ac46123412024809876e3227e9e980d3319d1906df57bc0,2023-11-07T02:13:27.710000 -CVE-2012-6493,0,1,e5d218f8e9981791191036ee892597c9f7d6ffb0126cd3b24429fcfb46b3bd70,2024-11-21T01:46:12.003000 +CVE-2012-6493,0,0,e5d218f8e9981791191036ee892597c9f7d6ffb0126cd3b24429fcfb46b3bd70,2024-11-21T01:46:12.003000 CVE-2012-6494,0,0,3b1de102e33aaf392da70013618c7cdffd9ca06cca8cf38493d0adc8d9c1c45b,2020-01-30T18:43:08.257000 -CVE-2012-6495,0,1,f5040e2a1f91c6f42dd6cdbf543395f500ec7620936e772f940852fd10ebcbc4,2024-11-21T01:46:12.320000 -CVE-2012-6496,0,1,572c8fa52d681b1c3383b149de4432d5b1a3f7d4eadd63e0814b3b7cecf590b2,2024-11-21T01:46:12.500000 -CVE-2012-6497,0,1,489e379a52afea19dfd1041afb6d0943fc9fb08ea75934f5bee17d3458b9934c,2024-11-21T01:46:12.710000 -CVE-2012-6498,0,1,60cc1ca731a45f595b1a69861fd9ec1b1067ceba0523e254841d8c3e9eede68b,2024-11-21T01:46:12.867000 -CVE-2012-6499,0,1,905ade20f40a1fbf3a944c2d29481f9ff0d79163f2aad2b09d24681610dcbbd8,2024-11-21T01:46:13.010000 -CVE-2012-6500,0,1,dc0b6b048ede501f7fd42bf11db82b4b5c65e6651752bd3d83a01c881c8ccaf4,2024-11-21T01:46:13.157000 -CVE-2012-6501,0,1,1912e0cb45e7d8f947b4f2f20ee96631297cd520068ac137f6cbb811deeb5506,2024-11-21T01:46:13.323000 -CVE-2012-6502,0,1,dac598626b19c2ae3076c83695588bb87c3f2598d6e26ac1f1f1bb96b335505f,2024-11-21T01:46:13.480000 -CVE-2012-6503,0,1,06d29230e97c8d2bb7beaeabb11ac2caabe301bf1a94e1127589e34836c8cc80,2024-11-21T01:46:13.630000 -CVE-2012-6504,0,1,9a3f342d03fd2d0463bdf1e4f1fba7b75f52cbc9b117e1c1209961194532a9fc,2024-11-21T01:46:13.797000 -CVE-2012-6505,0,1,56ed649de8b8b4ae48c8681d30ee64883e2002b3b713f7511e775bd90790c474,2024-11-21T01:46:13.943000 -CVE-2012-6506,0,1,86caafcaec67280b1969da3baf9d8c05a552ef1751f1cfdc12889e05e4d82950,2024-11-21T01:46:14.090000 -CVE-2012-6507,0,1,c23cb0bc007d81bf441c420fe0b090667aa0f267ea86490bf218fbbeafb568ee,2024-11-21T01:46:14.240000 -CVE-2012-6508,0,1,d1c76e00e49dda8e640dfc50fb665feeee9249afd9f0c82e4a8199305d3018f2,2024-11-21T01:46:14.390000 -CVE-2012-6509,0,1,8840b39500cdb6f8719a9e37948d5c0405bcce8b57c9b3580e066b67d5b91d0b,2024-11-21T01:46:14.543000 -CVE-2012-6510,0,1,389892546fc49d295f5425357f0135e2459dbf723c661ef00d00e7c6290d2573,2024-11-21T01:46:14.683000 -CVE-2012-6511,0,1,74a2995461a7b4216aa25108cea65d8eb65fcaea106a1d1244cf044cdb2405e3,2024-11-21T01:46:14.830000 -CVE-2012-6512,0,1,d0d733417951cf4388dd780b78a929bd0a14c387498bc9fd8c103bde9890b74d,2024-11-21T01:46:14.980000 -CVE-2012-6513,0,1,fcc2a11521947869d55eaec59bb72d011e6640831da0c80a8849ac6e3095de20,2024-11-21T01:46:15.140000 -CVE-2012-6514,0,1,371c5776934f48b5cf67fac970e07cf617865dde4cb134cfd7f6e8fac088f9b1,2024-11-21T01:46:15.290000 -CVE-2012-6515,0,1,6aa3e6fdfd36301c80c6561adf9c6a5e8d9450d34a388554d28d4c4f758a0b5f,2024-11-21T01:46:15.443000 -CVE-2012-6516,0,1,e538e489aa9d4e6da96fbde39fc85305aa3212b21d7de8f640e02ea77c20e714,2024-11-21T01:46:15.587000 -CVE-2012-6517,0,1,151ec9836549c808e30aa846c4c5373ca697a655124ea4f512d4d7128f010081,2024-11-21T01:46:15.740000 -CVE-2012-6518,0,1,4f039b92ebc36faaddb190fd01b1b70f428351823e74e4155706b64a4f1edc2a,2024-11-21T01:46:15.893000 -CVE-2012-6519,0,1,9f629c8873b3e8075acfb1f11c33f9488d176b5d6bfefc7fd95d997382dba399,2024-11-21T01:46:16.050000 -CVE-2012-6520,0,1,4d2b2fe5e6513a6691f94bf449569ad878acb519dd72b4852b11df93484cf55b,2024-11-21T01:46:16.200000 -CVE-2012-6521,0,1,33bd40525ab0392b385b0c5aae92db4e18777a4988c3aacbda11bbcb91827f92,2024-11-21T01:46:16.363000 -CVE-2012-6522,0,1,f4310df081f649fbde5060122731ae9b442acf0defab7ee7130470d419755f95,2024-11-21T01:46:16.510000 -CVE-2012-6523,0,1,8d9aa9337b9f7c8ee41a24849e4cad582cdfa891716b542972d7b855888e0775,2024-11-21T01:46:16.660000 -CVE-2012-6524,0,1,3bd4f1049c078db356b3cdca033a20ad88be69c2e5fb08aece285fa3c27860ea,2024-11-21T01:46:16.813000 -CVE-2012-6525,0,1,197a2776d71d53ff1c22d980920af78c63db0af370b9d4f659aa7d2a3e838f67,2024-11-21T01:46:16.967000 -CVE-2012-6526,0,1,31df84d8680365e02f1df7f55bc3d269a05a540a3837a5429b05c5d9c9ef1462,2024-11-21T01:46:17.113000 -CVE-2012-6527,0,1,afacfaac1ebec764e2276b2d7a631afd270363433d6cb09aaf6134164378cd91,2024-11-21T01:46:17.263000 -CVE-2012-6528,0,1,a9c952f23a07a51f443269e85ea9bfa1e56caf8b2cf6ffb1b60ea5c8461cae7a,2024-11-21T01:46:17.443000 -CVE-2012-6529,0,1,52b0f849925223d84a9854df4e0fddb7be9feb98059bf7a7888d6717af381341,2024-11-21T01:46:17.603000 -CVE-2012-6530,0,1,27e74c36076048845a98c280a08174b391209092b8d9b6a9192c2ed6e38266ef,2024-11-21T01:46:17.760000 -CVE-2012-6531,0,1,89ac731e1a2a9106a9aa2edf89c3f18737d955567ae5452fd2f7f9d56c73e103,2024-11-21T01:46:17.910000 -CVE-2012-6532,0,1,2cbbce534827bae6299657a501c9f98214a053fa67d726d34afe4e91bfe18379,2024-11-21T01:46:18.070000 -CVE-2012-6533,0,1,35aafdc3d26305b281817315d998c28c1744cc272476d60c6687f0524524c2d2,2024-11-21T01:46:18.227000 -CVE-2012-6534,0,1,b9e2900025e97d9686c2d6ec29e35682b4207952968e3eb8d48560e240e01a37,2024-11-21T01:46:18.357000 -CVE-2012-6535,0,1,42b4a59edd9d9f11c9de3adc8db62c892cd609504b477932117d82e09e51dc5a,2024-11-21T01:46:18.507000 -CVE-2012-6536,0,1,7bbca2d7ff31a0c9f6120aa1b53ab26a3540ab9afe7855e7882dbb996fef5677,2024-11-21T01:46:18.663000 -CVE-2012-6537,0,1,7277a7e9bd67baab86eb2ba9ef6352fc784ff74678b20838ae78cb1c6b60b22b,2024-11-21T01:46:18.840000 -CVE-2012-6538,0,1,dfda89cb75b504bded43da4dd3ed958290f1cf2a15872b6f825dc8e245f483e7,2024-11-21T01:46:19.017000 -CVE-2012-6539,0,1,83875c02b2c2b171a53c8dd83d7d525cdf085d2376d92cc2f2944d0b00b7dc5e,2024-11-21T01:46:19.190000 -CVE-2012-6540,0,1,54cbeb737a8c3ce3379679914d3533220707c32d5ba0ef93428ccd3b5cc2c415,2024-11-21T01:46:19.370000 -CVE-2012-6541,0,1,8e55f98dde74be8a5346f926d577dcb2e351bec3d4dea897973eb49c9d1427fc,2024-11-21T01:46:19.543000 -CVE-2012-6542,0,1,77897e5237dbb0d8a49fc2846add45111d02eb56daf7ea5f37b62c366f8a5fa3,2024-11-21T01:46:19.720000 -CVE-2012-6543,0,1,0f95c27d493d963d4c0b5811507ea1c07e19e8c0e8c1772d967c2ab34a19185c,2024-11-21T01:46:19.890000 -CVE-2012-6544,0,1,d4ea207747c2465debe1c9bc9746df6edd987443bc68132acaf62e75e6713483,2024-11-21T01:46:20.067000 -CVE-2012-6545,0,1,0dad9c27e72a49f1433d2623f26c3118840393cb41d9c388816c52bd8adcde0a,2024-11-21T01:46:20.270000 -CVE-2012-6546,0,1,a0376ed4ac0a37444b3f36bc345139c0143e6a7a0f57923b9c8cac312304f6ff,2024-11-21T01:46:20.450000 -CVE-2012-6547,0,1,aeeeb02c235c166d5ec1cbedd055b785a05914abe7d84469c175fd413d2027e1,2024-11-21T01:46:20.640000 -CVE-2012-6548,0,1,796e8657fdb7062a0df3d72afc638dcc18a7f3d7a92603257ce5aa84109bf905,2024-11-21T01:46:20.813000 -CVE-2012-6549,0,1,191c89174579171f451fa6f03b88f8690392eb2f36d8094050216099b8410d5a,2024-11-21T01:46:20.990000 -CVE-2012-6550,0,1,4a83c52f31336af99fbd0c31d3a2df977758a44c54761c138cc4c88b48a06183,2024-11-21T01:46:21.193000 -CVE-2012-6551,0,1,5d916b1eac806136c2578bb97b59990238c71ea86bcb430b5cbc8a785cbd7a98,2024-11-21T01:46:21.347000 -CVE-2012-6552,0,1,4f2bdf07143f2f53eb3c3ce9c3cc65ffad308fb410d94e06acd55c2c2da6b6c7,2024-11-21T01:46:21.497000 -CVE-2012-6553,0,1,03022deca16c9d7a86bc33ac6b59e1826210bcdf840bcdf0e1aace817dedb568,2024-11-21T01:46:21.637000 -CVE-2012-6554,0,1,70be0df6f53f27233a9db478e0e88b8cfb6634e090f5073fd2b3b35e0a670d59,2024-11-21T01:46:21.780000 -CVE-2012-6555,0,1,b2cafa7fb75e65bb55c76b515905e69117a13f4d7949c83e316073b3b2d021db,2024-11-21T01:46:21.933000 -CVE-2012-6556,0,1,03c28cf505bf0b7a8589f7ed806ff5d478943f5361ac8e52c7852ee44892500f,2024-11-21T01:46:22.090000 -CVE-2012-6557,0,1,4432c0e633caf11b1532267a6dc9d7f92779a0fc278dfcc3748e3ece3df3ae3f,2024-11-21T01:46:22.230000 -CVE-2012-6558,0,1,b0db4937ed09ec10b45bfaeab18048329a272457eb4f79c79ad2a3a85f853f09,2024-11-21T01:46:22.387000 -CVE-2012-6559,0,1,f9998a0371acce57ae12933821a2862934a5120fcc16b36ceee2640999df59fc,2024-11-21T01:46:22.533000 -CVE-2012-6560,0,1,39fd0c5ff8502fe5c35a7004a381a0d8d541bad89a2b3a51b42ebdd84535bfdd,2024-11-21T01:46:22.680000 -CVE-2012-6561,0,1,e56df5cc6bda190d1bb8829076c83d0ecbf1812bd5d52c3b8c0d25dc6e3ca315,2024-11-21T01:46:22.810000 -CVE-2012-6562,0,1,c477471045637bc2a1e032f41a121fd71819fbab2fd326a3902eed2f7dfa7ee4,2024-11-21T01:46:22.950000 -CVE-2012-6563,0,1,169eb35da8231a96bfcfa095e3670dff39791a7645547ad559aa78c1a6591e8d,2024-11-21T01:46:23.103000 -CVE-2012-6564,0,1,6d74d2b6f50a15e49b3ffe3f309be7903c503b6dc10ea9a49c8999585e42ac46,2024-11-21T01:46:23.250000 -CVE-2012-6565,0,1,90103196d1ae84d2f8dcd8364dc18b3f6bf20a439436212345aecfdc91274dcd,2024-11-21T01:46:23.393000 -CVE-2012-6566,0,1,b0667a69ef5db786c1b3426a4db972d84564f4ffb9d92bac61352c1e70ec0aa5,2024-11-21T01:46:23.527000 -CVE-2012-6567,0,1,dc403e30638e41a65cf1ae391b9cdcf78b50fd378a34bfa356377bd82f80f8ed,2024-11-21T01:46:23.667000 -CVE-2012-6568,0,1,2036793716b48707bd84f726ea3b0add3d5c9ff7dbe4a0e52822a2d4bf512d20,2024-11-21T01:46:23.803000 -CVE-2012-6569,0,1,428da0d4d9ff1cfd773c920674e29afb9f1e0d28e9872b134667b283eacda434,2024-11-21T01:46:23.957000 -CVE-2012-6570,0,1,044adb5ec33fdfc02b49297382180e7ef658d53eb830b8af97db29a16657d35e,2024-11-21T01:46:24.107000 -CVE-2012-6571,0,1,bff401bcb722f70fc8970483d0f81dc2a838917217fa287113f5cad7049a7f6a,2024-11-21T01:46:24.257000 -CVE-2012-6572,0,1,d1653ece7d4f27ac9023db873a19c0d53998761dc982036f438fa99e6e8056f4,2024-11-21T01:46:24.410000 -CVE-2012-6573,0,1,73f59ec5981377fdfd9356d17160e06142104d5471f3b432113ea3a29fd690ae,2024-11-21T01:46:24.553000 -CVE-2012-6574,0,1,6f3bc09f77d8381ed361ff6046457d73e1b1dfda2260768c133ea2c0b0e4f3f4,2024-11-21T01:46:24.717000 -CVE-2012-6575,0,1,833c7437e53c99dbd3b32139154b204456afbd30e58c2f2a9def69a1a1dcf029,2024-11-21T01:46:24.870000 -CVE-2012-6576,0,1,a276e011a14f17136522e7fa13afbe79d0a3ecc4daadc113cef5ed91b7b07768,2024-11-21T01:46:25.020000 -CVE-2012-6577,0,1,dc5b2c6a523072064d8363e64130b697cea099a052dce09869361da5c59ca147,2024-11-21T01:46:25.157000 -CVE-2012-6578,0,1,9a8d5d58b909b25ddd819ee04f77902d3c0489d0273746862a1a607f35516143,2024-11-21T01:46:25.330000 -CVE-2012-6579,0,1,e3e7d001de2e4af3874b545dd9768f1cc662b951ab864048e748210862b7000c,2024-11-21T01:46:25.487000 -CVE-2012-6580,0,1,86a98c81bcf06ea8e39ff76546232652bf49d4964324cdb990c6236467f7c564,2024-11-21T01:46:25.633000 -CVE-2012-6581,0,1,dbeaf48413f7ae411e429cbac282ba05041bf8321f117745c4d4c4840955ba37,2024-11-21T01:46:25.780000 -CVE-2012-6582,0,1,e78e71024f31ca8acc9c61f7bed7a80e4b2ecc893cf0e48b763e29ac89ba840a,2024-11-21T01:46:25.923000 -CVE-2012-6583,0,1,0944e9f2881c58c887100e84705815326d28da4eac509386442088a71128620d,2024-11-21T01:46:26.077000 -CVE-2012-6584,0,1,ce651ffc3f2bb98ec5c4a87e5c3b6bf170be341e324f8bfa6debb13772b87a54,2024-11-21T01:46:26.220000 -CVE-2012-6585,0,1,181e45bfd580c57a437a00952c17450f044a10f83248d0be227d8bead0b18e6e,2024-11-21T01:46:26.353000 -CVE-2012-6586,0,1,5043425aa8c3e23c8557d0b0de4164e6c0de494b6e6e3f8be4b9c58f2e68a441,2024-11-21T01:46:26.487000 -CVE-2012-6587,0,1,bc8316851861ac29da8a09676a5dfd8ff27f7506657adbf895c729cf15967f72,2024-11-21T01:46:26.610000 -CVE-2012-6588,0,1,5b73317c236423c60616cd0b6966288be4059495154f9d1a600538ce2f881488,2024-11-21T01:46:26.743000 -CVE-2012-6589,0,1,3417470d6c3fc8036a22ab67a31bb5cf686a8a9c64d484a7425ef73f9601ee87,2024-11-21T01:46:26.873000 -CVE-2012-6590,0,1,8bc18142cd2455dc934c28a7ec796254be9d7a86c62b615649ccdedc7a50e739,2024-11-21T01:46:27.017000 -CVE-2012-6591,0,1,e04af2a0ccaca37a44ca98a2b465262d9929277e18e48c05cf5f535abe4b1487,2024-11-21T01:46:27.160000 -CVE-2012-6592,0,1,51c7c3ab68547e519ecbf5aa0a5a81c532343d11d2fff9e5ae319571e9effcb7,2024-11-21T01:46:27.300000 -CVE-2012-6593,0,1,e911bacd3a9f2bdcf867696d6d8188a39c5a49535f6aabde06d706b4062a0157,2024-11-21T01:46:27.440000 -CVE-2012-6594,0,1,7a34ed640f84bf4449c3638d7839c0d756046e517aeeb9b81718d7d6ea165d83,2024-11-21T01:46:27.580000 -CVE-2012-6595,0,1,399fd5e521ed22e2b05b317219b8a5e1f75871ef1f035d9116d4a0ccc6861a2a,2024-11-21T01:46:27.717000 -CVE-2012-6596,0,1,809ea946f5270526bc13f77169808012e8fce2f64bc6d8f03671d20b48ece9a2,2024-11-21T01:46:27.853000 -CVE-2012-6597,0,1,5524bdc10f8094b87a036cfa849b8bc4f510a12d9114573e8a77a8dfa587b7f5,2024-11-21T01:46:27.977000 -CVE-2012-6598,0,1,62820585cd92bc3620d89dec95d041158bfd0c874c7c37f1155a391b1ac99c8e,2024-11-21T01:46:28.107000 -CVE-2012-6599,0,1,3eaad8189c7265f3c12ff9fa8c4057c2f08c5ffeaed6f2d6f90d1994839f8916,2024-11-21T01:46:28.243000 -CVE-2012-6600,0,1,5bbb092a87aeb39327198086bdde80c0cf967e26c26a899eb83208f225a77d2e,2024-11-21T01:46:28.387000 -CVE-2012-6601,0,1,89d2ab9c8d100f858759f00bc13f71e872d19b653c3de2ea1aa0ae579efc3d95,2024-11-21T01:46:28.530000 -CVE-2012-6602,0,1,a48b4fa2b141cb7f75f1bd4d50468ad0c84806e9f57890e0d33ac21ecd01fadc,2024-11-21T01:46:28.673000 -CVE-2012-6603,0,1,bc935d41da6f0280c199ee682f54728403cc82fcc59a32bb0682837a2e122e3a,2024-11-21T01:46:28.817000 -CVE-2012-6604,0,1,6dc210e2437fa2e413b5e5230be250e37e4f77c6f55ece089a94d94aa9b4a596,2024-11-21T01:46:28.957000 -CVE-2012-6605,0,1,3584bc6dd56c39a14787d1d9997ea50784e740ef71dcc729ec2b13de9dae42f5,2024-11-21T01:46:29.090000 -CVE-2012-6606,0,1,7dce81003f33d22c1b52730047ba88a7fe6d4e73baa3d2e37ecd3b12de0758ab,2024-11-21T01:46:29.230000 -CVE-2012-6607,0,1,537e919110438aff94a36e400f8c504fbdea41d06dda8f8d127b811f772ab843,2024-11-21T01:46:29.363000 -CVE-2012-6608,0,1,b1151aa6dfffc0e234bcb558a9466870911a09cadd20f0f09d9713ea48e28f4e,2024-11-21T01:46:29.520000 +CVE-2012-6495,0,0,f5040e2a1f91c6f42dd6cdbf543395f500ec7620936e772f940852fd10ebcbc4,2024-11-21T01:46:12.320000 +CVE-2012-6496,0,0,572c8fa52d681b1c3383b149de4432d5b1a3f7d4eadd63e0814b3b7cecf590b2,2024-11-21T01:46:12.500000 +CVE-2012-6497,0,0,489e379a52afea19dfd1041afb6d0943fc9fb08ea75934f5bee17d3458b9934c,2024-11-21T01:46:12.710000 +CVE-2012-6498,0,0,60cc1ca731a45f595b1a69861fd9ec1b1067ceba0523e254841d8c3e9eede68b,2024-11-21T01:46:12.867000 +CVE-2012-6499,0,0,905ade20f40a1fbf3a944c2d29481f9ff0d79163f2aad2b09d24681610dcbbd8,2024-11-21T01:46:13.010000 +CVE-2012-6500,0,0,dc0b6b048ede501f7fd42bf11db82b4b5c65e6651752bd3d83a01c881c8ccaf4,2024-11-21T01:46:13.157000 +CVE-2012-6501,0,0,1912e0cb45e7d8f947b4f2f20ee96631297cd520068ac137f6cbb811deeb5506,2024-11-21T01:46:13.323000 +CVE-2012-6502,0,0,dac598626b19c2ae3076c83695588bb87c3f2598d6e26ac1f1f1bb96b335505f,2024-11-21T01:46:13.480000 +CVE-2012-6503,0,0,06d29230e97c8d2bb7beaeabb11ac2caabe301bf1a94e1127589e34836c8cc80,2024-11-21T01:46:13.630000 +CVE-2012-6504,0,0,9a3f342d03fd2d0463bdf1e4f1fba7b75f52cbc9b117e1c1209961194532a9fc,2024-11-21T01:46:13.797000 +CVE-2012-6505,0,0,56ed649de8b8b4ae48c8681d30ee64883e2002b3b713f7511e775bd90790c474,2024-11-21T01:46:13.943000 +CVE-2012-6506,0,0,86caafcaec67280b1969da3baf9d8c05a552ef1751f1cfdc12889e05e4d82950,2024-11-21T01:46:14.090000 +CVE-2012-6507,0,0,c23cb0bc007d81bf441c420fe0b090667aa0f267ea86490bf218fbbeafb568ee,2024-11-21T01:46:14.240000 +CVE-2012-6508,0,0,d1c76e00e49dda8e640dfc50fb665feeee9249afd9f0c82e4a8199305d3018f2,2024-11-21T01:46:14.390000 +CVE-2012-6509,0,0,8840b39500cdb6f8719a9e37948d5c0405bcce8b57c9b3580e066b67d5b91d0b,2024-11-21T01:46:14.543000 +CVE-2012-6510,0,0,389892546fc49d295f5425357f0135e2459dbf723c661ef00d00e7c6290d2573,2024-11-21T01:46:14.683000 +CVE-2012-6511,0,0,74a2995461a7b4216aa25108cea65d8eb65fcaea106a1d1244cf044cdb2405e3,2024-11-21T01:46:14.830000 +CVE-2012-6512,0,0,d0d733417951cf4388dd780b78a929bd0a14c387498bc9fd8c103bde9890b74d,2024-11-21T01:46:14.980000 +CVE-2012-6513,0,0,fcc2a11521947869d55eaec59bb72d011e6640831da0c80a8849ac6e3095de20,2024-11-21T01:46:15.140000 +CVE-2012-6514,0,0,371c5776934f48b5cf67fac970e07cf617865dde4cb134cfd7f6e8fac088f9b1,2024-11-21T01:46:15.290000 +CVE-2012-6515,0,0,6aa3e6fdfd36301c80c6561adf9c6a5e8d9450d34a388554d28d4c4f758a0b5f,2024-11-21T01:46:15.443000 +CVE-2012-6516,0,0,e538e489aa9d4e6da96fbde39fc85305aa3212b21d7de8f640e02ea77c20e714,2024-11-21T01:46:15.587000 +CVE-2012-6517,0,0,151ec9836549c808e30aa846c4c5373ca697a655124ea4f512d4d7128f010081,2024-11-21T01:46:15.740000 +CVE-2012-6518,0,0,4f039b92ebc36faaddb190fd01b1b70f428351823e74e4155706b64a4f1edc2a,2024-11-21T01:46:15.893000 +CVE-2012-6519,0,0,9f629c8873b3e8075acfb1f11c33f9488d176b5d6bfefc7fd95d997382dba399,2024-11-21T01:46:16.050000 +CVE-2012-6520,0,0,4d2b2fe5e6513a6691f94bf449569ad878acb519dd72b4852b11df93484cf55b,2024-11-21T01:46:16.200000 +CVE-2012-6521,0,0,33bd40525ab0392b385b0c5aae92db4e18777a4988c3aacbda11bbcb91827f92,2024-11-21T01:46:16.363000 +CVE-2012-6522,0,0,f4310df081f649fbde5060122731ae9b442acf0defab7ee7130470d419755f95,2024-11-21T01:46:16.510000 +CVE-2012-6523,0,0,8d9aa9337b9f7c8ee41a24849e4cad582cdfa891716b542972d7b855888e0775,2024-11-21T01:46:16.660000 +CVE-2012-6524,0,0,3bd4f1049c078db356b3cdca033a20ad88be69c2e5fb08aece285fa3c27860ea,2024-11-21T01:46:16.813000 +CVE-2012-6525,0,0,197a2776d71d53ff1c22d980920af78c63db0af370b9d4f659aa7d2a3e838f67,2024-11-21T01:46:16.967000 +CVE-2012-6526,0,0,31df84d8680365e02f1df7f55bc3d269a05a540a3837a5429b05c5d9c9ef1462,2024-11-21T01:46:17.113000 +CVE-2012-6527,0,0,afacfaac1ebec764e2276b2d7a631afd270363433d6cb09aaf6134164378cd91,2024-11-21T01:46:17.263000 +CVE-2012-6528,0,0,a9c952f23a07a51f443269e85ea9bfa1e56caf8b2cf6ffb1b60ea5c8461cae7a,2024-11-21T01:46:17.443000 +CVE-2012-6529,0,0,52b0f849925223d84a9854df4e0fddb7be9feb98059bf7a7888d6717af381341,2024-11-21T01:46:17.603000 +CVE-2012-6530,0,0,27e74c36076048845a98c280a08174b391209092b8d9b6a9192c2ed6e38266ef,2024-11-21T01:46:17.760000 +CVE-2012-6531,0,0,89ac731e1a2a9106a9aa2edf89c3f18737d955567ae5452fd2f7f9d56c73e103,2024-11-21T01:46:17.910000 +CVE-2012-6532,0,0,2cbbce534827bae6299657a501c9f98214a053fa67d726d34afe4e91bfe18379,2024-11-21T01:46:18.070000 +CVE-2012-6533,0,0,35aafdc3d26305b281817315d998c28c1744cc272476d60c6687f0524524c2d2,2024-11-21T01:46:18.227000 +CVE-2012-6534,0,0,b9e2900025e97d9686c2d6ec29e35682b4207952968e3eb8d48560e240e01a37,2024-11-21T01:46:18.357000 +CVE-2012-6535,0,0,42b4a59edd9d9f11c9de3adc8db62c892cd609504b477932117d82e09e51dc5a,2024-11-21T01:46:18.507000 +CVE-2012-6536,0,0,7bbca2d7ff31a0c9f6120aa1b53ab26a3540ab9afe7855e7882dbb996fef5677,2024-11-21T01:46:18.663000 +CVE-2012-6537,0,0,7277a7e9bd67baab86eb2ba9ef6352fc784ff74678b20838ae78cb1c6b60b22b,2024-11-21T01:46:18.840000 +CVE-2012-6538,0,0,dfda89cb75b504bded43da4dd3ed958290f1cf2a15872b6f825dc8e245f483e7,2024-11-21T01:46:19.017000 +CVE-2012-6539,0,0,83875c02b2c2b171a53c8dd83d7d525cdf085d2376d92cc2f2944d0b00b7dc5e,2024-11-21T01:46:19.190000 +CVE-2012-6540,0,0,54cbeb737a8c3ce3379679914d3533220707c32d5ba0ef93428ccd3b5cc2c415,2024-11-21T01:46:19.370000 +CVE-2012-6541,0,0,8e55f98dde74be8a5346f926d577dcb2e351bec3d4dea897973eb49c9d1427fc,2024-11-21T01:46:19.543000 +CVE-2012-6542,0,0,77897e5237dbb0d8a49fc2846add45111d02eb56daf7ea5f37b62c366f8a5fa3,2024-11-21T01:46:19.720000 +CVE-2012-6543,0,0,0f95c27d493d963d4c0b5811507ea1c07e19e8c0e8c1772d967c2ab34a19185c,2024-11-21T01:46:19.890000 +CVE-2012-6544,0,0,d4ea207747c2465debe1c9bc9746df6edd987443bc68132acaf62e75e6713483,2024-11-21T01:46:20.067000 +CVE-2012-6545,0,0,0dad9c27e72a49f1433d2623f26c3118840393cb41d9c388816c52bd8adcde0a,2024-11-21T01:46:20.270000 +CVE-2012-6546,0,0,a0376ed4ac0a37444b3f36bc345139c0143e6a7a0f57923b9c8cac312304f6ff,2024-11-21T01:46:20.450000 +CVE-2012-6547,0,0,aeeeb02c235c166d5ec1cbedd055b785a05914abe7d84469c175fd413d2027e1,2024-11-21T01:46:20.640000 +CVE-2012-6548,0,0,796e8657fdb7062a0df3d72afc638dcc18a7f3d7a92603257ce5aa84109bf905,2024-11-21T01:46:20.813000 +CVE-2012-6549,0,0,191c89174579171f451fa6f03b88f8690392eb2f36d8094050216099b8410d5a,2024-11-21T01:46:20.990000 +CVE-2012-6550,0,0,4a83c52f31336af99fbd0c31d3a2df977758a44c54761c138cc4c88b48a06183,2024-11-21T01:46:21.193000 +CVE-2012-6551,0,0,5d916b1eac806136c2578bb97b59990238c71ea86bcb430b5cbc8a785cbd7a98,2024-11-21T01:46:21.347000 +CVE-2012-6552,0,0,4f2bdf07143f2f53eb3c3ce9c3cc65ffad308fb410d94e06acd55c2c2da6b6c7,2024-11-21T01:46:21.497000 +CVE-2012-6553,0,0,03022deca16c9d7a86bc33ac6b59e1826210bcdf840bcdf0e1aace817dedb568,2024-11-21T01:46:21.637000 +CVE-2012-6554,0,0,70be0df6f53f27233a9db478e0e88b8cfb6634e090f5073fd2b3b35e0a670d59,2024-11-21T01:46:21.780000 +CVE-2012-6555,0,0,b2cafa7fb75e65bb55c76b515905e69117a13f4d7949c83e316073b3b2d021db,2024-11-21T01:46:21.933000 +CVE-2012-6556,0,0,03c28cf505bf0b7a8589f7ed806ff5d478943f5361ac8e52c7852ee44892500f,2024-11-21T01:46:22.090000 +CVE-2012-6557,0,0,4432c0e633caf11b1532267a6dc9d7f92779a0fc278dfcc3748e3ece3df3ae3f,2024-11-21T01:46:22.230000 +CVE-2012-6558,0,0,b0db4937ed09ec10b45bfaeab18048329a272457eb4f79c79ad2a3a85f853f09,2024-11-21T01:46:22.387000 +CVE-2012-6559,0,0,f9998a0371acce57ae12933821a2862934a5120fcc16b36ceee2640999df59fc,2024-11-21T01:46:22.533000 +CVE-2012-6560,0,0,39fd0c5ff8502fe5c35a7004a381a0d8d541bad89a2b3a51b42ebdd84535bfdd,2024-11-21T01:46:22.680000 +CVE-2012-6561,0,0,e56df5cc6bda190d1bb8829076c83d0ecbf1812bd5d52c3b8c0d25dc6e3ca315,2024-11-21T01:46:22.810000 +CVE-2012-6562,0,0,c477471045637bc2a1e032f41a121fd71819fbab2fd326a3902eed2f7dfa7ee4,2024-11-21T01:46:22.950000 +CVE-2012-6563,0,0,169eb35da8231a96bfcfa095e3670dff39791a7645547ad559aa78c1a6591e8d,2024-11-21T01:46:23.103000 +CVE-2012-6564,0,0,6d74d2b6f50a15e49b3ffe3f309be7903c503b6dc10ea9a49c8999585e42ac46,2024-11-21T01:46:23.250000 +CVE-2012-6565,0,0,90103196d1ae84d2f8dcd8364dc18b3f6bf20a439436212345aecfdc91274dcd,2024-11-21T01:46:23.393000 +CVE-2012-6566,0,0,b0667a69ef5db786c1b3426a4db972d84564f4ffb9d92bac61352c1e70ec0aa5,2024-11-21T01:46:23.527000 +CVE-2012-6567,0,0,dc403e30638e41a65cf1ae391b9cdcf78b50fd378a34bfa356377bd82f80f8ed,2024-11-21T01:46:23.667000 +CVE-2012-6568,0,0,2036793716b48707bd84f726ea3b0add3d5c9ff7dbe4a0e52822a2d4bf512d20,2024-11-21T01:46:23.803000 +CVE-2012-6569,0,0,428da0d4d9ff1cfd773c920674e29afb9f1e0d28e9872b134667b283eacda434,2024-11-21T01:46:23.957000 +CVE-2012-6570,0,0,044adb5ec33fdfc02b49297382180e7ef658d53eb830b8af97db29a16657d35e,2024-11-21T01:46:24.107000 +CVE-2012-6571,0,0,bff401bcb722f70fc8970483d0f81dc2a838917217fa287113f5cad7049a7f6a,2024-11-21T01:46:24.257000 +CVE-2012-6572,0,0,d1653ece7d4f27ac9023db873a19c0d53998761dc982036f438fa99e6e8056f4,2024-11-21T01:46:24.410000 +CVE-2012-6573,0,0,73f59ec5981377fdfd9356d17160e06142104d5471f3b432113ea3a29fd690ae,2024-11-21T01:46:24.553000 +CVE-2012-6574,0,0,6f3bc09f77d8381ed361ff6046457d73e1b1dfda2260768c133ea2c0b0e4f3f4,2024-11-21T01:46:24.717000 +CVE-2012-6575,0,0,833c7437e53c99dbd3b32139154b204456afbd30e58c2f2a9def69a1a1dcf029,2024-11-21T01:46:24.870000 +CVE-2012-6576,0,0,a276e011a14f17136522e7fa13afbe79d0a3ecc4daadc113cef5ed91b7b07768,2024-11-21T01:46:25.020000 +CVE-2012-6577,0,0,dc5b2c6a523072064d8363e64130b697cea099a052dce09869361da5c59ca147,2024-11-21T01:46:25.157000 +CVE-2012-6578,0,0,9a8d5d58b909b25ddd819ee04f77902d3c0489d0273746862a1a607f35516143,2024-11-21T01:46:25.330000 +CVE-2012-6579,0,0,e3e7d001de2e4af3874b545dd9768f1cc662b951ab864048e748210862b7000c,2024-11-21T01:46:25.487000 +CVE-2012-6580,0,0,86a98c81bcf06ea8e39ff76546232652bf49d4964324cdb990c6236467f7c564,2024-11-21T01:46:25.633000 +CVE-2012-6581,0,0,dbeaf48413f7ae411e429cbac282ba05041bf8321f117745c4d4c4840955ba37,2024-11-21T01:46:25.780000 +CVE-2012-6582,0,0,e78e71024f31ca8acc9c61f7bed7a80e4b2ecc893cf0e48b763e29ac89ba840a,2024-11-21T01:46:25.923000 +CVE-2012-6583,0,0,0944e9f2881c58c887100e84705815326d28da4eac509386442088a71128620d,2024-11-21T01:46:26.077000 +CVE-2012-6584,0,0,ce651ffc3f2bb98ec5c4a87e5c3b6bf170be341e324f8bfa6debb13772b87a54,2024-11-21T01:46:26.220000 +CVE-2012-6585,0,0,181e45bfd580c57a437a00952c17450f044a10f83248d0be227d8bead0b18e6e,2024-11-21T01:46:26.353000 +CVE-2012-6586,0,0,5043425aa8c3e23c8557d0b0de4164e6c0de494b6e6e3f8be4b9c58f2e68a441,2024-11-21T01:46:26.487000 +CVE-2012-6587,0,0,bc8316851861ac29da8a09676a5dfd8ff27f7506657adbf895c729cf15967f72,2024-11-21T01:46:26.610000 +CVE-2012-6588,0,0,5b73317c236423c60616cd0b6966288be4059495154f9d1a600538ce2f881488,2024-11-21T01:46:26.743000 +CVE-2012-6589,0,0,3417470d6c3fc8036a22ab67a31bb5cf686a8a9c64d484a7425ef73f9601ee87,2024-11-21T01:46:26.873000 +CVE-2012-6590,0,0,8bc18142cd2455dc934c28a7ec796254be9d7a86c62b615649ccdedc7a50e739,2024-11-21T01:46:27.017000 +CVE-2012-6591,0,0,e04af2a0ccaca37a44ca98a2b465262d9929277e18e48c05cf5f535abe4b1487,2024-11-21T01:46:27.160000 +CVE-2012-6592,0,0,51c7c3ab68547e519ecbf5aa0a5a81c532343d11d2fff9e5ae319571e9effcb7,2024-11-21T01:46:27.300000 +CVE-2012-6593,0,0,e911bacd3a9f2bdcf867696d6d8188a39c5a49535f6aabde06d706b4062a0157,2024-11-21T01:46:27.440000 +CVE-2012-6594,0,0,7a34ed640f84bf4449c3638d7839c0d756046e517aeeb9b81718d7d6ea165d83,2024-11-21T01:46:27.580000 +CVE-2012-6595,0,0,399fd5e521ed22e2b05b317219b8a5e1f75871ef1f035d9116d4a0ccc6861a2a,2024-11-21T01:46:27.717000 +CVE-2012-6596,0,0,809ea946f5270526bc13f77169808012e8fce2f64bc6d8f03671d20b48ece9a2,2024-11-21T01:46:27.853000 +CVE-2012-6597,0,0,5524bdc10f8094b87a036cfa849b8bc4f510a12d9114573e8a77a8dfa587b7f5,2024-11-21T01:46:27.977000 +CVE-2012-6598,0,0,62820585cd92bc3620d89dec95d041158bfd0c874c7c37f1155a391b1ac99c8e,2024-11-21T01:46:28.107000 +CVE-2012-6599,0,0,3eaad8189c7265f3c12ff9fa8c4057c2f08c5ffeaed6f2d6f90d1994839f8916,2024-11-21T01:46:28.243000 +CVE-2012-6600,0,0,5bbb092a87aeb39327198086bdde80c0cf967e26c26a899eb83208f225a77d2e,2024-11-21T01:46:28.387000 +CVE-2012-6601,0,0,89d2ab9c8d100f858759f00bc13f71e872d19b653c3de2ea1aa0ae579efc3d95,2024-11-21T01:46:28.530000 +CVE-2012-6602,0,0,a48b4fa2b141cb7f75f1bd4d50468ad0c84806e9f57890e0d33ac21ecd01fadc,2024-11-21T01:46:28.673000 +CVE-2012-6603,0,0,bc935d41da6f0280c199ee682f54728403cc82fcc59a32bb0682837a2e122e3a,2024-11-21T01:46:28.817000 +CVE-2012-6604,0,0,6dc210e2437fa2e413b5e5230be250e37e4f77c6f55ece089a94d94aa9b4a596,2024-11-21T01:46:28.957000 +CVE-2012-6605,0,0,3584bc6dd56c39a14787d1d9997ea50784e740ef71dcc729ec2b13de9dae42f5,2024-11-21T01:46:29.090000 +CVE-2012-6606,0,0,7dce81003f33d22c1b52730047ba88a7fe6d4e73baa3d2e37ecd3b12de0758ab,2024-11-21T01:46:29.230000 +CVE-2012-6607,0,0,537e919110438aff94a36e400f8c504fbdea41d06dda8f8d127b811f772ab843,2024-11-21T01:46:29.363000 +CVE-2012-6608,0,0,b1151aa6dfffc0e234bcb558a9466870911a09cadd20f0f09d9713ea48e28f4e,2024-11-21T01:46:29.520000 CVE-2012-6609,0,0,c2a3dc6f5613edbdb7ee2510ec63acc06ff03d1164db11c9291a7286656cdbf6,2020-02-04T18:57:02.710000 CVE-2012-6610,0,0,673fb19a068c245f22428f67667b81346af4469649486ed9ca4c3627f8fabf4e,2020-02-04T19:56:19.857000 CVE-2012-6611,0,0,21fed21971960d36d2c2ac9b0ecabe6505463c1e896c693aa14a85b9ff51d2a3,2020-02-14T15:42:08.387000 -CVE-2012-6612,0,1,8e3852257cdb55c9e1222fde808061a4a272f71ba3dd97e1344975481df49bb9,2024-11-21T01:46:30.097000 +CVE-2012-6612,0,0,8e3852257cdb55c9e1222fde808061a4a272f71ba3dd97e1344975481df49bb9,2024-11-21T01:46:30.097000 CVE-2012-6613,0,0,2734a2b921e1905cb1001b6a655b8ddbc46f2bcb6de68a58f2e7db1c03772045,2020-01-30T18:58:26.830000 CVE-2012-6614,0,0,b26af430d193269bc2aafd124fb26d26fbc8c812c7bebada4d468f6a89bd7f48,2023-04-26T19:27:52.350000 -CVE-2012-6615,0,1,6c8cea3411991c176a5aafac3c70d80e6407bbb745f9abab265700fcae5b35fa,2024-11-21T01:46:30.570000 -CVE-2012-6616,0,1,e5ff7beeb4bc05a656fbd5383fa21fba287c3b548c91d0eb485f4f66041ef596,2024-11-21T01:46:30.733000 -CVE-2012-6617,0,1,ec4f52bc0b650e7601d0adbf08f8c98258c9e3445ac96e6c36a0a097830183c0,2024-11-21T01:46:30.880000 -CVE-2012-6618,0,1,bf55e4d80e9e981386cddef1ad8691bdfd8b0ffab479f0b3c00f5884d688df14,2024-11-21T01:46:31.013000 -CVE-2012-6619,0,1,02885b16998e213cee748d9d0d2e984859a33a448f637b8c414b8afe9335810c,2024-11-21T01:46:31.167000 -CVE-2012-6620,0,1,de69fac52e3529e071d5908c3a3c283084739f0361bebb40b04bec8992c56449,2024-11-21T01:46:31.327000 -CVE-2012-6621,0,1,fe4bf4b04e02e73a964996e31800e1e4073eb2e2cdd02dd7f66f57f132aba25e,2024-11-21T01:46:31.500000 -CVE-2012-6622,0,1,c19051909e60a40caa97389d691007768af509dd24240dff0a1d8b1c91542be7,2024-11-21T01:46:31.670000 -CVE-2012-6623,0,1,c76634d0c598d245d1961502e596d03fadb7fe327a2dc75065d451dc1c562b58,2024-11-21T01:46:31.830000 -CVE-2012-6624,0,1,c8038a9779aabd4f1528841d29c392ce722b90bae13085b3854744339c2e9534,2024-11-21T01:46:32 -CVE-2012-6625,0,1,6b50cbc961cc8db6b2b7adc070aa2f5b778b417731fcbcb977c9712822b83eda,2024-11-21T01:46:32.147000 -CVE-2012-6626,0,1,75b25594c3aca51808a26e148ea3660e00985ef2cbdf6ed1fd85c95079a6e006,2024-11-21T01:46:32.297000 -CVE-2012-6627,0,1,6d463dc64fb685140c5574f5a67d71e6057ada4e2a10a35de03b5e636f6040c9,2024-11-21T01:46:32.480000 -CVE-2012-6628,0,1,20926a1863918a940ba4860289f540f8fb9d64a4124af92049c25314e06a9cf0,2024-11-21T01:46:33.310000 -CVE-2012-6629,0,1,e4d80b6308a7973d93d87ad3f669d2102f1703d7c6eb154d7f495629cb38e3b6,2024-11-21T01:46:33.690000 -CVE-2012-6630,0,1,302219e2f925c93f2b240f4f83b5bb71389205bea3531a7bddca400d5470fb43,2024-11-21T01:46:33.827000 -CVE-2012-6631,0,1,e59a51fc450dd5344e2c137c9ce2086a8c84e44c485c975ddb092dd4f44dd5dd,2024-11-21T01:46:33.973000 -CVE-2012-6632,0,1,40ad97224749c97e8a50521d6cafdff66887d5ab51642db19a3134f19914968c,2024-11-21T01:46:34.140000 -CVE-2012-6633,0,1,1300c3e34ca1519e205427de59bd37147017a5bdf48724d6253b4ec92264b44f,2024-11-21T01:46:34.310000 -CVE-2012-6634,0,1,c847ff5a8d30cf0ffa0a3fbef76ad1207cc4938608627d7d9bbb52afa9efba24,2024-11-21T01:46:34.460000 -CVE-2012-6635,0,1,279d4435cb0bbe2e855ebf376e84726621c390ea435102ad61cfbaec20dfcc27,2024-11-21T01:46:34.620000 -CVE-2012-6636,0,1,b7b909b3c5d513d0a32b4239fe792e0eb112dcb4e2ea81ab5479449554991ece,2024-11-21T01:46:34.777000 -CVE-2012-6637,0,1,c87397a065bc0fccb3a7bd66bfcd56f0acc6a66c3b62aa04af885282baf9d825,2024-11-21T01:46:34.943000 -CVE-2012-6638,0,1,30532bc7d7a1d9e02b90bf75e2ba961a829747cbcf1e68ebcc3efe26bd7873d8,2024-11-21T01:46:35.107000 +CVE-2012-6615,0,0,6c8cea3411991c176a5aafac3c70d80e6407bbb745f9abab265700fcae5b35fa,2024-11-21T01:46:30.570000 +CVE-2012-6616,0,0,e5ff7beeb4bc05a656fbd5383fa21fba287c3b548c91d0eb485f4f66041ef596,2024-11-21T01:46:30.733000 +CVE-2012-6617,0,0,ec4f52bc0b650e7601d0adbf08f8c98258c9e3445ac96e6c36a0a097830183c0,2024-11-21T01:46:30.880000 +CVE-2012-6618,0,0,bf55e4d80e9e981386cddef1ad8691bdfd8b0ffab479f0b3c00f5884d688df14,2024-11-21T01:46:31.013000 +CVE-2012-6619,0,0,02885b16998e213cee748d9d0d2e984859a33a448f637b8c414b8afe9335810c,2024-11-21T01:46:31.167000 +CVE-2012-6620,0,0,de69fac52e3529e071d5908c3a3c283084739f0361bebb40b04bec8992c56449,2024-11-21T01:46:31.327000 +CVE-2012-6621,0,0,fe4bf4b04e02e73a964996e31800e1e4073eb2e2cdd02dd7f66f57f132aba25e,2024-11-21T01:46:31.500000 +CVE-2012-6622,0,0,c19051909e60a40caa97389d691007768af509dd24240dff0a1d8b1c91542be7,2024-11-21T01:46:31.670000 +CVE-2012-6623,0,0,c76634d0c598d245d1961502e596d03fadb7fe327a2dc75065d451dc1c562b58,2024-11-21T01:46:31.830000 +CVE-2012-6624,0,0,c8038a9779aabd4f1528841d29c392ce722b90bae13085b3854744339c2e9534,2024-11-21T01:46:32 +CVE-2012-6625,0,0,6b50cbc961cc8db6b2b7adc070aa2f5b778b417731fcbcb977c9712822b83eda,2024-11-21T01:46:32.147000 +CVE-2012-6626,0,0,75b25594c3aca51808a26e148ea3660e00985ef2cbdf6ed1fd85c95079a6e006,2024-11-21T01:46:32.297000 +CVE-2012-6627,0,0,6d463dc64fb685140c5574f5a67d71e6057ada4e2a10a35de03b5e636f6040c9,2024-11-21T01:46:32.480000 +CVE-2012-6628,0,0,20926a1863918a940ba4860289f540f8fb9d64a4124af92049c25314e06a9cf0,2024-11-21T01:46:33.310000 +CVE-2012-6629,0,0,e4d80b6308a7973d93d87ad3f669d2102f1703d7c6eb154d7f495629cb38e3b6,2024-11-21T01:46:33.690000 +CVE-2012-6630,0,0,302219e2f925c93f2b240f4f83b5bb71389205bea3531a7bddca400d5470fb43,2024-11-21T01:46:33.827000 +CVE-2012-6631,0,0,e59a51fc450dd5344e2c137c9ce2086a8c84e44c485c975ddb092dd4f44dd5dd,2024-11-21T01:46:33.973000 +CVE-2012-6632,0,0,40ad97224749c97e8a50521d6cafdff66887d5ab51642db19a3134f19914968c,2024-11-21T01:46:34.140000 +CVE-2012-6633,0,0,1300c3e34ca1519e205427de59bd37147017a5bdf48724d6253b4ec92264b44f,2024-11-21T01:46:34.310000 +CVE-2012-6634,0,0,c847ff5a8d30cf0ffa0a3fbef76ad1207cc4938608627d7d9bbb52afa9efba24,2024-11-21T01:46:34.460000 +CVE-2012-6635,0,0,279d4435cb0bbe2e855ebf376e84726621c390ea435102ad61cfbaec20dfcc27,2024-11-21T01:46:34.620000 +CVE-2012-6636,0,0,b7b909b3c5d513d0a32b4239fe792e0eb112dcb4e2ea81ab5479449554991ece,2024-11-21T01:46:34.777000 +CVE-2012-6637,0,0,c87397a065bc0fccb3a7bd66bfcd56f0acc6a66c3b62aa04af885282baf9d825,2024-11-21T01:46:34.943000 +CVE-2012-6638,0,0,30532bc7d7a1d9e02b90bf75e2ba961a829747cbcf1e68ebcc3efe26bd7873d8,2024-11-21T01:46:35.107000 CVE-2012-6639,0,0,a345c54041dc0d13ad6e87cf6406699ad10090c3d87bd64e9419245c6cb249b0,2020-08-18T15:05:57.937000 -CVE-2012-6640,0,1,562b5944db28739680a70b5f7146d5f3810c327c9ac4fbbf1990834976cc1b46,2024-11-21T01:46:35.397000 -CVE-2012-6641,0,1,c5e67938d48cd9ffc7da5404300449050c6a223ca338319fbf8fe28e90337d3c,2024-11-21T01:46:35.577000 -CVE-2012-6642,0,1,a49f414311bbb5ec956bf0d6e12be3979d91ce5cd9be373d5eec28a1ea9a163a,2024-11-21T01:46:35.737000 -CVE-2012-6643,0,1,3e647816609efc7441b00cfcacadb0845b9b2b7ddc1adae6f0701d021185815b,2024-11-21T01:46:35.890000 -CVE-2012-6644,0,1,fd2d8d94cf82bce7e070b0a7bf083ea223297fc268cef111c7681678f75d2f6d,2024-11-21T01:46:36.033000 -CVE-2012-6645,0,1,68c69246e9059e980e84dce7780db98321a038360c3a5ba87be29a172f1edf7f,2024-11-21T01:46:36.197000 -CVE-2012-6646,0,1,59627b90d0e31316f2418298d1775363b9f229f9a200930c714b7f7dc6b57464,2024-11-21T01:46:36.377000 +CVE-2012-6640,0,0,562b5944db28739680a70b5f7146d5f3810c327c9ac4fbbf1990834976cc1b46,2024-11-21T01:46:35.397000 +CVE-2012-6641,0,0,c5e67938d48cd9ffc7da5404300449050c6a223ca338319fbf8fe28e90337d3c,2024-11-21T01:46:35.577000 +CVE-2012-6642,0,0,a49f414311bbb5ec956bf0d6e12be3979d91ce5cd9be373d5eec28a1ea9a163a,2024-11-21T01:46:35.737000 +CVE-2012-6643,0,0,3e647816609efc7441b00cfcacadb0845b9b2b7ddc1adae6f0701d021185815b,2024-11-21T01:46:35.890000 +CVE-2012-6644,0,0,fd2d8d94cf82bce7e070b0a7bf083ea223297fc268cef111c7681678f75d2f6d,2024-11-21T01:46:36.033000 +CVE-2012-6645,0,0,68c69246e9059e980e84dce7780db98321a038360c3a5ba87be29a172f1edf7f,2024-11-21T01:46:36.197000 +CVE-2012-6646,0,0,59627b90d0e31316f2418298d1775363b9f229f9a200930c714b7f7dc6b57464,2024-11-21T01:46:36.377000 CVE-2012-6647,0,0,2b15acb742d7166aa33a16c2afc4d3acc6cd2570ddb08780e0ce6239aa22a4b1,2023-02-13T04:38:01.203000 -CVE-2012-6648,0,1,9531518484f22ba61b4bc1ad79749d1fb56842a0e1eebd1edb583da7dddc773c,2024-11-21T01:46:36.670000 +CVE-2012-6648,0,0,9531518484f22ba61b4bc1ad79749d1fb56842a0e1eebd1edb583da7dddc773c,2024-11-21T01:46:36.670000 CVE-2012-6649,0,0,8dc95ac67d03e7cb7559dd3efe821b0d7a586956716e3d2d5d4331a8d1efe0c5,2020-01-29T17:44:07.333000 CVE-2012-6651,0,0,e506e9ef1cb7fd50dd4472c54792b5a36bb2354c28e350d941e25a714a595f59,2014-08-01T14:07:50.670000 CVE-2012-6652,0,0,354d0a6c040a047b0290888d1d1f995a1a989830fcebe52db2cc2e203dc99feb,2019-05-13T17:28:34.050000 @@ -57704,36 +57704,36 @@ CVE-2012-6718,0,0,6e4a6ff3b27ac4b0352851f586e54a3bd445b48e9746720a77848eed83fdf9 CVE-2012-6719,0,0,0238e8012603d25a6650a360bca72659e45e5bb1ad618281f10424acab357ff2,2019-08-28T22:02:59.513000 CVE-2012-6720,0,0,e13e6ae2eeafaeac9fe6fb097eafcf920d86d4bb7187f7c86d099e35ba363790,2020-02-12T21:05:19.837000 CVE-2012-6721,0,0,167baf4f3f2878c1d8900ffd27218716c148fe1efaf2e515eeaff92d77fe28f2,2020-02-12T20:27:40.517000 -CVE-2013-0001,0,1,8a64905cf9964dd64645f6cc5b4dc09bb2fac92b23f639635ec85554490a8e16,2024-11-21T01:46:45.693000 -CVE-2013-0002,0,1,ef3b6a5341429a4c8605b07584526aa10733c46202ae97fc30fb1a7046cc4a78,2024-11-21T01:46:45.833000 -CVE-2013-0003,0,1,37f562f8b717f7490d70238e425f918ab0cff1a2b0354a0ea95470b31e643832,2024-11-21T01:46:45.973000 -CVE-2013-0004,0,1,fab3eefa709939902984b2fee2d89123ba510f7b11f5e87edda2e8b3bde9191d,2024-11-21T01:46:46.113000 -CVE-2013-0005,0,1,ded5152cd0224775876fc184dc08271cac3df15ca54f15a29343e1ba047ea8d7,2024-11-21T01:46:46.257000 -CVE-2013-0006,0,1,2a922031230807f5c3aff8b31909e708f5f1cfcd42754cf98aefe113ed8c9731,2024-11-21T01:46:46.380000 -CVE-2013-0007,0,1,b2943fb91ece9746e76ecad1348f725041421ed50540360fbe17c8aed2ea5711,2024-11-21T01:46:46.520000 -CVE-2013-0008,0,1,2ec7f96607dfcf5e552b3846098346a52088b991dd575873d9a92b7980082b4e,2024-11-21T01:46:46.667000 -CVE-2013-0009,0,1,f44f1ee36030ee6634577e9e7d40325ca370315062ecc719bec0fdab3e77c798,2024-11-21T01:46:46.793000 -CVE-2013-0010,0,1,3e879af3868c6ae38b88f95087ff6fa3a5b927e464060d8d10f9025aa1e1c050,2024-11-21T01:46:46.920000 -CVE-2013-0011,0,1,006e7d23901841dfb4cbcc9d4482492e3fd7b19cf739046580dd748f56a9af1a,2024-11-21T01:46:47.030000 +CVE-2013-0001,0,0,8a64905cf9964dd64645f6cc5b4dc09bb2fac92b23f639635ec85554490a8e16,2024-11-21T01:46:45.693000 +CVE-2013-0002,0,0,ef3b6a5341429a4c8605b07584526aa10733c46202ae97fc30fb1a7046cc4a78,2024-11-21T01:46:45.833000 +CVE-2013-0003,0,0,37f562f8b717f7490d70238e425f918ab0cff1a2b0354a0ea95470b31e643832,2024-11-21T01:46:45.973000 +CVE-2013-0004,0,0,fab3eefa709939902984b2fee2d89123ba510f7b11f5e87edda2e8b3bde9191d,2024-11-21T01:46:46.113000 +CVE-2013-0005,0,0,ded5152cd0224775876fc184dc08271cac3df15ca54f15a29343e1ba047ea8d7,2024-11-21T01:46:46.257000 +CVE-2013-0006,0,0,2a922031230807f5c3aff8b31909e708f5f1cfcd42754cf98aefe113ed8c9731,2024-11-21T01:46:46.380000 +CVE-2013-0007,0,0,b2943fb91ece9746e76ecad1348f725041421ed50540360fbe17c8aed2ea5711,2024-11-21T01:46:46.520000 +CVE-2013-0008,0,0,2ec7f96607dfcf5e552b3846098346a52088b991dd575873d9a92b7980082b4e,2024-11-21T01:46:46.667000 +CVE-2013-0009,0,0,f44f1ee36030ee6634577e9e7d40325ca370315062ecc719bec0fdab3e77c798,2024-11-21T01:46:46.793000 +CVE-2013-0010,0,0,3e879af3868c6ae38b88f95087ff6fa3a5b927e464060d8d10f9025aa1e1c050,2024-11-21T01:46:46.920000 +CVE-2013-0011,0,0,006e7d23901841dfb4cbcc9d4482492e3fd7b19cf739046580dd748f56a9af1a,2024-11-21T01:46:47.030000 CVE-2013-0012,0,0,960fb06c509113b4405b54d1891db5ba83ce42f14cd3d41bf65dd520df3d66e3,2023-11-07T02:13:33.777000 -CVE-2013-0013,0,1,fb54d59d34abeb502abff8d848fc8b54717843f1dced13afdc8d4613c513e3c0,2024-11-21T01:46:47.160000 +CVE-2013-0013,0,0,fb54d59d34abeb502abff8d848fc8b54717843f1dced13afdc8d4613c513e3c0,2024-11-21T01:46:47.160000 CVE-2013-0014,0,0,c9fe41672e486d820712e8d5fbd7673ec203661be14bb3884d6208992396ca8e,2023-11-07T02:13:34.020000 -CVE-2013-0015,0,1,57b2f8c953d8354f06810c748dd8861524bf9c9602029db023e841b485d25572,2024-11-21T01:46:47.297000 +CVE-2013-0015,0,0,57b2f8c953d8354f06810c748dd8861524bf9c9602029db023e841b485d25572,2024-11-21T01:46:47.297000 CVE-2013-0016,0,0,acc1d2d697c48fbd642cfda6f5ba7e9c4e88a247aca9fe87378d57d0ed4ffcc5,2023-11-07T02:13:34.277000 CVE-2013-0017,0,0,a4e4e19b9ad14066b013c489a3d592382f0e4bde09fc0eac5886f2ca60138610,2023-11-07T02:13:34.503000 -CVE-2013-0018,0,1,08e249e3c442b54a6b16340b512d3eeff8efa840d11d9bed10d03d5d6bfafa86,2024-11-21T01:46:47.460000 -CVE-2013-0019,0,1,8a1063d524e2bcee8aa1b3f172e2a1ad4a644ecab0d51ccc1b052d8a62496e2b,2024-11-21T01:46:47.580000 -CVE-2013-0020,0,1,54a99b005deee8771e53133cd11002e1efc156cb7cb07d30a98123c3976438b0,2024-11-21T01:46:47.720000 -CVE-2013-0021,0,1,5acb831f0a76c58fb73e672bc082142eea0c6f5762f52f5a66e92323a673412b,2024-11-21T01:46:47.857000 -CVE-2013-0022,0,1,a4928a251440576af131c2a1661b5dc22ccf8bab65cd0a1cecaaa2c2c9e150c8,2024-11-21T01:46:47.973000 -CVE-2013-0023,0,1,69fbdc006d392ca0c71601519b5cd30ea309730a5535d65eff095968668eb75d,2024-11-21T01:46:48.167000 -CVE-2013-0024,0,1,23b7cde073be921d037e0abfb4bd3008e561e230be60cf879da147fc8f15005b,2024-11-21T01:46:48.287000 -CVE-2013-0025,0,1,2094a2bbcd7be1faa8736c813bd05ba8158d2dda67b18490930f95e6e7966617,2024-11-21T01:46:48.390000 -CVE-2013-0026,0,1,6537824041edb710b53fb9bda46821a1509a297f33b15320677b457f83389c11,2024-11-21T01:46:48.500000 -CVE-2013-0027,0,1,79199f4579e16b46745163ebc63b41bf8e511a6ca21a60993bd3b6d2b9500fd9,2024-11-21T01:46:48.620000 -CVE-2013-0028,0,1,60cd5e0d42c17fefdd5447eb6162581919943f96f6881f4f440ddfc43e3061ab,2024-11-21T01:46:48.730000 -CVE-2013-0029,0,1,331a5851c231b441bdeff2f53ae36a61180600e9e124af551b329066db0be182,2024-11-21T01:46:48.850000 -CVE-2013-0030,0,1,82726f64fa784fd6fde4184092f15b312ef50639ad108f6b4cf70f33e653421b,2024-11-21T01:46:48.990000 +CVE-2013-0018,0,0,08e249e3c442b54a6b16340b512d3eeff8efa840d11d9bed10d03d5d6bfafa86,2024-11-21T01:46:47.460000 +CVE-2013-0019,0,0,8a1063d524e2bcee8aa1b3f172e2a1ad4a644ecab0d51ccc1b052d8a62496e2b,2024-11-21T01:46:47.580000 +CVE-2013-0020,0,0,54a99b005deee8771e53133cd11002e1efc156cb7cb07d30a98123c3976438b0,2024-11-21T01:46:47.720000 +CVE-2013-0021,0,0,5acb831f0a76c58fb73e672bc082142eea0c6f5762f52f5a66e92323a673412b,2024-11-21T01:46:47.857000 +CVE-2013-0022,0,0,a4928a251440576af131c2a1661b5dc22ccf8bab65cd0a1cecaaa2c2c9e150c8,2024-11-21T01:46:47.973000 +CVE-2013-0023,0,0,69fbdc006d392ca0c71601519b5cd30ea309730a5535d65eff095968668eb75d,2024-11-21T01:46:48.167000 +CVE-2013-0024,0,0,23b7cde073be921d037e0abfb4bd3008e561e230be60cf879da147fc8f15005b,2024-11-21T01:46:48.287000 +CVE-2013-0025,0,0,2094a2bbcd7be1faa8736c813bd05ba8158d2dda67b18490930f95e6e7966617,2024-11-21T01:46:48.390000 +CVE-2013-0026,0,0,6537824041edb710b53fb9bda46821a1509a297f33b15320677b457f83389c11,2024-11-21T01:46:48.500000 +CVE-2013-0027,0,0,79199f4579e16b46745163ebc63b41bf8e511a6ca21a60993bd3b6d2b9500fd9,2024-11-21T01:46:48.620000 +CVE-2013-0028,0,0,60cd5e0d42c17fefdd5447eb6162581919943f96f6881f4f440ddfc43e3061ab,2024-11-21T01:46:48.730000 +CVE-2013-0029,0,0,331a5851c231b441bdeff2f53ae36a61180600e9e124af551b329066db0be182,2024-11-21T01:46:48.850000 +CVE-2013-0030,0,0,82726f64fa784fd6fde4184092f15b312ef50639ad108f6b4cf70f33e653421b,2024-11-21T01:46:48.990000 CVE-2013-0031,0,0,fc57d5733aab0ae73d0b27a93fd45bdba5f1cc5fe246f193bd55b1d33ad3f924,2023-11-07T02:13:34.887000 CVE-2013-0032,0,0,8ca54b8f5b82ce71907610353bc50a607e3bb9e6b10fa37b6446a48001baa577,2023-11-07T02:13:35.113000 CVE-2013-0033,0,0,9c98925fe4130fa23f533101dafa4a11c61a33a52d3ef2905910595b425eed3e,2023-11-07T02:13:35.357000 @@ -57776,868 +57776,868 @@ CVE-2013-0069,0,0,f4fb0e7471bd2d0295b9abda676f680ce6b9effdae4c9d1ab6f9ae3b2b0002 CVE-2013-0070,0,0,f09a6bff3a06665ba1d9c2694ee9815a8d89bbfc3e0b5b19965a04afa3f6dff5,2023-11-07T02:13:43.807000 CVE-2013-0071,0,0,c2eb876578a4b214a0b71ffd9faee8d8f9873d3df20aa2989abb12cc8180180b,2023-11-07T02:13:44.030000 CVE-2013-0072,0,0,7af96c1b8b137fc8b9273471b10a48c1fb8f346973df5a7cc974591cb2c03dc6,2023-11-07T02:13:44.277000 -CVE-2013-0073,0,1,75a8a5badefa1695fceb57d601a8f342f50158551bce7a7a716dee7b0c5c91ef,2024-11-21T01:46:49.740000 -CVE-2013-0074,0,1,890c76b9645a045ce3c7fb86964947cd7182b46cb3c09480c8878be9e5d6c77b,2024-11-21T01:46:49.873000 -CVE-2013-0075,0,1,734d4f62d5e214f6db80f8523ec59b24cb85f59a9b55ce5146f3586303d7d12c,2024-11-21T01:46:50 -CVE-2013-0076,0,1,640ff3901bced6b8578ea59e77b40b4077b3adc1ccea26f9594fad188773e079,2024-11-21T01:46:50.140000 -CVE-2013-0077,0,1,34318c6b27977b9de97dbb0182f1abcca131d412c199c65ad5ed1820512e6868,2024-11-21T01:46:50.260000 -CVE-2013-0078,0,1,8fc5e9e0f42548166fdbf4ff01f5aa1e3698b49a34227af7f9babb9b505405c7,2024-11-21T01:46:50.373000 -CVE-2013-0079,0,1,33fe63d039e63fa124fa39334e5a8aeb3f8992893ca219f766b5ed0a28999b82,2024-11-21T01:46:50.493000 -CVE-2013-0080,0,1,ef3e9e6ee92892c9ee6e609549d1de3d0e3bfaf9d362ba528c5b5256c2bc0ee4,2024-11-21T01:46:50.613000 -CVE-2013-0081,0,1,019adab6a68b16bcc0467effbe919e584ac31ee53574576975b297b1d580add1,2024-11-21T01:46:50.740000 -CVE-2013-0082,0,1,a4478700cebe4a7a8d9cd8a946674e8d86501876d9a4e751d680e3b78e01377c,2024-11-21T01:46:50.860000 -CVE-2013-0083,0,1,a75a3792324e6c8620604d85af7e34fceac80372bd35dee8fe8ca59c033d3483,2024-11-21T01:46:50.973000 -CVE-2013-0084,0,1,f342e3f2e85ebaf2ebe840d755d00177380355111cef69924dca585d637e70b9,2024-11-21T01:46:51.083000 -CVE-2013-0085,0,1,74cd4dbf369c39b892f12bac788df3e7f396799d64a06b70cab8a1ad89344196,2024-11-21T01:46:51.200000 -CVE-2013-0086,0,1,eed54683517dbace23e7ea0aaeb5ae274e447ebd9b99b6fbf924a99c10c4b16f,2024-11-21T01:46:51.313000 -CVE-2013-0087,0,1,858b5bc955ee1713a7d4705844df37dd92e09492b8c469669003f74067911b73,2024-11-21T01:46:51.440000 -CVE-2013-0088,0,1,5aba27f59fa7e2dfa85df00fae8b2f3910b09ab90f1102f62492a8ca4b5a2643,2024-11-21T01:46:51.577000 -CVE-2013-0089,0,1,8e790d7ded16a57e661fe70f64a2213deb7006adfa7c4779d6ad27cb74b42e78,2024-11-21T01:46:51.703000 -CVE-2013-0090,0,1,e89b3a88cb815b1ba3275998301dab9d901e0febaaf66a3f557458734abadbd8,2024-11-21T01:46:51.830000 -CVE-2013-0091,0,1,fc53cf73d5a673ac5a20535b83aef91a643b3da6d6bfde421c50f2b10637ef69,2024-11-21T01:46:51.957000 -CVE-2013-0092,0,1,211a2f8e5d7cf0fc0da0bcdca6b7c8815921692071cdd8ead90ea0a098526fd7,2024-11-21T01:46:52.070000 -CVE-2013-0093,0,1,06b000124f71703e9b8c0762e622a67c8ac2c76d348a1825be66f92d58d2eb33,2024-11-21T01:46:52.193000 -CVE-2013-0094,0,1,f7d9789dcb3cd5db3f5b69fee307146f87193973f37b2238c6703f6a677ce058,2024-11-21T01:46:52.327000 -CVE-2013-0095,0,1,0a78058b1560267e45a5a3856d705dcefcbb48cfca8d8e038578de75464705b0,2024-11-21T01:46:52.450000 -CVE-2013-0096,0,1,ff78f04d03bcb59ccfeec01a0d76bfc6451783891202f44eafed8159d9758d0a,2024-11-21T01:46:52.570000 +CVE-2013-0073,0,0,75a8a5badefa1695fceb57d601a8f342f50158551bce7a7a716dee7b0c5c91ef,2024-11-21T01:46:49.740000 +CVE-2013-0074,0,0,890c76b9645a045ce3c7fb86964947cd7182b46cb3c09480c8878be9e5d6c77b,2024-11-21T01:46:49.873000 +CVE-2013-0075,0,0,734d4f62d5e214f6db80f8523ec59b24cb85f59a9b55ce5146f3586303d7d12c,2024-11-21T01:46:50 +CVE-2013-0076,0,0,640ff3901bced6b8578ea59e77b40b4077b3adc1ccea26f9594fad188773e079,2024-11-21T01:46:50.140000 +CVE-2013-0077,0,0,34318c6b27977b9de97dbb0182f1abcca131d412c199c65ad5ed1820512e6868,2024-11-21T01:46:50.260000 +CVE-2013-0078,0,0,8fc5e9e0f42548166fdbf4ff01f5aa1e3698b49a34227af7f9babb9b505405c7,2024-11-21T01:46:50.373000 +CVE-2013-0079,0,0,33fe63d039e63fa124fa39334e5a8aeb3f8992893ca219f766b5ed0a28999b82,2024-11-21T01:46:50.493000 +CVE-2013-0080,0,0,ef3e9e6ee92892c9ee6e609549d1de3d0e3bfaf9d362ba528c5b5256c2bc0ee4,2024-11-21T01:46:50.613000 +CVE-2013-0081,0,0,019adab6a68b16bcc0467effbe919e584ac31ee53574576975b297b1d580add1,2024-11-21T01:46:50.740000 +CVE-2013-0082,0,0,a4478700cebe4a7a8d9cd8a946674e8d86501876d9a4e751d680e3b78e01377c,2024-11-21T01:46:50.860000 +CVE-2013-0083,0,0,a75a3792324e6c8620604d85af7e34fceac80372bd35dee8fe8ca59c033d3483,2024-11-21T01:46:50.973000 +CVE-2013-0084,0,0,f342e3f2e85ebaf2ebe840d755d00177380355111cef69924dca585d637e70b9,2024-11-21T01:46:51.083000 +CVE-2013-0085,0,0,74cd4dbf369c39b892f12bac788df3e7f396799d64a06b70cab8a1ad89344196,2024-11-21T01:46:51.200000 +CVE-2013-0086,0,0,eed54683517dbace23e7ea0aaeb5ae274e447ebd9b99b6fbf924a99c10c4b16f,2024-11-21T01:46:51.313000 +CVE-2013-0087,0,0,858b5bc955ee1713a7d4705844df37dd92e09492b8c469669003f74067911b73,2024-11-21T01:46:51.440000 +CVE-2013-0088,0,0,5aba27f59fa7e2dfa85df00fae8b2f3910b09ab90f1102f62492a8ca4b5a2643,2024-11-21T01:46:51.577000 +CVE-2013-0089,0,0,8e790d7ded16a57e661fe70f64a2213deb7006adfa7c4779d6ad27cb74b42e78,2024-11-21T01:46:51.703000 +CVE-2013-0090,0,0,e89b3a88cb815b1ba3275998301dab9d901e0febaaf66a3f557458734abadbd8,2024-11-21T01:46:51.830000 +CVE-2013-0091,0,0,fc53cf73d5a673ac5a20535b83aef91a643b3da6d6bfde421c50f2b10637ef69,2024-11-21T01:46:51.957000 +CVE-2013-0092,0,0,211a2f8e5d7cf0fc0da0bcdca6b7c8815921692071cdd8ead90ea0a098526fd7,2024-11-21T01:46:52.070000 +CVE-2013-0093,0,0,06b000124f71703e9b8c0762e622a67c8ac2c76d348a1825be66f92d58d2eb33,2024-11-21T01:46:52.193000 +CVE-2013-0094,0,0,f7d9789dcb3cd5db3f5b69fee307146f87193973f37b2238c6703f6a677ce058,2024-11-21T01:46:52.327000 +CVE-2013-0095,0,0,0a78058b1560267e45a5a3856d705dcefcbb48cfca8d8e038578de75464705b0,2024-11-21T01:46:52.450000 +CVE-2013-0096,0,0,ff78f04d03bcb59ccfeec01a0d76bfc6451783891202f44eafed8159d9758d0a,2024-11-21T01:46:52.570000 CVE-2013-0097,0,0,e5166cc6d7ec167d9b31e00024514ef2fec8bc992743fe123b119517ff4baa82,2023-11-07T02:13:44.663000 CVE-2013-0098,0,0,568b7ab5487328116aec23141522dc741d6b031991094279cf40c77d6c6352a0,2023-11-07T02:13:44.883000 CVE-2013-0099,0,0,f5b4f5eb467e25b423ce35f66890ec70950e7cbe089b87c5cc623553bf0740c1,2023-11-07T02:13:45.113000 CVE-2013-0100,0,0,3c35795765f4eb9e0c541f631cc856b76b79f124c57ed81e724c8a8d37fc9112,2023-11-07T02:13:45.367000 -CVE-2013-0107,0,1,72aa102e2fb8c81a435b856cea74284d1ea6c12d9141c7528e69ec2f7d4f297e,2024-11-21T01:46:52.743000 -CVE-2013-0108,0,1,061ca19774072ad01a51c98f4edecd42784f0277e4ab0923fc81ac34f7040e84,2024-11-21T01:46:52.850000 -CVE-2013-0109,0,1,5c6441e6ba1b7734f4693ca518428a5b993603ebf527f245142b81c0d081e648,2024-11-21T01:46:52.953000 -CVE-2013-0110,0,1,30fdc1c05a77b627dc6f21b6380972a75a21f7b5cf1c9d3e1f4b4bd911fc7f7e,2024-11-21T01:46:53.063000 -CVE-2013-0111,0,1,56083662c9a57063e6b257ee46480eff4bc2a11b287c0814e4871ac4928efc61,2024-11-21T01:46:53.177000 -CVE-2013-0113,0,1,f2a8a3f28abb4cc031f269a52bf31633884dc5b431790967869586e7134e0cfd,2024-11-21T01:46:53.287000 -CVE-2013-0118,0,1,0e9b41e4760fffb71226e89a71d2e97b8d46265978f2509e3b231400d866e555,2024-11-21T01:46:53.393000 -CVE-2013-0120,0,1,54fbd897d03ff52b214dec83b67b71e5b456f531f036922e5a78d4b7b2ecf104,2024-11-21T01:46:53.507000 -CVE-2013-0122,0,1,12bffd2a7a54c28d4d7177ddae478a4c5015a340ce5bc6aa1cb6b015044b4fab,2024-11-21T01:46:53.613000 -CVE-2013-0123,0,1,e43a01877992ffd670c730f3ea9fab522b5f3293e051e4325efd9329508d0baa,2024-11-21T01:46:53.727000 -CVE-2013-0124,0,1,9da6acbf8104adfd38ee184a6bdc5eefcfcb7270d7620768bed0d6fe1165a8f5,2024-11-21T01:46:53.833000 -CVE-2013-0125,0,1,14b8cbb643c501d9de469be4b969ac8c806a2306f5604c5865df0ea7a28907f8,2024-11-21T01:46:53.950000 -CVE-2013-0126,0,1,a70ec3bdf25e3865a7b907c020de17cef9773a320ad293d9a12172d855803d97,2024-11-21T01:46:54.070000 -CVE-2013-0127,0,1,fcb6e865c2008736596d8ac9a6ce8131e2253759d3c8c1564a491b11fa60fa38,2024-11-21T01:46:54.197000 -CVE-2013-0128,0,1,01c43a2ef7b9f5b0faf455b92201190b707a7d0f853f48b33add214c74f6697f,2024-11-21T01:46:54.330000 -CVE-2013-0129,0,1,5f56809bf60d7978eb8fc6a2c86e97f57392c29b3c8b056a7515111d33eb7c6b,2024-11-21T01:46:54.450000 -CVE-2013-0130,0,1,2cd09fa1652a9f8254bacef0d95212bafe47d61d60196097de9589186fb50b2b,2024-11-21T01:46:54.560000 -CVE-2013-0131,0,1,e08d6139385b1cd0183dfd9b455c6f868b688f650f0cdeef87bd711e68754124,2024-11-21T01:46:54.680000 -CVE-2013-0132,0,1,d180bc44166a739bae0e0b79b1f3eb381cbd75d1fc3b35fe407afc2b7c205597,2024-11-21T01:46:54.793000 -CVE-2013-0133,0,1,84ff213c0f132a0cc157eaff420e4ebcc8ab577c24e618903c9c60d16b67a826,2024-11-21T01:46:54.910000 -CVE-2013-0134,0,1,f4dc2ce7c46fc38e3c96cff5a6b1ec04b3085d26ddc2db8e2cc03d4b3dc81a15,2024-11-21T01:46:55.020000 -CVE-2013-0135,0,1,ff3ddecf0067b18cb58d9f301b6b4179ab6afc0ff2c7ea144bae09dd249e5911,2024-11-21T01:46:55.137000 -CVE-2013-0136,0,1,a75b530c566a4b791debc6c7620d3cab320c5e6f3d56998f5fd76e567e8b3fc5,2024-11-21T01:46:55.257000 -CVE-2013-0137,0,1,066b2118622245cdffecebc47ceafc1e3d4f2ce802021f9725499f3d6da1b586,2024-11-21T01:46:55.373000 -CVE-2013-0138,0,1,04b68ac34b9abd99939c7d8c67402752d9f541ac4a7c01614b942a389815ee05,2024-11-21T01:46:55.497000 -CVE-2013-0139,0,1,dc818922d78bfb307599b218409e5f0c2dd2be7867a7cc5e692d8c39ca938f22,2024-11-21T01:46:55.613000 -CVE-2013-0140,0,1,1c34816b68c62a5c5906037daa95dfde1fe9f8691159166abe1fbd41066ea290,2024-11-21T01:46:55.730000 -CVE-2013-0141,0,1,94cf0c4a18945f01578cfd5fdd8cfd89ef3bb0b2d5e917b3ad263172437cd6e0,2024-11-21T01:46:55.883000 -CVE-2013-0142,0,1,66523d2346a017f1022da0775fc99763ea1658c4cb989ed757e2fb056b61b80e,2024-11-21T01:46:56.013000 -CVE-2013-0143,0,1,18900c289791ab65907d621e6c0b4bfa119389db670d0142249549a77a44c32a,2024-11-21T01:46:56.133000 -CVE-2013-0144,0,1,75216646795a31ec1279cf27e86cddaea2a8aa37eac6decc60fa7c15217d888b,2024-11-21T01:46:56.260000 -CVE-2013-0145,0,1,67d4321f280ba52a5187abd8a101a227f59758269433f6f2f6a0815ad22c923d,2024-11-21T01:46:56.377000 -CVE-2013-0148,0,1,2d972e897356807c33b99c91d76c8b18b8f317d87c0e3494f1033ecd9a90f771,2024-11-21T01:46:56.493000 -CVE-2013-0149,0,1,4ee72f6a25f395b45f5d2262565cde4094af0e9fd3ee78764f891d4795420d00,2024-11-21T01:46:56.630000 -CVE-2013-0150,0,1,d385668af787d46bc4d18cc8476fce1f21066d0fd5a9721b8f9a924b926e7e18,2024-11-21T01:46:56.830000 -CVE-2013-0151,0,1,a5ee08fa3b640c65aaf61f7a46512383f34a6a38e3d6305be563731576c6cd69,2024-11-21T01:46:56.953000 -CVE-2013-0152,0,1,8bc87c68ebaede739e7a9cb8f7d2f37132b48744203e2be394ac2aab34f2eb8b,2024-11-21T01:46:57.060000 -CVE-2013-0153,0,1,f48200416f141eb95aa2ac58c68bb3fbbed53b5a17656c77595e7aed66a50e0b,2024-11-21T01:46:57.170000 -CVE-2013-0154,0,1,0cb79a173224559f225b22fc0e30591123b6879ad82823ec9a461978645d0bc6,2024-11-21T01:46:57.287000 -CVE-2013-0155,0,1,53ddd70dbc19e713ca2bdfaacda9edb6334f8f3098e43bc81c01b99f83de7d2d,2024-11-21T01:46:57.407000 -CVE-2013-0156,0,1,30c49f654e97cdeeb6d716a121772d847522073f9777c48d23621209584889d3,2024-11-21T01:46:57.547000 -CVE-2013-0157,0,1,799564fbf256420e77de2905b926659b566ecaac8fab77c962a7ae31cc11ec72,2024-11-21T01:46:57.693000 -CVE-2013-0158,0,1,bf98bcf87dbbec9d8c7ce32e3b6b068907432a53fc33ee50572a4cbba7c2e62a,2024-11-21T01:46:57.800000 +CVE-2013-0107,0,0,72aa102e2fb8c81a435b856cea74284d1ea6c12d9141c7528e69ec2f7d4f297e,2024-11-21T01:46:52.743000 +CVE-2013-0108,0,0,061ca19774072ad01a51c98f4edecd42784f0277e4ab0923fc81ac34f7040e84,2024-11-21T01:46:52.850000 +CVE-2013-0109,0,0,5c6441e6ba1b7734f4693ca518428a5b993603ebf527f245142b81c0d081e648,2024-11-21T01:46:52.953000 +CVE-2013-0110,0,0,30fdc1c05a77b627dc6f21b6380972a75a21f7b5cf1c9d3e1f4b4bd911fc7f7e,2024-11-21T01:46:53.063000 +CVE-2013-0111,0,0,56083662c9a57063e6b257ee46480eff4bc2a11b287c0814e4871ac4928efc61,2024-11-21T01:46:53.177000 +CVE-2013-0113,0,0,f2a8a3f28abb4cc031f269a52bf31633884dc5b431790967869586e7134e0cfd,2024-11-21T01:46:53.287000 +CVE-2013-0118,0,0,0e9b41e4760fffb71226e89a71d2e97b8d46265978f2509e3b231400d866e555,2024-11-21T01:46:53.393000 +CVE-2013-0120,0,0,54fbd897d03ff52b214dec83b67b71e5b456f531f036922e5a78d4b7b2ecf104,2024-11-21T01:46:53.507000 +CVE-2013-0122,0,0,12bffd2a7a54c28d4d7177ddae478a4c5015a340ce5bc6aa1cb6b015044b4fab,2024-11-21T01:46:53.613000 +CVE-2013-0123,0,0,e43a01877992ffd670c730f3ea9fab522b5f3293e051e4325efd9329508d0baa,2024-11-21T01:46:53.727000 +CVE-2013-0124,0,0,9da6acbf8104adfd38ee184a6bdc5eefcfcb7270d7620768bed0d6fe1165a8f5,2024-11-21T01:46:53.833000 +CVE-2013-0125,0,0,14b8cbb643c501d9de469be4b969ac8c806a2306f5604c5865df0ea7a28907f8,2024-11-21T01:46:53.950000 +CVE-2013-0126,0,0,a70ec3bdf25e3865a7b907c020de17cef9773a320ad293d9a12172d855803d97,2024-11-21T01:46:54.070000 +CVE-2013-0127,0,0,fcb6e865c2008736596d8ac9a6ce8131e2253759d3c8c1564a491b11fa60fa38,2024-11-21T01:46:54.197000 +CVE-2013-0128,0,0,01c43a2ef7b9f5b0faf455b92201190b707a7d0f853f48b33add214c74f6697f,2024-11-21T01:46:54.330000 +CVE-2013-0129,0,0,5f56809bf60d7978eb8fc6a2c86e97f57392c29b3c8b056a7515111d33eb7c6b,2024-11-21T01:46:54.450000 +CVE-2013-0130,0,0,2cd09fa1652a9f8254bacef0d95212bafe47d61d60196097de9589186fb50b2b,2024-11-21T01:46:54.560000 +CVE-2013-0131,0,0,e08d6139385b1cd0183dfd9b455c6f868b688f650f0cdeef87bd711e68754124,2024-11-21T01:46:54.680000 +CVE-2013-0132,0,0,d180bc44166a739bae0e0b79b1f3eb381cbd75d1fc3b35fe407afc2b7c205597,2024-11-21T01:46:54.793000 +CVE-2013-0133,0,0,84ff213c0f132a0cc157eaff420e4ebcc8ab577c24e618903c9c60d16b67a826,2024-11-21T01:46:54.910000 +CVE-2013-0134,0,0,f4dc2ce7c46fc38e3c96cff5a6b1ec04b3085d26ddc2db8e2cc03d4b3dc81a15,2024-11-21T01:46:55.020000 +CVE-2013-0135,0,0,ff3ddecf0067b18cb58d9f301b6b4179ab6afc0ff2c7ea144bae09dd249e5911,2024-11-21T01:46:55.137000 +CVE-2013-0136,0,0,a75b530c566a4b791debc6c7620d3cab320c5e6f3d56998f5fd76e567e8b3fc5,2024-11-21T01:46:55.257000 +CVE-2013-0137,0,0,066b2118622245cdffecebc47ceafc1e3d4f2ce802021f9725499f3d6da1b586,2024-11-21T01:46:55.373000 +CVE-2013-0138,0,0,04b68ac34b9abd99939c7d8c67402752d9f541ac4a7c01614b942a389815ee05,2024-11-21T01:46:55.497000 +CVE-2013-0139,0,0,dc818922d78bfb307599b218409e5f0c2dd2be7867a7cc5e692d8c39ca938f22,2024-11-21T01:46:55.613000 +CVE-2013-0140,0,0,1c34816b68c62a5c5906037daa95dfde1fe9f8691159166abe1fbd41066ea290,2024-11-21T01:46:55.730000 +CVE-2013-0141,0,0,94cf0c4a18945f01578cfd5fdd8cfd89ef3bb0b2d5e917b3ad263172437cd6e0,2024-11-21T01:46:55.883000 +CVE-2013-0142,0,0,66523d2346a017f1022da0775fc99763ea1658c4cb989ed757e2fb056b61b80e,2024-11-21T01:46:56.013000 +CVE-2013-0143,0,0,18900c289791ab65907d621e6c0b4bfa119389db670d0142249549a77a44c32a,2024-11-21T01:46:56.133000 +CVE-2013-0144,0,0,75216646795a31ec1279cf27e86cddaea2a8aa37eac6decc60fa7c15217d888b,2024-11-21T01:46:56.260000 +CVE-2013-0145,0,0,67d4321f280ba52a5187abd8a101a227f59758269433f6f2f6a0815ad22c923d,2024-11-21T01:46:56.377000 +CVE-2013-0148,0,0,2d972e897356807c33b99c91d76c8b18b8f317d87c0e3494f1033ecd9a90f771,2024-11-21T01:46:56.493000 +CVE-2013-0149,0,0,4ee72f6a25f395b45f5d2262565cde4094af0e9fd3ee78764f891d4795420d00,2024-11-21T01:46:56.630000 +CVE-2013-0150,0,0,d385668af787d46bc4d18cc8476fce1f21066d0fd5a9721b8f9a924b926e7e18,2024-11-21T01:46:56.830000 +CVE-2013-0151,0,0,a5ee08fa3b640c65aaf61f7a46512383f34a6a38e3d6305be563731576c6cd69,2024-11-21T01:46:56.953000 +CVE-2013-0152,0,0,8bc87c68ebaede739e7a9cb8f7d2f37132b48744203e2be394ac2aab34f2eb8b,2024-11-21T01:46:57.060000 +CVE-2013-0153,0,0,f48200416f141eb95aa2ac58c68bb3fbbed53b5a17656c77595e7aed66a50e0b,2024-11-21T01:46:57.170000 +CVE-2013-0154,0,0,0cb79a173224559f225b22fc0e30591123b6879ad82823ec9a461978645d0bc6,2024-11-21T01:46:57.287000 +CVE-2013-0155,0,0,53ddd70dbc19e713ca2bdfaacda9edb6334f8f3098e43bc81c01b99f83de7d2d,2024-11-21T01:46:57.407000 +CVE-2013-0156,0,0,30c49f654e97cdeeb6d716a121772d847522073f9777c48d23621209584889d3,2024-11-21T01:46:57.547000 +CVE-2013-0157,0,0,799564fbf256420e77de2905b926659b566ecaac8fab77c962a7ae31cc11ec72,2024-11-21T01:46:57.693000 +CVE-2013-0158,0,0,bf98bcf87dbbec9d8c7ce32e3b6b068907432a53fc33ee50572a4cbba7c2e62a,2024-11-21T01:46:57.800000 CVE-2013-0159,0,0,f546ed8bd4d01388cbd5ba7a5276d9d0b789ea5335e6563d2749a2cb747d9999,2018-06-13T16:51:43.930000 -CVE-2013-0160,0,1,8f2d2d079156d08c5e161bbae3270eac35325898fc2bda1e43b00b2e1538fe52,2024-11-21T01:46:58.053000 +CVE-2013-0160,0,0,8f2d2d079156d08c5e161bbae3270eac35325898fc2bda1e43b00b2e1538fe52,2024-11-21T01:46:58.053000 CVE-2013-0161,0,0,24bffbc99e9e2f2efbda5666472bdb670508b7e4f67cdfdd24af1ee7b97b960c,2020-01-30T21:28:01.080000 -CVE-2013-0162,0,1,ce5812e8a7148a4e6e8ad494d7a5817204ad47fbad4a4cda524a7d3f95039af1,2024-11-21T01:46:58.307000 +CVE-2013-0162,0,0,ce5812e8a7148a4e6e8ad494d7a5817204ad47fbad4a4cda524a7d3f95039af1,2024-11-21T01:46:58.307000 CVE-2013-0163,0,0,2d9c66caa8bd5cb5d5eedf927c086e0724d9c69f5fe69abaa11f6335e8e5c9eb,2019-12-14T13:08:59.593000 -CVE-2013-0164,0,1,42e2ff72a1fb1a4f60cf2bf058b59453b28c2d1db44257c5d236c04e5d92d515,2024-11-21T01:46:58.533000 +CVE-2013-0164,0,0,42e2ff72a1fb1a4f60cf2bf058b59453b28c2d1db44257c5d236c04e5d92d515,2024-11-21T01:46:58.533000 CVE-2013-0165,0,0,28b5b966e871e5d84b5804a27be50ee647252066f9ab93c74ced36b3ba7c7f28,2023-02-13T00:27:25.927000 -CVE-2013-0166,0,1,cb36675460f603fadc01ed04aae7adca0c69097f4ed2532df106a1811d652a98,2024-11-21T01:46:58.750000 -CVE-2013-0167,0,1,c9df589646744980345c72415d38a8d9945ffac0bf4d24063153b207a60145a2,2024-11-21T01:46:58.917000 -CVE-2013-0168,0,1,7e0b829ca4d89d88c685287c687ab6a62ddaea41f7982842f194a8b5d4973c0c,2024-11-21T01:46:59.027000 -CVE-2013-0169,0,1,949388863140fb84959cd6c55e6c770f213496626987afceb00ce779eff0b90d,2024-11-21T01:46:59.137000 -CVE-2013-0170,0,1,833c6a6eb2f10b76a27b57cbdfb39bc0c62f6269b8afb757a8b7984648dbafe5,2024-11-21T01:46:59.357000 -CVE-2013-0171,0,1,0ebe7e60815706bce7108641cf5629b25770e31f2fa39983037351af77d2e89c,2024-11-21T01:46:59.530000 -CVE-2013-0172,0,1,bb3412612e2c2b609e559f2df3284272349bb9d85f4ceae01e359d6f38acb010,2024-11-21T01:46:59.643000 -CVE-2013-0173,0,1,3688db1d45c73d60c91cc01a9bf6580391aa93a86f5601cc67f420d60b7e9a26,2024-11-21T01:46:59.753000 -CVE-2013-0174,0,1,63ccacfe6f9396aaeb1bbbb9d23b0935a5750176c9fc2f0999aac094dc85c9dc,2024-11-21T01:46:59.867000 -CVE-2013-0175,0,1,ab5e2d97c188196a4ada17def0dd8fa912cf1bd5bd4300a64f8d678f1bfbde5c,2024-11-21T01:46:59.977000 -CVE-2013-0176,0,1,fd8954185482d68ff9797632f564edd0749436a7f0f2b6d8f9c99afbdb650c02,2024-11-21T01:47:00.100000 -CVE-2013-0177,0,1,6667a50e39f468b1c9c7861d897c58f2d97744306947267746fb34b74185cd6f,2024-11-21T01:47:00.220000 +CVE-2013-0166,0,0,cb36675460f603fadc01ed04aae7adca0c69097f4ed2532df106a1811d652a98,2024-11-21T01:46:58.750000 +CVE-2013-0167,0,0,c9df589646744980345c72415d38a8d9945ffac0bf4d24063153b207a60145a2,2024-11-21T01:46:58.917000 +CVE-2013-0168,0,0,7e0b829ca4d89d88c685287c687ab6a62ddaea41f7982842f194a8b5d4973c0c,2024-11-21T01:46:59.027000 +CVE-2013-0169,0,0,949388863140fb84959cd6c55e6c770f213496626987afceb00ce779eff0b90d,2024-11-21T01:46:59.137000 +CVE-2013-0170,0,0,833c6a6eb2f10b76a27b57cbdfb39bc0c62f6269b8afb757a8b7984648dbafe5,2024-11-21T01:46:59.357000 +CVE-2013-0171,0,0,0ebe7e60815706bce7108641cf5629b25770e31f2fa39983037351af77d2e89c,2024-11-21T01:46:59.530000 +CVE-2013-0172,0,0,bb3412612e2c2b609e559f2df3284272349bb9d85f4ceae01e359d6f38acb010,2024-11-21T01:46:59.643000 +CVE-2013-0173,0,0,3688db1d45c73d60c91cc01a9bf6580391aa93a86f5601cc67f420d60b7e9a26,2024-11-21T01:46:59.753000 +CVE-2013-0174,0,0,63ccacfe6f9396aaeb1bbbb9d23b0935a5750176c9fc2f0999aac094dc85c9dc,2024-11-21T01:46:59.867000 +CVE-2013-0175,0,0,ab5e2d97c188196a4ada17def0dd8fa912cf1bd5bd4300a64f8d678f1bfbde5c,2024-11-21T01:46:59.977000 +CVE-2013-0176,0,0,fd8954185482d68ff9797632f564edd0749436a7f0f2b6d8f9c99afbdb650c02,2024-11-21T01:47:00.100000 +CVE-2013-0177,0,0,6667a50e39f468b1c9c7861d897c58f2d97744306947267746fb34b74185cd6f,2024-11-21T01:47:00.220000 CVE-2013-0178,0,0,d49d9597fd3dbfa989d8dba50557e64d31fd3db63292bfb43c15ea60225cc83d,2019-11-06T14:52:41.177000 -CVE-2013-0179,0,1,9f15b8c77114ab01ff53aa21000db546a4a938dc49ead5ee112dc3adf158b2eb,2024-11-21T01:47:00.477000 +CVE-2013-0179,0,0,9f15b8c77114ab01ff53aa21000db546a4a938dc49ead5ee112dc3adf158b2eb,2024-11-21T01:47:00.477000 CVE-2013-0180,0,0,afa829eb756104be9ee9866b3b2fa9b3487d515854ad08cb2f475a40d08c08f9,2019-11-06T14:42:34.570000 -CVE-2013-0181,0,1,590da3e52d017394b30d6042bd6956151fa0ffdeb813f27112a54ba2412d07f1,2024-11-21T01:47:00.710000 -CVE-2013-0182,0,1,ee8e3cfbe302ac658c0fc9b660b568b20209c3eaa7026be3a92ed812d265cf85,2024-11-21T01:47:00.840000 -CVE-2013-0183,0,1,d3a1053a0b2892e26adc3728a197ab50265a71fdfb5665e8954112d385c00b06,2024-11-21T01:47:00.983000 -CVE-2013-0184,0,1,8401f9d11d283d729bdfa803d7fc23254109f4f95ea6873063a317c72d0686cb,2024-11-21T01:47:01.117000 +CVE-2013-0181,0,0,590da3e52d017394b30d6042bd6956151fa0ffdeb813f27112a54ba2412d07f1,2024-11-21T01:47:00.710000 +CVE-2013-0182,0,0,ee8e3cfbe302ac658c0fc9b660b568b20209c3eaa7026be3a92ed812d265cf85,2024-11-21T01:47:00.840000 +CVE-2013-0183,0,0,d3a1053a0b2892e26adc3728a197ab50265a71fdfb5665e8954112d385c00b06,2024-11-21T01:47:00.983000 +CVE-2013-0184,0,0,8401f9d11d283d729bdfa803d7fc23254109f4f95ea6873063a317c72d0686cb,2024-11-21T01:47:01.117000 CVE-2013-0185,0,0,df67c784b4de6fb14a2025723c9f2fe4faeb2cd18c910082f4a79487f73f8f14,2023-02-13T00:27:28.960000 CVE-2013-0186,0,0,cc103ed3c3f3a3ea4d40c6b78997d902c5dbf9a636f7d7d29305044ce439dab8,2023-02-13T00:27:29.687000 -CVE-2013-0187,0,1,039e9a596e3bc68b5787d578035be3b5156dd4d2ea6a4ed811763b1deb903711,2024-11-21T01:47:01.503000 +CVE-2013-0187,0,0,039e9a596e3bc68b5787d578035be3b5156dd4d2ea6a4ed811763b1deb903711,2024-11-21T01:47:01.503000 CVE-2013-0188,0,0,23e0042beaa57cb7fa8894a686f9f670af54df2a745f0b619933456b13558722,2023-11-07T02:13:46.260000 -CVE-2013-0189,0,1,288342eac327352ab9f2e3cbc7011c1e3f4ab36174c3de4060ad33b7b21e89cb,2024-11-21T01:47:01.633000 -CVE-2013-0190,0,1,62a3f61195c129649fa21d8ef798f5cd8742d5ea9404af9ca3262581f3250870,2024-11-21T01:47:01.780000 +CVE-2013-0189,0,0,288342eac327352ab9f2e3cbc7011c1e3f4ab36174c3de4060ad33b7b21e89cb,2024-11-21T01:47:01.633000 +CVE-2013-0190,0,0,62a3f61195c129649fa21d8ef798f5cd8742d5ea9404af9ca3262581f3250870,2024-11-21T01:47:01.780000 CVE-2013-0191,0,0,9d7d50b234cb150f9807e1dae2bccae4e51002e048699dd395830162cdc9216c,2017-08-29T01:32:59.997000 CVE-2013-0192,0,0,4a53db6f9b9fd884b970ad6e0840911bf5a16b328f6311bc72c054625db655b4,2020-02-10T18:53:34.957000 CVE-2013-0193,0,0,4b6dfe88cd89f0310e6c8cda14a5cf16ede80725e449c4f4f9bfddf4c5a39e57,2019-11-21T13:32:38.907000 CVE-2013-0194,0,0,c1f552ed3edc0fa89bd5df6c4d6d6ec4f9eba23e22a38bb51966b30bd9753093,2019-11-21T13:32:51 CVE-2013-0195,0,0,002607d3fa53530e8bff702ff8494035b6df163151285dc3d52370aa6f4974c5,2019-11-21T13:32:46.530000 CVE-2013-0196,0,0,6665afb27eb6e21c3a2ff3300cf9f28842db64e975accbb35e4df312c26e86ca,2023-02-13T00:27:42.517000 -CVE-2013-0197,0,1,a10941f2b5361b00505d3b53b5b53c0d15c57e01fb36fa7e5a1b0e19a61f55aa,2024-11-21T01:47:02.657000 -CVE-2013-0198,0,1,6022a883517cfc66b2ec5314cf37d8568adadd28cafcf16b68d04b24fb73d7c2,2024-11-21T01:47:02.777000 +CVE-2013-0197,0,0,a10941f2b5361b00505d3b53b5b53c0d15c57e01fb36fa7e5a1b0e19a61f55aa,2024-11-21T01:47:02.657000 +CVE-2013-0198,0,0,6022a883517cfc66b2ec5314cf37d8568adadd28cafcf16b68d04b24fb73d7c2,2024-11-21T01:47:02.777000 CVE-2013-0199,0,0,6bf05c5f1ea6b93e879db39dcf30b8c63661d7c2c31b712bda277f3e13c4c910,2017-08-29T01:33:00.057000 -CVE-2013-0200,0,1,6f751c5c6b4a36abc9c93a94882d0caccb265f27b98b7a6625b8bc2a1a5a2109,2024-11-21T01:47:03.003000 -CVE-2013-0201,0,1,e724938c1ddd0e0df96bf278e7ae7e8cde9e979481d7894158ecf1cac03b0959,2024-11-21T01:47:03.130000 +CVE-2013-0200,0,0,6f751c5c6b4a36abc9c93a94882d0caccb265f27b98b7a6625b8bc2a1a5a2109,2024-11-21T01:47:03.003000 +CVE-2013-0201,0,0,e724938c1ddd0e0df96bf278e7ae7e8cde9e979481d7894158ecf1cac03b0959,2024-11-21T01:47:03.130000 CVE-2013-0202,0,0,ba76aca2ae8541d4a35bdc66f6bd68997b31b58f81a47e92cbdaaa9b0cc0285a,2019-12-18T19:39:05.817000 CVE-2013-0203,0,0,ddfc87a92af100ef826ff02d1002ba657b306e654c9033ec6b53ee69f013b5d3,2019-12-02T20:02:20.903000 CVE-2013-0204,0,0,84933a5bd5ff9ebeacd484951889bbb4983ac37bdd16b0c7361611d473186a73,2014-06-04T18:01:15.550000 -CVE-2013-0205,0,1,cdc96b118d229afb4d2d10dc18d6c400712404b20f86bb6250028e35169ca6cd,2024-11-21T01:47:03.610000 -CVE-2013-0206,0,1,b53d01c52747eff3168076f35f8018c2f14a30e652bf8f4ee44ef2ad78e68821,2024-11-21T01:47:03.733000 -CVE-2013-0207,0,1,6db744c112a941b1ff3e0bedb963695f4b9144cef230210581a1b453dcaecb15,2024-11-21T01:47:03.870000 -CVE-2013-0208,0,1,06b770d94cd6035d9a51328e218c7e29e7579ff90b383e29308ea1577c7592d4,2024-11-21T01:47:03.997000 -CVE-2013-0209,0,1,4f4da52edb1e961ed119951efe03575f661d7e74a00091f95347c879e74c2414,2024-11-21T01:47:04.113000 -CVE-2013-0210,0,1,bd33b07bfb73d702c238700517f1a5f4189e7e03c23e4b84b466da5196b47995,2024-11-21T01:47:04.233000 -CVE-2013-0211,0,1,708f3d258bcc136a6d7082775eb13b723299110849e6218b57365a9a6d259b9f,2024-11-21T01:47:04.337000 -CVE-2013-0212,0,1,78335f587f5ca8e8abac5490e743197970ab75d3448c0df5c4a43f5e5abe64c1,2024-11-21T01:47:04.480000 -CVE-2013-0213,0,1,90e99d5385d57995fa34eb249ed3f692757571717ec532ba03da92ca908cd5fa,2024-11-21T01:47:04.603000 -CVE-2013-0214,0,1,69489756298b6a468e0a35bd8f49855de1c653e9d3633c1d216e49e87d099e66,2024-11-21T01:47:04.767000 -CVE-2013-0215,0,1,47152d03644278e24fa4924117536b1dc63e37fb14f368e2ecc4bb6241b0340d,2024-11-21T01:47:04.910000 -CVE-2013-0216,0,1,72ce7cf2ae60d736662c05a64ac81b72f4e35625c6294d41feb1e5557d51e0fb,2024-11-21T01:47:05.027000 -CVE-2013-0217,0,1,b39027e46c68b261c5a4feb98093966cffcadab1da682dfa680915264fe05e9d,2024-11-21T01:47:05.177000 -CVE-2013-0218,0,1,271aac4ba6ccb5264ef2e61e63b9c81c3198771107e542cfe616cc62154ff521,2024-11-21T01:47:05.327000 -CVE-2013-0219,0,1,eca6eeaacdd97b87f7b18124c3df419fff54d73bd283122ce5cab1eabdab2516,2024-11-21T01:47:05.450000 -CVE-2013-0220,0,1,c67daf11f7e0d4c21da05bc79be66bdce812dc43f3e7b275dde7d808dfcd6b14,2024-11-21T01:47:05.613000 -CVE-2013-0221,0,1,90cb33a96a0c8ea1c256371ff17107d29a3d463eaad8d2346eeea148a4eb3300,2024-11-21T01:47:05.760000 -CVE-2013-0222,0,1,a1d45fe39e1090f7d982a91aa9c639f3ebc00bd39f11a684f7e6a5216c3d82b0,2024-11-21T01:47:05.893000 -CVE-2013-0223,0,1,f557a37ffb44d2a0b352d6f4f3b8e21f0cb47869554dee807d24907d2a6da8ed,2024-11-21T01:47:06.020000 -CVE-2013-0224,0,1,6a233cac7897b6a9dd0efa6bdf4d31dbe854efdbf453f15d2454c376d958642e,2024-11-21T01:47:06.170000 -CVE-2013-0225,0,1,849620b673fdf59b429701129719c7fd556624b539223389fe3140a400d38304,2024-11-21T01:47:06.320000 -CVE-2013-0226,0,1,8955ef3d59b344ac6f7c737bb9f433d0d59616911afa61650532cf13cebd954f,2024-11-21T01:47:06.440000 -CVE-2013-0227,0,1,dfb0432da031862846df39c398f3c6357ea9e32df92e319dce88159c22dd3ab2,2024-11-21T01:47:06.547000 -CVE-2013-0228,0,1,ed4aac7afa6ba9a203390ebff9fa2c8fc2c7ae6c5f45da3fa5fa546deee98358,2024-11-21T01:47:06.657000 -CVE-2013-0229,0,1,da4dc9e40077e2122ae23998ea3a5ead53f34d55b613d09c4017797fe9498d54,2024-11-21T01:47:06.803000 -CVE-2013-0230,0,1,ac12df4bcb3dbd0be125e8097255729ec9ef536d5d48012f45fce84a725c47fb,2024-11-21T01:47:06.913000 -CVE-2013-0231,0,1,76647e823bfca68a295cab32cb0c1a2e08d2e6cf2e3d338cb6c831ee005fd095,2024-11-21T01:47:07.030000 -CVE-2013-0232,0,1,1b5987527c6c668581e73a98be8ce9366ed4e37ff6dfd8961d6080ba72613d6b,2024-11-21T01:47:07.150000 -CVE-2013-0233,0,1,41f9292a070ae06e68406b050cb914043737822518e3a162b839f73856879d0e,2024-11-21T01:47:07.267000 -CVE-2013-0234,0,1,a0317b0db9415b6734aa1fe91cfc31cc822e843d108d5bb8908f6e144eba4756,2024-11-21T01:47:07.400000 -CVE-2013-0235,0,1,06ba67a6ab061cb40cd0aceee3a73d8ef7632337ff0819e0bea16f591f261f67,2024-11-21T01:47:07.540000 -CVE-2013-0236,0,1,728ad9b3f5d9a58cecddb431b3717e70a3747407dbeb40e5e939962d7c6c9c66,2024-11-21T01:47:07.670000 -CVE-2013-0237,0,1,7cf7cf91de2f0fec3a1e26195321077693d383e7d2e15b071c58a8dceeebb96f,2024-11-21T01:47:07.803000 -CVE-2013-0238,0,1,e059529a2515e07d7004edca18802c0b0bf8f1ad3c6d14cf44bea486e1b4a1ae,2024-11-21T01:47:07.943000 -CVE-2013-0239,0,1,40eb6c42c46df52aef5a8e04af80c542fd9405bc6842e56196a23cec4f131c05,2024-11-21T01:47:08.083000 -CVE-2013-0240,0,1,b81abd5893798823a3d010371ff09d014e4ef97453f5e2fa112bbe23078e156b,2024-11-21T01:47:08.230000 -CVE-2013-0241,0,1,0a72d8de2a197ccc43ae5cc5b03d1a701960eb2b26c2b969b2f12947ecaa1a82,2024-11-21T01:47:08.360000 -CVE-2013-0242,0,1,4743649aef32ebe317b839d94a975437de3dba6ec8805229f687d93328b428d0,2024-11-21T01:47:08.480000 +CVE-2013-0205,0,0,cdc96b118d229afb4d2d10dc18d6c400712404b20f86bb6250028e35169ca6cd,2024-11-21T01:47:03.610000 +CVE-2013-0206,0,0,b53d01c52747eff3168076f35f8018c2f14a30e652bf8f4ee44ef2ad78e68821,2024-11-21T01:47:03.733000 +CVE-2013-0207,0,0,6db744c112a941b1ff3e0bedb963695f4b9144cef230210581a1b453dcaecb15,2024-11-21T01:47:03.870000 +CVE-2013-0208,0,0,06b770d94cd6035d9a51328e218c7e29e7579ff90b383e29308ea1577c7592d4,2024-11-21T01:47:03.997000 +CVE-2013-0209,0,0,4f4da52edb1e961ed119951efe03575f661d7e74a00091f95347c879e74c2414,2024-11-21T01:47:04.113000 +CVE-2013-0210,0,0,bd33b07bfb73d702c238700517f1a5f4189e7e03c23e4b84b466da5196b47995,2024-11-21T01:47:04.233000 +CVE-2013-0211,0,0,708f3d258bcc136a6d7082775eb13b723299110849e6218b57365a9a6d259b9f,2024-11-21T01:47:04.337000 +CVE-2013-0212,0,0,78335f587f5ca8e8abac5490e743197970ab75d3448c0df5c4a43f5e5abe64c1,2024-11-21T01:47:04.480000 +CVE-2013-0213,0,0,90e99d5385d57995fa34eb249ed3f692757571717ec532ba03da92ca908cd5fa,2024-11-21T01:47:04.603000 +CVE-2013-0214,0,0,69489756298b6a468e0a35bd8f49855de1c653e9d3633c1d216e49e87d099e66,2024-11-21T01:47:04.767000 +CVE-2013-0215,0,0,47152d03644278e24fa4924117536b1dc63e37fb14f368e2ecc4bb6241b0340d,2024-11-21T01:47:04.910000 +CVE-2013-0216,0,0,72ce7cf2ae60d736662c05a64ac81b72f4e35625c6294d41feb1e5557d51e0fb,2024-11-21T01:47:05.027000 +CVE-2013-0217,0,0,b39027e46c68b261c5a4feb98093966cffcadab1da682dfa680915264fe05e9d,2024-11-21T01:47:05.177000 +CVE-2013-0218,0,0,271aac4ba6ccb5264ef2e61e63b9c81c3198771107e542cfe616cc62154ff521,2024-11-21T01:47:05.327000 +CVE-2013-0219,0,0,eca6eeaacdd97b87f7b18124c3df419fff54d73bd283122ce5cab1eabdab2516,2024-11-21T01:47:05.450000 +CVE-2013-0220,0,0,c67daf11f7e0d4c21da05bc79be66bdce812dc43f3e7b275dde7d808dfcd6b14,2024-11-21T01:47:05.613000 +CVE-2013-0221,0,0,90cb33a96a0c8ea1c256371ff17107d29a3d463eaad8d2346eeea148a4eb3300,2024-11-21T01:47:05.760000 +CVE-2013-0222,0,0,a1d45fe39e1090f7d982a91aa9c639f3ebc00bd39f11a684f7e6a5216c3d82b0,2024-11-21T01:47:05.893000 +CVE-2013-0223,0,0,f557a37ffb44d2a0b352d6f4f3b8e21f0cb47869554dee807d24907d2a6da8ed,2024-11-21T01:47:06.020000 +CVE-2013-0224,0,0,6a233cac7897b6a9dd0efa6bdf4d31dbe854efdbf453f15d2454c376d958642e,2024-11-21T01:47:06.170000 +CVE-2013-0225,0,0,849620b673fdf59b429701129719c7fd556624b539223389fe3140a400d38304,2024-11-21T01:47:06.320000 +CVE-2013-0226,0,0,8955ef3d59b344ac6f7c737bb9f433d0d59616911afa61650532cf13cebd954f,2024-11-21T01:47:06.440000 +CVE-2013-0227,0,0,dfb0432da031862846df39c398f3c6357ea9e32df92e319dce88159c22dd3ab2,2024-11-21T01:47:06.547000 +CVE-2013-0228,0,0,ed4aac7afa6ba9a203390ebff9fa2c8fc2c7ae6c5f45da3fa5fa546deee98358,2024-11-21T01:47:06.657000 +CVE-2013-0229,0,0,da4dc9e40077e2122ae23998ea3a5ead53f34d55b613d09c4017797fe9498d54,2024-11-21T01:47:06.803000 +CVE-2013-0230,0,0,ac12df4bcb3dbd0be125e8097255729ec9ef536d5d48012f45fce84a725c47fb,2024-11-21T01:47:06.913000 +CVE-2013-0231,0,0,76647e823bfca68a295cab32cb0c1a2e08d2e6cf2e3d338cb6c831ee005fd095,2024-11-21T01:47:07.030000 +CVE-2013-0232,0,0,1b5987527c6c668581e73a98be8ce9366ed4e37ff6dfd8961d6080ba72613d6b,2024-11-21T01:47:07.150000 +CVE-2013-0233,0,0,41f9292a070ae06e68406b050cb914043737822518e3a162b839f73856879d0e,2024-11-21T01:47:07.267000 +CVE-2013-0234,0,0,a0317b0db9415b6734aa1fe91cfc31cc822e843d108d5bb8908f6e144eba4756,2024-11-21T01:47:07.400000 +CVE-2013-0235,0,0,06ba67a6ab061cb40cd0aceee3a73d8ef7632337ff0819e0bea16f591f261f67,2024-11-21T01:47:07.540000 +CVE-2013-0236,0,0,728ad9b3f5d9a58cecddb431b3717e70a3747407dbeb40e5e939962d7c6c9c66,2024-11-21T01:47:07.670000 +CVE-2013-0237,0,0,7cf7cf91de2f0fec3a1e26195321077693d383e7d2e15b071c58a8dceeebb96f,2024-11-21T01:47:07.803000 +CVE-2013-0238,0,0,e059529a2515e07d7004edca18802c0b0bf8f1ad3c6d14cf44bea486e1b4a1ae,2024-11-21T01:47:07.943000 +CVE-2013-0239,0,0,40eb6c42c46df52aef5a8e04af80c542fd9405bc6842e56196a23cec4f131c05,2024-11-21T01:47:08.083000 +CVE-2013-0240,0,0,b81abd5893798823a3d010371ff09d014e4ef97453f5e2fa112bbe23078e156b,2024-11-21T01:47:08.230000 +CVE-2013-0241,0,0,0a72d8de2a197ccc43ae5cc5b03d1a701960eb2b26c2b969b2f12947ecaa1a82,2024-11-21T01:47:08.360000 +CVE-2013-0242,0,0,4743649aef32ebe317b839d94a975437de3dba6ec8805229f687d93328b428d0,2024-11-21T01:47:08.480000 CVE-2013-0243,0,0,b61e37c33821a71bc0e7230ea4013caeaee899dddd9530b25ba86ce3adffc254,2019-12-17T21:59:00.563000 -CVE-2013-0244,0,1,fc7022769678e44373746c30ec5fbe9847f2e925ab322d95466d735642441fcb,2024-11-21T01:47:08.730000 -CVE-2013-0245,0,1,d88ab5f6793e3880e2cb676f11ad7d02ee030ca9e44aff9677d3bfeebfe50129,2024-11-21T01:47:08.873000 -CVE-2013-0246,0,1,6f7049117e24d184e1ed0f9b4f3b49bf918ba3037ce9188ae09e5586e27d63f1,2024-11-21T01:47:09 -CVE-2013-0247,0,1,fe837c37bfa51e816c154e4096721acf7fd736a7f5fe837681b6f37bd16a2988,2024-11-21T01:47:09.130000 -CVE-2013-0248,0,1,d4f8bff8f26a303bac63a37c2c221a59913f7f179713c74c9e28ec8b045db8ba,2024-11-21T01:47:09.253000 -CVE-2013-0249,0,1,74c462a951c9f305d68819fb680b334525060dfb74bb99f6867ff6cdaaf6b5b7,2024-11-21T01:47:09.393000 +CVE-2013-0244,0,0,fc7022769678e44373746c30ec5fbe9847f2e925ab322d95466d735642441fcb,2024-11-21T01:47:08.730000 +CVE-2013-0245,0,0,d88ab5f6793e3880e2cb676f11ad7d02ee030ca9e44aff9677d3bfeebfe50129,2024-11-21T01:47:08.873000 +CVE-2013-0246,0,0,6f7049117e24d184e1ed0f9b4f3b49bf918ba3037ce9188ae09e5586e27d63f1,2024-11-21T01:47:09 +CVE-2013-0247,0,0,fe837c37bfa51e816c154e4096721acf7fd736a7f5fe837681b6f37bd16a2988,2024-11-21T01:47:09.130000 +CVE-2013-0248,0,0,d4f8bff8f26a303bac63a37c2c221a59913f7f179713c74c9e28ec8b045db8ba,2024-11-21T01:47:09.253000 +CVE-2013-0249,0,0,74c462a951c9f305d68819fb680b334525060dfb74bb99f6867ff6cdaaf6b5b7,2024-11-21T01:47:09.393000 CVE-2013-0250,0,0,d72655c86428de62a9ca35c60c3a9f81435d66d7c9333538113fbbc022534541,2014-06-09T13:34:15.860000 -CVE-2013-0251,0,1,c65a04d174bc684626c43629d101778e2abe167852c228cee1c7f63f64e35b56,2024-11-21T01:47:09.667000 -CVE-2013-0252,0,1,d842a1d954e2cd1c1244e78fd7901e49affb137672dc8bd166f305f97626bfb9,2024-11-21T01:47:09.780000 -CVE-2013-0253,0,1,5b43a2eb912f15f36541c9de6c4c4f47c74ea96e8841e34c62737c3b4e7cbdfc,2024-11-21T01:47:09.897000 -CVE-2013-0254,0,1,de6ecc39f1931278e940811227133d0e2b03955d4411ad314efeb48044caaf16,2024-11-21T01:47:10.020000 -CVE-2013-0255,0,1,60becd62321c71a8b593a02ffd9e3ecf544c66290cef65bb3908a3d5f191827c,2024-11-21T01:47:10.160000 -CVE-2013-0256,0,1,e13e9148ace87b971becb478f78b1fc64b7a2707c3e6d9263ab4b18f7dd46033,2024-11-21T01:47:10.307000 -CVE-2013-0257,0,1,871b9fe9e48baec64d03292a2708f29e2722978e4bab1b551d776e158daa072c,2024-11-21T01:47:10.443000 -CVE-2013-0258,0,1,d1469b6b0c31582fad6a430f01e41203109930af189776eeabac2c92478ce750,2024-11-21T01:47:10.570000 -CVE-2013-0259,0,1,0fc10f97d63ac243463392f89ffdc5fbd1c5a7745d30dc31dd272348674c5507,2024-11-21T01:47:10.677000 -CVE-2013-0260,0,1,746e7673d6beb6eac0e75c7de4bcf13e4508d4c805548b4363862744c13ccc53,2024-11-21T01:47:10.800000 -CVE-2013-0261,0,1,0540d09c36e554e0f0937aea4af1b3b5ea8e0f77bfecb5f226cb85c0dbf024c1,2024-11-21T01:47:10.907000 -CVE-2013-0262,0,1,3ef12629226605afbc185cb8656c1f12f2b1ad21f5458ef77aa417b72f370200,2024-11-21T01:47:11.017000 -CVE-2013-0263,0,1,0f0f5d1f73272a648a5f3b3e3a0ba410955b72dd80c0e5be01a67ecc6299b363,2024-11-21T01:47:11.133000 +CVE-2013-0251,0,0,c65a04d174bc684626c43629d101778e2abe167852c228cee1c7f63f64e35b56,2024-11-21T01:47:09.667000 +CVE-2013-0252,0,0,d842a1d954e2cd1c1244e78fd7901e49affb137672dc8bd166f305f97626bfb9,2024-11-21T01:47:09.780000 +CVE-2013-0253,0,0,5b43a2eb912f15f36541c9de6c4c4f47c74ea96e8841e34c62737c3b4e7cbdfc,2024-11-21T01:47:09.897000 +CVE-2013-0254,0,0,de6ecc39f1931278e940811227133d0e2b03955d4411ad314efeb48044caaf16,2024-11-21T01:47:10.020000 +CVE-2013-0255,0,0,60becd62321c71a8b593a02ffd9e3ecf544c66290cef65bb3908a3d5f191827c,2024-11-21T01:47:10.160000 +CVE-2013-0256,0,0,e13e9148ace87b971becb478f78b1fc64b7a2707c3e6d9263ab4b18f7dd46033,2024-11-21T01:47:10.307000 +CVE-2013-0257,0,0,871b9fe9e48baec64d03292a2708f29e2722978e4bab1b551d776e158daa072c,2024-11-21T01:47:10.443000 +CVE-2013-0258,0,0,d1469b6b0c31582fad6a430f01e41203109930af189776eeabac2c92478ce750,2024-11-21T01:47:10.570000 +CVE-2013-0259,0,0,0fc10f97d63ac243463392f89ffdc5fbd1c5a7745d30dc31dd272348674c5507,2024-11-21T01:47:10.677000 +CVE-2013-0260,0,0,746e7673d6beb6eac0e75c7de4bcf13e4508d4c805548b4363862744c13ccc53,2024-11-21T01:47:10.800000 +CVE-2013-0261,0,0,0540d09c36e554e0f0937aea4af1b3b5ea8e0f77bfecb5f226cb85c0dbf024c1,2024-11-21T01:47:10.907000 +CVE-2013-0262,0,0,3ef12629226605afbc185cb8656c1f12f2b1ad21f5458ef77aa417b72f370200,2024-11-21T01:47:11.017000 +CVE-2013-0263,0,0,0f0f5d1f73272a648a5f3b3e3a0ba410955b72dd80c0e5be01a67ecc6299b363,2024-11-21T01:47:11.133000 CVE-2013-0264,0,0,b6c74db9394d8e1497fa68e1869631c0e6ffe653011a01559e9c9eed2f0e5780,2020-01-10T15:33:22.100000 -CVE-2013-0265,0,1,067b8603af6b846664856c57ff2832e505ffd1a47be22f9ef8662117853c9a15,2024-11-21T01:47:11.457000 -CVE-2013-0266,0,1,59ad987700179e9f176438ad5ede37e9e81a3f8f4000691284ceb33734b0495b,2024-11-21T01:47:11.577000 +CVE-2013-0265,0,0,067b8603af6b846664856c57ff2832e505ffd1a47be22f9ef8662117853c9a15,2024-11-21T01:47:11.457000 +CVE-2013-0266,0,0,59ad987700179e9f176438ad5ede37e9e81a3f8f4000691284ceb33734b0495b,2024-11-21T01:47:11.577000 CVE-2013-0267,0,0,60ef46e9cfb0b7321d641a12e7e0f3042cb59b00bfbbbea40cedb0438d91a859,2023-11-07T02:13:47.313000 -CVE-2013-0268,0,1,a372a459067538a801f6a648c54daa4255ee722c2a62e7d33d43a5364adba367,2024-11-21T01:47:11.820000 -CVE-2013-0269,0,1,38a1cbd905388581ad445d4a4b216f184381dbbec70568e4e6c8897e7ab078fa,2024-11-21T01:47:11.957000 -CVE-2013-0270,0,1,e8dc0361c2c11511ee8be24ddc680cefc8cf942325b8aa3b3f7217427c99ecd3,2024-11-21T01:47:12.100000 -CVE-2013-0271,0,1,525a0c60781d08fbeb2ccf9dd92030194cce65d78d63162ad639388039ac534a,2024-11-21T01:47:12.220000 -CVE-2013-0272,0,1,70d09cc8ec3c02308dd8c4fdf54261e7994c5765db1acf804deea319f97755d4,2024-11-21T01:47:12.347000 -CVE-2013-0273,0,1,c8587391ef2ce6cea678bed0100605500d75e669f703bb96f79ca3fd8737f99d,2024-11-21T01:47:12.477000 -CVE-2013-0274,0,1,8cb7e7464fc9c1ceff4033f8edbf07e3fa79f707e626e151322120f78cbbbd3a,2024-11-21T01:47:12.600000 -CVE-2013-0275,0,1,a135a4bfff458030a850a24277f0b3f6690976e54ffa19364482f6e5f62b41e9,2024-11-21T01:47:12.730000 -CVE-2013-0276,0,1,1cc334366b2a5ede2004bc26b3ef2d50489d387e2b5d654b829bc20bc96981b2,2024-11-21T01:47:12.863000 -CVE-2013-0277,0,1,ef915fb31ce719defb4f001035c5dc6a435416acdae4e147b50114ccef316253,2024-11-21T01:47:13.010000 +CVE-2013-0268,0,0,a372a459067538a801f6a648c54daa4255ee722c2a62e7d33d43a5364adba367,2024-11-21T01:47:11.820000 +CVE-2013-0269,0,0,38a1cbd905388581ad445d4a4b216f184381dbbec70568e4e6c8897e7ab078fa,2024-11-21T01:47:11.957000 +CVE-2013-0270,0,0,e8dc0361c2c11511ee8be24ddc680cefc8cf942325b8aa3b3f7217427c99ecd3,2024-11-21T01:47:12.100000 +CVE-2013-0271,0,0,525a0c60781d08fbeb2ccf9dd92030194cce65d78d63162ad639388039ac534a,2024-11-21T01:47:12.220000 +CVE-2013-0272,0,0,70d09cc8ec3c02308dd8c4fdf54261e7994c5765db1acf804deea319f97755d4,2024-11-21T01:47:12.347000 +CVE-2013-0273,0,0,c8587391ef2ce6cea678bed0100605500d75e669f703bb96f79ca3fd8737f99d,2024-11-21T01:47:12.477000 +CVE-2013-0274,0,0,8cb7e7464fc9c1ceff4033f8edbf07e3fa79f707e626e151322120f78cbbbd3a,2024-11-21T01:47:12.600000 +CVE-2013-0275,0,0,a135a4bfff458030a850a24277f0b3f6690976e54ffa19364482f6e5f62b41e9,2024-11-21T01:47:12.730000 +CVE-2013-0276,0,0,1cc334366b2a5ede2004bc26b3ef2d50489d387e2b5d654b829bc20bc96981b2,2024-11-21T01:47:12.863000 +CVE-2013-0277,0,0,ef915fb31ce719defb4f001035c5dc6a435416acdae4e147b50114ccef316253,2024-11-21T01:47:13.010000 CVE-2013-0278,0,0,795a0b8c7825ecf84429e8cf11268253fc32645d6ce4da0391cf2c5e2a7075de,2023-11-07T02:13:47.480000 CVE-2013-0279,0,0,9eb4b1ea675d14fc6a5da49b986f3f66dc7f2ab19dda6cc3824a4e2e80127f38,2023-11-07T02:13:47.703000 CVE-2013-0280,0,0,9bd1dea3610d30cb6ed9699e0e04f8304c6597812a423be6b291438c3ed0599d,2023-11-07T02:13:47.923000 -CVE-2013-0281,0,1,19677cdf32bd50482b6a2df355350eadb7a0bb0386f808b0d7149bdb2c845eac,2024-11-21T01:47:13.207000 -CVE-2013-0282,0,1,475999ccf638dd5d39e94f5c0d74b3df2326b8efdfeec41f300f35cca626c1c5,2024-11-21T01:47:13.337000 +CVE-2013-0281,0,0,19677cdf32bd50482b6a2df355350eadb7a0bb0386f808b0d7149bdb2c845eac,2024-11-21T01:47:13.207000 +CVE-2013-0282,0,0,475999ccf638dd5d39e94f5c0d74b3df2326b8efdfeec41f300f35cca626c1c5,2024-11-21T01:47:13.337000 CVE-2013-0283,0,0,93934dc92ec328f71a3a70c4ac1492861781eee8dec47f641d72bc014eaac9c0,2019-12-09T19:47:32.190000 -CVE-2013-0284,0,1,863904e92df53e6100149db95616a5732a8f3b561d616c9dfaaec35e27d1e526,2024-11-21T01:47:13.563000 -CVE-2013-0285,0,1,6d32d859622114d72a1c64717fea6bb3c7e090285da8d7692e6364d5ca0617db,2024-11-21T01:47:13.690000 +CVE-2013-0284,0,0,863904e92df53e6100149db95616a5732a8f3b561d616c9dfaaec35e27d1e526,2024-11-21T01:47:13.563000 +CVE-2013-0285,0,0,6d32d859622114d72a1c64717fea6bb3c7e090285da8d7692e6364d5ca0617db,2024-11-21T01:47:13.690000 CVE-2013-0286,0,0,693ab416a05056f1ee28b2fe05d23c6c3073fdc91b1b1785179e489364125676,2020-01-29T14:15:58.500000 -CVE-2013-0287,0,1,95d961fde1e17336bbc990dd70d72d57c6bdeeb782a97b196ebf5700d7eae785,2024-11-21T01:47:13.913000 -CVE-2013-0288,0,1,71d5231686149223538bf3b5c7f9dabc03865a4489154982ead1506b58e4c7ec,2024-11-21T01:47:14.050000 -CVE-2013-0289,0,1,59856c73a90b0a4384426a5d44512a0f631cdaf36adc3a8d26a9338423ce4e43,2024-11-21T01:47:14.190000 -CVE-2013-0290,0,1,cc02613667b9778d59592e667c760d496b100dea6c9f72bf73460606094dd256,2024-11-21T01:47:14.323000 +CVE-2013-0287,0,0,95d961fde1e17336bbc990dd70d72d57c6bdeeb782a97b196ebf5700d7eae785,2024-11-21T01:47:13.913000 +CVE-2013-0288,0,0,71d5231686149223538bf3b5c7f9dabc03865a4489154982ead1506b58e4c7ec,2024-11-21T01:47:14.050000 +CVE-2013-0289,0,0,59856c73a90b0a4384426a5d44512a0f631cdaf36adc3a8d26a9338423ce4e43,2024-11-21T01:47:14.190000 +CVE-2013-0290,0,0,cc02613667b9778d59592e667c760d496b100dea6c9f72bf73460606094dd256,2024-11-21T01:47:14.323000 CVE-2013-0291,0,0,ba303aac401933181ad84ccd459d7d974e94e50c572e7ab1102a9877b5ca24c7,2020-02-06T21:03:15.907000 -CVE-2013-0292,0,1,25e068abd8eeda242ceefa2a19d8d9ff3e840dc5269597485b09e644af48a3e0,2024-11-21T01:47:14.630000 +CVE-2013-0292,0,0,25e068abd8eeda242ceefa2a19d8d9ff3e840dc5269597485b09e644af48a3e0,2024-11-21T01:47:14.630000 CVE-2013-0293,0,0,c4ff33cd8f7e3b04c3d13096a2e5823aec16b88c4fd8f29a944071194df01119,2019-12-13T15:07:06.267000 CVE-2013-0294,0,0,5024a4a1b07cec9d116a7f360428bae1ad225c812b137aac0a1d216bf2144633,2020-01-31T19:07:21.020000 CVE-2013-0295,0,0,9f7a8f2d95a090cd9f678938b2d853a19ba43c162e41661737f305fd134529c9,2023-11-07T02:13:48.280000 -CVE-2013-0296,0,1,aa1cc9316622ca269697ff2aac0136546a85f888416fe9e9547b40ad2b357556,2024-11-21T01:47:15.053000 -CVE-2013-0297,0,1,969b0c93fdf69cf8d92bed2e69c817f89bf87cb798a0d25caab273d7f1e9121f,2024-11-21T01:47:15.167000 -CVE-2013-0298,0,1,b28b620c99825e205f889f69e6a63393bc3fa6410cc4fbfda89785e89f6396c1,2024-11-21T01:47:15.290000 -CVE-2013-0299,0,1,2c4bdd551e79a1ad442e27d305106bd2aa73c73e1d45e853e1c971de85b7d920,2024-11-21T01:47:15.417000 -CVE-2013-0300,0,1,79360b5ca689a0a7c44303bd008aca959df5668a26c4108858e8cc95e938d794,2024-11-21T01:47:15.530000 -CVE-2013-0301,0,1,5ddb2c2b53f7d635f289e7a4a43631be584f2d556a4ca051db6bd3962247d186,2024-11-21T01:47:15.647000 +CVE-2013-0296,0,0,aa1cc9316622ca269697ff2aac0136546a85f888416fe9e9547b40ad2b357556,2024-11-21T01:47:15.053000 +CVE-2013-0297,0,0,969b0c93fdf69cf8d92bed2e69c817f89bf87cb798a0d25caab273d7f1e9121f,2024-11-21T01:47:15.167000 +CVE-2013-0298,0,0,b28b620c99825e205f889f69e6a63393bc3fa6410cc4fbfda89785e89f6396c1,2024-11-21T01:47:15.290000 +CVE-2013-0299,0,0,2c4bdd551e79a1ad442e27d305106bd2aa73c73e1d45e853e1c971de85b7d920,2024-11-21T01:47:15.417000 +CVE-2013-0300,0,0,79360b5ca689a0a7c44303bd008aca959df5668a26c4108858e8cc95e938d794,2024-11-21T01:47:15.530000 +CVE-2013-0301,0,0,5ddb2c2b53f7d635f289e7a4a43631be584f2d556a4ca051db6bd3962247d186,2024-11-21T01:47:15.647000 CVE-2013-0302,0,0,ae621dbd1c24bc6d16de8f71bf57653348f4d366fdca6daec560fe0122e86329,2014-06-24T15:49:52.070000 -CVE-2013-0303,0,1,3686a1267d97c9073a03f3a05f6d65624e33eaec21aae002c8c9ae3452ce86be,2024-11-21T01:47:15.883000 +CVE-2013-0303,0,0,3686a1267d97c9073a03f3a05f6d65624e33eaec21aae002c8c9ae3452ce86be,2024-11-21T01:47:15.883000 CVE-2013-0304,0,0,da9e31d7bda7bd2f8aae44b0ed073792813a920dfbba583d4025ee6eb7fb08ad,2014-06-05T17:28:48.347000 -CVE-2013-0305,0,1,edde5ab0031e6a1f861788df8ab6ce865533f812c7b03ce8f0f5b0856302276d,2024-11-21T01:47:16.100000 -CVE-2013-0306,0,1,c2c56532a42bce33f9ec745f50887fbbf00a62e697d383a7a89772b88932674d,2024-11-21T01:47:16.217000 -CVE-2013-0307,0,1,5acfd3dd89a3ca44bb1425145d90acef51872dc90aa9cbad96069900ee6da6d7,2024-11-21T01:47:16.363000 -CVE-2013-0308,0,1,55ad3ac730ee4ad9aff96a6807936e794d98f53848d22714669b84b4d4e7b372,2024-11-21T01:47:16.487000 -CVE-2013-0309,0,1,a5bd8365c7e8cb974b0702312122287092ec999c0fc1feb6cdd84f6c7ad62e48,2024-11-21T01:47:16.630000 -CVE-2013-0310,0,1,7a46b965f6d803d90ec64192fccb4ff42d068f299b6b503d5b2981d65d94f4d0,2024-11-21T01:47:16.767000 -CVE-2013-0311,0,1,ba3e66b9d27f1e22535948551d349801d0ecf285728c9033d5f0738991962d1b,2024-11-21T01:47:16.927000 -CVE-2013-0312,0,1,a8cd5af865cd4e6b47038f4fcea68f8468e9390298591cb8402dbbf3ebff1aa0,2024-11-21T01:47:17.077000 -CVE-2013-0313,0,1,122f9d0cdae6fec60447a968151770f4aacfb5a143c25ae8c02f21528c76849c,2024-11-21T01:47:17.200000 -CVE-2013-0314,0,1,d0559bd70a11dc19fda69878a27671f951fcb791efb12da0c0a305a4c0eec672,2024-11-21T01:47:17.343000 -CVE-2013-0315,0,1,376f04af605c5d5356d15bfecc0b55d056ef9f647c56eaccf61117255fef9be2,2024-11-21T01:47:17.447000 -CVE-2013-0316,0,1,01373e7543d54a8addbce3d02628d66998e99718b8972adf96333ba686a702ac,2024-11-21T01:47:17.557000 -CVE-2013-0317,0,1,14ec0b93983fd42688d218bd0484a02f1a31d1fdc4bd74c2d50e856c939b1f26,2024-11-21T01:47:17.677000 -CVE-2013-0318,0,1,d40adb4a847bb869c20ad291b19e9f588f534bd6d07d0a42f8ac2227b55ed6fb,2024-11-21T01:47:17.800000 -CVE-2013-0319,0,1,a4dd281598b0d43259248c0bbf81d9c6424407be4d87e869f0b08c53d4b4b3b3,2024-11-21T01:47:17.910000 -CVE-2013-0320,0,1,ed427feb7fe99353184ae4922200c8db956d76b4823874250a37998006dfd003,2024-11-21T01:47:18.033000 -CVE-2013-0321,0,1,e24f360bb1c280cb20fda77fcc952935687262550fbaa8026ae1f118e93fb17e,2024-11-21T01:47:18.150000 -CVE-2013-0322,0,1,4bdcd01e9897327bca6a3f70527e59a969b4a06ec5369ebdc79515d823d36ab0,2024-11-21T01:47:18.260000 -CVE-2013-0323,0,1,2a49b6f7a47e09453dbd979268d6b4f7e3e171347161798d48b37dcfbf9280f9,2024-11-21T01:47:18.380000 -CVE-2013-0324,0,1,0e519cc005d0e34af1fc61bfbb509fdc5c43c5ff715d739b7995ce9036066738,2024-11-21T01:47:18.500000 -CVE-2013-0325,0,1,26ee7674bb9865419066f15df93f590230969576764a76fd42c9ce730ea67483,2024-11-21T01:47:18.610000 +CVE-2013-0305,0,0,edde5ab0031e6a1f861788df8ab6ce865533f812c7b03ce8f0f5b0856302276d,2024-11-21T01:47:16.100000 +CVE-2013-0306,0,0,c2c56532a42bce33f9ec745f50887fbbf00a62e697d383a7a89772b88932674d,2024-11-21T01:47:16.217000 +CVE-2013-0307,0,0,5acfd3dd89a3ca44bb1425145d90acef51872dc90aa9cbad96069900ee6da6d7,2024-11-21T01:47:16.363000 +CVE-2013-0308,0,0,55ad3ac730ee4ad9aff96a6807936e794d98f53848d22714669b84b4d4e7b372,2024-11-21T01:47:16.487000 +CVE-2013-0309,0,0,a5bd8365c7e8cb974b0702312122287092ec999c0fc1feb6cdd84f6c7ad62e48,2024-11-21T01:47:16.630000 +CVE-2013-0310,0,0,7a46b965f6d803d90ec64192fccb4ff42d068f299b6b503d5b2981d65d94f4d0,2024-11-21T01:47:16.767000 +CVE-2013-0311,0,0,ba3e66b9d27f1e22535948551d349801d0ecf285728c9033d5f0738991962d1b,2024-11-21T01:47:16.927000 +CVE-2013-0312,0,0,a8cd5af865cd4e6b47038f4fcea68f8468e9390298591cb8402dbbf3ebff1aa0,2024-11-21T01:47:17.077000 +CVE-2013-0313,0,0,122f9d0cdae6fec60447a968151770f4aacfb5a143c25ae8c02f21528c76849c,2024-11-21T01:47:17.200000 +CVE-2013-0314,0,0,d0559bd70a11dc19fda69878a27671f951fcb791efb12da0c0a305a4c0eec672,2024-11-21T01:47:17.343000 +CVE-2013-0315,0,0,376f04af605c5d5356d15bfecc0b55d056ef9f647c56eaccf61117255fef9be2,2024-11-21T01:47:17.447000 +CVE-2013-0316,0,0,01373e7543d54a8addbce3d02628d66998e99718b8972adf96333ba686a702ac,2024-11-21T01:47:17.557000 +CVE-2013-0317,0,0,14ec0b93983fd42688d218bd0484a02f1a31d1fdc4bd74c2d50e856c939b1f26,2024-11-21T01:47:17.677000 +CVE-2013-0318,0,0,d40adb4a847bb869c20ad291b19e9f588f534bd6d07d0a42f8ac2227b55ed6fb,2024-11-21T01:47:17.800000 +CVE-2013-0319,0,0,a4dd281598b0d43259248c0bbf81d9c6424407be4d87e869f0b08c53d4b4b3b3,2024-11-21T01:47:17.910000 +CVE-2013-0320,0,0,ed427feb7fe99353184ae4922200c8db956d76b4823874250a37998006dfd003,2024-11-21T01:47:18.033000 +CVE-2013-0321,0,0,e24f360bb1c280cb20fda77fcc952935687262550fbaa8026ae1f118e93fb17e,2024-11-21T01:47:18.150000 +CVE-2013-0322,0,0,4bdcd01e9897327bca6a3f70527e59a969b4a06ec5369ebdc79515d823d36ab0,2024-11-21T01:47:18.260000 +CVE-2013-0323,0,0,2a49b6f7a47e09453dbd979268d6b4f7e3e171347161798d48b37dcfbf9280f9,2024-11-21T01:47:18.380000 +CVE-2013-0324,0,0,0e519cc005d0e34af1fc61bfbb509fdc5c43c5ff715d739b7995ce9036066738,2024-11-21T01:47:18.500000 +CVE-2013-0325,0,0,26ee7674bb9865419066f15df93f590230969576764a76fd42c9ce730ea67483,2024-11-21T01:47:18.610000 CVE-2013-0326,0,0,a8a87781531f58d16d6c1a6c5ebebb5031a5079fad53345b370a42cc99bdb9fb,2019-12-13T19:59:40.840000 -CVE-2013-0327,0,1,048edf52cb43529ec117dbf75e37c52a222ca879040f55f80aa248a161b16a2c,2024-11-21T01:47:18.863000 -CVE-2013-0328,0,1,6402bd206455d35a503c40d544aa0e828eb9d8a8c3ca1e472c71c81a46c12034,2024-11-21T01:47:18.973000 -CVE-2013-0329,0,1,feaa9e4ec66f619de25399bcf92846e9d84351cf1868249073bb78db89cf8f7c,2024-11-21T01:47:19.097000 -CVE-2013-0330,0,1,359428b32bb1961ef40a0045dc8cfa09caf9cb8e89c2e3425cf25130b146652e,2024-11-21T01:47:19.217000 -CVE-2013-0331,0,1,9619cfb38866c76208e775a9c024c4fba95df33ad368aa086bb51877873eaf74,2024-11-21T01:47:19.337000 -CVE-2013-0332,0,1,e1550990dc7a72e9ce125a906887f1c70e4c9d3c5afefbb49b68ec1d2f5e5534,2024-11-21T01:47:19.463000 -CVE-2013-0333,0,1,b5d221f78f32bfd89505d869e925621581b57ebe059f8be658c559829f7c4432,2024-11-21T01:47:19.573000 +CVE-2013-0327,0,0,048edf52cb43529ec117dbf75e37c52a222ca879040f55f80aa248a161b16a2c,2024-11-21T01:47:18.863000 +CVE-2013-0328,0,0,6402bd206455d35a503c40d544aa0e828eb9d8a8c3ca1e472c71c81a46c12034,2024-11-21T01:47:18.973000 +CVE-2013-0329,0,0,feaa9e4ec66f619de25399bcf92846e9d84351cf1868249073bb78db89cf8f7c,2024-11-21T01:47:19.097000 +CVE-2013-0330,0,0,359428b32bb1961ef40a0045dc8cfa09caf9cb8e89c2e3425cf25130b146652e,2024-11-21T01:47:19.217000 +CVE-2013-0331,0,0,9619cfb38866c76208e775a9c024c4fba95df33ad368aa086bb51877873eaf74,2024-11-21T01:47:19.337000 +CVE-2013-0332,0,0,e1550990dc7a72e9ce125a906887f1c70e4c9d3c5afefbb49b68ec1d2f5e5534,2024-11-21T01:47:19.463000 +CVE-2013-0333,0,0,b5d221f78f32bfd89505d869e925621581b57ebe059f8be658c559829f7c4432,2024-11-21T01:47:19.573000 CVE-2013-0334,0,0,d52628da4fedeec226bb693ea08f601914cbbd738e9e6e87ae69a94facd9ff8f,2019-07-16T12:21:06.373000 -CVE-2013-0335,0,1,b5f0af484030de762c9c7c896df4c6db39ec5c4120bcc3b1a171fb750fb21dbe,2024-11-21T01:47:19.847000 +CVE-2013-0335,0,0,b5f0af484030de762c9c7c896df4c6db39ec5c4120bcc3b1a171fb750fb21dbe,2024-11-21T01:47:19.847000 CVE-2013-0336,0,0,cd70858376791d17782ed7734d2714b62d1c681e252575816b5675a937ccb0e5,2017-08-29T01:33:01.387000 -CVE-2013-0337,0,1,9ceb40a21899935e9a472d773e7223cd173a94b4e63bead535a6b78155c0c9e0,2024-11-21T01:47:20.080000 -CVE-2013-0338,0,1,8924c757ec36a03acd90c6463c5451dfabf1fb3d3427363d30e73c06c3332ac5,2024-11-21T01:47:20.213000 -CVE-2013-0339,0,1,36f5134b89954a38990c88cdc0426ccb7db0aa266f7c6ca3c66df303393666e4,2024-11-21T01:47:20.367000 -CVE-2013-0340,0,1,a9a0a0617de97cc41bacf059e8417debf57e9876ebff4ed8561bcce91188aecd,2024-11-21T01:47:20.517000 +CVE-2013-0337,0,0,9ceb40a21899935e9a472d773e7223cd173a94b4e63bead535a6b78155c0c9e0,2024-11-21T01:47:20.080000 +CVE-2013-0338,0,0,8924c757ec36a03acd90c6463c5451dfabf1fb3d3427363d30e73c06c3332ac5,2024-11-21T01:47:20.213000 +CVE-2013-0339,0,0,36f5134b89954a38990c88cdc0426ccb7db0aa266f7c6ca3c66df303393666e4,2024-11-21T01:47:20.367000 +CVE-2013-0340,0,0,a9a0a0617de97cc41bacf059e8417debf57e9876ebff4ed8561bcce91188aecd,2024-11-21T01:47:20.517000 CVE-2013-0341,0,0,6b61833a607b3b2d31336268410934f576b9802cffb96c609ba5bd711c394b49,2023-11-07T02:13:49.130000 CVE-2013-0342,0,0,4471e381bb904f42e1225d0c50716ce099566388527839f843982bff65e5068b,2019-12-11T02:40:03.300000 -CVE-2013-0343,0,1,51b8da4be2ddf9eead80028dff263d3108f8717ff2d677bdd08b20c09b3d6e3f,2024-11-21T01:47:20.860000 +CVE-2013-0343,0,0,51b8da4be2ddf9eead80028dff263d3108f8717ff2d677bdd08b20c09b3d6e3f,2024-11-21T01:47:20.860000 CVE-2013-0344,0,0,2bab4429ace9671842d0c22737e04c939c56fe2af723a77e7dde2b0a9a1d300f,2023-11-07T02:13:49.473000 -CVE-2013-0345,0,1,af3385ebf21924007f2f5a436ee32ec6f96c15ba0701fb205efc1cfd74adfb6a,2024-11-21T01:47:21.067000 -CVE-2013-0346,0,1,91986de85da03b3ebdbd3088dd753ab2d64481bc1e6c08a72ce666525a24ff2a,2024-11-21T01:47:21.180000 +CVE-2013-0345,0,0,af3385ebf21924007f2f5a436ee32ec6f96c15ba0701fb205efc1cfd74adfb6a,2024-11-21T01:47:21.067000 +CVE-2013-0346,0,0,91986de85da03b3ebdbd3088dd753ab2d64481bc1e6c08a72ce666525a24ff2a,2024-11-21T01:47:21.180000 CVE-2013-0347,0,0,cbaa0b6718b5da7941fca183a4523b08c90d3930dadcf630873dffb9ec2c7542,2017-08-29T01:33:01.447000 -CVE-2013-0348,0,1,9a56b948cfed3b90aaf832c2539142f1607c745944b18526315b0b4749ad0a18,2024-11-21T01:47:21.440000 -CVE-2013-0349,0,1,ff2a97b02e8956bf647f34027f47f1e2cb08f5bad0086eabb67a56f397b3fb12,2024-11-21T01:47:21.600000 -CVE-2013-0350,0,1,30edb89851da7e01c86fe2d0cb8cfa340d90905d7d7b5d81bc8c0243d9d7e01b,2024-11-21T01:47:21.750000 -CVE-2013-0351,0,1,781071683fa09fb1b24ff9eecd370eac4c7a480f56b977eac36a93476d917ff9,2024-11-21T01:47:21.860000 -CVE-2013-0352,0,1,9a5dca9dc9994daddbefbbb4ab7a2a7e0cf77e6e30accdb911cd6ddf609b357f,2024-11-21T01:47:22.010000 -CVE-2013-0353,0,1,0842468eb49de9b1ff6aa772fd73852d19f6673e8bd780c35cb177018d7c3498,2024-11-21T01:47:22.117000 -CVE-2013-0354,0,1,1bdcbfdb0d841a188c61ccf1ce0326b7dcadaa034209fb119a77e555b326153e,2024-11-21T01:47:22.230000 -CVE-2013-0355,0,1,6e2a17e061ebaf8276cff219b8d3eb7b3316b0f0fc7f9fde9e70d9e48d91f1a1,2024-11-21T01:47:22.340000 -CVE-2013-0356,0,1,036f4306df3af39919c83428fae78fe23b578cfd719a3b510fb173840d20f591,2024-11-21T01:47:22.440000 -CVE-2013-0357,0,1,5c4182cba37b502e20fa1e945a69c939e94c7aaf15f247742d8749e6e0d398ab,2024-11-21T01:47:22.553000 -CVE-2013-0358,0,1,08f5e7d566b5dc9a8fa53835a0314cf5004442722111a8470e707f1863770812,2024-11-21T01:47:22.657000 -CVE-2013-0359,0,1,0c02f0b4be5e586fbf244ba0aff5b23d58c0a44472245adf535ab454243abb7d,2024-11-21T01:47:22.763000 -CVE-2013-0360,0,1,fe3a00835211956953972b944c9815a3c0a644b205bd13fb065011866f40b9f1,2024-11-21T01:47:22.873000 -CVE-2013-0361,0,1,a20c802fbe237efe9a9d757dee3f03234c5138ac5586760a3486624a9b679e2f,2024-11-21T01:47:22.987000 -CVE-2013-0362,0,1,a0a18ee9e1f8cc0325af9af6b7a63c9fbc6c1c24c3f54c2a6dfeef8330590a9b,2024-11-21T01:47:23.100000 -CVE-2013-0363,0,1,ec0efcc2d63c3f9cfc2c9a4eaade92ca34fcea1464107c4b5fed53f341d1ea65,2024-11-21T01:47:23.213000 -CVE-2013-0364,0,1,c1c1991018ee60da4688e808dd5c2c658a6b81d0465e0aed564ae3ab7d60df44,2024-11-21T01:47:23.323000 -CVE-2013-0365,0,1,98b4047f184c001d126b7f3543d03eb1c651a3325fbf0c3b1630ef6585b86e44,2024-11-21T01:47:23.443000 -CVE-2013-0366,0,1,02b7eddcadff5da6d2deea1e9b2610d9483a7a7a5bba5e2700bea39f15cfe949,2024-11-21T01:47:23.547000 -CVE-2013-0367,0,1,6ca6be1193416a7d33130f43e1250edaba241b578035e8a33339e2c510a55ca4,2024-11-21T01:47:23.650000 -CVE-2013-0368,0,1,3475aa589f0c9a1d35e87df0484766870e329d65257314aca3a24137c445a540,2024-11-21T01:47:23.787000 -CVE-2013-0369,0,1,32bc1ace9770cf291b2bf3404f0b0e088f71238700b17f0337985fb2c12e044a,2024-11-21T01:47:23.927000 -CVE-2013-0370,0,1,60e2ed4ee6714aaf43046db8514178e734ed7688f4f8ef7bdf84e40958935344,2024-11-21T01:47:24.037000 -CVE-2013-0371,0,1,d13e951842af1cd199ffb54c778435b14fe6e3358657bf30d85375edd5c58ffd,2024-11-21T01:47:24.147000 -CVE-2013-0372,0,1,e6b8cda5fe4ff2eb3eda34df8c7d21827a132e3ec153cbec4c5ea5eabaf9eade,2024-11-21T01:47:24.280000 -CVE-2013-0373,0,1,ef79834739f33a5412d0234ddad05d5235a7ac0dfbdd3feb03bca67281468e1d,2024-11-21T01:47:24.400000 -CVE-2013-0374,0,1,3f42eae1dd09b8180bdc25b423655f26432c9ef261ea8794d0cb355534db0c26,2024-11-21T01:47:24.517000 -CVE-2013-0375,0,1,f836c3487d116a1781a23696d18190b964aea3269cfe4c8ab3b91535218d2af1,2024-11-21T01:47:24.637000 -CVE-2013-0376,0,1,c0554eb40b3f69dce99c2bffd845a9c7d16bbeb588d90d8e5299a3c2788f84da,2024-11-21T01:47:24.793000 -CVE-2013-0377,0,1,7deb8888f09678dd91184201acf17b715b2936474f206c2014da64cb42d15f6b,2024-11-21T01:47:24.910000 -CVE-2013-0378,0,1,e75b0705618ec7fa92a87df5a688da22499952cb182dbb351d170bd4e449c5d3,2024-11-21T01:47:25.033000 -CVE-2013-0379,0,1,f68de1c59777d17a569200c5d91d7ebc2ca7f7437275186274e70f7769e11811,2024-11-21T01:47:25.150000 -CVE-2013-0380,0,1,d710e35787c3ecae0f413096eea2a9c93921ff4621026940d23d267951d5ab6c,2024-11-21T01:47:25.260000 -CVE-2013-0381,0,1,1add3cc61cde31ce1df407a56409d442f2ea62037def5b77f04438980bf759a9,2024-11-21T01:47:25.377000 -CVE-2013-0382,0,1,a3e2d46317951cc22d04546703b772d63ccadbfa6ddc9664485b6c91720a5973,2024-11-21T01:47:25.493000 -CVE-2013-0383,0,1,63926aa7e9cbfd96fb02ea13caeedcab60b69d74c8404e09e7e2b5ca3976cb32,2024-11-21T01:47:25.603000 -CVE-2013-0384,0,1,0e8627e819a40182a943e0557786e3fc6296221bcd2422de43b2af4d3b9c061d,2024-11-21T01:47:25.750000 -CVE-2013-0385,0,1,415a9ab958133a1c58008109fe5ac29e6ebf19e8e2c7e0024e5f8bfb016fd2f1,2024-11-21T01:47:25.897000 -CVE-2013-0386,0,1,ba35eb5f28784edc28fc5cb4beac47e6e52f647e4e17a1c89504f068959d3246,2024-11-21T01:47:26.043000 -CVE-2013-0387,0,1,a20d89016a61f4a25ab2ef296a407d5e425f13c49e7b398f736a5fa0807be300,2024-11-21T01:47:26.183000 -CVE-2013-0388,0,1,3ceab4c5e3216deff3839572815542bf8ab65c44fad66fc54d2ba933f533c37a,2024-11-21T01:47:26.300000 -CVE-2013-0389,0,1,78e67534a90b69307809f75f295efcb18c5ea4645f4e3d86d1367ede41ebb565,2024-11-21T01:47:26.407000 -CVE-2013-0390,0,1,54c8d1c6bdede78cbb1a43a25bbf32dd747979180d56b23677ea6df93340a137,2024-11-21T01:47:26.550000 -CVE-2013-0391,0,1,bb13093d5d754b955f519d98a8bf6fe5865cb6b65de49774b9f3f41935474707,2024-11-21T01:47:26.717000 -CVE-2013-0392,0,1,0f68d151aa1414f08a31860fa73e9f7065c6cc3f2e1bd2e6b36560e0fbec6b05,2024-11-21T01:47:26.850000 -CVE-2013-0393,0,1,1816c4c855eda45e243a4d82d7fbddc7a744b81c944d8531b3f4843addf298d7,2024-11-21T01:47:26.970000 -CVE-2013-0394,0,1,e0bb99b9c1a80693cb1f066cadf6c38bbd86945575f9367c5dca071321273751,2024-11-21T01:47:27.097000 -CVE-2013-0395,0,1,f009a8752d60a1999f68dc27e1852571d0b9f3a5428fbec853da2bddc7187749,2024-11-21T01:47:27.220000 -CVE-2013-0396,0,1,c1b3b5c1d8cc2f0d9051952c1eefbd768bd292990a7f1bc473b07a090f2289c4,2024-11-21T01:47:27.347000 -CVE-2013-0397,0,1,0eac3df289c35939fef024f24017a0965a49fbfe5d008f97ff21fef1389017d0,2024-11-21T01:47:27.467000 -CVE-2013-0398,0,1,9251ce255043a6766adc548e9466b381ff87ef9b856309c0f2d55e372aa497f8,2024-11-21T01:47:27.580000 -CVE-2013-0399,0,1,53c81e1cb3faa79cdacb36a8464fcab9fa22597ed44ed469f56ff2cadfc37712,2024-11-21T01:47:27.690000 -CVE-2013-0400,0,1,8a10bcd8742587064fc3f69020e33078d95c5642a199bb305d6738e12aefb0ec,2024-11-21T01:47:27.817000 -CVE-2013-0401,0,1,2007a7f839669b04f2d9f26ae68d2f5480095c358c985dfe849109ac06d51074,2024-11-21T01:47:27.957000 -CVE-2013-0402,0,1,a8b135972f2adff4d62c6b156cb8bcb124544aa53189b8607093823ddb5e3b5c,2024-11-21T01:47:28.117000 -CVE-2013-0403,0,1,bdcafb34891209578276b2305980d68c71e7b738922c65e3dbd51b1efb8c14ad,2024-11-21T01:47:28.230000 -CVE-2013-0404,0,1,8776cd348ab9655178d40bd703549c94889d9b63e13d9cbc578f77fea8ccb315,2024-11-21T01:47:28.353000 -CVE-2013-0405,0,1,24801e8302880f6ece30ee0cfb9bf9401719a71b00c9f25acf54a2cc3ea3604e,2024-11-21T01:47:28.480000 -CVE-2013-0406,0,1,6225345d4b893fc9bb299b77c8a771416a5ea3a7c3f5255b44458a9e15d10dbb,2024-11-21T01:47:28.607000 -CVE-2013-0407,0,1,4ea6fd289607813f1236e4a7ae76da65cc1f4b3ce5a6eae19ab29b326d5985a4,2024-11-21T01:47:28.727000 -CVE-2013-0408,0,1,a23e21145d3515d650f41a6926d99505c8ac2ee7f129a539719c9797b274769b,2024-11-21T01:47:28.863000 -CVE-2013-0409,0,1,7101fbe342e1aea3edb35c96fbcab662a7692a84e6455d83a1ed0c1c983d6ec4,2024-11-21T01:47:28.990000 -CVE-2013-0410,0,1,d65ac832a605c46b433aff12924b841016d4ea5084b06da4b2e48ddf4eaf77ef,2024-11-21T01:47:29.147000 -CVE-2013-0411,0,1,db489c70bf1ba222800419008d9f64b770ec1371d101cc6c986b49317b0b82e1,2024-11-21T01:47:29.260000 -CVE-2013-0412,0,1,e0dccb11cbb7f52a1ea40a006e3f1980576c5bbd7ff8d89fb25462cc8756e1e3,2024-11-21T01:47:29.390000 -CVE-2013-0413,0,1,69c113ad1c83088e673627d39ad100375d7e5dd56bc6706919d89e83a5dfcf67,2024-11-21T01:47:29.510000 -CVE-2013-0414,0,1,b3d235938086a88db0b806560e9937f54dc431b11dbfe0fb91769fc72e6201f7,2024-11-21T01:47:29.637000 -CVE-2013-0415,0,1,bea7080de8f585c7ceee6118c5a14bc674f0bdd3702a209f6201656aac5df8da,2024-11-21T01:47:29.743000 -CVE-2013-0416,0,1,ab7c07d930a238cb52181d9b78d4ce3b9540f74c62fe67daa5ebce45d050baaf,2024-11-21T01:47:29.870000 -CVE-2013-0417,0,1,1e5885fb8a961d8474f81b2f3fb760ca2c22a9ce6e531088cfc1bec3cc517311,2024-11-21T01:47:29.987000 -CVE-2013-0418,0,1,dbb5ed52e80918fe7c9a0ae6e1ee55786579ba8a8afe86944cda208e21289856,2024-11-21T01:47:30.100000 -CVE-2013-0419,0,1,4820e9ed36017c0bef93b032e6c93d9631bc167aad5409feee5a1cd7d544cfb9,2024-11-21T01:47:30.220000 -CVE-2013-0420,0,1,3fa4d8b5d8561370c94249f0b4bde3bc1b7b92125af731a01fcf5d6e4b579cad,2024-11-21T01:47:30.370000 +CVE-2013-0348,0,0,9a56b948cfed3b90aaf832c2539142f1607c745944b18526315b0b4749ad0a18,2024-11-21T01:47:21.440000 +CVE-2013-0349,0,0,ff2a97b02e8956bf647f34027f47f1e2cb08f5bad0086eabb67a56f397b3fb12,2024-11-21T01:47:21.600000 +CVE-2013-0350,0,0,30edb89851da7e01c86fe2d0cb8cfa340d90905d7d7b5d81bc8c0243d9d7e01b,2024-11-21T01:47:21.750000 +CVE-2013-0351,0,0,781071683fa09fb1b24ff9eecd370eac4c7a480f56b977eac36a93476d917ff9,2024-11-21T01:47:21.860000 +CVE-2013-0352,0,0,9a5dca9dc9994daddbefbbb4ab7a2a7e0cf77e6e30accdb911cd6ddf609b357f,2024-11-21T01:47:22.010000 +CVE-2013-0353,0,0,0842468eb49de9b1ff6aa772fd73852d19f6673e8bd780c35cb177018d7c3498,2024-11-21T01:47:22.117000 +CVE-2013-0354,0,0,1bdcbfdb0d841a188c61ccf1ce0326b7dcadaa034209fb119a77e555b326153e,2024-11-21T01:47:22.230000 +CVE-2013-0355,0,0,6e2a17e061ebaf8276cff219b8d3eb7b3316b0f0fc7f9fde9e70d9e48d91f1a1,2024-11-21T01:47:22.340000 +CVE-2013-0356,0,0,036f4306df3af39919c83428fae78fe23b578cfd719a3b510fb173840d20f591,2024-11-21T01:47:22.440000 +CVE-2013-0357,0,0,5c4182cba37b502e20fa1e945a69c939e94c7aaf15f247742d8749e6e0d398ab,2024-11-21T01:47:22.553000 +CVE-2013-0358,0,0,08f5e7d566b5dc9a8fa53835a0314cf5004442722111a8470e707f1863770812,2024-11-21T01:47:22.657000 +CVE-2013-0359,0,0,0c02f0b4be5e586fbf244ba0aff5b23d58c0a44472245adf535ab454243abb7d,2024-11-21T01:47:22.763000 +CVE-2013-0360,0,0,fe3a00835211956953972b944c9815a3c0a644b205bd13fb065011866f40b9f1,2024-11-21T01:47:22.873000 +CVE-2013-0361,0,0,a20c802fbe237efe9a9d757dee3f03234c5138ac5586760a3486624a9b679e2f,2024-11-21T01:47:22.987000 +CVE-2013-0362,0,0,a0a18ee9e1f8cc0325af9af6b7a63c9fbc6c1c24c3f54c2a6dfeef8330590a9b,2024-11-21T01:47:23.100000 +CVE-2013-0363,0,0,ec0efcc2d63c3f9cfc2c9a4eaade92ca34fcea1464107c4b5fed53f341d1ea65,2024-11-21T01:47:23.213000 +CVE-2013-0364,0,0,c1c1991018ee60da4688e808dd5c2c658a6b81d0465e0aed564ae3ab7d60df44,2024-11-21T01:47:23.323000 +CVE-2013-0365,0,0,98b4047f184c001d126b7f3543d03eb1c651a3325fbf0c3b1630ef6585b86e44,2024-11-21T01:47:23.443000 +CVE-2013-0366,0,0,02b7eddcadff5da6d2deea1e9b2610d9483a7a7a5bba5e2700bea39f15cfe949,2024-11-21T01:47:23.547000 +CVE-2013-0367,0,0,6ca6be1193416a7d33130f43e1250edaba241b578035e8a33339e2c510a55ca4,2024-11-21T01:47:23.650000 +CVE-2013-0368,0,0,3475aa589f0c9a1d35e87df0484766870e329d65257314aca3a24137c445a540,2024-11-21T01:47:23.787000 +CVE-2013-0369,0,0,32bc1ace9770cf291b2bf3404f0b0e088f71238700b17f0337985fb2c12e044a,2024-11-21T01:47:23.927000 +CVE-2013-0370,0,0,60e2ed4ee6714aaf43046db8514178e734ed7688f4f8ef7bdf84e40958935344,2024-11-21T01:47:24.037000 +CVE-2013-0371,0,0,d13e951842af1cd199ffb54c778435b14fe6e3358657bf30d85375edd5c58ffd,2024-11-21T01:47:24.147000 +CVE-2013-0372,0,0,e6b8cda5fe4ff2eb3eda34df8c7d21827a132e3ec153cbec4c5ea5eabaf9eade,2024-11-21T01:47:24.280000 +CVE-2013-0373,0,0,ef79834739f33a5412d0234ddad05d5235a7ac0dfbdd3feb03bca67281468e1d,2024-11-21T01:47:24.400000 +CVE-2013-0374,0,0,3f42eae1dd09b8180bdc25b423655f26432c9ef261ea8794d0cb355534db0c26,2024-11-21T01:47:24.517000 +CVE-2013-0375,0,0,f836c3487d116a1781a23696d18190b964aea3269cfe4c8ab3b91535218d2af1,2024-11-21T01:47:24.637000 +CVE-2013-0376,0,0,c0554eb40b3f69dce99c2bffd845a9c7d16bbeb588d90d8e5299a3c2788f84da,2024-11-21T01:47:24.793000 +CVE-2013-0377,0,0,7deb8888f09678dd91184201acf17b715b2936474f206c2014da64cb42d15f6b,2024-11-21T01:47:24.910000 +CVE-2013-0378,0,0,e75b0705618ec7fa92a87df5a688da22499952cb182dbb351d170bd4e449c5d3,2024-11-21T01:47:25.033000 +CVE-2013-0379,0,0,f68de1c59777d17a569200c5d91d7ebc2ca7f7437275186274e70f7769e11811,2024-11-21T01:47:25.150000 +CVE-2013-0380,0,0,d710e35787c3ecae0f413096eea2a9c93921ff4621026940d23d267951d5ab6c,2024-11-21T01:47:25.260000 +CVE-2013-0381,0,0,1add3cc61cde31ce1df407a56409d442f2ea62037def5b77f04438980bf759a9,2024-11-21T01:47:25.377000 +CVE-2013-0382,0,0,a3e2d46317951cc22d04546703b772d63ccadbfa6ddc9664485b6c91720a5973,2024-11-21T01:47:25.493000 +CVE-2013-0383,0,0,63926aa7e9cbfd96fb02ea13caeedcab60b69d74c8404e09e7e2b5ca3976cb32,2024-11-21T01:47:25.603000 +CVE-2013-0384,0,0,0e8627e819a40182a943e0557786e3fc6296221bcd2422de43b2af4d3b9c061d,2024-11-21T01:47:25.750000 +CVE-2013-0385,0,0,415a9ab958133a1c58008109fe5ac29e6ebf19e8e2c7e0024e5f8bfb016fd2f1,2024-11-21T01:47:25.897000 +CVE-2013-0386,0,0,ba35eb5f28784edc28fc5cb4beac47e6e52f647e4e17a1c89504f068959d3246,2024-11-21T01:47:26.043000 +CVE-2013-0387,0,0,a20d89016a61f4a25ab2ef296a407d5e425f13c49e7b398f736a5fa0807be300,2024-11-21T01:47:26.183000 +CVE-2013-0388,0,0,3ceab4c5e3216deff3839572815542bf8ab65c44fad66fc54d2ba933f533c37a,2024-11-21T01:47:26.300000 +CVE-2013-0389,0,0,78e67534a90b69307809f75f295efcb18c5ea4645f4e3d86d1367ede41ebb565,2024-11-21T01:47:26.407000 +CVE-2013-0390,0,0,54c8d1c6bdede78cbb1a43a25bbf32dd747979180d56b23677ea6df93340a137,2024-11-21T01:47:26.550000 +CVE-2013-0391,0,0,bb13093d5d754b955f519d98a8bf6fe5865cb6b65de49774b9f3f41935474707,2024-11-21T01:47:26.717000 +CVE-2013-0392,0,0,0f68d151aa1414f08a31860fa73e9f7065c6cc3f2e1bd2e6b36560e0fbec6b05,2024-11-21T01:47:26.850000 +CVE-2013-0393,0,0,1816c4c855eda45e243a4d82d7fbddc7a744b81c944d8531b3f4843addf298d7,2024-11-21T01:47:26.970000 +CVE-2013-0394,0,0,e0bb99b9c1a80693cb1f066cadf6c38bbd86945575f9367c5dca071321273751,2024-11-21T01:47:27.097000 +CVE-2013-0395,0,0,f009a8752d60a1999f68dc27e1852571d0b9f3a5428fbec853da2bddc7187749,2024-11-21T01:47:27.220000 +CVE-2013-0396,0,0,c1b3b5c1d8cc2f0d9051952c1eefbd768bd292990a7f1bc473b07a090f2289c4,2024-11-21T01:47:27.347000 +CVE-2013-0397,0,0,0eac3df289c35939fef024f24017a0965a49fbfe5d008f97ff21fef1389017d0,2024-11-21T01:47:27.467000 +CVE-2013-0398,0,0,9251ce255043a6766adc548e9466b381ff87ef9b856309c0f2d55e372aa497f8,2024-11-21T01:47:27.580000 +CVE-2013-0399,0,0,53c81e1cb3faa79cdacb36a8464fcab9fa22597ed44ed469f56ff2cadfc37712,2024-11-21T01:47:27.690000 +CVE-2013-0400,0,0,8a10bcd8742587064fc3f69020e33078d95c5642a199bb305d6738e12aefb0ec,2024-11-21T01:47:27.817000 +CVE-2013-0401,0,0,2007a7f839669b04f2d9f26ae68d2f5480095c358c985dfe849109ac06d51074,2024-11-21T01:47:27.957000 +CVE-2013-0402,0,0,a8b135972f2adff4d62c6b156cb8bcb124544aa53189b8607093823ddb5e3b5c,2024-11-21T01:47:28.117000 +CVE-2013-0403,0,0,bdcafb34891209578276b2305980d68c71e7b738922c65e3dbd51b1efb8c14ad,2024-11-21T01:47:28.230000 +CVE-2013-0404,0,0,8776cd348ab9655178d40bd703549c94889d9b63e13d9cbc578f77fea8ccb315,2024-11-21T01:47:28.353000 +CVE-2013-0405,0,0,24801e8302880f6ece30ee0cfb9bf9401719a71b00c9f25acf54a2cc3ea3604e,2024-11-21T01:47:28.480000 +CVE-2013-0406,0,0,6225345d4b893fc9bb299b77c8a771416a5ea3a7c3f5255b44458a9e15d10dbb,2024-11-21T01:47:28.607000 +CVE-2013-0407,0,0,4ea6fd289607813f1236e4a7ae76da65cc1f4b3ce5a6eae19ab29b326d5985a4,2024-11-21T01:47:28.727000 +CVE-2013-0408,0,0,a23e21145d3515d650f41a6926d99505c8ac2ee7f129a539719c9797b274769b,2024-11-21T01:47:28.863000 +CVE-2013-0409,0,0,7101fbe342e1aea3edb35c96fbcab662a7692a84e6455d83a1ed0c1c983d6ec4,2024-11-21T01:47:28.990000 +CVE-2013-0410,0,0,d65ac832a605c46b433aff12924b841016d4ea5084b06da4b2e48ddf4eaf77ef,2024-11-21T01:47:29.147000 +CVE-2013-0411,0,0,db489c70bf1ba222800419008d9f64b770ec1371d101cc6c986b49317b0b82e1,2024-11-21T01:47:29.260000 +CVE-2013-0412,0,0,e0dccb11cbb7f52a1ea40a006e3f1980576c5bbd7ff8d89fb25462cc8756e1e3,2024-11-21T01:47:29.390000 +CVE-2013-0413,0,0,69c113ad1c83088e673627d39ad100375d7e5dd56bc6706919d89e83a5dfcf67,2024-11-21T01:47:29.510000 +CVE-2013-0414,0,0,b3d235938086a88db0b806560e9937f54dc431b11dbfe0fb91769fc72e6201f7,2024-11-21T01:47:29.637000 +CVE-2013-0415,0,0,bea7080de8f585c7ceee6118c5a14bc674f0bdd3702a209f6201656aac5df8da,2024-11-21T01:47:29.743000 +CVE-2013-0416,0,0,ab7c07d930a238cb52181d9b78d4ce3b9540f74c62fe67daa5ebce45d050baaf,2024-11-21T01:47:29.870000 +CVE-2013-0417,0,0,1e5885fb8a961d8474f81b2f3fb760ca2c22a9ce6e531088cfc1bec3cc517311,2024-11-21T01:47:29.987000 +CVE-2013-0418,0,0,dbb5ed52e80918fe7c9a0ae6e1ee55786579ba8a8afe86944cda208e21289856,2024-11-21T01:47:30.100000 +CVE-2013-0419,0,0,4820e9ed36017c0bef93b032e6c93d9631bc167aad5409feee5a1cd7d544cfb9,2024-11-21T01:47:30.220000 +CVE-2013-0420,0,0,3fa4d8b5d8561370c94249f0b4bde3bc1b7b92125af731a01fcf5d6e4b579cad,2024-11-21T01:47:30.370000 CVE-2013-0421,0,0,6d71721d9b9018230ce9413672a915f17d288ed8aefa3b09cc23ca6d82de1687,2023-11-07T02:13:50.393000 -CVE-2013-0422,0,1,4fcfd947a2799d6177b40f066b6367e3d26e231ec3a25b6cf905a962616f8734,2024-11-21T01:47:30.510000 -CVE-2013-0423,0,1,fdae791c7cc1d8d53ec614fbd9b756ec63040870a3d511fed4c25423251bbcc7,2024-11-21T01:47:30.667000 -CVE-2013-0424,0,1,ad7b8bd2b4975e3932cfbf92ab5849468d50709970747abb96d266de015ed2c7,2024-11-21T01:47:30.807000 -CVE-2013-0425,0,1,46521fc83c546198dc72d994630306cb6fffdd4d21736388dda595f47612f792,2024-11-21T01:47:31 -CVE-2013-0426,0,1,28219f5066a5aefe888f2a9b001a48afe5d1c22e965987c26096fddb2186a163,2024-11-21T01:47:31.190000 -CVE-2013-0427,0,1,e228b06ab62edc33c3bb91887777c9f2e65e2055fbbe6de4b70e4d80b02ec826,2024-11-21T01:47:31.370000 -CVE-2013-0428,0,1,11bd89dbaba3cbffddc6b6cb6ee42612269a8808e6b151ff65284d75a9d647e2,2024-11-21T01:47:31.563000 -CVE-2013-0429,0,1,50e98384a6e48ccaa0a5221ebbb60378674ef46b66170275e3ce6b62372bb52e,2024-11-21T01:47:31.763000 -CVE-2013-0430,0,1,3905cd33d6ccc8fe21ede989d09db1f363d718c5e41aecf9a62d2ebdc580121d,2024-11-21T01:47:31.980000 -CVE-2013-0431,0,1,cf34807aa514ca0ca87a43470701ead359cf1b5e712533be4483b93de3f364da,2024-11-21T01:47:32.133000 -CVE-2013-0432,0,1,02acf5316a923457b53bd43491f069b886b55c6fc429fa20c65ab3616bee5cd7,2024-11-21T01:47:32.297000 -CVE-2013-0433,0,1,2a6737e91bb3d2364d3d649b69034ca2432a0fe2e164b83eb982372dbb5e4c68,2024-11-21T01:47:32.493000 -CVE-2013-0434,0,1,121d9ebbf22aad8ec25b4981a2f3fb16958f5b9d7f339cd8b1b97191cb500658,2024-11-21T01:47:32.697000 -CVE-2013-0435,0,1,03f600a47921ec903b75dabee2171565edccda19c7f83fb6c4aa608f3cb1fd66,2024-11-21T01:47:32.893000 -CVE-2013-0436,0,1,61c83a324440d9878677e52cf76f6769e15b1dc61be529b73b37d1e2a8f12878,2024-11-21T01:47:33.063000 -CVE-2013-0437,0,1,72411329be766c90848f733090a0241ece193a0c22f69e1d15e662c3e6667aa9,2024-11-21T01:47:33.193000 -CVE-2013-0438,0,1,8f54ee074d61a26279f41f68205fa7caee1e5111072bc72c1cbedec92792b663,2024-11-21T01:47:33.337000 -CVE-2013-0439,0,1,22abc1d1fcf5ad17fc2f0c330d65236f9771a962bc9842074d966490c0dda111,2024-11-21T01:47:33.490000 -CVE-2013-0440,0,1,b14eb7aa04f345d1770d7b26411dda29d716b27430dfa0e6606534c15d3523f8,2024-11-21T01:47:33.620000 -CVE-2013-0441,0,1,93e5066bd84d2ac226c9a37a3d112e0a25a1a15d280e4d9372b31e984c3018f6,2024-11-21T01:47:33.817000 -CVE-2013-0442,0,1,061c6a0a010b55617dbd4a1b5fe87ec7c4d208c525d2fab308092e3a20b39d3b,2024-11-21T01:47:34.857000 -CVE-2013-0443,0,1,f61097530e4357834c59ac9f98b001463209f4d51040e01b1c57c5d3b5d99d1d,2024-11-21T01:47:35.420000 -CVE-2013-0444,0,1,05887494d2e2bfba510f00ef591d35a0777343f9f64cd62500532846119bd397,2024-11-21T01:47:35.647000 -CVE-2013-0445,0,1,e9c8d6a92eb3157016d9bf444ef7b361228992a4da0785e12466e1f45786fcd0,2024-11-21T01:47:35.797000 -CVE-2013-0446,0,1,d664a1aeb03e55606503d36380238dcf6f986c96514915c2aafcdbb66a59696b,2024-11-21T01:47:35.970000 -CVE-2013-0447,0,1,ecc7c120e90576364315991bfbad524088e018c243943f1cd5d6d9cb4e086acc,2024-11-21T01:47:36.127000 -CVE-2013-0448,0,1,7baa9c99f880fd06725ff12ce5343cfe2da5e85c436f3ff7067a52028f2e3406,2024-11-21T01:47:36.247000 -CVE-2013-0449,0,1,b1d0416ec44cd34ecc2127b0249415e72fb5da823799cbc252b8e759c6ddce93,2024-11-21T01:47:36.377000 -CVE-2013-0450,0,1,383dd80d0cbad01b833e5d261d56f4fe811d369b446ebbc94e11b23e1360e827,2024-11-21T01:47:36.493000 -CVE-2013-0451,0,1,98a419a09113481e3b394a61583cbf93a8a8ed3c0aad1b843b5320564653f55a,2024-11-21T01:47:36.663000 -CVE-2013-0452,0,1,5b26f24c401af1b3e780e22f2c9f4ba26d0f1334d7f1d4098ee637241b996fec,2024-11-21T01:47:36.790000 -CVE-2013-0453,0,1,b535a8dd95f5e66bcebe4dbcdcfb1a8344559b02478f8a13b1de7e0d05cd41b8,2024-11-21T01:47:36.907000 -CVE-2013-0454,0,1,c0ebb64533a5b217983336ed6c6c86ecbaed826321a52c354c73ea7529287cf2,2024-11-21T01:47:37.037000 -CVE-2013-0455,0,1,4c47167f744e66d4052cef75b97c406c0979d8035a4967444efca94ece4e264c,2024-11-21T01:47:37.187000 -CVE-2013-0456,0,1,41b60094827c154d83f20e0158602b1d136e2d413673c54b11953cba385d6d9f,2024-11-21T01:47:37.300000 -CVE-2013-0457,0,1,305983ea08f1647f8eda7ed6e3776459c781a7029e8816872a2e2d02673ca660,2024-11-21T01:47:37.407000 -CVE-2013-0458,0,1,6d3927afd7851a9c3cffe337e4a9dc9df041eb81774d6cc315dd13274574c2e8,2024-11-21T01:47:37.510000 -CVE-2013-0459,0,1,d1351f1035b6cce10342e3eb6aec598b8815425b4221b08dbcf20ad5eb636cef,2024-11-21T01:47:37.630000 -CVE-2013-0460,0,1,75a370569fc9c0314dd483c5def706f7cde68b0c89d1b56723ab0cc156203914,2024-11-21T01:47:37.750000 -CVE-2013-0461,0,1,f26d59f311d76d1c5c85fcde106f95ac5b7e3d934ed506780b3d793b74cdc6d2,2024-11-21T01:47:37.870000 -CVE-2013-0462,0,1,427aa4fd5b6d02108a4c83242f2a5180ddfc15213343c52e574f4f9351245158,2024-11-21T01:47:37.993000 -CVE-2013-0463,0,1,95495c56d86ec743cad2707d2afdbe7df5737f05e5eaf3a4f66eba3e9257241f,2024-11-21T01:47:38.110000 -CVE-2013-0464,0,1,043e490026e308ccc3fc2c202bf02f6f2c64f5b716d259a442298064908f45db,2024-11-21T01:47:38.220000 -CVE-2013-0465,0,1,6ca4377aaf6db14d8ab00e9942e0427c6f197ddd75ca1302f5f4ef8c90f664d3,2024-11-21T01:47:38.337000 -CVE-2013-0466,0,1,5e6ee099ee767bda5318edb080ba02f9728cc93c7d1be4fe9c1f1bb4b2fac2a9,2024-11-21T01:47:38.470000 -CVE-2013-0467,0,1,e782edd5e161534d1c501da4cd707be756962e4e807213911d6e0d85ebb77b21,2024-11-21T01:47:38.577000 -CVE-2013-0468,0,1,45ee1e0a83534d333fffd117d07cc70eee442a3e7d19f13561e9b815b50d90b8,2024-11-21T01:47:38.680000 -CVE-2013-0470,0,1,43e98349f9a06bbf369e34fb813a6096f6aa28c94c854232469bc19dc922535f,2024-11-21T01:47:38.783000 -CVE-2013-0471,0,1,a5ed2d096aac042afcc2caeb5c847091c0fee1210036d0c0782023c23ad10d73,2024-11-21T01:47:38.897000 -CVE-2013-0472,0,1,cf3ac329741ebbcf8b8ded3f004aaa0399eafb84db1c8f117f3aaabf6fd151f1,2024-11-21T01:47:39.020000 -CVE-2013-0473,0,1,d387b8a7b1888eb5eb630c71c7cc193babf39c132c471fd562fdfeef3be0f8e9,2024-11-21T01:47:39.143000 -CVE-2013-0474,0,1,6eddf827f6307c27ff0d0de3bd02a10ef1af5ea3f8fdb3ec6d51f570f2965fea,2024-11-21T01:47:39.267000 -CVE-2013-0475,0,1,f4b3a2fb1b3acc768c15b4fd4a2fac2ed56258b91b0ede2555a236e8edbcc850,2024-11-21T01:47:39.383000 -CVE-2013-0476,0,1,dc6aabe42d7a21a372ca2453214681012645c0fa3d58164ba416af7237d74d21,2024-11-21T01:47:39.483000 -CVE-2013-0477,0,1,a82c263167f2c9c1df8b58642789d0c1fa0c3feeb9eb739273501fafb33aca45,2024-11-21T01:47:39.600000 -CVE-2013-0478,0,1,a4f40a8d43bfa66019d9c9cc807198c3810ee9d58352def667ac988c196b3d6c,2024-11-21T01:47:39.717000 -CVE-2013-0479,0,1,5a9d806d6a5a48e93b002a7760bbe780984ced8084fc6b31e86f64a876f46235,2024-11-21T01:47:39.830000 -CVE-2013-0481,0,1,4a936efb02e4a9a5f6cca5de7f6a7390444b9aedfe53c73c25426de9a42696e8,2024-11-21T01:47:39.933000 -CVE-2013-0482,0,1,61f2e4008acc55f21ad18359c149997803ada0f989b87bcadab2263d58a85fce,2024-11-21T01:47:40.037000 -CVE-2013-0483,0,1,ad73dbce32c5c3f072a8ab1e9d673322f99eef4950f15bad1a2d3226439bbd54,2024-11-21T01:47:40.163000 -CVE-2013-0484,0,1,af3590a041b60554090689f08a1f5d5de80cd7ceb30a78a77c2ebb2ec21bef8a,2024-11-21T01:47:40.280000 -CVE-2013-0485,0,1,ea2ccb7450f5992dcd966a37f756d5f35b2876f5843ff402119a0109ab3960eb,2024-11-21T01:47:40.390000 -CVE-2013-0486,0,1,b2cb098a5ffe7408774b436862f48d105dfb7af6c930fc33d90deaa768d207b0,2024-11-21T01:47:40.510000 -CVE-2013-0487,0,1,8eae52cc28a62838b9b2497673e5df487926af9529f062255991e47a64e731df,2024-11-21T01:47:40.623000 -CVE-2013-0488,0,1,8e3a7252f302d7bf057b034427082c01571d4fbcaec0627499cd04c55b011193,2024-11-21T01:47:40.730000 -CVE-2013-0489,0,1,acb99aab18272425757cdd2d16fcf1b8c802627f80b53f0e780fb1f48c46303b,2024-11-21T01:47:40.843000 -CVE-2013-0490,0,1,dc2f54dd0998aa42d53782e6d84db6300a0169bd69c446f504a44473daf004d0,2024-11-21T01:47:40.960000 -CVE-2013-0492,0,1,084254de1714f5dbc09f4d508b85e74f7ac5de431420a455a27db7423e9bad08,2024-11-21T01:47:41.063000 -CVE-2013-0494,0,1,695b8014026d9fd85107285a3b97148b1ffd4bbf8a9a1a16b7ffbfdf405a23ce,2024-11-21T01:47:41.173000 -CVE-2013-0499,0,1,c26765fe99ed428802364227cd60a116bd092c175cb1159d3605ce1a545523a9,2024-11-21T01:47:41.277000 -CVE-2013-0500,0,1,54a429f4ff56e5bacaada3b817e6335acbbb122ff0727a5f6b73508234a7b7c4,2024-11-21T01:47:41.410000 -CVE-2013-0501,0,1,883916ecaa98dc86a08596b9ffdb9d7d850c3081a0b831fb8f4ed7a9b69a00b4,2024-11-21T01:47:41.523000 -CVE-2013-0502,0,1,5b5d06435928ded4bef6c4f4d54e477a52f2ef837fc307b35b1d3fb4b8999a7f,2024-11-21T01:47:41.637000 -CVE-2013-0503,0,1,d10e1cd709a9e9cd583ff25bc19f7682e11f4cde22bf4e4575844d028d97411a,2024-11-21T01:47:41.743000 -CVE-2013-0504,0,1,390545190c6db18c6d5501cbaa7ac9e5f72c598a128f292e56925f653415da40,2024-11-21T01:47:41.870000 -CVE-2013-0505,0,1,294ff3b70f358655983a9f8bd1f923906ba19227e89e2a33910c892e56810133,2024-11-21T01:47:41.997000 -CVE-2013-0506,0,1,c817f213c1075e0f389627e3a0756ebc3005e9bd2f4b52826cd4252f0076b164,2024-11-21T01:47:42.107000 +CVE-2013-0422,0,0,4fcfd947a2799d6177b40f066b6367e3d26e231ec3a25b6cf905a962616f8734,2024-11-21T01:47:30.510000 +CVE-2013-0423,0,0,fdae791c7cc1d8d53ec614fbd9b756ec63040870a3d511fed4c25423251bbcc7,2024-11-21T01:47:30.667000 +CVE-2013-0424,0,0,ad7b8bd2b4975e3932cfbf92ab5849468d50709970747abb96d266de015ed2c7,2024-11-21T01:47:30.807000 +CVE-2013-0425,0,0,46521fc83c546198dc72d994630306cb6fffdd4d21736388dda595f47612f792,2024-11-21T01:47:31 +CVE-2013-0426,0,0,28219f5066a5aefe888f2a9b001a48afe5d1c22e965987c26096fddb2186a163,2024-11-21T01:47:31.190000 +CVE-2013-0427,0,0,e228b06ab62edc33c3bb91887777c9f2e65e2055fbbe6de4b70e4d80b02ec826,2024-11-21T01:47:31.370000 +CVE-2013-0428,0,0,11bd89dbaba3cbffddc6b6cb6ee42612269a8808e6b151ff65284d75a9d647e2,2024-11-21T01:47:31.563000 +CVE-2013-0429,0,0,50e98384a6e48ccaa0a5221ebbb60378674ef46b66170275e3ce6b62372bb52e,2024-11-21T01:47:31.763000 +CVE-2013-0430,0,0,3905cd33d6ccc8fe21ede989d09db1f363d718c5e41aecf9a62d2ebdc580121d,2024-11-21T01:47:31.980000 +CVE-2013-0431,0,0,cf34807aa514ca0ca87a43470701ead359cf1b5e712533be4483b93de3f364da,2024-11-21T01:47:32.133000 +CVE-2013-0432,0,0,02acf5316a923457b53bd43491f069b886b55c6fc429fa20c65ab3616bee5cd7,2024-11-21T01:47:32.297000 +CVE-2013-0433,0,0,2a6737e91bb3d2364d3d649b69034ca2432a0fe2e164b83eb982372dbb5e4c68,2024-11-21T01:47:32.493000 +CVE-2013-0434,0,0,121d9ebbf22aad8ec25b4981a2f3fb16958f5b9d7f339cd8b1b97191cb500658,2024-11-21T01:47:32.697000 +CVE-2013-0435,0,0,03f600a47921ec903b75dabee2171565edccda19c7f83fb6c4aa608f3cb1fd66,2024-11-21T01:47:32.893000 +CVE-2013-0436,0,0,61c83a324440d9878677e52cf76f6769e15b1dc61be529b73b37d1e2a8f12878,2024-11-21T01:47:33.063000 +CVE-2013-0437,0,0,72411329be766c90848f733090a0241ece193a0c22f69e1d15e662c3e6667aa9,2024-11-21T01:47:33.193000 +CVE-2013-0438,0,0,8f54ee074d61a26279f41f68205fa7caee1e5111072bc72c1cbedec92792b663,2024-11-21T01:47:33.337000 +CVE-2013-0439,0,0,22abc1d1fcf5ad17fc2f0c330d65236f9771a962bc9842074d966490c0dda111,2024-11-21T01:47:33.490000 +CVE-2013-0440,0,0,b14eb7aa04f345d1770d7b26411dda29d716b27430dfa0e6606534c15d3523f8,2024-11-21T01:47:33.620000 +CVE-2013-0441,0,0,93e5066bd84d2ac226c9a37a3d112e0a25a1a15d280e4d9372b31e984c3018f6,2024-11-21T01:47:33.817000 +CVE-2013-0442,0,0,061c6a0a010b55617dbd4a1b5fe87ec7c4d208c525d2fab308092e3a20b39d3b,2024-11-21T01:47:34.857000 +CVE-2013-0443,0,0,f61097530e4357834c59ac9f98b001463209f4d51040e01b1c57c5d3b5d99d1d,2024-11-21T01:47:35.420000 +CVE-2013-0444,0,0,05887494d2e2bfba510f00ef591d35a0777343f9f64cd62500532846119bd397,2024-11-21T01:47:35.647000 +CVE-2013-0445,0,0,e9c8d6a92eb3157016d9bf444ef7b361228992a4da0785e12466e1f45786fcd0,2024-11-21T01:47:35.797000 +CVE-2013-0446,0,0,d664a1aeb03e55606503d36380238dcf6f986c96514915c2aafcdbb66a59696b,2024-11-21T01:47:35.970000 +CVE-2013-0447,0,0,ecc7c120e90576364315991bfbad524088e018c243943f1cd5d6d9cb4e086acc,2024-11-21T01:47:36.127000 +CVE-2013-0448,0,0,7baa9c99f880fd06725ff12ce5343cfe2da5e85c436f3ff7067a52028f2e3406,2024-11-21T01:47:36.247000 +CVE-2013-0449,0,0,b1d0416ec44cd34ecc2127b0249415e72fb5da823799cbc252b8e759c6ddce93,2024-11-21T01:47:36.377000 +CVE-2013-0450,0,0,383dd80d0cbad01b833e5d261d56f4fe811d369b446ebbc94e11b23e1360e827,2024-11-21T01:47:36.493000 +CVE-2013-0451,0,0,98a419a09113481e3b394a61583cbf93a8a8ed3c0aad1b843b5320564653f55a,2024-11-21T01:47:36.663000 +CVE-2013-0452,0,0,5b26f24c401af1b3e780e22f2c9f4ba26d0f1334d7f1d4098ee637241b996fec,2024-11-21T01:47:36.790000 +CVE-2013-0453,0,0,b535a8dd95f5e66bcebe4dbcdcfb1a8344559b02478f8a13b1de7e0d05cd41b8,2024-11-21T01:47:36.907000 +CVE-2013-0454,0,0,c0ebb64533a5b217983336ed6c6c86ecbaed826321a52c354c73ea7529287cf2,2024-11-21T01:47:37.037000 +CVE-2013-0455,0,0,4c47167f744e66d4052cef75b97c406c0979d8035a4967444efca94ece4e264c,2024-11-21T01:47:37.187000 +CVE-2013-0456,0,0,41b60094827c154d83f20e0158602b1d136e2d413673c54b11953cba385d6d9f,2024-11-21T01:47:37.300000 +CVE-2013-0457,0,0,305983ea08f1647f8eda7ed6e3776459c781a7029e8816872a2e2d02673ca660,2024-11-21T01:47:37.407000 +CVE-2013-0458,0,0,6d3927afd7851a9c3cffe337e4a9dc9df041eb81774d6cc315dd13274574c2e8,2024-11-21T01:47:37.510000 +CVE-2013-0459,0,0,d1351f1035b6cce10342e3eb6aec598b8815425b4221b08dbcf20ad5eb636cef,2024-11-21T01:47:37.630000 +CVE-2013-0460,0,0,75a370569fc9c0314dd483c5def706f7cde68b0c89d1b56723ab0cc156203914,2024-11-21T01:47:37.750000 +CVE-2013-0461,0,0,f26d59f311d76d1c5c85fcde106f95ac5b7e3d934ed506780b3d793b74cdc6d2,2024-11-21T01:47:37.870000 +CVE-2013-0462,0,0,427aa4fd5b6d02108a4c83242f2a5180ddfc15213343c52e574f4f9351245158,2024-11-21T01:47:37.993000 +CVE-2013-0463,0,0,95495c56d86ec743cad2707d2afdbe7df5737f05e5eaf3a4f66eba3e9257241f,2024-11-21T01:47:38.110000 +CVE-2013-0464,0,0,043e490026e308ccc3fc2c202bf02f6f2c64f5b716d259a442298064908f45db,2024-11-21T01:47:38.220000 +CVE-2013-0465,0,0,6ca4377aaf6db14d8ab00e9942e0427c6f197ddd75ca1302f5f4ef8c90f664d3,2024-11-21T01:47:38.337000 +CVE-2013-0466,0,0,5e6ee099ee767bda5318edb080ba02f9728cc93c7d1be4fe9c1f1bb4b2fac2a9,2024-11-21T01:47:38.470000 +CVE-2013-0467,0,0,e782edd5e161534d1c501da4cd707be756962e4e807213911d6e0d85ebb77b21,2024-11-21T01:47:38.577000 +CVE-2013-0468,0,0,45ee1e0a83534d333fffd117d07cc70eee442a3e7d19f13561e9b815b50d90b8,2024-11-21T01:47:38.680000 +CVE-2013-0470,0,0,43e98349f9a06bbf369e34fb813a6096f6aa28c94c854232469bc19dc922535f,2024-11-21T01:47:38.783000 +CVE-2013-0471,0,0,a5ed2d096aac042afcc2caeb5c847091c0fee1210036d0c0782023c23ad10d73,2024-11-21T01:47:38.897000 +CVE-2013-0472,0,0,cf3ac329741ebbcf8b8ded3f004aaa0399eafb84db1c8f117f3aaabf6fd151f1,2024-11-21T01:47:39.020000 +CVE-2013-0473,0,0,d387b8a7b1888eb5eb630c71c7cc193babf39c132c471fd562fdfeef3be0f8e9,2024-11-21T01:47:39.143000 +CVE-2013-0474,0,0,6eddf827f6307c27ff0d0de3bd02a10ef1af5ea3f8fdb3ec6d51f570f2965fea,2024-11-21T01:47:39.267000 +CVE-2013-0475,0,0,f4b3a2fb1b3acc768c15b4fd4a2fac2ed56258b91b0ede2555a236e8edbcc850,2024-11-21T01:47:39.383000 +CVE-2013-0476,0,0,dc6aabe42d7a21a372ca2453214681012645c0fa3d58164ba416af7237d74d21,2024-11-21T01:47:39.483000 +CVE-2013-0477,0,0,a82c263167f2c9c1df8b58642789d0c1fa0c3feeb9eb739273501fafb33aca45,2024-11-21T01:47:39.600000 +CVE-2013-0478,0,0,a4f40a8d43bfa66019d9c9cc807198c3810ee9d58352def667ac988c196b3d6c,2024-11-21T01:47:39.717000 +CVE-2013-0479,0,0,5a9d806d6a5a48e93b002a7760bbe780984ced8084fc6b31e86f64a876f46235,2024-11-21T01:47:39.830000 +CVE-2013-0481,0,0,4a936efb02e4a9a5f6cca5de7f6a7390444b9aedfe53c73c25426de9a42696e8,2024-11-21T01:47:39.933000 +CVE-2013-0482,0,0,61f2e4008acc55f21ad18359c149997803ada0f989b87bcadab2263d58a85fce,2024-11-21T01:47:40.037000 +CVE-2013-0483,0,0,ad73dbce32c5c3f072a8ab1e9d673322f99eef4950f15bad1a2d3226439bbd54,2024-11-21T01:47:40.163000 +CVE-2013-0484,0,0,af3590a041b60554090689f08a1f5d5de80cd7ceb30a78a77c2ebb2ec21bef8a,2024-11-21T01:47:40.280000 +CVE-2013-0485,0,0,ea2ccb7450f5992dcd966a37f756d5f35b2876f5843ff402119a0109ab3960eb,2024-11-21T01:47:40.390000 +CVE-2013-0486,0,0,b2cb098a5ffe7408774b436862f48d105dfb7af6c930fc33d90deaa768d207b0,2024-11-21T01:47:40.510000 +CVE-2013-0487,0,0,8eae52cc28a62838b9b2497673e5df487926af9529f062255991e47a64e731df,2024-11-21T01:47:40.623000 +CVE-2013-0488,0,0,8e3a7252f302d7bf057b034427082c01571d4fbcaec0627499cd04c55b011193,2024-11-21T01:47:40.730000 +CVE-2013-0489,0,0,acb99aab18272425757cdd2d16fcf1b8c802627f80b53f0e780fb1f48c46303b,2024-11-21T01:47:40.843000 +CVE-2013-0490,0,0,dc2f54dd0998aa42d53782e6d84db6300a0169bd69c446f504a44473daf004d0,2024-11-21T01:47:40.960000 +CVE-2013-0492,0,0,084254de1714f5dbc09f4d508b85e74f7ac5de431420a455a27db7423e9bad08,2024-11-21T01:47:41.063000 +CVE-2013-0494,0,0,695b8014026d9fd85107285a3b97148b1ffd4bbf8a9a1a16b7ffbfdf405a23ce,2024-11-21T01:47:41.173000 +CVE-2013-0499,0,0,c26765fe99ed428802364227cd60a116bd092c175cb1159d3605ce1a545523a9,2024-11-21T01:47:41.277000 +CVE-2013-0500,0,0,54a429f4ff56e5bacaada3b817e6335acbbb122ff0727a5f6b73508234a7b7c4,2024-11-21T01:47:41.410000 +CVE-2013-0501,0,0,883916ecaa98dc86a08596b9ffdb9d7d850c3081a0b831fb8f4ed7a9b69a00b4,2024-11-21T01:47:41.523000 +CVE-2013-0502,0,0,5b5d06435928ded4bef6c4f4d54e477a52f2ef837fc307b35b1d3fb4b8999a7f,2024-11-21T01:47:41.637000 +CVE-2013-0503,0,0,d10e1cd709a9e9cd583ff25bc19f7682e11f4cde22bf4e4575844d028d97411a,2024-11-21T01:47:41.743000 +CVE-2013-0504,0,0,390545190c6db18c6d5501cbaa7ac9e5f72c598a128f292e56925f653415da40,2024-11-21T01:47:41.870000 +CVE-2013-0505,0,0,294ff3b70f358655983a9f8bd1f923906ba19227e89e2a33910c892e56810133,2024-11-21T01:47:41.997000 +CVE-2013-0506,0,0,c817f213c1075e0f389627e3a0756ebc3005e9bd2f4b52826cd4252f0076b164,2024-11-21T01:47:42.107000 CVE-2013-0507,0,0,d123a7377d881949db46293eefc12e6d8e8f320f126e87e37e65f6d07e88b406,2020-02-07T17:06:56.547000 -CVE-2013-0508,0,1,b325b5f5b00fdb2e930df203cbeb921c5596f3ff9c33608b99b2ae8597600641,2024-11-21T01:47:42.343000 -CVE-2013-0509,0,1,2c25c9c024ba28b1e392c13e44b66313a42691125dc42594a69e51f2813f79f0,2024-11-21T01:47:42.453000 -CVE-2013-0510,0,1,9da1ac172dc0eb0335a6a4de35a6c15abe2db19cbbf13278096ddddcdc44922c,2024-11-21T01:47:42.557000 -CVE-2013-0511,0,1,41139ca622df2357edbb2594892aa16c8c306239c60bb294d8a12c87706d404f,2024-11-21T01:47:42.660000 -CVE-2013-0512,0,1,c738dddccbb4be3b435dcd1942108cea92e3e0858168b01a6bdc4ccbbf2c26f7,2024-11-21T01:47:42.760000 -CVE-2013-0513,0,1,32acaf8b2da300d488f7500fbab05f90e733950bd8c6ff19c0ca094da19117ed,2024-11-21T01:47:42.863000 +CVE-2013-0508,0,0,b325b5f5b00fdb2e930df203cbeb921c5596f3ff9c33608b99b2ae8597600641,2024-11-21T01:47:42.343000 +CVE-2013-0509,0,0,2c25c9c024ba28b1e392c13e44b66313a42691125dc42594a69e51f2813f79f0,2024-11-21T01:47:42.453000 +CVE-2013-0510,0,0,9da1ac172dc0eb0335a6a4de35a6c15abe2db19cbbf13278096ddddcdc44922c,2024-11-21T01:47:42.557000 +CVE-2013-0511,0,0,41139ca622df2357edbb2594892aa16c8c306239c60bb294d8a12c87706d404f,2024-11-21T01:47:42.660000 +CVE-2013-0512,0,0,c738dddccbb4be3b435dcd1942108cea92e3e0858168b01a6bdc4ccbbf2c26f7,2024-11-21T01:47:42.760000 +CVE-2013-0513,0,0,32acaf8b2da300d488f7500fbab05f90e733950bd8c6ff19c0ca094da19117ed,2024-11-21T01:47:42.863000 CVE-2013-0516,0,0,ccd97c7d4300418eca0a8d232640385402209119cea125b54fa0c832309ccf3e,2023-11-07T02:13:51.497000 CVE-2013-0517,0,0,f1177d62e88bfa6dca0bb795ce6e02c4f17ac3d57d45643b8a0050dac9855009,2020-02-13T15:53:53.967000 -CVE-2013-0518,0,1,edb2ef2032030b08787bcc88a81d8ef48e23889d3f9cecb703dc6a4b5e8e030c,2024-11-21T01:47:43.093000 -CVE-2013-0519,0,1,cb5f4ac3dbdbfb5d5b7a0a942b7a936277683b9f482daf4371ae58d24160a3d1,2024-11-21T01:47:43.190000 -CVE-2013-0520,0,1,82075f4683c17fe4d75c0b20db6cec04fb9eb28aeeece7468f1a33f0a3a79479,2024-11-21T01:47:43.300000 +CVE-2013-0518,0,0,edb2ef2032030b08787bcc88a81d8ef48e23889d3f9cecb703dc6a4b5e8e030c,2024-11-21T01:47:43.093000 +CVE-2013-0519,0,0,cb5f4ac3dbdbfb5d5b7a0a942b7a936277683b9f482daf4371ae58d24160a3d1,2024-11-21T01:47:43.190000 +CVE-2013-0520,0,0,82075f4683c17fe4d75c0b20db6cec04fb9eb28aeeece7468f1a33f0a3a79479,2024-11-21T01:47:43.300000 CVE-2013-0522,0,0,ad361f434042d7f827d95c26bb47d223fae807c2b78d5941d2230736cdbc6062,2018-09-17T17:56:48.263000 -CVE-2013-0523,0,1,3e40455ff6f5860808f3a1490f8f6c5b3dba6799478550e3fbb2fbf63add670b,2024-11-21T01:47:43.530000 -CVE-2013-0525,0,1,100250dbd4dff1e93423c0791d93ee30891c9e8ec5155e4b185c0c7c537cea95,2024-11-21T01:47:43.640000 -CVE-2013-0526,0,1,70563c6c14659910cf291cae539d115af20f48a7f4714d99fa05a33c1be4a793,2024-11-21T01:47:43.750000 -CVE-2013-0527,0,1,97c448ab9433f61ba4209d082247564f468c1bbf706aa0bff290dc211e19dff3,2024-11-21T01:47:43.867000 +CVE-2013-0523,0,0,3e40455ff6f5860808f3a1490f8f6c5b3dba6799478550e3fbb2fbf63add670b,2024-11-21T01:47:43.530000 +CVE-2013-0525,0,0,100250dbd4dff1e93423c0791d93ee30891c9e8ec5155e4b185c0c7c537cea95,2024-11-21T01:47:43.640000 +CVE-2013-0526,0,0,70563c6c14659910cf291cae539d115af20f48a7f4714d99fa05a33c1be4a793,2024-11-21T01:47:43.750000 +CVE-2013-0527,0,0,97c448ab9433f61ba4209d082247564f468c1bbf706aa0bff290dc211e19dff3,2024-11-21T01:47:43.867000 CVE-2013-0528,0,0,e0c6dec8edbe3b1e8ca304fc4fa672a6a3627c5c2762ce1a8d3dd700c01a2646,2023-11-07T02:13:51.773000 -CVE-2013-0529,0,1,8932fd8a3656dbec0ef2f9342f25a850c078591d4800902a121ae37f0e739858,2024-11-21T01:47:44.003000 -CVE-2013-0531,0,1,8e5a3865a93045a615878efffd7d614f6646f3e7b7984db795efb28db5513b87,2024-11-21T01:47:44.107000 -CVE-2013-0532,0,1,abb147ede37c5cef08e098e4cbc2ea5a6d00d2e64ae0a3df0165e111db6848fd,2024-11-21T01:47:44.210000 -CVE-2013-0533,0,1,3d55ce2a0af68c169366acba331717f515025160e85755768f819b77b3d88364,2024-11-21T01:47:44.320000 -CVE-2013-0534,0,1,e87cbf35f52a2cfae2b04e1627da68b9ae4c720082fcbddcaf9bcc2188fc2108,2024-11-21T01:47:44.420000 -CVE-2013-0535,0,1,0c1828d4a48dd490a11bfcf614bec3d37add357db543d13f34862909788d4f83,2024-11-21T01:47:44.523000 -CVE-2013-0536,0,1,7930cde89139b4f6e10e734f881de4c587b39e89dfe4cc347af23acc7f87aa30,2024-11-21T01:47:44.630000 -CVE-2013-0537,0,1,6ca347ef4e8a6d6b695ef10c8c04bd3d3aea56f9ede8148ba02002dcc19cf8ea,2024-11-21T01:47:44.733000 -CVE-2013-0538,0,1,5d73f626415ca099884256778974ffe2c9a12df5381e80a86aef746ec45fb050,2024-11-21T01:47:44.840000 -CVE-2013-0539,0,1,98c3eb82a88b76b928d6df6c369d4949408d14a51d3b2d26adafafc95237d039,2024-11-21T01:47:44.957000 -CVE-2013-0540,0,1,0d145483aa2a82ed8be5a5d8b6daa0638035c739d4d0c9002031ac0b48b73028,2024-11-21T01:47:45.063000 -CVE-2013-0541,0,1,c023fe15bdbff55655daef4529dd7a8af894cb0b6cf074d5ed1d5c17e17fa795,2024-11-21T01:47:45.177000 -CVE-2013-0542,0,1,16ec28e021ce24e50e4f76c9488cbb2f34c50b4dc3fe12b3011b70ec7af59017,2024-11-21T01:47:45.310000 -CVE-2013-0543,0,1,ab03b66c9e4a5e944135076a71e0d1f43c1161b1066c733b843c02bfdea0a7f7,2024-11-21T01:47:45.447000 -CVE-2013-0544,0,1,cbc8c93c31c9776546b92ae64d13ba88771fbe55b8ebfdf7c0c966228480c532,2024-11-21T01:47:45.567000 -CVE-2013-0548,0,1,1cd49d316c048471712f125f8ebd917004c119f2c00498446fa73a3d58487aa9,2024-11-21T01:47:45.690000 -CVE-2013-0549,0,1,ead8145336ec4dfb9e77c70a6d53ba98052fe9c04e2e94d3d6c46ec099097ffc,2024-11-21T01:47:45.827000 +CVE-2013-0529,0,0,8932fd8a3656dbec0ef2f9342f25a850c078591d4800902a121ae37f0e739858,2024-11-21T01:47:44.003000 +CVE-2013-0531,0,0,8e5a3865a93045a615878efffd7d614f6646f3e7b7984db795efb28db5513b87,2024-11-21T01:47:44.107000 +CVE-2013-0532,0,0,abb147ede37c5cef08e098e4cbc2ea5a6d00d2e64ae0a3df0165e111db6848fd,2024-11-21T01:47:44.210000 +CVE-2013-0533,0,0,3d55ce2a0af68c169366acba331717f515025160e85755768f819b77b3d88364,2024-11-21T01:47:44.320000 +CVE-2013-0534,0,0,e87cbf35f52a2cfae2b04e1627da68b9ae4c720082fcbddcaf9bcc2188fc2108,2024-11-21T01:47:44.420000 +CVE-2013-0535,0,0,0c1828d4a48dd490a11bfcf614bec3d37add357db543d13f34862909788d4f83,2024-11-21T01:47:44.523000 +CVE-2013-0536,0,0,7930cde89139b4f6e10e734f881de4c587b39e89dfe4cc347af23acc7f87aa30,2024-11-21T01:47:44.630000 +CVE-2013-0537,0,0,6ca347ef4e8a6d6b695ef10c8c04bd3d3aea56f9ede8148ba02002dcc19cf8ea,2024-11-21T01:47:44.733000 +CVE-2013-0538,0,0,5d73f626415ca099884256778974ffe2c9a12df5381e80a86aef746ec45fb050,2024-11-21T01:47:44.840000 +CVE-2013-0539,0,0,98c3eb82a88b76b928d6df6c369d4949408d14a51d3b2d26adafafc95237d039,2024-11-21T01:47:44.957000 +CVE-2013-0540,0,0,0d145483aa2a82ed8be5a5d8b6daa0638035c739d4d0c9002031ac0b48b73028,2024-11-21T01:47:45.063000 +CVE-2013-0541,0,0,c023fe15bdbff55655daef4529dd7a8af894cb0b6cf074d5ed1d5c17e17fa795,2024-11-21T01:47:45.177000 +CVE-2013-0542,0,0,16ec28e021ce24e50e4f76c9488cbb2f34c50b4dc3fe12b3011b70ec7af59017,2024-11-21T01:47:45.310000 +CVE-2013-0543,0,0,ab03b66c9e4a5e944135076a71e0d1f43c1161b1066c733b843c02bfdea0a7f7,2024-11-21T01:47:45.447000 +CVE-2013-0544,0,0,cbc8c93c31c9776546b92ae64d13ba88771fbe55b8ebfdf7c0c966228480c532,2024-11-21T01:47:45.567000 +CVE-2013-0548,0,0,1cd49d316c048471712f125f8ebd917004c119f2c00498446fa73a3d58487aa9,2024-11-21T01:47:45.690000 +CVE-2013-0549,0,0,ead8145336ec4dfb9e77c70a6d53ba98052fe9c04e2e94d3d6c46ec099097ffc,2024-11-21T01:47:45.827000 CVE-2013-0550,0,0,d62cf98068d0025f144f591d49d1c6db93369d8df160965f4526f4a6d205a3a5,2023-11-07T02:13:52.110000 -CVE-2013-0551,0,1,9eddfb54b63c37aadae7d8ea7650c304bae357248e5684dd972fb11498d71e42,2024-11-21T01:47:45.970000 -CVE-2013-0553,0,1,709f88fdc7a8bcf6b393a82cc78c73508a6dabce5843a56970910317412172a4,2024-11-21T01:47:46.093000 -CVE-2013-0558,0,1,c63a66bc5ce814e0f759eab10fd31c6f3eb0f80c077156fa8521535728ad7d6e,2024-11-21T01:47:46.203000 -CVE-2013-0559,0,1,b427b5f4731717e0dee73d455eb45300531c178791c5c279278f317334d2203f,2024-11-21T01:47:46.317000 -CVE-2013-0560,0,1,f55b86770eae3304e36d08c5eac5da6d6eabb2c2c837b971cdcce8278cb01da3,2024-11-21T01:47:46.430000 -CVE-2013-0565,0,1,db968475ac1498d60433cde0a1514800fa17201e024cbea90a123881b387215e,2024-11-21T01:47:46.543000 -CVE-2013-0566,0,1,0da9ce8d29a316ee42ce3e55993e735cb304a20174630dfc3fde337e95b33525,2024-11-21T01:47:46.667000 -CVE-2013-0567,0,1,92eb9ab642678e5a6ad014739c05cba550038718251974b429b43738c00ac3e3,2024-11-21T01:47:46.783000 -CVE-2013-0568,0,1,b3535cd5125467609ef9e09046a14abe542c4fc61aac7e8f884614bd5bc75507,2024-11-21T01:47:46.903000 -CVE-2013-0569,0,1,e134f92ffe7d97d636af8ab427fac3768fcd41a43b66c32c8096a454eb1957c6,2024-11-21T01:47:47.007000 +CVE-2013-0551,0,0,9eddfb54b63c37aadae7d8ea7650c304bae357248e5684dd972fb11498d71e42,2024-11-21T01:47:45.970000 +CVE-2013-0553,0,0,709f88fdc7a8bcf6b393a82cc78c73508a6dabce5843a56970910317412172a4,2024-11-21T01:47:46.093000 +CVE-2013-0558,0,0,c63a66bc5ce814e0f759eab10fd31c6f3eb0f80c077156fa8521535728ad7d6e,2024-11-21T01:47:46.203000 +CVE-2013-0559,0,0,b427b5f4731717e0dee73d455eb45300531c178791c5c279278f317334d2203f,2024-11-21T01:47:46.317000 +CVE-2013-0560,0,0,f55b86770eae3304e36d08c5eac5da6d6eabb2c2c837b971cdcce8278cb01da3,2024-11-21T01:47:46.430000 +CVE-2013-0565,0,0,db968475ac1498d60433cde0a1514800fa17201e024cbea90a123881b387215e,2024-11-21T01:47:46.543000 +CVE-2013-0566,0,0,0da9ce8d29a316ee42ce3e55993e735cb304a20174630dfc3fde337e95b33525,2024-11-21T01:47:46.667000 +CVE-2013-0567,0,0,92eb9ab642678e5a6ad014739c05cba550038718251974b429b43738c00ac3e3,2024-11-21T01:47:46.783000 +CVE-2013-0568,0,0,b3535cd5125467609ef9e09046a14abe542c4fc61aac7e8f884614bd5bc75507,2024-11-21T01:47:46.903000 +CVE-2013-0569,0,0,e134f92ffe7d97d636af8ab427fac3768fcd41a43b66c32c8096a454eb1957c6,2024-11-21T01:47:47.007000 CVE-2013-0570,0,0,1db91afa8e10dee409ae633040359d8a41aa41f81df69314def83f34ff39bdcf,2018-09-10T12:50:37.617000 -CVE-2013-0571,0,1,f55b059e7c0b87ce674e0a7aa0ace665613661e3ddc4e8ea8fb7ea5a1b00a597,2024-11-21T01:47:47.247000 -CVE-2013-0572,0,1,cc373eeadba0658285e2e80e1957db659616982df1f0e58b65ff79f5cb20f213,2024-11-21T01:47:47.383000 -CVE-2013-0576,0,1,d578d5a7661b4990989648477df62467ff6b3e96f38b5d3c39cf8b9eb71fcf80,2024-11-21T01:47:47.500000 -CVE-2013-0577,0,1,6739d8b1dc124793df4ce6be4a55f344bebbf4d177d4b03dd344434ffa518693,2024-11-21T01:47:47.617000 -CVE-2013-0578,0,1,9f84f68a53510972cb0644d8471dd6bb5534eacff6d783617ba8e15b534e7a97,2024-11-21T01:47:47.727000 -CVE-2013-0579,0,1,ffbe023a9d76230ddf2d36ea23ba77bfde5860ece76a4064d79b4b89a1d622ed,2024-11-21T01:47:47.853000 -CVE-2013-0580,0,1,b84f57c976955a17e25780f0b37f03cf73979a0576855dc14f8a6c7b47179e9d,2024-11-21T01:47:47.967000 -CVE-2013-0581,0,1,cef5c5cbf35e0ffed59e97802ed13b1240fc54261555738958fcc7df175a9d46,2024-11-21T01:47:48.080000 -CVE-2013-0582,0,1,51369f66f27f44043140acf1d860db72fd7f1fd6f371c4d93bc37697cf21b272,2024-11-21T01:47:48.200000 -CVE-2013-0584,0,1,10a16111db8ebfdfa4eb8003fafc80834f6ace57ffa828b793c421e753378a69,2024-11-21T01:47:48.317000 -CVE-2013-0585,0,1,8a0a247db76da4d1877574f7e3f6ec2c0eeb0bb3dbbb6cc5c55d3f5bd862b1ce,2024-11-21T01:47:48.433000 -CVE-2013-0586,0,1,7ac91f442836ce7fe1ed330f035a455cd6a9ce506cda6860018d2a63e894f0d5,2024-11-21T01:47:48.543000 -CVE-2013-0587,0,1,8772cc40b0850f5a2b3cdab84a25049db836b3480b41a5748cd1982bf4885612,2024-11-21T01:47:48.653000 +CVE-2013-0571,0,0,f55b059e7c0b87ce674e0a7aa0ace665613661e3ddc4e8ea8fb7ea5a1b00a597,2024-11-21T01:47:47.247000 +CVE-2013-0572,0,0,cc373eeadba0658285e2e80e1957db659616982df1f0e58b65ff79f5cb20f213,2024-11-21T01:47:47.383000 +CVE-2013-0576,0,0,d578d5a7661b4990989648477df62467ff6b3e96f38b5d3c39cf8b9eb71fcf80,2024-11-21T01:47:47.500000 +CVE-2013-0577,0,0,6739d8b1dc124793df4ce6be4a55f344bebbf4d177d4b03dd344434ffa518693,2024-11-21T01:47:47.617000 +CVE-2013-0578,0,0,9f84f68a53510972cb0644d8471dd6bb5534eacff6d783617ba8e15b534e7a97,2024-11-21T01:47:47.727000 +CVE-2013-0579,0,0,ffbe023a9d76230ddf2d36ea23ba77bfde5860ece76a4064d79b4b89a1d622ed,2024-11-21T01:47:47.853000 +CVE-2013-0580,0,0,b84f57c976955a17e25780f0b37f03cf73979a0576855dc14f8a6c7b47179e9d,2024-11-21T01:47:47.967000 +CVE-2013-0581,0,0,cef5c5cbf35e0ffed59e97802ed13b1240fc54261555738958fcc7df175a9d46,2024-11-21T01:47:48.080000 +CVE-2013-0582,0,0,51369f66f27f44043140acf1d860db72fd7f1fd6f371c4d93bc37697cf21b272,2024-11-21T01:47:48.200000 +CVE-2013-0584,0,0,10a16111db8ebfdfa4eb8003fafc80834f6ace57ffa828b793c421e753378a69,2024-11-21T01:47:48.317000 +CVE-2013-0585,0,0,8a0a247db76da4d1877574f7e3f6ec2c0eeb0bb3dbbb6cc5c55d3f5bd862b1ce,2024-11-21T01:47:48.433000 +CVE-2013-0586,0,0,7ac91f442836ce7fe1ed330f035a455cd6a9ce506cda6860018d2a63e894f0d5,2024-11-21T01:47:48.543000 +CVE-2013-0587,0,0,8772cc40b0850f5a2b3cdab84a25049db836b3480b41a5748cd1982bf4885612,2024-11-21T01:47:48.653000 CVE-2013-0589,0,0,2d54661a8f1ce3be51e5c4c3a03ecbe2f7ac9274810a550f812723579f35712b,2018-09-04T18:11:38.993000 -CVE-2013-0590,0,1,b38c189999b428937758ad960783a1c23e3fbda77c648e9e6acb88d021c79d31,2024-11-21T01:47:48.917000 -CVE-2013-0591,0,1,2369d01057c69259b2552a36423880940fe246eebaeab2d7fdc449f3c28d39ea,2024-11-21T01:47:49.027000 +CVE-2013-0590,0,0,b38c189999b428937758ad960783a1c23e3fbda77c648e9e6acb88d021c79d31,2024-11-21T01:47:48.917000 +CVE-2013-0591,0,0,2369d01057c69259b2552a36423880940fe246eebaeab2d7fdc449f3c28d39ea,2024-11-21T01:47:49.027000 CVE-2013-0592,0,0,707c21359f04e9da4dd61a024dceb8fe507a58984141204a9640fc65f655faf6,2018-09-04T17:39:22.330000 -CVE-2013-0593,0,1,e174ee74c396273ecade707bd9ae9968b0a76257e3f339098d04a80299902fc0,2024-11-21T01:47:49.277000 +CVE-2013-0593,0,0,e174ee74c396273ecade707bd9ae9968b0a76257e3f339098d04a80299902fc0,2024-11-21T01:47:49.277000 CVE-2013-0594,0,0,b5db5cb20cc04e6b1861cb88e0b3af32049dc6b2e7a7f56668cb15abff7f026e,2018-09-04T17:49:29.627000 -CVE-2013-0595,0,1,d7904adc355e84ca04dcbba023c92b96cd02923a931d4b6a22520ec38a857fa5,2024-11-21T01:47:49.497000 -CVE-2013-0596,0,1,0fb412547ef1f0d8a306ab0de3371cd0f001fdbcaea24a7c63c4518aa456c094,2024-11-21T01:47:49.613000 -CVE-2013-0597,0,1,917cf29deee5ba1a2bf99b2a1c7203be3e846502d2454c42771729cf6e2e3eaa,2024-11-21T01:47:49.737000 -CVE-2013-0598,0,1,c0bcfb2ba92f60d2a8926c3511df6ef5234cb38eaf2359f705eba2169b8b6225,2024-11-21T01:47:49.860000 -CVE-2013-0599,0,1,b5ac2c8d698281c2cef74ebafbdacf4e77aef06afe07eedd2d87ee66b9cec266,2024-11-21T01:47:49.977000 -CVE-2013-0600,0,1,2d5b2fde170e0f008f281f40fc4cab1925797cc928fbc9e4690bc2ff8b2063a7,2024-11-21T01:47:50.097000 -CVE-2013-0601,0,1,2851a59c88f4010305ffd38621009d4fdb853076707f38ccdb40afbe5f305b2d,2024-11-21T01:47:50.230000 -CVE-2013-0602,0,1,47003e20eaf523eba8f6a12538a7295716f84fb84778cc825d30461c20fb6560,2024-11-21T01:47:50.373000 -CVE-2013-0603,0,1,1f7c957c5a027b6cf2ed4b59ff1bbf1621b46e336dec8619b2e3a96c94fd2d62,2024-11-21T01:47:50.503000 -CVE-2013-0604,0,1,5c48c82fe00f486fa43b7ab00630cef2aac7641a26d6145f389ec8e7733ff466,2024-11-21T01:47:50.640000 -CVE-2013-0605,0,1,fb318ec5959d81b1e63de771b81045f8aa3086fc410bb2191f611f0b722a8ba2,2024-11-21T01:47:50.767000 -CVE-2013-0606,0,1,17e0102f7d2458d748ff072a706895dcde8c1655941cda804198d8481f2b62c6,2024-11-21T01:47:50.897000 -CVE-2013-0607,0,1,19d64b3f4ce5924a7e77d9637bf5ce1a37d77f2948690229d8fab0c1577bd306,2024-11-21T01:47:51.033000 -CVE-2013-0608,0,1,f59950950c7de1006caea036d3d97ec49cd1ec6cda2831ab86c70f297324542c,2024-11-21T01:47:51.170000 -CVE-2013-0609,0,1,62b6b1e7f49ffa09f4eaa899aa8a8eb2c9f690140a3fd9d6b209b8e929cace0c,2024-11-21T01:47:51.310000 -CVE-2013-0610,0,1,020423fd0add7f6d77b87c39f29e936c295c6ad215628e64dd003440fc533a1a,2024-11-21T01:47:51.463000 -CVE-2013-0611,0,1,e7a4d253939b2b5e7d1f728c598438f62dc7e3e4c36bc3c9663246302acde628,2024-11-21T01:47:51.590000 -CVE-2013-0612,0,1,7ce401750cd124ddc466e2558a4602d42ac853823e9518e74a3add0ea887b833,2024-11-21T01:47:51.723000 -CVE-2013-0613,0,1,d3a42770fbd27c44230436078ef759aa2b583b0f7d693f4bdeb1f950de0de082,2024-11-21T01:47:51.860000 -CVE-2013-0614,0,1,dcc4033f941e8ffb90ffed8cc84a2dcde65eeb75480458f0748482ebbd4dac92,2024-11-21T01:47:52.010000 -CVE-2013-0615,0,1,04b05534ee7ce2d60865500014e705379607b03b48717ca5fd801a6bbe4945d2,2024-11-21T01:47:52.150000 -CVE-2013-0616,0,1,504f59672148efc5a44f12d3636ff54f2993d28b85fbda5b034f1da0a9a28114,2024-11-21T01:47:52.293000 -CVE-2013-0617,0,1,8e2ee25ed96c80fcee56fa2fd746dc2462d21b9847e297005c16b5b39c6f6fb9,2024-11-21T01:47:52.430000 -CVE-2013-0618,0,1,188a07dca1c3d04c5a72a41533126fbb4d2caec59e9c9b1de05d983ce38e5cf8,2024-11-21T01:47:52.593000 -CVE-2013-0619,0,1,a488889c69b9a1122b75c7b9fac7a4536025bbca99d1eb2cd8c5857326423e9f,2024-11-21T01:47:52.740000 -CVE-2013-0620,0,1,2a034b7f924e5c953676e7d879587ee93c4e38d13e3f974c302d925445f34eb6,2024-11-21T01:47:52.867000 -CVE-2013-0621,0,1,7c1d2e1a43c70cda5a7c11655434b2fee9a7add3f695f2a17e2d0b99e892c411,2024-11-21T01:47:53.013000 -CVE-2013-0622,0,1,afcdc496559dbd9c00999dd211a4ee2fb0bd2dcd04f594fee0390969aa11f9bc,2024-11-21T01:47:53.150000 -CVE-2013-0623,0,1,265fbedc78d939eff37fcdd64c77d323305c62d476981707d40e959328f58d7b,2024-11-21T01:47:53.303000 -CVE-2013-0624,0,1,66f4052bcb3d55f80af9340daf2cdee7580f253606fd3f2016fad5c31532420b,2024-11-21T01:47:53.453000 -CVE-2013-0625,0,1,da054026cb889e53b57b2d6a158755d385070928f874d1d56795cfccb7b89555,2024-11-21T01:47:53.580000 -CVE-2013-0626,0,1,2530e38df10fae17a763608aae1def952bc2c94a8d187245b484f3eedc05e965,2024-11-21T01:47:53.700000 -CVE-2013-0627,0,1,6b9f7123449a119821db41082ad99beff831475f8f15e18dfa12148631978ca0,2024-11-21T01:47:53.840000 +CVE-2013-0595,0,0,d7904adc355e84ca04dcbba023c92b96cd02923a931d4b6a22520ec38a857fa5,2024-11-21T01:47:49.497000 +CVE-2013-0596,0,0,0fb412547ef1f0d8a306ab0de3371cd0f001fdbcaea24a7c63c4518aa456c094,2024-11-21T01:47:49.613000 +CVE-2013-0597,0,0,917cf29deee5ba1a2bf99b2a1c7203be3e846502d2454c42771729cf6e2e3eaa,2024-11-21T01:47:49.737000 +CVE-2013-0598,0,0,c0bcfb2ba92f60d2a8926c3511df6ef5234cb38eaf2359f705eba2169b8b6225,2024-11-21T01:47:49.860000 +CVE-2013-0599,0,0,b5ac2c8d698281c2cef74ebafbdacf4e77aef06afe07eedd2d87ee66b9cec266,2024-11-21T01:47:49.977000 +CVE-2013-0600,0,0,2d5b2fde170e0f008f281f40fc4cab1925797cc928fbc9e4690bc2ff8b2063a7,2024-11-21T01:47:50.097000 +CVE-2013-0601,0,0,2851a59c88f4010305ffd38621009d4fdb853076707f38ccdb40afbe5f305b2d,2024-11-21T01:47:50.230000 +CVE-2013-0602,0,0,47003e20eaf523eba8f6a12538a7295716f84fb84778cc825d30461c20fb6560,2024-11-21T01:47:50.373000 +CVE-2013-0603,0,0,1f7c957c5a027b6cf2ed4b59ff1bbf1621b46e336dec8619b2e3a96c94fd2d62,2024-11-21T01:47:50.503000 +CVE-2013-0604,0,0,5c48c82fe00f486fa43b7ab00630cef2aac7641a26d6145f389ec8e7733ff466,2024-11-21T01:47:50.640000 +CVE-2013-0605,0,0,fb318ec5959d81b1e63de771b81045f8aa3086fc410bb2191f611f0b722a8ba2,2024-11-21T01:47:50.767000 +CVE-2013-0606,0,0,17e0102f7d2458d748ff072a706895dcde8c1655941cda804198d8481f2b62c6,2024-11-21T01:47:50.897000 +CVE-2013-0607,0,0,19d64b3f4ce5924a7e77d9637bf5ce1a37d77f2948690229d8fab0c1577bd306,2024-11-21T01:47:51.033000 +CVE-2013-0608,0,0,f59950950c7de1006caea036d3d97ec49cd1ec6cda2831ab86c70f297324542c,2024-11-21T01:47:51.170000 +CVE-2013-0609,0,0,62b6b1e7f49ffa09f4eaa899aa8a8eb2c9f690140a3fd9d6b209b8e929cace0c,2024-11-21T01:47:51.310000 +CVE-2013-0610,0,0,020423fd0add7f6d77b87c39f29e936c295c6ad215628e64dd003440fc533a1a,2024-11-21T01:47:51.463000 +CVE-2013-0611,0,0,e7a4d253939b2b5e7d1f728c598438f62dc7e3e4c36bc3c9663246302acde628,2024-11-21T01:47:51.590000 +CVE-2013-0612,0,0,7ce401750cd124ddc466e2558a4602d42ac853823e9518e74a3add0ea887b833,2024-11-21T01:47:51.723000 +CVE-2013-0613,0,0,d3a42770fbd27c44230436078ef759aa2b583b0f7d693f4bdeb1f950de0de082,2024-11-21T01:47:51.860000 +CVE-2013-0614,0,0,dcc4033f941e8ffb90ffed8cc84a2dcde65eeb75480458f0748482ebbd4dac92,2024-11-21T01:47:52.010000 +CVE-2013-0615,0,0,04b05534ee7ce2d60865500014e705379607b03b48717ca5fd801a6bbe4945d2,2024-11-21T01:47:52.150000 +CVE-2013-0616,0,0,504f59672148efc5a44f12d3636ff54f2993d28b85fbda5b034f1da0a9a28114,2024-11-21T01:47:52.293000 +CVE-2013-0617,0,0,8e2ee25ed96c80fcee56fa2fd746dc2462d21b9847e297005c16b5b39c6f6fb9,2024-11-21T01:47:52.430000 +CVE-2013-0618,0,0,188a07dca1c3d04c5a72a41533126fbb4d2caec59e9c9b1de05d983ce38e5cf8,2024-11-21T01:47:52.593000 +CVE-2013-0619,0,0,a488889c69b9a1122b75c7b9fac7a4536025bbca99d1eb2cd8c5857326423e9f,2024-11-21T01:47:52.740000 +CVE-2013-0620,0,0,2a034b7f924e5c953676e7d879587ee93c4e38d13e3f974c302d925445f34eb6,2024-11-21T01:47:52.867000 +CVE-2013-0621,0,0,7c1d2e1a43c70cda5a7c11655434b2fee9a7add3f695f2a17e2d0b99e892c411,2024-11-21T01:47:53.013000 +CVE-2013-0622,0,0,afcdc496559dbd9c00999dd211a4ee2fb0bd2dcd04f594fee0390969aa11f9bc,2024-11-21T01:47:53.150000 +CVE-2013-0623,0,0,265fbedc78d939eff37fcdd64c77d323305c62d476981707d40e959328f58d7b,2024-11-21T01:47:53.303000 +CVE-2013-0624,0,0,66f4052bcb3d55f80af9340daf2cdee7580f253606fd3f2016fad5c31532420b,2024-11-21T01:47:53.453000 +CVE-2013-0625,0,0,da054026cb889e53b57b2d6a158755d385070928f874d1d56795cfccb7b89555,2024-11-21T01:47:53.580000 +CVE-2013-0626,0,0,2530e38df10fae17a763608aae1def952bc2c94a8d187245b484f3eedc05e965,2024-11-21T01:47:53.700000 +CVE-2013-0627,0,0,6b9f7123449a119821db41082ad99beff831475f8f15e18dfa12148631978ca0,2024-11-21T01:47:53.840000 CVE-2013-0628,0,0,1b71d922a7f6e32bbd02b308dfc49231e895402783a5845b840886d7760bdd2c,2023-11-07T02:13:52.797000 -CVE-2013-0629,0,1,a53bec64b6afeb26e827d0e4b8405625023946ed90ac42dfc2362136e58726c9,2024-11-21T01:47:53.993000 -CVE-2013-0630,0,1,7687c93879695f73d7bffba3120cabaf9d1ae00aa95e8ebfbb3995deedb235cd,2024-11-21T01:47:54.110000 -CVE-2013-0631,0,1,28d648581768cba01e1f3192e3817b211987b664e437269e3760a1a547bc6fc7,2024-11-21T01:47:54.233000 -CVE-2013-0632,0,1,c4b6a627e8d8397e70a45fee4b70ca1250c75b514e2a05c9d924ac110951256e,2024-11-21T01:47:54.340000 -CVE-2013-0633,0,1,6905d1760d76fa22d5718e42f47801d6a04131296858bd1fadcf4ed120f49a3b,2024-11-21T01:47:54.453000 -CVE-2013-0634,0,1,ac25d2a8d328960a17391fe60b5cd81f4bca3a073b9250eb50c4e8c4e2a0714d,2024-11-21T01:47:54.573000 -CVE-2013-0635,0,1,604e1776bdef4de8811b54f0c14b6dc2e5659c0847659418808c66003e74ebb1,2024-11-21T01:47:54.697000 -CVE-2013-0636,0,1,da7d482e1d4083887eba19613a5d26d18dacf4f375d6e157f622e1c4bc43cfbb,2024-11-21T01:47:54.810000 -CVE-2013-0637,0,1,9e2cfc9a8fffc2da4e31fbb25e8baa57b0790926901af513bef77b5c97747788,2024-11-21T01:47:54.933000 -CVE-2013-0638,0,1,3cb638acd2573c3e3605f04b1c30c452ebdff2598bb852923ab7dd050fc31713,2024-11-21T01:47:55.070000 -CVE-2013-0639,0,1,2950fc36be9ad4159ebc7537dea36decec1bcbad426e11849017b1d214bb7b7d,2024-11-21T01:47:55.193000 -CVE-2013-0640,0,1,294ff88766f15f21593d9f11d105bb61f07835560c19df8511b436c7cf37a345,2024-11-21T01:47:55.317000 -CVE-2013-0641,0,1,b795221e452a1479f3aa001ed9c1c92ce1e6a741c2724ece0c730c2323baf5a9,2024-11-21T01:47:55.457000 -CVE-2013-0642,0,1,af9ab014a8a75da9cf67c2868ca0da99d00b9cdd89d50f96758f01b18de43e2a,2024-11-21T01:47:55.600000 -CVE-2013-0643,0,1,b8e26d8e4fc32491750885cce4c2dc42b94d92fa45a378011dea3da1ad0d4c9c,2024-11-21T01:47:55.723000 -CVE-2013-0644,0,1,442b24ea0dd3949e6f1b302eefbfbbdf461821117288739d073115eff1211509,2024-11-21T01:47:55.937000 -CVE-2013-0645,0,1,97133acf3b51b96fccaa91f9755b20effcbd6022297ca51bf77e83e144b35acb,2024-11-21T01:47:56.063000 -CVE-2013-0646,0,1,d18135916c8453326cb6c5b47f39dd42e1ca8119d5bff175d60fdc8538c3e3eb,2024-11-21T01:47:56.187000 -CVE-2013-0647,0,1,53cf103ab0697c0edcd9f993eb8b6cbb58c7f60ff949bdbd81131a92b18c061a,2024-11-21T01:47:56.330000 -CVE-2013-0648,0,1,1934a7bff74db471371c21bf53226374766c1fdbc048409e73d21858e29c2b2c,2024-11-21T01:47:56.450000 -CVE-2013-0649,0,1,9b493f02eebf31180b35145791fc0376bc68c1f1d35679cfa22800ca7efd7004,2024-11-21T01:47:56.630000 -CVE-2013-0650,0,1,db95b9c80900a3b66c41d15647548e6be1b17af8787c42202aa0b5ef308515ac,2024-11-21T01:47:56.757000 -CVE-2013-0651,0,1,3be21fba1d02f3b7bcfb9e9fec423c69724afbad3e3ac04e6fa42df3b65ea03b,2024-11-21T01:47:56.893000 -CVE-2013-0652,0,1,3ebfcec79f7d8af77cc3c1fbcd4ffeccd2f38e08de4a28b0d07e1c8daff8e306,2024-11-21T01:47:57 -CVE-2013-0653,0,1,bc95ca97c1852debfee4b26e8939eac5b2419ffedb863911436a3d89124796b4,2024-11-21T01:47:57.110000 -CVE-2013-0654,0,1,940e2462dc4f4f7a894b5962ba977b319cfc2dd5e53110e63544060f1c1ce7cb,2024-11-21T01:47:57.213000 -CVE-2013-0655,0,1,375037f37f1ca15dcdeceadbd93455397cf381a5825c87642a9bb5cfae011a6e,2024-11-21T01:47:57.327000 -CVE-2013-0656,0,1,5f4f538f2b4779768684f8d81273cd29058b9ceeb9decb000544d9059370aadd,2024-11-21T01:47:57.430000 -CVE-2013-0657,0,1,40766e481eec41f21a4f6966cdac9f6b06c6254c323add6ad539c00f5f7094d2,2024-11-21T01:47:57.540000 -CVE-2013-0658,0,1,8e60174ff27cbe5635742f33c3f56cb521e58a16c3936dfb70429fdd4a0282d7,2024-11-21T01:47:57.680000 -CVE-2013-0659,0,1,fd52e6faa466ba899f9efda03c1b3d144f8379bf82a07efd28c223199c396d14,2024-11-21T01:47:57.793000 -CVE-2013-0662,0,1,0e5b1d26aad0d7a7e2072419c58a83cdff216f054a170418652b5982afde0466,2024-11-21T01:47:57.897000 -CVE-2013-0663,0,1,ddc5fa31effd41cc324b92373cf6205c79cd799c8d47db5320d3fed47c51680f,2024-11-21T01:47:58.017000 -CVE-2013-0664,0,1,67423ff8ea910fa04f6a2e8b213ceee1047ff9be11101364c5def2b3084974d5,2024-11-21T01:47:58.130000 -CVE-2013-0665,0,1,71e6f792109828a712edbd9269362e38c9154bf6c7737e553820b770396aee95,2024-11-21T01:47:58.250000 -CVE-2013-0666,0,1,13fd790438e7fd097d41d8db9addce378bc2909b6c6478b57d3bd001f9ec2e24,2024-11-21T01:47:58.357000 -CVE-2013-0667,0,1,6b8367380e481ac8a24592ab83cfb2cfc4fce818f0b7dd4def710d012aa84cf3,2024-11-21T01:47:58.463000 -CVE-2013-0668,0,1,392c9f1bcbd9ba7acead9ede4f492bb2416f5d01b946b8b4ed3dc5ecdc411ce1,2024-11-21T01:47:58.570000 -CVE-2013-0669,0,1,bc142a7e286fe089f8e20f16bf3aca4d2d49184fecb3d83ef68e6289bda3dbaa,2024-11-21T01:47:58.677000 -CVE-2013-0670,0,1,b010ab1d1d710928b26bb056ff255e851b318f904c02af1889f36406263b5c2a,2024-11-21T01:47:58.790000 -CVE-2013-0671,0,1,f6d6e7356d720798e8b15257e33bb3f257702ae76de6f363822fa2e0c329c9c7,2024-11-21T01:47:58.900000 -CVE-2013-0672,0,1,28084232fdbd26bb1526565f9e3fa18a3f81492c7116f73b6ee9bac7a0127a4a,2024-11-21T01:47:59.007000 -CVE-2013-0673,0,1,bbe06076b383aeb0238dda68dd04ddb0cddb854437ccb2a2a8cec5146f72e633,2024-11-21T01:47:59.120000 -CVE-2013-0674,0,1,ea80c136b539da168568d9505e5a3f53500a88ca104d8cef2c95626da18fa437,2024-11-21T01:47:59.223000 -CVE-2013-0675,0,1,006e8590f00afce8d88ebe3de32182a3d3d8cafcd60ff2996e244318f9dbb79e,2024-11-21T01:47:59.333000 -CVE-2013-0676,0,1,5d793ce9bb5b5b3a348a5779d7d6032e7d9605e6401173c6ad201bc1a31c4de2,2024-11-21T01:47:59.443000 -CVE-2013-0677,0,1,73994ae112befba91033987a9c7ba1f733aa1cef438c69d8416969fb5063a815,2024-11-21T01:47:59.553000 -CVE-2013-0678,0,1,7baa3d079bb7523ebec1edf1746c366793aeb0d52e26f4debc2d90d99e7081ba,2024-11-21T01:47:59.673000 -CVE-2013-0679,0,1,b71c5af1a59c67382ac5e555941e1decc716897b826c3cc19b4ec6f9954823d4,2024-11-21T01:47:59.783000 -CVE-2013-0680,0,1,34cf13b66d8d0e334345a16be3852075f2c5e2ff08dd513c9dafbe071eeda198,2024-11-21T01:47:59.903000 -CVE-2013-0681,0,1,d81f9afc647c80883682a529de1e429ccda714133f03b20cb12d9f85b5b7d453,2024-11-21T01:48:00.017000 -CVE-2013-0682,0,1,ae3d2bf38cfb71686c939cbc4ca28be3309aa450e8ef638130ef8067a5b5a1cd,2024-11-21T01:48:00.127000 -CVE-2013-0683,0,1,a6f8a39a78ab606605139695ecda07ff8349559e172c69902f35c85de8f0a7f5,2024-11-21T01:48:00.233000 -CVE-2013-0684,0,1,81a91aa38131a3d7dd360cba3786498764b2066d1f3b83d009e496686830c0e4,2024-11-21T01:48:00.350000 -CVE-2013-0685,0,1,3d9939b0d29fc2aba5a323d363aa657eaf0da6503ed0c8a01b44589368cae784,2024-11-21T01:48:00.443000 -CVE-2013-0686,0,1,5ee3bf806ea313375b7d4a3f977120364bab121fa90c6fc3a489592977327ea4,2024-11-21T01:48:00.550000 -CVE-2013-0687,0,1,3351ffe9365dbe81c4828212482539aa4887e17211656a6a0ef315bf436211c4,2024-11-21T01:48:00.650000 -CVE-2013-0688,0,1,1aed9412a8fb2c042bbf80312eb0a8dc8c0a736998fd294917e1333f772f3ba6,2024-11-21T01:48:00.753000 -CVE-2013-0689,0,1,ff2bdab787cccfa72cdb52312d5eed9cec8e883c93b8b5d7efb36b194889a1f5,2024-11-21T01:48:00.857000 +CVE-2013-0629,0,0,a53bec64b6afeb26e827d0e4b8405625023946ed90ac42dfc2362136e58726c9,2024-11-21T01:47:53.993000 +CVE-2013-0630,0,0,7687c93879695f73d7bffba3120cabaf9d1ae00aa95e8ebfbb3995deedb235cd,2024-11-21T01:47:54.110000 +CVE-2013-0631,0,0,28d648581768cba01e1f3192e3817b211987b664e437269e3760a1a547bc6fc7,2024-11-21T01:47:54.233000 +CVE-2013-0632,0,0,c4b6a627e8d8397e70a45fee4b70ca1250c75b514e2a05c9d924ac110951256e,2024-11-21T01:47:54.340000 +CVE-2013-0633,0,0,6905d1760d76fa22d5718e42f47801d6a04131296858bd1fadcf4ed120f49a3b,2024-11-21T01:47:54.453000 +CVE-2013-0634,0,0,ac25d2a8d328960a17391fe60b5cd81f4bca3a073b9250eb50c4e8c4e2a0714d,2024-11-21T01:47:54.573000 +CVE-2013-0635,0,0,604e1776bdef4de8811b54f0c14b6dc2e5659c0847659418808c66003e74ebb1,2024-11-21T01:47:54.697000 +CVE-2013-0636,0,0,da7d482e1d4083887eba19613a5d26d18dacf4f375d6e157f622e1c4bc43cfbb,2024-11-21T01:47:54.810000 +CVE-2013-0637,0,0,9e2cfc9a8fffc2da4e31fbb25e8baa57b0790926901af513bef77b5c97747788,2024-11-21T01:47:54.933000 +CVE-2013-0638,0,0,3cb638acd2573c3e3605f04b1c30c452ebdff2598bb852923ab7dd050fc31713,2024-11-21T01:47:55.070000 +CVE-2013-0639,0,0,2950fc36be9ad4159ebc7537dea36decec1bcbad426e11849017b1d214bb7b7d,2024-11-21T01:47:55.193000 +CVE-2013-0640,0,0,294ff88766f15f21593d9f11d105bb61f07835560c19df8511b436c7cf37a345,2024-11-21T01:47:55.317000 +CVE-2013-0641,0,0,b795221e452a1479f3aa001ed9c1c92ce1e6a741c2724ece0c730c2323baf5a9,2024-11-21T01:47:55.457000 +CVE-2013-0642,0,0,af9ab014a8a75da9cf67c2868ca0da99d00b9cdd89d50f96758f01b18de43e2a,2024-11-21T01:47:55.600000 +CVE-2013-0643,0,0,b8e26d8e4fc32491750885cce4c2dc42b94d92fa45a378011dea3da1ad0d4c9c,2024-11-21T01:47:55.723000 +CVE-2013-0644,0,0,442b24ea0dd3949e6f1b302eefbfbbdf461821117288739d073115eff1211509,2024-11-21T01:47:55.937000 +CVE-2013-0645,0,0,97133acf3b51b96fccaa91f9755b20effcbd6022297ca51bf77e83e144b35acb,2024-11-21T01:47:56.063000 +CVE-2013-0646,0,0,d18135916c8453326cb6c5b47f39dd42e1ca8119d5bff175d60fdc8538c3e3eb,2024-11-21T01:47:56.187000 +CVE-2013-0647,0,0,53cf103ab0697c0edcd9f993eb8b6cbb58c7f60ff949bdbd81131a92b18c061a,2024-11-21T01:47:56.330000 +CVE-2013-0648,0,0,1934a7bff74db471371c21bf53226374766c1fdbc048409e73d21858e29c2b2c,2024-11-21T01:47:56.450000 +CVE-2013-0649,0,0,9b493f02eebf31180b35145791fc0376bc68c1f1d35679cfa22800ca7efd7004,2024-11-21T01:47:56.630000 +CVE-2013-0650,0,0,db95b9c80900a3b66c41d15647548e6be1b17af8787c42202aa0b5ef308515ac,2024-11-21T01:47:56.757000 +CVE-2013-0651,0,0,3be21fba1d02f3b7bcfb9e9fec423c69724afbad3e3ac04e6fa42df3b65ea03b,2024-11-21T01:47:56.893000 +CVE-2013-0652,0,0,3ebfcec79f7d8af77cc3c1fbcd4ffeccd2f38e08de4a28b0d07e1c8daff8e306,2024-11-21T01:47:57 +CVE-2013-0653,0,0,bc95ca97c1852debfee4b26e8939eac5b2419ffedb863911436a3d89124796b4,2024-11-21T01:47:57.110000 +CVE-2013-0654,0,0,940e2462dc4f4f7a894b5962ba977b319cfc2dd5e53110e63544060f1c1ce7cb,2024-11-21T01:47:57.213000 +CVE-2013-0655,0,0,375037f37f1ca15dcdeceadbd93455397cf381a5825c87642a9bb5cfae011a6e,2024-11-21T01:47:57.327000 +CVE-2013-0656,0,0,5f4f538f2b4779768684f8d81273cd29058b9ceeb9decb000544d9059370aadd,2024-11-21T01:47:57.430000 +CVE-2013-0657,0,0,40766e481eec41f21a4f6966cdac9f6b06c6254c323add6ad539c00f5f7094d2,2024-11-21T01:47:57.540000 +CVE-2013-0658,0,0,8e60174ff27cbe5635742f33c3f56cb521e58a16c3936dfb70429fdd4a0282d7,2024-11-21T01:47:57.680000 +CVE-2013-0659,0,0,fd52e6faa466ba899f9efda03c1b3d144f8379bf82a07efd28c223199c396d14,2024-11-21T01:47:57.793000 +CVE-2013-0662,0,0,0e5b1d26aad0d7a7e2072419c58a83cdff216f054a170418652b5982afde0466,2024-11-21T01:47:57.897000 +CVE-2013-0663,0,0,ddc5fa31effd41cc324b92373cf6205c79cd799c8d47db5320d3fed47c51680f,2024-11-21T01:47:58.017000 +CVE-2013-0664,0,0,67423ff8ea910fa04f6a2e8b213ceee1047ff9be11101364c5def2b3084974d5,2024-11-21T01:47:58.130000 +CVE-2013-0665,0,0,71e6f792109828a712edbd9269362e38c9154bf6c7737e553820b770396aee95,2024-11-21T01:47:58.250000 +CVE-2013-0666,0,0,13fd790438e7fd097d41d8db9addce378bc2909b6c6478b57d3bd001f9ec2e24,2024-11-21T01:47:58.357000 +CVE-2013-0667,0,0,6b8367380e481ac8a24592ab83cfb2cfc4fce818f0b7dd4def710d012aa84cf3,2024-11-21T01:47:58.463000 +CVE-2013-0668,0,0,392c9f1bcbd9ba7acead9ede4f492bb2416f5d01b946b8b4ed3dc5ecdc411ce1,2024-11-21T01:47:58.570000 +CVE-2013-0669,0,0,bc142a7e286fe089f8e20f16bf3aca4d2d49184fecb3d83ef68e6289bda3dbaa,2024-11-21T01:47:58.677000 +CVE-2013-0670,0,0,b010ab1d1d710928b26bb056ff255e851b318f904c02af1889f36406263b5c2a,2024-11-21T01:47:58.790000 +CVE-2013-0671,0,0,f6d6e7356d720798e8b15257e33bb3f257702ae76de6f363822fa2e0c329c9c7,2024-11-21T01:47:58.900000 +CVE-2013-0672,0,0,28084232fdbd26bb1526565f9e3fa18a3f81492c7116f73b6ee9bac7a0127a4a,2024-11-21T01:47:59.007000 +CVE-2013-0673,0,0,bbe06076b383aeb0238dda68dd04ddb0cddb854437ccb2a2a8cec5146f72e633,2024-11-21T01:47:59.120000 +CVE-2013-0674,0,0,ea80c136b539da168568d9505e5a3f53500a88ca104d8cef2c95626da18fa437,2024-11-21T01:47:59.223000 +CVE-2013-0675,0,0,006e8590f00afce8d88ebe3de32182a3d3d8cafcd60ff2996e244318f9dbb79e,2024-11-21T01:47:59.333000 +CVE-2013-0676,0,0,5d793ce9bb5b5b3a348a5779d7d6032e7d9605e6401173c6ad201bc1a31c4de2,2024-11-21T01:47:59.443000 +CVE-2013-0677,0,0,73994ae112befba91033987a9c7ba1f733aa1cef438c69d8416969fb5063a815,2024-11-21T01:47:59.553000 +CVE-2013-0678,0,0,7baa3d079bb7523ebec1edf1746c366793aeb0d52e26f4debc2d90d99e7081ba,2024-11-21T01:47:59.673000 +CVE-2013-0679,0,0,b71c5af1a59c67382ac5e555941e1decc716897b826c3cc19b4ec6f9954823d4,2024-11-21T01:47:59.783000 +CVE-2013-0680,0,0,34cf13b66d8d0e334345a16be3852075f2c5e2ff08dd513c9dafbe071eeda198,2024-11-21T01:47:59.903000 +CVE-2013-0681,0,0,d81f9afc647c80883682a529de1e429ccda714133f03b20cb12d9f85b5b7d453,2024-11-21T01:48:00.017000 +CVE-2013-0682,0,0,ae3d2bf38cfb71686c939cbc4ca28be3309aa450e8ef638130ef8067a5b5a1cd,2024-11-21T01:48:00.127000 +CVE-2013-0683,0,0,a6f8a39a78ab606605139695ecda07ff8349559e172c69902f35c85de8f0a7f5,2024-11-21T01:48:00.233000 +CVE-2013-0684,0,0,81a91aa38131a3d7dd360cba3786498764b2066d1f3b83d009e496686830c0e4,2024-11-21T01:48:00.350000 +CVE-2013-0685,0,0,3d9939b0d29fc2aba5a323d363aa657eaf0da6503ed0c8a01b44589368cae784,2024-11-21T01:48:00.443000 +CVE-2013-0686,0,0,5ee3bf806ea313375b7d4a3f977120364bab121fa90c6fc3a489592977327ea4,2024-11-21T01:48:00.550000 +CVE-2013-0687,0,0,3351ffe9365dbe81c4828212482539aa4887e17211656a6a0ef315bf436211c4,2024-11-21T01:48:00.650000 +CVE-2013-0688,0,0,1aed9412a8fb2c042bbf80312eb0a8dc8c0a736998fd294917e1333f772f3ba6,2024-11-21T01:48:00.753000 +CVE-2013-0689,0,0,ff2bdab787cccfa72cdb52312d5eed9cec8e883c93b8b5d7efb36b194889a1f5,2024-11-21T01:48:00.857000 CVE-2013-0690,0,0,bb774bcee471d76dceeb4d5ad22f7d300e2dd4fe4359f575b13ffbf6bba1b191,2023-11-07T02:13:53.423000 CVE-2013-0691,0,0,34d9f461c3051f158c0fe46d7608689fc4d8eb11ab0098940076f1b3830a0b1a,2023-11-07T02:13:53.677000 -CVE-2013-0692,0,1,569b4fe3e9452d1ffa4bfb45772e6b37178dededbfc89b986a7bf1d52b3c21a1,2024-11-21T01:48:01.003000 -CVE-2013-0693,0,1,a8927b38386f78e9fa439d3db3ef9adde649404ac2cd6e0e4a9b13921050b368,2024-11-21T01:48:01.117000 -CVE-2013-0694,0,1,f48789338b2632636c9d1fa250cb9e23d0a1cd5b4829b7475a376274373d712c,2024-11-21T01:48:01.233000 +CVE-2013-0692,0,0,569b4fe3e9452d1ffa4bfb45772e6b37178dededbfc89b986a7bf1d52b3c21a1,2024-11-21T01:48:01.003000 +CVE-2013-0693,0,0,a8927b38386f78e9fa439d3db3ef9adde649404ac2cd6e0e4a9b13921050b368,2024-11-21T01:48:01.117000 +CVE-2013-0694,0,0,f48789338b2632636c9d1fa250cb9e23d0a1cd5b4829b7475a376274373d712c,2024-11-21T01:48:01.233000 CVE-2013-0695,0,0,a1ae7be067fe225c399b2adf4fb49897e6e19c38be1e0f2180f0ef928d6754ea,2023-11-07T02:13:53.940000 CVE-2013-0696,0,0,5ff8dcb38a31e6f91d3e116ded5157e375690542b666a8cef3ca7f3837bc54e0,2023-11-07T02:13:54.160000 CVE-2013-0697,0,0,0acaa7167e75b1296436eeeec24bf9e7503d1ba3a8ba836b8fe26f89057f99f1,2023-11-07T02:13:54.473000 CVE-2013-0698,0,0,58f2ca5ad6413746c203979a028488b80d36d23d266611f836dd14dfcb7ebaba,2023-11-07T02:13:54.687000 -CVE-2013-0699,0,1,af678ed82198b608a49e36732b5f2bf010f5eabbc7d99cd07a740c9920da9381,2024-11-21T01:48:01.420000 -CVE-2013-0700,0,1,f164c5ca700d94486df1f86884df27b856a617318cf56a5ef327eed54bfb18b8,2024-11-21T01:48:01.540000 -CVE-2013-0701,0,1,c7222921137ac1203291e3cbdea88f6fea3b91c4826f5022cc4f4600f157ea8a,2024-11-21T01:48:01.667000 -CVE-2013-0702,0,1,3b4037bb52e436125df2771bdc4a8a6de2a925a74c11f8b08f4183c8f1a05e72,2024-11-21T01:48:01.777000 -CVE-2013-0703,0,1,3c3d0f6f1bdcb3968dced4f8e93eac7f0b3437fbc7c544c4ac7dc2ba10e30a5b,2024-11-21T01:48:01.900000 -CVE-2013-0704,0,1,0f0607b4a8e1a91cf67f117bbf293eb8bc451828a5855c338a42bd0715473f39,2024-11-21T01:48:02.007000 -CVE-2013-0705,0,1,b53c5bf0709e911eaa22ab804a9446110220095d862478a60065ddb16ec6f7be,2024-11-21T01:48:02.120000 -CVE-2013-0706,0,1,8f7a951a94987d33f7ec1371e902c4c7aec0db598d4ed0f24a8cee1c0bbc2cb1,2024-11-21T01:48:02.240000 -CVE-2013-0707,0,1,140235cb1b8a18c40ce50e9c578ba964c437f8ad508bc76d65d1ebd53eb617dd,2024-11-21T01:48:02.357000 -CVE-2013-0708,0,1,caf44cab731b14a0d60b0084abcc38d29d2075b349562ba37fb37f18b171aeb1,2024-11-21T01:48:02.470000 -CVE-2013-0709,0,1,1aa5420caf842dc8a0393e20564420b32ba0e72a54dfabc71448b4298915cdfb,2024-11-21T01:48:02.580000 -CVE-2013-0710,0,1,5fdb7457acec560e7e35331aa72958bf0d62d06993a9969d1912dca875400f50,2024-11-21T01:48:02.687000 -CVE-2013-0711,0,1,71a829301db4d0983afe98f0c9e4ac78d3fd67f18c26270b4860eab7fe165f6f,2024-11-21T01:48:02.833000 -CVE-2013-0712,0,1,e05ff5c0e83dc04052f4a0749a4b5c46bbd09a45065e87613e7a5e5f01bdb129,2024-11-21T01:48:02.950000 -CVE-2013-0713,0,1,3a0c0cf7adc7c6d9cb3615aa9611b1757def3bfc9f5514a9f4e8d9ab5d22cd96,2024-11-21T01:48:03.060000 -CVE-2013-0714,0,1,cfb9d38c9ffc7f255ecd1831a0652efc5e98a9c7d8226e7c097243c075f48980,2024-11-21T01:48:03.190000 -CVE-2013-0715,0,1,5b08d6d47e650c98042648cf530cfe3d75eb105dd6ebd21393aa0a618cb1811a,2024-11-21T01:48:03.300000 -CVE-2013-0716,0,1,04a016b0a3c86a4bfd1632e5045681bc930a47e9ae1698b25f10c705157837f0,2024-11-21T01:48:03.423000 -CVE-2013-0717,0,1,08ce5a738b005448d09bf2245f629b364c26af5bda440b40efea0befd1e1683a,2024-11-21T01:48:03.537000 -CVE-2013-0718,0,1,e17dfd2fe36e510afcb67f49b3c469ac800d07fa1db97037c7593ab3fdde974e,2024-11-21T01:48:03.667000 -CVE-2013-0719,0,1,d2eeef4fb8eec3dfa90e06fae36ca9bcf41caf095c8ff3695791263ee778f2fc,2024-11-21T01:48:03.783000 -CVE-2013-0720,0,1,0ce54c91a4bee9dd569ed9f756911d82d3285fa7c59eb317807b178e63deed90,2024-11-21T01:48:03.897000 -CVE-2013-0721,0,1,eee57aedce9f3c780b1b0070719de245179e5bd469228c9be245eeccbfa14f43,2024-11-21T01:48:04.007000 -CVE-2013-0722,0,1,6d684de3b99d9124faac0c72a0b3f3c331782117c52884eb5c6d9c06fbcf8761,2024-11-21T01:48:04.150000 -CVE-2013-0723,0,1,f2fb3f93700f06116648d00d7d87563608ab8f66dbe8f9b9e7afe53927c408ed,2024-11-21T01:48:04.323000 +CVE-2013-0699,0,0,af678ed82198b608a49e36732b5f2bf010f5eabbc7d99cd07a740c9920da9381,2024-11-21T01:48:01.420000 +CVE-2013-0700,0,0,f164c5ca700d94486df1f86884df27b856a617318cf56a5ef327eed54bfb18b8,2024-11-21T01:48:01.540000 +CVE-2013-0701,0,0,c7222921137ac1203291e3cbdea88f6fea3b91c4826f5022cc4f4600f157ea8a,2024-11-21T01:48:01.667000 +CVE-2013-0702,0,0,3b4037bb52e436125df2771bdc4a8a6de2a925a74c11f8b08f4183c8f1a05e72,2024-11-21T01:48:01.777000 +CVE-2013-0703,0,0,3c3d0f6f1bdcb3968dced4f8e93eac7f0b3437fbc7c544c4ac7dc2ba10e30a5b,2024-11-21T01:48:01.900000 +CVE-2013-0704,0,0,0f0607b4a8e1a91cf67f117bbf293eb8bc451828a5855c338a42bd0715473f39,2024-11-21T01:48:02.007000 +CVE-2013-0705,0,0,b53c5bf0709e911eaa22ab804a9446110220095d862478a60065ddb16ec6f7be,2024-11-21T01:48:02.120000 +CVE-2013-0706,0,0,8f7a951a94987d33f7ec1371e902c4c7aec0db598d4ed0f24a8cee1c0bbc2cb1,2024-11-21T01:48:02.240000 +CVE-2013-0707,0,0,140235cb1b8a18c40ce50e9c578ba964c437f8ad508bc76d65d1ebd53eb617dd,2024-11-21T01:48:02.357000 +CVE-2013-0708,0,0,caf44cab731b14a0d60b0084abcc38d29d2075b349562ba37fb37f18b171aeb1,2024-11-21T01:48:02.470000 +CVE-2013-0709,0,0,1aa5420caf842dc8a0393e20564420b32ba0e72a54dfabc71448b4298915cdfb,2024-11-21T01:48:02.580000 +CVE-2013-0710,0,0,5fdb7457acec560e7e35331aa72958bf0d62d06993a9969d1912dca875400f50,2024-11-21T01:48:02.687000 +CVE-2013-0711,0,0,71a829301db4d0983afe98f0c9e4ac78d3fd67f18c26270b4860eab7fe165f6f,2024-11-21T01:48:02.833000 +CVE-2013-0712,0,0,e05ff5c0e83dc04052f4a0749a4b5c46bbd09a45065e87613e7a5e5f01bdb129,2024-11-21T01:48:02.950000 +CVE-2013-0713,0,0,3a0c0cf7adc7c6d9cb3615aa9611b1757def3bfc9f5514a9f4e8d9ab5d22cd96,2024-11-21T01:48:03.060000 +CVE-2013-0714,0,0,cfb9d38c9ffc7f255ecd1831a0652efc5e98a9c7d8226e7c097243c075f48980,2024-11-21T01:48:03.190000 +CVE-2013-0715,0,0,5b08d6d47e650c98042648cf530cfe3d75eb105dd6ebd21393aa0a618cb1811a,2024-11-21T01:48:03.300000 +CVE-2013-0716,0,0,04a016b0a3c86a4bfd1632e5045681bc930a47e9ae1698b25f10c705157837f0,2024-11-21T01:48:03.423000 +CVE-2013-0717,0,0,08ce5a738b005448d09bf2245f629b364c26af5bda440b40efea0befd1e1683a,2024-11-21T01:48:03.537000 +CVE-2013-0718,0,0,e17dfd2fe36e510afcb67f49b3c469ac800d07fa1db97037c7593ab3fdde974e,2024-11-21T01:48:03.667000 +CVE-2013-0719,0,0,d2eeef4fb8eec3dfa90e06fae36ca9bcf41caf095c8ff3695791263ee778f2fc,2024-11-21T01:48:03.783000 +CVE-2013-0720,0,0,0ce54c91a4bee9dd569ed9f756911d82d3285fa7c59eb317807b178e63deed90,2024-11-21T01:48:03.897000 +CVE-2013-0721,0,0,eee57aedce9f3c780b1b0070719de245179e5bd469228c9be245eeccbfa14f43,2024-11-21T01:48:04.007000 +CVE-2013-0722,0,0,6d684de3b99d9124faac0c72a0b3f3c331782117c52884eb5c6d9c06fbcf8761,2024-11-21T01:48:04.150000 +CVE-2013-0723,0,0,f2fb3f93700f06116648d00d7d87563608ab8f66dbe8f9b9e7afe53927c408ed,2024-11-21T01:48:04.323000 CVE-2013-0724,0,0,2040e09b0fa5137169b6d835c217235d6818d2ddb72d4e77b1c5f38701bc9986,2017-08-29T01:33:08.107000 CVE-2013-0725,0,0,35affcb4edc77867bacac37663c000b5c613aec9c1806eb7b26c58fc859153ab,2020-02-06T17:50:36.387000 -CVE-2013-0726,0,1,0c34c896b0f2c7b1003278e4203f6bbce4137b0969c9a48c9213fc425c865d94,2024-11-21T01:48:04.667000 -CVE-2013-0727,0,1,a508a6ac4218ecf7712642a42a8e163256ce4c2466d776358fff650ddfadb0fa,2024-11-21T01:48:04.800000 -CVE-2013-0728,0,1,a3c2c219ec2c4826eccda5962ff8eb2274e9c0d0fe083023e0d0a5d209905a08,2024-11-21T01:48:04.903000 -CVE-2013-0729,0,1,1bf0d914ddd179d7fddad7d217e6edcb7336f7d955df8e8aa37d7f29c46c6a0e,2024-11-21T01:48:05.013000 -CVE-2013-0730,0,1,0c6c59f113912a7a7ba3945ad1fe798eadb7ccb1dcee0b20910a8bb2bb2fb054,2024-11-21T01:48:05.130000 -CVE-2013-0731,0,1,6e8f75539dcff36f28ace86c868aa315a7edb33a98c2de3646b9f09563e31181,2024-11-21T01:48:05.253000 -CVE-2013-0732,0,1,672a2cb65884020aea1f9d2cba859f25ed691f05f0efc217a4b2d4047731f4b3,2024-11-21T01:48:05.383000 +CVE-2013-0726,0,0,0c34c896b0f2c7b1003278e4203f6bbce4137b0969c9a48c9213fc425c865d94,2024-11-21T01:48:04.667000 +CVE-2013-0727,0,0,a508a6ac4218ecf7712642a42a8e163256ce4c2466d776358fff650ddfadb0fa,2024-11-21T01:48:04.800000 +CVE-2013-0728,0,0,a3c2c219ec2c4826eccda5962ff8eb2274e9c0d0fe083023e0d0a5d209905a08,2024-11-21T01:48:04.903000 +CVE-2013-0729,0,0,1bf0d914ddd179d7fddad7d217e6edcb7336f7d955df8e8aa37d7f29c46c6a0e,2024-11-21T01:48:05.013000 +CVE-2013-0730,0,0,0c6c59f113912a7a7ba3945ad1fe798eadb7ccb1dcee0b20910a8bb2bb2fb054,2024-11-21T01:48:05.130000 +CVE-2013-0731,0,0,6e8f75539dcff36f28ace86c868aa315a7edb33a98c2de3646b9f09563e31181,2024-11-21T01:48:05.253000 +CVE-2013-0732,0,0,672a2cb65884020aea1f9d2cba859f25ed691f05f0efc217a4b2d4047731f4b3,2024-11-21T01:48:05.383000 CVE-2013-0733,0,0,f8cb70310819f5fe509356588156c90cf87ef61075be37da8e388b9f63a35127,2019-07-18T12:26:38.797000 -CVE-2013-0734,0,1,07ccb8d6426188e2f9a843d7e9f1f26811b5296a5cb5ab237f93fd33a744edf7,2024-11-21T01:48:05.650000 -CVE-2013-0735,0,1,82ddaf6fbf1ace9d52798199b9f0bcb3900beee1e298b2a7fa259ca451d9bfe2,2024-11-21T01:48:05.803000 -CVE-2013-0736,0,1,fa1ffe8d6183b4930f0543dfacce97f028cdace47c1393e0b52f286d87ff9385,2024-11-21T01:48:05.940000 +CVE-2013-0734,0,0,07ccb8d6426188e2f9a843d7e9f1f26811b5296a5cb5ab237f93fd33a744edf7,2024-11-21T01:48:05.650000 +CVE-2013-0735,0,0,82ddaf6fbf1ace9d52798199b9f0bcb3900beee1e298b2a7fa259ca451d9bfe2,2024-11-21T01:48:05.803000 +CVE-2013-0736,0,0,fa1ffe8d6183b4930f0543dfacce97f028cdace47c1393e0b52f286d87ff9385,2024-11-21T01:48:05.940000 CVE-2013-0737,0,0,ddc54e4364f38aaf1dae0983f5eb8010ea831ef513affabe516fbd18615a6a60,2020-01-09T21:12:31.740000 CVE-2013-0738,0,0,65a68486fd538f47bb7da0d179d7babc6d7d75cdd39373f75096031bfb71fc62,2020-01-31T13:20:09.390000 CVE-2013-0739,0,0,a03fd9cd620aea30d84ceaf58a166202813ced1669f45719a273059f7fbf52a4,2020-01-31T13:17:23.100000 -CVE-2013-0740,0,1,28de376d75fcbfe579dd32cec7b04b809aca23ff3eec6be96751f0d5b0b80a5e,2024-11-21T01:48:06.443000 -CVE-2013-0741,0,1,58fdacf7c211d1f3e7ecf8e4d8530e957d8d5d28f01f5cec1db5cf8658ebfd91,2024-11-21T01:48:06.567000 -CVE-2013-0742,0,1,6929f321fe8a13176180cbd432c5eafdce47b6781e2fac6e434901c8662ece5f,2024-11-21T01:48:06.690000 +CVE-2013-0740,0,0,28de376d75fcbfe579dd32cec7b04b809aca23ff3eec6be96751f0d5b0b80a5e,2024-11-21T01:48:06.443000 +CVE-2013-0741,0,0,58fdacf7c211d1f3e7ecf8e4d8530e957d8d5d28f01f5cec1db5cf8658ebfd91,2024-11-21T01:48:06.567000 +CVE-2013-0742,0,0,6929f321fe8a13176180cbd432c5eafdce47b6781e2fac6e434901c8662ece5f,2024-11-21T01:48:06.690000 CVE-2013-0743,0,0,5a0005a7227d006d5a7afc9eed6cff69a8c12e6063f8bd6095a660881cd0b12c,2023-11-07T02:13:55.203000 -CVE-2013-0744,0,1,cc25dcc4b1c6af36f295f0cd9ab35a68fe69f3fd25b6cc53195c27c471186841,2024-11-21T01:48:06.817000 -CVE-2013-0745,0,1,cc41d458b02100363eb12d437614d0c736d09069563bd0827f99da2b0ae8f220,2024-11-21T01:48:06.970000 -CVE-2013-0746,0,1,dd70ebdcdfbaa220598ca2557e03eff5fa5287088365d544ca9b4436c98153e1,2024-11-21T01:48:07.113000 -CVE-2013-0747,0,1,4d2204bde5f71d678a2f4650a7f1bf3c98957e8672602b45fff112153d49e6d2,2024-11-21T01:48:07.263000 -CVE-2013-0748,0,1,569f61d60ccbbbf5d300b2c7cb597b588fba474aabc0f26c455a83c81a44aa09,2024-11-21T01:48:07.400000 -CVE-2013-0749,0,1,3954eebb7a92391592b6a62217facf63bc2f82d3f18fa9028c96a81e0fb6eb88,2024-11-21T01:48:07.540000 -CVE-2013-0750,0,1,b7c7f9fc7936172e8ee1ecd8fdfa2b744013e83ed9be7e8f74ae65f297616912,2024-11-21T01:48:07.683000 -CVE-2013-0751,0,1,a57d89e2759a4b115d1ff747c25f14af26c6dc2201b6c632ace2f2ac0f93cd2d,2024-11-21T01:48:07.817000 -CVE-2013-0752,0,1,064ba45d835d037f8fb06a776f3ed483d5388ee2b8df7901d3dae1745151eb63,2024-11-21T01:48:07.993000 -CVE-2013-0753,0,1,21a8fa7b4da891b6dd3c6446aba5c09d2bb2f9e404115a9328b9067d3f78f74c,2024-11-21T01:48:08.133000 -CVE-2013-0754,0,1,17ad73aeb1a590cd87d70f92262212445fe3fe17c56d5a8c4c6ee97b1ad4e941,2024-11-21T01:48:08.267000 -CVE-2013-0755,0,1,2c0e2ced5f3566f3375031857f0d1800e06aec42ce8d1d84acf36cdb8d7d8f27,2024-11-21T01:48:08.457000 -CVE-2013-0756,0,1,035a0a0e4da107fc0e925c22a5e801ac2837a37f7aeb7fb312400c9bcd07ab5b,2024-11-21T01:48:08.593000 -CVE-2013-0757,0,1,b79c8a05a9b5019c892efc1078eb91ac57ec02e4ce29932511814d80647dfec7,2024-11-21T01:48:08.723000 -CVE-2013-0758,0,1,90f63e64171be8f80b998297efd8ecc817b3efdc2a835b61f38cddfcb09fda31,2024-11-21T01:48:08.860000 -CVE-2013-0759,0,1,6b083c2c18042fdefd3c676e8c8f3a27c2c9d72e5565936dfa32b23ffc0b4e8f,2024-11-21T01:48:09.010000 -CVE-2013-0760,0,1,bfacf7a4970edd4159d482601a55699db55074d78f125c5692199b22a4bc8071,2024-11-21T01:48:09.153000 -CVE-2013-0761,0,1,626ab1c1f0bc1b354a513ea4120690b7ca1eb95f462cc822a69b8a7019aefdab,2024-11-21T01:48:09.293000 -CVE-2013-0762,0,1,3a0da8365a21dda71226ebf46256be77eca9eb38ede14cd8a13630b8c18acf37,2024-11-21T01:48:09.430000 -CVE-2013-0763,0,1,a2a4353042734ee178d3d9ee59179b9a017773edde69dac2aa6e8cbed2464616,2024-11-21T01:48:09.560000 -CVE-2013-0764,0,1,962236e1692bc558713ff60ce39230a08b982f0a11abf560dbaf71e61f49ae04,2024-11-21T01:48:09.700000 -CVE-2013-0765,0,1,5a483162fd6a92c42459f04d673cbc307d731a8221cf24a934ae19c9c95f956e,2024-11-21T01:48:09.893000 -CVE-2013-0766,0,1,e339141f162f6cc8dea394b37d6a5d10baa204bb81ae82af3f78b264a9733fc6,2024-11-21T01:48:10.023000 -CVE-2013-0767,0,1,e152d0d101fcd30a6ce99c19f9fd866f7a146698937d99791b8daa8f589aafde,2024-11-21T01:48:10.170000 -CVE-2013-0768,0,1,843b3635ea019944a5f7ca4135c44695fc1672c62ddaec017d31eccaff1c531d,2024-11-21T01:48:10.310000 -CVE-2013-0769,0,1,2661e94aff1df9b60d80efcbdada29f981384fd09261eebe454debe5d213110a,2024-11-21T01:48:10.453000 -CVE-2013-0770,0,1,d78aac276e16288635e88aa16acd4d603e0822daf08a2dae4a3e7af8dce85932,2024-11-21T01:48:10.607000 -CVE-2013-0771,0,1,4feef252ba6d99832f4b867300020277333377b4a19aa4d59b6543a83e4f37f1,2024-11-21T01:48:10.750000 -CVE-2013-0772,0,1,ff17e7d2c4c73bcef8064f1fe333295a5f404434783c670e0206791b27744bb2,2024-11-21T01:48:10.887000 -CVE-2013-0773,0,1,cf0ecdd06ed979d5b618a5235f37782a905d19c73f7dfa167f3c30880ed7454b,2024-11-21T01:48:11.017000 -CVE-2013-0774,0,1,2a322d90bb3d951f14dead7bc194eb8a30b6d9270d5d24835fbcbec62f34580c,2024-11-21T01:48:11.147000 -CVE-2013-0775,0,1,82ccd6e29057df9dd89da0d8b8a8e81d26567d8c62e043e9fcd9fe9bf6f3968a,2024-11-21T01:48:11.270000 -CVE-2013-0776,0,1,530fe2942a41d48602d9b6b84004d4be871930597891d88ddfb5907747f59b88,2024-11-21T01:48:11.433000 -CVE-2013-0777,0,1,2491ac3d98789284396e8662273b75d713ee2597999fcc04fc9809c974bcf6b8,2024-11-21T01:48:11.570000 -CVE-2013-0778,0,1,970c5158f53874dc0d77793fd04599fae05a4c4779202e951aaa07f1370d1ea1,2024-11-21T01:48:11.697000 -CVE-2013-0779,0,1,095fabc41bbf4535d831f33ea1e83483f8c6ef475bf14d5e9776550618a6845d,2024-11-21T01:48:11.827000 -CVE-2013-0780,0,1,d7a75868f2261a41a5daa42a4cb3fece44621912d74426668f636e122d9e39a1,2024-11-21T01:48:11.960000 -CVE-2013-0781,0,1,1f4b09ed5ec207955d8ae76b4cb54f96f8a5f9a55be8a75906719f22d8c2d345,2024-11-21T01:48:12.093000 -CVE-2013-0782,0,1,d2b54b5866e5217641fa0a672ad99dc8f82d96f6970bfab988b5479e551fed61,2024-11-21T01:48:12.220000 -CVE-2013-0783,0,1,9047a975bc78e2c5e2606abc95b49dc9c371cfafecb243e46060e00c06b8a3cb,2024-11-21T01:48:12.363000 -CVE-2013-0784,0,1,1d2185bc9f55f025dc1c5d6ccc12773dca0605b7a5af03b31c32b5e0011b57ab,2024-11-21T01:48:12.527000 -CVE-2013-0785,0,1,a019c24b32dd3cfd9e72105bac0fd12d57b2389d1e2079b416a3f67d177567be,2024-11-21T01:48:12.677000 -CVE-2013-0786,0,1,60bcf89acc3ff9f27a8a2a08a5df456dfdd46e49de5f58862d02658daa6640f6,2024-11-21T01:48:12.803000 -CVE-2013-0787,0,1,ecfef20cbf95e5ec5f40873f914173bbb1868d254dc88144d9a2d6bab8d9d4ab,2024-11-21T01:48:12.937000 -CVE-2013-0788,0,1,f4d7fd28345b7d707a96bc34274133c543a16f55524845c7693b20ffc3e0f46a,2024-11-21T01:48:13.103000 -CVE-2013-0789,0,1,64d8f937362904c6c04d09b813e4edd958645f55a8d9a0970a86272cb70a2b25,2024-11-21T01:48:13.263000 -CVE-2013-0790,0,1,671c3104faf13a65f8f30b6aaa734d9d487cef085eaeb4d16f5a80cb4fb8f05c,2024-11-21T01:48:13.413000 -CVE-2013-0791,0,1,e11c389c94e84c8b206f22c35980f7a0c66e360f90232a4b5290f4af54db5606,2024-11-21T01:48:13.543000 -CVE-2013-0792,0,1,174b2c62f620ebed8008655b2f63cf84a21e73251168d5a3b825297ca4f50c1e,2024-11-21T01:48:13.683000 -CVE-2013-0793,0,1,f7056f2b202c2f5d682edf0b0c688a729bc43675f7fec11d42460591924d1f19,2024-11-21T01:48:13.817000 -CVE-2013-0794,0,1,67326772a95d7c81a71a431dc3dc02d5ec7a3c7cea8e32cafb97ebab2b098007,2024-11-21T01:48:13.980000 -CVE-2013-0795,0,1,1b2bcb4be155e8ccf957cab9c7c5211773495aa687c5ab8f8d33cabfdb7f606e,2024-11-21T01:48:14.110000 -CVE-2013-0796,0,1,3f4b5de9f6d5616b5027be6ee6d85724561b82bf6e0c0329112269327f6e7d42,2024-11-21T01:48:14.260000 -CVE-2013-0797,0,1,d8147bc45feb3489e25bd8b073c37021336e19f287947def9a37dec9ba5616fb,2024-11-21T01:48:14.397000 -CVE-2013-0798,0,1,86b081423ef89664da7ef6df0eaa21133f114bd14ae20a1b3f8435458556dfc9,2024-11-21T01:48:14.537000 -CVE-2013-0799,0,1,62e8769eb83afce3635fd406235eb1355ce857a722a09cc25eade00b189e0aa9,2024-11-21T01:48:14.640000 -CVE-2013-0800,0,1,4d678ba1b31d4efd10fcfe5f85e298ca8dc4401df410c67b8eacfd3d9561ef44,2024-11-21T01:48:14.760000 -CVE-2013-0801,0,1,296457731fe5512bc50026701feff23ef3defc51c67e710787df7c61cb007823,2024-11-21T01:48:14.900000 +CVE-2013-0744,0,0,cc25dcc4b1c6af36f295f0cd9ab35a68fe69f3fd25b6cc53195c27c471186841,2024-11-21T01:48:06.817000 +CVE-2013-0745,0,0,cc41d458b02100363eb12d437614d0c736d09069563bd0827f99da2b0ae8f220,2024-11-21T01:48:06.970000 +CVE-2013-0746,0,0,dd70ebdcdfbaa220598ca2557e03eff5fa5287088365d544ca9b4436c98153e1,2024-11-21T01:48:07.113000 +CVE-2013-0747,0,0,4d2204bde5f71d678a2f4650a7f1bf3c98957e8672602b45fff112153d49e6d2,2024-11-21T01:48:07.263000 +CVE-2013-0748,0,0,569f61d60ccbbbf5d300b2c7cb597b588fba474aabc0f26c455a83c81a44aa09,2024-11-21T01:48:07.400000 +CVE-2013-0749,0,0,3954eebb7a92391592b6a62217facf63bc2f82d3f18fa9028c96a81e0fb6eb88,2024-11-21T01:48:07.540000 +CVE-2013-0750,0,0,b7c7f9fc7936172e8ee1ecd8fdfa2b744013e83ed9be7e8f74ae65f297616912,2024-11-21T01:48:07.683000 +CVE-2013-0751,0,0,a57d89e2759a4b115d1ff747c25f14af26c6dc2201b6c632ace2f2ac0f93cd2d,2024-11-21T01:48:07.817000 +CVE-2013-0752,0,0,064ba45d835d037f8fb06a776f3ed483d5388ee2b8df7901d3dae1745151eb63,2024-11-21T01:48:07.993000 +CVE-2013-0753,0,0,21a8fa7b4da891b6dd3c6446aba5c09d2bb2f9e404115a9328b9067d3f78f74c,2024-11-21T01:48:08.133000 +CVE-2013-0754,0,0,17ad73aeb1a590cd87d70f92262212445fe3fe17c56d5a8c4c6ee97b1ad4e941,2024-11-21T01:48:08.267000 +CVE-2013-0755,0,0,2c0e2ced5f3566f3375031857f0d1800e06aec42ce8d1d84acf36cdb8d7d8f27,2024-11-21T01:48:08.457000 +CVE-2013-0756,0,0,035a0a0e4da107fc0e925c22a5e801ac2837a37f7aeb7fb312400c9bcd07ab5b,2024-11-21T01:48:08.593000 +CVE-2013-0757,0,0,b79c8a05a9b5019c892efc1078eb91ac57ec02e4ce29932511814d80647dfec7,2024-11-21T01:48:08.723000 +CVE-2013-0758,0,0,90f63e64171be8f80b998297efd8ecc817b3efdc2a835b61f38cddfcb09fda31,2024-11-21T01:48:08.860000 +CVE-2013-0759,0,0,6b083c2c18042fdefd3c676e8c8f3a27c2c9d72e5565936dfa32b23ffc0b4e8f,2024-11-21T01:48:09.010000 +CVE-2013-0760,0,0,bfacf7a4970edd4159d482601a55699db55074d78f125c5692199b22a4bc8071,2024-11-21T01:48:09.153000 +CVE-2013-0761,0,0,626ab1c1f0bc1b354a513ea4120690b7ca1eb95f462cc822a69b8a7019aefdab,2024-11-21T01:48:09.293000 +CVE-2013-0762,0,0,3a0da8365a21dda71226ebf46256be77eca9eb38ede14cd8a13630b8c18acf37,2024-11-21T01:48:09.430000 +CVE-2013-0763,0,0,a2a4353042734ee178d3d9ee59179b9a017773edde69dac2aa6e8cbed2464616,2024-11-21T01:48:09.560000 +CVE-2013-0764,0,0,962236e1692bc558713ff60ce39230a08b982f0a11abf560dbaf71e61f49ae04,2024-11-21T01:48:09.700000 +CVE-2013-0765,0,0,5a483162fd6a92c42459f04d673cbc307d731a8221cf24a934ae19c9c95f956e,2024-11-21T01:48:09.893000 +CVE-2013-0766,0,0,e339141f162f6cc8dea394b37d6a5d10baa204bb81ae82af3f78b264a9733fc6,2024-11-21T01:48:10.023000 +CVE-2013-0767,0,0,e152d0d101fcd30a6ce99c19f9fd866f7a146698937d99791b8daa8f589aafde,2024-11-21T01:48:10.170000 +CVE-2013-0768,0,0,843b3635ea019944a5f7ca4135c44695fc1672c62ddaec017d31eccaff1c531d,2024-11-21T01:48:10.310000 +CVE-2013-0769,0,0,2661e94aff1df9b60d80efcbdada29f981384fd09261eebe454debe5d213110a,2024-11-21T01:48:10.453000 +CVE-2013-0770,0,0,d78aac276e16288635e88aa16acd4d603e0822daf08a2dae4a3e7af8dce85932,2024-11-21T01:48:10.607000 +CVE-2013-0771,0,0,4feef252ba6d99832f4b867300020277333377b4a19aa4d59b6543a83e4f37f1,2024-11-21T01:48:10.750000 +CVE-2013-0772,0,0,ff17e7d2c4c73bcef8064f1fe333295a5f404434783c670e0206791b27744bb2,2024-11-21T01:48:10.887000 +CVE-2013-0773,0,0,cf0ecdd06ed979d5b618a5235f37782a905d19c73f7dfa167f3c30880ed7454b,2024-11-21T01:48:11.017000 +CVE-2013-0774,0,0,2a322d90bb3d951f14dead7bc194eb8a30b6d9270d5d24835fbcbec62f34580c,2024-11-21T01:48:11.147000 +CVE-2013-0775,0,0,82ccd6e29057df9dd89da0d8b8a8e81d26567d8c62e043e9fcd9fe9bf6f3968a,2024-11-21T01:48:11.270000 +CVE-2013-0776,0,0,530fe2942a41d48602d9b6b84004d4be871930597891d88ddfb5907747f59b88,2024-11-21T01:48:11.433000 +CVE-2013-0777,0,0,2491ac3d98789284396e8662273b75d713ee2597999fcc04fc9809c974bcf6b8,2024-11-21T01:48:11.570000 +CVE-2013-0778,0,0,970c5158f53874dc0d77793fd04599fae05a4c4779202e951aaa07f1370d1ea1,2024-11-21T01:48:11.697000 +CVE-2013-0779,0,0,095fabc41bbf4535d831f33ea1e83483f8c6ef475bf14d5e9776550618a6845d,2024-11-21T01:48:11.827000 +CVE-2013-0780,0,0,d7a75868f2261a41a5daa42a4cb3fece44621912d74426668f636e122d9e39a1,2024-11-21T01:48:11.960000 +CVE-2013-0781,0,0,1f4b09ed5ec207955d8ae76b4cb54f96f8a5f9a55be8a75906719f22d8c2d345,2024-11-21T01:48:12.093000 +CVE-2013-0782,0,0,d2b54b5866e5217641fa0a672ad99dc8f82d96f6970bfab988b5479e551fed61,2024-11-21T01:48:12.220000 +CVE-2013-0783,0,0,9047a975bc78e2c5e2606abc95b49dc9c371cfafecb243e46060e00c06b8a3cb,2024-11-21T01:48:12.363000 +CVE-2013-0784,0,0,1d2185bc9f55f025dc1c5d6ccc12773dca0605b7a5af03b31c32b5e0011b57ab,2024-11-21T01:48:12.527000 +CVE-2013-0785,0,0,a019c24b32dd3cfd9e72105bac0fd12d57b2389d1e2079b416a3f67d177567be,2024-11-21T01:48:12.677000 +CVE-2013-0786,0,0,60bcf89acc3ff9f27a8a2a08a5df456dfdd46e49de5f58862d02658daa6640f6,2024-11-21T01:48:12.803000 +CVE-2013-0787,0,0,ecfef20cbf95e5ec5f40873f914173bbb1868d254dc88144d9a2d6bab8d9d4ab,2024-11-21T01:48:12.937000 +CVE-2013-0788,0,0,f4d7fd28345b7d707a96bc34274133c543a16f55524845c7693b20ffc3e0f46a,2024-11-21T01:48:13.103000 +CVE-2013-0789,0,0,64d8f937362904c6c04d09b813e4edd958645f55a8d9a0970a86272cb70a2b25,2024-11-21T01:48:13.263000 +CVE-2013-0790,0,0,671c3104faf13a65f8f30b6aaa734d9d487cef085eaeb4d16f5a80cb4fb8f05c,2024-11-21T01:48:13.413000 +CVE-2013-0791,0,0,e11c389c94e84c8b206f22c35980f7a0c66e360f90232a4b5290f4af54db5606,2024-11-21T01:48:13.543000 +CVE-2013-0792,0,0,174b2c62f620ebed8008655b2f63cf84a21e73251168d5a3b825297ca4f50c1e,2024-11-21T01:48:13.683000 +CVE-2013-0793,0,0,f7056f2b202c2f5d682edf0b0c688a729bc43675f7fec11d42460591924d1f19,2024-11-21T01:48:13.817000 +CVE-2013-0794,0,0,67326772a95d7c81a71a431dc3dc02d5ec7a3c7cea8e32cafb97ebab2b098007,2024-11-21T01:48:13.980000 +CVE-2013-0795,0,0,1b2bcb4be155e8ccf957cab9c7c5211773495aa687c5ab8f8d33cabfdb7f606e,2024-11-21T01:48:14.110000 +CVE-2013-0796,0,0,3f4b5de9f6d5616b5027be6ee6d85724561b82bf6e0c0329112269327f6e7d42,2024-11-21T01:48:14.260000 +CVE-2013-0797,0,0,d8147bc45feb3489e25bd8b073c37021336e19f287947def9a37dec9ba5616fb,2024-11-21T01:48:14.397000 +CVE-2013-0798,0,0,86b081423ef89664da7ef6df0eaa21133f114bd14ae20a1b3f8435458556dfc9,2024-11-21T01:48:14.537000 +CVE-2013-0799,0,0,62e8769eb83afce3635fd406235eb1355ce857a722a09cc25eade00b189e0aa9,2024-11-21T01:48:14.640000 +CVE-2013-0800,0,0,4d678ba1b31d4efd10fcfe5f85e298ca8dc4401df410c67b8eacfd3d9561ef44,2024-11-21T01:48:14.760000 +CVE-2013-0801,0,0,296457731fe5512bc50026701feff23ef3defc51c67e710787df7c61cb007823,2024-11-21T01:48:14.900000 CVE-2013-0802,0,0,af1b747b56dc180460c41dbaa56dda589e614c586fcb301474f5a16a1a2d6c13,2023-11-07T02:13:56.057000 CVE-2013-0803,0,0,920a7a355cec48bb5f766ab953d319deff69ccb66b4dee1aaa8dfcc20f82e1a0,2020-02-14T14:26:01.907000 -CVE-2013-0804,0,1,32d69472ed55acbbf528ec9173e05681f2aa29793fda0756f0fe59cdb6aa87ab,2024-11-21T01:48:15.197000 -CVE-2013-0805,0,1,84adb412f5d2eb2ecd7498c363b130c93f14c5a162e5670dab4ca0d8b4a734f5,2024-11-21T01:48:15.330000 -CVE-2013-0807,0,1,5de754cd9b8d1d4c455aa76a08aab19be6f8bb19226e892fdc715b6c9deccce6,2024-11-21T01:48:15.483000 -CVE-2013-0809,0,1,7151d58484b0e12bafe03879a661e0f1b9f866fb34f3ca18f7330dcbda9889d3,2024-11-21T01:48:15.633000 -CVE-2013-0810,0,1,ec3f96ed39611cf941897f0c7ce406d63e9fb011edbf1fb2fb6c1545b1861531,2024-11-21T01:48:15.823000 -CVE-2013-0811,0,1,13776497cba4f42ac15872e216bc076819f3cb733ecb51d7d3146181d4b22a7d,2024-11-21T01:48:16.027000 -CVE-2013-0828,0,1,51704b49b8c6f23547054fbd8a66dbf6dca441bfb3866a99d7bafa4989af90b0,2024-11-21T01:48:16.163000 -CVE-2013-0829,0,1,1bea88d7ea1b263c9cf56cd7110908a6a38bdf2977a2fc4699ff6f00409ccba1,2024-11-21T01:48:16.287000 -CVE-2013-0830,0,1,69bac0d226501ca504c2f6adb5bcfe025e98e2e77979d1f713f068811897e97e,2024-11-21T01:48:16.420000 -CVE-2013-0831,0,1,00bf88d9ea3b9b2201f0d06d7363b27f66f1df5dd19fd843b3135ac702ee1189,2024-11-21T01:48:16.547000 -CVE-2013-0832,0,1,00d1e997baa3c60a4c6a891ba72c0a53620f1d73075c5eb3e3991747c31732c0,2024-11-21T01:48:16.680000 -CVE-2013-0833,0,1,ef31f7965689f94d70976ae05619fb3774d90f06165085b44043b76c4af52e54,2024-11-21T01:48:16.813000 -CVE-2013-0834,0,1,4a9a6e67c984ed1d64f1fc7abf0f23458999b5fd3eb0b3b2cff791b1850fad08,2024-11-21T01:48:16.953000 -CVE-2013-0835,0,1,a040d5a0793b503c50eefef0675c5cf7c55811f3cda7c7957ab4d6740d6a8d17,2024-11-21T01:48:17.083000 -CVE-2013-0836,0,1,976e4a4dfd1daed14bff46212cf78545d5a8be63ec9885e9c0af68febb60bc6b,2024-11-21T01:48:17.213000 -CVE-2013-0837,0,1,cffa65c5f49d15517955a9c0f70e989d67af1b4df5c81d8eba1c0a18f31fe835,2024-11-21T01:48:17.340000 -CVE-2013-0838,0,1,737a398d8632cb8a971ee7d5f5f506708080a91893125e96ee37015c62168cbd,2024-11-21T01:48:17.467000 -CVE-2013-0839,0,1,fd5324c2f54225c0dd064d00972cad9e570ad906a5a25eda385f4d7ac74849db,2024-11-21T01:48:17.607000 -CVE-2013-0840,0,1,61dd94ad2874dc0030bfe329c0f8059b7eb8544119450d1bcefef890b237f2e9,2024-11-21T01:48:17.723000 -CVE-2013-0841,0,1,9c7e15cd1c01bada0b5ca4421beb7d8704303804e58a71c6b606f243be4571ee,2024-11-21T01:48:17.853000 -CVE-2013-0842,0,1,8f0fa9af9703d267b5a42140ed38cd4f5ea6fe8fb8c42bcdaaa97c78e368ab8b,2024-11-21T01:48:18.007000 -CVE-2013-0843,0,1,ec39a35ca7bfb863ec5d5d5ec27a7eb9e48fd56d77bde0bc0764cdbf47f7948a,2024-11-21T01:48:18.127000 -CVE-2013-0844,0,1,54ec9c4f14082c37fbe9911ee0b0bd03cbb1bb448532a7be46d7edfc2cfed291,2024-11-21T01:48:18.287000 -CVE-2013-0845,0,1,b61e9be7a68eaff94fb10bc999c70c337c3971d74ae55f41f321ed10b669477b,2024-11-21T01:48:18.433000 -CVE-2013-0846,0,1,e53616e5eba95b612bdfca2b5a5fcf5540c2a46618661ecd367e9a33360350fd,2024-11-21T01:48:18.547000 -CVE-2013-0847,0,1,ab5e5f1bad7a795cac35d90def6425368e7ced7b5a2003179dc25bdf65f9c18e,2024-11-21T01:48:18.657000 -CVE-2013-0848,0,1,f33e13a6e26c18c538315400c4fa0532a5d4deeea823cf8660d54f8569597eaf,2024-11-21T01:48:18.777000 -CVE-2013-0849,0,1,328030677deecfd7211cfcfcc9445a3f94f6d565aa2d56799cd74af27c85927e,2024-11-21T01:48:18.897000 -CVE-2013-0850,0,1,80458b791da10f6091fbaa684cf05d72b715c64efa2ff4e03bee36d8a9872277,2024-11-21T01:48:19.027000 -CVE-2013-0851,0,1,5a0307524c2e3559ee98bbe1494f2af50fe94d9ffad827347601c3703b869465,2024-11-21T01:48:19.147000 -CVE-2013-0852,0,1,0778f5d6df6dbfb8bcb78965818e61706944b0ab251f6760b04778d2aca7f71d,2024-11-21T01:48:19.270000 -CVE-2013-0853,0,1,336818d8a3929841a74b412633aeb26641fbec22096fd47f54bb986f0df95784,2024-11-21T01:48:19.390000 -CVE-2013-0854,0,1,c9e2aaf6a3335a7467fa962bdae19f2d8280619e9ab4be5849cba7249f671e93,2024-11-21T01:48:19.510000 -CVE-2013-0855,0,1,3908418d00c54d19ce426396834ac3d982ec8d5acc943b25f6ba25efabe7bdf1,2024-11-21T01:48:19.637000 -CVE-2013-0856,0,1,56b38cfe1a0c5816d20fddd27dc8d33bdc40d0db1b2e4394ea843a7dfb1e611f,2024-11-21T01:48:19.767000 -CVE-2013-0857,0,1,dbc2b0c9729755c4410d7813004aa577601dd472749ccb24860f408519098f71,2024-11-21T01:48:19.880000 -CVE-2013-0858,0,1,670eb4be52a4e788b0937b0a62a64e82567f53c157b31cd697f0df0a0931eec7,2024-11-21T01:48:20.003000 -CVE-2013-0859,0,1,e919c1fe79b53339043438d8cc53df8bba70f085a9eadf0f038b943e96830004,2024-11-21T01:48:20.123000 -CVE-2013-0860,0,1,222cb75ff5c812fa2fe130b1bd7984bef5c2139c4b6172d45de453319c075f73,2024-11-21T01:48:20.247000 -CVE-2013-0861,0,1,9f45b49645ba3d82ab461526455f0b2f3e5c393d3874bc30329dadc7c43ee73b,2024-11-21T01:48:20.377000 -CVE-2013-0862,0,1,c48920b972e7d9017bdeccb8fff916b45ff1dbc9d7e34fae8e62914d2334f590,2024-11-21T01:48:20.503000 -CVE-2013-0863,0,1,7e881d75452df068127ab249fce1887570bbdc7bbeeb0069c1e436bcb242871b,2024-11-21T01:48:20.630000 -CVE-2013-0864,0,1,2a1146a020967dedb207e6efc74ab97c455fc4a0f1d3c5ecc3ffbcb595744fb8,2024-11-21T01:48:20.753000 -CVE-2013-0865,0,1,17213457ca148b7b98b1c882dff2ea0d79da9841a14cf9d1acebc260552aca47,2024-11-21T01:48:20.887000 -CVE-2013-0866,0,1,2d240b0d373605470bc7a1afd974e4e20e1774271714c16d6c21bbaf88f6c7bf,2024-11-21T01:48:21.037000 -CVE-2013-0867,0,1,da1c7610ad003e1b477cf1247923e4f2b8bc72671d071adda79c52b74bffd34d,2024-11-21T01:48:21.167000 -CVE-2013-0868,0,1,3cde2adfbf8c7ea07241db8e574e9d2cb11feebde459b7a246c2661bf2837de5,2024-11-21T01:48:21.300000 -CVE-2013-0869,0,1,737460aaeed29d5a5ce00474a489b6217d3a429d06b6f392ba9754095b24bf79,2024-11-21T01:48:21.410000 +CVE-2013-0804,0,0,32d69472ed55acbbf528ec9173e05681f2aa29793fda0756f0fe59cdb6aa87ab,2024-11-21T01:48:15.197000 +CVE-2013-0805,0,0,84adb412f5d2eb2ecd7498c363b130c93f14c5a162e5670dab4ca0d8b4a734f5,2024-11-21T01:48:15.330000 +CVE-2013-0807,0,0,5de754cd9b8d1d4c455aa76a08aab19be6f8bb19226e892fdc715b6c9deccce6,2024-11-21T01:48:15.483000 +CVE-2013-0809,0,0,7151d58484b0e12bafe03879a661e0f1b9f866fb34f3ca18f7330dcbda9889d3,2024-11-21T01:48:15.633000 +CVE-2013-0810,0,0,ec3f96ed39611cf941897f0c7ce406d63e9fb011edbf1fb2fb6c1545b1861531,2024-11-21T01:48:15.823000 +CVE-2013-0811,0,0,13776497cba4f42ac15872e216bc076819f3cb733ecb51d7d3146181d4b22a7d,2024-11-21T01:48:16.027000 +CVE-2013-0828,0,0,51704b49b8c6f23547054fbd8a66dbf6dca441bfb3866a99d7bafa4989af90b0,2024-11-21T01:48:16.163000 +CVE-2013-0829,0,0,1bea88d7ea1b263c9cf56cd7110908a6a38bdf2977a2fc4699ff6f00409ccba1,2024-11-21T01:48:16.287000 +CVE-2013-0830,0,0,69bac0d226501ca504c2f6adb5bcfe025e98e2e77979d1f713f068811897e97e,2024-11-21T01:48:16.420000 +CVE-2013-0831,0,0,00bf88d9ea3b9b2201f0d06d7363b27f66f1df5dd19fd843b3135ac702ee1189,2024-11-21T01:48:16.547000 +CVE-2013-0832,0,0,00d1e997baa3c60a4c6a891ba72c0a53620f1d73075c5eb3e3991747c31732c0,2024-11-21T01:48:16.680000 +CVE-2013-0833,0,0,ef31f7965689f94d70976ae05619fb3774d90f06165085b44043b76c4af52e54,2024-11-21T01:48:16.813000 +CVE-2013-0834,0,0,4a9a6e67c984ed1d64f1fc7abf0f23458999b5fd3eb0b3b2cff791b1850fad08,2024-11-21T01:48:16.953000 +CVE-2013-0835,0,0,a040d5a0793b503c50eefef0675c5cf7c55811f3cda7c7957ab4d6740d6a8d17,2024-11-21T01:48:17.083000 +CVE-2013-0836,0,0,976e4a4dfd1daed14bff46212cf78545d5a8be63ec9885e9c0af68febb60bc6b,2024-11-21T01:48:17.213000 +CVE-2013-0837,0,0,cffa65c5f49d15517955a9c0f70e989d67af1b4df5c81d8eba1c0a18f31fe835,2024-11-21T01:48:17.340000 +CVE-2013-0838,0,0,737a398d8632cb8a971ee7d5f5f506708080a91893125e96ee37015c62168cbd,2024-11-21T01:48:17.467000 +CVE-2013-0839,0,0,fd5324c2f54225c0dd064d00972cad9e570ad906a5a25eda385f4d7ac74849db,2024-11-21T01:48:17.607000 +CVE-2013-0840,0,0,61dd94ad2874dc0030bfe329c0f8059b7eb8544119450d1bcefef890b237f2e9,2024-11-21T01:48:17.723000 +CVE-2013-0841,0,0,9c7e15cd1c01bada0b5ca4421beb7d8704303804e58a71c6b606f243be4571ee,2024-11-21T01:48:17.853000 +CVE-2013-0842,0,0,8f0fa9af9703d267b5a42140ed38cd4f5ea6fe8fb8c42bcdaaa97c78e368ab8b,2024-11-21T01:48:18.007000 +CVE-2013-0843,0,0,ec39a35ca7bfb863ec5d5d5ec27a7eb9e48fd56d77bde0bc0764cdbf47f7948a,2024-11-21T01:48:18.127000 +CVE-2013-0844,0,0,54ec9c4f14082c37fbe9911ee0b0bd03cbb1bb448532a7be46d7edfc2cfed291,2024-11-21T01:48:18.287000 +CVE-2013-0845,0,0,b61e9be7a68eaff94fb10bc999c70c337c3971d74ae55f41f321ed10b669477b,2024-11-21T01:48:18.433000 +CVE-2013-0846,0,0,e53616e5eba95b612bdfca2b5a5fcf5540c2a46618661ecd367e9a33360350fd,2024-11-21T01:48:18.547000 +CVE-2013-0847,0,0,ab5e5f1bad7a795cac35d90def6425368e7ced7b5a2003179dc25bdf65f9c18e,2024-11-21T01:48:18.657000 +CVE-2013-0848,0,0,f33e13a6e26c18c538315400c4fa0532a5d4deeea823cf8660d54f8569597eaf,2024-11-21T01:48:18.777000 +CVE-2013-0849,0,0,328030677deecfd7211cfcfcc9445a3f94f6d565aa2d56799cd74af27c85927e,2024-11-21T01:48:18.897000 +CVE-2013-0850,0,0,80458b791da10f6091fbaa684cf05d72b715c64efa2ff4e03bee36d8a9872277,2024-11-21T01:48:19.027000 +CVE-2013-0851,0,0,5a0307524c2e3559ee98bbe1494f2af50fe94d9ffad827347601c3703b869465,2024-11-21T01:48:19.147000 +CVE-2013-0852,0,0,0778f5d6df6dbfb8bcb78965818e61706944b0ab251f6760b04778d2aca7f71d,2024-11-21T01:48:19.270000 +CVE-2013-0853,0,0,336818d8a3929841a74b412633aeb26641fbec22096fd47f54bb986f0df95784,2024-11-21T01:48:19.390000 +CVE-2013-0854,0,0,c9e2aaf6a3335a7467fa962bdae19f2d8280619e9ab4be5849cba7249f671e93,2024-11-21T01:48:19.510000 +CVE-2013-0855,0,0,3908418d00c54d19ce426396834ac3d982ec8d5acc943b25f6ba25efabe7bdf1,2024-11-21T01:48:19.637000 +CVE-2013-0856,0,0,56b38cfe1a0c5816d20fddd27dc8d33bdc40d0db1b2e4394ea843a7dfb1e611f,2024-11-21T01:48:19.767000 +CVE-2013-0857,0,0,dbc2b0c9729755c4410d7813004aa577601dd472749ccb24860f408519098f71,2024-11-21T01:48:19.880000 +CVE-2013-0858,0,0,670eb4be52a4e788b0937b0a62a64e82567f53c157b31cd697f0df0a0931eec7,2024-11-21T01:48:20.003000 +CVE-2013-0859,0,0,e919c1fe79b53339043438d8cc53df8bba70f085a9eadf0f038b943e96830004,2024-11-21T01:48:20.123000 +CVE-2013-0860,0,0,222cb75ff5c812fa2fe130b1bd7984bef5c2139c4b6172d45de453319c075f73,2024-11-21T01:48:20.247000 +CVE-2013-0861,0,0,9f45b49645ba3d82ab461526455f0b2f3e5c393d3874bc30329dadc7c43ee73b,2024-11-21T01:48:20.377000 +CVE-2013-0862,0,0,c48920b972e7d9017bdeccb8fff916b45ff1dbc9d7e34fae8e62914d2334f590,2024-11-21T01:48:20.503000 +CVE-2013-0863,0,0,7e881d75452df068127ab249fce1887570bbdc7bbeeb0069c1e436bcb242871b,2024-11-21T01:48:20.630000 +CVE-2013-0864,0,0,2a1146a020967dedb207e6efc74ab97c455fc4a0f1d3c5ecc3ffbcb595744fb8,2024-11-21T01:48:20.753000 +CVE-2013-0865,0,0,17213457ca148b7b98b1c882dff2ea0d79da9841a14cf9d1acebc260552aca47,2024-11-21T01:48:20.887000 +CVE-2013-0866,0,0,2d240b0d373605470bc7a1afd974e4e20e1774271714c16d6c21bbaf88f6c7bf,2024-11-21T01:48:21.037000 +CVE-2013-0867,0,0,da1c7610ad003e1b477cf1247923e4f2b8bc72671d071adda79c52b74bffd34d,2024-11-21T01:48:21.167000 +CVE-2013-0868,0,0,3cde2adfbf8c7ea07241db8e574e9d2cb11feebde459b7a246c2661bf2837de5,2024-11-21T01:48:21.300000 +CVE-2013-0869,0,0,737460aaeed29d5a5ce00474a489b6217d3a429d06b6f392ba9754095b24bf79,2024-11-21T01:48:21.410000 CVE-2013-0870,0,0,e4a7001b768850c76c6ec4ccf3c6f9d2dab3cd6970810e45fc7976bac39331b9,2023-11-07T02:14:10.290000 -CVE-2013-0871,0,1,3d657fe3042804361c538fc590106888109506077d86225b34671c7ec3163269,2024-11-21T01:48:21.623000 -CVE-2013-0872,0,1,f4b15e3b1b5dea57dd8b8840340c31991e08479fed3457aa8679044548e18cb7,2024-11-21T01:48:21.763000 -CVE-2013-0873,0,1,10c35b2d6f8ea457ab5fba680911592c87e36a4af0cf75471fcd5c53713df30b,2024-11-21T01:48:21.880000 -CVE-2013-0874,0,1,43358c3f9296ec85dfe98030ac7eb3239062069101dea77c9300fa4aada1e178,2024-11-21T01:48:22 -CVE-2013-0875,0,1,94ecaf3c384119f5a9b889fb67020d0ef9d452fdda5a5e59e117709925ce5c81,2024-11-21T01:48:22.123000 -CVE-2013-0876,0,1,7b04abda3d46d23fea20b2a84c6f384fd8d4cf8206cf94f5a1453aa682603d9b,2024-11-21T01:48:22.250000 -CVE-2013-0877,0,1,9e7adf5a7de849326e62e046f262c7ead647efc71ab1b1dd905a27aa2c570043,2024-11-21T01:48:22.370000 -CVE-2013-0878,0,1,ccfe084766be21bffc1e83614e94d24f7e10ab553e0a1d40db272ba7f6f82f6f,2024-11-21T01:48:22.507000 -CVE-2013-0879,0,1,f86b0f8d94e23d6e144fd179c15730141e19c3fc669bd008b3e1e110660c733b,2024-11-21T01:48:22.637000 -CVE-2013-0880,0,1,218e3499ab3aca278dd4d1c6f503cad022309e60ad4fa81d10b4d41c0c61303d,2024-11-21T01:48:22.763000 -CVE-2013-0881,0,1,40af634f64e003a48cdbf2802a83d3828ef54359d3567b59fb3fe521bf0a07fc,2024-11-21T01:48:22.883000 -CVE-2013-0882,0,1,83c5e021a9f6973efb107001500ee36a13a99fc09a7a2c6970775c65ec6e0381,2024-11-21T01:48:22.993000 -CVE-2013-0883,0,1,a9c821e703ed5f3a1f128a88512b6f70ec33e8a243242c36a998707a8d137aaf,2024-11-21T01:48:23.107000 -CVE-2013-0884,0,1,1efce7ec447f692f6ab3f4f7122968f218b535ea24487389604bf7b193a24c55,2024-11-21T01:48:23.217000 -CVE-2013-0885,0,1,845a52227f7ca236afe80d6b45c800a9a229d6942dcda1ab292fb4563ce0d7dd,2024-11-21T01:48:23.340000 -CVE-2013-0886,0,1,16fec1217fb8b96569ede26972a3e907f94e2978336a1bc15bc8209f042872df,2024-11-21T01:48:23.477000 -CVE-2013-0887,0,1,469d6a555f7712875c165b287b4f8426aade31ce720a5524b3bfc7b539bb56f2,2024-11-21T01:48:23.610000 -CVE-2013-0888,0,1,89edee8591e1f321803393cef723b8455df9e4f9a5a642fbfcad2446585a6bd6,2024-11-21T01:48:23.730000 -CVE-2013-0889,0,1,fdce0681dc2dfd0abbf3617233bef9128bed9a9cf4b7d8a88aedf02c4545a8a6,2024-11-21T01:48:23.843000 -CVE-2013-0890,0,1,ef0893f26a16899eed1719aeb0e828ed8e3661f10b58bbf2afcc0680475e4272,2024-11-21T01:48:23.957000 -CVE-2013-0891,0,1,fc24e0014ce0571c7476579926ce8c9dd6975cd19911d7328d95bc1e8a9a7d89,2024-11-21T01:48:24.073000 -CVE-2013-0892,0,1,220de2c8c1033d561e5f2c5c642b1e8173460702c835d75787e5356abc22935d,2024-11-21T01:48:24.187000 -CVE-2013-0893,0,1,2c3ef0615d7bf09708339f7e3a556d7051ecbc575bffd5eb14da7f9e8bc4857b,2024-11-21T01:48:24.300000 -CVE-2013-0894,0,1,31bf952a10d3a1a11a4deccf6df69567ac870127bfa5a1dae94a54c5231d1001,2024-11-21T01:48:24.413000 -CVE-2013-0895,0,1,1716bd547b01f2fb820035ec4356691763f7ceb6eb908a10663b2861f2f2c28e,2024-11-21T01:48:24.527000 -CVE-2013-0896,0,1,35b3e3887323915db9dd4d5643421b99ac9835397617d38af64e36a11d50e9f4,2024-11-21T01:48:24.640000 -CVE-2013-0897,0,1,e73fbb4e502a978deb347505cc00c7d6f24262ba56187897d4782a0f7689feec,2024-11-21T01:48:24.757000 -CVE-2013-0898,0,1,337902db589ba71fd8002db02de3f2f744ff4b497eb32b1eb9cd70776b998cd3,2024-11-21T01:48:24.870000 -CVE-2013-0899,0,1,0e5447903456167f0d5053c6ab70c071e926be3ba683c3e31943bbabbc5f99b6,2024-11-21T01:48:25 -CVE-2013-0900,0,1,2e4f8f3f2d758c6a8ec9399d79ee9291508ca4b29af3edceb2fcb40818d2453b,2024-11-21T01:48:25.127000 -CVE-2013-0902,0,1,2698f02cb5a59aa9d95abdcdb65f66f84468b44ccfcca03a13bc0afc21b47630,2024-11-21T01:48:25.250000 -CVE-2013-0903,0,1,1e55f47cc2a08f3d8f4eea0dd51039a5e66b8e67581cb9dafbd30eb9644a9e80,2024-11-21T01:48:25.373000 -CVE-2013-0904,0,1,eb0611a23d077099cd70f40177dc7df6d7e1d4520b272ca5edf719bcc9374edb,2024-11-21T01:48:25.497000 -CVE-2013-0905,0,1,9334cb96c850e00c2467fba508f1f52b289f85dfa99bfbb094e9803693234911,2024-11-21T01:48:25.620000 -CVE-2013-0906,0,1,14f4fac762e11e461fbf2a1d4ee2717b90f020724f4b68ecb888c297ab18eca3,2024-11-21T01:48:25.740000 -CVE-2013-0907,0,1,3e9cd2f269955c6ce91b85218d9f236c44ef077640bb29b38c7ae79caba02a03,2024-11-21T01:48:25.867000 -CVE-2013-0908,0,1,6070a8f243e3396182b9ba414e772d4209605be8a558f3af92745a49c02ab159,2024-11-21T01:48:26.007000 -CVE-2013-0909,0,1,8a51fb280335ec4c5b8207f8d160ce35f67855a8b44560c5a47c1ef780d73eac,2024-11-21T01:48:26.133000 -CVE-2013-0910,0,1,d564af9394ccbcc43cb98819150bd1325805a999451a207701bda25df8a3b0a4,2024-11-21T01:48:26.257000 -CVE-2013-0911,0,1,62dea9caf2ca19ae0e4735e56935c595c8fbedd4e7d62173a646a4b9779bf12a,2024-11-21T01:48:26.383000 -CVE-2013-0912,0,1,546a7242cc6e6a2c5701879f9ad41be457b964f3c51f3c826aabbd045d11870b,2024-11-21T01:48:26.517000 -CVE-2013-0913,0,1,f86c81396555703a4218b21d5130617b5d11de566eb2529f63c569cf751fb8fe,2024-11-21T01:48:26.660000 -CVE-2013-0914,0,1,a96ae18127271eae5dbd52138f236a90d07ad4c441b0b6822ec8db0a6082d52f,2024-11-21T01:48:26.833000 -CVE-2013-0915,0,1,b4424f699d4510b58c3ad420b88660908454418880e882148a83ab17316af59b,2024-11-21T01:48:26.977000 -CVE-2013-0916,0,1,097309c996016e13417eb5a5df0434b0c700fae09c3f5401e76e3f23a2bb451c,2024-11-21T01:48:27.100000 -CVE-2013-0917,0,1,a1dd4d61780ecf7a9481c652b1b3e8d482b57e5e24c0ee3b635260467297bc30,2024-11-21T01:48:27.227000 -CVE-2013-0918,0,1,7e94ffd8108703186cbee1de902be6f54bd84b1a52fab057e20f04ab6ab5f867,2024-11-21T01:48:27.350000 -CVE-2013-0919,0,1,261e4f8aa89dc87d37034050846a5a71e900943c4c5ecbe944562a2f4e762729,2024-11-21T01:48:27.483000 -CVE-2013-0920,0,1,3ebfa86f1313a9ccd0f0899b5313d4034612c90b8ce7adf0881659a5262da99e,2024-11-21T01:48:27.603000 -CVE-2013-0921,0,1,4753215d003ebddec71ffeb4179581d881b3894bb36f8a4920d575e36c93a9f6,2024-11-21T01:48:27.720000 -CVE-2013-0922,0,1,617b5781447ef547f6389136ec25202a717b8448725ce9de7b9cfb74572fb961,2024-11-21T01:48:27.843000 -CVE-2013-0923,0,1,ec40097495543fec16a27ffeb567c88e5b78d2bd8b0d0337f4638e9c48afb578,2024-11-21T01:48:27.963000 -CVE-2013-0924,0,1,2a54b0c77102154c95949e9012fe4d392d19bbf3351d8e98beeacbbfc9ebe347,2024-11-21T01:48:28.070000 -CVE-2013-0925,0,1,35a0c650639cb4b520bf9ffd2846ba3f24ff872e02df16b1c5a9f6166c66dbd8,2024-11-21T01:48:28.190000 -CVE-2013-0926,0,1,e5a65f89035979d58afda5fe5811b2b125307d018ca83f20ce97c048a9f02c5c,2024-11-21T01:48:28.300000 -CVE-2013-0927,0,1,f01b20727c0ca34548b42c9341e983d8d042e43a8bb5638d7ef4c7bc81aaaa03,2024-11-21T01:48:28.420000 -CVE-2013-0928,0,1,6e7b3a33f0be565178d81e6ff71fc5437a9a529d7925b3a6890cd85eeddf5923,2024-11-21T01:48:28.547000 -CVE-2013-0929,0,1,b8c601139d346ae2f05847a6002db5a980736baf334da1d09803725d2e897b81,2024-11-21T01:48:28.693000 -CVE-2013-0930,0,1,c32fae19a0ac28a60d9dd4be6a9a72581824820fcf805eb52908116445dc77a9,2024-11-21T01:48:28.810000 -CVE-2013-0931,0,1,40cf0d5a8cde90fb8a07d60b74a5b788345c3535b7b19d012f3151f86d0c8cf0,2024-11-21T01:48:28.920000 -CVE-2013-0932,0,1,774f37c711a3f46e0e18fc15a13b2c8eadeb26d6bf77a62e26c27c347b3e8293,2024-11-21T01:48:29.043000 -CVE-2013-0933,0,1,f7b4b8c7e4290eff70dda93aedce1e02553fb67bc2ac008f0eb3aba326868ef6,2024-11-21T01:48:29.147000 -CVE-2013-0934,0,1,251ae58121ada037d51dfd11ed3d8ba7e8b59f623cc852a21d3aeb899f815319,2024-11-21T01:48:29.250000 -CVE-2013-0935,0,1,82b9e2d81ed02cb044396c7f3929531eea0698b471db287272979aad242eee85,2024-11-21T01:48:29.353000 -CVE-2013-0936,0,1,eb15e2f6bd6326d93f672224164acbeb183c6cc6d4e591d69f03c37934828da1,2024-11-21T01:48:29.453000 -CVE-2013-0937,0,1,04e9184502211bf7920d807e90a69a08a2c66971ccf2abb4a92d0b27d92f0198,2024-11-21T01:48:29.560000 -CVE-2013-0938,0,1,f68b22e0456a833a45554de86d85fb21bb78db2350492d308dd6ffe27d19bfab,2024-11-21T01:48:29.660000 -CVE-2013-0939,0,1,7145b5889146019b1aeee20dc51848b19e75791d905090dc8fa8900cc5976b7c,2024-11-21T01:48:29.763000 -CVE-2013-0940,0,1,b7c736ca3eb0e6925113893aaae06fdc935f1ff27ba9fecf756d94d3f42bf2b0,2024-11-21T01:48:29.870000 -CVE-2013-0941,0,1,0c2854eaf90387ec466185413cd68ea09eb00fa35e80c079dc0b0c685205135c,2024-11-21T01:48:29.983000 -CVE-2013-0942,0,1,2491664b1f2985778ca11ce092771907da3ab254859ff3cad330dd2d036ac85c,2024-11-21T01:48:30.107000 -CVE-2013-0943,0,1,70d7124ddfbe41bde694dc7d09fdaa19e328ec25659a93a668a9be9b39b28132,2024-11-21T01:48:30.213000 -CVE-2013-0944,0,1,401310127da41add0286deff3f989686760f3e955a77d62b78a01912c0326ce7,2024-11-21T01:48:30.323000 -CVE-2013-0945,0,1,3296690d9102fa826ee4dcbc23ddc0f021502b664b24d24002c4f9d6c3ab0dea,2024-11-21T01:48:30.427000 -CVE-2013-0946,0,1,b1787faa359a71d617446dd463352db7c5a7172cfb3035982a0c6f2250cd0a23,2024-11-21T01:48:30.523000 -CVE-2013-0947,0,1,1c3629c28b3a094eac965077d7775d3664a1cb97058e5e8a16989c7c9b71b96a,2024-11-21T01:48:30.623000 -CVE-2013-0948,0,1,527eada429412394903861f371e648d408d67e35c84c623c7896f8a551fc7303,2024-11-21T01:48:30.730000 -CVE-2013-0949,0,1,9c721bfffbbe2372c1455e0260d91a10d50aab3ab7920e40a4d923545251ad8f,2024-11-21T01:48:30.850000 -CVE-2013-0950,0,1,96a556d6ff1a45532209ed0f1209a33b6d058f867a14fecd9516c57bf87ee83c,2024-11-21T01:48:30.960000 -CVE-2013-0951,0,1,22fb84d1c4b30afab4bb55390b85273778d8373f71ab969ddde892970b14fd75,2024-11-21T01:48:31.077000 -CVE-2013-0952,0,1,eaea155f6b333a0c89c7ec21c125a756b135071242dbf27ebf4c71bbb8ac10d4,2024-11-21T01:48:31.187000 -CVE-2013-0953,0,1,550bbb1e8749d2d429e961bf169cbdd2d9bbf435782bd69ca17677a40a300fda,2024-11-21T01:48:31.307000 -CVE-2013-0954,0,1,24d670200c5bf210b513d89e0cd67897b1b86794d3f84b98089f04b23d1c49c1,2024-11-21T01:48:31.420000 -CVE-2013-0955,0,1,085ba927a6d72e2238a12b8cb4a8f4bd5f97c11c9d083c7aa3a4f545616ed578,2024-11-21T01:48:31.540000 -CVE-2013-0956,0,1,ff537b69b713d5ca8facd7ea2a6137379f474f12068fdc5961e85b0dbd07b120,2024-11-21T01:48:31.657000 -CVE-2013-0957,0,1,052d1720759707394546b9fc4e51b709fdaeb5979bddc7c43c0025576c5d4249,2024-11-21T01:48:31.790000 -CVE-2013-0958,0,1,4bb6b246d99625533cfea0633139eaf4529ff4753a3d170cf70a7217b2eb886d,2024-11-21T01:48:31.920000 -CVE-2013-0959,0,1,306123b5a6f96f0dc2a5c721f049f863125fe31df6e2bf265f1bd0a0721a4e81,2024-11-21T01:48:32.033000 -CVE-2013-0960,0,1,9b1fc5efb5ce7d5f71ffa1d77da2f325a7bb65a107ba68cf15a273e17ed6e586,2024-11-21T01:48:32.187000 -CVE-2013-0961,0,1,178d69678f1e9fce54a2980e84ac4f5b083bf6df1b497f083237cad73766496a,2024-11-21T01:48:32.327000 -CVE-2013-0962,0,1,a17568ac6fa10ca7f2baaaff8f7022c9adb25672da0299d148e7df4811d19c4c,2024-11-21T01:48:32.477000 -CVE-2013-0963,0,1,ca17a69f436f79d1dce3303444b47a57528243f0992aeda504718a1c0e0183fe,2024-11-21T01:48:32.607000 -CVE-2013-0964,0,1,4405b42be05e7c2e1e7a6c26cf2a242dcb181948e729fe3184de991274d2a75e,2024-11-21T01:48:32.740000 +CVE-2013-0871,0,0,3d657fe3042804361c538fc590106888109506077d86225b34671c7ec3163269,2024-11-21T01:48:21.623000 +CVE-2013-0872,0,0,f4b15e3b1b5dea57dd8b8840340c31991e08479fed3457aa8679044548e18cb7,2024-11-21T01:48:21.763000 +CVE-2013-0873,0,0,10c35b2d6f8ea457ab5fba680911592c87e36a4af0cf75471fcd5c53713df30b,2024-11-21T01:48:21.880000 +CVE-2013-0874,0,0,43358c3f9296ec85dfe98030ac7eb3239062069101dea77c9300fa4aada1e178,2024-11-21T01:48:22 +CVE-2013-0875,0,0,94ecaf3c384119f5a9b889fb67020d0ef9d452fdda5a5e59e117709925ce5c81,2024-11-21T01:48:22.123000 +CVE-2013-0876,0,0,7b04abda3d46d23fea20b2a84c6f384fd8d4cf8206cf94f5a1453aa682603d9b,2024-11-21T01:48:22.250000 +CVE-2013-0877,0,0,9e7adf5a7de849326e62e046f262c7ead647efc71ab1b1dd905a27aa2c570043,2024-11-21T01:48:22.370000 +CVE-2013-0878,0,0,ccfe084766be21bffc1e83614e94d24f7e10ab553e0a1d40db272ba7f6f82f6f,2024-11-21T01:48:22.507000 +CVE-2013-0879,0,0,f86b0f8d94e23d6e144fd179c15730141e19c3fc669bd008b3e1e110660c733b,2024-11-21T01:48:22.637000 +CVE-2013-0880,0,0,218e3499ab3aca278dd4d1c6f503cad022309e60ad4fa81d10b4d41c0c61303d,2024-11-21T01:48:22.763000 +CVE-2013-0881,0,0,40af634f64e003a48cdbf2802a83d3828ef54359d3567b59fb3fe521bf0a07fc,2024-11-21T01:48:22.883000 +CVE-2013-0882,0,0,83c5e021a9f6973efb107001500ee36a13a99fc09a7a2c6970775c65ec6e0381,2024-11-21T01:48:22.993000 +CVE-2013-0883,0,0,a9c821e703ed5f3a1f128a88512b6f70ec33e8a243242c36a998707a8d137aaf,2024-11-21T01:48:23.107000 +CVE-2013-0884,0,0,1efce7ec447f692f6ab3f4f7122968f218b535ea24487389604bf7b193a24c55,2024-11-21T01:48:23.217000 +CVE-2013-0885,0,0,845a52227f7ca236afe80d6b45c800a9a229d6942dcda1ab292fb4563ce0d7dd,2024-11-21T01:48:23.340000 +CVE-2013-0886,0,0,16fec1217fb8b96569ede26972a3e907f94e2978336a1bc15bc8209f042872df,2024-11-21T01:48:23.477000 +CVE-2013-0887,0,0,469d6a555f7712875c165b287b4f8426aade31ce720a5524b3bfc7b539bb56f2,2024-11-21T01:48:23.610000 +CVE-2013-0888,0,0,89edee8591e1f321803393cef723b8455df9e4f9a5a642fbfcad2446585a6bd6,2024-11-21T01:48:23.730000 +CVE-2013-0889,0,0,fdce0681dc2dfd0abbf3617233bef9128bed9a9cf4b7d8a88aedf02c4545a8a6,2024-11-21T01:48:23.843000 +CVE-2013-0890,0,0,ef0893f26a16899eed1719aeb0e828ed8e3661f10b58bbf2afcc0680475e4272,2024-11-21T01:48:23.957000 +CVE-2013-0891,0,0,fc24e0014ce0571c7476579926ce8c9dd6975cd19911d7328d95bc1e8a9a7d89,2024-11-21T01:48:24.073000 +CVE-2013-0892,0,0,220de2c8c1033d561e5f2c5c642b1e8173460702c835d75787e5356abc22935d,2024-11-21T01:48:24.187000 +CVE-2013-0893,0,0,2c3ef0615d7bf09708339f7e3a556d7051ecbc575bffd5eb14da7f9e8bc4857b,2024-11-21T01:48:24.300000 +CVE-2013-0894,0,0,31bf952a10d3a1a11a4deccf6df69567ac870127bfa5a1dae94a54c5231d1001,2024-11-21T01:48:24.413000 +CVE-2013-0895,0,0,1716bd547b01f2fb820035ec4356691763f7ceb6eb908a10663b2861f2f2c28e,2024-11-21T01:48:24.527000 +CVE-2013-0896,0,0,35b3e3887323915db9dd4d5643421b99ac9835397617d38af64e36a11d50e9f4,2024-11-21T01:48:24.640000 +CVE-2013-0897,0,0,e73fbb4e502a978deb347505cc00c7d6f24262ba56187897d4782a0f7689feec,2024-11-21T01:48:24.757000 +CVE-2013-0898,0,0,337902db589ba71fd8002db02de3f2f744ff4b497eb32b1eb9cd70776b998cd3,2024-11-21T01:48:24.870000 +CVE-2013-0899,0,0,0e5447903456167f0d5053c6ab70c071e926be3ba683c3e31943bbabbc5f99b6,2024-11-21T01:48:25 +CVE-2013-0900,0,0,2e4f8f3f2d758c6a8ec9399d79ee9291508ca4b29af3edceb2fcb40818d2453b,2024-11-21T01:48:25.127000 +CVE-2013-0902,0,0,2698f02cb5a59aa9d95abdcdb65f66f84468b44ccfcca03a13bc0afc21b47630,2024-11-21T01:48:25.250000 +CVE-2013-0903,0,0,1e55f47cc2a08f3d8f4eea0dd51039a5e66b8e67581cb9dafbd30eb9644a9e80,2024-11-21T01:48:25.373000 +CVE-2013-0904,0,0,eb0611a23d077099cd70f40177dc7df6d7e1d4520b272ca5edf719bcc9374edb,2024-11-21T01:48:25.497000 +CVE-2013-0905,0,0,9334cb96c850e00c2467fba508f1f52b289f85dfa99bfbb094e9803693234911,2024-11-21T01:48:25.620000 +CVE-2013-0906,0,0,14f4fac762e11e461fbf2a1d4ee2717b90f020724f4b68ecb888c297ab18eca3,2024-11-21T01:48:25.740000 +CVE-2013-0907,0,0,3e9cd2f269955c6ce91b85218d9f236c44ef077640bb29b38c7ae79caba02a03,2024-11-21T01:48:25.867000 +CVE-2013-0908,0,0,6070a8f243e3396182b9ba414e772d4209605be8a558f3af92745a49c02ab159,2024-11-21T01:48:26.007000 +CVE-2013-0909,0,0,8a51fb280335ec4c5b8207f8d160ce35f67855a8b44560c5a47c1ef780d73eac,2024-11-21T01:48:26.133000 +CVE-2013-0910,0,0,d564af9394ccbcc43cb98819150bd1325805a999451a207701bda25df8a3b0a4,2024-11-21T01:48:26.257000 +CVE-2013-0911,0,0,62dea9caf2ca19ae0e4735e56935c595c8fbedd4e7d62173a646a4b9779bf12a,2024-11-21T01:48:26.383000 +CVE-2013-0912,0,0,546a7242cc6e6a2c5701879f9ad41be457b964f3c51f3c826aabbd045d11870b,2024-11-21T01:48:26.517000 +CVE-2013-0913,0,0,f86c81396555703a4218b21d5130617b5d11de566eb2529f63c569cf751fb8fe,2024-11-21T01:48:26.660000 +CVE-2013-0914,0,0,a96ae18127271eae5dbd52138f236a90d07ad4c441b0b6822ec8db0a6082d52f,2024-11-21T01:48:26.833000 +CVE-2013-0915,0,0,b4424f699d4510b58c3ad420b88660908454418880e882148a83ab17316af59b,2024-11-21T01:48:26.977000 +CVE-2013-0916,0,0,097309c996016e13417eb5a5df0434b0c700fae09c3f5401e76e3f23a2bb451c,2024-11-21T01:48:27.100000 +CVE-2013-0917,0,0,a1dd4d61780ecf7a9481c652b1b3e8d482b57e5e24c0ee3b635260467297bc30,2024-11-21T01:48:27.227000 +CVE-2013-0918,0,0,7e94ffd8108703186cbee1de902be6f54bd84b1a52fab057e20f04ab6ab5f867,2024-11-21T01:48:27.350000 +CVE-2013-0919,0,0,261e4f8aa89dc87d37034050846a5a71e900943c4c5ecbe944562a2f4e762729,2024-11-21T01:48:27.483000 +CVE-2013-0920,0,0,3ebfa86f1313a9ccd0f0899b5313d4034612c90b8ce7adf0881659a5262da99e,2024-11-21T01:48:27.603000 +CVE-2013-0921,0,0,4753215d003ebddec71ffeb4179581d881b3894bb36f8a4920d575e36c93a9f6,2024-11-21T01:48:27.720000 +CVE-2013-0922,0,0,617b5781447ef547f6389136ec25202a717b8448725ce9de7b9cfb74572fb961,2024-11-21T01:48:27.843000 +CVE-2013-0923,0,0,ec40097495543fec16a27ffeb567c88e5b78d2bd8b0d0337f4638e9c48afb578,2024-11-21T01:48:27.963000 +CVE-2013-0924,0,0,2a54b0c77102154c95949e9012fe4d392d19bbf3351d8e98beeacbbfc9ebe347,2024-11-21T01:48:28.070000 +CVE-2013-0925,0,0,35a0c650639cb4b520bf9ffd2846ba3f24ff872e02df16b1c5a9f6166c66dbd8,2024-11-21T01:48:28.190000 +CVE-2013-0926,0,0,e5a65f89035979d58afda5fe5811b2b125307d018ca83f20ce97c048a9f02c5c,2024-11-21T01:48:28.300000 +CVE-2013-0927,0,0,f01b20727c0ca34548b42c9341e983d8d042e43a8bb5638d7ef4c7bc81aaaa03,2024-11-21T01:48:28.420000 +CVE-2013-0928,0,0,6e7b3a33f0be565178d81e6ff71fc5437a9a529d7925b3a6890cd85eeddf5923,2024-11-21T01:48:28.547000 +CVE-2013-0929,0,0,b8c601139d346ae2f05847a6002db5a980736baf334da1d09803725d2e897b81,2024-11-21T01:48:28.693000 +CVE-2013-0930,0,0,c32fae19a0ac28a60d9dd4be6a9a72581824820fcf805eb52908116445dc77a9,2024-11-21T01:48:28.810000 +CVE-2013-0931,0,0,40cf0d5a8cde90fb8a07d60b74a5b788345c3535b7b19d012f3151f86d0c8cf0,2024-11-21T01:48:28.920000 +CVE-2013-0932,0,0,774f37c711a3f46e0e18fc15a13b2c8eadeb26d6bf77a62e26c27c347b3e8293,2024-11-21T01:48:29.043000 +CVE-2013-0933,0,0,f7b4b8c7e4290eff70dda93aedce1e02553fb67bc2ac008f0eb3aba326868ef6,2024-11-21T01:48:29.147000 +CVE-2013-0934,0,0,251ae58121ada037d51dfd11ed3d8ba7e8b59f623cc852a21d3aeb899f815319,2024-11-21T01:48:29.250000 +CVE-2013-0935,0,0,82b9e2d81ed02cb044396c7f3929531eea0698b471db287272979aad242eee85,2024-11-21T01:48:29.353000 +CVE-2013-0936,0,0,eb15e2f6bd6326d93f672224164acbeb183c6cc6d4e591d69f03c37934828da1,2024-11-21T01:48:29.453000 +CVE-2013-0937,0,0,04e9184502211bf7920d807e90a69a08a2c66971ccf2abb4a92d0b27d92f0198,2024-11-21T01:48:29.560000 +CVE-2013-0938,0,0,f68b22e0456a833a45554de86d85fb21bb78db2350492d308dd6ffe27d19bfab,2024-11-21T01:48:29.660000 +CVE-2013-0939,0,0,7145b5889146019b1aeee20dc51848b19e75791d905090dc8fa8900cc5976b7c,2024-11-21T01:48:29.763000 +CVE-2013-0940,0,0,b7c736ca3eb0e6925113893aaae06fdc935f1ff27ba9fecf756d94d3f42bf2b0,2024-11-21T01:48:29.870000 +CVE-2013-0941,0,0,0c2854eaf90387ec466185413cd68ea09eb00fa35e80c079dc0b0c685205135c,2024-11-21T01:48:29.983000 +CVE-2013-0942,0,0,2491664b1f2985778ca11ce092771907da3ab254859ff3cad330dd2d036ac85c,2024-11-21T01:48:30.107000 +CVE-2013-0943,0,0,70d7124ddfbe41bde694dc7d09fdaa19e328ec25659a93a668a9be9b39b28132,2024-11-21T01:48:30.213000 +CVE-2013-0944,0,0,401310127da41add0286deff3f989686760f3e955a77d62b78a01912c0326ce7,2024-11-21T01:48:30.323000 +CVE-2013-0945,0,0,3296690d9102fa826ee4dcbc23ddc0f021502b664b24d24002c4f9d6c3ab0dea,2024-11-21T01:48:30.427000 +CVE-2013-0946,0,0,b1787faa359a71d617446dd463352db7c5a7172cfb3035982a0c6f2250cd0a23,2024-11-21T01:48:30.523000 +CVE-2013-0947,0,0,1c3629c28b3a094eac965077d7775d3664a1cb97058e5e8a16989c7c9b71b96a,2024-11-21T01:48:30.623000 +CVE-2013-0948,0,0,527eada429412394903861f371e648d408d67e35c84c623c7896f8a551fc7303,2024-11-21T01:48:30.730000 +CVE-2013-0949,0,0,9c721bfffbbe2372c1455e0260d91a10d50aab3ab7920e40a4d923545251ad8f,2024-11-21T01:48:30.850000 +CVE-2013-0950,0,0,96a556d6ff1a45532209ed0f1209a33b6d058f867a14fecd9516c57bf87ee83c,2024-11-21T01:48:30.960000 +CVE-2013-0951,0,0,22fb84d1c4b30afab4bb55390b85273778d8373f71ab969ddde892970b14fd75,2024-11-21T01:48:31.077000 +CVE-2013-0952,0,0,eaea155f6b333a0c89c7ec21c125a756b135071242dbf27ebf4c71bbb8ac10d4,2024-11-21T01:48:31.187000 +CVE-2013-0953,0,0,550bbb1e8749d2d429e961bf169cbdd2d9bbf435782bd69ca17677a40a300fda,2024-11-21T01:48:31.307000 +CVE-2013-0954,0,0,24d670200c5bf210b513d89e0cd67897b1b86794d3f84b98089f04b23d1c49c1,2024-11-21T01:48:31.420000 +CVE-2013-0955,0,0,085ba927a6d72e2238a12b8cb4a8f4bd5f97c11c9d083c7aa3a4f545616ed578,2024-11-21T01:48:31.540000 +CVE-2013-0956,0,0,ff537b69b713d5ca8facd7ea2a6137379f474f12068fdc5961e85b0dbd07b120,2024-11-21T01:48:31.657000 +CVE-2013-0957,0,0,052d1720759707394546b9fc4e51b709fdaeb5979bddc7c43c0025576c5d4249,2024-11-21T01:48:31.790000 +CVE-2013-0958,0,0,4bb6b246d99625533cfea0633139eaf4529ff4753a3d170cf70a7217b2eb886d,2024-11-21T01:48:31.920000 +CVE-2013-0959,0,0,306123b5a6f96f0dc2a5c721f049f863125fe31df6e2bf265f1bd0a0721a4e81,2024-11-21T01:48:32.033000 +CVE-2013-0960,0,0,9b1fc5efb5ce7d5f71ffa1d77da2f325a7bb65a107ba68cf15a273e17ed6e586,2024-11-21T01:48:32.187000 +CVE-2013-0961,0,0,178d69678f1e9fce54a2980e84ac4f5b083bf6df1b497f083237cad73766496a,2024-11-21T01:48:32.327000 +CVE-2013-0962,0,0,a17568ac6fa10ca7f2baaaff8f7022c9adb25672da0299d148e7df4811d19c4c,2024-11-21T01:48:32.477000 +CVE-2013-0963,0,0,ca17a69f436f79d1dce3303444b47a57528243f0992aeda504718a1c0e0183fe,2024-11-21T01:48:32.607000 +CVE-2013-0964,0,0,4405b42be05e7c2e1e7a6c26cf2a242dcb181948e729fe3184de991274d2a75e,2024-11-21T01:48:32.740000 CVE-2013-0965,0,0,7533a0eddfb7498077755cc55997741c0dde87ef2cbab77d94bb4614290c7a5c,2023-11-07T02:14:33.120000 -CVE-2013-0966,0,1,f754e5a8a686bfb90b65193cf22a55fe3e7ae1225bc822e5e963fda9cfa6fe10,2024-11-21T01:48:32.890000 -CVE-2013-0967,0,1,0c52ad382c250ab09f00e1b3caff051c8d01af70051662bf1c28750a9cc5d93d,2024-11-21T01:48:33.020000 -CVE-2013-0968,0,1,d957c34d45286179e64d214b4306fdf84340fac498444f6399aeaff54da8c658,2024-11-21T01:48:33.133000 -CVE-2013-0969,0,1,a53be0d20bb087f728c552af1cb803e9179afe9d363a5793be35e6b2ae1ba8bd,2024-11-21T01:48:33.250000 -CVE-2013-0970,0,1,a9d61ed008e4df44b2791a3e289f3c1e593f5949fa2cec0993ebab6f4cc13b63,2024-11-21T01:48:33.373000 -CVE-2013-0971,0,1,734f6673a6e1bbfe1f4c3d9dde2d27812d702d911b949497a3fbff1243d763d1,2024-11-21T01:48:33.500000 +CVE-2013-0966,0,0,f754e5a8a686bfb90b65193cf22a55fe3e7ae1225bc822e5e963fda9cfa6fe10,2024-11-21T01:48:32.890000 +CVE-2013-0967,0,0,0c52ad382c250ab09f00e1b3caff051c8d01af70051662bf1c28750a9cc5d93d,2024-11-21T01:48:33.020000 +CVE-2013-0968,0,0,d957c34d45286179e64d214b4306fdf84340fac498444f6399aeaff54da8c658,2024-11-21T01:48:33.133000 +CVE-2013-0969,0,0,a53be0d20bb087f728c552af1cb803e9179afe9d363a5793be35e6b2ae1ba8bd,2024-11-21T01:48:33.250000 +CVE-2013-0970,0,0,a9d61ed008e4df44b2791a3e289f3c1e593f5949fa2cec0993ebab6f4cc13b63,2024-11-21T01:48:33.373000 +CVE-2013-0971,0,0,734f6673a6e1bbfe1f4c3d9dde2d27812d702d911b949497a3fbff1243d763d1,2024-11-21T01:48:33.500000 CVE-2013-0972,0,0,918b8726a1dcf07432cbed00b28a78b1445b34fb1fefd420dbed46278f8e16f9,2023-11-07T02:14:33.187000 -CVE-2013-0973,0,1,a08e7020277e316c610a684001759a330f460022145de9cfca29881ab10cd215,2024-11-21T01:48:33.620000 -CVE-2013-0974,0,1,4cf95443f68104611d3518fe69c2abf35a1f27167a7a24648a8cd03e76fa60d0,2024-11-21T01:48:33.747000 -CVE-2013-0975,0,1,f1e246c1fdd3e34db49a90514737bdb1608d312f1fa7201f2c49c402078838fd,2024-11-21T01:48:33.877000 -CVE-2013-0976,0,1,5129c167a36df7f8d7da1851bdc19eafc9c590ea2683e5d9527825097898de78,2024-11-21T01:48:33.980000 -CVE-2013-0977,0,1,d4c029127bc0fc121e4ca796ca3c611f6be4b68a5b240b63f7d1ed26f8faa464,2024-11-21T01:48:34.090000 -CVE-2013-0978,0,1,607cf26b7800c6d6c2015b1482745794c0b7c81c8bdfbb32b8a7acf5bbbf2fa1,2024-11-21T01:48:34.217000 -CVE-2013-0979,0,1,7a2f59d8daf41287841410d363508776511ef4dd2c9ced744a9cca7bafea2965,2024-11-21T01:48:34.353000 -CVE-2013-0980,0,1,7f92ac569781cb0453c68dd53af880a5d89dc264631b1b7e3f54c98c3d517f9b,2024-11-21T01:48:34.507000 -CVE-2013-0981,0,1,eab63f61eb7f25704b61fabf204e3c38385ba72d47066bb26c272cfd9e03dc53,2024-11-21T01:48:34.663000 -CVE-2013-0982,0,1,e2c02db438f8c068b1958a123b1b488c74a6094473d02f7c49e076a56c11ad92,2024-11-21T01:48:34.797000 -CVE-2013-0983,0,1,d30b267a3b550887c130b3efa8c84b1195832d051af91b2dd17aaf673f9806ba,2024-11-21T01:48:34.920000 -CVE-2013-0984,0,1,822d29ab8c4c2d6aed8888112a0358b61badafde15800fce20cfb105e31ea879,2024-11-21T01:48:35.030000 -CVE-2013-0985,0,1,b3dbfa10cd36ac669a8c5889ae6dfc2899e179e39a4a62b443abe52887d4e8a3,2024-11-21T01:48:35.170000 -CVE-2013-0986,0,1,0576097df3ef4f0be4039e5a8894c4e6d61366f83593ea311d2ecfd5a2533587,2024-11-21T01:48:35.283000 -CVE-2013-0987,0,1,512822d5bf0dc543b05e30f427f9507da7d45f82168364abbc4da5263f1fb86e,2024-11-21T01:48:35.420000 -CVE-2013-0988,0,1,a81dfda1e487d933ff3842cf3385d3c28966454ba27feee7d78a35e599c2d696,2024-11-21T01:48:35.570000 -CVE-2013-0989,0,1,48c94029a1788a44dd884393e1283c9e9f1a6e2e8c5d9a88e01163843a75dc6e,2024-11-21T01:48:36.430000 -CVE-2013-0990,0,1,bcb06dbc3037b70a4808e3e996bcc38f763d1f1019212379aaa074e94ce9c54c,2024-11-21T01:48:36.883000 -CVE-2013-0991,0,1,f473932022469708b2c88e4a56b1c3c95f73f38a5aad028c9144619372fb3113,2024-11-21T01:48:37.020000 -CVE-2013-0992,0,1,5c289d5e0c887e514e9e9ce94fca0dccac9149465056b37667ff5f50351c7b46,2024-11-21T01:48:37.150000 -CVE-2013-0993,0,1,e84f6d0ca678ea5c52b9fc4cbbfac6b82b1aeb47cf9e4dc6018dce695413ff3b,2024-11-21T01:48:37.287000 -CVE-2013-0994,0,1,6f8b2847733a4671040b8fac958bbbf99aa3ae6a825170e6a551895ef157c605,2024-11-21T01:48:37.413000 -CVE-2013-0995,0,1,440cfff50d4ddea3b420e1363321a85ed52532edb6712937f9526f7b2466ad9a,2024-11-21T01:48:37.547000 -CVE-2013-0996,0,1,704c3c096c5c4e46f0e479b5b723fc77e8aa5e1e5da6fc3cc4354b3a177234eb,2024-11-21T01:48:37.690000 -CVE-2013-0997,0,1,aef6f728bcf5087915f5a8063e2ef2ad0b1688ccf0a2fedd5810e0ec3d8f1610,2024-11-21T01:48:37.803000 -CVE-2013-0998,0,1,55af5e428af70fb178e0999f53982e062d262490365b80e1496ae4b9844415fe,2024-11-21T01:48:37.937000 -CVE-2013-0999,0,1,be716134077de45a1f5f20fcd2a07bfd6bb2334dedc43ed9c465df58f8c48b34,2024-11-21T01:48:38.063000 -CVE-2013-1000,0,1,50993b54b7fbe489dae8ee1f617c9b4f76411f39a3025e1c99214ab8eceb5e28,2024-11-21T01:48:42.450000 +CVE-2013-0973,0,0,a08e7020277e316c610a684001759a330f460022145de9cfca29881ab10cd215,2024-11-21T01:48:33.620000 +CVE-2013-0974,0,0,4cf95443f68104611d3518fe69c2abf35a1f27167a7a24648a8cd03e76fa60d0,2024-11-21T01:48:33.747000 +CVE-2013-0975,0,0,f1e246c1fdd3e34db49a90514737bdb1608d312f1fa7201f2c49c402078838fd,2024-11-21T01:48:33.877000 +CVE-2013-0976,0,0,5129c167a36df7f8d7da1851bdc19eafc9c590ea2683e5d9527825097898de78,2024-11-21T01:48:33.980000 +CVE-2013-0977,0,0,d4c029127bc0fc121e4ca796ca3c611f6be4b68a5b240b63f7d1ed26f8faa464,2024-11-21T01:48:34.090000 +CVE-2013-0978,0,0,607cf26b7800c6d6c2015b1482745794c0b7c81c8bdfbb32b8a7acf5bbbf2fa1,2024-11-21T01:48:34.217000 +CVE-2013-0979,0,0,7a2f59d8daf41287841410d363508776511ef4dd2c9ced744a9cca7bafea2965,2024-11-21T01:48:34.353000 +CVE-2013-0980,0,0,7f92ac569781cb0453c68dd53af880a5d89dc264631b1b7e3f54c98c3d517f9b,2024-11-21T01:48:34.507000 +CVE-2013-0981,0,0,eab63f61eb7f25704b61fabf204e3c38385ba72d47066bb26c272cfd9e03dc53,2024-11-21T01:48:34.663000 +CVE-2013-0982,0,0,e2c02db438f8c068b1958a123b1b488c74a6094473d02f7c49e076a56c11ad92,2024-11-21T01:48:34.797000 +CVE-2013-0983,0,0,d30b267a3b550887c130b3efa8c84b1195832d051af91b2dd17aaf673f9806ba,2024-11-21T01:48:34.920000 +CVE-2013-0984,0,0,822d29ab8c4c2d6aed8888112a0358b61badafde15800fce20cfb105e31ea879,2024-11-21T01:48:35.030000 +CVE-2013-0985,0,0,b3dbfa10cd36ac669a8c5889ae6dfc2899e179e39a4a62b443abe52887d4e8a3,2024-11-21T01:48:35.170000 +CVE-2013-0986,0,0,0576097df3ef4f0be4039e5a8894c4e6d61366f83593ea311d2ecfd5a2533587,2024-11-21T01:48:35.283000 +CVE-2013-0987,0,0,512822d5bf0dc543b05e30f427f9507da7d45f82168364abbc4da5263f1fb86e,2024-11-21T01:48:35.420000 +CVE-2013-0988,0,0,a81dfda1e487d933ff3842cf3385d3c28966454ba27feee7d78a35e599c2d696,2024-11-21T01:48:35.570000 +CVE-2013-0989,0,0,48c94029a1788a44dd884393e1283c9e9f1a6e2e8c5d9a88e01163843a75dc6e,2024-11-21T01:48:36.430000 +CVE-2013-0990,0,0,bcb06dbc3037b70a4808e3e996bcc38f763d1f1019212379aaa074e94ce9c54c,2024-11-21T01:48:36.883000 +CVE-2013-0991,0,0,f473932022469708b2c88e4a56b1c3c95f73f38a5aad028c9144619372fb3113,2024-11-21T01:48:37.020000 +CVE-2013-0992,0,0,5c289d5e0c887e514e9e9ce94fca0dccac9149465056b37667ff5f50351c7b46,2024-11-21T01:48:37.150000 +CVE-2013-0993,0,0,e84f6d0ca678ea5c52b9fc4cbbfac6b82b1aeb47cf9e4dc6018dce695413ff3b,2024-11-21T01:48:37.287000 +CVE-2013-0994,0,0,6f8b2847733a4671040b8fac958bbbf99aa3ae6a825170e6a551895ef157c605,2024-11-21T01:48:37.413000 +CVE-2013-0995,0,0,440cfff50d4ddea3b420e1363321a85ed52532edb6712937f9526f7b2466ad9a,2024-11-21T01:48:37.547000 +CVE-2013-0996,0,0,704c3c096c5c4e46f0e479b5b723fc77e8aa5e1e5da6fc3cc4354b3a177234eb,2024-11-21T01:48:37.690000 +CVE-2013-0997,0,0,aef6f728bcf5087915f5a8063e2ef2ad0b1688ccf0a2fedd5810e0ec3d8f1610,2024-11-21T01:48:37.803000 +CVE-2013-0998,0,0,55af5e428af70fb178e0999f53982e062d262490365b80e1496ae4b9844415fe,2024-11-21T01:48:37.937000 +CVE-2013-0999,0,0,be716134077de45a1f5f20fcd2a07bfd6bb2334dedc43ed9c465df58f8c48b34,2024-11-21T01:48:38.063000 +CVE-2013-1000,0,0,50993b54b7fbe489dae8ee1f617c9b4f76411f39a3025e1c99214ab8eceb5e28,2024-11-21T01:48:42.450000 CVE-2013-10001,0,0,3c52672050366795488e4e3695dffb9b98bc93a389c82735519d134cf06151bf,2022-06-01T16:25:06.963000 CVE-2013-10002,0,0,b81dec6ab5067c95cf28e7497aa3d664352c8c2c169eab83feaeee409661c5fc,2022-06-08T14:21:29.570000 CVE-2013-10003,0,0,e07a64178740f5bddea64aff7e0448941c09cc1f2676f2ff3ff426e3d224257c,2022-06-08T16:17:38.517000 @@ -58647,7 +58647,7 @@ CVE-2013-10006,0,0,26a9f2062e2792d6b3e1bbf5211c18ef0566d17c3f53f6cea62372941054f CVE-2013-10007,0,0,8f0fa3ae42c4b87dd7ae3cee78db881fc33a90781d0d11eeceb09b28f2e24f3b,2024-05-17T00:54:44.573000 CVE-2013-10008,0,0,134afd51763480100075cbaed2e9bc5e8ae5048dc0fd6b22e3d3f16f74cab0a0,2024-05-17T00:54:44.683000 CVE-2013-10009,0,0,2f260517929e10d1ddd010b23d2d78f83c5cf14aa66ebeba230a38971d89c3a7,2024-05-17T00:54:44.800000 -CVE-2013-1001,0,1,2a377eb66a43bfafade660f0cdfcb93b64a2be0eb93180e2102f5008eac47072,2024-11-21T01:48:42.590000 +CVE-2013-1001,0,0,2a377eb66a43bfafade660f0cdfcb93b64a2be0eb93180e2102f5008eac47072,2024-11-21T01:48:42.590000 CVE-2013-10010,0,0,35115efba473a9be08e3ea61a016265a69774615b3bb8a46bfc72b1fcd630dfd,2024-05-17T00:54:44.913000 CVE-2013-10011,0,0,91fda128b2103eeafd081ea2caa9f32ca6c0532676232c7cef9a876afbb70072,2024-05-17T00:54:45.027000 CVE-2013-10012,0,0,98457c558972b70026068ff20ea2d72c8e3672734ff70a5818277814a55375bf,2024-05-17T00:54:45.133000 @@ -58658,7 +58658,7 @@ CVE-2013-10016,0,0,e50dca4e74820b6513ab58630e911af752202825ca8f68263d839c08a2d92 CVE-2013-10017,0,0,e13dcdb0e135d2f933affd3e67e58ddb8e8f5c65af225693f3efa56b321dd612,2024-05-17T00:54:45.723000 CVE-2013-10018,0,0,d3edba1a99fd538efd335a8d23115b2cf130fd4438188a31fb7cdd8e6b4635dc,2024-05-17T00:54:45.830000 CVE-2013-10019,0,0,dd3b8972b69d64c6c8b2ec1adbe30befcb34d596bb15759848749675ac8eb3ef,2024-05-17T00:54:45.940000 -CVE-2013-1002,0,1,f2e2b7cadcda645df3b7b19a6e4e33ce37bab9d8a75a032c6fb47cb6c989809e,2024-11-21T01:48:42.747000 +CVE-2013-1002,0,0,f2e2b7cadcda645df3b7b19a6e4e33ce37bab9d8a75a032c6fb47cb6c989809e,2024-11-21T01:48:42.747000 CVE-2013-10020,0,0,b234abfc61715c3f3c7232f952c7f2ae2b7ddfbefc92b8ddbf64cfe1df36d41f,2024-05-17T00:54:46.060000 CVE-2013-10021,0,0,e6a081a5220879de68dc88839164fbce1f324f52234b08166ce30d31308652c0,2024-05-17T00:54:46.190000 CVE-2013-10022,0,0,960676a75c383ca4006c219bfe465f7a7bcbeb5953ded47b8c1e40ab35c149ad,2024-05-17T00:54:46.317000 @@ -58669,75 +58669,75 @@ CVE-2013-10026,0,0,23a1b2c0b6d54125e58b22c08eac803a45069fe7e5ace699ea09eabf2b0f9 CVE-2013-10027,0,0,8a93b55f273203e2d68c40df1754f2b77c012eefcdbcf71650bfccbef3f0f4e7,2024-05-17T00:54:46.920000 CVE-2013-10028,0,0,8fd08ed854f506b2eb2b2a307b81946a999104361c6bf4b7f5d04822a296337f,2024-05-17T00:54:47.040000 CVE-2013-10029,0,0,c26ba2851bdb130c220c8924200a806abf0f7abea84cd881d4032649493e6226,2024-05-17T00:54:47.147000 -CVE-2013-1003,0,1,5894c1aaffc91f5209995a8fd1d817f817362a383772babef8eb724b286c6686,2024-11-21T01:48:42.910000 +CVE-2013-1003,0,0,5894c1aaffc91f5209995a8fd1d817f817362a383772babef8eb724b286c6686,2024-11-21T01:48:42.910000 CVE-2013-10030,0,0,61264eb52e50d303bed00574b0f4d403e18d2314a111b057be34b562589e5d99,2024-05-17T00:54:47.260000 -CVE-2013-1004,0,1,b4b6d319666bc896efc4822571d7f8ea0d03f2ac978058fe4583136688284e51,2024-11-21T01:48:43.060000 -CVE-2013-1005,0,1,bfa67c15570ced050e855a5bd12286adbba6b1413d6828d5763a2916793c084b,2024-11-21T01:48:43.190000 -CVE-2013-1006,0,1,502906433481f268af0675f04c090a04e4c1b72b9a9aaec954cf37f77ee040a1,2024-11-21T01:48:43.320000 -CVE-2013-1007,0,1,65bf02041f9887643d6fc1ae90defbaa5629058beeb303b61deb7ec8f7d78fc1,2024-11-21T01:48:43.453000 -CVE-2013-1008,0,1,cda67236731c44ecf87672b5268df9bceca7b975ba9c2889c15bf3b1ee51d457,2024-11-21T01:48:43.603000 -CVE-2013-1009,0,1,18f1525eecd69cd44c3da030c9da4b94747c39e871083c9f2312692a05cea565,2024-11-21T01:48:43.753000 -CVE-2013-1010,0,1,9a1efc875d05f0de10545eebf51ac9ab12b32fee50b1074db1c59e4e6d01cf37,2024-11-21T01:48:43.867000 -CVE-2013-1011,0,1,671a844984117afc7654724b8087592b0ced0b7151a35ef872d6511b177b9702,2024-11-21T01:48:44.030000 -CVE-2013-1012,0,1,12ae299836a3e78d298022773c892ee00070e917f59e824ec4e28f6b2eeb1d01,2024-11-21T01:48:44.180000 -CVE-2013-1013,0,1,12f2e84ed32ca1492c1f891c085a61cd7eb2ca14dc48a8b7cd7070ef3e7a9b54,2024-11-21T01:48:44.303000 -CVE-2013-1014,0,1,8abbfba641dbd7d908fdba683fbe37137879f9d8fa39254c1c02b6038e46e147,2024-11-21T01:48:44.417000 -CVE-2013-1015,0,1,9a899e194d275ee913e1da441c473215c34cdd6b948621736727addc011ef249,2024-11-21T01:48:44.557000 -CVE-2013-1016,0,1,16e5931d106a14b9164e6a8158910d40a0b334c41f0688e1fb30ae035b024089,2024-11-21T01:48:44.703000 -CVE-2013-1017,0,1,54362c82ab7e5496bd787c7cb27b9d68590112438e040aacd0d6427098e396af,2024-11-21T01:48:44.833000 -CVE-2013-1018,0,1,66f1d05193c5729e3d154007b07d121323644a95c8ebf4b4825dfbc41aa206b5,2024-11-21T01:48:44.970000 -CVE-2013-1019,0,1,99af2c6532f2a9a9b266c746f001e42e2fdb1a38684a9003990d84cf4d6b9eab,2024-11-21T01:48:45.110000 -CVE-2013-1020,0,1,b417fca5561d1638ca92b062652c474875a3f02a6ae26a01ff06a6d849c731df,2024-11-21T01:48:45.253000 -CVE-2013-1021,0,1,530d37e5e9871080a80398a529de99cc16ec95b6f92278c1e42efd0e1f4d5a01,2024-11-21T01:48:45.383000 -CVE-2013-1022,0,1,0f8ea5887c01badbbac3d43897d5a86dbe97b4cb798b49d7e2f05d04ff850517,2024-11-21T01:48:45.513000 -CVE-2013-1023,0,1,4b29f7cee48bf883c7d96e7a660655c371013cb65a8985b0a0b972872a580404,2024-11-21T01:48:45.647000 -CVE-2013-1024,0,1,d4b46b155437750a1df37cc6f2a295208d56427515ef531bc1f7c0bce276f5ea,2024-11-21T01:48:45.770000 -CVE-2013-1025,0,1,8afeaf46f0d76d013bfc871f9909a30453cec0f4bf288693579f41cd52c5431e,2024-11-21T01:48:45.890000 -CVE-2013-1026,0,1,ef4ff09bd8f5a89342e52b4e2efefcac0d4ac103ee5ea0b720120596c4ed9a05,2024-11-21T01:48:46.010000 -CVE-2013-1027,0,1,fe015964dee0055056f32ea0dead57a1d48c0c631776f745313b56173c84cd1a,2024-11-21T01:48:46.160000 -CVE-2013-1028,0,1,3d9c55b7ee90b8f82d392e9e0b2cd215ec1866ffaf37fd5dfd70874daf742755,2024-11-21T01:48:46.273000 -CVE-2013-1029,0,1,ac33317e12ae414a28824a3a6215df09ff8ff0f682bf15b2a2de2090db3e81ea,2024-11-21T01:48:46.397000 -CVE-2013-1030,0,1,08be8ad143f287437006aafa492d55e186307267b83227dd8ab50ed8f915c5f5,2024-11-21T01:48:46.510000 -CVE-2013-1031,0,1,fd1e095d6c0f6b4950eb420805fadb5d2fb3e75a8eeafd3a7061217997acf839,2024-11-21T01:48:46.620000 -CVE-2013-1032,0,1,f91d86dbcac27a5f09b2b8ff3a2aeae2080a18409479ede766a7ec950c2f07ae,2024-11-21T01:48:46.740000 -CVE-2013-1033,0,1,f5b2078b9b38708dacd66b8f79dbe1c1a69cbdabd96c95ff087f0087a8994d64,2024-11-21T01:48:46.867000 -CVE-2013-1034,0,1,3854601e8f9b0ab0752a559b7a501e76ec91fb2066393ade1284e2ffec597605,2024-11-21T01:48:46.980000 -CVE-2013-1035,0,1,dc9d41b8aa1666360de65ebbaab88ac3a744b1345155b398b0428a9d7ea81940,2024-11-21T01:48:47.100000 -CVE-2013-1036,0,1,1def2fabad0a2a54ef4c63750a8eb5c7be9926e820bd6f78c9e2174971583b6c,2024-11-21T01:48:47.210000 -CVE-2013-1037,0,1,0c079737483dc262f57e31331a94ed0d20a4a7dedf4efec325ffb085b15a56f5,2024-11-21T01:48:47.340000 -CVE-2013-1038,0,1,e4b57f88e55c921753bd1d1250b53687958bb9c1578183442dc4cc04a069287d,2024-11-21T01:48:47.477000 -CVE-2013-1039,0,1,8aa5baebab9d827ccc16e86e8fa52dfc40a1835d8e14139e047014727164c6bc,2024-11-21T01:48:47.617000 -CVE-2013-1040,0,1,d4159a872ce1e6ff0c85022c1fbc26efce79b353f5cbb7d375ee099525223c0c,2024-11-21T01:48:47.760000 -CVE-2013-1041,0,1,2f82a03ab3574ecff6b7882162b67e24a81527d3ebea920323a9543b6a077077,2024-11-21T01:48:47.917000 -CVE-2013-1042,0,1,330f930d129a0be0e47b48e80337ef718d859af21f61e28391038dfd7abccc2e,2024-11-21T01:48:48.057000 -CVE-2013-1043,0,1,93f830deecaacab8e03842b6d2c1084768e1a4f5131998df4e6f136f4b24e366,2024-11-21T01:48:48.183000 -CVE-2013-1044,0,1,ef1f12e7ad96386bf30e22421eb7701d691b0d548759618bf9b325347eb6dfb8,2024-11-21T01:48:48.313000 -CVE-2013-1045,0,1,bddef75df865cf227da86720267fab21a6629c38912f5d42290baefdf8c42fbd,2024-11-21T01:48:48.450000 -CVE-2013-1046,0,1,c0e6546dc0fdfb2cdb87f02a828a681ab193636781a3d9faafbd73d908c18ae1,2024-11-21T01:48:48.580000 -CVE-2013-1047,0,1,a594422a37f298f2c8e29d435cc7de75a0de93d00af9ca85667e8d283e7c26a4,2024-11-21T01:48:48.720000 -CVE-2013-1048,0,1,e4d149edca0b7a243b8be6820198d5580c9324be15f5c07155ae3279f3941d76,2024-11-21T01:48:48.857000 -CVE-2013-1049,0,1,ef03be83154befbc39d5cd5d65e7a96176a25fe5dce5302a93d7d94ed5be42aa,2024-11-21T01:48:48.970000 -CVE-2013-1050,0,1,7089e612df8f6e5c6e0b17d5e3dd0e20ab2d6a3c83c731bc7a3aa8f6d06e7bc1,2024-11-21T01:48:49.093000 -CVE-2013-1051,0,1,2f55cf177a8f3ef135c88e37de0fcf41e015cebd9752cb66c1269c92b54ca4f2,2024-11-21T01:48:49.233000 -CVE-2013-1052,0,1,fe70ccb464d27d4f61af893675ea237e4c5aff04fe848f85c79e11fa60d2b002,2024-11-21T01:48:49.360000 +CVE-2013-1004,0,0,b4b6d319666bc896efc4822571d7f8ea0d03f2ac978058fe4583136688284e51,2024-11-21T01:48:43.060000 +CVE-2013-1005,0,0,bfa67c15570ced050e855a5bd12286adbba6b1413d6828d5763a2916793c084b,2024-11-21T01:48:43.190000 +CVE-2013-1006,0,0,502906433481f268af0675f04c090a04e4c1b72b9a9aaec954cf37f77ee040a1,2024-11-21T01:48:43.320000 +CVE-2013-1007,0,0,65bf02041f9887643d6fc1ae90defbaa5629058beeb303b61deb7ec8f7d78fc1,2024-11-21T01:48:43.453000 +CVE-2013-1008,0,0,cda67236731c44ecf87672b5268df9bceca7b975ba9c2889c15bf3b1ee51d457,2024-11-21T01:48:43.603000 +CVE-2013-1009,0,0,18f1525eecd69cd44c3da030c9da4b94747c39e871083c9f2312692a05cea565,2024-11-21T01:48:43.753000 +CVE-2013-1010,0,0,9a1efc875d05f0de10545eebf51ac9ab12b32fee50b1074db1c59e4e6d01cf37,2024-11-21T01:48:43.867000 +CVE-2013-1011,0,0,671a844984117afc7654724b8087592b0ced0b7151a35ef872d6511b177b9702,2024-11-21T01:48:44.030000 +CVE-2013-1012,0,0,12ae299836a3e78d298022773c892ee00070e917f59e824ec4e28f6b2eeb1d01,2024-11-21T01:48:44.180000 +CVE-2013-1013,0,0,12f2e84ed32ca1492c1f891c085a61cd7eb2ca14dc48a8b7cd7070ef3e7a9b54,2024-11-21T01:48:44.303000 +CVE-2013-1014,0,0,8abbfba641dbd7d908fdba683fbe37137879f9d8fa39254c1c02b6038e46e147,2024-11-21T01:48:44.417000 +CVE-2013-1015,0,0,9a899e194d275ee913e1da441c473215c34cdd6b948621736727addc011ef249,2024-11-21T01:48:44.557000 +CVE-2013-1016,0,0,16e5931d106a14b9164e6a8158910d40a0b334c41f0688e1fb30ae035b024089,2024-11-21T01:48:44.703000 +CVE-2013-1017,0,0,54362c82ab7e5496bd787c7cb27b9d68590112438e040aacd0d6427098e396af,2024-11-21T01:48:44.833000 +CVE-2013-1018,0,0,66f1d05193c5729e3d154007b07d121323644a95c8ebf4b4825dfbc41aa206b5,2024-11-21T01:48:44.970000 +CVE-2013-1019,0,0,99af2c6532f2a9a9b266c746f001e42e2fdb1a38684a9003990d84cf4d6b9eab,2024-11-21T01:48:45.110000 +CVE-2013-1020,0,0,b417fca5561d1638ca92b062652c474875a3f02a6ae26a01ff06a6d849c731df,2024-11-21T01:48:45.253000 +CVE-2013-1021,0,0,530d37e5e9871080a80398a529de99cc16ec95b6f92278c1e42efd0e1f4d5a01,2024-11-21T01:48:45.383000 +CVE-2013-1022,0,0,0f8ea5887c01badbbac3d43897d5a86dbe97b4cb798b49d7e2f05d04ff850517,2024-11-21T01:48:45.513000 +CVE-2013-1023,0,0,4b29f7cee48bf883c7d96e7a660655c371013cb65a8985b0a0b972872a580404,2024-11-21T01:48:45.647000 +CVE-2013-1024,0,0,d4b46b155437750a1df37cc6f2a295208d56427515ef531bc1f7c0bce276f5ea,2024-11-21T01:48:45.770000 +CVE-2013-1025,0,0,8afeaf46f0d76d013bfc871f9909a30453cec0f4bf288693579f41cd52c5431e,2024-11-21T01:48:45.890000 +CVE-2013-1026,0,0,ef4ff09bd8f5a89342e52b4e2efefcac0d4ac103ee5ea0b720120596c4ed9a05,2024-11-21T01:48:46.010000 +CVE-2013-1027,0,0,fe015964dee0055056f32ea0dead57a1d48c0c631776f745313b56173c84cd1a,2024-11-21T01:48:46.160000 +CVE-2013-1028,0,0,3d9c55b7ee90b8f82d392e9e0b2cd215ec1866ffaf37fd5dfd70874daf742755,2024-11-21T01:48:46.273000 +CVE-2013-1029,0,0,ac33317e12ae414a28824a3a6215df09ff8ff0f682bf15b2a2de2090db3e81ea,2024-11-21T01:48:46.397000 +CVE-2013-1030,0,0,08be8ad143f287437006aafa492d55e186307267b83227dd8ab50ed8f915c5f5,2024-11-21T01:48:46.510000 +CVE-2013-1031,0,0,fd1e095d6c0f6b4950eb420805fadb5d2fb3e75a8eeafd3a7061217997acf839,2024-11-21T01:48:46.620000 +CVE-2013-1032,0,0,f91d86dbcac27a5f09b2b8ff3a2aeae2080a18409479ede766a7ec950c2f07ae,2024-11-21T01:48:46.740000 +CVE-2013-1033,0,0,f5b2078b9b38708dacd66b8f79dbe1c1a69cbdabd96c95ff087f0087a8994d64,2024-11-21T01:48:46.867000 +CVE-2013-1034,0,0,3854601e8f9b0ab0752a559b7a501e76ec91fb2066393ade1284e2ffec597605,2024-11-21T01:48:46.980000 +CVE-2013-1035,0,0,dc9d41b8aa1666360de65ebbaab88ac3a744b1345155b398b0428a9d7ea81940,2024-11-21T01:48:47.100000 +CVE-2013-1036,0,0,1def2fabad0a2a54ef4c63750a8eb5c7be9926e820bd6f78c9e2174971583b6c,2024-11-21T01:48:47.210000 +CVE-2013-1037,0,0,0c079737483dc262f57e31331a94ed0d20a4a7dedf4efec325ffb085b15a56f5,2024-11-21T01:48:47.340000 +CVE-2013-1038,0,0,e4b57f88e55c921753bd1d1250b53687958bb9c1578183442dc4cc04a069287d,2024-11-21T01:48:47.477000 +CVE-2013-1039,0,0,8aa5baebab9d827ccc16e86e8fa52dfc40a1835d8e14139e047014727164c6bc,2024-11-21T01:48:47.617000 +CVE-2013-1040,0,0,d4159a872ce1e6ff0c85022c1fbc26efce79b353f5cbb7d375ee099525223c0c,2024-11-21T01:48:47.760000 +CVE-2013-1041,0,0,2f82a03ab3574ecff6b7882162b67e24a81527d3ebea920323a9543b6a077077,2024-11-21T01:48:47.917000 +CVE-2013-1042,0,0,330f930d129a0be0e47b48e80337ef718d859af21f61e28391038dfd7abccc2e,2024-11-21T01:48:48.057000 +CVE-2013-1043,0,0,93f830deecaacab8e03842b6d2c1084768e1a4f5131998df4e6f136f4b24e366,2024-11-21T01:48:48.183000 +CVE-2013-1044,0,0,ef1f12e7ad96386bf30e22421eb7701d691b0d548759618bf9b325347eb6dfb8,2024-11-21T01:48:48.313000 +CVE-2013-1045,0,0,bddef75df865cf227da86720267fab21a6629c38912f5d42290baefdf8c42fbd,2024-11-21T01:48:48.450000 +CVE-2013-1046,0,0,c0e6546dc0fdfb2cdb87f02a828a681ab193636781a3d9faafbd73d908c18ae1,2024-11-21T01:48:48.580000 +CVE-2013-1047,0,0,a594422a37f298f2c8e29d435cc7de75a0de93d00af9ca85667e8d283e7c26a4,2024-11-21T01:48:48.720000 +CVE-2013-1048,0,0,e4d149edca0b7a243b8be6820198d5580c9324be15f5c07155ae3279f3941d76,2024-11-21T01:48:48.857000 +CVE-2013-1049,0,0,ef03be83154befbc39d5cd5d65e7a96176a25fe5dce5302a93d7d94ed5be42aa,2024-11-21T01:48:48.970000 +CVE-2013-1050,0,0,7089e612df8f6e5c6e0b17d5e3dd0e20ab2d6a3c83c731bc7a3aa8f6d06e7bc1,2024-11-21T01:48:49.093000 +CVE-2013-1051,0,0,2f55cf177a8f3ef135c88e37de0fcf41e015cebd9752cb66c1269c92b54ca4f2,2024-11-21T01:48:49.233000 +CVE-2013-1052,0,0,fe70ccb464d27d4f61af893675ea237e4c5aff04fe848f85c79e11fa60d2b002,2024-11-21T01:48:49.360000 CVE-2013-1053,0,0,1cdf8deb30c3875a0d0a902923c73b45c2e8ca2463b7c1331dbdf32e1aa31545,2021-01-21T16:54:36.447000 CVE-2013-1054,0,0,ffeab7698c9afa7bc606f6c780fdd4d479ae387de55a7e574b6e4bfbc7f1cbc1,2021-04-19T16:17:23.920000 CVE-2013-1055,0,0,3237a49e08d2f91424767245b333ade177d41deddb24e5bc2f0a1a21cf78f7ea,2021-04-20T19:21:11.393000 -CVE-2013-1056,0,1,38cc2ac384b7c072f1eb149198b943c01736e3ff62185b785e090d1d91b941af,2024-11-21T01:48:49.923000 -CVE-2013-1057,0,1,23cc4c96e29157969a781dc3b8d09e1e13cf4289c17b9cd16904c40075e85496,2024-11-21T01:48:50.027000 -CVE-2013-1058,0,1,60a111449e7c60ee4f5bdb8c63b639cfdd9466608c9c400eda0e52c556f45eb0,2024-11-21T01:48:50.153000 -CVE-2013-1059,0,1,904fec0ce642ecfbf53198abaf35f209db24d5112614868457baa1f49757ce13,2024-11-21T01:48:50.287000 -CVE-2013-1060,0,1,e8d1c48da2b4e5c092e40e170e620488afa34c73d615d30bb4345b9eeb175407,2024-11-21T01:48:50.423000 -CVE-2013-1061,0,1,ba7818366a7990b36bac7733309e2dfa1b4d78757cd3207f8a044d55dc695b3a,2024-11-21T01:48:50.560000 -CVE-2013-1062,0,1,a7628c2b3e365d530b52f8ecf787987708c2c249a54058f18686757ead5fc679,2024-11-21T01:48:50.683000 -CVE-2013-1063,0,1,13908133506d675366fa41f9774f3a5dff9405506607b5fee56e8b2d557ae001,2024-11-21T01:48:50.807000 -CVE-2013-1064,0,1,7db5546453acd3520d2aac7da316115b3b780975a64bdd6c77a71a5e7ea2112f,2024-11-21T01:48:50.927000 -CVE-2013-1065,0,1,0b3e49911b833ffd7b56144559af54e3f5955ec8553d5dbc02e1c54dbdf39b6a,2024-11-21T01:48:51.050000 -CVE-2013-1066,0,1,0cc3e0cdcbc7bbf323e58d5812db0a27e3f8bcf0b3e3b9ff9301d47a7f732f58,2024-11-21T01:48:51.173000 -CVE-2013-1067,0,1,bc29e9625593947c88b411db78d711804314129828f9cec658fcd3e941928660,2024-11-21T01:48:51.297000 +CVE-2013-1056,0,0,38cc2ac384b7c072f1eb149198b943c01736e3ff62185b785e090d1d91b941af,2024-11-21T01:48:49.923000 +CVE-2013-1057,0,0,23cc4c96e29157969a781dc3b8d09e1e13cf4289c17b9cd16904c40075e85496,2024-11-21T01:48:50.027000 +CVE-2013-1058,0,0,60a111449e7c60ee4f5bdb8c63b639cfdd9466608c9c400eda0e52c556f45eb0,2024-11-21T01:48:50.153000 +CVE-2013-1059,0,0,904fec0ce642ecfbf53198abaf35f209db24d5112614868457baa1f49757ce13,2024-11-21T01:48:50.287000 +CVE-2013-1060,0,0,e8d1c48da2b4e5c092e40e170e620488afa34c73d615d30bb4345b9eeb175407,2024-11-21T01:48:50.423000 +CVE-2013-1061,0,0,ba7818366a7990b36bac7733309e2dfa1b4d78757cd3207f8a044d55dc695b3a,2024-11-21T01:48:50.560000 +CVE-2013-1062,0,0,a7628c2b3e365d530b52f8ecf787987708c2c249a54058f18686757ead5fc679,2024-11-21T01:48:50.683000 +CVE-2013-1063,0,0,13908133506d675366fa41f9774f3a5dff9405506607b5fee56e8b2d557ae001,2024-11-21T01:48:50.807000 +CVE-2013-1064,0,0,7db5546453acd3520d2aac7da316115b3b780975a64bdd6c77a71a5e7ea2112f,2024-11-21T01:48:50.927000 +CVE-2013-1065,0,0,0b3e49911b833ffd7b56144559af54e3f5955ec8553d5dbc02e1c54dbdf39b6a,2024-11-21T01:48:51.050000 +CVE-2013-1066,0,0,0cc3e0cdcbc7bbf323e58d5812db0a27e3f8bcf0b3e3b9ff9301d47a7f732f58,2024-11-21T01:48:51.173000 +CVE-2013-1067,0,0,bc29e9625593947c88b411db78d711804314129828f9cec658fcd3e941928660,2024-11-21T01:48:51.297000 CVE-2013-1068,0,0,0bedaaffcc7a09ab17af0bd8790b38aa1c449751009761469cc77ac4b2743aee,2014-06-20T17:57:50.643000 -CVE-2013-1069,0,1,3eace34c04d0852c7cff0b6601880dccfd1d26d8f5eadfa1a922c003b983a2f0,2024-11-21T01:48:51.520000 -CVE-2013-1070,0,1,8134ff0908bf5df5413513dc7368cda84229bc03ce9de7544b14ec8a35454d8a,2024-11-21T01:48:51.627000 +CVE-2013-1069,0,0,3eace34c04d0852c7cff0b6601880dccfd1d26d8f5eadfa1a922c003b983a2f0,2024-11-21T01:48:51.520000 +CVE-2013-1070,0,0,8134ff0908bf5df5413513dc7368cda84229bc03ce9de7544b14ec8a35454d8a,2024-11-21T01:48:51.627000 CVE-2013-1071,0,0,0b20106a6015120c22b02b5cf2ea3e759d66114bef4b3f3ec8492465839dd860,2023-11-07T02:14:38.600000 CVE-2013-1072,0,0,f28667a525e0f34a3209acc43359a93acef744ca2c5ea8ee9a286be09c59075e,2023-11-07T02:14:38.823000 CVE-2013-1073,0,0,0cf33b24738f1f18dcf7abe2887a703a63ea8ac73ddfe716e80d9380d4cb138c,2023-11-07T02:14:39.037000 @@ -58745,265 +58745,265 @@ CVE-2013-1074,0,0,8030d50ee78c0646868028765517953cdf1fe9dae627875862cbfc8a7bb907 CVE-2013-1075,0,0,57e5f5aa0b520f7bbb9bdcca9c2df93ef7178e3fa843fd1f39cbcbf1f4f31c9f,2023-11-07T02:14:39.543000 CVE-2013-1076,0,0,107debb9918edf8fe06f206645181cb09c9cd391ef57fee403ea828b6dca1ebe,2023-11-07T02:14:39.760000 CVE-2013-1077,0,0,e8e4d7252601ecea25edd2d23c73c1d9a31244b1b0d6e9c332e27f8a9cd2f254,2023-11-07T02:14:39.970000 -CVE-2013-1079,0,1,56564836e371635fdcc9802935f9aa0d5190d30b6f2d405191aee41485ef2686,2024-11-21T01:48:51.860000 -CVE-2013-1080,0,1,b8be90f67d578ce3fcd9d67aea1fdec421b9c54821a4d28826a670b83427d0f0,2024-11-21T01:48:52.017000 -CVE-2013-1081,0,1,0f8c1bfaa8ff29198cf60e5dd0537e8ebb2f1f9b9ae1b4cc47188b8215c6e05e,2024-11-21T01:48:52.170000 -CVE-2013-1082,0,1,2badcbc6b6bbc9da500032c96146360d4af8a6c791a5ca17919dc03864379aae,2024-11-21T01:48:52.317000 -CVE-2013-1083,0,1,9de21796deac49ab91b35c63dd537e03d61e32246a3e94a2d48d2e772fd9770c,2024-11-21T01:48:52.460000 -CVE-2013-1084,0,1,f1f2d6b2dd29f01be81963bcde5b55a285fb97a2a8212a22ac1e134315158eb9,2024-11-21T01:48:52.600000 -CVE-2013-1085,0,1,12a5b7c9a44ea0c285c21f79da7424a04e600ca8c74e1ccc546b0835af7fe5d5,2024-11-21T01:48:52.750000 -CVE-2013-1086,0,1,e880d0b6917d57a2aabcc55c7b3e99ee010691df02403614bd8b297a4155f70f,2024-11-21T01:48:52.890000 -CVE-2013-1087,0,1,b488477991dc53a9b6013773c3671dfab3e06e520ba37e8ea8167756a558f0b5,2024-11-21T01:48:53.060000 -CVE-2013-1088,0,1,23500ff455f63afb1ce3e5c60aab05bf6af1022892a74fe5ba6a6167a406970f,2024-11-21T01:48:53.223000 -CVE-2013-1090,0,1,f1a89e11b333776373b5114d22a32dcb987d2c7774c9e6b9d1d71e1f7fb85d9d,2024-11-21T01:48:53.383000 -CVE-2013-1091,0,1,e97a5a78f62f2c114df317e297744bbef17ba17bd68d79286a4718ac28b61a3c,2024-11-21T01:48:53.523000 -CVE-2013-1092,0,1,62a70ef3590aae5df5675278bfaef5b95700ada1795c0843c05509d3b5ffc0b1,2024-11-21T01:48:53.683000 -CVE-2013-1093,0,1,e2ab60bb5cc91b13a76cf633c17212d3f868909481b51b9a43b3e92b6781939f,2024-11-21T01:48:53.833000 -CVE-2013-1094,0,1,40a4826843e898fe06b59d28b216db2f018ab4e6eb6b6836732fb692b90a8c21,2024-11-21T01:48:53.983000 -CVE-2013-1095,0,1,6cb5a2cbecb1ac1580281ba2ebcba94add0a80097ebb030b20674687a9b08362,2024-11-21T01:48:54.120000 -CVE-2013-1096,0,1,a70a837a8c80ad7d1ba0f1df15a8355f551aa23c974ef278ace33f73c6120430,2024-11-21T01:48:54.270000 -CVE-2013-1097,0,1,9853d8cab708028c7b8462b9e7038d6a4e4ee17cc8e4143f0b13d13a565a1f7c,2024-11-21T01:48:54.423000 +CVE-2013-1079,0,0,56564836e371635fdcc9802935f9aa0d5190d30b6f2d405191aee41485ef2686,2024-11-21T01:48:51.860000 +CVE-2013-1080,0,0,b8be90f67d578ce3fcd9d67aea1fdec421b9c54821a4d28826a670b83427d0f0,2024-11-21T01:48:52.017000 +CVE-2013-1081,0,0,0f8c1bfaa8ff29198cf60e5dd0537e8ebb2f1f9b9ae1b4cc47188b8215c6e05e,2024-11-21T01:48:52.170000 +CVE-2013-1082,0,0,2badcbc6b6bbc9da500032c96146360d4af8a6c791a5ca17919dc03864379aae,2024-11-21T01:48:52.317000 +CVE-2013-1083,0,0,9de21796deac49ab91b35c63dd537e03d61e32246a3e94a2d48d2e772fd9770c,2024-11-21T01:48:52.460000 +CVE-2013-1084,0,0,f1f2d6b2dd29f01be81963bcde5b55a285fb97a2a8212a22ac1e134315158eb9,2024-11-21T01:48:52.600000 +CVE-2013-1085,0,0,12a5b7c9a44ea0c285c21f79da7424a04e600ca8c74e1ccc546b0835af7fe5d5,2024-11-21T01:48:52.750000 +CVE-2013-1086,0,0,e880d0b6917d57a2aabcc55c7b3e99ee010691df02403614bd8b297a4155f70f,2024-11-21T01:48:52.890000 +CVE-2013-1087,0,0,b488477991dc53a9b6013773c3671dfab3e06e520ba37e8ea8167756a558f0b5,2024-11-21T01:48:53.060000 +CVE-2013-1088,0,0,23500ff455f63afb1ce3e5c60aab05bf6af1022892a74fe5ba6a6167a406970f,2024-11-21T01:48:53.223000 +CVE-2013-1090,0,0,f1a89e11b333776373b5114d22a32dcb987d2c7774c9e6b9d1d71e1f7fb85d9d,2024-11-21T01:48:53.383000 +CVE-2013-1091,0,0,e97a5a78f62f2c114df317e297744bbef17ba17bd68d79286a4718ac28b61a3c,2024-11-21T01:48:53.523000 +CVE-2013-1092,0,0,62a70ef3590aae5df5675278bfaef5b95700ada1795c0843c05509d3b5ffc0b1,2024-11-21T01:48:53.683000 +CVE-2013-1093,0,0,e2ab60bb5cc91b13a76cf633c17212d3f868909481b51b9a43b3e92b6781939f,2024-11-21T01:48:53.833000 +CVE-2013-1094,0,0,40a4826843e898fe06b59d28b216db2f018ab4e6eb6b6836732fb692b90a8c21,2024-11-21T01:48:53.983000 +CVE-2013-1095,0,0,6cb5a2cbecb1ac1580281ba2ebcba94add0a80097ebb030b20674687a9b08362,2024-11-21T01:48:54.120000 +CVE-2013-1096,0,0,a70a837a8c80ad7d1ba0f1df15a8355f551aa23c974ef278ace33f73c6120430,2024-11-21T01:48:54.270000 +CVE-2013-1097,0,0,9853d8cab708028c7b8462b9e7038d6a4e4ee17cc8e4143f0b13d13a565a1f7c,2024-11-21T01:48:54.423000 CVE-2013-1099,0,0,e881ce095cedbab027c49a6bf61c56be2235b0af18df1097bfb75d6e64babd10,2023-11-07T02:14:40.323000 -CVE-2013-1100,0,1,d31a2101c4bd7bc06bbeea96d8604d911cc38b544a6bde1ebc4bd59509ee96e5,2024-11-21T01:48:54.600000 -CVE-2013-1102,0,1,259ad2144f847ee1a57c140bdb5bbca65db0638ca3c62030361eb09624cedc7d,2024-11-21T01:48:54.720000 -CVE-2013-1103,0,1,7233b7101dc8ff866ce158b47b433cfe9f74c8aa90d390e5eaff855c67f32c32,2024-11-21T01:48:54.843000 -CVE-2013-1104,0,1,5d9e6ea5acf8f4b894d826469bc671fd36ce5b6121a5b3d7359039ec6fd33e50,2024-11-21T01:48:54.963000 -CVE-2013-1105,0,1,7fd3ce134cebcaacb752d95cba25b14379fa8254b58e5f45b4a961a20f99b64e,2024-11-21T01:48:55.073000 -CVE-2013-1107,0,1,bb3b9909a2ebb7ed13b7064c048d71a62854e3c8f6c6b3257ece014f06635706,2024-11-21T01:48:55.200000 -CVE-2013-1108,0,1,9ae08ea469004ec4cbc8a3b032e1e252638a615b961ac081c71aae46b689ef32,2024-11-21T01:48:55.313000 -CVE-2013-1109,0,1,d6787c6bbee86ab094ec572830415e41dc67943706e792e4878816c4955ba13c,2024-11-21T01:48:55.423000 -CVE-2013-1110,0,1,23e2aea8a87ec9f86f6406d4415b088c1ea723fc144ce721a8c3023d833ce6aa,2024-11-21T01:48:55.533000 -CVE-2013-1111,0,1,19fdb4027b603811ed7d1f3e83ae13faac3a078e08b3a9e076831c5c4fc1e040,2024-11-21T01:48:55.647000 -CVE-2013-1112,0,1,c4b1721ac4dcb4caec067b914d7298c96f03b2b386ba710eaa93ac8db2ce1852,2024-11-21T01:48:55.760000 -CVE-2013-1113,0,1,a03dd73992b352d219b47f1c4c31c6a0fa477cd3c0d506167a5be221ada2eaa2,2024-11-21T01:48:55.897000 -CVE-2013-1114,0,1,dac95a26dee54ec82cfe0ba5b9ddfbe3a692c004f2c923ecf833125506a7c7e1,2024-11-21T01:48:56.010000 -CVE-2013-1115,0,1,caa3067cd882c8a7d84e8580984388d39eebebef3ef6bfffd3169d820723befb,2024-11-21T01:48:56.123000 -CVE-2013-1116,0,1,94c0a64da20cf2c868108dd7ac95db9567f715e601513bd68e7881cb22d35d57,2024-11-21T01:48:56.237000 -CVE-2013-1117,0,1,37b65bb74a495ce3f90db98ef59e5afe7a0b33727145bc0a1b55fdd0a9763dff,2024-11-21T01:48:56.350000 -CVE-2013-1118,0,1,9f0ebcdf6f51c849c12cb037fe5e74efc9e04ddddd21eef04845f339950b00a1,2024-11-21T01:48:56.460000 -CVE-2013-1119,0,1,1a10fada1912a3fb5fe8a8ffa277f3f824a6cd4388063b122ae77f31db6f3e98,2024-11-21T01:48:56.570000 -CVE-2013-1120,0,1,827a3e6c0de720b85a969b85288ca14f8437757d3b900a77441b4a536019b9f4,2024-11-21T01:48:56.690000 -CVE-2013-1121,0,1,b6eb61fd72e6230a9c4a0d38a43e635f6fa314d8950c3855ad3917b2ea389928,2024-11-21T01:48:56.810000 -CVE-2013-1122,0,1,2be5668c7a0b453beaa991a8c6d2bbea94c78935341779ec53a617efa753e55a,2024-11-21T01:48:56.933000 -CVE-2013-1123,0,1,9babd9ada127c6e555d2ba2d0e697486cf99d91968dc9c6d1887fd3d14633aff,2024-11-21T01:48:57.057000 -CVE-2013-1124,0,1,7b0e21dd08ac36c9807eb5186ffa6b0d72243625d45c54b82f8447542042ff29,2024-11-21T01:48:57.177000 -CVE-2013-1125,0,1,7566eafff6ad3c455880531748290d1dca4f4290570a751dd6faaa2fcc2d97e7,2024-11-21T01:48:57.287000 -CVE-2013-1128,0,1,f5e1aee6d638cc937796cb3003cfd87b99282aaa904d26e9bb46c2b58cf7c6f1,2024-11-21T01:48:57.400000 -CVE-2013-1129,0,1,c62c4dfaed84315d5de72040845f688c19dc7bcbbb87d5ba2a8f6e8e06fbfcaf,2024-11-21T01:48:57.510000 -CVE-2013-1130,0,1,274bf7882a3dcd250a702c34365ef09f515bfc92cdd30318b71fd3f98bba62d7,2024-11-21T01:48:57.613000 -CVE-2013-1131,0,1,11fd4d7269fb0dc17c7e1853786a638d94900625e1be087eedec4cf7605f6626,2024-11-21T01:48:57.730000 -CVE-2013-1132,0,1,a9f258bbc1ba180e28371f57eb1d0eedf18c638cc2992d4b2da8c8b786f7cdb8,2024-11-21T01:48:57.850000 -CVE-2013-1133,0,1,f53aed151067d573217c871516033d04efb4dd510ae071cb9769cff08389a219,2024-11-21T01:48:57.957000 -CVE-2013-1134,0,1,7fe76b8325a54264329eb9b9511ebe511a723ca69fe62ea2fbe7f98ac8ebe593,2024-11-21T01:48:58.063000 -CVE-2013-1135,0,1,5e55b581ad87c75effb63bffd3c6a08619751236722f70b50c4fd0133f4751a3,2024-11-21T01:48:58.167000 -CVE-2013-1136,0,1,c68fa691ae8126c80826029e0048aac30e51c64136111df6cc5d855e80a049d6,2024-11-21T01:48:58.273000 -CVE-2013-1137,0,1,bbc020c8711e561c09fba477a0f99d36bf31f9e227804bcb118f753b2321b1e3,2024-11-21T01:48:58.390000 -CVE-2013-1138,0,1,fd4ee23f9ebd771ee4ba76b839c4db8ddf397356be38a15cb8288104db07fdd4,2024-11-21T01:48:58.503000 -CVE-2013-1139,0,1,42716f9707e1f045635d83a9ce1e66926b57f715fa4075adacd9a94ce11d3783,2024-11-21T01:48:58.637000 -CVE-2013-1140,0,1,3b516ecdbc5f2f66e7cabbed604d9dfcd3622888d95eb47fbc7e925860b87fdc,2024-11-21T01:48:58.747000 -CVE-2013-1141,0,1,ebb4b04740ad7a2089d99ef7479a4e7eb8dd50d811225dfa48c29ff86a368769,2024-11-21T01:48:58.857000 -CVE-2013-1142,0,1,d17a6b6f1bf13fdcda122dd8dce4046a26f807ace67041743d8f1019dc56d28f,2024-11-21T01:48:58.987000 -CVE-2013-1143,0,1,780d6cd067842bf7a7f5647a6ab457e7c0d7b5a856dd48903024fe2a76e71109,2024-11-21T01:48:59.110000 -CVE-2013-1144,0,1,1b893b7422cb33072928f0a0b1b461c4808917e0fc406e02c47e8cd3acd0a86e,2024-11-21T01:48:59.230000 -CVE-2013-1145,0,1,9faed329a5b637a75551d3275d2254a1e207bcc9f4118b41bae57f5e30141e63,2024-11-21T01:48:59.340000 -CVE-2013-1146,0,1,805bff599e2c461a4667335a59b3229e28c217dc564b5796a6b609cc08441f4c,2024-11-21T01:48:59.463000 -CVE-2013-1147,0,1,488ce6a1eb85aaa10b6ae73e0a3f9e2532d723051132d499f4944de304438cd1,2024-11-21T01:48:59.573000 -CVE-2013-1148,0,1,eb69dd120c29880eb390aa4842f3dbd6138084515a2aa5460514a6c8c9f7bf0f,2024-11-21T01:48:59.683000 -CVE-2013-1149,0,1,fca3056663cfa611298e319f8df02a487cc7c9c54f3316a44407d24525e41918,2024-11-21T01:48:59.800000 -CVE-2013-1150,0,1,0a140cbda4642f1dd74a3c2a293a97dc4f20b236f62fa4e4bdf5449abd8d1973,2024-11-21T01:48:59.947000 -CVE-2013-1151,0,1,d130bd3ccc3702d20381d0ed0cca54e43fbdc25b479d23f2251f7dbff52bfdd2,2024-11-21T01:49:00.100000 -CVE-2013-1152,0,1,26c3330cba48741dae2845a766029437a494c67b7c348a3b1f2cf6da195d42ce,2024-11-21T01:49:00.240000 -CVE-2013-1153,0,1,f5d750150c9a58452874986a1dd3f3eb7cc1ef4bc301e245e1e7f4732bc3a217,2024-11-21T01:49:00.357000 -CVE-2013-1154,0,1,e749da1950fb262fbc6a7c105a7bc5c1268403ff64e296e27be07ed60027bc4c,2024-11-21T01:49:00.487000 -CVE-2013-1155,0,1,81d4b35decb95fe688af6221de54a96f06d7db4c44415ccb0735b072a0b0359d,2024-11-21T01:49:00.623000 -CVE-2013-1156,0,1,418db4e22a5bd452376d00c3833112da1c41617d89cf580de3cad2a1e89b8366,2024-11-21T01:49:00.733000 -CVE-2013-1157,0,1,3f328d23f6ae66de6a6e4234e806e7729022ca6c70d332c9034fd5a1431a23ae,2024-11-21T01:49:00.843000 -CVE-2013-1158,0,1,d99b45aee0279d24ba25592f2ad337b5d48cc6ea8269f76bc8379b494a9497ae,2024-11-21T01:49:00.960000 -CVE-2013-1159,0,1,cfde7dc88a285381619415cc6ece4f08d1448b1840d12994a9997d14e6141c47,2024-11-21T01:49:01.067000 -CVE-2013-1160,0,1,02748f15a4ccc27f68a80ff67ae12658d7a352742d7229ea84e5d8c28227452a,2024-11-21T01:49:01.190000 -CVE-2013-1161,0,1,8f77eef4557d3a5f990339cc6fc9d6bf3ad88f56a5976190a2d626bb38b6e318,2024-11-21T01:49:01.310000 -CVE-2013-1162,0,1,26f04977a4c00687df55e3b8252c160ebb5a4d3c711bf694ace3cf55b16fd4ec,2024-11-21T01:49:01.427000 -CVE-2013-1163,0,1,07985d224321bc0ef0156b71ed87cd12d69bd0f27993097a60751d24e08b7c08,2024-11-21T01:49:01.543000 -CVE-2013-1164,0,1,b127016b8cf8ad29f22272b24f36aae8292241669a3e92602a2425f9f92e2a41,2024-11-21T01:49:01.663000 -CVE-2013-1165,0,1,d19d185abe7c9b971e5f33909bdcb25ea21c589b60744d43a37b04e66e0c2d58,2024-11-21T01:49:01.807000 -CVE-2013-1166,0,1,fce6c00b883f528f3aa813aa287d2376ece820f3668257769f7961b027e1cdc7,2024-11-21T01:49:01.940000 -CVE-2013-1167,0,1,f2059f177fa40da789a66de585985e926a00d81ba6887b161e15f936936e363e,2024-11-21T01:49:02.060000 -CVE-2013-1168,0,1,914e91bb94013e54e69f2bdd08ede96b9cd64d2555991f8047d3bd136e751356,2024-11-21T01:49:02.180000 -CVE-2013-1169,0,1,3ba4570190753ab01b0e2c417dbe41a1805a205417b6de2a6adf299081df565c,2024-11-21T01:49:02.310000 -CVE-2013-1170,0,1,a62ec35caa06751eb44eb59c3dcdc0a2f92152aa14cb6f49ac6c130646f7ce07,2024-11-21T01:49:02.427000 -CVE-2013-1171,0,1,961f2b566dfb7cb12e68fc81cdc1c587f52f8222a97ff74fcf336d345bf3deb3,2024-11-21T01:49:02.540000 -CVE-2013-1172,0,1,f3ce9643627dc38c0d66ab3b87e14ceb9f041a53e4c43981d3f4c6c60912e4b8,2024-11-21T01:49:02.653000 -CVE-2013-1173,0,1,06e0c538d6b0f9beaa8692efb621addeed2e8e632542ce6d9cacbfecdf7c6a9f,2024-11-21T01:49:02.783000 -CVE-2013-1174,0,1,8b59f5c124a25a1dfe6122c4c4d1f817a80f29c8aa0718d37274a3fefeea688a,2024-11-21T01:49:02.930000 +CVE-2013-1100,0,0,d31a2101c4bd7bc06bbeea96d8604d911cc38b544a6bde1ebc4bd59509ee96e5,2024-11-21T01:48:54.600000 +CVE-2013-1102,0,0,259ad2144f847ee1a57c140bdb5bbca65db0638ca3c62030361eb09624cedc7d,2024-11-21T01:48:54.720000 +CVE-2013-1103,0,0,7233b7101dc8ff866ce158b47b433cfe9f74c8aa90d390e5eaff855c67f32c32,2024-11-21T01:48:54.843000 +CVE-2013-1104,0,0,5d9e6ea5acf8f4b894d826469bc671fd36ce5b6121a5b3d7359039ec6fd33e50,2024-11-21T01:48:54.963000 +CVE-2013-1105,0,0,7fd3ce134cebcaacb752d95cba25b14379fa8254b58e5f45b4a961a20f99b64e,2024-11-21T01:48:55.073000 +CVE-2013-1107,0,0,bb3b9909a2ebb7ed13b7064c048d71a62854e3c8f6c6b3257ece014f06635706,2024-11-21T01:48:55.200000 +CVE-2013-1108,0,0,9ae08ea469004ec4cbc8a3b032e1e252638a615b961ac081c71aae46b689ef32,2024-11-21T01:48:55.313000 +CVE-2013-1109,0,0,d6787c6bbee86ab094ec572830415e41dc67943706e792e4878816c4955ba13c,2024-11-21T01:48:55.423000 +CVE-2013-1110,0,0,23e2aea8a87ec9f86f6406d4415b088c1ea723fc144ce721a8c3023d833ce6aa,2024-11-21T01:48:55.533000 +CVE-2013-1111,0,0,19fdb4027b603811ed7d1f3e83ae13faac3a078e08b3a9e076831c5c4fc1e040,2024-11-21T01:48:55.647000 +CVE-2013-1112,0,0,c4b1721ac4dcb4caec067b914d7298c96f03b2b386ba710eaa93ac8db2ce1852,2024-11-21T01:48:55.760000 +CVE-2013-1113,0,0,a03dd73992b352d219b47f1c4c31c6a0fa477cd3c0d506167a5be221ada2eaa2,2024-11-21T01:48:55.897000 +CVE-2013-1114,0,0,dac95a26dee54ec82cfe0ba5b9ddfbe3a692c004f2c923ecf833125506a7c7e1,2024-11-21T01:48:56.010000 +CVE-2013-1115,0,0,caa3067cd882c8a7d84e8580984388d39eebebef3ef6bfffd3169d820723befb,2024-11-21T01:48:56.123000 +CVE-2013-1116,0,0,94c0a64da20cf2c868108dd7ac95db9567f715e601513bd68e7881cb22d35d57,2024-11-21T01:48:56.237000 +CVE-2013-1117,0,0,37b65bb74a495ce3f90db98ef59e5afe7a0b33727145bc0a1b55fdd0a9763dff,2024-11-21T01:48:56.350000 +CVE-2013-1118,0,0,9f0ebcdf6f51c849c12cb037fe5e74efc9e04ddddd21eef04845f339950b00a1,2024-11-21T01:48:56.460000 +CVE-2013-1119,0,0,1a10fada1912a3fb5fe8a8ffa277f3f824a6cd4388063b122ae77f31db6f3e98,2024-11-21T01:48:56.570000 +CVE-2013-1120,0,0,827a3e6c0de720b85a969b85288ca14f8437757d3b900a77441b4a536019b9f4,2024-11-21T01:48:56.690000 +CVE-2013-1121,0,0,b6eb61fd72e6230a9c4a0d38a43e635f6fa314d8950c3855ad3917b2ea389928,2024-11-21T01:48:56.810000 +CVE-2013-1122,0,0,2be5668c7a0b453beaa991a8c6d2bbea94c78935341779ec53a617efa753e55a,2024-11-21T01:48:56.933000 +CVE-2013-1123,0,0,9babd9ada127c6e555d2ba2d0e697486cf99d91968dc9c6d1887fd3d14633aff,2024-11-21T01:48:57.057000 +CVE-2013-1124,0,0,7b0e21dd08ac36c9807eb5186ffa6b0d72243625d45c54b82f8447542042ff29,2024-11-21T01:48:57.177000 +CVE-2013-1125,0,0,7566eafff6ad3c455880531748290d1dca4f4290570a751dd6faaa2fcc2d97e7,2024-11-21T01:48:57.287000 +CVE-2013-1128,0,0,f5e1aee6d638cc937796cb3003cfd87b99282aaa904d26e9bb46c2b58cf7c6f1,2024-11-21T01:48:57.400000 +CVE-2013-1129,0,0,c62c4dfaed84315d5de72040845f688c19dc7bcbbb87d5ba2a8f6e8e06fbfcaf,2024-11-21T01:48:57.510000 +CVE-2013-1130,0,0,274bf7882a3dcd250a702c34365ef09f515bfc92cdd30318b71fd3f98bba62d7,2024-11-21T01:48:57.613000 +CVE-2013-1131,0,0,11fd4d7269fb0dc17c7e1853786a638d94900625e1be087eedec4cf7605f6626,2024-11-21T01:48:57.730000 +CVE-2013-1132,0,0,a9f258bbc1ba180e28371f57eb1d0eedf18c638cc2992d4b2da8c8b786f7cdb8,2024-11-21T01:48:57.850000 +CVE-2013-1133,0,0,f53aed151067d573217c871516033d04efb4dd510ae071cb9769cff08389a219,2024-11-21T01:48:57.957000 +CVE-2013-1134,0,0,7fe76b8325a54264329eb9b9511ebe511a723ca69fe62ea2fbe7f98ac8ebe593,2024-11-21T01:48:58.063000 +CVE-2013-1135,0,0,5e55b581ad87c75effb63bffd3c6a08619751236722f70b50c4fd0133f4751a3,2024-11-21T01:48:58.167000 +CVE-2013-1136,0,0,c68fa691ae8126c80826029e0048aac30e51c64136111df6cc5d855e80a049d6,2024-11-21T01:48:58.273000 +CVE-2013-1137,0,0,bbc020c8711e561c09fba477a0f99d36bf31f9e227804bcb118f753b2321b1e3,2024-11-21T01:48:58.390000 +CVE-2013-1138,0,0,fd4ee23f9ebd771ee4ba76b839c4db8ddf397356be38a15cb8288104db07fdd4,2024-11-21T01:48:58.503000 +CVE-2013-1139,0,0,42716f9707e1f045635d83a9ce1e66926b57f715fa4075adacd9a94ce11d3783,2024-11-21T01:48:58.637000 +CVE-2013-1140,0,0,3b516ecdbc5f2f66e7cabbed604d9dfcd3622888d95eb47fbc7e925860b87fdc,2024-11-21T01:48:58.747000 +CVE-2013-1141,0,0,ebb4b04740ad7a2089d99ef7479a4e7eb8dd50d811225dfa48c29ff86a368769,2024-11-21T01:48:58.857000 +CVE-2013-1142,0,0,d17a6b6f1bf13fdcda122dd8dce4046a26f807ace67041743d8f1019dc56d28f,2024-11-21T01:48:58.987000 +CVE-2013-1143,0,0,780d6cd067842bf7a7f5647a6ab457e7c0d7b5a856dd48903024fe2a76e71109,2024-11-21T01:48:59.110000 +CVE-2013-1144,0,0,1b893b7422cb33072928f0a0b1b461c4808917e0fc406e02c47e8cd3acd0a86e,2024-11-21T01:48:59.230000 +CVE-2013-1145,0,0,9faed329a5b637a75551d3275d2254a1e207bcc9f4118b41bae57f5e30141e63,2024-11-21T01:48:59.340000 +CVE-2013-1146,0,0,805bff599e2c461a4667335a59b3229e28c217dc564b5796a6b609cc08441f4c,2024-11-21T01:48:59.463000 +CVE-2013-1147,0,0,488ce6a1eb85aaa10b6ae73e0a3f9e2532d723051132d499f4944de304438cd1,2024-11-21T01:48:59.573000 +CVE-2013-1148,0,0,eb69dd120c29880eb390aa4842f3dbd6138084515a2aa5460514a6c8c9f7bf0f,2024-11-21T01:48:59.683000 +CVE-2013-1149,0,0,fca3056663cfa611298e319f8df02a487cc7c9c54f3316a44407d24525e41918,2024-11-21T01:48:59.800000 +CVE-2013-1150,0,0,0a140cbda4642f1dd74a3c2a293a97dc4f20b236f62fa4e4bdf5449abd8d1973,2024-11-21T01:48:59.947000 +CVE-2013-1151,0,0,d130bd3ccc3702d20381d0ed0cca54e43fbdc25b479d23f2251f7dbff52bfdd2,2024-11-21T01:49:00.100000 +CVE-2013-1152,0,0,26c3330cba48741dae2845a766029437a494c67b7c348a3b1f2cf6da195d42ce,2024-11-21T01:49:00.240000 +CVE-2013-1153,0,0,f5d750150c9a58452874986a1dd3f3eb7cc1ef4bc301e245e1e7f4732bc3a217,2024-11-21T01:49:00.357000 +CVE-2013-1154,0,0,e749da1950fb262fbc6a7c105a7bc5c1268403ff64e296e27be07ed60027bc4c,2024-11-21T01:49:00.487000 +CVE-2013-1155,0,0,81d4b35decb95fe688af6221de54a96f06d7db4c44415ccb0735b072a0b0359d,2024-11-21T01:49:00.623000 +CVE-2013-1156,0,0,418db4e22a5bd452376d00c3833112da1c41617d89cf580de3cad2a1e89b8366,2024-11-21T01:49:00.733000 +CVE-2013-1157,0,0,3f328d23f6ae66de6a6e4234e806e7729022ca6c70d332c9034fd5a1431a23ae,2024-11-21T01:49:00.843000 +CVE-2013-1158,0,0,d99b45aee0279d24ba25592f2ad337b5d48cc6ea8269f76bc8379b494a9497ae,2024-11-21T01:49:00.960000 +CVE-2013-1159,0,0,cfde7dc88a285381619415cc6ece4f08d1448b1840d12994a9997d14e6141c47,2024-11-21T01:49:01.067000 +CVE-2013-1160,0,0,02748f15a4ccc27f68a80ff67ae12658d7a352742d7229ea84e5d8c28227452a,2024-11-21T01:49:01.190000 +CVE-2013-1161,0,0,8f77eef4557d3a5f990339cc6fc9d6bf3ad88f56a5976190a2d626bb38b6e318,2024-11-21T01:49:01.310000 +CVE-2013-1162,0,0,26f04977a4c00687df55e3b8252c160ebb5a4d3c711bf694ace3cf55b16fd4ec,2024-11-21T01:49:01.427000 +CVE-2013-1163,0,0,07985d224321bc0ef0156b71ed87cd12d69bd0f27993097a60751d24e08b7c08,2024-11-21T01:49:01.543000 +CVE-2013-1164,0,0,b127016b8cf8ad29f22272b24f36aae8292241669a3e92602a2425f9f92e2a41,2024-11-21T01:49:01.663000 +CVE-2013-1165,0,0,d19d185abe7c9b971e5f33909bdcb25ea21c589b60744d43a37b04e66e0c2d58,2024-11-21T01:49:01.807000 +CVE-2013-1166,0,0,fce6c00b883f528f3aa813aa287d2376ece820f3668257769f7961b027e1cdc7,2024-11-21T01:49:01.940000 +CVE-2013-1167,0,0,f2059f177fa40da789a66de585985e926a00d81ba6887b161e15f936936e363e,2024-11-21T01:49:02.060000 +CVE-2013-1168,0,0,914e91bb94013e54e69f2bdd08ede96b9cd64d2555991f8047d3bd136e751356,2024-11-21T01:49:02.180000 +CVE-2013-1169,0,0,3ba4570190753ab01b0e2c417dbe41a1805a205417b6de2a6adf299081df565c,2024-11-21T01:49:02.310000 +CVE-2013-1170,0,0,a62ec35caa06751eb44eb59c3dcdc0a2f92152aa14cb6f49ac6c130646f7ce07,2024-11-21T01:49:02.427000 +CVE-2013-1171,0,0,961f2b566dfb7cb12e68fc81cdc1c587f52f8222a97ff74fcf336d345bf3deb3,2024-11-21T01:49:02.540000 +CVE-2013-1172,0,0,f3ce9643627dc38c0d66ab3b87e14ceb9f041a53e4c43981d3f4c6c60912e4b8,2024-11-21T01:49:02.653000 +CVE-2013-1173,0,0,06e0c538d6b0f9beaa8692efb621addeed2e8e632542ce6d9cacbfecdf7c6a9f,2024-11-21T01:49:02.783000 +CVE-2013-1174,0,0,8b59f5c124a25a1dfe6122c4c4d1f817a80f29c8aa0718d37274a3fefeea688a,2024-11-21T01:49:02.930000 CVE-2013-1175,0,0,bfb639c1421779ce64363fd1ef5de7f12d8ce0b1440ede4be160b00a8f6b502d,2023-11-07T02:14:40.970000 -CVE-2013-1176,0,1,0cc2f0f398e01271bbf870e834436a568e2575eb7b1a1a88055e3e8187b52cd5,2024-11-21T01:49:03.067000 -CVE-2013-1177,0,1,f01e524ef13be4caa752d5e8a09e4687161347d562f97379cb39718f4474bd8f,2024-11-21T01:49:03.213000 -CVE-2013-1178,0,1,1ffaabee965fbe60a82eeabb139f1ee2d145846a59f51721dc8dcdd22d50c34e,2024-11-21T01:49:03.347000 -CVE-2013-1179,0,1,32130893170df5afc04415c2e9ab1cf1b19bf417127941598874742093bdacee,2024-11-21T01:49:03.523000 -CVE-2013-1180,0,1,d1fc82736bf39c2e0557d1b44ecf613101098db8e00639e32aff4b08ac2c4893,2024-11-21T01:49:03.670000 -CVE-2013-1181,0,1,7eb11d2a1425162c5fdf56bd96423c5bcafa90db8af39ea13b6502c912adf120,2024-11-21T01:49:03.803000 -CVE-2013-1182,0,1,f170913f622cba729834843af372a2c09dbc5e19216c2266c6063b57d73bfe72,2024-11-21T01:49:03.947000 -CVE-2013-1183,0,1,fe58c171a4e14af233d9cc5089f05ed76662c21ef16973b7e77a2d7b4e12cab6,2024-11-21T01:49:04.067000 -CVE-2013-1184,0,1,0ccdb0eb18c83c70c1afc6463a68c94f04ba3284dfa7ea4d1ef34ea570d5b610,2024-11-21T01:49:04.190000 -CVE-2013-1185,0,1,3f8b1b13f4b8ae55b39fd3278469f431219dc2ba5f47e5f9e3c4bdd7475ec6bf,2024-11-21T01:49:04.310000 -CVE-2013-1186,0,1,494f1047529766e7e430d179b997ac38f83a260b02308941af7c6d6b8ee1b0f5,2024-11-21T01:49:04.437000 -CVE-2013-1187,0,1,74ca7862d27be32f92e69d1836cb9d3b33a17a9c61a9a214b3734d15a8593496,2024-11-21T01:49:04.587000 -CVE-2013-1188,0,1,c059a20ebcac551298b1db47db748c37e4e9075f3be68b795a2865c7c5b4510e,2024-11-21T01:49:04.713000 -CVE-2013-1189,0,1,404b46952aa07f54d33e6724af3270de52ed79cd75061cdb6ca0a865c00594bd,2024-11-21T01:49:04.843000 -CVE-2013-1190,0,1,ee0433aee11a17196a0470b482173387a09835e6e62dd0330087a668e8b29e6d,2024-11-21T01:49:04.960000 -CVE-2013-1191,0,1,dc0c0ca2fcd97d2828051a8e5822669fdae105ef2dc9e76035dda09dd33397ed,2024-11-21T01:49:05.073000 -CVE-2013-1192,0,1,791caac61c398b9654560ec1046947ac4a8cfdb62937d4c56c3902ba8ec4934e,2024-11-21T01:49:05.190000 -CVE-2013-1193,0,1,1200e8b145396874c0f3174b6694fab2272f2df5ed1008fc0fedbbd6ff2b23f2,2024-11-21T01:49:05.330000 -CVE-2013-1194,0,1,b8e4b51feea7ce67b399aa30a83057ad87bf2de53dbdb1864ea032da9e856924,2024-11-21T01:49:05.457000 -CVE-2013-1195,0,1,bd2761e5755bf3d0ef7fecfeae1ff47130b62626d96def8ec7ef0497de1249ef,2024-11-21T01:49:05.583000 -CVE-2013-1196,0,1,f7cdd36025dcb5e869a9c530552b623f5c160909f3d007f57e5c7397761834ce,2024-11-21T01:49:05.700000 -CVE-2013-1197,0,1,253b3361b0cf969c64999491b41a4dbe5f67e2252cbc8b3dc805262db90de1a4,2024-11-21T01:49:05.820000 -CVE-2013-1198,0,1,31c6c7b9929ba259472ee922f5c1fb79ee60d316ae3fd54e0356f5d4020a701c,2024-11-21T01:49:05.933000 -CVE-2013-1199,0,1,f2ecc7ae9435b994fd1f2100fe0823e16191a44143a2a62330b3e1b5d68b44f3,2024-11-21T01:49:06.057000 -CVE-2013-1200,0,1,17ee094f5ec1790978767345d394e4daa0cc401020d495230e6317a6982df767,2024-11-21T01:49:06.177000 +CVE-2013-1176,0,0,0cc2f0f398e01271bbf870e834436a568e2575eb7b1a1a88055e3e8187b52cd5,2024-11-21T01:49:03.067000 +CVE-2013-1177,0,0,f01e524ef13be4caa752d5e8a09e4687161347d562f97379cb39718f4474bd8f,2024-11-21T01:49:03.213000 +CVE-2013-1178,0,0,1ffaabee965fbe60a82eeabb139f1ee2d145846a59f51721dc8dcdd22d50c34e,2024-11-21T01:49:03.347000 +CVE-2013-1179,0,0,32130893170df5afc04415c2e9ab1cf1b19bf417127941598874742093bdacee,2024-11-21T01:49:03.523000 +CVE-2013-1180,0,0,d1fc82736bf39c2e0557d1b44ecf613101098db8e00639e32aff4b08ac2c4893,2024-11-21T01:49:03.670000 +CVE-2013-1181,0,0,7eb11d2a1425162c5fdf56bd96423c5bcafa90db8af39ea13b6502c912adf120,2024-11-21T01:49:03.803000 +CVE-2013-1182,0,0,f170913f622cba729834843af372a2c09dbc5e19216c2266c6063b57d73bfe72,2024-11-21T01:49:03.947000 +CVE-2013-1183,0,0,fe58c171a4e14af233d9cc5089f05ed76662c21ef16973b7e77a2d7b4e12cab6,2024-11-21T01:49:04.067000 +CVE-2013-1184,0,0,0ccdb0eb18c83c70c1afc6463a68c94f04ba3284dfa7ea4d1ef34ea570d5b610,2024-11-21T01:49:04.190000 +CVE-2013-1185,0,0,3f8b1b13f4b8ae55b39fd3278469f431219dc2ba5f47e5f9e3c4bdd7475ec6bf,2024-11-21T01:49:04.310000 +CVE-2013-1186,0,0,494f1047529766e7e430d179b997ac38f83a260b02308941af7c6d6b8ee1b0f5,2024-11-21T01:49:04.437000 +CVE-2013-1187,0,0,74ca7862d27be32f92e69d1836cb9d3b33a17a9c61a9a214b3734d15a8593496,2024-11-21T01:49:04.587000 +CVE-2013-1188,0,0,c059a20ebcac551298b1db47db748c37e4e9075f3be68b795a2865c7c5b4510e,2024-11-21T01:49:04.713000 +CVE-2013-1189,0,0,404b46952aa07f54d33e6724af3270de52ed79cd75061cdb6ca0a865c00594bd,2024-11-21T01:49:04.843000 +CVE-2013-1190,0,0,ee0433aee11a17196a0470b482173387a09835e6e62dd0330087a668e8b29e6d,2024-11-21T01:49:04.960000 +CVE-2013-1191,0,0,dc0c0ca2fcd97d2828051a8e5822669fdae105ef2dc9e76035dda09dd33397ed,2024-11-21T01:49:05.073000 +CVE-2013-1192,0,0,791caac61c398b9654560ec1046947ac4a8cfdb62937d4c56c3902ba8ec4934e,2024-11-21T01:49:05.190000 +CVE-2013-1193,0,0,1200e8b145396874c0f3174b6694fab2272f2df5ed1008fc0fedbbd6ff2b23f2,2024-11-21T01:49:05.330000 +CVE-2013-1194,0,0,b8e4b51feea7ce67b399aa30a83057ad87bf2de53dbdb1864ea032da9e856924,2024-11-21T01:49:05.457000 +CVE-2013-1195,0,0,bd2761e5755bf3d0ef7fecfeae1ff47130b62626d96def8ec7ef0497de1249ef,2024-11-21T01:49:05.583000 +CVE-2013-1196,0,0,f7cdd36025dcb5e869a9c530552b623f5c160909f3d007f57e5c7397761834ce,2024-11-21T01:49:05.700000 +CVE-2013-1197,0,0,253b3361b0cf969c64999491b41a4dbe5f67e2252cbc8b3dc805262db90de1a4,2024-11-21T01:49:05.820000 +CVE-2013-1198,0,0,31c6c7b9929ba259472ee922f5c1fb79ee60d316ae3fd54e0356f5d4020a701c,2024-11-21T01:49:05.933000 +CVE-2013-1199,0,0,f2ecc7ae9435b994fd1f2100fe0823e16191a44143a2a62330b3e1b5d68b44f3,2024-11-21T01:49:06.057000 +CVE-2013-1200,0,0,17ee094f5ec1790978767345d394e4daa0cc401020d495230e6317a6982df767,2024-11-21T01:49:06.177000 CVE-2013-1202,0,0,e000a6a764dcf9c95d82f7faa031a3d2198d2687bba12a50f1fe64f5a983a63a,2020-02-11T19:11:28.553000 -CVE-2013-1203,0,1,6cb09b2d7398c7b5a39ba6240a86822a3ab4551042fa806e4508936e3f17f272,2024-11-21T01:49:06.437000 -CVE-2013-1204,0,1,d658bf12878851b594f0b5af48d36b67d6a53a9b6ed4f8f50c89f32796a50cb3,2024-11-21T01:49:06.553000 -CVE-2013-1205,0,1,f1d1b4d7183dff9e4c2ac0fe8e3430b7e40136aee3fa46e84691b2ce2a89195b,2024-11-21T01:49:06.680000 -CVE-2013-1208,0,1,9ab9e0fdbc6c1d38eaec3f3d374ddda4aa0dc8ca7992085c8a4e93bdcf83617c,2024-11-21T01:49:06.790000 -CVE-2013-1209,0,1,a7796ed9a238b21f282a6a5741489bb7ff1f099e68a16ad3b2236ad92e1e7b73,2024-11-21T01:49:06.900000 -CVE-2013-1210,0,1,aaeb3e0a642a831645b7f0ff6874050d83154c1d4ad53116971adf708ec38c99,2024-11-21T01:49:07.017000 -CVE-2013-1211,0,1,ff5338da05d650a0cfd588f587e1d2303b5f6504d644a14fe4bb48d154401556,2024-11-21T01:49:07.143000 -CVE-2013-1212,0,1,00887b6d4cef0526f3258e0a6d05fc883134f06107e1b0cca65c836abdfb5818,2024-11-21T01:49:07.283000 -CVE-2013-1213,0,1,75ac48c0d8d1d61d029eada71e822234da29d6548448632924d8adb6c1f7b397,2024-11-21T01:49:07.440000 -CVE-2013-1214,0,1,fd315d9a1a8bae450518c8cb51ffcd6a05cabe10083cb786d8bfab7cf4ba3ae2,2024-11-21T01:49:07.563000 -CVE-2013-1215,0,1,e564cd9eca6638f6bf10c43e4d49660c9179e1964cbab1396419bc54b5b9f623,2024-11-21T01:49:07.693000 -CVE-2013-1216,0,1,73b0e6ea56fe49aed44a0a9f9c28263c403e5a9ebbb5b866b6df3b48c28ebf8a,2024-11-21T01:49:07.830000 -CVE-2013-1217,0,1,fa266364c72ba4328d9bf02ac724328627dc8887f996616c0c76b8b3df74143c,2024-11-21T01:49:07.960000 -CVE-2013-1218,0,1,8694895cbcdcbaeb9dd560c24fab04bedba46444ddb4245c182fc2370c27bcba,2024-11-21T01:49:08.087000 -CVE-2013-1219,0,1,eed6cdd361ff209415f4605965a6a2ac9cddca8d8307f06dcdea2406708075c2,2024-11-21T01:49:08.213000 -CVE-2013-1220,0,1,acf2b053a4af9bd5671d122cb2220c431e0bcb2f6f9994b21c7671bf796e3237,2024-11-21T01:49:08.370000 -CVE-2013-1221,0,1,c022417284e84445a5414ef5b0cd3d98a5fad47d918dc3556f8e7fb44635d242,2024-11-21T01:49:08.483000 -CVE-2013-1222,0,1,fede8a332ab52be8f6fe831e69f6899db51313aa7e8f990a3f906a06b434fdbb,2024-11-21T01:49:08.597000 -CVE-2013-1223,0,1,88dccf899f723d84067613fdd1cb266ea13913a9cbcae1ad083717ae3d41d874,2024-11-21T01:49:08.727000 -CVE-2013-1224,0,1,e82370aca34b42c1a10c58324a6a7ce319200c1c84d2b740f1eeef3c84f01bb7,2024-11-21T01:49:08.850000 -CVE-2013-1225,0,1,fa0b149ea314f5b54c5ad41a63f3cfff4d5bdde924a2b3bf3c210465bfad632b,2024-11-21T01:49:08.987000 -CVE-2013-1226,0,1,5c85bb000562c040e9c553aebf874b56f20894a93b9f154c8f306f57488c4d24,2024-11-21T01:49:09.120000 -CVE-2013-1227,0,1,f0067b53729bf650300e9252e796eb511adcd91412978f4cdcf7ba1da14dad9e,2024-11-21T01:49:09.247000 -CVE-2013-1228,0,1,61bafff91f0c7365806349092d3756bd599d675ce5717557a60787d52f9891cb,2024-11-21T01:49:09.370000 -CVE-2013-1229,0,1,1bb818d660eee78fce0ef1bf689d62f86cecc6fe0968c8897b923b705b6450e5,2024-11-21T01:49:09.490000 -CVE-2013-1230,0,1,7651b51a684fd751e543e62b94bbd39c6f99112332f87d1b9dbca51a15f89ab6,2024-11-21T01:49:09.610000 -CVE-2013-1231,0,1,519096547c0714eb4fcf17166dbfcd6d5308504f3b589b331741fa63c110c310,2024-11-21T01:49:09.730000 -CVE-2013-1232,0,1,b56e897c65ac7e176f2b84ae7a7e6e5886850b925e8e5e8efa73009898558c63,2024-11-21T01:49:09.843000 +CVE-2013-1203,0,0,6cb09b2d7398c7b5a39ba6240a86822a3ab4551042fa806e4508936e3f17f272,2024-11-21T01:49:06.437000 +CVE-2013-1204,0,0,d658bf12878851b594f0b5af48d36b67d6a53a9b6ed4f8f50c89f32796a50cb3,2024-11-21T01:49:06.553000 +CVE-2013-1205,0,0,f1d1b4d7183dff9e4c2ac0fe8e3430b7e40136aee3fa46e84691b2ce2a89195b,2024-11-21T01:49:06.680000 +CVE-2013-1208,0,0,9ab9e0fdbc6c1d38eaec3f3d374ddda4aa0dc8ca7992085c8a4e93bdcf83617c,2024-11-21T01:49:06.790000 +CVE-2013-1209,0,0,a7796ed9a238b21f282a6a5741489bb7ff1f099e68a16ad3b2236ad92e1e7b73,2024-11-21T01:49:06.900000 +CVE-2013-1210,0,0,aaeb3e0a642a831645b7f0ff6874050d83154c1d4ad53116971adf708ec38c99,2024-11-21T01:49:07.017000 +CVE-2013-1211,0,0,ff5338da05d650a0cfd588f587e1d2303b5f6504d644a14fe4bb48d154401556,2024-11-21T01:49:07.143000 +CVE-2013-1212,0,0,00887b6d4cef0526f3258e0a6d05fc883134f06107e1b0cca65c836abdfb5818,2024-11-21T01:49:07.283000 +CVE-2013-1213,0,0,75ac48c0d8d1d61d029eada71e822234da29d6548448632924d8adb6c1f7b397,2024-11-21T01:49:07.440000 +CVE-2013-1214,0,0,fd315d9a1a8bae450518c8cb51ffcd6a05cabe10083cb786d8bfab7cf4ba3ae2,2024-11-21T01:49:07.563000 +CVE-2013-1215,0,0,e564cd9eca6638f6bf10c43e4d49660c9179e1964cbab1396419bc54b5b9f623,2024-11-21T01:49:07.693000 +CVE-2013-1216,0,0,73b0e6ea56fe49aed44a0a9f9c28263c403e5a9ebbb5b866b6df3b48c28ebf8a,2024-11-21T01:49:07.830000 +CVE-2013-1217,0,0,fa266364c72ba4328d9bf02ac724328627dc8887f996616c0c76b8b3df74143c,2024-11-21T01:49:07.960000 +CVE-2013-1218,0,0,8694895cbcdcbaeb9dd560c24fab04bedba46444ddb4245c182fc2370c27bcba,2024-11-21T01:49:08.087000 +CVE-2013-1219,0,0,eed6cdd361ff209415f4605965a6a2ac9cddca8d8307f06dcdea2406708075c2,2024-11-21T01:49:08.213000 +CVE-2013-1220,0,0,acf2b053a4af9bd5671d122cb2220c431e0bcb2f6f9994b21c7671bf796e3237,2024-11-21T01:49:08.370000 +CVE-2013-1221,0,0,c022417284e84445a5414ef5b0cd3d98a5fad47d918dc3556f8e7fb44635d242,2024-11-21T01:49:08.483000 +CVE-2013-1222,0,0,fede8a332ab52be8f6fe831e69f6899db51313aa7e8f990a3f906a06b434fdbb,2024-11-21T01:49:08.597000 +CVE-2013-1223,0,0,88dccf899f723d84067613fdd1cb266ea13913a9cbcae1ad083717ae3d41d874,2024-11-21T01:49:08.727000 +CVE-2013-1224,0,0,e82370aca34b42c1a10c58324a6a7ce319200c1c84d2b740f1eeef3c84f01bb7,2024-11-21T01:49:08.850000 +CVE-2013-1225,0,0,fa0b149ea314f5b54c5ad41a63f3cfff4d5bdde924a2b3bf3c210465bfad632b,2024-11-21T01:49:08.987000 +CVE-2013-1226,0,0,5c85bb000562c040e9c553aebf874b56f20894a93b9f154c8f306f57488c4d24,2024-11-21T01:49:09.120000 +CVE-2013-1227,0,0,f0067b53729bf650300e9252e796eb511adcd91412978f4cdcf7ba1da14dad9e,2024-11-21T01:49:09.247000 +CVE-2013-1228,0,0,61bafff91f0c7365806349092d3756bd599d675ce5717557a60787d52f9891cb,2024-11-21T01:49:09.370000 +CVE-2013-1229,0,0,1bb818d660eee78fce0ef1bf689d62f86cecc6fe0968c8897b923b705b6450e5,2024-11-21T01:49:09.490000 +CVE-2013-1230,0,0,7651b51a684fd751e543e62b94bbd39c6f99112332f87d1b9dbca51a15f89ab6,2024-11-21T01:49:09.610000 +CVE-2013-1231,0,0,519096547c0714eb4fcf17166dbfcd6d5308504f3b589b331741fa63c110c310,2024-11-21T01:49:09.730000 +CVE-2013-1232,0,0,b56e897c65ac7e176f2b84ae7a7e6e5886850b925e8e5e8efa73009898558c63,2024-11-21T01:49:09.843000 CVE-2013-1233,0,0,186dfc2d52399985890b8f051e26f0cb864b99ad63ddd8ce4be4a1ebbf0dd74f,2023-11-07T02:14:41.510000 -CVE-2013-1234,0,1,d746fdc482acf090e71cff14c71cec2a852910cf59e5c9c398fd6ae2245e37b1,2024-11-21T01:49:09.977000 -CVE-2013-1235,0,1,e8ee1a42f13598429717b4d668e9aa9251f1e7a6795b58ef6f48017b9a7ef278,2024-11-21T01:49:10.087000 -CVE-2013-1236,0,1,f50c5502fe88751725567ad1a1381e8f0b250b8541691ea7a6c17d53b07db5bd,2024-11-21T01:49:10.220000 -CVE-2013-1240,0,1,647ac69e70189dae245b009b73ecd9c0a330461aaae4ccacbd23fc04ded39b06,2024-11-21T01:49:10.357000 -CVE-2013-1241,0,1,cf9ec157f07e6d2f5f27286bca85e10718d866b2c1bd37a8333c46ed0a709da9,2024-11-21T01:49:10.487000 -CVE-2013-1242,0,1,f882c1298c16952d6564033977c72ffb17d5d0fbcf46bda0a3a8dc2a85d3fa77,2024-11-21T01:49:10.613000 -CVE-2013-1243,0,1,60f6963d08460eb5fffb03619f70f93f4cdea2858e7625eddf958a37281181ea,2024-11-21T01:49:10.733000 -CVE-2013-1244,0,1,54443d6e890de9d6f05977b763c2b5f955eb86c9faf0e264c26c403e444526be,2024-11-21T01:49:10.850000 -CVE-2013-1245,0,1,13a64f8df837c226e3415afad73ac63e96ca188b19e00f55f8b2f7d7c7900ddf,2024-11-21T01:49:10.970000 -CVE-2013-1246,0,1,392d3a6088fa0f1a4453fde649c2f9de5fe79eb214cb2821230bc29a5219c92c,2024-11-21T01:49:11.080000 -CVE-2013-1247,0,1,0fc42f47822c1628228c70856e8c8450b5a2b561df0087376a9c004a84f6a984,2024-11-21T01:49:11.193000 -CVE-2013-1248,0,1,c8826a664cda9642c60f375a229b77ebc1cd62222fd2605302a2bf1fd2b38819,2024-11-21T01:49:11.317000 -CVE-2013-1249,0,1,af6f53aac902216afebd728150ba9d63e49434b6890a59a235e12bc9b92ac089,2024-11-21T01:49:11.440000 -CVE-2013-1250,0,1,3e76230fa32a4fadb3819633bd705c875c872da78efeb4291d6722fe660e828e,2024-11-21T01:49:11.577000 -CVE-2013-1251,0,1,35c8aa9ea2c2f43e2f861626e0aa9ab2df75699671c5637e1d444f058ae310d6,2024-11-21T01:49:11.707000 -CVE-2013-1252,0,1,4377a58b64d40c8fd8ae15ac4a83a9a47703bd73f4bafe6d07876dd37c1d3093,2024-11-21T01:49:11.830000 -CVE-2013-1253,0,1,bc704206a586d72eb31684b2db55edfe84b0409f189253de5a37299a06737bcd,2024-11-21T01:49:11.957000 -CVE-2013-1254,0,1,e17a0e680abd4b0035a1784e242289469b59ec5569db65882a7f79a5894f6aad,2024-11-21T01:49:12.087000 -CVE-2013-1255,0,1,f3f2e61808a847cbcaffa09668a695a79f8de85d498d07641507412831496894,2024-11-21T01:49:12.220000 -CVE-2013-1256,0,1,2236670e75e6c687a6284979472d038cb6f100dc5d71cab4e2a604724914265f,2024-11-21T01:49:12.347000 -CVE-2013-1257,0,1,81a4932f8583aed50cdc0e2e0131c5d15e215927d2f19154bc56dff3804c8a77,2024-11-21T01:49:12.480000 -CVE-2013-1258,0,1,35cf71e2db312e7e21463cb9841f56736b2cdcd12a5292623ce8e6bc925f4714,2024-11-21T01:49:12.613000 -CVE-2013-1259,0,1,b6b387fd1c55eeffb33fe42d3107ce396da6e4c2b820cff0b5bccbb7ae421e99,2024-11-21T01:49:12.747000 -CVE-2013-1260,0,1,1789c98afc459d4d4bd83b16e987836b1d9693d61636eb41440298182847b381,2024-11-21T01:49:12.870000 -CVE-2013-1261,0,1,3ef0d06ff7a49530888e682eb08d13117df7f49d8b9d72bc2f93454cd8f0d92d,2024-11-21T01:49:12.997000 -CVE-2013-1262,0,1,4468009621175d16abf210e8c473464943fbe3dc8e4b45e73d350bc396023973,2024-11-21T01:49:13.117000 -CVE-2013-1263,0,1,e9e4260e65784aa541ba7f6e33a3119873b962f6f428be26dae33d4065efd4bd,2024-11-21T01:49:13.233000 -CVE-2013-1264,0,1,cf585fe2cad8d4cc1b5c6aa0c4d9609f4a54b53885d799cab4dd02eb7ae1fadd,2024-11-21T01:49:13.377000 -CVE-2013-1265,0,1,9ade09baef9e5b402b66eb68f255e80a55cc457d39f494faf0e4dccc5308003e,2024-11-21T01:49:13.500000 -CVE-2013-1266,0,1,38c30e1a6560832658e661319ac9d4b13f15a225125900649493533b9afc9ed2,2024-11-21T01:49:13.620000 -CVE-2013-1267,0,1,60df627434f577acca758f652d8df39765677638f62dc7d3e60e4cfc02880be1,2024-11-21T01:49:13.743000 -CVE-2013-1268,0,1,6eef4bea7fa78f4b9649b499b53887e6136eb27e56aed5534bbf45293167dbf0,2024-11-21T01:49:13.860000 -CVE-2013-1269,0,1,4717321c871173b3c811fa14dd4fd3c01d077c4a6f7c36d04d1551fce097323a,2024-11-21T01:49:13.987000 -CVE-2013-1270,0,1,fe5cb048f6b7878806c93f1c0f065a7bfb008bff7ed3ba7a06ff59e1972465c0,2024-11-21T01:49:14.110000 -CVE-2013-1271,0,1,f4036c08bdeb5ec01d13c0233ab4ad378930daf134efb0c2104c87af3ac6966a,2024-11-21T01:49:14.223000 -CVE-2013-1272,0,1,f72bfe0ac7f77277b6cfcd2ebe71f4249d60b35a2e6ffd564b8d74776635a376,2024-11-21T01:49:14.340000 -CVE-2013-1273,0,1,f70f014424c20bac3f4d57972dce173f9d303885184213d9e0b0b7adc76e2086,2024-11-21T01:49:14.457000 -CVE-2013-1274,0,1,9e60985d81d12aae41c3ff0f24c648a5fa70a351af88b4c1435e2043d27f7378,2024-11-21T01:49:14.570000 -CVE-2013-1275,0,1,3f552c31948021839410d1f367905ae541e3af3c2f2f51b17873d64a67f2b02c,2024-11-21T01:49:14.690000 -CVE-2013-1276,0,1,35bd9d8deab072c04ce212b2c319d20b199acd7af2bc4424eca0d011f9ec515e,2024-11-21T01:49:14.820000 -CVE-2013-1277,0,1,6befece065c6e1fd3706456491c7c7a664a83a04f185e9951df4f6bd59e4b8ed,2024-11-21T01:49:14.937000 -CVE-2013-1278,0,1,efff85179f3bcd9a1b1f12629cb8f710c773fec81217924c0419ecbb1c2dd90b,2024-11-21T01:49:15.067000 -CVE-2013-1279,0,1,5aab5502da63cbef78dacc9c0119df63ebcb2aa0d50ff6f7e889150907ddcded,2024-11-21T01:49:15.240000 -CVE-2013-1280,0,1,53c9d7740439ebd88fab6af60cea531341cdecf9638cf04d17febe3aca93f07f,2024-11-21T01:49:15.350000 -CVE-2013-1281,0,1,e14f1d1b0c9eeace0f18f9d60e17b048e7e40511eb6f496154cc64fb288bd938,2024-11-21T01:49:15.460000 -CVE-2013-1282,0,1,652be8b4a40460f0b3b56b5d65d56bdc66e16829e4645a54da51ec821b3c091e,2024-11-21T01:49:15.567000 -CVE-2013-1283,0,1,03eaab9ec41a3f3f89dee492160393f648d2d2a3d9728c70c375111eaafcae8f,2024-11-21T01:49:15.673000 -CVE-2013-1284,0,1,2811b9bfe37932a854e53ff349f83a3b4390ea20e486a165b63b062b792fa45b,2024-11-21T01:49:15.790000 -CVE-2013-1285,0,1,948adaeeee39f112d29f0df5c71074632c8dc180590248d66789373fd834ead4,2024-11-21T01:49:15.907000 -CVE-2013-1286,0,1,d8e35c0328536f339d0c1a95522f12e5734806a15f6e395af6f2cac072f18cf5,2024-11-21T01:49:16.030000 -CVE-2013-1287,0,1,39662d081939ac2f62ea1a6ac3c5c4db074a156e8c52a8091cf63cc1cd966779,2024-11-21T01:49:16.153000 -CVE-2013-1288,0,1,73f9c6dccba51a8530a213a7e23d455f0c562ae1c36c4d5edbc83796e23a6a85,2024-11-21T01:49:16.270000 -CVE-2013-1289,0,1,0cf549feeba06656c6d7e577521b4e52685365bcdd5a8d16cfc6f35c84c49770,2024-11-21T01:49:16.393000 -CVE-2013-1290,0,1,a1c34693c6dc24dec2f0d9bcd8815f821e58bb5a5ee7b72b4e0534a3bf7dfd76,2024-11-21T01:49:16.513000 -CVE-2013-1291,0,1,b60031944f9ee846512a262082903b8ac027269811d0d08a2006b436df9962da,2024-11-21T01:49:16.640000 -CVE-2013-1292,0,1,b42a0d9bc37a4bc04031e5bf9a648d6e59e95cfe9ff575f95ff5570bc1e1e56b,2024-11-21T01:49:16.767000 -CVE-2013-1293,0,1,8d3bfac0774a2d3e19eb4f3ca9dbe3cab44621e1bc0f11d7a1c41391aefe0e37,2024-11-21T01:49:16.957000 -CVE-2013-1294,0,1,d1558cc37bbd1b91daf35c3383de74c164bc27944f78904c506a40ed23461e64,2024-11-21T01:49:17.073000 -CVE-2013-1295,0,1,1e28ff50e34cb2a722f0c5c1cc854ac4da25acb0ea6ca514339386ca4cdddbce,2024-11-21T01:49:17.193000 -CVE-2013-1296,0,1,e0d502cf244e5965df7d73b0e7c9aab1be130595abfa8a333a7e795b0d38e211,2024-11-21T01:49:17.320000 -CVE-2013-1297,0,1,de7351c49f73464fff7e3f5bf22a38a03b621b6649910e16a71fc237991688ce,2024-11-21T01:49:17.440000 +CVE-2013-1234,0,0,d746fdc482acf090e71cff14c71cec2a852910cf59e5c9c398fd6ae2245e37b1,2024-11-21T01:49:09.977000 +CVE-2013-1235,0,0,e8ee1a42f13598429717b4d668e9aa9251f1e7a6795b58ef6f48017b9a7ef278,2024-11-21T01:49:10.087000 +CVE-2013-1236,0,0,f50c5502fe88751725567ad1a1381e8f0b250b8541691ea7a6c17d53b07db5bd,2024-11-21T01:49:10.220000 +CVE-2013-1240,0,0,647ac69e70189dae245b009b73ecd9c0a330461aaae4ccacbd23fc04ded39b06,2024-11-21T01:49:10.357000 +CVE-2013-1241,0,0,cf9ec157f07e6d2f5f27286bca85e10718d866b2c1bd37a8333c46ed0a709da9,2024-11-21T01:49:10.487000 +CVE-2013-1242,0,0,f882c1298c16952d6564033977c72ffb17d5d0fbcf46bda0a3a8dc2a85d3fa77,2024-11-21T01:49:10.613000 +CVE-2013-1243,0,0,60f6963d08460eb5fffb03619f70f93f4cdea2858e7625eddf958a37281181ea,2024-11-21T01:49:10.733000 +CVE-2013-1244,0,0,54443d6e890de9d6f05977b763c2b5f955eb86c9faf0e264c26c403e444526be,2024-11-21T01:49:10.850000 +CVE-2013-1245,0,0,13a64f8df837c226e3415afad73ac63e96ca188b19e00f55f8b2f7d7c7900ddf,2024-11-21T01:49:10.970000 +CVE-2013-1246,0,0,392d3a6088fa0f1a4453fde649c2f9de5fe79eb214cb2821230bc29a5219c92c,2024-11-21T01:49:11.080000 +CVE-2013-1247,0,0,0fc42f47822c1628228c70856e8c8450b5a2b561df0087376a9c004a84f6a984,2024-11-21T01:49:11.193000 +CVE-2013-1248,0,0,c8826a664cda9642c60f375a229b77ebc1cd62222fd2605302a2bf1fd2b38819,2024-11-21T01:49:11.317000 +CVE-2013-1249,0,0,af6f53aac902216afebd728150ba9d63e49434b6890a59a235e12bc9b92ac089,2024-11-21T01:49:11.440000 +CVE-2013-1250,0,0,3e76230fa32a4fadb3819633bd705c875c872da78efeb4291d6722fe660e828e,2024-11-21T01:49:11.577000 +CVE-2013-1251,0,0,35c8aa9ea2c2f43e2f861626e0aa9ab2df75699671c5637e1d444f058ae310d6,2024-11-21T01:49:11.707000 +CVE-2013-1252,0,0,4377a58b64d40c8fd8ae15ac4a83a9a47703bd73f4bafe6d07876dd37c1d3093,2024-11-21T01:49:11.830000 +CVE-2013-1253,0,0,bc704206a586d72eb31684b2db55edfe84b0409f189253de5a37299a06737bcd,2024-11-21T01:49:11.957000 +CVE-2013-1254,0,0,e17a0e680abd4b0035a1784e242289469b59ec5569db65882a7f79a5894f6aad,2024-11-21T01:49:12.087000 +CVE-2013-1255,0,0,f3f2e61808a847cbcaffa09668a695a79f8de85d498d07641507412831496894,2024-11-21T01:49:12.220000 +CVE-2013-1256,0,0,2236670e75e6c687a6284979472d038cb6f100dc5d71cab4e2a604724914265f,2024-11-21T01:49:12.347000 +CVE-2013-1257,0,0,81a4932f8583aed50cdc0e2e0131c5d15e215927d2f19154bc56dff3804c8a77,2024-11-21T01:49:12.480000 +CVE-2013-1258,0,0,35cf71e2db312e7e21463cb9841f56736b2cdcd12a5292623ce8e6bc925f4714,2024-11-21T01:49:12.613000 +CVE-2013-1259,0,0,b6b387fd1c55eeffb33fe42d3107ce396da6e4c2b820cff0b5bccbb7ae421e99,2024-11-21T01:49:12.747000 +CVE-2013-1260,0,0,1789c98afc459d4d4bd83b16e987836b1d9693d61636eb41440298182847b381,2024-11-21T01:49:12.870000 +CVE-2013-1261,0,0,3ef0d06ff7a49530888e682eb08d13117df7f49d8b9d72bc2f93454cd8f0d92d,2024-11-21T01:49:12.997000 +CVE-2013-1262,0,0,4468009621175d16abf210e8c473464943fbe3dc8e4b45e73d350bc396023973,2024-11-21T01:49:13.117000 +CVE-2013-1263,0,0,e9e4260e65784aa541ba7f6e33a3119873b962f6f428be26dae33d4065efd4bd,2024-11-21T01:49:13.233000 +CVE-2013-1264,0,0,cf585fe2cad8d4cc1b5c6aa0c4d9609f4a54b53885d799cab4dd02eb7ae1fadd,2024-11-21T01:49:13.377000 +CVE-2013-1265,0,0,9ade09baef9e5b402b66eb68f255e80a55cc457d39f494faf0e4dccc5308003e,2024-11-21T01:49:13.500000 +CVE-2013-1266,0,0,38c30e1a6560832658e661319ac9d4b13f15a225125900649493533b9afc9ed2,2024-11-21T01:49:13.620000 +CVE-2013-1267,0,0,60df627434f577acca758f652d8df39765677638f62dc7d3e60e4cfc02880be1,2024-11-21T01:49:13.743000 +CVE-2013-1268,0,0,6eef4bea7fa78f4b9649b499b53887e6136eb27e56aed5534bbf45293167dbf0,2024-11-21T01:49:13.860000 +CVE-2013-1269,0,0,4717321c871173b3c811fa14dd4fd3c01d077c4a6f7c36d04d1551fce097323a,2024-11-21T01:49:13.987000 +CVE-2013-1270,0,0,fe5cb048f6b7878806c93f1c0f065a7bfb008bff7ed3ba7a06ff59e1972465c0,2024-11-21T01:49:14.110000 +CVE-2013-1271,0,0,f4036c08bdeb5ec01d13c0233ab4ad378930daf134efb0c2104c87af3ac6966a,2024-11-21T01:49:14.223000 +CVE-2013-1272,0,0,f72bfe0ac7f77277b6cfcd2ebe71f4249d60b35a2e6ffd564b8d74776635a376,2024-11-21T01:49:14.340000 +CVE-2013-1273,0,0,f70f014424c20bac3f4d57972dce173f9d303885184213d9e0b0b7adc76e2086,2024-11-21T01:49:14.457000 +CVE-2013-1274,0,0,9e60985d81d12aae41c3ff0f24c648a5fa70a351af88b4c1435e2043d27f7378,2024-11-21T01:49:14.570000 +CVE-2013-1275,0,0,3f552c31948021839410d1f367905ae541e3af3c2f2f51b17873d64a67f2b02c,2024-11-21T01:49:14.690000 +CVE-2013-1276,0,0,35bd9d8deab072c04ce212b2c319d20b199acd7af2bc4424eca0d011f9ec515e,2024-11-21T01:49:14.820000 +CVE-2013-1277,0,0,6befece065c6e1fd3706456491c7c7a664a83a04f185e9951df4f6bd59e4b8ed,2024-11-21T01:49:14.937000 +CVE-2013-1278,0,0,efff85179f3bcd9a1b1f12629cb8f710c773fec81217924c0419ecbb1c2dd90b,2024-11-21T01:49:15.067000 +CVE-2013-1279,0,0,5aab5502da63cbef78dacc9c0119df63ebcb2aa0d50ff6f7e889150907ddcded,2024-11-21T01:49:15.240000 +CVE-2013-1280,0,0,53c9d7740439ebd88fab6af60cea531341cdecf9638cf04d17febe3aca93f07f,2024-11-21T01:49:15.350000 +CVE-2013-1281,0,0,e14f1d1b0c9eeace0f18f9d60e17b048e7e40511eb6f496154cc64fb288bd938,2024-11-21T01:49:15.460000 +CVE-2013-1282,0,0,652be8b4a40460f0b3b56b5d65d56bdc66e16829e4645a54da51ec821b3c091e,2024-11-21T01:49:15.567000 +CVE-2013-1283,0,0,03eaab9ec41a3f3f89dee492160393f648d2d2a3d9728c70c375111eaafcae8f,2024-11-21T01:49:15.673000 +CVE-2013-1284,0,0,2811b9bfe37932a854e53ff349f83a3b4390ea20e486a165b63b062b792fa45b,2024-11-21T01:49:15.790000 +CVE-2013-1285,0,0,948adaeeee39f112d29f0df5c71074632c8dc180590248d66789373fd834ead4,2024-11-21T01:49:15.907000 +CVE-2013-1286,0,0,d8e35c0328536f339d0c1a95522f12e5734806a15f6e395af6f2cac072f18cf5,2024-11-21T01:49:16.030000 +CVE-2013-1287,0,0,39662d081939ac2f62ea1a6ac3c5c4db074a156e8c52a8091cf63cc1cd966779,2024-11-21T01:49:16.153000 +CVE-2013-1288,0,0,73f9c6dccba51a8530a213a7e23d455f0c562ae1c36c4d5edbc83796e23a6a85,2024-11-21T01:49:16.270000 +CVE-2013-1289,0,0,0cf549feeba06656c6d7e577521b4e52685365bcdd5a8d16cfc6f35c84c49770,2024-11-21T01:49:16.393000 +CVE-2013-1290,0,0,a1c34693c6dc24dec2f0d9bcd8815f821e58bb5a5ee7b72b4e0534a3bf7dfd76,2024-11-21T01:49:16.513000 +CVE-2013-1291,0,0,b60031944f9ee846512a262082903b8ac027269811d0d08a2006b436df9962da,2024-11-21T01:49:16.640000 +CVE-2013-1292,0,0,b42a0d9bc37a4bc04031e5bf9a648d6e59e95cfe9ff575f95ff5570bc1e1e56b,2024-11-21T01:49:16.767000 +CVE-2013-1293,0,0,8d3bfac0774a2d3e19eb4f3ca9dbe3cab44621e1bc0f11d7a1c41391aefe0e37,2024-11-21T01:49:16.957000 +CVE-2013-1294,0,0,d1558cc37bbd1b91daf35c3383de74c164bc27944f78904c506a40ed23461e64,2024-11-21T01:49:17.073000 +CVE-2013-1295,0,0,1e28ff50e34cb2a722f0c5c1cc854ac4da25acb0ea6ca514339386ca4cdddbce,2024-11-21T01:49:17.193000 +CVE-2013-1296,0,0,e0d502cf244e5965df7d73b0e7c9aab1be130595abfa8a333a7e795b0d38e211,2024-11-21T01:49:17.320000 +CVE-2013-1297,0,0,de7351c49f73464fff7e3f5bf22a38a03b621b6649910e16a71fc237991688ce,2024-11-21T01:49:17.440000 CVE-2013-1298,0,0,b79eb9a3570fa19c4a62087cccc383d3d6aa940c50f1cc89f4ca542b3d49f79a,2023-11-07T02:14:42.110000 -CVE-2013-1299,0,1,14b02483c21ba56058f206dc23ffc5a70c7aee9d32a4951757d806a9a72c4e2b,2024-11-21T01:49:17.573000 -CVE-2013-1300,0,1,4b136e2d36170c0369c075f9536875df8a5bff81a880a6643c271e8d6a6c1f91,2024-11-21T01:49:17.697000 -CVE-2013-1301,0,1,e4822cf7fafec948acf334b517684072fb11cbf7664e17feea2656231aa8cc13,2024-11-21T01:49:17.817000 -CVE-2013-1302,0,1,e5a97959fd92410b39969b0886bf1406c8bdf0057519615b49ee3df06d912bec,2024-11-21T01:49:19.310000 -CVE-2013-1303,0,1,11cae01f98aa5b83afc0525ebb4f24ea7098a3952a5ac3ba6dc868f0271f6cf8,2024-11-21T01:49:19.470000 -CVE-2013-1304,0,1,759bcaaf1b0d490da117e7d314f4a8ed58ca0f800a1c5350ccb735ad3d405128,2024-11-21T01:49:19.587000 -CVE-2013-1305,0,1,169971f491da6c70e1e5c3473c3d2849d370585f428e3e7d3cb65925a9d5a228,2024-11-21T01:49:19.700000 -CVE-2013-1306,0,1,637d8a13ec2859e2dbac21efa893e4c9e512fd6e6059cfa634af57dc6b7cd52e,2024-11-21T01:49:19.837000 -CVE-2013-1307,0,1,1a66e4da640d651dad31de2e6215037e38ead8d2153f479612aa0a04a6622a15,2024-11-21T01:49:19.967000 -CVE-2013-1308,0,1,a618a1a11d321c1ee6ad66d6f77cf0d8c9764629dd212fb4a1beecf37bae3ad9,2024-11-21T01:49:20.087000 -CVE-2013-1309,0,1,4b89c10929abc76f299d570b482429691bc73b253ff4efbab3ba47c643528e0b,2024-11-21T01:49:20.207000 -CVE-2013-1310,0,1,b935e74247ec27b437dad3124091446a0bfd49041920cf04867a6a620e65f06c,2024-11-21T01:49:20.330000 -CVE-2013-1311,0,1,c7bf5598d5d6b19c20f2670f93da3d40e9d7b1d30740e75a96b8360a9d492f6c,2024-11-21T01:49:20.443000 -CVE-2013-1312,0,1,c0b748b1cd14e2bc949988bccc1e22393ae5e16722358a6c9742eeb3f18ab50b,2024-11-21T01:49:20.550000 -CVE-2013-1313,0,1,02d2606511f6e7fffd7ed2389a92f84a27d16f643499a345af4e5e59f8ef2e0c,2024-11-21T01:49:20.653000 +CVE-2013-1299,0,0,14b02483c21ba56058f206dc23ffc5a70c7aee9d32a4951757d806a9a72c4e2b,2024-11-21T01:49:17.573000 +CVE-2013-1300,0,0,4b136e2d36170c0369c075f9536875df8a5bff81a880a6643c271e8d6a6c1f91,2024-11-21T01:49:17.697000 +CVE-2013-1301,0,0,e4822cf7fafec948acf334b517684072fb11cbf7664e17feea2656231aa8cc13,2024-11-21T01:49:17.817000 +CVE-2013-1302,0,0,e5a97959fd92410b39969b0886bf1406c8bdf0057519615b49ee3df06d912bec,2024-11-21T01:49:19.310000 +CVE-2013-1303,0,0,11cae01f98aa5b83afc0525ebb4f24ea7098a3952a5ac3ba6dc868f0271f6cf8,2024-11-21T01:49:19.470000 +CVE-2013-1304,0,0,759bcaaf1b0d490da117e7d314f4a8ed58ca0f800a1c5350ccb735ad3d405128,2024-11-21T01:49:19.587000 +CVE-2013-1305,0,0,169971f491da6c70e1e5c3473c3d2849d370585f428e3e7d3cb65925a9d5a228,2024-11-21T01:49:19.700000 +CVE-2013-1306,0,0,637d8a13ec2859e2dbac21efa893e4c9e512fd6e6059cfa634af57dc6b7cd52e,2024-11-21T01:49:19.837000 +CVE-2013-1307,0,0,1a66e4da640d651dad31de2e6215037e38ead8d2153f479612aa0a04a6622a15,2024-11-21T01:49:19.967000 +CVE-2013-1308,0,0,a618a1a11d321c1ee6ad66d6f77cf0d8c9764629dd212fb4a1beecf37bae3ad9,2024-11-21T01:49:20.087000 +CVE-2013-1309,0,0,4b89c10929abc76f299d570b482429691bc73b253ff4efbab3ba47c643528e0b,2024-11-21T01:49:20.207000 +CVE-2013-1310,0,0,b935e74247ec27b437dad3124091446a0bfd49041920cf04867a6a620e65f06c,2024-11-21T01:49:20.330000 +CVE-2013-1311,0,0,c7bf5598d5d6b19c20f2670f93da3d40e9d7b1d30740e75a96b8360a9d492f6c,2024-11-21T01:49:20.443000 +CVE-2013-1312,0,0,c0b748b1cd14e2bc949988bccc1e22393ae5e16722358a6c9742eeb3f18ab50b,2024-11-21T01:49:20.550000 +CVE-2013-1313,0,0,02d2606511f6e7fffd7ed2389a92f84a27d16f643499a345af4e5e59f8ef2e0c,2024-11-21T01:49:20.653000 CVE-2013-1314,0,0,718bb479e4c616348a668fa5cdf17cc13870a3ec0c44edcbdd7c97e709605dd8,2023-11-07T02:14:42.430000 -CVE-2013-1315,0,1,201315a9d1b9e9b2f76cc936c6dabe4bc4b0b8fb9064ad16dddcd9bc19fbbf79,2024-11-21T01:49:20.787000 -CVE-2013-1316,0,1,0ae3bb8a4b97c0058d07f0a1f527130314a8e7142175d45e6976129c5d10b56a,2024-11-21T01:49:20.917000 -CVE-2013-1317,0,1,31ad692a4f85fe32ac6d86b49702898af7c9d731fbad292ae46ba269ebf0fa45,2024-11-21T01:49:21.040000 -CVE-2013-1318,0,1,c55bc6d3bde56f08d8e31f736ba8c66e32b4ceebacda36d5c3e011aeb80999d2,2024-11-21T01:49:21.153000 -CVE-2013-1319,0,1,bb889768de61a3072aa720f2256bc9bcb0d5f45907a53d048c94eb82009fbaba,2024-11-21T01:49:21.267000 -CVE-2013-1320,0,1,86cbfdd3293a3d22094debb8201337e933b8f160e2a75d9bc32c8d0254efb927,2024-11-21T01:49:21.373000 -CVE-2013-1321,0,1,a6e9becc26790059822f13a6ec9eb5d6ca1bf4649237a577a72fdba209b32de9,2024-11-21T01:49:21.483000 -CVE-2013-1322,0,1,6cc04ae0185e9ec2ccce50b0e0d616a2cc2aaa80e7b2da05ef91492669c9600d,2024-11-21T01:49:21.607000 -CVE-2013-1323,0,1,9179069518d71e2fdaab79a8d8932c15f1d8967bb680c7c2f26c250bfd1e4245,2024-11-21T01:49:21.720000 -CVE-2013-1324,0,1,145a6d574534db2811dfa75e9725b0d8700f905c1fd843fc833c81c41f1b351b,2024-11-21T01:49:21.837000 -CVE-2013-1325,0,1,19baa3003660fd07d3f94a6f93a21f62c0274e141518ca9f27d27226c4e96f9c,2024-11-21T01:49:21.950000 +CVE-2013-1315,0,0,201315a9d1b9e9b2f76cc936c6dabe4bc4b0b8fb9064ad16dddcd9bc19fbbf79,2024-11-21T01:49:20.787000 +CVE-2013-1316,0,0,0ae3bb8a4b97c0058d07f0a1f527130314a8e7142175d45e6976129c5d10b56a,2024-11-21T01:49:20.917000 +CVE-2013-1317,0,0,31ad692a4f85fe32ac6d86b49702898af7c9d731fbad292ae46ba269ebf0fa45,2024-11-21T01:49:21.040000 +CVE-2013-1318,0,0,c55bc6d3bde56f08d8e31f736ba8c66e32b4ceebacda36d5c3e011aeb80999d2,2024-11-21T01:49:21.153000 +CVE-2013-1319,0,0,bb889768de61a3072aa720f2256bc9bcb0d5f45907a53d048c94eb82009fbaba,2024-11-21T01:49:21.267000 +CVE-2013-1320,0,0,86cbfdd3293a3d22094debb8201337e933b8f160e2a75d9bc32c8d0254efb927,2024-11-21T01:49:21.373000 +CVE-2013-1321,0,0,a6e9becc26790059822f13a6ec9eb5d6ca1bf4649237a577a72fdba209b32de9,2024-11-21T01:49:21.483000 +CVE-2013-1322,0,0,6cc04ae0185e9ec2ccce50b0e0d616a2cc2aaa80e7b2da05ef91492669c9600d,2024-11-21T01:49:21.607000 +CVE-2013-1323,0,0,9179069518d71e2fdaab79a8d8932c15f1d8967bb680c7c2f26c250bfd1e4245,2024-11-21T01:49:21.720000 +CVE-2013-1324,0,0,145a6d574534db2811dfa75e9725b0d8700f905c1fd843fc833c81c41f1b351b,2024-11-21T01:49:21.837000 +CVE-2013-1325,0,0,19baa3003660fd07d3f94a6f93a21f62c0274e141518ca9f27d27226c4e96f9c,2024-11-21T01:49:21.950000 CVE-2013-1326,0,0,5e7cc930d83cd2ae63e21f274c05e672f244d54edbdd4e60934d940d0314c117,2023-11-07T02:14:42.723000 -CVE-2013-1327,0,1,7efcf4e7259123439f658e83d2a2580b14a4060952a1faefea8906e874054225,2024-11-21T01:49:22.083000 -CVE-2013-1328,0,1,7787a5d4e5e3aeb36f14c742240f21bf2dc6d483e6046cf7fa9b2fc1b313b3e9,2024-11-21T01:49:22.190000 -CVE-2013-1329,0,1,e52c579e6b2ab65d09d4ed873c32e04c3e7483e1d36dbdb749548d9351c260d6,2024-11-21T01:49:22.300000 -CVE-2013-1330,0,1,43aaa2f8343fecd1261eb07d03b8c44c6b1ca5db005bdc9789d30e5f86593274,2024-11-21T01:49:22.413000 -CVE-2013-1331,0,1,82986f78049d99dbb9ae02e4075c865b0376af850e66eaa6df7c6871c09d1165,2024-11-21T01:49:22.537000 -CVE-2013-1332,0,1,7f5985e59bb0463e6680fdf3be86cd276a7c84df75af87258694e7ee15c3e0cc,2024-11-21T01:49:22.647000 -CVE-2013-1333,0,1,2d1a2d25122a433d738a36f7af68214f98ca4c29637975d01dafb78d6b14ccf0,2024-11-21T01:49:22.773000 -CVE-2013-1334,0,1,8609e14cff3e95f6e0d11e74c1b86ce8a6446c3620869aa6ac1ed0d6e65acc09,2024-11-21T01:49:22.887000 -CVE-2013-1335,0,1,f781d98cb0fcba2d9bd0e78f3eb98388cb6176622658ae61a509b2fb78500ee4,2024-11-21T01:49:23 -CVE-2013-1336,0,1,d5ac0cd12b9aa169b84e4af774617ae55a4411cc4a8c51b8905d2752825447a9,2024-11-21T01:49:23.117000 -CVE-2013-1337,0,1,c9a9f16fc886a048c58647a41e6752f86f7fa8fcfaecb2585c81f8eafd2eb3da,2024-11-21T01:49:23.227000 -CVE-2013-1338,0,1,5250e71ec29baf5c6b9f88a741577c88c40fa47076742be4f0eb5aca61d8cf5a,2024-11-21T01:49:23.340000 -CVE-2013-1339,0,1,7062c72fed033d1b60623c69ac5abd24bbc6c9f14cb1b4e341b920192ac18325,2024-11-21T01:49:23.450000 -CVE-2013-1340,0,1,563ff161d744ab570701912481a170c16cf7df0fb9012025d3c38c0da39af323,2024-11-21T01:49:23.580000 -CVE-2013-1341,0,1,51cec475d86f6601242e25eb194e57b7b3ad35542b94e2e0454a754f5d7512ae,2024-11-21T01:49:23.810000 -CVE-2013-1342,0,1,e97355849ec062b0429c443b546ea697dcdc9946d94f7c27dea22603b8792b86,2024-11-21T01:49:23.920000 -CVE-2013-1343,0,1,cac36a1b2c5b3d2bcf9e831d3c79f62e334e6ed5eb2917dfdfc257ad1aaf9b4d,2024-11-21T01:49:24.043000 -CVE-2013-1344,0,1,131c9f6fb698bb840ce2dc074264875d22192cacc435a50ff45dbf23ff70bb88,2024-11-21T01:49:24.150000 -CVE-2013-1345,0,1,6a7b648b78b0d67609f9d20353685ef5aec94e97d134bb7a9d868900eda7302d,2024-11-21T01:49:24.260000 -CVE-2013-1346,0,1,3f5bb6cd557bad8adde5d1d6f43e5b5cd62135ef25797edc850fdc2aff15db13,2024-11-21T01:49:24.373000 -CVE-2013-1347,0,1,5a77c652fa2ba708bf71ccc2fa8613f6455095f9f40b9eab0870c650a9f6db59,2024-11-21T01:49:24.483000 +CVE-2013-1327,0,0,7efcf4e7259123439f658e83d2a2580b14a4060952a1faefea8906e874054225,2024-11-21T01:49:22.083000 +CVE-2013-1328,0,0,7787a5d4e5e3aeb36f14c742240f21bf2dc6d483e6046cf7fa9b2fc1b313b3e9,2024-11-21T01:49:22.190000 +CVE-2013-1329,0,0,e52c579e6b2ab65d09d4ed873c32e04c3e7483e1d36dbdb749548d9351c260d6,2024-11-21T01:49:22.300000 +CVE-2013-1330,0,0,43aaa2f8343fecd1261eb07d03b8c44c6b1ca5db005bdc9789d30e5f86593274,2024-11-21T01:49:22.413000 +CVE-2013-1331,0,0,82986f78049d99dbb9ae02e4075c865b0376af850e66eaa6df7c6871c09d1165,2024-11-21T01:49:22.537000 +CVE-2013-1332,0,0,7f5985e59bb0463e6680fdf3be86cd276a7c84df75af87258694e7ee15c3e0cc,2024-11-21T01:49:22.647000 +CVE-2013-1333,0,0,2d1a2d25122a433d738a36f7af68214f98ca4c29637975d01dafb78d6b14ccf0,2024-11-21T01:49:22.773000 +CVE-2013-1334,0,0,8609e14cff3e95f6e0d11e74c1b86ce8a6446c3620869aa6ac1ed0d6e65acc09,2024-11-21T01:49:22.887000 +CVE-2013-1335,0,0,f781d98cb0fcba2d9bd0e78f3eb98388cb6176622658ae61a509b2fb78500ee4,2024-11-21T01:49:23 +CVE-2013-1336,0,0,d5ac0cd12b9aa169b84e4af774617ae55a4411cc4a8c51b8905d2752825447a9,2024-11-21T01:49:23.117000 +CVE-2013-1337,0,0,c9a9f16fc886a048c58647a41e6752f86f7fa8fcfaecb2585c81f8eafd2eb3da,2024-11-21T01:49:23.227000 +CVE-2013-1338,0,0,5250e71ec29baf5c6b9f88a741577c88c40fa47076742be4f0eb5aca61d8cf5a,2024-11-21T01:49:23.340000 +CVE-2013-1339,0,0,7062c72fed033d1b60623c69ac5abd24bbc6c9f14cb1b4e341b920192ac18325,2024-11-21T01:49:23.450000 +CVE-2013-1340,0,0,563ff161d744ab570701912481a170c16cf7df0fb9012025d3c38c0da39af323,2024-11-21T01:49:23.580000 +CVE-2013-1341,0,0,51cec475d86f6601242e25eb194e57b7b3ad35542b94e2e0454a754f5d7512ae,2024-11-21T01:49:23.810000 +CVE-2013-1342,0,0,e97355849ec062b0429c443b546ea697dcdc9946d94f7c27dea22603b8792b86,2024-11-21T01:49:23.920000 +CVE-2013-1343,0,0,cac36a1b2c5b3d2bcf9e831d3c79f62e334e6ed5eb2917dfdfc257ad1aaf9b4d,2024-11-21T01:49:24.043000 +CVE-2013-1344,0,0,131c9f6fb698bb840ce2dc074264875d22192cacc435a50ff45dbf23ff70bb88,2024-11-21T01:49:24.150000 +CVE-2013-1345,0,0,6a7b648b78b0d67609f9d20353685ef5aec94e97d134bb7a9d868900eda7302d,2024-11-21T01:49:24.260000 +CVE-2013-1346,0,0,3f5bb6cd557bad8adde5d1d6f43e5b5cd62135ef25797edc850fdc2aff15db13,2024-11-21T01:49:24.373000 +CVE-2013-1347,0,0,5a77c652fa2ba708bf71ccc2fa8613f6455095f9f40b9eab0870c650a9f6db59,2024-11-21T01:49:24.483000 CVE-2013-1348,0,0,3eaca0db516a3eb9d7c9935939022a5c00894ae98db0414f2cc62a450c6dc13c,2017-08-29T01:33:09.073000 -CVE-2013-1349,0,1,4902a47fba4962078bb68fbe36962af486e06abc97fea95aabffdb1c0de769cd,2024-11-21T01:49:24.743000 +CVE-2013-1349,0,0,4902a47fba4962078bb68fbe36962af486e06abc97fea95aabffdb1c0de769cd,2024-11-21T01:49:24.743000 CVE-2013-1350,0,0,05387e8fa67f8d38922711ed293b81340f493ca0248aa923c45466d66e8ae9b6,2020-02-03T16:47:06.027000 CVE-2013-1351,0,0,266e910fb86cd42ad58af9a6ad12135afb25dc1497b66f4b5c8b83fc323ce003,2020-02-10T14:48:07.200000 CVE-2013-1352,0,0,780ce22447a599d562374f270c93378fdbae5b843201d14285ed888ce11f53f7,2020-02-10T14:48:39.517000 @@ -59011,215 +59011,215 @@ CVE-2013-1353,0,0,e03103b334823727712dbfb28768c15c438782e13e3aac56536ba0a6b4fc5b CVE-2013-1355,0,0,52ba322a562c05893e07bc1c7d2380022ca879493ffc1af9cbf55c99efbc27a7,2023-11-07T02:14:43.127000 CVE-2013-1359,0,0,123f29fbf0ff52eaa5b386bf12f80ddc2d2256d055a1503ec98a8bb41c3873ea,2020-02-14T18:13:49.477000 CVE-2013-1360,0,0,6ec6946327403f0a816ebe3a7f7a7c567d68b352b648376d9d03ae45bef84e8b,2020-02-13T14:12:06.497000 -CVE-2013-1361,0,1,7f1ef3afa3007df4531cffaf8b0c83b8cff42ad0d980fbc8fabc0c9a64923ba2,2024-11-21T01:49:25.823000 -CVE-2013-1362,0,1,851bdb55e045d2e338b96d391ca3a184b3a76b13a678bf7365ac80aae00a071b,2024-11-21T01:49:25.970000 -CVE-2013-1364,0,1,7ad4cd86ef5632de52583d8c8593c13aba2a7a992597b06f9695c61e8fe0329b,2024-11-21T01:49:26.130000 -CVE-2013-1365,0,1,344f8768843607afa3b74dcd64e6bf68199847351ec7a88ee1b6b812dd16ab87,2024-11-21T01:49:26.287000 -CVE-2013-1366,0,1,cca8ef78e51cf6ee0d83668b8b2d6fe3b085a387707cc7d9b33367597c6d8601,2024-11-21T01:49:26.420000 -CVE-2013-1367,0,1,75b1c1a9de29bcf4af550241952dbf6a7f5f1d7a92b92c9affc3114a558b863a,2024-11-21T01:49:26.550000 -CVE-2013-1368,0,1,7be1f7ab492f0c84929cceb1b1a8c6592487bff9a1bdd3e06d98ecf4ae451790,2024-11-21T01:49:26.677000 -CVE-2013-1369,0,1,3de924523b987e0fd36ddcefd65779ea262cd68270f0d9de6549759a1a36de90,2024-11-21T01:49:26.813000 -CVE-2013-1370,0,1,b4e0b57bfe75a4634898a21f7b664a175e2f9bb7fa93ab17caa1680e5d5d21fe,2024-11-21T01:49:26.953000 -CVE-2013-1371,0,1,08c0389600c06f27ebeef904f959f26139cccb13c51e3718dd0cf0dcb1388c49,2024-11-21T01:49:27.083000 -CVE-2013-1372,0,1,089f2f87281ed0ff5a2429c467559e9a32594704aa97f0a30932cb246ab83779,2024-11-21T01:49:27.233000 -CVE-2013-1373,0,1,b8261e38edec25ed9f07755ab632cc6e1b9691f7906b49ad8510ec0aefbd9a28,2024-11-21T01:49:27.373000 -CVE-2013-1374,0,1,5167a0b919047850e6769f6802c27e2be4e59315a526d3fb045620830d5d6b43,2024-11-21T01:49:27.503000 -CVE-2013-1375,0,1,8d798548f191e90f6bd5b63f4c30780a5de07a3d38c1025bf28de804b6a9be80,2024-11-21T01:49:27.650000 -CVE-2013-1376,0,1,ef9ea2d088c027287755514acc8135f7e11993086dd728bea41f0bb0f94de359,2024-11-21T01:49:27.797000 -CVE-2013-1377,0,1,39cb49ff3a022b31c7f26ff434135e80291def0568a427bc1b8d07cac76775ad,2024-11-21T01:49:27.927000 -CVE-2013-1378,0,1,a23c21a386323b5d89b1bc258e53c4b0c39fbee83de2160dc29a45921e456762,2024-11-21T01:49:28.040000 -CVE-2013-1379,0,1,3bcd282fad39de0987c100b1f40f16d86a7e05113831e70ed5a2d0d78a9c61ab,2024-11-21T01:49:28.187000 -CVE-2013-1380,0,1,cf56a1646bde1db1cf5da226c084db1573e396c387ddf9d45f636a605f5898c0,2024-11-21T01:49:28.350000 +CVE-2013-1361,0,0,7f1ef3afa3007df4531cffaf8b0c83b8cff42ad0d980fbc8fabc0c9a64923ba2,2024-11-21T01:49:25.823000 +CVE-2013-1362,0,0,851bdb55e045d2e338b96d391ca3a184b3a76b13a678bf7365ac80aae00a071b,2024-11-21T01:49:25.970000 +CVE-2013-1364,0,0,7ad4cd86ef5632de52583d8c8593c13aba2a7a992597b06f9695c61e8fe0329b,2024-11-21T01:49:26.130000 +CVE-2013-1365,0,0,344f8768843607afa3b74dcd64e6bf68199847351ec7a88ee1b6b812dd16ab87,2024-11-21T01:49:26.287000 +CVE-2013-1366,0,0,cca8ef78e51cf6ee0d83668b8b2d6fe3b085a387707cc7d9b33367597c6d8601,2024-11-21T01:49:26.420000 +CVE-2013-1367,0,0,75b1c1a9de29bcf4af550241952dbf6a7f5f1d7a92b92c9affc3114a558b863a,2024-11-21T01:49:26.550000 +CVE-2013-1368,0,0,7be1f7ab492f0c84929cceb1b1a8c6592487bff9a1bdd3e06d98ecf4ae451790,2024-11-21T01:49:26.677000 +CVE-2013-1369,0,0,3de924523b987e0fd36ddcefd65779ea262cd68270f0d9de6549759a1a36de90,2024-11-21T01:49:26.813000 +CVE-2013-1370,0,0,b4e0b57bfe75a4634898a21f7b664a175e2f9bb7fa93ab17caa1680e5d5d21fe,2024-11-21T01:49:26.953000 +CVE-2013-1371,0,0,08c0389600c06f27ebeef904f959f26139cccb13c51e3718dd0cf0dcb1388c49,2024-11-21T01:49:27.083000 +CVE-2013-1372,0,0,089f2f87281ed0ff5a2429c467559e9a32594704aa97f0a30932cb246ab83779,2024-11-21T01:49:27.233000 +CVE-2013-1373,0,0,b8261e38edec25ed9f07755ab632cc6e1b9691f7906b49ad8510ec0aefbd9a28,2024-11-21T01:49:27.373000 +CVE-2013-1374,0,0,5167a0b919047850e6769f6802c27e2be4e59315a526d3fb045620830d5d6b43,2024-11-21T01:49:27.503000 +CVE-2013-1375,0,0,8d798548f191e90f6bd5b63f4c30780a5de07a3d38c1025bf28de804b6a9be80,2024-11-21T01:49:27.650000 +CVE-2013-1376,0,0,ef9ea2d088c027287755514acc8135f7e11993086dd728bea41f0bb0f94de359,2024-11-21T01:49:27.797000 +CVE-2013-1377,0,0,39cb49ff3a022b31c7f26ff434135e80291def0568a427bc1b8d07cac76775ad,2024-11-21T01:49:27.927000 +CVE-2013-1378,0,0,a23c21a386323b5d89b1bc258e53c4b0c39fbee83de2160dc29a45921e456762,2024-11-21T01:49:28.040000 +CVE-2013-1379,0,0,3bcd282fad39de0987c100b1f40f16d86a7e05113831e70ed5a2d0d78a9c61ab,2024-11-21T01:49:28.187000 +CVE-2013-1380,0,0,cf56a1646bde1db1cf5da226c084db1573e396c387ddf9d45f636a605f5898c0,2024-11-21T01:49:28.350000 CVE-2013-1381,0,0,c49381ac68819dab5cf0278f83816b8403a777ed60ea7e2fb8dc32a288d6cfdb,2023-11-07T02:14:43.330000 CVE-2013-1382,0,0,f6e4f726d0e2a3b7ba612892d773f334ed2c4d4332a149c66ded4465c9aff435,2023-11-07T02:14:43.550000 -CVE-2013-1383,0,1,061cd71ab3bb54e9ccd45d52c0dfc0200b211c974ad768c7b1fda84a67f8359d,2024-11-21T01:49:28.547000 -CVE-2013-1384,0,1,a5def6abeafeb7e685774dc401be3ed226e2e8a3c6818387a249362b8805a09f,2024-11-21T01:49:28.660000 -CVE-2013-1385,0,1,546983bae221c90109a456b2e3c158ebf8b694918eab9c7876a0a7f488e3328e,2024-11-21T01:49:28.777000 -CVE-2013-1386,0,1,3cc38e205981e94a37810cf2a773c46674e3fbaf396fc14e7deb2730d528a3ec,2024-11-21T01:49:28.900000 -CVE-2013-1387,0,1,9526c87b04c733f820b1de6b11d85eab97d836ee26fe929c2f0f1672b57362b3,2024-11-21T01:49:29.030000 -CVE-2013-1388,0,1,837cec0a40a86b6368a0323a61a987d70e7ce10e1dff8173b10884ea329241df,2024-11-21T01:49:29.160000 -CVE-2013-1389,0,1,17f94cbdb5c1fd15893a7a4019f298736ed2db90b3042d047186cb0450cb363c,2024-11-21T01:49:29.277000 +CVE-2013-1383,0,0,061cd71ab3bb54e9ccd45d52c0dfc0200b211c974ad768c7b1fda84a67f8359d,2024-11-21T01:49:28.547000 +CVE-2013-1384,0,0,a5def6abeafeb7e685774dc401be3ed226e2e8a3c6818387a249362b8805a09f,2024-11-21T01:49:28.660000 +CVE-2013-1385,0,0,546983bae221c90109a456b2e3c158ebf8b694918eab9c7876a0a7f488e3328e,2024-11-21T01:49:28.777000 +CVE-2013-1386,0,0,3cc38e205981e94a37810cf2a773c46674e3fbaf396fc14e7deb2730d528a3ec,2024-11-21T01:49:28.900000 +CVE-2013-1387,0,0,9526c87b04c733f820b1de6b11d85eab97d836ee26fe929c2f0f1672b57362b3,2024-11-21T01:49:29.030000 +CVE-2013-1388,0,0,837cec0a40a86b6368a0323a61a987d70e7ce10e1dff8173b10884ea329241df,2024-11-21T01:49:29.160000 +CVE-2013-1389,0,0,17f94cbdb5c1fd15893a7a4019f298736ed2db90b3042d047186cb0450cb363c,2024-11-21T01:49:29.277000 CVE-2013-1391,0,0,5797c9d00ae4d138407d4ee7368b9b392052a3d6dcd2ee26772125d357ba07fe,2019-11-05T16:33:55.230000 -CVE-2013-1393,0,1,40ebb6057ebd33ecb0124d39910aefe043477d809590d4e379509c91bc7b33c4,2024-11-21T01:49:29.563000 +CVE-2013-1393,0,0,40ebb6057ebd33ecb0124d39910aefe043477d809590d4e379509c91bc7b33c4,2024-11-21T01:49:29.563000 CVE-2013-1397,0,0,5dfbebf5c2c2de68ad940eb67b1e6bf5a68bd223f08cd6aa2c894212ff6df019,2017-08-29T01:33:09.293000 -CVE-2013-1398,0,1,69a2d4169b19795dc9391665b1ec109fc4fbc24894793968b44bd8bf6ff045d5,2024-11-21T01:49:29.900000 -CVE-2013-1399,0,1,1960a43ac9de0d5cc6bb23b1b72911eefb3cd12a14a64d6baa282c9fd9b9d409,2024-11-21T01:49:30.073000 +CVE-2013-1398,0,0,69a2d4169b19795dc9391665b1ec109fc4fbc24894793968b44bd8bf6ff045d5,2024-11-21T01:49:29.900000 +CVE-2013-1399,0,0,1960a43ac9de0d5cc6bb23b1b72911eefb3cd12a14a64d6baa282c9fd9b9d409,2024-11-21T01:49:30.073000 CVE-2013-1400,0,0,6aadfb3ff214547de21437b02f6c0b84dd4c14b16d049c4e176b451899618f05,2020-02-19T13:34:43.627000 CVE-2013-1401,0,0,1ae85145e1ac45cafee825cb9dd3a81bf7d4d577bd8df854f6406cb5b581a287,2020-02-19T14:50:58.753000 -CVE-2013-1402,0,1,989f614c50b8211a51670ea0cbaf0dd41af6912f82dd2e12b6c3e3356ff0ccb9,2024-11-21T01:49:30.553000 -CVE-2013-1405,0,1,c49b8c37a97e7e6e498e204bd21f9d4b3f56d47c77ad44772d041feb5a42d9e0,2024-11-21T01:49:30.703000 -CVE-2013-1406,0,1,c4b639511e400eea97303cd92fc5ebc6dc9d8cbc3d0ee5e5622c215534f751dd,2024-11-21T01:49:30.850000 -CVE-2013-1407,0,1,bdf7a622caf77e3c540cb5a926016c9e64297f77fd461ee34b3a949fd03573b8,2024-11-21T01:49:31.013000 -CVE-2013-1408,0,1,7d65206a825430256d91c843930a9964783e8643ab84cfe95d2cf3fa7ec5f67e,2024-11-21T01:49:31.210000 -CVE-2013-1409,0,1,6ae35915c154caa616a385da671e9ef3ff7e3ae37d86e71c442b72bd2be24721,2024-11-21T01:49:31.393000 +CVE-2013-1402,0,0,989f614c50b8211a51670ea0cbaf0dd41af6912f82dd2e12b6c3e3356ff0ccb9,2024-11-21T01:49:30.553000 +CVE-2013-1405,0,0,c49b8c37a97e7e6e498e204bd21f9d4b3f56d47c77ad44772d041feb5a42d9e0,2024-11-21T01:49:30.703000 +CVE-2013-1406,0,0,c4b639511e400eea97303cd92fc5ebc6dc9d8cbc3d0ee5e5622c215534f751dd,2024-11-21T01:49:30.850000 +CVE-2013-1407,0,0,bdf7a622caf77e3c540cb5a926016c9e64297f77fd461ee34b3a949fd03573b8,2024-11-21T01:49:31.013000 +CVE-2013-1408,0,0,7d65206a825430256d91c843930a9964783e8643ab84cfe95d2cf3fa7ec5f67e,2024-11-21T01:49:31.210000 +CVE-2013-1409,0,0,6ae35915c154caa616a385da671e9ef3ff7e3ae37d86e71c442b72bd2be24721,2024-11-21T01:49:31.393000 CVE-2013-1410,0,0,97815c3ac3f5d54aacc01cbb22d56378b647d12bd666aa6faa1fbb0df11b33a0,2020-02-14T14:57:45.137000 CVE-2013-1412,0,0,ba72a73067aed09392446535524f1a233d01c33deaa5065cc56357c19e948059,2014-06-03T12:27:49.187000 -CVE-2013-1413,0,1,da6028e19ebb4208f2cec12bc5d94bc9262fe3fe98632d07acbe83b2b8f86330,2024-11-21T01:49:31.870000 -CVE-2013-1414,0,1,dd0b3d6b239c26bbe1452f247e0fea963cb8e3ea373114f2b4205b01c2bbe46c,2024-11-21T01:49:32.010000 -CVE-2013-1415,0,1,13fcbe1b5159d9af00b317a329213ff04449d6ad6c9372700ec6506af78bce43,2024-11-21T01:49:32.160000 -CVE-2013-1416,0,1,a6988a21818d7720f77d2ed7f8caf258dc5f3f7f1f4b6b2bbd5718485830b36a,2024-11-21T01:49:32.313000 -CVE-2013-1417,0,1,b8d0ec9c87c8de7c90a71c9143ec89a7eebf03c21885cdab183c29ae5007cacd,2024-11-21T01:49:32.487000 -CVE-2013-1418,0,1,254ff74955e546ca92e5cab677664fa266d84b818f7b2f9ae8357960c4ccec0b,2024-11-21T01:49:32.643000 +CVE-2013-1413,0,0,da6028e19ebb4208f2cec12bc5d94bc9262fe3fe98632d07acbe83b2b8f86330,2024-11-21T01:49:31.870000 +CVE-2013-1414,0,0,dd0b3d6b239c26bbe1452f247e0fea963cb8e3ea373114f2b4205b01c2bbe46c,2024-11-21T01:49:32.010000 +CVE-2013-1415,0,0,13fcbe1b5159d9af00b317a329213ff04449d6ad6c9372700ec6506af78bce43,2024-11-21T01:49:32.160000 +CVE-2013-1416,0,0,a6988a21818d7720f77d2ed7f8caf258dc5f3f7f1f4b6b2bbd5718485830b36a,2024-11-21T01:49:32.313000 +CVE-2013-1417,0,0,b8d0ec9c87c8de7c90a71c9143ec89a7eebf03c21885cdab183c29ae5007cacd,2024-11-21T01:49:32.487000 +CVE-2013-1418,0,0,254ff74955e546ca92e5cab677664fa266d84b818f7b2f9ae8357960c4ccec0b,2024-11-21T01:49:32.643000 CVE-2013-1420,0,0,cd8527a0bc6f7adf96369658ea9d9f576393b9ad59f3e557b051c90e22abd68a,2020-01-13T18:44:18.263000 -CVE-2013-1421,0,1,f0a62c63184e50e0697b6e7abab9cc6de7ba9b1d680114891d18b41678c5abaa,2024-11-21T01:49:32.970000 +CVE-2013-1421,0,0,f0a62c63184e50e0697b6e7abab9cc6de7ba9b1d680114891d18b41678c5abaa,2024-11-21T01:49:32.970000 CVE-2013-1422,0,0,e358fa66b306d2699097413e5a2d2bdd37a613ec118ba8132fc53ae314b7d048,2020-02-11T14:42:50.860000 -CVE-2013-1423,0,1,e8bef152b8671b22cdf2ab0b21e8ce00a3286842b44f17e00003627cbf3dfd22,2024-11-21T01:49:33.267000 +CVE-2013-1423,0,0,e8bef152b8671b22cdf2ab0b21e8ce00a3286842b44f17e00003627cbf3dfd22,2024-11-21T01:49:33.267000 CVE-2013-1425,0,0,84342ee87b1e4eaa5c37c9775233539cab647dcb51ca8a498bd095ac04f050ef,2023-11-07T02:14:44.037000 CVE-2013-1426,0,0,cfdee720ee6a0feb339b9cde3915b696bc85bde4231c3f8f18351145d2506dd4,2019-11-12T19:31:06.627000 -CVE-2013-1427,0,1,4160c1bb7db2bfbb19ce3636ff667e5a7ec510a2f3ed8ef7663e67ad217d8515,2024-11-21T01:49:33.640000 -CVE-2013-1428,0,1,dafeda9f83c048acba2ee4bf0bd96fed645fd9c6a10b5a8e751bea73bced8124,2024-11-21T01:49:33.763000 +CVE-2013-1427,0,0,4160c1bb7db2bfbb19ce3636ff667e5a7ec510a2f3ed8ef7663e67ad217d8515,2024-11-21T01:49:33.640000 +CVE-2013-1428,0,0,dafeda9f83c048acba2ee4bf0bd96fed645fd9c6a10b5a8e751bea73bced8124,2024-11-21T01:49:33.763000 CVE-2013-1429,0,0,d330917a43241d4290a7d805b5fe65dbafb905b69faa264390b5c4d0364cf184,2023-11-07T02:14:44.133000 CVE-2013-1430,0,0,c40426c7e72e1a57e901c51fcd3513bb2de932c9a6e53ae00b1e42df17512980,2020-07-08T15:50:10.823000 -CVE-2013-1431,0,1,bf7e6df75193b22f38ead4cc812037a4157cc01d5d939ebd1129b1ba9ee318f0,2024-11-21T01:49:34.170000 -CVE-2013-1432,0,1,6b3f1d042438e9f177e15d9556f3b8c9b6c835f61b4d7c0da4c6c9e3e72b9875,2024-11-21T01:49:34.317000 +CVE-2013-1431,0,0,bf7e6df75193b22f38ead4cc812037a4157cc01d5d939ebd1129b1ba9ee318f0,2024-11-21T01:49:34.170000 +CVE-2013-1432,0,0,6b3f1d042438e9f177e15d9556f3b8c9b6c835f61b4d7c0da4c6c9e3e72b9875,2024-11-21T01:49:34.317000 CVE-2013-1433,0,0,7c6088bd072832dad3a82b14faada890e3e6d8d2e89a600e1c7d20458356a82f,2023-11-07T02:14:44.213000 -CVE-2013-1434,0,1,6dcaf766eae839b1f580d5a4e94c826fe536fc54cab1b7f0a51fe8c1f8da2e70,2024-11-21T01:49:34.467000 -CVE-2013-1435,0,1,2a00cf1533bcd4b715bd3489d8ad3728b0a512d35022a09ff51eda3bf2140727,2024-11-21T01:49:34.593000 +CVE-2013-1434,0,0,6dcaf766eae839b1f580d5a4e94c826fe536fc54cab1b7f0a51fe8c1f8da2e70,2024-11-21T01:49:34.467000 +CVE-2013-1435,0,0,2a00cf1533bcd4b715bd3489d8ad3728b0a512d35022a09ff51eda3bf2140727,2024-11-21T01:49:34.593000 CVE-2013-1436,0,0,aca1b0589338965dae6fa69e2743f2a4d13065ee5a6b9904f1a49395517a53b2,2014-10-07T23:33:26.657000 CVE-2013-1437,0,0,acb0165f0b04de00b3c9a749414bc0a9c248356b42e1a4e1a4442723607a3c17,2020-02-04T17:28:19.630000 -CVE-2013-1438,0,1,059eb6d58979efd28d251ec1bafbf0f6fadb6e2538a9dab3b84f91c2ca1676ba,2024-11-21T01:49:34.963000 -CVE-2013-1439,0,1,143cabd3bbfd273f383d382652e4a61cc9c9f6bc46980a50edcb1ea729363499,2024-11-21T01:49:35.077000 -CVE-2013-1441,0,1,64cef63ac0a25d68ba1a008c8c4ac722edf118f5bb8ef6367bb23f18ca22fcce,2024-11-21T01:49:35.237000 -CVE-2013-1442,0,1,0479bfedbe015b2894852ed8b9fc22d0470f1331caaf3861b3db95748c501f0d,2024-11-21T01:49:35.367000 -CVE-2013-1443,0,1,bea220ab2b17cce9404895c54188ff2d2c04a73fab083cda3c2bb48cb7768dbb,2024-11-21T01:49:35.490000 -CVE-2013-1444,0,1,07d42dccd0874cc6c21fc02c0bc9a5ffbdddd72ba2f2bf60f8616fd0ef41f8c2,2024-11-21T01:49:35.617000 -CVE-2013-1445,0,1,f60a1a9d21e958d8dcc959e82fc296a37eda0851ab22959bbdd0c065216cbb7c,2024-11-21T01:49:36.460000 -CVE-2013-1447,0,1,5172c6762661a94c73c2576af3552409d8d946faacc5ecc6d1afb92047405928,2024-11-21T01:49:36.607000 -CVE-2013-1450,0,1,e86c6721b32a7e0239970cc84cf30dc663bddbe75beeee0f06573aaf886843ea,2024-11-21T01:49:36.817000 -CVE-2013-1451,0,1,f1c6c01effd3b1a527c88c644fb7572fe758be0fd106cf46add0e36bb9d9950f,2024-11-21T01:49:36.980000 -CVE-2013-1453,0,1,96544761b64ab3e02158ce039d0e1ea31e8fce5057f60e0b9898bb97f9a393c1,2024-11-21T01:49:37.900000 -CVE-2013-1454,0,1,0ca5d7fe3e528e0383daf1313c15b8635594a8ec73edfe020f66864c021bcdce,2024-11-21T01:49:38.253000 -CVE-2013-1455,0,1,2caed284ca2fc01bdd2f9dbbd3e8ac49a5a9c20805ff0881e61b11ad07044ad8,2024-11-21T01:49:38.390000 -CVE-2013-1461,0,1,d3a0ee2abe7f6556ea43c600dc3544bd4a02e4e7cc0ae323479b9259aae6f90b,2024-11-21T01:49:38.523000 -CVE-2013-1462,0,1,04a8cf162af25052876356e8a448c7f75fc5e8dacf24e3d08afe9a93b7db01ea,2024-11-21T01:49:38.660000 -CVE-2013-1463,0,1,e9fbb2ff4c25632fa147d9d1be5718a4b8ab03b8b758e9d7da6bbf1727f9a9a6,2024-11-21T01:49:38.810000 -CVE-2013-1464,0,1,0e84cf9402cca78f39e97c1658624f857e489249c647ae4067dd8559078d3268,2024-11-21T01:49:38.963000 -CVE-2013-1465,0,1,121702e092eddf5de651155b4193983ed36ddf98dece132b8923018d2c7b2d27,2024-11-21T01:49:39.123000 -CVE-2013-1466,0,1,daa7dcb66284ede8c7afa93b8aab43750eb0d2f764330ca36693fb10f62002ba,2024-11-21T01:49:39.297000 -CVE-2013-1468,0,1,93dfa1d0f417db2ab3e1312c219f5b62434cddc6ca6a8b549577de8b41f09ba9,2024-11-21T01:49:39.463000 -CVE-2013-1469,0,1,7a18d07e0a8b05e002c76b005b2725d330ebf46e0503ea12b336e4d36980f573,2024-11-21T01:49:39.627000 -CVE-2013-1470,0,1,e0f660c579acf7068206b1a06f7298af722b13270c74158a27b02013350ae007,2024-11-21T01:49:39.803000 -CVE-2013-1471,0,1,0a7868f354a9778e26231b3b85603d79af52260ceb365f639edab91191dbdc4b,2024-11-21T01:49:39.960000 -CVE-2013-1472,0,1,1ea25306198e06f33cbd107542dfb2f8b5e3f4e990f21ed21b141d1724262e11,2024-11-21T01:49:40.107000 -CVE-2013-1473,0,1,edd8c9e6a5c6c43a204c686a4b18ca9fd031d6513eb2a1bf157f10469b7e0e8b,2024-11-21T01:49:40.243000 -CVE-2013-1474,0,1,3938ef826d20e9c7405afa0c7a844b4dcbf19e13dc50e71e520c1f58a2ffd02f,2024-11-21T01:49:40.403000 -CVE-2013-1475,0,1,0c4ef03ff9ca1ee7bdf861a8824490b9e7416aad2613654fe9938dbcc0f85d06,2024-11-21T01:49:40.530000 -CVE-2013-1476,0,1,b5ec3a753f9ae3513cec313aad0aa7ed864f7218d4a1daecb26e8e056f5c7b78,2024-11-21T01:49:40.690000 -CVE-2013-1477,0,1,5509b181dcd3ed52fa3f8feb99c9467bcf5528c6976c6fefc64f552131fb40e1,2024-11-21T01:49:40.883000 -CVE-2013-1478,0,1,ae4d297e7b504daf2a7f82d3b71f472f7e6889cb0ee5297f3ab5374fa6570962,2024-11-21T01:49:41.007000 -CVE-2013-1479,0,1,c1038a5898758e758352fd918e6260e0df8962ea147da24d50df4219d8cb0034,2024-11-21T01:49:41.210000 -CVE-2013-1480,0,1,3e53edab8e0b432e3a2f6dbc27e044da61bc827cd7151b4457c29aae6cf468b8,2024-11-21T01:49:41.363000 -CVE-2013-1481,0,1,97b299d03d1f073b66f6c38f935d6569dc218108fed189273baa903c2f46ead0,2024-11-21T01:49:41.560000 -CVE-2013-1482,0,1,d941e59149f2dcfa8d352d00007efed338b25943e323778075b6a6316599a97e,2024-11-21T01:49:41.730000 -CVE-2013-1483,0,1,4f932f914643b05f225f197dbbb77eb52e420b52c9d3b43dabbe3119ba541ca4,2024-11-21T01:49:41.860000 -CVE-2013-1484,0,1,6c39929e9e070a108f5eb7bed78f01da6b666642296c874479ae5c5ca1e8abb7,2024-11-21T01:49:41.990000 -CVE-2013-1485,0,1,58e8f678fa63bea8c76ed7fde8de06d90bc7c0ea7c083f63309a30fee5cf34e8,2024-11-21T01:49:42.120000 -CVE-2013-1486,0,1,0ebf6aefb455410e2aaef041457774ac5741d7b21f19f8e7f4d29cf395f23e11,2024-11-21T01:49:42.270000 -CVE-2013-1487,0,1,9a1c1a2ec909e13b8a4b095ff05c1783748463860a8efd60f2fc45092ae653c9,2024-11-21T01:49:42.457000 -CVE-2013-1488,0,1,df22114979a032bdec2a4c6ac780290deb1e44446a90e908469eaca329777c70,2024-11-21T01:49:42.613000 -CVE-2013-1489,0,1,eb23174e4a763ca474d65e8912d4b0bca18683ac3e9145eb751aded72badce47,2024-11-21T01:49:42.760000 -CVE-2013-1490,0,1,4e069ea89649ba944edb4318862ac23d49413dfdb428714a441f5ca32460ac1d,2024-11-21T01:49:42.910000 -CVE-2013-1491,0,1,c7789e9d4cd6b21a2594d6bf18f088be8887b0ab747b5211a94c1d2fd0aabb74,2024-11-21T01:49:43.030000 -CVE-2013-1492,0,1,3967c55c3a017606a69d0ffb1c99e9c8a0dd00fc63f8877f6c197a02e26e0e7a,2024-11-21T01:49:43.193000 -CVE-2013-1493,0,1,603e5e3bea1426483988f7344b5f372badd254e26994a24cdb7c177bb18b3e0d,2024-11-21T01:49:43.327000 -CVE-2013-1494,0,1,aba967db105d4ba86ec8bfa81595b2fc4e4c54ba827eb2074879b0e4c17743bb,2024-11-21T01:49:43.503000 -CVE-2013-1495,0,1,38375b2b74fea661b99293bb8d48640bc0bf98228af6ee79c59f3ed1a484e138,2024-11-21T01:49:43.633000 -CVE-2013-1496,0,1,426c6a6a5f07a393d01ccaba7c386c98a791e2444a68bbe1d730c56abc56a2d1,2024-11-21T01:49:43.753000 -CVE-2013-1497,0,1,d635ada8d5873e9c62a6b19ff70374f79686411e2148c73f9c8675ba7b9903cb,2024-11-21T01:49:43.883000 -CVE-2013-1498,0,1,851015dc6639425fce7827843addfc95e79425b63168b735c4781bfac0c28a5c,2024-11-21T01:49:44 -CVE-2013-1499,0,1,2651b1028ba389dbd41d8735771a0425a8675d0519916cdf028f303651f03e60,2024-11-21T01:49:44.130000 -CVE-2013-1500,0,1,25203c0419dc328ca9fbf4f4bfb8c1ba22bc5075d557e810f6c28152f05fb2a7,2024-11-21T01:49:44.247000 -CVE-2013-1501,0,1,6ef518147c54a7d159c71b6f17d1396131731b25f8410f505a98159c2913d86c,2024-11-21T01:49:44.437000 -CVE-2013-1502,0,1,f322795c840b2b2bd5bafa9784e1654eb588ca5a4900707f3d19a2a2868d7ece,2024-11-21T01:49:44.550000 -CVE-2013-1503,0,1,be2b89b0c1e6adc02c45dc0298dcb6338b81c1af68621a221573e0a34e2102fe,2024-11-21T01:49:44.700000 -CVE-2013-1504,0,1,99ae3e62e29a2135d2833d1916b4926b52849aaab90615993a5ef391cdd5aa79,2024-11-21T01:49:44.820000 -CVE-2013-1505,0,1,ca36e7b33256b421d4d94fae53189cd5c62f48717a02c4d04d731be3b0703c39,2024-11-21T01:49:44.943000 -CVE-2013-1506,0,1,6c978593a782c12c418dd88080c057136df3d021e119ea24fa92740732f5947e,2024-11-21T01:49:45.060000 -CVE-2013-1507,0,1,ab2c15e328cd0fb2bf6387caebb626ee35b3ef7eb930f4fb0fe4540b644e24e7,2024-11-21T01:49:45.217000 -CVE-2013-1508,0,1,0311d280bc261f53aebde475adea911a19adbc85b90790add73bd13c59590735,2024-11-21T01:49:45.360000 -CVE-2013-1509,0,1,8bfe7e1de1df8c2733eb6130d23a28138ca56c1a4e8044373154d8f32ed3a652,2024-11-21T01:49:45.513000 -CVE-2013-1510,0,1,38ab02d4e5abf64cfb7112f9869ae1f1b6bf6fcde758cf8422df76b743cf925a,2024-11-21T01:49:45.633000 -CVE-2013-1511,0,1,0121ec9c5cd6bf07492fb5fabe6837df211d4218172cad819801f5a3997bfda9,2024-11-21T01:49:45.757000 -CVE-2013-1512,0,1,d5368572df151d8a0809eab0df794124ba6bc52a76e6a0292754346eb0e7d9f4,2024-11-21T01:49:45.893000 -CVE-2013-1513,0,1,236a4b47667a4691e35491240f899051adaf3ff72b97a948252a54ffc2cde300,2024-11-21T01:49:46.040000 -CVE-2013-1514,0,1,79440afac5495ec720d6f7800e2168aa684f620bac0182c4f019e2333725c77b,2024-11-21T01:49:46.157000 -CVE-2013-1515,0,1,c356015eec7bc1d4896feaf113021f7db893069fe973db32f32b6f156c19f64a,2024-11-21T01:49:46.277000 -CVE-2013-1516,0,1,8de3c32faec4c1606019170ada251b88bc2a560124e1f2eb97da78c98c95adf0,2024-11-21T01:49:46.397000 -CVE-2013-1517,0,1,34846281eed6debdf6a271bd162576221c1132e01112233c4b9dc402e536c812,2024-11-21T01:49:46.520000 -CVE-2013-1518,0,1,8df6d8e11ce5c5d78474d559e59668afca942133108d9d7310f9f6116d69451a,2024-11-21T01:49:46.643000 -CVE-2013-1519,0,1,09b4bc89df7dc875c23b514ed97785870e9ed19291a460070e197cd21ba830c3,2024-11-21T01:49:46.813000 -CVE-2013-1520,0,1,93a072f6dea5b984e3671e9970e9258fc34ac2a13ab93e971c6ad66d9ec1dd5b,2024-11-21T01:49:46.927000 -CVE-2013-1521,0,1,50c59aa1becf718f3763ecedcd15d576f5d49f46c8b56c14c83932a42f7a3bd8,2024-11-21T01:49:47.030000 -CVE-2013-1522,0,1,ab31ec6c5def7b5f107e7667cd5f205fc586de1419aaeec75f7bd59721d5ab07,2024-11-21T01:49:47.163000 -CVE-2013-1523,0,1,69b8b5eb72a2aadb38f5cb022b4dd5e696512f750f281f02a76acad708b2f766,2024-11-21T01:49:47.280000 -CVE-2013-1524,0,1,3372da55db35b38b0a49643c8e5c8d2bf4cde5810b438798bdbbadfd759b7fca,2024-11-21T01:49:47.433000 -CVE-2013-1525,0,1,76289e3c34aa0958e28b6121b95df5130e1a956cf5a4d93d5d11bd50694ee443,2024-11-21T01:49:47.543000 -CVE-2013-1526,0,1,44c208db30b4b33dbd439f270ee9ce12a47d783078239f1bf0f7e255528bdc55,2024-11-21T01:49:47.653000 -CVE-2013-1527,0,1,4044f95c3c8486797252f5a13c70a070b3c0a4e2be07852823b8847237f22195,2024-11-21T01:49:47.797000 -CVE-2013-1528,0,1,89068ecaa4aef75a3820f156fc5a43bce42545ed8a87dc95694fe1e88de08056,2024-11-21T01:49:47.910000 -CVE-2013-1529,0,1,cd04df4b4fb3a2243d0156ac18212f9fb9f07958e5434dd57868078b224dfd96,2024-11-21T01:49:48.023000 -CVE-2013-1530,0,1,094d86abbc71b5152427f31dd77774104c1d2c4301973a355aeeabe937e37348,2024-11-21T01:49:48.137000 -CVE-2013-1531,0,1,f64fd42494f86096bf397dfc638c6a77e3234b5af90746e08e2f86ff774f42c0,2024-11-21T01:49:48.270000 -CVE-2013-1532,0,1,9a9d1ead5dc8eaf2dff460c69c97dd14640cb30662fa764121d22d9a115cfa22,2024-11-21T01:49:48.410000 -CVE-2013-1533,0,1,7cadea71199ad613cbe38c984b736069429431785fc695145507dbcbf71c5352,2024-11-21T01:49:48.590000 -CVE-2013-1534,0,1,7ce830aec1370815be4607e5c3cc2048f974cf6b98b93f7fd1e587e062373bdc,2024-11-21T01:49:48.697000 -CVE-2013-1535,0,1,c3a37c0f8a9a3618d5c3169fef65880b92aa4d38bbdccfbab2a930777535cf38,2024-11-21T01:49:48.810000 -CVE-2013-1536,0,1,c656db4cc3c8bf03b8f71a522d961b46872e02aedb1abb7345807c5ea12ad682,2024-11-21T01:49:48.923000 -CVE-2013-1537,0,1,e1f113381b3f7d48fbc317589ca6cfe75b966a5d4e01dd35a49b5990a8574e47,2024-11-21T01:49:49.047000 -CVE-2013-1538,0,1,5b814dfba8b56e4509ef765a518859b876ebe2f98367991c884acd160875ac77,2024-11-21T01:49:49.237000 -CVE-2013-1539,0,1,145b6c8961e47db60ac11eb47b70b628e94e3b5601e0b2ce390656de93117540,2024-11-21T01:49:49.350000 -CVE-2013-1540,0,1,88ee1ff658727bea84bbef7e01a1461597639f983b35afb30c06ac0d0319fab7,2024-11-21T01:49:49.467000 -CVE-2013-1541,0,1,97c25e07d650363fbe63f5a2ce125e408f84ce922439bdb9ef9cee4893b7a9c6,2024-11-21T01:49:49.617000 -CVE-2013-1542,0,1,ab322102dc7dc1a32d9fe2176716d0a804e80d0660a8b5ca204aa59d1c6d78c8,2024-11-21T01:49:49.737000 -CVE-2013-1543,0,1,e8f95933e656a8932a6b8941b4a496c6408c4475d7d1c9117e5840ab51315e96,2024-11-21T01:49:49.857000 -CVE-2013-1544,0,1,6d81511b851966eedb5f483c4052f82d6b46caddd78939084b0c07ab08d686c4,2024-11-21T01:49:49.973000 -CVE-2013-1545,0,1,89518b78a5d674463cb4cc1f6eb5f619f448800c237a3689bd790a864f2b5a09,2024-11-21T01:49:50.113000 -CVE-2013-1546,0,1,56b1a2d73b10afa6d18e821dec6c0e014bf41e4424f611a5914e91edad7e6ea6,2024-11-21T01:49:50.230000 -CVE-2013-1547,0,1,002f0d0b3b204513b863ec13c163b837a2b18581f47a6be890b0e08b239844ff,2024-11-21T01:49:50.353000 -CVE-2013-1548,0,1,3255fdbd54f3c23e7f4e4987edcf7f10f394e121bafe738403c1374b1d54d98f,2024-11-21T01:49:50.480000 -CVE-2013-1549,0,1,dcdc94cad13acae49019d0ea27f93689c18d64b7749618572650997aa3166c0d,2024-11-21T01:49:50.657000 -CVE-2013-1550,0,1,8c4519b408ca5ce139b5f575aa987db3fb7bf3ad6ccf1c6a2859d8a44cc3ac1a,2024-11-21T01:49:50.777000 -CVE-2013-1551,0,1,f7932c956599fc5aa80493d8caec2b45647f3583dadf9ae82f359977f7df988e,2024-11-21T01:49:50.893000 -CVE-2013-1552,0,1,b7b9a2d4353b579dd551e35fe3dd117a197ee75a075a14d5cd75ea13bf5a4447,2024-11-21T01:49:51.010000 -CVE-2013-1553,0,1,76df57acf50abe6421a89329f740a3317e754035a48e90f6f115969c0fe41dae,2024-11-21T01:49:51.157000 -CVE-2013-1554,0,1,867c84f3d9aa071b74e900551a3ed21e954ba62730a20009bb1fb2b3cb994866,2024-11-21T01:49:51.280000 -CVE-2013-1555,0,1,a0ef51c8f9fb6e6ff52c6dfde1654bad116045f0712ba9eace56fd40c7c158ad,2024-11-21T01:49:51.403000 -CVE-2013-1556,0,1,7efb04d34b4685d35c3b016473325908779fbcf2169e931c7da10e922d178c0b,2024-11-21T01:49:51.557000 -CVE-2013-1557,0,1,3386a4f15c7d5d67efb697bd5092e7ddc5c62e292744cec0dd76cebd88e1b68c,2024-11-21T01:49:51.697000 -CVE-2013-1558,0,1,b26e0b7f3cc78d9f468a2bd364391cf175103764ea7f8c7e6f04063e3cccfb1d,2024-11-21T01:49:51.880000 -CVE-2013-1559,0,1,dc75a3965c1fc07e07f23dc3f8f0501fbed5f22e32632ae59c0aa2a3360c8c7f,2024-11-21T01:49:52.043000 -CVE-2013-1560,0,1,2f08053e18c1e44d5f54fa06d313b753abfa6bd96a519cc2c4db4bd3d9e0e78c,2024-11-21T01:49:52.167000 -CVE-2013-1561,0,1,d9b570b9f50659226b56c48393c27c607a7e767cfe57cb9325ee50d4e19feda6,2024-11-21T01:49:52.293000 -CVE-2013-1562,0,1,e0084d9a7cd6d131f239c42ed5252af27fdb940a74b0700dd4d75645fb3966c4,2024-11-21T01:49:52.413000 -CVE-2013-1563,0,1,5e9eebe7da10c61cf4a8606e41a29f2134881ecc81c770c245d80cdd08fc3f33,2024-11-21T01:49:52.530000 -CVE-2013-1564,0,1,85afc01cf7eca1986fca2edd9899b86b790d0023e1de6c15f4e1afdc3e13d654,2024-11-21T01:49:52.677000 -CVE-2013-1565,0,1,63ed4c139478164f026916b77b3fc0b05381082d64685ef1fd0ca7525c1664dc,2024-11-21T01:49:52.790000 -CVE-2013-1566,0,1,2fe0f73d9c34871e8e8301b080778486c3acba6516cb162abfc3365a99e984b3,2024-11-21T01:49:52.907000 -CVE-2013-1567,0,1,fbc3ee65472406ce5b1425de5932869139a5c5c5e52e7617461600398f22d74b,2024-11-21T01:49:53.023000 -CVE-2013-1568,0,1,cd9391015c58705db9143255d8c39e492b1f55bf8dd7d041d35d37613cf7bd07,2024-11-21T01:49:53.147000 -CVE-2013-1569,0,1,03536b4020f71c2b845ff6f8260fa9bbfb2730f9f73d10a6a00b4e65f3df3340,2024-11-21T01:49:53.273000 -CVE-2013-1570,0,1,fe832243d83b8dbc4d11324d304a26a8fda0920b50e76c6459bfd63b67c49d12,2024-11-21T01:49:53.463000 -CVE-2013-1571,0,1,3e60527a1d6f8f3eb1f282f1d8eb9dd713959fae6c26edd46ef7ebc1a8e90c19,2024-11-21T01:49:53.590000 -CVE-2013-1572,0,1,1c454946af8a25e95fe9bdc4c5304acb29e6d05dc6e2c2b0b2c8d10a256d0b9b,2024-11-21T01:49:53.793000 -CVE-2013-1573,0,1,f77d3d27cbc9f8ae90b55430c50c1a305a0a862efc1119512cd967decea6b418,2024-11-21T01:49:53.950000 -CVE-2013-1574,0,1,687723a0b116b9d931e977a6799356aefe027b0d33a98f48592cbc014ea15b6e,2024-11-21T01:49:54.100000 -CVE-2013-1575,0,1,d6ae350bd09202ec18f7067e6c74e27f31aee6e753904ddf3dfaa39bb494fcb1,2024-11-21T01:49:54.250000 -CVE-2013-1576,0,1,61066f325b2acd964c93b02677586dd5f73d060d610259a36e4d8cd859a1f3d9,2024-11-21T01:49:54.400000 -CVE-2013-1577,0,1,a016b12a707a8ef87ebcc3d6f42194d6f6c59569952fc050687a8aa0013e4f4e,2024-11-21T01:49:54.547000 -CVE-2013-1578,0,1,878824f1eaa9844bc912ea21884fc55cd6e3e738d31d5627fc9ecc5ae9943175,2024-11-21T01:49:54.690000 -CVE-2013-1579,0,1,6906a6e5f444d3d44f56b60dc6a90012e3cab7eb463bc3011b4d4bd308277dd3,2024-11-21T01:49:54.837000 -CVE-2013-1580,0,1,2cb8af2084101da99257664f8cf6d8d9162162d1bddeb3af9ad8a5fbdaa8e424,2024-11-21T01:49:54.977000 -CVE-2013-1581,0,1,a2c638265dec0382d4f84da0e1c2d53b524f853386b6e0688c01cbf5113778dc,2024-11-21T01:49:55.120000 -CVE-2013-1582,0,1,10b9c82b49d2bfcce1a5cb94d57ddce38c5cd1ccfbae9483eb7f01d4965b1b75,2024-11-21T01:49:55.270000 -CVE-2013-1583,0,1,74a8617ee4fde4e67666605103cd7f5a82aff9ddeafe80b83a07ef86f04f942c,2024-11-21T01:49:55.423000 -CVE-2013-1584,0,1,55f62c733bbe7c513ea1d23b3640669b218eefef3df3d60879503ff86dd76aa8,2024-11-21T01:49:55.583000 -CVE-2013-1585,0,1,7be5ebadf085cc106a7aa31e3bc0ccc4769326292a7a4bd651ff3f02f8d03bfe,2024-11-21T01:49:55.760000 -CVE-2013-1586,0,1,7eff5bc1d80af6954e48a82ad73a056cdf2459c39a265dd36fb717afa75f408e,2024-11-21T01:49:55.927000 -CVE-2013-1587,0,1,c30c6ce01e7f8ccedf75b2e6646116548a54f1701853a49fb181b9b34caa99a5,2024-11-21T01:49:56.077000 -CVE-2013-1588,0,1,a0eae68080ea45f9c3e33315d01edee8073950c817f0c3e99843f6fbeb1271c6,2024-11-21T01:49:56.233000 -CVE-2013-1589,0,1,7bcf39c91f786d50a9bdc65b5c514faa508b5edbed242650ae0da9100624f6c9,2024-11-21T01:49:56.390000 -CVE-2013-1590,0,1,7049dd1d13a71b217626768f5131f6375c0016c2969a4dfde3495b01d4a8076c,2024-11-21T01:49:56.550000 -CVE-2013-1591,0,1,49b81f3a92b1a42ba44d024fc947348507992d7adb678aa54a8dcca56397a130,2024-11-21T01:49:56.713000 +CVE-2013-1438,0,0,059eb6d58979efd28d251ec1bafbf0f6fadb6e2538a9dab3b84f91c2ca1676ba,2024-11-21T01:49:34.963000 +CVE-2013-1439,0,0,143cabd3bbfd273f383d382652e4a61cc9c9f6bc46980a50edcb1ea729363499,2024-11-21T01:49:35.077000 +CVE-2013-1441,0,0,64cef63ac0a25d68ba1a008c8c4ac722edf118f5bb8ef6367bb23f18ca22fcce,2024-11-21T01:49:35.237000 +CVE-2013-1442,0,0,0479bfedbe015b2894852ed8b9fc22d0470f1331caaf3861b3db95748c501f0d,2024-11-21T01:49:35.367000 +CVE-2013-1443,0,0,bea220ab2b17cce9404895c54188ff2d2c04a73fab083cda3c2bb48cb7768dbb,2024-11-21T01:49:35.490000 +CVE-2013-1444,0,0,07d42dccd0874cc6c21fc02c0bc9a5ffbdddd72ba2f2bf60f8616fd0ef41f8c2,2024-11-21T01:49:35.617000 +CVE-2013-1445,0,0,f60a1a9d21e958d8dcc959e82fc296a37eda0851ab22959bbdd0c065216cbb7c,2024-11-21T01:49:36.460000 +CVE-2013-1447,0,0,5172c6762661a94c73c2576af3552409d8d946faacc5ecc6d1afb92047405928,2024-11-21T01:49:36.607000 +CVE-2013-1450,0,0,e86c6721b32a7e0239970cc84cf30dc663bddbe75beeee0f06573aaf886843ea,2024-11-21T01:49:36.817000 +CVE-2013-1451,0,0,f1c6c01effd3b1a527c88c644fb7572fe758be0fd106cf46add0e36bb9d9950f,2024-11-21T01:49:36.980000 +CVE-2013-1453,0,0,96544761b64ab3e02158ce039d0e1ea31e8fce5057f60e0b9898bb97f9a393c1,2024-11-21T01:49:37.900000 +CVE-2013-1454,0,0,0ca5d7fe3e528e0383daf1313c15b8635594a8ec73edfe020f66864c021bcdce,2024-11-21T01:49:38.253000 +CVE-2013-1455,0,0,2caed284ca2fc01bdd2f9dbbd3e8ac49a5a9c20805ff0881e61b11ad07044ad8,2024-11-21T01:49:38.390000 +CVE-2013-1461,0,0,d3a0ee2abe7f6556ea43c600dc3544bd4a02e4e7cc0ae323479b9259aae6f90b,2024-11-21T01:49:38.523000 +CVE-2013-1462,0,0,04a8cf162af25052876356e8a448c7f75fc5e8dacf24e3d08afe9a93b7db01ea,2024-11-21T01:49:38.660000 +CVE-2013-1463,0,0,e9fbb2ff4c25632fa147d9d1be5718a4b8ab03b8b758e9d7da6bbf1727f9a9a6,2024-11-21T01:49:38.810000 +CVE-2013-1464,0,0,0e84cf9402cca78f39e97c1658624f857e489249c647ae4067dd8559078d3268,2024-11-21T01:49:38.963000 +CVE-2013-1465,0,0,121702e092eddf5de651155b4193983ed36ddf98dece132b8923018d2c7b2d27,2024-11-21T01:49:39.123000 +CVE-2013-1466,0,0,daa7dcb66284ede8c7afa93b8aab43750eb0d2f764330ca36693fb10f62002ba,2024-11-21T01:49:39.297000 +CVE-2013-1468,0,0,93dfa1d0f417db2ab3e1312c219f5b62434cddc6ca6a8b549577de8b41f09ba9,2024-11-21T01:49:39.463000 +CVE-2013-1469,0,0,7a18d07e0a8b05e002c76b005b2725d330ebf46e0503ea12b336e4d36980f573,2024-11-21T01:49:39.627000 +CVE-2013-1470,0,0,e0f660c579acf7068206b1a06f7298af722b13270c74158a27b02013350ae007,2024-11-21T01:49:39.803000 +CVE-2013-1471,0,0,0a7868f354a9778e26231b3b85603d79af52260ceb365f639edab91191dbdc4b,2024-11-21T01:49:39.960000 +CVE-2013-1472,0,0,1ea25306198e06f33cbd107542dfb2f8b5e3f4e990f21ed21b141d1724262e11,2024-11-21T01:49:40.107000 +CVE-2013-1473,0,0,edd8c9e6a5c6c43a204c686a4b18ca9fd031d6513eb2a1bf157f10469b7e0e8b,2024-11-21T01:49:40.243000 +CVE-2013-1474,0,0,3938ef826d20e9c7405afa0c7a844b4dcbf19e13dc50e71e520c1f58a2ffd02f,2024-11-21T01:49:40.403000 +CVE-2013-1475,0,0,0c4ef03ff9ca1ee7bdf861a8824490b9e7416aad2613654fe9938dbcc0f85d06,2024-11-21T01:49:40.530000 +CVE-2013-1476,0,0,b5ec3a753f9ae3513cec313aad0aa7ed864f7218d4a1daecb26e8e056f5c7b78,2024-11-21T01:49:40.690000 +CVE-2013-1477,0,0,5509b181dcd3ed52fa3f8feb99c9467bcf5528c6976c6fefc64f552131fb40e1,2024-11-21T01:49:40.883000 +CVE-2013-1478,0,0,ae4d297e7b504daf2a7f82d3b71f472f7e6889cb0ee5297f3ab5374fa6570962,2024-11-21T01:49:41.007000 +CVE-2013-1479,0,0,c1038a5898758e758352fd918e6260e0df8962ea147da24d50df4219d8cb0034,2024-11-21T01:49:41.210000 +CVE-2013-1480,0,0,3e53edab8e0b432e3a2f6dbc27e044da61bc827cd7151b4457c29aae6cf468b8,2024-11-21T01:49:41.363000 +CVE-2013-1481,0,0,97b299d03d1f073b66f6c38f935d6569dc218108fed189273baa903c2f46ead0,2024-11-21T01:49:41.560000 +CVE-2013-1482,0,0,d941e59149f2dcfa8d352d00007efed338b25943e323778075b6a6316599a97e,2024-11-21T01:49:41.730000 +CVE-2013-1483,0,0,4f932f914643b05f225f197dbbb77eb52e420b52c9d3b43dabbe3119ba541ca4,2024-11-21T01:49:41.860000 +CVE-2013-1484,0,0,6c39929e9e070a108f5eb7bed78f01da6b666642296c874479ae5c5ca1e8abb7,2024-11-21T01:49:41.990000 +CVE-2013-1485,0,0,58e8f678fa63bea8c76ed7fde8de06d90bc7c0ea7c083f63309a30fee5cf34e8,2024-11-21T01:49:42.120000 +CVE-2013-1486,0,0,0ebf6aefb455410e2aaef041457774ac5741d7b21f19f8e7f4d29cf395f23e11,2024-11-21T01:49:42.270000 +CVE-2013-1487,0,0,9a1c1a2ec909e13b8a4b095ff05c1783748463860a8efd60f2fc45092ae653c9,2024-11-21T01:49:42.457000 +CVE-2013-1488,0,0,df22114979a032bdec2a4c6ac780290deb1e44446a90e908469eaca329777c70,2024-11-21T01:49:42.613000 +CVE-2013-1489,0,0,eb23174e4a763ca474d65e8912d4b0bca18683ac3e9145eb751aded72badce47,2024-11-21T01:49:42.760000 +CVE-2013-1490,0,0,4e069ea89649ba944edb4318862ac23d49413dfdb428714a441f5ca32460ac1d,2024-11-21T01:49:42.910000 +CVE-2013-1491,0,0,c7789e9d4cd6b21a2594d6bf18f088be8887b0ab747b5211a94c1d2fd0aabb74,2024-11-21T01:49:43.030000 +CVE-2013-1492,0,0,3967c55c3a017606a69d0ffb1c99e9c8a0dd00fc63f8877f6c197a02e26e0e7a,2024-11-21T01:49:43.193000 +CVE-2013-1493,0,0,603e5e3bea1426483988f7344b5f372badd254e26994a24cdb7c177bb18b3e0d,2024-11-21T01:49:43.327000 +CVE-2013-1494,0,0,aba967db105d4ba86ec8bfa81595b2fc4e4c54ba827eb2074879b0e4c17743bb,2024-11-21T01:49:43.503000 +CVE-2013-1495,0,0,38375b2b74fea661b99293bb8d48640bc0bf98228af6ee79c59f3ed1a484e138,2024-11-21T01:49:43.633000 +CVE-2013-1496,0,0,426c6a6a5f07a393d01ccaba7c386c98a791e2444a68bbe1d730c56abc56a2d1,2024-11-21T01:49:43.753000 +CVE-2013-1497,0,0,d635ada8d5873e9c62a6b19ff70374f79686411e2148c73f9c8675ba7b9903cb,2024-11-21T01:49:43.883000 +CVE-2013-1498,0,0,851015dc6639425fce7827843addfc95e79425b63168b735c4781bfac0c28a5c,2024-11-21T01:49:44 +CVE-2013-1499,0,0,2651b1028ba389dbd41d8735771a0425a8675d0519916cdf028f303651f03e60,2024-11-21T01:49:44.130000 +CVE-2013-1500,0,0,25203c0419dc328ca9fbf4f4bfb8c1ba22bc5075d557e810f6c28152f05fb2a7,2024-11-21T01:49:44.247000 +CVE-2013-1501,0,0,6ef518147c54a7d159c71b6f17d1396131731b25f8410f505a98159c2913d86c,2024-11-21T01:49:44.437000 +CVE-2013-1502,0,0,f322795c840b2b2bd5bafa9784e1654eb588ca5a4900707f3d19a2a2868d7ece,2024-11-21T01:49:44.550000 +CVE-2013-1503,0,0,be2b89b0c1e6adc02c45dc0298dcb6338b81c1af68621a221573e0a34e2102fe,2024-11-21T01:49:44.700000 +CVE-2013-1504,0,0,99ae3e62e29a2135d2833d1916b4926b52849aaab90615993a5ef391cdd5aa79,2024-11-21T01:49:44.820000 +CVE-2013-1505,0,0,ca36e7b33256b421d4d94fae53189cd5c62f48717a02c4d04d731be3b0703c39,2024-11-21T01:49:44.943000 +CVE-2013-1506,0,0,6c978593a782c12c418dd88080c057136df3d021e119ea24fa92740732f5947e,2024-11-21T01:49:45.060000 +CVE-2013-1507,0,0,ab2c15e328cd0fb2bf6387caebb626ee35b3ef7eb930f4fb0fe4540b644e24e7,2024-11-21T01:49:45.217000 +CVE-2013-1508,0,0,0311d280bc261f53aebde475adea911a19adbc85b90790add73bd13c59590735,2024-11-21T01:49:45.360000 +CVE-2013-1509,0,0,8bfe7e1de1df8c2733eb6130d23a28138ca56c1a4e8044373154d8f32ed3a652,2024-11-21T01:49:45.513000 +CVE-2013-1510,0,0,38ab02d4e5abf64cfb7112f9869ae1f1b6bf6fcde758cf8422df76b743cf925a,2024-11-21T01:49:45.633000 +CVE-2013-1511,0,0,0121ec9c5cd6bf07492fb5fabe6837df211d4218172cad819801f5a3997bfda9,2024-11-21T01:49:45.757000 +CVE-2013-1512,0,0,d5368572df151d8a0809eab0df794124ba6bc52a76e6a0292754346eb0e7d9f4,2024-11-21T01:49:45.893000 +CVE-2013-1513,0,0,236a4b47667a4691e35491240f899051adaf3ff72b97a948252a54ffc2cde300,2024-11-21T01:49:46.040000 +CVE-2013-1514,0,0,79440afac5495ec720d6f7800e2168aa684f620bac0182c4f019e2333725c77b,2024-11-21T01:49:46.157000 +CVE-2013-1515,0,0,c356015eec7bc1d4896feaf113021f7db893069fe973db32f32b6f156c19f64a,2024-11-21T01:49:46.277000 +CVE-2013-1516,0,0,8de3c32faec4c1606019170ada251b88bc2a560124e1f2eb97da78c98c95adf0,2024-11-21T01:49:46.397000 +CVE-2013-1517,0,0,34846281eed6debdf6a271bd162576221c1132e01112233c4b9dc402e536c812,2024-11-21T01:49:46.520000 +CVE-2013-1518,0,0,8df6d8e11ce5c5d78474d559e59668afca942133108d9d7310f9f6116d69451a,2024-11-21T01:49:46.643000 +CVE-2013-1519,0,0,09b4bc89df7dc875c23b514ed97785870e9ed19291a460070e197cd21ba830c3,2024-11-21T01:49:46.813000 +CVE-2013-1520,0,0,93a072f6dea5b984e3671e9970e9258fc34ac2a13ab93e971c6ad66d9ec1dd5b,2024-11-21T01:49:46.927000 +CVE-2013-1521,0,0,50c59aa1becf718f3763ecedcd15d576f5d49f46c8b56c14c83932a42f7a3bd8,2024-11-21T01:49:47.030000 +CVE-2013-1522,0,0,ab31ec6c5def7b5f107e7667cd5f205fc586de1419aaeec75f7bd59721d5ab07,2024-11-21T01:49:47.163000 +CVE-2013-1523,0,0,69b8b5eb72a2aadb38f5cb022b4dd5e696512f750f281f02a76acad708b2f766,2024-11-21T01:49:47.280000 +CVE-2013-1524,0,0,3372da55db35b38b0a49643c8e5c8d2bf4cde5810b438798bdbbadfd759b7fca,2024-11-21T01:49:47.433000 +CVE-2013-1525,0,0,76289e3c34aa0958e28b6121b95df5130e1a956cf5a4d93d5d11bd50694ee443,2024-11-21T01:49:47.543000 +CVE-2013-1526,0,0,44c208db30b4b33dbd439f270ee9ce12a47d783078239f1bf0f7e255528bdc55,2024-11-21T01:49:47.653000 +CVE-2013-1527,0,0,4044f95c3c8486797252f5a13c70a070b3c0a4e2be07852823b8847237f22195,2024-11-21T01:49:47.797000 +CVE-2013-1528,0,0,89068ecaa4aef75a3820f156fc5a43bce42545ed8a87dc95694fe1e88de08056,2024-11-21T01:49:47.910000 +CVE-2013-1529,0,0,cd04df4b4fb3a2243d0156ac18212f9fb9f07958e5434dd57868078b224dfd96,2024-11-21T01:49:48.023000 +CVE-2013-1530,0,0,094d86abbc71b5152427f31dd77774104c1d2c4301973a355aeeabe937e37348,2024-11-21T01:49:48.137000 +CVE-2013-1531,0,0,f64fd42494f86096bf397dfc638c6a77e3234b5af90746e08e2f86ff774f42c0,2024-11-21T01:49:48.270000 +CVE-2013-1532,0,0,9a9d1ead5dc8eaf2dff460c69c97dd14640cb30662fa764121d22d9a115cfa22,2024-11-21T01:49:48.410000 +CVE-2013-1533,0,0,7cadea71199ad613cbe38c984b736069429431785fc695145507dbcbf71c5352,2024-11-21T01:49:48.590000 +CVE-2013-1534,0,0,7ce830aec1370815be4607e5c3cc2048f974cf6b98b93f7fd1e587e062373bdc,2024-11-21T01:49:48.697000 +CVE-2013-1535,0,0,c3a37c0f8a9a3618d5c3169fef65880b92aa4d38bbdccfbab2a930777535cf38,2024-11-21T01:49:48.810000 +CVE-2013-1536,0,0,c656db4cc3c8bf03b8f71a522d961b46872e02aedb1abb7345807c5ea12ad682,2024-11-21T01:49:48.923000 +CVE-2013-1537,0,0,e1f113381b3f7d48fbc317589ca6cfe75b966a5d4e01dd35a49b5990a8574e47,2024-11-21T01:49:49.047000 +CVE-2013-1538,0,0,5b814dfba8b56e4509ef765a518859b876ebe2f98367991c884acd160875ac77,2024-11-21T01:49:49.237000 +CVE-2013-1539,0,0,145b6c8961e47db60ac11eb47b70b628e94e3b5601e0b2ce390656de93117540,2024-11-21T01:49:49.350000 +CVE-2013-1540,0,0,88ee1ff658727bea84bbef7e01a1461597639f983b35afb30c06ac0d0319fab7,2024-11-21T01:49:49.467000 +CVE-2013-1541,0,0,97c25e07d650363fbe63f5a2ce125e408f84ce922439bdb9ef9cee4893b7a9c6,2024-11-21T01:49:49.617000 +CVE-2013-1542,0,0,ab322102dc7dc1a32d9fe2176716d0a804e80d0660a8b5ca204aa59d1c6d78c8,2024-11-21T01:49:49.737000 +CVE-2013-1543,0,0,e8f95933e656a8932a6b8941b4a496c6408c4475d7d1c9117e5840ab51315e96,2024-11-21T01:49:49.857000 +CVE-2013-1544,0,0,6d81511b851966eedb5f483c4052f82d6b46caddd78939084b0c07ab08d686c4,2024-11-21T01:49:49.973000 +CVE-2013-1545,0,0,89518b78a5d674463cb4cc1f6eb5f619f448800c237a3689bd790a864f2b5a09,2024-11-21T01:49:50.113000 +CVE-2013-1546,0,0,56b1a2d73b10afa6d18e821dec6c0e014bf41e4424f611a5914e91edad7e6ea6,2024-11-21T01:49:50.230000 +CVE-2013-1547,0,0,002f0d0b3b204513b863ec13c163b837a2b18581f47a6be890b0e08b239844ff,2024-11-21T01:49:50.353000 +CVE-2013-1548,0,0,3255fdbd54f3c23e7f4e4987edcf7f10f394e121bafe738403c1374b1d54d98f,2024-11-21T01:49:50.480000 +CVE-2013-1549,0,0,dcdc94cad13acae49019d0ea27f93689c18d64b7749618572650997aa3166c0d,2024-11-21T01:49:50.657000 +CVE-2013-1550,0,0,8c4519b408ca5ce139b5f575aa987db3fb7bf3ad6ccf1c6a2859d8a44cc3ac1a,2024-11-21T01:49:50.777000 +CVE-2013-1551,0,0,f7932c956599fc5aa80493d8caec2b45647f3583dadf9ae82f359977f7df988e,2024-11-21T01:49:50.893000 +CVE-2013-1552,0,0,b7b9a2d4353b579dd551e35fe3dd117a197ee75a075a14d5cd75ea13bf5a4447,2024-11-21T01:49:51.010000 +CVE-2013-1553,0,0,76df57acf50abe6421a89329f740a3317e754035a48e90f6f115969c0fe41dae,2024-11-21T01:49:51.157000 +CVE-2013-1554,0,0,867c84f3d9aa071b74e900551a3ed21e954ba62730a20009bb1fb2b3cb994866,2024-11-21T01:49:51.280000 +CVE-2013-1555,0,0,a0ef51c8f9fb6e6ff52c6dfde1654bad116045f0712ba9eace56fd40c7c158ad,2024-11-21T01:49:51.403000 +CVE-2013-1556,0,0,7efb04d34b4685d35c3b016473325908779fbcf2169e931c7da10e922d178c0b,2024-11-21T01:49:51.557000 +CVE-2013-1557,0,0,3386a4f15c7d5d67efb697bd5092e7ddc5c62e292744cec0dd76cebd88e1b68c,2024-11-21T01:49:51.697000 +CVE-2013-1558,0,0,b26e0b7f3cc78d9f468a2bd364391cf175103764ea7f8c7e6f04063e3cccfb1d,2024-11-21T01:49:51.880000 +CVE-2013-1559,0,0,dc75a3965c1fc07e07f23dc3f8f0501fbed5f22e32632ae59c0aa2a3360c8c7f,2024-11-21T01:49:52.043000 +CVE-2013-1560,0,0,2f08053e18c1e44d5f54fa06d313b753abfa6bd96a519cc2c4db4bd3d9e0e78c,2024-11-21T01:49:52.167000 +CVE-2013-1561,0,0,d9b570b9f50659226b56c48393c27c607a7e767cfe57cb9325ee50d4e19feda6,2024-11-21T01:49:52.293000 +CVE-2013-1562,0,0,e0084d9a7cd6d131f239c42ed5252af27fdb940a74b0700dd4d75645fb3966c4,2024-11-21T01:49:52.413000 +CVE-2013-1563,0,0,5e9eebe7da10c61cf4a8606e41a29f2134881ecc81c770c245d80cdd08fc3f33,2024-11-21T01:49:52.530000 +CVE-2013-1564,0,0,85afc01cf7eca1986fca2edd9899b86b790d0023e1de6c15f4e1afdc3e13d654,2024-11-21T01:49:52.677000 +CVE-2013-1565,0,0,63ed4c139478164f026916b77b3fc0b05381082d64685ef1fd0ca7525c1664dc,2024-11-21T01:49:52.790000 +CVE-2013-1566,0,0,2fe0f73d9c34871e8e8301b080778486c3acba6516cb162abfc3365a99e984b3,2024-11-21T01:49:52.907000 +CVE-2013-1567,0,0,fbc3ee65472406ce5b1425de5932869139a5c5c5e52e7617461600398f22d74b,2024-11-21T01:49:53.023000 +CVE-2013-1568,0,0,cd9391015c58705db9143255d8c39e492b1f55bf8dd7d041d35d37613cf7bd07,2024-11-21T01:49:53.147000 +CVE-2013-1569,0,0,03536b4020f71c2b845ff6f8260fa9bbfb2730f9f73d10a6a00b4e65f3df3340,2024-11-21T01:49:53.273000 +CVE-2013-1570,0,0,fe832243d83b8dbc4d11324d304a26a8fda0920b50e76c6459bfd63b67c49d12,2024-11-21T01:49:53.463000 +CVE-2013-1571,0,0,3e60527a1d6f8f3eb1f282f1d8eb9dd713959fae6c26edd46ef7ebc1a8e90c19,2024-11-21T01:49:53.590000 +CVE-2013-1572,0,0,1c454946af8a25e95fe9bdc4c5304acb29e6d05dc6e2c2b0b2c8d10a256d0b9b,2024-11-21T01:49:53.793000 +CVE-2013-1573,0,0,f77d3d27cbc9f8ae90b55430c50c1a305a0a862efc1119512cd967decea6b418,2024-11-21T01:49:53.950000 +CVE-2013-1574,0,0,687723a0b116b9d931e977a6799356aefe027b0d33a98f48592cbc014ea15b6e,2024-11-21T01:49:54.100000 +CVE-2013-1575,0,0,d6ae350bd09202ec18f7067e6c74e27f31aee6e753904ddf3dfaa39bb494fcb1,2024-11-21T01:49:54.250000 +CVE-2013-1576,0,0,61066f325b2acd964c93b02677586dd5f73d060d610259a36e4d8cd859a1f3d9,2024-11-21T01:49:54.400000 +CVE-2013-1577,0,0,a016b12a707a8ef87ebcc3d6f42194d6f6c59569952fc050687a8aa0013e4f4e,2024-11-21T01:49:54.547000 +CVE-2013-1578,0,0,878824f1eaa9844bc912ea21884fc55cd6e3e738d31d5627fc9ecc5ae9943175,2024-11-21T01:49:54.690000 +CVE-2013-1579,0,0,6906a6e5f444d3d44f56b60dc6a90012e3cab7eb463bc3011b4d4bd308277dd3,2024-11-21T01:49:54.837000 +CVE-2013-1580,0,0,2cb8af2084101da99257664f8cf6d8d9162162d1bddeb3af9ad8a5fbdaa8e424,2024-11-21T01:49:54.977000 +CVE-2013-1581,0,0,a2c638265dec0382d4f84da0e1c2d53b524f853386b6e0688c01cbf5113778dc,2024-11-21T01:49:55.120000 +CVE-2013-1582,0,0,10b9c82b49d2bfcce1a5cb94d57ddce38c5cd1ccfbae9483eb7f01d4965b1b75,2024-11-21T01:49:55.270000 +CVE-2013-1583,0,0,74a8617ee4fde4e67666605103cd7f5a82aff9ddeafe80b83a07ef86f04f942c,2024-11-21T01:49:55.423000 +CVE-2013-1584,0,0,55f62c733bbe7c513ea1d23b3640669b218eefef3df3d60879503ff86dd76aa8,2024-11-21T01:49:55.583000 +CVE-2013-1585,0,0,7be5ebadf085cc106a7aa31e3bc0ccc4769326292a7a4bd651ff3f02f8d03bfe,2024-11-21T01:49:55.760000 +CVE-2013-1586,0,0,7eff5bc1d80af6954e48a82ad73a056cdf2459c39a265dd36fb717afa75f408e,2024-11-21T01:49:55.927000 +CVE-2013-1587,0,0,c30c6ce01e7f8ccedf75b2e6646116548a54f1701853a49fb181b9b34caa99a5,2024-11-21T01:49:56.077000 +CVE-2013-1588,0,0,a0eae68080ea45f9c3e33315d01edee8073950c817f0c3e99843f6fbeb1271c6,2024-11-21T01:49:56.233000 +CVE-2013-1589,0,0,7bcf39c91f786d50a9bdc65b5c514faa508b5edbed242650ae0da9100624f6c9,2024-11-21T01:49:56.390000 +CVE-2013-1590,0,0,7049dd1d13a71b217626768f5131f6375c0016c2969a4dfde3495b01d4a8076c,2024-11-21T01:49:56.550000 +CVE-2013-1591,0,0,49b81f3a92b1a42ba44d024fc947348507992d7adb678aa54a8dcca56397a130,2024-11-21T01:49:56.713000 CVE-2013-1592,0,0,637583daeb9c56163096099fcb2093bf4c6adcd11d82ed07905e7681c98eb9fb,2020-01-31T17:08:36.590000 CVE-2013-1593,0,0,42536424b4b7a9e6a0898ef30a067110a1c9e402f2ddca9dc46d1af4e1a5a657,2020-01-31T16:42:13.070000 CVE-2013-1594,0,0,f0bc2c4fb774b67da3cec1ffec0139b4fa57252aba9d1723b2074878dcf7aa96,2020-01-28T20:28:56.707000 @@ -59232,902 +59232,902 @@ CVE-2013-1600,0,0,9067a2524bc54a1f2df82db6fc37137204675176c38780270393a52e9b0228 CVE-2013-1601,0,0,c25de491551da89659ea8b104deba1efde86dfa5aea2a2115ad8ed0ce007526a,2021-04-26T16:36:06.993000 CVE-2013-1602,0,0,24a7af97707b8308436d19a9f483d8e326cace214e58792c3ba3ebce4c77c93b,2021-04-26T16:36:03.947000 CVE-2013-1603,0,0,754a483928c44688a1bb40f02c2c7bd16583d556422957ea9de6306d048a38c0,2021-04-26T16:35:52.177000 -CVE-2013-1604,0,1,c1d9d59a50134f3b009018de5e35e58cfc52992945c0bc728bf9d1386b09a708,2024-11-21T01:49:58.830000 -CVE-2013-1605,0,1,bd43e6be852f724ed5fad77b7d54d5d5e54ebdf4e03db73b31fbf49907a1bc97,2024-11-21T01:49:58.983000 -CVE-2013-1606,0,1,5dce77589df6db59539caf05688e698a246dea1ea79afae808745d2cdba8d2d2,2024-11-21T01:49:59.150000 +CVE-2013-1604,0,0,c1d9d59a50134f3b009018de5e35e58cfc52992945c0bc728bf9d1386b09a708,2024-11-21T01:49:58.830000 +CVE-2013-1605,0,0,bd43e6be852f724ed5fad77b7d54d5d5e54ebdf4e03db73b31fbf49907a1bc97,2024-11-21T01:49:58.983000 +CVE-2013-1606,0,0,5dce77589df6db59539caf05688e698a246dea1ea79afae808745d2cdba8d2d2,2024-11-21T01:49:59.150000 CVE-2013-1607,0,0,68faaeae1e25eba7a7434b2971672fa5d8d3732ce6e0dbd7f23d9642da51407b,2020-02-14T18:17:55.537000 -CVE-2013-1608,0,1,077aa480b78afc1e500f391896a096ced2dcd92a71d212a52f1d6332f0279ca5,2024-11-21T01:49:59.457000 -CVE-2013-1609,0,1,781884def31a0a5a858877867ab9f89c81df379a22c7543e98086c0ab8a8431a,2024-11-21T01:49:59.590000 -CVE-2013-1610,0,1,bbdea2c36f2c69117a6bee9d18091f0ad02f86f43d69bb51e5c8155dce1544ba,2024-11-21T01:49:59.700000 -CVE-2013-1611,0,1,8c142db4ec8eafccafab8f9fa3c98ba205272c8aeb23cc3346ac43f8dace2864,2024-11-21T01:49:59.807000 -CVE-2013-1612,0,1,f03718501dda4def65d3dad182218217f6ebfaac57f275a566b2eefd3e39eba6,2024-11-21T01:49:59.917000 -CVE-2013-1613,0,1,20468f1c62a60a63251dbd72e4d949e160bc4c2335f81d406eaff3cf6532b8ae,2024-11-21T01:50:00.030000 -CVE-2013-1614,0,1,7520e27372a25b930cb22700b8ece122e457f99d102ec44575029f2762c42afd,2024-11-21T01:50:00.150000 -CVE-2013-1615,0,1,33323203c6aa692e2b256aa7506701ff4aa639f80e6572b6c4185a26fd817c26,2024-11-21T01:50:00.263000 -CVE-2013-1616,0,1,c40066bb2dfb19d6d252438b6810fe5da56ced21cf57c674c9cdd67cf750d550,2024-11-21T01:50:00.377000 -CVE-2013-1617,0,1,94fd31f00d49a8fe487cd4857d3c90de70cea2685d2cffba3041837b41dae5ab,2024-11-21T01:50:00.497000 -CVE-2013-1618,0,1,ab9f2d04754de41b286a232d0f0ae535011c885647291597affcf96ffe2d43cd,2024-11-21T01:50:00.613000 -CVE-2013-1619,0,1,679144784a4b61e883b345c504ba8f59d81ba0692aa5c806f6b3d4e633255de2,2024-11-21T01:50:00.760000 -CVE-2013-1620,0,1,e17c6283278cb54edbd85504527ed274a2f77a152794ad1a6b879b04df780445,2024-11-21T01:50:00.960000 -CVE-2013-1621,0,1,18e8c6d891134027ad62c6d22c96c089c13682aa84b0327538079d58521e00cd,2024-11-21T01:50:01.180000 +CVE-2013-1608,0,0,077aa480b78afc1e500f391896a096ced2dcd92a71d212a52f1d6332f0279ca5,2024-11-21T01:49:59.457000 +CVE-2013-1609,0,0,781884def31a0a5a858877867ab9f89c81df379a22c7543e98086c0ab8a8431a,2024-11-21T01:49:59.590000 +CVE-2013-1610,0,0,bbdea2c36f2c69117a6bee9d18091f0ad02f86f43d69bb51e5c8155dce1544ba,2024-11-21T01:49:59.700000 +CVE-2013-1611,0,0,8c142db4ec8eafccafab8f9fa3c98ba205272c8aeb23cc3346ac43f8dace2864,2024-11-21T01:49:59.807000 +CVE-2013-1612,0,0,f03718501dda4def65d3dad182218217f6ebfaac57f275a566b2eefd3e39eba6,2024-11-21T01:49:59.917000 +CVE-2013-1613,0,0,20468f1c62a60a63251dbd72e4d949e160bc4c2335f81d406eaff3cf6532b8ae,2024-11-21T01:50:00.030000 +CVE-2013-1614,0,0,7520e27372a25b930cb22700b8ece122e457f99d102ec44575029f2762c42afd,2024-11-21T01:50:00.150000 +CVE-2013-1615,0,0,33323203c6aa692e2b256aa7506701ff4aa639f80e6572b6c4185a26fd817c26,2024-11-21T01:50:00.263000 +CVE-2013-1616,0,0,c40066bb2dfb19d6d252438b6810fe5da56ced21cf57c674c9cdd67cf750d550,2024-11-21T01:50:00.377000 +CVE-2013-1617,0,0,94fd31f00d49a8fe487cd4857d3c90de70cea2685d2cffba3041837b41dae5ab,2024-11-21T01:50:00.497000 +CVE-2013-1618,0,0,ab9f2d04754de41b286a232d0f0ae535011c885647291597affcf96ffe2d43cd,2024-11-21T01:50:00.613000 +CVE-2013-1619,0,0,679144784a4b61e883b345c504ba8f59d81ba0692aa5c806f6b3d4e633255de2,2024-11-21T01:50:00.760000 +CVE-2013-1620,0,0,e17c6283278cb54edbd85504527ed274a2f77a152794ad1a6b879b04df780445,2024-11-21T01:50:00.960000 +CVE-2013-1621,0,0,18e8c6d891134027ad62c6d22c96c089c13682aa84b0327538079d58521e00cd,2024-11-21T01:50:01.180000 CVE-2013-1622,0,0,50b4e0b4bffd51bef764eb9e49a7c4fd0ce66f97a412472d235668a38f0e034c,2023-11-07T02:14:46.613000 -CVE-2013-1623,0,1,2943a89fa6f5e890b792ec031620136ce4ec25347e002571b85c80e3d3a160f4,2024-11-21T01:50:01.357000 -CVE-2013-1624,0,1,b5251e306938ab252c1757c9aa2e9f14c30845a5b81c9322c2ca45e2d6502328,2024-11-21T01:50:01.507000 -CVE-2013-1627,0,1,7c5d8e9eb54e4caaf6d89a9b4e7c89a3bbe45a88eda101577741e0479e7a40b4,2024-11-21T01:50:01.667000 +CVE-2013-1623,0,0,2943a89fa6f5e890b792ec031620136ce4ec25347e002571b85c80e3d3a160f4,2024-11-21T01:50:01.357000 +CVE-2013-1624,0,0,b5251e306938ab252c1757c9aa2e9f14c30845a5b81c9322c2ca45e2d6502328,2024-11-21T01:50:01.507000 +CVE-2013-1627,0,0,7c5d8e9eb54e4caaf6d89a9b4e7c89a3bbe45a88eda101577741e0479e7a40b4,2024-11-21T01:50:01.667000 CVE-2013-1628,0,0,397e9aaaabde256d071bf6316d7e00f67037f56390acef6151c1fa510708ed70,2023-11-07T02:14:46.677000 -CVE-2013-1629,0,1,5a400fa3a9887c8c2575ec2643e7457ecccd3231fcac4e2c32aeaf509e9e092b,2024-11-21T01:50:01.790000 -CVE-2013-1630,0,1,a5244b973002dcee35e3c88c0fb115d8c7bcdf0307490097ac1c9f3eaacd7917,2024-11-21T01:50:01.943000 +CVE-2013-1629,0,0,5a400fa3a9887c8c2575ec2643e7457ecccd3231fcac4e2c32aeaf509e9e092b,2024-11-21T01:50:01.790000 +CVE-2013-1630,0,0,a5244b973002dcee35e3c88c0fb115d8c7bcdf0307490097ac1c9f3eaacd7917,2024-11-21T01:50:01.943000 CVE-2013-1631,0,0,367f461e1a47e6ae2a7409c72a09163c60a81c3c3cf71485042583a6c9f5aaa9,2020-02-10T14:50:24.567000 -CVE-2013-1633,0,1,b3bb0aab0cc4e49d82afc23a1422d7933314086224403dc18176ad2edcd691e2,2024-11-21T01:50:02.253000 +CVE-2013-1633,0,0,b3bb0aab0cc4e49d82afc23a1422d7933314086224403dc18176ad2edcd691e2,2024-11-21T01:50:02.253000 CVE-2013-1634,0,0,e1dbef71238a64a445f4c1cc1a89debf77661fced05a76512e72d596423925b7,2020-02-27T15:24:50.397000 -CVE-2013-1635,0,1,484bf6b042e38ae499d119e927411ebe902ca3925768fcc6145311adb7403e60,2024-11-21T01:50:02.577000 -CVE-2013-1636,0,1,890f72dd8b818ae1cb1c711d52a183baea363244f0770c14897ebbe9e5fbfd57,2024-11-21T01:50:02.760000 -CVE-2013-1637,0,1,b0a814f264b16c39348b770a2c1b63cdb65036e99b2f6a6005eda5454b2db0ce,2024-11-21T01:50:02.940000 -CVE-2013-1638,0,1,8fe4799c69ddd1e0248fb2c48c136712c9240baa629257ff63fe93470bb9256e,2024-11-21T01:50:03.100000 -CVE-2013-1639,0,1,a4b67f0cea33d7f2986d2a22679b7c3dbb28ca04024a3e7fe990c686477290ca,2024-11-21T01:50:03.260000 -CVE-2013-1640,0,1,6d7d1e1492737c89584e752154f7abe9dbc9947891493fe08af0da46c8e6f1c5,2024-11-21T01:50:03.413000 +CVE-2013-1635,0,0,484bf6b042e38ae499d119e927411ebe902ca3925768fcc6145311adb7403e60,2024-11-21T01:50:02.577000 +CVE-2013-1636,0,0,890f72dd8b818ae1cb1c711d52a183baea363244f0770c14897ebbe9e5fbfd57,2024-11-21T01:50:02.760000 +CVE-2013-1637,0,0,b0a814f264b16c39348b770a2c1b63cdb65036e99b2f6a6005eda5454b2db0ce,2024-11-21T01:50:02.940000 +CVE-2013-1638,0,0,8fe4799c69ddd1e0248fb2c48c136712c9240baa629257ff63fe93470bb9256e,2024-11-21T01:50:03.100000 +CVE-2013-1639,0,0,a4b67f0cea33d7f2986d2a22679b7c3dbb28ca04024a3e7fe990c686477290ca,2024-11-21T01:50:03.260000 +CVE-2013-1640,0,0,6d7d1e1492737c89584e752154f7abe9dbc9947891493fe08af0da46c8e6f1c5,2024-11-21T01:50:03.413000 CVE-2013-1641,0,0,173939974049c0e936d3e638b7210ebc9fb4a8aed0c67e3fc449b0f3090b2c81,2017-08-29T01:33:10.200000 CVE-2013-1642,0,0,0136a00f7a14ded5f0ff7c7040d3664cc94b2acf2330e9999884f27ea853612c,2021-01-11T15:50:44.747000 -CVE-2013-1643,0,1,0c1d79890e8f2587f4fb0fe1e60dcb5543697f6800b5a54cd9f391da2d461b8d,2024-11-21T01:50:03.893000 -CVE-2013-1645,0,1,e36ea3584de875181ac7e9d1ea925502a6931035d14ba82c442e3c6e6d04f687,2024-11-21T01:50:04.063000 -CVE-2013-1646,0,1,3dfb2a00e639a29e14f8d9cf250fa67ff63db6599e40f7f693a2971622d7d1e4,2024-11-21T01:50:04.210000 -CVE-2013-1647,0,1,18c058753a71ed3e1d93858bbe8702b4586a89d84e65e3c23e46f491584ae38c,2024-11-21T01:50:04.343000 -CVE-2013-1648,0,1,cdc5230980f3db01a318a2e9e25001989b7e71f466b93c333d8bd5e3ab1e0625,2024-11-21T01:50:04.487000 -CVE-2013-1649,0,1,6bd9c9d07d59386087435a6088e0189b204f7f8ae616e2c130889d93bc34e4c9,2024-11-21T01:50:04.627000 -CVE-2013-1650,0,1,a48e1f3c1dba6524d4c25381f8255d0ee6f85991fad084221caec8035fe1f03f,2024-11-21T01:50:04.747000 -CVE-2013-1651,0,1,ed4b87fcd6957a8ef3e221bc86008277c431ca1759c9651393cf5b782a8c1265,2024-11-21T01:50:04.890000 -CVE-2013-1652,0,1,5fc29f21a75683bed28928b08285d5dea45da967d372d5900e2c56f5b086fa48,2024-11-21T01:50:05.040000 -CVE-2013-1653,0,1,8936fbe675b3aa5d78ac1bd29a26fb81187eb1a0ef33f5e467f9ef726539193c,2024-11-21T01:50:05.207000 -CVE-2013-1654,0,1,343a086b4d3d504ee8dec20a4f25df895dd8930909a03aa4f5205c0f18087f64,2024-11-21T01:50:05.377000 -CVE-2013-1655,0,1,a9cf908f7073933a7c3e092f37aede1d77b5ced69e02700434f39967071132fc,2024-11-21T01:50:05.543000 -CVE-2013-1656,0,1,8830c101c288080318f2cba93c5334353bd2508d3f731db8827d23a0359701c9,2024-11-21T01:50:05.703000 -CVE-2013-1659,0,1,98eada99c748d39123f184c94e3cbdaac035ca5a68a6411e64f9a7738a23adf4,2024-11-21T01:50:05.873000 +CVE-2013-1643,0,0,0c1d79890e8f2587f4fb0fe1e60dcb5543697f6800b5a54cd9f391da2d461b8d,2024-11-21T01:50:03.893000 +CVE-2013-1645,0,0,e36ea3584de875181ac7e9d1ea925502a6931035d14ba82c442e3c6e6d04f687,2024-11-21T01:50:04.063000 +CVE-2013-1646,0,0,3dfb2a00e639a29e14f8d9cf250fa67ff63db6599e40f7f693a2971622d7d1e4,2024-11-21T01:50:04.210000 +CVE-2013-1647,0,0,18c058753a71ed3e1d93858bbe8702b4586a89d84e65e3c23e46f491584ae38c,2024-11-21T01:50:04.343000 +CVE-2013-1648,0,0,cdc5230980f3db01a318a2e9e25001989b7e71f466b93c333d8bd5e3ab1e0625,2024-11-21T01:50:04.487000 +CVE-2013-1649,0,0,6bd9c9d07d59386087435a6088e0189b204f7f8ae616e2c130889d93bc34e4c9,2024-11-21T01:50:04.627000 +CVE-2013-1650,0,0,a48e1f3c1dba6524d4c25381f8255d0ee6f85991fad084221caec8035fe1f03f,2024-11-21T01:50:04.747000 +CVE-2013-1651,0,0,ed4b87fcd6957a8ef3e221bc86008277c431ca1759c9651393cf5b782a8c1265,2024-11-21T01:50:04.890000 +CVE-2013-1652,0,0,5fc29f21a75683bed28928b08285d5dea45da967d372d5900e2c56f5b086fa48,2024-11-21T01:50:05.040000 +CVE-2013-1653,0,0,8936fbe675b3aa5d78ac1bd29a26fb81187eb1a0ef33f5e467f9ef726539193c,2024-11-21T01:50:05.207000 +CVE-2013-1654,0,0,343a086b4d3d504ee8dec20a4f25df895dd8930909a03aa4f5205c0f18087f64,2024-11-21T01:50:05.377000 +CVE-2013-1655,0,0,a9cf908f7073933a7c3e092f37aede1d77b5ced69e02700434f39967071132fc,2024-11-21T01:50:05.543000 +CVE-2013-1656,0,0,8830c101c288080318f2cba93c5334353bd2508d3f731db8827d23a0359701c9,2024-11-21T01:50:05.703000 +CVE-2013-1659,0,0,98eada99c748d39123f184c94e3cbdaac035ca5a68a6411e64f9a7738a23adf4,2024-11-21T01:50:05.873000 CVE-2013-1660,0,0,5613272827e20f3d707d409ea53682d71e83687ede99f77cddb09f0ae3326ed6,2023-11-07T02:14:47.273000 -CVE-2013-1661,0,1,78e0c75745f6896aa6c3b31048a6d25bf7ae53afb1351d7a56701698b381d30e,2024-11-21T01:50:06.063000 -CVE-2013-1662,0,1,5068f2aa280e23d560ec2b7f1408db83c446836c091bbf99ec611ec553f007bc,2024-11-21T01:50:06.213000 -CVE-2013-1664,0,1,09ce1c40589caf08d3ab3814c4cdca515c92f58bfa5c49b00bd5f7e1ff896540,2024-11-21T01:50:06.370000 -CVE-2013-1665,0,1,c4e05b41054e4f80af25c5157b8e020292122a6b2fd4a11b62793be0a85b9fc1,2024-11-21T01:50:06.530000 +CVE-2013-1661,0,0,78e0c75745f6896aa6c3b31048a6d25bf7ae53afb1351d7a56701698b381d30e,2024-11-21T01:50:06.063000 +CVE-2013-1662,0,0,5068f2aa280e23d560ec2b7f1408db83c446836c091bbf99ec611ec553f007bc,2024-11-21T01:50:06.213000 +CVE-2013-1664,0,0,09ce1c40589caf08d3ab3814c4cdca515c92f58bfa5c49b00bd5f7e1ff896540,2024-11-21T01:50:06.370000 +CVE-2013-1665,0,0,c4e05b41054e4f80af25c5157b8e020292122a6b2fd4a11b62793be0a85b9fc1,2024-11-21T01:50:06.530000 CVE-2013-1666,0,0,744effe5d06f6ae6dd3a2fe677e7d2f585618661c142f74e75ab3beb69445adf,2019-11-08T13:29:40.287000 -CVE-2013-1667,0,1,f74cdc2d419290bbaacbb2353128dc3cd60f08a5fb15d61502d4b395823e2b86,2024-11-21T01:50:06.830000 -CVE-2013-1668,0,1,12a779f7bc94519e29ac30ba6d0a63c75be40355c23039283f661406ecd7a5fd,2024-11-21T01:50:07.003000 -CVE-2013-1669,0,1,04cb5a9646ba882eebf87b6bb632ecae8661d7d149a264d91c928c5fa0f751a9,2024-11-21T01:50:07.150000 -CVE-2013-1670,0,1,bd57939e837c9068a7886e0f1650ba5a0a66d0a4a31bd2fdeedb537df2267ba5,2024-11-21T01:50:07.300000 -CVE-2013-1671,0,1,75683f09f65c27b7cb86e1b5e3e4d2523c19feafe94c599fca07d44a4a32b4cf,2024-11-21T01:50:07.437000 -CVE-2013-1672,0,1,d2e87c08eb2fa1430d653d4afafae76cf7a0a5666e38bf1cd8910758aa6499de,2024-11-21T01:50:07.543000 -CVE-2013-1673,0,1,dc7d54db632f5c403c99b4f5493666c2923164e21491532f976141e0beb48c6a,2024-11-21T01:50:07.687000 -CVE-2013-1674,0,1,5c2d1d7597f65f1910c261962d5e6f5775f7470682ae8763e95252ce921b1773,2024-11-21T01:50:07.850000 -CVE-2013-1675,0,1,f3eb30f973b821d3d699855a23dad3c224d29486480f2c9aef5b8f49c7331f6b,2024-11-21T01:50:07.997000 -CVE-2013-1676,0,1,9d5b878ee0f16e6eb0da49171dc7c53f4e9ee7b7860b789adc69ac7af2502266,2024-11-21T01:50:08.157000 -CVE-2013-1677,0,1,d818ee4f70bc60d2c279adf4cf05fc2ad09862432bb87c03424cac5e1255675c,2024-11-21T01:50:08.290000 -CVE-2013-1678,0,1,e13aa7b2d98f6ad82676812813d5f20191569eef60f6ef81a2f3be66a3104112,2024-11-21T01:50:08.437000 -CVE-2013-1679,0,1,92c77b92a9e1fc14b4d56c6d3da759c799d599f15f818945583fc74042bf4e57,2024-11-21T01:50:08.567000 -CVE-2013-1680,0,1,bb6f6767bb5b5098dbf67f8722e2381981f7a7508b7891cf969b856e448e0139,2024-11-21T01:50:08.700000 -CVE-2013-1681,0,1,884a0a4f026fac60aa02beaa33aee3a42801f67eeb5aa33e6d895bbcbe3f4589,2024-11-21T01:50:08.833000 -CVE-2013-1682,0,1,74165b7dd0996653b8af9765c0b7e60913d84f179c8b71a25a3cdf2cd417fb23,2024-11-21T01:50:08.970000 -CVE-2013-1683,0,1,4836d01a34ead9d58c8e15331b3306e50646636e96a466045d54b5c331748f7b,2024-11-21T01:50:09.127000 -CVE-2013-1684,0,1,8eb2372cc971b71853554bb6499f82426f1763b0977221b7acf3fa84c5d3799d,2024-11-21T01:50:09.260000 -CVE-2013-1685,0,1,5bf28951e25f01abcb11281f4a894e0dbad6c1f9180e9ecb813442cfa6dfb4c1,2024-11-21T01:50:09.397000 -CVE-2013-1686,0,1,f6c4d7af88a465c156ef73d4becdbd494e8f11757aea2920f6b9dd1469d01017,2024-11-21T01:50:09.543000 -CVE-2013-1687,0,1,59baa4b71578e3b1d99f67dd83bb9f6123d59e85d86db695a29b62113c96173a,2024-11-21T01:50:09.670000 -CVE-2013-1688,0,1,cee298f939132dd86a4701f80f97e99abd2a996f33c1376bc1a4e29c8d746a2b,2024-11-21T01:50:09.793000 +CVE-2013-1667,0,0,f74cdc2d419290bbaacbb2353128dc3cd60f08a5fb15d61502d4b395823e2b86,2024-11-21T01:50:06.830000 +CVE-2013-1668,0,0,12a779f7bc94519e29ac30ba6d0a63c75be40355c23039283f661406ecd7a5fd,2024-11-21T01:50:07.003000 +CVE-2013-1669,0,0,04cb5a9646ba882eebf87b6bb632ecae8661d7d149a264d91c928c5fa0f751a9,2024-11-21T01:50:07.150000 +CVE-2013-1670,0,0,bd57939e837c9068a7886e0f1650ba5a0a66d0a4a31bd2fdeedb537df2267ba5,2024-11-21T01:50:07.300000 +CVE-2013-1671,0,0,75683f09f65c27b7cb86e1b5e3e4d2523c19feafe94c599fca07d44a4a32b4cf,2024-11-21T01:50:07.437000 +CVE-2013-1672,0,0,d2e87c08eb2fa1430d653d4afafae76cf7a0a5666e38bf1cd8910758aa6499de,2024-11-21T01:50:07.543000 +CVE-2013-1673,0,0,dc7d54db632f5c403c99b4f5493666c2923164e21491532f976141e0beb48c6a,2024-11-21T01:50:07.687000 +CVE-2013-1674,0,0,5c2d1d7597f65f1910c261962d5e6f5775f7470682ae8763e95252ce921b1773,2024-11-21T01:50:07.850000 +CVE-2013-1675,0,0,f3eb30f973b821d3d699855a23dad3c224d29486480f2c9aef5b8f49c7331f6b,2024-11-21T01:50:07.997000 +CVE-2013-1676,0,0,9d5b878ee0f16e6eb0da49171dc7c53f4e9ee7b7860b789adc69ac7af2502266,2024-11-21T01:50:08.157000 +CVE-2013-1677,0,0,d818ee4f70bc60d2c279adf4cf05fc2ad09862432bb87c03424cac5e1255675c,2024-11-21T01:50:08.290000 +CVE-2013-1678,0,0,e13aa7b2d98f6ad82676812813d5f20191569eef60f6ef81a2f3be66a3104112,2024-11-21T01:50:08.437000 +CVE-2013-1679,0,0,92c77b92a9e1fc14b4d56c6d3da759c799d599f15f818945583fc74042bf4e57,2024-11-21T01:50:08.567000 +CVE-2013-1680,0,0,bb6f6767bb5b5098dbf67f8722e2381981f7a7508b7891cf969b856e448e0139,2024-11-21T01:50:08.700000 +CVE-2013-1681,0,0,884a0a4f026fac60aa02beaa33aee3a42801f67eeb5aa33e6d895bbcbe3f4589,2024-11-21T01:50:08.833000 +CVE-2013-1682,0,0,74165b7dd0996653b8af9765c0b7e60913d84f179c8b71a25a3cdf2cd417fb23,2024-11-21T01:50:08.970000 +CVE-2013-1683,0,0,4836d01a34ead9d58c8e15331b3306e50646636e96a466045d54b5c331748f7b,2024-11-21T01:50:09.127000 +CVE-2013-1684,0,0,8eb2372cc971b71853554bb6499f82426f1763b0977221b7acf3fa84c5d3799d,2024-11-21T01:50:09.260000 +CVE-2013-1685,0,0,5bf28951e25f01abcb11281f4a894e0dbad6c1f9180e9ecb813442cfa6dfb4c1,2024-11-21T01:50:09.397000 +CVE-2013-1686,0,0,f6c4d7af88a465c156ef73d4becdbd494e8f11757aea2920f6b9dd1469d01017,2024-11-21T01:50:09.543000 +CVE-2013-1687,0,0,59baa4b71578e3b1d99f67dd83bb9f6123d59e85d86db695a29b62113c96173a,2024-11-21T01:50:09.670000 +CVE-2013-1688,0,0,cee298f939132dd86a4701f80f97e99abd2a996f33c1376bc1a4e29c8d746a2b,2024-11-21T01:50:09.793000 CVE-2013-1689,0,0,0633b1bef6eaf000afcf35eee4900ec0dc527827a1f8b8cc1ebc9ab5b33d7bf9,2019-12-13T00:22:51.177000 -CVE-2013-1690,0,1,4fb45c6d9dd26b51bdd8d474e9923f4c45e56888541a95a95263f34d51c392d9,2024-11-21T01:50:10.013000 -CVE-2013-1692,0,1,e142681995775955f547f2e96c5c29d56f1054c7da709b7949471986538658b9,2024-11-21T01:50:10.170000 -CVE-2013-1693,0,1,18afdf5dff92b35a5eefaabf0d9a9475af479b68de0cb85031f4eb1a69781ff9,2024-11-21T01:50:10.297000 -CVE-2013-1694,0,1,13a70b022e92f596738341645364cc96304f27d6878318ce71a6b8d4ee34119f,2024-11-21T01:50:10.433000 -CVE-2013-1695,0,1,c8604efca7b2a63f2a481f9863691779baf34588fa31462471704f853bbf26b0,2024-11-21T01:50:10.570000 -CVE-2013-1696,0,1,f370b542f21688392db6721d0e62953286abc3a4df199cf74b9244cefb24a72b,2024-11-21T01:50:10.687000 -CVE-2013-1697,0,1,542f5381ac898816996344441ccf753eb1c8ebb8d7ad99178a18db1a7432fe2c,2024-11-21T01:50:10.810000 -CVE-2013-1698,0,1,1c3894c7c7cd9acd17f49a4db5df0d7b6e951517494026f2550d58d77677e58b,2024-11-21T01:50:10.953000 -CVE-2013-1699,0,1,ae5afd8a69675eadaa23f89ea899347b2aeb42131499286ad3ae28adab2a36f6,2024-11-21T01:50:11.087000 -CVE-2013-1700,0,1,c8539ec20bc342f1880d94aef5204e0d387d416d04fa5d3007ad600edaa44e8c,2024-11-21T01:50:11.220000 -CVE-2013-1701,0,1,f1ad4555268698d89ed46e50ae896a54eec74c99bf871e65a494427a084fcb33,2024-11-21T01:50:11.330000 -CVE-2013-1702,0,1,79638620408690f8bfbefe0efaf26296de0b9dfa89262feb85c59975c6a73949,2024-11-21T01:50:11.470000 +CVE-2013-1690,0,0,4fb45c6d9dd26b51bdd8d474e9923f4c45e56888541a95a95263f34d51c392d9,2024-11-21T01:50:10.013000 +CVE-2013-1692,0,0,e142681995775955f547f2e96c5c29d56f1054c7da709b7949471986538658b9,2024-11-21T01:50:10.170000 +CVE-2013-1693,0,0,18afdf5dff92b35a5eefaabf0d9a9475af479b68de0cb85031f4eb1a69781ff9,2024-11-21T01:50:10.297000 +CVE-2013-1694,0,0,13a70b022e92f596738341645364cc96304f27d6878318ce71a6b8d4ee34119f,2024-11-21T01:50:10.433000 +CVE-2013-1695,0,0,c8604efca7b2a63f2a481f9863691779baf34588fa31462471704f853bbf26b0,2024-11-21T01:50:10.570000 +CVE-2013-1696,0,0,f370b542f21688392db6721d0e62953286abc3a4df199cf74b9244cefb24a72b,2024-11-21T01:50:10.687000 +CVE-2013-1697,0,0,542f5381ac898816996344441ccf753eb1c8ebb8d7ad99178a18db1a7432fe2c,2024-11-21T01:50:10.810000 +CVE-2013-1698,0,0,1c3894c7c7cd9acd17f49a4db5df0d7b6e951517494026f2550d58d77677e58b,2024-11-21T01:50:10.953000 +CVE-2013-1699,0,0,ae5afd8a69675eadaa23f89ea899347b2aeb42131499286ad3ae28adab2a36f6,2024-11-21T01:50:11.087000 +CVE-2013-1700,0,0,c8539ec20bc342f1880d94aef5204e0d387d416d04fa5d3007ad600edaa44e8c,2024-11-21T01:50:11.220000 +CVE-2013-1701,0,0,f1ad4555268698d89ed46e50ae896a54eec74c99bf871e65a494427a084fcb33,2024-11-21T01:50:11.330000 +CVE-2013-1702,0,0,79638620408690f8bfbefe0efaf26296de0b9dfa89262feb85c59975c6a73949,2024-11-21T01:50:11.470000 CVE-2013-1703,0,0,2f3ea65f0897117e78e2befc54a6f68019a91afb96bc021ee327d756c0942e4a,2023-11-07T02:14:47.930000 -CVE-2013-1704,0,1,75c7ab00651c066d34a1e2ca50612e0f22559b3aa7b8acf517409ae728ec400e,2024-11-21T01:50:11.627000 -CVE-2013-1705,0,1,2b196ce979bcd14c71f8a03cbdf145b252581fc2e98f7a2b40e6e10483086e72,2024-11-21T01:50:11.753000 -CVE-2013-1706,0,1,9e550a89336f05672bd38fb697aada4578dca6edcdb38d0d59b4be49b75cad21,2024-11-21T01:50:11.890000 -CVE-2013-1707,0,1,5adecee4a04f73dcc2e466f4544316fc4b5d5c11229c7305182545f977ada729,2024-11-21T01:50:12 -CVE-2013-1708,0,1,c38473ea7adba45bda747280824c6560bacb5e52d11804218d28a722e1927ba9,2024-11-21T01:50:12.120000 -CVE-2013-1709,0,1,b4c3fe01c3cd3bc6180865b09eb0112e6d6a444133b9003cbd35c701472cfeb5,2024-11-21T01:50:12.243000 -CVE-2013-1710,0,1,c5aac53744ccec52b0e7d48c8682c506ec467809e462a6bf72879edc0861bd50,2024-11-21T01:50:12.397000 -CVE-2013-1711,0,1,1ce142b836f2c12be399f840cc4c16f17448088373328c0a0c72ae67b24c3431,2024-11-21T01:50:12.533000 -CVE-2013-1712,0,1,f953c85fd76a18dd1320c749cd6a7a1e0fd6de543cc845477f5f68fe0fcef01b,2024-11-21T01:50:12.663000 -CVE-2013-1713,0,1,0aa9bf458adbe902753847b9333b225e49a26549c47a251c911cf5272ca303b2,2024-11-21T01:50:12.790000 -CVE-2013-1714,0,1,8564d49a3152b008c844d4968cca7a80d9a55a00d0292d3b8962a485a397f260,2024-11-21T01:50:12.923000 -CVE-2013-1715,0,1,da1f4eb7cb031453e21a7399dfd549da84bd31324cf6ce5a14c332893adc4fe6,2024-11-21T01:50:13.063000 -CVE-2013-1717,0,1,ebc38aa9e4a3a441c0eb61965031b6b32d40691a7ce70bef0f6a34f8c9c3ad79,2024-11-21T01:50:13.173000 -CVE-2013-1718,0,1,2e5af1193e1d7ef374c3d641e1fc251b03d875a071d3756ca0d27d2c5e924c7e,2024-11-21T01:50:13.323000 -CVE-2013-1719,0,1,3c11bcb0ccaaf0431688afd71d8d59431bc0d0c23e4a97331560bc1657963d45,2024-11-21T01:50:13.473000 -CVE-2013-1720,0,1,2251eb24e3ede59f6ddce0190a64c2185cce4792148fe92136b3900b81390d72,2024-11-21T01:50:13.633000 -CVE-2013-1721,0,1,91845fc492202dbb765d16bd8df6c5b6eecb8fb6925005415e9f260fe6530490,2024-11-21T01:50:13.767000 -CVE-2013-1722,0,1,4def3302589097647c56c40ac967d1c4052bcd6fe9fd298fa33e54abcfec57e6,2024-11-21T01:50:13.903000 -CVE-2013-1723,0,1,dc250639e5dfa97bb2a984f2d2f69dcc404c157a6898d96c874c5389f6a455c4,2024-11-21T01:50:14.047000 -CVE-2013-1724,0,1,ac0a82e827783bb7da1ef826b128cb461d36426db79b762631dde2bc7b49c004,2024-11-21T01:50:14.187000 -CVE-2013-1725,0,1,0089c7aa2871512dbe5eace411c78de05a0658aaa77a756439f5f3e856a3c927,2024-11-21T01:50:14.337000 -CVE-2013-1726,0,1,1227052a5d34b32de1b68919d1961f1e75982b9e28a10d4796f0b05e0f9dfad9,2024-11-21T01:50:15.970000 -CVE-2013-1727,0,1,c55ddf7de7d0eebde5ce527d7cb8b8ec413cba2558d62cba4dcda89ddb52f7e5,2024-11-21T01:50:16.097000 -CVE-2013-1728,0,1,0a4df783bfe8917cdd3fc00032a067141dfc0f501664689a12bfc4eb8c743a6d,2024-11-21T01:50:16.217000 -CVE-2013-1729,0,1,e328789c561df0572b5a3ef7e0681f70674a3a7863c1335aca1aa134963c608f,2024-11-21T01:50:16.380000 -CVE-2013-1730,0,1,3d5ba1c81bc5dcf512dc86b00db7ab47db23d26417037ea81fdb8c1cc7eb65ea,2024-11-21T01:50:16.493000 -CVE-2013-1731,0,1,83603765c3f601f3bca97ccc839cae241eee7632f158a78aca97befcb2b0ea14,2024-11-21T01:50:16.633000 -CVE-2013-1732,0,1,5a5a828f7fc86df5c8730aedd2c5b2632df0b3a036f226f59e2bf5e77ec6f568,2024-11-21T01:50:16.750000 -CVE-2013-1733,0,1,01a81a4ab1a9347e34f3c4868c177a4bac55dc9df4021868f1ad2dc544b6f803,2024-11-21T01:50:16.903000 -CVE-2013-1734,0,1,c68605772ce7ae3ff626af2d4201b48a0572d8996bcdddfe1d4dd27a2521c561,2024-11-21T01:50:17.010000 -CVE-2013-1735,0,1,81f0353d8243bb047b44edae6949b5006714fe06f3541ba4cbfc57a230cfef14,2024-11-21T01:50:17.150000 -CVE-2013-1736,0,1,e69088d7efd1b8b3435da9deee61011a7e2011e66114a198870cfa2c3d233a06,2024-11-21T01:50:17.297000 -CVE-2013-1737,0,1,d9e76d40902488e19583ec1327c0f312a53f77327441f11d6f57b0bea525e3d7,2024-11-21T01:50:17.443000 -CVE-2013-1738,0,1,81ebde88a8b7a166432c89ad5b498ce47445d30878d46aed77f9300dd1fdb03b,2024-11-21T01:50:17.600000 -CVE-2013-1739,0,1,b9108bd58136f37b91cac6cc475b3e40b60c07951fea67fe26133a2c7141bdff,2024-11-21T01:50:17.740000 -CVE-2013-1740,0,1,60391653bc0b2748cdc922f9eb91bc22c4557555faf1b5f6c1e37487871f584b,2024-11-21T01:50:17.903000 -CVE-2013-1741,0,1,37f111fc80cba87c5647beba93d6de82ff9ae1d2eabdbbec39a7fcbbdcc34e66,2024-11-21T01:50:18.080000 -CVE-2013-1742,0,1,f76beda0eb56d72a0e7bb1c1ea50b1bf3d788f6eb0529e868f8363c84617450d,2024-11-21T01:50:18.237000 -CVE-2013-1743,0,1,862304f558781e0a41b9d0952aec3aa19184bc7dae99535a754736c21b6c1d76,2024-11-21T01:50:18.373000 +CVE-2013-1704,0,0,75c7ab00651c066d34a1e2ca50612e0f22559b3aa7b8acf517409ae728ec400e,2024-11-21T01:50:11.627000 +CVE-2013-1705,0,0,2b196ce979bcd14c71f8a03cbdf145b252581fc2e98f7a2b40e6e10483086e72,2024-11-21T01:50:11.753000 +CVE-2013-1706,0,0,9e550a89336f05672bd38fb697aada4578dca6edcdb38d0d59b4be49b75cad21,2024-11-21T01:50:11.890000 +CVE-2013-1707,0,0,5adecee4a04f73dcc2e466f4544316fc4b5d5c11229c7305182545f977ada729,2024-11-21T01:50:12 +CVE-2013-1708,0,0,c38473ea7adba45bda747280824c6560bacb5e52d11804218d28a722e1927ba9,2024-11-21T01:50:12.120000 +CVE-2013-1709,0,0,b4c3fe01c3cd3bc6180865b09eb0112e6d6a444133b9003cbd35c701472cfeb5,2024-11-21T01:50:12.243000 +CVE-2013-1710,0,0,c5aac53744ccec52b0e7d48c8682c506ec467809e462a6bf72879edc0861bd50,2024-11-21T01:50:12.397000 +CVE-2013-1711,0,0,1ce142b836f2c12be399f840cc4c16f17448088373328c0a0c72ae67b24c3431,2024-11-21T01:50:12.533000 +CVE-2013-1712,0,0,f953c85fd76a18dd1320c749cd6a7a1e0fd6de543cc845477f5f68fe0fcef01b,2024-11-21T01:50:12.663000 +CVE-2013-1713,0,0,0aa9bf458adbe902753847b9333b225e49a26549c47a251c911cf5272ca303b2,2024-11-21T01:50:12.790000 +CVE-2013-1714,0,0,8564d49a3152b008c844d4968cca7a80d9a55a00d0292d3b8962a485a397f260,2024-11-21T01:50:12.923000 +CVE-2013-1715,0,0,da1f4eb7cb031453e21a7399dfd549da84bd31324cf6ce5a14c332893adc4fe6,2024-11-21T01:50:13.063000 +CVE-2013-1717,0,0,ebc38aa9e4a3a441c0eb61965031b6b32d40691a7ce70bef0f6a34f8c9c3ad79,2024-11-21T01:50:13.173000 +CVE-2013-1718,0,0,2e5af1193e1d7ef374c3d641e1fc251b03d875a071d3756ca0d27d2c5e924c7e,2024-11-21T01:50:13.323000 +CVE-2013-1719,0,0,3c11bcb0ccaaf0431688afd71d8d59431bc0d0c23e4a97331560bc1657963d45,2024-11-21T01:50:13.473000 +CVE-2013-1720,0,0,2251eb24e3ede59f6ddce0190a64c2185cce4792148fe92136b3900b81390d72,2024-11-21T01:50:13.633000 +CVE-2013-1721,0,0,91845fc492202dbb765d16bd8df6c5b6eecb8fb6925005415e9f260fe6530490,2024-11-21T01:50:13.767000 +CVE-2013-1722,0,0,4def3302589097647c56c40ac967d1c4052bcd6fe9fd298fa33e54abcfec57e6,2024-11-21T01:50:13.903000 +CVE-2013-1723,0,0,dc250639e5dfa97bb2a984f2d2f69dcc404c157a6898d96c874c5389f6a455c4,2024-11-21T01:50:14.047000 +CVE-2013-1724,0,0,ac0a82e827783bb7da1ef826b128cb461d36426db79b762631dde2bc7b49c004,2024-11-21T01:50:14.187000 +CVE-2013-1725,0,0,0089c7aa2871512dbe5eace411c78de05a0658aaa77a756439f5f3e856a3c927,2024-11-21T01:50:14.337000 +CVE-2013-1726,0,0,1227052a5d34b32de1b68919d1961f1e75982b9e28a10d4796f0b05e0f9dfad9,2024-11-21T01:50:15.970000 +CVE-2013-1727,0,0,c55ddf7de7d0eebde5ce527d7cb8b8ec413cba2558d62cba4dcda89ddb52f7e5,2024-11-21T01:50:16.097000 +CVE-2013-1728,0,0,0a4df783bfe8917cdd3fc00032a067141dfc0f501664689a12bfc4eb8c743a6d,2024-11-21T01:50:16.217000 +CVE-2013-1729,0,0,e328789c561df0572b5a3ef7e0681f70674a3a7863c1335aca1aa134963c608f,2024-11-21T01:50:16.380000 +CVE-2013-1730,0,0,3d5ba1c81bc5dcf512dc86b00db7ab47db23d26417037ea81fdb8c1cc7eb65ea,2024-11-21T01:50:16.493000 +CVE-2013-1731,0,0,83603765c3f601f3bca97ccc839cae241eee7632f158a78aca97befcb2b0ea14,2024-11-21T01:50:16.633000 +CVE-2013-1732,0,0,5a5a828f7fc86df5c8730aedd2c5b2632df0b3a036f226f59e2bf5e77ec6f568,2024-11-21T01:50:16.750000 +CVE-2013-1733,0,0,01a81a4ab1a9347e34f3c4868c177a4bac55dc9df4021868f1ad2dc544b6f803,2024-11-21T01:50:16.903000 +CVE-2013-1734,0,0,c68605772ce7ae3ff626af2d4201b48a0572d8996bcdddfe1d4dd27a2521c561,2024-11-21T01:50:17.010000 +CVE-2013-1735,0,0,81f0353d8243bb047b44edae6949b5006714fe06f3541ba4cbfc57a230cfef14,2024-11-21T01:50:17.150000 +CVE-2013-1736,0,0,e69088d7efd1b8b3435da9deee61011a7e2011e66114a198870cfa2c3d233a06,2024-11-21T01:50:17.297000 +CVE-2013-1737,0,0,d9e76d40902488e19583ec1327c0f312a53f77327441f11d6f57b0bea525e3d7,2024-11-21T01:50:17.443000 +CVE-2013-1738,0,0,81ebde88a8b7a166432c89ad5b498ce47445d30878d46aed77f9300dd1fdb03b,2024-11-21T01:50:17.600000 +CVE-2013-1739,0,0,b9108bd58136f37b91cac6cc475b3e40b60c07951fea67fe26133a2c7141bdff,2024-11-21T01:50:17.740000 +CVE-2013-1740,0,0,60391653bc0b2748cdc922f9eb91bc22c4557555faf1b5f6c1e37487871f584b,2024-11-21T01:50:17.903000 +CVE-2013-1741,0,0,37f111fc80cba87c5647beba93d6de82ff9ae1d2eabdbbec39a7fcbbdcc34e66,2024-11-21T01:50:18.080000 +CVE-2013-1742,0,0,f76beda0eb56d72a0e7bb1c1ea50b1bf3d788f6eb0529e868f8363c84617450d,2024-11-21T01:50:18.237000 +CVE-2013-1743,0,0,862304f558781e0a41b9d0952aec3aa19184bc7dae99535a754736c21b6c1d76,2024-11-21T01:50:18.373000 CVE-2013-1744,0,0,1bf54c1f243d1a2279e45855d3e96c33fcc4b46a366548e616e7cf1a4b245f73,2020-01-29T19:02:07.320000 -CVE-2013-1747,0,1,5fbc6b28dc6e18e7da771f6413e4b7f5e5591f693b82223364d398fc235308db,2024-11-21T01:50:18.617000 -CVE-2013-1748,0,1,e3a2d323fe986e868123972c2999464965a2a51d8e73579762e9b64bb2f01fb1,2024-11-21T01:50:18.757000 -CVE-2013-1749,0,1,c6ee979b82a35c8d5e1395286d5ef833b8d6f11941ccac69a2561dc93a9d08cf,2024-11-21T01:50:18.900000 -CVE-2013-1750,0,1,df5ff8d0ec54a0d672c5239664c28702eb34e9bb93b2137e851cf7d5e347aa76,2024-11-21T01:50:19.037000 +CVE-2013-1747,0,0,5fbc6b28dc6e18e7da771f6413e4b7f5e5591f693b82223364d398fc235308db,2024-11-21T01:50:18.617000 +CVE-2013-1748,0,0,e3a2d323fe986e868123972c2999464965a2a51d8e73579762e9b64bb2f01fb1,2024-11-21T01:50:18.757000 +CVE-2013-1749,0,0,c6ee979b82a35c8d5e1395286d5ef833b8d6f11941ccac69a2561dc93a9d08cf,2024-11-21T01:50:18.900000 +CVE-2013-1750,0,0,df5ff8d0ec54a0d672c5239664c28702eb34e9bb93b2137e851cf7d5e347aa76,2024-11-21T01:50:19.037000 CVE-2013-1751,0,0,a99fcea1363b4084a3c6c3b8139be39a377e1c50373ce62c38e48eaf372a2943,2019-11-08T19:53:18.483000 CVE-2013-1752,0,0,f571ed59c9bb97597a843f99b6284808a5c7e243c4c54e4c68ff02d01e4207eb,2023-11-07T02:14:48.750000 CVE-2013-1753,0,0,63795f66044e4854b35c580a7e815f73d47334480ee2ca3f1838c08b87dc10aa,2020-10-21T17:44:29.853000 CVE-2013-1756,0,0,bbcae6cc4f43a0c7229b19f3646ee0b2086f98ca4ccf08badb4a9ac4605d0ae7,2023-11-07T02:14:48.793000 -CVE-2013-1758,0,1,46ca79155afaf64ffaedfe10de26031d6f304a08b3f3be76508c09ca7cc46f38,2024-11-21T01:50:19.660000 -CVE-2013-1759,0,1,9a1733142c15c5bb89ac404583910badc2ce26d7d59d84fb95e1ca371883c7c4,2024-11-21T01:50:19.800000 +CVE-2013-1758,0,0,46ca79155afaf64ffaedfe10de26031d6f304a08b3f3be76508c09ca7cc46f38,2024-11-21T01:50:19.660000 +CVE-2013-1759,0,0,9a1733142c15c5bb89ac404583910badc2ce26d7d59d84fb95e1ca371883c7c4,2024-11-21T01:50:19.800000 CVE-2013-1760,0,0,c820f4d23e78a027de0dac81cf080ad34d7fa4ef91bddc88749b835b20637579,2020-02-12T19:09:09.810000 -CVE-2013-1762,0,1,1a3907f97ede9828deca90accd9ef8de46d54015efb160851eaeebacb7cdade6,2024-11-21T01:50:20.090000 -CVE-2013-1763,0,1,590a2c6ac347473a10e2e905c3efafe0b8664db31ddcaab4f7b7353ef189df9b,2024-11-21T01:50:20.247000 -CVE-2013-1764,0,1,3c5c314161eb6852ef46bb868ad62bf220cc38805ee89bdd58c128a3c325d239,2024-11-21T01:50:20.393000 -CVE-2013-1765,0,1,08cba2c55351e75287932666e31e25ad8a1ce3da602d3e3b5a0f81347e4ce629,2024-11-21T01:50:20.510000 -CVE-2013-1766,0,1,8104ae4ba67d0e66ca4e586943b32a55a1fbe0a02e993a0b8e552ff405a1f488,2024-11-21T01:50:20.640000 -CVE-2013-1767,0,1,d49de03bd7c2dc8efcbe83f7d7387d35f97bd7f112388b29a52c2fbdafef6921,2024-11-21T01:50:20.770000 -CVE-2013-1768,0,1,dce20fe19f9055eb185d7e74550503a48041d9d2e11501670e0a7c92b1cc0ea9,2024-11-21T01:50:20.923000 -CVE-2013-1769,0,1,6737d64e744394a5f2da78424d9bec391acd53d97d5dafc1244703e7b93d8a61,2024-11-21T01:50:21.060000 -CVE-2013-1770,0,1,8712023286822193bb28135333a58c898efcc602395c174980682fd40edee4b9,2024-11-21T01:50:21.177000 +CVE-2013-1762,0,0,1a3907f97ede9828deca90accd9ef8de46d54015efb160851eaeebacb7cdade6,2024-11-21T01:50:20.090000 +CVE-2013-1763,0,0,590a2c6ac347473a10e2e905c3efafe0b8664db31ddcaab4f7b7353ef189df9b,2024-11-21T01:50:20.247000 +CVE-2013-1764,0,0,3c5c314161eb6852ef46bb868ad62bf220cc38805ee89bdd58c128a3c325d239,2024-11-21T01:50:20.393000 +CVE-2013-1765,0,0,08cba2c55351e75287932666e31e25ad8a1ce3da602d3e3b5a0f81347e4ce629,2024-11-21T01:50:20.510000 +CVE-2013-1766,0,0,8104ae4ba67d0e66ca4e586943b32a55a1fbe0a02e993a0b8e552ff405a1f488,2024-11-21T01:50:20.640000 +CVE-2013-1767,0,0,d49de03bd7c2dc8efcbe83f7d7387d35f97bd7f112388b29a52c2fbdafef6921,2024-11-21T01:50:20.770000 +CVE-2013-1768,0,0,dce20fe19f9055eb185d7e74550503a48041d9d2e11501670e0a7c92b1cc0ea9,2024-11-21T01:50:20.923000 +CVE-2013-1769,0,0,6737d64e744394a5f2da78424d9bec391acd53d97d5dafc1244703e7b93d8a61,2024-11-21T01:50:21.060000 +CVE-2013-1770,0,0,8712023286822193bb28135333a58c898efcc602395c174980682fd40edee4b9,2024-11-21T01:50:21.177000 CVE-2013-1771,0,0,d65609156c87a51b948b39ba88d12a74440aabfcf6de11636c63942882c319d4,2019-11-13T18:19:35.683000 -CVE-2013-1772,0,1,5e087c18f5091c7717e97d00702240820855ce34f2366a194fd5b4a1e1efacac,2024-11-21T01:50:21.410000 -CVE-2013-1773,0,1,33c654f08ca0ee177d7d7bb2c52326c151d656d9f8b8f8be4a73a1722277139f,2024-11-21T01:50:21.573000 -CVE-2013-1774,0,1,46d94cbf79e59313e19546025e6dc18965f1746ae6cc09d1f1d22e0b3c30a18f,2024-11-21T01:50:21.717000 -CVE-2013-1775,0,1,5f9f61f9482a4b50d1269412d89bc6d1112e16c95a453b4f856118d478fca0cd,2024-11-21T01:50:21.853000 -CVE-2013-1776,0,1,91284ca658688655ab791df8c8a380a04f099cfb6d7a53df92ba61d3e4929060,2024-11-21T01:50:22 -CVE-2013-1777,0,1,aaff691a0fc3ef042169ad7c80f7a43ece133e799f07ba38e96b36a888606574,2024-11-21T01:50:22.143000 -CVE-2013-1778,0,1,76a085e3f66aacbe2965ca2040307ede407e682f2a1b10a5efa80bd73ff3f2d6,2024-11-21T01:50:22.257000 -CVE-2013-1779,0,1,689237ef2551641b66e7700bd93a1730a0999ff459f0424f76badfced77ae5d7,2024-11-21T01:50:22.373000 -CVE-2013-1780,0,1,2c2dee3402e0734932e5ff417fa6e36699cc459d001f80c466f442087ccad886,2024-11-21T01:50:22.487000 -CVE-2013-1781,0,1,361f40c1b99df92fa3dab92ac3d6baef6827f339cb4d9b912f5c1129a7a92ab0,2024-11-21T01:50:22.617000 -CVE-2013-1782,0,1,3ab3ed55eecee52bc70608e5b0d5eb234da72f89ce434c2836d6a308a2408fa4,2024-11-21T01:50:22.743000 -CVE-2013-1783,0,1,b67d829bf208460c3cec986fea74843e38683c5154465f1a431172124621bf9a,2024-11-21T01:50:22.860000 -CVE-2013-1784,0,1,21981100641acb147e42887564cdc609a44d39a39eebaa24214d99696a20bfd2,2024-11-21T01:50:22.980000 -CVE-2013-1785,0,1,4107efaa612c94b17c9589a319283993a3f35c3e409deab8de95da30c86ab4d6,2024-11-21T01:50:23.090000 -CVE-2013-1786,0,1,60312a7bf555f44f63c97645022b55935543a7827867dcf6172e2fc7cd3d2bad,2024-11-21T01:50:23.207000 -CVE-2013-1787,0,1,ecba547f5c6f7cf1a4f5ccf115f3c0a1f97b2fca53df3e30dbc4b53644684c75,2024-11-21T01:50:23.320000 -CVE-2013-1788,0,1,30e4d6114b748d1e235e7778fcf7b409e0d397da76805b3343c57caf79a12fe1,2024-11-21T01:50:23.433000 -CVE-2013-1789,0,1,b1c2a3ebcf7cc88ac6bb98f3c36abe0e0268e1301b14cd88c827d2f88ee82e04,2024-11-21T01:50:23.557000 -CVE-2013-1790,0,1,4c91f9a3285d1cc67dfeae977f4432718fc9ffeb489a064edfa679043fb16718,2024-11-21T01:50:23.710000 +CVE-2013-1772,0,0,5e087c18f5091c7717e97d00702240820855ce34f2366a194fd5b4a1e1efacac,2024-11-21T01:50:21.410000 +CVE-2013-1773,0,0,33c654f08ca0ee177d7d7bb2c52326c151d656d9f8b8f8be4a73a1722277139f,2024-11-21T01:50:21.573000 +CVE-2013-1774,0,0,46d94cbf79e59313e19546025e6dc18965f1746ae6cc09d1f1d22e0b3c30a18f,2024-11-21T01:50:21.717000 +CVE-2013-1775,0,0,5f9f61f9482a4b50d1269412d89bc6d1112e16c95a453b4f856118d478fca0cd,2024-11-21T01:50:21.853000 +CVE-2013-1776,0,0,91284ca658688655ab791df8c8a380a04f099cfb6d7a53df92ba61d3e4929060,2024-11-21T01:50:22 +CVE-2013-1777,0,0,aaff691a0fc3ef042169ad7c80f7a43ece133e799f07ba38e96b36a888606574,2024-11-21T01:50:22.143000 +CVE-2013-1778,0,0,76a085e3f66aacbe2965ca2040307ede407e682f2a1b10a5efa80bd73ff3f2d6,2024-11-21T01:50:22.257000 +CVE-2013-1779,0,0,689237ef2551641b66e7700bd93a1730a0999ff459f0424f76badfced77ae5d7,2024-11-21T01:50:22.373000 +CVE-2013-1780,0,0,2c2dee3402e0734932e5ff417fa6e36699cc459d001f80c466f442087ccad886,2024-11-21T01:50:22.487000 +CVE-2013-1781,0,0,361f40c1b99df92fa3dab92ac3d6baef6827f339cb4d9b912f5c1129a7a92ab0,2024-11-21T01:50:22.617000 +CVE-2013-1782,0,0,3ab3ed55eecee52bc70608e5b0d5eb234da72f89ce434c2836d6a308a2408fa4,2024-11-21T01:50:22.743000 +CVE-2013-1783,0,0,b67d829bf208460c3cec986fea74843e38683c5154465f1a431172124621bf9a,2024-11-21T01:50:22.860000 +CVE-2013-1784,0,0,21981100641acb147e42887564cdc609a44d39a39eebaa24214d99696a20bfd2,2024-11-21T01:50:22.980000 +CVE-2013-1785,0,0,4107efaa612c94b17c9589a319283993a3f35c3e409deab8de95da30c86ab4d6,2024-11-21T01:50:23.090000 +CVE-2013-1786,0,0,60312a7bf555f44f63c97645022b55935543a7827867dcf6172e2fc7cd3d2bad,2024-11-21T01:50:23.207000 +CVE-2013-1787,0,0,ecba547f5c6f7cf1a4f5ccf115f3c0a1f97b2fca53df3e30dbc4b53644684c75,2024-11-21T01:50:23.320000 +CVE-2013-1788,0,0,30e4d6114b748d1e235e7778fcf7b409e0d397da76805b3343c57caf79a12fe1,2024-11-21T01:50:23.433000 +CVE-2013-1789,0,0,b1c2a3ebcf7cc88ac6bb98f3c36abe0e0268e1301b14cd88c827d2f88ee82e04,2024-11-21T01:50:23.557000 +CVE-2013-1790,0,0,4c91f9a3285d1cc67dfeae977f4432718fc9ffeb489a064edfa679043fb16718,2024-11-21T01:50:23.710000 CVE-2013-1791,0,0,9d0df8d1d174a6315d5d03f73c3b96526a6bf365e2d7f1b382d5c651afcd76e6,2023-11-07T02:14:49.160000 -CVE-2013-1792,0,1,2527d3c1e2a0ca1ad4aa419c6d9dff4f26bbebf95c65555f2992899e1bfbfd86,2024-11-21T01:50:23.850000 +CVE-2013-1792,0,0,2527d3c1e2a0ca1ad4aa419c6d9dff4f26bbebf95c65555f2992899e1bfbfd86,2024-11-21T01:50:23.850000 CVE-2013-1793,0,0,3095d1b3cbbce5615ea4433bf02147bb2953cb75d3ffa944616734d20ba54783,2019-12-14T12:46:44.847000 -CVE-2013-1794,0,1,a3b3dc95ac18156b3dcd5c663132557afc26b5ba87f5b2f859df5a114e600f78,2024-11-21T01:50:24.100000 -CVE-2013-1795,0,1,010e3aa15117558d07a0a44ba950e490af8ce53ae01ec9da1866cb28cc37b6b4,2024-11-21T01:50:24.237000 -CVE-2013-1796,0,1,7e64b05dc70268b3a599e882b6857dfcf8ac9fb3215ea91a94d1e22c8fc4fcc5,2024-11-21T01:50:24.373000 -CVE-2013-1797,0,1,ab8767222ea36e30e04dfa8be8a8525b7fd5b0150520de25af0a4c6624d9a412,2024-11-21T01:50:24.513000 -CVE-2013-1798,0,1,01a60f2b1f75cb3e7bc8b668243ed9ed4fba8d206df6d81181c5143f7efd5156,2024-11-21T01:50:24.640000 -CVE-2013-1799,0,1,d4994b0b190fbfbaa244dd330defe5808c322a192adf302c6f69b756a73bb7b9,2024-11-21T01:50:24.773000 -CVE-2013-1800,0,1,2c89742787400053f6b571712d0387569a05de8ebcdc5541d3f06ed3d8335b5c,2024-11-21T01:50:24.900000 -CVE-2013-1801,0,1,140fb295d24eaa310bd2e39f0c2eb5d9cd7428d9f61550d1e0ee67ac869392c8,2024-11-21T01:50:25.030000 -CVE-2013-1802,0,1,de2b2127161c6b1381392c3a1004863885e9af3c12ac4c532333c5498339979c,2024-11-21T01:50:25.160000 -CVE-2013-1803,0,1,4dbf45c0dd24ae73ca37cec40633049de9df77dd84770dd2cef01e74822f5d96,2024-11-21T01:50:25.277000 -CVE-2013-1804,0,1,302dc21d27526f32db479cfc775bc5796be6d01d92df8bedfc78dec085533a33,2024-11-21T01:50:25.407000 +CVE-2013-1794,0,0,a3b3dc95ac18156b3dcd5c663132557afc26b5ba87f5b2f859df5a114e600f78,2024-11-21T01:50:24.100000 +CVE-2013-1795,0,0,010e3aa15117558d07a0a44ba950e490af8ce53ae01ec9da1866cb28cc37b6b4,2024-11-21T01:50:24.237000 +CVE-2013-1796,0,0,7e64b05dc70268b3a599e882b6857dfcf8ac9fb3215ea91a94d1e22c8fc4fcc5,2024-11-21T01:50:24.373000 +CVE-2013-1797,0,0,ab8767222ea36e30e04dfa8be8a8525b7fd5b0150520de25af0a4c6624d9a412,2024-11-21T01:50:24.513000 +CVE-2013-1798,0,0,01a60f2b1f75cb3e7bc8b668243ed9ed4fba8d206df6d81181c5143f7efd5156,2024-11-21T01:50:24.640000 +CVE-2013-1799,0,0,d4994b0b190fbfbaa244dd330defe5808c322a192adf302c6f69b756a73bb7b9,2024-11-21T01:50:24.773000 +CVE-2013-1800,0,0,2c89742787400053f6b571712d0387569a05de8ebcdc5541d3f06ed3d8335b5c,2024-11-21T01:50:24.900000 +CVE-2013-1801,0,0,140fb295d24eaa310bd2e39f0c2eb5d9cd7428d9f61550d1e0ee67ac869392c8,2024-11-21T01:50:25.030000 +CVE-2013-1802,0,0,de2b2127161c6b1381392c3a1004863885e9af3c12ac4c532333c5498339979c,2024-11-21T01:50:25.160000 +CVE-2013-1803,0,0,4dbf45c0dd24ae73ca37cec40633049de9df77dd84770dd2cef01e74822f5d96,2024-11-21T01:50:25.277000 +CVE-2013-1804,0,0,302dc21d27526f32db479cfc775bc5796be6d01d92df8bedfc78dec085533a33,2024-11-21T01:50:25.407000 CVE-2013-1805,0,0,0f38af57b8c004f726fd00f4b3a73a3baf59963987e53e0535684056862080c2,2023-11-07T02:14:49.593000 -CVE-2013-1806,0,1,d5ad0d0c4bd352aa0e8a07d79c464c74686fb79082dd00ff8147e8ee0593b36c,2024-11-21T01:50:25.547000 -CVE-2013-1807,0,1,f1a4389e8cc8483f5b5ecf2734482b7f2024024ec77cd6aaba83f4a7d842d4e6,2024-11-21T01:50:25.673000 -CVE-2013-1808,0,1,e263e3f932bd44cd55391a682038e0b46a8a5143cb4bb1c5ce790532d6add561,2024-11-21T01:50:25.793000 +CVE-2013-1806,0,0,d5ad0d0c4bd352aa0e8a07d79c464c74686fb79082dd00ff8147e8ee0593b36c,2024-11-21T01:50:25.547000 +CVE-2013-1807,0,0,f1a4389e8cc8483f5b5ecf2734482b7f2024024ec77cd6aaba83f4a7d842d4e6,2024-11-21T01:50:25.673000 +CVE-2013-1808,0,0,e263e3f932bd44cd55391a682038e0b46a8a5143cb4bb1c5ce790532d6add561,2024-11-21T01:50:25.793000 CVE-2013-1809,0,0,a6a200c26d5af39db9603ec8849d6262bbaf6d53f4ae7dff87acebed689b8b54,2020-08-18T15:05:57.937000 -CVE-2013-1810,0,1,f2e3e9e30cc2d08b03f269f34cf04fbb6ca980023b94ef9d68a3a3b942935b29,2024-11-21T01:50:26.070000 +CVE-2013-1810,0,0,f2e3e9e30cc2d08b03f269f34cf04fbb6ca980023b94ef9d68a3a3b942935b29,2024-11-21T01:50:26.070000 CVE-2013-1811,0,0,abf9ec37bf1636b60f09b4372cfe51b47600719c3d7ba629f4ecd85a16681a98,2019-11-09T22:38:10.527000 -CVE-2013-1812,0,1,2ab764bdd9130cb41ffeaccc6d3ed2dc75f3b7db9922b959a5ea150a758b41ad,2024-11-21T01:50:26.313000 -CVE-2013-1813,0,1,d7ae0bd0985b1efa15f1121ae324911dfa2038dcaa7a6ff4ed6143e879f60d52,2024-11-21T01:50:26.430000 -CVE-2013-1814,0,1,424767ce1dd5fa193c4253c578d1c0f5e2b664e5f61bca90932cd1638ddd8a94,2024-11-21T01:50:26.580000 -CVE-2013-1815,0,1,d5d7b7075f555f91192931d80add32a930856ef59da2beb9b967912826b046ce,2024-11-21T01:50:26.730000 +CVE-2013-1812,0,0,2ab764bdd9130cb41ffeaccc6d3ed2dc75f3b7db9922b959a5ea150a758b41ad,2024-11-21T01:50:26.313000 +CVE-2013-1813,0,0,d7ae0bd0985b1efa15f1121ae324911dfa2038dcaa7a6ff4ed6143e879f60d52,2024-11-21T01:50:26.430000 +CVE-2013-1814,0,0,424767ce1dd5fa193c4253c578d1c0f5e2b664e5f61bca90932cd1638ddd8a94,2024-11-21T01:50:26.580000 +CVE-2013-1815,0,0,d5d7b7075f555f91192931d80add32a930856ef59da2beb9b967912826b046ce,2024-11-21T01:50:26.730000 CVE-2013-1816,0,0,18cf923f7efbfedda0c4c0cb2783656769fa834c457905b3e30a397193fc74dd,2019-11-21T14:58:30.763000 CVE-2013-1817,0,0,82af40a7a789fd4bee9de80d589e929f66e9bd7c09ae0260efc9350779aa4f9c,2019-11-21T14:54:57.800000 CVE-2013-1818,0,0,6dd7e18a0c4db3ee10760e4a771293e815c57a3d0f60472a306b422dc7e52765,2017-08-29T01:33:11.403000 -CVE-2013-1819,0,1,76f48dfce317d67e78b1220f7fd7d6dfc8be4818748475a665b7ff02b7fe2e4c,2024-11-21T01:50:27.213000 +CVE-2013-1819,0,0,76f48dfce317d67e78b1220f7fd7d6dfc8be4818748475a665b7ff02b7fe2e4c,2024-11-21T01:50:27.213000 CVE-2013-1820,0,0,bd0d13b6175a4bfb140cfa92b2122f9b5d5f25b77706e2c496d5b58ddcfcc571,2019-11-14T15:43:39.220000 -CVE-2013-1821,0,1,78c11f0808488a83b3ea9e242df2ad76918ce95f8743c23adc3bcbfdd9ef53f0,2024-11-21T01:50:27.493000 -CVE-2013-1822,0,1,69a28eeee78162d38fcf73231faf296e56100482b9e22901905c57a151cacc48,2024-11-21T01:50:27.640000 -CVE-2013-1823,0,1,c077999de12686547d36667ce923d3436ddc828c93c09e451d355a0dae1bb2f0,2024-11-21T01:50:27.757000 -CVE-2013-1824,0,1,207079d7730bfa74d16e332f0f60492deb41dac4d99f0926e24aed9d1eb1c47a,2024-11-21T01:50:27.890000 +CVE-2013-1821,0,0,78c11f0808488a83b3ea9e242df2ad76918ce95f8743c23adc3bcbfdd9ef53f0,2024-11-21T01:50:27.493000 +CVE-2013-1822,0,0,69a28eeee78162d38fcf73231faf296e56100482b9e22901905c57a151cacc48,2024-11-21T01:50:27.640000 +CVE-2013-1823,0,0,c077999de12686547d36667ce923d3436ddc828c93c09e451d355a0dae1bb2f0,2024-11-21T01:50:27.757000 +CVE-2013-1824,0,0,207079d7730bfa74d16e332f0f60492deb41dac4d99f0926e24aed9d1eb1c47a,2024-11-21T01:50:27.890000 CVE-2013-1825,0,0,0b204184b75d712d04be95b2d57eca2b1aa725500ba0b17468ae9d49d0dffb03,2023-11-07T02:14:50.020000 -CVE-2013-1826,0,1,53d0a00497ca061c222281d9dbd3d3ce1d78271152b3af532618f36a23b43805,2024-11-21T01:50:28.033000 -CVE-2013-1827,0,1,3d8f910a19df9dcec090c9b62b70e5ac61f02599e438c850aa70ccc33fc0af39,2024-11-21T01:50:28.147000 -CVE-2013-1828,0,1,bb9a8890ad3f593091f36fbed5e771f48cd211d1adb509ba8a577c15d85d00d5,2024-11-21T01:50:28.270000 -CVE-2013-1829,0,1,248d16930d5a571edffa0a60917772cbbbabae0802746e8dae2ba72f498de4fd,2024-11-21T01:50:28.403000 -CVE-2013-1830,0,1,3848ec7ee3fda18ccce0e26ad5444ab432484e73998e9ee59252d6ed17720637,2024-11-21T01:50:28.523000 -CVE-2013-1831,0,1,3359999c340718ce0c5dbd22e1d3c397ed1cca493589b00ab3ba8a38d755bb72,2024-11-21T01:50:28.683000 -CVE-2013-1832,0,1,633c7a5f239b17678667f8073c7b4aa6990f5e23a14e3562de2416f617773a28,2024-11-21T01:50:28.820000 -CVE-2013-1833,0,1,ed462d57bb8abc90dd217fd8a3bf16027362b2ad0ecf6e6d2f83d7020aae8fbf,2024-11-21T01:50:28.950000 -CVE-2013-1834,0,1,4e702640bbeb3e24d99cdfef76566b399c2a4eab45fb7ba37cf66ff7de01893e,2024-11-21T01:50:29.077000 -CVE-2013-1835,0,1,b7d9ac4b8fad26c0890fa518f17577db615e4a6f550957a078b751677116c45e,2024-11-21T01:50:29.210000 -CVE-2013-1836,0,1,3f6203073aada9176ca4aa69b80bf0104fd78633214757487a845db246f1d0b5,2024-11-21T01:50:29.340000 +CVE-2013-1826,0,0,53d0a00497ca061c222281d9dbd3d3ce1d78271152b3af532618f36a23b43805,2024-11-21T01:50:28.033000 +CVE-2013-1827,0,0,3d8f910a19df9dcec090c9b62b70e5ac61f02599e438c850aa70ccc33fc0af39,2024-11-21T01:50:28.147000 +CVE-2013-1828,0,0,bb9a8890ad3f593091f36fbed5e771f48cd211d1adb509ba8a577c15d85d00d5,2024-11-21T01:50:28.270000 +CVE-2013-1829,0,0,248d16930d5a571edffa0a60917772cbbbabae0802746e8dae2ba72f498de4fd,2024-11-21T01:50:28.403000 +CVE-2013-1830,0,0,3848ec7ee3fda18ccce0e26ad5444ab432484e73998e9ee59252d6ed17720637,2024-11-21T01:50:28.523000 +CVE-2013-1831,0,0,3359999c340718ce0c5dbd22e1d3c397ed1cca493589b00ab3ba8a38d755bb72,2024-11-21T01:50:28.683000 +CVE-2013-1832,0,0,633c7a5f239b17678667f8073c7b4aa6990f5e23a14e3562de2416f617773a28,2024-11-21T01:50:28.820000 +CVE-2013-1833,0,0,ed462d57bb8abc90dd217fd8a3bf16027362b2ad0ecf6e6d2f83d7020aae8fbf,2024-11-21T01:50:28.950000 +CVE-2013-1834,0,0,4e702640bbeb3e24d99cdfef76566b399c2a4eab45fb7ba37cf66ff7de01893e,2024-11-21T01:50:29.077000 +CVE-2013-1835,0,0,b7d9ac4b8fad26c0890fa518f17577db615e4a6f550957a078b751677116c45e,2024-11-21T01:50:29.210000 +CVE-2013-1836,0,0,3f6203073aada9176ca4aa69b80bf0104fd78633214757487a845db246f1d0b5,2024-11-21T01:50:29.340000 CVE-2013-1837,0,0,4d236477ffdbed3bd6e8f8bf9e1dea38b22df39ff835b59e8a10005e79a421d2,2023-11-07T02:14:50.357000 -CVE-2013-1838,0,1,47aa2b12a54ecc620080c9a7ac7fb3337ca7d9e95f44f90f0bc8f40568f36ad7,2024-11-21T01:50:29.483000 -CVE-2013-1839,0,1,08f9714631e867ec85ddfaa867d89ae2316389665aaa536a8edb42857f6f3e3c,2024-11-21T01:50:29.613000 -CVE-2013-1840,0,1,b9041d2f80fd180113f9df86a94d1a5128dd75c1ac3353d75b3afb36be3b3510,2024-11-21T01:50:29.740000 +CVE-2013-1838,0,0,47aa2b12a54ecc620080c9a7ac7fb3337ca7d9e95f44f90f0bc8f40568f36ad7,2024-11-21T01:50:29.483000 +CVE-2013-1839,0,0,08f9714631e867ec85ddfaa867d89ae2316389665aaa536a8edb42857f6f3e3c,2024-11-21T01:50:29.613000 +CVE-2013-1840,0,0,b9041d2f80fd180113f9df86a94d1a5128dd75c1ac3353d75b3afb36be3b3510,2024-11-21T01:50:29.740000 CVE-2013-1841,0,0,9d74927429dc09aa05a0517b94595aead28b52d13f4dd07ee29be8a7f3d49d1c,2017-08-29T01:33:11.620000 -CVE-2013-1842,0,1,e050a7e51a59dfe1c260c456e837100f4c978ffbd9fcc67bd8a7a1866b9ea862,2024-11-21T01:50:29.967000 -CVE-2013-1843,0,1,0bd50c1c5255656d0fac748470ab853e7d2404d8957b08873411938a4afc8cc1,2024-11-21T01:50:30.093000 -CVE-2013-1844,0,1,767bc58aff384bb6afb05cbd5123b0927bcac18d42fefc277fc2a33692b8a276,2024-11-21T01:50:30.223000 -CVE-2013-1845,0,1,20c17771c767703dd6d0f2062f82db4428efc9733198ea8a230193d89b359f59,2024-11-21T01:50:30.340000 -CVE-2013-1846,0,1,0dec9782244ff1426f3f18d1fadd02787d5926d5a31863421eec12ba48a8a32d,2024-11-21T01:50:30.473000 -CVE-2013-1847,0,1,a9430c64a62fab31b9da1d04c10c66c9bffe97e5687a3372e6c0895329acdb3a,2024-11-21T01:50:30.600000 -CVE-2013-1848,0,1,0816e729ab156337a95805a3a0ae44ef1618de6420519b8fdad3499653e10a0e,2024-11-21T01:50:30.743000 -CVE-2013-1849,0,1,7ba43306ee8ff4c3cff5ee328a631a236ce14240a4ea8deb9e32ba1d8d7a6a0b,2024-11-21T01:50:30.873000 -CVE-2013-1850,0,1,fc4b153f97d876b276ba29d73a0cdf0122b006714f3c572cb361ae6e4598f508,2024-11-21T01:50:31.010000 -CVE-2013-1851,0,1,6f37a9a29db1e7607d4f29cdfb437ddfdc6993369febcc78dc011670774601f2,2024-11-21T01:50:31.120000 -CVE-2013-1852,0,1,969e103c1142dbdcc9d37e5b0e80cb22ff8b9b9dae3b6031b4f4b9ef6bd296df,2024-11-21T01:50:31.253000 -CVE-2013-1853,0,1,5f9b0a5763a845855a4ec1d9d215e653a830028d3cfcd5773a6a9ef6a82fb6ce,2024-11-21T01:50:31.390000 -CVE-2013-1854,0,1,5e92e47b6105f6f9481b3deca5251438c66279a6afd1e026ebdeca16b89a3553,2024-11-21T01:50:31.507000 -CVE-2013-1855,0,1,9913a91e7ba7fccfacd79367d17fbeaa0ee82155832ece3b2cab8b7acec3ddf3,2024-11-21T01:50:31.663000 -CVE-2013-1856,0,1,8c1da350e109e33034fbf45730dc9fc1c78487980fd506be43218724bb5f89e5,2024-11-21T01:50:31.833000 -CVE-2013-1857,0,1,b96f7174cf47683a544ad38e47abc2f35ff999d533874911c9e17cc2634c87ab,2024-11-21T01:50:31.973000 -CVE-2013-1858,0,1,1aa8620a85e39281132d564853468a5968b4841eeb03063f84a51defda3aef48,2024-11-21T01:50:32.123000 -CVE-2013-1859,0,1,4dc641cc1f5c67f28f63b1c035ef2da3504182251f1ff5f2ee52ba8abc6145a6,2024-11-21T01:50:32.270000 -CVE-2013-1860,0,1,218b4777f93ab72aceb398a09aa3545b74a7f719a17ff8d23f7a6be2ca47e05a,2024-11-21T01:50:32.393000 -CVE-2013-1861,0,1,81daadab5d0cde98527427257264089f876b8969cf72faaca252afc09317483a,2024-11-21T01:50:32.567000 -CVE-2013-1862,0,1,f592ad7e43552fa08818c4fcf0283d0f0428af01aa7ea52f3d976c87e43aa757,2024-11-21T01:50:32.763000 -CVE-2013-1863,0,1,3282ed1c93a71d3473376261c66eb85b5edc2764f239b15f87ee79dd02521bc0,2024-11-21T01:50:32.997000 -CVE-2013-1864,0,1,99a5953bc500115279a7a70db2e8591945773d4c819a3a0fc5526223491d9b4a,2024-11-21T01:50:33.123000 -CVE-2013-1865,0,1,c13beb0adc8141142431aa96f8a8a025ece39485b9dc54678008256199c849db,2024-11-21T01:50:33.250000 +CVE-2013-1842,0,0,e050a7e51a59dfe1c260c456e837100f4c978ffbd9fcc67bd8a7a1866b9ea862,2024-11-21T01:50:29.967000 +CVE-2013-1843,0,0,0bd50c1c5255656d0fac748470ab853e7d2404d8957b08873411938a4afc8cc1,2024-11-21T01:50:30.093000 +CVE-2013-1844,0,0,767bc58aff384bb6afb05cbd5123b0927bcac18d42fefc277fc2a33692b8a276,2024-11-21T01:50:30.223000 +CVE-2013-1845,0,0,20c17771c767703dd6d0f2062f82db4428efc9733198ea8a230193d89b359f59,2024-11-21T01:50:30.340000 +CVE-2013-1846,0,0,0dec9782244ff1426f3f18d1fadd02787d5926d5a31863421eec12ba48a8a32d,2024-11-21T01:50:30.473000 +CVE-2013-1847,0,0,a9430c64a62fab31b9da1d04c10c66c9bffe97e5687a3372e6c0895329acdb3a,2024-11-21T01:50:30.600000 +CVE-2013-1848,0,0,0816e729ab156337a95805a3a0ae44ef1618de6420519b8fdad3499653e10a0e,2024-11-21T01:50:30.743000 +CVE-2013-1849,0,0,7ba43306ee8ff4c3cff5ee328a631a236ce14240a4ea8deb9e32ba1d8d7a6a0b,2024-11-21T01:50:30.873000 +CVE-2013-1850,0,0,fc4b153f97d876b276ba29d73a0cdf0122b006714f3c572cb361ae6e4598f508,2024-11-21T01:50:31.010000 +CVE-2013-1851,0,0,6f37a9a29db1e7607d4f29cdfb437ddfdc6993369febcc78dc011670774601f2,2024-11-21T01:50:31.120000 +CVE-2013-1852,0,0,969e103c1142dbdcc9d37e5b0e80cb22ff8b9b9dae3b6031b4f4b9ef6bd296df,2024-11-21T01:50:31.253000 +CVE-2013-1853,0,0,5f9b0a5763a845855a4ec1d9d215e653a830028d3cfcd5773a6a9ef6a82fb6ce,2024-11-21T01:50:31.390000 +CVE-2013-1854,0,0,5e92e47b6105f6f9481b3deca5251438c66279a6afd1e026ebdeca16b89a3553,2024-11-21T01:50:31.507000 +CVE-2013-1855,0,0,9913a91e7ba7fccfacd79367d17fbeaa0ee82155832ece3b2cab8b7acec3ddf3,2024-11-21T01:50:31.663000 +CVE-2013-1856,0,0,8c1da350e109e33034fbf45730dc9fc1c78487980fd506be43218724bb5f89e5,2024-11-21T01:50:31.833000 +CVE-2013-1857,0,0,b96f7174cf47683a544ad38e47abc2f35ff999d533874911c9e17cc2634c87ab,2024-11-21T01:50:31.973000 +CVE-2013-1858,0,0,1aa8620a85e39281132d564853468a5968b4841eeb03063f84a51defda3aef48,2024-11-21T01:50:32.123000 +CVE-2013-1859,0,0,4dc641cc1f5c67f28f63b1c035ef2da3504182251f1ff5f2ee52ba8abc6145a6,2024-11-21T01:50:32.270000 +CVE-2013-1860,0,0,218b4777f93ab72aceb398a09aa3545b74a7f719a17ff8d23f7a6be2ca47e05a,2024-11-21T01:50:32.393000 +CVE-2013-1861,0,0,81daadab5d0cde98527427257264089f876b8969cf72faaca252afc09317483a,2024-11-21T01:50:32.567000 +CVE-2013-1862,0,0,f592ad7e43552fa08818c4fcf0283d0f0428af01aa7ea52f3d976c87e43aa757,2024-11-21T01:50:32.763000 +CVE-2013-1863,0,0,3282ed1c93a71d3473376261c66eb85b5edc2764f239b15f87ee79dd02521bc0,2024-11-21T01:50:32.997000 +CVE-2013-1864,0,0,99a5953bc500115279a7a70db2e8591945773d4c819a3a0fc5526223491d9b4a,2024-11-21T01:50:33.123000 +CVE-2013-1865,0,0,c13beb0adc8141142431aa96f8a8a025ece39485b9dc54678008256199c849db,2024-11-21T01:50:33.250000 CVE-2013-1866,0,0,9e4b3c470c64353506dc3d69aa26e20f387b5b9a8731522a79a52de422211360,2020-02-03T18:43:18.640000 CVE-2013-1867,0,0,6643f470b678da71f913bdb1f23ca595a3f6037e711fcea0a28a9bb52c1bc6b4,2020-02-03T18:43:09.343000 -CVE-2013-1868,0,1,b6a44af8ebd7f460f1d4507cfbac7f9325db7254bee18bc78c1b273952a76675,2024-11-21T01:50:33.610000 -CVE-2013-1869,0,1,1381643d14e9b9423008f124852d0686a45b413cbcb403dc3dd5099a2a8b4ee1,2024-11-21T01:50:33.757000 +CVE-2013-1868,0,0,b6a44af8ebd7f460f1d4507cfbac7f9325db7254bee18bc78c1b273952a76675,2024-11-21T01:50:33.610000 +CVE-2013-1869,0,0,1381643d14e9b9423008f124852d0686a45b413cbcb403dc3dd5099a2a8b4ee1,2024-11-21T01:50:33.757000 CVE-2013-1870,0,0,85ab1be3efd17cf5178185ab34b0e6c8fcfa8ed99a3c6968611562deb0163b11,2023-11-07T02:14:51.107000 -CVE-2013-1871,0,1,698920e835218e4dc3e4615f1f745a71b83a1c01d4031352965454ae30c29252,2024-11-21T01:50:33.900000 -CVE-2013-1872,0,1,d185603e9947b0e4b381ca05b209bf3bcaf8b8027ebd20f1db6c44a842398199,2024-11-21T01:50:34.023000 +CVE-2013-1871,0,0,698920e835218e4dc3e4615f1f745a71b83a1c01d4031352965454ae30c29252,2024-11-21T01:50:33.900000 +CVE-2013-1872,0,0,d185603e9947b0e4b381ca05b209bf3bcaf8b8027ebd20f1db6c44a842398199,2024-11-21T01:50:34.023000 CVE-2013-1873,0,0,0a543a4caada279a95ae71ba6dd1434195932690d0d02116be4c76af9cda0524,2023-11-07T02:14:51.410000 CVE-2013-1874,0,0,6053a43a9aa824ac430b5a7ae2d314db8e3f81e898ece8be375d4409ff681f35,2023-11-07T02:14:51.633000 -CVE-2013-1875,0,1,f55ca2693acc9081a67709e0931a48bb61f0c2d185897a77799eae2b67c3923f,2024-11-21T01:50:34.300000 +CVE-2013-1875,0,0,f55ca2693acc9081a67709e0931a48bb61f0c2d185897a77799eae2b67c3923f,2024-11-21T01:50:34.300000 CVE-2013-1876,0,0,64f66100d87a440d544cb64e78b971459b763c77e983bc39da918217f0b9f972,2023-11-07T02:14:51.710000 CVE-2013-1877,0,0,dc56470df29ed4e81a4ede1756752463b043fa467b5c3e3e2bf9d8c3d173ade8,2023-11-07T02:14:51.940000 CVE-2013-1878,0,0,c466bde4e4ee2d3e022027cb52adfcbbae6160426e2857fcb41906e1147a6034,2023-11-07T02:14:52.163000 -CVE-2013-1879,0,1,dbe23b303116f9d865358adb4845c0165c5b9e81f7cbb4a1e2bbe39b41a7925d,2024-11-21T01:50:34.457000 -CVE-2013-1880,0,1,ad5899099b7b2bd4f7b4602a8f89f0d432eb54061cb1d100bf7992bd4974018e,2024-11-21T01:50:34.583000 -CVE-2013-1881,0,1,ec432c006db3f5ce1667480fe8169a63c3db6187c2baaabae6b4649341faf460,2024-11-21T01:50:34.717000 +CVE-2013-1879,0,0,dbe23b303116f9d865358adb4845c0165c5b9e81f7cbb4a1e2bbe39b41a7925d,2024-11-21T01:50:34.457000 +CVE-2013-1880,0,0,ad5899099b7b2bd4f7b4602a8f89f0d432eb54061cb1d100bf7992bd4974018e,2024-11-21T01:50:34.583000 +CVE-2013-1881,0,0,ec432c006db3f5ce1667480fe8169a63c3db6187c2baaabae6b4649341faf460,2024-11-21T01:50:34.717000 CVE-2013-1883,0,0,34fd6b3ff62079f2474ba25dc0249687e436bc7c9a0914a40ffbca0c02638c56,2017-08-29T01:33:11.950000 -CVE-2013-1884,0,1,8953ef14c88ca74d38be537bea1bf50637debb497deb58a611031b65dd0daf33,2024-11-21T01:50:34.990000 -CVE-2013-1885,0,1,e46c86dcf7afed3896ca8f591893419b97286c7994e6c89d00920543186ffbcb,2024-11-21T01:50:35.113000 -CVE-2013-1886,0,1,f371471afe1ad681d46fcf68a8a0ef1c83f1bcfd0eb32d6b147e619b1c3c82c4,2024-11-21T01:50:35.233000 -CVE-2013-1887,0,1,16c5340936f215135cce4d8744928ad7f1bab3bcd3bca5667669e3e33c25de6e,2024-11-21T01:50:35.350000 -CVE-2013-1888,0,1,86d340a91cf93bc5306d401aded523ff40cb55199c2c230ab060224e3241e99a,2024-11-21T01:50:35.490000 +CVE-2013-1884,0,0,8953ef14c88ca74d38be537bea1bf50637debb497deb58a611031b65dd0daf33,2024-11-21T01:50:34.990000 +CVE-2013-1885,0,0,e46c86dcf7afed3896ca8f591893419b97286c7994e6c89d00920543186ffbcb,2024-11-21T01:50:35.113000 +CVE-2013-1886,0,0,f371471afe1ad681d46fcf68a8a0ef1c83f1bcfd0eb32d6b147e619b1c3c82c4,2024-11-21T01:50:35.233000 +CVE-2013-1887,0,0,16c5340936f215135cce4d8744928ad7f1bab3bcd3bca5667669e3e33c25de6e,2024-11-21T01:50:35.350000 +CVE-2013-1888,0,0,86d340a91cf93bc5306d401aded523ff40cb55199c2c230ab060224e3241e99a,2024-11-21T01:50:35.490000 CVE-2013-1889,0,0,4954c0a664b2518a53526cc3209d1808a2d3b18d61ad169e1aee327a96648adc,2023-11-07T02:14:52.467000 -CVE-2013-1890,0,1,eb0078a9dab10dff5048d5e0c51ddc8652192cc1a7d8f7bcff6d960a192c2aa0,2024-11-21T01:50:35.750000 +CVE-2013-1890,0,0,eb0078a9dab10dff5048d5e0c51ddc8652192cc1a7d8f7bcff6d960a192c2aa0,2024-11-21T01:50:35.750000 CVE-2013-1891,0,0,751e074b254e35687cd6c0adb890d322f0fd7a07dee716b0d850b3318bf369da,2022-07-07T15:22:12.177000 -CVE-2013-1892,0,1,b02423833dcfb51d9c0397105a6d58880f742ca07c922f96c0125717912bffc7,2024-11-21T01:50:36.037000 -CVE-2013-1893,0,1,e85ec44fb29dc24f2197dc79a2c71800714b00745356a40114dedcce3cad2589,2024-11-21T01:50:36.160000 +CVE-2013-1892,0,0,b02423833dcfb51d9c0397105a6d58880f742ca07c922f96c0125717912bffc7,2024-11-21T01:50:36.037000 +CVE-2013-1893,0,0,e85ec44fb29dc24f2197dc79a2c71800714b00745356a40114dedcce3cad2589,2024-11-21T01:50:36.160000 CVE-2013-1894,0,0,2e9e5b210c731b393ad81a7fa9706f3c40acd5eed276e2574012bb827200f4a0,2023-11-07T02:14:52.567000 CVE-2013-1895,0,0,05d7c0b00e5ae7207e77dbcfb089b427e2713107a7963ca35faf0d689921af23,2020-02-04T16:49:58.710000 -CVE-2013-1896,0,1,30ef00ee51b8356d992cb2745f1a9c28b08800e17d3192e9a5cf2f531cb30cef,2024-11-21T01:50:36.410000 -CVE-2013-1897,0,1,fa520ae3faf6ab51f3e14ad243e3fdd2cfaa4e74c36af6d46175a20b7a3583f2,2024-11-21T01:50:36.597000 -CVE-2013-1898,0,1,5945eb4aa7862fe0ce9407880fd94ae3f0d6e8733508b2235b8bcb463684c11b,2024-11-21T01:50:36.727000 -CVE-2013-1899,0,1,3cd3daf155159a1a125b68c645c6d7120bcc4d5473bb98a3c9ea56e895188b9c,2024-11-21T01:50:36.843000 -CVE-2013-1900,0,1,b4270d795e1648c25b14f25deee3fe81fb7864cf0822f5a52b4e9d3ec97f5c46,2024-11-21T01:50:37.027000 -CVE-2013-1901,0,1,f67a28e872c51a72f62fd2476fdd5c7a57ba13c905885c07f8754deaea17b616,2024-11-21T01:50:37.177000 -CVE-2013-1902,0,1,d486888adc0e3d04e7d118801dd5e50545025cfd6915ce50d5d60781bb02faa2,2024-11-21T01:50:37.310000 -CVE-2013-1903,0,1,4aae6b2bc36f6ea05a9e1505c825e3d15bb09664ef6c07a3a8190e7d948bf4c5,2024-11-21T01:50:37.443000 -CVE-2013-1904,0,1,f908aa6719469fd82c9bd5c75d6e95f527328fc5ee30b5680d4d67d151371ff1,2024-11-21T01:50:37.570000 -CVE-2013-1905,0,1,f3fde5dc1b1a95119adc993f57fc8d677fe09244dda1cfd1ee176241bf439a5e,2024-11-21T01:50:37.700000 -CVE-2013-1906,0,1,715900bdb43b70a5c6390550399de045f579089014ccda02093e9e8a6b6e00ab,2024-11-21T01:50:37.820000 -CVE-2013-1907,0,1,ef18864840cbd657dd21cbe6477eba6bb511960465198617a02ac3b6825814a3,2024-11-21T01:50:37.927000 -CVE-2013-1908,0,1,fc49acaa027f8a156fca5c26e75ace4625a35b7d1ccdca40cf95e5e69d0378f4,2024-11-21T01:50:38.047000 -CVE-2013-1909,0,1,bbeffc5eddd7432b30750b156cabb2cc8ab4d298dba6d9f212c566fc80240cfa,2024-11-21T01:50:38.163000 +CVE-2013-1896,0,0,30ef00ee51b8356d992cb2745f1a9c28b08800e17d3192e9a5cf2f531cb30cef,2024-11-21T01:50:36.410000 +CVE-2013-1897,0,0,fa520ae3faf6ab51f3e14ad243e3fdd2cfaa4e74c36af6d46175a20b7a3583f2,2024-11-21T01:50:36.597000 +CVE-2013-1898,0,0,5945eb4aa7862fe0ce9407880fd94ae3f0d6e8733508b2235b8bcb463684c11b,2024-11-21T01:50:36.727000 +CVE-2013-1899,0,0,3cd3daf155159a1a125b68c645c6d7120bcc4d5473bb98a3c9ea56e895188b9c,2024-11-21T01:50:36.843000 +CVE-2013-1900,0,0,b4270d795e1648c25b14f25deee3fe81fb7864cf0822f5a52b4e9d3ec97f5c46,2024-11-21T01:50:37.027000 +CVE-2013-1901,0,0,f67a28e872c51a72f62fd2476fdd5c7a57ba13c905885c07f8754deaea17b616,2024-11-21T01:50:37.177000 +CVE-2013-1902,0,0,d486888adc0e3d04e7d118801dd5e50545025cfd6915ce50d5d60781bb02faa2,2024-11-21T01:50:37.310000 +CVE-2013-1903,0,0,4aae6b2bc36f6ea05a9e1505c825e3d15bb09664ef6c07a3a8190e7d948bf4c5,2024-11-21T01:50:37.443000 +CVE-2013-1904,0,0,f908aa6719469fd82c9bd5c75d6e95f527328fc5ee30b5680d4d67d151371ff1,2024-11-21T01:50:37.570000 +CVE-2013-1905,0,0,f3fde5dc1b1a95119adc993f57fc8d677fe09244dda1cfd1ee176241bf439a5e,2024-11-21T01:50:37.700000 +CVE-2013-1906,0,0,715900bdb43b70a5c6390550399de045f579089014ccda02093e9e8a6b6e00ab,2024-11-21T01:50:37.820000 +CVE-2013-1907,0,0,ef18864840cbd657dd21cbe6477eba6bb511960465198617a02ac3b6825814a3,2024-11-21T01:50:37.927000 +CVE-2013-1908,0,0,fc49acaa027f8a156fca5c26e75ace4625a35b7d1ccdca40cf95e5e69d0378f4,2024-11-21T01:50:38.047000 +CVE-2013-1909,0,0,bbeffc5eddd7432b30750b156cabb2cc8ab4d298dba6d9f212c566fc80240cfa,2024-11-21T01:50:38.163000 CVE-2013-1910,0,0,0d738c9ac902f7eacd407bd394c3ac4479c58245e6630734930134f8129bb898,2020-08-18T15:05:49.313000 -CVE-2013-1911,0,1,25a77f9f8b817051cfc0468cbc71869428f97bb2c33036bd323a5280cc89aaaa,2024-11-21T01:50:39.500000 -CVE-2013-1912,0,1,4ece02a777ae2d8ec6f2f08b7944b41429b682624fe60184661bf987522989f6,2024-11-21T01:50:39.710000 -CVE-2013-1913,0,1,2b71f775d6f278a3eb18a947e08656a5b98472421d919d797b20ecffdd4b0703,2024-11-21T01:50:39.833000 -CVE-2013-1914,0,1,1099bf634f568177dae265c024670e71257f29f2befe155ac2c403a5f03038c8,2024-11-21T01:50:39.950000 -CVE-2013-1915,0,1,42c3325efcd28ba7b56beb636599260b172eced74a9bebe3e665698fda170bfc,2024-11-21T01:50:40.090000 +CVE-2013-1911,0,0,25a77f9f8b817051cfc0468cbc71869428f97bb2c33036bd323a5280cc89aaaa,2024-11-21T01:50:39.500000 +CVE-2013-1912,0,0,4ece02a777ae2d8ec6f2f08b7944b41429b682624fe60184661bf987522989f6,2024-11-21T01:50:39.710000 +CVE-2013-1913,0,0,2b71f775d6f278a3eb18a947e08656a5b98472421d919d797b20ecffdd4b0703,2024-11-21T01:50:39.833000 +CVE-2013-1914,0,0,1099bf634f568177dae265c024670e71257f29f2befe155ac2c403a5f03038c8,2024-11-21T01:50:39.950000 +CVE-2013-1915,0,0,42c3325efcd28ba7b56beb636599260b172eced74a9bebe3e665698fda170bfc,2024-11-21T01:50:40.090000 CVE-2013-1916,0,0,78a2e63cdf1c4189312d12761e38fa19ff6be8f573d199dd3ad6702a17bfb5c4,2022-07-07T16:15:40.403000 -CVE-2013-1917,0,1,bd44b590b089830317480ca906869627c8266b6b22ee73c9244e1d052be2ee3a,2024-11-21T01:50:40.357000 -CVE-2013-1918,0,1,868efe1afeebe868d8a23dec136b7bf417ccb9822a20d3d2b37b0b043d0d340e,2024-11-21T01:50:40.477000 -CVE-2013-1919,0,1,7b5e90a6f9727cfd607a8f7ec651dcc361d3a27f3769f3e08101a641592d0870,2024-11-21T01:50:40.597000 -CVE-2013-1920,0,1,3ddc2c388f2e148ad73756d1c9ca550ebf71f0dac7b45ed3b64e338f25451e77,2024-11-21T01:50:40.710000 -CVE-2013-1921,0,1,0bc0f1b10f5de44ea082d6265cea4c65a5228f2ba0c95e04e725f174902947c1,2024-11-21T01:50:40.843000 -CVE-2013-1922,0,1,9510d4768613a581cf1c7a42b3eaaae89a6d1608b249a634450ac573569af4f4,2024-11-21T01:50:40.960000 -CVE-2013-1923,0,1,532e91416452588e76ea9a897e4bb419cb2b3f45af14c5c6707008e42c6a5e70,2024-11-21T01:50:41.070000 +CVE-2013-1917,0,0,bd44b590b089830317480ca906869627c8266b6b22ee73c9244e1d052be2ee3a,2024-11-21T01:50:40.357000 +CVE-2013-1918,0,0,868efe1afeebe868d8a23dec136b7bf417ccb9822a20d3d2b37b0b043d0d340e,2024-11-21T01:50:40.477000 +CVE-2013-1919,0,0,7b5e90a6f9727cfd607a8f7ec651dcc361d3a27f3769f3e08101a641592d0870,2024-11-21T01:50:40.597000 +CVE-2013-1920,0,0,3ddc2c388f2e148ad73756d1c9ca550ebf71f0dac7b45ed3b64e338f25451e77,2024-11-21T01:50:40.710000 +CVE-2013-1921,0,0,0bc0f1b10f5de44ea082d6265cea4c65a5228f2ba0c95e04e725f174902947c1,2024-11-21T01:50:40.843000 +CVE-2013-1922,0,0,9510d4768613a581cf1c7a42b3eaaae89a6d1608b249a634450ac573569af4f4,2024-11-21T01:50:40.960000 +CVE-2013-1923,0,0,532e91416452588e76ea9a897e4bb419cb2b3f45af14c5c6707008e42c6a5e70,2024-11-21T01:50:41.070000 CVE-2013-1924,0,0,66acfae319ce1e0dbe333ec57ae061407066e2d6a864113660614b88590c2306,2020-02-19T20:04:52.020000 -CVE-2013-1925,0,1,8147c91f93e996f025151ea74cd44fd0cfe5d082ccc0596dc9ff8035d882a42b,2024-11-21T01:50:41.310000 -CVE-2013-1926,0,1,db9af83fba8210899772aba9f8500d7fa2d78dc453251fb39033133d95a56f73,2024-11-21T01:50:41.423000 -CVE-2013-1927,0,1,25294a26f54249782561a342a4ca1566faa1c7808ad0bffc08b6078384c425c6,2024-11-21T01:50:41.563000 -CVE-2013-1928,0,1,da7908ff2aa77cffc069a0109a3d4211492229e77fa8dc8d4ed542f6007e50ce,2024-11-21T01:50:41.700000 -CVE-2013-1929,0,1,f967e504a7fc477256d20f01d5ee9854fc22cc25629e4c03c43b4612c1df57ee,2024-11-21T01:50:41.843000 +CVE-2013-1925,0,0,8147c91f93e996f025151ea74cd44fd0cfe5d082ccc0596dc9ff8035d882a42b,2024-11-21T01:50:41.310000 +CVE-2013-1926,0,0,db9af83fba8210899772aba9f8500d7fa2d78dc453251fb39033133d95a56f73,2024-11-21T01:50:41.423000 +CVE-2013-1927,0,0,25294a26f54249782561a342a4ca1566faa1c7808ad0bffc08b6078384c425c6,2024-11-21T01:50:41.563000 +CVE-2013-1928,0,0,da7908ff2aa77cffc069a0109a3d4211492229e77fa8dc8d4ed542f6007e50ce,2024-11-21T01:50:41.700000 +CVE-2013-1929,0,0,f967e504a7fc477256d20f01d5ee9854fc22cc25629e4c03c43b4612c1df57ee,2024-11-21T01:50:41.843000 CVE-2013-1930,0,0,e6ce932939a62cb99483348e99a75f5d93ee77057f4e42b797a57c76bab0e9c1,2019-11-07T18:29:37.690000 CVE-2013-1931,0,0,fc3c6fa69bb484e4de871660d6940bfdf661332b31739c6ea3c1b5211a02bae2,2019-11-07T14:54:23.170000 CVE-2013-1932,0,0,023eb4ea37c3ebd3f1054eb6fdf9e61cda97a964ffc2c9873cb4c0824192e607,2019-11-06T13:37:08.640000 -CVE-2013-1933,0,1,bec5a6c9adbe00da4b390934ec72015691c3b528e0b49caf3447278aeeb6448e,2024-11-21T01:50:42.327000 +CVE-2013-1933,0,0,bec5a6c9adbe00da4b390934ec72015691c3b528e0b49caf3447278aeeb6448e,2024-11-21T01:50:42.327000 CVE-2013-1934,0,0,2657d44bff253c195e577356f632eef0bf1e479ab9fb631d6c1c34ec85159e76,2019-11-01T19:58:52.487000 -CVE-2013-1935,0,1,c1b15a70f75aeda39f7e2e45b5e5611e2a95b4b9ed83abf1fa44a92a73a6ec31,2024-11-21T01:50:42.537000 +CVE-2013-1935,0,0,c1b15a70f75aeda39f7e2e45b5e5611e2a95b4b9ed83abf1fa44a92a73a6ec31,2024-11-21T01:50:42.537000 CVE-2013-1936,0,0,eae2acaab0cae6ba47871bae1a87777e1b174671403a36a7126d59adb8816860,2023-11-07T02:14:53.213000 -CVE-2013-1937,0,1,a0d7e4de3086e459f44a8f9bcb3cd41475fbdd715f2e8faee5808fdb91a76374,2024-11-21T01:50:42.647000 +CVE-2013-1937,0,0,a0d7e4de3086e459f44a8f9bcb3cd41475fbdd715f2e8faee5808fdb91a76374,2024-11-21T01:50:42.647000 CVE-2013-1938,0,0,b55ff6c2b46ffac070aa0b9d68b857ced74964297220bbc311548fe09bdfc08d,2020-02-25T18:48:40.807000 -CVE-2013-1939,0,1,9fcc7e7498ea55de963053d7ee2d1181ad4e471a44f6797becd22143fcae03b1,2024-11-21T01:50:42.873000 -CVE-2013-1940,0,1,d91f856a70923626965e2e426c12283ddc7be4ee42f81a002c46177a456e5d73,2024-11-21T01:50:42.980000 +CVE-2013-1939,0,0,9fcc7e7498ea55de963053d7ee2d1181ad4e471a44f6797becd22143fcae03b1,2024-11-21T01:50:42.873000 +CVE-2013-1940,0,0,d91f856a70923626965e2e426c12283ddc7be4ee42f81a002c46177a456e5d73,2024-11-21T01:50:42.980000 CVE-2013-1941,0,0,d98132bc64408e49094cb42c523726e77c1a13738769e581e63927581d225de9,2014-06-04T18:18:39.597000 -CVE-2013-1942,0,1,897f818daa00b664ffd408db74b1326ce748268714c2ebee9e8c56ab5ceaac2a,2024-11-21T01:50:43.190000 -CVE-2013-1943,0,1,2793dc36c1a378f4454328cc1658652d41633bbb6f4bae8f51459c74b0152f05,2024-11-21T01:50:43.310000 -CVE-2013-1944,0,1,42d0a2a5add8070ace3b8764c7939c85b9dcfdc96c598e9501fc0ffbbda5c147,2024-11-21T01:50:43.417000 +CVE-2013-1942,0,0,897f818daa00b664ffd408db74b1326ce748268714c2ebee9e8c56ab5ceaac2a,2024-11-21T01:50:43.190000 +CVE-2013-1943,0,0,2793dc36c1a378f4454328cc1658652d41633bbb6f4bae8f51459c74b0152f05,2024-11-21T01:50:43.310000 +CVE-2013-1944,0,0,42d0a2a5add8070ace3b8764c7939c85b9dcfdc96c598e9501fc0ffbbda5c147,2024-11-21T01:50:43.417000 CVE-2013-1945,0,0,49007500ee544a0b1210d767ff06348fa4c487f0697c231ce060f979e0b7e1c8,2019-11-06T18:15:38.993000 -CVE-2013-1946,0,1,78bad3a14c3df4475033648625818a725bbdbcad0b53843ba81c309e6482e164,2024-11-21T01:50:43.667000 -CVE-2013-1947,0,1,479dc6a7033ee4908afda14b7b7e97b65429bba7532b94c3ddf7bff7499bec3d,2024-11-21T01:50:43.773000 -CVE-2013-1948,0,1,1318f1a6de4405b582c211a2131bb2196db33b82fc23657fc47d49b2f1a514c5,2024-11-21T01:50:43.890000 -CVE-2013-1949,0,1,11539c3417021483eb934afb01b8e388b116b26ea9c76edae92ed52421305fb7,2024-11-21T01:50:44.003000 -CVE-2013-1950,0,1,d5bc055c0cd93bc265b68f29835daf3c97c6dc39efc6d638107820f62c9cd030,2024-11-21T01:50:44.113000 +CVE-2013-1946,0,0,78bad3a14c3df4475033648625818a725bbdbcad0b53843ba81c309e6482e164,2024-11-21T01:50:43.667000 +CVE-2013-1947,0,0,479dc6a7033ee4908afda14b7b7e97b65429bba7532b94c3ddf7bff7499bec3d,2024-11-21T01:50:43.773000 +CVE-2013-1948,0,0,1318f1a6de4405b582c211a2131bb2196db33b82fc23657fc47d49b2f1a514c5,2024-11-21T01:50:43.890000 +CVE-2013-1949,0,0,11539c3417021483eb934afb01b8e388b116b26ea9c76edae92ed52421305fb7,2024-11-21T01:50:44.003000 +CVE-2013-1950,0,0,d5bc055c0cd93bc265b68f29835daf3c97c6dc39efc6d638107820f62c9cd030,2024-11-21T01:50:44.113000 CVE-2013-1951,0,0,4285e07149a5143301d3a4d1b11288fda89aa912bbe4ded4743a5fe31573312a,2020-08-18T15:05:49.313000 -CVE-2013-1952,0,1,daf6d6601e5f5c204bce116f933732c3161e2d8158a6d0d2fc55a062fa79b325,2024-11-21T01:50:44.330000 -CVE-2013-1953,0,1,a73495bd90650aec01cac04ee4025936bf16cd6d63145824627745c32e1a30da,2024-11-21T01:50:44.440000 -CVE-2013-1954,0,1,b988ad0512786e51d406836c432f727dce5887843ca246fc54d07e867752e721,2024-11-21T01:50:44.540000 -CVE-2013-1955,0,1,0361730095845a20627482769186bd0843a0a7c55de66592afaf9cb856ca7abe,2024-11-21T01:50:44.653000 -CVE-2013-1956,0,1,b3f525ed76d3c9cb921b0bacd0ef56a70051c74a801959744e7faa0b2faae0da,2024-11-21T01:50:44.767000 -CVE-2013-1957,0,1,d30cb7a4cccd3bcdcea58bb9dc7694b2edce2873e68764218cde989b39d457a4,2024-11-21T01:50:44.870000 -CVE-2013-1958,0,1,d177663d5baed90e1e8226ef849926159e18f3c73a789f1a5f1c825a23363436,2024-11-21T01:50:44.980000 -CVE-2013-1959,0,1,f234a96791eb6d68313e75ed1c01bc04df1f581e1e332f72f954fcffd980f537,2024-11-21T01:50:45.080000 -CVE-2013-1960,0,1,aa1aa96257ff1646d1e1d09b24fe61fa9a0b005ce356488e991d44833e335550,2024-11-21T01:50:45.210000 -CVE-2013-1961,0,1,7db8c422656f6d00c0b853b3bc8e811aa46a979e89f5fbe99cb41aedea08b0c6,2024-11-21T01:50:45.330000 -CVE-2013-1962,0,1,88ce98f4c41aa9caa91c8105f10ed7bbfc1cbf0647c819b1ede2a9e86b8c6341,2024-11-21T01:50:45.450000 -CVE-2013-1963,0,1,f610d3127cab1fee791cbaa53a1d013990b1af6b440dd1452215395835ddd8cd,2024-11-21T01:50:45.560000 -CVE-2013-1964,0,1,340f08057cdf04c1a8ec6bc303f41763552b5d414972ce0a80f896413ac53497,2024-11-21T01:50:45.657000 -CVE-2013-1965,0,1,b640960fee6b10dd71de6634cf72af1d24bff32d11f055d1237cd21ff5f75f0e,2024-11-21T01:50:45.760000 -CVE-2013-1966,0,1,1464b9500146342b76c60f31b49b96e9b35e8dab6b679bccc5b348e02641bf23,2024-11-21T01:50:45.857000 -CVE-2013-1967,0,1,b91aa13b0559845623e576e5cf946eb5124116d6ff478c3aca0ca07214e7c6f1,2024-11-21T01:50:45.970000 -CVE-2013-1968,0,1,3cae6a95f155967a3bae8838a03eb4bee3dd8ea89fd2954a66b3323f2ae68d73,2024-11-21T01:50:46.100000 -CVE-2013-1969,0,1,976a4ed5998b345838f407decaed044cf09fb473156e358a485c0f4e7f2b6e8a,2024-11-21T01:50:46.220000 +CVE-2013-1952,0,0,daf6d6601e5f5c204bce116f933732c3161e2d8158a6d0d2fc55a062fa79b325,2024-11-21T01:50:44.330000 +CVE-2013-1953,0,0,a73495bd90650aec01cac04ee4025936bf16cd6d63145824627745c32e1a30da,2024-11-21T01:50:44.440000 +CVE-2013-1954,0,0,b988ad0512786e51d406836c432f727dce5887843ca246fc54d07e867752e721,2024-11-21T01:50:44.540000 +CVE-2013-1955,0,0,0361730095845a20627482769186bd0843a0a7c55de66592afaf9cb856ca7abe,2024-11-21T01:50:44.653000 +CVE-2013-1956,0,0,b3f525ed76d3c9cb921b0bacd0ef56a70051c74a801959744e7faa0b2faae0da,2024-11-21T01:50:44.767000 +CVE-2013-1957,0,0,d30cb7a4cccd3bcdcea58bb9dc7694b2edce2873e68764218cde989b39d457a4,2024-11-21T01:50:44.870000 +CVE-2013-1958,0,0,d177663d5baed90e1e8226ef849926159e18f3c73a789f1a5f1c825a23363436,2024-11-21T01:50:44.980000 +CVE-2013-1959,0,0,f234a96791eb6d68313e75ed1c01bc04df1f581e1e332f72f954fcffd980f537,2024-11-21T01:50:45.080000 +CVE-2013-1960,0,0,aa1aa96257ff1646d1e1d09b24fe61fa9a0b005ce356488e991d44833e335550,2024-11-21T01:50:45.210000 +CVE-2013-1961,0,0,7db8c422656f6d00c0b853b3bc8e811aa46a979e89f5fbe99cb41aedea08b0c6,2024-11-21T01:50:45.330000 +CVE-2013-1962,0,0,88ce98f4c41aa9caa91c8105f10ed7bbfc1cbf0647c819b1ede2a9e86b8c6341,2024-11-21T01:50:45.450000 +CVE-2013-1963,0,0,f610d3127cab1fee791cbaa53a1d013990b1af6b440dd1452215395835ddd8cd,2024-11-21T01:50:45.560000 +CVE-2013-1964,0,0,340f08057cdf04c1a8ec6bc303f41763552b5d414972ce0a80f896413ac53497,2024-11-21T01:50:45.657000 +CVE-2013-1965,0,0,b640960fee6b10dd71de6634cf72af1d24bff32d11f055d1237cd21ff5f75f0e,2024-11-21T01:50:45.760000 +CVE-2013-1966,0,0,1464b9500146342b76c60f31b49b96e9b35e8dab6b679bccc5b348e02641bf23,2024-11-21T01:50:45.857000 +CVE-2013-1967,0,0,b91aa13b0559845623e576e5cf946eb5124116d6ff478c3aca0ca07214e7c6f1,2024-11-21T01:50:45.970000 +CVE-2013-1968,0,0,3cae6a95f155967a3bae8838a03eb4bee3dd8ea89fd2954a66b3323f2ae68d73,2024-11-21T01:50:46.100000 +CVE-2013-1969,0,0,976a4ed5998b345838f407decaed044cf09fb473156e358a485c0f4e7f2b6e8a,2024-11-21T01:50:46.220000 CVE-2013-1970,0,0,fbf72786887070ee77a7099a86ced48b34bdc805ff8792a9ea814da97210200a,2023-11-07T02:14:53.907000 -CVE-2013-1971,0,1,f8f11c74b814f4887a95b84a1cfe6e8dcd646f31dd89d5190c94de965e45523d,2024-11-21T01:50:46.343000 -CVE-2013-1972,0,1,6593396ab8cc3946f7b472dac146d723ef8314f9edbb38f57655262801e00047,2024-11-21T01:50:46.447000 +CVE-2013-1971,0,0,f8f11c74b814f4887a95b84a1cfe6e8dcd646f31dd89d5190c94de965e45523d,2024-11-21T01:50:46.343000 +CVE-2013-1972,0,0,6593396ab8cc3946f7b472dac146d723ef8314f9edbb38f57655262801e00047,2024-11-21T01:50:46.447000 CVE-2013-1973,0,0,1deff27e2482429c78b6befb30a1311bca9b3c3486be3d9d86893a45749eb698,2014-06-24T15:01:56.060000 -CVE-2013-1976,0,1,8eb37c0bc39b9f33a2c49a18221c35b41cfb4bb2218e6626ae80db30c9c33a98,2024-11-21T01:50:46.653000 -CVE-2013-1977,0,1,3339afd29b16cb82b07c7708e5d575313832e892217276587b94c331ecdc0cb3,2024-11-21T01:50:46.763000 -CVE-2013-1978,0,1,c3c5c25db173b43092a92fb1c8cc1805da1ead2b4d0fac154157885ce1e74029,2024-11-21T01:50:46.863000 -CVE-2013-1979,0,1,f0645fa104441b6564f25b66cfe1c570df67692a8eda7a312f993b73139e9b13,2024-11-21T01:50:46.970000 -CVE-2013-1980,0,1,b7afdc7b5a4fa35aca28e5d61a2e7a50d419d29d67f50b45be72a1ec4e54fea7,2024-11-21T01:50:47.087000 -CVE-2013-1981,0,1,f1a90d8f1d52fa73c59872a69ecc7db43e6162742046ac888dfa7d62753e6b0b,2024-11-21T01:50:47.200000 -CVE-2013-1982,0,1,0a52119f1b8d08441ca07058b801caa89e377b6b6bef9cb6db50cfd8519667ca,2024-11-21T01:50:47.343000 -CVE-2013-1983,0,1,6218be49a8e642cce100068fd0c6658c5a8d3a6fca9f95857aed075229b44454,2024-11-21T01:50:47.470000 -CVE-2013-1984,0,1,1c307d9e78d79f6ae8623b407e73e3c61f3f80ea55d10a025494c04682e1cdcc,2024-11-21T01:50:47.600000 -CVE-2013-1985,0,1,9d86de3b8b9740765962d8f5661d45933cd9c1b5af38d905f562a51162579952,2024-11-21T01:50:47.727000 -CVE-2013-1986,0,1,aaa49314cd688718e964ed136d3ff7caccb0e379e271f18260e1f691e779252b,2024-11-21T01:50:47.857000 -CVE-2013-1987,0,1,b29faf5c706d07775ad9cec3c6fd6a9228f29f3371f5565b3417f91e30ccb871,2024-11-21T01:50:47.970000 -CVE-2013-1988,0,1,df9d9290cc8b3e6533a5aef2661a444f85830de0aef55f743768acc344c5f02c,2024-11-21T01:50:48.100000 -CVE-2013-1989,0,1,66b43dc38e886b74eabbdf83978552661486e1d4a096287ca12186aeaef7064c,2024-11-21T01:50:48.227000 -CVE-2013-1990,0,1,cf3122c096b4e2f55651b1ba6caa0c3c3e9ae4ead226b4fd57b2440d6d7fce0b,2024-11-21T01:50:48.350000 -CVE-2013-1991,0,1,d0fd85c902476688ed2fc89d0d9da68552b4c0cacf3c9f878f1814d14c133fd1,2024-11-21T01:50:48.477000 -CVE-2013-1992,0,1,549014495d6be21d3c4981dd9c0c1c81c32e2484e098c09b4892a52f0ffbed1f,2024-11-21T01:50:48.603000 -CVE-2013-1993,0,1,af264967411c7952bbb3ddf827e0c59442aa8612224c72249e58641511b3e3db,2024-11-21T01:50:48.740000 -CVE-2013-1994,0,1,1e701432e5ae5afcfcbbd0b0bf778cbfe2f32b5473b7fabccebf7ab95a856eb7,2024-11-21T01:50:48.867000 -CVE-2013-1995,0,1,53c8dd1a79e55b5159856782276c85b5c26ef3fe4be9e28329af5ef13ed578fa,2024-11-21T01:50:48.980000 -CVE-2013-1996,0,1,6a18324c12cebe8ba702fb400603f5444e5dcf54d5c8f5985a99898a63a4a40a,2024-11-21T01:50:49.093000 -CVE-2013-1997,0,1,56b5c2f433c1ce62b0297255c279c1a199c3c2a1475de16e7e5940ea6aa09fc4,2024-11-21T01:50:49.230000 -CVE-2013-1998,0,1,2176c1be683d84015ce70f7450de1ab8ff93b57fbf6c2c81893564a2cdb9b1a6,2024-11-21T01:50:49.353000 -CVE-2013-1999,0,1,80b24ec5cad2364960c08630765c4fa36be3199a3522c6c5f427981f2a9c8a88,2024-11-21T01:50:49.470000 -CVE-2013-2000,0,1,68649fc5d6624c1784a47e36baeb25702219f97ab2c5b9e54b0836fab472ea10,2024-11-21T01:50:50.200000 +CVE-2013-1976,0,0,8eb37c0bc39b9f33a2c49a18221c35b41cfb4bb2218e6626ae80db30c9c33a98,2024-11-21T01:50:46.653000 +CVE-2013-1977,0,0,3339afd29b16cb82b07c7708e5d575313832e892217276587b94c331ecdc0cb3,2024-11-21T01:50:46.763000 +CVE-2013-1978,0,0,c3c5c25db173b43092a92fb1c8cc1805da1ead2b4d0fac154157885ce1e74029,2024-11-21T01:50:46.863000 +CVE-2013-1979,0,0,f0645fa104441b6564f25b66cfe1c570df67692a8eda7a312f993b73139e9b13,2024-11-21T01:50:46.970000 +CVE-2013-1980,0,0,b7afdc7b5a4fa35aca28e5d61a2e7a50d419d29d67f50b45be72a1ec4e54fea7,2024-11-21T01:50:47.087000 +CVE-2013-1981,0,0,f1a90d8f1d52fa73c59872a69ecc7db43e6162742046ac888dfa7d62753e6b0b,2024-11-21T01:50:47.200000 +CVE-2013-1982,0,0,0a52119f1b8d08441ca07058b801caa89e377b6b6bef9cb6db50cfd8519667ca,2024-11-21T01:50:47.343000 +CVE-2013-1983,0,0,6218be49a8e642cce100068fd0c6658c5a8d3a6fca9f95857aed075229b44454,2024-11-21T01:50:47.470000 +CVE-2013-1984,0,0,1c307d9e78d79f6ae8623b407e73e3c61f3f80ea55d10a025494c04682e1cdcc,2024-11-21T01:50:47.600000 +CVE-2013-1985,0,0,9d86de3b8b9740765962d8f5661d45933cd9c1b5af38d905f562a51162579952,2024-11-21T01:50:47.727000 +CVE-2013-1986,0,0,aaa49314cd688718e964ed136d3ff7caccb0e379e271f18260e1f691e779252b,2024-11-21T01:50:47.857000 +CVE-2013-1987,0,0,b29faf5c706d07775ad9cec3c6fd6a9228f29f3371f5565b3417f91e30ccb871,2024-11-21T01:50:47.970000 +CVE-2013-1988,0,0,df9d9290cc8b3e6533a5aef2661a444f85830de0aef55f743768acc344c5f02c,2024-11-21T01:50:48.100000 +CVE-2013-1989,0,0,66b43dc38e886b74eabbdf83978552661486e1d4a096287ca12186aeaef7064c,2024-11-21T01:50:48.227000 +CVE-2013-1990,0,0,cf3122c096b4e2f55651b1ba6caa0c3c3e9ae4ead226b4fd57b2440d6d7fce0b,2024-11-21T01:50:48.350000 +CVE-2013-1991,0,0,d0fd85c902476688ed2fc89d0d9da68552b4c0cacf3c9f878f1814d14c133fd1,2024-11-21T01:50:48.477000 +CVE-2013-1992,0,0,549014495d6be21d3c4981dd9c0c1c81c32e2484e098c09b4892a52f0ffbed1f,2024-11-21T01:50:48.603000 +CVE-2013-1993,0,0,af264967411c7952bbb3ddf827e0c59442aa8612224c72249e58641511b3e3db,2024-11-21T01:50:48.740000 +CVE-2013-1994,0,0,1e701432e5ae5afcfcbbd0b0bf778cbfe2f32b5473b7fabccebf7ab95a856eb7,2024-11-21T01:50:48.867000 +CVE-2013-1995,0,0,53c8dd1a79e55b5159856782276c85b5c26ef3fe4be9e28329af5ef13ed578fa,2024-11-21T01:50:48.980000 +CVE-2013-1996,0,0,6a18324c12cebe8ba702fb400603f5444e5dcf54d5c8f5985a99898a63a4a40a,2024-11-21T01:50:49.093000 +CVE-2013-1997,0,0,56b5c2f433c1ce62b0297255c279c1a199c3c2a1475de16e7e5940ea6aa09fc4,2024-11-21T01:50:49.230000 +CVE-2013-1998,0,0,2176c1be683d84015ce70f7450de1ab8ff93b57fbf6c2c81893564a2cdb9b1a6,2024-11-21T01:50:49.353000 +CVE-2013-1999,0,0,80b24ec5cad2364960c08630765c4fa36be3199a3522c6c5f427981f2a9c8a88,2024-11-21T01:50:49.470000 +CVE-2013-2000,0,0,68649fc5d6624c1784a47e36baeb25702219f97ab2c5b9e54b0836fab472ea10,2024-11-21T01:50:50.200000 CVE-2013-20001,0,0,4fed1f7ea6a1495e4ea815544a930df5708cb3de78e367d72e389ba8a67d6ef5,2024-03-18T22:15:07.143000 CVE-2013-20002,0,0,594f27ee8732d7cad0f38aa0c53a7dd662dad57bd0efdb1a6405a1e82c816fda,2021-06-23T12:41:40.590000 CVE-2013-20003,0,0,47a9f7ad501fc4b65114a53863d66bb0d1057c38e01c98322e5a38fd2205fd3e,2022-02-09T15:41:04.353000 CVE-2013-20004,0,0,da7439c78c42e2c57f6ecf8a0178a57424e7bfdf42539cec668af10c53e3b226,2022-09-01T13:15:08.533000 -CVE-2013-2001,0,1,e3a55152c4b1c7af51216839bcb6eec683c142ac3563aa1cd01fe4795a5e9172,2024-11-21T01:50:50.320000 -CVE-2013-2002,0,1,9663092004ec1e4ce5290fea0ffa42b647d31300f2306be2136458756c2d087b,2024-11-21T01:50:50.430000 -CVE-2013-2003,0,1,3d5578631bbc5ec8a29b66cbd101d552660da1c13c30ec00385ddcbbfdcffc82,2024-11-21T01:50:50.550000 -CVE-2013-2004,0,1,2ba70aadcd4674a063b93c40370a9dcdf3c8c2cad5c3cc7bea1feb5d6ff0f9fe,2024-11-21T01:50:50.663000 -CVE-2013-2005,0,1,de845bdefcda0801026b54e646bf94fd5184faf5291dd548c52b6ef89f56744f,2024-11-21T01:50:50.773000 -CVE-2013-2006,0,1,5deac97647cb229cb48c44edd95ef0d573fc630e44054fb2838c5cb815e88003,2024-11-21T01:50:50.890000 -CVE-2013-2007,0,1,564d43f7748f022dbec28b9e04ee066e25946f630be327209a445f6362c1932b,2024-11-21T01:50:51.007000 +CVE-2013-2001,0,0,e3a55152c4b1c7af51216839bcb6eec683c142ac3563aa1cd01fe4795a5e9172,2024-11-21T01:50:50.320000 +CVE-2013-2002,0,0,9663092004ec1e4ce5290fea0ffa42b647d31300f2306be2136458756c2d087b,2024-11-21T01:50:50.430000 +CVE-2013-2003,0,0,3d5578631bbc5ec8a29b66cbd101d552660da1c13c30ec00385ddcbbfdcffc82,2024-11-21T01:50:50.550000 +CVE-2013-2004,0,0,2ba70aadcd4674a063b93c40370a9dcdf3c8c2cad5c3cc7bea1feb5d6ff0f9fe,2024-11-21T01:50:50.663000 +CVE-2013-2005,0,0,de845bdefcda0801026b54e646bf94fd5184faf5291dd548c52b6ef89f56744f,2024-11-21T01:50:50.773000 +CVE-2013-2006,0,0,5deac97647cb229cb48c44edd95ef0d573fc630e44054fb2838c5cb815e88003,2024-11-21T01:50:50.890000 +CVE-2013-2007,0,0,564d43f7748f022dbec28b9e04ee066e25946f630be327209a445f6362c1932b,2024-11-21T01:50:51.007000 CVE-2013-2008,0,0,120956cb1d30e411bc9b5a0b16360fbcb3e6b4cc1fc05705ff2b3757788d6038,2020-02-10T17:28:17.653000 CVE-2013-2009,0,0,8d7772947a825768b664c3194287539b7b2cad60132b3de8acec5847537c31fe,2020-02-10T18:24:09.370000 CVE-2013-2010,0,0,9c8daad084fc9f68a8331461915b1da34c912f03685ca01fab5abc1d889ffa07,2020-02-14T14:49:38.550000 CVE-2013-2011,0,0,4425b9a2544adedd349a2251b6bc61796c958a0ddd40d1df3fd6ca87df1a02df,2020-01-02T19:15:50.967000 CVE-2013-2012,0,0,6eda206fdccf6604829aa9316790b4cdc6f8a83712166c1673a6e6873a43118d,2020-08-18T15:05:49.313000 -CVE-2013-2013,0,1,39b31247b147d363b409664f753a0a503ae7c0a2e8de3a61d81997f3db46db62,2024-11-21T01:50:51.737000 +CVE-2013-2013,0,0,39b31247b147d363b409664f753a0a503ae7c0a2e8de3a61d81997f3db46db62,2024-11-21T01:50:51.737000 CVE-2013-2014,0,0,0a7b69f290a233a40cb54de2b080482ec6b35ca9c04a3f66d0797e4407b2cca7,2020-06-02T19:50:01.427000 -CVE-2013-2015,0,1,59fc1168dfe814101ee8ab2909a3e142a9fbb99bc7fce3a7a41ef8d953c8962a,2024-11-21T01:50:51.973000 +CVE-2013-2015,0,0,59fc1168dfe814101ee8ab2909a3e142a9fbb99bc7fce3a7a41ef8d953c8962a,2024-11-21T01:50:51.973000 CVE-2013-2016,0,0,625f10c74ef40b7e78c2b826c2e00033ee4c1219081ab27cbf1ea5ed03003574,2020-08-18T15:05:58.080000 -CVE-2013-2017,0,1,d9c369e604df52bd84d1823bb99b5160535a2137b1bc01038bc698856e2bbb1b,2024-11-21T01:50:52.247000 +CVE-2013-2017,0,0,d9c369e604df52bd84d1823bb99b5160535a2137b1bc01038bc698856e2bbb1b,2024-11-21T01:50:52.247000 CVE-2013-2018,0,0,c5183bab01b869bbc9d17c263f1d0fd339f8526524a2e5741a48f48034ecbabc,2020-02-21T13:42:28.910000 CVE-2013-2019,0,0,3c1ce978002c2fa78cac0cbbc0c3d9c7da445a6b076d9acdf5a421d0fd3cba2e,2017-08-29T01:33:13.450000 -CVE-2013-2020,0,1,6266fa1bd39c66553257b710f3592c2e045b45dc3d181fceb2f6a869a4827bbe,2024-11-21T01:50:52.623000 -CVE-2013-2021,0,1,6001d6a456781e69122358c5de261753e55cff5004155cf059a745a74ea8a3c0,2024-11-21T01:50:52.783000 -CVE-2013-2022,0,1,fcae801e25f0bd26977c381c267adb056447049c6b692626a1340934af58e949,2024-11-21T01:50:52.923000 -CVE-2013-2023,0,1,309670f78641fc909a557316eab316de66c5bcdf791310609a46b83c917ab177,2024-11-21T01:50:53.050000 +CVE-2013-2020,0,0,6266fa1bd39c66553257b710f3592c2e045b45dc3d181fceb2f6a869a4827bbe,2024-11-21T01:50:52.623000 +CVE-2013-2021,0,0,6001d6a456781e69122358c5de261753e55cff5004155cf059a745a74ea8a3c0,2024-11-21T01:50:52.783000 +CVE-2013-2022,0,0,fcae801e25f0bd26977c381c267adb056447049c6b692626a1340934af58e949,2024-11-21T01:50:52.923000 +CVE-2013-2023,0,0,309670f78641fc909a557316eab316de66c5bcdf791310609a46b83c917ab177,2024-11-21T01:50:53.050000 CVE-2013-2024,0,0,b4875f4ebee21b8ea6658dbf83c1913d75ee4b898f9af95109cdf64b483f7a13,2020-08-18T15:05:49.313000 -CVE-2013-2025,0,1,271fb592f9b73d2a50a72f3d98094b4d139dc42c6d5a91bca4d37b34fcb0a347,2024-11-21T01:50:53.310000 +CVE-2013-2025,0,0,271fb592f9b73d2a50a72f3d98094b4d139dc42c6d5a91bca4d37b34fcb0a347,2024-11-21T01:50:53.310000 CVE-2013-2026,0,0,f70eba5191ba9ce3a3f55e0e685af841edfcb7c02abd19ba5850e2cae13d1cfb,2023-11-07T02:14:54.690000 CVE-2013-2027,0,0,7a399f905369dd4b5049501044748c54425425f905cccf883070a986d8b15eda,2018-10-30T16:27:35.843000 -CVE-2013-2028,0,1,c7bf65e37e682d336306a83a40703cd210a7ed7fe6b576bb6c7873850eefed50,2024-11-21T01:50:53.560000 -CVE-2013-2029,0,1,1ce4d4d3c16aa0209462ed33eee5250c7d730726cafb4707fb4bb56b189ce208,2024-11-21T01:50:53.683000 -CVE-2013-2030,0,1,90265b844a9f684082b1f338cd8f59ce3dc6a7365df564c8a8541faba9cb4fe3,2024-11-21T01:50:53.797000 -CVE-2013-2031,0,1,5784622f2367a4becd95e527007a0d2be0b08bc96fc93007e1b22960c9d7dafa,2024-11-21T01:50:53.923000 -CVE-2013-2032,0,1,1e59944572e9819064e9a8de5e9a1142b48526bd7a52b91a65ab7fca52768193,2024-11-21T01:50:54.057000 -CVE-2013-2033,0,1,ca15f0181e421f6d9b246994e291ec3b44328a0d4b50fc895bcd8495a4dc910e,2024-11-21T01:50:54.187000 -CVE-2013-2034,0,1,9f0f25604e75361b03431fb85d70f49bbf97e58e2c928fbca0a03ce24bab000d,2024-11-21T01:50:54.300000 -CVE-2013-2035,0,1,84444b5c32d9de1288906114bf4f508922d7f20ae91d0964c86a029acd1beaef,2024-11-21T01:50:54.403000 -CVE-2013-2036,0,1,6d7c411ecb99c15b5e7314e6542d5f41fc96f1376d9fc251b7d06375e6b0a9f0,2024-11-21T01:50:54.530000 -CVE-2013-2037,0,1,aa994d0d456fce5534198ded054f4ddc57c1d9527fa813e8a3bb3c71cd094d4b,2024-11-21T01:50:54.640000 -CVE-2013-2038,0,1,1ff4964a8a779eae895a22e1c31710ad90e8f1010aca5b104ec94a2e09ed864e,2024-11-21T01:50:54.753000 -CVE-2013-2039,0,1,59aa57269ce9c7d930133f9298e6990431d58474d3d8306e195fd0f9c52a5c05,2024-11-21T01:50:54.877000 -CVE-2013-2040,0,1,cb530aad6f0013af6278064eb4267dbb413e8cae38836d46a88e9c1f5f90e57c,2024-11-21T01:50:54.990000 -CVE-2013-2041,0,1,5e274596418abd73dfa812e2fc8dfb87be173e549e170a6e0055fcab9de8e114,2024-11-21T01:50:55.097000 -CVE-2013-2042,0,1,79486ccbf306656cb4bc4fc96c2effd0d748c23c76d812071cec8b82a2c1e299,2024-11-21T01:50:55.203000 -CVE-2013-2043,0,1,79cb763c84929d4517a8d46fc22190688cba28c5e0fed46a66c1d198b733abf5,2024-11-21T01:50:55.313000 -CVE-2013-2044,0,1,beae3d801b0dac412b6c411c58d56e1c57983d283fcb86f8e62531662114d8cc,2024-11-21T01:50:55.420000 -CVE-2013-2045,0,1,efec4bbd75fb7e24664196af304784b0a61daa857b7de72bc654da89a99cb887,2024-11-21T01:50:55.527000 -CVE-2013-2046,0,1,de4ba4dccd92184f76adedc1a979f35c19e6904cac184c24647d5adfad02156f,2024-11-21T01:50:55.630000 -CVE-2013-2047,0,1,0c9d82cb57a9f272cdfffacd8f453bc38c84051c1877e7390bed7774b0dfefe4,2024-11-21T01:50:55.750000 -CVE-2013-2048,0,1,07e66803d4cbb7872f9f3626aff5a893316b1853bf97db945efab5797c389611,2024-11-21T01:50:55.863000 +CVE-2013-2028,0,0,c7bf65e37e682d336306a83a40703cd210a7ed7fe6b576bb6c7873850eefed50,2024-11-21T01:50:53.560000 +CVE-2013-2029,0,0,1ce4d4d3c16aa0209462ed33eee5250c7d730726cafb4707fb4bb56b189ce208,2024-11-21T01:50:53.683000 +CVE-2013-2030,0,0,90265b844a9f684082b1f338cd8f59ce3dc6a7365df564c8a8541faba9cb4fe3,2024-11-21T01:50:53.797000 +CVE-2013-2031,0,0,5784622f2367a4becd95e527007a0d2be0b08bc96fc93007e1b22960c9d7dafa,2024-11-21T01:50:53.923000 +CVE-2013-2032,0,0,1e59944572e9819064e9a8de5e9a1142b48526bd7a52b91a65ab7fca52768193,2024-11-21T01:50:54.057000 +CVE-2013-2033,0,0,ca15f0181e421f6d9b246994e291ec3b44328a0d4b50fc895bcd8495a4dc910e,2024-11-21T01:50:54.187000 +CVE-2013-2034,0,0,9f0f25604e75361b03431fb85d70f49bbf97e58e2c928fbca0a03ce24bab000d,2024-11-21T01:50:54.300000 +CVE-2013-2035,0,0,84444b5c32d9de1288906114bf4f508922d7f20ae91d0964c86a029acd1beaef,2024-11-21T01:50:54.403000 +CVE-2013-2036,0,0,6d7c411ecb99c15b5e7314e6542d5f41fc96f1376d9fc251b7d06375e6b0a9f0,2024-11-21T01:50:54.530000 +CVE-2013-2037,0,0,aa994d0d456fce5534198ded054f4ddc57c1d9527fa813e8a3bb3c71cd094d4b,2024-11-21T01:50:54.640000 +CVE-2013-2038,0,0,1ff4964a8a779eae895a22e1c31710ad90e8f1010aca5b104ec94a2e09ed864e,2024-11-21T01:50:54.753000 +CVE-2013-2039,0,0,59aa57269ce9c7d930133f9298e6990431d58474d3d8306e195fd0f9c52a5c05,2024-11-21T01:50:54.877000 +CVE-2013-2040,0,0,cb530aad6f0013af6278064eb4267dbb413e8cae38836d46a88e9c1f5f90e57c,2024-11-21T01:50:54.990000 +CVE-2013-2041,0,0,5e274596418abd73dfa812e2fc8dfb87be173e549e170a6e0055fcab9de8e114,2024-11-21T01:50:55.097000 +CVE-2013-2042,0,0,79486ccbf306656cb4bc4fc96c2effd0d748c23c76d812071cec8b82a2c1e299,2024-11-21T01:50:55.203000 +CVE-2013-2043,0,0,79cb763c84929d4517a8d46fc22190688cba28c5e0fed46a66c1d198b733abf5,2024-11-21T01:50:55.313000 +CVE-2013-2044,0,0,beae3d801b0dac412b6c411c58d56e1c57983d283fcb86f8e62531662114d8cc,2024-11-21T01:50:55.420000 +CVE-2013-2045,0,0,efec4bbd75fb7e24664196af304784b0a61daa857b7de72bc654da89a99cb887,2024-11-21T01:50:55.527000 +CVE-2013-2046,0,0,de4ba4dccd92184f76adedc1a979f35c19e6904cac184c24647d5adfad02156f,2024-11-21T01:50:55.630000 +CVE-2013-2047,0,0,0c9d82cb57a9f272cdfffacd8f453bc38c84051c1877e7390bed7774b0dfefe4,2024-11-21T01:50:55.750000 +CVE-2013-2048,0,0,07e66803d4cbb7872f9f3626aff5a893316b1853bf97db945efab5797c389611,2024-11-21T01:50:55.863000 CVE-2013-2049,0,0,1921e09b57cdb840dfeb1d5c959eae50aec5223b2520a1b74a8b0dcbafb75433,2018-06-13T14:11:15.900000 -CVE-2013-2050,0,1,54ed333d297ee560f868b4248f9b67fea361fc26c46a104be03fa63cf5dfed25,2024-11-21T01:50:56.087000 -CVE-2013-2051,0,1,445423bcce96692aeeb105edd220022848e9c5e8c2c89b3a947067d4966cdee1,2024-11-21T01:50:56.197000 -CVE-2013-2052,0,1,d516bf5bdad8ce45003b8521a5704ca0d65c786aa055131a1ba3c97e101ae7bc,2024-11-21T01:50:56.310000 -CVE-2013-2053,0,1,b8e1684c0f8a486ca886a143cfe21987d35b009dd36ee5c0716344d2bd1722ad,2024-11-21T01:50:56.423000 -CVE-2013-2054,0,1,ba56c2a9b7016709f3b3cab55b7be148d81a316f8866d8af731a103afb836820,2024-11-21T01:50:56.553000 -CVE-2013-2055,0,1,5d88c2ca6d0e695106fd0efa09e6ac9a67dd76f2e7a14a53bb5169ceb05aabbb,2024-11-21T01:50:56.683000 -CVE-2013-2056,0,1,19126b0f9c46add38f948fa8539cf6b3892281fbbbdb86bb12ce7ade910c4a34,2024-11-21T01:50:56.807000 +CVE-2013-2050,0,0,54ed333d297ee560f868b4248f9b67fea361fc26c46a104be03fa63cf5dfed25,2024-11-21T01:50:56.087000 +CVE-2013-2051,0,0,445423bcce96692aeeb105edd220022848e9c5e8c2c89b3a947067d4966cdee1,2024-11-21T01:50:56.197000 +CVE-2013-2052,0,0,d516bf5bdad8ce45003b8521a5704ca0d65c786aa055131a1ba3c97e101ae7bc,2024-11-21T01:50:56.310000 +CVE-2013-2053,0,0,b8e1684c0f8a486ca886a143cfe21987d35b009dd36ee5c0716344d2bd1722ad,2024-11-21T01:50:56.423000 +CVE-2013-2054,0,0,ba56c2a9b7016709f3b3cab55b7be148d81a316f8866d8af731a103afb836820,2024-11-21T01:50:56.553000 +CVE-2013-2055,0,0,5d88c2ca6d0e695106fd0efa09e6ac9a67dd76f2e7a14a53bb5169ceb05aabbb,2024-11-21T01:50:56.683000 +CVE-2013-2056,0,0,19126b0f9c46add38f948fa8539cf6b3892281fbbbdb86bb12ce7ade910c4a34,2024-11-21T01:50:56.807000 CVE-2013-2057,0,0,a4535c09fd8b66e4e983662b5c7157ff81b781cd415458013af19640c57f1675,2020-02-14T18:33:50.350000 -CVE-2013-2058,0,1,ee7e99b31d7a8ab9aa7b68a2eee8e342ee18e99159bc320422712152c739f20e,2024-11-21T01:50:57.040000 -CVE-2013-2059,0,1,51f1e672c4affabf881e3e05d45a2e5db7908096cc8666c191fd34f21a3d0bd8,2024-11-21T01:50:57.180000 +CVE-2013-2058,0,0,ee7e99b31d7a8ab9aa7b68a2eee8e342ee18e99159bc320422712152c739f20e,2024-11-21T01:50:57.040000 +CVE-2013-2059,0,0,51f1e672c4affabf881e3e05d45a2e5db7908096cc8666c191fd34f21a3d0bd8,2024-11-21T01:50:57.180000 CVE-2013-2060,0,0,e0b420d20ef081ffc994a88206fac2bd9ec02d668e1854fa686112a59efa8f02,2020-01-30T21:10:18.887000 -CVE-2013-2061,0,1,04eb20d6d35a8e6d5d7feeb10931bf829e9cf9f79ea4f9d6c234b5cdff3a6b69,2024-11-21T01:50:57.417000 -CVE-2013-2062,0,1,7fc9de4f3baa73de25929f8253425633c90400c85c47cbb74ccee86cbbf15fa0,2024-11-21T01:50:57.580000 -CVE-2013-2063,0,1,195f38172e63e2a3952676a7eccf3a6d44a5d5b1d158fe9a32ebe51f0c77d694,2024-11-21T01:50:57.703000 -CVE-2013-2064,0,1,008a0d73278adcde2b9ef7fd7c3a37cc56cb9c94c026775fec4b5b0645b8d9b3,2024-11-21T01:50:57.813000 -CVE-2013-2065,0,1,d174f5256705db56eb5037bed3029dddc3ad54b6b34df6629ed55e87862e1473,2024-11-21T01:50:57.957000 -CVE-2013-2066,0,1,72e5b426ff45dbc49c215a1092352c930a003abfdaf0589491f7f33706508c22,2024-11-21T01:50:58.073000 -CVE-2013-2067,0,1,70cf6fab2808568fa85aad76db8f60a521670bb98540e5bc97264e3aaaff2a49,2024-11-21T01:50:58.187000 -CVE-2013-2068,0,1,a2578ce164d913cd37995775801752b4292910ebde2d248613ef37aaa732080c,2024-11-21T01:50:58.337000 -CVE-2013-2069,0,1,91da6260fc03a9697ad0015f3e9e9c4afb532ae05b285a78ad8995eef1a88415,2024-11-21T01:50:58.447000 -CVE-2013-2070,0,1,4a47968eb2f5f18e27e9e3be276699cc4ef6a2c79e7b0221d3fb5fbf672f4123,2024-11-21T01:50:58.563000 -CVE-2013-2071,0,1,7b02ebeed65688e6d09214ada09c3e5953dd2078a8300c8a87f2c2c8b9be0e8a,2024-11-21T01:50:58.687000 -CVE-2013-2072,0,1,fc99d4a51e2f9b5be7e3e4810088f5865a7277a8d5fc11e85118f861da7d94df,2024-11-21T01:50:58.830000 -CVE-2013-2073,0,1,b78629fbb5ec0508d257d5d6c5268012b325fc0d7f219c58b8b0e2282d7a4fac,2024-11-21T01:50:58.980000 -CVE-2013-2074,0,1,a65872d29910137c1ce6d6cc5544f8282346fdfe6427722e18f28c946656f09b,2024-11-21T01:50:59.087000 +CVE-2013-2061,0,0,04eb20d6d35a8e6d5d7feeb10931bf829e9cf9f79ea4f9d6c234b5cdff3a6b69,2024-11-21T01:50:57.417000 +CVE-2013-2062,0,0,7fc9de4f3baa73de25929f8253425633c90400c85c47cbb74ccee86cbbf15fa0,2024-11-21T01:50:57.580000 +CVE-2013-2063,0,0,195f38172e63e2a3952676a7eccf3a6d44a5d5b1d158fe9a32ebe51f0c77d694,2024-11-21T01:50:57.703000 +CVE-2013-2064,0,0,008a0d73278adcde2b9ef7fd7c3a37cc56cb9c94c026775fec4b5b0645b8d9b3,2024-11-21T01:50:57.813000 +CVE-2013-2065,0,0,d174f5256705db56eb5037bed3029dddc3ad54b6b34df6629ed55e87862e1473,2024-11-21T01:50:57.957000 +CVE-2013-2066,0,0,72e5b426ff45dbc49c215a1092352c930a003abfdaf0589491f7f33706508c22,2024-11-21T01:50:58.073000 +CVE-2013-2067,0,0,70cf6fab2808568fa85aad76db8f60a521670bb98540e5bc97264e3aaaff2a49,2024-11-21T01:50:58.187000 +CVE-2013-2068,0,0,a2578ce164d913cd37995775801752b4292910ebde2d248613ef37aaa732080c,2024-11-21T01:50:58.337000 +CVE-2013-2069,0,0,91da6260fc03a9697ad0015f3e9e9c4afb532ae05b285a78ad8995eef1a88415,2024-11-21T01:50:58.447000 +CVE-2013-2070,0,0,4a47968eb2f5f18e27e9e3be276699cc4ef6a2c79e7b0221d3fb5fbf672f4123,2024-11-21T01:50:58.563000 +CVE-2013-2071,0,0,7b02ebeed65688e6d09214ada09c3e5953dd2078a8300c8a87f2c2c8b9be0e8a,2024-11-21T01:50:58.687000 +CVE-2013-2072,0,0,fc99d4a51e2f9b5be7e3e4810088f5865a7277a8d5fc11e85118f861da7d94df,2024-11-21T01:50:58.830000 +CVE-2013-2073,0,0,b78629fbb5ec0508d257d5d6c5268012b325fc0d7f219c58b8b0e2282d7a4fac,2024-11-21T01:50:58.980000 +CVE-2013-2074,0,0,a65872d29910137c1ce6d6cc5544f8282346fdfe6427722e18f28c946656f09b,2024-11-21T01:50:59.087000 CVE-2013-2075,0,0,9891a0595fad26f1d38dfd9bd96af45142381ac01ee42341f3a665beabd62df3,2023-11-07T02:14:55.630000 -CVE-2013-2076,0,1,9faa8ba79d65e8a73c75f39178b4d2da2adacdf62dc170435f63b7653fa635ce,2024-11-21T01:50:59.330000 -CVE-2013-2077,0,1,0866530184156596014754a84919d575b0cbae4ad2d6d2ba580d723d6e271543,2024-11-21T01:50:59.440000 -CVE-2013-2078,0,1,a504dbabaf942071f941c8b0eb881f7b0c444857bdae6c2ea8ddfdd8f22a42c0,2024-11-21T01:50:59.550000 -CVE-2013-2079,0,1,841b3311f52266dd84f73c3116367be4880c4dd5eae9ea50b4af6060ac60da31,2024-11-21T01:50:59.660000 -CVE-2013-2080,0,1,b87a41e588b2b6503e3e23381d4b5b9289c9c33e96529b1bafff7a71f36dee99,2024-11-21T01:50:59.773000 -CVE-2013-2081,0,1,550ad661a5c1cd83e5a712f90bc23a5fcc5c5d372f49f03d50ed90960e267411,2024-11-21T01:50:59.890000 -CVE-2013-2082,0,1,04e1ba27b8bdbb891b3f955c6ffd93a649bb2a6afbaa0b169668755b8e7d26ac,2024-11-21T01:51:00.010000 -CVE-2013-2083,0,1,e3028c029c7de69cd44c7559991e984330cc172ace7b99dfbf28aa690a295758,2024-11-21T01:51:00.123000 +CVE-2013-2076,0,0,9faa8ba79d65e8a73c75f39178b4d2da2adacdf62dc170435f63b7653fa635ce,2024-11-21T01:50:59.330000 +CVE-2013-2077,0,0,0866530184156596014754a84919d575b0cbae4ad2d6d2ba580d723d6e271543,2024-11-21T01:50:59.440000 +CVE-2013-2078,0,0,a504dbabaf942071f941c8b0eb881f7b0c444857bdae6c2ea8ddfdd8f22a42c0,2024-11-21T01:50:59.550000 +CVE-2013-2079,0,0,841b3311f52266dd84f73c3116367be4880c4dd5eae9ea50b4af6060ac60da31,2024-11-21T01:50:59.660000 +CVE-2013-2080,0,0,b87a41e588b2b6503e3e23381d4b5b9289c9c33e96529b1bafff7a71f36dee99,2024-11-21T01:50:59.773000 +CVE-2013-2081,0,0,550ad661a5c1cd83e5a712f90bc23a5fcc5c5d372f49f03d50ed90960e267411,2024-11-21T01:50:59.890000 +CVE-2013-2082,0,0,04e1ba27b8bdbb891b3f955c6ffd93a649bb2a6afbaa0b169668755b8e7d26ac,2024-11-21T01:51:00.010000 +CVE-2013-2083,0,0,e3028c029c7de69cd44c7559991e984330cc172ace7b99dfbf28aa690a295758,2024-11-21T01:51:00.123000 CVE-2013-2084,0,0,943285e2c3de141ff2442829a6caa7431db5e343b4598cd3c3390daed2c627ee,2023-11-07T02:14:55.827000 -CVE-2013-2085,0,1,2eb8ce532ad1df8215893e3332d2fe96f2b5353c3f96f4cc8b49f73fab50a668,2024-11-21T01:51:00.263000 -CVE-2013-2086,0,1,e8dffc45d280638878d3ae642ed6631d2139fcbd3cc8c53ea995e04e46fc617f,2024-11-21T01:51:00.363000 -CVE-2013-2087,0,1,41b9b71df21b36a3e285f6bce1ed88da3b895fa28d80c92f0bc80db2fe74e4e8,2024-11-21T01:51:00.470000 -CVE-2013-2088,0,1,da78f91b59695124a4802afae5475a202d8de8248c2aa3206c88cf9f16dc7ebb,2024-11-21T01:51:00.580000 -CVE-2013-2089,0,1,538c4873726cb60eb561f4e3103135bc7b6049d189c153780a3dd10314d50d1c,2024-11-21T01:51:00.693000 +CVE-2013-2085,0,0,2eb8ce532ad1df8215893e3332d2fe96f2b5353c3f96f4cc8b49f73fab50a668,2024-11-21T01:51:00.263000 +CVE-2013-2086,0,0,e8dffc45d280638878d3ae642ed6631d2139fcbd3cc8c53ea995e04e46fc617f,2024-11-21T01:51:00.363000 +CVE-2013-2087,0,0,41b9b71df21b36a3e285f6bce1ed88da3b895fa28d80c92f0bc80db2fe74e4e8,2024-11-21T01:51:00.470000 +CVE-2013-2088,0,0,da78f91b59695124a4802afae5475a202d8de8248c2aa3206c88cf9f16dc7ebb,2024-11-21T01:51:00.580000 +CVE-2013-2089,0,0,538c4873726cb60eb561f4e3103135bc7b6049d189c153780a3dd10314d50d1c,2024-11-21T01:51:00.693000 CVE-2013-2090,0,0,70c6629f21f4b6fd428ad5211a1e980b8846252822391ab99bdbee77241d5c6c,2017-08-29T01:33:13.950000 CVE-2013-2091,0,0,6de8a6f700e1e07bfd543d6b9ee8f2ba827a84df501db8234a370dc6a0f4eb1b,2022-11-17T17:21:59.260000 CVE-2013-2092,0,0,57ad76cf1249eafac05342b8d2dc989cb47b88a2572389ef7a3b1ed6d3293a9f,2022-11-17T17:21:59.260000 CVE-2013-2093,0,0,53ef008477b842836a17c2c546fb3b9ab7c9205b4f5dec111448562589a8a1c4,2022-11-17T17:21:59.260000 -CVE-2013-2094,0,1,e74411f11e167ec67c729c55e4126711f5c2cfa02125e26a980c79600a917cb3,2024-11-21T01:51:01.253000 +CVE-2013-2094,0,0,e74411f11e167ec67c729c55e4126711f5c2cfa02125e26a980c79600a917cb3,2024-11-21T01:51:01.253000 CVE-2013-2095,0,0,16f9639aae136ec40a155694e233ac8153d11621c0adefca1c22e33080fe16cf,2019-12-17T15:35:42.633000 -CVE-2013-2096,0,1,22277f26ebb983aba0fa81d484d41aafc5ee99f17aed95df9ec4979e35941e1f,2024-11-21T01:51:01.540000 +CVE-2013-2096,0,0,22277f26ebb983aba0fa81d484d41aafc5ee99f17aed95df9ec4979e35941e1f,2024-11-21T01:51:01.540000 CVE-2013-2097,0,0,bc2db11278ce2d1a8d5b8908f93ce2d053f53f1c838b6cf47a6801f830ee90b9,2020-02-24T20:36:56.283000 CVE-2013-2098,0,0,20acc53207df7a24a1d66c8b8e5dd6b11801fb33c393988b6b3c204459c3f963,2023-11-07T02:14:56.160000 -CVE-2013-2099,0,1,d70326dbedfcff740e0b6c772f655ebb6e2aa2debc0d50a86da33507d015a5a9,2024-11-21T01:51:01.813000 +CVE-2013-2099,0,0,d70326dbedfcff740e0b6c772f655ebb6e2aa2debc0d50a86da33507d015a5a9,2024-11-21T01:51:01.813000 CVE-2013-2100,0,0,b93c764d57a3b1eab2a3af962dfe2f3cec1813b103dc3d9ca6aa32660bbd8829,2017-08-29T01:33:14.057000 CVE-2013-2101,0,0,a2961316f783d4ff1d93abc306e6d937ed5cc5b9525f8221cd093acb8cd26c53,2023-02-13T04:42:50.543000 -CVE-2013-2102,0,1,58c0f47840329ca7b348e05b5cc26af8f83797ca2e43ee0d8b757b64b9d520e8,2024-11-21T01:51:02.237000 +CVE-2013-2102,0,0,58c0f47840329ca7b348e05b5cc26af8f83797ca2e43ee0d8b757b64b9d520e8,2024-11-21T01:51:02.237000 CVE-2013-2103,0,0,0f0193a16428f77b2725c38e055cf4b168c80ca801fdccca78e496da81a28ab3,2019-12-13T20:04:54.713000 -CVE-2013-2104,0,1,1b8d6f90d5e2bbc3e2a195d82af226e1d5ad385c81c645d32f2c4ccc3ff0fb67,2024-11-21T01:51:02.487000 -CVE-2013-2105,0,1,5f2a31fa4c4e0b78d0fe9b4263cfadd9c52d1a9f02af5c1a7eb85f6838e8b176,2024-11-21T01:51:02.630000 +CVE-2013-2104,0,0,1b8d6f90d5e2bbc3e2a195d82af226e1d5ad385c81c645d32f2c4ccc3ff0fb67,2024-11-21T01:51:02.487000 +CVE-2013-2105,0,0,5f2a31fa4c4e0b78d0fe9b4263cfadd9c52d1a9f02af5c1a7eb85f6838e8b176,2024-11-21T01:51:02.630000 CVE-2013-2106,0,0,52053c9817487a754bfc488338306448c4b82dd98351b10376b0df5bf7b3dffb,2019-12-10T18:12:21.790000 -CVE-2013-2107,0,1,218e3ad9c42b38668c40378381e9d69117dfe51ccebf487047d9b2cd8a021a31,2024-11-21T01:51:02.890000 +CVE-2013-2107,0,0,218e3ad9c42b38668c40378381e9d69117dfe51ccebf487047d9b2cd8a021a31,2024-11-21T01:51:02.890000 CVE-2013-2108,0,0,16f1157bcf423245bf49f758254de73c8886b0e96e771741b63e2ab33d998cdf,2020-02-18T15:15:49.240000 CVE-2013-2109,0,0,866305bf78964d0fa595b8a13e97a4c9c99b8fa1e69209c98920ca1a9d5491a4,2020-02-24T22:17:32.487000 -CVE-2013-2110,0,1,b43614e4580b52a3b4c4d4183ab7b1395cae42f767f69646a56fac6a61c78a8f,2024-11-21T01:51:03.250000 +CVE-2013-2110,0,0,b43614e4580b52a3b4c4d4183ab7b1395cae42f767f69646a56fac6a61c78a8f,2024-11-21T01:51:03.250000 CVE-2013-2111,0,0,9785b45ed3ce7406b79ae28e22c1e6f1f87fb680d26d04693f173d5d8d22453b,2014-05-28T16:25:56.727000 -CVE-2013-2112,0,1,c2fed3bd31f896e8cd6779fe2699afae7f0be35ac92e64f3f6437ef8156c5b7d,2024-11-21T01:51:03.507000 -CVE-2013-2113,0,1,d4b9b1ebb1303bbd42697958173f4882843b5f72ed743a85b2d5773474828744,2024-11-21T01:51:03.643000 -CVE-2013-2114,0,1,298bc770d97725ddcbdefc004d6f28aab84dae1c8dd0c28259ded166a71883c2,2024-11-21T01:51:03.767000 -CVE-2013-2115,0,1,5d8d4c2f258d1f3af8a32be2ef385807f5a1b86d59702b515a899b9230ac0f1a,2024-11-21T01:51:03.890000 -CVE-2013-2116,0,1,62b8549aafd777601912165d830ad74d406279791dd78e2117986606470d0e0f,2024-11-21T01:51:04.027000 -CVE-2013-2117,0,1,159d272edb6570e27afe3f6fac94b294f56917606ed785282ab01f73c5318a70,2024-11-21T01:51:04.163000 -CVE-2013-2118,0,1,49041749fe28bdaea0b06b70544ee45f2e7c6b83a48c31b1d212839306c87702,2024-11-21T01:51:04.297000 -CVE-2013-2119,0,1,4581e41a943bd0c9096a90a8af56ab90ee93ca321450622bdd5dd6109a72f5bf,2024-11-21T01:51:04.423000 +CVE-2013-2112,0,0,c2fed3bd31f896e8cd6779fe2699afae7f0be35ac92e64f3f6437ef8156c5b7d,2024-11-21T01:51:03.507000 +CVE-2013-2113,0,0,d4b9b1ebb1303bbd42697958173f4882843b5f72ed743a85b2d5773474828744,2024-11-21T01:51:03.643000 +CVE-2013-2114,0,0,298bc770d97725ddcbdefc004d6f28aab84dae1c8dd0c28259ded166a71883c2,2024-11-21T01:51:03.767000 +CVE-2013-2115,0,0,5d8d4c2f258d1f3af8a32be2ef385807f5a1b86d59702b515a899b9230ac0f1a,2024-11-21T01:51:03.890000 +CVE-2013-2116,0,0,62b8549aafd777601912165d830ad74d406279791dd78e2117986606470d0e0f,2024-11-21T01:51:04.027000 +CVE-2013-2117,0,0,159d272edb6570e27afe3f6fac94b294f56917606ed785282ab01f73c5318a70,2024-11-21T01:51:04.163000 +CVE-2013-2118,0,0,49041749fe28bdaea0b06b70544ee45f2e7c6b83a48c31b1d212839306c87702,2024-11-21T01:51:04.297000 +CVE-2013-2119,0,0,4581e41a943bd0c9096a90a8af56ab90ee93ca321450622bdd5dd6109a72f5bf,2024-11-21T01:51:04.423000 CVE-2013-2120,0,0,d069f3edc888388654cb9808f6c22c2b185b687e101121298e0c6193920a7eeb,2020-02-21T16:15:02.027000 -CVE-2013-2121,0,1,e48f0cdfb15c3701a55da814ca2ba8cb82a7d6c4cfb48d71978f4d1ed2d2af41,2024-11-21T01:51:04.663000 -CVE-2013-2122,0,1,9ef2436a5834e19532dd83fb93bb00589af39da55cc350a069638b397b1b324e,2024-11-21T01:51:04.777000 -CVE-2013-2123,0,1,133f1bf1eb17bbbc2a31f3f8ed97cac708ae0e4c1ac9e60fb8a8be485716cdfe,2024-11-21T01:51:04.897000 +CVE-2013-2121,0,0,e48f0cdfb15c3701a55da814ca2ba8cb82a7d6c4cfb48d71978f4d1ed2d2af41,2024-11-21T01:51:04.663000 +CVE-2013-2122,0,0,9ef2436a5834e19532dd83fb93bb00589af39da55cc350a069638b397b1b324e,2024-11-21T01:51:04.777000 +CVE-2013-2123,0,0,133f1bf1eb17bbbc2a31f3f8ed97cac708ae0e4c1ac9e60fb8a8be485716cdfe,2024-11-21T01:51:04.897000 CVE-2013-2124,0,0,d694d34e3c4e944512788b6906c979f028e9e2dc8e92ebc27739a6b948b34ac3,2017-08-29T01:33:14.277000 CVE-2013-2125,0,0,f816daa28166046a16f0573de23925da6715cf35857321b80eea5078a47d5f8c,2017-08-29T01:33:14.323000 -CVE-2013-2126,0,1,f004ef6ef6b64a92257be215fbc05e1e7c3c4dd3058c3d14d1a292da713a1a8c,2024-11-21T01:51:05.283000 -CVE-2013-2127,0,1,5964e4e1914fe8a40465b127c779bd006aadeb4a3872c1578abfd932e46f2db8,2024-11-21T01:51:05.447000 -CVE-2013-2128,0,1,8e17bd13554e4c29a4c17d4e42e5151caf019f4b692c8cda43ecbc43e9f169bc,2024-11-21T01:51:05.567000 -CVE-2013-2129,0,1,d8999a5bf3996b4d99674efbe3ae9a2c453969f32399a619c682b298d2234653,2024-11-21T01:51:05.697000 +CVE-2013-2126,0,0,f004ef6ef6b64a92257be215fbc05e1e7c3c4dd3058c3d14d1a292da713a1a8c,2024-11-21T01:51:05.283000 +CVE-2013-2127,0,0,5964e4e1914fe8a40465b127c779bd006aadeb4a3872c1578abfd932e46f2db8,2024-11-21T01:51:05.447000 +CVE-2013-2128,0,0,8e17bd13554e4c29a4c17d4e42e5151caf019f4b692c8cda43ecbc43e9f169bc,2024-11-21T01:51:05.567000 +CVE-2013-2129,0,0,d8999a5bf3996b4d99674efbe3ae9a2c453969f32399a619c682b298d2234653,2024-11-21T01:51:05.697000 CVE-2013-2130,0,0,3fd1665af906e76cf76bc468949cf3c26bf5c5cd3389e8f5f071ac666b0481ec,2015-09-10T15:24:57.847000 CVE-2013-2131,0,0,39e06cb3d18aae9833d335059e697f11505bf79540db8a33adc6fbcf3c70148d,2015-05-19T16:22:43.527000 -CVE-2013-2132,0,1,0e39d5cc4ee0f9e7d54d7298455f250a70b88ff803d35ad1f3c4c51dba13a5dc,2024-11-21T01:51:06.103000 -CVE-2013-2133,0,1,0569451fcd670ec90c7cbda5efee4f92be899d88b9fcfb7206ae7e46d4601fbf,2024-11-21T01:51:06.250000 -CVE-2013-2134,0,1,ebea35ca2b2374fa22e38d3282582e1759ec949a4ffa412b3c067c48a47498f9,2024-11-21T01:51:06.377000 -CVE-2013-2135,0,1,bc0e0da48a8ddfb36a165852587d12b5961d31a3f3345eedb607ddc9bd7a93df,2024-11-21T01:51:06.517000 -CVE-2013-2136,0,1,20cdb7f9b1bd2c557cd6ff8b643a8b15a310fcb841aa7807edab8983ab4d8739,2024-11-21T01:51:06.660000 -CVE-2013-2137,0,1,07be994bf7bfc8b50de629ec7e3e8fbb9b557ae03cbe6fdde143d8d68ae69dd4,2024-11-21T01:51:06.810000 -CVE-2013-2138,0,1,cf7a6c9ef168f554499fdd7ef9486583db03ee9a01c7adfc8dff7442f40a5b54,2024-11-21T01:51:06.940000 -CVE-2013-2139,0,1,1bc7949d92201d43cc5640c440b7e6ee143ddce9c51f639273deea22a08d87f2,2024-11-21T01:51:07.080000 -CVE-2013-2140,0,1,1e49c554ade9b89c96a34b1d43c6ff1c1ee75f86370f38ae634fc898e2ed6ee2,2024-11-21T01:51:07.217000 -CVE-2013-2141,0,1,20256e5bae889271c44198f2ba740360d6ef86ea08a5c5f1b0f5ecde7aec50a1,2024-11-21T01:51:07.377000 -CVE-2013-2142,0,1,3feaec5d47a1151efcbfcbf801892117fbcbae9ed5c478c35797dbaeab16ec7b,2024-11-21T01:51:07.503000 -CVE-2013-2143,0,1,e2e99a787d9cbf3a5a2876a6bcdcb6f294b42856e8639fe2aeaf6a63612e58a7,2024-11-21T01:51:07.623000 -CVE-2013-2144,0,1,08ea900cf90c5b43aea2ba925630506af8acadf6416c785372028a48201d0eb9,2024-11-21T01:51:07.760000 -CVE-2013-2145,0,1,c67003b1b61678d2cdec26e577384b7cae0521371c5fb30b76d2bb2fb6909347,2024-11-21T01:51:07.877000 -CVE-2013-2146,0,1,e25e364df39bc50c1f29fef2e838977ad8fdfd471732bc5baae6fe693dadf818,2024-11-21T01:51:08.010000 -CVE-2013-2147,0,1,f524dbb408ca8190733d567c195099f2ee75acd8475bfd3cd7caeb8d91a61309,2024-11-21T01:51:08.120000 -CVE-2013-2148,0,1,94bf498830c5adfb9d6863fbddf5142a6eba269f4eb31d1f9f4ea3be27741706,2024-11-21T01:51:08.243000 -CVE-2013-2149,0,1,8ca448ead8f87d6b25465a9e88aed4976dc7c15ecf7ff97b5e61a0bb3747659f,2024-11-21T01:51:08.360000 -CVE-2013-2150,0,1,661dd6b6b576a6113d2152a4a46362e008d7f79b83d37182e370364f7f1ad002,2024-11-21T01:51:08.470000 -CVE-2013-2151,0,1,232147f4f703b7c0534728443274f593661f0ec1f69b8962beae4eeb2df255d3,2024-11-21T01:51:08.577000 -CVE-2013-2152,0,1,79e5a743a7c5046c2bbd77f9764ab257eea855d6fad500f750f0eb6a7a17a316,2024-11-21T01:51:08.677000 -CVE-2013-2153,0,1,aa3ba46d4380e18f42568c006849d4cce11deb43d301961b8843947f5aea119e,2024-11-21T01:51:08.787000 -CVE-2013-2154,0,1,a4cbc2b9162d59411e46e590226ef0934a30b00e8628ce74246eeee6c04f2877,2024-11-21T01:51:08.913000 -CVE-2013-2155,0,1,350bdf8519366d707281dee5a6e1c170e3738c3389e07923c664b052de2070c6,2024-11-21T01:51:09.047000 -CVE-2013-2156,0,1,c427f2ea6efca7dd5abe762a2a8e25a581b665f5b42cb7032765adef571dbde9,2024-11-21T01:51:09.167000 -CVE-2013-2157,0,1,6d3662e541fbedbbb3d6619de082ae6dbfcd5baf48a9707f8ae9c2f852578e32,2024-11-21T01:51:09.277000 -CVE-2013-2158,0,1,bdb8e016d665ceef976b493b22ef97fe6f83e8e96e6f14afb9efca4c5c1d1113,2024-11-21T01:51:09.393000 +CVE-2013-2132,0,0,0e39d5cc4ee0f9e7d54d7298455f250a70b88ff803d35ad1f3c4c51dba13a5dc,2024-11-21T01:51:06.103000 +CVE-2013-2133,0,0,0569451fcd670ec90c7cbda5efee4f92be899d88b9fcfb7206ae7e46d4601fbf,2024-11-21T01:51:06.250000 +CVE-2013-2134,0,0,ebea35ca2b2374fa22e38d3282582e1759ec949a4ffa412b3c067c48a47498f9,2024-11-21T01:51:06.377000 +CVE-2013-2135,0,0,bc0e0da48a8ddfb36a165852587d12b5961d31a3f3345eedb607ddc9bd7a93df,2024-11-21T01:51:06.517000 +CVE-2013-2136,0,0,20cdb7f9b1bd2c557cd6ff8b643a8b15a310fcb841aa7807edab8983ab4d8739,2024-11-21T01:51:06.660000 +CVE-2013-2137,0,0,07be994bf7bfc8b50de629ec7e3e8fbb9b557ae03cbe6fdde143d8d68ae69dd4,2024-11-21T01:51:06.810000 +CVE-2013-2138,0,0,cf7a6c9ef168f554499fdd7ef9486583db03ee9a01c7adfc8dff7442f40a5b54,2024-11-21T01:51:06.940000 +CVE-2013-2139,0,0,1bc7949d92201d43cc5640c440b7e6ee143ddce9c51f639273deea22a08d87f2,2024-11-21T01:51:07.080000 +CVE-2013-2140,0,0,1e49c554ade9b89c96a34b1d43c6ff1c1ee75f86370f38ae634fc898e2ed6ee2,2024-11-21T01:51:07.217000 +CVE-2013-2141,0,0,20256e5bae889271c44198f2ba740360d6ef86ea08a5c5f1b0f5ecde7aec50a1,2024-11-21T01:51:07.377000 +CVE-2013-2142,0,0,3feaec5d47a1151efcbfcbf801892117fbcbae9ed5c478c35797dbaeab16ec7b,2024-11-21T01:51:07.503000 +CVE-2013-2143,0,0,e2e99a787d9cbf3a5a2876a6bcdcb6f294b42856e8639fe2aeaf6a63612e58a7,2024-11-21T01:51:07.623000 +CVE-2013-2144,0,0,08ea900cf90c5b43aea2ba925630506af8acadf6416c785372028a48201d0eb9,2024-11-21T01:51:07.760000 +CVE-2013-2145,0,0,c67003b1b61678d2cdec26e577384b7cae0521371c5fb30b76d2bb2fb6909347,2024-11-21T01:51:07.877000 +CVE-2013-2146,0,0,e25e364df39bc50c1f29fef2e838977ad8fdfd471732bc5baae6fe693dadf818,2024-11-21T01:51:08.010000 +CVE-2013-2147,0,0,f524dbb408ca8190733d567c195099f2ee75acd8475bfd3cd7caeb8d91a61309,2024-11-21T01:51:08.120000 +CVE-2013-2148,0,0,94bf498830c5adfb9d6863fbddf5142a6eba269f4eb31d1f9f4ea3be27741706,2024-11-21T01:51:08.243000 +CVE-2013-2149,0,0,8ca448ead8f87d6b25465a9e88aed4976dc7c15ecf7ff97b5e61a0bb3747659f,2024-11-21T01:51:08.360000 +CVE-2013-2150,0,0,661dd6b6b576a6113d2152a4a46362e008d7f79b83d37182e370364f7f1ad002,2024-11-21T01:51:08.470000 +CVE-2013-2151,0,0,232147f4f703b7c0534728443274f593661f0ec1f69b8962beae4eeb2df255d3,2024-11-21T01:51:08.577000 +CVE-2013-2152,0,0,79e5a743a7c5046c2bbd77f9764ab257eea855d6fad500f750f0eb6a7a17a316,2024-11-21T01:51:08.677000 +CVE-2013-2153,0,0,aa3ba46d4380e18f42568c006849d4cce11deb43d301961b8843947f5aea119e,2024-11-21T01:51:08.787000 +CVE-2013-2154,0,0,a4cbc2b9162d59411e46e590226ef0934a30b00e8628ce74246eeee6c04f2877,2024-11-21T01:51:08.913000 +CVE-2013-2155,0,0,350bdf8519366d707281dee5a6e1c170e3738c3389e07923c664b052de2070c6,2024-11-21T01:51:09.047000 +CVE-2013-2156,0,0,c427f2ea6efca7dd5abe762a2a8e25a581b665f5b42cb7032765adef571dbde9,2024-11-21T01:51:09.167000 +CVE-2013-2157,0,0,6d3662e541fbedbbb3d6619de082ae6dbfcd5baf48a9707f8ae9c2f852578e32,2024-11-21T01:51:09.277000 +CVE-2013-2158,0,0,bdb8e016d665ceef976b493b22ef97fe6f83e8e96e6f14afb9efca4c5c1d1113,2024-11-21T01:51:09.393000 CVE-2013-2159,0,0,9fcf563f252836ce642a19c2775d3772442d728375f46deb6a7173f59aa3d98c,2020-03-26T14:24:52.300000 -CVE-2013-2160,0,1,dc2ab52f183da9592ebfdaedadcb50088be45f5091340951a72a229e4187e6f8,2024-11-21T01:51:09.617000 -CVE-2013-2161,0,1,0746ca368002840520b546ef43c96d4f0af70bf5f102bd120077d30058b58e76,2024-11-21T01:51:09.743000 -CVE-2013-2162,0,1,8373d7cd356611437e4be1d154f11b9c3bdfd68361de3063d56caf36e37b5728,2024-11-21T01:51:09.847000 +CVE-2013-2160,0,0,dc2ab52f183da9592ebfdaedadcb50088be45f5091340951a72a229e4187e6f8,2024-11-21T01:51:09.617000 +CVE-2013-2161,0,0,0746ca368002840520b546ef43c96d4f0af70bf5f102bd120077d30058b58e76,2024-11-21T01:51:09.743000 +CVE-2013-2162,0,0,8373d7cd356611437e4be1d154f11b9c3bdfd68361de3063d56caf36e37b5728,2024-11-21T01:51:09.847000 CVE-2013-2163,0,0,e05b00c2755143d71480935a63d441c9e1c532555227bb90252a9da51025b437,2020-03-26T14:24:52.313000 -CVE-2013-2164,0,1,04e90928d401847fde514379e845398a0a85eb378e29f1dd213493664a6b5cc3,2024-11-21T01:51:10.060000 -CVE-2013-2165,0,1,7f60c147fec1b48ba6adffd00d78757947cac0498141cb622099fdc444345435,2024-11-21T01:51:10.207000 +CVE-2013-2164,0,0,04e90928d401847fde514379e845398a0a85eb378e29f1dd213493664a6b5cc3,2024-11-21T01:51:10.060000 +CVE-2013-2165,0,0,7f60c147fec1b48ba6adffd00d78757947cac0498141cb622099fdc444345435,2024-11-21T01:51:10.207000 CVE-2013-2166,0,0,189e78410e60b981f00f84e654030f9bb2c43d93d6961d0c8eaebb5bd42f0b07,2023-02-13T00:28:29.123000 CVE-2013-2167,0,0,07b7b99624fdbd027784b09ab8260d487ab319f0bbe30a6c0264e90e603cc1dc,2023-02-13T04:43:17.660000 -CVE-2013-2168,0,1,09ccdd7d344f2bb24b75d981805c40c7123a972b6c17f5fd6a5f6409b114319e,2024-11-21T01:51:10.603000 +CVE-2013-2168,0,0,09ccdd7d344f2bb24b75d981805c40c7123a972b6c17f5fd6a5f6409b114319e,2024-11-21T01:51:10.603000 CVE-2013-2169,0,0,33a03b5655ca61bed84e7ddcbfe4f7eebde62b757d25a03190374b926ff65bea,2023-11-07T02:14:57.303000 CVE-2013-2170,0,0,d9d0213e70f8e7de4a99cc57d80dfeeb662d62779dc0a415ef3b4b0f7c9868c9,2023-11-07T02:14:57.527000 -CVE-2013-2171,0,1,b80fd79d7c55775a501519b5f7abc5327f983e826d087c98639ca6842ab6e24b,2024-11-21T01:51:10.763000 -CVE-2013-2172,0,1,81e257d0718fba63d69b197e2e9c05bc0c872a85fa2833d9716a111ade03c270,2024-11-21T01:51:10.880000 -CVE-2013-2173,0,1,73705ef5fa9a01ca343b6d954304cd7731fc05516d786f209eb3ddd3c7e222cc,2024-11-21T01:51:11.030000 -CVE-2013-2174,0,1,bb4af333cdbb39ece9109a8e790af1cdcacad346334fd2732406612f974a8c69,2024-11-21T01:51:11.150000 -CVE-2013-2175,0,1,88afddc432b5e763dd87d85a78e539d1353fbcd47a6992e5b3bf762c09fa901b,2024-11-21T01:51:11.303000 -CVE-2013-2176,0,1,d65712984ce4f5ca7bdd96cf0bbbbe84c361415e2db07b3655179c6c2034498b,2024-11-21T01:51:11.430000 -CVE-2013-2177,0,1,2781b10521d9434fcaf236387e2de3362637b7d85fb6b9d6bf00eedcb886a05b,2024-11-21T01:51:11.533000 -CVE-2013-2178,0,1,7ed3b9d5f8a331c15f742e63f938c8c2e350ed517aed5b99ee51af8769e40ffe,2024-11-21T01:51:11.650000 -CVE-2013-2179,0,1,c20906de73c833b65be3a366f724b5c75367d8abc8eb1a8dba138d3e14563e0d,2024-11-21T01:51:11.777000 +CVE-2013-2171,0,0,b80fd79d7c55775a501519b5f7abc5327f983e826d087c98639ca6842ab6e24b,2024-11-21T01:51:10.763000 +CVE-2013-2172,0,0,81e257d0718fba63d69b197e2e9c05bc0c872a85fa2833d9716a111ade03c270,2024-11-21T01:51:10.880000 +CVE-2013-2173,0,0,73705ef5fa9a01ca343b6d954304cd7731fc05516d786f209eb3ddd3c7e222cc,2024-11-21T01:51:11.030000 +CVE-2013-2174,0,0,bb4af333cdbb39ece9109a8e790af1cdcacad346334fd2732406612f974a8c69,2024-11-21T01:51:11.150000 +CVE-2013-2175,0,0,88afddc432b5e763dd87d85a78e539d1353fbcd47a6992e5b3bf762c09fa901b,2024-11-21T01:51:11.303000 +CVE-2013-2176,0,0,d65712984ce4f5ca7bdd96cf0bbbbe84c361415e2db07b3655179c6c2034498b,2024-11-21T01:51:11.430000 +CVE-2013-2177,0,0,2781b10521d9434fcaf236387e2de3362637b7d85fb6b9d6bf00eedcb886a05b,2024-11-21T01:51:11.533000 +CVE-2013-2178,0,0,7ed3b9d5f8a331c15f742e63f938c8c2e350ed517aed5b99ee51af8769e40ffe,2024-11-21T01:51:11.650000 +CVE-2013-2179,0,0,c20906de73c833b65be3a366f724b5c75367d8abc8eb1a8dba138d3e14563e0d,2024-11-21T01:51:11.777000 CVE-2013-2180,0,0,8f9fdad729a0fa88c62af7dcdded9e1bf9969c0cb1d5ab3dcb3a7d4465779f89,2023-11-07T02:14:57.820000 -CVE-2013-2181,0,1,7ecc56059c468ab68ab6b83f61c7a86a22078e228816a51fe118f9e67919a165,2024-11-21T01:51:11.900000 +CVE-2013-2181,0,0,7ecc56059c468ab68ab6b83f61c7a86a22078e228816a51fe118f9e67919a165,2024-11-21T01:51:11.900000 CVE-2013-2182,0,0,e8ff6d3bb056d174a3e9ed0c82c4a2b63045c9daebcc9d1f4f6758877eb3bc37,2020-03-26T14:25:00.517000 CVE-2013-2183,0,0,212ae291042162be85e3371fc450c6f48d2b63444c93589be0d671b40d5809a9,2020-03-26T14:23:16.203000 CVE-2013-2184,0,0,3a45cbfb6dacd6d24a96068b5c28cd16ea1aef0ec4b7a273f587cf2fcbd10238,2015-03-27T17:43:27.433000 -CVE-2013-2185,0,1,71d250d2ec5470300283207c0944fa745762e49a1c0a7899fef6440bdc647207,2024-11-21T01:51:12.337000 -CVE-2013-2186,0,1,b86afed11b268d71d32e7ab89c26b9d569f8aa4014260e77ae267ce10ed56872,2024-11-21T01:51:12.450000 -CVE-2013-2187,0,1,25eb6c875dc124bb2486d6819c5a09701d5e0c0d200f0552fa27fb9a7667f0dc,2024-11-21T01:51:12.583000 -CVE-2013-2188,0,1,11a999b437f8733744d45d831f46cd5fa50b7f970fe45cd448ca36281746461d,2024-11-21T01:51:12.697000 -CVE-2013-2189,0,1,756d039b05aa0bf695016ce114cbeede88a20dfd6edb3b0873a427b923a4b847,2024-11-21T01:51:12.800000 -CVE-2013-2190,0,1,be6614f9936b691f9d194005a45d3d6d9ec2bff9e4e39323e1cab6b49565242e,2024-11-21T01:51:12.943000 -CVE-2013-2191,0,1,cdc8fd4221e1285f6fe601834e86c08499570fad3fe2e0872dc2444aeff4e5d0,2024-11-21T01:51:13.077000 -CVE-2013-2192,0,1,42acf47b13c0277151eba7ea0aa1833a96b4e38fb82804dfb3ec87ae61e77f8d,2024-11-21T01:51:13.200000 +CVE-2013-2185,0,0,71d250d2ec5470300283207c0944fa745762e49a1c0a7899fef6440bdc647207,2024-11-21T01:51:12.337000 +CVE-2013-2186,0,0,b86afed11b268d71d32e7ab89c26b9d569f8aa4014260e77ae267ce10ed56872,2024-11-21T01:51:12.450000 +CVE-2013-2187,0,0,25eb6c875dc124bb2486d6819c5a09701d5e0c0d200f0552fa27fb9a7667f0dc,2024-11-21T01:51:12.583000 +CVE-2013-2188,0,0,11a999b437f8733744d45d831f46cd5fa50b7f970fe45cd448ca36281746461d,2024-11-21T01:51:12.697000 +CVE-2013-2189,0,0,756d039b05aa0bf695016ce114cbeede88a20dfd6edb3b0873a427b923a4b847,2024-11-21T01:51:12.800000 +CVE-2013-2190,0,0,be6614f9936b691f9d194005a45d3d6d9ec2bff9e4e39323e1cab6b49565242e,2024-11-21T01:51:12.943000 +CVE-2013-2191,0,0,cdc8fd4221e1285f6fe601834e86c08499570fad3fe2e0872dc2444aeff4e5d0,2024-11-21T01:51:13.077000 +CVE-2013-2192,0,0,42acf47b13c0277151eba7ea0aa1833a96b4e38fb82804dfb3ec87ae61e77f8d,2024-11-21T01:51:13.200000 CVE-2013-2193,0,0,9e9607714aee741da3c32ad3279ace7c05d968ce5dd2be6a75959d285797a363,2017-03-24T01:59:00.500000 -CVE-2013-2194,0,1,9a927730d0dbb34eeafcdb55c0e00593ae385e2c43750d5c4a398c4b5a6381eb,2024-11-21T01:51:13.437000 -CVE-2013-2195,0,1,c00b58dd9ce84faaf18e4667e7b08fb2c92c29518d99b24448d4ece7b88acf58,2024-11-21T01:51:13.553000 -CVE-2013-2196,0,1,44949d0a467398291fef251c2a71269fb34ca2a81f41668aa878234029dcf0ee,2024-11-21T01:51:13.673000 -CVE-2013-2197,0,1,bc5a7a729866ef0699e9900d061fa768271374d8723aea8e8d5587c701f0798e,2024-11-21T01:51:13.793000 +CVE-2013-2194,0,0,9a927730d0dbb34eeafcdb55c0e00593ae385e2c43750d5c4a398c4b5a6381eb,2024-11-21T01:51:13.437000 +CVE-2013-2195,0,0,c00b58dd9ce84faaf18e4667e7b08fb2c92c29518d99b24448d4ece7b88acf58,2024-11-21T01:51:13.553000 +CVE-2013-2196,0,0,44949d0a467398291fef251c2a71269fb34ca2a81f41668aa878234029dcf0ee,2024-11-21T01:51:13.673000 +CVE-2013-2197,0,0,bc5a7a729866ef0699e9900d061fa768271374d8723aea8e8d5587c701f0798e,2024-11-21T01:51:13.793000 CVE-2013-2198,0,0,4db8430c3d99c5fa7d0445fb01c7b12e3408a6ccc062eed24646b34ce67c4dec,2020-02-13T13:27:51.320000 -CVE-2013-2199,0,1,c8c558a8ce5c2f97e65d8ffae4ad9b8c0eb20c253c4329246c4bd8c186fdee82,2024-11-21T01:51:14.037000 -CVE-2013-2200,0,1,e854019fdd7811f4d6b03f9468c0ceb4d874beb82c56424a8a52fc3d1546e4d7,2024-11-21T01:51:14.170000 -CVE-2013-2201,0,1,b2834f7fe6e1ff47ad5e77495ea3fc93564b65ae0973924d3608657fa4e56621,2024-11-21T01:51:14.300000 -CVE-2013-2202,0,1,fe82933191c3e913fba0b6458cfb86f8b216b34e8de7aef39bf2b407864a1ac8,2024-11-21T01:51:14.430000 -CVE-2013-2203,0,1,d46013681e47d51c7e37d2dd5b8cee01c6ccfb85e357df7180b4f1503e7c6a4f,2024-11-21T01:51:14.550000 -CVE-2013-2204,0,1,1041a3c8f774a126d27adb48a7b238c6dfd7ce4bf97185f4bb3496dfc7d83ec8,2024-11-21T01:51:14.670000 -CVE-2013-2205,0,1,6e455ff0b5f09d34fffd72a40dd5f9d194b914d25e8c2a110f05469a72982b41,2024-11-21T01:51:14.793000 -CVE-2013-2206,0,1,5186bd04cdacd28ba5d8c953004b68c2d22a9a24ba8b3366e36a1180533e0f0e,2024-11-21T01:51:14.917000 -CVE-2013-2207,0,1,9ad260c9060f3008d3bfa33311412ef7dcd6eb7b3b8b196ab0bcc390dca03c06,2024-11-21T01:51:15.067000 -CVE-2013-2208,0,1,b076eff031de6826d0e69aabe9695333f4b8fce0cbeb013238d77a8606443be6,2024-11-21T01:51:15.200000 -CVE-2013-2209,0,1,f0512f0963d0d6f98003c43f029b3524c9b27d9d7b48385f75e8ee94c4c232a0,2024-11-21T01:51:15.317000 -CVE-2013-2210,0,1,7605acb189a661de9749e8af38bd2573fcbb0c929f116ee9dd7127165c4c4a2d,2024-11-21T01:51:15.447000 -CVE-2013-2211,0,1,d19e03a90dea6165764dd9ed24ff45483ba2e1015373ba05d8c93ff069651852,2024-11-21T01:51:15.560000 -CVE-2013-2212,0,1,533762d3f6fefe5f6af78b6969ede54ea44dbe725606d62e949fedb73c24f111,2024-11-21T01:51:15.673000 +CVE-2013-2199,0,0,c8c558a8ce5c2f97e65d8ffae4ad9b8c0eb20c253c4329246c4bd8c186fdee82,2024-11-21T01:51:14.037000 +CVE-2013-2200,0,0,e854019fdd7811f4d6b03f9468c0ceb4d874beb82c56424a8a52fc3d1546e4d7,2024-11-21T01:51:14.170000 +CVE-2013-2201,0,0,b2834f7fe6e1ff47ad5e77495ea3fc93564b65ae0973924d3608657fa4e56621,2024-11-21T01:51:14.300000 +CVE-2013-2202,0,0,fe82933191c3e913fba0b6458cfb86f8b216b34e8de7aef39bf2b407864a1ac8,2024-11-21T01:51:14.430000 +CVE-2013-2203,0,0,d46013681e47d51c7e37d2dd5b8cee01c6ccfb85e357df7180b4f1503e7c6a4f,2024-11-21T01:51:14.550000 +CVE-2013-2204,0,0,1041a3c8f774a126d27adb48a7b238c6dfd7ce4bf97185f4bb3496dfc7d83ec8,2024-11-21T01:51:14.670000 +CVE-2013-2205,0,0,6e455ff0b5f09d34fffd72a40dd5f9d194b914d25e8c2a110f05469a72982b41,2024-11-21T01:51:14.793000 +CVE-2013-2206,0,0,5186bd04cdacd28ba5d8c953004b68c2d22a9a24ba8b3366e36a1180533e0f0e,2024-11-21T01:51:14.917000 +CVE-2013-2207,0,0,9ad260c9060f3008d3bfa33311412ef7dcd6eb7b3b8b196ab0bcc390dca03c06,2024-11-21T01:51:15.067000 +CVE-2013-2208,0,0,b076eff031de6826d0e69aabe9695333f4b8fce0cbeb013238d77a8606443be6,2024-11-21T01:51:15.200000 +CVE-2013-2209,0,0,f0512f0963d0d6f98003c43f029b3524c9b27d9d7b48385f75e8ee94c4c232a0,2024-11-21T01:51:15.317000 +CVE-2013-2210,0,0,7605acb189a661de9749e8af38bd2573fcbb0c929f116ee9dd7127165c4c4a2d,2024-11-21T01:51:15.447000 +CVE-2013-2211,0,0,d19e03a90dea6165764dd9ed24ff45483ba2e1015373ba05d8c93ff069651852,2024-11-21T01:51:15.560000 +CVE-2013-2212,0,0,533762d3f6fefe5f6af78b6969ede54ea44dbe725606d62e949fedb73c24f111,2024-11-21T01:51:15.673000 CVE-2013-2213,0,0,77b3b0ec3f023706190d8adcff9dbd871da688776268d71511191d73eee9d96b,2020-02-24T20:29:19.967000 -CVE-2013-2214,0,1,71a1a130bd4ea7ce198d4368c5143c95f6ab4c43f20c137b30d347e36d096c9a,2024-11-21T01:51:15.910000 +CVE-2013-2214,0,0,71a1a130bd4ea7ce198d4368c5143c95f6ab4c43f20c137b30d347e36d096c9a,2024-11-21T01:51:15.910000 CVE-2013-2215,0,0,4ce4ba436e8d9e4255bd5a54451b6ef794dd710d7361baea709ea98376cbb5d2,2023-11-07T02:14:58.303000 CVE-2013-2216,0,0,ff84869ad868a3c722ab0306e7f9a45e23f5422f525973e75907cc208deeb784,2023-11-07T02:14:58.527000 -CVE-2013-2217,0,1,bd0476dd30035e4dd84d5664a18309a1151c93d27a315d394d70072eaeaa8df5,2024-11-21T01:51:16.077000 -CVE-2013-2218,0,1,125c1ca0ab7d538fd9edc737761d39503cef72a2964e87eb014e8bab1791fbec,2024-11-21T01:51:16.183000 -CVE-2013-2219,0,1,5fa8214adf2ceca77d902bb7b03051ed2bd51cd7e5349a793189b1f92b6f152a,2024-11-21T01:51:16.293000 -CVE-2013-2220,0,1,a9ac21f7c6ef649dffad7770d1fa47cf80fca0c189dcd7467eb5872022a5cfd7,2024-11-21T01:51:16.403000 -CVE-2013-2221,0,1,fa5e5d0a0870d8ae0353533a60fad7c0ab69346219f0dd2fa5133351296caf48,2024-11-21T01:51:16.517000 -CVE-2013-2222,0,1,157681de56f28af5713dc00697b25a9fb906a712c343cb006793b8ec7560cc15,2024-11-21T01:51:16.640000 -CVE-2013-2223,0,1,c22e4e23b6a2e5ae0f3e50d57ecac752ca064a79496b7526ea55b598b30ed572,2024-11-21T01:51:16.757000 -CVE-2013-2224,0,1,e8b61cfd7bdca73aa61d11cc817f9262aef310ea8edcc3bef3e3aa7d845fd422,2024-11-21T01:51:16.880000 +CVE-2013-2217,0,0,bd0476dd30035e4dd84d5664a18309a1151c93d27a315d394d70072eaeaa8df5,2024-11-21T01:51:16.077000 +CVE-2013-2218,0,0,125c1ca0ab7d538fd9edc737761d39503cef72a2964e87eb014e8bab1791fbec,2024-11-21T01:51:16.183000 +CVE-2013-2219,0,0,5fa8214adf2ceca77d902bb7b03051ed2bd51cd7e5349a793189b1f92b6f152a,2024-11-21T01:51:16.293000 +CVE-2013-2220,0,0,a9ac21f7c6ef649dffad7770d1fa47cf80fca0c189dcd7467eb5872022a5cfd7,2024-11-21T01:51:16.403000 +CVE-2013-2221,0,0,fa5e5d0a0870d8ae0353533a60fad7c0ab69346219f0dd2fa5133351296caf48,2024-11-21T01:51:16.517000 +CVE-2013-2222,0,0,157681de56f28af5713dc00697b25a9fb906a712c343cb006793b8ec7560cc15,2024-11-21T01:51:16.640000 +CVE-2013-2223,0,0,c22e4e23b6a2e5ae0f3e50d57ecac752ca064a79496b7526ea55b598b30ed572,2024-11-21T01:51:16.757000 +CVE-2013-2224,0,0,e8b61cfd7bdca73aa61d11cc817f9262aef310ea8edcc3bef3e3aa7d845fd422,2024-11-21T01:51:16.880000 CVE-2013-2225,0,0,84f9ca0a5b80df8590074f1c637086b40dd3186a36cfd5929e333f1ce99496be,2014-05-28T17:07:30.050000 -CVE-2013-2226,0,1,7b85049a6d5c8c6b21c5eed7bc462ed24d551e21fa83ddf29499bbd53cd44911,2024-11-21T01:51:17.140000 +CVE-2013-2226,0,0,7b85049a6d5c8c6b21c5eed7bc462ed24d551e21fa83ddf29499bbd53cd44911,2024-11-21T01:51:17.140000 CVE-2013-2227,0,0,13a8e569879a27f6501dac5d17d196d37a12c122b0a760291de9da8cd466739f,2019-11-04T20:00:37.287000 CVE-2013-2228,0,0,83c8d6bada480b4a5d3d101bb47d36051d0501c1ac490dbbf2f38079eeb21999,2019-12-13T15:33:16.367000 CVE-2013-2229,0,0,71cc16c000f57090622a36fc7d97e442d1bfd28998d0cc79bc526263660fc612,2023-11-07T02:14:58.873000 -CVE-2013-2230,0,1,4294a50235aae481acd8160c12bda650c873af08eabb27cd37aff47093b53463,2024-11-21T01:51:17.513000 -CVE-2013-2231,0,1,1306f99f819e7efe6620b27292014b34682f0808c574c2dfb649ec982dddfef9,2024-11-21T01:51:17.640000 -CVE-2013-2232,0,1,c9a4ce8dafb1759f765c99226df6c0b0b17dfba7f09987c5b1469177c8da86c0,2024-11-21T01:51:17.750000 +CVE-2013-2230,0,0,4294a50235aae481acd8160c12bda650c873af08eabb27cd37aff47093b53463,2024-11-21T01:51:17.513000 +CVE-2013-2231,0,0,1306f99f819e7efe6620b27292014b34682f0808c574c2dfb649ec982dddfef9,2024-11-21T01:51:17.640000 +CVE-2013-2232,0,0,c9a4ce8dafb1759f765c99226df6c0b0b17dfba7f09987c5b1469177c8da86c0,2024-11-21T01:51:17.750000 CVE-2013-2233,0,0,5bd6af68d1c02e22c1b9458455ad3bcb54af06ef427df9c84666233c2992980a,2018-06-07T17:24:49.363000 -CVE-2013-2234,0,1,de9ae8702a1c94645f83af307f4435659c9335295b8980af7baed7dd351bb911,2024-11-21T01:51:18.050000 +CVE-2013-2234,0,0,de9ae8702a1c94645f83af307f4435659c9335295b8980af7baed7dd351bb911,2024-11-21T01:51:18.050000 CVE-2013-2235,0,0,c886cf2361995218e862b295a71c8c35c957793290dab78474ae401083847f1a,2023-11-07T02:14:59.127000 -CVE-2013-2236,0,1,fb2cad8410ac9d42fbbb6e0cf943283aefac8cbbe467199d4e1d8925f15ece80,2024-11-21T01:51:18.240000 -CVE-2013-2237,0,1,86f83b765cc22d7c35bea529e5d544093f087a04a88e3274de6ed8ea4402410d,2024-11-21T01:51:18.363000 -CVE-2013-2238,0,1,f4d57f18b677459bf1ddca3368f978fb3cb84d93b1b7fdb8c8867c9cb2fa986a,2024-11-21T01:51:18.517000 -CVE-2013-2239,0,1,fa4fca8e904fe4ae14703c3d332b063242eebdee00fc2bdd9a60eb012b7395c9,2024-11-21T01:51:18.627000 -CVE-2013-2240,0,1,5b965bb9ec1ffe37d56498feb1d44299a0e5c9744356f17218df7381a056830a,2024-11-21T01:51:18.737000 -CVE-2013-2241,0,1,b952cf90e1cf266beeccef6b80c4782bb9af696ecd783de2ccbb8e7409d0dd04,2024-11-21T01:51:18.850000 -CVE-2013-2242,0,1,b611b5f0de10fae7076b549130ab4e9e35d812388b0c2bb6a5e927e71510aa26,2024-11-21T01:51:18.960000 -CVE-2013-2243,0,1,e50cfccc45964261dd8bd6852b71cbdd7246ef1e43ffdfb06b37450d41518a8c,2024-11-21T01:51:19.087000 -CVE-2013-2244,0,1,120ed7c66eb8924f9fbbc5954e74a61c4d870ed7c47c8e8f62bf14ee2d0e4414,2024-11-21T01:51:19.227000 -CVE-2013-2245,0,1,32812404b25083bc1a4be42773237ebdb8b4ea8ab7088a266f792d929bb626f3,2024-11-21T01:51:19.337000 -CVE-2013-2246,0,1,7178319f0fec78aad090b1b2c5e7bde13e282135d82e22ceabaab45f6bb59ed0,2024-11-21T01:51:19.460000 -CVE-2013-2247,0,1,a10b84eda5fa7eb734e33c7cae421c90ff553a774cad253490f06fc9dce043d1,2024-11-21T01:51:19.583000 -CVE-2013-2248,0,1,db47a0c3293ec2dd123a04e49765beb89d0ea2754f09eedf09c35fe9e65138cc,2024-11-21T01:51:19.700000 -CVE-2013-2249,0,1,3a41ebb91ce6b776aa90b527ce2803bdfd5245ae24b381d393ad332646438452,2024-11-21T01:51:19.820000 -CVE-2013-2250,0,1,7f772082e082077e836901879b25669c10937d72ff53db0068dc96e1c715f558,2024-11-21T01:51:19.960000 -CVE-2013-2251,0,1,38d215843abda8d7a7dee3ed4475ba8c27713a0f30aa885b4856dae3b2b3921d,2024-11-21T01:51:20.080000 +CVE-2013-2236,0,0,fb2cad8410ac9d42fbbb6e0cf943283aefac8cbbe467199d4e1d8925f15ece80,2024-11-21T01:51:18.240000 +CVE-2013-2237,0,0,86f83b765cc22d7c35bea529e5d544093f087a04a88e3274de6ed8ea4402410d,2024-11-21T01:51:18.363000 +CVE-2013-2238,0,0,f4d57f18b677459bf1ddca3368f978fb3cb84d93b1b7fdb8c8867c9cb2fa986a,2024-11-21T01:51:18.517000 +CVE-2013-2239,0,0,fa4fca8e904fe4ae14703c3d332b063242eebdee00fc2bdd9a60eb012b7395c9,2024-11-21T01:51:18.627000 +CVE-2013-2240,0,0,5b965bb9ec1ffe37d56498feb1d44299a0e5c9744356f17218df7381a056830a,2024-11-21T01:51:18.737000 +CVE-2013-2241,0,0,b952cf90e1cf266beeccef6b80c4782bb9af696ecd783de2ccbb8e7409d0dd04,2024-11-21T01:51:18.850000 +CVE-2013-2242,0,0,b611b5f0de10fae7076b549130ab4e9e35d812388b0c2bb6a5e927e71510aa26,2024-11-21T01:51:18.960000 +CVE-2013-2243,0,0,e50cfccc45964261dd8bd6852b71cbdd7246ef1e43ffdfb06b37450d41518a8c,2024-11-21T01:51:19.087000 +CVE-2013-2244,0,0,120ed7c66eb8924f9fbbc5954e74a61c4d870ed7c47c8e8f62bf14ee2d0e4414,2024-11-21T01:51:19.227000 +CVE-2013-2245,0,0,32812404b25083bc1a4be42773237ebdb8b4ea8ab7088a266f792d929bb626f3,2024-11-21T01:51:19.337000 +CVE-2013-2246,0,0,7178319f0fec78aad090b1b2c5e7bde13e282135d82e22ceabaab45f6bb59ed0,2024-11-21T01:51:19.460000 +CVE-2013-2247,0,0,a10b84eda5fa7eb734e33c7cae421c90ff553a774cad253490f06fc9dce043d1,2024-11-21T01:51:19.583000 +CVE-2013-2248,0,0,db47a0c3293ec2dd123a04e49765beb89d0ea2754f09eedf09c35fe9e65138cc,2024-11-21T01:51:19.700000 +CVE-2013-2249,0,0,3a41ebb91ce6b776aa90b527ce2803bdfd5245ae24b381d393ad332646438452,2024-11-21T01:51:19.820000 +CVE-2013-2250,0,0,7f772082e082077e836901879b25669c10937d72ff53db0068dc96e1c715f558,2024-11-21T01:51:19.960000 +CVE-2013-2251,0,0,38d215843abda8d7a7dee3ed4475ba8c27713a0f30aa885b4856dae3b2b3921d,2024-11-21T01:51:20.080000 CVE-2013-2252,0,0,d504525db46d457241326a706b7130374206cc134c39d971c900a0f8d539cec8,2023-11-07T02:14:59.717000 -CVE-2013-2254,0,1,5cf5b5b856b10c47cba563b663ef5422a0ee73c3ec411af2cc3edbd10864e5ff,2024-11-21T01:51:20.260000 +CVE-2013-2254,0,0,5cf5b5b856b10c47cba563b663ef5422a0ee73c3ec411af2cc3edbd10864e5ff,2024-11-21T01:51:20.260000 CVE-2013-2255,0,0,9b42aa4a1aae53cddbe680e647a582ce681ee55342741072a9fb46fa64a1d2b7,2019-11-07T19:38:40.460000 -CVE-2013-2256,0,1,dc3300bef897ea870e0f10df86e318faabda5f261152635152a0f527c0a6c2c2,2024-11-21T01:51:20.493000 +CVE-2013-2256,0,0,dc3300bef897ea870e0f10df86e318faabda5f261152635152a0f527c0a6c2c2,2024-11-21T01:51:20.493000 CVE-2013-2257,0,0,d242e936cd890da05d8b3e6e5f05fddb39fd42301b1e3406c404649143ae5606,2019-11-05T13:44:22.500000 CVE-2013-2258,0,0,dd3b8ec3dffac530562f9f031f19a0321e7f04c5f4e747c576838e79aeac9170,2019-11-06T14:41:22.630000 CVE-2013-2259,0,0,2f171683c73d5ec7ab9e3247a9add7fce8170858b7327d48dfe654ef536b81dd,2019-11-05T13:30:48.650000 CVE-2013-2260,0,0,6fd8a0014c5e949d162c0967aa293402af4230aa9992f4b322aae68bd18936f1,2019-11-06T15:10:06.083000 CVE-2013-2261,0,0,c20fabe537b97df0ab15c65ed2e7b158da480279af4128a7e92afef18cfeaa44,2019-11-05T14:21:55.760000 CVE-2013-2262,0,0,dd7aa3f4b5045bfdc07ec5414c9d31a2ef083729446136c701d928f8119e1c00,2019-11-05T13:22:36.550000 -CVE-2013-2263,0,1,5366d0770f5db3e78dc4e9d61c1b3e27c451f7e503855930f87ec7f32399bfe0,2024-11-21T01:51:21.300000 -CVE-2013-2264,0,1,227ac5ab4bba86835580db9be9105c2ae25e5f48260d186f4d4ef0b644985d24,2024-11-21T01:51:21.460000 -CVE-2013-2266,0,1,60bfd5660e53c17cf17dc87b3f485fa03d821c8faf25d5e9aa597ef2fa6cb2df,2024-11-21T01:51:21.653000 +CVE-2013-2263,0,0,5366d0770f5db3e78dc4e9d61c1b3e27c451f7e503855930f87ec7f32399bfe0,2024-11-21T01:51:21.300000 +CVE-2013-2264,0,0,227ac5ab4bba86835580db9be9105c2ae25e5f48260d186f4d4ef0b644985d24,2024-11-21T01:51:21.460000 +CVE-2013-2266,0,0,60bfd5660e53c17cf17dc87b3f485fa03d821c8faf25d5e9aa597ef2fa6cb2df,2024-11-21T01:51:21.653000 CVE-2013-2267,0,0,6380b8169f484ab4ff0e2f9eacb62096738de19b68734d8181b31f2f2bb4c4cc,2020-01-29T21:18:50.667000 -CVE-2013-2268,0,1,78d53ceffb97b0feb455eefc7423b256a5e29c2a2574d1488be820c387d487b1,2024-11-21T01:51:22.353000 -CVE-2013-2269,0,1,110a0574284d1382cd6e4e1d39cac7210c709aa3c05b563673478cec7a2ed787,2024-11-21T01:51:22.530000 -CVE-2013-2270,0,1,44d30d402ae66218cb47b64fbf4ae3d6731243e303355eca1aecbaacb1de192c,2024-11-21T01:51:22.673000 -CVE-2013-2271,0,1,76c3a2d8407884fa5c6d15f107328b9cfeac572076113093e191843d0e57c0df,2024-11-21T01:51:22.820000 -CVE-2013-2272,0,1,073f03ef89c829f7dd4c460455a40b79532f0c8d2c36e9945da31c2fcfd82db8,2024-11-21T01:51:22.957000 -CVE-2013-2273,0,1,a09c63068d37f36cf851367ad3856f8861538731df824ec03f4b0aef1090de80,2024-11-21T01:51:23.107000 -CVE-2013-2274,0,1,0969a41e2e09a0d493cd43043e6df79c490f319ad86733c488a64028c868e769,2024-11-21T01:51:23.297000 -CVE-2013-2275,0,1,998597fec72010398c2df066ab805f9ea2dadd50f94767a0b1eac531bfaf56b2,2024-11-21T01:51:23.440000 -CVE-2013-2276,0,1,8619c38f4bc00ba20adc0ea6006ed7e00bfc156487515b52f9428f6fcaec61fc,2024-11-21T01:51:23.593000 -CVE-2013-2277,0,1,82cc0928be77985db2a954506251ea1bc5c7f74ed139b359340b1dbe38e73365,2024-11-21T01:51:23.737000 -CVE-2013-2278,0,1,ed80932e2845c510d6d15a97b6db1589bbb5e65cb74c41e391171c1ba031a1e2,2024-11-21T01:51:23.873000 -CVE-2013-2279,0,1,0609f90ff5795db8459eb503a14a3cfb82e6141f90d1c7b2a66a7e77d2afe10b,2024-11-21T01:51:24.017000 -CVE-2013-2287,0,1,dee824feb106ad0b11c172c224d2723f6d0fac750b482693b33055819a98b741,2024-11-21T01:51:24.150000 -CVE-2013-2289,0,1,ae1e0555691acccbfef856ed95e707b205aa6c81e618dd1b04a28de0143309be,2024-11-21T01:51:24.280000 -CVE-2013-2290,0,1,56a931820bdea0a0fdd87f5fee80acfce37bc032218d8876c0a1f044cc483536,2024-11-21T01:51:24.413000 -CVE-2013-2292,0,1,7bca306beb3513d8c013bc07fb57e3a27b0f4793737498d12a90b391f6d37e0f,2024-11-21T01:51:24.550000 -CVE-2013-2293,0,1,d81b15a153bfc16aaab0675e9c8d97ff907d2ef0a5c20c1c840e128135ac04da,2024-11-21T01:51:24.693000 +CVE-2013-2268,0,0,78d53ceffb97b0feb455eefc7423b256a5e29c2a2574d1488be820c387d487b1,2024-11-21T01:51:22.353000 +CVE-2013-2269,0,0,110a0574284d1382cd6e4e1d39cac7210c709aa3c05b563673478cec7a2ed787,2024-11-21T01:51:22.530000 +CVE-2013-2270,0,0,44d30d402ae66218cb47b64fbf4ae3d6731243e303355eca1aecbaacb1de192c,2024-11-21T01:51:22.673000 +CVE-2013-2271,0,0,76c3a2d8407884fa5c6d15f107328b9cfeac572076113093e191843d0e57c0df,2024-11-21T01:51:22.820000 +CVE-2013-2272,0,0,073f03ef89c829f7dd4c460455a40b79532f0c8d2c36e9945da31c2fcfd82db8,2024-11-21T01:51:22.957000 +CVE-2013-2273,0,0,a09c63068d37f36cf851367ad3856f8861538731df824ec03f4b0aef1090de80,2024-11-21T01:51:23.107000 +CVE-2013-2274,0,0,0969a41e2e09a0d493cd43043e6df79c490f319ad86733c488a64028c868e769,2024-11-21T01:51:23.297000 +CVE-2013-2275,0,0,998597fec72010398c2df066ab805f9ea2dadd50f94767a0b1eac531bfaf56b2,2024-11-21T01:51:23.440000 +CVE-2013-2276,0,0,8619c38f4bc00ba20adc0ea6006ed7e00bfc156487515b52f9428f6fcaec61fc,2024-11-21T01:51:23.593000 +CVE-2013-2277,0,0,82cc0928be77985db2a954506251ea1bc5c7f74ed139b359340b1dbe38e73365,2024-11-21T01:51:23.737000 +CVE-2013-2278,0,0,ed80932e2845c510d6d15a97b6db1589bbb5e65cb74c41e391171c1ba031a1e2,2024-11-21T01:51:23.873000 +CVE-2013-2279,0,0,0609f90ff5795db8459eb503a14a3cfb82e6141f90d1c7b2a66a7e77d2afe10b,2024-11-21T01:51:24.017000 +CVE-2013-2287,0,0,dee824feb106ad0b11c172c224d2723f6d0fac750b482693b33055819a98b741,2024-11-21T01:51:24.150000 +CVE-2013-2289,0,0,ae1e0555691acccbfef856ed95e707b205aa6c81e618dd1b04a28de0143309be,2024-11-21T01:51:24.280000 +CVE-2013-2290,0,0,56a931820bdea0a0fdd87f5fee80acfce37bc032218d8876c0a1f044cc483536,2024-11-21T01:51:24.413000 +CVE-2013-2292,0,0,7bca306beb3513d8c013bc07fb57e3a27b0f4793737498d12a90b391f6d37e0f,2024-11-21T01:51:24.550000 +CVE-2013-2293,0,0,d81b15a153bfc16aaab0675e9c8d97ff907d2ef0a5c20c1c840e128135ac04da,2024-11-21T01:51:24.693000 CVE-2013-2294,0,0,e324a872acdd3d465e57919aed071285cbac46084d62786a1e4aafb7f181d203,2020-01-31T20:05:14.967000 -CVE-2013-2296,0,1,7b35d3fa7b1e3a5b00f31598d36e7727d3576c30c8a61638305e9bd99afd6532,2024-11-21T01:51:24.970000 -CVE-2013-2297,0,1,d2a5efe91d2aa9770c56efb63285dcb18d11e488156b6feba79060c707434605,2024-11-21T01:51:25.103000 +CVE-2013-2296,0,0,7b35d3fa7b1e3a5b00f31598d36e7727d3576c30c8a61638305e9bd99afd6532,2024-11-21T01:51:24.970000 +CVE-2013-2297,0,0,d2a5efe91d2aa9770c56efb63285dcb18d11e488156b6feba79060c707434605,2024-11-21T01:51:25.103000 CVE-2013-2298,0,0,62f6f9a7ea2081b534bc0287e71531a63c2157d324a50f74db01e744dba2c3bd,2023-11-07T02:15:00.433000 -CVE-2013-2299,0,1,b21b3f581a5531ed38c18b44cdd580f2116a628b88e9b8615832b0542e88b9fc,2024-11-21T01:51:25.387000 -CVE-2013-2300,0,1,2cc48bdfc49074f2031725d4d3a62562230e924d658098ca2c82e16b47de4653,2024-11-21T01:51:25.490000 -CVE-2013-2301,0,1,1287911c60effa49b1cd358e45f4a7a2a8ec11eb431db252466949816cd64c20,2024-11-21T01:51:25.590000 -CVE-2013-2302,0,1,53f16d35f24e18b1930cab6e555fb78b0fb5c1f91bc294d7992375c8b57aee05,2024-11-21T01:51:25.687000 -CVE-2013-2303,0,1,ea1b8673f12a3ee2bf7835e467c48dc4ebfdb3ea6f2fddc7301778826982ff1b,2024-11-21T01:51:25.780000 -CVE-2013-2304,0,1,65a9c6f7fbaea4ff01b41c4adbad96225fbfb556243a639d6453bd824359f941,2024-11-21T01:51:25.877000 -CVE-2013-2305,0,1,e020ff9d468b3b9e1e0abcd60b01e37fe150d076fa8c5397ce52054e13cb1961,2024-11-21T01:51:25.990000 -CVE-2013-2306,0,1,f974ca27d737274e36d4c5b48cf84af153ce349097558f5198f409b5e350db6e,2024-11-21T01:51:26.100000 -CVE-2013-2307,0,1,707a9cff452b93fce9a374ebbe74bf4b7761f551553b631684deb07b207c41f2,2024-11-21T01:51:26.197000 -CVE-2013-2308,0,1,af9561b09f705c2b1bd8a8ea73a3f1b3669ca23fe75781538f61f01e4ce26a50,2024-11-21T01:51:26.297000 -CVE-2013-2309,0,1,75572e20bffa0a72c62537ae899903115aaefd701bb95870cc56f8e77066f0af,2024-11-21T01:51:26.393000 -CVE-2013-2310,0,1,66b0ca0c006d565c50219bed3ef8df7c5344ee6086cab0a2e4d51469ad3f7247,2024-11-21T01:51:26.503000 -CVE-2013-2311,0,1,7410d84ff4a3f1bb3ce66c959561edc086cbc7cd97dfc361faa69ace6424dd16,2024-11-21T01:51:26.627000 -CVE-2013-2312,0,1,b7bbbf0592147a9cd9137183ccd582355726079f3aa283507e3f295d1cc3c8a3,2024-11-21T01:51:26.747000 -CVE-2013-2313,0,1,c4dd62a9f0526ad2128cd15809094bb773e0209768d3295dee1312ffe831e9d9,2024-11-21T01:51:26.857000 -CVE-2013-2314,0,1,b9b7e38570328dc53f963958fff84e68be6754b8340ecf3e5c63b28c9225b0a4,2024-11-21T01:51:26.953000 -CVE-2013-2315,0,1,17f61fd30543c89dd73b862b678ed9738705d0f222752e2b414dfb1fc6dd2e57,2024-11-21T01:51:27.067000 -CVE-2013-2316,0,1,9047531f74fd4b39a9c1a880c9db8d8bae9cccacd6fa919654c12ac438db76ed,2024-11-21T01:51:27.170000 -CVE-2013-2317,0,1,ee653f082805c84566a095a38686e7770fc07af698411d4cf3323353d72f2c43,2024-11-21T01:51:27.277000 -CVE-2013-2318,0,1,ae4d3dd90351004988e45e4d60db845bd5898220277259ea4ffd8b0fb5dae7a5,2024-11-21T01:51:27.387000 -CVE-2013-2319,0,1,72db9bb9c92cac95aa75cbb19ebaff5a943b81b6a13a2e8a03a50cd90f80feb0,2024-11-21T01:51:27.487000 -CVE-2013-2321,0,1,59f10689e31f5f08233fee2c8bab81cb27395679c7412dad28769c399891a73c,2024-11-21T01:51:27.583000 -CVE-2013-2322,0,1,5fad445dddc45472a93fdfc52771119976b9d67f6e37ad6f77459af8dc76338e,2024-11-21T01:51:27.683000 -CVE-2013-2323,0,1,bcc126ec9f06267fd90c304c5d2da00507acfe764129c493a7c199ecf53f0589,2024-11-21T01:51:27.777000 -CVE-2013-2324,0,1,640624f4a06f87691a7249e5442474d3d05cc9d15c4dd769c3e726fc002622df,2024-11-21T01:51:27.870000 -CVE-2013-2325,0,1,15e12330f0a3f3506005a778e351f65082eac6db376ee9fc1ed47cf03b6eb155,2024-11-21T01:51:27.980000 -CVE-2013-2326,0,1,f865ec682d2bf4b6616064f976f91fa490b004fa61450bb0dc47f5f01d0d4849,2024-11-21T01:51:28.090000 -CVE-2013-2327,0,1,9a565d62294e045d38e427c9f596715c969486c1f3b9d4ec4c204678699575e7,2024-11-21T01:51:28.193000 -CVE-2013-2328,0,1,a8babfbc3e74d453c222102c994645d29508eb3c88f15e822565bb3f116fc140,2024-11-21T01:51:28.297000 -CVE-2013-2329,0,1,02e36ac347c36448125432a55eb09337854e36611c3930bdeb6b025573d7cc2f,2024-11-21T01:51:28.420000 -CVE-2013-2330,0,1,a2885dd435ae2c6d1e24456f9fb39da6b5f3110f082b460fdce089664af022d3,2024-11-21T01:51:28.533000 -CVE-2013-2331,0,1,4fa89a2899bbb8c6651ecc2ccf0fbf88a1fdb8e29a3c51e9748467e860dd2438,2024-11-21T01:51:28.640000 -CVE-2013-2332,0,1,b8cfbb70d31e78829e0d1fb3c2e40edf44fad0496b992ee2a5353eb21c73b22b,2024-11-21T01:51:28.743000 -CVE-2013-2333,0,1,83511744ae7ec6e4f1c3373a3662d6f79482973c7b39a78d975bad7b48a7f166,2024-11-21T01:51:28.843000 -CVE-2013-2334,0,1,ea8a62d7e23c916c5b14835a97d20608b858580ab87041e31e6e73c86c592fba,2024-11-21T01:51:28.957000 -CVE-2013-2335,0,1,3018acb4e30def6db8984d562f5f92e6ba671cfd52dff1a6d111e69f3a62edbe,2024-11-21T01:51:29.060000 -CVE-2013-2336,0,1,84271d26444ceded529a750de351282196cf39ad41cf5a6b07c07f051854b921,2024-11-21T01:51:29.167000 -CVE-2013-2337,0,1,8bf8609bfc2b2d1d191932aaaf6e9d0eb072b13aa75e8c4f493fd08b0ffff256,2024-11-21T01:51:29.280000 -CVE-2013-2338,0,1,e9ebe5186a74b134e3e417630513ab181bffbcbd94612a9f7190b3c4531c5849,2024-11-21T01:51:29.383000 -CVE-2013-2339,0,1,77e8d8e3a7668048bcd134f1b17effd00883023062081ee57845b4e28bf273b0,2024-11-21T01:51:29.487000 -CVE-2013-2340,0,1,39c3037bbace479a6d77a93b6cb3874a092aed9b4e5fff7c78cb01255613a64a,2024-11-21T01:51:29.590000 -CVE-2013-2341,0,1,c77ffefe7a48c312d4a0baec2dc64f78c14fdc861da3c6657ceb7a358f91e9ac,2024-11-21T01:51:29.743000 -CVE-2013-2342,0,1,ba631b53039b5de7b9dd350d25f54681657e63ee39a674e311e6e1c00792122b,2024-11-21T01:51:29.897000 -CVE-2013-2343,0,1,7889c44abcb1c0eae0a4bedae0ec46856403847bb55ef85058200e24511f1dcb,2024-11-21T01:51:29.997000 -CVE-2013-2344,0,1,8535c59e09bb715c03edac603a0bee3d04ce50be831acda44b689eda13eae330,2024-11-21T01:51:30.100000 -CVE-2013-2345,0,1,cbf647cc11b851ff3ace5783f7803216b7861e7217724eefa28c63b5cf7225b3,2024-11-21T01:51:30.207000 -CVE-2013-2346,0,1,69306fd4d48611eda1dd3a7b3dacdddaa6e6b96ef3d7a2bca7a6961f9eb5c245,2024-11-21T01:51:30.313000 -CVE-2013-2347,0,1,cc88fa331cd5ee10b2248ba2b2749a59e8dafb12880e06e3cf9ea87d58732601,2024-11-21T01:51:30.420000 -CVE-2013-2348,0,1,e9871654a7be8437d07f220f52424ccd9984cb9a028874e3065577d2679ddc7c,2024-11-21T01:51:30.533000 -CVE-2013-2349,0,1,a4c6100dc282c36ef7516ef3e07155b160fd8b000d4138fd9368304b0b9a56cc,2024-11-21T01:51:30.630000 -CVE-2013-2350,0,1,bd68365051043fc0dc3613507447b3ebfab8fdfebadeb1e7e2d0658b6631d3d9,2024-11-21T01:51:30.743000 -CVE-2013-2351,0,1,0442d904b903dca54225ef7c795fd51619701ff02973572416667d9923bfebf5,2024-11-21T01:51:30.843000 -CVE-2013-2352,0,1,4ab815ad8053b2b4350f54ddde8cc879b40e1342fda6d93d956cecc00860be62,2024-11-21T01:51:30.940000 -CVE-2013-2353,0,1,85958540198cceb63224f496348a6756bac3e9c158e86c14ec9bcf3f8a0865dc,2024-11-21T01:51:31.063000 +CVE-2013-2299,0,0,b21b3f581a5531ed38c18b44cdd580f2116a628b88e9b8615832b0542e88b9fc,2024-11-21T01:51:25.387000 +CVE-2013-2300,0,0,2cc48bdfc49074f2031725d4d3a62562230e924d658098ca2c82e16b47de4653,2024-11-21T01:51:25.490000 +CVE-2013-2301,0,0,1287911c60effa49b1cd358e45f4a7a2a8ec11eb431db252466949816cd64c20,2024-11-21T01:51:25.590000 +CVE-2013-2302,0,0,53f16d35f24e18b1930cab6e555fb78b0fb5c1f91bc294d7992375c8b57aee05,2024-11-21T01:51:25.687000 +CVE-2013-2303,0,0,ea1b8673f12a3ee2bf7835e467c48dc4ebfdb3ea6f2fddc7301778826982ff1b,2024-11-21T01:51:25.780000 +CVE-2013-2304,0,0,65a9c6f7fbaea4ff01b41c4adbad96225fbfb556243a639d6453bd824359f941,2024-11-21T01:51:25.877000 +CVE-2013-2305,0,0,e020ff9d468b3b9e1e0abcd60b01e37fe150d076fa8c5397ce52054e13cb1961,2024-11-21T01:51:25.990000 +CVE-2013-2306,0,0,f974ca27d737274e36d4c5b48cf84af153ce349097558f5198f409b5e350db6e,2024-11-21T01:51:26.100000 +CVE-2013-2307,0,0,707a9cff452b93fce9a374ebbe74bf4b7761f551553b631684deb07b207c41f2,2024-11-21T01:51:26.197000 +CVE-2013-2308,0,0,af9561b09f705c2b1bd8a8ea73a3f1b3669ca23fe75781538f61f01e4ce26a50,2024-11-21T01:51:26.297000 +CVE-2013-2309,0,0,75572e20bffa0a72c62537ae899903115aaefd701bb95870cc56f8e77066f0af,2024-11-21T01:51:26.393000 +CVE-2013-2310,0,0,66b0ca0c006d565c50219bed3ef8df7c5344ee6086cab0a2e4d51469ad3f7247,2024-11-21T01:51:26.503000 +CVE-2013-2311,0,0,7410d84ff4a3f1bb3ce66c959561edc086cbc7cd97dfc361faa69ace6424dd16,2024-11-21T01:51:26.627000 +CVE-2013-2312,0,0,b7bbbf0592147a9cd9137183ccd582355726079f3aa283507e3f295d1cc3c8a3,2024-11-21T01:51:26.747000 +CVE-2013-2313,0,0,c4dd62a9f0526ad2128cd15809094bb773e0209768d3295dee1312ffe831e9d9,2024-11-21T01:51:26.857000 +CVE-2013-2314,0,0,b9b7e38570328dc53f963958fff84e68be6754b8340ecf3e5c63b28c9225b0a4,2024-11-21T01:51:26.953000 +CVE-2013-2315,0,0,17f61fd30543c89dd73b862b678ed9738705d0f222752e2b414dfb1fc6dd2e57,2024-11-21T01:51:27.067000 +CVE-2013-2316,0,0,9047531f74fd4b39a9c1a880c9db8d8bae9cccacd6fa919654c12ac438db76ed,2024-11-21T01:51:27.170000 +CVE-2013-2317,0,0,ee653f082805c84566a095a38686e7770fc07af698411d4cf3323353d72f2c43,2024-11-21T01:51:27.277000 +CVE-2013-2318,0,0,ae4d3dd90351004988e45e4d60db845bd5898220277259ea4ffd8b0fb5dae7a5,2024-11-21T01:51:27.387000 +CVE-2013-2319,0,0,72db9bb9c92cac95aa75cbb19ebaff5a943b81b6a13a2e8a03a50cd90f80feb0,2024-11-21T01:51:27.487000 +CVE-2013-2321,0,0,59f10689e31f5f08233fee2c8bab81cb27395679c7412dad28769c399891a73c,2024-11-21T01:51:27.583000 +CVE-2013-2322,0,0,5fad445dddc45472a93fdfc52771119976b9d67f6e37ad6f77459af8dc76338e,2024-11-21T01:51:27.683000 +CVE-2013-2323,0,0,bcc126ec9f06267fd90c304c5d2da00507acfe764129c493a7c199ecf53f0589,2024-11-21T01:51:27.777000 +CVE-2013-2324,0,0,640624f4a06f87691a7249e5442474d3d05cc9d15c4dd769c3e726fc002622df,2024-11-21T01:51:27.870000 +CVE-2013-2325,0,0,15e12330f0a3f3506005a778e351f65082eac6db376ee9fc1ed47cf03b6eb155,2024-11-21T01:51:27.980000 +CVE-2013-2326,0,0,f865ec682d2bf4b6616064f976f91fa490b004fa61450bb0dc47f5f01d0d4849,2024-11-21T01:51:28.090000 +CVE-2013-2327,0,0,9a565d62294e045d38e427c9f596715c969486c1f3b9d4ec4c204678699575e7,2024-11-21T01:51:28.193000 +CVE-2013-2328,0,0,a8babfbc3e74d453c222102c994645d29508eb3c88f15e822565bb3f116fc140,2024-11-21T01:51:28.297000 +CVE-2013-2329,0,0,02e36ac347c36448125432a55eb09337854e36611c3930bdeb6b025573d7cc2f,2024-11-21T01:51:28.420000 +CVE-2013-2330,0,0,a2885dd435ae2c6d1e24456f9fb39da6b5f3110f082b460fdce089664af022d3,2024-11-21T01:51:28.533000 +CVE-2013-2331,0,0,4fa89a2899bbb8c6651ecc2ccf0fbf88a1fdb8e29a3c51e9748467e860dd2438,2024-11-21T01:51:28.640000 +CVE-2013-2332,0,0,b8cfbb70d31e78829e0d1fb3c2e40edf44fad0496b992ee2a5353eb21c73b22b,2024-11-21T01:51:28.743000 +CVE-2013-2333,0,0,83511744ae7ec6e4f1c3373a3662d6f79482973c7b39a78d975bad7b48a7f166,2024-11-21T01:51:28.843000 +CVE-2013-2334,0,0,ea8a62d7e23c916c5b14835a97d20608b858580ab87041e31e6e73c86c592fba,2024-11-21T01:51:28.957000 +CVE-2013-2335,0,0,3018acb4e30def6db8984d562f5f92e6ba671cfd52dff1a6d111e69f3a62edbe,2024-11-21T01:51:29.060000 +CVE-2013-2336,0,0,84271d26444ceded529a750de351282196cf39ad41cf5a6b07c07f051854b921,2024-11-21T01:51:29.167000 +CVE-2013-2337,0,0,8bf8609bfc2b2d1d191932aaaf6e9d0eb072b13aa75e8c4f493fd08b0ffff256,2024-11-21T01:51:29.280000 +CVE-2013-2338,0,0,e9ebe5186a74b134e3e417630513ab181bffbcbd94612a9f7190b3c4531c5849,2024-11-21T01:51:29.383000 +CVE-2013-2339,0,0,77e8d8e3a7668048bcd134f1b17effd00883023062081ee57845b4e28bf273b0,2024-11-21T01:51:29.487000 +CVE-2013-2340,0,0,39c3037bbace479a6d77a93b6cb3874a092aed9b4e5fff7c78cb01255613a64a,2024-11-21T01:51:29.590000 +CVE-2013-2341,0,0,c77ffefe7a48c312d4a0baec2dc64f78c14fdc861da3c6657ceb7a358f91e9ac,2024-11-21T01:51:29.743000 +CVE-2013-2342,0,0,ba631b53039b5de7b9dd350d25f54681657e63ee39a674e311e6e1c00792122b,2024-11-21T01:51:29.897000 +CVE-2013-2343,0,0,7889c44abcb1c0eae0a4bedae0ec46856403847bb55ef85058200e24511f1dcb,2024-11-21T01:51:29.997000 +CVE-2013-2344,0,0,8535c59e09bb715c03edac603a0bee3d04ce50be831acda44b689eda13eae330,2024-11-21T01:51:30.100000 +CVE-2013-2345,0,0,cbf647cc11b851ff3ace5783f7803216b7861e7217724eefa28c63b5cf7225b3,2024-11-21T01:51:30.207000 +CVE-2013-2346,0,0,69306fd4d48611eda1dd3a7b3dacdddaa6e6b96ef3d7a2bca7a6961f9eb5c245,2024-11-21T01:51:30.313000 +CVE-2013-2347,0,0,cc88fa331cd5ee10b2248ba2b2749a59e8dafb12880e06e3cf9ea87d58732601,2024-11-21T01:51:30.420000 +CVE-2013-2348,0,0,e9871654a7be8437d07f220f52424ccd9984cb9a028874e3065577d2679ddc7c,2024-11-21T01:51:30.533000 +CVE-2013-2349,0,0,a4c6100dc282c36ef7516ef3e07155b160fd8b000d4138fd9368304b0b9a56cc,2024-11-21T01:51:30.630000 +CVE-2013-2350,0,0,bd68365051043fc0dc3613507447b3ebfab8fdfebadeb1e7e2d0658b6631d3d9,2024-11-21T01:51:30.743000 +CVE-2013-2351,0,0,0442d904b903dca54225ef7c795fd51619701ff02973572416667d9923bfebf5,2024-11-21T01:51:30.843000 +CVE-2013-2352,0,0,4ab815ad8053b2b4350f54ddde8cc879b40e1342fda6d93d956cecc00860be62,2024-11-21T01:51:30.940000 +CVE-2013-2353,0,0,85958540198cceb63224f496348a6756bac3e9c158e86c14ec9bcf3f8a0865dc,2024-11-21T01:51:31.063000 CVE-2013-2354,0,0,71b7484d5b2c7cade47529890133857d33fc28dffd1fe66921f5d8fd0d31ed90,2023-11-07T02:15:00.927000 -CVE-2013-2355,0,1,6f70428ef64267979f8aa6708a56bbfdaf58edb08e1bb520a37127ab161baede,2024-11-21T01:51:31.190000 -CVE-2013-2356,0,1,58d9c1df3918b8426a1fe0712def16f32651391ca9da39a6fe359752b47d3c77,2024-11-21T01:51:31.297000 -CVE-2013-2357,0,1,1fba0ac20387a6973c51e2f55a4761c7d0d5b06c8da979425c694002271df4b9,2024-11-21T01:51:31.400000 -CVE-2013-2358,0,1,8ba055d3864b78a8ec3cdf4a1ac361d01d3e74a018d16d2f221d6c135835fb7a,2024-11-21T01:51:31.507000 -CVE-2013-2359,0,1,ed8cffadddb0ff820bf6bc5051f1f364c122403a602129e8db44862ba1f30deb,2024-11-21T01:51:31.617000 -CVE-2013-2360,0,1,97d6cae46f9ae5b7f1e3470ad711f27fc6da0bd7c347d1a20c4676bcca86089d,2024-11-21T01:51:31.730000 -CVE-2013-2361,0,1,fb4a3693487fe6806bb5f649d1fcd76654abee57db1cf8f879faaeeefb4828da,2024-11-21T01:51:31.850000 -CVE-2013-2362,0,1,29e46d1f01c35f8edc03ae1fa6b8cfed89515a5aa021180afab93ba661a27923,2024-11-21T01:51:31.957000 -CVE-2013-2363,0,1,99d9372e7aa37933e89f9902235fba32705d2533d32b8ee02455e288927a8efe,2024-11-21T01:51:32.067000 -CVE-2013-2364,0,1,bb064f5da15d343998eb393f06458d1e25ba6ea28b6379d2796f07b97630fb83,2024-11-21T01:51:32.177000 -CVE-2013-2365,0,1,3d8a882239c3e4040bce13bddf884266ce3073c04d87d64dd5ac2761c2a6bc22,2024-11-21T01:51:32.283000 -CVE-2013-2366,0,1,70e4640fe970ac866fdd2750404fbc6bb1b46a637e4f5593c41c569164b1e1f5,2024-11-21T01:51:32.403000 -CVE-2013-2367,0,1,4c3b77e81333142736478f02c8d8f8e36e20fac36409e070d4bef9a6f30bab18,2024-11-21T01:51:32.523000 -CVE-2013-2368,0,1,e2eae540a9621cf7f8b57078e30c9755437f9bb0485ae0c68926dca9493094d6,2024-11-21T01:51:32.653000 -CVE-2013-2369,0,1,1225d4f925f616fdc41c2fa57b04b764c2f632a0cdcfcc5b17856e4979a69fcb,2024-11-21T01:51:32.777000 -CVE-2013-2370,0,1,d5a862e6037d6d7e0f7b3f7b1b443e2794b9609f145b942874748eec22ad6277,2024-11-21T01:51:32.890000 -CVE-2013-2371,0,1,d7e94e6cf7016004b7c7f4234faab0fd02425453e57802692d05afb6babf065f,2024-11-21T01:51:33.023000 -CVE-2013-2372,0,1,7ae95151caacd9c9b870a3352b02a40b57663ba109ca83485ba24e177d59d5d6,2024-11-21T01:51:33.160000 -CVE-2013-2373,0,1,f34dd1ce57bd0435c0c6ba3250873c357b239edd0f9a89e7c0224ea9c7a2918a,2024-11-21T01:51:33.293000 -CVE-2013-2374,0,1,57b5c062054129463cbab62d12d85c7095f2ea235976574869105da2723d4164,2024-11-21T01:51:33.433000 -CVE-2013-2375,0,1,9c8e74348cd0da83990aca30b6ec77633e572962c6c1508ceeeb90c1c97e4efe,2024-11-21T01:51:33.573000 -CVE-2013-2376,0,1,976af4e565363fa6257f09e7224a39c630632756a5e6de092d90d88dee34ad99,2024-11-21T01:51:33.713000 -CVE-2013-2377,0,1,fa8ed3bd3748aaf326af8d1bb6988dae4c7cec655317a508206b0a4f225b4254,2024-11-21T01:51:33.850000 -CVE-2013-2378,0,1,a42590c628af1801d4be4a6b4ea51f19b9ed13a9ec2d67475b2fdf2025c75ba4,2024-11-21T01:51:33.960000 -CVE-2013-2379,0,1,17e74fa1923f41dd9f1338a1223d02ddc272ab0f1994e8b25ee1814951d94af4,2024-11-21T01:51:34.097000 -CVE-2013-2380,0,1,578b8a5f203c7f23db90e019b6e2c9b7131937eccc07c4121836e5fc58039328,2024-11-21T01:51:34.220000 -CVE-2013-2381,0,1,b7a6283ab2441b8adca20f361301e582386c35826032bdc713b68f7b2e782ed2,2024-11-21T01:51:34.337000 -CVE-2013-2382,0,1,2d8dbfdfb94ca0f1c30d7e18f2990ed00b2fe5967bb3a393bac4b08e8d043122,2024-11-21T01:51:34.463000 -CVE-2013-2383,0,1,f979c9bceb144993bd4ea7bae28487c6aa84827f07b8dfa0fee58eaaa43e2557,2024-11-21T01:51:34.590000 -CVE-2013-2384,0,1,c8230724dd3c045885c611856095ad4b6f8d86113680f0e51711a7f86ae186ac,2024-11-21T01:51:34.770000 -CVE-2013-2385,0,1,5ef141c615221f7d556abcf5e5b475c7d16dfb9f97d7b66da195c3449cd19850,2024-11-21T01:51:34.950000 -CVE-2013-2386,0,1,260134015eb3316f455d8219d611ba2801b631082437948b47e675929f4662c2,2024-11-21T01:51:35.053000 -CVE-2013-2387,0,1,da4f1b546f3d72f78ba6921ecfd7bd33cfa512146ebe16fd6cc05fb2a908f31a,2024-11-21T01:51:35.173000 -CVE-2013-2388,0,1,89671ea312d6dff719b6e697c2f07e015ab0104e0819dbea7c1dcc3112025bbb,2024-11-21T01:51:35.290000 -CVE-2013-2389,0,1,2848601941062840fd04ff4a054532177dd5f60ffb713917843a399b97cf6f16,2024-11-21T01:51:35.403000 -CVE-2013-2390,0,1,f3ec56b17421ad6f9f39c22b4d717417fae89f2e97e566714a117f86254a7f26,2024-11-21T01:51:35.550000 -CVE-2013-2391,0,1,a3e8927deb71e58107558aa346527690660a157d2c03bc1a6f3518d7facd9b56,2024-11-21T01:51:35.660000 -CVE-2013-2392,0,1,e055ba070c8be62fd82fce8c2ef97ad982671553863aa6695ef96ef98bf36ada,2024-11-21T01:51:35.803000 -CVE-2013-2393,0,1,328dd7673e29b57cab888b5b45ca38ee836c9105fc783ea4b53ecdab7164a7d3,2024-11-21T01:51:35.950000 -CVE-2013-2394,0,1,27bd1bf20a89649ecd926da46fd25bfe1977be94d66deb8fc0c5f2f930cb4381,2024-11-21T01:51:36.077000 -CVE-2013-2395,0,1,43cf37ed2c679abcd612dfd03c2fa1e36fd78c8a35cc21ad38c29adcf897cca0,2024-11-21T01:51:36.243000 -CVE-2013-2396,0,1,284b9eb7f81657f8816754cf1da7a0b275ab9337bbd976c2c10d785e18a9cd66,2024-11-21T01:51:36.360000 -CVE-2013-2397,0,1,f0675d53ecd10782c1be19ca28d062a2dcd4181fa813b77cebfa96b13d350e75,2024-11-21T01:51:36.477000 -CVE-2013-2398,0,1,b45799ff34d02898c885e475910c027111708c7844332f0c3c874daca7b92bb5,2024-11-21T01:51:36.590000 -CVE-2013-2399,0,1,62590d9b6bec8942d1ad0cfe5680c7c319ee19259d8d8d4bd6eb54aa4e5ee614,2024-11-21T01:51:36.703000 -CVE-2013-2400,0,1,2f54eadf6eb0f5d86253a955b82caadad902134a5f349f5c9aa4ac28b494d76f,2024-11-21T01:51:36.827000 -CVE-2013-2401,0,1,586710864e14b83bbac12a717de2e511f5b4d60347e85cbc7163b1779e4f325a,2024-11-21T01:51:36.957000 -CVE-2013-2402,0,1,fc44752f505087d1aaad9ce03e4a8ef8492e136ae1a97f4e681c95915ef7b992,2024-11-21T01:51:37.077000 -CVE-2013-2403,0,1,c7eb58e577c38ce34a8e4ace8dfe3fd90b5b32988c051993963571ef4d5f946d,2024-11-21T01:51:37.200000 -CVE-2013-2404,0,1,c06341c873b99f6cf92c8859729712425c503fdeb8b16dfdbb22cf43f07c5c65,2024-11-21T01:51:37.330000 -CVE-2013-2405,0,1,b4e207bef532da5192cef61c420f9e33fc3b1d2b68012561c1f6b11ba50ba4a2,2024-11-21T01:51:37.453000 -CVE-2013-2406,0,1,dda99243f5371e4159e4c68f7ace0f48777b83173d858638939a4112d3a255d4,2024-11-21T01:51:37.573000 -CVE-2013-2407,0,1,68f395d0ae52eb498359161dbb6d31511ba4940263ef361d9a186e1e72739c7d,2024-11-21T01:51:37.690000 -CVE-2013-2408,0,1,d49cff70a656b6bd87d1b371c7351085a12b7552d8363e33303043713bffe175,2024-11-21T01:51:37.850000 -CVE-2013-2409,0,1,97fb3e0217bcfaeb763889c7c583ad9bbe720f6edb40a2689c0a34f6f4611f96,2024-11-21T01:51:37.970000 -CVE-2013-2410,0,1,29f588ce6ec3ec4ee0668277cd766357450e36cd451b67e1c56a152a373ad6e9,2024-11-21T01:51:38.090000 -CVE-2013-2411,0,1,81f738e268e5c0e757a973f7ae998d78ec5a34a03b4119b8db41bb6bf00bbe2c,2024-11-21T01:51:38.203000 -CVE-2013-2412,0,1,7c51e319d436be7df14926a9494ebb7a93937d4f9df328a979f5a1a29ceccb41,2024-11-21T01:51:38.327000 -CVE-2013-2413,0,1,a620978a542c99d123a92c8e2e7d1d72455d399829e71e9f08594c92a1a374dc,2024-11-21T01:51:38.493000 -CVE-2013-2414,0,1,6c8ce25a5a3ab5b641ab78198935b2463f21e2396495f1bfd039db90d374d230,2024-11-21T01:51:38.617000 -CVE-2013-2415,0,1,6ccfd19b84c5753bdc3629e249b71947ad65204b19e57bb115d329c3a104d854,2024-11-21T01:51:38.773000 -CVE-2013-2416,0,1,c717a37b6c2b9cfa605799b79a18c7710de648275afc5b1361c8424331bda5b3,2024-11-21T01:51:38.930000 -CVE-2013-2417,0,1,e115706ca20bf66700fcc7da980d7bf3d607c8c2a6d14c4d8f0c661a503a641d,2024-11-21T01:51:39.053000 -CVE-2013-2418,0,1,f7db02142f6807908d0259caa4f36723d7d1265d863c4c8be2f3ce4d9a0e8ac4,2024-11-21T01:51:39.270000 -CVE-2013-2419,0,1,e2bbe16b85124693a6f442d67f3678635c82ee419b67fb3c2160a7d27c3a428f,2024-11-21T01:51:39.420000 -CVE-2013-2420,0,1,3f4b4632c3b24d2fbcf9a0d26510b15e65ddebb86c2a74201e034d7dbe0f471e,2024-11-21T01:51:39.610000 -CVE-2013-2421,0,1,7719bf7d9dffb2ae0b5f7f4ef52c99ad8ace84d5eb0df351cc9b74d47da2f127,2024-11-21T01:51:39.810000 -CVE-2013-2422,0,1,e34370283008e49b7f084aaae1f05d4cc12c99bc63e85374665daeb57cd57e61,2024-11-21T01:51:40.617000 -CVE-2013-2423,0,1,ede46e6774a1b53a330cd4afef90916f99316f17fe6d0269416fe660a315e5d1,2024-11-21T01:51:41.230000 -CVE-2013-2424,0,1,11c0601c7ac200352a5cbbf6909fad06e72c5fa2efd854d8231846f2f6a55aad,2024-11-21T01:51:41.507000 -CVE-2013-2425,0,1,7321877edae7c389e7f1c1ec5d2a9d11e98fd5da4c53c5f51589c4382551e077,2024-11-21T01:51:41.680000 -CVE-2013-2426,0,1,bccf8c9bcea46aae10052476545f0ec01f8d6a77c9da7f3049ada4d379684674,2024-11-21T01:51:41.793000 -CVE-2013-2427,0,1,933a005d136178a601797fbcf400e79a48ec85f3d6ac13c612439f8ffb5ddf10,2024-11-21T01:51:41.930000 -CVE-2013-2428,0,1,34d9881a17c79940d1834fe757bb597ba82f832ca4c9f50769478469354beabb,2024-11-21T01:51:42.053000 -CVE-2013-2429,0,1,2a522d0bbdb78cda5f78b88cd13bda41cc93af0fb018128bcbaabeada6caa220,2024-11-21T01:51:42.177000 -CVE-2013-2430,0,1,0f0c94858637878860df635cd8af3b7b210854a8d0dccd479ab501a5d49533ec,2024-11-21T01:51:42.370000 -CVE-2013-2431,0,1,872c1876edf9899122db61c79c70e601f7a58803e8bdbc8b59fd308a00d59dec,2024-11-21T01:51:42.563000 -CVE-2013-2432,0,1,102d779f0df514059a8db8de8be06be829a5f5a19a384ee88d7bb12e4324c111,2024-11-21T01:51:42.707000 -CVE-2013-2433,0,1,fa1fe8973627ffe33bb1d1cb6fc975b446806e103c38ff083419a8dc075271b1,2024-11-21T01:51:42.873000 -CVE-2013-2434,0,1,d788575244bf55dee13e502eb539b4de48973427ae91349df898e8fa3044af90,2024-11-21T01:51:43.043000 -CVE-2013-2435,0,1,5b7d9072242c29f738bccc38cecc7ef8991aa48b93037ac8eb151e4db8a7d8c7,2024-11-21T01:51:43.180000 -CVE-2013-2436,0,1,5998802a24fee1af8a42280d9310560ce8775838c4b53158dbc822ef72667451,2024-11-21T01:51:43.330000 -CVE-2013-2437,0,1,37d94cb1798a37c4bcc831714b9303bbba664e00fadf1524b279fc9ff7425eee,2024-11-21T01:51:43.467000 -CVE-2013-2438,0,1,c38e4b429eb8fbf0225e25cd83a04c37c21976500d5358d90c3a426cff5afdd7,2024-11-21T01:51:43.627000 -CVE-2013-2439,0,1,95ac23ae756b8f5e00c281e843535cced9117548b94273b0c73b2de2956230d0,2024-11-21T01:51:43.750000 -CVE-2013-2440,0,1,492270f9334c203ed5f3fe0c0195c4f0afb56aaefc707d4315b36aa68161009b,2024-11-21T01:51:43.937000 -CVE-2013-2441,0,1,4ab5b3d67710b236f8bbe6e9cffe9d0da748b9bfd904bf4df4f7ab63d866e512,2024-11-21T01:51:44.080000 -CVE-2013-2442,0,1,47d101a623fbdf7a18b32c7ae0cc09eae2eea6b5b5768c09be32784dca588e06,2024-11-21T01:51:44.197000 -CVE-2013-2443,0,1,fff743f76403b8a537070a94ade7e3819b15543fddd7f04aa36800b784e801a7,2024-11-21T01:51:44.353000 -CVE-2013-2444,0,1,0f19a9b691f5ace6115d6765382d2f50681f539f8ef253f0dcf69c5f926fa0f4,2024-11-21T01:51:44.527000 -CVE-2013-2445,0,1,90e598eb94244c9bace5519e760e65df6ab65a212f3f78ac3053b2254a748dd2,2024-11-21T01:51:44.700000 -CVE-2013-2446,0,1,be3092cd010ff49b5a41f714ca01f4e0304f141e315b5d93adb22ef94f9bfc77,2024-11-21T01:51:44.860000 -CVE-2013-2447,0,1,319cf52534b28307383b4786fe09af7c3c10b7769bf892b2f8b1032602cdbb4c,2024-11-21T01:51:45.047000 -CVE-2013-2448,0,1,3a4053e539e394c3a956af72cb6a7084e8efa01e7a89e0c95da85479c5da444a,2024-11-21T01:51:45.217000 -CVE-2013-2449,0,1,d604f40942a922032e41ba5bd6faca0677e6b57dba2e9ec502a47242e437bbb2,2024-11-21T01:51:45.387000 -CVE-2013-2450,0,1,b6f67077343175c20da23b913c9002167b062d2eb289114eeabe1859d4a31635,2024-11-21T01:51:45.517000 -CVE-2013-2451,0,1,ad63eb123953f3c47838b007c9b30657f2e96bf0fdc27bb2db375a730bfdffa7,2024-11-21T01:51:45.690000 -CVE-2013-2452,0,1,89c78e57d5d0e82a622a42b6219ba3a48efaf5137348555034883e5b7de560c6,2024-11-21T01:51:45.847000 -CVE-2013-2453,0,1,c9738eca832da98b16d4b3f2ceae58a96f3ee5621f3833dc9b4bd188df70073b,2024-11-21T01:51:46.017000 -CVE-2013-2454,0,1,c95bb286cd55eb0f435f293fd6dfd3430f686f0993313ebb1fd82ca1819e4455,2024-11-21T01:51:46.183000 -CVE-2013-2455,0,1,5369d042508abd205263d10ee82d98ee64fa9c48d1b0eb18f8cb9bc19b2f0fdd,2024-11-21T01:51:46.373000 -CVE-2013-2456,0,1,68c4b7ac1eea7b45f5d058df8fcfecda9c046e15a388ab451129a1aa107c3bf2,2024-11-21T01:51:46.550000 -CVE-2013-2457,0,1,9d11311616e11899b2dc4e1cd5bd99f794c8cac05faafb3858a8067d1d337828,2024-11-21T01:51:46.720000 -CVE-2013-2458,0,1,b455662e551b167b74f86b4d24d4e3e10b88809693709238dd6fdb60346fde93,2024-11-21T01:51:46.900000 -CVE-2013-2459,0,1,4dd8c7f8a13d578db13e146496c2446bc9119b50df9044b64ae2bbf6f907a238,2024-11-21T01:51:47.040000 -CVE-2013-2460,0,1,118c2f5cda9eaa57df294dbac4fc9d46fe09274c257a872793e5f34984447e04,2024-11-21T01:51:47.210000 -CVE-2013-2461,0,1,21815ec08eb475dfe4fb1cd7efca5e455cf91cf2e969b693c1a95eae952d9d19,2024-11-21T01:51:47.350000 -CVE-2013-2462,0,1,4d5054e8976532eb11334affab42f97046ac3c68357025b5a05fcad13774602d,2024-11-21T01:51:47.537000 -CVE-2013-2463,0,1,7c8a247dae26307ad303f17713a725cd3b280cf93da24aec8ec439a74c65f73b,2024-11-21T01:51:47.680000 -CVE-2013-2464,0,1,12a25a9f96659642826e42b3ed423c2f77e874c0586c95e00178e0ebbf142a0f,2024-11-21T01:51:47.863000 -CVE-2013-2465,0,1,3b8f8369b3254f3904532e51eae8101274f61d64411dd78c818188b320046c5f,2024-11-21T01:51:48.057000 -CVE-2013-2466,0,1,2c5c28ff384d716175d02b77bd5fcb3e9c011a38ee2c48d686105bf9d4aae5a8,2024-11-21T01:51:48.310000 -CVE-2013-2467,0,1,f66630a02bcb03bba2791e7ac6e60b5a56cbce56f5271e69d2390718dbb13653,2024-11-21T01:51:48.473000 -CVE-2013-2468,0,1,6386f54f5f544ee4b5b8f2d118364865a664d67e5029859eb3f3af7b5c74f009,2024-11-21T01:51:48.613000 -CVE-2013-2469,0,1,31436d7b311b76e56934f6b07af58b335d87a1aa19ea33b19448340b01766874,2024-11-21T01:51:48.780000 -CVE-2013-2470,0,1,7b3d43295b9d0e3a8510e0399c6031e58270e7a72af1ed135203ee4b9405ea75,2024-11-21T01:51:48.967000 -CVE-2013-2471,0,1,da47af3e36caa2533189615b29fa026740f7d07c39ec5363d9baa05ad165ca90,2024-11-21T01:51:49.203000 -CVE-2013-2472,0,1,ffdfed7178d600525ebcf8f78a20db1d21fd0b9cad7be057595ffee86c426350,2024-11-21T01:51:49.403000 -CVE-2013-2473,0,1,05a290412dc00dafae00868d66946100a39b8d687c82f9fc17983c91ad508633,2024-11-21T01:51:49.603000 +CVE-2013-2355,0,0,6f70428ef64267979f8aa6708a56bbfdaf58edb08e1bb520a37127ab161baede,2024-11-21T01:51:31.190000 +CVE-2013-2356,0,0,58d9c1df3918b8426a1fe0712def16f32651391ca9da39a6fe359752b47d3c77,2024-11-21T01:51:31.297000 +CVE-2013-2357,0,0,1fba0ac20387a6973c51e2f55a4761c7d0d5b06c8da979425c694002271df4b9,2024-11-21T01:51:31.400000 +CVE-2013-2358,0,0,8ba055d3864b78a8ec3cdf4a1ac361d01d3e74a018d16d2f221d6c135835fb7a,2024-11-21T01:51:31.507000 +CVE-2013-2359,0,0,ed8cffadddb0ff820bf6bc5051f1f364c122403a602129e8db44862ba1f30deb,2024-11-21T01:51:31.617000 +CVE-2013-2360,0,0,97d6cae46f9ae5b7f1e3470ad711f27fc6da0bd7c347d1a20c4676bcca86089d,2024-11-21T01:51:31.730000 +CVE-2013-2361,0,0,fb4a3693487fe6806bb5f649d1fcd76654abee57db1cf8f879faaeeefb4828da,2024-11-21T01:51:31.850000 +CVE-2013-2362,0,0,29e46d1f01c35f8edc03ae1fa6b8cfed89515a5aa021180afab93ba661a27923,2024-11-21T01:51:31.957000 +CVE-2013-2363,0,0,99d9372e7aa37933e89f9902235fba32705d2533d32b8ee02455e288927a8efe,2024-11-21T01:51:32.067000 +CVE-2013-2364,0,0,bb064f5da15d343998eb393f06458d1e25ba6ea28b6379d2796f07b97630fb83,2024-11-21T01:51:32.177000 +CVE-2013-2365,0,0,3d8a882239c3e4040bce13bddf884266ce3073c04d87d64dd5ac2761c2a6bc22,2024-11-21T01:51:32.283000 +CVE-2013-2366,0,0,70e4640fe970ac866fdd2750404fbc6bb1b46a637e4f5593c41c569164b1e1f5,2024-11-21T01:51:32.403000 +CVE-2013-2367,0,0,4c3b77e81333142736478f02c8d8f8e36e20fac36409e070d4bef9a6f30bab18,2024-11-21T01:51:32.523000 +CVE-2013-2368,0,0,e2eae540a9621cf7f8b57078e30c9755437f9bb0485ae0c68926dca9493094d6,2024-11-21T01:51:32.653000 +CVE-2013-2369,0,0,1225d4f925f616fdc41c2fa57b04b764c2f632a0cdcfcc5b17856e4979a69fcb,2024-11-21T01:51:32.777000 +CVE-2013-2370,0,0,d5a862e6037d6d7e0f7b3f7b1b443e2794b9609f145b942874748eec22ad6277,2024-11-21T01:51:32.890000 +CVE-2013-2371,0,0,d7e94e6cf7016004b7c7f4234faab0fd02425453e57802692d05afb6babf065f,2024-11-21T01:51:33.023000 +CVE-2013-2372,0,0,7ae95151caacd9c9b870a3352b02a40b57663ba109ca83485ba24e177d59d5d6,2024-11-21T01:51:33.160000 +CVE-2013-2373,0,0,f34dd1ce57bd0435c0c6ba3250873c357b239edd0f9a89e7c0224ea9c7a2918a,2024-11-21T01:51:33.293000 +CVE-2013-2374,0,0,57b5c062054129463cbab62d12d85c7095f2ea235976574869105da2723d4164,2024-11-21T01:51:33.433000 +CVE-2013-2375,0,0,9c8e74348cd0da83990aca30b6ec77633e572962c6c1508ceeeb90c1c97e4efe,2024-11-21T01:51:33.573000 +CVE-2013-2376,0,0,976af4e565363fa6257f09e7224a39c630632756a5e6de092d90d88dee34ad99,2024-11-21T01:51:33.713000 +CVE-2013-2377,0,0,fa8ed3bd3748aaf326af8d1bb6988dae4c7cec655317a508206b0a4f225b4254,2024-11-21T01:51:33.850000 +CVE-2013-2378,0,0,a42590c628af1801d4be4a6b4ea51f19b9ed13a9ec2d67475b2fdf2025c75ba4,2024-11-21T01:51:33.960000 +CVE-2013-2379,0,0,17e74fa1923f41dd9f1338a1223d02ddc272ab0f1994e8b25ee1814951d94af4,2024-11-21T01:51:34.097000 +CVE-2013-2380,0,0,578b8a5f203c7f23db90e019b6e2c9b7131937eccc07c4121836e5fc58039328,2024-11-21T01:51:34.220000 +CVE-2013-2381,0,0,b7a6283ab2441b8adca20f361301e582386c35826032bdc713b68f7b2e782ed2,2024-11-21T01:51:34.337000 +CVE-2013-2382,0,0,2d8dbfdfb94ca0f1c30d7e18f2990ed00b2fe5967bb3a393bac4b08e8d043122,2024-11-21T01:51:34.463000 +CVE-2013-2383,0,0,f979c9bceb144993bd4ea7bae28487c6aa84827f07b8dfa0fee58eaaa43e2557,2024-11-21T01:51:34.590000 +CVE-2013-2384,0,0,c8230724dd3c045885c611856095ad4b6f8d86113680f0e51711a7f86ae186ac,2024-11-21T01:51:34.770000 +CVE-2013-2385,0,0,5ef141c615221f7d556abcf5e5b475c7d16dfb9f97d7b66da195c3449cd19850,2024-11-21T01:51:34.950000 +CVE-2013-2386,0,0,260134015eb3316f455d8219d611ba2801b631082437948b47e675929f4662c2,2024-11-21T01:51:35.053000 +CVE-2013-2387,0,0,da4f1b546f3d72f78ba6921ecfd7bd33cfa512146ebe16fd6cc05fb2a908f31a,2024-11-21T01:51:35.173000 +CVE-2013-2388,0,0,89671ea312d6dff719b6e697c2f07e015ab0104e0819dbea7c1dcc3112025bbb,2024-11-21T01:51:35.290000 +CVE-2013-2389,0,0,2848601941062840fd04ff4a054532177dd5f60ffb713917843a399b97cf6f16,2024-11-21T01:51:35.403000 +CVE-2013-2390,0,0,f3ec56b17421ad6f9f39c22b4d717417fae89f2e97e566714a117f86254a7f26,2024-11-21T01:51:35.550000 +CVE-2013-2391,0,0,a3e8927deb71e58107558aa346527690660a157d2c03bc1a6f3518d7facd9b56,2024-11-21T01:51:35.660000 +CVE-2013-2392,0,0,e055ba070c8be62fd82fce8c2ef97ad982671553863aa6695ef96ef98bf36ada,2024-11-21T01:51:35.803000 +CVE-2013-2393,0,0,328dd7673e29b57cab888b5b45ca38ee836c9105fc783ea4b53ecdab7164a7d3,2024-11-21T01:51:35.950000 +CVE-2013-2394,0,0,27bd1bf20a89649ecd926da46fd25bfe1977be94d66deb8fc0c5f2f930cb4381,2024-11-21T01:51:36.077000 +CVE-2013-2395,0,0,43cf37ed2c679abcd612dfd03c2fa1e36fd78c8a35cc21ad38c29adcf897cca0,2024-11-21T01:51:36.243000 +CVE-2013-2396,0,0,284b9eb7f81657f8816754cf1da7a0b275ab9337bbd976c2c10d785e18a9cd66,2024-11-21T01:51:36.360000 +CVE-2013-2397,0,0,f0675d53ecd10782c1be19ca28d062a2dcd4181fa813b77cebfa96b13d350e75,2024-11-21T01:51:36.477000 +CVE-2013-2398,0,0,b45799ff34d02898c885e475910c027111708c7844332f0c3c874daca7b92bb5,2024-11-21T01:51:36.590000 +CVE-2013-2399,0,0,62590d9b6bec8942d1ad0cfe5680c7c319ee19259d8d8d4bd6eb54aa4e5ee614,2024-11-21T01:51:36.703000 +CVE-2013-2400,0,0,2f54eadf6eb0f5d86253a955b82caadad902134a5f349f5c9aa4ac28b494d76f,2024-11-21T01:51:36.827000 +CVE-2013-2401,0,0,586710864e14b83bbac12a717de2e511f5b4d60347e85cbc7163b1779e4f325a,2024-11-21T01:51:36.957000 +CVE-2013-2402,0,0,fc44752f505087d1aaad9ce03e4a8ef8492e136ae1a97f4e681c95915ef7b992,2024-11-21T01:51:37.077000 +CVE-2013-2403,0,0,c7eb58e577c38ce34a8e4ace8dfe3fd90b5b32988c051993963571ef4d5f946d,2024-11-21T01:51:37.200000 +CVE-2013-2404,0,0,c06341c873b99f6cf92c8859729712425c503fdeb8b16dfdbb22cf43f07c5c65,2024-11-21T01:51:37.330000 +CVE-2013-2405,0,0,b4e207bef532da5192cef61c420f9e33fc3b1d2b68012561c1f6b11ba50ba4a2,2024-11-21T01:51:37.453000 +CVE-2013-2406,0,0,dda99243f5371e4159e4c68f7ace0f48777b83173d858638939a4112d3a255d4,2024-11-21T01:51:37.573000 +CVE-2013-2407,0,0,68f395d0ae52eb498359161dbb6d31511ba4940263ef361d9a186e1e72739c7d,2024-11-21T01:51:37.690000 +CVE-2013-2408,0,0,d49cff70a656b6bd87d1b371c7351085a12b7552d8363e33303043713bffe175,2024-11-21T01:51:37.850000 +CVE-2013-2409,0,0,97fb3e0217bcfaeb763889c7c583ad9bbe720f6edb40a2689c0a34f6f4611f96,2024-11-21T01:51:37.970000 +CVE-2013-2410,0,0,29f588ce6ec3ec4ee0668277cd766357450e36cd451b67e1c56a152a373ad6e9,2024-11-21T01:51:38.090000 +CVE-2013-2411,0,0,81f738e268e5c0e757a973f7ae998d78ec5a34a03b4119b8db41bb6bf00bbe2c,2024-11-21T01:51:38.203000 +CVE-2013-2412,0,0,7c51e319d436be7df14926a9494ebb7a93937d4f9df328a979f5a1a29ceccb41,2024-11-21T01:51:38.327000 +CVE-2013-2413,0,0,a620978a542c99d123a92c8e2e7d1d72455d399829e71e9f08594c92a1a374dc,2024-11-21T01:51:38.493000 +CVE-2013-2414,0,0,6c8ce25a5a3ab5b641ab78198935b2463f21e2396495f1bfd039db90d374d230,2024-11-21T01:51:38.617000 +CVE-2013-2415,0,0,6ccfd19b84c5753bdc3629e249b71947ad65204b19e57bb115d329c3a104d854,2024-11-21T01:51:38.773000 +CVE-2013-2416,0,0,c717a37b6c2b9cfa605799b79a18c7710de648275afc5b1361c8424331bda5b3,2024-11-21T01:51:38.930000 +CVE-2013-2417,0,0,e115706ca20bf66700fcc7da980d7bf3d607c8c2a6d14c4d8f0c661a503a641d,2024-11-21T01:51:39.053000 +CVE-2013-2418,0,0,f7db02142f6807908d0259caa4f36723d7d1265d863c4c8be2f3ce4d9a0e8ac4,2024-11-21T01:51:39.270000 +CVE-2013-2419,0,0,e2bbe16b85124693a6f442d67f3678635c82ee419b67fb3c2160a7d27c3a428f,2024-11-21T01:51:39.420000 +CVE-2013-2420,0,0,3f4b4632c3b24d2fbcf9a0d26510b15e65ddebb86c2a74201e034d7dbe0f471e,2024-11-21T01:51:39.610000 +CVE-2013-2421,0,0,7719bf7d9dffb2ae0b5f7f4ef52c99ad8ace84d5eb0df351cc9b74d47da2f127,2024-11-21T01:51:39.810000 +CVE-2013-2422,0,0,e34370283008e49b7f084aaae1f05d4cc12c99bc63e85374665daeb57cd57e61,2024-11-21T01:51:40.617000 +CVE-2013-2423,0,0,ede46e6774a1b53a330cd4afef90916f99316f17fe6d0269416fe660a315e5d1,2024-11-21T01:51:41.230000 +CVE-2013-2424,0,0,11c0601c7ac200352a5cbbf6909fad06e72c5fa2efd854d8231846f2f6a55aad,2024-11-21T01:51:41.507000 +CVE-2013-2425,0,0,7321877edae7c389e7f1c1ec5d2a9d11e98fd5da4c53c5f51589c4382551e077,2024-11-21T01:51:41.680000 +CVE-2013-2426,0,0,bccf8c9bcea46aae10052476545f0ec01f8d6a77c9da7f3049ada4d379684674,2024-11-21T01:51:41.793000 +CVE-2013-2427,0,0,933a005d136178a601797fbcf400e79a48ec85f3d6ac13c612439f8ffb5ddf10,2024-11-21T01:51:41.930000 +CVE-2013-2428,0,0,34d9881a17c79940d1834fe757bb597ba82f832ca4c9f50769478469354beabb,2024-11-21T01:51:42.053000 +CVE-2013-2429,0,0,2a522d0bbdb78cda5f78b88cd13bda41cc93af0fb018128bcbaabeada6caa220,2024-11-21T01:51:42.177000 +CVE-2013-2430,0,0,0f0c94858637878860df635cd8af3b7b210854a8d0dccd479ab501a5d49533ec,2024-11-21T01:51:42.370000 +CVE-2013-2431,0,0,872c1876edf9899122db61c79c70e601f7a58803e8bdbc8b59fd308a00d59dec,2024-11-21T01:51:42.563000 +CVE-2013-2432,0,0,102d779f0df514059a8db8de8be06be829a5f5a19a384ee88d7bb12e4324c111,2024-11-21T01:51:42.707000 +CVE-2013-2433,0,0,fa1fe8973627ffe33bb1d1cb6fc975b446806e103c38ff083419a8dc075271b1,2024-11-21T01:51:42.873000 +CVE-2013-2434,0,0,d788575244bf55dee13e502eb539b4de48973427ae91349df898e8fa3044af90,2024-11-21T01:51:43.043000 +CVE-2013-2435,0,0,5b7d9072242c29f738bccc38cecc7ef8991aa48b93037ac8eb151e4db8a7d8c7,2024-11-21T01:51:43.180000 +CVE-2013-2436,0,0,5998802a24fee1af8a42280d9310560ce8775838c4b53158dbc822ef72667451,2024-11-21T01:51:43.330000 +CVE-2013-2437,0,0,37d94cb1798a37c4bcc831714b9303bbba664e00fadf1524b279fc9ff7425eee,2024-11-21T01:51:43.467000 +CVE-2013-2438,0,0,c38e4b429eb8fbf0225e25cd83a04c37c21976500d5358d90c3a426cff5afdd7,2024-11-21T01:51:43.627000 +CVE-2013-2439,0,0,95ac23ae756b8f5e00c281e843535cced9117548b94273b0c73b2de2956230d0,2024-11-21T01:51:43.750000 +CVE-2013-2440,0,0,492270f9334c203ed5f3fe0c0195c4f0afb56aaefc707d4315b36aa68161009b,2024-11-21T01:51:43.937000 +CVE-2013-2441,0,0,4ab5b3d67710b236f8bbe6e9cffe9d0da748b9bfd904bf4df4f7ab63d866e512,2024-11-21T01:51:44.080000 +CVE-2013-2442,0,0,47d101a623fbdf7a18b32c7ae0cc09eae2eea6b5b5768c09be32784dca588e06,2024-11-21T01:51:44.197000 +CVE-2013-2443,0,0,fff743f76403b8a537070a94ade7e3819b15543fddd7f04aa36800b784e801a7,2024-11-21T01:51:44.353000 +CVE-2013-2444,0,0,0f19a9b691f5ace6115d6765382d2f50681f539f8ef253f0dcf69c5f926fa0f4,2024-11-21T01:51:44.527000 +CVE-2013-2445,0,0,90e598eb94244c9bace5519e760e65df6ab65a212f3f78ac3053b2254a748dd2,2024-11-21T01:51:44.700000 +CVE-2013-2446,0,0,be3092cd010ff49b5a41f714ca01f4e0304f141e315b5d93adb22ef94f9bfc77,2024-11-21T01:51:44.860000 +CVE-2013-2447,0,0,319cf52534b28307383b4786fe09af7c3c10b7769bf892b2f8b1032602cdbb4c,2024-11-21T01:51:45.047000 +CVE-2013-2448,0,0,3a4053e539e394c3a956af72cb6a7084e8efa01e7a89e0c95da85479c5da444a,2024-11-21T01:51:45.217000 +CVE-2013-2449,0,0,d604f40942a922032e41ba5bd6faca0677e6b57dba2e9ec502a47242e437bbb2,2024-11-21T01:51:45.387000 +CVE-2013-2450,0,0,b6f67077343175c20da23b913c9002167b062d2eb289114eeabe1859d4a31635,2024-11-21T01:51:45.517000 +CVE-2013-2451,0,0,ad63eb123953f3c47838b007c9b30657f2e96bf0fdc27bb2db375a730bfdffa7,2024-11-21T01:51:45.690000 +CVE-2013-2452,0,0,89c78e57d5d0e82a622a42b6219ba3a48efaf5137348555034883e5b7de560c6,2024-11-21T01:51:45.847000 +CVE-2013-2453,0,0,c9738eca832da98b16d4b3f2ceae58a96f3ee5621f3833dc9b4bd188df70073b,2024-11-21T01:51:46.017000 +CVE-2013-2454,0,0,c95bb286cd55eb0f435f293fd6dfd3430f686f0993313ebb1fd82ca1819e4455,2024-11-21T01:51:46.183000 +CVE-2013-2455,0,0,5369d042508abd205263d10ee82d98ee64fa9c48d1b0eb18f8cb9bc19b2f0fdd,2024-11-21T01:51:46.373000 +CVE-2013-2456,0,0,68c4b7ac1eea7b45f5d058df8fcfecda9c046e15a388ab451129a1aa107c3bf2,2024-11-21T01:51:46.550000 +CVE-2013-2457,0,0,9d11311616e11899b2dc4e1cd5bd99f794c8cac05faafb3858a8067d1d337828,2024-11-21T01:51:46.720000 +CVE-2013-2458,0,0,b455662e551b167b74f86b4d24d4e3e10b88809693709238dd6fdb60346fde93,2024-11-21T01:51:46.900000 +CVE-2013-2459,0,0,4dd8c7f8a13d578db13e146496c2446bc9119b50df9044b64ae2bbf6f907a238,2024-11-21T01:51:47.040000 +CVE-2013-2460,0,0,118c2f5cda9eaa57df294dbac4fc9d46fe09274c257a872793e5f34984447e04,2024-11-21T01:51:47.210000 +CVE-2013-2461,0,0,21815ec08eb475dfe4fb1cd7efca5e455cf91cf2e969b693c1a95eae952d9d19,2024-11-21T01:51:47.350000 +CVE-2013-2462,0,0,4d5054e8976532eb11334affab42f97046ac3c68357025b5a05fcad13774602d,2024-11-21T01:51:47.537000 +CVE-2013-2463,0,0,7c8a247dae26307ad303f17713a725cd3b280cf93da24aec8ec439a74c65f73b,2024-11-21T01:51:47.680000 +CVE-2013-2464,0,0,12a25a9f96659642826e42b3ed423c2f77e874c0586c95e00178e0ebbf142a0f,2024-11-21T01:51:47.863000 +CVE-2013-2465,0,0,3b8f8369b3254f3904532e51eae8101274f61d64411dd78c818188b320046c5f,2024-11-21T01:51:48.057000 +CVE-2013-2466,0,0,2c5c28ff384d716175d02b77bd5fcb3e9c011a38ee2c48d686105bf9d4aae5a8,2024-11-21T01:51:48.310000 +CVE-2013-2467,0,0,f66630a02bcb03bba2791e7ac6e60b5a56cbce56f5271e69d2390718dbb13653,2024-11-21T01:51:48.473000 +CVE-2013-2468,0,0,6386f54f5f544ee4b5b8f2d118364865a664d67e5029859eb3f3af7b5c74f009,2024-11-21T01:51:48.613000 +CVE-2013-2469,0,0,31436d7b311b76e56934f6b07af58b335d87a1aa19ea33b19448340b01766874,2024-11-21T01:51:48.780000 +CVE-2013-2470,0,0,7b3d43295b9d0e3a8510e0399c6031e58270e7a72af1ed135203ee4b9405ea75,2024-11-21T01:51:48.967000 +CVE-2013-2471,0,0,da47af3e36caa2533189615b29fa026740f7d07c39ec5363d9baa05ad165ca90,2024-11-21T01:51:49.203000 +CVE-2013-2472,0,0,ffdfed7178d600525ebcf8f78a20db1d21fd0b9cad7be057595ffee86c426350,2024-11-21T01:51:49.403000 +CVE-2013-2473,0,0,05a290412dc00dafae00868d66946100a39b8d687c82f9fc17983c91ad508633,2024-11-21T01:51:49.603000 CVE-2013-2474,0,0,2b26c1fe2829be5ef0c6dc2f55b891e5a8bd2d0bbfe1b65f546d07b1eed88e0e,2020-01-29T20:33:03.710000 -CVE-2013-2475,0,1,1329032121902d56fe380081dd79b2ef0282dd02c746dc1e5096ac5b8fd05772,2024-11-21T01:51:49.953000 -CVE-2013-2476,0,1,e82256586f0e324335dd237f6ca890923bb1c0f9774912fc21c2e36d95b5080e,2024-11-21T01:51:50.110000 -CVE-2013-2477,0,1,847f3daed0c5351a97c0a9039f06b3f046ad6546f59371e68fa0392a004b9e37,2024-11-21T01:51:50.257000 -CVE-2013-2478,0,1,2d101ba45e856189d84fd1e7db4db0736cc92924d20da1aea758b62ff2ee1c98,2024-11-21T01:51:50.407000 -CVE-2013-2479,0,1,e98ff9d07ca35c88722e48f2d9422f8a6a428f0e435e977d506305a43c7d27aa,2024-11-21T01:51:50.563000 -CVE-2013-2480,0,1,407f477e19776cffba03207924dc79a33200acc933cfe13c7f8835d1fd5b90ba,2024-11-21T01:51:50.723000 -CVE-2013-2481,0,1,1eb01d1ca1ddc7668521594d237e41ff3bdbd6081eaa6ff1dcb91c4c7bc2bcff,2024-11-21T01:51:50.880000 -CVE-2013-2482,0,1,22226cf5d82b2316f1cdd702ed22d2903cf2976d82bd4955ad9377703f9a19e6,2024-11-21T01:51:51.053000 -CVE-2013-2483,0,1,76c94795c3700b76bd7bdd99c347bc0e7b01e5f30629d4d15bfab888b4b7458a,2024-11-21T01:51:51.213000 -CVE-2013-2484,0,1,f71aec25a27d4b1d95384d7bf4eb55eb1599f7128bd94ce7eec44f24591ffddd,2024-11-21T01:51:51.390000 -CVE-2013-2485,0,1,48285cd11b1e1f34114c42b0addb20e23cc47640f2e01c8ef7e3b72b84c1a4c2,2024-11-21T01:51:51.547000 -CVE-2013-2486,0,1,e7803a23f6484851ca2f8f0bde95fd5ac7e857a51e5744a721cab0dfa6d54065,2024-11-21T01:51:51.707000 -CVE-2013-2487,0,1,23c7388807865f2db706016086f5ffc68704e8c92c5cd10c0347d7acbdc8edfe,2024-11-21T01:51:51.867000 -CVE-2013-2488,0,1,9d3c633a87c45b1364ab7225a84baa6468ba9569ce0414993418db6d490b5108,2024-11-21T01:51:52.033000 -CVE-2013-2492,0,1,9a175d60e6875ba9646537a8a4d06628e18a37b1ebdca684c17b4f33ef7c013c,2024-11-21T01:51:52.200000 -CVE-2013-2493,0,1,af8ab83320f0a7d430c87f68c1296069c0858f318a60608217bb3cf25f46c6b0,2024-11-21T01:51:52.350000 -CVE-2013-2494,0,1,dc42ae50d9053261423e3fba0a0526521a9caac073984e94390265709f055d77,2024-11-21T01:51:52.500000 -CVE-2013-2495,0,1,1602b675b350fdae6a128a4fd40a75b5f2a501e44bc8c616d3882a26cebfb5eb,2024-11-21T01:51:52.643000 -CVE-2013-2496,0,1,1644345c6c324244fac170d3bf3c6b17dc26f289d40e48d6c7d480a88ec74d57,2024-11-21T01:51:52.790000 -CVE-2013-2498,0,1,769783177f1c80acb7cc00e4c1f448be0928a2938a76fe2f910eba9de196ea43,2024-11-21T01:51:52.940000 +CVE-2013-2475,0,0,1329032121902d56fe380081dd79b2ef0282dd02c746dc1e5096ac5b8fd05772,2024-11-21T01:51:49.953000 +CVE-2013-2476,0,0,e82256586f0e324335dd237f6ca890923bb1c0f9774912fc21c2e36d95b5080e,2024-11-21T01:51:50.110000 +CVE-2013-2477,0,0,847f3daed0c5351a97c0a9039f06b3f046ad6546f59371e68fa0392a004b9e37,2024-11-21T01:51:50.257000 +CVE-2013-2478,0,0,2d101ba45e856189d84fd1e7db4db0736cc92924d20da1aea758b62ff2ee1c98,2024-11-21T01:51:50.407000 +CVE-2013-2479,0,0,e98ff9d07ca35c88722e48f2d9422f8a6a428f0e435e977d506305a43c7d27aa,2024-11-21T01:51:50.563000 +CVE-2013-2480,0,0,407f477e19776cffba03207924dc79a33200acc933cfe13c7f8835d1fd5b90ba,2024-11-21T01:51:50.723000 +CVE-2013-2481,0,0,1eb01d1ca1ddc7668521594d237e41ff3bdbd6081eaa6ff1dcb91c4c7bc2bcff,2024-11-21T01:51:50.880000 +CVE-2013-2482,0,0,22226cf5d82b2316f1cdd702ed22d2903cf2976d82bd4955ad9377703f9a19e6,2024-11-21T01:51:51.053000 +CVE-2013-2483,0,0,76c94795c3700b76bd7bdd99c347bc0e7b01e5f30629d4d15bfab888b4b7458a,2024-11-21T01:51:51.213000 +CVE-2013-2484,0,0,f71aec25a27d4b1d95384d7bf4eb55eb1599f7128bd94ce7eec44f24591ffddd,2024-11-21T01:51:51.390000 +CVE-2013-2485,0,0,48285cd11b1e1f34114c42b0addb20e23cc47640f2e01c8ef7e3b72b84c1a4c2,2024-11-21T01:51:51.547000 +CVE-2013-2486,0,0,e7803a23f6484851ca2f8f0bde95fd5ac7e857a51e5744a721cab0dfa6d54065,2024-11-21T01:51:51.707000 +CVE-2013-2487,0,0,23c7388807865f2db706016086f5ffc68704e8c92c5cd10c0347d7acbdc8edfe,2024-11-21T01:51:51.867000 +CVE-2013-2488,0,0,9d3c633a87c45b1364ab7225a84baa6468ba9569ce0414993418db6d490b5108,2024-11-21T01:51:52.033000 +CVE-2013-2492,0,0,9a175d60e6875ba9646537a8a4d06628e18a37b1ebdca684c17b4f33ef7c013c,2024-11-21T01:51:52.200000 +CVE-2013-2493,0,0,af8ab83320f0a7d430c87f68c1296069c0858f318a60608217bb3cf25f46c6b0,2024-11-21T01:51:52.350000 +CVE-2013-2494,0,0,dc42ae50d9053261423e3fba0a0526521a9caac073984e94390265709f055d77,2024-11-21T01:51:52.500000 +CVE-2013-2495,0,0,1602b675b350fdae6a128a4fd40a75b5f2a501e44bc8c616d3882a26cebfb5eb,2024-11-21T01:51:52.643000 +CVE-2013-2496,0,0,1644345c6c324244fac170d3bf3c6b17dc26f289d40e48d6c7d480a88ec74d57,2024-11-21T01:51:52.790000 +CVE-2013-2498,0,0,769783177f1c80acb7cc00e4c1f448be0928a2938a76fe2f910eba9de196ea43,2024-11-21T01:51:52.940000 CVE-2013-2499,0,0,57abe6a79b5c074bad5fc71f2690e3884dcf164875a2c3f4f6ecbbf30f076fe7,2020-01-30T19:54:13.803000 -CVE-2013-2501,0,1,fa0551755e8e6db742117f0b942f7dfbd9d3de98d096a10e36c6e89aca956044,2024-11-21T01:51:53.237000 -CVE-2013-2503,0,1,ebec6249f8c7e011b920f9c983b11ec26bd3890219525c35c9581c8dd10dd0bf,2024-11-21T01:51:53.393000 -CVE-2013-2504,0,1,917f4bf4879f89903ae723c57f2befd4a79405c7ebb97dd610ebaa28ed09c3ba,2024-11-21T01:51:53.540000 -CVE-2013-2506,0,1,6995d0109136259de45045c059c2bd8f5e1221c14660d9ff7726a89ea7c6020a,2024-11-21T01:51:53.677000 -CVE-2013-2507,0,1,3d1268bc7d9e465cc8c61d68f538231ed9cd9bf945da3ec5eb940756323dcfb6,2024-11-21T01:51:53.837000 +CVE-2013-2501,0,0,fa0551755e8e6db742117f0b942f7dfbd9d3de98d096a10e36c6e89aca956044,2024-11-21T01:51:53.237000 +CVE-2013-2503,0,0,ebec6249f8c7e011b920f9c983b11ec26bd3890219525c35c9581c8dd10dd0bf,2024-11-21T01:51:53.393000 +CVE-2013-2504,0,0,917f4bf4879f89903ae723c57f2befd4a79405c7ebb97dd610ebaa28ed09c3ba,2024-11-21T01:51:53.540000 +CVE-2013-2506,0,0,6995d0109136259de45045c059c2bd8f5e1221c14660d9ff7726a89ea7c6020a,2024-11-21T01:51:53.677000 +CVE-2013-2507,0,0,3d1268bc7d9e465cc8c61d68f538231ed9cd9bf945da3ec5eb940756323dcfb6,2024-11-21T01:51:53.837000 CVE-2013-2512,0,0,572a6d8438d2ee8cd8779dc5a5e8773457920b02197590f3407db0e9747304fe,2021-02-04T15:00:31.707000 CVE-2013-2513,0,0,60889713ae92549d79c2dbb55d56b33a3f38c537833f645404ad51a0cb6088ae,2023-12-14T20:35:18.840000 CVE-2013-2516,0,0,ab5e02d25743e42848f9c4c48193e20454e284d952d0a944144e150c8374b8cf,2019-02-19T16:48:46.987000 CVE-2013-2517,0,0,9dbef73d06465f91481aaa3dd3222e2dc581accbff46eef6de38692a3eaf08ba,2023-11-07T02:15:03.533000 CVE-2013-2518,0,0,581a212cdbf43452b498d2bcfb902fb6e064a971de307ad080722114548e002f,2023-11-07T02:15:03.880000 -CVE-2013-2546,0,1,c55c8f13b14e16bcdd158e47d52c7c75978902bca7feea1ab7ddb8e2ed5545a3,2024-11-21T01:51:54.497000 -CVE-2013-2547,0,1,119f8fc06e8c3aefe1b9d454a0b6ad553896589dc4eb4cd739671da5e6c7960d,2024-11-21T01:51:54.680000 -CVE-2013-2548,0,1,757ae23458ca2b2e3e3a4ab5579f7102166b3e59a9b36f6dc78c6394f171ec5b,2024-11-21T01:51:54.873000 -CVE-2013-2549,0,1,3b244815b95e99659d7d0fd418ccdc5e0572447e3012b0c40cff4e8ead4da345,2024-11-21T01:51:55.073000 -CVE-2013-2550,0,1,e1dd5753f70137cdb6cd6b1a2663995f4975534eb705c1cafcffa9c8e2dcc2b9,2024-11-21T01:51:55.230000 -CVE-2013-2551,0,1,f2ba27d5b442c3a2bc153cfb9795dc05dd0d29197a94fe761a4489f348bc1293,2024-11-21T01:51:55.380000 -CVE-2013-2552,0,1,5f6746a04e6273a8584a2f81dc77213a26aaf9b6acc8e5de5bb81268a34fc251,2024-11-21T01:51:55.553000 -CVE-2013-2553,0,1,64a186b2a680dde50fa51797bc3180c829e82e2189796d918bf649a553ae46c8,2024-11-21T01:51:55.710000 -CVE-2013-2554,0,1,9a8ef79304a4336c93ffa0a51450e8217d27ff10edb5b09e1616a9bc474b1686,2024-11-21T01:51:55.860000 -CVE-2013-2555,0,1,86914519adb1dc06f2af00077ccdb51922320461bae189953c790f7ced5e6007,2024-11-21T01:51:56.017000 -CVE-2013-2556,0,1,02b83665ee7cd2e6f62df90d4ea5628a7f394a7eb705a269323dbd8be1324738,2024-11-21T01:51:56.190000 -CVE-2013-2557,0,1,6ce9a39455ff6ae75a0338736f86b4835aa53be6b4577625b4e10870f748ad0b,2024-11-21T01:51:56.343000 -CVE-2013-2558,0,1,06a2b26a1bfebb9f1980865608ebbafd319fbeafc41d735571ae24e0f2f03774,2024-11-21T01:51:56.490000 -CVE-2013-2559,0,1,1e4af08e394eb774b6a036d9ade7072fd5ca9c72761e64e34f2b7124f8a6deaa,2024-11-21T01:51:56.643000 -CVE-2013-2560,0,1,4d55de3c0ee5e8c7410edb8224a74a12e56ddc250050b89b664242ebd592e81a,2024-11-21T01:51:56.790000 -CVE-2013-2561,0,1,22120a9e96da8cdf793eee44e5cf1cd04483b30c0cc670af3b4a5e5145b62254,2024-11-21T01:51:56.930000 +CVE-2013-2546,0,0,c55c8f13b14e16bcdd158e47d52c7c75978902bca7feea1ab7ddb8e2ed5545a3,2024-11-21T01:51:54.497000 +CVE-2013-2547,0,0,119f8fc06e8c3aefe1b9d454a0b6ad553896589dc4eb4cd739671da5e6c7960d,2024-11-21T01:51:54.680000 +CVE-2013-2548,0,0,757ae23458ca2b2e3e3a4ab5579f7102166b3e59a9b36f6dc78c6394f171ec5b,2024-11-21T01:51:54.873000 +CVE-2013-2549,0,0,3b244815b95e99659d7d0fd418ccdc5e0572447e3012b0c40cff4e8ead4da345,2024-11-21T01:51:55.073000 +CVE-2013-2550,0,0,e1dd5753f70137cdb6cd6b1a2663995f4975534eb705c1cafcffa9c8e2dcc2b9,2024-11-21T01:51:55.230000 +CVE-2013-2551,0,0,f2ba27d5b442c3a2bc153cfb9795dc05dd0d29197a94fe761a4489f348bc1293,2024-11-21T01:51:55.380000 +CVE-2013-2552,0,0,5f6746a04e6273a8584a2f81dc77213a26aaf9b6acc8e5de5bb81268a34fc251,2024-11-21T01:51:55.553000 +CVE-2013-2553,0,0,64a186b2a680dde50fa51797bc3180c829e82e2189796d918bf649a553ae46c8,2024-11-21T01:51:55.710000 +CVE-2013-2554,0,0,9a8ef79304a4336c93ffa0a51450e8217d27ff10edb5b09e1616a9bc474b1686,2024-11-21T01:51:55.860000 +CVE-2013-2555,0,0,86914519adb1dc06f2af00077ccdb51922320461bae189953c790f7ced5e6007,2024-11-21T01:51:56.017000 +CVE-2013-2556,0,0,02b83665ee7cd2e6f62df90d4ea5628a7f394a7eb705a269323dbd8be1324738,2024-11-21T01:51:56.190000 +CVE-2013-2557,0,0,6ce9a39455ff6ae75a0338736f86b4835aa53be6b4577625b4e10870f748ad0b,2024-11-21T01:51:56.343000 +CVE-2013-2558,0,0,06a2b26a1bfebb9f1980865608ebbafd319fbeafc41d735571ae24e0f2f03774,2024-11-21T01:51:56.490000 +CVE-2013-2559,0,0,1e4af08e394eb774b6a036d9ade7072fd5ca9c72761e64e34f2b7124f8a6deaa,2024-11-21T01:51:56.643000 +CVE-2013-2560,0,0,4d55de3c0ee5e8c7410edb8224a74a12e56ddc250050b89b664242ebd592e81a,2024-11-21T01:51:56.790000 +CVE-2013-2561,0,0,22120a9e96da8cdf793eee44e5cf1cd04483b30c0cc670af3b4a5e5145b62254,2024-11-21T01:51:56.930000 CVE-2013-2562,0,0,d9481b9092c4ace7b3b24e45d88b7651d1821f0edd252276a302dfc205111e6f,2014-06-24T15:34:18.977000 CVE-2013-2563,0,0,c2e1b4971becf7b8b548fc1cfeb991c1f720fc37d793499c533cd4b7efa6855f,2014-06-24T15:29:39.333000 CVE-2013-2564,0,0,76025a88ed0dfb078751d1de1af3a5c70e00f7d963a20e2533730b00629ce333,2014-06-24T15:20:39.120000 CVE-2013-2565,0,0,0a673ed0ec003cdb9f2634b3296adab175d5fa1731c3f8487ab210e0ba3610a4,2019-04-15T19:55:33.620000 -CVE-2013-2566,0,1,16e0cff888f54b3528d214919d2465fdc12725bc5b3e2f65fee30eebe7f7a942,2024-11-21T01:51:57.627000 +CVE-2013-2566,0,0,16e0cff888f54b3528d214919d2465fdc12725bc5b3e2f65fee30eebe7f7a942,2024-11-21T01:51:57.627000 CVE-2013-2567,0,0,293e649fa95a913c2e781f304caeea5000e5211ce9bcb049534e378568e100a6,2020-02-01T19:00:12.787000 CVE-2013-2568,0,0,5954c6aef2ba8cbead6aecf590fc90eacb259b3a8ecb5c231559293289678827,2020-02-01T18:57:05.027000 CVE-2013-2569,0,0,0b6f5fab4050e932bf480aef8852f9fcd5f5ae960018e0826e9615fa3928dfac,2020-02-01T18:30:26.407000 @@ -60136,62 +60136,62 @@ CVE-2013-2571,0,0,79b72f70841b61554da3c6b0d2030c5e05203cdd1b0ffd98756903ac0cc710 CVE-2013-2572,0,0,4022fdd822611fe15b60aebe8e64052ce2fa4359511a68e752a294763bfdb0c2,2020-01-31T18:33:11.177000 CVE-2013-2573,0,0,cb70ee8e14599f9155ce9bd57a179ac457312263878c5d78413ff43151e1802d,2020-01-31T19:10:27.593000 CVE-2013-2574,0,0,7080aff2519afcce0ca89532431eae7dcdd0d27778910fcb2c21739093cf873e,2020-02-04T18:20:32.460000 -CVE-2013-2576,0,1,1124ef45c2435e3ebd7da99607254f48bca10e980f274d54be979e83f21c817f,2024-11-21T01:51:59.070000 -CVE-2013-2577,0,1,45f4966c00c38dce04c364a7e3aa6f751b12f9ab994f9b31b5a2da9901a54983,2024-11-21T01:51:59.240000 -CVE-2013-2578,0,1,3fc27bc28f41aa9688ff191106c34615a10c58e6cfb4028d450b9527778b62cc,2024-11-21T01:51:59.410000 -CVE-2013-2579,0,1,0b40272853154c1a6a5af7eecb33a080b0f5c223fc98de570f2cd152a9863b13,2024-11-21T01:51:59.583000 -CVE-2013-2580,0,1,5143d515bc041cea3e59c482df2270730062dfd6a889f99209007449402dca15,2024-11-21T01:51:59.747000 -CVE-2013-2581,0,1,2820bb9d7a60d35da177a5a7948593bb0f90ddf0afeec2467360032bf19f7417,2024-11-21T01:51:59.897000 -CVE-2013-2582,0,1,ba28d9fc4170d8b9b03e9ef892b0a4ad4fdfae633a31bb14e1aa1cad6ec7969c,2024-11-21T01:52:00.037000 -CVE-2013-2583,0,1,c57d0d5b2de85306bd501c4e20da0fc8c511a85c9ddad59bf0832cd3d91e0d51,2024-11-21T01:52:00.163000 -CVE-2013-2585,0,1,db1348d4d2fe069e84b73afd403a02c5e9df359f20303e72556c904ddbc37cd6,2024-11-21T01:52:00.283000 +CVE-2013-2576,0,0,1124ef45c2435e3ebd7da99607254f48bca10e980f274d54be979e83f21c817f,2024-11-21T01:51:59.070000 +CVE-2013-2577,0,0,45f4966c00c38dce04c364a7e3aa6f751b12f9ab994f9b31b5a2da9901a54983,2024-11-21T01:51:59.240000 +CVE-2013-2578,0,0,3fc27bc28f41aa9688ff191106c34615a10c58e6cfb4028d450b9527778b62cc,2024-11-21T01:51:59.410000 +CVE-2013-2579,0,0,0b40272853154c1a6a5af7eecb33a080b0f5c223fc98de570f2cd152a9863b13,2024-11-21T01:51:59.583000 +CVE-2013-2580,0,0,5143d515bc041cea3e59c482df2270730062dfd6a889f99209007449402dca15,2024-11-21T01:51:59.747000 +CVE-2013-2581,0,0,2820bb9d7a60d35da177a5a7948593bb0f90ddf0afeec2467360032bf19f7417,2024-11-21T01:51:59.897000 +CVE-2013-2582,0,0,ba28d9fc4170d8b9b03e9ef892b0a4ad4fdfae633a31bb14e1aa1cad6ec7969c,2024-11-21T01:52:00.037000 +CVE-2013-2583,0,0,c57d0d5b2de85306bd501c4e20da0fc8c511a85c9ddad59bf0832cd3d91e0d51,2024-11-21T01:52:00.163000 +CVE-2013-2585,0,0,db1348d4d2fe069e84b73afd403a02c5e9df359f20303e72556c904ddbc37cd6,2024-11-21T01:52:00.283000 CVE-2013-2586,0,0,5372ad1e93b0f98285fb149f473e9c8e4d5116a47312109289419de52f2823b6,2017-08-29T01:33:15.950000 -CVE-2013-2594,0,1,983c0fa72be69b5ff78a189764b29d04a7ef3648bcc75fb578aac20330669c15,2024-11-21T01:52:00.567000 +CVE-2013-2594,0,0,983c0fa72be69b5ff78a189764b29d04a7ef3648bcc75fb578aac20330669c15,2024-11-21T01:52:00.567000 CVE-2013-2595,0,0,3638390547f6c2f531050939a6a7121cc415f49455705cdc97314a31243e1a96,2014-09-02T18:41:19.657000 -CVE-2013-2596,0,1,d0935ab3cc43123984b05e7b98bbdeec1aefd402ab2a516ceeec535da54ce549,2024-11-21T01:52:00.860000 +CVE-2013-2596,0,0,d0935ab3cc43123984b05e7b98bbdeec1aefd402ab2a516ceeec535da54ce549,2024-11-21T01:52:00.860000 CVE-2013-2597,0,0,f1109b047865bfa61355c09b514830e53370ae38c10b66bdd6c87bd0cb86edd7,2014-09-02T18:43:12.043000 CVE-2013-2598,0,0,b1f12cfac850cb72b2bc7eb88352ee07120399685d62e5583ee9d9184f091343,2014-09-02T18:44:44.573000 CVE-2013-2599,0,0,c90fc052512460a1b9531a9c07873485f74c2fdcc01ade4e80a6d02d689c699e,2015-11-10T19:09:34.907000 CVE-2013-2600,0,0,d5b9eaeae2eef2e8288a0353a9216b76b510273de28520abfe377c55be544c80,2019-11-04T20:56:39.357000 -CVE-2013-2601,0,1,f55972e58dda7df59315adbda43202c88e1572cd5102ca5909b46e5fa8128d93,2024-11-21T01:52:01.727000 +CVE-2013-2601,0,0,f55972e58dda7df59315adbda43202c88e1572cd5102ca5909b46e5fa8128d93,2024-11-21T01:52:01.727000 CVE-2013-2602,0,0,4360910af974206f027587e78e71ccf9ea63e757d1000a9bdb6c469634456ac2,2014-06-09T14:04:31.827000 CVE-2013-2603,0,0,641b2c57514f9927b5c1afc1eee07e22625d6e4863cba26fb52fd9fbeced2235,2015-01-13T20:42:55.383000 CVE-2013-2604,0,0,991f65bf7fcd57d5e0cbf433127b8ea1c334b95665789437a52391fff279a026,2015-01-13T20:43:27.570000 CVE-2013-2612,0,0,56bd78c72961e0cfd1169b521c6b62da0209a44493aaf9c304c1fb8dfe4bb85f,2020-01-30T16:05:36.627000 -CVE-2013-2615,0,1,55bb5f5b737efd4f7b4839f0c16964069186de4be468ce55d186206a896fe2df,2024-11-21T01:52:02.497000 -CVE-2013-2616,0,1,c57995fdceb7ae74e08a53ab7db0a47d46fae83d5decab63d57aba17eb7dfdda,2024-11-21T01:52:02.653000 -CVE-2013-2617,0,1,d2b1bfa817bcd394ef7bc6b96c9531683e767c2bdaed95747e8c18c6f10b4a2f,2024-11-21T01:52:02.793000 +CVE-2013-2615,0,0,55bb5f5b737efd4f7b4839f0c16964069186de4be468ce55d186206a896fe2df,2024-11-21T01:52:02.497000 +CVE-2013-2616,0,0,c57995fdceb7ae74e08a53ab7db0a47d46fae83d5decab63d57aba17eb7dfdda,2024-11-21T01:52:02.653000 +CVE-2013-2617,0,0,d2b1bfa817bcd394ef7bc6b96c9531683e767c2bdaed95747e8c18c6f10b4a2f,2024-11-21T01:52:02.793000 CVE-2013-2618,0,0,37b37c1066a8259d8e93bd89d6a1301c768a1bbe232b4f7cf1878018703380e6,2017-08-29T01:33:16.200000 -CVE-2013-2619,0,1,73bd41aedc9ce9c0b4f1848e40182cd7b4e38c6d8648b4f9718312b68fedc60b,2024-11-21T01:52:03.113000 +CVE-2013-2619,0,0,73bd41aedc9ce9c0b4f1848e40182cd7b4e38c6d8648b4f9718312b68fedc60b,2024-11-21T01:52:03.113000 CVE-2013-2621,0,0,86a6106ab5075a58f75b693581d1a89b2b63c37444d7fc0c75b0c621f1cae7ae,2020-02-04T17:02:45.043000 CVE-2013-2622,0,0,8665dac96171f2f81adc133d78bdaa6944ae8fd8e22aa5f4fac109f79ece5580,2020-02-04T16:55:30.460000 CVE-2013-2623,0,0,66b4a0d9a258fa7af8f9d9c3fd1a1aafeed9b9742c31b27e3753294d91e12d1a,2020-02-04T15:26:15.053000 CVE-2013-2624,0,0,33ebaa5796933cc4fa785177f07c6f1f32b434c11f3c93569270a61f81b8fa31,2020-02-04T15:29:42.953000 CVE-2013-2625,0,0,722345158c1692a8eab6438c1d9f3951e637b7ad3ccdf2f85199da0b188f16b7,2020-08-18T15:05:57.937000 -CVE-2013-2627,0,1,15fcc69803f5033992d28e6e34eadab8fec6bf5753370feb17ae98460b4d5746,2024-11-21T01:52:04.090000 -CVE-2013-2628,0,1,8fd02f73e9d72feacf5d955ebf38216ba98b96b437ec705e9886e956a6d7ebac,2024-11-21T01:52:04.283000 -CVE-2013-2629,0,1,3adba20db65741f7af32b74937e67eca84a49426aeca7ab861134612c43498c2,2024-11-21T01:52:04.463000 -CVE-2013-2630,0,1,efc531285228eef4ae5658cff85c20c4a202537d8b6c63b5ad0bdcc8eb3b881a,2024-11-21T01:52:04.630000 +CVE-2013-2627,0,0,15fcc69803f5033992d28e6e34eadab8fec6bf5753370feb17ae98460b4d5746,2024-11-21T01:52:04.090000 +CVE-2013-2628,0,0,8fd02f73e9d72feacf5d955ebf38216ba98b96b437ec705e9886e956a6d7ebac,2024-11-21T01:52:04.283000 +CVE-2013-2629,0,0,3adba20db65741f7af32b74937e67eca84a49426aeca7ab861134612c43498c2,2024-11-21T01:52:04.463000 +CVE-2013-2630,0,0,efc531285228eef4ae5658cff85c20c4a202537d8b6c63b5ad0bdcc8eb3b881a,2024-11-21T01:52:04.630000 CVE-2013-2631,0,0,57c0ceda564e26dfadce3bcf6d8962d109a338ff690367bab8ac355a9af3051d,2020-02-05T21:55:21.780000 -CVE-2013-2632,0,1,ae5dd1fa41eb52f53037c07716b23b75b06b536a5bc734c0645eb91e47c0e2f1,2024-11-21T01:52:04.957000 -CVE-2013-2633,0,1,e2b2bc141be05af236ace1bead6939ab7c3ee503ac89929190b62e99b28f4d6a,2024-11-21T01:52:05.110000 -CVE-2013-2634,0,1,62e68235bb24c3e0ad4fd9845537222645b386b386cce697b5e27484463f13bb,2024-11-21T01:52:05.260000 -CVE-2013-2635,0,1,c5b6b3bfb0561e8637497f85e03b7e3fcded99eb4102ae0270e9e088966bc574,2024-11-21T01:52:05.430000 -CVE-2013-2636,0,1,5552d56a4d0f68ec20085f818cacb900e8843283acf2d9ee17f70f63496816e5,2024-11-21T01:52:05.617000 +CVE-2013-2632,0,0,ae5dd1fa41eb52f53037c07716b23b75b06b536a5bc734c0645eb91e47c0e2f1,2024-11-21T01:52:04.957000 +CVE-2013-2633,0,0,e2b2bc141be05af236ace1bead6939ab7c3ee503ac89929190b62e99b28f4d6a,2024-11-21T01:52:05.110000 +CVE-2013-2634,0,0,62e68235bb24c3e0ad4fd9845537222645b386b386cce697b5e27484463f13bb,2024-11-21T01:52:05.260000 +CVE-2013-2635,0,0,c5b6b3bfb0561e8637497f85e03b7e3fcded99eb4102ae0270e9e088966bc574,2024-11-21T01:52:05.430000 +CVE-2013-2636,0,0,5552d56a4d0f68ec20085f818cacb900e8843283acf2d9ee17f70f63496816e5,2024-11-21T01:52:05.617000 CVE-2013-2637,0,0,9ec2742774dd3db7f66a1c813f1bd03950ecf2d2757ccabd8a069263e86b633a,2020-02-18T20:11:42.297000 -CVE-2013-2639,0,1,4f46dd6f3be79a463bac389b9dbf58c94de6dc731934abfcc1804ed47418396e,2024-11-21T01:52:05.937000 -CVE-2013-2640,0,1,be6e9f4979d68c2ede380f48ba767148f146a02bda1d37f2793d716c31c64e63,2024-11-21T01:52:06.083000 -CVE-2013-2641,0,1,5551dadf392c444983c4edb3f91e7d0732a9e898eb1a9eb8153843a7b6d19bb3,2024-11-21T01:52:06.253000 -CVE-2013-2642,0,1,a95fec66f1d26c4ab3addfe0ca11defafb7d7d0aa273cd0f6028d7e8225bf51e,2024-11-21T01:52:06.417000 -CVE-2013-2643,0,1,d4e9bc2f1b15c01592c0e24c325cca1e98265fe8deea3ac2b91b1bed8df8cd78,2024-11-21T01:52:06.567000 +CVE-2013-2639,0,0,4f46dd6f3be79a463bac389b9dbf58c94de6dc731934abfcc1804ed47418396e,2024-11-21T01:52:05.937000 +CVE-2013-2640,0,0,be6e9f4979d68c2ede380f48ba767148f146a02bda1d37f2793d716c31c64e63,2024-11-21T01:52:06.083000 +CVE-2013-2641,0,0,5551dadf392c444983c4edb3f91e7d0732a9e898eb1a9eb8153843a7b6d19bb3,2024-11-21T01:52:06.253000 +CVE-2013-2642,0,0,a95fec66f1d26c4ab3addfe0ca11defafb7d7d0aa273cd0f6028d7e8225bf51e,2024-11-21T01:52:06.417000 +CVE-2013-2643,0,0,d4e9bc2f1b15c01592c0e24c325cca1e98265fe8deea3ac2b91b1bed8df8cd78,2024-11-21T01:52:06.567000 CVE-2013-2644,0,0,4cf2a107c1186ea244e7bd2a096c9377ed6fed77c2bdd186e44a464c68d2691c,2023-11-07T02:15:05.530000 CVE-2013-2645,0,0,37f92c0abcfa6cd5c00782e9d56e739d78a1e1692066f349b332e9627ba7c259,2014-10-06T18:50:36.540000 CVE-2013-2646,0,0,5df14b721838fd36ac3d14e4e8adea4bba533f0b4a332c1efc2da18c101e3d47,2020-02-06T17:22:48.497000 -CVE-2013-2651,0,1,5e3a89d79ea69ceae9c19752c3abbea81360c3cf551d8e5c9bddcafa31b7f6a8,2024-11-21T01:52:07.007000 -CVE-2013-2652,0,1,592d75da76cfa3ccd4ec4d28384797a1b7545fd6bf4642070f214843dc5ac434,2024-11-21T01:52:07.177000 -CVE-2013-2653,0,1,c32d24b39a944ead376bc5e68c135163db3c057dffce845e0656eb6cde38cf2a,2024-11-21T01:52:07.400000 -CVE-2013-2670,0,1,81057dddbb6cff7ad71e92bff3b4dd1efd3323ed4795b89aaba1b923c81763f6,2024-11-21T01:52:07.553000 -CVE-2013-2671,0,1,84cfef4a36351535f18254a0d4cf1437f7bd4691bf70e20e2c31e75d223887ff,2024-11-21T01:52:07.710000 +CVE-2013-2651,0,0,5e3a89d79ea69ceae9c19752c3abbea81360c3cf551d8e5c9bddcafa31b7f6a8,2024-11-21T01:52:07.007000 +CVE-2013-2652,0,0,592d75da76cfa3ccd4ec4d28384797a1b7545fd6bf4642070f214843dc5ac434,2024-11-21T01:52:07.177000 +CVE-2013-2653,0,0,c32d24b39a944ead376bc5e68c135163db3c057dffce845e0656eb6cde38cf2a,2024-11-21T01:52:07.400000 +CVE-2013-2670,0,0,81057dddbb6cff7ad71e92bff3b4dd1efd3323ed4795b89aaba1b923c81763f6,2024-11-21T01:52:07.553000 +CVE-2013-2671,0,0,84cfef4a36351535f18254a0d4cf1437f7bd4691bf70e20e2c31e75d223887ff,2024-11-21T01:52:07.710000 CVE-2013-2672,0,0,990c6b6ebe04ca4753867e407763fabb03d546d4d97f46fee1ef56e63246c103,2020-02-05T20:49:11.063000 CVE-2013-2673,0,0,5f8536219528154274804c2220e6bbe515ec829eef499121a9dcc452bb406d2b,2020-02-05T21:13:28.697000 CVE-2013-2674,0,0,2b12dad4d90d4d1647c45a12c666d83deb377403554b1e7f19708c6b9b58671d,2020-02-05T20:32:11.250000 @@ -60204,1279 +60204,1279 @@ CVE-2013-2681,0,0,cbc4e40f12319be373cbbf1f2601356dc80bd62416b0f17adf754bcdcb61f9 CVE-2013-2682,0,0,e5c97ea15f033b62a40d06aff5e246a2397b77d2ee690b3859b5c4df802a158b,2020-02-07T14:30:24.200000 CVE-2013-2683,0,0,7191130cb45a89ab618f0cea36963bdb8e9e425da696f6898175db0799b932d5,2020-02-07T13:58:19.103000 CVE-2013-2684,0,0,1b2bf902433b5e154cc1c783674e48abc3f8c4fceaa7c644eddb57960b815d3d,2020-02-07T13:25:03.620000 -CVE-2013-2685,0,1,8c020e36e4e6e2e48aac653a171af8bca69bb91186a6eecd5ed62f7c897c8ae1,2024-11-21T01:52:09.723000 -CVE-2013-2686,0,1,da4902db045194558427b4c6de635c31d10d24c57eae442cc139d7339531c762,2024-11-21T01:52:09.887000 -CVE-2013-2687,0,1,42799ac91f01d00ed26148226313754e3a76e5878d99d68e28c117f5fd7531e9,2024-11-21T01:52:10.070000 -CVE-2013-2688,0,1,b10d6b01d674c8ba985216293b61df704e9fddb7f03815815b3f7b8629d12b06,2024-11-21T01:52:10.207000 -CVE-2013-2690,0,1,3c749c76ef7832ba5e6daeb8bcf577d936d169b80623ecacf68a7ac3e48b69d5,2024-11-21T01:52:10.337000 -CVE-2013-2691,0,1,607fa8b8f3a11ef39ff4b09cf8c42833b8bdab823af1fa75776c10337e84244b,2024-11-21T01:52:10.497000 -CVE-2013-2692,0,1,8ee0e9be8d674ad61f670b546b8111171fd70f2325c1560d3cca0b1cc9b620da,2024-11-21T01:52:10.603000 -CVE-2013-2693,0,1,7cdefe5eb9e2239b48a22aaa99f5b2cc56a585dfe91cb1cb8d75a2c30a9829c3,2024-11-21T01:52:10.707000 -CVE-2013-2694,0,1,623a0eb0ec5c5fb6c598da85d2d748457590ed6eac205c9d6e7337273cec305d,2024-11-21T01:52:10.830000 -CVE-2013-2695,0,1,b47744e7ef3264e4788b89e329e819c0e42d4e165c5aad6c16d614d3a51085de,2024-11-21T01:52:10.933000 -CVE-2013-2696,0,1,f285334753b5e85ed4e30a203189db256e2ab8e01f7cd9c409657e1cc6f3dd72,2024-11-21T01:52:11.040000 -CVE-2013-2697,0,1,f804e815f2c6c62fe0e5de21022dbdfc2ef3281072741ec5b983314791f85a3d,2024-11-21T01:52:11.147000 +CVE-2013-2685,0,0,8c020e36e4e6e2e48aac653a171af8bca69bb91186a6eecd5ed62f7c897c8ae1,2024-11-21T01:52:09.723000 +CVE-2013-2686,0,0,da4902db045194558427b4c6de635c31d10d24c57eae442cc139d7339531c762,2024-11-21T01:52:09.887000 +CVE-2013-2687,0,0,42799ac91f01d00ed26148226313754e3a76e5878d99d68e28c117f5fd7531e9,2024-11-21T01:52:10.070000 +CVE-2013-2688,0,0,b10d6b01d674c8ba985216293b61df704e9fddb7f03815815b3f7b8629d12b06,2024-11-21T01:52:10.207000 +CVE-2013-2690,0,0,3c749c76ef7832ba5e6daeb8bcf577d936d169b80623ecacf68a7ac3e48b69d5,2024-11-21T01:52:10.337000 +CVE-2013-2691,0,0,607fa8b8f3a11ef39ff4b09cf8c42833b8bdab823af1fa75776c10337e84244b,2024-11-21T01:52:10.497000 +CVE-2013-2692,0,0,8ee0e9be8d674ad61f670b546b8111171fd70f2325c1560d3cca0b1cc9b620da,2024-11-21T01:52:10.603000 +CVE-2013-2693,0,0,7cdefe5eb9e2239b48a22aaa99f5b2cc56a585dfe91cb1cb8d75a2c30a9829c3,2024-11-21T01:52:10.707000 +CVE-2013-2694,0,0,623a0eb0ec5c5fb6c598da85d2d748457590ed6eac205c9d6e7337273cec305d,2024-11-21T01:52:10.830000 +CVE-2013-2695,0,0,b47744e7ef3264e4788b89e329e819c0e42d4e165c5aad6c16d614d3a51085de,2024-11-21T01:52:10.933000 +CVE-2013-2696,0,0,f285334753b5e85ed4e30a203189db256e2ab8e01f7cd9c409657e1cc6f3dd72,2024-11-21T01:52:11.040000 +CVE-2013-2697,0,0,f804e815f2c6c62fe0e5de21022dbdfc2ef3281072741ec5b983314791f85a3d,2024-11-21T01:52:11.147000 CVE-2013-2698,0,0,360255bb1566d1a7fead4e0bb8df3da0db09583ad86c88395314c59e6ef69c63,2017-08-29T01:33:16.683000 -CVE-2013-2699,0,1,2d81bdb9903e9abf73a322860ebee7e0404f2ebf88874837ecf2afe040ea485d,2024-11-21T01:52:11.370000 -CVE-2013-2700,0,1,db58e9b66362e50ec93fed17b21644663c4758549ef4e4f97decd8ff81ff9ab9,2024-11-21T01:52:11.480000 -CVE-2013-2701,0,1,275beb8b712074ed5489d522e1c385f92405f366fc24183768f1e5d8d0a5f55d,2024-11-21T01:52:11.603000 -CVE-2013-2702,0,1,fab1b11ecdc8226b2d7d22e92ff662d8d6529368d6539fec4feb284b6d977201,2024-11-21T01:52:11.710000 -CVE-2013-2703,0,1,810d227f9079626751c0b9ef0a6a1d6daeb2972770a2d2e12d9325145dfe46c9,2024-11-21T01:52:11.833000 -CVE-2013-2704,0,1,2e6140bc764b91ed8027f86cad262d96f81ad22655f4d780ddfcc06e8b364522,2024-11-21T01:52:11.953000 -CVE-2013-2705,0,1,acf8f67d15c5fee3d0bc27784637bc543157f6c96de59a004da92159663c8485,2024-11-21T01:52:12.087000 -CVE-2013-2706,0,1,7ac4e436d586b79896a4e08569b09f3f8a8a5a4ee53dce03b545a439e7dc2f21,2024-11-21T01:52:12.210000 -CVE-2013-2707,0,1,2ae6a9149aef4714158ce0cab98c0d18564ebfb4b00da1b6ee939140de828547,2024-11-21T01:52:12.343000 -CVE-2013-2708,0,1,4a31ba13064c6dc7ba9c19769f9e23029897f73745f9c3b68bd09d351de567d0,2024-11-21T01:52:12.487000 -CVE-2013-2709,0,1,559b5a480306ad999c9b30dca0b32b76293222dea206ac2e77b16601f5c96b36,2024-11-21T01:52:12.597000 +CVE-2013-2699,0,0,2d81bdb9903e9abf73a322860ebee7e0404f2ebf88874837ecf2afe040ea485d,2024-11-21T01:52:11.370000 +CVE-2013-2700,0,0,db58e9b66362e50ec93fed17b21644663c4758549ef4e4f97decd8ff81ff9ab9,2024-11-21T01:52:11.480000 +CVE-2013-2701,0,0,275beb8b712074ed5489d522e1c385f92405f366fc24183768f1e5d8d0a5f55d,2024-11-21T01:52:11.603000 +CVE-2013-2702,0,0,fab1b11ecdc8226b2d7d22e92ff662d8d6529368d6539fec4feb284b6d977201,2024-11-21T01:52:11.710000 +CVE-2013-2703,0,0,810d227f9079626751c0b9ef0a6a1d6daeb2972770a2d2e12d9325145dfe46c9,2024-11-21T01:52:11.833000 +CVE-2013-2704,0,0,2e6140bc764b91ed8027f86cad262d96f81ad22655f4d780ddfcc06e8b364522,2024-11-21T01:52:11.953000 +CVE-2013-2705,0,0,acf8f67d15c5fee3d0bc27784637bc543157f6c96de59a004da92159663c8485,2024-11-21T01:52:12.087000 +CVE-2013-2706,0,0,7ac4e436d586b79896a4e08569b09f3f8a8a5a4ee53dce03b545a439e7dc2f21,2024-11-21T01:52:12.210000 +CVE-2013-2707,0,0,2ae6a9149aef4714158ce0cab98c0d18564ebfb4b00da1b6ee939140de828547,2024-11-21T01:52:12.343000 +CVE-2013-2708,0,0,4a31ba13064c6dc7ba9c19769f9e23029897f73745f9c3b68bd09d351de567d0,2024-11-21T01:52:12.487000 +CVE-2013-2709,0,0,559b5a480306ad999c9b30dca0b32b76293222dea206ac2e77b16601f5c96b36,2024-11-21T01:52:12.597000 CVE-2013-2710,0,0,540c0fc46c7beb2b3eecb3f129783b290f27896236d379a7e807c75803e03fee,2017-08-29T01:33:16.747000 -CVE-2013-2712,0,1,69846494dfb44e9ea749d34e218b62edd0d8d388a1ad9615da8d5e18e256917e,2024-11-21T01:52:12.830000 -CVE-2013-2713,0,1,3b9e5d21a5bdecf8bcd6cacfde274f1868c2ad88773806856c845cc839df8677,2024-11-21T01:52:12.990000 +CVE-2013-2712,0,0,69846494dfb44e9ea749d34e218b62edd0d8d388a1ad9615da8d5e18e256917e,2024-11-21T01:52:12.830000 +CVE-2013-2713,0,0,3b9e5d21a5bdecf8bcd6cacfde274f1868c2ad88773806856c845cc839df8677,2024-11-21T01:52:12.990000 CVE-2013-2714,0,0,8177b92bf3de2cb6894375f41522d592597ed5026e3cc2c1c1278e0f79f272ab,2020-01-30T17:49:03.230000 -CVE-2013-2715,0,1,0bbb45b11e669212ac9ef7ce82583201ba3e4a8ea47b94162063ef4c28abe975,2024-11-21T01:52:13.263000 -CVE-2013-2716,0,1,37e7895b1b9bd886afcce14a1f11cafa5559b4b225c7664d52d045e36a16cbc1,2024-11-21T01:52:13.423000 -CVE-2013-2717,0,1,d85a853d48966ceb0f0e54a0686b1dd430739f05b7d7eea3cfdc8c2afa054c15,2024-11-21T01:52:13.580000 -CVE-2013-2718,0,1,75177c29470a1d39e936f4f432ef64d8bf8498db25d7be4dfcf9e12c137aea18,2024-11-21T01:52:13.713000 -CVE-2013-2719,0,1,2024fcadd33aecc44bc5a07432a5a8d1b4cfb16df7f50d605f09101a49dd7d63,2024-11-21T01:52:13.853000 -CVE-2013-2720,0,1,b88d703bb3cffaebeffc8c7d483a033860e9f3dbaf01ef68703be06873a3f76d,2024-11-21T01:52:13.987000 -CVE-2013-2721,0,1,215f093607e076d0456ee03d4dd512127ab201275924215bb5aec5f18c44bac1,2024-11-21T01:52:14.123000 -CVE-2013-2722,0,1,62d3f28221f0b345a795e35b1bc379a1e0106e5a81b755aa8139f82bb53b817b,2024-11-21T01:52:14.253000 -CVE-2013-2723,0,1,19e02089a8677f77e8d62f0f47a0b2273df7c89659c1d8ec6cffc843b944ac74,2024-11-21T01:52:14.410000 -CVE-2013-2724,0,1,a348f74cc7daf68ddd1f22af02ff5f3ea1fb0f63d22f982f9f56671ff143e49e,2024-11-21T01:52:14.563000 -CVE-2013-2725,0,1,8384e6865ba172920673e9e37a1a44d2428b104f35f4f49d5e01c7eaefe54b75,2024-11-21T01:52:14.710000 -CVE-2013-2726,0,1,2b245d019f079a422718c0378af081b319fbe074bce91d1e984b22a8c654511c,2024-11-21T01:52:14.857000 -CVE-2013-2727,0,1,a6d58d8305f1d6b8f04d1aedd0afd90775ef96ec428477d3377ed5c627993e6d,2024-11-21T01:52:15.007000 -CVE-2013-2728,0,1,b518cdf92073de078cac6ffbcbe3f9d3e4ee255eb03d44823a241f5392dcee18,2024-11-21T01:52:15.153000 -CVE-2013-2729,0,1,c6ecf38993f6d0cf1167654ee1c57c16a8915a516e03fb096e9e9ffdcc027bc8,2024-11-21T01:52:15.293000 -CVE-2013-2730,0,1,8283af9a624bb5980e5d6a476fb5a0177966abfc0ce67e374355ceaad82e4a66,2024-11-21T01:52:15.417000 -CVE-2013-2731,0,1,cbc4d96c84f8ca9e7ba44d32ad7f82498ae472725de362b1e0b630b4c956ce13,2024-11-21T01:52:15.557000 -CVE-2013-2732,0,1,776771750752078b318ac6aac0de6f3bfeb03935a35005a38e3c74448b757790,2024-11-21T01:52:15.710000 -CVE-2013-2733,0,1,00fb80f10a2cd86c3ddc705a23e52516e7e6d28daf955ebdfd8139813935c12c,2024-11-21T01:52:15.863000 -CVE-2013-2734,0,1,a11c5175be7c919880f68a8b24522a12858e315dc761d11d191302a9a0141b75,2024-11-21T01:52:16.007000 -CVE-2013-2735,0,1,9e4ebda1249ea4a57467a14d1f4ad558a380fa7de409b009e375ab8d33bf4b79,2024-11-21T01:52:16.147000 -CVE-2013-2736,0,1,6325f63f7b0af1322cc14840f6b9a520597efa5cd7a0142a29424c11c3018629,2024-11-21T01:52:16.283000 -CVE-2013-2737,0,1,8655c24696d109850bcee0c1d984323247df0ec1bfaf7cc90b9e17f1b73fcdd2,2024-11-21T01:52:16.430000 +CVE-2013-2715,0,0,0bbb45b11e669212ac9ef7ce82583201ba3e4a8ea47b94162063ef4c28abe975,2024-11-21T01:52:13.263000 +CVE-2013-2716,0,0,37e7895b1b9bd886afcce14a1f11cafa5559b4b225c7664d52d045e36a16cbc1,2024-11-21T01:52:13.423000 +CVE-2013-2717,0,0,d85a853d48966ceb0f0e54a0686b1dd430739f05b7d7eea3cfdc8c2afa054c15,2024-11-21T01:52:13.580000 +CVE-2013-2718,0,0,75177c29470a1d39e936f4f432ef64d8bf8498db25d7be4dfcf9e12c137aea18,2024-11-21T01:52:13.713000 +CVE-2013-2719,0,0,2024fcadd33aecc44bc5a07432a5a8d1b4cfb16df7f50d605f09101a49dd7d63,2024-11-21T01:52:13.853000 +CVE-2013-2720,0,0,b88d703bb3cffaebeffc8c7d483a033860e9f3dbaf01ef68703be06873a3f76d,2024-11-21T01:52:13.987000 +CVE-2013-2721,0,0,215f093607e076d0456ee03d4dd512127ab201275924215bb5aec5f18c44bac1,2024-11-21T01:52:14.123000 +CVE-2013-2722,0,0,62d3f28221f0b345a795e35b1bc379a1e0106e5a81b755aa8139f82bb53b817b,2024-11-21T01:52:14.253000 +CVE-2013-2723,0,0,19e02089a8677f77e8d62f0f47a0b2273df7c89659c1d8ec6cffc843b944ac74,2024-11-21T01:52:14.410000 +CVE-2013-2724,0,0,a348f74cc7daf68ddd1f22af02ff5f3ea1fb0f63d22f982f9f56671ff143e49e,2024-11-21T01:52:14.563000 +CVE-2013-2725,0,0,8384e6865ba172920673e9e37a1a44d2428b104f35f4f49d5e01c7eaefe54b75,2024-11-21T01:52:14.710000 +CVE-2013-2726,0,0,2b245d019f079a422718c0378af081b319fbe074bce91d1e984b22a8c654511c,2024-11-21T01:52:14.857000 +CVE-2013-2727,0,0,a6d58d8305f1d6b8f04d1aedd0afd90775ef96ec428477d3377ed5c627993e6d,2024-11-21T01:52:15.007000 +CVE-2013-2728,0,0,b518cdf92073de078cac6ffbcbe3f9d3e4ee255eb03d44823a241f5392dcee18,2024-11-21T01:52:15.153000 +CVE-2013-2729,0,0,c6ecf38993f6d0cf1167654ee1c57c16a8915a516e03fb096e9e9ffdcc027bc8,2024-11-21T01:52:15.293000 +CVE-2013-2730,0,0,8283af9a624bb5980e5d6a476fb5a0177966abfc0ce67e374355ceaad82e4a66,2024-11-21T01:52:15.417000 +CVE-2013-2731,0,0,cbc4d96c84f8ca9e7ba44d32ad7f82498ae472725de362b1e0b630b4c956ce13,2024-11-21T01:52:15.557000 +CVE-2013-2732,0,0,776771750752078b318ac6aac0de6f3bfeb03935a35005a38e3c74448b757790,2024-11-21T01:52:15.710000 +CVE-2013-2733,0,0,00fb80f10a2cd86c3ddc705a23e52516e7e6d28daf955ebdfd8139813935c12c,2024-11-21T01:52:15.863000 +CVE-2013-2734,0,0,a11c5175be7c919880f68a8b24522a12858e315dc761d11d191302a9a0141b75,2024-11-21T01:52:16.007000 +CVE-2013-2735,0,0,9e4ebda1249ea4a57467a14d1f4ad558a380fa7de409b009e375ab8d33bf4b79,2024-11-21T01:52:16.147000 +CVE-2013-2736,0,0,6325f63f7b0af1322cc14840f6b9a520597efa5cd7a0142a29424c11c3018629,2024-11-21T01:52:16.283000 +CVE-2013-2737,0,0,8655c24696d109850bcee0c1d984323247df0ec1bfaf7cc90b9e17f1b73fcdd2,2024-11-21T01:52:16.430000 CVE-2013-2738,0,0,0b648a19b965422a57778722b3a939cdbe5516611e265c4811e9fc5c23d4c6c6,2019-11-04T20:56:59.783000 CVE-2013-2739,0,0,31cffcccf902847621ee7cb665a2186fa502f52feeb0e922028fa0f954be5e77,2019-11-04T20:53:58.540000 -CVE-2013-2741,0,1,be10f9d4b252cf88b52dad0146f164359be227f38bd829c339b6647e5ceb2021,2024-11-21T01:52:16.890000 -CVE-2013-2742,0,1,2235f2e79cef5ffadb4b8f8bdb5b8314a028253c06e2479335640a60dc2004b2,2024-11-21T01:52:17.030000 -CVE-2013-2743,0,1,d6f9b2a393dd433bd278c72fff249330c68fabffac48eb76a087e4d76a13d732,2024-11-21T01:52:17.180000 -CVE-2013-2744,0,1,919690c008380773463d16c3fe2e4301d9b7f41f9fbd964421e490317228d947,2024-11-21T01:52:17.317000 +CVE-2013-2741,0,0,be10f9d4b252cf88b52dad0146f164359be227f38bd829c339b6647e5ceb2021,2024-11-21T01:52:16.890000 +CVE-2013-2742,0,0,2235f2e79cef5ffadb4b8f8bdb5b8314a028253c06e2479335640a60dc2004b2,2024-11-21T01:52:17.030000 +CVE-2013-2743,0,0,d6f9b2a393dd433bd278c72fff249330c68fabffac48eb76a087e4d76a13d732,2024-11-21T01:52:17.180000 +CVE-2013-2744,0,0,919690c008380773463d16c3fe2e4301d9b7f41f9fbd964421e490317228d947,2024-11-21T01:52:17.317000 CVE-2013-2745,0,0,de0a75ebab7223c96c2acf481f30ca06627d91d875bc7adaeb8386d109b529dc,2020-08-18T15:05:58.063000 -CVE-2013-2747,0,1,158dbcd86ccbb96f0b7da22ecd41a2e58f160f8a0283fdd379a7d81d697ecaf7,2024-11-21T01:52:17.633000 +CVE-2013-2747,0,0,158dbcd86ccbb96f0b7da22ecd41a2e58f160f8a0283fdd379a7d81d697ecaf7,2024-11-21T01:52:17.633000 CVE-2013-2748,0,0,f9c3cee86f15a96a05d176c18b832e9e8b465ec01768ff24bee9a102a074ba25,2020-02-05T14:43:48.160000 CVE-2013-2749,0,0,74e78acf7fd95475c064ffc65ff1b51cee6f33c6ef1c8cbed929ae46cbc62a37,2023-11-07T02:15:06.173000 -CVE-2013-2750,0,1,2bc600961f7ca1dace467816904eed4054c2aed8ba87f2faf86f03c2fb0b2f23,2024-11-21T01:52:17.930000 -CVE-2013-2751,0,1,d4135111f0269d18933f0fb292a37657edec9f851077ea1b013e3eafcbc06b31,2024-11-21T01:52:18.083000 -CVE-2013-2752,0,1,b5ee7fca90faa1cb7c8f00b6459648bd72cb4c55cdcde3f4902de26bd6e3222a,2024-11-21T01:52:18.240000 -CVE-2013-2754,0,1,9701e7dd7e62b1d8e36a3974b3d171e1a9566d73a4ea8aecfdeb63882b3715b1,2024-11-21T01:52:18.390000 -CVE-2013-2756,0,1,5ea0585a0812bb8278aad24df9bd9a69ab9700676c8766d0f2ac9320d180d012,2024-11-21T01:52:18.560000 -CVE-2013-2757,0,1,1aa3c5637447cbf58868de979f44cbe78a0514add232a2dc326d4c23671e2d58,2024-11-21T01:52:18.723000 -CVE-2013-2758,0,1,0a1f6adf3f0f9f6b1f4ef100ac417f2954f0f426ac0ff34fbf240f0ca3ad4ea0,2024-11-21T01:52:18.877000 -CVE-2013-2760,0,1,5557e2e067c53388799fcf5fe726715b653cdad72c43f1cf5cea31fe22a7d4cd,2024-11-21T01:52:19.030000 -CVE-2013-2761,0,1,9300e80988a7fdaef00ec0df74f3ee360ff81d7ed1affdbf2ff1e5a2a781f715,2024-11-21T01:52:19.180000 -CVE-2013-2762,0,1,99c5411c672e362743a0f2e10152137cc042cf84976a41e7ca843d56b2832c17,2024-11-21T01:52:19.327000 -CVE-2013-2763,0,1,f1810f7a56544e05b7f948f7d3db2506202bb81ab8075fc73ac6777e332f09cc,2024-11-21T01:52:19.470000 +CVE-2013-2750,0,0,2bc600961f7ca1dace467816904eed4054c2aed8ba87f2faf86f03c2fb0b2f23,2024-11-21T01:52:17.930000 +CVE-2013-2751,0,0,d4135111f0269d18933f0fb292a37657edec9f851077ea1b013e3eafcbc06b31,2024-11-21T01:52:18.083000 +CVE-2013-2752,0,0,b5ee7fca90faa1cb7c8f00b6459648bd72cb4c55cdcde3f4902de26bd6e3222a,2024-11-21T01:52:18.240000 +CVE-2013-2754,0,0,9701e7dd7e62b1d8e36a3974b3d171e1a9566d73a4ea8aecfdeb63882b3715b1,2024-11-21T01:52:18.390000 +CVE-2013-2756,0,0,5ea0585a0812bb8278aad24df9bd9a69ab9700676c8766d0f2ac9320d180d012,2024-11-21T01:52:18.560000 +CVE-2013-2757,0,0,1aa3c5637447cbf58868de979f44cbe78a0514add232a2dc326d4c23671e2d58,2024-11-21T01:52:18.723000 +CVE-2013-2758,0,0,0a1f6adf3f0f9f6b1f4ef100ac417f2954f0f426ac0ff34fbf240f0ca3ad4ea0,2024-11-21T01:52:18.877000 +CVE-2013-2760,0,0,5557e2e067c53388799fcf5fe726715b653cdad72c43f1cf5cea31fe22a7d4cd,2024-11-21T01:52:19.030000 +CVE-2013-2761,0,0,9300e80988a7fdaef00ec0df74f3ee360ff81d7ed1affdbf2ff1e5a2a781f715,2024-11-21T01:52:19.180000 +CVE-2013-2762,0,0,99c5411c672e362743a0f2e10152137cc042cf84976a41e7ca843d56b2832c17,2024-11-21T01:52:19.327000 +CVE-2013-2763,0,0,f1810f7a56544e05b7f948f7d3db2506202bb81ab8075fc73ac6777e332f09cc,2024-11-21T01:52:19.470000 CVE-2013-2764,0,0,067b9387873078ad747b522992f30dc90d1a929a57ac92352548f2e60b758078,2020-01-30T17:30:55.757000 -CVE-2013-2765,0,1,f968debdeda561629513d02a1ed499cdde1c8f1ede7a2dae049b251769fc827c,2024-11-21T01:52:19.793000 -CVE-2013-2766,0,1,2dfe16839139ba79550e6802c01fc1adf1270bec67a2ac92007e2a1f9bb8f974,2024-11-21T01:52:20.017000 -CVE-2013-2767,0,1,f833b425ef559d10994613c79a31f913df4d4b60a1ad3ef8fcacdb7ad9e703b8,2024-11-21T01:52:20.170000 -CVE-2013-2770,0,1,f4d9f47e31c87185ba852cbe609adcc20f668bd5f3b6d9091e603aa2bd0469aa,2024-11-21T01:52:20.323000 +CVE-2013-2765,0,0,f968debdeda561629513d02a1ed499cdde1c8f1ede7a2dae049b251769fc827c,2024-11-21T01:52:19.793000 +CVE-2013-2766,0,0,2dfe16839139ba79550e6802c01fc1adf1270bec67a2ac92007e2a1f9bb8f974,2024-11-21T01:52:20.017000 +CVE-2013-2767,0,0,f833b425ef559d10994613c79a31f913df4d4b60a1ad3ef8fcacdb7ad9e703b8,2024-11-21T01:52:20.170000 +CVE-2013-2770,0,0,f4d9f47e31c87185ba852cbe609adcc20f668bd5f3b6d9091e603aa2bd0469aa,2024-11-21T01:52:20.323000 CVE-2013-2773,0,0,3d0cc09b116c52c5e0e26cda7850d30c12b77e7b7b1c1ab4a4b9b344ea0cd5dc,2020-01-24T14:22:49.197000 -CVE-2013-2776,0,1,8f2c6ab039d1f2f76dee4019b57fcf10618faee620ca853eed582bfe43e9cb87,2024-11-21T01:52:20.597000 -CVE-2013-2777,0,1,2ea7d8c1e1d5be9dc4a173691400b8cdda27d34f558e2775cd8c95ba132e2a2e,2024-11-21T01:52:20.780000 -CVE-2013-2778,0,1,ee3a3828409382a7ae5fd1eb4d6a9616baf8e205b6b179f1f3466590b075fce2,2024-11-21T01:52:20.957000 -CVE-2013-2779,0,1,2751174d587fe962f0966d7c52d38c056bdc2cf3752b3d65c5042280334a4706,2024-11-21T01:52:21.097000 -CVE-2013-2780,0,1,e97c51732bda2f97fc8534b3f1046b5002049dd86409baa5be26d2a48d48da73,2024-11-21T01:52:21.247000 -CVE-2013-2781,0,1,c079cc08bab2c18cfd35f4d45fb9dc160cba526ca2ae3d54cd0549ba1eccd134,2024-11-21T01:52:21.360000 -CVE-2013-2782,0,1,3b36aff2d931792d2f4fd24c60a60432e84c6c46d4f54d8321ecd17e10b0baae,2024-11-21T01:52:21.467000 -CVE-2013-2783,0,1,e1bb375221730da5ba6dd8bc34428e28b5a6df73de9c89b2f97a028d716dadb8,2024-11-21T01:52:21.580000 -CVE-2013-2784,0,1,10ad3bfe0243dc58d648946b3a19a9de2376657340d78837158bc341826113f0,2024-11-21T01:52:21.703000 -CVE-2013-2785,0,1,67622333c8131cd415ac56edcce32596f30d2dd3531b3e737e85ebc433b81878,2024-11-21T01:52:21.817000 -CVE-2013-2786,0,1,f5770f972773db3ac29fc4ae5a834ced437e687edfbe4b2d10600595931776c3,2024-11-21T01:52:21.933000 -CVE-2013-2787,0,1,1a3bbbdbdafbffad72ea097ee2153ebbc237c0d9d9f1167411c4b15da8fbb163,2024-11-21T01:52:22.043000 -CVE-2013-2788,0,1,8c0e235e6334a00e0fd4a22549fb4641e8b57c65a15d739c1e54405788149061,2024-11-21T01:52:22.160000 -CVE-2013-2789,0,1,a77fbcef99368651e15a685afbb27f643bc7815cef33be66312c719d80b6b7b7,2024-11-21T01:52:22.270000 -CVE-2013-2790,0,1,4064e17b83048e071e242c9d71969bab01bf13caede06b61c34ffd1ef2ec3ebc,2024-11-21T01:52:22.400000 -CVE-2013-2791,0,1,1158f0f9e8d852113e49d68276d7b9ae90ab01a945839562d20ce86aabf1ba86,2024-11-21T01:52:22.510000 -CVE-2013-2792,0,1,0aeb2d94c6279ecb6baab673c3f9ac36e65ca47e8d63c5d0ea4ed92880422ef6,2024-11-21T01:52:22.620000 -CVE-2013-2793,0,1,04b278a50f234d24718ef031fe0f92ba7431a892ed548a693a45678da4955ce9,2024-11-21T01:52:22.740000 -CVE-2013-2794,0,1,3dfff0044ae770941a0da28d8acb5995ef533f4a867c0bdb604a628509432388,2024-11-21T01:52:22.857000 +CVE-2013-2776,0,0,8f2c6ab039d1f2f76dee4019b57fcf10618faee620ca853eed582bfe43e9cb87,2024-11-21T01:52:20.597000 +CVE-2013-2777,0,0,2ea7d8c1e1d5be9dc4a173691400b8cdda27d34f558e2775cd8c95ba132e2a2e,2024-11-21T01:52:20.780000 +CVE-2013-2778,0,0,ee3a3828409382a7ae5fd1eb4d6a9616baf8e205b6b179f1f3466590b075fce2,2024-11-21T01:52:20.957000 +CVE-2013-2779,0,0,2751174d587fe962f0966d7c52d38c056bdc2cf3752b3d65c5042280334a4706,2024-11-21T01:52:21.097000 +CVE-2013-2780,0,0,e97c51732bda2f97fc8534b3f1046b5002049dd86409baa5be26d2a48d48da73,2024-11-21T01:52:21.247000 +CVE-2013-2781,0,0,c079cc08bab2c18cfd35f4d45fb9dc160cba526ca2ae3d54cd0549ba1eccd134,2024-11-21T01:52:21.360000 +CVE-2013-2782,0,0,3b36aff2d931792d2f4fd24c60a60432e84c6c46d4f54d8321ecd17e10b0baae,2024-11-21T01:52:21.467000 +CVE-2013-2783,0,0,e1bb375221730da5ba6dd8bc34428e28b5a6df73de9c89b2f97a028d716dadb8,2024-11-21T01:52:21.580000 +CVE-2013-2784,0,0,10ad3bfe0243dc58d648946b3a19a9de2376657340d78837158bc341826113f0,2024-11-21T01:52:21.703000 +CVE-2013-2785,0,0,67622333c8131cd415ac56edcce32596f30d2dd3531b3e737e85ebc433b81878,2024-11-21T01:52:21.817000 +CVE-2013-2786,0,0,f5770f972773db3ac29fc4ae5a834ced437e687edfbe4b2d10600595931776c3,2024-11-21T01:52:21.933000 +CVE-2013-2787,0,0,1a3bbbdbdafbffad72ea097ee2153ebbc237c0d9d9f1167411c4b15da8fbb163,2024-11-21T01:52:22.043000 +CVE-2013-2788,0,0,8c0e235e6334a00e0fd4a22549fb4641e8b57c65a15d739c1e54405788149061,2024-11-21T01:52:22.160000 +CVE-2013-2789,0,0,a77fbcef99368651e15a685afbb27f643bc7815cef33be66312c719d80b6b7b7,2024-11-21T01:52:22.270000 +CVE-2013-2790,0,0,4064e17b83048e071e242c9d71969bab01bf13caede06b61c34ffd1ef2ec3ebc,2024-11-21T01:52:22.400000 +CVE-2013-2791,0,0,1158f0f9e8d852113e49d68276d7b9ae90ab01a945839562d20ce86aabf1ba86,2024-11-21T01:52:22.510000 +CVE-2013-2792,0,0,0aeb2d94c6279ecb6baab673c3f9ac36e65ca47e8d63c5d0ea4ed92880422ef6,2024-11-21T01:52:22.620000 +CVE-2013-2793,0,0,04b278a50f234d24718ef031fe0f92ba7431a892ed548a693a45678da4955ce9,2024-11-21T01:52:22.740000 +CVE-2013-2794,0,0,3dfff0044ae770941a0da28d8acb5995ef533f4a867c0bdb604a628509432388,2024-11-21T01:52:22.857000 CVE-2013-2795,0,0,0fb31a3827e2f012a1ad980297875a060c12b9c02a0135a55ce83f4cf5ffe6f7,2023-11-07T02:15:06.670000 -CVE-2013-2796,0,1,42a511c30900de58f0eec8c63fb95f79e399a5f3915c1e367c311f23b8047d31,2024-11-21T01:52:23.007000 -CVE-2013-2798,0,1,678368202dd88e580cdc2f0a763eccca5671e8e8ef8b2b3d5a8b3ecb3580eb21,2024-11-21T01:52:23.117000 +CVE-2013-2796,0,0,42a511c30900de58f0eec8c63fb95f79e399a5f3915c1e367c311f23b8047d31,2024-11-21T01:52:23.007000 +CVE-2013-2798,0,0,678368202dd88e580cdc2f0a763eccca5671e8e8ef8b2b3d5a8b3ecb3580eb21,2024-11-21T01:52:23.117000 CVE-2013-2799,0,0,53814c65b839ad95f67bd31a69102a7b312bf74332bce98559de2dac2e9de7f4,2023-11-07T02:15:06.900000 -CVE-2013-2800,0,1,229f1aae65e7c56459a7ae18cc4c8b8bf2ddd52a674d4c212c077e6c0b2306d6,2024-11-21T01:52:23.243000 -CVE-2013-2801,0,1,25ebec92f6c7154bcf39ab394ec3cb1f408e65caee004233a05ea93103dae6b6,2024-11-21T01:52:23.347000 -CVE-2013-2802,0,1,ec56dc4df7cadedcc165ae75f1e60bb8725c018fb63f3bb819a6820157110b18,2024-11-21T01:52:23.467000 -CVE-2013-2803,0,1,5dd9466a418cad0803cf3369425c10db063b9c71dfa09492fecb30fb9e612ac8,2024-11-21T01:52:23.583000 -CVE-2013-2804,0,1,1b9ab17cdc42a6247afed4fb620a5132e32e9e2def0fcfb3a8ec25ebfae54875,2024-11-21T01:52:23.697000 +CVE-2013-2800,0,0,229f1aae65e7c56459a7ae18cc4c8b8bf2ddd52a674d4c212c077e6c0b2306d6,2024-11-21T01:52:23.243000 +CVE-2013-2801,0,0,25ebec92f6c7154bcf39ab394ec3cb1f408e65caee004233a05ea93103dae6b6,2024-11-21T01:52:23.347000 +CVE-2013-2802,0,0,ec56dc4df7cadedcc165ae75f1e60bb8725c018fb63f3bb819a6820157110b18,2024-11-21T01:52:23.467000 +CVE-2013-2803,0,0,5dd9466a418cad0803cf3369425c10db063b9c71dfa09492fecb30fb9e612ac8,2024-11-21T01:52:23.583000 +CVE-2013-2804,0,0,1b9ab17cdc42a6247afed4fb620a5132e32e9e2def0fcfb3a8ec25ebfae54875,2024-11-21T01:52:23.697000 CVE-2013-2805,0,0,9067bb8266e0a152ab5a56e5da38df1d7ead3104197e8ca78a0b0fc78cbfc6ed,2020-02-10T21:24:37.467000 CVE-2013-2806,0,0,b3729812868e3b6257d2cabb5370370adb79e60341e0fe4feb466961c7f08a51,2020-02-10T21:24:37.560000 CVE-2013-2807,0,0,ea9d2ad84040ae28293a0478f256b3b71963b5749d4f44458fbf9e4c4ad33683,2020-02-10T21:24:37.640000 -CVE-2013-2808,0,1,06118d80daa0d06381fddae0c313ac93ff32b4f9126e989bfb0db7c629900141,2024-11-21T01:52:24.210000 -CVE-2013-2809,0,1,9e4fce214df997af207d9a86e3c11e5c5846e15f519cdaaf65e12d6f351e4663,2024-11-21T01:52:24.363000 +CVE-2013-2808,0,0,06118d80daa0d06381fddae0c313ac93ff32b4f9126e989bfb0db7c629900141,2024-11-21T01:52:24.210000 +CVE-2013-2809,0,0,9e4fce214df997af207d9a86e3c11e5c5846e15f519cdaaf65e12d6f351e4663,2024-11-21T01:52:24.363000 CVE-2013-2810,0,0,3c974df076a9b2d7cb8f246265a64c25d79aec4fdf4b3a3859a47815e573134e,2017-08-29T01:33:17.277000 -CVE-2013-2811,0,1,ee0454c9b6b8ba85404682319eaec59e69bb1628bd8a18dfd30f443400c082ae,2024-11-21T01:52:24.630000 -CVE-2013-2813,0,1,0fbf53ce0e26e9e4a7825ea8af57a7128f685138c853cca2771e24c587dc7ef3,2024-11-21T01:52:24.753000 -CVE-2013-2814,0,1,e2de7750bdd2ba0a7f7fbb973ed101609f1197634f7013b25b7f6a0cb325d40a,2024-11-21T01:52:24.863000 +CVE-2013-2811,0,0,ee0454c9b6b8ba85404682319eaec59e69bb1628bd8a18dfd30f443400c082ae,2024-11-21T01:52:24.630000 +CVE-2013-2813,0,0,0fbf53ce0e26e9e4a7825ea8af57a7128f685138c853cca2771e24c587dc7ef3,2024-11-21T01:52:24.753000 +CVE-2013-2814,0,0,e2de7750bdd2ba0a7f7fbb973ed101609f1197634f7013b25b7f6a0cb325d40a,2024-11-21T01:52:24.863000 CVE-2013-2815,0,0,8d1df7c641fa55e5fc6b90bd6b7eb6bdc4718aef78f45b1c6da0b727410313ab,2023-11-07T02:15:07.207000 -CVE-2013-2816,0,1,83005220c1393a0cafd3c8889ca46a80cdb90f20d82332da42d3392e3b979fff,2024-11-21T01:52:24.983000 -CVE-2013-2817,0,1,9a88b99b2a9081e5ee444a64996c34af61ee76e88d58429f02782c6ff9dd37b1,2024-11-21T01:52:25.110000 -CVE-2013-2818,0,1,17f99ab1ee6f3349991febb0f004c73ff2a43fde4b459087003c9270f5df17ec,2024-11-21T01:52:25.223000 -CVE-2013-2819,0,1,3baafbdacc6e8d467283f206e6c97f4387d75f03115cfb46c2115fb9c5bb3199,2024-11-21T01:52:25.327000 -CVE-2013-2820,0,1,e7b855cf091e0043835c56b3c661e596b43023e6f93f17decc73a8a7f029cffc,2024-11-21T01:52:25.443000 -CVE-2013-2821,0,1,bbcb62b58321964e3f6900f84592fc578a1f1f2fc4758d99a4ffbb83eaec523f,2024-11-21T01:52:25.560000 -CVE-2013-2822,0,1,898b57c18c63d03274f96ce05716936704f972d85e7029b6bc11a6dab5d7b785,2024-11-21T01:52:25.670000 -CVE-2013-2823,0,1,c6df40e91756e2e24555495485a9b2b467d76f03c459b859656aab261295d1ca,2024-11-21T01:52:25.790000 -CVE-2013-2824,0,1,31114dd04a3e511971febc97b6ca704be18c3ce1e2ddea63c83917983ee73a5c,2024-11-21T01:52:26.750000 -CVE-2013-2825,0,1,a3aa65d70a85d77b93bf30ccc54e847023a7d3b46b60bebae63a08b382ecb0cf,2024-11-21T01:52:26.887000 -CVE-2013-2826,0,1,838483de831848d10430cef725ef2112461d0ca3cf0b0b3b2ea6abf1413349b3,2024-11-21T01:52:26.997000 -CVE-2013-2827,0,1,a86040b3db1e30f5c18e04c8f5b5fb45cdde7b834452a46a7acd1d966365bc86,2024-11-21T01:52:27.100000 -CVE-2013-2828,0,1,d893720892b7cfa046b3413837a45554d1014ebf37711140c6c21396e39e851e,2024-11-21T01:52:27.200000 -CVE-2013-2829,0,1,65f3b1162083c2bd90169a7c04601854c9931cba144e74b2aaab38df0855ba55,2024-11-21T01:52:27.303000 +CVE-2013-2816,0,0,83005220c1393a0cafd3c8889ca46a80cdb90f20d82332da42d3392e3b979fff,2024-11-21T01:52:24.983000 +CVE-2013-2817,0,0,9a88b99b2a9081e5ee444a64996c34af61ee76e88d58429f02782c6ff9dd37b1,2024-11-21T01:52:25.110000 +CVE-2013-2818,0,0,17f99ab1ee6f3349991febb0f004c73ff2a43fde4b459087003c9270f5df17ec,2024-11-21T01:52:25.223000 +CVE-2013-2819,0,0,3baafbdacc6e8d467283f206e6c97f4387d75f03115cfb46c2115fb9c5bb3199,2024-11-21T01:52:25.327000 +CVE-2013-2820,0,0,e7b855cf091e0043835c56b3c661e596b43023e6f93f17decc73a8a7f029cffc,2024-11-21T01:52:25.443000 +CVE-2013-2821,0,0,bbcb62b58321964e3f6900f84592fc578a1f1f2fc4758d99a4ffbb83eaec523f,2024-11-21T01:52:25.560000 +CVE-2013-2822,0,0,898b57c18c63d03274f96ce05716936704f972d85e7029b6bc11a6dab5d7b785,2024-11-21T01:52:25.670000 +CVE-2013-2823,0,0,c6df40e91756e2e24555495485a9b2b467d76f03c459b859656aab261295d1ca,2024-11-21T01:52:25.790000 +CVE-2013-2824,0,0,31114dd04a3e511971febc97b6ca704be18c3ce1e2ddea63c83917983ee73a5c,2024-11-21T01:52:26.750000 +CVE-2013-2825,0,0,a3aa65d70a85d77b93bf30ccc54e847023a7d3b46b60bebae63a08b382ecb0cf,2024-11-21T01:52:26.887000 +CVE-2013-2826,0,0,838483de831848d10430cef725ef2112461d0ca3cf0b0b3b2ea6abf1413349b3,2024-11-21T01:52:26.997000 +CVE-2013-2827,0,0,a86040b3db1e30f5c18e04c8f5b5fb45cdde7b834452a46a7acd1d966365bc86,2024-11-21T01:52:27.100000 +CVE-2013-2828,0,0,d893720892b7cfa046b3413837a45554d1014ebf37711140c6c21396e39e851e,2024-11-21T01:52:27.200000 +CVE-2013-2829,0,0,65f3b1162083c2bd90169a7c04601854c9931cba144e74b2aaab38df0855ba55,2024-11-21T01:52:27.303000 CVE-2013-2830,0,0,6536b0abc5d39ce96d92248ca313c157afb40d69dd283cd50bc4cbf87fdc7e6b,2020-03-11T15:37:21.677000 -CVE-2013-2832,0,1,cc38b0fb67c519422023f4b460c7ddf33bd948d72ac0a90e765ce4e06cf5d6e4,2024-11-21T01:52:27.577000 -CVE-2013-2833,0,1,3d6bb48ea22316a1dc6c4d2a1622b436824ae5919123f8a227bdc6c9716734b4,2024-11-21T01:52:27.700000 -CVE-2013-2834,0,1,971a60f58668c2f0b8aacdd73fa0877b14691cbb35468de6e7c004510e82db10,2024-11-21T01:52:27.830000 -CVE-2013-2835,0,1,3de71b173cff835f7d0a51d206ff4781c382d8e1973160b7ed19437362ec7db2,2024-11-21T01:52:27.953000 -CVE-2013-2836,0,1,9705c52a67f4cf09f361e038f7bb78b9a26e63f8028a48c89915813a503351a7,2024-11-21T01:52:28.087000 -CVE-2013-2837,0,1,9d9429b6cfad8cdd3bbbed658ab858b448b63c4a7119b92230003809da6dd5e8,2024-11-21T01:52:28.247000 -CVE-2013-2838,0,1,77c54f44bced166bf28677512862bc4d310b4d288e6840e8a30a7d2e28543d9a,2024-11-21T01:52:28.370000 -CVE-2013-2839,0,1,d1c0c3be9b9c8d116e013516c26e0cc75f42ff255f6eb10c4e24e2ba3056c067,2024-11-21T01:52:28.500000 -CVE-2013-2840,0,1,666992a81ade4fbb5645b5dc77de7ad6d376ae0ebb54bab5a72436c7d4ffaab9,2024-11-21T01:52:28.627000 -CVE-2013-2841,0,1,42b82bb9f3ebac8d502305c0f879e9c1b322e0713c5428430c05fa1db0cf607e,2024-11-21T01:52:28.747000 -CVE-2013-2842,0,1,5aaddb8c5c36106403135c2defc79e13fe90bcc568c55d96cc866b97ea94696d,2024-11-21T01:52:28.873000 -CVE-2013-2843,0,1,498aa7e494f67d2f76c9e8b4f963c4f039fd2b6613be62e0a9778c9d3c17f2ba,2024-11-21T01:52:29.020000 -CVE-2013-2844,0,1,8f026ca590b24097933e1c056557c5066f33664187be12b860b7b078cf836486,2024-11-21T01:52:29.147000 -CVE-2013-2845,0,1,17fec435acd2d5e3ae80993e955a4f1d90e442d20416b7d4d0e22be221491ddd,2024-11-21T01:52:29.270000 -CVE-2013-2846,0,1,fce9902defe3ec9d1af54a2793e19827bc3799420b43b7475d6e66bb45e1e54e,2024-11-21T01:52:29.410000 -CVE-2013-2847,0,1,3188c665c432f75a2fa0d3d0912eb066252c994fdc03204bef9d503782ca46f4,2024-11-21T01:52:29.533000 -CVE-2013-2848,0,1,9c12294e877b0b0db8f3e704422cd00e4350c0a02638db005b252bb5aa49671e,2024-11-21T01:52:29.660000 -CVE-2013-2849,0,1,f87c888dce385edd77a9e9f05edefac9049bbbdb526571fb96f2613fa9f16222,2024-11-21T01:52:29.797000 -CVE-2013-2850,0,1,1f8e36fc8ab4c9614d62de9b3074450a08e0cc06437e084c4b27bfb4882e1813,2024-11-21T01:52:29.930000 -CVE-2013-2851,0,1,32c944310fdbd2e5d2740e23c9fb6facc67cbcb33d714324ab885da676d2b951,2024-11-21T01:52:30.053000 -CVE-2013-2852,0,1,41897d1fa18582bccf121de3b8e1976585d8942f313fab0e57917d87536d09b6,2024-11-21T01:52:30.243000 -CVE-2013-2853,0,1,52cbeadc13a969cb8920f763cf19e295f44c13782151823a0552549c221e5f6f,2024-11-21T01:52:30.417000 -CVE-2013-2854,0,1,82d924bae8fd6850ff7407ba21f05e5a39d5f2625801466ec2fe76ea39740e0a,2024-11-21T01:52:30.590000 -CVE-2013-2855,0,1,aaf81cd1df039d8d7e7c53d7595e0479ee507f269e613d110b009a75894030d4,2024-11-21T01:52:30.753000 -CVE-2013-2856,0,1,345e2155425d7731a63c99b1a4d3dc1f1dd6d1c87bca6845d465d73a61174277,2024-11-21T01:52:30.893000 -CVE-2013-2857,0,1,55b3bbd8bf8a9bb3f52d9084704c787c1c1f806ddb1396620d8ad493102e96a6,2024-11-21T01:52:31.053000 -CVE-2013-2858,0,1,41f8f32b2fe9587350870db4091355346af76d55f5e384c597c019585b45ea3a,2024-11-21T01:52:31.193000 -CVE-2013-2859,0,1,5a9f737e3d469fa5b092420a680c58ba4fd1c3e4e8add05b7e92c2b8564cfbf7,2024-11-21T01:52:31.330000 -CVE-2013-2860,0,1,8e4cb4534b7abe371b34849caca8663dbbb6e627058494a2d58e003c356e02e2,2024-11-21T01:52:31.460000 -CVE-2013-2861,0,1,2367a3d942eab4abb33bb1cf94cbc26b4045a8920c26efdccee8d18f05a2b8a0,2024-11-21T01:52:31.597000 -CVE-2013-2862,0,1,64fca9c084fa1ecfd7581dcf571209c615f59a1ce6a3512de32c120b977ba313,2024-11-21T01:52:31.753000 -CVE-2013-2863,0,1,a57de0084f013d2d18a9530aa99c03bbe42f3e6a5f671af993a61858f47887e7,2024-11-21T01:52:31.910000 -CVE-2013-2864,0,1,68c76ed3bdf2919213741678f8090d4b49e127dcf3c7432032258e2c917a9794,2024-11-21T01:52:32.063000 -CVE-2013-2865,0,1,d01b069f1b7893e7eed2b0e2c66503de53cf21bd2225d00208da50f62da9e0e4,2024-11-21T01:52:32.210000 -CVE-2013-2866,0,1,84f39f228dc8ad112aeddcc8ec312e5872770d4f2dc78c0a6005a6bbf280617e,2024-11-21T01:52:32.377000 -CVE-2013-2867,0,1,2c0cfd1e2e560b9d4e746edfab348a39ab2cd853b70b879ef2f74d2a91fdbbbc,2024-11-21T01:52:32.527000 -CVE-2013-2868,0,1,176862fee59b0d99a1c08ca0754d95727fb56b91b8682e315f998124b9b2b7bc,2024-11-21T01:52:32.673000 -CVE-2013-2869,0,1,2d19b019b280774bbb5650487940f28ac190f1399348680a3948d25946b16fc7,2024-11-21T01:52:32.823000 -CVE-2013-2870,0,1,75fa862b586e42f4b1c034b05f78bb4c6620d9f97e1fdc60407ba46c7c647f94,2024-11-21T01:52:32.960000 -CVE-2013-2871,0,1,a273e7aadc80dda98c02e13b05f1177ef851127eeebbba4e225190b208d843fa,2024-11-21T01:52:33.103000 -CVE-2013-2872,0,1,511be75541e9c71cdff75daf34d68aeea43d2fd63d976f72091b959334188c05,2024-11-21T01:52:33.257000 -CVE-2013-2873,0,1,8aaff55d2201e4d6ffecb72b4d2f37b8feaea58c92ce5e29e3dd56d91c3cca07,2024-11-21T01:52:33.410000 -CVE-2013-2874,0,1,e202d794b5007f41fd1af1a07ed6bf55f9cc17e456d6ada27a014921fa68d191,2024-11-21T01:52:33.547000 -CVE-2013-2875,0,1,5c7b0295871cfcf5c83a5a3790d56fdac1d1fd57786b83f395846c90599fbb30,2024-11-21T01:52:33.693000 -CVE-2013-2876,0,1,f1da9fbfa6c287841554c10c56f42f97033f4f87114cb4f40a7be6dc91d25bcb,2024-11-21T01:52:33.860000 -CVE-2013-2877,0,1,560fe6ef8f0b8b321cfa72a830f1bbce16811405e07f904d389877292874f36e,2024-11-21T01:52:34 -CVE-2013-2878,0,1,854d36efd2aa278ac303498d956c752457298064ec4f525c8250b9a1efcbf4ce,2024-11-21T01:52:34.180000 -CVE-2013-2879,0,1,ee858b2525c2910ebbea371d269f4afa054c9e8beb1d187197c7d1c817f7d56d,2024-11-21T01:52:34.320000 -CVE-2013-2880,0,1,f9054dc6eaf70bfff7dda6a58770fd30c73bef44e67b47b868d2e0206675fd24,2024-11-21T01:52:34.483000 -CVE-2013-2881,0,1,c7dc51d83b4ee68fb4f9b8729c0ad2b2259077df5ef32f8c88b41f96fcf6ab2a,2024-11-21T01:52:34.660000 -CVE-2013-2882,0,1,3ce71f8e2a78765bc5054919200de3b6a6bf2e30c9fc7062ef2b054dd27c397c,2024-11-21T01:52:34.817000 -CVE-2013-2883,0,1,38af0d2376a9225d1b71b3f6a69c80ad610f701739aa11656b6d595c62cdc67f,2024-11-21T01:52:34.967000 -CVE-2013-2884,0,1,8753b134647f5b45d433bdedd1220e76e4b61948ce697e690bb58d480daa2a69,2024-11-21T01:52:35.120000 -CVE-2013-2885,0,1,76c96ec296d919ca14d8c237d1d51b2fabbe943fa9f11d657690090f7d2b702a,2024-11-21T01:52:35.250000 -CVE-2013-2886,0,1,3aece44d438f64276835f4a1837799b2b12815f6340533e0128a344862aa2f2d,2024-11-21T01:52:35.423000 -CVE-2013-2887,0,1,708fa71d6bb99041da8a227c7fa616469b8c0bcfa060f74c818ba8176685f868,2024-11-21T01:52:35.577000 -CVE-2013-2888,0,1,39119c1fb6c5fdc472aae83efa7a7ae97872c9ac16b0dbf669c14fbe708a1d4c,2024-11-21T01:52:35.730000 -CVE-2013-2889,0,1,cfedfa1a732b1c673e6bc047e9566a6741784431ff6a27b374f97faab80d7acf,2024-11-21T01:52:35.893000 -CVE-2013-2890,0,1,e915e90713986d13e1932ef1ac581147961af94ad1ea67ef62d8941d689a6db8,2024-11-21T01:52:36.053000 -CVE-2013-2891,0,1,e7db48ccfdef7a90d162c48d0d6e8c88af5c55e7667dd2f91b13cf52553f9420,2024-11-21T01:52:36.200000 -CVE-2013-2892,0,1,c883b67d2e23006417e7b69c375ee1594a9787fb46915166b9fcb572d17c52e3,2024-11-21T01:52:36.343000 -CVE-2013-2893,0,1,2861b7ab890817c23ea88b0e559486184e9e38a2f122b77cab82cc0198ca126f,2024-11-21T01:52:36.507000 -CVE-2013-2894,0,1,6e5faf634bbe882c60e2bf4a2d55db3be89ead2c71db47a67d9988351c38198f,2024-11-21T01:52:36.667000 -CVE-2013-2895,0,1,88c21abf94c159a6309aa8997a2d7ff947e430b64cd37f4a672c46621a275cbe,2024-11-21T01:52:36.823000 -CVE-2013-2896,0,1,d7ccb750eee3afd7c7debdb9d6960a5d40f70b31caf7e409c1c2ff85f7fa1b27,2024-11-21T01:52:36.983000 -CVE-2013-2897,0,1,d761a3e769dc25ab8aee7a1c8e43242c105ec8ad25cac11c6d39059460bc1ce0,2024-11-21T01:52:37.137000 -CVE-2013-2898,0,1,0000146c3c2a36c1e7daacfe4629cf49093edc602485a7a964fa9d71f67e25a4,2024-11-21T01:52:37.293000 -CVE-2013-2899,0,1,66f49668ad0ffaee1810928ce6adb0d26413a524dc9902653781e06b8f8029af,2024-11-21T01:52:37.450000 -CVE-2013-2900,0,1,eae0046c84280ec96804685cc8eb8758232466fe3df99d6fda3a362b02162c7a,2024-11-21T01:52:37.623000 -CVE-2013-2901,0,1,841f90eaf1e635f29676564ec60a7fb3e76eed2588d34e79b89016a6ad6bf48a,2024-11-21T01:52:37.750000 -CVE-2013-2902,0,1,130a6094ad2504ae1e48d244bed0436775695a4c53e8e445d3a43788f0c9281a,2024-11-21T01:52:37.887000 -CVE-2013-2903,0,1,844fa1b7106da9d547c8efba7546d749ee1b4b35fd0a1328a3a1bc48a812f3ac,2024-11-21T01:52:38.010000 -CVE-2013-2904,0,1,b447734dd6794473010285ab3b1942beaf0903d3f870045f21475cec70c1d5b0,2024-11-21T01:52:38.133000 -CVE-2013-2905,0,1,161d5ed9b7362504a8124438c3cecebd5a355af34b1d82c9dc32be30143fe53e,2024-11-21T01:52:38.263000 -CVE-2013-2906,0,1,68251ee36f7271b6599fe0bcbfbcfc9ade9b8e715edab8236bd1173a65844de1,2024-11-21T01:52:38.393000 -CVE-2013-2907,0,1,282c2af0e7bdb8902f0165b1b4960c96e4473d0a71158076235e4d5019e1a869,2024-11-21T01:52:38.530000 -CVE-2013-2908,0,1,645f9cc72c1ee876495fa2623f4a64073f33e9a52ee72f9d42695c9ec06629e1,2024-11-21T01:52:38.660000 -CVE-2013-2909,0,1,be58dbeec912f59bab58221e7e4fd8ada287ef7be09c39cfba58361f849ca785,2024-11-21T01:52:38.787000 -CVE-2013-2910,0,1,8073dbe512d70f3369a0cd837ba1f426160ae3b8f62cec3845af32bd50b97a98,2024-11-21T01:52:38.933000 -CVE-2013-2911,0,1,df617e9068c39481f305a548986991aacc2b1e51f48b7858272722aaad8c48e8,2024-11-21T01:52:39.077000 -CVE-2013-2912,0,1,59d55e8183f91f7cb4398dd44e13e1aef1be9c97fe1dbc5f7505d48b5ef32f47,2024-11-21T01:52:39.207000 -CVE-2013-2913,0,1,5d05cbfa3708c6cb92f452a1f7d1a2754589861c1bdc2c023888215f35f93eb0,2024-11-21T01:52:39.340000 -CVE-2013-2914,0,1,bd14585cd7c57f7f17bcfddc562e6c2820c7fbaa28cf1b8540adad36702867d8,2024-11-21T01:52:39.470000 -CVE-2013-2915,0,1,c1a02f92b9a490448cab45fea05f54bcd932d48715358e8715620a2da0da09ba,2024-11-21T01:52:39.597000 -CVE-2013-2916,0,1,4005dd640a8e62e054482cc5a4bd2413e77bc1f89f4586b5d5e8669f016e8811,2024-11-21T01:52:39.723000 -CVE-2013-2917,0,1,0ca712f6cb8576904cbb630ed87bc412c8434670f42a02542469c8f461afb3a2,2024-11-21T01:52:39.860000 -CVE-2013-2918,0,1,b6ebc87bf037a839168b97822288b823e270ea68c1e5b4266b8863b22aa6eb2c,2024-11-21T01:52:39.993000 -CVE-2013-2919,0,1,089c38692f2ca8ea37478c1158e9ee574ea6492ff1a5a4a46adc6d43db0fbdec,2024-11-21T01:52:40.120000 -CVE-2013-2920,0,1,b11d3696157bce083bb7b0e7af65266ae5aa619a1aad4ae8eaed9e632693cf41,2024-11-21T01:52:40.267000 -CVE-2013-2921,0,1,18c5f040277ec0d7b35844f0a4fda33c91a2e4dc718219ef66ce71bc4f495e3a,2024-11-21T01:52:40.410000 -CVE-2013-2922,0,1,8cde20a54b45240a704aa2295e72a286aecbc6ba469eeda4b0d158091660bdca,2024-11-21T01:52:40.573000 -CVE-2013-2923,0,1,d8278f896d181efbace758054cd314213850ab52f2eecf6deace25c5d4f84075,2024-11-21T01:52:40.730000 -CVE-2013-2924,0,1,e5016eb4a96ce93297c651eb1226a6622c025d4c16dd7591f0b9826d090ee897,2024-11-21T01:52:40.877000 -CVE-2013-2925,0,1,eaafece4764373f55a4dd9ae91ceaafebeb38e5027ad589cdf2fa55185e23f9b,2024-11-21T01:52:41.010000 -CVE-2013-2926,0,1,97a78b75311b8933637870593d5cf7c8f15b965715049b59248a93902859e4f2,2024-11-21T01:52:41.147000 -CVE-2013-2927,0,1,9ad35d12a0d6c57ef85bc74df624b2fef6e2494ecf30bae96fa705c25a91d77c,2024-11-21T01:52:41.280000 -CVE-2013-2928,0,1,b4e0c8e2dbf219f561030cb62d89e4319e783154acadc03f8a339d0043e5614c,2024-11-21T01:52:41.420000 -CVE-2013-2929,0,1,16c25dfb38c8f08bf22f97f2f3548ae47b731ad8b4094721837d9c0d15a68583,2024-11-21T01:52:41.570000 -CVE-2013-2930,0,1,e5762bca46f00a0d1dcb16d2d6876cb8efe14a652940037465b50f3858ba07f3,2024-11-21T01:52:42.440000 -CVE-2013-2931,0,1,25c099410b680b2998eeb54db165b132fddb5e92d0e13a9a9e6879a6be68d917,2024-11-21T01:52:42.900000 -CVE-2013-2933,0,1,f4922e47e09f44a5d1df94b8f4025e07965a0478afac15ec6b7e6eaadd7a2b4e,2024-11-21T01:52:43.050000 -CVE-2013-2934,0,1,af96547981a8c5a7bb42ea3d5b28e919af95e9e69f1511bb78a81abc7a4b1b01,2024-11-21T01:52:43.193000 -CVE-2013-2935,0,1,9a21c5f256cafffda546140f9e5ddd6d43dca44442a0aee29314c5dda8b2c85c,2024-11-21T01:52:43.327000 -CVE-2013-2936,0,1,fe4a7d205e15bf6dd887c5b8cc4517005ba90dda312dae374910f8de2f9dfeac,2024-11-21T01:52:43.467000 -CVE-2013-2937,0,1,8c612120c9d1ef8e1a23cea196d8ffac7c7c2a6998a4e39e8862b3526bcd2644,2024-11-21T01:52:43.600000 -CVE-2013-2938,0,1,ac725a1113f47328c3424d2b968f59aa07b835ef0755a7a36c117f396dfa5f19,2024-11-21T01:52:43.737000 -CVE-2013-2939,0,1,2e3d1f00b056311bd451b127309193994c06ee85c15fcff7d46dba08d6598a4e,2024-11-21T01:52:43.870000 -CVE-2013-2940,0,1,cd10b2eec93454a924e2180ef21e698e93698dbe69b7eeeb2ac1b577600928d0,2024-11-21T01:52:44.013000 -CVE-2013-2944,0,1,ed694d08a47d3b04bc51b3b4503a843b230428080acbdff7cf058e99ff950cb8,2024-11-21T01:52:44.157000 -CVE-2013-2945,0,1,1c9cd040dbee6511b74c2508683df7b73623359e38a21d277a71114e65806366,2024-11-21T01:52:44.310000 -CVE-2013-2950,0,1,fa86ffff44989b222b31c673b49607a1c9843a244ea5dc0807d8466fb0696f04,2024-11-21T01:52:44.463000 +CVE-2013-2832,0,0,cc38b0fb67c519422023f4b460c7ddf33bd948d72ac0a90e765ce4e06cf5d6e4,2024-11-21T01:52:27.577000 +CVE-2013-2833,0,0,3d6bb48ea22316a1dc6c4d2a1622b436824ae5919123f8a227bdc6c9716734b4,2024-11-21T01:52:27.700000 +CVE-2013-2834,0,0,971a60f58668c2f0b8aacdd73fa0877b14691cbb35468de6e7c004510e82db10,2024-11-21T01:52:27.830000 +CVE-2013-2835,0,0,3de71b173cff835f7d0a51d206ff4781c382d8e1973160b7ed19437362ec7db2,2024-11-21T01:52:27.953000 +CVE-2013-2836,0,0,9705c52a67f4cf09f361e038f7bb78b9a26e63f8028a48c89915813a503351a7,2024-11-21T01:52:28.087000 +CVE-2013-2837,0,0,9d9429b6cfad8cdd3bbbed658ab858b448b63c4a7119b92230003809da6dd5e8,2024-11-21T01:52:28.247000 +CVE-2013-2838,0,0,77c54f44bced166bf28677512862bc4d310b4d288e6840e8a30a7d2e28543d9a,2024-11-21T01:52:28.370000 +CVE-2013-2839,0,0,d1c0c3be9b9c8d116e013516c26e0cc75f42ff255f6eb10c4e24e2ba3056c067,2024-11-21T01:52:28.500000 +CVE-2013-2840,0,0,666992a81ade4fbb5645b5dc77de7ad6d376ae0ebb54bab5a72436c7d4ffaab9,2024-11-21T01:52:28.627000 +CVE-2013-2841,0,0,42b82bb9f3ebac8d502305c0f879e9c1b322e0713c5428430c05fa1db0cf607e,2024-11-21T01:52:28.747000 +CVE-2013-2842,0,0,5aaddb8c5c36106403135c2defc79e13fe90bcc568c55d96cc866b97ea94696d,2024-11-21T01:52:28.873000 +CVE-2013-2843,0,0,498aa7e494f67d2f76c9e8b4f963c4f039fd2b6613be62e0a9778c9d3c17f2ba,2024-11-21T01:52:29.020000 +CVE-2013-2844,0,0,8f026ca590b24097933e1c056557c5066f33664187be12b860b7b078cf836486,2024-11-21T01:52:29.147000 +CVE-2013-2845,0,0,17fec435acd2d5e3ae80993e955a4f1d90e442d20416b7d4d0e22be221491ddd,2024-11-21T01:52:29.270000 +CVE-2013-2846,0,0,fce9902defe3ec9d1af54a2793e19827bc3799420b43b7475d6e66bb45e1e54e,2024-11-21T01:52:29.410000 +CVE-2013-2847,0,0,3188c665c432f75a2fa0d3d0912eb066252c994fdc03204bef9d503782ca46f4,2024-11-21T01:52:29.533000 +CVE-2013-2848,0,0,9c12294e877b0b0db8f3e704422cd00e4350c0a02638db005b252bb5aa49671e,2024-11-21T01:52:29.660000 +CVE-2013-2849,0,0,f87c888dce385edd77a9e9f05edefac9049bbbdb526571fb96f2613fa9f16222,2024-11-21T01:52:29.797000 +CVE-2013-2850,0,0,1f8e36fc8ab4c9614d62de9b3074450a08e0cc06437e084c4b27bfb4882e1813,2024-11-21T01:52:29.930000 +CVE-2013-2851,0,0,32c944310fdbd2e5d2740e23c9fb6facc67cbcb33d714324ab885da676d2b951,2024-11-21T01:52:30.053000 +CVE-2013-2852,0,0,41897d1fa18582bccf121de3b8e1976585d8942f313fab0e57917d87536d09b6,2024-11-21T01:52:30.243000 +CVE-2013-2853,0,0,52cbeadc13a969cb8920f763cf19e295f44c13782151823a0552549c221e5f6f,2024-11-21T01:52:30.417000 +CVE-2013-2854,0,0,82d924bae8fd6850ff7407ba21f05e5a39d5f2625801466ec2fe76ea39740e0a,2024-11-21T01:52:30.590000 +CVE-2013-2855,0,0,aaf81cd1df039d8d7e7c53d7595e0479ee507f269e613d110b009a75894030d4,2024-11-21T01:52:30.753000 +CVE-2013-2856,0,0,345e2155425d7731a63c99b1a4d3dc1f1dd6d1c87bca6845d465d73a61174277,2024-11-21T01:52:30.893000 +CVE-2013-2857,0,0,55b3bbd8bf8a9bb3f52d9084704c787c1c1f806ddb1396620d8ad493102e96a6,2024-11-21T01:52:31.053000 +CVE-2013-2858,0,0,41f8f32b2fe9587350870db4091355346af76d55f5e384c597c019585b45ea3a,2024-11-21T01:52:31.193000 +CVE-2013-2859,0,0,5a9f737e3d469fa5b092420a680c58ba4fd1c3e4e8add05b7e92c2b8564cfbf7,2024-11-21T01:52:31.330000 +CVE-2013-2860,0,0,8e4cb4534b7abe371b34849caca8663dbbb6e627058494a2d58e003c356e02e2,2024-11-21T01:52:31.460000 +CVE-2013-2861,0,0,2367a3d942eab4abb33bb1cf94cbc26b4045a8920c26efdccee8d18f05a2b8a0,2024-11-21T01:52:31.597000 +CVE-2013-2862,0,0,64fca9c084fa1ecfd7581dcf571209c615f59a1ce6a3512de32c120b977ba313,2024-11-21T01:52:31.753000 +CVE-2013-2863,0,0,a57de0084f013d2d18a9530aa99c03bbe42f3e6a5f671af993a61858f47887e7,2024-11-21T01:52:31.910000 +CVE-2013-2864,0,0,68c76ed3bdf2919213741678f8090d4b49e127dcf3c7432032258e2c917a9794,2024-11-21T01:52:32.063000 +CVE-2013-2865,0,0,d01b069f1b7893e7eed2b0e2c66503de53cf21bd2225d00208da50f62da9e0e4,2024-11-21T01:52:32.210000 +CVE-2013-2866,0,0,84f39f228dc8ad112aeddcc8ec312e5872770d4f2dc78c0a6005a6bbf280617e,2024-11-21T01:52:32.377000 +CVE-2013-2867,0,0,2c0cfd1e2e560b9d4e746edfab348a39ab2cd853b70b879ef2f74d2a91fdbbbc,2024-11-21T01:52:32.527000 +CVE-2013-2868,0,0,176862fee59b0d99a1c08ca0754d95727fb56b91b8682e315f998124b9b2b7bc,2024-11-21T01:52:32.673000 +CVE-2013-2869,0,0,2d19b019b280774bbb5650487940f28ac190f1399348680a3948d25946b16fc7,2024-11-21T01:52:32.823000 +CVE-2013-2870,0,0,75fa862b586e42f4b1c034b05f78bb4c6620d9f97e1fdc60407ba46c7c647f94,2024-11-21T01:52:32.960000 +CVE-2013-2871,0,0,a273e7aadc80dda98c02e13b05f1177ef851127eeebbba4e225190b208d843fa,2024-11-21T01:52:33.103000 +CVE-2013-2872,0,0,511be75541e9c71cdff75daf34d68aeea43d2fd63d976f72091b959334188c05,2024-11-21T01:52:33.257000 +CVE-2013-2873,0,0,8aaff55d2201e4d6ffecb72b4d2f37b8feaea58c92ce5e29e3dd56d91c3cca07,2024-11-21T01:52:33.410000 +CVE-2013-2874,0,0,e202d794b5007f41fd1af1a07ed6bf55f9cc17e456d6ada27a014921fa68d191,2024-11-21T01:52:33.547000 +CVE-2013-2875,0,0,5c7b0295871cfcf5c83a5a3790d56fdac1d1fd57786b83f395846c90599fbb30,2024-11-21T01:52:33.693000 +CVE-2013-2876,0,0,f1da9fbfa6c287841554c10c56f42f97033f4f87114cb4f40a7be6dc91d25bcb,2024-11-21T01:52:33.860000 +CVE-2013-2877,0,0,560fe6ef8f0b8b321cfa72a830f1bbce16811405e07f904d389877292874f36e,2024-11-21T01:52:34 +CVE-2013-2878,0,0,854d36efd2aa278ac303498d956c752457298064ec4f525c8250b9a1efcbf4ce,2024-11-21T01:52:34.180000 +CVE-2013-2879,0,0,ee858b2525c2910ebbea371d269f4afa054c9e8beb1d187197c7d1c817f7d56d,2024-11-21T01:52:34.320000 +CVE-2013-2880,0,0,f9054dc6eaf70bfff7dda6a58770fd30c73bef44e67b47b868d2e0206675fd24,2024-11-21T01:52:34.483000 +CVE-2013-2881,0,0,c7dc51d83b4ee68fb4f9b8729c0ad2b2259077df5ef32f8c88b41f96fcf6ab2a,2024-11-21T01:52:34.660000 +CVE-2013-2882,0,0,3ce71f8e2a78765bc5054919200de3b6a6bf2e30c9fc7062ef2b054dd27c397c,2024-11-21T01:52:34.817000 +CVE-2013-2883,0,0,38af0d2376a9225d1b71b3f6a69c80ad610f701739aa11656b6d595c62cdc67f,2024-11-21T01:52:34.967000 +CVE-2013-2884,0,0,8753b134647f5b45d433bdedd1220e76e4b61948ce697e690bb58d480daa2a69,2024-11-21T01:52:35.120000 +CVE-2013-2885,0,0,76c96ec296d919ca14d8c237d1d51b2fabbe943fa9f11d657690090f7d2b702a,2024-11-21T01:52:35.250000 +CVE-2013-2886,0,0,3aece44d438f64276835f4a1837799b2b12815f6340533e0128a344862aa2f2d,2024-11-21T01:52:35.423000 +CVE-2013-2887,0,0,708fa71d6bb99041da8a227c7fa616469b8c0bcfa060f74c818ba8176685f868,2024-11-21T01:52:35.577000 +CVE-2013-2888,0,0,39119c1fb6c5fdc472aae83efa7a7ae97872c9ac16b0dbf669c14fbe708a1d4c,2024-11-21T01:52:35.730000 +CVE-2013-2889,0,0,cfedfa1a732b1c673e6bc047e9566a6741784431ff6a27b374f97faab80d7acf,2024-11-21T01:52:35.893000 +CVE-2013-2890,0,0,e915e90713986d13e1932ef1ac581147961af94ad1ea67ef62d8941d689a6db8,2024-11-21T01:52:36.053000 +CVE-2013-2891,0,0,e7db48ccfdef7a90d162c48d0d6e8c88af5c55e7667dd2f91b13cf52553f9420,2024-11-21T01:52:36.200000 +CVE-2013-2892,0,0,c883b67d2e23006417e7b69c375ee1594a9787fb46915166b9fcb572d17c52e3,2024-11-21T01:52:36.343000 +CVE-2013-2893,0,0,2861b7ab890817c23ea88b0e559486184e9e38a2f122b77cab82cc0198ca126f,2024-11-21T01:52:36.507000 +CVE-2013-2894,0,0,6e5faf634bbe882c60e2bf4a2d55db3be89ead2c71db47a67d9988351c38198f,2024-11-21T01:52:36.667000 +CVE-2013-2895,0,0,88c21abf94c159a6309aa8997a2d7ff947e430b64cd37f4a672c46621a275cbe,2024-11-21T01:52:36.823000 +CVE-2013-2896,0,0,d7ccb750eee3afd7c7debdb9d6960a5d40f70b31caf7e409c1c2ff85f7fa1b27,2024-11-21T01:52:36.983000 +CVE-2013-2897,0,0,d761a3e769dc25ab8aee7a1c8e43242c105ec8ad25cac11c6d39059460bc1ce0,2024-11-21T01:52:37.137000 +CVE-2013-2898,0,0,0000146c3c2a36c1e7daacfe4629cf49093edc602485a7a964fa9d71f67e25a4,2024-11-21T01:52:37.293000 +CVE-2013-2899,0,0,66f49668ad0ffaee1810928ce6adb0d26413a524dc9902653781e06b8f8029af,2024-11-21T01:52:37.450000 +CVE-2013-2900,0,0,eae0046c84280ec96804685cc8eb8758232466fe3df99d6fda3a362b02162c7a,2024-11-21T01:52:37.623000 +CVE-2013-2901,0,0,841f90eaf1e635f29676564ec60a7fb3e76eed2588d34e79b89016a6ad6bf48a,2024-11-21T01:52:37.750000 +CVE-2013-2902,0,0,130a6094ad2504ae1e48d244bed0436775695a4c53e8e445d3a43788f0c9281a,2024-11-21T01:52:37.887000 +CVE-2013-2903,0,0,844fa1b7106da9d547c8efba7546d749ee1b4b35fd0a1328a3a1bc48a812f3ac,2024-11-21T01:52:38.010000 +CVE-2013-2904,0,0,b447734dd6794473010285ab3b1942beaf0903d3f870045f21475cec70c1d5b0,2024-11-21T01:52:38.133000 +CVE-2013-2905,0,0,161d5ed9b7362504a8124438c3cecebd5a355af34b1d82c9dc32be30143fe53e,2024-11-21T01:52:38.263000 +CVE-2013-2906,0,0,68251ee36f7271b6599fe0bcbfbcfc9ade9b8e715edab8236bd1173a65844de1,2024-11-21T01:52:38.393000 +CVE-2013-2907,0,0,282c2af0e7bdb8902f0165b1b4960c96e4473d0a71158076235e4d5019e1a869,2024-11-21T01:52:38.530000 +CVE-2013-2908,0,0,645f9cc72c1ee876495fa2623f4a64073f33e9a52ee72f9d42695c9ec06629e1,2024-11-21T01:52:38.660000 +CVE-2013-2909,0,0,be58dbeec912f59bab58221e7e4fd8ada287ef7be09c39cfba58361f849ca785,2024-11-21T01:52:38.787000 +CVE-2013-2910,0,0,8073dbe512d70f3369a0cd837ba1f426160ae3b8f62cec3845af32bd50b97a98,2024-11-21T01:52:38.933000 +CVE-2013-2911,0,0,df617e9068c39481f305a548986991aacc2b1e51f48b7858272722aaad8c48e8,2024-11-21T01:52:39.077000 +CVE-2013-2912,0,0,59d55e8183f91f7cb4398dd44e13e1aef1be9c97fe1dbc5f7505d48b5ef32f47,2024-11-21T01:52:39.207000 +CVE-2013-2913,0,0,5d05cbfa3708c6cb92f452a1f7d1a2754589861c1bdc2c023888215f35f93eb0,2024-11-21T01:52:39.340000 +CVE-2013-2914,0,0,bd14585cd7c57f7f17bcfddc562e6c2820c7fbaa28cf1b8540adad36702867d8,2024-11-21T01:52:39.470000 +CVE-2013-2915,0,0,c1a02f92b9a490448cab45fea05f54bcd932d48715358e8715620a2da0da09ba,2024-11-21T01:52:39.597000 +CVE-2013-2916,0,0,4005dd640a8e62e054482cc5a4bd2413e77bc1f89f4586b5d5e8669f016e8811,2024-11-21T01:52:39.723000 +CVE-2013-2917,0,0,0ca712f6cb8576904cbb630ed87bc412c8434670f42a02542469c8f461afb3a2,2024-11-21T01:52:39.860000 +CVE-2013-2918,0,0,b6ebc87bf037a839168b97822288b823e270ea68c1e5b4266b8863b22aa6eb2c,2024-11-21T01:52:39.993000 +CVE-2013-2919,0,0,089c38692f2ca8ea37478c1158e9ee574ea6492ff1a5a4a46adc6d43db0fbdec,2024-11-21T01:52:40.120000 +CVE-2013-2920,0,0,b11d3696157bce083bb7b0e7af65266ae5aa619a1aad4ae8eaed9e632693cf41,2024-11-21T01:52:40.267000 +CVE-2013-2921,0,0,18c5f040277ec0d7b35844f0a4fda33c91a2e4dc718219ef66ce71bc4f495e3a,2024-11-21T01:52:40.410000 +CVE-2013-2922,0,0,8cde20a54b45240a704aa2295e72a286aecbc6ba469eeda4b0d158091660bdca,2024-11-21T01:52:40.573000 +CVE-2013-2923,0,0,d8278f896d181efbace758054cd314213850ab52f2eecf6deace25c5d4f84075,2024-11-21T01:52:40.730000 +CVE-2013-2924,0,0,e5016eb4a96ce93297c651eb1226a6622c025d4c16dd7591f0b9826d090ee897,2024-11-21T01:52:40.877000 +CVE-2013-2925,0,0,eaafece4764373f55a4dd9ae91ceaafebeb38e5027ad589cdf2fa55185e23f9b,2024-11-21T01:52:41.010000 +CVE-2013-2926,0,0,97a78b75311b8933637870593d5cf7c8f15b965715049b59248a93902859e4f2,2024-11-21T01:52:41.147000 +CVE-2013-2927,0,0,9ad35d12a0d6c57ef85bc74df624b2fef6e2494ecf30bae96fa705c25a91d77c,2024-11-21T01:52:41.280000 +CVE-2013-2928,0,0,b4e0c8e2dbf219f561030cb62d89e4319e783154acadc03f8a339d0043e5614c,2024-11-21T01:52:41.420000 +CVE-2013-2929,0,0,16c25dfb38c8f08bf22f97f2f3548ae47b731ad8b4094721837d9c0d15a68583,2024-11-21T01:52:41.570000 +CVE-2013-2930,0,0,e5762bca46f00a0d1dcb16d2d6876cb8efe14a652940037465b50f3858ba07f3,2024-11-21T01:52:42.440000 +CVE-2013-2931,0,0,25c099410b680b2998eeb54db165b132fddb5e92d0e13a9a9e6879a6be68d917,2024-11-21T01:52:42.900000 +CVE-2013-2933,0,0,f4922e47e09f44a5d1df94b8f4025e07965a0478afac15ec6b7e6eaadd7a2b4e,2024-11-21T01:52:43.050000 +CVE-2013-2934,0,0,af96547981a8c5a7bb42ea3d5b28e919af95e9e69f1511bb78a81abc7a4b1b01,2024-11-21T01:52:43.193000 +CVE-2013-2935,0,0,9a21c5f256cafffda546140f9e5ddd6d43dca44442a0aee29314c5dda8b2c85c,2024-11-21T01:52:43.327000 +CVE-2013-2936,0,0,fe4a7d205e15bf6dd887c5b8cc4517005ba90dda312dae374910f8de2f9dfeac,2024-11-21T01:52:43.467000 +CVE-2013-2937,0,0,8c612120c9d1ef8e1a23cea196d8ffac7c7c2a6998a4e39e8862b3526bcd2644,2024-11-21T01:52:43.600000 +CVE-2013-2938,0,0,ac725a1113f47328c3424d2b968f59aa07b835ef0755a7a36c117f396dfa5f19,2024-11-21T01:52:43.737000 +CVE-2013-2939,0,0,2e3d1f00b056311bd451b127309193994c06ee85c15fcff7d46dba08d6598a4e,2024-11-21T01:52:43.870000 +CVE-2013-2940,0,0,cd10b2eec93454a924e2180ef21e698e93698dbe69b7eeeb2ac1b577600928d0,2024-11-21T01:52:44.013000 +CVE-2013-2944,0,0,ed694d08a47d3b04bc51b3b4503a843b230428080acbdff7cf058e99ff950cb8,2024-11-21T01:52:44.157000 +CVE-2013-2945,0,0,1c9cd040dbee6511b74c2508683df7b73623359e38a21d277a71114e65806366,2024-11-21T01:52:44.310000 +CVE-2013-2950,0,0,fa86ffff44989b222b31c673b49607a1c9843a244ea5dc0807d8466fb0696f04,2024-11-21T01:52:44.463000 CVE-2013-2951,0,0,85f27d8920bc1e7c79839da2f57f8de19709ddc62237ea3e006d4428b3bfcc1f,2018-09-06T15:25:53.623000 -CVE-2013-2953,0,1,6ec614a97e9c516004feb165e24006d9e65b491a323adc4a916316b0adbb14ff,2024-11-21T01:52:44.720000 -CVE-2013-2954,0,1,87a8e940b9a34684076405fb8d67a7b99fd1adbc2a651aae4312eff4460a49b3,2024-11-21T01:52:44.833000 -CVE-2013-2955,0,1,02a005d9c517510da5b204b11c233d7b49a653091cbf41aefacdefe9b61794a9,2024-11-21T01:52:44.953000 -CVE-2013-2956,0,1,252afb7b12a6ff7c6079682414a11050cb9a670545699b3e2af098bec0fc6138,2024-11-21T01:52:45.063000 -CVE-2013-2957,0,1,450be30e354743e68f7b765145070085ad7c8f6bba6a4038f6cc82994e25d4a6,2024-11-21T01:52:45.173000 -CVE-2013-2959,0,1,ac41cc96e4da3b8dfed30e27b2f9f2c8cb2f0201b49ae439623585a802634e22,2024-11-21T01:52:45.290000 -CVE-2013-2960,0,1,f2f86bb3446f0ee2ad1fe66c00fed65e4e45a89938ba50bd9eaf10ff6d5a56a1,2024-11-21T01:52:45.397000 -CVE-2013-2961,0,1,53eef9962f652daea254fb869acea7637b95531265b1920d740667cfa976b07c,2024-11-21T01:52:45.510000 -CVE-2013-2962,0,1,f1f9f84f3f84c7c910f99f443cef467944f8603defed03644363dd548e9acbc6,2024-11-21T01:52:45.630000 -CVE-2013-2964,0,1,158a78492ebe9a964e3dfdd4f32a02f851895a46185f048682124c3b4ad8c6aa,2024-11-21T01:52:45.733000 -CVE-2013-2967,0,1,d70449f259e5bcdb7f3af0d072607d66ab8cd964c57514dea05650256efa2492,2024-11-21T01:52:45.870000 -CVE-2013-2968,0,1,0fe3ece85eb22695f7147b12d45372eb79b9ca750a89383296416e0a07f1124a,2024-11-21T01:52:45.990000 -CVE-2013-2969,0,1,2c8cd0fb8d82b3ad356a35097b2c4bec6ca135a93c31c588473baf8ca58a9ae5,2024-11-21T01:52:46.100000 -CVE-2013-2970,0,1,47d1c8fe97df897b58b76f7e0dabd29e30d84355071019deb786305a00eedcf1,2024-11-21T01:52:46.203000 +CVE-2013-2953,0,0,6ec614a97e9c516004feb165e24006d9e65b491a323adc4a916316b0adbb14ff,2024-11-21T01:52:44.720000 +CVE-2013-2954,0,0,87a8e940b9a34684076405fb8d67a7b99fd1adbc2a651aae4312eff4460a49b3,2024-11-21T01:52:44.833000 +CVE-2013-2955,0,0,02a005d9c517510da5b204b11c233d7b49a653091cbf41aefacdefe9b61794a9,2024-11-21T01:52:44.953000 +CVE-2013-2956,0,0,252afb7b12a6ff7c6079682414a11050cb9a670545699b3e2af098bec0fc6138,2024-11-21T01:52:45.063000 +CVE-2013-2957,0,0,450be30e354743e68f7b765145070085ad7c8f6bba6a4038f6cc82994e25d4a6,2024-11-21T01:52:45.173000 +CVE-2013-2959,0,0,ac41cc96e4da3b8dfed30e27b2f9f2c8cb2f0201b49ae439623585a802634e22,2024-11-21T01:52:45.290000 +CVE-2013-2960,0,0,f2f86bb3446f0ee2ad1fe66c00fed65e4e45a89938ba50bd9eaf10ff6d5a56a1,2024-11-21T01:52:45.397000 +CVE-2013-2961,0,0,53eef9962f652daea254fb869acea7637b95531265b1920d740667cfa976b07c,2024-11-21T01:52:45.510000 +CVE-2013-2962,0,0,f1f9f84f3f84c7c910f99f443cef467944f8603defed03644363dd548e9acbc6,2024-11-21T01:52:45.630000 +CVE-2013-2964,0,0,158a78492ebe9a964e3dfdd4f32a02f851895a46185f048682124c3b4ad8c6aa,2024-11-21T01:52:45.733000 +CVE-2013-2967,0,0,d70449f259e5bcdb7f3af0d072607d66ab8cd964c57514dea05650256efa2492,2024-11-21T01:52:45.870000 +CVE-2013-2968,0,0,0fe3ece85eb22695f7147b12d45372eb79b9ca750a89383296416e0a07f1124a,2024-11-21T01:52:45.990000 +CVE-2013-2969,0,0,2c8cd0fb8d82b3ad356a35097b2c4bec6ca135a93c31c588473baf8ca58a9ae5,2024-11-21T01:52:46.100000 +CVE-2013-2970,0,0,47d1c8fe97df897b58b76f7e0dabd29e30d84355071019deb786305a00eedcf1,2024-11-21T01:52:46.203000 CVE-2013-2971,0,0,0eb1066283ac9a10bddd7c0fd5126d686e0d7d65ea5c4e23b2d53f1eac1df7f7,2023-11-07T02:15:48.950000 CVE-2013-2972,0,0,0ac425ca669445dd608f9d5954906595e7d0b8324c954f1f070ec27a53be5d8b,2018-09-04T17:23:08.653000 CVE-2013-2973,0,0,dc658032c7707feb5dbce956712a682b001c52c49c9c666e27f6665add2b5cab,2023-11-07T02:15:49.310000 -CVE-2013-2974,0,1,440591674d7fc6cea78cd241a0b2a7ec3e6be6bb979eeb474215853ed64fa21c,2024-11-21T01:52:46.453000 -CVE-2013-2976,0,1,d97c8e03d03446f21804bc284996688ef5bb28159ea16928cfc5d5fb4656c3f7,2024-11-21T01:52:46.560000 -CVE-2013-2977,0,1,a3b5a5376f216c32438f1e5d60e968347d5522c07a786baf9a1520913dde7a69,2024-11-21T01:52:46.727000 -CVE-2013-2978,0,1,3d2d2e56c4ed497cb503d542b55b18dac6acbbfcc645847520f777b33b70d7ea,2024-11-21T01:52:46.853000 -CVE-2013-2979,0,1,9deb5b47256caaa1cadec5db8059332d3a3e06ec90a263d0ac80375b697f9f4b,2024-11-21T01:52:46.960000 -CVE-2013-2980,0,1,33dd606fc9299fc5dd4f3d1c4dd3266e62bc2c8c083798d60a7eadd85720d4c6,2024-11-21T01:52:47.070000 -CVE-2013-2981,0,1,edae8453017daf755ac68586380d0b0d047d0d877e20f5790ab4d4234c57bab8,2024-11-21T01:52:47.177000 -CVE-2013-2982,0,1,e955ed6c724a274b50f0d817fbc44f4d15d2c86b42947edf5db559cf56bcfa9c,2024-11-21T01:52:47.283000 -CVE-2013-2983,0,1,70ac7c154457d351b2eb38bff3d8fe9ca210112ae98a64ac04ee7badc8eaea7a,2024-11-21T01:52:47.393000 -CVE-2013-2984,0,1,a3a8f5131f0d199f12ebeab567d13ba21d925a48cf4c12bd18fde9a43945f32a,2024-11-21T01:52:47.500000 -CVE-2013-2985,0,1,30b85a0d8b22443e87900d849ac82500367f70401d86c359877526a3e1eab376,2024-11-21T01:52:47.607000 +CVE-2013-2974,0,0,440591674d7fc6cea78cd241a0b2a7ec3e6be6bb979eeb474215853ed64fa21c,2024-11-21T01:52:46.453000 +CVE-2013-2976,0,0,d97c8e03d03446f21804bc284996688ef5bb28159ea16928cfc5d5fb4656c3f7,2024-11-21T01:52:46.560000 +CVE-2013-2977,0,0,a3b5a5376f216c32438f1e5d60e968347d5522c07a786baf9a1520913dde7a69,2024-11-21T01:52:46.727000 +CVE-2013-2978,0,0,3d2d2e56c4ed497cb503d542b55b18dac6acbbfcc645847520f777b33b70d7ea,2024-11-21T01:52:46.853000 +CVE-2013-2979,0,0,9deb5b47256caaa1cadec5db8059332d3a3e06ec90a263d0ac80375b697f9f4b,2024-11-21T01:52:46.960000 +CVE-2013-2980,0,0,33dd606fc9299fc5dd4f3d1c4dd3266e62bc2c8c083798d60a7eadd85720d4c6,2024-11-21T01:52:47.070000 +CVE-2013-2981,0,0,edae8453017daf755ac68586380d0b0d047d0d877e20f5790ab4d4234c57bab8,2024-11-21T01:52:47.177000 +CVE-2013-2982,0,0,e955ed6c724a274b50f0d817fbc44f4d15d2c86b42947edf5db559cf56bcfa9c,2024-11-21T01:52:47.283000 +CVE-2013-2983,0,0,70ac7c154457d351b2eb38bff3d8fe9ca210112ae98a64ac04ee7badc8eaea7a,2024-11-21T01:52:47.393000 +CVE-2013-2984,0,0,a3a8f5131f0d199f12ebeab567d13ba21d925a48cf4c12bd18fde9a43945f32a,2024-11-21T01:52:47.500000 +CVE-2013-2985,0,0,30b85a0d8b22443e87900d849ac82500367f70401d86c359877526a3e1eab376,2024-11-21T01:52:47.607000 CVE-2013-2986,0,0,2276853da2a28322ac1dd3203e868ddbf5c2807347b3fdee097c1242ba71bc2f,2023-11-07T02:15:49.863000 -CVE-2013-2987,0,1,6b55584cd8bb32a574d1160bc9839cdb956f6a116d60a2adfcc64afe2301353f,2024-11-21T01:52:47.730000 -CVE-2013-2988,0,1,b47d2d620f704eff42786c5bb9663343c61639cdcf445df22023ae8e24bf2e2f,2024-11-21T01:52:47.837000 -CVE-2013-2989,0,1,e6f69260cd190bd612a5fdf3bc9cddb13c866af27cfe8d7b98156ac9d54d4f5b,2024-11-21T01:52:47.940000 +CVE-2013-2987,0,0,6b55584cd8bb32a574d1160bc9839cdb956f6a116d60a2adfcc64afe2301353f,2024-11-21T01:52:47.730000 +CVE-2013-2988,0,0,b47d2d620f704eff42786c5bb9663343c61639cdcf445df22023ae8e24bf2e2f,2024-11-21T01:52:47.837000 +CVE-2013-2989,0,0,e6f69260cd190bd612a5fdf3bc9cddb13c866af27cfe8d7b98156ac9d54d4f5b,2024-11-21T01:52:47.940000 CVE-2013-2990,0,0,d9052f122b450b6d966293a694ce0ee390b69cc82287664878b3bd459820f849,2023-11-07T02:15:50.127000 CVE-2013-2991,0,0,6d907880f396ba6f996dd888eaff789b21365d9fc6249e2431eba0c6e07726b3,2023-11-07T02:15:50.350000 -CVE-2013-2992,0,1,e6d8b91d172f7fea86e13fee77f0eaf15b02e53fd0677d735b1afeec637763db,2024-11-21T01:52:48.080000 -CVE-2013-2993,0,1,2e96ff902ab00793143261b8a10e75ee9edcd7ec6b3eefd7a7da4a666f62d421,2024-11-21T01:52:48.197000 -CVE-2013-2994,0,1,d304e8fc4f9a9c4517832f548f35865c00a93a989380e3f6f8c08c9351e87d20,2024-11-21T01:52:48.310000 -CVE-2013-2997,0,1,590a07d2775d874e15f0589b8975ac8598c8e6989e645c1cafb8e0197bfc8db7,2024-11-21T01:52:48.413000 -CVE-2013-2998,0,1,fce38b9664e63f38d08c17e34437e092eb7037ebc07f32f389b8b929836d5c8f,2024-11-21T01:52:48.523000 +CVE-2013-2992,0,0,e6d8b91d172f7fea86e13fee77f0eaf15b02e53fd0677d735b1afeec637763db,2024-11-21T01:52:48.080000 +CVE-2013-2993,0,0,2e96ff902ab00793143261b8a10e75ee9edcd7ec6b3eefd7a7da4a666f62d421,2024-11-21T01:52:48.197000 +CVE-2013-2994,0,0,d304e8fc4f9a9c4517832f548f35865c00a93a989380e3f6f8c08c9351e87d20,2024-11-21T01:52:48.310000 +CVE-2013-2997,0,0,590a07d2775d874e15f0589b8975ac8598c8e6989e645c1cafb8e0197bfc8db7,2024-11-21T01:52:48.413000 +CVE-2013-2998,0,0,fce38b9664e63f38d08c17e34437e092eb7037ebc07f32f389b8b929836d5c8f,2024-11-21T01:52:48.523000 CVE-2013-2999,0,0,c3c559a4ee84d2893549eb110fe5c301b5b3ef4d31b0ca13190a885738ed2f5c,2018-08-29T17:41:17.417000 CVE-2013-3000,0,0,3e205c060f87f2271f60a2c759d8c7eb52a00dbad6e8d4ffb8cff90ac97e69aa,2018-08-29T18:03:06.453000 CVE-2013-3001,0,0,067d00d8ecdd1e6f1117788b2740db1958e2cb76cb450f1f07c3d273a196cbf5,2018-08-29T17:47:35.750000 -CVE-2013-3003,0,1,cd2d7e88f7c585d4cc60dcc5944658b7bf6eff64ea5ab89c1aa11b667929d198,2024-11-21T01:52:49.017000 +CVE-2013-3003,0,0,cd2d7e88f7c585d4cc60dcc5944658b7bf6eff64ea5ab89c1aa11b667929d198,2024-11-21T01:52:49.017000 CVE-2013-3004,0,0,ba2cb53f77df1688dbf86c8428159b4967471f372b2fb31e927e2188d6e00a0c,2017-08-29T01:33:19.403000 -CVE-2013-3005,0,1,dc32c18df7a85f8152311f416914ba5146bea9471a2366f4bbe4210df6b290a6,2024-11-21T01:52:49.250000 -CVE-2013-3006,0,1,5a7997237c50a82f61d4e8b92f56c090e943a85df958626335e5d3c49341aabd,2024-11-21T01:52:49.380000 -CVE-2013-3007,0,1,7a7ef581eaf1589b38c0852040b77a64907bde5d08d80d868e4a56ebe01c826b,2024-11-21T01:52:49.500000 -CVE-2013-3008,0,1,eff1d35e2127c24f67203f60100b5d54631f172d5e61320d0c6f70cf3316e5a2,2024-11-21T01:52:49.637000 -CVE-2013-3009,0,1,ef59dd096dc190d785e49982eb13d107e306e3ef60f78b37c296adcea6a251ac,2024-11-21T01:52:49.767000 -CVE-2013-3010,0,1,41e2ad0d22a06c0f2b89383596d0e6580bcba2c4c8159654285a4d0fe99d7ebf,2024-11-21T01:52:49.930000 -CVE-2013-3011,0,1,6700c068566d01212f90ecfb667a93966cbc5e4eb959ce1dfd8943e900e9d587,2024-11-21T01:52:50.060000 -CVE-2013-3012,0,1,d98cd69da32e185c3879e2397736d1081fd91a5b9ee97507afeef25bfeb8d69b,2024-11-21T01:52:50.217000 -CVE-2013-3016,0,1,adadbe84f0493b0f12fa6c1dc24c6f11962404bb8cbce4f89f17a3a8755fa11a,2024-11-21T01:52:50.377000 +CVE-2013-3005,0,0,dc32c18df7a85f8152311f416914ba5146bea9471a2366f4bbe4210df6b290a6,2024-11-21T01:52:49.250000 +CVE-2013-3006,0,0,5a7997237c50a82f61d4e8b92f56c090e943a85df958626335e5d3c49341aabd,2024-11-21T01:52:49.380000 +CVE-2013-3007,0,0,7a7ef581eaf1589b38c0852040b77a64907bde5d08d80d868e4a56ebe01c826b,2024-11-21T01:52:49.500000 +CVE-2013-3008,0,0,eff1d35e2127c24f67203f60100b5d54631f172d5e61320d0c6f70cf3316e5a2,2024-11-21T01:52:49.637000 +CVE-2013-3009,0,0,ef59dd096dc190d785e49982eb13d107e306e3ef60f78b37c296adcea6a251ac,2024-11-21T01:52:49.767000 +CVE-2013-3010,0,0,41e2ad0d22a06c0f2b89383596d0e6580bcba2c4c8159654285a4d0fe99d7ebf,2024-11-21T01:52:49.930000 +CVE-2013-3011,0,0,6700c068566d01212f90ecfb667a93966cbc5e4eb959ce1dfd8943e900e9d587,2024-11-21T01:52:50.060000 +CVE-2013-3012,0,0,d98cd69da32e185c3879e2397736d1081fd91a5b9ee97507afeef25bfeb8d69b,2024-11-21T01:52:50.217000 +CVE-2013-3016,0,0,adadbe84f0493b0f12fa6c1dc24c6f11962404bb8cbce4f89f17a3a8755fa11a,2024-11-21T01:52:50.377000 CVE-2013-3017,0,0,d0ebbff90f09796d48750a0005241190c0680b41ea4a4f4907fc8ae4de0bd5fb,2018-09-06T18:17:27.577000 CVE-2013-3018,0,0,97e523c7d4f72fd81f60610e39480b04fbbfea63f75d94ab2ad823acba927bc7,2018-06-28T15:01:32.010000 -CVE-2013-3020,0,1,f6fa9b7da6583db81f80d97e73e60bf37b4ae489a0d09c4e5fedbdf29e26b3fd,2024-11-21T01:52:50.740000 +CVE-2013-3020,0,0,f6fa9b7da6583db81f80d97e73e60bf37b4ae489a0d09c4e5fedbdf29e26b3fd,2024-11-21T01:52:50.740000 CVE-2013-3022,0,0,20e2f0daa33c85bb351c0b614ee2adb696347a4f02863cc7edfd5952b94d1d20,2023-11-07T02:15:50.790000 CVE-2013-3023,0,0,a2ba9a0ba711d317889a2098b5f4d9de3d5a8ff731dc9d284d54b434ec77e590,2018-06-28T14:57:07.923000 CVE-2013-3024,0,0,15cbc711588fa657bfff979a55f51af31c0da5403bf6fd7912b2ed57c6a78203,2018-06-25T15:44:18.100000 -CVE-2013-3025,0,1,14c1f7ee61e1923e5e982335308f30e416d10ad33a54c9142a83c7c802c3c877,2024-11-21T01:52:51.130000 -CVE-2013-3026,0,1,39d322d0a0400affb9d523c3162b231dac2f159fab4da7c2d86e70c40d5da064,2024-11-21T01:52:51.240000 -CVE-2013-3027,0,1,200c2f7de2a8f9355b2ef6e6b6becf76e3e70fa0758f4d23e14f4ec0a75b779c,2024-11-21T01:52:51.353000 -CVE-2013-3028,0,1,b3a001f0d23dc48eb335ad9f6a6cb37fc1520bf4ded557b9eac808a3e36413b0,2024-11-21T01:52:51.460000 -CVE-2013-3029,0,1,312cf7f04a2139343a88657968b00fade07eb35f683bae45482e6fd49cc44911,2024-11-21T01:52:51.573000 -CVE-2013-3030,0,1,d54064e55e139714a86b11a515ff3542fb335a103c45877c3cefb9ffd210a2ef,2024-11-21T01:52:51.710000 -CVE-2013-3031,0,1,56c0a9b38c734367e0de6af8e52e00e226d2cab97a3f98a4baae287bbcd3fca6,2024-11-21T01:52:51.827000 -CVE-2013-3032,0,1,f037d431f5707bea2eca15acb8c6bde8d4ccde1957071a6256a9e30f12aa996a,2024-11-21T01:52:51.967000 -CVE-2013-3033,0,1,929c1f55771a5c45ad50e62c544109df617d4df489b65706a19b030d8ce9da7d,2024-11-21T01:52:52.090000 -CVE-2013-3034,0,1,179ba66295f6ede071c5787777ac18e19f84fb828c73b258f85fc27736ee5bc5,2024-11-21T01:52:52.207000 -CVE-2013-3035,0,1,1de1f0cdeddddf57de7ba89424cc36bb9db2bbe1ad4caa4ee5f79dc81ead0523,2024-11-21T01:52:52.330000 -CVE-2013-3036,0,1,07f6f7a52819bf66c79be52e031bf0bfcd7df49a197731e091d93baa5b2026bd,2024-11-21T01:52:52.443000 -CVE-2013-3037,0,1,cc79503ae41472569cc831c151ebcc03215c83eba8f20dd8eed842cd16543608,2024-11-21T01:52:52.547000 -CVE-2013-3038,0,1,e3b841b0d67c80d4af2ff30c5127cc29763fd211f9915602811b75d194c8e529,2024-11-21T01:52:52.647000 -CVE-2013-3039,0,1,fe071172aec2cae4edfa32f22f648f1c79e7b93c62c3d05f233652a412207cce,2024-11-21T01:52:52.750000 -CVE-2013-3040,0,1,2b08672f47617f037c5e518cf7da1340c58bb7ed4b19217d1a015538322b3352,2024-11-21T01:52:52.857000 -CVE-2013-3041,0,1,416c7f6d9dcdd8950546c4570ee486a0c700e376191a1702ce895e7077890864,2024-11-21T01:52:52.970000 -CVE-2013-3042,0,1,8fd67233332f2e1e44d198a30732a74b17187122f39179e44e4257e3cdeb644c,2024-11-21T01:52:53.090000 -CVE-2013-3043,0,1,b4b8ddc395099923b23ef947ee1a3e653157c53c4f7125d40c7729553f8c7fbe,2024-11-21T01:52:53.213000 -CVE-2013-3044,0,1,b8f097f9ed726e43b051a866029047b6e3768c7e455b71bbd848cae319495a8c,2024-11-21T01:52:53.340000 -CVE-2013-3045,0,1,08ca6b9dffd10436b322147d135de46893fca06aa716b1bdab006317ca27badc,2024-11-21T01:52:53.453000 -CVE-2013-3046,0,1,85ce5c60721a9c59e7a0ace7bb7013334991b13ead946c77ab46300bc632c539,2024-11-21T01:52:53.557000 -CVE-2013-3047,0,1,f9902abbf0dccf6906293f0029a9fb177ccbd5c7f9b185f83ec30980afa51f36,2024-11-21T01:52:53.673000 -CVE-2013-3048,0,1,ad7399fc6434f0f86cdc802eab3f64cec4aee9534c458feefa677a6352d5d655,2024-11-21T01:52:53.790000 -CVE-2013-3049,0,1,958e6f221400ca7744bf6059a2da2f05f1d73987b600a63b075fcc3b78861225,2024-11-21T01:52:53.900000 -CVE-2013-3050,0,1,acf1ea42c769ea08576c8c7d00d68e4f64cc44efee3fce232d1cc88641f33266,2024-11-21T01:52:54.017000 -CVE-2013-3051,0,1,c8404107426f87bfa8ae494eec364047574e3b5fa81175fa643e611e414aa136,2024-11-21T01:52:54.167000 -CVE-2013-3055,0,1,f9e7db4d965995256196eaafd49a57d22f341b3693d4e48f13ddd00c97e2388f,2024-11-21T01:52:54.310000 -CVE-2013-3056,0,1,a56191dc421dd5ee1f8a6f4e720ceca816bb1ee94a9d770efecedfb36d2f588c,2024-11-21T01:52:54.467000 -CVE-2013-3057,0,1,6df588c8a9710f3ad1f9dbed78fc15fed3a714aaeeae1cdcbb48170f373fc00f,2024-11-21T01:52:54.603000 -CVE-2013-3058,0,1,0490ef81304c682620319dfac5560cfc17721f3b7cc03d7893310eaa13460e2f,2024-11-21T01:52:54.740000 -CVE-2013-3059,0,1,162c91698e5153d5ce590db33ed6a7ec742c745c29c27b129ed55d23bf1ca1ec,2024-11-21T01:52:54.883000 -CVE-2013-3060,0,1,ce7ba7cafc7faa102867fbf025599d7adada0cb5358ac3002d6668b1665a1143,2024-11-21T01:52:55.037000 -CVE-2013-3061,0,1,68898723cf79c1509eb592b26884caeecb8c13be067dfce342a55533506e2d67,2024-11-21T01:52:55.180000 -CVE-2013-3062,0,1,d87f482f70bfb35e3fb166632ed272d5f583d90a62310d5a5fc9785a342eca02,2024-11-21T01:52:55.323000 -CVE-2013-3063,0,1,0fb8fd426d1135f144e6d33150730e39e51086b9afbabe00aea5b303313fb450,2024-11-21T01:52:55.457000 +CVE-2013-3025,0,0,14c1f7ee61e1923e5e982335308f30e416d10ad33a54c9142a83c7c802c3c877,2024-11-21T01:52:51.130000 +CVE-2013-3026,0,0,39d322d0a0400affb9d523c3162b231dac2f159fab4da7c2d86e70c40d5da064,2024-11-21T01:52:51.240000 +CVE-2013-3027,0,0,200c2f7de2a8f9355b2ef6e6b6becf76e3e70fa0758f4d23e14f4ec0a75b779c,2024-11-21T01:52:51.353000 +CVE-2013-3028,0,0,b3a001f0d23dc48eb335ad9f6a6cb37fc1520bf4ded557b9eac808a3e36413b0,2024-11-21T01:52:51.460000 +CVE-2013-3029,0,0,312cf7f04a2139343a88657968b00fade07eb35f683bae45482e6fd49cc44911,2024-11-21T01:52:51.573000 +CVE-2013-3030,0,0,d54064e55e139714a86b11a515ff3542fb335a103c45877c3cefb9ffd210a2ef,2024-11-21T01:52:51.710000 +CVE-2013-3031,0,0,56c0a9b38c734367e0de6af8e52e00e226d2cab97a3f98a4baae287bbcd3fca6,2024-11-21T01:52:51.827000 +CVE-2013-3032,0,0,f037d431f5707bea2eca15acb8c6bde8d4ccde1957071a6256a9e30f12aa996a,2024-11-21T01:52:51.967000 +CVE-2013-3033,0,0,929c1f55771a5c45ad50e62c544109df617d4df489b65706a19b030d8ce9da7d,2024-11-21T01:52:52.090000 +CVE-2013-3034,0,0,179ba66295f6ede071c5787777ac18e19f84fb828c73b258f85fc27736ee5bc5,2024-11-21T01:52:52.207000 +CVE-2013-3035,0,0,1de1f0cdeddddf57de7ba89424cc36bb9db2bbe1ad4caa4ee5f79dc81ead0523,2024-11-21T01:52:52.330000 +CVE-2013-3036,0,0,07f6f7a52819bf66c79be52e031bf0bfcd7df49a197731e091d93baa5b2026bd,2024-11-21T01:52:52.443000 +CVE-2013-3037,0,0,cc79503ae41472569cc831c151ebcc03215c83eba8f20dd8eed842cd16543608,2024-11-21T01:52:52.547000 +CVE-2013-3038,0,0,e3b841b0d67c80d4af2ff30c5127cc29763fd211f9915602811b75d194c8e529,2024-11-21T01:52:52.647000 +CVE-2013-3039,0,0,fe071172aec2cae4edfa32f22f648f1c79e7b93c62c3d05f233652a412207cce,2024-11-21T01:52:52.750000 +CVE-2013-3040,0,0,2b08672f47617f037c5e518cf7da1340c58bb7ed4b19217d1a015538322b3352,2024-11-21T01:52:52.857000 +CVE-2013-3041,0,0,416c7f6d9dcdd8950546c4570ee486a0c700e376191a1702ce895e7077890864,2024-11-21T01:52:52.970000 +CVE-2013-3042,0,0,8fd67233332f2e1e44d198a30732a74b17187122f39179e44e4257e3cdeb644c,2024-11-21T01:52:53.090000 +CVE-2013-3043,0,0,b4b8ddc395099923b23ef947ee1a3e653157c53c4f7125d40c7729553f8c7fbe,2024-11-21T01:52:53.213000 +CVE-2013-3044,0,0,b8f097f9ed726e43b051a866029047b6e3768c7e455b71bbd848cae319495a8c,2024-11-21T01:52:53.340000 +CVE-2013-3045,0,0,08ca6b9dffd10436b322147d135de46893fca06aa716b1bdab006317ca27badc,2024-11-21T01:52:53.453000 +CVE-2013-3046,0,0,85ce5c60721a9c59e7a0ace7bb7013334991b13ead946c77ab46300bc632c539,2024-11-21T01:52:53.557000 +CVE-2013-3047,0,0,f9902abbf0dccf6906293f0029a9fb177ccbd5c7f9b185f83ec30980afa51f36,2024-11-21T01:52:53.673000 +CVE-2013-3048,0,0,ad7399fc6434f0f86cdc802eab3f64cec4aee9534c458feefa677a6352d5d655,2024-11-21T01:52:53.790000 +CVE-2013-3049,0,0,958e6f221400ca7744bf6059a2da2f05f1d73987b600a63b075fcc3b78861225,2024-11-21T01:52:53.900000 +CVE-2013-3050,0,0,acf1ea42c769ea08576c8c7d00d68e4f64cc44efee3fce232d1cc88641f33266,2024-11-21T01:52:54.017000 +CVE-2013-3051,0,0,c8404107426f87bfa8ae494eec364047574e3b5fa81175fa643e611e414aa136,2024-11-21T01:52:54.167000 +CVE-2013-3055,0,0,f9e7db4d965995256196eaafd49a57d22f341b3693d4e48f13ddd00c97e2388f,2024-11-21T01:52:54.310000 +CVE-2013-3056,0,0,a56191dc421dd5ee1f8a6f4e720ceca816bb1ee94a9d770efecedfb36d2f588c,2024-11-21T01:52:54.467000 +CVE-2013-3057,0,0,6df588c8a9710f3ad1f9dbed78fc15fed3a714aaeeae1cdcbb48170f373fc00f,2024-11-21T01:52:54.603000 +CVE-2013-3058,0,0,0490ef81304c682620319dfac5560cfc17721f3b7cc03d7893310eaa13460e2f,2024-11-21T01:52:54.740000 +CVE-2013-3059,0,0,162c91698e5153d5ce590db33ed6a7ec742c745c29c27b129ed55d23bf1ca1ec,2024-11-21T01:52:54.883000 +CVE-2013-3060,0,0,ce7ba7cafc7faa102867fbf025599d7adada0cb5358ac3002d6668b1665a1143,2024-11-21T01:52:55.037000 +CVE-2013-3061,0,0,68898723cf79c1509eb592b26884caeecb8c13be067dfce342a55533506e2d67,2024-11-21T01:52:55.180000 +CVE-2013-3062,0,0,d87f482f70bfb35e3fb166632ed272d5f583d90a62310d5a5fc9785a342eca02,2024-11-21T01:52:55.323000 +CVE-2013-3063,0,0,0fb8fd426d1135f144e6d33150730e39e51086b9afbabe00aea5b303313fb450,2024-11-21T01:52:55.457000 CVE-2013-3064,0,0,8b9ce30496b2790e5ec01e26a3aa0fe8e3fb03f04775e80fb178573dde1dfdd9,2014-09-30T18:23:24.327000 CVE-2013-3065,0,0,0d468d949197eb6c3d67f38f4ede00ee7b3d0af1d627ec0d9fdcbbe70278fcf0,2014-09-30T18:25:04.943000 CVE-2013-3066,0,0,d6cbe21157ce526e51bb875654dfb4cf230b71b3ddeae397b42f1f3a724ea7ff,2014-09-30T18:25:30.117000 CVE-2013-3067,0,0,0ec6050cd212d3b1878a94119c05540a33e856e1ec4a3adc60a3e1c224f5d3d4,2020-02-10T16:17:31.377000 CVE-2013-3068,0,0,0fbf0e2cb37d2867fd43b0a60115886cefa70f1eea93e46a6807e06ea5702d0a,2014-10-01T01:13:07.897000 -CVE-2013-3069,0,1,eab7d690cb24d097851d856efeb03a6ef1df1752ad035f21f329f0a459b5ba2a,2024-11-21T01:52:56.320000 +CVE-2013-3069,0,0,eab7d690cb24d097851d856efeb03a6ef1df1752ad035f21f329f0a459b5ba2a,2024-11-21T01:52:56.320000 CVE-2013-3070,0,0,5a678011e1a4f100a55efe05fb0c604b88ff03b624bb995ed0af53bd708b909e,2019-11-18T14:17:11.310000 CVE-2013-3071,0,0,3a122981ebb30245ac88f662a9faeaab39830d6022576d5824ff9c40256736c6,2020-01-30T20:10:10.857000 CVE-2013-3072,0,0,123d65d927fb96b5a5f4e831295a2f118bd23d22786c40525cc5c1adf374f4da,2019-11-20T18:10:14.950000 CVE-2013-3073,0,0,00fab4c230421d55b3d33f9d4ec33cc874e4cad76696e7e858c07a61c31a6ec4,2019-11-20T20:44:49.783000 CVE-2013-3074,0,0,17af8b506b24b978f1e54e242e8ca6db1c67a4ca751d851fb44beeadbb8d6362,2020-01-30T16:45:40.740000 -CVE-2013-3075,0,1,f4e72f6b87ee5ed73b6c014b3e1a1e4c88361a3591db5007f6e59d4db1888f7d,2024-11-21T01:52:57.207000 -CVE-2013-3076,0,1,2c57baaae5803042c4aa366d4496957d483949be1ab52138ecfc64c340ce91c5,2024-11-21T01:52:57.333000 -CVE-2013-3077,0,1,c8f8865bdc02e1b0585193092a958969ca8f1e8de41ffef50dfff69c1ffe9e9c,2024-11-21T01:52:57.490000 -CVE-2013-3079,0,1,13cf13b565d1cad3c1505d840a0d66ccd4ac2e6e8838fb31a8eba65773bd48b5,2024-11-21T01:52:57.647000 -CVE-2013-3080,0,1,85649b46568758d1da0470d3228cc177f8c41cead4303d1fe8d26e7295336a62,2024-11-21T01:52:57.793000 +CVE-2013-3075,0,0,f4e72f6b87ee5ed73b6c014b3e1a1e4c88361a3591db5007f6e59d4db1888f7d,2024-11-21T01:52:57.207000 +CVE-2013-3076,0,0,2c57baaae5803042c4aa366d4496957d483949be1ab52138ecfc64c340ce91c5,2024-11-21T01:52:57.333000 +CVE-2013-3077,0,0,c8f8865bdc02e1b0585193092a958969ca8f1e8de41ffef50dfff69c1ffe9e9c,2024-11-21T01:52:57.490000 +CVE-2013-3079,0,0,13cf13b565d1cad3c1505d840a0d66ccd4ac2e6e8838fb31a8eba65773bd48b5,2024-11-21T01:52:57.647000 +CVE-2013-3080,0,0,85649b46568758d1da0470d3228cc177f8c41cead4303d1fe8d26e7295336a62,2024-11-21T01:52:57.793000 CVE-2013-3081,0,0,9cfe4de555aeec0a2c00e1798f1dd2aba26061aa9de71bb98ce7c14e1e00abd3,2017-08-29T01:33:21.700000 CVE-2013-3082,0,0,55c7b591b7992ae8471c91b1a232c84ccc5fd667e389bdd1709a69f72c52d5ec,2017-08-29T01:33:21.760000 CVE-2013-3083,0,0,823e69f1abfe3ae8a5685f05108fd190f23b901812027c9d3e654a2fb711525b,2014-10-01T01:04:49.130000 -CVE-2013-3084,0,1,44cdf71de0c51f1e75ba538ca6bbd769f7aa1f9bc93f065664851636dd1f5ae5,2024-11-21T01:52:58.360000 +CVE-2013-3084,0,0,44cdf71de0c51f1e75ba538ca6bbd769f7aa1f9bc93f065664851636dd1f5ae5,2024-11-21T01:52:58.360000 CVE-2013-3085,0,0,04503aff38c7b4a5dbe0edd9f1958d9777b3f68e32a2da6957e9835896e45383,2020-01-09T15:01:56.110000 CVE-2013-3086,0,0,48a456c232433ee6c6868ab174bbd3d40cd84cb7cd0f2734c6274803f551d81f,2014-10-01T01:00:43.577000 -CVE-2013-3087,0,1,07f889c4d25a17416c1da72549fa6dfa634e793422e2078f67d7249469b3296f,2024-11-21T01:52:58.773000 +CVE-2013-3087,0,0,07f889c4d25a17416c1da72549fa6dfa634e793422e2078f67d7249469b3296f,2024-11-21T01:52:58.773000 CVE-2013-3088,0,0,c945a6fa7a17ff33a100ecc960d6d2285a54449f87949bb1dc06926114231dd9,2020-01-16T20:12:12.880000 CVE-2013-3089,0,0,26bfd60061157359fd5d2f3e205ba050a05172f015c1c5e250807086eb7f0cfe,2014-10-01T00:59:26.303000 -CVE-2013-3090,0,1,6425591f1d4bcdf5cfa84671bafab8a7b83f72ed927e579ddef11fb219c1e294,2024-11-21T01:52:59.203000 +CVE-2013-3090,0,0,6425591f1d4bcdf5cfa84671bafab8a7b83f72ed927e579ddef11fb219c1e294,2024-11-21T01:52:59.203000 CVE-2013-3091,0,0,14af665e29702dd101fa48c375e36285e0b43e4cdea80292d33dce63e1844720,2020-02-10T17:45:01.683000 CVE-2013-3092,0,0,466477c1429e447be976dde55509ebd8c7b6e6106ec5ea76d8098e47cdc9d14b,2014-10-01T01:01:43.613000 CVE-2013-3093,0,0,3bc88d3a45235dba06805e5ae19500519ec93f9fb1560db8b3e9f959569f356d,2020-01-31T16:06:35.230000 -CVE-2013-3095,0,1,5a8093e79a058c5e784cfc82b13cec8e86547aafd064164d8d7a177f7eeffc52,2024-11-21T01:52:59.793000 +CVE-2013-3095,0,0,5a8093e79a058c5e784cfc82b13cec8e86547aafd064164d8d7a177f7eeffc52,2024-11-21T01:52:59.793000 CVE-2013-3096,0,0,dff0ea474cc0c430bc60545009dbad2b67f5d74d96b55100a19eee00f89acc95,2020-02-10T17:36:10.330000 CVE-2013-3097,0,0,89b0f87be949aa2c120fc2c09a33d899b40ad6f282bf891dec92f909e20188d6,2019-11-18T14:41:51.550000 -CVE-2013-3098,0,1,38b534010141551f2886d2fcc5a8d4a56cf8c2492f49214180a50fd88720e238,2024-11-21T01:53:00.237000 -CVE-2013-3106,0,1,c07fb52a8ea134c09700fdffe3e971f45eb6919dc305c9e9932ef8cbf4129f52,2024-11-21T01:53:00.380000 -CVE-2013-3107,0,1,29826811e61682a3103722d7cc803e00c8f9f82f7f4586370b99d59f1589c727,2024-11-21T01:53:00.520000 -CVE-2013-3110,0,1,923125c3bbb887282c19356a8c5826553a9434d8e376cfb709c24f7c7eed68e6,2024-11-21T01:53:00.667000 -CVE-2013-3111,0,1,4e85054c7ea6884414a6416c10c6a9bc56d00d557a0cbeca5daa20054f401213,2024-11-21T01:53:00.787000 -CVE-2013-3112,0,1,9c3325f3563d4ba514bfb6c5c64218d5206128df1d1c77da05234a25ff4842c9,2024-11-21T01:53:00.897000 -CVE-2013-3113,0,1,4e86596866be2298b70fc7c19a7650b9561681d4ff099fa92bfe28a16289b7c8,2024-11-21T01:53:01.023000 -CVE-2013-3114,0,1,19d6ea8b49e8b6a3160c03c0c964a7cf72075cc0f878a376a71c4736760bd269,2024-11-21T01:53:01.160000 -CVE-2013-3115,0,1,b78529eefb5694bf08765726cbc5ca0ff482201c1e53b9c5efc0054c53af47aa,2024-11-21T01:53:01.290000 -CVE-2013-3116,0,1,2117db0db6f8616b9fa168c10e365f6020557e80dd6b6ea6d9f9713667d5fc4e,2024-11-21T01:53:01.420000 -CVE-2013-3117,0,1,ab7719e359b6e8ffa855e4c43818188bf34094e6955488c32edaf3677abb1d5a,2024-11-21T01:53:01.550000 -CVE-2013-3118,0,1,6320cad944ca50ce485973865cae0efa0b0ce3bbc79abe9008084515f6697f16,2024-11-21T01:53:01.667000 -CVE-2013-3119,0,1,90a9e29be1e8f9aa6c729d1d044c2c6175d0f163235f57ede14d681b12acaf05,2024-11-21T01:53:01.797000 -CVE-2013-3120,0,1,3f4912a4651d38283d491c6f17f09cd9ceeaf99d07c875e8337d9f29bddbc581,2024-11-21T01:53:01.920000 -CVE-2013-3121,0,1,0ac8905e21e68d237f9a5cec5e58779b1328dcfb436d4deabc5a8ea13cc32aee,2024-11-21T01:53:02.053000 -CVE-2013-3122,0,1,62e0db5f01e969c90b0b93c02a57748567b6c0ba59624aa5595385ea6b11b1e6,2024-11-21T01:53:02.177000 -CVE-2013-3123,0,1,9b05d9689a6759b688404fc4707d554cd8c376863cc42e6554dd5cb6fb2d3490,2024-11-21T01:53:02.290000 -CVE-2013-3124,0,1,8ec027e91dac91a5605cd09bba268ad63f74774e4b3fc4b0b67d162c0bb267c4,2024-11-21T01:53:02.440000 -CVE-2013-3125,0,1,63d6944f260f334d90652ddd7da864ce6c6c34634623f605bb67c0a9a2737ea0,2024-11-21T01:53:02.547000 -CVE-2013-3126,0,1,88a38faf80a7b9df5b9ccedc41a60f0ec65ec114dda159208b2e042a6f0a8b58,2024-11-21T01:53:02.663000 -CVE-2013-3127,0,1,66f11f03b4467353fef06fd801353186f967592cf1cf5fcedb26eaf7f77d9e84,2024-11-21T01:53:02.770000 -CVE-2013-3128,0,1,1478a68ab03e48b24aec7748566f6d134a24bce9bad08d22d3325c572aeb80ba,2024-11-21T01:53:02.890000 -CVE-2013-3129,0,1,fc03bc87fd9926619042f86befdfd86032f95ca999a6fc0cddf682d3831744bd,2024-11-21T01:53:03.020000 +CVE-2013-3098,0,0,38b534010141551f2886d2fcc5a8d4a56cf8c2492f49214180a50fd88720e238,2024-11-21T01:53:00.237000 +CVE-2013-3106,0,0,c07fb52a8ea134c09700fdffe3e971f45eb6919dc305c9e9932ef8cbf4129f52,2024-11-21T01:53:00.380000 +CVE-2013-3107,0,0,29826811e61682a3103722d7cc803e00c8f9f82f7f4586370b99d59f1589c727,2024-11-21T01:53:00.520000 +CVE-2013-3110,0,0,923125c3bbb887282c19356a8c5826553a9434d8e376cfb709c24f7c7eed68e6,2024-11-21T01:53:00.667000 +CVE-2013-3111,0,0,4e85054c7ea6884414a6416c10c6a9bc56d00d557a0cbeca5daa20054f401213,2024-11-21T01:53:00.787000 +CVE-2013-3112,0,0,9c3325f3563d4ba514bfb6c5c64218d5206128df1d1c77da05234a25ff4842c9,2024-11-21T01:53:00.897000 +CVE-2013-3113,0,0,4e86596866be2298b70fc7c19a7650b9561681d4ff099fa92bfe28a16289b7c8,2024-11-21T01:53:01.023000 +CVE-2013-3114,0,0,19d6ea8b49e8b6a3160c03c0c964a7cf72075cc0f878a376a71c4736760bd269,2024-11-21T01:53:01.160000 +CVE-2013-3115,0,0,b78529eefb5694bf08765726cbc5ca0ff482201c1e53b9c5efc0054c53af47aa,2024-11-21T01:53:01.290000 +CVE-2013-3116,0,0,2117db0db6f8616b9fa168c10e365f6020557e80dd6b6ea6d9f9713667d5fc4e,2024-11-21T01:53:01.420000 +CVE-2013-3117,0,0,ab7719e359b6e8ffa855e4c43818188bf34094e6955488c32edaf3677abb1d5a,2024-11-21T01:53:01.550000 +CVE-2013-3118,0,0,6320cad944ca50ce485973865cae0efa0b0ce3bbc79abe9008084515f6697f16,2024-11-21T01:53:01.667000 +CVE-2013-3119,0,0,90a9e29be1e8f9aa6c729d1d044c2c6175d0f163235f57ede14d681b12acaf05,2024-11-21T01:53:01.797000 +CVE-2013-3120,0,0,3f4912a4651d38283d491c6f17f09cd9ceeaf99d07c875e8337d9f29bddbc581,2024-11-21T01:53:01.920000 +CVE-2013-3121,0,0,0ac8905e21e68d237f9a5cec5e58779b1328dcfb436d4deabc5a8ea13cc32aee,2024-11-21T01:53:02.053000 +CVE-2013-3122,0,0,62e0db5f01e969c90b0b93c02a57748567b6c0ba59624aa5595385ea6b11b1e6,2024-11-21T01:53:02.177000 +CVE-2013-3123,0,0,9b05d9689a6759b688404fc4707d554cd8c376863cc42e6554dd5cb6fb2d3490,2024-11-21T01:53:02.290000 +CVE-2013-3124,0,0,8ec027e91dac91a5605cd09bba268ad63f74774e4b3fc4b0b67d162c0bb267c4,2024-11-21T01:53:02.440000 +CVE-2013-3125,0,0,63d6944f260f334d90652ddd7da864ce6c6c34634623f605bb67c0a9a2737ea0,2024-11-21T01:53:02.547000 +CVE-2013-3126,0,0,88a38faf80a7b9df5b9ccedc41a60f0ec65ec114dda159208b2e042a6f0a8b58,2024-11-21T01:53:02.663000 +CVE-2013-3127,0,0,66f11f03b4467353fef06fd801353186f967592cf1cf5fcedb26eaf7f77d9e84,2024-11-21T01:53:02.770000 +CVE-2013-3128,0,0,1478a68ab03e48b24aec7748566f6d134a24bce9bad08d22d3325c572aeb80ba,2024-11-21T01:53:02.890000 +CVE-2013-3129,0,0,fc03bc87fd9926619042f86befdfd86032f95ca999a6fc0cddf682d3831744bd,2024-11-21T01:53:03.020000 CVE-2013-3130,0,0,a93684d22ac08eaa36e73f2f9d8ae8348717e1fb92a68dc3a7e6aa9a9292b516,2023-11-07T02:15:51.653000 -CVE-2013-3131,0,1,2aeb7b82d03fd57ff882f5834d6ca20016372bc51b4fccbbbd5e7c3644da4934,2024-11-21T01:53:03.167000 -CVE-2013-3132,0,1,3166c81dc8a6d52ee8247005b033fe658562a2fe04b402fc6622dae64d2b8110,2024-11-21T01:53:03.290000 -CVE-2013-3133,0,1,6f6b1a2385bb683b1d3bf50f2607d38c7dd342b5b869c594602f592cfebe35a2,2024-11-21T01:53:03.407000 -CVE-2013-3134,0,1,b9ec0bc6300ca5256d75124df8fadac630c6a3291d7e9cb0a0e9c03ed9fb5592,2024-11-21T01:53:03.513000 +CVE-2013-3131,0,0,2aeb7b82d03fd57ff882f5834d6ca20016372bc51b4fccbbbd5e7c3644da4934,2024-11-21T01:53:03.167000 +CVE-2013-3132,0,0,3166c81dc8a6d52ee8247005b033fe658562a2fe04b402fc6622dae64d2b8110,2024-11-21T01:53:03.290000 +CVE-2013-3133,0,0,6f6b1a2385bb683b1d3bf50f2607d38c7dd342b5b869c594602f592cfebe35a2,2024-11-21T01:53:03.407000 +CVE-2013-3134,0,0,b9ec0bc6300ca5256d75124df8fadac630c6a3291d7e9cb0a0e9c03ed9fb5592,2024-11-21T01:53:03.513000 CVE-2013-3135,0,0,7595c79da0b3eae574966ec1faee7e0cb99fd527ed89664d425f61850f7124c3,2023-11-07T02:15:51.907000 -CVE-2013-3136,0,1,5550a4d2aca9c7d8d03f3e9cc9c9199b78af2eb8fc92e85462a7e1e578db4fef,2024-11-21T01:53:03.630000 -CVE-2013-3137,0,1,1b0261dc50a7bd8270529299680a1a69319326877b2ed1d9b4e11b5883c4774f,2024-11-21T01:53:03.740000 -CVE-2013-3138,0,1,8f5f7b1fc364ba749bedd6330ae40e89ec327bbb6f7533e9e01b527f1a206fe9,2024-11-21T01:53:03.843000 -CVE-2013-3139,0,1,d0befeb0f6f4933abfa419dd0d5b557af8827e77b28e4c180b843a5a35f28aa8,2024-11-21T01:53:03.953000 -CVE-2013-3140,0,1,fc07e1bfa83a5d05508665dffd38e43684f1296b2abbc3f22a55211955fbab12,2024-11-21T01:53:04.067000 -CVE-2013-3141,0,1,8c3c7d6ad65c7ac4ff35642841f2d4af7bca72f6f8da053032f7bb7468b860a4,2024-11-21T01:53:04.180000 -CVE-2013-3142,0,1,da6e031313616d377a2a141b17010200a6a83a3af95677ae9fd8bda8ec076d01,2024-11-21T01:53:04.283000 -CVE-2013-3143,0,1,a068dc08f325ff30ee315282a0d8793b5b289e75fa4cfc0ddc9d6a21f069271c,2024-11-21T01:53:04.393000 -CVE-2013-3144,0,1,5ac58671859456e4755c2a012d671fbc26eaaef585367bc391e43366e2d16820,2024-11-21T01:53:04.517000 -CVE-2013-3145,0,1,35c48f2cff71ce95b73d0ed64a70dd67626f7a3a2d9da7a92379f373df1e9e9a,2024-11-21T01:53:04.617000 -CVE-2013-3146,0,1,24468eeeef871d0ec10ef5758c0e6867d08b71792ab20d649e05a08771a8392b,2024-11-21T01:53:04.717000 -CVE-2013-3147,0,1,df0ff3f6e4e42c0e7a2f4ffe654804ccbecd17a6e6e2b7a964e9786a3052fc04,2024-11-21T01:53:04.830000 -CVE-2013-3148,0,1,2d5835ab7d49b617f62d8ff751f36c4c459ae0fc1b89566fc10783697e1bf7c2,2024-11-21T01:53:04.957000 -CVE-2013-3149,0,1,9f5da27c1137eaf9568adb6e0f5d3347d220f3ff6a32bc5ee882df6869dfa673,2024-11-21T01:53:05.083000 -CVE-2013-3150,0,1,a15a7b1c64584ca78d7bd4722a72feedc74c3c742fec8dbdcf39a83aca36ed57,2024-11-21T01:53:05.200000 -CVE-2013-3151,0,1,4d4c85f45883ff85c2256112eee85e11336206bccbbf68f4e99dbd72167c5e96,2024-11-21T01:53:05.313000 -CVE-2013-3152,0,1,0423fe5f9cd60f18088ad026fd10820110b4e9e314d679318219621a36a93ba1,2024-11-21T01:53:05.430000 -CVE-2013-3153,0,1,ae845b5cbffd21a3dc008fcf9d8f56ac06d943543bdd9d0a45f3cf8697923ce3,2024-11-21T01:53:05.540000 -CVE-2013-3154,0,1,4a1edc69d5e1a1b6d12fd1b2d313756ed3b2241c2af94637d2a94ba92144b55a,2024-11-21T01:53:05.647000 -CVE-2013-3155,0,1,1f821cab669b667b8b96246cf3967028daacb10008a76365d351817f867e9a9a,2024-11-21T01:53:05.750000 -CVE-2013-3156,0,1,32d400450e416968bd9fd3d13691a30fd7459ff1b1a18e6083a4bcc29eb1d12b,2024-11-21T01:53:05.857000 -CVE-2013-3157,0,1,8512d208936f82dfe6893d0fc932e19ac5478a10cccad50a2d39b8ad22a5f3d6,2024-11-21T01:53:05.970000 -CVE-2013-3158,0,1,aabdfa1f7bd051e3b339cc3144080bcdeefdfaf8924df9e24211747aa213e643,2024-11-21T01:53:06.080000 -CVE-2013-3159,0,1,ed8b51408d328f32a333d9a010e370abc07582fd26af52ac053e1cf592312ac7,2024-11-21T01:53:06.190000 -CVE-2013-3160,0,1,56034d2fcfec92fb1163b645f78f41ff2592dbb0318cf4e558d3f1589d60513e,2024-11-21T01:53:06.313000 -CVE-2013-3161,0,1,6cbd5ff14275296189a60a63d3323cfcc2cc3c08a14fcb57aa7441f6b0b11738,2024-11-21T01:53:06.433000 -CVE-2013-3162,0,1,6e5045e78ce6c91104cbad6780aeccd6415a8d7632a28f10999e45905f0a2f29,2024-11-21T01:53:06.533000 -CVE-2013-3163,0,1,e426d7ff06b66ee9ac5b1bb789547d77da27fc51920dabbb3fb724c1c6d10c75,2024-11-21T01:53:06.633000 -CVE-2013-3164,0,1,571bd4703a11883529ab0897ea29341cffd21774f458ba3f26417dffbef9ee93,2024-11-21T01:53:06.753000 +CVE-2013-3136,0,0,5550a4d2aca9c7d8d03f3e9cc9c9199b78af2eb8fc92e85462a7e1e578db4fef,2024-11-21T01:53:03.630000 +CVE-2013-3137,0,0,1b0261dc50a7bd8270529299680a1a69319326877b2ed1d9b4e11b5883c4774f,2024-11-21T01:53:03.740000 +CVE-2013-3138,0,0,8f5f7b1fc364ba749bedd6330ae40e89ec327bbb6f7533e9e01b527f1a206fe9,2024-11-21T01:53:03.843000 +CVE-2013-3139,0,0,d0befeb0f6f4933abfa419dd0d5b557af8827e77b28e4c180b843a5a35f28aa8,2024-11-21T01:53:03.953000 +CVE-2013-3140,0,0,fc07e1bfa83a5d05508665dffd38e43684f1296b2abbc3f22a55211955fbab12,2024-11-21T01:53:04.067000 +CVE-2013-3141,0,0,8c3c7d6ad65c7ac4ff35642841f2d4af7bca72f6f8da053032f7bb7468b860a4,2024-11-21T01:53:04.180000 +CVE-2013-3142,0,0,da6e031313616d377a2a141b17010200a6a83a3af95677ae9fd8bda8ec076d01,2024-11-21T01:53:04.283000 +CVE-2013-3143,0,0,a068dc08f325ff30ee315282a0d8793b5b289e75fa4cfc0ddc9d6a21f069271c,2024-11-21T01:53:04.393000 +CVE-2013-3144,0,0,5ac58671859456e4755c2a012d671fbc26eaaef585367bc391e43366e2d16820,2024-11-21T01:53:04.517000 +CVE-2013-3145,0,0,35c48f2cff71ce95b73d0ed64a70dd67626f7a3a2d9da7a92379f373df1e9e9a,2024-11-21T01:53:04.617000 +CVE-2013-3146,0,0,24468eeeef871d0ec10ef5758c0e6867d08b71792ab20d649e05a08771a8392b,2024-11-21T01:53:04.717000 +CVE-2013-3147,0,0,df0ff3f6e4e42c0e7a2f4ffe654804ccbecd17a6e6e2b7a964e9786a3052fc04,2024-11-21T01:53:04.830000 +CVE-2013-3148,0,0,2d5835ab7d49b617f62d8ff751f36c4c459ae0fc1b89566fc10783697e1bf7c2,2024-11-21T01:53:04.957000 +CVE-2013-3149,0,0,9f5da27c1137eaf9568adb6e0f5d3347d220f3ff6a32bc5ee882df6869dfa673,2024-11-21T01:53:05.083000 +CVE-2013-3150,0,0,a15a7b1c64584ca78d7bd4722a72feedc74c3c742fec8dbdcf39a83aca36ed57,2024-11-21T01:53:05.200000 +CVE-2013-3151,0,0,4d4c85f45883ff85c2256112eee85e11336206bccbbf68f4e99dbd72167c5e96,2024-11-21T01:53:05.313000 +CVE-2013-3152,0,0,0423fe5f9cd60f18088ad026fd10820110b4e9e314d679318219621a36a93ba1,2024-11-21T01:53:05.430000 +CVE-2013-3153,0,0,ae845b5cbffd21a3dc008fcf9d8f56ac06d943543bdd9d0a45f3cf8697923ce3,2024-11-21T01:53:05.540000 +CVE-2013-3154,0,0,4a1edc69d5e1a1b6d12fd1b2d313756ed3b2241c2af94637d2a94ba92144b55a,2024-11-21T01:53:05.647000 +CVE-2013-3155,0,0,1f821cab669b667b8b96246cf3967028daacb10008a76365d351817f867e9a9a,2024-11-21T01:53:05.750000 +CVE-2013-3156,0,0,32d400450e416968bd9fd3d13691a30fd7459ff1b1a18e6083a4bcc29eb1d12b,2024-11-21T01:53:05.857000 +CVE-2013-3157,0,0,8512d208936f82dfe6893d0fc932e19ac5478a10cccad50a2d39b8ad22a5f3d6,2024-11-21T01:53:05.970000 +CVE-2013-3158,0,0,aabdfa1f7bd051e3b339cc3144080bcdeefdfaf8924df9e24211747aa213e643,2024-11-21T01:53:06.080000 +CVE-2013-3159,0,0,ed8b51408d328f32a333d9a010e370abc07582fd26af52ac053e1cf592312ac7,2024-11-21T01:53:06.190000 +CVE-2013-3160,0,0,56034d2fcfec92fb1163b645f78f41ff2592dbb0318cf4e558d3f1589d60513e,2024-11-21T01:53:06.313000 +CVE-2013-3161,0,0,6cbd5ff14275296189a60a63d3323cfcc2cc3c08a14fcb57aa7441f6b0b11738,2024-11-21T01:53:06.433000 +CVE-2013-3162,0,0,6e5045e78ce6c91104cbad6780aeccd6415a8d7632a28f10999e45905f0a2f29,2024-11-21T01:53:06.533000 +CVE-2013-3163,0,0,e426d7ff06b66ee9ac5b1bb789547d77da27fc51920dabbb3fb724c1c6d10c75,2024-11-21T01:53:06.633000 +CVE-2013-3164,0,0,571bd4703a11883529ab0897ea29341cffd21774f458ba3f26417dffbef9ee93,2024-11-21T01:53:06.753000 CVE-2013-3165,0,0,692830f9334c312e09253d7d93ec5e1b5917c01175b6207454db69fda0047e07,2023-11-07T02:15:52.320000 -CVE-2013-3166,0,1,eb5ad3752d82c3bba081c62dfb8ff5bddc451e92c0a20b2af70655baf51a60ab,2024-11-21T01:53:06.867000 -CVE-2013-3167,0,1,a5fc715734226912fbdcffd005766f5dec86201608dcf92516c5173c6ca5d9bb,2024-11-21T01:53:06.973000 +CVE-2013-3166,0,0,eb5ad3752d82c3bba081c62dfb8ff5bddc451e92c0a20b2af70655baf51a60ab,2024-11-21T01:53:06.867000 +CVE-2013-3167,0,0,a5fc715734226912fbdcffd005766f5dec86201608dcf92516c5173c6ca5d9bb,2024-11-21T01:53:06.973000 CVE-2013-3168,0,0,bb517aff634474047c34f955a5a824882dfcbd5496170e35de548acadf9e084a,2023-11-07T02:15:52.550000 CVE-2013-3169,0,0,cbbabcc38231c7c522e5923b15c47d8b915c68cd048f9f942e5dbedb38d24d94,2023-11-07T02:15:52.763000 CVE-2013-3170,0,0,02a29eccc21f11e127163583733c819e09a6f7287bad95e3d8f563683a5c3ce0,2023-11-07T02:15:53.007000 -CVE-2013-3171,0,1,0a28a5aa529531142da179f63db4196b5c580f1aa93de1c6c763f9a3d6c61af1,2024-11-21T01:53:07.127000 -CVE-2013-3172,0,1,76c2bfe9510df509e239790d3a7115dc11d82b7aa1d15db705193fb5b999e8a6,2024-11-21T01:53:07.240000 -CVE-2013-3173,0,1,9be58fca7e41654becf356ef11e75850122d93c31ce412a28125cfa35d011d00,2024-11-21T01:53:07.350000 -CVE-2013-3174,0,1,9a97ab7e696cb86643275db6d88c775404c99b2571e9ca57437f08aa83224e08,2024-11-21T01:53:07.457000 -CVE-2013-3175,0,1,fd0e1c0696d327376ade50a194f419bbe07fb76be45b4e47d665510260e9c797,2024-11-21T01:53:07.570000 +CVE-2013-3171,0,0,0a28a5aa529531142da179f63db4196b5c580f1aa93de1c6c763f9a3d6c61af1,2024-11-21T01:53:07.127000 +CVE-2013-3172,0,0,76c2bfe9510df509e239790d3a7115dc11d82b7aa1d15db705193fb5b999e8a6,2024-11-21T01:53:07.240000 +CVE-2013-3173,0,0,9be58fca7e41654becf356ef11e75850122d93c31ce412a28125cfa35d011d00,2024-11-21T01:53:07.350000 +CVE-2013-3174,0,0,9a97ab7e696cb86643275db6d88c775404c99b2571e9ca57437f08aa83224e08,2024-11-21T01:53:07.457000 +CVE-2013-3175,0,0,fd0e1c0696d327376ade50a194f419bbe07fb76be45b4e47d665510260e9c797,2024-11-21T01:53:07.570000 CVE-2013-3176,0,0,44d5a1e2117b523fbf7107064ef7d490d969f5586b4d56264c7fb51879da58f6,2023-11-07T02:15:53.297000 CVE-2013-3177,0,0,e8d4ae2cc025a2176f883c96584bd98b8ca2713893af68830f0b385d88022d54,2023-11-07T02:15:53.523000 -CVE-2013-3178,0,1,1278026eb73514077939ac9315a94d00a5502966b1c6473142fa49821164014c,2024-11-21T01:53:07.700000 -CVE-2013-3179,0,1,636cc932a4e89b1a8bf70dc20369ea7e6104377e185be21eb811fcf890dfa8bb,2024-11-21T01:53:07.827000 -CVE-2013-3180,0,1,961a0037d116c72f3ba76722fa620b2f132a61b262981ca7a28494dd98407ae5,2024-11-21T01:53:07.930000 -CVE-2013-3181,0,1,d49eb96ec85b49613205236a5b4e48a1d485e3ed1d5af75e7783f4fb4c9fe9ad,2024-11-21T01:53:08.030000 -CVE-2013-3182,0,1,cec41b3aa47d95b77a2d17ac5b165fff0aa8199bef84612b0b64a9c13a044568,2024-11-21T01:53:08.140000 -CVE-2013-3183,0,1,c49d38733ab9b69a33cf4fe226befd5d02cd52306d4d26ca7ffc09e4acd0113d,2024-11-21T01:53:08.243000 -CVE-2013-3184,0,1,059ed3c6ee718790bf1ef6e89347678e34031f80af9b1c02344a0509ebb26b91,2024-11-21T01:53:08.357000 -CVE-2013-3185,0,1,67c67e8394bdd09d785c129a1ca1873206603b8289ec08a7d29325cd87472ea9,2024-11-21T01:53:08.457000 -CVE-2013-3186,0,1,d3aa84ccc1cf258a38486612092487b6d60068213e2b07c62aa652ade9897078,2024-11-21T01:53:08.560000 -CVE-2013-3187,0,1,08e685350f6a57a42e0e5cb07a13e5dd0adceee3c91cad86b9866185fb3ee68e,2024-11-21T01:53:08.667000 -CVE-2013-3188,0,1,25a8737da59c53643f51f6d379aa00084696b8a8270730165cf7b70c167f08d3,2024-11-21T01:53:08.763000 -CVE-2013-3189,0,1,87fabc4d8ed85c6451b851eeeceb2f21671d6db9ff8a5f8a26abd18405e64a3c,2024-11-21T01:53:08.873000 -CVE-2013-3190,0,1,5182682c155fdda8abcb695c67970a7dfe9fb1d4934816792397bded8fcbddd8,2024-11-21T01:53:08.983000 -CVE-2013-3191,0,1,5e125990b88da4ebc1428fff37ef17d40991ecd5666a6026be7fdf072ff1ca7b,2024-11-21T01:53:09.090000 -CVE-2013-3192,0,1,71fd27294deb3968928d4c4ca55e4c4f2277167ad333a2d0409140348e12ab4c,2024-11-21T01:53:09.187000 -CVE-2013-3193,0,1,077386074c45e473be96c5919b45309e9a145cb1521ce4c8d9025eb626027ef1,2024-11-21T01:53:09.283000 -CVE-2013-3194,0,1,98bc039c8e346ccb4712d333623f074fa4106945ed45dcc6137a937cf80b9852,2024-11-21T01:53:09.387000 -CVE-2013-3195,0,1,1b89e2ff0120a36ae7bd78f0941b2855107c17ab017bec2a74f91571fc06beb8,2024-11-21T01:53:09.490000 -CVE-2013-3196,0,1,d1bd0335ad92ed06b9fed2df63b5bd299b347a7f91a5d05c6dd9fdcffae50d48,2024-11-21T01:53:09.597000 -CVE-2013-3197,0,1,35b5b4bf42a0ccb45346f6f40e0c8590bf3cc3dc357da353b84b84f16d902df5,2024-11-21T01:53:09.697000 -CVE-2013-3198,0,1,56ffaf70333185c0328b112aa3f496cfef80b3ea4ada44e6c3d97e32b5028634,2024-11-21T01:53:09.803000 -CVE-2013-3199,0,1,36a93d737af64c315b67e2294b3c4b32a9456fdb2e1eec34a386a4b145638e18,2024-11-21T01:53:09.907000 -CVE-2013-3200,0,1,79a8d3e2d8985be4c289ae223e9ab3491cdca852ba31c6e44fa62531359914fd,2024-11-21T01:53:10.013000 -CVE-2013-3201,0,1,8e9a3eea5c85202379feee4b2ad500d4403413d0139698d430f823ad141b3f83,2024-11-21T01:53:10.120000 -CVE-2013-3202,0,1,81b560b255099ca31291b4042bbc71fe2a4e1e8f748ae445a0cd36179886f142,2024-11-21T01:53:10.233000 -CVE-2013-3203,0,1,901f2d99b19008a03f6f4a9de1af07f3f403f2dc42a8a4b033ab9aa69f58793b,2024-11-21T01:53:10.333000 -CVE-2013-3204,0,1,725a010e1460f7a580fb655962f1f28db1cc3b9ad566e97b91e0d15469f2bacb,2024-11-21T01:53:10.447000 -CVE-2013-3205,0,1,4f8ba57f3ee41ae2e6c3dbacc53fef932f9891a3090222e00720552546b7c2bb,2024-11-21T01:53:10.543000 -CVE-2013-3206,0,1,0e7c5aeea878dc48101f32350363036d7673cf5747814b1f9982d8025dd1e508,2024-11-21T01:53:10.647000 -CVE-2013-3207,0,1,e351708918bac3cbd0f4c5f4ce1ad8899d94fbc3803b89f1db8a0d58593b5d6a,2024-11-21T01:53:10.763000 -CVE-2013-3208,0,1,979e89d618f04799e21a50f0381847c4422af4d0231f62c9e158718b676900f4,2024-11-21T01:53:10.883000 -CVE-2013-3209,0,1,919ff45f6425679262187ee3a462db0c61828d7e4cb9aa65a7d7021fe075e545,2024-11-21T01:53:10.980000 -CVE-2013-3210,0,1,117a4deed3d16db3cb58d447b09e2fc6752644eb31389efb48ba40fdcc9205db,2024-11-21T01:53:11.080000 -CVE-2013-3211,0,1,fdde6c1483a516dfc1f42a664f538ee30cf5dee8b4f4739ff6a11b20b99b4a3a,2024-11-21T01:53:11.233000 +CVE-2013-3178,0,0,1278026eb73514077939ac9315a94d00a5502966b1c6473142fa49821164014c,2024-11-21T01:53:07.700000 +CVE-2013-3179,0,0,636cc932a4e89b1a8bf70dc20369ea7e6104377e185be21eb811fcf890dfa8bb,2024-11-21T01:53:07.827000 +CVE-2013-3180,0,0,961a0037d116c72f3ba76722fa620b2f132a61b262981ca7a28494dd98407ae5,2024-11-21T01:53:07.930000 +CVE-2013-3181,0,0,d49eb96ec85b49613205236a5b4e48a1d485e3ed1d5af75e7783f4fb4c9fe9ad,2024-11-21T01:53:08.030000 +CVE-2013-3182,0,0,cec41b3aa47d95b77a2d17ac5b165fff0aa8199bef84612b0b64a9c13a044568,2024-11-21T01:53:08.140000 +CVE-2013-3183,0,0,c49d38733ab9b69a33cf4fe226befd5d02cd52306d4d26ca7ffc09e4acd0113d,2024-11-21T01:53:08.243000 +CVE-2013-3184,0,0,059ed3c6ee718790bf1ef6e89347678e34031f80af9b1c02344a0509ebb26b91,2024-11-21T01:53:08.357000 +CVE-2013-3185,0,0,67c67e8394bdd09d785c129a1ca1873206603b8289ec08a7d29325cd87472ea9,2024-11-21T01:53:08.457000 +CVE-2013-3186,0,0,d3aa84ccc1cf258a38486612092487b6d60068213e2b07c62aa652ade9897078,2024-11-21T01:53:08.560000 +CVE-2013-3187,0,0,08e685350f6a57a42e0e5cb07a13e5dd0adceee3c91cad86b9866185fb3ee68e,2024-11-21T01:53:08.667000 +CVE-2013-3188,0,0,25a8737da59c53643f51f6d379aa00084696b8a8270730165cf7b70c167f08d3,2024-11-21T01:53:08.763000 +CVE-2013-3189,0,0,87fabc4d8ed85c6451b851eeeceb2f21671d6db9ff8a5f8a26abd18405e64a3c,2024-11-21T01:53:08.873000 +CVE-2013-3190,0,0,5182682c155fdda8abcb695c67970a7dfe9fb1d4934816792397bded8fcbddd8,2024-11-21T01:53:08.983000 +CVE-2013-3191,0,0,5e125990b88da4ebc1428fff37ef17d40991ecd5666a6026be7fdf072ff1ca7b,2024-11-21T01:53:09.090000 +CVE-2013-3192,0,0,71fd27294deb3968928d4c4ca55e4c4f2277167ad333a2d0409140348e12ab4c,2024-11-21T01:53:09.187000 +CVE-2013-3193,0,0,077386074c45e473be96c5919b45309e9a145cb1521ce4c8d9025eb626027ef1,2024-11-21T01:53:09.283000 +CVE-2013-3194,0,0,98bc039c8e346ccb4712d333623f074fa4106945ed45dcc6137a937cf80b9852,2024-11-21T01:53:09.387000 +CVE-2013-3195,0,0,1b89e2ff0120a36ae7bd78f0941b2855107c17ab017bec2a74f91571fc06beb8,2024-11-21T01:53:09.490000 +CVE-2013-3196,0,0,d1bd0335ad92ed06b9fed2df63b5bd299b347a7f91a5d05c6dd9fdcffae50d48,2024-11-21T01:53:09.597000 +CVE-2013-3197,0,0,35b5b4bf42a0ccb45346f6f40e0c8590bf3cc3dc357da353b84b84f16d902df5,2024-11-21T01:53:09.697000 +CVE-2013-3198,0,0,56ffaf70333185c0328b112aa3f496cfef80b3ea4ada44e6c3d97e32b5028634,2024-11-21T01:53:09.803000 +CVE-2013-3199,0,0,36a93d737af64c315b67e2294b3c4b32a9456fdb2e1eec34a386a4b145638e18,2024-11-21T01:53:09.907000 +CVE-2013-3200,0,0,79a8d3e2d8985be4c289ae223e9ab3491cdca852ba31c6e44fa62531359914fd,2024-11-21T01:53:10.013000 +CVE-2013-3201,0,0,8e9a3eea5c85202379feee4b2ad500d4403413d0139698d430f823ad141b3f83,2024-11-21T01:53:10.120000 +CVE-2013-3202,0,0,81b560b255099ca31291b4042bbc71fe2a4e1e8f748ae445a0cd36179886f142,2024-11-21T01:53:10.233000 +CVE-2013-3203,0,0,901f2d99b19008a03f6f4a9de1af07f3f403f2dc42a8a4b033ab9aa69f58793b,2024-11-21T01:53:10.333000 +CVE-2013-3204,0,0,725a010e1460f7a580fb655962f1f28db1cc3b9ad566e97b91e0d15469f2bacb,2024-11-21T01:53:10.447000 +CVE-2013-3205,0,0,4f8ba57f3ee41ae2e6c3dbacc53fef932f9891a3090222e00720552546b7c2bb,2024-11-21T01:53:10.543000 +CVE-2013-3206,0,0,0e7c5aeea878dc48101f32350363036d7673cf5747814b1f9982d8025dd1e508,2024-11-21T01:53:10.647000 +CVE-2013-3207,0,0,e351708918bac3cbd0f4c5f4ce1ad8899d94fbc3803b89f1db8a0d58593b5d6a,2024-11-21T01:53:10.763000 +CVE-2013-3208,0,0,979e89d618f04799e21a50f0381847c4422af4d0231f62c9e158718b676900f4,2024-11-21T01:53:10.883000 +CVE-2013-3209,0,0,919ff45f6425679262187ee3a462db0c61828d7e4cb9aa65a7d7021fe075e545,2024-11-21T01:53:10.980000 +CVE-2013-3210,0,0,117a4deed3d16db3cb58d447b09e2fc6752644eb31389efb48ba40fdcc9205db,2024-11-21T01:53:11.080000 +CVE-2013-3211,0,0,fdde6c1483a516dfc1f42a664f538ee30cf5dee8b4f4739ff6a11b20b99b4a3a,2024-11-21T01:53:11.233000 CVE-2013-3212,0,0,f39879661b85e8a31bb0de4cdb662f8dc7196cc6cff6dcfaefa619c11187d048,2020-02-03T18:52:20.870000 -CVE-2013-3213,0,1,868536d65277617f77354c70eed6a64a82b8973a2d4b0f0442c300464339f559,2024-11-21T01:53:11.547000 +CVE-2013-3213,0,0,868536d65277617f77354c70eed6a64a82b8973a2d4b0f0442c300464339f559,2024-11-21T01:53:11.547000 CVE-2013-3214,0,0,b206748e9a655ca39102d0c61c8f322a6031ee385f88c8704895f8eb4fd8e9d3,2020-01-31T19:07:00.973000 CVE-2013-3215,0,0,223cadbd0dafe8ba519da529910aa5e0f2fc5e64c19aa10885c3d342e5721c33,2020-01-31T19:54:10.247000 -CVE-2013-3219,0,1,afd0679ee1d443cb756ff0802cbb4d074a358b56ca527b316ce48712df56edf8,2024-11-21T01:53:11.970000 -CVE-2013-3220,0,1,8b2262a0598de372c9e2bd8b41aa6e7a862ef1c0098ebf57a90341c43eec862b,2024-11-21T01:53:12.110000 -CVE-2013-3221,0,1,fae73673c30f3d544efbf490cb0a065930f3880dcce8b00efc95c0962f421111,2024-11-21T01:53:12.260000 -CVE-2013-3222,0,1,9a293d2415e119e6bbf0d78fcce33ac6e2715cfcf8a0b776127906b6d2e59224,2024-11-21T01:53:12.430000 -CVE-2013-3223,0,1,0bc9bb1a5eac024a8a130c28ed65e79acc9f33ec065edcd19b4125922994ba2d,2024-11-21T01:53:12.577000 -CVE-2013-3224,0,1,016173a5034c2489b08c0fc2978133f5282affb3fdc804e94d84299320d616d4,2024-11-21T01:53:12.727000 -CVE-2013-3225,0,1,e15585dab74cfe3d567a1feac3e90e104c6f804eee4d8becddcc531ef699f5f9,2024-11-21T01:53:12.877000 -CVE-2013-3226,0,1,01a6f1a638409c3196611a1aaed750c9e7c1d1677f17b5257525ede3935314a3,2024-11-21T01:53:13.033000 -CVE-2013-3227,0,1,9e921c050ea3b2330324eedd89da9103add2435ad7434348c8954f7d6e03e273,2024-11-21T01:53:13.173000 -CVE-2013-3228,0,1,da529fc6fe9dfad17ce739d18771cff9ae8a217cc6a4bc697eb4281a2cda6e84,2024-11-21T01:53:13.320000 -CVE-2013-3229,0,1,d3c214d4b5dec6c395a0e9a11f27ec31bf07b5a1bc8937b09033264f592d2151,2024-11-21T01:53:13.477000 -CVE-2013-3230,0,1,158e197f973749456676eb902fe4f1849e2ef2a6d229db9faa80b3426b7f6bc8,2024-11-21T01:53:13.623000 -CVE-2013-3231,0,1,1fde7ac667c2322ecec92b06698ba2470f71812ffba2e3789d2f8ae3371b04f6,2024-11-21T01:53:13.767000 -CVE-2013-3232,0,1,63e70e38d6cf1dc0d5f0b5201af34b6ca5065f93aec070eb9d393b184a49fcbf,2024-11-21T01:53:13.910000 -CVE-2013-3233,0,1,5c2804a4dc4e59ad9478e6898af6cbb78eda7a2ac17f780a50bf5bb2d715957f,2024-11-21T01:53:14.063000 -CVE-2013-3234,0,1,fa8731a6bf025221f3c93e5426eb2b6e3b0acacb5744fbe50a3a83a10baaaa57,2024-11-21T01:53:14.213000 -CVE-2013-3235,0,1,f17489202d33b80a6ecefa25374d90b77b48815a6ee2af1ed7d192523d215bbc,2024-11-21T01:53:14.357000 -CVE-2013-3236,0,1,002ee049e02869c84dff9143d981a3f1ed98b4f6baec8c19fd972439237bef5e,2024-11-21T01:53:14.500000 -CVE-2013-3237,0,1,918e03f485ce4731bd687fd14cdac0156f31a96912ec1fe58a48a332d85a619d,2024-11-21T01:53:14.647000 -CVE-2013-3238,0,1,12aa9eb6b52ea68ef5478e2c3302e16b78987f52d3d28b087c3f4b2c60bab264,2024-11-21T01:53:14.783000 -CVE-2013-3239,0,1,f8873333b60dce01a6cdeadcc7e2c7c5ccdbe2dffbe0fc40a365173a72388de5,2024-11-21T01:53:14.930000 -CVE-2013-3240,0,1,1ee1ba893350b4f0a4120cd0242d1094ed4ca86423a37794c1bccb65eee7acfd,2024-11-21T01:53:15.080000 -CVE-2013-3241,0,1,064beea1030e3987ab316a4ce85bda38248c24d5ff14f2cc7362f4aa2efecffc,2024-11-21T01:53:15.217000 -CVE-2013-3242,0,1,bc9d2db24ca4d707d24ea6f6cd862c657621e9a39ee9eb5aca3a12d2affdfca1,2024-11-21T01:53:15.360000 -CVE-2013-3243,0,1,2f0fd775395e799443ffc64807531efcfb325ca348b6cb27cd1751e5885e2358,2024-11-21T01:53:15.530000 -CVE-2013-3244,0,1,bec0c744dc981be71515da9a4c8cd40048136a0caed5cdf707935d7a54fd2f9b,2024-11-21T01:53:15.663000 -CVE-2013-3245,0,1,c73e667d82fe5359a34115d3778d72849abf1c76cd7cc3fc614081205914de8d,2024-11-21T01:53:15.800000 +CVE-2013-3219,0,0,afd0679ee1d443cb756ff0802cbb4d074a358b56ca527b316ce48712df56edf8,2024-11-21T01:53:11.970000 +CVE-2013-3220,0,0,8b2262a0598de372c9e2bd8b41aa6e7a862ef1c0098ebf57a90341c43eec862b,2024-11-21T01:53:12.110000 +CVE-2013-3221,0,0,fae73673c30f3d544efbf490cb0a065930f3880dcce8b00efc95c0962f421111,2024-11-21T01:53:12.260000 +CVE-2013-3222,0,0,9a293d2415e119e6bbf0d78fcce33ac6e2715cfcf8a0b776127906b6d2e59224,2024-11-21T01:53:12.430000 +CVE-2013-3223,0,0,0bc9bb1a5eac024a8a130c28ed65e79acc9f33ec065edcd19b4125922994ba2d,2024-11-21T01:53:12.577000 +CVE-2013-3224,0,0,016173a5034c2489b08c0fc2978133f5282affb3fdc804e94d84299320d616d4,2024-11-21T01:53:12.727000 +CVE-2013-3225,0,0,e15585dab74cfe3d567a1feac3e90e104c6f804eee4d8becddcc531ef699f5f9,2024-11-21T01:53:12.877000 +CVE-2013-3226,0,0,01a6f1a638409c3196611a1aaed750c9e7c1d1677f17b5257525ede3935314a3,2024-11-21T01:53:13.033000 +CVE-2013-3227,0,0,9e921c050ea3b2330324eedd89da9103add2435ad7434348c8954f7d6e03e273,2024-11-21T01:53:13.173000 +CVE-2013-3228,0,0,da529fc6fe9dfad17ce739d18771cff9ae8a217cc6a4bc697eb4281a2cda6e84,2024-11-21T01:53:13.320000 +CVE-2013-3229,0,0,d3c214d4b5dec6c395a0e9a11f27ec31bf07b5a1bc8937b09033264f592d2151,2024-11-21T01:53:13.477000 +CVE-2013-3230,0,0,158e197f973749456676eb902fe4f1849e2ef2a6d229db9faa80b3426b7f6bc8,2024-11-21T01:53:13.623000 +CVE-2013-3231,0,0,1fde7ac667c2322ecec92b06698ba2470f71812ffba2e3789d2f8ae3371b04f6,2024-11-21T01:53:13.767000 +CVE-2013-3232,0,0,63e70e38d6cf1dc0d5f0b5201af34b6ca5065f93aec070eb9d393b184a49fcbf,2024-11-21T01:53:13.910000 +CVE-2013-3233,0,0,5c2804a4dc4e59ad9478e6898af6cbb78eda7a2ac17f780a50bf5bb2d715957f,2024-11-21T01:53:14.063000 +CVE-2013-3234,0,0,fa8731a6bf025221f3c93e5426eb2b6e3b0acacb5744fbe50a3a83a10baaaa57,2024-11-21T01:53:14.213000 +CVE-2013-3235,0,0,f17489202d33b80a6ecefa25374d90b77b48815a6ee2af1ed7d192523d215bbc,2024-11-21T01:53:14.357000 +CVE-2013-3236,0,0,002ee049e02869c84dff9143d981a3f1ed98b4f6baec8c19fd972439237bef5e,2024-11-21T01:53:14.500000 +CVE-2013-3237,0,0,918e03f485ce4731bd687fd14cdac0156f31a96912ec1fe58a48a332d85a619d,2024-11-21T01:53:14.647000 +CVE-2013-3238,0,0,12aa9eb6b52ea68ef5478e2c3302e16b78987f52d3d28b087c3f4b2c60bab264,2024-11-21T01:53:14.783000 +CVE-2013-3239,0,0,f8873333b60dce01a6cdeadcc7e2c7c5ccdbe2dffbe0fc40a365173a72388de5,2024-11-21T01:53:14.930000 +CVE-2013-3240,0,0,1ee1ba893350b4f0a4120cd0242d1094ed4ca86423a37794c1bccb65eee7acfd,2024-11-21T01:53:15.080000 +CVE-2013-3241,0,0,064beea1030e3987ab316a4ce85bda38248c24d5ff14f2cc7362f4aa2efecffc,2024-11-21T01:53:15.217000 +CVE-2013-3242,0,0,bc9d2db24ca4d707d24ea6f6cd862c657621e9a39ee9eb5aca3a12d2affdfca1,2024-11-21T01:53:15.360000 +CVE-2013-3243,0,0,2f0fd775395e799443ffc64807531efcfb325ca348b6cb27cd1751e5885e2358,2024-11-21T01:53:15.530000 +CVE-2013-3244,0,0,bec0c744dc981be71515da9a4c8cd40048136a0caed5cdf707935d7a54fd2f9b,2024-11-21T01:53:15.663000 +CVE-2013-3245,0,0,c73e667d82fe5359a34115d3778d72849abf1c76cd7cc3fc614081205914de8d,2024-11-21T01:53:15.800000 CVE-2013-3246,0,0,7f52d3c6396b70f0d8cf41b3917bca92044563159c7a73505f72d492d82bf9cb,2020-01-03T21:16:33.960000 CVE-2013-3247,0,0,b2e71957bd4edb912097f05705ff8c59b72aec42c5e95e95b6a4be1b9dcc592a,2020-01-03T20:43:10.653000 -CVE-2013-3248,0,1,1eba13156a0cffa3148b9f029fbbaa04894e986a5cba6ad5238600377d73d34f,2024-11-21T01:53:16.183000 -CVE-2013-3249,0,1,7b85adad5acc5d3e4e73bbd0ab5e6346a9b426ec592290015f5637d5c578e037,2024-11-21T01:53:16.290000 -CVE-2013-3250,0,1,9c5092f42a439f3fcfe41faf2889a3857044acb0174def57ff91db88997a0417,2024-11-21T01:53:16.397000 -CVE-2013-3251,0,1,2b52af2c0bac061090cfb96a959dc97746b78322f7aae983c79c20d2926e0430,2024-11-21T01:53:16.520000 -CVE-2013-3252,0,1,27e6be28959ce42b710cfa6664b466b4c0917094bbbeabac761791bda4290800,2024-11-21T01:53:16.630000 -CVE-2013-3253,0,1,c1004b02136a0caeec9770dc5d13020ab848dd69a97c00e8bc2d91c2d006490a,2024-11-21T01:53:16.740000 -CVE-2013-3254,0,1,6ad542dc44797ac53a8b290a4a14ec5088d57150be1d3e48336766a589de55d2,2024-11-21T01:53:16.860000 -CVE-2013-3256,0,1,1c5d0bf186a903df94d5e18d57a83b20e3beb8fd09ae048661e79c165678d224,2024-11-21T01:53:16.960000 +CVE-2013-3248,0,0,1eba13156a0cffa3148b9f029fbbaa04894e986a5cba6ad5238600377d73d34f,2024-11-21T01:53:16.183000 +CVE-2013-3249,0,0,7b85adad5acc5d3e4e73bbd0ab5e6346a9b426ec592290015f5637d5c578e037,2024-11-21T01:53:16.290000 +CVE-2013-3250,0,0,9c5092f42a439f3fcfe41faf2889a3857044acb0174def57ff91db88997a0417,2024-11-21T01:53:16.397000 +CVE-2013-3251,0,0,2b52af2c0bac061090cfb96a959dc97746b78322f7aae983c79c20d2926e0430,2024-11-21T01:53:16.520000 +CVE-2013-3252,0,0,27e6be28959ce42b710cfa6664b466b4c0917094bbbeabac761791bda4290800,2024-11-21T01:53:16.630000 +CVE-2013-3253,0,0,c1004b02136a0caeec9770dc5d13020ab848dd69a97c00e8bc2d91c2d006490a,2024-11-21T01:53:16.740000 +CVE-2013-3254,0,0,6ad542dc44797ac53a8b290a4a14ec5088d57150be1d3e48336766a589de55d2,2024-11-21T01:53:16.860000 +CVE-2013-3256,0,0,1c5d0bf186a903df94d5e18d57a83b20e3beb8fd09ae048661e79c165678d224,2024-11-21T01:53:16.960000 CVE-2013-3257,0,0,40abb2f1a8c9cb12396f810be6db9bd67e88bb1bbb55549a74edaeccbf303ddb,2017-08-29T01:33:22.217000 CVE-2013-3258,0,0,85542b186886416abeab660b22d059c38a2a79621c9819674416b49196a083cf,2017-08-29T01:33:22.293000 -CVE-2013-3259,0,1,050d06c0187b96ad53baefedc9a986117cbd905dbffe7ba1f0a66b6ee2098e7e,2024-11-21T01:53:17.297000 -CVE-2013-3260,0,1,df35773f9cd23e66463461c1cc8a95459dcf5b3615375ebfcca89423c849d0de,2024-11-21T01:53:17.400000 -CVE-2013-3261,0,1,a001f465ce77d3414daa941bb55fa2cfb7557c148c8c0eb58677e5a436747f6d,2024-11-21T01:53:17.510000 -CVE-2013-3262,0,1,dc0a75a3c685d100fda26fb27a8c3fcc48d131949348f650303b094deb2b6bac,2024-11-21T01:53:17.640000 -CVE-2013-3263,0,1,d8cd8e4949d13ee62dce1ae52bbb074affc33c4cae1caaa43d347cb8166f45e9,2024-11-21T01:53:17.757000 -CVE-2013-3264,0,1,7ba4f73609fcd8e89f49ec229134908c4fc68ff50e35d2ee7366841adfb963aa,2024-11-21T01:53:17.867000 -CVE-2013-3266,0,1,4928666d74ff938b2996898a0b7fe738b7465267332d118d73bfbd4f6c156df5,2024-11-21T01:53:17.960000 -CVE-2013-3267,0,1,f314fa59286def45e1907379e4b46dfb5e3a3fccaf76dcc5e35d9ca3d79de063,2024-11-21T01:53:18.093000 -CVE-2013-3268,0,1,bd40ecb86d0b8c135621c823525ff3b54b6f0819dd4502c459fe8237dfd50810,2024-11-21T01:53:18.233000 -CVE-2013-3269,0,1,e422a490e6481c3f012ed36688128bda17d76261c46e52a458bd3701d1e0ea14,2024-11-21T01:53:18.380000 -CVE-2013-3270,0,1,0eefba7b4270838d940d3e45361eaedb7f2d60ac9bf86e2a4024e38e4f023b0f,2024-11-21T01:53:18.517000 -CVE-2013-3271,0,1,2ee43f41d78c513c66b3949711c01d307f5595e45d53b69efccc9bc862e49c13,2024-11-21T01:53:18.620000 -CVE-2013-3272,0,1,d0d72535f0affccba4aac40b5e643c7dca79c7b0ce13d3d07de26fbfe2abd7c2,2024-11-21T01:53:18.723000 -CVE-2013-3273,0,1,999c3504370ec1167a0fe9b7d9f00f6210ea87777f53656b4e696efd8001396c,2024-11-21T01:53:18.827000 -CVE-2013-3274,0,1,226acef4f2ec312c51898cd9091aa52fd5dad01840236344ee7ef70148135b67,2024-11-21T01:53:18.923000 -CVE-2013-3275,0,1,c7bf089cf0f69cca93db992f28c84d36f726b1ea06b583050a6009c06a0f1f4d,2024-11-21T01:53:19.027000 -CVE-2013-3276,0,1,772c90f01df08835c570f7786223a3f1a938f347b64264b605458f8cc2322010,2024-11-21T01:53:19.137000 -CVE-2013-3277,0,1,61932bebb49e573b2d232b279de3092bf7537d00ab41174ba7f6016d109aeed0,2024-11-21T01:53:19.240000 -CVE-2013-3278,0,1,fc57e7cadfa9155e5c8d39b375c093e4db82d9a13693f96d721c25f995fef5c2,2024-11-21T01:53:19.340000 -CVE-2013-3279,0,1,b6685d2f6dc2569625c6a5b95ae9e1910faf719cbab1a56556d602baafaf3247,2024-11-21T01:53:19.443000 -CVE-2013-3280,0,1,1ccef98013f9bc8148e57dbaeabeafc7102153cc5dda8eecd37047d2ce97db0f,2024-11-21T01:53:19.530000 -CVE-2013-3281,0,1,a7272b145723aaf436b68fa287a3bde3196c35e879ef6d975b1feef0820c140d,2024-11-21T01:53:19.640000 +CVE-2013-3259,0,0,050d06c0187b96ad53baefedc9a986117cbd905dbffe7ba1f0a66b6ee2098e7e,2024-11-21T01:53:17.297000 +CVE-2013-3260,0,0,df35773f9cd23e66463461c1cc8a95459dcf5b3615375ebfcca89423c849d0de,2024-11-21T01:53:17.400000 +CVE-2013-3261,0,0,a001f465ce77d3414daa941bb55fa2cfb7557c148c8c0eb58677e5a436747f6d,2024-11-21T01:53:17.510000 +CVE-2013-3262,0,0,dc0a75a3c685d100fda26fb27a8c3fcc48d131949348f650303b094deb2b6bac,2024-11-21T01:53:17.640000 +CVE-2013-3263,0,0,d8cd8e4949d13ee62dce1ae52bbb074affc33c4cae1caaa43d347cb8166f45e9,2024-11-21T01:53:17.757000 +CVE-2013-3264,0,0,7ba4f73609fcd8e89f49ec229134908c4fc68ff50e35d2ee7366841adfb963aa,2024-11-21T01:53:17.867000 +CVE-2013-3266,0,0,4928666d74ff938b2996898a0b7fe738b7465267332d118d73bfbd4f6c156df5,2024-11-21T01:53:17.960000 +CVE-2013-3267,0,0,f314fa59286def45e1907379e4b46dfb5e3a3fccaf76dcc5e35d9ca3d79de063,2024-11-21T01:53:18.093000 +CVE-2013-3268,0,0,bd40ecb86d0b8c135621c823525ff3b54b6f0819dd4502c459fe8237dfd50810,2024-11-21T01:53:18.233000 +CVE-2013-3269,0,0,e422a490e6481c3f012ed36688128bda17d76261c46e52a458bd3701d1e0ea14,2024-11-21T01:53:18.380000 +CVE-2013-3270,0,0,0eefba7b4270838d940d3e45361eaedb7f2d60ac9bf86e2a4024e38e4f023b0f,2024-11-21T01:53:18.517000 +CVE-2013-3271,0,0,2ee43f41d78c513c66b3949711c01d307f5595e45d53b69efccc9bc862e49c13,2024-11-21T01:53:18.620000 +CVE-2013-3272,0,0,d0d72535f0affccba4aac40b5e643c7dca79c7b0ce13d3d07de26fbfe2abd7c2,2024-11-21T01:53:18.723000 +CVE-2013-3273,0,0,999c3504370ec1167a0fe9b7d9f00f6210ea87777f53656b4e696efd8001396c,2024-11-21T01:53:18.827000 +CVE-2013-3274,0,0,226acef4f2ec312c51898cd9091aa52fd5dad01840236344ee7ef70148135b67,2024-11-21T01:53:18.923000 +CVE-2013-3275,0,0,c7bf089cf0f69cca93db992f28c84d36f726b1ea06b583050a6009c06a0f1f4d,2024-11-21T01:53:19.027000 +CVE-2013-3276,0,0,772c90f01df08835c570f7786223a3f1a938f347b64264b605458f8cc2322010,2024-11-21T01:53:19.137000 +CVE-2013-3277,0,0,61932bebb49e573b2d232b279de3092bf7537d00ab41174ba7f6016d109aeed0,2024-11-21T01:53:19.240000 +CVE-2013-3278,0,0,fc57e7cadfa9155e5c8d39b375c093e4db82d9a13693f96d721c25f995fef5c2,2024-11-21T01:53:19.340000 +CVE-2013-3279,0,0,b6685d2f6dc2569625c6a5b95ae9e1910faf719cbab1a56556d602baafaf3247,2024-11-21T01:53:19.443000 +CVE-2013-3280,0,0,1ccef98013f9bc8148e57dbaeabeafc7102153cc5dda8eecd37047d2ce97db0f,2024-11-21T01:53:19.530000 +CVE-2013-3281,0,0,a7272b145723aaf436b68fa287a3bde3196c35e879ef6d975b1feef0820c140d,2024-11-21T01:53:19.640000 CVE-2013-3282,0,0,a8111fe8d85f10b3bd1ee3f640c244a78f5f52c40fe1c47a50ae13d984879b80,2023-11-07T02:15:55.583000 CVE-2013-3283,0,0,c0251408a2dca53eed190f6145d43c44e34221c62c6cf8b172f9ff27ee7e2678,2023-11-07T02:15:55.800000 CVE-2013-3284,0,0,6de43dd8aeb8047e2e62b64f023f2031c762305743cf3d1b3f4f178986b7eb41,2023-11-07T02:15:56.030000 -CVE-2013-3285,0,1,e9802cccc9e9774ff7960c387fcc65e360fa042740100c244afb40e496d35cc9,2024-11-21T01:53:19.800000 -CVE-2013-3286,0,1,f9540f053d47fe560a9bc83eb43f6feb596891bae930931f7dfe12e0844fd1b1,2024-11-21T01:53:19.907000 -CVE-2013-3287,0,1,25d0b16d6e4873093d22ce7aa69b27e8c13bcf56e797be3f912b5dcad5a8b69d,2024-11-21T01:53:20.027000 -CVE-2013-3288,0,1,f7e3c5217224fd345762c3e0792c83fcf2207e72b5d6d0fb38d91c9d8e2650eb,2024-11-21T01:53:20.133000 +CVE-2013-3285,0,0,e9802cccc9e9774ff7960c387fcc65e360fa042740100c244afb40e496d35cc9,2024-11-21T01:53:19.800000 +CVE-2013-3286,0,0,f9540f053d47fe560a9bc83eb43f6feb596891bae930931f7dfe12e0844fd1b1,2024-11-21T01:53:19.907000 +CVE-2013-3287,0,0,25d0b16d6e4873093d22ce7aa69b27e8c13bcf56e797be3f912b5dcad5a8b69d,2024-11-21T01:53:20.027000 +CVE-2013-3288,0,0,f7e3c5217224fd345762c3e0792c83fcf2207e72b5d6d0fb38d91c9d8e2650eb,2024-11-21T01:53:20.133000 CVE-2013-3289,0,0,676cdd3bf356761be512b10edcfcf96cd5cca1a3e4231d2b9e64d9b1ec5c9694,2023-11-07T02:15:56.320000 -CVE-2013-3294,0,1,e4386396f72957295ac6096973e9db2d18c967e769ad23c8c1c19b87ef360769,2024-11-21T01:53:20.250000 +CVE-2013-3294,0,0,e4386396f72957295ac6096973e9db2d18c967e769ad23c8c1c19b87ef360769,2024-11-21T01:53:20.250000 CVE-2013-3295,0,0,4cba920c4ee4a0a8aa6817f5529ee264bc6203bf3d4272ca7d0b724080c6c9b3,2014-12-30T15:31:57.707000 -CVE-2013-3299,0,1,ffdba114a67597f297d765de73c210f89d7331da84bfac9680ecf79bf2a58665,2024-11-21T01:53:20.540000 -CVE-2013-3300,0,1,e6fa5af48c10b4794c38618932e79b9be9e73358f756405b891e46206f62be30,2024-11-21T01:53:20.680000 -CVE-2013-3301,0,1,e80d6b778d1bad473d0176210971cbf21d0e3fc7bf2587b83931263c8186abe2,2024-11-21T01:53:20.823000 -CVE-2013-3302,0,1,30f12f7ed060d86a91a1061d06ef545006bfe980f411792610978e9a6d57de38,2024-11-21T01:53:20.957000 +CVE-2013-3299,0,0,ffdba114a67597f297d765de73c210f89d7331da84bfac9680ecf79bf2a58665,2024-11-21T01:53:20.540000 +CVE-2013-3300,0,0,e6fa5af48c10b4794c38618932e79b9be9e73358f756405b891e46206f62be30,2024-11-21T01:53:20.680000 +CVE-2013-3301,0,0,e80d6b778d1bad473d0176210971cbf21d0e3fc7bf2587b83931263c8186abe2,2024-11-21T01:53:20.823000 +CVE-2013-3302,0,0,30f12f7ed060d86a91a1061d06ef545006bfe980f411792610978e9a6d57de38,2024-11-21T01:53:20.957000 CVE-2013-3304,0,0,05966eca5bfe9d7a69ed30ce06555161a2f7d7b85d2f00fee087b98e277c1156,2014-10-31T19:04:58.547000 CVE-2013-3311,0,0,68cd48096661a562f597734a66dbc537c062359b102296d101dffdbd69a77169,2019-11-27T16:02:39.577000 CVE-2013-3312,0,0,ea24a6b072235856c95eaa397dfd3d7d5021f31dc6932a3a0f4c14f4791f117b,2019-11-27T15:55:08.400000 CVE-2013-3313,0,0,9447b06535677eb70f41bae06baee66d38ca10eae2638c21c63bb45b7b6317d8,2019-11-27T15:51:22.970000 CVE-2013-3314,0,0,65d125b871d29c196460c9e295f1c9c7c17458ca29cb773fefec5ba4e6bd2b72,2019-11-27T15:47:51.803000 -CVE-2013-3315,0,1,ade5eaa72dd86b735406db7b69bd16d5ed74394f41d6035a05bc70c9ff39087f,2024-11-21T01:53:21.860000 +CVE-2013-3315,0,0,ade5eaa72dd86b735406db7b69bd16d5ed74394f41d6035a05bc70c9ff39087f,2024-11-21T01:53:21.860000 CVE-2013-3316,0,0,6614de1d1159351cecd44b08ab5bf04a58dfd6a5ae642e89aa5aab3d5972b691,2020-02-01T17:11:28.773000 CVE-2013-3317,0,0,bf6bcafb2c3054284211f35045b717ccb025fa8d6a48218928684f000be02882,2020-02-01T17:02:56.693000 CVE-2013-3318,0,0,e952da71b62dcf487f34f3b0e8a95d82da1da36b9b0dbe8b2c50c6ff3fbe0ee1,2023-11-07T02:15:56.667000 -CVE-2013-3319,0,1,2c4519d673be68c1fed14e239041266d791fb93eac0c86407a797cd9d579e052,2024-11-21T01:53:22.450000 +CVE-2013-3319,0,0,2c4519d673be68c1fed14e239041266d791fb93eac0c86407a797cd9d579e052,2024-11-21T01:53:22.450000 CVE-2013-3320,0,0,f2931c9a1efb21c29d5d8725ddefdfc9051c2348ebd2b9181e60fb8e6ba4ead1,2020-01-31T14:19:57.353000 CVE-2013-3321,0,0,15c640f2066ed461d3d4f01bf33dc69fa4208a5fec476a7c08b5107df028d91f,2020-01-31T19:49:18.237000 CVE-2013-3322,0,0,901df9ecd7cae5c566312de26d17e0ca7d81c386463184d8964d9eaebf220942,2020-02-05T16:36:10.293000 CVE-2013-3323,0,0,c0838210c0de6ec8b54fe58a05f38a4a0f7b3ee68bc42b0d188d482954a26413,2020-02-21T16:51:44.177000 -CVE-2013-3324,0,1,e411a3d99d80056170eb62d72628ac0150ca52ae590e9d4aa1913ad92c95a2a7,2024-11-21T01:53:23.880000 -CVE-2013-3325,0,1,8b38466f0ec38eebb7ffd1ebb61a90f18952c357296d48c1e8df661291a8054b,2024-11-21T01:53:24.017000 -CVE-2013-3326,0,1,ca28d06404ff87f909b0ae8df9c87133afca96a660c7389c8fd96280fb2b188d,2024-11-21T01:53:24.140000 -CVE-2013-3327,0,1,b5113cd2c85cdcec2d6943b5c661dac1878d0bf3844a24105f35d09281118918,2024-11-21T01:53:24.273000 -CVE-2013-3328,0,1,40e40a250040f79f06b205a54a26d94590bf69a0cf4e531be5f6103cddc5286b,2024-11-21T01:53:24.407000 -CVE-2013-3329,0,1,bd404a6932fea44325bed231e08e0653d817520fd904c1672c7dc9b2434819ab,2024-11-21T01:53:24.560000 -CVE-2013-3330,0,1,7b263d4dbde9723167ddf7e8d1d0423f2e71211eb58cea039621eb75e12ad346,2024-11-21T01:53:24.693000 -CVE-2013-3331,0,1,a056335bf7fffb565b97d28c55daef7144cc090f84f50e07fd6e435d68765bd7,2024-11-21T01:53:24.823000 -CVE-2013-3332,0,1,d8bbc6e914910b3d1f4d72d8ab520448035a4a0c5550ff6e9de8c8c4ffe153d0,2024-11-21T01:53:24.950000 -CVE-2013-3333,0,1,eeb8474a08fa878b1eba962f26bc1ac2b20b48623574179ccbc3ad83250f5c3d,2024-11-21T01:53:25.087000 -CVE-2013-3334,0,1,fd98df611fe1a25fb302f0636da10788cf308e377fdef9a322b6e066f2c3a8ea,2024-11-21T01:53:25.223000 -CVE-2013-3335,0,1,aa380536f23e6bf6cb2e7988f2df7ca20746c9173be7e2e2a73efa878b09e390,2024-11-21T01:53:25.360000 -CVE-2013-3336,0,1,99c3cf61a6b22fac0a101ea732cba0290a346f4bc68ba07c885102cd7c327bfe,2024-11-21T01:53:25.493000 -CVE-2013-3337,0,1,cb5086aace83d5da75492f78ceae392238bc680d7f9c5a7ec3cd40594daff296,2024-11-21T01:53:25.600000 -CVE-2013-3338,0,1,e47bf667d3510be79be391c78230e730185f782742d04ad226c2cc46172c2ed7,2024-11-21T01:53:25.743000 -CVE-2013-3339,0,1,2907b573409d41113124abd5ab94ed47e0a97d2e972133c24bdc67762e7d9be6,2024-11-21T01:53:25.883000 -CVE-2013-3340,0,1,00c6b156332b459214f27b63284aa90113a65c95340ab3438e17abb6cdfb4f00,2024-11-21T01:53:26.020000 -CVE-2013-3341,0,1,7895fb36e536ff7bc1c06734fc886182745bb567ad0484df16217d1c0a7f6010,2024-11-21T01:53:26.143000 -CVE-2013-3342,0,1,a4ea0a51de5a158fdf3ce43459508aef6de76726018d0595a52afe327672e148,2024-11-21T01:53:26.283000 -CVE-2013-3343,0,1,ed65ace398c2e83d8ca8967c3be0f8cb6b4184b73ec120de88197ff52160eaf5,2024-11-21T01:53:26.420000 -CVE-2013-3344,0,1,6da5392b2342076de46d41b51819f64b89851ed300387fe554ab69092b66af99,2024-11-21T01:53:26.550000 -CVE-2013-3345,0,1,8d62a2aa80bd6537d39dbc1ca1ca8d9e7a5f2b9067f1cd2dcca86255ba2ffc5c,2024-11-21T01:53:26.687000 -CVE-2013-3346,0,1,da22d0848d56df6cc67e430a5740ba03a24d88231ce394c01b66499af429ea74,2024-11-21T01:53:26.847000 -CVE-2013-3347,0,1,2060aa94ccdd291e46ace7d7716d305d60532c1b00e72cc743e3c954cf96c231,2024-11-21T01:53:26.953000 -CVE-2013-3348,0,1,bce01fd43193d0fb14fb8ba96ffc6deeda68bccbb4c301bc46ff6c4a195080b4,2024-11-21T01:53:27.097000 -CVE-2013-3349,0,1,3ea9dbd6724f2989bc6a149111bf89418f0deae519e9b36526a8185a5c1ca299,2024-11-21T01:53:27.220000 -CVE-2013-3350,0,1,d8d133c003da90f49e3f497df2427e0460432bca5cdba30511daa683dd48b046,2024-11-21T01:53:27.337000 -CVE-2013-3351,0,1,37e52a0e72ed8a5a8672090f0ed88381c9ebc34e61fa3577fbe30381617442b2,2024-11-21T01:53:27.447000 -CVE-2013-3352,0,1,63f383d72cef8e9111939c6f09f2ce87e8841c05cfe943d63dfe4842deee1b31,2024-11-21T01:53:27.563000 -CVE-2013-3353,0,1,cb5969796ea443854df76e62cfb1177846b1b503bc502e3076bdafbb5dee9d7e,2024-11-21T01:53:27.677000 -CVE-2013-3354,0,1,e61537900499b7c7aaeb29cb8876affa1106ec15714f58d5f8f2faabc0ef5114,2024-11-21T01:53:27.793000 -CVE-2013-3355,0,1,30e41e9e85fa45e309ba6fd94e929cedc1b7d72dd2532b6b1c2ce9a82e399b2c,2024-11-21T01:53:27.920000 -CVE-2013-3356,0,1,f5f3216d76683c8e910267b7f042d9449030b67992665a895ff7983253810e60,2024-11-21T01:53:28.037000 -CVE-2013-3357,0,1,0b7ab2997f639b2b2659c54fa476a7018956e51b7530a6d3312b45f4c9afd8e5,2024-11-21T01:53:28.153000 -CVE-2013-3358,0,1,fedfb513df7667518c21a3dd57175be10e6f73dfec3d9ddaa1f648566cb14463,2024-11-21T01:53:28.283000 -CVE-2013-3359,0,1,7a9c299bb0395ff972fed39e317f5b76581066e2c8d595eb10031d0e05016a3f,2024-11-21T01:53:28.403000 -CVE-2013-3360,0,1,cd3e3ee907ccb80272f7a3e3426da4e501ca2729522f20fa2105840b2f1138ed,2024-11-21T01:53:28.520000 -CVE-2013-3361,0,1,95b69a203f7d43f37092dd52b0ffff04171e24e03a72551aef0cfebfe53dfc9d,2024-11-21T01:53:28.640000 -CVE-2013-3362,0,1,b25695939128b1fc602a103e821bac26097276e2058c22144643b0b9b0046006,2024-11-21T01:53:28.770000 -CVE-2013-3363,0,1,574bc97e2acf70fa28abd3fb6275d32a436093e978545992e01fdf2c6240d406,2024-11-21T01:53:28.897000 -CVE-2013-3365,0,1,cd2979b16313e0c03aa8d6a71c3f85cac9f969de24fa766ff14c732958b3db31,2024-11-21T01:53:29.020000 +CVE-2013-3324,0,0,e411a3d99d80056170eb62d72628ac0150ca52ae590e9d4aa1913ad92c95a2a7,2024-11-21T01:53:23.880000 +CVE-2013-3325,0,0,8b38466f0ec38eebb7ffd1ebb61a90f18952c357296d48c1e8df661291a8054b,2024-11-21T01:53:24.017000 +CVE-2013-3326,0,0,ca28d06404ff87f909b0ae8df9c87133afca96a660c7389c8fd96280fb2b188d,2024-11-21T01:53:24.140000 +CVE-2013-3327,0,0,b5113cd2c85cdcec2d6943b5c661dac1878d0bf3844a24105f35d09281118918,2024-11-21T01:53:24.273000 +CVE-2013-3328,0,0,40e40a250040f79f06b205a54a26d94590bf69a0cf4e531be5f6103cddc5286b,2024-11-21T01:53:24.407000 +CVE-2013-3329,0,0,bd404a6932fea44325bed231e08e0653d817520fd904c1672c7dc9b2434819ab,2024-11-21T01:53:24.560000 +CVE-2013-3330,0,0,7b263d4dbde9723167ddf7e8d1d0423f2e71211eb58cea039621eb75e12ad346,2024-11-21T01:53:24.693000 +CVE-2013-3331,0,0,a056335bf7fffb565b97d28c55daef7144cc090f84f50e07fd6e435d68765bd7,2024-11-21T01:53:24.823000 +CVE-2013-3332,0,0,d8bbc6e914910b3d1f4d72d8ab520448035a4a0c5550ff6e9de8c8c4ffe153d0,2024-11-21T01:53:24.950000 +CVE-2013-3333,0,0,eeb8474a08fa878b1eba962f26bc1ac2b20b48623574179ccbc3ad83250f5c3d,2024-11-21T01:53:25.087000 +CVE-2013-3334,0,0,fd98df611fe1a25fb302f0636da10788cf308e377fdef9a322b6e066f2c3a8ea,2024-11-21T01:53:25.223000 +CVE-2013-3335,0,0,aa380536f23e6bf6cb2e7988f2df7ca20746c9173be7e2e2a73efa878b09e390,2024-11-21T01:53:25.360000 +CVE-2013-3336,0,0,99c3cf61a6b22fac0a101ea732cba0290a346f4bc68ba07c885102cd7c327bfe,2024-11-21T01:53:25.493000 +CVE-2013-3337,0,0,cb5086aace83d5da75492f78ceae392238bc680d7f9c5a7ec3cd40594daff296,2024-11-21T01:53:25.600000 +CVE-2013-3338,0,0,e47bf667d3510be79be391c78230e730185f782742d04ad226c2cc46172c2ed7,2024-11-21T01:53:25.743000 +CVE-2013-3339,0,0,2907b573409d41113124abd5ab94ed47e0a97d2e972133c24bdc67762e7d9be6,2024-11-21T01:53:25.883000 +CVE-2013-3340,0,0,00c6b156332b459214f27b63284aa90113a65c95340ab3438e17abb6cdfb4f00,2024-11-21T01:53:26.020000 +CVE-2013-3341,0,0,7895fb36e536ff7bc1c06734fc886182745bb567ad0484df16217d1c0a7f6010,2024-11-21T01:53:26.143000 +CVE-2013-3342,0,0,a4ea0a51de5a158fdf3ce43459508aef6de76726018d0595a52afe327672e148,2024-11-21T01:53:26.283000 +CVE-2013-3343,0,0,ed65ace398c2e83d8ca8967c3be0f8cb6b4184b73ec120de88197ff52160eaf5,2024-11-21T01:53:26.420000 +CVE-2013-3344,0,0,6da5392b2342076de46d41b51819f64b89851ed300387fe554ab69092b66af99,2024-11-21T01:53:26.550000 +CVE-2013-3345,0,0,8d62a2aa80bd6537d39dbc1ca1ca8d9e7a5f2b9067f1cd2dcca86255ba2ffc5c,2024-11-21T01:53:26.687000 +CVE-2013-3346,0,0,da22d0848d56df6cc67e430a5740ba03a24d88231ce394c01b66499af429ea74,2024-11-21T01:53:26.847000 +CVE-2013-3347,0,0,2060aa94ccdd291e46ace7d7716d305d60532c1b00e72cc743e3c954cf96c231,2024-11-21T01:53:26.953000 +CVE-2013-3348,0,0,bce01fd43193d0fb14fb8ba96ffc6deeda68bccbb4c301bc46ff6c4a195080b4,2024-11-21T01:53:27.097000 +CVE-2013-3349,0,0,3ea9dbd6724f2989bc6a149111bf89418f0deae519e9b36526a8185a5c1ca299,2024-11-21T01:53:27.220000 +CVE-2013-3350,0,0,d8d133c003da90f49e3f497df2427e0460432bca5cdba30511daa683dd48b046,2024-11-21T01:53:27.337000 +CVE-2013-3351,0,0,37e52a0e72ed8a5a8672090f0ed88381c9ebc34e61fa3577fbe30381617442b2,2024-11-21T01:53:27.447000 +CVE-2013-3352,0,0,63f383d72cef8e9111939c6f09f2ce87e8841c05cfe943d63dfe4842deee1b31,2024-11-21T01:53:27.563000 +CVE-2013-3353,0,0,cb5969796ea443854df76e62cfb1177846b1b503bc502e3076bdafbb5dee9d7e,2024-11-21T01:53:27.677000 +CVE-2013-3354,0,0,e61537900499b7c7aaeb29cb8876affa1106ec15714f58d5f8f2faabc0ef5114,2024-11-21T01:53:27.793000 +CVE-2013-3355,0,0,30e41e9e85fa45e309ba6fd94e929cedc1b7d72dd2532b6b1c2ce9a82e399b2c,2024-11-21T01:53:27.920000 +CVE-2013-3356,0,0,f5f3216d76683c8e910267b7f042d9449030b67992665a895ff7983253810e60,2024-11-21T01:53:28.037000 +CVE-2013-3357,0,0,0b7ab2997f639b2b2659c54fa476a7018956e51b7530a6d3312b45f4c9afd8e5,2024-11-21T01:53:28.153000 +CVE-2013-3358,0,0,fedfb513df7667518c21a3dd57175be10e6f73dfec3d9ddaa1f648566cb14463,2024-11-21T01:53:28.283000 +CVE-2013-3359,0,0,7a9c299bb0395ff972fed39e317f5b76581066e2c8d595eb10031d0e05016a3f,2024-11-21T01:53:28.403000 +CVE-2013-3360,0,0,cd3e3ee907ccb80272f7a3e3426da4e501ca2729522f20fa2105840b2f1138ed,2024-11-21T01:53:28.520000 +CVE-2013-3361,0,0,95b69a203f7d43f37092dd52b0ffff04171e24e03a72551aef0cfebfe53dfc9d,2024-11-21T01:53:28.640000 +CVE-2013-3362,0,0,b25695939128b1fc602a103e821bac26097276e2058c22144643b0b9b0046006,2024-11-21T01:53:28.770000 +CVE-2013-3363,0,0,574bc97e2acf70fa28abd3fb6275d32a436093e978545992e01fdf2c6240d406,2024-11-21T01:53:28.897000 +CVE-2013-3365,0,0,cd2979b16313e0c03aa8d6a71c3f85cac9f969de24fa766ff14c732958b3db31,2024-11-21T01:53:29.020000 CVE-2013-3366,0,0,9789aa9ccb1218e55594c0b08964b34fca472f0b514dda12d5fcf4da0a3fe4bd,2020-02-10T21:24:48.513000 CVE-2013-3367,0,0,435755f5bdfafe17601d6852195746e9a5be16ed4201874e816d2dcac6253a2e,2020-02-10T21:24:48.670000 -CVE-2013-3368,0,1,87e939f70c8fe929843ae8740a82786d0bf15ee4a91a715ea0f5541d7f66176d,2024-11-21T01:53:29.457000 -CVE-2013-3369,0,1,89bb55858b67c584833b01e7d9d6e44cb7eed94c66003a3631e5bf734be0eb50,2024-11-21T01:53:29.627000 -CVE-2013-3370,0,1,351a37a8d1b288434fb24e70f1cf54737824a19faee731e33f5802a14c5f1516,2024-11-21T01:53:29.790000 -CVE-2013-3371,0,1,a32578d2d39e8aecf078e8d33f4e3e56108f4a83b5bd650869ecbfeac53ac3b3,2024-11-21T01:53:29.960000 -CVE-2013-3372,0,1,5512542dc4fb982749177a9d22ccb9e1bb65683906deb1d0ee4e513468ea7b3e,2024-11-21T01:53:30.127000 -CVE-2013-3373,0,1,5f24b35c2d04a8ea5c5ae31e68bb896c2fd68aeebb7eb803fff65e073814fb5a,2024-11-21T01:53:30.300000 -CVE-2013-3374,0,1,1537c7e214143c75fa093cbe0cb3c235ec600cae64d25c33bd32748b699ea241,2024-11-21T01:53:30.467000 -CVE-2013-3375,0,1,5b3407ecfb8d49eaf1db4922e42515973e08745601be257ff2a25c03bf6242fa,2024-11-21T01:53:30.620000 -CVE-2013-3376,0,1,ed9a0b732a2f03f90914e7bc0475441946fb4043d41e36ca52ce0c32373942a3,2024-11-21T01:53:30.730000 -CVE-2013-3377,0,1,8af3baf8b73f262850a44a7c55615df0032a9e5b7519a15d3edbb744b5b304f6,2024-11-21T01:53:30.843000 -CVE-2013-3378,0,1,29adf4b0f392d1c30c4da0f67323f877c631fa4b6bf9b4beae18c45dd2a83766,2024-11-21T01:53:30.983000 -CVE-2013-3379,0,1,a4b88a4a392177f7d6673861c320999ac6a52c8a0e5e9c29feaa319bab80452d,2024-11-21T01:53:31.107000 -CVE-2013-3380,0,1,f72a171f2542babb95c062fac6260b4b1f91fa63c267ef2a42eb4e2af4bd5a2b,2024-11-21T01:53:31.253000 -CVE-2013-3381,0,1,adddc077e758d6ba7a24a04bcff2eaf4b1674a6364a508274a18f319f4fa8877,2024-11-21T01:53:31.390000 -CVE-2013-3382,0,1,dcbe67ded0c5ce7a7dce7e7452b0b3c52e7166a21343789b881b9cb1f8cbe16c,2024-11-21T01:53:31.507000 -CVE-2013-3383,0,1,37b89a876071e429b154ab9679bf36f1d87fd51f2ae29335ad4dabf4911e9fda,2024-11-21T01:53:31.633000 -CVE-2013-3384,0,1,46b1cec354cfe0a52f96b6f81fa74983bfd1fcebc7410c287268a2bec4fdba67,2024-11-21T01:53:31.753000 -CVE-2013-3385,0,1,08c9c827b64c81a71e3fedea84b4ac4196b09177c3ae5c4505690563711357eb,2024-11-21T01:53:31.910000 -CVE-2013-3386,0,1,20ba12ba542cf1d4f980b05e410e7c6f75e25153f303ac22e87434afa3b1af45,2024-11-21T01:53:32.063000 -CVE-2013-3387,0,1,710aa5a960a37bd19964384e5887c79e91c182c46b4bca06dbd17c1ada837e5c,2024-11-21T01:53:32.197000 -CVE-2013-3388,0,1,73d8f00757a3d49b8ed8b5593b9700c157ad7cd6fa418695c3b4b623afea2055,2024-11-21T01:53:32.337000 -CVE-2013-3389,0,1,8a18e10e5d663208888b46d09e94c7fbee1169f2062d3a368a9448bd67067c7f,2024-11-21T01:53:32.473000 -CVE-2013-3390,0,1,80e52004417050c2ca61d385432d9c3384ff98b508dbdfec8e4ccab3ded2adf2,2024-11-21T01:53:32.610000 -CVE-2013-3392,0,1,346510671dae9c4bcac86a241dc7b69a4af1819429aa7bfec8de9d3e3415d52c,2024-11-21T01:53:32.727000 -CVE-2013-3393,0,1,3679553cd9d9d006e6ffb5757019bfbd34ffc0d6bdfd9ae67f328a13538fc74a,2024-11-21T01:53:32.847000 -CVE-2013-3394,0,1,10615330f43b189d46f87ed52d871c01c4f6bfbf213fae7c674c3be5b73ddfbe,2024-11-21T01:53:32.970000 -CVE-2013-3395,0,1,6f7298ecb23fe6d44bbf19b805131d91bf673b91e7955b4c307cbb91e48357e3,2024-11-21T01:53:33.100000 -CVE-2013-3396,0,1,1b09d4d118014dd9941947efc7d194ce921340601c931b20d9b38167bdd99747,2024-11-21T01:53:33.227000 -CVE-2013-3397,0,1,61392c5658b28ed896f0b0e178dd0b201a17635e7e8fffc7611741ae9b88c8d9,2024-11-21T01:53:33.353000 -CVE-2013-3398,0,1,d05f638a996af3689b25757e32135351ea52c73fefdc5ad7b6acf162edd65e12,2024-11-21T01:53:33.473000 -CVE-2013-3399,0,1,ab31d02b0a77bd1a991ffbd441ca01420b4cac2cde45f32bbefbf052b3230778,2024-11-21T01:53:33.603000 -CVE-2013-3400,0,1,8091a3b011cd06cbc1e83457f9e07317bc14008ad09407a0730b140e47d445ac,2024-11-21T01:53:33.707000 -CVE-2013-3401,0,1,5bd7c61701fae9d18d70663ecd4f01bd5c5de188ae9cc84efaacced9cdde5ab4,2024-11-21T01:53:33.823000 -CVE-2013-3402,0,1,130e98c36fcbeb392080c28566f930cb88e34497a8693d5c4bae4c5c768b8042,2024-11-21T01:53:33.943000 -CVE-2013-3403,0,1,236f1d72b2d497d2521f41a4605e2177f2273ea810b84f50ea87bfee0e626e31,2024-11-21T01:53:34.070000 -CVE-2013-3404,0,1,c3eab642ee1d6de87de5dad07fdb19c2a5cb8495fb3f1d0604edfb4fb07a459e,2024-11-21T01:53:34.203000 -CVE-2013-3405,0,1,04949903421ddfead35ae06ffec55d38b57775af124c07d0985f78cd8130bd44,2024-11-21T01:53:34.333000 -CVE-2013-3406,0,1,bc12992aec9ad050b2105f51e70c7c37fb1837ed5b4aed4144b43b4ef2124a8a,2024-11-21T01:53:34.447000 -CVE-2013-3407,0,1,d0510deec08093e6cbcc9344dbe25f9299d472c45d9a2cc06db26f53f5f85e76,2024-11-21T01:53:34.567000 -CVE-2013-3408,0,1,6d7bdc2e7538831d217ec0bc8ceecccbe419ff7f8d63195a3f8384527696da46,2024-11-21T01:53:34.677000 -CVE-2013-3409,0,1,40b9319ac2da771fdf9d7df44e8e3582c3708ea3daf363487c427a5b400b3979,2024-11-21T01:53:34.787000 -CVE-2013-3410,0,1,158cff087fc73df954090cf19f0714df56d4b4269c53960369b4a416601a1b9c,2024-11-21T01:53:34.900000 -CVE-2013-3411,0,1,a694c3b9020a954a0e646ae0c99889c3d6eec55e1f44e53ac3118495a7ad207b,2024-11-21T01:53:35.023000 -CVE-2013-3412,0,1,66d7883961c43d3599354fc5769cba4e647d080c8ee2a388ed18c01999ad7fa3,2024-11-21T01:53:35.150000 -CVE-2013-3413,0,1,e2d7cd0e9a7389acdc8945fcaf4569407cc95e9383fb40bbc22855c22c0cef31,2024-11-21T01:53:35.270000 -CVE-2013-3414,0,1,0085c92ecb22f4b7666f99fb0f0b4d8bcdc15664129455a4961e9ead8e1f1113,2024-11-21T01:53:35.393000 -CVE-2013-3415,0,1,a8591a8ee58362dacf7919339ca07bddd40e25eba8790e4c907b78173128322b,2024-11-21T01:53:35.523000 -CVE-2013-3416,0,1,42eb0c03d9a8f31a56aa9dc2ae9add11002a532dadab720dc2a9e13edca9da6d,2024-11-21T01:53:35.650000 -CVE-2013-3417,0,1,7aa170d2ee3807b459fd92671067db2f44642b4703e7d1bc7a0139891405f364,2024-11-21T01:53:35.773000 -CVE-2013-3418,0,1,f902d8623f2e621ab7ab582fa4e8a492431252dd1440359b85ab8d5ede64f030,2024-11-21T01:53:35.890000 -CVE-2013-3419,0,1,c1f285e3d0f537e7d09dc049126ecae26e507bc21194a3bdf8b9c16b3411eace,2024-11-21T01:53:36 -CVE-2013-3420,0,1,b29cd50b6b76bc5eacfe124ab7513750b4d2f6bd92d806b4b2f9badb8a8ef18f,2024-11-21T01:53:36.110000 -CVE-2013-3421,0,1,b3c61ebba718e8bd144af6379cebc187d0ad37494511bc14bfbbe458da6237a4,2024-11-21T01:53:36.220000 -CVE-2013-3422,0,1,c685efdb3b14e333037a6dd6f0273c087864c0f259c77e66e2f292485b3b16d0,2024-11-21T01:53:36.337000 -CVE-2013-3423,0,1,23e3fbe2505cb66838c0328fc69bc147c83ad705227bef66d97f369b83948246,2024-11-21T01:53:36.453000 -CVE-2013-3424,0,1,57f6c26314ce5c4c9465e31e05cbac8ef4a6a7db7ff146abc8cbaf65e8f6838e,2024-11-21T01:53:36.550000 -CVE-2013-3425,0,1,948c3fcb10a00bbed4a83f17332ea6169bab4dfad9e601ab6b2dcf96ebeab40e,2024-11-21T01:53:36.663000 -CVE-2013-3426,0,1,f5539dcc76baa64ed460b763d5c66b5ba4db9a0e65292113a7d7563bf6dbdee3,2024-11-21T01:53:36.777000 -CVE-2013-3428,0,1,4633e8dec96668dc10127cf85a1a6c8e77205fe22f9b17ef3eb07fe1faa07451,2024-11-21T01:53:36.903000 -CVE-2013-3429,0,1,086f36e427fefc02b9f4ff6fc462b07dfa20b7a70506f6dcb0b951d078ada541,2024-11-21T01:53:37.030000 -CVE-2013-3430,0,1,ea2ad438448afd242eec2aa003e6b0af09af1d73fe5767c02adbb4f243b3104a,2024-11-21T01:53:37.157000 -CVE-2013-3431,0,1,c277f5d1694becf4999c7b5985b05d571dbbe681c979314174ec366335536318,2024-11-21T01:53:37.293000 -CVE-2013-3433,0,1,4df5bd4aa221848e1a662bddb36197e18809ef975aa7776df3a0aae024625f28,2024-11-21T01:53:37.430000 -CVE-2013-3434,0,1,32e819507451571c4f0d04876ee6b086802aa8903a5d453e60a4907ac1aeb818,2024-11-21T01:53:37.583000 -CVE-2013-3435,0,1,e4872d8cc87db2d382156ba8df03e87c688acc9b88ef7e501e84cd1014b1ed7d,2024-11-21T01:53:37.723000 -CVE-2013-3436,0,1,41621984c5de42545c95a3d0e95e77d291af3618b8b84e1c92ed4b1e1373d527,2024-11-21T01:53:37.847000 -CVE-2013-3437,0,1,8fba864da82a20cfc9f6ad738f4f54fa19c2c9f94cc9a3cfac334b7c0967511c,2024-11-21T01:53:37.963000 -CVE-2013-3438,0,1,c1ccfa3e57591de23762b9f84d9a5d5e7df588d33048565877ad32c5da563631,2024-11-21T01:53:38.087000 -CVE-2013-3439,0,1,7cd390ddf922491e1420f22a5e0db0e764a51fdf8711580bbffa66f445a66faa,2024-11-21T01:53:38.197000 -CVE-2013-3440,0,1,88324ab1e64e1d12aeedf9767cdfa46c3c2dc1e4dace90be7bbf0e1d4fd782e1,2024-11-21T01:53:38.320000 -CVE-2013-3441,0,1,51f394f37d4b08d0c6dfbe8ea65da0b58914c4a0e3a9e3fffdbef322b5df6aa5,2024-11-21T01:53:38.447000 -CVE-2013-3442,0,1,84c35b19c979b29b6d86609948c8073d3d2697858d483de92809d7e32f218b69,2024-11-21T01:53:38.557000 -CVE-2013-3443,0,1,921b51b4a4d089ae182814b25914713b8607976bca40581af539bd67ebe42992,2024-11-21T01:53:38.670000 -CVE-2013-3444,0,1,99cb9314c208fff09ca783d8f5d2fdc460564de3f3f0dc5ac38b610a1c46d3c5,2024-11-21T01:53:38.797000 -CVE-2013-3445,0,1,c9d1fb3d71440aa9a24cb6654a91f558c030f590d60511a0eb2e3042ca31d502,2024-11-21T01:53:38.953000 -CVE-2013-3446,0,1,333e497397b0805e9d7976568c078d82b087bfe409b2e60fb43e6b3349dfb019,2024-11-21T01:53:39.070000 -CVE-2013-3448,0,1,0f4f1ac279d15f1323abb4d75f37b20b36cc1681f80bf1a587f0e08d60f74ac8,2024-11-21T01:53:39.177000 -CVE-2013-3450,0,1,0e7ce82ea6ebffdee88d0f048bd08ac6ba2374828b878926c8e26c1e4fd2a9bb,2024-11-21T01:53:39.300000 -CVE-2013-3451,0,1,6a0c8b3574d4d080f4235cbc1bccf81f040ff87aa203a1c5688a08ef77fa1f37,2024-11-21T01:53:39.413000 -CVE-2013-3453,0,1,72349fd3f9db7e4870f0547d5c3c085f78a8153b76e6ad67e1cf4e9f91ec3689,2024-11-21T01:53:39.523000 -CVE-2013-3454,0,1,4cbd8c7c7242c5815ecbe3963338c07747452ca8877a290eb0a74187af29434f,2024-11-21T01:53:39.660000 -CVE-2013-3455,0,1,783d101051d958f5f5d030f25790a74375cd3e967dd18607a53f2ec71bde98f2,2024-11-21T01:53:39.787000 -CVE-2013-3457,0,1,d83661b3a063608ea5cbc3a95a13dc595827437a6124d4bc97d20657ced1b439,2024-11-21T01:53:39.903000 -CVE-2013-3458,0,1,b590c5c8e68da1ce51327c2202316a9f13b7d73c7643123b318985f6e3ff185b,2024-11-21T01:53:40.030000 -CVE-2013-3459,0,1,a17eb0890f4163aa573e9b88ab8050e5f06617f8765aa3cae1560f8603b7f74d,2024-11-21T01:53:40.140000 -CVE-2013-3460,0,1,0c9ab3e87dc4a9c3b6a0e456102fb6b9a81f2a3f0e9e2af4342cbcfb89ff5467,2024-11-21T01:53:40.260000 -CVE-2013-3461,0,1,808fbd4e1cba95c0dc582bf7a8ff7b1d26cba2c99554651bef6adbdb03eb9469,2024-11-21T01:53:40.383000 -CVE-2013-3462,0,1,cc17f19edc17ce816a0db2eec851ec1403496b10e0f197ff1cfd61ca5028b7b8,2024-11-21T01:53:40.500000 -CVE-2013-3463,0,1,32377f731fb0cf6bf6b45dd318eceb0f19cc766b6737146757cc855381dd4d64,2024-11-21T01:53:40.623000 -CVE-2013-3464,0,1,1c50e96d1623882feb9d86f6b5b6dcd343121389bf23d3bd9cff6bfa698d5490,2024-11-21T01:53:40.743000 -CVE-2013-3466,0,1,035607b76557afd9e86cf8b89a8e76e146b7866fa8ac5ed9c4ddc8ca27b69394,2024-11-21T01:53:40.870000 -CVE-2013-3467,0,1,175a0636f54295b8827f62e7f41277fba24406ad7781f46a98c7a0153adba157,2024-11-21T01:53:40.987000 -CVE-2013-3468,0,1,09f76432f7c44154d9ec4eefe25a5bc06774635220574cbb59d3cc0557fc72e5,2024-11-21T01:53:41.117000 -CVE-2013-3469,0,1,ebc38fcce32aef5197691817e6fe98e23b5093d098f3a1dd0665518522de34db,2024-11-21T01:53:41.227000 -CVE-2013-3470,0,1,2f3def9019e154a7d5c64afcf6a3e19ea6c27465ac3edfba818451bea77e35a2,2024-11-21T01:53:41.350000 -CVE-2013-3471,0,1,6dee5f5e2b4f7c00b601260d2b027b18e5353584089a824aa22e05eb4462c865,2024-11-21T01:53:41.470000 -CVE-2013-3472,0,1,fb08806d95b020369c241299cb40cd0aa5fec7011fd337629ca70f71417c566a,2024-11-21T01:53:41.580000 -CVE-2013-3473,0,1,6845a8b780027101e05f807400320f314d53a89276ec39f0202c3b3ab2db791e,2024-11-21T01:53:41.690000 -CVE-2013-3474,0,1,b4062ad0947f536b989cce6bc79188fdba6b169534a61bcb8471584e1c305fc8,2024-11-21T01:53:41.800000 -CVE-2013-3475,0,1,6ff39be7b540a0a9a875ccb687c234e52902cf0035d315580391e116fe8cac44,2024-11-21T01:53:41.913000 +CVE-2013-3368,0,0,87e939f70c8fe929843ae8740a82786d0bf15ee4a91a715ea0f5541d7f66176d,2024-11-21T01:53:29.457000 +CVE-2013-3369,0,0,89bb55858b67c584833b01e7d9d6e44cb7eed94c66003a3631e5bf734be0eb50,2024-11-21T01:53:29.627000 +CVE-2013-3370,0,0,351a37a8d1b288434fb24e70f1cf54737824a19faee731e33f5802a14c5f1516,2024-11-21T01:53:29.790000 +CVE-2013-3371,0,0,a32578d2d39e8aecf078e8d33f4e3e56108f4a83b5bd650869ecbfeac53ac3b3,2024-11-21T01:53:29.960000 +CVE-2013-3372,0,0,5512542dc4fb982749177a9d22ccb9e1bb65683906deb1d0ee4e513468ea7b3e,2024-11-21T01:53:30.127000 +CVE-2013-3373,0,0,5f24b35c2d04a8ea5c5ae31e68bb896c2fd68aeebb7eb803fff65e073814fb5a,2024-11-21T01:53:30.300000 +CVE-2013-3374,0,0,1537c7e214143c75fa093cbe0cb3c235ec600cae64d25c33bd32748b699ea241,2024-11-21T01:53:30.467000 +CVE-2013-3375,0,0,5b3407ecfb8d49eaf1db4922e42515973e08745601be257ff2a25c03bf6242fa,2024-11-21T01:53:30.620000 +CVE-2013-3376,0,0,ed9a0b732a2f03f90914e7bc0475441946fb4043d41e36ca52ce0c32373942a3,2024-11-21T01:53:30.730000 +CVE-2013-3377,0,0,8af3baf8b73f262850a44a7c55615df0032a9e5b7519a15d3edbb744b5b304f6,2024-11-21T01:53:30.843000 +CVE-2013-3378,0,0,29adf4b0f392d1c30c4da0f67323f877c631fa4b6bf9b4beae18c45dd2a83766,2024-11-21T01:53:30.983000 +CVE-2013-3379,0,0,a4b88a4a392177f7d6673861c320999ac6a52c8a0e5e9c29feaa319bab80452d,2024-11-21T01:53:31.107000 +CVE-2013-3380,0,0,f72a171f2542babb95c062fac6260b4b1f91fa63c267ef2a42eb4e2af4bd5a2b,2024-11-21T01:53:31.253000 +CVE-2013-3381,0,0,adddc077e758d6ba7a24a04bcff2eaf4b1674a6364a508274a18f319f4fa8877,2024-11-21T01:53:31.390000 +CVE-2013-3382,0,0,dcbe67ded0c5ce7a7dce7e7452b0b3c52e7166a21343789b881b9cb1f8cbe16c,2024-11-21T01:53:31.507000 +CVE-2013-3383,0,0,37b89a876071e429b154ab9679bf36f1d87fd51f2ae29335ad4dabf4911e9fda,2024-11-21T01:53:31.633000 +CVE-2013-3384,0,0,46b1cec354cfe0a52f96b6f81fa74983bfd1fcebc7410c287268a2bec4fdba67,2024-11-21T01:53:31.753000 +CVE-2013-3385,0,0,08c9c827b64c81a71e3fedea84b4ac4196b09177c3ae5c4505690563711357eb,2024-11-21T01:53:31.910000 +CVE-2013-3386,0,0,20ba12ba542cf1d4f980b05e410e7c6f75e25153f303ac22e87434afa3b1af45,2024-11-21T01:53:32.063000 +CVE-2013-3387,0,0,710aa5a960a37bd19964384e5887c79e91c182c46b4bca06dbd17c1ada837e5c,2024-11-21T01:53:32.197000 +CVE-2013-3388,0,0,73d8f00757a3d49b8ed8b5593b9700c157ad7cd6fa418695c3b4b623afea2055,2024-11-21T01:53:32.337000 +CVE-2013-3389,0,0,8a18e10e5d663208888b46d09e94c7fbee1169f2062d3a368a9448bd67067c7f,2024-11-21T01:53:32.473000 +CVE-2013-3390,0,0,80e52004417050c2ca61d385432d9c3384ff98b508dbdfec8e4ccab3ded2adf2,2024-11-21T01:53:32.610000 +CVE-2013-3392,0,0,346510671dae9c4bcac86a241dc7b69a4af1819429aa7bfec8de9d3e3415d52c,2024-11-21T01:53:32.727000 +CVE-2013-3393,0,0,3679553cd9d9d006e6ffb5757019bfbd34ffc0d6bdfd9ae67f328a13538fc74a,2024-11-21T01:53:32.847000 +CVE-2013-3394,0,0,10615330f43b189d46f87ed52d871c01c4f6bfbf213fae7c674c3be5b73ddfbe,2024-11-21T01:53:32.970000 +CVE-2013-3395,0,0,6f7298ecb23fe6d44bbf19b805131d91bf673b91e7955b4c307cbb91e48357e3,2024-11-21T01:53:33.100000 +CVE-2013-3396,0,0,1b09d4d118014dd9941947efc7d194ce921340601c931b20d9b38167bdd99747,2024-11-21T01:53:33.227000 +CVE-2013-3397,0,0,61392c5658b28ed896f0b0e178dd0b201a17635e7e8fffc7611741ae9b88c8d9,2024-11-21T01:53:33.353000 +CVE-2013-3398,0,0,d05f638a996af3689b25757e32135351ea52c73fefdc5ad7b6acf162edd65e12,2024-11-21T01:53:33.473000 +CVE-2013-3399,0,0,ab31d02b0a77bd1a991ffbd441ca01420b4cac2cde45f32bbefbf052b3230778,2024-11-21T01:53:33.603000 +CVE-2013-3400,0,0,8091a3b011cd06cbc1e83457f9e07317bc14008ad09407a0730b140e47d445ac,2024-11-21T01:53:33.707000 +CVE-2013-3401,0,0,5bd7c61701fae9d18d70663ecd4f01bd5c5de188ae9cc84efaacced9cdde5ab4,2024-11-21T01:53:33.823000 +CVE-2013-3402,0,0,130e98c36fcbeb392080c28566f930cb88e34497a8693d5c4bae4c5c768b8042,2024-11-21T01:53:33.943000 +CVE-2013-3403,0,0,236f1d72b2d497d2521f41a4605e2177f2273ea810b84f50ea87bfee0e626e31,2024-11-21T01:53:34.070000 +CVE-2013-3404,0,0,c3eab642ee1d6de87de5dad07fdb19c2a5cb8495fb3f1d0604edfb4fb07a459e,2024-11-21T01:53:34.203000 +CVE-2013-3405,0,0,04949903421ddfead35ae06ffec55d38b57775af124c07d0985f78cd8130bd44,2024-11-21T01:53:34.333000 +CVE-2013-3406,0,0,bc12992aec9ad050b2105f51e70c7c37fb1837ed5b4aed4144b43b4ef2124a8a,2024-11-21T01:53:34.447000 +CVE-2013-3407,0,0,d0510deec08093e6cbcc9344dbe25f9299d472c45d9a2cc06db26f53f5f85e76,2024-11-21T01:53:34.567000 +CVE-2013-3408,0,0,6d7bdc2e7538831d217ec0bc8ceecccbe419ff7f8d63195a3f8384527696da46,2024-11-21T01:53:34.677000 +CVE-2013-3409,0,0,40b9319ac2da771fdf9d7df44e8e3582c3708ea3daf363487c427a5b400b3979,2024-11-21T01:53:34.787000 +CVE-2013-3410,0,0,158cff087fc73df954090cf19f0714df56d4b4269c53960369b4a416601a1b9c,2024-11-21T01:53:34.900000 +CVE-2013-3411,0,0,a694c3b9020a954a0e646ae0c99889c3d6eec55e1f44e53ac3118495a7ad207b,2024-11-21T01:53:35.023000 +CVE-2013-3412,0,0,66d7883961c43d3599354fc5769cba4e647d080c8ee2a388ed18c01999ad7fa3,2024-11-21T01:53:35.150000 +CVE-2013-3413,0,0,e2d7cd0e9a7389acdc8945fcaf4569407cc95e9383fb40bbc22855c22c0cef31,2024-11-21T01:53:35.270000 +CVE-2013-3414,0,0,0085c92ecb22f4b7666f99fb0f0b4d8bcdc15664129455a4961e9ead8e1f1113,2024-11-21T01:53:35.393000 +CVE-2013-3415,0,0,a8591a8ee58362dacf7919339ca07bddd40e25eba8790e4c907b78173128322b,2024-11-21T01:53:35.523000 +CVE-2013-3416,0,0,42eb0c03d9a8f31a56aa9dc2ae9add11002a532dadab720dc2a9e13edca9da6d,2024-11-21T01:53:35.650000 +CVE-2013-3417,0,0,7aa170d2ee3807b459fd92671067db2f44642b4703e7d1bc7a0139891405f364,2024-11-21T01:53:35.773000 +CVE-2013-3418,0,0,f902d8623f2e621ab7ab582fa4e8a492431252dd1440359b85ab8d5ede64f030,2024-11-21T01:53:35.890000 +CVE-2013-3419,0,0,c1f285e3d0f537e7d09dc049126ecae26e507bc21194a3bdf8b9c16b3411eace,2024-11-21T01:53:36 +CVE-2013-3420,0,0,b29cd50b6b76bc5eacfe124ab7513750b4d2f6bd92d806b4b2f9badb8a8ef18f,2024-11-21T01:53:36.110000 +CVE-2013-3421,0,0,b3c61ebba718e8bd144af6379cebc187d0ad37494511bc14bfbbe458da6237a4,2024-11-21T01:53:36.220000 +CVE-2013-3422,0,0,c685efdb3b14e333037a6dd6f0273c087864c0f259c77e66e2f292485b3b16d0,2024-11-21T01:53:36.337000 +CVE-2013-3423,0,0,23e3fbe2505cb66838c0328fc69bc147c83ad705227bef66d97f369b83948246,2024-11-21T01:53:36.453000 +CVE-2013-3424,0,0,57f6c26314ce5c4c9465e31e05cbac8ef4a6a7db7ff146abc8cbaf65e8f6838e,2024-11-21T01:53:36.550000 +CVE-2013-3425,0,0,948c3fcb10a00bbed4a83f17332ea6169bab4dfad9e601ab6b2dcf96ebeab40e,2024-11-21T01:53:36.663000 +CVE-2013-3426,0,0,f5539dcc76baa64ed460b763d5c66b5ba4db9a0e65292113a7d7563bf6dbdee3,2024-11-21T01:53:36.777000 +CVE-2013-3428,0,0,4633e8dec96668dc10127cf85a1a6c8e77205fe22f9b17ef3eb07fe1faa07451,2024-11-21T01:53:36.903000 +CVE-2013-3429,0,0,086f36e427fefc02b9f4ff6fc462b07dfa20b7a70506f6dcb0b951d078ada541,2024-11-21T01:53:37.030000 +CVE-2013-3430,0,0,ea2ad438448afd242eec2aa003e6b0af09af1d73fe5767c02adbb4f243b3104a,2024-11-21T01:53:37.157000 +CVE-2013-3431,0,0,c277f5d1694becf4999c7b5985b05d571dbbe681c979314174ec366335536318,2024-11-21T01:53:37.293000 +CVE-2013-3433,0,0,4df5bd4aa221848e1a662bddb36197e18809ef975aa7776df3a0aae024625f28,2024-11-21T01:53:37.430000 +CVE-2013-3434,0,0,32e819507451571c4f0d04876ee6b086802aa8903a5d453e60a4907ac1aeb818,2024-11-21T01:53:37.583000 +CVE-2013-3435,0,0,e4872d8cc87db2d382156ba8df03e87c688acc9b88ef7e501e84cd1014b1ed7d,2024-11-21T01:53:37.723000 +CVE-2013-3436,0,0,41621984c5de42545c95a3d0e95e77d291af3618b8b84e1c92ed4b1e1373d527,2024-11-21T01:53:37.847000 +CVE-2013-3437,0,0,8fba864da82a20cfc9f6ad738f4f54fa19c2c9f94cc9a3cfac334b7c0967511c,2024-11-21T01:53:37.963000 +CVE-2013-3438,0,0,c1ccfa3e57591de23762b9f84d9a5d5e7df588d33048565877ad32c5da563631,2024-11-21T01:53:38.087000 +CVE-2013-3439,0,0,7cd390ddf922491e1420f22a5e0db0e764a51fdf8711580bbffa66f445a66faa,2024-11-21T01:53:38.197000 +CVE-2013-3440,0,0,88324ab1e64e1d12aeedf9767cdfa46c3c2dc1e4dace90be7bbf0e1d4fd782e1,2024-11-21T01:53:38.320000 +CVE-2013-3441,0,0,51f394f37d4b08d0c6dfbe8ea65da0b58914c4a0e3a9e3fffdbef322b5df6aa5,2024-11-21T01:53:38.447000 +CVE-2013-3442,0,0,84c35b19c979b29b6d86609948c8073d3d2697858d483de92809d7e32f218b69,2024-11-21T01:53:38.557000 +CVE-2013-3443,0,0,921b51b4a4d089ae182814b25914713b8607976bca40581af539bd67ebe42992,2024-11-21T01:53:38.670000 +CVE-2013-3444,0,0,99cb9314c208fff09ca783d8f5d2fdc460564de3f3f0dc5ac38b610a1c46d3c5,2024-11-21T01:53:38.797000 +CVE-2013-3445,0,0,c9d1fb3d71440aa9a24cb6654a91f558c030f590d60511a0eb2e3042ca31d502,2024-11-21T01:53:38.953000 +CVE-2013-3446,0,0,333e497397b0805e9d7976568c078d82b087bfe409b2e60fb43e6b3349dfb019,2024-11-21T01:53:39.070000 +CVE-2013-3448,0,0,0f4f1ac279d15f1323abb4d75f37b20b36cc1681f80bf1a587f0e08d60f74ac8,2024-11-21T01:53:39.177000 +CVE-2013-3450,0,0,0e7ce82ea6ebffdee88d0f048bd08ac6ba2374828b878926c8e26c1e4fd2a9bb,2024-11-21T01:53:39.300000 +CVE-2013-3451,0,0,6a0c8b3574d4d080f4235cbc1bccf81f040ff87aa203a1c5688a08ef77fa1f37,2024-11-21T01:53:39.413000 +CVE-2013-3453,0,0,72349fd3f9db7e4870f0547d5c3c085f78a8153b76e6ad67e1cf4e9f91ec3689,2024-11-21T01:53:39.523000 +CVE-2013-3454,0,0,4cbd8c7c7242c5815ecbe3963338c07747452ca8877a290eb0a74187af29434f,2024-11-21T01:53:39.660000 +CVE-2013-3455,0,0,783d101051d958f5f5d030f25790a74375cd3e967dd18607a53f2ec71bde98f2,2024-11-21T01:53:39.787000 +CVE-2013-3457,0,0,d83661b3a063608ea5cbc3a95a13dc595827437a6124d4bc97d20657ced1b439,2024-11-21T01:53:39.903000 +CVE-2013-3458,0,0,b590c5c8e68da1ce51327c2202316a9f13b7d73c7643123b318985f6e3ff185b,2024-11-21T01:53:40.030000 +CVE-2013-3459,0,0,a17eb0890f4163aa573e9b88ab8050e5f06617f8765aa3cae1560f8603b7f74d,2024-11-21T01:53:40.140000 +CVE-2013-3460,0,0,0c9ab3e87dc4a9c3b6a0e456102fb6b9a81f2a3f0e9e2af4342cbcfb89ff5467,2024-11-21T01:53:40.260000 +CVE-2013-3461,0,0,808fbd4e1cba95c0dc582bf7a8ff7b1d26cba2c99554651bef6adbdb03eb9469,2024-11-21T01:53:40.383000 +CVE-2013-3462,0,0,cc17f19edc17ce816a0db2eec851ec1403496b10e0f197ff1cfd61ca5028b7b8,2024-11-21T01:53:40.500000 +CVE-2013-3463,0,0,32377f731fb0cf6bf6b45dd318eceb0f19cc766b6737146757cc855381dd4d64,2024-11-21T01:53:40.623000 +CVE-2013-3464,0,0,1c50e96d1623882feb9d86f6b5b6dcd343121389bf23d3bd9cff6bfa698d5490,2024-11-21T01:53:40.743000 +CVE-2013-3466,0,0,035607b76557afd9e86cf8b89a8e76e146b7866fa8ac5ed9c4ddc8ca27b69394,2024-11-21T01:53:40.870000 +CVE-2013-3467,0,0,175a0636f54295b8827f62e7f41277fba24406ad7781f46a98c7a0153adba157,2024-11-21T01:53:40.987000 +CVE-2013-3468,0,0,09f76432f7c44154d9ec4eefe25a5bc06774635220574cbb59d3cc0557fc72e5,2024-11-21T01:53:41.117000 +CVE-2013-3469,0,0,ebc38fcce32aef5197691817e6fe98e23b5093d098f3a1dd0665518522de34db,2024-11-21T01:53:41.227000 +CVE-2013-3470,0,0,2f3def9019e154a7d5c64afcf6a3e19ea6c27465ac3edfba818451bea77e35a2,2024-11-21T01:53:41.350000 +CVE-2013-3471,0,0,6dee5f5e2b4f7c00b601260d2b027b18e5353584089a824aa22e05eb4462c865,2024-11-21T01:53:41.470000 +CVE-2013-3472,0,0,fb08806d95b020369c241299cb40cd0aa5fec7011fd337629ca70f71417c566a,2024-11-21T01:53:41.580000 +CVE-2013-3473,0,0,6845a8b780027101e05f807400320f314d53a89276ec39f0202c3b3ab2db791e,2024-11-21T01:53:41.690000 +CVE-2013-3474,0,0,b4062ad0947f536b989cce6bc79188fdba6b169534a61bcb8471584e1c305fc8,2024-11-21T01:53:41.800000 +CVE-2013-3475,0,0,6ff39be7b540a0a9a875ccb687c234e52902cf0035d315580391e116fe8cac44,2024-11-21T01:53:41.913000 CVE-2013-3476,0,0,5c8773524a5ca8c6987e98bb7029063c8911181cd2dcf204ac7a90dc2240e915,2017-08-29T01:33:23.903000 CVE-2013-3477,0,0,011caaf06cc63d9f71816cde231e83566978ef4c841ce51136181e67da6c3992,2017-08-29T01:33:23.967000 -CVE-2013-3478,0,1,84117042bc06d013dbc99c6baea40d5c11ca90590946195cf2c078f8be257998,2024-11-21T01:53:42.297000 -CVE-2013-3479,0,1,d2b3e48dcc4fe2585327c90c713befe5f1c3fd5153058d9202f2dd9d6d0f439f,2024-11-21T01:53:42.400000 -CVE-2013-3480,0,1,bc27eaeee447ff0f74f0ded784749fc216704e0bbcea4888135df5cc601f9c92,2024-11-21T01:53:42.500000 -CVE-2013-3481,0,1,448dd2f16fc43741a7ac1957fc6dd521564cea8494f25e4350f1739c533adf4c,2024-11-21T01:53:42.613000 -CVE-2013-3482,0,1,725439c7df3a7a39b0b9f9260dea1e454d2ae06819a7267204a03aa8a9a3e445,2024-11-21T01:53:42.730000 -CVE-2013-3483,0,1,2c4e32386a79cbf60735ea70c7884fe71f2ec41807e0177bf4c1b4333c5de374,2024-11-21T01:53:42.850000 -CVE-2013-3484,0,1,1c466a9c1bafb367789ac22b444d0dce655f4bd011f506ac2b0f2425bbd860af,2024-11-21T01:53:43.633000 -CVE-2013-3485,0,1,f173f2da984e1a02055220811fb73d05bbdd0f3078386322140238d134b072d2,2024-11-21T01:53:43.950000 +CVE-2013-3478,0,0,84117042bc06d013dbc99c6baea40d5c11ca90590946195cf2c078f8be257998,2024-11-21T01:53:42.297000 +CVE-2013-3479,0,0,d2b3e48dcc4fe2585327c90c713befe5f1c3fd5153058d9202f2dd9d6d0f439f,2024-11-21T01:53:42.400000 +CVE-2013-3480,0,0,bc27eaeee447ff0f74f0ded784749fc216704e0bbcea4888135df5cc601f9c92,2024-11-21T01:53:42.500000 +CVE-2013-3481,0,0,448dd2f16fc43741a7ac1957fc6dd521564cea8494f25e4350f1739c533adf4c,2024-11-21T01:53:42.613000 +CVE-2013-3482,0,0,725439c7df3a7a39b0b9f9260dea1e454d2ae06819a7267204a03aa8a9a3e445,2024-11-21T01:53:42.730000 +CVE-2013-3483,0,0,2c4e32386a79cbf60735ea70c7884fe71f2ec41807e0177bf4c1b4333c5de374,2024-11-21T01:53:42.850000 +CVE-2013-3484,0,0,1c466a9c1bafb367789ac22b444d0dce655f4bd011f506ac2b0f2425bbd860af,2024-11-21T01:53:43.633000 +CVE-2013-3485,0,0,f173f2da984e1a02055220811fb73d05bbdd0f3078386322140238d134b072d2,2024-11-21T01:53:43.950000 CVE-2013-3486,0,0,2cc7fc5baa61bae7c81c0ca38e3eee1769057907abb88151549ffba07033fe81,2020-01-30T19:49:07.187000 -CVE-2013-3487,0,1,7bc6247fe1bc4550fe6defc459c9bbe90754756116683f5ebf56bd4887ffc28d,2024-11-21T01:53:44.163000 +CVE-2013-3487,0,0,7bc6247fe1bc4550fe6defc459c9bbe90754756116683f5ebf56bd4887ffc28d,2024-11-21T01:53:44.163000 CVE-2013-3488,0,0,3025e74553dafdb7c97c72295037926a0400bdb686e88c0dca638b9f5c5843d1,2020-02-01T02:15:59.473000 CVE-2013-3489,0,0,5cbe23d9174eff29b130ab5d42721999eb27cace659aa0cd289b2f251ffd4833,2020-02-01T02:12:18.400000 -CVE-2013-3491,0,1,d80d2f33e16147bcfd17db7dda4270f083520d6be11e40a82a244a82e4b62bd0,2024-11-21T01:53:44.500000 +CVE-2013-3491,0,0,d80d2f33e16147bcfd17db7dda4270f083520d6be11e40a82a244a82e4b62bd0,2024-11-21T01:53:44.500000 CVE-2013-3492,0,0,4d51e235b68ef02d93a2f67f51a42c638c10e19c88531d6456839f3eabc837af,2020-01-30T19:57:52.977000 CVE-2013-3493,0,0,f7e54b525ccfe5908f3a73e0e4211a19648bcb615031a0f2a86b1fb76d163248,2020-01-29T21:43:43.017000 CVE-2013-3494,0,0,379b9f74cee3122a0020059c4a739ee353cdcc006b59bcc331523ffd92dc2d2c,2020-02-18T20:46:43.810000 -CVE-2013-3495,0,1,2ee2d4cb35cbf4b314cd660688c34d518ae4e968549d7b1ee97d0ecc06eb036c,2024-11-21T01:53:44.917000 -CVE-2013-3496,0,1,043c36ce7ebe7668760f354e42ef6f53ca16f868103b7f0cb9766eeba1ebe810,2024-11-21T01:53:45.067000 -CVE-2013-3497,0,1,db811833ec04c9da417779018aee92089265c227baa600b14cfcf04ec6c08b68,2024-11-21T01:53:45.207000 -CVE-2013-3498,0,1,e917c48e4a53370505256db818e5a779228b7a0bec67db91063a0763537f96ac,2024-11-21T01:53:45.347000 -CVE-2013-3499,0,1,f113cc6b54b3baae55388bf1dbdf0c0c3494cf36eaa2ebfdfe5badbcfdf87b9b,2024-11-21T01:53:45.493000 -CVE-2013-3500,0,1,5b76f79fdc24853e176452ffd4764d72ebd0069846e4c4a752fb9b012e31787e,2024-11-21T01:53:45.650000 -CVE-2013-3501,0,1,912e7440bfc3fc63fca1f8b9af509cbe90ab749afaa8f422dcda208c5250c8e9,2024-11-21T01:53:45.790000 -CVE-2013-3502,0,1,54f445d31449e56b4ecf77e532159a4bbf73c462c504eb52d92f6b4a830779af,2024-11-21T01:53:45.923000 -CVE-2013-3503,0,1,9351f19bd330c3512409906d80d9799012d4ec6737199e8ee6d932851c1f2f09,2024-11-21T01:53:46.067000 -CVE-2013-3504,0,1,c313dd8b6a1662ab0d62892fb626645aa836c6381d429c32a9f482ddff3d2d57,2024-11-21T01:53:46.213000 -CVE-2013-3505,0,1,dad12879d837443d8751306aaa94b0bfceb7bcea6c927d079b3ca28c974dc49c,2024-11-21T01:53:46.353000 -CVE-2013-3506,0,1,5de1c2eff63093b97618d38a329c4bcf7e517b34ae54a582de4076fddcd89074,2024-11-21T01:53:46.503000 -CVE-2013-3507,0,1,936388e7abb5a609494562ed40901ff13d5cd6e04b2cce1fa42b3a53a1559b8a,2024-11-21T01:53:46.637000 -CVE-2013-3508,0,1,2224d62b2811c627979e5e8f1c96111101e6760998aaf4dfa9d0f68644014586,2024-11-21T01:53:46.783000 -CVE-2013-3509,0,1,659ef2f5051c95aab88faa611a5a5fab4a584ffbaab119b08ea49c355a52b269,2024-11-21T01:53:46.923000 -CVE-2013-3510,0,1,252268c1fb28de560a4a8a59e7357f75ca6cb3cf3accbc8ded262f23ce9c17f3,2024-11-21T01:53:47.067000 -CVE-2013-3511,0,1,c3cfce5d80f2dd03936a80f8bb46736b99bb5beae103970d0289f7557b5ced5d,2024-11-21T01:53:47.217000 -CVE-2013-3512,0,1,ddb65a4bb955044b24f32b67d729206da29ddaf16ed7dbc4af71e5d6b19547d6,2024-11-21T01:53:47.370000 -CVE-2013-3513,0,1,9f4d87e8ce18f6f6663d0e215d3278b5955dcdd11d558d18d5c663f4a0e4f520,2024-11-21T01:53:47.523000 -CVE-2013-3514,0,1,903f5ed9cfa3a6f7319c0710500d3e9c1e93077734c5ffcbeddc148ada5b3979,2024-11-21T01:53:47.670000 -CVE-2013-3515,0,1,b32969bfe68b198d8b3a5c5c20dc486b24f3642d20b553e2b054ea18644724af,2024-11-21T01:53:47.833000 +CVE-2013-3495,0,0,2ee2d4cb35cbf4b314cd660688c34d518ae4e968549d7b1ee97d0ecc06eb036c,2024-11-21T01:53:44.917000 +CVE-2013-3496,0,0,043c36ce7ebe7668760f354e42ef6f53ca16f868103b7f0cb9766eeba1ebe810,2024-11-21T01:53:45.067000 +CVE-2013-3497,0,0,db811833ec04c9da417779018aee92089265c227baa600b14cfcf04ec6c08b68,2024-11-21T01:53:45.207000 +CVE-2013-3498,0,0,e917c48e4a53370505256db818e5a779228b7a0bec67db91063a0763537f96ac,2024-11-21T01:53:45.347000 +CVE-2013-3499,0,0,f113cc6b54b3baae55388bf1dbdf0c0c3494cf36eaa2ebfdfe5badbcfdf87b9b,2024-11-21T01:53:45.493000 +CVE-2013-3500,0,0,5b76f79fdc24853e176452ffd4764d72ebd0069846e4c4a752fb9b012e31787e,2024-11-21T01:53:45.650000 +CVE-2013-3501,0,0,912e7440bfc3fc63fca1f8b9af509cbe90ab749afaa8f422dcda208c5250c8e9,2024-11-21T01:53:45.790000 +CVE-2013-3502,0,0,54f445d31449e56b4ecf77e532159a4bbf73c462c504eb52d92f6b4a830779af,2024-11-21T01:53:45.923000 +CVE-2013-3503,0,0,9351f19bd330c3512409906d80d9799012d4ec6737199e8ee6d932851c1f2f09,2024-11-21T01:53:46.067000 +CVE-2013-3504,0,0,c313dd8b6a1662ab0d62892fb626645aa836c6381d429c32a9f482ddff3d2d57,2024-11-21T01:53:46.213000 +CVE-2013-3505,0,0,dad12879d837443d8751306aaa94b0bfceb7bcea6c927d079b3ca28c974dc49c,2024-11-21T01:53:46.353000 +CVE-2013-3506,0,0,5de1c2eff63093b97618d38a329c4bcf7e517b34ae54a582de4076fddcd89074,2024-11-21T01:53:46.503000 +CVE-2013-3507,0,0,936388e7abb5a609494562ed40901ff13d5cd6e04b2cce1fa42b3a53a1559b8a,2024-11-21T01:53:46.637000 +CVE-2013-3508,0,0,2224d62b2811c627979e5e8f1c96111101e6760998aaf4dfa9d0f68644014586,2024-11-21T01:53:46.783000 +CVE-2013-3509,0,0,659ef2f5051c95aab88faa611a5a5fab4a584ffbaab119b08ea49c355a52b269,2024-11-21T01:53:46.923000 +CVE-2013-3510,0,0,252268c1fb28de560a4a8a59e7357f75ca6cb3cf3accbc8ded262f23ce9c17f3,2024-11-21T01:53:47.067000 +CVE-2013-3511,0,0,c3cfce5d80f2dd03936a80f8bb46736b99bb5beae103970d0289f7557b5ced5d,2024-11-21T01:53:47.217000 +CVE-2013-3512,0,0,ddb65a4bb955044b24f32b67d729206da29ddaf16ed7dbc4af71e5d6b19547d6,2024-11-21T01:53:47.370000 +CVE-2013-3513,0,0,9f4d87e8ce18f6f6663d0e215d3278b5955dcdd11d558d18d5c663f4a0e4f520,2024-11-21T01:53:47.523000 +CVE-2013-3514,0,0,903f5ed9cfa3a6f7319c0710500d3e9c1e93077734c5ffcbeddc148ada5b3979,2024-11-21T01:53:47.670000 +CVE-2013-3515,0,0,b32969bfe68b198d8b3a5c5c20dc486b24f3642d20b553e2b054ea18644724af,2024-11-21T01:53:47.833000 CVE-2013-3516,0,0,bd18e292e70372426975865b00522f622d19812ceb84d27dd454ba18abd5effb,2019-11-18T17:20:49.237000 CVE-2013-3517,0,0,ac85a47ca94716d148e1142f7a71bb5087269c72d5aa2afe80cbb71969475477,2019-11-15T20:01:03.417000 -CVE-2013-3519,0,1,f5f8bf0ed8c24395d1a66020414a7f79303da4f1a16ebf491db6507becdbd6f6,2024-11-21T01:53:48.300000 -CVE-2013-3520,0,1,1636b08ba5d280708d9755c3dcec3f90929121205789aa24f7ed370b3df974ec,2024-11-21T01:53:48.450000 +CVE-2013-3519,0,0,f5f8bf0ed8c24395d1a66020414a7f79303da4f1a16ebf491db6507becdbd6f6,2024-11-21T01:53:48.300000 +CVE-2013-3520,0,0,1636b08ba5d280708d9755c3dcec3f90929121205789aa24f7ed370b3df974ec,2024-11-21T01:53:48.450000 CVE-2013-3521,0,0,7735ce7246c7f56cee74680dc2893318655bb79899d9e6dc0cfad275c8956197,2023-11-07T02:15:58.200000 -CVE-2013-3522,0,1,6997a07fd6113d0710237dbf0a0688a8ec560584154e3442953c9a5a6ed02406,2024-11-21T01:53:48.603000 -CVE-2013-3523,0,1,ff914547e08de85e35d470da938c0522426be0cd72d25347c0f5e3a045d3ee5d,2024-11-21T01:53:48.740000 -CVE-2013-3524,0,1,b4df1c91aaf8a58d0bb833f9c0934dccef52c92a04d591b401e86c6421211cb0,2024-11-21T01:53:48.883000 -CVE-2013-3525,0,1,37bddc26dc1f98102dcb232e12548782cf3f2ccbc979be4d321de528b546d722,2024-11-21T01:53:49.030000 -CVE-2013-3526,0,1,c5ea44e06c42084766ef1a7ad1465d49bca840e24a10bbd054fb73bc9abef51c,2024-11-21T01:53:49.193000 -CVE-2013-3527,0,1,e756c92f7291f12e9914e494ea9e5531c7abd812d84af0260d510f0a0b958ff0,2024-11-21T01:53:49.343000 -CVE-2013-3528,0,1,171f0b21573061a0e87b8cf1a026fc4db2b25259b81022338fad22f8416da0d2,2024-11-21T01:53:49.523000 -CVE-2013-3529,0,1,f118c31984b9543ad906df9a863604b6881ca6f073d9b65d03e214c07debf3f4,2024-11-21T01:53:49.680000 -CVE-2013-3530,0,1,e812da17a6e21d75f73234358f9d2bac1964778bd8974bc971f7c474e0f83569,2024-11-21T01:53:49.837000 -CVE-2013-3531,0,1,ff09bd430d4e9249331cbb54670f82b31fca42b4686fbabdb4d12b02e1de21f4,2024-11-21T01:53:49.990000 -CVE-2013-3532,0,1,cf2aa9052a60a7f55a0fb7e72e0bd3c74db50fa04bde6380627d33d37a562dec,2024-11-21T01:53:50.140000 -CVE-2013-3533,0,1,e51fc90251ced0402758d88cd3970c2b32116b5ded73c0b551adc8b81cf89b39,2024-11-21T01:53:50.283000 -CVE-2013-3534,0,1,a415dfc5c952e297cd3ce9c79eb044c86302b9e5dba41d7194de6f3dd3929e49,2024-11-21T01:53:50.427000 -CVE-2013-3535,0,1,52a18d3d9d4e073e5e527f8efe17b1abb632f4c1b3c54ee96ffa3d5d5355f07e,2024-11-21T01:53:50.580000 -CVE-2013-3536,0,1,7125e072095d3d50558a39fb87634539ae5650d6fe9e5e4a240adf3490ca8bb0,2024-11-21T01:53:50.723000 -CVE-2013-3537,0,1,5aeda1301436dd997cce5466320b9dcdf2316bc198021e649e36410fd400e430,2024-11-21T01:53:50.857000 -CVE-2013-3538,0,1,eb1e11698c60252d44948a7c03a346f16667bb3a83cf537c5b705556429aa27e,2024-11-21T01:53:51.013000 -CVE-2013-3539,0,1,1280b7c9174cc4d02ce5709e37389692dbab0c558308bed35ab964b2302ebfdc,2024-11-21T01:53:51.143000 -CVE-2013-3540,0,1,8e78f0f686ea95648300578d2690936943c950a650a34cf432ca49a543cb1be9,2024-11-21T01:53:51.283000 -CVE-2013-3541,0,1,7b00023607b5333ad06c62a50826248a8b58f9bdc75b377f0cf63afc9e35a283,2024-11-21T01:53:51.413000 +CVE-2013-3522,0,0,6997a07fd6113d0710237dbf0a0688a8ec560584154e3442953c9a5a6ed02406,2024-11-21T01:53:48.603000 +CVE-2013-3523,0,0,ff914547e08de85e35d470da938c0522426be0cd72d25347c0f5e3a045d3ee5d,2024-11-21T01:53:48.740000 +CVE-2013-3524,0,0,b4df1c91aaf8a58d0bb833f9c0934dccef52c92a04d591b401e86c6421211cb0,2024-11-21T01:53:48.883000 +CVE-2013-3525,0,0,37bddc26dc1f98102dcb232e12548782cf3f2ccbc979be4d321de528b546d722,2024-11-21T01:53:49.030000 +CVE-2013-3526,0,0,c5ea44e06c42084766ef1a7ad1465d49bca840e24a10bbd054fb73bc9abef51c,2024-11-21T01:53:49.193000 +CVE-2013-3527,0,0,e756c92f7291f12e9914e494ea9e5531c7abd812d84af0260d510f0a0b958ff0,2024-11-21T01:53:49.343000 +CVE-2013-3528,0,0,171f0b21573061a0e87b8cf1a026fc4db2b25259b81022338fad22f8416da0d2,2024-11-21T01:53:49.523000 +CVE-2013-3529,0,0,f118c31984b9543ad906df9a863604b6881ca6f073d9b65d03e214c07debf3f4,2024-11-21T01:53:49.680000 +CVE-2013-3530,0,0,e812da17a6e21d75f73234358f9d2bac1964778bd8974bc971f7c474e0f83569,2024-11-21T01:53:49.837000 +CVE-2013-3531,0,0,ff09bd430d4e9249331cbb54670f82b31fca42b4686fbabdb4d12b02e1de21f4,2024-11-21T01:53:49.990000 +CVE-2013-3532,0,0,cf2aa9052a60a7f55a0fb7e72e0bd3c74db50fa04bde6380627d33d37a562dec,2024-11-21T01:53:50.140000 +CVE-2013-3533,0,0,e51fc90251ced0402758d88cd3970c2b32116b5ded73c0b551adc8b81cf89b39,2024-11-21T01:53:50.283000 +CVE-2013-3534,0,0,a415dfc5c952e297cd3ce9c79eb044c86302b9e5dba41d7194de6f3dd3929e49,2024-11-21T01:53:50.427000 +CVE-2013-3535,0,0,52a18d3d9d4e073e5e527f8efe17b1abb632f4c1b3c54ee96ffa3d5d5355f07e,2024-11-21T01:53:50.580000 +CVE-2013-3536,0,0,7125e072095d3d50558a39fb87634539ae5650d6fe9e5e4a240adf3490ca8bb0,2024-11-21T01:53:50.723000 +CVE-2013-3537,0,0,5aeda1301436dd997cce5466320b9dcdf2316bc198021e649e36410fd400e430,2024-11-21T01:53:50.857000 +CVE-2013-3538,0,0,eb1e11698c60252d44948a7c03a346f16667bb3a83cf537c5b705556429aa27e,2024-11-21T01:53:51.013000 +CVE-2013-3539,0,0,1280b7c9174cc4d02ce5709e37389692dbab0c558308bed35ab964b2302ebfdc,2024-11-21T01:53:51.143000 +CVE-2013-3540,0,0,8e78f0f686ea95648300578d2690936943c950a650a34cf432ca49a543cb1be9,2024-11-21T01:53:51.283000 +CVE-2013-3541,0,0,7b00023607b5333ad06c62a50826248a8b58f9bdc75b377f0cf63afc9e35a283,2024-11-21T01:53:51.413000 CVE-2013-3542,0,0,7802c17509a8a91188867b646fe4836e19c05e22c2a80159f855e7a4131b3e1f,2019-12-19T20:21:08.520000 -CVE-2013-3543,0,1,edc27c74f64ddbeaaa7ccaa3c6bac8cd782cfc78bb61f50658588cd12c54e70c,2024-11-21T01:53:51.743000 +CVE-2013-3543,0,0,edc27c74f64ddbeaaa7ccaa3c6bac8cd782cfc78bb61f50658588cd12c54e70c,2024-11-21T01:53:51.743000 CVE-2013-3544,0,0,7f0121aa135b3578008e5dfe14b4f3b703927933083c7c8409102f752ca680ef,2023-11-07T02:15:58.660000 CVE-2013-3550,0,0,88201a4f2be14dd8d9504f11b03e3dee38b75a0910ef37072b9ad6a615a5c8eb,2023-11-07T02:15:58.690000 CVE-2013-3551,0,0,eb2b32ab23b85616630e43b558d6c982ff975e1226dac6a62489f244bbafdd94,2020-02-26T19:34:22.890000 CVE-2013-3552,0,0,c0e6424da3a5bd8d343d3c56238ad293543e78a13fbca3a971ddd0703b3d7c1b,2018-02-24T21:47:59.627000 CVE-2013-3553,0,0,3a4030504a862a67b6eaee1cb8fe7e271ba14ea8d652ea0ed181f5d4a9698f71,2018-02-24T21:46:52.923000 -CVE-2013-3555,0,1,f63dac93e3ff00beceefe958d23c7c148cb570cbace0294e61ce868d53670e2f,2024-11-21T01:53:52.360000 -CVE-2013-3556,0,1,ce43ab03e66020bc5ee34b4beadc0151710aeb9cbe482cb5116daf7708a9f44d,2024-11-21T01:53:52.520000 -CVE-2013-3557,0,1,b9217d1390f5b3d8b5290f16df4105773f40b08c052ef086ccbee6365bb79952,2024-11-21T01:53:52.673000 -CVE-2013-3558,0,1,e4b0c890d2e6d1a0b2d4dc249c976ff72e8bd83de9a8f235408d74a74ed3b689,2024-11-21T01:53:52.847000 -CVE-2013-3559,0,1,63f097d3c88fe45d865a5e4b1794d3d608cdd2d86c41766ea17fc18b06456a91,2024-11-21T01:53:53 -CVE-2013-3560,0,1,b9afce27e425e02832d5d075705875eb737fafbbe142ef59128752f60da4095b,2024-11-21T01:53:53.163000 -CVE-2013-3561,0,1,24685af06abf1a5e8eeaa7f740cc879a3641ddf4e1b42aed61680577568f77b4,2024-11-21T01:53:53.320000 -CVE-2013-3562,0,1,84232824be4eb9dd3e450936962f7f57d47b792fcc2f899af506b52f8463792a,2024-11-21T01:53:53.490000 -CVE-2013-3563,0,1,81ca4cb1926dd0825a50b6fbfdc14e03ad19df83bd1c1c4be24befa14df6c5a6,2024-11-21T01:53:53.637000 +CVE-2013-3555,0,0,f63dac93e3ff00beceefe958d23c7c148cb570cbace0294e61ce868d53670e2f,2024-11-21T01:53:52.360000 +CVE-2013-3556,0,0,ce43ab03e66020bc5ee34b4beadc0151710aeb9cbe482cb5116daf7708a9f44d,2024-11-21T01:53:52.520000 +CVE-2013-3557,0,0,b9217d1390f5b3d8b5290f16df4105773f40b08c052ef086ccbee6365bb79952,2024-11-21T01:53:52.673000 +CVE-2013-3558,0,0,e4b0c890d2e6d1a0b2d4dc249c976ff72e8bd83de9a8f235408d74a74ed3b689,2024-11-21T01:53:52.847000 +CVE-2013-3559,0,0,63f097d3c88fe45d865a5e4b1794d3d608cdd2d86c41766ea17fc18b06456a91,2024-11-21T01:53:53 +CVE-2013-3560,0,0,b9afce27e425e02832d5d075705875eb737fafbbe142ef59128752f60da4095b,2024-11-21T01:53:53.163000 +CVE-2013-3561,0,0,24685af06abf1a5e8eeaa7f740cc879a3641ddf4e1b42aed61680577568f77b4,2024-11-21T01:53:53.320000 +CVE-2013-3562,0,0,84232824be4eb9dd3e450936962f7f57d47b792fcc2f899af506b52f8463792a,2024-11-21T01:53:53.490000 +CVE-2013-3563,0,0,81ca4cb1926dd0825a50b6fbfdc14e03ad19df83bd1c1c4be24befa14df6c5a6,2024-11-21T01:53:53.637000 CVE-2013-3564,0,0,92b4918ecae0655bfd1000e08c7d58175d00b727270e6e1d53bc0e9999cf697d,2020-02-12T17:29:03.633000 CVE-2013-3565,0,0,85a1184b01299871141614224ae47a5f1438088dd23f38e2eaf5cbcba04a8d86,2023-11-07T02:15:58.850000 -CVE-2013-3567,0,1,40b5eaacac07ff6fe2be075d1e99eca2b6f56853798ea5988d5691cd6ab0d7da,2024-11-21T01:53:54.060000 +CVE-2013-3567,0,0,40b5eaacac07ff6fe2be075d1e99eca2b6f56853798ea5988d5691cd6ab0d7da,2024-11-21T01:53:54.060000 CVE-2013-3568,0,0,844b306da4cf9091e1bb63ec7a570b5f36140e1a9768fbf31389967da9dd3078,2020-02-12T15:54:24.353000 -CVE-2013-3571,0,1,f030285dc3981696acfcb517b10206a59fdebd3e6ea5f7db53e15923f3c86ccb,2024-11-21T01:53:54.377000 -CVE-2013-3572,0,1,83742501c567036565f6be7a48eb40a105d7d1d8a478b431169220ed5d555588,2024-11-21T01:53:54.520000 -CVE-2013-3573,0,1,895853b78852dbf016e18efce88322f1f4115671ca54cc600c5905f6e50c1b4a,2024-11-21T01:53:54.660000 -CVE-2013-3574,0,1,65364f4d5cac4ac8d76de87a9252393a8c6bb6f7b64f91cd319da5c6451e55e0,2024-11-21T01:53:54.767000 -CVE-2013-3575,0,1,4041dbbf80c4fa02cfdfe1cf993877030e1f944ecba75ac39caf16e1c52cc86d,2024-11-21T01:53:54.873000 -CVE-2013-3576,0,1,32bddcf412788c498a2b93ec19a5079dc6c25b7fb75c61be897c58aa1879a551,2024-11-21T01:53:54.990000 -CVE-2013-3577,0,1,1faf1a17321be26254dbae2311efc42919f626b989b73fa084c828d7aa5adfb9,2024-11-21T01:53:55.097000 -CVE-2013-3578,0,1,59d4c2aa80d77501e00fd6b9b07b33b2422bd6c7b41f866e8ccb5bed1ebc088e,2024-11-21T01:53:55.213000 -CVE-2013-3579,0,1,8cc6100d5b8f85cf37edfee55f66da8e2a6b14c79e5a93e5ac57aea2236f8526,2024-11-21T01:53:55.327000 -CVE-2013-3580,0,1,f95e52acca6ea982371b9f0c7a335d8e2168c2555b2d8b8c7fbbe030286b1d51,2024-11-21T01:53:55.437000 -CVE-2013-3581,0,1,83aa41e07c8048235c3e22e3302411fa8dc5b0a56db538dc2c22d147fe3e21d4,2024-11-21T01:53:55.550000 -CVE-2013-3582,0,1,76d593be547b090ee46da0915266a068078f92c77298a1aee47dc0a8e7e826d8,2024-11-21T01:53:55.670000 -CVE-2013-3583,0,1,c69b8b84e05446c6a5000dc3aebad23e739bfa807fceec5f99116cc79b830892,2024-11-21T01:53:55.790000 -CVE-2013-3584,0,1,8d77fd88a4fa452a237d5c37a9714c1e6596a00d6e04259e9bb7898bda8e87fb,2024-11-21T01:53:55.917000 -CVE-2013-3585,0,1,9dd9459b668f91a6daacd82192e270d3a02b6a921709b9ddc6bae551cd4568d7,2024-11-21T01:53:56.050000 -CVE-2013-3586,0,1,8c10652d02a52ccac6562ac54124a428595fcb5a20e721fb1a8484cf95f70248,2024-11-21T01:53:56.163000 +CVE-2013-3571,0,0,f030285dc3981696acfcb517b10206a59fdebd3e6ea5f7db53e15923f3c86ccb,2024-11-21T01:53:54.377000 +CVE-2013-3572,0,0,83742501c567036565f6be7a48eb40a105d7d1d8a478b431169220ed5d555588,2024-11-21T01:53:54.520000 +CVE-2013-3573,0,0,895853b78852dbf016e18efce88322f1f4115671ca54cc600c5905f6e50c1b4a,2024-11-21T01:53:54.660000 +CVE-2013-3574,0,0,65364f4d5cac4ac8d76de87a9252393a8c6bb6f7b64f91cd319da5c6451e55e0,2024-11-21T01:53:54.767000 +CVE-2013-3575,0,0,4041dbbf80c4fa02cfdfe1cf993877030e1f944ecba75ac39caf16e1c52cc86d,2024-11-21T01:53:54.873000 +CVE-2013-3576,0,0,32bddcf412788c498a2b93ec19a5079dc6c25b7fb75c61be897c58aa1879a551,2024-11-21T01:53:54.990000 +CVE-2013-3577,0,0,1faf1a17321be26254dbae2311efc42919f626b989b73fa084c828d7aa5adfb9,2024-11-21T01:53:55.097000 +CVE-2013-3578,0,0,59d4c2aa80d77501e00fd6b9b07b33b2422bd6c7b41f866e8ccb5bed1ebc088e,2024-11-21T01:53:55.213000 +CVE-2013-3579,0,0,8cc6100d5b8f85cf37edfee55f66da8e2a6b14c79e5a93e5ac57aea2236f8526,2024-11-21T01:53:55.327000 +CVE-2013-3580,0,0,f95e52acca6ea982371b9f0c7a335d8e2168c2555b2d8b8c7fbbe030286b1d51,2024-11-21T01:53:55.437000 +CVE-2013-3581,0,0,83aa41e07c8048235c3e22e3302411fa8dc5b0a56db538dc2c22d147fe3e21d4,2024-11-21T01:53:55.550000 +CVE-2013-3582,0,0,76d593be547b090ee46da0915266a068078f92c77298a1aee47dc0a8e7e826d8,2024-11-21T01:53:55.670000 +CVE-2013-3583,0,0,c69b8b84e05446c6a5000dc3aebad23e739bfa807fceec5f99116cc79b830892,2024-11-21T01:53:55.790000 +CVE-2013-3584,0,0,8d77fd88a4fa452a237d5c37a9714c1e6596a00d6e04259e9bb7898bda8e87fb,2024-11-21T01:53:55.917000 +CVE-2013-3585,0,0,9dd9459b668f91a6daacd82192e270d3a02b6a921709b9ddc6bae551cd4568d7,2024-11-21T01:53:56.050000 +CVE-2013-3586,0,0,8c10652d02a52ccac6562ac54124a428595fcb5a20e721fb1a8484cf95f70248,2024-11-21T01:53:56.163000 CVE-2013-3587,0,0,ea7e3e476fd361c7345b6309d14ee3b860f586a2b3dfe6dca539f572c632c311,2023-11-07T02:15:59.040000 -CVE-2013-3588,0,1,321c4d7e8eca2c7be64f24f25f375c4e80c22fef319ce159897a81cd03c477ca,2024-11-21T01:53:56.450000 -CVE-2013-3589,0,1,31bb64a578c0b329c8f57ee2106e7a6876deb78fa5d6c32ca8949df18f24e22a,2024-11-21T01:53:56.570000 -CVE-2013-3590,0,1,ad1216dd9f36dfc76ef74ed67b6ae69c914c5fbc281d70d7520d786e4cf68b27,2024-11-21T01:53:56.703000 +CVE-2013-3588,0,0,321c4d7e8eca2c7be64f24f25f375c4e80c22fef319ce159897a81cd03c477ca,2024-11-21T01:53:56.450000 +CVE-2013-3589,0,0,31bb64a578c0b329c8f57ee2106e7a6876deb78fa5d6c32ca8949df18f24e22a,2024-11-21T01:53:56.570000 +CVE-2013-3590,0,0,ad1216dd9f36dfc76ef74ed67b6ae69c914c5fbc281d70d7520d786e4cf68b27,2024-11-21T01:53:56.703000 CVE-2013-3591,0,0,e3aafd610e08091f9747d67286409257c9f56cc352eb730fa8c096ef76d33450,2020-02-11T19:40:42.467000 -CVE-2013-3593,0,1,247aa4b4068d472d7a837837aeffa91d46f8f11699cef81b42ce4752df104eb9,2024-11-21T01:53:56.970000 -CVE-2013-3594,0,1,3755b5dc356c506caece637483a2a91c8f7a50754ea351ccc8352f498f53b090,2024-11-21T01:53:57.097000 -CVE-2013-3595,0,1,3dbf11be807e5debd4337c8cb0ee4fc0677205a9c142d26188da2f1254c02898,2024-11-21T01:53:57.223000 -CVE-2013-3596,0,1,542dc645ed5b5744ae90c7f8a2e3c8034bffbc0354dc27e103bd70e10a13a76e,2024-11-21T01:53:57.347000 -CVE-2013-3597,0,1,06f79247ea1f31ce3df65cf2ba6bc42a52bcfafc59734eaaf0da6a1c1a686e03,2024-11-21T01:53:57.470000 -CVE-2013-3598,0,1,77161d38aa9149ccf890be972fc0b26aa3e96875d2a1d8e4541f8f27741594ae,2024-11-21T01:53:57.610000 -CVE-2013-3599,0,1,528327b0915c5d3860a5760505ef7868a648d817639d658fedd90f15f294db63,2024-11-21T01:53:57.727000 -CVE-2013-3600,0,1,1165e0cbbf7354bab56ec59e27572a1959a82d666ff56fe14ef5b2bd25009557,2024-11-21T01:53:57.847000 -CVE-2013-3601,0,1,aa4afe5bbc6fb3ec6dcc568ace11648d3474171dfeaaaf694704b184555700e8,2024-11-21T01:53:57.960000 -CVE-2013-3602,0,1,c8b3b48ce13248a23219b7f1de0d1d58a12d85c346d22627056819a1681406df,2024-11-21T01:53:58.080000 -CVE-2013-3603,0,1,0392b61320f16629b0b68d4e4201d8b851aeb909b6cc7edeb74ccac051fc30c0,2024-11-21T01:53:58.183000 -CVE-2013-3604,0,1,086cad3bd80dbb1d9f342754f7871c2680467fca3d7b8b0de0d3f2f0687c2daf,2024-11-21T01:53:58.290000 -CVE-2013-3605,0,1,f88323026b6cc32804306e914b72c71c8ec9573fc7aabcd1e82793b823369e9a,2024-11-21T01:53:58.400000 -CVE-2013-3606,0,1,05b9614caf0ab93e1315af364aa386cc9128b90b82728c654884ddd84cf065b7,2024-11-21T01:53:58.513000 -CVE-2013-3607,0,1,ab15ee98130e5d28d4b6b0004d5f3afb086afadb4f4c07bc9a7025c364f72b0b,2024-11-21T01:53:58.630000 -CVE-2013-3608,0,1,7141d2db1f8f25ee8a2a30aadbb808df6bc0a593a3dd7da05a7088d4b8de5b93,2024-11-21T01:53:58.773000 -CVE-2013-3609,0,1,08c116f0791e7ba8c44cee4e597e2d5d027b2ad86d26d1b4ac83f5fc21ef3549,2024-11-21T01:53:58.910000 -CVE-2013-3610,0,1,9a5eed83fdc510d2a7a420db9530f2bf3e790ec92af9ef6453653e96d8c9cf4e,2024-11-21T01:53:59.057000 +CVE-2013-3593,0,0,247aa4b4068d472d7a837837aeffa91d46f8f11699cef81b42ce4752df104eb9,2024-11-21T01:53:56.970000 +CVE-2013-3594,0,0,3755b5dc356c506caece637483a2a91c8f7a50754ea351ccc8352f498f53b090,2024-11-21T01:53:57.097000 +CVE-2013-3595,0,0,3dbf11be807e5debd4337c8cb0ee4fc0677205a9c142d26188da2f1254c02898,2024-11-21T01:53:57.223000 +CVE-2013-3596,0,0,542dc645ed5b5744ae90c7f8a2e3c8034bffbc0354dc27e103bd70e10a13a76e,2024-11-21T01:53:57.347000 +CVE-2013-3597,0,0,06f79247ea1f31ce3df65cf2ba6bc42a52bcfafc59734eaaf0da6a1c1a686e03,2024-11-21T01:53:57.470000 +CVE-2013-3598,0,0,77161d38aa9149ccf890be972fc0b26aa3e96875d2a1d8e4541f8f27741594ae,2024-11-21T01:53:57.610000 +CVE-2013-3599,0,0,528327b0915c5d3860a5760505ef7868a648d817639d658fedd90f15f294db63,2024-11-21T01:53:57.727000 +CVE-2013-3600,0,0,1165e0cbbf7354bab56ec59e27572a1959a82d666ff56fe14ef5b2bd25009557,2024-11-21T01:53:57.847000 +CVE-2013-3601,0,0,aa4afe5bbc6fb3ec6dcc568ace11648d3474171dfeaaaf694704b184555700e8,2024-11-21T01:53:57.960000 +CVE-2013-3602,0,0,c8b3b48ce13248a23219b7f1de0d1d58a12d85c346d22627056819a1681406df,2024-11-21T01:53:58.080000 +CVE-2013-3603,0,0,0392b61320f16629b0b68d4e4201d8b851aeb909b6cc7edeb74ccac051fc30c0,2024-11-21T01:53:58.183000 +CVE-2013-3604,0,0,086cad3bd80dbb1d9f342754f7871c2680467fca3d7b8b0de0d3f2f0687c2daf,2024-11-21T01:53:58.290000 +CVE-2013-3605,0,0,f88323026b6cc32804306e914b72c71c8ec9573fc7aabcd1e82793b823369e9a,2024-11-21T01:53:58.400000 +CVE-2013-3606,0,0,05b9614caf0ab93e1315af364aa386cc9128b90b82728c654884ddd84cf065b7,2024-11-21T01:53:58.513000 +CVE-2013-3607,0,0,ab15ee98130e5d28d4b6b0004d5f3afb086afadb4f4c07bc9a7025c364f72b0b,2024-11-21T01:53:58.630000 +CVE-2013-3608,0,0,7141d2db1f8f25ee8a2a30aadbb808df6bc0a593a3dd7da05a7088d4b8de5b93,2024-11-21T01:53:58.773000 +CVE-2013-3609,0,0,08c116f0791e7ba8c44cee4e597e2d5d027b2ad86d26d1b4ac83f5fc21ef3549,2024-11-21T01:53:58.910000 +CVE-2013-3610,0,0,9a5eed83fdc510d2a7a420db9530f2bf3e790ec92af9ef6453653e96d8c9cf4e,2024-11-21T01:53:59.057000 CVE-2013-3611,0,0,71068f274a2ed20de08eb7a5549299d762b139191481f5257f1811df9df2b861,2023-11-07T02:15:59.330000 -CVE-2013-3612,0,1,d07c341d0000ace8cb1fe45487e776559887b5e2ce223203eb3e2f5865c95a01,2024-11-21T01:53:59.203000 -CVE-2013-3613,0,1,768d82c743487bef739a4ef3c0c4583183806c76d9b6cd59f9a73a664b75c672,2024-11-21T01:53:59.320000 -CVE-2013-3614,0,1,6b804c2e072942f106ed0036b7a9d39c80e6d0c0416355a25e47f28d42b70953,2024-11-21T01:53:59.450000 -CVE-2013-3615,0,1,1c31c95d7b8fa29168b934c84c89ef9a5223951a3c654efe3d980c41c43e0e0c,2024-11-21T01:53:59.600000 -CVE-2013-3616,0,1,df3d38e313d72d0bdcab89ceebf3e35ab85c3144816e98b6c13aba6cba03e363,2024-11-21T01:53:59.733000 -CVE-2013-3617,0,1,de48ff4e624bbf31ff47f9fa0ee8104d9b94a7afceed57bc5b7a3c71451dd09b,2024-11-21T01:53:59.847000 +CVE-2013-3612,0,0,d07c341d0000ace8cb1fe45487e776559887b5e2ce223203eb3e2f5865c95a01,2024-11-21T01:53:59.203000 +CVE-2013-3613,0,0,768d82c743487bef739a4ef3c0c4583183806c76d9b6cd59f9a73a664b75c672,2024-11-21T01:53:59.320000 +CVE-2013-3614,0,0,6b804c2e072942f106ed0036b7a9d39c80e6d0c0416355a25e47f28d42b70953,2024-11-21T01:53:59.450000 +CVE-2013-3615,0,0,1c31c95d7b8fa29168b934c84c89ef9a5223951a3c654efe3d980c41c43e0e0c,2024-11-21T01:53:59.600000 +CVE-2013-3616,0,0,df3d38e313d72d0bdcab89ceebf3e35ab85c3144816e98b6c13aba6cba03e363,2024-11-21T01:53:59.733000 +CVE-2013-3617,0,0,de48ff4e624bbf31ff47f9fa0ee8104d9b94a7afceed57bc5b7a3c71451dd09b,2024-11-21T01:53:59.847000 CVE-2013-3619,0,0,0c1aa90e0423dab1afbba918c57b5bbeee2ddf5eccfc067c68ae1cb27f4947da,2020-01-15T14:08:06.497000 CVE-2013-3620,0,0,d14414d9f1920f46d05ed6666a72186ef6bda9c8385d531428a2fb44dd29f90f,2020-01-14T19:37:23.433000 CVE-2013-3621,0,0,ee1e42312465be3851783f291cbf1990f50c9e049adc249801fa45f588a23d7d,2023-11-07T02:15:59.627000 -CVE-2013-3622,0,1,237a089da1b4dfa02647310a46c3944ea1d2ae04c788fee3d4b22201b1328745,2024-11-21T01:54:00.247000 -CVE-2013-3623,0,1,6bb389222a1ebd279ba0e9a6fc8d175f2c1bc40504939abe04159fc8153bd760,2024-11-21T01:54:00.367000 -CVE-2013-3624,0,1,a7f0071c6be01eaea2ab999473d5b7ba1a4e6f18918ec98e2479307afbaf4027,2024-11-21T01:54:00.480000 -CVE-2013-3625,0,1,669d57cd7e2abf68065f19d4d0221e4ab173c97421850b230bd3c5f39f9c2c31,2024-11-21T01:54:00.600000 -CVE-2013-3626,0,1,0bc5b713221b607205aec686b081c92a41c851fc3f2e4438d96458f4627a0bfc,2024-11-21T01:54:00.713000 -CVE-2013-3627,0,1,a7ead553d2522dffc293bd9177d10d256b12f3845b7f0663305f8e6a0e8956b2,2024-11-21T01:54:00.827000 +CVE-2013-3622,0,0,237a089da1b4dfa02647310a46c3944ea1d2ae04c788fee3d4b22201b1328745,2024-11-21T01:54:00.247000 +CVE-2013-3623,0,0,6bb389222a1ebd279ba0e9a6fc8d175f2c1bc40504939abe04159fc8153bd760,2024-11-21T01:54:00.367000 +CVE-2013-3624,0,0,a7f0071c6be01eaea2ab999473d5b7ba1a4e6f18918ec98e2479307afbaf4027,2024-11-21T01:54:00.480000 +CVE-2013-3625,0,0,669d57cd7e2abf68065f19d4d0221e4ab173c97421850b230bd3c5f39f9c2c31,2024-11-21T01:54:00.600000 +CVE-2013-3626,0,0,0bc5b713221b607205aec686b081c92a41c851fc3f2e4438d96458f4627a0bfc,2024-11-21T01:54:00.713000 +CVE-2013-3627,0,0,a7ead553d2522dffc293bd9177d10d256b12f3845b7f0663305f8e6a0e8956b2,2024-11-21T01:54:00.827000 CVE-2013-3628,0,0,78a3aac25292e9695455e02f289d2be4448bfbcb24b13e5bc27461e3d995477e,2020-02-10T17:51:22.467000 CVE-2013-3629,0,0,1243c1de297af891484b14bbcdd190028d27d0e3bd21aeead1aed6ae2d4c994c,2020-02-10T17:54:40.087000 -CVE-2013-3630,0,1,d962e0e739518a450a74888b7b7afdc350c53fd9df0544654d49e8eddcd1f868,2024-11-21T01:54:01.160000 -CVE-2013-3631,0,1,4ba33ac79ad0678767c1a212d26ddad6d3592bd7b96675d8bced03d07e271de4,2024-11-21T01:54:01.300000 +CVE-2013-3630,0,0,d962e0e739518a450a74888b7b7afdc350c53fd9df0544654d49e8eddcd1f868,2024-11-21T01:54:01.160000 +CVE-2013-3631,0,0,4ba33ac79ad0678767c1a212d26ddad6d3592bd7b96675d8bced03d07e271de4,2024-11-21T01:54:01.300000 CVE-2013-3632,0,0,a89ef200f72ab490862974274fb9cd622c31f8ccf4f07b05181fb48b6622eb8f,2024-08-01T14:35:00.653000 -CVE-2013-3633,0,1,5e8ee555ff326f99735fc8e5dae7e97fbfafcc6098094e80863729c311948336,2024-11-21T01:54:01.613000 -CVE-2013-3634,0,1,0ccfeea2f3fff1440b355ddd98656e1809cfd99c8d3ba7adbdcd678ee572deb8,2024-11-21T01:54:01.750000 +CVE-2013-3633,0,0,5e8ee555ff326f99735fc8e5dae7e97fbfafcc6098094e80863729c311948336,2024-11-21T01:54:01.613000 +CVE-2013-3634,0,0,0ccfeea2f3fff1440b355ddd98656e1809cfd99c8d3ba7adbdcd678ee572deb8,2024-11-21T01:54:01.750000 CVE-2013-3635,0,0,f575c34db10f7c156de103e2877178a2a9f03f93cb0ceda628913c600f61d79b,2020-05-06T16:01:52.080000 CVE-2013-3636,0,0,f730311168ee5532431f5567e06864452ff798f7c7da7690395296f7036002bd,2020-05-06T16:01:52.080000 CVE-2013-3637,0,0,054eff704ac0575e86543ed49b58b8fc61d4a57a24be6d676d99461911c5c62c,2020-05-06T16:01:52.080000 CVE-2013-3638,0,0,7ee931704578501f5cbd55df0cce62f4935002ee9660741965f33c2b4e9e3393,2020-02-12T15:34:41.657000 -CVE-2013-3639,0,1,b136be3c4ae335cd764d5222db53191ec5c9b4b46465cfd985d742cc945edabd,2024-11-21T01:54:02.470000 -CVE-2013-3640,0,1,20bc5134456a971f00350731c2519287ca0a88069c89291aab02a81782799e23,2024-11-21T01:54:02.647000 -CVE-2013-3641,0,1,8a560a220aa2e80897551496913517357e22e5fb5058db817825286ea0ffeb2d,2024-11-21T01:54:02.763000 -CVE-2013-3642,0,1,9702ca0a92dff47a7a23c50e6411fd5bca6e29e000c6a8521ed620e09b047fb4,2024-11-21T01:54:02.873000 -CVE-2013-3643,0,1,1b4904f554edd005f2687581c947b8f7c111a4573bfb319d6f8f4cc4fc1f261c,2024-11-21T01:54:02.987000 -CVE-2013-3644,0,1,b452b6f83a3e6ba2ea4425a8bdee1427f31208e1f596519c9a7c5ce2a66c3a1f,2024-11-21T01:54:03.100000 -CVE-2013-3645,0,1,bfc689c619526991d8e2a8ee7abf2fe3fc99d821adc36f0760dc292728a0aaef,2024-11-21T01:54:03.250000 -CVE-2013-3646,0,1,365e25bdf843a037a91e8b4b0ee36e9a8a4b1aaef450a102ff7e60054cce6f65,2024-11-21T01:54:03.357000 -CVE-2013-3647,0,1,3f7199925cad2013443f81e07e166df26334a28f1930966e2d4d71618696cd74,2024-11-21T01:54:03.460000 -CVE-2013-3648,0,1,ae7e17552787866b7e1a696769823904a44bafb53f477ef73dd1f313d829afa2,2024-11-21T01:54:03.573000 -CVE-2013-3649,0,1,06f587c80451ee54a21eedc91fd0bfc01089857a546ea3e0a85fe05eabf5180c,2024-11-21T01:54:03.683000 -CVE-2013-3650,0,1,8ae7e1b0c6e2d39dd2e60531184c44742d04a4bd0fbf46c1f3e4292fef463d09,2024-11-21T01:54:03.787000 -CVE-2013-3651,0,1,ff5dc4c9310679049121a1d573b8b0241a026c173a1447e8297c44ae670021ff,2024-11-21T01:54:03.907000 -CVE-2013-3652,0,1,83437e4bb72ca125c24fe559930bccb9c6c7f7ee40fdfd9b31206f8f8b546b91,2024-11-21T01:54:04.027000 -CVE-2013-3653,0,1,47790292598cedb77ef9b6eb1162e9696cccb4511fae6c7c48b15a9873555911,2024-11-21T01:54:04.160000 -CVE-2013-3654,0,1,c623d991cade829abd161d7803ca59695d21288061314628ca3cc7b2c560a57e,2024-11-21T01:54:04.270000 -CVE-2013-3655,0,1,9e7e263a6a73aef61ab087478e96c2a44973f70921397242e7661520c0384e17,2024-11-21T01:54:04.400000 -CVE-2013-3656,0,1,700e6591a48101f3cdc293aafd22b83002851b0a78213edd9136f211e75e3111,2024-11-21T01:54:04.537000 -CVE-2013-3657,0,1,c32606fa5c8123958c5712bcc75dc77fb93a2796b4219dd8e3afffb5dee8a77e,2024-11-21T01:54:04.650000 -CVE-2013-3658,0,1,28596b0b641e2c4c20217b47f21bfbd6bb96e6d1fa245166b6a8d2cfe9dce3df,2024-11-21T01:54:04.757000 -CVE-2013-3659,0,1,ba1b75f58c305a51aefaa3d01adc2962d9efed27b22b6c23cb9f8983f3267e75,2024-11-21T01:54:04.883000 -CVE-2013-3660,0,1,b709bee0bfb0a14201a5583c625a175040a0d57114cd7fd751af80586dec2c91,2024-11-21T01:54:05.007000 -CVE-2013-3661,0,1,e11f6611d27874b3e38e895129c15412c8acbb597e5241f9744029edfb980118,2024-11-21T01:54:05.167000 +CVE-2013-3639,0,0,b136be3c4ae335cd764d5222db53191ec5c9b4b46465cfd985d742cc945edabd,2024-11-21T01:54:02.470000 +CVE-2013-3640,0,0,20bc5134456a971f00350731c2519287ca0a88069c89291aab02a81782799e23,2024-11-21T01:54:02.647000 +CVE-2013-3641,0,0,8a560a220aa2e80897551496913517357e22e5fb5058db817825286ea0ffeb2d,2024-11-21T01:54:02.763000 +CVE-2013-3642,0,0,9702ca0a92dff47a7a23c50e6411fd5bca6e29e000c6a8521ed620e09b047fb4,2024-11-21T01:54:02.873000 +CVE-2013-3643,0,0,1b4904f554edd005f2687581c947b8f7c111a4573bfb319d6f8f4cc4fc1f261c,2024-11-21T01:54:02.987000 +CVE-2013-3644,0,0,b452b6f83a3e6ba2ea4425a8bdee1427f31208e1f596519c9a7c5ce2a66c3a1f,2024-11-21T01:54:03.100000 +CVE-2013-3645,0,0,bfc689c619526991d8e2a8ee7abf2fe3fc99d821adc36f0760dc292728a0aaef,2024-11-21T01:54:03.250000 +CVE-2013-3646,0,0,365e25bdf843a037a91e8b4b0ee36e9a8a4b1aaef450a102ff7e60054cce6f65,2024-11-21T01:54:03.357000 +CVE-2013-3647,0,0,3f7199925cad2013443f81e07e166df26334a28f1930966e2d4d71618696cd74,2024-11-21T01:54:03.460000 +CVE-2013-3648,0,0,ae7e17552787866b7e1a696769823904a44bafb53f477ef73dd1f313d829afa2,2024-11-21T01:54:03.573000 +CVE-2013-3649,0,0,06f587c80451ee54a21eedc91fd0bfc01089857a546ea3e0a85fe05eabf5180c,2024-11-21T01:54:03.683000 +CVE-2013-3650,0,0,8ae7e1b0c6e2d39dd2e60531184c44742d04a4bd0fbf46c1f3e4292fef463d09,2024-11-21T01:54:03.787000 +CVE-2013-3651,0,0,ff5dc4c9310679049121a1d573b8b0241a026c173a1447e8297c44ae670021ff,2024-11-21T01:54:03.907000 +CVE-2013-3652,0,0,83437e4bb72ca125c24fe559930bccb9c6c7f7ee40fdfd9b31206f8f8b546b91,2024-11-21T01:54:04.027000 +CVE-2013-3653,0,0,47790292598cedb77ef9b6eb1162e9696cccb4511fae6c7c48b15a9873555911,2024-11-21T01:54:04.160000 +CVE-2013-3654,0,0,c623d991cade829abd161d7803ca59695d21288061314628ca3cc7b2c560a57e,2024-11-21T01:54:04.270000 +CVE-2013-3655,0,0,9e7e263a6a73aef61ab087478e96c2a44973f70921397242e7661520c0384e17,2024-11-21T01:54:04.400000 +CVE-2013-3656,0,0,700e6591a48101f3cdc293aafd22b83002851b0a78213edd9136f211e75e3111,2024-11-21T01:54:04.537000 +CVE-2013-3657,0,0,c32606fa5c8123958c5712bcc75dc77fb93a2796b4219dd8e3afffb5dee8a77e,2024-11-21T01:54:04.650000 +CVE-2013-3658,0,0,28596b0b641e2c4c20217b47f21bfbd6bb96e6d1fa245166b6a8d2cfe9dce3df,2024-11-21T01:54:04.757000 +CVE-2013-3659,0,0,ba1b75f58c305a51aefaa3d01adc2962d9efed27b22b6c23cb9f8983f3267e75,2024-11-21T01:54:04.883000 +CVE-2013-3660,0,0,b709bee0bfb0a14201a5583c625a175040a0d57114cd7fd751af80586dec2c91,2024-11-21T01:54:05.007000 +CVE-2013-3661,0,0,e11f6611d27874b3e38e895129c15412c8acbb597e5241f9744029edfb980118,2024-11-21T01:54:05.167000 CVE-2013-3662,0,0,576f344df4b1daa88bf6d09d8580fdfd96c106fcf566a0073379bdc7a5721ea0,2017-08-29T01:33:25.777000 CVE-2013-3663,0,0,1445c91a680e9faa5d9a9e80c042569b3c590ae55f71f4a2bda7b88d6351678c,2017-08-29T01:33:25.857000 CVE-2013-3664,0,0,e480eebea19b3febf9cde8bd4332c86d495d140f452a4c3453531458727ebaef,2017-08-29T01:33:25.903000 -CVE-2013-3665,0,1,ef953443b22d4149412729549275acc74287b48d84e29b69094894a5b6f3d0f4,2024-11-21T01:54:05.767000 -CVE-2013-3666,0,1,4c3c63f88164cdfd0533c257f27fdceeec339f7beb4e2833e88e7bd53ffe9d98,2024-11-21T01:54:05.923000 -CVE-2013-3667,0,1,63ce1ab01adb01597d9e9acb6cda06bbbdf32205c53036e04083d597dcab821f,2024-11-21T01:54:06.060000 -CVE-2013-3670,0,1,d1ee88bdd97d2a724752a1d4028deb182e5bd65f91a63421de78f836ba363e9f,2024-11-21T01:54:06.217000 -CVE-2013-3671,0,1,b03e858819062febb1c558059a5efaa61556d8e45004e56f0727f7e5060943a0,2024-11-21T01:54:06.347000 -CVE-2013-3672,0,1,6a49c41ea86ea8076f62f30808444cfad12c3beb624948d26aefa6411bb02665,2024-11-21T01:54:06.480000 -CVE-2013-3673,0,1,31f8c37136763068bfd4446bee7518e957d8ac6842ace15c1351edbf1b42220f,2024-11-21T01:54:06.627000 -CVE-2013-3674,0,1,1beeecaa4804b9bc926b41046e9bb63b49888def0f1d5c78b401b2afc83f21d7,2024-11-21T01:54:06.760000 -CVE-2013-3675,0,1,e6a1b6e1c24e9534119b59b650b01bacba28c59fc89bfb11b469e4ff3c82358f,2024-11-21T01:54:06.910000 +CVE-2013-3665,0,0,ef953443b22d4149412729549275acc74287b48d84e29b69094894a5b6f3d0f4,2024-11-21T01:54:05.767000 +CVE-2013-3666,0,0,4c3c63f88164cdfd0533c257f27fdceeec339f7beb4e2833e88e7bd53ffe9d98,2024-11-21T01:54:05.923000 +CVE-2013-3667,0,0,63ce1ab01adb01597d9e9acb6cda06bbbdf32205c53036e04083d597dcab821f,2024-11-21T01:54:06.060000 +CVE-2013-3670,0,0,d1ee88bdd97d2a724752a1d4028deb182e5bd65f91a63421de78f836ba363e9f,2024-11-21T01:54:06.217000 +CVE-2013-3671,0,0,b03e858819062febb1c558059a5efaa61556d8e45004e56f0727f7e5060943a0,2024-11-21T01:54:06.347000 +CVE-2013-3672,0,0,6a49c41ea86ea8076f62f30808444cfad12c3beb624948d26aefa6411bb02665,2024-11-21T01:54:06.480000 +CVE-2013-3673,0,0,31f8c37136763068bfd4446bee7518e957d8ac6842ace15c1351edbf1b42220f,2024-11-21T01:54:06.627000 +CVE-2013-3674,0,0,1beeecaa4804b9bc926b41046e9bb63b49888def0f1d5c78b401b2afc83f21d7,2024-11-21T01:54:06.760000 +CVE-2013-3675,0,0,e6a1b6e1c24e9534119b59b650b01bacba28c59fc89bfb11b469e4ff3c82358f,2024-11-21T01:54:06.910000 CVE-2013-3678,0,0,06627ae6fb48840d805ac8980f1c9f12a647822ad4741dd82c12dfbea4203b34,2018-10-09T19:34:13.483000 CVE-2013-3684,0,0,df30be55870f9bb618da7f6644a329eb91dcc6685c3f99444284f66a1f38c1c3,2020-02-13T15:12:10.193000 CVE-2013-3685,0,0,ae15864dd45c1691913d838412b5c487f299a8c6aac9eaeb4f17db8f2bb44665,2020-02-19T19:43:48.977000 -CVE-2013-3686,0,1,4f14a0c81f4a99c19ebb36c5935045b282c401814abb9fc738eaeaa12f9c8360,2024-11-21T01:54:07.490000 -CVE-2013-3687,0,1,3afa4b9c83a1d6101b848adcb2fe9180fab2de144eda2c0fc2a309ad2570d930,2024-11-21T01:54:07.620000 -CVE-2013-3688,0,1,916cadfb8bad6717db2628321f214a0e6f1ce28b895f6315a9f781bc490c2894,2024-11-21T01:54:07.773000 -CVE-2013-3689,0,1,5f1831de8d63605f351d47ea602ff30361310a03654343cdcf188289d2dceb7e,2024-11-21T01:54:07.927000 -CVE-2013-3690,0,1,7405ebff012c164224ec6b593ce4ad2fd7893f2f1a64d20f152b377eebfbb28a,2024-11-21T01:54:08.070000 +CVE-2013-3686,0,0,4f14a0c81f4a99c19ebb36c5935045b282c401814abb9fc738eaeaa12f9c8360,2024-11-21T01:54:07.490000 +CVE-2013-3687,0,0,3afa4b9c83a1d6101b848adcb2fe9180fab2de144eda2c0fc2a309ad2570d930,2024-11-21T01:54:07.620000 +CVE-2013-3688,0,0,916cadfb8bad6717db2628321f214a0e6f1ce28b895f6315a9f781bc490c2894,2024-11-21T01:54:07.773000 +CVE-2013-3689,0,0,5f1831de8d63605f351d47ea602ff30361310a03654343cdcf188289d2dceb7e,2024-11-21T01:54:07.927000 +CVE-2013-3690,0,0,7405ebff012c164224ec6b593ce4ad2fd7893f2f1a64d20f152b377eebfbb28a,2024-11-21T01:54:08.070000 CVE-2013-3691,0,0,039b1268cbf0c0948edde1495d9586d65660c7bf80600383ae1b464dcda00b9e,2019-12-16T18:54:03.757000 -CVE-2013-3692,0,1,d5a94ae191b4c52ed44eff888482ce2e769d75360bc460f1b9ce72cfb57457f7,2024-11-21T01:54:08.357000 -CVE-2013-3693,0,1,44b236d634fb7f7f1ac47279057642d410b1e5d0efa172e2d756d2d0d818cb92,2024-11-21T01:54:08.503000 -CVE-2013-3694,0,1,5a4ce9f95689897437ef5402e3c58bb392e1bc266cddcab7efed6383832e3d2e,2024-11-21T01:54:08.647000 -CVE-2013-3697,0,1,e625980e9dc8e88941fb742a2e6490f357c055824edb6fe9e9e84a823ab00b73,2024-11-21T01:54:08.790000 +CVE-2013-3692,0,0,d5a94ae191b4c52ed44eff888482ce2e769d75360bc460f1b9ce72cfb57457f7,2024-11-21T01:54:08.357000 +CVE-2013-3693,0,0,44b236d634fb7f7f1ac47279057642d410b1e5d0efa172e2d756d2d0d818cb92,2024-11-21T01:54:08.503000 +CVE-2013-3694,0,0,5a4ce9f95689897437ef5402e3c58bb392e1bc266cddcab7efed6383832e3d2e,2024-11-21T01:54:08.647000 +CVE-2013-3697,0,0,e625980e9dc8e88941fb742a2e6490f357c055824edb6fe9e9e84a823ab00b73,2024-11-21T01:54:08.790000 CVE-2013-3698,0,0,56fa7cb63fd87f4d1f38d7ef1709aeb5d1f101e82224b1e6fcca86bc902e78ac,2023-11-07T02:16:00.860000 CVE-2013-3699,0,0,023d9658af086a463cb2f34467dfda3b684657ffed082fee9fe9e2b7771d4bee,2023-11-07T02:16:00.893000 CVE-2013-3701,0,0,934aea47a804546da3382e0f5ebe34d21142eed9e610faaec928c791f9a8a958,2023-11-07T02:16:00.920000 CVE-2013-3702,0,0,58dbfe370fa847ed9308434da8d23fff1cf3000979824046ef7737466401bba0,2023-11-07T02:16:00.957000 CVE-2013-3703,0,0,b6932e87cf806b5f3f3ffd8d60e35a6bf689600dc0de5f06fe688141acc0a68e,2023-11-07T02:16:00.990000 -CVE-2013-3704,0,1,797748b38d6120fafdac640c434f6bc44c71221ba3863b6c149170c57f65b367,2024-11-21T01:54:09.130000 -CVE-2013-3705,0,1,4087321b325e634441c8bb438aacb174dbfbd92e1659e198401ee68911f44049,2024-11-21T01:54:09.267000 -CVE-2013-3706,0,1,a328ddac81bfa459172ebd6344a0b21c1ef56c21bba389853788dd922c73a168,2024-11-21T01:54:09.407000 -CVE-2013-3707,0,1,45c404d0520b139ff6367b56a801a17fa4255dfd066c1dfb1f06841e333bbb96,2024-11-21T01:54:09.543000 -CVE-2013-3708,0,1,adf1e672dcafb47f8044ca5f9434d8affdd8c042329131c26a6785cacb827bca,2024-11-21T01:54:09.690000 -CVE-2013-3709,0,1,bcf5ee6fb4a03a8cd3dc0280d5f13e13719bc63e04fb55264be4a2454549b0a9,2024-11-21T01:54:09.830000 -CVE-2013-3710,0,1,00842e69d31797763a42197011840d48ddc26bca231b4a90302090fbdd6b978c,2024-11-21T01:54:09.980000 -CVE-2013-3712,0,1,8db3204891e4634db7cace7eea520f660958874dfe4195f8bd6a51190966a1c4,2024-11-21T01:54:10.120000 -CVE-2013-3713,0,1,308504e0d34eb063e21719805ea54efbce041bef68af9893e00d335dfb0a2815,2024-11-21T01:54:10.260000 +CVE-2013-3704,0,0,797748b38d6120fafdac640c434f6bc44c71221ba3863b6c149170c57f65b367,2024-11-21T01:54:09.130000 +CVE-2013-3705,0,0,4087321b325e634441c8bb438aacb174dbfbd92e1659e198401ee68911f44049,2024-11-21T01:54:09.267000 +CVE-2013-3706,0,0,a328ddac81bfa459172ebd6344a0b21c1ef56c21bba389853788dd922c73a168,2024-11-21T01:54:09.407000 +CVE-2013-3707,0,0,45c404d0520b139ff6367b56a801a17fa4255dfd066c1dfb1f06841e333bbb96,2024-11-21T01:54:09.543000 +CVE-2013-3708,0,0,adf1e672dcafb47f8044ca5f9434d8affdd8c042329131c26a6785cacb827bca,2024-11-21T01:54:09.690000 +CVE-2013-3709,0,0,bcf5ee6fb4a03a8cd3dc0280d5f13e13719bc63e04fb55264be4a2454549b0a9,2024-11-21T01:54:09.830000 +CVE-2013-3710,0,0,00842e69d31797763a42197011840d48ddc26bca231b4a90302090fbdd6b978c,2024-11-21T01:54:09.980000 +CVE-2013-3712,0,0,8db3204891e4634db7cace7eea520f660958874dfe4195f8bd6a51190966a1c4,2024-11-21T01:54:10.120000 +CVE-2013-3713,0,0,308504e0d34eb063e21719805ea54efbce041bef68af9893e00d335dfb0a2815,2024-11-21T01:54:10.260000 CVE-2013-3718,0,0,33077cfee8bb67bbc945f2308e14898e7c3f5e8a28180c9bf16966af47d90c6a,2019-11-05T20:17:57.870000 -CVE-2013-3719,0,1,fa4924bb8f7239db71d7db0d7bea8c9b06df229aa72d9ddb7eddcae6acc7680a,2024-11-21T01:54:10.540000 -CVE-2013-3720,0,1,8dbdd1d1b4ce3387f26c5ced69b15b437bc4fd0047847bd1b690c5d508e5a822,2024-11-21T01:54:10.670000 -CVE-2013-3721,0,1,145a3f2d917ca555ca6b991097a045dac4d6af8abe558578d0ad0c916a4ef7bc,2024-11-21T01:54:10.820000 +CVE-2013-3719,0,0,fa4924bb8f7239db71d7db0d7bea8c9b06df229aa72d9ddb7eddcae6acc7680a,2024-11-21T01:54:10.540000 +CVE-2013-3720,0,0,8dbdd1d1b4ce3387f26c5ced69b15b437bc4fd0047847bd1b690c5d508e5a822,2024-11-21T01:54:10.670000 +CVE-2013-3721,0,0,145a3f2d917ca555ca6b991097a045dac4d6af8abe558578d0ad0c916a4ef7bc,2024-11-21T01:54:10.820000 CVE-2013-3722,0,0,29a196615605e1ae993c9f48969bbbbd7589cf1c0e80a788e9d0676816f7cc45,2020-02-20T16:34:28.770000 -CVE-2013-3724,0,1,8cd45480b685151812d279df693fe38206edcdb4fbffb971822af2f6339d4547,2024-11-21T01:54:11.110000 +CVE-2013-3724,0,0,8cd45480b685151812d279df693fe38206edcdb4fbffb971822af2f6339d4547,2024-11-21T01:54:11.110000 CVE-2013-3725,0,0,6f2df98f4e158f0c21d3b720823e7a772a8c4da98c5da458622e8c6d544d68b1,2020-02-25T19:01:54.483000 CVE-2013-3726,0,0,1b07ecef439c563747be18f46b56a6304d2671ec8d0cece75e4c74deb67fba00,2023-11-07T02:16:01.440000 -CVE-2013-3727,0,1,be727f772b4929639a31c0961a671d411fce7813c16ca6ca8dac62f3cad8e348,2024-11-21T01:54:11.407000 -CVE-2013-3728,0,1,b25f5e0d571fbf9470f847f213ac3956f0e9ddc1562b30e061bceb1df1e9724e,2024-11-21T01:54:11.547000 -CVE-2013-3729,0,1,5781ef18f69721e7415dcd288262844ea771073af6c5450e3acc2a78ac6c29b6,2024-11-21T01:54:11.700000 +CVE-2013-3727,0,0,be727f772b4929639a31c0961a671d411fce7813c16ca6ca8dac62f3cad8e348,2024-11-21T01:54:11.407000 +CVE-2013-3728,0,0,b25f5e0d571fbf9470f847f213ac3956f0e9ddc1562b30e061bceb1df1e9724e,2024-11-21T01:54:11.547000 +CVE-2013-3729,0,0,5781ef18f69721e7415dcd288262844ea771073af6c5450e3acc2a78ac6c29b6,2024-11-21T01:54:11.700000 CVE-2013-3734,0,0,469a3e65c58a13795d8737352de68d9548e519fd15774e43066fe88180846e12,2024-08-06T17:15:30.283000 -CVE-2013-3735,0,1,4dd353b2241d1435320ec142dd406d96637ee0d7eb78cf143ed9d8225ac528ca,2024-11-21T01:54:12.003000 -CVE-2013-3736,0,1,6ab7a1ff3c7e71a20530814e6688c45b70be57205f840adc3b25982711da7e03,2024-11-21T01:54:12.153000 +CVE-2013-3735,0,0,4dd353b2241d1435320ec142dd406d96637ee0d7eb78cf143ed9d8225ac528ca,2024-11-21T01:54:12.003000 +CVE-2013-3736,0,0,6ab7a1ff3c7e71a20530814e6688c45b70be57205f840adc3b25982711da7e03,2024-11-21T01:54:12.153000 CVE-2013-3737,0,0,6246fffd069c3219df9146694406c30923affb2cbac088fd91503c53ec43b904,2015-02-10T18:03:21.043000 CVE-2013-3738,0,0,cb1ae7b9fc0d5b2a6b53d7437512a6dd89ac430a25db7b28de46ff55de4ebc15,2020-02-20T18:05:45.760000 CVE-2013-3739,0,0,004d36c0000a5a97861916dab8b5a9737aa06a3691d1818cae56cb0e6c21f108,2014-06-06T16:08:39.020000 -CVE-2013-3742,0,1,d922f6db2c032c0014c4dbd8126a8b1bdc47cb394bec61dac0aa811f13a8378c,2024-11-21T01:54:12.730000 -CVE-2013-3743,0,1,9d1942ffd763d0b78f1e05e7ca59b60f9d3d5a2b8965ef34c881f4753516eba0,2024-11-21T01:54:12.883000 -CVE-2013-3744,0,1,b9c799d496c13a66da922285c6d8c67ade4fdceb63efe0446f2be962be11ab0f,2024-11-21T01:54:13.040000 -CVE-2013-3745,0,1,afdf2a22cc6f3a56eaf45a4f1d33b40b8274443c65d215bf0373c3bcd4e73bf6,2024-11-21T01:54:13.173000 -CVE-2013-3746,0,1,6980a5962936ccf06b479c376bef24dc8d77478c079cc72a89628ae670019898,2024-11-21T01:54:13.290000 -CVE-2013-3747,0,1,e7a940b4644003adb84798fd1c4902e6920c83c8866b38d611d4b7ee5ed0f4a0,2024-11-21T01:54:13.403000 -CVE-2013-3748,0,1,5919863b7df76d702f4c3463a0be42474efc0d3521eff1267c3b0126b3277b1a,2024-11-21T01:54:13.517000 -CVE-2013-3749,0,1,86043bc57bcd13af48de2bd6667ad7345e0536adf1f1c33ab297a7c7a59a5cac,2024-11-21T01:54:13.627000 -CVE-2013-3750,0,1,28ec6d1bd5a62e1a6ecc41ddf1b1445a93aed6d20fdaecce11b949c2611ef41e,2024-11-21T01:54:13.753000 -CVE-2013-3751,0,1,952e2f46a25bdf530f71127f64e8eccf5a797cd4c38f64cd9b3a4682ec5a0f54,2024-11-21T01:54:13.860000 -CVE-2013-3752,0,1,c656c774c3f2dc65bba31b8d4bd0d4045e77ba27d0d8835a2a2eaf8d00fe590d,2024-11-21T01:54:13.973000 -CVE-2013-3753,0,1,bab67db63aa08f3cdf10b2b447db3a4932648f1b759ff50c63f2aa005a3432aa,2024-11-21T01:54:14.077000 -CVE-2013-3754,0,1,a10ea5ba8c604b21fad6461f28eab639a8bfbf15fc04dfc047430fa3ef9b412f,2024-11-21T01:54:14.180000 -CVE-2013-3755,0,1,9bc5ddc3b9ea10f3e04373d4cd2e55cb0c97046f50e796875491994d860927aa,2024-11-21T01:54:14.287000 -CVE-2013-3756,0,1,e0ba99d69cc1128539362f481e50962b678cda540a65e1fba27677e4cab880c8,2024-11-21T01:54:14.390000 -CVE-2013-3757,0,1,880f6164048cc55cbd470b23ae7d6443a907282ca4abbbce5e3e94f9c2bc1d00,2024-11-21T01:54:14.497000 -CVE-2013-3758,0,1,343e84304d4a1ec79482955951fd6f72ac02577845bcb555e0eba8fd741eb0cd,2024-11-21T01:54:14.600000 -CVE-2013-3759,0,1,47d4bad2906aba81ec0b420c36ce8af5c4b835dfffae582fe4bf2ce54f0c1061,2024-11-21T01:54:14.697000 -CVE-2013-3760,0,1,c05ed3563fc7b6c26e1b049dda7ed93fb8e0a3b7e702e7dcdc465385f9c145fd,2024-11-21T01:54:14.797000 -CVE-2013-3761,0,1,867eaf587b88d69ccc67dc2018784723703bac93e70dbcfe4fc09585664e1e78,2024-11-21T01:54:14.910000 -CVE-2013-3762,0,1,f80f8c38cd82f31d122f48549d903a05f7371eb13d50cc04e413ab54e7be1bd5,2024-11-21T01:54:15.017000 -CVE-2013-3763,0,1,3262801c5d8e0f22e5fe660a6e0516f426d64a240994ca895d73d2235e8cc364,2024-11-21T01:54:15.137000 -CVE-2013-3764,0,1,8956975a780ba4fa1389405bb68c2a3171f3593ec7efe7c0b36dde532e2bad16,2024-11-21T01:54:15.240000 -CVE-2013-3765,0,1,b5048c280da1c0e905f268c9c6af7f21f62c4104edbfc8ff65b64b0ae229fb66,2024-11-21T01:54:15.343000 -CVE-2013-3766,0,1,2d3abc1b056571f85f042d4024205f9d9560d3c89c04c1aa09e958f229760618,2024-11-21T01:54:15.450000 -CVE-2013-3767,0,1,9ccf7226c4943e1a5ce5451894288ffe8be6a358cc70cf27cab75d7db1f736f3,2024-11-21T01:54:15.557000 -CVE-2013-3768,0,1,0fc7f46f23d3531685305fc635103759f9d87ef52d441b88d830bffc8cb66a55,2024-11-21T01:54:15.670000 -CVE-2013-3769,0,1,117b9e287929c2f6583e01511624569012bb882feb74c4e9daca462dbeab28f3,2024-11-21T01:54:15.780000 -CVE-2013-3770,0,1,29b385e37e65afd05791c4c98dff04ee29be60e9a473a5df351a1a19487a940e,2024-11-21T01:54:15.883000 -CVE-2013-3771,0,1,d4a5e03af4148d54e923fe19ad10e6922abc63647fbd0cd3d4ccecf53a8b221b,2024-11-21T01:54:15.987000 -CVE-2013-3772,0,1,992b75627fd4377eb0b02529c9a22be109e2c0e51282ea0d8eb62742125cedcf,2024-11-21T01:54:16.090000 -CVE-2013-3773,0,1,cc5ecae6e5c7dec4332158d8eaa99b92a8058aaff1578734e011e4659ca1b4a3,2024-11-21T01:54:16.203000 -CVE-2013-3774,0,1,9bad2e7ad0d390b677867e4f6b5c0600c7ac6540d7ea28e42078001ff88cc629,2024-11-21T01:54:16.310000 -CVE-2013-3775,0,1,dcf16e23bc9d72d199033989657285b6073927d85bada8bc89134d5e3b794416,2024-11-21T01:54:16.430000 -CVE-2013-3776,0,1,94e670deadb260d515969cd625ea56a20132324a2657d35c9e78fc7f06a737d2,2024-11-21T01:54:16.533000 -CVE-2013-3777,0,1,10ca450be77e2c9aa92ffd75ee38eac5854d6c17b5baa0356faabfe3dce29c8d,2024-11-21T01:54:16.647000 -CVE-2013-3778,0,1,478d67a193fcf924b553b7fb75085514c8284a9c1c52919c15bad6eeadf6462e,2024-11-21T01:54:16.760000 -CVE-2013-3779,0,1,a3296ca5841999c3ffac334ed95ef9037dfb560073733f65b855b99526d0b1f8,2024-11-21T01:54:16.863000 -CVE-2013-3780,0,1,5e7f52c8a696a48c3ffbab055e73f85c87762367c3bb8dd0a4305f6c9186e07a,2024-11-21T01:54:16.970000 -CVE-2013-3781,0,1,bbfd8cff9e40c22f75bef7fc57fb173031a03867f8e6c244266e026bd8cdfb9e,2024-11-21T01:54:17.077000 -CVE-2013-3782,0,1,6db7720ab5edf6f8aaca5a0e2bfb936e98a2f60f5362aebe5e8de964c3069eff,2024-11-21T01:54:17.183000 -CVE-2013-3783,0,1,55f4f531ffc6ae7925f25d9d13ee60f5ad65890c14815c415797109e7e1becff,2024-11-21T01:54:17.297000 -CVE-2013-3784,0,1,3584be060c3049b13449e2de1dd3523f601cd6d1342cd116ff300642ceafed43,2024-11-21T01:54:17.430000 -CVE-2013-3785,0,1,c52a9a219b7db9a226c0444ec63f215fa62dc1e7f85aa55adc48b9ae036e1580,2024-11-21T01:54:17.540000 -CVE-2013-3786,0,1,f6e79dd05bf1fd2c655f56f64c3d7579b7e78cf64e8dffa3fc43a8d201b0b718,2024-11-21T01:54:17.643000 -CVE-2013-3787,0,1,45ff30ee6fa8a8724926fbdd45dc636372138b81b25963c43e710d4883f876d6,2024-11-21T01:54:17.767000 -CVE-2013-3788,0,1,6ee4276e66f5d97fcd9e2c231a7f4929d800e4d4386cbdbf3f5105397165a16f,2024-11-21T01:54:17.900000 -CVE-2013-3789,0,1,e0eee15e02b207fc4ae94bf5ac8a8cc92b5d94c1475fedf2491ec3f3ad854501,2024-11-21T01:54:18.030000 -CVE-2013-3790,0,1,da6dbd7a566981cab8c6b10801d077a2cc4f58db6ed499f0c3125b632365fab0,2024-11-21T01:54:18.143000 -CVE-2013-3791,0,1,088f855dd9616efe22616aeb761af863cfc59818972ba6b12536de0d97d7d9ab,2024-11-21T01:54:18.250000 -CVE-2013-3792,0,1,b6132d382e0a636a0f52a64ac0b74bd2c8fe2b60ef93c64b2f21a9b27cef69d2,2024-11-21T01:54:18.363000 -CVE-2013-3793,0,1,e4e7fb25a9a21ce394e11f07c15048bfa5c4b29e3e894b53e468b81cae235ccd,2024-11-21T01:54:18.480000 -CVE-2013-3794,0,1,db485169d576c375ee1c182fb7a3ae8ee3b22138019bf620e60e73d7794bfedc,2024-11-21T01:54:18.623000 -CVE-2013-3795,0,1,c2bafa337de7d4b04438b1db8cebb8e86bb09ab64410f3b744aedf1b393812ac,2024-11-21T01:54:18.747000 -CVE-2013-3796,0,1,3acec02363ed462c369a2e93b8c5fc4e72067e9410d945355472c6c57f866bd8,2024-11-21T01:54:18.860000 -CVE-2013-3797,0,1,84dadba493cb9539e7e0d14ae2fafade24b034c957098d4c570d51b24a3757c3,2024-11-21T01:54:18.977000 -CVE-2013-3798,0,1,b6c9ba5ae4a923d1470f000966c1593a401fcc1ee7348bd2b2e5e2a9e378dc54,2024-11-21T01:54:19.080000 -CVE-2013-3799,0,1,7fc6f24456014ed339dc6add50869a57e79827c51027b01c104b6aa053a0ad39,2024-11-21T01:54:19.207000 -CVE-2013-3800,0,1,def72a2fe94d79aa3dd428de69b761885ec2ecf69517b800f2563d8353a8e36a,2024-11-21T01:54:19.320000 -CVE-2013-3801,0,1,ad4cc95109208a547424849ecc55bb863b2a0e875dde26fb5e19e48203147e1b,2024-11-21T01:54:19.440000 -CVE-2013-3802,0,1,5931bb66b1c555647923f6f57970433ceef0efe103c402c8e033d85c55c6714a,2024-11-21T01:54:19.577000 -CVE-2013-3803,0,1,86157a1e7f2f3f44d7eff169d921926b61e2c79d70f1f1757720bbe0521ec932,2024-11-21T01:54:19.733000 -CVE-2013-3804,0,1,c1377d783ed03a918258477127635fda3be3b74489a1140e0c159708aaf00917,2024-11-21T01:54:19.867000 -CVE-2013-3805,0,1,5cee2eaac11d174e85a2aab6eed044c13d91432678a05c33271b3b63e0b0ddc4,2024-11-21T01:54:20.010000 -CVE-2013-3806,0,1,b13273b3dc4576e31691fd18c36da92543aa411d22c108c8e6f3f76b56052e94,2024-11-21T01:54:20.150000 -CVE-2013-3807,0,1,5da512e8c519662ee654f14fb06033abb0589508556dca2e9c9e6c973b646ebe,2024-11-21T01:54:20.280000 -CVE-2013-3808,0,1,26bc99038d9fa1207f0d3cb0caf2d41405c6b2361d610a8407b75be66859f01b,2024-11-21T01:54:20.403000 -CVE-2013-3809,0,1,d7118dfaede9d2ba13ceba979218ffa10efeb8493bae67527301cd1dbe2e6222,2024-11-21T01:54:20.547000 -CVE-2013-3810,0,1,de3f80c16063aea28e45f5d2ab31310256102713d28f96cca70db5f818e4655d,2024-11-21T01:54:20.693000 -CVE-2013-3811,0,1,c66e88207b20fa75da9ffad36674895784b04adc771993128ddcfa7bac46d768,2024-11-21T01:54:20.823000 -CVE-2013-3812,0,1,07aee1a504f3f3d0ef97544620b965de6fc49ffb5bb2efa753c37ed0b658d173,2024-11-21T01:54:20.947000 -CVE-2013-3813,0,1,9cec865f8607b376ac9fe81cd79051ce9de3ee8096e828b6a808c1607eace23a,2024-11-21T01:54:21.083000 -CVE-2013-3814,0,1,b46e08f19e11ab8cc56c1583b5a18986221f3853f1cebafc831acf2f50c34a64,2024-11-21T01:54:21.200000 +CVE-2013-3742,0,0,d922f6db2c032c0014c4dbd8126a8b1bdc47cb394bec61dac0aa811f13a8378c,2024-11-21T01:54:12.730000 +CVE-2013-3743,0,0,9d1942ffd763d0b78f1e05e7ca59b60f9d3d5a2b8965ef34c881f4753516eba0,2024-11-21T01:54:12.883000 +CVE-2013-3744,0,0,b9c799d496c13a66da922285c6d8c67ade4fdceb63efe0446f2be962be11ab0f,2024-11-21T01:54:13.040000 +CVE-2013-3745,0,0,afdf2a22cc6f3a56eaf45a4f1d33b40b8274443c65d215bf0373c3bcd4e73bf6,2024-11-21T01:54:13.173000 +CVE-2013-3746,0,0,6980a5962936ccf06b479c376bef24dc8d77478c079cc72a89628ae670019898,2024-11-21T01:54:13.290000 +CVE-2013-3747,0,0,e7a940b4644003adb84798fd1c4902e6920c83c8866b38d611d4b7ee5ed0f4a0,2024-11-21T01:54:13.403000 +CVE-2013-3748,0,0,5919863b7df76d702f4c3463a0be42474efc0d3521eff1267c3b0126b3277b1a,2024-11-21T01:54:13.517000 +CVE-2013-3749,0,0,86043bc57bcd13af48de2bd6667ad7345e0536adf1f1c33ab297a7c7a59a5cac,2024-11-21T01:54:13.627000 +CVE-2013-3750,0,0,28ec6d1bd5a62e1a6ecc41ddf1b1445a93aed6d20fdaecce11b949c2611ef41e,2024-11-21T01:54:13.753000 +CVE-2013-3751,0,0,952e2f46a25bdf530f71127f64e8eccf5a797cd4c38f64cd9b3a4682ec5a0f54,2024-11-21T01:54:13.860000 +CVE-2013-3752,0,0,c656c774c3f2dc65bba31b8d4bd0d4045e77ba27d0d8835a2a2eaf8d00fe590d,2024-11-21T01:54:13.973000 +CVE-2013-3753,0,0,bab67db63aa08f3cdf10b2b447db3a4932648f1b759ff50c63f2aa005a3432aa,2024-11-21T01:54:14.077000 +CVE-2013-3754,0,0,a10ea5ba8c604b21fad6461f28eab639a8bfbf15fc04dfc047430fa3ef9b412f,2024-11-21T01:54:14.180000 +CVE-2013-3755,0,0,9bc5ddc3b9ea10f3e04373d4cd2e55cb0c97046f50e796875491994d860927aa,2024-11-21T01:54:14.287000 +CVE-2013-3756,0,0,e0ba99d69cc1128539362f481e50962b678cda540a65e1fba27677e4cab880c8,2024-11-21T01:54:14.390000 +CVE-2013-3757,0,0,880f6164048cc55cbd470b23ae7d6443a907282ca4abbbce5e3e94f9c2bc1d00,2024-11-21T01:54:14.497000 +CVE-2013-3758,0,0,343e84304d4a1ec79482955951fd6f72ac02577845bcb555e0eba8fd741eb0cd,2024-11-21T01:54:14.600000 +CVE-2013-3759,0,0,47d4bad2906aba81ec0b420c36ce8af5c4b835dfffae582fe4bf2ce54f0c1061,2024-11-21T01:54:14.697000 +CVE-2013-3760,0,0,c05ed3563fc7b6c26e1b049dda7ed93fb8e0a3b7e702e7dcdc465385f9c145fd,2024-11-21T01:54:14.797000 +CVE-2013-3761,0,0,867eaf587b88d69ccc67dc2018784723703bac93e70dbcfe4fc09585664e1e78,2024-11-21T01:54:14.910000 +CVE-2013-3762,0,0,f80f8c38cd82f31d122f48549d903a05f7371eb13d50cc04e413ab54e7be1bd5,2024-11-21T01:54:15.017000 +CVE-2013-3763,0,0,3262801c5d8e0f22e5fe660a6e0516f426d64a240994ca895d73d2235e8cc364,2024-11-21T01:54:15.137000 +CVE-2013-3764,0,0,8956975a780ba4fa1389405bb68c2a3171f3593ec7efe7c0b36dde532e2bad16,2024-11-21T01:54:15.240000 +CVE-2013-3765,0,0,b5048c280da1c0e905f268c9c6af7f21f62c4104edbfc8ff65b64b0ae229fb66,2024-11-21T01:54:15.343000 +CVE-2013-3766,0,0,2d3abc1b056571f85f042d4024205f9d9560d3c89c04c1aa09e958f229760618,2024-11-21T01:54:15.450000 +CVE-2013-3767,0,0,9ccf7226c4943e1a5ce5451894288ffe8be6a358cc70cf27cab75d7db1f736f3,2024-11-21T01:54:15.557000 +CVE-2013-3768,0,0,0fc7f46f23d3531685305fc635103759f9d87ef52d441b88d830bffc8cb66a55,2024-11-21T01:54:15.670000 +CVE-2013-3769,0,0,117b9e287929c2f6583e01511624569012bb882feb74c4e9daca462dbeab28f3,2024-11-21T01:54:15.780000 +CVE-2013-3770,0,0,29b385e37e65afd05791c4c98dff04ee29be60e9a473a5df351a1a19487a940e,2024-11-21T01:54:15.883000 +CVE-2013-3771,0,0,d4a5e03af4148d54e923fe19ad10e6922abc63647fbd0cd3d4ccecf53a8b221b,2024-11-21T01:54:15.987000 +CVE-2013-3772,0,0,992b75627fd4377eb0b02529c9a22be109e2c0e51282ea0d8eb62742125cedcf,2024-11-21T01:54:16.090000 +CVE-2013-3773,0,0,cc5ecae6e5c7dec4332158d8eaa99b92a8058aaff1578734e011e4659ca1b4a3,2024-11-21T01:54:16.203000 +CVE-2013-3774,0,0,9bad2e7ad0d390b677867e4f6b5c0600c7ac6540d7ea28e42078001ff88cc629,2024-11-21T01:54:16.310000 +CVE-2013-3775,0,0,dcf16e23bc9d72d199033989657285b6073927d85bada8bc89134d5e3b794416,2024-11-21T01:54:16.430000 +CVE-2013-3776,0,0,94e670deadb260d515969cd625ea56a20132324a2657d35c9e78fc7f06a737d2,2024-11-21T01:54:16.533000 +CVE-2013-3777,0,0,10ca450be77e2c9aa92ffd75ee38eac5854d6c17b5baa0356faabfe3dce29c8d,2024-11-21T01:54:16.647000 +CVE-2013-3778,0,0,478d67a193fcf924b553b7fb75085514c8284a9c1c52919c15bad6eeadf6462e,2024-11-21T01:54:16.760000 +CVE-2013-3779,0,0,a3296ca5841999c3ffac334ed95ef9037dfb560073733f65b855b99526d0b1f8,2024-11-21T01:54:16.863000 +CVE-2013-3780,0,0,5e7f52c8a696a48c3ffbab055e73f85c87762367c3bb8dd0a4305f6c9186e07a,2024-11-21T01:54:16.970000 +CVE-2013-3781,0,0,bbfd8cff9e40c22f75bef7fc57fb173031a03867f8e6c244266e026bd8cdfb9e,2024-11-21T01:54:17.077000 +CVE-2013-3782,0,0,6db7720ab5edf6f8aaca5a0e2bfb936e98a2f60f5362aebe5e8de964c3069eff,2024-11-21T01:54:17.183000 +CVE-2013-3783,0,0,55f4f531ffc6ae7925f25d9d13ee60f5ad65890c14815c415797109e7e1becff,2024-11-21T01:54:17.297000 +CVE-2013-3784,0,0,3584be060c3049b13449e2de1dd3523f601cd6d1342cd116ff300642ceafed43,2024-11-21T01:54:17.430000 +CVE-2013-3785,0,0,c52a9a219b7db9a226c0444ec63f215fa62dc1e7f85aa55adc48b9ae036e1580,2024-11-21T01:54:17.540000 +CVE-2013-3786,0,0,f6e79dd05bf1fd2c655f56f64c3d7579b7e78cf64e8dffa3fc43a8d201b0b718,2024-11-21T01:54:17.643000 +CVE-2013-3787,0,0,45ff30ee6fa8a8724926fbdd45dc636372138b81b25963c43e710d4883f876d6,2024-11-21T01:54:17.767000 +CVE-2013-3788,0,0,6ee4276e66f5d97fcd9e2c231a7f4929d800e4d4386cbdbf3f5105397165a16f,2024-11-21T01:54:17.900000 +CVE-2013-3789,0,0,e0eee15e02b207fc4ae94bf5ac8a8cc92b5d94c1475fedf2491ec3f3ad854501,2024-11-21T01:54:18.030000 +CVE-2013-3790,0,0,da6dbd7a566981cab8c6b10801d077a2cc4f58db6ed499f0c3125b632365fab0,2024-11-21T01:54:18.143000 +CVE-2013-3791,0,0,088f855dd9616efe22616aeb761af863cfc59818972ba6b12536de0d97d7d9ab,2024-11-21T01:54:18.250000 +CVE-2013-3792,0,0,b6132d382e0a636a0f52a64ac0b74bd2c8fe2b60ef93c64b2f21a9b27cef69d2,2024-11-21T01:54:18.363000 +CVE-2013-3793,0,0,e4e7fb25a9a21ce394e11f07c15048bfa5c4b29e3e894b53e468b81cae235ccd,2024-11-21T01:54:18.480000 +CVE-2013-3794,0,0,db485169d576c375ee1c182fb7a3ae8ee3b22138019bf620e60e73d7794bfedc,2024-11-21T01:54:18.623000 +CVE-2013-3795,0,0,c2bafa337de7d4b04438b1db8cebb8e86bb09ab64410f3b744aedf1b393812ac,2024-11-21T01:54:18.747000 +CVE-2013-3796,0,0,3acec02363ed462c369a2e93b8c5fc4e72067e9410d945355472c6c57f866bd8,2024-11-21T01:54:18.860000 +CVE-2013-3797,0,0,84dadba493cb9539e7e0d14ae2fafade24b034c957098d4c570d51b24a3757c3,2024-11-21T01:54:18.977000 +CVE-2013-3798,0,0,b6c9ba5ae4a923d1470f000966c1593a401fcc1ee7348bd2b2e5e2a9e378dc54,2024-11-21T01:54:19.080000 +CVE-2013-3799,0,0,7fc6f24456014ed339dc6add50869a57e79827c51027b01c104b6aa053a0ad39,2024-11-21T01:54:19.207000 +CVE-2013-3800,0,0,def72a2fe94d79aa3dd428de69b761885ec2ecf69517b800f2563d8353a8e36a,2024-11-21T01:54:19.320000 +CVE-2013-3801,0,0,ad4cc95109208a547424849ecc55bb863b2a0e875dde26fb5e19e48203147e1b,2024-11-21T01:54:19.440000 +CVE-2013-3802,0,0,5931bb66b1c555647923f6f57970433ceef0efe103c402c8e033d85c55c6714a,2024-11-21T01:54:19.577000 +CVE-2013-3803,0,0,86157a1e7f2f3f44d7eff169d921926b61e2c79d70f1f1757720bbe0521ec932,2024-11-21T01:54:19.733000 +CVE-2013-3804,0,0,c1377d783ed03a918258477127635fda3be3b74489a1140e0c159708aaf00917,2024-11-21T01:54:19.867000 +CVE-2013-3805,0,0,5cee2eaac11d174e85a2aab6eed044c13d91432678a05c33271b3b63e0b0ddc4,2024-11-21T01:54:20.010000 +CVE-2013-3806,0,0,b13273b3dc4576e31691fd18c36da92543aa411d22c108c8e6f3f76b56052e94,2024-11-21T01:54:20.150000 +CVE-2013-3807,0,0,5da512e8c519662ee654f14fb06033abb0589508556dca2e9c9e6c973b646ebe,2024-11-21T01:54:20.280000 +CVE-2013-3808,0,0,26bc99038d9fa1207f0d3cb0caf2d41405c6b2361d610a8407b75be66859f01b,2024-11-21T01:54:20.403000 +CVE-2013-3809,0,0,d7118dfaede9d2ba13ceba979218ffa10efeb8493bae67527301cd1dbe2e6222,2024-11-21T01:54:20.547000 +CVE-2013-3810,0,0,de3f80c16063aea28e45f5d2ab31310256102713d28f96cca70db5f818e4655d,2024-11-21T01:54:20.693000 +CVE-2013-3811,0,0,c66e88207b20fa75da9ffad36674895784b04adc771993128ddcfa7bac46d768,2024-11-21T01:54:20.823000 +CVE-2013-3812,0,0,07aee1a504f3f3d0ef97544620b965de6fc49ffb5bb2efa753c37ed0b658d173,2024-11-21T01:54:20.947000 +CVE-2013-3813,0,0,9cec865f8607b376ac9fe81cd79051ce9de3ee8096e828b6a808c1607eace23a,2024-11-21T01:54:21.083000 +CVE-2013-3814,0,0,b46e08f19e11ab8cc56c1583b5a18986221f3853f1cebafc831acf2f50c34a64,2024-11-21T01:54:21.200000 CVE-2013-3815,0,0,1573a2157eddbb8c1a68fa4342cb62643d07a8925ff5ad0de01eada3e904e1d5,2023-11-07T02:16:02.253000 -CVE-2013-3816,0,1,7fd3b23d8fa7bff20efd157a6ecbec46f468dc6bd156aec953f0c4f5ef62f229,2024-11-21T01:54:21.320000 +CVE-2013-3816,0,0,7fd3b23d8fa7bff20efd157a6ecbec46f468dc6bd156aec953f0c4f5ef62f229,2024-11-21T01:54:21.320000 CVE-2013-3817,0,0,18a3f94429bfc21ada4dc4801ce7431f254c34fdcd34c32866ea2eca018d26ed,2023-11-07T02:16:02.510000 -CVE-2013-3818,0,1,ea406059ca299eed2696ce1ef612a49a0d580711f98bd93106f0e1da5e022fb8,2024-11-21T01:54:21.453000 -CVE-2013-3819,0,1,32de5575f987a89c836c9185031283f02e9beb4443ea5aa33917e20033254efe,2024-11-21T01:54:21.563000 -CVE-2013-3820,0,1,21bfe70cf67d703ac258675545acef22fe9084d63f3a51e776918dad162c34a0,2024-11-21T01:54:21.677000 -CVE-2013-3821,0,1,30a42afffe85bd7a08a9df17613a8c11772a6a2dc71926710836f00a66c89cd8,2024-11-21T01:54:21.790000 -CVE-2013-3822,0,1,6914c6bd681f07a33699fe8ba73afa9d8692b0d9855d99be8d6bbc1c172cf549,2024-11-21T01:54:21.907000 -CVE-2013-3823,0,1,607ee419d1b7b2aeae5e6003b330823c4dc6b72587b62989755ce213efeffbd6,2024-11-21T01:54:22.023000 -CVE-2013-3824,0,1,282d562e076b622b9e3ba2b0d982a665c4dff57e3b020986f6c421c9b11cede3,2024-11-21T01:54:22.140000 -CVE-2013-3825,0,1,60cb3ae1f7bd4ed29a21d3ae407e46cfed53b81cf5b5a6ccb44a042d2b771ca4,2024-11-21T01:54:22.253000 -CVE-2013-3826,0,1,2a565707c2bd0a6893a5ad814ce327f5ac66f4625e1612475d935f2ca6ae4ec5,2024-11-21T01:54:22.360000 -CVE-2013-3827,0,1,de9d0b48ef3a0507a790a6e6744cd36e4883c3325b5c968b1a3d99f6aa65c650,2024-11-21T01:54:22.470000 -CVE-2013-3828,0,1,666427c7f9874eb354069617d6aec9ec0bdda75c80146b8683106888296fba67,2024-11-21T01:54:22.580000 -CVE-2013-3829,0,1,f395536163dadbb5e43e13140cd4661f7400ee1c13e1bf2f96bef9694e8a6a43,2024-11-21T01:54:22.700000 -CVE-2013-3830,0,1,ee15aa9bdfd6f92c769b720d3185be225beefa19e280969bf95dd5a9eb5a68cf,2024-11-21T01:54:22.897000 -CVE-2013-3831,0,1,a1ab9a073c2de92f094843153177c60d13c94e07a6e1f253e7ee71f184b4d8ba,2024-11-21T01:54:23.040000 -CVE-2013-3832,0,1,2425ad938bf1c8cf958ea16f46299c9de5805f6074e5c62a597960eaac95142a,2024-11-21T01:54:23.170000 -CVE-2013-3833,0,1,98df6029a88f8efb11d25eb5cae091564a426fc72a6854a33a0d83e7ca521dd3,2024-11-21T01:54:23.283000 -CVE-2013-3834,0,1,a71f6db14cad7c88cb01dc4b4a483d58af00c62538d3666f2a370cb09e5250e4,2024-11-21T01:54:23.393000 -CVE-2013-3835,0,1,d717d99d63a7d0c52cfb1cca8a358be517cda7fedc4dd881354e5b4149cbeec3,2024-11-21T01:54:23.503000 -CVE-2013-3836,0,1,97d9af3bd66ca08f2a796f8710a64a7183e3d633609fe45fb0a43d3aeda183c6,2024-11-21T01:54:23.613000 -CVE-2013-3837,0,1,420a21aeba2f77910d3e7d81fe081acfc852015e3d6896fcc7449f7bb5e45e25,2024-11-21T01:54:23.720000 -CVE-2013-3838,0,1,180ce7cbab27fb0832c81e2a4938ba84f7ac583bb1c9987e5a9b7ba2efeea756,2024-11-21T01:54:23.833000 -CVE-2013-3839,0,1,0b1a7cc486c006f0ed3d4df065449fa089db83334d4939b27fcb38ccaa7ebb5e,2024-11-21T01:54:23.947000 -CVE-2013-3840,0,1,758df6179d07684d008cbca07cf46282f2481cfc834b71084f2a3fa360dd380a,2024-11-21T01:54:24.083000 -CVE-2013-3841,0,1,efe33930c401a44a9857d1acc05107477018b7fa7a26deeb744d7583a21cd964,2024-11-21T01:54:24.190000 -CVE-2013-3842,0,1,196cd5c2fc6d71656da437c0ec83613493e66bef0aedecafc92e481f0c592309,2024-11-21T01:54:24.297000 +CVE-2013-3818,0,0,ea406059ca299eed2696ce1ef612a49a0d580711f98bd93106f0e1da5e022fb8,2024-11-21T01:54:21.453000 +CVE-2013-3819,0,0,32de5575f987a89c836c9185031283f02e9beb4443ea5aa33917e20033254efe,2024-11-21T01:54:21.563000 +CVE-2013-3820,0,0,21bfe70cf67d703ac258675545acef22fe9084d63f3a51e776918dad162c34a0,2024-11-21T01:54:21.677000 +CVE-2013-3821,0,0,30a42afffe85bd7a08a9df17613a8c11772a6a2dc71926710836f00a66c89cd8,2024-11-21T01:54:21.790000 +CVE-2013-3822,0,0,6914c6bd681f07a33699fe8ba73afa9d8692b0d9855d99be8d6bbc1c172cf549,2024-11-21T01:54:21.907000 +CVE-2013-3823,0,0,607ee419d1b7b2aeae5e6003b330823c4dc6b72587b62989755ce213efeffbd6,2024-11-21T01:54:22.023000 +CVE-2013-3824,0,0,282d562e076b622b9e3ba2b0d982a665c4dff57e3b020986f6c421c9b11cede3,2024-11-21T01:54:22.140000 +CVE-2013-3825,0,0,60cb3ae1f7bd4ed29a21d3ae407e46cfed53b81cf5b5a6ccb44a042d2b771ca4,2024-11-21T01:54:22.253000 +CVE-2013-3826,0,0,2a565707c2bd0a6893a5ad814ce327f5ac66f4625e1612475d935f2ca6ae4ec5,2024-11-21T01:54:22.360000 +CVE-2013-3827,0,0,de9d0b48ef3a0507a790a6e6744cd36e4883c3325b5c968b1a3d99f6aa65c650,2024-11-21T01:54:22.470000 +CVE-2013-3828,0,0,666427c7f9874eb354069617d6aec9ec0bdda75c80146b8683106888296fba67,2024-11-21T01:54:22.580000 +CVE-2013-3829,0,0,f395536163dadbb5e43e13140cd4661f7400ee1c13e1bf2f96bef9694e8a6a43,2024-11-21T01:54:22.700000 +CVE-2013-3830,0,0,ee15aa9bdfd6f92c769b720d3185be225beefa19e280969bf95dd5a9eb5a68cf,2024-11-21T01:54:22.897000 +CVE-2013-3831,0,0,a1ab9a073c2de92f094843153177c60d13c94e07a6e1f253e7ee71f184b4d8ba,2024-11-21T01:54:23.040000 +CVE-2013-3832,0,0,2425ad938bf1c8cf958ea16f46299c9de5805f6074e5c62a597960eaac95142a,2024-11-21T01:54:23.170000 +CVE-2013-3833,0,0,98df6029a88f8efb11d25eb5cae091564a426fc72a6854a33a0d83e7ca521dd3,2024-11-21T01:54:23.283000 +CVE-2013-3834,0,0,a71f6db14cad7c88cb01dc4b4a483d58af00c62538d3666f2a370cb09e5250e4,2024-11-21T01:54:23.393000 +CVE-2013-3835,0,0,d717d99d63a7d0c52cfb1cca8a358be517cda7fedc4dd881354e5b4149cbeec3,2024-11-21T01:54:23.503000 +CVE-2013-3836,0,0,97d9af3bd66ca08f2a796f8710a64a7183e3d633609fe45fb0a43d3aeda183c6,2024-11-21T01:54:23.613000 +CVE-2013-3837,0,0,420a21aeba2f77910d3e7d81fe081acfc852015e3d6896fcc7449f7bb5e45e25,2024-11-21T01:54:23.720000 +CVE-2013-3838,0,0,180ce7cbab27fb0832c81e2a4938ba84f7ac583bb1c9987e5a9b7ba2efeea756,2024-11-21T01:54:23.833000 +CVE-2013-3839,0,0,0b1a7cc486c006f0ed3d4df065449fa089db83334d4939b27fcb38ccaa7ebb5e,2024-11-21T01:54:23.947000 +CVE-2013-3840,0,0,758df6179d07684d008cbca07cf46282f2481cfc834b71084f2a3fa360dd380a,2024-11-21T01:54:24.083000 +CVE-2013-3841,0,0,efe33930c401a44a9857d1acc05107477018b7fa7a26deeb744d7583a21cd964,2024-11-21T01:54:24.190000 +CVE-2013-3842,0,0,196cd5c2fc6d71656da437c0ec83613493e66bef0aedecafc92e481f0c592309,2024-11-21T01:54:24.297000 CVE-2013-3843,0,0,1e9a1cdf385d3b109104210d83243c53b509c2cfb19defbcb96dd1095cf96aa8,2020-03-26T14:24:48.157000 CVE-2013-3844,0,0,99f100dcff494fb0557820bbd052dd009b42e910bed1454a5053fb465529e294,2023-11-07T02:16:02.947000 -CVE-2013-3845,0,1,fdfc0234c2b5b092d5129990e4cda05285efa43588474f62ea228aaf1b4dfc4d,2024-11-21T01:54:24.557000 -CVE-2013-3846,0,1,44ff18ba25e2a8e63ab7a22619c93c5761e6188b9505f2a8084cf7a443a545cf,2024-11-21T01:54:24.663000 -CVE-2013-3847,0,1,a09178f07b26309d63041422fa5e4f7111cfd7f111205c6de28a2e0dc2729a28,2024-11-21T01:54:24.773000 -CVE-2013-3848,0,1,fb058f1677ae94d0be2a7b315f84ea99e74490975ea05b30aadc6a3e45f6a401,2024-11-21T01:54:24.887000 -CVE-2013-3849,0,1,0190a26b1045c80a6adbf693b5bf534515f931966f14e6224bbd571d944bca0c,2024-11-21T01:54:24.993000 -CVE-2013-3850,0,1,877cf5e1315554e970c4f556b14406c32e0d4821838444b9248730c5a52ac4a4,2024-11-21T01:54:25.120000 -CVE-2013-3851,0,1,93e9192bfaba67311d2218455896951fed5bd879d790347cb6015fc576d9dbe9,2024-11-21T01:54:25.230000 -CVE-2013-3852,0,1,c98cc4a6a6b5ee846e22408f78f63ef8abb2b4268f20dc15ce5083de2b1395ed,2024-11-21T01:54:25.340000 -CVE-2013-3853,0,1,5ddd1ed738b2f1cfa10f2bdd814f81655530f681aee7726f21c6aae22e08748a,2024-11-21T01:54:25.450000 -CVE-2013-3854,0,1,635e346e56528c33432d1c07826ac37f2edc66679692d3f3112517c0c9cfc01b,2024-11-21T01:54:25.560000 -CVE-2013-3855,0,1,d13c2cca0e035f940acb9050b0ceb34aa53e58e73145b06c264a075e436a3c59,2024-11-21T01:54:25.660000 -CVE-2013-3856,0,1,a308cd1ad1e29f91527992bc05d4738b9d63449644e4a1c72a19eba59fc65bcd,2024-11-21T01:54:25.777000 -CVE-2013-3857,0,1,5ec16c244549b9be0943d44f8a2163b1a9348ef9bab0c1823543dd2267a19b5e,2024-11-21T01:54:25.890000 -CVE-2013-3858,0,1,5bb403a21969287b6cdd4fec24c7f8c1d95abc102cb0a308544ca8abba939ba7,2024-11-21T01:54:26.010000 -CVE-2013-3859,0,1,e6727a190f864a5ad6f12501acec1419e1c992ba41b8475291b498fcc3e39c59,2024-11-21T01:54:26.127000 -CVE-2013-3860,0,1,be116036bb8201593e6571cd625df5ce3492edbf8bf8dce38edc2b71edc90292,2024-11-21T01:54:26.227000 -CVE-2013-3861,0,1,c26bd5ea1bc600fbf07f5bfb122b07f237c719b181d2add6995aac31a59ba996,2024-11-21T01:54:26.350000 -CVE-2013-3862,0,1,4cf5756ad1c104151958dacce6f4eed7932513d8f551b6493c2767549adea5a3,2024-11-21T01:54:26.463000 -CVE-2013-3863,0,1,823b07e8135c982b651f68beac5aed807e12d03dc442b7aeb06f3fc30e96c27a,2024-11-21T01:54:26.580000 -CVE-2013-3864,0,1,fa9fd96ae52c13cba4737a449fb52b419ba23a22723f51dca346a3481bb04939,2024-11-21T01:54:26.687000 -CVE-2013-3865,0,1,cd98d46d5c65567a7828288ffcbdb27a584f70907a7c3fd1c1879387f222187a,2024-11-21T01:54:26.810000 -CVE-2013-3866,0,1,be98daca71ce43619bac84ca67dde5e07daf81e3ee4d0d4ce315036008bd2ac8,2024-11-21T01:54:26.927000 +CVE-2013-3845,0,0,fdfc0234c2b5b092d5129990e4cda05285efa43588474f62ea228aaf1b4dfc4d,2024-11-21T01:54:24.557000 +CVE-2013-3846,0,0,44ff18ba25e2a8e63ab7a22619c93c5761e6188b9505f2a8084cf7a443a545cf,2024-11-21T01:54:24.663000 +CVE-2013-3847,0,0,a09178f07b26309d63041422fa5e4f7111cfd7f111205c6de28a2e0dc2729a28,2024-11-21T01:54:24.773000 +CVE-2013-3848,0,0,fb058f1677ae94d0be2a7b315f84ea99e74490975ea05b30aadc6a3e45f6a401,2024-11-21T01:54:24.887000 +CVE-2013-3849,0,0,0190a26b1045c80a6adbf693b5bf534515f931966f14e6224bbd571d944bca0c,2024-11-21T01:54:24.993000 +CVE-2013-3850,0,0,877cf5e1315554e970c4f556b14406c32e0d4821838444b9248730c5a52ac4a4,2024-11-21T01:54:25.120000 +CVE-2013-3851,0,0,93e9192bfaba67311d2218455896951fed5bd879d790347cb6015fc576d9dbe9,2024-11-21T01:54:25.230000 +CVE-2013-3852,0,0,c98cc4a6a6b5ee846e22408f78f63ef8abb2b4268f20dc15ce5083de2b1395ed,2024-11-21T01:54:25.340000 +CVE-2013-3853,0,0,5ddd1ed738b2f1cfa10f2bdd814f81655530f681aee7726f21c6aae22e08748a,2024-11-21T01:54:25.450000 +CVE-2013-3854,0,0,635e346e56528c33432d1c07826ac37f2edc66679692d3f3112517c0c9cfc01b,2024-11-21T01:54:25.560000 +CVE-2013-3855,0,0,d13c2cca0e035f940acb9050b0ceb34aa53e58e73145b06c264a075e436a3c59,2024-11-21T01:54:25.660000 +CVE-2013-3856,0,0,a308cd1ad1e29f91527992bc05d4738b9d63449644e4a1c72a19eba59fc65bcd,2024-11-21T01:54:25.777000 +CVE-2013-3857,0,0,5ec16c244549b9be0943d44f8a2163b1a9348ef9bab0c1823543dd2267a19b5e,2024-11-21T01:54:25.890000 +CVE-2013-3858,0,0,5bb403a21969287b6cdd4fec24c7f8c1d95abc102cb0a308544ca8abba939ba7,2024-11-21T01:54:26.010000 +CVE-2013-3859,0,0,e6727a190f864a5ad6f12501acec1419e1c992ba41b8475291b498fcc3e39c59,2024-11-21T01:54:26.127000 +CVE-2013-3860,0,0,be116036bb8201593e6571cd625df5ce3492edbf8bf8dce38edc2b71edc90292,2024-11-21T01:54:26.227000 +CVE-2013-3861,0,0,c26bd5ea1bc600fbf07f5bfb122b07f237c719b181d2add6995aac31a59ba996,2024-11-21T01:54:26.350000 +CVE-2013-3862,0,0,4cf5756ad1c104151958dacce6f4eed7932513d8f551b6493c2767549adea5a3,2024-11-21T01:54:26.463000 +CVE-2013-3863,0,0,823b07e8135c982b651f68beac5aed807e12d03dc442b7aeb06f3fc30e96c27a,2024-11-21T01:54:26.580000 +CVE-2013-3864,0,0,fa9fd96ae52c13cba4737a449fb52b419ba23a22723f51dca346a3481bb04939,2024-11-21T01:54:26.687000 +CVE-2013-3865,0,0,cd98d46d5c65567a7828288ffcbdb27a584f70907a7c3fd1c1879387f222187a,2024-11-21T01:54:26.810000 +CVE-2013-3866,0,0,be98daca71ce43619bac84ca67dde5e07daf81e3ee4d0d4ce315036008bd2ac8,2024-11-21T01:54:26.927000 CVE-2013-3867,0,0,b1ba9bc502fd65c7ce9bfda005298e1736738967716ba5d519d83d25b8544628,2023-11-07T02:16:03.337000 -CVE-2013-3868,0,1,933642a68f46ced0840fe1ee04fe4bcafcdc8b69c4f5bda24bff0958ef49b517,2024-11-21T01:54:27.057000 -CVE-2013-3869,0,1,b0b695b8550ff6a886381585cb76032ada4c8b497a9551132cd948327dd2d29e,2024-11-21T01:54:27.170000 -CVE-2013-3870,0,1,6d7f79678336317eea5430a30c7771dfa2c85e42ad5b021de2e613aeb72350de,2024-11-21T01:54:27.297000 -CVE-2013-3871,0,1,e3012c5fb69d6cdd26018c8640955cf3b13ffe0961baf10ec660518b14520071,2024-11-21T01:54:27.420000 -CVE-2013-3872,0,1,dc84a3bad1fe9f1610ee54b96474f7aa702a54f5a6c13a14031463768b9dd1c3,2024-11-21T01:54:27.537000 -CVE-2013-3873,0,1,667efe64200d6b66d80977f87a8f77fe6ae5c251718e095511d380486149fa0a,2024-11-21T01:54:27.647000 -CVE-2013-3874,0,1,87295165ca8b278fea37c356e718f746a8ded1583b7d842603aa21b82c325f08,2024-11-21T01:54:27.747000 -CVE-2013-3875,0,1,382a0f2d8e333a84d4c6ccafdcf9dab0cd2af7a4e40df5147fa1fe742f8064ca,2024-11-21T01:54:27.857000 -CVE-2013-3876,0,1,bb04eedee5d82a5e48e289557efff9156b42544a817026fdd766811e7b990075,2024-11-21T01:54:27.963000 +CVE-2013-3868,0,0,933642a68f46ced0840fe1ee04fe4bcafcdc8b69c4f5bda24bff0958ef49b517,2024-11-21T01:54:27.057000 +CVE-2013-3869,0,0,b0b695b8550ff6a886381585cb76032ada4c8b497a9551132cd948327dd2d29e,2024-11-21T01:54:27.170000 +CVE-2013-3870,0,0,6d7f79678336317eea5430a30c7771dfa2c85e42ad5b021de2e613aeb72350de,2024-11-21T01:54:27.297000 +CVE-2013-3871,0,0,e3012c5fb69d6cdd26018c8640955cf3b13ffe0961baf10ec660518b14520071,2024-11-21T01:54:27.420000 +CVE-2013-3872,0,0,dc84a3bad1fe9f1610ee54b96474f7aa702a54f5a6c13a14031463768b9dd1c3,2024-11-21T01:54:27.537000 +CVE-2013-3873,0,0,667efe64200d6b66d80977f87a8f77fe6ae5c251718e095511d380486149fa0a,2024-11-21T01:54:27.647000 +CVE-2013-3874,0,0,87295165ca8b278fea37c356e718f746a8ded1583b7d842603aa21b82c325f08,2024-11-21T01:54:27.747000 +CVE-2013-3875,0,0,382a0f2d8e333a84d4c6ccafdcf9dab0cd2af7a4e40df5147fa1fe742f8064ca,2024-11-21T01:54:27.857000 +CVE-2013-3876,0,0,bb04eedee5d82a5e48e289557efff9156b42544a817026fdd766811e7b990075,2024-11-21T01:54:27.963000 CVE-2013-3877,0,0,0ee3cfdc2ccaf09c930db4811381caf368ac95bfe5face2f9437f30f1b0f863d,2023-11-07T02:16:03.733000 -CVE-2013-3878,0,1,dd1adfd11a8ac2dd2d79c2b84da56d2a0bc46beeb05b4b6f65390e9df451be9c,2024-11-21T01:54:28.100000 -CVE-2013-3879,0,1,766751a145af4948ba1493550fd0914c69d501d4080e05c9d392a4fcdd692ad5,2024-11-21T01:54:28.213000 -CVE-2013-3880,0,1,d1ce5e9c0745c235176750a963c1632e3f94d094a75222676c27bc89fe481191,2024-11-21T01:54:28.330000 -CVE-2013-3881,0,1,6e077e39ab5b913a17ab665d575b766dc50b88496e475d7f09cf56cd66fbba90,2024-11-21T01:54:28.430000 -CVE-2013-3882,0,1,ca4eacac4e456630e4d5ac884a9d130f8499338dcdb8d4612c92e9bfa0ecc862,2024-11-21T01:54:28.537000 +CVE-2013-3878,0,0,dd1adfd11a8ac2dd2d79c2b84da56d2a0bc46beeb05b4b6f65390e9df451be9c,2024-11-21T01:54:28.100000 +CVE-2013-3879,0,0,766751a145af4948ba1493550fd0914c69d501d4080e05c9d392a4fcdd692ad5,2024-11-21T01:54:28.213000 +CVE-2013-3880,0,0,d1ce5e9c0745c235176750a963c1632e3f94d094a75222676c27bc89fe481191,2024-11-21T01:54:28.330000 +CVE-2013-3881,0,0,6e077e39ab5b913a17ab665d575b766dc50b88496e475d7f09cf56cd66fbba90,2024-11-21T01:54:28.430000 +CVE-2013-3882,0,0,ca4eacac4e456630e4d5ac884a9d130f8499338dcdb8d4612c92e9bfa0ecc862,2024-11-21T01:54:28.537000 CVE-2013-3883,0,0,f36255dd6838f5d14596d702d87eaae7ed4481c3f4f10aeff18227939479314d,2023-11-07T02:16:03.987000 CVE-2013-3884,0,0,a2cd5040780ae36732fb1ba73c4519ab853140961b83a8ff73427dcbf1d18ce2,2023-11-07T02:16:04.197000 -CVE-2013-3885,0,1,55071722d4ff714183e390e638482f2ef332898cb65f1fbd1da6c5d57378d898,2024-11-21T01:54:28.673000 -CVE-2013-3886,0,1,6658ee59ac8dea7afe96a63943a57229c7bdc683a195d5c287bef5ad6f3ddc97,2024-11-21T01:54:28.777000 -CVE-2013-3887,0,1,8fd8b8e490a3392ff58e52160d1766e3e4414e1323bf4d15b0c168cb73ed9712,2024-11-21T01:54:28.890000 -CVE-2013-3888,0,1,19d98247a78b927199a47c5dc5c1c053e71c377603e453410b0479a1857df8e3,2024-11-21T01:54:28.993000 -CVE-2013-3889,0,1,41f0b464ea03c05b2cbe911c2e0e2ed00927da45b55541623ea15bfd1977a98e,2024-11-21T01:54:29.170000 -CVE-2013-3890,0,1,5e6adfa7b3d0345869159062bdbddfe3d79390bc3e456d2daea27fb4a0754148,2024-11-21T01:54:29.287000 -CVE-2013-3891,0,1,afe79bc5605db2d2236a169e0ea62a0efb25b05a03554e89651fb38064544b32,2024-11-21T01:54:29.393000 -CVE-2013-3892,0,1,3720f7c7b5afc180603d2a0b8e57799aad73466fc7b4f1105c01669d54052dbe,2024-11-21T01:54:29.500000 -CVE-2013-3893,0,1,434b61f502bf2ec91dba8be7696c55323de39f895a0a2ced9256587410d9a62e,2024-11-21T01:54:29.627000 -CVE-2013-3894,0,1,37bf93f084a7f06a8c10c8ac52c4d5a9497a80f8bf7724b716d0abc83f83f902,2024-11-21T01:54:29.743000 -CVE-2013-3895,0,1,0b4f39696806053e2666652b63cea36c222cb89bc41fa46f8adf8aae86b90303,2024-11-21T01:54:29.853000 -CVE-2013-3896,0,1,d9fb4ba91e031c33526dea5f7abe34186ef25f01a60fa69c16e6230a1efd5b83,2024-11-21T01:54:29.960000 -CVE-2013-3897,0,1,bd891b703a5c00a0a37117b72677d305535ec98d7428a5f44ca4e505ce4c3ab5,2024-11-21T01:54:30.080000 -CVE-2013-3898,0,1,cf1543bc5ece8184a5f7a5864372359717bad0df52134a29b697d0b0b02e5fc2,2024-11-21T01:54:30.203000 -CVE-2013-3899,0,1,e7ab57886761dfa57eb42698350d324a95c57f6b1c505e872f3197279c2ebada,2024-11-21T01:54:30.323000 -CVE-2013-3900,0,1,0b730477c6378c684fc0910d440784c2f6666151ec6af52e27c9e1841b5fb19e,2024-11-21T01:54:30.420000 +CVE-2013-3885,0,0,55071722d4ff714183e390e638482f2ef332898cb65f1fbd1da6c5d57378d898,2024-11-21T01:54:28.673000 +CVE-2013-3886,0,0,6658ee59ac8dea7afe96a63943a57229c7bdc683a195d5c287bef5ad6f3ddc97,2024-11-21T01:54:28.777000 +CVE-2013-3887,0,0,8fd8b8e490a3392ff58e52160d1766e3e4414e1323bf4d15b0c168cb73ed9712,2024-11-21T01:54:28.890000 +CVE-2013-3888,0,0,19d98247a78b927199a47c5dc5c1c053e71c377603e453410b0479a1857df8e3,2024-11-21T01:54:28.993000 +CVE-2013-3889,0,0,41f0b464ea03c05b2cbe911c2e0e2ed00927da45b55541623ea15bfd1977a98e,2024-11-21T01:54:29.170000 +CVE-2013-3890,0,0,5e6adfa7b3d0345869159062bdbddfe3d79390bc3e456d2daea27fb4a0754148,2024-11-21T01:54:29.287000 +CVE-2013-3891,0,0,afe79bc5605db2d2236a169e0ea62a0efb25b05a03554e89651fb38064544b32,2024-11-21T01:54:29.393000 +CVE-2013-3892,0,0,3720f7c7b5afc180603d2a0b8e57799aad73466fc7b4f1105c01669d54052dbe,2024-11-21T01:54:29.500000 +CVE-2013-3893,0,0,434b61f502bf2ec91dba8be7696c55323de39f895a0a2ced9256587410d9a62e,2024-11-21T01:54:29.627000 +CVE-2013-3894,0,0,37bf93f084a7f06a8c10c8ac52c4d5a9497a80f8bf7724b716d0abc83f83f902,2024-11-21T01:54:29.743000 +CVE-2013-3895,0,0,0b4f39696806053e2666652b63cea36c222cb89bc41fa46f8adf8aae86b90303,2024-11-21T01:54:29.853000 +CVE-2013-3896,0,0,d9fb4ba91e031c33526dea5f7abe34186ef25f01a60fa69c16e6230a1efd5b83,2024-11-21T01:54:29.960000 +CVE-2013-3897,0,0,bd891b703a5c00a0a37117b72677d305535ec98d7428a5f44ca4e505ce4c3ab5,2024-11-21T01:54:30.080000 +CVE-2013-3898,0,0,cf1543bc5ece8184a5f7a5864372359717bad0df52134a29b697d0b0b02e5fc2,2024-11-21T01:54:30.203000 +CVE-2013-3899,0,0,e7ab57886761dfa57eb42698350d324a95c57f6b1c505e872f3197279c2ebada,2024-11-21T01:54:30.323000 +CVE-2013-3900,0,0,0b730477c6378c684fc0910d440784c2f6666151ec6af52e27c9e1841b5fb19e,2024-11-21T01:54:30.420000 CVE-2013-3901,0,0,909726abe80e061ae6e2dd321fecfa4d619bac1c32ab43350c89c79f858d262c,2023-11-07T02:16:04.560000 -CVE-2013-3902,0,1,d52c887a39ced71e37850972b0231bf6a996ea1a877db8b67b86c3f5c6ac1184,2024-11-21T01:54:30.603000 -CVE-2013-3903,0,1,e78e819bdaa5433e95c15d0541966363caa93916926fbc3942b35f61d0ba4032,2024-11-21T01:54:30.730000 +CVE-2013-3902,0,0,d52c887a39ced71e37850972b0231bf6a996ea1a877db8b67b86c3f5c6ac1184,2024-11-21T01:54:30.603000 +CVE-2013-3903,0,0,e78e819bdaa5433e95c15d0541966363caa93916926fbc3942b35f61d0ba4032,2024-11-21T01:54:30.730000 CVE-2013-3904,0,0,f895a1ec47db3f9071dc02e2d6448fd75e692b985e48dc5fa59d39154f8d75db,2023-11-07T02:16:04.790000 -CVE-2013-3905,0,1,34f7aeb726d38a650f8de5d4504b681675655a6edc81521756a26c2f7b86088d,2024-11-21T01:54:30.850000 -CVE-2013-3906,0,1,fafb4cb1fa859e1ea44dd94173b1873e33c653e2bcea535782fa7948cc97eedc,2024-11-21T01:54:30.950000 -CVE-2013-3907,0,1,5c5970fe0214b42dfbe441a219902fc244884827dcd387d2487db5ecb3a07254,2024-11-21T01:54:31.073000 -CVE-2013-3908,0,1,023265f9ba51ced4d35c5a9b9e596c51a5ecb885f00a2fdd380d2d4276279589,2024-11-21T01:54:31.177000 -CVE-2013-3909,0,1,7d2f613f55bc84f19f4a4e65237416ef5326d18a905a71e817b4802f923c6105,2024-11-21T01:54:31.290000 -CVE-2013-3910,0,1,b23a7a7d49baa9f996fb8cfec8426a04a07232fa16324acd34e9cd4cb64cfa45,2024-11-21T01:54:31.403000 -CVE-2013-3911,0,1,7ad64c080d621f24418248b54a54496052ed3c7403bde0e424f5707f31efa150,2024-11-21T01:54:31.513000 -CVE-2013-3912,0,1,9d3205aef0490ee1c9c967033c6b90059d1baaed2e1af83f044445ed7fd17541,2024-11-21T01:54:31.627000 +CVE-2013-3905,0,0,34f7aeb726d38a650f8de5d4504b681675655a6edc81521756a26c2f7b86088d,2024-11-21T01:54:30.850000 +CVE-2013-3906,0,0,fafb4cb1fa859e1ea44dd94173b1873e33c653e2bcea535782fa7948cc97eedc,2024-11-21T01:54:30.950000 +CVE-2013-3907,0,0,5c5970fe0214b42dfbe441a219902fc244884827dcd387d2487db5ecb3a07254,2024-11-21T01:54:31.073000 +CVE-2013-3908,0,0,023265f9ba51ced4d35c5a9b9e596c51a5ecb885f00a2fdd380d2d4276279589,2024-11-21T01:54:31.177000 +CVE-2013-3909,0,0,7d2f613f55bc84f19f4a4e65237416ef5326d18a905a71e817b4802f923c6105,2024-11-21T01:54:31.290000 +CVE-2013-3910,0,0,b23a7a7d49baa9f996fb8cfec8426a04a07232fa16324acd34e9cd4cb64cfa45,2024-11-21T01:54:31.403000 +CVE-2013-3911,0,0,7ad64c080d621f24418248b54a54496052ed3c7403bde0e424f5707f31efa150,2024-11-21T01:54:31.513000 +CVE-2013-3912,0,0,9d3205aef0490ee1c9c967033c6b90059d1baaed2e1af83f044445ed7fd17541,2024-11-21T01:54:31.627000 CVE-2013-3913,0,0,ec2813f5d9f4ea3a0aa40305a0c037b321fb31b063292b0372d6a7cc9fdbff70,2023-11-07T02:16:05.057000 -CVE-2013-3914,0,1,7f3882c939eb6ff38898b63385c94603f80e67ae3fae66675f07a2906e527061,2024-11-21T01:54:31.733000 -CVE-2013-3915,0,1,c968b923ca1e909535a07fa6ed82d896ca1109168765d5407752923f24d4949f,2024-11-21T01:54:31.850000 -CVE-2013-3916,0,1,9803319d76f04fe2ac348aed6fc4b1ee6f8f373b06d23ef5ec652b3a0bb7e495,2024-11-21T01:54:31.957000 -CVE-2013-3917,0,1,ff2df1f23654c3321599e67a393981b99a77d2a52ce0d70b9ba83d208546c7d8,2024-11-21T01:54:32.067000 -CVE-2013-3918,0,1,744d13a98ab83fca760ebcbc5789ea9da0bdbc10dade5a4b521ae1582b5da32a,2024-11-21T01:54:32.180000 -CVE-2013-3919,0,1,7d8f0d297c9a86a254bc463d07a63dbbbdaa9719961f1e4490e3e8ed457b9ac7,2024-11-21T01:54:32.310000 -CVE-2013-3920,0,1,ea24508fb3d683b0d3347a6a8a129b119eebe32e9df0cf4fe8d1feafccdf1826,2024-11-21T01:54:32.457000 -CVE-2013-3921,0,1,f18a33e4ccf34b099e93183aeed29b97a2e6034d3c6b044fec683151a363ab13,2024-11-21T01:54:32.590000 -CVE-2013-3922,0,1,445f070d110e251fb5582ed86c8045468dca951227a1b68680f6d36acb3ebc59,2024-11-21T01:54:32.730000 -CVE-2013-3923,0,1,82a423e6eafabd04deb2606c4c43cba41f69d3bd499d09cfd7a99e1bff8f4df1,2024-11-21T01:54:32.880000 -CVE-2013-3925,0,1,3142c6db45293bdd7c906a702fc6e52d90b6366ef9a42f6f2bb162eac0323a1e,2024-11-21T01:54:33.013000 -CVE-2013-3926,0,1,a0616c0a2141f52ab7ffbeb4143940b9f8a8049ae688b8b835d284f41f18dfb0,2024-11-21T01:54:33.157000 -CVE-2013-3927,0,1,ef9cbc6fe8e390e35dc50cc0f1b8b0b35e1dfc1d846574b628ff83698197b7f9,2024-11-21T01:54:33.317000 -CVE-2013-3928,0,1,6a22cf9bfac089f3c00faf477dbdb7ac220c4d550b245681dfd3b2557bdda444,2024-11-21T01:54:33.463000 -CVE-2013-3929,0,1,a11b1818e81dd94a1a189c09c8c4e020a563dd694d5f34f2c02f33f2925ab2c9,2024-11-21T01:54:33.573000 -CVE-2013-3930,0,1,b2895b65d50bc0771b1cf52214aac84d9714e575c961a4e9090e0ddbd7a000a2,2024-11-21T01:54:33.683000 +CVE-2013-3914,0,0,7f3882c939eb6ff38898b63385c94603f80e67ae3fae66675f07a2906e527061,2024-11-21T01:54:31.733000 +CVE-2013-3915,0,0,c968b923ca1e909535a07fa6ed82d896ca1109168765d5407752923f24d4949f,2024-11-21T01:54:31.850000 +CVE-2013-3916,0,0,9803319d76f04fe2ac348aed6fc4b1ee6f8f373b06d23ef5ec652b3a0bb7e495,2024-11-21T01:54:31.957000 +CVE-2013-3917,0,0,ff2df1f23654c3321599e67a393981b99a77d2a52ce0d70b9ba83d208546c7d8,2024-11-21T01:54:32.067000 +CVE-2013-3918,0,0,744d13a98ab83fca760ebcbc5789ea9da0bdbc10dade5a4b521ae1582b5da32a,2024-11-21T01:54:32.180000 +CVE-2013-3919,0,0,7d8f0d297c9a86a254bc463d07a63dbbbdaa9719961f1e4490e3e8ed457b9ac7,2024-11-21T01:54:32.310000 +CVE-2013-3920,0,0,ea24508fb3d683b0d3347a6a8a129b119eebe32e9df0cf4fe8d1feafccdf1826,2024-11-21T01:54:32.457000 +CVE-2013-3921,0,0,f18a33e4ccf34b099e93183aeed29b97a2e6034d3c6b044fec683151a363ab13,2024-11-21T01:54:32.590000 +CVE-2013-3922,0,0,445f070d110e251fb5582ed86c8045468dca951227a1b68680f6d36acb3ebc59,2024-11-21T01:54:32.730000 +CVE-2013-3923,0,0,82a423e6eafabd04deb2606c4c43cba41f69d3bd499d09cfd7a99e1bff8f4df1,2024-11-21T01:54:32.880000 +CVE-2013-3925,0,0,3142c6db45293bdd7c906a702fc6e52d90b6366ef9a42f6f2bb162eac0323a1e,2024-11-21T01:54:33.013000 +CVE-2013-3926,0,0,a0616c0a2141f52ab7ffbeb4143940b9f8a8049ae688b8b835d284f41f18dfb0,2024-11-21T01:54:33.157000 +CVE-2013-3927,0,0,ef9cbc6fe8e390e35dc50cc0f1b8b0b35e1dfc1d846574b628ff83698197b7f9,2024-11-21T01:54:33.317000 +CVE-2013-3928,0,0,6a22cf9bfac089f3c00faf477dbdb7ac220c4d550b245681dfd3b2557bdda444,2024-11-21T01:54:33.463000 +CVE-2013-3929,0,0,a11b1818e81dd94a1a189c09c8c4e020a563dd694d5f34f2c02f33f2925ab2c9,2024-11-21T01:54:33.573000 +CVE-2013-3930,0,0,b2895b65d50bc0771b1cf52214aac84d9714e575c961a4e9090e0ddbd7a000a2,2024-11-21T01:54:33.683000 CVE-2013-3931,0,0,ed75b809a9d22a7f80a72ea46726f30cf459acb5b72a0e0376318b7ded8af898,2020-01-09T21:16:44.643000 CVE-2013-3932,0,0,d86af8d94fe054073bfb7d75e0e8559549ed16ddccf817b886e72f116f3d5999,2020-01-09T21:20:21.120000 -CVE-2013-3933,0,1,be3165548b7392147dc87699a42084957312ac0e45d67529ede15bcf736f6224,2024-11-21T01:54:34.020000 -CVE-2013-3934,0,1,7fad1e3edcb35e7d4be84f4689dbcef884f50007c68785be01a86c46eb87561e,2024-11-21T01:54:34.130000 +CVE-2013-3933,0,0,be3165548b7392147dc87699a42084957312ac0e45d67529ede15bcf736f6224,2024-11-21T01:54:34.020000 +CVE-2013-3934,0,0,7fad1e3edcb35e7d4be84f4689dbcef884f50007c68785be01a86c46eb87561e,2024-11-21T01:54:34.130000 CVE-2013-3935,0,0,89a0b50fbb3dcdcdd45f399fd3b2fe845dd43460baee401345f20186b1f62d0a,2020-01-07T19:28:15.187000 CVE-2013-3936,0,0,0abd07dc0b92686984928c5463cc8b68c78812dbb6e215eb1773edd02b8cbf67,2020-01-08T14:55:24.973000 CVE-2013-3937,0,0,1880c4821c81a9c5c47a18e71aaec6657f972ad638aa7358231a158bbe8ade18,2020-01-08T02:05:13.153000 -CVE-2013-3938,0,1,99b3d0dc866783c19df026521bbdf9394ec3238059145950b2898033f8ec9b26,2024-11-21T01:54:34.567000 +CVE-2013-3938,0,0,99b3d0dc866783c19df026521bbdf9394ec3238059145950b2898033f8ec9b26,2024-11-21T01:54:34.567000 CVE-2013-3939,0,0,f22c93be7bc7e9a314edc2fe30c27ae1b867532100eef9d12057d0410ea3b67d,2020-01-15T14:16:37.237000 -CVE-2013-3940,0,1,5cee12307f07eba84388b61211f8eb85aa5ebeb7d7a160c28c7bd464cbee383b,2024-11-21T01:54:34.813000 +CVE-2013-3940,0,0,5cee12307f07eba84388b61211f8eb85aa5ebeb7d7a160c28c7bd464cbee383b,2024-11-21T01:54:34.813000 CVE-2013-3941,0,0,291c72da8464494bd3d6e3ff134b676d148ebe392f17337ed67c2826cf4802f3,2020-01-08T19:35:55.607000 CVE-2013-3942,0,0,b3812ab09daff92e012d5f6ce936f29fe25f43d3a4de07efeb0e23187c8e2b5b,2020-02-14T18:34:43.867000 -CVE-2013-3943,0,1,c8351663427a76af9d53fa8beca1c4d3229bd547fe5a803b3d42e69a2ba58b63,2024-11-21T01:54:35.207000 +CVE-2013-3943,0,0,c8351663427a76af9d53fa8beca1c4d3229bd547fe5a803b3d42e69a2ba58b63,2024-11-21T01:54:35.207000 CVE-2013-3944,0,0,e24bc2ba708c23dd4d123931579493b34f0709a029f0363303f8a250fac28593,2020-01-14T19:01:02.350000 CVE-2013-3945,0,0,04a7fc83698b26844704241ae40684e222c5db027ea4c33ac58c1dbad5fbc84e,2020-01-17T17:39:08.427000 CVE-2013-3946,0,0,e3e22aefc358647e87e5dcb131c2fdba4b8af726c2488acaa9719c4a81c39745,2020-01-14T19:01:57.637000 CVE-2013-3947,0,0,6d374bd2e222dd0b530425413bf3bc6ec4087b7d6e46e67288f8eafcb3b55d27,2018-06-04T16:11:47.990000 -CVE-2013-3948,0,1,9d8be6214ff35b20d21317e419aadb8b6ac01e701c808b41643bc53e0100d147,2024-11-21T01:54:35.817000 -CVE-2013-3949,0,1,e9f9e67475fe873cb9f0eed1ac20c57fc19dbb0069bf260d37a979c32d092cf4,2024-11-21T01:54:35.963000 -CVE-2013-3950,0,1,9753a1edf7dd24f3be0034ff34cf1b4a190d6fbf458198eeeb27a0e053c3c03f,2024-11-21T01:54:36.107000 -CVE-2013-3951,0,1,13e0a70ee5c6dc91d55cc176700ba6f784e2c1269ef38f8a9b7591562b256cec,2024-11-21T01:54:36.250000 -CVE-2013-3952,0,1,8def633fee5146ecc4a150d2fe88dad9106e78c4ca0a444409af1411f5d31f86,2024-11-21T01:54:36.423000 -CVE-2013-3953,0,1,151432d48abe94e6ab401dc83c8858cead93c548fd9b83487bfef18afff208e7,2024-11-21T01:54:36.560000 -CVE-2013-3954,0,1,36386c22a51c2eb7816bfbb343ef3f0731d059c5e1ff30421cd721eaf138183e,2024-11-21T01:54:36.707000 -CVE-2013-3955,0,1,7828106e9d6eaceab798243b5acbde190224cfd452127d04ef63daedf022cb1d,2024-11-21T01:54:36.863000 -CVE-2013-3956,0,1,eb4fb13ed3a17dd0e0db72f78e7d92f3c4747560d1d977394fcee945ceece3ee,2024-11-21T01:54:37.020000 -CVE-2013-3957,0,1,a8eec0a7711d27834fa1b6d872d7bb666ef3de10b0c6fa288368f04e63aaff38,2024-11-21T01:54:37.167000 -CVE-2013-3958,0,1,aec405bbe5830f519866fa64295b0b72f5a638c20c541cece5eac0833c68075d,2024-11-21T01:54:37.307000 -CVE-2013-3959,0,1,d781c36fd137c1e47a8847865b4fbf933657fd2d65b3219fd34602ff4bcedbff,2024-11-21T01:54:37.447000 +CVE-2013-3948,0,0,9d8be6214ff35b20d21317e419aadb8b6ac01e701c808b41643bc53e0100d147,2024-11-21T01:54:35.817000 +CVE-2013-3949,0,0,e9f9e67475fe873cb9f0eed1ac20c57fc19dbb0069bf260d37a979c32d092cf4,2024-11-21T01:54:35.963000 +CVE-2013-3950,0,0,9753a1edf7dd24f3be0034ff34cf1b4a190d6fbf458198eeeb27a0e053c3c03f,2024-11-21T01:54:36.107000 +CVE-2013-3951,0,0,13e0a70ee5c6dc91d55cc176700ba6f784e2c1269ef38f8a9b7591562b256cec,2024-11-21T01:54:36.250000 +CVE-2013-3952,0,0,8def633fee5146ecc4a150d2fe88dad9106e78c4ca0a444409af1411f5d31f86,2024-11-21T01:54:36.423000 +CVE-2013-3953,0,0,151432d48abe94e6ab401dc83c8858cead93c548fd9b83487bfef18afff208e7,2024-11-21T01:54:36.560000 +CVE-2013-3954,0,0,36386c22a51c2eb7816bfbb343ef3f0731d059c5e1ff30421cd721eaf138183e,2024-11-21T01:54:36.707000 +CVE-2013-3955,0,0,7828106e9d6eaceab798243b5acbde190224cfd452127d04ef63daedf022cb1d,2024-11-21T01:54:36.863000 +CVE-2013-3956,0,0,eb4fb13ed3a17dd0e0db72f78e7d92f3c4747560d1d977394fcee945ceece3ee,2024-11-21T01:54:37.020000 +CVE-2013-3957,0,0,a8eec0a7711d27834fa1b6d872d7bb666ef3de10b0c6fa288368f04e63aaff38,2024-11-21T01:54:37.167000 +CVE-2013-3958,0,0,aec405bbe5830f519866fa64295b0b72f5a638c20c541cece5eac0833c68075d,2024-11-21T01:54:37.307000 +CVE-2013-3959,0,0,d781c36fd137c1e47a8847865b4fbf933657fd2d65b3219fd34602ff4bcedbff,2024-11-21T01:54:37.447000 CVE-2013-3960,0,0,444fce47a9fdaf5f4efa97010c0ba8f83d2eb994aa3f8efd8f3d5e2a5ce7020e,2020-02-04T21:08:33.603000 -CVE-2013-3961,0,1,e0b408cc84002aae0edcecdc00899f403d461c0bd0c8b7c41d70605448795d2f,2024-11-21T01:54:37.743000 -CVE-2013-3962,0,1,a51d917189cd7036c2f7bd8b90b4416fd73d618fdd04f7c79937ea61290884e4,2024-11-21T01:54:37.900000 -CVE-2013-3963,0,1,0788bd0f7dbce275d43ba2aac9cd1f35e973e310c03ff87816c6bffe76bb5db6,2024-11-21T01:54:38.043000 -CVE-2013-3964,0,1,8f460d6f3cfd8ac488113a367e0696eec9e8c26a0168c35d3ae476a9708de142,2024-11-21T01:54:38.180000 -CVE-2013-3969,0,1,765e8feaf7b733dccbaba69980b9c909da8d56539f7124fd9fbc63270da383a6,2024-11-21T01:54:38.347000 -CVE-2013-3970,0,1,819abf908ef29255202b079d4bab89ddba1c4146f28e2618a2eecb0c06de053f,2024-11-21T01:54:38.490000 -CVE-2013-3971,0,1,04c94f79062a17915bbe41f31ee868a50fe010035e71eb8fcf0d3da56bb7bd5e,2024-11-21T01:54:38.630000 -CVE-2013-3972,0,1,983e59481a8a26528ec00d398f06fd91ba50ae845fe2810d6af0ed9f06657ee6,2024-11-21T01:54:38.727000 -CVE-2013-3973,0,1,7dbb90121d0f992a2dfa61bb48ab5aaf511dcd5997cde37df972ddbd722fe48f,2024-11-21T01:54:38.843000 -CVE-2013-3975,0,1,a492ebe400bb59e796250cf9065b8283d8d8c037eb88237d8e85a84f00f97a53,2024-11-21T01:54:38.960000 -CVE-2013-3976,0,1,5934d786a0ad5bee5585730c8abdddda09ca152aa07635b7965447b7d9a2e1ff,2024-11-21T01:54:39.067000 -CVE-2013-3977,0,1,3b7254afb64df79525cdad6f76d0ea3d9a845e314d67f25e59238c68fb94f3da,2024-11-21T01:54:39.177000 -CVE-2013-3978,0,1,8519e186df239e5fe7a75198032fe1be7bcdaba601fa88037e797bc761a274f9,2024-11-21T01:54:39.290000 -CVE-2013-3979,0,1,6442e39566d1eb22e73e3355b124809b9fa8d5174f4e45b7edc99f2aa777d24c,2024-11-21T01:54:39.400000 -CVE-2013-3980,0,1,81ffe2f50b9273f78d4cdc370ee8e22185c02d9831bf40e92129d2cf81d19c90,2024-11-21T01:54:39.517000 -CVE-2013-3981,0,1,da67933f4c575a50b7e41f60474e0effe0c12f98e4b7e808beec45677fcb3ed5,2024-11-21T01:54:39.630000 -CVE-2013-3982,0,1,d05608d5c14e0e1acf736d5f6a333cb18f8b6ce68e910394acecb9b86fc00af2,2024-11-21T01:54:39.733000 -CVE-2013-3983,0,1,c60f6e09e2ba86c077f10739980007ea9b5233bc4fee5235de62093b4434bd4c,2024-11-21T01:54:39.840000 -CVE-2013-3984,0,1,d98ab7b5b59bf9e736d423082b41965cce968d8bdc011f20330fe3e7229b222f,2024-11-21T01:54:39.950000 -CVE-2013-3985,0,1,fe7c893e9f78de8fe2e8784dca28434d7d69ef05e9def61e413b476008fab9ac,2024-11-21T01:54:40.057000 -CVE-2013-3986,0,1,f243865a0b2657522ace53423c0428628e65fdba7cc20c4d69cf5c2afab0be72,2024-11-21T01:54:40.160000 -CVE-2013-3988,0,1,c60d97c27367e918a56ae766b336c1f43a6bd0bc858cd890ae155e9dc7e20fa1,2024-11-21T01:54:40.263000 -CVE-2013-3989,0,1,0daa21cb23b26debbc8eee71c3dcc988710a59f240a02638a8eb440ae960f325,2024-11-21T01:54:40.370000 -CVE-2013-3990,0,1,b6502121d47dd8418182eba9981489d101ce3d98324e36ffdf6ac8e2d9616981,2024-11-21T01:54:40.477000 -CVE-2013-3992,0,1,30a671041f3e9cbb32e9a283adda9c9a375228517147cf20888a3067ecd592ee,2024-11-21T01:54:40.587000 +CVE-2013-3961,0,0,e0b408cc84002aae0edcecdc00899f403d461c0bd0c8b7c41d70605448795d2f,2024-11-21T01:54:37.743000 +CVE-2013-3962,0,0,a51d917189cd7036c2f7bd8b90b4416fd73d618fdd04f7c79937ea61290884e4,2024-11-21T01:54:37.900000 +CVE-2013-3963,0,0,0788bd0f7dbce275d43ba2aac9cd1f35e973e310c03ff87816c6bffe76bb5db6,2024-11-21T01:54:38.043000 +CVE-2013-3964,0,0,8f460d6f3cfd8ac488113a367e0696eec9e8c26a0168c35d3ae476a9708de142,2024-11-21T01:54:38.180000 +CVE-2013-3969,0,0,765e8feaf7b733dccbaba69980b9c909da8d56539f7124fd9fbc63270da383a6,2024-11-21T01:54:38.347000 +CVE-2013-3970,0,0,819abf908ef29255202b079d4bab89ddba1c4146f28e2618a2eecb0c06de053f,2024-11-21T01:54:38.490000 +CVE-2013-3971,0,0,04c94f79062a17915bbe41f31ee868a50fe010035e71eb8fcf0d3da56bb7bd5e,2024-11-21T01:54:38.630000 +CVE-2013-3972,0,0,983e59481a8a26528ec00d398f06fd91ba50ae845fe2810d6af0ed9f06657ee6,2024-11-21T01:54:38.727000 +CVE-2013-3973,0,0,7dbb90121d0f992a2dfa61bb48ab5aaf511dcd5997cde37df972ddbd722fe48f,2024-11-21T01:54:38.843000 +CVE-2013-3975,0,0,a492ebe400bb59e796250cf9065b8283d8d8c037eb88237d8e85a84f00f97a53,2024-11-21T01:54:38.960000 +CVE-2013-3976,0,0,5934d786a0ad5bee5585730c8abdddda09ca152aa07635b7965447b7d9a2e1ff,2024-11-21T01:54:39.067000 +CVE-2013-3977,0,0,3b7254afb64df79525cdad6f76d0ea3d9a845e314d67f25e59238c68fb94f3da,2024-11-21T01:54:39.177000 +CVE-2013-3978,0,0,8519e186df239e5fe7a75198032fe1be7bcdaba601fa88037e797bc761a274f9,2024-11-21T01:54:39.290000 +CVE-2013-3979,0,0,6442e39566d1eb22e73e3355b124809b9fa8d5174f4e45b7edc99f2aa777d24c,2024-11-21T01:54:39.400000 +CVE-2013-3980,0,0,81ffe2f50b9273f78d4cdc370ee8e22185c02d9831bf40e92129d2cf81d19c90,2024-11-21T01:54:39.517000 +CVE-2013-3981,0,0,da67933f4c575a50b7e41f60474e0effe0c12f98e4b7e808beec45677fcb3ed5,2024-11-21T01:54:39.630000 +CVE-2013-3982,0,0,d05608d5c14e0e1acf736d5f6a333cb18f8b6ce68e910394acecb9b86fc00af2,2024-11-21T01:54:39.733000 +CVE-2013-3983,0,0,c60f6e09e2ba86c077f10739980007ea9b5233bc4fee5235de62093b4434bd4c,2024-11-21T01:54:39.840000 +CVE-2013-3984,0,0,d98ab7b5b59bf9e736d423082b41965cce968d8bdc011f20330fe3e7229b222f,2024-11-21T01:54:39.950000 +CVE-2013-3985,0,0,fe7c893e9f78de8fe2e8784dca28434d7d69ef05e9def61e413b476008fab9ac,2024-11-21T01:54:40.057000 +CVE-2013-3986,0,0,f243865a0b2657522ace53423c0428628e65fdba7cc20c4d69cf5c2afab0be72,2024-11-21T01:54:40.160000 +CVE-2013-3988,0,0,c60d97c27367e918a56ae766b336c1f43a6bd0bc858cd890ae155e9dc7e20fa1,2024-11-21T01:54:40.263000 +CVE-2013-3989,0,0,0daa21cb23b26debbc8eee71c3dcc988710a59f240a02638a8eb440ae960f325,2024-11-21T01:54:40.370000 +CVE-2013-3990,0,0,b6502121d47dd8418182eba9981489d101ce3d98324e36ffdf6ac8e2d9616981,2024-11-21T01:54:40.477000 +CVE-2013-3992,0,0,30a671041f3e9cbb32e9a283adda9c9a375228517147cf20888a3067ecd592ee,2024-11-21T01:54:40.587000 CVE-2013-3993,0,0,910d18642404c27c8d587004a0d883953f7cdce9deb1a222035db44b70cac614,2024-06-28T17:38:08.727000 -CVE-2013-3995,0,1,4ec4b9cff25413b8f0e9bb16497fd963c110f77e6c1055e536df66fd7f0522c8,2024-11-21T01:54:40.807000 -CVE-2013-3996,0,1,3e4831cf53099fa649dcc04ab308cb9c5e4c68fa1f8543f8238eda69d8a0e365,2024-11-21T01:54:40.917000 -CVE-2013-3997,0,1,b6f748afb0358d25fee842b933f4f25a81f1777ffd467c3ec3651c5d19919666,2024-11-21T01:54:41.020000 -CVE-2013-3998,0,1,aca51f3f641116b7b3ff6f3c708611e3b9e23761d545c58381c46c7af6d52436,2024-11-21T01:54:41.123000 -CVE-2013-3999,0,1,7428c10a3bde6569873c2d3d240beff46e085dd266a1e3472ee932c236caec10,2024-11-21T01:54:41.240000 -CVE-2013-4000,0,1,2e2458735a1fdd354f12003c93d63393c03f78ef8ac02d2097eb707e30d5c315,2024-11-21T01:54:41.350000 -CVE-2013-4001,0,1,3d4184fd92a2c1eb888e8532ff67313251ea50cbdc61760656f9c99f883ee622,2024-11-21T01:54:41.457000 -CVE-2013-4002,0,1,d5761b0ad03fd85084cdc2292016e4d1d7322045a3c0916ff6e6b9e6b5565460,2024-11-21T01:54:41.567000 -CVE-2013-4003,0,1,31266ef3d92f208b721e4e4fd13d799388ce995f183ea002cf412046cdec22ff,2024-11-21T01:54:41.807000 -CVE-2013-4004,0,1,e1d068cecd43676a69610154929739db2ffefec16a4150c39edce5e9dd0d74aa,2024-11-21T01:54:41.940000 -CVE-2013-4005,0,1,16231fc3e2dbf970243823342d0d71f9815a943c54da1d79a8a83323773805f8,2024-11-21T01:54:42.057000 -CVE-2013-4006,0,1,154f46b190eed43466e49f3881f96b8132f9cb154ace67e57c4ea99284909602,2024-11-21T01:54:42.187000 -CVE-2013-4007,0,1,ad791b5319f6543a7493dec1b3742467a2e96e01fb485ddc416532ca67158b72,2024-11-21T01:54:42.307000 -CVE-2013-4011,0,1,2cc8db6c265dff121c4338de4007abffdda7597164a1b54e102f915ad0f14473,2024-11-21T01:54:42.433000 -CVE-2013-4012,0,1,e13d16d4046845bf72101b210dd52974befd781662acead0ba435f51f8b0ba37,2024-11-21T01:54:42.557000 -CVE-2013-4013,0,1,8514a0adaa22dc352f1a702ea23422cbd8e373c4f42f52bb110041edbd7a6fff,2024-11-21T01:54:42.673000 -CVE-2013-4014,0,1,da7a49868c726cefd672212ae59f724d5852be75c1c8c8fa0f46adcaf078feca,2024-11-21T01:54:42.777000 -CVE-2013-4015,0,1,976fcde30b7ed31f4fc1d36e86b2fa9fd264f2a9ed7779cd6a7e9be626ec6b5f,2024-11-21T01:54:42.897000 -CVE-2013-4016,0,1,122709d1d3916eb9780502388492f02e51a6b876d186b55f247b1256d11117ed,2024-11-21T01:54:43.007000 -CVE-2013-4017,0,1,d4a457d7c82e0710fb415563485d6d17dcbf65a8e4cd12b2b50d52cd12923972,2024-11-21T01:54:43.117000 -CVE-2013-4018,0,1,25812ee3a20d412416ffc66b62abcef5fa62a901b622cd06d484926cd7c006d5,2024-11-21T01:54:43.227000 -CVE-2013-4019,0,1,5a917849049d7ac6f4e9097808b1b6c215800cddb20954bc32ecd783ed1957ea,2024-11-21T01:54:43.340000 -CVE-2013-4020,0,1,6b53bae7fdc340e0a4d3f4be103502da7e3100e99d700f550431f2e20387ae21,2024-11-21T01:54:43.460000 -CVE-2013-4021,0,1,82571a30cf7c001afcd623c26a7ad9fb4128d4edc3bf2dc229f3c9400abef728,2024-11-21T01:54:43.580000 -CVE-2013-4022,0,1,60f70f3f01560cc887ce22dc4c2f2b200693679add3b91d172303e02f75a7647,2024-11-21T01:54:43.697000 -CVE-2013-4024,0,1,ead124426d3739122e56dfd93fcc9c328272adc77e3badde36f8ba9450528b51,2024-11-21T01:54:43.800000 -CVE-2013-4025,0,1,ad52956b29454e197a3cd2962d0cff90a7caef252250b7b7cf0b9c1b7673ecc5,2024-11-21T01:54:43.907000 -CVE-2013-4027,0,1,758c97592a470f25d31a0c32202f47630bd058ddcb02c51dfda3bef986eed446,2024-11-21T01:54:44.033000 -CVE-2013-4030,0,1,9e77a270bda5d357b4c670ba25111878ef9a8174fc97bb81089659e80e0974f2,2024-11-21T01:54:44.933000 -CVE-2013-4031,0,1,4291dad2f78d63fcda4b0ae38efa8cce7d849079637e223e366fef3932dd32fb,2024-11-21T01:54:45.167000 -CVE-2013-4032,0,1,13d08be7a95b5ff40b540943e5e20f5298d25201f55334dda22326ce7bfdf0e1,2024-11-21T01:54:45.287000 -CVE-2013-4033,0,1,14444bc0a38fa5a4d00d052924b232633b4f4e6a278d7f1e36885fd468635975,2024-11-21T01:54:45.407000 -CVE-2013-4034,0,1,ddbdeaa924cddf6c9bb1730b31921519fab6210a0be1ede66b35d86f5d84435d,2024-11-21T01:54:45.527000 +CVE-2013-3995,0,0,4ec4b9cff25413b8f0e9bb16497fd963c110f77e6c1055e536df66fd7f0522c8,2024-11-21T01:54:40.807000 +CVE-2013-3996,0,0,3e4831cf53099fa649dcc04ab308cb9c5e4c68fa1f8543f8238eda69d8a0e365,2024-11-21T01:54:40.917000 +CVE-2013-3997,0,0,b6f748afb0358d25fee842b933f4f25a81f1777ffd467c3ec3651c5d19919666,2024-11-21T01:54:41.020000 +CVE-2013-3998,0,0,aca51f3f641116b7b3ff6f3c708611e3b9e23761d545c58381c46c7af6d52436,2024-11-21T01:54:41.123000 +CVE-2013-3999,0,0,7428c10a3bde6569873c2d3d240beff46e085dd266a1e3472ee932c236caec10,2024-11-21T01:54:41.240000 +CVE-2013-4000,0,0,2e2458735a1fdd354f12003c93d63393c03f78ef8ac02d2097eb707e30d5c315,2024-11-21T01:54:41.350000 +CVE-2013-4001,0,0,3d4184fd92a2c1eb888e8532ff67313251ea50cbdc61760656f9c99f883ee622,2024-11-21T01:54:41.457000 +CVE-2013-4002,0,0,d5761b0ad03fd85084cdc2292016e4d1d7322045a3c0916ff6e6b9e6b5565460,2024-11-21T01:54:41.567000 +CVE-2013-4003,0,0,31266ef3d92f208b721e4e4fd13d799388ce995f183ea002cf412046cdec22ff,2024-11-21T01:54:41.807000 +CVE-2013-4004,0,0,e1d068cecd43676a69610154929739db2ffefec16a4150c39edce5e9dd0d74aa,2024-11-21T01:54:41.940000 +CVE-2013-4005,0,0,16231fc3e2dbf970243823342d0d71f9815a943c54da1d79a8a83323773805f8,2024-11-21T01:54:42.057000 +CVE-2013-4006,0,0,154f46b190eed43466e49f3881f96b8132f9cb154ace67e57c4ea99284909602,2024-11-21T01:54:42.187000 +CVE-2013-4007,0,0,ad791b5319f6543a7493dec1b3742467a2e96e01fb485ddc416532ca67158b72,2024-11-21T01:54:42.307000 +CVE-2013-4011,0,0,2cc8db6c265dff121c4338de4007abffdda7597164a1b54e102f915ad0f14473,2024-11-21T01:54:42.433000 +CVE-2013-4012,0,0,e13d16d4046845bf72101b210dd52974befd781662acead0ba435f51f8b0ba37,2024-11-21T01:54:42.557000 +CVE-2013-4013,0,0,8514a0adaa22dc352f1a702ea23422cbd8e373c4f42f52bb110041edbd7a6fff,2024-11-21T01:54:42.673000 +CVE-2013-4014,0,0,da7a49868c726cefd672212ae59f724d5852be75c1c8c8fa0f46adcaf078feca,2024-11-21T01:54:42.777000 +CVE-2013-4015,0,0,976fcde30b7ed31f4fc1d36e86b2fa9fd264f2a9ed7779cd6a7e9be626ec6b5f,2024-11-21T01:54:42.897000 +CVE-2013-4016,0,0,122709d1d3916eb9780502388492f02e51a6b876d186b55f247b1256d11117ed,2024-11-21T01:54:43.007000 +CVE-2013-4017,0,0,d4a457d7c82e0710fb415563485d6d17dcbf65a8e4cd12b2b50d52cd12923972,2024-11-21T01:54:43.117000 +CVE-2013-4018,0,0,25812ee3a20d412416ffc66b62abcef5fa62a901b622cd06d484926cd7c006d5,2024-11-21T01:54:43.227000 +CVE-2013-4019,0,0,5a917849049d7ac6f4e9097808b1b6c215800cddb20954bc32ecd783ed1957ea,2024-11-21T01:54:43.340000 +CVE-2013-4020,0,0,6b53bae7fdc340e0a4d3f4be103502da7e3100e99d700f550431f2e20387ae21,2024-11-21T01:54:43.460000 +CVE-2013-4021,0,0,82571a30cf7c001afcd623c26a7ad9fb4128d4edc3bf2dc229f3c9400abef728,2024-11-21T01:54:43.580000 +CVE-2013-4022,0,0,60f70f3f01560cc887ce22dc4c2f2b200693679add3b91d172303e02f75a7647,2024-11-21T01:54:43.697000 +CVE-2013-4024,0,0,ead124426d3739122e56dfd93fcc9c328272adc77e3badde36f8ba9450528b51,2024-11-21T01:54:43.800000 +CVE-2013-4025,0,0,ad52956b29454e197a3cd2962d0cff90a7caef252250b7b7cf0b9c1b7673ecc5,2024-11-21T01:54:43.907000 +CVE-2013-4027,0,0,758c97592a470f25d31a0c32202f47630bd058ddcb02c51dfda3bef986eed446,2024-11-21T01:54:44.033000 +CVE-2013-4030,0,0,9e77a270bda5d357b4c670ba25111878ef9a8174fc97bb81089659e80e0974f2,2024-11-21T01:54:44.933000 +CVE-2013-4031,0,0,4291dad2f78d63fcda4b0ae38efa8cce7d849079637e223e366fef3932dd32fb,2024-11-21T01:54:45.167000 +CVE-2013-4032,0,0,13d08be7a95b5ff40b540943e5e20f5298d25201f55334dda22326ce7bfdf0e1,2024-11-21T01:54:45.287000 +CVE-2013-4033,0,0,14444bc0a38fa5a4d00d052924b232633b4f4e6a278d7f1e36885fd468635975,2024-11-21T01:54:45.407000 +CVE-2013-4034,0,0,ddbdeaa924cddf6c9bb1730b31921519fab6210a0be1ede66b35d86f5d84435d,2024-11-21T01:54:45.527000 CVE-2013-4035,0,0,68b901051e7a9d5e68ae634f6eb7cd0981201276dc43188b50d05e504a80f979,2018-06-07T18:37:19.307000 -CVE-2013-4036,0,1,a30370cb8fe11dc5a506e350fdb495d98c111a368bb553060241c859aa2bfe6d,2024-11-21T01:54:45.737000 -CVE-2013-4037,0,1,aef546624ee876194e2e58e5ebfa22493f3f74ebacf7215530c94003f3ecd4d0,2024-11-21T01:54:45.840000 -CVE-2013-4038,0,1,203d40b1e36941a56b4af553941a91f497afad15037dc4974a5e682ace9cebfa,2024-11-21T01:54:45.943000 -CVE-2013-4039,0,1,e282ea5a42ae4cbef4dd998b4247c1f327d2b6fc8d71df1a9d4b6799a8b46b9b,2024-11-21T01:54:46.060000 +CVE-2013-4036,0,0,a30370cb8fe11dc5a506e350fdb495d98c111a368bb553060241c859aa2bfe6d,2024-11-21T01:54:45.737000 +CVE-2013-4037,0,0,aef546624ee876194e2e58e5ebfa22493f3f74ebacf7215530c94003f3ecd4d0,2024-11-21T01:54:45.840000 +CVE-2013-4038,0,0,203d40b1e36941a56b4af553941a91f497afad15037dc4974a5e682ace9cebfa,2024-11-21T01:54:45.943000 +CVE-2013-4039,0,0,e282ea5a42ae4cbef4dd998b4247c1f327d2b6fc8d71df1a9d4b6799a8b46b9b,2024-11-21T01:54:46.060000 CVE-2013-4040,0,0,c9b0716a5a261b51236952ce8cc77315742a60ef40d477ab330574b8418a7e32,2018-06-13T11:13:24.213000 -CVE-2013-4041,0,1,03121543bc34edfc1ec5b39e5654bea408385c85fff6867ec7d6b7d7a1add8ed,2024-11-21T01:54:46.290000 -CVE-2013-4042,0,1,fc0cd01f8abfd4239dda906ac1984faf195459204b2e13a2b1a6d78f005b01a5,2024-11-21T01:54:46.417000 -CVE-2013-4043,0,1,7db7ca33824ac1e1e1e81a5be648034782af43d5ec2ab62e4b4076d3c843a22e,2024-11-21T01:54:46.530000 -CVE-2013-4044,0,1,5bb0da17aa8efe66d88d309447085b43ebe19afc8ce3ef828d578ff302b909ed,2024-11-21T01:54:46.643000 -CVE-2013-4045,0,1,a6ff997378e974317fba78952f16c9ca8a0955f9ccba00aa32e132fd84795b12,2024-11-21T01:54:46.753000 -CVE-2013-4046,0,1,fe0a311191beb155daf6ef38cdd4680b49b01457e8da9cae36827f1df3e992fe,2024-11-21T01:54:46.860000 -CVE-2013-4047,0,1,ac3545cb8ed0bb09c6cd6213f6f9ce70c247328b5b7f50a9c06a575730422659,2024-11-21T01:54:46.970000 -CVE-2013-4048,0,1,b4f66bc7991fa13f44b1910f43e8ccbe31e0ea1e6112e329e4f8d1bd379f2b5f,2024-11-21T01:54:47.080000 -CVE-2013-4049,0,1,91b25346d0a0dd96f8a00aa1e4b54d88216741f46d2b237e3ddd3e1104a7ae2e,2024-11-21T01:54:47.180000 -CVE-2013-4050,0,1,52ffe51c73e291176af2408506ca93f4d7791690e8971f1822e2e6578f5c2fb6,2024-11-21T01:54:47.287000 -CVE-2013-4051,0,1,d1a97f1c9a1f95c66257e8339601130b75b6e4d839eee9cab2de55645faf792f,2024-11-21T01:54:47.400000 -CVE-2013-4052,0,1,09e07371b4d26c562a108313bea5db2e3c87191feb3386e84d3a170b757e1db2,2024-11-21T01:54:47.503000 -CVE-2013-4053,0,1,8aab614d8ebd53afd1520727f55d7b81b8624bde38ce097018958fa88c4454e1,2024-11-21T01:54:47.640000 -CVE-2013-4054,0,1,fcb9f0c0e4afa1e019b045e52c99ff4f71d5140e8fa1c7ef9aa57e04095d3642,2024-11-21T01:54:47.777000 -CVE-2013-4055,0,1,fec096c6b0ef1cbb0c7d603961d9eca4cecc5e593afd170a06e1064f112ac888,2024-11-21T01:54:47.890000 -CVE-2013-4056,0,1,7dd51c60ee72b7ab53680ed327fb6c9ef41049e4e86dee5c79bab22877e8eb66,2024-11-21T01:54:48 -CVE-2013-4057,0,1,4408ea31d54f26bb5560bdf6a9087fa7d47dad3bd0cd806992f5819c617f1383,2024-11-21T01:54:48.117000 -CVE-2013-4058,0,1,39b04b53c297648a4ad3d1e9faba5669f7d7097f7801bd24a8d9e6ed2d89f001,2024-11-21T01:54:48.243000 -CVE-2013-4059,0,1,a53b69b3595903960e270f665cb979c2cf39d7b18f20216d6a55d93480183b56,2024-11-21T01:54:48.367000 -CVE-2013-4061,0,1,c45cfdb238302e5ab845f505cf33d9619208111cfcf590f115a3a4a238d950eb,2024-11-21T01:54:48.510000 -CVE-2013-4062,0,1,2c91bc2fff46d8a43b122992239922fef3080f3285e7e3a52b54be4047d779ff,2024-11-21T01:54:48.647000 -CVE-2013-4063,0,1,09bac3d1984831d402b038d176f585ff8ed13c6f352723c4660118d1fb333c1e,2024-11-21T01:54:48.763000 -CVE-2013-4064,0,1,0d3c2e38e2684cea77ae57357c0d0ef3cd021e8ef702267e28adfbc45efe644d,2024-11-21T01:54:48.880000 -CVE-2013-4065,0,1,e4a381211993292bb85e2bf59be0c36b5c4dab8a3099be35ad3eff5bd7e31d5c,2024-11-21T01:54:49 -CVE-2013-4066,0,1,9651bc79058f6bad74886c1bab54f91a50eda386ccbe88ada3aee5222f16e6b7,2024-11-21T01:54:49.120000 -CVE-2013-4067,0,1,8171b26abffafab9f499a8580b00947317b50a2bb4297afe04b474b0b2b4aec1,2024-11-21T01:54:49.250000 -CVE-2013-4068,0,1,006632307efef2b8212f53fb640821a5fd5f9462d15a86a59c673f5a38051800,2024-11-21T01:54:49.360000 -CVE-2013-4069,0,1,12803e17baffbe88dbaf7ce23d68313a75478f1a2b4491193b408fdde4f44043,2024-11-21T01:54:49.467000 -CVE-2013-4070,0,1,2ace7d3e17d69fbe681a679777d07a678507cd94425ff4d79464bb5de7dbc9f7,2024-11-21T01:54:49.583000 -CVE-2013-4073,0,1,0220a3698c267fa94bcdf2e2acba47fcca475bf06c24f7e0690779c9d404b4ca,2024-11-21T01:54:49.707000 -CVE-2013-4074,0,1,89aef8cd0fff5b67a5633523e2f105cebc298aa7d1422ab09003d6642584cbff,2024-11-21T01:54:49.860000 -CVE-2013-4075,0,1,39ba2a1d5278d586aa4674a3fce0cdbf9c00dadcf12c16f45f6c12dfbb0d3518,2024-11-21T01:54:50.030000 -CVE-2013-4076,0,1,4bf5b52788508885de743272e450bda603eb1f843c56bdda5e4eeaf506716b98,2024-11-21T01:54:50.190000 -CVE-2013-4077,0,1,70a934e04c17a83dceb46cd33806d46b822128bd0d2da628a273feebda3b523a,2024-11-21T01:54:50.353000 -CVE-2013-4078,0,1,c1a88c96dff34900773f1b7792bd7974ced3e0489a0255f925d168143348ef3f,2024-11-21T01:54:50.523000 -CVE-2013-4079,0,1,b121cbdc23c138f6bce859e1e481b10dd103d765a4c1af66f6e13b709a4e5e5e,2024-11-21T01:54:50.687000 -CVE-2013-4080,0,1,7e1178e3970a04bb988fa973b9b7a22a50ad0e9df99185de38a7bf6f4528cb9c,2024-11-21T01:54:50.833000 -CVE-2013-4081,0,1,2f019cf997a7ae6c27e381d7f19c03823cdecbd1351f02dcd827d710a3c9709f,2024-11-21T01:54:50.980000 -CVE-2013-4082,0,1,6ea8ef59470e2a4d897fcabb1cd0f4a19de722addf6dc01c542cf65e671250b0,2024-11-21T01:54:51.147000 -CVE-2013-4083,0,1,dba04a398a905817a31b8604e9f69f487d2a6ad6fb19c9a6bec1d9849c830795,2024-11-21T01:54:51.300000 +CVE-2013-4041,0,0,03121543bc34edfc1ec5b39e5654bea408385c85fff6867ec7d6b7d7a1add8ed,2024-11-21T01:54:46.290000 +CVE-2013-4042,0,0,fc0cd01f8abfd4239dda906ac1984faf195459204b2e13a2b1a6d78f005b01a5,2024-11-21T01:54:46.417000 +CVE-2013-4043,0,0,7db7ca33824ac1e1e1e81a5be648034782af43d5ec2ab62e4b4076d3c843a22e,2024-11-21T01:54:46.530000 +CVE-2013-4044,0,0,5bb0da17aa8efe66d88d309447085b43ebe19afc8ce3ef828d578ff302b909ed,2024-11-21T01:54:46.643000 +CVE-2013-4045,0,0,a6ff997378e974317fba78952f16c9ca8a0955f9ccba00aa32e132fd84795b12,2024-11-21T01:54:46.753000 +CVE-2013-4046,0,0,fe0a311191beb155daf6ef38cdd4680b49b01457e8da9cae36827f1df3e992fe,2024-11-21T01:54:46.860000 +CVE-2013-4047,0,0,ac3545cb8ed0bb09c6cd6213f6f9ce70c247328b5b7f50a9c06a575730422659,2024-11-21T01:54:46.970000 +CVE-2013-4048,0,0,b4f66bc7991fa13f44b1910f43e8ccbe31e0ea1e6112e329e4f8d1bd379f2b5f,2024-11-21T01:54:47.080000 +CVE-2013-4049,0,0,91b25346d0a0dd96f8a00aa1e4b54d88216741f46d2b237e3ddd3e1104a7ae2e,2024-11-21T01:54:47.180000 +CVE-2013-4050,0,0,52ffe51c73e291176af2408506ca93f4d7791690e8971f1822e2e6578f5c2fb6,2024-11-21T01:54:47.287000 +CVE-2013-4051,0,0,d1a97f1c9a1f95c66257e8339601130b75b6e4d839eee9cab2de55645faf792f,2024-11-21T01:54:47.400000 +CVE-2013-4052,0,0,09e07371b4d26c562a108313bea5db2e3c87191feb3386e84d3a170b757e1db2,2024-11-21T01:54:47.503000 +CVE-2013-4053,0,0,8aab614d8ebd53afd1520727f55d7b81b8624bde38ce097018958fa88c4454e1,2024-11-21T01:54:47.640000 +CVE-2013-4054,0,0,fcb9f0c0e4afa1e019b045e52c99ff4f71d5140e8fa1c7ef9aa57e04095d3642,2024-11-21T01:54:47.777000 +CVE-2013-4055,0,0,fec096c6b0ef1cbb0c7d603961d9eca4cecc5e593afd170a06e1064f112ac888,2024-11-21T01:54:47.890000 +CVE-2013-4056,0,0,7dd51c60ee72b7ab53680ed327fb6c9ef41049e4e86dee5c79bab22877e8eb66,2024-11-21T01:54:48 +CVE-2013-4057,0,0,4408ea31d54f26bb5560bdf6a9087fa7d47dad3bd0cd806992f5819c617f1383,2024-11-21T01:54:48.117000 +CVE-2013-4058,0,0,39b04b53c297648a4ad3d1e9faba5669f7d7097f7801bd24a8d9e6ed2d89f001,2024-11-21T01:54:48.243000 +CVE-2013-4059,0,0,a53b69b3595903960e270f665cb979c2cf39d7b18f20216d6a55d93480183b56,2024-11-21T01:54:48.367000 +CVE-2013-4061,0,0,c45cfdb238302e5ab845f505cf33d9619208111cfcf590f115a3a4a238d950eb,2024-11-21T01:54:48.510000 +CVE-2013-4062,0,0,2c91bc2fff46d8a43b122992239922fef3080f3285e7e3a52b54be4047d779ff,2024-11-21T01:54:48.647000 +CVE-2013-4063,0,0,09bac3d1984831d402b038d176f585ff8ed13c6f352723c4660118d1fb333c1e,2024-11-21T01:54:48.763000 +CVE-2013-4064,0,0,0d3c2e38e2684cea77ae57357c0d0ef3cd021e8ef702267e28adfbc45efe644d,2024-11-21T01:54:48.880000 +CVE-2013-4065,0,0,e4a381211993292bb85e2bf59be0c36b5c4dab8a3099be35ad3eff5bd7e31d5c,2024-11-21T01:54:49 +CVE-2013-4066,0,0,9651bc79058f6bad74886c1bab54f91a50eda386ccbe88ada3aee5222f16e6b7,2024-11-21T01:54:49.120000 +CVE-2013-4067,0,0,8171b26abffafab9f499a8580b00947317b50a2bb4297afe04b474b0b2b4aec1,2024-11-21T01:54:49.250000 +CVE-2013-4068,0,0,006632307efef2b8212f53fb640821a5fd5f9462d15a86a59c673f5a38051800,2024-11-21T01:54:49.360000 +CVE-2013-4069,0,0,12803e17baffbe88dbaf7ce23d68313a75478f1a2b4491193b408fdde4f44043,2024-11-21T01:54:49.467000 +CVE-2013-4070,0,0,2ace7d3e17d69fbe681a679777d07a678507cd94425ff4d79464bb5de7dbc9f7,2024-11-21T01:54:49.583000 +CVE-2013-4073,0,0,0220a3698c267fa94bcdf2e2acba47fcca475bf06c24f7e0690779c9d404b4ca,2024-11-21T01:54:49.707000 +CVE-2013-4074,0,0,89aef8cd0fff5b67a5633523e2f105cebc298aa7d1422ab09003d6642584cbff,2024-11-21T01:54:49.860000 +CVE-2013-4075,0,0,39ba2a1d5278d586aa4674a3fce0cdbf9c00dadcf12c16f45f6c12dfbb0d3518,2024-11-21T01:54:50.030000 +CVE-2013-4076,0,0,4bf5b52788508885de743272e450bda603eb1f843c56bdda5e4eeaf506716b98,2024-11-21T01:54:50.190000 +CVE-2013-4077,0,0,70a934e04c17a83dceb46cd33806d46b822128bd0d2da628a273feebda3b523a,2024-11-21T01:54:50.353000 +CVE-2013-4078,0,0,c1a88c96dff34900773f1b7792bd7974ced3e0489a0255f925d168143348ef3f,2024-11-21T01:54:50.523000 +CVE-2013-4079,0,0,b121cbdc23c138f6bce859e1e481b10dd103d765a4c1af66f6e13b709a4e5e5e,2024-11-21T01:54:50.687000 +CVE-2013-4080,0,0,7e1178e3970a04bb988fa973b9b7a22a50ad0e9df99185de38a7bf6f4528cb9c,2024-11-21T01:54:50.833000 +CVE-2013-4081,0,0,2f019cf997a7ae6c27e381d7f19c03823cdecbd1351f02dcd827d710a3c9709f,2024-11-21T01:54:50.980000 +CVE-2013-4082,0,0,6ea8ef59470e2a4d897fcabb1cd0f4a19de722addf6dc01c542cf65e671250b0,2024-11-21T01:54:51.147000 +CVE-2013-4083,0,0,dba04a398a905817a31b8604e9f69f487d2a6ad6fb19c9a6bec1d9849c830795,2024-11-21T01:54:51.300000 CVE-2013-4088,0,0,b58ec872703f0b95ef0250541ee3ae70d200fdf4b109b3941620b784f951c989,2020-02-26T19:33:18.827000 CVE-2013-4090,0,0,5775534f49a8be8af017473ee145e639cbbb5ae1c22bba520a368f783dd18029,2022-08-02T16:29:08.200000 -CVE-2013-4091,0,1,3e5a4cda3cc9d926eb96041621b7521b467090fb8817c0adca21a7ee2e492dd1,2024-11-21T01:54:51.750000 -CVE-2013-4092,0,1,381b0eb4d6ac1996173926b5d02c1b9aaf7b0bd9c25dfc12c77597ac1b229bc6,2024-11-21T01:54:51.890000 -CVE-2013-4093,0,1,6fa891de78739cc43d7ff3bffd1e06596f3f3d68dc5303faaf2ecee7543d08b8,2024-11-21T01:54:52.027000 -CVE-2013-4094,0,1,370641c7925e0db625654186c4e420956a81b40ba87302cb59ba32ae219397cd,2024-11-21T01:54:52.157000 -CVE-2013-4095,0,1,b53feb017ac5002e3782d8daf4c130a13bc2002827d356c73a9c76738a263510,2024-11-21T01:54:52.293000 -CVE-2013-4096,0,1,83d366fd155d306237fdf3dc4292c4e245046a6775ca48ffdc1bc9f3004c0934,2024-11-21T01:54:52.427000 -CVE-2013-4097,0,1,91d11c1a2f57cb734d7e11ee497c0889282823db92e74d014d72796b24802720,2024-11-21T01:54:52.560000 -CVE-2013-4098,0,1,6233b601c70cfe57db8ba2f2819f686220f58d39201eb88eca6dc3bb0ad733a4,2024-11-21T01:54:52.687000 +CVE-2013-4091,0,0,3e5a4cda3cc9d926eb96041621b7521b467090fb8817c0adca21a7ee2e492dd1,2024-11-21T01:54:51.750000 +CVE-2013-4092,0,0,381b0eb4d6ac1996173926b5d02c1b9aaf7b0bd9c25dfc12c77597ac1b229bc6,2024-11-21T01:54:51.890000 +CVE-2013-4093,0,0,6fa891de78739cc43d7ff3bffd1e06596f3f3d68dc5303faaf2ecee7543d08b8,2024-11-21T01:54:52.027000 +CVE-2013-4094,0,0,370641c7925e0db625654186c4e420956a81b40ba87302cb59ba32ae219397cd,2024-11-21T01:54:52.157000 +CVE-2013-4095,0,0,b53feb017ac5002e3782d8daf4c130a13bc2002827d356c73a9c76738a263510,2024-11-21T01:54:52.293000 +CVE-2013-4096,0,0,83d366fd155d306237fdf3dc4292c4e245046a6775ca48ffdc1bc9f3004c0934,2024-11-21T01:54:52.427000 +CVE-2013-4097,0,0,91d11c1a2f57cb734d7e11ee497c0889282823db92e74d014d72796b24802720,2024-11-21T01:54:52.560000 +CVE-2013-4098,0,0,6233b601c70cfe57db8ba2f2819f686220f58d39201eb88eca6dc3bb0ad733a4,2024-11-21T01:54:52.687000 CVE-2013-4099,0,0,c34c77cf9faf4f5283c8fccf97807db46f90fec167f13e1872caba4190b508e7,2014-06-18T04:23:43.030000 CVE-2013-4100,0,0,0e97c8d79d36166fa941717d259e85b9da0533ce34e2aa6f5a6207b8bab52a79,2019-11-05T13:16:35.810000 CVE-2013-4101,0,0,932537dfba3f4e7671a7d152323b8d285d5d2350ed6a119ed419f4db958a3dd4,2019-11-08T16:48:33.653000 @@ -61489,421 +61489,421 @@ CVE-2013-4107,0,0,3aea711ac2011a47927bdcc9e6132dede79e89fb01c01fea092909722b9ffd CVE-2013-4108,0,0,6995b0886792571ada08619e4eef17ce4cfb2adafdf987fbcdd8bc20c89c7e44,2019-11-19T02:55:49.917000 CVE-2013-4109,0,0,81ec28bd06d71ce78c58885767cf129719b42e3ebc4e96aeaa24af3697b72ef0,2019-11-18T13:55:38.627000 CVE-2013-4110,0,0,f0216b64363d70d6122f2f941d88a47781841a750e2375c0e6e3d0beb0bf945c,2019-11-05T18:43:27.673000 -CVE-2013-4111,0,1,17f735350dfe8e2add56ae03f54858c6c86ee62e3c8b71804371b2bb581691f4,2024-11-21T01:54:54.260000 -CVE-2013-4112,0,1,1a34a8f2a731ae9d225e2869b8ba521ef3dda4abc894460fa0c339e261dde188,2024-11-21T01:54:54.373000 -CVE-2013-4113,0,1,6552aa75a264162cb195ee6c360a9331421bbdf13eb6ffb85cd3de197974858b,2024-11-21T01:54:54.493000 -CVE-2013-4114,0,1,a3a84667dd7e5c4604850d90b3daa8b5ae4b22e9b67d532dcd2b8129dcbe344d,2024-11-21T01:54:54.643000 -CVE-2013-4115,0,1,be5a375ad38e2c9c699bd071a1ab95a573dd7cc7057b6f963b877c70f9f96d8b,2024-11-21T01:54:54.763000 -CVE-2013-4116,0,1,cfdfce83b5658711c796fe8c2aaa2680e18d16343423a87ba4463c2c6ca40142,2024-11-21T01:54:54.903000 -CVE-2013-4117,0,1,477230d1ba90bdf216133073a4f6960af3c873764d4ac64a63cfc30eebb286c7,2024-11-21T01:54:55.037000 +CVE-2013-4111,0,0,17f735350dfe8e2add56ae03f54858c6c86ee62e3c8b71804371b2bb581691f4,2024-11-21T01:54:54.260000 +CVE-2013-4112,0,0,1a34a8f2a731ae9d225e2869b8ba521ef3dda4abc894460fa0c339e261dde188,2024-11-21T01:54:54.373000 +CVE-2013-4113,0,0,6552aa75a264162cb195ee6c360a9331421bbdf13eb6ffb85cd3de197974858b,2024-11-21T01:54:54.493000 +CVE-2013-4114,0,0,a3a84667dd7e5c4604850d90b3daa8b5ae4b22e9b67d532dcd2b8129dcbe344d,2024-11-21T01:54:54.643000 +CVE-2013-4115,0,0,be5a375ad38e2c9c699bd071a1ab95a573dd7cc7057b6f963b877c70f9f96d8b,2024-11-21T01:54:54.763000 +CVE-2013-4116,0,0,cfdfce83b5658711c796fe8c2aaa2680e18d16343423a87ba4463c2c6ca40142,2024-11-21T01:54:54.903000 +CVE-2013-4117,0,0,477230d1ba90bdf216133073a4f6960af3c873764d4ac64a63cfc30eebb286c7,2024-11-21T01:54:55.037000 CVE-2013-4118,0,0,e74bd8b1a8e649e84ba50e1ee7d26c81dd6606cd4dc0a4b86fb61a2ceeb93b4f,2020-03-06T17:18:46.660000 CVE-2013-4119,0,0,9f6049ab960e208fbb375cfb8345102e4e75aad188fbb1ca68b9a42199c2278e,2020-03-06T17:18:46.660000 CVE-2013-4120,0,0,7636f939086926a131e8eefef70cf61208dbcc40ee00edb0d6c0916a6ef20f1d,2019-12-10T19:09:29.680000 CVE-2013-4121,0,0,f38df64dc531c5fe5e3c53f1918ab83c37bc800598ac1dcaf3b7c0e230cf5c16,2023-11-07T02:16:07.160000 -CVE-2013-4122,0,1,b1044f79e6783908d6239288d96aef027716ebd8e2245f2b96bc4b94cccedf9e,2024-11-21T01:54:55.523000 -CVE-2013-4123,0,1,5ea026137a4c0ea94bf8d50c5bd0d328bac88d03109bf7ab685967d596c49713,2024-11-21T01:54:55.660000 -CVE-2013-4124,0,1,0374f9c92906a73dbb921dc8f8a58432195a08488060dfcdf2f51920e53da9ee,2024-11-21T01:54:55.787000 -CVE-2013-4125,0,1,cee5235cdc6fd98b30b270ec881d9f258a9d2db621f2e4b23b787ce51daacf03,2024-11-21T01:54:55.957000 +CVE-2013-4122,0,0,b1044f79e6783908d6239288d96aef027716ebd8e2245f2b96bc4b94cccedf9e,2024-11-21T01:54:55.523000 +CVE-2013-4123,0,0,5ea026137a4c0ea94bf8d50c5bd0d328bac88d03109bf7ab685967d596c49713,2024-11-21T01:54:55.660000 +CVE-2013-4124,0,0,0374f9c92906a73dbb921dc8f8a58432195a08488060dfcdf2f51920e53da9ee,2024-11-21T01:54:55.787000 +CVE-2013-4125,0,0,cee5235cdc6fd98b30b270ec881d9f258a9d2db621f2e4b23b787ce51daacf03,2024-11-21T01:54:55.957000 CVE-2013-4126,0,0,381055a5e232880558fb7049c99fbed4beaf01b2597b5d263fbe63a1578b8d0b,2023-11-07T02:16:07.450000 -CVE-2013-4127,0,1,9e554a3e687a4d23c64b3f031ad744c05ae2f1ce1a08b9960d2e5eb4663bef2b,2024-11-21T01:54:56.133000 -CVE-2013-4128,0,1,a0b538f793605c7b0509bf9595b93de0f14b9bd0db22ffebc821d419d56877e4,2024-11-21T01:54:56.273000 -CVE-2013-4129,0,1,6e365dc337ea2ec5eedd805362f3424025500997e41eabbbc072b1392ef31345,2024-11-21T01:54:56.390000 -CVE-2013-4130,0,1,8b995bef198d6e162c200cfcd3f8f917981b841cdee107a3fe1f7557c1cf9aa5,2024-11-21T01:54:56.530000 -CVE-2013-4131,0,1,edc8e94b816199fca6021601e87d52c8c305ef83e0d3bb5d3bcaa6225d439939,2024-11-21T01:54:56.647000 -CVE-2013-4132,0,1,60c0f6543949a731661a35deeeed8f82a3119c94793c8c6afb6e1274033d9f67,2024-11-21T01:54:56.763000 +CVE-2013-4127,0,0,9e554a3e687a4d23c64b3f031ad744c05ae2f1ce1a08b9960d2e5eb4663bef2b,2024-11-21T01:54:56.133000 +CVE-2013-4128,0,0,a0b538f793605c7b0509bf9595b93de0f14b9bd0db22ffebc821d419d56877e4,2024-11-21T01:54:56.273000 +CVE-2013-4129,0,0,6e365dc337ea2ec5eedd805362f3424025500997e41eabbbc072b1392ef31345,2024-11-21T01:54:56.390000 +CVE-2013-4130,0,0,8b995bef198d6e162c200cfcd3f8f917981b841cdee107a3fe1f7557c1cf9aa5,2024-11-21T01:54:56.530000 +CVE-2013-4131,0,0,edc8e94b816199fca6021601e87d52c8c305ef83e0d3bb5d3bcaa6225d439939,2024-11-21T01:54:56.647000 +CVE-2013-4132,0,0,60c0f6543949a731661a35deeeed8f82a3119c94793c8c6afb6e1274033d9f67,2024-11-21T01:54:56.763000 CVE-2013-4133,0,0,47f8a1c75d595c7255b44f05022df2785ba0bbc28ba169feceac728ac1e4f4f4,2019-12-17T14:14:23.760000 -CVE-2013-4134,0,1,2c60e531362321f0a55e259ec9373aeaf4a1ec029a5003a7818828692a1435e0,2024-11-21T01:54:56.973000 -CVE-2013-4135,0,1,fa7c532994e5d1b0b2c221e9a416601985fcdd2e6fcc492940cef4ac846795f3,2024-11-21T01:54:57.090000 -CVE-2013-4136,0,1,b57c06fbb8c3bd5afefa35d6e49277b488e4c51a9bf6a06b4743a53e741cc0b7,2024-11-21T01:54:57.200000 -CVE-2013-4137,0,1,09582d4f403060e44ac2932294bc377d404f9f54057a63c05c466e996c83a736,2024-11-21T01:54:57.317000 -CVE-2013-4138,0,1,7787d2ab0d9328d6b8eeb0d00d289f40d7c48737079165e0b872b133bf25d570,2024-11-21T01:54:57.423000 -CVE-2013-4139,0,1,2c996195c9379e0efa07002a971dba7389bdd9fc09d6f75b288d28e4f2b9718e,2024-11-21T01:54:57.537000 -CVE-2013-4140,0,1,7874d832c2c638a6fa5f907caeb0fde2f1023ca3c5cbc3bb72a7dd289a590c1d,2024-11-21T01:54:57.650000 +CVE-2013-4134,0,0,2c60e531362321f0a55e259ec9373aeaf4a1ec029a5003a7818828692a1435e0,2024-11-21T01:54:56.973000 +CVE-2013-4135,0,0,fa7c532994e5d1b0b2c221e9a416601985fcdd2e6fcc492940cef4ac846795f3,2024-11-21T01:54:57.090000 +CVE-2013-4136,0,0,b57c06fbb8c3bd5afefa35d6e49277b488e4c51a9bf6a06b4743a53e741cc0b7,2024-11-21T01:54:57.200000 +CVE-2013-4137,0,0,09582d4f403060e44ac2932294bc377d404f9f54057a63c05c466e996c83a736,2024-11-21T01:54:57.317000 +CVE-2013-4138,0,0,7787d2ab0d9328d6b8eeb0d00d289f40d7c48737079165e0b872b133bf25d570,2024-11-21T01:54:57.423000 +CVE-2013-4139,0,0,2c996195c9379e0efa07002a971dba7389bdd9fc09d6f75b288d28e4f2b9718e,2024-11-21T01:54:57.537000 +CVE-2013-4140,0,0,7874d832c2c638a6fa5f907caeb0fde2f1023ca3c5cbc3bb72a7dd289a590c1d,2024-11-21T01:54:57.650000 CVE-2013-4141,0,0,47ee907dd962c8715caf32cb2a735a4b2f1d86d162a4a34f5dd090b7de593e91,2023-11-07T02:16:07.797000 CVE-2013-4142,0,0,4de8ecf97649a750ff3308750b741213f6ae3884ee28cf07000c73a2fe1f9f20,2023-11-07T02:16:08.027000 CVE-2013-4143,0,0,eb82b201f4e72813775230332a53b9b2317dcdd7c0c252e2e65f5658a5ab1e6f,2014-06-26T15:46:37.290000 CVE-2013-4144,0,0,cb70d039ca702db3343d614a30bed1904dba806504400989944154a3adf0bef6,2022-07-09T03:14:46.747000 CVE-2013-4145,0,0,5f0737d8d02e0a7d8a79dadcfc3d97d512569da37a49a9485a6ca984c2b7e795,2023-11-07T02:16:08.283000 CVE-2013-4146,0,0,0234590dcb1fce2151fd91f997e987929e198628c775f4310bed73b83f000d69,2023-11-07T02:16:08.527000 -CVE-2013-4147,0,1,ad36ee014fa223aa61ade1c0d55b13981264fd5821af306f800ef4b611039458,2024-11-21T01:54:58.067000 +CVE-2013-4147,0,0,ad36ee014fa223aa61ade1c0d55b13981264fd5821af306f800ef4b611039458,2024-11-21T01:54:58.067000 CVE-2013-4148,0,0,324e6fbcd1baed97d0197960d68d0ab576be86b7a2cfafa01506365f0add5628,2023-02-13T04:44:53.697000 CVE-2013-4149,0,0,6ab8686c6f65c884676070a4c043623465450e7b08ae77452dbca1a5b46804a4,2023-02-13T04:44:54.363000 CVE-2013-4150,0,0,2dbd4deb6b2b9fd39e149031ff74c49a075ea8eec3050f48b75c0b3ac3be8bab,2023-02-13T04:44:54.870000 CVE-2013-4151,0,0,8fe283edc9fb9ffae40fc62cec63e23ec6dae19dd811849c0c485a77f5dfdf84,2023-02-13T04:44:55.493000 -CVE-2013-4152,0,1,95d584dab28b4dca170340cd13611fb8306ef71f0920c907bbb58285e1930aa0,2024-11-21T01:54:58.633000 -CVE-2013-4153,0,1,ec1d636cef56da887fe476295d96993d1656ecf51b7d7eb95af6ed073ce4df55,2024-11-21T01:54:58.763000 -CVE-2013-4154,0,1,d7dc9fb5fb2647e3da135e3bac3a15e3a6d60e26f856d3527891a02959862bfb,2024-11-21T01:54:58.893000 -CVE-2013-4155,0,1,2b0ab710891c50d0a0ad4c81f3ce9b69c14bf87d2557c7169e891c86852bff9c,2024-11-21T01:54:59.023000 -CVE-2013-4156,0,1,3cfeca22c9fc58618c0d48ac1aa140dc32b21a3eec178b04f9ea0df6437ee5a8,2024-11-21T01:54:59.143000 -CVE-2013-4157,0,1,68fe78abbd2b3d5e44e9c25ecd315a3e92f4e17e242dd7ed6916da2ac68b5197,2024-11-21T01:54:59.257000 +CVE-2013-4152,0,0,95d584dab28b4dca170340cd13611fb8306ef71f0920c907bbb58285e1930aa0,2024-11-21T01:54:58.633000 +CVE-2013-4153,0,0,ec1d636cef56da887fe476295d96993d1656ecf51b7d7eb95af6ed073ce4df55,2024-11-21T01:54:58.763000 +CVE-2013-4154,0,0,d7dc9fb5fb2647e3da135e3bac3a15e3a6d60e26f856d3527891a02959862bfb,2024-11-21T01:54:58.893000 +CVE-2013-4155,0,0,2b0ab710891c50d0a0ad4c81f3ce9b69c14bf87d2557c7169e891c86852bff9c,2024-11-21T01:54:59.023000 +CVE-2013-4156,0,0,3cfeca22c9fc58618c0d48ac1aa140dc32b21a3eec178b04f9ea0df6437ee5a8,2024-11-21T01:54:59.143000 +CVE-2013-4157,0,0,68fe78abbd2b3d5e44e9c25ecd315a3e92f4e17e242dd7ed6916da2ac68b5197,2024-11-21T01:54:59.257000 CVE-2013-4158,0,0,40cf35c078800b3fe0e9c7f3ceb9a2616bbc2b2067302f0c02ec75f3309cf08d,2019-12-17T17:01:03.763000 CVE-2013-4159,0,0,ebcedc35f960534e4cc7a2beab50e37dcd7e369bc2a12c7b50496a87eefd1c74,2023-02-13T04:44:57.630000 -CVE-2013-4160,0,1,30137c4eb0a48e78cc5d21ea5eecb47521cc8140ef0da534fa6687f3e082145f,2024-11-21T01:54:59.600000 +CVE-2013-4160,0,0,30137c4eb0a48e78cc5d21ea5eecb47521cc8140ef0da534fa6687f3e082145f,2024-11-21T01:54:59.600000 CVE-2013-4161,0,0,c891ac1f5a22b56ebc250d23a493edb48d2a7ddf2eef92a3df8bccd35e08ad09,2021-06-02T13:35:29.883000 -CVE-2013-4162,0,1,4b76ef7a340231d495b8ec436d10abef670e2faa92dc4874ac0d6feb4e1473a6,2024-11-21T01:54:59.830000 -CVE-2013-4163,0,1,58558bc338527760c7f735598cdf41cd8b25281fe5a57a23be0cfebecd9f360c,2024-11-21T01:54:59.987000 -CVE-2013-4164,0,1,055b804db4454c88fae3c545d704d5187af4f888cacdd40b4fd57459b30c1834,2024-11-21T01:55:00.143000 -CVE-2013-4165,0,1,d242f4d98c7615778d28fe44399442a9d77a6cdcbdef67710e32d43a63a36c49,2024-11-21T01:55:00.290000 +CVE-2013-4162,0,0,4b76ef7a340231d495b8ec436d10abef670e2faa92dc4874ac0d6feb4e1473a6,2024-11-21T01:54:59.830000 +CVE-2013-4163,0,0,58558bc338527760c7f735598cdf41cd8b25281fe5a57a23be0cfebecd9f360c,2024-11-21T01:54:59.987000 +CVE-2013-4164,0,0,055b804db4454c88fae3c545d704d5187af4f888cacdd40b4fd57459b30c1834,2024-11-21T01:55:00.143000 +CVE-2013-4165,0,0,d242f4d98c7615778d28fe44399442a9d77a6cdcbdef67710e32d43a63a36c49,2024-11-21T01:55:00.290000 CVE-2013-4166,0,0,11933005d821d61f585ab6afd3c4e0814a71deb8fb7dab71cd183f4c3934d663,2023-02-13T00:28:34.797000 -CVE-2013-4167,0,1,72c40dc78054f0654fe5dccc8a72cb682d48246e2822f5cf9afc8a8f05af6f01,2024-11-21T01:55:00.567000 +CVE-2013-4167,0,0,72c40dc78054f0654fe5dccc8a72cb682d48246e2822f5cf9afc8a8f05af6f01,2024-11-21T01:55:00.567000 CVE-2013-4168,0,0,1a8919d89092695cc8c124dfe9f65a796a7a609937483e3126c0b79bd175591a,2020-08-18T15:05:49.313000 -CVE-2013-4169,0,1,5cd905ad53d90cc5171c206409185b051d109d820b44bfe66db7e1da4eeecc51,2024-11-21T01:55:00.873000 +CVE-2013-4169,0,0,5cd905ad53d90cc5171c206409185b051d109d820b44bfe66db7e1da4eeecc51,2024-11-21T01:55:00.873000 CVE-2013-4170,0,0,ca02094dc0bda2b33671b9d955d83fa83350d23841830f5d0dce7026ff31109e,2022-07-09T02:07:46.790000 -CVE-2013-4171,0,1,8bb96d808c8e4367a44f6a4e196c09a6254ce6feb5b9770d92e950307d2aa748,2024-11-21T01:55:02.093000 -CVE-2013-4172,0,1,9de3e8b3fa79d519a86d6db33295669fb28fef23b262a5b0dd43d03622c1f162,2024-11-21T01:55:02.253000 -CVE-2013-4173,0,1,08bf67953d8321982727b494eba1bb50b1edd3606201a58d3edc221f38e769a0,2024-11-21T01:55:02.420000 -CVE-2013-4174,0,1,f6b53f498f79dc1cf315ac139b794bbe39f7afc9676d0c152244074fdbf55c97,2024-11-21T01:55:03.510000 +CVE-2013-4171,0,0,8bb96d808c8e4367a44f6a4e196c09a6254ce6feb5b9770d92e950307d2aa748,2024-11-21T01:55:02.093000 +CVE-2013-4172,0,0,9de3e8b3fa79d519a86d6db33295669fb28fef23b262a5b0dd43d03622c1f162,2024-11-21T01:55:02.253000 +CVE-2013-4173,0,0,08bf67953d8321982727b494eba1bb50b1edd3606201a58d3edc221f38e769a0,2024-11-21T01:55:02.420000 +CVE-2013-4174,0,0,f6b53f498f79dc1cf315ac139b794bbe39f7afc9676d0c152244074fdbf55c97,2024-11-21T01:55:03.510000 CVE-2013-4175,0,0,4fc5227b30a18c50b7f5b99f8c8e215d5d1d046574051bff6d0b705306126808,2020-01-27T19:50:31.343000 CVE-2013-4176,0,0,ed9b749ac9f428f5955421044f41e29c2879d2555344393ba2ab4639a0773349,2020-01-27T19:36:17.047000 CVE-2013-4177,0,0,054b82a02c4a572b2563486e77e09241e7d3b9ff0dd73589e3c2884562f1c979,2014-05-30T13:34:31.060000 CVE-2013-4178,0,0,d1539040205dbc74897f4407ed6b89793172282e65af80784fd11389e50adc91,2014-05-30T13:35:52.420000 -CVE-2013-4179,0,1,ffe0727b4a7a3d236b0b34c4b97840b1b47a7587518a84d5f5e6cfc8848ed268,2024-11-21T01:55:04.337000 -CVE-2013-4180,0,1,67984ad80c62270c827651c040ef9f937e07711a11d629b44f6ea6d4f6b3418b,2024-11-21T01:55:04.493000 -CVE-2013-4181,0,1,095c50eea727e382cbb4cb555e74744fd4ca043775471362b3e7252d6aa639c9,2024-11-21T01:55:04.630000 -CVE-2013-4182,0,1,fbfa6728cc0d0755d864bb33012e25c0d08a913bf766c37122d2e531b821fde7,2024-11-21T01:55:04.767000 -CVE-2013-4183,0,1,24f3f682c98567181aa266cad234fef8927d74106ca3f45e8a45d3644a949f2a,2024-11-21T01:55:04.900000 +CVE-2013-4179,0,0,ffe0727b4a7a3d236b0b34c4b97840b1b47a7587518a84d5f5e6cfc8848ed268,2024-11-21T01:55:04.337000 +CVE-2013-4180,0,0,67984ad80c62270c827651c040ef9f937e07711a11d629b44f6ea6d4f6b3418b,2024-11-21T01:55:04.493000 +CVE-2013-4181,0,0,095c50eea727e382cbb4cb555e74744fd4ca043775471362b3e7252d6aa639c9,2024-11-21T01:55:04.630000 +CVE-2013-4182,0,0,fbfa6728cc0d0755d864bb33012e25c0d08a913bf766c37122d2e531b821fde7,2024-11-21T01:55:04.767000 +CVE-2013-4183,0,0,24f3f682c98567181aa266cad234fef8927d74106ca3f45e8a45d3644a949f2a,2024-11-21T01:55:04.900000 CVE-2013-4184,0,0,6f37227b902f6d3280b017ef5ef92b26af1c4e89ff1099812c9fbb5804868c6c,2024-03-28T03:15:07.507000 -CVE-2013-4185,0,1,afd162cc468535f444068c9cc223793f99d8dc0dc1af8441c25da64690c1ad40,2024-11-21T01:55:05.160000 +CVE-2013-4185,0,0,afd162cc468535f444068c9cc223793f99d8dc0dc1af8441c25da64690c1ad40,2024-11-21T01:55:05.160000 CVE-2013-4186,0,0,ff90fe75c777559fa118e00b4d4e2bb64c6d363ccbf8fd3530da20ee776d64bb,2023-11-07T02:16:09.143000 CVE-2013-4187,0,0,ca4c1ae15d67b3a2f2c2e35e884187df3c155b1db7d22703c8a274dba0a97dc5,2020-02-06T15:12:57.383000 -CVE-2013-4188,0,1,e3e917d9c7b7a879566eae43f526f09af1bba1c632d08204b67f7bcef6ead6d2,2024-11-21T01:55:05.413000 -CVE-2013-4189,0,1,c0fd016b6e2a87a0a7309e74f4c6b6e65b38c3f8f8a52b5bbb1f7544e7af0496,2024-11-21T01:55:05.540000 -CVE-2013-4190,0,1,e9fdde0c6beb3988cd1b68a95f5cc8a9b5028f136816b3b72ca66c7f9d2b5511,2024-11-21T01:55:05.670000 -CVE-2013-4191,0,1,62b355529e118842898905754d5f945365c37b8c25b0affbe950dc05d45d8712,2024-11-21T01:55:05.803000 -CVE-2013-4192,0,1,5dc94eebf5834f29a9a42489c79b6c49bb1c320eaae3766f874374be8dfa7cdb,2024-11-21T01:55:05.940000 -CVE-2013-4193,0,1,595addd5474dcfe4f93ef1bfbd494b880e675776347b9d19c8148eca506ddc56,2024-11-21T01:55:06.060000 -CVE-2013-4194,0,1,19ae3485c082b79c0652ee16821d093b8482ddee1527026001f6a6124af41ba0,2024-11-21T01:55:06.187000 -CVE-2013-4195,0,1,042b3c25f518a6555faf54426a243c8fd7869b3a5caaf087fc262a0c3e4401c3,2024-11-21T01:55:06.323000 -CVE-2013-4196,0,1,b8451ddb8a357cbbd922aa686deea977137b5ec1361e806141f2aa7af000fea1,2024-11-21T01:55:06.453000 -CVE-2013-4197,0,1,7feec8c6cd59eff72442f68f9f54cf5de3f2a9adaba88f1f2a6a0f926267c865,2024-11-21T01:55:06.580000 -CVE-2013-4198,0,1,9a5399fabf85827a2693992fe0f58341366300d82c0b0fd780f9769e6f307ccb,2024-11-21T01:55:06.727000 -CVE-2013-4199,0,1,1b88281f656307e0bbebb498f4fe4fa970b1d7ff145f85153facbc59db7ec989,2024-11-21T01:55:06.870000 -CVE-2013-4200,0,1,2724a19e136b597370ef574f62855c6ff1b5b6dee67787ed5f3a2d1ac6199000,2024-11-21T01:55:07 +CVE-2013-4188,0,0,e3e917d9c7b7a879566eae43f526f09af1bba1c632d08204b67f7bcef6ead6d2,2024-11-21T01:55:05.413000 +CVE-2013-4189,0,0,c0fd016b6e2a87a0a7309e74f4c6b6e65b38c3f8f8a52b5bbb1f7544e7af0496,2024-11-21T01:55:05.540000 +CVE-2013-4190,0,0,e9fdde0c6beb3988cd1b68a95f5cc8a9b5028f136816b3b72ca66c7f9d2b5511,2024-11-21T01:55:05.670000 +CVE-2013-4191,0,0,62b355529e118842898905754d5f945365c37b8c25b0affbe950dc05d45d8712,2024-11-21T01:55:05.803000 +CVE-2013-4192,0,0,5dc94eebf5834f29a9a42489c79b6c49bb1c320eaae3766f874374be8dfa7cdb,2024-11-21T01:55:05.940000 +CVE-2013-4193,0,0,595addd5474dcfe4f93ef1bfbd494b880e675776347b9d19c8148eca506ddc56,2024-11-21T01:55:06.060000 +CVE-2013-4194,0,0,19ae3485c082b79c0652ee16821d093b8482ddee1527026001f6a6124af41ba0,2024-11-21T01:55:06.187000 +CVE-2013-4195,0,0,042b3c25f518a6555faf54426a243c8fd7869b3a5caaf087fc262a0c3e4401c3,2024-11-21T01:55:06.323000 +CVE-2013-4196,0,0,b8451ddb8a357cbbd922aa686deea977137b5ec1361e806141f2aa7af000fea1,2024-11-21T01:55:06.453000 +CVE-2013-4197,0,0,7feec8c6cd59eff72442f68f9f54cf5de3f2a9adaba88f1f2a6a0f926267c865,2024-11-21T01:55:06.580000 +CVE-2013-4198,0,0,9a5399fabf85827a2693992fe0f58341366300d82c0b0fd780f9769e6f307ccb,2024-11-21T01:55:06.727000 +CVE-2013-4199,0,0,1b88281f656307e0bbebb498f4fe4fa970b1d7ff145f85153facbc59db7ec989,2024-11-21T01:55:06.870000 +CVE-2013-4200,0,0,2724a19e136b597370ef574f62855c6ff1b5b6dee67787ed5f3a2d1ac6199000,2024-11-21T01:55:07 CVE-2013-4201,0,0,e199cd197b12a8c2c4ba9ecf38d1883776abe5e908783f9ef37960522e56e11f,2023-02-13T04:45:03.923000 -CVE-2013-4202,0,1,969da23b35898da203b7dc29c4544d5665a41edbbc233de623f9ca61a26c92b7,2024-11-21T01:55:07.243000 -CVE-2013-4203,0,1,a681236eb6f50ea067795f352e74c5e8a88ef2e5707f10e6b474ef33a8129209,2024-11-21T01:55:07.363000 -CVE-2013-4204,0,1,00d1f4d3bd21a982b4538c2002ef53d2d3634db62583b42d26ccc628f7ac4ed5,2024-11-21T01:55:07.480000 -CVE-2013-4205,0,1,3f24186fc5feb09db7bdd7182be936d0d8522fb1df8552294adbcea1c47aa788,2024-11-21T01:55:07.600000 -CVE-2013-4206,0,1,7739627fc3868d59ab4781da24546370b693f266823aeaa6b2fb14e9cf65666b,2024-11-21T01:55:07.733000 -CVE-2013-4207,0,1,6b502c6a8e81182fdca7a024dbf7c4c6c22ab7b1e9b708d0e5402568c29e6f36,2024-11-21T01:55:07.857000 -CVE-2013-4208,0,1,86ae4aece7df23ad87e7890798e40789939d580e68d5bb5a92cab8eae82c08f1,2024-11-21T01:55:07.970000 +CVE-2013-4202,0,0,969da23b35898da203b7dc29c4544d5665a41edbbc233de623f9ca61a26c92b7,2024-11-21T01:55:07.243000 +CVE-2013-4203,0,0,a681236eb6f50ea067795f352e74c5e8a88ef2e5707f10e6b474ef33a8129209,2024-11-21T01:55:07.363000 +CVE-2013-4204,0,0,00d1f4d3bd21a982b4538c2002ef53d2d3634db62583b42d26ccc628f7ac4ed5,2024-11-21T01:55:07.480000 +CVE-2013-4205,0,0,3f24186fc5feb09db7bdd7182be936d0d8522fb1df8552294adbcea1c47aa788,2024-11-21T01:55:07.600000 +CVE-2013-4206,0,0,7739627fc3868d59ab4781da24546370b693f266823aeaa6b2fb14e9cf65666b,2024-11-21T01:55:07.733000 +CVE-2013-4207,0,0,6b502c6a8e81182fdca7a024dbf7c4c6c22ab7b1e9b708d0e5402568c29e6f36,2024-11-21T01:55:07.857000 +CVE-2013-4208,0,0,86ae4aece7df23ad87e7890798e40789939d580e68d5bb5a92cab8eae82c08f1,2024-11-21T01:55:07.970000 CVE-2013-4209,0,0,b4e977684989df40d5561a32820e6979b78621943019c07461b0065ada31a1bc,2018-06-13T16:16:20.807000 -CVE-2013-4210,0,1,78a3be4b14479a0089fad2173638b9517e43edaefa6e474040bf4a1da42a3181,2024-11-21T01:55:08.200000 +CVE-2013-4210,0,0,78a3be4b14479a0089fad2173638b9517e43edaefa6e474040bf4a1da42a3181,2024-11-21T01:55:08.200000 CVE-2013-4211,0,0,af7c9aeff0a8ffbafe535f4899fb50d4c58ada68290d3a241cf0241d9ceeb32b,2020-02-19T12:48:04.480000 -CVE-2013-4212,0,1,cb73a9e35f5e78e84508edb718970254ad771f3214819acc8ececce291a451e6,2024-11-21T01:55:08.440000 -CVE-2013-4213,0,1,4b9ec3d43ad0c63182ec5928b3649e287c860efa4aa7712dae14f9d4e634bb19,2024-11-21T01:55:08.567000 -CVE-2013-4214,0,1,296a7d0f40f385d50d1df9caf43f8d2d64d00b953b851149599ca73ce49bee92,2024-11-21T01:55:08.683000 -CVE-2013-4215,0,1,e60633b2ee851984f3d691cf57e529a4bea25176acad2bbd2cf4dcf61eee4e30,2024-11-21T01:55:08.797000 -CVE-2013-4216,0,1,ab3b8e46ba0e6ad6f83c47da0128996ee1df56ff9567dfce651fab1c8f8e6cbe,2024-11-21T01:55:08.920000 -CVE-2013-4217,0,1,9b6f2d97e098eb8c0b32f67eccf7fdf65f2174367fa1c396cd4395be89c658a7,2024-11-21T01:55:09.033000 -CVE-2013-4218,0,1,5f1feb0a545b23ff291a0bc182d059f5157d4f41afd3e667dab0c84ec2402653,2024-11-21T01:55:09.157000 -CVE-2013-4219,0,1,c3e6c8cb238363aa8c82abb4cb934c82c834568befc463aaffdba6e8b7456a63,2024-11-21T01:55:09.277000 -CVE-2013-4220,0,1,85d70e92fcbc6b1db7e74a65fb62d976f01b54b34653b17cdd425aa8d2169b63,2024-11-21T01:55:09.420000 -CVE-2013-4221,0,1,54d507fd4fa7d50799490aadc0965d1e6c37c257453f1886da41fc22fb0807c3,2024-11-21T01:55:09.550000 -CVE-2013-4222,0,1,a5fcf86cc3c87da7860b2bfc5db57d66f105aa508e733d5c65180be2c1f1795a,2024-11-21T01:55:09.673000 -CVE-2013-4223,0,1,1e52482a622a9e5473584ac9d81d5e4640f377991f7e208b6fc7bde26b4fb84e,2024-11-21T01:55:09.800000 +CVE-2013-4212,0,0,cb73a9e35f5e78e84508edb718970254ad771f3214819acc8ececce291a451e6,2024-11-21T01:55:08.440000 +CVE-2013-4213,0,0,4b9ec3d43ad0c63182ec5928b3649e287c860efa4aa7712dae14f9d4e634bb19,2024-11-21T01:55:08.567000 +CVE-2013-4214,0,0,296a7d0f40f385d50d1df9caf43f8d2d64d00b953b851149599ca73ce49bee92,2024-11-21T01:55:08.683000 +CVE-2013-4215,0,0,e60633b2ee851984f3d691cf57e529a4bea25176acad2bbd2cf4dcf61eee4e30,2024-11-21T01:55:08.797000 +CVE-2013-4216,0,0,ab3b8e46ba0e6ad6f83c47da0128996ee1df56ff9567dfce651fab1c8f8e6cbe,2024-11-21T01:55:08.920000 +CVE-2013-4217,0,0,9b6f2d97e098eb8c0b32f67eccf7fdf65f2174367fa1c396cd4395be89c658a7,2024-11-21T01:55:09.033000 +CVE-2013-4218,0,0,5f1feb0a545b23ff291a0bc182d059f5157d4f41afd3e667dab0c84ec2402653,2024-11-21T01:55:09.157000 +CVE-2013-4219,0,0,c3e6c8cb238363aa8c82abb4cb934c82c834568befc463aaffdba6e8b7456a63,2024-11-21T01:55:09.277000 +CVE-2013-4220,0,0,85d70e92fcbc6b1db7e74a65fb62d976f01b54b34653b17cdd425aa8d2169b63,2024-11-21T01:55:09.420000 +CVE-2013-4221,0,0,54d507fd4fa7d50799490aadc0965d1e6c37c257453f1886da41fc22fb0807c3,2024-11-21T01:55:09.550000 +CVE-2013-4222,0,0,a5fcf86cc3c87da7860b2bfc5db57d66f105aa508e733d5c65180be2c1f1795a,2024-11-21T01:55:09.673000 +CVE-2013-4223,0,0,1e52482a622a9e5473584ac9d81d5e4640f377991f7e208b6fc7bde26b4fb84e,2024-11-21T01:55:09.800000 CVE-2013-4224,0,0,092e142c5938d9a888eb45663de8752ad1a954adb99b4991969436366115f771,2023-11-07T02:16:09.793000 CVE-2013-4225,0,0,75d551b00ce135dcdb6e6dca9c9543211ff6ba22de279f60c47f12e5df9a98f1,2023-02-13T00:28:40.947000 CVE-2013-4226,0,0,507799093f8d93e2784a9f88f9a489f0323562312c9b0fc7e1b17e760315ce67,2020-02-26T16:37:18.267000 CVE-2013-4227,0,0,4edd35a5d139230e0115fe83013ba93f37c284186cef2c44ccd156c347f91ff0,2020-02-27T19:41:38.537000 CVE-2013-4228,0,0,86cc1bedba584bcafc1ab8394d735f00123f2003ff4fd98d0aae8384b0ee902e,2020-02-26T19:43:23.633000 -CVE-2013-4229,0,1,ca2313b9ab74808e607359017971bb95001e12da6247458c6a704fc007bb4997,2024-11-21T01:55:10.407000 -CVE-2013-4230,0,1,671518faefb93f1fdeafa7c6ccbb62961b5ef37e2f95b1eea7ad4a2324f3f197,2024-11-21T01:55:10.527000 -CVE-2013-4231,0,1,8b22c186fd44b3e287f3cffd3eb03d245859ff7e227fa642bf4155975816c329,2024-11-21T01:55:10.653000 -CVE-2013-4232,0,1,9d9e554de1b073bfdbf248f59f040dd9a49c668c5ac6fa029f482c3457adc670,2024-11-21T01:55:10.770000 -CVE-2013-4233,0,1,b0ff5b99df98cb5c8d400291b376f45958d8575f6c033b6b2b677987b437e13e,2024-11-21T01:55:10.903000 -CVE-2013-4234,0,1,96d50735407dba8729a705fa15eef747ba26f30c692c2fa584b421f19dcd53a4,2024-11-21T01:55:11.020000 +CVE-2013-4229,0,0,ca2313b9ab74808e607359017971bb95001e12da6247458c6a704fc007bb4997,2024-11-21T01:55:10.407000 +CVE-2013-4230,0,0,671518faefb93f1fdeafa7c6ccbb62961b5ef37e2f95b1eea7ad4a2324f3f197,2024-11-21T01:55:10.527000 +CVE-2013-4231,0,0,8b22c186fd44b3e287f3cffd3eb03d245859ff7e227fa642bf4155975816c329,2024-11-21T01:55:10.653000 +CVE-2013-4232,0,0,9d9e554de1b073bfdbf248f59f040dd9a49c668c5ac6fa029f482c3457adc670,2024-11-21T01:55:10.770000 +CVE-2013-4233,0,0,b0ff5b99df98cb5c8d400291b376f45958d8575f6c033b6b2b677987b437e13e,2024-11-21T01:55:10.903000 +CVE-2013-4234,0,0,96d50735407dba8729a705fa15eef747ba26f30c692c2fa584b421f19dcd53a4,2024-11-21T01:55:11.020000 CVE-2013-4235,0,0,9f9fb79a1ed8ba75ff986c799d9fee74930e82e728e5979a795e7baff9104ef7,2023-02-13T00:28:41.337000 -CVE-2013-4236,0,1,e2d6206fc3cd0c063014963b166fc8bb8856c6a1a7f9215c87645f04fdc04af8,2024-11-21T01:55:11.260000 -CVE-2013-4237,0,1,fc088009fdabfd7bbec44d7e50602c897c86b8b1dbfee3764ac25ec9caa45bac,2024-11-21T01:55:11.370000 -CVE-2013-4238,0,1,a0e59151e7d00b20252cf4599abb08238a12e5483af1e9876f73a591eebb5c93,2024-11-21T01:55:11.493000 -CVE-2013-4239,0,1,f28336cf75833482d0e70fa530a36a422108b31b04b509ceb82d4252577ff310,2024-11-21T01:55:11.630000 -CVE-2013-4240,0,1,4288eea584bf692e5e65d536c4066ae519499c6fae807666b48957fe4bec4af5,2024-11-21T01:55:11.747000 +CVE-2013-4236,0,0,e2d6206fc3cd0c063014963b166fc8bb8856c6a1a7f9215c87645f04fdc04af8,2024-11-21T01:55:11.260000 +CVE-2013-4237,0,0,fc088009fdabfd7bbec44d7e50602c897c86b8b1dbfee3764ac25ec9caa45bac,2024-11-21T01:55:11.370000 +CVE-2013-4238,0,0,a0e59151e7d00b20252cf4599abb08238a12e5483af1e9876f73a591eebb5c93,2024-11-21T01:55:11.493000 +CVE-2013-4239,0,0,f28336cf75833482d0e70fa530a36a422108b31b04b509ceb82d4252577ff310,2024-11-21T01:55:11.630000 +CVE-2013-4240,0,0,4288eea584bf692e5e65d536c4066ae519499c6fae807666b48957fe4bec4af5,2024-11-21T01:55:11.747000 CVE-2013-4241,0,0,c046a38d2bf0f2609292d953410c8535a7182844ef81cbe9b8d57c96a4084e6a,2020-02-03T21:02:20.297000 -CVE-2013-4242,0,1,2068b00c39bd27c396acd0fd95a30d4e6da6662fb5f345f22cd3729a0ffc234d,2024-11-21T01:55:11.987000 -CVE-2013-4243,0,1,d013cf97f7e65c01b05864a949b1e9ee1383a930090647efde05de4e8fc67bce,2024-11-21T01:55:12.130000 -CVE-2013-4244,0,1,9659f757d5c36d0e79e02a646633571411bbaf599854c5eb0debe3ac117dff21,2024-11-21T01:55:12.263000 +CVE-2013-4242,0,0,2068b00c39bd27c396acd0fd95a30d4e6da6662fb5f345f22cd3729a0ffc234d,2024-11-21T01:55:11.987000 +CVE-2013-4243,0,0,d013cf97f7e65c01b05864a949b1e9ee1383a930090647efde05de4e8fc67bce,2024-11-21T01:55:12.130000 +CVE-2013-4244,0,0,9659f757d5c36d0e79e02a646633571411bbaf599854c5eb0debe3ac117dff21,2024-11-21T01:55:12.263000 CVE-2013-4245,0,0,4af273c544f130a842c61497c42b04ec78525dbc876cd5c98f50b8a230ba0428,2019-12-13T22:09:00.027000 CVE-2013-4246,0,0,f715735ad6aaf741bc17e82c737d016d6e08eddda7d09ffe263b42dfd2c2fea0,2017-11-18T17:45:17.340000 -CVE-2013-4247,0,1,e743757c473a0795ce727ff35d4cfe55e13ea737a2e8691f723264bb67f16691,2024-11-21T01:55:12.617000 -CVE-2013-4248,0,1,bde7ca62209c243da3daf2db25c67a68a265b479259ff9e03630045fcd1c9392,2024-11-21T01:55:12.723000 -CVE-2013-4249,0,1,3597075a40757648f1cb47616edd98523c0278d1618d1af5f95b73a2fd7d981e,2024-11-21T01:55:12.860000 -CVE-2013-4250,0,1,4b1acf6bcc466af63cca90b090a1c393379a053c73e5c61ba16b2e3fe33dd285,2024-11-21T01:55:12.983000 +CVE-2013-4247,0,0,e743757c473a0795ce727ff35d4cfe55e13ea737a2e8691f723264bb67f16691,2024-11-21T01:55:12.617000 +CVE-2013-4248,0,0,bde7ca62209c243da3daf2db25c67a68a265b479259ff9e03630045fcd1c9392,2024-11-21T01:55:12.723000 +CVE-2013-4249,0,0,3597075a40757648f1cb47616edd98523c0278d1618d1af5f95b73a2fd7d981e,2024-11-21T01:55:12.860000 +CVE-2013-4250,0,0,4b1acf6bcc466af63cca90b090a1c393379a053c73e5c61ba16b2e3fe33dd285,2024-11-21T01:55:12.983000 CVE-2013-4251,0,0,08dea0430a42a5bb1359d89ae03c299c3d2d6eae77d188ea61c84417f61a66d6,2019-11-08T18:51:23.330000 CVE-2013-4252,0,0,147ec3c5f16202e8adc28cfa951e1b4a4293683c0f1be3ad18483d10c4f08979,2023-11-07T02:16:10.530000 CVE-2013-4253,0,0,9cbc98a05af63a44dee89187c43def9b3091824e7865cbaaf6a394f2627db5f1,2022-10-21T17:12:16.177000 -CVE-2013-4254,0,1,eae9e9baee79902666502a348816c9efe7ccb31f3605a7a991264ac412e5a040,2024-11-21T01:55:13.373000 -CVE-2013-4255,0,1,ccf69a36788f0d74aeb3527c12e6e6ec56f811be5cc68bf250a8e5d6066d4978,2024-11-21T01:55:13.503000 -CVE-2013-4256,0,1,3ce4c071bfbbb7fe537afb65d3731a5c1f380082103698435466ff524a7786de,2024-11-21T01:55:13.623000 +CVE-2013-4254,0,0,eae9e9baee79902666502a348816c9efe7ccb31f3605a7a991264ac412e5a040,2024-11-21T01:55:13.373000 +CVE-2013-4255,0,0,ccf69a36788f0d74aeb3527c12e6e6ec56f811be5cc68bf250a8e5d6066d4978,2024-11-21T01:55:13.503000 +CVE-2013-4256,0,0,3ce4c071bfbbb7fe537afb65d3731a5c1f380082103698435466ff524a7786de,2024-11-21T01:55:13.623000 CVE-2013-4257,0,0,295315154b5b0cf809c95c3d163cd5eb1440fa4c548d37dfab6a1977d5ed2d4e,2023-11-07T02:16:10.843000 -CVE-2013-4258,0,1,84630ec463b72c77bd7cd393790b121a8093733f584ad312b1746ac49f15a327,2024-11-21T01:55:13.757000 -CVE-2013-4259,0,1,78c1d9180e188bb98e8621958120d949e84920186f4e0a04445acd70c0ae4b4f,2024-11-21T01:55:13.863000 -CVE-2013-4260,0,1,5affe39a38abde13a823503a336349e850d12bdc1cbc841ebd0a247fe7e41092,2024-11-21T01:55:13.980000 -CVE-2013-4261,0,1,5c454b4aa3e2315f3c4dbff65755d53eec48e86e563fbe55c5be8009dfb15863,2024-11-21T01:55:14.093000 +CVE-2013-4258,0,0,84630ec463b72c77bd7cd393790b121a8093733f584ad312b1746ac49f15a327,2024-11-21T01:55:13.757000 +CVE-2013-4259,0,0,78c1d9180e188bb98e8621958120d949e84920186f4e0a04445acd70c0ae4b4f,2024-11-21T01:55:13.863000 +CVE-2013-4260,0,0,5affe39a38abde13a823503a336349e850d12bdc1cbc841ebd0a247fe7e41092,2024-11-21T01:55:13.980000 +CVE-2013-4261,0,0,5c454b4aa3e2315f3c4dbff65755d53eec48e86e563fbe55c5be8009dfb15863,2024-11-21T01:55:14.093000 CVE-2013-4262,0,0,7a51cd19d84f6c384cbb6b2af501163de4bb0bc189c824b1b47914f333f3bfe8,2016-10-18T03:43:34.277000 -CVE-2013-4263,0,1,3e02f476cbf068cbf465adea18ef5707e627206dd1ed5f28dce91e6c4294df60,2024-11-21T01:55:14.317000 -CVE-2013-4264,0,1,8be3153bd9832d85e50c320eb6ea49347dbb9d66baef4c5afd2ac4649d83d7ce,2024-11-21T01:55:14.443000 -CVE-2013-4265,0,1,b88648228d1f9f9e8827a832d7c03079d439311c35e9e6b0c6203f7f9312e4a0,2024-11-21T01:55:14.613000 +CVE-2013-4263,0,0,3e02f476cbf068cbf465adea18ef5707e627206dd1ed5f28dce91e6c4294df60,2024-11-21T01:55:14.317000 +CVE-2013-4264,0,0,8be3153bd9832d85e50c320eb6ea49347dbb9d66baef4c5afd2ac4649d83d7ce,2024-11-21T01:55:14.443000 +CVE-2013-4265,0,0,b88648228d1f9f9e8827a832d7c03079d439311c35e9e6b0c6203f7f9312e4a0,2024-11-21T01:55:14.613000 CVE-2013-4266,0,0,f552d38492e6b8e00847ed55ef045e490180233d1fce0a81cf47064d0938f48d,2023-11-07T02:16:11.130000 CVE-2013-4267,0,0,8ac4dd1e100df01db68b4adb5df1ce7e478e388ee95362a6558d687904f0c276,2020-02-12T19:54:08.047000 CVE-2013-4268,0,0,ca5168da1ac90dad8b576792b3c0cd4f9d006ebb610e51bdd5f384345cbf2880,2023-11-07T02:16:11.360000 CVE-2013-4269,0,0,d2a237e8966b416cdee5f266066067148766e10bfa7323c766e19ff514aad942,2023-11-07T02:16:11.607000 -CVE-2013-4270,0,1,d3a7a41d29aa55e0a9a5c7aa2c55faaa9af367d17aa5d1bedc796562de59543c,2024-11-21T01:55:14.900000 -CVE-2013-4271,0,1,0b543851019ee5841c5baa5c08826275718eff7190ee8065677ec78e5fe16009,2024-11-21T01:55:15.043000 -CVE-2013-4272,0,1,d34ea27b09d879a037715cd1c9b4ea3325762fb470504d5d2980926741c519ed,2024-11-21T01:55:15.160000 +CVE-2013-4270,0,0,d3a7a41d29aa55e0a9a5c7aa2c55faaa9af367d17aa5d1bedc796562de59543c,2024-11-21T01:55:14.900000 +CVE-2013-4271,0,0,0b543851019ee5841c5baa5c08826275718eff7190ee8065677ec78e5fe16009,2024-11-21T01:55:15.043000 +CVE-2013-4272,0,0,d34ea27b09d879a037715cd1c9b4ea3325762fb470504d5d2980926741c519ed,2024-11-21T01:55:15.160000 CVE-2013-4273,0,0,cdf75c399a6541de2729f1f6cea4e1c2fd23fd8ef0350bb5d49b54d71503fabd,2015-02-27T17:42:29.350000 -CVE-2013-4274,0,1,0d04d56cade9ba29088371469b09b44693f6d7b147d209ee7a9000e69fbd123f,2024-11-21T01:55:15.397000 +CVE-2013-4274,0,0,0d04d56cade9ba29088371469b09b44693f6d7b147d209ee7a9000e69fbd123f,2024-11-21T01:55:15.397000 CVE-2013-4275,0,0,6173b3d0323cbdf863054552621c709a42e27d5332accaea9b172d1212146bc6,2019-11-18T14:55:49.650000 -CVE-2013-4276,0,1,65089fb660da55c1a1c8ebb0ca6476c80f18460e0bbe4590b9b6668fbbe136ad,2024-11-21T01:55:15.657000 -CVE-2013-4277,0,1,ae4e62d339aba75f72c118cf562075d2fb4bb43d62136dd8b1ec83e50d6c91fb,2024-11-21T01:55:15.787000 -CVE-2013-4278,0,1,60229649bfb71da17bd8739f8dc1acde9dd933e6cf70a34c8841642a68403b6c,2024-11-21T01:55:15.903000 -CVE-2013-4279,0,1,78fbf2fa79b1d24a2a50ea7f3f25820da8d0a0c29a7188a83780a44c035b46a7,2024-11-21T01:55:16.020000 +CVE-2013-4276,0,0,65089fb660da55c1a1c8ebb0ca6476c80f18460e0bbe4590b9b6668fbbe136ad,2024-11-21T01:55:15.657000 +CVE-2013-4277,0,0,ae4e62d339aba75f72c118cf562075d2fb4bb43d62136dd8b1ec83e50d6c91fb,2024-11-21T01:55:15.787000 +CVE-2013-4278,0,0,60229649bfb71da17bd8739f8dc1acde9dd933e6cf70a34c8841642a68403b6c,2024-11-21T01:55:15.903000 +CVE-2013-4279,0,0,78fbf2fa79b1d24a2a50ea7f3f25820da8d0a0c29a7188a83780a44c035b46a7,2024-11-21T01:55:16.020000 CVE-2013-4280,0,0,5ba9ad8c1d7f91fc380f063d53d2d96eedc2d8998ac0fe66bc51083004e66982,2019-11-06T18:40:32.047000 CVE-2013-4281,0,0,9f24319d082778bd519d8b20ce84106c8d7b198c87f1edf1d0645dff525722f8,2022-10-21T17:06:36.080000 -CVE-2013-4282,0,1,e13d79deac8e9266790ee8bfaa0342e931404cfca0c7cdab575142e7013f9d87,2024-11-21T01:55:16.360000 -CVE-2013-4283,0,1,9bf99fcfb922eac8e6da0d0f6b373382f76e75f3862e1955f10c5b342fe3f582,2024-11-21T01:55:16.473000 -CVE-2013-4284,0,1,c65120fee2ae353e186c8ef873521e8b13ed8d9ef57d601129e976758d2abc39,2024-11-21T01:55:16.580000 -CVE-2013-4285,0,1,7348e7241ad23a8b86c1d382f1981785937af3a3879bc2fd0f8040b7573f170e,2024-11-21T01:55:16.687000 -CVE-2013-4286,0,1,dfde180875d6e10a790af03df93f26276d1d46646f188f33a4b01c77f33b93d1,2024-11-21T01:55:16.797000 -CVE-2013-4287,0,1,fc0c6debd556617b964f101eb0cb9edaff43ef287f60f8966b8b79f1f29b06ba,2024-11-21T01:55:17.003000 -CVE-2013-4288,0,1,76679f3428f6d82c46d959a08115762e9433d756cb2de837f13567c42ef21b92,2024-11-21T01:55:17.133000 -CVE-2013-4289,0,1,e4f73737f254e59eca7f2c01bf7907b1e6bb6350d4bd6e39139949d953f3733b,2024-11-21T01:55:17.253000 -CVE-2013-4290,0,1,f400a2cca015ef2d10bba5c25134280c2d7fa1ac1b3c30219fa2837016076e9c,2024-11-21T01:55:17.370000 -CVE-2013-4291,0,1,a0a2fd364f0536b7f8c3cdddbce0edeb771f602d4346f0f9148a3f5a7e8d98e0,2024-11-21T01:55:17.483000 -CVE-2013-4292,0,1,df2553664112fa3de7bae46dfd8f98f08fbc90867e7513e7db8b46c3ddee5424,2024-11-21T01:55:17.590000 -CVE-2013-4293,0,1,f45ee71330add6291ccedff904a126db2df75006e1066e30b2d55d8a4e566d20,2024-11-21T01:55:17.693000 -CVE-2013-4294,0,1,d09b9d6d15c616f98435e088f5354a2bd5b3eb22d65b746c36b2c6eed00e57c4,2024-11-21T01:55:17.800000 -CVE-2013-4295,0,1,a0ffadd03f8850391ceafeed30f3691ac1c6eccaab83ffc5eefe998ccd08fe12,2024-11-21T01:55:17.910000 -CVE-2013-4296,0,1,a053527773b1498e0a4dcdc06ee78e4b356b03a2ea524b46e78ae9cc071f267b,2024-11-21T01:55:18.013000 -CVE-2013-4297,0,1,540730929d298a84fd927c27e86c35b98373f2521bf6114716b0491afee3d185,2024-11-21T01:55:18.143000 -CVE-2013-4298,0,1,81a9feff152b615e4ea6d2b4856a47536456763627f5450d4e8bf1e45b07c165,2024-11-21T01:55:18.270000 -CVE-2013-4299,0,1,ce3c5aba39aa21fa1f7d208d9c6152963f1c497ba723f0eb23edd61698a0551e,2024-11-21T01:55:18.393000 -CVE-2013-4300,0,1,53ab6d7e3f81a21e70c08099a2a507698664501947bcd4416e2f60432933319e,2024-11-21T01:55:18.567000 -CVE-2013-4301,0,1,d078946ff4625b2fe7434020dcc677a71e1c6028d294655ff522bbf6f28be1a9,2024-11-21T01:55:18.683000 -CVE-2013-4302,0,1,79edcc2d8b4ca9423009f40b5fc72c466464963a4210314b91534055f697a7a1,2024-11-21T01:55:18.800000 +CVE-2013-4282,0,0,e13d79deac8e9266790ee8bfaa0342e931404cfca0c7cdab575142e7013f9d87,2024-11-21T01:55:16.360000 +CVE-2013-4283,0,0,9bf99fcfb922eac8e6da0d0f6b373382f76e75f3862e1955f10c5b342fe3f582,2024-11-21T01:55:16.473000 +CVE-2013-4284,0,0,c65120fee2ae353e186c8ef873521e8b13ed8d9ef57d601129e976758d2abc39,2024-11-21T01:55:16.580000 +CVE-2013-4285,0,0,7348e7241ad23a8b86c1d382f1981785937af3a3879bc2fd0f8040b7573f170e,2024-11-21T01:55:16.687000 +CVE-2013-4286,0,0,dfde180875d6e10a790af03df93f26276d1d46646f188f33a4b01c77f33b93d1,2024-11-21T01:55:16.797000 +CVE-2013-4287,0,0,fc0c6debd556617b964f101eb0cb9edaff43ef287f60f8966b8b79f1f29b06ba,2024-11-21T01:55:17.003000 +CVE-2013-4288,0,0,76679f3428f6d82c46d959a08115762e9433d756cb2de837f13567c42ef21b92,2024-11-21T01:55:17.133000 +CVE-2013-4289,0,0,e4f73737f254e59eca7f2c01bf7907b1e6bb6350d4bd6e39139949d953f3733b,2024-11-21T01:55:17.253000 +CVE-2013-4290,0,0,f400a2cca015ef2d10bba5c25134280c2d7fa1ac1b3c30219fa2837016076e9c,2024-11-21T01:55:17.370000 +CVE-2013-4291,0,0,a0a2fd364f0536b7f8c3cdddbce0edeb771f602d4346f0f9148a3f5a7e8d98e0,2024-11-21T01:55:17.483000 +CVE-2013-4292,0,0,df2553664112fa3de7bae46dfd8f98f08fbc90867e7513e7db8b46c3ddee5424,2024-11-21T01:55:17.590000 +CVE-2013-4293,0,0,f45ee71330add6291ccedff904a126db2df75006e1066e30b2d55d8a4e566d20,2024-11-21T01:55:17.693000 +CVE-2013-4294,0,0,d09b9d6d15c616f98435e088f5354a2bd5b3eb22d65b746c36b2c6eed00e57c4,2024-11-21T01:55:17.800000 +CVE-2013-4295,0,0,a0ffadd03f8850391ceafeed30f3691ac1c6eccaab83ffc5eefe998ccd08fe12,2024-11-21T01:55:17.910000 +CVE-2013-4296,0,0,a053527773b1498e0a4dcdc06ee78e4b356b03a2ea524b46e78ae9cc071f267b,2024-11-21T01:55:18.013000 +CVE-2013-4297,0,0,540730929d298a84fd927c27e86c35b98373f2521bf6114716b0491afee3d185,2024-11-21T01:55:18.143000 +CVE-2013-4298,0,0,81a9feff152b615e4ea6d2b4856a47536456763627f5450d4e8bf1e45b07c165,2024-11-21T01:55:18.270000 +CVE-2013-4299,0,0,ce3c5aba39aa21fa1f7d208d9c6152963f1c497ba723f0eb23edd61698a0551e,2024-11-21T01:55:18.393000 +CVE-2013-4300,0,0,53ab6d7e3f81a21e70c08099a2a507698664501947bcd4416e2f60432933319e,2024-11-21T01:55:18.567000 +CVE-2013-4301,0,0,d078946ff4625b2fe7434020dcc677a71e1c6028d294655ff522bbf6f28be1a9,2024-11-21T01:55:18.683000 +CVE-2013-4302,0,0,79edcc2d8b4ca9423009f40b5fc72c466464963a4210314b91534055f697a7a1,2024-11-21T01:55:18.800000 CVE-2013-4303,0,0,f2f11206f36b2b03b07b642e75406e5472968582ef168d1b345ded7683aef565,2019-12-19T17:37:14.027000 -CVE-2013-4304,0,1,04b5da7d91c61d89b7153738ead623de22b6d46f1a4c462df8f7a226018e4b82,2024-11-21T01:55:19.033000 -CVE-2013-4305,0,1,183c775c9887160967aba16f25dfc39789e0eafeb6ff353499dbd940f7683f05,2024-11-21T01:55:19.150000 -CVE-2013-4306,0,1,da5babd748b1673abc43c8212e5e55a3593e740e5c03a3a7685173c1f5db182e,2024-11-21T01:55:19.257000 -CVE-2013-4307,0,1,c61291cd478bd0a3b811e38645168f8a063d6a4bedae1fdea3381550facd0e8d,2024-11-21T01:55:19.380000 -CVE-2013-4308,0,1,f26b0718d2f0d5f127b83cdc3a24cc81288a38825c2cd04fd5ade3f2c052ebee,2024-11-21T01:55:19.503000 +CVE-2013-4304,0,0,04b5da7d91c61d89b7153738ead623de22b6d46f1a4c462df8f7a226018e4b82,2024-11-21T01:55:19.033000 +CVE-2013-4305,0,0,183c775c9887160967aba16f25dfc39789e0eafeb6ff353499dbd940f7683f05,2024-11-21T01:55:19.150000 +CVE-2013-4306,0,0,da5babd748b1673abc43c8212e5e55a3593e740e5c03a3a7685173c1f5db182e,2024-11-21T01:55:19.257000 +CVE-2013-4307,0,0,c61291cd478bd0a3b811e38645168f8a063d6a4bedae1fdea3381550facd0e8d,2024-11-21T01:55:19.380000 +CVE-2013-4308,0,0,f26b0718d2f0d5f127b83cdc3a24cc81288a38825c2cd04fd5ade3f2c052ebee,2024-11-21T01:55:19.503000 CVE-2013-4309,0,0,6ec93fbc420c1a5340adf429bd30a5bcd3f97a580adef07dde374e68b9565d48,2023-11-07T02:16:12.390000 -CVE-2013-4310,0,1,36dfc4bdd19f4b4fb891c4b25803a660486a2cf1ba200e0327c009ba39ebdff3,2024-11-21T01:55:19.640000 -CVE-2013-4311,0,1,7fd547e82f1fc78fe433979153d528da70999af321a88ca36da3d5fc024ec5e5,2024-11-21T01:55:19.797000 +CVE-2013-4310,0,0,36dfc4bdd19f4b4fb891c4b25803a660486a2cf1ba200e0327c009ba39ebdff3,2024-11-21T01:55:19.640000 +CVE-2013-4311,0,0,7fd547e82f1fc78fe433979153d528da70999af321a88ca36da3d5fc024ec5e5,2024-11-21T01:55:19.797000 CVE-2013-4312,0,0,5e0e9cc82294dc21e3b622154e8c9bbb4121378c813a43d277a170b4a6fdfc74,2023-02-13T04:46:29.837000 -CVE-2013-4313,0,1,64e834e11b9023261339c945a9ef34b66c4f59047d688322d3642aea29103d60,2024-11-21T01:55:20.100000 -CVE-2013-4314,0,1,e0d3d53f412b97ead8ae019b962187d69f6ed3fc8c8e6b009b0bed2e80188c47,2024-11-21T01:55:20.217000 -CVE-2013-4315,0,1,b96627f7a9fa747c5f9692957cdc5460adf923441abdec46481348ccf4bea205,2024-11-21T01:55:20.330000 -CVE-2013-4316,0,1,a34aac1afa732c19078758edee1d1932eaf9c7188afcdf61c073e5529350922c,2024-11-21T01:55:20.457000 +CVE-2013-4313,0,0,64e834e11b9023261339c945a9ef34b66c4f59047d688322d3642aea29103d60,2024-11-21T01:55:20.100000 +CVE-2013-4314,0,0,e0d3d53f412b97ead8ae019b962187d69f6ed3fc8c8e6b009b0bed2e80188c47,2024-11-21T01:55:20.217000 +CVE-2013-4315,0,0,b96627f7a9fa747c5f9692957cdc5460adf923441abdec46481348ccf4bea205,2024-11-21T01:55:20.330000 +CVE-2013-4316,0,0,a34aac1afa732c19078758edee1d1932eaf9c7188afcdf61c073e5529350922c,2024-11-21T01:55:20.457000 CVE-2013-4317,0,0,1e4ccd2d2b05e2b9fb616a5cb9b58e21f7b45ebfa3fae57885e955fdf4d0e758,2018-02-26T15:42:04.960000 CVE-2013-4318,0,0,ebb5cc20fec383efe2e1cb2920d09bd038bef47de7c7e667ecb1e06c3df9f6a9,2020-01-02T16:31:14.930000 -CVE-2013-4319,0,1,4c1661cd538484a985fa8b7cf3af0e4090282a6b975a30baa8cc8dba5e908a4b,2024-11-21T01:55:20.813000 -CVE-2013-4320,0,1,831b27ab13bea7bce28677f5db96c25f1673db6d0c555316fec40e3c3630bdc7,2024-11-21T01:55:20.953000 -CVE-2013-4321,0,1,8870de8b1c45d47f4d980238969388bdfb58fcc2e712cea2c2a311202aa4d81b,2024-11-21T01:55:21.067000 -CVE-2013-4322,0,1,d12626e0497ceeea7f2efdbf9d65d6f53e260c5bc2ca2cba142c1fa6be21fd52,2024-11-21T01:55:21.180000 +CVE-2013-4319,0,0,4c1661cd538484a985fa8b7cf3af0e4090282a6b975a30baa8cc8dba5e908a4b,2024-11-21T01:55:20.813000 +CVE-2013-4320,0,0,831b27ab13bea7bce28677f5db96c25f1673db6d0c555316fec40e3c3630bdc7,2024-11-21T01:55:20.953000 +CVE-2013-4321,0,0,8870de8b1c45d47f4d980238969388bdfb58fcc2e712cea2c2a311202aa4d81b,2024-11-21T01:55:21.067000 +CVE-2013-4322,0,0,d12626e0497ceeea7f2efdbf9d65d6f53e260c5bc2ca2cba142c1fa6be21fd52,2024-11-21T01:55:21.180000 CVE-2013-4323,0,0,7aae65be3ea9c09c265f116a294c0f984a8cf3ab5e3d77b37024fffa783f50d8,2023-11-07T02:16:12.870000 -CVE-2013-4324,0,1,5a3a0d09d3cd80418fcc33d3c4eeba1151a80213562ff94d6fb62553ddf29c89,2024-11-21T01:55:21.393000 -CVE-2013-4325,0,1,e53a3dfd67567b1ee240ee9168340446f836096cb53ecfc662f039d78e079343,2024-11-21T01:55:21.517000 -CVE-2013-4326,0,1,33b2580660d002b9afbefdad088ba62c1c04cbed1b019a5f238a5e7f3a73ce81,2024-11-21T01:55:21.653000 -CVE-2013-4327,0,1,5215d53b931d32f27bd0d2e18f1f75b728ada78762f6ca5845c08db3edb9a2fa,2024-11-21T01:55:21.767000 +CVE-2013-4324,0,0,5a3a0d09d3cd80418fcc33d3c4eeba1151a80213562ff94d6fb62553ddf29c89,2024-11-21T01:55:21.393000 +CVE-2013-4325,0,0,e53a3dfd67567b1ee240ee9168340446f836096cb53ecfc662f039d78e079343,2024-11-21T01:55:21.517000 +CVE-2013-4326,0,0,33b2580660d002b9afbefdad088ba62c1c04cbed1b019a5f238a5e7f3a73ce81,2024-11-21T01:55:21.653000 +CVE-2013-4327,0,0,5215d53b931d32f27bd0d2e18f1f75b728ada78762f6ca5845c08db3edb9a2fa,2024-11-21T01:55:21.767000 CVE-2013-4328,0,0,0dd991a339b57f327e17e152bc4487d7e9cd1780eb8bb038505a5b01d7052e47,2023-11-07T02:16:13.187000 -CVE-2013-4329,0,1,e4b7566b8064fdb6fe10bf68b1acd5e2897a4c2e47ec25cd81c850ba4d816cc6,2024-11-21T01:55:21.900000 -CVE-2013-4330,0,1,a6ff50dc78bd96a74565147fabec0e8eb3cb368fb54246320ae5b319317a39e5,2024-11-21T01:55:22.020000 -CVE-2013-4331,0,1,07d4bcba559bb882bb57e25efa3176fe123e3a9fef23ab545046a9aed5acce37,2024-11-21T01:55:22.160000 -CVE-2013-4332,0,1,441ae3236f9a35f3bd81d8c2a9ccb8bb4f6c1edc5fb5244b403a905535208840,2024-11-21T01:55:22.267000 +CVE-2013-4329,0,0,e4b7566b8064fdb6fe10bf68b1acd5e2897a4c2e47ec25cd81c850ba4d816cc6,2024-11-21T01:55:21.900000 +CVE-2013-4330,0,0,a6ff50dc78bd96a74565147fabec0e8eb3cb368fb54246320ae5b319317a39e5,2024-11-21T01:55:22.020000 +CVE-2013-4331,0,0,07d4bcba559bb882bb57e25efa3176fe123e3a9fef23ab545046a9aed5acce37,2024-11-21T01:55:22.160000 +CVE-2013-4332,0,0,441ae3236f9a35f3bd81d8c2a9ccb8bb4f6c1edc5fb5244b403a905535208840,2024-11-21T01:55:22.267000 CVE-2013-4333,0,0,3edc05c32bb0826fce71c71d3e97c1f8a4ca8427ccfd8d9d92f0c5b4d24479a8,2020-02-01T17:34:18.267000 CVE-2013-4334,0,0,ddb26803c2defba3d8584d343d7ae932e7f239aed787d8bf2db2d8d27322960d,2020-02-11T16:01:04.153000 CVE-2013-4335,0,0,990141f217e3c63c3ef08ba53b2b54bb47c13db2a7d4f8b4735e4f7a056be022,2020-02-11T18:42:00.947000 CVE-2013-4336,0,0,00735e8387bff5aa154589a805c792d5f8c2ebc70e7df3660e3dfdd02cbd07bb,2023-11-07T02:16:13.487000 CVE-2013-4337,0,0,16198856ae7e0602e1e8f0620f4b3abc7f50b5c5ba2af1cab4e013fee1f77508,2023-11-07T02:16:13.707000 -CVE-2013-4338,0,1,bdd8bfe4391f29d770adfd45615ec5061fc4933a68c59609e2ce6914d14c2a26,2024-11-21T01:55:22.787000 -CVE-2013-4339,0,1,a5f8d88c398184ef1f27c1687be697e33f9ebb18807e747b473a1642c11ecd02,2024-11-21T01:55:22.897000 -CVE-2013-4340,0,1,bba529264cb875c02af7b5c23fba294a698cb908e30ad9d60702978cd4721e0f,2024-11-21T01:55:23.030000 -CVE-2013-4341,0,1,40beefbba5b334972774e9362e47e45c42c5bb9e6752036c4c8221a295bebb8d,2024-11-21T01:55:23.150000 -CVE-2013-4342,0,1,f093689ac264c639aea2d506648c89275a78b290e87899d053253c0570b2c07a,2024-11-21T01:55:23.273000 -CVE-2013-4343,0,1,f84d71ade4103201284fd170810488eb4dd05eea42e2ba2af4f0e60b321f831c,2024-11-21T01:55:23.393000 -CVE-2013-4344,0,1,9da30c8f70d84c95e604ed9df7f31ef25b1c2df7c7ce93c76aabc01ef9d0031d,2024-11-21T01:55:23.530000 -CVE-2013-4345,0,1,6f121345d40936d248f4aeb4d8b4e72fdcb1545cd7d9b92c13ca06a2ecc5f4ea,2024-11-21T01:55:23.653000 -CVE-2013-4346,0,1,bb8518f5468589a0c432d65aaee2061b6779872247e0bd82d24a4be0bec66e25,2024-11-21T01:55:23.823000 -CVE-2013-4347,0,1,bef290e44775b84aa9b3c7dcdbab3d2167677866d89af6d74d5911d3aaf6a92f,2024-11-21T01:55:23.940000 -CVE-2013-4348,0,1,59b14a7c40a9e3603db0fc3767228a4d6e2f2bae19b95301742ed99d0d61ee8e,2024-11-21T01:55:24.047000 +CVE-2013-4338,0,0,bdd8bfe4391f29d770adfd45615ec5061fc4933a68c59609e2ce6914d14c2a26,2024-11-21T01:55:22.787000 +CVE-2013-4339,0,0,a5f8d88c398184ef1f27c1687be697e33f9ebb18807e747b473a1642c11ecd02,2024-11-21T01:55:22.897000 +CVE-2013-4340,0,0,bba529264cb875c02af7b5c23fba294a698cb908e30ad9d60702978cd4721e0f,2024-11-21T01:55:23.030000 +CVE-2013-4341,0,0,40beefbba5b334972774e9362e47e45c42c5bb9e6752036c4c8221a295bebb8d,2024-11-21T01:55:23.150000 +CVE-2013-4342,0,0,f093689ac264c639aea2d506648c89275a78b290e87899d053253c0570b2c07a,2024-11-21T01:55:23.273000 +CVE-2013-4343,0,0,f84d71ade4103201284fd170810488eb4dd05eea42e2ba2af4f0e60b321f831c,2024-11-21T01:55:23.393000 +CVE-2013-4344,0,0,9da30c8f70d84c95e604ed9df7f31ef25b1c2df7c7ce93c76aabc01ef9d0031d,2024-11-21T01:55:23.530000 +CVE-2013-4345,0,0,6f121345d40936d248f4aeb4d8b4e72fdcb1545cd7d9b92c13ca06a2ecc5f4ea,2024-11-21T01:55:23.653000 +CVE-2013-4346,0,0,bb8518f5468589a0c432d65aaee2061b6779872247e0bd82d24a4be0bec66e25,2024-11-21T01:55:23.823000 +CVE-2013-4347,0,0,bef290e44775b84aa9b3c7dcdbab3d2167677866d89af6d74d5911d3aaf6a92f,2024-11-21T01:55:23.940000 +CVE-2013-4348,0,0,59b14a7c40a9e3603db0fc3767228a4d6e2f2bae19b95301742ed99d0d61ee8e,2024-11-21T01:55:24.047000 CVE-2013-4349,0,0,d883452ef170be97cff9891fd1e2548de02829aca68b4f774aac8021564e7b7a,2023-11-07T02:16:14.063000 -CVE-2013-4350,0,1,c0299b90c3c8f8af21f8343fb6ec60c0bcf81cfe9fc9f8a4fab7a7f55c519f9b,2024-11-21T01:55:24.183000 -CVE-2013-4351,0,1,070c870753587610c14f8119801958db4a36d9b220485859d93fe169c2c03be6,2024-11-21T01:55:24.340000 +CVE-2013-4350,0,0,c0299b90c3c8f8af21f8343fb6ec60c0bcf81cfe9fc9f8a4fab7a7f55c519f9b,2024-11-21T01:55:24.183000 +CVE-2013-4351,0,0,070c870753587610c14f8119801958db4a36d9b220485859d93fe169c2c03be6,2024-11-21T01:55:24.340000 CVE-2013-4352,0,0,3661b0bd3706788d746d4b2baacb64458b244cdec5358ab48d7da40013fd1c69,2023-11-07T02:16:14.320000 -CVE-2013-4353,0,1,aca74f51bcfc40f960edec4c97ee602a0d1d705a240fe9a4140766c6e5f6ecd4,2024-11-21T01:55:24.607000 -CVE-2013-4354,0,1,8836bcf99fd304f8a5134e195dd5590a8d44dd294ac2bb9e4269006eb7b8440a,2024-11-21T01:55:24.737000 -CVE-2013-4355,0,1,7ba6c728404960bd5b9f2627cb6833d66682af660b05ac85dedf44958b1e5db7,2024-11-21T01:55:24.870000 -CVE-2013-4356,0,1,2fd6e821c08010e3d5cf90fd5d33eccffd2d50ed9c9b10c802959e136e80cc50,2024-11-21T01:55:24.993000 +CVE-2013-4353,0,0,aca74f51bcfc40f960edec4c97ee602a0d1d705a240fe9a4140766c6e5f6ecd4,2024-11-21T01:55:24.607000 +CVE-2013-4354,0,0,8836bcf99fd304f8a5134e195dd5590a8d44dd294ac2bb9e4269006eb7b8440a,2024-11-21T01:55:24.737000 +CVE-2013-4355,0,0,7ba6c728404960bd5b9f2627cb6833d66682af660b05ac85dedf44958b1e5db7,2024-11-21T01:55:24.870000 +CVE-2013-4356,0,0,2fd6e821c08010e3d5cf90fd5d33eccffd2d50ed9c9b10c802959e136e80cc50,2024-11-21T01:55:24.993000 CVE-2013-4357,0,0,41e3d400dcbe2f12f491ebf272421cbeee3fd97de109077fb875e6bca7ff184e,2020-01-14T16:31:28.023000 -CVE-2013-4358,0,1,e94375c2787e1dbd797b145b71ba86d33fdbf0fe4549560aa5d72b4d21b8b7d0,2024-11-21T01:55:25.233000 -CVE-2013-4359,0,1,5522a78b0b684be8499e73a814e595c854785424c67239a3c5744236a626811f,2024-11-21T01:55:25.350000 +CVE-2013-4358,0,0,e94375c2787e1dbd797b145b71ba86d33fdbf0fe4549560aa5d72b4d21b8b7d0,2024-11-21T01:55:25.233000 +CVE-2013-4359,0,0,5522a78b0b684be8499e73a814e595c854785424c67239a3c5744236a626811f,2024-11-21T01:55:25.350000 CVE-2013-4360,0,0,252f7abc0275c03a694dbe28f163103474d6328a911a609aed8703dcc28943fe,2023-11-07T02:16:14.587000 -CVE-2013-4361,0,1,07efbcd557ab20492c9e6b2bb2b6196ff7898b56df4033c95bfbed921cc05b17,2024-11-21T01:55:25.470000 -CVE-2013-4362,0,1,a66d132ba9eb10497cf6595c529eee27fbcd3f600bf993c376df690971629ef4,2024-11-21T01:55:25.583000 -CVE-2013-4363,0,1,ff65a1a2d50efa28b297da95134b3ae9d36de200de84d575de343ac124f7b39b,2024-11-21T01:55:25.690000 +CVE-2013-4361,0,0,07efbcd557ab20492c9e6b2bb2b6196ff7898b56df4033c95bfbed921cc05b17,2024-11-21T01:55:25.470000 +CVE-2013-4362,0,0,a66d132ba9eb10497cf6595c529eee27fbcd3f600bf993c376df690971629ef4,2024-11-21T01:55:25.583000 +CVE-2013-4363,0,0,ff65a1a2d50efa28b297da95134b3ae9d36de200de84d575de343ac124f7b39b,2024-11-21T01:55:25.690000 CVE-2013-4364,0,0,5aa9ee5c58496bb88915ae51d10e13281b73b57567904ebb4fab9eed1b6ab7c8,2018-02-01T18:38:52.687000 -CVE-2013-4365,0,1,fa4afd5f97c02f174eac857c85ed5877980d375d56fbff613a9dfa3e206c2696,2024-11-21T01:55:25.910000 +CVE-2013-4365,0,0,fa4afd5f97c02f174eac857c85ed5877980d375d56fbff613a9dfa3e206c2696,2024-11-21T01:55:25.910000 CVE-2013-4366,0,0,79e807d61923af9c48efb56b132570624cb22266e488c5381d2e2bc835289cb7,2020-07-28T13:44:03.843000 CVE-2013-4367,0,0,a1058f16943f5929a0a0fa095d7650f208dd675e10aae48b2d1062eec672ec22,2019-11-07T19:30:41.343000 -CVE-2013-4368,0,1,ff65d7b14f4d3188b2b068c1005b46f7391441adf7947c2717d3d8b39e58f2d9,2024-11-21T01:55:26.257000 -CVE-2013-4369,0,1,5041542e6233c3330f3e5c9f3d5b79f151890cab03c3742a336b4649984e3514,2024-11-21T01:55:26.377000 -CVE-2013-4370,0,1,2bb2fb4bc48c27c5ca8bd948a648f4eb846a6a70e4a8a36c9d4d0b4af4d0204a,2024-11-21T01:55:26.480000 -CVE-2013-4371,0,1,eb0b383ff4f604f1e5bb11c870f2cdd3e17fb7d051b38381614b159806f7ab27,2024-11-21T01:55:26.580000 -CVE-2013-4372,0,1,6f993573141c2c5400a5095176c70440b3c9d4335792e25713558524dcac2ca4,2024-11-21T01:55:26.677000 -CVE-2013-4373,0,1,a83acb8a8579508bb30f8996f3b375f09491eaec3eefef03cc935832c1b7d0a1,2024-11-21T01:55:26.787000 +CVE-2013-4368,0,0,ff65d7b14f4d3188b2b068c1005b46f7391441adf7947c2717d3d8b39e58f2d9,2024-11-21T01:55:26.257000 +CVE-2013-4369,0,0,5041542e6233c3330f3e5c9f3d5b79f151890cab03c3742a336b4649984e3514,2024-11-21T01:55:26.377000 +CVE-2013-4370,0,0,2bb2fb4bc48c27c5ca8bd948a648f4eb846a6a70e4a8a36c9d4d0b4af4d0204a,2024-11-21T01:55:26.480000 +CVE-2013-4371,0,0,eb0b383ff4f604f1e5bb11c870f2cdd3e17fb7d051b38381614b159806f7ab27,2024-11-21T01:55:26.580000 +CVE-2013-4372,0,0,6f993573141c2c5400a5095176c70440b3c9d4335792e25713558524dcac2ca4,2024-11-21T01:55:26.677000 +CVE-2013-4373,0,0,a83acb8a8579508bb30f8996f3b375f09491eaec3eefef03cc935832c1b7d0a1,2024-11-21T01:55:26.787000 CVE-2013-4374,0,0,1569566194b6900396e0dc288a573c8a25b4c336b93b10afc21e7e794ba7ed0b,2019-11-08T16:49:25.140000 -CVE-2013-4375,0,1,7261fc9e6093e97760f69bde860cae42a660ee696d1ab93b8c1c1f3d256939f8,2024-11-21T01:55:27.010000 -CVE-2013-4376,0,1,7e0b92babb5b251347eda74739ee2884227f00e1a90f9ea633ba523ed3c37b8f,2024-11-21T01:55:27.120000 -CVE-2013-4377,0,1,f8b8446410a7e896ecb041634ebc1d55634e3b19e33c45dd80dbfff0a02d2ff8,2024-11-21T01:55:27.230000 -CVE-2013-4378,0,1,1b0d8bc93dbe669b075fdf1fe8cab3d561dcbfdab8686d60591f8852b0f77692,2024-11-21T01:55:27.337000 -CVE-2013-4379,0,1,b8c294b9a4447ee5bb2ebe8c583feb3fd8eb07887309b671ff4f74517f904929,2024-11-21T01:55:27.463000 -CVE-2013-4380,0,1,baf7b9c84cd891884261a93be256bac8b374b3a6ea85926788f058d092f3c7b6,2024-11-21T01:55:27.573000 +CVE-2013-4375,0,0,7261fc9e6093e97760f69bde860cae42a660ee696d1ab93b8c1c1f3d256939f8,2024-11-21T01:55:27.010000 +CVE-2013-4376,0,0,7e0b92babb5b251347eda74739ee2884227f00e1a90f9ea633ba523ed3c37b8f,2024-11-21T01:55:27.120000 +CVE-2013-4377,0,0,f8b8446410a7e896ecb041634ebc1d55634e3b19e33c45dd80dbfff0a02d2ff8,2024-11-21T01:55:27.230000 +CVE-2013-4378,0,0,1b0d8bc93dbe669b075fdf1fe8cab3d561dcbfdab8686d60591f8852b0f77692,2024-11-21T01:55:27.337000 +CVE-2013-4379,0,0,b8c294b9a4447ee5bb2ebe8c583feb3fd8eb07887309b671ff4f74517f904929,2024-11-21T01:55:27.463000 +CVE-2013-4380,0,0,baf7b9c84cd891884261a93be256bac8b374b3a6ea85926788f058d092f3c7b6,2024-11-21T01:55:27.573000 CVE-2013-4381,0,0,c2af4eac9cf5c5157be8633730c055ef0bc9f27e63b639e9d6fc60e62a280d05,2023-11-07T02:16:15.130000 CVE-2013-4382,0,0,efbaf2ae8a3180342f14a18b75e976c916e836f15fb6fe9d97ecc28322a8ee22,2023-11-07T02:16:15.410000 -CVE-2013-4383,0,1,f2bbb7732bb3a776899057e15c70a257a904b1a6224fc492585c616095b3a050,2024-11-21T01:55:27.727000 -CVE-2013-4384,0,1,622534900ab106d1ed4930b4d8642e6be3a85d966016c23cede46efcbe1f1340,2024-11-21T01:55:27.840000 -CVE-2013-4385,0,1,c8ef67cf246553f3b6b26d4c1bcd3744ec14d01537477d673e5b7d28e5dcb469,2024-11-21T01:55:27.960000 -CVE-2013-4386,0,1,9a695057858383845589adf3cfdcaaa0a70eaea8596d4a5c712a23da159d7ff8,2024-11-21T01:55:28.077000 -CVE-2013-4387,0,1,1d23982548de029f658c838a7d6a151afb8834f57a716c62cd73155dadfd67ba,2024-11-21T01:55:28.190000 -CVE-2013-4388,0,1,e4b7e725a0afa6b1b64556906f422794c9d0fb42ea17a0eacee5458563ba78cf,2024-11-21T01:55:28.333000 -CVE-2013-4389,0,1,f809e434a435aa972c655c950faed2d01297f69ad880ca031d4fe56319d4950d,2024-11-21T01:55:28.447000 -CVE-2013-4390,0,1,1ea9a7dabeb731fb4c7025c3ad355b9892db63d1115b4343396f24fe65e20904,2024-11-21T01:55:28.563000 -CVE-2013-4391,0,1,686fa6e88ae660dc117db33b55b951f86ec1600a3ca23e4f0cc9bf458bfcc6be,2024-11-21T01:55:28.673000 -CVE-2013-4392,0,1,b6c0420b99af6c3cb200dd2602a6149c3518caf3bb2401a16248dee08cfbfb48,2024-11-21T01:55:28.797000 -CVE-2013-4393,0,1,cbcc97dfba4202ab2eb3e5b162330b70dea45fd0fafafbcb76bb70c64c6665d6,2024-11-21T01:55:28.900000 -CVE-2013-4394,0,1,55f39fb7effc54bb1152b2f9d0152dcfead7b54b91cd77388963aa63c8cba6ac,2024-11-21T01:55:29.007000 +CVE-2013-4383,0,0,f2bbb7732bb3a776899057e15c70a257a904b1a6224fc492585c616095b3a050,2024-11-21T01:55:27.727000 +CVE-2013-4384,0,0,622534900ab106d1ed4930b4d8642e6be3a85d966016c23cede46efcbe1f1340,2024-11-21T01:55:27.840000 +CVE-2013-4385,0,0,c8ef67cf246553f3b6b26d4c1bcd3744ec14d01537477d673e5b7d28e5dcb469,2024-11-21T01:55:27.960000 +CVE-2013-4386,0,0,9a695057858383845589adf3cfdcaaa0a70eaea8596d4a5c712a23da159d7ff8,2024-11-21T01:55:28.077000 +CVE-2013-4387,0,0,1d23982548de029f658c838a7d6a151afb8834f57a716c62cd73155dadfd67ba,2024-11-21T01:55:28.190000 +CVE-2013-4388,0,0,e4b7e725a0afa6b1b64556906f422794c9d0fb42ea17a0eacee5458563ba78cf,2024-11-21T01:55:28.333000 +CVE-2013-4389,0,0,f809e434a435aa972c655c950faed2d01297f69ad880ca031d4fe56319d4950d,2024-11-21T01:55:28.447000 +CVE-2013-4390,0,0,1ea9a7dabeb731fb4c7025c3ad355b9892db63d1115b4343396f24fe65e20904,2024-11-21T01:55:28.563000 +CVE-2013-4391,0,0,686fa6e88ae660dc117db33b55b951f86ec1600a3ca23e4f0cc9bf458bfcc6be,2024-11-21T01:55:28.673000 +CVE-2013-4392,0,0,b6c0420b99af6c3cb200dd2602a6149c3518caf3bb2401a16248dee08cfbfb48,2024-11-21T01:55:28.797000 +CVE-2013-4393,0,0,cbcc97dfba4202ab2eb3e5b162330b70dea45fd0fafafbcb76bb70c64c6665d6,2024-11-21T01:55:28.900000 +CVE-2013-4394,0,0,55f39fb7effc54bb1152b2f9d0152dcfead7b54b91cd77388963aa63c8cba6ac,2024-11-21T01:55:29.007000 CVE-2013-4395,0,0,9f004ea9bd6ed314b457a1afee3a8ea1c5ec113142312382623e06ec17abe22b,2020-02-21T13:19:10.220000 -CVE-2013-4396,0,1,1dde8b5b1f49db8e1ed5074df316bfde8109c27fb828919c4384bc98cccd44ac,2024-11-21T01:55:29.227000 -CVE-2013-4397,0,1,0f9d4f34bb122a11aef64cd28d7298cd306078555c9cb601ba9db8e66a6d567f,2024-11-21T01:55:29.340000 +CVE-2013-4396,0,0,1dde8b5b1f49db8e1ed5074df316bfde8109c27fb828919c4384bc98cccd44ac,2024-11-21T01:55:29.227000 +CVE-2013-4397,0,0,0f9d4f34bb122a11aef64cd28d7298cd306078555c9cb601ba9db8e66a6d567f,2024-11-21T01:55:29.340000 CVE-2013-4398,0,0,f616a59bf51e8a4a0a595d9caa9c2972aadf9f74ce9d464e222978335f01be45,2023-11-07T02:16:15.853000 CVE-2013-4399,0,0,3c93d9a8ee4527eef3a7621010acdcd3db3ae71c0832fe166d518c6e83f6c662,2023-11-07T02:16:16.080000 -CVE-2013-4400,0,1,28d420e9c725c3fe2bf44458bc4ab2321ad4f789beb92d096319f9d02d99fd92,2024-11-21T01:55:29.617000 -CVE-2013-4401,0,1,200c32560dd4f666e4e27401b7e5c79ca702f24909d210a40b14c08867cf07bf,2024-11-21T01:55:29.743000 -CVE-2013-4402,0,1,f4eb656219522eae9948b70814ef9775fb3fd4c8c2d03371d2beb6882f84ff1f,2024-11-21T01:55:29.860000 +CVE-2013-4400,0,0,28d420e9c725c3fe2bf44458bc4ab2321ad4f789beb92d096319f9d02d99fd92,2024-11-21T01:55:29.617000 +CVE-2013-4401,0,0,200c32560dd4f666e4e27401b7e5c79ca702f24909d210a40b14c08867cf07bf,2024-11-21T01:55:29.743000 +CVE-2013-4402,0,0,f4eb656219522eae9948b70814ef9775fb3fd4c8c2d03371d2beb6882f84ff1f,2024-11-21T01:55:29.860000 CVE-2013-4403,0,0,d91e6298385a8a94dd1ea825aa2eb23cbc471236599c263f148d4e859c4528c0,2023-11-07T02:16:16.243000 -CVE-2013-4404,0,1,a04c0705440e900988aea830b19d90923ce0855334216a67dcf50bfff604f9b5,2024-11-21T01:55:30 -CVE-2013-4405,0,1,be60cf0caf5306ba0b723bf3cfb09375fa6258b1e162747fc399a9f536054961,2024-11-21T01:55:30.120000 -CVE-2013-4406,0,1,3225660941af31c85fb4225fa1db6fb76737840421ec49e43047da59ce1893c1,2024-11-21T01:55:30.237000 -CVE-2013-4407,0,1,a9013cdaa8eb0eab850f2c378d914e5e778c991c8cc49e26701151291f7fde43,2024-11-21T01:55:30.353000 -CVE-2013-4408,0,1,7025230b9a32a8c32b4a3aafb624ce5776cd3bfcce770a3adf05da278ba1738c,2024-11-21T01:55:30.480000 +CVE-2013-4404,0,0,a04c0705440e900988aea830b19d90923ce0855334216a67dcf50bfff604f9b5,2024-11-21T01:55:30 +CVE-2013-4405,0,0,be60cf0caf5306ba0b723bf3cfb09375fa6258b1e162747fc399a9f536054961,2024-11-21T01:55:30.120000 +CVE-2013-4406,0,0,3225660941af31c85fb4225fa1db6fb76737840421ec49e43047da59ce1893c1,2024-11-21T01:55:30.237000 +CVE-2013-4407,0,0,a9013cdaa8eb0eab850f2c378d914e5e778c991c8cc49e26701151291f7fde43,2024-11-21T01:55:30.353000 +CVE-2013-4408,0,0,7025230b9a32a8c32b4a3aafb624ce5776cd3bfcce770a3adf05da278ba1738c,2024-11-21T01:55:30.480000 CVE-2013-4409,0,0,0f7df3bfd8973626df1310999511628ceadc78699d74c084d3389862c8025491,2019-11-08T21:34:01.507000 CVE-2013-4410,0,0,fdef8c12d1511e6f85465c9e615720ff330872cfc8c5e8a3623bf0ba39e89662,2019-12-13T21:27:31.417000 CVE-2013-4411,0,0,0b67ff1edde993788e227ced8dadf56ec9ff64865a7711a3587b956f4756cbf9,2019-12-11T20:09:55.460000 CVE-2013-4412,0,0,86eb9b8a1dffc80e15d11016cff4b5fe72eebc0f9a7f1e4898e00e1938ba7cb0,2023-12-13T15:03:56.387000 -CVE-2013-4413,0,1,3e0115e375bdb525a6a675837237515bc2ee32e70aa49fd41db7fae471b99b26,2024-11-21T01:55:31.137000 -CVE-2013-4414,0,1,16cdf35ac21ea8c68e649e3225681c0f02c566086cafc12d89eeec363cd3e26d,2024-11-21T01:55:31.280000 -CVE-2013-4415,0,1,c4c94da2f465d48fec9cf61e175ab37fbeff9ce752c27005b1591e4a46938618,2024-11-21T01:55:31.400000 -CVE-2013-4416,0,1,301198349075fe19b373a6bb382df1780611bac70575e3841955eb944330fa57,2024-11-21T01:55:31.547000 +CVE-2013-4413,0,0,3e0115e375bdb525a6a675837237515bc2ee32e70aa49fd41db7fae471b99b26,2024-11-21T01:55:31.137000 +CVE-2013-4414,0,0,16cdf35ac21ea8c68e649e3225681c0f02c566086cafc12d89eeec363cd3e26d,2024-11-21T01:55:31.280000 +CVE-2013-4415,0,0,c4c94da2f465d48fec9cf61e175ab37fbeff9ce752c27005b1591e4a46938618,2024-11-21T01:55:31.400000 +CVE-2013-4416,0,0,301198349075fe19b373a6bb382df1780611bac70575e3841955eb944330fa57,2024-11-21T01:55:31.547000 CVE-2013-4417,0,0,200dbe97017d0fd694e7f66dfbb8d24a3e161d144f3db875ade68da36a932e1e,2023-11-07T02:16:16.623000 CVE-2013-4418,0,0,57b7434088d0ae52b7563bae654a680134354b1dbe8d41237c7afd597adc81ba,2023-11-07T02:16:16.930000 -CVE-2013-4419,0,1,f69dd733f87528e59443332bd3afc5d5a65d22e85bb5eace28479eef9cdf6448,2024-11-21T01:55:31.710000 -CVE-2013-4420,0,1,6a74f879bb5cd8949fa32f7f75d4680c16bd3cc734e52251563aa0f87b56040c,2024-11-21T01:55:31.850000 -CVE-2013-4421,0,1,5b27e367047bc0862575ad59b2a9425b9ca85e229b341282e3e1eadc367f2726,2024-11-21T01:55:31.977000 -CVE-2013-4422,0,1,66bc7253a79e5b69c6d3991d879397406057f42ca70c074743a002845385ffda,2024-11-21T01:55:32.120000 +CVE-2013-4419,0,0,f69dd733f87528e59443332bd3afc5d5a65d22e85bb5eace28479eef9cdf6448,2024-11-21T01:55:31.710000 +CVE-2013-4420,0,0,6a74f879bb5cd8949fa32f7f75d4680c16bd3cc734e52251563aa0f87b56040c,2024-11-21T01:55:31.850000 +CVE-2013-4421,0,0,5b27e367047bc0862575ad59b2a9425b9ca85e229b341282e3e1eadc367f2726,2024-11-21T01:55:31.977000 +CVE-2013-4422,0,0,66bc7253a79e5b69c6d3991d879397406057f42ca70c074743a002845385ffda,2024-11-21T01:55:32.120000 CVE-2013-4423,0,0,c563f933852336e82e5cc035719710b232b7d6d13ee038a95104ef14feaeea97,2023-02-13T04:46:56.567000 -CVE-2013-4424,0,1,d28db0e729fbd01e5961a6101f061801022e58703d9dcbc07590af3c9bff59e8,2024-11-21T01:55:32.417000 -CVE-2013-4425,0,1,e490b52b203c729ed03693af32aa32d3796e8b2924314d80bbbe8d8622757082,2024-11-21T01:55:32.540000 -CVE-2013-4426,0,1,2e30e6de11e2b76869cba2ca2605cd6dd351d32af02a930b32de6426370e546c,2024-11-21T01:55:32.670000 -CVE-2013-4427,0,1,652e950170ee93ad14740dc79ef719b307a8c7d6ab001b1a4373e7b420d02338,2024-11-21T01:55:32.800000 -CVE-2013-4428,0,1,0bf71732705c85b08042bbf16a14fcc1f07e7d5b0f0a4a2d70e463149692a1d8,2024-11-21T01:55:32.920000 -CVE-2013-4429,0,1,6d283d0cbc84c954801dd90b1a849a83912d1fa905fb658e774d7faffebf6fe2,2024-11-21T01:55:33.053000 -CVE-2013-4430,0,1,c0c7abc37e65fffe2ef9ecf26de8e4a29985a2233aa8225288e61dcacb7a56ef,2024-11-21T01:55:33.200000 -CVE-2013-4431,0,1,64550ee2157e47d65a8f77d49d615d9ce54dbad4665ed26878e640180061fac1,2024-11-21T01:55:33.340000 -CVE-2013-4432,0,1,ccd6ff2d21f3bffaff7733168ee06c4d1233eebba091384fe9777935f6b98165,2024-11-21T01:55:33.483000 -CVE-2013-4433,0,1,76c4b01cbcd5a683cd6ea3cec377b19934de77b30e7c4545d7ea7e6fc9447acc,2024-11-21T01:55:33.610000 -CVE-2013-4434,0,1,8ab6811423434deadfd677eac418a11da3a9c0874b3d53fab75a80127166a06e,2024-11-21T01:55:33.727000 -CVE-2013-4435,0,1,f1fe800dc3b58a723347d48a69da1fc0fd5190298522e372526421e582879ec0,2024-11-21T01:55:33.863000 -CVE-2013-4436,0,1,3390077be3b1a48caf2454782856af8051abe29d956a37712eaa9eed1e764b23,2024-11-21T01:55:33.977000 -CVE-2013-4437,0,1,6bba351105596248c735b971f993f485a7d9baf1607adc27a3955598939d546c,2024-11-21T01:55:34.087000 -CVE-2013-4438,0,1,81b2a87e6199a5118b88cd40d5e96cd48f7cb4ffa12e10da6e3fff807ef0b404,2024-11-21T01:55:34.197000 -CVE-2013-4439,0,1,6b02656e96a4e9c5c20bf64ae2d5e5be4782fd5ddbd461c922ed923c4124bd95,2024-11-21T01:55:34.320000 +CVE-2013-4424,0,0,d28db0e729fbd01e5961a6101f061801022e58703d9dcbc07590af3c9bff59e8,2024-11-21T01:55:32.417000 +CVE-2013-4425,0,0,e490b52b203c729ed03693af32aa32d3796e8b2924314d80bbbe8d8622757082,2024-11-21T01:55:32.540000 +CVE-2013-4426,0,0,2e30e6de11e2b76869cba2ca2605cd6dd351d32af02a930b32de6426370e546c,2024-11-21T01:55:32.670000 +CVE-2013-4427,0,0,652e950170ee93ad14740dc79ef719b307a8c7d6ab001b1a4373e7b420d02338,2024-11-21T01:55:32.800000 +CVE-2013-4428,0,0,0bf71732705c85b08042bbf16a14fcc1f07e7d5b0f0a4a2d70e463149692a1d8,2024-11-21T01:55:32.920000 +CVE-2013-4429,0,0,6d283d0cbc84c954801dd90b1a849a83912d1fa905fb658e774d7faffebf6fe2,2024-11-21T01:55:33.053000 +CVE-2013-4430,0,0,c0c7abc37e65fffe2ef9ecf26de8e4a29985a2233aa8225288e61dcacb7a56ef,2024-11-21T01:55:33.200000 +CVE-2013-4431,0,0,64550ee2157e47d65a8f77d49d615d9ce54dbad4665ed26878e640180061fac1,2024-11-21T01:55:33.340000 +CVE-2013-4432,0,0,ccd6ff2d21f3bffaff7733168ee06c4d1233eebba091384fe9777935f6b98165,2024-11-21T01:55:33.483000 +CVE-2013-4433,0,0,76c4b01cbcd5a683cd6ea3cec377b19934de77b30e7c4545d7ea7e6fc9447acc,2024-11-21T01:55:33.610000 +CVE-2013-4434,0,0,8ab6811423434deadfd677eac418a11da3a9c0874b3d53fab75a80127166a06e,2024-11-21T01:55:33.727000 +CVE-2013-4435,0,0,f1fe800dc3b58a723347d48a69da1fc0fd5190298522e372526421e582879ec0,2024-11-21T01:55:33.863000 +CVE-2013-4436,0,0,3390077be3b1a48caf2454782856af8051abe29d956a37712eaa9eed1e764b23,2024-11-21T01:55:33.977000 +CVE-2013-4437,0,0,6bba351105596248c735b971f993f485a7d9baf1607adc27a3955598939d546c,2024-11-21T01:55:34.087000 +CVE-2013-4438,0,0,81b2a87e6199a5118b88cd40d5e96cd48f7cb4ffa12e10da6e3fff807ef0b404,2024-11-21T01:55:34.197000 +CVE-2013-4439,0,0,6b02656e96a4e9c5c20bf64ae2d5e5be4782fd5ddbd461c922ed923c4124bd95,2024-11-21T01:55:34.320000 CVE-2013-4440,0,0,7ae808669d4736b158b88fbcc927a96684075ebe8e79fccfc8d7004515418079,2015-09-10T15:26:24.623000 CVE-2013-4441,0,0,ff1d4559957a22f34b67cccea7dfee29308027766431db74f9bef4d4c0967017,2020-01-30T19:51:23.100000 CVE-2013-4442,0,0,9c552868cf25b4d6a786b5342d5a1a7b3e9170effbee4d6fbd62a1b50914f7a3,2015-09-10T15:27:12.073000 CVE-2013-4443,0,0,c8c09677358423c266dc4a77749beab8ba41f1dcc9779e3e5ac8b4c4681dd816,2023-11-07T02:16:17.353000 CVE-2013-4444,0,0,beda469ca3d5f862d15e336392592a3d3b85cac4171f63d05110df967d86a8eb,2021-01-07T00:15:13.193000 -CVE-2013-4445,0,1,ac730f9c196e391ebf75dedcff4124e30acc27a875fe6cb4de6acf7040ae01f8,2024-11-21T01:55:34.967000 -CVE-2013-4446,0,1,8c2d0e41948ff31f769b5cf07a575d39c1925f755a3141f2661ed6a0d26fc3fe,2024-11-21T01:55:35.087000 -CVE-2013-4447,0,1,f0dff442c337525b47845b12fd108770948ecd97af2c0ae1aaf32ce50e099cda,2024-11-21T01:55:35.260000 +CVE-2013-4445,0,0,ac730f9c196e391ebf75dedcff4124e30acc27a875fe6cb4de6acf7040ae01f8,2024-11-21T01:55:34.967000 +CVE-2013-4446,0,0,8c2d0e41948ff31f769b5cf07a575d39c1925f755a3141f2661ed6a0d26fc3fe,2024-11-21T01:55:35.087000 +CVE-2013-4447,0,0,f0dff442c337525b47845b12fd108770948ecd97af2c0ae1aaf32ce50e099cda,2024-11-21T01:55:35.260000 CVE-2013-4448,0,0,28adc89087b705670540e7429d7c8bb2bfde397b0985bfd52ea0876ef8487890,2023-11-07T02:16:17.613000 -CVE-2013-4449,0,1,83f6ea2e2e28c772383b07abda53e387a2b9222fd4084c5a47f1ce6e6d63cd4e,2024-11-21T01:55:35.407000 -CVE-2013-4450,0,1,b0b3335a9a133de0f44e4ad1c122c3f5640efab681c70b703d94dee3d0fff89c,2024-11-21T01:55:35.550000 +CVE-2013-4449,0,0,83f6ea2e2e28c772383b07abda53e387a2b9222fd4084c5a47f1ce6e6d63cd4e,2024-11-21T01:55:35.407000 +CVE-2013-4450,0,0,b0b3335a9a133de0f44e4ad1c122c3f5640efab681c70b703d94dee3d0fff89c,2024-11-21T01:55:35.550000 CVE-2013-4451,0,0,19f23116ed8f3ffac5220fd419b7b0d6b1c93f2e9874978c43c6858d904280b1,2023-11-07T02:16:17.940000 -CVE-2013-4452,0,1,7961c7144d270bfbcc0dd93b1c089960f0215d3aba85e628be62e165ca2c335a,2024-11-21T01:55:35.820000 -CVE-2013-4453,0,1,3e1584be1a227c87321242cf4eb997369a926fae9088cf46fcf908e30c604e20,2024-11-21T01:55:35.940000 +CVE-2013-4452,0,0,7961c7144d270bfbcc0dd93b1c089960f0215d3aba85e628be62e165ca2c335a,2024-11-21T01:55:35.820000 +CVE-2013-4453,0,0,3e1584be1a227c87321242cf4eb997369a926fae9088cf46fcf908e30c604e20,2024-11-21T01:55:35.940000 CVE-2013-4454,0,0,3fd6a83b58118d0d46f5b875267a3a031e8c44b3fdfa736381ce48b8791dc519,2020-02-21T14:58:45.377000 -CVE-2013-4455,0,1,0a05c0c8ac381a9ae7d2ae0fcb0b3cfd5bf5cfc7b74a49fdcf99364da78d06b5,2024-11-21T01:55:36.193000 +CVE-2013-4455,0,0,0a05c0c8ac381a9ae7d2ae0fcb0b3cfd5bf5cfc7b74a49fdcf99364da78d06b5,2024-11-21T01:55:36.193000 CVE-2013-4456,0,0,55402bb494757def2700655563d3e1a3ce13acb6442dbf68afad6ad7ee5421b1,2023-11-07T02:16:18.060000 -CVE-2013-4457,0,1,5cba07f8c329eb3e15fec5d8c661066b0b92dd37720f90bd93b8d990fac0d7c7,2024-11-21T01:55:36.330000 -CVE-2013-4458,0,1,0c94f58c0a6a0b51ce8468cbe5e9b6af4ad9d954049f4978103ee7ebd767928e,2024-11-21T01:55:36.460000 -CVE-2013-4459,0,1,85baed273e48b1e6296a52ba9849c4aa443eb0c4539b739aded363afda7eaaeb,2024-11-21T01:55:36.593000 -CVE-2013-4460,0,1,0a1bf47714a101f70bd1fddd68781e22a1b3ac893f0ae8eaf2b1048cf6071131,2024-11-21T01:55:36.713000 -CVE-2013-4461,0,1,50e0c210df3bc1e40eac4da756c29dcc575a7d556341cf99970fe1a252ca091d,2024-11-21T01:55:36.877000 +CVE-2013-4457,0,0,5cba07f8c329eb3e15fec5d8c661066b0b92dd37720f90bd93b8d990fac0d7c7,2024-11-21T01:55:36.330000 +CVE-2013-4458,0,0,0c94f58c0a6a0b51ce8468cbe5e9b6af4ad9d954049f4978103ee7ebd767928e,2024-11-21T01:55:36.460000 +CVE-2013-4459,0,0,85baed273e48b1e6296a52ba9849c4aa443eb0c4539b739aded363afda7eaaeb,2024-11-21T01:55:36.593000 +CVE-2013-4460,0,0,0a1bf47714a101f70bd1fddd68781e22a1b3ac893f0ae8eaf2b1048cf6071131,2024-11-21T01:55:36.713000 +CVE-2013-4461,0,0,50e0c210df3bc1e40eac4da756c29dcc575a7d556341cf99970fe1a252ca091d,2024-11-21T01:55:36.877000 CVE-2013-4462,0,0,13517f524cf54929cdb5fec9c1f339cc2fab3d9a24c297a2fa459b8470652b7c,2020-01-31T15:49:35.697000 -CVE-2013-4463,0,1,fc32932b606ab4bb4292ab8c6e9007399420b16c9580fe9b018fe3ee3e74e411,2024-11-21T01:55:37.120000 +CVE-2013-4463,0,0,fc32932b606ab4bb4292ab8c6e9007399420b16c9580fe9b018fe3ee3e74e411,2024-11-21T01:55:37.120000 CVE-2013-4464,0,0,acf5f610568c0d41c0e2fdc335951032772b7d53308223c8cf6938722264a918,2023-11-07T02:16:18.457000 -CVE-2013-4465,0,1,9abe5e41e57a1ba82443bc007562c97bf615b879b470177f8962068c8e9a4c1a,2024-11-21T01:55:37.257000 -CVE-2013-4466,0,1,30fcb4eb61a998d15f559a6195dac355b3d8473062bc5746cefc4e4fd7d44719,2024-11-21T01:55:37.387000 -CVE-2013-4467,0,1,51c4137f8ac144113bacfe72e4aa04c570b20b0b6d9eb772bb46603681438d4f,2024-11-21T01:55:37.517000 -CVE-2013-4468,0,1,afaeaec86760f43e5c17435beee07d1f8c02b34d15287e96f1c8c9f05cb86d0f,2024-11-21T01:55:37.650000 -CVE-2013-4469,0,1,2b92a473b821ad3f9ac00b022c9591256856f789998b4443935fff14a2f06289,2024-11-21T01:55:37.780000 -CVE-2013-4470,0,1,bd5a5ecdde45a103ba3014615ff00bc92b3ffe7bf395c7dab9818c4058060a73,2024-11-21T01:55:37.890000 -CVE-2013-4471,0,1,a86402adcb2f46c25327b5c39b16f8643a3d75fb93d0b4557343365bb742ce32,2024-11-21T01:55:38.080000 -CVE-2013-4472,0,1,f7cda2c3c450eeec9e50bc310bab134a26f194b7c6c916c8c17fc0c40d995070,2024-11-21T01:55:38.193000 -CVE-2013-4473,0,1,f9ce0709e01cfddd642d8f6b16ef525db0b8e2a0808174e79088579ea0e16508,2024-11-21T01:55:38.320000 -CVE-2013-4474,0,1,3a15c1c34dbb547619100f5dd7a62999ea9df84c5aea8d669601a30062976a8c,2024-11-21T01:55:38.467000 -CVE-2013-4475,0,1,8c124982097a8bdc671fa9ff7b010e23c3103b8e9e1da65133391bb3c0aef03b,2024-11-21T01:55:38.617000 -CVE-2013-4476,0,1,e8363d7f689972bef99f3097aa01a0b8ce5c9a034c1db95985dcfbe2a2d8f80d,2024-11-21T01:55:38.760000 -CVE-2013-4477,0,1,8511eb243f2e776c5bc644e91955d9d94b9ce8012419c25a074d8d7a52b138f2,2024-11-21T01:55:38.870000 -CVE-2013-4478,0,1,1b16d4ca6814ad2d2a2003635bb0b8181d322b66b414c7c88f2ab11380a151fb,2024-11-21T01:55:38.980000 -CVE-2013-4479,0,1,90371aee4b98a43ae60ce71d376ee72796c63116e21cd74bb2656013740ebe94,2024-11-21T01:55:39.093000 -CVE-2013-4480,0,1,a54059b4c4f38cb57aed70bf65522256b340933150e9600d6d748983233bd6e9,2024-11-21T01:55:39.223000 -CVE-2013-4481,0,1,99a17b12cd3e7ac07784b652695dc3b7ec8772f2cbd95684946877c1f04c1dcc,2024-11-21T01:55:39.350000 -CVE-2013-4482,0,1,c8d91359392a0110c59b9219022942291ef7ab0cc3f86a567a1981701f26b6ad,2024-11-21T01:55:39.467000 -CVE-2013-4483,0,1,16c92b58e90b1dc514f08ec841a6d9e47df012fa934d3f3db32daabc5c1a2250,2024-11-21T01:55:39.570000 -CVE-2013-4484,0,1,68508764758520529b41a2fe3aca188a7c237e4a397e2587b9b4c5791f35f667,2024-11-21T01:55:39.730000 -CVE-2013-4485,0,1,e6abceb2073fa634d5d32aab0e21c0ffaf17ed63c5b02034d0b79f32d9139b54,2024-11-21T01:55:39.853000 +CVE-2013-4465,0,0,9abe5e41e57a1ba82443bc007562c97bf615b879b470177f8962068c8e9a4c1a,2024-11-21T01:55:37.257000 +CVE-2013-4466,0,0,30fcb4eb61a998d15f559a6195dac355b3d8473062bc5746cefc4e4fd7d44719,2024-11-21T01:55:37.387000 +CVE-2013-4467,0,0,51c4137f8ac144113bacfe72e4aa04c570b20b0b6d9eb772bb46603681438d4f,2024-11-21T01:55:37.517000 +CVE-2013-4468,0,0,afaeaec86760f43e5c17435beee07d1f8c02b34d15287e96f1c8c9f05cb86d0f,2024-11-21T01:55:37.650000 +CVE-2013-4469,0,0,2b92a473b821ad3f9ac00b022c9591256856f789998b4443935fff14a2f06289,2024-11-21T01:55:37.780000 +CVE-2013-4470,0,0,bd5a5ecdde45a103ba3014615ff00bc92b3ffe7bf395c7dab9818c4058060a73,2024-11-21T01:55:37.890000 +CVE-2013-4471,0,0,a86402adcb2f46c25327b5c39b16f8643a3d75fb93d0b4557343365bb742ce32,2024-11-21T01:55:38.080000 +CVE-2013-4472,0,0,f7cda2c3c450eeec9e50bc310bab134a26f194b7c6c916c8c17fc0c40d995070,2024-11-21T01:55:38.193000 +CVE-2013-4473,0,0,f9ce0709e01cfddd642d8f6b16ef525db0b8e2a0808174e79088579ea0e16508,2024-11-21T01:55:38.320000 +CVE-2013-4474,0,0,3a15c1c34dbb547619100f5dd7a62999ea9df84c5aea8d669601a30062976a8c,2024-11-21T01:55:38.467000 +CVE-2013-4475,0,0,8c124982097a8bdc671fa9ff7b010e23c3103b8e9e1da65133391bb3c0aef03b,2024-11-21T01:55:38.617000 +CVE-2013-4476,0,0,e8363d7f689972bef99f3097aa01a0b8ce5c9a034c1db95985dcfbe2a2d8f80d,2024-11-21T01:55:38.760000 +CVE-2013-4477,0,0,8511eb243f2e776c5bc644e91955d9d94b9ce8012419c25a074d8d7a52b138f2,2024-11-21T01:55:38.870000 +CVE-2013-4478,0,0,1b16d4ca6814ad2d2a2003635bb0b8181d322b66b414c7c88f2ab11380a151fb,2024-11-21T01:55:38.980000 +CVE-2013-4479,0,0,90371aee4b98a43ae60ce71d376ee72796c63116e21cd74bb2656013740ebe94,2024-11-21T01:55:39.093000 +CVE-2013-4480,0,0,a54059b4c4f38cb57aed70bf65522256b340933150e9600d6d748983233bd6e9,2024-11-21T01:55:39.223000 +CVE-2013-4481,0,0,99a17b12cd3e7ac07784b652695dc3b7ec8772f2cbd95684946877c1f04c1dcc,2024-11-21T01:55:39.350000 +CVE-2013-4482,0,0,c8d91359392a0110c59b9219022942291ef7ab0cc3f86a567a1981701f26b6ad,2024-11-21T01:55:39.467000 +CVE-2013-4483,0,0,16c92b58e90b1dc514f08ec841a6d9e47df012fa934d3f3db32daabc5c1a2250,2024-11-21T01:55:39.570000 +CVE-2013-4484,0,0,68508764758520529b41a2fe3aca188a7c237e4a397e2587b9b4c5791f35f667,2024-11-21T01:55:39.730000 +CVE-2013-4485,0,0,e6abceb2073fa634d5d32aab0e21c0ffaf17ed63c5b02034d0b79f32d9139b54,2024-11-21T01:55:39.853000 CVE-2013-4486,0,0,640dc42b02e5a80bf824609c2d4193f6301b82f335e04e4bba87aa69816250f3,2019-12-05T21:10:12.007000 -CVE-2013-4487,0,1,63dd8350ae4cbb93b8a66b77957ebc36af8710e9ebb7f02935378e4ddc80ca1d,2024-11-21T01:55:40.070000 +CVE-2013-4487,0,0,63dd8350ae4cbb93b8a66b77957ebc36af8710e9ebb7f02935378e4ddc80ca1d,2024-11-21T01:55:40.070000 CVE-2013-4488,0,0,7bb9ff713644124acba49748b655bfc62ee8a06b728d6973fade7ba44bf02034,2023-02-13T04:47:02.127000 -CVE-2013-4489,0,1,2318ed7acd86c103708b829f1d080c5517fed7d02fd558529f8f00da0b9a04b9,2024-11-21T01:55:40.310000 -CVE-2013-4490,0,1,c1cfc7f59ed3a304ef891856e68997d4f3737e1a4c2954d0563920304377d75f,2024-11-21T01:55:40.433000 -CVE-2013-4491,0,1,d6788ca639a28cea9994eb781a05a1d46586a3b84b6935fed1a681f69ecc3d6b,2024-11-21T01:55:40.540000 -CVE-2013-4492,0,1,834cfa497c5eee7964dda0657e628cade648e8198da72099f5d51b5acd5dbfd8,2024-11-21T01:55:40.687000 +CVE-2013-4489,0,0,2318ed7acd86c103708b829f1d080c5517fed7d02fd558529f8f00da0b9a04b9,2024-11-21T01:55:40.310000 +CVE-2013-4490,0,0,c1cfc7f59ed3a304ef891856e68997d4f3737e1a4c2954d0563920304377d75f,2024-11-21T01:55:40.433000 +CVE-2013-4491,0,0,d6788ca639a28cea9994eb781a05a1d46586a3b84b6935fed1a681f69ecc3d6b,2024-11-21T01:55:40.540000 +CVE-2013-4492,0,0,834cfa497c5eee7964dda0657e628cade648e8198da72099f5d51b5acd5dbfd8,2024-11-21T01:55:40.687000 CVE-2013-4493,0,0,23c4f2096051bb2bc482f5559e53a163a81a0840a4fdd445de6ffbcc89937393,2023-11-07T02:16:19.213000 -CVE-2013-4494,0,1,eea6176ff7dd61f0f47252d705cc2e2438196f0acdd5e0cbb9584977f898ee86,2024-11-21T01:55:40.827000 -CVE-2013-4495,0,1,7f3e0fb696c41468a394f19faa31b42ad7028d5408a0b4778c86148a159d8849,2024-11-21T01:55:40.947000 -CVE-2013-4496,0,1,77deb2d4ec0c4c949f1d93c1da2d171d5ad48eeb48ac790d84816d786ca19719,2024-11-21T01:55:41.067000 -CVE-2013-4497,0,1,9b1120f81e608f44c25286b32df88df42dd614a8fde5cc70d5fc5ffae940a1b0,2024-11-21T01:55:41.200000 -CVE-2013-4498,0,1,74e9396a90bc2ab2bb6e1f011863caaef2acbec78f406670b29541eaceb60508,2024-11-21T01:55:41.303000 -CVE-2013-4499,0,1,ae5d8feaba5e1db97dfa35a8180c9597cb3190d6f0f58438c3dd2416bd7dd066,2024-11-21T01:55:41.413000 -CVE-2013-4500,0,1,508463ddf0889b9a02a16dd3f51d58a4d2bf911614fb47a63ea1ebd453a55959,2024-11-21T01:55:41.513000 -CVE-2013-4501,0,1,bb98ac3c205c360ca6a0aec366d043579f201b228e9b7086fd7fce7716cfe905,2024-11-21T01:55:41.620000 -CVE-2013-4502,0,1,49d842fdcdeebbf797fbbafd9a8d1753ba773b571cbf01c2d13bfee7754ddfb6,2024-11-21T01:55:41.730000 -CVE-2013-4503,0,1,02e2db01142fa305a956d3139090bb2d642ddfa89bfe047d35a1b0f3ce5c3c8b,2024-11-21T01:55:41.837000 -CVE-2013-4504,0,1,0225504cd06f06b43b92ab5f6efcca462061da95760c252f792626b8f2448006,2024-11-21T01:55:41.953000 -CVE-2013-4505,0,1,d98734e2c54ce92df659438d229aa660d8fef38dce1f4514dcc581f79a7b1aac,2024-11-21T01:55:42.063000 +CVE-2013-4494,0,0,eea6176ff7dd61f0f47252d705cc2e2438196f0acdd5e0cbb9584977f898ee86,2024-11-21T01:55:40.827000 +CVE-2013-4495,0,0,7f3e0fb696c41468a394f19faa31b42ad7028d5408a0b4778c86148a159d8849,2024-11-21T01:55:40.947000 +CVE-2013-4496,0,0,77deb2d4ec0c4c949f1d93c1da2d171d5ad48eeb48ac790d84816d786ca19719,2024-11-21T01:55:41.067000 +CVE-2013-4497,0,0,9b1120f81e608f44c25286b32df88df42dd614a8fde5cc70d5fc5ffae940a1b0,2024-11-21T01:55:41.200000 +CVE-2013-4498,0,0,74e9396a90bc2ab2bb6e1f011863caaef2acbec78f406670b29541eaceb60508,2024-11-21T01:55:41.303000 +CVE-2013-4499,0,0,ae5d8feaba5e1db97dfa35a8180c9597cb3190d6f0f58438c3dd2416bd7dd066,2024-11-21T01:55:41.413000 +CVE-2013-4500,0,0,508463ddf0889b9a02a16dd3f51d58a4d2bf911614fb47a63ea1ebd453a55959,2024-11-21T01:55:41.513000 +CVE-2013-4501,0,0,bb98ac3c205c360ca6a0aec366d043579f201b228e9b7086fd7fce7716cfe905,2024-11-21T01:55:41.620000 +CVE-2013-4502,0,0,49d842fdcdeebbf797fbbafd9a8d1753ba773b571cbf01c2d13bfee7754ddfb6,2024-11-21T01:55:41.730000 +CVE-2013-4503,0,0,02e2db01142fa305a956d3139090bb2d642ddfa89bfe047d35a1b0f3ce5c3c8b,2024-11-21T01:55:41.837000 +CVE-2013-4504,0,0,0225504cd06f06b43b92ab5f6efcca462061da95760c252f792626b8f2448006,2024-11-21T01:55:41.953000 +CVE-2013-4505,0,0,d98734e2c54ce92df659438d229aa660d8fef38dce1f4514dcc581f79a7b1aac,2024-11-21T01:55:42.063000 CVE-2013-4506,0,0,721d49e6ad1946707488ec2b338f6f38c5229d0338d070b394e0451990f05c6c,2023-11-07T02:16:19.600000 -CVE-2013-4507,0,1,5a6cdf0503478a9ce7163c7bcab55db4beecdaf59a2288022dbe1ea2e20e0cbe,2024-11-21T01:55:42.183000 -CVE-2013-4508,0,1,1ce0fa7dc5d7e2ee5d3b3436cbb7caac73080dfb3ce75da67fe691d0606a3b2a,2024-11-21T01:55:42.283000 -CVE-2013-4509,0,1,53b653b44b80d00d8ff88fcaf8dd5332c744badcdafd37dae4fb3ce79605eb51,2024-11-21T01:55:42.397000 -CVE-2013-4510,0,1,2fc44e8ee69bec492ec4a3f484fac4e68b84deae4ce5f4d29c0da0739c98cb87,2024-11-21T01:55:42.497000 -CVE-2013-4511,0,1,eeb527db6df8b6f03803f7a952f3bc5d06c46383d7c96c64a56971c0f4a478f4,2024-11-21T01:55:42.593000 -CVE-2013-4512,0,1,f38c91b192be9293d67aac57331846531e0dca3a67974263e0725e4dc6fd8219,2024-11-21T01:55:42.743000 -CVE-2013-4513,0,1,df4879f5be335d3a4b0d594bdb2fbd736baef0cb91549f0de28a8b6c26371806,2024-11-21T01:55:42.887000 -CVE-2013-4514,0,1,70b1f53d5afaadac7da91e7428299f900cbfb38f3fd8924bc368cb50e13d83cc,2024-11-21T01:55:43.030000 -CVE-2013-4515,0,1,a981d80174c60f7e4739d3b59cd2e5af41dc45dab67bdfb331062f1e4b301207,2024-11-21T01:55:43.187000 -CVE-2013-4516,0,1,f4c149b781c28ae94e06129723868c3ef6d4c1662d92337aced8da33fe467a7e,2024-11-21T01:55:43.350000 -CVE-2013-4517,0,1,25805ad836e986f82a8b643454e06b3596d451388c5a4b1157b28aef7d404064,2024-11-21T01:55:43.497000 +CVE-2013-4507,0,0,5a6cdf0503478a9ce7163c7bcab55db4beecdaf59a2288022dbe1ea2e20e0cbe,2024-11-21T01:55:42.183000 +CVE-2013-4508,0,0,1ce0fa7dc5d7e2ee5d3b3436cbb7caac73080dfb3ce75da67fe691d0606a3b2a,2024-11-21T01:55:42.283000 +CVE-2013-4509,0,0,53b653b44b80d00d8ff88fcaf8dd5332c744badcdafd37dae4fb3ce79605eb51,2024-11-21T01:55:42.397000 +CVE-2013-4510,0,0,2fc44e8ee69bec492ec4a3f484fac4e68b84deae4ce5f4d29c0da0739c98cb87,2024-11-21T01:55:42.497000 +CVE-2013-4511,0,0,eeb527db6df8b6f03803f7a952f3bc5d06c46383d7c96c64a56971c0f4a478f4,2024-11-21T01:55:42.593000 +CVE-2013-4512,0,0,f38c91b192be9293d67aac57331846531e0dca3a67974263e0725e4dc6fd8219,2024-11-21T01:55:42.743000 +CVE-2013-4513,0,0,df4879f5be335d3a4b0d594bdb2fbd736baef0cb91549f0de28a8b6c26371806,2024-11-21T01:55:42.887000 +CVE-2013-4514,0,0,70b1f53d5afaadac7da91e7428299f900cbfb38f3fd8924bc368cb50e13d83cc,2024-11-21T01:55:43.030000 +CVE-2013-4515,0,0,a981d80174c60f7e4739d3b59cd2e5af41dc45dab67bdfb331062f1e4b301207,2024-11-21T01:55:43.187000 +CVE-2013-4516,0,0,f4c149b781c28ae94e06129723868c3ef6d4c1662d92337aced8da33fe467a7e,2024-11-21T01:55:43.350000 +CVE-2013-4517,0,0,25805ad836e986f82a8b643454e06b3596d451388c5a4b1157b28aef7d404064,2024-11-21T01:55:43.497000 CVE-2013-4518,0,0,39e88fb238dff84e42cf14b2bda7d8c3202f38b70d01a838763646291b60396e,2019-11-06T15:12:38.667000 -CVE-2013-4519,0,1,035d21e31e95431669fb0e4d6cd92d3754b1d22dbb9bbc75ca76987636c3450c,2024-11-21T01:55:43.743000 -CVE-2013-4520,0,1,04d6a304fae98bcb2b8a6970008ae4896e833b36c9ad2be927f35cbc73b5b501,2024-11-21T01:55:43.860000 +CVE-2013-4519,0,0,035d21e31e95431669fb0e4d6cd92d3754b1d22dbb9bbc75ca76987636c3450c,2024-11-21T01:55:43.743000 +CVE-2013-4520,0,0,04d6a304fae98bcb2b8a6970008ae4896e833b36c9ad2be927f35cbc73b5b501,2024-11-21T01:55:43.860000 CVE-2013-4521,0,0,1abf7ea2d6c580137aeb4ac914020669d045ee42eff38edc8e85452be9e9654d,2020-02-13T17:24:54.770000 -CVE-2013-4522,0,1,94a4ff54ba76d144ab9deeb6feeb781e6396177b4a4c98d373f19aa7dc9f5e8f,2024-11-21T01:55:44.087000 -CVE-2013-4523,0,1,7097e2a47fe1a5722e70390a7ae2eb88128a45f44cafc90452bd0ea0189ee17e,2024-11-21T01:55:44.207000 -CVE-2013-4524,0,1,23cee03f3bb960ad038eb2c53b13215a5ea3610b79115290a81fe945ef922835,2024-11-21T01:55:44.330000 -CVE-2013-4525,0,1,b4368a6ab0da49c0b5c3a78a647269b57c9918d6d9a0b1d5e8c909822227f49c,2024-11-21T01:55:44.453000 +CVE-2013-4522,0,0,94a4ff54ba76d144ab9deeb6feeb781e6396177b4a4c98d373f19aa7dc9f5e8f,2024-11-21T01:55:44.087000 +CVE-2013-4523,0,0,7097e2a47fe1a5722e70390a7ae2eb88128a45f44cafc90452bd0ea0189ee17e,2024-11-21T01:55:44.207000 +CVE-2013-4524,0,0,23cee03f3bb960ad038eb2c53b13215a5ea3610b79115290a81fe945ef922835,2024-11-21T01:55:44.330000 +CVE-2013-4525,0,0,b4368a6ab0da49c0b5c3a78a647269b57c9918d6d9a0b1d5e8c909822227f49c,2024-11-21T01:55:44.453000 CVE-2013-4526,0,0,d4e76437d8b7652a717599ea20be6da9dcfb9ce2f203519bad1e77a03adb3174,2023-02-13T00:28:59.240000 CVE-2013-4527,0,0,5b8aa85218eee975de4220a47537c4897c33214f389280ca2376f1442d68302e,2023-02-13T04:47:09.300000 CVE-2013-4528,0,0,0daca4427d90ac08c3a7b46341cb9ecccc2e1447ebeee2991a2af8c94ef9baa3,2023-11-07T02:16:20.080000 @@ -61922,55 +61922,55 @@ CVE-2013-4540,0,0,1086dfd3e72b78f34ddedacd784f518a222db3901a593419f73be73ca919ef CVE-2013-4541,0,0,62bb7b43a326096ab1188083dac2a33de01dceeb32ce9fac1f3c979618295382,2023-02-13T04:47:30.207000 CVE-2013-4542,0,0,4c8c015213bfc5c078da3909225b43bfc4c87c6879aeb2ed953e5f8e2b430f39,2023-02-13T04:47:30.420000 CVE-2013-4543,0,0,1e4ac4b573f09ccb0376e0f85a61a86b4756d85c389a8f1ea401eb8988852614,2023-11-07T02:16:20.500000 -CVE-2013-4544,0,1,762be1dc4bd5f4b12f13c87277744e302690977787e19d9ab663cd691a3a787d,2024-11-21T01:55:47.977000 -CVE-2013-4545,0,1,84a8a6d394807ed3358105f7323d4ac751d1c7258705b7d732c279808ed0ca00,2024-11-21T01:55:48.107000 -CVE-2013-4546,0,1,bb279f33ed14f9ad4fb85dee7e198f1f93b4f43ad5af92cda3a40d7db1b6a66f,2024-11-21T01:55:48.237000 -CVE-2013-4547,0,1,b478c739e75ab41928e75e0237d973e85dafaa535ce5d33e9087ce887bf4e7aa,2024-11-21T01:55:48.360000 -CVE-2013-4548,0,1,355afce858f2110786c81479a88582ee1c7f176eee993345a6d24039a4203e75,2024-11-21T01:55:48.490000 -CVE-2013-4549,0,1,aa7efe361f575f2bf25319a59e070b6207a8b7c53d865d8c0ed0b5dd2b7b49cb,2024-11-21T01:55:48.603000 -CVE-2013-4550,0,1,dff7b9869f97b48239fe669c8b086ef1fef3487eb9f1801d252b616070ee54a9,2024-11-21T01:55:48.747000 -CVE-2013-4551,0,1,b508e5575c50a7ac5ae1016ea6ee7bfd3c09773aa20ca58e0fa25fe82a29503f,2024-11-21T01:55:48.863000 -CVE-2013-4552,0,1,412e26066b355e5503d7ff2fddd617541a2bcc81d6a0f75b945ae847b1cdb83c,2024-11-21T01:55:48.977000 -CVE-2013-4553,0,1,f0a701d921117e72d7e372afd0deb7a219673a47428b0bd61f51dc60c6be01bd,2024-11-21T01:55:49.093000 -CVE-2013-4554,0,1,568012d274d23d46d7f6f726470fb2588c6ccaa4486f9a1d21cd996a05d18724,2024-11-21T01:55:49.203000 -CVE-2013-4555,0,1,d64ffaf28f94938d9c7eaab10dc4d5259831b915de39f9d3f9d0173d77b55c5a,2024-11-21T01:55:49.327000 -CVE-2013-4556,0,1,e91beb6b0388dda3d10b149cc120d4f0418e7631ecfbff2aa1ff9c8ddc3ee4a7,2024-11-21T01:55:49.447000 -CVE-2013-4557,0,1,86939ad1f139dae3d6d6f7be592abf474010303187cff7dbe8967647dee17151,2024-11-21T01:55:49.577000 -CVE-2013-4558,0,1,45fff0c98a6e0b31331a187a29398e068bf1b49fbd48379d59774e5909f4646e,2024-11-21T01:55:49.690000 -CVE-2013-4559,0,1,c0c4cbbd9ab337549ca8e6f359ffd6b0b0811db6eb56ca97142fc8bb1eaf9dc0,2024-11-21T01:55:49.813000 -CVE-2013-4560,0,1,c206b561ce0daeb0eb630185e09b4dbd956ebb76f2038eb406a9d2e491f7a0f1,2024-11-21T01:55:49.940000 +CVE-2013-4544,0,0,762be1dc4bd5f4b12f13c87277744e302690977787e19d9ab663cd691a3a787d,2024-11-21T01:55:47.977000 +CVE-2013-4545,0,0,84a8a6d394807ed3358105f7323d4ac751d1c7258705b7d732c279808ed0ca00,2024-11-21T01:55:48.107000 +CVE-2013-4546,0,0,bb279f33ed14f9ad4fb85dee7e198f1f93b4f43ad5af92cda3a40d7db1b6a66f,2024-11-21T01:55:48.237000 +CVE-2013-4547,0,0,b478c739e75ab41928e75e0237d973e85dafaa535ce5d33e9087ce887bf4e7aa,2024-11-21T01:55:48.360000 +CVE-2013-4548,0,0,355afce858f2110786c81479a88582ee1c7f176eee993345a6d24039a4203e75,2024-11-21T01:55:48.490000 +CVE-2013-4549,0,0,aa7efe361f575f2bf25319a59e070b6207a8b7c53d865d8c0ed0b5dd2b7b49cb,2024-11-21T01:55:48.603000 +CVE-2013-4550,0,0,dff7b9869f97b48239fe669c8b086ef1fef3487eb9f1801d252b616070ee54a9,2024-11-21T01:55:48.747000 +CVE-2013-4551,0,0,b508e5575c50a7ac5ae1016ea6ee7bfd3c09773aa20ca58e0fa25fe82a29503f,2024-11-21T01:55:48.863000 +CVE-2013-4552,0,0,412e26066b355e5503d7ff2fddd617541a2bcc81d6a0f75b945ae847b1cdb83c,2024-11-21T01:55:48.977000 +CVE-2013-4553,0,0,f0a701d921117e72d7e372afd0deb7a219673a47428b0bd61f51dc60c6be01bd,2024-11-21T01:55:49.093000 +CVE-2013-4554,0,0,568012d274d23d46d7f6f726470fb2588c6ccaa4486f9a1d21cd996a05d18724,2024-11-21T01:55:49.203000 +CVE-2013-4555,0,0,d64ffaf28f94938d9c7eaab10dc4d5259831b915de39f9d3f9d0173d77b55c5a,2024-11-21T01:55:49.327000 +CVE-2013-4556,0,0,e91beb6b0388dda3d10b149cc120d4f0418e7631ecfbff2aa1ff9c8ddc3ee4a7,2024-11-21T01:55:49.447000 +CVE-2013-4557,0,0,86939ad1f139dae3d6d6f7be592abf474010303187cff7dbe8967647dee17151,2024-11-21T01:55:49.577000 +CVE-2013-4558,0,0,45fff0c98a6e0b31331a187a29398e068bf1b49fbd48379d59774e5909f4646e,2024-11-21T01:55:49.690000 +CVE-2013-4559,0,0,c0c4cbbd9ab337549ca8e6f359ffd6b0b0811db6eb56ca97142fc8bb1eaf9dc0,2024-11-21T01:55:49.813000 +CVE-2013-4560,0,0,c206b561ce0daeb0eb630185e09b4dbd956ebb76f2038eb406a9d2e491f7a0f1,2024-11-21T01:55:49.940000 CVE-2013-4561,0,0,065bf6e1266777dd9426fab905a5635603f819f96654f7e3b4414b0c4eedfb4d,2022-07-11T17:41:59.077000 -CVE-2013-4562,0,1,3256ada22b193aef54f1d84752b221da97755600c08f33a101bb0cfd4065c416,2024-11-21T01:55:50.177000 -CVE-2013-4563,0,1,196eb25104df5f804a07b78d1bc931163a8042238155e902e488435b0a4b9ed6,2024-11-21T01:55:50.287000 -CVE-2013-4564,0,1,394c621bfd4865806f2fcf9bd0056303b4614ee91a157311c708ddef92cffb4f,2024-11-21T01:55:50.403000 -CVE-2013-4565,0,1,89480088c327ba3fd35b2043ccf186e4f118316f9f1c3e921c2be479aca37f00,2024-11-21T01:55:50.520000 -CVE-2013-4566,0,1,daa4abc187b5896b277dcc1bf01d03ee99368d75b929a38ce287ceaeee9d9117,2024-11-21T01:55:50.657000 -CVE-2013-4567,0,1,b0c3bf4766cf0cf77cc65083eb8138cb1e0ace3151faf3941e93c018dbc4badb,2024-11-21T01:55:50.780000 -CVE-2013-4568,0,1,f7c3e162dedf43f2091f4066f695414388c29d4c48770d8824d860f3f035c359,2024-11-21T01:55:50.900000 -CVE-2013-4569,0,1,960bccc13a68608d872544ce9eeaced187a7180b3667d2a26dc6c26340a6080e,2024-11-21T01:55:51.013000 -CVE-2013-4570,0,1,2f5cd187a41391382c1170f63d8de78d0e819d229f938a57a2e1c073d9eebe8a,2024-11-21T01:55:51.127000 -CVE-2013-4571,0,1,8474d7837aaca1398902bf2fe504d113940e40de4984064d66412c9eae46c565,2024-11-21T01:55:51.237000 +CVE-2013-4562,0,0,3256ada22b193aef54f1d84752b221da97755600c08f33a101bb0cfd4065c416,2024-11-21T01:55:50.177000 +CVE-2013-4563,0,0,196eb25104df5f804a07b78d1bc931163a8042238155e902e488435b0a4b9ed6,2024-11-21T01:55:50.287000 +CVE-2013-4564,0,0,394c621bfd4865806f2fcf9bd0056303b4614ee91a157311c708ddef92cffb4f,2024-11-21T01:55:50.403000 +CVE-2013-4565,0,0,89480088c327ba3fd35b2043ccf186e4f118316f9f1c3e921c2be479aca37f00,2024-11-21T01:55:50.520000 +CVE-2013-4566,0,0,daa4abc187b5896b277dcc1bf01d03ee99368d75b929a38ce287ceaeee9d9117,2024-11-21T01:55:50.657000 +CVE-2013-4567,0,0,b0c3bf4766cf0cf77cc65083eb8138cb1e0ace3151faf3941e93c018dbc4badb,2024-11-21T01:55:50.780000 +CVE-2013-4568,0,0,f7c3e162dedf43f2091f4066f695414388c29d4c48770d8824d860f3f035c359,2024-11-21T01:55:50.900000 +CVE-2013-4569,0,0,960bccc13a68608d872544ce9eeaced187a7180b3667d2a26dc6c26340a6080e,2024-11-21T01:55:51.013000 +CVE-2013-4570,0,0,2f5cd187a41391382c1170f63d8de78d0e819d229f938a57a2e1c073d9eebe8a,2024-11-21T01:55:51.127000 +CVE-2013-4571,0,0,8474d7837aaca1398902bf2fe504d113940e40de4984064d66412c9eae46c565,2024-11-21T01:55:51.237000 CVE-2013-4572,0,0,fb261aa9fcd948b2418414c36a244d5731b1a463929433c839d442a3b16842f2,2020-02-10T19:40:09.113000 -CVE-2013-4573,0,1,a4b80a0ff80e3c1d365bfd1fc1a72850eaed9b181db776dde235cf0975b9ef3b,2024-11-21T01:55:51.463000 -CVE-2013-4574,0,1,829ffcde9e82dd0afdc7b5453f539097955913a8e78ff80633ee976a5a2801db,2024-11-21T01:55:51.567000 -CVE-2013-4575,0,1,95df00183b7dafff0d5dcd804249edce74fd595875364d38e75fee02c3530db5,2024-11-21T01:55:51.670000 -CVE-2013-4576,0,1,5f3f7da3c7c976ca730e343cf0409493e18622d8a4eb719860a4a993b83f4788,2024-11-21T01:55:51.773000 -CVE-2013-4577,0,1,21b68fb82b36c0a5f5c1c284d0fa1911ad04e33dd4ae265d4b1c992a0b8e0a68,2024-11-21T01:55:51.900000 +CVE-2013-4573,0,0,a4b80a0ff80e3c1d365bfd1fc1a72850eaed9b181db776dde235cf0975b9ef3b,2024-11-21T01:55:51.463000 +CVE-2013-4574,0,0,829ffcde9e82dd0afdc7b5453f539097955913a8e78ff80633ee976a5a2801db,2024-11-21T01:55:51.567000 +CVE-2013-4575,0,0,95df00183b7dafff0d5dcd804249edce74fd595875364d38e75fee02c3530db5,2024-11-21T01:55:51.670000 +CVE-2013-4576,0,0,5f3f7da3c7c976ca730e343cf0409493e18622d8a4eb719860a4a993b83f4788,2024-11-21T01:55:51.773000 +CVE-2013-4577,0,0,21b68fb82b36c0a5f5c1c284d0fa1911ad04e33dd4ae265d4b1c992a0b8e0a68,2024-11-21T01:55:51.900000 CVE-2013-4578,0,0,81e1412bbfb82eed51991f4b85462587a621b6917c00e552077c1f3821adf611,2018-01-17T17:59:30.147000 -CVE-2013-4579,0,1,bd34f0ebe9bc835ceaf72adca597297998aab63ed1c3495dcd9813460e814525,2024-11-21T01:55:52.140000 -CVE-2013-4580,0,1,9f0a5ec71472e9ebf1c0030bf2e85c44b7a092dc667679cb844341acdfd15748,2024-11-21T01:55:52.300000 -CVE-2013-4581,0,1,fc12a752e2df84ddf3ab1e67e86d2df843f0db77c5aadd7f22a4ab6744f08db5,2024-11-21T01:55:52.430000 +CVE-2013-4579,0,0,bd34f0ebe9bc835ceaf72adca597297998aab63ed1c3495dcd9813460e814525,2024-11-21T01:55:52.140000 +CVE-2013-4580,0,0,9f0a5ec71472e9ebf1c0030bf2e85c44b7a092dc667679cb844341acdfd15748,2024-11-21T01:55:52.300000 +CVE-2013-4581,0,0,fc12a752e2df84ddf3ab1e67e86d2df843f0db77c5aadd7f22a4ab6744f08db5,2024-11-21T01:55:52.430000 CVE-2013-4582,0,0,410bb32c59981f8f19cd3e5df67e31ff9a895d411a753dfaa571d7c22cfce042,2020-02-04T22:15:21.777000 CVE-2013-4583,0,0,dcc2e9c2d7b7e162603ae7a4950e96d0798fea6672ddff185eb33b823dcaf352,2020-02-03T21:26:50.277000 CVE-2013-4584,0,0,02e9d01d97ded7a9bd91d2da50ef1bb434450e6e5546e9cf24189b3a795bc387,2023-12-20T01:36:30.740000 CVE-2013-4585,0,0,cc45f82ca703ece78866b099552a993f1df52a85afe8708a627eefbae5a73b6e,2023-11-07T02:16:21.140000 CVE-2013-4586,0,0,c3be6b2ef02d36c8968564573065d06152801a40fb71932ab58e88da792d944f,2023-11-07T02:16:21.363000 -CVE-2013-4587,0,1,1eb41dbba41ad7ee2f5585fecb434cf254c707cd2c0020d4bfdcf2a56212d7ac,2024-11-21T01:55:52.960000 -CVE-2013-4588,0,1,c16cc612b9d69321d68ee93616bf7dd8175ae31bbab56ff8bd6e47bf7ff59b87,2024-11-21T01:55:53.113000 -CVE-2013-4589,0,1,6977bede2dcf49e8488ed053a6280917fe287fb603b242cdd7d346811b463500,2024-11-21T01:55:53.233000 -CVE-2013-4590,0,1,dcb4fbc89145ff15050c75ff42f79327ab8003d980defe1ad1dd60f5abc8b696,2024-11-21T01:55:53.383000 -CVE-2013-4591,0,1,2ff63b956249384fc3f200982acbb3c3341a0fc6a3a8f26a5ae912050d8565ba,2024-11-21T01:55:53.577000 -CVE-2013-4592,0,1,aa473a644304a282196591d10473ea2338840d02ea7c17038fef63c5a1c35207,2024-11-21T01:55:53.720000 +CVE-2013-4587,0,0,1eb41dbba41ad7ee2f5585fecb434cf254c707cd2c0020d4bfdcf2a56212d7ac,2024-11-21T01:55:52.960000 +CVE-2013-4588,0,0,c16cc612b9d69321d68ee93616bf7dd8175ae31bbab56ff8bd6e47bf7ff59b87,2024-11-21T01:55:53.113000 +CVE-2013-4589,0,0,6977bede2dcf49e8488ed053a6280917fe287fb603b242cdd7d346811b463500,2024-11-21T01:55:53.233000 +CVE-2013-4590,0,0,dcb4fbc89145ff15050c75ff42f79327ab8003d980defe1ad1dd60f5abc8b696,2024-11-21T01:55:53.383000 +CVE-2013-4591,0,0,2ff63b956249384fc3f200982acbb3c3341a0fc6a3a8f26a5ae912050d8565ba,2024-11-21T01:55:53.577000 +CVE-2013-4592,0,0,aa473a644304a282196591d10473ea2338840d02ea7c17038fef63c5a1c35207,2024-11-21T01:55:53.720000 CVE-2013-4593,0,0,76c4e845b48116b789e307275e13533786ff770b1bfbfb97477bcf5521f13f0e,2019-12-16T15:08:57.730000 CVE-2013-4594,0,0,9a26a3091bb58d6e4bcdfb8073a5c112f564a57dcb83de2e0aab824fe09a8275,2014-10-31T01:16:51.693000 CVE-2013-4595,0,0,1d9a3fe01885aba9a37a9b5775fd968ed0c5414679ca2d7101a66f3c28f5b784,2014-06-24T15:37:12.467000 @@ -61978,229 +61978,229 @@ CVE-2013-4596,0,0,4dd33b43b3ec29f2e03ffcf2421cf31847912678e7c9a389d0817dcb652c31 CVE-2013-4597,0,0,c5217d8419a4d55b29e22f69942c6dd9f5961950f2c38d9adeb1300c03a230fb,2014-06-24T15:10:09.547000 CVE-2013-4598,0,0,a92988adb90cf6e86c66004134e5e3bba88208b56a74148a7b7c49199542219d,2017-07-11T13:53:44.973000 CVE-2013-4599,0,0,eb657d63b9417fc96d5792fa303d1530646d7f464cd46ac8e5ece70205bfcf15,2014-06-25T16:59:03.427000 -CVE-2013-4600,0,1,f1665e3692cdcbc557041b9212ac237b2ce73a4bad626d2561f1e5913571cee1,2024-11-21T01:55:54.683000 +CVE-2013-4600,0,0,f1665e3692cdcbc557041b9212ac237b2ce73a4bad626d2561f1e5913571cee1,2024-11-21T01:55:54.683000 CVE-2013-4602,0,0,4d2106834b1cb13fce7ec74533e351493ecdb94d8f4bd0fbc00f1814d424c8ac,2020-02-18T19:10:07.460000 -CVE-2013-4604,0,1,f564d2f490aa81a232d3adbb69a3f1ff341571486b24f5d255a3659eaa7587ee,2024-11-21T01:55:54.993000 -CVE-2013-4608,0,1,de6b777be0e296cbdd19c951e860df63f2d8f1c735b1a2ea05fe274afb50ffb5,2024-11-21T01:55:55.130000 -CVE-2013-4609,0,1,f889b81de9155264ba48f26b4e4cafd409c4f745af444184665f3ea26b72d1a5,2024-11-21T01:55:55.270000 -CVE-2013-4610,0,1,69b397c6b7bc21f5bf4fbb0a983d66c2e6dad66a5098f38c14c4dbf00d861d30,2024-11-21T01:55:55.410000 -CVE-2013-4611,0,1,6c453ed7df4e22138d3504c94e34e9cabb7bb2d7f465caa0d90a43b9202543ba,2024-11-21T01:55:55.550000 -CVE-2013-4612,0,1,dc4f31d35422fbc070e617b2ab889f8ace3f9478b5cd6566a872a66da3b03242,2024-11-21T01:55:55.690000 -CVE-2013-4613,0,1,aeac7afea9ea34cb41466fd649146a0edc6b721e2f31472e78b42c807ef68417,2024-11-21T01:55:55.860000 -CVE-2013-4614,0,1,8b8fc910f3179652c657da5649c35c55879d0d5b9e0e12880584d7c69d3f5364,2024-11-21T01:55:56.013000 -CVE-2013-4615,0,1,4c6a0879c32a726253a014b20d0b41936d97511a0b79e77f4c8d1eae904bb0f0,2024-11-21T01:55:56.153000 -CVE-2013-4616,0,1,5407e45dba659f19aa41567303af737e5c2978d1fe8313387e6bbb21cf884667,2024-11-21T01:55:56.293000 -CVE-2013-4617,0,1,a09fe73e5e4cdb78222cce40bba4c1a11f9c348a350674e5f04fb04a43f9d4cb,2024-11-21T01:55:56.453000 -CVE-2013-4619,0,1,b23a408837edb610d21640e8de8abc1a100af7224c58c9fca877518019abaab7,2024-11-21T01:55:56.600000 -CVE-2013-4620,0,1,de652fae5f57306f166e829fabc6dc7de5948623bd73a0e0b88260ba9fa20a17,2024-11-21T01:55:56.737000 +CVE-2013-4604,0,0,f564d2f490aa81a232d3adbb69a3f1ff341571486b24f5d255a3659eaa7587ee,2024-11-21T01:55:54.993000 +CVE-2013-4608,0,0,de6b777be0e296cbdd19c951e860df63f2d8f1c735b1a2ea05fe274afb50ffb5,2024-11-21T01:55:55.130000 +CVE-2013-4609,0,0,f889b81de9155264ba48f26b4e4cafd409c4f745af444184665f3ea26b72d1a5,2024-11-21T01:55:55.270000 +CVE-2013-4610,0,0,69b397c6b7bc21f5bf4fbb0a983d66c2e6dad66a5098f38c14c4dbf00d861d30,2024-11-21T01:55:55.410000 +CVE-2013-4611,0,0,6c453ed7df4e22138d3504c94e34e9cabb7bb2d7f465caa0d90a43b9202543ba,2024-11-21T01:55:55.550000 +CVE-2013-4612,0,0,dc4f31d35422fbc070e617b2ab889f8ace3f9478b5cd6566a872a66da3b03242,2024-11-21T01:55:55.690000 +CVE-2013-4613,0,0,aeac7afea9ea34cb41466fd649146a0edc6b721e2f31472e78b42c807ef68417,2024-11-21T01:55:55.860000 +CVE-2013-4614,0,0,8b8fc910f3179652c657da5649c35c55879d0d5b9e0e12880584d7c69d3f5364,2024-11-21T01:55:56.013000 +CVE-2013-4615,0,0,4c6a0879c32a726253a014b20d0b41936d97511a0b79e77f4c8d1eae904bb0f0,2024-11-21T01:55:56.153000 +CVE-2013-4616,0,0,5407e45dba659f19aa41567303af737e5c2978d1fe8313387e6bbb21cf884667,2024-11-21T01:55:56.293000 +CVE-2013-4617,0,0,a09fe73e5e4cdb78222cce40bba4c1a11f9c348a350674e5f04fb04a43f9d4cb,2024-11-21T01:55:56.453000 +CVE-2013-4619,0,0,b23a408837edb610d21640e8de8abc1a100af7224c58c9fca877518019abaab7,2024-11-21T01:55:56.600000 +CVE-2013-4620,0,0,de652fae5f57306f166e829fabc6dc7de5948623bd73a0e0b88260ba9fa20a17,2024-11-21T01:55:56.737000 CVE-2013-4621,0,0,b73d7c3ffc4152c46daecd572b55772c6af710105007c29e30f873369c448225,2020-01-04T15:25:01.487000 -CVE-2013-4622,0,1,a80345b3f4936b9d040ac2109b5b78f838c1ee13588fc580b5ba843099389e45,2024-11-21T01:55:57.027000 -CVE-2013-4623,0,1,c791ae9907774c551ec3e0bd2fbe4d13e63eccff8ae5020751d7b5dfa001deb5,2024-11-21T01:55:57.163000 -CVE-2013-4624,0,1,d798a2d7ff0792509d5768a43ad9ef1398c10f0591f578d207fc0d241f3bb787,2024-11-21T01:55:57.310000 -CVE-2013-4625,0,1,29e7f1e5fb4be39c14ef65c29bbfa13ce282c436287431d626e48a457568b9f7,2024-11-21T01:55:57.437000 -CVE-2013-4626,0,1,dcf53a630ac60fac4f2e2892d6d34a305b6163d719ca9d6d1a3efc79f3679d4c,2024-11-21T01:55:57.573000 -CVE-2013-4627,0,1,47420f009678f09796aab381e7efbe65e5b0630ac8b549e84e9114458c36f176,2024-11-21T01:55:57.720000 -CVE-2013-4628,0,1,34157ab5697ae66a21cde4678fdc687c7313b24bf96f4343a7966614eb223864,2024-11-21T01:55:57.850000 -CVE-2013-4629,0,1,cb677730881e3e7ef38463ff6c63a545f6777976453ba56dfcb1a919fd2f5b95,2024-11-21T01:55:57.977000 -CVE-2013-4630,0,1,cc95197a5bc4f438c52a13473fc676b8ebc92d7af661b0999a9a6216fcd9ea05,2024-11-21T01:55:58.107000 -CVE-2013-4631,0,1,504f64a317dc69240d016932ed434ed7845cfbcf7a9e120e84cd3d240286811e,2024-11-21T01:55:58.233000 -CVE-2013-4632,0,1,fd003f0cd482971f415a9d8398aa2628b05c7ec1fd1c6d4f99cff3543bb54b35,2024-11-21T01:55:58.363000 -CVE-2013-4633,0,1,1e8122f9ff6710b70dec7e85b8f3e0c22a4648b2b4cba48630970c7d2c129e09,2024-11-21T01:55:58.497000 -CVE-2013-4634,0,1,de32dc0e2a295d35b412803e80d57b37f93ffdb77cc620b031b008f04c644c73,2024-11-21T01:55:58.633000 -CVE-2013-4635,0,1,2f320c20fcf405ca5bd9bb6e0b3b028fb6dcd12507a34a9bddeb86e4916124a2,2024-11-21T01:55:58.780000 -CVE-2013-4636,0,1,5952d9c41e4f876e5649ae05949a18b14b85fbe5e807a648630725624cf72973,2024-11-21T01:55:58.947000 -CVE-2013-4649,0,1,f68499bde1810a88b3a13f39280b99f9b14ea992109dab6d4e3f894da03ef466,2024-11-21T01:55:59.083000 -CVE-2013-4650,0,1,d87509e7a191e862201ed9d45379effb73d9a610167e583e9f19efa6ae074e59,2024-11-21T01:55:59.240000 -CVE-2013-4651,0,1,992690856e3ee6450df02156c34de48fd2d53adb5f54b9aebe011a1fc7be0f04,2024-11-21T01:55:59.370000 -CVE-2013-4652,0,1,d8387238813e996b3cb14bbc7e8e197159c897d957298ad5552d8f3bc4db0bba,2024-11-21T01:55:59.513000 -CVE-2013-4653,0,1,6b6b8b7538ef11c9d2fed1510466a6195be2c7d2ee1301543c871fb2da2f420b,2024-11-21T01:55:59.657000 +CVE-2013-4622,0,0,a80345b3f4936b9d040ac2109b5b78f838c1ee13588fc580b5ba843099389e45,2024-11-21T01:55:57.027000 +CVE-2013-4623,0,0,c791ae9907774c551ec3e0bd2fbe4d13e63eccff8ae5020751d7b5dfa001deb5,2024-11-21T01:55:57.163000 +CVE-2013-4624,0,0,d798a2d7ff0792509d5768a43ad9ef1398c10f0591f578d207fc0d241f3bb787,2024-11-21T01:55:57.310000 +CVE-2013-4625,0,0,29e7f1e5fb4be39c14ef65c29bbfa13ce282c436287431d626e48a457568b9f7,2024-11-21T01:55:57.437000 +CVE-2013-4626,0,0,dcf53a630ac60fac4f2e2892d6d34a305b6163d719ca9d6d1a3efc79f3679d4c,2024-11-21T01:55:57.573000 +CVE-2013-4627,0,0,47420f009678f09796aab381e7efbe65e5b0630ac8b549e84e9114458c36f176,2024-11-21T01:55:57.720000 +CVE-2013-4628,0,0,34157ab5697ae66a21cde4678fdc687c7313b24bf96f4343a7966614eb223864,2024-11-21T01:55:57.850000 +CVE-2013-4629,0,0,cb677730881e3e7ef38463ff6c63a545f6777976453ba56dfcb1a919fd2f5b95,2024-11-21T01:55:57.977000 +CVE-2013-4630,0,0,cc95197a5bc4f438c52a13473fc676b8ebc92d7af661b0999a9a6216fcd9ea05,2024-11-21T01:55:58.107000 +CVE-2013-4631,0,0,504f64a317dc69240d016932ed434ed7845cfbcf7a9e120e84cd3d240286811e,2024-11-21T01:55:58.233000 +CVE-2013-4632,0,0,fd003f0cd482971f415a9d8398aa2628b05c7ec1fd1c6d4f99cff3543bb54b35,2024-11-21T01:55:58.363000 +CVE-2013-4633,0,0,1e8122f9ff6710b70dec7e85b8f3e0c22a4648b2b4cba48630970c7d2c129e09,2024-11-21T01:55:58.497000 +CVE-2013-4634,0,0,de32dc0e2a295d35b412803e80d57b37f93ffdb77cc620b031b008f04c644c73,2024-11-21T01:55:58.633000 +CVE-2013-4635,0,0,2f320c20fcf405ca5bd9bb6e0b3b028fb6dcd12507a34a9bddeb86e4916124a2,2024-11-21T01:55:58.780000 +CVE-2013-4636,0,0,5952d9c41e4f876e5649ae05949a18b14b85fbe5e807a648630725624cf72973,2024-11-21T01:55:58.947000 +CVE-2013-4649,0,0,f68499bde1810a88b3a13f39280b99f9b14ea992109dab6d4e3f894da03ef466,2024-11-21T01:55:59.083000 +CVE-2013-4650,0,0,d87509e7a191e862201ed9d45379effb73d9a610167e583e9f19efa6ae074e59,2024-11-21T01:55:59.240000 +CVE-2013-4651,0,0,992690856e3ee6450df02156c34de48fd2d53adb5f54b9aebe011a1fc7be0f04,2024-11-21T01:55:59.370000 +CVE-2013-4652,0,0,d8387238813e996b3cb14bbc7e8e197159c897d957298ad5552d8f3bc4db0bba,2024-11-21T01:55:59.513000 +CVE-2013-4653,0,0,6b6b8b7538ef11c9d2fed1510466a6195be2c7d2ee1301543c871fb2da2f420b,2024-11-21T01:55:59.657000 CVE-2013-4654,0,0,8ee49ce14539b2c92a3ce286b9f0a71d6e16a58e7f7a0013d5ebc8731d913d52,2019-11-25T15:18:08.567000 CVE-2013-4655,0,0,a6c9e295335fc039a5673407ee29135d73155249b5417c81705c30ecae3711e0,2019-11-14T16:46:48.477000 CVE-2013-4656,0,0,96fb5c5392f09fec48ad6c0e2aa7254a254e105af1d0fcb2408ed6071ba2c1c9,2019-11-25T15:17:16.610000 CVE-2013-4657,0,0,1d2537aae497967cf9888fd91550eff69be464d55671deee23af6162a2c96051,2019-11-25T15:18:16.503000 CVE-2013-4658,0,0,f2e366cb6a43b1c9800f421cafe8da72be3c091846aec9a81ce4bc22e425ccd0,2019-10-29T16:15:53.493000 CVE-2013-4659,0,0,58ba53728b228ce7b540fb0f0923a620240beb51f9e8fbe121fc92f944e1288e,2017-03-15T16:58:34.110000 -CVE-2013-4660,0,1,586c9e4c984cdc38875e581d9bcd81321f3a0e991633e3e0af1d64b1d171a164,2024-11-21T01:56:00.667000 -CVE-2013-4661,0,1,4e8f038b758c2499a851fe954cb9c3141c01172bfbbb347915a5174de83add73,2024-11-21T01:56:00.810000 -CVE-2013-4662,0,1,8888af632e399f133af2d944426453d9faa853613bbb5bcb639d2756f4f19b24,2024-11-21T01:56:00.967000 +CVE-2013-4660,0,0,586c9e4c984cdc38875e581d9bcd81321f3a0e991633e3e0af1d64b1d171a164,2024-11-21T01:56:00.667000 +CVE-2013-4661,0,0,4e8f038b758c2499a851fe954cb9c3141c01172bfbbb347915a5174de83add73,2024-11-21T01:56:00.810000 +CVE-2013-4662,0,0,8888af632e399f133af2d944426453d9faa853613bbb5bcb639d2756f4f19b24,2024-11-21T01:56:00.967000 CVE-2013-4663,0,0,775b66fa3e0c86a45a77b0e085327598ec13ac967b87694afcd68646dfa5d63a,2014-12-29T16:32:29.547000 CVE-2013-4664,0,0,f8324760d9ea4dcae7e24b8b0deeb439a53b2a7066afb37c7c67bef5e7597515,2020-01-04T14:10:57.600000 CVE-2013-4665,0,0,6c5695e17bcdbe933896042c7b2285d5773a551f7c70c0586bbc00f2ab2c1055,2020-01-04T14:13:24.553000 -CVE-2013-4668,0,1,211cd6be5cf1debe4dab1a1bf3772f8dac7dec7a918e2b130341a6f5d3212e31,2024-11-21T01:56:01.550000 -CVE-2013-4669,0,1,2a254eb55eaa4c5264fae65a4ba173afd12b9cfdca9630cd1c23038ff2581db2,2024-11-21T01:56:01.707000 -CVE-2013-4670,0,1,d430524344937519cfc3d9c86141396e9f768318ce99ee9d5829ce2bc474e4e9,2024-11-21T01:56:01.863000 -CVE-2013-4671,0,1,c4425eb9d6ce89106a0ff8c24cb30e91e1cb8f6172da089c0ae7bed96a5c527f,2024-11-21T01:56:01.993000 -CVE-2013-4672,0,1,ce394fb3dd295ce1e88427c44ea3bee7cf497450045e93a81421fe6670f45c54,2024-11-21T01:56:02.117000 -CVE-2013-4673,0,1,e452ec437cf267da0f0338aa7beb7da132041f2009b1111f8347251f8a4b2af8,2024-11-21T01:56:02.243000 -CVE-2013-4674,0,1,57fa223422a007018fc8f8c75e9e59b9410cab0f6001f4b37e17a19372ff00b9,2024-11-21T01:56:02.363000 -CVE-2013-4676,0,1,99afd1bf6b9e0916a6959e8f8386954dce13f7a9eac9334357276bad9d072128,2024-11-21T01:56:02.487000 -CVE-2013-4677,0,1,536b7a2ffcf5c8339b900583b43cbfe29cdef77217c15321a454799f65b6535c,2024-11-21T01:56:02.613000 -CVE-2013-4678,0,1,db4f5350c76afe4e52ffb8bca49d68c730a233cc6ca567122ecb4e4d855a032c,2024-11-21T01:56:02.723000 -CVE-2013-4679,0,1,bf9a7f794fcc63b5aefd58095fe938d012c6f1dd59002db1e876da56c3188562,2024-11-21T01:56:02.830000 -CVE-2013-4680,0,1,d7f2f7b6abd5053336efb2c1a0403e1e29fe26a67b0a4cfa1593cbd991af3d8e,2024-11-21T01:56:02.937000 -CVE-2013-4681,0,1,e7dd8c61282226447bf920a7083e990600eb8f47c9a227317ab406d9d85b3d04,2024-11-21T01:56:03.087000 -CVE-2013-4682,0,1,5133d30dcb732e347d22d0f4f3ddf8b635bdfefe341a77b9f851dbe581ddd3d0,2024-11-21T01:56:03.247000 -CVE-2013-4683,0,1,f30737830a5d17a1f312087232d1defcca53529c0823da6cbd9eb808f2cba36f,2024-11-21T01:56:03.407000 -CVE-2013-4684,0,1,b6d3c443cd710758a93af3f2be07daad84f031596b3eca2e866945b37e4f202b,2024-11-21T01:56:03.557000 -CVE-2013-4685,0,1,bcc1d207f9372a48285e8f2953a318ac7b5708fd96b7610022135be94913983c,2024-11-21T01:56:03.703000 -CVE-2013-4686,0,1,419a80df793b7cca21a1d3c524809bc7bbb91b3c645edd47f42b3625c87784f3,2024-11-21T01:56:03.843000 -CVE-2013-4687,0,1,01bf7b6a50c99d93fa797ca54d05bb9f7d6180481519a0a22dd90e45146f0f96,2024-11-21T01:56:03.977000 -CVE-2013-4688,0,1,80add9f260de1fe4cd148a94b726e8148521cc212984b52d0082cfb933661b3c,2024-11-21T01:56:04.120000 -CVE-2013-4689,0,1,4a5979af71eae6121dc63f116315e65baa4ca687cb0cff39811468a6e4193a13,2024-11-21T01:56:04.280000 -CVE-2013-4690,0,1,53b1caecb45355e75e5d9070fd9ed44b47dda1d89e079c40eea947c9d4b5fcd6,2024-11-21T01:56:04.440000 +CVE-2013-4668,0,0,211cd6be5cf1debe4dab1a1bf3772f8dac7dec7a918e2b130341a6f5d3212e31,2024-11-21T01:56:01.550000 +CVE-2013-4669,0,0,2a254eb55eaa4c5264fae65a4ba173afd12b9cfdca9630cd1c23038ff2581db2,2024-11-21T01:56:01.707000 +CVE-2013-4670,0,0,d430524344937519cfc3d9c86141396e9f768318ce99ee9d5829ce2bc474e4e9,2024-11-21T01:56:01.863000 +CVE-2013-4671,0,0,c4425eb9d6ce89106a0ff8c24cb30e91e1cb8f6172da089c0ae7bed96a5c527f,2024-11-21T01:56:01.993000 +CVE-2013-4672,0,0,ce394fb3dd295ce1e88427c44ea3bee7cf497450045e93a81421fe6670f45c54,2024-11-21T01:56:02.117000 +CVE-2013-4673,0,0,e452ec437cf267da0f0338aa7beb7da132041f2009b1111f8347251f8a4b2af8,2024-11-21T01:56:02.243000 +CVE-2013-4674,0,0,57fa223422a007018fc8f8c75e9e59b9410cab0f6001f4b37e17a19372ff00b9,2024-11-21T01:56:02.363000 +CVE-2013-4676,0,0,99afd1bf6b9e0916a6959e8f8386954dce13f7a9eac9334357276bad9d072128,2024-11-21T01:56:02.487000 +CVE-2013-4677,0,0,536b7a2ffcf5c8339b900583b43cbfe29cdef77217c15321a454799f65b6535c,2024-11-21T01:56:02.613000 +CVE-2013-4678,0,0,db4f5350c76afe4e52ffb8bca49d68c730a233cc6ca567122ecb4e4d855a032c,2024-11-21T01:56:02.723000 +CVE-2013-4679,0,0,bf9a7f794fcc63b5aefd58095fe938d012c6f1dd59002db1e876da56c3188562,2024-11-21T01:56:02.830000 +CVE-2013-4680,0,0,d7f2f7b6abd5053336efb2c1a0403e1e29fe26a67b0a4cfa1593cbd991af3d8e,2024-11-21T01:56:02.937000 +CVE-2013-4681,0,0,e7dd8c61282226447bf920a7083e990600eb8f47c9a227317ab406d9d85b3d04,2024-11-21T01:56:03.087000 +CVE-2013-4682,0,0,5133d30dcb732e347d22d0f4f3ddf8b635bdfefe341a77b9f851dbe581ddd3d0,2024-11-21T01:56:03.247000 +CVE-2013-4683,0,0,f30737830a5d17a1f312087232d1defcca53529c0823da6cbd9eb808f2cba36f,2024-11-21T01:56:03.407000 +CVE-2013-4684,0,0,b6d3c443cd710758a93af3f2be07daad84f031596b3eca2e866945b37e4f202b,2024-11-21T01:56:03.557000 +CVE-2013-4685,0,0,bcc1d207f9372a48285e8f2953a318ac7b5708fd96b7610022135be94913983c,2024-11-21T01:56:03.703000 +CVE-2013-4686,0,0,419a80df793b7cca21a1d3c524809bc7bbb91b3c645edd47f42b3625c87784f3,2024-11-21T01:56:03.843000 +CVE-2013-4687,0,0,01bf7b6a50c99d93fa797ca54d05bb9f7d6180481519a0a22dd90e45146f0f96,2024-11-21T01:56:03.977000 +CVE-2013-4688,0,0,80add9f260de1fe4cd148a94b726e8148521cc212984b52d0082cfb933661b3c,2024-11-21T01:56:04.120000 +CVE-2013-4689,0,0,4a5979af71eae6121dc63f116315e65baa4ca687cb0cff39811468a6e4193a13,2024-11-21T01:56:04.280000 +CVE-2013-4690,0,0,53b1caecb45355e75e5d9070fd9ed44b47dda1d89e079c40eea947c9d4b5fcd6,2024-11-21T01:56:04.440000 CVE-2013-4691,0,0,51ee7d9735d2aedd40939f4e01c8f61595eb84fcd75a4778886926177ad746df,2020-01-04T14:27:47.607000 CVE-2013-4692,0,0,9bf4e0d3a33cf86f54842e8faa63463dfc7d24afdd0ef98d7e3bfaee41306c36,2020-01-04T14:09:02.493000 CVE-2013-4693,0,0,91162b95b195d43a509d7487af4d5ac0707d94fd8ec821ecfddabe6549650daa,2020-01-04T14:33:39.373000 -CVE-2013-4694,0,1,aa92980e0d87700aa534047955387e259335287ce16f2b4d6d6c9c800da35823,2024-11-21T01:56:05.043000 +CVE-2013-4694,0,0,aa92980e0d87700aa534047955387e259335287ce16f2b4d6d6c9c800da35823,2024-11-21T01:56:05.043000 CVE-2013-4695,0,0,03f7fb359ec9e562a3945795841b51e0e56f5e76a4c5a8f7ffc1be8b1b7a94cd,2020-01-04T14:57:48.740000 CVE-2013-4696,0,0,15bbf80010d32dd0abcac085559ccfa3da9aab5febc3217ed8b4c3340260c6af,2023-11-07T02:16:22.347000 -CVE-2013-4697,0,1,5f6a0da54b26f349e87c046268c3dc33c9c554455670c15aa3ee9ebcdc373bc1,2024-11-21T01:56:05.393000 -CVE-2013-4698,0,1,61a223b34543d950f29f7e230dbe1ff03e5f7806a4ae2896c4752ac888c5f2d2,2024-11-21T01:56:05.513000 -CVE-2013-4699,0,1,99a0bfd66cbc59a3c55500ee8f60eee43de3f8e7059d0e30ddd5c6242891d537,2024-11-21T01:56:05.637000 -CVE-2013-4700,0,1,b6a50b2d50f64e50f955eda42a57355218c3f44ab0f3a5295a9d538fbb6a0c6c,2024-11-21T01:56:05.750000 -CVE-2013-4701,0,1,ad64ce7b123cb4faab24c47e9aff3728fd3511353b5ec9f4a045482607dca1db,2024-11-21T01:56:05.867000 -CVE-2013-4702,0,1,4f6e397aa8272a4619d8de014e0437c9e52fc25ff511bd845486924697d0a2cc,2024-11-21T01:56:05.990000 -CVE-2013-4703,0,1,c140b4d6ad8fb449fa9aaa509b8c09ce809bdd521e89e4c7862607faf6b1471e,2024-11-21T01:56:06.137000 -CVE-2013-4704,0,1,d0a96e206e7250f5ef9b0012c17392a171c463f4109f60c62fe2831193042f23,2024-11-21T01:56:06.257000 -CVE-2013-4705,0,1,bffcc2e25483f248c708c4942b01af4eb6f6c6afecf1251abbe47a2ef747366b,2024-11-21T01:56:06.377000 -CVE-2013-4706,0,1,d7727bb59fba1200a32604830600ecc70b5b168591ccc7c4ddf4af72eb387086,2024-11-21T01:56:06.530000 -CVE-2013-4707,0,1,86a6c78ec81e69687dc6c068bffd1efbc2a2c78b0b53eded716feadf5c04c1af,2024-11-21T01:56:06.660000 -CVE-2013-4708,0,1,4305b653e3063fbd4040028f44e6ded879d570f47633107280ee0d9bad8aa7e7,2024-11-21T01:56:06.790000 -CVE-2013-4709,0,1,58440b26e2fa1a4aa0f13eb957fb6e8c4e22d0885e881dd285b4ccf332404a2b,2024-11-21T01:56:06.927000 -CVE-2013-4710,0,1,bfdc6db6fd54cb80b50dc2d9ad97bfb75cbbdbd24b5d8db57b1e5dedfa100178,2024-11-21T01:56:07.053000 -CVE-2013-4711,0,1,bba34492772429b02075859127d9ba8a1de54018189c50c2ce8fa3e719d36e20,2024-11-21T01:56:07.167000 -CVE-2013-4712,0,1,78b6947de63d74c6917b85fed9296c4be5b49fb2189f4b06277047d51f73219d,2024-11-21T01:56:07.273000 -CVE-2013-4713,0,1,323ae4dc71cb3d9b0dd0df55858a585441c33188768e92c7d6cf9756be2d0988,2024-11-21T01:56:07.387000 -CVE-2013-4714,0,1,c82641ded77bb28f00c5fa574f6f801aee0338c97cb41722074077ea2e3857ae,2024-11-21T01:56:07.500000 -CVE-2013-4715,0,1,850f135f81626f441511381e65cc28751f7038835c669da9c3d56d436c7ce924,2024-11-21T01:56:07.603000 -CVE-2013-4716,0,1,5c8154b0822c079d7d9800830e0ba93074c93d289944710fbcb799c4da30a613,2024-11-21T01:56:07.710000 +CVE-2013-4697,0,0,5f6a0da54b26f349e87c046268c3dc33c9c554455670c15aa3ee9ebcdc373bc1,2024-11-21T01:56:05.393000 +CVE-2013-4698,0,0,61a223b34543d950f29f7e230dbe1ff03e5f7806a4ae2896c4752ac888c5f2d2,2024-11-21T01:56:05.513000 +CVE-2013-4699,0,0,99a0bfd66cbc59a3c55500ee8f60eee43de3f8e7059d0e30ddd5c6242891d537,2024-11-21T01:56:05.637000 +CVE-2013-4700,0,0,b6a50b2d50f64e50f955eda42a57355218c3f44ab0f3a5295a9d538fbb6a0c6c,2024-11-21T01:56:05.750000 +CVE-2013-4701,0,0,ad64ce7b123cb4faab24c47e9aff3728fd3511353b5ec9f4a045482607dca1db,2024-11-21T01:56:05.867000 +CVE-2013-4702,0,0,4f6e397aa8272a4619d8de014e0437c9e52fc25ff511bd845486924697d0a2cc,2024-11-21T01:56:05.990000 +CVE-2013-4703,0,0,c140b4d6ad8fb449fa9aaa509b8c09ce809bdd521e89e4c7862607faf6b1471e,2024-11-21T01:56:06.137000 +CVE-2013-4704,0,0,d0a96e206e7250f5ef9b0012c17392a171c463f4109f60c62fe2831193042f23,2024-11-21T01:56:06.257000 +CVE-2013-4705,0,0,bffcc2e25483f248c708c4942b01af4eb6f6c6afecf1251abbe47a2ef747366b,2024-11-21T01:56:06.377000 +CVE-2013-4706,0,0,d7727bb59fba1200a32604830600ecc70b5b168591ccc7c4ddf4af72eb387086,2024-11-21T01:56:06.530000 +CVE-2013-4707,0,0,86a6c78ec81e69687dc6c068bffd1efbc2a2c78b0b53eded716feadf5c04c1af,2024-11-21T01:56:06.660000 +CVE-2013-4708,0,0,4305b653e3063fbd4040028f44e6ded879d570f47633107280ee0d9bad8aa7e7,2024-11-21T01:56:06.790000 +CVE-2013-4709,0,0,58440b26e2fa1a4aa0f13eb957fb6e8c4e22d0885e881dd285b4ccf332404a2b,2024-11-21T01:56:06.927000 +CVE-2013-4710,0,0,bfdc6db6fd54cb80b50dc2d9ad97bfb75cbbdbd24b5d8db57b1e5dedfa100178,2024-11-21T01:56:07.053000 +CVE-2013-4711,0,0,bba34492772429b02075859127d9ba8a1de54018189c50c2ce8fa3e719d36e20,2024-11-21T01:56:07.167000 +CVE-2013-4712,0,0,78b6947de63d74c6917b85fed9296c4be5b49fb2189f4b06277047d51f73219d,2024-11-21T01:56:07.273000 +CVE-2013-4713,0,0,323ae4dc71cb3d9b0dd0df55858a585441c33188768e92c7d6cf9756be2d0988,2024-11-21T01:56:07.387000 +CVE-2013-4714,0,0,c82641ded77bb28f00c5fa574f6f801aee0338c97cb41722074077ea2e3857ae,2024-11-21T01:56:07.500000 +CVE-2013-4715,0,0,850f135f81626f441511381e65cc28751f7038835c669da9c3d56d436c7ce924,2024-11-21T01:56:07.603000 +CVE-2013-4716,0,0,5c8154b0822c079d7d9800830e0ba93074c93d289944710fbcb799c4da30a613,2024-11-21T01:56:07.710000 CVE-2013-4717,0,0,7ecb726bc947f5dcce550b01f2e35b7dc61a291ec1d2f6c26630310f31cc81d8,2021-08-17T15:32:24.703000 CVE-2013-4718,0,0,3ca128e2da3de99e6fe85d3f6da8c6ed5a201f6f9c2e9a59ca180c2c10a170d0,2021-08-17T15:42:24.703000 -CVE-2013-4719,0,1,459bef1cc6b659595963cad0c6b608ac083a38e068c2c528e74c05d4c8a091d3,2024-11-21T01:56:08.097000 -CVE-2013-4720,0,1,a1874fcdb1100e2b1369e70f92e61afa5cc606b4c3b953c2ba92fd0c48330ae8,2024-11-21T01:56:08.240000 -CVE-2013-4721,0,1,a97fe6d70137e37c0fa96a209148c3ff28e9b4f69d367d0575e7ed424a759cae,2024-11-21T01:56:08.380000 -CVE-2013-4722,0,1,6274bb4903e1ff1d7d2bc9dd52e736b077a94f827d6eb8171e38356596653ca9,2024-11-21T01:56:08.517000 -CVE-2013-4723,0,1,c1bbf33ccf18fb1b0511ee627ba11f42ee65bd1dee0fcf42d1da644e1dccb396,2024-11-21T01:56:08.677000 +CVE-2013-4719,0,0,459bef1cc6b659595963cad0c6b608ac083a38e068c2c528e74c05d4c8a091d3,2024-11-21T01:56:08.097000 +CVE-2013-4720,0,0,a1874fcdb1100e2b1369e70f92e61afa5cc606b4c3b953c2ba92fd0c48330ae8,2024-11-21T01:56:08.240000 +CVE-2013-4721,0,0,a97fe6d70137e37c0fa96a209148c3ff28e9b4f69d367d0575e7ed424a759cae,2024-11-21T01:56:08.380000 +CVE-2013-4722,0,0,6274bb4903e1ff1d7d2bc9dd52e736b077a94f827d6eb8171e38356596653ca9,2024-11-21T01:56:08.517000 +CVE-2013-4723,0,0,c1bbf33ccf18fb1b0511ee627ba11f42ee65bd1dee0fcf42d1da644e1dccb396,2024-11-21T01:56:08.677000 CVE-2013-4724,0,0,d2798480e0294b15e1f425e92eeafd549becdcde674a59ee1e119d75ddf4bf51,2014-06-09T14:07:40.807000 CVE-2013-4725,0,0,5b1453f74002560ee65e42d483bbdd60c257c9df6a6e48cc193a31a8d3d915b2,2014-06-09T14:18:47.030000 -CVE-2013-4726,0,1,3948088f594123f0f4b82b935a6d65372c22b22f0f7e59661ca3748da056154c,2024-11-21T01:56:10.220000 +CVE-2013-4726,0,0,3948088f594123f0f4b82b935a6d65372c22b22f0f7e59661ca3748da056154c,2024-11-21T01:56:10.220000 CVE-2013-4727,0,0,cd6965fd97901b39032ba1583885b954463a7ae81a0ccc3212134cc387185baa,2014-06-09T14:19:49.130000 CVE-2013-4728,0,0,6777f98f12fdfd3c6a91772c905a6dfacd1afc60f0848b57e4434bffae86d8f5,2014-06-09T14:27:14.807000 -CVE-2013-4729,0,1,45c1db16737cdfcec924dac0fed1fedb46fd71bdeb7838a9de6014e6a503dac1,2024-11-21T01:56:10.770000 -CVE-2013-4730,0,1,5f6e0a4188688d42747fc6f119135db5d93f61ec86cd6c2a2ed50ce5a1b24c36,2024-11-21T01:56:10.963000 -CVE-2013-4731,0,1,9e9bcc5f2831de1b168d41a6cae3c9a5fe8a1dc035cf349f601b16d455854171,2024-11-21T01:56:12.123000 -CVE-2013-4732,0,1,4ef085336085eb9a121c7b941f0dad348b9d3bd9242a513c7f2d0f24fa521c5e,2024-11-21T01:56:13.260000 -CVE-2013-4733,0,1,5361ffb6ed2dd3aef92cc8aa257355a3d246a2dcf4b076c8ca6678bfeea73977,2024-11-21T01:56:14.400000 -CVE-2013-4734,0,1,506f5973a218231d2eb2810bb2a4b007f92d9b315990a378ce65d41302136045,2024-11-21T01:56:14.617000 -CVE-2013-4735,0,1,b288a15e4f79d84958706878e72c7869bc0830b730c0166fc92bbc356161a936,2024-11-21T01:56:14.817000 -CVE-2013-4736,0,1,22818103d94669ecb9e8f63d5de1eef07fe6b2f89d655841e037161b5a534356,2024-11-21T01:56:15.017000 -CVE-2013-4737,0,1,b5dc047121edef9a040d96c8e2856da536819816e11737ce1c4a3718d69214dc,2024-11-21T01:56:15.250000 -CVE-2013-4738,0,1,a10d36e21523d89c861a5b8848b03fd19bfaaf3a2b0a6494026ddcb16f7481e5,2024-11-21T01:56:15.457000 -CVE-2013-4739,0,1,a636ecc6aa5911b87b0e5e097ad4820211b0fa8b47b5a1693cf89ac10a0b41cf,2024-11-21T01:56:15.680000 -CVE-2013-4740,0,1,23efd56121262d0e334c5e670b404ffbf03be729158fdac34d290d4f8b8f52dd,2024-11-21T01:56:16.767000 -CVE-2013-4742,0,1,7e54150fe81a204e57136eb6efe7c807a116c6e0b9808c2603b31447db93feb6,2024-11-21T01:56:16.980000 +CVE-2013-4729,0,0,45c1db16737cdfcec924dac0fed1fedb46fd71bdeb7838a9de6014e6a503dac1,2024-11-21T01:56:10.770000 +CVE-2013-4730,0,0,5f6e0a4188688d42747fc6f119135db5d93f61ec86cd6c2a2ed50ce5a1b24c36,2024-11-21T01:56:10.963000 +CVE-2013-4731,0,0,9e9bcc5f2831de1b168d41a6cae3c9a5fe8a1dc035cf349f601b16d455854171,2024-11-21T01:56:12.123000 +CVE-2013-4732,0,0,4ef085336085eb9a121c7b941f0dad348b9d3bd9242a513c7f2d0f24fa521c5e,2024-11-21T01:56:13.260000 +CVE-2013-4733,0,0,5361ffb6ed2dd3aef92cc8aa257355a3d246a2dcf4b076c8ca6678bfeea73977,2024-11-21T01:56:14.400000 +CVE-2013-4734,0,0,506f5973a218231d2eb2810bb2a4b007f92d9b315990a378ce65d41302136045,2024-11-21T01:56:14.617000 +CVE-2013-4735,0,0,b288a15e4f79d84958706878e72c7869bc0830b730c0166fc92bbc356161a936,2024-11-21T01:56:14.817000 +CVE-2013-4736,0,0,22818103d94669ecb9e8f63d5de1eef07fe6b2f89d655841e037161b5a534356,2024-11-21T01:56:15.017000 +CVE-2013-4737,0,0,b5dc047121edef9a040d96c8e2856da536819816e11737ce1c4a3718d69214dc,2024-11-21T01:56:15.250000 +CVE-2013-4738,0,0,a10d36e21523d89c861a5b8848b03fd19bfaaf3a2b0a6494026ddcb16f7481e5,2024-11-21T01:56:15.457000 +CVE-2013-4739,0,0,a636ecc6aa5911b87b0e5e097ad4820211b0fa8b47b5a1693cf89ac10a0b41cf,2024-11-21T01:56:15.680000 +CVE-2013-4740,0,0,23efd56121262d0e334c5e670b404ffbf03be729158fdac34d290d4f8b8f52dd,2024-11-21T01:56:16.767000 +CVE-2013-4742,0,0,7e54150fe81a204e57136eb6efe7c807a116c6e0b9808c2603b31447db93feb6,2024-11-21T01:56:16.980000 CVE-2013-4743,0,0,16ccbeafc58b41c86a108310ee49bd95bbad9eeb339f72baebf7408b25af7dd5,2020-01-07T17:10:58.560000 -CVE-2013-4744,0,1,ab6e384a701093a9ebec72a2bad729e0d38b8908665d5cf8151de9888b4bfe7a,2024-11-21T01:56:17.417000 -CVE-2013-4745,0,1,a5ac744bbb88c13453ba425e6faecb9c323f8c6ba63e127d95eb0174727c40dd,2024-11-21T01:56:17.623000 -CVE-2013-4746,0,1,72fb7c4d0df7e07d2d3be369708682de606c01b7401e71a241fa5886345a73cc,2024-11-21T01:56:17.850000 -CVE-2013-4747,0,1,e4b5904b57b7360fbf5bcb5d20106944619f3d95fc7244de54cddd18eabdf7bc,2024-11-21T01:56:18.060000 -CVE-2013-4748,0,1,9158c8f2c188b8be93ebbe5a780ec487ff098a1732d10cdadb00e0035b8324c2,2024-11-21T01:56:18.273000 -CVE-2013-4749,0,1,3ba8f7db77d649da874b7c23ccac3e41641a0e74514a66195500e0ee015a2b6a,2024-11-21T01:56:18.480000 +CVE-2013-4744,0,0,ab6e384a701093a9ebec72a2bad729e0d38b8908665d5cf8151de9888b4bfe7a,2024-11-21T01:56:17.417000 +CVE-2013-4745,0,0,a5ac744bbb88c13453ba425e6faecb9c323f8c6ba63e127d95eb0174727c40dd,2024-11-21T01:56:17.623000 +CVE-2013-4746,0,0,72fb7c4d0df7e07d2d3be369708682de606c01b7401e71a241fa5886345a73cc,2024-11-21T01:56:17.850000 +CVE-2013-4747,0,0,e4b5904b57b7360fbf5bcb5d20106944619f3d95fc7244de54cddd18eabdf7bc,2024-11-21T01:56:18.060000 +CVE-2013-4748,0,0,9158c8f2c188b8be93ebbe5a780ec487ff098a1732d10cdadb00e0035b8324c2,2024-11-21T01:56:18.273000 +CVE-2013-4749,0,0,3ba8f7db77d649da874b7c23ccac3e41641a0e74514a66195500e0ee015a2b6a,2024-11-21T01:56:18.480000 CVE-2013-4751,0,0,5f6ad0a7c118d89c2a1c40eb898868ad22fb2e966e43a617c589124fa5f631c5,2019-11-06T15:53:24.543000 CVE-2013-4752,0,0,19611da43a2cb2b34e23cb30c88a4274e5ce615e56358ea6fb2d72755f16061c,2020-01-10T19:25:41.060000 CVE-2013-4753,0,0,8a36eba44736c1fc692d861325359087b4a74d51102f1e33cf65a22e5aaa8237,2014-12-29T22:53:28.177000 CVE-2013-4754,0,0,a16e26b09d844c7a45efb233c0bd5969d6a201f168034601ab87b679cdffe181,2014-12-30T11:20:16.957000 -CVE-2013-4758,0,1,a3f263759bf7f49fb3856a1fe6138f415884fbe0da2ab122be7597b23b75989c,2024-11-21T01:56:19.563000 -CVE-2013-4759,0,1,ab84d73ec3461e2cee5ceeb35bbcf3903c132f992ff2ff7bcefdcc0cff07eb77,2024-11-21T01:56:19.773000 -CVE-2013-4761,0,1,666ee6e231334d719a80e62fa24c0d575dbed6ab2065fc06cb1eb8e148018073,2024-11-21T01:56:19.980000 -CVE-2013-4762,0,1,49c107849577cd615cca6de788bfd3bf171cb0871e2501350340ce6f41370500,2024-11-21T01:56:20.223000 +CVE-2013-4758,0,0,a3f263759bf7f49fb3856a1fe6138f415884fbe0da2ab122be7597b23b75989c,2024-11-21T01:56:19.563000 +CVE-2013-4759,0,0,ab84d73ec3461e2cee5ceeb35bbcf3903c132f992ff2ff7bcefdcc0cff07eb77,2024-11-21T01:56:19.773000 +CVE-2013-4761,0,0,666ee6e231334d719a80e62fa24c0d575dbed6ab2065fc06cb1eb8e148018073,2024-11-21T01:56:19.980000 +CVE-2013-4762,0,0,49c107849577cd615cca6de788bfd3bf171cb0871e2501350340ce6f41370500,2024-11-21T01:56:20.223000 CVE-2013-4763,0,0,cfd3fba494327030c5d307a8192a361e23d35764fdc8290201bea02fd2277c8f,2020-01-10T13:48:57.043000 CVE-2013-4764,0,0,8a9551ff84e5664325eacb1cbdd0c9ef387169decc310b9e00dc5f061b42d29d,2020-01-10T13:57:51.230000 -CVE-2013-4766,0,1,d84ac27090d445a05dbb12307f4db3cc328f06e71d8f267b8c8a99049e8c9694,2024-11-21T01:56:21.727000 -CVE-2013-4767,0,1,ba514b991cc07d22b3ee234af4469eb5d953304170c729516abebf2f27479c1f,2024-11-21T01:56:21.927000 -CVE-2013-4768,0,1,7438fadd9470515faa0e6c74e3ff7767a622c7a12f5f83f0083ae41ab749036b,2024-11-21T01:56:22.140000 +CVE-2013-4766,0,0,d84ac27090d445a05dbb12307f4db3cc328f06e71d8f267b8c8a99049e8c9694,2024-11-21T01:56:21.727000 +CVE-2013-4767,0,0,ba514b991cc07d22b3ee234af4469eb5d953304170c729516abebf2f27479c1f,2024-11-21T01:56:21.927000 +CVE-2013-4768,0,0,7438fadd9470515faa0e6c74e3ff7767a622c7a12f5f83f0083ae41ab749036b,2024-11-21T01:56:22.140000 CVE-2013-4769,0,0,c7e6a06a6e4807ac16716d48cb3b2a0e923298c204e1125dbef2597cf1a0387d,2014-12-29T22:54:18.897000 CVE-2013-4770,0,0,0da496303dd5ca0e184faa96c0c46a04db92960afb4269bfc428bfd30eda5af5,2020-01-29T20:34:56.077000 -CVE-2013-4772,0,1,373c13ec38796665697a4bd7ccf73c39617f64a7e91f298096d4a3b7d98ce832,2024-11-21T01:56:22.697000 -CVE-2013-4775,0,1,e6aae47698593e1895f584d9153559867d0f96b758662a37db3b03b639ae33b6,2024-11-21T01:56:22.863000 -CVE-2013-4776,0,1,7cf8cd7f1f502521612cc2c85fb9afe81355ff3349a3f9be701bc04f0094aaa6,2024-11-21T01:56:23.003000 -CVE-2013-4777,0,1,a879b7ab90e05bd097ed4f2d91fd89b523c6571b678647a8885cb687d96ff1ff,2024-11-21T01:56:23.147000 -CVE-2013-4778,0,1,3d85607d6f2d3828b8dfccce2d9554529b64fefcf98c3942fa65b4aeeb9eda6f,2024-11-21T01:56:23.297000 -CVE-2013-4779,0,1,b5d0c540d7a89a59718274990e0cf4f32d49b168fc6a0a6bbd3eca712cbe4492,2024-11-21T01:56:23.437000 -CVE-2013-4780,0,1,9cad7417b24e915ea10500143637062dee65948a97de889b0c4bee032fb342b9,2024-11-21T01:56:23.573000 -CVE-2013-4781,0,1,37a89eece81078eaad7ac6f5ff279c9719fa53ffa42aba55013666478f2b9a47,2024-11-21T01:56:23.713000 -CVE-2013-4782,0,1,96c16aae5e6f718302cea68c0b5f71a73b04499b7b5a971b07a20791cb229ce2,2024-11-21T01:56:23.850000 -CVE-2013-4783,0,1,9e131260ddee2b1c0b623bf50a332e8e69c5bf66014b185ba252acab985d0091,2024-11-21T01:56:23.990000 -CVE-2013-4784,0,1,cb1eb371796e03f0111a0e134083aadc0ceca8902c876337e66af9bf17083de6,2024-11-21T01:56:24.137000 -CVE-2013-4785,0,1,524f92fa3b6ec08e4feda1869eb9e2f40d518337c8bdb433882cb7cab4bb28e4,2024-11-21T01:56:24.277000 -CVE-2013-4786,0,1,2bd05562d537b5151f1932afca55b5deda44984a7c74f37b3bdf8b1190364a16,2024-11-21T01:56:24.420000 -CVE-2013-4787,0,1,2e08614734d63a8e3c45234a5c6d22c8557298d01bcbc90f0a096729f832156c,2024-11-21T01:56:24.577000 -CVE-2013-4788,0,1,013838659f90ef468196abe14122d600d2f84bb766fa07f085929eae0bc85dcf,2024-11-21T01:56:24.730000 -CVE-2013-4789,0,1,59b805942d59c814afad7d22d5fcdbfeda6fc50797b99587ff16aaa879792394,2024-11-21T01:56:24.890000 -CVE-2013-4790,0,1,f36b9c999b1a160501819d91bcb7ffcfff6ff90706089a3980ffe22803de96b5,2024-11-21T01:56:25.040000 +CVE-2013-4772,0,0,373c13ec38796665697a4bd7ccf73c39617f64a7e91f298096d4a3b7d98ce832,2024-11-21T01:56:22.697000 +CVE-2013-4775,0,0,e6aae47698593e1895f584d9153559867d0f96b758662a37db3b03b639ae33b6,2024-11-21T01:56:22.863000 +CVE-2013-4776,0,0,7cf8cd7f1f502521612cc2c85fb9afe81355ff3349a3f9be701bc04f0094aaa6,2024-11-21T01:56:23.003000 +CVE-2013-4777,0,0,a879b7ab90e05bd097ed4f2d91fd89b523c6571b678647a8885cb687d96ff1ff,2024-11-21T01:56:23.147000 +CVE-2013-4778,0,0,3d85607d6f2d3828b8dfccce2d9554529b64fefcf98c3942fa65b4aeeb9eda6f,2024-11-21T01:56:23.297000 +CVE-2013-4779,0,0,b5d0c540d7a89a59718274990e0cf4f32d49b168fc6a0a6bbd3eca712cbe4492,2024-11-21T01:56:23.437000 +CVE-2013-4780,0,0,9cad7417b24e915ea10500143637062dee65948a97de889b0c4bee032fb342b9,2024-11-21T01:56:23.573000 +CVE-2013-4781,0,0,37a89eece81078eaad7ac6f5ff279c9719fa53ffa42aba55013666478f2b9a47,2024-11-21T01:56:23.713000 +CVE-2013-4782,0,0,96c16aae5e6f718302cea68c0b5f71a73b04499b7b5a971b07a20791cb229ce2,2024-11-21T01:56:23.850000 +CVE-2013-4783,0,0,9e131260ddee2b1c0b623bf50a332e8e69c5bf66014b185ba252acab985d0091,2024-11-21T01:56:23.990000 +CVE-2013-4784,0,0,cb1eb371796e03f0111a0e134083aadc0ceca8902c876337e66af9bf17083de6,2024-11-21T01:56:24.137000 +CVE-2013-4785,0,0,524f92fa3b6ec08e4feda1869eb9e2f40d518337c8bdb433882cb7cab4bb28e4,2024-11-21T01:56:24.277000 +CVE-2013-4786,0,0,2bd05562d537b5151f1932afca55b5deda44984a7c74f37b3bdf8b1190364a16,2024-11-21T01:56:24.420000 +CVE-2013-4787,0,0,2e08614734d63a8e3c45234a5c6d22c8557298d01bcbc90f0a096729f832156c,2024-11-21T01:56:24.577000 +CVE-2013-4788,0,0,013838659f90ef468196abe14122d600d2f84bb766fa07f085929eae0bc85dcf,2024-11-21T01:56:24.730000 +CVE-2013-4789,0,0,59b805942d59c814afad7d22d5fcdbfeda6fc50797b99587ff16aaa879792394,2024-11-21T01:56:24.890000 +CVE-2013-4790,0,0,f36b9c999b1a160501819d91bcb7ffcfff6ff90706089a3980ffe22803de96b5,2024-11-21T01:56:25.040000 CVE-2013-4791,0,0,f836422cfe85b06b1c95a6420749d58b6be8b03da65f8f81854f84d097c5a18c,2020-02-18T14:47:42.130000 CVE-2013-4792,0,0,956156fc2b386b766285c623f9232a7548cee8d5824a8123c035f90318766f24,2020-02-18T15:17:10.807000 CVE-2013-4793,0,0,afd95e4ae6956cd136a0a6fcb09d533f8357455541b915092a9b22f05510b461,2014-12-30T11:21:09.567000 -CVE-2013-4795,0,1,9450813c13d9b71fd9e8f7fa214ca6a2b488621c896236dda99b0f71e6a6e313,2024-11-21T01:56:25.610000 +CVE-2013-4795,0,0,9450813c13d9b71fd9e8f7fa214ca6a2b488621c896236dda99b0f71e6a6e313,2024-11-21T01:56:25.610000 CVE-2013-4796,0,0,ab740115eba9f27207aeca99c06cb59022b103cfda0397ec8d1ce4c100976c62,2020-01-07T14:59:41.100000 -CVE-2013-4797,0,1,299085a60860bd091e544e3aaca259881fc525411d8288d17a2a4dec9a722f53,2024-11-21T01:56:25.903000 -CVE-2013-4798,0,1,c4169f6f7bf08d56d04a0a6572b0059b28e9ae9dcfd0eabff40c46b9f87aa1c2,2024-11-21T01:56:26.020000 -CVE-2013-4799,0,1,d573b72c26bb622f8b424240ce99f859d836a3766006ec36cc3e673d84179eb2,2024-11-21T01:56:26.130000 -CVE-2013-4800,0,1,a94e5096fdf6ff532df20c3aee50f54f167b0256ef35fbf8e445434533059fd0,2024-11-21T01:56:26.250000 -CVE-2013-4801,0,1,0fff03ca2318c8817cf1bd4504aa10c76fd9992b4e89b614725302268803ab6d,2024-11-21T01:56:26.363000 -CVE-2013-4802,0,1,56eb51ee1a4bf47db3c4cc5d966ff2413f82d7d8fa919307a6456a75834b3c53,2024-11-21T01:56:26.513000 +CVE-2013-4797,0,0,299085a60860bd091e544e3aaca259881fc525411d8288d17a2a4dec9a722f53,2024-11-21T01:56:25.903000 +CVE-2013-4798,0,0,c4169f6f7bf08d56d04a0a6572b0059b28e9ae9dcfd0eabff40c46b9f87aa1c2,2024-11-21T01:56:26.020000 +CVE-2013-4799,0,0,d573b72c26bb622f8b424240ce99f859d836a3766006ec36cc3e673d84179eb2,2024-11-21T01:56:26.130000 +CVE-2013-4800,0,0,a94e5096fdf6ff532df20c3aee50f54f167b0256ef35fbf8e445434533059fd0,2024-11-21T01:56:26.250000 +CVE-2013-4801,0,0,0fff03ca2318c8817cf1bd4504aa10c76fd9992b4e89b614725302268803ab6d,2024-11-21T01:56:26.363000 +CVE-2013-4802,0,0,56eb51ee1a4bf47db3c4cc5d966ff2413f82d7d8fa919307a6456a75834b3c53,2024-11-21T01:56:26.513000 CVE-2013-4803,0,0,ce86e36c97a4bfecb6dbc66bd1aec71d1ba24a8ef8e85ac5a7bb23ec06eda873,2023-11-07T02:16:23.287000 -CVE-2013-4804,0,1,0c4aa59086882f44eb8c91569f73426885699d189a175f9f6600a5d72b2aa8fe,2024-11-21T01:56:26.650000 -CVE-2013-4805,0,1,7d30f5786760023643bd7a207dd7ebcf497556d942da9ffb45551e64e57f3ad3,2024-11-21T01:56:26.760000 -CVE-2013-4806,0,1,367077d95d356265b412339737350508b7f1166161915fe54d3d1f4f1ed0bfe1,2024-11-21T01:56:26.883000 -CVE-2013-4807,0,1,5b300e1913e268eb5b0404c9c2a47355817125cbdacf83a442d9295abdbd8eef,2024-11-21T01:56:27 -CVE-2013-4808,0,1,1b8eb49c4a2249d5799c271a8f13ddb155ac3445e29b9e2d382a4f2a65171515,2024-11-21T01:56:27.127000 -CVE-2013-4809,0,1,06b3962db5117266a3657d9b739906407462bd17b76e0b51188cc194cbeda307,2024-11-21T01:56:27.240000 -CVE-2013-4810,0,1,fd3894cd742da71c93bd264399d6bba54601267836f8d02417dc1e6393fc671d,2024-11-21T01:56:27.360000 -CVE-2013-4811,0,1,65a8467f4a036649b9d4735f2398419ad5d853e1b747b440d951dd37ddea49c2,2024-11-21T01:56:27.480000 -CVE-2013-4812,0,1,a95bba1591874cca1b486a4f6dd3621b7a1b60a92d7c553bbbdac91c45e56927,2024-11-21T01:56:27.593000 -CVE-2013-4813,0,1,cf2444b54819065afef2c43a1871cf08dbefddcb1441cca241aea6b4991bafd0,2024-11-21T01:56:27.707000 -CVE-2013-4814,0,1,f6f71e4f9a0efe4d2d9654344edc3443fd0cbcb535aa9ce9094761266f21eb2d,2024-11-21T01:56:27.820000 -CVE-2013-4815,0,1,28cccf7b30785d5b160726da8bcfbf5de632fb31e658615f73b288d69983209e,2024-11-21T01:56:27.923000 +CVE-2013-4804,0,0,0c4aa59086882f44eb8c91569f73426885699d189a175f9f6600a5d72b2aa8fe,2024-11-21T01:56:26.650000 +CVE-2013-4805,0,0,7d30f5786760023643bd7a207dd7ebcf497556d942da9ffb45551e64e57f3ad3,2024-11-21T01:56:26.760000 +CVE-2013-4806,0,0,367077d95d356265b412339737350508b7f1166161915fe54d3d1f4f1ed0bfe1,2024-11-21T01:56:26.883000 +CVE-2013-4807,0,0,5b300e1913e268eb5b0404c9c2a47355817125cbdacf83a442d9295abdbd8eef,2024-11-21T01:56:27 +CVE-2013-4808,0,0,1b8eb49c4a2249d5799c271a8f13ddb155ac3445e29b9e2d382a4f2a65171515,2024-11-21T01:56:27.127000 +CVE-2013-4809,0,0,06b3962db5117266a3657d9b739906407462bd17b76e0b51188cc194cbeda307,2024-11-21T01:56:27.240000 +CVE-2013-4810,0,0,fd3894cd742da71c93bd264399d6bba54601267836f8d02417dc1e6393fc671d,2024-11-21T01:56:27.360000 +CVE-2013-4811,0,0,65a8467f4a036649b9d4735f2398419ad5d853e1b747b440d951dd37ddea49c2,2024-11-21T01:56:27.480000 +CVE-2013-4812,0,0,a95bba1591874cca1b486a4f6dd3621b7a1b60a92d7c553bbbdac91c45e56927,2024-11-21T01:56:27.593000 +CVE-2013-4813,0,0,cf2444b54819065afef2c43a1871cf08dbefddcb1441cca241aea6b4991bafd0,2024-11-21T01:56:27.707000 +CVE-2013-4814,0,0,f6f71e4f9a0efe4d2d9654344edc3443fd0cbcb535aa9ce9094761266f21eb2d,2024-11-21T01:56:27.820000 +CVE-2013-4815,0,0,28cccf7b30785d5b160726da8bcfbf5de632fb31e658615f73b288d69983209e,2024-11-21T01:56:27.923000 CVE-2013-4816,0,0,79957449a58cd3a5871fed473f0ee7715dd39be6d2c4dfdb7a7110ae36510c52,2023-11-07T02:16:23.593000 -CVE-2013-4817,0,1,b23c4350f4741f5525ddf927099f95ac6982f8f4411710bc75c6744ccb39ce49,2024-11-21T01:56:28.050000 -CVE-2013-4818,0,1,16bce6ba1e1b8b2dd44260c55337334ec8d238fc4e5c5b7d01a0e2020210f5be,2024-11-21T01:56:28.163000 -CVE-2013-4819,0,1,696b19c41d04200a8d57a42d2ace268e869c457cb02383de33c9cc0c88658a0a,2024-11-21T01:56:28.283000 -CVE-2013-4820,0,1,e34e0e5057c4e8b3a54cb6c9c9a9cbf6bf4d2f316c335df131d508ee189c6991,2024-11-21T01:56:28.397000 -CVE-2013-4821,0,1,cc19afd714eb6c48086d4fb2c32d1c52eb699b5edbf3f5377df7a5640ff1a8fa,2024-11-21T01:56:28.520000 -CVE-2013-4822,0,1,5ee1e0a128bfaadee8f4fcdeb559193f56c8375c97516325a93802892a174a2f,2024-11-21T01:56:28.663000 -CVE-2013-4823,0,1,95cfa0ed8431723d489bade50616c18112d054f198c5da6d0b56bcc0556a99a3,2024-11-21T01:56:28.773000 -CVE-2013-4824,0,1,fe4ef38f8ee399eab73248ae7ec23c351b7f0efd56ddc7b57ada8ce095284188,2024-11-21T01:56:28.893000 -CVE-2013-4825,0,1,c9632fef16978be41625057c73abc7ec28fb40d49751a14dfa6953fb108b5813,2024-11-21T01:56:29.013000 -CVE-2013-4826,0,1,0786c2a5d234dc2441dab4fedb805de0c13d3b6661d69fce728d1719ddcbdd02,2024-11-21T01:56:29.130000 -CVE-2013-4827,0,1,722997d9b7868883dd9d798df6c627a6cb720008635dd98d327e1fefdfdd2fdb,2024-11-21T01:56:29.247000 -CVE-2013-4828,0,1,b64e84ca6417ad81fb12c38220e7b2d3ceb543380a35b46a4ea054a50439ae45,2024-11-21T01:56:29.367000 -CVE-2013-4829,0,1,d77444c3a37c4fde351baa9d43ecc4ca0c711c57ab40c4202ae6967c8c22d4ea,2024-11-21T01:56:29.480000 -CVE-2013-4830,0,1,45c13a49e27a3cb32b00d93032197409132c80a91574bd7c77406f1fe9cba222,2024-11-21T01:56:29.597000 -CVE-2013-4831,0,1,b9fd782a01c49e52dc1b3ee150315c13d286cd9105a8a7286c34c8575c3f5527,2024-11-21T01:56:29.720000 -CVE-2013-4832,0,1,6a86707e71c0dcce9d0879ede94df7fd9877ed4e90bf6b8e13715b3f75a694dd,2024-11-21T01:56:29.843000 -CVE-2013-4833,0,1,927e5fdac58612ac55eb221e1db7b70374a142c12819f207267d74ef7a085457,2024-11-21T01:56:29.970000 -CVE-2013-4834,0,1,b5264e1a48ce8df586599a1ed284e4dd9e90ab22593c7318e0e5342fd3807050,2024-11-21T01:56:30.083000 -CVE-2013-4835,0,1,215d7dfb73cad70d3be36b95870fa2bf3b9a07a91fe75dbf40fa1e5d953bda75,2024-11-21T01:56:30.200000 -CVE-2013-4836,0,1,fff5132bb7dbbf2f3c1b805250505cfc538c18657defa5f7a64d7bdc89359f06,2024-11-21T01:56:30.327000 -CVE-2013-4837,0,1,9638ed00b45f15c80361f0ff51a55118a435f861a80fc974b7d92936a984e889,2024-11-21T01:56:30.440000 -CVE-2013-4838,0,1,9b9b6e5d54ef2d1efea9c7afc684c62e14219af58746f43fcf8d75adf86b4a80,2024-11-21T01:56:30.553000 -CVE-2013-4839,0,1,b14254504ec6d0036263fbb35e2c66ff916b1368062062b520fa78e216c955fc,2024-11-21T01:56:30.657000 +CVE-2013-4817,0,0,b23c4350f4741f5525ddf927099f95ac6982f8f4411710bc75c6744ccb39ce49,2024-11-21T01:56:28.050000 +CVE-2013-4818,0,0,16bce6ba1e1b8b2dd44260c55337334ec8d238fc4e5c5b7d01a0e2020210f5be,2024-11-21T01:56:28.163000 +CVE-2013-4819,0,0,696b19c41d04200a8d57a42d2ace268e869c457cb02383de33c9cc0c88658a0a,2024-11-21T01:56:28.283000 +CVE-2013-4820,0,0,e34e0e5057c4e8b3a54cb6c9c9a9cbf6bf4d2f316c335df131d508ee189c6991,2024-11-21T01:56:28.397000 +CVE-2013-4821,0,0,cc19afd714eb6c48086d4fb2c32d1c52eb699b5edbf3f5377df7a5640ff1a8fa,2024-11-21T01:56:28.520000 +CVE-2013-4822,0,0,5ee1e0a128bfaadee8f4fcdeb559193f56c8375c97516325a93802892a174a2f,2024-11-21T01:56:28.663000 +CVE-2013-4823,0,0,95cfa0ed8431723d489bade50616c18112d054f198c5da6d0b56bcc0556a99a3,2024-11-21T01:56:28.773000 +CVE-2013-4824,0,0,fe4ef38f8ee399eab73248ae7ec23c351b7f0efd56ddc7b57ada8ce095284188,2024-11-21T01:56:28.893000 +CVE-2013-4825,0,0,c9632fef16978be41625057c73abc7ec28fb40d49751a14dfa6953fb108b5813,2024-11-21T01:56:29.013000 +CVE-2013-4826,0,0,0786c2a5d234dc2441dab4fedb805de0c13d3b6661d69fce728d1719ddcbdd02,2024-11-21T01:56:29.130000 +CVE-2013-4827,0,0,722997d9b7868883dd9d798df6c627a6cb720008635dd98d327e1fefdfdd2fdb,2024-11-21T01:56:29.247000 +CVE-2013-4828,0,0,b64e84ca6417ad81fb12c38220e7b2d3ceb543380a35b46a4ea054a50439ae45,2024-11-21T01:56:29.367000 +CVE-2013-4829,0,0,d77444c3a37c4fde351baa9d43ecc4ca0c711c57ab40c4202ae6967c8c22d4ea,2024-11-21T01:56:29.480000 +CVE-2013-4830,0,0,45c13a49e27a3cb32b00d93032197409132c80a91574bd7c77406f1fe9cba222,2024-11-21T01:56:29.597000 +CVE-2013-4831,0,0,b9fd782a01c49e52dc1b3ee150315c13d286cd9105a8a7286c34c8575c3f5527,2024-11-21T01:56:29.720000 +CVE-2013-4832,0,0,6a86707e71c0dcce9d0879ede94df7fd9877ed4e90bf6b8e13715b3f75a694dd,2024-11-21T01:56:29.843000 +CVE-2013-4833,0,0,927e5fdac58612ac55eb221e1db7b70374a142c12819f207267d74ef7a085457,2024-11-21T01:56:29.970000 +CVE-2013-4834,0,0,b5264e1a48ce8df586599a1ed284e4dd9e90ab22593c7318e0e5342fd3807050,2024-11-21T01:56:30.083000 +CVE-2013-4835,0,0,215d7dfb73cad70d3be36b95870fa2bf3b9a07a91fe75dbf40fa1e5d953bda75,2024-11-21T01:56:30.200000 +CVE-2013-4836,0,0,fff5132bb7dbbf2f3c1b805250505cfc538c18657defa5f7a64d7bdc89359f06,2024-11-21T01:56:30.327000 +CVE-2013-4837,0,0,9638ed00b45f15c80361f0ff51a55118a435f861a80fc974b7d92936a984e889,2024-11-21T01:56:30.440000 +CVE-2013-4838,0,0,9b9b6e5d54ef2d1efea9c7afc684c62e14219af58746f43fcf8d75adf86b4a80,2024-11-21T01:56:30.553000 +CVE-2013-4839,0,0,b14254504ec6d0036263fbb35e2c66ff916b1368062062b520fa78e216c955fc,2024-11-21T01:56:30.657000 CVE-2013-4840,0,0,3fc7471ca375d8befcdb183a88e637345fd2912ac3e8d9e2515f75e6350244e8,2019-10-09T23:08:27.037000 -CVE-2013-4841,0,1,77a33a59e40901403a6c33fa4984a47c5aa1b5c703374c42c837b40789db159a,2024-11-21T01:56:30.887000 -CVE-2013-4842,0,1,ef4f28eb75a4a8962e2bc8ba54807796cc99297f9ff77f03c41b5744b2265e5c,2024-11-21T01:56:31.017000 -CVE-2013-4843,0,1,6dbc44a15cc2c60fdd2b500af0ed14c2dd884a7530f22f4b7c84a7293a7e63c2,2024-11-21T01:56:31.127000 -CVE-2013-4844,0,1,d9fd992cdb5d7ae11b6fdc42ac9f68ab7c164d085325f2aa8a1df75682ad277d,2024-11-21T01:56:31.237000 -CVE-2013-4845,0,1,dee2094d95c86591352d7989bc5d40d95bddaa663f023345fb87ea5dd30b083c,2024-11-21T01:56:31.350000 -CVE-2013-4846,0,1,aca1c4811befbf7c0482a73f9814c7c431aeff2f09c631b21026a2df913331f5,2024-11-21T01:56:31.467000 +CVE-2013-4841,0,0,77a33a59e40901403a6c33fa4984a47c5aa1b5c703374c42c837b40789db159a,2024-11-21T01:56:30.887000 +CVE-2013-4842,0,0,ef4f28eb75a4a8962e2bc8ba54807796cc99297f9ff77f03c41b5744b2265e5c,2024-11-21T01:56:31.017000 +CVE-2013-4843,0,0,6dbc44a15cc2c60fdd2b500af0ed14c2dd884a7530f22f4b7c84a7293a7e63c2,2024-11-21T01:56:31.127000 +CVE-2013-4844,0,0,d9fd992cdb5d7ae11b6fdc42ac9f68ab7c164d085325f2aa8a1df75682ad277d,2024-11-21T01:56:31.237000 +CVE-2013-4845,0,0,dee2094d95c86591352d7989bc5d40d95bddaa663f023345fb87ea5dd30b083c,2024-11-21T01:56:31.350000 +CVE-2013-4846,0,0,aca1c4811befbf7c0482a73f9814c7c431aeff2f09c631b21026a2df913331f5,2024-11-21T01:56:31.467000 CVE-2013-4848,0,0,9b7ad20e94cd1eafad4d999b2eeb0b7c589a4f32881b3756abb3e8296e9e5308,2019-10-28T18:58:52.680000 -CVE-2013-4851,0,1,c1e8c10f9d234ab6cfd3ef8d167c87b78e87aec74c4ae4aa2825245142bdd240,2024-11-21T01:56:31.877000 -CVE-2013-4852,0,1,397837cab75a5907b459166020969b36323cdf25d4eebfc03d6d5ffb4c61b852,2024-11-21T01:56:32.023000 -CVE-2013-4854,0,1,d402b54048ac816c5eb2c0940f4517e22d788da8158bab8b7ca8f1be7dc38d56,2024-11-21T01:56:33.100000 +CVE-2013-4851,0,0,c1e8c10f9d234ab6cfd3ef8d167c87b78e87aec74c4ae4aa2825245142bdd240,2024-11-21T01:56:31.877000 +CVE-2013-4852,0,0,397837cab75a5907b459166020969b36323cdf25d4eebfc03d6d5ffb4c61b852,2024-11-21T01:56:32.023000 +CVE-2013-4854,0,0,d402b54048ac816c5eb2c0940f4517e22d788da8158bab8b7ca8f1be7dc38d56,2024-11-21T01:56:33.100000 CVE-2013-4855,0,0,fb1302fc361b2ff19a02d17b7f73b303cc28ada56eb41cb7a6e230c05ae393ac,2023-04-26T19:27:52.350000 CVE-2013-4856,0,0,3c320cd24457f3ed6d2e5e5432deb2d53ed641254210616c43f1785663dd9f19,2023-04-26T19:27:52.350000 CVE-2013-4857,0,0,ca2d29cd69f315bd2910292c8d489fa1589aad87a16034c14375f7c76202ac48,2023-04-26T19:27:52.350000 -CVE-2013-4858,0,1,1b824cb5eae3b4f3933e4ec98493141d7b55a901404a9f3ebebabc7d067d437b,2024-11-21T01:56:34.713000 +CVE-2013-4858,0,0,1b824cb5eae3b4f3933e4ec98493141d7b55a901404a9f3ebebabc7d067d437b,2024-11-21T01:56:34.713000 CVE-2013-4859,0,0,0a143080401c5b9a9cd407b5046026daee759b7adbc2aca1d1eba5ee979c8b27,2020-01-09T18:09:13.843000 CVE-2013-4860,0,0,572845d8f21fc3be010c33af015b61142adbf2500c925bed75309d71c39b70f5,2017-08-29T01:33:40.607000 CVE-2013-4861,0,0,6acf6791db4e019a18011b285ec58677ea2175a621830e942a35a6d8b6af868a,2020-02-04T16:36:27.750000 @@ -62211,175 +62211,175 @@ CVE-2013-4865,0,0,3117d5451b282db755add361e47fc2512d4110ab526222fbd750f0a44ddcd0 CVE-2013-4866,0,0,1b5264d71365d5aed4b1ea10e81a919f098bbc8696752a0475a3102b5bed2b45,2015-04-23T01:59:08.583000 CVE-2013-4867,0,0,696d01281388aa9b5bc2af06317da22f12d95a9a541093d8537b3f474a3ad273,2020-01-13T16:13:42.683000 CVE-2013-4868,0,0,40835a05b1f03a12d351a00c4e0ff2b6aa9f9facf16a5ef405add5db057075c5,2020-01-08T18:19:10.140000 -CVE-2013-4869,0,1,af4cf507fdd6faa230a5fe64fba3ec3e2b771a2612616cd553af835c99e63af9,2024-11-21T01:56:36.420000 -CVE-2013-4870,0,1,dd02fcbcce234f0de2b514f56d0686d06f880c9149643f2fdf2b7471b6ed459f,2024-11-21T01:56:36.560000 -CVE-2013-4871,0,1,a7f6e0f063c5040e01184801c780562999bee8f6bb3642fa9820963bd4ef5769,2024-11-21T01:56:36.700000 -CVE-2013-4872,0,1,ccd75aad82338e200ab839e4dce4ab4493a46f987ebfc4997328bed4cca7e13a,2024-11-21T01:56:36.870000 -CVE-2013-4873,0,1,0679c359c924d22d658e1fd38cf64b254c8537637a611be19e84102ba26ae0c3,2024-11-21T01:56:37.013000 -CVE-2013-4874,0,1,3b85559d40440fc5875b56c20d6f8e6e4f34edf8489a5ebc7da4dddc5b24582f,2024-11-21T01:56:37.170000 -CVE-2013-4875,0,1,3f8c12ebdfb19edfe2c843044d14e21b6b189b3e810f427f75b0950520e52d56,2024-11-21T01:56:37.317000 -CVE-2013-4876,0,1,5eb1e9fe40e640d76a57a8e5a2cb9f8ca0ee9a3d75c81dad55e8a76915ae39cb,2024-11-21T01:56:37.463000 -CVE-2013-4877,0,1,07e41fe752a944de99c73fb1c850a5a23127842be13c0205e59a6e09ddf11ef9,2024-11-21T01:56:37.613000 -CVE-2013-4878,0,1,0c8eb76f80a148e66e73068761f43b4254a92faaa7dfda7a8bd113c1c9cbabcc,2024-11-21T01:56:37.777000 -CVE-2013-4879,0,1,5bcd4a579e9438c4d0dcf7aab0afa564d9e62a11525dea12044b29d826a34b3f,2024-11-21T01:56:37.943000 -CVE-2013-4880,0,1,2a7a2e15625f5f7d834cc685a5fc498a582656581bd4820e16f74756e1e9bb48,2024-11-21T01:56:38.110000 -CVE-2013-4881,0,1,04c57c62bee7b7a017e2096a1b6c07ce0fe4ee1ec970a738aef6b4a862e1b78c,2024-11-21T01:56:38.263000 -CVE-2013-4882,0,1,6724e696b4aba3a635cb740d7c68da350565fee3a99716ef81f0e6a44df15019,2024-11-21T01:56:38.407000 -CVE-2013-4883,0,1,1df5ce57a3911b533e5a66cad2aba6a92ffef2bbed7c117e838b4bdfe36867a8,2024-11-21T01:56:38.550000 -CVE-2013-4884,0,1,11ef4f300ef33b0f5d4944243fb90add42223918e0953f48a3e206ea4c15297c,2024-11-21T01:56:38.700000 -CVE-2013-4885,0,1,7b841ae6e943ff39b879860c2cdbfa1eeb596c1bd3b63f396e2e760d50ede32c,2024-11-21T01:56:38.860000 -CVE-2013-4887,0,1,a212f3a098081a4690767fbc6a7b8a9b8941953d6297b23983a920da2b44dcaf,2024-11-21T01:56:39.040000 -CVE-2013-4888,0,1,589f69988dd72ac08769d9ad702af5fb3a5fe2b5f20f5f2dc46e40a815054e87,2024-11-21T01:56:39.180000 -CVE-2013-4889,0,1,9209f3eeece724f6d060ffd36edc4aa6c23c4ec4a878dc8523b045c066090e61,2024-11-21T01:56:39.317000 -CVE-2013-4890,0,1,f30e069b1a24e74fd87328ce219de4e0cc68465b26b86e13542a01b244bfb688,2024-11-21T01:56:39.457000 +CVE-2013-4869,0,0,af4cf507fdd6faa230a5fe64fba3ec3e2b771a2612616cd553af835c99e63af9,2024-11-21T01:56:36.420000 +CVE-2013-4870,0,0,dd02fcbcce234f0de2b514f56d0686d06f880c9149643f2fdf2b7471b6ed459f,2024-11-21T01:56:36.560000 +CVE-2013-4871,0,0,a7f6e0f063c5040e01184801c780562999bee8f6bb3642fa9820963bd4ef5769,2024-11-21T01:56:36.700000 +CVE-2013-4872,0,0,ccd75aad82338e200ab839e4dce4ab4493a46f987ebfc4997328bed4cca7e13a,2024-11-21T01:56:36.870000 +CVE-2013-4873,0,0,0679c359c924d22d658e1fd38cf64b254c8537637a611be19e84102ba26ae0c3,2024-11-21T01:56:37.013000 +CVE-2013-4874,0,0,3b85559d40440fc5875b56c20d6f8e6e4f34edf8489a5ebc7da4dddc5b24582f,2024-11-21T01:56:37.170000 +CVE-2013-4875,0,0,3f8c12ebdfb19edfe2c843044d14e21b6b189b3e810f427f75b0950520e52d56,2024-11-21T01:56:37.317000 +CVE-2013-4876,0,0,5eb1e9fe40e640d76a57a8e5a2cb9f8ca0ee9a3d75c81dad55e8a76915ae39cb,2024-11-21T01:56:37.463000 +CVE-2013-4877,0,0,07e41fe752a944de99c73fb1c850a5a23127842be13c0205e59a6e09ddf11ef9,2024-11-21T01:56:37.613000 +CVE-2013-4878,0,0,0c8eb76f80a148e66e73068761f43b4254a92faaa7dfda7a8bd113c1c9cbabcc,2024-11-21T01:56:37.777000 +CVE-2013-4879,0,0,5bcd4a579e9438c4d0dcf7aab0afa564d9e62a11525dea12044b29d826a34b3f,2024-11-21T01:56:37.943000 +CVE-2013-4880,0,0,2a7a2e15625f5f7d834cc685a5fc498a582656581bd4820e16f74756e1e9bb48,2024-11-21T01:56:38.110000 +CVE-2013-4881,0,0,04c57c62bee7b7a017e2096a1b6c07ce0fe4ee1ec970a738aef6b4a862e1b78c,2024-11-21T01:56:38.263000 +CVE-2013-4882,0,0,6724e696b4aba3a635cb740d7c68da350565fee3a99716ef81f0e6a44df15019,2024-11-21T01:56:38.407000 +CVE-2013-4883,0,0,1df5ce57a3911b533e5a66cad2aba6a92ffef2bbed7c117e838b4bdfe36867a8,2024-11-21T01:56:38.550000 +CVE-2013-4884,0,0,11ef4f300ef33b0f5d4944243fb90add42223918e0953f48a3e206ea4c15297c,2024-11-21T01:56:38.700000 +CVE-2013-4885,0,0,7b841ae6e943ff39b879860c2cdbfa1eeb596c1bd3b63f396e2e760d50ede32c,2024-11-21T01:56:38.860000 +CVE-2013-4887,0,0,a212f3a098081a4690767fbc6a7b8a9b8941953d6297b23983a920da2b44dcaf,2024-11-21T01:56:39.040000 +CVE-2013-4888,0,0,589f69988dd72ac08769d9ad702af5fb3a5fe2b5f20f5f2dc46e40a815054e87,2024-11-21T01:56:39.180000 +CVE-2013-4889,0,0,9209f3eeece724f6d060ffd36edc4aa6c23c4ec4a878dc8523b045c066090e61,2024-11-21T01:56:39.317000 +CVE-2013-4890,0,0,f30e069b1a24e74fd87328ce219de4e0cc68465b26b86e13542a01b244bfb688,2024-11-21T01:56:39.457000 CVE-2013-4891,0,0,0bf882508eaaf4994b03fac9270d4e44fc0e8d475ac0a05ab15a1d76f5f4a401,2018-03-09T18:07:50.327000 CVE-2013-4897,0,0,fbc1a20559f71e6fa13776d60f73042f4d165b2665b40797b02b73aad199c888,2023-11-07T02:16:24.283000 -CVE-2013-4898,0,1,f28c0ca659a6574ce26cccfeaa6e2fdb6f910670f5568f72381cda08e17a7784,2024-11-21T01:56:39.777000 -CVE-2013-4899,0,1,cb74f5f339f503f0c04f7ae77c2748472372b4a03cbdcb76dbeb5888e06a5b2d,2024-11-21T01:56:39.927000 -CVE-2013-4900,0,1,016d1927da0deb4e49320356750bf39fd5065dd14773522a56711191062809aa,2024-11-21T01:56:40.073000 -CVE-2013-4911,0,1,aca1e3f52382a6b97ee400e73cb0306e347a5f7f04f99c6794d7b08f17d045c7,2024-11-21T01:56:40.223000 -CVE-2013-4912,0,1,ff9ee35ec25b67bb7e80d07511a88d9b7c9b4765de26a880308eb55930170f01,2024-11-21T01:56:40.377000 -CVE-2013-4920,0,1,f27bd73ee8ecd3e2d6df5f3ca7d3ac59c839926dbcf7de0ec0571f4334190c15,2024-11-21T01:56:40.527000 -CVE-2013-4921,0,1,37831774bb78c1f2984da400bc47d80994c31e505551a0e91b5d29816e540d1e,2024-11-21T01:56:40.690000 -CVE-2013-4922,0,1,b8d79daf441de6985c279685465586f2723d55f4162973afe0a9e617ff9acfba,2024-11-21T01:56:40.847000 -CVE-2013-4923,0,1,807f44d933cbc3c9fe016f8f9481d9a2cce7bab23359ecca3c39d52a3f9bedee,2024-11-21T01:56:41.017000 -CVE-2013-4924,0,1,211d94eb58360442b598cf97e310b69a46049aede960bbfc3040b55df71ddb33,2024-11-21T01:56:41.183000 -CVE-2013-4925,0,1,5b02c92bd3623037bd6245ef20ba1dcb26dfacdd3746d34451fff3943aca87a0,2024-11-21T01:56:41.363000 -CVE-2013-4926,0,1,4f0cdfd5f054d4457d3d33dc3e52cdf8ae5f3315f25be147c38df826dc39effe,2024-11-21T01:56:41.520000 -CVE-2013-4927,0,1,bc6c80ae536f6dfc1bb2ae1d52a21a875f7b7d0127d8bb09b3b145aa724b4b4a,2024-11-21T01:56:41.690000 -CVE-2013-4928,0,1,38f20d600f87295809603878c6c7255585cc0a3766145945f477a89241306a1e,2024-11-21T01:56:41.863000 -CVE-2013-4929,0,1,e0948122df2e2852fcea2a87abc1df95090d3c098a649007c136db0b330e2056,2024-11-21T01:56:42.023000 -CVE-2013-4930,0,1,7dc6ce5015f72841e7a6503c7c00e7be647b7c029781f8e557b3c092c50362ec,2024-11-21T01:56:42.197000 -CVE-2013-4931,0,1,16a82e236e268315196b6ea65b14942b7c5fb7e3c336cfefcae26c0bc937dc28,2024-11-21T01:56:42.360000 -CVE-2013-4932,0,1,3f2104dd0cc5d733c86c2f1aad8683e3b137f078e118f9637cff3f28c77e9109,2024-11-21T01:56:42.520000 -CVE-2013-4933,0,1,2ff8fdc2f0c664c39b63b088d5f785fd70de1dc8ae58b0f521176fd441b1feeb,2024-11-21T01:56:42.690000 -CVE-2013-4934,0,1,31897f52958809fde3e6ffb1b230a209359e57aae50a59f8855051b4c9da1fb3,2024-11-21T01:56:42.860000 -CVE-2013-4935,0,1,51fb2c1c2274e5955d014934f5d20b187e5f5f57bd6fc93a1aec4160eb3ea430,2024-11-21T01:56:43.037000 -CVE-2013-4936,0,1,12a8a5b21584c8b574cd63a3d83511d3d26d3b394daeccd888c7d3c1777e152e,2024-11-21T01:56:43.203000 -CVE-2013-4937,0,1,7aec3f02bebb688ea4f0c84a20d9534ad6092811afc66b10e9f1717bf946ff58,2024-11-21T01:56:43.360000 -CVE-2013-4938,0,1,ff404591a56e07b23ecbbf6eabf899cf43546823916952418c502ab0d2b32a86,2024-11-21T01:56:43.540000 -CVE-2013-4939,0,1,44ec7b77edf2db605ecacd7eefd4448f74a52fc46e5bf431bdafaad4b9097de0,2024-11-21T01:56:43.713000 -CVE-2013-4940,0,1,a49477466c6a3547d5a0643cb7e385949b23081b826f09c1d59cbfda25a51ee8,2024-11-21T01:56:43.900000 -CVE-2013-4941,0,1,d9fe008d1c5b78d175363e1589a6ea65ebec930eec54f7b1b583af6ec6e6b4a3,2024-11-21T01:56:44.057000 -CVE-2013-4942,0,1,104801eed8c03e69173ad46064e61aa8125adcc9c447c620a3ab355647875d0e,2024-11-21T01:56:44.210000 -CVE-2013-4943,0,1,d4eca92c1968f7bbcaf887719a55e82777e1f22f29b16c571142b77919273dbd,2024-11-21T01:56:44.373000 -CVE-2013-4944,0,1,55be58acd200c9dac146c474c7d76622964c03d1aff1736755fc78fdca3fce12,2024-11-21T01:56:44.537000 -CVE-2013-4945,0,1,28720ee554429b358dae0665816302b9141af19580db1f17b2e178e7ea1fcaab,2024-11-21T01:56:44.687000 -CVE-2013-4946,0,1,ecf63aad9b88abd544ad828d3b3aa91c26a86641fe9dc857ed2758e9dfbc97e0,2024-11-21T01:56:44.840000 -CVE-2013-4947,0,1,85f7ac18fe6dc62fad7cf3553b7fe29c34fd0a7214b55149c560c39002e1ce9c,2024-11-21T01:56:44.993000 -CVE-2013-4948,0,1,fbd8a5c87b1f948a2b7d6b17845a2c43f6db9eebb98f1c93b7564e9d85bb44d6,2024-11-21T01:56:45.153000 -CVE-2013-4949,0,1,1a1cf44056c98dcc7cce3861ea296616bc5674bba83e55d947688d5eb90697d4,2024-11-21T01:56:45.313000 -CVE-2013-4950,0,1,3d05d28d28709ce9a87279d263d9bda871d4e24d12a0c2a5f0bd0933178fa53e,2024-11-21T01:56:45.470000 -CVE-2013-4951,0,1,ed7fc860489768e007d36fe69721fa2e5179f5af327c369e050d395839af338d,2024-11-21T01:56:45.617000 -CVE-2013-4952,0,1,bfbdf42d501a91f5feee964788854c32b9b94d4632bc1b99a4c7ac1a77494c00,2024-11-21T01:56:45.757000 -CVE-2013-4953,0,1,3355057c386a32d553d1677ce16d28fe069fda6207e95cc289a3633d60628c66,2024-11-21T01:56:45.900000 -CVE-2013-4954,0,1,9f4b1dc29a7fd169e77f2264448d255a9ee052678bdcec1af14396eeed5ea84e,2024-11-21T01:56:46.040000 -CVE-2013-4955,0,1,b6fefaa10f64f48d14fd82d50b0969a9988bd63fd54e771a3a11da13bdd2e891,2024-11-21T01:56:46.197000 -CVE-2013-4956,0,1,800bb7662d4065ead64263aaec1fa3627785b228b2c48865892df443b2ae5f14,2024-11-21T01:56:46.343000 -CVE-2013-4957,0,1,b9bee77f9211230d49d232d4ea9b79905b0306136565329f8019a06b919ebc97,2024-11-21T01:56:46.503000 -CVE-2013-4958,0,1,1272af72d9921d991eaaae27cf979d5b9d82d8bfe8794265258462c8de1d6739,2024-11-21T01:56:46.653000 -CVE-2013-4959,0,1,1423b3599e026bab6958c6bd02508a105364e02cfb49d0169f378988c265c653,2024-11-21T01:56:46.810000 -CVE-2013-4961,0,1,33e499d44af8c429653af165fd04ae3618e2ba06dabbfaddde5d3eaa9a7153dc,2024-11-21T01:56:46.973000 -CVE-2013-4962,0,1,458232a45e33e6ad12b35e269a468686c6d7f331f96ebac7a3d669237fec38a9,2024-11-21T01:56:47.137000 -CVE-2013-4963,0,1,d6cef51f775043ef565900171596f171e5f778882497e6626b39f42cfef53b63,2024-11-21T01:56:47.810000 -CVE-2013-4964,0,1,3511154bd3312b2c72d1324e73aad590cfbc8e473b7c9fe1b5feb467e033426f,2024-11-21T01:56:48.163000 -CVE-2013-4965,0,1,5cf80d0e476579dbcf9f88b4f7f52c34a8ba0fa2a6a1909c6c2d66c91339554a,2024-11-21T01:56:48.330000 -CVE-2013-4966,0,1,994c086f5ec6326c9e36d22ac4ea600057e52e7510749cfa1511dbbe178e8efa,2024-11-21T01:56:48.483000 -CVE-2013-4967,0,1,93e13ddd233aba786c5d2313f739fd1e143e0168d6092bbbb5d7a63c4b09d520,2024-11-21T01:56:48.630000 +CVE-2013-4898,0,0,f28c0ca659a6574ce26cccfeaa6e2fdb6f910670f5568f72381cda08e17a7784,2024-11-21T01:56:39.777000 +CVE-2013-4899,0,0,cb74f5f339f503f0c04f7ae77c2748472372b4a03cbdcb76dbeb5888e06a5b2d,2024-11-21T01:56:39.927000 +CVE-2013-4900,0,0,016d1927da0deb4e49320356750bf39fd5065dd14773522a56711191062809aa,2024-11-21T01:56:40.073000 +CVE-2013-4911,0,0,aca1e3f52382a6b97ee400e73cb0306e347a5f7f04f99c6794d7b08f17d045c7,2024-11-21T01:56:40.223000 +CVE-2013-4912,0,0,ff9ee35ec25b67bb7e80d07511a88d9b7c9b4765de26a880308eb55930170f01,2024-11-21T01:56:40.377000 +CVE-2013-4920,0,0,f27bd73ee8ecd3e2d6df5f3ca7d3ac59c839926dbcf7de0ec0571f4334190c15,2024-11-21T01:56:40.527000 +CVE-2013-4921,0,0,37831774bb78c1f2984da400bc47d80994c31e505551a0e91b5d29816e540d1e,2024-11-21T01:56:40.690000 +CVE-2013-4922,0,0,b8d79daf441de6985c279685465586f2723d55f4162973afe0a9e617ff9acfba,2024-11-21T01:56:40.847000 +CVE-2013-4923,0,0,807f44d933cbc3c9fe016f8f9481d9a2cce7bab23359ecca3c39d52a3f9bedee,2024-11-21T01:56:41.017000 +CVE-2013-4924,0,0,211d94eb58360442b598cf97e310b69a46049aede960bbfc3040b55df71ddb33,2024-11-21T01:56:41.183000 +CVE-2013-4925,0,0,5b02c92bd3623037bd6245ef20ba1dcb26dfacdd3746d34451fff3943aca87a0,2024-11-21T01:56:41.363000 +CVE-2013-4926,0,0,4f0cdfd5f054d4457d3d33dc3e52cdf8ae5f3315f25be147c38df826dc39effe,2024-11-21T01:56:41.520000 +CVE-2013-4927,0,0,bc6c80ae536f6dfc1bb2ae1d52a21a875f7b7d0127d8bb09b3b145aa724b4b4a,2024-11-21T01:56:41.690000 +CVE-2013-4928,0,0,38f20d600f87295809603878c6c7255585cc0a3766145945f477a89241306a1e,2024-11-21T01:56:41.863000 +CVE-2013-4929,0,0,e0948122df2e2852fcea2a87abc1df95090d3c098a649007c136db0b330e2056,2024-11-21T01:56:42.023000 +CVE-2013-4930,0,0,7dc6ce5015f72841e7a6503c7c00e7be647b7c029781f8e557b3c092c50362ec,2024-11-21T01:56:42.197000 +CVE-2013-4931,0,0,16a82e236e268315196b6ea65b14942b7c5fb7e3c336cfefcae26c0bc937dc28,2024-11-21T01:56:42.360000 +CVE-2013-4932,0,0,3f2104dd0cc5d733c86c2f1aad8683e3b137f078e118f9637cff3f28c77e9109,2024-11-21T01:56:42.520000 +CVE-2013-4933,0,0,2ff8fdc2f0c664c39b63b088d5f785fd70de1dc8ae58b0f521176fd441b1feeb,2024-11-21T01:56:42.690000 +CVE-2013-4934,0,0,31897f52958809fde3e6ffb1b230a209359e57aae50a59f8855051b4c9da1fb3,2024-11-21T01:56:42.860000 +CVE-2013-4935,0,0,51fb2c1c2274e5955d014934f5d20b187e5f5f57bd6fc93a1aec4160eb3ea430,2024-11-21T01:56:43.037000 +CVE-2013-4936,0,0,12a8a5b21584c8b574cd63a3d83511d3d26d3b394daeccd888c7d3c1777e152e,2024-11-21T01:56:43.203000 +CVE-2013-4937,0,0,7aec3f02bebb688ea4f0c84a20d9534ad6092811afc66b10e9f1717bf946ff58,2024-11-21T01:56:43.360000 +CVE-2013-4938,0,0,ff404591a56e07b23ecbbf6eabf899cf43546823916952418c502ab0d2b32a86,2024-11-21T01:56:43.540000 +CVE-2013-4939,0,0,44ec7b77edf2db605ecacd7eefd4448f74a52fc46e5bf431bdafaad4b9097de0,2024-11-21T01:56:43.713000 +CVE-2013-4940,0,0,a49477466c6a3547d5a0643cb7e385949b23081b826f09c1d59cbfda25a51ee8,2024-11-21T01:56:43.900000 +CVE-2013-4941,0,0,d9fe008d1c5b78d175363e1589a6ea65ebec930eec54f7b1b583af6ec6e6b4a3,2024-11-21T01:56:44.057000 +CVE-2013-4942,0,0,104801eed8c03e69173ad46064e61aa8125adcc9c447c620a3ab355647875d0e,2024-11-21T01:56:44.210000 +CVE-2013-4943,0,0,d4eca92c1968f7bbcaf887719a55e82777e1f22f29b16c571142b77919273dbd,2024-11-21T01:56:44.373000 +CVE-2013-4944,0,0,55be58acd200c9dac146c474c7d76622964c03d1aff1736755fc78fdca3fce12,2024-11-21T01:56:44.537000 +CVE-2013-4945,0,0,28720ee554429b358dae0665816302b9141af19580db1f17b2e178e7ea1fcaab,2024-11-21T01:56:44.687000 +CVE-2013-4946,0,0,ecf63aad9b88abd544ad828d3b3aa91c26a86641fe9dc857ed2758e9dfbc97e0,2024-11-21T01:56:44.840000 +CVE-2013-4947,0,0,85f7ac18fe6dc62fad7cf3553b7fe29c34fd0a7214b55149c560c39002e1ce9c,2024-11-21T01:56:44.993000 +CVE-2013-4948,0,0,fbd8a5c87b1f948a2b7d6b17845a2c43f6db9eebb98f1c93b7564e9d85bb44d6,2024-11-21T01:56:45.153000 +CVE-2013-4949,0,0,1a1cf44056c98dcc7cce3861ea296616bc5674bba83e55d947688d5eb90697d4,2024-11-21T01:56:45.313000 +CVE-2013-4950,0,0,3d05d28d28709ce9a87279d263d9bda871d4e24d12a0c2a5f0bd0933178fa53e,2024-11-21T01:56:45.470000 +CVE-2013-4951,0,0,ed7fc860489768e007d36fe69721fa2e5179f5af327c369e050d395839af338d,2024-11-21T01:56:45.617000 +CVE-2013-4952,0,0,bfbdf42d501a91f5feee964788854c32b9b94d4632bc1b99a4c7ac1a77494c00,2024-11-21T01:56:45.757000 +CVE-2013-4953,0,0,3355057c386a32d553d1677ce16d28fe069fda6207e95cc289a3633d60628c66,2024-11-21T01:56:45.900000 +CVE-2013-4954,0,0,9f4b1dc29a7fd169e77f2264448d255a9ee052678bdcec1af14396eeed5ea84e,2024-11-21T01:56:46.040000 +CVE-2013-4955,0,0,b6fefaa10f64f48d14fd82d50b0969a9988bd63fd54e771a3a11da13bdd2e891,2024-11-21T01:56:46.197000 +CVE-2013-4956,0,0,800bb7662d4065ead64263aaec1fa3627785b228b2c48865892df443b2ae5f14,2024-11-21T01:56:46.343000 +CVE-2013-4957,0,0,b9bee77f9211230d49d232d4ea9b79905b0306136565329f8019a06b919ebc97,2024-11-21T01:56:46.503000 +CVE-2013-4958,0,0,1272af72d9921d991eaaae27cf979d5b9d82d8bfe8794265258462c8de1d6739,2024-11-21T01:56:46.653000 +CVE-2013-4959,0,0,1423b3599e026bab6958c6bd02508a105364e02cfb49d0169f378988c265c653,2024-11-21T01:56:46.810000 +CVE-2013-4961,0,0,33e499d44af8c429653af165fd04ae3618e2ba06dabbfaddde5d3eaa9a7153dc,2024-11-21T01:56:46.973000 +CVE-2013-4962,0,0,458232a45e33e6ad12b35e269a468686c6d7f331f96ebac7a3d669237fec38a9,2024-11-21T01:56:47.137000 +CVE-2013-4963,0,0,d6cef51f775043ef565900171596f171e5f778882497e6626b39f42cfef53b63,2024-11-21T01:56:47.810000 +CVE-2013-4964,0,0,3511154bd3312b2c72d1324e73aad590cfbc8e473b7c9fe1b5feb467e033426f,2024-11-21T01:56:48.163000 +CVE-2013-4965,0,0,5cf80d0e476579dbcf9f88b4f7f52c34a8ba0fa2a6a1909c6c2d66c91339554a,2024-11-21T01:56:48.330000 +CVE-2013-4966,0,0,994c086f5ec6326c9e36d22ac4ea600057e52e7510749cfa1511dbbe178e8efa,2024-11-21T01:56:48.483000 +CVE-2013-4967,0,0,93e13ddd233aba786c5d2313f739fd1e143e0168d6092bbbb5d7a63c4b09d520,2024-11-21T01:56:48.630000 CVE-2013-4968,0,0,aee61cc88cafb198ef0f6af3e42c54f1cd5ae79b23a6fb0a3474084ddc83a429,2019-12-13T21:07:25.003000 -CVE-2013-4969,0,1,6b48ab1eddcda3585884f928bc910f7ae554a8ac54fb747be92a456436cd68f2,2024-11-21T01:56:48.930000 -CVE-2013-4971,0,1,336ef04638646b0a5e450f3f69d51c98789af1f3834383e04f77a3fe863be300,2024-11-21T01:56:49.080000 -CVE-2013-4973,0,1,f82160bec78eb3d876645711845a392ec34af45b18fb3bb08d90b58df142cdea,2024-11-21T01:56:49.237000 -CVE-2013-4974,0,1,c434de1937c1547c15e880be585850794e78e9776f7d596376224e86c9510144,2024-11-21T01:56:49.393000 +CVE-2013-4969,0,0,6b48ab1eddcda3585884f928bc910f7ae554a8ac54fb747be92a456436cd68f2,2024-11-21T01:56:48.930000 +CVE-2013-4971,0,0,336ef04638646b0a5e450f3f69d51c98789af1f3834383e04f77a3fe863be300,2024-11-21T01:56:49.080000 +CVE-2013-4973,0,0,f82160bec78eb3d876645711845a392ec34af45b18fb3bb08d90b58df142cdea,2024-11-21T01:56:49.237000 +CVE-2013-4974,0,0,c434de1937c1547c15e880be585850794e78e9776f7d596376224e86c9510144,2024-11-21T01:56:49.393000 CVE-2013-4975,0,0,b44580ff1d404c9a2d5d02e5f772eaefa1aa6f2cb3f69075d295834afc73a07f,2020-01-14T19:59:37.607000 CVE-2013-4976,0,0,43bd1fe08b36c0d7acef20663df8130167885a0d2898a1721d0212002aa8bbb0,2020-01-10T01:58:43.877000 -CVE-2013-4977,0,1,b40ec6d038dbd8458065aacf95069c1cb08ff71613249699e7139462dff4a3d8,2024-11-21T01:56:49.887000 -CVE-2013-4978,0,1,2bb7f7fea061d9a04a5b0a8cd90f3c41182facd7df56d41b6192ed98a330c82e,2024-11-21T01:56:50.033000 -CVE-2013-4979,0,1,247aa0cacb76d2f796883bfc44b60a38f94686484e0206e1f79037afdb9d22b1,2024-11-21T01:56:50.160000 -CVE-2013-4980,0,1,d44149eb4ca21b26ce1f459d61cbee0822958546a1120d9b494c6f13af0f9e03,2024-11-21T01:56:50.303000 -CVE-2013-4981,0,1,f070bed64bff3cac9767fc2ebf5cdb7925a3ce3b45a809b39c65c167ebacced4,2024-11-21T01:56:50.447000 +CVE-2013-4977,0,0,b40ec6d038dbd8458065aacf95069c1cb08ff71613249699e7139462dff4a3d8,2024-11-21T01:56:49.887000 +CVE-2013-4978,0,0,2bb7f7fea061d9a04a5b0a8cd90f3c41182facd7df56d41b6192ed98a330c82e,2024-11-21T01:56:50.033000 +CVE-2013-4979,0,0,247aa0cacb76d2f796883bfc44b60a38f94686484e0206e1f79037afdb9d22b1,2024-11-21T01:56:50.160000 +CVE-2013-4980,0,0,d44149eb4ca21b26ce1f459d61cbee0822958546a1120d9b494c6f13af0f9e03,2024-11-21T01:56:50.303000 +CVE-2013-4981,0,0,f070bed64bff3cac9767fc2ebf5cdb7925a3ce3b45a809b39c65c167ebacced4,2024-11-21T01:56:50.447000 CVE-2013-4982,0,0,cf4278b4a78627cfcf968709c8e5a7b50b60315fe1ab8e5128418237d1a8ac6c,2020-01-15T14:39:26.487000 -CVE-2013-4983,0,1,b514ccd747d574c2f2fe3cd0ce533fc299f90ea4df30f57dd2b98eb40e4f6272,2024-11-21T01:56:50.770000 -CVE-2013-4984,0,1,ba9939664375fcc9699f843643a2a4da08b5866b78a2259668bb481302c22684,2024-11-21T01:56:50.930000 +CVE-2013-4983,0,0,b514ccd747d574c2f2fe3cd0ce533fc299f90ea4df30f57dd2b98eb40e4f6272,2024-11-21T01:56:50.770000 +CVE-2013-4984,0,0,ba9939664375fcc9699f843643a2a4da08b5866b78a2259668bb481302c22684,2024-11-21T01:56:50.930000 CVE-2013-4985,0,0,1b0dca6dc2d3ba034772a4d5352895418b72fac35d6f09292b4a6ecdacdf2d45,2020-01-17T13:45:26.017000 -CVE-2013-4986,0,1,bf8caa8ec55341d1662ec64753c15bd64f69cf2049185ff8ed01ea08b1416a0a,2024-11-21T01:56:51.233000 -CVE-2013-4987,0,1,5bbb8d5fb3d9855f9f0e4306bfdab8ef616f613eb94097c86d2a1440e17fa53f,2024-11-21T01:56:51.387000 -CVE-2013-4988,0,1,d9b27d154868dd1725c8d2d8f458aff3db92f35ba4ad66fae3c72b0b5ee7d54f,2024-11-21T01:56:51.527000 -CVE-2013-4995,0,1,cb4a54ebed9d8a41a05779e4fff6375146cdf1d4278c7ad1b00b4aaf3df3c100,2024-11-21T01:56:51.700000 -CVE-2013-4996,0,1,cc4cf17bf62ef5ceb980240d950095742b7bbc317bf54765fdf3a26ab599afc7,2024-11-21T01:56:51.860000 -CVE-2013-4997,0,1,7993305ddb8e79f5a266181e4f117668e63433c70829fc112b18eba09ea04383,2024-11-21T01:56:52.020000 -CVE-2013-4998,0,1,b569f79f0141b60577aef562eabd371aafd1683dd15f64ce17d024a975b5c25d,2024-11-21T01:56:52.190000 -CVE-2013-4999,0,1,6c860c48c9c93cb15634453f17bb9bbccfdd17ccab1100215901fca288ecd042,2024-11-21T01:56:52.337000 -CVE-2013-5000,0,1,9a2c91bc5448401bdd62c13ac001a32e9ffb2c3c149645395cff79b1b23a98e7,2024-11-21T01:56:52.477000 -CVE-2013-5001,0,1,803467204403de5eff74eb2c8c6134a7801ebbf7e2597a7ae166dc7431d7eb25,2024-11-21T01:56:52.610000 -CVE-2013-5002,0,1,4425218fb3f518792753495e3448f11e9d0c5fc737513f95c2fbf1b3db0b5393,2024-11-21T01:56:52.743000 -CVE-2013-5003,0,1,60b7532f4afab4afcdecfdfccc9ab4081321b41552c03793d04108817fb5c28f,2024-11-21T01:56:52.890000 -CVE-2013-5005,0,1,c0b6bd202aba3f4847e5ada1281a395016ec34bb1953636d1150755dcfc83169,2024-11-21T01:56:53.037000 -CVE-2013-5006,0,1,a9767153a4808281029f7824209e1c04915bcaa334ade108c4219e829b6ca274,2024-11-21T01:56:53.180000 -CVE-2013-5008,0,1,1f4e3f7dca1f089599628e277c8f1c55e1f0b87ae15af8c335fa2c1dead283f0,2024-11-21T01:56:53.317000 -CVE-2013-5009,0,1,27acea3d1e606f97f4ba2cc0949ba4f029508ff3cba23e2013b449826d4c6f9f,2024-11-21T01:56:53.430000 -CVE-2013-5010,0,1,847cab5f40241aa35dcf43001330591ef836cf2a4abff8ef1ef06bab98cf2705,2024-11-21T01:56:53.547000 -CVE-2013-5011,0,1,d6c37dd1d7ae98062a46a9823d26ff44ed02bbbdad04d6514139c481d2bcdfa3,2024-11-21T01:56:53.657000 -CVE-2013-5012,0,1,4e6c492ef2c6c346460e92131384f1221e845f7bcc58cb140d9804f040ea8de3,2024-11-21T01:56:53.783000 -CVE-2013-5013,0,1,a4f7810790f23a1512b9ed9a62939c9d8432fa637c23171e496eee6ed3bd5a51,2024-11-21T01:56:53.893000 -CVE-2013-5014,0,1,4c0b6c4eb15bfaf8fd6407d12df111fb04ead6f15927f5c97515fde1e2fd9bc8,2024-11-21T01:56:54.007000 -CVE-2013-5015,0,1,d76611d5b3682d479f712917ce0f166062debcc842b7d3fb548534fb430b2760,2024-11-21T01:56:54.120000 -CVE-2013-5016,0,1,eaa9b155be61a034a4c02a01217fa1530f5ed0fc8f94069c33e49ea25c82bfb3,2024-11-21T01:56:54.233000 +CVE-2013-4986,0,0,bf8caa8ec55341d1662ec64753c15bd64f69cf2049185ff8ed01ea08b1416a0a,2024-11-21T01:56:51.233000 +CVE-2013-4987,0,0,5bbb8d5fb3d9855f9f0e4306bfdab8ef616f613eb94097c86d2a1440e17fa53f,2024-11-21T01:56:51.387000 +CVE-2013-4988,0,0,d9b27d154868dd1725c8d2d8f458aff3db92f35ba4ad66fae3c72b0b5ee7d54f,2024-11-21T01:56:51.527000 +CVE-2013-4995,0,0,cb4a54ebed9d8a41a05779e4fff6375146cdf1d4278c7ad1b00b4aaf3df3c100,2024-11-21T01:56:51.700000 +CVE-2013-4996,0,0,cc4cf17bf62ef5ceb980240d950095742b7bbc317bf54765fdf3a26ab599afc7,2024-11-21T01:56:51.860000 +CVE-2013-4997,0,0,7993305ddb8e79f5a266181e4f117668e63433c70829fc112b18eba09ea04383,2024-11-21T01:56:52.020000 +CVE-2013-4998,0,0,b569f79f0141b60577aef562eabd371aafd1683dd15f64ce17d024a975b5c25d,2024-11-21T01:56:52.190000 +CVE-2013-4999,0,0,6c860c48c9c93cb15634453f17bb9bbccfdd17ccab1100215901fca288ecd042,2024-11-21T01:56:52.337000 +CVE-2013-5000,0,0,9a2c91bc5448401bdd62c13ac001a32e9ffb2c3c149645395cff79b1b23a98e7,2024-11-21T01:56:52.477000 +CVE-2013-5001,0,0,803467204403de5eff74eb2c8c6134a7801ebbf7e2597a7ae166dc7431d7eb25,2024-11-21T01:56:52.610000 +CVE-2013-5002,0,0,4425218fb3f518792753495e3448f11e9d0c5fc737513f95c2fbf1b3db0b5393,2024-11-21T01:56:52.743000 +CVE-2013-5003,0,0,60b7532f4afab4afcdecfdfccc9ab4081321b41552c03793d04108817fb5c28f,2024-11-21T01:56:52.890000 +CVE-2013-5005,0,0,c0b6bd202aba3f4847e5ada1281a395016ec34bb1953636d1150755dcfc83169,2024-11-21T01:56:53.037000 +CVE-2013-5006,0,0,a9767153a4808281029f7824209e1c04915bcaa334ade108c4219e829b6ca274,2024-11-21T01:56:53.180000 +CVE-2013-5008,0,0,1f4e3f7dca1f089599628e277c8f1c55e1f0b87ae15af8c335fa2c1dead283f0,2024-11-21T01:56:53.317000 +CVE-2013-5009,0,0,27acea3d1e606f97f4ba2cc0949ba4f029508ff3cba23e2013b449826d4c6f9f,2024-11-21T01:56:53.430000 +CVE-2013-5010,0,0,847cab5f40241aa35dcf43001330591ef836cf2a4abff8ef1ef06bab98cf2705,2024-11-21T01:56:53.547000 +CVE-2013-5011,0,0,d6c37dd1d7ae98062a46a9823d26ff44ed02bbbdad04d6514139c481d2bcdfa3,2024-11-21T01:56:53.657000 +CVE-2013-5012,0,0,4e6c492ef2c6c346460e92131384f1221e845f7bcc58cb140d9804f040ea8de3,2024-11-21T01:56:53.783000 +CVE-2013-5013,0,0,a4f7810790f23a1512b9ed9a62939c9d8432fa637c23171e496eee6ed3bd5a51,2024-11-21T01:56:53.893000 +CVE-2013-5014,0,0,4c0b6c4eb15bfaf8fd6407d12df111fb04ead6f15927f5c97515fde1e2fd9bc8,2024-11-21T01:56:54.007000 +CVE-2013-5015,0,0,d76611d5b3682d479f712917ce0f166062debcc842b7d3fb548534fb430b2760,2024-11-21T01:56:54.120000 +CVE-2013-5016,0,0,eaa9b155be61a034a4c02a01217fa1530f5ed0fc8f94069c33e49ea25c82bfb3,2024-11-21T01:56:54.233000 CVE-2013-5017,0,0,c62e8d5870a5928825c6a25922c8b91d53ccf44f70df0b01389ad81c3fd85021,2017-12-28T02:29:00.300000 -CVE-2013-5018,0,1,26ccba6d4c50f7386e74e26d3e2964c67a0222e7f7601e984ffb538216e300aa,2024-11-21T01:56:54.470000 -CVE-2013-5019,0,1,bc0477bdc455cca2b2768af8c4488a40e25198c7e18fcc67f23c576260b5880e,2024-11-21T01:56:54.623000 -CVE-2013-5020,0,1,fd7c503d54f81f89236d6988cd812bbcbe74d63ba14d9292d77e0c133d79dda7,2024-11-21T01:56:54.777000 -CVE-2013-5021,0,1,d7b29427a9000b4f62d48398fd824b40dfe184049c3c7471d4308f4dcb051795,2024-11-21T01:56:54.917000 -CVE-2013-5022,0,1,01382b4732f2d4939266d22ef336fc3aa9abfa91b31fdcb4bdac13120fb3004b,2024-11-21T01:56:55.063000 -CVE-2013-5023,0,1,4a2945de0c0f2b17dd7556db4075e1d73b12cf5b4971314a765513e395e811ce,2024-11-21T01:56:55.220000 -CVE-2013-5024,0,1,66bb6dd1887061f7453a5194fd3b24e81a6156a6b1686a54e36b1a5ca60161fd,2024-11-21T01:56:55.370000 -CVE-2013-5025,0,1,8de57c01371f75dbc8410edc2a8ed57ed47b360c63bbc98a480b47c4a609d393,2024-11-21T01:56:55.507000 -CVE-2013-5026,0,1,b7e04837a4bddad7615fdd25141745400c257e31e9c0d27997946335f30ead61,2024-11-21T01:56:55.647000 +CVE-2013-5018,0,0,26ccba6d4c50f7386e74e26d3e2964c67a0222e7f7601e984ffb538216e300aa,2024-11-21T01:56:54.470000 +CVE-2013-5019,0,0,bc0477bdc455cca2b2768af8c4488a40e25198c7e18fcc67f23c576260b5880e,2024-11-21T01:56:54.623000 +CVE-2013-5020,0,0,fd7c503d54f81f89236d6988cd812bbcbe74d63ba14d9292d77e0c133d79dda7,2024-11-21T01:56:54.777000 +CVE-2013-5021,0,0,d7b29427a9000b4f62d48398fd824b40dfe184049c3c7471d4308f4dcb051795,2024-11-21T01:56:54.917000 +CVE-2013-5022,0,0,01382b4732f2d4939266d22ef336fc3aa9abfa91b31fdcb4bdac13120fb3004b,2024-11-21T01:56:55.063000 +CVE-2013-5023,0,0,4a2945de0c0f2b17dd7556db4075e1d73b12cf5b4971314a765513e395e811ce,2024-11-21T01:56:55.220000 +CVE-2013-5024,0,0,66bb6dd1887061f7453a5194fd3b24e81a6156a6b1686a54e36b1a5ca60161fd,2024-11-21T01:56:55.370000 +CVE-2013-5025,0,0,8de57c01371f75dbc8410edc2a8ed57ed47b360c63bbc98a480b47c4a609d393,2024-11-21T01:56:55.507000 +CVE-2013-5026,0,0,b7e04837a4bddad7615fdd25141745400c257e31e9c0d27997946335f30ead61,2024-11-21T01:56:55.647000 CVE-2013-5027,0,0,f4f9c86aff60fd14bb3499c4593b8329840e11b3d07052866c415316352659b6,2019-12-30T18:33:48.030000 -CVE-2013-5028,0,1,83849370a03ba001f558e7bd34fc74585e88e312d25e9d22db0252c0f4fcf6e2,2024-11-21T01:56:55.930000 -CVE-2013-5029,0,1,03ea484c558f565121eeb25e874926fd4bf512accc41e6be9c2a309e1c69a2ca,2024-11-21T01:56:56.070000 -CVE-2013-5030,0,1,21eff3598eda7617aeac5aa7495834e2872836808fba8844d85ac5f4c2a5ba36,2024-11-21T01:56:56.213000 -CVE-2013-5031,0,1,9fa1a2f15fc8a043d0f7e16cd1400f69bcd9fb77e137e907e195c9c002b66892,2024-11-21T01:56:56.367000 -CVE-2013-5032,0,1,9717116bd75af1b66c513f64f6239aa9885f95831401a17755606cb0ff2d266a,2024-11-21T01:56:56.513000 -CVE-2013-5033,0,1,8a56209d502d8bfb355eb965aa04b5eab61e3aacb87e040948b4607cea013c17,2024-11-21T01:56:56.650000 -CVE-2013-5034,0,1,cfe49a74244e8b453f3a610b3aadfa3d897a01a4a33b7da465dcdb8ebd9c9a8a,2024-11-21T01:56:56.800000 -CVE-2013-5035,0,1,860d8d940048717f895e2cf381c9ef4f5c2cad1872bb53343ad4b9890cfa34c0,2024-11-21T01:56:56.947000 +CVE-2013-5028,0,0,83849370a03ba001f558e7bd34fc74585e88e312d25e9d22db0252c0f4fcf6e2,2024-11-21T01:56:55.930000 +CVE-2013-5029,0,0,03ea484c558f565121eeb25e874926fd4bf512accc41e6be9c2a309e1c69a2ca,2024-11-21T01:56:56.070000 +CVE-2013-5030,0,0,21eff3598eda7617aeac5aa7495834e2872836808fba8844d85ac5f4c2a5ba36,2024-11-21T01:56:56.213000 +CVE-2013-5031,0,0,9fa1a2f15fc8a043d0f7e16cd1400f69bcd9fb77e137e907e195c9c002b66892,2024-11-21T01:56:56.367000 +CVE-2013-5032,0,0,9717116bd75af1b66c513f64f6239aa9885f95831401a17755606cb0ff2d266a,2024-11-21T01:56:56.513000 +CVE-2013-5033,0,0,8a56209d502d8bfb355eb965aa04b5eab61e3aacb87e040948b4607cea013c17,2024-11-21T01:56:56.650000 +CVE-2013-5034,0,0,cfe49a74244e8b453f3a610b3aadfa3d897a01a4a33b7da465dcdb8ebd9c9a8a,2024-11-21T01:56:56.800000 +CVE-2013-5035,0,0,860d8d940048717f895e2cf381c9ef4f5c2cad1872bb53343ad4b9890cfa34c0,2024-11-21T01:56:56.947000 CVE-2013-5036,0,0,f9eb85b06fea6c8afd05e4927683e1b139f3421d02668e655dde6082d5545c3a,2017-08-29T01:33:42.247000 -CVE-2013-5037,0,1,902b554eb3edee2d6345d04303fc0b5c05a2f111d2a77512c4cabecb632821f5,2024-11-21T01:56:57.263000 -CVE-2013-5038,0,1,f06a2f95edaffbaa0b61329b9a713bad3548e51c2e8c5217f5c8d0088ab7d4a5,2024-11-21T01:56:57.407000 -CVE-2013-5039,0,1,d51d9f11456b9c84fc37b8636784285e0a3d1b67a198bfb93632d72fdd9084ac,2024-11-21T01:56:57.553000 +CVE-2013-5037,0,0,902b554eb3edee2d6345d04303fc0b5c05a2f111d2a77512c4cabecb632821f5,2024-11-21T01:56:57.263000 +CVE-2013-5038,0,0,f06a2f95edaffbaa0b61329b9a713bad3548e51c2e8c5217f5c8d0088ab7d4a5,2024-11-21T01:56:57.407000 +CVE-2013-5039,0,0,d51d9f11456b9c84fc37b8636784285e0a3d1b67a198bfb93632d72fdd9084ac,2024-11-21T01:56:57.553000 CVE-2013-5041,0,0,dcdb1d5e913797ee09ce06bb259ad52cde153ec4c3cd451fbd0172faa3121f95,2023-11-07T02:16:25.973000 -CVE-2013-5042,0,1,395b148afe6a0385651171e1a3ac7363473ff63fdbc092d7899c68db92ee2ccc,2024-11-21T01:56:57.710000 +CVE-2013-5042,0,0,395b148afe6a0385651171e1a3ac7363473ff63fdbc092d7899c68db92ee2ccc,2024-11-21T01:56:57.710000 CVE-2013-5043,0,0,cd0ba8e4fbe57bfd5eaeed3ba390b0d9c13a8dd7c4df099dc30073de6a1d4acb,2023-11-07T02:16:26.197000 CVE-2013-5044,0,0,2c980e0de05b6ff77514be8c43add5c2d7dc05d952b9ee3acb2b5a91519ad4b0,2023-11-07T02:16:26.437000 -CVE-2013-5045,0,1,42418f202c640abcc441934d653b59404c65336af2dc68f0e38f59df9c24226a,2024-11-21T01:56:57.843000 -CVE-2013-5046,0,1,8681e20ded09646e15783e68d2d0af967c18ee1dbd82704ecabc1b3a4dd520ba,2024-11-21T01:56:57.967000 -CVE-2013-5047,0,1,7e53cfc6877693d357cb2bc43b3234c87c5c02d1d4c076bd934caba5fe723464,2024-11-21T01:56:58.080000 -CVE-2013-5048,0,1,20b7dd41b984b076a47892efad39c11b927972e9ee559cf34704bd980d0689a1,2024-11-21T01:56:58.193000 -CVE-2013-5049,0,1,ce488a3a8b20f7a5eef8af1280585fca467792729822acbfe3aa182d2ce82c9f,2024-11-21T01:56:58.297000 +CVE-2013-5045,0,0,42418f202c640abcc441934d653b59404c65336af2dc68f0e38f59df9c24226a,2024-11-21T01:56:57.843000 +CVE-2013-5046,0,0,8681e20ded09646e15783e68d2d0af967c18ee1dbd82704ecabc1b3a4dd520ba,2024-11-21T01:56:57.967000 +CVE-2013-5047,0,0,7e53cfc6877693d357cb2bc43b3234c87c5c02d1d4c076bd934caba5fe723464,2024-11-21T01:56:58.080000 +CVE-2013-5048,0,0,20b7dd41b984b076a47892efad39c11b927972e9ee559cf34704bd980d0689a1,2024-11-21T01:56:58.193000 +CVE-2013-5049,0,0,ce488a3a8b20f7a5eef8af1280585fca467792729822acbfe3aa182d2ce82c9f,2024-11-21T01:56:58.297000 CVE-2013-5050,0,0,47cdc9704897769ed297ccd73268b505f315e1d0f9c2918d0d3ceeba96ead9b1,2023-11-07T02:16:26.707000 -CVE-2013-5051,0,1,f2f100b193c3f2ef45f59bd96ba313c198111f9da82a8294b391d2d0106555c6,2024-11-21T01:56:58.420000 -CVE-2013-5052,0,1,0936d8b7caf5fe18183c1f16f424bd79e44a9edc2b95508b81673bdc4df061dd,2024-11-21T01:56:58.530000 +CVE-2013-5051,0,0,f2f100b193c3f2ef45f59bd96ba313c198111f9da82a8294b391d2d0106555c6,2024-11-21T01:56:58.420000 +CVE-2013-5052,0,0,0936d8b7caf5fe18183c1f16f424bd79e44a9edc2b95508b81673bdc4df061dd,2024-11-21T01:56:58.530000 CVE-2013-5053,0,0,a533ec98dae9cf4c2fed2cf5d12a5bdb37ffa65dc0784ed824789566499f4805,2023-11-07T02:16:26.960000 -CVE-2013-5054,0,1,fb19a2fad6470427aa69e685b390b2ce0ce0b886fa12b058278645fec588b710,2024-11-21T01:56:58.650000 +CVE-2013-5054,0,0,fb19a2fad6470427aa69e685b390b2ce0ce0b886fa12b058278645fec588b710,2024-11-21T01:56:58.650000 CVE-2013-5055,0,0,1bfbe951bef7627d77beab7eaeff177c268571164ed87d0aeb91c665e514a9f3,2023-11-07T02:16:27.220000 -CVE-2013-5056,0,1,ba92b44ebb60effc4891483e8b80cf1414c54be7ea5e5afaeab0723cffa46ed7,2024-11-21T01:56:58.773000 -CVE-2013-5057,0,1,e275868f855f1d81f3c248514816740d51f24f7a481299de61f0baabefcdb738,2024-11-21T01:56:58.890000 -CVE-2013-5058,0,1,35fd08acb0bfd0c853d48f18006359d86cb2f6861742494f5eec737d487961b1,2024-11-21T01:56:59.003000 -CVE-2013-5059,0,1,4d6e453a54bbc206cc506255d5d357e8c7a7bb9f93970728f7b5e508ca941d5d,2024-11-21T01:56:59.113000 +CVE-2013-5056,0,0,ba92b44ebb60effc4891483e8b80cf1414c54be7ea5e5afaeab0723cffa46ed7,2024-11-21T01:56:58.773000 +CVE-2013-5057,0,0,e275868f855f1d81f3c248514816740d51f24f7a481299de61f0baabefcdb738,2024-11-21T01:56:58.890000 +CVE-2013-5058,0,0,35fd08acb0bfd0c853d48f18006359d86cb2f6861742494f5eec737d487961b1,2024-11-21T01:56:59.003000 +CVE-2013-5059,0,0,4d6e453a54bbc206cc506255d5d357e8c7a7bb9f93970728f7b5e508ca941d5d,2024-11-21T01:56:59.113000 CVE-2013-5060,0,0,60090a91180b951826f86131323ce14144bb848219d173d50411a5334bec2f81,2023-11-07T02:16:27.490000 CVE-2013-5061,0,0,cc588cccd08476128d3d451c5500fcf88b566d2f0ea58587df374d0b429b7f9a,2023-11-07T02:16:27.703000 CVE-2013-5062,0,0,e69c7b6565634dff5875737237bcc2f72e02c7c6acbd440a0f0bd9aba2aa2a53,2023-11-07T02:16:27.937000 CVE-2013-5063,0,0,3dfd59bca8a17501d94af5969d745b27de1cd1e818f946a92cef5e868252bd19,2023-11-07T02:16:28.170000 CVE-2013-5064,0,0,b10386120f7ac7f725933a2cdadd901d05afbffa839bbe13004c95f32ff32e19,2023-11-07T02:16:28.417000 -CVE-2013-5065,0,1,e26c605517ccdb890d6d288a715e040bcd71415aa3570a8bd253026a2944a7ef,2024-11-21T01:56:59.290000 +CVE-2013-5065,0,0,e26c605517ccdb890d6d288a715e040bcd71415aa3570a8bd253026a2944a7ef,2024-11-21T01:56:59.290000 CVE-2013-5066,0,0,e205a4f50586191eccc383c60dd96b69af8814856bdb6f91bfa33f31d91a10da,2023-11-07T02:16:28.657000 CVE-2013-5067,0,0,5e11b80225c907e253b0568572498b8ea428d0bb83d8799d755c48e301818961,2023-11-07T02:16:28.883000 CVE-2013-5068,0,0,0f7148a19cda9fb642dfb0b790594d729719aacf09b25cfd2085123d527825e2,2023-11-07T02:16:29.117000 CVE-2013-5069,0,0,b913cc5c548beda714d41a4c112e038e214183c737a510158e4a88203aa1348d,2023-11-07T02:16:29.410000 CVE-2013-5070,0,0,4f389c4c85d088a30f8ef524a392bdfc4292febd46ae07aa8678059b0976dbf9,2023-11-07T02:16:29.667000 CVE-2013-5071,0,0,ad1028aded9430b10145a837a5cb68a6a3dd940fe9634377eb8175b0a974ee36,2023-11-07T02:16:29.900000 -CVE-2013-5072,0,1,09c0e4adaf7d5ed9c580af727a6ca1782bc6760e2a1003bb6a8f12dc0e551433,2024-11-21T01:56:59.483000 +CVE-2013-5072,0,0,09c0e4adaf7d5ed9c580af727a6ca1782bc6760e2a1003bb6a8f12dc0e551433,2024-11-21T01:56:59.483000 CVE-2013-5073,0,0,844919c6f547a7964b685de2830ec63cf75b1e978c38de6f9398fd7a214fd90c,2023-11-07T02:16:30.180000 CVE-2013-5074,0,0,3cf8c128f1cee9a7e030e937af3fe674d5296b92c6ce4d2ee8d3e02575dc7d14,2023-11-07T02:16:30.447000 CVE-2013-5075,0,0,5e7fdd491928ac46d408ff39faf2f2284f2920c9bd15069dbd04e3ec7b4c4bb8,2023-11-07T02:16:30.683000 @@ -62398,124 +62398,124 @@ CVE-2013-5087,0,0,c8ade5386a8fc1db5cde8a1eb39b96cb61b63a862497bd3bb34211537d90c3 CVE-2013-5088,0,0,436ead839dcd0c5a5e4fcf1f75ff9cdbbeda18408f1f75aa3591ed52df41c5f4,2023-11-07T02:16:34.003000 CVE-2013-5089,0,0,b35614bbf7b6fd0ae2b648337c00ffc74bb565f576e565cc14165df8d9b58082,2023-11-07T02:16:34.240000 CVE-2013-5090,0,0,80b0b035b4e8b911702af4bb11802beb0528bc85738c281d2c0e33e80e066a8c,2023-11-07T02:16:34.500000 -CVE-2013-5091,0,1,e3e1f0f71650147c62a1e446afab2350016f5fedca68cdc579e58ec1881e5766,2024-11-21T01:56:59.820000 -CVE-2013-5092,0,1,bd248c0bf0cd81c1bf2069b3e8eb03d6160dc9f238f74a594234acf79c833dae,2024-11-21T01:56:59.987000 -CVE-2013-5093,0,1,2dcfc350e0d1babfd38df0cccb39447801f17b307e7ce5aaa32286bcee6470d3,2024-11-21T01:57:00.140000 -CVE-2013-5094,0,1,cdc4fed1cef47c4d4dba28e4dd5fb0171ce3af27cc591bd640b7695d8e7b5882,2024-11-21T01:57:00.283000 -CVE-2013-5095,0,1,2b04a9676579aa50b81cb3f137f85652d3bb98e49c76a8432f95e029c31a3577,2024-11-21T01:57:00.420000 -CVE-2013-5096,0,1,8b97027958c8dc54bf6719f0738bf0a379ac913d90e3894916753f2efd2163d3,2024-11-21T01:57:00.560000 -CVE-2013-5097,0,1,6811e8212f6b1268122e08d1cdf0b90c4a2a375ee576464d9da1e296d1c26422,2024-11-21T01:57:00.703000 -CVE-2013-5098,0,1,29ed49953e94c5e0ec8218dd23f58c4ede504d1cd3f2424bdfc37a14f48b1252,2024-11-21T01:57:00.853000 -CVE-2013-5099,0,1,686ec69c729b402892d777ee65434f1991f3e79a828101816580768e9906244d,2024-11-21T01:57:01.010000 -CVE-2013-5100,0,1,dba175464ccf51b47bf90b87bf581eb125112a205e1b9c4d883af714e1c66da9,2024-11-21T01:57:01.150000 +CVE-2013-5091,0,0,e3e1f0f71650147c62a1e446afab2350016f5fedca68cdc579e58ec1881e5766,2024-11-21T01:56:59.820000 +CVE-2013-5092,0,0,bd248c0bf0cd81c1bf2069b3e8eb03d6160dc9f238f74a594234acf79c833dae,2024-11-21T01:56:59.987000 +CVE-2013-5093,0,0,2dcfc350e0d1babfd38df0cccb39447801f17b307e7ce5aaa32286bcee6470d3,2024-11-21T01:57:00.140000 +CVE-2013-5094,0,0,cdc4fed1cef47c4d4dba28e4dd5fb0171ce3af27cc591bd640b7695d8e7b5882,2024-11-21T01:57:00.283000 +CVE-2013-5095,0,0,2b04a9676579aa50b81cb3f137f85652d3bb98e49c76a8432f95e029c31a3577,2024-11-21T01:57:00.420000 +CVE-2013-5096,0,0,8b97027958c8dc54bf6719f0738bf0a379ac913d90e3894916753f2efd2163d3,2024-11-21T01:57:00.560000 +CVE-2013-5097,0,0,6811e8212f6b1268122e08d1cdf0b90c4a2a375ee576464d9da1e296d1c26422,2024-11-21T01:57:00.703000 +CVE-2013-5098,0,0,29ed49953e94c5e0ec8218dd23f58c4ede504d1cd3f2424bdfc37a14f48b1252,2024-11-21T01:57:00.853000 +CVE-2013-5099,0,0,686ec69c729b402892d777ee65434f1991f3e79a828101816580768e9906244d,2024-11-21T01:57:01.010000 +CVE-2013-5100,0,0,dba175464ccf51b47bf90b87bf581eb125112a205e1b9c4d883af714e1c66da9,2024-11-21T01:57:01.150000 CVE-2013-5106,0,0,6f4c4328f7a9fa10cdf7027b992a04a1ef11e4c04d575a32ff575c288659eadd,2020-02-19T13:20:28.213000 -CVE-2013-5107,0,1,d270c8463ef8766378b3304b82aaa6dccaf2205f30943c316323a2bd8365dee6,2024-11-21T01:57:02.083000 -CVE-2013-5108,0,1,214769de6bb9bb962f507c5fd8e5536d1f4f729df699573f6de445563483a6af,2024-11-21T01:57:02.220000 +CVE-2013-5107,0,0,d270c8463ef8766378b3304b82aaa6dccaf2205f30943c316323a2bd8365dee6,2024-11-21T01:57:02.083000 +CVE-2013-5108,0,0,214769de6bb9bb962f507c5fd8e5536d1f4f729df699573f6de445563483a6af,2024-11-21T01:57:02.220000 CVE-2013-5112,0,0,5a60fa7093d27483dadf52f690f587c5a1b645b29a07550eb58d03c0ed72cd4e,2020-02-10T17:21:50.757000 CVE-2013-5113,0,0,a817652a084f79e96028f55b53a9cd5d426125bffcaec83b1ad0c97cd4ba1ed4,2020-02-11T19:30:07.357000 CVE-2013-5114,0,0,77f7f5758e0e10b2fe8a4eb1b2d3623ea0e767f954891643ed0cbf0a477b8bf3,2020-02-03T16:41:56.043000 CVE-2013-5116,0,0,8037dcce67b8b5354c71f83b8b5c16e504ec80c18271621f58db1ddca6318bdd,2020-02-03T16:40:15.147000 -CVE-2013-5117,0,1,b65a2f495378f50be173f16e9562689effea2a0c81df9b23bbeb4e1e5a58aa61,2024-11-21T01:57:02.950000 -CVE-2013-5118,0,1,5bb50c42e3b108c8dd15ab46d6fe29845b975304541c2c379d5906829a9b3b8c,2024-11-21T01:57:03.100000 -CVE-2013-5119,0,1,c15e8a40332da9b166d10e25fef7df24bce4caec620cd9f136d6c99ce4ce2bfa,2024-11-21T01:57:03.230000 -CVE-2013-5120,0,1,946c0df30a53d5a2dff5f866514e3db8280dfd6bf89793e46a0d50543a5926e5,2024-11-21T01:57:03.370000 -CVE-2013-5121,0,1,3f9181e0a24f18e45de617e3ace425590cc85b5b88f7ea6307ac5c9c37416d1e,2024-11-21T01:57:03.523000 +CVE-2013-5117,0,0,b65a2f495378f50be173f16e9562689effea2a0c81df9b23bbeb4e1e5a58aa61,2024-11-21T01:57:02.950000 +CVE-2013-5118,0,0,5bb50c42e3b108c8dd15ab46d6fe29845b975304541c2c379d5906829a9b3b8c,2024-11-21T01:57:03.100000 +CVE-2013-5119,0,0,c15e8a40332da9b166d10e25fef7df24bce4caec620cd9f136d6c99ce4ce2bfa,2024-11-21T01:57:03.230000 +CVE-2013-5120,0,0,946c0df30a53d5a2dff5f866514e3db8280dfd6bf89793e46a0d50543a5926e5,2024-11-21T01:57:03.370000 +CVE-2013-5121,0,0,3f9181e0a24f18e45de617e3ace425590cc85b5b88f7ea6307ac5c9c37416d1e,2024-11-21T01:57:03.523000 CVE-2013-5122,0,0,777ebeb56505412c802546786bf470d009bf86e12272874107714c36dafe2174,2020-01-09T19:21:43.050000 CVE-2013-5123,0,0,76c5bc4f30171ad8cafeeac2390d56009584a3fdb8fade4bd6a34bb8cad90d80,2019-11-12T19:51:52.320000 -CVE-2013-5125,0,1,a4609ec8e6015eaa91e2beee4f151c4129d3b2c3d8bdb0ca6d337fee00ac28d5,2024-11-21T01:57:03.977000 -CVE-2013-5126,0,1,1c687a39437e669ba64f8ebe0ac135ecea27c22ef5ad16bb4e6578cf2ac2305d,2024-11-21T01:57:04.117000 -CVE-2013-5127,0,1,5e93a5651cb18fc73c7e91ec984964619732df9888cfe5f734520f6681583303,2024-11-21T01:57:04.237000 -CVE-2013-5128,0,1,c1fd42610b1f36c9912a6805a349dd060c103a9049f84dc21f42b0662e121e43,2024-11-21T01:57:04.350000 -CVE-2013-5129,0,1,ee82902fb111af582c03853c8e98683c5b0ee8fba0fc1a0193fc8a1901b013d6,2024-11-21T01:57:04.463000 -CVE-2013-5130,0,1,4424d6e71915bfeb584fdb80c402b5a873b5b0d06bcdda88a629078084d68795,2024-11-21T01:57:04.587000 -CVE-2013-5131,0,1,bd9f1f142b01b268d0a2a5eca8bfc603e7c1ec09b24661ed573c64060cc714ac,2024-11-21T01:57:04.690000 -CVE-2013-5132,0,1,71c0c7ad904f19d2cc167d417340f22935922e9b6e8684fbe91bb20d650760a8,2024-11-21T01:57:04.810000 -CVE-2013-5133,0,1,d8152c707d844b55637b225e292c51130ab3ab215916941c39e50187160e1ba5,2024-11-21T01:57:04.910000 +CVE-2013-5125,0,0,a4609ec8e6015eaa91e2beee4f151c4129d3b2c3d8bdb0ca6d337fee00ac28d5,2024-11-21T01:57:03.977000 +CVE-2013-5126,0,0,1c687a39437e669ba64f8ebe0ac135ecea27c22ef5ad16bb4e6578cf2ac2305d,2024-11-21T01:57:04.117000 +CVE-2013-5127,0,0,5e93a5651cb18fc73c7e91ec984964619732df9888cfe5f734520f6681583303,2024-11-21T01:57:04.237000 +CVE-2013-5128,0,0,c1fd42610b1f36c9912a6805a349dd060c103a9049f84dc21f42b0662e121e43,2024-11-21T01:57:04.350000 +CVE-2013-5129,0,0,ee82902fb111af582c03853c8e98683c5b0ee8fba0fc1a0193fc8a1901b013d6,2024-11-21T01:57:04.463000 +CVE-2013-5130,0,0,4424d6e71915bfeb584fdb80c402b5a873b5b0d06bcdda88a629078084d68795,2024-11-21T01:57:04.587000 +CVE-2013-5131,0,0,bd9f1f142b01b268d0a2a5eca8bfc603e7c1ec09b24661ed573c64060cc714ac,2024-11-21T01:57:04.690000 +CVE-2013-5132,0,0,71c0c7ad904f19d2cc167d417340f22935922e9b6e8684fbe91bb20d650760a8,2024-11-21T01:57:04.810000 +CVE-2013-5133,0,0,d8152c707d844b55637b225e292c51130ab3ab215916941c39e50187160e1ba5,2024-11-21T01:57:04.910000 CVE-2013-5134,0,0,f2ced48b306c23a4164bf6eeebbd662d83924ef177c5e49a9d91cf9c708845e9,2023-11-07T02:16:34.960000 -CVE-2013-5135,0,1,4153e6df19f81ae197da0f09eac3e289f61467d5de6474339d863a609be06daa,2024-11-21T01:57:05.027000 -CVE-2013-5136,0,1,01e819681d4ae5ae16ab602194ca0adb8ce799bcee3b11d03a998cfd0f30f608,2024-11-21T01:57:05.140000 -CVE-2013-5137,0,1,4340a760248591330cb13e7978ae001d9ffa69976a81d2eb81975d5a3a5a36da,2024-11-21T01:57:05.247000 -CVE-2013-5138,0,1,d84351c399543e767d0286239266c44551898b2be52a2a89b83bb532c44b0ac5,2024-11-21T01:57:05.377000 -CVE-2013-5139,0,1,d2d37c0d056c90ae8f11adb981428337be850ef029959f33db9832eb6544bf8d,2024-11-21T01:57:05.497000 -CVE-2013-5140,0,1,fd243881283797921ee3bb403371243059156d02c141408859139425d3818229,2024-11-21T01:57:05.627000 -CVE-2013-5141,0,1,8b954931b941d272f480666ec811c211832f0f4063172d9c54c593fd2620ae41,2024-11-21T01:57:05.750000 -CVE-2013-5142,0,1,4833092333ece4be6ef66b6996f7953273a9e83f88d7209b2cdbc12f4bc28026,2024-11-21T01:57:05.867000 -CVE-2013-5143,0,1,85857f77be8889dc74609bf59366d3c916b3ada9a48f3d8ac11d3a3e595b8522,2024-11-21T01:57:05.983000 -CVE-2013-5144,0,1,f3346b5a67eabcf1c79b03951c6af541e9845657fe61f48890672067685d2394,2024-11-21T01:57:06.087000 -CVE-2013-5145,0,1,d1e18533f48b4cac14f2628bdaa90df45aaadbe2e9c3fdb143142b0fc2cf998c,2024-11-21T01:57:06.187000 +CVE-2013-5135,0,0,4153e6df19f81ae197da0f09eac3e289f61467d5de6474339d863a609be06daa,2024-11-21T01:57:05.027000 +CVE-2013-5136,0,0,01e819681d4ae5ae16ab602194ca0adb8ce799bcee3b11d03a998cfd0f30f608,2024-11-21T01:57:05.140000 +CVE-2013-5137,0,0,4340a760248591330cb13e7978ae001d9ffa69976a81d2eb81975d5a3a5a36da,2024-11-21T01:57:05.247000 +CVE-2013-5138,0,0,d84351c399543e767d0286239266c44551898b2be52a2a89b83bb532c44b0ac5,2024-11-21T01:57:05.377000 +CVE-2013-5139,0,0,d2d37c0d056c90ae8f11adb981428337be850ef029959f33db9832eb6544bf8d,2024-11-21T01:57:05.497000 +CVE-2013-5140,0,0,fd243881283797921ee3bb403371243059156d02c141408859139425d3818229,2024-11-21T01:57:05.627000 +CVE-2013-5141,0,0,8b954931b941d272f480666ec811c211832f0f4063172d9c54c593fd2620ae41,2024-11-21T01:57:05.750000 +CVE-2013-5142,0,0,4833092333ece4be6ef66b6996f7953273a9e83f88d7209b2cdbc12f4bc28026,2024-11-21T01:57:05.867000 +CVE-2013-5143,0,0,85857f77be8889dc74609bf59366d3c916b3ada9a48f3d8ac11d3a3e595b8522,2024-11-21T01:57:05.983000 +CVE-2013-5144,0,0,f3346b5a67eabcf1c79b03951c6af541e9845657fe61f48890672067685d2394,2024-11-21T01:57:06.087000 +CVE-2013-5145,0,0,d1e18533f48b4cac14f2628bdaa90df45aaadbe2e9c3fdb143142b0fc2cf998c,2024-11-21T01:57:06.187000 CVE-2013-5146,0,0,ad6d7b8bc2839014a21dc8ed2c385ddc0855f1f420d82d96f388caba5e213a92,2023-11-07T02:16:35.260000 -CVE-2013-5147,0,1,56c3f047ed47b8410cbf2e6fdc69578b830ec09645f89ff06de3b9ce9b7f2131,2024-11-21T01:57:06.323000 -CVE-2013-5148,0,1,6e94463912485af92b1afb7da18affafae6f8fd6009b013ef85d56002518746e,2024-11-21T01:57:06.450000 -CVE-2013-5149,0,1,a2756048771545260d2f779f85014bccf0db22e88138a2aa4ae68845ba0c76f1,2024-11-21T01:57:06.557000 -CVE-2013-5150,0,1,bac1d99623e0396698c043be22235bbdaf0cf910ca0523ce602f731942341e65,2024-11-21T01:57:06.677000 -CVE-2013-5151,0,1,3d95fb4060352ed9dcda0325d927ab5cec841ae3e2a594b87652ceb4991b2045,2024-11-21T01:57:06.790000 -CVE-2013-5152,0,1,1184a0e6b29906e2348ae8a156bf7c2466a5d47f1d3c84fe69e6a36dcab10f8f,2024-11-21T01:57:06.917000 -CVE-2013-5153,0,1,87eff14d24a26b2b5de82be479029644bc42e979e128749742c6e4f71e364811,2024-11-21T01:57:07.040000 -CVE-2013-5154,0,1,b649f76b951d73f5d0079892d0a1ac82a8e2b9df8fa66afd3aab9ae245f1d89e,2024-11-21T01:57:07.177000 -CVE-2013-5155,0,1,92060fcd2b0a3996bd7d9a8e8198328c93f63c2592f810a3e4a466f3b8cc6fdf,2024-11-21T01:57:07.303000 -CVE-2013-5156,0,1,2f6c26afc7dd69c2c2e36c4efdb2e2e06ba8187fd33f6d6af135a47630ab9363,2024-11-21T01:57:07.437000 -CVE-2013-5157,0,1,d93bcd8cdca2be7095e527b110efe59f98a194ecf581d997f6306cc4e360a7c1,2024-11-21T01:57:07.573000 -CVE-2013-5158,0,1,76bb8b81215cf8f97567297c6ca5821342a54a999f453675fb8f736ad8151cd4,2024-11-21T01:57:07.697000 -CVE-2013-5159,0,1,36af5fda0adf0717c4b09282dd98ed6bfeea7f777cfbff22c1ea3fbbcb827e10,2024-11-21T01:57:07.817000 -CVE-2013-5160,0,1,be6f0e8d0dca3cf47d3cd5b0c80dfb369fa4a7668586b3ddd7d1c5b6109ff80f,2024-11-21T01:57:07.937000 -CVE-2013-5161,0,1,66fc19a90388a4924cc78f71099d51fd1ec5d3c65b17e1d122096be509f424eb,2024-11-21T01:57:08.047000 -CVE-2013-5162,0,1,84c38efe695aeffda346d5a51cbd7df72c4e7adfb1b6c3eb27e9b93df624ca28,2024-11-21T01:57:08.147000 -CVE-2013-5163,0,1,35e3bae96fcc525bae6025443a81b2ed781c9e86f45946801b6d75d6ddb0ccf2,2024-11-21T01:57:08.250000 -CVE-2013-5164,0,1,84d4fcfba26231af77bb610e4decfd823e3b1aea623c707057fe8c9c2f1544cc,2024-11-21T01:57:08.353000 -CVE-2013-5165,0,1,0a70fadb7d964b4e70eb525f083aa2792eff4ffd702a89b71cccab3ec96b0861,2024-11-21T01:57:08.457000 -CVE-2013-5166,0,1,e865d38a8aac76f7dc172a5595108b71ac8b249369e4af79bab8217e33ec4225,2024-11-21T01:57:08.560000 -CVE-2013-5167,0,1,bd1e1627c5acbc3832ff207df4717b863745271a0ac11a0fd740ad4088a48ea5,2024-11-21T01:57:08.663000 -CVE-2013-5168,0,1,4f7205458b464a0e43611817c6b120d59750941dbdf137183dd2af80df453c84,2024-11-21T01:57:08.763000 -CVE-2013-5169,0,1,ce93c8b60d09db3ee9c4e7f39884ff78c62cb5fa7d9d543fde6c962c1f43c35e,2024-11-21T01:57:08.863000 -CVE-2013-5170,0,1,595f9745ccc7ea065326d178587837d7b32d4de8ac02b22ab4c47e5a8adfcfb9,2024-11-21T01:57:08.963000 -CVE-2013-5171,0,1,2db8b4a382b1a23204090d17b80f20f80145d0fd598aa87c65a01917e0112fab,2024-11-21T01:57:09.067000 -CVE-2013-5172,0,1,0e49b4101b6f60ab23bc3ce1a6af7e6b36918985dad1008ea01df949391f7dc7,2024-11-21T01:57:09.173000 -CVE-2013-5173,0,1,d36cf0e26d0735b56ef4659e30f1acb253299e23956cdbf757e9379fdb32dd80,2024-11-21T01:57:09.260000 -CVE-2013-5174,0,1,093677ac2d2aa521d7592aa3207f5fe2af27dac524592ab7d6873cb399870c91,2024-11-21T01:57:09.367000 -CVE-2013-5175,0,1,a9ae29cd1b0871f5e7d2440adaf8c3027fdcb3752d4ee06f8b338e4fc06d5ba9,2024-11-21T01:57:09.467000 -CVE-2013-5176,0,1,57f1c446d4a7e83a53d780eb11a55bc332374ff3d9817fc51a85e3c2351a5083,2024-11-21T01:57:09.563000 -CVE-2013-5177,0,1,75aa7c7593543bd951414933505197e14db3020fe828584c38e370f8908ba7aa,2024-11-21T01:57:09.660000 -CVE-2013-5178,0,1,a4acce201366c813870cf1094b681a085c35f9f500cbd8a7e91c74299f23221b,2024-11-21T01:57:09.763000 -CVE-2013-5179,0,1,fdc41afccbc628b747546cccf88978d5c8f6b57a7b8a9b8abdbfea0b6e1bc58e,2024-11-21T01:57:09.880000 -CVE-2013-5180,0,1,c4c5d63ee59179fe23f34cbe3720332acb69dcefe409e3fb94e1285ba41526dd,2024-11-21T01:57:09.980000 -CVE-2013-5181,0,1,cdb4d21fa16ca4aa944b8cdb4c34fe08c2f00af1a2587570e10832e5c8a107b6,2024-11-21T01:57:10.090000 -CVE-2013-5182,0,1,7e0f914c0365c5cdf38b4b6020d49eb388a79682276a28a3f27a67f3b09fc1c2,2024-11-21T01:57:10.207000 -CVE-2013-5183,0,1,fd9f10c2e99a0940fb799c118946d8243464a8cc685acfe900097ef01516e1e5,2024-11-21T01:57:10.320000 -CVE-2013-5184,0,1,cd14bbc76cffb1973d22f914b40e2c3aa0a00442ab926449bda614aff51dea57,2024-11-21T01:57:10.430000 -CVE-2013-5185,0,1,d0fb1cc9a7e1569557a293bb7ecc59c6b1a6cd7f34be81cc8f41c6699bf06742,2024-11-21T01:57:10.540000 -CVE-2013-5186,0,1,4662210d4c2ac4fd7f75a3fe8e03c7025b5b5782018a88a12bbfa5ccbee08ec2,2024-11-21T01:57:10.660000 -CVE-2013-5187,0,1,cdbe0b71fd72731cbed6c9552a5060e442ea9e2dd8e4199167840d47b5d2d486,2024-11-21T01:57:10.763000 -CVE-2013-5188,0,1,d2f5574edb40bf2c978fb44b430c28540d9210e09ed13c879aed055b9130ade6,2024-11-21T01:57:10.867000 -CVE-2013-5189,0,1,af0d66cdb878484e671798612bb13b5fef3769e64d1259b29a25833308f63a6d,2024-11-21T01:57:10.980000 -CVE-2013-5190,0,1,944ad1977afac44ba0da049842f35cb9f1d3a89aa154d7c711da9cbb524a3648,2024-11-21T01:57:11.090000 -CVE-2013-5191,0,1,6f944399e481550250182a72389878e88aebc68aadf733f010a253449ca098c0,2024-11-21T01:57:11.193000 -CVE-2013-5192,0,1,bfe0ef33f1e2f0229bc92761b6bf3d9814a8ac40ec513b63f7fc45226f760f98,2024-11-21T01:57:11.310000 -CVE-2013-5193,0,1,f08f8748ec0fb08d48cbb9fb1fa0fca10c29928a97d28c2b1dbbdbeb44744684,2024-11-21T01:57:11.420000 +CVE-2013-5147,0,0,56c3f047ed47b8410cbf2e6fdc69578b830ec09645f89ff06de3b9ce9b7f2131,2024-11-21T01:57:06.323000 +CVE-2013-5148,0,0,6e94463912485af92b1afb7da18affafae6f8fd6009b013ef85d56002518746e,2024-11-21T01:57:06.450000 +CVE-2013-5149,0,0,a2756048771545260d2f779f85014bccf0db22e88138a2aa4ae68845ba0c76f1,2024-11-21T01:57:06.557000 +CVE-2013-5150,0,0,bac1d99623e0396698c043be22235bbdaf0cf910ca0523ce602f731942341e65,2024-11-21T01:57:06.677000 +CVE-2013-5151,0,0,3d95fb4060352ed9dcda0325d927ab5cec841ae3e2a594b87652ceb4991b2045,2024-11-21T01:57:06.790000 +CVE-2013-5152,0,0,1184a0e6b29906e2348ae8a156bf7c2466a5d47f1d3c84fe69e6a36dcab10f8f,2024-11-21T01:57:06.917000 +CVE-2013-5153,0,0,87eff14d24a26b2b5de82be479029644bc42e979e128749742c6e4f71e364811,2024-11-21T01:57:07.040000 +CVE-2013-5154,0,0,b649f76b951d73f5d0079892d0a1ac82a8e2b9df8fa66afd3aab9ae245f1d89e,2024-11-21T01:57:07.177000 +CVE-2013-5155,0,0,92060fcd2b0a3996bd7d9a8e8198328c93f63c2592f810a3e4a466f3b8cc6fdf,2024-11-21T01:57:07.303000 +CVE-2013-5156,0,0,2f6c26afc7dd69c2c2e36c4efdb2e2e06ba8187fd33f6d6af135a47630ab9363,2024-11-21T01:57:07.437000 +CVE-2013-5157,0,0,d93bcd8cdca2be7095e527b110efe59f98a194ecf581d997f6306cc4e360a7c1,2024-11-21T01:57:07.573000 +CVE-2013-5158,0,0,76bb8b81215cf8f97567297c6ca5821342a54a999f453675fb8f736ad8151cd4,2024-11-21T01:57:07.697000 +CVE-2013-5159,0,0,36af5fda0adf0717c4b09282dd98ed6bfeea7f777cfbff22c1ea3fbbcb827e10,2024-11-21T01:57:07.817000 +CVE-2013-5160,0,0,be6f0e8d0dca3cf47d3cd5b0c80dfb369fa4a7668586b3ddd7d1c5b6109ff80f,2024-11-21T01:57:07.937000 +CVE-2013-5161,0,0,66fc19a90388a4924cc78f71099d51fd1ec5d3c65b17e1d122096be509f424eb,2024-11-21T01:57:08.047000 +CVE-2013-5162,0,0,84c38efe695aeffda346d5a51cbd7df72c4e7adfb1b6c3eb27e9b93df624ca28,2024-11-21T01:57:08.147000 +CVE-2013-5163,0,0,35e3bae96fcc525bae6025443a81b2ed781c9e86f45946801b6d75d6ddb0ccf2,2024-11-21T01:57:08.250000 +CVE-2013-5164,0,0,84d4fcfba26231af77bb610e4decfd823e3b1aea623c707057fe8c9c2f1544cc,2024-11-21T01:57:08.353000 +CVE-2013-5165,0,0,0a70fadb7d964b4e70eb525f083aa2792eff4ffd702a89b71cccab3ec96b0861,2024-11-21T01:57:08.457000 +CVE-2013-5166,0,0,e865d38a8aac76f7dc172a5595108b71ac8b249369e4af79bab8217e33ec4225,2024-11-21T01:57:08.560000 +CVE-2013-5167,0,0,bd1e1627c5acbc3832ff207df4717b863745271a0ac11a0fd740ad4088a48ea5,2024-11-21T01:57:08.663000 +CVE-2013-5168,0,0,4f7205458b464a0e43611817c6b120d59750941dbdf137183dd2af80df453c84,2024-11-21T01:57:08.763000 +CVE-2013-5169,0,0,ce93c8b60d09db3ee9c4e7f39884ff78c62cb5fa7d9d543fde6c962c1f43c35e,2024-11-21T01:57:08.863000 +CVE-2013-5170,0,0,595f9745ccc7ea065326d178587837d7b32d4de8ac02b22ab4c47e5a8adfcfb9,2024-11-21T01:57:08.963000 +CVE-2013-5171,0,0,2db8b4a382b1a23204090d17b80f20f80145d0fd598aa87c65a01917e0112fab,2024-11-21T01:57:09.067000 +CVE-2013-5172,0,0,0e49b4101b6f60ab23bc3ce1a6af7e6b36918985dad1008ea01df949391f7dc7,2024-11-21T01:57:09.173000 +CVE-2013-5173,0,0,d36cf0e26d0735b56ef4659e30f1acb253299e23956cdbf757e9379fdb32dd80,2024-11-21T01:57:09.260000 +CVE-2013-5174,0,0,093677ac2d2aa521d7592aa3207f5fe2af27dac524592ab7d6873cb399870c91,2024-11-21T01:57:09.367000 +CVE-2013-5175,0,0,a9ae29cd1b0871f5e7d2440adaf8c3027fdcb3752d4ee06f8b338e4fc06d5ba9,2024-11-21T01:57:09.467000 +CVE-2013-5176,0,0,57f1c446d4a7e83a53d780eb11a55bc332374ff3d9817fc51a85e3c2351a5083,2024-11-21T01:57:09.563000 +CVE-2013-5177,0,0,75aa7c7593543bd951414933505197e14db3020fe828584c38e370f8908ba7aa,2024-11-21T01:57:09.660000 +CVE-2013-5178,0,0,a4acce201366c813870cf1094b681a085c35f9f500cbd8a7e91c74299f23221b,2024-11-21T01:57:09.763000 +CVE-2013-5179,0,0,fdc41afccbc628b747546cccf88978d5c8f6b57a7b8a9b8abdbfea0b6e1bc58e,2024-11-21T01:57:09.880000 +CVE-2013-5180,0,0,c4c5d63ee59179fe23f34cbe3720332acb69dcefe409e3fb94e1285ba41526dd,2024-11-21T01:57:09.980000 +CVE-2013-5181,0,0,cdb4d21fa16ca4aa944b8cdb4c34fe08c2f00af1a2587570e10832e5c8a107b6,2024-11-21T01:57:10.090000 +CVE-2013-5182,0,0,7e0f914c0365c5cdf38b4b6020d49eb388a79682276a28a3f27a67f3b09fc1c2,2024-11-21T01:57:10.207000 +CVE-2013-5183,0,0,fd9f10c2e99a0940fb799c118946d8243464a8cc685acfe900097ef01516e1e5,2024-11-21T01:57:10.320000 +CVE-2013-5184,0,0,cd14bbc76cffb1973d22f914b40e2c3aa0a00442ab926449bda614aff51dea57,2024-11-21T01:57:10.430000 +CVE-2013-5185,0,0,d0fb1cc9a7e1569557a293bb7ecc59c6b1a6cd7f34be81cc8f41c6699bf06742,2024-11-21T01:57:10.540000 +CVE-2013-5186,0,0,4662210d4c2ac4fd7f75a3fe8e03c7025b5b5782018a88a12bbfa5ccbee08ec2,2024-11-21T01:57:10.660000 +CVE-2013-5187,0,0,cdbe0b71fd72731cbed6c9552a5060e442ea9e2dd8e4199167840d47b5d2d486,2024-11-21T01:57:10.763000 +CVE-2013-5188,0,0,d2f5574edb40bf2c978fb44b430c28540d9210e09ed13c879aed055b9130ade6,2024-11-21T01:57:10.867000 +CVE-2013-5189,0,0,af0d66cdb878484e671798612bb13b5fef3769e64d1259b29a25833308f63a6d,2024-11-21T01:57:10.980000 +CVE-2013-5190,0,0,944ad1977afac44ba0da049842f35cb9f1d3a89aa154d7c711da9cbb524a3648,2024-11-21T01:57:11.090000 +CVE-2013-5191,0,0,6f944399e481550250182a72389878e88aebc68aadf733f010a253449ca098c0,2024-11-21T01:57:11.193000 +CVE-2013-5192,0,0,bfe0ef33f1e2f0229bc92761b6bf3d9814a8ac40ec513b63f7fc45226f760f98,2024-11-21T01:57:11.310000 +CVE-2013-5193,0,0,f08f8748ec0fb08d48cbb9fb1fa0fca10c29928a97d28c2b1dbbdbeb44744684,2024-11-21T01:57:11.420000 CVE-2013-5194,0,0,7d27ee573d56bc9dd7379999f69f8737c5cc0d89265041ace28bbd1182fe5b27,2023-11-07T02:16:35.623000 -CVE-2013-5195,0,1,afdf589336d70f3370144fbe1d02b3dd6dac1d0144890626c17692db26688bc3,2024-11-21T01:57:11.540000 -CVE-2013-5196,0,1,b7f9268d17f28a519c38b21628b6521773d73ee8dfc2910aa0d0003b32d092f5,2024-11-21T01:57:11.647000 -CVE-2013-5197,0,1,5b58b06dbcaa6625e98c9ff5728cafe3e0b86bae0dafd5d8ecb1924a8317d0f0,2024-11-21T01:57:11.770000 -CVE-2013-5198,0,1,3a1b026c7040138f08f85c65fd0f1bd777fc90289e6c22efd8bba836f189a80c,2024-11-21T01:57:11.887000 -CVE-2013-5199,0,1,98706354020f2830c6b0824b05f82a92b51c06b0d8be15aab6f807be6a37cb6b,2024-11-21T01:57:12 -CVE-2013-5200,0,1,6955a769ef28f0d57c0f2331f9ac030f453f6ca8960114ebf0cceb8015c59adc,2024-11-21T01:57:12.137000 -CVE-2013-5208,0,1,962f1593474c30a872653ad79ae4be81aebf26b8f14627ab75973b61ef248044,2024-11-21T01:57:12.270000 -CVE-2013-5209,0,1,39d8dd6bd528c7b5c5a95b93148640857eb6c824c147f57e88d6b8cd22d5fbca,2024-11-21T01:57:12.410000 -CVE-2013-5210,0,1,8abfa0ce634be70f657b0cefb92d0d7823c4d86cda4c2a5aea49c4bcb71e73cd,2024-11-21T01:57:12.577000 -CVE-2013-5211,0,1,5ac75c90cdfe0da6097fb6ef55e1db555bb233f1b032c490b7d8695acacedc35,2024-11-21T01:57:12.720000 +CVE-2013-5195,0,0,afdf589336d70f3370144fbe1d02b3dd6dac1d0144890626c17692db26688bc3,2024-11-21T01:57:11.540000 +CVE-2013-5196,0,0,b7f9268d17f28a519c38b21628b6521773d73ee8dfc2910aa0d0003b32d092f5,2024-11-21T01:57:11.647000 +CVE-2013-5197,0,0,5b58b06dbcaa6625e98c9ff5728cafe3e0b86bae0dafd5d8ecb1924a8317d0f0,2024-11-21T01:57:11.770000 +CVE-2013-5198,0,0,3a1b026c7040138f08f85c65fd0f1bd777fc90289e6c22efd8bba836f189a80c,2024-11-21T01:57:11.887000 +CVE-2013-5199,0,0,98706354020f2830c6b0824b05f82a92b51c06b0d8be15aab6f807be6a37cb6b,2024-11-21T01:57:12 +CVE-2013-5200,0,0,6955a769ef28f0d57c0f2331f9ac030f453f6ca8960114ebf0cceb8015c59adc,2024-11-21T01:57:12.137000 +CVE-2013-5208,0,0,962f1593474c30a872653ad79ae4be81aebf26b8f14627ab75973b61ef248044,2024-11-21T01:57:12.270000 +CVE-2013-5209,0,0,39d8dd6bd528c7b5c5a95b93148640857eb6c824c147f57e88d6b8cd22d5fbca,2024-11-21T01:57:12.410000 +CVE-2013-5210,0,0,8abfa0ce634be70f657b0cefb92d0d7823c4d86cda4c2a5aea49c4bcb71e73cd,2024-11-21T01:57:12.577000 +CVE-2013-5211,0,0,5ac75c90cdfe0da6097fb6ef55e1db555bb233f1b032c490b7d8695acacedc35,2024-11-21T01:57:12.720000 CVE-2013-5212,0,0,fafbcd54e88aeca672bfc58a1e8f31728d0f561cfef6da363b49c85482a6eebd,2020-02-24T17:29:07.753000 -CVE-2013-5215,0,1,a287a88a10bce147106a7b150f0949912c2e6ff10ea70d2b6ff960ec940c4209,2024-11-21T01:57:13.050000 -CVE-2013-5216,0,1,1832c592df66b1815e0bf5e361b53b99f71305043bcfdddfcb831220a001358c,2024-11-21T01:57:13.193000 +CVE-2013-5215,0,0,a287a88a10bce147106a7b150f0949912c2e6ff10ea70d2b6ff960ec940c4209,2024-11-21T01:57:13.050000 +CVE-2013-5216,0,0,1832c592df66b1815e0bf5e361b53b99f71305043bcfdddfcb831220a001358c,2024-11-21T01:57:13.193000 CVE-2013-5217,0,0,cf42ddb71479cea4660e548c407a1823ad0a0e38931f819380d8559a6dfd2576,2023-11-07T02:16:35.757000 -CVE-2013-5218,0,1,cd2874b7826da1520fce16b886b7311bff33e25a487c5e2d3e8199856ca9f269,2024-11-21T01:57:13.360000 -CVE-2013-5219,0,1,d3e7c986fb4a020558b20c35156757fbe817005a2b264437de5e240cd197caae,2024-11-21T01:57:13.500000 -CVE-2013-5220,0,1,685186de59d37e0679d946ae1668433934e0720612546784f446c36fd233011b,2024-11-21T01:57:13.640000 -CVE-2013-5221,0,1,1be3968baf1d4d5f4eb5a0641b99d3db37d26fefe7fcc82053f72c6cc48f3642,2024-11-21T01:57:13.783000 -CVE-2013-5222,0,1,09456a036b6542e33a6d44d079ce22d86b4ebb6114dac9066346eb3dd2848612,2024-11-21T01:57:13.930000 -CVE-2013-5223,0,1,6b2624fee50def2a5fddc852e6633b6720dd6ff087143871200959415305384f,2024-11-21T01:57:14.070000 -CVE-2013-5225,0,1,2cab702cc2e74d8f4dbdd1d5f70105e537f684278f2776ab39a1dfb8b0f9d244,2024-11-21T01:57:14.233000 +CVE-2013-5218,0,0,cd2874b7826da1520fce16b886b7311bff33e25a487c5e2d3e8199856ca9f269,2024-11-21T01:57:13.360000 +CVE-2013-5219,0,0,d3e7c986fb4a020558b20c35156757fbe817005a2b264437de5e240cd197caae,2024-11-21T01:57:13.500000 +CVE-2013-5220,0,0,685186de59d37e0679d946ae1668433934e0720612546784f446c36fd233011b,2024-11-21T01:57:13.640000 +CVE-2013-5221,0,0,1be3968baf1d4d5f4eb5a0641b99d3db37d26fefe7fcc82053f72c6cc48f3642,2024-11-21T01:57:13.783000 +CVE-2013-5222,0,0,09456a036b6542e33a6d44d079ce22d86b4ebb6114dac9066346eb3dd2848612,2024-11-21T01:57:13.930000 +CVE-2013-5223,0,0,6b2624fee50def2a5fddc852e6633b6720dd6ff087143871200959415305384f,2024-11-21T01:57:14.070000 +CVE-2013-5225,0,0,2cab702cc2e74d8f4dbdd1d5f70105e537f684278f2776ab39a1dfb8b0f9d244,2024-11-21T01:57:14.233000 CVE-2013-5226,0,0,e69b54ae360d58b4b4b0bdc196c9f74cb4ed3c973f7e92418ced709065fb17a5,2023-11-07T02:16:35.847000 -CVE-2013-5227,0,1,184dfd846efe56cd37b146a1154d81a34388acb25d3a3f9c6d3e3cca7297469f,2024-11-21T01:57:14.363000 -CVE-2013-5228,0,1,8b4daddf02434633d29adb0a2a9fcf08f8bfcfc9e54cfdcfdc76ce98ce05cca8,2024-11-21T01:57:14.470000 +CVE-2013-5227,0,0,184dfd846efe56cd37b146a1154d81a34388acb25d3a3f9c6d3e3cca7297469f,2024-11-21T01:57:14.363000 +CVE-2013-5228,0,0,8b4daddf02434633d29adb0a2a9fcf08f8bfcfc9e54cfdcfdc76ce98ce05cca8,2024-11-21T01:57:14.470000 CVE-2013-5229,0,0,46c8d18a59eac7bf19cadd96624a0f76ee25aaf559d00ef73bee02e0123f7e3c,2017-09-14T01:29:00.210000 CVE-2013-5230,0,0,c42844ee26bba314ca9ad6351a1a6424c7142a2b8772dd4a3aee19391ed161fb,2023-11-07T02:16:35.913000 CVE-2013-5231,0,0,36f0e7d118698fffa4ef0379b232b8b699cc59ca5362d7c35aba7de720280219,2023-11-07T02:16:35.940000 @@ -62587,41 +62587,41 @@ CVE-2013-5296,0,0,8ec646e23131f9f968cbad2a96229da9a721cd4a3623618dee82b510767b23 CVE-2013-5297,0,0,75af3110d6aabb3395980bf77a2af091d756d26f2c1805571b7141f26b995696,2023-11-07T02:16:38.017000 CVE-2013-5298,0,0,f481884c14957a9857e7d77f636dfd3f02d74796e17b25bc2f2652df6a66f952,2023-11-07T02:16:38.053000 CVE-2013-5299,0,0,99efa4a651398e9d679f362b2107aadd5be7c7e5b1b90eb652bbbf9496146329,2023-11-07T02:16:38.087000 -CVE-2013-5300,0,1,024e1b0f69eb74fde5f2d63ab6133cbebc047881ac9a9912b8b3c1c0cce3f070,2024-11-21T01:57:15.610000 -CVE-2013-5301,0,1,955610ac3c2b6a59b031d01952157360db22bff8379caef03db09c34b6ad25d1,2024-11-21T01:57:15.770000 -CVE-2013-5302,0,1,c5236d7562e7bf03f2f0099e78cb6a40f20db86e1761fbb86df3e656455d0a3d,2024-11-21T01:57:15.923000 -CVE-2013-5303,0,1,f420e4055d1a6ae7ab542bd18b3647305bea1e875df5bc0d1c6eb0f9a9781ac0,2024-11-21T01:57:16.060000 -CVE-2013-5304,0,1,26219ca37286bb7f2cf1caae25db55df2bb352d7f95203428bd97af47975e20e,2024-11-21T01:57:16.200000 -CVE-2013-5305,0,1,647e09300bf8cd2f37c1afe981b857299d3442987e2de8614027baf29c6a449f,2024-11-21T01:57:16.347000 -CVE-2013-5306,0,1,897ce8522381ae73319eafae63a62880ab0b59f4586f821ca1610db2144597c9,2024-11-21T01:57:16.497000 -CVE-2013-5307,0,1,80f646a630b9dd13c6def4ba16f9ffeb20f530f824d718ee0faac8cd02b6fafc,2024-11-21T01:57:16.633000 -CVE-2013-5308,0,1,2396193383a7f0c2de88b23912c50a51405f82ff1fe4c4395fab358da676e022,2024-11-21T01:57:16.783000 -CVE-2013-5309,0,1,d597e1ab7ce10fb092293499563e47def5130454b4f93f2a93d0f24953476107,2024-11-21T01:57:16.923000 -CVE-2013-5310,0,1,de8a3411e466c284b84a030054e38233a5d8b3504e9271f2ae4d8acbff483e10,2024-11-21T01:57:17.077000 -CVE-2013-5311,0,1,3752be89a6dd15283c500337025efb4930fb7bed17dcb77d854a8f6abef72635,2024-11-21T01:57:17.233000 -CVE-2013-5312,0,1,bb905a3cac82990f884eab3536a42c8103644aa6b146170b9d360c5910c772c0,2024-11-21T01:57:17.377000 -CVE-2013-5313,0,1,8689a2e39c1c7a97c5dae492e2727160c6a1a687bacdcf01d74301979ceb0ca8,2024-11-21T01:57:17.517000 -CVE-2013-5314,0,1,2aa05d8c1516379c035ac30b6aee645eb5855e0a407e21c8881fa3e3a640d8ad,2024-11-21T01:57:17.673000 -CVE-2013-5315,0,1,e08d99032ea6a56fe7be61c1327291270946675ba524e75dc2ad98847daeaf5f,2024-11-21T01:57:17.817000 -CVE-2013-5316,0,1,50dd51faf0fed70380b682b3cee3855866d7fbbdbc27683a11d81f32a67aee47,2024-11-21T01:57:17.967000 -CVE-2013-5317,0,1,53f818de42ccd04737da66cedab36d6c90ca98a47b2df345f9b0d822db23255e,2024-11-21T01:57:18.120000 -CVE-2013-5318,0,1,1cb2907dd2af7686f9e9b246eac1b69feb9e3d76e2737f5d50d2c0a96f64fce0,2024-11-21T01:57:18.257000 -CVE-2013-5319,0,1,5d9a4b9ce924284d914cb82466b9688ae50399c737cbb700a582aea0c8959922,2024-11-21T01:57:18.390000 -CVE-2013-5320,0,1,86d38f71c115d110f6a7b74ee6b8f517682354384f3ab1115056564c661ff36f,2024-11-21T01:57:18.533000 -CVE-2013-5321,0,1,c69cc65e26072515b1c2b61dbd6fd4a7bce9181d39246fc79a80a24083ceb935,2024-11-21T01:57:18.690000 -CVE-2013-5322,0,1,ab05e460ef7b5daa3f0fe61dd5b28d05a1c5f1a8eae9c0446dd9647f39e998ac,2024-11-21T01:57:18.830000 -CVE-2013-5323,0,1,06cd1e700cb52cbe459940b6f43e1fb20e553f6b845dc2c0b7b8bcc26322894c,2024-11-21T01:57:18.970000 -CVE-2013-5324,0,1,f272dfd1b358e264ca8cdff65a0d4786438e2d39cfae094dc368ca8f05fcbe99,2024-11-21T01:57:19.127000 -CVE-2013-5325,0,1,6f3b036d2c4aca4810b6f14a1e539ede2f87f4dc7767724115c93475d67dca2d,2024-11-21T01:57:19.253000 -CVE-2013-5326,0,1,173ce6393c3fe94d241b53ac383e8c04ffc74921f5541fd67737bd1373d436a7,2024-11-21T01:57:19.377000 -CVE-2013-5327,0,1,2b3711f63f1925b39cd199432a11d2d3463c193c524564a426c8042ef703ad3b,2024-11-21T01:57:19.490000 -CVE-2013-5328,0,1,1d3418857cc31ad3928862b97e93c729617a8c723655bd8bd3792670ce7f971e,2024-11-21T01:57:19.603000 -CVE-2013-5329,0,1,fd8c296848278a2513e0b9a52f53c84d5ccd6ad655bd679434dad9da780c1683,2024-11-21T01:57:19.720000 -CVE-2013-5330,0,1,01e801a998f87987164f5a81634c5eeb7d713cbb4d76076435bb43783dae12fa,2024-11-21T01:57:19.847000 -CVE-2013-5331,0,1,ff72313bfee755e5ad1ad304d50f5516f2f83d5efd361899af193f708cc799fd,2024-11-21T01:57:19.970000 -CVE-2013-5332,0,1,389f22fb3d12649aeeb8d0fa3b62d3505566cbaad69d20bcd87f59dd3c903db9,2024-11-21T01:57:20.100000 -CVE-2013-5333,0,1,16b97e08f4517608892b1d838d3a9de1e948634fed8100cd865b9809c4ebdac9,2024-11-21T01:57:20.210000 -CVE-2013-5334,0,1,9a047565d33cf0080517e037cd8340ff1af5bc5976d1329c1aee31851662858d,2024-11-21T01:57:20.340000 +CVE-2013-5300,0,0,024e1b0f69eb74fde5f2d63ab6133cbebc047881ac9a9912b8b3c1c0cce3f070,2024-11-21T01:57:15.610000 +CVE-2013-5301,0,0,955610ac3c2b6a59b031d01952157360db22bff8379caef03db09c34b6ad25d1,2024-11-21T01:57:15.770000 +CVE-2013-5302,0,0,c5236d7562e7bf03f2f0099e78cb6a40f20db86e1761fbb86df3e656455d0a3d,2024-11-21T01:57:15.923000 +CVE-2013-5303,0,0,f420e4055d1a6ae7ab542bd18b3647305bea1e875df5bc0d1c6eb0f9a9781ac0,2024-11-21T01:57:16.060000 +CVE-2013-5304,0,0,26219ca37286bb7f2cf1caae25db55df2bb352d7f95203428bd97af47975e20e,2024-11-21T01:57:16.200000 +CVE-2013-5305,0,0,647e09300bf8cd2f37c1afe981b857299d3442987e2de8614027baf29c6a449f,2024-11-21T01:57:16.347000 +CVE-2013-5306,0,0,897ce8522381ae73319eafae63a62880ab0b59f4586f821ca1610db2144597c9,2024-11-21T01:57:16.497000 +CVE-2013-5307,0,0,80f646a630b9dd13c6def4ba16f9ffeb20f530f824d718ee0faac8cd02b6fafc,2024-11-21T01:57:16.633000 +CVE-2013-5308,0,0,2396193383a7f0c2de88b23912c50a51405f82ff1fe4c4395fab358da676e022,2024-11-21T01:57:16.783000 +CVE-2013-5309,0,0,d597e1ab7ce10fb092293499563e47def5130454b4f93f2a93d0f24953476107,2024-11-21T01:57:16.923000 +CVE-2013-5310,0,0,de8a3411e466c284b84a030054e38233a5d8b3504e9271f2ae4d8acbff483e10,2024-11-21T01:57:17.077000 +CVE-2013-5311,0,0,3752be89a6dd15283c500337025efb4930fb7bed17dcb77d854a8f6abef72635,2024-11-21T01:57:17.233000 +CVE-2013-5312,0,0,bb905a3cac82990f884eab3536a42c8103644aa6b146170b9d360c5910c772c0,2024-11-21T01:57:17.377000 +CVE-2013-5313,0,0,8689a2e39c1c7a97c5dae492e2727160c6a1a687bacdcf01d74301979ceb0ca8,2024-11-21T01:57:17.517000 +CVE-2013-5314,0,0,2aa05d8c1516379c035ac30b6aee645eb5855e0a407e21c8881fa3e3a640d8ad,2024-11-21T01:57:17.673000 +CVE-2013-5315,0,0,e08d99032ea6a56fe7be61c1327291270946675ba524e75dc2ad98847daeaf5f,2024-11-21T01:57:17.817000 +CVE-2013-5316,0,0,50dd51faf0fed70380b682b3cee3855866d7fbbdbc27683a11d81f32a67aee47,2024-11-21T01:57:17.967000 +CVE-2013-5317,0,0,53f818de42ccd04737da66cedab36d6c90ca98a47b2df345f9b0d822db23255e,2024-11-21T01:57:18.120000 +CVE-2013-5318,0,0,1cb2907dd2af7686f9e9b246eac1b69feb9e3d76e2737f5d50d2c0a96f64fce0,2024-11-21T01:57:18.257000 +CVE-2013-5319,0,0,5d9a4b9ce924284d914cb82466b9688ae50399c737cbb700a582aea0c8959922,2024-11-21T01:57:18.390000 +CVE-2013-5320,0,0,86d38f71c115d110f6a7b74ee6b8f517682354384f3ab1115056564c661ff36f,2024-11-21T01:57:18.533000 +CVE-2013-5321,0,0,c69cc65e26072515b1c2b61dbd6fd4a7bce9181d39246fc79a80a24083ceb935,2024-11-21T01:57:18.690000 +CVE-2013-5322,0,0,ab05e460ef7b5daa3f0fe61dd5b28d05a1c5f1a8eae9c0446dd9647f39e998ac,2024-11-21T01:57:18.830000 +CVE-2013-5323,0,0,06cd1e700cb52cbe459940b6f43e1fb20e553f6b845dc2c0b7b8bcc26322894c,2024-11-21T01:57:18.970000 +CVE-2013-5324,0,0,f272dfd1b358e264ca8cdff65a0d4786438e2d39cfae094dc368ca8f05fcbe99,2024-11-21T01:57:19.127000 +CVE-2013-5325,0,0,6f3b036d2c4aca4810b6f14a1e539ede2f87f4dc7767724115c93475d67dca2d,2024-11-21T01:57:19.253000 +CVE-2013-5326,0,0,173ce6393c3fe94d241b53ac383e8c04ffc74921f5541fd67737bd1373d436a7,2024-11-21T01:57:19.377000 +CVE-2013-5327,0,0,2b3711f63f1925b39cd199432a11d2d3463c193c524564a426c8042ef703ad3b,2024-11-21T01:57:19.490000 +CVE-2013-5328,0,0,1d3418857cc31ad3928862b97e93c729617a8c723655bd8bd3792670ce7f971e,2024-11-21T01:57:19.603000 +CVE-2013-5329,0,0,fd8c296848278a2513e0b9a52f53c84d5ccd6ad655bd679434dad9da780c1683,2024-11-21T01:57:19.720000 +CVE-2013-5330,0,0,01e801a998f87987164f5a81634c5eeb7d713cbb4d76076435bb43783dae12fa,2024-11-21T01:57:19.847000 +CVE-2013-5331,0,0,ff72313bfee755e5ad1ad304d50f5516f2f83d5efd361899af193f708cc799fd,2024-11-21T01:57:19.970000 +CVE-2013-5332,0,0,389f22fb3d12649aeeb8d0fa3b62d3505566cbaad69d20bcd87f59dd3c903db9,2024-11-21T01:57:20.100000 +CVE-2013-5333,0,0,16b97e08f4517608892b1d838d3a9de1e948634fed8100cd865b9809c4ebdac9,2024-11-21T01:57:20.210000 +CVE-2013-5334,0,0,9a047565d33cf0080517e037cd8340ff1af5bc5976d1329c1aee31851662858d,2024-11-21T01:57:20.340000 CVE-2013-5335,0,0,e991e2ef9ebff6e6bbe276e8829706d723323495994fe50a490f7f582076fe63,2023-11-07T02:16:38.490000 CVE-2013-5336,0,0,584860d90b551b60912dc53945006c57f3b3b862d7de459b2c3c2fcc5e04984e,2023-11-07T02:16:38.763000 CVE-2013-5337,0,0,9846fb6a7aa66b72b6a9c40346027e4b32d7bc69dbcb4c930844a17382c60447,2023-11-07T02:16:39.090000 @@ -62636,239 +62636,239 @@ CVE-2013-5345,0,0,4090aa650b322c5d1c5a49e84627a84dd9a350e7a16c0ec5352c59f6747627 CVE-2013-5346,0,0,220d4c0cc5553f8dcd192c96e762d5c605b277470b29b406d05d61a74c84228d,2023-11-07T02:16:41.323000 CVE-2013-5347,0,0,003fa7d5f2b7ee6031e0d3adf8ab3df89c744c4bb6324a6da04ca67088e3686f,2023-11-07T02:16:41.560000 CVE-2013-5348,0,0,6570663a944ab95d431af44508912eaed1687e87196e0e167d63f8df2f6a504b,2023-11-07T02:16:41.787000 -CVE-2013-5349,0,1,143bf8b2892051687834840441ed18133af4e0a9031a6f732f446c16d121efab,2024-11-21T01:57:20.640000 -CVE-2013-5350,0,1,9365ce08c1de64a98be545c18f5678198712ff3b4f9c7e56ac3e44bc80860d51,2024-11-21T01:57:20.770000 -CVE-2013-5351,0,1,4484ea6ca93d72c8835d20662479d23eeab60ad07cfde85d6fdd2d76741e8a6a,2024-11-21T01:57:20.883000 +CVE-2013-5349,0,0,143bf8b2892051687834840441ed18133af4e0a9031a6f732f446c16d121efab,2024-11-21T01:57:20.640000 +CVE-2013-5350,0,0,9365ce08c1de64a98be545c18f5678198712ff3b4f9c7e56ac3e44bc80860d51,2024-11-21T01:57:20.770000 +CVE-2013-5351,0,0,4484ea6ca93d72c8835d20662479d23eeab60ad07cfde85d6fdd2d76741e8a6a,2024-11-21T01:57:20.883000 CVE-2013-5352,0,0,f1336c3e9571ae88e51724a1de5b3bb39bf8de0b86446bb00f5293e63c6c4b44,2017-08-29T01:33:43.917000 CVE-2013-5353,0,0,53fe5e27b411af10950c5a1048bd92500f224f9702162ff239212b79a2fb226e,2017-08-29T01:33:43.980000 -CVE-2013-5354,0,1,947235114b3f5b113f6009e8b47e98808ea6386ff0dbb6cead54d2ba6bd05415,2024-11-21T01:57:21.303000 -CVE-2013-5355,0,1,7743c6239b609acf6613e480fd0324807d05c1e8d85f36b7800b994a35a0564a,2024-11-21T01:57:21.417000 +CVE-2013-5354,0,0,947235114b3f5b113f6009e8b47e98808ea6386ff0dbb6cead54d2ba6bd05415,2024-11-21T01:57:21.303000 +CVE-2013-5355,0,0,7743c6239b609acf6613e480fd0324807d05c1e8d85f36b7800b994a35a0564a,2024-11-21T01:57:21.417000 CVE-2013-5356,0,0,3a09911f26e30036cc1306fd2d76c67e21042cd35237a98cc4395ae3aa5a2787,2017-08-29T01:33:44.043000 -CVE-2013-5357,0,1,6ecdc498b849fd8489d0b1f40a093394f33f75bd5e734a3231363bb70d2f3249,2024-11-21T01:57:21.640000 -CVE-2013-5358,0,1,8fc0588d2ff95038bf182dbfb5c5f112282f1a53b8603433850979a0865a688a,2024-11-21T01:57:21.747000 -CVE-2013-5359,0,1,1bb0d99cac797bd7b2b53afaa7303396767f2841aa1ed126e8e8014dd24834fb,2024-11-21T01:57:21.863000 -CVE-2013-5364,0,1,e168aaf5a94a12c3b3e8feb9c401cba099e0e15a646a899d816526f660227739,2024-11-21T01:57:21.970000 -CVE-2013-5365,0,1,29844c79ce492edbf2728c66e3cf50d37fa6146ae58a994d3009f8cc7fa9ddf5,2024-11-21T01:57:22.093000 -CVE-2013-5369,0,1,b488813a1cf26fc5b27423fd07d9905f6295a3a5f7e23002c82a0ac0e3d2d91a,2024-11-21T01:57:22.203000 -CVE-2013-5370,0,1,c85a99454edf3068aa930e1d04f95af90a618e44f8c947c6868a3d218dbdc07f,2024-11-21T01:57:22.310000 -CVE-2013-5371,0,1,6851bad9d36c2919be31b50a250512b85b44744c7c3a8f59f05ec3a16ec0827e,2024-11-21T01:57:22.420000 -CVE-2013-5372,0,1,b2b058186de5f501466731920332b9a92d586058ae824b452ef69d0498945134,2024-11-21T01:57:22.530000 -CVE-2013-5373,0,1,a203ac1c5ccf84d63fa716f3de39232d7867d24bb2f63486391b575986f5f5d8,2024-11-21T01:57:22.663000 -CVE-2013-5375,0,1,9795ff4fb9a26b7375904e2b6b0a5927bc5f62732eb6fe51ad483150291fbee8,2024-11-21T01:57:22.790000 -CVE-2013-5376,0,1,0eb6fa7c5741685430c152fc81ecb9b45a06823202321523b6483432899a39ec,2024-11-21T01:57:22.907000 -CVE-2013-5378,0,1,8e8b171276eca2a9bd65afc3a271e0dbe8a18d5ecf89b1cae73558b2abbe5eeb,2024-11-21T01:57:23.017000 -CVE-2013-5379,0,1,ae0c2a697e5d4b6c482b1b175bcb6d3922f551719b816e7317977172b6b7aeb1,2024-11-21T01:57:23.127000 -CVE-2013-5380,0,1,5655229183c05531da5e0808c31db41c2e0c8c98395adfb0a91a61ff4c8e3265,2024-11-21T01:57:23.247000 -CVE-2013-5381,0,1,25a1a6b68f765624f4939b12f2ecb5aa0af3267db147ced300bfd1692e0a9260,2024-11-21T01:57:23.363000 -CVE-2013-5382,0,1,12e34ae1f5fd647372596bb997c3bb6fea9c18567879833dc238d693a5eea38a,2024-11-21T01:57:23.477000 -CVE-2013-5383,0,1,ac5369794a294654723c2a1b68bd3608ab3c24a184d95518eb79eec0c089f468,2024-11-21T01:57:23.590000 -CVE-2013-5385,0,1,2d775e5de340ef33c9b39aa78a0369da03c579aee75af3e1c6a9d7661ad32cac,2024-11-21T01:57:23.707000 -CVE-2013-5387,0,1,db4afd89d672c166dea1b090263e9bac8de4976d1b6a5f85b53285a7e09a47bd,2024-11-21T01:57:23.823000 -CVE-2013-5388,0,1,28fa4351494bc0f1ef15d90cb60abd54cf588fc7cc42a089867d668baaa6b5e2,2024-11-21T01:57:23.930000 -CVE-2013-5389,0,1,62bbc2d743dd833c166dde5ea2f6b30b55223b35635a213dbb0ae47b0fd88372,2024-11-21T01:57:24.037000 -CVE-2013-5390,0,1,c93ef278711ca45d6875db0ce4eb904ec185d1aa1984ed609413749ae24ac98b,2024-11-21T01:57:24.140000 +CVE-2013-5357,0,0,6ecdc498b849fd8489d0b1f40a093394f33f75bd5e734a3231363bb70d2f3249,2024-11-21T01:57:21.640000 +CVE-2013-5358,0,0,8fc0588d2ff95038bf182dbfb5c5f112282f1a53b8603433850979a0865a688a,2024-11-21T01:57:21.747000 +CVE-2013-5359,0,0,1bb0d99cac797bd7b2b53afaa7303396767f2841aa1ed126e8e8014dd24834fb,2024-11-21T01:57:21.863000 +CVE-2013-5364,0,0,e168aaf5a94a12c3b3e8feb9c401cba099e0e15a646a899d816526f660227739,2024-11-21T01:57:21.970000 +CVE-2013-5365,0,0,29844c79ce492edbf2728c66e3cf50d37fa6146ae58a994d3009f8cc7fa9ddf5,2024-11-21T01:57:22.093000 +CVE-2013-5369,0,0,b488813a1cf26fc5b27423fd07d9905f6295a3a5f7e23002c82a0ac0e3d2d91a,2024-11-21T01:57:22.203000 +CVE-2013-5370,0,0,c85a99454edf3068aa930e1d04f95af90a618e44f8c947c6868a3d218dbdc07f,2024-11-21T01:57:22.310000 +CVE-2013-5371,0,0,6851bad9d36c2919be31b50a250512b85b44744c7c3a8f59f05ec3a16ec0827e,2024-11-21T01:57:22.420000 +CVE-2013-5372,0,0,b2b058186de5f501466731920332b9a92d586058ae824b452ef69d0498945134,2024-11-21T01:57:22.530000 +CVE-2013-5373,0,0,a203ac1c5ccf84d63fa716f3de39232d7867d24bb2f63486391b575986f5f5d8,2024-11-21T01:57:22.663000 +CVE-2013-5375,0,0,9795ff4fb9a26b7375904e2b6b0a5927bc5f62732eb6fe51ad483150291fbee8,2024-11-21T01:57:22.790000 +CVE-2013-5376,0,0,0eb6fa7c5741685430c152fc81ecb9b45a06823202321523b6483432899a39ec,2024-11-21T01:57:22.907000 +CVE-2013-5378,0,0,8e8b171276eca2a9bd65afc3a271e0dbe8a18d5ecf89b1cae73558b2abbe5eeb,2024-11-21T01:57:23.017000 +CVE-2013-5379,0,0,ae0c2a697e5d4b6c482b1b175bcb6d3922f551719b816e7317977172b6b7aeb1,2024-11-21T01:57:23.127000 +CVE-2013-5380,0,0,5655229183c05531da5e0808c31db41c2e0c8c98395adfb0a91a61ff4c8e3265,2024-11-21T01:57:23.247000 +CVE-2013-5381,0,0,25a1a6b68f765624f4939b12f2ecb5aa0af3267db147ced300bfd1692e0a9260,2024-11-21T01:57:23.363000 +CVE-2013-5382,0,0,12e34ae1f5fd647372596bb997c3bb6fea9c18567879833dc238d693a5eea38a,2024-11-21T01:57:23.477000 +CVE-2013-5383,0,0,ac5369794a294654723c2a1b68bd3608ab3c24a184d95518eb79eec0c089f468,2024-11-21T01:57:23.590000 +CVE-2013-5385,0,0,2d775e5de340ef33c9b39aa78a0369da03c579aee75af3e1c6a9d7661ad32cac,2024-11-21T01:57:23.707000 +CVE-2013-5387,0,0,db4afd89d672c166dea1b090263e9bac8de4976d1b6a5f85b53285a7e09a47bd,2024-11-21T01:57:23.823000 +CVE-2013-5388,0,0,28fa4351494bc0f1ef15d90cb60abd54cf588fc7cc42a089867d668baaa6b5e2,2024-11-21T01:57:23.930000 +CVE-2013-5389,0,0,62bbc2d743dd833c166dde5ea2f6b30b55223b35635a213dbb0ae47b0fd88372,2024-11-21T01:57:24.037000 +CVE-2013-5390,0,0,c93ef278711ca45d6875db0ce4eb904ec185d1aa1984ed609413749ae24ac98b,2024-11-21T01:57:24.140000 CVE-2013-5391,0,0,3dc53bbc9277578004e6184f2486726053dabd8b8e49c72c13c45f614f55c832,2018-06-04T16:23:25.133000 -CVE-2013-5393,0,1,4417242299c26bfb059d0b851ee3f5c0cad86247f3d3034d5764e44559980ea6,2024-11-21T01:57:24.373000 -CVE-2013-5394,0,1,4a005ad4e436c8949a0b150e7681c8c2c2012e479faef2bc8e5bc0a8761fa3ad,2024-11-21T01:57:24.480000 -CVE-2013-5395,0,1,fab680003c1b6c229e2986a6ee00b45e2db25355c367f0d83741be3861ae3d83,2024-11-21T01:57:24.587000 -CVE-2013-5397,0,1,f65d911b247e89290d5bf355b3714329e1e395da83c064dd557085f225a2c5de,2024-11-21T01:57:24.703000 -CVE-2013-5398,0,1,9ec4d57ea9dc09651b4832e84cf47026aba98c75960bd56f8a28765d48cf8017,2024-11-21T01:57:24.813000 -CVE-2013-5400,0,1,dd2e0a02fa82f9cfe0721527c885f145eff9851a2f3eec95c3b155feb7b61c35,2024-11-21T01:57:24.930000 -CVE-2013-5401,0,1,d855aba3c6703a138daa3f4ebf1c347a396bff705c9d9d39f6d097e137e21607,2024-11-21T01:57:25.040000 -CVE-2013-5402,0,1,28d769faa530ad5151efeb1557cb093f6b1ff91e1e2e59bf046ee0c2618fc6b1,2024-11-21T01:57:25.153000 -CVE-2013-5403,0,1,2f49f2fdf472e36f276edaec37f0895f69c4f3914c35123a3d01bc07090a6d83,2024-11-21T01:57:25.287000 -CVE-2013-5404,0,1,c6abb1657650e79885529222854850cf26e8a9e9634be88ae0cfda985c494078,2024-11-21T01:57:25.400000 -CVE-2013-5405,0,1,c10f55200450a8f61b041e89e4b5c7f3d2f6013e6da1da946d779b50d3b6dc84,2024-11-21T01:57:25.527000 -CVE-2013-5406,0,1,aae6f30da4ca0d98f81a565e68d7dc67f20e5f51bd2ae251a4f4226823ff62d7,2024-11-21T01:57:25.640000 -CVE-2013-5407,0,1,44a1567672b71a699376b8e860ecbf89ad57c26e9785ee4cd9d03b35c99d6356,2024-11-21T01:57:25.763000 -CVE-2013-5409,0,1,bca7ce58d21a03ef6686faa1ef94b64d7a96f9123097e3965bd30684ffec0f5a,2024-11-21T01:57:25.900000 -CVE-2013-5411,0,1,6c190cad18526efddd7ce622a0eafe2fdad711a5efb90f651d0e5a0161d39732,2024-11-21T01:57:26.017000 -CVE-2013-5413,0,1,f72997a3f06827556c9655c7501dbe10daded89f2811e963a38b3c4518c03e92,2024-11-21T01:57:26.140000 -CVE-2013-5414,0,1,bb70482a41f3ba32d65c7727560e6b0036f1bc6f24b5d1a7e0c5b0d09eca8838,2024-11-21T01:57:26.253000 -CVE-2013-5415,0,1,b60638db408e5655866029c34f687b01e7a8655be53a551057b50a5485bea19d,2024-11-21T01:57:26.387000 -CVE-2013-5416,0,1,030af52b9d5dc8f01c5267d1610d35439d4ca27fd472d71dfe6a67eca9051a1e,2024-11-21T01:57:26.500000 -CVE-2013-5417,0,1,3ac2b3cb34acce0f0b8ed65271bf1fbd66f18d66047823ffa676dc4d6f16f282,2024-11-21T01:57:26.630000 -CVE-2013-5418,0,1,9cd1a635c3776db2793a229f938da3b1ac94e31958d4da39fcdb17f8ec8be1b5,2024-11-21T01:57:26.743000 -CVE-2013-5419,0,1,5c35a16dbeb67c8393a7c10f43fd3573160e053840bb4e976b0dc0911d588ee0,2024-11-21T01:57:26.870000 -CVE-2013-5420,0,1,95b86dde72e510feee518e6bd640f661633ea5649b60c3681218f709c5acb65a,2024-11-21T01:57:26.983000 -CVE-2013-5421,0,1,39f5a07fad23108f5796e1a89820b528710268e416bc97e4491f1be482c15e29,2024-11-21T01:57:27.100000 -CVE-2013-5422,0,1,be4142c779aca6ddc62f64eda3c349ae9066a1cc639633e47d191e04f226ca3e,2024-11-21T01:57:27.217000 +CVE-2013-5393,0,0,4417242299c26bfb059d0b851ee3f5c0cad86247f3d3034d5764e44559980ea6,2024-11-21T01:57:24.373000 +CVE-2013-5394,0,0,4a005ad4e436c8949a0b150e7681c8c2c2012e479faef2bc8e5bc0a8761fa3ad,2024-11-21T01:57:24.480000 +CVE-2013-5395,0,0,fab680003c1b6c229e2986a6ee00b45e2db25355c367f0d83741be3861ae3d83,2024-11-21T01:57:24.587000 +CVE-2013-5397,0,0,f65d911b247e89290d5bf355b3714329e1e395da83c064dd557085f225a2c5de,2024-11-21T01:57:24.703000 +CVE-2013-5398,0,0,9ec4d57ea9dc09651b4832e84cf47026aba98c75960bd56f8a28765d48cf8017,2024-11-21T01:57:24.813000 +CVE-2013-5400,0,0,dd2e0a02fa82f9cfe0721527c885f145eff9851a2f3eec95c3b155feb7b61c35,2024-11-21T01:57:24.930000 +CVE-2013-5401,0,0,d855aba3c6703a138daa3f4ebf1c347a396bff705c9d9d39f6d097e137e21607,2024-11-21T01:57:25.040000 +CVE-2013-5402,0,0,28d769faa530ad5151efeb1557cb093f6b1ff91e1e2e59bf046ee0c2618fc6b1,2024-11-21T01:57:25.153000 +CVE-2013-5403,0,0,2f49f2fdf472e36f276edaec37f0895f69c4f3914c35123a3d01bc07090a6d83,2024-11-21T01:57:25.287000 +CVE-2013-5404,0,0,c6abb1657650e79885529222854850cf26e8a9e9634be88ae0cfda985c494078,2024-11-21T01:57:25.400000 +CVE-2013-5405,0,0,c10f55200450a8f61b041e89e4b5c7f3d2f6013e6da1da946d779b50d3b6dc84,2024-11-21T01:57:25.527000 +CVE-2013-5406,0,0,aae6f30da4ca0d98f81a565e68d7dc67f20e5f51bd2ae251a4f4226823ff62d7,2024-11-21T01:57:25.640000 +CVE-2013-5407,0,0,44a1567672b71a699376b8e860ecbf89ad57c26e9785ee4cd9d03b35c99d6356,2024-11-21T01:57:25.763000 +CVE-2013-5409,0,0,bca7ce58d21a03ef6686faa1ef94b64d7a96f9123097e3965bd30684ffec0f5a,2024-11-21T01:57:25.900000 +CVE-2013-5411,0,0,6c190cad18526efddd7ce622a0eafe2fdad711a5efb90f651d0e5a0161d39732,2024-11-21T01:57:26.017000 +CVE-2013-5413,0,0,f72997a3f06827556c9655c7501dbe10daded89f2811e963a38b3c4518c03e92,2024-11-21T01:57:26.140000 +CVE-2013-5414,0,0,bb70482a41f3ba32d65c7727560e6b0036f1bc6f24b5d1a7e0c5b0d09eca8838,2024-11-21T01:57:26.253000 +CVE-2013-5415,0,0,b60638db408e5655866029c34f687b01e7a8655be53a551057b50a5485bea19d,2024-11-21T01:57:26.387000 +CVE-2013-5416,0,0,030af52b9d5dc8f01c5267d1610d35439d4ca27fd472d71dfe6a67eca9051a1e,2024-11-21T01:57:26.500000 +CVE-2013-5417,0,0,3ac2b3cb34acce0f0b8ed65271bf1fbd66f18d66047823ffa676dc4d6f16f282,2024-11-21T01:57:26.630000 +CVE-2013-5418,0,0,9cd1a635c3776db2793a229f938da3b1ac94e31958d4da39fcdb17f8ec8be1b5,2024-11-21T01:57:26.743000 +CVE-2013-5419,0,0,5c35a16dbeb67c8393a7c10f43fd3573160e053840bb4e976b0dc0911d588ee0,2024-11-21T01:57:26.870000 +CVE-2013-5420,0,0,95b86dde72e510feee518e6bd640f661633ea5649b60c3681218f709c5acb65a,2024-11-21T01:57:26.983000 +CVE-2013-5421,0,0,39f5a07fad23108f5796e1a89820b528710268e416bc97e4491f1be482c15e29,2024-11-21T01:57:27.100000 +CVE-2013-5422,0,0,be4142c779aca6ddc62f64eda3c349ae9066a1cc639633e47d191e04f226ca3e,2024-11-21T01:57:27.217000 CVE-2013-5423,0,0,75590b8074c2d16848fa17bacb7712d4d1fb9f7580108f5d9e44afa1422f55aa,2017-08-29T01:33:46.623000 -CVE-2013-5424,0,1,221d94e18ab8fb05970480626e0550aaf2f1d7c9d7954ba82a671023628b8832,2024-11-21T01:57:27.453000 -CVE-2013-5425,0,1,28f46a9be4acf1f5eab0ecf840679436532804d67ec4579b6660669faeb68db8,2024-11-21T01:57:27.560000 -CVE-2013-5426,0,1,5ccb11ab6f614140a42fb78cc568652a996201554545e02b11a4ab122c88bea7,2024-11-21T01:57:27.663000 -CVE-2013-5427,0,1,5c278d89589062d209563734a230bfca94017eeb6ffc9a4178f765aabb045329,2024-11-21T01:57:27.790000 -CVE-2013-5428,0,1,88eddf87f1c1d9fddc77bd51cf227c403dc7e44c21246d146cf70e43398dad39,2024-11-21T01:57:27.900000 -CVE-2013-5429,0,1,0dbcfd06989a14f02704fd39c68aeb96f2e34b6d02fff56efa2d05d2294fc325,2024-11-21T01:57:28.010000 -CVE-2013-5430,0,1,519754034398ad9fa5308a2ff95b7d3b918fcf3a207ce8483b508304f266e462,2024-11-21T01:57:28.117000 -CVE-2013-5431,0,1,9d384db248c1272f356a577211deddc22adc5c76364732f2bca02bc7b0ef83ce,2024-11-21T01:57:28.223000 +CVE-2013-5424,0,0,221d94e18ab8fb05970480626e0550aaf2f1d7c9d7954ba82a671023628b8832,2024-11-21T01:57:27.453000 +CVE-2013-5425,0,0,28f46a9be4acf1f5eab0ecf840679436532804d67ec4579b6660669faeb68db8,2024-11-21T01:57:27.560000 +CVE-2013-5426,0,0,5ccb11ab6f614140a42fb78cc568652a996201554545e02b11a4ab122c88bea7,2024-11-21T01:57:27.663000 +CVE-2013-5427,0,0,5c278d89589062d209563734a230bfca94017eeb6ffc9a4178f765aabb045329,2024-11-21T01:57:27.790000 +CVE-2013-5428,0,0,88eddf87f1c1d9fddc77bd51cf227c403dc7e44c21246d146cf70e43398dad39,2024-11-21T01:57:27.900000 +CVE-2013-5429,0,0,0dbcfd06989a14f02704fd39c68aeb96f2e34b6d02fff56efa2d05d2294fc325,2024-11-21T01:57:28.010000 +CVE-2013-5430,0,0,519754034398ad9fa5308a2ff95b7d3b918fcf3a207ce8483b508304f266e462,2024-11-21T01:57:28.117000 +CVE-2013-5431,0,0,9d384db248c1272f356a577211deddc22adc5c76364732f2bca02bc7b0ef83ce,2024-11-21T01:57:28.223000 CVE-2013-5433,0,0,7f530ab40ecfdb1206e48f512245f7a5cc9d3290f34dc764e991c7f7f5870264,2017-08-29T01:33:47.107000 -CVE-2013-5438,0,1,f2036d6833eb5167768dfa052d25826f48918fff4c10add0d1b8f341a252b602,2024-11-21T01:57:28.443000 -CVE-2013-5440,0,1,13ca238a4592ad00d97da4252861edd3974b2a83c6883959d164576ad57422fc,2024-11-21T01:57:28.550000 -CVE-2013-5442,0,1,b30a7c7ade195993cadc7e0fa7be6600f62bcdb52356ccaff46c819aa56dd8a6,2024-11-21T01:57:28.660000 -CVE-2013-5443,0,1,c963f929b89047a69c092f78fa2d45b156e9b4a2b12f8db324799c87550b69d0,2024-11-21T01:57:28.767000 -CVE-2013-5444,0,1,1dc8f09b37b99fb5888e2a1259b5ce912bbfca4522ba66dd23495ea3b1de6fff,2024-11-21T01:57:28.870000 -CVE-2013-5445,0,1,46fed6f79c14631cb8606f42520185041bd63e23686b0c0ddeb4c7b5a5743bc7,2024-11-21T01:57:28.980000 -CVE-2013-5446,0,1,e1b6feb2e509fa4a44787a587e180b5856e807154dc79e895822ba5195fcd93f,2024-11-21T01:57:29.090000 -CVE-2013-5447,0,1,105dd3423713d1b8503f1198ca12f93c6d5361e37e33378171523b787e040351,2024-11-21T01:57:29.213000 -CVE-2013-5448,0,1,364fbc3558e11fce6a477652f7bdd895b1be676318a368241f07a1fed1bd0066,2024-11-21T01:57:29.340000 -CVE-2013-5449,0,1,ebc583df59e80552f2fe371fe30b42538c079c0158962918a2aa3ba1b3aefd36,2024-11-21T01:57:29.480000 -CVE-2013-5450,0,1,41553ff2729b535cf5c86747296e90d23095b1f87e00d325a90141a3a5c1abda,2024-11-21T01:57:29.637000 -CVE-2013-5452,0,1,6bd6ebf3d5a09f2225ec9e78af987821c8ccb2226a26f6757846e564642b5002,2024-11-21T01:57:29.783000 -CVE-2013-5453,0,1,0732368568ed76e14bfeefe37cc1b504b70e891f274e2be94aed5dc20e085273,2024-11-21T01:57:29.950000 -CVE-2013-5454,0,1,e5a5b17e6fbdec495467ee2b2310c6cd371d094427410d0cb5f66acadf8b9833,2024-11-21T01:57:30.090000 -CVE-2013-5455,0,1,8b78a92b07fdf342d924172be679c6607c84d89c158c452fc16732fb54d9c64e,2024-11-21T01:57:30.240000 -CVE-2013-5456,0,1,297081541a7266cb468d081b8be986c83edf0beade39a7bdea7bd94e3e07a911,2024-11-21T01:57:30.387000 -CVE-2013-5457,0,1,9e087604d91bc3e84f7970989e0e29e3306d553d7409b7980a8bdb9433e5a96a,2024-11-21T01:57:30.740000 -CVE-2013-5458,0,1,a85a0631b9abe87916ae25870a744f4ad1f90628cf12319fb8c46e17a2f6b946,2024-11-21T01:57:30.893000 -CVE-2013-5459,0,1,5bfa18702d68af23068765409623fd9f87f8ba11d93b508db3edd07e6f013132,2024-11-21T01:57:31.013000 -CVE-2013-5460,0,1,625f52df445b2a48ae1c43781ef5cf0abbf53b3a019b6d1a526a39711d8f8433,2024-11-21T01:57:31.120000 +CVE-2013-5438,0,0,f2036d6833eb5167768dfa052d25826f48918fff4c10add0d1b8f341a252b602,2024-11-21T01:57:28.443000 +CVE-2013-5440,0,0,13ca238a4592ad00d97da4252861edd3974b2a83c6883959d164576ad57422fc,2024-11-21T01:57:28.550000 +CVE-2013-5442,0,0,b30a7c7ade195993cadc7e0fa7be6600f62bcdb52356ccaff46c819aa56dd8a6,2024-11-21T01:57:28.660000 +CVE-2013-5443,0,0,c963f929b89047a69c092f78fa2d45b156e9b4a2b12f8db324799c87550b69d0,2024-11-21T01:57:28.767000 +CVE-2013-5444,0,0,1dc8f09b37b99fb5888e2a1259b5ce912bbfca4522ba66dd23495ea3b1de6fff,2024-11-21T01:57:28.870000 +CVE-2013-5445,0,0,46fed6f79c14631cb8606f42520185041bd63e23686b0c0ddeb4c7b5a5743bc7,2024-11-21T01:57:28.980000 +CVE-2013-5446,0,0,e1b6feb2e509fa4a44787a587e180b5856e807154dc79e895822ba5195fcd93f,2024-11-21T01:57:29.090000 +CVE-2013-5447,0,0,105dd3423713d1b8503f1198ca12f93c6d5361e37e33378171523b787e040351,2024-11-21T01:57:29.213000 +CVE-2013-5448,0,0,364fbc3558e11fce6a477652f7bdd895b1be676318a368241f07a1fed1bd0066,2024-11-21T01:57:29.340000 +CVE-2013-5449,0,0,ebc583df59e80552f2fe371fe30b42538c079c0158962918a2aa3ba1b3aefd36,2024-11-21T01:57:29.480000 +CVE-2013-5450,0,0,41553ff2729b535cf5c86747296e90d23095b1f87e00d325a90141a3a5c1abda,2024-11-21T01:57:29.637000 +CVE-2013-5452,0,0,6bd6ebf3d5a09f2225ec9e78af987821c8ccb2226a26f6757846e564642b5002,2024-11-21T01:57:29.783000 +CVE-2013-5453,0,0,0732368568ed76e14bfeefe37cc1b504b70e891f274e2be94aed5dc20e085273,2024-11-21T01:57:29.950000 +CVE-2013-5454,0,0,e5a5b17e6fbdec495467ee2b2310c6cd371d094427410d0cb5f66acadf8b9833,2024-11-21T01:57:30.090000 +CVE-2013-5455,0,0,8b78a92b07fdf342d924172be679c6607c84d89c158c452fc16732fb54d9c64e,2024-11-21T01:57:30.240000 +CVE-2013-5456,0,0,297081541a7266cb468d081b8be986c83edf0beade39a7bdea7bd94e3e07a911,2024-11-21T01:57:30.387000 +CVE-2013-5457,0,0,9e087604d91bc3e84f7970989e0e29e3306d553d7409b7980a8bdb9433e5a96a,2024-11-21T01:57:30.740000 +CVE-2013-5458,0,0,a85a0631b9abe87916ae25870a744f4ad1f90628cf12319fb8c46e17a2f6b946,2024-11-21T01:57:30.893000 +CVE-2013-5459,0,0,5bfa18702d68af23068765409623fd9f87f8ba11d93b508db3edd07e6f013132,2024-11-21T01:57:31.013000 +CVE-2013-5460,0,0,625f52df445b2a48ae1c43781ef5cf0abbf53b3a019b6d1a526a39711d8f8433,2024-11-21T01:57:31.120000 CVE-2013-5461,0,0,417c58f460b0b2d0c64771dc0e52b16a3bdaa6592c11bd69612153e2081c1601,2018-06-04T16:22:43.960000 -CVE-2013-5462,0,1,31213abf3a7c7a34445b1fbc4d61c79ab669a1f7779066ff800e474b46425028,2024-11-21T01:57:31.357000 -CVE-2013-5463,0,1,cbda89e22197f2d38e5ad6d961b02dbbaed976bfe2e824ada40b028b6a569cbd,2024-11-21T01:57:31.470000 -CVE-2013-5464,0,1,758f42533c38a6d4102f0b391e57202fba8a3122a7469d164210d8306bb7b42d,2024-11-21T01:57:31.583000 -CVE-2013-5465,0,1,e5fe52f80a613f8777830b79abc41a02bc7365dbca497a32d8a6157e7d948299,2024-11-21T01:57:31.713000 -CVE-2013-5466,0,1,5a3d9b032fb9ebf8d8b03acd2cbce52eabb5cdd9c1312cdd23641af18975b4bc,2024-11-21T01:57:31.843000 +CVE-2013-5462,0,0,31213abf3a7c7a34445b1fbc4d61c79ab669a1f7779066ff800e474b46425028,2024-11-21T01:57:31.357000 +CVE-2013-5463,0,0,cbda89e22197f2d38e5ad6d961b02dbbaed976bfe2e824ada40b028b6a569cbd,2024-11-21T01:57:31.470000 +CVE-2013-5464,0,0,758f42533c38a6d4102f0b391e57202fba8a3122a7469d164210d8306bb7b42d,2024-11-21T01:57:31.583000 +CVE-2013-5465,0,0,e5fe52f80a613f8777830b79abc41a02bc7365dbca497a32d8a6157e7d948299,2024-11-21T01:57:31.713000 +CVE-2013-5466,0,0,5a3d9b032fb9ebf8d8b03acd2cbce52eabb5cdd9c1312cdd23641af18975b4bc,2024-11-21T01:57:31.843000 CVE-2013-5467,0,0,d4d69eb472e130870f8cda250a1e5c6bc7416728fcb512339b405b70bdbe11fb,2017-08-29T01:33:48.653000 -CVE-2013-5468,0,1,34233d2723f30067c21c4effed83e05aee976dab02548cd78c31cb252cdc9425,2024-11-21T01:57:32.117000 -CVE-2013-5469,0,1,c4a8c39b28a4a212a9f55c585782018a3bfd4889e2b00d2aa8a0073314ef2ba1,2024-11-21T01:57:32.277000 -CVE-2013-5470,0,1,4ecc3d4b59cd1b36e601e2579a4199639c4ea991602dcaf2a84c6f83ef257e5e,2024-11-21T01:57:32.407000 -CVE-2013-5471,0,1,9a8c59d78cf143993772bd883a8bd7a228ce0f0fb961af5216e9fa435d12e2ad,2024-11-21T01:57:32.540000 -CVE-2013-5472,0,1,66f400182c4a3e3ca0b4c5c591f27cd0c6f23b3277600a08c299eb5c139d01ae,2024-11-21T01:57:32.660000 -CVE-2013-5473,0,1,fa27025e6620c13fefa19b290db5635ae7ea0e80fcb85de9ddf5b2112221b37d,2024-11-21T01:57:32.793000 -CVE-2013-5474,0,1,670be9e64f0002fd5a7462697eb92cb9a19441edda0ebf67cf6e07cf29030c21,2024-11-21T01:57:32.940000 -CVE-2013-5475,0,1,c293a01f9628be76e06d1bfaff887f8d8fc1007d367210bf14dc184e93708d8b,2024-11-21T01:57:33.063000 -CVE-2013-5476,0,1,7e560384f5717bf4d4e336c82d8cd42e66c0fa265fb2611501c6dc6e472173d7,2024-11-21T01:57:33.190000 -CVE-2013-5477,0,1,07438e6b73e24a2d3c1e236b62fdb597eb075fc778224a1826e0c5c149adacc5,2024-11-21T01:57:33.293000 -CVE-2013-5478,0,1,75c40743c923b010ee5aa9e33c0f9d81565eed4db165501ec243bfe01961df44,2024-11-21T01:57:33.417000 -CVE-2013-5479,0,1,7423991d92e523fff0b7de573948d42183165b1d3ab223c705587a2de125b019,2024-11-21T01:57:33.543000 -CVE-2013-5480,0,1,e865cba52f71d9ad2af909152705664315ae47c4c5fd97234580368ce08302dc,2024-11-21T01:57:33.657000 -CVE-2013-5481,0,1,b32ceffa85c2f0f50db4eba93690cf2ada1313768635bde767e2b663ca1853db,2024-11-21T01:57:33.767000 -CVE-2013-5482,0,1,d6e3a167ffcdde674db111a0c3d688cfafd59f9c3342045a9912158b13473362,2024-11-21T01:57:33.880000 -CVE-2013-5483,0,1,d71742c8a7db81a1d7f1a4abc75afbf5ad333181474643118e1774ef17442bc6,2024-11-21T01:57:33.993000 -CVE-2013-5486,0,1,fd69d72c6243774acccec4a5bb7b55f1e59101053fad6713869ebbd1b85a31f9,2024-11-21T01:57:34.113000 -CVE-2013-5487,0,1,84597928f272872900c50dec88fc6e8ba7168ad5f81c7d950b2475bb24fee427,2024-11-21T01:57:34.253000 -CVE-2013-5488,0,1,46ac962733bf50935ffb8f2f2b9d45bdebe1a612831b726c4c77925863172315,2024-11-21T01:57:34.377000 -CVE-2013-5489,0,1,2942ee343c453d787c16719413fa7349aa4dc73162799ea5ca11b3763179adfd,2024-11-21T01:57:34.507000 -CVE-2013-5490,0,1,474e6e6c65862e6607561d8fc7392c12a44bc57d25b8e8fee472cb853e096aa9,2024-11-21T01:57:34.620000 -CVE-2013-5492,0,1,20c27286ae30bb4d5d98c564fc4e3c438f88a7cb8401c2a5987689a7b63c73cf,2024-11-21T01:57:34.740000 -CVE-2013-5493,0,1,0e6fff04da877a92ab36eceb3dc6d0628f981b380ca2d7595ea46298b34cb2e8,2024-11-21T01:57:34.853000 -CVE-2013-5494,0,1,6ea0e000e59c0764f646551a115dc0a819b5f549479b9f8e2ae5bbede5364b4a,2024-11-21T01:57:34.970000 -CVE-2013-5495,0,1,4670ff0c47dd1cd9b2657d0d4d0e002883536fc1e577a1aebf506fa86f6b897e,2024-11-21T01:57:35.083000 -CVE-2013-5496,0,1,ccd8cf1bcc4b69d230f2989d3b522cb748ff3f240d7e972fed52cfb21f92a9d1,2024-11-21T01:57:35.203000 -CVE-2013-5497,0,1,b596c1f589fdc0d266d9b64b04e89a7a47595f1b5a7a350a75b088f551d1ab8c,2024-11-21T01:57:35.320000 -CVE-2013-5498,0,1,81a8a40300912f66f7dd78bca3593d3d68a61ca813e1ed7e8e7b07c640d59268,2024-11-21T01:57:35.450000 -CVE-2013-5499,0,1,2888c2112dbd99a66d656e60b5b50671627d197ebb9471ca63c35106a0f44b30,2024-11-21T01:57:35.563000 -CVE-2013-5500,0,1,c09149a3e46bc83af5fb619735599ecbb573beb2e6269ffc5409c3ceb67fbf42,2024-11-21T01:57:35.673000 -CVE-2013-5501,0,1,4025cd164f74426ce858c923cb3dcebcb0a2d9ed52b22823ab496bb36390c2a2,2024-11-21T01:57:35.797000 -CVE-2013-5502,0,1,a2e0bde6de5aa73bc284620dfb76c94fa34c8d25dfe2818f7678deb1c58abffb,2024-11-21T01:57:35.913000 -CVE-2013-5503,0,1,0a50fac77d3fd610b506a63c228aa64707c49e5495cd5d92b83ccaa162423ac5,2024-11-21T01:57:36.027000 -CVE-2013-5504,0,1,ca12e8430a822865e30fc9fbb2f0a632f4fe74615be986acba253f0b9ed4132d,2024-11-21T01:57:36.137000 -CVE-2013-5505,0,1,a0abd04eaf062975230c77f3a1c6867fdcc3e7f384911e0dd709c0bcefeccc0b,2024-11-21T01:57:36.257000 -CVE-2013-5506,0,1,d6973b5013f4e38f106782e699275fb2d874eb3e0732b3b42739d9c74ecf34b0,2024-11-21T01:57:36.377000 -CVE-2013-5507,0,1,b4384d88bad45a84347cc1ebf950477163c8d552124ed21d357c4baf1e3ed7f0,2024-11-21T01:57:36.500000 -CVE-2013-5508,0,1,c080d7aad5daf6b456fb9ea9b9ab2c01a55d5bbd5842cef3e918f61f558eb5a1,2024-11-21T01:57:36.610000 -CVE-2013-5509,0,1,98fc685b36f8be84255df23d52ad44332688aeb7c9dcca9ba7d385f38f9fa838,2024-11-21T01:57:36.760000 -CVE-2013-5510,0,1,e266c9823346c606231c61d1ae53ac85d5ab03d80c1248c514da5b921e2dcdf9,2024-11-21T01:57:36.887000 -CVE-2013-5511,0,1,424e1aec623409dba9a5b3345fee786e71edc3fbfe1179326bb0f2e149c6b051,2024-11-21T01:57:37.017000 -CVE-2013-5512,0,1,a173ebeeb26bb3e0d7eb6f0b550e1aeb7f88d0bbe65e545b8af42f208c1a177f,2024-11-21T01:57:37.150000 -CVE-2013-5513,0,1,94b6e2dfebca373f8439b1b5af9edb702e3b377778d5bbb5957e287914e790c9,2024-11-21T01:57:37.270000 -CVE-2013-5515,0,1,71637f56cea992f67575fc8ee752b2b466217c1484e1b7cc6c56b9e92d844222,2024-11-21T01:57:37.407000 -CVE-2013-5516,0,1,b1f661d938ce47d99ada9be130f938f2d526e703adc7f273d2ee37e6f84d52df,2024-11-21T01:57:37.540000 -CVE-2013-5517,0,1,7747b01ddfdc98a29f309c2234640d8257b0630428526b5da6ac70c019f2cae8,2024-11-21T01:57:37.653000 -CVE-2013-5519,0,1,ce83a13bfedb190f780bd9c45a09aa64b6036716cf229dc5126bbd7fb7f08956,2024-11-21T01:57:37.773000 -CVE-2013-5521,0,1,bbc5ac81e4a2f97f2bd4a79c2becdbce34b50face5f0d5fd7b5f56c222c04f92,2024-11-21T01:57:37.903000 -CVE-2013-5522,0,1,a3c425156e6816e80320253242deed86d996f1a3645ddfd379347165e5b3d836,2024-11-21T01:57:38.030000 -CVE-2013-5523,0,1,28498378909b804a5b4b3d74ccdcb8f868a7fb97b76b5ecf4c8f0492538d0711,2024-11-21T01:57:38.150000 -CVE-2013-5524,0,1,c3a64d4f5d4802a34f840bfb69c2f47d38c10ce76dcf1939e9e4fdc24b0bd6c5,2024-11-21T01:57:38.280000 -CVE-2013-5525,0,1,cf07601c7dc555429fc2e83612b475ec4560ae9342179c2734cd54210062d9e3,2024-11-21T01:57:38.407000 -CVE-2013-5526,0,1,7b5d8ed4d34fc054900aa742e6c9dda515ef838a519d9304cab5bed6a5e28703,2024-11-21T01:57:38.527000 -CVE-2013-5527,0,1,caa0ebc4e76523e0120a38531d27332d44b503caf2d53d4dcd6c210e0542579b,2024-11-21T01:57:38.647000 -CVE-2013-5528,0,1,8f7db72e60cf392ca8130d22b38e392ab9d93d3e02cf88e766625376d634a417,2024-11-21T01:57:38.763000 -CVE-2013-5529,0,1,510a460e46fd6a05e92ca8341aea2cb36728bb9d6c39a70bb6f292d644dcb6aa,2024-11-21T01:57:38.880000 -CVE-2013-5530,0,1,aac0a46b076567b4c3db677ff4602f14cbe32df2e054a516ab97e9da19ae4270,2024-11-21T01:57:38.983000 -CVE-2013-5531,0,1,613f189e948c0fae4831140d97b11466a6596d1bfa2d3c8ac938c76e823c7ce6,2024-11-21T01:57:39.097000 -CVE-2013-5532,0,1,b54dbffa40611a6a87c0ca47c803c5f0b5020c94d5dbabdb8dfac6df64aaa574,2024-11-21T01:57:39.200000 -CVE-2013-5533,0,1,7e36e913e9239c91bf7fafc1c4d140ffe6613bba9b2543d069128ba40af2c018,2024-11-21T01:57:39.300000 -CVE-2013-5534,0,1,0f30473dbf0ff2e7a6461ee3142af26e94cd20741da5cbd2e044375264aaf925,2024-11-21T01:57:39.413000 -CVE-2013-5535,0,1,941ac15b721e97b9f0c9d32d94cb5512660265b67e34b402f6fb199fcd3f71e3,2024-11-21T01:57:39.517000 -CVE-2013-5536,0,1,df45d8fe23f3ec03626b36deb44f53979e4d4dff801fbd2d349d34327c74e460,2024-11-21T01:57:39.620000 -CVE-2013-5537,0,1,fb3b42d9939c727312e6809f8676ad88bafd9b192b5f8ab835164597b98bde56,2024-11-21T01:57:39.720000 -CVE-2013-5538,0,1,96a2fb00434dfdd2ba118d519b0928693655b8eb4ec93d0af26d66942e3c4543,2024-11-21T01:57:39.823000 -CVE-2013-5539,0,1,0831e534aa43e71277ee0c52bad4b1eef3047afea6396c133fd25e2f554d15dd,2024-11-21T01:57:39.937000 -CVE-2013-5540,0,1,a1a0093b8f79954776acd7bcc28d6b1d898e509160302270605ae582b0046454,2024-11-21T01:57:40.047000 -CVE-2013-5541,0,1,5d6bf5dea8f79e229eeb1f0f9bf6692c9fa2a770573e75faddc3a530e917772f,2024-11-21T01:57:40.157000 -CVE-2013-5542,0,1,1e12124edca9517b699210dd4607132798b661319d8835d39dac73dccbf37e8d,2024-11-21T01:57:40.270000 -CVE-2013-5543,0,1,c0897b221177ccaadc89a6ef49f533e31a9aef41448a4d17e70f5f57a2989df8,2024-11-21T01:57:40.387000 -CVE-2013-5544,0,1,6e6a36e49bb72c5ee34c5aec2a48d391e277d8cb9dd1c6ea8ff071d949716b90,2024-11-21T01:57:40.500000 -CVE-2013-5545,0,1,8945369f6046fe8f77b3c03d8fe59a0f5c14f79f7b8d224c08ffa54bc5a88045,2024-11-21T01:57:40.607000 -CVE-2013-5546,0,1,ebb504821bf5f975e57053bdfd6ff77707e0ce7acd3ff0c6804e2579520d4df1,2024-11-21T01:57:40.717000 -CVE-2013-5547,0,1,1e4dec551e262fc41d96203a04f7a134e1fe0ccbc4eb1946ac7558ac504c787b,2024-11-21T01:57:40.837000 -CVE-2013-5548,0,1,dccbc72ef6cf4d0ba18375d483ff81658ca035b5a75cca6dbc104a0bed241aca,2024-11-21T01:57:40.947000 -CVE-2013-5549,0,1,c4c280e4b4198249dc8ffcb4eaf3e85aab860010138c927c7802f87eb45b6004,2024-11-21T01:57:41.060000 -CVE-2013-5550,0,1,ecabf7287c961c5f2e8cf13ab6d52b54a4a132576316c58c6d2e9ac9b7cf4d95,2024-11-21T01:57:41.170000 -CVE-2013-5551,0,1,5dceebb19bc833e453a704d43167738839574af083a5fba03051937aa12617ca,2024-11-21T01:57:41.283000 -CVE-2013-5552,0,1,0de1d548ca8b52b64df3014409b92f9df9ee0e243abe19013873525b88df0e0b,2024-11-21T01:57:41.387000 -CVE-2013-5553,0,1,641ea0d79077f92b891e6620a48381331701d5895a1ab0926138d0466a96cdde,2024-11-21T01:57:41.513000 -CVE-2013-5554,0,1,8b01fe85397aa35400c85b56d0aaf23be59f0174740d54d6ace0ea2790098a1e,2024-11-21T01:57:41.617000 -CVE-2013-5555,0,1,4da77672bc676acb86e5638e10ccd5cdaab2b64b6e03b629712da2875ea5d376,2024-11-21T01:57:41.730000 -CVE-2013-5556,0,1,89ae0a20610a7ea909e431dae00fabd4145f5b86a75aec3c57f49a3fdad4676e,2024-11-21T01:57:41.837000 +CVE-2013-5468,0,0,34233d2723f30067c21c4effed83e05aee976dab02548cd78c31cb252cdc9425,2024-11-21T01:57:32.117000 +CVE-2013-5469,0,0,c4a8c39b28a4a212a9f55c585782018a3bfd4889e2b00d2aa8a0073314ef2ba1,2024-11-21T01:57:32.277000 +CVE-2013-5470,0,0,4ecc3d4b59cd1b36e601e2579a4199639c4ea991602dcaf2a84c6f83ef257e5e,2024-11-21T01:57:32.407000 +CVE-2013-5471,0,0,9a8c59d78cf143993772bd883a8bd7a228ce0f0fb961af5216e9fa435d12e2ad,2024-11-21T01:57:32.540000 +CVE-2013-5472,0,0,66f400182c4a3e3ca0b4c5c591f27cd0c6f23b3277600a08c299eb5c139d01ae,2024-11-21T01:57:32.660000 +CVE-2013-5473,0,0,fa27025e6620c13fefa19b290db5635ae7ea0e80fcb85de9ddf5b2112221b37d,2024-11-21T01:57:32.793000 +CVE-2013-5474,0,0,670be9e64f0002fd5a7462697eb92cb9a19441edda0ebf67cf6e07cf29030c21,2024-11-21T01:57:32.940000 +CVE-2013-5475,0,0,c293a01f9628be76e06d1bfaff887f8d8fc1007d367210bf14dc184e93708d8b,2024-11-21T01:57:33.063000 +CVE-2013-5476,0,0,7e560384f5717bf4d4e336c82d8cd42e66c0fa265fb2611501c6dc6e472173d7,2024-11-21T01:57:33.190000 +CVE-2013-5477,0,0,07438e6b73e24a2d3c1e236b62fdb597eb075fc778224a1826e0c5c149adacc5,2024-11-21T01:57:33.293000 +CVE-2013-5478,0,0,75c40743c923b010ee5aa9e33c0f9d81565eed4db165501ec243bfe01961df44,2024-11-21T01:57:33.417000 +CVE-2013-5479,0,0,7423991d92e523fff0b7de573948d42183165b1d3ab223c705587a2de125b019,2024-11-21T01:57:33.543000 +CVE-2013-5480,0,0,e865cba52f71d9ad2af909152705664315ae47c4c5fd97234580368ce08302dc,2024-11-21T01:57:33.657000 +CVE-2013-5481,0,0,b32ceffa85c2f0f50db4eba93690cf2ada1313768635bde767e2b663ca1853db,2024-11-21T01:57:33.767000 +CVE-2013-5482,0,0,d6e3a167ffcdde674db111a0c3d688cfafd59f9c3342045a9912158b13473362,2024-11-21T01:57:33.880000 +CVE-2013-5483,0,0,d71742c8a7db81a1d7f1a4abc75afbf5ad333181474643118e1774ef17442bc6,2024-11-21T01:57:33.993000 +CVE-2013-5486,0,0,fd69d72c6243774acccec4a5bb7b55f1e59101053fad6713869ebbd1b85a31f9,2024-11-21T01:57:34.113000 +CVE-2013-5487,0,0,84597928f272872900c50dec88fc6e8ba7168ad5f81c7d950b2475bb24fee427,2024-11-21T01:57:34.253000 +CVE-2013-5488,0,0,46ac962733bf50935ffb8f2f2b9d45bdebe1a612831b726c4c77925863172315,2024-11-21T01:57:34.377000 +CVE-2013-5489,0,0,2942ee343c453d787c16719413fa7349aa4dc73162799ea5ca11b3763179adfd,2024-11-21T01:57:34.507000 +CVE-2013-5490,0,0,474e6e6c65862e6607561d8fc7392c12a44bc57d25b8e8fee472cb853e096aa9,2024-11-21T01:57:34.620000 +CVE-2013-5492,0,0,20c27286ae30bb4d5d98c564fc4e3c438f88a7cb8401c2a5987689a7b63c73cf,2024-11-21T01:57:34.740000 +CVE-2013-5493,0,0,0e6fff04da877a92ab36eceb3dc6d0628f981b380ca2d7595ea46298b34cb2e8,2024-11-21T01:57:34.853000 +CVE-2013-5494,0,0,6ea0e000e59c0764f646551a115dc0a819b5f549479b9f8e2ae5bbede5364b4a,2024-11-21T01:57:34.970000 +CVE-2013-5495,0,0,4670ff0c47dd1cd9b2657d0d4d0e002883536fc1e577a1aebf506fa86f6b897e,2024-11-21T01:57:35.083000 +CVE-2013-5496,0,0,ccd8cf1bcc4b69d230f2989d3b522cb748ff3f240d7e972fed52cfb21f92a9d1,2024-11-21T01:57:35.203000 +CVE-2013-5497,0,0,b596c1f589fdc0d266d9b64b04e89a7a47595f1b5a7a350a75b088f551d1ab8c,2024-11-21T01:57:35.320000 +CVE-2013-5498,0,0,81a8a40300912f66f7dd78bca3593d3d68a61ca813e1ed7e8e7b07c640d59268,2024-11-21T01:57:35.450000 +CVE-2013-5499,0,0,2888c2112dbd99a66d656e60b5b50671627d197ebb9471ca63c35106a0f44b30,2024-11-21T01:57:35.563000 +CVE-2013-5500,0,0,c09149a3e46bc83af5fb619735599ecbb573beb2e6269ffc5409c3ceb67fbf42,2024-11-21T01:57:35.673000 +CVE-2013-5501,0,0,4025cd164f74426ce858c923cb3dcebcb0a2d9ed52b22823ab496bb36390c2a2,2024-11-21T01:57:35.797000 +CVE-2013-5502,0,0,a2e0bde6de5aa73bc284620dfb76c94fa34c8d25dfe2818f7678deb1c58abffb,2024-11-21T01:57:35.913000 +CVE-2013-5503,0,0,0a50fac77d3fd610b506a63c228aa64707c49e5495cd5d92b83ccaa162423ac5,2024-11-21T01:57:36.027000 +CVE-2013-5504,0,0,ca12e8430a822865e30fc9fbb2f0a632f4fe74615be986acba253f0b9ed4132d,2024-11-21T01:57:36.137000 +CVE-2013-5505,0,0,a0abd04eaf062975230c77f3a1c6867fdcc3e7f384911e0dd709c0bcefeccc0b,2024-11-21T01:57:36.257000 +CVE-2013-5506,0,0,d6973b5013f4e38f106782e699275fb2d874eb3e0732b3b42739d9c74ecf34b0,2024-11-21T01:57:36.377000 +CVE-2013-5507,0,0,b4384d88bad45a84347cc1ebf950477163c8d552124ed21d357c4baf1e3ed7f0,2024-11-21T01:57:36.500000 +CVE-2013-5508,0,0,c080d7aad5daf6b456fb9ea9b9ab2c01a55d5bbd5842cef3e918f61f558eb5a1,2024-11-21T01:57:36.610000 +CVE-2013-5509,0,0,98fc685b36f8be84255df23d52ad44332688aeb7c9dcca9ba7d385f38f9fa838,2024-11-21T01:57:36.760000 +CVE-2013-5510,0,0,e266c9823346c606231c61d1ae53ac85d5ab03d80c1248c514da5b921e2dcdf9,2024-11-21T01:57:36.887000 +CVE-2013-5511,0,0,424e1aec623409dba9a5b3345fee786e71edc3fbfe1179326bb0f2e149c6b051,2024-11-21T01:57:37.017000 +CVE-2013-5512,0,0,a173ebeeb26bb3e0d7eb6f0b550e1aeb7f88d0bbe65e545b8af42f208c1a177f,2024-11-21T01:57:37.150000 +CVE-2013-5513,0,0,94b6e2dfebca373f8439b1b5af9edb702e3b377778d5bbb5957e287914e790c9,2024-11-21T01:57:37.270000 +CVE-2013-5515,0,0,71637f56cea992f67575fc8ee752b2b466217c1484e1b7cc6c56b9e92d844222,2024-11-21T01:57:37.407000 +CVE-2013-5516,0,0,b1f661d938ce47d99ada9be130f938f2d526e703adc7f273d2ee37e6f84d52df,2024-11-21T01:57:37.540000 +CVE-2013-5517,0,0,7747b01ddfdc98a29f309c2234640d8257b0630428526b5da6ac70c019f2cae8,2024-11-21T01:57:37.653000 +CVE-2013-5519,0,0,ce83a13bfedb190f780bd9c45a09aa64b6036716cf229dc5126bbd7fb7f08956,2024-11-21T01:57:37.773000 +CVE-2013-5521,0,0,bbc5ac81e4a2f97f2bd4a79c2becdbce34b50face5f0d5fd7b5f56c222c04f92,2024-11-21T01:57:37.903000 +CVE-2013-5522,0,0,a3c425156e6816e80320253242deed86d996f1a3645ddfd379347165e5b3d836,2024-11-21T01:57:38.030000 +CVE-2013-5523,0,0,28498378909b804a5b4b3d74ccdcb8f868a7fb97b76b5ecf4c8f0492538d0711,2024-11-21T01:57:38.150000 +CVE-2013-5524,0,0,c3a64d4f5d4802a34f840bfb69c2f47d38c10ce76dcf1939e9e4fdc24b0bd6c5,2024-11-21T01:57:38.280000 +CVE-2013-5525,0,0,cf07601c7dc555429fc2e83612b475ec4560ae9342179c2734cd54210062d9e3,2024-11-21T01:57:38.407000 +CVE-2013-5526,0,0,7b5d8ed4d34fc054900aa742e6c9dda515ef838a519d9304cab5bed6a5e28703,2024-11-21T01:57:38.527000 +CVE-2013-5527,0,0,caa0ebc4e76523e0120a38531d27332d44b503caf2d53d4dcd6c210e0542579b,2024-11-21T01:57:38.647000 +CVE-2013-5528,0,0,8f7db72e60cf392ca8130d22b38e392ab9d93d3e02cf88e766625376d634a417,2024-11-21T01:57:38.763000 +CVE-2013-5529,0,0,510a460e46fd6a05e92ca8341aea2cb36728bb9d6c39a70bb6f292d644dcb6aa,2024-11-21T01:57:38.880000 +CVE-2013-5530,0,0,aac0a46b076567b4c3db677ff4602f14cbe32df2e054a516ab97e9da19ae4270,2024-11-21T01:57:38.983000 +CVE-2013-5531,0,0,613f189e948c0fae4831140d97b11466a6596d1bfa2d3c8ac938c76e823c7ce6,2024-11-21T01:57:39.097000 +CVE-2013-5532,0,0,b54dbffa40611a6a87c0ca47c803c5f0b5020c94d5dbabdb8dfac6df64aaa574,2024-11-21T01:57:39.200000 +CVE-2013-5533,0,0,7e36e913e9239c91bf7fafc1c4d140ffe6613bba9b2543d069128ba40af2c018,2024-11-21T01:57:39.300000 +CVE-2013-5534,0,0,0f30473dbf0ff2e7a6461ee3142af26e94cd20741da5cbd2e044375264aaf925,2024-11-21T01:57:39.413000 +CVE-2013-5535,0,0,941ac15b721e97b9f0c9d32d94cb5512660265b67e34b402f6fb199fcd3f71e3,2024-11-21T01:57:39.517000 +CVE-2013-5536,0,0,df45d8fe23f3ec03626b36deb44f53979e4d4dff801fbd2d349d34327c74e460,2024-11-21T01:57:39.620000 +CVE-2013-5537,0,0,fb3b42d9939c727312e6809f8676ad88bafd9b192b5f8ab835164597b98bde56,2024-11-21T01:57:39.720000 +CVE-2013-5538,0,0,96a2fb00434dfdd2ba118d519b0928693655b8eb4ec93d0af26d66942e3c4543,2024-11-21T01:57:39.823000 +CVE-2013-5539,0,0,0831e534aa43e71277ee0c52bad4b1eef3047afea6396c133fd25e2f554d15dd,2024-11-21T01:57:39.937000 +CVE-2013-5540,0,0,a1a0093b8f79954776acd7bcc28d6b1d898e509160302270605ae582b0046454,2024-11-21T01:57:40.047000 +CVE-2013-5541,0,0,5d6bf5dea8f79e229eeb1f0f9bf6692c9fa2a770573e75faddc3a530e917772f,2024-11-21T01:57:40.157000 +CVE-2013-5542,0,0,1e12124edca9517b699210dd4607132798b661319d8835d39dac73dccbf37e8d,2024-11-21T01:57:40.270000 +CVE-2013-5543,0,0,c0897b221177ccaadc89a6ef49f533e31a9aef41448a4d17e70f5f57a2989df8,2024-11-21T01:57:40.387000 +CVE-2013-5544,0,0,6e6a36e49bb72c5ee34c5aec2a48d391e277d8cb9dd1c6ea8ff071d949716b90,2024-11-21T01:57:40.500000 +CVE-2013-5545,0,0,8945369f6046fe8f77b3c03d8fe59a0f5c14f79f7b8d224c08ffa54bc5a88045,2024-11-21T01:57:40.607000 +CVE-2013-5546,0,0,ebb504821bf5f975e57053bdfd6ff77707e0ce7acd3ff0c6804e2579520d4df1,2024-11-21T01:57:40.717000 +CVE-2013-5547,0,0,1e4dec551e262fc41d96203a04f7a134e1fe0ccbc4eb1946ac7558ac504c787b,2024-11-21T01:57:40.837000 +CVE-2013-5548,0,0,dccbc72ef6cf4d0ba18375d483ff81658ca035b5a75cca6dbc104a0bed241aca,2024-11-21T01:57:40.947000 +CVE-2013-5549,0,0,c4c280e4b4198249dc8ffcb4eaf3e85aab860010138c927c7802f87eb45b6004,2024-11-21T01:57:41.060000 +CVE-2013-5550,0,0,ecabf7287c961c5f2e8cf13ab6d52b54a4a132576316c58c6d2e9ac9b7cf4d95,2024-11-21T01:57:41.170000 +CVE-2013-5551,0,0,5dceebb19bc833e453a704d43167738839574af083a5fba03051937aa12617ca,2024-11-21T01:57:41.283000 +CVE-2013-5552,0,0,0de1d548ca8b52b64df3014409b92f9df9ee0e243abe19013873525b88df0e0b,2024-11-21T01:57:41.387000 +CVE-2013-5553,0,0,641ea0d79077f92b891e6620a48381331701d5895a1ab0926138d0466a96cdde,2024-11-21T01:57:41.513000 +CVE-2013-5554,0,0,8b01fe85397aa35400c85b56d0aaf23be59f0174740d54d6ace0ea2790098a1e,2024-11-21T01:57:41.617000 +CVE-2013-5555,0,0,4da77672bc676acb86e5638e10ccd5cdaab2b64b6e03b629712da2875ea5d376,2024-11-21T01:57:41.730000 +CVE-2013-5556,0,0,89ae0a20610a7ea909e431dae00fabd4145f5b86a75aec3c57f49a3fdad4676e,2024-11-21T01:57:41.837000 CVE-2013-5557,0,0,d4849e934d3180a634abda10ce7bc60b0248619d35116dc97af9816bd9bc32ef,2022-06-02T15:48:10.330000 -CVE-2013-5558,0,1,f1dc457575391e7d29ae23ca43e4c85ebbffafed979f96f25379057b0e0fb711,2024-11-21T01:57:42.070000 -CVE-2013-5559,0,1,d4ff013c47ccab1234bda52861896cc3305898ec5fe4f32871ee50eaf7f03ffc,2024-11-21T01:57:42.177000 -CVE-2013-5560,0,1,58075faf5c27184f6b30c20078835539faa680d02234f1e891b16d4ae322fc55,2024-11-21T01:57:42.330000 -CVE-2013-5561,0,1,97554f9d1a4c43dd610297bdfa66c8b1151eb28900faa12cdf19780cf4851c0b,2024-11-21T01:57:42.470000 -CVE-2013-5562,0,1,3891f75ce9bccb32fc53b0791442f0eb0bc08dd2d897109b10b8c2574d429dcd,2024-11-21T01:57:42.570000 -CVE-2013-5563,0,1,ef0f2cb36753d5fc323f26357b288df23b98d9125bd20024cabf74dbe9324205,2024-11-21T01:57:42.673000 -CVE-2013-5564,0,1,f5ce29c481fd8477a4f1cb9c5f79402d20515073da6baccbea5cfa24aed2efa0,2024-11-21T01:57:42.783000 -CVE-2013-5565,0,1,aea36982de58bf48e45af40c2e6ded3076d6906464b6e9746ecb973c1cc34f0c,2024-11-21T01:57:42.890000 -CVE-2013-5566,0,1,cec9d0f341b565eb1f2b9dda03ce3e945eb3094e643addfd9451e94301af0190,2024-11-21T01:57:42.993000 +CVE-2013-5558,0,0,f1dc457575391e7d29ae23ca43e4c85ebbffafed979f96f25379057b0e0fb711,2024-11-21T01:57:42.070000 +CVE-2013-5559,0,0,d4ff013c47ccab1234bda52861896cc3305898ec5fe4f32871ee50eaf7f03ffc,2024-11-21T01:57:42.177000 +CVE-2013-5560,0,0,58075faf5c27184f6b30c20078835539faa680d02234f1e891b16d4ae322fc55,2024-11-21T01:57:42.330000 +CVE-2013-5561,0,0,97554f9d1a4c43dd610297bdfa66c8b1151eb28900faa12cdf19780cf4851c0b,2024-11-21T01:57:42.470000 +CVE-2013-5562,0,0,3891f75ce9bccb32fc53b0791442f0eb0bc08dd2d897109b10b8c2574d429dcd,2024-11-21T01:57:42.570000 +CVE-2013-5563,0,0,ef0f2cb36753d5fc323f26357b288df23b98d9125bd20024cabf74dbe9324205,2024-11-21T01:57:42.673000 +CVE-2013-5564,0,0,f5ce29c481fd8477a4f1cb9c5f79402d20515073da6baccbea5cfa24aed2efa0,2024-11-21T01:57:42.783000 +CVE-2013-5565,0,0,aea36982de58bf48e45af40c2e6ded3076d6906464b6e9746ecb973c1cc34f0c,2024-11-21T01:57:42.890000 +CVE-2013-5566,0,0,cec9d0f341b565eb1f2b9dda03ce3e945eb3094e643addfd9451e94301af0190,2024-11-21T01:57:42.993000 CVE-2013-5567,0,0,c3f7d3e668791c015e3539feb9fa6fdf43c557c92ea8a25eaf3095e88100b63d,2022-06-02T15:48:48.197000 -CVE-2013-5568,0,1,f87faa0d5a950b99691c16f8a76dd695216cc957e66a8a1c59747a5ae7283614,2024-11-21T01:57:43.267000 -CVE-2013-5569,0,1,ebfb1aa2412c9b19f4f6abf8b55a7e7652b82b3565794e86976fe3041597c110,2024-11-21T01:57:43.407000 -CVE-2013-5570,0,1,89a71abf64e288818ae53c286c80ec5e213dc63dd7ee32b96da2b1fac2c94979,2024-11-21T01:57:43.550000 +CVE-2013-5568,0,0,f87faa0d5a950b99691c16f8a76dd695216cc957e66a8a1c59747a5ae7283614,2024-11-21T01:57:43.267000 +CVE-2013-5569,0,0,ebfb1aa2412c9b19f4f6abf8b55a7e7652b82b3565794e86976fe3041597c110,2024-11-21T01:57:43.407000 +CVE-2013-5570,0,0,89a71abf64e288818ae53c286c80ec5e213dc63dd7ee32b96da2b1fac2c94979,2024-11-21T01:57:43.550000 CVE-2013-5571,0,0,ce30626f443d6fcfa73cb5b19167951ea8c31e066bd6c5a098d46bbc5bd29d55,2020-01-08T16:47:48.937000 -CVE-2013-5572,0,1,a782c2e835b00d1e7b448ef7cc357d5edfc07b66c0ec73a67ce61f919f25d2a7,2024-11-21T01:57:43.840000 -CVE-2013-5573,0,1,d43b3cea21bba561caa3ddb8c965f0435f9d6169a63d31ca44cc46c5fcfc8f7a,2024-11-21T01:57:43.987000 +CVE-2013-5572,0,0,a782c2e835b00d1e7b448ef7cc357d5edfc07b66c0ec73a67ce61f919f25d2a7,2024-11-21T01:57:43.840000 +CVE-2013-5573,0,0,d43b3cea21bba561caa3ddb8c965f0435f9d6169a63d31ca44cc46c5fcfc8f7a,2024-11-21T01:57:43.987000 CVE-2013-5575,0,0,3351c8fc3bc4752424d5a114f9af3d2233ac108f551cebd8b7b9b0f22f29ef0c,2023-11-07T02:16:43.293000 -CVE-2013-5576,0,1,c25498d6dfeb17fb85b8d06b0017d05d44b44f1eebd232160163d2668f2a51f6,2024-11-21T01:57:44.150000 -CVE-2013-5578,0,1,b9903519f1f2f5682d6afa2d3db8cdbca663262d88379a6c3325163f731fa629,2024-11-21T01:57:44.303000 -CVE-2013-5580,0,1,8215b4fe578b6752989aa495e5ea5dce8cee8a985bb2956738dbda129c1cfab4,2024-11-21T01:57:44.440000 +CVE-2013-5576,0,0,c25498d6dfeb17fb85b8d06b0017d05d44b44f1eebd232160163d2668f2a51f6,2024-11-21T01:57:44.150000 +CVE-2013-5578,0,0,b9903519f1f2f5682d6afa2d3db8cdbca663262d88379a6c3325163f731fa629,2024-11-21T01:57:44.303000 +CVE-2013-5580,0,0,8215b4fe578b6752989aa495e5ea5dce8cee8a985bb2956738dbda129c1cfab4,2024-11-21T01:57:44.440000 CVE-2013-5581,0,0,10c71293714ba8a64154bd446836147d1aa0a96d7e00346d42d23d90355e86ee,2023-11-07T02:16:43.427000 CVE-2013-5582,0,0,3c521694a47b4fc0b5d7c71f7a629fa396761009c37fa2838861f5730fb3b2f5,2020-02-18T19:15:07.037000 -CVE-2013-5583,0,1,f120061634552656fbf0700fe93b4db82c4f699d456653c672e1c56a3f94dc96,2024-11-21T01:57:44.730000 -CVE-2013-5586,0,1,54efdb9ecdd81b36fa44f3637483b15d8010b27378a6895e948eca4684cd400a,2024-11-21T01:57:44.873000 -CVE-2013-5587,0,1,2aabf27532321c614df34afe9270d3951819c90c570d26fdc67e4afa1ba8fbcf,2024-11-21T01:57:45.030000 -CVE-2013-5588,0,1,38c2a9489fb489ae7cdb66dd6d2d90bf300ab66bff6b0457a4dbf028a784f264,2024-11-21T01:57:45.177000 -CVE-2013-5589,0,1,66226d1d53111fcf2eb0efba05ab07139cb6b5db5f9eb195782855deb11a808f,2024-11-21T01:57:45.283000 -CVE-2013-5590,0,1,f562b2dbfea2f38dcac161f225fd17cc3917a94df5916210b3736af71bd14f86,2024-11-21T01:57:45.407000 -CVE-2013-5591,0,1,6f39aaac09164cf9b5da06ff897898550cf8ec02dc9da97f8f59eb5d765fc75d,2024-11-21T01:57:45.560000 -CVE-2013-5592,0,1,ceaa02385cc6641c82d3e58a60e38a27d25a664639ccff2b87e214b40843d37d,2024-11-21T01:57:45.693000 -CVE-2013-5593,0,1,17fb0255804ada18c6c594b310afe45d664dec702bb4b9e2f2a1b4c015302d46,2024-11-21T01:57:45.803000 +CVE-2013-5583,0,0,f120061634552656fbf0700fe93b4db82c4f699d456653c672e1c56a3f94dc96,2024-11-21T01:57:44.730000 +CVE-2013-5586,0,0,54efdb9ecdd81b36fa44f3637483b15d8010b27378a6895e948eca4684cd400a,2024-11-21T01:57:44.873000 +CVE-2013-5587,0,0,2aabf27532321c614df34afe9270d3951819c90c570d26fdc67e4afa1ba8fbcf,2024-11-21T01:57:45.030000 +CVE-2013-5588,0,0,38c2a9489fb489ae7cdb66dd6d2d90bf300ab66bff6b0457a4dbf028a784f264,2024-11-21T01:57:45.177000 +CVE-2013-5589,0,0,66226d1d53111fcf2eb0efba05ab07139cb6b5db5f9eb195782855deb11a808f,2024-11-21T01:57:45.283000 +CVE-2013-5590,0,0,f562b2dbfea2f38dcac161f225fd17cc3917a94df5916210b3736af71bd14f86,2024-11-21T01:57:45.407000 +CVE-2013-5591,0,0,6f39aaac09164cf9b5da06ff897898550cf8ec02dc9da97f8f59eb5d765fc75d,2024-11-21T01:57:45.560000 +CVE-2013-5592,0,0,ceaa02385cc6641c82d3e58a60e38a27d25a664639ccff2b87e214b40843d37d,2024-11-21T01:57:45.693000 +CVE-2013-5593,0,0,17fb0255804ada18c6c594b310afe45d664dec702bb4b9e2f2a1b4c015302d46,2024-11-21T01:57:45.803000 CVE-2013-5594,0,0,8277c9dfce3704df16865be04898189a7bf834ff9b5bbaa70ad0b133fca3b93d,2020-02-28T00:57:54.937000 -CVE-2013-5595,0,1,8961ad9a60af2aca32fed8304b7fe3c4c22c285e7be0a0d1a8a1dee84738945a,2024-11-21T01:57:46.040000 -CVE-2013-5596,0,1,13ed33509cca1c1079570415b1d8682cf2e9534e79aae58d88dfe56b611aedea,2024-11-21T01:57:46.177000 -CVE-2013-5597,0,1,27c532bb7be23d4980f58fde6d6fce3efa8799627ea564bb6fa9f00d16467e7e,2024-11-21T01:57:46.307000 -CVE-2013-5598,0,1,b94f3df0b354435444b3696db86f09a2f021a394122913bc2a483e0d2b8b37b6,2024-11-21T01:57:46.450000 -CVE-2013-5599,0,1,5e566fe23def65d37da0a7e1748394c0d52569c5c225086f8d15708bb288b075,2024-11-21T01:57:46.563000 -CVE-2013-5600,0,1,99de57c7efb274057d9d192c7ac75ebccf5590b7051316780e08c9bb2157c1d8,2024-11-21T01:57:46.707000 -CVE-2013-5601,0,1,98d9222d0bcc5d7b35b02de380458c898b5777654d4a42d30dc49aae6f99a3ff,2024-11-21T01:57:46.853000 -CVE-2013-5602,0,1,da8bfd2e5a0a2bc4d24257b56872c4e2681e304b2482fc9e5d993a9401ec73f5,2024-11-21T01:57:46.997000 -CVE-2013-5603,0,1,043f665fb9b62db603b78644421debe45ee2cff08486d14c6a24eb50c49f79ce,2024-11-21T01:57:47.147000 -CVE-2013-5604,0,1,a1a035ea198966840c0203f25fa15ba063b9c5d07631b040c8a00964a6d39396,2024-11-21T01:57:47.287000 -CVE-2013-5605,0,1,1e148d588a57fbd4dfa26dc290bf9d67d384c485b38bb8b931d4be82bd148fb8,2024-11-21T01:57:47.440000 -CVE-2013-5606,0,1,411333431b42893dc256d982333ce530c7eff73cc61b28f42902788e04404885,2024-11-21T01:57:47.740000 -CVE-2013-5607,0,1,6acfc7235cd1c917a5bd69726e1d3266ae2e23f2fa1faca488c91e199a899487,2024-11-21T01:57:47.913000 -CVE-2013-5609,0,1,547b38093d6181950f6bce4d832e2f9116fc6a14c29561bd4bb7a75e83e4ff1d,2024-11-21T01:57:48.073000 -CVE-2013-5610,0,1,fff7306e21de121da76646d5bf156d090ffc0663baa6e34c20d26fc13fa62b4a,2024-11-21T01:57:48.310000 -CVE-2013-5611,0,1,d7d6d743c3b1a1e5e7f2f1f674a2a3d91fe59500e972aea0f05c96b863a17cc8,2024-11-21T01:57:49.260000 -CVE-2013-5612,0,1,253574b76fa20ff41e4552785196bfe322923f6a64a07b3e8756eca5c7a1cde2,2024-11-21T01:57:49.457000 -CVE-2013-5613,0,1,7568cf7eec1f2fa7bf4a1ccb5b1a35afc59f40266eec8cfec19878ba00049793,2024-11-21T01:57:49.630000 -CVE-2013-5614,0,1,ffba9528ef3d7d3cb7a78c35bb02d3b6a0fdbffaa8c0d724d18d38a047deefbc,2024-11-21T01:57:49.817000 -CVE-2013-5615,0,1,10269b902512fd366210acc208996a5c49b5f2a86aaa719f1302583d20860b7b,2024-11-21T01:57:49.983000 -CVE-2013-5616,0,1,c38c4b81ea08dab53b270a104fca09dfd7606d2e72033a3e0cea0eb208c4fb49,2024-11-21T01:57:50.157000 -CVE-2013-5618,0,1,aa167b0e0e36b54b3868806307f8299f9f07a1f616f0987ea60dd85e247c7161,2024-11-21T01:57:50.340000 -CVE-2013-5619,0,1,d5919dd32409aa5ec35fe30320d8c83cd2630fd7b19e83a4574fabda97e1367f,2024-11-21T01:57:50.520000 +CVE-2013-5595,0,0,8961ad9a60af2aca32fed8304b7fe3c4c22c285e7be0a0d1a8a1dee84738945a,2024-11-21T01:57:46.040000 +CVE-2013-5596,0,0,13ed33509cca1c1079570415b1d8682cf2e9534e79aae58d88dfe56b611aedea,2024-11-21T01:57:46.177000 +CVE-2013-5597,0,0,27c532bb7be23d4980f58fde6d6fce3efa8799627ea564bb6fa9f00d16467e7e,2024-11-21T01:57:46.307000 +CVE-2013-5598,0,0,b94f3df0b354435444b3696db86f09a2f021a394122913bc2a483e0d2b8b37b6,2024-11-21T01:57:46.450000 +CVE-2013-5599,0,0,5e566fe23def65d37da0a7e1748394c0d52569c5c225086f8d15708bb288b075,2024-11-21T01:57:46.563000 +CVE-2013-5600,0,0,99de57c7efb274057d9d192c7ac75ebccf5590b7051316780e08c9bb2157c1d8,2024-11-21T01:57:46.707000 +CVE-2013-5601,0,0,98d9222d0bcc5d7b35b02de380458c898b5777654d4a42d30dc49aae6f99a3ff,2024-11-21T01:57:46.853000 +CVE-2013-5602,0,0,da8bfd2e5a0a2bc4d24257b56872c4e2681e304b2482fc9e5d993a9401ec73f5,2024-11-21T01:57:46.997000 +CVE-2013-5603,0,0,043f665fb9b62db603b78644421debe45ee2cff08486d14c6a24eb50c49f79ce,2024-11-21T01:57:47.147000 +CVE-2013-5604,0,0,a1a035ea198966840c0203f25fa15ba063b9c5d07631b040c8a00964a6d39396,2024-11-21T01:57:47.287000 +CVE-2013-5605,0,0,1e148d588a57fbd4dfa26dc290bf9d67d384c485b38bb8b931d4be82bd148fb8,2024-11-21T01:57:47.440000 +CVE-2013-5606,0,0,411333431b42893dc256d982333ce530c7eff73cc61b28f42902788e04404885,2024-11-21T01:57:47.740000 +CVE-2013-5607,0,0,6acfc7235cd1c917a5bd69726e1d3266ae2e23f2fa1faca488c91e199a899487,2024-11-21T01:57:47.913000 +CVE-2013-5609,0,0,547b38093d6181950f6bce4d832e2f9116fc6a14c29561bd4bb7a75e83e4ff1d,2024-11-21T01:57:48.073000 +CVE-2013-5610,0,0,fff7306e21de121da76646d5bf156d090ffc0663baa6e34c20d26fc13fa62b4a,2024-11-21T01:57:48.310000 +CVE-2013-5611,0,0,d7d6d743c3b1a1e5e7f2f1f674a2a3d91fe59500e972aea0f05c96b863a17cc8,2024-11-21T01:57:49.260000 +CVE-2013-5612,0,0,253574b76fa20ff41e4552785196bfe322923f6a64a07b3e8756eca5c7a1cde2,2024-11-21T01:57:49.457000 +CVE-2013-5613,0,0,7568cf7eec1f2fa7bf4a1ccb5b1a35afc59f40266eec8cfec19878ba00049793,2024-11-21T01:57:49.630000 +CVE-2013-5614,0,0,ffba9528ef3d7d3cb7a78c35bb02d3b6a0fdbffaa8c0d724d18d38a047deefbc,2024-11-21T01:57:49.817000 +CVE-2013-5615,0,0,10269b902512fd366210acc208996a5c49b5f2a86aaa719f1302583d20860b7b,2024-11-21T01:57:49.983000 +CVE-2013-5616,0,0,c38c4b81ea08dab53b270a104fca09dfd7606d2e72033a3e0cea0eb208c4fb49,2024-11-21T01:57:50.157000 +CVE-2013-5618,0,0,aa167b0e0e36b54b3868806307f8299f9f07a1f616f0987ea60dd85e247c7161,2024-11-21T01:57:50.340000 +CVE-2013-5619,0,0,d5919dd32409aa5ec35fe30320d8c83cd2630fd7b19e83a4574fabda97e1367f,2024-11-21T01:57:50.520000 CVE-2013-5620,0,0,608c6d84236ecde8d8be6b87e70c1d8cc3335053218fb0e9027a2ee4db27769b,2023-11-07T02:16:43.840000 CVE-2013-5621,0,0,cc6890cde16fd4378939e392c2f7a7d7ead869f0e2ec419aaac244ae07bb6a45,2023-11-07T02:16:43.870000 CVE-2013-5622,0,0,19d39940e65c19edf7f3a7e90a750906a0944fe25dd41eac5a5b222dadc663ee,2023-11-07T02:16:43.903000 @@ -62883,384 +62883,384 @@ CVE-2013-5630,0,0,753ac200caf56529226461dc75b7cfdf5fc955d6512bf78ee4cedfd707e09e CVE-2013-5631,0,0,595ba7acdffca8c1808c70ef3be7c95deee1cdd5129838675de862482f044012,2023-11-07T02:16:44.170000 CVE-2013-5632,0,0,f21129ccc11c0cf6b7b02a34a6162f390fa82d583109d2cae4d9a9df6c580b42,2023-11-07T02:16:44.200000 CVE-2013-5633,0,0,791981aaffd455abb5b9c7e7301f5d0a18195bbe18edba27d741a12f661714e9,2023-11-07T02:16:44.227000 -CVE-2013-5634,0,1,b428b62765aa53eb9328963b0f8d0b208bc1c46b7b07cb8f90f3b02209c90d6b,2024-11-21T01:57:50.990000 -CVE-2013-5635,0,1,23ed1c4b790d535703add481c4e20fdccf3d6436ec8994943d75c1652fd35823,2024-11-21T01:57:51.093000 -CVE-2013-5636,0,1,18d0df6eba0441e918c8c2f3650e0dab1084dbbf57206606468caec9f8b169ac,2024-11-21T01:57:51.230000 +CVE-2013-5634,0,0,b428b62765aa53eb9328963b0f8d0b208bc1c46b7b07cb8f90f3b02209c90d6b,2024-11-21T01:57:50.990000 +CVE-2013-5635,0,0,23ed1c4b790d535703add481c4e20fdccf3d6436ec8994943d75c1652fd35823,2024-11-21T01:57:51.093000 +CVE-2013-5636,0,0,18d0df6eba0441e918c8c2f3650e0dab1084dbbf57206606468caec9f8b169ac,2024-11-21T01:57:51.230000 CVE-2013-5637,0,0,30eeffaf919bed800d23c7dc5c01578688f8ddf7be99e1da4e0ed5f519c94947,2020-01-08T01:33:40.893000 CVE-2013-5638,0,0,350f392f32cf1d3bf46e6212871c4d7633894976f450c73eb898671a790f6ab7,2020-01-08T01:25:07.450000 -CVE-2013-5639,0,1,3c6414a0cb59e157ee0f25fb1be5f0de1f945a21a83cb15b9e009ca471ad972e,2024-11-21T01:57:51.623000 -CVE-2013-5640,0,1,9d55aedbc74cbd30573e8580138c23c464c82962a00056737fc989a231f4b706,2024-11-21T01:57:51.767000 -CVE-2013-5641,0,1,43756fa02820628c75dbf70b1b1533b65e71e2e96a7445b98341f9850823d643,2024-11-21T01:57:51.903000 -CVE-2013-5642,0,1,35f460358cf159736633e6cd8b39945b62f5624255878f0f083b390e69c217b7,2024-11-21T01:57:52.070000 +CVE-2013-5639,0,0,3c6414a0cb59e157ee0f25fb1be5f0de1f945a21a83cb15b9e009ca471ad972e,2024-11-21T01:57:51.623000 +CVE-2013-5640,0,0,9d55aedbc74cbd30573e8580138c23c464c82962a00056737fc989a231f4b706,2024-11-21T01:57:51.767000 +CVE-2013-5641,0,0,43756fa02820628c75dbf70b1b1533b65e71e2e96a7445b98341f9850823d643,2024-11-21T01:57:51.903000 +CVE-2013-5642,0,0,35f460358cf159736633e6cd8b39945b62f5624255878f0f083b390e69c217b7,2024-11-21T01:57:52.070000 CVE-2013-5643,0,0,ce7fe6390d4e682cd037fa10796bb43eaa0b04ec003cd91fea75fd54c2cc61c3,2023-11-07T02:16:44.420000 -CVE-2013-5645,0,1,b3dab34f14e4b1482d081821800994feb3b4fa5ca3f5c276e738d43bec5e134b,2024-11-21T01:57:52.250000 -CVE-2013-5646,0,1,f62654552f7d49f755bf633fec92eb3f550070d35f2371a4d7da707ad3fee6a0,2024-11-21T01:57:52.403000 -CVE-2013-5647,0,1,ec7579f2a5c2fbadc0506672bc154bb485989ad0a61bf329e586aa479df388d1,2024-11-21T01:57:52.540000 -CVE-2013-5648,0,1,fbf2e535dfb081b70424462215f9303d584ffcb2ebedd8dfc1a6b7077c747820,2024-11-21T01:57:52.673000 -CVE-2013-5649,0,1,dafca15afb5de1d25b9d9e861b247d14ae24f9432f530ef1b2e5db7aa173bd00,2024-11-21T01:57:52.807000 -CVE-2013-5650,0,1,341e3eb86f9366b1e0b1bb41dea298955e18820fa2e11519f99adba56fc37126,2024-11-21T01:57:52.937000 -CVE-2013-5651,0,1,afaf8fd3f2b8106430b777dd5939cedb552c6fd8159b4eecdc8a7da64044dd74,2024-11-21T01:57:53.073000 +CVE-2013-5645,0,0,b3dab34f14e4b1482d081821800994feb3b4fa5ca3f5c276e738d43bec5e134b,2024-11-21T01:57:52.250000 +CVE-2013-5646,0,0,f62654552f7d49f755bf633fec92eb3f550070d35f2371a4d7da707ad3fee6a0,2024-11-21T01:57:52.403000 +CVE-2013-5647,0,0,ec7579f2a5c2fbadc0506672bc154bb485989ad0a61bf329e586aa479df388d1,2024-11-21T01:57:52.540000 +CVE-2013-5648,0,0,fbf2e535dfb081b70424462215f9303d584ffcb2ebedd8dfc1a6b7077c747820,2024-11-21T01:57:52.673000 +CVE-2013-5649,0,0,dafca15afb5de1d25b9d9e861b247d14ae24f9432f530ef1b2e5db7aa173bd00,2024-11-21T01:57:52.807000 +CVE-2013-5650,0,0,341e3eb86f9366b1e0b1bb41dea298955e18820fa2e11519f99adba56fc37126,2024-11-21T01:57:52.937000 +CVE-2013-5651,0,0,afaf8fd3f2b8106430b777dd5939cedb552c6fd8159b4eecdc8a7da64044dd74,2024-11-21T01:57:53.073000 CVE-2013-5653,0,0,2f20dca62e68b30c38974abcd022130abad6299b7f13b2f3244b07b0884c2bb2,2018-01-05T02:29:38.867000 CVE-2013-5654,0,0,57bc446e080573ce0f881dc3210504fb2d0b1d3675be07b8c31cef0d91a2435f,2019-02-21T17:15:54.697000 -CVE-2013-5655,0,1,a1b2ef008cecec6a67e6f0c6a82ecce0f5d85a070eba90dea1bb88d195cf971a,2024-11-21T01:57:53.510000 +CVE-2013-5655,0,0,a1b2ef008cecec6a67e6f0c6a82ecce0f5d85a070eba90dea1bb88d195cf971a,2024-11-21T01:57:53.510000 CVE-2013-5656,0,0,c8835e8b8f9d78240dbe12f0c973c4b64a3aa9cef6f07a656b285b9d1aad84b3,2020-01-08T21:53:53.017000 CVE-2013-5657,0,0,35ebd2491278d65180d713ed4557cd3340834dc1fea4521aa609a218c31c80f2,2020-01-08T01:18:46.277000 CVE-2013-5658,0,0,ca6ed44350f1cb9c6e8e9f284f87dc4b4968803fd522d3f02858b5e0faf29fc8,2020-01-08T01:17:06.457000 CVE-2013-5659,0,0,ff685123294e031c0bd6f9000df9cd8f0769b96adf7513b4b34fb318eecbc035,2020-01-31T15:43:13.863000 -CVE-2013-5660,0,1,af38130a3a92cf229f054c69440c3206df011d48018184a9eb0c0c8a23d2b62d,2024-11-21T01:57:54.187000 +CVE-2013-5660,0,0,af38130a3a92cf229f054c69440c3206df011d48018184a9eb0c0c8a23d2b62d,2024-11-21T01:57:54.187000 CVE-2013-5661,0,0,930ead88336edb6cdbf8b2a2a3444a10eed6db9635c1efa706ed68b0e1a7a4f3,2019-11-08T19:04:22.007000 -CVE-2013-5663,0,1,7c366e85c767db43fc7c9c640e577c275e3c5f3be810f5be45dea71c68d7c3bf,2024-11-21T01:57:54.450000 -CVE-2013-5664,0,1,74cbf68455d02c5f36992f8ada9bcc68dd97d2af8f330af667f2bd4fea6ffc4f,2024-11-21T01:57:54.580000 -CVE-2013-5666,0,1,30c9f014474d9d04d7c20b27d886a0653e87755ccdf8b6fc66f55e8ed37aa11a,2024-11-21T01:57:54.710000 -CVE-2013-5667,0,1,a6874fdb46893995eed02a63c9276284deda5c6cb7b80e2d1c200a8b8220f81f,2024-11-21T01:57:54.843000 -CVE-2013-5668,0,1,a3747636993c524a1e140f381cc06071f2a7f1a8a1fa032a742733bbf7af7288,2024-11-21T01:57:54.970000 -CVE-2013-5669,0,1,3562b8d612045fc040a303831111f6b7ce7d9be2619b523da8d5354bdee3bd71,2024-11-21T01:57:55.100000 -CVE-2013-5670,0,1,6d3a7667e96f085e72f436c7469b3f144fa2493e99281c158799ab24cfdd4918,2024-11-21T01:57:55.233000 -CVE-2013-5671,0,1,2358ddbc9016104b219277f34d7db92a37a513200e4684d310c1da97e438f5fe,2024-11-21T01:57:55.377000 -CVE-2013-5672,0,1,e7937d0dab58905ed05af02321bc7ba584483b1d52c7c4037824514c9e69ce2e,2024-11-21T01:57:55.517000 -CVE-2013-5673,0,1,60523978dbd74b48dad60dcfb806714421ce89133ff93517fead763b7ba1de00,2024-11-21T01:57:55.667000 -CVE-2013-5674,0,1,4913e998f512ad720ebd8cc7197a82623d518ac9d4c54632d912faf23856dd4a,2024-11-21T01:57:55.800000 -CVE-2013-5676,0,1,d6aa7b39637d3f3aeb9ebaa8b430d57767f881cb7aed53ead8014835af797b9a,2024-11-21T01:57:55.933000 -CVE-2013-5679,0,1,396557285391e2b84426f7bae3f3f99fe966e44de72fa9123425a33e427e3f20,2024-11-21T01:57:56.057000 -CVE-2013-5680,0,1,7d20e8ab302d11d167c487c7e4cde5103f7ed18a27fec223db154e75b81aa660,2024-11-21T01:57:56.187000 +CVE-2013-5663,0,0,7c366e85c767db43fc7c9c640e577c275e3c5f3be810f5be45dea71c68d7c3bf,2024-11-21T01:57:54.450000 +CVE-2013-5664,0,0,74cbf68455d02c5f36992f8ada9bcc68dd97d2af8f330af667f2bd4fea6ffc4f,2024-11-21T01:57:54.580000 +CVE-2013-5666,0,0,30c9f014474d9d04d7c20b27d886a0653e87755ccdf8b6fc66f55e8ed37aa11a,2024-11-21T01:57:54.710000 +CVE-2013-5667,0,0,a6874fdb46893995eed02a63c9276284deda5c6cb7b80e2d1c200a8b8220f81f,2024-11-21T01:57:54.843000 +CVE-2013-5668,0,0,a3747636993c524a1e140f381cc06071f2a7f1a8a1fa032a742733bbf7af7288,2024-11-21T01:57:54.970000 +CVE-2013-5669,0,0,3562b8d612045fc040a303831111f6b7ce7d9be2619b523da8d5354bdee3bd71,2024-11-21T01:57:55.100000 +CVE-2013-5670,0,0,6d3a7667e96f085e72f436c7469b3f144fa2493e99281c158799ab24cfdd4918,2024-11-21T01:57:55.233000 +CVE-2013-5671,0,0,2358ddbc9016104b219277f34d7db92a37a513200e4684d310c1da97e438f5fe,2024-11-21T01:57:55.377000 +CVE-2013-5672,0,0,e7937d0dab58905ed05af02321bc7ba584483b1d52c7c4037824514c9e69ce2e,2024-11-21T01:57:55.517000 +CVE-2013-5673,0,0,60523978dbd74b48dad60dcfb806714421ce89133ff93517fead763b7ba1de00,2024-11-21T01:57:55.667000 +CVE-2013-5674,0,0,4913e998f512ad720ebd8cc7197a82623d518ac9d4c54632d912faf23856dd4a,2024-11-21T01:57:55.800000 +CVE-2013-5676,0,0,d6aa7b39637d3f3aeb9ebaa8b430d57767f881cb7aed53ead8014835af797b9a,2024-11-21T01:57:55.933000 +CVE-2013-5679,0,0,396557285391e2b84426f7bae3f3f99fe966e44de72fa9123425a33e427e3f20,2024-11-21T01:57:56.057000 +CVE-2013-5680,0,0,7d20e8ab302d11d167c487c7e4cde5103f7ed18a27fec223db154e75b81aa660,2024-11-21T01:57:56.187000 CVE-2013-5683,0,0,2794f325e7c2d1c1352aa17066078ad6271a50212c4bed90c73bb2c8d5d2dc0a,2023-11-07T02:16:44.863000 CVE-2013-5687,0,0,5dc06ff21a16282d0e4c7994f100cb1e17f332042f179f0bc4be9683d9cd0bed,2020-02-20T20:01:25.583000 -CVE-2013-5688,0,1,dc48e61cb177c63d7c30ec155a775b260b4ad6fb45f8ba853384c6e102062c07,2024-11-21T01:57:56.470000 +CVE-2013-5688,0,0,dc48e61cb177c63d7c30ec155a775b260b4ad6fb45f8ba853384c6e102062c07,2024-11-21T01:57:56.470000 CVE-2013-5689,0,0,364918c53520119e1425805367b7be8b8e2e33463a52eac0284dcf59639f5cda,2023-11-07T02:16:45.123000 -CVE-2013-5690,0,1,d7b7e18f6321548771a0e0f5b1cff8579ae9a09bc4607300d2eb91864261d346,2024-11-21T01:57:56.620000 -CVE-2013-5691,0,1,fba348f028d05fc05bf084dc86f5abee6f1ee145375783f76f1ac8d1d6364300,2024-11-21T01:57:56.740000 -CVE-2013-5692,0,1,bcd4eca74149f741174f2ba8cf905a7fb2a84a68d7ebe35afb0ec5a17e853c49,2024-11-21T01:57:56.870000 -CVE-2013-5693,0,1,662fa88dda5764f82ea8b4e2c9b1a288b33fd3f27cd86c0cd54dc4bcdd0255d4,2024-11-21T01:57:57 -CVE-2013-5694,0,1,a3befb6cebdcb0a98c580d8e9dcf80f0772fbd0dce072d47e8ff8c4b329bddbe,2024-11-21T01:57:57.133000 -CVE-2013-5695,0,1,76bc4d9c76193b95458be1d5498d4ce9b77a619372ce2696ad0c7ed99f4205b2,2024-11-21T01:57:57.270000 -CVE-2013-5696,0,1,07fde1332944cfb83c8c44375402ecaccd0504c8021ef0d46d4c62f71370f3df,2024-11-21T01:57:57.397000 -CVE-2013-5697,0,1,64e952f2d10c45f1a77fc1f0100e7a3812d98e1cc15f90fb5990416cb3a4d0c6,2024-11-21T01:57:57.540000 -CVE-2013-5698,0,1,a0acf2787264fa9edaead3c390cd50c1f01ea75aa44ffdedcd14a176dcdfaf48,2024-11-21T01:57:57.670000 -CVE-2013-5700,0,1,519df33fa4e416d0b8e494e4d7d4c9c0d22816f218363f970698f046330d1958,2024-11-21T01:57:57.793000 -CVE-2013-5701,0,1,84c8a1308a06d30898d2a649e05e015bb186727904b2544934dff170c6b2db91,2024-11-21T01:57:57.930000 -CVE-2013-5702,0,1,9bd7401a0099a0a7fa2294279920c27327f2413105caa5901df4c87316737780,2024-11-21T01:57:58.057000 -CVE-2013-5703,0,1,571b2fbbe4b99ed193a247ab320e68b948431f9c79605f6241dadec3e452d61d,2024-11-21T01:57:58.183000 -CVE-2013-5704,0,1,4f1b7e8398b09fbb0a2fed35303a10d06586cd6727a2f16b61f57316331bee85,2024-11-21T01:57:58.313000 -CVE-2013-5705,0,1,e0a4b8a7feb10c7f3b12ceb4194dcc3b915a888ee6d6d25d91906dfa1c4810ad,2024-11-21T01:57:58.730000 -CVE-2013-5706,0,1,b2fe9dfae6d54d2ee2df07e26fdf3e725c9449be8d730999f815157165e05275,2024-11-21T01:57:58.873000 -CVE-2013-5707,0,1,c6f4bc463fd3f105fed922f0431297a26ee103a9bd9b3238c1195d95dc9821b3,2024-11-21T01:57:59.047000 -CVE-2013-5708,0,1,787ab450eb9ccc29b94273ebccb7e6c204b3d02630a4069c3b385be9d64c63d9,2024-11-21T01:57:59.183000 -CVE-2013-5709,0,1,40671996aafc429e1d81a62019e1b2dbe891d909005e9814a84a137f98172bda,2024-11-21T01:57:59.320000 -CVE-2013-5710,0,1,24435c2ecafa09c8db51ce92fa2a4bfc9ce83306ea65caf6d6bc5a0652673244,2024-11-21T01:57:59.460000 -CVE-2013-5711,0,1,d155436b08dbdf7d7b055731c9bab73f44fa0ad62843d177fa4e615a4772ca6c,2024-11-21T01:57:59.590000 -CVE-2013-5714,0,1,bf8da01850c1bffc1b8b95366891d90ac47a5f52d8377614e3f7ec7f3fe1e36f,2024-11-21T01:57:59.730000 -CVE-2013-5715,0,1,d9f9ff0a05b2618d8c01530620ebc0abe2c65e4fe48febc12d56797b1da09a57,2024-11-21T01:57:59.883000 -CVE-2013-5716,0,1,ba27e03e11756067c07428b7137a9284efe743b614baf5c8ad2857d23db0511a,2024-11-21T01:58:00.023000 -CVE-2013-5717,0,1,892549e6e45549ad57e30efb7a2f038a559eda8786db1e05725f63cd34e31dd8,2024-11-21T01:58:00.160000 -CVE-2013-5718,0,1,97901028bb078bc2739c6224bf17117641b3f69eef3e7e9c623ba1ea59b43440,2024-11-21T01:58:00.300000 -CVE-2013-5719,0,1,ab66a2e58d7c70964f9c2a68b054b4d38e8148fa78261d60dbcdacbcdd194a37,2024-11-21T01:58:00.437000 -CVE-2013-5720,0,1,30ba803224292b8cec2e582ba3d2a46259b6714483eae2372d8e5f2c7a58d9a6,2024-11-21T01:58:00.570000 -CVE-2013-5721,0,1,278fe6becc09ac3d4406ce32d5f61083611a2fe272f326aa95bfe86102dd87f0,2024-11-21T01:58:00.717000 -CVE-2013-5722,0,1,de9fbce443aa0de5fc62c84143d73f17737bb9b1cdde390ba102af22f7c61f12,2024-11-21T01:58:00.860000 -CVE-2013-5723,0,1,3e9e57567432d7c99e2f44432372ea24abefab6f03e26da3ff118c75e32622e4,2024-11-21T01:58:01.010000 -CVE-2013-5724,0,1,701f307b4231dd1606658984cb72249a389094872144e13f3d9b76666a31cb51,2024-11-21T01:58:01.150000 -CVE-2013-5725,0,1,efb4541279c7faa6e82d756d89a2ec819c05186dc377b439f28f10644843cb8f,2024-11-21T01:58:01.290000 -CVE-2013-5726,0,1,40c5b6f979f414ac5c928264e7486b6b345d338a9d5bf28d350fd25ff38bed0d,2024-11-21T01:58:01.417000 -CVE-2013-5730,0,1,cdb7c63047970a6d68a0448e7979c34141e41c6d92f17778ef534d7bd50d49d4,2024-11-21T01:58:01.553000 -CVE-2013-5738,0,1,6f787137409e71fd0333a54f65f4dfe200ba91b4dd682a06b0d199bde14cfb70,2024-11-21T01:58:01.697000 -CVE-2013-5739,0,1,a5b07c8f59faa563ed526301f334601a4efe54c11d7b68823a3d4395bfbe23d9,2024-11-21T01:58:01.840000 -CVE-2013-5740,0,1,3f2d718e7b566248136088622ed1484eab8b1e1cd9fb80c5b850e9ef5e54cb1d,2024-11-21T01:58:01.977000 -CVE-2013-5741,0,1,f6e0d5bcda194f8559a1acebdfa716c12cc2667c833ea78ae26a9e4206511028,2024-11-21T01:58:02.113000 +CVE-2013-5690,0,0,d7b7e18f6321548771a0e0f5b1cff8579ae9a09bc4607300d2eb91864261d346,2024-11-21T01:57:56.620000 +CVE-2013-5691,0,0,fba348f028d05fc05bf084dc86f5abee6f1ee145375783f76f1ac8d1d6364300,2024-11-21T01:57:56.740000 +CVE-2013-5692,0,0,bcd4eca74149f741174f2ba8cf905a7fb2a84a68d7ebe35afb0ec5a17e853c49,2024-11-21T01:57:56.870000 +CVE-2013-5693,0,0,662fa88dda5764f82ea8b4e2c9b1a288b33fd3f27cd86c0cd54dc4bcdd0255d4,2024-11-21T01:57:57 +CVE-2013-5694,0,0,a3befb6cebdcb0a98c580d8e9dcf80f0772fbd0dce072d47e8ff8c4b329bddbe,2024-11-21T01:57:57.133000 +CVE-2013-5695,0,0,76bc4d9c76193b95458be1d5498d4ce9b77a619372ce2696ad0c7ed99f4205b2,2024-11-21T01:57:57.270000 +CVE-2013-5696,0,0,07fde1332944cfb83c8c44375402ecaccd0504c8021ef0d46d4c62f71370f3df,2024-11-21T01:57:57.397000 +CVE-2013-5697,0,0,64e952f2d10c45f1a77fc1f0100e7a3812d98e1cc15f90fb5990416cb3a4d0c6,2024-11-21T01:57:57.540000 +CVE-2013-5698,0,0,a0acf2787264fa9edaead3c390cd50c1f01ea75aa44ffdedcd14a176dcdfaf48,2024-11-21T01:57:57.670000 +CVE-2013-5700,0,0,519df33fa4e416d0b8e494e4d7d4c9c0d22816f218363f970698f046330d1958,2024-11-21T01:57:57.793000 +CVE-2013-5701,0,0,84c8a1308a06d30898d2a649e05e015bb186727904b2544934dff170c6b2db91,2024-11-21T01:57:57.930000 +CVE-2013-5702,0,0,9bd7401a0099a0a7fa2294279920c27327f2413105caa5901df4c87316737780,2024-11-21T01:57:58.057000 +CVE-2013-5703,0,0,571b2fbbe4b99ed193a247ab320e68b948431f9c79605f6241dadec3e452d61d,2024-11-21T01:57:58.183000 +CVE-2013-5704,0,0,4f1b7e8398b09fbb0a2fed35303a10d06586cd6727a2f16b61f57316331bee85,2024-11-21T01:57:58.313000 +CVE-2013-5705,0,0,e0a4b8a7feb10c7f3b12ceb4194dcc3b915a888ee6d6d25d91906dfa1c4810ad,2024-11-21T01:57:58.730000 +CVE-2013-5706,0,0,b2fe9dfae6d54d2ee2df07e26fdf3e725c9449be8d730999f815157165e05275,2024-11-21T01:57:58.873000 +CVE-2013-5707,0,0,c6f4bc463fd3f105fed922f0431297a26ee103a9bd9b3238c1195d95dc9821b3,2024-11-21T01:57:59.047000 +CVE-2013-5708,0,0,787ab450eb9ccc29b94273ebccb7e6c204b3d02630a4069c3b385be9d64c63d9,2024-11-21T01:57:59.183000 +CVE-2013-5709,0,0,40671996aafc429e1d81a62019e1b2dbe891d909005e9814a84a137f98172bda,2024-11-21T01:57:59.320000 +CVE-2013-5710,0,0,24435c2ecafa09c8db51ce92fa2a4bfc9ce83306ea65caf6d6bc5a0652673244,2024-11-21T01:57:59.460000 +CVE-2013-5711,0,0,d155436b08dbdf7d7b055731c9bab73f44fa0ad62843d177fa4e615a4772ca6c,2024-11-21T01:57:59.590000 +CVE-2013-5714,0,0,bf8da01850c1bffc1b8b95366891d90ac47a5f52d8377614e3f7ec7f3fe1e36f,2024-11-21T01:57:59.730000 +CVE-2013-5715,0,0,d9f9ff0a05b2618d8c01530620ebc0abe2c65e4fe48febc12d56797b1da09a57,2024-11-21T01:57:59.883000 +CVE-2013-5716,0,0,ba27e03e11756067c07428b7137a9284efe743b614baf5c8ad2857d23db0511a,2024-11-21T01:58:00.023000 +CVE-2013-5717,0,0,892549e6e45549ad57e30efb7a2f038a559eda8786db1e05725f63cd34e31dd8,2024-11-21T01:58:00.160000 +CVE-2013-5718,0,0,97901028bb078bc2739c6224bf17117641b3f69eef3e7e9c623ba1ea59b43440,2024-11-21T01:58:00.300000 +CVE-2013-5719,0,0,ab66a2e58d7c70964f9c2a68b054b4d38e8148fa78261d60dbcdacbcdd194a37,2024-11-21T01:58:00.437000 +CVE-2013-5720,0,0,30ba803224292b8cec2e582ba3d2a46259b6714483eae2372d8e5f2c7a58d9a6,2024-11-21T01:58:00.570000 +CVE-2013-5721,0,0,278fe6becc09ac3d4406ce32d5f61083611a2fe272f326aa95bfe86102dd87f0,2024-11-21T01:58:00.717000 +CVE-2013-5722,0,0,de9fbce443aa0de5fc62c84143d73f17737bb9b1cdde390ba102af22f7c61f12,2024-11-21T01:58:00.860000 +CVE-2013-5723,0,0,3e9e57567432d7c99e2f44432372ea24abefab6f03e26da3ff118c75e32622e4,2024-11-21T01:58:01.010000 +CVE-2013-5724,0,0,701f307b4231dd1606658984cb72249a389094872144e13f3d9b76666a31cb51,2024-11-21T01:58:01.150000 +CVE-2013-5725,0,0,efb4541279c7faa6e82d756d89a2ec819c05186dc377b439f28f10644843cb8f,2024-11-21T01:58:01.290000 +CVE-2013-5726,0,0,40c5b6f979f414ac5c928264e7486b6b345d338a9d5bf28d350fd25ff38bed0d,2024-11-21T01:58:01.417000 +CVE-2013-5730,0,0,cdb7c63047970a6d68a0448e7979c34141e41c6d92f17778ef534d7bd50d49d4,2024-11-21T01:58:01.553000 +CVE-2013-5738,0,0,6f787137409e71fd0333a54f65f4dfe200ba91b4dd682a06b0d199bde14cfb70,2024-11-21T01:58:01.697000 +CVE-2013-5739,0,0,a5b07c8f59faa563ed526301f334601a4efe54c11d7b68823a3d4395bfbe23d9,2024-11-21T01:58:01.840000 +CVE-2013-5740,0,0,3f2d718e7b566248136088622ed1484eab8b1e1cd9fb80c5b850e9ef5e54cb1d,2024-11-21T01:58:01.977000 +CVE-2013-5741,0,0,f6e0d5bcda194f8559a1acebdfa716c12cc2667c833ea78ae26a9e4206511028,2024-11-21T01:58:02.113000 CVE-2013-5743,0,0,0296f6f4bb519a97399f9de25b57fbeb5e11748075d882779d58e47038923ed8,2019-12-16T17:39:28.523000 -CVE-2013-5744,0,1,08786c4b42493b072d97bdec4227d54fc494c7d7fc9fd20c96a99824f11515f1,2024-11-21T01:58:02.380000 -CVE-2013-5745,0,1,692f05479c6b35a0a368d56c468da0598e7d5165b1b8f716bea273e581e8ac38,2024-11-21T01:58:02.527000 -CVE-2013-5748,0,1,efd0a920c822d9d7632d24ceb45b04be01642aaf05940d8fd9f5ab2414bf3bd8,2024-11-21T01:58:02.690000 -CVE-2013-5749,0,1,304d24819724f8e993a41dc904faae409180beb60725cede807140eca49e5f3f,2024-11-21T01:58:02.830000 -CVE-2013-5750,0,1,3eaee438072ff9e9077c23de9f541136be0ee9340bb27718a9b265bfdaa53822,2024-11-21T01:58:02.970000 -CVE-2013-5751,0,1,ce7a90a747334f02fc29b08b3cb74d28c46d5c78dc1d58482016562f341304e5,2024-11-21T01:58:03.113000 -CVE-2013-5754,0,1,fa3ecce9e812aadd4bd06c7fe9fcf41ab7e0431e78b62cccb47a706a8c085542,2024-11-21T01:58:03.267000 +CVE-2013-5744,0,0,08786c4b42493b072d97bdec4227d54fc494c7d7fc9fd20c96a99824f11515f1,2024-11-21T01:58:02.380000 +CVE-2013-5745,0,0,692f05479c6b35a0a368d56c468da0598e7d5165b1b8f716bea273e581e8ac38,2024-11-21T01:58:02.527000 +CVE-2013-5748,0,0,efd0a920c822d9d7632d24ceb45b04be01642aaf05940d8fd9f5ab2414bf3bd8,2024-11-21T01:58:02.690000 +CVE-2013-5749,0,0,304d24819724f8e993a41dc904faae409180beb60725cede807140eca49e5f3f,2024-11-21T01:58:02.830000 +CVE-2013-5750,0,0,3eaee438072ff9e9077c23de9f541136be0ee9340bb27718a9b265bfdaa53822,2024-11-21T01:58:02.970000 +CVE-2013-5751,0,0,ce7a90a747334f02fc29b08b3cb74d28c46d5c78dc1d58482016562f341304e5,2024-11-21T01:58:03.113000 +CVE-2013-5754,0,0,fa3ecce9e812aadd4bd06c7fe9fcf41ab7e0431e78b62cccb47a706a8c085542,2024-11-21T01:58:03.267000 CVE-2013-5755,0,0,7d2513a844432cd9fa0b7c57661457f8abc51d3db1c08ce1bd0fbe7845c166bf,2016-05-26T12:33:14.040000 CVE-2013-5756,0,0,041b35e3ac50e4559299c41caeb98ea1ae0e800d32873c46e15a8bc3a6ec7fd2,2014-08-04T14:08:02.313000 CVE-2013-5757,0,0,abdda820b2cc3d671e202db74ceb062dacbd44cd3be61917c3a8a3042f23494e,2014-08-04T14:10:18.617000 CVE-2013-5758,0,0,c401389c5f35e2dc90566f8de1828d9b58543dd93938adac7c803ae10c118880,2014-08-04T14:13:16.453000 CVE-2013-5759,0,0,2c431fd0757a2e1e4fe1fa2d67a0e593fdda3fd00197bd9c40b0e3c2687407b7,2023-11-07T02:16:45.807000 CVE-2013-5760,0,0,e9edd396a69d7df666054203e613b2cbac102544ff9a5a5000bca316fd76fffb,2017-08-29T01:33:50.403000 -CVE-2013-5761,0,1,cc83ea71f4c0eccbaf9aec393ac58002bf01ab5e29f39a33662ac32d4945b20d,2024-11-21T01:58:04.137000 -CVE-2013-5762,0,1,4f21b277659fcac113df3f69bf65776707e45497bd186bf4871fceb72d4e4910,2024-11-21T01:58:04.267000 -CVE-2013-5763,0,1,38c12af914af789bc087edd0d8511451568f7e45db22ed5218d5b7774b6d9f85,2024-11-21T01:58:04.380000 -CVE-2013-5764,0,1,7f637f411c89ce0494df12c11608dc3eb9c5a5b8add3777f06cffef4bcdca7c8,2024-11-21T01:58:04.500000 -CVE-2013-5765,0,1,8854003a037014f3fe10766a55d052754ea382e0addda773c0acfe9a6670e6c7,2024-11-21T01:58:04.630000 -CVE-2013-5766,0,1,0f3b4414b2a368a652d2defcd1a0d4fe1baa2363d0c13dcc7db4c175c8848800,2024-11-21T01:58:04.737000 -CVE-2013-5767,0,1,4f26aacf39509eda17af99f1bca8db8ecc68ec79548dc6f685f5dfadd7423223,2024-11-21T01:58:04.843000 -CVE-2013-5768,0,1,da36900eb635dcbc73afba51203ad2475c1bf2d3f2df4cec643567573fe82a40,2024-11-21T01:58:04.960000 -CVE-2013-5769,0,1,2dbcfdf687d94195329bf9243fd0ec1f0b92dcfc2694d34f1f490649cf457555,2024-11-21T01:58:05.063000 -CVE-2013-5770,0,1,3becd45c7a966c992c087f50cafd06d0eda0ca5a9afb62db1ff7b3821419e40b,2024-11-21T01:58:05.170000 -CVE-2013-5771,0,1,f65e653a2f8e0fc4faceceadc865c9c62d2973dec9e3ccd3dee065a46eceb99a,2024-11-21T01:58:05.280000 -CVE-2013-5772,0,1,29e556228c299d0e743b1a4fbc915287a1f443f3006b58512ce7e0ef656d48b7,2024-11-21T01:58:05.393000 -CVE-2013-5773,0,1,b1160c2293bf688a796a5738693619d61ef41263fc64232d5f729180b40e5bf3,2024-11-21T01:58:05.597000 -CVE-2013-5774,0,1,ad0e2c478fc7cd0a0474a5ea28e3fc3bc753ca605db3b69a9f433f2b4aeade1c,2024-11-21T01:58:05.713000 -CVE-2013-5775,0,1,66f1a866700eb5dd5a3b60cb0e618c68b5b00b5df3e3271c35a77bf4d8b7d524,2024-11-21T01:58:05.920000 -CVE-2013-5776,0,1,3601f75817650c9a461cdec84256332df99387077869c135e7ed052abc99a9a3,2024-11-21T01:58:06.047000 -CVE-2013-5777,0,1,0e98eebd005d69567247e7b9d47c94933f82ce69afe1bbac52d8250d7dbf8bab,2024-11-21T01:58:06.220000 -CVE-2013-5778,0,1,72b534b232bfc37ac246f7a2f38a99cddc2dce1385019433c3ef0d5713c2bf34,2024-11-21T01:58:06.353000 -CVE-2013-5779,0,1,bd50b232ad8530eeed123a00cbdf4f999e5e5dfa40bb3c4f653fbfb504ce67f3,2024-11-21T01:58:06.557000 -CVE-2013-5780,0,1,e78a4702c1a239601543f9be306d9ee7be0fd3cd0c2b31940dd3f461d055b6cf,2024-11-21T01:58:06.670000 -CVE-2013-5781,0,1,e3f93e91ba2a90c263efe569f1068d2e57ec93b9658eb5c8cd8431309d562d55,2024-11-21T01:58:06.877000 -CVE-2013-5782,0,1,d2e44e55135cfe3643a15f4d9888f08294421371e5ec8d955deb0bacb1fa15a8,2024-11-21T01:58:06.983000 -CVE-2013-5783,0,1,7d4f11158ed47d782d2f644da68da700317a1c8c26041fc766f0eda167506d06,2024-11-21T01:58:07.180000 -CVE-2013-5784,0,1,7f9b3bdbb8f589670f539308e32cca1fd3525cdd6f88ed0095d349fbc53a6828,2024-11-21T01:58:07.390000 -CVE-2013-5785,0,1,52b5673c1701523a033e791cdd43ddb1621f1528b691426d1b7900c320d528c6,2024-11-21T01:58:07.593000 -CVE-2013-5786,0,1,e170c19f8bc3c0ed53bba3ab6d08b75820074aec809a3aa40f148740d011f596,2024-11-21T01:58:07.720000 -CVE-2013-5787,0,1,615659e8556288f436c4d814ada3ab01a47853714aaba170c4a5cda47a80e525,2024-11-21T01:58:07.847000 -CVE-2013-5788,0,1,2167fd759b6999432741c8473eb3734ae988803970a51e4ffd1334e46b035811,2024-11-21T01:58:08.017000 -CVE-2013-5789,0,1,6f4577249f4b95105123974dd17aee4b16032a76c450612eff63f2f82992950a,2024-11-21T01:58:08.157000 -CVE-2013-5790,0,1,426d32db6941f7f2e1e3ecdb30c85d13deb14db28a06b48a3a7a653a145a00e8,2024-11-21T01:58:08.337000 -CVE-2013-5791,0,1,b025821fd4ed035f3a84b8e7fbf5fec5d795c2299ef3c74a6f90a914c94a65cd,2024-11-21T01:58:08.537000 -CVE-2013-5792,0,1,38a4d8cf5e70907b8c4f9cd65c2898c447edace99b347e633929709d5c99e7ef,2024-11-21T01:58:08.657000 -CVE-2013-5793,0,1,280be542269548607786d03dae887a97cb92d701fa8bcff9e1cc9e14cfa4dd8f,2024-11-21T01:58:08.763000 -CVE-2013-5794,0,1,c337f64df9007a752b319d6d6ad01b9fc0b2cba8610a4a8c8a5c178267386fbf,2024-11-21T01:58:08.877000 -CVE-2013-5795,0,1,b1dd1e60fb50d18bd919fda7bf1cb556d96457f1f76c58ed91e9e43682edd3cd,2024-11-21T01:58:08.980000 -CVE-2013-5796,0,1,8b78f1cf069b1122309971ed64fb262676b366c623c40f6f72b1b397237d9ea0,2024-11-21T01:58:09.093000 -CVE-2013-5797,0,1,597ce045cba5eff0305bafff5dcb6e8beefd7ed86f8ebfcd58a7297e1dd41d4c,2024-11-21T01:58:09.210000 -CVE-2013-5798,0,1,e4744d6e3fae247535632599bea2d21b07f95a9a0194e0652716d3fac14e4c07,2024-11-21T01:58:09.440000 -CVE-2013-5799,0,1,5cd9c47b2ba7b11a42feae3f7550e71e9ab066e9819cdca85893f3a36303f1f6,2024-11-21T01:58:09.553000 -CVE-2013-5800,0,1,5ab6bcdd2cba83f68b3375c4b3b64f86cf1aa49dcf23a687cf81f2f89bcfff29,2024-11-21T01:58:09.657000 -CVE-2013-5801,0,1,4b59241e40de9356de6f196ac6c3641b2dce391ac1eccaa425ff1b8aec4df358,2024-11-21T01:58:09.800000 -CVE-2013-5802,0,1,3d4670e46ac0a6199a8139c7cce9f2d3cd6e4f439b8d4edf431a8f93192c5850,2024-11-21T01:58:09.987000 -CVE-2013-5803,0,1,882d9261d1d1026a55d70cd811503ff7ed6dab357bb54134687f0307829061bf,2024-11-21T01:58:10.190000 -CVE-2013-5804,0,1,46df3c021f5769156c78fce3b0c6d24b864c9b9dae20518030ef8cee037b0065,2024-11-21T01:58:10.387000 -CVE-2013-5805,0,1,7bec4dd41f330f58fa37689c79ff4b0c3e9d72fe42aa5f47e62105f6532f90c7,2024-11-21T01:58:10.573000 -CVE-2013-5806,0,1,ad126e630b5bdf130c06f06a5749be41642a412636d7e88465f36843cd678775,2024-11-21T01:58:10.703000 -CVE-2013-5807,0,1,2175361be082b350892863d5233addf3e13cf6ef9f1dd4270e6bbb033a65ff6f,2024-11-21T01:58:10.833000 -CVE-2013-5808,0,1,0c74554388231e3c3369ab0cbf4c2e497e3b598e7bb591b2c436881d47b24554,2024-11-21T01:58:10.957000 -CVE-2013-5809,0,1,4fcbffc62d51eb1932528f4806189f7668ea0c471b8d843de1292ffd4bd03bda,2024-11-21T01:58:11.070000 -CVE-2013-5810,0,1,86bc3245f2767c2e5890eb4a190a8940da29413d4f0499449a6bbf9eb47421bd,2024-11-21T01:58:11.270000 -CVE-2013-5811,0,1,8990b23d8440264aef0fe43d8c91f6948a1c42db3aaa99b10ec9ba179e9ca642,2024-11-21T01:58:11.383000 -CVE-2013-5812,0,1,911e8bf83fbfce468c53f05d7314add5e865c860977ed5905ad16d01ce85525a,2024-11-21T01:58:11.487000 -CVE-2013-5813,0,1,9aadf66056a01c5ce8cac3ca9420800d449666f212fdcdaa2b9bc74201a19c07,2024-11-21T01:58:11.647000 -CVE-2013-5814,0,1,64558e687bd33531213f0de10f6cd26c4d0ee9070619f665b0631f23a53cd4a2,2024-11-21T01:58:11.763000 -CVE-2013-5815,0,1,0abbea03748bccd3043e55c8c0a8fef1c02f3335c2fe9e4558abb46a58c04e54,2024-11-21T01:58:11.970000 -CVE-2013-5816,0,1,2635dab12ee0f62a2b37f62aa383e35fa7e7c9833c68d3ac7487f3596f580e38,2024-11-21T01:58:12.080000 -CVE-2013-5817,0,1,37773b515bffa24e5afb7e2ff2121ac03647ea4f0a22d488401273283017f129,2024-11-21T01:58:12.190000 -CVE-2013-5818,0,1,39dbb86f9598627e024659ccd3ab45739c290949ac0d30d08659268c37615e58,2024-11-21T01:58:12.403000 -CVE-2013-5819,0,1,36762cb4891bd98e43df145af046599cdb1cee95b63693d94973ee6706c025ac,2024-11-21T01:58:12.570000 -CVE-2013-5820,0,1,71d621a81d169e056c35a8b80f45893a68afe415d52ce56cc16cc5ac4fbd3d80,2024-11-21T01:58:12.740000 -CVE-2013-5821,0,1,355b052e2433dd1948c31d655370a2c301436cebcb0f2631fa2c6930931e80d0,2024-11-21T01:58:12.940000 -CVE-2013-5822,0,1,cdf0ae617b09b33cc7032e437bb9de7665b99146d01c7d7425f2426c27c3f67e,2024-11-21T01:58:13.073000 -CVE-2013-5823,0,1,b0094f180e38f1527093173814dfc5febd35577c3ca8af3106a531de2263d7cd,2024-11-21T01:58:13.180000 -CVE-2013-5824,0,1,7fc2d449ae6d8bdad7ce0519b0bbaa6639d79c81ef321f666176ec17d3a134a5,2024-11-21T01:58:13.373000 -CVE-2013-5825,0,1,3247c62e1863f4d4f07ca67b3ab31b46ff86add999efbe6db37920e56aa3c8a8,2024-11-21T01:58:13.563000 -CVE-2013-5826,0,1,cec3b6bf718fbc9383081b6d2371ad151272397d6a15a52b93d5b6dc595ffbbb,2024-11-21T01:58:13.773000 -CVE-2013-5827,0,1,9ca6e7f423547e169776e70f3278a95e8206cce7265431839267653660b28e87,2024-11-21T01:58:13.883000 -CVE-2013-5828,0,1,7a31ba0c0674e171cf6257839c9469a5aa95dc0000c92aa64701c015959b4aca,2024-11-21T01:58:13.993000 -CVE-2013-5829,0,1,23bf5fbdc6df37319cf1107e858f78d63229280d7a2084bdb5dd59c7e96680c6,2024-11-21T01:58:14.103000 -CVE-2013-5830,0,1,9501b7c5e96ebd903d672535c52d331d476c525b1a3f60e75269681d58b0242c,2024-11-21T01:58:14.350000 -CVE-2013-5831,0,1,4e72bcb92d5c740ddabd47d411683ff802e0bb0c9efecdc5ec0de2e8d3d7b69d,2024-11-21T01:58:14.607000 -CVE-2013-5832,0,1,ab9a794842afcbc3323e66c43b6536f6d7cc6ed8ca9dbad71053747e0806a44f,2024-11-21T01:58:14.807000 -CVE-2013-5833,0,1,44a4567a265ca7df2a29dcefb5a4bf08ea5ee67ae20eee86dec224b840ecab62,2024-11-21T01:58:14.970000 -CVE-2013-5834,0,1,8ce90f7036f380dc60f415f8000071c1325a77772a99e1f6258bbbaa6f26bb10,2024-11-21T01:58:15.090000 -CVE-2013-5835,0,1,61be84e60b54b33efdadf0caf4a7158dd18ad50a2dc0949a00ed74103340a068,2024-11-21T01:58:15.203000 -CVE-2013-5836,0,1,00faf57b36be8d98351116a431d5945cabdfe3bd221fe19b67f518b07cba08a0,2024-11-21T01:58:15.307000 -CVE-2013-5837,0,1,3110520a91c3528165f6b94df4e7690974ad97576bf6a063de5bc233a9981b6e,2024-11-21T01:58:15.417000 -CVE-2013-5838,0,1,635331d497dee75127cf6512d43d23dd3e40b0a83245ba8e75df0a68f55c578e,2024-11-21T01:58:15.530000 -CVE-2013-5839,0,1,53970e6e8b1ab39d2df0c913277990f44482078f0888b1578ea35e703c442043,2024-11-21T01:58:15.670000 -CVE-2013-5840,0,1,c3c9fa780d4da2dba3f505a6c86b42f5f91bacd6400f457a6e79490d597004ff,2024-11-21T01:58:15.780000 -CVE-2013-5841,0,1,37738a6d3578d101e24df7d24d87cfe3f2aed064ac5aaf9562070499847dd5c4,2024-11-21T01:58:15.993000 -CVE-2013-5842,0,1,502ce082ac100969a5204ef9fb871b724726bfb1e8b9b78ed69ea808f5e182e7,2024-11-21T01:58:16.100000 -CVE-2013-5843,0,1,d1f2ae3a9fe2282422b07c04589f2e50b581638781d4aab2e93f6e235b8428e9,2024-11-21T01:58:16.347000 -CVE-2013-5844,0,1,1ece30a1efbed7c54a3e8548ea7c199599d94101ac72e64db501a311f15b2bd0,2024-11-21T01:58:16.547000 -CVE-2013-5845,0,1,9eb36af24409acf715cf1f590db3ccb0c4caec0409904e2c95027545d05bc470,2024-11-21T01:58:16.670000 -CVE-2013-5846,0,1,a36eff38ad0ff94baa3de8066393154c06e4c320047d9ebbbe46a04cd5aeb250,2024-11-21T01:58:16.783000 -CVE-2013-5847,0,1,383455fa4b2799362fb7df5746251d2bad122eddb090a6934a1c6a725ff8c911,2024-11-21T01:58:16.907000 -CVE-2013-5848,0,1,7435c718ec0d5c1a46fa44c5a77841739a9bb3ddadb3a84a7e41eee1b5c23241,2024-11-21T01:58:17.017000 -CVE-2013-5849,0,1,5cb1fbf4fa0d6d74a38da1c8336e952c6c4ccb3110107e4b472bb0819c9f5bd3,2024-11-21T01:58:17.177000 -CVE-2013-5850,0,1,faa33d2e759412496a0fed30f05a54e9fe69a7d20707f3391ecf85b1104d6b59,2024-11-21T01:58:17.380000 -CVE-2013-5851,0,1,5fa5bc7b5a071eeb25a9e4ab8afb2a8aec7860231c601dfd4b6016cb728a8f3c,2024-11-21T01:58:17.583000 -CVE-2013-5852,0,1,d7e74a1a6bc606cef062bb8117ce7c67e5dfce4fa6cbb0260d069557609bea2a,2024-11-21T01:58:17.747000 -CVE-2013-5853,0,1,26615c7a43506bc99926b27ee35a99e47ef593d99d88e2237ecb74f6bcf78449,2024-11-21T01:58:17.890000 -CVE-2013-5854,0,1,c33c514b66f5522c72703897efa35867c681d2458c782b9393b009971ee08f6d,2024-11-21T01:58:18.010000 +CVE-2013-5761,0,0,cc83ea71f4c0eccbaf9aec393ac58002bf01ab5e29f39a33662ac32d4945b20d,2024-11-21T01:58:04.137000 +CVE-2013-5762,0,0,4f21b277659fcac113df3f69bf65776707e45497bd186bf4871fceb72d4e4910,2024-11-21T01:58:04.267000 +CVE-2013-5763,0,0,38c12af914af789bc087edd0d8511451568f7e45db22ed5218d5b7774b6d9f85,2024-11-21T01:58:04.380000 +CVE-2013-5764,0,0,7f637f411c89ce0494df12c11608dc3eb9c5a5b8add3777f06cffef4bcdca7c8,2024-11-21T01:58:04.500000 +CVE-2013-5765,0,0,8854003a037014f3fe10766a55d052754ea382e0addda773c0acfe9a6670e6c7,2024-11-21T01:58:04.630000 +CVE-2013-5766,0,0,0f3b4414b2a368a652d2defcd1a0d4fe1baa2363d0c13dcc7db4c175c8848800,2024-11-21T01:58:04.737000 +CVE-2013-5767,0,0,4f26aacf39509eda17af99f1bca8db8ecc68ec79548dc6f685f5dfadd7423223,2024-11-21T01:58:04.843000 +CVE-2013-5768,0,0,da36900eb635dcbc73afba51203ad2475c1bf2d3f2df4cec643567573fe82a40,2024-11-21T01:58:04.960000 +CVE-2013-5769,0,0,2dbcfdf687d94195329bf9243fd0ec1f0b92dcfc2694d34f1f490649cf457555,2024-11-21T01:58:05.063000 +CVE-2013-5770,0,0,3becd45c7a966c992c087f50cafd06d0eda0ca5a9afb62db1ff7b3821419e40b,2024-11-21T01:58:05.170000 +CVE-2013-5771,0,0,f65e653a2f8e0fc4faceceadc865c9c62d2973dec9e3ccd3dee065a46eceb99a,2024-11-21T01:58:05.280000 +CVE-2013-5772,0,0,29e556228c299d0e743b1a4fbc915287a1f443f3006b58512ce7e0ef656d48b7,2024-11-21T01:58:05.393000 +CVE-2013-5773,0,0,b1160c2293bf688a796a5738693619d61ef41263fc64232d5f729180b40e5bf3,2024-11-21T01:58:05.597000 +CVE-2013-5774,0,0,ad0e2c478fc7cd0a0474a5ea28e3fc3bc753ca605db3b69a9f433f2b4aeade1c,2024-11-21T01:58:05.713000 +CVE-2013-5775,0,0,66f1a866700eb5dd5a3b60cb0e618c68b5b00b5df3e3271c35a77bf4d8b7d524,2024-11-21T01:58:05.920000 +CVE-2013-5776,0,0,3601f75817650c9a461cdec84256332df99387077869c135e7ed052abc99a9a3,2024-11-21T01:58:06.047000 +CVE-2013-5777,0,0,0e98eebd005d69567247e7b9d47c94933f82ce69afe1bbac52d8250d7dbf8bab,2024-11-21T01:58:06.220000 +CVE-2013-5778,0,0,72b534b232bfc37ac246f7a2f38a99cddc2dce1385019433c3ef0d5713c2bf34,2024-11-21T01:58:06.353000 +CVE-2013-5779,0,0,bd50b232ad8530eeed123a00cbdf4f999e5e5dfa40bb3c4f653fbfb504ce67f3,2024-11-21T01:58:06.557000 +CVE-2013-5780,0,0,e78a4702c1a239601543f9be306d9ee7be0fd3cd0c2b31940dd3f461d055b6cf,2024-11-21T01:58:06.670000 +CVE-2013-5781,0,0,e3f93e91ba2a90c263efe569f1068d2e57ec93b9658eb5c8cd8431309d562d55,2024-11-21T01:58:06.877000 +CVE-2013-5782,0,0,d2e44e55135cfe3643a15f4d9888f08294421371e5ec8d955deb0bacb1fa15a8,2024-11-21T01:58:06.983000 +CVE-2013-5783,0,0,7d4f11158ed47d782d2f644da68da700317a1c8c26041fc766f0eda167506d06,2024-11-21T01:58:07.180000 +CVE-2013-5784,0,0,7f9b3bdbb8f589670f539308e32cca1fd3525cdd6f88ed0095d349fbc53a6828,2024-11-21T01:58:07.390000 +CVE-2013-5785,0,0,52b5673c1701523a033e791cdd43ddb1621f1528b691426d1b7900c320d528c6,2024-11-21T01:58:07.593000 +CVE-2013-5786,0,0,e170c19f8bc3c0ed53bba3ab6d08b75820074aec809a3aa40f148740d011f596,2024-11-21T01:58:07.720000 +CVE-2013-5787,0,0,615659e8556288f436c4d814ada3ab01a47853714aaba170c4a5cda47a80e525,2024-11-21T01:58:07.847000 +CVE-2013-5788,0,0,2167fd759b6999432741c8473eb3734ae988803970a51e4ffd1334e46b035811,2024-11-21T01:58:08.017000 +CVE-2013-5789,0,0,6f4577249f4b95105123974dd17aee4b16032a76c450612eff63f2f82992950a,2024-11-21T01:58:08.157000 +CVE-2013-5790,0,0,426d32db6941f7f2e1e3ecdb30c85d13deb14db28a06b48a3a7a653a145a00e8,2024-11-21T01:58:08.337000 +CVE-2013-5791,0,0,b025821fd4ed035f3a84b8e7fbf5fec5d795c2299ef3c74a6f90a914c94a65cd,2024-11-21T01:58:08.537000 +CVE-2013-5792,0,0,38a4d8cf5e70907b8c4f9cd65c2898c447edace99b347e633929709d5c99e7ef,2024-11-21T01:58:08.657000 +CVE-2013-5793,0,0,280be542269548607786d03dae887a97cb92d701fa8bcff9e1cc9e14cfa4dd8f,2024-11-21T01:58:08.763000 +CVE-2013-5794,0,0,c337f64df9007a752b319d6d6ad01b9fc0b2cba8610a4a8c8a5c178267386fbf,2024-11-21T01:58:08.877000 +CVE-2013-5795,0,0,b1dd1e60fb50d18bd919fda7bf1cb556d96457f1f76c58ed91e9e43682edd3cd,2024-11-21T01:58:08.980000 +CVE-2013-5796,0,0,8b78f1cf069b1122309971ed64fb262676b366c623c40f6f72b1b397237d9ea0,2024-11-21T01:58:09.093000 +CVE-2013-5797,0,0,597ce045cba5eff0305bafff5dcb6e8beefd7ed86f8ebfcd58a7297e1dd41d4c,2024-11-21T01:58:09.210000 +CVE-2013-5798,0,0,e4744d6e3fae247535632599bea2d21b07f95a9a0194e0652716d3fac14e4c07,2024-11-21T01:58:09.440000 +CVE-2013-5799,0,0,5cd9c47b2ba7b11a42feae3f7550e71e9ab066e9819cdca85893f3a36303f1f6,2024-11-21T01:58:09.553000 +CVE-2013-5800,0,0,5ab6bcdd2cba83f68b3375c4b3b64f86cf1aa49dcf23a687cf81f2f89bcfff29,2024-11-21T01:58:09.657000 +CVE-2013-5801,0,0,4b59241e40de9356de6f196ac6c3641b2dce391ac1eccaa425ff1b8aec4df358,2024-11-21T01:58:09.800000 +CVE-2013-5802,0,0,3d4670e46ac0a6199a8139c7cce9f2d3cd6e4f439b8d4edf431a8f93192c5850,2024-11-21T01:58:09.987000 +CVE-2013-5803,0,0,882d9261d1d1026a55d70cd811503ff7ed6dab357bb54134687f0307829061bf,2024-11-21T01:58:10.190000 +CVE-2013-5804,0,0,46df3c021f5769156c78fce3b0c6d24b864c9b9dae20518030ef8cee037b0065,2024-11-21T01:58:10.387000 +CVE-2013-5805,0,0,7bec4dd41f330f58fa37689c79ff4b0c3e9d72fe42aa5f47e62105f6532f90c7,2024-11-21T01:58:10.573000 +CVE-2013-5806,0,0,ad126e630b5bdf130c06f06a5749be41642a412636d7e88465f36843cd678775,2024-11-21T01:58:10.703000 +CVE-2013-5807,0,0,2175361be082b350892863d5233addf3e13cf6ef9f1dd4270e6bbb033a65ff6f,2024-11-21T01:58:10.833000 +CVE-2013-5808,0,0,0c74554388231e3c3369ab0cbf4c2e497e3b598e7bb591b2c436881d47b24554,2024-11-21T01:58:10.957000 +CVE-2013-5809,0,0,4fcbffc62d51eb1932528f4806189f7668ea0c471b8d843de1292ffd4bd03bda,2024-11-21T01:58:11.070000 +CVE-2013-5810,0,0,86bc3245f2767c2e5890eb4a190a8940da29413d4f0499449a6bbf9eb47421bd,2024-11-21T01:58:11.270000 +CVE-2013-5811,0,0,8990b23d8440264aef0fe43d8c91f6948a1c42db3aaa99b10ec9ba179e9ca642,2024-11-21T01:58:11.383000 +CVE-2013-5812,0,0,911e8bf83fbfce468c53f05d7314add5e865c860977ed5905ad16d01ce85525a,2024-11-21T01:58:11.487000 +CVE-2013-5813,0,0,9aadf66056a01c5ce8cac3ca9420800d449666f212fdcdaa2b9bc74201a19c07,2024-11-21T01:58:11.647000 +CVE-2013-5814,0,0,64558e687bd33531213f0de10f6cd26c4d0ee9070619f665b0631f23a53cd4a2,2024-11-21T01:58:11.763000 +CVE-2013-5815,0,0,0abbea03748bccd3043e55c8c0a8fef1c02f3335c2fe9e4558abb46a58c04e54,2024-11-21T01:58:11.970000 +CVE-2013-5816,0,0,2635dab12ee0f62a2b37f62aa383e35fa7e7c9833c68d3ac7487f3596f580e38,2024-11-21T01:58:12.080000 +CVE-2013-5817,0,0,37773b515bffa24e5afb7e2ff2121ac03647ea4f0a22d488401273283017f129,2024-11-21T01:58:12.190000 +CVE-2013-5818,0,0,39dbb86f9598627e024659ccd3ab45739c290949ac0d30d08659268c37615e58,2024-11-21T01:58:12.403000 +CVE-2013-5819,0,0,36762cb4891bd98e43df145af046599cdb1cee95b63693d94973ee6706c025ac,2024-11-21T01:58:12.570000 +CVE-2013-5820,0,0,71d621a81d169e056c35a8b80f45893a68afe415d52ce56cc16cc5ac4fbd3d80,2024-11-21T01:58:12.740000 +CVE-2013-5821,0,0,355b052e2433dd1948c31d655370a2c301436cebcb0f2631fa2c6930931e80d0,2024-11-21T01:58:12.940000 +CVE-2013-5822,0,0,cdf0ae617b09b33cc7032e437bb9de7665b99146d01c7d7425f2426c27c3f67e,2024-11-21T01:58:13.073000 +CVE-2013-5823,0,0,b0094f180e38f1527093173814dfc5febd35577c3ca8af3106a531de2263d7cd,2024-11-21T01:58:13.180000 +CVE-2013-5824,0,0,7fc2d449ae6d8bdad7ce0519b0bbaa6639d79c81ef321f666176ec17d3a134a5,2024-11-21T01:58:13.373000 +CVE-2013-5825,0,0,3247c62e1863f4d4f07ca67b3ab31b46ff86add999efbe6db37920e56aa3c8a8,2024-11-21T01:58:13.563000 +CVE-2013-5826,0,0,cec3b6bf718fbc9383081b6d2371ad151272397d6a15a52b93d5b6dc595ffbbb,2024-11-21T01:58:13.773000 +CVE-2013-5827,0,0,9ca6e7f423547e169776e70f3278a95e8206cce7265431839267653660b28e87,2024-11-21T01:58:13.883000 +CVE-2013-5828,0,0,7a31ba0c0674e171cf6257839c9469a5aa95dc0000c92aa64701c015959b4aca,2024-11-21T01:58:13.993000 +CVE-2013-5829,0,0,23bf5fbdc6df37319cf1107e858f78d63229280d7a2084bdb5dd59c7e96680c6,2024-11-21T01:58:14.103000 +CVE-2013-5830,0,0,9501b7c5e96ebd903d672535c52d331d476c525b1a3f60e75269681d58b0242c,2024-11-21T01:58:14.350000 +CVE-2013-5831,0,0,4e72bcb92d5c740ddabd47d411683ff802e0bb0c9efecdc5ec0de2e8d3d7b69d,2024-11-21T01:58:14.607000 +CVE-2013-5832,0,0,ab9a794842afcbc3323e66c43b6536f6d7cc6ed8ca9dbad71053747e0806a44f,2024-11-21T01:58:14.807000 +CVE-2013-5833,0,0,44a4567a265ca7df2a29dcefb5a4bf08ea5ee67ae20eee86dec224b840ecab62,2024-11-21T01:58:14.970000 +CVE-2013-5834,0,0,8ce90f7036f380dc60f415f8000071c1325a77772a99e1f6258bbbaa6f26bb10,2024-11-21T01:58:15.090000 +CVE-2013-5835,0,0,61be84e60b54b33efdadf0caf4a7158dd18ad50a2dc0949a00ed74103340a068,2024-11-21T01:58:15.203000 +CVE-2013-5836,0,0,00faf57b36be8d98351116a431d5945cabdfe3bd221fe19b67f518b07cba08a0,2024-11-21T01:58:15.307000 +CVE-2013-5837,0,0,3110520a91c3528165f6b94df4e7690974ad97576bf6a063de5bc233a9981b6e,2024-11-21T01:58:15.417000 +CVE-2013-5838,0,0,635331d497dee75127cf6512d43d23dd3e40b0a83245ba8e75df0a68f55c578e,2024-11-21T01:58:15.530000 +CVE-2013-5839,0,0,53970e6e8b1ab39d2df0c913277990f44482078f0888b1578ea35e703c442043,2024-11-21T01:58:15.670000 +CVE-2013-5840,0,0,c3c9fa780d4da2dba3f505a6c86b42f5f91bacd6400f457a6e79490d597004ff,2024-11-21T01:58:15.780000 +CVE-2013-5841,0,0,37738a6d3578d101e24df7d24d87cfe3f2aed064ac5aaf9562070499847dd5c4,2024-11-21T01:58:15.993000 +CVE-2013-5842,0,0,502ce082ac100969a5204ef9fb871b724726bfb1e8b9b78ed69ea808f5e182e7,2024-11-21T01:58:16.100000 +CVE-2013-5843,0,0,d1f2ae3a9fe2282422b07c04589f2e50b581638781d4aab2e93f6e235b8428e9,2024-11-21T01:58:16.347000 +CVE-2013-5844,0,0,1ece30a1efbed7c54a3e8548ea7c199599d94101ac72e64db501a311f15b2bd0,2024-11-21T01:58:16.547000 +CVE-2013-5845,0,0,9eb36af24409acf715cf1f590db3ccb0c4caec0409904e2c95027545d05bc470,2024-11-21T01:58:16.670000 +CVE-2013-5846,0,0,a36eff38ad0ff94baa3de8066393154c06e4c320047d9ebbbe46a04cd5aeb250,2024-11-21T01:58:16.783000 +CVE-2013-5847,0,0,383455fa4b2799362fb7df5746251d2bad122eddb090a6934a1c6a725ff8c911,2024-11-21T01:58:16.907000 +CVE-2013-5848,0,0,7435c718ec0d5c1a46fa44c5a77841739a9bb3ddadb3a84a7e41eee1b5c23241,2024-11-21T01:58:17.017000 +CVE-2013-5849,0,0,5cb1fbf4fa0d6d74a38da1c8336e952c6c4ccb3110107e4b472bb0819c9f5bd3,2024-11-21T01:58:17.177000 +CVE-2013-5850,0,0,faa33d2e759412496a0fed30f05a54e9fe69a7d20707f3391ecf85b1104d6b59,2024-11-21T01:58:17.380000 +CVE-2013-5851,0,0,5fa5bc7b5a071eeb25a9e4ab8afb2a8aec7860231c601dfd4b6016cb728a8f3c,2024-11-21T01:58:17.583000 +CVE-2013-5852,0,0,d7e74a1a6bc606cef062bb8117ce7c67e5dfce4fa6cbb0260d069557609bea2a,2024-11-21T01:58:17.747000 +CVE-2013-5853,0,0,26615c7a43506bc99926b27ee35a99e47ef593d99d88e2237ecb74f6bcf78449,2024-11-21T01:58:17.890000 +CVE-2013-5854,0,0,c33c514b66f5522c72703897efa35867c681d2458c782b9393b009971ee08f6d,2024-11-21T01:58:18.010000 CVE-2013-5855,0,0,a47c4c9c91d94cc21bbbf71692f7dc43c1d9e0bbc0bf547da622e5951ec0fc4f,2018-10-09T19:34:38.157000 -CVE-2013-5856,0,1,a52948483c9016861f6afabf29c4642cf46e39c6f22edad50ad20c7ed8e51bd4,2024-11-21T01:58:18.303000 -CVE-2013-5857,0,1,762f6b2d3f6ea0b5caef34d5dd060f579a4a104729042e1741d13976523830ad,2024-11-21T01:58:18.423000 -CVE-2013-5858,0,1,e28004aa6ec51ebcb3e1c278a6f237bc25b4ef4cac3336c3b0022fc5dc44a5be,2024-11-21T01:58:18.530000 -CVE-2013-5859,0,1,2e5208b664a2e3bc974c8eb4deb9318f7cc8c35f28892ed0306135e5cfc0c4f6,2024-11-21T01:58:18.650000 -CVE-2013-5860,0,1,20b40ff72595c21113ca87d118e67f19fb02fc5e6ace438860797ced4af84e28,2024-11-21T01:58:18.753000 -CVE-2013-5861,0,1,47e09077eac57878669558307c268d8eb2ef5b32bb40c92ef6fbd93eaeadeb7c,2024-11-21T01:58:18.870000 -CVE-2013-5862,0,1,f773efc1ad5034b5749d316d3268455f25f561ba27f0c52510975a7f40d5357c,2024-11-21T01:58:18.970000 -CVE-2013-5863,0,1,6c82917e1a2c50feed430a38f8ef4a1c04d26ef3a9d6881951a1214a3219f77b,2024-11-21T01:58:19.070000 -CVE-2013-5864,0,1,fb9e8bbb3b8004692d659773d3dee5bd0fcc926b74bb159dc69f6a8ce28359db,2024-11-21T01:58:19.180000 -CVE-2013-5865,0,1,7b7ec1ef0a2e4d7e5debb7c329a531bd48915abf284e558a3b6950bb1c80a43f,2024-11-21T01:58:19.283000 -CVE-2013-5866,0,1,96bee3d260dbb95adf6f13277dc6828309bd4c0c1c85cb44e0f4525d70ce91bb,2024-11-21T01:58:19.390000 -CVE-2013-5867,0,1,26ec577aca4957c47bdbb936cd8fa4a2e7d359547a299b9b3fbd6694883e1071,2024-11-21T01:58:19.497000 -CVE-2013-5868,0,1,697956180a849f6831f9b5a4de5523f23e8948fab2975cc62f08f611d7efaad5,2024-11-21T01:58:19.597000 -CVE-2013-5869,0,1,58def178ccca43445578066576c3ad5ad3f7636c4156f086c88cd9c4331eb289,2024-11-21T01:58:19.707000 -CVE-2013-5870,0,1,ab0d953222ad0e1c76c45683da30bd1fa1ce3e33e0f0b0887e84be49e2d5b699,2024-11-21T01:58:19.823000 -CVE-2013-5871,0,1,1fc44d9d4f027eebeb82f9ce3cebbb2759622efc29aba13745d36ce3b3456320,2024-11-21T01:58:20.020000 -CVE-2013-5872,0,1,ff2839b599fb939ffb20f454cfb4964dd9d5c995dc7ce6502cd817e4d4be9a4a,2024-11-21T01:58:20.143000 -CVE-2013-5873,0,1,88b1e8e659fa0e621592b5745c7aa059a4bf3cb534c09a7d645acd2fc8ee6da0,2024-11-21T01:58:20.260000 -CVE-2013-5874,0,1,69f80c538019afb5353ff407a48ecd8667fe1cda7e72369ec18188138c30ef97,2024-11-21T01:58:20.363000 -CVE-2013-5875,0,1,de2a29de2aadd954415604a833695bd4cd16da46d9c1536f97578cffe670991e,2024-11-21T01:58:20.470000 -CVE-2013-5876,0,1,da6723fc22bcb3b35357369692813a08977605aee2928edaa1de42cda8289509,2024-11-21T01:58:20.580000 -CVE-2013-5877,0,1,9d94eea12e835a480fabf329f46ec69d6f208b27d06b2e3181c6d78a2121d24b,2024-11-21T01:58:20.687000 -CVE-2013-5878,0,1,fbc19789d280ed859388930a8626c547400939073ff509594dc4af62bfb37f03,2024-11-21T01:58:20.797000 -CVE-2013-5879,0,1,297fec803b414cff38eb2615e7b3fbc91681919878ef0fb200048dcc67a5bcfa,2024-11-21T01:58:20.953000 -CVE-2013-5880,0,1,e85e34a17f69957f5af67a531b93c0971b497e696657667f8fa01c160278d3e1,2024-11-21T01:58:21.100000 -CVE-2013-5881,0,1,671e030b22d3541148c3c8d70b34fe1f6bf9aedd63707af8427dea7a2ad3dbd7,2024-11-21T01:58:21.207000 -CVE-2013-5882,0,1,e1675767c7599fbe8097dd183ad9b65042d65907c688cb81c3db29de77c22467,2024-11-21T01:58:21.340000 -CVE-2013-5883,0,1,474748fa06081a13c226a52e6b81c9c8cd492efdbee4e31ca9900fd87865d0c8,2024-11-21T01:58:21.457000 -CVE-2013-5884,0,1,49b80537adbd1448dd5aa0b50b6fa375834215a0251d4bf5c686ce5124bbe493,2024-11-21T01:58:21.567000 -CVE-2013-5885,0,1,500c97ead0e1d364c0c4e0110a77ab60761aab62c5cd8e4fac152a13f2dbe46b,2024-11-21T01:58:21.730000 -CVE-2013-5886,0,1,15c70bf0e38fe023a40ae218bf5fa04ba8a8c8adb09af107a7f1edeb2a0390cf,2024-11-21T01:58:21.843000 -CVE-2013-5887,0,1,c0a64861882bc3d56bdb187c5c159ae1d164c859fdddf04095b386ec74b0548e,2024-11-21T01:58:21.953000 -CVE-2013-5888,0,1,04ce7809add2b41033a0d3c2a98946dac5358362746fb53b28ddf67cbb7eb9a6,2024-11-21T01:58:22.090000 -CVE-2013-5889,0,1,22cbef7b8ef77ba732581e2b13e06cf5c19ce70cad5a4f90caec7abf12bfddc9,2024-11-21T01:58:22.247000 -CVE-2013-5890,0,1,a5436d9a9859e498e68d44389130dd7337c758ce6eb7b14429dbf85e58380e36,2024-11-21T01:58:22.380000 -CVE-2013-5891,0,1,8acce63575120f94776834d68b7b3efaf0a414e3d51e9946409e5089d0851634,2024-11-21T01:58:22.497000 -CVE-2013-5892,0,1,b57aee46202b4fbd02af669ced5b5f48caaaba0435b83fc98d685245720cf957,2024-11-21T01:58:22.653000 -CVE-2013-5893,0,1,daba31005d0a05f2289eb9d6f6d12b17dcb62139cf5c2123a1e4a4fa8721a88c,2024-11-21T01:58:22.777000 -CVE-2013-5894,0,1,5c8dc434100348b4cc16143acba7a2291bef0039fe132b5bdb99f0c0c05c6561,2024-11-21T01:58:22.917000 -CVE-2013-5895,0,1,b46e3883ae3e18421c67e1586d60664cf432fe7f1ba8062c281942bce4060cf1,2024-11-21T01:58:23.037000 -CVE-2013-5896,0,1,265c167619f7b9e76c3b3d54ed7c5abac222db8efa1a4a18d446df45d27272c9,2024-11-21T01:58:23.173000 -CVE-2013-5897,0,1,66f720cb490ec52f8659b0f4f1fe2d27479d1acb5af77a89ea6257d79d133caa,2024-11-21T01:58:23.337000 -CVE-2013-5898,0,1,52cbd3cea596db01619b790cf18f48b726bc187e1c86d074325995a755550a49,2024-11-21T01:58:23.453000 -CVE-2013-5899,0,1,acbb04bbdfb4b544e31f7e4b35714c4a932ad955b7de11d0c6c3301256d434ad,2024-11-21T01:58:23.600000 -CVE-2013-5900,0,1,2157291d5f9365136947f7755beaddeb7ee5741a394908b1b9342e6a20814cfa,2024-11-21T01:58:23.750000 -CVE-2013-5901,0,1,599cc566803dc76c1c7f30db90232287d8c445cb6553c73baf6aba61e094719b,2024-11-21T01:58:23.867000 -CVE-2013-5902,0,1,05dad8446e4ae74a889171682a00123113aee9a6206469681328599c917efc04,2024-11-21T01:58:23.983000 +CVE-2013-5856,0,0,a52948483c9016861f6afabf29c4642cf46e39c6f22edad50ad20c7ed8e51bd4,2024-11-21T01:58:18.303000 +CVE-2013-5857,0,0,762f6b2d3f6ea0b5caef34d5dd060f579a4a104729042e1741d13976523830ad,2024-11-21T01:58:18.423000 +CVE-2013-5858,0,0,e28004aa6ec51ebcb3e1c278a6f237bc25b4ef4cac3336c3b0022fc5dc44a5be,2024-11-21T01:58:18.530000 +CVE-2013-5859,0,0,2e5208b664a2e3bc974c8eb4deb9318f7cc8c35f28892ed0306135e5cfc0c4f6,2024-11-21T01:58:18.650000 +CVE-2013-5860,0,0,20b40ff72595c21113ca87d118e67f19fb02fc5e6ace438860797ced4af84e28,2024-11-21T01:58:18.753000 +CVE-2013-5861,0,0,47e09077eac57878669558307c268d8eb2ef5b32bb40c92ef6fbd93eaeadeb7c,2024-11-21T01:58:18.870000 +CVE-2013-5862,0,0,f773efc1ad5034b5749d316d3268455f25f561ba27f0c52510975a7f40d5357c,2024-11-21T01:58:18.970000 +CVE-2013-5863,0,0,6c82917e1a2c50feed430a38f8ef4a1c04d26ef3a9d6881951a1214a3219f77b,2024-11-21T01:58:19.070000 +CVE-2013-5864,0,0,fb9e8bbb3b8004692d659773d3dee5bd0fcc926b74bb159dc69f6a8ce28359db,2024-11-21T01:58:19.180000 +CVE-2013-5865,0,0,7b7ec1ef0a2e4d7e5debb7c329a531bd48915abf284e558a3b6950bb1c80a43f,2024-11-21T01:58:19.283000 +CVE-2013-5866,0,0,96bee3d260dbb95adf6f13277dc6828309bd4c0c1c85cb44e0f4525d70ce91bb,2024-11-21T01:58:19.390000 +CVE-2013-5867,0,0,26ec577aca4957c47bdbb936cd8fa4a2e7d359547a299b9b3fbd6694883e1071,2024-11-21T01:58:19.497000 +CVE-2013-5868,0,0,697956180a849f6831f9b5a4de5523f23e8948fab2975cc62f08f611d7efaad5,2024-11-21T01:58:19.597000 +CVE-2013-5869,0,0,58def178ccca43445578066576c3ad5ad3f7636c4156f086c88cd9c4331eb289,2024-11-21T01:58:19.707000 +CVE-2013-5870,0,0,ab0d953222ad0e1c76c45683da30bd1fa1ce3e33e0f0b0887e84be49e2d5b699,2024-11-21T01:58:19.823000 +CVE-2013-5871,0,0,1fc44d9d4f027eebeb82f9ce3cebbb2759622efc29aba13745d36ce3b3456320,2024-11-21T01:58:20.020000 +CVE-2013-5872,0,0,ff2839b599fb939ffb20f454cfb4964dd9d5c995dc7ce6502cd817e4d4be9a4a,2024-11-21T01:58:20.143000 +CVE-2013-5873,0,0,88b1e8e659fa0e621592b5745c7aa059a4bf3cb534c09a7d645acd2fc8ee6da0,2024-11-21T01:58:20.260000 +CVE-2013-5874,0,0,69f80c538019afb5353ff407a48ecd8667fe1cda7e72369ec18188138c30ef97,2024-11-21T01:58:20.363000 +CVE-2013-5875,0,0,de2a29de2aadd954415604a833695bd4cd16da46d9c1536f97578cffe670991e,2024-11-21T01:58:20.470000 +CVE-2013-5876,0,0,da6723fc22bcb3b35357369692813a08977605aee2928edaa1de42cda8289509,2024-11-21T01:58:20.580000 +CVE-2013-5877,0,0,9d94eea12e835a480fabf329f46ec69d6f208b27d06b2e3181c6d78a2121d24b,2024-11-21T01:58:20.687000 +CVE-2013-5878,0,0,fbc19789d280ed859388930a8626c547400939073ff509594dc4af62bfb37f03,2024-11-21T01:58:20.797000 +CVE-2013-5879,0,0,297fec803b414cff38eb2615e7b3fbc91681919878ef0fb200048dcc67a5bcfa,2024-11-21T01:58:20.953000 +CVE-2013-5880,0,0,e85e34a17f69957f5af67a531b93c0971b497e696657667f8fa01c160278d3e1,2024-11-21T01:58:21.100000 +CVE-2013-5881,0,0,671e030b22d3541148c3c8d70b34fe1f6bf9aedd63707af8427dea7a2ad3dbd7,2024-11-21T01:58:21.207000 +CVE-2013-5882,0,0,e1675767c7599fbe8097dd183ad9b65042d65907c688cb81c3db29de77c22467,2024-11-21T01:58:21.340000 +CVE-2013-5883,0,0,474748fa06081a13c226a52e6b81c9c8cd492efdbee4e31ca9900fd87865d0c8,2024-11-21T01:58:21.457000 +CVE-2013-5884,0,0,49b80537adbd1448dd5aa0b50b6fa375834215a0251d4bf5c686ce5124bbe493,2024-11-21T01:58:21.567000 +CVE-2013-5885,0,0,500c97ead0e1d364c0c4e0110a77ab60761aab62c5cd8e4fac152a13f2dbe46b,2024-11-21T01:58:21.730000 +CVE-2013-5886,0,0,15c70bf0e38fe023a40ae218bf5fa04ba8a8c8adb09af107a7f1edeb2a0390cf,2024-11-21T01:58:21.843000 +CVE-2013-5887,0,0,c0a64861882bc3d56bdb187c5c159ae1d164c859fdddf04095b386ec74b0548e,2024-11-21T01:58:21.953000 +CVE-2013-5888,0,0,04ce7809add2b41033a0d3c2a98946dac5358362746fb53b28ddf67cbb7eb9a6,2024-11-21T01:58:22.090000 +CVE-2013-5889,0,0,22cbef7b8ef77ba732581e2b13e06cf5c19ce70cad5a4f90caec7abf12bfddc9,2024-11-21T01:58:22.247000 +CVE-2013-5890,0,0,a5436d9a9859e498e68d44389130dd7337c758ce6eb7b14429dbf85e58380e36,2024-11-21T01:58:22.380000 +CVE-2013-5891,0,0,8acce63575120f94776834d68b7b3efaf0a414e3d51e9946409e5089d0851634,2024-11-21T01:58:22.497000 +CVE-2013-5892,0,0,b57aee46202b4fbd02af669ced5b5f48caaaba0435b83fc98d685245720cf957,2024-11-21T01:58:22.653000 +CVE-2013-5893,0,0,daba31005d0a05f2289eb9d6f6d12b17dcb62139cf5c2123a1e4a4fa8721a88c,2024-11-21T01:58:22.777000 +CVE-2013-5894,0,0,5c8dc434100348b4cc16143acba7a2291bef0039fe132b5bdb99f0c0c05c6561,2024-11-21T01:58:22.917000 +CVE-2013-5895,0,0,b46e3883ae3e18421c67e1586d60664cf432fe7f1ba8062c281942bce4060cf1,2024-11-21T01:58:23.037000 +CVE-2013-5896,0,0,265c167619f7b9e76c3b3d54ed7c5abac222db8efa1a4a18d446df45d27272c9,2024-11-21T01:58:23.173000 +CVE-2013-5897,0,0,66f720cb490ec52f8659b0f4f1fe2d27479d1acb5af77a89ea6257d79d133caa,2024-11-21T01:58:23.337000 +CVE-2013-5898,0,0,52cbd3cea596db01619b790cf18f48b726bc187e1c86d074325995a755550a49,2024-11-21T01:58:23.453000 +CVE-2013-5899,0,0,acbb04bbdfb4b544e31f7e4b35714c4a932ad955b7de11d0c6c3301256d434ad,2024-11-21T01:58:23.600000 +CVE-2013-5900,0,0,2157291d5f9365136947f7755beaddeb7ee5741a394908b1b9342e6a20814cfa,2024-11-21T01:58:23.750000 +CVE-2013-5901,0,0,599cc566803dc76c1c7f30db90232287d8c445cb6553c73baf6aba61e094719b,2024-11-21T01:58:23.867000 +CVE-2013-5902,0,0,05dad8446e4ae74a889171682a00123113aee9a6206469681328599c917efc04,2024-11-21T01:58:23.983000 CVE-2013-5903,0,0,0e0e51685ecb8d73610b4117e318e1bed92a77a51a5196d69698875ba9be8c0d,2023-11-07T02:16:47.390000 -CVE-2013-5904,0,1,33fee6e396eb0d27f9b1b64a1c612fdd7189b9e924e3da96de80b325186f6c51,2024-11-21T01:58:24.140000 -CVE-2013-5905,0,1,4771327b5adf580f0ba22e7779a226bf3a23d350063d58b98792b585bdf632e3,2024-11-21T01:58:24.290000 -CVE-2013-5906,0,1,214aa8b5c3c0b8025b861ca0446323dba9e4719e5b71d6e08fce8a89bac6b735,2024-11-21T01:58:24.443000 -CVE-2013-5907,0,1,d4b38298351b2e4ea72ede9061c99d28fadae949910b3ef1388fc805d1e7b91f,2024-11-21T01:58:24.607000 -CVE-2013-5908,0,1,9e451a19e0a2dc81f454f42b4993817fed1997a33bb45d82a1cd2ab79d3e4240,2024-11-21T01:58:24.773000 -CVE-2013-5909,0,1,b72cfd2afa4af6a6be3bbb05d11dac06b22fdfcde3c0b7d34916ef05cee925f6,2024-11-21T01:58:24.930000 -CVE-2013-5910,0,1,7f3c44ea02191c1eda9c0fa8945e12c860d9a0b5300871657b65070f9c1e765b,2024-11-21T01:58:25.053000 -CVE-2013-5911,0,1,6c0a982502b649e828acfe9700bd442f51d8658d84ecb8025d7ffed37dc70d78,2024-11-21T01:58:25.230000 -CVE-2013-5912,0,1,4578d2c346c39eb47f0f545b903a7b2431a0d40de47bf46d1b90d3fb7490e53b,2024-11-21T01:58:25.373000 -CVE-2013-5913,0,1,725b149b5a1af682b18ddfb5b7e56e20f7749fd26802e7d31c5aaf3ab9c69b4b,2024-11-21T01:58:25.500000 -CVE-2013-5914,0,1,7a995170828ecc4d7ef76bf3ee34fb516797acc41abc3d9ceb14a4ae3ab6816c,2024-11-21T01:58:25.647000 -CVE-2013-5915,0,1,92960c918d7d7d0b85d47268fdf1f568ee9e95ee7427d1b6c9d4550d79bb88cb,2024-11-21T01:58:25.777000 -CVE-2013-5916,0,1,db98149447e5b1f23db78b6f4c3ec3b6c857b1a62e102f73eac56a84da77a230,2024-11-21T01:58:25.917000 -CVE-2013-5917,0,1,1a100856f248474524a47403c46798df0df12e2361c3a47cb21c7471713b2cba,2024-11-21T01:58:26.057000 -CVE-2013-5918,0,1,7de7d2a4f4c53dd5407768ba6c985015c431ae45d732fd455d8fd240d2e98dbc,2024-11-21T01:58:26.187000 +CVE-2013-5904,0,0,33fee6e396eb0d27f9b1b64a1c612fdd7189b9e924e3da96de80b325186f6c51,2024-11-21T01:58:24.140000 +CVE-2013-5905,0,0,4771327b5adf580f0ba22e7779a226bf3a23d350063d58b98792b585bdf632e3,2024-11-21T01:58:24.290000 +CVE-2013-5906,0,0,214aa8b5c3c0b8025b861ca0446323dba9e4719e5b71d6e08fce8a89bac6b735,2024-11-21T01:58:24.443000 +CVE-2013-5907,0,0,d4b38298351b2e4ea72ede9061c99d28fadae949910b3ef1388fc805d1e7b91f,2024-11-21T01:58:24.607000 +CVE-2013-5908,0,0,9e451a19e0a2dc81f454f42b4993817fed1997a33bb45d82a1cd2ab79d3e4240,2024-11-21T01:58:24.773000 +CVE-2013-5909,0,0,b72cfd2afa4af6a6be3bbb05d11dac06b22fdfcde3c0b7d34916ef05cee925f6,2024-11-21T01:58:24.930000 +CVE-2013-5910,0,0,7f3c44ea02191c1eda9c0fa8945e12c860d9a0b5300871657b65070f9c1e765b,2024-11-21T01:58:25.053000 +CVE-2013-5911,0,0,6c0a982502b649e828acfe9700bd442f51d8658d84ecb8025d7ffed37dc70d78,2024-11-21T01:58:25.230000 +CVE-2013-5912,0,0,4578d2c346c39eb47f0f545b903a7b2431a0d40de47bf46d1b90d3fb7490e53b,2024-11-21T01:58:25.373000 +CVE-2013-5913,0,0,725b149b5a1af682b18ddfb5b7e56e20f7749fd26802e7d31c5aaf3ab9c69b4b,2024-11-21T01:58:25.500000 +CVE-2013-5914,0,0,7a995170828ecc4d7ef76bf3ee34fb516797acc41abc3d9ceb14a4ae3ab6816c,2024-11-21T01:58:25.647000 +CVE-2013-5915,0,0,92960c918d7d7d0b85d47268fdf1f568ee9e95ee7427d1b6c9d4550d79bb88cb,2024-11-21T01:58:25.777000 +CVE-2013-5916,0,0,db98149447e5b1f23db78b6f4c3ec3b6c857b1a62e102f73eac56a84da77a230,2024-11-21T01:58:25.917000 +CVE-2013-5917,0,0,1a100856f248474524a47403c46798df0df12e2361c3a47cb21c7471713b2cba,2024-11-21T01:58:26.057000 +CVE-2013-5918,0,0,7de7d2a4f4c53dd5407768ba6c985015c431ae45d732fd455d8fd240d2e98dbc,2024-11-21T01:58:26.187000 CVE-2013-5919,0,0,4a24f0e6a0e23aa01f332959efe0ce6ea55c06674a77d3db287b65777db3ad56,2024-10-28T12:04:18.930000 -CVE-2013-5930,0,1,dd7588418d2aedc48992c3f2ec0f41ddb3f01f300d68c0732fc7324f5bd712a2,2024-11-21T01:58:26.477000 -CVE-2013-5931,0,1,b8d30dba9ca97de53957c874dae87de68e4955070e987c11be15b43eec92b1ae,2024-11-21T01:58:26.610000 -CVE-2013-5932,0,1,1edde580cb75214b890216e71c2084b9f09862f9f3c318b36661b952ad2efe35,2024-11-21T01:58:26.743000 -CVE-2013-5933,0,1,39dbe29717e8fc3e9daff6fd446063c0e5d56360ccf310721797bcffe9a3ccef,2024-11-21T01:58:26.873000 -CVE-2013-5934,0,1,6aa24865cc08628c1baf456f04a5348b65de2420db3f2402824ac907a69c7f8d,2024-11-21T01:58:27.003000 -CVE-2013-5935,0,1,6f5da5ab91fcd40236af1b3b770bf5fb6eb780937662bcb6a7733cb9b4e2a329,2024-11-21T01:58:27.137000 -CVE-2013-5936,0,1,8ebf6219eede209df271d0aefd198130be35cde2ce47ed60e38990e074040f4b,2024-11-21T01:58:27.270000 -CVE-2013-5937,0,1,1755ae0e18c45663aa3f900b156bbfafe85c7d00191340915b9db692b3b232cb,2024-11-21T01:58:27.397000 -CVE-2013-5938,0,1,19fba35731e626b6572068682e8bc7aa7d6250c384a10046706233f64a1dfefc,2024-11-21T01:58:27.533000 -CVE-2013-5939,0,1,cb888cef0fcf40a94641d8c1ab1bb3efa91a0360a3c6852b852dadd7d4b85d6a,2024-11-21T01:58:27.673000 -CVE-2013-5942,0,1,92fdf1d6518b7f288524d29a88001cbf8e78d32e3c1f1e3796fec3aafe0d67ba,2024-11-21T01:58:27.810000 -CVE-2013-5943,0,1,fb00730a4820c6fb19fe60a61c8e10b0f01a332322e7c5e47c35ff699351fea6,2024-11-21T01:58:27.943000 -CVE-2013-5944,0,1,7f184b533f9607b2c61b01e5a09636b11db63f0261c980e614b820f4bcba9027,2024-11-21T01:58:28.080000 +CVE-2013-5930,0,0,dd7588418d2aedc48992c3f2ec0f41ddb3f01f300d68c0732fc7324f5bd712a2,2024-11-21T01:58:26.477000 +CVE-2013-5931,0,0,b8d30dba9ca97de53957c874dae87de68e4955070e987c11be15b43eec92b1ae,2024-11-21T01:58:26.610000 +CVE-2013-5932,0,0,1edde580cb75214b890216e71c2084b9f09862f9f3c318b36661b952ad2efe35,2024-11-21T01:58:26.743000 +CVE-2013-5933,0,0,39dbe29717e8fc3e9daff6fd446063c0e5d56360ccf310721797bcffe9a3ccef,2024-11-21T01:58:26.873000 +CVE-2013-5934,0,0,6aa24865cc08628c1baf456f04a5348b65de2420db3f2402824ac907a69c7f8d,2024-11-21T01:58:27.003000 +CVE-2013-5935,0,0,6f5da5ab91fcd40236af1b3b770bf5fb6eb780937662bcb6a7733cb9b4e2a329,2024-11-21T01:58:27.137000 +CVE-2013-5936,0,0,8ebf6219eede209df271d0aefd198130be35cde2ce47ed60e38990e074040f4b,2024-11-21T01:58:27.270000 +CVE-2013-5937,0,0,1755ae0e18c45663aa3f900b156bbfafe85c7d00191340915b9db692b3b232cb,2024-11-21T01:58:27.397000 +CVE-2013-5938,0,0,19fba35731e626b6572068682e8bc7aa7d6250c384a10046706233f64a1dfefc,2024-11-21T01:58:27.533000 +CVE-2013-5939,0,0,cb888cef0fcf40a94641d8c1ab1bb3efa91a0360a3c6852b852dadd7d4b85d6a,2024-11-21T01:58:27.673000 +CVE-2013-5942,0,0,92fdf1d6518b7f288524d29a88001cbf8e78d32e3c1f1e3796fec3aafe0d67ba,2024-11-21T01:58:27.810000 +CVE-2013-5943,0,0,fb00730a4820c6fb19fe60a61c8e10b0f01a332322e7c5e47c35ff699351fea6,2024-11-21T01:58:27.943000 +CVE-2013-5944,0,0,7f184b533f9607b2c61b01e5a09636b11db63f0261c980e614b820f4bcba9027,2024-11-21T01:58:28.080000 CVE-2013-5945,0,0,ba6e2688db7a2b2d5b878985a1aa1d86306ef73df1f92110a75960c7c26d074c,2021-04-23T18:13:42.867000 -CVE-2013-5946,0,1,ef5a482976f90e35d372af01e89b93ee29b3f2f502784c813eb5bdeb5944fd10,2024-11-21T01:58:28.360000 -CVE-2013-5948,0,1,959d60a400c505b49113ae5859dd46b59dd68fb1a5f16267a0c66dca430a0266,2024-11-21T01:58:28.540000 -CVE-2013-5951,0,1,c356e21e50d740e8ccac33f6954355bab944d93e80a7d9f12f3764298f13a4dc,2024-11-21T01:58:28.680000 -CVE-2013-5952,0,1,9a919eb45b32e70b51acfe306e729b7cbc3362e85542f41b1ee82be4455b10bb,2024-11-21T01:58:28.817000 -CVE-2013-5953,0,1,85a195116040373a273809cc01174ea27ff5739cad88af2a4f11587f31100451,2024-11-21T01:58:28.950000 -CVE-2013-5954,0,1,38a7e24a54fa7f53fc7d8d9054764c96e1f76d0b0bee3ae1db06005337bc27b6,2024-11-21T01:58:29.080000 -CVE-2013-5955,0,1,e1712a0679d819c6fba47c2120f9cdce3d0ae6552e6266190dec2f7f0e17e1ef,2024-11-21T01:58:29.220000 -CVE-2013-5956,0,1,7f1cdac4a6a97b98ba0ddc7c4c90ec26a3e6d4d635bc20c13a03ca127d8322f1,2024-11-21T01:58:29.353000 -CVE-2013-5957,0,1,1db4379ab253fa021ec308791d7d5db2d43dd7121f4c76be3fb1358f03064fda,2024-11-21T01:58:29.477000 +CVE-2013-5946,0,0,ef5a482976f90e35d372af01e89b93ee29b3f2f502784c813eb5bdeb5944fd10,2024-11-21T01:58:28.360000 +CVE-2013-5948,0,0,959d60a400c505b49113ae5859dd46b59dd68fb1a5f16267a0c66dca430a0266,2024-11-21T01:58:28.540000 +CVE-2013-5951,0,0,c356e21e50d740e8ccac33f6954355bab944d93e80a7d9f12f3764298f13a4dc,2024-11-21T01:58:28.680000 +CVE-2013-5952,0,0,9a919eb45b32e70b51acfe306e729b7cbc3362e85542f41b1ee82be4455b10bb,2024-11-21T01:58:28.817000 +CVE-2013-5953,0,0,85a195116040373a273809cc01174ea27ff5739cad88af2a4f11587f31100451,2024-11-21T01:58:28.950000 +CVE-2013-5954,0,0,38a7e24a54fa7f53fc7d8d9054764c96e1f76d0b0bee3ae1db06005337bc27b6,2024-11-21T01:58:29.080000 +CVE-2013-5955,0,0,e1712a0679d819c6fba47c2120f9cdce3d0ae6552e6266190dec2f7f0e17e1ef,2024-11-21T01:58:29.220000 +CVE-2013-5956,0,0,7f1cdac4a6a97b98ba0ddc7c4c90ec26a3e6d4d635bc20c13a03ca127d8322f1,2024-11-21T01:58:29.353000 +CVE-2013-5957,0,0,1db4379ab253fa021ec308791d7d5db2d43dd7121f4c76be3fb1358f03064fda,2024-11-21T01:58:29.477000 CVE-2013-5958,0,0,f0c3cae3a7546f2aad802a1cdc625afed3e873de241387e301eee1e763f8f034,2014-12-29T22:55:14.317000 -CVE-2013-5959,0,1,cbc1980f4a8e01c3ec569f341220a0d75eac9ef60317da64193bdff6e68565a7,2024-11-21T01:58:29.750000 -CVE-2013-5960,0,1,d2954294be0661b39bc567ebf0fbcffb703fe4f09522bb948db59df9879002d8,2024-11-21T01:58:29.883000 -CVE-2013-5961,0,1,b8f9f50d9fcdf96d6535cc9f1098c0efe6039b0227254d0f23b13c31f9a940fc,2024-11-21T01:58:30.047000 -CVE-2013-5962,0,1,2b8f90eb8a632f71407319b0a52d44810a428a2b298db725d8991c53f1b187d2,2024-11-21T01:58:30.197000 -CVE-2013-5963,0,1,b74636135b35e240e707b6e64b3952a0278553999b14e4e8783d38505aead5cf,2024-11-21T01:58:30.367000 -CVE-2013-5964,0,1,1704899a1d03f3c3c3155ff93dfaf02abb96c78ad372388b802e748379290af2,2024-11-21T01:58:30.543000 -CVE-2013-5965,0,1,32e11db5b540aeb65c89a05ebb0f536139439bc1e5d408e586cf3efcd306e829,2024-11-21T01:58:30.687000 -CVE-2013-5966,0,1,58759d8bb42082b0c9bf408c66afa8b3e194d7d76a19ad996c1c72d6b9042986,2024-11-21T01:58:30.827000 -CVE-2013-5967,0,1,933da78f127de9ca8e7c69ee3ad9207d919ff6d77ea299a3939d05ed2a119550,2024-11-21T01:58:30.967000 -CVE-2013-5968,0,1,f431546a7691a2534eee8537eadc46f4902e86dd75da567eb764410e4cc125f3,2024-11-21T01:58:31.107000 -CVE-2013-5970,0,1,9dcc9becbd843c10366991ab9447be6cda001f8d671abdf7eb90ca2cedcb5af0,2024-11-21T01:58:31.243000 -CVE-2013-5971,0,1,0996c1cee2b1098be6e8fb86ae52a070c0295a75ae5d968fa940c210ab877c97,2024-11-21T01:58:31.390000 -CVE-2013-5972,0,1,897658ca699c734fcfff932aa832f145cb2d04d32f6c338300f838e56452bc4d,2024-11-21T01:58:31.527000 -CVE-2013-5973,0,1,71eff428344775d04308e90c2ae7df3bdf20512912b76eee61d913d271fa687d,2024-11-21T01:58:31.660000 +CVE-2013-5959,0,0,cbc1980f4a8e01c3ec569f341220a0d75eac9ef60317da64193bdff6e68565a7,2024-11-21T01:58:29.750000 +CVE-2013-5960,0,0,d2954294be0661b39bc567ebf0fbcffb703fe4f09522bb948db59df9879002d8,2024-11-21T01:58:29.883000 +CVE-2013-5961,0,0,b8f9f50d9fcdf96d6535cc9f1098c0efe6039b0227254d0f23b13c31f9a940fc,2024-11-21T01:58:30.047000 +CVE-2013-5962,0,0,2b8f90eb8a632f71407319b0a52d44810a428a2b298db725d8991c53f1b187d2,2024-11-21T01:58:30.197000 +CVE-2013-5963,0,0,b74636135b35e240e707b6e64b3952a0278553999b14e4e8783d38505aead5cf,2024-11-21T01:58:30.367000 +CVE-2013-5964,0,0,1704899a1d03f3c3c3155ff93dfaf02abb96c78ad372388b802e748379290af2,2024-11-21T01:58:30.543000 +CVE-2013-5965,0,0,32e11db5b540aeb65c89a05ebb0f536139439bc1e5d408e586cf3efcd306e829,2024-11-21T01:58:30.687000 +CVE-2013-5966,0,0,58759d8bb42082b0c9bf408c66afa8b3e194d7d76a19ad996c1c72d6b9042986,2024-11-21T01:58:30.827000 +CVE-2013-5967,0,0,933da78f127de9ca8e7c69ee3ad9207d919ff6d77ea299a3939d05ed2a119550,2024-11-21T01:58:30.967000 +CVE-2013-5968,0,0,f431546a7691a2534eee8537eadc46f4902e86dd75da567eb764410e4cc125f3,2024-11-21T01:58:31.107000 +CVE-2013-5970,0,0,9dcc9becbd843c10366991ab9447be6cda001f8d671abdf7eb90ca2cedcb5af0,2024-11-21T01:58:31.243000 +CVE-2013-5971,0,0,0996c1cee2b1098be6e8fb86ae52a070c0295a75ae5d968fa940c210ab877c97,2024-11-21T01:58:31.390000 +CVE-2013-5972,0,0,897658ca699c734fcfff932aa832f145cb2d04d32f6c338300f838e56452bc4d,2024-11-21T01:58:31.527000 +CVE-2013-5973,0,0,71eff428344775d04308e90c2ae7df3bdf20512912b76eee61d913d271fa687d,2024-11-21T01:58:31.660000 CVE-2013-5974,0,0,45c1660f5e5f2dcc07fce5d6ce86c95ad583694e5bac94582f8d7bfc334ce313,2023-11-07T02:16:48.173000 -CVE-2013-5975,0,1,bf574e437886c5d9bbf10bd1087d1254d603e5900f316194425e3af6b1dbc752,2024-11-21T01:58:31.823000 -CVE-2013-5976,0,1,40193cdbc3f16d091cb00c8e595c6cdda9668f8c8e9beaf9c1bd5734b669a17a,2024-11-21T01:58:31.960000 -CVE-2013-5977,0,1,158c8ef0e3b343d7fca6bef8c9240a74aed77fb9c26e45898995ac26885426e9,2024-11-21T01:58:32.097000 +CVE-2013-5975,0,0,bf574e437886c5d9bbf10bd1087d1254d603e5900f316194425e3af6b1dbc752,2024-11-21T01:58:31.823000 +CVE-2013-5976,0,0,40193cdbc3f16d091cb00c8e595c6cdda9668f8c8e9beaf9c1bd5734b669a17a,2024-11-21T01:58:31.960000 +CVE-2013-5977,0,0,158c8ef0e3b343d7fca6bef8c9240a74aed77fb9c26e45898995ac26885426e9,2024-11-21T01:58:32.097000 CVE-2013-5978,0,0,7d25676df76e5acb4223d7d6cb9a0007b4bd447b573eed0e88602f5fb20e1029,2019-12-16T17:49:41.160000 -CVE-2013-5979,0,1,09f956fb01fd524a5f4e2d74dff19d494cbe6c317938f6dad0ae4429ed5e7d5a,2024-11-21T01:58:32.453000 -CVE-2013-5983,0,1,a25fa404110cf69b2b460e4fe35be717797452b8e1a6420b6cb54f304a9ed57c,2024-11-21T01:58:32.950000 -CVE-2013-5984,0,1,c7fbc2a6efbfe03499f4fde1a710cee059be06a7e3fb359f272c1525bb937bcb,2024-11-21T01:58:33.207000 -CVE-2013-5986,0,1,a26eca10921283b723a4e9f8ada706cc384cdbc1126469ce02b73eb4c6484588,2024-11-21T01:58:33.627000 -CVE-2013-5987,0,1,e6b8a9f7e1b26bdbaedf7f163580480519c3ccef5f2d0e7b5e22acd6a168836e,2024-11-21T01:58:33.827000 +CVE-2013-5979,0,0,09f956fb01fd524a5f4e2d74dff19d494cbe6c317938f6dad0ae4429ed5e7d5a,2024-11-21T01:58:32.453000 +CVE-2013-5983,0,0,a25fa404110cf69b2b460e4fe35be717797452b8e1a6420b6cb54f304a9ed57c,2024-11-21T01:58:32.950000 +CVE-2013-5984,0,0,c7fbc2a6efbfe03499f4fde1a710cee059be06a7e3fb359f272c1525bb937bcb,2024-11-21T01:58:33.207000 +CVE-2013-5986,0,0,a26eca10921283b723a4e9f8ada706cc384cdbc1126469ce02b73eb4c6484588,2024-11-21T01:58:33.627000 +CVE-2013-5987,0,0,e6b8a9f7e1b26bdbaedf7f163580480519c3ccef5f2d0e7b5e22acd6a168836e,2024-11-21T01:58:33.827000 CVE-2013-5988,0,0,c69b2e77f17ae6556ccecd738ee8cad9ccb760f4b6e35e6b69305e17448d8cd3,2020-02-12T16:42:58.430000 CVE-2013-5989,0,0,8a29ee58c1cf243b8b5830d33b2108643cb7a0f1bd23cf1a8036f367576af667,2023-11-07T02:16:48.603000 -CVE-2013-5990,0,1,ac1e8192472d9e7f32e6222b2730d7ba85d9c400e43b8406db7ac83bbdc9c097,2024-11-21T01:58:34.227000 -CVE-2013-5991,0,1,732a775444325058d5f6f443fd430dc145153bab6166dd812a2fa04c0cd1e46e,2024-11-21T01:58:34.370000 -CVE-2013-5992,0,1,83c2ddc884ae77ecd0e66fd953e1723515281e0f977117f7585650c05d53ec3d,2024-11-21T01:58:34.500000 -CVE-2013-5993,0,1,c3478d2b24a72b400616346fd208e5ececd489910b9ce1bfa03facda6dc7fc44,2024-11-21T01:58:34.647000 -CVE-2013-5994,0,1,74dacc864b48789c1d1e87376284d0ccc80d9e06521985b541ca3d5d38ccb395,2024-11-21T01:58:34.790000 -CVE-2013-5995,0,1,0473d02afd4ef3239b5c3877f41477e29ce4092744bb714659d9d5a98915a35c,2024-11-21T01:58:34.943000 -CVE-2013-5996,0,1,7abbe5ba288f5052b14a25210836216e3f6c1958dfa9171cc40f129c71ad35c3,2024-11-21T01:58:35.103000 -CVE-2013-5997,0,1,a10f8c0005d3c85b39108e78a614ba64017cd5feb9fe019fea72de39fd44cfb3,2024-11-21T01:58:35.247000 -CVE-2013-5998,0,1,cd8907718b99782add02ca793a3cd54fddbcd6e8ea9adec23baa1c735728734d,2024-11-21T01:58:35.380000 -CVE-2013-5999,0,1,58904d6aa2630d675602427d51d45c422c0e1a3977951a99156b2fef5c5fda7b,2024-11-21T01:58:35.523000 -CVE-2013-6000,0,1,9eb9f17d28bcf0b1c3351ca602e8eadf4882563f49430f9e2298cda6e82459f1,2024-11-21T01:58:35.667000 -CVE-2013-6001,0,1,c941491a07b9d6a008f7ad5ea009f7674aba1687a8e0b7cc29f382d9c69cdd34,2024-11-21T01:58:35.810000 -CVE-2013-6002,0,1,150414292e7f8d83ff58ea0ca958245ad98b1eeff6eb63c1b247310293b5fbea,2024-11-21T01:58:35.967000 -CVE-2013-6003,0,1,8d4be55b10f21c54db438326b75c0fc409621f01635c8220ef2269bc94461f95,2024-11-21T01:58:36.127000 -CVE-2013-6004,0,1,c8f7e0bf800dfcc9e1c7caf48e1c2f071aa69f8b9766cd9b43982b7313fffe93,2024-11-21T01:58:36.287000 -CVE-2013-6005,0,1,a32f55d147490639824e9d9f28da5a8c840fa224a3b3cf57421083b0959f6382,2024-11-21T01:58:36.453000 -CVE-2013-6006,0,1,a7d8c8337cb92f92ae41bcb1b609149102a83e1f2d8b12d213ec7a574af36181,2024-11-21T01:58:36.610000 +CVE-2013-5990,0,0,ac1e8192472d9e7f32e6222b2730d7ba85d9c400e43b8406db7ac83bbdc9c097,2024-11-21T01:58:34.227000 +CVE-2013-5991,0,0,732a775444325058d5f6f443fd430dc145153bab6166dd812a2fa04c0cd1e46e,2024-11-21T01:58:34.370000 +CVE-2013-5992,0,0,83c2ddc884ae77ecd0e66fd953e1723515281e0f977117f7585650c05d53ec3d,2024-11-21T01:58:34.500000 +CVE-2013-5993,0,0,c3478d2b24a72b400616346fd208e5ececd489910b9ce1bfa03facda6dc7fc44,2024-11-21T01:58:34.647000 +CVE-2013-5994,0,0,74dacc864b48789c1d1e87376284d0ccc80d9e06521985b541ca3d5d38ccb395,2024-11-21T01:58:34.790000 +CVE-2013-5995,0,0,0473d02afd4ef3239b5c3877f41477e29ce4092744bb714659d9d5a98915a35c,2024-11-21T01:58:34.943000 +CVE-2013-5996,0,0,7abbe5ba288f5052b14a25210836216e3f6c1958dfa9171cc40f129c71ad35c3,2024-11-21T01:58:35.103000 +CVE-2013-5997,0,0,a10f8c0005d3c85b39108e78a614ba64017cd5feb9fe019fea72de39fd44cfb3,2024-11-21T01:58:35.247000 +CVE-2013-5998,0,0,cd8907718b99782add02ca793a3cd54fddbcd6e8ea9adec23baa1c735728734d,2024-11-21T01:58:35.380000 +CVE-2013-5999,0,0,58904d6aa2630d675602427d51d45c422c0e1a3977951a99156b2fef5c5fda7b,2024-11-21T01:58:35.523000 +CVE-2013-6000,0,0,9eb9f17d28bcf0b1c3351ca602e8eadf4882563f49430f9e2298cda6e82459f1,2024-11-21T01:58:35.667000 +CVE-2013-6001,0,0,c941491a07b9d6a008f7ad5ea009f7674aba1687a8e0b7cc29f382d9c69cdd34,2024-11-21T01:58:35.810000 +CVE-2013-6002,0,0,150414292e7f8d83ff58ea0ca958245ad98b1eeff6eb63c1b247310293b5fbea,2024-11-21T01:58:35.967000 +CVE-2013-6003,0,0,8d4be55b10f21c54db438326b75c0fc409621f01635c8220ef2269bc94461f95,2024-11-21T01:58:36.127000 +CVE-2013-6004,0,0,c8f7e0bf800dfcc9e1c7caf48e1c2f071aa69f8b9766cd9b43982b7313fffe93,2024-11-21T01:58:36.287000 +CVE-2013-6005,0,0,a32f55d147490639824e9d9f28da5a8c840fa224a3b3cf57421083b0959f6382,2024-11-21T01:58:36.453000 +CVE-2013-6006,0,0,a7d8c8337cb92f92ae41bcb1b609149102a83e1f2d8b12d213ec7a574af36181,2024-11-21T01:58:36.610000 CVE-2013-6007,0,0,dd3e5bfaec90f2ede285329a55cf6d273c6d661b02781c6efc40f9d567382220,2023-11-07T02:16:49.020000 CVE-2013-6008,0,0,1a94181cae78b954cac8e2f4dbaab1a0998a9b12b2a28fac3e3b8fc5b139eb7a,2023-11-07T02:16:49.240000 -CVE-2013-6009,0,1,ab5e0886dc440f168e395119f609c3aa520f4495c58ef354d85b4a261b5f200d,2024-11-21T01:58:36.773000 -CVE-2013-6010,0,1,1dfcbd6b6cdfb0d3b972b55dd75d23100680844a00fb1c8ed9fa626bda5933b4,2024-11-21T01:58:36.900000 -CVE-2013-6011,0,1,bf458f28d40ed1b30a0f0f65cc3e3cb08a7301432f656e63a2011f980ff22dbd,2024-11-21T01:58:37.033000 -CVE-2013-6012,0,1,661d998f96c8e5f2b23a42695513f610227b0cceab964142c9a2987d01193c2f,2024-11-21T01:58:37.167000 -CVE-2013-6013,0,1,4e4411ceffa8e7f1492f3f5f5a391caa9bc7222528e85be8d174561f968426fc,2024-11-21T01:58:37.300000 -CVE-2013-6014,0,1,39da2f4addd2fe1f71a7d89e8491d02b2b100b9f2bc7bac6a06a1c2dbc4f813f,2024-11-21T01:58:37.443000 -CVE-2013-6015,0,1,e8a2434e211ac98d8c4ceed0e553fec8d05fbcfd6d8e8b9ad881aa11b4e0af70,2024-11-21T01:58:37.577000 -CVE-2013-6016,0,1,5a9256c69c4b9b85abd7114c25d95ad6e001f2ca8fa13283b8e71c4014c9cb2c,2024-11-21T01:58:37.727000 -CVE-2013-6017,0,1,45ec9ae84c901b556bb6539953cc1ec6d423fe29dbc3732610dd32e1b6c8ec2b,2024-11-21T01:58:37.847000 -CVE-2013-6018,0,1,6558167f5eed99e7428f32b905f89a4357cfc934adcf86b861a5e7089c7a95b0,2024-11-21T01:58:37.957000 -CVE-2013-6019,0,1,39d525969a938950fc19350fd0eb7973458504ad2824b024bfd39ec5629126df,2024-11-21T01:58:38.057000 -CVE-2013-6020,0,1,99604dc36453ea70b4622da79b87abc5f0b2fe3498a6751409f18e4982902efe,2024-11-21T01:58:38.150000 -CVE-2013-6021,0,1,4bad8ee290a0ead4256c3769d33d55710a98f88dae73361d3f8e4e2a9d946693,2024-11-21T01:58:38.240000 +CVE-2013-6009,0,0,ab5e0886dc440f168e395119f609c3aa520f4495c58ef354d85b4a261b5f200d,2024-11-21T01:58:36.773000 +CVE-2013-6010,0,0,1dfcbd6b6cdfb0d3b972b55dd75d23100680844a00fb1c8ed9fa626bda5933b4,2024-11-21T01:58:36.900000 +CVE-2013-6011,0,0,bf458f28d40ed1b30a0f0f65cc3e3cb08a7301432f656e63a2011f980ff22dbd,2024-11-21T01:58:37.033000 +CVE-2013-6012,0,0,661d998f96c8e5f2b23a42695513f610227b0cceab964142c9a2987d01193c2f,2024-11-21T01:58:37.167000 +CVE-2013-6013,0,0,4e4411ceffa8e7f1492f3f5f5a391caa9bc7222528e85be8d174561f968426fc,2024-11-21T01:58:37.300000 +CVE-2013-6014,0,0,39da2f4addd2fe1f71a7d89e8491d02b2b100b9f2bc7bac6a06a1c2dbc4f813f,2024-11-21T01:58:37.443000 +CVE-2013-6015,0,0,e8a2434e211ac98d8c4ceed0e553fec8d05fbcfd6d8e8b9ad881aa11b4e0af70,2024-11-21T01:58:37.577000 +CVE-2013-6016,0,0,5a9256c69c4b9b85abd7114c25d95ad6e001f2ca8fa13283b8e71c4014c9cb2c,2024-11-21T01:58:37.727000 +CVE-2013-6017,0,0,45ec9ae84c901b556bb6539953cc1ec6d423fe29dbc3732610dd32e1b6c8ec2b,2024-11-21T01:58:37.847000 +CVE-2013-6018,0,0,6558167f5eed99e7428f32b905f89a4357cfc934adcf86b861a5e7089c7a95b0,2024-11-21T01:58:37.957000 +CVE-2013-6019,0,0,39d525969a938950fc19350fd0eb7973458504ad2824b024bfd39ec5629126df,2024-11-21T01:58:38.057000 +CVE-2013-6020,0,0,99604dc36453ea70b4622da79b87abc5f0b2fe3498a6751409f18e4982902efe,2024-11-21T01:58:38.150000 +CVE-2013-6021,0,0,4bad8ee290a0ead4256c3769d33d55710a98f88dae73361d3f8e4e2a9d946693,2024-11-21T01:58:38.240000 CVE-2013-6022,0,0,2d620c9e5aa704da3afe309e9783e1009eba9307b20f829d8081e7cb124f8fa0,2020-02-18T21:51:18.337000 -CVE-2013-6023,0,1,fb5bf8533ec80729d823ac510b67fb2bc680a034ee742e93ca35fddf2349103f,2024-11-21T01:58:38.450000 -CVE-2013-6024,0,1,652ed9ca39d7afa99c523e1d97195f673071cd7ebf794947731967dc87473617,2024-11-21T01:58:38.553000 -CVE-2013-6025,0,1,dbe48de7ab34eae452a16d3ebcd1ce43bc7f30f135ae72cebc1be51123052036,2024-11-21T01:58:38.663000 -CVE-2013-6026,0,1,f9caafce37a1a6de32e151c15e0056d4336e90d5c3331204008f6e4e621c11bc,2024-11-21T01:58:38.767000 -CVE-2013-6027,0,1,0715976a243bc1392d96e905e37ce337a55436630711fb1150020fd39ea3e87c,2024-11-21T01:58:38.873000 -CVE-2013-6028,0,1,6681edfa980f6612428114f7b87c4db5c89b7b4c46c25704f8ea9cf8d16049d9,2024-11-21T01:58:38.973000 -CVE-2013-6029,0,1,32b77de3a68d4fca4a6e8f26df4eaccf8cc437ef284e41afa5a39c588fa23159,2024-11-21T01:58:39.070000 -CVE-2013-6030,0,1,bc1cf88e6f35c8efca6f79e41c16487c946de8d081db438bff80b530ff335de2,2024-11-21T01:58:39.170000 -CVE-2013-6031,0,1,e5c119bf33e15faef0eece5fc8441ca6e49a34ff90ab63370b6972b29878e6c3,2024-11-21T01:58:39.267000 -CVE-2013-6032,0,1,f5bdf132688c8c7aa229baa5a9e1b0717a96a3e7054fd689a1c5f3852d38f5bb,2024-11-21T01:58:39.373000 -CVE-2013-6033,0,1,1654cb397719764d668f68e66e62ea43f7e9c7c438eabbf0ff2ef545bc956b3f,2024-11-21T01:58:39.473000 -CVE-2013-6034,0,1,d851cce899e0cf9539d3fd407391c431b0e1b6a4f021d168c57e1822b1c90725,2024-11-21T01:58:39.573000 -CVE-2013-6035,0,1,a076752093df484cff22e9a2e144028675200f9d54494dc0bb05ad457c707a12,2024-11-21T01:58:39.673000 -CVE-2013-6037,0,1,5deb0ee253659200786ace30c75fc337ebfad15cba7b743c43d015233cb1ff95,2024-11-21T01:58:39.770000 -CVE-2013-6038,0,1,dc9f0bb43a4d2c84dc70908d1e0242b3e102cf4dcaec0f0c6710e5f83ee7f1b3,2024-11-21T01:58:39.870000 -CVE-2013-6039,0,1,ff0c066559d7998c90c814fc324db54c16941150fef303b88872511242cb1a31,2024-11-21T01:58:39.973000 -CVE-2013-6040,0,1,1ad4d1376ab5a7affbd6cd4b402b460750bd56286fee9cef23bb9e7a7fb79f99,2024-11-21T01:58:40.077000 +CVE-2013-6023,0,0,fb5bf8533ec80729d823ac510b67fb2bc680a034ee742e93ca35fddf2349103f,2024-11-21T01:58:38.450000 +CVE-2013-6024,0,0,652ed9ca39d7afa99c523e1d97195f673071cd7ebf794947731967dc87473617,2024-11-21T01:58:38.553000 +CVE-2013-6025,0,0,dbe48de7ab34eae452a16d3ebcd1ce43bc7f30f135ae72cebc1be51123052036,2024-11-21T01:58:38.663000 +CVE-2013-6026,0,0,f9caafce37a1a6de32e151c15e0056d4336e90d5c3331204008f6e4e621c11bc,2024-11-21T01:58:38.767000 +CVE-2013-6027,0,0,0715976a243bc1392d96e905e37ce337a55436630711fb1150020fd39ea3e87c,2024-11-21T01:58:38.873000 +CVE-2013-6028,0,0,6681edfa980f6612428114f7b87c4db5c89b7b4c46c25704f8ea9cf8d16049d9,2024-11-21T01:58:38.973000 +CVE-2013-6029,0,0,32b77de3a68d4fca4a6e8f26df4eaccf8cc437ef284e41afa5a39c588fa23159,2024-11-21T01:58:39.070000 +CVE-2013-6030,0,0,bc1cf88e6f35c8efca6f79e41c16487c946de8d081db438bff80b530ff335de2,2024-11-21T01:58:39.170000 +CVE-2013-6031,0,0,e5c119bf33e15faef0eece5fc8441ca6e49a34ff90ab63370b6972b29878e6c3,2024-11-21T01:58:39.267000 +CVE-2013-6032,0,0,f5bdf132688c8c7aa229baa5a9e1b0717a96a3e7054fd689a1c5f3852d38f5bb,2024-11-21T01:58:39.373000 +CVE-2013-6033,0,0,1654cb397719764d668f68e66e62ea43f7e9c7c438eabbf0ff2ef545bc956b3f,2024-11-21T01:58:39.473000 +CVE-2013-6034,0,0,d851cce899e0cf9539d3fd407391c431b0e1b6a4f021d168c57e1822b1c90725,2024-11-21T01:58:39.573000 +CVE-2013-6035,0,0,a076752093df484cff22e9a2e144028675200f9d54494dc0bb05ad457c707a12,2024-11-21T01:58:39.673000 +CVE-2013-6037,0,0,5deb0ee253659200786ace30c75fc337ebfad15cba7b743c43d015233cb1ff95,2024-11-21T01:58:39.770000 +CVE-2013-6038,0,0,dc9f0bb43a4d2c84dc70908d1e0242b3e102cf4dcaec0f0c6710e5f83ee7f1b3,2024-11-21T01:58:39.870000 +CVE-2013-6039,0,0,ff0c066559d7998c90c814fc324db54c16941150fef303b88872511242cb1a31,2024-11-21T01:58:39.973000 +CVE-2013-6040,0,0,1ad4d1376ab5a7affbd6cd4b402b460750bd56286fee9cef23bb9e7a7fb79f99,2024-11-21T01:58:40.077000 CVE-2013-6041,0,0,66b1276a1ed99c3b9afde3354a4acf095029c592a80b2b9b0a32c9280811a520,2023-11-07T02:16:49.753000 -CVE-2013-6042,0,1,6c6b4631aa6071f497117dd9c73b02507b2b2968048a1e66dcea96f64e50c0fd,2024-11-21T01:58:40.443000 +CVE-2013-6042,0,0,6c6b4631aa6071f497117dd9c73b02507b2b2968048a1e66dcea96f64e50c0fd,2024-11-21T01:58:40.443000 CVE-2013-6043,0,0,40fc49befa81a86e789c7fafa3e9aa4decc75838002c98d756300127b6c72bb8,2023-11-07T02:16:49.867000 -CVE-2013-6044,0,1,42fc090d2352910e712748bc0c22fbd5c6e9138e7e0bb97d10d1fea70692e314,2024-11-21T01:58:40.717000 -CVE-2013-6045,0,1,eeed1adb64c8ba30c095b4ee59d234a6f3a4592137282c5214d3d28c710a6e82,2024-11-21T01:58:40.883000 -CVE-2013-6047,0,1,b86fafc8ff1e011c4c237654fc9c4fd78dfbe9092e5759e08ed68dff4a02e133,2024-11-21T01:58:41.027000 -CVE-2013-6048,0,1,e961e513c3c8baa872e35c2d69a0855239b8b85549b9b7d11285a2a6d71f1c24,2024-11-21T01:58:41.170000 +CVE-2013-6044,0,0,42fc090d2352910e712748bc0c22fbd5c6e9138e7e0bb97d10d1fea70692e314,2024-11-21T01:58:40.717000 +CVE-2013-6045,0,0,eeed1adb64c8ba30c095b4ee59d234a6f3a4592137282c5214d3d28c710a6e82,2024-11-21T01:58:40.883000 +CVE-2013-6047,0,0,b86fafc8ff1e011c4c237654fc9c4fd78dfbe9092e5759e08ed68dff4a02e133,2024-11-21T01:58:41.027000 +CVE-2013-6048,0,0,e961e513c3c8baa872e35c2d69a0855239b8b85549b9b7d11285a2a6d71f1c24,2024-11-21T01:58:41.170000 CVE-2013-6049,0,0,5b05e9b7e6f4a9563a5de8b3dd861dc63a50445589b1ce98453f84903f2fcd93,2017-11-08T14:40:26.853000 -CVE-2013-6050,0,1,fb87891ffb4915e3d1af54d882a4d69a0c84609aa88d9b634185ca1c633ab801,2024-11-21T01:58:41.450000 -CVE-2013-6051,0,1,eec38c9c6d30c0c4a99b6a7844a6b23e9765bcab013054148d7d92f2aa86242c,2024-11-21T01:58:41.583000 -CVE-2013-6052,0,1,8adb03fe9a2a17a095b5cede2a677e0445d43e9ecf5e9f980fa6a4b6843887d0,2024-11-21T01:58:41.720000 -CVE-2013-6053,0,1,25b665683db575ac85e523f9325d5830cd048dd6463a3e6244e9556494944d90,2024-11-21T01:58:41.857000 -CVE-2013-6054,0,1,2c52ad56705fb7b1e4cf4457fc5998c0fbb4287846aa62a94129503ec66bc15f,2024-11-21T01:58:41.987000 +CVE-2013-6050,0,0,fb87891ffb4915e3d1af54d882a4d69a0c84609aa88d9b634185ca1c633ab801,2024-11-21T01:58:41.450000 +CVE-2013-6051,0,0,eec38c9c6d30c0c4a99b6a7844a6b23e9765bcab013054148d7d92f2aa86242c,2024-11-21T01:58:41.583000 +CVE-2013-6052,0,0,8adb03fe9a2a17a095b5cede2a677e0445d43e9ecf5e9f980fa6a4b6843887d0,2024-11-21T01:58:41.720000 +CVE-2013-6053,0,0,25b665683db575ac85e523f9325d5830cd048dd6463a3e6244e9556494944d90,2024-11-21T01:58:41.857000 +CVE-2013-6054,0,0,2c52ad56705fb7b1e4cf4457fc5998c0fbb4287846aa62a94129503ec66bc15f,2024-11-21T01:58:41.987000 CVE-2013-6055,0,0,6f99c918420083697b804426b43a6e482c6e08440fe2f1c1915acfde0a6e7180,2023-11-07T02:16:50.050000 CVE-2013-6056,0,0,d807a6981e45b70c25b418ae820fbd8c3ae486e91c9a4f0a824941a52ac28eaf,2020-01-29T19:05:47.937000 -CVE-2013-6058,0,1,bbc8916df4e129ed46faf02c73b7dc82c8cdfcd4f3f933a1dcf68467d8927c66,2024-11-21T01:58:42.273000 -CVE-2013-6074,0,1,b05ad6fbedfac072c55eccb62c1396ed58ffe2d186c736475763d771b14db203,2024-11-21T01:58:42.413000 -CVE-2013-6075,0,1,1cea54ff7f2e735562e93c1378e57c3b1ed2e8349d946b2ef4a6e454b830502a,2024-11-21T01:58:42.553000 -CVE-2013-6076,0,1,b2c62826518477d3f0e1d488b1737cf8e239bc3ca1d003ef297244124a4ff703,2024-11-21T01:58:42.700000 -CVE-2013-6077,0,1,4b4c2cfd4471d3dd6936b22f627a12ec8e55e252ee95ec44372de4d8675592c8,2024-11-21T01:58:42.840000 +CVE-2013-6058,0,0,bbc8916df4e129ed46faf02c73b7dc82c8cdfcd4f3f933a1dcf68467d8927c66,2024-11-21T01:58:42.273000 +CVE-2013-6074,0,0,b05ad6fbedfac072c55eccb62c1396ed58ffe2d186c736475763d771b14db203,2024-11-21T01:58:42.413000 +CVE-2013-6075,0,0,1cea54ff7f2e735562e93c1378e57c3b1ed2e8349d946b2ef4a6e454b830502a,2024-11-21T01:58:42.553000 +CVE-2013-6076,0,0,b2c62826518477d3f0e1d488b1737cf8e239bc3ca1d003ef297244124a4ff703,2024-11-21T01:58:42.700000 +CVE-2013-6077,0,0,4b4c2cfd4471d3dd6936b22f627a12ec8e55e252ee95ec44372de4d8675592c8,2024-11-21T01:58:42.840000 CVE-2013-6078,0,0,436577edd8640cca0189dddf461cfff0f439ef2e7089204b816c4af4c4dcd149,2014-06-19T16:10:32.260000 -CVE-2013-6079,0,1,84d1b90723364a82bc2c2c4bc786886d2912bbae4a14544f1b8c074abfcdf41d,2024-11-21T01:58:43.077000 +CVE-2013-6079,0,0,84d1b90723364a82bc2c2c4bc786886d2912bbae4a14544f1b8c074abfcdf41d,2024-11-21T01:58:43.077000 CVE-2013-6080,0,0,ecd09559e7db414eaef3654b1f39bf316540e0b14b169600d1e6bf49aa3184b0,2023-11-07T02:16:50.137000 CVE-2013-6081,0,0,82ca38da12ba80df5f33a3f98c209d220e48b75b9d56dc0c7aed3885686f9efd,2023-11-07T02:16:50.370000 CVE-2013-6082,0,0,f3bf1ab566d562f0ff56ebe9d41d7e6445259852335bba931a18d6e3dd5c2914,2023-11-07T02:16:50.610000 @@ -63286,20 +63286,20 @@ CVE-2013-6101,0,0,ac4f86033757a34c64701a388d094f5477a03036dc2eae055ca2f85eedb9df CVE-2013-6102,0,0,35a1402e4ea781a04b16f98a51695f50422e13d6d92e4f2c9e9fab12e271d37f,2023-11-07T02:16:55.417000 CVE-2013-6103,0,0,6632685670cb634cfdbf48044a4ddba1f93bbe11fa3afd08e641fe1695c442ce,2023-11-07T02:16:55.643000 CVE-2013-6104,0,0,4c52dd365d33f834337cc1d362811c1636588db618e04f9952c9b90780b16c7a,2023-11-07T02:16:55.880000 -CVE-2013-6111,0,1,c2448618ccb1bbadff857f52394396d8ebc5a01b1d107cb7d4b037cc328d4002,2024-11-21T01:58:43.533000 -CVE-2013-6114,0,1,047344988b1639a736ac9b90e91c2a9d8bdaa18686b3c51e1a3c44f4216430cc,2024-11-21T01:58:43.673000 +CVE-2013-6111,0,0,c2448618ccb1bbadff857f52394396d8ebc5a01b1d107cb7d4b037cc328d4002,2024-11-21T01:58:43.533000 +CVE-2013-6114,0,0,047344988b1639a736ac9b90e91c2a9d8bdaa18686b3c51e1a3c44f4216430cc,2024-11-21T01:58:43.673000 CVE-2013-6117,0,0,f1231d497128abd4386bf6fc58fbc3b9b961969f6861cd0970ab5a599a94f46b,2014-07-14T13:33:28.517000 -CVE-2013-6122,0,1,bbfaf2073b31c3dc8bcd8e4b3fb46b5cc4f6106b6844073be90ffa52a01e4750,2024-11-21T01:58:43.937000 -CVE-2013-6123,0,1,bdf4b28511a713ad0322320b78a5bb4cd563e9cc699fe35feecc3ec78376aeb7,2024-11-21T01:58:44.063000 +CVE-2013-6122,0,0,bbfaf2073b31c3dc8bcd8e4b3fb46b5cc4f6106b6844073be90ffa52a01e4750,2024-11-21T01:58:43.937000 +CVE-2013-6123,0,0,bdf4b28511a713ad0322320b78a5bb4cd563e9cc699fe35feecc3ec78376aeb7,2024-11-21T01:58:44.063000 CVE-2013-6124,0,0,bbee03a707c63e7cd2167973548966f23ea56491d9e5127c6655dcb945573891,2014-09-02T18:51:33.363000 CVE-2013-6125,0,0,c03a9562aa12ccc0b0ae6e57498191aa29eaf223d8baff793ff933ab9e9cc6ce,2023-11-07T02:16:56.160000 CVE-2013-6126,0,0,a49235c039d09c7aa0788c60a6055384b5b4ba6966ca1dcd1916fec970d486d3,2023-11-07T02:16:56.187000 -CVE-2013-6127,0,1,0d0e0ba8f699b383b29ac4ecc4206df1fee0c956dcff0a85919a300aefb7d8f1,2024-11-21T01:58:44.383000 -CVE-2013-6128,0,1,9f17a7f34757842079b6c1c8fa39614320247f2726852feb4257b77235e70a99,2024-11-21T01:58:44.483000 -CVE-2013-6129,0,1,a151bbba12882dcd517a0f41e97456c09efc5d7dada6da2a8a4fde327afc2335,2024-11-21T01:58:44.583000 -CVE-2013-6141,0,1,3f429363c6963430c65d4683a8c47246324818d2f86d11a6f7d7d001d07eee77,2024-11-21T01:58:44.713000 -CVE-2013-6142,0,1,92677cf3691641d44711cbb21405770896a97cc98acd0a0498f1f06c4874e9e0,2024-11-21T01:58:44.847000 -CVE-2013-6143,0,1,02620ad0b3bd525c70984b115ae5d5c789f4c6746d63fd26f5235d84250b11f5,2024-11-21T01:58:44.950000 +CVE-2013-6127,0,0,0d0e0ba8f699b383b29ac4ecc4206df1fee0c956dcff0a85919a300aefb7d8f1,2024-11-21T01:58:44.383000 +CVE-2013-6128,0,0,9f17a7f34757842079b6c1c8fa39614320247f2726852feb4257b77235e70a99,2024-11-21T01:58:44.483000 +CVE-2013-6129,0,0,a151bbba12882dcd517a0f41e97456c09efc5d7dada6da2a8a4fde327afc2335,2024-11-21T01:58:44.583000 +CVE-2013-6141,0,0,3f429363c6963430c65d4683a8c47246324818d2f86d11a6f7d7d001d07eee77,2024-11-21T01:58:44.713000 +CVE-2013-6142,0,0,92677cf3691641d44711cbb21405770896a97cc98acd0a0498f1f06c4874e9e0,2024-11-21T01:58:44.847000 +CVE-2013-6143,0,0,02620ad0b3bd525c70984b115ae5d5c789f4c6746d63fd26f5235d84250b11f5,2024-11-21T01:58:44.950000 CVE-2013-6144,0,0,123b093caa4cfecf20063aabed7acefb081f39424889dd848ddd4ae8a55c6b28,2023-11-07T02:16:56.253000 CVE-2013-6145,0,0,32cb2d8615fb89a8650a59bf8f8854a9e674c8926614e77b83a7a39d61f108dc,2023-11-07T02:16:56.480000 CVE-2013-6146,0,0,767c5821b0bd00b18e0d98dfbed42ecfc6ecc6bb47678af9abc99263cf1aadcf,2023-11-07T02:16:56.727000 @@ -63318,87 +63318,87 @@ CVE-2013-6158,0,0,ce0256e3013ff31dfc2b7b967b4bdd56b08edd6ccb34903dfccd1546bce49c CVE-2013-6159,0,0,b2d48de4f0e2f89fcfc1450996022f34a2046c23c0b84c1e588ed89dc6b0b65a,2023-11-07T02:17:00.043000 CVE-2013-6160,0,0,bee3edc5939e268ac14f4cf14205c1932bc77f006bf3632b1d097b3cfef797db,2023-11-07T02:17:00.300000 CVE-2013-6161,0,0,9900a41b20139da24c1d031b081ce5d0608525155db7b05542556ef88c2547b5,2023-11-07T02:17:00.597000 -CVE-2013-6162,0,1,21b78b5dfa20b2802a2766ac56d53c2b42d87649d84a0ea891da5d0df5336d91,2024-11-21T01:58:45.290000 -CVE-2013-6163,0,1,bc16de7c0539c1865ffe962da5f7ee8621a47b9db01f4a5e4f52c00d7d46b21e,2024-11-21T01:58:45.417000 -CVE-2013-6164,0,1,131e6f6c2ebb87749bc8c2f2e0396e8a2480405225fc96bd310a29a859907b17,2024-11-21T01:58:45.573000 -CVE-2013-6166,0,1,b17c3891442c12470b59dcaa8ee310092faed25ef13d3a81b79fe9f1432bce9d,2024-11-21T01:58:45.720000 -CVE-2013-6167,0,1,ff2365c8294daf7a89f03b7ecb37da732fde08a28601206afaf4a4310233233c,2024-11-21T01:58:45.857000 -CVE-2013-6168,0,1,33bb81b877faa7ef89787dfd2301a81a1dbd2a1e7a8c2530137b4cc8b4bc5f88,2024-11-21T01:58:46.010000 -CVE-2013-6169,0,1,cdf92fb9950a1ab4c0ed77127c5095141a72e0cdd141a96dbc8d8c6da5ad550a,2024-11-21T01:58:46.147000 -CVE-2013-6170,0,1,5076918601e31b6be56160cb70c667acb9886907108c723ec2f6f4a0e976dbf9,2024-11-21T01:58:46.287000 -CVE-2013-6171,0,1,244e36440ec0c57366e4c502ae67bcbfd5910b8d05687040efd9331675e131fe,2024-11-21T01:58:46.447000 -CVE-2013-6172,0,1,af03430984b015827e687efa1483c223787829ebd557bab291e8b1303b7dbfd5,2024-11-21T01:58:46.603000 -CVE-2013-6173,0,1,184a661ce6da68e28b4504db475416902e6cbc24e15c225522fff5872c090257,2024-11-21T01:58:46.757000 -CVE-2013-6174,0,1,2b7288d136c1f86a9e5353a88829d4dc7f949aa00cf9b5afdf56b1bb1073fbee,2024-11-21T01:58:46.863000 -CVE-2013-6175,0,1,9814c8d387dc832edd63ce9985d2857195f626ac1aaea0aa3241facaad43d654,2024-11-21T01:58:46.970000 -CVE-2013-6176,0,1,4c211245476bf7cefa87cdb2fa356187e16017b222331705f5a19b42274f5867,2024-11-21T01:58:47.083000 -CVE-2013-6177,0,1,5bf1d941c10259d4a32935f15ea1bb734bcef6f2affc19c361f95e5f4bbedcb9,2024-11-21T01:58:47.193000 -CVE-2013-6178,0,1,e1ba6344a63f4ac5eebf0320b3c5f204d7b67c66b2e2ab0f3904204d74b496d1,2024-11-21T01:58:47.300000 +CVE-2013-6162,0,0,21b78b5dfa20b2802a2766ac56d53c2b42d87649d84a0ea891da5d0df5336d91,2024-11-21T01:58:45.290000 +CVE-2013-6163,0,0,bc16de7c0539c1865ffe962da5f7ee8621a47b9db01f4a5e4f52c00d7d46b21e,2024-11-21T01:58:45.417000 +CVE-2013-6164,0,0,131e6f6c2ebb87749bc8c2f2e0396e8a2480405225fc96bd310a29a859907b17,2024-11-21T01:58:45.573000 +CVE-2013-6166,0,0,b17c3891442c12470b59dcaa8ee310092faed25ef13d3a81b79fe9f1432bce9d,2024-11-21T01:58:45.720000 +CVE-2013-6167,0,0,ff2365c8294daf7a89f03b7ecb37da732fde08a28601206afaf4a4310233233c,2024-11-21T01:58:45.857000 +CVE-2013-6168,0,0,33bb81b877faa7ef89787dfd2301a81a1dbd2a1e7a8c2530137b4cc8b4bc5f88,2024-11-21T01:58:46.010000 +CVE-2013-6169,0,0,cdf92fb9950a1ab4c0ed77127c5095141a72e0cdd141a96dbc8d8c6da5ad550a,2024-11-21T01:58:46.147000 +CVE-2013-6170,0,0,5076918601e31b6be56160cb70c667acb9886907108c723ec2f6f4a0e976dbf9,2024-11-21T01:58:46.287000 +CVE-2013-6171,0,0,244e36440ec0c57366e4c502ae67bcbfd5910b8d05687040efd9331675e131fe,2024-11-21T01:58:46.447000 +CVE-2013-6172,0,0,af03430984b015827e687efa1483c223787829ebd557bab291e8b1303b7dbfd5,2024-11-21T01:58:46.603000 +CVE-2013-6173,0,0,184a661ce6da68e28b4504db475416902e6cbc24e15c225522fff5872c090257,2024-11-21T01:58:46.757000 +CVE-2013-6174,0,0,2b7288d136c1f86a9e5353a88829d4dc7f949aa00cf9b5afdf56b1bb1073fbee,2024-11-21T01:58:46.863000 +CVE-2013-6175,0,0,9814c8d387dc832edd63ce9985d2857195f626ac1aaea0aa3241facaad43d654,2024-11-21T01:58:46.970000 +CVE-2013-6176,0,0,4c211245476bf7cefa87cdb2fa356187e16017b222331705f5a19b42274f5867,2024-11-21T01:58:47.083000 +CVE-2013-6177,0,0,5bf1d941c10259d4a32935f15ea1bb734bcef6f2affc19c361f95e5f4bbedcb9,2024-11-21T01:58:47.193000 +CVE-2013-6178,0,0,e1ba6344a63f4ac5eebf0320b3c5f204d7b67c66b2e2ab0f3904204d74b496d1,2024-11-21T01:58:47.300000 CVE-2013-6179,0,0,566ac5a9e254abf9c270ab9d05ba4028426a9b598c11e26c7804d125562441af,2023-11-07T02:17:00.963000 -CVE-2013-6180,0,1,d79ce08cef9e8f2c27271e9cc04f4149a39f9eeca32d29b513dd5e5409e808ae,2024-11-21T01:58:47.407000 -CVE-2013-6181,0,1,e03e1bac0b49a1d653862492139a53c55de2485e0b78758adcc7dae04cfbd2b2,2024-11-21T01:58:47.510000 -CVE-2013-6182,0,1,13aeb0aea4954c666dfef156d83c5e2577a72056034f89c162dfd1d29dfcc8c3,2024-11-21T01:58:47.613000 +CVE-2013-6180,0,0,d79ce08cef9e8f2c27271e9cc04f4149a39f9eeca32d29b513dd5e5409e808ae,2024-11-21T01:58:47.407000 +CVE-2013-6181,0,0,e03e1bac0b49a1d653862492139a53c55de2485e0b78758adcc7dae04cfbd2b2,2024-11-21T01:58:47.510000 +CVE-2013-6182,0,0,13aeb0aea4954c666dfef156d83c5e2577a72056034f89c162dfd1d29dfcc8c3,2024-11-21T01:58:47.613000 CVE-2013-6183,0,0,c7a5f58037340ce8344459b12964d5a0ef09bd1c3bc2f90a5b55d18f2cc62ce3,2023-11-07T02:17:01.217000 CVE-2013-6184,0,0,d8c3a99ee809b185393dcf1860e4269fc71bcd438ca625ca21100f1a2ad39d88,2023-11-07T02:17:01.447000 CVE-2013-6185,0,0,140fb3fbc2db18b1db6b268f8b4a1703e833298809094c4d145a54394b3b4720,2023-11-07T02:17:01.687000 CVE-2013-6186,0,0,39fee0c77e7d510542db9985b07c5df2510a26454b1c5d7a2fcc63a8d528dba8,2023-11-07T02:17:01.927000 CVE-2013-6187,0,0,60a83788a8dc773b7e1a89e434beb014590eab005e725cdc78260a405df9dc8f,2023-11-07T02:17:02.157000 -CVE-2013-6188,0,1,bc6177e727fdbf4b7731fc3db355d58784d3a2262d59f55cd2a7ce11899b46f8,2024-11-21T01:58:47.787000 -CVE-2013-6189,0,1,eeb8b1d94d87ccaa42ba0d0a506bb1186e805e0054af3b9bedc377bca8f43440,2024-11-21T01:58:47.887000 +CVE-2013-6188,0,0,bc6177e727fdbf4b7731fc3db355d58784d3a2262d59f55cd2a7ce11899b46f8,2024-11-21T01:58:47.787000 +CVE-2013-6189,0,0,eeb8b1d94d87ccaa42ba0d0a506bb1186e805e0054af3b9bedc377bca8f43440,2024-11-21T01:58:47.887000 CVE-2013-6190,0,0,0c8940ec50e3cd68daae3aa5a48c421f20390b5e701d62b11d7c16dad07e0327,2023-11-07T02:17:02.423000 -CVE-2013-6191,0,1,ccb49faa68cf91953b60884bf98c85604a3d151069795d88b71723ad2462e625,2024-11-21T01:58:48.007000 -CVE-2013-6192,0,1,96c91b7d65e55500dae74c8788d0e6de9dd217d344975ca591b78f6e103d6ef9,2024-11-21T01:58:48.120000 -CVE-2013-6193,0,1,dcfc7f9df1b53bb7200d3fc9e1949fed6f748c8dbf2bf42ace97a01563c06e0f,2024-11-21T01:58:48.230000 -CVE-2013-6194,0,1,d3a72d4bfaed7cad30791e6897a7affa33a7c1b847d053ebd612cd8e75a3a175,2024-11-21T01:58:48.350000 -CVE-2013-6195,0,1,073247ed2762512c36eb67f54e94640e4773e5b73ddf503b202f44c46a6e0865,2024-11-21T01:58:48.470000 -CVE-2013-6196,0,1,d37374bc19d5f349136a6584815da378ad8436812f1392c507daeba4292cd81c,2024-11-21T01:58:48.583000 -CVE-2013-6197,0,1,c45e5f0da1250a52d3176362fc1bdc540b350db4cf238d827c0ef2a9a5296ec9,2024-11-21T01:58:48.720000 -CVE-2013-6198,0,1,277fe4f52710f3f122f390cd67372203397fab3efadff1ad61d35a5a3f806674,2024-11-21T01:58:48.840000 +CVE-2013-6191,0,0,ccb49faa68cf91953b60884bf98c85604a3d151069795d88b71723ad2462e625,2024-11-21T01:58:48.007000 +CVE-2013-6192,0,0,96c91b7d65e55500dae74c8788d0e6de9dd217d344975ca591b78f6e103d6ef9,2024-11-21T01:58:48.120000 +CVE-2013-6193,0,0,dcfc7f9df1b53bb7200d3fc9e1949fed6f748c8dbf2bf42ace97a01563c06e0f,2024-11-21T01:58:48.230000 +CVE-2013-6194,0,0,d3a72d4bfaed7cad30791e6897a7affa33a7c1b847d053ebd612cd8e75a3a175,2024-11-21T01:58:48.350000 +CVE-2013-6195,0,0,073247ed2762512c36eb67f54e94640e4773e5b73ddf503b202f44c46a6e0865,2024-11-21T01:58:48.470000 +CVE-2013-6196,0,0,d37374bc19d5f349136a6584815da378ad8436812f1392c507daeba4292cd81c,2024-11-21T01:58:48.583000 +CVE-2013-6197,0,0,c45e5f0da1250a52d3176362fc1bdc540b350db4cf238d827c0ef2a9a5296ec9,2024-11-21T01:58:48.720000 +CVE-2013-6198,0,0,277fe4f52710f3f122f390cd67372203397fab3efadff1ad61d35a5a3f806674,2024-11-21T01:58:48.840000 CVE-2013-6199,0,0,78d70bf23168f729a59a0112612e9c6e93aeed21ab6206ba40ec0711715060c8,2023-11-07T02:17:02.723000 -CVE-2013-6200,0,1,7a8a035bc5d598458b599c4bdc9188981cd5a744c68a291fe78be18b8b3a58c9,2024-11-21T01:58:48.967000 -CVE-2013-6201,0,1,71bc9984853de89c3c8b4aa64ecce9a9a01cf3e12d82e54c560e6367201b14a4,2024-11-21T01:58:49.073000 -CVE-2013-6202,0,1,6ea7b67b0cb1f454a58ef8f41b10301fcef3866a95e251cfea129ff6bee90c9a,2024-11-21T01:58:49.183000 -CVE-2013-6203,0,1,669cdebfbaa840d850dcdecf1c7e9c08a2d48f4ad288b04640463e072dd4dd8f,2024-11-21T01:58:49.297000 -CVE-2013-6204,0,1,12309a55b9b24424ad1547a311c76b24212309dc6ff03f4b0b80b9d000f23eb1,2024-11-21T01:58:49.403000 -CVE-2013-6205,0,1,6c8546c7aef661d60d3dec5341457b8b09c3fbb5f4e47eb273e452399b48d12f,2024-11-21T01:58:50.390000 -CVE-2013-6206,0,1,ad7f5cd452e0c9a737d62fd9ce25aaa2cac40be710637f8ad7a914e0e19e2af4,2024-11-21T01:58:50.677000 -CVE-2013-6207,0,1,4f30e36021765329bbf24a1a2b91b90391d19b2fe4d7bd24477060d4e3f374e2,2024-11-21T01:58:50.780000 -CVE-2013-6208,0,1,4afdd4bc721127af7251a8e93faf31fd4a75db4dd80c411850815eb24080fc60,2024-11-21T01:58:50.890000 -CVE-2013-6209,0,1,1e23161ac0bef0930454446e1d312cbdf9e370c2d09c10ece55c4fbc3d609e72,2024-11-21T01:58:51.007000 -CVE-2013-6210,0,1,88ae369beb82b2b8532430ddb90b0a85569033ea88120ff0330327b47f67d316,2024-11-21T01:58:51.127000 -CVE-2013-6211,0,1,e5c23e68942d4ad9db33bcfb5479f4380f996244547703f98a0ac378f04fccfa,2024-11-21T01:58:51.233000 -CVE-2013-6212,0,1,420b9ae320b87cecb45f722e8086a9e67bdaf12a8ae17679d564280a6aa46ebf,2024-11-21T01:58:51.347000 -CVE-2013-6213,0,1,f5e17bdbb0368d574046ff1ee0032e5dfbb0872f751317bec841c29555eacfb0,2024-11-21T01:58:51.443000 -CVE-2013-6214,0,1,3d0133cf9c2ceed9b5f40fe44a933869ff45cf092837dee28324dc1d64825194,2024-11-21T01:58:51.543000 -CVE-2013-6215,0,1,8b497daafb0a2311629b82571e8f1f2411f92d5ac39f6cd85e10d9c72e92cbf8,2024-11-21T01:58:51.647000 -CVE-2013-6216,0,1,7117ece149296e5bd66f52642a2bbbc0dba4ece2a8efa3b6bd934f75c186e8f3,2024-11-21T01:58:51.750000 +CVE-2013-6200,0,0,7a8a035bc5d598458b599c4bdc9188981cd5a744c68a291fe78be18b8b3a58c9,2024-11-21T01:58:48.967000 +CVE-2013-6201,0,0,71bc9984853de89c3c8b4aa64ecce9a9a01cf3e12d82e54c560e6367201b14a4,2024-11-21T01:58:49.073000 +CVE-2013-6202,0,0,6ea7b67b0cb1f454a58ef8f41b10301fcef3866a95e251cfea129ff6bee90c9a,2024-11-21T01:58:49.183000 +CVE-2013-6203,0,0,669cdebfbaa840d850dcdecf1c7e9c08a2d48f4ad288b04640463e072dd4dd8f,2024-11-21T01:58:49.297000 +CVE-2013-6204,0,0,12309a55b9b24424ad1547a311c76b24212309dc6ff03f4b0b80b9d000f23eb1,2024-11-21T01:58:49.403000 +CVE-2013-6205,0,0,6c8546c7aef661d60d3dec5341457b8b09c3fbb5f4e47eb273e452399b48d12f,2024-11-21T01:58:50.390000 +CVE-2013-6206,0,0,ad7f5cd452e0c9a737d62fd9ce25aaa2cac40be710637f8ad7a914e0e19e2af4,2024-11-21T01:58:50.677000 +CVE-2013-6207,0,0,4f30e36021765329bbf24a1a2b91b90391d19b2fe4d7bd24477060d4e3f374e2,2024-11-21T01:58:50.780000 +CVE-2013-6208,0,0,4afdd4bc721127af7251a8e93faf31fd4a75db4dd80c411850815eb24080fc60,2024-11-21T01:58:50.890000 +CVE-2013-6209,0,0,1e23161ac0bef0930454446e1d312cbdf9e370c2d09c10ece55c4fbc3d609e72,2024-11-21T01:58:51.007000 +CVE-2013-6210,0,0,88ae369beb82b2b8532430ddb90b0a85569033ea88120ff0330327b47f67d316,2024-11-21T01:58:51.127000 +CVE-2013-6211,0,0,e5c23e68942d4ad9db33bcfb5479f4380f996244547703f98a0ac378f04fccfa,2024-11-21T01:58:51.233000 +CVE-2013-6212,0,0,420b9ae320b87cecb45f722e8086a9e67bdaf12a8ae17679d564280a6aa46ebf,2024-11-21T01:58:51.347000 +CVE-2013-6213,0,0,f5e17bdbb0368d574046ff1ee0032e5dfbb0872f751317bec841c29555eacfb0,2024-11-21T01:58:51.443000 +CVE-2013-6214,0,0,3d0133cf9c2ceed9b5f40fe44a933869ff45cf092837dee28324dc1d64825194,2024-11-21T01:58:51.543000 +CVE-2013-6215,0,0,8b497daafb0a2311629b82571e8f1f2411f92d5ac39f6cd85e10d9c72e92cbf8,2024-11-21T01:58:51.647000 +CVE-2013-6216,0,0,7117ece149296e5bd66f52642a2bbbc0dba4ece2a8efa3b6bd934f75c186e8f3,2024-11-21T01:58:51.750000 CVE-2013-6217,0,0,6e24ae1b9d90d41ce26f0416cd8fa13e9d9b489adf0054321fa6c2ffea2f0a5e,2023-11-07T02:17:03.060000 -CVE-2013-6218,0,1,f72e62d16395bb90b08afe3bb6a18e6cd277c5bba6ed4403e11b29dc68604cad,2024-11-21T01:58:51.873000 -CVE-2013-6219,0,1,2c306c063ad553bd00ebb790a78d778bc4c7b23d27d12727321daa7e72d79ba2,2024-11-21T01:58:51.980000 -CVE-2013-6220,0,1,e954b39059384a73b6341bb5284dc2d99b449a23f20b13ccd11c1682b75cc42b,2024-11-21T01:58:52.090000 +CVE-2013-6218,0,0,f72e62d16395bb90b08afe3bb6a18e6cd277c5bba6ed4403e11b29dc68604cad,2024-11-21T01:58:51.873000 +CVE-2013-6219,0,0,2c306c063ad553bd00ebb790a78d778bc4c7b23d27d12727321daa7e72d79ba2,2024-11-21T01:58:51.980000 +CVE-2013-6220,0,0,e954b39059384a73b6341bb5284dc2d99b449a23f20b13ccd11c1682b75cc42b,2024-11-21T01:58:52.090000 CVE-2013-6221,0,0,f6ab3e15dbce11f5cee41082cfcda5b330e135ff857ce508086deb427d727bfa,2014-07-18T05:18:33.860000 CVE-2013-6222,0,0,2295e5ba3bc41641020522ebe5011e4890dd25aacecc3cc2ff507b9b022b7837,2017-08-29T01:33:55.560000 CVE-2013-6223,0,0,53c7e9b6c2bf2911228001d51b6a6b1cfe70a74a4d2af6efb9945a99d5021a02,2014-06-24T15:03:52.187000 -CVE-2013-6224,0,1,6350ff115dd85ae6b7594b82d696e077cb67bd69c6ced66a41aa8e899870b414,2024-11-21T01:58:52.590000 +CVE-2013-6224,0,0,6350ff115dd85ae6b7594b82d696e077cb67bd69c6ced66a41aa8e899870b414,2024-11-21T01:58:52.590000 CVE-2013-6225,0,0,3b0dd710622d9f7091c594a01f94a6fe883804bdbd573c1aa88643fa5e0f25b2,2020-01-17T16:12:22.213000 -CVE-2013-6226,0,1,532094a9a503b041cf8f3351a4c4272145a41818ac0eaecdef874d5259b0a235,2024-11-21T01:58:52.897000 +CVE-2013-6226,0,0,532094a9a503b041cf8f3351a4c4272145a41818ac0eaecdef874d5259b0a235,2024-11-21T01:58:52.897000 CVE-2013-6227,0,0,5b91e7d9113ace6c16e2748f1848f4dab004a0c85b5e288b5c1f6c7d3e80fb9b,2024-02-14T01:17:43.863000 -CVE-2013-6229,0,1,b6b368d1066180e39c3313650984c7b2598d7ca8eb956a97334958f8b6cfc59c,2024-11-21T01:58:53.180000 -CVE-2013-6230,0,1,53ad5402823db750fd803b563f68d653928fe8c7ff9997a1031a51571b11f5ba,2024-11-21T01:58:53.317000 +CVE-2013-6229,0,0,b6b368d1066180e39c3313650984c7b2598d7ca8eb956a97334958f8b6cfc59c,2024-11-21T01:58:53.180000 +CVE-2013-6230,0,0,53ad5402823db750fd803b563f68d653928fe8c7ff9997a1031a51571b11f5ba,2024-11-21T01:58:53.317000 CVE-2013-6231,0,0,48ced186ae6b2d0a95565540158721d7abc9f3f717fe65b555f77ac1ee65968f,2020-01-21T21:47:39.343000 -CVE-2013-6232,0,1,6880347214742346e793ed75b5546e48ff00cc262edd28c2bc7f25426dff3a63,2024-11-21T01:58:53.610000 -CVE-2013-6233,0,1,85f312133f77c0c5eac1db1e42093744c0aab73cd90817cc7bd7ed7a6f0cee6f,2024-11-21T01:58:53.750000 +CVE-2013-6232,0,0,6880347214742346e793ed75b5546e48ff00cc262edd28c2bc7f25426dff3a63,2024-11-21T01:58:53.610000 +CVE-2013-6233,0,0,85f312133f77c0c5eac1db1e42093744c0aab73cd90817cc7bd7ed7a6f0cee6f,2024-11-21T01:58:53.750000 CVE-2013-6234,0,0,151c0b22e1f949dfeef54f49913d8126f0525855ca12ae98ba0ef593db0cb4e7,2019-12-04T17:10:27.583000 -CVE-2013-6235,0,1,b41e0d50fa6002d8606491bb16dd7ca20d87d917dfc0135e56fb57f2ced969e4,2024-11-21T01:58:54.030000 +CVE-2013-6235,0,0,b41e0d50fa6002d8606491bb16dd7ca20d87d917dfc0135e56fb57f2ced969e4,2024-11-21T01:58:54.030000 CVE-2013-6236,0,0,634322f7d84a23ee7df2e3be5321bf34d349abffae8c30b817baf05dbab9ffc4,2020-02-25T18:51:31.767000 -CVE-2013-6237,0,1,96cd9e548dc5418e88abd28e2b730e34b8bc1473149ea537d8361b5e8fa66fca,2024-11-21T01:58:54.313000 +CVE-2013-6237,0,0,96cd9e548dc5418e88abd28e2b730e34b8bc1473149ea537d8361b5e8fa66fca,2024-11-21T01:58:54.313000 CVE-2013-6239,0,0,983f2bca89888a7800011dad585f233f72cfc53d9b89451a24038d3aec8ae993,2019-12-02T20:00:58.963000 CVE-2013-6241,0,0,20b412d2106f419a054e7d24941c68bc5c16d8cbaeae6e9ead443f277e86c315,2014-12-29T23:00:55.037000 CVE-2013-6242,0,0,3f21f24051a356eca40e0a6d0fe54624d7d8f52825612785aca88f49ee551624,2020-01-09T17:56:33.747000 -CVE-2013-6243,0,1,b884de33da77d1138de1e5145f23f3aa978090fb4bbeca4ff29933c4b87bc83c,2024-11-21T01:58:54.883000 -CVE-2013-6244,0,1,172711deef4f255b5bbf2ad18f0f62116aae5ae38064a3198e33a7be2d4f4d26,2024-11-21T01:58:55.037000 -CVE-2013-6245,0,1,b225c2d3adc31709f4bd0f51ddc35a4a231fb856d710d1567d46dab8417b7546,2024-11-21T01:58:55.177000 -CVE-2013-6246,0,1,54e66b430d25660c5a851f04d725ad9ab6575081b33da0755e2251db516a8d20,2024-11-21T01:58:55.320000 +CVE-2013-6243,0,0,b884de33da77d1138de1e5145f23f3aa978090fb4bbeca4ff29933c4b87bc83c,2024-11-21T01:58:54.883000 +CVE-2013-6244,0,0,172711deef4f255b5bbf2ad18f0f62116aae5ae38064a3198e33a7be2d4f4d26,2024-11-21T01:58:55.037000 +CVE-2013-6245,0,0,b225c2d3adc31709f4bd0f51ddc35a4a231fb856d710d1567d46dab8417b7546,2024-11-21T01:58:55.177000 +CVE-2013-6246,0,0,54e66b430d25660c5a851f04d725ad9ab6575081b33da0755e2251db516a8d20,2024-11-21T01:58:55.320000 CVE-2013-6247,0,0,5b06a6ba5beab1c7f7dd43bbe391b7c0f0f496e763d03fafb5060cd644ed31d5,2023-11-07T02:17:03.483000 CVE-2013-6248,0,0,c94d2000bb44a613cb8a746497cbacabcae5689e3e9dd898b1ad9b31b77c4cf7,2023-11-07T02:17:03.803000 CVE-2013-6249,0,0,53dba9e90efc98353370de1097a68d6339db3d2a205ca6d57774eea590b564d4,2023-11-07T02:17:04.037000 @@ -63419,205 +63419,205 @@ CVE-2013-6263,0,0,d5be90410342e0807f9a8228a70d774f640d1575bd341be90a38ed99cfee3b CVE-2013-6264,0,0,bea19d584d4a040afdb0a2ada5de1a56e2f024ff3716ba1a2fa2911a4b16a841,2023-11-07T02:17:07.723000 CVE-2013-6265,0,0,f6158dfdf0afe2c8a3599dce241ec13e51a13d967e507c74d8668714dcf53654,2023-11-07T02:17:08.027000 CVE-2013-6266,0,0,2e0ccef4fe0d3cdad7a48a07056cd60c533614267be49dd457dc0acd1fb975d5,2023-11-07T02:17:08.273000 -CVE-2013-6267,0,1,fe5938e40e7b0cc66fa2e38b579a2df75084d9216bf3f477ba4bfd6cdccd9aaf,2024-11-21T01:58:55.737000 -CVE-2013-6271,0,1,8fa21c4bc59df99905071cacb809605d144937ae88d874e1005a1f7fc240dd18,2024-11-21T01:58:55.880000 +CVE-2013-6267,0,0,fe5938e40e7b0cc66fa2e38b579a2df75084d9216bf3f477ba4bfd6cdccd9aaf,2024-11-21T01:58:55.737000 +CVE-2013-6271,0,0,8fa21c4bc59df99905071cacb809605d144937ae88d874e1005a1f7fc240dd18,2024-11-21T01:58:55.880000 CVE-2013-6272,0,0,7db62bbfb73d6516009327e278986cabd7199f09a63788562b1bac77eae68243,2018-06-12T18:02:32.677000 CVE-2013-6275,0,0,5a33d14068de3f2a2d004f57fc8022914e74a8ccd3065f086b3a358d12e3ad71,2020-08-18T15:05:57.563000 CVE-2013-6276,0,0,781f255a142d04f73e10a18a9d8c8e38ce67b5c7be9b6ab7d52536eee331712e,2024-08-06T18:15:33.283000 CVE-2013-6277,0,0,29f335b2056201756dfe76b85448ce997d4e6aee9b44b0391df51e15ba160bf0,2020-02-28T15:21:58.667000 -CVE-2013-6280,0,1,a4c357f347377127fd1a44b340376006f353841900dbcea66deaade9289fc14a,2024-11-21T01:58:56.660000 -CVE-2013-6281,0,1,3c62df405732b9f878cacd802ffd1f55675ebff689654f02d1868da633da4f75,2024-11-21T01:58:56.797000 -CVE-2013-6282,0,1,1f3cf1f564e43daa5e24ab68e28016d6386a1d362b86f1d39d492bf1a5cfc27b,2024-11-21T01:58:56.930000 -CVE-2013-6283,0,1,f6ce85ee0db69023983bf87a5f3e094742b10d8f7b4f658156686ce923e8eaf3,2024-11-21T01:58:57.097000 -CVE-2013-6284,0,1,e2e34fcfa036acdc812fa9c39c816d619741675c69957b9f459f0eddea1e44a5,2024-11-21T01:58:57.243000 -CVE-2013-6285,0,1,1e107773163b929ad9e16042119727a95f89da079b1bf696946514cdfd919bbb,2024-11-21T01:58:57.380000 -CVE-2013-6288,0,1,d5d1791ca129b8f7da95f66f93604b9acc9412bfee05dd158da7f1363e7b6285,2024-11-21T01:58:57.490000 -CVE-2013-6289,0,1,15c8980c4989a8b23a51e0e337753b6929975457ebbc7626876ba974594293d8,2024-11-21T01:58:57.630000 +CVE-2013-6280,0,0,a4c357f347377127fd1a44b340376006f353841900dbcea66deaade9289fc14a,2024-11-21T01:58:56.660000 +CVE-2013-6281,0,0,3c62df405732b9f878cacd802ffd1f55675ebff689654f02d1868da633da4f75,2024-11-21T01:58:56.797000 +CVE-2013-6282,0,0,1f3cf1f564e43daa5e24ab68e28016d6386a1d362b86f1d39d492bf1a5cfc27b,2024-11-21T01:58:56.930000 +CVE-2013-6283,0,0,f6ce85ee0db69023983bf87a5f3e094742b10d8f7b4f658156686ce923e8eaf3,2024-11-21T01:58:57.097000 +CVE-2013-6284,0,0,e2e34fcfa036acdc812fa9c39c816d619741675c69957b9f459f0eddea1e44a5,2024-11-21T01:58:57.243000 +CVE-2013-6285,0,0,1e107773163b929ad9e16042119727a95f89da079b1bf696946514cdfd919bbb,2024-11-21T01:58:57.380000 +CVE-2013-6288,0,0,d5d1791ca129b8f7da95f66f93604b9acc9412bfee05dd158da7f1363e7b6285,2024-11-21T01:58:57.490000 +CVE-2013-6289,0,0,15c8980c4989a8b23a51e0e337753b6929975457ebbc7626876ba974594293d8,2024-11-21T01:58:57.630000 CVE-2013-6295,0,0,5b6677bb8dcb753c23c0d6e4745a3f153337ed72f05a5120a9fd54396ec6a103,2020-02-21T16:12:51.613000 -CVE-2013-6299,0,1,7bc5b15ee31ce0de5877f1f924e2a538747448f3ad18dce5e9ece0fb4c12d8a8,2024-11-21T01:58:57.897000 -CVE-2013-6300,0,1,46596fdd65f6a8d50cfb85ef118f732ebba28d36f18dd41f5a8f1cf67090d8f9,2024-11-21T01:58:57.993000 -CVE-2013-6301,0,1,4b4e7e8102305d938407f655443dc76a77044d90846717e70a4d36a6c745001e,2024-11-21T01:58:58.093000 -CVE-2013-6302,0,1,b30d9da39ca39982ea4442a00ca9ae3df980f52427ddecc12b9e98624ece49ee,2024-11-21T01:58:58.193000 -CVE-2013-6303,0,1,ca56f810b47987239fd13ca99cc11ce17d28a3c5d70a702ed3cfe8c4ad8b991f,2024-11-21T01:58:58.293000 -CVE-2013-6304,0,1,bf0f35cd9f370cc2a0078946b8e307defc0f30ac37f554daddbe9754ea4346d7,2024-11-21T01:58:58.390000 -CVE-2013-6305,0,1,1a2f9944038ec6aa9a57d7bfc0688364aaf6c3aa1325cb961f7d2319583cb4b1,2024-11-21T01:58:58.507000 +CVE-2013-6299,0,0,7bc5b15ee31ce0de5877f1f924e2a538747448f3ad18dce5e9ece0fb4c12d8a8,2024-11-21T01:58:57.897000 +CVE-2013-6300,0,0,46596fdd65f6a8d50cfb85ef118f732ebba28d36f18dd41f5a8f1cf67090d8f9,2024-11-21T01:58:57.993000 +CVE-2013-6301,0,0,4b4e7e8102305d938407f655443dc76a77044d90846717e70a4d36a6c745001e,2024-11-21T01:58:58.093000 +CVE-2013-6302,0,0,b30d9da39ca39982ea4442a00ca9ae3df980f52427ddecc12b9e98624ece49ee,2024-11-21T01:58:58.193000 +CVE-2013-6303,0,0,ca56f810b47987239fd13ca99cc11ce17d28a3c5d70a702ed3cfe8c4ad8b991f,2024-11-21T01:58:58.293000 +CVE-2013-6304,0,0,bf0f35cd9f370cc2a0078946b8e307defc0f30ac37f554daddbe9754ea4346d7,2024-11-21T01:58:58.390000 +CVE-2013-6305,0,0,1a2f9944038ec6aa9a57d7bfc0688364aaf6c3aa1325cb961f7d2319583cb4b1,2024-11-21T01:58:58.507000 CVE-2013-6306,0,0,1fccd6f7f48fc3f39243961ca1ca35d93c9a46032c001f820105f90aac4ba263,2017-08-29T01:33:56.623000 -CVE-2013-6307,0,1,750a54d6ac4b8d1ff3c4e7ffdd9242098476d84de5b3ae1e857b4ffe8aa8789a,2024-11-21T01:58:58.740000 +CVE-2013-6307,0,0,750a54d6ac4b8d1ff3c4e7ffdd9242098476d84de5b3ae1e857b4ffe8aa8789a,2024-11-21T01:58:58.740000 CVE-2013-6308,0,0,75dec7e06e35cda8b95540cbe897e501102dbebbd987a9f7ed6667cb41158a55,2017-08-29T01:33:56.730000 CVE-2013-6309,0,0,586b01981664b5e9f1571921ca51be7cf68011a843d0ddc83e4a026b5906104a,2017-08-29T01:33:56.777000 CVE-2013-6310,0,0,5d17527abbff32c0f6e7158547524c8a46d64d2de1020bb5031da7f77bb57ca1,2017-08-29T01:33:56.827000 CVE-2013-6311,0,0,084b19579c9c19e5f3d200c321c9671ee537ee542f75c66021fd42e72d841614,2017-08-29T01:33:56.887000 -CVE-2013-6312,0,1,baddbc773070c58d85067d65ec7c3d8419ee52692ce6ae1fcda309374dbc8218,2024-11-21T01:58:59.263000 -CVE-2013-6314,0,1,93a7ef9735f8ec5ade40af606da6c11bb36023601692d55be822af4955d766ad,2024-11-21T01:58:59.367000 -CVE-2013-6315,0,1,70e76dbd62c10cb6c363565c69b576cc46ccbbf01583536dbb83bf99643180b3,2024-11-21T01:58:59.477000 -CVE-2013-6316,0,1,53b72633b9e4770c409e7bc82c8cb9363ead922688c527ad26544a26922e0d69,2024-11-21T01:58:59.580000 -CVE-2013-6318,0,1,2a1cf2bce5fc696a373136df1feef0dc1ef38504ae1df592dc41e37ab81a0ec2,2024-11-21T01:58:59.687000 -CVE-2013-6319,0,1,c19c84a7224930865446787af78f691039168d1f3bd33df84a6da9fd4318a853,2024-11-21T01:58:59.797000 -CVE-2013-6320,0,1,7294df4d66ce5960d468d735bc5cbdb5919e5b3e8bf3797294a320afde91bc6c,2024-11-21T01:58:59.907000 -CVE-2013-6321,0,1,249f4f7c2342a960b4c5ad881cfb80db7df9a395cafc952a64006968a9f8c49c,2024-11-21T01:59:00.027000 -CVE-2013-6322,0,1,28608b61cb08d093e44c41ca684017167d1aeadfaafcd7195a845804c519c3d3,2024-11-21T01:59:00.140000 -CVE-2013-6323,0,1,e6866932d2e1f18ad6fed4df6678def84c180494f1f0e77908c334ab6c764380,2024-11-21T01:59:00.260000 -CVE-2013-6325,0,1,4ee247de8af01f5b96a0b841c434444537432d01594a1218dd4e1e0b7d163eb7,2024-11-21T01:59:00.420000 -CVE-2013-6327,0,1,a0524c01d30433f2b47d0f2a110cb73a840646de1e49df88cbad6ec889822d62,2024-11-21T01:59:00.550000 -CVE-2013-6328,0,1,45306c182ba821a164482b3ff3a542a593307337e765046c4ab794d3a75c8e6a,2024-11-21T01:59:00.677000 -CVE-2013-6329,0,1,37703cc00d05a4f3bfe754ebab5f020720d10e11a3d4b21f972ad4ee555c44d2,2024-11-21T01:59:00.793000 -CVE-2013-6330,0,1,7c66404d63e17215ffe97a7c1949ed6576c0166f93174d8840df7707085f1539,2024-11-21T01:59:00.917000 -CVE-2013-6331,0,1,d9376d3d6321e19e2d5e41f6397324168978b823dc608d94e7be4bde9fe4a059,2024-11-21T01:59:01.030000 -CVE-2013-6332,0,1,39c8e0e9d9c10396e069d42aaa407d0fcd8ee3af6e8cd6cb1efb07453e551290,2024-11-21T01:59:01.133000 -CVE-2013-6333,0,1,bc3512153396bf561d9f5b9f6e8c1fc85196d7aba4241f92485ed6be0944dc75,2024-11-21T01:59:01.240000 -CVE-2013-6334,0,1,ead2b7a33ac7967f513ea4e400361d432bbeb43e4feb8330920249ed649a44a8,2024-11-21T01:59:01.387000 +CVE-2013-6312,0,0,baddbc773070c58d85067d65ec7c3d8419ee52692ce6ae1fcda309374dbc8218,2024-11-21T01:58:59.263000 +CVE-2013-6314,0,0,93a7ef9735f8ec5ade40af606da6c11bb36023601692d55be822af4955d766ad,2024-11-21T01:58:59.367000 +CVE-2013-6315,0,0,70e76dbd62c10cb6c363565c69b576cc46ccbbf01583536dbb83bf99643180b3,2024-11-21T01:58:59.477000 +CVE-2013-6316,0,0,53b72633b9e4770c409e7bc82c8cb9363ead922688c527ad26544a26922e0d69,2024-11-21T01:58:59.580000 +CVE-2013-6318,0,0,2a1cf2bce5fc696a373136df1feef0dc1ef38504ae1df592dc41e37ab81a0ec2,2024-11-21T01:58:59.687000 +CVE-2013-6319,0,0,c19c84a7224930865446787af78f691039168d1f3bd33df84a6da9fd4318a853,2024-11-21T01:58:59.797000 +CVE-2013-6320,0,0,7294df4d66ce5960d468d735bc5cbdb5919e5b3e8bf3797294a320afde91bc6c,2024-11-21T01:58:59.907000 +CVE-2013-6321,0,0,249f4f7c2342a960b4c5ad881cfb80db7df9a395cafc952a64006968a9f8c49c,2024-11-21T01:59:00.027000 +CVE-2013-6322,0,0,28608b61cb08d093e44c41ca684017167d1aeadfaafcd7195a845804c519c3d3,2024-11-21T01:59:00.140000 +CVE-2013-6323,0,0,e6866932d2e1f18ad6fed4df6678def84c180494f1f0e77908c334ab6c764380,2024-11-21T01:59:00.260000 +CVE-2013-6325,0,0,4ee247de8af01f5b96a0b841c434444537432d01594a1218dd4e1e0b7d163eb7,2024-11-21T01:59:00.420000 +CVE-2013-6327,0,0,a0524c01d30433f2b47d0f2a110cb73a840646de1e49df88cbad6ec889822d62,2024-11-21T01:59:00.550000 +CVE-2013-6328,0,0,45306c182ba821a164482b3ff3a542a593307337e765046c4ab794d3a75c8e6a,2024-11-21T01:59:00.677000 +CVE-2013-6329,0,0,37703cc00d05a4f3bfe754ebab5f020720d10e11a3d4b21f972ad4ee555c44d2,2024-11-21T01:59:00.793000 +CVE-2013-6330,0,0,7c66404d63e17215ffe97a7c1949ed6576c0166f93174d8840df7707085f1539,2024-11-21T01:59:00.917000 +CVE-2013-6331,0,0,d9376d3d6321e19e2d5e41f6397324168978b823dc608d94e7be4bde9fe4a059,2024-11-21T01:59:01.030000 +CVE-2013-6332,0,0,39c8e0e9d9c10396e069d42aaa407d0fcd8ee3af6e8cd6cb1efb07453e551290,2024-11-21T01:59:01.133000 +CVE-2013-6333,0,0,bc3512153396bf561d9f5b9f6e8c1fc85196d7aba4241f92485ed6be0944dc75,2024-11-21T01:59:01.240000 +CVE-2013-6334,0,0,ead2b7a33ac7967f513ea4e400361d432bbeb43e4feb8330920249ed649a44a8,2024-11-21T01:59:01.387000 CVE-2013-6335,0,0,9777e717aa48f5b1c089bf98ae50b58d48c0f91a6c5f813bb8c9bdc50892c188,2020-10-29T20:19:57.827000 -CVE-2013-6336,0,1,b139f5037b89741e9b066346dd14154a3015a5aa9e22c2f9c1bea05648678015,2024-11-21T01:59:01.643000 -CVE-2013-6337,0,1,68c2222a5c2e2b20268c552ffd98622b88a3a5d169acdb974ab0fbd3a386d497,2024-11-21T01:59:01.803000 -CVE-2013-6338,0,1,75d824338316006d9e306a332d41892c83b3bb158416d18cae84df8abb6a44e8,2024-11-21T01:59:01.953000 -CVE-2013-6339,0,1,6e9fe39d92ab2b79ac94ba56753849464a91d3c52eb724aab50ac79cdf9950d1,2024-11-21T01:59:02.113000 -CVE-2013-6340,0,1,c6c2ec5cf1a1732d110812e759d174a47d41db4a41dbd8ee99b4388cba4d8aba,2024-11-21T01:59:02.277000 -CVE-2013-6341,0,1,d38be567bb78d055200bfa7e1ecd0aead4162295ca8ceabf1e8ee36fa4a8c816,2024-11-21T01:59:02.433000 -CVE-2013-6342,0,1,00b251bf8b02fdb779e497f363d75c21b47668ef5fa181017109ba06bd7a5a1b,2024-11-21T01:59:02.600000 -CVE-2013-6343,0,1,33c8d2f932bab11c98bafe7b243214319d91de58b82f485ff37accdd908b030d,2024-11-21T01:59:02.770000 -CVE-2013-6344,0,1,7430bef26046c088780739ac0e5cf8e6cafb5298385e5824411f51646aca3d50,2024-11-21T01:59:02.930000 -CVE-2013-6345,0,1,25ec3ae8b0c9ab8785f776905393e13825a2ea87d068508a93a3f18065f74549,2024-11-21T01:59:03.080000 -CVE-2013-6346,0,1,a06044387970c35d9c50d8fc8b27ddb3845f741447c1e809ed294675b4ef7d44,2024-11-21T01:59:03.230000 -CVE-2013-6347,0,1,647e265f70641b2cb7dd65b173f9b6691b8812e59450256c4439aa359689e207,2024-11-21T01:59:03.383000 -CVE-2013-6348,0,1,9afe9aa93327bdd2d235ae371857a930fb683e661e1d3a3a0453976aadc64f0c,2024-11-21T01:59:03.527000 -CVE-2013-6349,0,1,b32dad2d34c9d32b4fe4621243006a9a9f70ce1dca18a4b9905a3c547e48504d,2024-11-21T01:59:03.680000 +CVE-2013-6336,0,0,b139f5037b89741e9b066346dd14154a3015a5aa9e22c2f9c1bea05648678015,2024-11-21T01:59:01.643000 +CVE-2013-6337,0,0,68c2222a5c2e2b20268c552ffd98622b88a3a5d169acdb974ab0fbd3a386d497,2024-11-21T01:59:01.803000 +CVE-2013-6338,0,0,75d824338316006d9e306a332d41892c83b3bb158416d18cae84df8abb6a44e8,2024-11-21T01:59:01.953000 +CVE-2013-6339,0,0,6e9fe39d92ab2b79ac94ba56753849464a91d3c52eb724aab50ac79cdf9950d1,2024-11-21T01:59:02.113000 +CVE-2013-6340,0,0,c6c2ec5cf1a1732d110812e759d174a47d41db4a41dbd8ee99b4388cba4d8aba,2024-11-21T01:59:02.277000 +CVE-2013-6341,0,0,d38be567bb78d055200bfa7e1ecd0aead4162295ca8ceabf1e8ee36fa4a8c816,2024-11-21T01:59:02.433000 +CVE-2013-6342,0,0,00b251bf8b02fdb779e497f363d75c21b47668ef5fa181017109ba06bd7a5a1b,2024-11-21T01:59:02.600000 +CVE-2013-6343,0,0,33c8d2f932bab11c98bafe7b243214319d91de58b82f485ff37accdd908b030d,2024-11-21T01:59:02.770000 +CVE-2013-6344,0,0,7430bef26046c088780739ac0e5cf8e6cafb5298385e5824411f51646aca3d50,2024-11-21T01:59:02.930000 +CVE-2013-6345,0,0,25ec3ae8b0c9ab8785f776905393e13825a2ea87d068508a93a3f18065f74549,2024-11-21T01:59:03.080000 +CVE-2013-6346,0,0,a06044387970c35d9c50d8fc8b27ddb3845f741447c1e809ed294675b4ef7d44,2024-11-21T01:59:03.230000 +CVE-2013-6347,0,0,647e265f70641b2cb7dd65b173f9b6691b8812e59450256c4439aa359689e207,2024-11-21T01:59:03.383000 +CVE-2013-6348,0,0,9afe9aa93327bdd2d235ae371857a930fb683e661e1d3a3a0453976aadc64f0c,2024-11-21T01:59:03.527000 +CVE-2013-6349,0,0,b32dad2d34c9d32b4fe4621243006a9a9f70ce1dca18a4b9905a3c547e48504d,2024-11-21T01:59:03.680000 CVE-2013-6355,0,0,9555a66e197cdfafcf84c61f3c776a2a7e5d8c2c7e5624223f84f4bde9a24a52,2023-11-07T02:17:09.230000 CVE-2013-6356,0,0,79208d14e8a27390f673be901eb8f5d681d9ef6fe091f98e9e18c29a5a733247,2023-11-07T02:17:09.263000 -CVE-2013-6357,0,1,2d587b3c3d9f11491b3f89ac81368f651fcae173afee6ff053f0b107cd1e519c,2024-11-21T01:59:03.850000 +CVE-2013-6357,0,0,2d587b3c3d9f11491b3f89ac81368f651fcae173afee6ff053f0b107cd1e519c,2024-11-21T01:59:03.850000 CVE-2013-6358,0,0,dbaa101398ceb922ed68ab5e4918bb0afc75b5ff5595a1ca5509671920639359,2020-02-06T15:29:46.597000 -CVE-2013-6359,0,1,53eca267dab556ffc797e7adb450d4054f536e602897406aff3dac8732c31305,2024-11-21T01:59:04.143000 +CVE-2013-6359,0,0,53eca267dab556ffc797e7adb450d4054f536e602897406aff3dac8732c31305,2024-11-21T01:59:04.143000 CVE-2013-6360,0,0,f11ca8d6b1b5e2e5828e9489ff36eebdd0ac7fbe0a99c107c3b7752a5f5e0843,2020-02-26T16:47:48.090000 CVE-2013-6362,0,0,5fde76271a68e3af9ce2adfa1b7ebd5c0d2e579b9c8e63761420116a2eea9c9f,2020-02-24T22:36:20.820000 CVE-2013-6364,0,0,f75605f9b6c6bee61f312d2d7d8bb16d7ceec9ec8106995cbec444013b90ac18,2020-08-18T15:05:57.937000 CVE-2013-6365,0,0,7182896cfe223d986d107f839e8041e73398a8846fd818c098fbbe0188203012,2020-08-18T15:05:49.313000 -CVE-2013-6366,0,1,40766b132b97e5a6254ab54a5b10492b17c458f66994e9cbe00cdb6e7456d893,2024-11-21T01:59:04.890000 -CVE-2013-6367,0,1,12735977c79969a4de537abed4ca945402328a62f874ba440b17d7c81d3e9393,2024-11-21T01:59:05.027000 -CVE-2013-6368,0,1,dff63546d5e206f4bef95dba8ad090c92601813d58065d8bcc24a34639a55f39,2024-11-21T01:59:05.217000 -CVE-2013-6369,0,1,63341bd5dcec4b5038cbfac3d4746d976d7896ab6b7c599b4537da7130d53b4e,2024-11-21T01:59:05.397000 -CVE-2013-6370,0,1,b0f1561e57c6d6d114e7f355f6c4b6eed6946912ea23f65066bbe9f3db5df5a2,2024-11-21T01:59:05.510000 -CVE-2013-6371,0,1,af063da04cc257ac1beb702a158f94d7fe99126051536c4c7718620abf670b09,2024-11-21T01:59:05.647000 -CVE-2013-6372,0,1,c05b7f71e678d63484bde90f8e86d63f96f598d81d948245bb56d1c218810ed3,2024-11-21T01:59:05.780000 -CVE-2013-6373,0,1,b3a8f4740f71894d3a61883ac5806bae0ec68687a50da904658986b5cbc361a1,2024-11-21T01:59:05.900000 -CVE-2013-6374,0,1,b59a935728460de164ff2a8e39b61971001baf66b6c877b28f6178bf3b91499d,2024-11-21T01:59:06.013000 -CVE-2013-6375,0,1,929a2b4e13dcbf143a5f0b274a7f3308de274e0cb24fb93bdd0f0066fdd9b816,2024-11-21T01:59:06.130000 -CVE-2013-6376,0,1,13ce13aebc9a5e04a9fec0ae46cc316745453646330bf0006a71bac7361f5c76,2024-11-21T01:59:06.260000 +CVE-2013-6366,0,0,40766b132b97e5a6254ab54a5b10492b17c458f66994e9cbe00cdb6e7456d893,2024-11-21T01:59:04.890000 +CVE-2013-6367,0,0,12735977c79969a4de537abed4ca945402328a62f874ba440b17d7c81d3e9393,2024-11-21T01:59:05.027000 +CVE-2013-6368,0,0,dff63546d5e206f4bef95dba8ad090c92601813d58065d8bcc24a34639a55f39,2024-11-21T01:59:05.217000 +CVE-2013-6369,0,0,63341bd5dcec4b5038cbfac3d4746d976d7896ab6b7c599b4537da7130d53b4e,2024-11-21T01:59:05.397000 +CVE-2013-6370,0,0,b0f1561e57c6d6d114e7f355f6c4b6eed6946912ea23f65066bbe9f3db5df5a2,2024-11-21T01:59:05.510000 +CVE-2013-6371,0,0,af063da04cc257ac1beb702a158f94d7fe99126051536c4c7718620abf670b09,2024-11-21T01:59:05.647000 +CVE-2013-6372,0,0,c05b7f71e678d63484bde90f8e86d63f96f598d81d948245bb56d1c218810ed3,2024-11-21T01:59:05.780000 +CVE-2013-6373,0,0,b3a8f4740f71894d3a61883ac5806bae0ec68687a50da904658986b5cbc361a1,2024-11-21T01:59:05.900000 +CVE-2013-6374,0,0,b59a935728460de164ff2a8e39b61971001baf66b6c877b28f6178bf3b91499d,2024-11-21T01:59:06.013000 +CVE-2013-6375,0,0,929a2b4e13dcbf143a5f0b274a7f3308de274e0cb24fb93bdd0f0066fdd9b816,2024-11-21T01:59:06.130000 +CVE-2013-6376,0,0,13ce13aebc9a5e04a9fec0ae46cc316745453646330bf0006a71bac7361f5c76,2024-11-21T01:59:06.260000 CVE-2013-6377,0,0,902b8c5e7c8bb2c2bc9676aa77ef137d6c46e798eba83bb38d2229482a3d5a78,2023-11-07T02:17:09.653000 -CVE-2013-6378,0,1,105425556d3af516302a1267f4f40e821c3d4dcafc55a2ff8d125f8b35de44eb,2024-11-21T01:59:06.433000 +CVE-2013-6378,0,0,105425556d3af516302a1267f4f40e821c3d4dcafc55a2ff8d125f8b35de44eb,2024-11-21T01:59:06.433000 CVE-2013-6379,0,0,4c5ba37b3b3d999375136144adebb4bf471c32205599a50058047ee1a23e7e9f,2023-11-07T02:17:09.910000 -CVE-2013-6380,0,1,82ec35c6f8f7e60b960d91f2fc28083c272fe85abb2b71263d7a162e5dc184ce,2024-11-21T01:59:06.663000 -CVE-2013-6381,0,1,bb186b1e100052b6631940f5b2c4b23eab182da802c7ba0a54bdab9944f60585,2024-11-21T01:59:06.840000 -CVE-2013-6382,0,1,8afbdbf708dd901b9c0536d7d8b175f7751fb8a92e58e476a9afbd3ff066706c,2024-11-21T01:59:06.973000 -CVE-2013-6383,0,1,6bb67729815556dc5b7a6cb92d6a81861f6e50b25914a9bbe5c59b456c6a384e,2024-11-21T01:59:07.150000 -CVE-2013-6384,0,1,fbcd5710507b7aae0e96af875b6b6206a062e05b1d7d72c7806d58c9dcab3955,2024-11-21T01:59:07.300000 -CVE-2013-6385,0,1,63427050c42239396425fc03bb36c7812778076bffe9e86920e931ad7e574b81,2024-11-21T01:59:07.417000 -CVE-2013-6386,0,1,c8648f4b4ea70af420c6ed34050c39b0182acd4907f66e5cdab01f71032f2b7e,2024-11-21T01:59:07.550000 -CVE-2013-6387,0,1,695d89a33fbbe2af95caea722e34d75899a4d2bb38d6dd6113544afdf54a26e2,2024-11-21T01:59:07.683000 -CVE-2013-6388,0,1,be19c1c93ff1bdef8dd82eebdcd53baeb2d65bf9224830f3c1ce2d89508c4ffe,2024-11-21T01:59:07.823000 -CVE-2013-6389,0,1,7df778848ee634b24c590b2edab289229279741265fadd160067cb965f1b056f,2024-11-21T01:59:07.940000 +CVE-2013-6380,0,0,82ec35c6f8f7e60b960d91f2fc28083c272fe85abb2b71263d7a162e5dc184ce,2024-11-21T01:59:06.663000 +CVE-2013-6381,0,0,bb186b1e100052b6631940f5b2c4b23eab182da802c7ba0a54bdab9944f60585,2024-11-21T01:59:06.840000 +CVE-2013-6382,0,0,8afbdbf708dd901b9c0536d7d8b175f7751fb8a92e58e476a9afbd3ff066706c,2024-11-21T01:59:06.973000 +CVE-2013-6383,0,0,6bb67729815556dc5b7a6cb92d6a81861f6e50b25914a9bbe5c59b456c6a384e,2024-11-21T01:59:07.150000 +CVE-2013-6384,0,0,fbcd5710507b7aae0e96af875b6b6206a062e05b1d7d72c7806d58c9dcab3955,2024-11-21T01:59:07.300000 +CVE-2013-6385,0,0,63427050c42239396425fc03bb36c7812778076bffe9e86920e931ad7e574b81,2024-11-21T01:59:07.417000 +CVE-2013-6386,0,0,c8648f4b4ea70af420c6ed34050c39b0182acd4907f66e5cdab01f71032f2b7e,2024-11-21T01:59:07.550000 +CVE-2013-6387,0,0,695d89a33fbbe2af95caea722e34d75899a4d2bb38d6dd6113544afdf54a26e2,2024-11-21T01:59:07.683000 +CVE-2013-6388,0,0,be19c1c93ff1bdef8dd82eebdcd53baeb2d65bf9224830f3c1ce2d89508c4ffe,2024-11-21T01:59:07.823000 +CVE-2013-6389,0,0,7df778848ee634b24c590b2edab289229279741265fadd160067cb965f1b056f,2024-11-21T01:59:07.940000 CVE-2013-6390,0,0,7951109ea88d69b0fc44e6004d276719a5b7ef8d714a17af4188036e0e5b93c0,2023-11-07T02:17:10.267000 -CVE-2013-6391,0,1,d411c87be1f5227920a56910715d1fe5008a5d06593480926f4cb1ffa76e2bee,2024-11-21T01:59:08.070000 -CVE-2013-6392,0,1,18ede2ebceac29db52e7c037c08d74736adca155a3d133d8bf01fd0cad01e386,2024-11-21T01:59:08.197000 -CVE-2013-6393,0,1,16562d1ef01e2f8a3825b888b20f1f07932900e2c91821adc2a5aef6cd87af7a,2024-11-21T01:59:08.313000 -CVE-2013-6394,0,1,5c2bc420eec0028d9b3f49f8d82ab5d0790bc90c4b6163518c70737115987b36,2024-11-21T01:59:08.467000 -CVE-2013-6395,0,1,9b7d5c5b325532204750b0e8e6c4ab1443734dbe1200be33be542fd36f8d2d86,2024-11-21T01:59:08.573000 -CVE-2013-6396,0,1,1bd4ce9951c783c0896a6a655d5dbc29a6df2ce45027b44c4aa5e30ef8f41c75,2024-11-21T01:59:08.683000 -CVE-2013-6397,0,1,5651ab62821ba3641134352859dddca3e189d94c7cbcea29cdfc235ec559bd82,2024-11-21T01:59:08.797000 -CVE-2013-6398,0,1,05c59b445aeaf912f64ef2532678bcf71180323fdea02a2f0d2444eb0bc08586,2024-11-21T01:59:08.917000 +CVE-2013-6391,0,0,d411c87be1f5227920a56910715d1fe5008a5d06593480926f4cb1ffa76e2bee,2024-11-21T01:59:08.070000 +CVE-2013-6392,0,0,18ede2ebceac29db52e7c037c08d74736adca155a3d133d8bf01fd0cad01e386,2024-11-21T01:59:08.197000 +CVE-2013-6393,0,0,16562d1ef01e2f8a3825b888b20f1f07932900e2c91821adc2a5aef6cd87af7a,2024-11-21T01:59:08.313000 +CVE-2013-6394,0,0,5c2bc420eec0028d9b3f49f8d82ab5d0790bc90c4b6163518c70737115987b36,2024-11-21T01:59:08.467000 +CVE-2013-6395,0,0,9b7d5c5b325532204750b0e8e6c4ab1443734dbe1200be33be542fd36f8d2d86,2024-11-21T01:59:08.573000 +CVE-2013-6396,0,0,1bd4ce9951c783c0896a6a655d5dbc29a6df2ce45027b44c4aa5e30ef8f41c75,2024-11-21T01:59:08.683000 +CVE-2013-6397,0,0,5651ab62821ba3641134352859dddca3e189d94c7cbcea29cdfc235ec559bd82,2024-11-21T01:59:08.797000 +CVE-2013-6398,0,0,05c59b445aeaf912f64ef2532678bcf71180323fdea02a2f0d2444eb0bc08586,2024-11-21T01:59:08.917000 CVE-2013-6399,0,0,73bca0b6bf25c57c7d68a5e448bf9a5738e9a5dda019e73174c7df5e6bb770b7,2023-02-13T04:49:52.567000 -CVE-2013-6400,0,1,fff0752f179c1ecb938db44623994bd905aad3312f03beecb3fb6dd7b751d81d,2024-11-21T01:59:09.180000 -CVE-2013-6401,0,1,8eedde1176ad54f8d507ab4e139d2045c757e2c73826b3bd12b6bf87cd729623,2024-11-21T01:59:09.293000 -CVE-2013-6402,0,1,fd926818e07f888acdb43077ed2940ccfc382980d927fb67fa7ff2b768e1ee73,2024-11-21T01:59:09.407000 -CVE-2013-6403,0,1,5fa1034a5becb5cd6f7d08d731746bf9519cd5b94c29f139716fcd0a09675db7,2024-11-21T01:59:09.520000 -CVE-2013-6404,0,1,d58de4f3b6de0fd6651c2b9e24ee11cb59e6b1378b8ee084ee695aff404505f9,2024-11-21T01:59:09.630000 +CVE-2013-6400,0,0,fff0752f179c1ecb938db44623994bd905aad3312f03beecb3fb6dd7b751d81d,2024-11-21T01:59:09.180000 +CVE-2013-6401,0,0,8eedde1176ad54f8d507ab4e139d2045c757e2c73826b3bd12b6bf87cd729623,2024-11-21T01:59:09.293000 +CVE-2013-6402,0,0,fd926818e07f888acdb43077ed2940ccfc382980d927fb67fa7ff2b768e1ee73,2024-11-21T01:59:09.407000 +CVE-2013-6403,0,0,5fa1034a5becb5cd6f7d08d731746bf9519cd5b94c29f139716fcd0a09675db7,2024-11-21T01:59:09.520000 +CVE-2013-6404,0,0,d58de4f3b6de0fd6651c2b9e24ee11cb59e6b1378b8ee084ee695aff404505f9,2024-11-21T01:59:09.630000 CVE-2013-6405,0,0,5bf4460e3ceb2502b8f785010a647b7752e318a17515ec84e787cf6cb1710709,2023-11-07T02:17:10.713000 CVE-2013-6406,0,0,66129e8ba255b55685d5de2c1773b76acfc1859bd8d30d0fdce6698883cfa8b0,2023-11-07T02:17:10.943000 -CVE-2013-6407,0,1,078d368e96e232b5dd00345bc98c0043ef456ac87290719e2bb55f704a5d6a0b,2024-11-21T01:59:09.770000 -CVE-2013-6408,0,1,66c6b60cad98795d3dc1d718966a0dba42a5e2d6125d67948f18e99466b42225,2024-11-21T01:59:09.880000 -CVE-2013-6409,0,1,934bc7aad734f61f7b68e3a1e5f43f582f78a665fef3d18fedd67e19d451ec91,2024-11-21T01:59:10.003000 -CVE-2013-6410,0,1,b4ca3d02f58cb5ca56983601a70ab2985c2c035369d5e93f7ef7d0f7ab42cb2e,2024-11-21T01:59:10.110000 -CVE-2013-6411,0,1,ba1031ebb368f6a6cc627e6fcac4c74c4f54efcd6ab4daf16956856d91cda481,2024-11-21T01:59:10.237000 -CVE-2013-6412,0,1,a006a45509bc8978dc2c3522e6692b8cf5fe562d238fb32da1ebcd6970d5afa1,2024-11-21T01:59:10.367000 -CVE-2013-6413,0,1,a3f7fd320a372334a224df0b77fdf06bc7a67d0567155839f98fd5c6054e6f67,2024-11-21T01:59:10.480000 -CVE-2013-6414,0,1,febbb8c596627231bf7c9ef36b5eed7ac187cc018f0cf2f7ebc8b87f70def286,2024-11-21T01:59:10.590000 -CVE-2013-6415,0,1,0201be5dbfad2f9a3a33931d5f6e676710b868ce80d988f44ec2b6e0f459dbd4,2024-11-21T01:59:10.743000 -CVE-2013-6416,0,1,56279ae07d633965c19d392c6e5de08691500a8858b08d4d3b09955010588b70,2024-11-21T01:59:10.900000 -CVE-2013-6417,0,1,f75c19262521d7b52ac342aed9143c235a66a304aafc68f472523bc98fed0391,2024-11-21T01:59:11.010000 -CVE-2013-6418,0,1,93704e007ec100888271bec2475f3e5cc6721ed0951ee6d4768cd9a8fa7d14c9,2024-11-21T01:59:11.153000 -CVE-2013-6419,0,1,05f31ed7e9c585603c862101ef43836214a9d52fac1b692f1594a5d68bc4455d,2024-11-21T01:59:11.293000 -CVE-2013-6420,0,1,86425a0f3d69f197cac0993596d680f281dfb3c0592b37e4bcc5361e90d3896d,2024-11-21T01:59:11.413000 -CVE-2013-6421,0,1,31c4a7e616fdbef621fb4b2d94b9f8036a672d45379e1621c2a8586e221bb83e,2024-11-21T01:59:11.577000 -CVE-2013-6422,0,1,e425fb999ae2b247e7079a13e39d58f1afbd45476deb06b11ee426717b0020c0,2024-11-21T01:59:11.707000 +CVE-2013-6407,0,0,078d368e96e232b5dd00345bc98c0043ef456ac87290719e2bb55f704a5d6a0b,2024-11-21T01:59:09.770000 +CVE-2013-6408,0,0,66c6b60cad98795d3dc1d718966a0dba42a5e2d6125d67948f18e99466b42225,2024-11-21T01:59:09.880000 +CVE-2013-6409,0,0,934bc7aad734f61f7b68e3a1e5f43f582f78a665fef3d18fedd67e19d451ec91,2024-11-21T01:59:10.003000 +CVE-2013-6410,0,0,b4ca3d02f58cb5ca56983601a70ab2985c2c035369d5e93f7ef7d0f7ab42cb2e,2024-11-21T01:59:10.110000 +CVE-2013-6411,0,0,ba1031ebb368f6a6cc627e6fcac4c74c4f54efcd6ab4daf16956856d91cda481,2024-11-21T01:59:10.237000 +CVE-2013-6412,0,0,a006a45509bc8978dc2c3522e6692b8cf5fe562d238fb32da1ebcd6970d5afa1,2024-11-21T01:59:10.367000 +CVE-2013-6413,0,0,a3f7fd320a372334a224df0b77fdf06bc7a67d0567155839f98fd5c6054e6f67,2024-11-21T01:59:10.480000 +CVE-2013-6414,0,0,febbb8c596627231bf7c9ef36b5eed7ac187cc018f0cf2f7ebc8b87f70def286,2024-11-21T01:59:10.590000 +CVE-2013-6415,0,0,0201be5dbfad2f9a3a33931d5f6e676710b868ce80d988f44ec2b6e0f459dbd4,2024-11-21T01:59:10.743000 +CVE-2013-6416,0,0,56279ae07d633965c19d392c6e5de08691500a8858b08d4d3b09955010588b70,2024-11-21T01:59:10.900000 +CVE-2013-6417,0,0,f75c19262521d7b52ac342aed9143c235a66a304aafc68f472523bc98fed0391,2024-11-21T01:59:11.010000 +CVE-2013-6418,0,0,93704e007ec100888271bec2475f3e5cc6721ed0951ee6d4768cd9a8fa7d14c9,2024-11-21T01:59:11.153000 +CVE-2013-6419,0,0,05f31ed7e9c585603c862101ef43836214a9d52fac1b692f1594a5d68bc4455d,2024-11-21T01:59:11.293000 +CVE-2013-6420,0,0,86425a0f3d69f197cac0993596d680f281dfb3c0592b37e4bcc5361e90d3896d,2024-11-21T01:59:11.413000 +CVE-2013-6421,0,0,31c4a7e616fdbef621fb4b2d94b9f8036a672d45379e1621c2a8586e221bb83e,2024-11-21T01:59:11.577000 +CVE-2013-6422,0,0,e425fb999ae2b247e7079a13e39d58f1afbd45476deb06b11ee426717b0020c0,2024-11-21T01:59:11.707000 CVE-2013-6423,0,0,b262491d7eeebdeb22d0d26f80f94a546c9cc23e531c619f162627cd6e49ae1b,2023-11-07T02:17:11.507000 -CVE-2013-6424,0,1,8444111c350d6ab27bc64e3bc45d144a1e2631e1845bf4bb8f614fa236362e48,2024-11-21T01:59:11.880000 -CVE-2013-6425,0,1,8ec93e6f48c8b2d20fb405186f8e45a0635b116bb0748b62ff1384c83cfeed01,2024-11-21T01:59:12.020000 -CVE-2013-6426,0,1,417cb6d7409b8df2ec47eacf2eb1e4b57b32710c024f415bcb3ac49f189e3af7,2024-11-21T01:59:12.160000 -CVE-2013-6427,0,1,d43ac4dd0b1ceeae1b2aacf041df2c454e0699a7b3eeb39be3180fe9379c5809,2024-11-21T01:59:12.270000 -CVE-2013-6428,0,1,681277317709e48e2ae3a7268e46f8d91220b92df93606cad402ee4211722c58,2024-11-21T01:59:12.387000 -CVE-2013-6429,0,1,5f30fb51102df958eb7fd273430241a2b3d17c7f2040548ab2fdd4a87bd0c169,2024-11-21T01:59:12.500000 +CVE-2013-6424,0,0,8444111c350d6ab27bc64e3bc45d144a1e2631e1845bf4bb8f614fa236362e48,2024-11-21T01:59:11.880000 +CVE-2013-6425,0,0,8ec93e6f48c8b2d20fb405186f8e45a0635b116bb0748b62ff1384c83cfeed01,2024-11-21T01:59:12.020000 +CVE-2013-6426,0,0,417cb6d7409b8df2ec47eacf2eb1e4b57b32710c024f415bcb3ac49f189e3af7,2024-11-21T01:59:12.160000 +CVE-2013-6427,0,0,d43ac4dd0b1ceeae1b2aacf041df2c454e0699a7b3eeb39be3180fe9379c5809,2024-11-21T01:59:12.270000 +CVE-2013-6428,0,0,681277317709e48e2ae3a7268e46f8d91220b92df93606cad402ee4211722c58,2024-11-21T01:59:12.387000 +CVE-2013-6429,0,0,5f30fb51102df958eb7fd273430241a2b3d17c7f2040548ab2fdd4a87bd0c169,2024-11-21T01:59:12.500000 CVE-2013-6430,0,0,6ecabe9ac114f698a4ecdd07c76162c5e8ff060d8332ce2f19c82011e14236e3,2020-01-22T16:15:27.327000 -CVE-2013-6431,0,1,e459cf841d2f8c14c12f46b58313c8e0fef4ab151f2f83d71bbb5f2ecb89f869,2024-11-21T01:59:12.727000 -CVE-2013-6432,0,1,559f2620bc5addff7b4ee628fe65c0983224621aa707db612e323aace2dd9f65,2024-11-21T01:59:12.873000 +CVE-2013-6431,0,0,e459cf841d2f8c14c12f46b58313c8e0fef4ab151f2f83d71bbb5f2ecb89f869,2024-11-21T01:59:12.727000 +CVE-2013-6432,0,0,559f2620bc5addff7b4ee628fe65c0983224621aa707db612e323aace2dd9f65,2024-11-21T01:59:12.873000 CVE-2013-6433,0,0,c29fbd07e1bb44c64da27ff3220c8c185697071a4ba26e8341016f18cf9dd866,2018-10-19T18:22:32.213000 -CVE-2013-6434,0,1,6c1df0523d4665e9981c1c09f2287267d3dae577b36ee746bbc095dee7d772a1,2024-11-21T01:59:13.157000 +CVE-2013-6434,0,0,6c1df0523d4665e9981c1c09f2287267d3dae577b36ee746bbc095dee7d772a1,2024-11-21T01:59:13.157000 CVE-2013-6435,0,0,6c7fed4d4354844e03c5db34d8f0e5aed12148617c08055f8bba3f281bac6e97,2023-02-13T00:29:15.583000 -CVE-2013-6436,0,1,cfbd2fe31ef072594cc75419f45bdd9b5a71100a0776f76b826ade3385af2481,2024-11-21T01:59:13.423000 -CVE-2013-6437,0,1,685814a66a82d7bf9caee0913b89c12f24ea773e1a3828653ce9f93373b8917b,2024-11-21T01:59:13.533000 -CVE-2013-6438,0,1,cd676186208b0f1f0b54aec8ef4965ed8881803ef5e09b69e9099f1c34a9291e,2024-11-21T01:59:13.650000 -CVE-2013-6439,0,1,3ee0ab804b4786499d23dd4cf9e1122f2d22301764d34cc7289c631c34673993,2024-11-21T01:59:14.043000 -CVE-2013-6440,0,1,709b17498f2fbbcd6606edee345557e1ddc85eac8168c1ac55e9666d78c6f329,2024-11-21T01:59:14.153000 -CVE-2013-6441,0,1,b74bda6529598b3c4080bd615cbf9511056e4bcdae2719f391c6ff83b9cb31c9,2024-11-21T01:59:14.343000 -CVE-2013-6442,0,1,a6a464ef5d17afc0b2dda261f52e2caa65aa3126bd1f5ed2e47157ab02f34452,2024-11-21T01:59:14.457000 -CVE-2013-6443,0,1,a9210528a2e798c9596d12bb103316cdc9f71e184b47c42142a5811ccee3266d,2024-11-21T01:59:14.567000 -CVE-2013-6444,0,1,3652c2561a05ce40b29dd0b3a7f3be566e25c2813d08d49dea237a3b1b0fb4ed,2024-11-21T01:59:14.673000 -CVE-2013-6445,0,1,574cad61860fe5d0379ec033db63cc89e8deca4152260bd5936c7158127a8be5,2024-11-21T01:59:14.787000 +CVE-2013-6436,0,0,cfbd2fe31ef072594cc75419f45bdd9b5a71100a0776f76b826ade3385af2481,2024-11-21T01:59:13.423000 +CVE-2013-6437,0,0,685814a66a82d7bf9caee0913b89c12f24ea773e1a3828653ce9f93373b8917b,2024-11-21T01:59:13.533000 +CVE-2013-6438,0,0,cd676186208b0f1f0b54aec8ef4965ed8881803ef5e09b69e9099f1c34a9291e,2024-11-21T01:59:13.650000 +CVE-2013-6439,0,0,3ee0ab804b4786499d23dd4cf9e1122f2d22301764d34cc7289c631c34673993,2024-11-21T01:59:14.043000 +CVE-2013-6440,0,0,709b17498f2fbbcd6606edee345557e1ddc85eac8168c1ac55e9666d78c6f329,2024-11-21T01:59:14.153000 +CVE-2013-6441,0,0,b74bda6529598b3c4080bd615cbf9511056e4bcdae2719f391c6ff83b9cb31c9,2024-11-21T01:59:14.343000 +CVE-2013-6442,0,0,a6a464ef5d17afc0b2dda261f52e2caa65aa3126bd1f5ed2e47157ab02f34452,2024-11-21T01:59:14.457000 +CVE-2013-6443,0,0,a9210528a2e798c9596d12bb103316cdc9f71e184b47c42142a5811ccee3266d,2024-11-21T01:59:14.567000 +CVE-2013-6444,0,0,3652c2561a05ce40b29dd0b3a7f3be566e25c2813d08d49dea237a3b1b0fb4ed,2024-11-21T01:59:14.673000 +CVE-2013-6445,0,0,574cad61860fe5d0379ec033db63cc89e8deca4152260bd5936c7158127a8be5,2024-11-21T01:59:14.787000 CVE-2013-6446,0,0,f3d17961787d0a5c96acb8594d15271f1b87054721b0ab6a40da52c1208f4138,2017-03-28T17:04:24.947000 -CVE-2013-6447,0,1,4c3de00a91fb1c02ce4eda31fcbf08cd02cd01cc9cfbf9dcfee93a1d9e85ce7e,2024-11-21T01:59:15.003000 -CVE-2013-6448,0,1,5515733c9ab37f5d02a63f7c64a185d5a5595bc1f76a8215918f9a9974eb89b8,2024-11-21T01:59:15.117000 -CVE-2013-6449,0,1,dfd826beab633cc837033fe01b6f8fc8355ed3aed1ced524129f4b297dd2f4c6,2024-11-21T01:59:15.227000 -CVE-2013-6450,0,1,d4798cdce457a453c8ff87b1b1b360c9f4b9fce86123b91829dffc641b0edab6,2024-11-21T01:59:15.400000 +CVE-2013-6447,0,0,4c3de00a91fb1c02ce4eda31fcbf08cd02cd01cc9cfbf9dcfee93a1d9e85ce7e,2024-11-21T01:59:15.003000 +CVE-2013-6448,0,0,5515733c9ab37f5d02a63f7c64a185d5a5595bc1f76a8215918f9a9974eb89b8,2024-11-21T01:59:15.117000 +CVE-2013-6449,0,0,dfd826beab633cc837033fe01b6f8fc8355ed3aed1ced524129f4b297dd2f4c6,2024-11-21T01:59:15.227000 +CVE-2013-6450,0,0,d4798cdce457a453c8ff87b1b1b360c9f4b9fce86123b91829dffc641b0edab6,2024-11-21T01:59:15.400000 CVE-2013-6451,0,0,1359cd90dfc23532c77ddc871cafc8a3067cf1a552c2685cde49cb4352f8ebee,2020-01-30T18:32:18.617000 -CVE-2013-6452,0,1,a2d3d7dba5f5c5e294135f873de76e24c83470dc388a4cf12419afd2fc4d1671,2024-11-21T01:59:15.657000 -CVE-2013-6453,0,1,c7355e1387c1519c1f320fee8c44f71d2e86a7c894bfaf189b10ce38a9d906de,2024-11-21T01:59:15.760000 -CVE-2013-6454,0,1,76a6e58d8e78f8e378b6f1f0ae3d4a9d123f2a700b35a7b47a09a3908c66deb9,2024-11-21T01:59:15.863000 +CVE-2013-6452,0,0,a2d3d7dba5f5c5e294135f873de76e24c83470dc388a4cf12419afd2fc4d1671,2024-11-21T01:59:15.657000 +CVE-2013-6453,0,0,c7355e1387c1519c1f320fee8c44f71d2e86a7c894bfaf189b10ce38a9d906de,2024-11-21T01:59:15.760000 +CVE-2013-6454,0,0,76a6e58d8e78f8e378b6f1f0ae3d4a9d123f2a700b35a7b47a09a3908c66deb9,2024-11-21T01:59:15.863000 CVE-2013-6455,0,0,6c26b720e2a97af0ae6c1809ff4c642fe8f489e3a5237a7ef66a51474b793d9c,2020-01-30T18:44:48.493000 -CVE-2013-6456,0,1,879a797e98a7f3971b87c1629a37bd1dd8b0e9ffed6b84fac62e2bc89d277916,2024-11-21T01:59:16.070000 -CVE-2013-6457,0,1,94a9c308a9e817008ceebcfefeb7d9b22c714137753b28e2e40e777860bce146,2024-11-21T01:59:16.190000 -CVE-2013-6458,0,1,f43c0d102673417a2db90602d21a6d3737c46d9eb027e56d043b4003a2a3ed2f,2024-11-21T01:59:16.317000 -CVE-2013-6459,0,1,bdbca6997de0ab8b77a653dc78cc0d2e029c7d7e88a02c088b9c7b65d9170310,2024-11-21T01:59:16.443000 +CVE-2013-6456,0,0,879a797e98a7f3971b87c1629a37bd1dd8b0e9ffed6b84fac62e2bc89d277916,2024-11-21T01:59:16.070000 +CVE-2013-6457,0,0,94a9c308a9e817008ceebcfefeb7d9b22c714137753b28e2e40e777860bce146,2024-11-21T01:59:16.190000 +CVE-2013-6458,0,0,f43c0d102673417a2db90602d21a6d3737c46d9eb027e56d043b4003a2a3ed2f,2024-11-21T01:59:16.317000 +CVE-2013-6459,0,0,bdbca6997de0ab8b77a653dc78cc0d2e029c7d7e88a02c088b9c7b65d9170310,2024-11-21T01:59:16.443000 CVE-2013-6460,0,0,7e1b32e5140389bc5cec7ac3108431db9aad9463f385bde0523ae6dd368510f8,2021-07-15T19:16:09.750000 CVE-2013-6461,0,0,27acc5906ff64ee0b1ba033e2106bc0588664a2568deb1bdd08be1c277b6d36b,2021-07-15T19:16:09.750000 -CVE-2013-6462,0,1,5e8cb23272051e420177294fe06034efcb5e44c1003eb486ced4a559bd33a62e,2024-11-21T01:59:16.790000 +CVE-2013-6462,0,0,5e8cb23272051e420177294fe06034efcb5e44c1003eb486ced4a559bd33a62e,2024-11-21T01:59:16.790000 CVE-2013-6463,0,0,3c00bb439dfc5125431f5bbec27ddfc611d8796de763fd5a2bafb766f9b5404d,2023-11-07T02:17:12.520000 CVE-2013-6464,0,0,893792d7b588d624fdc8401a086674c52e860fe4d11fcad2110bed9ae88bf63b,2023-11-07T02:17:12.740000 CVE-2013-6465,0,0,ac97cd3040110fa94c14754399c222e2efd929bf715f059f180006073a29e78d,2018-01-05T16:20:44.450000 -CVE-2013-6466,0,1,1311c2b8840673d6c0963c0252d3e09917318a0f71af47f373529648ffb7181e,2024-11-21T01:59:17.140000 -CVE-2013-6467,0,1,6e2b0d6a61e66062fef3925dce273c15ca75684b969a658f179682afb75c6b74,2024-11-21T01:59:17.280000 -CVE-2013-6468,0,1,640033131695d0b951faf74a229b6b50a26ebac077ae038f85619b0bbfdbada3,2024-11-21T01:59:17.390000 -CVE-2013-6469,0,1,25f67f47a62c7ca441afb86387a2d335c5927926849389af07fdca4d159b5341,2024-11-21T01:59:17.500000 +CVE-2013-6466,0,0,1311c2b8840673d6c0963c0252d3e09917318a0f71af47f373529648ffb7181e,2024-11-21T01:59:17.140000 +CVE-2013-6467,0,0,6e2b0d6a61e66062fef3925dce273c15ca75684b969a658f179682afb75c6b74,2024-11-21T01:59:17.280000 +CVE-2013-6468,0,0,640033131695d0b951faf74a229b6b50a26ebac077ae038f85619b0bbfdbada3,2024-11-21T01:59:17.390000 +CVE-2013-6469,0,0,25f67f47a62c7ca441afb86387a2d335c5927926849389af07fdca4d159b5341,2024-11-21T01:59:17.500000 CVE-2013-6470,0,0,331bd2afbdeeccfcecc61436e825e3dacb685a10f1411c66b89a0084923d9929,2014-06-03T15:00:16.993000 CVE-2013-6471,0,0,7cd5b6d257a746048a6b247c1b5671156f97651e94cbb4ac1dfffcd5595e1ec0,2023-11-07T02:17:13.060000 -CVE-2013-6472,0,1,564d381c5fc6b9712c7a6debd62f1066d045f98f58e276d5fd0995929f48673a,2024-11-21T01:59:17.730000 -CVE-2013-6473,0,1,ec0de8b19da62804c6947fca56b3b23982c8fff5edb84ee032be5da9974378ac,2024-11-21T01:59:17.837000 -CVE-2013-6474,0,1,e8efcef2a873ab201abffaa312bfd891b63f43f4a35ecf8edce0592b84e13ea4,2024-11-21T01:59:17.953000 -CVE-2013-6475,0,1,bdc2d9308dc397c00eb8b9accfc7479e0ced06ae4384de4f4ba3755d07b410d4,2024-11-21T01:59:18.070000 -CVE-2013-6476,0,1,d8416f3fd94f87e8d045f4eef9b13fac9d3e9ecf59d8555cc1ae93e7442425e0,2024-11-21T01:59:18.197000 -CVE-2013-6477,0,1,655a8f4fdf9403456d5d9160f72cd9b21b1a072ccadeee55bbd43740bec96f76,2024-11-21T01:59:18.317000 -CVE-2013-6478,0,1,6ee2c0294d6687cd6718d90fa94e284dfe58d8580aa5fe49218bb55521f2993b,2024-11-21T01:59:18.443000 -CVE-2013-6479,0,1,4695ebe778d2d3b123149e860c0a13d0a5b7e9f7b3dd59a5aeedd3ff4123d16a,2024-11-21T01:59:18.570000 -CVE-2013-6480,0,1,b3c8818dbf4f85cc95b600248996da429866c1bc34ed8ed0d039b274e3b712f5,2024-11-21T01:59:18.697000 -CVE-2013-6481,0,1,12800f69e69b7556c75a0a2328b6c27fa3950fc8864ab42f4f9f4217e35b8b04,2024-11-21T01:59:18.813000 -CVE-2013-6482,0,1,c9ee512d5e457bdb649c56bd71d8a982782b9bedc1c9f510917680b19af36eb1,2024-11-21T01:59:18.930000 -CVE-2013-6483,0,1,dc48b40ad9d47a6b6844ee68d5e644dc4eb0f6cb831e4ecbffed70b00c6b1bd2,2024-11-21T01:59:19.060000 -CVE-2013-6484,0,1,7ae2918b341c503bb7aa4f04ea395503abddb948c71e2ce4cf4375ecd0c61116,2024-11-21T01:59:19.183000 -CVE-2013-6485,0,1,4bde404403bb791bfbf9a82f74e7adc82945a5f57e615cc4dbae3d7dd048a128,2024-11-21T01:59:19.300000 -CVE-2013-6486,0,1,ab11fe5592a69dc7fbce67a804d1c783a2fb0d3d164869afc6160abdcf5618db,2024-11-21T01:59:19.417000 -CVE-2013-6487,0,1,eff543405d0bb0c5eec7031c1996153cef4835d63580f60bd71ee5818a95a4b9,2024-11-21T01:59:19.533000 +CVE-2013-6472,0,0,564d381c5fc6b9712c7a6debd62f1066d045f98f58e276d5fd0995929f48673a,2024-11-21T01:59:17.730000 +CVE-2013-6473,0,0,ec0de8b19da62804c6947fca56b3b23982c8fff5edb84ee032be5da9974378ac,2024-11-21T01:59:17.837000 +CVE-2013-6474,0,0,e8efcef2a873ab201abffaa312bfd891b63f43f4a35ecf8edce0592b84e13ea4,2024-11-21T01:59:17.953000 +CVE-2013-6475,0,0,bdc2d9308dc397c00eb8b9accfc7479e0ced06ae4384de4f4ba3755d07b410d4,2024-11-21T01:59:18.070000 +CVE-2013-6476,0,0,d8416f3fd94f87e8d045f4eef9b13fac9d3e9ecf59d8555cc1ae93e7442425e0,2024-11-21T01:59:18.197000 +CVE-2013-6477,0,0,655a8f4fdf9403456d5d9160f72cd9b21b1a072ccadeee55bbd43740bec96f76,2024-11-21T01:59:18.317000 +CVE-2013-6478,0,0,6ee2c0294d6687cd6718d90fa94e284dfe58d8580aa5fe49218bb55521f2993b,2024-11-21T01:59:18.443000 +CVE-2013-6479,0,0,4695ebe778d2d3b123149e860c0a13d0a5b7e9f7b3dd59a5aeedd3ff4123d16a,2024-11-21T01:59:18.570000 +CVE-2013-6480,0,0,b3c8818dbf4f85cc95b600248996da429866c1bc34ed8ed0d039b274e3b712f5,2024-11-21T01:59:18.697000 +CVE-2013-6481,0,0,12800f69e69b7556c75a0a2328b6c27fa3950fc8864ab42f4f9f4217e35b8b04,2024-11-21T01:59:18.813000 +CVE-2013-6482,0,0,c9ee512d5e457bdb649c56bd71d8a982782b9bedc1c9f510917680b19af36eb1,2024-11-21T01:59:18.930000 +CVE-2013-6483,0,0,dc48b40ad9d47a6b6844ee68d5e644dc4eb0f6cb831e4ecbffed70b00c6b1bd2,2024-11-21T01:59:19.060000 +CVE-2013-6484,0,0,7ae2918b341c503bb7aa4f04ea395503abddb948c71e2ce4cf4375ecd0c61116,2024-11-21T01:59:19.183000 +CVE-2013-6485,0,0,4bde404403bb791bfbf9a82f74e7adc82945a5f57e615cc4dbae3d7dd048a128,2024-11-21T01:59:19.300000 +CVE-2013-6486,0,0,ab11fe5592a69dc7fbce67a804d1c783a2fb0d3d164869afc6160abdcf5618db,2024-11-21T01:59:19.417000 +CVE-2013-6487,0,0,eff543405d0bb0c5eec7031c1996153cef4835d63580f60bd71ee5818a95a4b9,2024-11-21T01:59:19.533000 CVE-2013-6488,0,0,4639430006178e3bf597caf744d91775c21b4f1132be78e7b3e06767f2939c4b,2023-11-07T02:17:13.453000 -CVE-2013-6489,0,1,be2e16a56a646d58c86dbf9cc4abdda7227d5c2a2c320f6b10fe640a47685239,2024-11-21T01:59:19.680000 -CVE-2013-6490,0,1,0a2e1653599957c89ca85a117709b15c0a5fbf37358c909515b5ef722b59003f,2024-11-21T01:59:19.793000 -CVE-2013-6491,0,1,29406b9151e7e5ed79c5b84de15be097f7768a17310679554af55774372fbf84,2024-11-21T01:59:19.913000 -CVE-2013-6492,0,1,4bcc12d7548c1926f49f5e3ee09c0dadecc3587ba364d842271d11b313cdca4c,2024-11-21T01:59:20.020000 -CVE-2013-6493,0,1,e8474c496804f9a94c16173bf810082c8829b35aef9ea7c9e4e8aa46fa5da9ec,2024-11-21T01:59:20.120000 +CVE-2013-6489,0,0,be2e16a56a646d58c86dbf9cc4abdda7227d5c2a2c320f6b10fe640a47685239,2024-11-21T01:59:19.680000 +CVE-2013-6490,0,0,0a2e1653599957c89ca85a117709b15c0a5fbf37358c909515b5ef722b59003f,2024-11-21T01:59:19.793000 +CVE-2013-6491,0,0,29406b9151e7e5ed79c5b84de15be097f7768a17310679554af55774372fbf84,2024-11-21T01:59:19.913000 +CVE-2013-6492,0,0,4bcc12d7548c1926f49f5e3ee09c0dadecc3587ba364d842271d11b313cdca4c,2024-11-21T01:59:20.020000 +CVE-2013-6493,0,0,e8474c496804f9a94c16173bf810082c8829b35aef9ea7c9e4e8aa46fa5da9ec,2024-11-21T01:59:20.120000 CVE-2013-6494,0,0,acd4c9bdc7172e68f981e59cbda006ffd6e1f7074a9ac52a5a9ae6cbb6773a01,2014-12-02T13:25:45.420000 CVE-2013-6495,0,0,40a2911c4a319ca8c9c9803eb6b054fed12ac32c6ee5691329216e8d8cdc8b39,2019-12-13T21:05:29.277000 CVE-2013-6496,0,0,576cc339c660a44326313f4a94fbad435e33bc4d4c538d450a36327dd9b91e60,2023-02-13T00:29:29.017000 @@ -63741,58 +63741,58 @@ CVE-2013-6613,0,0,d6eba242c34a5b8b1d5935297715d870dee33765eaa51594d60f4d0991c706 CVE-2013-6614,0,0,00a5fbd8a5cc3be4803baff23b51712a3a74d81928f98afce1cefd5879eaa531,2023-11-07T02:17:42.703000 CVE-2013-6615,0,0,f67d3a3e5ca77f6eb08ccf3f923530f0c44ac919eba8fad4da40a515a7abd51b,2023-11-07T02:17:42.943000 CVE-2013-6616,0,0,489f7901ff048fdcd8e07c69ea8e76c5e699ba79cdd4ace74e0daf15e849ebe3,2023-11-07T02:17:43.180000 -CVE-2013-6617,0,1,86c792d71454b97ec97b68c19a3fd9514c28e2a1149a09e5920b7e7b67fbc0f6,2024-11-21T01:59:22.417000 -CVE-2013-6618,0,1,228c890cda4c8d9b01904cceaab5fc44fc7cf57dc09fef6ed51f6b135197dcad,2024-11-21T01:59:22.550000 -CVE-2013-6621,0,1,9472595cd1dfec66a714f9808d901411bcf64f81f9335d14283a2df4d6fceead,2024-11-21T01:59:22.700000 -CVE-2013-6622,0,1,0622f0e5cebc499bdefd5cce616d28af948b365b938d310a4d4c3939792b82bd,2024-11-21T01:59:22.863000 -CVE-2013-6623,0,1,60194d3c14c48eece0c323742738310d83c5df752b94d5697e762c4a964b2878,2024-11-21T01:59:23.020000 -CVE-2013-6624,0,1,4354cd1b84f265b2efeef2100b7b481758e3b98cbd229fed935f87908a28828d,2024-11-21T01:59:23.173000 -CVE-2013-6625,0,1,eef3c726fbe46cf1007628ed594d606be8f741af1792c80fd2c3900e7029dadc,2024-11-21T01:59:23.333000 -CVE-2013-6626,0,1,fbb8f1826aad691035415d5716555d8b55e7eb81f0c1fff6352fc2f733faeb6b,2024-11-21T01:59:23.493000 -CVE-2013-6627,0,1,d30f5a7033198002191bce6698b7961d1e9ba34b0086ef3636481fcf7d219fff,2024-11-21T01:59:23.643000 -CVE-2013-6628,0,1,1705b2f76898f3b50ded8d826ef61cc86a9e2ef797d25b8a1216ba90d6807d7e,2024-11-21T01:59:23.803000 -CVE-2013-6629,0,1,740dc9d09e427b4a3eb087163dc12b633dd03a46e0569acb5a7dbce736c74a24,2024-11-21T01:59:23.963000 -CVE-2013-6630,0,1,bfe184f969997b979a7f4e0339cab4ad2f7957c608d625e9036389d77b2771c2,2024-11-21T01:59:24.277000 -CVE-2013-6631,0,1,ebbe03244ad4a47bfb5491f19bfb0fcf4a379ea80741334f0d10f81b638679a8,2024-11-21T01:59:24.477000 -CVE-2013-6632,0,1,cd3e28731fe6e8d9373887023fbefd3c20bf19d0f86b909ddef8b236ec217d6f,2024-11-21T01:59:24.637000 -CVE-2013-6634,0,1,5e09530f70121a82e8a5a69c6057a5bca57d19a59eb437f64665fd94bfd59348,2024-11-21T01:59:24.800000 -CVE-2013-6635,0,1,f6435f4dacb4f04143e225012221a756452648f9746756bdac19cece59a73d4c,2024-11-21T01:59:24.970000 -CVE-2013-6636,0,1,d33802c27193924eb9b38d1d6d1860cc9d874f6b7502d55a3e82826e63b335da,2024-11-21T01:59:25.133000 -CVE-2013-6637,0,1,64cffd78adec39b315acc571acad37a6bd7c658798a23fb75bc185e83b2c23e1,2024-11-21T01:59:25.303000 -CVE-2013-6638,0,1,0f045e20317fc2f74c2022a6caf50f254ffbe23b3e57c8c12091290bfd9fcb1e,2024-11-21T01:59:25.480000 -CVE-2013-6639,0,1,6e3b5f885784159a99fc004d3f2534293c7076286fc678f7db9a958acd865ad6,2024-11-21T01:59:25.650000 -CVE-2013-6640,0,1,1c06ccd9b11dd2d160ae3fa92643dd6b8c978a734057c530f3e3f7f3be8e7034,2024-11-21T01:59:25.827000 -CVE-2013-6641,0,1,573ba40070a6f0197f9598d31e89e4d42450466c0ce13932f0c65c0675719314,2024-11-21T01:59:25.997000 -CVE-2013-6642,0,1,282c8d26920df60f570d8b60d5f69471cc03337ed6e03e3a7fdd5681b11c4092,2024-11-21T01:59:26.163000 -CVE-2013-6643,0,1,ba40a0c010eadf5c1a3a35ff9e49af7ea578c9e1c0f24767c526659479a0cad0,2024-11-21T01:59:26.320000 -CVE-2013-6644,0,1,9c6927efc8b49430608d010e823e991625253ee1853fe7783b770e7f697b283f,2024-11-21T01:59:26.473000 -CVE-2013-6645,0,1,202db83d5d5c81b2c729e66aa7f21a62c64bb1a9e91629243ac5682d319ed3f2,2024-11-21T01:59:26.653000 -CVE-2013-6646,0,1,132e7e12cf8339b4d383622fc0fe236eda0399ca8d03c4f9ebdbad2686eee0a0,2024-11-21T01:59:26.817000 +CVE-2013-6617,0,0,86c792d71454b97ec97b68c19a3fd9514c28e2a1149a09e5920b7e7b67fbc0f6,2024-11-21T01:59:22.417000 +CVE-2013-6618,0,0,228c890cda4c8d9b01904cceaab5fc44fc7cf57dc09fef6ed51f6b135197dcad,2024-11-21T01:59:22.550000 +CVE-2013-6621,0,0,9472595cd1dfec66a714f9808d901411bcf64f81f9335d14283a2df4d6fceead,2024-11-21T01:59:22.700000 +CVE-2013-6622,0,0,0622f0e5cebc499bdefd5cce616d28af948b365b938d310a4d4c3939792b82bd,2024-11-21T01:59:22.863000 +CVE-2013-6623,0,0,60194d3c14c48eece0c323742738310d83c5df752b94d5697e762c4a964b2878,2024-11-21T01:59:23.020000 +CVE-2013-6624,0,0,4354cd1b84f265b2efeef2100b7b481758e3b98cbd229fed935f87908a28828d,2024-11-21T01:59:23.173000 +CVE-2013-6625,0,0,eef3c726fbe46cf1007628ed594d606be8f741af1792c80fd2c3900e7029dadc,2024-11-21T01:59:23.333000 +CVE-2013-6626,0,0,fbb8f1826aad691035415d5716555d8b55e7eb81f0c1fff6352fc2f733faeb6b,2024-11-21T01:59:23.493000 +CVE-2013-6627,0,0,d30f5a7033198002191bce6698b7961d1e9ba34b0086ef3636481fcf7d219fff,2024-11-21T01:59:23.643000 +CVE-2013-6628,0,0,1705b2f76898f3b50ded8d826ef61cc86a9e2ef797d25b8a1216ba90d6807d7e,2024-11-21T01:59:23.803000 +CVE-2013-6629,0,0,740dc9d09e427b4a3eb087163dc12b633dd03a46e0569acb5a7dbce736c74a24,2024-11-21T01:59:23.963000 +CVE-2013-6630,0,0,bfe184f969997b979a7f4e0339cab4ad2f7957c608d625e9036389d77b2771c2,2024-11-21T01:59:24.277000 +CVE-2013-6631,0,0,ebbe03244ad4a47bfb5491f19bfb0fcf4a379ea80741334f0d10f81b638679a8,2024-11-21T01:59:24.477000 +CVE-2013-6632,0,0,cd3e28731fe6e8d9373887023fbefd3c20bf19d0f86b909ddef8b236ec217d6f,2024-11-21T01:59:24.637000 +CVE-2013-6634,0,0,5e09530f70121a82e8a5a69c6057a5bca57d19a59eb437f64665fd94bfd59348,2024-11-21T01:59:24.800000 +CVE-2013-6635,0,0,f6435f4dacb4f04143e225012221a756452648f9746756bdac19cece59a73d4c,2024-11-21T01:59:24.970000 +CVE-2013-6636,0,0,d33802c27193924eb9b38d1d6d1860cc9d874f6b7502d55a3e82826e63b335da,2024-11-21T01:59:25.133000 +CVE-2013-6637,0,0,64cffd78adec39b315acc571acad37a6bd7c658798a23fb75bc185e83b2c23e1,2024-11-21T01:59:25.303000 +CVE-2013-6638,0,0,0f045e20317fc2f74c2022a6caf50f254ffbe23b3e57c8c12091290bfd9fcb1e,2024-11-21T01:59:25.480000 +CVE-2013-6639,0,0,6e3b5f885784159a99fc004d3f2534293c7076286fc678f7db9a958acd865ad6,2024-11-21T01:59:25.650000 +CVE-2013-6640,0,0,1c06ccd9b11dd2d160ae3fa92643dd6b8c978a734057c530f3e3f7f3be8e7034,2024-11-21T01:59:25.827000 +CVE-2013-6641,0,0,573ba40070a6f0197f9598d31e89e4d42450466c0ce13932f0c65c0675719314,2024-11-21T01:59:25.997000 +CVE-2013-6642,0,0,282c8d26920df60f570d8b60d5f69471cc03337ed6e03e3a7fdd5681b11c4092,2024-11-21T01:59:26.163000 +CVE-2013-6643,0,0,ba40a0c010eadf5c1a3a35ff9e49af7ea578c9e1c0f24767c526659479a0cad0,2024-11-21T01:59:26.320000 +CVE-2013-6644,0,0,9c6927efc8b49430608d010e823e991625253ee1853fe7783b770e7f697b283f,2024-11-21T01:59:26.473000 +CVE-2013-6645,0,0,202db83d5d5c81b2c729e66aa7f21a62c64bb1a9e91629243ac5682d319ed3f2,2024-11-21T01:59:26.653000 +CVE-2013-6646,0,0,132e7e12cf8339b4d383622fc0fe236eda0399ca8d03c4f9ebdbad2686eee0a0,2024-11-21T01:59:26.817000 CVE-2013-6647,0,0,d85776c901b7469e87e5c0afa9dde7155e84856909cdb1ac23499ff2178d7232,2017-04-17T19:03:56.413000 CVE-2013-6648,0,0,9a77149164210330c8bf764e1d9b592f37f2dd1d7c52f55ec58934fa2b02e02b,2020-06-23T16:35:35.067000 -CVE-2013-6649,0,1,2b03954eae809e3e1ce3c45c772581cd64e7f6bc0ea0107d2d076b67e25c9832,2024-11-21T01:59:27.297000 -CVE-2013-6650,0,1,7d406f79845c4bdb25bcb72cd8d1de54b36c13819b5d6083ee893d5e778e12c9,2024-11-21T01:59:27.487000 -CVE-2013-6652,0,1,c3752046782540c4c9fdd3574f192a4b62da7cfc1c47d1c2b8d5e1941dcd980b,2024-11-21T01:59:27.660000 -CVE-2013-6653,0,1,171488d1d1d3318c54d37980b790a2868da4172f2f57432a097a08313708130a,2024-11-21T01:59:27.820000 -CVE-2013-6654,0,1,ee77c067653bdc2cdca77cd16da0820bcbe71b5b39c06489b92818132419408d,2024-11-21T01:59:27.980000 -CVE-2013-6655,0,1,c23060efb9be4d6d1f7ffb77a89ad9548b50accfe1fd0ac52957e59d3abece18,2024-11-21T01:59:28.137000 -CVE-2013-6656,0,1,d93f698fd4c4696c81ea5981921008070c2a0f7a911397f801a809b381201391,2024-11-21T01:59:29.783000 -CVE-2013-6657,0,1,1df77848874db5fb5f2750ac5c7cd5607d05806f85b072fa5714931d0d62b917,2024-11-21T01:59:29.937000 -CVE-2013-6658,0,1,dd19e2b029001e4531e0da56f8853135c7fe591cbc35c31a09b2664e86e715d9,2024-11-21T01:59:30.090000 -CVE-2013-6659,0,1,c7c7e45393906c8463faa7284bd1592ac64a030ca068093875500bd1226e2646,2024-11-21T01:59:30.247000 -CVE-2013-6660,0,1,d38e33ed7698a9c8771d25a360e3abb3579ca1bca17db5a418d98214829edaa9,2024-11-21T01:59:30.400000 -CVE-2013-6661,0,1,70a6b89bcba5a6f56076815978be049a7f141772869dd93da28bb1485aa9e509,2024-11-21T01:59:30.540000 +CVE-2013-6649,0,0,2b03954eae809e3e1ce3c45c772581cd64e7f6bc0ea0107d2d076b67e25c9832,2024-11-21T01:59:27.297000 +CVE-2013-6650,0,0,7d406f79845c4bdb25bcb72cd8d1de54b36c13819b5d6083ee893d5e778e12c9,2024-11-21T01:59:27.487000 +CVE-2013-6652,0,0,c3752046782540c4c9fdd3574f192a4b62da7cfc1c47d1c2b8d5e1941dcd980b,2024-11-21T01:59:27.660000 +CVE-2013-6653,0,0,171488d1d1d3318c54d37980b790a2868da4172f2f57432a097a08313708130a,2024-11-21T01:59:27.820000 +CVE-2013-6654,0,0,ee77c067653bdc2cdca77cd16da0820bcbe71b5b39c06489b92818132419408d,2024-11-21T01:59:27.980000 +CVE-2013-6655,0,0,c23060efb9be4d6d1f7ffb77a89ad9548b50accfe1fd0ac52957e59d3abece18,2024-11-21T01:59:28.137000 +CVE-2013-6656,0,0,d93f698fd4c4696c81ea5981921008070c2a0f7a911397f801a809b381201391,2024-11-21T01:59:29.783000 +CVE-2013-6657,0,0,1df77848874db5fb5f2750ac5c7cd5607d05806f85b072fa5714931d0d62b917,2024-11-21T01:59:29.937000 +CVE-2013-6658,0,0,dd19e2b029001e4531e0da56f8853135c7fe591cbc35c31a09b2664e86e715d9,2024-11-21T01:59:30.090000 +CVE-2013-6659,0,0,c7c7e45393906c8463faa7284bd1592ac64a030ca068093875500bd1226e2646,2024-11-21T01:59:30.247000 +CVE-2013-6660,0,0,d38e33ed7698a9c8771d25a360e3abb3579ca1bca17db5a418d98214829edaa9,2024-11-21T01:59:30.400000 +CVE-2013-6661,0,0,70a6b89bcba5a6f56076815978be049a7f141772869dd93da28bb1485aa9e509,2024-11-21T01:59:30.540000 CVE-2013-6662,0,0,94812b7530b0e8c90f47e369727c82aa1343186f63fb30b4e768663305bac210,2017-04-20T14:26:57.707000 -CVE-2013-6663,0,1,3ff8c50ab3727c98b78b5d996d1cc004e06fd5f55f24755be183564b5caf0592,2024-11-21T01:59:30.830000 -CVE-2013-6664,0,1,293fdf55cbfc99179fc7b1b727ee9837e685a94bfdc7dd8761ee1b79f945a6ae,2024-11-21T01:59:31 -CVE-2013-6665,0,1,77ff9ac73b20856581ac8631e157fd63a1ddd774520849bb243516bff5ca480a,2024-11-21T01:59:31.150000 -CVE-2013-6666,0,1,70bd7c4f1097e655b61dfa4b097df7646d12446ca168e55f06c529e4b920f9ab,2024-11-21T01:59:31.310000 -CVE-2013-6667,0,1,5ed1519e19c9a75e6830ffb99abd65dcf2c5d241707f985023f8fb45048e51cf,2024-11-21T01:59:31.467000 -CVE-2013-6668,0,1,faad7c968bd844e2ab33149b11d3d5c7ad18d7bda911151c83e7bc641b2a7b4c,2024-11-21T01:59:31.620000 -CVE-2013-6671,0,1,ef3cbf455c2026cc14e5d8dcecd6fbeee5a965d657f0a41472aa37aac8154a41,2024-11-21T01:59:31.807000 -CVE-2013-6672,0,1,b2fd7794e25c1c444a7f2baba78cfd48b54bef40c06cbb93ac1a279b766d28ba,2024-11-21T01:59:31.987000 -CVE-2013-6673,0,1,95184e8bd55471c74dc25fe0183ed5d386c6651f0252751c11de6678c8e8d6e1,2024-11-21T01:59:32.153000 -CVE-2013-6674,0,1,79b6f7328eb7999431cc6ef3e36aca924b204060b0e27d4aeb8870f159ff8912,2024-11-21T01:59:32.327000 +CVE-2013-6663,0,0,3ff8c50ab3727c98b78b5d996d1cc004e06fd5f55f24755be183564b5caf0592,2024-11-21T01:59:30.830000 +CVE-2013-6664,0,0,293fdf55cbfc99179fc7b1b727ee9837e685a94bfdc7dd8761ee1b79f945a6ae,2024-11-21T01:59:31 +CVE-2013-6665,0,0,77ff9ac73b20856581ac8631e157fd63a1ddd774520849bb243516bff5ca480a,2024-11-21T01:59:31.150000 +CVE-2013-6666,0,0,70bd7c4f1097e655b61dfa4b097df7646d12446ca168e55f06c529e4b920f9ab,2024-11-21T01:59:31.310000 +CVE-2013-6667,0,0,5ed1519e19c9a75e6830ffb99abd65dcf2c5d241707f985023f8fb45048e51cf,2024-11-21T01:59:31.467000 +CVE-2013-6668,0,0,faad7c968bd844e2ab33149b11d3d5c7ad18d7bda911151c83e7bc641b2a7b4c,2024-11-21T01:59:31.620000 +CVE-2013-6671,0,0,ef3cbf455c2026cc14e5d8dcecd6fbeee5a965d657f0a41472aa37aac8154a41,2024-11-21T01:59:31.807000 +CVE-2013-6672,0,0,b2fd7794e25c1c444a7f2baba78cfd48b54bef40c06cbb93ac1a279b766d28ba,2024-11-21T01:59:31.987000 +CVE-2013-6673,0,0,95184e8bd55471c74dc25fe0183ed5d386c6651f0252751c11de6678c8e8d6e1,2024-11-21T01:59:32.153000 +CVE-2013-6674,0,0,79b6f7328eb7999431cc6ef3e36aca924b204060b0e27d4aeb8870f159ff8912,2024-11-21T01:59:32.327000 CVE-2013-6675,0,0,2856568928870d4c17dc10b6587bdd7fb0e8c59a3a545d707c7380b3a0ac7622,2023-11-07T02:17:44.247000 CVE-2013-6676,0,0,e330325cae13efbbf71d8b1f0e3a35a597cc216ebfd5fa4bbb223569112ef03f,2023-11-07T02:17:44.563000 CVE-2013-6677,0,0,2aec63bff27cc4c6ba2c9a19e4992c51c5314a9398a5ca5393265ae39994abbf,2023-11-07T02:17:44.793000 @@ -63800,70 +63800,70 @@ CVE-2013-6678,0,0,e3a1a4a05e44a2233c96cf5cc3c8035e6fa33444a794b5addb6d61913b6a17 CVE-2013-6679,0,0,6381ba5dde8c7a1ae10f30d796a6df7994f4037f1a45fe87e282ed9b38fa524f,2023-11-07T02:17:45.270000 CVE-2013-6680,0,0,5157e023c814b57095d90ee82e0c7b9ef560244751b815d416e1f715606fbfe9,2023-11-07T02:17:45.540000 CVE-2013-6681,0,0,f9745b97bd4fa6bca875f068d7c101af569d6201c59ffc63fadf400275d0ef94,2020-02-24T22:03:38.120000 -CVE-2013-6682,0,1,3fa42acce9a4e676c680ddc635c187c91bfb21407bb02f04117c503f9fbcccba,2024-11-21T01:59:32.733000 -CVE-2013-6683,0,1,0271ec4dd102093dd275558dccd9253b93ef59792fa1f6ebc6605e457db3fcdc,2024-11-21T01:59:32.867000 -CVE-2013-6684,0,1,6df76ba408c38416c995b6b49bea8802d88eb33f74301cd8647ca897620cee49,2024-11-21T01:59:32.983000 -CVE-2013-6685,0,1,1daa6a4f4f3a8d3d709a1e417cb09fffc3e4109486f4e5e04ea3f0a6a76af71b,2024-11-21T01:59:33.093000 -CVE-2013-6686,0,1,5f69c076eee432e401a0ae0777a97d9e428edae0197a25b069d2aa6517127202,2024-11-21T01:59:33.207000 -CVE-2013-6687,0,1,0a19df87ed0266db32f2a23c5ecca3c7d38d8cdce3a74d39743f43ad362c1731,2024-11-21T01:59:33.317000 -CVE-2013-6688,0,1,3f3892d510a69252892d5f951b0fbeee767025f020fc01e65aa8c739fe102f2f,2024-11-21T01:59:33.433000 -CVE-2013-6689,0,1,30f4b9c865ad6681fe88bc5dbb82775adf34d6b21b9edec63ad20254760015d4,2024-11-21T01:59:33.560000 -CVE-2013-6690,0,1,520317037fe20ac8b8ac040ca26286c7b2e69590ad906620d5b8162e5e362dcc,2024-11-21T01:59:33.683000 +CVE-2013-6682,0,0,3fa42acce9a4e676c680ddc635c187c91bfb21407bb02f04117c503f9fbcccba,2024-11-21T01:59:32.733000 +CVE-2013-6683,0,0,0271ec4dd102093dd275558dccd9253b93ef59792fa1f6ebc6605e457db3fcdc,2024-11-21T01:59:32.867000 +CVE-2013-6684,0,0,6df76ba408c38416c995b6b49bea8802d88eb33f74301cd8647ca897620cee49,2024-11-21T01:59:32.983000 +CVE-2013-6685,0,0,1daa6a4f4f3a8d3d709a1e417cb09fffc3e4109486f4e5e04ea3f0a6a76af71b,2024-11-21T01:59:33.093000 +CVE-2013-6686,0,0,5f69c076eee432e401a0ae0777a97d9e428edae0197a25b069d2aa6517127202,2024-11-21T01:59:33.207000 +CVE-2013-6687,0,0,0a19df87ed0266db32f2a23c5ecca3c7d38d8cdce3a74d39743f43ad362c1731,2024-11-21T01:59:33.317000 +CVE-2013-6688,0,0,3f3892d510a69252892d5f951b0fbeee767025f020fc01e65aa8c739fe102f2f,2024-11-21T01:59:33.433000 +CVE-2013-6689,0,0,30f4b9c865ad6681fe88bc5dbb82775adf34d6b21b9edec63ad20254760015d4,2024-11-21T01:59:33.560000 +CVE-2013-6690,0,0,520317037fe20ac8b8ac040ca26286c7b2e69590ad906620d5b8162e5e362dcc,2024-11-21T01:59:33.683000 CVE-2013-6691,0,0,7f1974dacd3cf371123bed5f17ac5a26b934a8de966e0c28bb73bb2ec964399d,2022-06-02T15:49:23.810000 -CVE-2013-6692,0,1,c6177dac5bb1f3bb82a48d10a2f270881cc672c674983326dc0f94e2b1c2efb4,2024-11-21T01:59:33.900000 -CVE-2013-6693,0,1,d0b5950fb60e352fb75ad5addc68c447662f0f5f598110781f80bf5dc8cef9b8,2024-11-21T01:59:34.007000 -CVE-2013-6694,0,1,10b4728d8dacdd1be9924f9b4c7b005a2f78dc78ebc9546e9c7b4c6947e1de1f,2024-11-21T01:59:34.117000 -CVE-2013-6695,0,1,378c2e43a689b346c4df4de787367d5c2b39258e0897a42c9bae7ded689be6c5,2024-11-21T01:59:34.220000 -CVE-2013-6696,0,1,83401ca1f6b434a6c92c1369a2fbeaa2d2283e654d5012288eb0174ee8d19ac9,2024-11-21T01:59:34.337000 -CVE-2013-6698,0,1,9060f49d37ab45c7b6ab38f74dba8b89e69c2f51bd3d054a991a090e79477677,2024-11-21T01:59:34.443000 -CVE-2013-6699,0,1,e2b1c3e0254ded5cb4299bc30b29881c6f84b3621f11aa07306c0e26c3eb3721,2024-11-21T01:59:34.550000 -CVE-2013-6700,0,1,56b2ba609dc2bff41b65c882f722439e650fedb892d770c7d0e10818d1348846,2024-11-21T01:59:34.660000 -CVE-2013-6701,0,1,e6c4e85d8b089b2d032c6376a4b97c748b4b35d66ba26956e65d3bf20ba20b31,2024-11-21T01:59:34.770000 -CVE-2013-6702,0,1,22e0fff5a6a3061360cba488a327063cfe44124083f67cf7b17b1643d33e9a24,2024-11-21T01:59:34.880000 -CVE-2013-6703,0,1,88f10b08c11f2427a9f7a6eff8accbea312d123394440bfda049772d3cff64bf,2024-11-21T01:59:34.987000 -CVE-2013-6704,0,1,5ee9f256d71802e0631481e83de973398c42738b8b8509b2959e3873f267e63c,2024-11-21T01:59:35.103000 -CVE-2013-6705,0,1,ab28ec8eed36888aed64e23a9bdfd471a219e89b27c3eb6c5f750bdb9971427b,2024-11-21T01:59:35.210000 -CVE-2013-6706,0,1,a5045be99599cd7912c9321c62c9412eaa3ec3e36a00969fdf356b4d12aeb51b,2024-11-21T01:59:35.327000 -CVE-2013-6707,0,1,9ed2aa7d114aea59696a35e79e99cea7494a896efcff0bf08507f329ab1d9b88,2024-11-21T01:59:35.443000 -CVE-2013-6708,0,1,74852bed19105c9d13336d0f1a6a326f5712f9a12721a195785a8034d179a780,2024-11-21T01:59:35.560000 -CVE-2013-6709,0,1,fe3448b28fd38fbc6fdbd9aa6511e29efff7c8bbaa4ed7f4bbce328df7589eaa,2024-11-21T01:59:35.670000 -CVE-2013-6710,0,1,51025f4bc561f0e00fbbfbe374b2ce9ca30769548c7fb837ee59a3750c68a0c8,2024-11-21T01:59:35.780000 -CVE-2013-6711,0,1,ef9a5079ce9673f2effab66aa67da868905fc98190923a3624a23459a1333575,2024-11-21T01:59:35.890000 -CVE-2013-6712,0,1,57e273aec0fb7e977704ac99df42006ce3a121aaafdbeb1877ab51eab9fcee84,2024-11-21T01:59:35.997000 +CVE-2013-6692,0,0,c6177dac5bb1f3bb82a48d10a2f270881cc672c674983326dc0f94e2b1c2efb4,2024-11-21T01:59:33.900000 +CVE-2013-6693,0,0,d0b5950fb60e352fb75ad5addc68c447662f0f5f598110781f80bf5dc8cef9b8,2024-11-21T01:59:34.007000 +CVE-2013-6694,0,0,10b4728d8dacdd1be9924f9b4c7b005a2f78dc78ebc9546e9c7b4c6947e1de1f,2024-11-21T01:59:34.117000 +CVE-2013-6695,0,0,378c2e43a689b346c4df4de787367d5c2b39258e0897a42c9bae7ded689be6c5,2024-11-21T01:59:34.220000 +CVE-2013-6696,0,0,83401ca1f6b434a6c92c1369a2fbeaa2d2283e654d5012288eb0174ee8d19ac9,2024-11-21T01:59:34.337000 +CVE-2013-6698,0,0,9060f49d37ab45c7b6ab38f74dba8b89e69c2f51bd3d054a991a090e79477677,2024-11-21T01:59:34.443000 +CVE-2013-6699,0,0,e2b1c3e0254ded5cb4299bc30b29881c6f84b3621f11aa07306c0e26c3eb3721,2024-11-21T01:59:34.550000 +CVE-2013-6700,0,0,56b2ba609dc2bff41b65c882f722439e650fedb892d770c7d0e10818d1348846,2024-11-21T01:59:34.660000 +CVE-2013-6701,0,0,e6c4e85d8b089b2d032c6376a4b97c748b4b35d66ba26956e65d3bf20ba20b31,2024-11-21T01:59:34.770000 +CVE-2013-6702,0,0,22e0fff5a6a3061360cba488a327063cfe44124083f67cf7b17b1643d33e9a24,2024-11-21T01:59:34.880000 +CVE-2013-6703,0,0,88f10b08c11f2427a9f7a6eff8accbea312d123394440bfda049772d3cff64bf,2024-11-21T01:59:34.987000 +CVE-2013-6704,0,0,5ee9f256d71802e0631481e83de973398c42738b8b8509b2959e3873f267e63c,2024-11-21T01:59:35.103000 +CVE-2013-6705,0,0,ab28ec8eed36888aed64e23a9bdfd471a219e89b27c3eb6c5f750bdb9971427b,2024-11-21T01:59:35.210000 +CVE-2013-6706,0,0,a5045be99599cd7912c9321c62c9412eaa3ec3e36a00969fdf356b4d12aeb51b,2024-11-21T01:59:35.327000 +CVE-2013-6707,0,0,9ed2aa7d114aea59696a35e79e99cea7494a896efcff0bf08507f329ab1d9b88,2024-11-21T01:59:35.443000 +CVE-2013-6708,0,0,74852bed19105c9d13336d0f1a6a326f5712f9a12721a195785a8034d179a780,2024-11-21T01:59:35.560000 +CVE-2013-6709,0,0,fe3448b28fd38fbc6fdbd9aa6511e29efff7c8bbaa4ed7f4bbce328df7589eaa,2024-11-21T01:59:35.670000 +CVE-2013-6710,0,0,51025f4bc561f0e00fbbfbe374b2ce9ca30769548c7fb837ee59a3750c68a0c8,2024-11-21T01:59:35.780000 +CVE-2013-6711,0,0,ef9a5079ce9673f2effab66aa67da868905fc98190923a3624a23459a1333575,2024-11-21T01:59:35.890000 +CVE-2013-6712,0,0,57e273aec0fb7e977704ac99df42006ce3a121aaafdbeb1877ab51eab9fcee84,2024-11-21T01:59:35.997000 CVE-2013-6713,0,0,799b855ea200630d6337d17bebfdaea80ae8b91ebd9797c527cde70ce5edc50b,2017-08-29T01:33:59.293000 CVE-2013-6714,0,0,0ea9294cdcdbcc8d1874c8faf6071873db010461cd431a4a652249f622c592c3,2017-08-29T01:33:59.340000 CVE-2013-6716,0,0,e313777b85cf57b2fdf6040eceae06bf4ce14440504c35ea0c15e56cf4d193fa,2023-11-07T02:17:46.077000 -CVE-2013-6717,0,1,454e3f99de8e9b3c2220a108f2f2188b80ee13fbfbb77b748fa2770a2ea668c8,2024-11-21T01:59:36.383000 -CVE-2013-6718,0,1,00b0a26a8089689c77f5a592cee70308b6fbfd9b2b8421cc9d61e33e2f81caf7,2024-11-21T01:59:36.503000 -CVE-2013-6719,0,1,43155007b9a58ae1cebf2d093537a5e67e2ae52769739ab3a2c8514f4c4a4ec0,2024-11-21T01:59:36.617000 -CVE-2013-6720,0,1,53492707a964a7e641947c24aeceaf6dac1cb171fbbc3594a7ac7bb7bd9271fc,2024-11-21T01:59:36.720000 -CVE-2013-6721,0,1,c4bc567292c27e10f967d83e1cfe4f93c7352b41784bf84715e1e5cb84b643b9,2024-11-21T01:59:36.830000 -CVE-2013-6722,0,1,4e4132ffc69c02d7038e93fa21450ab1c962c675a236ba9e02adddf1430807fd,2024-11-21T01:59:36.937000 -CVE-2013-6723,0,1,7b64345f2d9217fffd0ecb5859fdb9a83af8c103ac3d71d82d1f3881967334dd,2024-11-21T01:59:37.050000 -CVE-2013-6724,0,1,e2651606d02eddbd51d8fe4a2fc28260b5367a221dc584213289fe1064de9342,2024-11-21T01:59:37.160000 -CVE-2013-6725,0,1,3c0dc3abb161a1cd69e0f1f3d67b33cbc702791c0a205e311e85855fab57b171,2024-11-21T01:59:37.267000 -CVE-2013-6726,0,1,f8352e49d3875ea0685ffd19f9f74113662243169854d0b66d8bc634ab01a0bb,2024-11-21T01:59:37.397000 -CVE-2013-6727,0,1,23ff7b552860ac2eb25fafb107825b3133f39de45123bfe71fbd02f65c6e909d,2024-11-21T01:59:37.503000 -CVE-2013-6728,0,1,e4159135cba16bb3503378601126e90b03b632a157a976e3b85f9a75554e12e1,2024-11-21T01:59:37.603000 -CVE-2013-6729,0,1,5623c6a9a0a9f43102df4fc5bed51c341e35bae132e8c3e9c27f7043d995605c,2024-11-21T01:59:37.710000 -CVE-2013-6730,0,1,72ec5df2f99bdafede96ecd5c4d59d1bfafc2c27d5e413342e825374a4f812e3,2024-11-21T01:59:37.840000 -CVE-2013-6731,0,1,749dc54a740c16dfbd52844bba7c3975d66b39742b38808704cd630b8420c031,2024-11-21T01:59:37.957000 -CVE-2013-6732,0,1,faafe0f2eac5cedc98abcd606ddd59e303c7b000f51f48a55fa7dd482bd2546a,2024-11-21T01:59:38.060000 -CVE-2013-6733,0,1,da461afdedf92ffa9c2e14244097ed3a4914948eebae1825c0d807eed4e9a8cc,2024-11-21T01:59:38.163000 -CVE-2013-6734,0,1,79a718ce90775d7c884027f28ef91478bd01608ba5b43202046149063d2995e9,2024-11-21T01:59:38.267000 -CVE-2013-6735,0,1,a2c71e6cc30938d2f6ad8f12bf5814eca363d5c8f1bf3f4eabf136c513a3c1cb,2024-11-21T01:59:38.370000 +CVE-2013-6717,0,0,454e3f99de8e9b3c2220a108f2f2188b80ee13fbfbb77b748fa2770a2ea668c8,2024-11-21T01:59:36.383000 +CVE-2013-6718,0,0,00b0a26a8089689c77f5a592cee70308b6fbfd9b2b8421cc9d61e33e2f81caf7,2024-11-21T01:59:36.503000 +CVE-2013-6719,0,0,43155007b9a58ae1cebf2d093537a5e67e2ae52769739ab3a2c8514f4c4a4ec0,2024-11-21T01:59:36.617000 +CVE-2013-6720,0,0,53492707a964a7e641947c24aeceaf6dac1cb171fbbc3594a7ac7bb7bd9271fc,2024-11-21T01:59:36.720000 +CVE-2013-6721,0,0,c4bc567292c27e10f967d83e1cfe4f93c7352b41784bf84715e1e5cb84b643b9,2024-11-21T01:59:36.830000 +CVE-2013-6722,0,0,4e4132ffc69c02d7038e93fa21450ab1c962c675a236ba9e02adddf1430807fd,2024-11-21T01:59:36.937000 +CVE-2013-6723,0,0,7b64345f2d9217fffd0ecb5859fdb9a83af8c103ac3d71d82d1f3881967334dd,2024-11-21T01:59:37.050000 +CVE-2013-6724,0,0,e2651606d02eddbd51d8fe4a2fc28260b5367a221dc584213289fe1064de9342,2024-11-21T01:59:37.160000 +CVE-2013-6725,0,0,3c0dc3abb161a1cd69e0f1f3d67b33cbc702791c0a205e311e85855fab57b171,2024-11-21T01:59:37.267000 +CVE-2013-6726,0,0,f8352e49d3875ea0685ffd19f9f74113662243169854d0b66d8bc634ab01a0bb,2024-11-21T01:59:37.397000 +CVE-2013-6727,0,0,23ff7b552860ac2eb25fafb107825b3133f39de45123bfe71fbd02f65c6e909d,2024-11-21T01:59:37.503000 +CVE-2013-6728,0,0,e4159135cba16bb3503378601126e90b03b632a157a976e3b85f9a75554e12e1,2024-11-21T01:59:37.603000 +CVE-2013-6729,0,0,5623c6a9a0a9f43102df4fc5bed51c341e35bae132e8c3e9c27f7043d995605c,2024-11-21T01:59:37.710000 +CVE-2013-6730,0,0,72ec5df2f99bdafede96ecd5c4d59d1bfafc2c27d5e413342e825374a4f812e3,2024-11-21T01:59:37.840000 +CVE-2013-6731,0,0,749dc54a740c16dfbd52844bba7c3975d66b39742b38808704cd630b8420c031,2024-11-21T01:59:37.957000 +CVE-2013-6732,0,0,faafe0f2eac5cedc98abcd606ddd59e303c7b000f51f48a55fa7dd482bd2546a,2024-11-21T01:59:38.060000 +CVE-2013-6733,0,0,da461afdedf92ffa9c2e14244097ed3a4914948eebae1825c0d807eed4e9a8cc,2024-11-21T01:59:38.163000 +CVE-2013-6734,0,0,79a718ce90775d7c884027f28ef91478bd01608ba5b43202046149063d2995e9,2024-11-21T01:59:38.267000 +CVE-2013-6735,0,0,a2c71e6cc30938d2f6ad8f12bf5814eca363d5c8f1bf3f4eabf136c513a3c1cb,2024-11-21T01:59:38.370000 CVE-2013-6737,0,0,065aacf7c709ad2061c86f3200cb0f2b542aa95d985b63fe3e2332ce1cb7bade,2017-08-29T01:34:00.623000 -CVE-2013-6738,0,1,a7785fa3099e6cbb4077e32ebfacb88d2db98259d64a72624b3973ede80a7e40,2024-11-21T01:59:38.610000 +CVE-2013-6738,0,0,a7785fa3099e6cbb4077e32ebfacb88d2db98259d64a72624b3973ede80a7e40,2024-11-21T01:59:38.610000 CVE-2013-6739,0,0,412347398a4ee2987d6e6e50e3d9ea4d9487a9547bef2a5a73618a32bd7902c6,2018-06-04T14:54:18.647000 -CVE-2013-6741,0,1,2487ce72d1db34dd2fc469f4f9d992f4b1ddf82e5d4d2730b7d37f74d5214dce,2024-11-21T01:59:38.813000 -CVE-2013-6742,0,1,448fe11eac1a433d38c73e00e27f94eca617ddcfe72de2b0f18e8689fe4b646c,2024-11-21T01:59:38.920000 -CVE-2013-6743,0,1,1b33e74c2940ce6f09b4803956edd834de6c4531a8c48ae7a9e250d9ce62f921,2024-11-21T01:59:39.017000 +CVE-2013-6741,0,0,2487ce72d1db34dd2fc469f4f9d992f4b1ddf82e5d4d2730b7d37f74d5214dce,2024-11-21T01:59:38.813000 +CVE-2013-6742,0,0,448fe11eac1a433d38c73e00e27f94eca617ddcfe72de2b0f18e8689fe4b646c,2024-11-21T01:59:38.920000 +CVE-2013-6743,0,0,1b33e74c2940ce6f09b4803956edd834de6c4531a8c48ae7a9e250d9ce62f921,2024-11-21T01:59:39.017000 CVE-2013-6744,0,0,556e3f6da3e98e754d535c38e14a287ea4cd1b393052866c8786c508ea44508c,2017-08-29T01:34:00.937000 -CVE-2013-6745,0,1,8021346765e19d6b8a1df876ffa8b67ec89291a153e3aa2696c3a4a81e2a2165,2024-11-21T01:59:39.230000 -CVE-2013-6746,0,1,567d7799dd297da23b27d8dfa980494f3f45a1f46c14d5854a43c41f26bec756,2024-11-21T01:59:39.337000 -CVE-2013-6747,0,1,23076b7efeaead70dbeb9e34f17ae261b3c1d7548a029cec8d9f3847a6755149,2024-11-21T01:59:39.440000 -CVE-2013-6748,0,1,bd2fb9b120f5385d91cc3e40b2d1373894fa3890bdf6dd80cdecc2e1fb0c9034,2024-11-21T01:59:39.560000 -CVE-2013-6749,0,1,b97b688fbdd9746ccc0f39edc131cbdab3a3fd0f1c896e25856fe30669e484c3,2024-11-21T01:59:39.670000 +CVE-2013-6745,0,0,8021346765e19d6b8a1df876ffa8b67ec89291a153e3aa2696c3a4a81e2a2165,2024-11-21T01:59:39.230000 +CVE-2013-6746,0,0,567d7799dd297da23b27d8dfa980494f3f45a1f46c14d5854a43c41f26bec756,2024-11-21T01:59:39.337000 +CVE-2013-6747,0,0,23076b7efeaead70dbeb9e34f17ae261b3c1d7548a029cec8d9f3847a6755149,2024-11-21T01:59:39.440000 +CVE-2013-6748,0,0,bd2fb9b120f5385d91cc3e40b2d1373894fa3890bdf6dd80cdecc2e1fb0c9034,2024-11-21T01:59:39.560000 +CVE-2013-6749,0,0,b97b688fbdd9746ccc0f39edc131cbdab3a3fd0f1c896e25856fe30669e484c3,2024-11-21T01:59:39.670000 CVE-2013-6751,0,0,8f0709ca18b24d0502525c9f7fed6656b1b543a36316e87d4973eed740752997,2023-11-07T02:17:46.567000 CVE-2013-6752,0,0,8a78fe0e51810f35a139bcc3d7be50e9e54d3ecbd1bbbc596844826ddbc55c5e,2023-11-07T02:17:46.777000 CVE-2013-6753,0,0,ea61b8f284ec8ffeb33bd123de16bede410df6d72f282cb25803013c288987ed,2023-11-07T02:17:47.007000 @@ -63876,293 +63876,293 @@ CVE-2013-6759,0,0,bcc1e035656a8ab83c1a76adbdd24090a007bd88b4a992303e6fc8f0ed02c2 CVE-2013-6760,0,0,d1e0ced52a390956e8198cbcd98d8cae8a62556b74e93499440ca845ff743d62,2023-11-07T02:17:48.907000 CVE-2013-6761,0,0,77e43b7c6e1bea92bac77764c7c5a86639fbc30bc37c18f0f730709a9869d826,2023-11-07T02:17:49.147000 CVE-2013-6762,0,0,e1f7b673be8549ae0a49553ef3c4c89b3b98ae8724ecfced564761e93f81fd61,2023-11-07T02:17:49.397000 -CVE-2013-6763,0,1,13578e980c3112fc4a400ad716860db2f1a0bff8f2eca9463be34681a584bc12,2024-11-21T01:59:39.940000 +CVE-2013-6763,0,0,13578e980c3112fc4a400ad716860db2f1a0bff8f2eca9463be34681a584bc12,2024-11-21T01:59:39.940000 CVE-2013-6764,0,0,917d46586104f15b71a29c9ec0189da8ffc27bbab14f07fbd6ef80ebe72994f8,2023-11-07T02:17:49.730000 -CVE-2013-6765,0,1,716bbfacf118b4b61d0aa1a851bb66a0e20825c40591a12fc59779d463a19da6,2024-11-21T01:59:40.127000 -CVE-2013-6766,0,1,bbde8323ec678493b959bdea32d218da5fcd5bd156c79a9324fd6a2137c77222,2024-11-21T01:59:40.267000 -CVE-2013-6767,0,1,6770d53441f9909221454aa21832d61d051e4ff25750031e98ceb22ba274bafa,2024-11-21T01:59:40.403000 -CVE-2013-6768,0,1,2d9b99c87d1e29a415dced0faaa4559b3ff3e0b81b73427ce6814da6c5fa5774,2024-11-21T01:59:40.547000 -CVE-2013-6769,0,1,0cb42c9627ee1f713d83d43101700911ebb377933fc754364004de1d0c91d775,2024-11-21T01:59:40.687000 -CVE-2013-6770,0,1,e57b4c4157f189dd6cbe2096c1a56d799d83af5e4876a7b8020b77f3c8e60a13,2024-11-21T01:59:40.820000 +CVE-2013-6765,0,0,716bbfacf118b4b61d0aa1a851bb66a0e20825c40591a12fc59779d463a19da6,2024-11-21T01:59:40.127000 +CVE-2013-6766,0,0,bbde8323ec678493b959bdea32d218da5fcd5bd156c79a9324fd6a2137c77222,2024-11-21T01:59:40.267000 +CVE-2013-6767,0,0,6770d53441f9909221454aa21832d61d051e4ff25750031e98ceb22ba274bafa,2024-11-21T01:59:40.403000 +CVE-2013-6768,0,0,2d9b99c87d1e29a415dced0faaa4559b3ff3e0b81b73427ce6814da6c5fa5774,2024-11-21T01:59:40.547000 +CVE-2013-6769,0,0,0cb42c9627ee1f713d83d43101700911ebb377933fc754364004de1d0c91d775,2024-11-21T01:59:40.687000 +CVE-2013-6770,0,0,e57b4c4157f189dd6cbe2096c1a56d799d83af5e4876a7b8020b77f3c8e60a13,2024-11-21T01:59:40.820000 CVE-2013-6771,0,0,96b1e9c7a5d13eee13b5fa9337283a9eac442fcb2912bda5b3b65789036d54c0,2014-08-07T13:34:21.957000 CVE-2013-6772,0,0,81ee92bf09f8eb8c186a675559790384b498794a2455ef5b13bf8442f005a766,2020-01-27T17:08:50.510000 CVE-2013-6773,0,0,53846eda72e02a6595dd153169ef039033e54c76931126017cb7ef63d6ca091b,2020-01-27T16:37:09.077000 -CVE-2013-6774,0,1,aa055d09e122a0ea6627a4406404ca5b43200463eb107c7e60b346e8ad32aa89,2024-11-21T01:59:41.370000 -CVE-2013-6775,0,1,3fc3cc9cda0e06e53e803b89ff747913815aac77c63312676fc2993f2d91e1d5,2024-11-21T01:59:41.533000 -CVE-2013-6780,0,1,a6609b6227f5feded2b9204a0f8b12489e24a17b8065ff2c23ab46e09398d80e,2024-11-21T01:59:41.670000 +CVE-2013-6774,0,0,aa055d09e122a0ea6627a4406404ca5b43200463eb107c7e60b346e8ad32aa89,2024-11-21T01:59:41.370000 +CVE-2013-6775,0,0,3fc3cc9cda0e06e53e803b89ff747913815aac77c63312676fc2993f2d91e1d5,2024-11-21T01:59:41.533000 +CVE-2013-6780,0,0,a6609b6227f5feded2b9204a0f8b12489e24a17b8065ff2c23ab46e09398d80e,2024-11-21T01:59:41.670000 CVE-2013-6785,0,0,8bab732b4e8679d44519a9453e1786df61cefd698384e22c0697774fc2a08d63,2020-02-04T20:27:06.137000 -CVE-2013-6786,0,1,b15cf59dbfde625eae73ae013b9c7617384a1f7b3f7db6c5d8f44e1cd8a85fbd,2024-11-21T01:59:41.950000 -CVE-2013-6787,0,1,1d14a9500199b83705634daffe525c87b3cf9b172fc6f73cbe9f84ab12dd9b00,2024-11-21T01:59:42.087000 +CVE-2013-6786,0,0,b15cf59dbfde625eae73ae013b9c7617384a1f7b3f7db6c5d8f44e1cd8a85fbd,2024-11-21T01:59:41.950000 +CVE-2013-6787,0,0,1d14a9500199b83705634daffe525c87b3cf9b172fc6f73cbe9f84ab12dd9b00,2024-11-21T01:59:42.087000 CVE-2013-6788,0,0,19631d0beec38af2c8cfb2e2f4c49c17097b0c0e2e3353fbd0004c60a09ba768,2014-06-26T15:38:38.143000 -CVE-2013-6789,0,1,730f57469150301ae58b1dec54d9047792b56cecf75e3058726183b97a27304b,2024-11-21T01:59:42.360000 -CVE-2013-6791,0,1,7fb395cb6e2e3f8ec0de772a5ef52079b9bb75f2b96c5d2197433565fc246c56,2024-11-21T01:59:42.493000 +CVE-2013-6789,0,0,730f57469150301ae58b1dec54d9047792b56cecf75e3058726183b97a27304b,2024-11-21T01:59:42.360000 +CVE-2013-6791,0,0,7fb395cb6e2e3f8ec0de772a5ef52079b9bb75f2b96c5d2197433565fc246c56,2024-11-21T01:59:42.493000 CVE-2013-6792,0,0,bf94d14e1f960b3bf9575ff468140efaaf708006fd39934cf92f975ac2db8c91,2020-01-27T18:18:31.203000 -CVE-2013-6793,0,1,0c40fbc24bfdd0c8740c22fd2deed16f718f73e48c9ca05f1494b1b7172e99c4,2024-11-21T01:59:42.767000 -CVE-2013-6794,0,1,b853bf4c50ab74fb8864a9f38d6163a7083630a276fb25758eae8a7c3f3569fe,2024-11-21T01:59:42.920000 -CVE-2013-6795,0,1,99ea5fc6799421a4b9653ed7652f5f3f763ddb2dcbd47b80e09d3660bdf8b4ea,2024-11-21T01:59:43.090000 +CVE-2013-6793,0,0,0c40fbc24bfdd0c8740c22fd2deed16f718f73e48c9ca05f1494b1b7172e99c4,2024-11-21T01:59:42.767000 +CVE-2013-6794,0,0,b853bf4c50ab74fb8864a9f38d6163a7083630a276fb25758eae8a7c3f3569fe,2024-11-21T01:59:42.920000 +CVE-2013-6795,0,0,99ea5fc6799421a4b9653ed7652f5f3f763ddb2dcbd47b80e09d3660bdf8b4ea,2024-11-21T01:59:43.090000 CVE-2013-6796,0,0,ceaf1d7f884ab1162cd90b224615cb19a0a7f23c72ca0501bac0868ed3131bd6,2017-08-29T01:34:01.293000 -CVE-2013-6797,0,1,1162384f5b21ee9e911e025eab7457ecd8ca8d915311711a712c9603ff0f24c2,2024-11-21T01:59:43.380000 -CVE-2013-6798,0,1,45ce9946ba2b59290921cf0a737a5c459ec200085e36003f34b384d436b13372,2024-11-21T01:59:43.520000 -CVE-2013-6799,0,1,cac6081fc23ef7d9e16a047d3e4655769be20075247edfddc6f00be296adfe95,2024-11-21T01:59:43.653000 -CVE-2013-6800,0,1,023e89554bbeded529f94486ea4f7d1a2c87978e85063018ffa1c610d8c790dd,2024-11-21T01:59:43.790000 -CVE-2013-6801,0,1,f6f3a9e94f981b212877f5aadcbab114981eccc938e531348ca69eff49e8b6ef,2024-11-21T01:59:43.927000 -CVE-2013-6802,0,1,e1a52eb2dad23419ee997b4797150710a0fd7de8612b74ac609535d79e6717a6,2024-11-21T01:59:44.060000 -CVE-2013-6804,0,1,995abc2870c9d6c0eea5b427a6dce7c0ce3a9899720f5c50e6bd1b0019229eae,2024-11-21T01:59:44.200000 -CVE-2013-6805,0,1,281597d24f73dcc1ecced6a0f87dd9a4b0ff858b5c5f972f9845626eb3352f2a,2024-11-21T01:59:44.337000 -CVE-2013-6806,0,1,ed20ad30e3bfcaac05ebc33b1d5bb7f7abe1505e4d8ca13466b880a9cef710c7,2024-11-21T01:59:44.467000 -CVE-2013-6807,0,1,e8339f4a3e97ccb48fe9cee42d7a1987323f61864631b8484d13b8a367d70f4c,2024-11-21T01:59:44.603000 -CVE-2013-6808,0,1,7fb67b0a9207b80e32f26ac72c64afedebeb5e5ddda554710e0796a62bc4ce6c,2024-11-21T01:59:44.733000 -CVE-2013-6809,0,1,8ce9ff6ea34717c795f176535bb2a3fb3584d3ced0fa8675cb234efae3aadda2,2024-11-21T01:59:44.873000 -CVE-2013-6810,0,1,2f84e45ce1ba3004391abcc0f2cbbe99b32546e465f035d495c7f61b8d9c716b,2024-11-21T01:59:45.037000 +CVE-2013-6797,0,0,1162384f5b21ee9e911e025eab7457ecd8ca8d915311711a712c9603ff0f24c2,2024-11-21T01:59:43.380000 +CVE-2013-6798,0,0,45ce9946ba2b59290921cf0a737a5c459ec200085e36003f34b384d436b13372,2024-11-21T01:59:43.520000 +CVE-2013-6799,0,0,cac6081fc23ef7d9e16a047d3e4655769be20075247edfddc6f00be296adfe95,2024-11-21T01:59:43.653000 +CVE-2013-6800,0,0,023e89554bbeded529f94486ea4f7d1a2c87978e85063018ffa1c610d8c790dd,2024-11-21T01:59:43.790000 +CVE-2013-6801,0,0,f6f3a9e94f981b212877f5aadcbab114981eccc938e531348ca69eff49e8b6ef,2024-11-21T01:59:43.927000 +CVE-2013-6802,0,0,e1a52eb2dad23419ee997b4797150710a0fd7de8612b74ac609535d79e6717a6,2024-11-21T01:59:44.060000 +CVE-2013-6804,0,0,995abc2870c9d6c0eea5b427a6dce7c0ce3a9899720f5c50e6bd1b0019229eae,2024-11-21T01:59:44.200000 +CVE-2013-6805,0,0,281597d24f73dcc1ecced6a0f87dd9a4b0ff858b5c5f972f9845626eb3352f2a,2024-11-21T01:59:44.337000 +CVE-2013-6806,0,0,ed20ad30e3bfcaac05ebc33b1d5bb7f7abe1505e4d8ca13466b880a9cef710c7,2024-11-21T01:59:44.467000 +CVE-2013-6807,0,0,e8339f4a3e97ccb48fe9cee42d7a1987323f61864631b8484d13b8a367d70f4c,2024-11-21T01:59:44.603000 +CVE-2013-6808,0,0,7fb67b0a9207b80e32f26ac72c64afedebeb5e5ddda554710e0796a62bc4ce6c,2024-11-21T01:59:44.733000 +CVE-2013-6809,0,0,8ce9ff6ea34717c795f176535bb2a3fb3584d3ced0fa8675cb234efae3aadda2,2024-11-21T01:59:44.873000 +CVE-2013-6810,0,0,2f84e45ce1ba3004391abcc0f2cbbe99b32546e465f035d495c7f61b8d9c716b,2024-11-21T01:59:45.037000 CVE-2013-6811,0,0,0d69bb5a2efe6daf00f9fb009cca8717148e63f2a207e02c0f5658129e660531,2019-12-04T14:51:30.143000 -CVE-2013-6812,0,1,bef4c659ea4587f98a7ab5b0d7eb1018b81e05d4b7376fd6dd40909a5060b9de,2024-11-21T01:59:45.337000 -CVE-2013-6814,0,1,adcfec9c3f813ffb2a730283e1bceb4fb99280dfe76d8e23098bf9c1c68bf723,2024-11-21T01:59:45.480000 -CVE-2013-6815,0,1,9a4d39621433dc12c38f72ba5b145c71fe033f09fb211b7837ea3b96937e3800,2024-11-21T01:59:45.610000 -CVE-2013-6816,0,1,10fda2540279735cb69872477f794dc7df0e0f098cf55b0dc9dd8f6eb9a35ca2,2024-11-21T01:59:45.750000 -CVE-2013-6817,0,1,17f7b126af5e5cb9e2aa59f4b789ec46b6775dbd43204f8424070fc620f7977b,2024-11-21T01:59:45.883000 -CVE-2013-6818,0,1,e6df9bce6dd3f2429756527189112a988fc537bcf895f29015a3f8c11269fc4a,2024-11-21T01:59:46.020000 -CVE-2013-6819,0,1,2613ea36c13f1620b215f3bf22c383e00a86bb18c9e7199489110ada297864ee,2024-11-21T01:59:46.160000 -CVE-2013-6820,0,1,ca585aa553b36b84626e05009411ebc03c1f8e4b5d9dccce02d9f9a8c761bf1b,2024-11-21T01:59:46.297000 -CVE-2013-6821,0,1,afa9cfc684a4a3b5d716ee0e8de2f1fb63287f1c11ba6efe0f31dc780ffe6c1b,2024-11-21T01:59:46.430000 -CVE-2013-6822,0,1,685cdd733f12a67a270eb10c1f56c8e83d6c3893257752877cdfd3311b422171,2024-11-21T01:59:46.570000 -CVE-2013-6823,0,1,3f4ab5ba507ceb0d45fb0f1286a3b2c66787c03e142bff2454217ea16b78ac87,2024-11-21T01:59:46.720000 -CVE-2013-6824,0,1,2970f7f86d2a49223a381b6e6f7da6ff2427717c812272751689ff965f37ab70,2024-11-21T01:59:46.857000 +CVE-2013-6812,0,0,bef4c659ea4587f98a7ab5b0d7eb1018b81e05d4b7376fd6dd40909a5060b9de,2024-11-21T01:59:45.337000 +CVE-2013-6814,0,0,adcfec9c3f813ffb2a730283e1bceb4fb99280dfe76d8e23098bf9c1c68bf723,2024-11-21T01:59:45.480000 +CVE-2013-6815,0,0,9a4d39621433dc12c38f72ba5b145c71fe033f09fb211b7837ea3b96937e3800,2024-11-21T01:59:45.610000 +CVE-2013-6816,0,0,10fda2540279735cb69872477f794dc7df0e0f098cf55b0dc9dd8f6eb9a35ca2,2024-11-21T01:59:45.750000 +CVE-2013-6817,0,0,17f7b126af5e5cb9e2aa59f4b789ec46b6775dbd43204f8424070fc620f7977b,2024-11-21T01:59:45.883000 +CVE-2013-6818,0,0,e6df9bce6dd3f2429756527189112a988fc537bcf895f29015a3f8c11269fc4a,2024-11-21T01:59:46.020000 +CVE-2013-6819,0,0,2613ea36c13f1620b215f3bf22c383e00a86bb18c9e7199489110ada297864ee,2024-11-21T01:59:46.160000 +CVE-2013-6820,0,0,ca585aa553b36b84626e05009411ebc03c1f8e4b5d9dccce02d9f9a8c761bf1b,2024-11-21T01:59:46.297000 +CVE-2013-6821,0,0,afa9cfc684a4a3b5d716ee0e8de2f1fb63287f1c11ba6efe0f31dc780ffe6c1b,2024-11-21T01:59:46.430000 +CVE-2013-6822,0,0,685cdd733f12a67a270eb10c1f56c8e83d6c3893257752877cdfd3311b422171,2024-11-21T01:59:46.570000 +CVE-2013-6823,0,0,3f4ab5ba507ceb0d45fb0f1286a3b2c66787c03e142bff2454217ea16b78ac87,2024-11-21T01:59:46.720000 +CVE-2013-6824,0,0,2970f7f86d2a49223a381b6e6f7da6ff2427717c812272751689ff965f37ab70,2024-11-21T01:59:46.857000 CVE-2013-6825,0,0,82f878e75217d13232f15b44d295dc7926e82d35b55bdbabaa9f68b64f87e494,2023-11-07T02:17:50.223000 -CVE-2013-6826,0,1,d6a1c458fbe86a02cc8e7fe261b70f6c755c656965f809e54cc7444282382a34,2024-11-21T01:59:47.160000 -CVE-2013-6827,0,1,2432f192d31199803cfc699c415ee185aa485a8ba4d832de31a847d86a6dc5fc,2024-11-21T01:59:47.297000 -CVE-2013-6828,0,1,c7a52c308f115ca63ba6eff2957d74b24067504d2ad2643c37763c795699b9b5,2024-11-21T01:59:47.433000 -CVE-2013-6829,0,1,a84b73b2cacb1dd19b12f107d9311fd13b5d753e9ba34befed3a3112c5b5f145,2024-11-21T01:59:47.570000 -CVE-2013-6830,0,1,e3413d0777ccd2c5b9add7ebfad2d3eaf95fd03db946a23aace29342d0945aa5,2024-11-21T01:59:47.707000 -CVE-2013-6831,0,1,d074d67715d67a6e2770ddf4e8c1eab17ffc09871b6a7743012a5cef6b663de8,2024-11-21T01:59:47.847000 -CVE-2013-6832,0,1,4883965046f35e97baeaa186953c07e2fbf0d756db56588020b3addfa09367e3,2024-11-21T01:59:47.980000 -CVE-2013-6833,0,1,55158eefdc991d988eaf4caa70254a57c266ee99a734e6bf85f1b9fe763b29b3,2024-11-21T01:59:48.130000 -CVE-2013-6834,0,1,97ff94f2650eba7a68d70a9138c9e3a9eb99259e574a10a1c8272f4a26c67da4,2024-11-21T01:59:48.290000 -CVE-2013-6835,0,1,b43554b5785b5d53af4e5397996e4018aaebd80917e7afe557527fe6b00faad5,2024-11-21T01:59:48.443000 -CVE-2013-6836,0,1,dfea5087c892bb30580560ff1c2607afdd27d396c7f1a00bf8abd76e8175c10b,2024-11-21T01:59:48.600000 -CVE-2013-6837,0,1,994c8ba78fd0f3cf83fa3b90a97f6195ef1ee492185fa4b3ec25b3f4e9d7b87b,2024-11-21T01:59:48.747000 -CVE-2013-6838,0,1,a51314e82728369dfbbcad75b6c82b4982c6b015c5fadf492018d65b559501a8,2024-11-21T01:59:48.893000 -CVE-2013-6839,0,1,e3e014e7023cfc93168afc3feb20fce615d70bd0cb72072dcbfd0338bf376f74,2024-11-21T01:59:49.033000 -CVE-2013-6840,0,1,c317abda700dd674f17237a9b69320b096232b12e54d12b0077da7390d78431a,2024-11-21T01:59:49.183000 -CVE-2013-6852,0,1,735d45cad8efd3d5d197b51100c405761afb3c709e13bcd63ea3a094a6fb7767,2024-11-21T01:59:49.320000 -CVE-2013-6853,0,1,165c3104c0402be3ffb2edcfda2ebf4d25a09fbf536a092d688c176c4d6caa8f,2024-11-21T01:59:49.453000 -CVE-2013-6858,0,1,82149faddf509d430306726d74868bd9d510aa019b370c4d230c014779e2db4a,2024-11-21T01:59:49.603000 -CVE-2013-6859,0,1,31b29012edb61b191405f81fd462ca2fbc0b6c04c59361f22aad0b7002887b3c,2024-11-21T01:59:49.763000 -CVE-2013-6860,0,1,159f4ad5221c010bfcf942bf1aca82de0eaae8ab5bf6437b0270a24149e70ad9,2024-11-21T01:59:49.913000 -CVE-2013-6861,0,1,b8ce2ce78f1c9ce8c70bdf59cfa8fa04422927075ac46e3d8d8c54981cddaff8,2024-11-21T01:59:50.070000 -CVE-2013-6862,0,1,4115313fc82c21f2c99bedf680632d9d78c93394c9658cd681a36d8ce89f6de2,2024-11-21T01:59:50.217000 -CVE-2013-6863,0,1,a7ff7f2939831eb3016158a73c1188d78e870de533913ca04a2dcc93fa7fc540,2024-11-21T01:59:50.367000 -CVE-2013-6864,0,1,4d983791642bdfa213eeacde3a06bf47d1fd1ba5e7cda82c26127b14c2216a0a,2024-11-21T01:59:50.513000 -CVE-2013-6865,0,1,95d293d1c9e7121cdc9b9f1d4953e9ebca078e7f34b964448c6eee9a42cce791,2024-11-21T01:59:50.657000 -CVE-2013-6866,0,1,1839a7d122a61717e35c742e0c4dc4ba58a90e5e213fc75933a517f710052516,2024-11-21T01:59:50.907000 -CVE-2013-6867,0,1,d90960e9b39e402cb219d83621292f18d623e33bc5fe6c78c0d6c87fb702bdc1,2024-11-21T01:59:51.593000 -CVE-2013-6868,0,1,fd43e276bcd6238e69ba9ae120ef5164311b3a161000623cf3d39672c7565079,2024-11-21T01:59:52.133000 -CVE-2013-6869,0,1,64df53a6653f3d1783b5942db5bbb23816b0d70c56569250696dbb544860c048,2024-11-21T01:59:52.290000 -CVE-2013-6870,0,1,a0cbe507c8242587a9c0d0aa61accb4dc6b255dfb8fcfb10a86e98ab50321e11,2024-11-21T01:59:52.443000 -CVE-2013-6872,0,1,b3a8ac28923faac92a00cc951f4266adab1ca2ce79e659dd1000d020bcdd4f64,2024-11-21T01:59:52.610000 -CVE-2013-6873,0,1,0434c2dcd7c8668f9fca8045ef6aba2fe1056de91919dc28e0c3c3cb0c987bc1,2024-11-21T01:59:52.760000 -CVE-2013-6874,0,1,cfb3c0a280710e9cd4991fe98d1ea223ff5765b4fc4e55d2cdcfff2b4f2e2e2f,2024-11-21T01:59:52.903000 -CVE-2013-6875,0,1,4087ff185873c01342cfa7bd27dde975238f6b18de215a37d24022134c5840b6,2024-11-21T01:59:53.037000 +CVE-2013-6826,0,0,d6a1c458fbe86a02cc8e7fe261b70f6c755c656965f809e54cc7444282382a34,2024-11-21T01:59:47.160000 +CVE-2013-6827,0,0,2432f192d31199803cfc699c415ee185aa485a8ba4d832de31a847d86a6dc5fc,2024-11-21T01:59:47.297000 +CVE-2013-6828,0,0,c7a52c308f115ca63ba6eff2957d74b24067504d2ad2643c37763c795699b9b5,2024-11-21T01:59:47.433000 +CVE-2013-6829,0,0,a84b73b2cacb1dd19b12f107d9311fd13b5d753e9ba34befed3a3112c5b5f145,2024-11-21T01:59:47.570000 +CVE-2013-6830,0,0,e3413d0777ccd2c5b9add7ebfad2d3eaf95fd03db946a23aace29342d0945aa5,2024-11-21T01:59:47.707000 +CVE-2013-6831,0,0,d074d67715d67a6e2770ddf4e8c1eab17ffc09871b6a7743012a5cef6b663de8,2024-11-21T01:59:47.847000 +CVE-2013-6832,0,0,4883965046f35e97baeaa186953c07e2fbf0d756db56588020b3addfa09367e3,2024-11-21T01:59:47.980000 +CVE-2013-6833,0,0,55158eefdc991d988eaf4caa70254a57c266ee99a734e6bf85f1b9fe763b29b3,2024-11-21T01:59:48.130000 +CVE-2013-6834,0,0,97ff94f2650eba7a68d70a9138c9e3a9eb99259e574a10a1c8272f4a26c67da4,2024-11-21T01:59:48.290000 +CVE-2013-6835,0,0,b43554b5785b5d53af4e5397996e4018aaebd80917e7afe557527fe6b00faad5,2024-11-21T01:59:48.443000 +CVE-2013-6836,0,0,dfea5087c892bb30580560ff1c2607afdd27d396c7f1a00bf8abd76e8175c10b,2024-11-21T01:59:48.600000 +CVE-2013-6837,0,0,994c8ba78fd0f3cf83fa3b90a97f6195ef1ee492185fa4b3ec25b3f4e9d7b87b,2024-11-21T01:59:48.747000 +CVE-2013-6838,0,0,a51314e82728369dfbbcad75b6c82b4982c6b015c5fadf492018d65b559501a8,2024-11-21T01:59:48.893000 +CVE-2013-6839,0,0,e3e014e7023cfc93168afc3feb20fce615d70bd0cb72072dcbfd0338bf376f74,2024-11-21T01:59:49.033000 +CVE-2013-6840,0,0,c317abda700dd674f17237a9b69320b096232b12e54d12b0077da7390d78431a,2024-11-21T01:59:49.183000 +CVE-2013-6852,0,0,735d45cad8efd3d5d197b51100c405761afb3c709e13bcd63ea3a094a6fb7767,2024-11-21T01:59:49.320000 +CVE-2013-6853,0,0,165c3104c0402be3ffb2edcfda2ebf4d25a09fbf536a092d688c176c4d6caa8f,2024-11-21T01:59:49.453000 +CVE-2013-6858,0,0,82149faddf509d430306726d74868bd9d510aa019b370c4d230c014779e2db4a,2024-11-21T01:59:49.603000 +CVE-2013-6859,0,0,31b29012edb61b191405f81fd462ca2fbc0b6c04c59361f22aad0b7002887b3c,2024-11-21T01:59:49.763000 +CVE-2013-6860,0,0,159f4ad5221c010bfcf942bf1aca82de0eaae8ab5bf6437b0270a24149e70ad9,2024-11-21T01:59:49.913000 +CVE-2013-6861,0,0,b8ce2ce78f1c9ce8c70bdf59cfa8fa04422927075ac46e3d8d8c54981cddaff8,2024-11-21T01:59:50.070000 +CVE-2013-6862,0,0,4115313fc82c21f2c99bedf680632d9d78c93394c9658cd681a36d8ce89f6de2,2024-11-21T01:59:50.217000 +CVE-2013-6863,0,0,a7ff7f2939831eb3016158a73c1188d78e870de533913ca04a2dcc93fa7fc540,2024-11-21T01:59:50.367000 +CVE-2013-6864,0,0,4d983791642bdfa213eeacde3a06bf47d1fd1ba5e7cda82c26127b14c2216a0a,2024-11-21T01:59:50.513000 +CVE-2013-6865,0,0,95d293d1c9e7121cdc9b9f1d4953e9ebca078e7f34b964448c6eee9a42cce791,2024-11-21T01:59:50.657000 +CVE-2013-6866,0,0,1839a7d122a61717e35c742e0c4dc4ba58a90e5e213fc75933a517f710052516,2024-11-21T01:59:50.907000 +CVE-2013-6867,0,0,d90960e9b39e402cb219d83621292f18d623e33bc5fe6c78c0d6c87fb702bdc1,2024-11-21T01:59:51.593000 +CVE-2013-6868,0,0,fd43e276bcd6238e69ba9ae120ef5164311b3a161000623cf3d39672c7565079,2024-11-21T01:59:52.133000 +CVE-2013-6869,0,0,64df53a6653f3d1783b5942db5bbb23816b0d70c56569250696dbb544860c048,2024-11-21T01:59:52.290000 +CVE-2013-6870,0,0,a0cbe507c8242587a9c0d0aa61accb4dc6b255dfb8fcfb10a86e98ab50321e11,2024-11-21T01:59:52.443000 +CVE-2013-6872,0,0,b3a8ac28923faac92a00cc951f4266adab1ca2ce79e659dd1000d020bcdd4f64,2024-11-21T01:59:52.610000 +CVE-2013-6873,0,0,0434c2dcd7c8668f9fca8045ef6aba2fe1056de91919dc28e0c3c3cb0c987bc1,2024-11-21T01:59:52.760000 +CVE-2013-6874,0,0,cfb3c0a280710e9cd4991fe98d1ea223ff5765b4fc4e55d2cdcfff2b4f2e2e2f,2024-11-21T01:59:52.903000 +CVE-2013-6875,0,0,4087ff185873c01342cfa7bd27dde975238f6b18de215a37d24022134c5840b6,2024-11-21T01:59:53.037000 CVE-2013-6876,0,0,6759c044faf99874f39a8edc9fd3bd62a6da722893bcacecaa19d4272564d268,2018-10-09T19:35:00.767000 -CVE-2013-6877,0,1,31283e411061871b204c1eeb5e569cd03a238f486b0a18c2c9676afe7019a4c9,2024-11-21T01:59:53.390000 +CVE-2013-6877,0,0,31283e411061871b204c1eeb5e569cd03a238f486b0a18c2c9676afe7019a4c9,2024-11-21T01:59:53.390000 CVE-2013-6878,0,0,8740d92b6095b8810c6fe74c9c4f73f39e9868b300740a74e6f95514d23fb6f0,2019-12-02T20:00:31.027000 CVE-2013-6879,0,0,ede038a5ab8220a147bfb0bed00f1b2993a6ec671a355e733d88000d8caad0fc,2019-12-04T17:15:05.567000 CVE-2013-6880,0,0,144cc9e51792e6de0c6601819e3ef5102be7f3797def39fed03261285e71137d,2019-12-02T20:03:45.940000 -CVE-2013-6881,0,1,dc0c9a41c141279f71e357b4dc4c9cca72c5216314b4e231b3fee163da4340cf,2024-11-21T01:59:53.970000 -CVE-2013-6882,0,1,2322dfa08a24aaf87e7efc24a9a23bd02ba6a8518f5e51fe372a5f63e8a28211,2024-11-21T01:59:54.120000 -CVE-2013-6883,0,1,4ec8ef1f84ec1153c2b3dde2e9c2ceaa0797ea588fad1a4650d922cfa2910304,2024-11-21T01:59:54.267000 -CVE-2013-6884,0,1,52061c265913b798215fa95608060068c21a62affa87533f399fe787bb81dbe1,2024-11-21T01:59:54.433000 -CVE-2013-6885,0,1,2c755eafbe9fc2031f0bf59cb772865c7f32f433684390b356e2dd90b3f95735,2024-11-21T01:59:54.593000 -CVE-2013-6886,0,1,5bddfd8e5671cbc11c251ea87eff28acad0fc495894ea724bc50993a7149f933,2024-11-21T01:59:54.763000 -CVE-2013-6887,0,1,fc40fc1934421dac9f81c4dcec72b1a0f2d8a9b3800721283d32e4a22732f44b,2024-11-21T01:59:54.910000 -CVE-2013-6888,0,1,a4b1bc26279c8894c692b944d77183a8871c5732ef0dd1172318dc01ab268b2d,2024-11-21T01:59:55.073000 -CVE-2013-6889,0,1,f237b7ac3fcb8282e6eaf786de22f069376ba3ebc455991a4e1daa2e9ff197e9,2024-11-21T01:59:55.223000 -CVE-2013-6890,0,1,8cb8e1c22bd1201b7ec9bd44e81e502d0b014af0157a5397f9aeedb718b7a056,2024-11-21T01:59:55.363000 -CVE-2013-6891,0,1,e896f7cfc42d70b631504d57b89244ec26c942efb256f1330d6372f3737a76b5,2024-11-21T01:59:55.510000 +CVE-2013-6881,0,0,dc0c9a41c141279f71e357b4dc4c9cca72c5216314b4e231b3fee163da4340cf,2024-11-21T01:59:53.970000 +CVE-2013-6882,0,0,2322dfa08a24aaf87e7efc24a9a23bd02ba6a8518f5e51fe372a5f63e8a28211,2024-11-21T01:59:54.120000 +CVE-2013-6883,0,0,4ec8ef1f84ec1153c2b3dde2e9c2ceaa0797ea588fad1a4650d922cfa2910304,2024-11-21T01:59:54.267000 +CVE-2013-6884,0,0,52061c265913b798215fa95608060068c21a62affa87533f399fe787bb81dbe1,2024-11-21T01:59:54.433000 +CVE-2013-6885,0,0,2c755eafbe9fc2031f0bf59cb772865c7f32f433684390b356e2dd90b3f95735,2024-11-21T01:59:54.593000 +CVE-2013-6886,0,0,5bddfd8e5671cbc11c251ea87eff28acad0fc495894ea724bc50993a7149f933,2024-11-21T01:59:54.763000 +CVE-2013-6887,0,0,fc40fc1934421dac9f81c4dcec72b1a0f2d8a9b3800721283d32e4a22732f44b,2024-11-21T01:59:54.910000 +CVE-2013-6888,0,0,a4b1bc26279c8894c692b944d77183a8871c5732ef0dd1172318dc01ab268b2d,2024-11-21T01:59:55.073000 +CVE-2013-6889,0,0,f237b7ac3fcb8282e6eaf786de22f069376ba3ebc455991a4e1daa2e9ff197e9,2024-11-21T01:59:55.223000 +CVE-2013-6890,0,0,8cb8e1c22bd1201b7ec9bd44e81e502d0b014af0157a5397f9aeedb718b7a056,2024-11-21T01:59:55.363000 +CVE-2013-6891,0,0,e896f7cfc42d70b631504d57b89244ec26c942efb256f1330d6372f3737a76b5,2024-11-21T01:59:55.510000 CVE-2013-6892,0,0,7de70ed2bb0e8ef43451a4639dca2ef005a5e7ed01f40c6e0b4a45f8cd824ee1,2016-08-26T19:25:37.277000 -CVE-2013-6900,0,1,dfcdba6f9b7763942b0368c93f359ba93a7d23d89c9f98fa5bfb03a3272d138f,2024-11-21T01:59:55.837000 -CVE-2013-6901,0,1,f17b0e0813247a93bba8950681e30284bc2e18a0021e66b130f1ec6e5e0c8adb,2024-11-21T01:59:55.960000 -CVE-2013-6902,0,1,72ee08c1423f0d7672a3c517a05680e3e4cb444131db48878819cdad5e4ef757,2024-11-21T01:59:56.090000 -CVE-2013-6903,0,1,9a3fb0375662791dd2a6eef1bdfce9ac818ee21a492c0ae1d21d3c794fec603c,2024-11-21T01:59:56.213000 -CVE-2013-6904,0,1,9aa38f4d121ab464b565ef0856f5bfb8a695f6be8f1a1f3073da6726422adee2,2024-11-21T01:59:56.350000 -CVE-2013-6905,0,1,10c9cd27e88deba01b07aba9a3b67f7e815e4532db46f8b15697de25469308de,2024-11-21T01:59:56.480000 -CVE-2013-6906,0,1,5ea78e258e592f2c99aeebfc14727832795c690ce6cd92318f8981dd68e70740,2024-11-21T01:59:56.613000 -CVE-2013-6907,0,1,907e7efd3a3b93d26ab6b3263ecc2afa2067877b7940fce4d3566d194b6c655e,2024-11-21T01:59:56.737000 -CVE-2013-6908,0,1,8dbb9272583b363ae20751c61c6dd756ddc728c07563437b7dc1370454252815,2024-11-21T01:59:56.860000 -CVE-2013-6909,0,1,f1dff1bcc8d0f4bc43a201d819b371050ab47cb8dedf29bd12137a13db00e329,2024-11-21T01:59:56.983000 -CVE-2013-6910,0,1,3b479a4375dec8b223ec45c9056f925bd972dbbd20528611c5d7cf3991e6e442,2024-11-21T01:59:57.110000 -CVE-2013-6911,0,1,69125fa4937978daac313b1db69ad359c53b633c39eda48dd3acbe6a31bf5b26,2024-11-21T01:59:57.223000 -CVE-2013-6912,0,1,d3b52c296153809fdec934e79eb9e25c813115c7aede2aa19577f5e70725c2ce,2024-11-21T01:59:57.357000 -CVE-2013-6913,0,1,27954b9c812c190f73c3bce42f8c84787c219470bc2b51765fadefdeef8b57fe,2024-11-21T01:59:57.483000 -CVE-2013-6914,0,1,8b0300b1e32cbfa7a45d084366efb49a7e3b8f5977bd1a83c5b2d6d75ecceb50,2024-11-21T01:59:57.610000 -CVE-2013-6915,0,1,c81c65984f32c18b9d9b364756fbac3c0cdbd4bbcc9072787a4d9bb8662bedfb,2024-11-21T01:59:57.717000 -CVE-2013-6916,0,1,24392cbd49425735f027033208452fd80f3cf41dbd8d744eab0e285e3919cb6b,2024-11-21T01:59:57.840000 -CVE-2013-6918,0,1,1127676a21f1f84b2ccd12f7a2e52388527eb9400c6ffd5211b26c9807001e6d,2024-11-21T01:59:57.977000 +CVE-2013-6900,0,0,dfcdba6f9b7763942b0368c93f359ba93a7d23d89c9f98fa5bfb03a3272d138f,2024-11-21T01:59:55.837000 +CVE-2013-6901,0,0,f17b0e0813247a93bba8950681e30284bc2e18a0021e66b130f1ec6e5e0c8adb,2024-11-21T01:59:55.960000 +CVE-2013-6902,0,0,72ee08c1423f0d7672a3c517a05680e3e4cb444131db48878819cdad5e4ef757,2024-11-21T01:59:56.090000 +CVE-2013-6903,0,0,9a3fb0375662791dd2a6eef1bdfce9ac818ee21a492c0ae1d21d3c794fec603c,2024-11-21T01:59:56.213000 +CVE-2013-6904,0,0,9aa38f4d121ab464b565ef0856f5bfb8a695f6be8f1a1f3073da6726422adee2,2024-11-21T01:59:56.350000 +CVE-2013-6905,0,0,10c9cd27e88deba01b07aba9a3b67f7e815e4532db46f8b15697de25469308de,2024-11-21T01:59:56.480000 +CVE-2013-6906,0,0,5ea78e258e592f2c99aeebfc14727832795c690ce6cd92318f8981dd68e70740,2024-11-21T01:59:56.613000 +CVE-2013-6907,0,0,907e7efd3a3b93d26ab6b3263ecc2afa2067877b7940fce4d3566d194b6c655e,2024-11-21T01:59:56.737000 +CVE-2013-6908,0,0,8dbb9272583b363ae20751c61c6dd756ddc728c07563437b7dc1370454252815,2024-11-21T01:59:56.860000 +CVE-2013-6909,0,0,f1dff1bcc8d0f4bc43a201d819b371050ab47cb8dedf29bd12137a13db00e329,2024-11-21T01:59:56.983000 +CVE-2013-6910,0,0,3b479a4375dec8b223ec45c9056f925bd972dbbd20528611c5d7cf3991e6e442,2024-11-21T01:59:57.110000 +CVE-2013-6911,0,0,69125fa4937978daac313b1db69ad359c53b633c39eda48dd3acbe6a31bf5b26,2024-11-21T01:59:57.223000 +CVE-2013-6912,0,0,d3b52c296153809fdec934e79eb9e25c813115c7aede2aa19577f5e70725c2ce,2024-11-21T01:59:57.357000 +CVE-2013-6913,0,0,27954b9c812c190f73c3bce42f8c84787c219470bc2b51765fadefdeef8b57fe,2024-11-21T01:59:57.483000 +CVE-2013-6914,0,0,8b0300b1e32cbfa7a45d084366efb49a7e3b8f5977bd1a83c5b2d6d75ecceb50,2024-11-21T01:59:57.610000 +CVE-2013-6915,0,0,c81c65984f32c18b9d9b364756fbac3c0cdbd4bbcc9072787a4d9bb8662bedfb,2024-11-21T01:59:57.717000 +CVE-2013-6916,0,0,24392cbd49425735f027033208452fd80f3cf41dbd8d744eab0e285e3919cb6b,2024-11-21T01:59:57.840000 +CVE-2013-6918,0,0,1127676a21f1f84b2ccd12f7a2e52388527eb9400c6ffd5211b26c9807001e6d,2024-11-21T01:59:57.977000 CVE-2013-6919,0,0,2e2ae1dc4a77545bf37e86d2440b463eee856330d352a6088369373e8dba97d2,2014-12-29T23:08:54.037000 -CVE-2013-6920,0,1,dc47003b994116d783c80dfaa0f9894e9b90e5d17ec7b2d978cde9e855a2eb40,2024-11-21T01:59:58.257000 -CVE-2013-6922,0,1,dbdac88045026a7722b8825113da144bad7e706c9aeb06a32f427e7cdf81bcb2,2024-11-21T01:59:58.420000 -CVE-2013-6923,0,1,dca8fafb5207f6c66ae8ece459bf81ed3957e6a6780d8759ba59f831434c1ea3,2024-11-21T01:59:58.583000 +CVE-2013-6920,0,0,dc47003b994116d783c80dfaa0f9894e9b90e5d17ec7b2d978cde9e855a2eb40,2024-11-21T01:59:58.257000 +CVE-2013-6922,0,0,dbdac88045026a7722b8825113da144bad7e706c9aeb06a32f427e7cdf81bcb2,2024-11-21T01:59:58.420000 +CVE-2013-6923,0,0,dca8fafb5207f6c66ae8ece459bf81ed3957e6a6780d8759ba59f831434c1ea3,2024-11-21T01:59:58.583000 CVE-2013-6924,0,0,ecdf67ad388c2974aa083b9440b10715191a2b02a7670683baa0d13a39b6d894,2017-11-03T17:44:18.937000 -CVE-2013-6925,0,1,cacead86eb417afb86d572f56c281d554744206aa4dcbbe88e62fc91a3580dc8,2024-11-21T01:59:58.883000 -CVE-2013-6926,0,1,1ef526a35f0f30612790f99ffd5b20a03134a390efd31bef4b80b5e5fc90cf84,2024-11-21T01:59:59.023000 +CVE-2013-6925,0,0,cacead86eb417afb86d572f56c281d554744206aa4dcbbe88e62fc91a3580dc8,2024-11-21T01:59:58.883000 +CVE-2013-6926,0,0,1ef526a35f0f30612790f99ffd5b20a03134a390efd31bef4b80b5e5fc90cf84,2024-11-21T01:59:59.023000 CVE-2013-6927,0,0,347ad34971b09884b0d719e5d73a0f645d918681fe9fbfdf3ea109f6d6632f1b,2020-02-20T21:22:23.583000 -CVE-2013-6929,0,1,cb8e1264d966d1a0a92f6b4f30a16f6c1a92445b64cdcee0eac2428d96309934,2024-11-21T01:59:59.310000 -CVE-2013-6930,0,1,028dcdd21a7d617a0c19d45d55b73ded0419d53f4690b667493951d6e11e469b,2024-11-21T01:59:59.413000 -CVE-2013-6931,0,1,1000645930e9a4586779e93096d95678393021bb1499de9f83b1fe902f2c12f2,2024-11-21T01:59:59.540000 -CVE-2013-6932,0,1,8c35638195c844c8bead0af46f298a79d9cc0637e7093b7fed275bbe1b4009ff,2024-11-21T01:59:59.660000 -CVE-2013-6933,0,1,3897542da1e7afb4ad61cd6f48d1abe345ae96dee4f17c554e20b39c7d2f21c9,2024-11-21T01:59:59.777000 -CVE-2013-6934,0,1,e1d7dbaf179ca01db8e1be488c2ab1f324e94a9f5822876276e05f6bc2d1fd4d,2024-11-21T01:59:59.950000 -CVE-2013-6935,0,1,452c494f38978893856871416affbf64ce3879070e536cc3d8daf92c0b995d37,2024-11-21T02:00:00.120000 -CVE-2013-6936,0,1,7831f86a0dbb36c7b0f9e23b98e322b4fcd6d6ddad80fdaabf3a31ceb16f74e2,2024-11-21T02:00:00.340000 -CVE-2013-6937,0,1,6d3e2f5f0350f1fc0f328b072d7a4123c218c832dccce5bdbfb69830de7063a1,2024-11-21T02:00:00.507000 -CVE-2013-6938,0,1,eb781acaafc96bac429c5b6917217dddec68f82d54c490fe487bfacfb5e39acd,2024-11-21T02:00:00.687000 -CVE-2013-6939,0,1,4f18cb4c8438bc45dc0eeb8b35bed1b0f064f86ff37c4c853f6ca9d1a64f76c7,2024-11-21T02:00:00.853000 -CVE-2013-6940,0,1,76ac9246721b89aa1892544c73b4cddc83f5015c9978eaccd6a2c0721203797c,2024-11-21T02:00:01.017000 -CVE-2013-6941,0,1,08629ca74cbde5999a4ec29aa00750b4fbf4c75ecddd88f0e8d05aa434808121,2024-11-21T02:00:01.230000 -CVE-2013-6942,0,1,6c7f6e825dcb755f7261827404974c400526f1a18c484576f025d7690bd5de38,2024-11-21T02:00:01.383000 -CVE-2013-6943,0,1,1e338a0b3297ccf126fe77fad32391558151e3754021dedcde3e364b2e3a8426,2024-11-21T02:00:01.550000 -CVE-2013-6944,0,1,fd54b6c5b7d2f0442f7bf5a1776dc5dd9f0f4f27a314796c6c06ba0dad36d9a8,2024-11-21T02:00:01.753000 -CVE-2013-6945,0,1,d0e3df8a44741a8890c7aa0a01536473096aba4a398533bf25b101b1748b7f1a,2024-11-21T02:00:01.910000 -CVE-2013-6948,0,1,d2431491d6db307c8dd35b4863c6797b9485d78dd5bb2bba05be117fa578966b,2024-11-21T02:00:02.060000 -CVE-2013-6949,0,1,296a1dca13f6a7c5296ab121a8d6f3986a9bc9490e84dbe973aa8eac053fbbc6,2024-11-21T02:00:02.177000 -CVE-2013-6950,0,1,21ff9dfb24dc6939478a23890fec5773324d17a040ce69bb984b9ea5dc708565,2024-11-21T02:00:02.303000 -CVE-2013-6951,0,1,0cfcfcd045edbaee3142a3da55c9b02a187e12c4ad186382a30b83300885ab57,2024-11-21T02:00:02.420000 -CVE-2013-6952,0,1,60c5f0541ecf95d5688945635779ca5abeb36f7923a1155b3c465ca924a2d3d7,2024-11-21T02:00:02.543000 -CVE-2013-6953,0,1,c0553021df2172728596d0a4e0e28d26047143b9856c9daf6fc446019d960253,2024-11-21T02:00:02.657000 -CVE-2013-6954,0,1,903c30d0693075dd3fd7f9a6684ed48a60e471f253040d058357caec4a9e3c6a,2024-11-21T02:00:02.783000 -CVE-2013-6955,0,1,eaf41a68e36d9dcf76c6348defcbaccd931db940049d5b3841c78988eda42ee3,2024-11-21T02:00:02.963000 -CVE-2013-6956,0,1,e9a4384b44feeb24f663999f78925590076432584bb0f604c35850e77941c187,2024-11-21T02:00:03.083000 -CVE-2013-6957,0,1,f64a11075f307ce9303181e3ca8d6145a6aa247006ed25a850b360c1dd50c19b,2024-11-21T02:00:03.237000 -CVE-2013-6958,0,1,43ca5e81ab7d1c45f01a3adf395efe806ab3c0c5c81fabee1a85de6200bbc016,2024-11-21T02:00:03.410000 -CVE-2013-6959,0,1,4dffaeeb3c8a433c85e543a16260c670e85f5a6c47b87c347c26865a977c71c7,2024-11-21T02:00:03.570000 -CVE-2013-6960,0,1,5e21f14f95776d826d931bdfccac06df11529cc992025cc6bc50fd063bad238c,2024-11-21T02:00:03.727000 -CVE-2013-6961,0,1,cac919f2ecfa76b461b9778779b356cf6d63a5811598833255fa1cb624c1a3ae,2024-11-21T02:00:03.863000 -CVE-2013-6962,0,1,a80a6d787a3c6df3efb6b8b03db0ead125e75a2e3e43cde271b0d33264722ede,2024-11-21T02:00:03.983000 -CVE-2013-6963,0,1,4cceab0b05c719a273cae2d375d5549f4cc2292296164de20a0154ad45e4c11d,2024-11-21T02:00:04.100000 -CVE-2013-6964,0,1,acf2e85411112f77cad315f2184241480678245adefeffb140ce51c69f1b9d2e,2024-11-21T02:00:04.230000 -CVE-2013-6965,0,1,faf0f98282bb73ecc55ce11d53dad1f1640f2d9d17aea629365a55436e5192b9,2024-11-21T02:00:04.350000 -CVE-2013-6966,0,1,0b091e794438272f785427fce2ddf7c2b65dd5a454e7eca60c5cc480c75038ac,2024-11-21T02:00:04.470000 -CVE-2013-6967,0,1,97563df47003849db9e2a02e95330be50217e0c9564b69ab1b64c9d19b594120,2024-11-21T02:00:04.593000 -CVE-2013-6968,0,1,ad8c56b50a2f56e5949519d7bcdedea91c2e70afff9c08284c1b142a40d7ea0d,2024-11-21T02:00:04.727000 -CVE-2013-6969,0,1,c4d0f5068ca34cae330e86aa85942ea20b89741dfb48c9e3d0cb67516ab561fe,2024-11-21T02:00:04.840000 -CVE-2013-6970,0,1,4e66db879aa1a928baf27d41822f6a4b4bb8d4baea8f9a3c2a077ec994d51d86,2024-11-21T02:00:04.957000 -CVE-2013-6971,0,1,84f05b6f611a04ac26b696a0b7994cd07cdce940c8eb45078db37456d80b3f5a,2024-11-21T02:00:05.070000 -CVE-2013-6972,0,1,bd70aa10ad64344e083f11c5194a17cb584541bd64fbab06bc90e6b795f8e3af,2024-11-21T02:00:05.187000 -CVE-2013-6973,0,1,be0694418eccc0a23bf29a6432e0c643921c07b79d8cbb5634c7436c889ed8a6,2024-11-21T02:00:05.313000 -CVE-2013-6974,0,1,472a4e620d824760284f5c7ed617da519f59fd76aa00a5847fc32b9d8cdadce1,2024-11-21T02:00:05.430000 -CVE-2013-6975,0,1,4ac2d5d6466b8629d6c2116c92868a3e23cf9e5b6e8c73bb5c118cf5912f745b,2024-11-21T02:00:05.550000 -CVE-2013-6976,0,1,a67dd0ba71abeaddc1435d63415ef38c53e4df29600f204ae3915871621b3a09,2024-11-21T02:00:05.677000 -CVE-2013-6978,0,1,3db0a9f417ddb2df8cccdc069d47c85597d138614485f62ff5cf3d0fd0523d9a,2024-11-21T02:00:05.790000 -CVE-2013-6979,0,1,c35e4f760add23351112a41b7018be0dcfbe71e1fb2a7e2730d46fd23d1f2e77,2024-11-21T02:00:05.923000 -CVE-2013-6981,0,1,93cbf14d17a389f4da3339b1cfdd7765ce0cc4d290b24d53cc0680044fb262f6,2024-11-21T02:00:06.040000 -CVE-2013-6982,0,1,3b1ddf4b9454b60c86693e784d829055ec69b8df5d63fef4584f983d5351d4b1,2024-11-21T02:00:06.167000 -CVE-2013-6983,0,1,b30697f6ee4f08afd1e9089d24979626ca79e47415ded71d0c0c243d292b4100,2024-11-21T02:00:06.293000 -CVE-2013-6985,0,1,88e72cee1bb4b4c5a8c324eab5d8bf3a23ea008e28a96264d7c620ea24b9dd65,2024-11-21T02:00:06.427000 -CVE-2013-6986,0,1,2f75e94b14a5e240d788fd36db7a9d2ba192d192d1d35c4303e5e1ab337ed5ce,2024-11-21T02:00:06.573000 -CVE-2013-6987,0,1,c1013a48113e924dbe18ecaf979637ec1c7e16693a85eece118290c2f3033734,2024-11-21T02:00:06.723000 -CVE-2013-6990,0,1,8b2c962e63f0c30a438d310b6f8341f301885df7d634aaa674e421b64932c4ab,2024-11-21T02:00:06.880000 -CVE-2013-6991,0,1,d6430675ca0d500052acb0f90c97c280b7f8905849f4e96e3aea70d735bf315e,2024-11-21T02:00:07.030000 -CVE-2013-6992,0,1,53c2a4a724fe852fe093ef8d7655c06e4f83a8f8e0c1d477987c47bfe726597c,2024-11-21T02:00:07.187000 -CVE-2013-6993,0,1,0c4caba76c316c5eb571b72d36f2dd2e4eefa8e4dbd711e3aa57f650dadd561f,2024-11-21T02:00:07.340000 -CVE-2013-6994,0,1,15ec2d6cf78e9ac9e7249b3cfd9ce0ed3b60b640ea332044c510697591c15fd3,2024-11-21T02:00:07.497000 +CVE-2013-6929,0,0,cb8e1264d966d1a0a92f6b4f30a16f6c1a92445b64cdcee0eac2428d96309934,2024-11-21T01:59:59.310000 +CVE-2013-6930,0,0,028dcdd21a7d617a0c19d45d55b73ded0419d53f4690b667493951d6e11e469b,2024-11-21T01:59:59.413000 +CVE-2013-6931,0,0,1000645930e9a4586779e93096d95678393021bb1499de9f83b1fe902f2c12f2,2024-11-21T01:59:59.540000 +CVE-2013-6932,0,0,8c35638195c844c8bead0af46f298a79d9cc0637e7093b7fed275bbe1b4009ff,2024-11-21T01:59:59.660000 +CVE-2013-6933,0,0,3897542da1e7afb4ad61cd6f48d1abe345ae96dee4f17c554e20b39c7d2f21c9,2024-11-21T01:59:59.777000 +CVE-2013-6934,0,0,e1d7dbaf179ca01db8e1be488c2ab1f324e94a9f5822876276e05f6bc2d1fd4d,2024-11-21T01:59:59.950000 +CVE-2013-6935,0,0,452c494f38978893856871416affbf64ce3879070e536cc3d8daf92c0b995d37,2024-11-21T02:00:00.120000 +CVE-2013-6936,0,0,7831f86a0dbb36c7b0f9e23b98e322b4fcd6d6ddad80fdaabf3a31ceb16f74e2,2024-11-21T02:00:00.340000 +CVE-2013-6937,0,0,6d3e2f5f0350f1fc0f328b072d7a4123c218c832dccce5bdbfb69830de7063a1,2024-11-21T02:00:00.507000 +CVE-2013-6938,0,0,eb781acaafc96bac429c5b6917217dddec68f82d54c490fe487bfacfb5e39acd,2024-11-21T02:00:00.687000 +CVE-2013-6939,0,0,4f18cb4c8438bc45dc0eeb8b35bed1b0f064f86ff37c4c853f6ca9d1a64f76c7,2024-11-21T02:00:00.853000 +CVE-2013-6940,0,0,76ac9246721b89aa1892544c73b4cddc83f5015c9978eaccd6a2c0721203797c,2024-11-21T02:00:01.017000 +CVE-2013-6941,0,0,08629ca74cbde5999a4ec29aa00750b4fbf4c75ecddd88f0e8d05aa434808121,2024-11-21T02:00:01.230000 +CVE-2013-6942,0,0,6c7f6e825dcb755f7261827404974c400526f1a18c484576f025d7690bd5de38,2024-11-21T02:00:01.383000 +CVE-2013-6943,0,0,1e338a0b3297ccf126fe77fad32391558151e3754021dedcde3e364b2e3a8426,2024-11-21T02:00:01.550000 +CVE-2013-6944,0,0,fd54b6c5b7d2f0442f7bf5a1776dc5dd9f0f4f27a314796c6c06ba0dad36d9a8,2024-11-21T02:00:01.753000 +CVE-2013-6945,0,0,d0e3df8a44741a8890c7aa0a01536473096aba4a398533bf25b101b1748b7f1a,2024-11-21T02:00:01.910000 +CVE-2013-6948,0,0,d2431491d6db307c8dd35b4863c6797b9485d78dd5bb2bba05be117fa578966b,2024-11-21T02:00:02.060000 +CVE-2013-6949,0,0,296a1dca13f6a7c5296ab121a8d6f3986a9bc9490e84dbe973aa8eac053fbbc6,2024-11-21T02:00:02.177000 +CVE-2013-6950,0,0,21ff9dfb24dc6939478a23890fec5773324d17a040ce69bb984b9ea5dc708565,2024-11-21T02:00:02.303000 +CVE-2013-6951,0,0,0cfcfcd045edbaee3142a3da55c9b02a187e12c4ad186382a30b83300885ab57,2024-11-21T02:00:02.420000 +CVE-2013-6952,0,0,60c5f0541ecf95d5688945635779ca5abeb36f7923a1155b3c465ca924a2d3d7,2024-11-21T02:00:02.543000 +CVE-2013-6953,0,0,c0553021df2172728596d0a4e0e28d26047143b9856c9daf6fc446019d960253,2024-11-21T02:00:02.657000 +CVE-2013-6954,0,0,903c30d0693075dd3fd7f9a6684ed48a60e471f253040d058357caec4a9e3c6a,2024-11-21T02:00:02.783000 +CVE-2013-6955,0,0,eaf41a68e36d9dcf76c6348defcbaccd931db940049d5b3841c78988eda42ee3,2024-11-21T02:00:02.963000 +CVE-2013-6956,0,0,e9a4384b44feeb24f663999f78925590076432584bb0f604c35850e77941c187,2024-11-21T02:00:03.083000 +CVE-2013-6957,0,0,f64a11075f307ce9303181e3ca8d6145a6aa247006ed25a850b360c1dd50c19b,2024-11-21T02:00:03.237000 +CVE-2013-6958,0,0,43ca5e81ab7d1c45f01a3adf395efe806ab3c0c5c81fabee1a85de6200bbc016,2024-11-21T02:00:03.410000 +CVE-2013-6959,0,0,4dffaeeb3c8a433c85e543a16260c670e85f5a6c47b87c347c26865a977c71c7,2024-11-21T02:00:03.570000 +CVE-2013-6960,0,0,5e21f14f95776d826d931bdfccac06df11529cc992025cc6bc50fd063bad238c,2024-11-21T02:00:03.727000 +CVE-2013-6961,0,0,cac919f2ecfa76b461b9778779b356cf6d63a5811598833255fa1cb624c1a3ae,2024-11-21T02:00:03.863000 +CVE-2013-6962,0,0,a80a6d787a3c6df3efb6b8b03db0ead125e75a2e3e43cde271b0d33264722ede,2024-11-21T02:00:03.983000 +CVE-2013-6963,0,0,4cceab0b05c719a273cae2d375d5549f4cc2292296164de20a0154ad45e4c11d,2024-11-21T02:00:04.100000 +CVE-2013-6964,0,0,acf2e85411112f77cad315f2184241480678245adefeffb140ce51c69f1b9d2e,2024-11-21T02:00:04.230000 +CVE-2013-6965,0,0,faf0f98282bb73ecc55ce11d53dad1f1640f2d9d17aea629365a55436e5192b9,2024-11-21T02:00:04.350000 +CVE-2013-6966,0,0,0b091e794438272f785427fce2ddf7c2b65dd5a454e7eca60c5cc480c75038ac,2024-11-21T02:00:04.470000 +CVE-2013-6967,0,0,97563df47003849db9e2a02e95330be50217e0c9564b69ab1b64c9d19b594120,2024-11-21T02:00:04.593000 +CVE-2013-6968,0,0,ad8c56b50a2f56e5949519d7bcdedea91c2e70afff9c08284c1b142a40d7ea0d,2024-11-21T02:00:04.727000 +CVE-2013-6969,0,0,c4d0f5068ca34cae330e86aa85942ea20b89741dfb48c9e3d0cb67516ab561fe,2024-11-21T02:00:04.840000 +CVE-2013-6970,0,0,4e66db879aa1a928baf27d41822f6a4b4bb8d4baea8f9a3c2a077ec994d51d86,2024-11-21T02:00:04.957000 +CVE-2013-6971,0,0,84f05b6f611a04ac26b696a0b7994cd07cdce940c8eb45078db37456d80b3f5a,2024-11-21T02:00:05.070000 +CVE-2013-6972,0,0,bd70aa10ad64344e083f11c5194a17cb584541bd64fbab06bc90e6b795f8e3af,2024-11-21T02:00:05.187000 +CVE-2013-6973,0,0,be0694418eccc0a23bf29a6432e0c643921c07b79d8cbb5634c7436c889ed8a6,2024-11-21T02:00:05.313000 +CVE-2013-6974,0,0,472a4e620d824760284f5c7ed617da519f59fd76aa00a5847fc32b9d8cdadce1,2024-11-21T02:00:05.430000 +CVE-2013-6975,0,0,4ac2d5d6466b8629d6c2116c92868a3e23cf9e5b6e8c73bb5c118cf5912f745b,2024-11-21T02:00:05.550000 +CVE-2013-6976,0,0,a67dd0ba71abeaddc1435d63415ef38c53e4df29600f204ae3915871621b3a09,2024-11-21T02:00:05.677000 +CVE-2013-6978,0,0,3db0a9f417ddb2df8cccdc069d47c85597d138614485f62ff5cf3d0fd0523d9a,2024-11-21T02:00:05.790000 +CVE-2013-6979,0,0,c35e4f760add23351112a41b7018be0dcfbe71e1fb2a7e2730d46fd23d1f2e77,2024-11-21T02:00:05.923000 +CVE-2013-6981,0,0,93cbf14d17a389f4da3339b1cfdd7765ce0cc4d290b24d53cc0680044fb262f6,2024-11-21T02:00:06.040000 +CVE-2013-6982,0,0,3b1ddf4b9454b60c86693e784d829055ec69b8df5d63fef4584f983d5351d4b1,2024-11-21T02:00:06.167000 +CVE-2013-6983,0,0,b30697f6ee4f08afd1e9089d24979626ca79e47415ded71d0c0c243d292b4100,2024-11-21T02:00:06.293000 +CVE-2013-6985,0,0,88e72cee1bb4b4c5a8c324eab5d8bf3a23ea008e28a96264d7c620ea24b9dd65,2024-11-21T02:00:06.427000 +CVE-2013-6986,0,0,2f75e94b14a5e240d788fd36db7a9d2ba192d192d1d35c4303e5e1ab337ed5ce,2024-11-21T02:00:06.573000 +CVE-2013-6987,0,0,c1013a48113e924dbe18ecaf979637ec1c7e16693a85eece118290c2f3033734,2024-11-21T02:00:06.723000 +CVE-2013-6990,0,0,8b2c962e63f0c30a438d310b6f8341f301885df7d634aaa674e421b64932c4ab,2024-11-21T02:00:06.880000 +CVE-2013-6991,0,0,d6430675ca0d500052acb0f90c97c280b7f8905849f4e96e3aea70d735bf315e,2024-11-21T02:00:07.030000 +CVE-2013-6992,0,0,53c2a4a724fe852fe093ef8d7655c06e4f83a8f8e0c1d477987c47bfe726597c,2024-11-21T02:00:07.187000 +CVE-2013-6993,0,0,0c4caba76c316c5eb571b72d36f2dd2e4eefa8e4dbd711e3aa57f650dadd561f,2024-11-21T02:00:07.340000 +CVE-2013-6994,0,0,15ec2d6cf78e9ac9e7249b3cfd9ce0ed3b60b640ea332044c510697591c15fd3,2024-11-21T02:00:07.497000 CVE-2013-6995,0,0,2da150900f4e8fff8e4292d5ccd5f5371a90404b552aeaa717614311c69b4f93,2023-11-07T02:17:51.367000 -CVE-2013-6997,0,1,58b197750dcde8fedc5843304183109935df7c6e4879dabb45388235362b015f,2024-11-21T02:00:07.653000 +CVE-2013-6997,0,0,58b197750dcde8fedc5843304183109935df7c6e4879dabb45388235362b015f,2024-11-21T02:00:07.653000 CVE-2013-6998,0,0,48e0bbc6780280cd314666571a6eb9ed49500178958a19a6e7c407fa90fb5a04,2023-11-07T02:17:51.410000 -CVE-2013-6999,0,1,43ea112ff3230fcbe656387bd66f64b83746f666c3901599f5d7da701a44e329,2024-11-21T02:00:07.840000 -CVE-2013-7000,0,1,dce47f7a034771f43649aa312533eb7c787e7926d6dfae75b7555526b994bc49,2024-11-21T02:00:07.990000 -CVE-2013-7001,0,1,427f0e9786878e9772c882a9cd29767aac3382f047bd50689a378bd9493e14d9,2024-11-21T02:00:08.133000 -CVE-2013-7002,0,1,1483ad54bb2b485b44d66a17d8f3e2028a4b7429f9a5a0278b144fdb1d15c405,2024-11-21T02:00:08.283000 -CVE-2013-7003,0,1,f46cc8825a839dcd1af8279e3b435ac4e66bca5e65fe771b61681722ba345b28,2024-11-21T02:00:08.440000 -CVE-2013-7004,0,1,2e6e834db9bdfaaae25640d7c134a32e00d9b03de4ffe61eaf56e08801d6d557,2024-11-21T02:00:08.607000 -CVE-2013-7005,0,1,3bd11289cb34722c9e3b40641717211581c824e68cdafc71c96f6b78f2664cb6,2024-11-21T02:00:08.787000 -CVE-2013-7008,0,1,282a409befb4971956490b7ec060e4ae6424cd2f9338c4c256161ba17744d120,2024-11-21T02:00:08.990000 -CVE-2013-7009,0,1,e74cd92870685b4855c0287241ca2d018798e0aae965b416dd14e56fa0034fe7,2024-11-21T02:00:09.173000 -CVE-2013-7010,0,1,ecb9fb3621e3087564dfcb99cd7096ca1989cb15025bc8c09ee465b76ac7f5a2,2024-11-21T02:00:09.363000 -CVE-2013-7011,0,1,e38ff5cdbbe02f29ed31c56973cde509ac15347c6b2d2513229503d3fea9b6f3,2024-11-21T02:00:09.533000 -CVE-2013-7012,0,1,962c1b42013d0246f2503c6b31ca58faabefcdcad77971799b91e0a4496ee6d3,2024-11-21T02:00:09.710000 -CVE-2013-7013,0,1,b8130bc80f690fc97fc1473bdd87baae988a0d9cecc5b58768a553d106d0c0d1,2024-11-21T02:00:09.867000 -CVE-2013-7014,0,1,63f3092503ba9af67bfe0a2c770b6747a16079cf4969738525443ad9b751e96f,2024-11-21T02:00:10.020000 -CVE-2013-7015,0,1,9134284a0051044aebae1f2d2eb4e5cd9e6b5ae31a821fa157c06ee938c56a6e,2024-11-21T02:00:10.190000 -CVE-2013-7016,0,1,8c7547bcb7514d6d562be28bc4545589c8031be83d6a38febf5b5c846fc45a7a,2024-11-21T02:00:10.343000 -CVE-2013-7017,0,1,ae305d51c772e9479f13516eb0507bdd7a1a2fe62ff0653a9b1e5a11a337d131,2024-11-21T02:00:10.503000 -CVE-2013-7018,0,1,d2595beb32104c7a4c2c64f7c618e5469f97a050f712965829451352c74675f0,2024-11-21T02:00:10.653000 -CVE-2013-7019,0,1,f1abef131d6a2ca0c16178ef1f1e1d96a749af316bb8dbb380259be45408fe2b,2024-11-21T02:00:10.813000 -CVE-2013-7020,0,1,5fe6e61d4f629e035ce5395983ddbd27ea678b30e3865c46b708b499216c1826,2024-11-21T02:00:10.970000 -CVE-2013-7021,0,1,8e5242bb554d9b9f6f0674f2e3a782e799818a60f207c8722a13d0bc96edc39d,2024-11-21T02:00:11.147000 -CVE-2013-7022,0,1,496248054b1b55935598aa248f2e5879447874ea8fe70af918895f122ecb9ccf,2024-11-21T02:00:11.320000 -CVE-2013-7023,0,1,4eddd55ae65058ce6e60624b0096ced86864f168bb56532d418dbe1075ada71f,2024-11-21T02:00:11.480000 -CVE-2013-7024,0,1,35f790ce85aa9432f12b8f1189afb63fa037b63758e25da88f5c81c6e965fad8,2024-11-21T02:00:11.640000 -CVE-2013-7025,0,1,36ba0219da77966e23712def98e7cdbd9efcc389df25c7da05a7dc678fdcf5a3,2024-11-21T02:00:11.820000 -CVE-2013-7026,0,1,0a2d8ac91c64afb2c209e0e3f1d82727e791f3ce8ae4ecef59e5d6bc5cadf84d,2024-11-21T02:00:11.983000 -CVE-2013-7027,0,1,faf9e8e47724f722a1c45c2586ffc2bc7806e95323133414cc3cbcb2507e176e,2024-11-21T02:00:12.157000 -CVE-2013-7030,0,1,f16fe2d0391a4c7c4c0625049a8f4a0da000d8d1a191ceec4308cbfaa25d0002,2024-11-21T02:00:12.347000 -CVE-2013-7032,0,1,b45d45df2eecd71f11acee77ff1ca85534af8caaa2c4343e1f3c761018b202e8,2024-11-21T02:00:12.577000 -CVE-2013-7033,0,1,9f024764043e026c17cb729117541fc005130e8eba2e22bdb0505c200d858de8,2024-11-21T02:00:12.723000 -CVE-2013-7034,0,1,3b1c945495370555b9887ccdfe55f87826d47b220e4dd866de38216a2838a4f0,2024-11-21T02:00:12.873000 -CVE-2013-7038,0,1,b9a919bbbb19d02daa8bdd4da8f31e292060a58cb4a57f231ce151bba163e2bf,2024-11-21T02:00:13.020000 -CVE-2013-7039,0,1,e33930efc686f76aae7887715788d58e74800bffdfb1d3c2fcb9aa1d8f370c6b,2024-11-21T02:00:13.173000 -CVE-2013-7040,0,1,17c35b87eee6ac0d95831add7d5cf7fa03cc17644f944a49ae7fa5534c6a43c0,2024-11-21T02:00:13.320000 -CVE-2013-7041,0,1,4d5f5643e64ffc451c8eb9b2fd1e44fd799d1690a7053dd1b6c39e8c71544f20,2024-11-21T02:00:13.493000 -CVE-2013-7042,0,1,46ec2aa6a9aad4c2b421080d6414e794242da683803ea753978029c8c036405f,2024-11-21T02:00:13.653000 -CVE-2013-7043,0,1,ff7d44613e46b0a697abff5223e5e3ace75941cab6bcf57ca2bf0af2a39e9eff,2024-11-21T02:00:13.803000 -CVE-2013-7048,0,1,5b79de89a9ed53f9c53ba63373312c2f4c1cdc6bd58a1717a19795e15ff066a2,2024-11-21T02:00:13.990000 -CVE-2013-7049,0,1,d1f1b1ce904974bc7846d8452ebe136b4c89456339463b2ceeeff6e2fd569cd7,2024-11-21T02:00:14.180000 -CVE-2013-7050,0,1,987729540d4991b139b1afc47cb75761f6dc79f78e7f1a3d8e4ccee3dcaf1417,2024-11-21T02:00:14.333000 +CVE-2013-6999,0,0,43ea112ff3230fcbe656387bd66f64b83746f666c3901599f5d7da701a44e329,2024-11-21T02:00:07.840000 +CVE-2013-7000,0,0,dce47f7a034771f43649aa312533eb7c787e7926d6dfae75b7555526b994bc49,2024-11-21T02:00:07.990000 +CVE-2013-7001,0,0,427f0e9786878e9772c882a9cd29767aac3382f047bd50689a378bd9493e14d9,2024-11-21T02:00:08.133000 +CVE-2013-7002,0,0,1483ad54bb2b485b44d66a17d8f3e2028a4b7429f9a5a0278b144fdb1d15c405,2024-11-21T02:00:08.283000 +CVE-2013-7003,0,0,f46cc8825a839dcd1af8279e3b435ac4e66bca5e65fe771b61681722ba345b28,2024-11-21T02:00:08.440000 +CVE-2013-7004,0,0,2e6e834db9bdfaaae25640d7c134a32e00d9b03de4ffe61eaf56e08801d6d557,2024-11-21T02:00:08.607000 +CVE-2013-7005,0,0,3bd11289cb34722c9e3b40641717211581c824e68cdafc71c96f6b78f2664cb6,2024-11-21T02:00:08.787000 +CVE-2013-7008,0,0,282a409befb4971956490b7ec060e4ae6424cd2f9338c4c256161ba17744d120,2024-11-21T02:00:08.990000 +CVE-2013-7009,0,0,e74cd92870685b4855c0287241ca2d018798e0aae965b416dd14e56fa0034fe7,2024-11-21T02:00:09.173000 +CVE-2013-7010,0,0,ecb9fb3621e3087564dfcb99cd7096ca1989cb15025bc8c09ee465b76ac7f5a2,2024-11-21T02:00:09.363000 +CVE-2013-7011,0,0,e38ff5cdbbe02f29ed31c56973cde509ac15347c6b2d2513229503d3fea9b6f3,2024-11-21T02:00:09.533000 +CVE-2013-7012,0,0,962c1b42013d0246f2503c6b31ca58faabefcdcad77971799b91e0a4496ee6d3,2024-11-21T02:00:09.710000 +CVE-2013-7013,0,0,b8130bc80f690fc97fc1473bdd87baae988a0d9cecc5b58768a553d106d0c0d1,2024-11-21T02:00:09.867000 +CVE-2013-7014,0,0,63f3092503ba9af67bfe0a2c770b6747a16079cf4969738525443ad9b751e96f,2024-11-21T02:00:10.020000 +CVE-2013-7015,0,0,9134284a0051044aebae1f2d2eb4e5cd9e6b5ae31a821fa157c06ee938c56a6e,2024-11-21T02:00:10.190000 +CVE-2013-7016,0,0,8c7547bcb7514d6d562be28bc4545589c8031be83d6a38febf5b5c846fc45a7a,2024-11-21T02:00:10.343000 +CVE-2013-7017,0,0,ae305d51c772e9479f13516eb0507bdd7a1a2fe62ff0653a9b1e5a11a337d131,2024-11-21T02:00:10.503000 +CVE-2013-7018,0,0,d2595beb32104c7a4c2c64f7c618e5469f97a050f712965829451352c74675f0,2024-11-21T02:00:10.653000 +CVE-2013-7019,0,0,f1abef131d6a2ca0c16178ef1f1e1d96a749af316bb8dbb380259be45408fe2b,2024-11-21T02:00:10.813000 +CVE-2013-7020,0,0,5fe6e61d4f629e035ce5395983ddbd27ea678b30e3865c46b708b499216c1826,2024-11-21T02:00:10.970000 +CVE-2013-7021,0,0,8e5242bb554d9b9f6f0674f2e3a782e799818a60f207c8722a13d0bc96edc39d,2024-11-21T02:00:11.147000 +CVE-2013-7022,0,0,496248054b1b55935598aa248f2e5879447874ea8fe70af918895f122ecb9ccf,2024-11-21T02:00:11.320000 +CVE-2013-7023,0,0,4eddd55ae65058ce6e60624b0096ced86864f168bb56532d418dbe1075ada71f,2024-11-21T02:00:11.480000 +CVE-2013-7024,0,0,35f790ce85aa9432f12b8f1189afb63fa037b63758e25da88f5c81c6e965fad8,2024-11-21T02:00:11.640000 +CVE-2013-7025,0,0,36ba0219da77966e23712def98e7cdbd9efcc389df25c7da05a7dc678fdcf5a3,2024-11-21T02:00:11.820000 +CVE-2013-7026,0,0,0a2d8ac91c64afb2c209e0e3f1d82727e791f3ce8ae4ecef59e5d6bc5cadf84d,2024-11-21T02:00:11.983000 +CVE-2013-7027,0,0,faf9e8e47724f722a1c45c2586ffc2bc7806e95323133414cc3cbcb2507e176e,2024-11-21T02:00:12.157000 +CVE-2013-7030,0,0,f16fe2d0391a4c7c4c0625049a8f4a0da000d8d1a191ceec4308cbfaa25d0002,2024-11-21T02:00:12.347000 +CVE-2013-7032,0,0,b45d45df2eecd71f11acee77ff1ca85534af8caaa2c4343e1f3c761018b202e8,2024-11-21T02:00:12.577000 +CVE-2013-7033,0,0,9f024764043e026c17cb729117541fc005130e8eba2e22bdb0505c200d858de8,2024-11-21T02:00:12.723000 +CVE-2013-7034,0,0,3b1c945495370555b9887ccdfe55f87826d47b220e4dd866de38216a2838a4f0,2024-11-21T02:00:12.873000 +CVE-2013-7038,0,0,b9a919bbbb19d02daa8bdd4da8f31e292060a58cb4a57f231ce151bba163e2bf,2024-11-21T02:00:13.020000 +CVE-2013-7039,0,0,e33930efc686f76aae7887715788d58e74800bffdfb1d3c2fcb9aa1d8f370c6b,2024-11-21T02:00:13.173000 +CVE-2013-7040,0,0,17c35b87eee6ac0d95831add7d5cf7fa03cc17644f944a49ae7fa5534c6a43c0,2024-11-21T02:00:13.320000 +CVE-2013-7041,0,0,4d5f5643e64ffc451c8eb9b2fd1e44fd799d1690a7053dd1b6c39e8c71544f20,2024-11-21T02:00:13.493000 +CVE-2013-7042,0,0,46ec2aa6a9aad4c2b421080d6414e794242da683803ea753978029c8c036405f,2024-11-21T02:00:13.653000 +CVE-2013-7043,0,0,ff7d44613e46b0a697abff5223e5e3ace75941cab6bcf57ca2bf0af2a39e9eff,2024-11-21T02:00:13.803000 +CVE-2013-7048,0,0,5b79de89a9ed53f9c53ba63373312c2f4c1cdc6bd58a1717a19795e15ff066a2,2024-11-21T02:00:13.990000 +CVE-2013-7049,0,0,d1f1b1ce904974bc7846d8452ebe136b4c89456339463b2ceeeff6e2fd569cd7,2024-11-21T02:00:14.180000 +CVE-2013-7050,0,0,987729540d4991b139b1afc47cb75761f6dc79f78e7f1a3d8e4ccee3dcaf1417,2024-11-21T02:00:14.333000 CVE-2013-7051,0,0,23ef6ca0cac7b893caaddb78dec263ad1e382c2fe5ac255ffae2902250e717e9,2023-04-26T19:27:52.350000 CVE-2013-7052,0,0,3c3df2a7cc6d8a3fea8850ef7aae7bbcc84998c55cf1f808a870f6e2871b3346,2023-04-26T19:27:52.350000 CVE-2013-7053,0,0,5fd7e99bd63c8295ad7c2bee2595f748f75a9fe33b1cf80daa99765f73727c29,2023-04-26T19:27:52.350000 CVE-2013-7054,0,0,70bde058c960b1a28447741b0d2531354569904caa4fc7991d56edc498c50fd2,2023-04-26T19:27:52.350000 CVE-2013-7055,0,0,021b087a185f02721044b4147a958c8f7f815b000d3c17af4ed70a43e922592d,2023-04-26T19:27:52.350000 CVE-2013-7057,0,0,20e416909a877f009b794688b172e3eae04b34c0362e91cd920806f365535904,2017-08-29T01:34:03.107000 -CVE-2013-7060,0,1,559055d5ac8aa2915a3363b60995c19c0755cb7818e070ef357e5ab060604016,2024-11-21T02:00:15.400000 -CVE-2013-7061,0,1,92a225ede936b6a615334dbc4e80e6d9a1dfe2bdd7894c31c0e1477412a467c8,2024-11-21T02:00:15.550000 +CVE-2013-7060,0,0,559055d5ac8aa2915a3363b60995c19c0755cb7818e070ef357e5ab060604016,2024-11-21T02:00:15.400000 +CVE-2013-7061,0,0,92a225ede936b6a615334dbc4e80e6d9a1dfe2bdd7894c31c0e1477412a467c8,2024-11-21T02:00:15.550000 CVE-2013-7062,0,0,873e60f4ac2abd0f27ed2766c4b60a158594a57b9b03db2f1b2b03398777105b,2020-01-09T18:12:06.710000 -CVE-2013-7063,0,1,97aee9c17ac3406037b1e7f29599b147b3c3fd0ac853799cca210fb25e3c2c20,2024-11-21T02:00:15.867000 -CVE-2013-7064,0,1,8b96b3b620a7523eab09520dd2caae8c18c8295048f554cc6b959cf3fa7d6eae,2024-11-21T02:00:16.007000 -CVE-2013-7065,0,1,691622fd62257f6b6bb065674dd0013fc6c2720d050e7c6cd8c52a6907a3fa39,2024-11-21T02:00:16.150000 -CVE-2013-7066,0,1,9ad0c09223078bd9af335bf8fb3189bd12b8d509ca2e5832ab2fea46f0523c28,2024-11-21T02:00:16.300000 -CVE-2013-7067,0,1,c0bc432865bb41a86aa34a80589ca98ba5f9234bb459bc3cbd5ed44cdfa020e1,2024-11-21T02:00:16.450000 -CVE-2013-7068,0,1,cef36d786e46438c45f823e5976224ed8f4c8a0d7bba9e1954bfe043d377c103,2024-11-21T02:00:16.593000 -CVE-2013-7069,0,1,5e32a58328f996380f4137aac1c2e49b27d7110cf16bf4ffb9d3f6a8ee2aa203,2024-11-21T02:00:16.747000 +CVE-2013-7063,0,0,97aee9c17ac3406037b1e7f29599b147b3c3fd0ac853799cca210fb25e3c2c20,2024-11-21T02:00:15.867000 +CVE-2013-7064,0,0,8b96b3b620a7523eab09520dd2caae8c18c8295048f554cc6b959cf3fa7d6eae,2024-11-21T02:00:16.007000 +CVE-2013-7065,0,0,691622fd62257f6b6bb065674dd0013fc6c2720d050e7c6cd8c52a6907a3fa39,2024-11-21T02:00:16.150000 +CVE-2013-7066,0,0,9ad0c09223078bd9af335bf8fb3189bd12b8d509ca2e5832ab2fea46f0523c28,2024-11-21T02:00:16.300000 +CVE-2013-7067,0,0,c0bc432865bb41a86aa34a80589ca98ba5f9234bb459bc3cbd5ed44cdfa020e1,2024-11-21T02:00:16.450000 +CVE-2013-7068,0,0,cef36d786e46438c45f823e5976224ed8f4c8a0d7bba9e1954bfe043d377c103,2024-11-21T02:00:16.593000 +CVE-2013-7069,0,0,5e32a58328f996380f4137aac1c2e49b27d7110cf16bf4ffb9d3f6a8ee2aa203,2024-11-21T02:00:16.747000 CVE-2013-7070,0,0,5a695aa2c92ace5609d9872cbf831dfc2899aadfd97479bebef2d7046cff7026,2020-01-09T19:00:22.263000 CVE-2013-7071,0,0,b07af4a5ba0fdb6599cd386a3223a54cf276997a807248a580c7e8d7abcd999e,2020-01-08T15:07:53.227000 CVE-2013-7072,0,0,050ced9d4d1a6366cbe820e679e4bb58c4042c640a1582d5847f12a39cda9a70,2023-11-07T02:17:52.707000 -CVE-2013-7073,0,1,32fa4ec2eadc4d952c4b1025ebc870ce8060e1c7746b9f5a0525eecea0ea1a92,2024-11-21T02:00:17.187000 -CVE-2013-7074,0,1,1d20edc6300eedaf32dc69cdba0e3f41ec8211ffc1f41fc1fe703591de6afbb0,2024-11-21T02:00:17.363000 -CVE-2013-7075,0,1,e438bc01d7a7087449e533c3b38ef6d5bcfa80a900f85e320e4577e0589eb265,2024-11-21T02:00:17.530000 -CVE-2013-7076,0,1,ea5801a28f1348f78828ed2529c155d714f2dcabee818c75aa0058db4ef376d1,2024-11-21T02:00:17.693000 -CVE-2013-7077,0,1,848792dd149127301c4d155e4a3fbb118fd73c44f3d10e594f45cdc7e7f6586c,2024-11-21T02:00:17.860000 -CVE-2013-7078,0,1,b5e982dff96e43d140be711e9f0a5c4c0df29d1068d7455aa23ed61c0dfa5be1,2024-11-21T02:00:18.023000 -CVE-2013-7079,0,1,f2b41ecd2974e4961d211a047380f56c1c1f114a2abdb559ccffd902d32257c3,2024-11-21T02:00:18.187000 -CVE-2013-7080,0,1,6953ae2e5feee47b025b7385e146ef885b8c96c3d47f7d046653d62637772ec6,2024-11-21T02:00:18.367000 -CVE-2013-7081,0,1,95b988a2f06577cb96a1b01ab3a9214d49ff1740932c89fa92de9d028eb12242,2024-11-21T02:00:18.530000 -CVE-2013-7082,0,1,2725a615ab49809b7747339c1c38f0f60cf2878fc7a0ef10d81474cc7a8d9dcd,2024-11-21T02:00:18.693000 -CVE-2013-7085,0,1,462299b68f1f0da6b8690552723aa35a4659497b65d6c2aac678606119ff53a9,2024-11-21T02:00:18.853000 -CVE-2013-7086,0,1,d1f7899c05c8df580c993aad01da65d1c224b03c0caa503fbf9c06b0c6e3a531,2024-11-21T02:00:19.017000 +CVE-2013-7073,0,0,32fa4ec2eadc4d952c4b1025ebc870ce8060e1c7746b9f5a0525eecea0ea1a92,2024-11-21T02:00:17.187000 +CVE-2013-7074,0,0,1d20edc6300eedaf32dc69cdba0e3f41ec8211ffc1f41fc1fe703591de6afbb0,2024-11-21T02:00:17.363000 +CVE-2013-7075,0,0,e438bc01d7a7087449e533c3b38ef6d5bcfa80a900f85e320e4577e0589eb265,2024-11-21T02:00:17.530000 +CVE-2013-7076,0,0,ea5801a28f1348f78828ed2529c155d714f2dcabee818c75aa0058db4ef376d1,2024-11-21T02:00:17.693000 +CVE-2013-7077,0,0,848792dd149127301c4d155e4a3fbb118fd73c44f3d10e594f45cdc7e7f6586c,2024-11-21T02:00:17.860000 +CVE-2013-7078,0,0,b5e982dff96e43d140be711e9f0a5c4c0df29d1068d7455aa23ed61c0dfa5be1,2024-11-21T02:00:18.023000 +CVE-2013-7079,0,0,f2b41ecd2974e4961d211a047380f56c1c1f114a2abdb559ccffd902d32257c3,2024-11-21T02:00:18.187000 +CVE-2013-7080,0,0,6953ae2e5feee47b025b7385e146ef885b8c96c3d47f7d046653d62637772ec6,2024-11-21T02:00:18.367000 +CVE-2013-7081,0,0,95b988a2f06577cb96a1b01ab3a9214d49ff1740932c89fa92de9d028eb12242,2024-11-21T02:00:18.530000 +CVE-2013-7082,0,0,2725a615ab49809b7747339c1c38f0f60cf2878fc7a0ef10d81474cc7a8d9dcd,2024-11-21T02:00:18.693000 +CVE-2013-7085,0,0,462299b68f1f0da6b8690552723aa35a4659497b65d6c2aac678606119ff53a9,2024-11-21T02:00:18.853000 +CVE-2013-7086,0,0,d1f7899c05c8df580c993aad01da65d1c224b03c0caa503fbf9c06b0c6e3a531,2024-11-21T02:00:19.017000 CVE-2013-7087,0,0,ff7135be9e5a7485f21975bf7bec30a85ff8e70073d5d988c9888c7d1c375d56,2020-08-18T15:05:57.813000 CVE-2013-7088,0,0,16c8ba2d61e9e300383e01e6c05e3561239745f06ca7920dfb40b5b33f499bb3,2020-08-18T15:05:57.813000 CVE-2013-7089,0,0,cca607dae8cc6ee804e245132bdb2dd17e98d4e3949f9f78c7e64f0de31babe5,2020-08-18T15:05:57.937000 -CVE-2013-7091,0,1,5f1c4645dfe49e8fffe7421ccbab2d11ad82785f52a18321ef169eb7f02b018e,2024-11-21T02:00:19.703000 -CVE-2013-7092,0,1,0fea7a2a49fb49b83759dd86a4495166add7cdae1a0b037bd31df10f92362342,2024-11-21T02:00:19.877000 -CVE-2013-7093,0,1,113d3b878739780e62ada853b1ccd4b7eb2144871192daac4fc9317717e94e8b,2024-11-21T02:00:20.023000 -CVE-2013-7094,0,1,f363bb793a35f4c0e737c95eb2cad3b5baee47d687b095669d42592a27ed6ed0,2024-11-21T02:00:20.180000 -CVE-2013-7095,0,1,da6512649c971d6fd7f7f242377ae7a5ffc7ed72c99b3979956d9c20c7368291,2024-11-21T02:00:20.333000 -CVE-2013-7096,0,1,f6b50ff37df31bce2cf93387e875d1f844e4fa5b7567d3c09cb31ecf56a29d6b,2024-11-21T02:00:20.490000 -CVE-2013-7097,0,1,a092e181fb775e511bbf96fccc18b8173fb1251f9eca0291fba2125bbab7d5da,2024-11-21T02:00:20.633000 +CVE-2013-7091,0,0,5f1c4645dfe49e8fffe7421ccbab2d11ad82785f52a18321ef169eb7f02b018e,2024-11-21T02:00:19.703000 +CVE-2013-7092,0,0,0fea7a2a49fb49b83759dd86a4495166add7cdae1a0b037bd31df10f92362342,2024-11-21T02:00:19.877000 +CVE-2013-7093,0,0,113d3b878739780e62ada853b1ccd4b7eb2144871192daac4fc9317717e94e8b,2024-11-21T02:00:20.023000 +CVE-2013-7094,0,0,f363bb793a35f4c0e737c95eb2cad3b5baee47d687b095669d42592a27ed6ed0,2024-11-21T02:00:20.180000 +CVE-2013-7095,0,0,da6512649c971d6fd7f7f242377ae7a5ffc7ed72c99b3979956d9c20c7368291,2024-11-21T02:00:20.333000 +CVE-2013-7096,0,0,f6b50ff37df31bce2cf93387e875d1f844e4fa5b7567d3c09cb31ecf56a29d6b,2024-11-21T02:00:20.490000 +CVE-2013-7097,0,0,a092e181fb775e511bbf96fccc18b8173fb1251f9eca0291fba2125bbab7d5da,2024-11-21T02:00:20.633000 CVE-2013-7098,0,0,5717b973de4a1ce1cc85a6722f2fd36843dabff5d74d96fbd60d45ff1780dda7,2020-02-20T21:41:31.227000 -CVE-2013-7100,0,1,94badd4761a0252263d3b4d95d69fd9b11eef507db0fefda75e9fc1dcdd3584c,2024-11-21T02:00:20.920000 -CVE-2013-7102,0,1,903d9fef4d5362294c51da8fe6c9e801d13e11bd1e925913c2847ba8992727bd,2024-11-21T02:00:21.110000 -CVE-2013-7103,0,1,76815bd5203417451de61c5c00a87f9f489ecaeabdba23c5e3ee0d632e649331,2024-11-21T02:00:21.230000 -CVE-2013-7104,0,1,46d71af32e9a44bf987816a4ae1f7d5f7e7d2db4bd4df7c299a6aeddbce15bc6,2024-11-21T02:00:21.390000 -CVE-2013-7105,0,1,ef890c5e5b1b6367cf17bf8859812732fb9929a679bde1cc2f64d051490e37be,2024-11-21T02:00:21.553000 -CVE-2013-7106,0,1,526e2739cb680efc4db633059a249686b3166548b709da7be84a6b075de3bd36,2024-11-21T02:00:21.693000 -CVE-2013-7107,0,1,5abbc83e84d6ad545236de8b4028a14b27cae1514ab3b53c9d8395164546dcda,2024-11-21T02:00:21.843000 -CVE-2013-7108,0,1,eb5a64024af76b9d89ca892ca4fbfa4900e33be1efefc8ba9617e35bccc41f54,2024-11-21T02:00:22.007000 +CVE-2013-7100,0,0,94badd4761a0252263d3b4d95d69fd9b11eef507db0fefda75e9fc1dcdd3584c,2024-11-21T02:00:20.920000 +CVE-2013-7102,0,0,903d9fef4d5362294c51da8fe6c9e801d13e11bd1e925913c2847ba8992727bd,2024-11-21T02:00:21.110000 +CVE-2013-7103,0,0,76815bd5203417451de61c5c00a87f9f489ecaeabdba23c5e3ee0d632e649331,2024-11-21T02:00:21.230000 +CVE-2013-7104,0,0,46d71af32e9a44bf987816a4ae1f7d5f7e7d2db4bd4df7c299a6aeddbce15bc6,2024-11-21T02:00:21.390000 +CVE-2013-7105,0,0,ef890c5e5b1b6367cf17bf8859812732fb9929a679bde1cc2f64d051490e37be,2024-11-21T02:00:21.553000 +CVE-2013-7106,0,0,526e2739cb680efc4db633059a249686b3166548b709da7be84a6b075de3bd36,2024-11-21T02:00:21.693000 +CVE-2013-7107,0,0,5abbc83e84d6ad545236de8b4028a14b27cae1514ab3b53c9d8395164546dcda,2024-11-21T02:00:21.843000 +CVE-2013-7108,0,0,eb5a64024af76b9d89ca892ca4fbfa4900e33be1efefc8ba9617e35bccc41f54,2024-11-21T02:00:22.007000 CVE-2013-7109,0,0,de6d074f202554a2b46ed5ea240d0c11ecb61160e0ea009035214281cf166409,2023-11-07T02:17:52.973000 -CVE-2013-7110,0,1,9580cdddb02f325196e437cd9ee259b5ade8b9dfac4022bb774421963c4a8f62,2024-11-21T02:00:22.203000 -CVE-2013-7111,0,1,47ab184422254fa05502c79c1af52de421cdac8faff8f74078ffb8296a9ade3b,2024-11-21T02:00:22.320000 -CVE-2013-7112,0,1,c4b48a887221b9240ccb079754e5545e2a10cd3d55715519f9acef609e46a0b3,2024-11-21T02:00:22.470000 -CVE-2013-7113,0,1,4e2a7e7325ecca4e7b801ca26b709ebab2200c2a5deba477f89af7354fa82996,2024-11-21T02:00:22.627000 -CVE-2013-7114,0,1,26a2aee6f265c1a99775b3ac62f040f7849154445db8c0efa6d16503ce02545a,2024-11-21T02:00:22.787000 +CVE-2013-7110,0,0,9580cdddb02f325196e437cd9ee259b5ade8b9dfac4022bb774421963c4a8f62,2024-11-21T02:00:22.203000 +CVE-2013-7111,0,0,47ab184422254fa05502c79c1af52de421cdac8faff8f74078ffb8296a9ade3b,2024-11-21T02:00:22.320000 +CVE-2013-7112,0,0,c4b48a887221b9240ccb079754e5545e2a10cd3d55715519f9acef609e46a0b3,2024-11-21T02:00:22.470000 +CVE-2013-7113,0,0,4e2a7e7325ecca4e7b801ca26b709ebab2200c2a5deba477f89af7354fa82996,2024-11-21T02:00:22.627000 +CVE-2013-7114,0,0,26a2aee6f265c1a99775b3ac62f040f7849154445db8c0efa6d16503ce02545a,2024-11-21T02:00:22.787000 CVE-2013-7115,0,0,9962b5e3f851157abc33888ee93d4597b1d5dc1a314e30988f41085e9877e8ee,2023-11-07T02:17:53.053000 CVE-2013-7116,0,0,9d8b58fa5f57689ca52325110943111dcdaabc27f3769a834345d19b3c889456,2023-11-07T02:17:53.263000 CVE-2013-7117,0,0,51b0f87a7a12be10738a32e88ef6a13c603a83f8d0eb1eeb0bbc9b9401769040,2023-11-07T02:17:53.500000 @@ -64175,26 +64175,26 @@ CVE-2013-7123,0,0,62353c1858acf84c6c521d4f5788fedad9b18bbd34a909c60300a237fe3b44 CVE-2013-7124,0,0,34657ae4e49c79c27080357276236e6dc3bd7163c132c412266b57ba3faf5cf8,2023-11-07T02:17:55.157000 CVE-2013-7125,0,0,2b111b1a9a3361cbee0383570604f7be5d4b1efa5ea28be0d43a613520d88ec3,2023-11-07T02:17:55.417000 CVE-2013-7126,0,0,c27fc5d94cb4c7af438f28d14bdb5c030898b582adc47d46729fdc63e22bf5e5,2023-11-07T02:17:55.650000 -CVE-2013-7127,0,1,5fa96019769d536c03bc94acb001bf2b34205c7d36c5baf381b3dadca76861f2,2024-11-21T02:00:23.127000 -CVE-2013-7128,0,1,32001fdb0581c75a5bc26aeef36613f873cc00df6a1c4f895ded888f0caca586,2024-11-21T02:00:23.273000 -CVE-2013-7129,0,1,14de2616afc683e0fdc85c4c22f3b5a61195d9ea2468fbeef7ba09e4341ce413,2024-11-21T02:00:23.417000 -CVE-2013-7130,0,1,466349c89f318bb712ff2a7ec3611ae5264a64d85d65bf07322c5b6657ca5f17,2024-11-21T02:00:23.563000 -CVE-2013-7134,0,1,ce0fbfaed42568ea4452f5b6aa9ad6ac431261432a420c07746d58bde29bd16c,2024-11-21T02:00:23.730000 -CVE-2013-7135,0,1,e4fcc7cb353e8a4503281fe0880fd2fc439598500234950ce348724173bf92df,2024-11-21T02:00:23.877000 -CVE-2013-7136,0,1,82d0a2637db180c272d3bcdeefae584b121c877b22bb985f801b717991061ee7,2024-11-21T02:00:24.003000 -CVE-2013-7137,0,1,58609066b3ebd02604306a39d099f4d42d134ae53c1346b0b567575d051a605e,2024-11-21T02:00:24.123000 -CVE-2013-7138,0,1,dc287f8d7b465ec81a81bfc1aabf9a85cfa4871000ddc8ce851442f390c1581c,2024-11-21T02:00:24.303000 -CVE-2013-7139,0,1,4eba4f7a7bb44fe28ff213a9c680751d477424472d6b49b11472719cf59805e2,2024-11-21T02:00:24.470000 -CVE-2013-7140,0,1,492451830ebe775ac55a9296357cca9e2faf705a6cdf1d69ac13108dad04f0c5,2024-11-21T02:00:24.613000 -CVE-2013-7141,0,1,7c0deca07fcfa881bf541d2c8b8f749125c71f3929ca1bd676192679ae502492,2024-11-21T02:00:24.757000 -CVE-2013-7142,0,1,fb31e30017d0de496ba59af6585afce207f0f07bc70bd33ec2a651a9385d9b8e,2024-11-21T02:00:24.907000 -CVE-2013-7143,0,1,ee0d38b89a686c9bd0453547427ce628a7fa6b8df78d52246ead750b4ef7cbc1,2024-11-21T02:00:25.057000 +CVE-2013-7127,0,0,5fa96019769d536c03bc94acb001bf2b34205c7d36c5baf381b3dadca76861f2,2024-11-21T02:00:23.127000 +CVE-2013-7128,0,0,32001fdb0581c75a5bc26aeef36613f873cc00df6a1c4f895ded888f0caca586,2024-11-21T02:00:23.273000 +CVE-2013-7129,0,0,14de2616afc683e0fdc85c4c22f3b5a61195d9ea2468fbeef7ba09e4341ce413,2024-11-21T02:00:23.417000 +CVE-2013-7130,0,0,466349c89f318bb712ff2a7ec3611ae5264a64d85d65bf07322c5b6657ca5f17,2024-11-21T02:00:23.563000 +CVE-2013-7134,0,0,ce0fbfaed42568ea4452f5b6aa9ad6ac431261432a420c07746d58bde29bd16c,2024-11-21T02:00:23.730000 +CVE-2013-7135,0,0,e4fcc7cb353e8a4503281fe0880fd2fc439598500234950ce348724173bf92df,2024-11-21T02:00:23.877000 +CVE-2013-7136,0,0,82d0a2637db180c272d3bcdeefae584b121c877b22bb985f801b717991061ee7,2024-11-21T02:00:24.003000 +CVE-2013-7137,0,0,58609066b3ebd02604306a39d099f4d42d134ae53c1346b0b567575d051a605e,2024-11-21T02:00:24.123000 +CVE-2013-7138,0,0,dc287f8d7b465ec81a81bfc1aabf9a85cfa4871000ddc8ce851442f390c1581c,2024-11-21T02:00:24.303000 +CVE-2013-7139,0,0,4eba4f7a7bb44fe28ff213a9c680751d477424472d6b49b11472719cf59805e2,2024-11-21T02:00:24.470000 +CVE-2013-7140,0,0,492451830ebe775ac55a9296357cca9e2faf705a6cdf1d69ac13108dad04f0c5,2024-11-21T02:00:24.613000 +CVE-2013-7141,0,0,7c0deca07fcfa881bf541d2c8b8f749125c71f3929ca1bd676192679ae502492,2024-11-21T02:00:24.757000 +CVE-2013-7142,0,0,fb31e30017d0de496ba59af6585afce207f0f07bc70bd33ec2a651a9385d9b8e,2024-11-21T02:00:24.907000 +CVE-2013-7143,0,0,ee0d38b89a686c9bd0453547427ce628a7fa6b8df78d52246ead750b4ef7cbc1,2024-11-21T02:00:25.057000 CVE-2013-7144,0,0,6153bf8e13f919404dd6f58d1e6ee8dd577fd8addcfd29607a29f64b4949e99c,2014-08-18T14:51:08.033000 CVE-2013-7145,0,0,a5c6814637f5fcf81ab7753c34a6105cdf66e3fab49e9d4550914b98cacb0fc7,2023-11-07T02:17:55.987000 CVE-2013-7146,0,0,91359f7cd80002d2cbc41b3a92f8fb0da47c441bb782c3537b8fb16b2ffc2f5b,2023-11-07T02:17:56.197000 CVE-2013-7147,0,0,9cf5b8334ce35522d854a12e9ef2fa68cff3991803c6810ed574261b2c6f5549,2023-11-07T02:17:56.437000 CVE-2013-7148,0,0,1b92e4df039b0a1f29401d00748a0ae4d5e42e6f9f0779be1cc0fbb564ad36be,2023-11-07T02:17:56.677000 -CVE-2013-7149,0,1,7cc0dd39c896457467c91ed9316e318652cbb79406b966ec1a4f171c3541fec7,2024-11-21T02:00:25.383000 +CVE-2013-7149,0,0,7cc0dd39c896457467c91ed9316e318652cbb79406b966ec1a4f171c3541fec7,2024-11-21T02:00:25.383000 CVE-2013-7164,0,0,ce907c91c233dc75b1920398255532b98016c038ac55e91ccbdefbb021ae47fd,2023-11-07T02:17:56.917000 CVE-2013-7165,0,0,5885871eb21f1beac65e50fefb9b26bf527e4e8a0ff6e4877cdf6a6be69ca830,2023-11-07T02:17:57.143000 CVE-2013-7166,0,0,de836f11a11f6487b91fa058015ba001a4c26c3a79bf16641ffe912ab205575c,2023-11-07T02:17:57.367000 @@ -64204,192 +64204,192 @@ CVE-2013-7169,0,0,71bfb74754de5ba215d439d1045c35ff1aa163552fc30fea2ea3319aa51f16 CVE-2013-7171,0,0,30097468570415b8e0fffb832ad22dccd2197881f3e034b8fd1173d417dd95db,2019-12-03T17:06:39.743000 CVE-2013-7172,0,0,b423de0b59851cc5655d6d6eaa36615b1081256f956ea9ae4688ae750a0caa32,2019-12-03T17:51:17.843000 CVE-2013-7173,0,0,2e46503746696d23085889297e4945482e373dcd2124ca0e6335d4e01e0c06c4,2020-02-20T20:32:38.190000 -CVE-2013-7174,0,1,41cc774b66231b7564f7ed0fcff58be992b0b33c80485d25eabb2ef8e2f43320,2024-11-21T02:00:26.087000 -CVE-2013-7175,0,1,0050ace04a1ac1e7bc3e5611ed47bbe13fd5e749d1c7db65b1830325e2f554f4,2024-11-21T02:00:26.200000 -CVE-2013-7176,0,1,f8e910df09077e77d59a8c4b2bd982e97db58ae3fac353d92f8f8faf1460a587,2024-11-21T02:00:26.320000 -CVE-2013-7177,0,1,222033cfd785422335ab12b8cc6d3a34927a3eb8d1daeaf56dca27688e77d836,2024-11-21T02:00:26.450000 -CVE-2013-7179,0,1,00c14d65a20273faec004e8d2b70a2283556c90a0018e945bfb961deed01c3e9,2024-11-21T02:00:26.577000 +CVE-2013-7174,0,0,41cc774b66231b7564f7ed0fcff58be992b0b33c80485d25eabb2ef8e2f43320,2024-11-21T02:00:26.087000 +CVE-2013-7175,0,0,0050ace04a1ac1e7bc3e5611ed47bbe13fd5e749d1c7db65b1830325e2f554f4,2024-11-21T02:00:26.200000 +CVE-2013-7176,0,0,f8e910df09077e77d59a8c4b2bd982e97db58ae3fac353d92f8f8faf1460a587,2024-11-21T02:00:26.320000 +CVE-2013-7177,0,0,222033cfd785422335ab12b8cc6d3a34927a3eb8d1daeaf56dca27688e77d836,2024-11-21T02:00:26.450000 +CVE-2013-7179,0,0,00c14d65a20273faec004e8d2b70a2283556c90a0018e945bfb961deed01c3e9,2024-11-21T02:00:26.577000 CVE-2013-7180,0,0,39fab2c8ec44d2b0d545d95b2202caa6172d12f70c42ba22a771d9d2f9a0ed67,2014-08-15T17:02:35.697000 -CVE-2013-7181,0,1,5c794855fc2158860afd76777595bdc10ecdc1f8efbe6194213ec95cf1c0ab5a,2024-11-21T02:00:26.817000 -CVE-2013-7182,0,1,27efe69519ac50b9228993c201ae8bf648276578431925a061a294c1b79f37d9,2024-11-21T02:00:26.947000 -CVE-2013-7183,0,1,e2fe48e26886ce9dbfcfd6c184e8a0199ad42d11aacd7c53de55576a043954f5,2024-11-21T02:00:27.083000 -CVE-2013-7184,0,1,6b3656dd8b3da45b76a7ae56468d2273357558b559ced0b43fd9a0a79caaaec0,2024-11-21T02:00:27.210000 +CVE-2013-7181,0,0,5c794855fc2158860afd76777595bdc10ecdc1f8efbe6194213ec95cf1c0ab5a,2024-11-21T02:00:26.817000 +CVE-2013-7182,0,0,27efe69519ac50b9228993c201ae8bf648276578431925a061a294c1b79f37d9,2024-11-21T02:00:26.947000 +CVE-2013-7183,0,0,e2fe48e26886ce9dbfcfd6c184e8a0199ad42d11aacd7c53de55576a043954f5,2024-11-21T02:00:27.083000 +CVE-2013-7184,0,0,6b3656dd8b3da45b76a7ae56468d2273357558b559ced0b43fd9a0a79caaaec0,2024-11-21T02:00:27.210000 CVE-2013-7185,0,0,14fbc65b959e1c8d74c2895f3eed8b95a44806ad05d5bc68bb7ab1610a47b3a7,2020-01-24T14:23:12.730000 -CVE-2013-7186,0,1,a199ed30b428991eb99c767be71e68859d21a704e2e717a55224b53800b7b032,2024-11-21T02:00:27.507000 -CVE-2013-7187,0,1,b57d27a2b6b2d2dca25858c1c97af020a06bd7f281ce7506af81574e0993831b,2024-11-21T02:00:27.660000 -CVE-2013-7188,0,1,e90b2899809cd3bde69eded6d125ba4f5e3334b6214182ea0446f61fd37d5ab2,2024-11-21T02:00:27.803000 -CVE-2013-7189,0,1,0ac4a03594e3a066142455b3b44f377ee513612e4ca763ecb21e4ea552df7440,2024-11-21T02:00:27.967000 -CVE-2013-7190,0,1,3e1d273d4631db8ad2e0f2c140d138b6ac9e1798df5e8353eefa61a7b01500d7,2024-11-21T02:00:28.120000 -CVE-2013-7191,0,1,79154acfd7b32d7dc7820d1a98d0ba924a3abce3f5b9ad334348bc5f7d9377f5,2024-11-21T02:00:28.260000 -CVE-2013-7192,0,1,23c953c16468395c5ae2cfee3842d5ed2b78634fd85cd15ba545ca7df93aa887,2024-11-21T02:00:28.410000 -CVE-2013-7193,0,1,33e3d35a817f4bb352029de283f56c2df3bdb259aff283370d694f42ed8b101b,2024-11-21T02:00:28.563000 -CVE-2013-7194,0,1,93b817277d83113c9bd9c8e4f54bfebf6569a5403943e9383afd320c22446475,2024-11-21T02:00:28.717000 -CVE-2013-7195,0,1,a6a4fd31b383170056dca5cbf4b0b5dcea8f6248f339a6c0e6b428e96e37575c,2024-11-21T02:00:28.850000 -CVE-2013-7196,0,1,b972a6f0694423bf27e631b56626eaba4bf85e45e4c94725f7a98bb60b8c356b,2024-11-21T02:00:28.990000 +CVE-2013-7186,0,0,a199ed30b428991eb99c767be71e68859d21a704e2e717a55224b53800b7b032,2024-11-21T02:00:27.507000 +CVE-2013-7187,0,0,b57d27a2b6b2d2dca25858c1c97af020a06bd7f281ce7506af81574e0993831b,2024-11-21T02:00:27.660000 +CVE-2013-7188,0,0,e90b2899809cd3bde69eded6d125ba4f5e3334b6214182ea0446f61fd37d5ab2,2024-11-21T02:00:27.803000 +CVE-2013-7189,0,0,0ac4a03594e3a066142455b3b44f377ee513612e4ca763ecb21e4ea552df7440,2024-11-21T02:00:27.967000 +CVE-2013-7190,0,0,3e1d273d4631db8ad2e0f2c140d138b6ac9e1798df5e8353eefa61a7b01500d7,2024-11-21T02:00:28.120000 +CVE-2013-7191,0,0,79154acfd7b32d7dc7820d1a98d0ba924a3abce3f5b9ad334348bc5f7d9377f5,2024-11-21T02:00:28.260000 +CVE-2013-7192,0,0,23c953c16468395c5ae2cfee3842d5ed2b78634fd85cd15ba545ca7df93aa887,2024-11-21T02:00:28.410000 +CVE-2013-7193,0,0,33e3d35a817f4bb352029de283f56c2df3bdb259aff283370d694f42ed8b101b,2024-11-21T02:00:28.563000 +CVE-2013-7194,0,0,93b817277d83113c9bd9c8e4f54bfebf6569a5403943e9383afd320c22446475,2024-11-21T02:00:28.717000 +CVE-2013-7195,0,0,a6a4fd31b383170056dca5cbf4b0b5dcea8f6248f339a6c0e6b428e96e37575c,2024-11-21T02:00:28.850000 +CVE-2013-7196,0,0,b972a6f0694423bf27e631b56626eaba4bf85e45e4c94725f7a98bb60b8c356b,2024-11-21T02:00:28.990000 CVE-2013-7201,0,0,a3c18ee0721a179de0e1c5784de98435c73d9e9f45853857b86a6ae14dc5ee1d,2018-06-13T11:13:48.997000 CVE-2013-7202,0,0,d60bd3fdfc06fe7b2ffcb17c4467a6970b515b6409d129c53c3bfcbde2ed7aef,2018-06-07T17:58:58.960000 CVE-2013-7203,0,0,90c647918f80b3c251a8f4dbb153474f3627a0893b21e3de6f1285fd67182702,2018-11-19T15:08:24.970000 -CVE-2013-7204,0,1,ee9bc4f7c4a59dbdc95e0041f68f3f4bd7ba2d101118938b4bd9f8cc6c7e6e7f,2024-11-21T02:00:29.577000 -CVE-2013-7205,0,1,6a96f814ca8952f6ccd10d5a4c1d621d18bd28b97f2791c0d3ad7f6d163efe86,2024-11-21T02:00:29.730000 -CVE-2013-7209,0,1,0605a0ca6f172e875956beee026f1e249416e247cce449666659489a10122f50,2024-11-21T02:00:29.897000 -CVE-2013-7216,0,1,f7c76b4f884b0e768f89c62e22d7d33b4e2e8970df2b6f02d63ae699bf522ad6,2024-11-21T02:00:30.040000 -CVE-2013-7217,0,1,d8b616f15c4a021fb2f59289b3ed9b3c4096d1b6d1193934ffdc2a8343752b63,2024-11-21T02:00:30.203000 -CVE-2013-7219,0,1,606566670f6dd94da3649905b011649b4934a9edeb16597e6b7616225021154a,2024-11-21T02:00:30.360000 -CVE-2013-7220,0,1,aa68f42b43c6b588c1393f812fb4dd58ee093abbe11be44c3c155c97ee782204,2024-11-21T02:00:30.527000 -CVE-2013-7221,0,1,9cc3419e1a2b82dd377b56187acc49591215d222ae6655cc39034f027fad6512,2024-11-21T02:00:30.700000 -CVE-2013-7222,0,1,fd11f9e3c6bb3b2b1fcedee8089e2472cd5f132d6a40b6e7a85cdebbef139055,2024-11-21T02:00:30.870000 -CVE-2013-7223,0,1,d8d736be67a67633ec644fead80f20754d4754117858138cd7a889facf84f1f1,2024-11-21T02:00:31.177000 -CVE-2013-7224,0,1,8c070d8a5d4c08aaf2d05ffffd660b727ae9174ddd5e9c85f0107f80ee877236,2024-11-21T02:00:31.317000 -CVE-2013-7225,0,1,84562d6866fb54b124a57fc72156f69abb39fe57a0d29c056990407ac2a89f54,2024-11-21T02:00:31.467000 -CVE-2013-7226,0,1,335a3d14aa7cac3c88733b274393f609be3dd7377e24fe9488caacd653aca045,2024-11-21T02:00:31.640000 -CVE-2013-7231,0,1,2dcd846818ae5965193b8722e19435235e6c57e5ec43d347395c6e98d3c2bf87,2024-11-21T02:00:31.817000 -CVE-2013-7232,0,1,51c063d71af9e83bd822487e92e87af313a6e9c206b185c4c6380ad2e8bd10da,2024-11-21T02:00:31.957000 -CVE-2013-7233,0,1,f3903c35965bb63ee98d957af705b74cb95c613260ed95821ff63e23d38c7ef9,2024-11-21T02:00:32.100000 -CVE-2013-7234,0,1,3192d860197d14a8b3bdb6563255dde5081fabdd9626f29e89c2c6f7b752cf21,2024-11-21T02:00:32.250000 -CVE-2013-7235,0,1,79b63a5dd6dcd62bc5e9c8d828c56f6cfe336ef8cc8bfed5b2ce62977dbe933b,2024-11-21T02:00:32.413000 -CVE-2013-7236,0,1,f2dcbaf607a9232c003254bec5270cc0c7b5ebe04433c493eba84bfc667f1b1a,2024-11-21T02:00:32.560000 -CVE-2013-7239,0,1,19ce398c41f7c070d1b65d6f8adefb4c81b3802be22a78a6a4d4cb7dc1ab5123,2024-11-21T02:00:32.707000 -CVE-2013-7240,0,1,a4a29fb73ab4ae7854569066c769085d6f0794929e3f93e56e84f56f0b9281f3,2024-11-21T02:00:32.817000 -CVE-2013-7241,0,1,da95229fae39f02aeede1f58393959cfaf63f9e66f8ad81e9f85cf2c36e46718,2024-11-21T02:00:32.957000 -CVE-2013-7242,0,1,d9824ac925874aeda540806e37186d16cfeae0c760a7c2f20549392b13fac86a,2024-11-21T02:00:33.093000 -CVE-2013-7243,0,1,bbcbefdc498a8cf9b023a86a61ca2b2a338b4a04ef3e9793fc80b5d32f58cb9f,2024-11-21T02:00:33.233000 +CVE-2013-7204,0,0,ee9bc4f7c4a59dbdc95e0041f68f3f4bd7ba2d101118938b4bd9f8cc6c7e6e7f,2024-11-21T02:00:29.577000 +CVE-2013-7205,0,0,6a96f814ca8952f6ccd10d5a4c1d621d18bd28b97f2791c0d3ad7f6d163efe86,2024-11-21T02:00:29.730000 +CVE-2013-7209,0,0,0605a0ca6f172e875956beee026f1e249416e247cce449666659489a10122f50,2024-11-21T02:00:29.897000 +CVE-2013-7216,0,0,f7c76b4f884b0e768f89c62e22d7d33b4e2e8970df2b6f02d63ae699bf522ad6,2024-11-21T02:00:30.040000 +CVE-2013-7217,0,0,d8b616f15c4a021fb2f59289b3ed9b3c4096d1b6d1193934ffdc2a8343752b63,2024-11-21T02:00:30.203000 +CVE-2013-7219,0,0,606566670f6dd94da3649905b011649b4934a9edeb16597e6b7616225021154a,2024-11-21T02:00:30.360000 +CVE-2013-7220,0,0,aa68f42b43c6b588c1393f812fb4dd58ee093abbe11be44c3c155c97ee782204,2024-11-21T02:00:30.527000 +CVE-2013-7221,0,0,9cc3419e1a2b82dd377b56187acc49591215d222ae6655cc39034f027fad6512,2024-11-21T02:00:30.700000 +CVE-2013-7222,0,0,fd11f9e3c6bb3b2b1fcedee8089e2472cd5f132d6a40b6e7a85cdebbef139055,2024-11-21T02:00:30.870000 +CVE-2013-7223,0,0,d8d736be67a67633ec644fead80f20754d4754117858138cd7a889facf84f1f1,2024-11-21T02:00:31.177000 +CVE-2013-7224,0,0,8c070d8a5d4c08aaf2d05ffffd660b727ae9174ddd5e9c85f0107f80ee877236,2024-11-21T02:00:31.317000 +CVE-2013-7225,0,0,84562d6866fb54b124a57fc72156f69abb39fe57a0d29c056990407ac2a89f54,2024-11-21T02:00:31.467000 +CVE-2013-7226,0,0,335a3d14aa7cac3c88733b274393f609be3dd7377e24fe9488caacd653aca045,2024-11-21T02:00:31.640000 +CVE-2013-7231,0,0,2dcd846818ae5965193b8722e19435235e6c57e5ec43d347395c6e98d3c2bf87,2024-11-21T02:00:31.817000 +CVE-2013-7232,0,0,51c063d71af9e83bd822487e92e87af313a6e9c206b185c4c6380ad2e8bd10da,2024-11-21T02:00:31.957000 +CVE-2013-7233,0,0,f3903c35965bb63ee98d957af705b74cb95c613260ed95821ff63e23d38c7ef9,2024-11-21T02:00:32.100000 +CVE-2013-7234,0,0,3192d860197d14a8b3bdb6563255dde5081fabdd9626f29e89c2c6f7b752cf21,2024-11-21T02:00:32.250000 +CVE-2013-7235,0,0,79b63a5dd6dcd62bc5e9c8d828c56f6cfe336ef8cc8bfed5b2ce62977dbe933b,2024-11-21T02:00:32.413000 +CVE-2013-7236,0,0,f2dcbaf607a9232c003254bec5270cc0c7b5ebe04433c493eba84bfc667f1b1a,2024-11-21T02:00:32.560000 +CVE-2013-7239,0,0,19ce398c41f7c070d1b65d6f8adefb4c81b3802be22a78a6a4d4cb7dc1ab5123,2024-11-21T02:00:32.707000 +CVE-2013-7240,0,0,a4a29fb73ab4ae7854569066c769085d6f0794929e3f93e56e84f56f0b9281f3,2024-11-21T02:00:32.817000 +CVE-2013-7241,0,0,da95229fae39f02aeede1f58393959cfaf63f9e66f8ad81e9f85cf2c36e46718,2024-11-21T02:00:32.957000 +CVE-2013-7242,0,0,d9824ac925874aeda540806e37186d16cfeae0c760a7c2f20549392b13fac86a,2024-11-21T02:00:33.093000 +CVE-2013-7243,0,0,bbcbefdc498a8cf9b023a86a61ca2b2a338b4a04ef3e9793fc80b5d32f58cb9f,2024-11-21T02:00:33.233000 CVE-2013-7245,0,0,e2db69360425500ab1da3c352b91853ffba3d6199efabff46c70df69b20e385e,2018-06-13T11:46:57.477000 -CVE-2013-7246,0,1,a845766629da252488d98f63b78beb641538399fd28706f65a026c4b52a1539c,2024-11-21T02:00:33.513000 -CVE-2013-7247,0,1,f94d0019a5bc5661e2113c9ef14edf66e9ee9db2250cf41f50125de1fcc3327c,2024-11-21T02:00:33.660000 -CVE-2013-7248,0,1,78d7d39e7c76f26e270874fbd02aaaf9a50c23d301b8ea30f63cd7f107d87263,2024-11-21T02:00:33.790000 -CVE-2013-7249,0,1,9b77c15744e6a14ac86038ab4e49f833e0ff4dbf06bb4e2881320d66e177b4d3,2024-11-21T02:00:33.917000 -CVE-2013-7250,0,1,701f19ed3d1b9a7d9baebcfeba2ee5e2aa0ede6395debc35d507fae3150e969f,2024-11-21T02:00:34.060000 -CVE-2013-7251,0,1,a6fff61e6c8378414b7917b9a2e5da428343f0af2c60d1270900602b7f47073e,2024-11-21T02:00:34.203000 +CVE-2013-7246,0,0,a845766629da252488d98f63b78beb641538399fd28706f65a026c4b52a1539c,2024-11-21T02:00:33.513000 +CVE-2013-7247,0,0,f94d0019a5bc5661e2113c9ef14edf66e9ee9db2250cf41f50125de1fcc3327c,2024-11-21T02:00:33.660000 +CVE-2013-7248,0,0,78d7d39e7c76f26e270874fbd02aaaf9a50c23d301b8ea30f63cd7f107d87263,2024-11-21T02:00:33.790000 +CVE-2013-7249,0,0,9b77c15744e6a14ac86038ab4e49f833e0ff4dbf06bb4e2881320d66e177b4d3,2024-11-21T02:00:33.917000 +CVE-2013-7250,0,0,701f19ed3d1b9a7d9baebcfeba2ee5e2aa0ede6395debc35d507fae3150e969f,2024-11-21T02:00:34.060000 +CVE-2013-7251,0,0,a6fff61e6c8378414b7917b9a2e5da428343f0af2c60d1270900602b7f47073e,2024-11-21T02:00:34.203000 CVE-2013-7252,0,0,e96cca2f9d0ba9f3ec9800399d90d544e29f9bd949973884527f7ad5f95b4e51,2016-08-02T13:58:52.697000 CVE-2013-7253,0,0,b614e077b7a2455e6b0d7f16c4eaafcf7abb4db7ad590043a4c62c4c202124e1,2023-11-07T02:17:59.007000 -CVE-2013-7254,0,1,f7114960f5dca669863f860f7e75bddf13c8f2c0e26f2b7b1508c7c1e018df95,2024-11-21T02:00:34.490000 -CVE-2013-7255,0,1,8b746bd4191953a7ffd756296d06c461866d5f8863bbb286c4ab580ff6a6a139,2024-11-21T02:00:34.633000 -CVE-2013-7256,0,1,d713031da317f55a1bd37d08d24dc74283a646a5ba5724255e7c792e10b6a846,2024-11-21T02:00:34.800000 -CVE-2013-7257,0,1,28dde974771bdbe31671874da5b94c4d4f3f67ec056a8e0b1a35e48353fa4d8c,2024-11-21T02:00:34.940000 -CVE-2013-7258,0,1,65dcbe3e3a3d707735433c656b74ea98236b6361365f7ba2215460a1cd9adf42,2024-11-21T02:00:35.090000 -CVE-2013-7259,0,1,66dc2f62ccea26a9bb02b34a6a33f150587506d183d3aaea49fa05b7ba17f47c,2024-11-21T02:00:35.227000 -CVE-2013-7260,0,1,04b22b42f4ff8dd9750b91a08715d5ec1fefd1ff0f3a4c3deda5fb9332187a82,2024-11-21T02:00:35.370000 -CVE-2013-7262,0,1,3213ea16b3eaacd0ed1aef7d3e7858e17968ba5356d08295b65752a5b7ccbd20,2024-11-21T02:00:35.520000 -CVE-2013-7263,0,1,f54ac0dadb6e6605110fc4f5be71f8f96c70ba09c5fa75f2560b4f61d0727593,2024-11-21T02:00:35.673000 -CVE-2013-7264,0,1,74ee4745c355c37833c30a53591d7801f800c3ce8931cfab86fbfec2e6ca74f6,2024-11-21T02:00:35.893000 -CVE-2013-7265,0,1,9b978e77c2210e147a04cee4f2600a8c6f41d37c17c46dbcf74542bfff201d9a,2024-11-21T02:00:36.093000 -CVE-2013-7266,0,1,56b3ecaa7ef229f712bc2984a14b466cf996e748a1e8202e711f77e1122aa28d,2024-11-21T02:00:36.307000 -CVE-2013-7267,0,1,1f25cb50ded45442bf83ed1d738d365b30018b8a9556fdcda481c7b5b74c6d16,2024-11-21T02:00:36.503000 -CVE-2013-7268,0,1,aa6fc5d1e88a135d1096dbe51e454ddd71d899194bdcebdbe4b9e4f55f5e59d4,2024-11-21T02:00:36.703000 -CVE-2013-7269,0,1,746688ddf0948e27f5b89b4abcfa562740e20fb9270e3ab738f6dab52507696f,2024-11-21T02:00:36.897000 -CVE-2013-7270,0,1,392cd3fcb28e341087d3b8b14af9a3b4084cf3bedc07acf58e4267eee31af134,2024-11-21T02:00:37.100000 -CVE-2013-7271,0,1,885e38f321c1c9d4ee15091eb4d85090f08bf78d0565a13a1f74ab4a1c165874,2024-11-21T02:00:37.297000 -CVE-2013-7273,0,1,f0981f6f65639077f850a3c7e00d88effe9a70cab9e0c535d3f0dd95d3ee9e36,2024-11-21T02:00:37.497000 -CVE-2013-7274,0,1,b86da938cc3bad815cae6659ada8e269db477f74a3fccb09d044eb8ce201d96b,2024-11-21T02:00:37.640000 -CVE-2013-7275,0,1,57bb8aa0c8ad27991419babd661c60c81f7d6c7165c5aedd46dc6fab2d5c9624,2024-11-21T02:00:37.783000 -CVE-2013-7276,0,1,68587e6d108b8707882f78e8d558f840571679a819ba193ee552018e69f32051,2024-11-21T02:00:37.940000 -CVE-2013-7277,0,1,1ec121c8dd038e9135e1ed01ad807ae3f8e428657d998ad68de88e787aa7e50d,2024-11-21T02:00:38.093000 -CVE-2013-7278,0,1,3f6f366c5ae7448e8e3ad1f20b8cdea96d65017dec5e3e05b01c6e10b2d3deeb,2024-11-21T02:00:38.263000 -CVE-2013-7279,0,1,e1284adb7cac57f868b9dc328cad8c068ee030c8707fa6efe20eb13fbcc06b55,2024-11-21T02:00:38.413000 -CVE-2013-7280,0,1,77ccbf3f00fd90e02b8a19155d630794157895aa6f25b6d2b7b4ac605ade03ce,2024-11-21T02:00:38.553000 -CVE-2013-7281,0,1,05399af5e04067047007552ec4c0bb726179e15bbec2542cd17105d8952051bb,2024-11-21T02:00:38.703000 -CVE-2013-7282,0,1,4df493a3bbeff750029771ac212cadfc44ab68c89c911491d013ec38f9bae518,2024-11-21T02:00:38.903000 -CVE-2013-7283,0,1,e97984ec7360be510bb96dc420deb57cefd5cb62af4ddc13f7629bcdfa47fa11,2024-11-21T02:00:39.047000 -CVE-2013-7284,0,1,96b26bb71df1849a3dbbd174a88d8b9d7ba547f5e3332167f9746fd74f50e736,2024-11-21T02:00:39.197000 +CVE-2013-7254,0,0,f7114960f5dca669863f860f7e75bddf13c8f2c0e26f2b7b1508c7c1e018df95,2024-11-21T02:00:34.490000 +CVE-2013-7255,0,0,8b746bd4191953a7ffd756296d06c461866d5f8863bbb286c4ab580ff6a6a139,2024-11-21T02:00:34.633000 +CVE-2013-7256,0,0,d713031da317f55a1bd37d08d24dc74283a646a5ba5724255e7c792e10b6a846,2024-11-21T02:00:34.800000 +CVE-2013-7257,0,0,28dde974771bdbe31671874da5b94c4d4f3f67ec056a8e0b1a35e48353fa4d8c,2024-11-21T02:00:34.940000 +CVE-2013-7258,0,0,65dcbe3e3a3d707735433c656b74ea98236b6361365f7ba2215460a1cd9adf42,2024-11-21T02:00:35.090000 +CVE-2013-7259,0,0,66dc2f62ccea26a9bb02b34a6a33f150587506d183d3aaea49fa05b7ba17f47c,2024-11-21T02:00:35.227000 +CVE-2013-7260,0,0,04b22b42f4ff8dd9750b91a08715d5ec1fefd1ff0f3a4c3deda5fb9332187a82,2024-11-21T02:00:35.370000 +CVE-2013-7262,0,0,3213ea16b3eaacd0ed1aef7d3e7858e17968ba5356d08295b65752a5b7ccbd20,2024-11-21T02:00:35.520000 +CVE-2013-7263,0,0,f54ac0dadb6e6605110fc4f5be71f8f96c70ba09c5fa75f2560b4f61d0727593,2024-11-21T02:00:35.673000 +CVE-2013-7264,0,0,74ee4745c355c37833c30a53591d7801f800c3ce8931cfab86fbfec2e6ca74f6,2024-11-21T02:00:35.893000 +CVE-2013-7265,0,0,9b978e77c2210e147a04cee4f2600a8c6f41d37c17c46dbcf74542bfff201d9a,2024-11-21T02:00:36.093000 +CVE-2013-7266,0,0,56b3ecaa7ef229f712bc2984a14b466cf996e748a1e8202e711f77e1122aa28d,2024-11-21T02:00:36.307000 +CVE-2013-7267,0,0,1f25cb50ded45442bf83ed1d738d365b30018b8a9556fdcda481c7b5b74c6d16,2024-11-21T02:00:36.503000 +CVE-2013-7268,0,0,aa6fc5d1e88a135d1096dbe51e454ddd71d899194bdcebdbe4b9e4f55f5e59d4,2024-11-21T02:00:36.703000 +CVE-2013-7269,0,0,746688ddf0948e27f5b89b4abcfa562740e20fb9270e3ab738f6dab52507696f,2024-11-21T02:00:36.897000 +CVE-2013-7270,0,0,392cd3fcb28e341087d3b8b14af9a3b4084cf3bedc07acf58e4267eee31af134,2024-11-21T02:00:37.100000 +CVE-2013-7271,0,0,885e38f321c1c9d4ee15091eb4d85090f08bf78d0565a13a1f74ab4a1c165874,2024-11-21T02:00:37.297000 +CVE-2013-7273,0,0,f0981f6f65639077f850a3c7e00d88effe9a70cab9e0c535d3f0dd95d3ee9e36,2024-11-21T02:00:37.497000 +CVE-2013-7274,0,0,b86da938cc3bad815cae6659ada8e269db477f74a3fccb09d044eb8ce201d96b,2024-11-21T02:00:37.640000 +CVE-2013-7275,0,0,57bb8aa0c8ad27991419babd661c60c81f7d6c7165c5aedd46dc6fab2d5c9624,2024-11-21T02:00:37.783000 +CVE-2013-7276,0,0,68587e6d108b8707882f78e8d558f840571679a819ba193ee552018e69f32051,2024-11-21T02:00:37.940000 +CVE-2013-7277,0,0,1ec121c8dd038e9135e1ed01ad807ae3f8e428657d998ad68de88e787aa7e50d,2024-11-21T02:00:38.093000 +CVE-2013-7278,0,0,3f6f366c5ae7448e8e3ad1f20b8cdea96d65017dec5e3e05b01c6e10b2d3deeb,2024-11-21T02:00:38.263000 +CVE-2013-7279,0,0,e1284adb7cac57f868b9dc328cad8c068ee030c8707fa6efe20eb13fbcc06b55,2024-11-21T02:00:38.413000 +CVE-2013-7280,0,0,77ccbf3f00fd90e02b8a19155d630794157895aa6f25b6d2b7b4ac605ade03ce,2024-11-21T02:00:38.553000 +CVE-2013-7281,0,0,05399af5e04067047007552ec4c0bb726179e15bbec2542cd17105d8952051bb,2024-11-21T02:00:38.703000 +CVE-2013-7282,0,0,4df493a3bbeff750029771ac212cadfc44ab68c89c911491d013ec38f9bae518,2024-11-21T02:00:38.903000 +CVE-2013-7283,0,0,e97984ec7360be510bb96dc420deb57cefd5cb62af4ddc13f7629bcdfa47fa11,2024-11-21T02:00:39.047000 +CVE-2013-7284,0,0,96b26bb71df1849a3dbbd174a88d8b9d7ba547f5e3332167f9746fd74f50e736,2024-11-21T02:00:39.197000 CVE-2013-7285,0,0,589b932fd782d1c7d2753662f5bf2168e825599d1c975bed080ac10dcb478d57,2023-11-07T02:18:01.090000 CVE-2013-7286,0,0,9ed6cb281454c078ffcd085dbae45d65087aefdd4ea23837270322193aae3609,2021-07-28T18:45:51.003000 CVE-2013-7287,0,0,eed9af13d271ba77a24fa3617caa7bc4173f753e607f76fe599c3a5b6acc42c0,2020-02-21T15:13:54.417000 -CVE-2013-7288,0,1,11e4f5eab1f264f6d7cc5341b6eaec3322526b95eb44c34111d55a5f163be3f2,2024-11-21T02:00:39.860000 -CVE-2013-7289,0,1,3fccfa81a80bebbae8791e1dd435846ecf84a46044c7dd14c517abb162efc5a8,2024-11-21T02:00:40.037000 -CVE-2013-7290,0,1,f0cc8339ea7ed337dac8be3afdff31594eeba2693703ad1bcdfb3db103d12307,2024-11-21T02:00:40.193000 -CVE-2013-7291,0,1,1135ee0f3cd95e0954ad769a4d65b90985decd04601d9eaafa21ff8daaed4c2f,2024-11-21T02:00:40.330000 -CVE-2013-7292,0,1,71f49607a49f2c30471b686b5b9e98c0f9e8686c3c0f42e7572098319194a5dd,2024-11-21T02:00:40.463000 -CVE-2013-7293,0,1,9a7c594b1d14cf2f433df485a72932aab26f8b03a7f0cd559adb21d76c052b20,2024-11-21T02:00:40.600000 -CVE-2013-7294,0,1,f45e942d792ddc71e60f6ccb88ac3cf3404d65055a415507fdcf85b45aa718cd,2024-11-21T02:00:40.737000 -CVE-2013-7295,0,1,77d8d80bc514dd7df9ebf0b17dcf7d99234e8ca25d286b27bcab5fd7498ab299,2024-11-21T02:00:40.880000 -CVE-2013-7296,0,1,f6f448cc3edeea5b476205b78dad38bc16b5b51040c48848d08e3e9e176fa7c2,2024-11-21T02:00:41.010000 -CVE-2013-7298,0,1,cd4cd698e3c88e33489ac0bdf81b46206b6cab1d00e5ca9068c9e02bccd294f7,2024-11-21T02:00:41.167000 -CVE-2013-7299,0,1,8ae02ec2324b64bbdf43c5702c18857bd5403f17e1a2be49fb56d51fd9723d52,2024-11-21T02:00:41.310000 -CVE-2013-7300,0,1,9a404d2673a0cd9c02f750488de2ef8c547f770fc0127e55dab5244bf49e10e4,2024-11-21T02:00:41.450000 -CVE-2013-7301,0,1,a7ef9e8d3e54e70b1220ee15f24f0533ebf047249f9a3ad5c6dadd3e00372027,2024-11-21T02:00:41.603000 -CVE-2013-7302,0,1,38a31792fe79a49fd13eed53757e093a67e0f22f9579fb1e333150d519dd53bd,2024-11-21T02:00:41.747000 -CVE-2013-7303,0,1,0e868f8b5512d03910e4723e07e23f7533cc17cd890e17badeb16b620b053e06,2024-11-21T02:00:41.900000 -CVE-2013-7304,0,1,d9e36c8fabffdfd958826088034a62388197883a10351d317720b8705aaa271d,2024-11-21T02:00:42.023000 -CVE-2013-7305,0,1,1dd4b020c7f029d84a33a3d9671695193757ec1934b0a531c89b31abb15de576,2024-11-21T02:00:42.163000 -CVE-2013-7306,0,1,363d51b590b7f450f89dd29c9c9185c59fe8ccb7391efc0849fe4a08e050cee1,2024-11-21T02:00:42.307000 -CVE-2013-7307,0,1,42f80c56ec217f65afab7b1d5b36fab55caa23ed1ed7a7dc4aa67ce526a34e9e,2024-11-21T02:00:42.440000 -CVE-2013-7308,0,1,f8ae83b94c264ef12c727372159d28d53de2ee948dc79e4dd3befc93b17d42bb,2024-11-21T02:00:42.577000 -CVE-2013-7309,0,1,1552dbaaad630e4f5f58f99185984ee20bc9a01a80cd5fe667f59c4f2e764b60,2024-11-21T02:00:42.713000 -CVE-2013-7310,0,1,ba3978ef6d674dde5d74369268151f662064a7bda5b6ba47aee914a5d3d228eb,2024-11-21T02:00:42.837000 -CVE-2013-7311,0,1,b4a3d8deb4e69220da75ace80eefe506d3272b421d880b7f47b293beff100511,2024-11-21T02:00:42.977000 -CVE-2013-7312,0,1,61374e74965fa45398e59d9b163e79e981b1519a2889b94b47d7f56bc95dd1f7,2024-11-21T02:00:43.113000 -CVE-2013-7313,0,1,6d27fd7f51a593517c225b4f49547d150a964571d67e65f389d483c7f5a1e23c,2024-11-21T02:00:43.257000 -CVE-2013-7314,0,1,59fe693f4cb7a7edc076dadca1ef2ff240c7eb416e9777c4b91baeb8f7281f11,2024-11-21T02:00:43.410000 -CVE-2013-7315,0,1,0daa914c2b74d014244e3742bd7b6cb811133b9d9c1428af6649c9d6857c7032,2024-11-21T02:00:43.573000 -CVE-2013-7316,0,1,5a3cbda6e7904e098d617c15ff8c82480f97741eaf5cb790494ab6f4b20531fc,2024-11-21T02:00:43.720000 -CVE-2013-7317,0,1,82cffee8fa59d1bce3bf8f94f2a964c1f2f3b1849a82e2c76323fa7d107d7ff1,2024-11-21T02:00:43.877000 -CVE-2013-7318,0,1,d17cc426e3418cdbaa84be1e5683ba2c3ee7f5d3436a0153047a211d9048f2d6,2024-11-21T02:00:44.027000 -CVE-2013-7319,0,1,d4cdc86048b3b84ef835a22f2bab6422e5299b04babdf60453cb1f84aaf7ff37,2024-11-21T02:00:44.163000 -CVE-2013-7320,0,1,9e45b587b2c73cf10900b30209b8b4a7bc0907d59f341ba46036d4eb46626f2d,2024-11-21T02:00:44.323000 -CVE-2013-7321,0,1,38b7ec97b99bbd781a652c759a99479edf8fd22e2fd641b466c541bdd97cc6ec,2024-11-21T02:00:44.477000 -CVE-2013-7322,0,1,86b6956d17f4ac757c9d178b65bb3df191fccf4a16d9e722c05856894995aeb6,2024-11-21T02:00:44.630000 +CVE-2013-7288,0,0,11e4f5eab1f264f6d7cc5341b6eaec3322526b95eb44c34111d55a5f163be3f2,2024-11-21T02:00:39.860000 +CVE-2013-7289,0,0,3fccfa81a80bebbae8791e1dd435846ecf84a46044c7dd14c517abb162efc5a8,2024-11-21T02:00:40.037000 +CVE-2013-7290,0,0,f0cc8339ea7ed337dac8be3afdff31594eeba2693703ad1bcdfb3db103d12307,2024-11-21T02:00:40.193000 +CVE-2013-7291,0,0,1135ee0f3cd95e0954ad769a4d65b90985decd04601d9eaafa21ff8daaed4c2f,2024-11-21T02:00:40.330000 +CVE-2013-7292,0,0,71f49607a49f2c30471b686b5b9e98c0f9e8686c3c0f42e7572098319194a5dd,2024-11-21T02:00:40.463000 +CVE-2013-7293,0,0,9a7c594b1d14cf2f433df485a72932aab26f8b03a7f0cd559adb21d76c052b20,2024-11-21T02:00:40.600000 +CVE-2013-7294,0,0,f45e942d792ddc71e60f6ccb88ac3cf3404d65055a415507fdcf85b45aa718cd,2024-11-21T02:00:40.737000 +CVE-2013-7295,0,0,77d8d80bc514dd7df9ebf0b17dcf7d99234e8ca25d286b27bcab5fd7498ab299,2024-11-21T02:00:40.880000 +CVE-2013-7296,0,0,f6f448cc3edeea5b476205b78dad38bc16b5b51040c48848d08e3e9e176fa7c2,2024-11-21T02:00:41.010000 +CVE-2013-7298,0,0,cd4cd698e3c88e33489ac0bdf81b46206b6cab1d00e5ca9068c9e02bccd294f7,2024-11-21T02:00:41.167000 +CVE-2013-7299,0,0,8ae02ec2324b64bbdf43c5702c18857bd5403f17e1a2be49fb56d51fd9723d52,2024-11-21T02:00:41.310000 +CVE-2013-7300,0,0,9a404d2673a0cd9c02f750488de2ef8c547f770fc0127e55dab5244bf49e10e4,2024-11-21T02:00:41.450000 +CVE-2013-7301,0,0,a7ef9e8d3e54e70b1220ee15f24f0533ebf047249f9a3ad5c6dadd3e00372027,2024-11-21T02:00:41.603000 +CVE-2013-7302,0,0,38a31792fe79a49fd13eed53757e093a67e0f22f9579fb1e333150d519dd53bd,2024-11-21T02:00:41.747000 +CVE-2013-7303,0,0,0e868f8b5512d03910e4723e07e23f7533cc17cd890e17badeb16b620b053e06,2024-11-21T02:00:41.900000 +CVE-2013-7304,0,0,d9e36c8fabffdfd958826088034a62388197883a10351d317720b8705aaa271d,2024-11-21T02:00:42.023000 +CVE-2013-7305,0,0,1dd4b020c7f029d84a33a3d9671695193757ec1934b0a531c89b31abb15de576,2024-11-21T02:00:42.163000 +CVE-2013-7306,0,0,363d51b590b7f450f89dd29c9c9185c59fe8ccb7391efc0849fe4a08e050cee1,2024-11-21T02:00:42.307000 +CVE-2013-7307,0,0,42f80c56ec217f65afab7b1d5b36fab55caa23ed1ed7a7dc4aa67ce526a34e9e,2024-11-21T02:00:42.440000 +CVE-2013-7308,0,0,f8ae83b94c264ef12c727372159d28d53de2ee948dc79e4dd3befc93b17d42bb,2024-11-21T02:00:42.577000 +CVE-2013-7309,0,0,1552dbaaad630e4f5f58f99185984ee20bc9a01a80cd5fe667f59c4f2e764b60,2024-11-21T02:00:42.713000 +CVE-2013-7310,0,0,ba3978ef6d674dde5d74369268151f662064a7bda5b6ba47aee914a5d3d228eb,2024-11-21T02:00:42.837000 +CVE-2013-7311,0,0,b4a3d8deb4e69220da75ace80eefe506d3272b421d880b7f47b293beff100511,2024-11-21T02:00:42.977000 +CVE-2013-7312,0,0,61374e74965fa45398e59d9b163e79e981b1519a2889b94b47d7f56bc95dd1f7,2024-11-21T02:00:43.113000 +CVE-2013-7313,0,0,6d27fd7f51a593517c225b4f49547d150a964571d67e65f389d483c7f5a1e23c,2024-11-21T02:00:43.257000 +CVE-2013-7314,0,0,59fe693f4cb7a7edc076dadca1ef2ff240c7eb416e9777c4b91baeb8f7281f11,2024-11-21T02:00:43.410000 +CVE-2013-7315,0,0,0daa914c2b74d014244e3742bd7b6cb811133b9d9c1428af6649c9d6857c7032,2024-11-21T02:00:43.573000 +CVE-2013-7316,0,0,5a3cbda6e7904e098d617c15ff8c82480f97741eaf5cb790494ab6f4b20531fc,2024-11-21T02:00:43.720000 +CVE-2013-7317,0,0,82cffee8fa59d1bce3bf8f94f2a964c1f2f3b1849a82e2c76323fa7d107d7ff1,2024-11-21T02:00:43.877000 +CVE-2013-7318,0,0,d17cc426e3418cdbaa84be1e5683ba2c3ee7f5d3436a0153047a211d9048f2d6,2024-11-21T02:00:44.027000 +CVE-2013-7319,0,0,d4cdc86048b3b84ef835a22f2bab6422e5299b04babdf60453cb1f84aaf7ff37,2024-11-21T02:00:44.163000 +CVE-2013-7320,0,0,9e45b587b2c73cf10900b30209b8b4a7bc0907d59f341ba46036d4eb46626f2d,2024-11-21T02:00:44.323000 +CVE-2013-7321,0,0,38b7ec97b99bbd781a652c759a99479edf8fd22e2fd641b466c541bdd97cc6ec,2024-11-21T02:00:44.477000 +CVE-2013-7322,0,0,86b6956d17f4ac757c9d178b65bb3df191fccf4a16d9e722c05856894995aeb6,2024-11-21T02:00:44.630000 CVE-2013-7323,0,0,75b6a1ac5926f08654344e18230aa308e15f11c46de83f481b9df1f68174507e,2014-06-24T14:59:57.267000 CVE-2013-7324,0,0,b8df07cbd6f9b7671c9f56c35f25809782bfb1ab22046024ede997568de8574b,2020-02-28T19:59:32.853000 CVE-2013-7325,0,0,d6c58849398366aa369bd6f4973fa637a3340dbd821ecc7a709dff97fa04b9a0,2019-12-06T18:06:01.937000 -CVE-2013-7326,0,1,3f7a0cd9d44f625ff76770fbfe41efbe920f9a0e9379be53dab7cf0c5b1a45cc,2024-11-21T02:00:45.227000 -CVE-2013-7327,0,1,fe4fae1b662fe7e3ada42bf51834735967adc53ed4a827636bab85bb96325aca,2024-11-21T02:00:45.380000 -CVE-2013-7328,0,1,280f834def89dac7f7113df3334b9a63e6e0b9c454bcc08e82775d8e32679b41,2024-11-21T02:00:45.530000 +CVE-2013-7326,0,0,3f7a0cd9d44f625ff76770fbfe41efbe920f9a0e9379be53dab7cf0c5b1a45cc,2024-11-21T02:00:45.227000 +CVE-2013-7327,0,0,fe4fae1b662fe7e3ada42bf51834735967adc53ed4a827636bab85bb96325aca,2024-11-21T02:00:45.380000 +CVE-2013-7328,0,0,280f834def89dac7f7113df3334b9a63e6e0b9c454bcc08e82775d8e32679b41,2024-11-21T02:00:45.530000 CVE-2013-7329,0,0,5dacc041a614685b86944edc8d59b993419de7a6b39218af46a70dc8b6aa97f6,2018-03-07T02:29:00.253000 CVE-2013-7330,0,0,7e4fab8296dbb43f17b00add6f65102be19abac1bc82452f52cb79a54e36f5a5,2016-06-13T23:27:39.187000 -CVE-2013-7331,0,1,b06f97f97b50479ab084cc26278bf05d41f8efc1586073625cb055b89788321a,2024-11-21T02:00:45.927000 -CVE-2013-7332,0,1,c863716154398f2c06669c139e4714496dc0cc0f4a0e980dd46178cd80019bc0,2024-11-21T02:00:46.103000 +CVE-2013-7331,0,0,b06f97f97b50479ab084cc26278bf05d41f8efc1586073625cb055b89788321a,2024-11-21T02:00:45.927000 +CVE-2013-7332,0,0,c863716154398f2c06669c139e4714496dc0cc0f4a0e980dd46178cd80019bc0,2024-11-21T02:00:46.103000 CVE-2013-7333,0,0,3341fad2965d54d5dc39d3b9262cae7804d80f1e51d3519cbcd0c11ca9664f6a,2019-10-25T17:29:06.787000 -CVE-2013-7334,0,1,ca3d42e3c5c709aca53114f0d3886a9b2fc6fe8d043b6c0f90170d5b63c45aac,2024-11-21T02:00:46.400000 -CVE-2013-7335,0,1,7224b2ca6e45d77c1af23b6a6ecce0cb3ff59567d835854a3a29cd8a528db044,2024-11-21T02:00:46.537000 -CVE-2013-7336,0,1,74891d0fc2ba7f7e9c474b793afc52a0a3387d957631abf5aae37529238a7490,2024-11-21T02:00:46.690000 -CVE-2013-7338,0,1,5da0df96fe85904fc3bf03b928638b2a8c45ecbe337d61e6cac48b335a55ea6d,2024-11-21T02:00:46.850000 -CVE-2013-7339,0,1,a56c972d274ff384e36a8513ac8b13c1a088807c03eb0d87c540ece31066fc49,2024-11-21T02:00:47.030000 -CVE-2013-7340,0,1,e179cde2bbf1f62aeb635950e489461e80db94e619428e67ad78b7c568f9e868,2024-11-21T02:00:47.180000 -CVE-2013-7341,0,1,05d4dece26e464aba7766ac6d9468c22c9efea2b654c1cf3aaf3d876e1ad253a,2024-11-21T02:00:47.337000 -CVE-2013-7342,0,1,a2472d012cef2668b6ed2fbcd33ce1a5bbbe94fdc11cd96bd438dd3c4b498e9f,2024-11-21T02:00:47.487000 -CVE-2013-7343,0,1,5e9306df15a4ec4a5cbdfcb7ca0a0ce8a73b41fa2e53e669461755150314e78b,2024-11-21T02:00:47.623000 -CVE-2013-7344,0,1,ceaac6ea863891be1f8c7f0dc38cd7e7b4a5e36356401368e7e8bfe6f322f29d,2024-11-21T02:00:47.757000 -CVE-2013-7345,0,1,41cca6fb7651b502ed536dcc05f424f155fedf5e440e546a04fe8632c6e6462c,2024-11-21T02:00:47.893000 -CVE-2013-7346,0,1,bf63afcefb776f54e04f27e284ea3b74aaa5c81f8caa958b1c40cda54bfcc7b2,2024-11-21T02:00:48.047000 -CVE-2013-7347,0,1,b1b64eb155fa2e5a18e99abac0d3b56764ad1beb0849bf81e04a9186f514a8c3,2024-11-21T02:00:48.183000 -CVE-2013-7348,0,1,c3f95e4976af41794cecdad75e3f93f74ead30b606e6d846e2b8b48631861f21,2024-11-21T02:00:48.317000 -CVE-2013-7349,0,1,e5d304e3cc6ae8a8bf5d4ef148052005b6c3a671533a07fc1c002e7bd91bec14,2024-11-21T02:00:48.497000 -CVE-2013-7350,0,1,7f106d649b189fabed992a944f9224abaf53b208111b86ef040d584b2c0819c9,2024-11-21T02:00:48.637000 +CVE-2013-7334,0,0,ca3d42e3c5c709aca53114f0d3886a9b2fc6fe8d043b6c0f90170d5b63c45aac,2024-11-21T02:00:46.400000 +CVE-2013-7335,0,0,7224b2ca6e45d77c1af23b6a6ecce0cb3ff59567d835854a3a29cd8a528db044,2024-11-21T02:00:46.537000 +CVE-2013-7336,0,0,74891d0fc2ba7f7e9c474b793afc52a0a3387d957631abf5aae37529238a7490,2024-11-21T02:00:46.690000 +CVE-2013-7338,0,0,5da0df96fe85904fc3bf03b928638b2a8c45ecbe337d61e6cac48b335a55ea6d,2024-11-21T02:00:46.850000 +CVE-2013-7339,0,0,a56c972d274ff384e36a8513ac8b13c1a088807c03eb0d87c540ece31066fc49,2024-11-21T02:00:47.030000 +CVE-2013-7340,0,0,e179cde2bbf1f62aeb635950e489461e80db94e619428e67ad78b7c568f9e868,2024-11-21T02:00:47.180000 +CVE-2013-7341,0,0,05d4dece26e464aba7766ac6d9468c22c9efea2b654c1cf3aaf3d876e1ad253a,2024-11-21T02:00:47.337000 +CVE-2013-7342,0,0,a2472d012cef2668b6ed2fbcd33ce1a5bbbe94fdc11cd96bd438dd3c4b498e9f,2024-11-21T02:00:47.487000 +CVE-2013-7343,0,0,5e9306df15a4ec4a5cbdfcb7ca0a0ce8a73b41fa2e53e669461755150314e78b,2024-11-21T02:00:47.623000 +CVE-2013-7344,0,0,ceaac6ea863891be1f8c7f0dc38cd7e7b4a5e36356401368e7e8bfe6f322f29d,2024-11-21T02:00:47.757000 +CVE-2013-7345,0,0,41cca6fb7651b502ed536dcc05f424f155fedf5e440e546a04fe8632c6e6462c,2024-11-21T02:00:47.893000 +CVE-2013-7346,0,0,bf63afcefb776f54e04f27e284ea3b74aaa5c81f8caa958b1c40cda54bfcc7b2,2024-11-21T02:00:48.047000 +CVE-2013-7347,0,0,b1b64eb155fa2e5a18e99abac0d3b56764ad1beb0849bf81e04a9186f514a8c3,2024-11-21T02:00:48.183000 +CVE-2013-7348,0,0,c3f95e4976af41794cecdad75e3f93f74ead30b606e6d846e2b8b48631861f21,2024-11-21T02:00:48.317000 +CVE-2013-7349,0,0,e5d304e3cc6ae8a8bf5d4ef148052005b6c3a671533a07fc1c002e7bd91bec14,2024-11-21T02:00:48.497000 +CVE-2013-7350,0,0,7f106d649b189fabed992a944f9224abaf53b208111b86ef040d584b2c0819c9,2024-11-21T02:00:48.637000 CVE-2013-7351,0,0,395e78bf0470f5f96fb9ae39f136cfe1821f763e50c80af2449b2645f73d131c,2020-01-09T20:15:29.867000 -CVE-2013-7352,0,1,38ec4b176994cace5c818c3919e448a20fb4e7848ecd9daf85d7a1c1ef0dccaa,2024-11-21T02:00:48.890000 -CVE-2013-7353,0,1,9a2cb21d7e3364c40a23599acbf66ada07e6d9ba3dd9dba1222106cb5f29d61d,2024-11-21T02:00:49.030000 -CVE-2013-7354,0,1,71fde93b0e134fa51bc90f3263555f9bb70fd9277d8fb39e149ea583c1e1bbfa,2024-11-21T02:00:49.183000 -CVE-2013-7355,0,1,e0a493f2b40551f71abd69104f281557aad208817ed110ad19e98cef10ae1cc6,2024-11-21T02:00:49.337000 -CVE-2013-7356,0,1,b8a60047bac6359c3385eddfe54a404e57d3371a6482c94025704ec2aa825a82,2024-11-21T02:00:49.477000 -CVE-2013-7357,0,1,a9af811f63de7e18b423a14782db4d0bbf81bb0b09d310ce1dd3f0d3ab973f3c,2024-11-21T02:00:49.623000 -CVE-2013-7358,0,1,74acab3b8163ba65f2cee5dea9eceba6d7cfca3778b2b36af072309301c07b9b,2024-11-21T02:00:49.760000 -CVE-2013-7359,0,1,c9f74e64ce665f3ae92c3671d6c64b69b65ba4063bbadfda989a362624cf6da1,2024-11-21T02:00:49.893000 -CVE-2013-7360,0,1,b6a1ed8aed310398377ef8766bf3c490d959e543b945a61f4cc5bbc08e7ed220,2024-11-21T02:00:50.030000 -CVE-2013-7361,0,1,680f8c3e934cd9ba935767616cf07b71c374842f111ebaf89050296efb6617c5,2024-11-21T02:00:50.200000 -CVE-2013-7362,0,1,b1bb22cd96f5953734b264aa6c0690463d486afdfaa84df1085685dac29f7bbb,2024-11-21T02:00:50.360000 -CVE-2013-7363,0,1,b73f54c6ed22c8aa101dbe418e5bc383af5a203c2aa6c215ae19c5b2353c9762,2024-11-21T02:00:50.547000 -CVE-2013-7364,0,1,9f98253ffd60feb6205cc2a62bf0c0a085038d9892c171cb6f2003520330b11e,2024-11-21T02:00:50.693000 -CVE-2013-7365,0,1,100125965b2965f52c64c68216c86b255d635bc81bfa193ac34f4ed20a217e56,2024-11-21T02:00:50.843000 -CVE-2013-7366,0,1,59fac6c140ea6f9531c9da27fb569f606598f3b587fb773f1faecff2f9ff0fcb,2024-11-21T02:00:50.990000 -CVE-2013-7367,0,1,0b1b5c32c19c10f5eb3f70a70c07d32afe4f44c58b29f350d907d62daa39974d,2024-11-21T02:00:51.153000 -CVE-2013-7368,0,1,23e858ff208f71e31e3aa8d62d13c0891374c77cdc2866b7ed3d2b6eef8e0523,2024-11-21T02:00:51.310000 -CVE-2013-7369,0,1,d04a536eec53795e4a7e130e43f9839df48a71398c2f8f5c1d5d941c5e2bf164,2024-11-21T02:00:51.467000 +CVE-2013-7352,0,0,38ec4b176994cace5c818c3919e448a20fb4e7848ecd9daf85d7a1c1ef0dccaa,2024-11-21T02:00:48.890000 +CVE-2013-7353,0,0,9a2cb21d7e3364c40a23599acbf66ada07e6d9ba3dd9dba1222106cb5f29d61d,2024-11-21T02:00:49.030000 +CVE-2013-7354,0,0,71fde93b0e134fa51bc90f3263555f9bb70fd9277d8fb39e149ea583c1e1bbfa,2024-11-21T02:00:49.183000 +CVE-2013-7355,0,0,e0a493f2b40551f71abd69104f281557aad208817ed110ad19e98cef10ae1cc6,2024-11-21T02:00:49.337000 +CVE-2013-7356,0,0,b8a60047bac6359c3385eddfe54a404e57d3371a6482c94025704ec2aa825a82,2024-11-21T02:00:49.477000 +CVE-2013-7357,0,0,a9af811f63de7e18b423a14782db4d0bbf81bb0b09d310ce1dd3f0d3ab973f3c,2024-11-21T02:00:49.623000 +CVE-2013-7358,0,0,74acab3b8163ba65f2cee5dea9eceba6d7cfca3778b2b36af072309301c07b9b,2024-11-21T02:00:49.760000 +CVE-2013-7359,0,0,c9f74e64ce665f3ae92c3671d6c64b69b65ba4063bbadfda989a362624cf6da1,2024-11-21T02:00:49.893000 +CVE-2013-7360,0,0,b6a1ed8aed310398377ef8766bf3c490d959e543b945a61f4cc5bbc08e7ed220,2024-11-21T02:00:50.030000 +CVE-2013-7361,0,0,680f8c3e934cd9ba935767616cf07b71c374842f111ebaf89050296efb6617c5,2024-11-21T02:00:50.200000 +CVE-2013-7362,0,0,b1bb22cd96f5953734b264aa6c0690463d486afdfaa84df1085685dac29f7bbb,2024-11-21T02:00:50.360000 +CVE-2013-7363,0,0,b73f54c6ed22c8aa101dbe418e5bc383af5a203c2aa6c215ae19c5b2353c9762,2024-11-21T02:00:50.547000 +CVE-2013-7364,0,0,9f98253ffd60feb6205cc2a62bf0c0a085038d9892c171cb6f2003520330b11e,2024-11-21T02:00:50.693000 +CVE-2013-7365,0,0,100125965b2965f52c64c68216c86b255d635bc81bfa193ac34f4ed20a217e56,2024-11-21T02:00:50.843000 +CVE-2013-7366,0,0,59fac6c140ea6f9531c9da27fb569f606598f3b587fb773f1faecff2f9ff0fcb,2024-11-21T02:00:50.990000 +CVE-2013-7367,0,0,0b1b5c32c19c10f5eb3f70a70c07d32afe4f44c58b29f350d907d62daa39974d,2024-11-21T02:00:51.153000 +CVE-2013-7368,0,0,23e858ff208f71e31e3aa8d62d13c0891374c77cdc2866b7ed3d2b6eef8e0523,2024-11-21T02:00:51.310000 +CVE-2013-7369,0,0,d04a536eec53795e4a7e130e43f9839df48a71398c2f8f5c1d5d941c5e2bf164,2024-11-21T02:00:51.467000 CVE-2013-7370,0,0,9d3e0f54baaf9daf2744c51bd47f9ffbfcde3b3125e36fd0958719fdfa41847a,2019-12-17T16:44:26.220000 CVE-2013-7371,0,0,3e1b59a7427a7099a47d44df636b061aafb6014e090aadda5d8d4427b5889121,2019-12-16T19:57:32.367000 -CVE-2013-7372,0,1,c775a8c401a792c5aab71a9bb4aa8ce9cff9a3cffac1a188911f0d9cf3c2c01f,2024-11-21T02:00:51.893000 -CVE-2013-7373,0,1,faea520504a526528cfcc31a50b3e9069554e8823f7c48d6b16ab5ab85e6e0ba,2024-11-21T02:00:52.050000 -CVE-2013-7374,0,1,cd4e0354ebbe6de8326ef73c9ec2c8f21fb5f7577003991bdeb6d9216249f6a5,2024-11-21T02:00:52.213000 -CVE-2013-7375,0,1,ace1b5fb42d500c97ed9f83fa1ecc93ec61433c29f90d6e30b1748148359d8d7,2024-11-21T02:00:52.340000 -CVE-2013-7376,0,1,359f7a8d26f95a8d9a088a9638513d729de811ec38858ece80cd884602c25028,2024-11-21T02:00:52.493000 +CVE-2013-7372,0,0,c775a8c401a792c5aab71a9bb4aa8ce9cff9a3cffac1a188911f0d9cf3c2c01f,2024-11-21T02:00:51.893000 +CVE-2013-7373,0,0,faea520504a526528cfcc31a50b3e9069554e8823f7c48d6b16ab5ab85e6e0ba,2024-11-21T02:00:52.050000 +CVE-2013-7374,0,0,cd4e0354ebbe6de8326ef73c9ec2c8f21fb5f7577003991bdeb6d9216249f6a5,2024-11-21T02:00:52.213000 +CVE-2013-7375,0,0,ace1b5fb42d500c97ed9f83fa1ecc93ec61433c29f90d6e30b1748148359d8d7,2024-11-21T02:00:52.340000 +CVE-2013-7376,0,0,359f7a8d26f95a8d9a088a9638513d729de811ec38858ece80cd884602c25028,2024-11-21T02:00:52.493000 CVE-2013-7377,0,0,7050e8ad3c2f9658024b1c3c9534c50d84a23e4308da2c5bbceb541a5e035aff,2017-11-21T18:21:41.910000 CVE-2013-7378,0,0,10ac2ced434ca2db992082398e2270292fff1d7e3701fb9f6e12556079e7be66,2020-02-14T16:42:25.070000 -CVE-2013-7379,0,1,6f5e40d3f2d088b2eaf9cfcca32ef4d9db9af8d6308e8fa918b68f986d6ab4af,2024-11-21T02:00:52.950000 +CVE-2013-7379,0,0,6f5e40d3f2d088b2eaf9cfcca32ef4d9db9af8d6308e8fa918b68f986d6ab4af,2024-11-21T02:00:52.950000 CVE-2013-7380,0,0,eda392742be62ae4f43e37bff714985fd9640f6a15aa390dd131f2a60e5b71e8,2020-01-14T16:18:29.567000 CVE-2013-7381,0,0,4fc554e0118d66cd84472881d588d8eaf3146c7b36ad1737dd5706b45cd63ff5,2020-02-14T14:47:10.937000 -CVE-2013-7382,0,1,9af1f5e4c76de7b6a6dff4de78b39819b1eed54465b1681d06ae47f2e450c9f2,2024-11-21T02:00:53.410000 -CVE-2013-7383,0,1,f2675e6a8c212be1f9cdb5245fad6df1d20d8882c387f7ce295b9008103c5ba6,2024-11-21T02:00:53.547000 -CVE-2013-7384,0,1,b0afb6dab564889f6036ad959f8e845a11e94aa6848fc25a6862cba3bafecf2e,2024-11-21T02:00:53.693000 -CVE-2013-7385,0,1,5462b893f934d36351f4d7d4a36608a2da8ab155911df452234b30e40abcdcf0,2024-11-21T02:00:53.833000 +CVE-2013-7382,0,0,9af1f5e4c76de7b6a6dff4de78b39819b1eed54465b1681d06ae47f2e450c9f2,2024-11-21T02:00:53.410000 +CVE-2013-7383,0,0,f2675e6a8c212be1f9cdb5245fad6df1d20d8882c387f7ce295b9008103c5ba6,2024-11-21T02:00:53.547000 +CVE-2013-7384,0,0,b0afb6dab564889f6036ad959f8e845a11e94aa6848fc25a6862cba3bafecf2e,2024-11-21T02:00:53.693000 +CVE-2013-7385,0,0,5462b893f934d36351f4d7d4a36608a2da8ab155911df452234b30e40abcdcf0,2024-11-21T02:00:53.833000 CVE-2013-7386,0,0,c4c51f94f564ccec4a01663ec995b3231961c2ee238e4edcd907a5b0e872dcb6,2023-11-07T02:18:02.727000 CVE-2013-7387,0,0,3f1f4e516d42718ed549e9ce3775be35518fc3ac6a4413b226396adcd9bc6d16,2014-06-03T13:10:34.187000 CVE-2013-7388,0,0,a4c73a3494c4575a891a8b3cf36d1bab0dca67634bba889b1ff80092b7666f06,2017-08-29T01:34:07.560000 @@ -64484,145 +64484,145 @@ CVE-2013-7488,0,0,2d8ea60383d916068464be8b856604e5ea5705089b22f6516c9c8e87172648 CVE-2013-7489,0,0,529b314705cc11cd81db74d87f9023f13a46b02370fe020699314833f0638417,2020-07-06T17:50:11.117000 CVE-2013-7490,0,0,b3319a78ffe2dc010a8f860cb4068056a170a46403667753acc920b560aa51a7,2023-01-24T02:06:03.753000 CVE-2013-7491,0,0,8a3ec3a4557211220474d636cc953457a86b8dabb907bc66f3a3b2034d757bbc,2020-09-17T17:24:42.833000 -CVE-2014-0001,0,1,9aacc52621e671c4985e2e5960ea98bbbc327325815b373d1cb037e98663eab4,2024-11-21T02:01:08.840000 -CVE-2014-0002,0,1,27b4fd61abbce97cc6b71b86ff17733372d7cd8baf8a8df24b064beb42d9d928,2024-11-21T02:01:08.990000 -CVE-2014-0003,0,1,f8639bf998469f06000487fcdf67d62e2f1d5e2217a180dee415d619ea4a8dfc,2024-11-21T02:01:09.127000 -CVE-2014-0004,0,1,59498bf7ad057cd536dda1394f9abc97a0e75aeae683141374cf7b2cec8a2a8d,2024-11-21T02:01:09.273000 +CVE-2014-0001,0,0,9aacc52621e671c4985e2e5960ea98bbbc327325815b373d1cb037e98663eab4,2024-11-21T02:01:08.840000 +CVE-2014-0002,0,0,27b4fd61abbce97cc6b71b86ff17733372d7cd8baf8a8df24b064beb42d9d928,2024-11-21T02:01:08.990000 +CVE-2014-0003,0,0,f8639bf998469f06000487fcdf67d62e2f1d5e2217a180dee415d619ea4a8dfc,2024-11-21T02:01:09.127000 +CVE-2014-0004,0,0,59498bf7ad057cd536dda1394f9abc97a0e75aeae683141374cf7b2cec8a2a8d,2024-11-21T02:01:09.273000 CVE-2014-0005,0,0,89b2eb8160377581952b69903e2ec87418df72dc3e659715ff92f7873b23e610,2015-03-28T01:59:08.687000 -CVE-2014-0006,0,1,d39caef3a3009b1c145285a9a656e2b4321c2ef0b29db87920866b5b0d3f7a3a,2024-11-21T02:01:09.533000 +CVE-2014-0006,0,0,d39caef3a3009b1c145285a9a656e2b4321c2ef0b29db87920866b5b0d3f7a3a,2024-11-21T02:01:09.533000 CVE-2014-0007,0,0,336ceb98978db451924339b54d106a01e3560775c3b4ff150e1806a173e232f8,2023-02-13T00:29:47.573000 -CVE-2014-0008,0,1,861c9acf8fe01dad1a2961eb830756bacd97e32602e2f3244b5253bfef035403,2024-11-21T02:01:09.780000 -CVE-2014-0009,0,1,05fdf4ea9083bd173991d7ff7c388b1df2dcc1f6693382a861acff066726d162,2024-11-21T02:01:09.917000 -CVE-2014-0010,0,1,ec70588cb66b90f0897e0ffde4fb7f55090e064f942bd718a7560b2daf41c186,2024-11-21T02:01:10.063000 +CVE-2014-0008,0,0,861c9acf8fe01dad1a2961eb830756bacd97e32602e2f3244b5253bfef035403,2024-11-21T02:01:09.780000 +CVE-2014-0009,0,0,05fdf4ea9083bd173991d7ff7c388b1df2dcc1f6693382a861acff066726d162,2024-11-21T02:01:09.917000 +CVE-2014-0010,0,0,ec70588cb66b90f0897e0ffde4fb7f55090e064f942bd718a7560b2daf41c186,2024-11-21T02:01:10.063000 CVE-2014-0011,0,0,0115af0168b9519570edf970e9f00bd7c635edfb8063a918dd761de58fb78834,2020-01-14T17:29:27.743000 -CVE-2014-0012,0,1,ffef95fd312da302d4985d63014e18820bc9d77055f4725f2bbe2e27120653f9,2024-11-21T02:01:10.340000 +CVE-2014-0012,0,0,ffef95fd312da302d4985d63014e18820bc9d77055f4725f2bbe2e27120653f9,2024-11-21T02:01:10.340000 CVE-2014-0013,0,0,007603a53625bbd3ab0cb720c587b9594e446876da8ff53a88c01f12454ef08c,2023-11-07T02:18:04.793000 CVE-2014-0014,0,0,ee72f9f2e49a58a07ea65c7392d6ebe8ee88b1bf7895ed8b59f9cc1b79f25060,2023-11-07T02:18:04.877000 -CVE-2014-0015,0,1,9720d60b5837259b1e5fbaff9e2dd739bdb0c4bcaa14786e246972acf7aab598,2024-11-21T02:01:10.723000 -CVE-2014-0016,0,1,8b2c30b960d0974f027eaa15ca3a2e7f493148a0c23abdac4d3fb8cf3742c05a,2024-11-21T02:01:10.920000 -CVE-2014-0017,0,1,3a018fe11f2261f302b1e4fc92d078a05db575258fec01c6b4ac9981b899a5ad,2024-11-21T02:01:11.087000 -CVE-2014-0018,0,1,7f6b0d6f6aa4cd0279f52849438e5714c8a145e6ee4d1bbb464125f0e66315da,2024-11-21T02:01:11.217000 -CVE-2014-0019,0,1,8536fa51d0a2a2aa5676da2c5b99f4428bfb965cbaef992fee87ba0fd380598a,2024-11-21T02:01:11.337000 -CVE-2014-0020,0,1,10d90b5e722cb9c9c68ffc33d31bbbcd43216e895e1cc1e67efe791abc6356f6,2024-11-21T02:01:11.470000 +CVE-2014-0015,0,0,9720d60b5837259b1e5fbaff9e2dd739bdb0c4bcaa14786e246972acf7aab598,2024-11-21T02:01:10.723000 +CVE-2014-0016,0,0,8b2c30b960d0974f027eaa15ca3a2e7f493148a0c23abdac4d3fb8cf3742c05a,2024-11-21T02:01:10.920000 +CVE-2014-0017,0,0,3a018fe11f2261f302b1e4fc92d078a05db575258fec01c6b4ac9981b899a5ad,2024-11-21T02:01:11.087000 +CVE-2014-0018,0,0,7f6b0d6f6aa4cd0279f52849438e5714c8a145e6ee4d1bbb464125f0e66315da,2024-11-21T02:01:11.217000 +CVE-2014-0019,0,0,8536fa51d0a2a2aa5676da2c5b99f4428bfb965cbaef992fee87ba0fd380598a,2024-11-21T02:01:11.337000 +CVE-2014-0020,0,0,10d90b5e722cb9c9c68ffc33d31bbbcd43216e895e1cc1e67efe791abc6356f6,2024-11-21T02:01:11.470000 CVE-2014-0021,0,0,4e11e154886f172cb8d0328c14ae09f0dbf5f65b2bf0f936c87e002f4d1cf239,2020-08-18T15:05:57.580000 -CVE-2014-0022,0,1,ad359d799e01c8f0b1b3004bb56862d19dced03be0af291f1875a1a8091eb445,2024-11-21T02:01:11.787000 +CVE-2014-0022,0,0,ad359d799e01c8f0b1b3004bb56862d19dced03be0af291f1875a1a8091eb445,2024-11-21T02:01:11.787000 CVE-2014-0023,0,0,dd5d08a5b350da651c6b45f6e7c6be667383eab92c7f46b6fb1bb138ba2320b0,2019-11-20T15:17:56.797000 CVE-2014-0024,0,0,202a27555b7f75142990087dd8b7657635597862418d9a1e8ef4906690030e87,2023-11-07T02:18:05.030000 CVE-2014-0025,0,0,2495f24030300d21ca500708b15a2a0f75db4d00aed5908244991dbffe7aa0b6,2023-11-07T02:18:05.243000 CVE-2014-0026,0,0,293783be2727a27973bf4ed424767242b13b1bfed0cc20a9e2ad5b968df20e33,2019-12-13T21:11:25.123000 -CVE-2014-0027,0,1,38d94376f2d20b685345a3020d067e7f84749a49d89661e7bd6a697333526fb9,2024-11-21T02:01:12.177000 -CVE-2014-0028,0,1,9c2631b74232541cac7a5760606bc99ba45b2c0d0ab23aefdc9ceec0935161ff,2024-11-21T02:01:12.287000 +CVE-2014-0027,0,0,38d94376f2d20b685345a3020d067e7f84749a49d89661e7bd6a697333526fb9,2024-11-21T02:01:12.177000 +CVE-2014-0028,0,0,9c2631b74232541cac7a5760606bc99ba45b2c0d0ab23aefdc9ceec0935161ff,2024-11-21T02:01:12.287000 CVE-2014-0029,0,0,dcf3e8ae36cec23b72a090085c4887009fc1141fa93baa87ac3e76ef1abeca76,2017-11-07T18:22:37.433000 CVE-2014-0030,0,0,1b294ac382c0934a667680d71b1e7a36390dcb599e8485cf77f7891dc873b7b7,2024-02-14T01:17:43.863000 -CVE-2014-0031,0,1,aa32ebc6e2e18e97a4a839498dc16a7f3af3cafce388337f800da464e1bf9339,2024-11-21T02:01:12.643000 -CVE-2014-0032,0,1,d2d3572c745dc9d34b8fbfe5825b708acad1164c7f76cb4131d2d8bd1af84bc8,2024-11-21T02:01:12.767000 -CVE-2014-0033,0,1,463b60f884ac4e0006cdca6a37a6fcfbe572e7b9a9b16c508c2789739183d615,2024-11-21T02:01:12.920000 +CVE-2014-0031,0,0,aa32ebc6e2e18e97a4a839498dc16a7f3af3cafce388337f800da464e1bf9339,2024-11-21T02:01:12.643000 +CVE-2014-0032,0,0,d2d3572c745dc9d34b8fbfe5825b708acad1164c7f76cb4131d2d8bd1af84bc8,2024-11-21T02:01:12.767000 +CVE-2014-0033,0,0,463b60f884ac4e0006cdca6a37a6fcfbe572e7b9a9b16c508c2789739183d615,2024-11-21T02:01:12.920000 CVE-2014-0034,0,0,fa0f5c71eb98f396b9be8c1a26a455d32874bf58358ec18b7803279b849db086,2023-11-07T02:18:05.850000 CVE-2014-0035,0,0,ef64df802a0c4f14aa159be11a36dbb50871c5865acb9ba5f76ee77a2a5707bb,2023-11-07T02:18:05.933000 -CVE-2014-0036,0,1,9d0380eaa94699f677587685918edaab23edc3809e0dc8cebc1e153f5213e4a4,2024-11-21T02:01:13.400000 -CVE-2014-0037,0,1,d248f95955efa20bc278f5f53940f4efb584e863ecf5480f960bab1a620b520a,2024-11-21T02:01:13.520000 -CVE-2014-0038,0,1,46bdfac853240ad4fd7171234ce87e9b12a11737bd1e0e933855f5559083a12a,2024-11-21T02:01:13.647000 -CVE-2014-0039,0,1,c12399ebe0f1cc3d9b4f10ba8520492b5509cdd694aff1c5ecea542caced0699,2024-11-21T02:01:13.810000 +CVE-2014-0036,0,0,9d0380eaa94699f677587685918edaab23edc3809e0dc8cebc1e153f5213e4a4,2024-11-21T02:01:13.400000 +CVE-2014-0037,0,0,d248f95955efa20bc278f5f53940f4efb584e863ecf5480f960bab1a620b520a,2024-11-21T02:01:13.520000 +CVE-2014-0038,0,0,46bdfac853240ad4fd7171234ce87e9b12a11737bd1e0e933855f5559083a12a,2024-11-21T02:01:13.647000 +CVE-2014-0039,0,0,c12399ebe0f1cc3d9b4f10ba8520492b5509cdd694aff1c5ecea542caced0699,2024-11-21T02:01:13.810000 CVE-2014-0040,0,0,0806e07b01606fe9805f6f23ccbf90e45e2cd43849d1ecc3d66de88ee26c71a6,2023-02-13T00:30:07.530000 CVE-2014-0041,0,0,1bd9879ddb1a72798f5bc8a711fe3e6b1d2fac54d7a5bab1aed22adc2fbf2ed4,2023-02-13T00:30:08.337000 CVE-2014-0042,0,0,11788aaf8449be071c91641e687f3c9fca9b0d4b89ad28d2042745a96a41fcc3,2023-02-13T00:30:11.257000 CVE-2014-0043,0,0,8fe2592114ba526e3e61615d3645e5e985c26057a567d5d3b6dcfc199d9bb3c0,2023-11-07T02:18:06.093000 -CVE-2014-0044,0,1,838f0d17850ebe27d498cad1aeb2bd78756d1cd58ceec470d6707e18a2f95b2c,2024-11-21T02:01:14.400000 -CVE-2014-0045,0,1,97f714a8be067892f58b73976512e9ea58f2f33a38d1f6bd5bf30a3a2bd7390e,2024-11-21T02:01:14.510000 -CVE-2014-0046,0,1,ec24aae56abeff84d7a3383833becbc6bdde088b8e4bdc1af2ca22c22e79caeb,2024-11-21T02:01:14.620000 +CVE-2014-0044,0,0,838f0d17850ebe27d498cad1aeb2bd78756d1cd58ceec470d6707e18a2f95b2c,2024-11-21T02:01:14.400000 +CVE-2014-0045,0,0,97f714a8be067892f58b73976512e9ea58f2f33a38d1f6bd5bf30a3a2bd7390e,2024-11-21T02:01:14.510000 +CVE-2014-0046,0,0,ec24aae56abeff84d7a3383833becbc6bdde088b8e4bdc1af2ca22c22e79caeb,2024-11-21T02:01:14.620000 CVE-2014-0047,0,0,faeff61922a732993e0d5f52fccaa4b283a2e0a20d5ebe61fc5cb1bd5d166b4d,2017-10-13T19:45:32.257000 CVE-2014-0048,0,0,bbae26f447a99f00554e815d3c9a918a2343a73ae394c25585c8e7398f9c8494,2023-03-01T02:59:17.477000 -CVE-2014-0049,0,1,fac7dfb90f2f4c2b3d1c57b2b87ba9cb2abe8c2bf11d367bb42355c335b614cf,2024-11-21T02:01:14.990000 -CVE-2014-0050,0,1,d265d457c0b995712068a394b24a8d80365010acdbdd6f01b4eb589f401289bb,2024-11-21T02:01:15.117000 +CVE-2014-0049,0,0,fac7dfb90f2f4c2b3d1c57b2b87ba9cb2abe8c2bf11d367bb42355c335b614cf,2024-11-21T02:01:14.990000 +CVE-2014-0050,0,0,d265d457c0b995712068a394b24a8d80365010acdbdd6f01b4eb589f401289bb,2024-11-21T02:01:15.117000 CVE-2014-0051,0,0,86125bb8296761dd4c077978f730ee1af970b2f6fc479c70aa98dfa6779845a4,2023-11-07T02:18:06.467000 CVE-2014-0052,0,0,fd3f6228b962bdd5d775ad0e72b54362b1f0965e1c0f088504e3571ac9502b9c,2023-11-07T02:18:06.727000 -CVE-2014-0053,0,1,00e235e990c8f8b42daf99ba8fd31fad3289d33bcc44e8ee2828b1c584e11646,2024-11-21T02:01:15.467000 -CVE-2014-0054,0,1,5aec995f6d12c134034de811f86d94cfc410ccc32bd3fb5e220758864bf2979d,2024-11-21T02:01:15.597000 -CVE-2014-0055,0,1,22feb12772d4f86708659b4a3a8b60b319597192ee922611c05a855855b363b7,2024-11-21T02:01:15.733000 -CVE-2014-0056,0,1,324aa2a36b05b5a694643fd260cc8a7c4fb4fe2f8a97fd5aef1fdfc1416b4385,2024-11-21T02:01:15.850000 -CVE-2014-0057,0,1,e2c35415be799a3aadc5a5f8b8cc5c54ea825c1f74a79dbd41d7ee3e6d2f0799,2024-11-21T02:01:15.960000 -CVE-2014-0058,0,1,b7f68bcb5e1b2e7f45ab3550e26f10927d2c4ea87b545ade333a602f2bddd609,2024-11-21T02:01:16.073000 +CVE-2014-0053,0,0,00e235e990c8f8b42daf99ba8fd31fad3289d33bcc44e8ee2828b1c584e11646,2024-11-21T02:01:15.467000 +CVE-2014-0054,0,0,5aec995f6d12c134034de811f86d94cfc410ccc32bd3fb5e220758864bf2979d,2024-11-21T02:01:15.597000 +CVE-2014-0055,0,0,22feb12772d4f86708659b4a3a8b60b319597192ee922611c05a855855b363b7,2024-11-21T02:01:15.733000 +CVE-2014-0056,0,0,324aa2a36b05b5a694643fd260cc8a7c4fb4fe2f8a97fd5aef1fdfc1416b4385,2024-11-21T02:01:15.850000 +CVE-2014-0057,0,0,e2c35415be799a3aadc5a5f8b8cc5c54ea825c1f74a79dbd41d7ee3e6d2f0799,2024-11-21T02:01:15.960000 +CVE-2014-0058,0,0,b7f68bcb5e1b2e7f45ab3550e26f10927d2c4ea87b545ade333a602f2bddd609,2024-11-21T02:01:16.073000 CVE-2014-0059,0,0,2a9d67c510361743e409097b9849511635ef80c5a9358178246eedb9eee2d8dd,2016-10-01T01:59:00.317000 -CVE-2014-0060,0,1,ba65919b4d6b4b1558ad1068ab186a5b40df08c2852c787169203097abd9aba2,2024-11-21T02:01:16.350000 -CVE-2014-0061,0,1,5d193f416daf0e42b43df85c0da2a75257b5359fa876a323a35f4ab105c58ff8,2024-11-21T02:01:16.510000 -CVE-2014-0062,0,1,6b59f13bc2b48bac6eb7d2e9bd7b67e9152ffbfbd7de96fd0187c22adabadeda,2024-11-21T02:01:16.660000 -CVE-2014-0063,0,1,4203b2f6eb626adca3d416bde64502f7194e824399a13d1ce4efc85ea2497960,2024-11-21T02:01:16.823000 -CVE-2014-0064,0,1,eec4cbfd9cd96648836017d5c3f59606c95d972534a97e2e4c85648bf1b00101,2024-11-21T02:01:16.980000 -CVE-2014-0065,0,1,a95a01d6410dae6907b2b20c57479b1ce2c521b0d5a83e3f363bd056493f526a,2024-11-21T02:01:17.133000 -CVE-2014-0066,0,1,f140a64d893568800958cb17dd61cb72d4c857ecaebb6772eb631efba32ee03d,2024-11-21T02:01:17.290000 -CVE-2014-0067,0,1,3d99de67082490cdac64778cbda37483640bc75e7b92c5d16544c7af2b3d307a,2024-11-21T02:01:17.450000 +CVE-2014-0060,0,0,ba65919b4d6b4b1558ad1068ab186a5b40df08c2852c787169203097abd9aba2,2024-11-21T02:01:16.350000 +CVE-2014-0061,0,0,5d193f416daf0e42b43df85c0da2a75257b5359fa876a323a35f4ab105c58ff8,2024-11-21T02:01:16.510000 +CVE-2014-0062,0,0,6b59f13bc2b48bac6eb7d2e9bd7b67e9152ffbfbd7de96fd0187c22adabadeda,2024-11-21T02:01:16.660000 +CVE-2014-0063,0,0,4203b2f6eb626adca3d416bde64502f7194e824399a13d1ce4efc85ea2497960,2024-11-21T02:01:16.823000 +CVE-2014-0064,0,0,eec4cbfd9cd96648836017d5c3f59606c95d972534a97e2e4c85648bf1b00101,2024-11-21T02:01:16.980000 +CVE-2014-0065,0,0,a95a01d6410dae6907b2b20c57479b1ce2c521b0d5a83e3f363bd056493f526a,2024-11-21T02:01:17.133000 +CVE-2014-0066,0,0,f140a64d893568800958cb17dd61cb72d4c857ecaebb6772eb631efba32ee03d,2024-11-21T02:01:17.290000 +CVE-2014-0067,0,0,3d99de67082490cdac64778cbda37483640bc75e7b92c5d16544c7af2b3d307a,2024-11-21T02:01:17.450000 CVE-2014-0068,0,0,d9c4b4d9246318e403153a27335c1e176e7939653d9a81b30b6f2eac63136cc6,2022-07-12T16:37:28.387000 -CVE-2014-0069,0,1,3e80e596a85bfaedd70470944070a305cb7e17b37fe6c06c2aa576a77a295524,2024-11-21T02:01:17.717000 +CVE-2014-0069,0,0,3e80e596a85bfaedd70470944070a305cb7e17b37fe6c06c2aa576a77a295524,2024-11-21T02:01:17.717000 CVE-2014-0070,0,0,ffd14c04a3bdab4aaed52e731be2f19035599287e962328a70b7de3d90c9764e,2023-11-07T02:18:07.213000 -CVE-2014-0071,0,1,ac280179726a35d6ae429bebbddd8c68ddb9f13cc9ff955ac7f0c948cabca3f6,2024-11-21T02:01:17.867000 +CVE-2014-0071,0,0,ac280179726a35d6ae429bebbddd8c68ddb9f13cc9ff955ac7f0c948cabca3f6,2024-11-21T02:01:17.867000 CVE-2014-0072,0,0,f3e0f1668b0ec77b168714db4cd6b1fe2cd8f0f4e9d0b48e4031bcf6f6dd4d64,2023-11-07T02:18:07.463000 CVE-2014-0073,0,0,67a41afb4b7a300dea6709628f842843e5d74841282f6753b4c9260d2aaaa70b,2023-11-07T02:18:07.540000 CVE-2014-0074,0,0,750525907afefb65b94bbc727e937ad7159fab5cffcd40be9c0f10cb1702d3ab,2014-10-07T14:16:31.060000 CVE-2014-0075,0,0,cf013fd185c74ea5cc0f716846a42b4b04b24eb1bf65add4fcbf91bdd87effdb,2023-11-07T02:18:07.613000 -CVE-2014-0076,0,1,a1c43f1ac6aea557dd56909d37f86242053ee618e67e4a7b7a512455314bb48c,2024-11-21T02:01:18.587000 -CVE-2014-0077,0,1,e90497128b3a5b745d75ad2f11b2fa3ac63beb20f2bc79588dfcfe7b3b22406d,2024-11-21T02:01:18.830000 -CVE-2014-0078,0,1,11c02ad28832c83852e1e5a510b2971d18e382ee9220e4132e6698089fd8b708,2024-11-21T02:01:18.953000 -CVE-2014-0079,0,1,4bc518e2042a6e8213de64871ca093e012ce40df821817ae0cb36e634c10dbd8,2024-11-21T02:01:19.060000 -CVE-2014-0080,0,1,195df3e88b0f19e13e420df2a9cb4ab350d7af694e29102c7916b38891e232f6,2024-11-21T02:01:19.163000 -CVE-2014-0081,0,1,606e0fdca499eab487054df9eadf094871318068b6e488d1c32f3f481e6f3d6f,2024-11-21T02:01:19.270000 -CVE-2014-0082,0,1,79a369d67de8fa2ff1f4e0cb5a6e740ac1f3461ad4862307b3a2ed4b3b05e44c,2024-11-21T02:01:19.423000 +CVE-2014-0076,0,0,a1c43f1ac6aea557dd56909d37f86242053ee618e67e4a7b7a512455314bb48c,2024-11-21T02:01:18.587000 +CVE-2014-0077,0,0,e90497128b3a5b745d75ad2f11b2fa3ac63beb20f2bc79588dfcfe7b3b22406d,2024-11-21T02:01:18.830000 +CVE-2014-0078,0,0,11c02ad28832c83852e1e5a510b2971d18e382ee9220e4132e6698089fd8b708,2024-11-21T02:01:18.953000 +CVE-2014-0079,0,0,4bc518e2042a6e8213de64871ca093e012ce40df821817ae0cb36e634c10dbd8,2024-11-21T02:01:19.060000 +CVE-2014-0080,0,0,195df3e88b0f19e13e420df2a9cb4ab350d7af694e29102c7916b38891e232f6,2024-11-21T02:01:19.163000 +CVE-2014-0081,0,0,606e0fdca499eab487054df9eadf094871318068b6e488d1c32f3f481e6f3d6f,2024-11-21T02:01:19.270000 +CVE-2014-0082,0,0,79a369d67de8fa2ff1f4e0cb5a6e740ac1f3461ad4862307b3a2ed4b3b05e44c,2024-11-21T02:01:19.423000 CVE-2014-0083,0,0,e564c8b056ebce9ed6bcef555d658aca9774af4f76ae8021af89db208bc204f3,2020-08-18T15:05:58.063000 CVE-2014-0084,0,0,2ecadbca04d45a049eae1cd16c81cf2f05ffe93c2afc6e437b425fcc28261e1b,2023-02-13T00:31:48.990000 -CVE-2014-0085,0,1,129cb8c35bb2b7f0b41cfd970965e02a69f21f36b210333a69e450a1bd741f24,2024-11-21T02:01:19.807000 -CVE-2014-0086,0,1,2ee583aec9a60d72b3e3882f48f315314a0b63b0986d18d9e2d07531ea5d647c,2024-11-21T02:01:19.917000 +CVE-2014-0085,0,0,129cb8c35bb2b7f0b41cfd970965e02a69f21f36b210333a69e450a1bd741f24,2024-11-21T02:01:19.807000 +CVE-2014-0086,0,0,2ee583aec9a60d72b3e3882f48f315314a0b63b0986d18d9e2d07531ea5d647c,2024-11-21T02:01:19.917000 CVE-2014-0087,0,0,f7e092c3223df476f1ee2aca053d061edca2cc58a533659c0ce6a255b42f147e,2023-02-13T00:31:50.180000 -CVE-2014-0088,0,1,2b4d5ae4c0b99e233cebc68b0497f4dcbfd580cd6489f23a172616ae64526817,2024-11-21T02:01:20.147000 -CVE-2014-0089,0,1,f8599a1fbb1031cc96178c75d2a8a77c3ce42642ee4f17e63cf27b45ef0df251,2024-11-21T02:01:20.260000 -CVE-2014-0090,0,1,b367c95ede157ac489da5510451b21e37c87323a975664c46772b866d91b219a,2024-11-21T02:01:20.363000 +CVE-2014-0088,0,0,2b4d5ae4c0b99e233cebc68b0497f4dcbfd580cd6489f23a172616ae64526817,2024-11-21T02:01:20.147000 +CVE-2014-0089,0,0,f8599a1fbb1031cc96178c75d2a8a77c3ce42642ee4f17e63cf27b45ef0df251,2024-11-21T02:01:20.260000 +CVE-2014-0090,0,0,b367c95ede157ac489da5510451b21e37c87323a975664c46772b866d91b219a,2024-11-21T02:01:20.363000 CVE-2014-0091,0,0,27f3718808af0275f131adac4537ac5c0accd7e6a6500f0635c288551d540cb7,2023-02-13T00:32:09.940000 -CVE-2014-0092,0,1,b210cfed6c07d4f56155e3431284db349ed7cdbaf5689d6866af35aaa224a12c,2024-11-21T02:01:20.573000 -CVE-2014-0093,0,1,d62a8402187be67472f6df8dc9b8e7b9a8d51419dc07853ff31d0a5586e90322,2024-11-21T02:01:20.717000 -CVE-2014-0094,0,1,eaae83aa876c5cbc54271d6872cc5285d6ee9121c2f56bb161b5fef306b85749,2024-11-21T02:01:20.827000 +CVE-2014-0092,0,0,b210cfed6c07d4f56155e3431284db349ed7cdbaf5689d6866af35aaa224a12c,2024-11-21T02:01:20.573000 +CVE-2014-0093,0,0,d62a8402187be67472f6df8dc9b8e7b9a8d51419dc07853ff31d0a5586e90322,2024-11-21T02:01:20.717000 +CVE-2014-0094,0,0,eaae83aa876c5cbc54271d6872cc5285d6ee9121c2f56bb161b5fef306b85749,2024-11-21T02:01:20.827000 CVE-2014-0095,0,0,19226d6be9992bdadd359ed024efdc941eba97bad63a1be67a61298c319c6b5c,2017-11-15T02:29:02.033000 CVE-2014-0096,0,0,1ac3ac876dd984636e64aa57599106bf1cf075acc44641353e40d806c3cb1357,2023-11-07T02:18:07.997000 CVE-2014-0097,0,0,c39aa9ff2a4932a2cb16a3019df9a6193c5cd8023956b19acd35579c76a6a8d8,2022-04-20T00:15:14.473000 -CVE-2014-0098,0,1,4a73e8723293ffb1be227ccd1ecc8e7b3ad15d9033c4a4eff5415fa200dc32a4,2024-11-21T02:01:21.547000 +CVE-2014-0098,0,0,4a73e8723293ffb1be227ccd1ecc8e7b3ad15d9033c4a4eff5415fa200dc32a4,2024-11-21T02:01:21.547000 CVE-2014-0099,0,0,7a35a8605edf9f581724e96bcabc277f9225400997567903caf85dce3a2e3bcf,2023-11-07T02:18:08.563000 -CVE-2014-0100,0,1,4d391e90143abbd89c8127eacc0dba6107a02ec8588095865e16b3d0646c75bc,2024-11-21T02:01:22.060000 -CVE-2014-0101,0,1,a93967b94699ad72df17beef277d8f96d97df89e48e72caf1bfd90f2148bb181,2024-11-21T02:01:22.173000 -CVE-2014-0102,0,1,5106bf975a65c4cf109f8211f20b41e43ac6ba19693e8c78c45b36db19eed87a,2024-11-21T02:01:22.323000 +CVE-2014-0100,0,0,4d391e90143abbd89c8127eacc0dba6107a02ec8588095865e16b3d0646c75bc,2024-11-21T02:01:22.060000 +CVE-2014-0101,0,0,a93967b94699ad72df17beef277d8f96d97df89e48e72caf1bfd90f2148bb181,2024-11-21T02:01:22.173000 +CVE-2014-0102,0,0,5106bf975a65c4cf109f8211f20b41e43ac6ba19693e8c78c45b36db19eed87a,2024-11-21T02:01:22.323000 CVE-2014-0103,0,0,e3027d48da98f426945f1e4b080cda08ee59f66318a3b805f928bd5b7cb579ee,2015-11-04T17:35:22.093000 CVE-2014-0104,0,0,fe37b29598ed7fd22be4dc31d7bd25cffdd675c7441d700b5864b0dfbc668a8e,2020-01-10T15:20:28.393000 -CVE-2014-0105,0,1,6ffaf11918ba0e48cad3d6e08f256bf31664ce86b0906fd041748b3eeb28b529,2024-11-21T02:01:22.683000 -CVE-2014-0106,0,1,e656e15a4ae527744c31da2f5843c7a7196277a7ce29327fd796808b75624529,2024-11-21T02:01:22.800000 -CVE-2014-0107,0,1,8c12d142093144dd866515f1f73128de9286d3929cab4985dc479245106dcb10,2024-11-21T02:01:22.950000 +CVE-2014-0105,0,0,6ffaf11918ba0e48cad3d6e08f256bf31664ce86b0906fd041748b3eeb28b529,2024-11-21T02:01:22.683000 +CVE-2014-0106,0,0,e656e15a4ae527744c31da2f5843c7a7196277a7ce29327fd796808b75624529,2024-11-21T02:01:22.800000 +CVE-2014-0107,0,0,8c12d142093144dd866515f1f73128de9286d3929cab4985dc479245106dcb10,2024-11-21T02:01:22.950000 CVE-2014-0108,0,0,5eb646bb6c005efe2bf17880ca354c867cb9dc3c6ef479380ff1f8395b237f5f,2023-11-07T02:18:08.933000 -CVE-2014-0109,0,1,7b6728427ee288322f22a694312a51d26034298f113673b4ac3cb5ba87a92d43,2024-11-21T02:01:23.297000 -CVE-2014-0110,0,1,0dc9f1d3477ecf7657c5b45c630f563c89621768ca61041cdfa365ca3995d50d,2024-11-21T02:01:23.437000 -CVE-2014-0111,0,1,7e099d614906ab1cf1237283ac1b3cfc4612a0f38dde42cd007794215096fe6f,2024-11-21T02:01:23.577000 -CVE-2014-0112,0,1,418e2e6277456fa9b87b921519343d149e4e09a6cef81530492e791d9da06064,2024-11-21T02:01:23.690000 -CVE-2014-0113,0,1,66995410318f1ca3f2d6ca0bb368f859dc4d71679972068729e45b9b03d84052,2024-11-21T02:01:23.837000 -CVE-2014-0114,0,1,d7afb11ee86a1ce556fc26fcf9433d601909302725c32d9abc14d149f3d8cdc4,2024-11-21T02:01:23.960000 +CVE-2014-0109,0,0,7b6728427ee288322f22a694312a51d26034298f113673b4ac3cb5ba87a92d43,2024-11-21T02:01:23.297000 +CVE-2014-0110,0,0,0dc9f1d3477ecf7657c5b45c630f563c89621768ca61041cdfa365ca3995d50d,2024-11-21T02:01:23.437000 +CVE-2014-0111,0,0,7e099d614906ab1cf1237283ac1b3cfc4612a0f38dde42cd007794215096fe6f,2024-11-21T02:01:23.577000 +CVE-2014-0112,0,0,418e2e6277456fa9b87b921519343d149e4e09a6cef81530492e791d9da06064,2024-11-21T02:01:23.690000 +CVE-2014-0113,0,0,66995410318f1ca3f2d6ca0bb368f859dc4d71679972068729e45b9b03d84052,2024-11-21T02:01:23.837000 +CVE-2014-0114,0,0,d7afb11ee86a1ce556fc26fcf9433d601909302725c32d9abc14d149f3d8cdc4,2024-11-21T02:01:23.960000 CVE-2014-0115,0,0,b5634799172afbe9af1803b9bf9145782e8b8c085c301935aa529e11f02c33cd,2023-11-07T02:18:09.640000 -CVE-2014-0116,0,1,0ef28ef7b177cc1b5766c98e430d7f276ab682cf9713356cc5ca4d62fb60291c,2024-11-21T02:01:24.537000 +CVE-2014-0116,0,0,0ef28ef7b177cc1b5766c98e430d7f276ab682cf9713356cc5ca4d62fb60291c,2024-11-21T02:01:24.537000 CVE-2014-0117,0,0,fee0aaa5a8c3ab5288604cec1886c1c006d3907368e2bb680810d27a5fd72e7f,2023-11-07T02:18:09.703000 CVE-2014-0118,0,0,a043cab06d0d98e64f52a3b701f3f3bccda020195a63d11142aa09ecd8a1725e,2023-11-07T02:18:09.810000 CVE-2014-0119,0,0,f3689da6e3e8dbd4d8a1216a776a1d7161a8d4eecac82811c32285fd83688fd3,2023-11-07T02:18:10.040000 CVE-2014-0120,0,0,8b4c6675e0e5cd505caea48b334f849a1f8c3604ee887efe95a8238222b347b8,2018-01-11T13:46:41.953000 CVE-2014-0121,0,0,4495f3ab62ed2fbe97326773570e45cb4e99b37137cae03dba8380bcaf165273,2018-01-11T13:49:05.210000 -CVE-2014-0122,0,1,9f42a725a978fa2db1c770912e636ff103e761531a2d48e6a17e74b9af1763b4,2024-11-21T02:01:25.600000 -CVE-2014-0123,0,1,96d584e120f8548675aed96be3daf704397e9955c7595166ec36f7d2beb76b82,2024-11-21T02:01:25.710000 -CVE-2014-0124,0,1,79bf24d9ec9b95e82a05625289f541d97732272ee4b62f5b7b91f4f19607dfcf,2024-11-21T02:01:25.823000 -CVE-2014-0125,0,1,75df5258de803d6bfe96641881def6f36f87658cba8bd57e5de0e9b8fecc2907,2024-11-21T02:01:25.950000 -CVE-2014-0126,0,1,66d7ddb2248bce4978268d1c02fd03287f2f4bfb5270a901e3aee502e2dbfada,2024-11-21T02:01:26.073000 -CVE-2014-0127,0,1,8a1c7c4ca71fa8ea4087d2fc659e57d89af43c8c283bb1385f510d79358cd720,2024-11-21T02:01:26.190000 -CVE-2014-0128,0,1,af3f3a7ca949e7fb9848a38ed7cac18510b6344a9b3643ccc8e8aa3dbba2e680,2024-11-21T02:01:26.307000 -CVE-2014-0129,0,1,51d85e3f163f40e936705deee3913b56a3582d7a19bee0c05a45fd679d154ad8,2024-11-21T02:01:26.443000 -CVE-2014-0130,0,1,54457bce65ce946251d6cf4bb78051b89567d0db4f2179f6f8815539ca42f271,2024-11-21T02:01:26.570000 -CVE-2014-0131,0,1,8a123ef47caaf9653e19d35c13ac0ec4d8700fe5ee106d1e93b2ca1b2fca0a37,2024-11-21T02:01:26.730000 -CVE-2014-0132,0,1,c0ac7399ff29d2e81003558c4be467e14efca64d3c2c46558ad51665e1269810,2024-11-21T02:01:26.867000 -CVE-2014-0133,0,1,f1b7b9872a4bf889e0d95922077416bb7870b8077209c63971847ca289b59632,2024-11-21T02:01:26.993000 -CVE-2014-0134,0,1,6bcef9bfab53efccedf70a6e0a4fcaec6dee6e9ae1ba25040b44e97dca46dcc7,2024-11-21T02:01:27.107000 -CVE-2014-0135,0,1,6ee4fb7476cbc6218d8b2329e9193757f6b24ac1616e0546382da854aab0f6eb,2024-11-21T02:01:27.217000 +CVE-2014-0122,0,0,9f42a725a978fa2db1c770912e636ff103e761531a2d48e6a17e74b9af1763b4,2024-11-21T02:01:25.600000 +CVE-2014-0123,0,0,96d584e120f8548675aed96be3daf704397e9955c7595166ec36f7d2beb76b82,2024-11-21T02:01:25.710000 +CVE-2014-0124,0,0,79bf24d9ec9b95e82a05625289f541d97732272ee4b62f5b7b91f4f19607dfcf,2024-11-21T02:01:25.823000 +CVE-2014-0125,0,0,75df5258de803d6bfe96641881def6f36f87658cba8bd57e5de0e9b8fecc2907,2024-11-21T02:01:25.950000 +CVE-2014-0126,0,0,66d7ddb2248bce4978268d1c02fd03287f2f4bfb5270a901e3aee502e2dbfada,2024-11-21T02:01:26.073000 +CVE-2014-0127,0,0,8a1c7c4ca71fa8ea4087d2fc659e57d89af43c8c283bb1385f510d79358cd720,2024-11-21T02:01:26.190000 +CVE-2014-0128,0,0,af3f3a7ca949e7fb9848a38ed7cac18510b6344a9b3643ccc8e8aa3dbba2e680,2024-11-21T02:01:26.307000 +CVE-2014-0129,0,0,51d85e3f163f40e936705deee3913b56a3582d7a19bee0c05a45fd679d154ad8,2024-11-21T02:01:26.443000 +CVE-2014-0130,0,0,54457bce65ce946251d6cf4bb78051b89567d0db4f2179f6f8815539ca42f271,2024-11-21T02:01:26.570000 +CVE-2014-0131,0,0,8a123ef47caaf9653e19d35c13ac0ec4d8700fe5ee106d1e93b2ca1b2fca0a37,2024-11-21T02:01:26.730000 +CVE-2014-0132,0,0,c0ac7399ff29d2e81003558c4be467e14efca64d3c2c46558ad51665e1269810,2024-11-21T02:01:26.867000 +CVE-2014-0133,0,0,f1b7b9872a4bf889e0d95922077416bb7870b8077209c63971847ca289b59632,2024-11-21T02:01:26.993000 +CVE-2014-0134,0,0,6bcef9bfab53efccedf70a6e0a4fcaec6dee6e9ae1ba25040b44e97dca46dcc7,2024-11-21T02:01:27.107000 +CVE-2014-0135,0,0,6ee4fb7476cbc6218d8b2329e9193757f6b24ac1616e0546382da854aab0f6eb,2024-11-21T02:01:27.217000 CVE-2014-0136,0,0,c7c67488444b51a33fb6df14a1fe4696759a49e17b42ff246199c070dc280c88,2023-02-13T00:32:41.720000 -CVE-2014-0137,0,1,c91b9304f8d15104de19cbb82f576e1e87fb0f713a9ad4983efcee954d834d83,2024-11-21T02:01:27.447000 -CVE-2014-0138,0,1,17d8c27a0ff818873fe72afa05bfd8f9a522aa99f836be8ede2411529c5b5849,2024-11-21T02:01:27.557000 -CVE-2014-0139,0,1,d9221f841f2e40c6173ef629e92925c89e3a63dbf10989f654f8723d69ea6a83,2024-11-21T02:01:27.723000 +CVE-2014-0137,0,0,c91b9304f8d15104de19cbb82f576e1e87fb0f713a9ad4983efcee954d834d83,2024-11-21T02:01:27.447000 +CVE-2014-0138,0,0,17d8c27a0ff818873fe72afa05bfd8f9a522aa99f836be8ede2411529c5b5849,2024-11-21T02:01:27.557000 +CVE-2014-0139,0,0,d9221f841f2e40c6173ef629e92925c89e3a63dbf10989f654f8723d69ea6a83,2024-11-21T02:01:27.723000 CVE-2014-0140,0,0,00f19d2b6fcc1b8cace70b94664adb140d7cea7227e187995d0b43bf8792d307,2023-02-13T00:32:43.220000 CVE-2014-0141,0,0,2f22000a98fcb13892ebad535e4b3c986a536bdb3f2c0ef660561c77c76af948,2017-08-31T13:47:30.650000 CVE-2014-0142,0,0,64e0894419a54c9285995fbe1ac80dc4442b42a3c1cfc58ec5f6659d0fc9febe,2023-02-13T00:32:44.597000 @@ -64632,31 +64632,31 @@ CVE-2014-0145,0,0,d64327a3ec75bb33e6ca7c8c1caf7618873da95823cd868e477e588f9ee4d2 CVE-2014-0146,0,0,c1f5e22f614f2eb74b5ef5852de875c52172fef764dee0a0f172c97af55557eb,2023-02-13T00:32:55.097000 CVE-2014-0147,0,0,383f1a470d3540390f9bc8a59ed2de96f9def6b04826d63aa7c2e0921c7a25c0,2023-02-13T00:32:55.557000 CVE-2014-0148,0,0,31ba7d213cfb7f3b410c9d527d3306d2662b09dfc14ee4496bb0861be458c8b3,2023-02-13T00:33:10.310000 -CVE-2014-0149,0,1,d55c72003502cccefad27b84cae68ff2a43cf212b134081401c1a5af249094a3,2024-11-21T02:01:28.993000 -CVE-2014-0150,0,1,c27ffec2440921214e2de87d4f5c5e59222d4afa958f25992f296c8f962c17f8,2024-11-21T02:01:29.107000 +CVE-2014-0149,0,0,d55c72003502cccefad27b84cae68ff2a43cf212b134081401c1a5af249094a3,2024-11-21T02:01:28.993000 +CVE-2014-0150,0,0,c27ffec2440921214e2de87d4f5c5e59222d4afa958f25992f296c8f962c17f8,2024-11-21T02:01:29.107000 CVE-2014-0151,0,0,8a9c169657c4d4add3ba264f75908e63b67acd70f30dfb9b4c7abc2b9eeb80ca,2023-02-13T00:33:30.250000 CVE-2014-0152,0,0,823af9f053cc363ee3d172c4ff93a23a7d0c984f98cde09e9610002ccaec01ac,2023-02-13T00:33:38.017000 CVE-2014-0153,0,0,42ba39623ec8b437869fc22de305e4aabfe31e30568ae084122da53b4773abe1,2023-02-13T00:33:54.983000 CVE-2014-0154,0,0,99e6c243c92a28578c60500e55e09760dad776f065c36c3a6a63c5bba33759e1,2023-02-13T00:34:09.447000 -CVE-2014-0155,0,1,38ae7386af052931c5ec304542a03bc7582f27a11e5e304fd344dffeb33db5af,2024-11-21T02:01:29.707000 +CVE-2014-0155,0,0,38ae7386af052931c5ec304542a03bc7582f27a11e5e304fd344dffeb33db5af,2024-11-21T02:01:29.707000 CVE-2014-0156,0,0,cb1ab03f70f743786e3c8ce13dba59a7d2f8804007646ecae3c412e31a67d3e6,2022-07-12T15:31:59.640000 -CVE-2014-0157,0,1,3af7c48bc802d105cf105af61082b903e7e0e169179180c755fed388fef72ea8,2024-11-21T02:01:29.947000 +CVE-2014-0157,0,0,3af7c48bc802d105cf105af61082b903e7e0e169179180c755fed388fef72ea8,2024-11-21T02:01:29.947000 CVE-2014-0158,0,0,6db081111bd8dce6d1389ad4846c4e9a6b44712a2a15bea9cb6959aa363cffe6,2020-09-09T19:56:57.267000 -CVE-2014-0159,0,1,74e9f5dded1a338c34d16887b8ab7791e20d359b76d72c78569fa2f8234ad13b,2024-11-21T02:01:30.177000 -CVE-2014-0160,0,1,9f3e6be7c076b86181429e39904e43fa06613512d61a6067322cfe30023b5d6f,2024-11-21T02:01:30.317000 +CVE-2014-0159,0,0,74e9f5dded1a338c34d16887b8ab7791e20d359b76d72c78569fa2f8234ad13b,2024-11-21T02:01:30.177000 +CVE-2014-0160,0,0,9f3e6be7c076b86181429e39904e43fa06613512d61a6067322cfe30023b5d6f,2024-11-21T02:01:30.317000 CVE-2014-0161,0,0,6030aed64345a8955b7239f840c031c28f8a02895867c9ded81eb9ea7ec72e5d,2020-01-10T15:14:57.550000 -CVE-2014-0162,0,1,94914a2ee1872f65cc5a7b07e6f7461c0d310d68a95e8ffdaed9c1d1eb4e7eef,2024-11-21T02:01:30.857000 +CVE-2014-0162,0,0,94914a2ee1872f65cc5a7b07e6f7461c0d310d68a95e8ffdaed9c1d1eb4e7eef,2024-11-21T02:01:30.857000 CVE-2014-0163,0,0,4d7e9b66f339b53c64392c98e3533c9848283463e76c4aad5aa14ed6c229cdaa,2019-12-16T14:09:45.803000 -CVE-2014-0164,0,1,42fbd80a55038b5374f354ed9fc03312ed4882165d422a19602e9af4aa01bd9d,2024-11-21T02:01:31.070000 -CVE-2014-0165,0,1,c968b5701f10f25ed71eb39b393de142d2fd8e7f734197b140a0b61482115d56,2024-11-21T02:01:31.183000 -CVE-2014-0166,0,1,3d781bfdd0db330661b6089f9b1a6271ef1b065fbd91096be4370a8da1b4992b,2024-11-21T02:01:31.880000 -CVE-2014-0167,0,1,8c4e7c9c3387be3218bc9080ca4ca11639b8e67deccc1179b66f7e2e17cbed77,2024-11-21T02:01:32.110000 +CVE-2014-0164,0,0,42fbd80a55038b5374f354ed9fc03312ed4882165d422a19602e9af4aa01bd9d,2024-11-21T02:01:31.070000 +CVE-2014-0165,0,0,c968b5701f10f25ed71eb39b393de142d2fd8e7f734197b140a0b61482115d56,2024-11-21T02:01:31.183000 +CVE-2014-0166,0,0,3d781bfdd0db330661b6089f9b1a6271ef1b065fbd91096be4370a8da1b4992b,2024-11-21T02:01:31.880000 +CVE-2014-0167,0,0,8c4e7c9c3387be3218bc9080ca4ca11639b8e67deccc1179b66f7e2e17cbed77,2024-11-21T02:01:32.110000 CVE-2014-0168,0,0,ce17f2b191e55f71e56dede5a9de2d26064c084cb8b3023b888f30cb8f0dd476,2014-10-07T15:20:13.237000 CVE-2014-0169,0,0,c677d5e3777b80a52e5b3d4bd08e2b39b820d9dc2d7a11e2a78305945133ef4c,2020-01-14T17:17:49.807000 CVE-2014-0170,0,0,6f693ad7e1c82ba040958bc027591a1eaee009b3bdfc4e346edd78a7654fce6e,2017-08-29T01:34:08.077000 CVE-2014-0171,0,0,93b28642aa76ac0b2cd09f0137643b7e0668e15b6dcc78c84d02cf9733e1f4f1,2020-03-26T19:33:34.050000 -CVE-2014-0172,0,1,fd72555f8fe2d298a69f0ffe7a77fce8c8837589f6ff73191cf324fc80354dcd,2024-11-21T02:01:33.407000 -CVE-2014-0173,0,1,68040914df421b831572655d143baa66dfa37766cd787cf2c2d5e5719d083030,2024-11-21T02:01:33.533000 +CVE-2014-0172,0,0,fd72555f8fe2d298a69f0ffe7a77fce8c8837589f6ff73191cf324fc80354dcd,2024-11-21T02:01:33.407000 +CVE-2014-0173,0,0,68040914df421b831572655d143baa66dfa37766cd787cf2c2d5e5719d083030,2024-11-21T02:01:33.533000 CVE-2014-0174,0,0,e0ec95616c278658591ba5b12691e735c0c545d4a94acde6473a3e28bd466377,2021-07-15T19:15:29.857000 CVE-2014-0175,0,0,e7b8ec35f7716b9d0c7ad57eaedc7fc459dc05ba512645f43cf3ef1e5be763ba,2023-02-13T00:34:42.263000 CVE-2014-0176,0,0,24bf9a4cb90ef34512e4bacbd4679a73019fb68cf49e90a14e5431d5d63cbe2e,2023-02-13T00:35:02.713000 @@ -64664,24 +64664,24 @@ CVE-2014-0177,0,0,a1e18487eddc32a9d0edd9b63e96bcc6731ed507bbee6a7860aebc66b579a7 CVE-2014-0178,0,0,67b121014948028d52a5c672ee694b2fc31180218e5c9cd941a63f53738dcfdb,2022-09-01T16:34:34.180000 CVE-2014-0179,0,0,f2c096b8ab85af5ddbcf535d7f62dcc09ed641d825c6d07fa413aa26f28f6d6b,2023-11-07T02:18:11.183000 CVE-2014-0180,0,0,5861a449dbae81bdc252440d563fc368f43c56c6e2778b025f520343d3432018,2023-02-13T00:35:21.577000 -CVE-2014-0181,0,1,64813720a122eff13c60a075fdbc244f27abf308e6ef181d7af4bf2390a4f56b,2024-11-21T02:01:34.650000 +CVE-2014-0181,0,0,64813720a122eff13c60a075fdbc244f27abf308e6ef181d7af4bf2390a4f56b,2024-11-21T02:01:34.650000 CVE-2014-0182,0,0,48f8b3672724a58b00c7019938f66f6dbcbcc438acbc8719c2dac97e6581f3bc,2023-02-13T00:35:38.210000 CVE-2014-0183,0,0,f002884daf69a184f4930fbbf72e875350f8e6e240b0327ee8d27ec11025370d,2020-01-10T18:17:46.563000 CVE-2014-0184,0,0,d4dfeba33feb88c4e7d23dd06e0f6fa35d6f4926f303927ea36822b61b68ac2e,2023-02-13T00:35:45.863000 -CVE-2014-0185,0,1,da0d74b713f49459aeadc0d0a3e5ac7f0b3995b315a389b040182b4d62342eee,2024-11-21T02:01:35.210000 +CVE-2014-0185,0,0,da0d74b713f49459aeadc0d0a3e5ac7f0b3995b315a389b040182b4d62342eee,2024-11-21T02:01:35.210000 CVE-2014-0186,0,0,a88d8ba5987e1553e1a351113ca2edb270ee0a61f576a973efd415b5f3971aad,2023-11-07T02:18:11.300000 -CVE-2014-0187,0,1,004d2520203f3e7d1469003b06eaf7b6a912c23692c6009e032a2059c34376b1,2024-11-21T02:01:35.487000 -CVE-2014-0188,0,1,0f74a28fe4259a01b918967f65d62d7b0f5a750ada5d3cfdc1f200dc06aedc31,2024-11-21T02:01:35.597000 -CVE-2014-0189,0,1,aaf1ddb3f923aa653236f8e5309e6e394f15f8db295663957119d49676dd8164,2024-11-21T02:01:35.703000 -CVE-2014-0190,0,1,df5aae8d6b93bb4a315503157ad0b81bf94afa7a03443790f97aef2d27805c63,2024-11-21T02:01:35.813000 +CVE-2014-0187,0,0,004d2520203f3e7d1469003b06eaf7b6a912c23692c6009e032a2059c34376b1,2024-11-21T02:01:35.487000 +CVE-2014-0188,0,0,0f74a28fe4259a01b918967f65d62d7b0f5a750ada5d3cfdc1f200dc06aedc31,2024-11-21T02:01:35.597000 +CVE-2014-0189,0,0,aaf1ddb3f923aa653236f8e5309e6e394f15f8db295663957119d49676dd8164,2024-11-21T02:01:35.703000 +CVE-2014-0190,0,0,df5aae8d6b93bb4a315503157ad0b81bf94afa7a03443790f97aef2d27805c63,2024-11-21T02:01:35.813000 CVE-2014-0191,0,0,e3265e21f224fdb57ad91f5f7defb7854fd489a1558cb9af823bd65c178940a5,2017-08-29T01:34:08.293000 -CVE-2014-0192,0,1,a5266c6957c7f4183166c45ad31b95a078638583b34907c4020a60111b115109,2024-11-21T02:01:36.110000 -CVE-2014-0193,0,1,7622b733200890c35838700085550c31cbcd73ce76c1803ac2bc84ed6d19cef1,2024-11-21T02:01:36.230000 +CVE-2014-0192,0,0,a5266c6957c7f4183166c45ad31b95a078638583b34907c4020a60111b115109,2024-11-21T02:01:36.110000 +CVE-2014-0193,0,0,7622b733200890c35838700085550c31cbcd73ce76c1803ac2bc84ed6d19cef1,2024-11-21T02:01:36.230000 CVE-2014-0194,0,0,667af1cf5ce4eefcee093c5e9ec61dce43f6a2333d39ea411bc713c9998012da,2023-11-07T02:18:11.407000 CVE-2014-0195,0,0,f2e079fe038d47542f3c157ba0275b86d93f09f1f56a8466b045cec060479eb6,2023-11-07T02:18:11.613000 -CVE-2014-0196,0,1,1abba1aa9b9562259f8dbbe8e5ee021a6fdd383c30f7295b96f1cb81fd9f1d22,2024-11-21T02:01:36.813000 +CVE-2014-0196,0,0,1abba1aa9b9562259f8dbbe8e5ee021a6fdd383c30f7295b96f1cb81fd9f1d22,2024-11-21T02:01:36.813000 CVE-2014-0197,0,0,e67d3e27b9b7a9535ff36de2b6c2c5545583721f45ddcc4d14900e3e3d8a32ee,2023-02-13T00:36:30.157000 -CVE-2014-0198,0,1,638166697a9b50587881fa6d05c0f51e69fa924a1422828dfa82131104209c65,2024-11-21T02:01:37.150000 +CVE-2014-0198,0,0,638166697a9b50587881fa6d05c0f51e69fa924a1422828dfa82131104209c65,2024-11-21T02:01:37.150000 CVE-2014-0199,0,0,cee7fbe739363e42ac4d96859072ef3a2e235a2a52a8d7057dfd467c5632c0a2,2023-02-13T00:36:40.790000 CVE-2014-0200,0,0,1d748da4323c125f6bb32934a80ed1e148a85fce6f59d346c16f31c91057fcec,2023-02-13T00:37:04.720000 CVE-2014-0201,0,0,9cc6e171ca2c31475972ccd41d0087ee4dac60f069140c146780dd3c21d924a4,2023-02-13T00:37:07.290000 @@ -64692,9 +64692,9 @@ CVE-2014-0205,0,0,8aef3a610ac14585611d5bdbf8d91b6ea152b303dd633c72dfcbbd3f5edda6 CVE-2014-0206,0,0,ab67e46732f768994f3c7f6631deeed1b20229e7c73b55ced116c318be9c0e7e,2023-02-13T00:37:23.707000 CVE-2014-0207,0,0,9f627fee62def472a6ab8e3e95cb3ed25baea1534313e5f331476ae575539b97,2022-09-28T20:39:46.750000 CVE-2014-0208,0,0,2c537f423e68f54a57d0dcc20f1033cd6ff82353ebe3407f0afe1dcae2e983c8,2023-02-13T00:37:25.270000 -CVE-2014-0209,0,1,917d03dc07fac1bc8d32325a3314da551f5ac93854d20fa94c3ef5d55c676c18,2024-11-21T02:01:38.817000 -CVE-2014-0210,0,1,62949423f9d442d5cd272fc22f54f63b810cf75c8d51d2c4d20c76dce890b946,2024-11-21T02:01:38.960000 -CVE-2014-0211,0,1,370dd14a14d937f4b069ef706a9c8e516e0cf02672987e6382c48dfa00c8785a,2024-11-21T02:01:39.097000 +CVE-2014-0209,0,0,917d03dc07fac1bc8d32325a3314da551f5ac93854d20fa94c3ef5d55c676c18,2024-11-21T02:01:38.817000 +CVE-2014-0210,0,0,62949423f9d442d5cd272fc22f54f63b810cf75c8d51d2c4d20c76dce890b946,2024-11-21T02:01:38.960000 +CVE-2014-0211,0,0,370dd14a14d937f4b069ef706a9c8e516e0cf02672987e6382c48dfa00c8785a,2024-11-21T02:01:39.097000 CVE-2014-0212,0,0,d412a0d58df4ee6e35ec20d0432b2e74d75faaa882c5b4b0607f4b3da79a6ae6,2019-12-19T15:27:26.990000 CVE-2014-0213,0,0,8b40f55320a3d683cf7c70841e20a344c4e775ae0d74b07a9d96903f3225cdb5,2020-12-01T14:52:36.823000 CVE-2014-0214,0,0,0b2469f5f9379f1af1d8da465668b57b62ca61b11260bcd75c26f162269e8b9d,2020-12-01T14:52:36.823000 @@ -64734,226 +64734,226 @@ CVE-2014-0247,0,0,ab16004b4eff065bf77992f4d978e5f46370c3e9fff27ad746b74a5474cdaa CVE-2014-0248,0,0,3017293d86e0ca36b2b1c75854720227679ec023fa6289df775e974c9e40c0a7,2023-02-13T00:38:13.883000 CVE-2014-0249,0,0,e9328ee8c2ad8e0cdd13bee3f6b74db6cfc6dcde40c458dc7e37f15ca38c89da,2019-04-22T17:48:00.643000 CVE-2014-0250,0,0,f62e33aeb815f3552e39142c661fc039f0379168f49e05e4997a8b11763d85e2,2020-03-06T17:18:45.410000 -CVE-2014-0251,0,1,a132c5e9e754f4f95b52db5b9ea492568b54f78503bb85ce4e54c0e31551b973,2024-11-21T02:01:45.430000 +CVE-2014-0251,0,0,a132c5e9e754f4f95b52db5b9ea492568b54f78503bb85ce4e54c0e31551b973,2024-11-21T02:01:45.430000 CVE-2014-0252,0,0,aa0da2c24ec5044a9f6bc61cddec6d8f5cf32c73a0f81e27c6057f930a33dbed,2023-11-07T02:18:17.390000 -CVE-2014-0253,0,1,b3d9dffb118de0337a6985ad08d299b13d3f981665a63a07bfa096e86ef4538b,2024-11-21T02:01:45.567000 -CVE-2014-0254,0,1,7623f99a25369175b83f095a55e793f724fa366de0aa7841c6c6995d942d6bf1,2024-11-21T02:01:45.670000 -CVE-2014-0255,0,1,4b5dab84ff6bb7a78c518d4e49a74eb35b0368a698c1e722d086ad0ee84597b6,2024-11-21T02:01:45.773000 -CVE-2014-0256,0,1,b88b511e9341a531392979e1867753f314c134ed6fb2dadd476232fb7cea1b5a,2024-11-21T02:01:45.873000 -CVE-2014-0257,0,1,5795a37c2f431f8139e17ca1081303cfe4c1d3650d239cabd5e1e4679297b431,2024-11-21T02:01:45.960000 -CVE-2014-0258,0,1,93564620fcf26c347ff0919c4a421249a426cce9239883ec6928f6d24c7a9c8f,2024-11-21T02:01:46.060000 -CVE-2014-0259,0,1,82a253694b85ce68636d6d9758858ba018960dc8627edf8f954d6c7e3b04acaa,2024-11-21T02:01:46.170000 -CVE-2014-0260,0,1,4c9cfc86c4c9fd5a3e34bd0cca16ec93c5507bc233005e36a79ce12c3a57786f,2024-11-21T02:01:46.273000 -CVE-2014-0261,0,1,e04fa7c46575773cc4f7128b1676faf0a8b2b085cd41b8e6fe5e00de56018e71,2024-11-21T02:01:46.373000 -CVE-2014-0262,0,1,5007486f0b3e1e1f772e384f58bc99f5ecebc8dd7b7d65caa9f17bf64a695d6b,2024-11-21T02:01:46.473000 -CVE-2014-0263,0,1,2f67a9747300159aaf844f18af594d4a02839cb73de1eb92732810377476242a,2024-11-21T02:01:46.567000 +CVE-2014-0253,0,0,b3d9dffb118de0337a6985ad08d299b13d3f981665a63a07bfa096e86ef4538b,2024-11-21T02:01:45.567000 +CVE-2014-0254,0,0,7623f99a25369175b83f095a55e793f724fa366de0aa7841c6c6995d942d6bf1,2024-11-21T02:01:45.670000 +CVE-2014-0255,0,0,4b5dab84ff6bb7a78c518d4e49a74eb35b0368a698c1e722d086ad0ee84597b6,2024-11-21T02:01:45.773000 +CVE-2014-0256,0,0,b88b511e9341a531392979e1867753f314c134ed6fb2dadd476232fb7cea1b5a,2024-11-21T02:01:45.873000 +CVE-2014-0257,0,0,5795a37c2f431f8139e17ca1081303cfe4c1d3650d239cabd5e1e4679297b431,2024-11-21T02:01:45.960000 +CVE-2014-0258,0,0,93564620fcf26c347ff0919c4a421249a426cce9239883ec6928f6d24c7a9c8f,2024-11-21T02:01:46.060000 +CVE-2014-0259,0,0,82a253694b85ce68636d6d9758858ba018960dc8627edf8f954d6c7e3b04acaa,2024-11-21T02:01:46.170000 +CVE-2014-0260,0,0,4c9cfc86c4c9fd5a3e34bd0cca16ec93c5507bc233005e36a79ce12c3a57786f,2024-11-21T02:01:46.273000 +CVE-2014-0261,0,0,e04fa7c46575773cc4f7128b1676faf0a8b2b085cd41b8e6fe5e00de56018e71,2024-11-21T02:01:46.373000 +CVE-2014-0262,0,0,5007486f0b3e1e1f772e384f58bc99f5ecebc8dd7b7d65caa9f17bf64a695d6b,2024-11-21T02:01:46.473000 +CVE-2014-0263,0,0,2f67a9747300159aaf844f18af594d4a02839cb73de1eb92732810377476242a,2024-11-21T02:01:46.567000 CVE-2014-0264,0,0,cd137c652b13a18a06f2ce39ea3516b9b03a18dfeb6c63317de094a40bed76ee,2023-11-07T02:18:17.690000 CVE-2014-0265,0,0,dbdac2f178c029ac0a3c42cc2eb316be778a6db8104392ff576b11681ddde475,2023-11-07T02:18:17.907000 -CVE-2014-0266,0,1,af0bc6ae5a62a13f0870e6acd16c9c1538c2aeb342776cba9b27ab8debf55e2c,2024-11-21T02:01:46.700000 -CVE-2014-0267,0,1,b0a07c18c516a91fee92dd47cb2ee3b59580482237540be12975e136b3606a18,2024-11-21T02:01:46.810000 -CVE-2014-0268,0,1,88a43a0fc7d7e7828e7eb4395f5e5d0c843b1e6fc5b919e0cd314d5e92eab096,2024-11-21T02:01:46.930000 -CVE-2014-0269,0,1,d69fd897caac2be45980233fe3cb7cb324223dec0e4a3bb022ba3568254c0224,2024-11-21T02:01:47.040000 -CVE-2014-0270,0,1,938b0a55c246f63b1d9bd10a7d5584a218307ed0f4793c621fe5c80dc40e2b18,2024-11-21T02:01:47.143000 -CVE-2014-0271,0,1,5517d802aed6f1f3c43e5ffea010ef822f1c35d59b86e8568b9d3b3e5cc13a8e,2024-11-21T02:01:47.260000 -CVE-2014-0272,0,1,9b8ef3713d002b3485c30dd210e1c0188b024e0b7c0a841908245bf0ca251219,2024-11-21T02:01:47.370000 -CVE-2014-0273,0,1,d4161f4c8de8e98d4fdc71fcb7698a14ecc5d7d6374e168e2d527c41f94840eb,2024-11-21T02:01:47.483000 -CVE-2014-0274,0,1,e3417908e5db80d7a568fceaeb98742a43ee02bbe00c1672bbd2d8fa33f8b9cb,2024-11-21T02:01:47.633000 -CVE-2014-0275,0,1,2c53432162511a13bb3fc61b6c43f9ef470cfcdba16d68b41bed07d2dc09bdef,2024-11-21T02:01:47.770000 -CVE-2014-0276,0,1,331ee76e6537ce6b6a211d4941fdcea5e53517873792ed10a3c029fc109954f4,2024-11-21T02:01:47.887000 -CVE-2014-0277,0,1,53fdf1fc657e4e733b57a2cc2eb4c2fc0af902abdc32189ae692ce560f9849f0,2024-11-21T02:01:48.003000 -CVE-2014-0278,0,1,deb889840fcd43662978eadfe75171e7db8923766bfbddd00f1be14c54553991,2024-11-21T02:01:48.133000 -CVE-2014-0279,0,1,4a34f6f868da8802040a58f01cea279183d1b9d968abc1d3688a2a75f987af48,2024-11-21T02:01:48.250000 -CVE-2014-0280,0,1,2944241645ebebb103a74e80d099679eba2d3042ef05f1fd0dfefe8b59e8ff94,2024-11-21T02:01:48.367000 -CVE-2014-0281,0,1,4c74fe71b168fa6be68337c6ce08a895e2421d46ec908704caae3a3d504e1a32,2024-11-21T02:01:48.480000 +CVE-2014-0266,0,0,af0bc6ae5a62a13f0870e6acd16c9c1538c2aeb342776cba9b27ab8debf55e2c,2024-11-21T02:01:46.700000 +CVE-2014-0267,0,0,b0a07c18c516a91fee92dd47cb2ee3b59580482237540be12975e136b3606a18,2024-11-21T02:01:46.810000 +CVE-2014-0268,0,0,88a43a0fc7d7e7828e7eb4395f5e5d0c843b1e6fc5b919e0cd314d5e92eab096,2024-11-21T02:01:46.930000 +CVE-2014-0269,0,0,d69fd897caac2be45980233fe3cb7cb324223dec0e4a3bb022ba3568254c0224,2024-11-21T02:01:47.040000 +CVE-2014-0270,0,0,938b0a55c246f63b1d9bd10a7d5584a218307ed0f4793c621fe5c80dc40e2b18,2024-11-21T02:01:47.143000 +CVE-2014-0271,0,0,5517d802aed6f1f3c43e5ffea010ef822f1c35d59b86e8568b9d3b3e5cc13a8e,2024-11-21T02:01:47.260000 +CVE-2014-0272,0,0,9b8ef3713d002b3485c30dd210e1c0188b024e0b7c0a841908245bf0ca251219,2024-11-21T02:01:47.370000 +CVE-2014-0273,0,0,d4161f4c8de8e98d4fdc71fcb7698a14ecc5d7d6374e168e2d527c41f94840eb,2024-11-21T02:01:47.483000 +CVE-2014-0274,0,0,e3417908e5db80d7a568fceaeb98742a43ee02bbe00c1672bbd2d8fa33f8b9cb,2024-11-21T02:01:47.633000 +CVE-2014-0275,0,0,2c53432162511a13bb3fc61b6c43f9ef470cfcdba16d68b41bed07d2dc09bdef,2024-11-21T02:01:47.770000 +CVE-2014-0276,0,0,331ee76e6537ce6b6a211d4941fdcea5e53517873792ed10a3c029fc109954f4,2024-11-21T02:01:47.887000 +CVE-2014-0277,0,0,53fdf1fc657e4e733b57a2cc2eb4c2fc0af902abdc32189ae692ce560f9849f0,2024-11-21T02:01:48.003000 +CVE-2014-0278,0,0,deb889840fcd43662978eadfe75171e7db8923766bfbddd00f1be14c54553991,2024-11-21T02:01:48.133000 +CVE-2014-0279,0,0,4a34f6f868da8802040a58f01cea279183d1b9d968abc1d3688a2a75f987af48,2024-11-21T02:01:48.250000 +CVE-2014-0280,0,0,2944241645ebebb103a74e80d099679eba2d3042ef05f1fd0dfefe8b59e8ff94,2024-11-21T02:01:48.367000 +CVE-2014-0281,0,0,4c74fe71b168fa6be68337c6ce08a895e2421d46ec908704caae3a3d504e1a32,2024-11-21T02:01:48.480000 CVE-2014-0282,0,0,3292966b7da603c5ce75db28b60f1d2ffffef98ad7d75b7b18a608662c817582,2018-10-12T22:05:42.090000 -CVE-2014-0283,0,1,ef2ce1ada1cb3cf1ae0a0481708bb5d0d9ab05a40bd57244f5906abc1adf97a0,2024-11-21T02:01:48.710000 -CVE-2014-0284,0,1,d31d1dd186e7c3609686feec1b4622e83b4bb3fc251ba4b5ef68386467b03c15,2024-11-21T02:01:48.827000 -CVE-2014-0285,0,1,1ab685755d3a747687353fbda6e5cf9c36b252f2328624b232cf8f10c0c68e28,2024-11-21T02:01:48.937000 -CVE-2014-0286,0,1,b40076566477203d47233c975d0e34f107b76daa665ae2190c604eda80e4d0cf,2024-11-21T02:01:49.043000 -CVE-2014-0287,0,1,7a7e7d008054218fc9426e833a1448dee33b39c4389110f2d7b98158da63b3e9,2024-11-21T02:01:49.153000 -CVE-2014-0288,0,1,1c48cab2d552610560ff47f8aa93b1fbafd266e375e7f4695ac80f5eebd02621,2024-11-21T02:01:49.263000 -CVE-2014-0289,0,1,219d6dbd354cd34d2928714e10451a8e1af6b970b0d80d9b0ef0723ecaa8df2a,2024-11-21T02:01:49.383000 -CVE-2014-0290,0,1,10300abedbc54bfdaaab863e84b1b77c801ef6add28adcd8e1c0b6cae87b51c5,2024-11-21T02:01:49.497000 +CVE-2014-0283,0,0,ef2ce1ada1cb3cf1ae0a0481708bb5d0d9ab05a40bd57244f5906abc1adf97a0,2024-11-21T02:01:48.710000 +CVE-2014-0284,0,0,d31d1dd186e7c3609686feec1b4622e83b4bb3fc251ba4b5ef68386467b03c15,2024-11-21T02:01:48.827000 +CVE-2014-0285,0,0,1ab685755d3a747687353fbda6e5cf9c36b252f2328624b232cf8f10c0c68e28,2024-11-21T02:01:48.937000 +CVE-2014-0286,0,0,b40076566477203d47233c975d0e34f107b76daa665ae2190c604eda80e4d0cf,2024-11-21T02:01:49.043000 +CVE-2014-0287,0,0,7a7e7d008054218fc9426e833a1448dee33b39c4389110f2d7b98158da63b3e9,2024-11-21T02:01:49.153000 +CVE-2014-0288,0,0,1c48cab2d552610560ff47f8aa93b1fbafd266e375e7f4695ac80f5eebd02621,2024-11-21T02:01:49.263000 +CVE-2014-0289,0,0,219d6dbd354cd34d2928714e10451a8e1af6b970b0d80d9b0ef0723ecaa8df2a,2024-11-21T02:01:49.383000 +CVE-2014-0290,0,0,10300abedbc54bfdaaab863e84b1b77c801ef6add28adcd8e1c0b6cae87b51c5,2024-11-21T02:01:49.497000 CVE-2014-0291,0,0,27f43c9d7fc265eda9505d495acd0ee61d2ed4e7b9f6356def2eecfdb54f9827,2023-11-07T02:18:18.357000 CVE-2014-0292,0,0,b7520f023d351f9de72f1f3da4272a50bf640a203607cc33b2472137424d7fd2,2023-11-07T02:18:18.670000 -CVE-2014-0293,0,1,459f3ca62fa296b2e77d5c32999115604d98f2d081a17c593ff73143f4efe5b5,2024-11-21T02:01:49.640000 -CVE-2014-0294,0,1,5b535242c913f19aaec1beddb22070dcfbb6917ae1b95f3d84a8f657c1874f7b,2024-11-21T02:01:49.757000 -CVE-2014-0295,0,1,fe4e1c5669ca6ba57a6c03b281438e1247723ef1f4c9021b0294520d098bf51d,2024-11-21T02:01:49.870000 +CVE-2014-0293,0,0,459f3ca62fa296b2e77d5c32999115604d98f2d081a17c593ff73143f4efe5b5,2024-11-21T02:01:49.640000 +CVE-2014-0294,0,0,5b535242c913f19aaec1beddb22070dcfbb6917ae1b95f3d84a8f657c1874f7b,2024-11-21T02:01:49.757000 +CVE-2014-0295,0,0,fe4e1c5669ca6ba57a6c03b281438e1247723ef1f4c9021b0294520d098bf51d,2024-11-21T02:01:49.870000 CVE-2014-0296,0,0,7a84967e91d8daef5cf406fc5bf79cc397e0b5387975f5adfb34bfd2e16042be,2019-05-15T14:11:24.843000 -CVE-2014-0297,0,1,6a3a0c6737750b2621cb493383822f34baf881a54bca8d54e02e635073cd4f1c,2024-11-21T02:01:50.123000 -CVE-2014-0298,0,1,f7015b94f46195af27a83d69e30c2c4106e79b98d1a039bdfc3b54761c4ff603,2024-11-21T02:01:50.233000 -CVE-2014-0299,0,1,8859440ebabe44b9d1282ecc61cc6badcb2ac516bb7c5b0c80713751d3e254f6,2024-11-21T02:01:50.357000 -CVE-2014-0300,0,1,fd08f0f8aa8779655cfc17793fcc4493cf2ab0f207d93e7869656152655ab314,2024-11-21T02:01:50.477000 -CVE-2014-0301,0,1,e8967beca25aff9e26148cb453a13b44b04c41426bc920bfdfc6aa8af149890e,2024-11-21T02:01:50.593000 -CVE-2014-0302,0,1,49913ed6a555be873337c1089bf1096cd47d5fb6ef9eef1f599e6eedc084c9e1,2024-11-21T02:01:50.743000 -CVE-2014-0303,0,1,63236eff0e27f8706195bffc810b254a5bdbbd8dd3eed687074e6f2afc64c69a,2024-11-21T02:01:50.907000 -CVE-2014-0304,0,1,295ef8e1446c80af0e45fd0ae2b1d939ef011ddb4b1d8746fd0020c9753e1d90,2024-11-21T02:01:50.997000 -CVE-2014-0305,0,1,07050e3279e24c63f1d7d830b92ac57bcf7ae679e9bc52a44cb138e7102ec2db,2024-11-21T02:01:51.097000 -CVE-2014-0306,0,1,9a9c0350a8d10420a45267d8eb815e50cede40275ab418ea2c5e185f403bcb1f,2024-11-21T02:01:51.193000 -CVE-2014-0307,0,1,b4d7b65496b9cf60e176b0bd3f10edf1a82efd7b35dde7db4749204a14dd607e,2024-11-21T02:01:51.290000 -CVE-2014-0308,0,1,c561837ae6ffb664aa67974c2aee667af6793de41b1e88bda10ca093ec841aab,2024-11-21T02:01:51.397000 -CVE-2014-0309,0,1,0ee8a8bf53605252e018d49c1683aeff765394e7eaeaf2757547feccc1d6ae4e,2024-11-21T02:01:51.500000 -CVE-2014-0310,0,1,039818e4c2ee18500bfb9953362606db4ac3404b81e901d431f86b40f217650d,2024-11-21T02:01:51.597000 -CVE-2014-0311,0,1,651bbd0c78ddbfa9013fc478bfed3f6fce41e13737d47a413c97729e8a620092,2024-11-21T02:01:51.693000 -CVE-2014-0312,0,1,77c75228f144c742b43e903efb5002dbc02962397340bef6dccd9355fad3ab6f,2024-11-21T02:01:51.787000 -CVE-2014-0313,0,1,bfdb3175fccfb7d4bdc43dca86047cd27bd196fe11d8ed612ce26f14f8050d67,2024-11-21T02:01:51.883000 -CVE-2014-0314,0,1,a474b54c7b7946113a5a05842d0b79a1432eb172bf8f7cf549d4700fccfa0bc8,2024-11-21T02:01:51.987000 -CVE-2014-0315,0,1,4009e5df5f4dbfdcd71fd15ef93d9405b3c47b32b2a83978e409290c347d5dc2,2024-11-21T02:01:52.080000 +CVE-2014-0297,0,0,6a3a0c6737750b2621cb493383822f34baf881a54bca8d54e02e635073cd4f1c,2024-11-21T02:01:50.123000 +CVE-2014-0298,0,0,f7015b94f46195af27a83d69e30c2c4106e79b98d1a039bdfc3b54761c4ff603,2024-11-21T02:01:50.233000 +CVE-2014-0299,0,0,8859440ebabe44b9d1282ecc61cc6badcb2ac516bb7c5b0c80713751d3e254f6,2024-11-21T02:01:50.357000 +CVE-2014-0300,0,0,fd08f0f8aa8779655cfc17793fcc4493cf2ab0f207d93e7869656152655ab314,2024-11-21T02:01:50.477000 +CVE-2014-0301,0,0,e8967beca25aff9e26148cb453a13b44b04c41426bc920bfdfc6aa8af149890e,2024-11-21T02:01:50.593000 +CVE-2014-0302,0,0,49913ed6a555be873337c1089bf1096cd47d5fb6ef9eef1f599e6eedc084c9e1,2024-11-21T02:01:50.743000 +CVE-2014-0303,0,0,63236eff0e27f8706195bffc810b254a5bdbbd8dd3eed687074e6f2afc64c69a,2024-11-21T02:01:50.907000 +CVE-2014-0304,0,0,295ef8e1446c80af0e45fd0ae2b1d939ef011ddb4b1d8746fd0020c9753e1d90,2024-11-21T02:01:50.997000 +CVE-2014-0305,0,0,07050e3279e24c63f1d7d830b92ac57bcf7ae679e9bc52a44cb138e7102ec2db,2024-11-21T02:01:51.097000 +CVE-2014-0306,0,0,9a9c0350a8d10420a45267d8eb815e50cede40275ab418ea2c5e185f403bcb1f,2024-11-21T02:01:51.193000 +CVE-2014-0307,0,0,b4d7b65496b9cf60e176b0bd3f10edf1a82efd7b35dde7db4749204a14dd607e,2024-11-21T02:01:51.290000 +CVE-2014-0308,0,0,c561837ae6ffb664aa67974c2aee667af6793de41b1e88bda10ca093ec841aab,2024-11-21T02:01:51.397000 +CVE-2014-0309,0,0,0ee8a8bf53605252e018d49c1683aeff765394e7eaeaf2757547feccc1d6ae4e,2024-11-21T02:01:51.500000 +CVE-2014-0310,0,0,039818e4c2ee18500bfb9953362606db4ac3404b81e901d431f86b40f217650d,2024-11-21T02:01:51.597000 +CVE-2014-0311,0,0,651bbd0c78ddbfa9013fc478bfed3f6fce41e13737d47a413c97729e8a620092,2024-11-21T02:01:51.693000 +CVE-2014-0312,0,0,77c75228f144c742b43e903efb5002dbc02962397340bef6dccd9355fad3ab6f,2024-11-21T02:01:51.787000 +CVE-2014-0313,0,0,bfdb3175fccfb7d4bdc43dca86047cd27bd196fe11d8ed612ce26f14f8050d67,2024-11-21T02:01:51.883000 +CVE-2014-0314,0,0,a474b54c7b7946113a5a05842d0b79a1432eb172bf8f7cf549d4700fccfa0bc8,2024-11-21T02:01:51.987000 +CVE-2014-0315,0,0,4009e5df5f4dbfdcd71fd15ef93d9405b3c47b32b2a83978e409290c347d5dc2,2024-11-21T02:01:52.080000 CVE-2014-0316,0,0,a6192cd91478a3e9245a0c183b26e4cb83dfa71a5b70f488ac868b5970257d69,2019-05-13T18:35:54.480000 -CVE-2014-0317,0,1,d79d6380b1dec4de305074cccfb51b5bc001b5ce3541750ca2fd7d2a0c539e37,2024-11-21T02:01:52.303000 +CVE-2014-0317,0,0,d79d6380b1dec4de305074cccfb51b5bc001b5ce3541750ca2fd7d2a0c539e37,2024-11-21T02:01:52.303000 CVE-2014-0318,0,0,b2ea67e323e70e44d59ff043ee8e70b43478a06944727423ea499d75fd60ef1c,2019-05-15T17:29:30.173000 -CVE-2014-0319,0,1,e6d1cfb45c56aa27946b071433263c0fc48ed4f33020cf3f09375a60a5c336d6,2024-11-21T02:01:52.503000 +CVE-2014-0319,0,0,e6d1cfb45c56aa27946b071433263c0fc48ed4f33020cf3f09375a60a5c336d6,2024-11-21T02:01:52.503000 CVE-2014-0320,0,0,20ee3c0cc1678f0f66563f4d615009035d56ed3fe29276069443f6856f752154,2023-11-07T02:18:19.193000 -CVE-2014-0321,0,1,e24eee9c89c596512ef533dffcfb0ddba5c56ca7a461e0c59de0465b79754b19,2024-11-21T02:01:52.617000 -CVE-2014-0322,0,1,3f317525b2b8a3bba3cd587e74b5fd562cfc12e8dd3343261030138195c09166,2024-11-21T02:01:52.720000 -CVE-2014-0323,0,1,f8e30c489605ce317bd3c8a0c0bcb8627ce65b34f789dfda5f81b645cdb9749f,2024-11-21T02:01:52.880000 -CVE-2014-0324,0,1,8b4d692f4fc8ccb034fd928536d09cdc1475206543ed9fad6f6f2a8c42d69cab,2024-11-21T02:01:52.993000 +CVE-2014-0321,0,0,e24eee9c89c596512ef533dffcfb0ddba5c56ca7a461e0c59de0465b79754b19,2024-11-21T02:01:52.617000 +CVE-2014-0322,0,0,3f317525b2b8a3bba3cd587e74b5fd562cfc12e8dd3343261030138195c09166,2024-11-21T02:01:52.720000 +CVE-2014-0323,0,0,f8e30c489605ce317bd3c8a0c0bcb8627ce65b34f789dfda5f81b645cdb9749f,2024-11-21T02:01:52.880000 +CVE-2014-0324,0,0,8b4d692f4fc8ccb034fd928536d09cdc1475206543ed9fad6f6f2a8c42d69cab,2024-11-21T02:01:52.993000 CVE-2014-0325,0,0,7422dfce9a053c71d2af7447334482dfd2b03e3e30ebfbe5597be05783401a43,2018-10-12T22:05:55.247000 CVE-2014-0326,0,0,66d7268a62890bd9a09d1516563941ac9571dfddc32144dcd6056511cf2ce572,2014-08-28T18:57:10.853000 CVE-2014-0327,0,0,e2aea6a744ca7c89ab47ac8b5dfe5031e79abab7ea113ac9fd31b7206a7ef904,2014-08-28T18:57:45.373000 CVE-2014-0328,0,0,080e8d1119cb074e03f85e938f21c51bbae96d792491e6a82d43df0e12a28ac7,2014-08-15T16:58:29.930000 -CVE-2014-0329,0,1,7c063fd609297d0fd5a7f41333ee4619d6e684f7f03d8d19205ba77aeae84806,2024-11-21T02:01:53.493000 -CVE-2014-0330,0,1,da84b424d4933c8870d86d89315472294c9a05ddb11c9725ad91369d91462bb4,2024-11-21T02:01:53.597000 -CVE-2014-0331,0,1,75e4af49bb2f90ca5de32ddf26ac68c1947b59631a1a198afc47bd3ec10377b9,2024-11-21T02:01:53.703000 -CVE-2014-0332,0,1,14ad2971819e9e0d8ba8109e4e81bfd844175f5a2c7053bc38700d346dc7d7df,2024-11-21T02:01:53.810000 -CVE-2014-0333,0,1,305c4c781c64fc329f201b3bb14d36576d0560526953947d26de6dab1ad7b117,2024-11-21T02:01:53.930000 -CVE-2014-0334,0,1,2486eef82689a5053b269c3871b24f98370cd3c505baf3ebde1d42475bb1d7ac,2024-11-21T02:01:54.043000 -CVE-2014-0335,0,1,33e5d7d3915a16b3598376397970d8ce0017dbc817f50fe5547bd03939435c27,2024-11-21T02:01:54.143000 -CVE-2014-0336,0,1,46ba07df458af4f9a761d1c484eb06041a2ae2697f3db0efdeaf2938763e5a4d,2024-11-21T02:01:54.243000 -CVE-2014-0337,0,1,a20f8c82b1e3d15d4929d3436783a6db69613ad2c22b7deb954e8b6d1c815653,2024-11-21T02:01:54.343000 -CVE-2014-0338,0,1,cc75235858f29d00a4d24136d58eb8f822d634b411f3c8c17e382577fee7a49c,2024-11-21T02:01:54.453000 -CVE-2014-0339,0,1,db0cecda3367ea9394fc5b94f4a98f72353ba6e25cd43cd05307b20e7933d471,2024-11-21T02:01:54.570000 -CVE-2014-0341,0,1,11cd9fb74ce9c0c55dd8536ddd5cc5cc79c8256e563d995737ab86a97b128db5,2024-11-21T02:01:54.683000 -CVE-2014-0342,0,1,54931630195f77e4248753d87fe3b2fabd6da942ec1ba2d82cb7fd1935a7b71f,2024-11-21T02:01:54.793000 -CVE-2014-0343,0,1,be98374b01f70f983fd4c61e0343d2b7a9d6f40a0add6150fc9eefbb0a3d45e8,2024-11-21T02:01:54.910000 -CVE-2014-0344,0,1,9b1702d03db1bca78b689504cb3e59f2b4372dbf32458d20b78624e70679b5a4,2024-11-21T02:01:55.013000 +CVE-2014-0329,0,0,7c063fd609297d0fd5a7f41333ee4619d6e684f7f03d8d19205ba77aeae84806,2024-11-21T02:01:53.493000 +CVE-2014-0330,0,0,da84b424d4933c8870d86d89315472294c9a05ddb11c9725ad91369d91462bb4,2024-11-21T02:01:53.597000 +CVE-2014-0331,0,0,75e4af49bb2f90ca5de32ddf26ac68c1947b59631a1a198afc47bd3ec10377b9,2024-11-21T02:01:53.703000 +CVE-2014-0332,0,0,14ad2971819e9e0d8ba8109e4e81bfd844175f5a2c7053bc38700d346dc7d7df,2024-11-21T02:01:53.810000 +CVE-2014-0333,0,0,305c4c781c64fc329f201b3bb14d36576d0560526953947d26de6dab1ad7b117,2024-11-21T02:01:53.930000 +CVE-2014-0334,0,0,2486eef82689a5053b269c3871b24f98370cd3c505baf3ebde1d42475bb1d7ac,2024-11-21T02:01:54.043000 +CVE-2014-0335,0,0,33e5d7d3915a16b3598376397970d8ce0017dbc817f50fe5547bd03939435c27,2024-11-21T02:01:54.143000 +CVE-2014-0336,0,0,46ba07df458af4f9a761d1c484eb06041a2ae2697f3db0efdeaf2938763e5a4d,2024-11-21T02:01:54.243000 +CVE-2014-0337,0,0,a20f8c82b1e3d15d4929d3436783a6db69613ad2c22b7deb954e8b6d1c815653,2024-11-21T02:01:54.343000 +CVE-2014-0338,0,0,cc75235858f29d00a4d24136d58eb8f822d634b411f3c8c17e382577fee7a49c,2024-11-21T02:01:54.453000 +CVE-2014-0339,0,0,db0cecda3367ea9394fc5b94f4a98f72353ba6e25cd43cd05307b20e7933d471,2024-11-21T02:01:54.570000 +CVE-2014-0341,0,0,11cd9fb74ce9c0c55dd8536ddd5cc5cc79c8256e563d995737ab86a97b128db5,2024-11-21T02:01:54.683000 +CVE-2014-0342,0,0,54931630195f77e4248753d87fe3b2fabd6da942ec1ba2d82cb7fd1935a7b71f,2024-11-21T02:01:54.793000 +CVE-2014-0343,0,0,be98374b01f70f983fd4c61e0343d2b7a9d6f40a0add6150fc9eefbb0a3d45e8,2024-11-21T02:01:54.910000 +CVE-2014-0344,0,0,9b1702d03db1bca78b689504cb3e59f2b4372dbf32458d20b78624e70679b5a4,2024-11-21T02:01:55.013000 CVE-2014-0346,0,0,599b2a21c79a964b27100efbd08ece8579960eb1b853715e966db5d656352c82,2023-11-07T02:18:19.803000 -CVE-2014-0347,0,1,c4a8c4cfc79ae0a216c81392d9b961c6c3482d05e938f1c07dc5ae46eb8a1680,2024-11-21T02:01:55.137000 -CVE-2014-0348,0,1,deac8b78309224d4ecf814e080a8a2aff63ae2ef8a1b657e701140142ed0ad01,2024-11-21T02:01:55.240000 -CVE-2014-0349,0,1,afd3353ffd07d27f7881d650abb0e4d72a3b643a1a0885ffc9de0d105732199d,2024-11-21T02:01:55.347000 -CVE-2014-0350,0,1,0afa5d3b886fe0d98f5b46e92c9e83e821a1e12fa940e7f4b89072d43797406a,2024-11-21T02:01:55.447000 +CVE-2014-0347,0,0,c4a8c4cfc79ae0a216c81392d9b961c6c3482d05e938f1c07dc5ae46eb8a1680,2024-11-21T02:01:55.137000 +CVE-2014-0348,0,0,deac8b78309224d4ecf814e080a8a2aff63ae2ef8a1b657e701140142ed0ad01,2024-11-21T02:01:55.240000 +CVE-2014-0349,0,0,afd3353ffd07d27f7881d650abb0e4d72a3b643a1a0885ffc9de0d105732199d,2024-11-21T02:01:55.347000 +CVE-2014-0350,0,0,0afa5d3b886fe0d98f5b46e92c9e83e821a1e12fa940e7f4b89072d43797406a,2024-11-21T02:01:55.447000 CVE-2014-0351,0,0,b7d52750863196502d99b4f2f49a3729f5dacf99c4e08133feae7236045cc23d,2017-08-29T01:34:08.623000 CVE-2014-0352,0,0,4f723de8a2a45d0661c960a486d502f5481fb9193982202a408bb9b592d590fb,2023-11-07T02:18:20.077000 -CVE-2014-0353,0,1,a35463107f4cef1e67bd69755b8d9df65495c21be84b34733116d818097858d2,2024-11-21T02:01:55.687000 -CVE-2014-0354,0,1,21796e4bac5affa4e2a53083b6e8c562039d322e3e72c0ae00e21d448d9488ef,2024-11-21T02:01:55.790000 -CVE-2014-0355,0,1,6dee0f30a7daed5dd1e79c591d133af2cd9acf3c3315698e190d91474d0744fa,2024-11-21T02:01:55.893000 -CVE-2014-0356,0,1,12ee64882917161b9160f131021a097e0783a576e5e56e750bad0a5d86b95859,2024-11-21T02:01:55.987000 -CVE-2014-0357,0,1,9406a983d48b8a0a99e45ec8739b1b263c0ed35f43dc6d4efd0b4025b7386b46,2024-11-21T02:01:56.087000 -CVE-2014-0358,0,1,3a1c02596acc936af5ab6083ce4e5941d5eec5cd338cc49426f4a46a5b064a9f,2024-11-21T02:01:56.190000 -CVE-2014-0359,0,1,963f04bbf5287e285422885464c587117de04460d8ee476e41c9c53904216dbe,2024-11-21T02:01:56.290000 +CVE-2014-0353,0,0,a35463107f4cef1e67bd69755b8d9df65495c21be84b34733116d818097858d2,2024-11-21T02:01:55.687000 +CVE-2014-0354,0,0,21796e4bac5affa4e2a53083b6e8c562039d322e3e72c0ae00e21d448d9488ef,2024-11-21T02:01:55.790000 +CVE-2014-0355,0,0,6dee0f30a7daed5dd1e79c591d133af2cd9acf3c3315698e190d91474d0744fa,2024-11-21T02:01:55.893000 +CVE-2014-0356,0,0,12ee64882917161b9160f131021a097e0783a576e5e56e750bad0a5d86b95859,2024-11-21T02:01:55.987000 +CVE-2014-0357,0,0,9406a983d48b8a0a99e45ec8739b1b263c0ed35f43dc6d4efd0b4025b7386b46,2024-11-21T02:01:56.087000 +CVE-2014-0358,0,0,3a1c02596acc936af5ab6083ce4e5941d5eec5cd338cc49426f4a46a5b064a9f,2024-11-21T02:01:56.190000 +CVE-2014-0359,0,0,963f04bbf5287e285422885464c587117de04460d8ee476e41c9c53904216dbe,2024-11-21T02:01:56.290000 CVE-2014-0360,0,0,ddd74b69f49b8fa79493da2d9ce726eb2ff17a68cb2125701d2192bdb9f08bb7,2023-11-07T02:18:20.340000 -CVE-2014-0361,0,1,5946814c045f69440e042c155b954944554b53661b2ea85f928405b27897b203,2024-11-21T02:01:56.400000 -CVE-2014-0362,0,1,72abaa616eb8c7dcb88ad5bddece7b35ad8b675a11f6c62bd9daf34a08b09841,2024-11-21T02:01:56.493000 -CVE-2014-0363,0,1,169ed17b68f3cdd701cb004b1efd5ee423d6e0473d1f04b164a8d38923cdeb45,2024-11-21T02:01:56.600000 -CVE-2014-0364,0,1,7fd3fa0521d95b57a527e5284423a99df84449281fb355984119ef40b1e5a60e,2024-11-21T02:01:56.710000 -CVE-2014-0366,0,1,0fd81dfad6b4cabacc3c27a426edf069f865eab8bdfb0b91a7aade46c6c6f9ee,2024-11-21T02:01:56.820000 -CVE-2014-0367,0,1,698b09c148e954473204c58b9fac12ecf58b026ee530012346efb00f327f63c2,2024-11-21T02:01:56.940000 -CVE-2014-0368,0,1,38c979a4fd722194ddce52377e1a9f56583ed8e3e501998b8111109b96a18ce6,2024-11-21T02:01:57.070000 -CVE-2014-0369,0,1,0ce1795740ee429fa21870dd7b934c37522e7eaa2ff5f773cd871e06626c59da,2024-11-21T02:01:57.250000 -CVE-2014-0370,0,1,e0567f2c1493704ae44266e39c26157073012c8d6686fc59104b565c98ba13ce,2024-11-21T02:01:57.363000 -CVE-2014-0371,0,1,061c0fbb762c8a3bd9aeea1f758f6ab85320d53532d380aa837b4adf9fd094b4,2024-11-21T02:01:57.480000 -CVE-2014-0372,0,1,02ca64c78b6a78aaca7044be75e7c230264078a7ed751404c2434ae64030aada,2024-11-21T02:01:57.593000 -CVE-2014-0373,0,1,0cc22889db3b428b0e5c13e9327ceaff98e8fe120b2582731ae11ac7c1fe31ac,2024-11-21T02:01:57.720000 -CVE-2014-0374,0,1,62d66f5244aa2da0080cb86d8e29740e3dce5589c60e7ddc3e0e7f40c0815adf,2024-11-21T02:01:57.903000 -CVE-2014-0375,0,1,b7d91ca0f65b62ed39e53733be2517b2bfff7360450fd36501dcf504ff0026a5,2024-11-21T02:01:58.050000 -CVE-2014-0376,0,1,cb423d4e626183e5e4c1543dd2645c92d973804df0247a351722ba21d9e6c3f8,2024-11-21T02:01:58.210000 -CVE-2014-0377,0,1,69d900ddc2c5008c853ff7e57f958fae34406d7a3e38c88ab07e0fcb4ee6a6b9,2024-11-21T02:01:58.403000 -CVE-2014-0378,0,1,25d8805f434d90e4916709d86c527f27c9ab5ae61ad34368e11161dede5ec56a,2024-11-21T02:01:58.543000 -CVE-2014-0379,0,1,a510c78976234d678de8dbb2ade54f0d6e992b30282b9711ec5837d7857bea0a,2024-11-21T02:01:58.667000 -CVE-2014-0380,0,1,8a72dfe8203b784a7aef9ef0fd0f18905b4d055de5c5a7ba613067145537dd36,2024-11-21T02:01:58.793000 -CVE-2014-0381,0,1,a2d2794761959759f639a0b99ab9d7c0d42b50ea92f5979b4c2f2f75a335bcb5,2024-11-21T02:01:58.920000 -CVE-2014-0382,0,1,78b200129e77bcd8a7a444bba1392a75a9fd84f588374f751fa09a71717ef25d,2024-11-21T02:01:59.043000 -CVE-2014-0383,0,1,1655565e6035ebc7f874343c8ccb1cbaef828dd272e4308a27c2f49692da9da4,2024-11-21T02:01:59.200000 -CVE-2014-0384,0,1,4d9f22e99083736467e90aecb2d2cce53dc84ee7bc10cad5a1570737e0ab32e1,2024-11-21T02:01:59.317000 -CVE-2014-0385,0,1,db8bc3ab5dbc540e644a176e15382b455d11a3f66a474e4d556399c42a09753b,2024-11-21T02:01:59.447000 -CVE-2014-0386,0,1,11696242557c5c0a82ef67e5bd68b03963c0e528b0dc49784cd6490554ed7b71,2024-11-21T02:01:59.573000 -CVE-2014-0387,0,1,e0f4050dd5be944869039cc084eb03ef83d9b7f157e935786268b94c45014a0f,2024-11-21T02:01:59.730000 -CVE-2014-0388,0,1,cb3c45b7c6d7aaf6284e92b5cbfad7205d6e0103cea71151fc6224270aa880ab,2024-11-21T02:01:59.903000 -CVE-2014-0389,0,1,563ebe166910446ab9e682518f5f5782d3fc223aad690a2c8161c69bf8d27ff3,2024-11-21T02:02:00.057000 -CVE-2014-0390,0,1,3586fa0a1cdb1b648a3af37483bf4bd92d6d4e8be83aac7699686f4343866a83,2024-11-21T02:02:00.180000 -CVE-2014-0391,0,1,b5b82e9101cf458c757f765fb0f46906d2f367250f98bcc7c7d118f9aa5382eb,2024-11-21T02:02:00.320000 -CVE-2014-0392,0,1,7730d72c8e4cb265108ce7525984972e419c564a3023cbfc94bc727d9a646b32,2024-11-21T02:02:00.443000 -CVE-2014-0393,0,1,985847a0f73c0b52130438c7d82b693cf36cff5ee133cc623eddb8af50c538ac,2024-11-21T02:02:00.570000 -CVE-2014-0394,0,1,c0c4660c0cc4cb3ba7037d1cd0e23ecef8511426c73f96ea243c1786f3649d3e,2024-11-21T02:02:00.753000 -CVE-2014-0395,0,1,9037a881fd29517405a4d22a25a616570059b9d835ddd9c9671e932267bc8b12,2024-11-21T02:02:00.877000 -CVE-2014-0396,0,1,e04c94d328474f9d852f96d5a05b5cfc91fa47947660123d3cf8227d65d0172f,2024-11-21T02:02:01.013000 +CVE-2014-0361,0,0,5946814c045f69440e042c155b954944554b53661b2ea85f928405b27897b203,2024-11-21T02:01:56.400000 +CVE-2014-0362,0,0,72abaa616eb8c7dcb88ad5bddece7b35ad8b675a11f6c62bd9daf34a08b09841,2024-11-21T02:01:56.493000 +CVE-2014-0363,0,0,169ed17b68f3cdd701cb004b1efd5ee423d6e0473d1f04b164a8d38923cdeb45,2024-11-21T02:01:56.600000 +CVE-2014-0364,0,0,7fd3fa0521d95b57a527e5284423a99df84449281fb355984119ef40b1e5a60e,2024-11-21T02:01:56.710000 +CVE-2014-0366,0,0,0fd81dfad6b4cabacc3c27a426edf069f865eab8bdfb0b91a7aade46c6c6f9ee,2024-11-21T02:01:56.820000 +CVE-2014-0367,0,0,698b09c148e954473204c58b9fac12ecf58b026ee530012346efb00f327f63c2,2024-11-21T02:01:56.940000 +CVE-2014-0368,0,0,38c979a4fd722194ddce52377e1a9f56583ed8e3e501998b8111109b96a18ce6,2024-11-21T02:01:57.070000 +CVE-2014-0369,0,0,0ce1795740ee429fa21870dd7b934c37522e7eaa2ff5f773cd871e06626c59da,2024-11-21T02:01:57.250000 +CVE-2014-0370,0,0,e0567f2c1493704ae44266e39c26157073012c8d6686fc59104b565c98ba13ce,2024-11-21T02:01:57.363000 +CVE-2014-0371,0,0,061c0fbb762c8a3bd9aeea1f758f6ab85320d53532d380aa837b4adf9fd094b4,2024-11-21T02:01:57.480000 +CVE-2014-0372,0,0,02ca64c78b6a78aaca7044be75e7c230264078a7ed751404c2434ae64030aada,2024-11-21T02:01:57.593000 +CVE-2014-0373,0,0,0cc22889db3b428b0e5c13e9327ceaff98e8fe120b2582731ae11ac7c1fe31ac,2024-11-21T02:01:57.720000 +CVE-2014-0374,0,0,62d66f5244aa2da0080cb86d8e29740e3dce5589c60e7ddc3e0e7f40c0815adf,2024-11-21T02:01:57.903000 +CVE-2014-0375,0,0,b7d91ca0f65b62ed39e53733be2517b2bfff7360450fd36501dcf504ff0026a5,2024-11-21T02:01:58.050000 +CVE-2014-0376,0,0,cb423d4e626183e5e4c1543dd2645c92d973804df0247a351722ba21d9e6c3f8,2024-11-21T02:01:58.210000 +CVE-2014-0377,0,0,69d900ddc2c5008c853ff7e57f958fae34406d7a3e38c88ab07e0fcb4ee6a6b9,2024-11-21T02:01:58.403000 +CVE-2014-0378,0,0,25d8805f434d90e4916709d86c527f27c9ab5ae61ad34368e11161dede5ec56a,2024-11-21T02:01:58.543000 +CVE-2014-0379,0,0,a510c78976234d678de8dbb2ade54f0d6e992b30282b9711ec5837d7857bea0a,2024-11-21T02:01:58.667000 +CVE-2014-0380,0,0,8a72dfe8203b784a7aef9ef0fd0f18905b4d055de5c5a7ba613067145537dd36,2024-11-21T02:01:58.793000 +CVE-2014-0381,0,0,a2d2794761959759f639a0b99ab9d7c0d42b50ea92f5979b4c2f2f75a335bcb5,2024-11-21T02:01:58.920000 +CVE-2014-0382,0,0,78b200129e77bcd8a7a444bba1392a75a9fd84f588374f751fa09a71717ef25d,2024-11-21T02:01:59.043000 +CVE-2014-0383,0,0,1655565e6035ebc7f874343c8ccb1cbaef828dd272e4308a27c2f49692da9da4,2024-11-21T02:01:59.200000 +CVE-2014-0384,0,0,4d9f22e99083736467e90aecb2d2cce53dc84ee7bc10cad5a1570737e0ab32e1,2024-11-21T02:01:59.317000 +CVE-2014-0385,0,0,db8bc3ab5dbc540e644a176e15382b455d11a3f66a474e4d556399c42a09753b,2024-11-21T02:01:59.447000 +CVE-2014-0386,0,0,11696242557c5c0a82ef67e5bd68b03963c0e528b0dc49784cd6490554ed7b71,2024-11-21T02:01:59.573000 +CVE-2014-0387,0,0,e0f4050dd5be944869039cc084eb03ef83d9b7f157e935786268b94c45014a0f,2024-11-21T02:01:59.730000 +CVE-2014-0388,0,0,cb3c45b7c6d7aaf6284e92b5cbfad7205d6e0103cea71151fc6224270aa880ab,2024-11-21T02:01:59.903000 +CVE-2014-0389,0,0,563ebe166910446ab9e682518f5f5782d3fc223aad690a2c8161c69bf8d27ff3,2024-11-21T02:02:00.057000 +CVE-2014-0390,0,0,3586fa0a1cdb1b648a3af37483bf4bd92d6d4e8be83aac7699686f4343866a83,2024-11-21T02:02:00.180000 +CVE-2014-0391,0,0,b5b82e9101cf458c757f765fb0f46906d2f367250f98bcc7c7d118f9aa5382eb,2024-11-21T02:02:00.320000 +CVE-2014-0392,0,0,7730d72c8e4cb265108ce7525984972e419c564a3023cbfc94bc727d9a646b32,2024-11-21T02:02:00.443000 +CVE-2014-0393,0,0,985847a0f73c0b52130438c7d82b693cf36cff5ee133cc623eddb8af50c538ac,2024-11-21T02:02:00.570000 +CVE-2014-0394,0,0,c0c4660c0cc4cb3ba7037d1cd0e23ecef8511426c73f96ea243c1786f3649d3e,2024-11-21T02:02:00.753000 +CVE-2014-0395,0,0,9037a881fd29517405a4d22a25a616570059b9d835ddd9c9671e932267bc8b12,2024-11-21T02:02:00.877000 +CVE-2014-0396,0,0,e04c94d328474f9d852f96d5a05b5cfc91fa47947660123d3cf8227d65d0172f,2024-11-21T02:02:01.013000 CVE-2014-0397,0,0,fe56d98e8ac896838feedddfb80034be4de7c8ba777f8a1799e2618805c3592d,2017-08-29T01:34:09.233000 -CVE-2014-0398,0,1,de4608e00bf1eaae6b212c054123ec763cb4f2688a0adeee144446191fce60cc,2024-11-21T02:02:01.240000 -CVE-2014-0399,0,1,5994c9793ef8507c996cb512d0cf7874d610bbe4f4d6b3e90fda2cbd3b016713,2024-11-21T02:02:01.363000 -CVE-2014-0400,0,1,24e06acda7e9d02d12a835d32e2300d6f44d1632084224c7c553884917db9f09,2024-11-21T02:02:01.483000 -CVE-2014-0401,0,1,3cd44c24b17fc994b4cc6834c2e9120e580a7b0efc1fa95eafd06789aa2dc97e,2024-11-21T02:02:01.607000 -CVE-2014-0402,0,1,c396f45f1820ec99673f033a0a48477e79c4d776c4fa7665c834afb3392d8aef,2024-11-21T02:02:01.780000 -CVE-2014-0403,0,1,3d8b44d69a4aaf43cf0f99ceecf5929720ca5b2fe6891630d724741d9309b105,2024-11-21T02:02:01.943000 -CVE-2014-0404,0,1,301f921139129cd488e073cf0ccd4abf338077381fd447a6d098baa2b3ca7e83,2024-11-21T02:02:02.107000 -CVE-2014-0405,0,1,3fe1665a796ae97674d321d9fffa30f6fd0d508df1dd9a6e9cd6c0bde722ad25,2024-11-21T02:02:02.243000 -CVE-2014-0406,0,1,0b16f1c8407135b7992b39c121f368d1b4df38e0eaa5d9c5349c2ae70df04d4b,2024-11-21T02:02:02.380000 -CVE-2014-0407,0,1,a766788ecc0cd711d58f5d6fd1b38f36c5573b6be01dcef800214763adf374c2,2024-11-21T02:02:02.527000 -CVE-2014-0408,0,1,0d9978b4cd5592be3eaf517407045215747bd7e6de029afddfa053654764f16f,2024-11-21T02:02:02.673000 +CVE-2014-0398,0,0,de4608e00bf1eaae6b212c054123ec763cb4f2688a0adeee144446191fce60cc,2024-11-21T02:02:01.240000 +CVE-2014-0399,0,0,5994c9793ef8507c996cb512d0cf7874d610bbe4f4d6b3e90fda2cbd3b016713,2024-11-21T02:02:01.363000 +CVE-2014-0400,0,0,24e06acda7e9d02d12a835d32e2300d6f44d1632084224c7c553884917db9f09,2024-11-21T02:02:01.483000 +CVE-2014-0401,0,0,3cd44c24b17fc994b4cc6834c2e9120e580a7b0efc1fa95eafd06789aa2dc97e,2024-11-21T02:02:01.607000 +CVE-2014-0402,0,0,c396f45f1820ec99673f033a0a48477e79c4d776c4fa7665c834afb3392d8aef,2024-11-21T02:02:01.780000 +CVE-2014-0403,0,0,3d8b44d69a4aaf43cf0f99ceecf5929720ca5b2fe6891630d724741d9309b105,2024-11-21T02:02:01.943000 +CVE-2014-0404,0,0,301f921139129cd488e073cf0ccd4abf338077381fd447a6d098baa2b3ca7e83,2024-11-21T02:02:02.107000 +CVE-2014-0405,0,0,3fe1665a796ae97674d321d9fffa30f6fd0d508df1dd9a6e9cd6c0bde722ad25,2024-11-21T02:02:02.243000 +CVE-2014-0406,0,0,0b16f1c8407135b7992b39c121f368d1b4df38e0eaa5d9c5349c2ae70df04d4b,2024-11-21T02:02:02.380000 +CVE-2014-0407,0,0,a766788ecc0cd711d58f5d6fd1b38f36c5573b6be01dcef800214763adf374c2,2024-11-21T02:02:02.527000 +CVE-2014-0408,0,0,0d9978b4cd5592be3eaf517407045215747bd7e6de029afddfa053654764f16f,2024-11-21T02:02:02.673000 CVE-2014-0409,0,0,584dd30dce48aaa110f07443401de6fd27f77a226585e3b5e4e9626c58d45484,2023-11-07T02:18:21.063000 -CVE-2014-0410,0,1,53112046e236f0cfd0b3233f83358233a74d552c3c1d3fb6831bac19d8e752d2,2024-11-21T02:02:02.837000 -CVE-2014-0411,0,1,e3c469a0dfe4ed0bf78e346b745db00d22a8a1f2f0fd9741df7f140334431156,2024-11-21T02:02:03.003000 -CVE-2014-0412,0,1,1d5709f02739c6645e83f5a72c0c59fcd8952ba9e5f707315f0472f26e66b322,2024-11-21T02:02:03.253000 -CVE-2014-0413,0,1,385345b06935863201183c87b71a08e55c7cbc60947cb63824bfc01c936dd652,2024-11-21T02:02:03.430000 -CVE-2014-0414,0,1,04585b936200282ece688b45c8257d329d12f82bdcf875da9f8937981504f406,2024-11-21T02:02:03.547000 -CVE-2014-0415,0,1,883c6a3847d48beef0f88b42ea3a36b46001a0335d078eb6b0d31db3e7876bc2,2024-11-21T02:02:03.660000 -CVE-2014-0416,0,1,3249bc261cf1ecc44e315a58c430c9be10be2fac267b50a3452fb4148cb8034c,2024-11-21T02:02:03.823000 -CVE-2014-0417,0,1,c4ad008b0513dfdfecbd6f880228f13e6799e7b958aaa52bf5ceed1e535226b3,2024-11-21T02:02:04.023000 -CVE-2014-0418,0,1,42a1e75384fba99aaa7c38f2e4fed9cbb6f03682f48cfd562e24bc5ef25b7cf9,2024-11-21T02:02:04.217000 -CVE-2014-0419,0,1,56e872cd365742b796c2dbcee50ddaaa0e25c602ca1d10be213c93db965577fc,2024-11-21T02:02:04.397000 -CVE-2014-0420,0,1,ee8558dca26565d7a0bf581848365165843c9c1d9f0abfaadb2f789704ca133d,2024-11-21T02:02:04.530000 -CVE-2014-0421,0,1,9fd1f218ff0b7c732f8acb490153b91240b591b0a3526c5ca12a9a748cb5993a,2024-11-21T02:02:04.700000 -CVE-2014-0422,0,1,be1704c8c25fc8ac5310e0c2a3b739e2c0ef6bbc5fda0a2116ffe20f3d8a6916,2024-11-21T02:02:04.823000 -CVE-2014-0423,0,1,bb744009eae843af875b34b4c743aae77b3f79b5ec99752eb1d32f3a6d415a50,2024-11-21T02:02:05.010000 -CVE-2014-0424,0,1,e6930633264334b5a3c52e8267a8604e83a66e01ba1dead1bc96457f90057dd5,2024-11-21T02:02:05.203000 -CVE-2014-0425,0,1,a100f1add796a6c354dea2de9ec0a5477672ff7a786a79c5a6cd449a6387e6a1,2024-11-21T02:02:05.383000 -CVE-2014-0426,0,1,9ccfe3ca7bc1ea3a789875b38ec403368b7850470ba40fba8282e462f5dcea20,2024-11-21T02:02:05.517000 -CVE-2014-0427,0,1,f787f97f6fcb939a1a34e3a4cff33f6b6cdfd5986a2dda83bd69f4db13e14102,2024-11-21T02:02:05.623000 -CVE-2014-0428,0,1,d23601860be2d67c288222a85f81b85ac0a5ff8f1a23246fe09d1565bf01691e,2024-11-21T02:02:05.760000 -CVE-2014-0429,0,1,8ca59a66fa63d4352e72fe9f1ae6afeccb3241a6e3a8ccfcfdf8628bced08c28,2024-11-21T02:02:05.960000 -CVE-2014-0430,0,1,b762704f41c31537ba01df50808c7440783f31dfe896469fbbdf70385f6b5f1f,2024-11-21T02:02:06.200000 -CVE-2014-0431,0,1,22624556163a9138c856867e1f26ec3d27bca2a94b85f70b35a864b19a78a1d1,2024-11-21T02:02:06.347000 -CVE-2014-0432,0,1,daa15dd57ed85082051f8fe8232d3f85c93ce4e369602c5285e1d97ebbb6b96a,2024-11-21T02:02:06.473000 -CVE-2014-0433,0,1,569c4571e69522dc0f0676effa350028a2bdde1f68206a7f09a1abe91f26b7d0,2024-11-21T02:02:06.600000 -CVE-2014-0434,0,1,54387b44b23d854e39b68ca4ca885e3cddef034b10c43c2c1b8e23e4d2b78d8c,2024-11-21T02:02:06.737000 -CVE-2014-0435,0,1,1e5c5b6da3ddd35da9c0acfe20d824e9a9ea9eefd0668274fd44d1e3865dd889,2024-11-21T02:02:06.860000 +CVE-2014-0410,0,0,53112046e236f0cfd0b3233f83358233a74d552c3c1d3fb6831bac19d8e752d2,2024-11-21T02:02:02.837000 +CVE-2014-0411,0,0,e3c469a0dfe4ed0bf78e346b745db00d22a8a1f2f0fd9741df7f140334431156,2024-11-21T02:02:03.003000 +CVE-2014-0412,0,0,1d5709f02739c6645e83f5a72c0c59fcd8952ba9e5f707315f0472f26e66b322,2024-11-21T02:02:03.253000 +CVE-2014-0413,0,0,385345b06935863201183c87b71a08e55c7cbc60947cb63824bfc01c936dd652,2024-11-21T02:02:03.430000 +CVE-2014-0414,0,0,04585b936200282ece688b45c8257d329d12f82bdcf875da9f8937981504f406,2024-11-21T02:02:03.547000 +CVE-2014-0415,0,0,883c6a3847d48beef0f88b42ea3a36b46001a0335d078eb6b0d31db3e7876bc2,2024-11-21T02:02:03.660000 +CVE-2014-0416,0,0,3249bc261cf1ecc44e315a58c430c9be10be2fac267b50a3452fb4148cb8034c,2024-11-21T02:02:03.823000 +CVE-2014-0417,0,0,c4ad008b0513dfdfecbd6f880228f13e6799e7b958aaa52bf5ceed1e535226b3,2024-11-21T02:02:04.023000 +CVE-2014-0418,0,0,42a1e75384fba99aaa7c38f2e4fed9cbb6f03682f48cfd562e24bc5ef25b7cf9,2024-11-21T02:02:04.217000 +CVE-2014-0419,0,0,56e872cd365742b796c2dbcee50ddaaa0e25c602ca1d10be213c93db965577fc,2024-11-21T02:02:04.397000 +CVE-2014-0420,0,0,ee8558dca26565d7a0bf581848365165843c9c1d9f0abfaadb2f789704ca133d,2024-11-21T02:02:04.530000 +CVE-2014-0421,0,0,9fd1f218ff0b7c732f8acb490153b91240b591b0a3526c5ca12a9a748cb5993a,2024-11-21T02:02:04.700000 +CVE-2014-0422,0,0,be1704c8c25fc8ac5310e0c2a3b739e2c0ef6bbc5fda0a2116ffe20f3d8a6916,2024-11-21T02:02:04.823000 +CVE-2014-0423,0,0,bb744009eae843af875b34b4c743aae77b3f79b5ec99752eb1d32f3a6d415a50,2024-11-21T02:02:05.010000 +CVE-2014-0424,0,0,e6930633264334b5a3c52e8267a8604e83a66e01ba1dead1bc96457f90057dd5,2024-11-21T02:02:05.203000 +CVE-2014-0425,0,0,a100f1add796a6c354dea2de9ec0a5477672ff7a786a79c5a6cd449a6387e6a1,2024-11-21T02:02:05.383000 +CVE-2014-0426,0,0,9ccfe3ca7bc1ea3a789875b38ec403368b7850470ba40fba8282e462f5dcea20,2024-11-21T02:02:05.517000 +CVE-2014-0427,0,0,f787f97f6fcb939a1a34e3a4cff33f6b6cdfd5986a2dda83bd69f4db13e14102,2024-11-21T02:02:05.623000 +CVE-2014-0428,0,0,d23601860be2d67c288222a85f81b85ac0a5ff8f1a23246fe09d1565bf01691e,2024-11-21T02:02:05.760000 +CVE-2014-0429,0,0,8ca59a66fa63d4352e72fe9f1ae6afeccb3241a6e3a8ccfcfdf8628bced08c28,2024-11-21T02:02:05.960000 +CVE-2014-0430,0,0,b762704f41c31537ba01df50808c7440783f31dfe896469fbbdf70385f6b5f1f,2024-11-21T02:02:06.200000 +CVE-2014-0431,0,0,22624556163a9138c856867e1f26ec3d27bca2a94b85f70b35a864b19a78a1d1,2024-11-21T02:02:06.347000 +CVE-2014-0432,0,0,daa15dd57ed85082051f8fe8232d3f85c93ce4e369602c5285e1d97ebbb6b96a,2024-11-21T02:02:06.473000 +CVE-2014-0433,0,0,569c4571e69522dc0f0676effa350028a2bdde1f68206a7f09a1abe91f26b7d0,2024-11-21T02:02:06.600000 +CVE-2014-0434,0,0,54387b44b23d854e39b68ca4ca885e3cddef034b10c43c2c1b8e23e4d2b78d8c,2024-11-21T02:02:06.737000 +CVE-2014-0435,0,0,1e5c5b6da3ddd35da9c0acfe20d824e9a9ea9eefd0668274fd44d1e3865dd889,2024-11-21T02:02:06.860000 CVE-2014-0436,0,0,818b26f427b6c78464770ed62561d9642c6846626439de14816cff5c16a799d4,2018-10-09T19:42:02.827000 -CVE-2014-0437,0,1,030fa1698a9fdcddde6082bef7dd6d27b592c2f4c6910d4e1aca6f21bd81d5ab,2024-11-21T02:02:07.177000 -CVE-2014-0438,0,1,9dc29b7a129fae00cbaea09d7ddec7063b2287065f37cd23cd137551d1850a11,2024-11-21T02:02:07.347000 -CVE-2014-0439,0,1,4aba05260cfc97ee291559a619ad6f342189e6c8cdbfd7bb6346f336048c20ea,2024-11-21T02:02:07.477000 -CVE-2014-0440,0,1,bdf5c8fb3c5e1a64eb235adc95168336f99051cbb1bdf8966b4981712007c4f2,2024-11-21T02:02:07.600000 -CVE-2014-0441,0,1,e7d0d122b6d80337ea0461bcd6448e11589e8b8c7b8c6cfb3ad093246b284821,2024-11-21T02:02:07.730000 -CVE-2014-0442,0,1,6299066da367ca1748b695ea79d29a98d138a89147008400ac74aa6b6fa4b73a,2024-11-21T02:02:07.853000 -CVE-2014-0443,0,1,e9e0f31691d8fd0cc63ea3f1c3ce139abbb7190b13783cfcb6db0486d8a8c721,2024-11-21T02:02:07.963000 -CVE-2014-0444,0,1,7d11f3bb792ea1a9851169f061cd91481084850771c9ef5a1a5757d46b4dcf17,2024-11-21T02:02:08.083000 -CVE-2014-0445,0,1,535c69fd083a9933576527704cfa73631ef2beef1711bfea6b810503e2a35731,2024-11-21T02:02:08.207000 -CVE-2014-0446,0,1,1030afbc3529e8943ff5a173b41afadaadf3609eb6b29ef858c701aa73761d6d,2024-11-21T02:02:08.353000 -CVE-2014-0447,0,1,8da675e90e5c71d2c2e2538a8bd6880512e0050336db85998d9e80aebee74ef6,2024-11-21T02:02:08.557000 -CVE-2014-0448,0,1,233aeef2037e23b7f4a3a455372d6fa3502065a6e86bfac89b7c83bf5ffac919,2024-11-21T02:02:08.677000 -CVE-2014-0449,0,1,a93ffb2ed463d65490d17f033eeafbfe1bbb541fce2ac06a8d136ca6ff1cbd29,2024-11-21T02:02:08.810000 -CVE-2014-0450,0,1,754ac0259480d9fa9312b5417958e0ee99a0f447d755564ea1d43124e44e4866,2024-11-21T02:02:08.960000 -CVE-2014-0451,0,1,8e429c6b00cc2bb5ddcfc9f73b4568cdace861ca5ee2fd026fc10bd947a270fd,2024-11-21T02:02:09.077000 -CVE-2014-0452,0,1,95415247110e3091f9e426f5ed590ea690bc2c6bc8169a06d469fd94c54b5e32,2024-11-21T02:02:09.267000 -CVE-2014-0453,0,1,80108a4db064b50d1ac5a61cf040035e31610e5582becadc3a4a83c7304636d6,2024-11-21T02:02:09.460000 -CVE-2014-0454,0,1,443ef539520b387e51ce9b24bbff880c86cd46d8be1ac1965e5862133e5b8a63,2024-11-21T02:02:09.750000 -CVE-2014-0455,0,1,3d7c16909c505306ae217041280c270489705308dbbf351d7f3e44e849cbd15d,2024-11-21T02:02:09.903000 -CVE-2014-0456,0,1,ed9f195efeafc3f8744c5889077b23dea0e5ffdb63459bb489d3032b5bf7d101,2024-11-21T02:02:10.070000 -CVE-2014-0457,0,1,cb0cefb6008f0822271a0e865a02cdeaffb2e78681039e5ae2d75f5a7af88d1e,2024-11-21T02:02:10.277000 -CVE-2014-0458,0,1,527ad0502098c2ca844e626df7d1eb942ba82cd2a5c10c5b014442ce9dc0712c,2024-11-21T02:02:10.480000 -CVE-2014-0459,0,1,f6425007959de6b50c5594530ca94ecfee756883b25f818d06e3931c71de36cb,2024-11-21T02:02:10.673000 -CVE-2014-0460,0,1,f39b2fe7f3b0b5893fb5b3c8495a822ae68790170be97d27735f3c07adf56a9b,2024-11-21T02:02:10.850000 -CVE-2014-0461,0,1,a069d02c9b66f0b2610a93bc5379d0a9a17db3713ee4f8f8ab3018717c32efa5,2024-11-21T02:02:11.087000 -CVE-2014-0462,0,1,75ee2fb6c5c9639f11dcb0d5dd96e5cc76d1348016ac56f243480c8d841a94ce,2024-11-21T02:02:11.277000 -CVE-2014-0463,0,1,342ffe7adeb0d1a0b3b2d5a02913977f0be399c0e75f639283b2e0bf9abbef3a,2024-11-21T02:02:11.410000 -CVE-2014-0464,0,1,6f1b0d70292a62ebc4df4e320a050307da9721f23a610571875989527ecb9564,2024-11-21T02:02:11.540000 -CVE-2014-0465,0,1,d3d8212676568232d841870d7a94b5431e0a3dcf5c6aa843d93d540266686d1f,2024-11-21T02:02:11.667000 -CVE-2014-0466,0,1,61a5611d00f7f82a53739935f7bf71c051126f8fc014d80fa12114a59661733c,2024-11-21T02:02:11.787000 -CVE-2014-0467,0,1,6611bd3b13b372afa7675f26d4ab05a299a191cb0f396f7ed13dde94ba7957f7,2024-11-21T02:02:11.910000 -CVE-2014-0469,0,1,6e33bd87439789d6a5c8801e93e799dfb21df8f259ca9fc90e8c7855143b0111,2024-11-21T02:02:12.040000 -CVE-2014-0470,0,1,e427c8a799f01f123691210719cf6dcb46a53e1be24ac479b7ffc7a426d9cacd,2024-11-21T02:02:12.153000 -CVE-2014-0471,0,1,cc9b1f826159995b31bd147c5a3e637c6427931d08843ab4600c3149fc5b3c68,2024-11-21T02:02:12.267000 -CVE-2014-0472,0,1,0140a6d360dec1dc1bc5f01abd3f3e55ceaf66911a856d269487c93bc8c56440,2024-11-21T02:02:12.393000 -CVE-2014-0473,0,1,c6792ea4993c7ad3a671abef4b6d533e65488b93e46ae7586dca846b014f1c38,2024-11-21T02:02:12.523000 -CVE-2014-0474,0,1,6617ff2972e2728d4aa6da910d12d7061b82d4ba69993460cf672505ab4ce019,2024-11-21T02:02:12.650000 +CVE-2014-0437,0,0,030fa1698a9fdcddde6082bef7dd6d27b592c2f4c6910d4e1aca6f21bd81d5ab,2024-11-21T02:02:07.177000 +CVE-2014-0438,0,0,9dc29b7a129fae00cbaea09d7ddec7063b2287065f37cd23cd137551d1850a11,2024-11-21T02:02:07.347000 +CVE-2014-0439,0,0,4aba05260cfc97ee291559a619ad6f342189e6c8cdbfd7bb6346f336048c20ea,2024-11-21T02:02:07.477000 +CVE-2014-0440,0,0,bdf5c8fb3c5e1a64eb235adc95168336f99051cbb1bdf8966b4981712007c4f2,2024-11-21T02:02:07.600000 +CVE-2014-0441,0,0,e7d0d122b6d80337ea0461bcd6448e11589e8b8c7b8c6cfb3ad093246b284821,2024-11-21T02:02:07.730000 +CVE-2014-0442,0,0,6299066da367ca1748b695ea79d29a98d138a89147008400ac74aa6b6fa4b73a,2024-11-21T02:02:07.853000 +CVE-2014-0443,0,0,e9e0f31691d8fd0cc63ea3f1c3ce139abbb7190b13783cfcb6db0486d8a8c721,2024-11-21T02:02:07.963000 +CVE-2014-0444,0,0,7d11f3bb792ea1a9851169f061cd91481084850771c9ef5a1a5757d46b4dcf17,2024-11-21T02:02:08.083000 +CVE-2014-0445,0,0,535c69fd083a9933576527704cfa73631ef2beef1711bfea6b810503e2a35731,2024-11-21T02:02:08.207000 +CVE-2014-0446,0,0,1030afbc3529e8943ff5a173b41afadaadf3609eb6b29ef858c701aa73761d6d,2024-11-21T02:02:08.353000 +CVE-2014-0447,0,0,8da675e90e5c71d2c2e2538a8bd6880512e0050336db85998d9e80aebee74ef6,2024-11-21T02:02:08.557000 +CVE-2014-0448,0,0,233aeef2037e23b7f4a3a455372d6fa3502065a6e86bfac89b7c83bf5ffac919,2024-11-21T02:02:08.677000 +CVE-2014-0449,0,0,a93ffb2ed463d65490d17f033eeafbfe1bbb541fce2ac06a8d136ca6ff1cbd29,2024-11-21T02:02:08.810000 +CVE-2014-0450,0,0,754ac0259480d9fa9312b5417958e0ee99a0f447d755564ea1d43124e44e4866,2024-11-21T02:02:08.960000 +CVE-2014-0451,0,0,8e429c6b00cc2bb5ddcfc9f73b4568cdace861ca5ee2fd026fc10bd947a270fd,2024-11-21T02:02:09.077000 +CVE-2014-0452,0,0,95415247110e3091f9e426f5ed590ea690bc2c6bc8169a06d469fd94c54b5e32,2024-11-21T02:02:09.267000 +CVE-2014-0453,0,0,80108a4db064b50d1ac5a61cf040035e31610e5582becadc3a4a83c7304636d6,2024-11-21T02:02:09.460000 +CVE-2014-0454,0,0,443ef539520b387e51ce9b24bbff880c86cd46d8be1ac1965e5862133e5b8a63,2024-11-21T02:02:09.750000 +CVE-2014-0455,0,0,3d7c16909c505306ae217041280c270489705308dbbf351d7f3e44e849cbd15d,2024-11-21T02:02:09.903000 +CVE-2014-0456,0,0,ed9f195efeafc3f8744c5889077b23dea0e5ffdb63459bb489d3032b5bf7d101,2024-11-21T02:02:10.070000 +CVE-2014-0457,0,0,cb0cefb6008f0822271a0e865a02cdeaffb2e78681039e5ae2d75f5a7af88d1e,2024-11-21T02:02:10.277000 +CVE-2014-0458,0,0,527ad0502098c2ca844e626df7d1eb942ba82cd2a5c10c5b014442ce9dc0712c,2024-11-21T02:02:10.480000 +CVE-2014-0459,0,0,f6425007959de6b50c5594530ca94ecfee756883b25f818d06e3931c71de36cb,2024-11-21T02:02:10.673000 +CVE-2014-0460,0,0,f39b2fe7f3b0b5893fb5b3c8495a822ae68790170be97d27735f3c07adf56a9b,2024-11-21T02:02:10.850000 +CVE-2014-0461,0,0,a069d02c9b66f0b2610a93bc5379d0a9a17db3713ee4f8f8ab3018717c32efa5,2024-11-21T02:02:11.087000 +CVE-2014-0462,0,0,75ee2fb6c5c9639f11dcb0d5dd96e5cc76d1348016ac56f243480c8d841a94ce,2024-11-21T02:02:11.277000 +CVE-2014-0463,0,0,342ffe7adeb0d1a0b3b2d5a02913977f0be399c0e75f639283b2e0bf9abbef3a,2024-11-21T02:02:11.410000 +CVE-2014-0464,0,0,6f1b0d70292a62ebc4df4e320a050307da9721f23a610571875989527ecb9564,2024-11-21T02:02:11.540000 +CVE-2014-0465,0,0,d3d8212676568232d841870d7a94b5431e0a3dcf5c6aa843d93d540266686d1f,2024-11-21T02:02:11.667000 +CVE-2014-0466,0,0,61a5611d00f7f82a53739935f7bf71c051126f8fc014d80fa12114a59661733c,2024-11-21T02:02:11.787000 +CVE-2014-0467,0,0,6611bd3b13b372afa7675f26d4ab05a299a191cb0f396f7ed13dde94ba7957f7,2024-11-21T02:02:11.910000 +CVE-2014-0469,0,0,6e33bd87439789d6a5c8801e93e799dfb21df8f259ca9fc90e8c7855143b0111,2024-11-21T02:02:12.040000 +CVE-2014-0470,0,0,e427c8a799f01f123691210719cf6dcb46a53e1be24ac479b7ffc7a426d9cacd,2024-11-21T02:02:12.153000 +CVE-2014-0471,0,0,cc9b1f826159995b31bd147c5a3e637c6427931d08843ab4600c3149fc5b3c68,2024-11-21T02:02:12.267000 +CVE-2014-0472,0,0,0140a6d360dec1dc1bc5f01abd3f3e55ceaf66911a856d269487c93bc8c56440,2024-11-21T02:02:12.393000 +CVE-2014-0473,0,0,c6792ea4993c7ad3a671abef4b6d533e65488b93e46ae7586dca846b014f1c38,2024-11-21T02:02:12.523000 +CVE-2014-0474,0,0,6617ff2972e2728d4aa6da910d12d7061b82d4ba69993460cf672505ab4ce019,2024-11-21T02:02:12.650000 CVE-2014-0475,0,0,722688e832a4e9cc664db6e7da61626fc4abf24d10649abef98e2e819b3c628a,2016-11-28T19:10:39.970000 CVE-2014-0476,0,0,3ad65404e9d6d9a16b7358a22154ec2b8aec014c5b32e4d908a6bea21fc61651,2017-09-19T01:36:55.843000 CVE-2014-0477,0,0,2427491852f59976b74143c9b5ee55152aa7bdb136f46857c81ed1c1e3cc6753,2015-11-04T19:00:07.147000 @@ -64970,45 +64970,45 @@ CVE-2014-0487,0,0,e39467f05fe88faff14d06ed1e254bb40bb78bf075d6180fa4b04a9f119029 CVE-2014-0488,0,0,6d31dfab90af7196d67681fda1220f0d0d8dd045ae87df68c88dcfdba9352677,2020-01-08T15:22:51.723000 CVE-2014-0489,0,0,24a0c310f27ea048bdc9de1be84c9b037659c48c97ec7270340e0e8a634d6c73,2020-01-08T15:22:51.723000 CVE-2014-0490,0,0,7dc672e3555c25786a6ac8ac4ffa68eb66412c6c826ae2ff11bdcb15514db660,2020-01-08T15:22:51.723000 -CVE-2014-0491,0,1,b5caf081d3772ef84f26cf2aada73bcf5d2c479b77141bcff258840fed2a4673,2024-11-21T02:02:14.747000 -CVE-2014-0492,0,1,660119d2260d72f67e626aab08063c5238faffd1d37c663a5d2da94deabbabb1,2024-11-21T02:02:14.877000 -CVE-2014-0493,0,1,27a023a1458786a8bc9889e4f9fc05bde9bc8894b04589a5c46c727334d00c05,2024-11-21T02:02:15.020000 -CVE-2014-0494,0,1,c4328ab05329b0104e69e8d475d8a96cd08f67f61c1f0f45e762e8e085f600ae,2024-11-21T02:02:15.143000 -CVE-2014-0495,0,1,ca8eb80263fd7f514a704c9971179a3fa2ee8498e9575332c7aecbb7e971507e,2024-11-21T02:02:15.270000 -CVE-2014-0496,0,1,ec016e65bc9414ff2f3fbcbecaf1803a2838ee176bf46d007df5a3f5690b0cb2,2024-11-21T02:02:15.390000 -CVE-2014-0497,0,1,8f0d0b17f2937858271411b87165b40261edd53be732582b397dd0f3c1a95e5a,2024-11-21T02:02:15.507000 -CVE-2014-0498,0,1,7bde03ce6e3d3d2b289df843426461fd1ac1a91feeb301703a28c7d9dd2591e9,2024-11-21T02:02:15.730000 -CVE-2014-0499,0,1,9965d8f3c0b192e987fc0f55c242e837cb92eee451b594354b47b877b220fcaf,2024-11-21T02:02:15.857000 -CVE-2014-0500,0,1,2568c099dcddabad361b329b8d493222d3a8cdf3f99852288b38e26ac63af15d,2024-11-21T02:02:15.990000 -CVE-2014-0501,0,1,b5490d0ef19318d0cfe31d86344f57d01549972c7920c8db7aa8cefa68ab09de,2024-11-21T02:02:16.103000 -CVE-2014-0502,0,1,317ec997a45246ec797c40ba0e9a9e33169d85971c0fc8e8b202782da954d5fb,2024-11-21T02:02:16.220000 -CVE-2014-0503,0,1,718f5b693f00f9af7cc890cf9e4ef84de20f3fd2904d26620e22b26f0caa9ce2,2024-11-21T02:02:16.423000 -CVE-2014-0504,0,1,61f07741f834678bd30183f1cc3951e025b25a4266d502e5abc585d5ed39ff00,2024-11-21T02:02:16.540000 -CVE-2014-0505,0,1,2468ade4b3131d9c72a330853d68328cfb74ef93f8d4f239bb92f645d32a2e1c,2024-11-21T02:02:16.647000 -CVE-2014-0506,0,1,3d305031e1a18f3b83e26a51c6b5fddc8686ceeea402b323485b28d5c618c516,2024-11-21T02:02:16.747000 -CVE-2014-0507,0,1,7470be7175a99c7878f71261313fa3d60230b8addf00c9b1a7f87da0a89affed,2024-11-21T02:02:16.863000 -CVE-2014-0508,0,1,eacf59ac47c2fa751b81509cf79e4afd40ae2d5a0e78db91aba0686457861c9e,2024-11-21T02:02:16.993000 -CVE-2014-0509,0,1,57871aa48ba48bf61557aee7077bef2b6cd6ba1df53f98e4f5d2024ce260900e,2024-11-21T02:02:17.130000 -CVE-2014-0510,0,1,94e0e7ea62663f942ac2add8400add7eb3b074817cb5218a9a4fa470c75052bb,2024-11-21T02:02:17.270000 -CVE-2014-0511,0,1,353dd286f407329949ca4fdd03b9e023a066dd57c4c313b507347357eaaa93d6,2024-11-21T02:02:17.373000 -CVE-2014-0512,0,1,fbcc8ed42e4b06216de021ea5773e46c45ce2a62663625897debb2c06e65b02e,2024-11-21T02:02:17.477000 -CVE-2014-0513,0,1,c74c554b55875e42db238bdd291795665bcd7b2a55d25631908978a632f500b8,2024-11-21T02:02:17.577000 -CVE-2014-0514,0,1,66818a2ad12e4f7cf85c71a8edb71ea1050714ab1034ec0b147b8ba00610fe5d,2024-11-21T02:02:17.680000 -CVE-2014-0515,0,1,55b99e5f79a10ef84489f2365bb2e80d4295a7aa71161bb9fb26a821760e877e,2024-11-21T02:02:17.790000 -CVE-2014-0516,0,1,f6c30111274c6e1b2725cbfc29f32c8f2f78ecbb26c798a937f489ba93e55b49,2024-11-21T02:02:17.917000 -CVE-2014-0517,0,1,7fd6d5f1450098e4ad793eafe0fc55a5493b65ae45803bdcc64a7adf7be1b060,2024-11-21T02:02:18.030000 -CVE-2014-0518,0,1,a3fb98f291dea1f98daa7e82731e3d417b0f1619be7a18aa17f8bb0b70c08337,2024-11-21T02:02:18.140000 -CVE-2014-0519,0,1,5ba331706912aa5aea3ff08ea969cca045e86dbf3899ec3e6352ca723be1cf42,2024-11-21T02:02:18.257000 -CVE-2014-0520,0,1,9fa11d1e5cdc764d4bdbfe0ed61c65d34270a70dab5202ba7416cf7863811c6f,2024-11-21T02:02:18.377000 -CVE-2014-0521,0,1,b810ea133165a24325b7c5388e87203a04c8125101a641aa0b4aac69cdf6dd8a,2024-11-21T02:02:18.490000 -CVE-2014-0522,0,1,6d799384786976589604a30206a97c2693363902fe679c23d8f60d2000d3b533,2024-11-21T02:02:18.600000 -CVE-2014-0523,0,1,868dded3848d94e62157eee8fd4d2cb06edcb3876f7f533d05a3b81f546b0d3f,2024-11-21T02:02:18.723000 -CVE-2014-0524,0,1,c59ece4c999490d0b87383fb09d3f4a7cbed68b461d4aefd4216dd4f72d4a890,2024-11-21T02:02:18.880000 -CVE-2014-0525,0,1,6624cd1452ed8e9fc4b5607155049f4a9981fc59bb90bc2ceb78e46e6a71a617,2024-11-21T02:02:19.013000 -CVE-2014-0526,0,1,d2e2d6657f363e95e2d29021205334b37396dd8c4e4c1954a6d430eaa8dbe202,2024-11-21T02:02:19.147000 -CVE-2014-0527,0,1,62fcaaef19a831876fb5ae766748ac60f0724a843f32891aa964b9b21a28040b,2024-11-21T02:02:19.270000 -CVE-2014-0528,0,1,1e620d87f35987138677f0f705dceb9d581a1a1a064b84e662d5fa5653f25cad,2024-11-21T02:02:19.393000 -CVE-2014-0529,0,1,02932f3e8465f6f24ab53934a6f8eedf64e13c3d4d9a38cf7843d5fbfac4b67d,2024-11-21T02:02:19.523000 +CVE-2014-0491,0,0,b5caf081d3772ef84f26cf2aada73bcf5d2c479b77141bcff258840fed2a4673,2024-11-21T02:02:14.747000 +CVE-2014-0492,0,0,660119d2260d72f67e626aab08063c5238faffd1d37c663a5d2da94deabbabb1,2024-11-21T02:02:14.877000 +CVE-2014-0493,0,0,27a023a1458786a8bc9889e4f9fc05bde9bc8894b04589a5c46c727334d00c05,2024-11-21T02:02:15.020000 +CVE-2014-0494,0,0,c4328ab05329b0104e69e8d475d8a96cd08f67f61c1f0f45e762e8e085f600ae,2024-11-21T02:02:15.143000 +CVE-2014-0495,0,0,ca8eb80263fd7f514a704c9971179a3fa2ee8498e9575332c7aecbb7e971507e,2024-11-21T02:02:15.270000 +CVE-2014-0496,0,0,ec016e65bc9414ff2f3fbcbecaf1803a2838ee176bf46d007df5a3f5690b0cb2,2024-11-21T02:02:15.390000 +CVE-2014-0497,0,0,8f0d0b17f2937858271411b87165b40261edd53be732582b397dd0f3c1a95e5a,2024-11-21T02:02:15.507000 +CVE-2014-0498,0,0,7bde03ce6e3d3d2b289df843426461fd1ac1a91feeb301703a28c7d9dd2591e9,2024-11-21T02:02:15.730000 +CVE-2014-0499,0,0,9965d8f3c0b192e987fc0f55c242e837cb92eee451b594354b47b877b220fcaf,2024-11-21T02:02:15.857000 +CVE-2014-0500,0,0,2568c099dcddabad361b329b8d493222d3a8cdf3f99852288b38e26ac63af15d,2024-11-21T02:02:15.990000 +CVE-2014-0501,0,0,b5490d0ef19318d0cfe31d86344f57d01549972c7920c8db7aa8cefa68ab09de,2024-11-21T02:02:16.103000 +CVE-2014-0502,0,0,317ec997a45246ec797c40ba0e9a9e33169d85971c0fc8e8b202782da954d5fb,2024-11-21T02:02:16.220000 +CVE-2014-0503,0,0,718f5b693f00f9af7cc890cf9e4ef84de20f3fd2904d26620e22b26f0caa9ce2,2024-11-21T02:02:16.423000 +CVE-2014-0504,0,0,61f07741f834678bd30183f1cc3951e025b25a4266d502e5abc585d5ed39ff00,2024-11-21T02:02:16.540000 +CVE-2014-0505,0,0,2468ade4b3131d9c72a330853d68328cfb74ef93f8d4f239bb92f645d32a2e1c,2024-11-21T02:02:16.647000 +CVE-2014-0506,0,0,3d305031e1a18f3b83e26a51c6b5fddc8686ceeea402b323485b28d5c618c516,2024-11-21T02:02:16.747000 +CVE-2014-0507,0,0,7470be7175a99c7878f71261313fa3d60230b8addf00c9b1a7f87da0a89affed,2024-11-21T02:02:16.863000 +CVE-2014-0508,0,0,eacf59ac47c2fa751b81509cf79e4afd40ae2d5a0e78db91aba0686457861c9e,2024-11-21T02:02:16.993000 +CVE-2014-0509,0,0,57871aa48ba48bf61557aee7077bef2b6cd6ba1df53f98e4f5d2024ce260900e,2024-11-21T02:02:17.130000 +CVE-2014-0510,0,0,94e0e7ea62663f942ac2add8400add7eb3b074817cb5218a9a4fa470c75052bb,2024-11-21T02:02:17.270000 +CVE-2014-0511,0,0,353dd286f407329949ca4fdd03b9e023a066dd57c4c313b507347357eaaa93d6,2024-11-21T02:02:17.373000 +CVE-2014-0512,0,0,fbcc8ed42e4b06216de021ea5773e46c45ce2a62663625897debb2c06e65b02e,2024-11-21T02:02:17.477000 +CVE-2014-0513,0,0,c74c554b55875e42db238bdd291795665bcd7b2a55d25631908978a632f500b8,2024-11-21T02:02:17.577000 +CVE-2014-0514,0,0,66818a2ad12e4f7cf85c71a8edb71ea1050714ab1034ec0b147b8ba00610fe5d,2024-11-21T02:02:17.680000 +CVE-2014-0515,0,0,55b99e5f79a10ef84489f2365bb2e80d4295a7aa71161bb9fb26a821760e877e,2024-11-21T02:02:17.790000 +CVE-2014-0516,0,0,f6c30111274c6e1b2725cbfc29f32c8f2f78ecbb26c798a937f489ba93e55b49,2024-11-21T02:02:17.917000 +CVE-2014-0517,0,0,7fd6d5f1450098e4ad793eafe0fc55a5493b65ae45803bdcc64a7adf7be1b060,2024-11-21T02:02:18.030000 +CVE-2014-0518,0,0,a3fb98f291dea1f98daa7e82731e3d417b0f1619be7a18aa17f8bb0b70c08337,2024-11-21T02:02:18.140000 +CVE-2014-0519,0,0,5ba331706912aa5aea3ff08ea969cca045e86dbf3899ec3e6352ca723be1cf42,2024-11-21T02:02:18.257000 +CVE-2014-0520,0,0,9fa11d1e5cdc764d4bdbfe0ed61c65d34270a70dab5202ba7416cf7863811c6f,2024-11-21T02:02:18.377000 +CVE-2014-0521,0,0,b810ea133165a24325b7c5388e87203a04c8125101a641aa0b4aac69cdf6dd8a,2024-11-21T02:02:18.490000 +CVE-2014-0522,0,0,6d799384786976589604a30206a97c2693363902fe679c23d8f60d2000d3b533,2024-11-21T02:02:18.600000 +CVE-2014-0523,0,0,868dded3848d94e62157eee8fd4d2cb06edcb3876f7f533d05a3b81f546b0d3f,2024-11-21T02:02:18.723000 +CVE-2014-0524,0,0,c59ece4c999490d0b87383fb09d3f4a7cbed68b461d4aefd4216dd4f72d4a890,2024-11-21T02:02:18.880000 +CVE-2014-0525,0,0,6624cd1452ed8e9fc4b5607155049f4a9981fc59bb90bc2ceb78e46e6a71a617,2024-11-21T02:02:19.013000 +CVE-2014-0526,0,0,d2e2d6657f363e95e2d29021205334b37396dd8c4e4c1954a6d430eaa8dbe202,2024-11-21T02:02:19.147000 +CVE-2014-0527,0,0,62fcaaef19a831876fb5ae766748ac60f0724a843f32891aa964b9b21a28040b,2024-11-21T02:02:19.270000 +CVE-2014-0528,0,0,1e620d87f35987138677f0f705dceb9d581a1a1a064b84e662d5fa5653f25cad,2024-11-21T02:02:19.393000 +CVE-2014-0529,0,0,02932f3e8465f6f24ab53934a6f8eedf64e13c3d4d9a38cf7843d5fbfac4b67d,2024-11-21T02:02:19.523000 CVE-2014-0530,0,0,f6418d404313a9a89a999938018f8c7f389950e118502f30642839fc73670a32,2023-11-07T02:18:22.850000 CVE-2014-0531,0,0,e576278daf765284e29847092239c44ae8f2e9b59d94bdc41be1d8274470ee0f,2017-12-22T02:29:12.480000 CVE-2014-0532,0,0,ca387c662aabbe594bc9901d1f1c6d09bbe87efc0ac5e620a6bf3c670c564e12,2017-12-22T02:29:12.607000 @@ -65070,11 +65070,11 @@ CVE-2014-0587,0,0,64ed313a5a756e1b26af4b388c626cf73ca2ce47312c48159a6413acd71459 CVE-2014-0588,0,0,769867bf7af90bec60a3e952b15876f262802b777c1cb174d4543abd2b499318,2018-12-13T17:11:51.180000 CVE-2014-0589,0,0,e7f02b8ffe11345da82d14ef54181fc96af7e98d40f699464e8319fbdd1b3af7,2018-12-13T17:12:00.803000 CVE-2014-0590,0,0,cf464e978d26c9b638f40396348326a664626dd099472ed49e8c65a91ac41fda,2018-12-13T17:13:25.243000 -CVE-2014-0591,0,1,6de8a9eecf38eb268c1d36949d9c2cbbc9441d53241b1b129e5920b3bac074c9,2024-11-21T02:02:27.370000 -CVE-2014-0592,0,1,12d2736f538a31376297343076b3f09e3d215185dc3c3f9063870d3202bd97e1,2024-11-21T02:02:27.557000 +CVE-2014-0591,0,0,6de8a9eecf38eb268c1d36949d9c2cbbc9441d53241b1b129e5920b3bac074c9,2024-11-21T02:02:27.370000 +CVE-2014-0592,0,0,12d2736f538a31376297343076b3f09e3d215185dc3c3f9063870d3202bd97e1,2024-11-21T02:02:27.557000 CVE-2014-0593,0,0,86be886c3f89cc5ad7abdc3547c8ac5ab3d0025e6369dc9e049d548f3087f39b,2023-11-07T02:18:24.060000 CVE-2014-0594,0,0,94f96b1f1537715cf1a86f8ac3e2dd6b84cbbb92f6c7c0f5f9a263eb8c83191e,2023-11-07T02:18:24.333000 -CVE-2014-0595,0,1,59a8cdc282ecff5bf859fc67ecf840f7f1c2feda1a02cc120316c05a2c643c90,2024-11-21T02:02:27.950000 +CVE-2014-0595,0,0,59a8cdc282ecff5bf859fc67ecf840f7f1c2feda1a02cc120316c05a2c643c90,2024-11-21T02:02:27.950000 CVE-2014-0598,0,0,5c891facae55cf3a417cfd2343d9c447d2fe1c42961aa4548ef9a248af780b6d,2020-02-24T14:15:20.603000 CVE-2014-0599,0,0,a113c072cdf4745eed614abfdd2dd8730c6b66fa43c2103f68aaaf395f4491a9,2020-02-24T14:15:20.603000 CVE-2014-0600,0,0,f80a6192d534d1a9a094613c69733fb8291218e6d54f7f185dde066c04c8056a,2017-01-07T02:59:33.313000 @@ -65087,224 +65087,224 @@ CVE-2014-0607,0,0,2762377ba59dfd13c89d4eae06936ad538800e710e5756f3447de55c75dcbd CVE-2014-0609,0,0,f1b786bd3b30c5c65f0eba92d70b77d97a85400b7717d4ad76f07c6324e7f04b,2020-02-24T14:15:22.930000 CVE-2014-0610,0,0,df65ff039bf2670b2fab3a743773ce252c87b69a3853d5b9ca63caa3d6468f75,2017-08-29T01:34:13.013000 CVE-2014-0611,0,0,0defa17aef34ad419df1d860358efd85e1045537a488e55101c992777913a63c,2017-09-22T01:29:00.810000 -CVE-2014-0612,0,1,0dc9ee16171a543074f43878d963d4ca41ea3c90e08c9eb3ee4babb259f732ab,2024-11-21T02:02:29.710000 -CVE-2014-0613,0,1,5f4f391651e6cd2d1c61b2ea1dbc2531ad4f4c84ab4e4afd0be6c6d768c8f0b6,2024-11-21T02:02:29.847000 -CVE-2014-0614,0,1,14ac757ce0d95a60781e91053728bd56e2abc1cee86ce41c1ae8b26e5beae95f,2024-11-21T02:02:29.983000 -CVE-2014-0615,0,1,a1d2b34896390161d8e2c2df5d1d6b1f181ff16c2046df2541ba747614e96829,2024-11-21T02:02:30.123000 -CVE-2014-0616,0,1,a40ea84ed175d61b05464a9a9fff9f833bbf21755e937e84dfa69510c26ec903,2024-11-21T02:02:30.267000 -CVE-2014-0617,0,1,bb21190104405af079876cba737072ec586ba3778756a41ca7920ec50ce9143b,2024-11-21T02:02:30.410000 -CVE-2014-0618,0,1,ef89b429671eef4cd48081c8d04196d116e312c22ac48a720bad3c933e364041,2024-11-21T02:02:30.550000 +CVE-2014-0612,0,0,0dc9ee16171a543074f43878d963d4ca41ea3c90e08c9eb3ee4babb259f732ab,2024-11-21T02:02:29.710000 +CVE-2014-0613,0,0,5f4f391651e6cd2d1c61b2ea1dbc2531ad4f4c84ab4e4afd0be6c6d768c8f0b6,2024-11-21T02:02:29.847000 +CVE-2014-0614,0,0,14ac757ce0d95a60781e91053728bd56e2abc1cee86ce41c1ae8b26e5beae95f,2024-11-21T02:02:29.983000 +CVE-2014-0615,0,0,a1d2b34896390161d8e2c2df5d1d6b1f181ff16c2046df2541ba747614e96829,2024-11-21T02:02:30.123000 +CVE-2014-0616,0,0,a40ea84ed175d61b05464a9a9fff9f833bbf21755e937e84dfa69510c26ec903,2024-11-21T02:02:30.267000 +CVE-2014-0617,0,0,bb21190104405af079876cba737072ec586ba3778756a41ca7920ec50ce9143b,2024-11-21T02:02:30.410000 +CVE-2014-0618,0,0,ef89b429671eef4cd48081c8d04196d116e312c22ac48a720bad3c933e364041,2024-11-21T02:02:30.550000 CVE-2014-0619,0,0,bfe9b924327b7b06dd223ded67e6df005ad90414dcc5e1cbc2141eff8738ce63,2017-08-29T01:34:13.137000 -CVE-2014-0620,0,1,ac0e12fb75f217c77fe042bc9d3934075d7708107a4882c488ed7436e6f72284,2024-11-21T02:02:30.840000 -CVE-2014-0621,0,1,4b23cc44e820a2045788fcc96af1d5695dd12274ff557f045b5db66b6b049961,2024-11-21T02:02:30.973000 -CVE-2014-0622,0,1,b3e858b1b385cd63c95d4b972fa1ac08dd0399a1317f2b0fab62bb27b20c9f67,2024-11-21T02:02:31.103000 -CVE-2014-0623,0,1,77860018fdc2b4f7d05f6cd008926479b6d3a2b170f9909f1ed8615a3e096ae1,2024-11-21T02:02:31.203000 -CVE-2014-0624,0,1,5af57f3ef2d11b78fa0e0e450eb9c112196ad1e0708f6f0c38bef92b2325c956,2024-11-21T02:02:31.300000 -CVE-2014-0625,0,1,be0698961fb12f78e755f956fe1b5b224143823b5626815e882d4e88e58bfbff,2024-11-21T02:02:31.403000 -CVE-2014-0626,0,1,0aba511dae74a89af7415892bbf2a6c9992e3f444725c2ba994441067bfde51f,2024-11-21T02:02:31.507000 -CVE-2014-0627,0,1,241100fd8be869120302fe63fc1a91a2987c2cf67c2859062bea06834449144c,2024-11-21T02:02:31.617000 -CVE-2014-0628,0,1,bc0e25b9fc66a3b05f462cfa9246e6cb9a22f68c572c8cc610a8b72984929f86,2024-11-21T02:02:31.723000 -CVE-2014-0629,0,1,6c4d7a012e6a975150565a601f2134aa702e0882a5aaf26a174d423a1c9f93d3,2024-11-21T02:02:31.830000 -CVE-2014-0630,0,1,a0b8e30320431a2d7a4f6d000e4ce100e9d3526db450af2dbaf95df46464787d,2024-11-21T02:02:31.927000 +CVE-2014-0620,0,0,ac0e12fb75f217c77fe042bc9d3934075d7708107a4882c488ed7436e6f72284,2024-11-21T02:02:30.840000 +CVE-2014-0621,0,0,4b23cc44e820a2045788fcc96af1d5695dd12274ff557f045b5db66b6b049961,2024-11-21T02:02:30.973000 +CVE-2014-0622,0,0,b3e858b1b385cd63c95d4b972fa1ac08dd0399a1317f2b0fab62bb27b20c9f67,2024-11-21T02:02:31.103000 +CVE-2014-0623,0,0,77860018fdc2b4f7d05f6cd008926479b6d3a2b170f9909f1ed8615a3e096ae1,2024-11-21T02:02:31.203000 +CVE-2014-0624,0,0,5af57f3ef2d11b78fa0e0e450eb9c112196ad1e0708f6f0c38bef92b2325c956,2024-11-21T02:02:31.300000 +CVE-2014-0625,0,0,be0698961fb12f78e755f956fe1b5b224143823b5626815e882d4e88e58bfbff,2024-11-21T02:02:31.403000 +CVE-2014-0626,0,0,0aba511dae74a89af7415892bbf2a6c9992e3f444725c2ba994441067bfde51f,2024-11-21T02:02:31.507000 +CVE-2014-0627,0,0,241100fd8be869120302fe63fc1a91a2987c2cf67c2859062bea06834449144c,2024-11-21T02:02:31.617000 +CVE-2014-0628,0,0,bc0e25b9fc66a3b05f462cfa9246e6cb9a22f68c572c8cc610a8b72984929f86,2024-11-21T02:02:31.723000 +CVE-2014-0629,0,0,6c4d7a012e6a975150565a601f2134aa702e0882a5aaf26a174d423a1c9f93d3,2024-11-21T02:02:31.830000 +CVE-2014-0630,0,0,a0b8e30320431a2d7a4f6d000e4ce100e9d3526db450af2dbaf95df46464787d,2024-11-21T02:02:31.927000 CVE-2014-0631,0,0,d25c9e3b43354607bcaf84d0cf6d0060902053dd660f94d1cd34394a80ea4b09,2023-11-07T02:18:24.960000 -CVE-2014-0632,0,1,8d2fcaffe273617b5325d750fe30a7d24f86b5e67838027a20b32830eabd3ae5,2024-11-21T02:02:32.053000 -CVE-2014-0633,0,1,e1e0cfd86f5b1b9756007a70cc47d25ae25f7b24cfff0c236a7db9defa4cf77a,2024-11-21T02:02:32.163000 -CVE-2014-0634,0,1,d4053391509a43559abd87c97a781a54ff974659f21ba7bc6e1fd6ff057631dc,2024-11-21T02:02:32.267000 -CVE-2014-0635,0,1,bdba2fd22efcfbaa8b95d994dd9651f3726e8d9617ee174b7886f65c7f6b19f4,2024-11-21T02:02:32.370000 -CVE-2014-0636,0,1,e19ee94354dad3b174f307e6e67aaaa854c8acd8e949f6f57d9a49e6fc3118c9,2024-11-21T02:02:32.467000 -CVE-2014-0637,0,1,d121b23dbec6c97c8a8fc6a58056541f5de6fdc518f04091dc1e4b21181b21d1,2024-11-21T02:02:32.590000 -CVE-2014-0638,0,1,ee8a198ab464c3ebaa9bea2e57d25a97837b28ef2ff76bbf0191c7ec2b6b99df,2024-11-21T02:02:32.700000 -CVE-2014-0639,0,1,3febd337e55e48ec0b6452c4ec324e815b429762caffaf6c92582093cb962b92,2024-11-21T02:02:32.803000 +CVE-2014-0632,0,0,8d2fcaffe273617b5325d750fe30a7d24f86b5e67838027a20b32830eabd3ae5,2024-11-21T02:02:32.053000 +CVE-2014-0633,0,0,e1e0cfd86f5b1b9756007a70cc47d25ae25f7b24cfff0c236a7db9defa4cf77a,2024-11-21T02:02:32.163000 +CVE-2014-0634,0,0,d4053391509a43559abd87c97a781a54ff974659f21ba7bc6e1fd6ff057631dc,2024-11-21T02:02:32.267000 +CVE-2014-0635,0,0,bdba2fd22efcfbaa8b95d994dd9651f3726e8d9617ee174b7886f65c7f6b19f4,2024-11-21T02:02:32.370000 +CVE-2014-0636,0,0,e19ee94354dad3b174f307e6e67aaaa854c8acd8e949f6f57d9a49e6fc3118c9,2024-11-21T02:02:32.467000 +CVE-2014-0637,0,0,d121b23dbec6c97c8a8fc6a58056541f5de6fdc518f04091dc1e4b21181b21d1,2024-11-21T02:02:32.590000 +CVE-2014-0638,0,0,ee8a198ab464c3ebaa9bea2e57d25a97837b28ef2ff76bbf0191c7ec2b6b99df,2024-11-21T02:02:32.700000 +CVE-2014-0639,0,0,3febd337e55e48ec0b6452c4ec324e815b429762caffaf6c92582093cb962b92,2024-11-21T02:02:32.803000 CVE-2014-0640,0,0,7c267a972878dc9bcc0d6a6244b3df0a39adc7608eaa21433e89fc64b97f9dee,2017-08-29T01:34:13.217000 CVE-2014-0641,0,0,3065010839040afceeccff8707a229281020988ea8f70aaaf64b56e54f95aa03,2017-08-29T01:34:13.263000 -CVE-2014-0642,0,1,2cf6e2ee151c2bb4df097cd0179ec0fd1e773ef745b78e68e27c20eb1ec38abf,2024-11-21T02:02:33.113000 -CVE-2014-0643,0,1,0519beb160c5ba870e36591278e31c0402214ec4eed833ad93f618d89c148965,2024-11-21T02:02:33.220000 -CVE-2014-0644,0,1,f484ef461e0479343ab7c5f2a952c2eaa88137d7abdb54be8a2b8de5a6da0481,2024-11-21T02:02:33.330000 -CVE-2014-0645,0,1,fade45e60f36be7b211b1352ff8d845b4fd6416739582b6a542bc4733de93b51,2024-11-21T02:02:34.317000 -CVE-2014-0646,0,1,cd330f6ce96e5784dbaeef6a255929cf8ed4073048c98a22af97e6a64903f2cd,2024-11-21T02:02:34.727000 -CVE-2014-0647,0,1,51d007c54e1b4f06e8ea9a5554b4e8eaeff1dee4b612b5cbe083d492b9a0ac45,2024-11-21T02:02:34.837000 -CVE-2014-0648,0,1,5b68dc4c4032d5002a4d6df44b631c92a503d8ed799a5d3b4fdf7992403983bb,2024-11-21T02:02:34.990000 -CVE-2014-0649,0,1,02f73bd96d5993ffba26bdc1cc523a47fdfe829024db9a372f8a83fad6f6e529,2024-11-21T02:02:35.107000 -CVE-2014-0650,0,1,87a5b16e20bd0a1da6616bcc4767369eeb48f9f737f1166720e8624aa247af8f,2024-11-21T02:02:35.237000 -CVE-2014-0651,0,1,7801ffa3bb2afeb7455ea97b928e0c35ad75ba9c348709c880cbb5e6eef4fa0c,2024-11-21T02:02:35.387000 -CVE-2014-0652,0,1,44aa9564c24ac72ba3631cfaae308a3bc77b7e38ac5eb59da32bf1b965c9e53f,2024-11-21T02:02:35.510000 -CVE-2014-0653,0,1,06e2227bed7f6fada30e52c7cf5ba378b5ffdc5b168a70972f11bea7c679a221,2024-11-21T02:02:35.630000 -CVE-2014-0654,0,1,debf800c9864c49c19c1c636acce751a104c0f9cc1dd0146d8b052e616ca014d,2024-11-21T02:02:35.747000 -CVE-2014-0655,0,1,b3a5571eeb6c71ad342bcca894eefc5cac13b3d39954946c8622a43756351d67,2024-11-21T02:02:35.893000 -CVE-2014-0656,0,1,4f8b563f4965215af0fa23878b979b40440392b7b9ead6e9961d3d321e308947,2024-11-21T02:02:36.017000 -CVE-2014-0657,0,1,3acdaea52375d018f417873e206b14f4dd63b98cbe066f7e6b5c1abd45066ecd,2024-11-21T02:02:36.123000 -CVE-2014-0658,0,1,6cdbb82dc82598f6990b775b5b45e8ed77801fc03c20d7e680e44bda74f811e6,2024-11-21T02:02:36.270000 -CVE-2014-0659,0,1,0e54c178cc3939c24e8cd966291f13a670a5a289fb4c6220ad1d76128f98c3e5,2024-11-21T02:02:36.400000 -CVE-2014-0660,0,1,963422a861ee9eae08a5bbfc83d067fe9f8a257f1b541512fb07761bef421979,2024-11-21T02:02:36.537000 -CVE-2014-0661,0,1,1866d77cfe005c965de69624f31c22d0a24764c8e1fa329f41764a82b040ff55,2024-11-21T02:02:36.660000 -CVE-2014-0662,0,1,7ab769869edb09dfaf982d14414808c396f7c03cbbf0b074ee568183a27c1f2e,2024-11-21T02:02:36.797000 -CVE-2014-0663,0,1,c7a8e826e74a74ae9c6655f72905bb3b8bb902e955db04b1cfec4c22a2e6467b,2024-11-21T02:02:36.917000 -CVE-2014-0664,0,1,593f0a03fcbe09585b0f756e628cde288093909c05f9fb9ed780dd5ed8889c3e,2024-11-21T02:02:37.043000 -CVE-2014-0665,0,1,430d45d3245e81d7f8c9cc5e80962329008fe8b0df03b474d2bd9d745d931dae,2024-11-21T02:02:37.190000 -CVE-2014-0666,0,1,7ff7d6989396cb739ce61a658262fb2460491a16dd417251bd8cfa4593c8ef65,2024-11-21T02:02:37.310000 -CVE-2014-0667,0,1,42e165c5a0bea76174124c75cde07f5b2ecc22cc9f19c4222a08eee4200c3242,2024-11-21T02:02:37.440000 -CVE-2014-0668,0,1,c6fe72ced805839b539bdebe32501ac7a44f22dd41ad778d4c6e0b380096f589,2024-11-21T02:02:37.557000 -CVE-2014-0669,0,1,727851b371308c5fb014f70124e1485dcffdbc8e9c98fa79581601e03b66b5e8,2024-11-21T02:02:37.680000 -CVE-2014-0670,0,1,35078c03d57ea0b3a59bbfcbc5c8d2003aaac963dad327235fa8f463416bca4d,2024-11-21T02:02:37.800000 -CVE-2014-0671,0,1,362b3754af9e0384f543468373b14be22c6832db904a42798fb660cf699a7bc9,2024-11-21T02:02:37.920000 -CVE-2014-0672,0,1,05c347789337cebff8bada2173df70f7568d358dc594792cc54f90191e36f35a,2024-11-21T02:02:38.030000 -CVE-2014-0673,0,1,78a67482f24b6d5b5d985b6951c5ebf95c81bd8652ee27b960a6744e017fee09,2024-11-21T02:02:38.143000 -CVE-2014-0674,0,1,a791efdb0188cf43c6837e07356de2eb399ca1316aab7a1a51c2c9eeead79a6e,2024-11-21T02:02:38.263000 -CVE-2014-0675,0,1,91938e1fe8cf92dfcb240662dc79a66254ecc0cb15cc323cc2962ce5ba01e191,2024-11-21T02:02:38.380000 -CVE-2014-0676,0,1,0f75e09cac8b7b173dc038a24107357f2ff3d0eba67d604c3aa9e1236b256b33,2024-11-21T02:02:38.493000 -CVE-2014-0677,0,1,7241e88017e5c7757dd7b75758f5aed5694a36e318563ab7059b373d59a09a27,2024-11-21T02:02:38.600000 -CVE-2014-0678,0,1,a9dad46bb85750845e46a530bf517e48c34d253ba7bcffeb3f875e97a3b5add3,2024-11-21T02:02:38.710000 -CVE-2014-0679,0,1,3e2703dd20611dec8c88b8aa291c685d6608bb5aba44d5d42456534de6914f60,2024-11-21T02:02:38.827000 -CVE-2014-0680,0,1,90fd6fb9640370ba0d7da6f0de0738a8711deee09b7bdfbe1ae151af6696b97a,2024-11-21T02:02:38.933000 -CVE-2014-0681,0,1,b77a72edbbe2c505847b999418bad40b1494329647769c3b6196e61993525009,2024-11-21T02:02:39.053000 -CVE-2014-0682,0,1,e4dbf449cc16bd444da410494359fc1cd9f6168204191a8045b730beb5452544,2024-11-21T02:02:39.163000 -CVE-2014-0683,0,1,b30631e2d92fcaa70ef43c0f52924a9c1766b884dd74cc9cfbdef389967bd680,2024-11-21T02:02:39.287000 -CVE-2014-0684,0,1,f67904d282373b46b0f69c3a7af07b5085f767e00460f8fa30fdaa8c02db417a,2024-11-21T02:02:39.407000 -CVE-2014-0685,0,1,cff272249010184c902b3b5c22cc23657073667a759f371b8635de4bb297514f,2024-11-21T02:02:39.520000 -CVE-2014-0686,0,1,f297aa2119c964a685c0d5e44c3db5b93bac57ae70508430901744b86ddd40a6,2024-11-21T02:02:39.650000 +CVE-2014-0642,0,0,2cf6e2ee151c2bb4df097cd0179ec0fd1e773ef745b78e68e27c20eb1ec38abf,2024-11-21T02:02:33.113000 +CVE-2014-0643,0,0,0519beb160c5ba870e36591278e31c0402214ec4eed833ad93f618d89c148965,2024-11-21T02:02:33.220000 +CVE-2014-0644,0,0,f484ef461e0479343ab7c5f2a952c2eaa88137d7abdb54be8a2b8de5a6da0481,2024-11-21T02:02:33.330000 +CVE-2014-0645,0,0,fade45e60f36be7b211b1352ff8d845b4fd6416739582b6a542bc4733de93b51,2024-11-21T02:02:34.317000 +CVE-2014-0646,0,0,cd330f6ce96e5784dbaeef6a255929cf8ed4073048c98a22af97e6a64903f2cd,2024-11-21T02:02:34.727000 +CVE-2014-0647,0,0,51d007c54e1b4f06e8ea9a5554b4e8eaeff1dee4b612b5cbe083d492b9a0ac45,2024-11-21T02:02:34.837000 +CVE-2014-0648,0,0,5b68dc4c4032d5002a4d6df44b631c92a503d8ed799a5d3b4fdf7992403983bb,2024-11-21T02:02:34.990000 +CVE-2014-0649,0,0,02f73bd96d5993ffba26bdc1cc523a47fdfe829024db9a372f8a83fad6f6e529,2024-11-21T02:02:35.107000 +CVE-2014-0650,0,0,87a5b16e20bd0a1da6616bcc4767369eeb48f9f737f1166720e8624aa247af8f,2024-11-21T02:02:35.237000 +CVE-2014-0651,0,0,7801ffa3bb2afeb7455ea97b928e0c35ad75ba9c348709c880cbb5e6eef4fa0c,2024-11-21T02:02:35.387000 +CVE-2014-0652,0,0,44aa9564c24ac72ba3631cfaae308a3bc77b7e38ac5eb59da32bf1b965c9e53f,2024-11-21T02:02:35.510000 +CVE-2014-0653,0,0,06e2227bed7f6fada30e52c7cf5ba378b5ffdc5b168a70972f11bea7c679a221,2024-11-21T02:02:35.630000 +CVE-2014-0654,0,0,debf800c9864c49c19c1c636acce751a104c0f9cc1dd0146d8b052e616ca014d,2024-11-21T02:02:35.747000 +CVE-2014-0655,0,0,b3a5571eeb6c71ad342bcca894eefc5cac13b3d39954946c8622a43756351d67,2024-11-21T02:02:35.893000 +CVE-2014-0656,0,0,4f8b563f4965215af0fa23878b979b40440392b7b9ead6e9961d3d321e308947,2024-11-21T02:02:36.017000 +CVE-2014-0657,0,0,3acdaea52375d018f417873e206b14f4dd63b98cbe066f7e6b5c1abd45066ecd,2024-11-21T02:02:36.123000 +CVE-2014-0658,0,0,6cdbb82dc82598f6990b775b5b45e8ed77801fc03c20d7e680e44bda74f811e6,2024-11-21T02:02:36.270000 +CVE-2014-0659,0,0,0e54c178cc3939c24e8cd966291f13a670a5a289fb4c6220ad1d76128f98c3e5,2024-11-21T02:02:36.400000 +CVE-2014-0660,0,0,963422a861ee9eae08a5bbfc83d067fe9f8a257f1b541512fb07761bef421979,2024-11-21T02:02:36.537000 +CVE-2014-0661,0,0,1866d77cfe005c965de69624f31c22d0a24764c8e1fa329f41764a82b040ff55,2024-11-21T02:02:36.660000 +CVE-2014-0662,0,0,7ab769869edb09dfaf982d14414808c396f7c03cbbf0b074ee568183a27c1f2e,2024-11-21T02:02:36.797000 +CVE-2014-0663,0,0,c7a8e826e74a74ae9c6655f72905bb3b8bb902e955db04b1cfec4c22a2e6467b,2024-11-21T02:02:36.917000 +CVE-2014-0664,0,0,593f0a03fcbe09585b0f756e628cde288093909c05f9fb9ed780dd5ed8889c3e,2024-11-21T02:02:37.043000 +CVE-2014-0665,0,0,430d45d3245e81d7f8c9cc5e80962329008fe8b0df03b474d2bd9d745d931dae,2024-11-21T02:02:37.190000 +CVE-2014-0666,0,0,7ff7d6989396cb739ce61a658262fb2460491a16dd417251bd8cfa4593c8ef65,2024-11-21T02:02:37.310000 +CVE-2014-0667,0,0,42e165c5a0bea76174124c75cde07f5b2ecc22cc9f19c4222a08eee4200c3242,2024-11-21T02:02:37.440000 +CVE-2014-0668,0,0,c6fe72ced805839b539bdebe32501ac7a44f22dd41ad778d4c6e0b380096f589,2024-11-21T02:02:37.557000 +CVE-2014-0669,0,0,727851b371308c5fb014f70124e1485dcffdbc8e9c98fa79581601e03b66b5e8,2024-11-21T02:02:37.680000 +CVE-2014-0670,0,0,35078c03d57ea0b3a59bbfcbc5c8d2003aaac963dad327235fa8f463416bca4d,2024-11-21T02:02:37.800000 +CVE-2014-0671,0,0,362b3754af9e0384f543468373b14be22c6832db904a42798fb660cf699a7bc9,2024-11-21T02:02:37.920000 +CVE-2014-0672,0,0,05c347789337cebff8bada2173df70f7568d358dc594792cc54f90191e36f35a,2024-11-21T02:02:38.030000 +CVE-2014-0673,0,0,78a67482f24b6d5b5d985b6951c5ebf95c81bd8652ee27b960a6744e017fee09,2024-11-21T02:02:38.143000 +CVE-2014-0674,0,0,a791efdb0188cf43c6837e07356de2eb399ca1316aab7a1a51c2c9eeead79a6e,2024-11-21T02:02:38.263000 +CVE-2014-0675,0,0,91938e1fe8cf92dfcb240662dc79a66254ecc0cb15cc323cc2962ce5ba01e191,2024-11-21T02:02:38.380000 +CVE-2014-0676,0,0,0f75e09cac8b7b173dc038a24107357f2ff3d0eba67d604c3aa9e1236b256b33,2024-11-21T02:02:38.493000 +CVE-2014-0677,0,0,7241e88017e5c7757dd7b75758f5aed5694a36e318563ab7059b373d59a09a27,2024-11-21T02:02:38.600000 +CVE-2014-0678,0,0,a9dad46bb85750845e46a530bf517e48c34d253ba7bcffeb3f875e97a3b5add3,2024-11-21T02:02:38.710000 +CVE-2014-0679,0,0,3e2703dd20611dec8c88b8aa291c685d6608bb5aba44d5d42456534de6914f60,2024-11-21T02:02:38.827000 +CVE-2014-0680,0,0,90fd6fb9640370ba0d7da6f0de0738a8711deee09b7bdfbe1ae151af6696b97a,2024-11-21T02:02:38.933000 +CVE-2014-0681,0,0,b77a72edbbe2c505847b999418bad40b1494329647769c3b6196e61993525009,2024-11-21T02:02:39.053000 +CVE-2014-0682,0,0,e4dbf449cc16bd444da410494359fc1cd9f6168204191a8045b730beb5452544,2024-11-21T02:02:39.163000 +CVE-2014-0683,0,0,b30631e2d92fcaa70ef43c0f52924a9c1766b884dd74cc9cfbdef389967bd680,2024-11-21T02:02:39.287000 +CVE-2014-0684,0,0,f67904d282373b46b0f69c3a7af07b5085f767e00460f8fa30fdaa8c02db417a,2024-11-21T02:02:39.407000 +CVE-2014-0685,0,0,cff272249010184c902b3b5c22cc23657073667a759f371b8635de4bb297514f,2024-11-21T02:02:39.520000 +CVE-2014-0686,0,0,f297aa2119c964a685c0d5e44c3db5b93bac57ae70508430901744b86ddd40a6,2024-11-21T02:02:39.650000 CVE-2014-0691,0,0,17e7f819390812b0b6710318d90adb41befd9d8a44958359584a0cd437c1ae72,2017-11-14T18:38:33.673000 -CVE-2014-0694,0,1,30cd6e4a9a241598cd72e8bff796866ae7ea4d6206c85d7435dfb970f9340a9f,2024-11-21T02:02:39.877000 -CVE-2014-0701,0,1,889076e8987bbd895eddaf33c4b7d7806bda2a16eb6be09e7879f4fb4a0e70ef,2024-11-21T02:02:39.977000 -CVE-2014-0703,0,1,f914a0594c0ce9d82a8bc3cef667d273f3954b0124afa3905b86874d2c6d2f62,2024-11-21T02:02:40.100000 -CVE-2014-0704,0,1,632fdb1a24b923dc568a44f9bdf958d36c4315733ed803f7c76aeb6f26a4d143,2024-11-21T02:02:40.210000 -CVE-2014-0705,0,1,6b32f539564934f8f2938ce10ec88cb89be68da805d1be19928b20e376acc0d8,2024-11-21T02:02:40.327000 -CVE-2014-0706,0,1,c9589086f4975079de989940f024a6a8b0145040db88296a1f4da4fcdde1c885,2024-11-21T02:02:40.437000 -CVE-2014-0707,0,1,a56b63ef1236fbd2666d17d320b3a8d6f6c216389184f1e0fe7e75d91befb041,2024-11-21T02:02:40.543000 -CVE-2014-0708,0,1,510cc0cd0c0c5254a8730e0c246dbd8c7ede30da03cfda63b9afe84f657767f1,2024-11-21T02:02:40.647000 -CVE-2014-0709,0,1,f9efab629354dd86707bb5faf30379a83f1e6643f56076de398202df18e46c4a,2024-11-21T02:02:40.747000 -CVE-2014-0710,0,1,8708676c3bffd3911fed877ee5410ae73258a759e5ac4649ac30630bd0a7c0f1,2024-11-21T02:02:40.843000 -CVE-2014-0718,0,1,ccc868c62577e99f1173666fdc98662f08cafba8ccb24e1edbdcd3d2fe720cc4,2024-11-21T02:02:40.963000 -CVE-2014-0719,0,1,90928428e4f517bea7f16387fb56e7c3bb61f418b2d3b5ddb79ac56dd9a5f975,2024-11-21T02:02:41.073000 -CVE-2014-0720,0,1,3ea2e283db173db2f14f3df772cc615d21de3a818becc8c35ea5eca110bf5373,2024-11-21T02:02:41.177000 -CVE-2014-0721,0,1,9fb181fab99acd22a0964ec080bce77d1221d6b0e989edbbe6f6bb3bea91446b,2024-11-21T02:02:41.280000 -CVE-2014-0722,0,1,a7ad95205c29430fd9b429c34ad6ca14b664b969aab17d1e0f0fc027435f5f2f,2024-11-21T02:02:41.383000 -CVE-2014-0723,0,1,40fb31628791dc1c1ab948d44b638fb1225b9efc8174eb0acbba196b2bbf5a80,2024-11-21T02:02:41.483000 -CVE-2014-0724,0,1,01f8a0340b8ac1efee592f957464c834635e0591131ff0dfc75c4629b0c6bcab,2024-11-21T02:02:41.593000 -CVE-2014-0725,0,1,995dc7d878b5f3dfa0c25188cfaddc3039a96a9b29c79b22ed0a9ca168da9479,2024-11-21T02:02:41.707000 -CVE-2014-0726,0,1,79ef289dd9941ae39f4a8206d05f4fbd89d6eae0c10d99ee847ab20ac3f1ddf8,2024-11-21T02:02:41.810000 -CVE-2014-0727,0,1,2e51401be6c100415256b51a72a7168841e1be14d63829335beaf6fa3c19fe1a,2024-11-21T02:02:41.917000 -CVE-2014-0728,0,1,11a300eea80f028a5e6a14e164ba7f6eee2cf681f4033f53c62a0253badf5ce1,2024-11-21T02:02:42.027000 -CVE-2014-0729,0,1,4f4cb93effd1148368c384cd9791b6347f9d491b0c30a326d16c6b5d9ce0127c,2024-11-21T02:02:42.130000 -CVE-2014-0730,0,1,dedeb52274e9ea879f84bbe169fbed4c392d8f143181661987a991a5c3e36981,2024-11-21T02:02:42.247000 -CVE-2014-0731,0,1,ffcae98fdde5c19c6acf5eefd9725c75e91d85efbbd61e09e8d5413440ba5f33,2024-11-21T02:02:42.357000 -CVE-2014-0732,0,1,77b8cc6c42bf9eeaa216140d5815499fdf3a4a4232b1032b6fb2673aae5b5582,2024-11-21T02:02:42.473000 -CVE-2014-0733,0,1,84e8fa9be40c4246d8d4fb3ec80744c86b6fc8df74e60efe8fcf930d1671b1c7,2024-11-21T02:02:42.583000 -CVE-2014-0734,0,1,52a1000a7435845332128d939565906c7650e194d658a805c1946e4f20d2dd4a,2024-11-21T02:02:42.697000 -CVE-2014-0735,0,1,87e57ea3b61a9dcdbc36aa18c2220a0ddd30f99a611210d0156ec5b2da76478c,2024-11-21T02:02:42.823000 -CVE-2014-0736,0,1,5d514221468fa137f1e98717ace38b769b6b5daf1a5f7a3eab4a97a4c1c15329,2024-11-21T02:02:42.937000 -CVE-2014-0737,0,1,778b29e89eadeb18066015b4b95240f9641ecae00724028900ee327c46e0875f,2024-11-21T02:02:43.050000 -CVE-2014-0738,0,1,b314fb4cb26c0396056708bd1e35b096de02d4ce181fa2ac880c8b493749df1d,2024-11-21T02:02:43.157000 -CVE-2014-0739,0,1,e0b21592cd7e9f3d1ec60601202b65f7977c193a61451b24e6a94e589d14dcb7,2024-11-21T02:02:43.260000 -CVE-2014-0740,0,1,8a64336267a5f5d55afcee75081edbb8dd697c0fe748ea2207ee19299d3a8a75,2024-11-21T02:02:43.383000 -CVE-2014-0741,0,1,2460c7364ce724761a6a8be9ed6ee7ca1c97cef0adcc7c1fc0b0f98751c8613a,2024-11-21T02:02:43.503000 -CVE-2014-0742,0,1,9a05556bfe2e39a8e6dc921f4e33e754dec2571b2e80e191c8974e72fadf126d,2024-11-21T02:02:43.620000 -CVE-2014-0743,0,1,b8cd6b6fae9909980d11e899ec2b585391ed38d1ec2f5cd4d1305061bb552579,2024-11-21T02:02:43.740000 +CVE-2014-0694,0,0,30cd6e4a9a241598cd72e8bff796866ae7ea4d6206c85d7435dfb970f9340a9f,2024-11-21T02:02:39.877000 +CVE-2014-0701,0,0,889076e8987bbd895eddaf33c4b7d7806bda2a16eb6be09e7879f4fb4a0e70ef,2024-11-21T02:02:39.977000 +CVE-2014-0703,0,0,f914a0594c0ce9d82a8bc3cef667d273f3954b0124afa3905b86874d2c6d2f62,2024-11-21T02:02:40.100000 +CVE-2014-0704,0,0,632fdb1a24b923dc568a44f9bdf958d36c4315733ed803f7c76aeb6f26a4d143,2024-11-21T02:02:40.210000 +CVE-2014-0705,0,0,6b32f539564934f8f2938ce10ec88cb89be68da805d1be19928b20e376acc0d8,2024-11-21T02:02:40.327000 +CVE-2014-0706,0,0,c9589086f4975079de989940f024a6a8b0145040db88296a1f4da4fcdde1c885,2024-11-21T02:02:40.437000 +CVE-2014-0707,0,0,a56b63ef1236fbd2666d17d320b3a8d6f6c216389184f1e0fe7e75d91befb041,2024-11-21T02:02:40.543000 +CVE-2014-0708,0,0,510cc0cd0c0c5254a8730e0c246dbd8c7ede30da03cfda63b9afe84f657767f1,2024-11-21T02:02:40.647000 +CVE-2014-0709,0,0,f9efab629354dd86707bb5faf30379a83f1e6643f56076de398202df18e46c4a,2024-11-21T02:02:40.747000 +CVE-2014-0710,0,0,8708676c3bffd3911fed877ee5410ae73258a759e5ac4649ac30630bd0a7c0f1,2024-11-21T02:02:40.843000 +CVE-2014-0718,0,0,ccc868c62577e99f1173666fdc98662f08cafba8ccb24e1edbdcd3d2fe720cc4,2024-11-21T02:02:40.963000 +CVE-2014-0719,0,0,90928428e4f517bea7f16387fb56e7c3bb61f418b2d3b5ddb79ac56dd9a5f975,2024-11-21T02:02:41.073000 +CVE-2014-0720,0,0,3ea2e283db173db2f14f3df772cc615d21de3a818becc8c35ea5eca110bf5373,2024-11-21T02:02:41.177000 +CVE-2014-0721,0,0,9fb181fab99acd22a0964ec080bce77d1221d6b0e989edbbe6f6bb3bea91446b,2024-11-21T02:02:41.280000 +CVE-2014-0722,0,0,a7ad95205c29430fd9b429c34ad6ca14b664b969aab17d1e0f0fc027435f5f2f,2024-11-21T02:02:41.383000 +CVE-2014-0723,0,0,40fb31628791dc1c1ab948d44b638fb1225b9efc8174eb0acbba196b2bbf5a80,2024-11-21T02:02:41.483000 +CVE-2014-0724,0,0,01f8a0340b8ac1efee592f957464c834635e0591131ff0dfc75c4629b0c6bcab,2024-11-21T02:02:41.593000 +CVE-2014-0725,0,0,995dc7d878b5f3dfa0c25188cfaddc3039a96a9b29c79b22ed0a9ca168da9479,2024-11-21T02:02:41.707000 +CVE-2014-0726,0,0,79ef289dd9941ae39f4a8206d05f4fbd89d6eae0c10d99ee847ab20ac3f1ddf8,2024-11-21T02:02:41.810000 +CVE-2014-0727,0,0,2e51401be6c100415256b51a72a7168841e1be14d63829335beaf6fa3c19fe1a,2024-11-21T02:02:41.917000 +CVE-2014-0728,0,0,11a300eea80f028a5e6a14e164ba7f6eee2cf681f4033f53c62a0253badf5ce1,2024-11-21T02:02:42.027000 +CVE-2014-0729,0,0,4f4cb93effd1148368c384cd9791b6347f9d491b0c30a326d16c6b5d9ce0127c,2024-11-21T02:02:42.130000 +CVE-2014-0730,0,0,dedeb52274e9ea879f84bbe169fbed4c392d8f143181661987a991a5c3e36981,2024-11-21T02:02:42.247000 +CVE-2014-0731,0,0,ffcae98fdde5c19c6acf5eefd9725c75e91d85efbbd61e09e8d5413440ba5f33,2024-11-21T02:02:42.357000 +CVE-2014-0732,0,0,77b8cc6c42bf9eeaa216140d5815499fdf3a4a4232b1032b6fb2673aae5b5582,2024-11-21T02:02:42.473000 +CVE-2014-0733,0,0,84e8fa9be40c4246d8d4fb3ec80744c86b6fc8df74e60efe8fcf930d1671b1c7,2024-11-21T02:02:42.583000 +CVE-2014-0734,0,0,52a1000a7435845332128d939565906c7650e194d658a805c1946e4f20d2dd4a,2024-11-21T02:02:42.697000 +CVE-2014-0735,0,0,87e57ea3b61a9dcdbc36aa18c2220a0ddd30f99a611210d0156ec5b2da76478c,2024-11-21T02:02:42.823000 +CVE-2014-0736,0,0,5d514221468fa137f1e98717ace38b769b6b5daf1a5f7a3eab4a97a4c1c15329,2024-11-21T02:02:42.937000 +CVE-2014-0737,0,0,778b29e89eadeb18066015b4b95240f9641ecae00724028900ee327c46e0875f,2024-11-21T02:02:43.050000 +CVE-2014-0738,0,0,b314fb4cb26c0396056708bd1e35b096de02d4ce181fa2ac880c8b493749df1d,2024-11-21T02:02:43.157000 +CVE-2014-0739,0,0,e0b21592cd7e9f3d1ec60601202b65f7977c193a61451b24e6a94e589d14dcb7,2024-11-21T02:02:43.260000 +CVE-2014-0740,0,0,8a64336267a5f5d55afcee75081edbb8dd697c0fe748ea2207ee19299d3a8a75,2024-11-21T02:02:43.383000 +CVE-2014-0741,0,0,2460c7364ce724761a6a8be9ed6ee7ca1c97cef0adcc7c1fc0b0f98751c8613a,2024-11-21T02:02:43.503000 +CVE-2014-0742,0,0,9a05556bfe2e39a8e6dc921f4e33e754dec2571b2e80e191c8974e72fadf126d,2024-11-21T02:02:43.620000 +CVE-2014-0743,0,0,b8cd6b6fae9909980d11e899ec2b585391ed38d1ec2f5cd4d1305061bb552579,2024-11-21T02:02:43.740000 CVE-2014-0744,0,0,a6c5e4b7d95aa6ff5d680360f1eb1c5ddf0ba71bd955999ff25dd05ade6af877,2023-11-07T02:18:25.860000 -CVE-2014-0745,0,1,53456413823cb9ba5a2bba851dfec631850ddffc4c950779d828aca5a90070b7,2024-11-21T02:02:43.863000 -CVE-2014-0746,0,1,8fcf922133060e6168f0d1215ce618f2c2dc3896716ebd8f185377eb4765431d,2024-11-21T02:02:43.967000 -CVE-2014-0747,0,1,b358e81e4fdcaa3c8670708b952f8cef4bac5d4d6db72803feb167c581f421f3,2024-11-21T02:02:44.087000 +CVE-2014-0745,0,0,53456413823cb9ba5a2bba851dfec631850ddffc4c950779d828aca5a90070b7,2024-11-21T02:02:43.863000 +CVE-2014-0746,0,0,8fcf922133060e6168f0d1215ce618f2c2dc3896716ebd8f185377eb4765431d,2024-11-21T02:02:43.967000 +CVE-2014-0747,0,0,b358e81e4fdcaa3c8670708b952f8cef4bac5d4d6db72803feb167c581f421f3,2024-11-21T02:02:44.087000 CVE-2014-0748,0,0,cc0322bfd8b39df632f922cd6e5024a587c82a978d29378941f47f9958b7a982,2014-12-30T11:22:17.847000 -CVE-2014-0749,0,1,d785c427c25e091e516703d73f393f07dd645bb34adae6ee42b6c71ef9db28a8,2024-11-21T02:02:44.330000 -CVE-2014-0750,0,1,66e530b800c7758e5b1dfd31a10a02f8488da4a4ff8bb822e11c9c34b46d0322,2024-11-21T02:02:44.483000 -CVE-2014-0751,0,1,c57c667bf9ea1e183a07308bde01f62d261deb5f20c68d05c4c24017e7367826,2024-11-21T02:02:44.600000 -CVE-2014-0752,0,1,d8ea4dc2725b7d733dabada31561d7adeda8bbf39e185dda3181b08a8818f7b6,2024-11-21T02:02:44.710000 -CVE-2014-0753,0,1,02fa1ea1c51c4f886c31ad6be018eb12f906ae60f8234365b055537509aa363c,2024-11-21T02:02:44.850000 +CVE-2014-0749,0,0,d785c427c25e091e516703d73f393f07dd645bb34adae6ee42b6c71ef9db28a8,2024-11-21T02:02:44.330000 +CVE-2014-0750,0,0,66e530b800c7758e5b1dfd31a10a02f8488da4a4ff8bb822e11c9c34b46d0322,2024-11-21T02:02:44.483000 +CVE-2014-0751,0,0,c57c667bf9ea1e183a07308bde01f62d261deb5f20c68d05c4c24017e7367826,2024-11-21T02:02:44.600000 +CVE-2014-0752,0,0,d8ea4dc2725b7d733dabada31561d7adeda8bbf39e185dda3181b08a8818f7b6,2024-11-21T02:02:44.710000 +CVE-2014-0753,0,0,02fa1ea1c51c4f886c31ad6be018eb12f906ae60f8234365b055537509aa363c,2024-11-21T02:02:44.850000 CVE-2014-0754,0,0,e270c48ae226fa1bcbfa54d96b68f8274adc2985a514a2c71fd7438364841dd2,2022-02-10T19:50:17.840000 -CVE-2014-0755,0,1,312e896796b726f4dce0ef020d6f872b9657526168d7505f67e7e0a10f0f007d,2024-11-21T02:02:45.157000 +CVE-2014-0755,0,0,312e896796b726f4dce0ef020d6f872b9657526168d7505f67e7e0a10f0f007d,2024-11-21T02:02:45.157000 CVE-2014-0756,0,0,8182da2ba5b0fb60b9f4347418bda13902887de796c946dc114475c6445c8dda,2023-11-07T02:18:26.413000 -CVE-2014-0757,0,1,cdf925fa03ad49e9fca6d2e39b9014c60e9b6aede2b7019430e2e86e83ccc045,2024-11-21T02:02:45.300000 -CVE-2014-0758,0,1,a26baaaa70abc4175ca74ad9938c603f35a459a2b557ac97767e407919dcb3a4,2024-11-21T02:02:45.437000 -CVE-2014-0759,0,1,f8d5f987509a14fdf9b83e78aa3abe5f88cc03a7de4441ff88e77cccca617801,2024-11-21T02:02:45.553000 -CVE-2014-0760,0,1,c2d78c85cc5b2f851a8683415f3787a22e6c41e483fb2ed3bae9315f863fee7b,2024-11-21T02:02:45.670000 +CVE-2014-0757,0,0,cdf925fa03ad49e9fca6d2e39b9014c60e9b6aede2b7019430e2e86e83ccc045,2024-11-21T02:02:45.300000 +CVE-2014-0758,0,0,a26baaaa70abc4175ca74ad9938c603f35a459a2b557ac97767e407919dcb3a4,2024-11-21T02:02:45.437000 +CVE-2014-0759,0,0,f8d5f987509a14fdf9b83e78aa3abe5f88cc03a7de4441ff88e77cccca617801,2024-11-21T02:02:45.553000 +CVE-2014-0760,0,0,c2d78c85cc5b2f851a8683415f3787a22e6c41e483fb2ed3bae9315f863fee7b,2024-11-21T02:02:45.670000 CVE-2014-0761,0,0,2d5da7d808b8b02de9eb72b846e459e1b28f25d82e86a68eb6ce253c903f3a0a,2014-08-28T14:01:53.933000 CVE-2014-0762,0,0,63b5cc8db9590f39ab2fc29419f1f1cceddab49315c83e2b638e620f66a0eb82,2014-08-28T14:03:24.467000 -CVE-2014-0763,0,1,8de214164b97468709bc09af807998d090e85fa5dd8e807bb313ef2f6a820bb6,2024-11-21T02:02:46 -CVE-2014-0764,0,1,a2665b52008d3cd37a3afc98fbf7dbf2fcdd6f7c0c0ce290d096c4623b1c66e8,2024-11-21T02:02:46.110000 -CVE-2014-0765,0,1,5639418f1ad57b4dd6b98b3e8c0c9e94ba157fb55eda8de6d0170139d0abfaff,2024-11-21T02:02:46.213000 -CVE-2014-0766,0,1,6c60afa0d189d274addb629fba65e6a4c4c034cfc922d123f66ef53e7f76de09,2024-11-21T02:02:46.320000 -CVE-2014-0767,0,1,030f0668b906842acecd87c81f183eed0f1735be063df4269b81119962bcd81c,2024-11-21T02:02:46.427000 -CVE-2014-0768,0,1,565bb09853694612daee62caddb28d9a371162b713567c1cc97a03e7b19d53a9,2024-11-21T02:02:46.533000 -CVE-2014-0769,0,1,da90706ae81298a3549a74abb39d975f3df8aa1ce3aa625f5173d2ef86f4dfee,2024-11-21T02:02:46.637000 -CVE-2014-0770,0,1,c5e11eb387ef6dd61faea7b23b436aabce05273a2e9fe39be606a34dfbeadbe4,2024-11-21T02:02:46.737000 -CVE-2014-0771,0,1,f2edfbf6a9b6b9697d2c1daff322dfa4f294e6f6dc08c2f3310b992ee83f8866,2024-11-21T02:02:46.837000 -CVE-2014-0772,0,1,54b32b78f693c901e433f70e5a3a8f085756a6e9e24ab9fd0b1da069dd0de7d9,2024-11-21T02:02:46.933000 -CVE-2014-0773,0,1,1adc1aaa46c16e8e44aa8d33e1cec605bb07aa7af8b8776702cd8a014071f208,2024-11-21T02:02:47.030000 -CVE-2014-0774,0,1,39405da0537fe3b287e5c936673a263d26ee822f8174c7f88d49eba55805be37,2024-11-21T02:02:47.127000 +CVE-2014-0763,0,0,8de214164b97468709bc09af807998d090e85fa5dd8e807bb313ef2f6a820bb6,2024-11-21T02:02:46 +CVE-2014-0764,0,0,a2665b52008d3cd37a3afc98fbf7dbf2fcdd6f7c0c0ce290d096c4623b1c66e8,2024-11-21T02:02:46.110000 +CVE-2014-0765,0,0,5639418f1ad57b4dd6b98b3e8c0c9e94ba157fb55eda8de6d0170139d0abfaff,2024-11-21T02:02:46.213000 +CVE-2014-0766,0,0,6c60afa0d189d274addb629fba65e6a4c4c034cfc922d123f66ef53e7f76de09,2024-11-21T02:02:46.320000 +CVE-2014-0767,0,0,030f0668b906842acecd87c81f183eed0f1735be063df4269b81119962bcd81c,2024-11-21T02:02:46.427000 +CVE-2014-0768,0,0,565bb09853694612daee62caddb28d9a371162b713567c1cc97a03e7b19d53a9,2024-11-21T02:02:46.533000 +CVE-2014-0769,0,0,da90706ae81298a3549a74abb39d975f3df8aa1ce3aa625f5173d2ef86f4dfee,2024-11-21T02:02:46.637000 +CVE-2014-0770,0,0,c5e11eb387ef6dd61faea7b23b436aabce05273a2e9fe39be606a34dfbeadbe4,2024-11-21T02:02:46.737000 +CVE-2014-0771,0,0,f2edfbf6a9b6b9697d2c1daff322dfa4f294e6f6dc08c2f3310b992ee83f8866,2024-11-21T02:02:46.837000 +CVE-2014-0772,0,0,54b32b78f693c901e433f70e5a3a8f085756a6e9e24ab9fd0b1da069dd0de7d9,2024-11-21T02:02:46.933000 +CVE-2014-0773,0,0,1adc1aaa46c16e8e44aa8d33e1cec605bb07aa7af8b8776702cd8a014071f208,2024-11-21T02:02:47.030000 +CVE-2014-0774,0,0,39405da0537fe3b287e5c936673a263d26ee822f8174c7f88d49eba55805be37,2024-11-21T02:02:47.127000 CVE-2014-0775,0,0,1701042689349422b74af1e6edac4354c9fddeb4e7f51961e90601f90439b928,2023-11-07T02:18:26.760000 -CVE-2014-0777,0,1,1537ab752195a289e997ec7280ccace874c7dca55302a1a9f00bb3f78fdbb3d5,2024-11-21T02:02:47.240000 -CVE-2014-0778,0,1,50ed85451cad968891d84d0b159fdcdc7e5ba9e53ab82306758bb4b2a14d930b,2024-11-21T02:02:47.337000 -CVE-2014-0779,0,1,228e3498ae8deb459e0faa4e5462ab21751b85e5f717a81d345cd85589a58800,2024-11-21T02:02:47.440000 -CVE-2014-0780,0,1,a9835d445086fa41fb0a6e85b09f186055342c634f665976558eb714bda2f1c8,2024-11-21T02:02:47.540000 -CVE-2014-0781,0,1,d2214c4ac72089868580670738fadbb26ff35c3405c3101989108c8e6879f6d1,2024-11-21T02:02:47.663000 -CVE-2014-0782,0,1,e39522203afcd30aba85004f5494754801532418894cf20afc9f9abf2f5dfe5d,2024-11-21T02:02:47.770000 -CVE-2014-0783,0,1,33192becaeb8a830c77f79231d724d638e3a2a797bc2022a0b8181b6f0ede387,2024-11-21T02:02:47.877000 -CVE-2014-0784,0,1,9957ad79e154e03aec7f3d389a4406161401aad5b40ff9d436871787f23a6225,2024-11-21T02:02:47.997000 +CVE-2014-0777,0,0,1537ab752195a289e997ec7280ccace874c7dca55302a1a9f00bb3f78fdbb3d5,2024-11-21T02:02:47.240000 +CVE-2014-0778,0,0,50ed85451cad968891d84d0b159fdcdc7e5ba9e53ab82306758bb4b2a14d930b,2024-11-21T02:02:47.337000 +CVE-2014-0779,0,0,228e3498ae8deb459e0faa4e5462ab21751b85e5f717a81d345cd85589a58800,2024-11-21T02:02:47.440000 +CVE-2014-0780,0,0,a9835d445086fa41fb0a6e85b09f186055342c634f665976558eb714bda2f1c8,2024-11-21T02:02:47.540000 +CVE-2014-0781,0,0,d2214c4ac72089868580670738fadbb26ff35c3405c3101989108c8e6879f6d1,2024-11-21T02:02:47.663000 +CVE-2014-0782,0,0,e39522203afcd30aba85004f5494754801532418894cf20afc9f9abf2f5dfe5d,2024-11-21T02:02:47.770000 +CVE-2014-0783,0,0,33192becaeb8a830c77f79231d724d638e3a2a797bc2022a0b8181b6f0ede387,2024-11-21T02:02:47.877000 +CVE-2014-0784,0,0,9957ad79e154e03aec7f3d389a4406161401aad5b40ff9d436871787f23a6225,2024-11-21T02:02:47.997000 CVE-2014-0785,0,0,0839beb61a97ba2c1c28d95c3c47c266fce484b532c9db35f2a77d4f1854d5ee,2023-11-07T02:18:27.030000 -CVE-2014-0786,0,1,50f19f5391b906c473d9567d58f4ae4754a006d12a5207436febe05fba526e95,2024-11-21T02:02:48.120000 -CVE-2014-0787,0,1,228e4d1dce1d79cce28d9347ac66e0f8bd262950890e77f22a6ea48f7fe5cef8,2024-11-21T02:02:48.227000 +CVE-2014-0786,0,0,50f19f5391b906c473d9567d58f4ae4754a006d12a5207436febe05fba526e95,2024-11-21T02:02:48.120000 +CVE-2014-0787,0,0,228e4d1dce1d79cce28d9347ac66e0f8bd262950890e77f22a6ea48f7fe5cef8,2024-11-21T02:02:48.227000 CVE-2014-0788,0,0,1f0da4796d6d281d0ea4fb78ff8896a49845f84510d43384fe3336f7a04c267b,2023-11-07T02:18:27.263000 -CVE-2014-0789,0,1,b637029eec36c2238e777b42240ba26a735936309641910743a22a0350f98790,2024-11-21T02:02:48.357000 -CVE-2014-0791,0,1,1e248e09c113f62b0b5df2086bd8a2e519c60e9eed404f69a29a06585818be15,2024-11-21T02:02:48.477000 -CVE-2014-0792,0,1,30d47d2bc7a668110cd49eee49a76f8d9b6d4df68700791de15e267f9b1c6c3c,2024-11-21T02:02:48.640000 -CVE-2014-0793,0,1,7094f6cc755ef29432e35512f23b7c2bd18eb3160e522a373eff9af03e9edf21,2024-11-21T02:02:48.797000 -CVE-2014-0794,0,1,08e83c373935ae3a13d34b5a84539d7dd815f23e91304b5e27f2294d6b909d0c,2024-11-21T02:02:48.933000 -CVE-2014-0802,0,1,3db2657117550f579136bb403ae940fd5db3ba6f2003de2491f640a107786435,2024-11-21T02:02:49.073000 -CVE-2014-0803,0,1,ebb7e67c75fb7721200e4a379a704bdc28919008400eac04803d49aed04fb521,2024-11-21T02:02:49.170000 -CVE-2014-0804,0,1,e50a62fdf944fd4bdd854465e001dfbc6e0a34fcf6eafb051b900c3a0b9cc1d1,2024-11-21T02:02:49.273000 -CVE-2014-0805,0,1,f42d8c609df377ed7e4f906b107fa24add0c473203c587d7657a9118f735acad,2024-11-21T02:02:49.390000 -CVE-2014-0806,0,1,c356d993a4a336077bbf97c5b529bbb21373f5f0951f6c2f63943e128f6324cf,2024-11-21T02:02:49.497000 -CVE-2014-0807,0,1,ca5bec6931a2887d399efb2515326d9d2a1bd5274c792fde75eab89bf862dd39,2024-11-21T02:02:49.620000 -CVE-2014-0808,0,1,569c0d0a5641c258b7c77ab657f5f01ec68636cde4f663dec3b90c87721ca3a9,2024-11-21T02:02:49.733000 -CVE-2014-0809,0,1,0fc213969ec2cdc7f277a4b65f3f7f5c0aaada8e0c12b10319d18c8ee0d74711,2024-11-21T02:02:49.940000 -CVE-2014-0810,0,1,57cf9d2c420c1773a62382b62bb6d69bdb015f3134074cbb8a4f4a6a59c957b8,2024-11-21T02:02:50.073000 -CVE-2014-0811,0,1,c2e72cf640ba1b74e957b452e10715592554ab4a9b4837975ea747780ab8afa5,2024-11-21T02:02:50.190000 -CVE-2014-0812,0,1,74cc4cb35c2e8eee4f3f7d39f0c96a0f8645eec6125f7c24ec9cb7cb14443bcc,2024-11-21T02:02:50.310000 -CVE-2014-0813,0,1,df0d87426f3cb23d9b999f15457cb2323004c0170af076de4656f0f21deb392e,2024-11-21T02:02:50.430000 -CVE-2014-0814,0,1,fc553ae46de705141536bfe125b551a2e5527561e4a7592b5f1171841fc4bceb,2024-11-21T02:02:50.563000 -CVE-2014-0815,0,1,4b87a2d0d051957b5e2151a21dc53ee63b627e97b5d315ed9287b6646a956e3d,2024-11-21T02:02:50.700000 -CVE-2014-0816,0,1,2a675c3d4c3655335f5f56258284c556788f3a3f9467074bf9682ab2bb03fe5d,2024-11-21T02:02:50.830000 -CVE-2014-0817,0,1,1414a177393252c2a2cbc4a24c700256a392155e537f329656a3aa9a22b2a07c,2024-11-21T02:02:50.940000 -CVE-2014-0818,0,1,0a5221e5912487d0facef9246f03255156911e8cb64d5f2c337495108a4c19e6,2024-11-21T02:02:51.060000 -CVE-2014-0819,0,1,1d2fda6b11b6acfe2b4bb6ed1a17d1a9c4390391915aa86915a12394da45edc3,2024-11-21T02:02:51.167000 -CVE-2014-0820,0,1,ffee80b894b8dedf0d293041a4361b829ce16be96caf30ff7d4ea818ad45374b,2024-11-21T02:02:51.280000 -CVE-2014-0821,0,1,3a0b1dbaf1d2c24f522babc230a44749e18230e7f27200407986dc7f336f4282,2024-11-21T02:02:51.407000 -CVE-2014-0822,0,1,bbf9001be645a30979bdc2ea56a038445100e64ca17e8ad9feece6248e4e9b93,2024-11-21T02:02:51.533000 -CVE-2014-0823,0,1,c4aa7be6f2c8da75a2ff76bcfad1de070361cc4832cfbe6722c86050090251b9,2024-11-21T02:02:51.647000 +CVE-2014-0789,0,0,b637029eec36c2238e777b42240ba26a735936309641910743a22a0350f98790,2024-11-21T02:02:48.357000 +CVE-2014-0791,0,0,1e248e09c113f62b0b5df2086bd8a2e519c60e9eed404f69a29a06585818be15,2024-11-21T02:02:48.477000 +CVE-2014-0792,0,0,30d47d2bc7a668110cd49eee49a76f8d9b6d4df68700791de15e267f9b1c6c3c,2024-11-21T02:02:48.640000 +CVE-2014-0793,0,0,7094f6cc755ef29432e35512f23b7c2bd18eb3160e522a373eff9af03e9edf21,2024-11-21T02:02:48.797000 +CVE-2014-0794,0,0,08e83c373935ae3a13d34b5a84539d7dd815f23e91304b5e27f2294d6b909d0c,2024-11-21T02:02:48.933000 +CVE-2014-0802,0,0,3db2657117550f579136bb403ae940fd5db3ba6f2003de2491f640a107786435,2024-11-21T02:02:49.073000 +CVE-2014-0803,0,0,ebb7e67c75fb7721200e4a379a704bdc28919008400eac04803d49aed04fb521,2024-11-21T02:02:49.170000 +CVE-2014-0804,0,0,e50a62fdf944fd4bdd854465e001dfbc6e0a34fcf6eafb051b900c3a0b9cc1d1,2024-11-21T02:02:49.273000 +CVE-2014-0805,0,0,f42d8c609df377ed7e4f906b107fa24add0c473203c587d7657a9118f735acad,2024-11-21T02:02:49.390000 +CVE-2014-0806,0,0,c356d993a4a336077bbf97c5b529bbb21373f5f0951f6c2f63943e128f6324cf,2024-11-21T02:02:49.497000 +CVE-2014-0807,0,0,ca5bec6931a2887d399efb2515326d9d2a1bd5274c792fde75eab89bf862dd39,2024-11-21T02:02:49.620000 +CVE-2014-0808,0,0,569c0d0a5641c258b7c77ab657f5f01ec68636cde4f663dec3b90c87721ca3a9,2024-11-21T02:02:49.733000 +CVE-2014-0809,0,0,0fc213969ec2cdc7f277a4b65f3f7f5c0aaada8e0c12b10319d18c8ee0d74711,2024-11-21T02:02:49.940000 +CVE-2014-0810,0,0,57cf9d2c420c1773a62382b62bb6d69bdb015f3134074cbb8a4f4a6a59c957b8,2024-11-21T02:02:50.073000 +CVE-2014-0811,0,0,c2e72cf640ba1b74e957b452e10715592554ab4a9b4837975ea747780ab8afa5,2024-11-21T02:02:50.190000 +CVE-2014-0812,0,0,74cc4cb35c2e8eee4f3f7d39f0c96a0f8645eec6125f7c24ec9cb7cb14443bcc,2024-11-21T02:02:50.310000 +CVE-2014-0813,0,0,df0d87426f3cb23d9b999f15457cb2323004c0170af076de4656f0f21deb392e,2024-11-21T02:02:50.430000 +CVE-2014-0814,0,0,fc553ae46de705141536bfe125b551a2e5527561e4a7592b5f1171841fc4bceb,2024-11-21T02:02:50.563000 +CVE-2014-0815,0,0,4b87a2d0d051957b5e2151a21dc53ee63b627e97b5d315ed9287b6646a956e3d,2024-11-21T02:02:50.700000 +CVE-2014-0816,0,0,2a675c3d4c3655335f5f56258284c556788f3a3f9467074bf9682ab2bb03fe5d,2024-11-21T02:02:50.830000 +CVE-2014-0817,0,0,1414a177393252c2a2cbc4a24c700256a392155e537f329656a3aa9a22b2a07c,2024-11-21T02:02:50.940000 +CVE-2014-0818,0,0,0a5221e5912487d0facef9246f03255156911e8cb64d5f2c337495108a4c19e6,2024-11-21T02:02:51.060000 +CVE-2014-0819,0,0,1d2fda6b11b6acfe2b4bb6ed1a17d1a9c4390391915aa86915a12394da45edc3,2024-11-21T02:02:51.167000 +CVE-2014-0820,0,0,ffee80b894b8dedf0d293041a4361b829ce16be96caf30ff7d4ea818ad45374b,2024-11-21T02:02:51.280000 +CVE-2014-0821,0,0,3a0b1dbaf1d2c24f522babc230a44749e18230e7f27200407986dc7f336f4282,2024-11-21T02:02:51.407000 +CVE-2014-0822,0,0,bbf9001be645a30979bdc2ea56a038445100e64ca17e8ad9feece6248e4e9b93,2024-11-21T02:02:51.533000 +CVE-2014-0823,0,0,c4aa7be6f2c8da75a2ff76bcfad1de070361cc4832cfbe6722c86050090251b9,2024-11-21T02:02:51.647000 CVE-2014-0824,0,0,3d052dcae2a8332798d667954d05adcc67c5f6e3d7af3ee7fe62ea9e20bc7f9b,2017-08-29T01:34:15.780000 CVE-2014-0825,0,0,2f2f79647985b953df28d59f96ecd1f47d68bc13d7a73d7e61cc1fdd85981ec2,2017-08-29T01:34:15.840000 -CVE-2014-0827,0,1,ba08e9b6e5a3e94961ed3142b57cfb9919c8a4dcabe7e43f4430a6ab3fbee59a,2024-11-21T02:02:51.997000 -CVE-2014-0828,0,1,577f89aab678512ed017d5e0a7669b29494df67d8fc8ee5d445ee05191b69258,2024-11-21T02:02:52.120000 -CVE-2014-0829,0,1,3386f9b620e6ea28350e9eb884ee90274aa009512e918142769e999c8c01042f,2024-11-21T02:02:52.270000 -CVE-2014-0830,0,1,a597b39a3d7e25da67daf73c627da7a4c04da56e37b1c0f52955d9e1ef0a43e3,2024-11-21T02:02:52.400000 -CVE-2014-0831,0,1,7e4e3c71a4579661b643287c2088fe1bb3f69feebbf4157bb4219c8ad142c9de,2024-11-21T02:02:52.510000 -CVE-2014-0832,0,1,90f4817a84d623365db03e809beeae902cff92561d7b8d869b76b615fba3b66b,2024-11-21T02:02:52.610000 -CVE-2014-0833,0,1,aae883170b3ef989a49286c1b47ee9683d1251f309c8a15a5288818b80c274c0,2024-11-21T02:02:52.723000 -CVE-2014-0834,0,1,c0d4d7452918e0d73dd7bf0bfdda0e44e76b571b5023fa4317ec4e92cce8764f,2024-11-21T02:02:52.840000 -CVE-2014-0835,0,1,36458dd9fe686d43b5c1a504401bf73a6806df2104470b95a47bec8c1b63f1a1,2024-11-21T02:02:52.970000 -CVE-2014-0836,0,1,47c8b7643ca9c881a6fe87601a1b201cd0a7fdad32215641b19a69dbb5852256,2024-11-21T02:02:53.087000 -CVE-2014-0837,0,1,42180385f3ba062d7e772668c0c67e2fb9d2bad5014ef429cf3a25d35e38a6f3,2024-11-21T02:02:53.193000 -CVE-2014-0838,0,1,f0b721dc23c871fb65b9ad5f36059d165cf67f9bdfda2b90438f361be2812e79,2024-11-21T02:02:53.310000 -CVE-2014-0839,0,1,70c8d48bdf06984b4a78eb8a9eac23481c26a6d16bd0fa715ffe94bd48f90196,2024-11-21T02:02:53.427000 -CVE-2014-0840,0,1,8df538f4386511e80a4237d9b0a9c4d6feed7491d2bd95932aed4bcba79e8c71,2024-11-21T02:02:53.540000 +CVE-2014-0827,0,0,ba08e9b6e5a3e94961ed3142b57cfb9919c8a4dcabe7e43f4430a6ab3fbee59a,2024-11-21T02:02:51.997000 +CVE-2014-0828,0,0,577f89aab678512ed017d5e0a7669b29494df67d8fc8ee5d445ee05191b69258,2024-11-21T02:02:52.120000 +CVE-2014-0829,0,0,3386f9b620e6ea28350e9eb884ee90274aa009512e918142769e999c8c01042f,2024-11-21T02:02:52.270000 +CVE-2014-0830,0,0,a597b39a3d7e25da67daf73c627da7a4c04da56e37b1c0f52955d9e1ef0a43e3,2024-11-21T02:02:52.400000 +CVE-2014-0831,0,0,7e4e3c71a4579661b643287c2088fe1bb3f69feebbf4157bb4219c8ad142c9de,2024-11-21T02:02:52.510000 +CVE-2014-0832,0,0,90f4817a84d623365db03e809beeae902cff92561d7b8d869b76b615fba3b66b,2024-11-21T02:02:52.610000 +CVE-2014-0833,0,0,aae883170b3ef989a49286c1b47ee9683d1251f309c8a15a5288818b80c274c0,2024-11-21T02:02:52.723000 +CVE-2014-0834,0,0,c0d4d7452918e0d73dd7bf0bfdda0e44e76b571b5023fa4317ec4e92cce8764f,2024-11-21T02:02:52.840000 +CVE-2014-0835,0,0,36458dd9fe686d43b5c1a504401bf73a6806df2104470b95a47bec8c1b63f1a1,2024-11-21T02:02:52.970000 +CVE-2014-0836,0,0,47c8b7643ca9c881a6fe87601a1b201cd0a7fdad32215641b19a69dbb5852256,2024-11-21T02:02:53.087000 +CVE-2014-0837,0,0,42180385f3ba062d7e772668c0c67e2fb9d2bad5014ef429cf3a25d35e38a6f3,2024-11-21T02:02:53.193000 +CVE-2014-0838,0,0,f0b721dc23c871fb65b9ad5f36059d165cf67f9bdfda2b90438f361be2812e79,2024-11-21T02:02:53.310000 +CVE-2014-0839,0,0,70c8d48bdf06984b4a78eb8a9eac23481c26a6d16bd0fa715ffe94bd48f90196,2024-11-21T02:02:53.427000 +CVE-2014-0840,0,0,8df538f4386511e80a4237d9b0a9c4d6feed7491d2bd95932aed4bcba79e8c71,2024-11-21T02:02:53.540000 CVE-2014-0841,0,0,f0f411b1c711cb89e0462a49ef676ced95e8696b054e6ab6642bde0588c01124,2018-06-07T18:00:01.510000 -CVE-2014-0842,0,1,ad8544f9f79327bb67fa9d6cd40d2858859d1f64c464055c96699c3b684b244e,2024-11-21T02:02:53.760000 -CVE-2014-0843,0,1,f796d21e829000cc8c6758f12a4bfec1390fdfea07f41940cb7e4322788e398e,2024-11-21T02:02:53.870000 -CVE-2014-0844,0,1,f13368357a20d6c593f9253891ae18670f7cf09274aad0e047227229273f2593,2024-11-21T02:02:53.983000 -CVE-2014-0845,0,1,90f95aee6eaa84fdf29c304b73aac84ce8b506a927ed913c436e8e3ed29ac50f,2024-11-21T02:02:54.093000 -CVE-2014-0846,0,1,d257a72ce04a5cd591490c4914ac412822a686a5c4e6cdb12bdee8ecb1060ec4,2024-11-21T02:02:54.213000 -CVE-2014-0848,0,1,ea77d82dcb3115bd4c6044310d5a89596cac47d48135c4447f76f7926e9f2153,2024-11-21T02:02:54.327000 +CVE-2014-0842,0,0,ad8544f9f79327bb67fa9d6cd40d2858859d1f64c464055c96699c3b684b244e,2024-11-21T02:02:53.760000 +CVE-2014-0843,0,0,f796d21e829000cc8c6758f12a4bfec1390fdfea07f41940cb7e4322788e398e,2024-11-21T02:02:53.870000 +CVE-2014-0844,0,0,f13368357a20d6c593f9253891ae18670f7cf09274aad0e047227229273f2593,2024-11-21T02:02:53.983000 +CVE-2014-0845,0,0,90f95aee6eaa84fdf29c304b73aac84ce8b506a927ed913c436e8e3ed29ac50f,2024-11-21T02:02:54.093000 +CVE-2014-0846,0,0,d257a72ce04a5cd591490c4914ac412822a686a5c4e6cdb12bdee8ecb1060ec4,2024-11-21T02:02:54.213000 +CVE-2014-0848,0,0,ea77d82dcb3115bd4c6044310d5a89596cac47d48135c4447f76f7926e9f2153,2024-11-21T02:02:54.327000 CVE-2014-0849,0,0,95f1eeef2b2224fb1faeedc531294d89f3f77eae1d2abeef5b6679cf725069e8,2017-08-29T01:34:17.060000 -CVE-2014-0850,0,1,6fcc46f759281a8bb9a2003c5f926fe762293008c6ffcf39f8103630040868b3,2024-11-21T02:02:54.553000 +CVE-2014-0850,0,0,6fcc46f759281a8bb9a2003c5f926fe762293008c6ffcf39f8103630040868b3,2024-11-21T02:02:54.553000 CVE-2014-0852,0,0,5f661fe93b548302bb8ec3a251242c58d0e33d571187b069c555b12e5614de95,2017-08-29T01:34:17.187000 -CVE-2014-0853,0,1,e785181b1f4a645c616d0211344ff0d00a4d98b64202499c431c725d83a3d9b0,2024-11-21T02:02:54.807000 -CVE-2014-0854,0,1,b20fc483dc53608188e40ac7bbd6f39d9272d1b943d7109d0a3a8535aafb3ff9,2024-11-21T02:02:54.917000 -CVE-2014-0855,0,1,098634b80807123869b8adc3f544bc8c46e997c944950e7d20d21e8ee365d9dd,2024-11-21T02:02:55.030000 -CVE-2014-0857,0,1,b45d996de181da043b669cf606c41b4344487509b14a4efd92eea8423388cec2,2024-11-21T02:02:55.150000 -CVE-2014-0858,0,1,77ba6e043d403acd10f72ff1727ae8e5db6a33fac0844a44357e2fafab62cf92,2024-11-21T02:02:55.317000 -CVE-2014-0859,0,1,669ced129c6d814e6d4181eb579bbba5e191a4243153b29abedebded4a265408,2024-11-21T02:02:55.457000 +CVE-2014-0853,0,0,e785181b1f4a645c616d0211344ff0d00a4d98b64202499c431c725d83a3d9b0,2024-11-21T02:02:54.807000 +CVE-2014-0854,0,0,b20fc483dc53608188e40ac7bbd6f39d9272d1b943d7109d0a3a8535aafb3ff9,2024-11-21T02:02:54.917000 +CVE-2014-0855,0,0,098634b80807123869b8adc3f544bc8c46e997c944950e7d20d21e8ee365d9dd,2024-11-21T02:02:55.030000 +CVE-2014-0857,0,0,b45d996de181da043b669cf606c41b4344487509b14a4efd92eea8423388cec2,2024-11-21T02:02:55.150000 +CVE-2014-0858,0,0,77ba6e043d403acd10f72ff1727ae8e5db6a33fac0844a44357e2fafab62cf92,2024-11-21T02:02:55.317000 +CVE-2014-0859,0,0,669ced129c6d814e6d4181eb579bbba5e191a4243153b29abedebded4a265408,2024-11-21T02:02:55.457000 CVE-2014-0860,0,0,c480d6244fe51cce50269e9f22a1f83d95abe53ea9ea4f83ba64cdab887ed1c1,2017-08-29T01:34:17.637000 -CVE-2014-0861,0,1,bcd30d26765560f495342fd5c3808ead43e646d40be8fba37e784aede99a1037,2024-11-21T02:02:55.720000 -CVE-2014-0862,0,1,7416148437a2b57d663bae1ab53c0c735d7594010129e76a648238d224dc178e,2024-11-21T02:02:55.843000 +CVE-2014-0861,0,0,bcd30d26765560f495342fd5c3808ead43e646d40be8fba37e784aede99a1037,2024-11-21T02:02:55.720000 +CVE-2014-0862,0,0,7416148437a2b57d663bae1ab53c0c735d7594010129e76a648238d224dc178e,2024-11-21T02:02:55.843000 CVE-2014-0863,0,0,6963ca4c04675986cf4c0befcd51448a8512b5acb49eb682a60c565df7a4a980,2017-08-29T01:34:17.747000 CVE-2014-0864,0,0,98d4ce3dfbce791a69b13c1b1358a3a036ac89615f5e674debb5fac3297d14c7,2018-10-09T19:42:07.530000 CVE-2014-0865,0,0,4be888568480796f461d50c501a715fb2ba4e65d8cd825c8c99b88657e8f743e,2018-10-09T19:42:08.170000 @@ -65315,87 +65315,87 @@ CVE-2014-0869,0,0,10129c93b0f34742294da62ecdf9947f37f7dbdd1786bc076363c769cda77f CVE-2014-0870,0,0,ff02be0449c4cc1115e38fe3e9f0b975427639660b910b03c58487155dfef08c,2018-10-09T19:42:11.140000 CVE-2014-0871,0,0,4a0567b85ae190c02d8e6c1736b19e50e62df095e9f3b7d76751b8a468dbe07b,2018-10-09T19:42:11.780000 CVE-2014-0872,0,0,a44ebbb4118780b4a24532f2e6bca2d94ee5d843a35d72f48b485e2dbf98be17,2018-06-13T11:21:24.553000 -CVE-2014-0873,0,1,0c1bf1d2e0a6bd1902016ff27b62a12bd65642e4811b2b3cd62ec41daff78f09,2024-11-21T02:02:57.223000 -CVE-2014-0874,0,1,2a36b73f8f77abfb30a0c88d6e2f14a2e6b19279afb1b7e607a5a56041dfa9a4,2024-11-21T02:02:57.333000 +CVE-2014-0873,0,0,0c1bf1d2e0a6bd1902016ff27b62a12bd65642e4811b2b3cd62ec41daff78f09,2024-11-21T02:02:57.223000 +CVE-2014-0874,0,0,2a36b73f8f77abfb30a0c88d6e2f14a2e6b19279afb1b7e607a5a56041dfa9a4,2024-11-21T02:02:57.333000 CVE-2014-0875,0,0,0366c2bca8747bcb2509986726032a5fdb330f5bb604256738ee3809c87c6c4f,2017-01-07T02:59:34.390000 CVE-2014-0876,0,0,2c68b5137b823d433b86566b090e89c426299fdbbe5edfd2e472915819cbfe82,2017-08-29T01:34:18.467000 CVE-2014-0877,0,0,85f0be4e8fc7a1db57ebcd6e08d3378f20209c6f945e07d5c364018b48259213,2017-08-29T01:34:18.513000 CVE-2014-0878,0,0,3390a4afd7622e0e497305b1df0e7618d08c591fb9e3c359475db437763cd6ea,2017-08-29T01:34:18.607000 -CVE-2014-0879,0,1,2a55618da604e0736118de32114f094899b3fd2eea897c12b85af75167c41fea,2024-11-21T02:02:57.947000 -CVE-2014-0880,0,1,9f7006858b21843dfa75d9d219a4631f7f163962f0a51bb00a3da351791ea5c9,2024-11-21T02:02:58.060000 +CVE-2014-0879,0,0,2a55618da604e0736118de32114f094899b3fd2eea897c12b85af75167c41fea,2024-11-21T02:02:57.947000 +CVE-2014-0880,0,0,9f7006858b21843dfa75d9d219a4631f7f163962f0a51bb00a3da351791ea5c9,2024-11-21T02:02:58.060000 CVE-2014-0881,0,0,e819f74e004612288481d0c2d9fbe21a18e0bbe19e0b5b7b403ef3e45f7906c2,2018-06-04T13:20:31.333000 CVE-2014-0882,0,0,983a04bb9bbe3f927cf60f3804d969fe3896d0fcfe31f2ded9942408177578f4,2018-06-04T13:32:12.177000 CVE-2014-0883,0,0,2bc1a348b733bba0861e1b2dca52ea6d33019ff2586c24977469cc49ebe74226,2023-11-09T02:15:07.550000 -CVE-2014-0884,0,1,c5e2d9ed7f1bf411781dcb429834c5e182135ef7f351b68373adcab8ab7c152a,2024-11-21T02:02:58.580000 -CVE-2014-0885,0,1,b4d25c6d1cc1a402404c12bb3220d234ab21ba786e4ec40b2cb21dc8323cd4f4,2024-11-21T02:02:58.693000 -CVE-2014-0886,0,1,08c1292d5cb768d1e8ac21c39ab5579c8883cdd98de7448a5875d48e4291807f,2024-11-21T02:02:58.803000 -CVE-2014-0887,0,1,497fb371b9204ce25ea9c99973bc7a44404bb61943dd9bae5b59beaf11bb23ea,2024-11-21T02:02:58.917000 +CVE-2014-0884,0,0,c5e2d9ed7f1bf411781dcb429834c5e182135ef7f351b68373adcab8ab7c152a,2024-11-21T02:02:58.580000 +CVE-2014-0885,0,0,b4d25c6d1cc1a402404c12bb3220d234ab21ba786e4ec40b2cb21dc8323cd4f4,2024-11-21T02:02:58.693000 +CVE-2014-0886,0,0,08c1292d5cb768d1e8ac21c39ab5579c8883cdd98de7448a5875d48e4291807f,2024-11-21T02:02:58.803000 +CVE-2014-0887,0,0,497fb371b9204ce25ea9c99973bc7a44404bb61943dd9bae5b59beaf11bb23ea,2024-11-21T02:02:58.917000 CVE-2014-0888,0,0,4e08ee51e112d8e21322662ae057925f2ce4d5106fa75ee5dbf9d90789754e19,2017-08-29T01:34:19.090000 CVE-2014-0889,0,0,3a610db0a6e0ec8feadf5ed614ca7d5f4502066c9ad924029852f01baddc4f3a,2017-08-29T01:34:19.170000 -CVE-2014-0890,0,1,d0ec323c4d28da29b4862ca17427ed70db531a9315a264165da201b66848c2ab,2024-11-21T02:02:59.283000 +CVE-2014-0890,0,0,d0ec323c4d28da29b4862ca17427ed70db531a9315a264165da201b66848c2ab,2024-11-21T02:02:59.283000 CVE-2014-0891,0,0,0d4d975289b3373046dc4d6b0d8cde446201706d8748df33e99f078b29592d9b,2017-08-29T01:34:19.310000 -CVE-2014-0892,0,1,cca85b4a6fe0ef6793514018bb31d85a220c6fc8a129d8c63419b45acd58ea2b,2024-11-21T02:02:59.523000 +CVE-2014-0892,0,0,cca85b4a6fe0ef6793514018bb31d85a220c6fc8a129d8c63419b45acd58ea2b,2024-11-21T02:02:59.523000 CVE-2014-0893,0,0,7f99ed63a1c7cc638212128afa782971052acd1095be1b2bdda38f022c1f3e55,2017-08-29T01:34:19.437000 CVE-2014-0894,0,0,cad3d5a87a93fa8e35904b7f682d17ee1a673acf2a04e2ec02cd3c307ad1c047,2018-10-09T19:42:12.547000 -CVE-2014-0895,0,1,640df179a9024dea26f9ec01cc5537b8f550c771c02616102a05fdc4dea6becf,2024-11-21T02:02:59.907000 -CVE-2014-0896,0,1,1b38c789f0f317efff923f94be84d940b2e9eccdca6f2ba125a28cc7a1c332a2,2024-11-21T02:03:00.027000 +CVE-2014-0895,0,0,640df179a9024dea26f9ec01cc5537b8f550c771c02616102a05fdc4dea6becf,2024-11-21T02:02:59.907000 +CVE-2014-0896,0,0,1b38c789f0f317efff923f94be84d940b2e9eccdca6f2ba125a28cc7a1c332a2,2024-11-21T02:03:00.027000 CVE-2014-0897,0,0,88c15943a2048322830adcd31105a7c1521d5a00a00bb94dbbb9a8e163f4101f,2017-08-29T01:34:19.687000 -CVE-2014-0899,0,1,f003f67c70dd80b05fefd25ae486a347a3826c75e2133b0e106df49fe9eafb0e,2024-11-21T02:03:00.270000 +CVE-2014-0899,0,0,f003f67c70dd80b05fefd25ae486a347a3826c75e2133b0e106df49fe9eafb0e,2024-11-21T02:03:00.270000 CVE-2014-0900,0,0,d976627d05242d1072a1e8c9a1b1bc0369cbbce728bfd44554521bff497efc65,2018-05-23T18:01:49.327000 -CVE-2014-0901,0,1,037f67a04a3ee98e391c87bd6cc126359d672f568b147cc0a9d8129f20dcd42c,2024-11-21T02:03:00.567000 -CVE-2014-0904,0,1,9f8e6c1c5567b6c6d533e5c0f9cc312d9ecbf15317f3e812f1611d8d47d8e429,2024-11-21T02:03:00.687000 +CVE-2014-0901,0,0,037f67a04a3ee98e391c87bd6cc126359d672f568b147cc0a9d8129f20dcd42c,2024-11-21T02:03:00.567000 +CVE-2014-0904,0,0,9f8e6c1c5567b6c6d533e5c0f9cc312d9ecbf15317f3e812f1611d8d47d8e429,2024-11-21T02:03:00.687000 CVE-2014-0905,0,0,2426698247a6bdf0be0db35b85b2b6376ef36909ef506f92224bfbf15a778256,2017-08-29T01:34:19.903000 -CVE-2014-0906,0,1,c035d2bfc17deff2a0be8aba9df9abc42afe907c664607f2705466f299264fd1,2024-11-21T02:03:00.910000 +CVE-2014-0906,0,0,c035d2bfc17deff2a0be8aba9df9abc42afe907c664607f2705466f299264fd1,2024-11-21T02:03:00.910000 CVE-2014-0907,0,0,924bd7230057edd988847ea5082e155639070c5d86c730a2bd2002be6f849bf7,2017-08-29T01:34:20.047000 -CVE-2014-0908,0,1,e0501cee08c3a67788a68406047698ba6fa60851f57c8415cc99b7ff9a8c16a5,2024-11-21T02:03:01.187000 +CVE-2014-0908,0,0,e0501cee08c3a67788a68406047698ba6fa60851f57c8415cc99b7ff9a8c16a5,2024-11-21T02:03:01.187000 CVE-2014-0909,0,0,4e355aaf65b703e10b39e3152400277abd04fcf799283791cf357a1e9129b940,2017-08-29T01:34:20.153000 CVE-2014-0910,0,0,b4e5511fd9ef1862257f82a99e61ea3db7779eeacad0bd07367257fa13611545,2017-08-29T01:34:20.217000 -CVE-2014-0911,0,1,3b2716e367edd74d41fb3a2558dc4af03370fcc079ec0ef68e8599666ce06a33,2024-11-21T02:03:01.590000 +CVE-2014-0911,0,0,3b2716e367edd74d41fb3a2558dc4af03370fcc079ec0ef68e8599666ce06a33,2024-11-21T02:03:01.590000 CVE-2014-0912,0,0,5f70f89cb1b906b6d2e6db128455648a271e00998e57125c2b4c6317fba27bde,2018-05-22T15:15:02.657000 -CVE-2014-0913,0,1,f3122f80f3f048f6513ceaa0beda8c0a4f3e2b3aec0c7198ae8f3e9cd2eaccda,2024-11-21T02:03:01.853000 +CVE-2014-0913,0,0,f3122f80f3f048f6513ceaa0beda8c0a4f3e2b3aec0c7198ae8f3e9cd2eaccda,2024-11-21T02:03:01.853000 CVE-2014-0914,0,0,49731131c3d206f04e0a18a2ae49a2d97847903a5ceb37c6e69c8d077d15ca1e,2018-10-09T19:42:13.217000 CVE-2014-0915,0,0,8cffeab34691bb37cf92eb305483388b84b12555dfddb864827c7ff93cd85b7f,2018-10-09T19:42:14.140000 -CVE-2014-0917,0,1,14c9ff2611b80cf9816aec3280f41fb9467a28bede9ad5f06b1d78777c96e38a,2024-11-21T02:03:02.270000 -CVE-2014-0918,0,1,e9d248653ec49b6787abb84bbb6b3a15ffe5749299379825a3bfa7b191f4336a,2024-11-21T02:03:02.427000 +CVE-2014-0917,0,0,14c9ff2611b80cf9816aec3280f41fb9467a28bede9ad5f06b1d78777c96e38a,2024-11-21T02:03:02.270000 +CVE-2014-0918,0,0,e9d248653ec49b6787abb84bbb6b3a15ffe5749299379825a3bfa7b191f4336a,2024-11-21T02:03:02.427000 CVE-2014-0919,0,0,2d0cfe595f105d506ae5c47dba90c76ebdbea24ecbf8da8b3353860a54e670f9,2016-11-28T19:10:42.190000 -CVE-2014-0920,0,1,ec16ef6cbe19514ae1941f61f6dd5a63f91d1f376b2325e90b70b18819970725,2024-11-21T02:03:02.710000 -CVE-2014-0921,0,1,d1c8023902d966b95299d0d6c401200be9db34a624b78ef16cc87793c85a29d3,2024-11-21T02:03:02.827000 -CVE-2014-0922,0,1,7d267eb78539f9b08f6adf16d2bfd88f0d57c635a23cab4e347973826de77653,2024-11-21T02:03:02.943000 -CVE-2014-0923,0,1,3318ded279e976a48165483f5c62aa96488b0dc5d185ef4dbfd77ab3e712d1f1,2024-11-21T02:03:03.067000 -CVE-2014-0924,0,1,30d1e70e42e7ef26d3bb4b679343c6be4142580a0b2f5948b8138fe0259b983c,2024-11-21T02:03:03.190000 +CVE-2014-0920,0,0,ec16ef6cbe19514ae1941f61f6dd5a63f91d1f376b2325e90b70b18819970725,2024-11-21T02:03:02.710000 +CVE-2014-0921,0,0,d1c8023902d966b95299d0d6c401200be9db34a624b78ef16cc87793c85a29d3,2024-11-21T02:03:02.827000 +CVE-2014-0922,0,0,7d267eb78539f9b08f6adf16d2bfd88f0d57c635a23cab4e347973826de77653,2024-11-21T02:03:02.943000 +CVE-2014-0923,0,0,3318ded279e976a48165483f5c62aa96488b0dc5d185ef4dbfd77ab3e712d1f1,2024-11-21T02:03:03.067000 +CVE-2014-0924,0,0,30d1e70e42e7ef26d3bb4b679343c6be4142580a0b2f5948b8138fe0259b983c,2024-11-21T02:03:03.190000 CVE-2014-0925,0,0,1c39273a4446bc5b62b4d8b090d4f3e504843acde9b541c8c1b25b6cde11b76b,2017-08-29T01:34:20.967000 CVE-2014-0927,0,0,98e6b542dc1637df4d4888b3dbff5108ea7270171aa337b84c7b644467f5f8d2,2018-05-22T15:17:49.683000 CVE-2014-0929,0,0,5d7187411daa568f409df40f928d8cc83dbc3e9283ae7b7c34eae20a70abc709,2017-08-29T01:34:21.013000 -CVE-2014-0930,0,1,aeef0e7f103f1550fb93c12461bc52760d76ae41b803bb559098e4938af4fc88,2024-11-21T02:03:03.673000 +CVE-2014-0930,0,0,aeef0e7f103f1550fb93c12461bc52760d76ae41b803bb559098e4938af4fc88,2024-11-21T02:03:03.673000 CVE-2014-0931,0,0,e493d882a5a838316ad7de4cf0a887457816578ab6655676fbad1080d0f1c380,2018-05-22T16:45:06.410000 -CVE-2014-0932,0,1,b549b4f0810941897dfc1af542b59452ec287eb3b9b0d333e26bcf0ef9f6ea93,2024-11-21T02:03:03.930000 -CVE-2014-0933,0,1,b929a221064fb598cc32613abd4e90617b6b26712928680c72a1727bb35fca2e,2024-11-21T02:03:04.040000 +CVE-2014-0932,0,0,b549b4f0810941897dfc1af542b59452ec287eb3b9b0d333e26bcf0ef9f6ea93,2024-11-21T02:03:03.930000 +CVE-2014-0933,0,0,b929a221064fb598cc32613abd4e90617b6b26712928680c72a1727bb35fca2e,2024-11-21T02:03:04.040000 CVE-2014-0935,0,0,a574507cf9998282bd9f4e8c2e1ace86e9a41bf01d9f7f9d92cf80b50fe8b960,2017-08-29T01:34:21.297000 CVE-2014-0936,0,0,f61f4d2bfc5aa21e3c3a78e1dff2078a9c1fa7c5838694ee848b030caed2577f,2017-08-29T01:34:21.343000 CVE-2014-0940,0,0,89789e9d5f640dccd3b2b50a9def6d628c5d8149cc86ba0feb43198b93fead97,2017-08-29T01:34:21.420000 -CVE-2014-0941,0,1,de4ea903a953947cedfc8ba953190cd34db3df978703329f0c7295a007782bae,2024-11-21T02:03:04.523000 -CVE-2014-0942,0,1,b2a29426aabc0d5c041bf52bdfec199c3f0e1d9f88044a3dff109e6aaa2c1003,2024-11-21T02:03:04.643000 -CVE-2014-0943,0,1,5f180d4854c764d3b23f792a81f99c02869d0a7ebda1db82bdb52c449fbabae8,2024-11-21T02:03:04.753000 -CVE-2014-0944,0,1,bc47f3889aee3f6bb0f98ecd74f06856a409c280ad2e425fed75db6321c7afd9,2024-11-21T02:03:04.867000 -CVE-2014-0945,0,1,38c7ff5bec5e69602be21e6dceecc2c93c4e5b4e415527a3bbd40f5331f0444c,2024-11-21T02:03:04.990000 -CVE-2014-0946,0,1,7aa61614c212a56746ac248be072ccfd8e4f35f5b59125e035ad52ba67f46b52,2024-11-21T02:03:05.120000 +CVE-2014-0941,0,0,de4ea903a953947cedfc8ba953190cd34db3df978703329f0c7295a007782bae,2024-11-21T02:03:04.523000 +CVE-2014-0942,0,0,b2a29426aabc0d5c041bf52bdfec199c3f0e1d9f88044a3dff109e6aaa2c1003,2024-11-21T02:03:04.643000 +CVE-2014-0943,0,0,5f180d4854c764d3b23f792a81f99c02869d0a7ebda1db82bdb52c449fbabae8,2024-11-21T02:03:04.753000 +CVE-2014-0944,0,0,bc47f3889aee3f6bb0f98ecd74f06856a409c280ad2e425fed75db6321c7afd9,2024-11-21T02:03:04.867000 +CVE-2014-0945,0,0,38c7ff5bec5e69602be21e6dceecc2c93c4e5b4e415527a3bbd40f5331f0444c,2024-11-21T02:03:04.990000 +CVE-2014-0946,0,0,7aa61614c212a56746ac248be072ccfd8e4f35f5b59125e035ad52ba67f46b52,2024-11-21T02:03:05.120000 CVE-2014-0947,0,0,2282123ae887f20535f01b139bc7e1e79a5390d48f7fc18a20614998adaf64fe,2017-08-29T01:34:21.780000 CVE-2014-0948,0,0,62419105536fab9d51f5edb7fad1d5cf6747ade53e591dff91f045dd45a2c8a8,2017-08-29T01:34:21.843000 -CVE-2014-0949,0,1,fdfdef03f7805986ac89d237e1e4fd99af6c3411ebbb3c66555e8fa07da9f3cd,2024-11-21T02:03:05.490000 +CVE-2014-0949,0,0,fdfdef03f7805986ac89d237e1e4fd99af6c3411ebbb3c66555e8fa07da9f3cd,2024-11-21T02:03:05.490000 CVE-2014-0950,0,0,ac5cf90e08943b8575c7c078c187333f3f5999e478f7df4a7486bad1d966a710,2018-05-24T17:54:36.973000 -CVE-2014-0951,0,1,f19770012b21bf2f7044be3b1749bf7f40824c39a1973b4a34dd4d55ba41685c,2024-11-21T02:03:05.780000 -CVE-2014-0952,0,1,b4ffc4f473e4c6574a4495bd0b9be0e021362140a8f230920af0926cb2f7c757,2024-11-21T02:03:05.910000 +CVE-2014-0951,0,0,f19770012b21bf2f7044be3b1749bf7f40824c39a1973b4a34dd4d55ba41685c,2024-11-21T02:03:05.780000 +CVE-2014-0952,0,0,b4ffc4f473e4c6574a4495bd0b9be0e021362140a8f230920af0926cb2f7c757,2024-11-21T02:03:05.910000 CVE-2014-0953,0,0,6eaf0f4ca82a9bc44c7b2232545033897ac8ec17225552b531ac32a4350de117,2017-08-29T01:34:22.123000 -CVE-2014-0954,0,1,4998ace698b12c0a3bead03b9cd306e32c4da0c9d0aa1c2320abe91782776ae0,2024-11-21T02:03:06.170000 -CVE-2014-0955,0,1,ceffa2038b015403dcbdca0c61b57e76517c65f1e8cc267a5230cc4476e047af,2024-11-21T02:03:06.313000 -CVE-2014-0956,0,1,4a5f7204f673262fc30a5c1d7267ed78abdb94c7dc4897f5388d2cf837a4aff1,2024-11-21T02:03:06.443000 +CVE-2014-0954,0,0,4998ace698b12c0a3bead03b9cd306e32c4da0c9d0aa1c2320abe91782776ae0,2024-11-21T02:03:06.170000 +CVE-2014-0955,0,0,ceffa2038b015403dcbdca0c61b57e76517c65f1e8cc267a5230cc4476e047af,2024-11-21T02:03:06.313000 +CVE-2014-0956,0,0,4a5f7204f673262fc30a5c1d7267ed78abdb94c7dc4897f5388d2cf837a4aff1,2024-11-21T02:03:06.443000 CVE-2014-0957,0,0,d32d20827b88345dd3c0656e30b6aaa5a08c18364e859f8b2fa16bb021f0f1c2,2017-08-29T01:34:22.357000 -CVE-2014-0958,0,1,a67b78abc3dbb392f380afe970e86983892623053b0f3908002509abeaec0018,2024-11-21T02:03:06.690000 -CVE-2014-0959,0,1,6ec1396544b5a9f94f581a8019e52e005e0550733be5baac0f2a951422be5561,2024-11-21T02:03:06.823000 +CVE-2014-0958,0,0,a67b78abc3dbb392f380afe970e86983892623053b0f3908002509abeaec0018,2024-11-21T02:03:06.690000 +CVE-2014-0959,0,0,6ec1396544b5a9f94f581a8019e52e005e0550733be5baac0f2a951422be5561,2024-11-21T02:03:06.823000 CVE-2014-0960,0,0,4c7fa9404685168f6455879b2d3c20e7de889cfad6ff9c96947256f476fe8de8,2017-08-29T01:34:22.593000 CVE-2014-0961,0,0,a77807eb7e7bfc5f8d738f6596d3de8f39da1134e96a2599b072240988433914,2017-08-29T01:34:22.653000 -CVE-2014-0963,0,1,0a38c07513c7e4468ef8775c7ec1be742e62f534b488bd9d96f98a6f393cf671,2024-11-21T02:03:07.220000 -CVE-2014-0964,0,1,f6d8bba402cf70eb235b94afa77bff82fa3ea66e0947d06d0e27b3cae36b6ff6,2024-11-21T02:03:07.360000 +CVE-2014-0963,0,0,0a38c07513c7e4468ef8775c7ec1be742e62f534b488bd9d96f98a6f393cf671,2024-11-21T02:03:07.220000 +CVE-2014-0964,0,0,f6d8bba402cf70eb235b94afa77bff82fa3ea66e0947d06d0e27b3cae36b6ff6,2024-11-21T02:03:07.360000 CVE-2014-0965,0,0,6025abea85af955be7f3ed5852c6c7579b4e487ba3dbcfd9de391c9cdb4a29d9,2017-08-29T01:34:22.843000 CVE-2014-0966,0,0,b9748678e7709a274c8f07abb366392da8643f05e4de14018b49024c30fe2666,2017-08-29T01:34:22.890000 CVE-2014-0967,0,0,c0914e903096f1d703d71002c4cf6d1a493102337ec27d1c54029b11908dc61f,2017-08-29T01:34:22.950000 @@ -65405,14 +65405,14 @@ CVE-2014-0970,0,0,86a4d6130eb5e4e15d562fe42c1746196c6ee00077e6196fbaf993b6e49f48 CVE-2014-0972,0,0,9082d9321253952aa4940dd702e6cd9947acfb09a01f21eebb5e8c0e58c00cc6,2015-12-04T16:16:17.203000 CVE-2014-0973,0,0,ebfce9e7818eab24ee6b5012cba40f860126dc53889b20b6f0388a9889d17610,2016-07-13T18:26:46.740000 CVE-2014-0974,0,0,5d4286fa65862d4a9e21d66c4a6b091402eed0f137f40a39bc014c3cb843018e,2016-07-13T18:27:25.403000 -CVE-2014-0977,0,1,8853deaa7206590fee0dea774bf964873d5aab71ecfd8574c32d7c437391fc00,2024-11-21T02:03:08.660000 -CVE-2014-0978,0,1,6756056b4fe2ea300a8f0306abe84a94da48b02b97bd8623074935fc3f4a1288,2024-11-21T02:03:08.780000 -CVE-2014-0979,0,1,48b837f02c5be44aaed249ce86ac8373db5b3141cbc1a8fc4ff09bfad35c9102,2024-11-21T02:03:08.933000 -CVE-2014-0980,0,1,501107a8ca18a7cc9f30a48b6af8622f218f814b2a7a40667e93713951422bf7,2024-11-21T02:03:09.083000 -CVE-2014-0981,0,1,29219f184b2a97731848b798dd3776681dbc792f976fce3de94e0f85a1df7fbc,2024-11-21T02:03:09.247000 +CVE-2014-0977,0,0,8853deaa7206590fee0dea774bf964873d5aab71ecfd8574c32d7c437391fc00,2024-11-21T02:03:08.660000 +CVE-2014-0978,0,0,6756056b4fe2ea300a8f0306abe84a94da48b02b97bd8623074935fc3f4a1288,2024-11-21T02:03:08.780000 +CVE-2014-0979,0,0,48b837f02c5be44aaed249ce86ac8373db5b3141cbc1a8fc4ff09bfad35c9102,2024-11-21T02:03:08.933000 +CVE-2014-0980,0,0,501107a8ca18a7cc9f30a48b6af8622f218f814b2a7a40667e93713951422bf7,2024-11-21T02:03:09.083000 +CVE-2014-0981,0,0,29219f184b2a97731848b798dd3776681dbc792f976fce3de94e0f85a1df7fbc,2024-11-21T02:03:09.247000 CVE-2014-0982,0,0,a98bd71c649d0acb7b50ec5df521ddd126dadf483c0f7559aff8c565b55ad27f,2023-11-07T02:18:28.743000 -CVE-2014-0983,0,1,517d54802e79236067618223d84d0401cd23278ed525c125d6159560e77b5077,2024-11-21T02:03:09.423000 -CVE-2014-0984,0,1,0cd91b24c13a8bee173362305f09daedcae18f54de211f5d3d0f2318f4085106,2024-11-21T02:03:09.590000 +CVE-2014-0983,0,0,517d54802e79236067618223d84d0401cd23278ed525c125d6159560e77b5077,2024-11-21T02:03:09.423000 +CVE-2014-0984,0,0,0cd91b24c13a8bee173362305f09daedcae18f54de211f5d3d0f2318f4085106,2024-11-21T02:03:09.590000 CVE-2014-0985,0,0,d38c7acd571d646d128aa071c713a33abab92ec809013dd191c8ba5887d57ee6,2015-08-05T16:01:38.793000 CVE-2014-0986,0,0,d2cde44e0e6bf606f596cffc233782833954439ba3e34a1e657bf4296bf064b1,2015-08-05T16:02:37.637000 CVE-2014-0987,0,0,6f008662ebe07bbbe84624764ca6f4e8c88ac8baf3d1cfc98ba817e996048234,2015-08-05T16:03:44.433000 @@ -65577,43 +65577,43 @@ CVE-2014-10401,0,0,99238375b51bf1779ccb166f9a09c190e72a31f7d1db42b18847322d25a0d CVE-2014-10402,0,0,6c48d1cd34e2c36a978253e27fdbfc2f5feb320497a4de0ee42ffc8d558dab23,2022-06-02T14:15:25.857000 CVE-2014-1137,0,0,29c8e1b8bd867595b621c078a23a91fc1eb44472cb77a8f7e0593cde8f5fbbe6,2023-11-07T02:18:50.027000 CVE-2014-1155,0,0,2178c0ffac85784778f6063a44bf9a297047847b045d5db5479aba297ff175c9,2023-11-07T02:18:50.100000 -CVE-2014-1201,0,1,ab5174b83e089f3935e91ff14ea9ca1e419cbcb82622c45a0c00ec7d5bf34e97,2024-11-21T02:03:50.220000 -CVE-2014-1202,0,1,ff3a806cf3948ac69c5e8fe7323e33b54290d27aefccf94cd82fdfeb086abd1a,2024-11-21T02:03:50.377000 +CVE-2014-1201,0,0,ab5174b83e089f3935e91ff14ea9ca1e419cbcb82622c45a0c00ec7d5bf34e97,2024-11-21T02:03:50.220000 +CVE-2014-1202,0,0,ff3a806cf3948ac69c5e8fe7323e33b54290d27aefccf94cd82fdfeb086abd1a,2024-11-21T02:03:50.377000 CVE-2014-1203,0,0,9c0ac32c9ca4127bb78643118100ee7a2cc2483a0cc9ada03f142a9dec81109c,2019-12-11T14:38:14.600000 -CVE-2014-1204,0,1,683a66265d38d3cda221067b6706fcc04ec2d7ada9b23c15162333a341ede7b2,2024-11-21T02:03:50.703000 -CVE-2014-1206,0,1,24fb01b9230200f045e75413f0dadb22956a2105376a30d4347751a02b516981,2024-11-21T02:03:50.880000 -CVE-2014-1207,0,1,329b8c9c6e6a422f34f1169e20b5ccc7dfc6e6cec35a6c8fbd959b8cc019a40b,2024-11-21T02:03:51.050000 -CVE-2014-1208,0,1,bf3dc4cc0b8d0315f9654b8bf5609ed246bbc647d0bcb14970ee584ccc025b8a,2024-11-21T02:03:51.210000 -CVE-2014-1209,0,1,1f9417c3209398bd8ed02c721695a2ff491b4906d85d70abab95aeae471ce4f9,2024-11-21T02:03:51.397000 -CVE-2014-1210,0,1,7c9f43cf20ea00a419d05b0d042109200909b3d5a94f44e2a0bcca7e9979a8a8,2024-11-21T02:03:51.550000 -CVE-2014-1211,0,1,a35335a6e732cae3bd0355b399ce035ba3fecfd18ee325384cb2ded20de921a9,2024-11-21T02:03:51.697000 -CVE-2014-1213,0,1,a278b10a5fc119eb2a9623e454f95a07fe2ec09feda0c7839a1dadc951bb74d2,2024-11-21T02:03:51.847000 +CVE-2014-1204,0,0,683a66265d38d3cda221067b6706fcc04ec2d7ada9b23c15162333a341ede7b2,2024-11-21T02:03:50.703000 +CVE-2014-1206,0,0,24fb01b9230200f045e75413f0dadb22956a2105376a30d4347751a02b516981,2024-11-21T02:03:50.880000 +CVE-2014-1207,0,0,329b8c9c6e6a422f34f1169e20b5ccc7dfc6e6cec35a6c8fbd959b8cc019a40b,2024-11-21T02:03:51.050000 +CVE-2014-1208,0,0,bf3dc4cc0b8d0315f9654b8bf5609ed246bbc647d0bcb14970ee584ccc025b8a,2024-11-21T02:03:51.210000 +CVE-2014-1209,0,0,1f9417c3209398bd8ed02c721695a2ff491b4906d85d70abab95aeae471ce4f9,2024-11-21T02:03:51.397000 +CVE-2014-1210,0,0,7c9f43cf20ea00a419d05b0d042109200909b3d5a94f44e2a0bcca7e9979a8a8,2024-11-21T02:03:51.550000 +CVE-2014-1211,0,0,a35335a6e732cae3bd0355b399ce035ba3fecfd18ee325384cb2ded20de921a9,2024-11-21T02:03:51.697000 +CVE-2014-1213,0,0,a278b10a5fc119eb2a9623e454f95a07fe2ec09feda0c7839a1dadc951bb74d2,2024-11-21T02:03:51.847000 CVE-2014-1214,0,0,ef306d58037251765fd3c02df86a5b1a1e81309a23268db1f16d9c080c982448,2019-11-18T14:54:13.990000 CVE-2014-1215,0,0,73ed1a79b1f01532bf4e5a9d22ba68818a7cd688d25b82b2d880b470879bc8e5,2018-10-09T19:42:23.890000 -CVE-2014-1216,0,1,eb8ed8c7b1c77ea5118cc0ed61d5f20121a0fb91bf4813571a289aa3634ee604,2024-11-21T02:03:52.313000 -CVE-2014-1217,0,1,aa1584edf9b38b4d2962fc7fca0e33c80731c6454bcafe8374097ab0b00f59b2,2024-11-21T02:03:52.463000 -CVE-2014-1219,0,1,f4e13f327eb8c9e907c0f22d3d9f6fb02d75be2025517565904a59a543e546a6,2024-11-21T02:03:52.617000 +CVE-2014-1216,0,0,eb8ed8c7b1c77ea5118cc0ed61d5f20121a0fb91bf4813571a289aa3634ee604,2024-11-21T02:03:52.313000 +CVE-2014-1217,0,0,aa1584edf9b38b4d2962fc7fca0e33c80731c6454bcafe8374097ab0b00f59b2,2024-11-21T02:03:52.463000 +CVE-2014-1219,0,0,f4e13f327eb8c9e907c0f22d3d9f6fb02d75be2025517565904a59a543e546a6,2024-11-21T02:03:52.617000 CVE-2014-1222,0,0,94753bd7e819d3b4c5253294c1b712f941ca2eba9c8c6f77610fb7edc16d2cc7,2018-10-09T19:42:24.453000 -CVE-2014-1223,0,1,93d8fbcc89f8eab5a2f4a13b419994a955d7ab14c03a06bcb92c0d2ddb64415f,2024-11-21T02:03:52.903000 +CVE-2014-1223,0,0,93d8fbcc89f8eab5a2f4a13b419994a955d7ab14c03a06bcb92c0d2ddb64415f,2024-11-21T02:03:52.903000 CVE-2014-1224,0,0,68f0a6f2021acd601c6a9095201fdf241e7174c9fc2b77c470bc257855797bbd,2018-10-09T19:42:25.077000 CVE-2014-1226,0,0,dadef0870365e56e493e6a870712f06f90409854729d44f27fbf951b5848bc3a,2018-10-09T19:42:25.423000 -CVE-2014-1232,0,1,255fdbaa8b972411ff19da1bc3fc8ff9357c4b1d7d749fd34ef647427d7464ef,2024-11-21T02:03:53.357000 -CVE-2014-1233,0,1,6d01427524a4d9fc5cbe99e40568782f9038cb961797129d263ada22b775ec0d,2024-11-21T02:03:53.513000 -CVE-2014-1234,0,1,d3f1d79abf22ce0574c06c80225aa81cec737df54f0c6547e0d8471bfa86db88,2024-11-21T02:03:53.663000 +CVE-2014-1232,0,0,255fdbaa8b972411ff19da1bc3fc8ff9357c4b1d7d749fd34ef647427d7464ef,2024-11-21T02:03:53.357000 +CVE-2014-1233,0,0,6d01427524a4d9fc5cbe99e40568782f9038cb961797129d263ada22b775ec0d,2024-11-21T02:03:53.513000 +CVE-2014-1234,0,0,d3f1d79abf22ce0574c06c80225aa81cec737df54f0c6547e0d8471bfa86db88,2024-11-21T02:03:53.663000 CVE-2014-123456,0,0,4373823d5fb4a3e958416e2bb7bfaf624c1e5f9f1bfcf6051890e076961a3624,2023-11-07T02:18:30.793000 CVE-2014-1235,0,0,f31f3fd692accd4323ce8e29cc85ce554993f8e86a4ef207e687b6b8933b7b50,2017-08-29T01:34:23.920000 -CVE-2014-1236,0,1,45937bf6057756c01bf04c97072dfc76eb2274687bd463de76318048cf545e5a,2024-11-21T02:03:53.973000 -CVE-2014-1237,0,1,5150997b8a6bf9fa6d137f868892e0fd3fe7ca061f865526ff2c8801a978fbd8,2024-11-21T02:03:54.140000 +CVE-2014-1236,0,0,45937bf6057756c01bf04c97072dfc76eb2274687bd463de76318048cf545e5a,2024-11-21T02:03:53.973000 +CVE-2014-1237,0,0,5150997b8a6bf9fa6d137f868892e0fd3fe7ca061f865526ff2c8801a978fbd8,2024-11-21T02:03:54.140000 CVE-2014-1238,0,0,61ea471a3d708a8d14d25865b840aa9ece3204d2519a9500dd80f16707183608,2019-11-25T03:57:49.333000 -CVE-2014-1242,0,1,26216f2b639480f4d3b5188894fdb657e2319d1045ac4c61b2c6646a3cd34f7d,2024-11-21T02:03:54.450000 -CVE-2014-1243,0,1,0c1aef86acf6ab4a209749237d739d0ac797d023e6960883e7412d890d5c1e16,2024-11-21T02:03:54.577000 -CVE-2014-1244,0,1,fec244ae3620c2cb5322121a9f574d42e9d126ff51ad778a399e4d668e8e831b,2024-11-21T02:03:54.703000 -CVE-2014-1245,0,1,0dc1a15549fe3610663592ca35f80c1ec851fdc280b5871c3d6827ae5e5d2d9f,2024-11-21T02:03:54.837000 -CVE-2014-1246,0,1,63c07221ca793187eaf712d028f8d985dc9ae220eb2f0132f6c7cff13e4f6c62,2024-11-21T02:03:54.960000 -CVE-2014-1247,0,1,bd708147860e3c332518cdf4131a952df6ad0a7f13363f19efc6f16ee2e820e9,2024-11-21T02:03:55.090000 -CVE-2014-1248,0,1,df06d54e0217ec6ab2046cb01f803eccd9bafae933d22cebb09e847073f3c619,2024-11-21T02:03:55.213000 -CVE-2014-1249,0,1,e6c33236dc3fd5e815c93df02c547113685e370c8eedf332ee5bc8239ef6bbe4,2024-11-21T02:03:55.350000 -CVE-2014-1250,0,1,ecdc634b41c02d0c40198690f390d26a696ebc1662fed879a8cd1fc406391221,2024-11-21T02:03:55.500000 +CVE-2014-1242,0,0,26216f2b639480f4d3b5188894fdb657e2319d1045ac4c61b2c6646a3cd34f7d,2024-11-21T02:03:54.450000 +CVE-2014-1243,0,0,0c1aef86acf6ab4a209749237d739d0ac797d023e6960883e7412d890d5c1e16,2024-11-21T02:03:54.577000 +CVE-2014-1244,0,0,fec244ae3620c2cb5322121a9f574d42e9d126ff51ad778a399e4d668e8e831b,2024-11-21T02:03:54.703000 +CVE-2014-1245,0,0,0dc1a15549fe3610663592ca35f80c1ec851fdc280b5871c3d6827ae5e5d2d9f,2024-11-21T02:03:54.837000 +CVE-2014-1246,0,0,63c07221ca793187eaf712d028f8d985dc9ae220eb2f0132f6c7cff13e4f6c62,2024-11-21T02:03:54.960000 +CVE-2014-1247,0,0,bd708147860e3c332518cdf4131a952df6ad0a7f13363f19efc6f16ee2e820e9,2024-11-21T02:03:55.090000 +CVE-2014-1248,0,0,df06d54e0217ec6ab2046cb01f803eccd9bafae933d22cebb09e847073f3c619,2024-11-21T02:03:55.213000 +CVE-2014-1249,0,0,e6c33236dc3fd5e815c93df02c547113685e370c8eedf332ee5bc8239ef6bbe4,2024-11-21T02:03:55.350000 +CVE-2014-1250,0,0,ecdc634b41c02d0c40198690f390d26a696ebc1662fed879a8cd1fc406391221,2024-11-21T02:03:55.500000 CVE-2014-125001,0,0,49e550d4869ac6643e00c169f7b7aa2bf328a304efc3a409fef76d45796107d6,2022-06-08T14:19:34.263000 CVE-2014-125002,0,0,ceabf2486ca8d12c98a5a97a6fa1e7ab05768d6386d6f7337c042ff4fa6f4a39,2023-11-07T02:18:30.833000 CVE-2014-125003,0,0,0032e6dafbf77f388347a788eb5ff7ff25a253326b6b59361ddebf1c27c5cb65,2023-11-07T02:18:30.933000 @@ -65713,7 +65713,7 @@ CVE-2014-125096,0,0,7a367b1a011921b08fcea1e3b117c65d32ad8220f3cbe62819fe80dcc761 CVE-2014-125097,0,0,e5ff31fb53daf888bf49e1e1d012a9db46b6bb16108dcdb0b7baa633f5c22ae7,2024-05-17T00:58:23.263000 CVE-2014-125098,0,0,69554965dffb7cd6ce9ab89c8d48b34c2f67ef7d9fc26b59d5862c1bffe6225a,2024-05-17T00:58:23.390000 CVE-2014-125099,0,0,c7d7050eadc2e841c23fb0d565f31bae0d2cef0f5f856bb06646dfb8baf5cbba,2024-05-17T00:58:23.523000 -CVE-2014-1251,0,1,80f5d8c30d4638852cd293fc68b356a6ba7f9c4e151024869b76e14e9244324c,2024-11-21T02:03:55.627000 +CVE-2014-1251,0,0,80f5d8c30d4638852cd293fc68b356a6ba7f9c4e151024869b76e14e9244324c,2024-11-21T02:03:55.627000 CVE-2014-125100,0,0,e66b292ecf621b7bf971a16b534f686d520f1e67772cc3c6228e6c674b092a32,2024-05-17T00:58:23.647000 CVE-2014-125101,0,0,bac5f671c88187acb71ed956b6fcc09258328a1c0560ff48423a9252d1f08ac4,2024-05-17T00:58:23.763000 CVE-2014-125102,0,0,6c4a2fab8276e445671bc6df9d5e4c4aa2befe5a815edc220324b4e5f1860a59,2024-05-17T00:58:23.883000 @@ -65726,102 +65726,102 @@ CVE-2014-125108,0,0,81b128b886b6df99011157fa949b3e31938e62107dbd48b2039cac17d002 CVE-2014-125109,0,0,88282669f6e3f4b6d49a469c2a122361a8c3ec9b45fbc4925d5dad7fd0d80d71,2024-05-17T00:58:24.653000 CVE-2014-125110,0,0,f25e004582b4cc7a0dce1681f2e327c721f2dac08030dde7670bdbecbc75a394,2024-05-17T00:58:24.773000 CVE-2014-125111,0,0,68dd7d36a6eae4fb2eed2aa75bfe1afa83e9611818cc552fba48fbb453624aa2,2024-05-17T00:58:24.883000 -CVE-2014-1252,0,1,ed4e5bc26666ab09b8750eb29e9730dde88a81b33e9328a42a3784089a06ff8d,2024-11-21T02:03:55.747000 -CVE-2014-1253,0,1,9880a13b431c5b3e0c9df100a30657e107b4e4f679fe31086e1b0489a3d7d2bd,2024-11-21T02:03:55.897000 -CVE-2014-1254,0,1,9ab92d6d0fc0bda2e793a9fd379e3efe0f96a1b86fb4f38cbcc5d465be5e05dc,2024-11-21T02:03:56.010000 -CVE-2014-1255,0,1,a38bcc0f077daf73b6302de5ace2ab4f418d2ea8b5e2ef212fa6c88379697596,2024-11-21T02:03:56.127000 -CVE-2014-1256,0,1,06828c1bbfeac7381038870bb9ed9aed2f6460fa557f3e112904f0abdff5405a,2024-11-21T02:03:56.240000 -CVE-2014-1257,0,1,990afd92fa07db6752ff970035e52d33d34e93234656e1f98e75308da3f5545b,2024-11-21T02:03:56.377000 -CVE-2014-1258,0,1,75458493c601ebf15a34aeebcc589b1719be314a852045d339a35f11d65de827,2024-11-21T02:03:56.487000 -CVE-2014-1259,0,1,27d2bd810ee979ae2fe5031657eb81cdbc340bfaf0f3eaa98443fe4c53581a9d,2024-11-21T02:03:56.600000 -CVE-2014-1260,0,1,072221bd4162280b332ddccc6ee1c521aabc9a50b823dcc4f3db72228c4189f9,2024-11-21T02:03:56.713000 -CVE-2014-1261,0,1,463122866c0c7c81cad7f92ccb3d19f412cad896d8d4b5738a649cc3808ee882,2024-11-21T02:03:56.823000 -CVE-2014-1262,0,1,03e9f2a011aa9b20c435901de3a795acbaa445fcabf4a5b5d4eb70207b26bc1f,2024-11-21T02:03:56.933000 -CVE-2014-1263,0,1,870f601d3047c9def401f160ae43b7ea630c71a8b6e9df610dabe6045f999fb1,2024-11-21T02:03:57.043000 -CVE-2014-1264,0,1,93335a099337a7a26aa412f1e16e21ba295f2d6efa399bc878d628d266d1b94d,2024-11-21T02:03:57.200000 -CVE-2014-1265,0,1,eb9f7ebe830c78b39a1f502f406f5a819b09e2808740aeb7b0d9c2b1fbc0b1b9,2024-11-21T02:03:57.327000 -CVE-2014-1266,0,1,369f35e28c05e981e6d0d29e3959d27f5e97f73bda647edaa0ac79f184dad4be,2024-11-21T02:03:57.450000 -CVE-2014-1267,0,1,b0be0e40ce4d1c81e110b7740b4dc59a92482970416213e837f8809d12c78232,2024-11-21T02:03:57.613000 -CVE-2014-1268,0,1,862776c17bb516313055e5a824d336a2a689a134eea797b77636456831e0b5e9,2024-11-21T02:03:57.740000 -CVE-2014-1269,0,1,fc11f6729a80945d0b7048838f2a419cc217b32e138323b07451999d322f225a,2024-11-21T02:03:57.870000 -CVE-2014-1270,0,1,defba91cc3d6da04b4d62a91b5e45b87026be6a5172c3abddb3901ed77e7ec24,2024-11-21T02:03:58.050000 -CVE-2014-1271,0,1,cc3fc81f172e3e5fd9174e89d838f6b4d60469ded637aa18f21274a23a97a27d,2024-11-21T02:03:58.183000 -CVE-2014-1272,0,1,8c1e97a0707d1a1dbb8aff156639bcb17f0b629bb1490c33ed85f77964821a3a,2024-11-21T02:03:58.307000 -CVE-2014-1273,0,1,e90eecc509620cf888402c33c41dbd50b53fc8e23a34207c66208ca4df343084,2024-11-21T02:03:58.430000 -CVE-2014-1274,0,1,b25911ae78d5681a7154409eaad3cea24f5fe4850a1ecb6ad2b90b5e3a1bd16b,2024-11-21T02:03:58.557000 -CVE-2014-1275,0,1,7b70fddd5bcc37d5516eb23ee0b9fdfba83137e408068264e18278543e77379c,2024-11-21T02:03:58.683000 -CVE-2014-1276,0,1,7307acfbaa67e521f72a0e862af71d23a36d8f0e1e1e73c5e8d08284da31d84d,2024-11-21T02:03:58.810000 +CVE-2014-1252,0,0,ed4e5bc26666ab09b8750eb29e9730dde88a81b33e9328a42a3784089a06ff8d,2024-11-21T02:03:55.747000 +CVE-2014-1253,0,0,9880a13b431c5b3e0c9df100a30657e107b4e4f679fe31086e1b0489a3d7d2bd,2024-11-21T02:03:55.897000 +CVE-2014-1254,0,0,9ab92d6d0fc0bda2e793a9fd379e3efe0f96a1b86fb4f38cbcc5d465be5e05dc,2024-11-21T02:03:56.010000 +CVE-2014-1255,0,0,a38bcc0f077daf73b6302de5ace2ab4f418d2ea8b5e2ef212fa6c88379697596,2024-11-21T02:03:56.127000 +CVE-2014-1256,0,0,06828c1bbfeac7381038870bb9ed9aed2f6460fa557f3e112904f0abdff5405a,2024-11-21T02:03:56.240000 +CVE-2014-1257,0,0,990afd92fa07db6752ff970035e52d33d34e93234656e1f98e75308da3f5545b,2024-11-21T02:03:56.377000 +CVE-2014-1258,0,0,75458493c601ebf15a34aeebcc589b1719be314a852045d339a35f11d65de827,2024-11-21T02:03:56.487000 +CVE-2014-1259,0,0,27d2bd810ee979ae2fe5031657eb81cdbc340bfaf0f3eaa98443fe4c53581a9d,2024-11-21T02:03:56.600000 +CVE-2014-1260,0,0,072221bd4162280b332ddccc6ee1c521aabc9a50b823dcc4f3db72228c4189f9,2024-11-21T02:03:56.713000 +CVE-2014-1261,0,0,463122866c0c7c81cad7f92ccb3d19f412cad896d8d4b5738a649cc3808ee882,2024-11-21T02:03:56.823000 +CVE-2014-1262,0,0,03e9f2a011aa9b20c435901de3a795acbaa445fcabf4a5b5d4eb70207b26bc1f,2024-11-21T02:03:56.933000 +CVE-2014-1263,0,0,870f601d3047c9def401f160ae43b7ea630c71a8b6e9df610dabe6045f999fb1,2024-11-21T02:03:57.043000 +CVE-2014-1264,0,0,93335a099337a7a26aa412f1e16e21ba295f2d6efa399bc878d628d266d1b94d,2024-11-21T02:03:57.200000 +CVE-2014-1265,0,0,eb9f7ebe830c78b39a1f502f406f5a819b09e2808740aeb7b0d9c2b1fbc0b1b9,2024-11-21T02:03:57.327000 +CVE-2014-1266,0,0,369f35e28c05e981e6d0d29e3959d27f5e97f73bda647edaa0ac79f184dad4be,2024-11-21T02:03:57.450000 +CVE-2014-1267,0,0,b0be0e40ce4d1c81e110b7740b4dc59a92482970416213e837f8809d12c78232,2024-11-21T02:03:57.613000 +CVE-2014-1268,0,0,862776c17bb516313055e5a824d336a2a689a134eea797b77636456831e0b5e9,2024-11-21T02:03:57.740000 +CVE-2014-1269,0,0,fc11f6729a80945d0b7048838f2a419cc217b32e138323b07451999d322f225a,2024-11-21T02:03:57.870000 +CVE-2014-1270,0,0,defba91cc3d6da04b4d62a91b5e45b87026be6a5172c3abddb3901ed77e7ec24,2024-11-21T02:03:58.050000 +CVE-2014-1271,0,0,cc3fc81f172e3e5fd9174e89d838f6b4d60469ded637aa18f21274a23a97a27d,2024-11-21T02:03:58.183000 +CVE-2014-1272,0,0,8c1e97a0707d1a1dbb8aff156639bcb17f0b629bb1490c33ed85f77964821a3a,2024-11-21T02:03:58.307000 +CVE-2014-1273,0,0,e90eecc509620cf888402c33c41dbd50b53fc8e23a34207c66208ca4df343084,2024-11-21T02:03:58.430000 +CVE-2014-1274,0,0,b25911ae78d5681a7154409eaad3cea24f5fe4850a1ecb6ad2b90b5e3a1bd16b,2024-11-21T02:03:58.557000 +CVE-2014-1275,0,0,7b70fddd5bcc37d5516eb23ee0b9fdfba83137e408068264e18278543e77379c,2024-11-21T02:03:58.683000 +CVE-2014-1276,0,0,7307acfbaa67e521f72a0e862af71d23a36d8f0e1e1e73c5e8d08284da31d84d,2024-11-21T02:03:58.810000 CVE-2014-1277,0,0,be19250617d83bcd8c0cdcd3980120f763773ab57c5a435565159268cc1ef303,2023-11-07T02:18:50.607000 -CVE-2014-1278,0,1,027317053668726d554507c9c6f9b1054b102b349d8b9ad5aed70b0dade7f679,2024-11-21T02:03:58.950000 -CVE-2014-1279,0,1,26ac1f7b01e14f738a123d89e93d7f47da283f4eb5e462409786a89a5bdab738,2024-11-21T02:03:59.070000 -CVE-2014-1280,0,1,f7a20b6722f74250aac21b9b20dca14ce46f1a5e7649c7eab90557341fe0087e,2024-11-21T02:03:59.177000 -CVE-2014-1281,0,1,540f19b2edb3c82fe68ab2b7fd6e138c671203cab46419147ea7f42ab5142dc5,2024-11-21T02:03:59.290000 -CVE-2014-1282,0,1,0b736c71e4625809e390e659f9fc99f86b6bbbd530e5773fda1ee92a958a10e3,2024-11-21T02:03:59.410000 +CVE-2014-1278,0,0,027317053668726d554507c9c6f9b1054b102b349d8b9ad5aed70b0dade7f679,2024-11-21T02:03:58.950000 +CVE-2014-1279,0,0,26ac1f7b01e14f738a123d89e93d7f47da283f4eb5e462409786a89a5bdab738,2024-11-21T02:03:59.070000 +CVE-2014-1280,0,0,f7a20b6722f74250aac21b9b20dca14ce46f1a5e7649c7eab90557341fe0087e,2024-11-21T02:03:59.177000 +CVE-2014-1281,0,0,540f19b2edb3c82fe68ab2b7fd6e138c671203cab46419147ea7f42ab5142dc5,2024-11-21T02:03:59.290000 +CVE-2014-1282,0,0,0b736c71e4625809e390e659f9fc99f86b6bbbd530e5773fda1ee92a958a10e3,2024-11-21T02:03:59.410000 CVE-2014-1283,0,0,56218f394c3b7637aba0eb9c5a93ccec65007c453adf1091f66b072211099c2c,2023-11-07T02:18:50.923000 CVE-2014-1284,0,0,8758143163399355d484dc5fb94d75c6b082449ebe3edfefb632cbf9feb345f2,2023-11-07T02:18:51.140000 -CVE-2014-1285,0,1,0988045db5c71668e956a7ddd4f388211779f02f1569fa81f7c9f93bd934735c,2024-11-21T02:03:59.567000 -CVE-2014-1286,0,1,666b668d3b2e86e7ea96bea37f8da6360b30318b173d415d203c3d3bd51c1e8c,2024-11-21T02:03:59.680000 -CVE-2014-1287,0,1,6b1a5b0142f9deb785724c66bd5714cc49417173681e479ac82314ea5475357b,2024-11-21T02:03:59.797000 +CVE-2014-1285,0,0,0988045db5c71668e956a7ddd4f388211779f02f1569fa81f7c9f93bd934735c,2024-11-21T02:03:59.567000 +CVE-2014-1286,0,0,666b668d3b2e86e7ea96bea37f8da6360b30318b173d415d203c3d3bd51c1e8c,2024-11-21T02:03:59.680000 +CVE-2014-1287,0,0,6b1a5b0142f9deb785724c66bd5714cc49417173681e479ac82314ea5475357b,2024-11-21T02:03:59.797000 CVE-2014-1288,0,0,981901b2269b8a0993a50336b18bc71b7792b67b1b27c164983e6854844f471d,2023-11-07T02:18:51.407000 -CVE-2014-1289,0,1,50c4e727e2e5cceb84e69a27ea9d679fabb7a09e33821ec4514d7105278368d7,2024-11-21T02:03:59.940000 -CVE-2014-1290,0,1,e0921d2b77dee9e96b1d42a92e10321afd272f536d98690b64a8078f28045992,2024-11-21T02:04:00.077000 -CVE-2014-1291,0,1,a8fba6cc5e5aa97c0c7f89ae8fc28000737d264f9bf1448223a3e96d07a26a69,2024-11-21T02:04:00.200000 -CVE-2014-1292,0,1,302417128cdb0c6b2d47ac349baef9c98f2112b8a8f922ef7b5381e79a1a13e8,2024-11-21T02:04:00.327000 -CVE-2014-1293,0,1,b0792ad59e690a386e736d0c3fab570224ea8591d9cabac1b56e4d9b7120f188,2024-11-21T02:04:00.457000 -CVE-2014-1294,0,1,c45273a0cf37746fc85e1fc92e967dcdfb1dd216b88e39ed63babaf1dcd2cd40,2024-11-21T02:04:00.593000 -CVE-2014-1295,0,1,a948ad4609ae7d67c5c77618176e5de72f5745bd2c652961fc7b47d25926f9ff,2024-11-21T02:04:00.717000 -CVE-2014-1296,0,1,19e2a6e871d73e0f97fa78cfc77fe123c2fd1a3af67d211ad03dcd10b7d1ee2d,2024-11-21T02:04:00.843000 -CVE-2014-1297,0,1,6c14a7f3228e67c8db766c95434ddadc516d4963a68f86cb5eefe63a936536bc,2024-11-21T02:04:00.967000 -CVE-2014-1298,0,1,00b3831b9e293923f730daa01b7a1cd23827915c2dc66f38f1f1ed5a3fd6562d,2024-11-21T02:04:01.090000 -CVE-2014-1299,0,1,101cbc0df86fabd324e4ba60582d40802674032cba736bb61238aec8567a2b54,2024-11-21T02:04:01.223000 -CVE-2014-1300,0,1,135f7b8ac69e59b86021ab44b55336280272684c78ea408318e30e59581feff6,2024-11-21T02:04:01.353000 -CVE-2014-1301,0,1,1aedb031dfbf2909c40609c847747c72645a4873700c45df683ca3c11be57816,2024-11-21T02:04:01.497000 -CVE-2014-1302,0,1,24d6accaeba53dbfd9c7bdca192ba93da9d61cfe2446bc8006892dd85b762ef7,2024-11-21T02:04:01.623000 -CVE-2014-1303,0,1,fc39b13c81bfb2570359ab195f5508df76416f7807897d8731db3ba651410e5e,2024-11-21T02:04:01.760000 -CVE-2014-1304,0,1,df69f4906ba7d22b2bab8b73bf2d049edb840df8f603729e49475cebadc78cd5,2024-11-21T02:04:01.900000 -CVE-2014-1305,0,1,3a6959746577824b1be48c671a56903b0fa274c2b39ecc52ba2911ef2e3203ef,2024-11-21T02:04:02.023000 +CVE-2014-1289,0,0,50c4e727e2e5cceb84e69a27ea9d679fabb7a09e33821ec4514d7105278368d7,2024-11-21T02:03:59.940000 +CVE-2014-1290,0,0,e0921d2b77dee9e96b1d42a92e10321afd272f536d98690b64a8078f28045992,2024-11-21T02:04:00.077000 +CVE-2014-1291,0,0,a8fba6cc5e5aa97c0c7f89ae8fc28000737d264f9bf1448223a3e96d07a26a69,2024-11-21T02:04:00.200000 +CVE-2014-1292,0,0,302417128cdb0c6b2d47ac349baef9c98f2112b8a8f922ef7b5381e79a1a13e8,2024-11-21T02:04:00.327000 +CVE-2014-1293,0,0,b0792ad59e690a386e736d0c3fab570224ea8591d9cabac1b56e4d9b7120f188,2024-11-21T02:04:00.457000 +CVE-2014-1294,0,0,c45273a0cf37746fc85e1fc92e967dcdfb1dd216b88e39ed63babaf1dcd2cd40,2024-11-21T02:04:00.593000 +CVE-2014-1295,0,0,a948ad4609ae7d67c5c77618176e5de72f5745bd2c652961fc7b47d25926f9ff,2024-11-21T02:04:00.717000 +CVE-2014-1296,0,0,19e2a6e871d73e0f97fa78cfc77fe123c2fd1a3af67d211ad03dcd10b7d1ee2d,2024-11-21T02:04:00.843000 +CVE-2014-1297,0,0,6c14a7f3228e67c8db766c95434ddadc516d4963a68f86cb5eefe63a936536bc,2024-11-21T02:04:00.967000 +CVE-2014-1298,0,0,00b3831b9e293923f730daa01b7a1cd23827915c2dc66f38f1f1ed5a3fd6562d,2024-11-21T02:04:01.090000 +CVE-2014-1299,0,0,101cbc0df86fabd324e4ba60582d40802674032cba736bb61238aec8567a2b54,2024-11-21T02:04:01.223000 +CVE-2014-1300,0,0,135f7b8ac69e59b86021ab44b55336280272684c78ea408318e30e59581feff6,2024-11-21T02:04:01.353000 +CVE-2014-1301,0,0,1aedb031dfbf2909c40609c847747c72645a4873700c45df683ca3c11be57816,2024-11-21T02:04:01.497000 +CVE-2014-1302,0,0,24d6accaeba53dbfd9c7bdca192ba93da9d61cfe2446bc8006892dd85b762ef7,2024-11-21T02:04:01.623000 +CVE-2014-1303,0,0,fc39b13c81bfb2570359ab195f5508df76416f7807897d8731db3ba651410e5e,2024-11-21T02:04:01.760000 +CVE-2014-1304,0,0,df69f4906ba7d22b2bab8b73bf2d049edb840df8f603729e49475cebadc78cd5,2024-11-21T02:04:01.900000 +CVE-2014-1305,0,0,3a6959746577824b1be48c671a56903b0fa274c2b39ecc52ba2911ef2e3203ef,2024-11-21T02:04:02.023000 CVE-2014-1306,0,0,69a586d8032c33bc351391597da98f2c73c7df1a19d4a9832348ef683bfe777e,2023-11-07T02:18:51.767000 -CVE-2014-1307,0,1,13e4e42231aac11ba7672968ea200048d36708beb7181791d8dceeff1dba2b06,2024-11-21T02:04:02.170000 -CVE-2014-1308,0,1,490fac59f6cc36f8073621ca1d7db521f0a3daf45655215154293d2abb8d7765,2024-11-21T02:04:02.320000 -CVE-2014-1309,0,1,567a1b11c6b73214b60d9b5328a970c5d4ba811d8739caa788f8c35a0a752d76,2024-11-21T02:04:02.463000 -CVE-2014-1310,0,1,f5e1d748184a43de72131edfbf895dc72936b209123608d2b96fc8bba99e59c7,2024-11-21T02:04:02.593000 -CVE-2014-1311,0,1,8564896d88c9e3d7dc57192cb9388604993c30d026727355dd1af6375e9d8ba4,2024-11-21T02:04:02.720000 -CVE-2014-1312,0,1,ce948b2a07e0ba9ceb5c9faa5937328696bf6f6e1a3115341c13b06fa1d5c5d4,2024-11-21T02:04:02.850000 -CVE-2014-1313,0,1,998c2ada6cfce67f677c6236f1831f25dc17877c0f976b66853221878289d8be,2024-11-21T02:04:02.973000 -CVE-2014-1314,0,1,dc45adb401d67cddb61a9db8475f71f9a7ddf06b9c750715ba9323c71f1acd33,2024-11-21T02:04:03.107000 -CVE-2014-1315,0,1,717002240096b06e50668cc9047db29908d2f809edf49eed71258874b0d08bad,2024-11-21T02:04:03.220000 -CVE-2014-1316,0,1,b50dfd03ad25bac38366f34fc7071315dbaf53da72c01fd471c426d9b9310d28,2024-11-21T02:04:03.337000 +CVE-2014-1307,0,0,13e4e42231aac11ba7672968ea200048d36708beb7181791d8dceeff1dba2b06,2024-11-21T02:04:02.170000 +CVE-2014-1308,0,0,490fac59f6cc36f8073621ca1d7db521f0a3daf45655215154293d2abb8d7765,2024-11-21T02:04:02.320000 +CVE-2014-1309,0,0,567a1b11c6b73214b60d9b5328a970c5d4ba811d8739caa788f8c35a0a752d76,2024-11-21T02:04:02.463000 +CVE-2014-1310,0,0,f5e1d748184a43de72131edfbf895dc72936b209123608d2b96fc8bba99e59c7,2024-11-21T02:04:02.593000 +CVE-2014-1311,0,0,8564896d88c9e3d7dc57192cb9388604993c30d026727355dd1af6375e9d8ba4,2024-11-21T02:04:02.720000 +CVE-2014-1312,0,0,ce948b2a07e0ba9ceb5c9faa5937328696bf6f6e1a3115341c13b06fa1d5c5d4,2024-11-21T02:04:02.850000 +CVE-2014-1313,0,0,998c2ada6cfce67f677c6236f1831f25dc17877c0f976b66853221878289d8be,2024-11-21T02:04:02.973000 +CVE-2014-1314,0,0,dc45adb401d67cddb61a9db8475f71f9a7ddf06b9c750715ba9323c71f1acd33,2024-11-21T02:04:03.107000 +CVE-2014-1315,0,0,717002240096b06e50668cc9047db29908d2f809edf49eed71258874b0d08bad,2024-11-21T02:04:03.220000 +CVE-2014-1316,0,0,b50dfd03ad25bac38366f34fc7071315dbaf53da72c01fd471c426d9b9310d28,2024-11-21T02:04:03.337000 CVE-2014-1317,0,0,fc8dc540b7e2b925f5bdd755fcec6948b3c2e9449440e8b637bd2a3efa5a9597,2015-12-22T18:27:57.137000 -CVE-2014-1318,0,1,33994315a4907f4909238c8ad8f66296cdc7e715894ca87de0752083a4db7075,2024-11-21T02:04:03.573000 -CVE-2014-1319,0,1,1a77315fa5d9bcb560e2a18c5db51485c8a5e8faafda581af1eef99884619ba9,2024-11-21T02:04:03.690000 -CVE-2014-1320,0,1,7359ff33cdc740d8d47852e397d0fc1f84480fb8c8c4d9d251aabf852ed41e31,2024-11-21T02:04:03.800000 -CVE-2014-1321,0,1,c7baa90f9667f0d3219616e0f6f2abf6ce47476fec8cc08f9b34db1f6763085c,2024-11-21T02:04:03.930000 -CVE-2014-1322,0,1,f9df6cf2c24689a2ce0c6316c261c1b76320e1c6ba54a49254fc6b94e4b08890,2024-11-21T02:04:04.050000 -CVE-2014-1323,0,1,61a309938ce95ba0c67c7194e5e12eb6e36eb1dcd8180f6232e1bc0c67daa162,2024-11-21T02:04:04.173000 -CVE-2014-1324,0,1,2f06a8a45305aae7505a737d710f4baadad8835bf3534c0bec8d94e962331026,2024-11-21T02:04:04.310000 +CVE-2014-1318,0,0,33994315a4907f4909238c8ad8f66296cdc7e715894ca87de0752083a4db7075,2024-11-21T02:04:03.573000 +CVE-2014-1319,0,0,1a77315fa5d9bcb560e2a18c5db51485c8a5e8faafda581af1eef99884619ba9,2024-11-21T02:04:03.690000 +CVE-2014-1320,0,0,7359ff33cdc740d8d47852e397d0fc1f84480fb8c8c4d9d251aabf852ed41e31,2024-11-21T02:04:03.800000 +CVE-2014-1321,0,0,c7baa90f9667f0d3219616e0f6f2abf6ce47476fec8cc08f9b34db1f6763085c,2024-11-21T02:04:03.930000 +CVE-2014-1322,0,0,f9df6cf2c24689a2ce0c6316c261c1b76320e1c6ba54a49254fc6b94e4b08890,2024-11-21T02:04:04.050000 +CVE-2014-1323,0,0,61a309938ce95ba0c67c7194e5e12eb6e36eb1dcd8180f6232e1bc0c67daa162,2024-11-21T02:04:04.173000 +CVE-2014-1324,0,0,2f06a8a45305aae7505a737d710f4baadad8835bf3534c0bec8d94e962331026,2024-11-21T02:04:04.310000 CVE-2014-1325,0,0,49d34bb09d8eb50dab73b8202aa6108d7f780f89e2611cb2cdc1567c231e0b55,2019-03-08T16:06:30.590000 -CVE-2014-1326,0,1,50c9c76d69ab233db827b992d931050a61e0db79c621e0140086e17bd69d8a0b,2024-11-21T02:04:04.583000 -CVE-2014-1327,0,1,899a7d4e88407730ddcfb51cc15e5e24de4a1cec590ad1451978e5ae81148546,2024-11-21T02:04:04.723000 +CVE-2014-1326,0,0,50c9c76d69ab233db827b992d931050a61e0db79c621e0140086e17bd69d8a0b,2024-11-21T02:04:04.583000 +CVE-2014-1327,0,0,899a7d4e88407730ddcfb51cc15e5e24de4a1cec590ad1451978e5ae81148546,2024-11-21T02:04:04.723000 CVE-2014-1328,0,0,9f7bed08770a46e3f4d98e32d68b628d43b8118afc757538becc7e84e888a421,2023-11-07T02:18:52.283000 -CVE-2014-1329,0,1,f0d6c0ef952b1c9fb916e589e3ab2ca1bc642842c88c7db09da77356cbe3f557,2024-11-21T02:04:04.867000 -CVE-2014-1330,0,1,10759392e50532247ebc62676d7fc78c71a99eed7d529b2ae79307a71ef32f93,2024-11-21T02:04:05.007000 -CVE-2014-1331,0,1,c93b527a6388302d8d4ed150dfbe5201195ca17e2a86edfae86bd5ab9c5ad00e,2024-11-21T02:04:05.140000 +CVE-2014-1329,0,0,f0d6c0ef952b1c9fb916e589e3ab2ca1bc642842c88c7db09da77356cbe3f557,2024-11-21T02:04:04.867000 +CVE-2014-1330,0,0,10759392e50532247ebc62676d7fc78c71a99eed7d529b2ae79307a71ef32f93,2024-11-21T02:04:05.007000 +CVE-2014-1331,0,0,c93b527a6388302d8d4ed150dfbe5201195ca17e2a86edfae86bd5ab9c5ad00e,2024-11-21T02:04:05.140000 CVE-2014-1332,0,0,6436eb0e74893cc65894ed0a053f2ab3f61c8592fcd999076f4a65115ce3cb7c,2023-11-07T02:18:52.590000 -CVE-2014-1333,0,1,cdc2ae98c08af18e4ba9797f597d0fe4cd8648df4d048fca41b3ff1c17d50537,2024-11-21T02:04:05.300000 -CVE-2014-1334,0,1,ac6b70037a842c50540b18052e61d69e843c6e8b7f3f567aaf55f801ea9d7254,2024-11-21T02:04:05.437000 -CVE-2014-1335,0,1,5c2f1d2de03ea975b7af53e2c0ebc145418471463529530b75ca5e8dd073d76f,2024-11-21T02:04:05.577000 -CVE-2014-1336,0,1,3d2c31fd6e2817f597d6de369cb5f967330f6a50b2eed54135b1341229c45855,2024-11-21T02:04:05.703000 -CVE-2014-1337,0,1,840fe5b27a68d6508a432f4cb38cb845c43923005e0d295179947fe328ec6c0f,2024-11-21T02:04:05.830000 -CVE-2014-1338,0,1,54120bc1f229c18e1e4b0a85daf0928d8c23bc89da5861d5168eee6da04d3345,2024-11-21T02:04:05.967000 -CVE-2014-1339,0,1,5c0e55648112e1f1841a169ff8107a2032aadbfb9d921706a28486e50393b533,2024-11-21T02:04:06.097000 +CVE-2014-1333,0,0,cdc2ae98c08af18e4ba9797f597d0fe4cd8648df4d048fca41b3ff1c17d50537,2024-11-21T02:04:05.300000 +CVE-2014-1334,0,0,ac6b70037a842c50540b18052e61d69e843c6e8b7f3f567aaf55f801ea9d7254,2024-11-21T02:04:05.437000 +CVE-2014-1335,0,0,5c2f1d2de03ea975b7af53e2c0ebc145418471463529530b75ca5e8dd073d76f,2024-11-21T02:04:05.577000 +CVE-2014-1336,0,0,3d2c31fd6e2817f597d6de369cb5f967330f6a50b2eed54135b1341229c45855,2024-11-21T02:04:05.703000 +CVE-2014-1337,0,0,840fe5b27a68d6508a432f4cb38cb845c43923005e0d295179947fe328ec6c0f,2024-11-21T02:04:05.830000 +CVE-2014-1338,0,0,54120bc1f229c18e1e4b0a85daf0928d8c23bc89da5861d5168eee6da04d3345,2024-11-21T02:04:05.967000 +CVE-2014-1339,0,0,5c0e55648112e1f1841a169ff8107a2032aadbfb9d921706a28486e50393b533,2024-11-21T02:04:06.097000 CVE-2014-1340,0,0,775d895e8b6240ce2c216cc69e1dc1f525e2265e7ccaf2bb21cbd5277cef5b65,2016-12-08T03:05:07.083000 -CVE-2014-1341,0,1,0d8d1707b71653d1f2421b6c01b9c1668e790cd8a2ba0e55d785c2bc3ca44fbb,2024-11-21T02:04:06.350000 -CVE-2014-1342,0,1,d9588befa3593deac52f19c7ebe4bd6eb03f4c9e961180ee68a22eca8f92ad49,2024-11-21T02:04:06.487000 -CVE-2014-1343,0,1,fe458f5ca238d0ed4b9ef1bb73dbf402954ab782f61c559e1d599a6e7c708f1c,2024-11-21T02:04:06.613000 -CVE-2014-1344,0,1,95b80432bc665bc20f73a64b0fdef35d4e0271bb864df52f7ffd39bf805a3e6e,2024-11-21T02:04:06.750000 +CVE-2014-1341,0,0,0d8d1707b71653d1f2421b6c01b9c1668e790cd8a2ba0e55d785c2bc3ca44fbb,2024-11-21T02:04:06.350000 +CVE-2014-1342,0,0,d9588befa3593deac52f19c7ebe4bd6eb03f4c9e961180ee68a22eca8f92ad49,2024-11-21T02:04:06.487000 +CVE-2014-1343,0,0,fe458f5ca238d0ed4b9ef1bb73dbf402954ab782f61c559e1d599a6e7c708f1c,2024-11-21T02:04:06.613000 +CVE-2014-1344,0,0,95b80432bc665bc20f73a64b0fdef35d4e0271bb864df52f7ffd39bf805a3e6e,2024-11-21T02:04:06.750000 CVE-2014-1345,0,0,5711407af57e14b9533c3e2264923f510b0b2227b5566114b37da1b47929397b,2017-01-07T02:59:35.610000 -CVE-2014-1346,0,1,104f2db9d5b1de09b12b642718c59e07790b61e8e654b5e2892ce456b7dd84cf,2024-11-21T02:04:07.003000 -CVE-2014-1347,0,1,df7d37583a4df35ef1462769901def626e7c9dbd6023851b22ae30429df30630,2024-11-21T02:04:07.130000 +CVE-2014-1346,0,0,104f2db9d5b1de09b12b642718c59e07790b61e8e654b5e2892ce456b7dd84cf,2024-11-21T02:04:07.003000 +CVE-2014-1347,0,0,df7d37583a4df35ef1462769901def626e7c9dbd6023851b22ae30429df30630,2024-11-21T02:04:07.130000 CVE-2014-1348,0,0,f9dcac17ed867ea522606055d9a940fd1095ebfb38307e9ec80c552602e42c75,2017-01-07T02:59:35.657000 CVE-2014-1349,0,0,1d4adf197a2b5b5ca0935bec1bd7ac149956c71cfadbefe334fb1a88d19fd570,2017-01-07T02:59:35.703000 CVE-2014-1350,0,0,af79d924437f1e3def32433c463d9b8ad79efb55bc58ecf22eacc0421fc546f4,2017-01-07T02:59:35.767000 @@ -65869,15 +65869,15 @@ CVE-2014-1391,0,0,d48c9f87925ec5bd6719fc22a63ec3f4fd0eeaca3ea690a9c0c8f1658b0475 CVE-2014-1398,0,0,ed3b89675ba983f12f728a673091aa50eca2b8d6d709291537bef471dd8aa230,2018-05-18T14:31:12.340000 CVE-2014-1399,0,0,a463a63a59840d1c267fad4d5f1e1a44dbaeefaff428209e241a1856119dec3d,2018-05-18T12:19:11.680000 CVE-2014-1400,0,0,1fca83f08324d6a5abc6c33850b0880c5daca5a1fa5387dafc240f064e51489e,2018-05-18T14:31:21.420000 -CVE-2014-1401,0,1,a02590e8220ff88fbdf51fa76b5f012cbbaf9c5af3cf7f11f3c7deb123bee790,2024-11-21T02:04:13.323000 -CVE-2014-1402,0,1,f10aac2f5ac8725c4acaaf61d1bdd9ecd994ebe25417f394e800c4428afdddbd,2024-11-21T02:04:13.480000 -CVE-2014-1403,0,1,2c0c3f4dd8f5952bc3402745844a2811b40651c36562e63c1c49843ddde5ef75,2024-11-21T02:04:13.647000 -CVE-2014-1405,0,1,4fd94a919be7a968e94568aa8fb3f7d288244077ef3f5925260349385a1eec0f,2024-11-21T02:04:13.797000 -CVE-2014-1406,0,1,32195ad2159c188a1b7997e67f9748ee05dc0fbef0d9894259884f9239042546,2024-11-21T02:04:13.943000 -CVE-2014-1407,0,1,3ae68e44d4bfa7f5b326649917ba063143f778bdee88de0ba95795c5bef126fb,2024-11-21T02:04:14.090000 -CVE-2014-1408,0,1,54850cab7695d5e030f5bd294bea9b97f0b59717aab92a4df68338a75ccc8436,2024-11-21T02:04:14.237000 +CVE-2014-1401,0,0,a02590e8220ff88fbdf51fa76b5f012cbbaf9c5af3cf7f11f3c7deb123bee790,2024-11-21T02:04:13.323000 +CVE-2014-1402,0,0,f10aac2f5ac8725c4acaaf61d1bdd9ecd994ebe25417f394e800c4428afdddbd,2024-11-21T02:04:13.480000 +CVE-2014-1403,0,0,2c0c3f4dd8f5952bc3402745844a2811b40651c36562e63c1c49843ddde5ef75,2024-11-21T02:04:13.647000 +CVE-2014-1405,0,0,4fd94a919be7a968e94568aa8fb3f7d288244077ef3f5925260349385a1eec0f,2024-11-21T02:04:13.797000 +CVE-2014-1406,0,0,32195ad2159c188a1b7997e67f9748ee05dc0fbef0d9894259884f9239042546,2024-11-21T02:04:13.943000 +CVE-2014-1407,0,0,3ae68e44d4bfa7f5b326649917ba063143f778bdee88de0ba95795c5bef126fb,2024-11-21T02:04:14.090000 +CVE-2014-1408,0,0,54850cab7695d5e030f5bd294bea9b97f0b59717aab92a4df68338a75ccc8436,2024-11-21T02:04:14.237000 CVE-2014-1409,0,0,fc6dc9bc87a20abd0a43881f7655c4a04bf5d7bd44c290ceead59e74f088c43b,2020-01-10T17:43:06.577000 -CVE-2014-1418,0,1,6dc186529a0faa05929b780f9ad68c9e71a92fd23dc96ebda0ff27fdf93b31d5,2024-11-21T02:04:14.533000 +CVE-2014-1418,0,0,6dc186529a0faa05929b780f9ad68c9e71a92fd23dc96ebda0ff27fdf93b31d5,2024-11-21T02:04:14.533000 CVE-2014-1419,0,0,4cff238ea5ec6123b3642cf52450c2a9519e93cda76a95ecb89b33f3d6bd63a9,2017-01-07T02:59:36.827000 CVE-2014-1420,0,0,dd47e0cbf9e7ac5873156a9d5388677b1c3d5fb0f374410625bf4076e0e2b87b,2020-09-16T15:10:18.080000 CVE-2014-1421,0,0,ac3d737470f08ba3a25c44f0649a32d14179e32fc251cd1a80a3f88324e0f643,2016-12-08T14:46:53.007000 @@ -65897,89 +65897,89 @@ CVE-2014-1434,0,0,354817428fe0b095f3d0a4426ff86648ffacf1ffab4f2c35fbd33b289b1990 CVE-2014-1435,0,0,4a2854adcea04238d691919f98118262ac5c2f4b6b6249fc06d2cfd503c3bc94,2023-11-07T02:18:55.247000 CVE-2014-1436,0,0,644d7e5a76558eaa957f94fba00762cae82db4f00d21542b006311f395ed57ca,2023-11-07T02:18:55.523000 CVE-2014-1437,0,0,e56f8aaaac28ae72ce50f54662834bbc2b7e0db32e2aa075a92452a5a2ebd378,2023-11-07T02:18:55.790000 -CVE-2014-1438,0,1,bd7069fed66a50bbb9ff841becef29f87108e17799bf61e8795b44fba6f2ab77,2024-11-21T02:04:16.047000 -CVE-2014-1439,0,1,608b4df4fb75a0169bdbd93c7522596dc851298a70fe7efaf32607a26a371118,2024-11-21T02:04:16.210000 -CVE-2014-1441,0,1,ccc7a4300a2f3139bdd7c089a063752db0c9ef0f42b99a311283e46f9f90274a,2024-11-21T02:04:16.370000 -CVE-2014-1442,0,1,aaba40f2babc36020e1fce1b2b1c125fef3cfbca65958cf4551d1e293d5b3844,2024-11-21T02:04:16.510000 -CVE-2014-1443,0,1,a2d863029ce6720bec3c2d1d0b0f49b96eedf692a15f4155fa95389be5d74e62,2024-11-21T02:04:16.660000 -CVE-2014-1444,0,1,c1c0d9d969232bfe31bcb29f77f03ffecebc8279659950f2ffb14c14be9400f2,2024-11-21T02:04:16.810000 -CVE-2014-1445,0,1,40dab975698572a49797a461d66b1f94567e27438408cd3d70f7761a2e777f79,2024-11-21T02:04:16.970000 -CVE-2014-1446,0,1,81acc91e3a96699d72344174b0672ce0328574d970b39003aa670d36e82e9576,2024-11-21T02:04:17.123000 -CVE-2014-1447,0,1,444b07d50fc88a297eb8903d0074701dc81db1835069eb0b89f3a6db07e5281b,2024-11-21T02:04:17.293000 +CVE-2014-1438,0,0,bd7069fed66a50bbb9ff841becef29f87108e17799bf61e8795b44fba6f2ab77,2024-11-21T02:04:16.047000 +CVE-2014-1439,0,0,608b4df4fb75a0169bdbd93c7522596dc851298a70fe7efaf32607a26a371118,2024-11-21T02:04:16.210000 +CVE-2014-1441,0,0,ccc7a4300a2f3139bdd7c089a063752db0c9ef0f42b99a311283e46f9f90274a,2024-11-21T02:04:16.370000 +CVE-2014-1442,0,0,aaba40f2babc36020e1fce1b2b1c125fef3cfbca65958cf4551d1e293d5b3844,2024-11-21T02:04:16.510000 +CVE-2014-1443,0,0,a2d863029ce6720bec3c2d1d0b0f49b96eedf692a15f4155fa95389be5d74e62,2024-11-21T02:04:16.660000 +CVE-2014-1444,0,0,c1c0d9d969232bfe31bcb29f77f03ffecebc8279659950f2ffb14c14be9400f2,2024-11-21T02:04:16.810000 +CVE-2014-1445,0,0,40dab975698572a49797a461d66b1f94567e27438408cd3d70f7761a2e777f79,2024-11-21T02:04:16.970000 +CVE-2014-1446,0,0,81acc91e3a96699d72344174b0672ce0328574d970b39003aa670d36e82e9576,2024-11-21T02:04:17.123000 +CVE-2014-1447,0,0,444b07d50fc88a297eb8903d0074701dc81db1835069eb0b89f3a6db07e5281b,2024-11-21T02:04:17.293000 CVE-2014-1448,0,0,d157114a050460d82752706b786f2a33b02a6890409c5db0bc0719b1242b4ff4,2023-11-07T02:18:56.607000 CVE-2014-1449,0,0,3473f27522d1908d72437836104fa0ca7f6b025e9fa1264a1f8df80093893f30,2014-12-29T17:50:01.780000 -CVE-2014-1452,0,1,41115017bcf7723c4e703ef0cb751d42898dd7ef1bcf890fae129c2413d1d744,2024-11-21T02:04:17.637000 -CVE-2014-1453,0,1,64289caebc843226528f3d54e8b0542ebf83cc9e28e4428af7529339594c72aa,2024-11-21T02:04:17.817000 +CVE-2014-1452,0,0,41115017bcf7723c4e703ef0cb751d42898dd7ef1bcf890fae129c2413d1d744,2024-11-21T02:04:17.637000 +CVE-2014-1453,0,0,64289caebc843226528f3d54e8b0542ebf83cc9e28e4428af7529339594c72aa,2024-11-21T02:04:17.817000 CVE-2014-1454,0,0,658fc646f2becc7f26b368f784c7e768b54341a93bfaee589012368e5b662a63,2020-01-10T18:50:25.463000 -CVE-2014-1455,0,1,d34d0f0d47af006536064f29ff15e2d358772c1241d9984a86059089085446c3,2024-11-21T02:04:18.130000 -CVE-2014-1456,0,1,4f69f721fce8f7c13b3c6c0b65dceb28bca41e12de04dc16af90cc869b3087f5,2024-11-21T02:04:18.280000 +CVE-2014-1455,0,0,d34d0f0d47af006536064f29ff15e2d358772c1241d9984a86059089085446c3,2024-11-21T02:04:18.130000 +CVE-2014-1456,0,0,4f69f721fce8f7c13b3c6c0b65dceb28bca41e12de04dc16af90cc869b3087f5,2024-11-21T02:04:18.280000 CVE-2014-1457,0,0,968ca28161e7f87e3c03ecb0960a97abd81454e4bbff7df66dd24d73d1eff491,2018-04-17T15:15:59.460000 -CVE-2014-1458,0,1,b3ebe4ff02826dbc62ebe61e2a365aa329b47804e3eb9ca46d39e797ef5613c7,2024-11-21T02:04:18.620000 -CVE-2014-1459,0,1,5eb9f29a2e8a3b7c297b30abbd9d9ea11e70d8164833a019d50986fac2bb4829,2024-11-21T02:04:18.773000 -CVE-2014-1466,0,1,63b6de48a904cd6a038cf22720d0ad17388938ed5b2160ccf986c3b6808a020f,2024-11-21T02:04:18.930000 -CVE-2014-1467,0,1,c0d186344de59d6b522883fdd5609df7ec90a535a41c6815306eab38c9fa9d24,2024-11-21T02:04:19.100000 +CVE-2014-1458,0,0,b3ebe4ff02826dbc62ebe61e2a365aa329b47804e3eb9ca46d39e797ef5613c7,2024-11-21T02:04:18.620000 +CVE-2014-1459,0,0,5eb9f29a2e8a3b7c297b30abbd9d9ea11e70d8164833a019d50986fac2bb4829,2024-11-21T02:04:18.773000 +CVE-2014-1466,0,0,63b6de48a904cd6a038cf22720d0ad17388938ed5b2160ccf986c3b6808a020f,2024-11-21T02:04:18.930000 +CVE-2014-1467,0,0,c0d186344de59d6b522883fdd5609df7ec90a535a41c6815306eab38c9fa9d24,2024-11-21T02:04:19.100000 CVE-2014-1469,0,0,042ad41ea5c4920aebdf6e0ffade0f5c9351e0dbaa473021683843b6593ff42c,2017-08-29T01:34:25.497000 CVE-2014-1470,0,0,8bdb21495e0458bebb9a6b4e96266705ad64580c712d000403da9e1b543c19d5,2023-11-07T02:18:56.880000 -CVE-2014-1471,0,1,c81fc6efb6c4160675b13aa99194ba46a518d4d698224c20ce265cb7372e12a9,2024-11-21T02:04:19.430000 -CVE-2014-1472,0,1,04351c1ee77ad381d9116b49c411a83a487dcf534ad3b2e2e1cb1f5295afc03e,2024-11-21T02:04:19.607000 -CVE-2014-1473,0,1,df26024f6a16ae1f26b570361fece94bed5461f158c85a1267c972d81fb0ddd0,2024-11-21T02:04:19.767000 +CVE-2014-1471,0,0,c81fc6efb6c4160675b13aa99194ba46a518d4d698224c20ce265cb7372e12a9,2024-11-21T02:04:19.430000 +CVE-2014-1472,0,0,04351c1ee77ad381d9116b49c411a83a487dcf534ad3b2e2e1cb1f5295afc03e,2024-11-21T02:04:19.607000 +CVE-2014-1473,0,0,df26024f6a16ae1f26b570361fece94bed5461f158c85a1267c972d81fb0ddd0,2024-11-21T02:04:19.767000 CVE-2014-1474,0,0,308dea3ab6d8caca5b15388b0558a5fe0e6d4be0a98b3f02c640c81d832a0937,2014-07-15T16:37:11.763000 -CVE-2014-1475,0,1,d6678386d8f9f245342b356d613ad03fc3375eefc18e20b6044b472e15bc54b9,2024-11-21T02:04:20.083000 -CVE-2014-1476,0,1,beac9792719c5e609a3fd8281050623991c0991522f41f0c5df929290fb2ea0d,2024-11-21T02:04:20.253000 -CVE-2014-1477,0,1,38c9d93ee5ca85d0318d91c22bb0444a31603113be7c72d570115ef41fdf5a67,2024-11-21T02:04:20.410000 -CVE-2014-1478,0,1,fe7c2dc3455722c77ecfddda95850e22fcba05c67275093b8a998ba2907e27ba,2024-11-21T02:04:20.640000 -CVE-2014-1479,0,1,47253799500f4b60beebd12542d13978cb6a45ecd3aa58960393ff99e4cbbbcb,2024-11-21T02:04:20.850000 -CVE-2014-1480,0,1,7ae7d2a63d29e70845494acdd23355882b29a782a79f475be29cbd681f427d5b,2024-11-21T02:04:21.077000 -CVE-2014-1481,0,1,e7e87e53b8e880a511b53837036dc2c5218713825bcc93944ed317119b0e71d8,2024-11-21T02:04:21.300000 -CVE-2014-1482,0,1,cda4dc03aa0ffd232e3d07151702deafe33b50ad81894df3f172264baf99cde9,2024-11-21T02:04:21.523000 -CVE-2014-1483,0,1,ca9f33de6206986dbca9c4e114b92f41e5f18518909ed9a633d9ee68b125c0d1,2024-11-21T02:04:21.743000 -CVE-2014-1484,0,1,1661df9dd7fd85fd802a88cc5b8e59ec11005d58d85f30780301c77db9e3a52b,2024-11-21T02:04:21.933000 -CVE-2014-1485,0,1,02deaf7f834fb9bcca7688c263b1fff5c44f1f552cf81fd977ecadf4278b8e01,2024-11-21T02:04:22.130000 -CVE-2014-1486,0,1,a63a71c622e392db6f571841208380946a84191dc503c5873e91dd6071e53ea7,2024-11-21T02:04:22.327000 -CVE-2014-1487,0,1,0917b52461b8fdf5e9b2bdab423ff680716314c062ba79662daf5188a040e689,2024-11-21T02:04:22.547000 -CVE-2014-1488,0,1,7a94ac540caa77e34476a2ac69f29da3bfb9d9c3c064db9e3b697bb204554dc3,2024-11-21T02:04:22.777000 -CVE-2014-1489,0,1,9364c4cca16affeb7fb6f25cf63a6ae732d1cced5c835eb79f6155670eed82ed,2024-11-21T02:04:22.990000 -CVE-2014-1490,0,1,f4507fe3c0d44729558a0b4b92d9605f7f15c615a97f217d7a7144bfc2896ace,2024-11-21T02:04:23.193000 -CVE-2014-1491,0,1,3c67b6ebf4c2fd8bbee52375277fb67b9154ac7218a961d8ac3153d39d215d52,2024-11-21T02:04:23.477000 -CVE-2014-1492,0,1,532b8df68922ad3fe15a0bc4ea4cb2ef6df5d7d229bd8a5970c6c4b3ac206a1a,2024-11-21T02:04:23.733000 -CVE-2014-1493,0,1,78ded69edb0b52fbaa048da4c3b027f1ea70647af7e8d2f3bedb4abc6b0b4b37,2024-11-21T02:04:23.953000 -CVE-2014-1494,0,1,255de7d5277944b2c78edcd561b0251e0d73949b1779fd533dcd68f8e7930ae3,2024-11-21T02:04:24.157000 -CVE-2014-1496,0,1,a39ffefdad937a5ac332b2f7d52173513a4cd978778d9955f3bffdbdfd9efe9a,2024-11-21T02:04:24.333000 -CVE-2014-1497,0,1,fae6e8e3ff5a399d72b58face121cfdd91da9c7b31651cbecdedc2c47c73ae0e,2024-11-21T02:04:24.480000 -CVE-2014-1498,0,1,5f7267a16e8c87b8882f3be7c19463a8d59731f892c6d0bc14d055d125524cae,2024-11-21T02:04:24.647000 -CVE-2014-1499,0,1,b03e5c4f3a2bcd7a7bde6d99afdb28e9640de31cb756f9b47757d9f4cb13536c,2024-11-21T02:04:24.807000 -CVE-2014-1500,0,1,3887a85d411f6568195d19ed962a852a527d15554639d252b4d8aa33618763e8,2024-11-21T02:04:24.967000 -CVE-2014-1501,0,1,9ee1ff7f3ff08a27f295e072c0e97d21c380f16c489a4bac539221c83f039f5b,2024-11-21T02:04:25.123000 -CVE-2014-1502,0,1,2b2229c6e7a2b3300aec9c49fe0832c4e8f9c985493e5e29e0e326aea52a6c8c,2024-11-21T02:04:25.320000 -CVE-2014-1504,0,1,08397289326618be08fdede3d10258c68f653dcc77a128eb414558dc33b8bb1f,2024-11-21T02:04:25.520000 -CVE-2014-1505,0,1,28044b59ddee107a723d30052e8e722848adbd41159ecf97c21d00f198da9706,2024-11-21T02:04:25.700000 -CVE-2014-1506,0,1,456841fee243479ba5164cd5584db6da9c6ff0c87f165f98ccc6f82e384b969a,2024-11-21T02:04:25.890000 -CVE-2014-1507,0,1,eb8ddf390fba2224534029a6b2f8d3b2fc7c961f194e5cd05d9a3084482e8eeb,2024-11-21T02:04:26.073000 -CVE-2014-1508,0,1,91e34f4fdd0c2593c97db5c3bf868acbf34f6c9f8c58f14eaf0e79f7245203ea,2024-11-21T02:04:26.213000 -CVE-2014-1509,0,1,3f4591aaa4989d793caeeaf3b78f8fe52dd1e9780b44ef5311c17b5347839ec9,2024-11-21T02:04:26.390000 -CVE-2014-1510,0,1,b0aeadd28f4e9452c1eaa6cf1046b31610eb8fb6c38a53010efe52c81bf0b0f5,2024-11-21T02:04:26.577000 -CVE-2014-1511,0,1,da9bd02f54c7a235a26548e1ae58bb237556eb9f87a3aa5e5b1cad379bbb24be,2024-11-21T02:04:26.763000 -CVE-2014-1512,0,1,00193df927f349cb002ad8f555b25fd02f81a78616287e83b4f731fda4372957,2024-11-21T02:04:26.950000 -CVE-2014-1513,0,1,53dd6344b1550d4209df40e4b40fffb4db75d7247edb5853468c9ea5674fa2e8,2024-11-21T02:04:27.150000 -CVE-2014-1514,0,1,8a0aaaa7f4f0de4a2f3c52b68607dccf14c4a3eb79430f2366c305fe6083c8a8,2024-11-21T02:04:27.337000 -CVE-2014-1515,0,1,a4ea5b1712f1461675f47bf37d22cb8d1ebcc1bf36743b192396d785561f6147,2024-11-21T02:04:27.530000 -CVE-2014-1516,0,1,bcf0f8a5f2dd30a79c15f25abed14bd7345b3cd0871447f56c076597503a259b,2024-11-21T02:04:27.660000 -CVE-2014-1517,0,1,601db08c534a3a4a2c10b0897ff560df1307ffa04a36ba5557c061a5b7b03e1a,2024-11-21T02:04:27.790000 -CVE-2014-1518,0,1,2a85b742da8b9b5d128192b2be3f9dbe2ecfaa8e7a569748ed30ad9271bf4490,2024-11-21T02:04:27.947000 -CVE-2014-1519,0,1,d25f522d7bf5cb01eadef226ac7c8079d80afefed1afcb0f9c7ae2615770cc7f,2024-11-21T02:04:28.203000 -CVE-2014-1520,0,1,584906c6a2ffc070b3741950ba1fe97f1543dc3909c05aa5b1c6782f0436f0c3,2024-11-21T02:04:28.417000 +CVE-2014-1475,0,0,d6678386d8f9f245342b356d613ad03fc3375eefc18e20b6044b472e15bc54b9,2024-11-21T02:04:20.083000 +CVE-2014-1476,0,0,beac9792719c5e609a3fd8281050623991c0991522f41f0c5df929290fb2ea0d,2024-11-21T02:04:20.253000 +CVE-2014-1477,0,0,38c9d93ee5ca85d0318d91c22bb0444a31603113be7c72d570115ef41fdf5a67,2024-11-21T02:04:20.410000 +CVE-2014-1478,0,0,fe7c2dc3455722c77ecfddda95850e22fcba05c67275093b8a998ba2907e27ba,2024-11-21T02:04:20.640000 +CVE-2014-1479,0,0,47253799500f4b60beebd12542d13978cb6a45ecd3aa58960393ff99e4cbbbcb,2024-11-21T02:04:20.850000 +CVE-2014-1480,0,0,7ae7d2a63d29e70845494acdd23355882b29a782a79f475be29cbd681f427d5b,2024-11-21T02:04:21.077000 +CVE-2014-1481,0,0,e7e87e53b8e880a511b53837036dc2c5218713825bcc93944ed317119b0e71d8,2024-11-21T02:04:21.300000 +CVE-2014-1482,0,0,cda4dc03aa0ffd232e3d07151702deafe33b50ad81894df3f172264baf99cde9,2024-11-21T02:04:21.523000 +CVE-2014-1483,0,0,ca9f33de6206986dbca9c4e114b92f41e5f18518909ed9a633d9ee68b125c0d1,2024-11-21T02:04:21.743000 +CVE-2014-1484,0,0,1661df9dd7fd85fd802a88cc5b8e59ec11005d58d85f30780301c77db9e3a52b,2024-11-21T02:04:21.933000 +CVE-2014-1485,0,0,02deaf7f834fb9bcca7688c263b1fff5c44f1f552cf81fd977ecadf4278b8e01,2024-11-21T02:04:22.130000 +CVE-2014-1486,0,0,a63a71c622e392db6f571841208380946a84191dc503c5873e91dd6071e53ea7,2024-11-21T02:04:22.327000 +CVE-2014-1487,0,0,0917b52461b8fdf5e9b2bdab423ff680716314c062ba79662daf5188a040e689,2024-11-21T02:04:22.547000 +CVE-2014-1488,0,0,7a94ac540caa77e34476a2ac69f29da3bfb9d9c3c064db9e3b697bb204554dc3,2024-11-21T02:04:22.777000 +CVE-2014-1489,0,0,9364c4cca16affeb7fb6f25cf63a6ae732d1cced5c835eb79f6155670eed82ed,2024-11-21T02:04:22.990000 +CVE-2014-1490,0,0,f4507fe3c0d44729558a0b4b92d9605f7f15c615a97f217d7a7144bfc2896ace,2024-11-21T02:04:23.193000 +CVE-2014-1491,0,0,3c67b6ebf4c2fd8bbee52375277fb67b9154ac7218a961d8ac3153d39d215d52,2024-11-21T02:04:23.477000 +CVE-2014-1492,0,0,532b8df68922ad3fe15a0bc4ea4cb2ef6df5d7d229bd8a5970c6c4b3ac206a1a,2024-11-21T02:04:23.733000 +CVE-2014-1493,0,0,78ded69edb0b52fbaa048da4c3b027f1ea70647af7e8d2f3bedb4abc6b0b4b37,2024-11-21T02:04:23.953000 +CVE-2014-1494,0,0,255de7d5277944b2c78edcd561b0251e0d73949b1779fd533dcd68f8e7930ae3,2024-11-21T02:04:24.157000 +CVE-2014-1496,0,0,a39ffefdad937a5ac332b2f7d52173513a4cd978778d9955f3bffdbdfd9efe9a,2024-11-21T02:04:24.333000 +CVE-2014-1497,0,0,fae6e8e3ff5a399d72b58face121cfdd91da9c7b31651cbecdedc2c47c73ae0e,2024-11-21T02:04:24.480000 +CVE-2014-1498,0,0,5f7267a16e8c87b8882f3be7c19463a8d59731f892c6d0bc14d055d125524cae,2024-11-21T02:04:24.647000 +CVE-2014-1499,0,0,b03e5c4f3a2bcd7a7bde6d99afdb28e9640de31cb756f9b47757d9f4cb13536c,2024-11-21T02:04:24.807000 +CVE-2014-1500,0,0,3887a85d411f6568195d19ed962a852a527d15554639d252b4d8aa33618763e8,2024-11-21T02:04:24.967000 +CVE-2014-1501,0,0,9ee1ff7f3ff08a27f295e072c0e97d21c380f16c489a4bac539221c83f039f5b,2024-11-21T02:04:25.123000 +CVE-2014-1502,0,0,2b2229c6e7a2b3300aec9c49fe0832c4e8f9c985493e5e29e0e326aea52a6c8c,2024-11-21T02:04:25.320000 +CVE-2014-1504,0,0,08397289326618be08fdede3d10258c68f653dcc77a128eb414558dc33b8bb1f,2024-11-21T02:04:25.520000 +CVE-2014-1505,0,0,28044b59ddee107a723d30052e8e722848adbd41159ecf97c21d00f198da9706,2024-11-21T02:04:25.700000 +CVE-2014-1506,0,0,456841fee243479ba5164cd5584db6da9c6ff0c87f165f98ccc6f82e384b969a,2024-11-21T02:04:25.890000 +CVE-2014-1507,0,0,eb8ddf390fba2224534029a6b2f8d3b2fc7c961f194e5cd05d9a3084482e8eeb,2024-11-21T02:04:26.073000 +CVE-2014-1508,0,0,91e34f4fdd0c2593c97db5c3bf868acbf34f6c9f8c58f14eaf0e79f7245203ea,2024-11-21T02:04:26.213000 +CVE-2014-1509,0,0,3f4591aaa4989d793caeeaf3b78f8fe52dd1e9780b44ef5311c17b5347839ec9,2024-11-21T02:04:26.390000 +CVE-2014-1510,0,0,b0aeadd28f4e9452c1eaa6cf1046b31610eb8fb6c38a53010efe52c81bf0b0f5,2024-11-21T02:04:26.577000 +CVE-2014-1511,0,0,da9bd02f54c7a235a26548e1ae58bb237556eb9f87a3aa5e5b1cad379bbb24be,2024-11-21T02:04:26.763000 +CVE-2014-1512,0,0,00193df927f349cb002ad8f555b25fd02f81a78616287e83b4f731fda4372957,2024-11-21T02:04:26.950000 +CVE-2014-1513,0,0,53dd6344b1550d4209df40e4b40fffb4db75d7247edb5853468c9ea5674fa2e8,2024-11-21T02:04:27.150000 +CVE-2014-1514,0,0,8a0aaaa7f4f0de4a2f3c52b68607dccf14c4a3eb79430f2366c305fe6083c8a8,2024-11-21T02:04:27.337000 +CVE-2014-1515,0,0,a4ea5b1712f1461675f47bf37d22cb8d1ebcc1bf36743b192396d785561f6147,2024-11-21T02:04:27.530000 +CVE-2014-1516,0,0,bcf0f8a5f2dd30a79c15f25abed14bd7345b3cd0871447f56c076597503a259b,2024-11-21T02:04:27.660000 +CVE-2014-1517,0,0,601db08c534a3a4a2c10b0897ff560df1307ffa04a36ba5557c061a5b7b03e1a,2024-11-21T02:04:27.790000 +CVE-2014-1518,0,0,2a85b742da8b9b5d128192b2be3f9dbe2ecfaa8e7a569748ed30ad9271bf4490,2024-11-21T02:04:27.947000 +CVE-2014-1519,0,0,d25f522d7bf5cb01eadef226ac7c8079d80afefed1afcb0f9c7ae2615770cc7f,2024-11-21T02:04:28.203000 +CVE-2014-1520,0,0,584906c6a2ffc070b3741950ba1fe97f1543dc3909c05aa5b1c6782f0436f0c3,2024-11-21T02:04:28.417000 CVE-2014-1521,0,0,080452b62c129673f0e90d30054a4c420dca288fc1452b75c923e9079352d48e,2023-11-07T02:18:57.690000 -CVE-2014-1522,0,1,6707c90a4b495f7cfda3144d9b97989cfd02eb231108c3970e9cedd82cd3dc57,2024-11-21T02:04:28.600000 -CVE-2014-1523,0,1,10abc0231ede57f4509bda6d6fdb7ab89748834328ef77ff73a173df01df0d34,2024-11-21T02:04:28.770000 -CVE-2014-1524,0,1,edf6205cb11fce407f3f59880fe2cff30670956d73eda5c320e867661cd59baa,2024-11-21T02:04:28.973000 -CVE-2014-1525,0,1,2d4046615413b57b8be63dfa295e832f5088bbd3154260ee532a9af165e20d09,2024-11-21T02:04:29.183000 -CVE-2014-1526,0,1,dcbfb66cda2dfead0b1922cf229d6c4a2219a4116368444329e3c9f22adf0e4c,2024-11-21T02:04:29.360000 -CVE-2014-1527,0,1,85ff51237fdb5c3f9792784cfba4fa0a4e7a738ad67b2ce644cbc954ba6a31f7,2024-11-21T02:04:29.543000 -CVE-2014-1528,0,1,6cb4bc48a7c131eeade0d13532ec9a8c25ca348a9fa8063fabe2ca3210c3c27b,2024-11-21T02:04:29.720000 -CVE-2014-1529,0,1,b255ab86fead7da1fac4737acb3cecb4e5bc9ff4b575d8a8b019b5ca7b4f4099,2024-11-21T02:04:29.880000 -CVE-2014-1530,0,1,a5cdc5446cb2631999f9e3cf9aecc07fbae6216a7fa18ee22f762b9c4cbf9584,2024-11-21T02:04:30.073000 -CVE-2014-1531,0,1,b3f6fe1893c9a6f5f21b6d9126479b7a63ae6f068d079797e08c4a15b0cbdf67,2024-11-21T02:04:30.277000 -CVE-2014-1532,0,1,cfedf91c23244012f5cf129ea6b4a7f4fa07e95943180bab547a1caec51a07d1,2024-11-21T02:04:30.467000 +CVE-2014-1522,0,0,6707c90a4b495f7cfda3144d9b97989cfd02eb231108c3970e9cedd82cd3dc57,2024-11-21T02:04:28.600000 +CVE-2014-1523,0,0,10abc0231ede57f4509bda6d6fdb7ab89748834328ef77ff73a173df01df0d34,2024-11-21T02:04:28.770000 +CVE-2014-1524,0,0,edf6205cb11fce407f3f59880fe2cff30670956d73eda5c320e867661cd59baa,2024-11-21T02:04:28.973000 +CVE-2014-1525,0,0,2d4046615413b57b8be63dfa295e832f5088bbd3154260ee532a9af165e20d09,2024-11-21T02:04:29.183000 +CVE-2014-1526,0,0,dcbfb66cda2dfead0b1922cf229d6c4a2219a4116368444329e3c9f22adf0e4c,2024-11-21T02:04:29.360000 +CVE-2014-1527,0,0,85ff51237fdb5c3f9792784cfba4fa0a4e7a738ad67b2ce644cbc954ba6a31f7,2024-11-21T02:04:29.543000 +CVE-2014-1528,0,0,6cb4bc48a7c131eeade0d13532ec9a8c25ca348a9fa8063fabe2ca3210c3c27b,2024-11-21T02:04:29.720000 +CVE-2014-1529,0,0,b255ab86fead7da1fac4737acb3cecb4e5bc9ff4b575d8a8b019b5ca7b4f4099,2024-11-21T02:04:29.880000 +CVE-2014-1530,0,0,a5cdc5446cb2631999f9e3cf9aecc07fbae6216a7fa18ee22f762b9c4cbf9584,2024-11-21T02:04:30.073000 +CVE-2014-1531,0,0,b3f6fe1893c9a6f5f21b6d9126479b7a63ae6f068d079797e08c4a15b0cbdf67,2024-11-21T02:04:30.277000 +CVE-2014-1532,0,0,cfedf91c23244012f5cf129ea6b4a7f4fa07e95943180bab547a1caec51a07d1,2024-11-21T02:04:30.467000 CVE-2014-1533,0,0,24cf14c5351e5fee56d172858d1ca18a6bef92e018f6badaa121e31dccd28058,2024-10-21T13:55:03.510000 CVE-2014-1534,0,0,3c610e910574867bc570bc8f94f1d225b76151f4711ffbb8ccc1ff91e8b1209f,2017-12-28T02:29:00.643000 CVE-2014-1536,0,0,dc8cd17ec938d91bb0dfe63a2cd502a7d66f1b1564d4e784d7c61dba1df776f4,2017-12-28T02:29:00.737000 @@ -66042,42 +66042,42 @@ CVE-2014-1593,0,0,65a6bd1d8dc064aacd5da42bb60ae7174ef608475c4c439b342a3c563ce117 CVE-2014-1594,0,0,71f863ab4ec8a3340d9fe9d6ee711e9f7281bcee3a7e6a7af24d5150078e48ee,2016-12-24T02:59:01.993000 CVE-2014-1595,0,0,0558f16ec7d41e1e96c79ae47c447ababa62338bedf4a830f829a7eb33893841,2024-10-21T13:55:03.510000 CVE-2014-1596,0,0,0eb7ae4dd34c6c1bc6fc97da971bda7d6eb14be475034cca51f447f3b45eca15,2023-11-07T02:18:59.167000 -CVE-2014-1597,0,1,beb88e7c5b6999d39f0e03b25c692ddacc4bcf5013537ecb27b9b2276e7f6945,2024-11-21T02:04:41.457000 +CVE-2014-1597,0,0,beb88e7c5b6999d39f0e03b25c692ddacc4bcf5013537ecb27b9b2276e7f6945,2024-11-21T02:04:41.457000 CVE-2014-1598,0,0,86f5d71d3081884e796c0c2dc8619fec5ce0633bafb3999e36e8c561b67b57e0,2020-01-10T18:20:07.793000 -CVE-2014-1599,0,1,83ac91c9340f5f7906f948ca9b732b358f0a758c5cbaf3339847109db68ed255,2024-11-21T02:04:41.770000 -CVE-2014-1603,0,1,219898c7ad509b37aa79361c91ba00fc018ce5c06fa1bf6596049f974fa45e6d,2024-11-21T02:04:41.913000 -CVE-2014-1604,0,1,63af46842781f41ec8cd2061558d5e6b779b0a46e18cc2ba4d8cf85fba3268e7,2024-11-21T02:04:42.077000 -CVE-2014-1607,0,1,f687138e68705784e8d8aac422b447b965075123f0dfdfc3535e2f96e00e20cf,2024-11-21T02:04:42.250000 -CVE-2014-1608,0,1,5177ec7f2dbe86119e1e7aab746978306df73da48d47284bdbf06ec286b1345f,2024-11-21T02:04:42.410000 -CVE-2014-1609,0,1,23612e8330b1daf4ed496ca1dbf249b0eb137582287d389269f18ca81f854091,2024-11-21T02:04:42.567000 -CVE-2014-1610,0,1,cd333cf2d21d66a3db82b00fed562aed0ac65e2e452ee94df35952d4ceac69a4,2024-11-21T02:04:42.740000 -CVE-2014-1611,0,1,b5f83c7b9883ceaa623574ca8784fbca6433085b41bd98cd8a268ff21172ba14,2024-11-21T02:04:42.920000 -CVE-2014-1612,0,1,4a3a037eabb458f933696bfae76ee9ea1522cf31eb38a25601f4dd172845f09d,2024-11-21T02:04:43.073000 -CVE-2014-1613,0,1,cce2cdba03e2f56165b86c2504d6208fd88ab7e10cbb67aab75c18233ce9eb8f,2024-11-21T02:04:43.223000 -CVE-2014-1615,0,1,bebcac121bb6a14ccfe0fb9f99cde6caebf707d412235baf03c02043234e6bd2,2024-11-21T02:04:43.460000 +CVE-2014-1599,0,0,83ac91c9340f5f7906f948ca9b732b358f0a758c5cbaf3339847109db68ed255,2024-11-21T02:04:41.770000 +CVE-2014-1603,0,0,219898c7ad509b37aa79361c91ba00fc018ce5c06fa1bf6596049f974fa45e6d,2024-11-21T02:04:41.913000 +CVE-2014-1604,0,0,63af46842781f41ec8cd2061558d5e6b779b0a46e18cc2ba4d8cf85fba3268e7,2024-11-21T02:04:42.077000 +CVE-2014-1607,0,0,f687138e68705784e8d8aac422b447b965075123f0dfdfc3535e2f96e00e20cf,2024-11-21T02:04:42.250000 +CVE-2014-1608,0,0,5177ec7f2dbe86119e1e7aab746978306df73da48d47284bdbf06ec286b1345f,2024-11-21T02:04:42.410000 +CVE-2014-1609,0,0,23612e8330b1daf4ed496ca1dbf249b0eb137582287d389269f18ca81f854091,2024-11-21T02:04:42.567000 +CVE-2014-1610,0,0,cd333cf2d21d66a3db82b00fed562aed0ac65e2e452ee94df35952d4ceac69a4,2024-11-21T02:04:42.740000 +CVE-2014-1611,0,0,b5f83c7b9883ceaa623574ca8784fbca6433085b41bd98cd8a268ff21172ba14,2024-11-21T02:04:42.920000 +CVE-2014-1612,0,0,4a3a037eabb458f933696bfae76ee9ea1522cf31eb38a25601f4dd172845f09d,2024-11-21T02:04:43.073000 +CVE-2014-1613,0,0,cce2cdba03e2f56165b86c2504d6208fd88ab7e10cbb67aab75c18233ce9eb8f,2024-11-21T02:04:43.223000 +CVE-2014-1615,0,0,bebcac121bb6a14ccfe0fb9f99cde6caebf707d412235baf03c02043234e6bd2,2024-11-21T02:04:43.460000 CVE-2014-1617,0,0,4a1adc1673617d396d13b400cf684c5a4b230c51659dd40a7c92e2888722eaf3,2020-02-20T19:30:14.327000 -CVE-2014-1618,0,1,27735fc689fe33886b3cadd4adc7c5198f76215c8fcb87c90435d204d251b310,2024-11-21T02:04:43.750000 -CVE-2014-1619,0,1,e3e36ff1be30f77c76e2288d69132dbb3123fbb1f720a61cc68c12cd2d8fb3a5,2024-11-21T02:04:43.923000 -CVE-2014-1620,0,1,67a04c4eb13cb626fdf9f67e7f33df9895e62e4e44cf894b4a804028033a716f,2024-11-21T02:04:44.083000 -CVE-2014-1624,0,1,7acb2847890325da715ff20d91da01d3231b087231e6082e77a5ea1020bc4eea,2024-11-21T02:04:44.233000 -CVE-2014-1626,0,1,8e6d07c27e298ce5e50cc333703d8677f51cf0b2b466aa29bc7da004776535d7,2024-11-21T02:04:44.380000 +CVE-2014-1618,0,0,27735fc689fe33886b3cadd4adc7c5198f76215c8fcb87c90435d204d251b310,2024-11-21T02:04:43.750000 +CVE-2014-1619,0,0,e3e36ff1be30f77c76e2288d69132dbb3123fbb1f720a61cc68c12cd2d8fb3a5,2024-11-21T02:04:43.923000 +CVE-2014-1620,0,0,67a04c4eb13cb626fdf9f67e7f33df9895e62e4e44cf894b4a804028033a716f,2024-11-21T02:04:44.083000 +CVE-2014-1624,0,0,7acb2847890325da715ff20d91da01d3231b087231e6082e77a5ea1020bc4eea,2024-11-21T02:04:44.233000 +CVE-2014-1626,0,0,8e6d07c27e298ce5e50cc333703d8677f51cf0b2b466aa29bc7da004776535d7,2024-11-21T02:04:44.380000 CVE-2014-1631,0,0,ff203b22fca52cb92301b78309bfd422c02df2d3ba80c9acb38ad86569e3af40,2019-04-26T15:06:46.847000 CVE-2014-1632,0,0,cff4787f8176cb81315ba6b3b411dfc2df2a62824824ae8b8707d4db09cb7735,2019-04-26T15:06:24.567000 CVE-2014-1634,0,0,c02133048e582728c4e60df48f6044988be54f7f581036fec1b20dd890d9b75b,2020-03-10T14:12:52.883000 CVE-2014-1635,0,0,1752accbf4310d7bca71e25a3dd218eec2fdd44941b951602f43c29e1d18f8d7,2016-03-31T17:35:13.560000 -CVE-2014-1636,0,1,33033657fb9fa0580cacf296b41090d10d29b2f3a4dd1918a6c3dbd0c4601338,2024-11-21T02:04:45.107000 -CVE-2014-1637,0,1,0d3cce1ad9c2a3c21a73c2f7390fbb471939a0ea0167b6a57a9e160b94cd7fe3,2024-11-21T02:04:45.263000 -CVE-2014-1638,0,1,c22b23ba2b8c9370e50c563ef59ee26bbf56007734ed379d998454a72461a228,2024-11-21T02:04:45.400000 -CVE-2014-1639,0,1,33e350b9d930c0666fed3130d2f4533aea6b20d33dfd915774d550af1df8cab7,2024-11-21T02:04:45.550000 -CVE-2014-1640,0,1,5fdb0f2c169a1d54076eb5ce8bc6f35898745e992f7c0e4dda4ea9f6bee97fa4,2024-11-21T02:04:45.710000 -CVE-2014-1642,0,1,6f4825e5694c83ebcc22fcf0110fc5d4fdfc839cf71e89ccab9feaaec32bf9cb,2024-11-21T02:04:45.857000 -CVE-2014-1643,0,1,9df6fea4a80f822bda819bdfd36860276e8dd4e89d41258c9d376a34d04c4d11,2024-11-21T02:04:46.017000 -CVE-2014-1644,0,1,355055fbd40d113621174380a81c5c6e274e36240553faf056260d2b83b6bb7c,2024-11-21T02:04:46.127000 -CVE-2014-1645,0,1,a9e02ee8f60c501aad2cb40f576bd83714662e80055eace7461d6a3160ad1b6e,2024-11-21T02:04:46.240000 -CVE-2014-1646,0,1,e1c2e10bcda0e684c3163799318cbecd936c5cfb51dbea7ed00ad8bbcd6c5239,2024-11-21T02:04:46.360000 -CVE-2014-1647,0,1,b83efca87b416161cf7d51c925fe08624a8e1a08a9a5d7164ff4aeb5d92a6f20,2024-11-21T02:04:46.467000 -CVE-2014-1648,0,1,ea3c5c29582b5f27f84975cde09ce51ffcc60dfb0c8411f92787e23abae822b8,2024-11-21T02:04:46.580000 -CVE-2014-1649,0,1,5e901456e222e43492e91d60b7d4777dca92b970f06761ae93504f630c30df30,2024-11-21T02:04:46.693000 +CVE-2014-1636,0,0,33033657fb9fa0580cacf296b41090d10d29b2f3a4dd1918a6c3dbd0c4601338,2024-11-21T02:04:45.107000 +CVE-2014-1637,0,0,0d3cce1ad9c2a3c21a73c2f7390fbb471939a0ea0167b6a57a9e160b94cd7fe3,2024-11-21T02:04:45.263000 +CVE-2014-1638,0,0,c22b23ba2b8c9370e50c563ef59ee26bbf56007734ed379d998454a72461a228,2024-11-21T02:04:45.400000 +CVE-2014-1639,0,0,33e350b9d930c0666fed3130d2f4533aea6b20d33dfd915774d550af1df8cab7,2024-11-21T02:04:45.550000 +CVE-2014-1640,0,0,5fdb0f2c169a1d54076eb5ce8bc6f35898745e992f7c0e4dda4ea9f6bee97fa4,2024-11-21T02:04:45.710000 +CVE-2014-1642,0,0,6f4825e5694c83ebcc22fcf0110fc5d4fdfc839cf71e89ccab9feaaec32bf9cb,2024-11-21T02:04:45.857000 +CVE-2014-1643,0,0,9df6fea4a80f822bda819bdfd36860276e8dd4e89d41258c9d376a34d04c4d11,2024-11-21T02:04:46.017000 +CVE-2014-1644,0,0,355055fbd40d113621174380a81c5c6e274e36240553faf056260d2b83b6bb7c,2024-11-21T02:04:46.127000 +CVE-2014-1645,0,0,a9e02ee8f60c501aad2cb40f576bd83714662e80055eace7461d6a3160ad1b6e,2024-11-21T02:04:46.240000 +CVE-2014-1646,0,0,e1c2e10bcda0e684c3163799318cbecd936c5cfb51dbea7ed00ad8bbcd6c5239,2024-11-21T02:04:46.360000 +CVE-2014-1647,0,0,b83efca87b416161cf7d51c925fe08624a8e1a08a9a5d7164ff4aeb5d92a6f20,2024-11-21T02:04:46.467000 +CVE-2014-1648,0,0,ea3c5c29582b5f27f84975cde09ce51ffcc60dfb0c8411f92787e23abae822b8,2024-11-21T02:04:46.580000 +CVE-2014-1649,0,0,5e901456e222e43492e91d60b7d4777dca92b970f06761ae93504f630c30df30,2024-11-21T02:04:46.693000 CVE-2014-1650,0,0,1cad15039460fbe6b5405cdf8586a2cf69eea423e0991e618f7a0f35b1cdf5e1,2017-12-28T02:29:01.473000 CVE-2014-1651,0,0,08018a8c373ea3df965adff703c40e5c70c76007f8d3c3192975e81c73ea6be1,2017-12-28T02:29:01.533000 CVE-2014-1652,0,0,d4e1c3c2f3d474fdec7bc991d641abf36e788ee6a217f089010cf5f23c8e3adc,2017-12-28T02:29:01.597000 @@ -66091,108 +66091,108 @@ CVE-2014-1659,0,0,cd067f7e3069ca967dd00b9fe166af0e2f15c52019eec4de95b7b268c241fb CVE-2014-1660,0,0,1797ea2b631f534e9a702ae5ccc6652e3cfa408fb41e6c65a34305c3f7e1013d,2023-11-07T02:19:01.720000 CVE-2014-1661,0,0,015bfcb4db3f733d4baf55a35ba3f8b56a523b828f5ccf801a5c407eaa1d07ed,2023-11-07T02:19:01.963000 CVE-2014-1662,0,0,d630c982acd2c029eb8a7033e69879dea6a3acf55d0e65613aced5787d9184b7,2023-11-07T02:19:02.237000 -CVE-2014-1663,0,1,c95e9ddef1c1faaac78aa6d63a0ee14820ada7de45e3109a25b14e5d6af77442,2024-11-21T02:04:47.300000 -CVE-2014-1664,0,1,1e9961f133d78a25128d7a260d531ce383eccde1e3a28b725809d1aa8dd62a70,2024-11-21T02:04:47.450000 +CVE-2014-1663,0,0,c95e9ddef1c1faaac78aa6d63a0ee14820ada7de45e3109a25b14e5d6af77442,2024-11-21T02:04:47.300000 +CVE-2014-1664,0,0,1e9961f133d78a25128d7a260d531ce383eccde1e3a28b725809d1aa8dd62a70,2024-11-21T02:04:47.450000 CVE-2014-1665,0,0,640d2cd5e3678fc5180ff13779aa9e5d10d1f39d04e8b729764b347ca623025c,2018-04-13T16:26:50.810000 -CVE-2014-1666,0,1,fe64511e3c905dcd26b554547d1ddea3b84cb1ebf60113e10510cb3000e5a0f9,2024-11-21T02:04:47.750000 -CVE-2014-1670,0,1,79050828cb96c231617e64f1ce81733f72f5d6c79563781645ac77a50819c862,2024-11-21T02:04:47.903000 -CVE-2014-1671,0,1,83b77a24aa2e3bdc20c6ece37111e6b0f9560491bb29b17f376bd6304c4a34d9,2024-11-21T02:04:48.063000 -CVE-2014-1672,0,1,75ded2bf84c8d2d16082df7ebcb0b4f7128476cd1f7ac6910c44887713132804,2024-11-21T02:04:48.210000 -CVE-2014-1673,0,1,72c8c84a369aa0fb1db89115d79413d2e3fd94d24f74dfd38429a4da31c3ea46,2024-11-21T02:04:48.367000 +CVE-2014-1666,0,0,fe64511e3c905dcd26b554547d1ddea3b84cb1ebf60113e10510cb3000e5a0f9,2024-11-21T02:04:47.750000 +CVE-2014-1670,0,0,79050828cb96c231617e64f1ce81733f72f5d6c79563781645ac77a50819c862,2024-11-21T02:04:47.903000 +CVE-2014-1671,0,0,83b77a24aa2e3bdc20c6ece37111e6b0f9560491bb29b17f376bd6304c4a34d9,2024-11-21T02:04:48.063000 +CVE-2014-1672,0,0,75ded2bf84c8d2d16082df7ebcb0b4f7128476cd1f7ac6910c44887713132804,2024-11-21T02:04:48.210000 +CVE-2014-1673,0,0,72c8c84a369aa0fb1db89115d79413d2e3fd94d24f74dfd38429a4da31c3ea46,2024-11-21T02:04:48.367000 CVE-2014-1677,0,0,f8144d3f42be7335be92d622450c74d4a4913f78731ae2613a7d3ea4ac534f67,2018-10-09T19:42:58.953000 CVE-2014-1679,0,0,d70135ef23f236e0874d539b82e47b329fbbcf94ff23eecd5427af934b194407,2017-08-29T01:34:27.187000 -CVE-2014-1680,0,1,34fa6f8cb38ed3c6863832b799b20434a519bd5622a96dfae8223c48736aa58e,2024-11-21T02:04:48.843000 -CVE-2014-1681,0,1,71dea7211db6b17b161be5ff40cc1e7c2038cb1943689d6b8e52ed007c2e20bf,2024-11-21T02:04:48.993000 -CVE-2014-1682,0,1,1c38b0b8fc179495453d6f2c5da45d97f2054d71a3a457bf79137fbd3ff82816,2024-11-21T02:04:49.167000 -CVE-2014-1683,0,1,d143291d69f9325333e409c55b4bbebda2addeb3952a6d7ef480a00841242fbb,2024-11-21T02:04:49.327000 -CVE-2014-1684,0,1,d766f42794d12b3843fd98cd9dfb3a7b1b5650dcc00dfa01161d2acfb09ddd4d,2024-11-21T02:04:49.487000 -CVE-2014-1685,0,1,8e69c164efb8c026247a69aaabec32cccb6c9469a75fbedef4e550dbc8d5354a,2024-11-21T02:04:49.647000 +CVE-2014-1680,0,0,34fa6f8cb38ed3c6863832b799b20434a519bd5622a96dfae8223c48736aa58e,2024-11-21T02:04:48.843000 +CVE-2014-1681,0,0,71dea7211db6b17b161be5ff40cc1e7c2038cb1943689d6b8e52ed007c2e20bf,2024-11-21T02:04:48.993000 +CVE-2014-1682,0,0,1c38b0b8fc179495453d6f2c5da45d97f2054d71a3a457bf79137fbd3ff82816,2024-11-21T02:04:49.167000 +CVE-2014-1683,0,0,d143291d69f9325333e409c55b4bbebda2addeb3952a6d7ef480a00841242fbb,2024-11-21T02:04:49.327000 +CVE-2014-1684,0,0,d766f42794d12b3843fd98cd9dfb3a7b1b5650dcc00dfa01161d2acfb09ddd4d,2024-11-21T02:04:49.487000 +CVE-2014-1685,0,0,8e69c164efb8c026247a69aaabec32cccb6c9469a75fbedef4e550dbc8d5354a,2024-11-21T02:04:49.647000 CVE-2014-1686,0,0,6ed48cc6b14f0308bba62b1594fb894e71b46290aadb13ab01a780c4b66c8b67,2018-05-18T17:08:15.443000 -CVE-2014-1690,0,1,9ff866179ef41b854240ecbff5f515bc4bbfbb3973a9fedda7044f140f470f32,2024-11-21T02:04:49.953000 -CVE-2014-1691,0,1,6582c4d2ab5c7d4734f19eb82bb2731694b37a44fb01b2c13191cc9a946363c5,2024-11-21T02:04:50.083000 -CVE-2014-1692,0,1,d2a8952f79b296e8febf416bed2c0ab6804982191e62b16007df1e9d6b4ef9a8,2024-11-21T02:04:50.230000 +CVE-2014-1690,0,0,9ff866179ef41b854240ecbff5f515bc4bbfbb3973a9fedda7044f140f470f32,2024-11-21T02:04:49.953000 +CVE-2014-1691,0,0,6582c4d2ab5c7d4734f19eb82bb2731694b37a44fb01b2c13191cc9a946363c5,2024-11-21T02:04:50.083000 +CVE-2014-1692,0,0,d2a8952f79b296e8febf416bed2c0ab6804982191e62b16007df1e9d6b4ef9a8,2024-11-21T02:04:50.230000 CVE-2014-1693,0,0,210a190f61b1923cbe77d3b067560982665bbb25b9c1a0b725f73bb7f85db818,2018-03-16T01:29:00.437000 -CVE-2014-1694,0,1,6adc83e646602e458d7b01540fbf767688c9fc58dfb9c4dc86b6ae51bf877ee2,2024-11-21T02:04:50.493000 -CVE-2014-1695,0,1,e8372b11d26aaae5d5e2d40cfe0d1cb1b02354eb5756311091788f237db06000,2024-11-21T02:04:50.667000 -CVE-2014-1696,0,1,292cf306f70c8443d3419b12b1b77ab1c033974b90b49eeaf3b707f1672b8436,2024-11-21T02:04:50.827000 -CVE-2014-1697,0,1,f3253099ab7161ea9c9f2e638de7399bcb9b9bd6216d929c0f19f64426d43350,2024-11-21T02:04:50.970000 -CVE-2014-1698,0,1,ba72eb636b663aca8226a89742e2c55687e6ba96fe8b7562b2a315f8dc1c7754,2024-11-21T02:04:51.120000 -CVE-2014-1699,0,1,27d074847080f85804aedeb21508e2c26f2ee2de8974a6aeca5378dc07e18648,2024-11-21T02:04:51.270000 -CVE-2014-1700,0,1,ac40028e0b229b281263a04cbc0c1e238e616ed6df7cd7067b3680f0a8d2aa6d,2024-11-21T02:04:51.417000 -CVE-2014-1701,0,1,f9d66622d63d98b7568f40b98671880d7db97b28e758b1c93de8e335d88bb218,2024-11-21T02:04:51.557000 -CVE-2014-1702,0,1,e9d9cede1c6e0586cf6fe9272a086f0e4e096f7a9f7dcfb00b23ea16a127856f,2024-11-21T02:04:51.693000 -CVE-2014-1703,0,1,3d253ebfa02f712715c8b75ebe6affc209328ac822137ef9440d2214e67314f3,2024-11-21T02:04:51.833000 -CVE-2014-1704,0,1,e84e3f46054352b994d407d522ba5cf9a3f5d5e11a57c5af11d6b8ab027d3089,2024-11-21T02:04:51.970000 -CVE-2014-1705,0,1,455a85216cc6d3e769f42d3f5a0251d7890de431c67c472a2a6f5a51038f39d5,2024-11-21T02:04:52.120000 -CVE-2014-1706,0,1,00254c962ffdf9898c3cf7f803d0a6faeee86f6860edc16165c602e6fdc80ccf,2024-11-21T02:04:52.267000 -CVE-2014-1707,0,1,63974b45825c482d02f8023dd4512d1b6169fa207adbe070bf3dc6566a6c348c,2024-11-21T02:04:52.387000 -CVE-2014-1708,0,1,e69b2aa4c456d5362dcf3a701931cbe2d09ed5ac16e456ad69e132f9dfd0b2bc,2024-11-21T02:04:52.513000 -CVE-2014-1710,0,1,ec4d6d8f21eb371b3fef3b20460d7198654258d63e3b5bd16e731f458c3a8059,2024-11-21T02:04:52.627000 -CVE-2014-1711,0,1,e0868795cd2d6488aef299ba993b2bdcb88570012fff241ede08320f97971d19,2024-11-21T02:04:52.743000 -CVE-2014-1713,0,1,b9881696e89ea7f2a7d3fa95b61b7aa78b5631e0632892b74c1121204c88194b,2024-11-21T02:04:52.863000 -CVE-2014-1714,0,1,6dffa5f8055e867ae3c7a87c955dc5f11a27c92b21b683f468a0b08bc5f8b52e,2024-11-21T02:04:53.010000 -CVE-2014-1715,0,1,c8637520a8d893e072c401eb35dda77c6c3c8c0b89e53d4b9b00841e812db34c,2024-11-21T02:04:53.137000 -CVE-2014-1716,0,1,da34b6766af1b19eac9c7884f45cc3ebd01065230f88ad2a2fe4c4d79f7068a1,2024-11-21T02:04:53.263000 -CVE-2014-1717,0,1,6d032efe7b290d1c075d9c7c1a4ac192ce54c24fd31fa5cdbf9c112d5a957f45,2024-11-21T02:04:53.390000 -CVE-2014-1718,0,1,cc03ee972d3941d4e3aa611609a7bdb57c5830f2518563a3fac3d235ad186566,2024-11-21T02:04:53.500000 -CVE-2014-1719,0,1,347bfdafdbcd0fe1ab1c6bb2ae3e9a4451d1c767499ced2c8f122fe6813e8f2a,2024-11-21T02:04:53.633000 -CVE-2014-1720,0,1,d8889476cb359d3a26a3ee0c4e7625b9016a36c7a2272d2b54c68daadbd8caa7,2024-11-21T02:04:53.750000 -CVE-2014-1721,0,1,5b609f8ce88bc8e6af3099f52a895918e2e853c6b840bb05d49ebbda783d1bd5,2024-11-21T02:04:53.880000 -CVE-2014-1722,0,1,1d15e0dd5a444b59cbf4fc60037799cbe450c182af8e41333d2a57c484dd0569,2024-11-21T02:04:54 -CVE-2014-1723,0,1,cd71dd564329a8a3746f26a89314b6d86207439ed7eb077444b5f4ab1d9e7f26,2024-11-21T02:04:54.120000 -CVE-2014-1724,0,1,f9f69f4d2d01c962ab8fbd38d28efd688765ce0f290bcb7bf3622714fd7da556,2024-11-21T02:04:54.257000 -CVE-2014-1725,0,1,1fb26159f618c960a2894ccc36e69a2f084afdee10a6dc52d0c4539fcf87497c,2024-11-21T02:04:54.403000 -CVE-2014-1726,0,1,ac3c8003291f431413b1bebd7d3701dcc42ef72ab677a00e970f0baaaa525a1d,2024-11-21T02:04:54.533000 -CVE-2014-1727,0,1,8540d5a074aa38007b3e8f24c36ea25ceca6c3e09233e3a19d2941fb6b83ab68,2024-11-21T02:04:54.660000 -CVE-2014-1728,0,1,80bcc9213ec1f7c248db1ba96c5a7ab9c8c36eae5ae5196333c83b0aa76209ea,2024-11-21T02:04:54.780000 -CVE-2014-1729,0,1,857e3618a7f3ede96ff971fc9cc0ec62c55c5514249d2033c37c3f033f4757e3,2024-11-21T02:04:54.917000 -CVE-2014-1730,0,1,040c076f31eed0bd110644452b02d73f2f41cebca06462ec5cf7c872bb5682f7,2024-11-21T02:04:55.050000 -CVE-2014-1731,0,1,1ffeb1d2d5bf0587604b704a1e934dbd807a7f848202ba4771f70db8de6fe062,2024-11-21T02:04:55.193000 -CVE-2014-1732,0,1,5653b285e098d79362f8add61b3c870cc85fc6cc6a2905585e1371012e52fa08,2024-11-21T02:04:55.330000 -CVE-2014-1733,0,1,bc6a8e830b00075a35dfeee189431ba8fe8295a3a82d87452676ed1ad3afdd41,2024-11-21T02:04:55.457000 -CVE-2014-1734,0,1,20fb2dca02587b0ab44a41c5e2feecf5cbbf3ebb8db492d197806eec6d86045b,2024-11-21T02:04:55.587000 -CVE-2014-1735,0,1,2675d13a6d25fa4aa3a0fb542c11c12485972ee536759a609e5b781f982e7795,2024-11-21T02:04:55.727000 -CVE-2014-1736,0,1,ae786e213fa3ee08c89ff1fd916b7ceb1c79c8870ded017bfb5c3dadffaf568d,2024-11-21T02:04:55.857000 -CVE-2014-1737,0,1,f16609faefabb0ff54b530216a98fca330630c8b98de0875de8c3cb192bae0aa,2024-11-21T02:04:55.980000 -CVE-2014-1738,0,1,4b480f93f3610b11bbccaaf076f615b132354182a3301007e9fa2e78ec0f346e,2024-11-21T02:04:56.130000 +CVE-2014-1694,0,0,6adc83e646602e458d7b01540fbf767688c9fc58dfb9c4dc86b6ae51bf877ee2,2024-11-21T02:04:50.493000 +CVE-2014-1695,0,0,e8372b11d26aaae5d5e2d40cfe0d1cb1b02354eb5756311091788f237db06000,2024-11-21T02:04:50.667000 +CVE-2014-1696,0,0,292cf306f70c8443d3419b12b1b77ab1c033974b90b49eeaf3b707f1672b8436,2024-11-21T02:04:50.827000 +CVE-2014-1697,0,0,f3253099ab7161ea9c9f2e638de7399bcb9b9bd6216d929c0f19f64426d43350,2024-11-21T02:04:50.970000 +CVE-2014-1698,0,0,ba72eb636b663aca8226a89742e2c55687e6ba96fe8b7562b2a315f8dc1c7754,2024-11-21T02:04:51.120000 +CVE-2014-1699,0,0,27d074847080f85804aedeb21508e2c26f2ee2de8974a6aeca5378dc07e18648,2024-11-21T02:04:51.270000 +CVE-2014-1700,0,0,ac40028e0b229b281263a04cbc0c1e238e616ed6df7cd7067b3680f0a8d2aa6d,2024-11-21T02:04:51.417000 +CVE-2014-1701,0,0,f9d66622d63d98b7568f40b98671880d7db97b28e758b1c93de8e335d88bb218,2024-11-21T02:04:51.557000 +CVE-2014-1702,0,0,e9d9cede1c6e0586cf6fe9272a086f0e4e096f7a9f7dcfb00b23ea16a127856f,2024-11-21T02:04:51.693000 +CVE-2014-1703,0,0,3d253ebfa02f712715c8b75ebe6affc209328ac822137ef9440d2214e67314f3,2024-11-21T02:04:51.833000 +CVE-2014-1704,0,0,e84e3f46054352b994d407d522ba5cf9a3f5d5e11a57c5af11d6b8ab027d3089,2024-11-21T02:04:51.970000 +CVE-2014-1705,0,0,455a85216cc6d3e769f42d3f5a0251d7890de431c67c472a2a6f5a51038f39d5,2024-11-21T02:04:52.120000 +CVE-2014-1706,0,0,00254c962ffdf9898c3cf7f803d0a6faeee86f6860edc16165c602e6fdc80ccf,2024-11-21T02:04:52.267000 +CVE-2014-1707,0,0,63974b45825c482d02f8023dd4512d1b6169fa207adbe070bf3dc6566a6c348c,2024-11-21T02:04:52.387000 +CVE-2014-1708,0,0,e69b2aa4c456d5362dcf3a701931cbe2d09ed5ac16e456ad69e132f9dfd0b2bc,2024-11-21T02:04:52.513000 +CVE-2014-1710,0,0,ec4d6d8f21eb371b3fef3b20460d7198654258d63e3b5bd16e731f458c3a8059,2024-11-21T02:04:52.627000 +CVE-2014-1711,0,0,e0868795cd2d6488aef299ba993b2bdcb88570012fff241ede08320f97971d19,2024-11-21T02:04:52.743000 +CVE-2014-1713,0,0,b9881696e89ea7f2a7d3fa95b61b7aa78b5631e0632892b74c1121204c88194b,2024-11-21T02:04:52.863000 +CVE-2014-1714,0,0,6dffa5f8055e867ae3c7a87c955dc5f11a27c92b21b683f468a0b08bc5f8b52e,2024-11-21T02:04:53.010000 +CVE-2014-1715,0,0,c8637520a8d893e072c401eb35dda77c6c3c8c0b89e53d4b9b00841e812db34c,2024-11-21T02:04:53.137000 +CVE-2014-1716,0,0,da34b6766af1b19eac9c7884f45cc3ebd01065230f88ad2a2fe4c4d79f7068a1,2024-11-21T02:04:53.263000 +CVE-2014-1717,0,0,6d032efe7b290d1c075d9c7c1a4ac192ce54c24fd31fa5cdbf9c112d5a957f45,2024-11-21T02:04:53.390000 +CVE-2014-1718,0,0,cc03ee972d3941d4e3aa611609a7bdb57c5830f2518563a3fac3d235ad186566,2024-11-21T02:04:53.500000 +CVE-2014-1719,0,0,347bfdafdbcd0fe1ab1c6bb2ae3e9a4451d1c767499ced2c8f122fe6813e8f2a,2024-11-21T02:04:53.633000 +CVE-2014-1720,0,0,d8889476cb359d3a26a3ee0c4e7625b9016a36c7a2272d2b54c68daadbd8caa7,2024-11-21T02:04:53.750000 +CVE-2014-1721,0,0,5b609f8ce88bc8e6af3099f52a895918e2e853c6b840bb05d49ebbda783d1bd5,2024-11-21T02:04:53.880000 +CVE-2014-1722,0,0,1d15e0dd5a444b59cbf4fc60037799cbe450c182af8e41333d2a57c484dd0569,2024-11-21T02:04:54 +CVE-2014-1723,0,0,cd71dd564329a8a3746f26a89314b6d86207439ed7eb077444b5f4ab1d9e7f26,2024-11-21T02:04:54.120000 +CVE-2014-1724,0,0,f9f69f4d2d01c962ab8fbd38d28efd688765ce0f290bcb7bf3622714fd7da556,2024-11-21T02:04:54.257000 +CVE-2014-1725,0,0,1fb26159f618c960a2894ccc36e69a2f084afdee10a6dc52d0c4539fcf87497c,2024-11-21T02:04:54.403000 +CVE-2014-1726,0,0,ac3c8003291f431413b1bebd7d3701dcc42ef72ab677a00e970f0baaaa525a1d,2024-11-21T02:04:54.533000 +CVE-2014-1727,0,0,8540d5a074aa38007b3e8f24c36ea25ceca6c3e09233e3a19d2941fb6b83ab68,2024-11-21T02:04:54.660000 +CVE-2014-1728,0,0,80bcc9213ec1f7c248db1ba96c5a7ab9c8c36eae5ae5196333c83b0aa76209ea,2024-11-21T02:04:54.780000 +CVE-2014-1729,0,0,857e3618a7f3ede96ff971fc9cc0ec62c55c5514249d2033c37c3f033f4757e3,2024-11-21T02:04:54.917000 +CVE-2014-1730,0,0,040c076f31eed0bd110644452b02d73f2f41cebca06462ec5cf7c872bb5682f7,2024-11-21T02:04:55.050000 +CVE-2014-1731,0,0,1ffeb1d2d5bf0587604b704a1e934dbd807a7f848202ba4771f70db8de6fe062,2024-11-21T02:04:55.193000 +CVE-2014-1732,0,0,5653b285e098d79362f8add61b3c870cc85fc6cc6a2905585e1371012e52fa08,2024-11-21T02:04:55.330000 +CVE-2014-1733,0,0,bc6a8e830b00075a35dfeee189431ba8fe8295a3a82d87452676ed1ad3afdd41,2024-11-21T02:04:55.457000 +CVE-2014-1734,0,0,20fb2dca02587b0ab44a41c5e2feecf5cbbf3ebb8db492d197806eec6d86045b,2024-11-21T02:04:55.587000 +CVE-2014-1735,0,0,2675d13a6d25fa4aa3a0fb542c11c12485972ee536759a609e5b781f982e7795,2024-11-21T02:04:55.727000 +CVE-2014-1736,0,0,ae786e213fa3ee08c89ff1fd916b7ceb1c79c8870ded017bfb5c3dadffaf568d,2024-11-21T02:04:55.857000 +CVE-2014-1737,0,0,f16609faefabb0ff54b530216a98fca330630c8b98de0875de8c3cb192bae0aa,2024-11-21T02:04:55.980000 +CVE-2014-1738,0,0,4b480f93f3610b11bbccaaf076f615b132354182a3301007e9fa2e78ec0f346e,2024-11-21T02:04:56.130000 CVE-2014-1739,0,0,6d349c34cb4efb074e0923fb7eda3229ceb57c7d0748fa18c107a7c450b7c78a,2023-11-07T02:19:18.813000 -CVE-2014-1740,0,1,eb7f6d9547affe2becbcde10c8f6f3c35d5ccd07cc0b79dd391fa7403f591896,2024-11-21T02:04:56.427000 -CVE-2014-1741,0,1,d2e96a73f3a0be157340eb987459ae373bc55ed660fa4fc566d56cb5e6d4a351,2024-11-21T02:04:56.570000 -CVE-2014-1742,0,1,bdab9e2c4796fae1c1f6e1d6cea02cfc49a663961c52256554b64a3e8b4cd96e,2024-11-21T02:04:56.703000 -CVE-2014-1743,0,1,ecf8b87324cac4ef8607defa550fd5c3a12d94aef1b448dc2c5856960962330d,2024-11-21T02:04:56.847000 -CVE-2014-1744,0,1,4e878379e8fe44db959080dd2ec13da298aaab21b7ef3a839a9ee38af3f40465,2024-11-21T02:04:56.987000 -CVE-2014-1745,0,1,785a46ab01127b8f047be37e7b0d48f6505f75d9dad794df195723c2258ab8bb,2024-11-21T02:04:57.153000 -CVE-2014-1746,0,1,3a5a6c1ad463417cfa836bbdff1b6e214b7ba562b5f5658533aded06f71f61e9,2024-11-21T02:04:57.300000 -CVE-2014-1747,0,1,33a018730310a741516332c3fc9761bea7f3a006eb8bfc56648ae6698ff45198,2024-11-21T02:04:57.443000 -CVE-2014-1748,0,1,926478efb63e09b924d1a5f98d677ba3363584e230f70fbbd5f3f80f219a706e,2024-11-21T02:04:57.563000 -CVE-2014-1749,0,1,76d365a60f20b4a0c197834902a3ed85888c8e95a8a17f5fd88943f70aa8a14a,2024-11-21T02:04:57.727000 +CVE-2014-1740,0,0,eb7f6d9547affe2becbcde10c8f6f3c35d5ccd07cc0b79dd391fa7403f591896,2024-11-21T02:04:56.427000 +CVE-2014-1741,0,0,d2e96a73f3a0be157340eb987459ae373bc55ed660fa4fc566d56cb5e6d4a351,2024-11-21T02:04:56.570000 +CVE-2014-1742,0,0,bdab9e2c4796fae1c1f6e1d6cea02cfc49a663961c52256554b64a3e8b4cd96e,2024-11-21T02:04:56.703000 +CVE-2014-1743,0,0,ecf8b87324cac4ef8607defa550fd5c3a12d94aef1b448dc2c5856960962330d,2024-11-21T02:04:56.847000 +CVE-2014-1744,0,0,4e878379e8fe44db959080dd2ec13da298aaab21b7ef3a839a9ee38af3f40465,2024-11-21T02:04:56.987000 +CVE-2014-1745,0,0,785a46ab01127b8f047be37e7b0d48f6505f75d9dad794df195723c2258ab8bb,2024-11-21T02:04:57.153000 +CVE-2014-1746,0,0,3a5a6c1ad463417cfa836bbdff1b6e214b7ba562b5f5658533aded06f71f61e9,2024-11-21T02:04:57.300000 +CVE-2014-1747,0,0,33a018730310a741516332c3fc9761bea7f3a006eb8bfc56648ae6698ff45198,2024-11-21T02:04:57.443000 +CVE-2014-1748,0,0,926478efb63e09b924d1a5f98d677ba3363584e230f70fbbd5f3f80f219a706e,2024-11-21T02:04:57.563000 +CVE-2014-1749,0,0,76d365a60f20b4a0c197834902a3ed85888c8e95a8a17f5fd88943f70aa8a14a,2024-11-21T02:04:57.727000 CVE-2014-1750,0,0,1abcc633b5cba257bf81d23660c66630c2f93073dbb7087ac4686fe0431e0042,2016-05-27T16:08:10.770000 -CVE-2014-1751,0,1,8c7875e91aca1c6eb4d49911773015b032ba57a429e61bbd3893dba4d564fa80,2024-11-21T02:04:58.013000 -CVE-2014-1752,0,1,c857dd38f28b1c4299219797c946aa84b3647c8694189d917dac52dc2366a868,2024-11-21T02:04:58.130000 -CVE-2014-1753,0,1,9cc37719d10d638aec4af67f1389fc3a64d88ff2e2fb80d7301aa8a5f61efc13,2024-11-21T02:04:58.237000 -CVE-2014-1754,0,1,8cde3fb29f174082d3358d4c2e4659fc4acc8910d73941ca4029e8d901253c06,2024-11-21T02:04:58.343000 -CVE-2014-1755,0,1,29b7a137900002a9903b9350fbda9a8ccdba2fd47a4ffdf516cd3dc68a83c060,2024-11-21T02:04:58.473000 -CVE-2014-1756,0,1,5fdbf0c018612e7a713f1c814f4e0e8d11d3ae3fe6bcab71a0d73c0c382cba69,2024-11-21T02:04:58.587000 -CVE-2014-1757,0,1,cff75fae30f62d26693e0e7697d09fa5b76c343e7602cb265e1e58dc3a8a7319,2024-11-21T02:04:58.697000 -CVE-2014-1758,0,1,c338e9da4d18e9cdd22aeb570f5cafb95aec42eef051f4c90cbd015b236021b9,2024-11-21T02:04:58.810000 -CVE-2014-1759,0,1,bd6175e139134683d5e39404be76bdf8450480b3d1de9ec99f7b2c2b7d6edbc0,2024-11-21T02:04:58.923000 -CVE-2014-1760,0,1,57280fad2c7dd5130bacab6d615a573cfba01a18804aabc0d041a41945678423,2024-11-21T02:04:59.027000 -CVE-2014-1761,0,1,2d465559b99748f4c51e34e066fe1cd94f12def1badb608b676bee85e8445ab2,2024-11-21T02:04:59.127000 -CVE-2014-1762,0,1,37a060e1b2e6161e35de5087876e2cf2b6740908deb8506a3920389916184a15,2024-11-21T02:04:59.240000 -CVE-2014-1763,0,1,ca8b750498acdf3553d9af7693277280ea459cdcca298210f5ff28495ea11d4c,2024-11-21T02:04:59.357000 -CVE-2014-1764,0,1,400044cb4d42d8ec171662ba28dda260b14afd7670034da7a9305cf458f63d7c,2024-11-21T02:04:59.497000 -CVE-2014-1765,0,1,bcbf12e5cf9d9073aded98040455e9cea65e7d58e9571e7ab52569c506aadf2a,2024-11-21T02:04:59.633000 -CVE-2014-1766,0,1,64f6a36e7d839d41d552b9825b9b0703fe819ef692dfd02efd2fe0346d1e6d30,2024-11-21T02:04:59.750000 +CVE-2014-1751,0,0,8c7875e91aca1c6eb4d49911773015b032ba57a429e61bbd3893dba4d564fa80,2024-11-21T02:04:58.013000 +CVE-2014-1752,0,0,c857dd38f28b1c4299219797c946aa84b3647c8694189d917dac52dc2366a868,2024-11-21T02:04:58.130000 +CVE-2014-1753,0,0,9cc37719d10d638aec4af67f1389fc3a64d88ff2e2fb80d7301aa8a5f61efc13,2024-11-21T02:04:58.237000 +CVE-2014-1754,0,0,8cde3fb29f174082d3358d4c2e4659fc4acc8910d73941ca4029e8d901253c06,2024-11-21T02:04:58.343000 +CVE-2014-1755,0,0,29b7a137900002a9903b9350fbda9a8ccdba2fd47a4ffdf516cd3dc68a83c060,2024-11-21T02:04:58.473000 +CVE-2014-1756,0,0,5fdbf0c018612e7a713f1c814f4e0e8d11d3ae3fe6bcab71a0d73c0c382cba69,2024-11-21T02:04:58.587000 +CVE-2014-1757,0,0,cff75fae30f62d26693e0e7697d09fa5b76c343e7602cb265e1e58dc3a8a7319,2024-11-21T02:04:58.697000 +CVE-2014-1758,0,0,c338e9da4d18e9cdd22aeb570f5cafb95aec42eef051f4c90cbd015b236021b9,2024-11-21T02:04:58.810000 +CVE-2014-1759,0,0,bd6175e139134683d5e39404be76bdf8450480b3d1de9ec99f7b2c2b7d6edbc0,2024-11-21T02:04:58.923000 +CVE-2014-1760,0,0,57280fad2c7dd5130bacab6d615a573cfba01a18804aabc0d041a41945678423,2024-11-21T02:04:59.027000 +CVE-2014-1761,0,0,2d465559b99748f4c51e34e066fe1cd94f12def1badb608b676bee85e8445ab2,2024-11-21T02:04:59.127000 +CVE-2014-1762,0,0,37a060e1b2e6161e35de5087876e2cf2b6740908deb8506a3920389916184a15,2024-11-21T02:04:59.240000 +CVE-2014-1763,0,0,ca8b750498acdf3553d9af7693277280ea459cdcca298210f5ff28495ea11d4c,2024-11-21T02:04:59.357000 +CVE-2014-1764,0,0,400044cb4d42d8ec171662ba28dda260b14afd7670034da7a9305cf458f63d7c,2024-11-21T02:04:59.497000 +CVE-2014-1765,0,0,bcbf12e5cf9d9073aded98040455e9cea65e7d58e9571e7ab52569c506aadf2a,2024-11-21T02:04:59.633000 +CVE-2014-1766,0,0,64f6a36e7d839d41d552b9825b9b0703fe819ef692dfd02efd2fe0346d1e6d30,2024-11-21T02:04:59.750000 CVE-2014-1767,0,0,811e104d36ffb94eb03865a3d9ddba6c4f1090070fa2fd8a2c535271d93d1c82,2019-02-26T14:04:02.400000 CVE-2014-1768,0,0,ec843d7db91b8ef2a5a2764932dac58053d3774d95534fe7f96156ea01e885f0,2023-11-07T02:19:24.003000 CVE-2014-1769,0,0,5fb757b8e5aa1306782f63f25be37d742e976c6c7035c001cf7acd81982378bb,2018-10-12T22:06:01.373000 -CVE-2014-1770,0,1,821cdf10c0ceb22d56486f94502ac5f7c73be683e88f59604dc685e54d171924,2024-11-21T02:05:00.123000 +CVE-2014-1770,0,0,821cdf10c0ceb22d56486f94502ac5f7c73be683e88f59604dc685e54d171924,2024-11-21T02:05:00.123000 CVE-2014-1771,0,0,18aa2aeef0e9d327768795f9c34c46cbd708d165985fc279d6961c399f00debb,2018-10-12T22:06:02.403000 CVE-2014-1772,0,0,0c295fab3b797e2b752d71c6f501e65aa543959237c23f718c1a060846dbb325,2018-10-12T22:06:02.857000 CVE-2014-1773,0,0,b5e3c9dd8e8dcbbbbbb08667ca3513646a7ff4a48c4148aced76b41b73da0678,2018-10-12T22:06:03.137000 CVE-2014-1774,0,0,0e380f5023eee3fe061b15cf7447bd4d71109249305d56d926ac3bb85bfff4f8,2018-10-12T22:06:03.467000 CVE-2014-1775,0,0,b32f443e2244219a7bc4e5b4d9e7b7fb6428282367b5edab45d8b29f5e410b38,2018-10-12T22:06:03.733000 -CVE-2014-1776,0,1,0e13a1e273566aac11d310552ec54da17dac1fa21a038abd48c028f5c37cf607,2024-11-21T02:05:00.823000 +CVE-2014-1776,0,0,0e13a1e273566aac11d310552ec54da17dac1fa21a038abd48c028f5c37cf607,2024-11-21T02:05:00.823000 CVE-2014-1777,0,0,b8dc524ef06bbb717b7465aeb6a1d70996e1ce1564bf5c772771d7c3c1461dde,2018-10-12T22:06:05.187000 CVE-2014-1778,0,0,e21d8ee39d9013b6ba7f287aee1f3e4f35ef024c3506e3ca1077be6e501e4027,2018-10-12T22:06:05.467000 CVE-2014-1779,0,0,cb8daa48b15693b7769778e8e8e45f37e53b2fffe0b359aa19a3c7a473510d20,2018-10-12T22:06:05.717000 @@ -66222,16 +66222,16 @@ CVE-2014-1802,0,0,7f21bb3383d729e133dcd233147e66ab2b4c0085af92cfdd04b3f6d7a1007f CVE-2014-1803,0,0,6041988ee3ad6dcabcc561980b728b48f571ca3582177d339e88ab56d265071a,2018-10-12T22:06:13.047000 CVE-2014-1804,0,0,11c380454365aa1fc5eae8bdcbcd1e54e33301db182cfa54e23ba25ceeea7dac,2018-10-12T22:06:13.357000 CVE-2014-1805,0,0,f9d8200be8ef4c72169aac41d0cba337b10183f50cdd378b3babe24d88ebafbc,2018-10-12T22:06:13.657000 -CVE-2014-1806,0,1,9f989a957d3c3dc824d1c49c12bb43bada7c256cfef68f5aefc2715b1baf6e06,2024-11-21T02:05:04.213000 -CVE-2014-1807,0,1,7fedf523c44f710f2f32eab705b7b70055c0254a3da2b61f2354f0c2de15c402,2024-11-21T02:05:04.333000 -CVE-2014-1808,0,1,f81391995891958ee9328eaec67cd1c61c4a4089a4e853d1c28231665bbd278e,2024-11-21T02:05:04.450000 -CVE-2014-1809,0,1,d6eb9afe999fc3b0e51816ec0e17990d9a2a0411929feb2b134765cdae7a1f9d,2024-11-21T02:05:04.563000 +CVE-2014-1806,0,0,9f989a957d3c3dc824d1c49c12bb43bada7c256cfef68f5aefc2715b1baf6e06,2024-11-21T02:05:04.213000 +CVE-2014-1807,0,0,7fedf523c44f710f2f32eab705b7b70055c0254a3da2b61f2354f0c2de15c402,2024-11-21T02:05:04.333000 +CVE-2014-1808,0,0,f81391995891958ee9328eaec67cd1c61c4a4089a4e853d1c28231665bbd278e,2024-11-21T02:05:04.450000 +CVE-2014-1809,0,0,d6eb9afe999fc3b0e51816ec0e17990d9a2a0411929feb2b134765cdae7a1f9d,2024-11-21T02:05:04.563000 CVE-2014-1810,0,0,45fe80dd85457213ac91cba4cd865bfe1c9743751806fa68efe6fd6223d8e86a,2023-11-07T02:19:25.600000 CVE-2014-1811,0,0,b26dac7b1f22c78d269a73438c43c9a9eec9a7dc467f8f840e7ce5c66a50bec2,2019-05-16T18:50:40.277000 -CVE-2014-1812,0,1,329b5b8a2b349e0e088dcf111fe2a4f1d975541cbc6d442d7046b17bb3b30f31,2024-11-21T02:05:04.843000 -CVE-2014-1813,0,1,c19cf621debcfcbd73998eb6831b3b1aba17f4336007c3e17f593887afc64cd6,2024-11-21T02:05:04.953000 +CVE-2014-1812,0,0,329b5b8a2b349e0e088dcf111fe2a4f1d975541cbc6d442d7046b17bb3b30f31,2024-11-21T02:05:04.843000 +CVE-2014-1813,0,0,c19cf621debcfcbd73998eb6831b3b1aba17f4336007c3e17f593887afc64cd6,2024-11-21T02:05:04.953000 CVE-2014-1814,0,0,50d2d8aad0441a8a7faf0dabe64f46f11f7ec13daf7a6db1fb2248b231c2cdf0,2019-05-13T18:52:05.037000 -CVE-2014-1815,0,1,c040230b0daba22d2e3e3350d5f98f67f66d8a168135f04a512b234f608d01d6,2024-11-21T02:05:05.183000 +CVE-2014-1815,0,0,c040230b0daba22d2e3e3350d5f98f67f66d8a168135f04a512b234f608d01d6,2024-11-21T02:05:05.183000 CVE-2014-1816,0,0,fc95a3fd2b40d89c43cd91ff503c2841ec9faa6d1e75ec6521077b3cb031c971,2018-10-12T22:06:16.310000 CVE-2014-1817,0,0,d396c10c7f1bc03ff0d39fb398d40f66b26114a00eb21ae7f391911ff59a666c,2019-05-20T17:27:51.123000 CVE-2014-1818,0,0,55ec20cfb87f91fdaf3913bf4c9fabfd405bec025365603c266c5ded50cbb21d,2019-05-17T20:27:44.427000 @@ -66242,77 +66242,77 @@ CVE-2014-1822,0,0,d5cc4667569892ac7871e03f3dd801109cfc21244639f9d32a44edac38bb3c CVE-2014-1823,0,0,7cc7912dffb5c942ae29266964d0c505fd988f27e7ce01ade051cfd804d35466,2018-10-12T22:06:19.047000 CVE-2014-1824,0,0,cab801ae4f26936f1bca58cd0af54f96a9086fd31b27141f60d1cf6c9dafd714,2018-10-12T22:06:19.517000 CVE-2014-1825,0,0,8837a99404477b27275d87eb607ffa49304d8f1e8489651fc87f1e8c54449762,2023-11-07T02:19:26.383000 -CVE-2014-1826,0,1,8fadd52fdad87deb94b57f4092cba9b78cf874b8d5d606f985f54a57d0ac33b5,2024-11-21T02:05:06.217000 -CVE-2014-1827,0,1,7021c468e44a8accab42e0e72277e1e0834136d089f801453d5c300bb075ead4,2024-11-21T02:05:06.370000 -CVE-2014-1828,0,1,2e9f697babbb6a8b3fe7b88ffc7d95ef91b9630df172a998dad937e0217d80d9,2024-11-21T02:05:06.510000 +CVE-2014-1826,0,0,8fadd52fdad87deb94b57f4092cba9b78cf874b8d5d606f985f54a57d0ac33b5,2024-11-21T02:05:06.217000 +CVE-2014-1827,0,0,7021c468e44a8accab42e0e72277e1e0834136d089f801453d5c300bb075ead4,2024-11-21T02:05:06.370000 +CVE-2014-1828,0,0,2e9f697babbb6a8b3fe7b88ffc7d95ef91b9630df172a998dad937e0217d80d9,2024-11-21T02:05:06.510000 CVE-2014-1829,0,0,11aa5f9ee4e7a2dc539f1072b024c55205a9d514d90d6c630d2482ad982ec767,2016-08-30T17:11:36.150000 CVE-2014-1830,0,0,6c7bea1b56fc362b482a974cfd43ee4b9a481810780c9c3ba408205430886024,2018-10-30T16:27:34.687000 CVE-2014-1831,0,0,f0009534e7e0b6fcc49a8eed3ac4cdf28fcb6eaeece9ec1e9a697107528d009a,2015-02-20T23:56:49.860000 CVE-2014-1832,0,0,5baebc609ec96498e228c93bcdab5fdcfb7ccffabf311785f74f612c273c4fcb,2015-02-20T23:58:35.673000 -CVE-2014-1833,0,1,9bf23f1ffadf18e65b1ebf00132eac0e75218e3a1984f1170dd7635789b66301,2024-11-21T02:05:07.323000 +CVE-2014-1833,0,0,9bf23f1ffadf18e65b1ebf00132eac0e75218e3a1984f1170dd7635789b66301,2024-11-21T02:05:07.323000 CVE-2014-1834,0,0,e9635e92b63989a7df351ed93f0e694f5fe538c13073135330d8a0d30889765b,2018-02-14T15:12:43.563000 CVE-2014-1835,0,0,3ab24a3dd86433d466f4d773d3057086df541ef0f8a6878a792e0ce19455d0ed,2018-02-14T15:12:33.220000 CVE-2014-1836,0,0,b974a9f6b6e6dcd0d7a06fd2fa9e017f13f3dcfcf9c67ba170d1236a06e29d8e,2015-07-02T17:26:16.850000 -CVE-2014-1837,0,1,4011d5af8ae416c16c2ac87855dd92d7a0f3577e47a0debdb6c4eef9f393b2eb,2024-11-21T02:05:07.987000 -CVE-2014-1838,0,1,763cc8a3c86f6f2c17285dcbf7902651c903d3f95ffe26285d65b20e4ec06f05,2024-11-21T02:05:08.137000 -CVE-2014-1839,0,1,b7ba7aec38366751defb314dcbb24fbe53949018383a101bb0d76700f2fd5425,2024-11-21T02:05:08.290000 -CVE-2014-1840,0,1,9cc64b0ce0a5ed7d2d3e320b79a9683fc303820c081610fe44b8e538eb880ab5,2024-11-21T02:05:08.440000 -CVE-2014-1841,0,1,ae4c38da12b8314aaa3b58dce7ff9a0c99ba5651099f4f04c5cb6bde567f3584,2024-11-21T02:05:08.623000 -CVE-2014-1842,0,1,8f6d72e90542f15466a2d3aeb47df8c365f9e6f01ef5666451a34474eaa7a16d,2024-11-21T02:05:08.790000 -CVE-2014-1843,0,1,b2e9e6a8afea51030e8f672eda615821c9e738603107a2a3f6f3ecde2622b56b,2024-11-21T02:05:08.943000 +CVE-2014-1837,0,0,4011d5af8ae416c16c2ac87855dd92d7a0f3577e47a0debdb6c4eef9f393b2eb,2024-11-21T02:05:07.987000 +CVE-2014-1838,0,0,763cc8a3c86f6f2c17285dcbf7902651c903d3f95ffe26285d65b20e4ec06f05,2024-11-21T02:05:08.137000 +CVE-2014-1839,0,0,b7ba7aec38366751defb314dcbb24fbe53949018383a101bb0d76700f2fd5425,2024-11-21T02:05:08.290000 +CVE-2014-1840,0,0,9cc64b0ce0a5ed7d2d3e320b79a9683fc303820c081610fe44b8e538eb880ab5,2024-11-21T02:05:08.440000 +CVE-2014-1841,0,0,ae4c38da12b8314aaa3b58dce7ff9a0c99ba5651099f4f04c5cb6bde567f3584,2024-11-21T02:05:08.623000 +CVE-2014-1842,0,0,8f6d72e90542f15466a2d3aeb47df8c365f9e6f01ef5666451a34474eaa7a16d,2024-11-21T02:05:08.790000 +CVE-2014-1843,0,0,b2e9e6a8afea51030e8f672eda615821c9e738603107a2a3f6f3ecde2622b56b,2024-11-21T02:05:08.943000 CVE-2014-1845,0,0,c15f65aca37691550ed2dcaaa82ceaf3b3fa9aef1ae59586a903d97cf9db9562,2018-06-07T18:03:08.843000 CVE-2014-1846,0,0,89552f502ec7d81a2722794c917be491791cc14e9de19fffb9038b39de8b8cda,2018-06-07T18:08:25.557000 -CVE-2014-1849,0,1,6549e6fbc513d3cc3e35539cfeaf71c8b991e51573610c760ea85e4eba293a18,2024-11-21T02:05:09.437000 +CVE-2014-1849,0,0,6549e6fbc513d3cc3e35539cfeaf71c8b991e51573610c760ea85e4eba293a18,2024-11-21T02:05:09.437000 CVE-2014-1850,0,0,06fc70d90631eaf748c32edb29b19ec13002618f17e6338a146b94d19dbe61a6,2023-11-07T02:19:27.060000 -CVE-2014-1854,0,1,ee360c87483df3f4a5fb52851df145b5e0c181dd298aac2613ad030c7baa389f,2024-11-21T02:05:09.613000 -CVE-2014-1855,0,1,886910413322441f805e4cdc9cb98b3b28d93a80f8e7bd552383489a434ac0c9,2024-11-21T02:05:09.760000 +CVE-2014-1854,0,0,ee360c87483df3f4a5fb52851df145b5e0c181dd298aac2613ad030c7baa389f,2024-11-21T02:05:09.613000 +CVE-2014-1855,0,0,886910413322441f805e4cdc9cb98b3b28d93a80f8e7bd552383489a434ac0c9,2024-11-21T02:05:09.760000 CVE-2014-1858,0,0,1bf3e7c5613c8801370ea77c5209de3c0ccd1ac89f13e7679e85054149b5e5f2,2018-01-30T14:44:16.923000 CVE-2014-1859,0,0,73e543162a4185a960c92ea3b2ae7848d08452dad72c00839bb17acfc5164752,2019-04-22T17:48:00.643000 CVE-2014-1860,0,0,c7ae9e849250521c3235335909a5d9df1ab45aad30e8fe7367b9210d564113a1,2020-01-14T15:19:57.177000 -CVE-2014-1861,0,1,06f8632afb4323f188bf9855833981248712b63f5e0e8829b254b5ea17d3a3b3,2024-11-21T02:05:10.360000 +CVE-2014-1861,0,0,06f8632afb4323f188bf9855833981248712b63f5e0e8829b254b5ea17d3a3b3,2024-11-21T02:05:10.360000 CVE-2014-1867,0,0,b5e225630c041942a58a8fdfeef177be47c9c64cb9b0b7b4800930badd540b21,2019-12-17T20:46:48.897000 CVE-2014-1868,0,0,833da0221ac564a218c2ee3dd7f9496f3e16e1fd453f1bf32773a8905935b9e7,2017-08-29T01:34:27.827000 -CVE-2014-1869,0,1,9ffb07404640c48dba5bfbd811b5c46019f1855032102448efbd11bf8e9db61b,2024-11-21T02:05:10.740000 -CVE-2014-1870,0,1,189215a622adb33348d917f54aa8b26db813f1ef12d465f7329b143add2ee7c7,2024-11-21T02:05:10.883000 -CVE-2014-1874,0,1,7e7281f92bd2f209df6e02029cf6ca1714db140fc856a72bb95b8f19bec18367,2024-11-21T02:05:11.030000 +CVE-2014-1869,0,0,9ffb07404640c48dba5bfbd811b5c46019f1855032102448efbd11bf8e9db61b,2024-11-21T02:05:10.740000 +CVE-2014-1870,0,0,189215a622adb33348d917f54aa8b26db813f1ef12d465f7329b143add2ee7c7,2024-11-21T02:05:10.883000 +CVE-2014-1874,0,0,7e7281f92bd2f209df6e02029cf6ca1714db140fc856a72bb95b8f19bec18367,2024-11-21T02:05:11.030000 CVE-2014-1875,0,0,1adf3e11a29cdec800130df48fec7c25eafe49be33c4353df2e6261463074c7a,2017-08-29T01:34:27.950000 -CVE-2014-1876,0,1,ec002519dc2572536a6fdb5e0121ce756a9b5300bea3ccc2c1ef82278a9bf8a3,2024-11-21T02:05:11.297000 -CVE-2014-1877,0,1,31c50ac9253475461460401bbfe41e2b9d866cf6682bcd1b9b47ab694e3d0738,2024-11-21T02:05:11.480000 -CVE-2014-1878,0,1,0bc521870b84320eb2e86312ff4069f03e1b2991674c9e8a3cee58f87a523424,2024-11-21T02:05:11.617000 -CVE-2014-1879,0,1,b98d5c7ecd813b4e6c9dab65a7a697090762ce1015f4f2e4510b9f57c2b86490,2024-11-21T02:05:11.760000 -CVE-2014-1881,0,1,8faa51b59303a47f50117965471ca5427a7837e7bab7995ce0751050fce50851,2024-11-21T02:05:11.920000 -CVE-2014-1882,0,1,4ed2273d0392224d8ca8da1fe55f0c8c2cec05cd9cd3ed71ddffa11f342be785,2024-11-21T02:05:12.067000 -CVE-2014-1883,0,1,223e97757f2a0d7c5fd0d952f6d2107a15deb88bed2f6f04fcb97d03e944cd0f,2024-11-21T02:05:12.217000 -CVE-2014-1884,0,1,ecd8bc166cea063a505bf9eae05725fb1abd032ade3b5ef03eada042052dc76b,2024-11-21T02:05:12.360000 -CVE-2014-1885,0,1,24cc264807313e9fe3effbf4233bad55c0a865e16d40e0b5f4307478692cad4b,2024-11-21T02:05:12.520000 -CVE-2014-1886,0,1,da2f2d03c0cefbacb052a31b3b5d3f3636b8bb2c0dce78e3aac092db5020fccf,2024-11-21T02:05:12.667000 -CVE-2014-1887,0,1,50ae59ea0c0ea6f9824b0b39cf26232d8d0d5130410722cc5674497bb17eb99c,2024-11-21T02:05:12.803000 -CVE-2014-1888,0,1,1e5df7aa270a77e0b4f1dacc97394e267ed2b8516a592e0664e1d27809a5f7b6,2024-11-21T02:05:12.950000 +CVE-2014-1876,0,0,ec002519dc2572536a6fdb5e0121ce756a9b5300bea3ccc2c1ef82278a9bf8a3,2024-11-21T02:05:11.297000 +CVE-2014-1877,0,0,31c50ac9253475461460401bbfe41e2b9d866cf6682bcd1b9b47ab694e3d0738,2024-11-21T02:05:11.480000 +CVE-2014-1878,0,0,0bc521870b84320eb2e86312ff4069f03e1b2991674c9e8a3cee58f87a523424,2024-11-21T02:05:11.617000 +CVE-2014-1879,0,0,b98d5c7ecd813b4e6c9dab65a7a697090762ce1015f4f2e4510b9f57c2b86490,2024-11-21T02:05:11.760000 +CVE-2014-1881,0,0,8faa51b59303a47f50117965471ca5427a7837e7bab7995ce0751050fce50851,2024-11-21T02:05:11.920000 +CVE-2014-1882,0,0,4ed2273d0392224d8ca8da1fe55f0c8c2cec05cd9cd3ed71ddffa11f342be785,2024-11-21T02:05:12.067000 +CVE-2014-1883,0,0,223e97757f2a0d7c5fd0d952f6d2107a15deb88bed2f6f04fcb97d03e944cd0f,2024-11-21T02:05:12.217000 +CVE-2014-1884,0,0,ecd8bc166cea063a505bf9eae05725fb1abd032ade3b5ef03eada042052dc76b,2024-11-21T02:05:12.360000 +CVE-2014-1885,0,0,24cc264807313e9fe3effbf4233bad55c0a865e16d40e0b5f4307478692cad4b,2024-11-21T02:05:12.520000 +CVE-2014-1886,0,0,da2f2d03c0cefbacb052a31b3b5d3f3636b8bb2c0dce78e3aac092db5020fccf,2024-11-21T02:05:12.667000 +CVE-2014-1887,0,0,50ae59ea0c0ea6f9824b0b39cf26232d8d0d5130410722cc5674497bb17eb99c,2024-11-21T02:05:12.803000 +CVE-2014-1888,0,0,1e5df7aa270a77e0b4f1dacc97394e267ed2b8516a592e0664e1d27809a5f7b6,2024-11-21T02:05:12.950000 CVE-2014-1889,0,0,9674d8bea20dfa73a2ef4aa9538efaa13a9177a00fa7ea9e2a0e3705bbf9d5da,2019-04-26T14:53:03.797000 -CVE-2014-1891,0,1,e011f62dcce8d1fa3c41432e7f833f6dcc1f8c6995aa0c3bfc2f18974eeab682,2024-11-21T02:05:13.267000 -CVE-2014-1892,0,1,f0dfaabe0d9beb8eea424cd7cf016f402244557a17c71dfaf9377705b6e8b0a7,2024-11-21T02:05:13.420000 -CVE-2014-1893,0,1,b17e42eb8d7aaa7c5d1697376b8e3c29677c6dc1bfb2b265165413b61d82a732,2024-11-21T02:05:13.580000 -CVE-2014-1894,0,1,6841fea82799c02d5a937b3409321ae7103ca6b02e9234a656582c4eff485965,2024-11-21T02:05:13.730000 -CVE-2014-1895,0,1,7c8c61005dcda1837945c1ce6a55de4058e6b118bbe9264186e00c7e3a346eda,2024-11-21T02:05:13.880000 -CVE-2014-1896,0,1,2c9c4dd01d886142a78ea2287b3890e12ee65c0ac5943a814a888be7c7af55cf,2024-11-21T02:05:14.020000 -CVE-2014-1899,0,1,b658dff1bc196cd1d020adf0f0caf16997b65202cdb1c301ecb6df5663f9f773,2024-11-21T02:05:14.153000 +CVE-2014-1891,0,0,e011f62dcce8d1fa3c41432e7f833f6dcc1f8c6995aa0c3bfc2f18974eeab682,2024-11-21T02:05:13.267000 +CVE-2014-1892,0,0,f0dfaabe0d9beb8eea424cd7cf016f402244557a17c71dfaf9377705b6e8b0a7,2024-11-21T02:05:13.420000 +CVE-2014-1893,0,0,b17e42eb8d7aaa7c5d1697376b8e3c29677c6dc1bfb2b265165413b61d82a732,2024-11-21T02:05:13.580000 +CVE-2014-1894,0,0,6841fea82799c02d5a937b3409321ae7103ca6b02e9234a656582c4eff485965,2024-11-21T02:05:13.730000 +CVE-2014-1895,0,0,7c8c61005dcda1837945c1ce6a55de4058e6b118bbe9264186e00c7e3a346eda,2024-11-21T02:05:13.880000 +CVE-2014-1896,0,0,2c9c4dd01d886142a78ea2287b3890e12ee65c0ac5943a814a888be7c7af55cf,2024-11-21T02:05:14.020000 +CVE-2014-1899,0,0,b658dff1bc196cd1d020adf0f0caf16997b65202cdb1c301ecb6df5663f9f773,2024-11-21T02:05:14.153000 CVE-2014-1900,0,0,21bdb1b76714e7c0f83be79de045c815b2ebe5a75627d8fae2f6efe8adcb05bf,2015-05-15T13:28:36.887000 CVE-2014-1901,0,0,792aebf0c3c68cc65259578c0114a5a5f4f5127bb9437b54122bbb51ec44ca95,2015-05-15T14:23:14.937000 CVE-2014-1902,0,0,cbe52a6b1864c35f4960967c3ff9178f9b944c48dcf2cefba9b77c3406179f0b,2015-05-15T12:50:23.890000 -CVE-2014-1903,0,1,38807fb8e2c58bf5b48206852c698a3e75191576322bc9722bc0d4bf99f5ac84,2024-11-21T02:05:14.757000 -CVE-2014-1904,0,1,92d69e6768669fd3c0a61f8ba3fcb9a0f03a6be0a5418e1ff56ed014425e4a5f,2024-11-21T02:05:14.907000 +CVE-2014-1903,0,0,38807fb8e2c58bf5b48206852c698a3e75191576322bc9722bc0d4bf99f5ac84,2024-11-21T02:05:14.757000 +CVE-2014-1904,0,0,92d69e6768669fd3c0a61f8ba3fcb9a0f03a6be0a5418e1ff56ed014425e4a5f,2024-11-21T02:05:14.907000 CVE-2014-1905,0,0,83df414fdc03da8d1e8756c99bf8ec101bd3f6e88a1f5e8ec730e74cbc9fd33a,2014-12-30T16:37:00.763000 -CVE-2014-1906,0,1,be2edfdee67fbae2b1e1274d2e2c828c5c2acb1d4599fa1a6f79bb684751001a,2024-11-21T02:05:15.230000 -CVE-2014-1907,0,1,0ffee7c23efce094a11c07e15e64aeb3d77303713aafd28ea14b4fcd34000e2a,2024-11-21T02:05:15.377000 +CVE-2014-1906,0,0,be2edfdee67fbae2b1e1274d2e2c828c5c2acb1d4599fa1a6f79bb684751001a,2024-11-21T02:05:15.230000 +CVE-2014-1907,0,0,0ffee7c23efce094a11c07e15e64aeb3d77303713aafd28ea14b4fcd34000e2a,2024-11-21T02:05:15.377000 CVE-2014-1908,0,0,b06153391e5f43b2329b7e9e2dca83a6ef4fa26e97a5336d8fb31f74a15df1b3,2014-12-30T16:37:26 -CVE-2014-1909,0,1,2d630f0781534521e4cb18ca735bcd1f28f78030cec34b0b1398c640031b624b,2024-11-21T02:05:15.647000 -CVE-2014-1910,0,1,9afc005db7db1532ab3f1599b7bd6a6d7756ffbf62a0c0054c93e040e7a51695,2024-11-21T02:05:15.790000 -CVE-2014-1911,0,1,f86addeb869d8eb1974fe52897c6b41898a0904e508fb79aad7a9658c7dd0a5f,2024-11-21T02:05:15.923000 -CVE-2014-1912,0,1,acc89557ac0e2cfd9f73c80c905b78a8b5dc01f53bcae6f8f3181754ecead843,2024-11-21T02:05:16.030000 -CVE-2014-1914,0,1,17a8c7bddcf0b2c327660c63ed2f31cbdf679afa43b9c4d5328ffc9f5cc10785,2024-11-21T02:05:16.223000 -CVE-2014-1915,0,1,0207105784fac778dddd984866981dfb0c000ba3b0c9e8d365565f3a62e95a51,2024-11-21T02:05:16.370000 -CVE-2014-1916,0,1,db25d52339d7ec98a65a473d613d39992fc4bd4308388b347970bc102c3d46d5,2024-11-21T02:05:16.507000 -CVE-2014-1921,0,1,e37c8e6dcd490ac8e6871035c02c9b078610aeb937228a593ed40b373f95e86b,2024-11-21T02:05:16.640000 +CVE-2014-1909,0,0,2d630f0781534521e4cb18ca735bcd1f28f78030cec34b0b1398c640031b624b,2024-11-21T02:05:15.647000 +CVE-2014-1910,0,0,9afc005db7db1532ab3f1599b7bd6a6d7756ffbf62a0c0054c93e040e7a51695,2024-11-21T02:05:15.790000 +CVE-2014-1911,0,0,f86addeb869d8eb1974fe52897c6b41898a0904e508fb79aad7a9658c7dd0a5f,2024-11-21T02:05:15.923000 +CVE-2014-1912,0,0,acc89557ac0e2cfd9f73c80c905b78a8b5dc01f53bcae6f8f3181754ecead843,2024-11-21T02:05:16.030000 +CVE-2014-1914,0,0,17a8c7bddcf0b2c327660c63ed2f31cbdf679afa43b9c4d5328ffc9f5cc10785,2024-11-21T02:05:16.223000 +CVE-2014-1915,0,0,0207105784fac778dddd984866981dfb0c000ba3b0c9e8d365565f3a62e95a51,2024-11-21T02:05:16.370000 +CVE-2014-1916,0,0,db25d52339d7ec98a65a473d613d39992fc4bd4308388b347970bc102c3d46d5,2024-11-21T02:05:16.507000 +CVE-2014-1921,0,0,e37c8e6dcd490ac8e6871035c02c9b078610aeb937228a593ed40b373f95e86b,2024-11-21T02:05:16.640000 CVE-2014-1922,0,0,4e4c8614c2c980b303069c93141eab5cb2acfca4564d9aa8b75a329f9ebedd7f,2020-01-30T20:39:58.640000 CVE-2014-1923,0,0,1d651fa77504dab8ab15d8d9e3a0013b92e8f981bb7d39445ce5eaabc6325e53,2020-01-30T20:57:37.487000 CVE-2014-1924,0,0,24a333ba7dd9d554bfa9e69793ddc35512e7ad7e3286cf80f5b2cc4aa25f7245,2020-01-30T20:33:08.307000 @@ -66321,62 +66321,62 @@ CVE-2014-1926,0,0,483f9c6e01f5321b5b6e8d2a4c8b4077992efb6bcc9dbdcb63492c4a3da061 CVE-2014-1927,0,0,b2fb6ef5745a2ed4f9660002c05583006137f4bcc39c387c41a9cb8a331132f3,2014-10-29T01:22:44.320000 CVE-2014-1928,0,0,0206b23e2f9172d84886eddfeaee325d5cb77017e8da71d0a90751211d7c784b,2014-10-27T19:24:19.207000 CVE-2014-1929,0,0,e2d22de306b7e5349c367f6c5f3d5b577525c0394af419e332eaf5863ee8ed20,2014-10-27T19:38:10.823000 -CVE-2014-1930,0,1,a3bbc3ce1aaa79cf8e18db255e33ac266413a84db394c52238c94114f6d70dd9,2024-11-21T02:05:17.780000 -CVE-2014-1931,0,1,e8867487e438dfd34a066c199c278bfb683ae0d538aee43b4c8833f863c1d2d0,2024-11-21T02:05:17.923000 -CVE-2014-1932,0,1,8e7458d2aa2e6a4bcf7a10e6055ac21b64156f03dce2eb27ce5af90678f613ee,2024-11-21T02:05:18.057000 -CVE-2014-1933,0,1,5b59dd23cdac1f3fbe3b003d07736de1a5c74541816cf53c4ec816e176fb3220,2024-11-21T02:05:18.207000 -CVE-2014-1934,0,1,2e56f99d76ddd48c02c06b9e2e7434f6ff32289ba5ced4c7cbec3e6903e095b9,2024-11-21T02:05:18.350000 +CVE-2014-1930,0,0,a3bbc3ce1aaa79cf8e18db255e33ac266413a84db394c52238c94114f6d70dd9,2024-11-21T02:05:17.780000 +CVE-2014-1931,0,0,e8867487e438dfd34a066c199c278bfb683ae0d538aee43b4c8833f863c1d2d0,2024-11-21T02:05:17.923000 +CVE-2014-1932,0,0,8e7458d2aa2e6a4bcf7a10e6055ac21b64156f03dce2eb27ce5af90678f613ee,2024-11-21T02:05:18.057000 +CVE-2014-1933,0,0,5b59dd23cdac1f3fbe3b003d07736de1a5c74541816cf53c4ec816e176fb3220,2024-11-21T02:05:18.207000 +CVE-2014-1934,0,0,2e56f99d76ddd48c02c06b9e2e7434f6ff32289ba5ced4c7cbec3e6903e095b9,2024-11-21T02:05:18.350000 CVE-2014-1935,0,0,e3f19410921f69e8d9942bced5374c1959f69e909a1938921888b83e9a1dcecc,2020-08-18T15:05:57.937000 CVE-2014-1936,0,0,1815d463b2b04db13249d9b5b2d089d63bd1765ada0c4844199c0b697f34f3ef,2020-08-18T15:05:57.593000 CVE-2014-1937,0,0,a8fc7d40a2aa7c1bec80fb5ed8ed70f4bc281382b8f80b7ed3bff054531aaf92,2019-11-25T03:47:53.057000 CVE-2014-1938,0,0,ddcacad1a5fe4eda7579673c18cc467d27b3acdd5022a47363deee86d518fc90,2019-11-22T20:18:31.570000 -CVE-2014-1939,0,1,9defe6e7acb8d0ceecd03545af231ec45488b33efb9781d1ce1983764c94607e,2024-11-21T02:05:19.077000 -CVE-2014-1942,0,1,80be123e1bea009366c228ed20742692b97dbd509155de7a9fc262ca268bc34f,2024-11-21T02:05:19.233000 -CVE-2014-1943,0,1,a9ab72f84ecb57df45cdce7bf9ba7fe992d718dfe0ba11a7798fd8a96f7b7f61,2024-11-21T02:05:19.370000 -CVE-2014-1944,0,1,3664f4a30611f7e742cb17998b0b2a21b5d91f0ff3296759197f75dec836e88d,2024-11-21T02:05:19.550000 -CVE-2014-1945,0,1,8ea18cfbb86f849ce6fabb639590d70e4c3c81387aff8d98c5bb746b028ab286,2024-11-21T02:05:19.703000 +CVE-2014-1939,0,0,9defe6e7acb8d0ceecd03545af231ec45488b33efb9781d1ce1983764c94607e,2024-11-21T02:05:19.077000 +CVE-2014-1942,0,0,80be123e1bea009366c228ed20742692b97dbd509155de7a9fc262ca268bc34f,2024-11-21T02:05:19.233000 +CVE-2014-1943,0,0,a9ab72f84ecb57df45cdce7bf9ba7fe992d718dfe0ba11a7798fd8a96f7b7f61,2024-11-21T02:05:19.370000 +CVE-2014-1944,0,0,3664f4a30611f7e742cb17998b0b2a21b5d91f0ff3296759197f75dec836e88d,2024-11-21T02:05:19.550000 +CVE-2014-1945,0,0,8ea18cfbb86f849ce6fabb639590d70e4c3c81387aff8d98c5bb746b028ab286,2024-11-21T02:05:19.703000 CVE-2014-1946,0,0,58dfb9638c44f6b528d0f44d8d704b315a77332488e7e3cbd1d0be9ae8689409,2019-04-26T14:40:49.673000 CVE-2014-1947,0,0,5078dd15f522e5fb950ef5ab5335a38b546829c888171fdb0eb49aad6131a36b,2020-02-21T15:19:13.510000 -CVE-2014-1948,0,1,e174fc1c00d772c0ff28ce96bc1c890553db77786f3a6c1b0188a880768f86a6,2024-11-21T02:05:20.153000 +CVE-2014-1948,0,0,e174fc1c00d772c0ff28ce96bc1c890553db77786f3a6c1b0188a880768f86a6,2024-11-21T02:05:20.153000 CVE-2014-1949,0,0,b120d4225184096c3f631782a9e12c5f3cfadd858af51157ead2d8247464036a,2023-08-03T17:16:13.513000 -CVE-2014-1950,0,1,4e72dfb92cebe5bd5f1a04742ce93d84b8428c4a25e65d023b6fa9921d50ae31,2024-11-21T02:05:20.480000 -CVE-2014-1955,0,1,5db4cc8dff949c50cdd43086823038a7e5ed631a42e6bff9bf69a52e8e5dc6f3,2024-11-21T02:05:20.623000 -CVE-2014-1956,0,1,084867f215fecc2143404da793c74225a152c2732d094d5a14a5c6413d84d4ed,2024-11-21T02:05:20.760000 -CVE-2014-1957,0,1,d34215bc0a3217237b9467896e6bafb7e30a65285be0517386e47addb433fcde,2024-11-21T02:05:20.890000 +CVE-2014-1950,0,0,4e72dfb92cebe5bd5f1a04742ce93d84b8428c4a25e65d023b6fa9921d50ae31,2024-11-21T02:05:20.480000 +CVE-2014-1955,0,0,5db4cc8dff949c50cdd43086823038a7e5ed631a42e6bff9bf69a52e8e5dc6f3,2024-11-21T02:05:20.623000 +CVE-2014-1956,0,0,084867f215fecc2143404da793c74225a152c2732d094d5a14a5c6413d84d4ed,2024-11-21T02:05:20.760000 +CVE-2014-1957,0,0,d34215bc0a3217237b9467896e6bafb7e30a65285be0517386e47addb433fcde,2024-11-21T02:05:20.890000 CVE-2014-1958,0,0,d027635e26aa202e013d13403b3858b1faf0cfac677ebd6a29701bf6b7d92735,2020-02-12T17:09:09.390000 -CVE-2014-1959,0,1,6205d0160b87b8572d99cde0b446b7d83f5844a983a01ddcbd42ce6f4af2d012,2024-11-21T02:05:21.197000 -CVE-2014-1960,0,1,230f865c4652681fe86bc51d83ea0eac3a0ffe3d801ebd8911c8e0dd9c2f861b,2024-11-21T02:05:21.350000 -CVE-2014-1961,0,1,2018894fc887e55b4abe08db004ff731e95096b9383a5a21c75c42ce3826ee02,2024-11-21T02:05:21.497000 -CVE-2014-1962,0,1,aadbfe8188c7fa1ad1c182accb763bf5d89da92daa984f405731726dd528e552,2024-11-21T02:05:21.640000 -CVE-2014-1963,0,1,008f96466dd7ac25388338e36f80428f92c0b7de4319c80c436f5db5f640a231,2024-11-21T02:05:21.787000 -CVE-2014-1964,0,1,656d4db82a2d1b3ba971a0dbe25ca2922ec7117432d71b702d81c9032416e59e,2024-11-21T02:05:21.933000 -CVE-2014-1965,0,1,d078194c2b881ddfe657d494a348f5b5c88e36beef554903920c9bfc4d9ada95,2024-11-21T02:05:22.077000 -CVE-2014-1966,0,1,6e480b53447c9abfc788897f265c2301869f4d8eccd2f0dd972b188b4427f790,2024-11-21T02:05:22.220000 -CVE-2014-1967,0,1,6a5ac885471d6cccc3e0f2cbedaa09c78aca581cab16b1227ab21e668094a195,2024-11-21T02:05:22.367000 -CVE-2014-1968,0,1,5d2df30f102a1dde2d13defd89f97af68bd398387e49b61bebebf1670c22f317,2024-11-21T02:05:22.480000 -CVE-2014-1969,0,1,311280db8a97966e352cb849ac7cabdea1fe97196b7df795b2eb9ce653916312,2024-11-21T02:05:22.597000 -CVE-2014-1970,0,1,bbd25b8dc8313ba6ade3c6d64d67980b780410ed54ee532b17d84dabd925fbdf,2024-11-21T02:05:22.703000 -CVE-2014-1971,0,1,56dc29348015c7665efa0baca2debaa5419dd813fd8a3216af8cb265c9722180,2024-11-21T02:05:22.827000 +CVE-2014-1959,0,0,6205d0160b87b8572d99cde0b446b7d83f5844a983a01ddcbd42ce6f4af2d012,2024-11-21T02:05:21.197000 +CVE-2014-1960,0,0,230f865c4652681fe86bc51d83ea0eac3a0ffe3d801ebd8911c8e0dd9c2f861b,2024-11-21T02:05:21.350000 +CVE-2014-1961,0,0,2018894fc887e55b4abe08db004ff731e95096b9383a5a21c75c42ce3826ee02,2024-11-21T02:05:21.497000 +CVE-2014-1962,0,0,aadbfe8188c7fa1ad1c182accb763bf5d89da92daa984f405731726dd528e552,2024-11-21T02:05:21.640000 +CVE-2014-1963,0,0,008f96466dd7ac25388338e36f80428f92c0b7de4319c80c436f5db5f640a231,2024-11-21T02:05:21.787000 +CVE-2014-1964,0,0,656d4db82a2d1b3ba971a0dbe25ca2922ec7117432d71b702d81c9032416e59e,2024-11-21T02:05:21.933000 +CVE-2014-1965,0,0,d078194c2b881ddfe657d494a348f5b5c88e36beef554903920c9bfc4d9ada95,2024-11-21T02:05:22.077000 +CVE-2014-1966,0,0,6e480b53447c9abfc788897f265c2301869f4d8eccd2f0dd972b188b4427f790,2024-11-21T02:05:22.220000 +CVE-2014-1967,0,0,6a5ac885471d6cccc3e0f2cbedaa09c78aca581cab16b1227ab21e668094a195,2024-11-21T02:05:22.367000 +CVE-2014-1968,0,0,5d2df30f102a1dde2d13defd89f97af68bd398387e49b61bebebf1670c22f317,2024-11-21T02:05:22.480000 +CVE-2014-1969,0,0,311280db8a97966e352cb849ac7cabdea1fe97196b7df795b2eb9ce653916312,2024-11-21T02:05:22.597000 +CVE-2014-1970,0,0,bbd25b8dc8313ba6ade3c6d64d67980b780410ed54ee532b17d84dabd925fbdf,2024-11-21T02:05:22.703000 +CVE-2014-1971,0,0,56dc29348015c7665efa0baca2debaa5419dd813fd8a3216af8cb265c9722180,2024-11-21T02:05:22.827000 CVE-2014-1972,0,0,8efab02fafe4ef91b205d22ee3177ddab11187b5bec71b09ae0cf667fcfa668f,2023-11-07T02:19:28.063000 CVE-2014-1973,0,0,e4da7ac26c73aa12d69a6c1f5431b121d9fec3e05fdc64a2c7d1531c68470529,2015-08-05T16:32:51.010000 -CVE-2014-1974,0,1,a5c4e6663e8a843e56f460fbe54af3c8cf567be735ba588c87740103e99f0251,2024-11-21T02:05:23.213000 -CVE-2014-1975,0,1,2320ce58314b4a0950ac7077313674538efb1a11c6f41a6687a044ec83b9ee24,2024-11-21T02:05:23.340000 -CVE-2014-1976,0,1,b72c7d45980768f20c2362d2848717c55f129d480a1cc126c24d6bec9d1c71ff,2024-11-21T02:05:23.453000 -CVE-2014-1977,0,1,b8efc3af1b0f12b0392ea978629869e2689300157d66e1f4ddf6ec04e57e9411,2024-11-21T02:05:23.580000 -CVE-2014-1978,0,1,0b00d2859162caac232716b234c7702139b76ea4eedccd6962704d9a03eb5bfb,2024-11-21T02:05:23.700000 -CVE-2014-1979,0,1,a8d843025697f12743dee02d52b049fddd2074ba203e327cb5ece19e5eb08557,2024-11-21T02:05:23.817000 +CVE-2014-1974,0,0,a5c4e6663e8a843e56f460fbe54af3c8cf567be735ba588c87740103e99f0251,2024-11-21T02:05:23.213000 +CVE-2014-1975,0,0,2320ce58314b4a0950ac7077313674538efb1a11c6f41a6687a044ec83b9ee24,2024-11-21T02:05:23.340000 +CVE-2014-1976,0,0,b72c7d45980768f20c2362d2848717c55f129d480a1cc126c24d6bec9d1c71ff,2024-11-21T02:05:23.453000 +CVE-2014-1977,0,0,b8efc3af1b0f12b0392ea978629869e2689300157d66e1f4ddf6ec04e57e9411,2024-11-21T02:05:23.580000 +CVE-2014-1978,0,0,0b00d2859162caac232716b234c7702139b76ea4eedccd6962704d9a03eb5bfb,2024-11-21T02:05:23.700000 +CVE-2014-1979,0,0,a8d843025697f12743dee02d52b049fddd2074ba203e327cb5ece19e5eb08557,2024-11-21T02:05:23.817000 CVE-2014-1980,0,0,7c98d4fd65573b1a1289b594186c01e8811cd31ecf84b271a37889dc634667a2,2014-08-14T14:41:44.180000 CVE-2014-1981,0,0,7ba3a1998873527810f42df04f63772df7d59c8eaf68b0ba7115b3c01cdee8ad,2023-11-07T02:19:28.197000 -CVE-2014-1982,0,1,034e50faeed7b3f84000475af2510264533815be65ae765d91e2fb3466d17048,2024-11-21T02:05:24.060000 -CVE-2014-1983,0,1,d3f8484699e4056ae3a6b6d29b8afb1151d3b4d60c36d6ad4510a81aff2fa90f,2024-11-21T02:05:24.177000 -CVE-2014-1984,0,1,667c1291451050943f365aa46c1df6380b283b6bcf88b304d0227868ba3f7bca,2024-11-21T02:05:24.293000 -CVE-2014-1985,0,1,292493085878c7bdce68bca0508fd0e5f43fc9402899b02f555d781a2fff7fc0,2024-11-21T02:05:24.407000 -CVE-2014-1986,0,1,525ab8f0862e1e710490dd01b6f2b64e1ac0888035d6c218b55f8d7891d7330b,2024-11-21T02:05:24.527000 +CVE-2014-1982,0,0,034e50faeed7b3f84000475af2510264533815be65ae765d91e2fb3466d17048,2024-11-21T02:05:24.060000 +CVE-2014-1983,0,0,d3f8484699e4056ae3a6b6d29b8afb1151d3b4d60c36d6ad4510a81aff2fa90f,2024-11-21T02:05:24.177000 +CVE-2014-1984,0,0,667c1291451050943f365aa46c1df6380b283b6bcf88b304d0227868ba3f7bca,2024-11-21T02:05:24.293000 +CVE-2014-1985,0,0,292493085878c7bdce68bca0508fd0e5f43fc9402899b02f555d781a2fff7fc0,2024-11-21T02:05:24.407000 +CVE-2014-1986,0,0,525ab8f0862e1e710490dd01b6f2b64e1ac0888035d6c218b55f8d7891d7330b,2024-11-21T02:05:24.527000 CVE-2014-1987,0,0,eefe25ab80f12560eafbc1fa1b44163987b22ab0cc0f2eceeac50fb758e93c66,2014-08-04T19:00:28.017000 -CVE-2014-1988,0,1,8dbb7fc875027ac5e3b9d6fdd105de18ed96d003256ee262487f35b65acf5631,2024-11-21T02:05:24.750000 -CVE-2014-1989,0,1,96702cda8eab0ee263d6a1a6deba05f0a563323a875aa5e83c78faf5efd2fb54,2024-11-21T02:05:24.867000 -CVE-2014-1990,0,1,8344f10b18cb18eaf874d12601aae7fd53b6b29e19edc77c1749e89c1af055be,2024-11-21T02:05:24.973000 -CVE-2014-1991,0,1,f92cf852a470c9acc2984fd47049fa7e0aa61061b96cee5db8a2db343e129107,2024-11-21T02:05:25.087000 +CVE-2014-1988,0,0,8dbb7fc875027ac5e3b9d6fdd105de18ed96d003256ee262487f35b65acf5631,2024-11-21T02:05:24.750000 +CVE-2014-1989,0,0,96702cda8eab0ee263d6a1a6deba05f0a563323a875aa5e83c78faf5efd2fb54,2024-11-21T02:05:24.867000 +CVE-2014-1990,0,0,8344f10b18cb18eaf874d12601aae7fd53b6b29e19edc77c1749e89c1af055be,2024-11-21T02:05:24.973000 +CVE-2014-1991,0,0,f92cf852a470c9acc2984fd47049fa7e0aa61061b96cee5db8a2db343e129107,2024-11-21T02:05:25.087000 CVE-2014-1992,0,0,8c7a653bcfd9dfb7c3ecfee8e237139a870f2608b8b30ef35e43f55e79bf82c6,2014-07-22T22:59:10.570000 CVE-2014-1993,0,0,bcbb00b9bb839b2cfbbd31deeecce02e6f55ba17a1f2cded221e79517edcbf68,2014-08-04T18:38:49.797000 CVE-2014-1994,0,0,af107e592ec9910e6968e423878cb8e4b056ada5d5d80917fe10a7a988a20b7a,2014-07-23T18:55:20.803000 @@ -66394,18 +66394,18 @@ CVE-2014-2005,0,0,61acdd27345c8c4ce980b2193a4e58b5eb244e15c499b2dfaaff4732df2446 CVE-2014-2006,0,0,95e48ab60541bb8ee44cf065d63a7a86d57def9e9d331b0eb08fc116964fab29,2014-06-30T14:39:55.677000 CVE-2014-2008,0,0,32bc6df877855308bde7cb28f764b177e1d0b9c68752bdbb23a28453505d6db3,2017-08-29T01:34:28.903000 CVE-2014-2009,0,0,be8e59008e405f0f37e09c19e70bd57023d30d6ff24f0723467b735add75f729,2017-08-29T01:34:28.967000 -CVE-2014-2013,0,1,a286cd5824eb97e80a230d172d16863a4d6edf96d3d4a5ec3b24bbd7caf68142,2024-11-21T02:05:27.300000 -CVE-2014-2014,0,1,73a6f41f9b9bd3a6f80c197201f8cc168e8e982db1b9a9575e51056ce1228e29,2024-11-21T02:05:27.457000 +CVE-2014-2013,0,0,a286cd5824eb97e80a230d172d16863a4d6edf96d3d4a5ec3b24bbd7caf68142,2024-11-21T02:05:27.300000 +CVE-2014-2014,0,0,73a6f41f9b9bd3a6f80c197201f8cc168e8e982db1b9a9575e51056ce1228e29,2024-11-21T02:05:27.457000 CVE-2014-2015,0,0,6dfd281c8a4259d233e85446384a317ad479f25e48fac6c1a0e6a99b61516f3a,2018-01-05T02:29:49.103000 -CVE-2014-2016,0,1,896523a2c88c2bb2e344e56a651e6207c20196e5d65c752e22ffe60842676387,2024-11-21T02:05:27.770000 +CVE-2014-2016,0,0,896523a2c88c2bb2e344e56a651e6207c20196e5d65c752e22ffe60842676387,2024-11-21T02:05:27.770000 CVE-2014-2017,0,0,9aaf3373948dffe23cdb79aa44320a4a4a014a15c4e1dc1f9e7a62782013aa18,2018-02-06T17:28:57.800000 -CVE-2014-2018,0,1,9cc8ea93f7d58fa8936b33365542ef07f82c9e9c315c023d844f47a8d4ff794c,2024-11-21T02:05:28.063000 -CVE-2014-2019,0,1,5bb6c69dea96525737d518038118f4aa676bafa3af24871b97e8c375d32a7bf2,2024-11-21T02:05:28.233000 -CVE-2014-2020,0,1,f43b436dd75301478bd1272dd93f52b6e58832544afbe8464bb38c2f0d79643e,2024-11-21T02:05:28.373000 +CVE-2014-2018,0,0,9cc8ea93f7d58fa8936b33365542ef07f82c9e9c315c023d844f47a8d4ff794c,2024-11-21T02:05:28.063000 +CVE-2014-2019,0,0,5bb6c69dea96525737d518038118f4aa676bafa3af24871b97e8c375d32a7bf2,2024-11-21T02:05:28.233000 +CVE-2014-2020,0,0,f43b436dd75301478bd1272dd93f52b6e58832544afbe8464bb38c2f0d79643e,2024-11-21T02:05:28.373000 CVE-2014-2021,0,0,70c6e48941f926a4e62ec3daa9b6120468c76cc8dafdc6cf42ac7816b7b96956,2017-08-29T01:34:29.047000 CVE-2014-2022,0,0,04f59f337a35910d7eeb67389ca9fe51438c3474146536a14c6165067e6530e9,2015-08-13T18:04:01.727000 CVE-2014-2023,0,0,449ee756050f14a65b9f885c594e27becd56a88a8d68f6e61f5ead254917b81a,2017-11-15T20:34:34.637000 -CVE-2014-2024,0,1,263fe55a79eeced1f60f3cbf8b34acfc4f6dbd62ed594421252f80031bac2260,2024-11-21T02:05:28.983000 +CVE-2014-2024,0,0,263fe55a79eeced1f60f3cbf8b34acfc4f6dbd62ed594421252f80031bac2260,2024-11-21T02:05:28.983000 CVE-2014-2025,0,0,2e71926d4ee84fdb7bcf75c73deb2709614687992ea69e8ede4a8e4dee7fd1f8,2020-02-13T21:53:47.410000 CVE-2014-2026,0,0,acae4a1dbac01a82b6048cacc853333f3fc43b8c8b555069f4d7d3fbf134a4b3,2018-10-09T19:43:05.877000 CVE-2014-2027,0,0,0375d678727b79a1e7ca56c45e48ed90e0c88362d4e053e473163073f36f75f4,2017-11-14T02:29:00.220000 @@ -66413,21 +66413,21 @@ CVE-2014-2029,0,0,31d5a57fba99c8cc5ac7c11d01e9d08f570ff5001bf39c8c24103715ffee19 CVE-2014-2030,0,0,91fd3bf9bc4132d0de3984a8b7259ed03d4bc5d7c52c0d23542d0470452808ca,2020-02-11T15:18:49.547000 CVE-2014-2031,0,0,af0c7b63a29789b81cc15414437741a734977006aff711ecbbacdf3042d97649,2018-04-18T18:25:32.270000 CVE-2014-2032,0,0,fd27501e0a401dc58e3a68533860f9101742ffe9f2c50befdc95866d8dc4e343,2018-04-18T18:25:58.567000 -CVE-2014-2033,0,1,d90afad17c727427ce1a5f57e20768a89822ca98b950f384b8f42a7dcc5dc825,2024-11-21T02:05:30.180000 -CVE-2014-2034,0,1,4e643a15c50b9e809ad4ebfe32adc6775c039672b801fa6dc365c18865dca704,2024-11-21T02:05:30.323000 -CVE-2014-2035,0,1,20f032ff491f74e27fcfccd1e630faac1f76e24cef01ee911c38a815eb868e41,2024-11-21T02:05:30.470000 +CVE-2014-2033,0,0,d90afad17c727427ce1a5f57e20768a89822ca98b950f384b8f42a7dcc5dc825,2024-11-21T02:05:30.180000 +CVE-2014-2034,0,0,4e643a15c50b9e809ad4ebfe32adc6775c039672b801fa6dc365c18865dca704,2024-11-21T02:05:30.323000 +CVE-2014-2035,0,0,20f032ff491f74e27fcfccd1e630faac1f76e24cef01ee911c38a815eb868e41,2024-11-21T02:05:30.470000 CVE-2014-2037,0,0,9bb42867d1a6d50715492831a64ee3599222e391dc01df00f97e04c5a654e0e5,2019-07-29T13:26:45.483000 -CVE-2014-2038,0,1,d6b9773e0295f43633a60ae6aa3e96e6e695b2463da5b8298c9586eb9372850e,2024-11-21T02:05:30.780000 -CVE-2014-2039,0,1,719ea4372707e967c9370ae316019e3e9cbca17d14b6082115269bd54aca0a10,2024-11-21T02:05:30.897000 -CVE-2014-2040,0,1,e2e61d80c7f7dcc7cc5e1161e2dfbcc2542b5462585ddfe0cce614a5aec94ac5,2024-11-21T02:05:31.017000 -CVE-2014-2042,0,1,7662cbeef61c69501a2c5b3c0156d07f186fba4ebcef52257ea50c72aae01aac,2024-11-21T02:05:31.157000 -CVE-2014-2043,0,1,9567f21d408d1eda0644745caac432d2d24030b4d6a56a58af5d8241c57a9656,2024-11-21T02:05:31.303000 +CVE-2014-2038,0,0,d6b9773e0295f43633a60ae6aa3e96e6e695b2463da5b8298c9586eb9372850e,2024-11-21T02:05:30.780000 +CVE-2014-2039,0,0,719ea4372707e967c9370ae316019e3e9cbca17d14b6082115269bd54aca0a10,2024-11-21T02:05:30.897000 +CVE-2014-2040,0,0,e2e61d80c7f7dcc7cc5e1161e2dfbcc2542b5462585ddfe0cce614a5aec94ac5,2024-11-21T02:05:31.017000 +CVE-2014-2042,0,0,7662cbeef61c69501a2c5b3c0156d07f186fba4ebcef52257ea50c72aae01aac,2024-11-21T02:05:31.157000 +CVE-2014-2043,0,0,9567f21d408d1eda0644745caac432d2d24030b4d6a56a58af5d8241c57a9656,2024-11-21T02:05:31.303000 CVE-2014-2044,0,0,816650949b51ccded17000d28384e524489a3919c7f2195affa574de815300b5,2018-10-09T19:43:07.360000 CVE-2014-2045,0,0,74a9f7d446025749349fb7cc87f1c643389faf788cf98a468ff07585a7ca3e7c,2018-10-09T19:43:08.283000 -CVE-2014-2046,0,1,cdb3862a0ee7e7cd33d4a5a746c97f4324dc44cf5be4ffb60fa66818c9f260fa,2024-11-21T02:05:31.770000 -CVE-2014-2047,0,1,07ad2efefa4c37e83f89604375037dd242da1194b335786df826498aac93ac5a,2024-11-21T02:05:31.907000 +CVE-2014-2046,0,0,cdb3862a0ee7e7cd33d4a5a746c97f4324dc44cf5be4ffb60fa66818c9f260fa,2024-11-21T02:05:31.770000 +CVE-2014-2047,0,0,07ad2efefa4c37e83f89604375037dd242da1194b335786df826498aac93ac5a,2024-11-21T02:05:31.907000 CVE-2014-2048,0,0,4a1111b76a2e0ca6553970ad7c7f4c0e60d8019281a6ea7ca389f335b890a089,2018-06-13T15:05:57.873000 -CVE-2014-2049,0,1,7cad1f77e10b279a3174a92b11493081dbce5c718dbfe7dc2a831b6add9319df,2024-11-21T02:05:32.203000 +CVE-2014-2049,0,0,7cad1f77e10b279a3174a92b11493081dbce5c718dbfe7dc2a831b6add9319df,2024-11-21T02:05:32.203000 CVE-2014-2050,0,0,89cf88f0a90b8eafc42d203b014a17ddc739b1b8cc963bbdc3485529cb4e789b,2020-01-29T20:48:24.020000 CVE-2014-2051,0,0,a9df75cb4dd703999e746312421a104483adba5426f0b7badc7373f6464f0717,2014-06-24T15:38:14.077000 CVE-2014-2052,0,0,a4d2ec2c4acb782bd33ba368265e092c33dcd37d4215485c25b2f3d7368fe7e0,2020-02-12T20:17:41.847000 @@ -66435,9 +66435,9 @@ CVE-2014-2053,0,0,711c08ba27f2ae4c56dcf1dda4349ccc836fe264920958b19e2ae6bc5bceac CVE-2014-2054,0,0,9fed1d773d213dd215db93b26d9c0b49db4879d4d8d4f8da7e269c414a7b8e61,2014-06-04T18:34:17.347000 CVE-2014-2055,0,0,0949e3d6542ae1d1f493dcfee536a7ce192462e44d831e90eff60da67a36c7c9,2014-06-04T18:38:42.047000 CVE-2014-2056,0,0,1aaaf0d2711eb71e1074eb82edb27beb411155432e101291e2dbb3acea309f6c,2014-06-04T18:41:09.427000 -CVE-2014-2057,0,1,1f2bef30295319f2f2668ee231eca35c162214e9875703a6e04c55dccdff47a3,2024-11-21T02:05:33.470000 +CVE-2014-2057,0,0,1f2bef30295319f2f2668ee231eca35c162214e9875703a6e04c55dccdff47a3,2024-11-21T02:05:33.470000 CVE-2014-2058,0,0,1e99bbb2d95f7ce083e72a596352b0311b5c72f1076a07b7217d25a811dc87b3,2016-06-13T23:32:02.143000 -CVE-2014-2059,0,1,841983d05f36f699eab3cf2ba85aab2fa3e5514b0a3807ecaa2458fd010b098f,2024-11-21T02:05:33.750000 +CVE-2014-2059,0,0,841983d05f36f699eab3cf2ba85aab2fa3e5514b0a3807ecaa2458fd010b098f,2024-11-21T02:05:33.750000 CVE-2014-2060,0,0,2ef40b55747366c8e06f6d913205f5ae8fe5b4c115d861ac3f90c9b9e42cbdc6,2016-06-13T23:34:05.800000 CVE-2014-2061,0,0,f48c3fb03c7beb3c67a14c80dcded7bc52b6be5d9e368942d099fa73cbb2cca7,2016-06-13T23:35:32.657000 CVE-2014-2062,0,0,667a64396ed624bc1947c45f225bc5e71a056c9c1e3b2a62f3719471b2b56492,2016-06-13T23:36:16.333000 @@ -66445,74 +66445,74 @@ CVE-2014-2063,0,0,ea11e48d0d95100162db7830ea794cc41b2524d540cde0f70bbfe03fec3e5b CVE-2014-2064,0,0,c7a53f4d1bf774794a44f149538127244c1b50b4dc9678d7d2786c49644fa8b0,2016-06-13T23:38:15.677000 CVE-2014-2065,0,0,8cfaec290f32de7e8b9d437d1db85f42d6f91f83038ada24d18302fe482aee01,2016-06-13T23:39:15.623000 CVE-2014-2066,0,0,1af1d91e89c50bfc2e7c1a5575137ef4417fc520d65d3fe84cf46c374c1b596d,2016-06-13T23:40:17.913000 -CVE-2014-2067,0,1,78029c02df98586c7a281c5798e9ac70d9ac18ad6cc754c01fe8a025d91e3fbf,2024-11-21T02:05:34.743000 +CVE-2014-2067,0,0,78029c02df98586c7a281c5798e9ac70d9ac18ad6cc754c01fe8a025d91e3fbf,2024-11-21T02:05:34.743000 CVE-2014-2068,0,0,8733ffed26afb385c229c1b0b89d1b963e87a85714f419bfb0603bee6b754926,2016-06-13T23:43:23.127000 CVE-2014-2069,0,0,848a59c56740becf7d2ebcd8f271fe5e400c2171c8460c3675dc1f918e91943c,2018-05-21T17:30:43.487000 CVE-2014-2071,0,0,231f3218e72778c1f40e948b73f8216621891a7bd613e32d4c900b0bfb7b7747,2018-01-31T15:15:11.897000 CVE-2014-2072,0,0,027ee3ef888d0800b1152e660a3a17aed95f723c502e54abaa504833cda9ccc8,2020-01-17T15:24:16.410000 CVE-2014-2073,0,0,527414ed1a5644f036b2b9d7a335077cc42e4a25163de3566e2c83b7b204fda2,2021-09-13T10:51:28.957000 -CVE-2014-2075,0,1,6ebecc88fb0eb72e7a6909b555ed8c94826a62d0a820fb1a690e77ab96230456,2024-11-21T02:05:35.587000 -CVE-2014-2077,0,1,afd6dbe2179807cc99f3e29a7b08099e3e5e787adbcd37c9b65278e8f3ea1c8d,2024-11-21T02:05:35.793000 +CVE-2014-2075,0,0,6ebecc88fb0eb72e7a6909b555ed8c94826a62d0a820fb1a690e77ab96230456,2024-11-21T02:05:35.587000 +CVE-2014-2077,0,0,afd6dbe2179807cc99f3e29a7b08099e3e5e787adbcd37c9b65278e8f3ea1c8d,2024-11-21T02:05:35.793000 CVE-2014-2078,0,0,01eb51a6369808b151ee530555f2f240b883779f8cd6251cfdbfa476da46d1f5,2019-04-26T14:38:31.233000 CVE-2014-2079,0,0,e061d855e85891f3dd7d369b21c8086b8538dc9fe224916a350027dfa07c2b77,2018-09-15T12:31:06.393000 -CVE-2014-2080,0,1,76916f69153ce86c288cfc37fed4c6c221a7592e503ae19da654e5b4138a6071,2024-11-21T02:05:36.240000 +CVE-2014-2080,0,0,76916f69153ce86c288cfc37fed4c6c221a7592e503ae19da654e5b4138a6071,2024-11-21T02:05:36.240000 CVE-2014-2081,0,0,067301fbfea66b71a55fad0eb54addb923e92d6f81b315e5e203420f7b09b36f,2015-01-26T17:33:46.823000 -CVE-2014-2084,0,1,e5b3eb84fcb9e85126a59df03cd2303ab13dbd1906c5cb3895815ce91e8a6bb0,2024-11-21T02:05:36.543000 +CVE-2014-2084,0,0,e5b3eb84fcb9e85126a59df03cd2303ab13dbd1906c5cb3895815ce91e8a6bb0,2024-11-21T02:05:36.543000 CVE-2014-2085,0,0,7ec86afee29e8bf2bfec0aa0386d90c95aa9b606ff8024421b6a80d9c5d77acb,2023-11-07T02:19:29.183000 -CVE-2014-2087,0,1,6e00a8c689429b6694fe083485041cc3b04cdc79347f277633ae6d6fc6261bc6,2024-11-21T02:05:36.723000 -CVE-2014-2088,0,1,73304f937b7d5287b2ba5d0ed5f82a0901ac0e2ab6604ea125c308a31e49bb8f,2024-11-21T02:05:36.873000 -CVE-2014-2089,0,1,45ec00f03698c3f01085eaa5a0ac4ce78d4aa045803961872d68680b3b18fda8,2024-11-21T02:05:37.013000 -CVE-2014-2090,0,1,0727b18fc7a7c898e552365186f0ebeb99ca1ce072ca7c07c7df7f2af877f9d2,2024-11-21T02:05:37.170000 -CVE-2014-2091,0,1,85f51701499d734dbbd0f20049e5d2825e04f1ce317943c861f2f88f9675a1c8,2024-11-21T02:05:38.150000 -CVE-2014-2092,0,1,0a3610c427b357c771557afbec52ff3953f705ecb7bae4fe5e45aff2cd7dfe7e,2024-11-21T02:05:38.370000 -CVE-2014-2093,0,1,e86b1fdbc8d46c9b8d01b385fbef1773b1512af7a717da3bd679c659cd46a559,2024-11-21T02:05:38.510000 -CVE-2014-2094,0,1,168f418e9494507c2836c53aa9cb2db4e7f3a97af9ea4df3d0c980542543da8f,2024-11-21T02:05:38.650000 -CVE-2014-2095,0,1,9b46f6c06f54beced53e733c82d71eeb8573f3e48a908d7192356fc6c34f7e17,2024-11-21T02:05:38.797000 -CVE-2014-2096,0,1,621194c9806acf2dd176108ff499d640c3599816ae082f91ff8137eed2dc1120,2024-11-21T02:05:38.940000 -CVE-2014-2097,0,1,5bbc635214e0cfabfd07e78e2d1653c419e55f34fbbeba2116da9bbea25bd01e,2024-11-21T02:05:39.090000 -CVE-2014-2098,0,1,cb2017cf595ff01d118275bd95ced8856400f5d26e6915aa39a2b02ac867d453,2024-11-21T02:05:39.237000 -CVE-2014-2099,0,1,1ac664acf5026d72a37a7918101a0f288d9490e86a4071cdcadab40e7c72cd54,2024-11-21T02:05:39.380000 -CVE-2014-2102,0,1,65de1458d5d224d5e1ea06dc2abfe1c008f46bc9fd5cb416146d80b56f8c27cb,2024-11-21T02:05:39.520000 -CVE-2014-2103,0,1,d8bcfc70f717193a436714de71deb7b33cf3224369104a2698f83e4d7db2166b,2024-11-21T02:05:39.637000 -CVE-2014-2104,0,1,601ea375fc2ec3871241025e57a907850b70049dfd00b5d627ab45cc7dc7c0e6,2024-11-21T02:05:39.750000 -CVE-2014-2106,0,1,5d0e950c69ab7be9bd1996ab8624f9b7b3e41d3574230b08399f3ec6f3323ff2,2024-11-21T02:05:39.867000 -CVE-2014-2107,0,1,51c6f25988d3a9ffffd480a0f5e0d94a8a3ea6bc42914940ce6017d2308f6403,2024-11-21T02:05:39.980000 -CVE-2014-2108,0,1,4285fe6c8b16c8b968f292ce70a2b0b27ad5389408f6ca9494ac6172068c040c,2024-11-21T02:05:40.100000 -CVE-2014-2109,0,1,6c7f1f83ebd30c91285b28127fe40c41cf542f772cd5490058bab2636624e93f,2024-11-21T02:05:40.227000 -CVE-2014-2111,0,1,b9de2b0a176d5e812b2dd335c0e1339f4d555566375f3b1d993ae329b8f5be32,2024-11-21T02:05:40.357000 -CVE-2014-2112,0,1,de299fa6e2766ba669f72caea165b4f78467eb05b45eb3f556ebf2845eb367ce,2024-11-21T02:05:40.467000 -CVE-2014-2113,0,1,392d066a8f200eb8406763ee82e9c30b41bf021d55c5e2447012d2ab8d4f2953,2024-11-21T02:05:40.570000 -CVE-2014-2114,0,1,2ba036e9996d5987b4e90ec6fc9b6b37985c180119bea87c1429e925047ecb29,2024-11-21T02:05:40.683000 -CVE-2014-2115,0,1,2c6b5be06f2b2d67f43bee875e0d209092d7f33de12675290b29b0262ce03c2c,2024-11-21T02:05:40.880000 -CVE-2014-2116,0,1,6f6e64fa862183c39e2ee3524a3332e5c2be2ae960515e4cbe722daf259f49c0,2024-11-21T02:05:41.003000 -CVE-2014-2117,0,1,14ca7b94ab5e194a7a0e67780243b575f3fc476fdb9f06d49c2a808d7513489f,2024-11-21T02:05:41.123000 -CVE-2014-2118,0,1,4926f204adf93705556456a16094ea7e5f005bab0f98e34162a231c762a1e056,2024-11-21T02:05:41.240000 -CVE-2014-2119,0,1,dc2dddd76b5f8970ddd02b94ae3c8b8e0dd7f152576a865317adac6ac03cf07f,2024-11-21T02:05:41.360000 -CVE-2014-2120,0,1,88c4e54710ab266da7d3d5562640312d99277a7210f2759e3cb33d6dba42d010,2024-11-21T02:05:41.473000 -CVE-2014-2121,0,1,7bc5f937f6d47fab927eb917cd3222902ebb4bd2a4020f993f8f5524246736de,2024-11-21T02:05:41.687000 -CVE-2014-2122,0,1,80c21daa9cf21e4e21f28ffc92328b4856905de0cde0698e11cf26cbe853b2fb,2024-11-21T02:05:41.800000 -CVE-2014-2124,0,1,f42abc8badf83bfa69d79669302c968533c7133acd8e2e60a2ef49a8f7ba19f9,2024-11-21T02:05:41.920000 -CVE-2014-2125,0,1,1a256de24d36fabcf1d9b1d25b865b9248e539c4db627e897a2bbbfa701d0292,2024-11-21T02:05:42.047000 -CVE-2014-2126,0,1,3fac9d8ffa3b2b9d503f7cf2d9aa947850498db1354680d069cfffc163267548,2024-11-21T02:05:42.160000 -CVE-2014-2127,0,1,9104d7b800301272eada00cbeb953a01e8255759fad1d4ad7382e971e3fe0c26,2024-11-21T02:05:42.273000 -CVE-2014-2128,0,1,7dc6968d6432b48d72c1227b50abf40ef923e9b497a708181281bdccffd5a0bb,2024-11-21T02:05:42.387000 -CVE-2014-2129,0,1,ebc51afe3c148028bb1b7985b8f46307ad2b884073f1956daa5d4bd34fb1e388,2024-11-21T02:05:42.507000 +CVE-2014-2087,0,0,6e00a8c689429b6694fe083485041cc3b04cdc79347f277633ae6d6fc6261bc6,2024-11-21T02:05:36.723000 +CVE-2014-2088,0,0,73304f937b7d5287b2ba5d0ed5f82a0901ac0e2ab6604ea125c308a31e49bb8f,2024-11-21T02:05:36.873000 +CVE-2014-2089,0,0,45ec00f03698c3f01085eaa5a0ac4ce78d4aa045803961872d68680b3b18fda8,2024-11-21T02:05:37.013000 +CVE-2014-2090,0,0,0727b18fc7a7c898e552365186f0ebeb99ca1ce072ca7c07c7df7f2af877f9d2,2024-11-21T02:05:37.170000 +CVE-2014-2091,0,0,85f51701499d734dbbd0f20049e5d2825e04f1ce317943c861f2f88f9675a1c8,2024-11-21T02:05:38.150000 +CVE-2014-2092,0,0,0a3610c427b357c771557afbec52ff3953f705ecb7bae4fe5e45aff2cd7dfe7e,2024-11-21T02:05:38.370000 +CVE-2014-2093,0,0,e86b1fdbc8d46c9b8d01b385fbef1773b1512af7a717da3bd679c659cd46a559,2024-11-21T02:05:38.510000 +CVE-2014-2094,0,0,168f418e9494507c2836c53aa9cb2db4e7f3a97af9ea4df3d0c980542543da8f,2024-11-21T02:05:38.650000 +CVE-2014-2095,0,0,9b46f6c06f54beced53e733c82d71eeb8573f3e48a908d7192356fc6c34f7e17,2024-11-21T02:05:38.797000 +CVE-2014-2096,0,0,621194c9806acf2dd176108ff499d640c3599816ae082f91ff8137eed2dc1120,2024-11-21T02:05:38.940000 +CVE-2014-2097,0,0,5bbc635214e0cfabfd07e78e2d1653c419e55f34fbbeba2116da9bbea25bd01e,2024-11-21T02:05:39.090000 +CVE-2014-2098,0,0,cb2017cf595ff01d118275bd95ced8856400f5d26e6915aa39a2b02ac867d453,2024-11-21T02:05:39.237000 +CVE-2014-2099,0,0,1ac664acf5026d72a37a7918101a0f288d9490e86a4071cdcadab40e7c72cd54,2024-11-21T02:05:39.380000 +CVE-2014-2102,0,0,65de1458d5d224d5e1ea06dc2abfe1c008f46bc9fd5cb416146d80b56f8c27cb,2024-11-21T02:05:39.520000 +CVE-2014-2103,0,0,d8bcfc70f717193a436714de71deb7b33cf3224369104a2698f83e4d7db2166b,2024-11-21T02:05:39.637000 +CVE-2014-2104,0,0,601ea375fc2ec3871241025e57a907850b70049dfd00b5d627ab45cc7dc7c0e6,2024-11-21T02:05:39.750000 +CVE-2014-2106,0,0,5d0e950c69ab7be9bd1996ab8624f9b7b3e41d3574230b08399f3ec6f3323ff2,2024-11-21T02:05:39.867000 +CVE-2014-2107,0,0,51c6f25988d3a9ffffd480a0f5e0d94a8a3ea6bc42914940ce6017d2308f6403,2024-11-21T02:05:39.980000 +CVE-2014-2108,0,0,4285fe6c8b16c8b968f292ce70a2b0b27ad5389408f6ca9494ac6172068c040c,2024-11-21T02:05:40.100000 +CVE-2014-2109,0,0,6c7f1f83ebd30c91285b28127fe40c41cf542f772cd5490058bab2636624e93f,2024-11-21T02:05:40.227000 +CVE-2014-2111,0,0,b9de2b0a176d5e812b2dd335c0e1339f4d555566375f3b1d993ae329b8f5be32,2024-11-21T02:05:40.357000 +CVE-2014-2112,0,0,de299fa6e2766ba669f72caea165b4f78467eb05b45eb3f556ebf2845eb367ce,2024-11-21T02:05:40.467000 +CVE-2014-2113,0,0,392d066a8f200eb8406763ee82e9c30b41bf021d55c5e2447012d2ab8d4f2953,2024-11-21T02:05:40.570000 +CVE-2014-2114,0,0,2ba036e9996d5987b4e90ec6fc9b6b37985c180119bea87c1429e925047ecb29,2024-11-21T02:05:40.683000 +CVE-2014-2115,0,0,2c6b5be06f2b2d67f43bee875e0d209092d7f33de12675290b29b0262ce03c2c,2024-11-21T02:05:40.880000 +CVE-2014-2116,0,0,6f6e64fa862183c39e2ee3524a3332e5c2be2ae960515e4cbe722daf259f49c0,2024-11-21T02:05:41.003000 +CVE-2014-2117,0,0,14ca7b94ab5e194a7a0e67780243b575f3fc476fdb9f06d49c2a808d7513489f,2024-11-21T02:05:41.123000 +CVE-2014-2118,0,0,4926f204adf93705556456a16094ea7e5f005bab0f98e34162a231c762a1e056,2024-11-21T02:05:41.240000 +CVE-2014-2119,0,0,dc2dddd76b5f8970ddd02b94ae3c8b8e0dd7f152576a865317adac6ac03cf07f,2024-11-21T02:05:41.360000 +CVE-2014-2120,0,0,88c4e54710ab266da7d3d5562640312d99277a7210f2759e3cb33d6dba42d010,2024-11-21T02:05:41.473000 +CVE-2014-2121,0,0,7bc5f937f6d47fab927eb917cd3222902ebb4bd2a4020f993f8f5524246736de,2024-11-21T02:05:41.687000 +CVE-2014-2122,0,0,80c21daa9cf21e4e21f28ffc92328b4856905de0cde0698e11cf26cbe853b2fb,2024-11-21T02:05:41.800000 +CVE-2014-2124,0,0,f42abc8badf83bfa69d79669302c968533c7133acd8e2e60a2ef49a8f7ba19f9,2024-11-21T02:05:41.920000 +CVE-2014-2125,0,0,1a256de24d36fabcf1d9b1d25b865b9248e539c4db627e897a2bbbfa701d0292,2024-11-21T02:05:42.047000 +CVE-2014-2126,0,0,3fac9d8ffa3b2b9d503f7cf2d9aa947850498db1354680d069cfffc163267548,2024-11-21T02:05:42.160000 +CVE-2014-2127,0,0,9104d7b800301272eada00cbeb953a01e8255759fad1d4ad7382e971e3fe0c26,2024-11-21T02:05:42.273000 +CVE-2014-2128,0,0,7dc6968d6432b48d72c1227b50abf40ef923e9b497a708181281bdccffd5a0bb,2024-11-21T02:05:42.387000 +CVE-2014-2129,0,0,ebc51afe3c148028bb1b7985b8f46307ad2b884073f1956daa5d4bd34fb1e388,2024-11-21T02:05:42.507000 CVE-2014-2130,0,0,f42da315190c3ee2e08aa1ec651db80ca9663e2c7b9dbbfe709d7690dc5cc2e4,2015-11-30T19:03:27.063000 -CVE-2014-2131,0,1,4946bc09eb1fc22ff751c4f25f121376fc1277d2eda12f521fe2d6bdd9ed1396,2024-11-21T02:05:42.723000 -CVE-2014-2132,0,1,279b463c69812ac5124a1db1079003c387be25a789830d4499b0e5b7ff9944c3,2024-11-21T02:05:42.840000 -CVE-2014-2133,0,1,731184548d00ac80981d04d02e240a7ba3e5ba7847d9bbfb856df36429645170,2024-11-21T02:05:42.947000 -CVE-2014-2134,0,1,81061dc243c14f3630c4db8ec80cf6fd26ac7ddf3bb6172c1505987b2d160f88,2024-11-21T02:05:43.060000 -CVE-2014-2135,0,1,c844233d597f6df64214ecce1c5be1c39a61724bd70be25d8667ed58d54912d3,2024-11-21T02:05:43.177000 -CVE-2014-2136,0,1,0b2b909fb52d300fe92b298f1aad9b6a8bf343b9fe3a3a4c30595b304351802a,2024-11-21T02:05:43.287000 -CVE-2014-2137,0,1,841ce6434650769c163846eff4a0f4f673bfb7869d0cb83eb2ab6f0cfe7e0055,2024-11-21T02:05:43.400000 -CVE-2014-2138,0,1,1c2adb5d70ebfba361828c76da1081a971fb17634d2887604e1537b75e001460,2024-11-21T02:05:43.520000 -CVE-2014-2139,0,1,f68ef27a4b832b35dc723a7fcc9a0242f8ad4b0aa66acf54dfab0a3d0fdc4f6f,2024-11-21T02:05:43.643000 -CVE-2014-2140,0,1,aa989f12ae1bf2b99e6d47fc6858aa924bcec8cb9665f8f2051729e08ec96bac,2024-11-21T02:05:43.760000 -CVE-2014-2141,0,1,7e1ea14a6b9583eed17d14b6d6340bf0a2a5075f06f83406ce39f92f24788b1f,2024-11-21T02:05:43.877000 -CVE-2014-2142,0,1,d0314ab2a6f3043583983485c03d473c849e9be796745e6775e3ea1cf4a7bb35,2024-11-21T02:05:43.990000 -CVE-2014-2143,0,1,5c9753dba5b869c70d65b27f419141d859ef3e457cb463e27f52fe5a22002a41,2024-11-21T02:05:44.103000 -CVE-2014-2144,0,1,f914c05e4216229a9e0e3ca71bc9cb1e6d56e431ed1bfb7a8717d6a3dab5b169,2024-11-21T02:05:44.220000 -CVE-2014-2145,0,1,6e57f7a440d6a4f7c371236c5c58d23778b94dcec1433b22f4ed5afbbd7c5a66,2024-11-21T02:05:44.330000 +CVE-2014-2131,0,0,4946bc09eb1fc22ff751c4f25f121376fc1277d2eda12f521fe2d6bdd9ed1396,2024-11-21T02:05:42.723000 +CVE-2014-2132,0,0,279b463c69812ac5124a1db1079003c387be25a789830d4499b0e5b7ff9944c3,2024-11-21T02:05:42.840000 +CVE-2014-2133,0,0,731184548d00ac80981d04d02e240a7ba3e5ba7847d9bbfb856df36429645170,2024-11-21T02:05:42.947000 +CVE-2014-2134,0,0,81061dc243c14f3630c4db8ec80cf6fd26ac7ddf3bb6172c1505987b2d160f88,2024-11-21T02:05:43.060000 +CVE-2014-2135,0,0,c844233d597f6df64214ecce1c5be1c39a61724bd70be25d8667ed58d54912d3,2024-11-21T02:05:43.177000 +CVE-2014-2136,0,0,0b2b909fb52d300fe92b298f1aad9b6a8bf343b9fe3a3a4c30595b304351802a,2024-11-21T02:05:43.287000 +CVE-2014-2137,0,0,841ce6434650769c163846eff4a0f4f673bfb7869d0cb83eb2ab6f0cfe7e0055,2024-11-21T02:05:43.400000 +CVE-2014-2138,0,0,1c2adb5d70ebfba361828c76da1081a971fb17634d2887604e1537b75e001460,2024-11-21T02:05:43.520000 +CVE-2014-2139,0,0,f68ef27a4b832b35dc723a7fcc9a0242f8ad4b0aa66acf54dfab0a3d0fdc4f6f,2024-11-21T02:05:43.643000 +CVE-2014-2140,0,0,aa989f12ae1bf2b99e6d47fc6858aa924bcec8cb9665f8f2051729e08ec96bac,2024-11-21T02:05:43.760000 +CVE-2014-2141,0,0,7e1ea14a6b9583eed17d14b6d6340bf0a2a5075f06f83406ce39f92f24788b1f,2024-11-21T02:05:43.877000 +CVE-2014-2142,0,0,d0314ab2a6f3043583983485c03d473c849e9be796745e6775e3ea1cf4a7bb35,2024-11-21T02:05:43.990000 +CVE-2014-2143,0,0,5c9753dba5b869c70d65b27f419141d859ef3e457cb463e27f52fe5a22002a41,2024-11-21T02:05:44.103000 +CVE-2014-2144,0,0,f914c05e4216229a9e0e3ca71bc9cb1e6d56e431ed1bfb7a8717d6a3dab5b169,2024-11-21T02:05:44.220000 +CVE-2014-2145,0,0,6e57f7a440d6a4f7c371236c5c58d23778b94dcec1433b22f4ed5afbbd7c5a66,2024-11-21T02:05:44.330000 CVE-2014-2146,0,0,0c28bbaefd945b2bded48501efd4ee1e2ae665ce10a4563fcd2be0ce866f2d5b,2017-02-19T06:03:22.400000 CVE-2014-2147,0,0,2f3b85a464c5e936c79869d0d4bd4d4172a7bce629d6cec32033ac071a73a507,2017-08-29T01:34:29.450000 CVE-2014-2149,0,0,0a40b8dc6c21af653851449987a7e555bcc74f765dc78af3638908c9c4920a02,2023-11-07T02:19:29.830000 @@ -66520,66 +66520,66 @@ CVE-2014-2150,0,0,c330ea3184f9b4ca54e09774c140fe9df1a05b7c8ceefb04ad0511b50d9a7c CVE-2014-2151,0,0,b8c2251e8b9b73ba95c9fa536ce57d01902a1f284f2864cf4ffd0629a88706d2,2022-06-02T15:45:18.607000 CVE-2014-2152,0,0,234589fa6f2de8bd17e7fb334db5eb1472ac5fa042827bfecdd06c93e212e806,2017-08-29T01:34:29.513000 CVE-2014-2153,0,0,1455be08dd76e56228ba1f8b2d4aa5cccc49c4186ba16c5b6510e323781feaf1,2017-08-29T01:34:29.560000 -CVE-2014-2154,0,1,9b61af12ca2254768f7996f9d17d6dd4547f11397c0565372d4c14327285e750,2024-11-21T02:05:45.077000 -CVE-2014-2155,0,1,66e5da10f6e8575e98e366d885cd41d652a4cf44dc856d08d2742b85127843e2,2024-11-21T02:05:45.200000 -CVE-2014-2156,0,1,bc531bdea02914be8bf59def9cad940255909669c4bd24921911569008539007,2024-11-21T02:05:45.317000 -CVE-2014-2157,0,1,b07e2a1e2b6de56c5edd3a7dd912c8697b156df8a2df29dade42bb6b03c0be49,2024-11-21T02:05:45.437000 -CVE-2014-2158,0,1,0d5606590088f77e6113cdd2efeac5dc4e1060005f1940b017efad3d9df9c78b,2024-11-21T02:05:45.570000 -CVE-2014-2159,0,1,5cc12c0ef8c0b6513515a1e8ab1ad1c5a1d2ae1696b8c4eb1f88e2eecbfa0395,2024-11-21T02:05:45.683000 -CVE-2014-2160,0,1,a6ed2af3fef78a52f42ab0e0f3719ff4fdd1da6b19ea574da171bf0c7c553572,2024-11-21T02:05:45.797000 -CVE-2014-2161,0,1,5cdc33ba9e31097da1272c9480af1f10c36cebee34ca9e0f6dbf988b87cd0364,2024-11-21T02:05:45.913000 -CVE-2014-2162,0,1,f4c40e91051223a4998fd593d0171ada19d36e8e2444466cba9d43b91dbadcaf,2024-11-21T02:05:46.057000 -CVE-2014-2163,0,1,c8f20247a2c94ccdc14b2171e1ff488f70b06568a6c0baecb28e2b1d145775f5,2024-11-21T02:05:46.190000 -CVE-2014-2164,0,1,4662ead4b8b3392b89bf1d31986e5381f40c720bee03145958c174b01f01521f,2024-11-21T02:05:46.317000 -CVE-2014-2165,0,1,2d03e5511c2ee3b37984aea557de3868dbbe1e6c23d10233b3e42e1141cb4337,2024-11-21T02:05:46.440000 -CVE-2014-2166,0,1,71c4ae5dd3631916fd4310381b3f5ab9e53a4fcc02e6fee43b1dbd8819eeb8f3,2024-11-21T02:05:46.567000 -CVE-2014-2167,0,1,7fa656e69c89e60838ee9d42e229854471af96655f441d9ca434f5975f8fb513,2024-11-21T02:05:46.683000 -CVE-2014-2168,0,1,9f6133a019c6ba3528036acd97ca917ee5b2d9035deb69997cb461f3d764c808,2024-11-21T02:05:46.810000 -CVE-2014-2169,0,1,e16a89298b95262a19a847f7e40b4180b25e06d14efdadfda7aca148d55a465c,2024-11-21T02:05:46.920000 -CVE-2014-2170,0,1,b888502a938f06fbdca63749860bc690427a7adf40f18a23f9c3bdbb08eb4899,2024-11-21T02:05:47.047000 -CVE-2014-2171,0,1,6a99471caf6f3c54c947388b29ebfd1bd3e1fd798219019ea3ada3f29ef5c3fb,2024-11-21T02:05:47.167000 -CVE-2014-2172,0,1,c1c603f97364c28e435fca4a80177b7d0138a8c6699e9b0a27bb26ff01e10060,2024-11-21T02:05:47.290000 -CVE-2014-2173,0,1,3d4a540953c96ae852cd2e3046ef3c9dfbb1902ccf7831476d5550bbd4862990,2024-11-21T02:05:47.413000 +CVE-2014-2154,0,0,9b61af12ca2254768f7996f9d17d6dd4547f11397c0565372d4c14327285e750,2024-11-21T02:05:45.077000 +CVE-2014-2155,0,0,66e5da10f6e8575e98e366d885cd41d652a4cf44dc856d08d2742b85127843e2,2024-11-21T02:05:45.200000 +CVE-2014-2156,0,0,bc531bdea02914be8bf59def9cad940255909669c4bd24921911569008539007,2024-11-21T02:05:45.317000 +CVE-2014-2157,0,0,b07e2a1e2b6de56c5edd3a7dd912c8697b156df8a2df29dade42bb6b03c0be49,2024-11-21T02:05:45.437000 +CVE-2014-2158,0,0,0d5606590088f77e6113cdd2efeac5dc4e1060005f1940b017efad3d9df9c78b,2024-11-21T02:05:45.570000 +CVE-2014-2159,0,0,5cc12c0ef8c0b6513515a1e8ab1ad1c5a1d2ae1696b8c4eb1f88e2eecbfa0395,2024-11-21T02:05:45.683000 +CVE-2014-2160,0,0,a6ed2af3fef78a52f42ab0e0f3719ff4fdd1da6b19ea574da171bf0c7c553572,2024-11-21T02:05:45.797000 +CVE-2014-2161,0,0,5cdc33ba9e31097da1272c9480af1f10c36cebee34ca9e0f6dbf988b87cd0364,2024-11-21T02:05:45.913000 +CVE-2014-2162,0,0,f4c40e91051223a4998fd593d0171ada19d36e8e2444466cba9d43b91dbadcaf,2024-11-21T02:05:46.057000 +CVE-2014-2163,0,0,c8f20247a2c94ccdc14b2171e1ff488f70b06568a6c0baecb28e2b1d145775f5,2024-11-21T02:05:46.190000 +CVE-2014-2164,0,0,4662ead4b8b3392b89bf1d31986e5381f40c720bee03145958c174b01f01521f,2024-11-21T02:05:46.317000 +CVE-2014-2165,0,0,2d03e5511c2ee3b37984aea557de3868dbbe1e6c23d10233b3e42e1141cb4337,2024-11-21T02:05:46.440000 +CVE-2014-2166,0,0,71c4ae5dd3631916fd4310381b3f5ab9e53a4fcc02e6fee43b1dbd8819eeb8f3,2024-11-21T02:05:46.567000 +CVE-2014-2167,0,0,7fa656e69c89e60838ee9d42e229854471af96655f441d9ca434f5975f8fb513,2024-11-21T02:05:46.683000 +CVE-2014-2168,0,0,9f6133a019c6ba3528036acd97ca917ee5b2d9035deb69997cb461f3d764c808,2024-11-21T02:05:46.810000 +CVE-2014-2169,0,0,e16a89298b95262a19a847f7e40b4180b25e06d14efdadfda7aca148d55a465c,2024-11-21T02:05:46.920000 +CVE-2014-2170,0,0,b888502a938f06fbdca63749860bc690427a7adf40f18a23f9c3bdbb08eb4899,2024-11-21T02:05:47.047000 +CVE-2014-2171,0,0,6a99471caf6f3c54c947388b29ebfd1bd3e1fd798219019ea3ada3f29ef5c3fb,2024-11-21T02:05:47.167000 +CVE-2014-2172,0,0,c1c603f97364c28e435fca4a80177b7d0138a8c6699e9b0a27bb26ff01e10060,2024-11-21T02:05:47.290000 +CVE-2014-2173,0,0,3d4a540953c96ae852cd2e3046ef3c9dfbb1902ccf7831476d5550bbd4862990,2024-11-21T02:05:47.413000 CVE-2014-2174,0,0,f3cc7aceab6ffcabac6bbe036aa0db0c551b7f0478ebd03543fbcc1435c4bfb4,2015-05-26T17:54:23.977000 -CVE-2014-2175,0,1,ef8865df7c3a3706525a82289c0d13070e24fad02ed915b9d02553ad642c9af5,2024-11-21T02:05:47.653000 +CVE-2014-2175,0,0,ef8865df7c3a3706525a82289c0d13070e24fad02ed915b9d02553ad642c9af5,2024-11-21T02:05:47.653000 CVE-2014-2176,0,0,c9a1537fa5b53f8cf47273379029a0ae8906e49816a39cae437ff10a4eadd5d5,2016-09-07T18:13:51.510000 CVE-2014-2177,0,0,a6a614251d8bf6b2240ee9a4ddef2aea8a3ba61b9ac00c3c50de0048c94cccde,2018-10-09T19:43:09.423000 CVE-2014-2178,0,0,f07ddbb850d0c207621d30a0f11b1135193e7e7884bde15a84c6c1f63e07eb19,2018-10-09T19:43:10.127000 CVE-2014-2179,0,0,125b68b903a50992c91a90132d42d57ce73e595b1f87980e80f09e73dd27daad,2018-10-09T19:43:10.847000 -CVE-2014-2180,0,1,3733cc4210eeb8477544df010401f97bada7c91802936a4ce2edf143252699d2,2024-11-21T02:05:48.307000 -CVE-2014-2181,0,1,a631628580a9e00dc02b19c45dd89b054b482934ae772771a7f0433bdf934bca,2024-11-21T02:05:48.430000 -CVE-2014-2182,0,1,9c2251df848ac23f6eb1c076e9af10903376242523f6b2aee4be251d20660978,2024-11-21T02:05:48.547000 -CVE-2014-2183,0,1,e5bccd300292cc9f98971e68911748cfa2c083343b962734f4147415fb7b853b,2024-11-21T02:05:48.660000 -CVE-2014-2184,0,1,da5624f34698ce7d4502e2c52ae9cf2baa19123148db0ae4e42766c6319a2346,2024-11-21T02:05:48.783000 -CVE-2014-2185,0,1,16fa2c051c4c20b56139a7dd113b42246a01554f29ce2c97f78408c48a1ed224,2024-11-21T02:05:48.897000 -CVE-2014-2186,0,1,164d7c58d8458bbbf54e98df93e1d1b31cfaddc1488ed42dc2c1e1af9fc1981a,2024-11-21T02:05:49.030000 +CVE-2014-2180,0,0,3733cc4210eeb8477544df010401f97bada7c91802936a4ce2edf143252699d2,2024-11-21T02:05:48.307000 +CVE-2014-2181,0,0,a631628580a9e00dc02b19c45dd89b054b482934ae772771a7f0433bdf934bca,2024-11-21T02:05:48.430000 +CVE-2014-2182,0,0,9c2251df848ac23f6eb1c076e9af10903376242523f6b2aee4be251d20660978,2024-11-21T02:05:48.547000 +CVE-2014-2183,0,0,e5bccd300292cc9f98971e68911748cfa2c083343b962734f4147415fb7b853b,2024-11-21T02:05:48.660000 +CVE-2014-2184,0,0,da5624f34698ce7d4502e2c52ae9cf2baa19123148db0ae4e42766c6319a2346,2024-11-21T02:05:48.783000 +CVE-2014-2185,0,0,16fa2c051c4c20b56139a7dd113b42246a01554f29ce2c97f78408c48a1ed224,2024-11-21T02:05:48.897000 +CVE-2014-2186,0,0,164d7c58d8458bbbf54e98df93e1d1b31cfaddc1488ed42dc2c1e1af9fc1981a,2024-11-21T02:05:49.030000 CVE-2014-2188,0,0,d876493771914805fc27ea4b1f40fa39e9b30ace4589c765cc2868f36e835d99,2023-11-07T02:19:30.650000 CVE-2014-2189,0,0,eb3298bc12f82eb042b7c6e0077c88dfc0de4a5baec139adcf141e3fda43c428,2023-11-07T02:19:31.080000 -CVE-2014-2190,0,1,910857810c3454092d92d2d77054b67eea5638f71ad2488e09ac9a89f377e455,2024-11-21T02:05:49.180000 -CVE-2014-2191,0,1,41b879f4e0d58f91e51f5d50895b3eee1c9d2d470a2f6f219f07f5b2c270e449,2024-11-21T02:05:49.313000 -CVE-2014-2192,0,1,f7ed669a8e0d9f30e368ece556543ba6b83c7780d22fb307cbb1c7d16f873f51,2024-11-21T02:05:49.437000 -CVE-2014-2193,0,1,f9c510e59467b2b1756cc7c6b5afa778a224e293f60c9a29680939b36589af57,2024-11-21T02:05:49.560000 -CVE-2014-2194,0,1,be622d03c32447ef84ec145d813438aeee239b76c91853eb4fc43dd5cc5bc39c,2024-11-21T02:05:49.680000 -CVE-2014-2195,0,1,afcf67044800b9b9929c3994d6232f4600dfb5f603503cd501c014cab19e1009,2024-11-21T02:05:49.797000 -CVE-2014-2196,0,1,630630355e79164c8fd23d814c0f0bd47557bb876c6370cdafeb7ffeea80ee10,2024-11-21T02:05:49.940000 +CVE-2014-2190,0,0,910857810c3454092d92d2d77054b67eea5638f71ad2488e09ac9a89f377e455,2024-11-21T02:05:49.180000 +CVE-2014-2191,0,0,41b879f4e0d58f91e51f5d50895b3eee1c9d2d470a2f6f219f07f5b2c270e449,2024-11-21T02:05:49.313000 +CVE-2014-2192,0,0,f7ed669a8e0d9f30e368ece556543ba6b83c7780d22fb307cbb1c7d16f873f51,2024-11-21T02:05:49.437000 +CVE-2014-2193,0,0,f9c510e59467b2b1756cc7c6b5afa778a224e293f60c9a29680939b36589af57,2024-11-21T02:05:49.560000 +CVE-2014-2194,0,0,be622d03c32447ef84ec145d813438aeee239b76c91853eb4fc43dd5cc5bc39c,2024-11-21T02:05:49.680000 +CVE-2014-2195,0,0,afcf67044800b9b9929c3994d6232f4600dfb5f603503cd501c014cab19e1009,2024-11-21T02:05:49.797000 +CVE-2014-2196,0,0,630630355e79164c8fd23d814c0f0bd47557bb876c6370cdafeb7ffeea80ee10,2024-11-21T02:05:49.940000 CVE-2014-2197,0,0,e391f9b430dfdaa53927d691fb3aecd109e3f1892e1c64cb31ad69946dcf2fd1,2017-01-07T02:59:45.250000 CVE-2014-2198,0,0,fb1cc1b8178dc65963f0af4e1cd65e13df297c00844c1fa73ce775273e23428a,2017-01-07T02:59:45.597000 -CVE-2014-2199,0,1,0e0ea82aee22ed12336763ab4f2232015c0fb9680da406f0f2c061dc2a599da8,2024-11-21T02:05:50.297000 -CVE-2014-2200,0,1,7c1c3d03229965789d739321b87733fa073cf97d0bb4900435b001a8635def94,2024-11-21T02:05:50.413000 -CVE-2014-2201,0,1,8036688c1cd39ac2c8a4e66a7ce1f8242788cb4bdcaf90f2f26f3994077b40fd,2024-11-21T02:05:50.537000 -CVE-2014-2205,0,1,c9d43f09997b1a30332fe13725e77a499e8ec070201f4e3f1b696c549e38fb96,2024-11-21T02:05:50.657000 -CVE-2014-2206,0,1,7b59b00802fa5dd5e465a3a5ba25be192209645f3d13f0e2cdd9889a60fae0f5,2024-11-21T02:05:50.820000 +CVE-2014-2199,0,0,0e0ea82aee22ed12336763ab4f2232015c0fb9680da406f0f2c061dc2a599da8,2024-11-21T02:05:50.297000 +CVE-2014-2200,0,0,7c1c3d03229965789d739321b87733fa073cf97d0bb4900435b001a8635def94,2024-11-21T02:05:50.413000 +CVE-2014-2201,0,0,8036688c1cd39ac2c8a4e66a7ce1f8242788cb4bdcaf90f2f26f3994077b40fd,2024-11-21T02:05:50.537000 +CVE-2014-2205,0,0,c9d43f09997b1a30332fe13725e77a499e8ec070201f4e3f1b696c549e38fb96,2024-11-21T02:05:50.657000 +CVE-2014-2206,0,0,7b59b00802fa5dd5e465a3a5ba25be192209645f3d13f0e2cdd9889a60fae0f5,2024-11-21T02:05:50.820000 CVE-2014-2208,0,0,5666103d17713aa3ae0a2d7227f958befce03557615c50e7f6205c64dc008083,2014-12-30T15:28:24.253000 CVE-2014-2209,0,0,5e3895331e45f6e416ce69a379c81493ea7b5381157910f61efc6e55bd72e32f,2014-12-30T15:28:45.973000 -CVE-2014-2210,0,1,116b131b94c2321f4c6b8259d5bb7627a11dce271c1be70adb37ece5fa24ea9c,2024-11-21T02:05:51.280000 -CVE-2014-2211,0,1,11085765994cca27ad40899b313d571f653d898c84d1aac4fdae2b01b201f546,2024-11-21T02:05:51.433000 -CVE-2014-2212,0,1,c50069bd423df7cd64c900797574040a393ae8e32c9ca2f3275b620d0d590883,2024-11-21T02:05:51.577000 +CVE-2014-2210,0,0,116b131b94c2321f4c6b8259d5bb7627a11dce271c1be70adb37ece5fa24ea9c,2024-11-21T02:05:51.280000 +CVE-2014-2211,0,0,11085765994cca27ad40899b313d571f653d898c84d1aac4fdae2b01b201f546,2024-11-21T02:05:51.433000 +CVE-2014-2212,0,0,c50069bd423df7cd64c900797574040a393ae8e32c9ca2f3275b620d0d590883,2024-11-21T02:05:51.577000 CVE-2014-2213,0,0,435781fa8db9ca3d620a01fca993e9fd0a1ca83dc1c81d570abf8450b659d960,2019-12-03T16:09:07.017000 CVE-2014-2214,0,0,ef7db40a4b530250833de0bd10a2aba603363243a7cb95cd28c2aa1aab50e470,2019-12-02T19:59:43.820000 CVE-2014-2215,0,0,a36905fdb7a5430472c328934879eadfdcbc408277b37c86506441ea0eb97bcd,2023-11-07T02:19:31.617000 CVE-2014-2216,0,0,04026fa520ecb6bc9b84d37d2af0acbba98ab998b6e9fb388ea35b8028d9186d,2017-08-29T01:34:29.857000 CVE-2014-2217,0,0,4dab5ffe27d7a4c721d949586d09b7749a2b1c71860cf2e645ced141f3863be7,2014-12-29T17:53:55.060000 -CVE-2014-2219,0,1,91756d3db614d90fc3d885ae4ccb5fb25127c5eac7460f6541940fcbd023a055,2024-11-21T02:05:52.300000 +CVE-2014-2219,0,0,91756d3db614d90fc3d885ae4ccb5fb25127c5eac7460f6541940fcbd023a055,2024-11-21T02:05:52.300000 CVE-2014-2223,0,0,6bd48e1568b16661235d01857d1111ef07f50f899982980d90be39b41ac8a3b6,2015-01-08T13:41:07.480000 CVE-2014-2224,0,0,1d7b3ab3d5257ed306eebef2f4c47e4a5fa4011b928bc3189b893b4ff97e62b7,2014-12-30T16:37:58.953000 CVE-2014-2225,0,0,ad4dd1456902ca5119fe159cfd5129267e890248853da413b06e6a882e02345a,2020-02-12T19:05:15.237000 @@ -66587,110 +66587,110 @@ CVE-2014-2226,0,0,46bf63a1fb30c8dd1ab28669ee5a5e8c45b02ce5584a2071f4cdc6dfb60024 CVE-2014-2227,0,0,0d42307e5b8cbbc90c1c4e5b88f6d3971235bd499b7b1aa609d7c1be7cdcbcf2,2019-06-10T18:34:16.507000 CVE-2014-2228,0,0,0c9d3e7c4a87d625c4fefd7c912e783197db1c1020ecebae713e75b7144dab5d,2020-03-06T14:23:57.207000 CVE-2014-2230,0,0,de6049b183b812cb71fe0e6c63c3fc344da4eee00ebecb35e0199bdd3079f2a8,2017-08-29T01:34:29.937000 -CVE-2014-2231,0,1,da5f8f77f87f6bce7c63c17c206e35e22c22b4ac6002d1e199767d74fd7aa020,2024-11-21T02:05:53.420000 +CVE-2014-2231,0,0,da5f8f77f87f6bce7c63c17c206e35e22c22b4ac6002d1e199767d74fd7aa020,2024-11-21T02:05:53.420000 CVE-2014-2232,0,0,767833be08370ff591e6d1fea6250598740b2d10bea9b848b841bf5bb218a2e9,2018-12-12T17:16:58.560000 CVE-2014-2233,0,0,73aed98a2f8908dfc5d98a5f345c32116719e35c1c0a4d7438c2a84fb75582e0,2014-12-01T18:29:59.827000 -CVE-2014-2234,0,1,23133d5958fed8473e426922aa63894d19ce7c8d7c5adfb3472b4e49a24b9a49,2024-11-21T02:05:53.820000 -CVE-2014-2235,0,1,c7c1a4151acb9a74458889a875060cfafe2dd2a9f4e48d7c8f97c5cc44cb907f,2024-11-21T02:05:53.967000 -CVE-2014-2236,0,1,9f7b5c27783a8bb5517c4a31d2adde2094c7cb90d5fec212070e1a9ef8a273d3,2024-11-21T02:05:54.070000 -CVE-2014-2237,0,1,3850ca7306bc13e29d2498e2fbf33653275e86b9ed11b2de2fa8630d752e3c1b,2024-11-21T02:05:54.180000 -CVE-2014-2238,0,1,37edcfd2304ac63cfb8e54ba8e446577e870c82e96e337c794c0ca9d59c88468,2024-11-21T02:05:54.317000 -CVE-2014-2240,0,1,006a209656629a2e4d9270bd2e0bb17c59f829c81d2365ac0a4ffcc518416582,2024-11-21T02:05:54.457000 -CVE-2014-2241,0,1,1903c5f356cb42a2f49ebee204440f0e7d6dd658e61a38e5534665038faa01a3,2024-11-21T02:05:54.613000 -CVE-2014-2242,0,1,718c7c091eea5ccc40ccf8351701d7ddf1a6cea101370b0e5526fd08c43176f8,2024-11-21T02:05:54.747000 -CVE-2014-2243,0,1,46202dea2c28b41f7f760d1ab7caeb39b34cf5a820890bb98c5392822afb7cf8,2024-11-21T02:05:54.907000 -CVE-2014-2244,0,1,b258e68a25180d477f397f6bec7e34aee9fc2edacfb39520e18d133bf0e6cbc1,2024-11-21T02:05:55.053000 -CVE-2014-2245,0,1,9d2af32705828d036b9af873c35a484e9191974c9e81f920b3be56d5b9530667,2024-11-21T02:05:55.210000 -CVE-2014-2246,0,1,583360298081b66b383e9df87d41c61c48a499591673b21bdbb48a517ccda738,2024-11-21T02:05:55.360000 -CVE-2014-2247,0,1,a17df456a65c6760e6c1957faae278c37eea02cd8a07b7215c22b8913f81d683,2024-11-21T02:05:55.503000 -CVE-2014-2248,0,1,7933ff69c5098b65e232f6e7536ebe54a8029461cfa0c3163e9321163c179404,2024-11-21T02:05:55.633000 -CVE-2014-2249,0,1,03e284c005db7d7df04c30499778aa1177f8e33efdc3f04aa3e547fa2bfeb992,2024-11-21T02:05:55.780000 -CVE-2014-2250,0,1,3e031db16cf2bfc26d176653619f68e89cdf1e29a01bbaeb9fbcda64d1be11ed,2024-11-21T02:05:55.923000 -CVE-2014-2251,0,1,e0640ac5e9e658056acc32da1f717669af1f298c09e9c08697d992fddcfb5379,2024-11-21T02:05:56.067000 -CVE-2014-2252,0,1,0052a40d418dc3de03d0a08649552f1a823e02d9268edaa8583407026224013e,2024-11-21T02:05:56.220000 -CVE-2014-2253,0,1,09aecf4459d51d323520c0473f6fb9eb02bc941e48dc36a5fac16363e501715c,2024-11-21T02:05:56.380000 -CVE-2014-2254,0,1,74cf4796b7189cb335a6052a86f7d02b23818d6b874542abca14aa8542b4968c,2024-11-21T02:05:56.520000 -CVE-2014-2255,0,1,c49b88934315615abb8578a84366630dc092b04345fe404cc2df379464cdd88f,2024-11-21T02:05:56.660000 -CVE-2014-2256,0,1,483f70905d8618810d00434d7cb7fe313802c6117f9ffc4bb6db33f7fdb04b5a,2024-11-21T02:05:56.807000 -CVE-2014-2257,0,1,ef88c8ed49ad6829091541d99f6f77535f2ff6c1b56d577c357fb826ddef8475,2024-11-21T02:05:56.947000 -CVE-2014-2258,0,1,44e8e620c2575515468036c867fff7e4b1b878a9643a38f97cad0e840bb3a938,2024-11-21T02:05:57.087000 -CVE-2014-2259,0,1,c1bc64ef8574645cd140945d4691d48d6d4b3aed2736efab07a3f0c41a205b29,2024-11-21T02:05:57.230000 -CVE-2014-2260,0,1,6b43ea2b0e7cefd7f36819272155fd71a08411f181142ea20aead96f1042cf7e,2024-11-21T02:05:57.370000 -CVE-2014-2262,0,1,fe59a38640e0cea12bfc77ecd2dd33eb0eaf11a8203075c0625cd31fe929d1c8,2024-11-21T02:05:57.520000 -CVE-2014-2263,0,1,032e1b60e9e1d9c8b44e11681204923492e7f51c3c90eff4b3a19835356b7f45,2024-11-21T02:05:57.660000 -CVE-2014-2264,0,1,f240e2d69209e8bc35b7eeafe0ad6d82df9637363d54aec76f6106ce6ba47cc0,2024-11-21T02:05:57.803000 -CVE-2014-2265,0,1,a8803a113a8ba5de81fdcba04c9705834c53bb5e095739927ed40923f34b4747,2024-11-21T02:05:57.933000 +CVE-2014-2234,0,0,23133d5958fed8473e426922aa63894d19ce7c8d7c5adfb3472b4e49a24b9a49,2024-11-21T02:05:53.820000 +CVE-2014-2235,0,0,c7c1a4151acb9a74458889a875060cfafe2dd2a9f4e48d7c8f97c5cc44cb907f,2024-11-21T02:05:53.967000 +CVE-2014-2236,0,0,9f7b5c27783a8bb5517c4a31d2adde2094c7cb90d5fec212070e1a9ef8a273d3,2024-11-21T02:05:54.070000 +CVE-2014-2237,0,0,3850ca7306bc13e29d2498e2fbf33653275e86b9ed11b2de2fa8630d752e3c1b,2024-11-21T02:05:54.180000 +CVE-2014-2238,0,0,37edcfd2304ac63cfb8e54ba8e446577e870c82e96e337c794c0ca9d59c88468,2024-11-21T02:05:54.317000 +CVE-2014-2240,0,0,006a209656629a2e4d9270bd2e0bb17c59f829c81d2365ac0a4ffcc518416582,2024-11-21T02:05:54.457000 +CVE-2014-2241,0,0,1903c5f356cb42a2f49ebee204440f0e7d6dd658e61a38e5534665038faa01a3,2024-11-21T02:05:54.613000 +CVE-2014-2242,0,0,718c7c091eea5ccc40ccf8351701d7ddf1a6cea101370b0e5526fd08c43176f8,2024-11-21T02:05:54.747000 +CVE-2014-2243,0,0,46202dea2c28b41f7f760d1ab7caeb39b34cf5a820890bb98c5392822afb7cf8,2024-11-21T02:05:54.907000 +CVE-2014-2244,0,0,b258e68a25180d477f397f6bec7e34aee9fc2edacfb39520e18d133bf0e6cbc1,2024-11-21T02:05:55.053000 +CVE-2014-2245,0,0,9d2af32705828d036b9af873c35a484e9191974c9e81f920b3be56d5b9530667,2024-11-21T02:05:55.210000 +CVE-2014-2246,0,0,583360298081b66b383e9df87d41c61c48a499591673b21bdbb48a517ccda738,2024-11-21T02:05:55.360000 +CVE-2014-2247,0,0,a17df456a65c6760e6c1957faae278c37eea02cd8a07b7215c22b8913f81d683,2024-11-21T02:05:55.503000 +CVE-2014-2248,0,0,7933ff69c5098b65e232f6e7536ebe54a8029461cfa0c3163e9321163c179404,2024-11-21T02:05:55.633000 +CVE-2014-2249,0,0,03e284c005db7d7df04c30499778aa1177f8e33efdc3f04aa3e547fa2bfeb992,2024-11-21T02:05:55.780000 +CVE-2014-2250,0,0,3e031db16cf2bfc26d176653619f68e89cdf1e29a01bbaeb9fbcda64d1be11ed,2024-11-21T02:05:55.923000 +CVE-2014-2251,0,0,e0640ac5e9e658056acc32da1f717669af1f298c09e9c08697d992fddcfb5379,2024-11-21T02:05:56.067000 +CVE-2014-2252,0,0,0052a40d418dc3de03d0a08649552f1a823e02d9268edaa8583407026224013e,2024-11-21T02:05:56.220000 +CVE-2014-2253,0,0,09aecf4459d51d323520c0473f6fb9eb02bc941e48dc36a5fac16363e501715c,2024-11-21T02:05:56.380000 +CVE-2014-2254,0,0,74cf4796b7189cb335a6052a86f7d02b23818d6b874542abca14aa8542b4968c,2024-11-21T02:05:56.520000 +CVE-2014-2255,0,0,c49b88934315615abb8578a84366630dc092b04345fe404cc2df379464cdd88f,2024-11-21T02:05:56.660000 +CVE-2014-2256,0,0,483f70905d8618810d00434d7cb7fe313802c6117f9ffc4bb6db33f7fdb04b5a,2024-11-21T02:05:56.807000 +CVE-2014-2257,0,0,ef88c8ed49ad6829091541d99f6f77535f2ff6c1b56d577c357fb826ddef8475,2024-11-21T02:05:56.947000 +CVE-2014-2258,0,0,44e8e620c2575515468036c867fff7e4b1b878a9643a38f97cad0e840bb3a938,2024-11-21T02:05:57.087000 +CVE-2014-2259,0,0,c1bc64ef8574645cd140945d4691d48d6d4b3aed2736efab07a3f0c41a205b29,2024-11-21T02:05:57.230000 +CVE-2014-2260,0,0,6b43ea2b0e7cefd7f36819272155fd71a08411f181142ea20aead96f1042cf7e,2024-11-21T02:05:57.370000 +CVE-2014-2262,0,0,fe59a38640e0cea12bfc77ecd2dd33eb0eaf11a8203075c0625cd31fe929d1c8,2024-11-21T02:05:57.520000 +CVE-2014-2263,0,0,032e1b60e9e1d9c8b44e11681204923492e7f51c3c90eff4b3a19835356b7f45,2024-11-21T02:05:57.660000 +CVE-2014-2264,0,0,f240e2d69209e8bc35b7eeafe0ad6d82df9637363d54aec76f6106ce6ba47cc0,2024-11-21T02:05:57.803000 +CVE-2014-2265,0,0,a8803a113a8ba5de81fdcba04c9705834c53bb5e095739927ed40923f34b4747,2024-11-21T02:05:57.933000 CVE-2014-2268,0,0,a343f7e9ac00b40a718ca4c4c54ff1d22a62787c6af284a422feb5446332891c,2017-11-20T18:27:19.483000 -CVE-2014-2269,0,1,bb7a1d5f72becf5cf1b2531a855df1c2d33dadc3bff26014b2b337b71b76c732,2024-11-21T02:05:58.220000 -CVE-2014-2270,0,1,3a782e07a916b8f80dd1af966d220ef3085529870a9e79f3871fefcd5de67672,2024-11-21T02:05:58.350000 +CVE-2014-2269,0,0,bb7a1d5f72becf5cf1b2531a855df1c2d33dadc3bff26014b2b337b71b76c732,2024-11-21T02:05:58.220000 +CVE-2014-2270,0,0,3a782e07a916b8f80dd1af966d220ef3085529870a9e79f3871fefcd5de67672,2024-11-21T02:05:58.350000 CVE-2014-2271,0,0,2865b1bb542f8ff1653d505978ce63236e5f5f9e0249a41f882fef54f0b07a2a,2020-01-21T16:48:39.257000 CVE-2014-2273,0,0,4a890d228a8fcfdae51cbfda9995ab50135ab154c7854436a9f75c3bb95b19e0,2017-08-29T01:34:30.140000 CVE-2014-2274,0,0,67591a5ffeace44f0ea7dcb861f0441e080b9e897dcb0d3a0a245ed393dbed79,2018-04-18T01:30:54.290000 -CVE-2014-2276,0,1,374049351595ef5d3a2b43430e771447ef5ff36c1ca25ca15f50d4a026366271,2024-11-21T02:05:58.910000 +CVE-2014-2276,0,0,374049351595ef5d3a2b43430e771447ef5ff36c1ca25ca15f50d4a026366271,2024-11-21T02:05:58.910000 CVE-2014-2277,0,0,bd7de42d19494c0d4d1db7d4eca5dfb73184910fbd88e5d7934bbee964fd582a,2020-02-04T18:55:54.693000 CVE-2014-2278,0,0,ba3962e97ee21b18db5a38c19544f21ade4b2ff96a92a17916085a68f7a09a76,2014-10-23T15:42:12.463000 CVE-2014-2279,0,0,acf260634311d260039f5af2551a515c28e7fe8c5456e7e3b7b4028ab4ef4183,2017-08-29T01:34:30.280000 -CVE-2014-2280,0,1,3180533f2132c3fa0198a1479d57bf4855e3b46e2181e31b0630197f9013f406,2024-11-21T02:05:59.463000 -CVE-2014-2281,0,1,e4ded78a5d7e090924947ae7ad502171b684e0e69c18cc2b07f2a9aa4df50520,2024-11-21T02:05:59.607000 -CVE-2014-2282,0,1,176faf5dc4f38848060e9116d8709f49b0ee844e352d10dd5f6f6cea37be6023,2024-11-21T02:05:59.757000 -CVE-2014-2283,0,1,7eab857c04c550714cf03b21d1ed04737891f92657de7b289d43f36287c3be12,2024-11-21T02:05:59.900000 -CVE-2014-2284,0,1,0fa2d37989a0e111fe1c873916c8ce51408f72c3c37bcd939609fd5dff4af521,2024-11-21T02:06:00.063000 -CVE-2014-2285,0,1,4f102274b2ae0db486e8d65ec5dbe40380ad574b77183d2c8915c6ff6316c782,2024-11-21T02:06:00.217000 -CVE-2014-2286,0,1,19ef2a7296283e49cd73d617f7dfc974cc34f40ee286e56c2910ea9124099235,2024-11-21T02:06:00.360000 -CVE-2014-2287,0,1,dc840d232720dbe6418e625e61c58cf73309820f34f1d08b483fbfb7e8ec1247,2024-11-21T02:06:00.530000 -CVE-2014-2288,0,1,715265629f79a115a85d17808c6825708601b223906660f212272015b5c2bb5a,2024-11-21T02:06:00.703000 -CVE-2014-2289,0,1,333f28020f53ab1ce5387fa662db8f250802d8bce48ca345ce4295b979a78273,2024-11-21T02:06:00.843000 -CVE-2014-2291,0,1,e7aaf364bf33c77872c608aaab73d719bebec5127f3f1b05e7eca63db76b52b2,2024-11-21T02:06:00.980000 -CVE-2014-2292,0,1,69ad0d56a61107887e629f528da4c38b0a70cc092db2faaa1080bb3e0148bcc4,2024-11-21T02:06:01.117000 +CVE-2014-2280,0,0,3180533f2132c3fa0198a1479d57bf4855e3b46e2181e31b0630197f9013f406,2024-11-21T02:05:59.463000 +CVE-2014-2281,0,0,e4ded78a5d7e090924947ae7ad502171b684e0e69c18cc2b07f2a9aa4df50520,2024-11-21T02:05:59.607000 +CVE-2014-2282,0,0,176faf5dc4f38848060e9116d8709f49b0ee844e352d10dd5f6f6cea37be6023,2024-11-21T02:05:59.757000 +CVE-2014-2283,0,0,7eab857c04c550714cf03b21d1ed04737891f92657de7b289d43f36287c3be12,2024-11-21T02:05:59.900000 +CVE-2014-2284,0,0,0fa2d37989a0e111fe1c873916c8ce51408f72c3c37bcd939609fd5dff4af521,2024-11-21T02:06:00.063000 +CVE-2014-2285,0,0,4f102274b2ae0db486e8d65ec5dbe40380ad574b77183d2c8915c6ff6316c782,2024-11-21T02:06:00.217000 +CVE-2014-2286,0,0,19ef2a7296283e49cd73d617f7dfc974cc34f40ee286e56c2910ea9124099235,2024-11-21T02:06:00.360000 +CVE-2014-2287,0,0,dc840d232720dbe6418e625e61c58cf73309820f34f1d08b483fbfb7e8ec1247,2024-11-21T02:06:00.530000 +CVE-2014-2288,0,0,715265629f79a115a85d17808c6825708601b223906660f212272015b5c2bb5a,2024-11-21T02:06:00.703000 +CVE-2014-2289,0,0,333f28020f53ab1ce5387fa662db8f250802d8bce48ca345ce4295b979a78273,2024-11-21T02:06:00.843000 +CVE-2014-2291,0,0,e7aaf364bf33c77872c608aaab73d719bebec5127f3f1b05e7eca63db76b52b2,2024-11-21T02:06:00.980000 +CVE-2014-2292,0,0,69ad0d56a61107887e629f528da4c38b0a70cc092db2faaa1080bb3e0148bcc4,2024-11-21T02:06:01.117000 CVE-2014-2293,0,0,f49d1fd88663fad197cd18ec693d73b15a6478e4db829aae3c4255245153aaa9,2018-04-24T12:57:25.047000 CVE-2014-2294,0,0,44aef7a71a94dbafa5c33ab08490a8a6707e58e10122a4863efc5b4cb2e177e9,2018-05-22T15:05:13.843000 CVE-2014-2296,0,0,fc6a72cb6be604d31b72c82713d38cf79399db7ce9f9ed6b6b05e3251fc89cbd,2018-09-19T13:31:38.057000 CVE-2014-2297,0,0,505d67dfc8502d37f3ecaaef208ad875bc7861db258b1c15ba789c4bbeed5fcf,2018-10-09T19:43:13.003000 -CVE-2014-2299,0,1,63eecd7cf3d638fd3d57ee45b97a8f1c941284256fd6a4f6d7d1092869110136,2024-11-21T02:06:01.860000 -CVE-2014-2301,0,1,f6585ef523448f5afa478a4e3d13426ef2a1d6d514bffa89b8442cfc1f56dbf3,2024-11-21T02:06:02.023000 +CVE-2014-2299,0,0,63eecd7cf3d638fd3d57ee45b97a8f1c941284256fd6a4f6d7d1092869110136,2024-11-21T02:06:01.860000 +CVE-2014-2301,0,0,f6585ef523448f5afa478a4e3d13426ef2a1d6d514bffa89b8442cfc1f56dbf3,2024-11-21T02:06:02.023000 CVE-2014-2302,0,0,c46fb7e9ceca7b3d0a963abb82d97dc022219cbed3f81cf93c5e52eb74362b3c,2018-09-18T14:45:25.723000 CVE-2014-2303,0,0,4eceddc204b97ad4f920c9527d4af4ab508d0b27d098f0e9a5f5245dec30eb76,2018-10-09T19:43:13.440000 CVE-2014-2304,0,0,ccd13bc6685cae543fce55d522f4dbc1973f220de76ed47e811dc1e4c6ac5d2b,2019-10-30T13:36:40.807000 -CVE-2014-2309,0,1,945b289e6fcde4107daadacbe7a3a906f503a128ca93d46195269e0b20dc8437,2024-11-21T02:06:02.600000 -CVE-2014-2310,0,1,6045dc22e93ac48521668193f966ab0db9cffb6debde6a042050b92e689cbb96,2024-11-21T02:06:02.760000 -CVE-2014-2311,0,1,e3aa4c278b3c377567ba95ea8ab326c2b41380bcd0287c2ca2529a7c3386a223,2024-11-21T02:06:02.907000 +CVE-2014-2309,0,0,945b289e6fcde4107daadacbe7a3a906f503a128ca93d46195269e0b20dc8437,2024-11-21T02:06:02.600000 +CVE-2014-2310,0,0,6045dc22e93ac48521668193f966ab0db9cffb6debde6a042050b92e689cbb96,2024-11-21T02:06:02.760000 +CVE-2014-2311,0,0,e3aa4c278b3c377567ba95ea8ab326c2b41380bcd0287c2ca2529a7c3386a223,2024-11-21T02:06:02.907000 CVE-2014-2312,0,0,9d4774486f8d5a05067cd8cb85644670130d417c03b0e292bc504bb4ddb9c443,2019-11-20T18:08:50.850000 -CVE-2014-2313,0,1,461343b832013ef034fab9234d4a5a0fc45aa30d13e38053e4e489ad77fa56f5,2024-11-21T02:06:03.200000 -CVE-2014-2314,0,1,da9c0356374bb690b03bbade9ea2e9fab5c674aab24f4a9eb6ecdefb7294a2f9,2024-11-21T02:06:03.350000 -CVE-2014-2315,0,1,b1f105572541db933ee94811fb00ddce9d5b7e305517ff153eefd5fce6afa833,2024-11-21T02:06:03.493000 -CVE-2014-2316,0,1,16ea4a45af3e4a1e818074c42386fe1e1835ff2334a1ba6ab9f754e3fedb2234,2024-11-21T02:06:03.627000 -CVE-2014-2317,0,1,a1e2f41ce2fdde34412a41d37eec9788e971b0cd6de77189bdcca10915ff0b49,2024-11-21T02:06:03.773000 -CVE-2014-2318,0,1,5c7aba4c2edaeb2d810c08dc47cc54b0f88371383fa00ad08d3fb80552db8092,2024-11-21T02:06:03.930000 -CVE-2014-2319,0,1,20a2eec65a94c1598f5052a50461cef9f698c99b4a5f08b04eb47092811bd36a,2024-11-21T02:06:04.070000 -CVE-2014-2321,0,1,9a8029307078aeeba86771a7222f02cf0f128cccb82fc30ba80cbbca12e98304,2024-11-21T02:06:04.207000 -CVE-2014-2322,0,1,7039ab41804e002313a279fa9b702a9a33309665d8cc6c1ccc75231c6164e86e,2024-11-21T02:06:04.343000 -CVE-2014-2323,0,1,b7a09c2bd73c01ef9e4a10378e115934c597d2b265d4e95f26d51402e981d1ed,2024-11-21T02:06:04.480000 -CVE-2014-2324,0,1,b47804d90d583a11eacb6102f132e7a0c7a0b1776ec7ea06db7e9a196b06d5d1,2024-11-21T02:06:04.650000 -CVE-2014-2325,0,1,a0fbac71e75d7689b137111f8b516f3b3a7000e72d655556dab3c0a9fb73c528,2024-11-21T02:06:04.813000 -CVE-2014-2326,0,1,5c0359619781c687dc9f5ebc2f1c2bf5a82e9276db2da8a32ebd9130d6cd2b2e,2024-11-21T02:06:04.953000 -CVE-2014-2327,0,1,ba586cff76d4f898498bc70b142d6a638b1e8cb0bc749a676dee4b1d3da0012d,2024-11-21T02:06:05.120000 -CVE-2014-2328,0,1,03ca37d30278cfef2627fdb1a0516da5584c7a76278524dbcf279e9126d9545a,2024-11-21T02:06:05.277000 +CVE-2014-2313,0,0,461343b832013ef034fab9234d4a5a0fc45aa30d13e38053e4e489ad77fa56f5,2024-11-21T02:06:03.200000 +CVE-2014-2314,0,0,da9c0356374bb690b03bbade9ea2e9fab5c674aab24f4a9eb6ecdefb7294a2f9,2024-11-21T02:06:03.350000 +CVE-2014-2315,0,0,b1f105572541db933ee94811fb00ddce9d5b7e305517ff153eefd5fce6afa833,2024-11-21T02:06:03.493000 +CVE-2014-2316,0,0,16ea4a45af3e4a1e818074c42386fe1e1835ff2334a1ba6ab9f754e3fedb2234,2024-11-21T02:06:03.627000 +CVE-2014-2317,0,0,a1e2f41ce2fdde34412a41d37eec9788e971b0cd6de77189bdcca10915ff0b49,2024-11-21T02:06:03.773000 +CVE-2014-2318,0,0,5c7aba4c2edaeb2d810c08dc47cc54b0f88371383fa00ad08d3fb80552db8092,2024-11-21T02:06:03.930000 +CVE-2014-2319,0,0,20a2eec65a94c1598f5052a50461cef9f698c99b4a5f08b04eb47092811bd36a,2024-11-21T02:06:04.070000 +CVE-2014-2321,0,0,9a8029307078aeeba86771a7222f02cf0f128cccb82fc30ba80cbbca12e98304,2024-11-21T02:06:04.207000 +CVE-2014-2322,0,0,7039ab41804e002313a279fa9b702a9a33309665d8cc6c1ccc75231c6164e86e,2024-11-21T02:06:04.343000 +CVE-2014-2323,0,0,b7a09c2bd73c01ef9e4a10378e115934c597d2b265d4e95f26d51402e981d1ed,2024-11-21T02:06:04.480000 +CVE-2014-2324,0,0,b47804d90d583a11eacb6102f132e7a0c7a0b1776ec7ea06db7e9a196b06d5d1,2024-11-21T02:06:04.650000 +CVE-2014-2325,0,0,a0fbac71e75d7689b137111f8b516f3b3a7000e72d655556dab3c0a9fb73c528,2024-11-21T02:06:04.813000 +CVE-2014-2326,0,0,5c0359619781c687dc9f5ebc2f1c2bf5a82e9276db2da8a32ebd9130d6cd2b2e,2024-11-21T02:06:04.953000 +CVE-2014-2327,0,0,ba586cff76d4f898498bc70b142d6a638b1e8cb0bc749a676dee4b1d3da0012d,2024-11-21T02:06:05.120000 +CVE-2014-2328,0,0,03ca37d30278cfef2627fdb1a0516da5584c7a76278524dbcf279e9126d9545a,2024-11-21T02:06:05.277000 CVE-2014-2329,0,0,a235ed692b79fa2bc0a298a0cbc2dddd34c55df60e54874de79fa9d2e2a9ade8,2015-09-01T14:55:32.250000 CVE-2014-2330,0,0,bf3b9b0631fbaec89fa35892dc322d8d731461882a03ea32a87db98005f9508b,2015-09-01T15:17:52.567000 CVE-2014-2331,0,0,8629dad7394cacae38a19d75ff353d26455fe2c03d54531a39c52b823ebc3474,2015-09-01T17:26:58.777000 CVE-2014-2332,0,0,71e2a5fbbe4d1097fc5a744cc6d263062187feb5d1edc33d9fa22bec4e1126f7,2015-09-01T17:27:16.497000 -CVE-2014-2333,0,1,a6b63084e81e6000d548ec342a93167eac1387f9bea6a5359fcea88668657a5d,2024-11-21T02:06:05.997000 +CVE-2014-2333,0,0,a6b63084e81e6000d548ec342a93167eac1387f9bea6a5359fcea88668657a5d,2024-11-21T02:06:05.997000 CVE-2014-2334,0,0,e20309f83924b56fb4096cd8155d33570400795abcfd8b9a8581aaab7aefcabd,2017-08-29T01:34:30.700000 CVE-2014-2335,0,0,db46135cdfd059cb1ec8545f067bea43451505d9ba7af48c284db03d23127921,2017-08-29T01:34:30.810000 CVE-2014-2336,0,0,1f2964e572809f3699b145cf99d451ad8df9bd469826b9182cf093c49681ebca,2017-08-29T01:34:30.890000 -CVE-2014-2338,0,1,138bc23705c81da3804c540fbf74ab9b0ae0578386f94d8294241ad138ea84df,2024-11-21T02:06:06.567000 -CVE-2014-2339,0,1,e60b5ee65fdcb0725faf6d2c8ac1229631ec2dd40bd3fb3ea4da0697b3ff8b95,2024-11-21T02:06:06.740000 -CVE-2014-2340,0,1,04fcb6d2baa992624698e8bf1c5f9c23fded29d65bf700c67f07bcffe03b1a4b,2024-11-21T02:06:06.883000 -CVE-2014-2341,0,1,6254ac1a45d45c9e1f59a76a9b904270333ea65b62d83757716b57d3eb0aea6b,2024-11-21T02:06:07.020000 +CVE-2014-2338,0,0,138bc23705c81da3804c540fbf74ab9b0ae0578386f94d8294241ad138ea84df,2024-11-21T02:06:06.567000 +CVE-2014-2339,0,0,e60b5ee65fdcb0725faf6d2c8ac1229631ec2dd40bd3fb3ea4da0697b3ff8b95,2024-11-21T02:06:06.740000 +CVE-2014-2340,0,0,04fcb6d2baa992624698e8bf1c5f9c23fded29d65bf700c67f07bcffe03b1a4b,2024-11-21T02:06:06.883000 +CVE-2014-2341,0,0,6254ac1a45d45c9e1f59a76a9b904270333ea65b62d83757716b57d3eb0aea6b,2024-11-21T02:06:07.020000 CVE-2014-2342,0,0,9d13ca7a65dced80876b5aba9f4a5e29e3d6a04cb59610b6d880a7f54308b8a2,2014-06-05T12:32:58.963000 CVE-2014-2343,0,0,78dd3b535ad305ff7a558ab1f4d3669af49d54a09f375c66cd9f1be1dcb95fae,2014-06-04T14:00:48.170000 CVE-2014-2344,0,0,c18b4e89972cc699bddc071b17ebbaa5eabfe1b8fb23a5aaa0efed0eb3b0e769,2023-11-07T02:19:33.110000 CVE-2014-2345,0,0,c4eba5d89eb0098a45174fb4f3b093bbd9b2fb41f9af2374106494d5b0b42366,2014-06-05T18:34:44.610000 CVE-2014-2346,0,0,f5090db52e546f469d96154044197f635cc043fac204abf0fe3507ac0b43194b,2014-06-05T18:40:36.957000 -CVE-2014-2347,0,1,df5b7308ac48c3c64defdb4853bce0f182297347888936b7437fd20b612fc0c3,2024-11-21T02:06:07.627000 -CVE-2014-2349,0,1,ccb7aeba97fe30106bb3568564f59280215d09fa65e8fd0dd6a5ce3255bb9e24,2024-11-21T02:06:07.730000 -CVE-2014-2350,0,1,3272e459f1ca16e1d39b6af8893fd87144b06bef05ddd83d7d3261f39e7dc704,2024-11-21T02:06:07.837000 -CVE-2014-2351,0,1,24bbab8e4f10457fe51c2c549223b5d10238f545e9de26929f6ffdabbfecf708,2024-11-21T02:06:07.940000 +CVE-2014-2347,0,0,df5b7308ac48c3c64defdb4853bce0f182297347888936b7437fd20b612fc0c3,2024-11-21T02:06:07.627000 +CVE-2014-2349,0,0,ccb7aeba97fe30106bb3568564f59280215d09fa65e8fd0dd6a5ce3255bb9e24,2024-11-21T02:06:07.730000 +CVE-2014-2350,0,0,3272e459f1ca16e1d39b6af8893fd87144b06bef05ddd83d7d3261f39e7dc704,2024-11-21T02:06:07.837000 +CVE-2014-2351,0,0,24bbab8e4f10457fe51c2c549223b5d10238f545e9de26929f6ffdabbfecf708,2024-11-21T02:06:07.940000 CVE-2014-2352,0,0,a0a3e8e551b83d631a8990a68bc7b48c2213589e1f823c4097bc218f3c47968b,2014-06-05T12:49:11.810000 CVE-2014-2353,0,0,980efb9f09fcfb670ed3810e8fb68770bbc5d8369a434d575a4a38588a7a54fe,2014-06-05T12:36:32.270000 CVE-2014-2354,0,0,3c49be4f6f11497eaee95e213f8c0d71d5f4f250bd5f7a75260c2af6b708fbd0,2014-06-05T12:40:41.283000 @@ -66720,92 +66720,92 @@ CVE-2014-2379,0,0,8884e9f55b8e4d0beec065072b155c9ad662dd5a6c77cfe8138640530d1c29 CVE-2014-2380,0,0,9bd36fc21428e382976766a0ceee38ac673f8804574870f754bc99e1169ec518,2014-08-28T15:01:59.097000 CVE-2014-2381,0,0,12aea592ea39153771f54c1636a8ae13d68a73167a4525bdae72a754abd970b6,2014-08-28T15:07:20.013000 CVE-2014-2382,0,0,0d5efd27e45596e299f32a5ac8dad5cbe7ae4b7679b3607a7aceda078800e306,2014-11-20T14:04:23.263000 -CVE-2014-2383,0,1,516e5be2608c33474c9a1b334a1c74b3b868d3c42eb91f17d413114302e9a7d9,2024-11-21T02:06:11.160000 -CVE-2014-2384,0,1,8520daadd639e19180d0df03813d7457a936558ee1f2d35d41f40178c6a83ac8,2024-11-21T02:06:11.310000 +CVE-2014-2383,0,0,516e5be2608c33474c9a1b334a1c74b3b868d3c42eb91f17d413114302e9a7d9,2024-11-21T02:06:11.160000 +CVE-2014-2384,0,0,8520daadd639e19180d0df03813d7457a936558ee1f2d35d41f40178c6a83ac8,2024-11-21T02:06:11.310000 CVE-2014-2385,0,0,b6db85347f21555a4bc3fa3eccca980f67982ae1a472149fdd6266518674157c,2018-10-09T19:43:14.720000 -CVE-2014-2386,0,1,445f98f5e58341dcca32ed78853b63e1673980d4e3875038731fc1527426f080,2024-11-21T02:06:11.570000 +CVE-2014-2386,0,0,445f98f5e58341dcca32ed78853b63e1673980d4e3875038731fc1527426f080,2024-11-21T02:06:11.570000 CVE-2014-2387,0,0,36fa5a28b5b65ece74f94295c415a7b65e4b2c03373e411c32130afb4fbd5345,2019-12-19T20:12:50.620000 CVE-2014-2388,0,0,8da513b19a9e080145b5054091d77f8e950913bc40965ff137ea598a802c80f3,2018-10-09T19:43:15.207000 -CVE-2014-2389,0,1,5480606d98f87a14a5dc50a3dcf84d9d5129cc2f63a21aa481c3d7f75cb2b0eb,2024-11-21T02:06:12.040000 +CVE-2014-2389,0,0,5480606d98f87a14a5dc50a3dcf84d9d5129cc2f63a21aa481c3d7f75cb2b0eb,2024-11-21T02:06:12.040000 CVE-2014-2390,0,0,ae98d9de7156c1ad92b469a8eccef753e58a2250b3a245b7a78f008ba7691117,2018-12-12T18:28:04.850000 -CVE-2014-2391,0,1,c27b34d91f4b484a1aa24023fb3a40a2bf37fe27fe2ba26049048dc71bbb8bb5,2024-11-21T02:06:12.320000 -CVE-2014-2392,0,1,266e6ea2724ef2ea03c5a92d041daaea8770ac983a50c833e63a1a8142844f00,2024-11-21T02:06:12.453000 -CVE-2014-2393,0,1,901bbc4de1ab988d11363536dcff13b62b330dbb267a5b38c120e289d0e524a2,2024-11-21T02:06:12.587000 -CVE-2014-2397,0,1,f55e8235f72fac3e852707ed90b661034a0b7be1965ae667d9af02624005ca93,2024-11-21T02:06:12.717000 -CVE-2014-2398,0,1,5fbec211d2d85d89d4c248302543a1a90c6d93650d40fba7d9aefff2ce715cd7,2024-11-21T02:06:12.877000 -CVE-2014-2399,0,1,7e077089bf1bb4fa29cd2d4aaa15b64afca68ae12a7ce6ab8e00698215139d62,2024-11-21T02:06:13.070000 -CVE-2014-2400,0,1,2bf646592efa1b61cc4c644a15bff98d4be09f6290d40baf12b4f3dd3d3952e5,2024-11-21T02:06:13.177000 -CVE-2014-2401,0,1,ec20986def480b11c26b50bddcc400b9ee81fc3bfde457abf9c0cdb6470d3ac7,2024-11-21T02:06:13.290000 -CVE-2014-2402,0,1,079cc3fd12fc77c875cddea1e4451609374b6360c4baa3e71cad66c1172441ce,2024-11-21T02:06:13.440000 -CVE-2014-2403,0,1,fec9430aa5f1826c0f2a8b28493c79d7fa67059ee854246d6d7a76b5689ca8e8,2024-11-21T02:06:13.577000 -CVE-2014-2404,0,1,da4dee0240d1e74436532ef18269d33b5cc099e25c5d3a209d72e96d9d207acd,2024-11-21T02:06:13.743000 -CVE-2014-2405,0,1,0dc9d351c4d3502dcf2a5f43efe186d11bcf48045382fac61ae297ef619ab7ab,2024-11-21T02:06:13.850000 -CVE-2014-2406,0,1,c22b5d64f038c448bcea3b937a73609a33f6f8e90a8592606bb6081de4cc6fea,2024-11-21T02:06:13.957000 -CVE-2014-2407,0,1,1fc696ebbf26f9d1312b853ad87d8f5ac590bc42d5ea829ecfd0578d4ec3233a,2024-11-21T02:06:14.063000 -CVE-2014-2408,0,1,d8beec7e8d3c886aa562e9117616167fe9c10779e1fb95cd1b52e8b8689b919a,2024-11-21T02:06:14.170000 -CVE-2014-2409,0,1,b1953f096165de81bccdba4f0d201b6baa8edb05211b8db78b7349b5cb431bb6,2024-11-21T02:06:14.280000 -CVE-2014-2410,0,1,2f78ae4f5a2ecf7daa81dcbeffbefe4f3fbe28f8d19409b90c700ec07b25aecc,2024-11-21T02:06:14.423000 -CVE-2014-2411,0,1,738d8c1a2f27ea9fde9553886d64e874e9bd337dc988e982a120bfe492c5f1b6,2024-11-21T02:06:14.537000 -CVE-2014-2412,0,1,2b6d056e3e3e48a4f94d87c543d0058ec419308e74ecb3c5a0f263774a44d813,2024-11-21T02:06:14.640000 -CVE-2014-2413,0,1,db83481fdf5deb7ecd0fee8d2caf97de322ed4675a3dc12244a71c8e3ff44779,2024-11-21T02:06:14.820000 -CVE-2014-2414,0,1,eba3fb75992753368e4379bcafbb10f448b0e09eaab03ebaeb77bba7fbb9b2f4,2024-11-21T02:06:14.957000 -CVE-2014-2415,0,1,12cfd0a451730a99ea8a501252a3a79f0e6bbf07cd18255f31a377f74ade3870,2024-11-21T02:06:15.140000 -CVE-2014-2416,0,1,b97333f7e4c6bfc6cbaa4e2eb6ac30183c32d46db3faa4f6b7a05cd740bae63a,2024-11-21T02:06:15.243000 -CVE-2014-2417,0,1,0cd5e50cf408b774600e771c8a77c8e48e79c64dff75f2ce13c68f12b65fe5e1,2024-11-21T02:06:15.347000 -CVE-2014-2418,0,1,feaa5b868877b6d79e6f718e07beccc31d59d666377a3995a33d07ce157f44f1,2024-11-21T02:06:15.453000 -CVE-2014-2419,0,1,210ad983fdb36a5983da52c959c7a8b505345f6cd426301537adeceb331da696,2024-11-21T02:06:15.560000 -CVE-2014-2420,0,1,036c077691e14c5abc14505faa8bac856ef56607f05cc03069b8a9d87fa97467,2024-11-21T02:06:15.707000 -CVE-2014-2421,0,1,50544fd34f24ccc9c7cf17591444997b99592d2a141d4661bce7c492eca46828,2024-11-21T02:06:15.870000 -CVE-2014-2422,0,1,26ee9e91f4cc2299fc960a338f979593ea40015cd3e35d089aadef5424f1c025,2024-11-21T02:06:16.077000 -CVE-2014-2423,0,1,bb50c045621099feef4030d03be9a1d687948cc6a38af2ff1f0184b738afbaae,2024-11-21T02:06:16.213000 -CVE-2014-2424,0,1,34d0e1e27f45a545c3369318947492e625866454c4a0f3d6eeaaf1f9f2bd4141,2024-11-21T02:06:16.413000 -CVE-2014-2425,0,1,febbcfd5cc582637353955d4023a1f49edd3b0376aa850376c23ba279a5d2de3,2024-11-21T02:06:16.540000 -CVE-2014-2426,0,1,ca7bfce566c193fb2bf285b8a00325d0b126a8df09d1e414a7010f76e92cf48e,2024-11-21T02:06:16.657000 -CVE-2014-2427,0,1,28cda6e626f7a2145b07f90885f24f8d85a217ecf8a53fa22bede3d81d1b058f,2024-11-21T02:06:16.770000 -CVE-2014-2428,0,1,9558a7cfa4138eb3bc2bb6f6dfbd3cdacaacb5c77eb2933efe13adc1152f68fe,2024-11-21T02:06:16.987000 -CVE-2014-2429,0,1,0fe1f8fd7c6cd60e77c46c5f713cd1ebdd15bd48ce0337b25a7660f0a76ba4a4,2024-11-21T02:06:17.173000 -CVE-2014-2430,0,1,827df9776c3ec4d10544b09f19899e742f89211b618bafb32f48223903cdbfac,2024-11-21T02:06:17.293000 -CVE-2014-2431,0,1,0b9445a3961d69555b6f83c12e2b48841914c5589911655f4575a4337136e1c6,2024-11-21T02:06:17.433000 -CVE-2014-2432,0,1,eb055529cd8417d499eeef4170d36290e728d17e2f2cb9def8edf99934339f78,2024-11-21T02:06:17.570000 -CVE-2014-2433,0,1,d17f754f122569a4ad053a95fe38c6626e97f7538a23815380718291359a89d3,2024-11-21T02:06:17.707000 -CVE-2014-2434,0,1,8a86c4f7dbfbfb98d3d1d0912f8ed28aba01a84dfef4146a2fe70bff5c33fb11,2024-11-21T02:06:17.817000 -CVE-2014-2435,0,1,4a66f69b53fafb69fab3b7a65ae370c9110ec7d91a579b759a4444b03c00e429,2024-11-21T02:06:17.933000 -CVE-2014-2436,0,1,a72e5497c70cba3b15794f2ed84c04f09e6922e69d80949ddc5705edc6a7d5a9,2024-11-21T02:06:18.047000 -CVE-2014-2437,0,1,81300c156b8984b4277c50a8fc97a3485ec0b5cd75dec4b5a635811c03d16a51,2024-11-21T02:06:18.183000 -CVE-2014-2438,0,1,c309232e612eadebe6f67df466b88ee5e77f6a50c2d9f282ae7f1bfbb11191e2,2024-11-21T02:06:18.290000 -CVE-2014-2439,0,1,0a24ad0b2eb4078a3c2d3892ddacd428eada92a00e3e05f05ca20c092702f307,2024-11-21T02:06:18.420000 -CVE-2014-2440,0,1,d053fa64e6a235253a7d39c6efb1ed1f6f2e50a583ef6465bf93d6a0e197115f,2024-11-21T02:06:18.517000 -CVE-2014-2441,0,1,57e92ba4b222c4ae49a9490013aa90bc2b2559fbff74272703d49596f6cb26cb,2024-11-21T02:06:18.650000 -CVE-2014-2442,0,1,2f2411265c6cf8c3fa29ef0c3a459474876e1c6ae856585978f1923a8d347256,2024-11-21T02:06:18.750000 -CVE-2014-2443,0,1,6d5b827eebe0074c471f6c2f7f89eefe03bd2cadcd2a6d0d3c3c6f9b722691b1,2024-11-21T02:06:18.870000 -CVE-2014-2444,0,1,a97e550529995851cb4cf7c79b30d3eba64cc9b92884f6953bdc89937a23cef9,2024-11-21T02:06:18.973000 -CVE-2014-2445,0,1,e6aa4254dbad7dae8f88126a3b3095c4a2f261431e9cf7c79553ca195f2c43c0,2024-11-21T02:06:19.080000 -CVE-2014-2446,0,1,31db990b9b47ef66b5b0ce1a416cb877296889b92152126d3894cd5848ef6847,2024-11-21T02:06:19.187000 -CVE-2014-2447,0,1,fe3036f60b031c1a3dbcb68cb50e0e75b6735c4d7bdad4780c97357b76eb46eb,2024-11-21T02:06:19.290000 -CVE-2014-2448,0,1,27c60b9cf780a48b1cf7a52a54ce96a7cae02865e05b5cbd92f439573f01111f,2024-11-21T02:06:19.397000 -CVE-2014-2449,0,1,7c55f0f1470906ab8d30830ab9c2e044a87f84a2ca11b568b73b2ab03a2d979b,2024-11-21T02:06:19.503000 -CVE-2014-2450,0,1,f95df972cea49ee0ffa35b429156d986aaca05bd993597d8fa2d7934cbcddac6,2024-11-21T02:06:19.607000 -CVE-2014-2451,0,1,da294d84191ca3f15b99ec2ba55649f2bda61682f22419e9ca9b2b3fddd8b529,2024-11-21T02:06:19.723000 -CVE-2014-2452,0,1,75b007606cafc618a12dc2846e1a385dee86bab305e4872a99298c01747262b8,2024-11-21T02:06:19.837000 -CVE-2014-2453,0,1,f42d30ed1e02ac1558bd707c736799d895edf13374a233ea2905bf80cd082dc4,2024-11-21T02:06:19.947000 -CVE-2014-2454,0,1,1025907e8ca4220935009b03babce140bc41e168b380bf7518ca382348ac50eb,2024-11-21T02:06:20.053000 -CVE-2014-2455,0,1,557ac86227c13f56fc7be9ef3e31444228c720ae447c8996ae8453a98db7b9f4,2024-11-21T02:06:20.160000 +CVE-2014-2391,0,0,c27b34d91f4b484a1aa24023fb3a40a2bf37fe27fe2ba26049048dc71bbb8bb5,2024-11-21T02:06:12.320000 +CVE-2014-2392,0,0,266e6ea2724ef2ea03c5a92d041daaea8770ac983a50c833e63a1a8142844f00,2024-11-21T02:06:12.453000 +CVE-2014-2393,0,0,901bbc4de1ab988d11363536dcff13b62b330dbb267a5b38c120e289d0e524a2,2024-11-21T02:06:12.587000 +CVE-2014-2397,0,0,f55e8235f72fac3e852707ed90b661034a0b7be1965ae667d9af02624005ca93,2024-11-21T02:06:12.717000 +CVE-2014-2398,0,0,5fbec211d2d85d89d4c248302543a1a90c6d93650d40fba7d9aefff2ce715cd7,2024-11-21T02:06:12.877000 +CVE-2014-2399,0,0,7e077089bf1bb4fa29cd2d4aaa15b64afca68ae12a7ce6ab8e00698215139d62,2024-11-21T02:06:13.070000 +CVE-2014-2400,0,0,2bf646592efa1b61cc4c644a15bff98d4be09f6290d40baf12b4f3dd3d3952e5,2024-11-21T02:06:13.177000 +CVE-2014-2401,0,0,ec20986def480b11c26b50bddcc400b9ee81fc3bfde457abf9c0cdb6470d3ac7,2024-11-21T02:06:13.290000 +CVE-2014-2402,0,0,079cc3fd12fc77c875cddea1e4451609374b6360c4baa3e71cad66c1172441ce,2024-11-21T02:06:13.440000 +CVE-2014-2403,0,0,fec9430aa5f1826c0f2a8b28493c79d7fa67059ee854246d6d7a76b5689ca8e8,2024-11-21T02:06:13.577000 +CVE-2014-2404,0,0,da4dee0240d1e74436532ef18269d33b5cc099e25c5d3a209d72e96d9d207acd,2024-11-21T02:06:13.743000 +CVE-2014-2405,0,0,0dc9d351c4d3502dcf2a5f43efe186d11bcf48045382fac61ae297ef619ab7ab,2024-11-21T02:06:13.850000 +CVE-2014-2406,0,0,c22b5d64f038c448bcea3b937a73609a33f6f8e90a8592606bb6081de4cc6fea,2024-11-21T02:06:13.957000 +CVE-2014-2407,0,0,1fc696ebbf26f9d1312b853ad87d8f5ac590bc42d5ea829ecfd0578d4ec3233a,2024-11-21T02:06:14.063000 +CVE-2014-2408,0,0,d8beec7e8d3c886aa562e9117616167fe9c10779e1fb95cd1b52e8b8689b919a,2024-11-21T02:06:14.170000 +CVE-2014-2409,0,0,b1953f096165de81bccdba4f0d201b6baa8edb05211b8db78b7349b5cb431bb6,2024-11-21T02:06:14.280000 +CVE-2014-2410,0,0,2f78ae4f5a2ecf7daa81dcbeffbefe4f3fbe28f8d19409b90c700ec07b25aecc,2024-11-21T02:06:14.423000 +CVE-2014-2411,0,0,738d8c1a2f27ea9fde9553886d64e874e9bd337dc988e982a120bfe492c5f1b6,2024-11-21T02:06:14.537000 +CVE-2014-2412,0,0,2b6d056e3e3e48a4f94d87c543d0058ec419308e74ecb3c5a0f263774a44d813,2024-11-21T02:06:14.640000 +CVE-2014-2413,0,0,db83481fdf5deb7ecd0fee8d2caf97de322ed4675a3dc12244a71c8e3ff44779,2024-11-21T02:06:14.820000 +CVE-2014-2414,0,0,eba3fb75992753368e4379bcafbb10f448b0e09eaab03ebaeb77bba7fbb9b2f4,2024-11-21T02:06:14.957000 +CVE-2014-2415,0,0,12cfd0a451730a99ea8a501252a3a79f0e6bbf07cd18255f31a377f74ade3870,2024-11-21T02:06:15.140000 +CVE-2014-2416,0,0,b97333f7e4c6bfc6cbaa4e2eb6ac30183c32d46db3faa4f6b7a05cd740bae63a,2024-11-21T02:06:15.243000 +CVE-2014-2417,0,0,0cd5e50cf408b774600e771c8a77c8e48e79c64dff75f2ce13c68f12b65fe5e1,2024-11-21T02:06:15.347000 +CVE-2014-2418,0,0,feaa5b868877b6d79e6f718e07beccc31d59d666377a3995a33d07ce157f44f1,2024-11-21T02:06:15.453000 +CVE-2014-2419,0,0,210ad983fdb36a5983da52c959c7a8b505345f6cd426301537adeceb331da696,2024-11-21T02:06:15.560000 +CVE-2014-2420,0,0,036c077691e14c5abc14505faa8bac856ef56607f05cc03069b8a9d87fa97467,2024-11-21T02:06:15.707000 +CVE-2014-2421,0,0,50544fd34f24ccc9c7cf17591444997b99592d2a141d4661bce7c492eca46828,2024-11-21T02:06:15.870000 +CVE-2014-2422,0,0,26ee9e91f4cc2299fc960a338f979593ea40015cd3e35d089aadef5424f1c025,2024-11-21T02:06:16.077000 +CVE-2014-2423,0,0,bb50c045621099feef4030d03be9a1d687948cc6a38af2ff1f0184b738afbaae,2024-11-21T02:06:16.213000 +CVE-2014-2424,0,0,34d0e1e27f45a545c3369318947492e625866454c4a0f3d6eeaaf1f9f2bd4141,2024-11-21T02:06:16.413000 +CVE-2014-2425,0,0,febbcfd5cc582637353955d4023a1f49edd3b0376aa850376c23ba279a5d2de3,2024-11-21T02:06:16.540000 +CVE-2014-2426,0,0,ca7bfce566c193fb2bf285b8a00325d0b126a8df09d1e414a7010f76e92cf48e,2024-11-21T02:06:16.657000 +CVE-2014-2427,0,0,28cda6e626f7a2145b07f90885f24f8d85a217ecf8a53fa22bede3d81d1b058f,2024-11-21T02:06:16.770000 +CVE-2014-2428,0,0,9558a7cfa4138eb3bc2bb6f6dfbd3cdacaacb5c77eb2933efe13adc1152f68fe,2024-11-21T02:06:16.987000 +CVE-2014-2429,0,0,0fe1f8fd7c6cd60e77c46c5f713cd1ebdd15bd48ce0337b25a7660f0a76ba4a4,2024-11-21T02:06:17.173000 +CVE-2014-2430,0,0,827df9776c3ec4d10544b09f19899e742f89211b618bafb32f48223903cdbfac,2024-11-21T02:06:17.293000 +CVE-2014-2431,0,0,0b9445a3961d69555b6f83c12e2b48841914c5589911655f4575a4337136e1c6,2024-11-21T02:06:17.433000 +CVE-2014-2432,0,0,eb055529cd8417d499eeef4170d36290e728d17e2f2cb9def8edf99934339f78,2024-11-21T02:06:17.570000 +CVE-2014-2433,0,0,d17f754f122569a4ad053a95fe38c6626e97f7538a23815380718291359a89d3,2024-11-21T02:06:17.707000 +CVE-2014-2434,0,0,8a86c4f7dbfbfb98d3d1d0912f8ed28aba01a84dfef4146a2fe70bff5c33fb11,2024-11-21T02:06:17.817000 +CVE-2014-2435,0,0,4a66f69b53fafb69fab3b7a65ae370c9110ec7d91a579b759a4444b03c00e429,2024-11-21T02:06:17.933000 +CVE-2014-2436,0,0,a72e5497c70cba3b15794f2ed84c04f09e6922e69d80949ddc5705edc6a7d5a9,2024-11-21T02:06:18.047000 +CVE-2014-2437,0,0,81300c156b8984b4277c50a8fc97a3485ec0b5cd75dec4b5a635811c03d16a51,2024-11-21T02:06:18.183000 +CVE-2014-2438,0,0,c309232e612eadebe6f67df466b88ee5e77f6a50c2d9f282ae7f1bfbb11191e2,2024-11-21T02:06:18.290000 +CVE-2014-2439,0,0,0a24ad0b2eb4078a3c2d3892ddacd428eada92a00e3e05f05ca20c092702f307,2024-11-21T02:06:18.420000 +CVE-2014-2440,0,0,d053fa64e6a235253a7d39c6efb1ed1f6f2e50a583ef6465bf93d6a0e197115f,2024-11-21T02:06:18.517000 +CVE-2014-2441,0,0,57e92ba4b222c4ae49a9490013aa90bc2b2559fbff74272703d49596f6cb26cb,2024-11-21T02:06:18.650000 +CVE-2014-2442,0,0,2f2411265c6cf8c3fa29ef0c3a459474876e1c6ae856585978f1923a8d347256,2024-11-21T02:06:18.750000 +CVE-2014-2443,0,0,6d5b827eebe0074c471f6c2f7f89eefe03bd2cadcd2a6d0d3c3c6f9b722691b1,2024-11-21T02:06:18.870000 +CVE-2014-2444,0,0,a97e550529995851cb4cf7c79b30d3eba64cc9b92884f6953bdc89937a23cef9,2024-11-21T02:06:18.973000 +CVE-2014-2445,0,0,e6aa4254dbad7dae8f88126a3b3095c4a2f261431e9cf7c79553ca195f2c43c0,2024-11-21T02:06:19.080000 +CVE-2014-2446,0,0,31db990b9b47ef66b5b0ce1a416cb877296889b92152126d3894cd5848ef6847,2024-11-21T02:06:19.187000 +CVE-2014-2447,0,0,fe3036f60b031c1a3dbcb68cb50e0e75b6735c4d7bdad4780c97357b76eb46eb,2024-11-21T02:06:19.290000 +CVE-2014-2448,0,0,27c60b9cf780a48b1cf7a52a54ce96a7cae02865e05b5cbd92f439573f01111f,2024-11-21T02:06:19.397000 +CVE-2014-2449,0,0,7c55f0f1470906ab8d30830ab9c2e044a87f84a2ca11b568b73b2ab03a2d979b,2024-11-21T02:06:19.503000 +CVE-2014-2450,0,0,f95df972cea49ee0ffa35b429156d986aaca05bd993597d8fa2d7934cbcddac6,2024-11-21T02:06:19.607000 +CVE-2014-2451,0,0,da294d84191ca3f15b99ec2ba55649f2bda61682f22419e9ca9b2b3fddd8b529,2024-11-21T02:06:19.723000 +CVE-2014-2452,0,0,75b007606cafc618a12dc2846e1a385dee86bab305e4872a99298c01747262b8,2024-11-21T02:06:19.837000 +CVE-2014-2453,0,0,f42d30ed1e02ac1558bd707c736799d895edf13374a233ea2905bf80cd082dc4,2024-11-21T02:06:19.947000 +CVE-2014-2454,0,0,1025907e8ca4220935009b03babce140bc41e168b380bf7518ca382348ac50eb,2024-11-21T02:06:20.053000 +CVE-2014-2455,0,0,557ac86227c13f56fc7be9ef3e31444228c720ae447c8996ae8453a98db7b9f4,2024-11-21T02:06:20.160000 CVE-2014-2456,0,0,068d6f55c88b0fd9ff39bd82d1cd0548d7c3729f965d5f90e56a89b6d283a553,2018-10-09T19:43:17.017000 -CVE-2014-2457,0,1,ab7c2738054f72cf325fd097eb3235b00956219884ba74c8b0d5752733abd9a6,2024-11-21T02:06:20.387000 -CVE-2014-2458,0,1,7c88bbf3a9417f3858e0a2bccabd8a70b43d12f459abd82bcd56003f08da52b9,2024-11-21T02:06:20.500000 -CVE-2014-2459,0,1,9f7f4dfeb2a43f9c76d6e4d68e32a020581c45c70b009f4435810eec61b764b6,2024-11-21T02:06:20.610000 -CVE-2014-2460,0,1,3cf6a463f49b1c020bab1175263db52047be982a3b35bdefb5a99b460c0d1431,2024-11-21T02:06:20.710000 -CVE-2014-2461,0,1,8e7d2a335b93d2ec46d96f7faa0458b05a93858d2261080410a9ea94c64172b7,2024-11-21T02:06:20.833000 +CVE-2014-2457,0,0,ab7c2738054f72cf325fd097eb3235b00956219884ba74c8b0d5752733abd9a6,2024-11-21T02:06:20.387000 +CVE-2014-2458,0,0,7c88bbf3a9417f3858e0a2bccabd8a70b43d12f459abd82bcd56003f08da52b9,2024-11-21T02:06:20.500000 +CVE-2014-2459,0,0,9f7f4dfeb2a43f9c76d6e4d68e32a020581c45c70b009f4435810eec61b764b6,2024-11-21T02:06:20.610000 +CVE-2014-2460,0,0,3cf6a463f49b1c020bab1175263db52047be982a3b35bdefb5a99b460c0d1431,2024-11-21T02:06:20.710000 +CVE-2014-2461,0,0,8e7d2a335b93d2ec46d96f7faa0458b05a93858d2261080410a9ea94c64172b7,2024-11-21T02:06:20.833000 CVE-2014-2462,0,0,6dfa13c93c28a266ceab84f96e5b7841e708423f162f72f29064552401f9d480,2023-11-07T02:19:34.273000 -CVE-2014-2463,0,1,363bc1dd64f3f56c5b925df9d34fdcdd236543ef9c54755d7adc8175e0406d00,2024-11-21T02:06:20.957000 -CVE-2014-2464,0,1,2524c0385e5d9825a4f6f109b8d850489e3da265bacbf7327a7d998b87563b93,2024-11-21T02:06:21.080000 -CVE-2014-2465,0,1,aa084cc7775e5b3ed84ed6c77b2f425214723df653cb92e6e417e29c527138e2,2024-11-21T02:06:21.187000 -CVE-2014-2466,0,1,69a8fc158e66dc96189d77cd3ab1d5c1974662f9d371d878ab5e2fae2a3635be,2024-11-21T02:06:21.303000 -CVE-2014-2467,0,1,743417f1477026e38d8ff35bb8c785df992928de5c23edfdbd02df56496ce34c,2024-11-21T02:06:21.410000 -CVE-2014-2468,0,1,c8ac2dd3b35ec2ebf7f2d1a733426fd857d161392502cd8f30cc7f665e7f900d,2024-11-21T02:06:21.520000 -CVE-2014-2469,0,1,685c45cecc59e0bc0c2c6db18eedb39cf1f3d18a96ab235ee792a6f3d43c2926,2024-11-21T02:06:21.630000 -CVE-2014-2470,0,1,2b36fd05aae9e75badd4e5b4d5876e99868f4b4077bfa1742fbcd18403ad18ef,2024-11-21T02:06:21.750000 -CVE-2014-2471,0,1,682942d660c73de59abf5976c954230ddb1fa727dab51ae7ad61ba0f86281d1c,2024-11-21T02:06:21.870000 +CVE-2014-2463,0,0,363bc1dd64f3f56c5b925df9d34fdcdd236543ef9c54755d7adc8175e0406d00,2024-11-21T02:06:20.957000 +CVE-2014-2464,0,0,2524c0385e5d9825a4f6f109b8d850489e3da265bacbf7327a7d998b87563b93,2024-11-21T02:06:21.080000 +CVE-2014-2465,0,0,aa084cc7775e5b3ed84ed6c77b2f425214723df653cb92e6e417e29c527138e2,2024-11-21T02:06:21.187000 +CVE-2014-2466,0,0,69a8fc158e66dc96189d77cd3ab1d5c1974662f9d371d878ab5e2fae2a3635be,2024-11-21T02:06:21.303000 +CVE-2014-2467,0,0,743417f1477026e38d8ff35bb8c785df992928de5c23edfdbd02df56496ce34c,2024-11-21T02:06:21.410000 +CVE-2014-2468,0,0,c8ac2dd3b35ec2ebf7f2d1a733426fd857d161392502cd8f30cc7f665e7f900d,2024-11-21T02:06:21.520000 +CVE-2014-2469,0,0,685c45cecc59e0bc0c2c6db18eedb39cf1f3d18a96ab235ee792a6f3d43c2926,2024-11-21T02:06:21.630000 +CVE-2014-2470,0,0,2b36fd05aae9e75badd4e5b4d5876e99868f4b4077bfa1742fbcd18403ad18ef,2024-11-21T02:06:21.750000 +CVE-2014-2471,0,0,682942d660c73de59abf5976c954230ddb1fa727dab51ae7ad61ba0f86281d1c,2024-11-21T02:06:21.870000 CVE-2014-2472,0,0,7014e10eb409b86269014f0c2deeddcf5f90aa8056955389349dfb493ba918d7,2014-11-19T03:00:34.483000 CVE-2014-2473,0,0,0f86d7bb8173c5426eff4e4ad8895af6e9c84818b772edc8c2ecb656638ee013,2014-11-19T03:00:35.793000 CVE-2014-2474,0,0,3147ee0e5bc8ba9961079e8311edfd26a1fc0a9de492a7c0436106bee6af4735,2014-11-19T03:00:36.997000 @@ -66831,10 +66831,10 @@ CVE-2014-2493,0,0,e33d89da55f18c5620f4c17f7102fa00edc0e4b091a9bc21100d737d282e8d CVE-2014-2494,0,0,91f7f2aa228fb3f673e8c95f010eaa30786fccdd245e252cdb3efebb2e4e3853,2022-08-26T16:12:44.513000 CVE-2014-2495,0,0,c6396661f638f7a8094a6a2041bd70e1f70ca0c2a187cc0c9d4564b2d5e3194d,2018-10-09T19:43:27.207000 CVE-2014-2496,0,0,0c369d5f076237eda748403a01f137ee5348a0299a42a02ce52da2982dbdc229,2018-10-09T19:43:27.627000 -CVE-2014-2497,0,1,540dfc6af01af5d048f12f5d2c35db254f9fa999757c245bea35dde161b70b75,2024-11-21T02:06:25.483000 +CVE-2014-2497,0,0,540dfc6af01af5d048f12f5d2c35db254f9fa999757c245bea35dde161b70b75,2024-11-21T02:06:25.483000 CVE-2014-2502,0,0,93574f66bdddd346da5be62e4cb76f84944fd10d995f93d3550dcb219c0a8058,2014-06-18T04:32:05.350000 CVE-2014-2503,0,0,7a06e31c358d784f445b2f251b223cb9f0bb37278ffec1afcc1bf4cbb3d7d513,2014-06-18T04:32:05.553000 -CVE-2014-2504,0,1,5f3e889dd8a860766bd54e24a68aec465b595f85442d3d49023f7c1320bf0950,2024-11-21T02:06:25.907000 +CVE-2014-2504,0,0,5f3e889dd8a860766bd54e24a68aec465b595f85442d3d49023f7c1320bf0950,2024-11-21T02:06:25.907000 CVE-2014-2505,0,0,78d6326f7021b8c8cc5436c1637790d9676eaa77945a85ecda0845a3dbf5cb23,2017-08-29T01:34:31.170000 CVE-2014-2506,0,0,62e14e78838db5ca0df313048c019a15477fffb0a395b983c010c3f9b3721c50,2018-10-09T19:43:28.033000 CVE-2014-2507,0,0,a42fe6b7ca5d6297b28de2c63a765c82fd1a98d0e343d7a5831d2467c7245f14,2018-10-09T19:43:28.533000 @@ -66852,70 +66852,70 @@ CVE-2014-2518,0,0,b30bad8bd77595baec1e435229d4d2aa29533c525e06b6ab0341d0e64a5492 CVE-2014-2519,0,0,70c264b7be5727a6e7086ce02d7530da7bfe902f8a7c7f4846abf8ca40d57aa1,2017-01-07T02:59:48.283000 CVE-2014-2520,0,0,afea7e1c5270f3a33f565313fd1e38b52ef277c813e8086217f23ec277e7246f,2017-08-29T01:34:31.437000 CVE-2014-2521,0,0,3d661646082b6549cd79f8feb52cf1e956387f42dd2c499d63f16d190bcefbe0,2017-08-29T01:34:31.483000 -CVE-2014-2522,0,1,8100326234b1e38e3b00c88380b14da9952dabd9e96f34c4bd491caa22e91a90,2024-11-21T02:06:27.957000 -CVE-2014-2523,0,1,190da8721906d07b5d7a1f30c796d2dc2734ba65a38607f30740dfa1391b4c6c,2024-11-21T02:06:28.123000 +CVE-2014-2522,0,0,8100326234b1e38e3b00c88380b14da9952dabd9e96f34c4bd491caa22e91a90,2024-11-21T02:06:27.957000 +CVE-2014-2523,0,0,190da8721906d07b5d7a1f30c796d2dc2734ba65a38607f30740dfa1391b4c6c,2024-11-21T02:06:28.123000 CVE-2014-2524,0,0,056bd09041a4535bd43b5ccbdfe072424427193ed5ebcb8c7438da9f5dbe4c72,2018-10-30T16:27:34.687000 -CVE-2014-2525,0,1,8e393dfff9c075cc70b1e22d45ad896b8fd4bf0b317db559877956c5301f63e3,2024-11-21T02:06:28.450000 -CVE-2014-2526,0,1,02cc61b2650cdc6f40808034f4c36c5b3fea58d022712759c74cfc6085238fd3,2024-11-21T02:06:28.623000 +CVE-2014-2525,0,0,8e393dfff9c075cc70b1e22d45ad896b8fd4bf0b317db559877956c5301f63e3,2024-11-21T02:06:28.450000 +CVE-2014-2526,0,0,02cc61b2650cdc6f40808034f4c36c5b3fea58d022712759c74cfc6085238fd3,2024-11-21T02:06:28.623000 CVE-2014-2527,0,0,55def8a67a813d1b60ddab78639b573ed8e41de32bc8fa8602b31df3f1b4ece4,2018-10-30T16:27:34.687000 CVE-2014-2528,0,0,e0c965e5209e733b526055ffc5643e63d05596e2f6df63392c578ae00ae3aa70,2018-10-30T16:27:34.687000 CVE-2014-2531,0,0,2aed6859638f0c5e9fcd55b08fc8a9da3c7d47ab406f4768ae184a7dda34051c,2023-11-07T02:19:35.083000 -CVE-2014-2532,0,1,32f073495a2179240344579d86408a96d7a8ad72f148a99667e6d8333a1b0069,2024-11-21T02:06:29.197000 -CVE-2014-2533,0,1,f13ed653c8ccae85f0e921daa7e0f3d46f9372566f171da544aa11e50d98f5f0,2024-11-21T02:06:29.400000 -CVE-2014-2534,0,1,83dc7867439fff1557a12e6d1591caf660b2efe6f69c8caa27217c724d2df947,2024-11-21T02:06:29.550000 -CVE-2014-2535,0,1,f6bdbbf3493698cddd5974179c891e437807b9d6f283e7d0aaf3909ba5db3141,2024-11-21T02:06:29.690000 -CVE-2014-2536,0,1,b96c33a1316d1e36d245a798f1fd4e599a623f8ca7e86b8e0771328ae416aea4,2024-11-21T02:06:29.820000 -CVE-2014-2537,0,1,2394a89eb5ca0bc0e9ab0f5280fa8279597d42df00506197aef846301d01ba93,2024-11-21T02:06:29.977000 -CVE-2014-2538,0,1,980415f78e26987fa5278208926e4ee0b78b915c8eda646c6f4d253968484db4,2024-11-21T02:06:30.130000 -CVE-2014-2540,0,1,3d8fa0e70eace8805ed2a7202d9536b10c23ad24912dfcff782dd48b91054c7b,2024-11-21T02:06:30.280000 -CVE-2014-2541,0,1,8895534297008b8ada075b7e8c26f02566d997e2b50e7ee845a03284b9564315,2024-11-21T02:06:30.430000 -CVE-2014-2542,0,1,2e1b77f84658703cb01213aa98910a249a86de69625c19f85373dade0e69be69,2024-11-21T02:06:30.580000 -CVE-2014-2543,0,1,2c8d14f01774ba904c87e4f81e360c25619e4c309d35d68c0cf3e6d65a839f6c,2024-11-21T02:06:30.737000 -CVE-2014-2544,0,1,a1812919b8a7dc84cdc474b181a242b6a48a72d1027e58b1b4ab1afe677dd227,2024-11-21T02:06:30.893000 -CVE-2014-2545,0,1,5a245d10c23273968bf9c2f80930110fad45f1deeb2801862c2b20ade8fa2d6d,2024-11-21T02:06:31.050000 +CVE-2014-2532,0,0,32f073495a2179240344579d86408a96d7a8ad72f148a99667e6d8333a1b0069,2024-11-21T02:06:29.197000 +CVE-2014-2533,0,0,f13ed653c8ccae85f0e921daa7e0f3d46f9372566f171da544aa11e50d98f5f0,2024-11-21T02:06:29.400000 +CVE-2014-2534,0,0,83dc7867439fff1557a12e6d1591caf660b2efe6f69c8caa27217c724d2df947,2024-11-21T02:06:29.550000 +CVE-2014-2535,0,0,f6bdbbf3493698cddd5974179c891e437807b9d6f283e7d0aaf3909ba5db3141,2024-11-21T02:06:29.690000 +CVE-2014-2536,0,0,b96c33a1316d1e36d245a798f1fd4e599a623f8ca7e86b8e0771328ae416aea4,2024-11-21T02:06:29.820000 +CVE-2014-2537,0,0,2394a89eb5ca0bc0e9ab0f5280fa8279597d42df00506197aef846301d01ba93,2024-11-21T02:06:29.977000 +CVE-2014-2538,0,0,980415f78e26987fa5278208926e4ee0b78b915c8eda646c6f4d253968484db4,2024-11-21T02:06:30.130000 +CVE-2014-2540,0,0,3d8fa0e70eace8805ed2a7202d9536b10c23ad24912dfcff782dd48b91054c7b,2024-11-21T02:06:30.280000 +CVE-2014-2541,0,0,8895534297008b8ada075b7e8c26f02566d997e2b50e7ee845a03284b9564315,2024-11-21T02:06:30.430000 +CVE-2014-2542,0,0,2e1b77f84658703cb01213aa98910a249a86de69625c19f85373dade0e69be69,2024-11-21T02:06:30.580000 +CVE-2014-2543,0,0,2c8d14f01774ba904c87e4f81e360c25619e4c309d35d68c0cf3e6d65a839f6c,2024-11-21T02:06:30.737000 +CVE-2014-2544,0,0,a1812919b8a7dc84cdc474b181a242b6a48a72d1027e58b1b4ab1afe677dd227,2024-11-21T02:06:30.893000 +CVE-2014-2545,0,0,5a245d10c23273968bf9c2f80930110fad45f1deeb2801862c2b20ade8fa2d6d,2024-11-21T02:06:31.050000 CVE-2014-2550,0,0,bff81384b243a54833cb308f6c8891d51cc1f7d1a83dfa26b9cd79463046e384,2018-04-17T14:57:19.340000 CVE-2014-2552,0,0,395dd5695e59a836ad90d798761cf160328d31976a789c0a1f11aa18cb087dc8,2018-06-06T13:11:56.743000 -CVE-2014-2553,0,1,8800f05696ad57f35c633e14e5caa3724a9c48ef16650e4b0cb9fa53ea60401d,2024-11-21T02:06:31.507000 -CVE-2014-2554,0,1,26db8fb80aecdf974c07f94b170531317ae26c11af57005b6846c1e1099f4a92,2024-11-21T02:06:31.667000 -CVE-2014-2558,0,1,f88f9aceece97a1491fe1f3ddca80bc11686f04b732f7ccbb715d7f9c9066a22,2024-11-21T02:06:31.817000 +CVE-2014-2553,0,0,8800f05696ad57f35c633e14e5caa3724a9c48ef16650e4b0cb9fa53ea60401d,2024-11-21T02:06:31.507000 +CVE-2014-2554,0,0,26db8fb80aecdf974c07f94b170531317ae26c11af57005b6846c1e1099f4a92,2024-11-21T02:06:31.667000 +CVE-2014-2558,0,0,f88f9aceece97a1491fe1f3ddca80bc11686f04b732f7ccbb715d7f9c9066a22,2024-11-21T02:06:31.817000 CVE-2014-2559,0,0,3c1718adb9a79141bc03e5120420476a075af304285b4520960f3db05a751d57,2017-08-29T01:34:31.937000 CVE-2014-2560,0,0,9658bf080980c68b14904bd19acb9866ecae5453c9e7a50606f82231b61a4645,2020-02-14T15:30:22.927000 -CVE-2014-2565,0,1,d152031be8ac12302a8317070344758e2339ad6ae1b9d9ae0e4738360ee9a97a,2024-11-21T02:06:32.307000 -CVE-2014-2567,0,1,7c05fc444d7d42f7a6d6112c938f2edf00015ccb2f6fe56920a52ceb93b6babe,2024-11-21T02:06:32.477000 -CVE-2014-2568,0,1,bfc10b2ac8a299a569389bf6a728ecbc81cca2795d23afb226ba6529316ce549,2024-11-21T02:06:32.663000 +CVE-2014-2565,0,0,d152031be8ac12302a8317070344758e2339ad6ae1b9d9ae0e4738360ee9a97a,2024-11-21T02:06:32.307000 +CVE-2014-2567,0,0,7c05fc444d7d42f7a6d6112c938f2edf00015ccb2f6fe56920a52ceb93b6babe,2024-11-21T02:06:32.477000 +CVE-2014-2568,0,0,bfc10b2ac8a299a569389bf6a728ecbc81cca2795d23afb226ba6529316ce549,2024-11-21T02:06:32.663000 CVE-2014-2570,0,0,3163dcab4518d3e320de5909172ab3c52a97dd15b74a83db1046d899df11d1ef,2018-10-09T19:43:31.127000 -CVE-2014-2571,0,1,5082535f5d6d4df3aa6029829782bdc9cb3d440f18a5306c32b49a9abdd377b1,2024-11-21T02:06:32.997000 -CVE-2014-2572,0,1,ff026c6b91a5080e39eabf15bf4aabd83ddd4109f86c5d74acdf2ebb08019e97,2024-11-21T02:06:33.163000 -CVE-2014-2573,0,1,ec9db32da59d97be9db74ee885ace3c300445cdb1116b557bad0503e24ab3e7e,2024-11-21T02:06:33.303000 +CVE-2014-2571,0,0,5082535f5d6d4df3aa6029829782bdc9cb3d440f18a5306c32b49a9abdd377b1,2024-11-21T02:06:32.997000 +CVE-2014-2572,0,0,ff026c6b91a5080e39eabf15bf4aabd83ddd4109f86c5d74acdf2ebb08019e97,2024-11-21T02:06:33.163000 +CVE-2014-2573,0,0,ec9db32da59d97be9db74ee885ace3c300445cdb1116b557bad0503e24ab3e7e,2024-11-21T02:06:33.303000 CVE-2014-2575,0,0,8daf205ed14817eb6f408122eebd38b169075cf554abbb377913a07df6d523ea,2018-10-09T19:43:31.597000 CVE-2014-2576,0,0,f85774df9923bb3b39ed43b78989e5c0ae968600287c381b2a7536f5cdeed8be,2018-10-30T16:27:34.687000 CVE-2014-2577,0,0,7333ef2b2116b7a484e81f95a43b49fe573f0ef4dc91656d5c9bf1427536f070,2018-10-09T19:43:32.377000 -CVE-2014-2578,0,1,35c9e8180ba1e82ac6fab2d108ee0369c353c52a74fea92e721f51b98aec7894,2024-11-21T02:06:33.893000 -CVE-2014-2579,0,1,e324c7dbf23f2af11d1fc241ba87d4de29afe13c80b5b8d1672a44eafbda63c3,2024-11-21T02:06:34.040000 -CVE-2014-2580,0,1,efd0c83f89ac321e2a62363418384e2143611ce6e51bc83577fd16e0b0724cd4,2024-11-21T02:06:34.187000 +CVE-2014-2578,0,0,35c9e8180ba1e82ac6fab2d108ee0369c353c52a74fea92e721f51b98aec7894,2024-11-21T02:06:33.893000 +CVE-2014-2579,0,0,e324c7dbf23f2af11d1fc241ba87d4de29afe13c80b5b8d1672a44eafbda63c3,2024-11-21T02:06:34.040000 +CVE-2014-2580,0,0,efd0c83f89ac321e2a62363418384e2143611ce6e51bc83577fd16e0b0724cd4,2024-11-21T02:06:34.187000 CVE-2014-2581,0,0,1785f07ec1dd569005f01c273034e792b43b9290f646ee7bc722f77e647412f7,2020-01-30T17:00:03.450000 -CVE-2014-2583,0,1,718be772bdd3e443591706e7138517fbcb9770aa135f0d950c12b894a3b5df8c,2024-11-21T02:06:34.500000 -CVE-2014-2585,0,1,27eca37da6203480f7b0589af67dbbaaaf7870b0918de8d56e24444cb696608d,2024-11-21T02:06:34.647000 -CVE-2014-2586,0,1,bd08dc4d3da3822cdda29b25fbea97e4bb37995c04ff4c914ff20ef721f024d9,2024-11-21T02:06:34.793000 -CVE-2014-2587,0,1,29db11473fb26d4f8fe0de5e078e6fdcc1c3325a02cb3312cb853a109da4d4df,2024-11-21T02:06:34.940000 -CVE-2014-2588,0,1,ba6cca69e1a7fd57f4b4dc5cf226466f6f21f25447e8535ab0d77b99aaae2827,2024-11-21T02:06:35.090000 -CVE-2014-2589,0,1,a5dd002b9efc5117fb0748366cfe61f0f71908ebd8707f0878bb018ea2bda37f,2024-11-21T02:06:35.240000 -CVE-2014-2590,0,1,3ee7faededb85911028a647c4e71cc46a1c348f22def95a62494d2870d440bd9,2024-11-21T02:06:35.403000 -CVE-2014-2591,0,1,978c44fe1851c863cfdef728fa0325b2399bd72092fcd95e80a6dc1ac884ca83,2024-11-21T02:06:35.557000 +CVE-2014-2583,0,0,718be772bdd3e443591706e7138517fbcb9770aa135f0d950c12b894a3b5df8c,2024-11-21T02:06:34.500000 +CVE-2014-2585,0,0,27eca37da6203480f7b0589af67dbbaaaf7870b0918de8d56e24444cb696608d,2024-11-21T02:06:34.647000 +CVE-2014-2586,0,0,bd08dc4d3da3822cdda29b25fbea97e4bb37995c04ff4c914ff20ef721f024d9,2024-11-21T02:06:34.793000 +CVE-2014-2587,0,0,29db11473fb26d4f8fe0de5e078e6fdcc1c3325a02cb3312cb853a109da4d4df,2024-11-21T02:06:34.940000 +CVE-2014-2588,0,0,ba6cca69e1a7fd57f4b4dc5cf226466f6f21f25447e8535ab0d77b99aaae2827,2024-11-21T02:06:35.090000 +CVE-2014-2589,0,0,a5dd002b9efc5117fb0748366cfe61f0f71908ebd8707f0878bb018ea2bda37f,2024-11-21T02:06:35.240000 +CVE-2014-2590,0,0,3ee7faededb85911028a647c4e71cc46a1c348f22def95a62494d2870d440bd9,2024-11-21T02:06:35.403000 +CVE-2014-2591,0,0,978c44fe1851c863cfdef728fa0325b2399bd72092fcd95e80a6dc1ac884ca83,2024-11-21T02:06:35.557000 CVE-2014-2592,0,0,ffdffe435d42bcd3d3f302a5ee3c946aa9f90505779c07034110d871aff33713,2018-03-27T19:59:43.990000 CVE-2014-2593,0,0,5bca7c821bcf1d1b44eab002db4447951e8dd26608a8c952e8d6b54bf002d492,2017-08-29T01:34:32.390000 CVE-2014-2595,0,0,f1a22046ebc66eebbe92546dd470d461e3543ec70cce2faa45d5892b8d39d01b,2020-02-20T15:55:56.883000 -CVE-2014-2597,0,1,d52b5263bea8f0843ab92468f952d52e8fa5cb65d12cda6d7dfae1afea68f36a,2024-11-21T02:06:36.177000 +CVE-2014-2597,0,0,d52b5263bea8f0843ab92468f952d52e8fa5cb65d12cda6d7dfae1afea68f36a,2024-11-21T02:06:36.177000 CVE-2014-2598,0,0,990bf557fbbca3b0074e2bde72caad305cb12a7474a9888529ccc7555d8aab4b,2017-08-29T01:34:32.467000 -CVE-2014-2599,0,1,718b4be0d8e1261841514269f88cd2eef67483d8a4760d4f049f66c5d529f5b3,2024-11-21T02:06:36.480000 -CVE-2014-2600,0,1,42105c2eefd4332a8315d40957ac5c1b3ae4d5c5a5117d3e320ed8cd7ee0f815,2024-11-21T02:06:36.637000 -CVE-2014-2601,0,1,cbaa4089876b609bfca3170a56114831e1a0f8574cc737838fcbbf39a5c66d39,2024-11-21T02:06:36.750000 -CVE-2014-2602,0,1,947eaf16557ababf12cb65226a47264347a5608f7309ca07046fa092fda4d441,2024-11-21T02:06:36.870000 -CVE-2014-2603,0,1,a8376789cb31353894a8b39701ae657eceba86fe5fc74d3223e78f8f78454f17,2024-11-21T02:06:36.980000 -CVE-2014-2604,0,1,6075b1359feca50c246e2bb0996ff3f2b7daab1ae4f62307fdf7d88a60ec2ce8,2024-11-21T02:06:37.110000 +CVE-2014-2599,0,0,718b4be0d8e1261841514269f88cd2eef67483d8a4760d4f049f66c5d529f5b3,2024-11-21T02:06:36.480000 +CVE-2014-2600,0,0,42105c2eefd4332a8315d40957ac5c1b3ae4d5c5a5117d3e320ed8cd7ee0f815,2024-11-21T02:06:36.637000 +CVE-2014-2601,0,0,cbaa4089876b609bfca3170a56114831e1a0f8574cc737838fcbbf39a5c66d39,2024-11-21T02:06:36.750000 +CVE-2014-2602,0,0,947eaf16557ababf12cb65226a47264347a5608f7309ca07046fa092fda4d441,2024-11-21T02:06:36.870000 +CVE-2014-2603,0,0,a8376789cb31353894a8b39701ae657eceba86fe5fc74d3223e78f8f78454f17,2024-11-21T02:06:36.980000 +CVE-2014-2604,0,0,6075b1359feca50c246e2bb0996ff3f2b7daab1ae4f62307fdf7d88a60ec2ce8,2024-11-21T02:06:37.110000 CVE-2014-2605,0,0,820fc0fd56d6a13f0d69d4d3ff18bb4a07491020e65652aff90f7fe4e9375562,2017-08-29T01:34:32.547000 CVE-2014-2606,0,0,1570678cdf074c92c92072b5904c930e2aa07ebfface0effc77693232586a53e,2017-08-29T01:34:32.607000 -CVE-2014-2607,0,1,9814ace8b5c749d6f66883c5cb4f4c77e4e583fa579e35f5d04c3caad3236772,2024-11-21T02:06:37.463000 +CVE-2014-2607,0,0,9814ace8b5c749d6f66883c5cb4f4c77e4e583fa579e35f5d04c3caad3236772,2024-11-21T02:06:37.463000 CVE-2014-2608,0,0,7cec9722a15d19d6cba811dfbbb2c4bef58c253fcf9397af586973863de0f994,2020-09-28T14:18:45.727000 CVE-2014-2609,0,0,2aed24f85697218ad5932d9e993aa8f84d0880107dbd3fb3ebe6ff213135129d,2014-06-26T04:49:40.617000 CVE-2014-2610,0,0,c16fa614e4d7acc829db6a172bbaa427ea6099104d8093f6d9f674dafefc43da,2014-06-26T04:49:40.803000 @@ -66961,25 +66961,25 @@ CVE-2014-2649,0,0,01b7163f73b8cce3600304b1c53e5510265b7bccb53b0ff27e14b3b16c6aca CVE-2014-2650,0,0,986579533f67db037a44c6a7f469e97a90c2a3304050258147b57477f2ff8a29,2020-01-17T14:38:58.333000 CVE-2014-2651,0,0,64d57e28027ad650af2b8dcc18e5d783553799e6e31d4cd0a8f68f831246ef65,2020-01-21T21:00:28.730000 CVE-2014-2652,0,0,80fc22571c523f926d59fadb5c306719d842ceab91de12881d9beafc8f0d35ee,2018-04-20T14:22:54.820000 -CVE-2014-2653,0,1,636850391ce61987c90e72e4803c72f29752c65d0fa2bb1175a788513ac28dd3,2024-11-21T02:06:43.887000 -CVE-2014-2654,0,1,c632fb1f87477406ae0450c61213594720e49354e1551a1f3c9aea670cde2de8,2024-11-21T02:06:44.053000 -CVE-2014-2655,0,1,18ada0fa6c1d05deabc62992f22418b4c094080f6a5770ee1566baf017fec184,2024-11-21T02:06:44.197000 +CVE-2014-2653,0,0,636850391ce61987c90e72e4803c72f29752c65d0fa2bb1175a788513ac28dd3,2024-11-21T02:06:43.887000 +CVE-2014-2654,0,0,c632fb1f87477406ae0450c61213594720e49354e1551a1f3c9aea670cde2de8,2024-11-21T02:06:44.053000 +CVE-2014-2655,0,0,18ada0fa6c1d05deabc62992f22418b4c094080f6a5770ee1566baf017fec184,2024-11-21T02:06:44.197000 CVE-2014-2656,0,0,619174c257544004d1d89230984a675ea4d8f797c934fe41520f54482d1c5e97,2023-11-07T02:19:35.983000 -CVE-2014-2657,0,1,b2eaf7a0c2a0536fa79e5e46eae8a2cc14ebedcabb9b18b3e5410dc860bcf9f0,2024-11-21T02:06:44.350000 -CVE-2014-2658,0,1,6c0a5f57d4b0b9565b21898f1e67a8b9aaa5f69d843a106fa2e07460d58aba4f,2024-11-21T02:06:44.483000 -CVE-2014-2659,0,1,d43b7b32cfd6f4c1f4a5898ef5823d4f85476cfaf38b9bbe69e9b8d6110883a4,2024-11-21T02:06:44.640000 +CVE-2014-2657,0,0,b2eaf7a0c2a0536fa79e5e46eae8a2cc14ebedcabb9b18b3e5410dc860bcf9f0,2024-11-21T02:06:44.350000 +CVE-2014-2658,0,0,6c0a5f57d4b0b9565b21898f1e67a8b9aaa5f69d843a106fa2e07460d58aba4f,2024-11-21T02:06:44.483000 +CVE-2014-2659,0,0,d43b7b32cfd6f4c1f4a5898ef5823d4f85476cfaf38b9bbe69e9b8d6110883a4,2024-11-21T02:06:44.640000 CVE-2014-2664,0,0,b21e39ac75b1519360d96dedf2ffdd0c9cdf070bdebe797f9ebac1bd11e835b4,2017-11-08T17:25:16.417000 -CVE-2014-2665,0,1,36fc5602c08a23ca7ef905be388d2ef2ff78e73f4099ecbec6efbf5a864ee427,2024-11-21T02:06:44.933000 +CVE-2014-2665,0,0,36fc5602c08a23ca7ef905be388d2ef2ff78e73f4099ecbec6efbf5a864ee427,2024-11-21T02:06:44.933000 CVE-2014-2667,0,0,d67aec535c620e5849bfdf9831d42933241dcbfe5378a24f97146fb1907c1f44,2017-07-01T01:29:05.810000 -CVE-2014-2668,0,1,3b4cb673084dfb24bf22f9d27e090c0145e5736be8190a22e9c3d043b888a094,2024-11-21T02:06:45.247000 -CVE-2014-2669,0,1,8874fed1cfe0b3b90379e1797e5d3d0ddaff8e31fdef4354e9b4dfcbf630ea4c,2024-11-21T02:06:45.403000 -CVE-2014-2670,0,1,5fdeaae035ca2d45677572961a4bda623af9465f87808ad8acf066325dacd6a3,2024-11-21T02:06:45.557000 -CVE-2014-2671,0,1,a55fa1a11f8d40152657a07cd220ae252d9bbf60c68f740dab7d5e14461f9540,2024-11-21T02:06:45.700000 -CVE-2014-2672,0,1,aab8c1a662d0d206f80389d75a5c46609afa6666b2cff1b3f65eb10610acb873,2024-11-21T02:06:45.843000 -CVE-2014-2673,0,1,783f878abfca76d8a4466faa73dae1a7ad083e01db0adcd41e4d399ab6ae5993,2024-11-21T02:06:46.007000 +CVE-2014-2668,0,0,3b4cb673084dfb24bf22f9d27e090c0145e5736be8190a22e9c3d043b888a094,2024-11-21T02:06:45.247000 +CVE-2014-2669,0,0,8874fed1cfe0b3b90379e1797e5d3d0ddaff8e31fdef4354e9b4dfcbf630ea4c,2024-11-21T02:06:45.403000 +CVE-2014-2670,0,0,5fdeaae035ca2d45677572961a4bda623af9465f87808ad8acf066325dacd6a3,2024-11-21T02:06:45.557000 +CVE-2014-2671,0,0,a55fa1a11f8d40152657a07cd220ae252d9bbf60c68f740dab7d5e14461f9540,2024-11-21T02:06:45.700000 +CVE-2014-2672,0,0,aab8c1a662d0d206f80389d75a5c46609afa6666b2cff1b3f65eb10610acb873,2024-11-21T02:06:45.843000 +CVE-2014-2673,0,0,783f878abfca76d8a4466faa73dae1a7ad083e01db0adcd41e4d399ab6ae5993,2024-11-21T02:06:46.007000 CVE-2014-2674,0,0,e5dfe942b94531ddece7b9b6142392b0b29fc0373702fda8053ba85b5095acd2,2018-04-18T18:26:16.037000 CVE-2014-2675,0,0,56e487762a0ad5efc07d6eebeb0d25e8230c433f432dbc636ef9564d1a3d1e73,2018-04-18T18:23:57.597000 -CVE-2014-2678,0,1,bceb3ca01777ea123af44d397daeef2b67f09aa1272f8cf740fa9e5ed7f06a0e,2024-11-21T02:06:46.423000 +CVE-2014-2678,0,0,bceb3ca01777ea123af44d397daeef2b67f09aa1272f8cf740fa9e5ed7f06a0e,2024-11-21T02:06:46.423000 CVE-2014-2680,0,0,e3a44300aa5a9d6c04271bc7e4010619ee25ec0bbb62fe5bf0e8b45b22b62253,2020-01-30T19:18:43.103000 CVE-2014-2681,0,0,609ba85e2ff8d75af2a41b327484f3b2b72093522c18245794f273643ac8d0d7,2019-07-16T12:21:29.950000 CVE-2014-2682,0,0,54e4c849d92eb5a317cb915e4dacab206b63df6b1686e74d8c6c926e1d515052,2019-07-16T12:21:41.687000 @@ -66987,48 +66987,48 @@ CVE-2014-2683,0,0,a98a3762c37dcda8ea5cdf6b1cc3499dd2040474d332b9c3eca5c95a1d6af9 CVE-2014-2684,0,0,4ce936f4eff6189bac2b98376288dd0c4c66472e363dffe4fda76af7c6e5be4f,2017-11-04T01:29:00.957000 CVE-2014-2685,0,0,d04f003b4cd9e0ce69fec99c504bf91fd17fd6a0b17ddf15d92c9d6d43f37ef3,2017-11-04T01:29:01.020000 CVE-2014-2686,0,0,e0554fea01e9e0946664803b4edbf89c894d157e5622929cd05f95dc6c6922d9,2023-11-07T02:19:36.443000 -CVE-2014-2689,0,1,38ae6ca1f522abdd1aafe161b51f0ea5b2fc95c3165704d90590cdc18d16331d,2024-11-21T02:06:47.597000 -CVE-2014-2690,0,1,2273307abd3cd4d812df92c672796665136062d0380ff941a59b6533d8ab5472,2024-11-21T02:06:47.730000 -CVE-2014-2706,0,1,b8c82356a6b38c2306ac33e5112536fd10fd1f14e4c7f8e5d31cb77f2ad6aff6,2024-11-21T02:06:47.867000 -CVE-2014-2707,0,1,fc8cbcf85b2efe7f988b85d825ab43ced438200c3e1e6adab5301526bcd3adf1,2024-11-21T02:06:48.080000 -CVE-2014-2708,0,1,81b98f733b6865074fecb00fa617b91ad169439cb538f9b7d0b8058c9390a663,2024-11-21T02:06:48.223000 -CVE-2014-2709,0,1,0a96572513fc94832fb0971ce71f56af557e7f0a12156675e7f2a50dd6d99efe,2024-11-21T02:06:48.380000 +CVE-2014-2689,0,0,38ae6ca1f522abdd1aafe161b51f0ea5b2fc95c3165704d90590cdc18d16331d,2024-11-21T02:06:47.597000 +CVE-2014-2690,0,0,2273307abd3cd4d812df92c672796665136062d0380ff941a59b6533d8ab5472,2024-11-21T02:06:47.730000 +CVE-2014-2706,0,0,b8c82356a6b38c2306ac33e5112536fd10fd1f14e4c7f8e5d31cb77f2ad6aff6,2024-11-21T02:06:47.867000 +CVE-2014-2707,0,0,fc8cbcf85b2efe7f988b85d825ab43ced438200c3e1e6adab5301526bcd3adf1,2024-11-21T02:06:48.080000 +CVE-2014-2708,0,0,81b98f733b6865074fecb00fa617b91ad169439cb538f9b7d0b8058c9390a663,2024-11-21T02:06:48.223000 +CVE-2014-2709,0,0,0a96572513fc94832fb0971ce71f56af557e7f0a12156675e7f2a50dd6d99efe,2024-11-21T02:06:48.380000 CVE-2014-2710,0,0,316a977cd6f03ae427e5e2ea9bc6aab09a14f342617eec607c5598931661b503,2018-10-09T19:43:34.597000 -CVE-2014-2711,0,1,110dcaac215593213e5b22cbbe367b71dfee3baf69b504ce3570be59215837f7,2024-11-21T02:06:48.690000 -CVE-2014-2712,0,1,39824a2d5a1f60823952efa444bdd3d29cbf4d5c7458d33b7919108d7c24efe2,2024-11-21T02:06:48.850000 -CVE-2014-2713,0,1,a80ebba2c91c0deb12891228cc4894af15f965c3bcc910389a8ec7f8ef21de76,2024-11-21T02:06:48.990000 -CVE-2014-2714,0,1,5f33c7c7ee507fe54c3c5938294a90f8617a5ab3ae3c4a01b6061ff0c3feade7,2024-11-21T02:06:49.133000 -CVE-2014-2715,0,1,ef4543c5a3c082700bb081ef49b6b08a2fdea0dc9f3ca02f00de384c19b358a0,2024-11-21T02:06:49.273000 +CVE-2014-2711,0,0,110dcaac215593213e5b22cbbe367b71dfee3baf69b504ce3570be59215837f7,2024-11-21T02:06:48.690000 +CVE-2014-2712,0,0,39824a2d5a1f60823952efa444bdd3d29cbf4d5c7458d33b7919108d7c24efe2,2024-11-21T02:06:48.850000 +CVE-2014-2713,0,0,a80ebba2c91c0deb12891228cc4894af15f965c3bcc910389a8ec7f8ef21de76,2024-11-21T02:06:48.990000 +CVE-2014-2714,0,0,5f33c7c7ee507fe54c3c5938294a90f8617a5ab3ae3c4a01b6061ff0c3feade7,2024-11-21T02:06:49.133000 +CVE-2014-2715,0,0,ef4543c5a3c082700bb081ef49b6b08a2fdea0dc9f3ca02f00de384c19b358a0,2024-11-21T02:06:49.273000 CVE-2014-2716,0,0,acb0a2d17da20b01a1685b40e317d5827b577a6ba46093cf917ece55be823a72,2018-10-09T19:43:35.143000 CVE-2014-2717,0,0,713edffc4fa4935a0f0d357fec9d217078411a79309c7d21f6d15dd330d09c48,2014-07-25T13:52:32 CVE-2014-2718,0,0,355488ce3b047edd4e8793c2b02cd723d9002c05e6b905cd1b4c730aa87d83e4,2017-08-29T01:34:33.827000 -CVE-2014-2719,0,1,143aec649bdbc708713ca35ca4a98d667e9954fc1e116c36a98d90225fc79f1a,2024-11-21T02:06:49.840000 +CVE-2014-2719,0,0,143aec649bdbc708713ca35ca4a98d667e9954fc1e116c36a98d90225fc79f1a,2024-11-21T02:06:49.840000 CVE-2014-2720,0,0,5dc279e2dd0c5f1980d8580c052a500848c8b954b0584f9c9631b6f1ee659d1d,2014-05-29T23:21:09.700000 CVE-2014-2721,0,0,09d1460416ee72a81189392c9eff5725f2d85a8fa10befa9133d6b8434f74659,2020-03-23T16:33:14.813000 CVE-2014-2722,0,0,08691ab6dbd5d8f6a48d4470eb851fa619f3b9333b3477674264ce71425761eb,2020-03-23T16:33:19.860000 CVE-2014-2723,0,0,2828616dd50d401384e1194e9617059361cda0d6b32d7d06d8d04ef05cf429f2,2020-03-23T16:33:08.297000 CVE-2014-2727,0,0,3f177fc9401c6c20fd94a8b4ecc82b707cc73f1489901b402d597624d7b4ec12,2020-02-25T17:55:38.437000 -CVE-2014-2729,0,1,d2f0ccbcda8855224d007d5aa1d5c6932edae07e52a5190ae13e56e66993e3c6,2024-11-21T02:06:50.737000 -CVE-2014-2730,0,1,6ace3175903b0f5a38cd28b394d27609faed5e67896dfe0143b5edd73e973a3b,2024-11-21T02:06:50.877000 -CVE-2014-2731,0,1,8c224bafa1b15b1d2c30cd2e02cf3b0fe6684e689b2c24b251231e2ad28b759e,2024-11-21T02:06:51.013000 -CVE-2014-2732,0,1,3603693c2ee8df9c16696991280bba021f0e0f0edf6750e4027885d93fb4dc6a,2024-11-21T02:06:51.150000 -CVE-2014-2733,0,1,5838762c4e70d93543d7264964351daad62ecc3039c44b95ce0f1442d7db0d07,2024-11-21T02:06:51.290000 -CVE-2014-2734,0,1,0acdf2a9b52c61103aa623ee7f71f7dcb1a72125f5aaf8f2f129819b82438dcb,2024-11-21T02:06:51.433000 -CVE-2014-2735,0,1,25137524c794e634f64ccb3b86d0b70dcd56a9e3fbd84fdbafe9571fb02b738b,2024-11-21T02:06:51.593000 -CVE-2014-2736,0,1,2fac0971f796d53d614fb35d2551361e5832d182cf39fbd3dd5dc2977834c23b,2024-11-21T02:06:51.737000 -CVE-2014-2737,0,1,17c896d2b5548993c42a898f9d20e331340924d19434b6a12c8c2879f31da29f,2024-11-21T02:06:51.890000 -CVE-2014-2739,0,1,dc3bea5c50205911384a77a96b5c838eb44ef8237ac00ae73933c0ee23e8a190,2024-11-21T02:06:52.037000 -CVE-2014-2741,0,1,44134a8437a24907e1863dddfbb8f591ae439ddcc7c06e6a4022248c9060c373,2024-11-21T02:06:52.153000 -CVE-2014-2742,0,1,af48c5869fb3954228ee947ce3b202e87b66414fa48c46022c31b97cd0c1a3b7,2024-11-21T02:06:52.273000 -CVE-2014-2743,0,1,07b238241b374055979e529ed2ae919e4f703d9ceed7446c127673fbc0c7efba,2024-11-21T02:06:52.390000 -CVE-2014-2744,0,1,397cdaabdd2b9ff199aa8c5495aa340ed49ea8db44298669efdecaf26a729de0,2024-11-21T02:06:52.500000 -CVE-2014-2745,0,1,634b9b757edf4a4c7c764b7d0cfe991420934fbd6b1804f2081dd3c5df539c01,2024-11-21T02:06:52.630000 -CVE-2014-2746,0,1,94530d2ee8f845da20cee0ebb3320d5a76158f99f0dd35170ee0e504226b87fd,2024-11-21T02:06:52.750000 -CVE-2014-2748,0,1,8252727aa674ff7a7b9f50422ba5867789425b6e704ae85d9f10cbda83df63da,2024-11-21T02:06:52.880000 -CVE-2014-2749,0,1,bec9c1ada8fd81289da1382d9914d3931fa0781d20f5fd125240d60a671fad88,2024-11-21T02:06:53.023000 +CVE-2014-2729,0,0,d2f0ccbcda8855224d007d5aa1d5c6932edae07e52a5190ae13e56e66993e3c6,2024-11-21T02:06:50.737000 +CVE-2014-2730,0,0,6ace3175903b0f5a38cd28b394d27609faed5e67896dfe0143b5edd73e973a3b,2024-11-21T02:06:50.877000 +CVE-2014-2731,0,0,8c224bafa1b15b1d2c30cd2e02cf3b0fe6684e689b2c24b251231e2ad28b759e,2024-11-21T02:06:51.013000 +CVE-2014-2732,0,0,3603693c2ee8df9c16696991280bba021f0e0f0edf6750e4027885d93fb4dc6a,2024-11-21T02:06:51.150000 +CVE-2014-2733,0,0,5838762c4e70d93543d7264964351daad62ecc3039c44b95ce0f1442d7db0d07,2024-11-21T02:06:51.290000 +CVE-2014-2734,0,0,0acdf2a9b52c61103aa623ee7f71f7dcb1a72125f5aaf8f2f129819b82438dcb,2024-11-21T02:06:51.433000 +CVE-2014-2735,0,0,25137524c794e634f64ccb3b86d0b70dcd56a9e3fbd84fdbafe9571fb02b738b,2024-11-21T02:06:51.593000 +CVE-2014-2736,0,0,2fac0971f796d53d614fb35d2551361e5832d182cf39fbd3dd5dc2977834c23b,2024-11-21T02:06:51.737000 +CVE-2014-2737,0,0,17c896d2b5548993c42a898f9d20e331340924d19434b6a12c8c2879f31da29f,2024-11-21T02:06:51.890000 +CVE-2014-2739,0,0,dc3bea5c50205911384a77a96b5c838eb44ef8237ac00ae73933c0ee23e8a190,2024-11-21T02:06:52.037000 +CVE-2014-2741,0,0,44134a8437a24907e1863dddfbb8f591ae439ddcc7c06e6a4022248c9060c373,2024-11-21T02:06:52.153000 +CVE-2014-2742,0,0,af48c5869fb3954228ee947ce3b202e87b66414fa48c46022c31b97cd0c1a3b7,2024-11-21T02:06:52.273000 +CVE-2014-2743,0,0,07b238241b374055979e529ed2ae919e4f703d9ceed7446c127673fbc0c7efba,2024-11-21T02:06:52.390000 +CVE-2014-2744,0,0,397cdaabdd2b9ff199aa8c5495aa340ed49ea8db44298669efdecaf26a729de0,2024-11-21T02:06:52.500000 +CVE-2014-2745,0,0,634b9b757edf4a4c7c764b7d0cfe991420934fbd6b1804f2081dd3c5df539c01,2024-11-21T02:06:52.630000 +CVE-2014-2746,0,0,94530d2ee8f845da20cee0ebb3320d5a76158f99f0dd35170ee0e504226b87fd,2024-11-21T02:06:52.750000 +CVE-2014-2748,0,0,8252727aa674ff7a7b9f50422ba5867789425b6e704ae85d9f10cbda83df63da,2024-11-21T02:06:52.880000 +CVE-2014-2749,0,0,bec9c1ada8fd81289da1382d9914d3931fa0781d20f5fd125240d60a671fad88,2024-11-21T02:06:53.023000 CVE-2014-2750,0,0,5d0ddefff08a6fb7729fe834eae9af12082db57a6c1d7fbe67842486711d1636,2023-11-07T02:19:37.030000 -CVE-2014-2751,0,1,0ebd3fac05a54f06fd32cd7384fab5e2ff693611cd827211c9ae518affeb1f08,2024-11-21T02:06:53.210000 -CVE-2014-2752,0,1,2a34c43b56b33299fab13d357aaf82343c54436e113a880292d52206c4b268f3,2024-11-21T02:06:53.357000 +CVE-2014-2751,0,0,0ebd3fac05a54f06fd32cd7384fab5e2ff693611cd827211c9ae518affeb1f08,2024-11-21T02:06:53.210000 +CVE-2014-2752,0,0,2a34c43b56b33299fab13d357aaf82343c54436e113a880292d52206c4b268f3,2024-11-21T02:06:53.357000 CVE-2014-2753,0,0,8e562a1f050fdbbef904c2fe79903307c08e16bc0b3cdc229d42922772406fd7,2018-10-12T22:06:19.920000 CVE-2014-2754,0,0,78bcb0a7e74b36a3bdb45952f3a65669475cdb57d952f3d35088d1f8f4291624,2018-10-12T22:06:20.250000 CVE-2014-2755,0,0,4fc5c2982a18423ebdc93d5d5f02c7678179e5540e0be77c1208f42077bfe811,2018-10-12T22:06:20.607000 @@ -67104,91 +67104,91 @@ CVE-2014-2824,0,0,2e767a0ec4bddec4b6e20bd5c4e0dd47b4afb5fb2c3bc27525916779614de3 CVE-2014-2825,0,0,71c23b54942207bd3c653e04e4a6d6f9c3102fb8a3fa8c1bed285d33aa7eabe8,2018-10-12T22:06:48.547000 CVE-2014-2826,0,0,23c3ff81896d0a5b998f4a7d2ec51a43d0e4ceabac8e173c12b940b12e608883,2018-10-12T22:06:49.063000 CVE-2014-2827,0,0,c00e5db822da0bfca943cd2e2134ed91429664764982f72fa143413c31e1fb80,2018-10-12T22:06:49.597000 -CVE-2014-2828,0,1,2f7a47151e07006f889c8fc451c52c9b6d4c38b321b88c38802f937873cf79ae,2024-11-21T02:07:01.267000 -CVE-2014-2829,0,1,8d7a2b78bc8d7456f85729351db9e3ff1b1c3b7335c76a75f6a599f787918b7c,2024-11-21T02:07:01.403000 +CVE-2014-2828,0,0,2f7a47151e07006f889c8fc451c52c9b6d4c38b321b88c38802f937873cf79ae,2024-11-21T02:07:01.267000 +CVE-2014-2829,0,0,8d7a2b78bc8d7456f85729351db9e3ff1b1c3b7335c76a75f6a599f787918b7c,2024-11-21T02:07:01.403000 CVE-2014-2830,0,0,d86f3324573c97ff17bcca594cdbda25c7ccb4b4c97cb40f88a11297d024f25e,2017-07-01T01:29:05.857000 CVE-2014-2838,0,0,99536ce72b5498cf0fe3dd6f197a86609cbc7368541f6e3cb17ecfe1b88300b2,2018-03-20T01:29:00.280000 CVE-2014-2839,0,0,4b9e0cafc4780dc67825f966bb2a3fe43dfc41ce5834f9782ba5eb2f0f1b6334,2018-03-20T01:29:00.357000 -CVE-2014-2842,0,1,2fa905ee56aa4af284457ca51f6ad23e49b9631a97df51066981e8565d0e3e8f,2024-11-21T02:07:01.967000 +CVE-2014-2842,0,0,2fa905ee56aa4af284457ca51f6ad23e49b9631a97df51066981e8565d0e3e8f,2024-11-21T02:07:01.967000 CVE-2014-2843,0,0,06db74dafab73c14a4f9efc9eb4855d91f15823a5a1bcfa6e19c1e4eb6819826,2020-02-04T17:40:57.727000 -CVE-2014-2844,0,1,8e2e6121ab9f8ef02a0d36797a2cec416a51a77e995fb160bfc1e57cf5ba0c71,2024-11-21T02:07:02.290000 +CVE-2014-2844,0,0,8e2e6121ab9f8ef02a0d36797a2cec416a51a77e995fb160bfc1e57cf5ba0c71,2024-11-21T02:07:02.290000 CVE-2014-2845,0,0,d6497883f3626754bf24ac219e830461aa773ef87c2de1480fc8327e38348c69,2019-12-11T15:20:15.057000 -CVE-2014-2846,0,1,7e16218700b94b015641c57aead2618bf82a2ca691e4abcbeeb1ff6afe26f827,2024-11-21T02:07:02.587000 -CVE-2014-2847,0,1,95dc1f54a04954125b71d9941e8a3511c34f0a1a1032b14767b85d4e7d6482ef,2024-11-21T02:07:02.733000 -CVE-2014-2848,0,1,5e16c4b97b04ace7ad24fb4bcbd467549b80c2965f8352efa7a422783813c071,2024-11-21T02:07:02.887000 -CVE-2014-2849,0,1,d363c36d91580d79b289bdbaf3a90e92f56566b018183f271980d7cbd04346b8,2024-11-21T02:07:03.033000 -CVE-2014-2850,0,1,f60a22a29fa1e3d3757c1becc6234c0398fc04756e1b337da56b6977aa55e3e9,2024-11-21T02:07:03.210000 -CVE-2014-2851,0,1,4b06dc4bdc309485a021cdf623be0e190545162db41b799d3fe36584890ba69f,2024-11-21T02:07:03.380000 -CVE-2014-2852,0,1,ebca81aaba8ce3a0846e3731275db15366ba10db13217e7003665c16a7b5678c,2024-11-21T02:07:03.590000 -CVE-2014-2853,0,1,b97bac84532b7903b0e65411f69292b4524bbef2be3967ac2b042b8f341e1ca9,2024-11-21T02:07:03.740000 -CVE-2014-2854,0,1,e15724045b45930db0587267706d0d28d2155d87987e26a32db9910b283d0c71,2024-11-21T02:07:03.917000 -CVE-2014-2855,0,1,c96555f3cb83351c97a8f1bae32c5cfb6bd7ad59dad215ca78daa33c18411234,2024-11-21T02:07:04.060000 -CVE-2014-2856,0,1,f802d76a66ce9f077345173c0687e540e7b6021bf22138e36d247c627bdf35f0,2024-11-21T02:07:04.197000 -CVE-2014-2857,0,1,7493afd5a5f860d602c9005635cf78de749643ef1547a13ba89fb87d4c49c973,2024-11-21T02:07:04.380000 -CVE-2014-2858,0,1,e998effcec9f5c23c329c9e4fd43dbae27d27f330861c7e212361578240a916d,2024-11-21T02:07:04.547000 -CVE-2014-2859,0,1,5183be6def13a46be467ce2467dbe3f12aa29a93cdf99992f65c4ac2daec7c63,2024-11-21T02:07:04.710000 -CVE-2014-2860,0,1,9564d5c2ccf57975de1a26cc036e5c19c0cb05dfbda089c43163d8c2285f2db7,2024-11-21T02:07:04.860000 -CVE-2014-2861,0,1,3628154ebae7bf0d3c61e1325fd7f110bc7fbefbc970f44e7e968462b6aaa9ec,2024-11-21T02:07:04.997000 -CVE-2014-2862,0,1,3f2784607956911f4cf3ac3490e75a5fc094622976696f057512e29a5cb8b167,2024-11-21T02:07:05.143000 -CVE-2014-2863,0,1,7de26d08c08043149fab53415d701c6e1f56d9f2e45cf18fa7f87854ea3c8760,2024-11-21T02:07:05.290000 -CVE-2014-2864,0,1,249441ee737d49f727c203a52f95c7ba887d2ccc06f84904a8421f0f163485f3,2024-11-21T02:07:05.437000 -CVE-2014-2865,0,1,a6d215e7341b7322cd0870c2eaccf52d9cb587a8d608b1fca39a18215149d823,2024-11-21T02:07:05.577000 -CVE-2014-2866,0,1,d6cb5f51fd56a63cdb2f02289e48573819ac5e4504e11ba4e04f067f474f40a4,2024-11-21T02:07:05.717000 -CVE-2014-2867,0,1,8b78ac777c758ff2f3655433f3a0547ca2727e0ff16b6a1b27c118f583bdc427,2024-11-21T02:07:05.850000 -CVE-2014-2868,0,1,99abadd2629f64a5a0dd76d77899275e867a9e6cbe0d4f5908a6e1a61172b63a,2024-11-21T02:07:05.987000 -CVE-2014-2869,0,1,44cb9019ac071bad4e3c57a6b7207cb69812a2ca52cba68701b769de3ae45ef9,2024-11-21T02:07:06.127000 -CVE-2014-2870,0,1,bc403c7f72caadb27103a2d89ea36bbc2b28e6fd17c6d3166d9b943004d92cde,2024-11-21T02:07:06.263000 -CVE-2014-2871,0,1,62c5ab58c78fb67ccc49056a15cdcbffc8adaeab7cefe36daeb73127fe4fc616,2024-11-21T02:07:06.400000 -CVE-2014-2872,0,1,b0a5056e3b915472b3b7a15a333f3f2d693605d99de5a8227a9434d5c77c4d30,2024-11-21T02:07:06.537000 -CVE-2014-2873,0,1,6b4ea81d498fa4244b5cc769892c24e1b6a2082f5f4acd2ecc00d47327780269,2024-11-21T02:07:06.677000 -CVE-2014-2874,0,1,7c1540561ed3d64c28537b2e0c2fc929ede23bdc384efa8b01cabe03e7f6f534,2024-11-21T02:07:06.810000 +CVE-2014-2846,0,0,7e16218700b94b015641c57aead2618bf82a2ca691e4abcbeeb1ff6afe26f827,2024-11-21T02:07:02.587000 +CVE-2014-2847,0,0,95dc1f54a04954125b71d9941e8a3511c34f0a1a1032b14767b85d4e7d6482ef,2024-11-21T02:07:02.733000 +CVE-2014-2848,0,0,5e16c4b97b04ace7ad24fb4bcbd467549b80c2965f8352efa7a422783813c071,2024-11-21T02:07:02.887000 +CVE-2014-2849,0,0,d363c36d91580d79b289bdbaf3a90e92f56566b018183f271980d7cbd04346b8,2024-11-21T02:07:03.033000 +CVE-2014-2850,0,0,f60a22a29fa1e3d3757c1becc6234c0398fc04756e1b337da56b6977aa55e3e9,2024-11-21T02:07:03.210000 +CVE-2014-2851,0,0,4b06dc4bdc309485a021cdf623be0e190545162db41b799d3fe36584890ba69f,2024-11-21T02:07:03.380000 +CVE-2014-2852,0,0,ebca81aaba8ce3a0846e3731275db15366ba10db13217e7003665c16a7b5678c,2024-11-21T02:07:03.590000 +CVE-2014-2853,0,0,b97bac84532b7903b0e65411f69292b4524bbef2be3967ac2b042b8f341e1ca9,2024-11-21T02:07:03.740000 +CVE-2014-2854,0,0,e15724045b45930db0587267706d0d28d2155d87987e26a32db9910b283d0c71,2024-11-21T02:07:03.917000 +CVE-2014-2855,0,0,c96555f3cb83351c97a8f1bae32c5cfb6bd7ad59dad215ca78daa33c18411234,2024-11-21T02:07:04.060000 +CVE-2014-2856,0,0,f802d76a66ce9f077345173c0687e540e7b6021bf22138e36d247c627bdf35f0,2024-11-21T02:07:04.197000 +CVE-2014-2857,0,0,7493afd5a5f860d602c9005635cf78de749643ef1547a13ba89fb87d4c49c973,2024-11-21T02:07:04.380000 +CVE-2014-2858,0,0,e998effcec9f5c23c329c9e4fd43dbae27d27f330861c7e212361578240a916d,2024-11-21T02:07:04.547000 +CVE-2014-2859,0,0,5183be6def13a46be467ce2467dbe3f12aa29a93cdf99992f65c4ac2daec7c63,2024-11-21T02:07:04.710000 +CVE-2014-2860,0,0,9564d5c2ccf57975de1a26cc036e5c19c0cb05dfbda089c43163d8c2285f2db7,2024-11-21T02:07:04.860000 +CVE-2014-2861,0,0,3628154ebae7bf0d3c61e1325fd7f110bc7fbefbc970f44e7e968462b6aaa9ec,2024-11-21T02:07:04.997000 +CVE-2014-2862,0,0,3f2784607956911f4cf3ac3490e75a5fc094622976696f057512e29a5cb8b167,2024-11-21T02:07:05.143000 +CVE-2014-2863,0,0,7de26d08c08043149fab53415d701c6e1f56d9f2e45cf18fa7f87854ea3c8760,2024-11-21T02:07:05.290000 +CVE-2014-2864,0,0,249441ee737d49f727c203a52f95c7ba887d2ccc06f84904a8421f0f163485f3,2024-11-21T02:07:05.437000 +CVE-2014-2865,0,0,a6d215e7341b7322cd0870c2eaccf52d9cb587a8d608b1fca39a18215149d823,2024-11-21T02:07:05.577000 +CVE-2014-2866,0,0,d6cb5f51fd56a63cdb2f02289e48573819ac5e4504e11ba4e04f067f474f40a4,2024-11-21T02:07:05.717000 +CVE-2014-2867,0,0,8b78ac777c758ff2f3655433f3a0547ca2727e0ff16b6a1b27c118f583bdc427,2024-11-21T02:07:05.850000 +CVE-2014-2868,0,0,99abadd2629f64a5a0dd76d77899275e867a9e6cbe0d4f5908a6e1a61172b63a,2024-11-21T02:07:05.987000 +CVE-2014-2869,0,0,44cb9019ac071bad4e3c57a6b7207cb69812a2ca52cba68701b769de3ae45ef9,2024-11-21T02:07:06.127000 +CVE-2014-2870,0,0,bc403c7f72caadb27103a2d89ea36bbc2b28e6fd17c6d3166d9b943004d92cde,2024-11-21T02:07:06.263000 +CVE-2014-2871,0,0,62c5ab58c78fb67ccc49056a15cdcbffc8adaeab7cefe36daeb73127fe4fc616,2024-11-21T02:07:06.400000 +CVE-2014-2872,0,0,b0a5056e3b915472b3b7a15a333f3f2d693605d99de5a8227a9434d5c77c4d30,2024-11-21T02:07:06.537000 +CVE-2014-2873,0,0,6b4ea81d498fa4244b5cc769892c24e1b6a2082f5f4acd2ecc00d47327780269,2024-11-21T02:07:06.677000 +CVE-2014-2874,0,0,7c1540561ed3d64c28537b2e0c2fc929ede23bdc384efa8b01cabe03e7f6f534,2024-11-21T02:07:06.810000 CVE-2014-2875,0,0,bd9b937d6139d3790e4bea34b9684836dc4bd06892193b133fb9f635d900cbc8,2022-01-01T19:56:52.560000 -CVE-2014-2879,0,1,7704394f1c464409b87e04f8efe7440fde76dcc3c5f1e145155027aaed881621,2024-11-21T02:07:07.093000 -CVE-2014-2880,0,1,cc225a69e0f85c092e9d8eedad55a1452f1a2a3d7482be393cd7e2335599f97c,2024-11-21T02:07:07.250000 -CVE-2014-2881,0,1,f5966b38186e9c4e26af884d091340e815ea64077900a46516186e28f6e64abc,2024-11-21T02:07:07.400000 -CVE-2014-2882,0,1,cac08e3dd429af1e661d65a792999a8a7aabf03ed151b7e207c450bc0252c123,2024-11-21T02:07:07.550000 +CVE-2014-2879,0,0,7704394f1c464409b87e04f8efe7440fde76dcc3c5f1e145155027aaed881621,2024-11-21T02:07:07.093000 +CVE-2014-2880,0,0,cc225a69e0f85c092e9d8eedad55a1452f1a2a3d7482be393cd7e2335599f97c,2024-11-21T02:07:07.250000 +CVE-2014-2881,0,0,f5966b38186e9c4e26af884d091340e815ea64077900a46516186e28f6e64abc,2024-11-21T02:07:07.400000 +CVE-2014-2882,0,0,cac08e3dd429af1e661d65a792999a8a7aabf03ed151b7e207c450bc0252c123,2024-11-21T02:07:07.550000 CVE-2014-2884,0,0,4e49c8b714f339df13fe4903cc5585ded85e1116137ede62eb06e651defb517f,2018-04-20T14:25:34.860000 CVE-2014-2885,0,0,441c2b06ec8cfc0a2fe31baadfef14e2845eb09124880dfa8a2f11a8aaff45a4,2018-04-20T14:36:28.450000 CVE-2014-2886,0,0,79f514ce6089598f149afb07cedfa36e67d0ef57c83c8967865f6f00e5ce2bf5,2018-12-31T11:29:00.313000 CVE-2014-2887,0,0,077e09e21d6d5b1fb5e56090d03cd3c7384df03ab65b9a8ebe6ae9a874f29004,2023-11-07T02:19:38.873000 -CVE-2014-2888,0,1,0112d994b47ccedadb3a7f9b0ee573e41f9607f766540f55764c4a77125c7387,2024-11-21T02:07:08.097000 -CVE-2014-2889,0,1,ae1b256bc865b5c37f6346e7107f53b601289e716a7c117b48899258816d3a3e,2024-11-21T02:07:08.270000 -CVE-2014-2890,0,1,0f75a49a0968f7442b5ea81757e54958392b2a03daa32c8cd704ce58dbaa97bd,2024-11-21T02:07:08.400000 -CVE-2014-2891,0,1,d72bb10b3ccc51a04f23a945b7b0d1fe052d2c8373ba103c70d0a4a745f0f3db,2024-11-21T02:07:08.547000 -CVE-2014-2892,0,1,14a08ab1805ac440aa4bee524a41bf333c16f7ae0730641810df0eeb4e756bea,2024-11-21T02:07:08.717000 -CVE-2014-2893,0,1,b0b3b9ee91e4f5fa615387e92d5588071f64dd6895a434d2f996a395770e531a,2024-11-21T02:07:08.877000 -CVE-2014-2894,0,1,1bb53a30f57162f0a904e7f07d80bf9b15d3c0dc219783ba97f604023a4be67c,2024-11-21T02:07:09.020000 +CVE-2014-2888,0,0,0112d994b47ccedadb3a7f9b0ee573e41f9607f766540f55764c4a77125c7387,2024-11-21T02:07:08.097000 +CVE-2014-2889,0,0,ae1b256bc865b5c37f6346e7107f53b601289e716a7c117b48899258816d3a3e,2024-11-21T02:07:08.270000 +CVE-2014-2890,0,0,0f75a49a0968f7442b5ea81757e54958392b2a03daa32c8cd704ce58dbaa97bd,2024-11-21T02:07:08.400000 +CVE-2014-2891,0,0,d72bb10b3ccc51a04f23a945b7b0d1fe052d2c8373ba103c70d0a4a745f0f3db,2024-11-21T02:07:08.547000 +CVE-2014-2892,0,0,14a08ab1805ac440aa4bee524a41bf333c16f7ae0730641810df0eeb4e756bea,2024-11-21T02:07:08.717000 +CVE-2014-2893,0,0,b0b3b9ee91e4f5fa615387e92d5588071f64dd6895a434d2f996a395770e531a,2024-11-21T02:07:08.877000 +CVE-2014-2894,0,0,1bb53a30f57162f0a904e7f07d80bf9b15d3c0dc219783ba97f604023a4be67c,2024-11-21T02:07:09.020000 CVE-2014-2895,0,0,33b7f845a354042a711141a4be2f75db486703844515f16d6ab3bbaeb68a1e90,2023-11-07T02:19:39.250000 CVE-2014-2896,0,0,835e6ec3e2072d495c2cf3b1842375bb5b9afa6f7238669c6fd24be39bf95d27,2020-02-04T19:15:21.680000 CVE-2014-2897,0,0,8d4684ab57e92b1b990604d4d62856cdbc38cf92082b1d777e5715725f3a4728,2020-02-04T19:06:31.110000 CVE-2014-2898,0,0,70f16ba646d455faf9e93daaf888ac18ae75e4df664fb950fd47eb6e48f1406a,2020-02-04T19:02:53.243000 -CVE-2014-2899,0,1,82ea675be809a90d763778be8d7a7f9dfa53d104b8bc86e9ea4ebf9986b57b13,2024-11-21T02:07:09.650000 -CVE-2014-2900,0,1,b9bb9e2310517c704c50e9d3853e5ab32be33f2ec1aaa13848fba3bbba9c8be2,2024-11-21T02:07:09.817000 +CVE-2014-2899,0,0,82ea675be809a90d763778be8d7a7f9dfa53d104b8bc86e9ea4ebf9986b57b13,2024-11-21T02:07:09.650000 +CVE-2014-2900,0,0,b9bb9e2310517c704c50e9d3853e5ab32be33f2ec1aaa13848fba3bbba9c8be2,2024-11-21T02:07:09.817000 CVE-2014-2901,0,0,d9067e592e674b17056ca0afd70ffd0255f7acdc4b68cc173ffaeae454f2ffc4,2019-12-04T14:16:26.970000 CVE-2014-2902,0,0,e0717f9e13687309e38c71099cccdcd74e0b9c5bb00ed04c54d378766ee8ac86,2019-12-04T14:16:20.347000 CVE-2014-2903,0,0,3d6671833bb2b8e953211917c00258edb889258f1b8aa871ca53fb635a25a2fb,2017-10-17T15:59:28.337000 CVE-2014-2904,0,0,4dd86161ae4e0340ab474dec2cf156cb05da6ea9f760fe660a34e14f5ade9dc0,2019-12-04T14:16:12.720000 -CVE-2014-2905,0,1,309953f37c1b7b4bd62bc67778ebe83e2b78c91a50303680e1a841bf3cfa2a31,2024-11-21T02:07:10.533000 +CVE-2014-2905,0,0,309953f37c1b7b4bd62bc67778ebe83e2b78c91a50303680e1a841bf3cfa2a31,2024-11-21T02:07:10.533000 CVE-2014-2906,0,0,28c352b17f90f6da40502b8393258d209f5a592514e6807683e1a78bdacbd53a,2020-02-03T17:01:27.103000 -CVE-2014-2907,0,1,87f69c4a8fd69ab271548403a7a464fe24fcf8c2f66bb4ba85f12e51c891c943,2024-11-21T02:07:10.823000 -CVE-2014-2908,0,1,3fb41552b6a9f9a04be6dd1aae317a9a74ed79076851caad85519fa707e585bd,2024-11-21T02:07:10.967000 -CVE-2014-2909,0,1,1f80e4071dba1f23677e40ee6e852c7add9bec0da60abfe95251d713707e3402,2024-11-21T02:07:11.110000 -CVE-2014-2913,0,1,3c3bfd169216ae111b7c6e8172db85e419116fb3d006a4340e6518341ca6d55b,2024-11-21T02:07:11.250000 +CVE-2014-2907,0,0,87f69c4a8fd69ab271548403a7a464fe24fcf8c2f66bb4ba85f12e51c891c943,2024-11-21T02:07:10.823000 +CVE-2014-2908,0,0,3fb41552b6a9f9a04be6dd1aae317a9a74ed79076851caad85519fa707e585bd,2024-11-21T02:07:10.967000 +CVE-2014-2909,0,0,1f80e4071dba1f23677e40ee6e852c7add9bec0da60abfe95251d713707e3402,2024-11-21T02:07:11.110000 +CVE-2014-2913,0,0,3c3bfd169216ae111b7c6e8172db85e419116fb3d006a4340e6518341ca6d55b,2024-11-21T02:07:11.250000 CVE-2014-2914,0,0,c0220900fdeda573b374eb0cf80ed7d59cc3dfd5cb565b12abb994203f116f38,2020-02-04T17:09:46.907000 -CVE-2014-2915,0,1,a384ae5f8ebe763bb1db513cd061b2c4034e45934e623a775a978770c7dd5f9c,2024-11-21T02:07:11.533000 -CVE-2014-2916,0,1,966076ec48b2bd7c87c6a25377e86a521618b50ce322f3604d1bbcee75e29904,2024-11-21T02:07:11.667000 -CVE-2014-2921,0,1,fb23216efb0cbbe83e0938ebc5a0c72fc5db8fd457083e0302fd02bc1628c599,2024-11-21T02:07:11.807000 -CVE-2014-2922,0,1,db95400fe1d15df69a485599ac27a5fc1f262dbbd3cefc514adcd6876892c900,2024-11-21T02:07:11.940000 -CVE-2014-2925,0,1,b8cd18291d8869073256c47e84ef5b9aa684852e3d19bf89e87e9ba5afefac49,2024-11-21T02:07:12.077000 +CVE-2014-2915,0,0,a384ae5f8ebe763bb1db513cd061b2c4034e45934e623a775a978770c7dd5f9c,2024-11-21T02:07:11.533000 +CVE-2014-2916,0,0,966076ec48b2bd7c87c6a25377e86a521618b50ce322f3604d1bbcee75e29904,2024-11-21T02:07:11.667000 +CVE-2014-2921,0,0,fb23216efb0cbbe83e0938ebc5a0c72fc5db8fd457083e0302fd02bc1628c599,2024-11-21T02:07:11.807000 +CVE-2014-2922,0,0,db95400fe1d15df69a485599ac27a5fc1f262dbbd3cefc514adcd6876892c900,2024-11-21T02:07:11.940000 +CVE-2014-2925,0,0,b8cd18291d8869073256c47e84ef5b9aa684852e3d19bf89e87e9ba5afefac49,2024-11-21T02:07:12.077000 CVE-2014-2926,0,0,4440e1c9e2252facec33ef432f3b10d6cf1757837a157997e8590fc691dc821b,2014-07-15T15:26:32.137000 CVE-2014-2927,0,0,83f1d22866e80ad1a24ee8569c2c51a037fa73283f6c73733743ae231d3643d2,2015-01-26T18:32:15.283000 -CVE-2014-2928,0,1,6d2462f12a98c447df4aacaa97bb1d56334eeea52b208701429eb277222a8f2c,2024-11-21T02:07:12.457000 -CVE-2014-2933,0,1,094a60ccb72a454b5054ab1db945e55febdf413dfa763805c8657fc9adaf6e1a,2024-11-21T02:07:12.587000 -CVE-2014-2934,0,1,bb4f8061a5efa910540f53b12084a5888105e1b89b39d3bb9a45b91dea3771b8,2024-11-21T02:07:12.687000 -CVE-2014-2935,0,1,899d61fb56b8d883e310f3311b765c71ed042a91acd0b1a59a5240564762d786,2024-11-21T02:07:12.783000 -CVE-2014-2936,0,1,b148124515d1d08e337db894687dca555b7ccaa6ed2f203a867e18ab0b7c5ea5,2024-11-21T02:07:12.893000 +CVE-2014-2928,0,0,6d2462f12a98c447df4aacaa97bb1d56334eeea52b208701429eb277222a8f2c,2024-11-21T02:07:12.457000 +CVE-2014-2933,0,0,094a60ccb72a454b5054ab1db945e55febdf413dfa763805c8657fc9adaf6e1a,2024-11-21T02:07:12.587000 +CVE-2014-2934,0,0,bb4f8061a5efa910540f53b12084a5888105e1b89b39d3bb9a45b91dea3771b8,2024-11-21T02:07:12.687000 +CVE-2014-2935,0,0,899d61fb56b8d883e310f3311b765c71ed042a91acd0b1a59a5240564762d786,2024-11-21T02:07:12.783000 +CVE-2014-2936,0,0,b148124515d1d08e337db894687dca555b7ccaa6ed2f203a867e18ab0b7c5ea5,2024-11-21T02:07:12.893000 CVE-2014-2937,0,0,abeba8d66cd33626a90f869ef5a79d32093243b18b25be5b63e16f7fad77d884,2023-11-07T02:19:39.817000 -CVE-2014-2938,0,1,8cd0f7e07a122744b53e2d8ba936eb89994657ee86d89054cc0a283410b3c17b,2024-11-21T02:07:13.010000 +CVE-2014-2938,0,0,8cd0f7e07a122744b53e2d8ba936eb89994657ee86d89054cc0a283410b3c17b,2024-11-21T02:07:13.010000 CVE-2014-2939,0,0,47cdd1cee965c12f1bc6bc089d843135db5be432a19cbdf5e9825907e512140d,2014-06-03T15:30:22.707000 CVE-2014-2940,0,0,a7b6ec3ece66dc7aa6ee59e0b4ccabd5bdf5a5abdc92ffb8c8881a9711385867,2014-08-15T17:21:16.587000 CVE-2014-2941,0,0,f41f6230d893b174f37a09737949d528fa91619df63db7ea66fd991445c59856,2024-08-06T11:15:37.307000 @@ -67197,8 +67197,8 @@ CVE-2014-2943,0,0,598c14c2e2ea02d6f429cc399a67ad1f7d85c0e54a2060d679ba3b26a69189 CVE-2014-2944,0,0,2eb007f4b4b5e60502264aea8e13ef42bfead1009fc1b6926d91f3ea08e6ff46,2023-11-07T02:19:40.363000 CVE-2014-2945,0,0,175034c514258bdcd0478c822191e2aa0ca9ed91952c5e5a843105d03016a7f1,2023-11-07T02:19:40.620000 CVE-2014-2946,0,0,1c3c9dbd1324c6393fa91da80e2e6d241774957d5bd5374abae81a29b6c6cd04,2014-06-18T04:32:31.430000 -CVE-2014-2947,0,1,c94b668228583f29fe9869f10ff719fd83ae483cf8349bd60e4246aefae0ab1e,2024-11-21T02:07:13.690000 -CVE-2014-2948,0,1,adc30fa0552d50434d0ce3d6d03d0765f921119902c4a87e5a63ed4e7b9412e4,2024-11-21T02:07:13.823000 +CVE-2014-2947,0,0,c94b668228583f29fe9869f10ff719fd83ae483cf8349bd60e4246aefae0ab1e,2024-11-21T02:07:13.690000 +CVE-2014-2948,0,0,adc30fa0552d50434d0ce3d6d03d0765f921119902c4a87e5a63ed4e7b9412e4,2024-11-21T02:07:13.823000 CVE-2014-2949,0,0,98a36d6c862454888759adf4ba69a8c6af27bfa98b09c382c35c810fca7edcbd,2015-12-04T16:16:44.563000 CVE-2014-2950,0,0,e4f37d00d8d33f6099c1c6c1c1bf5f8e8ba1cfb60f09ab27e6f488568a2bb72a,2014-07-15T15:41:00.640000 CVE-2014-2951,0,0,052b60b4e89f8f3184810928dafcc470fbe29fa039ad697e4e8380c6b0d20e84,2014-07-15T15:44:14.053000 @@ -67221,36 +67221,36 @@ CVE-2014-2972,0,0,6b032a379920e8e036e272af3f90d47ceb900bfe31ba63821b62a211f316b6 CVE-2014-2973,0,0,52e5b215c2d95fa754efa5badedf6fada1ff1f3b997380518831e431ccc4ffe3,2023-11-07T02:19:41.247000 CVE-2014-2974,0,0,38304c7cb2577e6b462a79e8d24a3b867668b14ea6c26c7fb8a9e52656fff51e,2014-07-29T14:28:32.590000 CVE-2014-2975,0,0,cc1e0b29a34cdd99316dd1f9f908588493e3bcdbcc66609b8fa4ab37c9405baf,2015-08-01T01:36:16.717000 -CVE-2014-2976,0,1,8169c4977800c6787f9b25c1101cc6f6372c50fd11c92e1ec4ff34490ef45ece,2024-11-21T02:07:16.223000 +CVE-2014-2976,0,0,8169c4977800c6787f9b25c1101cc6f6372c50fd11c92e1ec4ff34490ef45ece,2024-11-21T02:07:16.223000 CVE-2014-2977,0,0,64fe209bd358991cb2ebfe45dd7275c5118e8df05fc5cf23ea3fa914818468bb,2018-10-30T16:27:37.717000 CVE-2014-2978,0,0,9e2336ed08f7afac0881f154d20a2d0c37b88b5fc69ea8b9b3761e69a07004b8,2018-10-30T16:27:37.717000 -CVE-2014-2980,0,1,aec2fb6972ed7bf6a252f211883bd6bf4783d9b090e20da5d672eb9628130658,2024-11-21T02:07:16.680000 -CVE-2014-2983,0,1,cb178dbc664e2717c35733b9ec919f3860927574b0e9bdcbe366c5ce2d389d82,2024-11-21T02:07:16.843000 +CVE-2014-2980,0,0,aec2fb6972ed7bf6a252f211883bd6bf4783d9b090e20da5d672eb9628130658,2024-11-21T02:07:16.680000 +CVE-2014-2983,0,0,cb178dbc664e2717c35733b9ec919f3860927574b0e9bdcbe366c5ce2d389d82,2024-11-21T02:07:16.843000 CVE-2014-2984,0,0,ae04777fef46ae71bde554e9a086d0e46a28f0c55657d75f0cb2e4d346b8123a,2023-11-07T02:19:41.573000 -CVE-2014-2986,0,1,8e5352fa7a51db9d83f61cf0edd608d40dcd00b923681331e4ed23639a0e58e9,2024-11-21T02:07:17.007000 +CVE-2014-2986,0,0,8e5352fa7a51db9d83f61cf0edd608d40dcd00b923681331e4ed23639a0e58e9,2024-11-21T02:07:17.007000 CVE-2014-2987,0,0,c024eb5d8c5375e4cbc8a71000b1bd8402485328facc35d34fe7cc1f0c871432,2018-10-09T19:43:38.707000 CVE-2014-2988,0,0,176c5ff53e1ef7f4396d56c7ebf09383396cc8608da585ad71ed99e37d4431db,2018-10-09T19:43:39.287000 -CVE-2014-2989,0,1,d8103754e78a1185e14bcdd4fa5b6953b8bc4f6904342b3947c6dd03cb581ca3,2024-11-21T02:07:17.460000 -CVE-2014-2992,0,1,88691b81985490d0fbb2fcf9716ad141a92c41e4c92f2d35ee3acdd7d6406da4,2024-11-21T02:07:17.610000 -CVE-2014-2993,0,1,e055d7093f3bf5053bc4571c1493397c7d7190a822f5ddc8263d35a97f1199fd,2024-11-21T02:07:17.750000 -CVE-2014-2994,0,1,aa82594934aa3fe0efb7c22148b2139f96b547b60c9d35ec53a29a0a545534dd,2024-11-21T02:07:17.900000 +CVE-2014-2989,0,0,d8103754e78a1185e14bcdd4fa5b6953b8bc4f6904342b3947c6dd03cb581ca3,2024-11-21T02:07:17.460000 +CVE-2014-2992,0,0,88691b81985490d0fbb2fcf9716ad141a92c41e4c92f2d35ee3acdd7d6406da4,2024-11-21T02:07:17.610000 +CVE-2014-2993,0,0,e055d7093f3bf5053bc4571c1493397c7d7190a822f5ddc8263d35a97f1199fd,2024-11-21T02:07:17.750000 +CVE-2014-2994,0,0,aa82594934aa3fe0efb7c22148b2139f96b547b60c9d35ec53a29a0a545534dd,2024-11-21T02:07:17.900000 CVE-2014-2995,0,0,99cad8c6546bcfcb54251d6b5329a37e9be5f2c4a12949f0884289e2ea849dde,2017-08-29T01:34:35.060000 -CVE-2014-2996,0,1,f506ba50ab911b2b946245d01d963bf09b94ac848c675752a2ce265571f451c2,2024-11-21T02:07:18.213000 -CVE-2014-3000,0,1,5ba070020c4b03a5d6856d9a8f6d68531e559e37cb24314b7ba2b0ccf073d67d,2024-11-21T02:07:18.380000 -CVE-2014-3001,0,1,9526a9daa139e2fc0e40aa6db436c3a09c209597b60a57eb5a68f2c4dba15526,2024-11-21T02:07:18.527000 +CVE-2014-2996,0,0,f506ba50ab911b2b946245d01d963bf09b94ac848c675752a2ce265571f451c2,2024-11-21T02:07:18.213000 +CVE-2014-3000,0,0,5ba070020c4b03a5d6856d9a8f6d68531e559e37cb24314b7ba2b0ccf073d67d,2024-11-21T02:07:18.380000 +CVE-2014-3001,0,0,9526a9daa139e2fc0e40aa6db436c3a09c209597b60a57eb5a68f2c4dba15526,2024-11-21T02:07:18.527000 CVE-2014-3003,0,0,ed46313a4cca6744ea58402918c8104ce43f6763c86f55483d8cfcbd28808bb0,2023-11-07T02:19:41.713000 CVE-2014-3004,0,0,376fbaf3c70d97bc3fd7ae0853b3bc06e038d065240b130160ac302a1d19a50b,2021-10-20T11:15:26.263000 CVE-2014-3005,0,0,c5185db819cf1e912393fde3d505b0ba73fe7f0baff9f421c6b6fd63ff86fcab,2018-02-21T14:57:16.407000 -CVE-2014-3006,0,1,1fb7c43f3b9dcc033f166387a2037e7f38f7b1a8a326e95c03ac243b4c2c57d4,2024-11-21T02:07:19.080000 -CVE-2014-3007,0,1,d9665843f0ba86e686840946b5052044bcea80e15bdab0ff1f787cad8203ea45,2024-11-21T02:07:19.220000 -CVE-2014-3008,0,1,015ff984d9c31d643cf6f6baafd315873f5f09d17d1dfebbf12027c8d2e39c56,2024-11-21T02:07:19.347000 +CVE-2014-3006,0,0,1fb7c43f3b9dcc033f166387a2037e7f38f7b1a8a326e95c03ac243b4c2c57d4,2024-11-21T02:07:19.080000 +CVE-2014-3007,0,0,d9665843f0ba86e686840946b5052044bcea80e15bdab0ff1f787cad8203ea45,2024-11-21T02:07:19.220000 +CVE-2014-3008,0,0,015ff984d9c31d643cf6f6baafd315873f5f09d17d1dfebbf12027c8d2e39c56,2024-11-21T02:07:19.347000 CVE-2014-3009,0,0,93b9630150a16087afc845af65806d9926b81ba77418fc1f8a8bfb1ad3add591,2017-08-29T01:34:35.170000 CVE-2014-3010,0,0,babdfffe459db568521b905dbe34dfd5b31f4fbfa8337fb11764640ca10a21de,2017-08-29T01:34:35.233000 CVE-2014-3011,0,0,abf250f1bcdfbf6db1ad05f20ad6967db142b2175387e2853cc0e2fc0405206b,2014-06-30T14:06:36.937000 CVE-2014-3012,0,0,90f1067a928af870139ef97c16f4ae698f8ddd81851cfbdc426aa93d12b65ced,2017-08-29T01:34:35.280000 CVE-2014-3013,0,0,2e29d19d7874bd4e7cf66df81e0510f6cb7ef35102b9ae306635a8fc04304088,2017-08-29T01:34:35.343000 -CVE-2014-3014,0,1,04a96114ed73817f5d10cedbcb061e6bd5a0ffb3e87776b010fa3dbef650251d,2024-11-21T02:07:19.993000 -CVE-2014-3015,0,1,3a851d181d7def829de1fcb65632f80b51669d97de3c24cd4955f2c69bb098ab,2024-11-21T02:07:20.097000 +CVE-2014-3014,0,0,04a96114ed73817f5d10cedbcb061e6bd5a0ffb3e87776b010fa3dbef650251d,2024-11-21T02:07:19.993000 +CVE-2014-3015,0,0,3a851d181d7def829de1fcb65632f80b51669d97de3c24cd4955f2c69bb098ab,2024-11-21T02:07:20.097000 CVE-2014-3018,0,0,2a4f5a5e2e3fba46658940a9155a09edb4cad63acf2aac9bb03b3cbd20b311f7,2017-08-29T01:34:35.513000 CVE-2014-3019,0,0,5e63df5cdf3ceb4fe5179fd8aa44bca78afe94f5c2ee39e236b470c59c57dbde,2017-08-29T01:34:35.577000 CVE-2014-3020,0,0,eff4f4f938b79ae41d933517fd696b2ab7334f2e1e98bf9acdfc2af967309418,2017-08-29T01:34:35.657000 @@ -67330,35 +67330,35 @@ CVE-2014-3110,0,0,c93ceeaeaab08831e6a135ddc74522ee4a825eba500b328de90d30692effd4 CVE-2014-3111,0,0,4cfe4b826f8998d8736766495300d102eeddbb5c8859bdc3c193bf131a4e3062,2018-10-09T19:43:42.190000 CVE-2014-3113,0,0,15e2d416c9559bbcf60da2e9308d4546d6a5ac8bf322bcdb9dbbafae11404572,2017-01-07T02:59:53.517000 CVE-2014-3114,0,0,76de3039755d958c2c1af9199c396ebf96749eb4f6fef715f5785fc8c7cac086,2018-05-18T13:21:00.393000 -CVE-2014-3115,0,1,ad8420e4eb4ca4e98c4404df709847b56e90d0499be1620c743706e2a55de856,2024-11-21T02:07:29.013000 +CVE-2014-3115,0,0,ad8420e4eb4ca4e98c4404df709847b56e90d0499be1620c743706e2a55de856,2024-11-21T02:07:29.013000 CVE-2014-3119,0,0,fe6b87015e8eabd06091ca4457c159b30622ad00730a27f3424e69929f434654,2020-02-05T16:29:23.120000 CVE-2014-3120,0,0,8450de2fa4d39389bf9252faf5d8926722e48f67953a13e6b78eb1ebe4f29d97,2016-12-06T18:13:40.637000 -CVE-2014-3121,0,1,ca20e9134e9b6731ceb912efcf500f13c48a3b4967fcc562bb1fe777ec0fc6af,2024-11-21T02:07:29.467000 -CVE-2014-3122,0,1,a3f1cc4c131f10e2b3e6d0d94a8938fe1901530fbc742fd1a259c68374cc36c4,2024-11-21T02:07:29.607000 -CVE-2014-3123,0,1,0a6c1ac7ab5ba3cea2140601d8bafe1e184e8f391a04f9626586ac04126ccc97,2024-11-21T02:07:29.730000 -CVE-2014-3124,0,1,cdc50f75922dab8aaef9534e8abcf69b8b6c6efbf4b58c551369b226b69e1c89,2024-11-21T02:07:29.860000 -CVE-2014-3125,0,1,54a8ffd13b39f05264802b7f48510b8dacb4d2820f54b8121ac9c3074d5f9382,2024-11-21T02:07:30.010000 -CVE-2014-3127,0,1,2489c179f9bf58548a0463369eaacc4afefcdfcb282f09c9e3a2b067090b53d2,2024-11-21T02:07:30.150000 -CVE-2014-3129,0,1,fbf471d79c09ddefe12fc8d319e21c2e7aaa5a26a853dac5cc11ecc5e03e361c,2024-11-21T02:07:30.303000 -CVE-2014-3130,0,1,49b7810959d1738f076268ee0eea4a210f089ffb0d95fa168b8ea541557dc914,2024-11-21T02:07:30.443000 -CVE-2014-3131,0,1,6d51bbd8d08198c9cdfdb41555a847c0569ade9d156f29783b37bbd28796853c,2024-11-21T02:07:30.583000 -CVE-2014-3132,0,1,d69cf3bb9080fa67a66b327cc9bb9fc90115a1424227a7402d285bd09d63064b,2024-11-21T02:07:30.730000 -CVE-2014-3133,0,1,11ce5033c96fa9d1250c7f38e1fe400c1fa9dae31dd3274729e0fa4a2526c5f4,2024-11-21T02:07:30.877000 -CVE-2014-3134,0,1,9d3d111ce04e475d7653cb7fe3a39390bfde8b41379fcee0d16ee2f2b464dd5d,2024-11-21T02:07:31.027000 -CVE-2014-3135,0,1,81030abe1fa3e8ef28b6d723e3cd83d552baed25503a24bb340ff9d4210c896e,2024-11-21T02:07:31.170000 +CVE-2014-3121,0,0,ca20e9134e9b6731ceb912efcf500f13c48a3b4967fcc562bb1fe777ec0fc6af,2024-11-21T02:07:29.467000 +CVE-2014-3122,0,0,a3f1cc4c131f10e2b3e6d0d94a8938fe1901530fbc742fd1a259c68374cc36c4,2024-11-21T02:07:29.607000 +CVE-2014-3123,0,0,0a6c1ac7ab5ba3cea2140601d8bafe1e184e8f391a04f9626586ac04126ccc97,2024-11-21T02:07:29.730000 +CVE-2014-3124,0,0,cdc50f75922dab8aaef9534e8abcf69b8b6c6efbf4b58c551369b226b69e1c89,2024-11-21T02:07:29.860000 +CVE-2014-3125,0,0,54a8ffd13b39f05264802b7f48510b8dacb4d2820f54b8121ac9c3074d5f9382,2024-11-21T02:07:30.010000 +CVE-2014-3127,0,0,2489c179f9bf58548a0463369eaacc4afefcdfcb282f09c9e3a2b067090b53d2,2024-11-21T02:07:30.150000 +CVE-2014-3129,0,0,fbf471d79c09ddefe12fc8d319e21c2e7aaa5a26a853dac5cc11ecc5e03e361c,2024-11-21T02:07:30.303000 +CVE-2014-3130,0,0,49b7810959d1738f076268ee0eea4a210f089ffb0d95fa168b8ea541557dc914,2024-11-21T02:07:30.443000 +CVE-2014-3131,0,0,6d51bbd8d08198c9cdfdb41555a847c0569ade9d156f29783b37bbd28796853c,2024-11-21T02:07:30.583000 +CVE-2014-3132,0,0,d69cf3bb9080fa67a66b327cc9bb9fc90115a1424227a7402d285bd09d63064b,2024-11-21T02:07:30.730000 +CVE-2014-3133,0,0,11ce5033c96fa9d1250c7f38e1fe400c1fa9dae31dd3274729e0fa4a2526c5f4,2024-11-21T02:07:30.877000 +CVE-2014-3134,0,0,9d3d111ce04e475d7653cb7fe3a39390bfde8b41379fcee0d16ee2f2b464dd5d,2024-11-21T02:07:31.027000 +CVE-2014-3135,0,0,81030abe1fa3e8ef28b6d723e3cd83d552baed25503a24bb340ff9d4210c896e,2024-11-21T02:07:31.170000 CVE-2014-3136,0,0,4fa3a3a959471c55011ac0fa31281d5b8de21dcbe64119dab26f2265e60796ec,2020-01-07T19:40:33.790000 CVE-2014-3137,0,0,2c383b5e8367379093cdffd3d73b78c6b08f872b817278f5bc39f40ab1f88d3a,2014-12-18T15:45:02.797000 -CVE-2014-3138,0,1,5e31a7f55523ac89ba24f679fd9ca8a5b94faa206eece9382fa7e01ef1942bd5,2024-11-21T02:07:31.620000 -CVE-2014-3139,0,1,29633600f27f8cb79bae87184fb8355f01c527b68a2bbde71bf537fb3f18bdd6,2024-11-21T02:07:31.787000 +CVE-2014-3138,0,0,5e31a7f55523ac89ba24f679fd9ca8a5b94faa206eece9382fa7e01ef1942bd5,2024-11-21T02:07:31.620000 +CVE-2014-3139,0,0,29633600f27f8cb79bae87184fb8355f01c527b68a2bbde71bf537fb3f18bdd6,2024-11-21T02:07:31.787000 CVE-2014-3140,0,0,42972edb7c84824805383c51b5f9e5cb857889f48aacb3fb1c509264d9c0715e,2023-11-07T02:19:42.757000 -CVE-2014-3144,0,1,074689cc1db499a524ca2ea3e9853665b882a77ab0413ce46ade01fa294a7bd8,2024-11-21T02:07:31.943000 -CVE-2014-3145,0,1,61b8e3200aa0bfc062109bcd9c639a32d22adb6b752b5041e382efab7f74e01f,2024-11-21T02:07:32.077000 -CVE-2014-3146,0,1,04eb197ed89d339e59883a75742a9573ccb8c4b895f8b4326df3a18dbbafe0c1,2024-11-21T02:07:32.220000 +CVE-2014-3144,0,0,074689cc1db499a524ca2ea3e9853665b882a77ab0413ce46ade01fa294a7bd8,2024-11-21T02:07:31.943000 +CVE-2014-3145,0,0,61b8e3200aa0bfc062109bcd9c639a32d22adb6b752b5041e382efab7f74e01f,2024-11-21T02:07:32.077000 +CVE-2014-3146,0,0,04eb197ed89d339e59883a75742a9573ccb8c4b895f8b4326df3a18dbbafe0c1,2024-11-21T02:07:32.220000 CVE-2014-3147,0,0,b21ffedb93e290651b63ef6e2a6f8197ffa2901c6dfdb7e822362c3c79cad154,2014-10-10T16:22:10.493000 CVE-2014-3148,0,0,4c398b054b358576097b61acb0409a4edfb5c25f309884e5ed8aed340690808c,2015-09-01T18:10:43.777000 CVE-2014-3149,0,0,db2aaaf0f5f983794e0b03b2d0f57d6a22e9bea1bad10c60a4aad41265951f58,2020-06-03T14:54:57.137000 CVE-2014-3150,0,0,e110a2953ffca6efa7e932d996c6b45d953f79eb8d7f7601b6d041c8f139bce7,2017-12-05T01:01:42.407000 -CVE-2014-3152,0,1,0cf1ee7a4a9ce794dd197b61c0674620388c79f4d5384b84adab54f7e2c082c6,2024-11-21T02:07:32.923000 +CVE-2014-3152,0,0,0cf1ee7a4a9ce794dd197b61c0674620388c79f4d5384b84adab54f7e2c082c6,2024-11-21T02:07:32.923000 CVE-2014-3153,0,0,7ba03356f95b03aa2be1a0de4ba3383e8282a8b135e452745aeee1d8f92a895a,2024-07-02T12:17:50.927000 CVE-2014-3154,0,0,88d39eb89d3241de740078bad12bc53ab4a30f705c7ffc60d14b89395b6ddf24,2023-11-07T02:19:44.073000 CVE-2014-3155,0,0,9b512b0b139d66f885bdf76bc026e2d6d9f05c2bd2c7abcb68a838b3102f026f,2023-11-07T02:19:44.590000 @@ -67407,55 +67407,55 @@ CVE-2014-3198,0,0,f5ea68c0ec8fff8913ec60524b7affb426a25ae7c10a579732d6de060ac4f7 CVE-2014-3199,0,0,6cf0f89a1933a14767379e8cf4791a11a8d696d9e7c7616b64eb9fa3ade91dfb,2023-11-07T02:20:03.657000 CVE-2014-3200,0,0,19583a71303e72b9600da4832febbbfaa501a64087248cf3fe929899d5f12244,2023-11-07T02:20:04.180000 CVE-2014-3201,0,0,f747658d0535b080c4db0f867dd80952527f7970dad3e795ec425f1512c1c651,2023-11-07T02:20:05.040000 -CVE-2014-3202,0,1,b63a01619f344156848d053e5a4878e6ebef3045a13967c8dd4aa4ffd36fb28d,2024-11-21T02:07:39.380000 -CVE-2014-3203,0,1,9baccfbd93cc5e99df7a5bc47b217a0a9a087d03d9c01e7b171d1c8bd11d8078,2024-11-21T02:07:39.530000 -CVE-2014-3204,0,1,99fd5b88de8c5e7a5e26fcba42b44324181f1a389f32b96283bd016155ef29dc,2024-11-21T02:07:39.660000 +CVE-2014-3202,0,0,b63a01619f344156848d053e5a4878e6ebef3045a13967c8dd4aa4ffd36fb28d,2024-11-21T02:07:39.380000 +CVE-2014-3203,0,0,9baccfbd93cc5e99df7a5bc47b217a0a9a087d03d9c01e7b171d1c8bd11d8078,2024-11-21T02:07:39.530000 +CVE-2014-3204,0,0,99fd5b88de8c5e7a5e26fcba42b44324181f1a389f32b96283bd016155ef29dc,2024-11-21T02:07:39.660000 CVE-2014-3205,0,0,da7f01f8d0452ef0d1802dd73658d21b9e359d3a2bd47f6ba95256f4e79dd7c0,2018-03-18T15:13:38.683000 CVE-2014-3206,0,0,43a9d25eece12ac78a65379d0ff02fa9e90e5fadbc1f665bfcd3fff1f637c41f,2018-03-19T15:27:26.180000 -CVE-2014-3207,0,1,f1460038d18ac0d6ae55105879bb56824d1df6a5d38fd5de5761cec2d5aadde5,2024-11-21T02:07:41.157000 +CVE-2014-3207,0,0,f1460038d18ac0d6ae55105879bb56824d1df6a5d38fd5de5761cec2d5aadde5,2024-11-21T02:07:41.157000 CVE-2014-3208,0,0,8f0f98f61e0a492d652780096e1d4df3a96e271104ea19c571e73ee9f7514bb1,2020-02-19T15:29:57.560000 CVE-2014-3209,0,0,61699918173f95a89fd4f666d5aac99e039a775e769364e7dafc92ccf23ac432,2014-11-17T17:06:37.827000 -CVE-2014-3210,0,1,516c7f3fbf75f60cf5e428157d514fd5fa676029261b201b0191654e216e1489,2024-11-21T02:07:41.560000 +CVE-2014-3210,0,0,516c7f3fbf75f60cf5e428157d514fd5fa676029261b201b0191654e216e1489,2024-11-21T02:07:41.560000 CVE-2014-3211,0,0,bc0ae14325c5b7e7ea639788b8c19feee940f411ada44ba7e690bc3244695215,2020-01-13T20:02:01.683000 -CVE-2014-3214,0,1,579af0935ae3f253314418b7319de939591cd5946dd7d9d8b015e8e36ba9e8c1,2024-11-21T02:07:41.840000 -CVE-2014-3215,0,1,f50bb63f2d68569b66d99094e50efdc30ee318fd2747b6de009345242f2d1810,2024-11-21T02:07:41.980000 +CVE-2014-3214,0,0,579af0935ae3f253314418b7319de939591cd5946dd7d9d8b015e8e36ba9e8c1,2024-11-21T02:07:41.840000 +CVE-2014-3215,0,0,f50bb63f2d68569b66d99094e50efdc30ee318fd2747b6de009345242f2d1810,2024-11-21T02:07:41.980000 CVE-2014-3216,0,0,0827a7bdef3571470748429faae592eb73ae1f9eb462df317fd42dc33e07abb3,2014-06-24T14:42:14.173000 CVE-2014-3219,0,0,5d0473171998b5d0272ca81428af0457568008efdf7fea972c19b8159e68e500,2019-09-24T15:15:11.410000 -CVE-2014-3220,0,1,f2056d01aeadf056a9fae3175341fe22406dac80ec4dab9b201f1bd2fb810a52,2024-11-21T02:07:42.440000 +CVE-2014-3220,0,0,f2056d01aeadf056a9fae3175341fe22406dac80ec4dab9b201f1bd2fb810a52,2024-11-21T02:07:42.440000 CVE-2014-3221,0,0,7e49f30812343a2a5a143c7a3b40a8e3b9e9f983d468f5154cfeaa0a702638a5,2017-04-05T16:48:01.413000 CVE-2014-3222,0,0,2c6e75e75eaabab35e7b251451c6b0414ca7bd59ff61cf23254b419d64d3bd23,2017-04-04T20:43:00.200000 CVE-2014-3223,0,0,59051434f3aff8d0745c87dff0664a82a86cc8b0a068cf8dc65f0495d57ecb66,2017-04-05T15:06:06.637000 CVE-2014-3224,0,0,d0c9a1d6398647ebefda8ff775f7d55b9a80dbbd91ae4adb831061835d086454,2017-04-05T15:07:35.017000 -CVE-2014-3225,0,1,a2e65b6883677515b6fd540c0456a13b66fd71fb0690f7e5a237f93040b2fed5,2024-11-21T02:07:43.063000 +CVE-2014-3225,0,0,a2e65b6883677515b6fd540c0456a13b66fd71fb0690f7e5a237f93040b2fed5,2024-11-21T02:07:43.063000 CVE-2014-3227,0,0,b5c7629ff566ff8c7c84e3a93cc3b0f34c5b1acc3b19a9d082ded5698ec3da2f,2014-06-24T15:55:07.690000 CVE-2014-3230,0,0,35375cd5d749634d9f441c90c033d4d1cbe6d3cb4d1605ea01732a212fe620bc,2020-02-06T15:23:23.567000 -CVE-2014-3242,0,1,6d51ab058fbff7d20cd2397d9f58736350fd2f0292a8134317e4efe2a50cc055,2024-11-21T02:07:43.457000 -CVE-2014-3243,0,1,3e5797dbb88774d4c31a1a43a17fb4c3b7c3f827cc345b18cac6848f82e9049e,2024-11-21T02:07:43.593000 +CVE-2014-3242,0,0,6d51ab058fbff7d20cd2397d9f58736350fd2f0292a8134317e4efe2a50cc055,2024-11-21T02:07:43.457000 +CVE-2014-3243,0,0,3e5797dbb88774d4c31a1a43a17fb4c3b7c3f827cc345b18cac6848f82e9049e,2024-11-21T02:07:43.593000 CVE-2014-3244,0,0,adfe3f893de0b69e744f2a3cb2aef6033c79c7361d02ed0e7cd339fe3f295a58,2018-02-15T16:23:45.273000 -CVE-2014-3246,0,1,2730233122aa4e025c751560e5853be5ea421d39b06991f2e5390f8f5b2d2f6f,2024-11-21T02:07:43.880000 -CVE-2014-3247,0,1,0470218967a47a04e6ff267d2acf632a33292ccb4ca98534d3665eb421874ef5,2024-11-21T02:07:44.007000 +CVE-2014-3246,0,0,2730233122aa4e025c751560e5853be5ea421d39b06991f2e5390f8f5b2d2f6f,2024-11-21T02:07:43.880000 +CVE-2014-3247,0,0,0470218967a47a04e6ff267d2acf632a33292ccb4ca98534d3665eb421874ef5,2024-11-21T02:07:44.007000 CVE-2014-3248,0,0,32fd6149e60edca594b94666adf43b195400f295e8040b76104e9222d32d7493,2019-07-16T12:22:07.890000 CVE-2014-3249,0,0,01165c4fd1f23a2dbc1bd4f4d835242094e5a710368ec592e464903c343e2c65,2019-07-10T18:10:44.823000 CVE-2014-3250,0,0,ab0e183bf980b7f7c75d112c10d81237b7a05c7b1d4b2e88789eb94b209c595f,2017-12-27T16:31:17.887000 CVE-2014-3251,0,0,7b42bede16d072b6df5431ee93ef9550ca0eeaa461e209a3d0a51719e92479a3,2019-07-10T18:10:47.430000 CVE-2014-32537,0,0,571c7e4a40e87388a8172d4b01bece3c4d583a891976c38464746b5efe06497e,2023-11-07T02:19:41.667000 CVE-2014-3260,0,0,9ae5707f5cc2e2eb92d01249aaef12057c7567a3746513e9dc5fae1e5c83d04d,2015-12-31T20:28:09.990000 -CVE-2014-3261,0,1,1e2b940113031ef2c784495fc435c791cb63799fb6ada228218351e0ecbe5c93,2024-11-21T02:07:44.867000 -CVE-2014-3262,0,1,6d8eba3dff512836ecd2fabd519484023d2d7ccf9d231658881e46231af5d2db,2024-11-21T02:07:45 -CVE-2014-3263,0,1,326bad3f17d673ea53a4c4a52efb691d4d0ce755e6f2b428cc393bd565720ef8,2024-11-21T02:07:45.110000 -CVE-2014-3264,0,1,d435259e4955c4386d95041d80c682db7632834d4d04fd68e79202fe718fd8ac,2024-11-21T02:07:45.217000 -CVE-2014-3265,0,1,58359e5523118b6ae77d4057fe3ddfd7f7c34f32e0517244d3df4409433ebd65,2024-11-21T02:07:45.327000 -CVE-2014-3266,0,1,b3bcf2f9a4315d725b65888e6a8713729bd48d39d4750bbba37ad34ba5ac553f,2024-11-21T02:07:45.443000 -CVE-2014-3267,0,1,77b7398b91d7250772fb483faa06fde54d7d406a8560e871b20f1ff67e57a3c5,2024-11-21T02:07:45.560000 -CVE-2014-3268,0,1,f3646f313de978d71738eb7ff71ce09beb298ea8636b2fc47fe5ad21c52f4686,2024-11-21T02:07:45.680000 -CVE-2014-3269,0,1,cfcd341fca3eaebdf2aa4815500d5d319b972ad345a07dfa8278071f7acd1274,2024-11-21T02:07:45.790000 -CVE-2014-3270,0,1,c632510ee57604f322609537b30b212224090078fff9615fd844d974c1d53121,2024-11-21T02:07:45.890000 -CVE-2014-3271,0,1,f297011aae2be599645f8c7db342874e5a4a90fdfca823cb1b08f0d8790f55a8,2024-11-21T02:07:46 -CVE-2014-3272,0,1,466c36496afd83d0e1055a14397f42781fcda884ba17479cd162acff2dac4f45,2024-11-21T02:07:46.107000 -CVE-2014-3273,0,1,4633ba0d1e5910d00e62a0bacae0ad508c7d4eb44efee5fab68aad04b892bdf4,2024-11-21T02:07:46.217000 -CVE-2014-3274,0,1,248ef728a53e7cbf219b4563803783947bc955f77568e85aa6151330d327049a,2024-11-21T02:07:46.323000 -CVE-2014-3275,0,1,5024c7106e0fc9a5100deebb4ef894187fa87d44eef8cf0da63472d95f2a9e7d,2024-11-21T02:07:46.457000 -CVE-2014-3276,0,1,ff8f578014b23219e258a5eed9b3f8101e3e5d25abd5d7635677708488d2fa2f,2024-11-21T02:07:46.573000 +CVE-2014-3261,0,0,1e2b940113031ef2c784495fc435c791cb63799fb6ada228218351e0ecbe5c93,2024-11-21T02:07:44.867000 +CVE-2014-3262,0,0,6d8eba3dff512836ecd2fabd519484023d2d7ccf9d231658881e46231af5d2db,2024-11-21T02:07:45 +CVE-2014-3263,0,0,326bad3f17d673ea53a4c4a52efb691d4d0ce755e6f2b428cc393bd565720ef8,2024-11-21T02:07:45.110000 +CVE-2014-3264,0,0,d435259e4955c4386d95041d80c682db7632834d4d04fd68e79202fe718fd8ac,2024-11-21T02:07:45.217000 +CVE-2014-3265,0,0,58359e5523118b6ae77d4057fe3ddfd7f7c34f32e0517244d3df4409433ebd65,2024-11-21T02:07:45.327000 +CVE-2014-3266,0,0,b3bcf2f9a4315d725b65888e6a8713729bd48d39d4750bbba37ad34ba5ac553f,2024-11-21T02:07:45.443000 +CVE-2014-3267,0,0,77b7398b91d7250772fb483faa06fde54d7d406a8560e871b20f1ff67e57a3c5,2024-11-21T02:07:45.560000 +CVE-2014-3268,0,0,f3646f313de978d71738eb7ff71ce09beb298ea8636b2fc47fe5ad21c52f4686,2024-11-21T02:07:45.680000 +CVE-2014-3269,0,0,cfcd341fca3eaebdf2aa4815500d5d319b972ad345a07dfa8278071f7acd1274,2024-11-21T02:07:45.790000 +CVE-2014-3270,0,0,c632510ee57604f322609537b30b212224090078fff9615fd844d974c1d53121,2024-11-21T02:07:45.890000 +CVE-2014-3271,0,0,f297011aae2be599645f8c7db342874e5a4a90fdfca823cb1b08f0d8790f55a8,2024-11-21T02:07:46 +CVE-2014-3272,0,0,466c36496afd83d0e1055a14397f42781fcda884ba17479cd162acff2dac4f45,2024-11-21T02:07:46.107000 +CVE-2014-3273,0,0,4633ba0d1e5910d00e62a0bacae0ad508c7d4eb44efee5fab68aad04b892bdf4,2024-11-21T02:07:46.217000 +CVE-2014-3274,0,0,248ef728a53e7cbf219b4563803783947bc955f77568e85aa6151330d327049a,2024-11-21T02:07:46.323000 +CVE-2014-3275,0,0,5024c7106e0fc9a5100deebb4ef894187fa87d44eef8cf0da63472d95f2a9e7d,2024-11-21T02:07:46.457000 +CVE-2014-3276,0,0,ff8f578014b23219e258a5eed9b3f8101e3e5d25abd5d7635677708488d2fa2f,2024-11-21T02:07:46.573000 CVE-2014-3277,0,0,90f1f0c17fa1dde205919e27df9c671843a0d5255b8ec87a7fc105e9b214f5b5,2016-09-07T17:04:55.187000 CVE-2014-3278,0,0,716f877b976edfe1babfe1eafa1c550a2fb6b91edce30f1135fd3e4bc93cc6a8,2015-12-04T18:42:11.017000 CVE-2014-3279,0,0,e40947deb2c8482a113e45c6f8ab164d810aa808252bcab07ebe763eb640e3ee,2015-12-04T18:43:37.607000 @@ -67463,7 +67463,7 @@ CVE-2014-3280,0,0,d47acda144f5088612f4fae457a3762404cafd72bcb1f56d09f380e9890415 CVE-2014-3281,0,0,9a780e4410761b39abc3e7ba13901902a1c363e4d68088f1e8b7e3ce85c20c6d,2015-12-04T18:43:50.790000 CVE-2014-3282,0,0,53ada7700111105077951abfc2b2dbf8182db508425c40dccfa878a5dc3c2651,2016-09-07T18:17:57.370000 CVE-2014-3283,0,0,94249d6e7820761b8515a3f7cd0ad36b57db0bfcdad77687a20f7b2f5ac0ada5,2016-09-07T18:32:43.187000 -CVE-2014-3284,0,1,c627b2c9c1c15bae21f85c7bfc162a972b114ec07fbb85bd2fc7b9bf63e7ca16,2024-11-21T02:07:47.493000 +CVE-2014-3284,0,0,c627b2c9c1c15bae21f85c7bfc162a972b114ec07fbb85bd2fc7b9bf63e7ca16,2024-11-21T02:07:47.493000 CVE-2014-3285,0,0,a8ddf5fd1b85f4abf2dc9688fcb596fab35e17a06f85d18bafb7a98b7992e109,2016-09-07T19:02:49.247000 CVE-2014-3286,0,0,52b9b2833645dd824ef06902fb2b82b12bbc204ff654032d72211a15f9b8c91d,2016-09-07T19:03:02.687000 CVE-2014-3287,0,0,71dc27cdd9941e42dfe0d89153331a7921a3dbb1a581fdbd514575cb2bca70d9,2016-09-07T19:03:19.127000 @@ -67588,8 +67588,8 @@ CVE-2014-3407,0,0,914acd78ad8c58dd6391bb9698084669ff307e04e91c6e02227023b7cd6a35 CVE-2014-3408,0,0,b73448d4cee2583a31a9271b5690dd704da78cfe6179b9ff40e6663d0b3a80d4,2015-09-10T15:30:12.203000 CVE-2014-3409,0,0,8a5d9849f517a3fa31e0717099b9d7f1f65e9cee4086dd8da5245c87dec551b4,2017-08-29T01:34:45.107000 CVE-2014-3410,0,0,2fe01f37b75d524f8abb793a5bd17445df50ef9264e513c322dc89ea507049f5,2023-08-11T18:54:47.730000 -CVE-2014-3411,0,1,61a44d00dd7d37c52f2189d28de42918e407f4b6bea4f447aa51532361030f91,2024-11-21T02:08:02.087000 -CVE-2014-3412,0,1,6215a527bb7d5850b96cfd3323a85201a2f74361dc1059f1d92c871ad86e94d0,2024-11-21T02:08:02.230000 +CVE-2014-3411,0,0,61a44d00dd7d37c52f2189d28de42918e407f4b6bea4f447aa51532361030f91,2024-11-21T02:08:02.087000 +CVE-2014-3412,0,0,6215a527bb7d5850b96cfd3323a85201a2f74361dc1059f1d92c871ad86e94d0,2024-11-21T02:08:02.230000 CVE-2014-3413,0,0,34b8d3e7705a85a8709080909586501c720505949e1c153aac968c0deb0e274b,2018-08-10T14:34:24.930000 CVE-2014-3414,0,0,eab3899673a2b4f6dc7324785270e02b32ce043ac6e1ffaf0e123e946ccee896,2015-08-01T01:38:41.007000 CVE-2014-3415,0,0,f26e21aed8e1b1e17c3fbdddfec68765a9e070f305ac1b4763a23331a4c1368d,2015-08-01T01:38:51.957000 @@ -67597,16 +67597,16 @@ CVE-2014-3416,0,0,6852107af5fb45df326f4f783dc62ebca02f0f169fdc3f0082a4d053e0a76c CVE-2014-3417,0,0,962825eb409b5384ba2bac3f4655eab4c6b181e4956a9ba3c723068d15c574cf,2014-05-30T16:36:37.283000 CVE-2014-3418,0,0,b5eb9bbd452c373d07525df912be1103d3d34208ee984ee559d07cd7ab702275,2018-10-09T19:43:44.097000 CVE-2014-3419,0,0,33f46e38b6e99007bbbf9e1acb5d2b56a8748f1b9d879263316c959dae110310,2018-10-09T19:43:44.723000 -CVE-2014-3421,0,1,896dd747b86134901deee0f28936c07342ec953d684f57b2cf33631ea1933250,2024-11-21T02:08:03.473000 -CVE-2014-3422,0,1,a3abf46731f40bc61ec3116984ca5d32c7fd01c50d45b8a0812662b286fb7311,2024-11-21T02:08:03.623000 -CVE-2014-3423,0,1,41133f0d5ed954f943315017dcd4206f48f7034708e92ef8a71c028c056b3616,2024-11-21T02:08:03.797000 -CVE-2014-3424,0,1,e8f8b3f5eb6bf109e5682878bd532b473084a6fdfb88a22ad6cf809b0d574e66,2024-11-21T02:08:03.957000 -CVE-2014-3425,0,1,417da7a014460e68f1ecdac089afcb86a8dfd2457eeb99723c9194c47cd846a7,2024-11-21T02:08:04.110000 -CVE-2014-3426,0,1,7b084b25a608eb16b0822ec4af4867f8bbbb9b329cf810814cfc371c92c9a64f,2024-11-21T02:08:04.250000 +CVE-2014-3421,0,0,896dd747b86134901deee0f28936c07342ec953d684f57b2cf33631ea1933250,2024-11-21T02:08:03.473000 +CVE-2014-3422,0,0,a3abf46731f40bc61ec3116984ca5d32c7fd01c50d45b8a0812662b286fb7311,2024-11-21T02:08:03.623000 +CVE-2014-3423,0,0,41133f0d5ed954f943315017dcd4206f48f7034708e92ef8a71c028c056b3616,2024-11-21T02:08:03.797000 +CVE-2014-3424,0,0,e8f8b3f5eb6bf109e5682878bd532b473084a6fdfb88a22ad6cf809b0d574e66,2024-11-21T02:08:03.957000 +CVE-2014-3425,0,0,417da7a014460e68f1ecdac089afcb86a8dfd2457eeb99723c9194c47cd846a7,2024-11-21T02:08:04.110000 +CVE-2014-3426,0,0,7b084b25a608eb16b0822ec4af4867f8bbbb9b329cf810814cfc371c92c9a64f,2024-11-21T02:08:04.250000 CVE-2014-3427,0,0,a6ad249af0e0b3a74249b1753ee75520f2d5e9af23f0498c2e841deab0e25207,2018-10-09T19:43:45.333000 CVE-2014-3428,0,0,d14ea3e81fab875c2d95e3de22b7afbc5d1bc6be889780aff482031a0deaf4ca,2018-10-09T19:43:45.597000 CVE-2014-3429,0,0,80bba59b0b410f99b1a70c1dd2e169d920955e45ef41e9bd11e1a5d785ba2444,2018-10-30T16:27:35.843000 -CVE-2014-3430,0,1,e380f11f7d5bcda66aedd7beda718807ae10f1c3fc5bf3cff3c65d8add74a6d0,2024-11-21T02:08:04.843000 +CVE-2014-3430,0,0,e380f11f7d5bcda66aedd7beda718807ae10f1c3fc5bf3cff3c65d8add74a6d0,2024-11-21T02:08:04.843000 CVE-2014-3431,0,0,a8582a4f3ab39dc774ac20048ef7ab419d6a276cb9a3f7b27402dcc11b4f3969,2017-01-07T02:59:59.237000 CVE-2014-3432,0,0,7a8fb8a94a6e069004231fd8a93f0a028c7cbc4791f79cfb9d1fc42f514c4198,2014-07-24T05:00:22.937000 CVE-2014-3433,0,0,06977927c363330a19576823dba50da6363b2dce2f7e3cd984f97b16e2722f0c,2014-07-24T05:00:23.093000 @@ -67617,24 +67617,24 @@ CVE-2014-3437,0,0,97eb457512b120b2022e27db3a973b290bb719d4b191bbcf39e210e8059b37 CVE-2014-3438,0,0,2bc76d04691847b24d05eade289db0f8b7b3c00ac993a8998c53b457f96aa9cb,2018-10-09T19:43:46.457000 CVE-2014-3439,0,0,271649e0330bf5328381c09fd9e82549a43e5bdc427e39c474b34b087e9ecd6a,2018-10-09T19:43:47.003000 CVE-2014-3440,0,0,13176ecb8b01c7bd7562fc82fdbd527025bbe8a5e24510f0968af958f46ddbe1,2021-08-04T18:56:05.773000 -CVE-2014-3441,0,1,7c98959fdc1cd595633c9077c24c040832708380260b49a6eaaffbbdc03b216b,2024-11-21T02:08:06.183000 -CVE-2014-3442,0,1,9472e62ff3048693721e3e93c0caf568cd425b4d38c5e997c9842ee838e290ca,2024-11-21T02:08:06.330000 -CVE-2014-3443,0,1,465afee38fa0f8e5d293d0e8d3e95a67abfdc0795fc3ea1df46c3da6f7ee3002,2024-11-21T02:08:06.510000 -CVE-2014-3444,0,1,de7e1912ca11bd799d7b0de90a336619b3a6d3fbf1482c4825746e62eb287bf3,2024-11-21T02:08:06.657000 +CVE-2014-3441,0,0,7c98959fdc1cd595633c9077c24c040832708380260b49a6eaaffbbdc03b216b,2024-11-21T02:08:06.183000 +CVE-2014-3442,0,0,9472e62ff3048693721e3e93c0caf568cd425b4d38c5e997c9842ee838e290ca,2024-11-21T02:08:06.330000 +CVE-2014-3443,0,0,465afee38fa0f8e5d293d0e8d3e95a67abfdc0795fc3ea1df46c3da6f7ee3002,2024-11-21T02:08:06.510000 +CVE-2014-3444,0,0,de7e1912ca11bd799d7b0de90a336619b3a6d3fbf1482c4825746e62eb287bf3,2024-11-21T02:08:06.657000 CVE-2014-3445,0,0,4637316b4f9af50f8ca88d039860a388258377eedf537920498a42d08f732a19,2020-01-31T19:11:28.673000 CVE-2014-3446,0,0,57173f92b102fe62d8860e4f26e1bcf42b9583967c36562b7799ad27ebba81f9,2017-08-29T01:34:45.750000 CVE-2014-3447,0,0,94b1c315bb1fe20e5c323f7a6793a1c7adf8fc162a84d318c14a35ea7190ea98,2020-01-14T15:45:03.680000 CVE-2014-3448,0,0,89a293371e6f97079011f3f0e6aaf1c4584259b9c55b1a9f4a9ddc37cb7d184e,2020-01-14T15:45:53.527000 CVE-2014-3449,0,0,cac623382358d1448bf938a571556ef1cc33b6e8e9e32426b07b2627cf13bd14,2020-01-14T15:47:53.157000 -CVE-2014-3450,0,1,257a9c6fe971f8d280666dc3d641bae7d39eff78ef9572054a70f6f56e78636a,2024-11-21T02:08:07.540000 +CVE-2014-3450,0,0,257a9c6fe971f8d280666dc3d641bae7d39eff78ef9572054a70f6f56e78636a,2024-11-21T02:08:07.540000 CVE-2014-3451,0,0,1293c57305e7e68f0162fd875ca50aae9740b2f42138771758b10d4a37a2de09,2018-10-09T19:43:47.800000 -CVE-2014-3452,0,1,b9fd2866fe55bb944947513c0b674a7ec669bd570a76040f46bb7001adb10453,2024-11-21T02:08:07.850000 -CVE-2014-3453,0,1,a79f5d1af75bd97a11e8f7a50536cd43f7d43c6199fd9da4ed5d3a35480f30be,2024-11-21T02:08:08 -CVE-2014-3454,0,1,b487688f1849c9a5aa896b8bcfaff289fe3106b983b72b2a0f9919997395c738,2024-11-21T02:08:08.157000 -CVE-2014-3455,0,1,d3f0e074fdd889c04c1dd0b19fa84500668e76069b61ccf68c9bf9cfc20a1361,2024-11-21T02:08:08.323000 -CVE-2014-3456,0,1,82d53a88d41c06e1e1c4f75c7ec7999668d58e448186d254cce64a6a40e0c12d,2024-11-21T02:08:08.490000 +CVE-2014-3452,0,0,b9fd2866fe55bb944947513c0b674a7ec669bd570a76040f46bb7001adb10453,2024-11-21T02:08:07.850000 +CVE-2014-3453,0,0,a79f5d1af75bd97a11e8f7a50536cd43f7d43c6199fd9da4ed5d3a35480f30be,2024-11-21T02:08:08 +CVE-2014-3454,0,0,b487688f1849c9a5aa896b8bcfaff289fe3106b983b72b2a0f9919997395c738,2024-11-21T02:08:08.157000 +CVE-2014-3455,0,0,d3f0e074fdd889c04c1dd0b19fa84500668e76069b61ccf68c9bf9cfc20a1361,2024-11-21T02:08:08.323000 +CVE-2014-3456,0,0,82d53a88d41c06e1e1c4f75c7ec7999668d58e448186d254cce64a6a40e0c12d,2024-11-21T02:08:08.490000 CVE-2014-3459,0,0,2233b67a64818a4ff30eae73145c704ee7113c7910b10d38437cc60df39ede9b,2014-08-07T15:18:05.937000 -CVE-2014-3460,0,1,121cb71f8b46251ee2ad8e0a85daecfb8d95b8a9689079c420a07af7acae7ba8,2024-11-21T02:08:08.770000 +CVE-2014-3460,0,0,121cb71f8b46251ee2ad8e0a85daecfb8d95b8a9689079c420a07af7acae7ba8,2024-11-21T02:08:08.770000 CVE-2014-3461,0,0,a201dde84fc33c7058d99f18dab7d51a3fe17a352f60da2f60feb90ffb28dc23,2023-02-13T00:39:09.580000 CVE-2014-3462,0,0,65cbb08e9686009397fb869a5dbe07e60112cf575e0b7eebabd464f4f9deed29,2020-08-21T18:24:16.380000 CVE-2014-3463,0,0,69260c5c9695d06175647c526722baf29fb3bde20ab60e5b6ec3d0914bf7da58,2023-11-07T02:20:08.040000 @@ -67887,54 +67887,54 @@ CVE-2014-3709,0,0,63198dc8c4a955427c9fce13748bea726c21ec53ac872488ee4a034323d811 CVE-2014-3710,0,0,2830fca6ce3e0f988df772d9a92872c4c0044bae4492f334bf3991098371593b,2023-11-07T02:20:18.783000 CVE-2014-3711,0,0,f232ed20d2763650a439203f7984a88fbb18fd9e9b8c56b968b087c1419e0749,2019-03-18T15:35:23.750000 CVE-2014-3712,0,0,ba9eb1d5ca57e36b91f906d76b0db128dc1ee1b21db7630a9d856338ecaabafa,2017-09-02T01:29:00.420000 -CVE-2014-3714,0,1,a6c000b3ada391c0929acdc976184789982e48fcf3a25ff6926524fb1ded8cde,2024-11-21T02:08:43.743000 -CVE-2014-3715,0,1,d7b9c2240ca5eefc407bbb6960777f320f6c48e5447430c59f7c64af68988579,2024-11-21T02:08:43.890000 -CVE-2014-3716,0,1,46c6797062ef43015744b134e3c72d1cde4c14786356b241a22e0efbf8ecebb3,2024-11-21T02:08:44.030000 -CVE-2014-3717,0,1,82cd5b5795c22a5c885254a8958074f299eac9cf33bf14c518d8493bf8bc724a,2024-11-21T02:08:44.180000 +CVE-2014-3714,0,0,a6c000b3ada391c0929acdc976184789982e48fcf3a25ff6926524fb1ded8cde,2024-11-21T02:08:43.743000 +CVE-2014-3715,0,0,d7b9c2240ca5eefc407bbb6960777f320f6c48e5447430c59f7c64af68988579,2024-11-21T02:08:43.890000 +CVE-2014-3716,0,0,46c6797062ef43015744b134e3c72d1cde4c14786356b241a22e0efbf8ecebb3,2024-11-21T02:08:44.030000 +CVE-2014-3717,0,0,82cd5b5795c22a5c885254a8958074f299eac9cf33bf14c518d8493bf8bc724a,2024-11-21T02:08:44.180000 CVE-2014-3718,0,0,e2eeb044fe64c0060b9308139c46424a80bf26a8e55817140265f9936c13ea45,2020-02-03T21:59:58.367000 CVE-2014-3719,0,0,32728bb6239237fe24ef21dabe2b3295c890973e523e8055f5ef858251e2e7cb,2020-02-05T14:26:45.553000 -CVE-2014-3730,0,1,4222b13b131369a3659a5296acbee9988edf9bb4191e57e82980d90902c8c36b,2024-11-21T02:08:44.627000 -CVE-2014-3735,0,1,49bb5dd3fd262bd16549d45b9c5b3ffa28fe20131db50c886055ff31de08ea1f,2024-11-21T02:08:44.770000 +CVE-2014-3730,0,0,4222b13b131369a3659a5296acbee9988edf9bb4191e57e82980d90902c8c36b,2024-11-21T02:08:44.627000 +CVE-2014-3735,0,0,49bb5dd3fd262bd16549d45b9c5b3ffa28fe20131db50c886055ff31de08ea1f,2024-11-21T02:08:44.770000 CVE-2014-3737,0,0,35bc6ea9245cab0b9ffa2b1bf330ac8b0241a3d297173ed459521a6819d0c004,2018-10-09T19:47:27.843000 -CVE-2014-3738,0,1,06c4fd7bc98ee9f6f28c258ddcb30c17debd53e23e85e6400bb0ea30afc9ccd3,2024-11-21T02:08:45.060000 -CVE-2014-3739,0,1,6ee95d87aaaf88d6fb1cf009efe380743e7f31bffc2dfc82c54318db6d54f33d,2024-11-21T02:08:45.213000 +CVE-2014-3738,0,0,06c4fd7bc98ee9f6f28c258ddcb30c17debd53e23e85e6400bb0ea30afc9ccd3,2024-11-21T02:08:45.060000 +CVE-2014-3739,0,0,6ee95d87aaaf88d6fb1cf009efe380743e7f31bffc2dfc82c54318db6d54f33d,2024-11-21T02:08:45.213000 CVE-2014-3740,0,0,1ddfd2607f9b203253c7a5c67f9a872d3109e33d53a97eceffebcf383e39b278,2018-10-10T20:09:48.950000 CVE-2014-3741,0,0,72f0abd9d4daf2894eec884c9072cbb070641adcb5e588037660526fcf2934f9,2017-11-21T18:21:10.437000 -CVE-2014-3742,0,1,a4324ad693455d17b3dcf8a45614b67fdee4ac7555faadc25e4924986ae00d57,2024-11-21T02:08:45.653000 +CVE-2014-3742,0,0,a4324ad693455d17b3dcf8a45614b67fdee4ac7555faadc25e4924986ae00d57,2024-11-21T02:08:45.653000 CVE-2014-3743,0,0,cf9cbe4e771f58b7f64d3158f4862d2682ddf1a89ce386b9aae5f99b928bc432,2020-01-13T18:52:31.537000 CVE-2014-3744,0,0,e0e956518b7344ff8af0afb80d4915eb6e187fb903c2d0e8fc213f6360c54c28,2017-11-15T21:44:12.253000 -CVE-2014-3749,0,1,9d143a7c55fc05c17fdd883efe05004ca34b1c2f73a032c0ecda28ebf6ce9db7,2024-11-21T02:08:46.093000 -CVE-2014-3750,0,1,59d9e96157779273bd5cbbd409ad0583fcd327a214221a15d9a7cce82633fcec,2024-11-21T02:08:46.237000 +CVE-2014-3749,0,0,9d143a7c55fc05c17fdd883efe05004ca34b1c2f73a032c0ecda28ebf6ce9db7,2024-11-21T02:08:46.093000 +CVE-2014-3750,0,0,59d9e96157779273bd5cbbd409ad0583fcd327a214221a15d9a7cce82633fcec,2024-11-21T02:08:46.237000 CVE-2014-3752,0,0,65ce0b455130f4c68726629741798a5839920e1b96b9df17dbb784dd493b29f5,2018-10-09T19:47:28.530000 CVE-2014-3753,0,0,218fcd5223241958e01afd941735565289b389c12b973aadf33aaa56de227f8d,2020-01-22T14:57:35.490000 CVE-2014-3755,0,0,df0762295b82aa99f591f99facac1e5aa415568ad5428347469084037f449353,2014-11-17T17:38:37.643000 CVE-2014-3756,0,0,24b1dc98fcdd3f94728fb423a2086ba63611d5ec1917280104aeae7004018309,2014-11-17T17:36:31.193000 -CVE-2014-3757,0,1,36ce443e0d09103ac4ba26dfa1352284ca134775f1aa104e383c4014b6068eba,2024-11-21T02:08:47.013000 -CVE-2014-3758,0,1,b41679399e043ff7d5c71e2ce97bb39e95c1b19b93a05ac4f47ef2165eeade1a,2024-11-21T02:08:47.163000 -CVE-2014-3759,0,1,6cf9b7295a04542be7b9d7c436f75d9554a6161d04865383fc9cb84be509433b,2024-11-21T02:08:47.310000 -CVE-2014-3760,0,1,d329a4876bbaa2473a88b2266844a319a67162bd9e16685581f5e5c62b9101ef,2024-11-21T02:08:47.453000 -CVE-2014-3761,0,1,dd45d78a7091db5475194bbd960459f6aad8160608c77bae0f77f76e0f7ef48f,2024-11-21T02:08:47.603000 +CVE-2014-3757,0,0,36ce443e0d09103ac4ba26dfa1352284ca134775f1aa104e383c4014b6068eba,2024-11-21T02:08:47.013000 +CVE-2014-3758,0,0,b41679399e043ff7d5c71e2ce97bb39e95c1b19b93a05ac4f47ef2165eeade1a,2024-11-21T02:08:47.163000 +CVE-2014-3759,0,0,6cf9b7295a04542be7b9d7c436f75d9554a6161d04865383fc9cb84be509433b,2024-11-21T02:08:47.310000 +CVE-2014-3760,0,0,d329a4876bbaa2473a88b2266844a319a67162bd9e16685581f5e5c62b9101ef,2024-11-21T02:08:47.453000 +CVE-2014-3761,0,0,dd45d78a7091db5475194bbd960459f6aad8160608c77bae0f77f76e0f7ef48f,2024-11-21T02:08:47.603000 CVE-2014-3764,0,0,f93cca330744b8fbc447862cdd07c1d823a84b2e1d35b364d6e9d82a00806c1a,2020-02-17T16:15:17.257000 CVE-2014-3771,0,0,f98021091b6ddba3d826156d31721043f6731256989b5b91805524d5baee2649,2014-08-07T13:57:13.300000 CVE-2014-3772,0,0,ed8284ece8d3a4021010a4ec9e116fe339ae3f176b3e9edd9159f92e2b76772b,2014-08-07T14:03:04.910000 CVE-2014-3773,0,0,df035072e4e0fe45406a197439642746f1403041c73e1e10231a29043c16423f,2014-08-07T14:07:08.203000 CVE-2014-3774,0,0,7b3ca49774901d48ed037ceb6b1199bd97566fc111a16bd6bdde964a05c7ce1d,2014-08-07T14:07:12.467000 -CVE-2014-3775,0,1,87ccd32fbf49f987e6852aafeef36b68caeb7fa282161e1c6a5cd5879aa2372f,2024-11-21T02:08:48.480000 -CVE-2014-3776,0,1,89034259261db496ab69e71a737bc8466f059823ddd4ca9295d474cd55a99dbb,2024-11-21T02:08:48.627000 +CVE-2014-3775,0,0,87ccd32fbf49f987e6852aafeef36b68caeb7fa282161e1c6a5cd5879aa2372f,2024-11-21T02:08:48.480000 +CVE-2014-3776,0,0,89034259261db496ab69e71a737bc8466f059823ddd4ca9295d474cd55a99dbb,2024-11-21T02:08:48.627000 CVE-2014-3777,0,0,c03317fe99d9568788168428417214ff4f3758fe411375420264a188fb68e224,2014-07-16T17:28:48.617000 CVE-2014-3778,0,0,25ba98fa7b085f7888a2d7a412d48417e6df818893f72b96162cc9e905489a76,2021-08-23T17:24:49.747000 CVE-2014-3779,0,0,2d48e6cf09f43d58c045cec31a9be72dd85fd53ea00a701b1a784ce8b270b62f,2017-08-29T01:34:49.250000 CVE-2014-3780,0,0,6e636a4e0f0fe16645d432d977e9578251c1a83ece17e52ba2c1276c1e3a2130,2014-06-24T16:50:36.247000 CVE-2014-3781,0,0,51ee09e774e14037ec2635741998bfa39fa8244f3e4e4c3cb972ca19855a780f,2014-06-12T15:51:47.160000 CVE-2014-3782,0,0,663b93ac96545e218611ec658794fb9f72ee757c448ddbf9068087314e66deea,2014-06-12T16:04:44.790000 -CVE-2014-3783,0,1,359eb7e89579f64ff300d705de5f7ef6fe9e0f0b457aa221a07d9cf0be0655ea,2024-11-21T02:08:49.650000 +CVE-2014-3783,0,0,359eb7e89579f64ff300d705de5f7ef6fe9e0f0b457aa221a07d9cf0be0655ea,2024-11-21T02:08:49.650000 CVE-2014-3786,0,0,78c3dcce34d7dccc1e5005bda279c0a1b90e8655a2ecc8f4ac6155e764528585,2021-03-29T12:16:38.423000 -CVE-2014-3787,0,1,04c4f835137e6a6c2456a9612973d91417786c5d99ed0086e621adebb8cf8a80,2024-11-21T02:08:49.950000 -CVE-2014-3788,0,1,7a918be9af13b4255168c6d03379adae2798720c4b428b5d393c2cd9000c735e,2024-11-21T02:08:50.097000 -CVE-2014-3789,0,1,a4e7d36a5d8b6a2c2386277f3713cf1fb6e03a7f86fa027021458fce161e2eaf,2024-11-21T02:08:50.237000 +CVE-2014-3787,0,0,04c4f835137e6a6c2456a9612973d91417786c5d99ed0086e621adebb8cf8a80,2024-11-21T02:08:49.950000 +CVE-2014-3788,0,0,7a918be9af13b4255168c6d03379adae2798720c4b428b5d393c2cd9000c735e,2024-11-21T02:08:50.097000 +CVE-2014-3789,0,0,a4e7d36a5d8b6a2c2386277f3713cf1fb6e03a7f86fa027021458fce161e2eaf,2024-11-21T02:08:50.237000 CVE-2014-3790,0,0,fe2580ea5319a22eea6fe0b74681c6980bed7818290d5f2a90d97bf4a6f70dc3,2014-06-21T04:41:40.320000 -CVE-2014-3791,0,1,348d643f328c903265b8fe6488a9ae4c069134c2df621a454e4e74d211c048f0,2024-11-21T02:08:50.527000 -CVE-2014-3792,0,1,202f86f5e20d084bda70dfba5d54ebb1fdd92a2d991b6117132ea802e7903c0e,2024-11-21T02:08:51.367000 +CVE-2014-3791,0,0,348d643f328c903265b8fe6488a9ae4c069134c2df621a454e4e74d211c048f0,2024-11-21T02:08:50.527000 +CVE-2014-3792,0,0,202f86f5e20d084bda70dfba5d54ebb1fdd92a2d991b6117132ea802e7903c0e,2024-11-21T02:08:51.367000 CVE-2014-3793,0,0,601760d90fc294fbc8b02d260c2afb7c308e12ce7b54ee4bfbadac4a7d49277f,2018-10-09T19:47:30.017000 CVE-2014-3794,0,0,4fd8f1959e482a0894639519704811c24c699185030609dd928c4653ecc4691f,2023-11-07T02:20:19.343000 CVE-2014-3795,0,0,8aba335902473c1373ec56c92f7ed6174bf87dbb519e6aa8ecf577f9541c5aba,2023-11-07T02:20:19.613000 @@ -67943,14 +67943,14 @@ CVE-2014-3797,0,0,084d58775913cf8831d2d6eb5510baf232d8e5404985148360362f0a1c2119 CVE-2014-3798,0,0,f8bf963ef32f5608650ca1e235d91297108e028e7512b1d15cfa9fadcfd6df56,2019-07-15T19:33:42.130000 CVE-2014-3799,0,0,ab188f560a5c4926d30138d33164aff7fff53db134ea8f8364246068d94dadb8,2023-11-07T02:20:19.890000 CVE-2014-3800,0,0,a30a3a1abc8a9363d1ce28c821a382a433e91f96b7b81a5e2eafdb202769a626,2014-08-07T15:49:47.667000 -CVE-2014-3801,0,1,261b5bff26591a2166d6354d9b20d174760dcebbb074f34920d27aa842af01d8,2024-11-21T02:08:52.437000 -CVE-2014-3802,0,1,0e2664bfee0c2a9ca85c48210459bcb524912116619dfd1e98a82d1ddf8a5922,2024-11-21T02:08:52.577000 -CVE-2014-3803,0,1,2c4df94554e176b263a459ed6b37a795153648bbd608b387b76bc061e485ee6c,2024-11-21T02:08:52.720000 +CVE-2014-3801,0,0,261b5bff26591a2166d6354d9b20d174760dcebbb074f34920d27aa842af01d8,2024-11-21T02:08:52.437000 +CVE-2014-3802,0,0,0e2664bfee0c2a9ca85c48210459bcb524912116619dfd1e98a82d1ddf8a5922,2024-11-21T02:08:52.577000 +CVE-2014-3803,0,0,2c4df94554e176b263a459ed6b37a795153648bbd608b387b76bc061e485ee6c,2024-11-21T02:08:52.720000 CVE-2014-3804,0,0,3670bba831cc3e7ebdc1ef0472cc242047e343bf499773f1fc3d03dba94f2138,2017-09-16T01:29:00.577000 CVE-2014-3805,0,0,43d6731493307cca0991b958323d7c2ecc0e4ef53397af40833bdeb9c040f31e,2017-09-16T01:29:00.623000 -CVE-2014-3806,0,1,64cb294c5a676d3b08b599e4a3a7ec3487451b8e29ebdfd0b27907506c00b502,2024-11-21T02:08:53.183000 -CVE-2014-3807,0,1,2c8dc86feeb67c5b7a83257b094e80d0d53a4feee06e4bd9cca41b43ba82022f,2024-11-21T02:08:53.323000 -CVE-2014-3808,0,1,7921b729e219974f8ee316f87d07a9b94eec8e1fe38fa021bc3d0192b96107da,2024-11-21T02:08:53.483000 +CVE-2014-3806,0,0,64cb294c5a676d3b08b599e4a3a7ec3487451b8e29ebdfd0b27907506c00b502,2024-11-21T02:08:53.183000 +CVE-2014-3807,0,0,2c8dc86feeb67c5b7a83257b094e80d0d53a4feee06e4bd9cca41b43ba82022f,2024-11-21T02:08:53.323000 +CVE-2014-3808,0,0,7921b729e219974f8ee316f87d07a9b94eec8e1fe38fa021bc3d0192b96107da,2024-11-21T02:08:53.483000 CVE-2014-3809,0,0,40a80fc2e87054b8332f9b6a4ed8510bcc705d2b7c373985062ea0f0da8eb6aa,2020-02-05T18:08:32.827000 CVE-2014-3810,0,0,3a122595e3bb5de3e4c56bbd26b5a66964ad63b212c387e46276010915d70d20,2018-10-09T19:47:31.203000 CVE-2014-3811,0,0,e827f085edfdaa04a48966d8c8a122e3c8d3ff0599cac4cdf5038285e78cbfb7,2014-09-30T18:26:46.047000 @@ -67982,14 +67982,14 @@ CVE-2014-3836,0,0,83980f3ed77948efc3d137e848884c6ceb67812ee54f831f3c2307493d5680 CVE-2014-3837,0,0,72c68e99b432db79035cb8d75a57d7e24c62b751f9dc795d97689d4be8e0e95e,2014-06-05T17:38:33.187000 CVE-2014-3838,0,0,4f7d36e3f5f7d077c3a4b1ba4fb595ff72401b0006a5531b9f5f9f7626b8398b,2014-06-05T17:37:06.537000 CVE-2014-3840,0,0,37763c5855ebe376c660d6055320484f25eac0dc2da8ce843b767ea9b70350bf,2014-06-18T04:32:59.573000 -CVE-2014-3841,0,1,4d9dc2c8d649b30480132de65527a3b6207bf4266aa2f99a578de025108237fd,2024-11-21T02:08:57.977000 -CVE-2014-3842,0,1,25869d7b825ca595bd4a0669ea4711c31812b521b3ff0d9364bef9a02958ad05,2024-11-21T02:08:58.117000 -CVE-2014-3843,0,1,740ebebdb56763118ad51051fbe3c513991cc040f6d69abd4b7d9e595b9bab68,2024-11-21T02:08:58.260000 -CVE-2014-3844,0,1,126c6eac6b851b70bea09f8f7cfa96d6258616a4a72731cc35a65dccb020e881,2024-11-21T02:08:58.400000 -CVE-2014-3845,0,1,9ecf9ce36213b77c9bf2b3517505dd8f86d238e8c1d55d13e2a2cfc2945a6d1a,2024-11-21T02:08:58.533000 -CVE-2014-3846,0,1,d054ca0d6a1c1ce732f0250b1c7f8128b23fb2539edfed09425c9b4d953017ae,2024-11-21T02:08:58.673000 -CVE-2014-3848,0,1,dbe6db09b3e38d7d0dacc605cbe793563959c2a9c6068b3cb6400c0cb1c8c421,2024-11-21T02:08:58.813000 -CVE-2014-3849,0,1,ebf4dc69b9923406bb48ab8a880e2c0db056070ca73c2055d3e4525e90452947,2024-11-21T02:08:58.977000 +CVE-2014-3841,0,0,4d9dc2c8d649b30480132de65527a3b6207bf4266aa2f99a578de025108237fd,2024-11-21T02:08:57.977000 +CVE-2014-3842,0,0,25869d7b825ca595bd4a0669ea4711c31812b521b3ff0d9364bef9a02958ad05,2024-11-21T02:08:58.117000 +CVE-2014-3843,0,0,740ebebdb56763118ad51051fbe3c513991cc040f6d69abd4b7d9e595b9bab68,2024-11-21T02:08:58.260000 +CVE-2014-3844,0,0,126c6eac6b851b70bea09f8f7cfa96d6258616a4a72731cc35a65dccb020e881,2024-11-21T02:08:58.400000 +CVE-2014-3845,0,0,9ecf9ce36213b77c9bf2b3517505dd8f86d238e8c1d55d13e2a2cfc2945a6d1a,2024-11-21T02:08:58.533000 +CVE-2014-3846,0,0,d054ca0d6a1c1ce732f0250b1c7f8128b23fb2539edfed09425c9b4d953017ae,2024-11-21T02:08:58.673000 +CVE-2014-3848,0,0,dbe6db09b3e38d7d0dacc605cbe793563959c2a9c6068b3cb6400c0cb1c8c421,2024-11-21T02:08:58.813000 +CVE-2014-3849,0,0,ebf4dc69b9923406bb48ab8a880e2c0db056070ca73c2055d3e4525e90452947,2024-11-21T02:08:58.977000 CVE-2014-3850,0,0,075806fdaed8c124b72a064ed9bcc2ee3ea2c138458b4012b19c94a183ae61d8,2014-06-12T16:10:41.583000 CVE-2014-3851,0,0,6f8bf01947c2ba475c0026fc4f62ebc3eb50469cef73c108d23faab7b0a8f39e,2014-08-07T15:57:32.403000 CVE-2014-3852,0,0,4ed9f56dd6f083ff0291e080c34720f7e1d5d156b41181f1d982efcf86e33dce,2014-08-07T16:08:03.800000 @@ -68006,1007 +68006,1007 @@ CVE-2014-3863,0,0,4b2723825cde1325f85ccc2205d6651e07c6360ac985979201f6f3f13bdc27 CVE-2014-3864,0,0,9102ecef6f7e3031c64cd95cb7a7422a2e4ffe3261d901af999235832a08a948,2017-12-29T02:29:22.267000 CVE-2014-3865,0,0,715ea49e321f26a40577f551259c5f86b3edce9f09c7ed2e03b95a668994a07a,2017-12-29T02:29:22.330000 CVE-2014-3866,0,0,b37539bbf4aa19e6c19f5a00462ce712c2c3acb0cb216a2c2745ae2f51ab1389,2014-05-29T23:22:36.640000 -CVE-2014-3867,0,1,af3b1f5757f7756c01b91a7e3d0350756f0058a692a578fb09b0316fa5e4600e,2024-11-21T02:09:01.410000 +CVE-2014-3867,0,0,af3b1f5757f7756c01b91a7e3d0350756f0058a692a578fb09b0316fa5e4600e,2024-11-21T02:09:01.410000 CVE-2014-3868,0,0,ca6043094e5fe5075eb8262dfddd934dd21d89dbb8d049e11d9366cb594c68b6,2020-02-03T14:54:08.077000 -CVE-2014-3870,0,0,41688bd56efe1ac105674d52d9ba3c1cecb0a3e93e74dcccd28546f23728f933,2014-05-28T14:02:00.293000 -CVE-2014-3871,0,0,68ea6cdb59e638619a2c8ffd238ca7b5155e996ae56b542485f55fde6d6d32fd,2015-09-29T18:48:10.150000 -CVE-2014-3872,0,0,098ced85760b4c19c8da0e46d30bd7e73148ad3b813fb5f8e11c6d987b9cec03,2023-04-26T19:27:52.350000 -CVE-2014-3873,0,0,4e8ac9ae3e083c5e938b0ee889722c2e5a68e7f6abaf988602ec9ea03698405e,2014-06-24T14:41:48.640000 +CVE-2014-3870,0,1,1a5540a6603505cb90e3dfc366f8190d06be0f82b0eca8233f98c0571ef6d048,2024-11-21T02:09:01.697000 +CVE-2014-3871,0,1,2b7d053ac1cea5ad64a288231edac539a784b355abbd3ad15dd11a60d5a18769,2024-11-21T02:09:01.853000 +CVE-2014-3872,0,1,363d622687e4fbf9c2154e17508023899314d7df79399f39a04fb28504b53da1,2024-11-21T02:09:02 +CVE-2014-3873,0,1,52f141e210a9df3fcb572a377237018b0d494eb391898527df44479ae012b2c5,2024-11-21T02:09:02.133000 CVE-2014-3875,0,0,918463bf7cfaad44b4d657e66e9306f0b62dae65bf6772f86e26f7b05a8c3fbe,2019-12-06T17:24:25.637000 -CVE-2014-3876,0,0,9156759dbd1821cc029183c141c2e8b601fa781926a23fad66719dff4577cb19,2014-06-18T18:24:11.403000 -CVE-2014-3877,0,0,bf8f4b3087d4d6a9aa04ef1e996702b7c69e40d6ee51f74aeb2e7514514a2ba9,2014-06-18T18:27:01.340000 -CVE-2014-3878,0,0,8a075ae097ff5856891363003579c1620bc596ea5f48684f108ea88640e05fbb,2015-08-31T18:28:54.140000 +CVE-2014-3876,0,1,7841fdce8eb9254b028895992e0697c203630fa9b5ac063ed8351458cfd1a139,2024-11-21T02:09:02.427000 +CVE-2014-3877,0,1,4b540e0699e687985bd512a4e45f7360d96443cca774151c36f0b33a593f3d5a,2024-11-21T02:09:02.580000 +CVE-2014-3878,0,1,30d9a0433d52ab094f22e47f28ae11282e680eb8a49d8580e279778f6ad43e54,2024-11-21T02:09:02.720000 CVE-2014-3879,0,0,82d0aafad1bab937ed91c83c97bf02e105c7122ccc72bdfe9cb3005cf079e66e,2020-02-27T15:52:50.303000 -CVE-2014-3880,0,0,795efbadcdb2228aeed931bf5dfc9231b036c9e96513853da3da631f577ea7e2,2014-06-21T04:41:46.037000 -CVE-2014-3881,0,0,b02000c468e3e395d6ebff6bf8e320f7705ccc0b1bef477d5c930acbc8da14d7,2014-06-30T14:57:01.667000 -CVE-2014-3882,0,0,bb75523203ff7e652907fc5fbacccb05ad8ce79a11cbd9444ad00973fbda6c27,2014-06-25T14:35:14.943000 -CVE-2014-3883,0,0,04d34c2b8ea80c8dfee4d92bcd46886a39601d149d3ef21a9d03dbc451ac101c,2014-06-23T17:19:51.780000 -CVE-2014-3884,0,0,797c535380214901b77dbe070a0d3df0659d5ff9de56db3856220cc02c0caeb0,2014-07-22T22:55:14.520000 -CVE-2014-3885,0,0,3810b3490351592b99d916cb79608f54476d3a1c9ac67858faa030d8944b578f,2014-07-22T22:54:54.143000 -CVE-2014-3886,0,0,0dbc478f5cb7ea3c087db4701ffe2a678eda0370afce1a74655bc2f1d2793a65,2014-07-22T22:54:18.487000 +CVE-2014-3880,0,1,750e6e19dbc6b5687139d2183c4694efe2034298d7dd468c21e8dd0b33de4701,2024-11-21T02:09:03.010000 +CVE-2014-3881,0,1,80e60232179a329679c0a8798ba3d434ddb32121677b3c142d401d2526ebc64d,2024-11-21T02:09:03.160000 +CVE-2014-3882,0,1,56385d29ca20f9288a350c78c19090654cc21ed80149f1953de60ef65e0e69cb,2024-11-21T02:09:03.270000 +CVE-2014-3883,0,1,21c4768cb6f02e7bb7b0bb8c3840d5ec30e477de4dea3943fec02689235839b2,2024-11-21T02:09:03.393000 +CVE-2014-3884,0,1,4d7d34aefaa384f98fcae83bbf07f0f4b6fb916048241cda9f16ff506b1c9d46,2024-11-21T02:09:03.527000 +CVE-2014-3885,0,1,7f32f9ab0faa8f7a87da59eba30a090928165aecbf0429a00e146aadc9a0178e,2024-11-21T02:09:03.663000 +CVE-2014-3886,0,1,aeb3cdc200a0787870ad3e70627c240a83ff5d5e04f86b2772a97ec0fb120b8f,2024-11-21T02:09:03.790000 CVE-2014-3887,0,0,7cff0936eabca32f420266272373b1e4ee770e6d43e2bf59825e8c7280248497,2017-04-20T16:16:38.160000 -CVE-2014-3888,0,0,4f640c3e89c80dee90d46c16c11ca908fb27382de301d69cc89a8331527ebb41,2015-10-08T15:15:10.473000 -CVE-2014-3889,0,0,67035e229ee7ada4ac201b35f7630c29978c950775c90321ab42eb30b8d80977,2014-07-11T17:58:03.387000 -CVE-2014-3890,0,0,877f60b1e06b1bc6d4f367c037ff5d6ba39f808324c969b38e68fe3d8ac147ae,2014-07-11T17:57:02.880000 -CVE-2014-3891,0,0,4844e40f13b2476d520be853a3ad7709db6d5d2f0784ba36ca3afd8496b9e81e,2014-07-09T18:17:07.107000 -CVE-2014-3892,0,0,dfdb77de91d439c0beb8608f0ea10d87d9eb00c92285e36cc31f81c39cc2065e,2015-09-02T16:56:15.973000 +CVE-2014-3888,0,1,89e823b44e419534fa8562749273bab13e062bc99acd42793bc46676563384b7,2024-11-21T02:09:04.023000 +CVE-2014-3889,0,1,5b7d13a4105e53a326e2d592213bac516703506359144909d6a35d8676b0d506,2024-11-21T02:09:04.153000 +CVE-2014-3890,0,1,c1f2400d2452fe192bd5f8248640466c64eab0820b7a4c6a316abece7526c8b3,2024-11-21T02:09:04.267000 +CVE-2014-3891,0,1,ebcb8d896249aacd9d45d9f7d17d506eee371eabd1bf67de0b31851c042c5b0a,2024-11-21T02:09:04.390000 +CVE-2014-3892,0,1,c0e94a82cd127e9e5c183e06d92e2369467194258214760091af618203df9957,2024-11-21T02:09:04.510000 CVE-2014-3893,0,0,75b5204dc779b8af8745fe0aafccb87079bfad907a6fdacd35753e4025b58045,2023-11-07T02:20:20.547000 -CVE-2014-3894,0,0,2ae84444883b65c6b012b952b8c0628b1a7f48cd1e993d07c850c355f08f50e0,2014-08-04T16:06:36.090000 -CVE-2014-3895,0,0,9dbd8b432ed73ba8dccc6f5a35384a68a764d32332a3619d6735076fc9d94a69,2014-07-30T18:48:14.953000 -CVE-2014-3896,0,0,1478245557a0e72186dfc1b35226804136d22f2385f19f1bf2d79e209634184e,2018-12-18T14:31:14.697000 -CVE-2014-3897,0,0,30dd71dae6d9b873dba4e97af9f0e3508b9cc6e0a73324bfcc40675475edea33,2014-07-30T19:03:46.537000 -CVE-2014-3898,0,0,659b126e446fda2ff0d6659936d848470b6e1a1025bcf2ab3b5c52b98d95f88a,2015-12-04T16:21:57.770000 -CVE-2014-3899,0,0,07aa512a8bbf20a603298137dd82430f0fad34786e9ce8086392a181cd9999a5,2014-08-12T18:31:52.407000 -CVE-2014-3900,0,0,da9a951649ba2dba8c78d9d002c0e7bdf41e33e475d97a42f7331c60c5eb354a,2014-09-08T17:54:55.290000 -CVE-2014-3901,0,0,39874032310eabc1cb02cc76466e1d3b4cf048f4f8cde6ed51206d83ac1ea2a8,2023-04-25T15:42:57.777000 -CVE-2014-3902,0,0,a82cefd01ea54e80217aadff445004f4701604c49fe60722890f1a5f1ef17c01,2014-08-15T20:38:32.823000 -CVE-2014-3903,0,0,72a1f48835d82cbde8080b114bb6e1561b2eddd265f08b3e6303d49bacb85ae0,2017-07-17T13:18:02.360000 -CVE-2014-3904,0,0,668c054e98657fae4b5f7d17bdf409485d72fbd468e1b0ed91725ec363a4d4a4,2014-09-08T17:51:48.667000 -CVE-2014-3905,0,0,258ad2c3bf9330da929d65bb601692afe0b68192727343c23dca2d779b3e92f4,2014-09-08T17:51:19.260000 -CVE-2014-3906,0,0,2ebfe0ee2cd539204b58bbf6feaa32b695c09f94b52137500eb310c46db4a24b,2014-08-19T17:13:11.810000 -CVE-2014-3907,0,0,ec7fdbb0e797b8cb622bcff869cbe13bd23ad25a7e633823dbe11d62d77a37f8,2014-08-27T16:27:00.267000 -CVE-2014-3908,0,0,16c7dd211702ac9ebf34a495a4510c0762302a2294c33975f0032d3d6c32324e,2014-09-02T18:04:50.450000 -CVE-2014-3909,0,0,cee3d67de7f92f95e7c9945b1ed7ed2c68bddff4712c611227b30379420cbe6d,2014-09-08T14:45:33.100000 -CVE-2014-3910,0,0,2c180cfaac320e6e349195db81354685b15cfa10882f389175cf7fb09e16f71e,2014-11-19T00:56:18.810000 -CVE-2014-3911,0,0,b8e338ff911efc0346df7243aa7a41c02e1c0d3f4fbc25a2aa48080b0d5d1115,2014-06-12T16:24:36.663000 -CVE-2014-3912,0,0,5a2078ac8f14f6260eac780c58c31f9bea7873c249012567dd498559464f00db,2014-06-06T13:17:47.690000 -CVE-2014-3913,0,0,041d51b0b16b20e4df8ba18026ed34018b3b77bcfeab5bcbff89b0d35e5fc017,2015-08-31T18:29:18.170000 -CVE-2014-3914,0,0,be951b0040f507d618d751ba13c99abbe777a7f9676defd6b66b63185bfaab01,2014-08-07T17:44:36.603000 -CVE-2014-3915,0,0,7b6933ebde45815b3fba9bb2275d2b9c0b8cc04fa443cbca84dda6a16d1676f8,2014-06-12T16:58:43.027000 -CVE-2014-3916,0,0,927bd9105a85e50338c948c014b09e2711548b6dda124fbbbccb99790454f0c2,2019-08-08T14:43:53.293000 -CVE-2014-3917,0,0,e1ae1e675b33398ad63db2d7294a2afea3bb396ea485a401fc9c4f8c99fb156c,2021-07-15T19:16:09.750000 +CVE-2014-3894,0,1,3698674e6fab07713f93c2b6a3ff39578c1b6eb9ac28a68fdf02ca9f2e9e5fd8,2024-11-21T02:09:04.633000 +CVE-2014-3895,0,1,fde8a789139449803651072e4a4837cd688d45e1a45f82a223af16f565261bc1,2024-11-21T02:09:04.740000 +CVE-2014-3896,0,1,af96371a17a5192ba7928d1eb8c0bf7d8d3f7f72288af3ee17ea9b74d750d8c4,2024-11-21T02:09:04.857000 +CVE-2014-3897,0,1,34f0ee6ed73aa5d58a7f632e9df4c32edfa92e30c24c9a918aaafa7e395737c0,2024-11-21T02:09:04.980000 +CVE-2014-3898,0,1,6b92c9ec43e751a4f96f63fe71063a7c8074cb896956cd0cdb5989b7c184794d,2024-11-21T02:09:05.083000 +CVE-2014-3899,0,1,0c88b14b9a833e31860e52e207f9f33bb9bdcc4bc9a426c9fe48c16cc3152b79,2024-11-21T02:09:05.193000 +CVE-2014-3900,0,1,6e5825a219c1a20a20cf639815fde79c2a218b713cee8b9ae020bc4394bd9537,2024-11-21T02:09:05.297000 +CVE-2014-3901,0,1,5d261e73abd8b1cd19b496dc6a307374c950dfc1e239660c649bdc0082d70b01,2024-11-21T02:09:05.410000 +CVE-2014-3902,0,1,706bfbb05ca2d4dfa523641a7aeca7852662af47ed19ccaa07e6982febb64673,2024-11-21T02:09:05.523000 +CVE-2014-3903,0,1,9be2bd13ea5f07e0fc1777c5d3695733b61705df4ff544b3de2d9e23166c9982,2024-11-21T02:09:05.640000 +CVE-2014-3904,0,1,bf81c6a270146b4c3860911616a3082a1163bf527bf26118e86f683eeeb18634,2024-11-21T02:09:05.760000 +CVE-2014-3905,0,1,e5371af092dc6429b79022315704856c55151ea395546f9576d090142eeb4831,2024-11-21T02:09:05.867000 +CVE-2014-3906,0,1,ce5d05cb7becd923cf7915fc620f863eae79f3804f778279dc3d873ae739384b,2024-11-21T02:09:05.983000 +CVE-2014-3907,0,1,0044d4f4cf236380e5ade134ed2583f243d51fc7db4995607ae3e369e73fcc15,2024-11-21T02:09:06.090000 +CVE-2014-3908,0,1,c2d3a8f112c0d9aa4639b044ba7d675543c9f843dd26adde7421a94e8d6d7104,2024-11-21T02:09:06.230000 +CVE-2014-3909,0,1,6a0a9725efd27f6146819ccc34a75dbecbc4a45263792594f48f3cfddb1080fd,2024-11-21T02:09:06.357000 +CVE-2014-3910,0,1,a31ff057a7bcc96fb5088959acacadd36a6745b5a72f9eed3f51f0fbafcd3d1b,2024-11-21T02:09:06.473000 +CVE-2014-3911,0,1,80ce78b5d81c790187abd7424994d61809ffe7d1e6970cd06278ed010a6d0be9,2024-11-21T02:09:06.610000 +CVE-2014-3912,0,1,0f07a2a81b46c95facf43f94980d6e29dd3c9f93b3faceb878442cb408d81c91,2024-11-21T02:09:06.763000 +CVE-2014-3913,0,1,45e0c45b2a32fc85f5e65c2e2404730a49447bba900a1373e650e7ca75d48238,2024-11-21T02:09:06.913000 +CVE-2014-3914,0,1,5d4701a26fca422b16502213d7924ca19fcbf4cf23830cd37086ecab0e0b68ce,2024-11-21T02:09:07.067000 +CVE-2014-3915,0,1,ea6ac57be32e7c2439900912797045b5c8f880b071d6bf526ffa9df92caa85b8,2024-11-21T02:09:07.213000 +CVE-2014-3916,0,1,a8525ddf1c9710264bd43c13f9bdb0df853c7a1f81bb18e5e8a086ec181f280d,2024-11-21T02:09:07.357000 +CVE-2014-3917,0,1,ae310ce1bf842318ff91466e287125d21c5c36b6b7fe0b31fe47f5dcd172545c,2024-11-21T02:09:07.510000 CVE-2014-3918,0,0,8dc7da02fcc858eea36bd468b1be217083e37df903a873517c6f5ec49983673b,2023-11-07T02:20:20.923000 CVE-2014-3919,0,0,f13fb2248bc24c8177f093b3c35644a9cc221f13b36fd398b793e328e002a9e5,2020-02-19T19:01:34.937000 -CVE-2014-3920,0,0,8afc5cce2fd0f38247e0cc63f4f5f4c1b6c7543abcec878915beab2ff9448a3f,2018-10-09T19:47:32.453000 -CVE-2014-3921,0,0,e967ffeeca61b0f125ccb3975aeda144af59755dacd9b070069c39c68fe461b9,2014-06-24T17:21:19.133000 -CVE-2014-3922,0,0,83707b52b623633bd6f42afbd2cdfff387248c39aa029fbaf3c2a293fd816d2f,2016-09-06T13:21:08.203000 -CVE-2014-3923,0,0,519054dd62bec8b0bff56c79083a6ab05ef7654d52899245bc75b6786da859ae,2014-06-25T17:59:21.437000 -CVE-2014-3924,0,0,b14737be470ed3d56c9dadd093216b603733e29f911dfaab9e47d016c16fae7d,2014-07-17T05:07:14.840000 -CVE-2014-3925,0,0,45841c07599922be07ef6fadb2d9f815de8a5776f59628d0f5021b5f3d9894a5,2016-04-06T12:53:38.977000 +CVE-2014-3920,0,1,29366b92c259d2267821d97d1f36a9649746c87cf2c7325807d46247ab3fdb48,2024-11-21T02:09:07.830000 +CVE-2014-3921,0,1,d327deba012c67e6783d3541c0eaf80ebf09a57c681177bd0112a531416e9062,2024-11-21T02:09:07.970000 +CVE-2014-3922,0,1,c27ff8e032e51c8d3a9366b63791616e07691627b673f8bff64e0f50700e8703,2024-11-21T02:09:08.107000 +CVE-2014-3923,0,1,972e4bf63499255a0163f186aa61248af48860bee8983f9079d6c702e0acfd4e,2024-11-21T02:09:08.253000 +CVE-2014-3924,0,1,f17ac258d9549c3901d77b25221d3a1de4236a02370fc19d54b7931a0478b213,2024-11-21T02:09:08.400000 +CVE-2014-3925,0,1,0e8d24a40e908c7cc267381468bfaed6f7e6ac3529d9c8edefc9497510f1289b,2024-11-21T02:09:08.557000 CVE-2014-3926,0,0,4622ce8cca8218e9afb83c81958ec20c73ac5366b3db1c73b41f8c62f85d4990,2017-03-14T19:05:51.457000 CVE-2014-3927,0,0,cb18ca4f39919fd203c0cc571cbe5da658c9580f546b4f4984621dc5b0133ac6,2017-04-10T21:35:18.963000 CVE-2014-3928,0,0,fe4658f92fa3fffdbda508fe501e6f84318131d807f0a8e4a5fa4a1084a44e3a,2017-04-11T15:01:51.310000 CVE-2014-3929,0,0,66df7323c8c02ee22f0ba48b2b3e2b069fec2c5b190144ff6f8e3ef5027266f3,2017-04-11T15:03:23.830000 CVE-2014-3930,0,0,282d3f7194fd234371f47eeb20f58be054efbd97c4eed3eb8789d74a68ebc804,2017-04-11T15:04:39.490000 CVE-2014-3931,0,0,f359b129c5c67268d44151c28c7ab9890c9a4eaba33efdda4e67bca03a2aa007,2017-04-04T18:05:19.480000 -CVE-2014-3932,0,0,7f274d8ef0de01a06dae2c202ca1e6d38a7063fe14dd1207da69b2b8eb473980,2014-06-03T10:49:20.737000 -CVE-2014-3933,0,0,bbf1d02e9a1f832486a352e0c25f4c7397681df36eb6e0ed1301f617d75bba97,2015-09-02T16:56:37.223000 -CVE-2014-3934,0,0,95fd9d2cbeba1808d6c2cf61b9eec7e30b3d81d3fc716068a9c2cf2e173631f0,2014-06-03T11:03:58.167000 -CVE-2014-3935,0,0,1240f74cfb8055c0f46f912722ff96a4dd9d5606fa3071ff3f519726c7046f17,2014-06-03T11:08:59.573000 -CVE-2014-3936,0,0,a2944bdaf6bad90271d4c7241edbd5c44dad6faebb6f31ed1a0998fb32f6f9bf,2023-04-26T19:27:52.350000 -CVE-2014-3937,0,0,f0374ba1b4562e6b5810dcde72f4f2eb22b5e02aa3c5fe9e235c537e30ed3ce0,2014-06-03T15:09:04.850000 -CVE-2014-3938,0,0,132711bbafe9cf4a6d82ffa75ddb3c7feaf65724b2fef8207c290268f7f65ed4,2014-07-23T17:14:20.307000 -CVE-2014-3939,0,0,fd1c45dad63db3129908e5b52c72a39c0076dbd2c30a9258addc144481cc880e,2014-07-23T17:19:22.580000 -CVE-2014-3940,0,0,b27e810960e578bb65bb5f65d5e67f459a3f6d8d8d22f515c176e7205fee0eb9,2021-07-15T19:16:09.750000 -CVE-2014-3941,0,0,9954f20c98b235e77e19e72ccbfa3e8ea622d0851c04b6ff1e8121bd1409fe39,2017-12-29T02:29:22.440000 -CVE-2014-3942,0,0,ff89b1b70f8facf04c4e813ed9d8cdc9055d3869ad10873e02d2de5d1c92decb,2017-12-29T02:29:22.533000 -CVE-2014-3943,0,0,93e30667af569b00353460c57699ef6d6bef270e5313bf7ac16f550ff352f4cd,2017-12-29T02:29:22.627000 -CVE-2014-3944,0,0,856171048f0378e424163a56d0a654566f9a3d9f4ceda83c350a209cf6e814eb,2014-06-04T15:15:16.557000 -CVE-2014-3945,0,0,622bcaa2c90a56e539ef0a29c8237d8ba8b7b0a3deab4d8dc1bad4fe328c7fbf,2014-06-04T15:24:19.577000 -CVE-2014-3946,0,0,06b3c072d98b7b256b3e81705c980e45de3ae24306e165b4671e51c2d31f4ca8,2014-06-04T15:26:45.477000 -CVE-2014-3947,0,0,4e72b80fb291682d5d65570da0c7825f7a33e0be7c4968abd82f9838c807e929,2014-10-10T05:22:29.770000 -CVE-2014-3948,0,0,46726e1fded4a8b5cf0268128823c88106989bad8e90ac04767882dd373b6279,2014-06-05T17:33:03.437000 -CVE-2014-3949,0,0,6c17c1f6df1f5346e675e99c6b4391aace52d19be0727997b8b5380f764ba695,2014-06-05T17:32:21.090000 -CVE-2014-3951,0,0,d85d3e116d1339bfb5670293e23e0317da54169e9e45485fbf45a2c9ee88616a,2014-08-21T23:14:11.237000 -CVE-2014-3952,0,0,fbb6a3ced1553ffd997610220e7eac1ba4acf9021afbe27944c52acb1ef9af50,2017-08-29T01:34:49.500000 -CVE-2014-3953,0,0,ded83770907ebc221addb2d6a1a21a8cc0d8a99772549c588c2996453e22f3f9,2014-11-19T03:01:37.533000 -CVE-2014-3954,0,0,a0e4356a7823b104ff53367695189f4b65c22e6431ea813be436e59d88a2511a,2019-03-18T15:35:23.750000 -CVE-2014-3955,0,0,03ef6b169e4c893f8abf3181b1585b2b24f2a43f5f96c65a9eb235e1683198b7,2019-03-18T15:35:23.750000 -CVE-2014-3956,0,0,26c5775f8d810ac472a25ef1e59477a9858b8265c6b24d6baede2b0d0d43e776,2017-12-29T02:29:22.723000 -CVE-2014-3959,0,0,f29a584e835e0652d3a80b45a40ee4de3883994aa3b1b4ee08c89fe93959114f,2016-10-19T16:45:15.223000 -CVE-2014-3960,0,0,fd5ab1ee461b4336e58bca05279d67993d50bca96d4619bfe1ec33ca6b763caf,2014-06-05T13:30:39.467000 -CVE-2014-3961,0,0,e41df783e4b42381e245b0228e6b24d7e176f5506cefa6f808a43794d1d2cf3b,2024-02-14T01:17:43.863000 -CVE-2014-3962,0,0,c7bd358b78b572144d3467ec2b2278a57f5fb763f36ab4a67875d7c9d1e690af,2014-06-18T04:33:07.340000 -CVE-2014-3963,0,0,4927d52126aaf15961223fec98fa4e15b40e86bbf4735f08cdf41f60aa38e5c6,2014-06-05T17:35:43.623000 -CVE-2014-3966,0,0,58025d4855ff50b30c512f3b4426b297b9c16e4673e40382c718ac6671704f35,2017-12-29T02:29:22.800000 -CVE-2014-3967,0,0,e1305abdc1d1ab46cab82f2c6018bed0a45b4268f5c35e35efd100c6f0edf03e,2018-10-30T16:27:34.687000 -CVE-2014-3968,0,0,d361762becb20c2a586858f7829a41361d8d3c1b3373039a5970109781af51e8,2018-10-30T16:27:34.687000 -CVE-2014-3969,0,0,fcc10c7a88bbfde199fba2de9cc296bc2a082eb4d72b66e1eeae5b6a82622c1c,2018-10-30T16:26:53.700000 -CVE-2014-3970,0,0,184e4e785933cf682c7140e298db60134cab5df60ce8f0435e83b53c0d5d6c80,2017-01-07T03:00:07.333000 -CVE-2014-3971,0,0,7b5c0643a41ab8a14e3c545076ff360305bfdacf6b757c08794e2e424711cfd5,2014-12-29T16:47:41.450000 +CVE-2014-3932,0,1,4c081a4d4467f81408eef5613d484f104efff1baab8c820fd2d7b8990ae64309,2024-11-21T02:09:09.520000 +CVE-2014-3933,0,1,db6b37433ef42951d34d1836f9d2e5dca181226661b4806adb6441556b6118b1,2024-11-21T02:09:09.660000 +CVE-2014-3934,0,1,30ea823c09c4b8be58ae729c16f5452082d83c0d3e59c983ea0b64ed05e0ed68,2024-11-21T02:09:09.800000 +CVE-2014-3935,0,1,ea1ba9659343f2ed2efc5b4df45b115965b99b77e00aaec74428f64c3127ea3f,2024-11-21T02:09:09.940000 +CVE-2014-3936,0,1,502fd02eb690eaad7eda8e4cc4139e9d1e2a224bc7dbd9c9e63e8135b0c1f627,2024-11-21T02:09:10.080000 +CVE-2014-3937,0,1,11d9a9b037de2ce0b0e6fbecd66a7a51afe1598781ca5bbd94db22db2b2b8344,2024-11-21T02:09:10.243000 +CVE-2014-3938,0,1,2cfce8ac097372cd9e036bee5aafc919ec3e37cafce57bb7210d0dcca6306774,2024-11-21T02:09:10.397000 +CVE-2014-3939,0,1,4ff1b124b34931881e62ea2c60535487b96bcec341e8bc8ea2d74b1b83003175,2024-11-21T02:09:10.550000 +CVE-2014-3940,0,1,23a16d99166ed199de2807233385a4a29e96c1309146c560a7140a88c86796a2,2024-11-21T02:09:10.690000 +CVE-2014-3941,0,1,966d261d684ec0c374c2095f2cb4005ce1cfe46c92ebec91cc1ea65a5c116684,2024-11-21T02:09:10.843000 +CVE-2014-3942,0,1,af302020fc9b7a7e8c341224842c8144d3ba67ac49e1898ada8aa04337c00ade,2024-11-21T02:09:11.017000 +CVE-2014-3943,0,1,36e1ebfd275fc2b6c373537de44f3a492a31232a702b3639c2c484c8d67e6e55,2024-11-21T02:09:11.200000 +CVE-2014-3944,0,1,ee15b05f80cb362201b22f5bad5d6c76090c47f8ef105aa939edd2cdbb606cd2,2024-11-21T02:09:11.370000 +CVE-2014-3945,0,1,d90a12e9aa67e66e3b101467a5eee60010f15bf701b6cf2f95503df30d84bbff,2024-11-21T02:09:11.523000 +CVE-2014-3946,0,1,be866f67122bfcc775cd6c7d83b11c58cd5cad8fd02cd4848a38642cc8cfad15,2024-11-21T02:09:11.690000 +CVE-2014-3947,0,1,e21d5030bddca5794eaf10e49d7d2aae7f9f7ddbb08a15b1f2c0b1a82942f5f4,2024-11-21T02:09:11.840000 +CVE-2014-3948,0,1,7a71f627bb2c9fcadee20c73cc001fb8ce7a92a38b1c426902570ccb73054c99,2024-11-21T02:09:11.990000 +CVE-2014-3949,0,1,56a82d11d2bf2006e8a39f078045c314436f304502911200c6d7358f0765fba5,2024-11-21T02:09:12.163000 +CVE-2014-3951,0,1,71e924d7c345a4e6ae07b3b24addb4328618385d9de6b6bdf8f04c69fd1dcda2,2024-11-21T02:09:12.320000 +CVE-2014-3952,0,1,79133658d974e0a193d7560a4d84114238a1755f44f98fa040d7cfe14d7ffe95,2024-11-21T02:09:12.470000 +CVE-2014-3953,0,1,9418138444a0d62fb0853d98ce7ed2dabf46db22af4da194e86ebbe9297a0c6d,2024-11-21T02:09:12.623000 +CVE-2014-3954,0,1,293339c0d2ee25c4f651c9862cfd1031931c40d5460ade28067321a406656603,2024-11-21T02:09:12.770000 +CVE-2014-3955,0,1,ed51cfe176a1a3845c49f1808c4e0854ece5dcc498d8c01b1690b370e4be691d,2024-11-21T02:09:12.910000 +CVE-2014-3956,0,1,71a67350110beeccf688e9d8488e48ea2e2a899d5086816ef1d97b88366857f0,2024-11-21T02:09:13.063000 +CVE-2014-3959,0,1,5fa57ae5cb0ce3da03e045441373e58352ca5369a72122ba88d22bc4189f57b2,2024-11-21T02:09:13.237000 +CVE-2014-3960,0,1,b010dd9de8ee015d4d25a5feec75a18391cb8c62e4c3d7eb20f3621abc55522d,2024-11-21T02:09:13.393000 +CVE-2014-3961,0,1,e0f78e40b1708d0ed627c82d240e08d19877c51997161475e6d3848755ce48c6,2024-11-21T02:09:13.553000 +CVE-2014-3962,0,1,468b7cb04b96afb769614834a0627adb13b5d055cd9c0ac4e59bbf34ab563f2a,2024-11-21T02:09:13.717000 +CVE-2014-3963,0,1,2360c97707db21d1b71b61b1cf15534493b1e09d0f47a04cc604428d0a9fd8d9,2024-11-21T02:09:13.853000 +CVE-2014-3966,0,1,e343187b49b9d20323ac1102a346b268d0cba30351d81daaecf9857f4a6890b5,2024-11-21T02:09:13.997000 +CVE-2014-3967,0,1,f67cf80771ac77d9018dcef6861528560184de39986e29e18b3a05ae6ec4bd94,2024-11-21T02:09:14.167000 +CVE-2014-3968,0,1,78be034101f540c0357ff463376c943074cf9f104e884fca9480fea2d69d904e,2024-11-21T02:09:14.330000 +CVE-2014-3969,0,1,591083413f2957f71fac8016de5b2d87ce31a5d2231f905f4c636adbf003206a,2024-11-21T02:09:14.480000 +CVE-2014-3970,0,1,cf31f3c1c48ee74ab4fdd97daf306a119e1763aa0c952427477c77163096393a,2024-11-21T02:09:14.637000 +CVE-2014-3971,0,1,b7097264ac842070a95d08b3f4cc7dbe48404106fb0c3b451ea5c62d2594e5cd,2024-11-21T02:09:14.783000 CVE-2014-3972,0,0,9ab472bcadb7685de4ae10b4f916723fc7d32eecef444ffea79c5a7c831a6324,2018-03-19T15:07:57.113000 -CVE-2014-3973,0,0,5753cd3c7ec1e391a2ae70e78d3bbe4ab3514758f99ef3f4202ac64136c250f3,2014-06-06T13:55:42.787000 -CVE-2014-3974,0,0,b7f92609ecbadeea4d73d2133f0724c234ef932279478faa2b3235ad4257b50a,2014-06-06T14:54:15.303000 -CVE-2014-3975,0,0,5854357a5067b0f010c9953b7c30000f481b66f16ac0f431a6dbea2fb53304d2,2014-06-06T14:56:30.017000 -CVE-2014-3976,0,0,6937dc948766c0dc43f257c4c8a5d6c6643e3806d3d6953f741db724be8d0e7d,2015-09-02T17:01:14.123000 -CVE-2014-3977,0,0,6468243b2b94eaf39073cef3b1627840aba30e43769a942e89e7736eb0af0af6,2021-08-31T15:44:01.470000 -CVE-2014-3978,0,0,a026f61e127bac1c0a4f1fa6942eea72d0463b6d3ecdfe1f20835a265b9aa87c,2014-10-24T12:53:33.937000 +CVE-2014-3973,0,1,972c6bd433587401852ac2e7e409baf87ede801ebdde75b84ef3141e92082c2b,2024-11-21T02:09:15.070000 +CVE-2014-3974,0,1,11af92a76c19fdfafd47585f589a3f5ecdce1bf1bf9f8ea3ec4c587f03d67eb1,2024-11-21T02:09:15.220000 +CVE-2014-3975,0,1,8d54065e7faeb51f1780378a22e7eca12c08fae00c2e4ffac9b8ca4105a7ab7b,2024-11-21T02:09:15.373000 +CVE-2014-3976,0,1,14d870a9258a68249424a287744a55c5857d7115d6d5af49adf200a5b33e4568,2024-11-21T02:09:15.523000 +CVE-2014-3977,0,1,14b7cb31d9136e07b427d248a8a19cf991f2a0a64afd742a96ef8ddb850488d9,2024-11-21T02:09:15.683000 +CVE-2014-3978,0,1,e8c292b4028e534a3f18112f1a01f9952e04b8384c12ff267554a7304c3aa84b,2024-11-21T02:09:15.850000 CVE-2014-3979,0,0,7159e7078fcb88b5e1ebb2c285d6d9984961f53d24a6943f445df389ec578938,2020-02-01T02:44:42.107000 -CVE-2014-3980,0,0,e068371f98b44aa05bdc6e7907070470158504ae6482f7bc9755beff23250e70,2014-06-12T17:37:22.710000 -CVE-2014-3981,0,0,92fbc8cd49221f6c9a736ff67cbf098c5d58a602963dfdf3baf07c93557b180f,2023-11-07T02:20:21.543000 -CVE-2014-3982,0,0,f9d7946b50f769303c9b0c89efdf44b1eb8f01f23c45adadee046401a7020f62,2014-06-09T17:14:32.983000 -CVE-2014-3984,0,0,a7daadbfac39a995f65cadec2b4ed11286e15fd197c4b7fef0e0be67a6bde08a,2023-11-07T02:20:21.613000 -CVE-2014-3985,0,0,81193eb262ffc60306b6cefef925142cc1414cf74cef72be5293de8fed8621ee,2020-09-28T14:57:26.363000 -CVE-2014-3986,0,0,0a53ff210247bcc761e38fe1c277916dc27b9f5be66bc6d85ce6f00d15f7494f,2014-06-09T17:23:07.507000 -CVE-2014-3988,0,0,ec8b79a53344d26388153c7d5807db21a661ebc0a0a2560e2d7da57386c6c424,2014-12-03T18:37:37.370000 +CVE-2014-3980,0,1,f70e97c3fa4bcd1628d65fbb38ee8c99de1d255ca1290ef5e008fa4879dc6012,2024-11-21T02:09:16.133000 +CVE-2014-3981,0,1,45581c580e083f7dde875bb29525cb75a01600a41e06a9878eef521f906bca38,2024-11-21T02:09:16.257000 +CVE-2014-3982,0,1,36ab368dce774dafc3cc22807079d57589c04745b46d366d7da507b3427b098f,2024-11-21T02:09:16.457000 +CVE-2014-3984,0,1,a952d909b2c928a56807042b807fcbcc53a4e085b280581f9d6c2e0fed42f150,2024-11-21T02:09:16.610000 +CVE-2014-3985,0,1,5b4f383154eeb2ccb2a99e230d53e2083368d0be286f0264772632a6b9fdffed,2024-11-21T02:09:16.763000 +CVE-2014-3986,0,1,21476abc23fad62e9348428992eb72f417dc81732dec12e70b654356dc51275f,2024-11-21T02:09:16.923000 +CVE-2014-3988,0,1,f39ca53fc4644c9ddc0948c12b8b37963359ae4c14475d3c2f4d8931b1c61842,2024-11-21T02:09:17.080000 CVE-2014-3990,0,0,5e228935bbc41825de0e9b3302d522fa7d18afd5639eabb70544586a4a2ce39b,2019-04-25T18:37:08.597000 -CVE-2014-3991,0,0,297c57d8d7f1e08bcc33202e197de800831f2025cdb6e06e225d14a6fa48d039,2022-11-17T17:21:59.260000 -CVE-2014-3992,0,0,7cb8e1e95f1510be5679ba209248a80cf389048f427a8e21be94d2a7ff85dba3,2022-11-17T17:21:59.260000 -CVE-2014-3994,0,0,088be5dd284376d2f0a6553c59191790b0ea01df3567b16338b9cefcf9fba7b1,2016-08-23T14:49:05.787000 -CVE-2014-3995,0,0,de3e0441716f2de58fe37989a4be26a362c5f493ba280db8abba406ea5ad5312,2014-06-17T14:22:48.647000 -CVE-2014-3996,0,0,e21c4241853ba3c236678828849c7a0d660b766012a070062aa1e3a9c7e8b499,2015-08-28T15:48:41.190000 -CVE-2014-3997,0,0,cc399f3d7f754e0a251f0dbf8f0d27cfc1b63611d95c3e2fa9ab60646fb448a0,2019-07-16T12:23:04.847000 +CVE-2014-3991,0,1,71cd60c50c723013b50fada7df86314bb5ef30c934acb4280976a3b312475171,2024-11-21T02:09:17.413000 +CVE-2014-3992,0,1,6877936ffbded3af8cef127f6af442c34161ea3b11d65c88c18163206feae84c,2024-11-21T02:09:17.550000 +CVE-2014-3994,0,1,a1252c12ac24154e9802e784aa35bdda115e4fc94a24f6fc124b95fd460a87d0,2024-11-21T02:09:17.690000 +CVE-2014-3995,0,1,3466da6bc95388f48dab06a61b2096def2242a9a45e588a41dca106a7ba5156d,2024-11-21T02:09:17.840000 +CVE-2014-3996,0,1,e1671a9209ada4632efcb222fc1d87e900de961158104f67dc9254d1db17b8c1,2024-11-21T02:09:17.983000 +CVE-2014-3997,0,1,9878e08f53c3a44fe097b7c5b247076fd25013ef279060d99120e9e566f5bc9d,2024-11-21T02:09:18.147000 CVE-2014-3999,0,0,fc24e40ccd14156791fb5fc7f72b52f6cbe5ac2b7cf7c385a737ea865f170a6b,2018-05-18T13:23:25.737000 CVE-2014-4000,0,0,7275341a926964622df9c9045bcb61567b285cb46e503219afde9e9772e3a5b5,2017-11-29T18:00:00.890000 -CVE-2014-4002,0,0,e329fd4e49e9c4d401c66c5c0ffa0cf37f47c6416206dc9aba0c70212fd062d7,2018-10-30T16:27:35.843000 -CVE-2014-4003,0,0,2558cc523cff1d5880b3be86ddfb40d860228cfcade2d254a1a05c3a5af94107,2018-10-09T19:47:33.220000 -CVE-2014-4004,0,0,bd2e79f759d143608a5201ad47192ba86973b70afc35c297f0f0855fb6cd2649,2014-06-18T04:33:12.013000 -CVE-2014-4005,0,0,7983838a85df978eee3017c1e9d57e3c80df2ebff266cb3c0de66175e868b5de,2014-06-18T04:33:12.153000 -CVE-2014-4006,0,0,c68d5dea8364cc74976028f8562ef2d5d2acfe7c0699639ceac6a637a2db90dc,2014-06-18T04:33:12.370000 -CVE-2014-4007,0,0,4367c7b8823b0c57f3c21dbac13c120242c5dd6c81f0bf7b12260c4b9fb7c13e,2014-06-18T04:33:12.527000 -CVE-2014-4008,0,0,c876ce65b1e6c46b1965d873398f8d5a7d1a501534e14a3f23297980be1fe93c,2014-06-18T04:33:12.700000 -CVE-2014-4009,0,0,948546b2230f5d30d336fe2427d3c420fd808d8542f64b7568f6d23362adf0bd,2014-06-18T04:33:12.857000 -CVE-2014-4010,0,0,ea727cb6b7d87792dca94c53f9d6a53882d8a2ba467a8d392b8c59d8880f1b86,2014-06-18T04:33:13.027000 -CVE-2014-4011,0,0,f4e5962e96173205ae36d86031fae96342ae138c66f1e190bad53fc985742e1f,2014-06-18T04:33:13.200000 -CVE-2014-4012,0,0,09b3d49a7653ef23224f4e7f3bf651655c73d6232497e2bc2c2b61df59699d42,2014-06-18T04:33:13.370000 -CVE-2014-4013,0,0,e38e956dd5a81ada667abdd8e1e458f57a200f66d8af20326b920c8af1c584ff,2014-07-14T18:08:52.620000 -CVE-2014-4014,0,0,cc3f122a72aa3de4c967b046392020fa37334e2b946cbec67c8fdd98806387ab,2023-11-07T02:20:21.913000 -CVE-2014-4017,0,0,915915c2e37ba1075f5333fd191e09fc5969ca1b81635f19a545af495db6178f,2014-07-22T19:05:29.620000 -CVE-2014-4018,0,0,884cf661a0f4b713e207bac72703d301bda0b93e6f25658d7ad12a1585fba848,2014-07-16T17:44:57.847000 +CVE-2014-4002,0,1,71fae4f6d9aa101d561ba4a958103ee222e35fd383c2a4f50760e5a1a60f4858,2024-11-21T02:09:18.640000 +CVE-2014-4003,0,1,0e73407a3a5afd01af0a3c8dd211fcde2ccd4f3347a7515ce5b0e62fec444e8f,2024-11-21T02:09:18.790000 +CVE-2014-4004,0,1,09c4aca796a19e818f981600c924260ff7361133f04e4a78c32c7d4f56aed358,2024-11-21T02:09:18.940000 +CVE-2014-4005,0,1,ccf7f3b189c20e1dcc2380efd183befe807989aa1798c3ee455d667d6818f7a3,2024-11-21T02:09:19.083000 +CVE-2014-4006,0,1,41c91f57077662c3438cec65d84bf52dcd2a296bd243da5087f5ba26812e6a14,2024-11-21T02:09:19.230000 +CVE-2014-4007,0,1,27393aba48f35f312dda814c250293d0d9dd61d7683b1fe2df4730c61dff74e4,2024-11-21T02:09:19.377000 +CVE-2014-4008,0,1,71211c358a0129e90475e1aa5fff9fe8f90bbdeb8df0060d945a8264ba5da294,2024-11-21T02:09:19.530000 +CVE-2014-4009,0,1,7b065cbaf083445fb07ce6da102929058bab40dffd56b69dad3d159d2b37e847,2024-11-21T02:09:19.680000 +CVE-2014-4010,0,1,b2c7609e1cbbc30aeb0b0973cdf9722f5d1aa73293064d37167d89d7c3d4920f,2024-11-21T02:09:19.827000 +CVE-2014-4011,0,1,2bc50ed37966381a3d7be924fa0152d011156543b220f316297d5276bd3f3419,2024-11-21T02:09:19.973000 +CVE-2014-4012,0,1,ca576838bfc3142c0a00a78036d5407458ae3a0649532160bdeb1adf2a97a70c,2024-11-21T02:09:20.117000 +CVE-2014-4013,0,1,56d01d70119cfcf081322ba13dbf5a55892b74c1af85a555f038975eff48da18,2024-11-21T02:09:20.270000 +CVE-2014-4014,0,1,a39e5819d56019ec0ca8c4197e605d136bee08959f93c7c0d1ae36b93c86b7a2,2024-11-21T02:09:20.410000 +CVE-2014-4017,0,1,5943c8ebd61924b27e966c70c2f4e4b011ca71fc8da37140d0b81dbff625f83a,2024-11-21T02:09:20.570000 +CVE-2014-4018,0,1,92cd6ee8a465868a871751ac804226e897b1195adf991824d334ec7c405f367b,2024-11-21T02:09:20.710000 CVE-2014-4019,0,0,94b2ef12efeb132de35faa39e021c39be28448cb57c5415d1a93953b266a6354,2020-02-28T01:42:54.123000 -CVE-2014-4020,0,0,bf1314b8487bb82de4ae13961648681b4f28079969185533c1feb60f407792a5,2023-11-07T02:20:22.003000 -CVE-2014-4021,0,0,feb546e2c606a32446729e9987e564500c3a5ebc793f03209c7db674ee0d4479,2018-10-30T16:26:53.700000 -CVE-2014-4022,0,0,8afedcb833594b5e6295318436e29c8652b6d4d5a0f3917746ef98ae9f2b9530,2018-10-30T16:26:53.700000 -CVE-2014-4023,0,0,3afbe50596a48e4c49782b6a9fb35ebc1f6b92993daa45b4cfdb2a9d3de74672,2015-08-28T15:49:41.780000 +CVE-2014-4020,0,1,dd82ef7ebc49a351cbb64050ef40813292ce7b028133da8897cbd1ff2d793d49,2024-11-21T02:09:21.110000 +CVE-2014-4021,0,1,8551d3b8ddcbb11828ec308371a9edc08ec072e19026e674f4293b8539c415b0,2024-11-21T02:09:21.273000 +CVE-2014-4022,0,1,76660e5dad025e51b210058a225eb66f386bcd78ab32498dfe757af9b87cf211,2024-11-21T02:09:21.443000 +CVE-2014-4023,0,1,f160dbce7b4b5fc9f5d60c674114aa52f782c1fd1493ac95a45e76095951bfb4,2024-11-21T02:09:21.590000 CVE-2014-4024,0,0,a64156338932e404edc07cd192337703957805f0ec7997b07176fd5fcf9068f1,2023-04-24T16:52:01.487000 -CVE-2014-4027,0,0,f92d1a0280250361ecacb7e1d5c527c07a390e3b9df6791a7af1b768c0370110,2023-11-07T02:20:22.100000 -CVE-2014-4030,0,0,2e927f4c99e4fa3f249cce55bdadba9584cecaf6d714481fa520ca9f198b6508,2014-06-26T14:25:38.950000 -CVE-2014-4031,0,0,c08fc05212159bb6187e5000752d8cd99054bec9f36960de534e25e98a4270e3,2014-07-15T19:17:18.017000 -CVE-2014-4032,0,0,f33301f30b89f08a6295cf528b85321d50f8cf7fb1a22effe6291aff5c75e42c,2014-06-18T04:33:13.653000 -CVE-2014-4033,0,0,5ee647af285e92a7dde83f60ce1e61e56c54685a38e72c6ded2b81eb7568ffea,2014-06-12T17:46:47.943000 -CVE-2014-4034,0,0,d87065b0e202e65439f602d88bf32278414259233e166211097f7afe56b9f077,2017-08-29T01:34:49.623000 -CVE-2014-4035,0,0,251b55a982bc61493be4f9eedb3c4e710956137b67c9e7330d0a793a7fdf0a76,2019-08-12T21:15:12.827000 -CVE-2014-4036,0,0,b24baa5f0ca081795e16a040959e0525353fc446497cb96bf3d551c398f66530,2014-06-12T18:19:05.820000 -CVE-2014-4037,0,0,fb468241b5571774171b7979c890e77a5ebd516f0095b8106da7448ab3329e63,2015-08-28T15:51:09.247000 -CVE-2014-4038,0,0,136fc48105c4047ff53b34750dab45998d4fc65433d01385ceb916a19046a752,2017-01-07T03:00:07.897000 -CVE-2014-4039,0,0,db52bcc37e44e5f896041f3c44e77715a7bf35deaddd519f77a9648bd9513507,2017-01-07T03:00:07.957000 -CVE-2014-4040,0,0,ea319df2bc772c7402fd3b988fd70131c702b540da52cdb6787ff77fff6294a2,2015-03-12T01:59:41.690000 -CVE-2014-4043,0,0,00779e023785fce960fcfb40b29af66ef2518cdabed7e43aef1259f6de03e210,2023-11-07T02:20:22.317000 -CVE-2014-4044,0,0,7929e17bd3cc831d738ffed0beb5ef407586d50e4692fc23d3def7a2eb4bd564,2023-11-07T02:20:22.460000 -CVE-2014-4045,0,0,1801915e0f03f8d60c5eee3b3cf8445e12c944b16e152c6e450cd1895134708b,2018-10-09T19:47:33.767000 -CVE-2014-4046,0,0,a840aeeb24cd37759dc556705926d1db4e8c1f2eac798a65061b3219839aa8c4,2018-10-09T19:47:34.047000 -CVE-2014-4047,0,0,878341634e0ffc1156d9c950c7edeba5105f86dabdbb850caca0b5c0b3890577,2018-10-09T19:47:34.407000 -CVE-2014-4048,0,0,62ae03d8d66d93c5184985be4b84d5f804d5500f41c02ea221274fd708298b08,2018-10-09T19:47:34.937000 -CVE-2014-4049,0,0,d5d68028cf5a8543928a1b35fd805ffacd3538d2a47b225dbc75c0acd3a8d429,2022-08-29T20:05:23.073000 -CVE-2014-4050,0,0,86b223eaf10b16bc3b8693bb52521e4ad80495e0a21bc67bff8b1fb813d948b9,2018-10-12T22:06:49.970000 -CVE-2014-4051,0,0,f317fa4193f55c0089226b11f5d7db2ac98b23b9f785e40a888a46542acd3141,2018-10-12T22:06:50.453000 -CVE-2014-4052,0,0,2b21c8c1e598e7547388f2af0d42649a73b57c2e5555d4f8c69c5d064d28f652,2018-10-12T22:06:51.033000 +CVE-2014-4027,0,1,fdd598bf04f40dbad38a89010835bbf188f329cf0652ea9cc0121c8481c0de87,2024-11-21T02:09:21.917000 +CVE-2014-4030,0,1,6f4334706d8cfa08dccf0fde16fe177181d36bf736fa0a950adec7ccd3b83bbf,2024-11-21T02:09:22.100000 +CVE-2014-4031,0,1,a9ca36fbdbc697eab1b24b61501509d4ff10d5d3639cdb2cf6383ef61a638caa,2024-11-21T02:09:22.260000 +CVE-2014-4032,0,1,609425405cb18a0f5c522dd22625138da273ea1b2235189fe1d44267a6152f98,2024-11-21T02:09:22.427000 +CVE-2014-4033,0,1,aac8a669e975973ceebeafd4a248f6e0830a990c647f0d822cffa53dca5fa2e4,2024-11-21T02:09:22.570000 +CVE-2014-4034,0,1,011ed9c3ec76213aec6a054afe62460b980b3dad72803b23cdb931c8292173c8,2024-11-21T02:09:22.733000 +CVE-2014-4035,0,1,152332771420a8d23454beaee402131c3d951b36c711ae4b7bbca83845fd2146,2024-11-21T02:09:22.907000 +CVE-2014-4036,0,1,eb1ae9d5de6b6494c3fb4c5dc6f4e112371d149be0b106f3b33290e0897710f3,2024-11-21T02:09:23.057000 +CVE-2014-4037,0,1,26810ded1caabfc3cd24b506975c167420250680b3eae5182554c18920413825,2024-11-21T02:09:23.203000 +CVE-2014-4038,0,1,6d1ce57b77be466f1ead2cf1a258487a308d661cb90c26fd2134b170b8f94fdd,2024-11-21T02:09:23.350000 +CVE-2014-4039,0,1,3f9f9b8497e5acdf023e9ec1b7b2eeac30e7d31caeceaf1b048cb98e95c93496,2024-11-21T02:09:23.507000 +CVE-2014-4040,0,1,13264953dbdbc4c641fedd6b9f3d77ad16acfb408bd5d486ecef8fa3b61e04fe,2024-11-21T02:09:23.660000 +CVE-2014-4043,0,1,507c5d909c010700cc50854b55f8967ff7ce7fe860a6f53095bd216573291ef3,2024-11-21T02:09:23.797000 +CVE-2014-4044,0,1,48a2d8acf4f6bf03eb26cc9c5cb06f6603e08218a101dbd2bf34d5272f4969b0,2024-11-21T02:09:23.987000 +CVE-2014-4045,0,1,6130c18f17bb49ae6ec6a935815cd5763130374bbc27a6be9be90cce0813d722,2024-11-21T02:09:24.130000 +CVE-2014-4046,0,1,c1c39d3306258225c4750e1cd3616c90dda24382cdf10d08af95907b570a408f,2024-11-21T02:09:24.273000 +CVE-2014-4047,0,1,deee77a492dea3d204c3059bc3eb90c4905fd700bace098790d0713dfecae094,2024-11-21T02:09:24.440000 +CVE-2014-4048,0,1,aafade4850bd0e7a337e4d5f34fce7c88fcbced8f6c0921a0652db8fb4f336d0,2024-11-21T02:09:24.610000 +CVE-2014-4049,0,1,eb83296c08c4782a23fa092798d994a15948fde351dbc737ab32bbe689b6dc6e,2024-11-21T02:09:24.757000 +CVE-2014-4050,0,1,adb2b8b2aa51f9ea1dfc1f96dc8371eaa0350119d378cccdc59fbc42acd986cd,2024-11-21T02:09:24.977000 +CVE-2014-4051,0,1,26d065bf7cdb4df90cfcac28c3c2a80c08d0913abc458038a3dae4824f34e7b5,2024-11-21T02:09:25.093000 +CVE-2014-4052,0,1,6b0952c38f820239d7b3bbaa83933c917b074e81a05d4d2e528b4f6e4f6334c9,2024-11-21T02:09:25.213000 CVE-2014-4053,0,0,93669900cad8a6787a3ef87aefe3730061ec0b720e879b82af5a48a64d916d17,2023-11-07T02:20:22.603000 CVE-2014-4054,0,0,f886eb50cb7d2d57e19fb95d9caeefdb24df59078b03367c1b7827e719a84c3d,2023-11-07T02:20:22.827000 -CVE-2014-4055,0,0,66d33753610e29f94627cef64e4dc83c7f87dbb2da963d731183c036e995acad,2018-10-12T22:06:51.610000 -CVE-2014-4056,0,0,9d55e1b844f35a749c2c7bb264eec669446f17e2eb06e557e1952a3b39475dcc,2018-10-12T22:06:52.267000 -CVE-2014-4057,0,0,2fb02df17bb10ee39a26d02d688257dfa22ac293c45623fdc1a3785cf84db347,2018-10-12T22:06:52.830000 -CVE-2014-4058,0,0,26b51a96328548b56ceb0c2e5b34a45fa599ccb7071f2700578f8c483a2d7f77,2018-10-12T22:06:53.407000 -CVE-2014-4059,0,0,6979778cc79ba1a29bf7c79bab2064d117b6af7c49a22a897dde22d3deebe4dd,2018-10-12T22:06:53.893000 -CVE-2014-4060,0,0,705ba56367b2072202af74e176dc5128d38329030dba24501243fdd2fe8894fb,2019-05-14T17:03:54.567000 -CVE-2014-4061,0,0,730eb6c9b6279502f40d83da2c969422d1d43c099b3868decc805cddeba36b3d,2018-10-12T22:06:54.720000 -CVE-2014-4062,0,0,c16e7874b77e22a623a3b9d2114d2f07aca01cd8197dcf7608515109c6107de3,2018-10-12T22:06:55.063000 -CVE-2014-4063,0,0,a2772d32668b94543a732433c945b5aca674f858aac996075e5d98c933af0a03,2018-10-12T22:06:55.393000 -CVE-2014-4064,0,0,c14b70660d04754f0c5c44b174888f3a2d656c832a4d5e7db1451a6570d685ec,2019-05-13T19:09:02.107000 -CVE-2014-4065,0,0,ec0397e5d7bd6b58cdb401331e653f39e3bf2380ae0604663d21ed8ddc3e649f,2018-10-12T22:06:56.237000 +CVE-2014-4055,0,1,5d3b48beb65a41a51f0e2322f59bad6131a24580ef83bba544b6a0c62a21d74f,2024-11-21T02:09:25.360000 +CVE-2014-4056,0,1,6468945f834f3b62dc19e223c83f56fd74c944032e042273390d4061f86d03ef,2024-11-21T02:09:25.467000 +CVE-2014-4057,0,1,027900f9e2a5104fc38f686d385a337d70995777c4c24dbda4c6dd9103b9515e,2024-11-21T02:09:25.580000 +CVE-2014-4058,0,1,c435c07179a341e255d0344996911614d41936d622296e24cdd2d4a1afbd5501,2024-11-21T02:09:25.690000 +CVE-2014-4059,0,1,0e48188a5c118b1cc93a148fe07cc1a3f20c51626fcef77b1225b140d0d31941,2024-11-21T02:09:25.800000 +CVE-2014-4060,0,1,5261e9a7c0a588858f535b758d3ad6b6657c218ceae3267355e19b3f35e8cee2,2024-11-21T02:09:25.917000 +CVE-2014-4061,0,1,a4ef862dd9dd52066cd2c4711e38dfabd6eb0b054b495808fbe82316432f0444,2024-11-21T02:09:26.033000 +CVE-2014-4062,0,1,01b91f5e191ca05332fc379ee5d007136918e922338d0a80e919c7b79edd21aa,2024-11-21T02:09:26.150000 +CVE-2014-4063,0,1,851bfc0ac8a12275ef70645a7afcead78b691e788f680e9ccc75b3437b8e51cb,2024-11-21T02:09:26.257000 +CVE-2014-4064,0,1,5e4abbf27b7903786e04e9085613041a3ae3b2ee9bf88db732c1d4a4a7c3c3bb,2024-11-21T02:09:26.370000 +CVE-2014-4065,0,1,ae4dfe5ec5ff68b895429b7676d59e703cfef1e4e0d5b4d145e818ef76af4274,2024-11-21T02:09:26.500000 CVE-2014-4066,0,0,b2a1fa24858f749116f377f220dcd7df40d7e91818bdca02a8ab55f00d842d2c,2018-03-08T17:14:43.713000 -CVE-2014-4067,0,0,eceb244d42638543d26494fdaebe25a8a202c4e0afee462091bc98e22cd34d8b,2018-10-12T22:06:56.627000 -CVE-2014-4068,0,0,1f4be450f0f04b616acf80f990f2b04cde56143aa78179a5944dda5e7db51860,2018-10-12T22:06:57.017000 +CVE-2014-4067,0,1,fa75d4ab08a6139684397766acd06bfe032cfba05117b4e777f9f2a642c1c608,2024-11-21T02:09:26.730000 +CVE-2014-4068,0,1,7b4471f824f29460ce61bbed276e01910fab1d700fddb414881e5d329b324075,2024-11-21T02:09:26.847000 CVE-2014-4069,0,0,c9ed468be68b7aaba3f374a8b9e73ad890b536caa55f5f04c775895b3c9ed316,2023-11-07T02:20:23.177000 -CVE-2014-4070,0,0,13497fddd50ff8b9616080a97c50f577f8c3b2d666a8b62e6ce3f7d8e7f6680d,2018-10-12T22:06:57.550000 -CVE-2014-4071,0,0,664c79e8d2b0be0cf960ee17b13bf913b5a8bccc34182b10b159445e056f5124,2018-10-12T22:06:58.033000 -CVE-2014-4072,0,0,5183fd12d694688d887a6ac911417e6bd189fe175f1e7f1e700d089adf6c7672,2018-10-12T22:06:58.643000 -CVE-2014-4073,0,0,7095343e1268c1feb09f13f9f92c5899d98eeb161656c03def6076d03673ff3c,2018-10-12T22:06:59.097000 -CVE-2014-4074,0,0,a86382ebdc41d64c4ccf7790b0969baa7988a566e61b024f995cfc29b85a3458,2019-05-13T19:02:38.460000 -CVE-2014-4075,0,0,f29199587559af05998a95b07e83f657035143579d778fe5162e6c1a3e7f84bf,2018-10-12T22:07:00.050000 -CVE-2014-4076,0,0,9c1ca6dc1f40b14a6ef402a153308c8169fe9abf90c7809baa4627339afc79ce,2018-10-12T22:07:00.533000 -CVE-2014-4077,0,0,323bb94f8a4e5b89a50c0d2cac1bf99bd4b18c62eb38525b81f978b4bcdfaa31,2024-06-28T17:28:11.117000 -CVE-2014-4078,0,0,400ee818fe4c23447b0a9313567107dde11fdda48a2fe639c2be9054556fbe62,2018-10-12T22:07:01.317000 -CVE-2014-4079,0,0,65ef3e60ea39acd0a4b5b42f91638975ae230a76f34c1432cdbf4028cfd59ec3,2018-10-12T22:07:01.613000 -CVE-2014-4080,0,0,d57038dde20e6d0be63ae1a09804e3196855a8da33f086730e42fcc7787f26a3,2018-10-12T22:07:01.970000 -CVE-2014-4081,0,0,fc2369394f95b96ff53ae16288ac7851bbcaebaa1e73cc5dcea3597cdbd9e94e,2018-10-12T22:07:02.363000 -CVE-2014-4082,0,0,026ba448b1f9c5e37bb6ca172862810fa333b2e05cb0d7a4cd3649f8acd13306,2018-10-12T22:07:02.863000 -CVE-2014-4083,0,0,434e5f5b1aebb8f231bcb3df3ccc4fa1818644f863bd0cfb774f4070238efc3c,2018-10-12T22:07:03.300000 -CVE-2014-4084,0,0,450f1ae4fe728404520571da0d07bc8b1e2719e9456328ce2ad9d9dd2b53178d,2018-10-12T22:07:03.783000 -CVE-2014-4085,0,0,d14fd341892cecfcbfa2c1ee565c84aebd056b6ec5249ea5b76d0e97b9693c8d,2018-10-12T22:07:04.253000 -CVE-2014-4086,0,0,dd7deaba306154860285af844061302e15d4d6c78cd046e37f3f2e38b989dcd0,2018-10-12T22:07:04.753000 -CVE-2014-4087,0,0,0e96d46be620d833b6897618f26fff8adce140a14dc698f2111afed185867000,2018-10-12T22:07:05.160000 -CVE-2014-4088,0,0,5b6c97ad83241fdf1e2fac8396b9c882bc7daa325f62edc6e046d6ada5bbf3c0,2018-10-12T22:07:05.533000 -CVE-2014-4089,0,0,a4374f363912a8caad315ab803bd40bc70b9c606567d84f4e9501525f91f6c31,2018-10-12T22:07:06.003000 -CVE-2014-4090,0,0,b51b73e0859d256d01eaf273da9e83369cfba551a0c1c9fb139aa7d8db3abb41,2018-10-12T22:07:06.517000 -CVE-2014-4091,0,0,0640266b588d86b92815c16e0ef41391d523a34134e136065af1ad17e0b691ec,2018-10-12T22:07:07.017000 -CVE-2014-4092,0,0,14fc5f0cd2811bc51fbdc801f0c156e7610a4787216eed49b142f2a773a4436e,2018-10-12T22:07:07.487000 -CVE-2014-4093,0,0,f5eeda186a7ab87695a03e59daf902ebc06231ee642a0d7c2e9d10fbaa5a22bf,2018-10-12T22:07:08.017000 -CVE-2014-4094,0,0,9de505b6db7de26a47d265e11d3c677f472185b6c8e7500d9b10d9b67d2e413b,2018-10-12T22:07:08.487000 -CVE-2014-4095,0,0,0c6752063fb3f589aa792f93c9792ed7e32d64e64aacbd74fca8a0d6b8472eb7,2018-10-12T22:07:08.973000 -CVE-2014-4096,0,0,4cd2406909faa82ababe073619dcd55ca693cfd01ad903595d8414cf20c2e213,2018-10-12T22:07:09.473000 -CVE-2014-4097,0,0,16959dc4b4c26ad27168d1b1e147da4e536a8d7a6699b6d51c243f8d8c8e245e,2018-10-12T22:07:10.020000 -CVE-2014-4098,0,0,b893a4703e41a9dca488cd5181d73f2ad5928d5aff3c8648c8026fd4b3c56df0,2018-10-12T22:07:10.440000 -CVE-2014-4099,0,0,54a3f640fe944eccb6450e05917a54fd7bfe492da52ca79af8f1175b12147e8b,2018-10-12T22:07:10.910000 -CVE-2014-4100,0,0,741ee077e2c2746810c04e90d81d7a466e3b2da2b8359fb6656f7c9e5465b682,2018-10-12T22:07:11.410000 -CVE-2014-4101,0,0,b17925b836cc5e1536b1fa1c03649f62b70fbd20d9cd0ee379bd64b5233e19c8,2018-10-12T22:07:11.847000 -CVE-2014-4102,0,0,7e93ee6aabe1147935da8eb04794193c3dc0712e4112e961472bc59bd0cfb00f,2018-10-12T22:07:12.410000 -CVE-2014-4103,0,0,88a5a6771beffaf9e52f618f12f5a792182b78bef6f7bcd5c6ed70e2581bd1b0,2018-10-12T22:07:12.877000 -CVE-2014-4104,0,0,d0694fc367c9a945ea95e04643efd7b90fa8b805743eb8fda32d57a813c8983d,2018-10-12T22:07:13.363000 -CVE-2014-4105,0,0,a04f3b471501163417840fe05f76030e7c7bd1a163b310eba55991f9df73a216,2018-10-12T22:07:13.863000 -CVE-2014-4106,0,0,eb083a6e108ed0e7b5c3f82be4f9292285479ba440dd0e7e9ed7d86da7cd601a,2018-10-12T22:07:14.207000 -CVE-2014-4107,0,0,c423a32082ccf22f6cebb2bae1309d4b546856aa1b5ca1884fe8c7f3e8b08d07,2018-10-12T22:07:14.487000 -CVE-2014-4108,0,0,3887f154c84f933101a45104dce7d1b73af8ac9d7e3c838201521c3752a46518,2018-10-12T22:07:14.783000 -CVE-2014-4109,0,0,72e57cc270c2893620a181f0d4182c90fafdaee5c8741960f1b9e7e320be91f1,2018-10-12T22:07:15.097000 -CVE-2014-4110,0,0,9736b5cf75e8397dbca6b8aadc9035b619d9c43bf0609ec58d0b6dcbbdf3770e,2018-10-12T22:07:15.363000 -CVE-2014-4111,0,0,5d117457dcd2cbdace49b585b463d036fd3292e572af385b3fe404388240a8e1,2018-10-12T22:07:15.707000 +CVE-2014-4070,0,1,1b62226fe9d32c41054c7dfc1506b9b4bd45cfc98e70b549454f6f81302dc81c,2024-11-21T02:09:26.977000 +CVE-2014-4071,0,1,eb936efddda401186f11e6872194552b3e42a646f8b9c56cadb65843641ec999,2024-11-21T02:09:27.093000 +CVE-2014-4072,0,1,154fe14a314a92a2fee3f88e9aafd38cc042b5aab96c9d4949e7704e277663da,2024-11-21T02:09:27.207000 +CVE-2014-4073,0,1,403a2a64fa82cead9e9ac916c1eb3bde4a2422393cfa1ef3e87862538ace4724,2024-11-21T02:09:27.327000 +CVE-2014-4074,0,1,9984659e4eba9441e4ebef49cc0829cb69c1c6517d72ea224eb694c72092fd32,2024-11-21T02:09:27.460000 +CVE-2014-4075,0,1,974f45f3d3b96b4453bfff760946e4703e366207194af25a33d044fca2ca669c,2024-11-21T02:09:27.570000 +CVE-2014-4076,0,1,cc5bbc500ce31d99830f1a06adc9b4a661208d8207f3f7c1232c451244c3dbd4,2024-11-21T02:09:27.683000 +CVE-2014-4077,0,1,7d5e9a0eb3cf7149f02bfda979687b98c9b6777d733769726bc345b3b6658c59,2024-11-21T02:09:27.790000 +CVE-2014-4078,0,1,52e05c5e717637d06c4ec8bff1f9c646462ff67fdcbf99cbdd8bba4967ae8c9b,2024-11-21T02:09:27.917000 +CVE-2014-4079,0,1,862d3dd20055af0bc98900c50a3fd555a1895c6f418019dd8b76af3aa0624c6c,2024-11-21T02:09:28.020000 +CVE-2014-4080,0,1,fc5b5600f7601f1d3a47884f6ee7f498dfbf351d04366f2adca1a52b809f3bf1,2024-11-21T02:09:28.133000 +CVE-2014-4081,0,1,01acac256fa0ba9e9571b10e2775a6a304231199caacb23ff90bb16df33567b7,2024-11-21T02:09:28.243000 +CVE-2014-4082,0,1,937dbbd3352c739e25d00c7735a05451b3e4f3d453b5adb47207feffd84c9164,2024-11-21T02:09:28.360000 +CVE-2014-4083,0,1,49b731c21c1bdbfdd7a41786fd8e9d8c40095bf9c42928732ee7f37550589c78,2024-11-21T02:09:28.490000 +CVE-2014-4084,0,1,875ecc576419c15d7f35608d36d18b0c5890a69f2a6cefb2a777fea6cd02fa84,2024-11-21T02:09:28.600000 +CVE-2014-4085,0,1,77883956e761ff1ca6aec8ef3c47b04d6db844354c7fc56b7e2e23bf4183f841,2024-11-21T02:09:28.707000 +CVE-2014-4086,0,1,b002a62348e2e6f638e14db7f62867a10eb618d94cbae8dd2ac0141d3b26c4ba,2024-11-21T02:09:28.813000 +CVE-2014-4087,0,1,400f55fd1fd6acf45665186d4ae8358c09c0158f0b1762b4e3e84e095cb37cdc,2024-11-21T02:09:28.920000 +CVE-2014-4088,0,1,218aca3e210b9ab8712415f8b9d4b85c323610fc7768e82bc02d7d3479fa5d4d,2024-11-21T02:09:29.023000 +CVE-2014-4089,0,1,e0e744d3321966a0fdec8390fa36abd0b46722301fc93b2096fb536becb87d94,2024-11-21T02:09:29.130000 +CVE-2014-4090,0,1,fe2eebaa4dcd3f38307875e459029d2452caca85a5a466c023061f21e7327719,2024-11-21T02:09:29.240000 +CVE-2014-4091,0,1,cf55e08fe73bd31e66b168fc3b347676e5ffde40a71dffccd14f80ec5b25d2cc,2024-11-21T02:09:29.357000 +CVE-2014-4092,0,1,a7fd7a5aceb1b9fff392d56b12d6490608ed641046bbb3cabd207aa881868483,2024-11-21T02:09:29.457000 +CVE-2014-4093,0,1,37792f35b70d20e4a5b151bdfeb7c5c06f977ef928c1b5e1065e885949c09f3e,2024-11-21T02:09:29.567000 +CVE-2014-4094,0,1,db88b455502db603a65368e01eb08031716e12860a69e078475c1dddc5127445,2024-11-21T02:09:29.677000 +CVE-2014-4095,0,1,d3a887f37531f937ee4c9805b6e00eac60ae59f760de7a1705022873ef0b7425,2024-11-21T02:09:29.800000 +CVE-2014-4096,0,1,a0444877d96a86ac00c749d36f686ae0ab7291400f46b906e61c75a4bd057b8e,2024-11-21T02:09:29.917000 +CVE-2014-4097,0,1,4904e55f138ee0a8f89115bb5287e866b39e0ddfb8870da761920c17c1943ef6,2024-11-21T02:09:30.030000 +CVE-2014-4098,0,1,73338ed1f3fef5ac88becc9debd9de3f915aa08cf197b75b4852bf09dcfb279a,2024-11-21T02:09:30.150000 +CVE-2014-4099,0,1,adb915a198d1d5c3cd9f2f5a65a66235e5de4d64318a999732e86ef494f53e36,2024-11-21T02:09:30.267000 +CVE-2014-4100,0,1,9ce7fec1e4fa12a119261a2c83317f1245d377f4908c555ff8a21c0a9b837ed9,2024-11-21T02:09:30.380000 +CVE-2014-4101,0,1,6dc46f13615ce607f7d4dc5c496398d21dafbe3dc1ea2c419900fbed8d22e8fa,2024-11-21T02:09:30.507000 +CVE-2014-4102,0,1,409eef841d7c325a289cc219018b469f7920333e1bcb8eda7faee5b121f25c90,2024-11-21T02:09:30.623000 +CVE-2014-4103,0,1,a7ab9a6da2e652da84918fc3352ae807d5159f2ad1fb9688dca14bd9500e89ae,2024-11-21T02:09:30.740000 +CVE-2014-4104,0,1,b24df39039bb6b2bbb011d541c1a1c0494c5225c090c79adc48efd36bc0d0e76,2024-11-21T02:09:30.860000 +CVE-2014-4105,0,1,1870651809fd2113b0dcfb7c5188c9e438412333520950190a975a7ae010f409,2024-11-21T02:09:30.980000 +CVE-2014-4106,0,1,fe6a8b4418535e5b8cf2cec5695c4f351d20d48690c99303ac33ef53ae498b96,2024-11-21T02:09:31.097000 +CVE-2014-4107,0,1,589580cdf5323595c29a1ee6e4907242ea08d03c8b6e732f64f1ad050a78317b,2024-11-21T02:09:31.237000 +CVE-2014-4108,0,1,e7de24167deff9a9daccbdcfe12c3f2d225cd41ae727ab2b6f07340e8f5c1e6e,2024-11-21T02:09:31.357000 +CVE-2014-4109,0,1,16e44645e0b76fd4c379384682cdeb32de578b0855de9f06222bbfb7f7f5fae1,2024-11-21T02:09:31.477000 +CVE-2014-4110,0,1,a6a9f46497c23428bb1643a6252d46d936be778de9caf7b287414ddb027246d7,2024-11-21T02:09:31.610000 +CVE-2014-4111,0,1,738b3c468919132f6a7eecf84186a4798c33501d5b9b4ba3ec8a62214691ae6b,2024-11-21T02:09:31.730000 CVE-2014-4112,0,0,908b87cd54032b9103ca16962f1ca55e6a154268853e1cea0feb447a24ef872b,2018-03-08T17:15:05.060000 -CVE-2014-4113,0,0,722e589db274c115927331c91aeb6943abc227a53ae92bc2a5224ec36cefc45f,2024-07-02T16:57:12.317000 -CVE-2014-4114,0,0,bfdc6d09cf3c2ea11ac3cc150d6a833139310832513e53d712b9baebad8943a3,2024-07-16T17:23:54.207000 -CVE-2014-4115,0,0,e5095a44e600e034e17aef2afaff51cc720a2fd0a7a0c685cc40a41ee1a1d686,2019-02-26T14:04:02.400000 -CVE-2014-4116,0,0,4b1460540575b811ab735d4369142187724fef5cf19fa4078bbe06305bd755e0,2018-10-12T22:07:18.737000 -CVE-2014-4117,0,0,f4aa5354f1a14632d19aa95421d5b865c9508e124c7c4b51e02242db6c281424,2018-10-12T22:07:18.973000 -CVE-2014-4118,0,0,4e4d95ee5244c7221dfa943106340f2fde929e7afa8973242db0f9a28f0b5b3b,2019-05-14T14:04:37.510000 +CVE-2014-4113,0,1,10308fb97207825a1c60c087fe8f553dbc8ce603ffd0fc2f459ee14ecbdbc99e,2024-11-21T02:09:31.987000 +CVE-2014-4114,0,1,54089f965480ddab4f6a02700b6b5348f628d31e6e226539cbd844e33adcbd60,2024-11-21T02:09:32.127000 +CVE-2014-4115,0,1,0fa1d4e79a544f56d7558f0d1e5ccfc34a86a98d2d90aa974ae1c7525becc06f,2024-11-21T02:09:32.260000 +CVE-2014-4116,0,1,72a516cea93c6c6a6ad8764f14a8987427f8b7cd75a1b3f74f2602ff654c9b60,2024-11-21T02:09:32.380000 +CVE-2014-4117,0,1,55041d340c2855e6c68cab50dbc848a0960304710c4e1c06dfd598281d7b399d,2024-11-21T02:09:32.490000 +CVE-2014-4118,0,1,0743bc4b5da66c781a83257361f964b4c19dc73716e66076b482af1ea9f38fbd,2024-11-21T02:09:32.610000 CVE-2014-4119,0,0,cf78c30cfdef3241098dec6e15a6ea55f4da2be00c4193d39df5e02e3e59f52c,2023-11-07T02:20:23.737000 CVE-2014-4120,0,0,c9f09562ceecd8d999c161873c01e45821a7e877cf513509e62ddd3a503b33ba,2023-11-07T02:20:23.953000 -CVE-2014-4121,0,0,a38d21d7b1c592fb53b7c6fa445339b3075ab26399aaa83546cc741fa7bb4a50,2018-10-12T22:07:19.567000 -CVE-2014-4122,0,0,e40d855511b2d59d76a37a198141ea76bf337e14cb70708427f5b64a27b75a06,2018-10-12T22:07:19.940000 -CVE-2014-4123,0,0,5413dc809715a79622178b53ec02badc384cf2d0033e16c81c2086ed97a12602,2024-06-28T17:25:19.543000 -CVE-2014-4124,0,0,671fab64b333405b8959934815355566a176ace320274c65adc429d80cf555d8,2018-10-12T22:07:20.847000 +CVE-2014-4121,0,1,ce4a1462f2c117bc8b39c10bd2e8bafc1971280401ad6f6c28c37875204557f7,2024-11-21T02:09:32.753000 +CVE-2014-4122,0,1,e09f842369d48dc9ae8e416706f8c82928b96ae5c3bcaa4a0e6696cbfeebfdf8,2024-11-21T02:09:32.880000 +CVE-2014-4123,0,1,9fd514a1eb82b6d57fa4e7129d6220e60db4e28b807cfd7e5e4170f2e0f5a9d0,2024-11-21T02:09:32.987000 +CVE-2014-4124,0,1,0e089baf82866fe2e03f3625041015781f79afce9c9b8942b45c8e0ecb957cf8,2024-11-21T02:09:33.117000 CVE-2014-4125,0,0,bd75a85f624d73731f7cad82c9601bd5fef4d135aa16524a759e267b22838f1f,2023-11-07T02:20:24.213000 -CVE-2014-4126,0,0,f1d2c5dc848b9450bef40bdcf6a7fefc8edd0365ba179ff1b6426b69748985db,2018-10-12T22:07:21.287000 -CVE-2014-4127,0,0,df6d70ae5cbdda4e9cccbaf69145b5a93222b7dba1c72c90f42ebf127d350ddb,2018-10-12T22:07:21.817000 -CVE-2014-4128,0,0,15811a71d910515a78ce318ce26c727c6b4b19b0fd10134df022bcbac89cea95,2018-10-12T22:07:22.223000 -CVE-2014-4129,0,0,b08752c1dcc15b28d6257a5b0f3e5c97fab9e716ebf0f87ba3ac10de8c6a7d81,2018-10-12T22:07:22.770000 -CVE-2014-4130,0,0,4734a8d80ce2aa9538c8b42c7db1631cf93f6aa987719ebb1f7c588c7eeacc49,2018-10-12T22:07:23.193000 +CVE-2014-4126,0,1,1de3b50fd4ad4fb764e00ddacec17679be03768bf03b5f6d856604fd87c32fc8,2024-11-21T02:09:33.247000 +CVE-2014-4127,0,1,8caf7000e36a96ab315da45ea9004c3744b3bf57cdb40a690cde64c303140227,2024-11-21T02:09:33.360000 +CVE-2014-4128,0,1,1720d91bc9b2a6de96a5d108398e5434572814b22d12502d5411916a42ed07af,2024-11-21T02:09:33.467000 +CVE-2014-4129,0,1,4bc642a20bd265a40933f22feeeff5b6c48ae588b2ec5cc3f507ed8d57caee70,2024-11-21T02:09:33.593000 +CVE-2014-4130,0,1,313c61afbad5478c712c17ecebfcd90953ef77eac53f06c18abd27e9cbc2e3d9,2024-11-21T02:09:33.707000 CVE-2014-4131,0,0,3ce93633bcf2f61d3b35f0ff74ae801699a4eb35440317c590ef04ec2854b39d,2023-11-07T02:20:24.467000 -CVE-2014-4132,0,0,5fc1562c6497748c315943c39cd984f7f4ddb0be1774e012dd2f08e87ca7303a,2018-10-12T22:07:23.567000 -CVE-2014-4133,0,0,b18a4c537dab202ee09781b32eca216b14de4a660a349989032e717c991cfdc8,2018-10-12T22:07:24.083000 -CVE-2014-4134,0,0,72c602a9e6142c2fa38479342e3894b33d771baf18899b462c188a748ad73b4f,2018-10-12T22:07:24.537000 +CVE-2014-4132,0,1,4532c58f6f7dfe4cb9e9fef15f2d3577a16c1eec0e503e942e1c2e08d40ec6bd,2024-11-21T02:09:33.833000 +CVE-2014-4133,0,1,6107f6b8c94f84cc3725e80fa6a7852b837f83bd24dc45cb2257ded0941f3a4e,2024-11-21T02:09:33.953000 +CVE-2014-4134,0,1,5c07e87201623934eb580e7ccbb0d5c62d8e626ccc03abee5a7dd9ec428e6b75,2024-11-21T02:09:34.083000 CVE-2014-4135,0,0,99271a311ec40667405bb1951fb15bf1c66b955a888e93722ee57772dc19005d,2023-11-07T02:20:24.803000 CVE-2014-4136,0,0,edb46beba356093a65d2d3ec4f4457afc2e9d60a4aa8ffa959bf8026dd312c27,2023-11-07T02:20:25.020000 -CVE-2014-4137,0,0,eebdb8143816e019eb0fcd35bc1940f7a308ab723495eac21b9fb43a06a72c4d,2018-10-12T22:07:25.003000 -CVE-2014-4138,0,0,4949b5be635f9ca6760c8bb02a902948e4d8a89c67ad9587b86b563ab6b4c8eb,2018-10-12T22:07:25.427000 +CVE-2014-4137,0,1,23a2cf41749b16a19449c06f15cd7b2275e0fe9a95ad5c6260d50924ea68db56,2024-11-21T02:09:34.240000 +CVE-2014-4138,0,1,c56618df1048bb05808dacbef488eb876d5934c82cab79a93b17c488f39d3f6f,2024-11-21T02:09:34.363000 CVE-2014-4139,0,0,b8cd694eada89de3897ef01c665b4d6f26cebebd4b2099f6a870679a0b88965f,2023-11-07T02:20:25.267000 -CVE-2014-4140,0,0,2064f8eca20a780cd27f9fe27ed26b62601cf568b900e38891ebd67fa261c99d,2018-10-12T22:07:26.113000 -CVE-2014-4141,0,0,1540da72a04453e44a763c3d720f8cb7ca5ee69b68619cb86a86aa05471e8d14,2018-10-12T22:07:26.503000 +CVE-2014-4140,0,1,e5ede8a13cbca8d2a9a1b6dfd651d935d9e36a2fe28a716681504517916f6404,2024-11-21T02:09:34.507000 +CVE-2014-4141,0,1,f55ed2e6593fb387938ba619a6603181d378f05788c969cf3905c0fac18c5e6f,2024-11-21T02:09:34.620000 CVE-2014-4142,0,0,aac990999d8a8f717dbc27c58f6bc23a4909afcfdd1350b07b1bb8d1f1f5bd67,2023-11-07T02:20:25.507000 -CVE-2014-4143,0,0,eff13fb0a277ffa69f42720fe8af096cf5cd2037e029bbb5324975f7f6917970,2018-10-12T22:07:26.910000 +CVE-2014-4143,0,1,d81c861cab9ae8dfd32c1f693a18a934717f06ef1aaa83494b25ca881167bd7f,2024-11-21T02:09:34.757000 CVE-2014-4144,0,0,29cd4b83b128500bcaab04c0c378546690d8757f2b708d54e822a9ae20e79bf9,2023-11-07T02:20:25.747000 CVE-2014-4145,0,0,9b815261febe2941a4a76452ef8c1f7433a9c4c2568d52c9314083725828a4d4,2018-03-08T17:14:58.933000 CVE-2014-4146,0,0,c0378ceb681666279b8e17985e24ff51b607595c142e015f5f4cf42ebea83e47,2023-11-07T02:20:25.980000 CVE-2014-4147,0,0,6c057d24cb38f5bfee175bd9de5280a9105a6b9213cedbd749a4b54a749f4fdb,2023-11-07T02:20:26.207000 -CVE-2014-4148,0,0,27944012a6c7d566f8433a3a9ce4219cc48d7d02768d72b7173e6e3e36c3cca0,2024-06-28T17:24:23.353000 -CVE-2014-4149,0,0,e67ff97e8fde55f618848a34732b0986c3184e527b9ae8afe05c985f2c5e89d6,2018-10-12T22:07:27.817000 +CVE-2014-4148,0,1,db70a0f2b195cfd2f3db8094d98cd89b8f7a198bdae54b7c035bab3d5a181241,2024-11-21T02:09:35.037000 +CVE-2014-4149,0,1,6a143a04e77d799b5c28d5c9d302f79195a097b607d4e8ece7fcf6c50940eaf3,2024-11-21T02:09:35.160000 CVE-2014-4150,0,0,f45e91932b00e5b75c484de60de6e136c627249e62cbefa9edaab905b7478746,2018-09-18T12:02:25.850000 -CVE-2014-4151,0,0,7e1baadd0bc2b7d309a9031a97920bb6136718f05d49feddffa5108fe0d69b87,2014-06-19T18:55:50.827000 -CVE-2014-4152,0,0,e4360bb113069bd4fbd877855c1ead0b37ec64587a3488aa67316471178e6b5b,2014-06-19T18:57:37.957000 -CVE-2014-4153,0,0,15fd0e2e8427d88e20890d5ebfcbb27c4f8fed02a2649f2ca0ca66e6a51d86c9,2014-06-19T18:59:04.467000 -CVE-2014-4154,0,0,5b40d762e1c378877a6919904e51082434923adf6ada42e1d32724c7f0b2f5fd,2014-07-16T17:49:06.443000 -CVE-2014-4155,0,0,8074766bd517131fedb1c9d9b88478b15d9a5a002da023694264d71971de7f23,2014-07-18T05:24:04.523000 +CVE-2014-4151,0,1,310785cbc52ee0ed8fe46bf60d3d7f76f990c245d8a14c59026e8a58869abbc0,2024-11-21T02:09:35.420000 +CVE-2014-4152,0,1,24ad9eb7086e27f81381fa1eb5ae23b82b27070fc320bf3439e3b1c432590d8e,2024-11-21T02:09:35.560000 +CVE-2014-4153,0,1,659f2b72aa23085a5d9959e6353b8cb17f5d10f34ec326c2d9f3c98f733cfbfb,2024-11-21T02:09:35.713000 +CVE-2014-4154,0,1,e2aef35298b1300f77285f79433464155fdcfd3b965fd169500f6ce1aab5094a,2024-11-21T02:09:35.853000 +CVE-2014-4155,0,1,6d05a8bdc1cef15cf37bf6bbc436f246f65abf951ceab5ba50a2df0c1ca19bd1,2024-11-21T02:09:35.993000 CVE-2014-4156,0,0,6e6488de84ec29d4380deb01733cdd2df22c1cc6747973a27c859c2fb87cc3d5,2021-01-25T14:13:52.367000 -CVE-2014-4157,0,0,c253ed88307bfd40dbb1286b77d12def543f84bdae4f46d2d05065c0f4eba328,2023-11-07T02:20:26.500000 -CVE-2014-4158,0,0,27d0e6920f3056240202e9dab410bf99162330aeb4cbfd9d4f454e8f3d7b1b40,2015-09-02T17:03:58.760000 -CVE-2014-4159,0,0,83f1354666938e0248cb1b94bb9250d1a0725f5a66f776a75b455f99bd925b47,2016-12-16T02:59:03.177000 -CVE-2014-4160,0,0,c47b9e3c17420e91a4224f7b491a76970da184a5809e900f2e3480be8f0892f6,2014-06-21T04:41:59.490000 -CVE-2014-4161,0,0,85ebd6cce015126f4ed5bba589d7a864298f076daacf9c4d08f613475a171517,2014-06-16T14:33:49.290000 -CVE-2014-4162,0,0,54e037568c5a1d772c6f0803ab54941615238dc40bbe76fe01b6ecbace6991ad,2014-07-17T05:07:29.683000 -CVE-2014-4163,0,0,ee368309ae66f7beab4576c87a986fb75a0b3c02d9af89fe1a2e5d756f185e1d,2014-06-17T14:39:32.850000 -CVE-2014-4164,0,0,46e35656fa5621ce598131f75ac9e50305614e00e8448cb76115f29a475253bb,2015-12-04T16:21:42.793000 -CVE-2014-4165,0,0,d03a5d78196ae4fa5c5b5e4a6ea0b9bab6c5430df4c14d41ff761654efd14228,2018-10-30T16:27:35.843000 -CVE-2014-4166,0,0,fb87d1a39857bc8ad1babd0161d69dba82de1b9a7416fbf5901212b94f33d633,2014-06-17T14:58:16.073000 -CVE-2014-4167,0,0,fe32691fcc0dda8159a3066ff4e05786ba1b13072cad941fd7647001a04b8152,2018-10-22T17:07:29.927000 -CVE-2014-4168,0,0,078d4786772a1297c10208d4d5a2d837bb0ce953034655a728d0b18b0e7e3ef8,2014-07-07T14:49:48.077000 +CVE-2014-4157,0,1,16798757c1ee364433b815a6fb9f5eca1c9a754ee8d2e25809a57260fffb7ed2,2024-11-21T02:09:36.307000 +CVE-2014-4158,0,1,ca376bd57e092eb6ac78608e6acabafb335bd8db5f6f3e687299a4d12e61411a,2024-11-21T02:09:36.427000 +CVE-2014-4159,0,1,69dc1d76d06b0e32f675c6c90dbdb5b289013d32665ec4a7fb9dc3d9e7617537,2024-11-21T02:09:36.590000 +CVE-2014-4160,0,1,fe7396d0aad7a3404523a60ab343bf474639142bfee7a57d5b48de49331ab283,2024-11-21T02:09:36.747000 +CVE-2014-4161,0,1,7a40e4aebfbd5b4e6fbf1464fb0eb6bccd2e9e32f64c09c9976d578a76b10d33,2024-11-21T02:09:36.903000 +CVE-2014-4162,0,1,f4e4981617bee897d5c422c77a65eebc7984db26af3204c94df52aef07a14a7d,2024-11-21T02:09:37.050000 +CVE-2014-4163,0,1,b2ccf1a5632404a92adbf4646c9a8e3df0d092b77aecd8131f108aa0cb285086,2024-11-21T02:09:37.210000 +CVE-2014-4164,0,1,9dcc8dcdc58f1c1664f2e21c56e447c8bdd92a6986ea3fa829213e7fc4128830,2024-11-21T02:09:37.357000 +CVE-2014-4165,0,1,a154a89d293b51f2085703d144c0d78065a4ed39b58708f8480cd2070612bbb1,2024-11-21T02:09:37.490000 +CVE-2014-4166,0,1,34ac35594d2102db6c181c6575148f36ecb748d46b9a2d3c82b2c0c21757fad1,2024-11-21T02:09:37.657000 +CVE-2014-4167,0,1,961a39216c5add3963703aba77b2942cb3878b72621901a8b75bdd335eb11f8c,2024-11-21T02:09:37.810000 +CVE-2014-4168,0,1,f857f27ac1c22944e8787e53618d244c2b49c56935003fdb7adfd7863ea08b8c,2024-11-21T02:09:37.960000 CVE-2014-4170,0,0,dc1db04acca3f8d0bf5cada59e3f99fde72c2cae25257bc91252a989f66c9e1c,2020-02-19T18:43:23.447000 -CVE-2014-4171,0,0,efd4be86a82089ad0734b2c290208be8a1d34640a738f1ce7e0447897f47fb04,2018-12-18T14:38:03.940000 +CVE-2014-4171,0,1,2fbee8272efffeb62f82c71be0e17af84ed094a5d77ba790f0a95420b46962ea,2024-11-21T02:09:38.253000 CVE-2014-4172,0,0,35b887389bd95cce46fac6b9c99a5ff729878dcf6524486cd18e92ca31fa0838,2023-11-07T02:20:26.660000 -CVE-2014-4174,0,0,172193e6851e9522a47b3db7f0ca15ae5ad543b861039b42b1522216fa45fe96,2014-06-19T17:16:07.923000 -CVE-2014-4187,0,0,78fcfaba32cb664e69f379fcc616b97249f2969ecbc8f3db7b6fd19785417b17,2018-10-09T19:47:35.220000 -CVE-2014-4188,0,0,05f9222dc337432e081b0e03040753c24621db6d3cd65e9975ed107564ffea18,2015-09-02T17:04:20.887000 -CVE-2014-4189,0,0,75a38c0f30b96b9597950d21460fd0b2c43297b230fc148e837d3e684014c3ce,2015-09-02T17:05:08.087000 -CVE-2014-4190,0,0,df744f4b2adca0dd0bdf131d9e6660908c307741e8c37baefee5013993af713f,2014-06-18T17:06:34.267000 -CVE-2014-4191,0,0,44bfe6fe549ffa4c3ff39ba4efbd988807338d3d86944ee8aa1f75b768087f3b,2021-11-30T19:04:22.517000 -CVE-2014-4192,0,0,dee6e3ccf281c60e4e688048ca465d633194989cdeb3fd48d1f21434f245f215,2021-11-30T19:04:22.523000 -CVE-2014-4193,0,0,b7a2812404aa1f7e45270c4d198d975db3c3aa7a7d548b96770d89e65a564c7e,2021-11-30T18:26:15.267000 -CVE-2014-4194,0,0,55eb3fa839518fefb7c32908f32e768b73dd604c41a46101f906f9737b201a78,2015-09-02T17:05:59.713000 -CVE-2014-4195,0,0,6d02cfe1e05518c991b29eada8c23cf16f038ba98e58068ca95ba9686e979e2b,2014-07-09T01:29:32.493000 +CVE-2014-4174,0,1,2c4aa5c140d63d20af2a1d940115a2079f02c75d5d4db86c232be038c19ec0fb,2024-11-21T02:09:38.600000 +CVE-2014-4187,0,1,d114630220fb71dd7539967f2973b0691265496df4125aa7d7df5315fe0fc074,2024-11-21T02:09:38.740000 +CVE-2014-4188,0,1,26f35d5895f89600e16df36fa11a21d5d3b9602e1ee5101ac55a46c801c95385,2024-11-21T02:09:38.880000 +CVE-2014-4189,0,1,ebc2bf5a0d42c84cb310fb6d035ee278eef8c14ec34f986392b455ec0166d069,2024-11-21T02:09:39.030000 +CVE-2014-4190,0,1,e00e9fc86700bfbf8e858a47dab0b2a92070dfe293e3561659062b95195315b6,2024-11-21T02:09:39.183000 +CVE-2014-4191,0,1,c5908efd439daaf052cdaa6ff1dabdfc649ce630ec3e3329e67aa55fbc86b5df,2024-11-21T02:09:39.323000 +CVE-2014-4192,0,1,168587ff6600f7ebdb05f70a27592d257c57004c96f295f169b3384be61e184c,2024-11-21T02:09:39.470000 +CVE-2014-4193,0,1,9684c9809c6967911a59550a91dc6c35350d281e8ef96ec11409d16970b49a12,2024-11-21T02:09:39.610000 +CVE-2014-4194,0,1,c10d9680f882edaff194af0261164ac312a7ec88e672c37eea1b10c9186c2964,2024-11-21T02:09:39.750000 +CVE-2014-4195,0,1,e7f5ccc8db9971c55195307ead7034aa4feaba52b06f3c49e92ba1df01aedb97,2024-11-21T02:09:39.893000 CVE-2014-4196,0,0,4da380317c541ee6e0560772f1d7dd4c7e2a436d337dfdd8c5786db2eb0d1e5b,2020-01-14T21:14:09.377000 -CVE-2014-4197,0,0,c76982cec4bb79b5acab7cdbd98d4da128e9991a23a838936f9deef7ee88abb2,2014-08-22T17:12:05.237000 +CVE-2014-4197,0,1,70b47dd96247323bc0024a65c35925ecb11cfe617a15315d8465984dffb20462,2024-11-21T02:09:40.183000 CVE-2014-4198,0,0,d29e53247e26dd42b904f9c4264210e1a01a9e801096f843208db9c1fdcb7959,2020-02-19T18:41:38.317000 -CVE-2014-4199,0,0,694d74c55b6d13a7a7a1ab1d2948c9384d061acba40a3d5869488657c281eb10,2017-08-29T01:34:51.810000 -CVE-2014-4200,0,0,905e5e52779a2597c5d8226c9f2cea366d9b863951caaf0bbe1ed685b11ae340,2017-08-29T01:34:51.857000 -CVE-2014-4201,0,0,27f2314be979cf744ebe520ec90eb7e2d9206eb988758b8f50a31c3e23e494bd,2018-10-09T19:47:35.423000 -CVE-2014-4202,0,0,fc5d11dc1f0a52ef4660829e796dc77d882a19f56f75b3d3b6b66b777c161558,2018-10-09T19:47:35.983000 -CVE-2014-4203,0,0,3ca6cace3221f1b965c20316d40d8d2d9363829f1270ba984089fa43242abbcc,2018-10-09T19:47:36.530000 -CVE-2014-4204,0,0,a241134f4e3efd37bf8ee388718167c2e717434120027a5fc91824c776893e12,2018-10-09T19:47:37.250000 -CVE-2014-4205,0,0,f70f96b1e9d4aa8220ed0a5281505037cf451eb9cc2f6f7145cf69f96e28286b,2018-10-09T19:47:37.860000 -CVE-2014-4206,0,0,47ac15450fb75ff6c61adbb076b4f101b5692b9564e9cc973d20cd4923122333,2018-10-09T19:47:38.483000 -CVE-2014-4207,0,0,5116753331937d82e9625c70663845ce06019b6f2f85024e640bb3b1ec9e193c,2022-08-26T16:13:12.007000 -CVE-2014-4208,0,0,636cfbf9f4ce200ee7bc48424587d860cfb53a2917cb790b936b989395840ccb,2022-05-13T14:57:17.197000 -CVE-2014-4209,0,0,0b3a0d40db25e7ea24ccbc4b4283d01c73e165595c3d7f94c554894fb2b82ef8,2022-05-13T14:57:17.203000 -CVE-2014-4210,0,0,6291f986bebc07840cdd97f7192f28092c1f1794f489bdf27f2302620c2d70e3,2018-10-09T19:47:47.593000 -CVE-2014-4211,0,0,8aeebd7c50079a59b962e129b59a9668350933038390fa7d98eb850d225d3488,2018-10-09T19:47:48.093000 -CVE-2014-4212,0,0,9de7aa7b5fb75dd4cf896fce8e92b2671c3af0a53e22ab57b9e2dd19c9570bc8,2018-10-09T19:47:48.720000 -CVE-2014-4213,0,0,54eb5a97dddd0721b8fe2dcc6540ec3734e1b5bec3d24395eab45f5fd2935f21,2018-10-09T19:47:49.517000 -CVE-2014-4214,0,0,becd0c8282a0e206538863b5409c75713024a7d26cfecaf2d28bf0c58f97a43f,2018-10-09T19:47:50.030000 -CVE-2014-4215,0,0,a513d22d66f7340731373f572f83a5e541262b767c6a5fae1919d6772510fc02,2018-10-09T19:47:50.923000 -CVE-2014-4216,0,0,d2d25e7a26be4aeaa4a3cacad329052dcbba26b5d27f06353fd059d714eca1ac,2022-05-13T14:57:17.213000 -CVE-2014-4217,0,0,d6bacc79ee11f5f163f3dd98c40a3a8148a9dda23e075929dacf6180cb05d19e,2018-10-09T19:47:53.517000 -CVE-2014-4218,0,0,aea5e04b251ea6f2ca7167e7cc2579961b02ebb5a1b050634f3d6b911877763e,2022-05-13T14:57:17.087000 -CVE-2014-4219,0,0,04b33507cae2a7a7f597412f6430f5d3c01003dc7805c38cf9b5b3d811ba94d0,2022-05-13T14:57:17.093000 -CVE-2014-4220,0,0,96285cfaa4a2a1221b444b85617e8d764582ee61c7bee1921ee99177bb0630e6,2022-05-13T14:57:17.100000 -CVE-2014-4221,0,0,652121ced9abc1f8881446419b1770f2287aa92e31462f78e16e15e30b44f78e,2022-05-13T14:57:17.110000 -CVE-2014-4222,0,0,0e2a632d10d71776bd9633ec9e3d1c05143b7655a9064cbd7d8fb0d779a0a642,2018-10-09T19:48:08.643000 -CVE-2014-4223,0,0,8297a517ee2870d8871e4bad7b7dfee347ef5d3daec49b46cc3e3b8cdf5d0ff4,2022-05-13T14:57:17.117000 -CVE-2014-4224,0,0,d3f6c455add01b509792e8e39e925e295ee97ab3d1d987515d2c78038a5bd014,2018-10-09T19:48:10.517000 -CVE-2014-4225,0,0,b64c348d668de1a5b1af0824f474c5a2496b0a7075409269260c8318982e4821,2018-10-09T19:48:11.203000 -CVE-2014-4226,0,0,1abc1bfdd33c333ae957e2149a083a5987d3472848aee34e2b78c712f4acfdad,2018-10-09T19:48:11.907000 -CVE-2014-4227,0,0,28e7f4b817eeb23b3acd3a9112ea9a739b050bdb2edb7a7aa2aafccd41e05e49,2022-05-13T14:57:17.123000 -CVE-2014-4228,0,0,aa6b6111899f9df2936f9857a931eee521818d6d9fae6a9d693f98aa4ffadf27,2018-10-09T19:48:15.893000 -CVE-2014-4229,0,0,bb7b7cd4a2cc2a0a75cbd3a0a04b40abd9de93089d5654b161d5b9ef041d7e77,2018-10-09T19:48:16.547000 -CVE-2014-4230,0,0,a1c6f7de157f0d8b92b279dc05ce824e44e08ebb27e8a0f31ca961c007ddd65e,2018-10-09T19:48:17.220000 -CVE-2014-4231,0,0,0dd5693422b7d52528fb5313b73718dccb694abc43f75bfdfa4d05dcdca853f5,2018-10-09T19:48:17.860000 -CVE-2014-4232,0,0,1f6af5600e996e633a4598a56b492b3aea47f96763a611957cf9273d8d063e77,2018-10-09T19:48:18.487000 -CVE-2014-4233,0,0,d5d6bd5589dd4bd737217e7002f168a55411b2db2d09b5f0e4580ce238a196b8,2018-10-09T19:48:19.063000 -CVE-2014-4234,0,0,6af3a6e454c520a416d228ff2c213b05bca06d3d880c1fe27c06910b22cc7e5c,2018-10-09T19:48:19.893000 -CVE-2014-4235,0,0,594a0aeabc50892a6ac997305fb3f16f6d3b9a92428eb3ae2449ce35e761ae22,2018-10-09T19:48:20.580000 -CVE-2014-4236,0,0,a9381f741aa30e7c4a010593a3b40df71788b2306843b59fc722ed2d424fe70e,2018-10-09T19:48:21.127000 -CVE-2014-4237,0,0,5a1630862d559984395d3af92efd0b428522120e98aaabb9132a0806ac407610,2018-10-09T19:48:21.847000 -CVE-2014-4238,0,0,be9fea2847daafbe52aa3e20fea631f1aa27c463d345987a95d79aeae04d6449,2018-10-09T19:48:22.580000 -CVE-2014-4239,0,0,ef0df08ca8e9a341f41a743f2c3588efea78d5ea92fa747978997a13ab26fb4b,2018-10-09T19:48:23.393000 -CVE-2014-4240,0,0,2566fb6399ab945b3f0da4dd8ac637ef86e75a625a6dc80df4610a84c7ed2f0b,2018-10-09T19:48:24.110000 -CVE-2014-4241,0,0,1f92426eb2ca018d574b027ec88be1e1aa2fd2adbc9ab4e5b315815d13cbe61f,2018-10-09T19:48:24.957000 -CVE-2014-4242,0,0,d3b620a91f5a7150843406a916f6a66716ff00d86debcc11d7a10cb70cfa0ca3,2018-10-09T19:48:25.533000 -CVE-2014-4243,0,0,aaf1b62a2d58b59ef085af4a2beb90fa10e5f99ad94e0cc758fa4eec33739ecc,2022-09-21T20:10:44.470000 -CVE-2014-4244,0,0,92ccb51dd691c26e7f80012bb8a476a763f1ef200d061e5d4962fbbb6b65ef66,2022-05-13T14:57:17.130000 -CVE-2014-4245,0,0,a99233caccc629f74d5228632bfebea81a0f52e3d193c7911c0631000e2ec35e,2018-10-09T19:48:41.893000 -CVE-2014-4246,0,0,484a2b714d1f84f7b2e5c7b33bccf86099f570662f5d5607cad8c7552c105dc4,2018-10-09T19:48:42.800000 -CVE-2014-4247,0,0,b2c455b66e5dfbabc079527363bab83efdfdc27bbaffb02c17db7173ccc374a3,2022-05-13T14:57:17.140000 -CVE-2014-4248,0,0,9d1f3148e077e78f98aaf8e0f81ed9f301d2d02ff19be4ba2fca3ba7a3236f1d,2018-10-09T19:48:44.267000 -CVE-2014-4249,0,0,386e7cb1f8b3d329355380ed39147ea152a69a13374093c1ce0a5220d3cb277b,2018-10-09T19:48:44.817000 -CVE-2014-4250,0,0,80f818f6805630560fb7f3b5a0a8cf1bf0d5a84aa8aa355381d0579841db2fcf,2018-10-09T19:48:45.427000 -CVE-2014-4251,0,0,992156890950d433b46e6ef632e79df3b191dddc51248d3fe6a0ecea7fcc43ab,2018-10-09T19:48:46.033000 -CVE-2014-4252,0,0,35ce9c5ff843bb3083a86d6172170a39b1997ad69760f24fef1bd2e4aac444c6,2022-05-13T14:57:17.147000 -CVE-2014-4253,0,0,1ab82a816d7e31faf22bdf8f93c7c75efee7cb969f859cb08fe5c22c1e4f89c6,2018-10-09T19:48:51.363000 -CVE-2014-4254,0,0,f43bf9251ede6815e0f47ba396fac877232770dc87d7f0205856ac0da6b5b384,2018-10-09T19:48:51.927000 -CVE-2014-4255,0,0,575f3b69637e9d59b70ae144d784d953db2aa27b517507b3de9e93d4a06e0148,2018-10-09T19:48:52.457000 -CVE-2014-4256,0,0,c2ab474f85b8cb512fd6c8d660932e4099bed57b399ce36e6b7e82c6e89688b4,2018-10-09T19:48:52.973000 -CVE-2014-4257,0,0,fb4f4aeb61b9fc9d273acdc98468d1cb1fc1fe288f273b466c56d3c167818b25,2018-10-09T19:48:53.533000 -CVE-2014-4258,0,0,da25dff15fe08936d5b36f3db39bb6fc85cb219158539a44dee0dc522c2ff1fb,2022-07-18T18:43:03.427000 -CVE-2014-4259,0,0,2ceb486be3c1b5385593c6e7dd118d83468fcdb24d158e55087a463ba84d63a9,2016-12-07T03:00:39.200000 -CVE-2014-4260,0,0,e581fc2c031931eb5e8e5f5cb450899862a1377c3c1eb2dd98b8039db9b60892,2022-07-19T17:03:27.357000 -CVE-2014-4261,0,0,55db0a156b990d3720d4a481f32dd3f38a616c0c1f56126fdd02ea0774c1c3f3,2018-10-09T19:48:57.223000 -CVE-2014-4262,0,0,a3227afdbc66ad0c3552a1a9f45d61ad9eb5fc4cf901f675e0a1cc40700f46f1,2022-05-13T14:57:17.220000 -CVE-2014-4263,0,0,1398644ecf5f1e10207bc054a7899a7e8f23a98666f31c9f57e7b500efb3f5f9,2022-05-13T14:57:17.230000 -CVE-2014-4264,0,0,a9e77bbf44529b621e9a7b9afc70c49cd71e196fc4fcc4595643c60af34b3dba,2022-05-13T14:57:17.240000 -CVE-2014-4265,0,0,132224e4e33914d7ebcdeffcba43452bc73d8b2a94d374addb375906d7b154e1,2022-05-13T14:57:17.250000 -CVE-2014-4266,0,0,5bb89fdacadc89d4eacdf7449d539a1700597dc72cccfb594a3cf5a680e81741,2022-05-13T14:57:17.153000 -CVE-2014-4267,0,0,97ee74eeee3963a5097ccc9a5e7a4168ed0aa8667dcde2f0267a21515ae0d660,2018-10-09T19:49:35.897000 -CVE-2014-4268,0,0,018779f6b221e8d662faaee1c3bce494584f171312fef35f41340cf0ddf0da68,2022-05-13T14:57:17.160000 -CVE-2014-4269,0,0,16aa373039741edbae57f222964b22e1c205441382e6f36b61d517269cafdbd3,2018-10-09T19:49:39.707000 -CVE-2014-4270,0,0,ed2bf759d8e72e463e12eccda20d9bfeb30170e1f1081da03a21be69154609ff,2018-10-09T19:49:40.363000 -CVE-2014-4271,0,0,721313cd8eda37fbb03088ea115da02cba7adee81a7ece57adce1af0eb2f74f6,2018-10-09T19:49:41.067000 +CVE-2014-4199,0,1,2e20c6a79916d51fafb143d8b3a98cf251a8f3df22ed243e71b1ec6abc9f0c39,2024-11-21T02:09:40.460000 +CVE-2014-4200,0,1,b07bddf6a11e8901187f4ec5237b755c28d90f7b3a115db0eb81d8a5f1f0c171,2024-11-21T02:09:40.600000 +CVE-2014-4201,0,1,4a0d952c04ca421f636aaea8799df94b258df4552994a859549cfdca6ed22418,2024-11-21T02:09:40.750000 +CVE-2014-4202,0,1,0d68108fc3ace35a7ba44e5495b8b24d8183ca6d4fb808b1b397381852544b5f,2024-11-21T02:09:40.900000 +CVE-2014-4203,0,1,ad213bb160b15e01dbcbd205a039eea2b73c31d65d9757723b68a360419404e6,2024-11-21T02:09:41.043000 +CVE-2014-4204,0,1,7703db9367c65292509f16b8a8acad40df847d717075ec4253daf33340e21f51,2024-11-21T02:09:41.187000 +CVE-2014-4205,0,1,9161c9ca6b6a03d3aec4792328e9aa6568b4d3008fb1c9ac96a3f3a8d21a92fb,2024-11-21T02:09:41.333000 +CVE-2014-4206,0,1,5acc7da06ea8d9fc05ec5aff52890ef42c41acef6e822f242f1482bff8934212,2024-11-21T02:09:41.480000 +CVE-2014-4207,0,1,8fd6dfe51dfb75fbbf4e0b015149231eb7c2c0307addfe869cc9f750e4852b7f,2024-11-21T02:09:41.620000 +CVE-2014-4208,0,1,febcecff4159fffefbc06c6e485fe22b2ed4224d592892caaede647d523abe0a,2024-11-21T02:09:41.797000 +CVE-2014-4209,0,1,0d012b62780cfb7bcf988f44380a0419ae9b591b08b86d93af7af11314a701e1,2024-11-21T02:09:41.973000 +CVE-2014-4210,0,1,5709ad4128145fb74a476a9dcde2e5b6f9d5ddf7edd6ebf51acd84da9f2b203f,2024-11-21T02:09:42.180000 +CVE-2014-4211,0,1,028926eb1d9da941e99cc419e27efc9dd8d82743c6ad0849ebab25e4426cc679,2024-11-21T02:09:42.320000 +CVE-2014-4212,0,1,4d45141f48e8a0bdddccc2b78478972be0d26592414f2c6a6423e1a658d83010,2024-11-21T02:09:42.457000 +CVE-2014-4213,0,1,a6df8eeb0a5d76e07dacc659c18a12fc9cc33e98057509ff27747899ed8131a8,2024-11-21T02:09:42.600000 +CVE-2014-4214,0,1,7371c4139457226c5e145d8acc34d1aa989ab8b640ef3be7890fb89cc7341039,2024-11-21T02:09:42.763000 +CVE-2014-4215,0,1,e319d9ed8d3b9ff96e8b6b44afa99e8077c090e923e1aaaf472c4051ef3c98ab,2024-11-21T02:09:42.937000 +CVE-2014-4216,0,1,3d0a8c0947607c115f920661c54b0ce1d087a92a4f1bde46071ba31948a1b1b6,2024-11-21T02:09:43.757000 +CVE-2014-4217,0,1,6629a2e167c0919887106e97988868256228e2f7e03a38bf8e8f4086612542a5,2024-11-21T02:09:44.007000 +CVE-2014-4218,0,1,0cfff9cfc77e56116f4d4707aceb5d7e3bb29dfeadeef7d0ed422393302e3aec,2024-11-21T02:09:44.150000 +CVE-2014-4219,0,1,4980470a636de23c880a0569baf62e043ea91f9c7476b44a239fb66cb2861647,2024-11-21T02:09:44.353000 +CVE-2014-4220,0,1,b51aa182c66cd4611ebf66ead3f9c0b39d90ad5ef47a8bc8ddb6ff7ebd49a6c9,2024-11-21T02:09:44.557000 +CVE-2014-4221,0,1,6f5b2d4e302dac211ddbacda13af2799d21b90a5ff4fc2abb53bb383b5de7985,2024-11-21T02:09:44.737000 +CVE-2014-4222,0,1,1d06d9b6f96812728d58c1e311303c2300c4626590d674a0c166ec3d757eaa3d,2024-11-21T02:09:44.917000 +CVE-2014-4223,0,1,785a557348efd829828578af016e3a63c5ed674690b0e009f40660e19717eff8,2024-11-21T02:09:45.053000 +CVE-2014-4224,0,1,e654d2ce3cba3d99cf8089169e113d28c25f594eabc603b6604c1835ec4ebdd4,2024-11-21T02:09:45.203000 +CVE-2014-4225,0,1,e451fa2409eaa5f5c2be368ca80af874800af1a8f12a2d3c311396b10588bdd8,2024-11-21T02:09:45.350000 +CVE-2014-4226,0,1,c366189a7a914231aa3c7e8d2823d4c35c9d92d3894e867d7b722670b7ea9b9b,2024-11-21T02:09:45.487000 +CVE-2014-4227,0,1,2be60185b17eece0d3890e3aaa5a404c81ef67d66e08ddeb6c096ff02dc31ee7,2024-11-21T02:09:45.623000 +CVE-2014-4228,0,1,a7fa0b6a5f5679618e20bd87fa8d4fd05263174aeadcf88d60df39771f1690e4,2024-11-21T02:09:45.807000 +CVE-2014-4229,0,1,cfe797880e5e1d8d12b4b04e251401e2b2f14c208a96480bc987a580eae85de8,2024-11-21T02:09:45.950000 +CVE-2014-4230,0,1,132b7c0c0bd7f7a48f3935e2dbcae26bea6b829607d8356766b3485dedd67a19,2024-11-21T02:09:46.100000 +CVE-2014-4231,0,1,87960f9a36db603c6b2aab139c3ab455e7893dbfa9d07a96db7a238d80639c5f,2024-11-21T02:09:46.247000 +CVE-2014-4232,0,1,7c5d4cbc866c27e4d5ed15d9c67d3e63a225db9d85a7295c775ea8d3fae8c692,2024-11-21T02:09:46.400000 +CVE-2014-4233,0,1,95e1f7b9eab9fc56ad0a985609352094a137ad9cafffd9837b83c05abe1b47f7,2024-11-21T02:09:46.550000 +CVE-2014-4234,0,1,f756770632be1e711aedda60d50eda3c1cb78d4a88c26e9dda1a307237de566e,2024-11-21T02:09:46.697000 +CVE-2014-4235,0,1,f4c9dd194ff1baad1f0ecaaaa747fd1cb14f6f32ba9adf0cc6a9e28a8502b566,2024-11-21T02:09:46.847000 +CVE-2014-4236,0,1,b7c45ead37133d34cac096fcf6c4e33ec888705c1bf9ec27810669c1b4a9fd15,2024-11-21T02:09:46.993000 +CVE-2014-4237,0,1,2a461ad6a4fe9b5ef3c5930b5569412805d76dc6d72780ff1aaf2d45adedf0f1,2024-11-21T02:09:47.147000 +CVE-2014-4238,0,1,9495349c718ae83ba6c109edea62706a576b2171e43ad698b5ab1762e0516e89,2024-11-21T02:09:47.300000 +CVE-2014-4239,0,1,c81d6adaa87fb17eecba9c6bd52100b3a78ebf5f7fd5de6fcaf19734dd45c01e,2024-11-21T02:09:47.457000 +CVE-2014-4240,0,1,91206682d89fd5f8b53aa420c36e16e908d8bb1426a3feb53bff68bd52b0fb94,2024-11-21T02:09:47.597000 +CVE-2014-4241,0,1,fb5da6138eda0c8012c081c569f9d44a2e8b6156ba361b610c5b2ce8f71d9ce5,2024-11-21T02:09:47.767000 +CVE-2014-4242,0,1,ed2e8a3261c6f20c52e58f49d35533b570644ac66531277621b579d39f25d6e4,2024-11-21T02:09:47.943000 +CVE-2014-4243,0,1,54a30ab13dac8c7f22c3af8eb3b25ed5bf56696108028cd9df9ad4ef8f2f3923,2024-11-21T02:09:48.080000 +CVE-2014-4244,0,1,acf69f7d07a5595826cb64e7b5b3e208531b861d284e8a1ec4d4c3ee5f7cc2aa,2024-11-21T02:09:48.257000 +CVE-2014-4245,0,1,1876e4c207c0f580a6d9373f8dc6fc76c01b8b162181dce446494786354d371c,2024-11-21T02:09:48.503000 +CVE-2014-4246,0,1,7b0110bc2a21614f5053263224630e175982c8713c125440714fb299d91224bb,2024-11-21T02:09:48.650000 +CVE-2014-4247,0,1,c2059faa93fb91d83e54443f04bf83ac9a989330edc1416a12c35b8b599c5bb9,2024-11-21T02:09:48.800000 +CVE-2014-4248,0,1,60ee3625f12fca2a515e4cc0451e6128950f64dafb4d792bdf253bdd9bd6bbdc,2024-11-21T02:09:48.940000 +CVE-2014-4249,0,1,3ed43eb3a3a932f5e6043adbd60afeeec900ae4e8eb89d16494680cb3fcd067f,2024-11-21T02:09:49.083000 +CVE-2014-4250,0,1,bcd62ee459d7d0346c28f1917d925c2091dd480531e1544b26c8833c11390a1d,2024-11-21T02:09:49.230000 +CVE-2014-4251,0,1,d1312fb391d6b653c7b152a81cad02119f7166f029080ef1d2eb9febbf1b11a0,2024-11-21T02:09:49.370000 +CVE-2014-4252,0,1,e05b422ca46b4fa9892125a6acad11bd1c7ba5fb215c0e46919f565a2ac7647e,2024-11-21T02:09:49.517000 +CVE-2014-4253,0,1,f298455e86a5bd36b94605bb010170feff87aa04896fecceabf359fc2eabc1e1,2024-11-21T02:09:49.710000 +CVE-2014-4254,0,1,408968a81e5ccb2d535a7adcfdd620b41c8423cdd5287a3b58a01329fa29f03a,2024-11-21T02:09:49.847000 +CVE-2014-4255,0,1,05620cba6ae6e1fe9dc707bfa35c993ae14a89c7e9ae9c29dbb2155056c658c3,2024-11-21T02:09:49.980000 +CVE-2014-4256,0,1,7385d6c35a21162d7b9e9c75405e7f2bbbfcbb641ca1d612dbf5bded87fdbab7,2024-11-21T02:09:50.123000 +CVE-2014-4257,0,1,a1a92428d2b59fba58a0f6b3c064919d06a6fe0cbd8d22cd8d1916ab53a35372,2024-11-21T02:09:50.260000 +CVE-2014-4258,0,1,b81a4fe7ee14a5749b330d1ae0e2f224f36149cbdda1913469230b71f321ff39,2024-11-21T02:09:50.403000 +CVE-2014-4259,0,1,23c150d9762b28a03171d16792015e0f85a3fec77c8726b5d72e66a9519f5cd1,2024-11-21T02:09:50.600000 +CVE-2014-4260,0,1,94342648e9b59c8ec4178f1009c4f85435586fc2ab7ebdcd86da9eeb642c86a4,2024-11-21T02:09:50.720000 +CVE-2014-4261,0,1,8c545cdbd5cc47993ed1d89dd224db5005304e2e4b4c9a611b5c3f08891c1828,2024-11-21T02:09:50.917000 +CVE-2014-4262,0,1,83525503a1a67d905eade03753d7846773b52e79e7aa5be729cb8774febbd603,2024-11-21T02:09:51.077000 +CVE-2014-4263,0,1,9537b02a1e6464c90ad577bff27c574d6c7111d93f955f33ccab2d3b3190fd4c,2024-11-21T02:09:51.283000 +CVE-2014-4264,0,1,34402ac9ef761bd87587f2e67d6f119743b245cde12694a6f6a11221bab1112e,2024-11-21T02:09:51.520000 +CVE-2014-4265,0,1,396569e2b9ee8038b2047859636b35a46684cd503d3a3c3599cc8a07bb2b4bfa,2024-11-21T02:09:51.683000 +CVE-2014-4266,0,1,e94d34667adf5782a1ca1d5781d589ad43ffbce312be92b6425bd9786cd1a9c2,2024-11-21T02:09:51.877000 +CVE-2014-4267,0,1,669804c4f7fd07849de4b1cd7cbacf7ea210ca32589ba4265659f53ae27bd12d,2024-11-21T02:09:52.060000 +CVE-2014-4268,0,1,120a6b4994eb32e87e48d7f5ae157f68b02fbc700ab66cd155a3bc1b949c7446,2024-11-21T02:09:52.200000 +CVE-2014-4269,0,1,41626a5b68aa3bd0e7699c6146c78447af97da2f1865dab341effa39ad5d594e,2024-11-21T02:09:52.400000 +CVE-2014-4270,0,1,c6bdeec9170c43b37bd9fe5df85095571681b6484663995410035c61836006b5,2024-11-21T02:09:52.563000 +CVE-2014-4271,0,1,fe2e49fe8e1adf46eee2fca03f47e205cb94e505fa12aa1ad08d96e184c159c3,2024-11-21T02:09:52.717000 CVE-2014-4272,0,0,2350aae9d68ba432308e4b74a4f5aa4547fe421f4b2939b730b8ba3f7dd43314,2023-11-07T02:20:27.740000 CVE-2014-4273,0,0,9fce320ddc5cd0986c15343b56cb0051715176eb1b79ca5e0de98284eea07d4e,2023-11-07T02:20:28.453000 -CVE-2014-4274,0,0,454d751228cc8717f4ac2316b8afe93b9ef002ec2b6df58c8dffa5cb00f60696,2022-08-29T20:52:54.130000 -CVE-2014-4275,0,0,96310a32dfc45ce0bebb7fbcf72ce1c2a79e453b5fc63dc9faf93ff99af7e279,2015-11-06T15:48:41.073000 -CVE-2014-4276,0,0,509cd4dfec9049c249e7a35ee5dc7e762e94eeba0ad6fbabf4fff652b6e4ebab,2015-11-06T15:48:59.503000 -CVE-2014-4277,0,0,0a791a15e56879cea51127b71e85ee0fc43c0b32d5a2e190aa696f146f5e9771,2015-11-06T15:49:11.523000 -CVE-2014-4278,0,0,9c16dc952e3fca052f6a5dd3f02d60a38475918b6d82dc2854851a9b9badfebb,2015-11-05T16:23:51.113000 -CVE-2014-4279,0,0,4d476997a98760768d0e7da9130353ed26d4c1a9aae4a2bde9d427d839331379,2016-06-24T15:38:33.780000 -CVE-2014-4280,0,0,11f52ffd62b564dd527a1fff30a04e427c7e75fb186d5417a979178b482abe0c,2015-11-06T15:49:22.667000 -CVE-2014-4281,0,0,7a16f1c4c31709c35a2d85decfaad61548ee1fc7a4c6967ae0b3003a0d6835e7,2015-11-05T16:24:16.763000 -CVE-2014-4282,0,0,6026ca62a77314a2d9f30b321069a2d051d89fa7147c13fbe0f198e81c15ed36,2015-11-06T15:24:07.857000 -CVE-2014-4283,0,0,e6afbd71e7c42d59600236a6158bfa3a8d9116816141bf2411a26ec5807fbe64,2015-11-06T15:49:32.967000 -CVE-2014-4284,0,0,ae7b52ca6096efd2c3d5267802e5c529175f9f552e6e52dd6e0e0aa9df072e8a,2015-11-06T15:49:50.537000 -CVE-2014-4285,0,0,277d52690659b8bbccdb4b96a142b8ffe8f588a8dd8fc072992098064fd2ae33,2015-11-05T16:26:19.610000 +CVE-2014-4274,0,1,fdd804a3032d02e478dca8bf502bf48b31a2d5e29defe939980ed852c10568c1,2024-11-21T02:09:53.040000 +CVE-2014-4275,0,1,593413807a72634c09fbb373997578eef18bac69b37cbb0a96d55a6ff1d6afdb,2024-11-21T02:09:53.187000 +CVE-2014-4276,0,1,e3bc29d548c902ffb5e51de8b3915fa24b60f3f43d0e863505cadd6c7a8275f7,2024-11-21T02:09:53.310000 +CVE-2014-4277,0,1,7b8cd982a2dc467e7a38bf8de9cc388aeca63b4905714db020aa5299ac7ae156,2024-11-21T02:09:53.427000 +CVE-2014-4278,0,1,cf650fde361660cbe562256f31b507318fb8c1ad45f2d38d81ae1df0ef8b37bf,2024-11-21T02:09:53.540000 +CVE-2014-4279,0,1,185e9cb48d511abc9062726f683f8fd04d92e2160d67368127facd4a4c3ed160,2024-11-21T02:09:53.660000 +CVE-2014-4280,0,1,5b9bf6028abdcf3a7fce53c416e65075e1dcaceb8a33fa0c5c884b4c37a0b0dd,2024-11-21T02:09:53.787000 +CVE-2014-4281,0,1,c485d060b8a51cdba57a679eb0b854d316066c29766b9d8b7d0a5d8adce2820a,2024-11-21T02:09:53.900000 +CVE-2014-4282,0,1,1e672793043f8f2b754568c3e930f7941d751b39431a1336ed474f61c00f6683,2024-11-21T02:09:54.013000 +CVE-2014-4283,0,1,ddfd162f8a5238577c8d984aed3927fac389451074b3f6fcff4a3e8b94b8c9b9,2024-11-21T02:09:54.133000 +CVE-2014-4284,0,1,64985eb370067662113e74afac28eb53e497306f6504cfc5fe6a4b355996eb09,2024-11-21T02:09:54.247000 +CVE-2014-4285,0,1,3621f2685ba5c4b9e7200b1617d61b12db8278ab52c20d10545ef78ef71be7fc,2024-11-21T02:09:54.363000 CVE-2014-4286,0,0,871e53e13c83e567da05d6d638e1c8f7c24071a994d61d209d79b77ad39c478f,2023-11-07T02:20:28.790000 -CVE-2014-4287,0,0,68ccf004b6b629e619850fb366ccc146edabef31a782bd84158dd3f3c1630aaa,2022-08-26T16:14:56.897000 -CVE-2014-4288,0,0,1339bc7c0e65fbebf9bd9a3d02321f026a397199e6ed2d1c596e6ddaa31c65f8,2022-05-13T14:35:14.593000 -CVE-2014-4289,0,0,973cd68b782936e2debd08ff2277cb6c92807ee9d2287fb55825f8eeb987065f,2016-05-18T18:16:09.810000 -CVE-2014-4290,0,0,4277092fa842f586bec7ed711a7b2b7234f5c60b70414dd064040f1faecaa754,2016-05-18T17:55:37.730000 -CVE-2014-4291,0,0,6ffca23f4b4d0f7a886d53f0edb239f8aa43e09222609fa5a950105d6ede55f5,2016-05-11T18:12:59.423000 -CVE-2014-4292,0,0,53217790070726ceb6b581af84c85feebc017cfbb1962099f948d18256764ef8,2016-05-11T18:13:06.487000 -CVE-2014-4293,0,0,5b91e3483ad9221614898e3a1aafe04f774a565bf3ef00904e0d7241fdac58cd,2016-05-11T18:13:22.550000 -CVE-2014-4294,0,0,4e22b80ca823ae289fb3855c129f568cdfc2ac6bd5447f04f84f6a5663a465fe,2015-11-05T16:25:32.873000 -CVE-2014-4295,0,0,0631959b6114768a2f2fe23a08f81d3e7d0690c76304ba84d6497c1bc9e3420a,2015-11-05T16:27:33.997000 -CVE-2014-4296,0,0,6bc39fb00db50cf6c16e80cc0cba180f7b210b5e46db12a23f4518a96760b27d,2016-05-11T18:13:15.270000 -CVE-2014-4297,0,0,5bc1a0561069a55efb7db7d7bc85c91cd5b9f4e56c3e042630460fbaf70864e4,2016-05-11T18:12:49.377000 -CVE-2014-4298,0,0,290cd41253c29542ad39a60660c82b36652ed49d30e47ab2387a9cea831ee6cb,2015-11-05T16:29:22.040000 -CVE-2014-4299,0,0,28491238a9d55e80748f4a72af4fe90cbe5c40ff09430603ffeaf60e5ff56539,2015-11-05T16:27:50.567000 -CVE-2014-4300,0,0,0adef1346bfc134b2c648af719edfdb45aaddb0324180753642dc6d30d782fb1,2015-11-05T16:28:40.273000 -CVE-2014-4301,0,0,59cb7c96e7f82a8fe6505afc8781c4fd19c8e819320671baeefbb3ab142b4b6c,2016-09-06T13:38:35.527000 -CVE-2014-4302,0,0,64c6edd91294ede1734fbcd8c8e01f26e195c60e37ad56a768915a179a2daa52,2014-06-18T18:53:24.447000 -CVE-2014-4303,0,0,aac82b0fbabe07d101662efdd341a25b21431f8ade5dff1bbd9b1111d4f9490c,2016-09-06T13:33:10.817000 -CVE-2014-4304,0,0,8684e44bed580eb6d63b4706d4041751423e5398dd435bf98b01598147653938,2016-09-06T13:31:43.143000 -CVE-2014-4305,0,0,2439cd83a9fd6e344478185609eea158db23d054d7466f6e7789fb424bda55db,2014-06-19T14:13:34.913000 -CVE-2014-4306,0,0,b689f424b5b828f7a12d1bd9343c22e7d5839c0c7f4706701ec04b944e28b0af,2014-06-19T14:17:10.067000 -CVE-2014-4307,0,0,6d9ba6981996a9345ed3f24398f0c24f578aca27a49a407d094f5500677a3dc2,2014-06-19T14:18:22.740000 -CVE-2014-4308,0,0,c024520e2e957313572ffdf63456d61d89571d2beece3f8a5a4b23e0ec725f76,2014-06-19T14:21:45.627000 -CVE-2014-4309,0,0,958434ff8653cd6ed94eea32f1fff54708266f802005ac54f99e3f4100011cf4,2014-06-21T04:42:02.070000 -CVE-2014-4310,0,0,95ed8f3cbd9ddcc8417220441e8ff7a69983fa808db76f33ec601a91954a4dcb,2016-05-11T18:13:38.613000 -CVE-2014-4311,0,0,9ff7a6f95368a109ba3ad7b0b4093582a85e4a0f14fd8a9dd0255774f0247bd5,2014-11-05T03:50:51.057000 -CVE-2014-4312,0,0,e912ab6ff5a95bfc3000baac2714d80791c699f88ea33595db3036a881f768f6,2017-08-29T01:34:56.530000 -CVE-2014-4313,0,0,57fe3d812edc3199cfbaf2fd566cde01d57f36d7da4449a8820d34386202eb7e,2017-08-29T01:34:56.577000 +CVE-2014-4287,0,1,28f24898c746a28f6f7c1c5a67a4ed854eea152369f35b7a20abf8690c1649cf,2024-11-21T02:09:54.500000 +CVE-2014-4288,0,1,bb706936293670b72ca7a8c9cf638500524ecc79e99de93259833b5fd16ce041,2024-11-21T02:09:54.633000 +CVE-2014-4289,0,1,fd6f8152dcdd15349c84e7040453cf10d3f53078cefbb17c61a07c0719c1e19d,2024-11-21T02:09:54.790000 +CVE-2014-4290,0,1,ca389592f832bbc66eb4ddb5be843e270ed861c31eb270b2daee047305c08e88,2024-11-21T02:09:54.913000 +CVE-2014-4291,0,1,3e014ec1a8a86c2826ded8d91204790c6c71dc6c48fda9d066a232996099492d,2024-11-21T02:09:55.023000 +CVE-2014-4292,0,1,e79c7f9770dde438830508059317df2caacebcea9efe00e4efbe147031ba3b2f,2024-11-21T02:09:55.137000 +CVE-2014-4293,0,1,a8430e1e14505a8da8cf14a41b9efaeab3c7b864fbf48b8e4a033ecee49f5031,2024-11-21T02:09:55.243000 +CVE-2014-4294,0,1,e6d943e41147268bda65bfefc176857b3d9cdb396e6022f216d47e2810df4a49,2024-11-21T02:09:55.367000 +CVE-2014-4295,0,1,99625d7831efeb1cd32f5ecdda541499ed0f36f4d235c92d14a050450e5f2bfe,2024-11-21T02:09:55.483000 +CVE-2014-4296,0,1,522b6e04dd81a3a8269032e2f466d122442fb2a13b4175128bb1283581ea766c,2024-11-21T02:09:55.593000 +CVE-2014-4297,0,1,5b1688716ed4dac8e4eb8f339f7195d322018674c93a138b535b85ea209c5a2b,2024-11-21T02:09:55.703000 +CVE-2014-4298,0,1,37678cf8523bf4dca2ef6f44a992863188b685c83b3fbbd8289d412a74a5c77a,2024-11-21T02:09:55.820000 +CVE-2014-4299,0,1,27fcc7df398f55c59866e479124a6fe2deafae5c5b543b1b117305238c86bec2,2024-11-21T02:09:55.930000 +CVE-2014-4300,0,1,d77a3e1c02be83bdc8910880a095a5ad27cab5432e9064bda8cf340421f8dc52,2024-11-21T02:09:56.043000 +CVE-2014-4301,0,1,8e84dc04ed2ef434ba2740ce287922c99975e7751d0d905697a9f19e42d6db7e,2024-11-21T02:09:56.153000 +CVE-2014-4302,0,1,ffd8c9fee07dff05af359aebb71ebeb1e009fff0d1d2aab2fe71b0f2c01af098,2024-11-21T02:09:56.300000 +CVE-2014-4303,0,1,a7555c02361659a0ec618dca27b8bd824b4d664758ec22e816434b81e5e6a1cb,2024-11-21T02:09:56.437000 +CVE-2014-4304,0,1,5f5f3b2e0d8c82e7b96319a367fa8858735502f191423d86fac7383511faa331,2024-11-21T02:09:56.577000 +CVE-2014-4305,0,1,9bf76e69059ac2a932fce13657dfe1684a79dd4cca86534175f5b3290afd700d,2024-11-21T02:09:56.717000 +CVE-2014-4306,0,1,05a3dd94e74420818687d4ddc6291a5ac27391c5a2c2c5af78e405a7e5f9e834,2024-11-21T02:09:56.860000 +CVE-2014-4307,0,1,3e85948ab7173e57bc901f3d7dfc19072e0f6da2935214595c357afc6b8db6a2,2024-11-21T02:09:57 +CVE-2014-4308,0,1,0a583ea098af5f4f753b38c40a1eebb7dd0a8e4690175f1421d811a85fa2b62a,2024-11-21T02:09:57.140000 +CVE-2014-4309,0,1,5395b7fe9257ad801d447c7ecf44995526bc6e45a5e4a1247e99b1375e7bbeca,2024-11-21T02:09:57.280000 +CVE-2014-4310,0,1,8479fa85c42d0b792c44bc55287011b3a3eeaaf604bdd0115e25d4787c2753d1,2024-11-21T02:09:57.413000 +CVE-2014-4311,0,1,465170a937d0657bd63f4faf5aad21734bb319862392bf37c41e815da8f261aa,2024-11-21T02:09:57.530000 +CVE-2014-4312,0,1,8973b8595103cf2841e79a085f14b2568ca86c55b4c4d2aa882d3b6d1d632cd9,2024-11-21T02:09:57.683000 +CVE-2014-4313,0,1,418bc5c976c1a4af82086dd2ead32654710329720fc08954a19091762e67260a,2024-11-21T02:09:57.837000 CVE-2014-4314,0,0,df321f2f52b60636918d11f16a9c9b2e0736a12e0daa2d3c1bc01be4671a24ed,2023-11-07T02:20:29.193000 CVE-2014-4315,0,0,02b07c94f85209013c7f449d3126b5fab2529ffc780aa64e8e47acf705bbc0a6,2023-11-07T02:20:29.220000 -CVE-2014-4322,0,0,4fbe1c6db78f7079864d0494451099bb54390b61b828d3eb085500878779c412,2020-08-14T18:25:22.550000 -CVE-2014-4323,0,0,f07a366eb68b138d4b3e9003e0828adc198d915fee8590b7775263ab6642f169,2020-08-14T18:20:44.343000 -CVE-2014-4325,0,0,ebcf251f2b6458b1e1061625e3b7359c7dfc7e5ad9a111f76f3045b4d589b307,2014-08-28T01:35:49.083000 -CVE-2014-4326,0,0,6634fd32dfd9107e1189a789dc075eb35e8a60b40e741db0ed71bea9cdf21f6f,2019-06-17T15:48:25.623000 -CVE-2014-4329,0,0,5cd21923d947725ecb7ab153326bf3e6e0f9860ae90a7129b3083bfdd2a52ad7,2017-08-29T01:34:56.657000 -CVE-2014-4330,0,0,a0910864b87b442b560bf659ad6db187a026961bf399454045f948c565172468,2018-10-09T19:49:42.067000 -CVE-2014-4331,0,0,556650177c336bef256f9dd4aaf0829693067bac69cfa6b5d2a71b75fd7752ee,2018-10-09T19:49:43.693000 -CVE-2014-4333,0,0,b5d7bddb2578439894645d8b75614883dd590ffff0560defe96557eca124e925,2018-10-09T19:49:44.050000 -CVE-2014-4334,0,0,48db09ef41b16934e9ec60e41d1bac741d9a516ea0802c7d3447572cb3202f4f,2014-06-20T17:51:30.937000 -CVE-2014-4335,0,0,028fbf0ddeae5551fe5f1f9d55bcb393e806f99dd3c5e33e5e20c8ee8b230784,2014-06-20T17:54:09.537000 -CVE-2014-4336,0,0,8330e2dd84908fb51de70788faeb96ff2f1ebb3794abf02a76ac447f010f93df,2018-01-03T13:45:38.067000 -CVE-2014-4337,0,0,066c8838030f9670f50c83883b1e1a730478542c5def9c2d5f652b7055484bae,2018-01-08T15:22:12.443000 -CVE-2014-4338,0,0,0ac16ab5add33307c83c2a18282fa4420fcd07de8123b7607c391f35a3a5b846,2018-01-08T15:22:19.427000 -CVE-2014-4341,0,0,143f5df02995c1b452da92e616d74bef327dabbeee256555d695b61b396a4b85,2021-02-02T19:00:48.647000 -CVE-2014-4342,0,0,33c28f6d8e6dad59022b907470583bea7c3001720752061b6ad70246a0bfc6af,2020-01-21T15:46:47.197000 -CVE-2014-4343,0,0,e85166bc02b2d951110d0a2cdaf4947c1727045cb828882407295300c4974876,2020-01-21T15:46:47.197000 -CVE-2014-4344,0,0,8b91013adf6ca976153546122c6fad51bc7e10fa43267dcca916f705afadb1b0,2020-01-21T15:46:47.197000 -CVE-2014-4345,0,0,5ad2af1fdf77c861f70449637fb872bed62828352f06f2d6575d305388bfb372,2020-01-21T15:46:47.197000 -CVE-2014-4346,0,0,1dc47119d2a2ed12a56b17298674b4f1a0bba3c8db4719ff6518bb9427f47c8e,2018-10-09T19:49:44.347000 -CVE-2014-4347,0,0,9485a655d4b4c8fd0377c575fff3ca27e35477ea778843d8cb1fcceba31323e7,2018-10-09T19:49:45.333000 -CVE-2014-4348,0,0,191150b2a4c60ab6f3262cc1fe6a7d801a75e1fa562495a8132455b9cace6cce,2015-09-02T17:06:24.057000 -CVE-2014-4349,0,0,988f399bc05e4be3087f481efc70e5be191fbac3f0f874b8250e6d014bb2212e,2015-09-02T17:11:09.517000 -CVE-2014-4350,0,0,480db44325927d290d1165785819d47e6cd67a85b154938b63bc9823bda46d81,2017-08-29T01:34:57.327000 -CVE-2014-4351,0,0,12bcf8ce6479513a58bbac711d8718b99a032330320da3479482874147473926,2017-08-29T01:34:57.390000 -CVE-2014-4352,0,0,2f063c58995fe3a9be4746f10a53eab6f12bdc450654f5f8938a185c3d691ed2,2017-08-29T01:34:57.453000 -CVE-2014-4353,0,0,40c88ecd8caf1ae9bb87975d757294d958dfcb969126f917efc4e5c3caa2fd22,2017-08-29T01:34:57.500000 -CVE-2014-4354,0,0,2a8cc7fc93c4d68744aa92236fb479b16a7d40b4d63d52c04d3dbc877e4c90fe,2017-08-29T01:34:57.563000 +CVE-2014-4322,0,1,e0a67a8450d487c47170fc82cc63f789c45c9ddb798fd0d3a06cc056506dc720,2024-11-21T02:09:58.007000 +CVE-2014-4323,0,1,5e3dbcb9d549e138e1a17bd5bfaaaef702e31665dc2660870c25bc3a9283b930,2024-11-21T02:09:58.157000 +CVE-2014-4325,0,1,990dc616065ddd3ba43fd51d96e2c0539dc72f2916500ea29d6b2bb4f8f99793,2024-11-21T02:09:58.297000 +CVE-2014-4326,0,1,d11bf76ca65a599bc32b54c902df97e99e5eca5fd9f58009bfe79946d94234e8,2024-11-21T02:09:58.433000 +CVE-2014-4329,0,1,0dd106ec43893762ec80d457ffa51d8ef691553ea8e1bd3dd40e194bb506a2ca,2024-11-21T02:09:58.593000 +CVE-2014-4330,0,1,f1ef190da49cf588bd9c72146d6721623d281d642899e356149acb24a8ab30b3,2024-11-21T02:09:58.740000 +CVE-2014-4331,0,1,c0251da25312ba0e8c091484179454a242eb932e3cc94d936fc5946443da4dad,2024-11-21T02:09:58.903000 +CVE-2014-4333,0,1,4617ac6e83875dab32fdfc37ddb0d6c20775df8d7ff3a8e7944ee5a6f1cf1022,2024-11-21T02:09:59.047000 +CVE-2014-4334,0,1,4c2752bec3f7da6c0fd9495a1aebafe8c7420fd7c37f81a6e4fb5f00270be3a5,2024-11-21T02:09:59.193000 +CVE-2014-4335,0,1,f592108f7dabb6f415e04d564abe66247363ba3bf223bec574cd3b6ea00be867,2024-11-21T02:09:59.337000 +CVE-2014-4336,0,1,f5aac12eb39865b2e8e4085e9b12e18d599b3b6c03ed28c8daf1dcdb0b081277,2024-11-21T02:09:59.477000 +CVE-2014-4337,0,1,0eb95e10974d720715e4acde9e0dca765e0eb420e428b6cd39ba81b641e598da,2024-11-21T02:09:59.583000 +CVE-2014-4338,0,1,7053865ed73dfcaa9d1c4600e8bf443978bbfd5e8b9a082d72d2c39b6d847f2c,2024-11-21T02:09:59.700000 +CVE-2014-4341,0,1,91d6f0ab3400bef59403bf33e246f11d8b68b7c2f7bd8376524d2dff31ab5bfa,2024-11-21T02:09:59.820000 +CVE-2014-4342,0,1,0bd2073609ed8d425bbc87e7356739d99ccfc916b925bbb610cd584da76d27bb,2024-11-21T02:10:00 +CVE-2014-4343,0,1,7e1725adbdc12b7512569fd8f9b0a8bf13df00e81cb5a1edf066bdfe7067287b,2024-11-21T02:10:00.187000 +CVE-2014-4344,0,1,8bf87bc8a95a680f83ef3162e3ce7fd8138cb7cb9b384289070fe9c1ec53c5b9,2024-11-21T02:10:00.353000 +CVE-2014-4345,0,1,688598251866bbf210ce71eb2a8f6b6bfe9e9b17bbcd3fd82d4ea724f908eaff,2024-11-21T02:10:00.520000 +CVE-2014-4346,0,1,20cc80f0fa773f1e8fc8c6e7cafd803a8ed5abc45e4dfd3df958a7aefe1f03dd,2024-11-21T02:10:00.743000 +CVE-2014-4347,0,1,707984c121e215dd9d8d8789078b8b4acad1f650f76bff195e5eb6129dc52ba3,2024-11-21T02:10:00.907000 +CVE-2014-4348,0,1,577788cb1bef0d05181037e5dac43e0e24b79fc677b1bb8fc15856996b028d50,2024-11-21T02:10:01.053000 +CVE-2014-4349,0,1,a12dbd3fccd02f2b2c77eebeb6eeca582ed18081a00c27827f451e3039c5b751,2024-11-21T02:10:01.197000 +CVE-2014-4350,0,1,bd1b2c229eb3e433de3c4bfc421917eabeeced7265f89079393d22cb15d2243d,2024-11-21T02:10:01.350000 +CVE-2014-4351,0,1,6e118712db10d136a42a2c9433f7617630fb2e771d879adfec57825ea88a1668,2024-11-21T02:10:01.470000 +CVE-2014-4352,0,1,8c5a7661ce460bc839ac2b91e04809a24ef3a02b3194d04c1a25d98b41bb5297,2024-11-21T02:10:01.593000 +CVE-2014-4353,0,1,ef3571a469c1461905e64faf2e726f3f995bd9b59c2122c8d4a3015c4adf496c,2024-11-21T02:10:01.720000 +CVE-2014-4354,0,1,a42d34f4ada0ad717517d438c1860e2464451778cf83dd3fc17eec88fd41f40d,2024-11-21T02:10:01.850000 CVE-2014-4355,0,0,b7f07bc8dc21a55ebcf0a607037602ba07f7127e9cafb3b0f1316eb225fe3674,2023-11-07T02:20:29.490000 -CVE-2014-4356,0,0,8f69e793dccb05e05aa284a1f8fb2c4e3de04d428e1c051b2c21e784729ecf45,2017-08-29T01:34:57.623000 -CVE-2014-4357,0,0,0d002ffbfe6d424df0c329bc1912891ded35e1af3e2ef400e539084a9e777004,2019-03-08T16:06:31.107000 +CVE-2014-4356,0,1,051b9e56132ff1fd04a1a438dc0a26538e24ba21edfdd084ac93f8ef4f7d6700,2024-11-21T02:10:01.980000 +CVE-2014-4357,0,1,45a0bb8b1e2c797c4c35d0363db3ada3dfa31487f9c6866690f54ce0afd272ea,2024-11-21T02:10:02.580000 CVE-2014-4358,0,0,81c4e09b81197caf27a895e84f617249b8781b38b9a18117dd802090cc0527ea,2023-11-07T02:20:29.780000 CVE-2014-4359,0,0,b073df9d4c6cdcebbbb4e080c63c56903d31f0eabc8c234a06dbda24ec3abcdf,2023-11-07T02:20:30.043000 CVE-2014-4360,0,0,70aff1aaf3208beb84be928be9866513ec0b358e44a1eb4d4e0e16cc91a6f608,2023-11-07T02:20:30.330000 -CVE-2014-4361,0,0,a69e9a6782906b05a55594889f4fe9a41fad56d397cf2da09bd07d64c689bb01,2017-08-29T01:34:57.750000 -CVE-2014-4362,0,0,98672dfd24ec2747655780b7366a96174170a2a674ef96bcfb5177d0b51485d3,2017-08-29T01:34:57.813000 -CVE-2014-4363,0,0,7ed5ac652f91a76c43b28148ea1467a96ae94f63d6c04f5c259aa94b6d50d835,2019-07-16T12:20:47.370000 -CVE-2014-4364,0,0,92e719b269b5254b36c8733f995a20e3bfeb876a616a0c99e895f78e9345c50b,2019-03-08T16:06:31.107000 +CVE-2014-4361,0,1,21b3f6642dbd1de27161ff57c0789eefc33b09de5b507933659315a3653c6dd7,2024-11-21T02:10:02.900000 +CVE-2014-4362,0,1,0871e7c2fa19d7dd3f27f64a0b4e87407eb5b3ae1d45c81076656954b565160b,2024-11-21T02:10:03.017000 +CVE-2014-4363,0,1,f20e7a22098563b97ba7e4efbee0a3097a310ff77d04dc4b80a11e1567ad05da,2024-11-21T02:10:03.130000 +CVE-2014-4364,0,1,7b64c1d3be45f24f4b84501f1c7d418af59ece7aec2674aac678878e0798c628,2024-11-21T02:10:03.313000 CVE-2014-4365,0,0,ed822810928bc5eb0a2565bba267159f427eeaef836406b3c838c2d9f0beed07,2023-11-07T02:20:30.637000 -CVE-2014-4366,0,0,be67eb422260debaed423e2ff4a6dc07f0b2ceccb15e27b190f625f37db50e3a,2017-08-29T01:34:58.047000 -CVE-2014-4367,0,0,d19bb683d6eb5db3d49c0f3c91d41ecf97c8adee30eba1bc8c4edae86e46f0d1,2017-08-29T01:34:58.107000 -CVE-2014-4368,0,0,16a1196ff6aa8e4cd34e8a4f0aa3ee0bf18c36aa0786a6c938ff10a54fef37d2,2017-08-29T01:34:58.157000 -CVE-2014-4369,0,0,e2602417d89179e99627882a58cd5a12ec076a860869b435ded2a246aa8defb9,2019-03-08T16:06:31.107000 +CVE-2014-4366,0,1,a10f3e45038ea86c97304468ac61964d3a0800969351b96f081e8251056aa76c,2024-11-21T02:10:03.460000 +CVE-2014-4367,0,1,7bb7b9999cdb3c6e751e32aa2bbe4f7946954277726bbc1e940553f07d88d630,2024-11-21T02:10:03.577000 +CVE-2014-4368,0,1,ecfa3dcfe37e438584cf1419f633af8a1ee1aec22d7f3157b652c21b3c243cad,2024-11-21T02:10:03.690000 +CVE-2014-4369,0,1,a4f2d61cb095e9ecc6452acd5b4483e072da3987c4b470e5329a32feaf822e74,2024-11-21T02:10:03.800000 CVE-2014-4370,0,0,6cf27b913a60305529b272d964958de7a7ad084f5f6238ac828ce8cbf8d56921,2023-11-07T02:20:30.880000 -CVE-2014-4371,0,0,a37885fc87c8d65fff8121ba2eeb99f60da75f8786239a14b009b67eabbb0584,2019-11-07T15:36:57.787000 -CVE-2014-4372,0,0,73e8bf768d6019ff3dc931c0424c5bdca7f022c077f913f661e66a625b8397f4,2019-03-08T16:06:31.107000 -CVE-2014-4373,0,0,3c14037fdcaeb28ee035618f3d95e9944466d66d67d019eab466a914a0cb6763,2019-03-08T16:06:31.107000 -CVE-2014-4374,0,0,6fff8147bbe6a015a4c9c4f4a6c6fe7368f720e17f1f47242af6e8f125fe0835,2017-08-29T01:34:58.467000 -CVE-2014-4375,0,0,18e577a49e1c89feed559ce9815ec4f665d72a15948cce4137c4b040c7b096eb,2019-03-08T16:06:31.107000 -CVE-2014-4376,0,0,0ba92324e7315d5aec7d568302bf730636c1426f22d24dbc8b0b43b2e63965c9,2017-08-29T01:34:58.593000 -CVE-2014-4377,0,0,d89471cc77a1fa57a2d67b422f1f1f2f5356f9da8fc85389b82e3787d2e92288,2019-03-08T16:06:31.107000 -CVE-2014-4378,0,0,5e7760270b6854e964716ea13bf33dad58796947db4547007c57bdd40cc5f34d,2019-03-08T16:06:31.107000 -CVE-2014-4379,0,0,ea19cdbf3c459a225ce6ae6c5bd78289d48421cef28ee05d5eeae4ac76413d66,2019-03-08T16:06:31.107000 -CVE-2014-4380,0,0,89b422533162ef05955e00a29811daa47374b43a5688d65a2d57d8e0d0f78f47,2019-03-08T16:06:31.107000 -CVE-2014-4381,0,0,8d949e1e8ba69a6fdb311defbdfaae608d452f338ab0277f14bb8b60c94151fa,2019-03-08T16:06:31.107000 +CVE-2014-4371,0,1,81f4efda5479c3a098261e0147d005d1f2a5dd2163586153ae9cec027a90cb36,2024-11-21T02:10:03.937000 +CVE-2014-4372,0,1,1359cfe0f355fddc6040f8f9bd9b0516c21b9f2683ad38e721fa3c7b7b1424e3,2024-11-21T02:10:04.087000 +CVE-2014-4373,0,1,1f4ea1b91c3a12f8efed04471afa7996b0cb1d091d7d23782e9287661b0951fa,2024-11-21T02:10:04.197000 +CVE-2014-4374,0,1,4b8c3a4759ce78744a58fb84806fd3496e3599e11b54e8200b324c873bbe2bbd,2024-11-21T02:10:04.327000 +CVE-2014-4375,0,1,6ecb970aaafd8860b6134076f54bf26ad8cfbc1828d7ba8d901f4fd7dfd772a3,2024-11-21T02:10:04.440000 +CVE-2014-4376,0,1,8b85c030a346be7f56992dd9975ba391f9fc399324b42b8502e0aa71a077134c,2024-11-21T02:10:04.560000 +CVE-2014-4377,0,1,e77262f75aad8bc1541080e42c4339d28a87919e2dd49fb5c3dcb618911d67fc,2024-11-21T02:10:04.663000 +CVE-2014-4378,0,1,f155b8463aae991171a58e7530d143489c3a4c203ae0c4b3f6cfbe8957016044,2024-11-21T02:10:04.797000 +CVE-2014-4379,0,1,0eab8eeb0190a6d14732c5b8c6d6afb0cac2295881fc1ec9a9d72821573538d1,2024-11-21T02:10:04.920000 +CVE-2014-4380,0,1,e3d1c2cd6c339d2866b779af3ea857588611b4d465e8efc671ded7b135aedbec,2024-11-21T02:10:05.047000 +CVE-2014-4381,0,1,48362b68b1afdaefb5eea1f36410375ba082e4f94c35c25803a7ed022b3e954d,2024-11-21T02:10:05.183000 CVE-2014-4382,0,0,ab3eaa5e02fb73ff1dea0b905d70deda6a804ae98d1fd064a42596f3086ac53c,2023-11-07T02:20:31.197000 -CVE-2014-4383,0,0,35afc595b067a7b5f2d5d21b3e7ad32b9dfa605969c0fd78decefa0e6c4367e9,2019-03-08T16:06:31.107000 -CVE-2014-4384,0,0,0f8a0234fba50018b34fc6f6c76298791294edc37a5da0accba0b1f923c0b46b,2017-08-29T01:34:59.140000 +CVE-2014-4383,0,1,c3613893b009d5c4d6c498fab679ca10de4fe64f849b09f000cb9431c7562ce0,2024-11-21T02:10:05.340000 +CVE-2014-4384,0,1,4ebef3b35f2ca34a02c4f41f8e9cb6abc15a9ca06eb18d9bc534fb88a5898d16,2024-11-21T02:10:05.460000 CVE-2014-4385,0,0,2b17291075799a6c4eb3fe5dfba28a1f68fb09a8ea4ad37011745519a924f2ec,2023-11-07T02:20:31.427000 -CVE-2014-4386,0,0,f29367e5d6860aeadd7da152a2269d2edfe1c6aff14d891b8ed7ce69020b6755,2017-08-29T01:34:59.203000 +CVE-2014-4386,0,1,bf74e2fbd9d9b85c4e8c3b11884dc21d6e124ad4d5f79444277e9c1346157b08,2024-11-21T02:10:05.587000 CVE-2014-4387,0,0,07a0aaa9ca3010bda88c38503e5754dfdf333de6307cb4006fcf0db26731edee,2023-11-07T02:20:31.660000 -CVE-2014-4388,0,0,f05f0c66bd8e620f1e748c82ec781b99a921bdaecb87c69772165749395d5f62,2019-03-08T16:06:31.107000 -CVE-2014-4389,0,0,418aa47f65208e75cffd39c7acd79e4f30550689d47ae8629a7b628f78c69884,2019-03-08T16:06:31.107000 -CVE-2014-4390,0,0,42966619985f185ea3c944b036d1ad9a35a8b79fae67eb95c546985124747efb,2017-08-29T01:34:59.390000 -CVE-2014-4391,0,0,e89cf2c3ab4b8d32b6bb26914b99beae8f02b6c3ac03634f8b45aac6644855cf,2017-08-29T01:34:59.437000 +CVE-2014-4388,0,1,e9de1fc98b19efadbb06178f38360d2afa1aecb9e47954a800ab0e5eb4d455ce,2024-11-21T02:10:05.713000 +CVE-2014-4389,0,1,51d379538e20b62a6f7bc065ae489f5ffe4971b818548abc97fd08dcb61d28fa,2024-11-21T02:10:05.853000 +CVE-2014-4390,0,1,d2148c00262e63f77001991fe072b97c347f6a01e63e643158e550975de94ed0,2024-11-21T02:10:05.990000 +CVE-2014-4391,0,1,896a052bb2c4ad07daf48616ea3d3ecc6d5d2d7b501e0ad040055dd7b8e9773d,2024-11-21T02:10:06.100000 CVE-2014-4392,0,0,a3a934754df3e9f18ade4000da33fae45279f4adb9eb7dc59a0bfd042d6747f2,2023-11-07T02:20:31.927000 -CVE-2014-4393,0,0,d2b5d3420374c093f25486b87ae54c15d3136a4a55cbcefacf2ddc9061428d35,2017-08-29T01:34:59.483000 -CVE-2014-4394,0,0,2e4e4b9125255161ea2e9385b7c9bb75235eb6f36f4cb1445fc35eb9a19561d5,2017-08-29T01:34:59.547000 -CVE-2014-4395,0,0,c33fc8e91106e228144480d6bb94fc591e822cf3505594bab759a50ebadce46e,2017-08-29T01:34:59.593000 -CVE-2014-4396,0,0,d4ff84ef6694ba7a3e2ce7330fc4870e019a6bdc4b4806d5c85a29ce4b87d842,2017-08-29T01:34:59.657000 -CVE-2014-4397,0,0,3059491d2c4215670e510b01a1ea47e71b61d0a1dc7c7e3afaabe587db62f640,2017-08-29T01:34:59.703000 -CVE-2014-4398,0,0,0c2893c4c7c25ed1e341d10515e3c9bd81b0116ccc7b4c3e5d538b600ab4ec68,2017-08-29T01:34:59.750000 -CVE-2014-4399,0,0,f41d8b50678c463c0e3e5b7515467e6cf55e981a00b31b91977f991cb5bdc74b,2017-08-29T01:34:59.813000 -CVE-2014-4400,0,0,8749df843bc321782dacd5a0e3349647d190688e6cd38648cd05ccc5c2eb46b9,2017-08-29T01:34:59.857000 -CVE-2014-4401,0,0,b1a72009180363792f06c345d95a4550ed4d3f887d3915fb7c7a1c557b2890ff,2017-08-29T01:34:59.920000 -CVE-2014-4402,0,0,26c153dae12bd3eae1168add0197a9b7536c72a36aa3ca0d591e0d7cfe70f2c3,2017-08-29T01:34:59.967000 -CVE-2014-4403,0,0,81a723621a2393ebc3413e39d3b856bdd1a62e0f000afbc927f04c9402c8227b,2017-08-29T01:35:00.030000 -CVE-2014-4404,0,0,cfa98dad84153ca4618e57af6c2ca5bee673b813739b0db009fde531001a4e3f,2024-07-24T16:04:19.063000 -CVE-2014-4405,0,0,4e0077d387ea4c3c5c0a1af4ea5aa7264d84f79ac9b15094f9bd5bedd46502ef,2019-03-08T16:06:31.107000 -CVE-2014-4406,0,0,fda6545bb195e685689698c964152dbba9570b025e5323d20acb8bf5e2ab776b,2017-09-16T01:29:00.687000 -CVE-2014-4407,0,0,5bb98afdc2131f713022b611755e562f051db3f648db6975fef6c355e2876333,2019-03-08T16:06:31.107000 -CVE-2014-4408,0,0,bbe35d4bcb86703726d74a2ab7ece9bb2dc6dfb5eb3125dafd2f2f89acdad9a6,2019-03-08T16:06:31.107000 -CVE-2014-4409,0,0,724bfcbdaf80f67a8e593e5581f17c3f36d202badf5c695e7cc2bacc9f26acf5,2017-08-29T01:35:00.453000 -CVE-2014-4410,0,0,cae257ec02f3706a55d40dd54a516ed808af04cadc138c9cf960fe9356ba3cfb,2019-03-08T16:06:31.107000 -CVE-2014-4411,0,0,6c618408e6c71d5c2a40e456d00041e730153b8f06da60a0eac7e4364a19bd16,2019-03-08T16:06:31.107000 -CVE-2014-4412,0,0,375714a5ef6785a3f6456b90605d4badecaf1a9dbfde7a0f2cea857c7503e4fb,2019-03-08T16:06:31.107000 -CVE-2014-4413,0,0,94f8546c0b0564ef8f2ec686412b08b1dd04aad8606171ac45a217ec145d7ebf,2019-03-08T16:06:31.107000 -CVE-2014-4414,0,0,70c38a35c8d59e4d7d1545cff24345e05a882f2cecb16e92013ea9b6b30321f5,2019-03-08T16:06:31.107000 -CVE-2014-4415,0,0,6571c4d47c057a3c20f9ed1410b0623a8e93a51ad0750fd6436bb4580873d657,2019-03-08T16:06:31.107000 -CVE-2014-4416,0,0,edaca25e260b1623e0bbd9a2450b095624c673fe1a96c798df2e787cfb01c9ca,2017-08-29T01:35:01.187000 -CVE-2014-4417,0,0,f1fd0246612167b006d59498a3a6a5e434769ca2cdc28e3e2da528c988e3df48,2017-08-29T01:35:01.267000 -CVE-2014-4418,0,0,e62dddbd3cc68ab088eedef20cad83ded5d09858a5558cca7ddf1df0467a4110,2019-03-08T16:06:31.107000 -CVE-2014-4419,0,0,28b52e5095c216215bd7d3f426f79e50789d7bd1ed411c0e21a9262a5b062130,2019-03-08T16:06:31.107000 -CVE-2014-4420,0,0,70d5ae9822908b7798b79e38ac9032b5fb8bf34e4138fe96cfd3f793fc00d2d8,2019-03-08T16:06:31.107000 -CVE-2014-4421,0,0,f3751a05818341e8d7828589dfadd70d87ff0af6b089e487f0844a702edcdcd2,2019-03-08T16:06:31.107000 -CVE-2014-4422,0,0,f4ff77caafd6896cdf5f6f3b62d9554b0ea9b2683508e08364959e9f94653c9e,2019-03-08T16:06:31.107000 -CVE-2014-4423,0,0,5fd6ca6c9f79c7bc667eb1271d9207702fa99e1bf5cacb23cd62524d8da567c7,2017-08-29T01:35:01.657000 -CVE-2014-4424,0,0,2836859c116c8946cf9e2ed8fa89089000f6b1ddf58a389bddb8cce667b3ecb8,2017-08-29T01:35:01.703000 -CVE-2014-4425,0,0,d444b01cda3fe300f8082a9227f6d80d03a5484b89d4972de08d325e73b39bf0,2017-08-29T01:35:01.750000 -CVE-2014-4426,0,0,aa908b8ca5a4eccbb1d6c2fc9d67c82a3df63d8df9df4b34e53859c2ed437a46,2017-08-29T01:35:02.047000 -CVE-2014-4427,0,0,47e383aa99cef3c5d076071e42fdf0dccdfec1fd58df01789e8f5023369ab708,2017-08-29T01:35:02.157000 -CVE-2014-4428,0,0,f9edfd0628536fa77cc2caf5f2e5a54b5cd55ce4723595519b8d76d1444e9dab,2017-08-29T01:35:02.217000 +CVE-2014-4393,0,1,c0f1063f91df515caeb7e382267af845a8d8915c03183b1b82c8762908e95e62,2024-11-21T02:10:06.223000 +CVE-2014-4394,0,1,2bf30ecefab24fb83502049bad4f872e1aea309653bf54468e014bdde44360e5,2024-11-21T02:10:06.330000 +CVE-2014-4395,0,1,0275776763c0a7a5c681e034e2a6cb2a2eebf39972b35ff52d73d85f75f73ac9,2024-11-21T02:10:06.440000 +CVE-2014-4396,0,1,c2084b1140375bbeb0135354e939a7d0d8f32a6ee9480db6778c71ed6f22afa8,2024-11-21T02:10:06.543000 +CVE-2014-4397,0,1,a080ade668eb4d85c07a88c89eb4e5ff733eb76ce4a5eb5487e7aa34daa13eb6,2024-11-21T02:10:06.650000 +CVE-2014-4398,0,1,b2c600a9a9ff801346d07e8b764377df616a27781cc77e767891786938820ec1,2024-11-21T02:10:06.753000 +CVE-2014-4399,0,1,d623b2267a2360f2f90137d0b382d63b28d4311e45422a3f932ce367943c88bd,2024-11-21T02:10:06.860000 +CVE-2014-4400,0,1,3ca203692692bcc9a668cbe499eabc641615ac896d39b0c1246a4dd09f66c702,2024-11-21T02:10:06.967000 +CVE-2014-4401,0,1,f0d4d093ca4fb3c13efc1e1a9e9ee05f85b9cddb3612b36eea00fa03f990f2a9,2024-11-21T02:10:07.080000 +CVE-2014-4402,0,1,bc93052bf8e7588eae6a19fc508de685b1a73c02106ce668ba7b19d8439e8a06,2024-11-21T02:10:07.190000 +CVE-2014-4403,0,1,7c3e6987ad110e7e2b7f687fea4e3a09c39ddaeca8286781a365badd5a392f37,2024-11-21T02:10:07.297000 +CVE-2014-4404,0,1,8480577eefc07f963bebb3596d28c2bd14a0ec024d518ac31e42ed45239a8f88,2024-11-21T02:10:07.407000 +CVE-2014-4405,0,1,8d8e0c296911c5e1a15a138a3848c6b6eeafbab906edd498111105ae2fcd1f9b,2024-11-21T02:10:07.550000 +CVE-2014-4406,0,1,05795f67e8577bea4afba6e5a5735c45872ba422a283b3b0a41c2c59ccb7f68b,2024-11-21T02:10:07.680000 +CVE-2014-4407,0,1,dc82a7f731b168f0bac2aa4c9bf56f1f898207290bf313e56d192b426a8e87c4,2024-11-21T02:10:07.797000 +CVE-2014-4408,0,1,8a9bfa31286a8e8a427283bd48e0e69a83a28675984f626ab3af069d4461e72c,2024-11-21T02:10:07.940000 +CVE-2014-4409,0,1,462100491d46992304ceb7e09e7327b278866fdc35f7a67a8e73f31b3044e4c3,2024-11-21T02:10:08.067000 +CVE-2014-4410,0,1,786dd1ff3be28d461c2c7e46f9c09115d6410fc605e7b87fafc21d33bc6b4fe0,2024-11-21T02:10:08.183000 +CVE-2014-4411,0,1,cfa5a774c338f2c96c99d6756cdd9c150be1d89f6d5a3558a524cd3c810c51a0,2024-11-21T02:10:08.340000 +CVE-2014-4412,0,1,bc3bd93abdbdb0d91e9847b901b9f58b781ec5d7fb718064b0238576e3fe6a77,2024-11-21T02:10:08.490000 +CVE-2014-4413,0,1,a977cba69ef5174d5476472c7d30c7629968a0a9f69d27f9f4e029aaee485e0b,2024-11-21T02:10:08.623000 +CVE-2014-4414,0,1,31ac2085d413570c2f1920237ad6c33b62194454772f54f20095739fa266e220,2024-11-21T02:10:08.753000 +CVE-2014-4415,0,1,c59784d5256482bba5b01b4a9b032814d3718719093e464d2358767602f2a897,2024-11-21T02:10:08.893000 +CVE-2014-4416,0,1,f1e2fa5460da301d023451050eb2e4f230ab5c7c297ceecc1c0f4191ef692476,2024-11-21T02:10:09.020000 +CVE-2014-4417,0,1,697921c230d3434a26db23a17ca072ae78e60070f6358cddb5d6d077b8ddf04b,2024-11-21T02:10:09.130000 +CVE-2014-4418,0,1,eeeb78b0ff75a781af60672d4571bd138b998875c3cb557ca96271008774948c,2024-11-21T02:10:09.237000 +CVE-2014-4419,0,1,e03701706b4bac8742d506e919e194647e10423a5a78d25623373e9a2f169868,2024-11-21T02:10:09.373000 +CVE-2014-4420,0,1,daacd987f5c75b4d135d554752c87a87000902124e86d3b063419d3ff267dd2d,2024-11-21T02:10:09.510000 +CVE-2014-4421,0,1,a794b8bc0bcdc160c0c0789e827641963372a2f68ab15c6e0fa6d492f4df8224,2024-11-21T02:10:09.630000 +CVE-2014-4422,0,1,fea7f8ea641f0dd131ed2278788a0428188933816e69ef59ad151ebd9f3015f2,2024-11-21T02:10:09.763000 +CVE-2014-4423,0,1,212392b1ad75edc2c5815bf9689220f4e7eec1eeba21bd00bd37eb536e9cb391,2024-11-21T02:10:09.887000 +CVE-2014-4424,0,1,1ac6b3bd4f4ec88db5932e77ffb2ef3cf4d44275f95162b9442efd6e29b33d07,2024-11-21T02:10:10 +CVE-2014-4425,0,1,38b050d24c17d672d4027be8727f1c662ea4e1e3e93248e6de2ca279fbeb4669,2024-11-21T02:10:10.113000 +CVE-2014-4426,0,1,02ab525707336e97ebe57b932dc304b634732af0d29f9de6a434d22ee5e828ad,2024-11-21T02:10:10.220000 +CVE-2014-4427,0,1,0e791af4f0d6aaf7007a38d81eb647117859b3bff0bc436d547c685d827bc70d,2024-11-21T02:10:10.333000 +CVE-2014-4428,0,1,dc1d881ce7938cad740676f06e102da94dd75679843bd57f28260c70c4d6987e,2024-11-21T02:10:10.440000 CVE-2014-4429,0,0,121f337354175accc736b4dd94a409a22cc23fe80c66b2ad835b6ef7f8d2f95d,2023-11-07T02:20:32.450000 -CVE-2014-4430,0,0,0dc48e8b94b1b4db537412b7925ca64855caa43dd666f84f003f3b3b42cbe247,2017-08-29T01:35:02.267000 -CVE-2014-4431,0,0,08c4008156f585740848f1592072dcae91a22577c1a57c76d5069769055ec630,2017-08-29T01:35:02.313000 -CVE-2014-4432,0,0,a8dcb482e9dafee49d673337d07989f90906baf8c4f9aac8ca3cceedd461c1dc,2017-08-29T01:35:02.373000 -CVE-2014-4433,0,0,10cd9fb8a60e7ba47a7b9ad16efbcd9c61bbb21c6969f8b317d34b15064c6e8f,2017-08-29T01:35:02.420000 -CVE-2014-4434,0,0,e194f673aac018728b7e6450983700a183bc9cdfc2c8593958b8b8a4161d32ab,2017-08-29T01:35:02.483000 -CVE-2014-4435,0,0,93f855773805fcda0015541e594ac0d927c2b8e582eefd3977249b8c4d5fd2db,2017-08-29T01:35:02.530000 -CVE-2014-4436,0,0,61429b5386c3660eaca9915c3ba701c5b83ebbf8f11d2f746837769b7e00dfd2,2017-08-29T01:35:02.593000 -CVE-2014-4437,0,0,d0319bbb2c0f89520f97ed66e40cc3f8f2e3ef81ac06d1f0ec485b30edcbc60e,2017-08-29T01:35:02.657000 -CVE-2014-4438,0,0,857c7a287a7e591d9db49b2093d9c85ddc88eff01dbf334feb52897949db5036,2017-08-29T01:35:02.703000 -CVE-2014-4439,0,0,c20efd1f2b1cfee8c885077a6b7c9d06b7faf6c4b46f05320f2941e8d7a5e3ae,2017-08-29T01:35:02.767000 -CVE-2014-4440,0,0,b02cdf392a6f5d63ddeabd0766d37f13dc96113027bffd6bb8bbbc277ea625d9,2017-08-29T01:35:02.860000 -CVE-2014-4441,0,0,4fa9cb14f5a3f700f53e712b60d555ca23c05b45b41d5d594ac5d29838923b79,2017-08-29T01:35:02.907000 -CVE-2014-4442,0,0,cb6ed3c2548304cf5644c93733cf52278a3f347560be58e474487c3144f15ffc,2017-08-29T01:35:02.967000 -CVE-2014-4443,0,0,c5b72e93f9feeb5e01a9d7f0cc9afe364f892b33fa788058d81c719286c38204,2017-08-29T01:35:03.017000 -CVE-2014-4444,0,0,3c61f0c49f822e86bd16f2011471784472c5879e7cd629226cec82b2e0daf978,2017-08-29T01:35:03.077000 +CVE-2014-4430,0,1,aed40b4a4f4606b41578cd403902afb9e7e95590c433f4a1a582de956928668f,2024-11-21T02:10:10.580000 +CVE-2014-4431,0,1,267c57c9f39f8f3111c69e31f9b755bd2ff68f7d871115b659d70e56099e8632,2024-11-21T02:10:10.687000 +CVE-2014-4432,0,1,01e19b09d43e18c28da4538fe60760b22c9077da7e07cfa35c19c2c5744b541d,2024-11-21T02:10:10.797000 +CVE-2014-4433,0,1,af52afc6b2a23d953c9516086ce59d36bd0e276e4314e3c13b837d2f6ceb9abb,2024-11-21T02:10:10.903000 +CVE-2014-4434,0,1,7a6ccdefa5f6ae5966a9aec28d79a1428116fa76d18bf36bd9b1de053681739e,2024-11-21T02:10:11.013000 +CVE-2014-4435,0,1,c7baba97bbad64cd93d23a30291fa8d77669f6c7e354a71690099c27364a9c37,2024-11-21T02:10:11.120000 +CVE-2014-4436,0,1,7af940b5242f5ad58d491087e378876147b6a967b8632b58f7a15ee183b135d4,2024-11-21T02:10:11.230000 +CVE-2014-4437,0,1,25086e4200a401313f989c64814ade75540164d0ffa9790695e2cdf42dc25b24,2024-11-21T02:10:11.347000 +CVE-2014-4438,0,1,22cb42bf518eee0c91c8285aca57fcd508d14f7c24b13d1ec5021797483f55ee,2024-11-21T02:10:11.450000 +CVE-2014-4439,0,1,cc5a7fd0ae0f7c338c4f77ae083c4ac5e98b33a5fa9b1dd69e09067b18a9d9c2,2024-11-21T02:10:11.550000 +CVE-2014-4440,0,1,48f2f04297c2cf0a33140ed3194d808cbd74b814100ed9b1a32e34b13faf3be8,2024-11-21T02:10:11.657000 +CVE-2014-4441,0,1,5ff0c68fc877b696958cec5f7f3011848789602678c6c4275126d58e26a1d0b1,2024-11-21T02:10:11.770000 +CVE-2014-4442,0,1,26cd4b573075892595ba12873e0e784e986c493ebbce507d018b74723463b816,2024-11-21T02:10:11.880000 +CVE-2014-4443,0,1,cec2bc8aa062d76792acfa44b109f0b8d25ea06d66b052bc5381b74724926c4d,2024-11-21T02:10:11.990000 +CVE-2014-4444,0,1,b516ae435f045da07c6d67c2f782d5687e74eaa5183f1ec563bc9aaa8804aff0,2024-11-21T02:10:12.100000 CVE-2014-4445,0,0,d6a73c2f9c7342497f9449b6cdae9dbc6e70fbd0cdc6009c456c6d5d1ff71bcd,2023-11-07T02:20:32.830000 -CVE-2014-4446,0,0,e03084d7029acc4dbef6401a8556baa9a4aa45c769ed123d9e9df4642e496231,2017-08-29T01:35:03.123000 -CVE-2014-4447,0,0,c97369d7eacb9dbf7b7710f3da22217d9415ba00b84137f43d7c9587cf720000,2017-08-29T01:35:03.170000 -CVE-2014-4448,0,0,34208ff6908815a49fa969ccc1ca88151c9e825919f5ad790c180fcfc37b5ceb,2017-08-29T01:35:03.233000 -CVE-2014-4449,0,0,402e537bb663cf98215caa99b4b4c246e67ecf8c1ed95cfa4e68c1c877c5a051,2017-08-29T01:35:03.297000 -CVE-2014-4450,0,0,2b4e7a7c91c3e1fb515a90dd8577458868915e76a036ab4af82cd2bb83a12dc9,2017-08-29T01:35:03.360000 -CVE-2014-4451,0,0,0223a536b3cc5885fdf779f9cf1cdd6d927ff96069ea6afebb8efc9181633911,2017-08-29T01:35:03.420000 -CVE-2014-4452,0,0,2fb22a88e3e286ef218785b655d3b7e78371fabd4b674db10281a363cdcfa775,2019-07-16T12:22:18.297000 -CVE-2014-4453,0,0,1e87a5957dc35458650f59fb35180a4f5fb5663b1af22e835ae216f19be37119,2017-08-29T01:35:03.577000 +CVE-2014-4446,0,1,024db79189038dac74aaa9af144a468e396302baf4f9a4d06811a31186045616,2024-11-21T02:10:12.967000 +CVE-2014-4447,0,1,b67cc8618e8bad318ef9e32557a14b0d49871ca545de1c4eb7e5abc311999a89,2024-11-21T02:10:13.070000 +CVE-2014-4448,0,1,2eed9f334115c9b850f3a15370c828605904d3e4e74384b954444c6a2ca9f113,2024-11-21T02:10:13.170000 +CVE-2014-4449,0,1,8de73947ed2f152f45ff0ac900e3eac73036986b7cc851f629f32269de82cccc,2024-11-21T02:10:13.270000 +CVE-2014-4450,0,1,241eb32b6e8a99ad9536abdbfcef6177f77adb3c77f1c25dac388af62d7ebacd,2024-11-21T02:10:13.400000 +CVE-2014-4451,0,1,4c14dc0ff7b75f11e35e85ace84db29c7458608e549256d46e7fa7121c33860b,2024-11-21T02:10:13.520000 +CVE-2014-4452,0,1,579e02b7b3c442170dc5e94ec02a915a0c095c2fe7214b5da0b7d2db5609ba54,2024-11-21T02:10:13.650000 +CVE-2014-4453,0,1,72ee343919192099a64488e6e056fc90850c100405d9369b67f4a313aa9c58e9,2024-11-21T02:10:13.783000 CVE-2014-4454,0,0,ffe3239582d2d62d3012f715e265e7d770f782aee63a339c7c9278be1f18ef44,2023-11-07T02:20:33.127000 -CVE-2014-4455,0,0,878afe3389a2d58a9ee826ae1cdffc89df436d575ab7d536afb4f02c2435b268,2019-03-08T16:06:31.747000 +CVE-2014-4455,0,1,92961db07e3b1db1654cd05bb4c005b94e75d0478bbe5efb690ff9a4d0aa7597,2024-11-21T02:10:13.930000 CVE-2014-4456,0,0,e07b5c1eda5f9ef03a212585819282b15d8549ec516b0b7893b9aee3cb974520,2023-11-07T02:20:33.350000 -CVE-2014-4457,0,0,966b50c8f4b81fe77a7a235515642e1bf954a0c53a3a34ab4167614f74bce033,2017-08-29T01:35:03.703000 -CVE-2014-4458,0,0,90ab045f12f58e2c2e418c7f1d9963394ccc27a40dcc39bbd3a8f2d67ba092be,2017-08-29T01:35:03.767000 -CVE-2014-4459,0,0,fe76ee634370264a2e6c2476f9ae3bf7d77a8bebc9ad3ef3127f52e63ff19662,2019-07-16T12:22:39.063000 -CVE-2014-4460,0,0,1b0e547e5273dbb1bdbd6759b622133fcf100d2d048aa630c4c6599298f3dc44,2017-08-29T01:35:03.967000 -CVE-2014-4461,0,0,e022ab575df69f9cbd245178344d1e39908349a8a7b9ceba8cfccec847cae091,2019-03-08T16:06:31.810000 -CVE-2014-4462,0,0,d61dd9a5e95f9eaa526024c74b576c6b85fdfdb8c7f69be68e72d8272532f392,2019-03-08T16:06:31.810000 -CVE-2014-4463,0,0,da85133481236a4b74de165e829958f1e68b5ae269637862c3fd5bde774604ad,2017-08-29T01:35:04.187000 +CVE-2014-4457,0,1,8f5a8a1eed35fc0db9cf8195a2fdb48605a2c38db716a378e08974b2f7e749d6,2024-11-21T02:10:14.073000 +CVE-2014-4458,0,1,1eba12215b2a9c24fa891cb5f89c571077239adb8b341a6f68c7c74cb125ea8e,2024-11-21T02:10:14.180000 +CVE-2014-4459,0,1,5b0e3eb968048c080873781211a4b507ef485da91422f8ecd2a4a2c15146092b,2024-11-21T02:10:14.300000 +CVE-2014-4460,0,1,62d1418687dae11fadbff85c45327b189de010382a4ac432817b698b8ef30f0c,2024-11-21T02:10:14.440000 +CVE-2014-4461,0,1,0508ddd7bbbad745e6604f2cfbad8abf6df4aa3b6d260e1cc89efb29a8503824,2024-11-21T02:10:14.570000 +CVE-2014-4462,0,1,c24f3c9f7ddf4b61bc4d69b32fd97d66870083b024792643e475b926dbc698b8,2024-11-21T02:10:14.687000 +CVE-2014-4463,0,1,ef26f7d1b12cb1403e411b6ee1c1d3be498d0be566f37859df566b738bb0c517,2024-11-21T02:10:14.807000 CVE-2014-4464,0,0,5e869eec3cd544247c14bbab37433221d19348066e7f4c67fd0a04d5cd41f7a6,2023-11-07T02:20:33.697000 -CVE-2014-4465,0,0,29bfa665a20fd5d1b6f22e26655cf6d1c92ce39d6451a82b1c58804bbcf4de5b,2019-03-08T16:06:31.747000 -CVE-2014-4466,0,0,03de9a87e65618ac53c360506ea341722a76c773e8ff7537b741e1cd1ee86688,2019-03-08T16:06:31.747000 -CVE-2014-4467,0,0,c28363c81c8a973c59b065093865140315787e260a1af2e6e82a3f8ba144d139,2015-02-02T15:05:55.407000 -CVE-2014-4468,0,0,d9f038c39b4cd675c9e0a83f2cc71ca77904c92db27a18b2c3e7e6532f882b6e,2019-03-08T16:06:31.747000 -CVE-2014-4469,0,0,9f8c3e9544b643facd6cc3ec35f3575a6ffae77327d25ca567bc7ac8c01cb9f7,2019-03-08T16:06:31.747000 -CVE-2014-4470,0,0,4eb4dcf7d4acb286749f5429e6c250e98cd67d3d11ca126924fc4152e75a9a97,2019-03-08T16:06:31.747000 -CVE-2014-4471,0,0,1b6e081cb8442eb1276553076e4bfc60ab4315d75dbee1b1c847ba8df0c11f0b,2019-03-08T16:06:31.747000 -CVE-2014-4472,0,0,36a6212e6de79b6040d16f01f991c941a3edfd885be8446acab54846ea4a7dab,2019-03-08T16:06:31.747000 -CVE-2014-4473,0,0,be2014b4e49503cee60e5c0ace2dafd3a238ce02ee1de2fe10633b0d5e9dc5a5,2019-03-08T16:06:31.747000 -CVE-2014-4474,0,0,21c6d2e54c9b269e8ad53b72a9985a70905c2f304a5c3f889bcc91dce77fb2f9,2019-03-08T16:06:31.747000 -CVE-2014-4475,0,0,acf25a4e48eaea66bc217d68b174770c7cfb45ddadb03cf50d61a075abe74887,2019-03-08T16:06:31.747000 -CVE-2014-4476,0,0,e21b1d9a848162c4cabe193aeac1638518aff25bc63ea5759291520a87a7b995,2019-03-08T16:06:31.747000 -CVE-2014-4477,0,0,17504392a9fb840292e0b378790d351dfccabb84a3873e8f59627cadff4d3743,2019-03-08T16:06:31.747000 +CVE-2014-4465,0,1,0246c3f30558bba36a16be7890b2c6cf0d0935d232b174d073879ef6c597bc09,2024-11-21T02:10:14.937000 +CVE-2014-4466,0,1,b04058f98eece167da962cdb768ef2462f28f0b779ec0719e8508a4f0420c7ff,2024-11-21T02:10:15.050000 +CVE-2014-4467,0,1,668d7ba62f00e4a99e14226428a9b4cbf1432516a05aaaacc30bc52ca33199f7,2024-11-21T02:10:15.177000 +CVE-2014-4468,0,1,e9721357b6c80c546ba23b62528f639dd9ce92da1581692c8affbee5e81a2f60,2024-11-21T02:10:15.287000 +CVE-2014-4469,0,1,9921429c1e47c2bcbf2b791498532d0f2d1a2a5d54028aba559e39cf67d41400,2024-11-21T02:10:15.413000 +CVE-2014-4470,0,1,0079e47edd17f0bc969e2f7c73a179f63075bb00c5c239bec51f06023d61dad4,2024-11-21T02:10:15.537000 +CVE-2014-4471,0,1,155ef10bf06b1d9b60641d72d1b0da2a306e3cc232fe494569ce7e1a5df87561,2024-11-21T02:10:15.650000 +CVE-2014-4472,0,1,d285731b875780462d550cdefaeeda737fb48d20e8ff6d3e36e2228d199857b2,2024-11-21T02:10:15.770000 +CVE-2014-4473,0,1,8f5994fb4fabaddd41e11225c76073daef7446ee87ed559ae5b0d09fd1def716,2024-11-21T02:10:15.900000 +CVE-2014-4474,0,1,c706992c5a51cd8dccfb6b38e6bd6fa359f74123ee18a9b2d8c4a3c0d41e3e0b,2024-11-21T02:10:16.020000 +CVE-2014-4475,0,1,77bbb4b6033c2fd76612e4d0ab14faf47da350811b658ce575e738909859eff6,2024-11-21T02:10:16.157000 +CVE-2014-4476,0,1,7168056e7a6e3d675034cd1913cb5087da0e40dd2b0e62bda5c263d2618fda55,2024-11-21T02:10:16.290000 +CVE-2014-4477,0,1,f9f2d98c819c4650331c687ef9421b84bf52a5aa76c83da82226be6ff7f63f67,2024-11-21T02:10:16.420000 CVE-2014-4478,0,0,4b7cceef31a5ffb1b75e8c83a5839ece5599cf2919380f460577837ed438ec79,2023-11-07T02:20:34.130000 -CVE-2014-4479,0,0,1c5cbc560489b8ae8bd9753c6e9eb810974adc9235f07913ced2199c4f1a8669,2019-03-08T16:06:31.747000 -CVE-2014-4480,0,0,0fcc6951d21027c7af64c0833c81d2ffc5d4c34fa596c9097956b1d577521a6e,2019-03-08T16:06:31.747000 -CVE-2014-4481,0,0,e93a0f723248d3beb9726541dfc63e88a76de166bc937764835d6e4f3eb52b7e,2019-03-08T16:06:31.747000 +CVE-2014-4479,0,1,f439d1b41332b110b6b50c370a5f0f61281c9bb52546a8f6d14655012daf45b6,2024-11-21T02:10:16.567000 +CVE-2014-4480,0,1,e85ac1a3e21d9f84e23d63eeb7d75c0dc9868c2325b8970a15b977db3c8d7bb4,2024-11-21T02:10:16.707000 +CVE-2014-4481,0,1,b6e0fb4fecbee09e793ed6d9dec1497e05b125dbacd8e406edb4aa0f2c4581a5,2024-11-21T02:10:16.830000 CVE-2014-4482,0,0,e600325e9fe3cf99ffadd0ea9f03598ac43efd1c5e76923c49aff9675eba462c,2023-11-07T02:20:34.370000 -CVE-2014-4483,0,0,dc2e691bca2fe73920210769afbe07275eb811e2ce64a322e5acab8b748cd870,2019-03-08T16:06:31.747000 -CVE-2014-4484,0,0,4101596cfdf4fb67bd7173b2894a67df2e970cb91efaf71e960eb44c05c92de3,2019-03-08T16:06:31.747000 -CVE-2014-4485,0,0,290da12d3047a7f6f12fba441eb833f8fd128dc82385a4e1e9ac960dd7046588,2019-03-08T16:06:31.747000 -CVE-2014-4486,0,0,0f3c044aa2d46c3acce85f4f1404c3efd80d90fa3d316481d824925311ea6d46,2019-03-08T16:06:31.747000 -CVE-2014-4487,0,0,1cd5ed62b62cb321d12103dda6aa382f16a0974ef348e33e040519061fedf60e,2019-03-08T16:06:31.747000 -CVE-2014-4488,0,0,d2c204d06b48bb66d4dacd03c90ca15d0535e292cf5814574b3809911701db7b,2019-03-08T16:06:31.747000 -CVE-2014-4489,0,0,47eee93da32f9ed971a081706c47001faf6adc1be1bf7c8a1a26b12a1529b467,2019-03-08T16:06:31.747000 +CVE-2014-4483,0,1,3215c514f9958202433415516c583d24471f804b791e27420c09a650918448fd,2024-11-21T02:10:16.970000 +CVE-2014-4484,0,1,e93367e3b0eb421833277a4fd6af5498d00662a2748d1468e68cf877588cbb52,2024-11-21T02:10:17.097000 +CVE-2014-4485,0,1,f7bdf6b7f7d803c3c86b9b9c49340fc946c146ee84c00e2e9fc5f9302a95606a,2024-11-21T02:10:17.217000 +CVE-2014-4486,0,1,03913d30225aa5b73167bae00f95f07f21250e23fe42424d5203039b7d194900,2024-11-21T02:10:17.340000 +CVE-2014-4487,0,1,ca88677567104fd7d1a3ae0660e7572558656c32830326ea88d38c2b2ecc6526,2024-11-21T02:10:17.467000 +CVE-2014-4488,0,1,e9bf8eb4721c22b28e768f378387f6e3b9d2da1fd05b4da29301d1f8aa6a2820,2024-11-21T02:10:17.587000 +CVE-2014-4489,0,1,f6007f04f0048fab51d15a67d94e12f9aee368c198d496b4700c4088b961a8a9,2024-11-21T02:10:17.703000 CVE-2014-4490,0,0,b3e2aa2e526b7ddf9aea646b092d97cd43c09759149efaeef2ad0f20f6217c6f,2023-11-07T02:20:34.660000 -CVE-2014-4491,0,0,c3228ae7d8032d40bdcc6adacf992e0a47abfe035ea6792b199ddd19e4fe205f,2019-03-08T16:06:31.747000 -CVE-2014-4492,0,0,a5e4628af9ca5e6554f3ec3ed08cec7e152d031a79c32a0b830603c454090de1,2019-03-08T16:06:31.747000 -CVE-2014-4493,0,0,867772e310a5d5dea38692f7f2eb78b0b70b84d6440c9eb4376e39b946ce4893,2015-11-17T16:24:51.883000 -CVE-2014-4494,0,0,db9e007e2423b09c11aa1f6b90e32445632c085d3121b030f7e09e0f3f197d6c,2015-11-17T16:25:07.453000 -CVE-2014-4495,0,0,5617e3b3aa2f35b32f3f6663d9715670753a1def890332f94dff3abc9288727f,2019-03-08T16:06:31.747000 -CVE-2014-4496,0,0,932bbf1967a23f0362c8387550060209a4a7b2597feaf4f733b8fb04d5e1d836,2019-03-08T16:06:31.747000 -CVE-2014-4497,0,0,3af815a1e669a669c923b8f74db821ea3fbd930c2fc55f811573ea74573b9e87,2015-11-30T19:20:15.133000 -CVE-2014-4498,0,0,9d2d5c760d3b2a1d3f578de67e04615debf14ea57c42f39b72459684b9f48796,2015-10-09T20:47:05.907000 -CVE-2014-4499,0,0,fcee7de27a6d929a4d7b9879e9b9835e68b453789a7195e349a025ec2e7ab74c,2015-11-30T19:20:29.407000 -CVE-2014-4501,0,0,89a7e75efbbdfc0dbe5dedc3df065999594467118eb7a3d48eda1aeb9cbee1f6,2014-07-23T18:07:16.457000 -CVE-2014-4502,0,0,1a982fc41d947958be2422a4550bebb4f15b4c4e1a35a04f931a0b0194e28ac5,2015-08-28T16:21:40.887000 -CVE-2014-4503,0,0,5a2d8b77e2da134c74f596d9cb0901441fe606a2b549fd5e83a6583c28bf7d9e,2014-07-23T18:25:30.867000 -CVE-2014-4505,0,0,0979ad2fbd9cec6694b13023a434a9bf4a7fc7fe8eda799a72958ceaa9dc7d33,2014-07-17T05:07:35.073000 -CVE-2014-4506,0,0,60c1abc83a09b375cf4875d1e41d5b40691de4f83bb18d9a21148f49d8af945f,2016-05-18T18:37:58.433000 -CVE-2014-4507,0,0,a8c57fd646e396a1cd170add996427aec557d33707e86ed2a5730d5219471bb0,2014-06-23T15:05:57.227000 -CVE-2014-4508,0,0,2a9cd08993b30d757992762bff6accf8f8c5eb25c1fee07c68ffc191bfc5c16f,2020-11-12T22:15:10.657000 -CVE-2014-4509,0,0,7455a98379af94beff9839317fb3a39e5777a98eb0dbdd61ec3a52c0d4eef25e,2018-09-27T21:30:05.490000 -CVE-2014-4510,0,0,ea9be85e7b3c3e37d48b0ae40674cf1a914d44fed28227192d845d86dd28bca6,2014-10-08T01:37:52.907000 -CVE-2014-4511,0,0,77564c509d4b88e49069c0036db3fc84a464b77a28bafb3233396cd2ecf7fff6,2023-11-07T02:20:35.017000 -CVE-2014-4513,0,0,6f66851f8d3e0fa66abdafb340ea5202dc26ddb705775e428a110e6f8748567c,2014-07-01T18:34:48.643000 -CVE-2014-4514,0,0,bfff0770986270d4cfb73067f46fbd38b51c688e3346d6a0556816c05eb67b61,2015-01-24T01:36:50.543000 -CVE-2014-4515,0,0,bbd99be4fd574480371b9245f0d42f5c5c16a45f3e999a2aa2a81c09d019b527,2015-08-28T16:21:59.217000 -CVE-2014-4516,0,0,3f8595a8ddd45d315bbaaf914f1bd0c44321ebc10657f632d6eba3e397e7d911,2014-07-02T13:24:27.710000 -CVE-2014-4517,0,0,a079b8b852268fb5564deaf0f8e2f944f9d308f98c80065991282b9fa4b1e791,2015-01-07T13:55:28.930000 -CVE-2014-4518,0,0,3138c59169f813d89dd5659d94dee79ae96d7fbd66d3eb129cfa3a2b30bee29c,2014-07-02T13:32:25.513000 +CVE-2014-4491,0,1,d82ceab0c354ac148165ffe2419cdc7245302ee0a7d775746656acf45d980cbf,2024-11-21T02:10:17.840000 +CVE-2014-4492,0,1,e90883fa8ece3d8d9659a3788f9b7665b27f1090e9fd1e75065154eed9081f4a,2024-11-21T02:10:17.953000 +CVE-2014-4493,0,1,610dd918bf39d9d657628df279847f79ee5034efbeba9e372fb281166522ea58,2024-11-21T02:10:18.080000 +CVE-2014-4494,0,1,791a0bc5719ed6b3f9359a63539e6760482e174643845747e187c36affeddc6d,2024-11-21T02:10:18.190000 +CVE-2014-4495,0,1,2e8ecef0e292a52fb8925766c1696028be7dd9cf3ffbaa3c5387528e455e413e,2024-11-21T02:10:18.300000 +CVE-2014-4496,0,1,d25a374be440076a0568850572fc292a227f593259eb7f6296c90566f1377571,2024-11-21T02:10:18.447000 +CVE-2014-4497,0,1,1db56e01d805fd2719a855a576066f09e5d015ecc1198cf5bdaea36f61c34c99,2024-11-21T02:10:18.563000 +CVE-2014-4498,0,1,bfb53db1a16115a1363be409d27cfea55c3a663e42572ad659f2f52be4603240,2024-11-21T02:10:18.683000 +CVE-2014-4499,0,1,b52463b24b4da468a53e268eb1a8f5275ce421d59fb8906ec5a53d844270d08d,2024-11-21T02:10:18.813000 +CVE-2014-4501,0,1,cf8142fa88d0d02516b987728f9305650307c3766187c7b8d0f678d92cee971c,2024-11-21T02:10:18.923000 +CVE-2014-4502,0,1,a05747d6a41253cf4f4d93bf4dce086b501da299d224c5a8571701159c7eb928,2024-11-21T02:10:19.077000 +CVE-2014-4503,0,1,11b45c0ad05bf104eef4b124f077de5fd7037f4d4120af5d274f631803020dad,2024-11-21T02:10:19.230000 +CVE-2014-4505,0,1,e87bdef94f25464cb3c80f352a603dc559249d1007c86b78ea9bf5c521ce1fd4,2024-11-21T02:10:19.377000 +CVE-2014-4506,0,1,b4a9de72ca0538cff37b7e439bcc224be675cee56c67b4ad323d9c0802c69c39,2024-11-21T02:10:19.520000 +CVE-2014-4507,0,1,f3c37077a1d4cda52f78c83dd2ace0ad8421aefa16915c31c835dc67869e1933,2024-11-21T02:10:19.670000 +CVE-2014-4508,0,1,14906674d3483a71f6a801ef5024f7a33372eb95a79f056f3b5428c498bce57e,2024-11-21T02:10:19.807000 +CVE-2014-4509,0,1,289569807ea3d92691a0e2245e7d3ab5669a35ebc5f24b31d256d700526f8990,2024-11-21T02:10:19.977000 +CVE-2014-4510,0,1,65d3f542e701118dfa930a5a3d81ab1f3b812c02751633ad5b06b08b8be8da4d,2024-11-21T02:10:20.113000 +CVE-2014-4511,0,1,b781cad669e52f80061af6250e5acca45d5a866a1ed92011040220a1c69e7554,2024-11-21T02:10:20.227000 +CVE-2014-4513,0,1,71a008cc551893befdfd225913400121d06117a05b20c89fdc4dd8db413f734a,2024-11-21T02:10:20.380000 +CVE-2014-4514,0,1,6410eb679e69e1b7dbe001f76520a4174338a68b66cec6655d7f4c066220682f,2024-11-21T02:10:20.513000 +CVE-2014-4515,0,1,0cad7f4528370a720ac1b82e664ac0d75a2b204f214867e031a8db8029a34a34,2024-11-21T02:10:20.657000 +CVE-2014-4516,0,1,388b9770e79f9e2d57695983f5bf7d19c96382b831121cf3ed72385aedec8263,2024-11-21T02:10:20.803000 +CVE-2014-4517,0,1,b2613df180a12a8489f1d385cfd9f2e773b3c12210999418669d1cf9bc8857ec,2024-11-21T02:10:20.943000 +CVE-2014-4518,0,1,dc3d88d81e1354b1eaf0dd86ee23b11877f4de68a8af76653d65bb53946ea3dc,2024-11-21T02:10:21.120000 CVE-2014-4519,0,0,a80a4f8d3c90f910453879bec685f8248bb1b8b449b5767f1d61410152b05f65,2019-12-30T19:20:01.577000 -CVE-2014-4520,0,0,6ae42eb352da3b65dad5af71484163b37ed292dd78f41ef92679808dda1417d3,2015-08-28T16:22:17.027000 -CVE-2014-4521,0,0,dfe6c0bfd36b44310fd35f6e8f98b66ab1046a98aefec070e9d4108896f01497,2014-07-02T13:59:45.627000 -CVE-2014-4522,0,0,913e5247e080e7efce6a54a5300a4b3d3bf0adf37a321aae81149780721f17ce,2014-07-11T17:55:07.807000 +CVE-2014-4520,0,1,47d7b557919d7a040b5094075d224e12734ff242e3fd6e5ed206d44b01b603f2,2024-11-21T02:10:21.400000 +CVE-2014-4521,0,1,35b537ffc6c175d2d83e4cb2c7a3711a3aa643a6c73ebec9cb5c4888ecda159a,2024-11-21T02:10:21.537000 +CVE-2014-4522,0,1,b51dbfffc57036b49447f3b29e171ae52c21ceda3114b815afa81ce46bb5f82e,2024-11-21T02:10:21.680000 CVE-2014-4523,0,0,797348e9d97e79c3e97d326a52d92bc7e609da4a3dc9c4050a2b93a0d68f1688,2019-12-31T18:40:22.647000 -CVE-2014-4524,0,0,c7c8f211e3a966c383348bdbe61a5b6acf4da7ebbfbb94beb8c74451a93e0e5c,2014-07-11T17:55:29.043000 +CVE-2014-4524,0,1,e740b440d8b37ee8deb21f58f2da39ba34545db04b71f9dac3c95c56da686c9b,2024-11-21T02:10:21.960000 CVE-2014-4525,0,0,c97a3521d1b1193f43a6aae55248be142c9e6a0fbad9d0d9dae7cdf19d2f9fff,2019-12-31T18:37:19.387000 -CVE-2014-4526,0,0,e421812435046b663cac7711c0c2ae3682e4021799d278839c5d012a0abdc7cf,2014-07-11T17:54:15.083000 -CVE-2014-4527,0,0,7a02d309ab34f779b7beb8b0411a18e97779b789c1169bcf7ebb9c072451633b,2014-07-11T17:59:04.657000 -CVE-2014-4528,0,0,547840e5e7a017c454f7435ad721bebabb66832cf8d2642e62e926d485c2b3b6,2014-07-02T14:59:55.950000 -CVE-2014-4529,0,0,d955d7fdffa88afa5a0b6d331efb784c0998a1d3f487eb06124807a248f1d9f1,2014-07-11T17:53:42.690000 +CVE-2014-4526,0,1,2cf79b8308216735871d4b4ddb80796940410679a0a851d88f8916fb3a11819e,2024-11-21T02:10:22.247000 +CVE-2014-4527,0,1,35b364973e7f00b223fc89ada99721b9c44838301f593e8dbb6de9a7f3f4bcc8,2024-11-21T02:10:22.390000 +CVE-2014-4528,0,1,e9296e0f797024e61c2427afc29e6e40b92cfb03761c178f814a9bb793cab89b,2024-11-21T02:10:22.527000 +CVE-2014-4529,0,1,9d232ed9a2c85f5ccac5a7513742ea08aca89d8aa71bc23f528792b1cfb89692,2024-11-21T02:10:22.663000 CVE-2014-4530,0,0,f140a91cbefc2c5ddebd9d0789edf6d4429e84b3a8ed2bf0dc1cd75996622c49,2020-01-13T18:29:44.350000 -CVE-2014-4531,0,0,a59dbe7be4dc8a0eb8f0eb03158020904e1afae2797898ea97ee857d36ad3bf8,2014-07-11T17:57:42.150000 -CVE-2014-4532,0,0,7aca1125fbb902a0b090d73cc458ae08c23902e3cf600a3bb83f7f7bb21e5b36,2014-07-11T17:58:40.327000 -CVE-2014-4533,0,0,84dac94a988d2199b8fd27ef960e049eb002ac99085f3c96c74658950db0a9ce,2014-07-02T15:04:35.790000 -CVE-2014-4534,0,0,3900f26c20bc44abb1da03fa9b98fbd86bcf9349959dda0b4c707b606dfb7529,2014-07-09T18:39:57.353000 +CVE-2014-4531,0,1,609d35f387efc6882099e74a5b7328734a50f88968e9bec8384bf7332572e77e,2024-11-21T02:10:22.933000 +CVE-2014-4532,0,1,673fd730a32a922a7a0d0577b8d954a471f1edbec36f21e3fbf7b56645603941,2024-11-21T02:10:23.063000 +CVE-2014-4533,0,1,9807e5ae06d6d1f28447aebd9359095900572e159052a3bb11dae2ff0467d1a5,2024-11-21T02:10:23.203000 +CVE-2014-4534,0,1,dce540623e255f0b753bcacecb286f8ed1683bbba57bd91b7ef21eb4d3a0d0e2,2024-11-21T02:10:23.340000 CVE-2014-4535,0,0,0b01e4025529dd8c57482619ec9022ccdc932009f9f77e330c4f65b2e05019a8,2020-01-07T17:51:14.140000 CVE-2014-4536,0,0,82382302ca65a96638b940b0d7d3e766db3461f4cab8a45dfd257d98e57d92fd,2020-01-07T15:57:44.500000 -CVE-2014-4537,0,0,ecb596d423501b03d0d4f69d35df6eef14d5ca56979cb71c7072e360026d63b9,2014-07-11T17:37:13.643000 -CVE-2014-4538,0,0,61af325efa3387661d5964afb4c3555d8b10e8951174feb69d7c878b1758d2d5,2014-07-02T15:18:17.843000 +CVE-2014-4537,0,1,741e7a8b914d2a9193b7cfd11e2bcf7b9446b6cbb9123d5708c3e98048615030,2024-11-21T02:10:23.740000 +CVE-2014-4538,0,1,5eaf79ccc65a027c0a70383db15da8357fb5af891aed015767b1be153616c6ac,2024-11-21T02:10:23.880000 CVE-2014-4539,0,0,5c7adeea29e9b8a6137ff4d5d96b7a6360638c7a2a99b32c89bfb1d482ecc9ed,2020-01-08T19:36:50.937000 -CVE-2014-4540,0,0,33da02b21470e97f59380d0f3efc3e255f7d83c02a6eaeba062f578ed9236784,2014-07-11T17:35:52.327000 -CVE-2014-4541,0,0,0cfa1dc4b2cede267d3905dfb5db2d075993e9069695b4ce8579a7a5e1738eec,2014-07-11T17:35:34.513000 -CVE-2014-4542,0,0,7356625ee2d49e2b435f80b8ec85b430b22ee5ffc2a8da6f9349afccb6716663,2014-07-11T17:33:08.127000 -CVE-2014-4543,0,0,9e4f78574617b53bd379310561de492fb02965487d04c571ab2b211b1e52b0ba,2015-08-28T16:25:55.070000 +CVE-2014-4540,0,1,080eb1749f3a204c0495756992d0b57ac83e450dfe2018b22f140bf02b4c9ad9,2024-11-21T02:10:24.157000 +CVE-2014-4541,0,1,52e1aca3ff9a458cd0083bcf4acde9cf59a68eeba756240fe7e4b10ce366939c,2024-11-21T02:10:24.310000 +CVE-2014-4542,0,1,534098d9c74cd846baaedbed772cbc4dfebcd483bd908f94c21725f4e642bac7,2024-11-21T02:10:24.443000 +CVE-2014-4543,0,1,b0dfc981295865a20fb25d071ae53c12f6cec37ae8cff053274ac5425a47acf7,2024-11-21T02:10:24.570000 CVE-2014-4544,0,0,e8c6e8178fbc595d41ef5df7c3038a1390ec45e85b0b3eaf34fbea6c838e1f4a,2020-01-08T19:50:53.223000 -CVE-2014-4545,0,0,af6644a9328b674c369dbf14900b632c52b514c092cb94fe072c3fff3966c000,2015-08-28T16:26:09.210000 -CVE-2014-4546,0,0,0a82129cbe66a01389cb130b533bd62d675d4f6ef955d90e79b5fef7cbf68f12,2014-07-09T18:42:00.453000 -CVE-2014-4547,0,0,258b199ac7a4a9b3bb5eca99b0911677c149f18b24b799df73cf8e1c1a7dc0c2,2014-07-11T17:31:09.463000 +CVE-2014-4545,0,1,aa878f789b643a02fcf4cc6c3e0db8c9b3e83776625b8135771c4c1956a15ada,2024-11-21T02:10:24.860000 +CVE-2014-4546,0,1,4efdf3d762e43add3f89ee37cdc50c76f1aafd96594c9026000e3a7759e90ecf,2024-11-21T02:10:24.993000 +CVE-2014-4547,0,1,1d2e073d8d986b5e61d3728cd2d74fbb40146b0c710b9192c4ffb288f18ff135,2024-11-21T02:10:25.127000 CVE-2014-4548,0,0,0ccd9872666a794bf1426064411adb366ebe25cbfe7d468d5b657a420ca94ce3,2020-01-08T19:33:34.520000 -CVE-2014-4549,0,0,4353739ae285a10bf182e3cd44b54780bd7563153e6dc5099441356f2edf98ff,2015-08-28T16:26:23.333000 +CVE-2014-4549,0,1,e3b73067d87bf67a45a7337b86f580223f6b647ee74838f6bb4d4d9f241f9b21,2024-11-21T02:10:25.400000 CVE-2014-4550,0,0,175048487b1d97db859c79e2a215566a39ec2027831af064da36fc3102ad5939,2019-12-30T16:25:22.897000 -CVE-2014-4551,0,0,5d55ef5f15bb51cb568c691b47f3b2d380c8e605c86eede2b871a56c742a3d32,2014-07-10T15:39:28.753000 -CVE-2014-4552,0,0,4f9d5fe98304bdc02f4002a8f26df8d81e09aad44ca5af42d5312e3b15de8948,2014-07-10T15:39:09 +CVE-2014-4551,0,1,ead1a532142b52491afcdd7fbe3a2f1cd308594abc2088a04ab7e218785cc6ca,2024-11-21T02:10:25.670000 +CVE-2014-4552,0,1,dbc934d61834720a83170a6323d17b4eec75f3978690e6403a281cab1757eb11,2024-11-21T02:10:25.797000 CVE-2014-4553,0,0,9feeda31217ffdadba21e437b134a393d5ad9eb77d2eb7de30dd15b37914cbe5,2020-01-09T21:23:11.520000 -CVE-2014-4554,0,0,1d754b601af8821efb1eb262b8011cb837498a5b8d32fcead31022f5751a8fc2,2015-08-28T16:26:39.943000 -CVE-2014-4555,0,0,1dd954384e4f29a455994c39c5ff7d9b4281bb9cc50e7d37ef0cd41a256f3bd8,2014-07-09T18:42:52.300000 -CVE-2014-4556,0,0,ddbaca541326860fbe01d3af1b3972ee36c5d97bc8f246f427f9aa0bc239b9b9,2014-07-02T16:20:04.323000 -CVE-2014-4557,0,0,06a00520e9b01c9bde03ec9c9cba3964e305e4b97dfae61deb24f158fe26cec7,2014-07-10T14:52:20.933000 +CVE-2014-4554,0,1,48f07e48c95690cd789081099289e4c7032a1161c1e60c5b2c8797b82b9e1148,2024-11-21T02:10:26.060000 +CVE-2014-4555,0,1,4bde4b15db6687e91fc224711e36e54111aae0149d78a13d7686c65f5f1fe567,2024-11-21T02:10:26.200000 +CVE-2014-4556,0,1,48bcc3748f10fc057e5cfeae04a321b7fb5e645da24f361febbd8d477b2e9863,2024-11-21T02:10:26.340000 +CVE-2014-4557,0,1,c76c0bc81e07ad4e95703e23e41f9455e920a580f5913f695a5aff01c62102c3,2024-11-21T02:10:26.470000 CVE-2014-4558,0,0,1bb642e0c2cf35b953b72b9fcb896ed1c26d1a824531905305a767c6a2dcf596,2020-01-07T21:26:53.247000 CVE-2014-4559,0,0,f3530b1a857758d2e1d6e017d65161f23aaa2d2751ae2dc739ae58fdd277771e,2020-01-06T19:40:33.053000 -CVE-2014-4560,0,0,a206fa70973364a23d61df090fcbd84bdb4bd693e4e1341f648dcf4659cd61b2,2014-07-10T14:51:26.993000 +CVE-2014-4560,0,1,1ee5a33947a3f15fed58a1c9284e86353409093a075b9cdd545a502cb2c9019b,2024-11-21T02:10:26.883000 CVE-2014-4561,0,0,6fbd738daaa1db1d487c13e0d97f8891ee740abd35821485a3fbf8f8031c49b5,2020-01-13T20:25:56.060000 CVE-2014-456132,0,0,e30ffe369b9e3da64210a3d0621ec5bebf701782a9ceefd6f2e6a87659e26f7a,2023-11-07T02:20:21.790000 -CVE-2014-4563,0,0,4c25950be655d563e0cd54b7fc5cbf58d4f6b252813f52bbc52fcb82a8e91f80,2014-07-09T01:45:40.870000 -CVE-2014-4564,0,0,a4d497fa8fac407b4315092e4deffe5b1ffbc67e5baddadff9a81e27c56fabaf,2014-07-02T16:23:25.503000 -CVE-2014-4565,0,0,fc39b0c77b5a315a48036e887ad5ad16802da29416ac07f3abcd752e627dbdb2,2014-07-09T16:04:57.567000 -CVE-2014-4566,0,0,5352ae86b092548e25700782597e2ce6dd3b382c693b7303cb20701bd3d32191,2014-07-10T14:50:38.490000 +CVE-2014-4563,0,1,45dba7402a37320dfad763ae2d18be1157f65bdf84dfb0e2a9944ee3c0ee8c60,2024-11-21T02:10:27.157000 +CVE-2014-4564,0,1,e99489d2a91b73e98bfbf80349ee213f069c1a7e6a6447a5fd6d1da81d2656e2,2024-11-21T02:10:27.293000 +CVE-2014-4565,0,1,3ea6e0573d7a789b5ff2f2c5e3a49ab1a27d537b8225bf276fe8acc4b8699e17,2024-11-21T02:10:27.427000 +CVE-2014-4566,0,1,d87b3f7611f8e156b171ebf3737701344161874925cab6c124fb97a3d512129c,2024-11-21T02:10:27.563000 CVE-2014-4567,0,0,9d61f5b907c336a0a47be336bea7c8192a2eb57102afb1d6f1f100fe5d5887f5,2020-01-07T20:00:35.323000 -CVE-2014-4568,0,0,b7643b744be85f346931f33da898238d4fd49912952cb28daad1994d49e8f6aa,2014-07-10T14:50:18.207000 -CVE-2014-4569,0,0,2d1c2842361a2aca7cb25a060bab72d69717faf169804b9293d9a49423ca03db,2015-08-28T16:26:54.770000 -CVE-2014-4570,0,0,1c58d2ecbadde765e67b120ea7ef6d9e1837fee08896dbe94725327e77dc5ecc,2015-08-28T16:34:17.277000 -CVE-2014-4571,0,0,41d562f1d8b4fed880b058504f697c45e43cbf42480b29dca3e3e462a10e2c31,2015-08-28T16:34:31.837000 -CVE-2014-4572,0,0,0149a3487adf2dea15c8c42b8949a826d50b03cded403c17d450a12815a4df5e,2014-07-10T15:12:01.677000 -CVE-2014-4573,0,0,a9b87f4a1fdbbbf7972893f2610baefe864f07fb15b398d163f16c15cba26664,2014-07-10T15:08:32.070000 -CVE-2014-4574,0,0,0237e9472acc788b769c9d93daed26887b15e1e67dbceccb5911adb0786c944f,2014-07-11T17:53:19.687000 -CVE-2014-4575,0,0,d69152563dabee86a09f7c9cd08ad88a67d55ada4dda8b822e603a9f6607eec2,2014-07-02T16:54:50.740000 -CVE-2014-4576,0,0,d368164009f0d32e2159fb59327cae7098a2afce45b3ff3df26e755e05e39e41,2014-07-11T17:37:50.693000 -CVE-2014-4577,0,0,51de07365bff41e72f0737090e154b76407d6987ed26c3a7af0cf7e38a80e4e0,2014-11-06T12:38:34.357000 -CVE-2014-4578,0,0,886c8d9625d8ecfe449e1ff1252e2fbd11fc9c66104d7f516c6c5c0d3dccd9f4,2014-07-09T19:00:12.467000 -CVE-2014-4579,0,0,18f71d45aa281dd74e1dac17fb2c7a942fcc855feb019be1a8ca37c1d65244f2,2014-07-10T18:42:44.617000 -CVE-2014-4580,0,0,f0318ce957a78c252346b82e3d1a7bbcaccb80fa92af48618366efeff309dc03,2014-07-09T19:00:36.373000 -CVE-2014-4581,0,0,cc44f6efd6e731b1c33c03ca8ec5cec9b1919112a3192e090604b98c13f53f8f,2014-07-10T14:51:05.037000 -CVE-2014-4582,0,0,0dae7d35faffb53ea7fa0d9fb91bf01746d625d4f8c935a3f5b6ef32d667aee7,2014-07-09T18:55:53.513000 -CVE-2014-4583,0,0,051dce98ec7c04cb2d1a2687b4c87aa11ce70564b9a58ce6a86060bebadc4683,2014-07-02T16:59:26 -CVE-2014-4584,0,0,ddff327534f8f374ab05774a62f8b710c41cfd518ec37ab7d3d81388cfc8d6f9,2014-07-02T17:09:19.057000 -CVE-2014-4585,0,0,fa1cb43d89c007fc0c63ae2f5525c05a08f1775a08eeb6dee69e3064e8e0b405,2014-07-02T17:12:40 -CVE-2014-4586,0,0,4d91200dbb281a982fa165151eb23bdf3c18fa78b17912d590c682891dcad05d,2014-10-31T00:41:58.763000 -CVE-2014-4587,0,0,c7030abc200d71d40cf9503ecd6980de027e714f883e3272158227c74a3b946c,2015-08-28T16:34:44.867000 -CVE-2014-4588,0,0,340a05b008ad8e36e5e809f3f1aee510412467b0883fd2809843c5492cc7eec7,2014-07-10T18:11:54.963000 -CVE-2014-4589,0,0,e7275cbd13ad4d4f23694ae8055b2410106f1079b5e74f4147d5cce31e5aebcc,2017-08-29T01:35:04.267000 -CVE-2014-4590,0,0,01aed2a478159f708f9c0383f0f2283b7bf34c97a0fa5964d7dc1a812e5f3898,2014-07-09T18:59:37.217000 -CVE-2014-4591,0,0,8748c3c410af615e12fe6583a15fde337da1b357b3fee6509d51e676cd569d12,2014-07-11T17:28:43.097000 +CVE-2014-4568,0,1,715896af80e26adf63171c254e58fc7ab5102f9f500001c1d4bf2c7cebb7c828,2024-11-21T02:10:27.833000 +CVE-2014-4569,0,1,f3b46c9f780f6bc9c0f657e711627f5d439063053e274c53559389c5d66030ac,2024-11-21T02:10:27.970000 +CVE-2014-4570,0,1,7fe0f04e0246b4e16257721d3c05e464e02593a2536aee77de8ef7a1d1471473,2024-11-21T02:10:28.110000 +CVE-2014-4571,0,1,1778c0af0e5a281a0f76ec88e3ce3b05ced7a619f6bd8d20ff6e19761efbdc34,2024-11-21T02:10:28.243000 +CVE-2014-4572,0,1,8847598755e6d7a55ae332aa926b87538b27e56020ad2827805bf96161113736,2024-11-21T02:10:28.380000 +CVE-2014-4573,0,1,5e8caea43653aeafdb9af000492b96c4e8a4ac60519bf4eca1addf952c67ce2d,2024-11-21T02:10:28.510000 +CVE-2014-4574,0,1,b5135f115c160bbea1c59fd9e0798cd1e87fa8d1f67ca1e796131ca5c2b97cfe,2024-11-21T02:10:28.650000 +CVE-2014-4575,0,1,379daf2c1ede9665757a5002f60d69614ce9e0d132e027f5f303fee88372400c,2024-11-21T02:10:28.780000 +CVE-2014-4576,0,1,098d6881dbe0813494d7068b099f0a844c29e3f342e608918c25b84a9e7ed181,2024-11-21T02:10:28.923000 +CVE-2014-4577,0,1,62e2cc3cd290d2f05cea3706fed78df4c07c1d342f60240c224b3dc168180bad,2024-11-21T02:10:29.077000 +CVE-2014-4578,0,1,1afecf9f7768194c4a22c6aedd5bbafd3819be47972ca4a987812385d2820b1d,2024-11-21T02:10:29.217000 +CVE-2014-4579,0,1,6fb551c68fe7dfea72e5af80254e65650044a122cff1e7775857812585238adb,2024-11-21T02:10:29.353000 +CVE-2014-4580,0,1,fa7863a3972041eeaba2664ed519ea880d67dcc703cc5314e44408c5851aadee,2024-11-21T02:10:29.490000 +CVE-2014-4581,0,1,2dbe5c97b005309f8210c55d71c7f57707dd64b50913a7df1aded5405f299492,2024-11-21T02:10:29.623000 +CVE-2014-4582,0,1,27211fdff7e161bbf1ed739ddefaaf05d56ed937da750d13aa0fc3aa68e10559,2024-11-21T02:10:29.753000 +CVE-2014-4583,0,1,a87443e6b419db95cbfeb9469d405290b59966594b66e1b7a41b4d8d72d7f483,2024-11-21T02:10:29.890000 +CVE-2014-4584,0,1,aa1541c16ea598c5663124e29216e12a1f390da0b1570a398f737d04cc8368f8,2024-11-21T02:10:30.037000 +CVE-2014-4585,0,1,f18e1bfa8f97880ff3083c5a92f0b104f37665465db3473934e2be3cd43dedf7,2024-11-21T02:10:30.177000 +CVE-2014-4586,0,1,ff4efbe24c3dec4083727d9a06833189e1fe5289cbd662384930df5ac67bf721,2024-11-21T02:10:30.310000 +CVE-2014-4587,0,1,100477b5a683b4c34f9409bcdb68a59f1d6630c3334ce2bc0768faffd8bb76db,2024-11-21T02:10:30.443000 +CVE-2014-4588,0,1,0e970a8ff8ca0ea2d2e23d3417faa24ba63990894978750ab6b0abb568ce32f3,2024-11-21T02:10:30.587000 +CVE-2014-4589,0,1,792feeb07bd3356126e9fc88e01d0c29e60b9276e1b10a70f51f7367e14d8aa6,2024-11-21T02:10:30.717000 +CVE-2014-4590,0,1,a04ba723a6a76e5f0d9e1119e522efa915ba1a574dbc9e5dfbd012914c76f214,2024-11-21T02:10:30.843000 +CVE-2014-4591,0,1,ab1d2dcf0674e92beba3710b4fb295bd7b25286812cda17added06753aa6a332,2024-11-21T02:10:30.977000 CVE-2014-4592,0,0,5155054edd03dbde6c162c340933b287bd4e1e78e44d0690123a0648fb88d2b6,2019-12-30T13:33:52.713000 -CVE-2014-4593,0,0,771bd56e356b621a13dbdfe670c559e139a2d01c7fb6b6a07088505e2571d44b,2014-07-10T17:54:16.543000 -CVE-2014-4594,0,0,1a655ed9a07857f783aeff66518c65334a5217d39f0310021772fb12e92d4924,2015-08-28T16:34:58.413000 -CVE-2014-4595,0,0,e659182ec0f3680a4bfb869ca3f92885ccd716cca7de74620a34e5693da262e7,2014-07-09T18:53:22.647000 -CVE-2014-4596,0,0,130d6a3caeb364bea8f5a7069c31fda964e82c00112eeb869a9efb4eafd5acf3,2015-08-28T16:35:14.930000 -CVE-2014-4597,0,0,158b8d0294ffe61147d23a26c387c71cd5707c01317487d019d55ac0d5a7b4c9,2014-07-11T17:33:34.817000 -CVE-2014-4598,0,0,9101566985dc65b2206c36ac60bc892b6e8a2a06bb486d0b8ffdb3d72a074cb5,2015-09-02T17:12:35.487000 -CVE-2014-4599,0,0,ec29ebd4319831ebbe9d3cefc959ba493597719eb05971b85a03c5227b23c691,2014-07-09T18:51:56.217000 -CVE-2014-4600,0,0,9ddaeed4f88ecca3bc6acb22d0745ca3368245e32d8e9cb6a9e3abdd6f4cd185,2014-07-09T18:51:28.967000 -CVE-2014-4601,0,0,3218202add6cc1f34ea6bb43eea19341cb45c12545a61a926c8d07f9b33a8997,2014-07-10T17:53:37.637000 -CVE-2014-4602,0,0,d425c7c6d68410f6729fc9f1cea079c4753e653eaa99e3e8954357a3242ea721,2014-07-02T17:40:45.053000 -CVE-2014-4603,0,0,7422c36e78d37cf7334e37cf49ef74d8476015eb0ac230e394aabfc41a6187e3,2015-09-02T17:15:48.090000 -CVE-2014-4604,0,0,9518cff87a2419d611e6369af0b5c4a14f017a8d094ba5b2e600de3e5231e42d,2014-07-09T18:49:46.737000 -CVE-2014-4605,0,0,3f8874c6518c37d68f8b25cb763dcf2b4510b487a19d99c3c6af4f1a0c21db16,2014-07-09T18:48:18.740000 -CVE-2014-4606,0,0,d63114f062b715dc6ca859784e1b1a7c721b7d45d271547d389d7b867f9acb5d,2014-07-09T18:45:46.887000 +CVE-2014-4593,0,1,d3c2b651181fd12ff12a77a611744c5849d2c862c101092963f6a35ea92c0686,2024-11-21T02:10:31.237000 +CVE-2014-4594,0,1,0bd462cf62a47dd29a42c020ca2264063170649bff65071d9b6525bea4519da2,2024-11-21T02:10:31.370000 +CVE-2014-4595,0,1,3010ec35b6d67d14e8635e516e9c7805dedbed89d9aa5aff869108e12cb386f4,2024-11-21T02:10:31.507000 +CVE-2014-4596,0,1,ebbf7bc51d9d1cf80d5242f5377d83bd84c36a04c74f907b2f52a32ef7dbe522,2024-11-21T02:10:31.637000 +CVE-2014-4597,0,1,e0d09f4ee7966941313638795924e3ee8a1f791d0b0bd44ef7641f728f3aa209,2024-11-21T02:10:31.773000 +CVE-2014-4598,0,1,d7ccac2ee3be79a1dce93d1acebbe1713ba1d4503d7f77d61831497078faf4d3,2024-11-21T02:10:31.907000 +CVE-2014-4599,0,1,3ec8945b65dbfb3a7825a7cf437601ac03483423a2fcaf571d800781899d0186,2024-11-21T02:10:32.043000 +CVE-2014-4600,0,1,fb22c585b99b5d657314e4c62fb58280e231000ed0d346820000611f44c9181b,2024-11-21T02:10:32.193000 +CVE-2014-4601,0,1,9f60cb01f83d690789c0bc670cfdcd283600fde4465bc8631786b6813882d081,2024-11-21T02:10:32.337000 +CVE-2014-4602,0,1,4acc36a7a7053e498eba5fdfcffc261b2f2a44c358d6640c14f6dab9d989803b,2024-11-21T02:10:32.470000 +CVE-2014-4603,0,1,280582de545dbc459794075ffd2f0b1291992cd588268e6d58e5bea2e99e4f8e,2024-11-21T02:10:32.613000 +CVE-2014-4604,0,1,02cb4d22a30beeb086e62607a34fa6adbcc5d1ff7a0f07f7e87397a616dcd6d3,2024-11-21T02:10:32.757000 +CVE-2014-4605,0,1,33d0d93293798a0deb2dc2603347158f5cf7850bfff447db2becd7f244a08b73,2024-11-21T02:10:32.893000 +CVE-2014-4606,0,1,f57bca6e322d0f103074d6a48661bd269adb891d17b246500f47b2297ecf0266,2024-11-21T02:10:33.027000 CVE-2014-4607,0,0,76c308a41abef0a008fc88a19bef429b478190e1a2cb12963321920266d2788b,2020-02-14T15:26:45.467000 -CVE-2014-4608,0,0,d7818b75eb63e09ed586b436a27cb492605255a958deea147ea583e62d058ab2,2024-08-06T12:15:20.573000 +CVE-2014-4608,0,1,9c071030abf047675b9204e3f0cf83f1eea486447d94d84dfd456a7250321813,2024-11-21T02:10:33.310000 CVE-2014-4609,0,0,02f363f1f4d393ebc3c8ae96b30f28d565a2167efe6f6ed5eba18e083e921498,2020-01-21T16:49:14.900000 CVE-2014-4610,0,0,69e982ba357cffccbdeb69b942e2cf7fc23318c8f6e1a1c9ce98382bdefeb111,2020-01-21T16:15:47.263000 -CVE-2014-4611,0,0,5b0a0b2d930406e341b0eadab49a8c3103b3e070a88dd1cdbb44744d7348b67a,2023-11-07T02:20:35.810000 +CVE-2014-4611,0,1,8f304c5706a37486c8b8a9236e7e510b342f594c5a842d9e84aa1387b57733cb,2024-11-21T02:10:33.800000 CVE-2014-4612,0,0,2b681490e1b7e343d07343ad12dfefeb0a7d12f2fc10192b9e713a23f9daa0cb,2023-11-07T02:20:35.957000 CVE-2014-4613,0,0,ebccba2ffe33684b78d2f04b5e283dde90dd8957c503166b476e42fd54ede03b,2018-04-09T13:03:52.100000 -CVE-2014-4614,0,0,cfb1e7f8537f7fbbf191f297f05572a608e733e606cbd6073ccca5868c081b48,2014-07-09T18:37:55.630000 -CVE-2014-4615,0,0,4dc27dc6d508a84335d0dcbdf89bb0fed687d343c73f904aebbeefe88b679987,2017-01-07T03:00:21.867000 +CVE-2014-4614,0,1,606fa6086d581c50ad359407a153adbbb3abc39b0bd5ad8efc1c7e7994c356aa,2024-11-21T02:10:34.343000 +CVE-2014-4615,0,1,47118d746e5fd008d547ead20655c757875e668e7efa7755d3ced734536081d5,2024-11-21T02:10:34.500000 CVE-2014-4616,0,0,632578559107b94e9574f7c64abb560bcbb5a33c126e1f51c75381618d3fdcfe,2022-07-13T15:04:07.240000 -CVE-2014-4617,0,0,07e674d06b7ecc72f4fe2ab6ba81dfce0a1105a82a3e100fb287e6e631ed6f97,2023-11-07T02:20:36.077000 -CVE-2014-4618,0,0,9e4fe207aa6d7c62dec52a4dcc33ca6e69ee08b30f9d5498b2a48217b1311396,2017-08-29T01:35:04.343000 -CVE-2014-4619,0,0,310bf2542212df58a951aa7404d6446c76e59454a0c58bfcb076878eb85514d1,2017-08-29T01:35:04.407000 -CVE-2014-4620,0,0,fe1f57116e9d44b957d31e22a70f866ae918647275f7218abaa035cf1a2887bf,2017-08-29T01:35:04.467000 -CVE-2014-4621,0,0,17cf0914200b2a63e124ffc7d638921f40df48887e5facd40eaf5d5128a2146a,2017-08-29T01:35:04.517000 -CVE-2014-4622,0,0,a9e733e498dfb1daffb21f4564ffa5af7f3e0a59431da929155983a4232dceda,2017-08-29T01:35:04.577000 -CVE-2014-4623,0,0,f8cf322e5ffe7072ccc99983b18fc014bad15f4919542f7e18898a7ee0797052,2017-08-29T01:35:04.657000 -CVE-2014-4624,0,0,a5a51c5b1bc0070399487fc8507fff9305435201a88cf9415d41c7efbb847761,2018-10-09T19:49:46.257000 -CVE-2014-4626,0,0,6fea1f3284d822a9cda3b822374b25014aff01ffe694080605e8dd7082af8369,2014-12-17T19:15:20.193000 -CVE-2014-4627,0,0,4ecebdd291856a7e59adbad44d5775baee66499a6613524aa490a18ad8c3f8e2,2022-04-22T19:49:39.817000 -CVE-2014-4628,0,0,bcf8c66a7e31227c32ed72c58b875978b21047c57e3ea0088995d66c42899e5a,2014-12-15T19:31:33.070000 -CVE-2014-4629,0,0,6d8ceeba16a65347e3e6640f71a349521a38106d74194da0dc12156820943f03,2018-10-09T19:49:47.240000 -CVE-2014-4630,0,0,b3fb2bc8d4fc365189c50f10e387660cfc8817afabc8e6dd5332e029476fb1ff,2021-12-09T18:31:28.947000 -CVE-2014-4631,0,0,0a5ecf5e3686d379efc789786b4caf24bd9afef9351b3d4548a1723d1376cebb,2018-10-09T19:49:47.707000 -CVE-2014-4632,0,0,da059bd4cd8a2e973ee3ce947e718f8d280306c4885a92d6c93b3659b5284336,2017-08-29T01:35:05 -CVE-2014-4633,0,0,755e28bc427de29a9d1451dcfdd3411d5ea8dac973b67850d543478678ee8907,2014-12-16T17:39:35.880000 -CVE-2014-4634,0,0,4b6ba622ef5893a1a83be3f82552d226a5e02fe29212bac3dba56a5d4a8bfd12,2015-03-24T20:51:08.763000 -CVE-2014-4635,0,0,07583fd6a60666d1f7ef14bda2cf2194eb59875ba36b1e62ca7fb714622bdfc2,2016-12-07T03:00:40.967000 -CVE-2014-4636,0,0,f4ab818b05e96bacd94938b40223d7098539f892317857fe5afe4575ef0e13a8,2016-12-07T03:00:41.997000 -CVE-2014-4637,0,0,89e2e0aadbb7667115f26b5c8b06aa0023641afbf6ccaf54fb7ac7fb605c6563,2016-12-07T03:00:43.013000 -CVE-2014-4638,0,0,8c26e867b34e90863d69c43961c207756c7b2df468be55f3800613f1b57c1269,2016-12-07T03:00:44.043000 -CVE-2014-4639,0,0,31c489d20ba71b7a658cce2e5cdc9a403c9da2c01e3d47f70d158ad9a4635e5a,2017-08-29T01:35:05.063000 +CVE-2014-4617,0,1,2d7d1ff900f8d6c7d33bedd6e078265eceadb0f4ff0b2e95979d80a86cea59c8,2024-11-21T02:10:34.853000 +CVE-2014-4618,0,1,4385858cb8a9081e3cef20142fe1a8673b1752ad4468f207a22aad943f517b00,2024-11-21T02:10:35.040000 +CVE-2014-4619,0,1,85c55b8df45741d9aefb1af34adf721445542deede17e9e62fc0cf86b4eb97a7,2024-11-21T02:10:35.170000 +CVE-2014-4620,0,1,e1df97957bd5ee5f2d7fe2dc102edb097820f0d1e1d463c2a4e38cd30bf31687,2024-11-21T02:10:35.290000 +CVE-2014-4621,0,1,d6fdeb6d06b8b914ba42afe2e3a78fc52506d691cbfd6507091d6b4b544c9214,2024-11-21T02:10:35.407000 +CVE-2014-4622,0,1,97dd1e16fbb621b13bd2a40da351c122d0696b4148bfcf98b5d4c0d4741a4308,2024-11-21T02:10:35.533000 +CVE-2014-4623,0,1,a9c35664f6ea8449c6f3ca378b0df15d9a38061adb2ae7da2864d113b347180b,2024-11-21T02:10:35.650000 +CVE-2014-4624,0,1,482a2bd62d65e1c3b456b2599eac6581826d560fd47cf6c3f0c5436fd980a3cd,2024-11-21T02:10:35.760000 +CVE-2014-4626,0,1,c681813446d046dce22cb54325825839022845a427f5e9b82835200558460334,2024-11-21T02:10:35.887000 +CVE-2014-4627,0,1,aa0d6d528ad757ab3a8758fac6077af69142338fa9c48a4da9d6953e760433b8,2024-11-21T02:10:36.010000 +CVE-2014-4628,0,1,2867b75ea6614d6d2e3145670393ff069eb6df256972943103a494c462d10f17,2024-11-21T02:10:36.137000 +CVE-2014-4629,0,1,a8eeb81efe33fc9e93276e60c01562e7296f28e97100a7c93d011b96d296d3cd,2024-11-21T02:10:36.250000 +CVE-2014-4630,0,1,db3c1d33c200c2389812da1f1ad125247b59648d88c2ece857c66be7d82ded28,2024-11-21T02:10:36.370000 +CVE-2014-4631,0,1,aa73191dbf3300fe526eb5cdb7124a4c614f65d368b0898cd9d11bb3dc1a6296,2024-11-21T02:10:36.477000 +CVE-2014-4632,0,1,7419605e2e5652f70b815cf405e24c194fc72e175342c921a96c6bb4c5329797,2024-11-21T02:10:36.580000 +CVE-2014-4633,0,1,2e066094e5baa0558ab244915ff247d26f77e336db5be29e495b134dd8917a72,2024-11-21T02:10:36.700000 +CVE-2014-4634,0,1,67f766757b111a211262f1cfed5e91efe286f97028dffa2125e0a4bb069ed02e,2024-11-21T02:10:36.803000 +CVE-2014-4635,0,1,14eb75c7eba93de64badc21de81eb1e97d168fcc5be8276e8a800e86416e4049,2024-11-21T02:10:36.907000 +CVE-2014-4636,0,1,5791a9a01ab15b7f3c80e9131485f91d9ae58ab0a284f7cc6db68a2ce4e01e2b,2024-11-21T02:10:37.013000 +CVE-2014-4637,0,1,40a385af531fbb87154f05df094ad84c895f437a31428e746dc555c6c5d21dbc,2024-11-21T02:10:37.120000 +CVE-2014-4638,0,1,0f1d59b6cd11a597285e0bd3ff5bbdd9daf159b6e6894483eb676a02b3d91ac2,2024-11-21T02:10:37.227000 +CVE-2014-4639,0,1,68203266337d1904919efd19c604605fc058856ba56e50f6ab29c0cf14fa2e45,2024-11-21T02:10:37.333000 CVE-2014-4640,0,0,60b836c83cfaa70ef358935c242ea58ae85cc354ae13c8a39e3bf972c09d71ae,2023-11-07T02:20:36.370000 CVE-2014-4641,0,0,cb0b30721560e45327e872522aba0df638b1765963bf672b3b5bb4fcb6d0461e,2023-11-07T02:20:36.613000 CVE-2014-4642,0,0,4e05f044fc739e931baec31aa8a28ba56568197c6abe475d358d61da9e41a161,2023-11-07T02:20:36.847000 -CVE-2014-4643,0,0,b22a3fb388a075db16f5458793dd37af7164accd30f98dda4b0b36f5a1418f94,2014-06-26T14:30:31.607000 -CVE-2014-4644,0,0,591cb165a904ba8f5845303547bb101aa590cb8d27e1c06b02523b780161a614,2015-01-12T07:10:50.437000 -CVE-2014-4645,0,0,b273f50e9da4d448263504d15f13d1f56da0cc0df2609abc2e26eb1cdbce0d50,2023-04-26T18:55:30.893000 -CVE-2014-4646,0,0,6835f8abda7b242bbe6c3d61f2486df21cca3c2cc6adfbf811c7fc211e7df754,2014-07-08T15:12:11.327000 -CVE-2014-4647,0,0,c18cc797a28977fd0c53336911af7d420b117f3004b7975402bdf703fb5e6610,2017-08-29T01:35:05.123000 -CVE-2014-4648,0,0,903862fcb4fb3499552a913245c00d24eadd0cbd9941e35eff773d530eedb061,2014-06-30T15:22:31.317000 -CVE-2014-4649,0,0,11b8f18c4dd6ed8e3f6f8ea54448f4eb9e8703f2a49dc0913157d92c887cea39,2014-06-30T22:10:07.200000 +CVE-2014-4643,0,1,89d185d28da33ee72c1f60f5d8bb294056f55bf64913b365233dfe49ee9151a8,2024-11-21T02:10:37.487000 +CVE-2014-4644,0,1,67e29fd9c8aca8c44ce3482db81bf9d76f9862e6bc1469c2a5d15c891cfcd933,2024-11-21T02:10:37.623000 +CVE-2014-4645,0,1,7331a867cc724b17bbb711b83e3333d625c142864978d04849594face9132202,2024-11-21T02:10:37.753000 +CVE-2014-4646,0,1,77ebfca0a1e70d21c2842b0d2a9282913ba2a56cfead734d940be84e9680b671,2024-11-21T02:10:37.890000 +CVE-2014-4647,0,1,51705ec42f93d5fe015ba7c2921e5e756542b5ef476fd1dbbea01af7386874df,2024-11-21T02:10:38.020000 +CVE-2014-4648,0,1,a77d73aed16318e592e83b383fb1ba7bcbc4990a90ca8ecb82f0e8cacf30d7e4,2024-11-21T02:10:38.157000 +CVE-2014-4649,0,1,551021ac3e8c439d7e2148c9a9a4eafaf25839168f3f2b041208cc9a12adc06f,2024-11-21T02:10:38.290000 CVE-2014-4650,0,0,5ba1729e9ad4857269285f6eba6382e64379345671875eb8e1bf337d9ad16131,2022-06-27T16:20:40.057000 CVE-2014-4651,0,0,aa25f8cf28eb48f7cef06215fbec203ff6beb106af0cb7c5316b6bff36786db6,2020-02-27T15:54:34.090000 -CVE-2014-4652,0,0,3ab199ce55a1fe67c244717e50e8a16b2042d0f911bc6652b7b67fc0e4e32057,2023-11-07T02:20:37.160000 -CVE-2014-4653,0,0,69784da8239bdb3e9fbe3aad9ca9be49f38101ff31adf6af8e961e3b90d5673e,2023-11-07T02:20:37.247000 -CVE-2014-4654,0,0,4125653b285ab2743d9c7d73562e75ea92a222ac2f83326077f773f602ed767d,2023-11-07T02:20:37.433000 -CVE-2014-4655,0,0,2647c50f0ea0eea937e21a0230c0b59660807872de5a164036504f7bce57f6bd,2023-11-07T02:20:37.623000 -CVE-2014-4656,0,0,26e3f33798a1f26f919059a42b41409df8e4459d20dbc35c886d4132f38f5ff1,2023-11-07T02:20:37.807000 +CVE-2014-4652,0,1,46ea496e2925c8fcf86e41333c0debf74bb7c40e060e435226825c60d62ebe85,2024-11-21T02:10:38.670000 +CVE-2014-4653,0,1,9285b67f384e8c36f2bdb03f0b9ddedeed6b07904883260402cbb1146f3f7e01,2024-11-21T02:10:38.843000 +CVE-2014-4654,0,1,1fb71da700302245ce52170504516e9fc7f2ae7306c9432d39948cdf032c22dc,2024-11-21T02:10:39.007000 +CVE-2014-4655,0,1,6197221dec95e304b1a4798e8fc18539cec63434652c8fa4ed93edfd819a06c5,2024-11-21T02:10:39.190000 +CVE-2014-4656,0,1,daee4f9e983f2f7516a7366fcbd6b2339bc40d6a3daf2171991bfa89d5f3339c,2024-11-21T02:10:39.360000 CVE-2014-4657,0,0,e6ff3f53001040b64031cda9d1a4101ad2ba3e1c8d29b5ed84b008d729c6166f,2020-02-25T21:14:31.763000 CVE-2014-4658,0,0,4f8b0e590d4c1e4d4edb25459ca944b13fcd78c4e48948c67cff1ed0728f1b94,2020-02-25T20:19:44.447000 CVE-2014-4659,0,0,f88472d23460ba06045c2a7ed8da244ca98a21a1302c99273577cfa0ce12390f,2020-02-25T21:00:52.007000 CVE-2014-4660,0,0,5b1970a2400662785246eacf6d2862ea545728603dbaa78ade8fbcbd87a2868d,2020-02-25T20:13:49.767000 -CVE-2014-4661,0,0,f1762f09057a306d9a579a2302f91c22bacf0dbc1937bb55d7bb5bdc04f4fd00,2019-10-09T23:10:57.480000 -CVE-2014-4663,0,0,b148124a2e06e6dce86c0c72536b013a777b571b085c7fdb9717f84f9f9681e0,2014-07-15T19:25:46.270000 -CVE-2014-4664,0,0,8ca216824f6b91f34035037d96b53b72a90a8df4ae484a10d88aa10728a9b417,2018-10-09T19:49:48.130000 -CVE-2014-4667,0,0,b16e13f69068d29bc979cfca9d370cfe00bedb8d2c2a898a9d81a6351a7b50d0,2023-11-07T02:20:37.960000 -CVE-2014-4668,0,0,80ee31e50d93f84dd3b5c3ffec71af24206e05e517a18b214163839962ea43c2,2017-01-03T02:59:06.140000 -CVE-2014-4669,0,0,d623f42d73f3798eb9c67ee90bbb79157b125d271a69d21b2ac723a196230b0c,2015-12-18T19:05:25.897000 -CVE-2014-4670,0,0,431a12a287cb52fd5ab0b5cd3be3bca7078a898ca6aa10e689e2bc9872c2bdbe,2017-01-07T03:00:22.867000 -CVE-2014-4671,0,0,8f3e86d34dfd7d9619a396a18112224c611a7110c14cb34c49f73e03022e4c71,2015-09-22T18:47:40.323000 -CVE-2014-4672,0,0,98078263bb489cb1201f4b5211f644089141b0548170165459eebc545888a411,2014-07-24T05:01:23.010000 +CVE-2014-4661,0,1,c9ef2c785e24b80f54f119b74a3efafe3948394704abac453e6b84231c3711da,2024-11-21T02:10:40.080000 +CVE-2014-4663,0,1,30385c40f472cabd25de6711cee32b05d7e0ab9e5309fb953545b93909882321,2024-11-21T02:10:40.220000 +CVE-2014-4664,0,1,d2d3d69a112bcce511b4733cdf54c33afa538d23def6278174f862a8f0ce1650,2024-11-21T02:10:40.360000 +CVE-2014-4667,0,1,19f1b9a8ddb5e70f77440ed87cfab18dc78710f8185ca1de04c22c484dde42aa,2024-11-21T02:10:40.500000 +CVE-2014-4668,0,1,db33e867b1456e7b906b2eea21601f5912da73f3b41f77e1dceaf24c783d58da,2024-11-21T02:10:40.663000 +CVE-2014-4669,0,1,1a8c1a267451bc53b3ef49f9794691ee8216db54d1ff91dd6d60a78516b8fe27,2024-11-21T02:10:40.807000 +CVE-2014-4670,0,1,4438a8d75970848c84a16131dce774ebe3c046be88c1afff7f8a3be8632f2e27,2024-11-21T02:10:40.940000 +CVE-2014-4671,0,1,34aad94abe2ad641d56a62d44d0775b6cfbcdc9590e54fcf5f62a42530d1aa97,2024-11-21T02:10:41.097000 +CVE-2014-4672,0,1,3d2f5ad333c270958c99b90f64a03e2116cae82cc0a2c5b1d20cb2e1085f896e,2024-11-21T02:10:41.260000 CVE-2014-4677,0,0,16c4b96b01f37935654c45e9cfca035d879fade5c03954032c1672b1cf1da82c,2018-05-02T15:25:05.490000 CVE-2014-4678,0,0,3b0523d8776a9b5f664d80238cba5e2aa5970197ca9ca131cc35f6821c8f15a5,2020-02-25T16:12:49.647000 -CVE-2014-4682,0,0,4bbefc8c9b54a2678d348a809c50ce33290ec9c3866dec588b24f6fb9551f5a3,2014-07-25T14:27:43.193000 -CVE-2014-4683,0,0,46ff51e2c05b11fe855d993611738571055bf5516daa66761fb61e0860f5a861,2014-07-25T14:37:19.350000 -CVE-2014-4684,0,0,f556acb1e6c22931901925f33d08a32830112f5ec3318c142b7def2f3fba3b4f,2014-07-25T14:42:45.647000 -CVE-2014-4685,0,0,5a3c594be5f2716d0d603fd44e498867b6891144d5ef822725a2c31be1a2c616,2014-07-25T14:49:24.540000 -CVE-2014-4686,0,0,02eadee60f99405bdb1bd95fd099121447f631ab0cd470015690dd7ae8eb9d36,2014-07-25T14:59:40.003000 -CVE-2014-4687,0,0,01249318ea9ddbc34348082aa12c3c231d5cd36821ba9534ca18f8d39a22627c,2019-05-30T14:57:54.887000 -CVE-2014-4688,0,0,dd7bfbacfee48f3345ccfecc2a2f0128c9597a2168452d412ba03b1178aa41f7,2019-05-30T14:57:54.887000 -CVE-2014-4689,0,0,73920dbca61a17409dc727ebffe3c98e388bf137f4d0334caa333c1904c3b662,2019-05-30T14:57:54.887000 -CVE-2014-4690,0,0,3c1d16c6725d39758b355d34457f226f2cf6b59ad52854a7ad478391168b46ac,2019-05-30T14:57:54.887000 -CVE-2014-4691,0,0,764eed1a3c7674910e1e7ba26a04aa418c7d9f2ef82942b7c09ec491b2210f77,2019-05-30T14:57:54.887000 -CVE-2014-4692,0,0,2cdd8c9936fe6def14efd5ce7abb0bbea708465ae520d25f065ae84895dc98ad,2019-05-30T14:57:54.887000 -CVE-2014-4693,0,0,8ae2352d2cea38e2e91bea3ac4b8efe5dc85bb88159b27e504512ccf789c7f35,2019-05-30T14:57:55.027000 -CVE-2014-4694,0,0,3bffb51ba67d0d79f51fc74f79b88147590b71f717581e170e3244d767314ad0,2019-05-30T14:57:55.027000 -CVE-2014-4695,0,0,0e304796db9d51a2883b472d263c80ad583c59f2d9b9e99340fe0c0f9e9b222d,2019-05-30T14:57:55.027000 -CVE-2014-4696,0,0,01f33517405be8a48fc94558ccc9e2af05d8012d3f0c5e5ac7b657710bec1cb5,2019-05-30T14:57:55.027000 -CVE-2014-4698,0,0,52513f5c581363f1b4d1b992cdb7df4f410ab2f350efa061534ce213be30ea45,2023-01-19T16:35:30.013000 -CVE-2014-4699,0,0,0861e6705beedfd7b65eb096b10196369a45c2d1c299141ed3bf6d161509ba19,2024-02-16T20:27:25.637000 -CVE-2014-4700,0,0,97532fb758edd7e71d136be4b8e52a38ac58c518ce8e6f85626f46fd15b4d3ef,2018-12-18T14:42:18.280000 -CVE-2014-4701,0,0,7a4b0d7209992d8da21fe97a1034bac3416225512d85e509b2b7165ff5fb89ad,2016-11-28T19:12:27.633000 -CVE-2014-4702,0,0,6787a6d8777652127c97d12bba49e861c9c5418d172cd6b4fec8f8ad10d849e7,2016-11-28T19:12:28.790000 -CVE-2014-4703,0,0,38b4094e2c8793617a4435922f01a8222680a2839054ad65f54f72d9c332bf61,2016-11-28T19:12:29.667000 +CVE-2014-4682,0,1,86ac17c2fdab7ed7aae08489d17800d69d02ca2c5bfc1f08120d5ac9049698dd,2024-11-21T02:10:41.677000 +CVE-2014-4683,0,1,e86fd0cc55115da738a1f4d347b9c8f4a8aa4e6070ac4b3239d60ff035a79846,2024-11-21T02:10:41.813000 +CVE-2014-4684,0,1,d9d404242c1b51aa2d29fb35f668728114bfd7ececf8e9437cbc50961f61e965,2024-11-21T02:10:41.950000 +CVE-2014-4685,0,1,ba02f1279ff25650211c6bf964d8cb5a5f1fb7f38d4f6711da21f1c55fd5488b,2024-11-21T02:10:42.087000 +CVE-2014-4686,0,1,586c0fa659ad1252f4d8aa92b11eb8dcbdb48ce5e69b1ffc45133a927cc12574,2024-11-21T02:10:42.220000 +CVE-2014-4687,0,1,8fd9f1cca8c5285b9f0f7609096b13fd75f9dc6e39bf0d5d9026580f8f9ec655,2024-11-21T02:10:42.360000 +CVE-2014-4688,0,1,6370224832c19c18920234c9ad595b3833c230630245b7d6852cbb0a251a0afa,2024-11-21T02:10:42.490000 +CVE-2014-4689,0,1,27d36f3d1c121fdeafff71ff5a9d8273f8288aa9d609dcfd51a74bd58266def3,2024-11-21T02:10:42.627000 +CVE-2014-4690,0,1,221ce623cd39bb6d3aee984542470b06d9dab45c98831b8931b015c664db7fa7,2024-11-21T02:10:42.763000 +CVE-2014-4691,0,1,91631b9cecab7b17261749dac0ac754462b6735e294084695f2aafd171d09998,2024-11-21T02:10:42.897000 +CVE-2014-4692,0,1,e257a02bfcb7bc7ed7fc820a6a94250f9bdff957281f8c8b817ca5a1dbb4297c,2024-11-21T02:10:43.030000 +CVE-2014-4693,0,1,d51839f09b87b918db8f43bb8879793aeb8c232ac5e1688ed42e8e38e11d5378,2024-11-21T02:10:43.167000 +CVE-2014-4694,0,1,97f35e24ccd3ef3bfd2e8495387c5ccd669a16d65d3a89f2e7c7bc9bee5e6594,2024-11-21T02:10:43.303000 +CVE-2014-4695,0,1,8ccfca01d7b3a39031475ece65cb83f2bd3600014d5d2a92795f89bca9c0d39a,2024-11-21T02:10:43.447000 +CVE-2014-4696,0,1,c5cfe2caf4fac30345f6ff6b8110126cd3a329fe7dff2ae4d7dd388e29a471b2,2024-11-21T02:10:43.583000 +CVE-2014-4698,0,1,480d25e8cdcee46a84596e5892858fbf3f95fae5c992e2851287e9b49330c1ab,2024-11-21T02:10:43.713000 +CVE-2014-4699,0,1,d107e6e05efbbe85830275828583fe72503e0f0ff2fc2e44e60e6d782c628315,2024-11-21T02:10:43.890000 +CVE-2014-4700,0,1,113b51ac2e01aafd857191a6ddcb122886a3c5b25925f44c24c74ad2d8290391,2024-11-21T02:10:44.110000 +CVE-2014-4701,0,1,a4381b6c5405eed315ad08eb1d0144d1121f81a3d13b7a84d3eb151a57e9fb3a,2024-11-21T02:10:44.743000 +CVE-2014-4702,0,1,3efa1599caeb06d435ec6a811a1a9b5e0c5da70ce49243e1329c2ada976a67dd,2024-11-21T02:10:44.893000 +CVE-2014-4703,0,1,998b51624abdac3b800a8edb620b17a8f654776b969489cfd3e860e828b62eec,2024-11-21T02:10:45.033000 CVE-2014-4705,0,0,e22b62a7c7602c443f07c2ea53add2a7ef35c331725ddae2ffb48317eedddc52,2018-02-26T19:31:25.060000 CVE-2014-4706,0,0,c0602c2b354f04bc8f45160cc0dac45e635b7458541b042df3866bb95df02076,2017-04-05T15:36:59.220000 CVE-2014-4707,0,0,e9b07ce2818a4a0f2c95345b635095cbe5b40a33c16b901326e90c6fbe274f9e,2017-04-06T13:59:29.673000 -CVE-2014-4710,0,0,88d8f93e42645eb83ce2d12dd3a81a0c3f1e3ebf5888234488811b8b3d991be3,2015-08-28T16:35:33.897000 +CVE-2014-4710,0,1,f8f1b45d21e595e313b5fc9a911031d0031a6edc72c024ec7459ab126a71145c,2024-11-21T02:10:45.593000 CVE-2014-4714,0,0,5bfbda78abeede2a7bf2185734f2e29a20acb4615a3858206351d04ca1939a80,2023-11-07T02:20:38.497000 -CVE-2014-4715,0,0,3f458f4e12407cc0183506a135443fd03ccb0778a12dc8b44b07032a9c24b7a3,2014-07-17T05:07:46.153000 -CVE-2014-4716,0,0,b486db91286148c331f44c934e3e1773d44a386c38310fa89abdc2ea44d5b9d1,2014-07-07T13:57:16.420000 -CVE-2014-4717,0,0,062c8bbd397a610d86d885006f9ad1b2fcbc4ff889c4809ce1d601c1c59a24a3,2022-11-15T17:34:29.523000 -CVE-2014-4718,0,0,d34dedc1d6dd512d546b597dad87a8700231f828d484d7e57df1d098336c0b88,2014-07-07T14:10:07.320000 -CVE-2014-4719,0,0,2d4626da4132ba0cbdb577e6b8f88ad2e16ee2d16a8309c4478f17cd0e0015ed,2014-07-07T14:15:12.530000 -CVE-2014-4720,0,0,a53f636081a0ffc74cdf7f8681d28c5975fb9e6648f02652f29925173cd440a8,2014-07-07T14:52:15.107000 -CVE-2014-4721,0,0,fc115e8907312add3e989e9d63edb0522fb5ba81ecec8e225f636fad6812324b,2023-01-19T16:14:09.417000 -CVE-2014-4722,0,0,f43d0fb814451a7baccc4c83d6481be94ab87f85460c053907eb7ca43f17b4f8,2018-10-09T19:49:48.630000 -CVE-2014-4723,0,0,85bd8d062c4fbb28d17fc8547ca05e272de2b78ac371e0e222cfd5fa3e63ccad,2014-07-08T15:27:41.390000 -CVE-2014-4724,0,0,68117d2fbefc528ceb941e8db5aaaf452143ba18df25140a108b70831fe22a57,2015-12-19T02:02:18.720000 -CVE-2014-4725,0,0,e2eed7674371b600349f97005266cc8be7fd214493bcbf2d117ccbbd2dc05216,2014-07-28T19:18:25.507000 -CVE-2014-4726,0,0,ca2cb1c1b8eab2335de967239795c5fa1f87c110b58833e4891df12c8247a517,2014-07-28T19:21:09.447000 -CVE-2014-4727,0,0,8f1bc764051d45b0b05763859ec224a5cf627a508a956ab6e345c9ee6a6b80b1,2018-10-09T19:49:48.910000 -CVE-2014-4728,0,0,bc7451f459d8504454a9ebc548679a86bd24cea9140d8371d4174a61ec5dcbd5,2018-10-09T19:49:49.567000 -CVE-2014-4734,0,0,470db74a17e01be61411a4ccda4fff7b7268e3fd54959a81fc433649afa53e86,2018-10-09T19:49:50.207000 -CVE-2014-4735,0,0,b7c2278fa8c91bd2eed037ea4d8cacbc1a10696b217314ed874c4e2603cbecf9,2018-10-09T19:49:50.613000 -CVE-2014-4736,0,0,7ac3e636940ae1bd01e6b44fa4f913f5405d3578f74fa4c97dfb035393624c54,2018-10-09T19:49:51.067000 -CVE-2014-4737,0,0,df9f3a274a104faa110a3725c6aa413d5d8b2bd989c22024f3ae02bf2a3ac4fd,2018-10-09T19:49:51.363000 -CVE-2014-4738,0,0,af6f006a40342e6bd91a04d07fac286629c3cc3c69335641f6b1c4da9660d2c0,2017-08-29T01:35:05.640000 +CVE-2014-4715,0,1,e8fbd53d338d1fea12c779b2c67b0058604b90639850bc719631df6a8aef0506,2024-11-21T02:10:45.753000 +CVE-2014-4716,0,1,8b2a6cf9b97eb5d6f525ec59b72282542bef27e39a8283915eeb753f2e18e21b,2024-11-21T02:10:45.887000 +CVE-2014-4717,0,1,72c034cb818d3f853292b78de7c845a1f90b8f8bfe877b7e829b77dd2d7ec374,2024-11-21T02:10:46.020000 +CVE-2014-4718,0,1,c1a07a971819174b8243e8c74ede62474e2219d7b63d1316ced0ae120ade98b0,2024-11-21T02:10:46.173000 +CVE-2014-4719,0,1,6511993a81cb74c18ecc9a9d61efd05f23d9315754e16125a4d8b13f4d02eab8,2024-11-21T02:10:46.327000 +CVE-2014-4720,0,1,30255e0c4aab3d2f6ea54b97dca7b27e12f0bfa8df708aef88d7d1106fc65c70,2024-11-21T02:10:46.473000 +CVE-2014-4721,0,1,737da47d2db069a3eb31e6ce14fae30c9ea02bbe2c64e138cb58997bd11f17da,2024-11-21T02:10:46.610000 +CVE-2014-4722,0,1,08493b5eb3684892a46f58c8fed2cc50d25bf4095998eea68eb2a83ea479f438,2024-11-21T02:10:46.757000 +CVE-2014-4723,0,1,4f7b6087803de971befb2d29f49bedfca3eae204659aacefe54dc1af4f46c8fb,2024-11-21T02:10:46.897000 +CVE-2014-4724,0,1,9ab7a6b5fa80c0434e78b2530f358799fd66a1d12e5da0d3a6b2a0837dabfb22,2024-11-21T02:10:47.027000 +CVE-2014-4725,0,1,fc29c488b6c7f8ceb30c01b35b1391ed6eeb19c5c1b5696294746ea5369aa015,2024-11-21T02:10:47.167000 +CVE-2014-4726,0,1,285eb8180f16c15ca1d8b5885d23c5186b36f9efaf489f3e60cd310836c915aa,2024-11-21T02:10:47.330000 +CVE-2014-4727,0,1,c77983ceb77de3bb40278b10c52de9c81f6452f80ffb830b3df2590c35bbcad9,2024-11-21T02:10:47.473000 +CVE-2014-4728,0,1,12694fededf835552eee054c61b26e4ee60690123e261baab4fdef511b58c8f5,2024-11-21T02:10:47.620000 +CVE-2014-4734,0,1,df5baa91ba89daef456e6213beccc915ebd8a4110eab8f2a483aa90211531427,2024-11-21T02:10:47.753000 +CVE-2014-4735,0,1,93b8acc0ac539173da424dd3b22c4bdab38af3805f7dbf353329b176845ab00b,2024-11-21T02:10:47.913000 +CVE-2014-4736,0,1,138b6f62ca3fa502e52ae090273ee97e969ac6268d266e6597e1f0bbb90a4969,2024-11-21T02:10:48.057000 +CVE-2014-4737,0,1,74b91c91e7a9413f756ba642c1e5600ef2674520416abf7a34f0cb9b548bafc1,2024-11-21T02:10:48.197000 +CVE-2014-4738,0,1,cdaa76cb8422bd4f2a648ffada1c44d95c00961dca935cc86cde2ad6daff0e94,2024-11-21T02:10:48.340000 CVE-2014-4740,0,0,031129c66108dfc9e26083b97faa9d39e3be197c1ca1d3620f415944074c46ea,2023-11-07T02:20:38.927000 -CVE-2014-4741,0,0,aea61494f619ce32520b3946b88b3bfd95dafc1bb0fbf1d62aedb7180aca048e,2014-07-10T13:49:53.757000 -CVE-2014-4742,0,0,535d04043230bf0fb60c7a1595a2f654f152d1f264083ba56eb3a45c1788445f,2014-07-10T14:05:00.237000 -CVE-2014-4743,0,0,e1668ec0d983ca3b2fea76108b7b321f001aaa0306bf03afbf049b245f16ab52,2015-10-06T02:43:15.293000 -CVE-2014-4744,0,0,6cc9550e57c079921fb27d3ef9aabae0732563a7ea3ea3a010b5539e24fdf806,2019-12-16T15:25:11.087000 -CVE-2014-4746,0,0,ce926e016a5ce1321e8c3163061da083a235b3682e9253797a77c2350bcb068b,2017-08-29T01:35:05.703000 -CVE-2014-4747,0,0,749bc4e2c673c2aa84949dd6c6b661b4808071c0cc4f82ec9a2826599995f85d,2017-01-07T03:00:23.133000 -CVE-2014-4748,0,0,50c7173ea2f0813c634a002737206af084d7bfdd089f34e62c43a83d2685ebaa,2017-08-29T01:35:05.797000 -CVE-2014-4749,0,0,ee8b83c0ad13e789cf1ce34e596dba22ce72d65812d0da5afc7b0a7f9a763ae9,2017-08-29T01:35:05.860000 -CVE-2014-4750,0,0,4b27a90c31d8790978903e9e1f569b0629687678bfded70a43b6db63f227085b,2017-08-29T01:35:05.907000 -CVE-2014-4751,0,0,a9b120e6ed860a37e9b0c06d341f23e30f7e730a7b896105a9f8793300b81035,2017-08-29T01:35:05.953000 -CVE-2014-4752,0,0,50c3e897e4bbeb5f9284836ac2e6b9506c33d74b69b6a371397d7d00975eac8b,2015-11-27T18:13:06.557000 -CVE-2014-4756,0,0,76dbd59bbf5814eb5cf958da126dbeda8fa3bcaa5dab1caeb12572876b696905,2017-08-29T01:35:06 -CVE-2014-4757,0,0,6909748c408db260353f19cad4c04c0d812e335f8511d16f84f504ce6c4796ca,2017-08-29T01:35:06.063000 -CVE-2014-4758,0,0,5557da729265c60b859c28b1878784de9579556176a3834f98046981a144f341,2017-08-29T01:35:06.110000 -CVE-2014-4759,0,0,6dfa342658ca08921510c92cf75d5b2a4cdb7ca08daa905fd2f1ee3f017acb62,2017-08-29T01:35:06.170000 -CVE-2014-4760,0,0,962647831c6b7a9c834eb3b9d31a31f9dcc17e6c400f92d3dee833162c43f4a5,2017-08-29T01:35:06.217000 -CVE-2014-4761,0,0,83492d32e1accad5d9469f000074dd0ebf07d7c0890edcd013c94d6ae504c592,2017-08-29T01:35:06.280000 -CVE-2014-4762,0,0,c426fb567b74fa2f6a37232dafc953b2e7750142f6311a08b1ae4c9d32ef812e,2017-08-29T01:35:06.343000 -CVE-2014-4763,0,0,1e4f5f09ab8863393325ad181710321c9e5cdd3946f8070b9e5bc8e61edfeee0,2017-08-29T01:35:06.390000 -CVE-2014-4764,0,0,25d86eaacc56968a98cd522f41957c6ef141eeb161a5088837a2d9e5eb80478c,2017-08-29T01:35:06.437000 -CVE-2014-4765,0,0,56a4e8968dc661f16e889e802d295a61c6e47dea77181f9af8b248ff3cd72b03,2017-08-29T01:35:06.500000 -CVE-2014-4766,0,0,84812ff00f99ba863a4c723bf1319bd7912a9733af7dfbd186a7ac3de9156153,2017-08-29T01:35:06.547000 -CVE-2014-4767,0,0,73e77c201c2ffa69c8207514c5dc3419081a3477ce58e1911fdee16c0a2a5745,2017-08-29T01:35:06.593000 +CVE-2014-4741,0,1,6b879481ed782d02ed54de1f65e5d91f23387c3cbfe1e4529b81bf4d4a6316ac,2024-11-21T02:10:48.500000 +CVE-2014-4742,0,1,2f184c50c0420eb15244bca04d2fb68eda6812b8c98e2c5e7ef5e2f4af1291e5,2024-11-21T02:10:48.637000 +CVE-2014-4743,0,1,daaba8cf18ec5c6e3eb3046b521ebc8ef8ed3158f1ae9850da84833dc12c2be2,2024-11-21T02:10:48.790000 +CVE-2014-4744,0,1,b835f2a596c99ad1c2a446b631a7d4c8c26ec31a1e125bf1f5ef90c389ada231,2024-11-21T02:10:48.933000 +CVE-2014-4746,0,1,0f238d3a75b044c914cb223d7eec08a6213a43db6da641705ddd739e7d2973be,2024-11-21T02:10:49.080000 +CVE-2014-4747,0,1,9471b8f4aced09968a6dc95bde71abf52a63b027138792df78028968c5fc8e46,2024-11-21T02:10:49.200000 +CVE-2014-4748,0,1,008673cfb85626a89e853deafb6b4432d95d24ac053480fb901df3e64b563da6,2024-11-21T02:10:49.323000 +CVE-2014-4749,0,1,39f0dc714740f98bf1670adbc237d02e9af5678dcec22a5c12e3c2be25b5b474,2024-11-21T02:10:49.460000 +CVE-2014-4750,0,1,3a18e5bf3bd8bb63a2adb668c62e8987f9f0a422628c1f2ee5ab134754ead31e,2024-11-21T02:10:49.573000 +CVE-2014-4751,0,1,77116a10ad71c3577fee9d478c01253b117c2e73992b9ae27537a56669ec96a6,2024-11-21T02:10:49.683000 +CVE-2014-4752,0,1,dfbbdfce26de7f6fba12ba5b34344c749ff8180eeba99fa8f0fed92ec9301468,2024-11-21T02:10:49.790000 +CVE-2014-4756,0,1,35c5a9d0d55f43aeefd925e880bddc7896f536d0942ffd635d3e94f225557fa0,2024-11-21T02:10:49.920000 +CVE-2014-4757,0,1,f27cb47db2e1f8fbd6e73b752b47bc36bae81be67b5c032d3751c3bca1b6e131,2024-11-21T02:10:50.030000 +CVE-2014-4758,0,1,cf4d7b91f59af44583a36e523c7bf1ba3cb18dde80b25c9b2e51f32ba77ffea3,2024-11-21T02:10:50.143000 +CVE-2014-4759,0,1,a07fa5f8f7ba91252a407946cb94bdb5b5d289e5023476cc7680e2cb74aed032,2024-11-21T02:10:50.257000 +CVE-2014-4760,0,1,9e50daa1c99200b669cedcf03c0a56f8fe729e4b79005fb81ec6c9d1a0120195,2024-11-21T02:10:50.363000 +CVE-2014-4761,0,1,8e5bb5458fa11d17135fa3627c423cbc531f58f000493dd301e56d7cecac319d,2024-11-21T02:10:50.477000 +CVE-2014-4762,0,1,3332e57dd5c7cfff19f6b76ceec8ebf3ff1926b93b087cfb3c1d1aaf37255cff,2024-11-21T02:10:50.597000 +CVE-2014-4763,0,1,53b3cff2169e6387ad6141fa175734fdbb40c79d190d1ea31e21ba45365ad810,2024-11-21T02:10:50.710000 +CVE-2014-4764,0,1,d94823a11993e06878ff017906b982f9d976546e4592bdd7db1bfb6ba089bb45,2024-11-21T02:10:50.817000 +CVE-2014-4765,0,1,f4c843db92d8e9d7365f6690e358457cb5b60ba9b4d241aaf18e7e0f3213dcb4,2024-11-21T02:10:50.937000 +CVE-2014-4766,0,1,c3addbdc5de65c46587993e563572615b475303c2a6514e06ddfcd7dd6fbc486,2024-11-21T02:10:51.060000 +CVE-2014-4767,0,1,97b6498836924b95cbbd0485725ef6e8bdf4102cee821901ebef0c46351d013c,2024-11-21T02:10:51.173000 CVE-2014-4768,0,0,592f674b64a636ab1306c15ff582bcdd7d20798c4ba3744f510bd8c2d3ecd1dc,2015-07-07T20:21:26.580000 -CVE-2014-4769,0,0,b0a7debfdc7c739c1eefd11a1bdb7c9e44983d373a0079ee3e79a2052b79bea0,2019-09-30T16:19:41.927000 -CVE-2014-4770,0,0,ad5600fba1f1ee984f95fed53a690cdeed97a7c5493713bd3a603b663a37d059,2017-08-29T01:35:06.733000 -CVE-2014-4771,0,0,b37927bcfa998f34f94f2108c78f3eb3cab35b365a146733a9e8241c8ddab6a1,2017-08-29T01:35:06.797000 -CVE-2014-4774,0,0,4c2e94a5717e310b4900fcca2d7301856d05e7271a7501d03b87556680596d02,2015-05-26T17:04:04.077000 -CVE-2014-4775,0,0,043a0bc1a6a5d940695579bfc9905c0c50c09e5d91b4964f5ec4369ea83b69be,2017-08-29T01:35:06.860000 -CVE-2014-4776,0,0,a135af2d3605393cfefd5770772b7690d31ca5087aedcfa8ac2b961ad2699efc,2017-01-03T02:59:06.203000 -CVE-2014-4778,0,0,54effade1bbdff7ba27e6e2c724db448daa6801bb03a507ae17b89f3167c36d1,2015-05-26T17:04:33.640000 -CVE-2014-4781,0,0,ba7bbfb8c64978d5bdb81bfcca723458c0ac30fef8675f079b71962af2ab20b9,2017-08-29T01:35:06.937000 +CVE-2014-4769,0,1,b827192d6b917a1ceb788f3abdeb0887143a843e18f0ec4b29878423bf7bdeb8,2024-11-21T02:10:51.410000 +CVE-2014-4770,0,1,b69cf0f4f9d4edac45353da0955dfe5db30420bab42adcbfa45963544e2ae977,2024-11-21T02:10:51.520000 +CVE-2014-4771,0,1,adc90313a42c4f6caf2af3e5aa78ebc4c430866f23ce7f43aea501e4f419072a,2024-11-21T02:10:51.657000 +CVE-2014-4774,0,1,c2bde8ba3957a8fb5c09da55b0c30ca70aa093230a5ed9d6b29ee377a3bab549,2024-11-21T02:10:51.780000 +CVE-2014-4775,0,1,8d3c7b925f92df21a5ca735259ad9b8808e4473d86c42e5d45935f44a7975356,2024-11-21T02:10:51.897000 +CVE-2014-4776,0,1,573a0c222590de037b8bce4a481de38464c731268220415eb2d90a598dfe12bf,2024-11-21T02:10:52.007000 +CVE-2014-4778,0,1,5cd752e6a3ad7dd741aa9152498ce0bfcb278fca76186bf58f693950d1d21a9e,2024-11-21T02:10:52.120000 +CVE-2014-4781,0,1,57e157ad0363be91ac745739b1d233c8ca6252e2a203c21d3c2b33756ccf1547,2024-11-21T02:10:52.230000 CVE-2014-4782,0,0,28f21e49495ec491bc4069f43d637a64b33c8b9ec0d1574404715deb1ebdd416,2018-05-22T15:10:29.900000 -CVE-2014-4783,0,0,672ff6b5f5dd50b089999a32966619c3a38c439d2593d2dbf9a6ef96e22544dc,2017-08-29T01:35:07 -CVE-2014-4784,0,0,73d370b6d28986789b62ee7a69535e23be7404293471336ebdfb492a5b89e847,2017-08-29T01:35:07.063000 -CVE-2014-4785,0,0,0e537bb9ab717ab4095323ccc9370c92606d642021f04d1cc1ea8d2065b85406,2017-08-29T01:35:07.110000 -CVE-2014-4786,0,0,213f2d612e6e1aadd794cd1d530c623c907ae094331d1926c45ea76b04249fdc,2017-08-29T01:35:07.157000 -CVE-2014-4787,0,0,39d812b72aae4ffd41bd1c9d001bf0f16522f72b14c55f207f5a454739046ecb,2017-08-29T01:35:07.217000 -CVE-2014-4788,0,0,4d1aad84756118f3495f048153f19b9a910fb7b99c37d8cb99449c8511008b0a,2017-08-29T01:35:07.267000 -CVE-2014-4789,0,0,3608a227a1368c00a599ba91c2fadc41d22012fc7df31f6d31882c6daa22f821,2017-08-29T01:35:07.327000 -CVE-2014-4790,0,0,44736d2e62baddff34158164ffb109d0cfb8b5b06ca5d2d5a765ea0db1116eca,2017-08-29T01:35:07.390000 -CVE-2014-4792,0,0,75456c8fa932850a68c2174c16b513dbfb8344f321691896bf571b5f33eb6359,2017-08-29T01:35:07.453000 -CVE-2014-4793,0,0,c70049fd01bb6a134a65de50ac9d61e46c01f909999f64f29e82d4d14e9eb6b0,2017-08-29T01:35:07.500000 -CVE-2014-4801,0,0,4725577f8fa1d0956f99dd81daf47b8026a01ad94e8dbdd31fac1cc1653e8e1d,2017-08-29T01:35:07.593000 -CVE-2014-4802,0,0,627de2b304761c1d5b20a5c22375a5825b611e217e9337c50c13af9ecb5b1da6,2017-08-29T01:35:07.657000 -CVE-2014-4803,0,0,45cd6c11dd5336051336c7273341d555431cbe07406839fe26751bc41f4e0d75,2017-08-29T01:35:07.703000 -CVE-2014-4804,0,0,f4d10726f55250dfec2f8ac19da3dbcf2ed1609ae46787ffd87b856f1311a798,2017-08-29T01:35:07.767000 -CVE-2014-4805,0,0,e8ff507dfa55e8fd396d028f88461c52080b396e61b96886a2e1aff3bba11f6c,2017-08-29T01:35:07.813000 -CVE-2014-4806,0,0,350774585b26596436484b17ced40776cdaf90280374d51ac0e681cb99565cbf,2021-06-11T14:47:43.210000 -CVE-2014-4807,0,0,925c7a6b8a95a5cf80c3002b0fea58fd4ba17a8359c1f97c49c404471f795a16,2017-08-29T01:35:07.937000 -CVE-2014-4808,0,0,70f4232fa5f6ed17fa77f94957306c40c9353b7a7ff803e18f8d4de0420905a4,2017-08-29T01:35:07.983000 -CVE-2014-4809,0,0,5d6a9314070247fd23c4073e9cf212e80aa65066b8da98909e2c32d1ece79188,2017-08-29T01:35:08.047000 -CVE-2014-4810,0,0,ebe4e276376482c022683daef6f7e557dfa67a659e95e427293d1e51dfda23a4,2017-08-29T01:35:08.123000 -CVE-2014-4811,0,0,64261fbd3d76e52566ef345003f7c3713527e6eb626ca9260bec7beaebab3dda,2017-08-29T01:35:08.187000 -CVE-2014-4812,0,0,6cf112f0625da95d9cfcd7b98062cecd6bf4dc7a801d9cca81dcc66858d5ba5f,2017-08-29T01:35:08.233000 -CVE-2014-4813,0,0,a4c6741708f9ee990040c2de0ee2c6540092ef98f51df5bc033ea6344ba19d2c,2017-08-29T01:35:08.297000 -CVE-2014-4814,0,0,c755efca9cb661fb5580c744a1e24791669bf8f250c328cddf7aa0786d59f209,2017-08-29T01:35:08.373000 -CVE-2014-4815,0,0,59762beba6619e6d345804a4a36d0ddd4715e83e1665882bd647159dbffc9443,2017-08-29T01:35:08.437000 -CVE-2014-4816,0,0,81ea4fa41ff9b45b941a2fae12b253ee1887eac783003fe8aa6d302e0ca53bc1,2017-08-29T01:35:08.500000 -CVE-2014-4817,0,0,efbd348bdda8cc3097bc9a5dd2efde9e2c7a2c3946726b6f8c71c183525a0988,2017-08-29T01:35:08.577000 -CVE-2014-4818,0,0,5c9b60edaaaf5f1cacc37559f92530a15607cf40f303a6820b869a8970af7a0c,2015-11-30T19:20:48.460000 -CVE-2014-4819,0,0,63d8e83cd67caed1e76e479a271ef9bd27e598c1a3e68e29420d8efd6ccc8a9b,2017-08-29T01:35:08.640000 -CVE-2014-4820,0,0,9fcd121a86d4a85802ab605dfeb5ba697d92949d8acbce261f187ce298e90945,2017-08-29T01:35:08.687000 -CVE-2014-4821,0,0,3120985705159765de2459349070ea70d5ded298769d700a1ec149e206597a89,2017-08-29T01:35:08.733000 -CVE-2014-4822,0,0,9412e9b887ae146ccae884831bf03138b928b38a1fdb842994392936e0155ff9,2017-08-29T01:35:08.797000 -CVE-2014-4823,0,0,54d48fa779585723d748759f6ec07f7ccf6faa86e236363b1e21403637c2f2cb,2017-08-29T01:35:08.860000 -CVE-2014-4824,0,0,d55428cb22b83184116b1c7cef69afafd4f4943c863055d181d3db59706c4e9c,2017-08-29T01:35:08.953000 -CVE-2014-4825,0,0,e10267bdf71c7072cd2d1eca0d75d79156b818a5196f5cca8badbb4fc0d14c58,2017-08-29T01:35:09.030000 -CVE-2014-4826,0,0,a57820e71040c95a2d341f318f2063f23f7c46a211edf58c1bf0f6d3ddf81df2,2017-08-29T01:35:09.077000 -CVE-2014-4827,0,0,c020e8ed050e2d864083715cad5d37794d2ce963901cd3374f66f0ed133a6fc6,2017-08-29T01:35:09.140000 -CVE-2014-4828,0,0,be5cf41ac9f3cef6749b7f48205cb9eccef68ff39fee1899e670adbc568a5c4a,2017-08-29T01:35:09.187000 -CVE-2014-4829,0,0,8e3430a2227fb4b568556f0e32b09c44a586489f46e658683d11f333284ac686,2017-08-29T01:35:09.297000 -CVE-2014-4830,0,0,cff244aa38cc627029624dfdaa6755c6d79a139f2b0721824134dc889ed9748f,2017-08-29T01:35:09.343000 -CVE-2014-4831,0,0,6d6d2904ddb63a5a485693b962c25c380e6f6e5676a765ebcaad54ddb49e72d2,2017-08-29T01:35:09.407000 -CVE-2014-4832,0,0,fc4d47817726fd1e35d77f8af8a183730ee96381ef1ff925738afb5c61cc2959,2017-08-29T01:35:09.467000 -CVE-2014-4833,0,0,5755f54b8db1f3d1ba356701b1dae9446f0c43ba14f64b7f1b52a62231efb1ad,2017-08-29T01:35:09.517000 -CVE-2014-4834,0,0,c76884db5df071cac660758f702cbe962590525122a197133d0f7e48ef48c5e3,2019-09-30T16:19:41.927000 -CVE-2014-4835,0,0,2f559eb20f5b1a71838aefbf1827a78fb11edfe1cef1e60fa4b122bea6674b56,2017-08-29T01:35:09.640000 -CVE-2014-4836,0,0,52c376a18d21d36c6a3650850c289a713d36479872354244fe6fff49d4310201,2017-08-29T01:35:09.687000 -CVE-2014-4837,0,0,f608737949a575387894f66b842768db200e4420bcb90da01af36f0189fe5b6a,2017-08-29T01:35:09.750000 -CVE-2014-4838,0,0,95bf431aac7b31436628d0652d7207275a3c626e99cdc0b95d7397f6d06a3213,2017-08-29T01:35:09.797000 -CVE-2014-4839,0,0,def54f3127aab1289dbdee8f674237fad972c19d0c8cae262a9cf58ab219ddff,2017-08-29T01:35:09.890000 -CVE-2014-4840,0,0,cb57004fc5993e045253d8353cf01dea9e611818419aa14492a4274a3dd468cf,2017-08-29T01:35:09.937000 +CVE-2014-4783,0,1,16b572d65144be96b4a1060f21cd67d4f0d0f0921517589693a740c622d41476,2024-11-21T02:10:52.463000 +CVE-2014-4784,0,1,fef73366ec61a32be8d1aa7a13dcb046e0291821da398a3d835d2aa0db1c5e42,2024-11-21T02:10:52.580000 +CVE-2014-4785,0,1,f003d7fced2712d845f9190ca39537a76d4e6376d331cff34ac598bf9cc36978,2024-11-21T02:10:52.690000 +CVE-2014-4786,0,1,c5c89c44c719b0517dddf789f86ed63167d7909c62cebfad6bc4f06e3198e0ab,2024-11-21T02:10:52.800000 +CVE-2014-4787,0,1,908982264d908686e5881d7a77e98f9deb731bbacefc1da439e465a557a73483,2024-11-21T02:10:52.910000 +CVE-2014-4788,0,1,e5040c56bb79bc8c92e172d72e18f0de0bcb4de6aa2e336630ccd7e0f72798f2,2024-11-21T02:10:53.013000 +CVE-2014-4789,0,1,a7a1685e76ff977f1bf5d957ff02ab5c8cdeb1b6604978b24aad65cf3905ace8,2024-11-21T02:10:53.117000 +CVE-2014-4790,0,1,b5853271dd1b67c73f26db788595f9f711bd9d4780670c3ce8cbc75d4adc6503,2024-11-21T02:10:53.227000 +CVE-2014-4792,0,1,278b43de140fdea7dfd83d115295c537fa14a7781a66f786bf5686c09c699fbe,2024-11-21T02:10:53.340000 +CVE-2014-4793,0,1,1594801c5067b3b240aad212d4e94d3c4a0b7db9e6ff10f4127c6b74622c2b45,2024-11-21T02:10:53.460000 +CVE-2014-4801,0,1,0d166f0c7d0b5c8180e0c7d86d676809b7b8714e39fd1aae8be11ba5c5ca6934,2024-11-21T02:10:53.560000 +CVE-2014-4802,0,1,8310a3839b7481b597f916338d848a9d57907f26896bf806b189efb8dd5b7a5f,2024-11-21T02:10:53.667000 +CVE-2014-4803,0,1,9c449e1046453de5c5a9a2467b802a41cb33ff6d7d63985d39cbef9a8e5024c0,2024-11-21T02:10:53.773000 +CVE-2014-4804,0,1,9a736f0cd01cc1747dee2857e586c3121a5b0201817d7bdb20ffccbe7badd173,2024-11-21T02:10:53.877000 +CVE-2014-4805,0,1,9b6323a7ef2b6b63b5016a67e5d942c5bdcf25e6efdefeaf4b7d63db55708ab9,2024-11-21T02:10:53.983000 +CVE-2014-4806,0,1,94060618458a282bd90a23c5fbf0d63780982226efefd5e9705f3d671a06f820,2024-11-21T02:10:54.093000 +CVE-2014-4807,0,1,2a5f7abec597e744cf2b70a2a7e44c02f33596f725b9119f38a7d2b3de664bb5,2024-11-21T02:10:54.213000 +CVE-2014-4808,0,1,10e1c7cdfee3faa543d092acd8a2fe74d0734135d94c600928f2008fd5d5582a,2024-11-21T02:10:54.323000 +CVE-2014-4809,0,1,caf6452af558ecf0b45f770c94e80c599bf83e27b4043816cae87a42ac5ddeab,2024-11-21T02:10:54.443000 +CVE-2014-4810,0,1,a8278fd3ef96204841932e78298434bca224c526fd0a3e2c9447489ee1525083,2024-11-21T02:10:54.580000 +CVE-2014-4811,0,1,092829c88132f0ada4c4131cb355e8d5cbb520b364f3c1ea34b4d6950e183c0d,2024-11-21T02:10:54.693000 +CVE-2014-4812,0,1,97a2cd6cea44c628e620588ad2f1662ff3600cd84fdd4bc0a1e7d445fa619613,2024-11-21T02:10:54.800000 +CVE-2014-4813,0,1,f1a140dd88ca32c3cc87d18e8800260e593d91fcbb1d0fbb8941676df1487f4b,2024-11-21T02:10:54.910000 +CVE-2014-4814,0,1,4bfa8b5aecd5866a8f2584fd38e66a51dcfa25c33b23fdcfdda889c81c5b17d8,2024-11-21T02:10:55.030000 +CVE-2014-4815,0,1,e569a59c99e026104d4c3a12be6827e9ca4fdd1c37f1b09d9359a30c39b678bc,2024-11-21T02:10:55.147000 +CVE-2014-4816,0,1,fc1be1ee3b01a61d5e4fbabec03363389eef4a7fa73c2db7f5ca9f2c5e51f92e,2024-11-21T02:10:55.253000 +CVE-2014-4817,0,1,4f0585ec07a8988798b9e36cfda445d4f2359e28f5549bf8ec5e9cd84b90e983,2024-11-21T02:10:55.383000 +CVE-2014-4818,0,1,644c31112b980498fa110b1958ecbe0b716b31fbbd4bd1a8fb2696ec7599eaff,2024-11-21T02:10:55.500000 +CVE-2014-4819,0,1,3d5ca840442e382be98f6c37f3afdd1b0793fa8c271ce438a43d4aac8b6bb4fe,2024-11-21T02:10:55.617000 +CVE-2014-4820,0,1,dbb17ea3646821bce00327e9e170f361d1b5511f09c4eb95a8d5600742627eb6,2024-11-21T02:10:55.740000 +CVE-2014-4821,0,1,7ec505bf7432f075d08e689f098d9b96216121f8ba443686a91cb436059f5035,2024-11-21T02:10:55.853000 +CVE-2014-4822,0,1,3e4744a8c325e25e5f3403f7c4dc4cc6462681b60e2e8fce7ecdc18c27de0fa3,2024-11-21T02:10:55.960000 +CVE-2014-4823,0,1,57faf8392c28d201fb197dd5f04f9e68ebfe67c1ae02e5080cbc505fe281ed50,2024-11-21T02:10:56.073000 +CVE-2014-4824,0,1,abba667a232bf2fb05c97d17f1f2e697c6f9134c8dae3ffd2dee08822f029ade,2024-11-21T02:10:56.197000 +CVE-2014-4825,0,1,68c19f4e3632bfcc92a43dfb2a4392ce6ece9b2bebf3a2ee6fb21af528020c0d,2024-11-21T02:10:56.313000 +CVE-2014-4826,0,1,b0cea3b9c06f78457a54e4b55736fe9b98c40c981af3acc0314305f88a4269bf,2024-11-21T02:10:56.423000 +CVE-2014-4827,0,1,45e307ad4eed44d522abb6aa859f082c16ae0348c39b5e0436bae1c0310fc346,2024-11-21T02:10:56.533000 +CVE-2014-4828,0,1,54c0cbf13b7dcb4e455caa165c7c176bb1902040129c19878f2b08546d2a2d28,2024-11-21T02:10:56.640000 +CVE-2014-4829,0,1,e018d2075da74bdcbf147f345c90ffa7607c173fc4d7ab5be340996d202d3aa3,2024-11-21T02:10:56.750000 +CVE-2014-4830,0,1,165575fc07cf6d4817b26672f42925548063652776b15a7a414228d71d56dde3,2024-11-21T02:10:56.857000 +CVE-2014-4831,0,1,853d593f5e72660e1c448f62fb79f70dc805c20794459cc779f69294f1d4ea12,2024-11-21T02:10:56.970000 +CVE-2014-4832,0,1,1a7e81b0ac69db876feba1e2b239744e41fdd2cc59a1a1ae8da603c62eb50e04,2024-11-21T02:10:57.083000 +CVE-2014-4833,0,1,aee56c80b5ecf2da3b33f476dcc4482bc324eb1f415054cbf27a9f6b68b15dee,2024-11-21T02:10:57.207000 +CVE-2014-4834,0,1,fe8da7f86a1d3774c954f61069e6acb02f453b3a430ce59bef4d2f4f5dee0e14,2024-11-21T02:10:57.320000 +CVE-2014-4835,0,1,e219c7bbddd6766fc7886d7627be8b32de3f7e14af61d22e36848219205630a6,2024-11-21T02:10:57.437000 +CVE-2014-4836,0,1,df2893e7dd7c4e987f3bab99921d227ed2ba1945f26956d9db247312feb5ea23,2024-11-21T02:10:57.550000 +CVE-2014-4837,0,1,c48a9f4861bec62dc8d26b731e26f9117d3f8b2b5be6885a4159332a41baa917,2024-11-21T02:10:57.663000 +CVE-2014-4838,0,1,9cee4416009d5843e8b61f76aeef356bfd231a9eb8fbb23df22c9b4f8d9a2809,2024-11-21T02:10:57.780000 +CVE-2014-4839,0,1,d976128726774974df2cf4aeed43d85dde8229a7bd4c771fb7805d104147cc5c,2024-11-21T02:10:57.887000 +CVE-2014-4840,0,1,d70e5c05bbac2157a6ec993192d8d73d9ed91550eb8bec5afcda133a2ab26c67,2024-11-21T02:10:57.997000 CVE-2014-4843,0,0,9cda2c2d5edee33b7de215f7ead5795a806b93aa592ec2065e9ed9bdab4341ba,2017-06-15T14:16:50.853000 -CVE-2014-4844,0,0,e8bbdd98113a6c4f697dcaf486ddbde38e6198b01e94022c8281987d932449e5,2017-08-29T01:35:10.017000 -CVE-2014-4845,0,0,f0c6b5b5c0fea5a8ac2fde791e8175bd23f53803b23de3850f89f0103abcee06,2015-08-07T18:20:02.057000 -CVE-2014-4846,0,0,58c17a50650a9953eb63a430ddd69c702fc2563cfa204cd6e1a15e687f2564f7,2015-09-02T17:19:16.260000 -CVE-2014-4847,0,0,8f833e2a0c3e870a9e6782bca84da712d1c8c16b943f0c72d63c3325633a121c,2015-09-02T17:19:37.633000 -CVE-2014-4848,0,0,f0fc2a25302d225b169e294f5c1f86e75ace9a30350a7c11976179ef52214dd8,2015-09-02T17:21:28.117000 -CVE-2014-4849,0,0,97565f9cce61c8b5e11f1dddf3d7e2cf9bf82bad6f138fcf755da6fb77dc3e3e,2014-07-10T17:42:19.423000 -CVE-2014-4850,0,0,2bf4b9af6afbd79226bdbb1f1079d03f9766f4ea4de0c1bf2b876e33345783c1,2014-07-10T17:51:22.880000 -CVE-2014-4851,0,0,f79851253cef8cf14abb852af154f40461535f7ed8b08d6c177aafb6d857af87,2014-07-10T17:54:19.747000 -CVE-2014-4852,0,0,08061dd7b707d6542c05ecaa727499a29103877eee73d5ae5d3cdb1cf601c967,2014-07-11T00:08:26.723000 -CVE-2014-4853,0,0,5905852678f4670faaf6e929efb78d32e52813c378d0aacbf8881c36abc45d78,2014-07-11T00:10:59.870000 -CVE-2014-4854,0,0,2e0d78fc0b07c0ddd314903dcff49c146863ba516bac5d9f1b22416114426cb4,2015-09-16T19:29:18.903000 -CVE-2014-4855,0,0,bead2eb9538b35b91d705c40c3bf82c386dd0f78c03fd9ea38604d67d01a242d,2014-07-11T00:42:54.617000 -CVE-2014-4856,0,0,4d7872f0e53563744dd72e6b9cdb6fad67b1f78455819876ade3226081b8f861,2014-07-11T00:49:58.437000 -CVE-2014-4857,0,0,c05b37a680ad84ff8cf138327ff76cb6c673190d1c45c59d453966c9f8365b62,2014-07-28T19:05:18.357000 -CVE-2014-4858,0,0,172665a0b87804ace7c2b7280423aacbee4639d64f970ce6ef589aafb06ce22f,2015-10-06T02:33:54.010000 +CVE-2014-4844,0,1,93a1075bad2b1d5afb8ef954b91c1a0029eed4b1f309699d8439a296a5186b94,2024-11-21T02:10:58.220000 +CVE-2014-4845,0,1,e98c86cdbe908a44197b18e659236432ff03fde3dc9afe6772a3903315853d9c,2024-11-21T02:10:58.333000 +CVE-2014-4846,0,1,be72e8e0d237ed1c4565c8e315c99a9a036731bd42e16acb5438ca762c6ae78e,2024-11-21T02:10:58.467000 +CVE-2014-4847,0,1,508c0f788e73e3255171bcc5937a2b2a3b2badc3f59964287f66771bb1dc7235,2024-11-21T02:10:58.600000 +CVE-2014-4848,0,1,b7f904d006969a0d3517b1ff42738184b68b2f4fd9ea69d57bd3a097a05f17c5,2024-11-21T02:10:58.733000 +CVE-2014-4849,0,1,ccc4caf34674d3a9401493c325735d8bf771d3706eaad1858cd32d1216552b59,2024-11-21T02:10:58.867000 +CVE-2014-4850,0,1,2b5f41fd9c511ffb0a6d509e64baacdd2a4d4d7687bfca50ab77c14d6f1dded3,2024-11-21T02:10:58.997000 +CVE-2014-4851,0,1,b5f3af69936aaa23cc5b7809a6c7c5d47af68f538c1a6b465b95dd722d0f2eeb,2024-11-21T02:10:59.130000 +CVE-2014-4852,0,1,8dcf8a9dd83c0e5821e4da9c7de8869bdabf4cec9867e5f19be93cce82581c9e,2024-11-21T02:10:59.267000 +CVE-2014-4853,0,1,eccce998c7e25c04ab6bc96d8259e89991a2571171e57673568422fcf99b121c,2024-11-21T02:10:59.397000 +CVE-2014-4854,0,1,9b448cab9349de244b63b58b0e67c7d51d6eb43b4888e961324044bce6f4430f,2024-11-21T02:10:59.537000 +CVE-2014-4855,0,1,eebe0bb2f0e876ab4fbcd24be15be4a6334482f2c0868b92eddb37a9626c0bd7,2024-11-21T02:10:59.690000 +CVE-2014-4856,0,1,a2c689f2bcaa1c9470e3805c70431b488a5345c5e97bb160baeb85497eae9b09,2024-11-21T02:10:59.833000 +CVE-2014-4857,0,1,8797a5e0583740c32500771ad886320e1f6ac18bbe52a8b919d1b13df4d4d258,2024-11-21T02:10:59.973000 +CVE-2014-4858,0,1,380aae85ff6506f579ec0c74edd71779399aad1751f8f263b1f6534f58790a3f,2024-11-21T02:11:00.087000 CVE-2014-4859,0,0,97f755223b5a930117d7d3cf6f60d3daf38c5520d66ff5df10a94bf4ee5a62ec,2020-02-06T15:26:20.557000 CVE-2014-4860,0,0,381766ffa81c224d71fd63346f1df963fafc04cfea16b5f5c528d26923256383,2020-02-07T17:43:46.640000 CVE-2014-4861,0,0,1ee10286664ee8b15593f28711a34ddcf271ec8e33d3caea3e805ade97420a67,2018-03-29T14:10:52.377000 -CVE-2014-4862,0,0,446ed2335f2492f35533b55d15f08a2b0ef42b6a554a6aa804c5bf259bda79ff,2014-09-08T17:23:42.350000 -CVE-2014-4863,0,0,2765eb74949f0ca5e44c907983d035a8a61a61d1303f0a84b7ec68cea8639259,2014-09-08T17:11:09.140000 -CVE-2014-4864,0,0,986f7fc9157cdceb19ab490621e56ea1631e27e16effffbaa75f59b6474de98d,2014-09-10T17:45:25.387000 -CVE-2014-4865,0,0,3faec521ad576a3aa31f01a0afc417ca0ca00be12028e4827bb73f44b8f14544,2015-08-28T16:36:03.210000 -CVE-2014-4867,0,0,69d65e6d7522f949e08094b8d427502cc4f43201d90301925cf989a077c08dd5,2014-10-15T15:22:44.040000 -CVE-2014-4868,0,0,458499aef1c7fc5a93e2c0bd3098a6d83d94939998808f47acc3405fb0dbc4f7,2014-10-07T23:00:29.943000 -CVE-2014-4869,0,0,4e79fadee3902a501e260b8aab7a674b3fa0be2c15cf587e8818dde73fa69515,2014-10-07T23:02:39.440000 -CVE-2014-4870,0,0,a510f4f3bf77de17169465ade01e1cfbe936f86e63232af54e5c5d81d28b90f7,2014-10-07T23:02:10.627000 -CVE-2014-4871,0,0,4777fdf3f81898fd4938e8b5e775d0685580ba6599d552f19617a9a3e2c1f96c,2015-10-06T02:38:29.580000 -CVE-2014-4872,0,0,6622d2edc045fcf493b3a56c3b476b3c8a50422aaead09924348810c1c8a3fa7,2023-08-02T19:00:25.903000 -CVE-2014-4873,0,0,dfa0864aab81c5dff3bff291326d67644a951c197e15065a2b115e10d44a0014,2023-08-02T16:20:01.737000 -CVE-2014-4874,0,0,379d210702095c44d64996ff1e143a90f0681887ba467297fef3a6f1d961a145,2023-08-02T16:19:55.207000 +CVE-2014-4862,0,1,42d61096bc77e24cbd7fe6fe0d42d04c763097c0677710fbf13eb0ddc0a56aca,2024-11-21T02:11:00.527000 +CVE-2014-4863,0,1,7f903a594817b9864ace0b99df5f022a4b1c1f1b40dd30e36d4370654974b88b,2024-11-21T02:11:00.637000 +CVE-2014-4864,0,1,67607b0ab67cdd8f4ca9e9cb7acebd0f5aaba724c256eb658974251d28c63824,2024-11-21T02:11:00.743000 +CVE-2014-4865,0,1,85eaaa550a0b3efccae7162a1cfa5f068bc450ab1afed4c978ca7fd5522f2ba3,2024-11-21T02:11:00.847000 +CVE-2014-4867,0,1,60db7c09224ff8ff39a1aa3e25c6270b532abd75387eb5e9d16e99fd3515d581,2024-11-21T02:11:00.950000 +CVE-2014-4868,0,1,f0ca046e4d74e2186d06d43b5c5bb16ba38ee1c369718923dd4234672f9f6388,2024-11-21T02:11:01.053000 +CVE-2014-4869,0,1,69826be725b18b48a3b40f981e495b30220bdd29671ddeef6686a636087f3e8b,2024-11-21T02:11:01.157000 +CVE-2014-4870,0,1,d1b83a912526263bf55af5b7d85727a8ff92ac60c25bcf8433c94d17f1fb21de,2024-11-21T02:11:01.257000 +CVE-2014-4871,0,1,238198581e513a6e291cde9791eecd17dcf9282c08c59a05c81ba164a8cca7a0,2024-11-21T02:11:01.367000 +CVE-2014-4872,0,1,abf91c00ecdc62d4fa4442e286c51b47cc46147321b06882748bca8865020bd0,2024-11-21T02:11:01.477000 +CVE-2014-4873,0,1,489fa6c40739b5e47588c8d63ae9f4bfb128744308eae6f347160f364665104f,2024-11-21T02:11:01.590000 +CVE-2014-4874,0,1,c9d19cda761213e0fc2e3052db3c9ee6bedb0a9a7b2c455d3ea259c3892503f8,2024-11-21T02:11:01.710000 CVE-2014-4875,0,0,fe84680c5f48cb788af4071affc33cefb641b2f908e30a302f3498229d81864a,2015-06-24T18:52:44.123000 CVE-2014-4876,0,0,3f4f149d1820e6ab1d2302bf4978b9b4808feb061711d51d0b560395a81ef23e,2015-12-31T20:28:37.113000 -CVE-2014-4877,0,0,5de2be6ba971d2c20d35fff03c0a901c3599840b49b165d1333e60bdddea41e9,2017-02-17T02:59:00.467000 -CVE-2014-4880,0,0,699327de144b32e50bb1535038160ddc4347842912f7eb4154a0ce88440e2d64,2014-12-08T16:00:09.737000 -CVE-2014-4881,0,0,2a034799b44dd32861bf3c0f27188df6d3306a21f350614594f1c492079240d6,2014-11-14T14:04:48.837000 +CVE-2014-4877,0,1,f47fb6bf2c6f3add7e064bbd33055bccf4c992f4379e1b12fe04bd566345079d,2024-11-21T02:11:02.043000 +CVE-2014-4880,0,1,3f3607aa4726dcf7af26d8ee7d3327b7c3f9aedcff61c0db18892651f8d60a22,2024-11-21T02:11:02.190000 +CVE-2014-4881,0,1,7dd44307325c581d6c4e3cb5f696d949e02577f21e411d1da225c1fa1440d2b5,2024-11-21T02:11:02.303000 CVE-2014-4882,0,0,702359adca6f970d05cccb01d647d86c9305bc170cdcb95710fdd34c8ed81048,2015-06-23T18:47:17.460000 -CVE-2014-4883,0,0,6836e9c2d899b5256a669bbf07aa6f027b9922d55d2c4172da4c66f613e10efb,2015-01-08T19:56:52.323000 -CVE-2014-4884,0,0,5004feac69ec7fb432a684694d445f4e4213de5d7ff431fc9a61d890a13dd9f4,2014-11-10T17:18:52.293000 -CVE-2014-4885,0,0,2f368baf2ed24f4764da1f6ddb9760b753ad7dca89fd90ef24daed02e67aefa1,2014-11-10T17:24:34.243000 -CVE-2014-4887,0,0,e43994d56bca364585ee5419c5a75c1832d880ae723967a296f5fd15c56a6e0a,2014-11-14T14:15:20.113000 -CVE-2014-4888,0,0,7c0c0767e4f8f2dc79d48966c2b5f1cdace55c1eb43dc557e801b232e2ca3564,2014-11-14T14:15:21.613000 -CVE-2014-4889,0,0,25c57317a3f1ad6decdd934ef0bb33866d7d7ae1de502c730a3f6e6f2a0accad,2014-11-14T14:15:23.350000 -CVE-2014-4890,0,0,c4490d4d7687dfafc2af94d83d13725218fd01be0d5a031c4aa856c26c9002d1,2014-11-14T14:15:25.053000 -CVE-2014-4891,0,0,a558ee9f7b9424939ae101e0f970f98f5aa61446027505496360bf5b99489f7f,2014-11-14T14:15:26.960000 -CVE-2014-4892,0,0,1ba4b987398281a81b8c5700dd6dcf35450a4dbdd15cdad0d553918e7e442464,2014-11-14T14:15:28.897000 -CVE-2014-4894,0,0,3783ba79159515d3516b974cda95bb1df5f8d4b229836fdab4a5eba9aa447247,2014-11-14T14:15:30.397000 -CVE-2014-4895,0,0,a440c485d884be6826f2b3944680e97642b18f560a760c8680d4308f8736d2da,2014-11-14T14:15:31.867000 -CVE-2014-4896,0,0,b679302cf44b8102a02ee1f020cc7008988c5640f4551204ad4d5e60509da63b,2014-11-14T14:15:33.383000 -CVE-2014-4897,0,0,6944b6e603166da81e9c8ddd774793b46815527cc6b629a0e77e841b678d4d3e,2014-11-14T14:15:34.897000 -CVE-2014-4898,0,0,f473b1b66f1290bf974a8230da90057477427f535c53150493951418c85b18af,2014-11-14T14:15:36.350000 -CVE-2014-4899,0,0,050469c083fc0e594810e1bb5527db4ffeb8f08cdae6d844d674bb194e161c42,2014-11-14T14:15:37.883000 -CVE-2014-4900,0,0,efb6eaf4636a3bef829d6722de36821bd3e19a462796b78c15ec2959a56746ec,2014-11-14T14:15:39.367000 -CVE-2014-4901,0,0,06be42494c9824692287245f29cccf1159089db6176477dd93ea96ce1f078529,2014-11-14T14:15:40.853000 -CVE-2014-4903,0,0,8a7ed4a3942a1767f0bb5ab6df549bda16d2030c0017c4427ec94a4a82ce1254,2014-11-14T14:15:42.523000 -CVE-2014-4904,0,0,d12fe1b9403229e764b8c9f281d1548a3c9cd36425deab57d024e7b2d5f3ef3a,2014-11-14T14:15:44.273000 -CVE-2014-4905,0,0,dfd1fd6fdc10e4d8f2fb35f97cc1f766ac47fd41a967e8bc5fb8df1b658cf8c6,2014-11-14T14:15:46.010000 -CVE-2014-4906,0,0,2e94ca758ca1ae6a345ec30ae6833d7f7091ee462d8b7a1172d2a0a0859b530c,2014-11-14T14:15:48.633000 -CVE-2014-4907,0,0,2702933280a14242446b735cecf20c102381a6996a27647613dd4f2fdbe99fe4,2014-07-17T05:07:50.183000 -CVE-2014-4908,0,0,5b48aa03920df403176cf52fd2311876fdfc82ec478382fb1b2700943621aff0,2014-07-11T14:49:20.247000 -CVE-2014-4909,0,0,800b4fe86c1d38ddce7d8092f17d0ba118aa76f01b27a017664ecad82851f18e,2014-11-14T03:06:21.653000 -CVE-2014-4910,0,0,3dbbd187c5457be58fd279382d30c6881e992fd5035aebc9bc3a788489c6c657,2017-08-29T01:35:10.077000 -CVE-2014-4911,0,0,f42fe22d1c4f89373cc9189f8e29e4ef5b3c8b230a94aa7aaa7dd3d24c7d1d27,2015-12-04T16:21:05.270000 +CVE-2014-4883,0,1,ba1dbef00952f0a30472b356d127f42a0593cd26db9375a9bd5e1c541865f58a,2024-11-21T02:11:02.627000 +CVE-2014-4884,0,1,12244ead7a90129eef10eb3c20ab0e573dd92f8f5d5ac5094ec8cd91c3fe21c7,2024-11-21T02:11:02.740000 +CVE-2014-4885,0,1,d304d4257bc68f513f111c304643e47886c1164402b54465fad108b520e6ec1c,2024-11-21T02:11:02.903000 +CVE-2014-4887,0,1,915b9ada454d6fd688f1ccc133e2419654b4530f0b8c50732126ddc953020021,2024-11-21T02:11:03.060000 +CVE-2014-4888,0,1,a62c7d6467eeb5512f7584e8d9a8633dccba2fb279f882ec9e8feb5550b9f685,2024-11-21T02:11:03.220000 +CVE-2014-4889,0,1,b50e51a5506cb287db87453627a04d5895d6de4f9b2ae54b2f7f0e3104f2d1d6,2024-11-21T02:11:03.380000 +CVE-2014-4890,0,1,00146de74cc84109da99a4203536275fb63f6078c08ef282b7f538dd9600f9ca,2024-11-21T02:11:03.537000 +CVE-2014-4891,0,1,32d6088b48e64078da48271420bb0ac904305f237b56af154a100f98cfa6bcaf,2024-11-21T02:11:03.690000 +CVE-2014-4892,0,1,16da4efff6cc0facb823ebcf139cc396f25d53f0e55b20825b5625330fd2a7fd,2024-11-21T02:11:03.837000 +CVE-2014-4894,0,1,ca425bcfd7125347dbaa0643b8f9385a49e816d1316a5e0418577aba2b5a4879,2024-11-21T02:11:03.993000 +CVE-2014-4895,0,1,516edacc9a0439d6a74619c77eb1b6c27b6f4d560761898b7b0111a3a4c7ec72,2024-11-21T02:11:04.150000 +CVE-2014-4896,0,1,0bc15407244933caffbb8905265851b20fab2b9cffdc510e869b899c2bffc38b,2024-11-21T02:11:04.323000 +CVE-2014-4897,0,1,50e0cb95845fadb35c6ff3b4e053638f983feb0809efbfd8ec5dc08d49380ef7,2024-11-21T02:11:04.487000 +CVE-2014-4898,0,1,b2f214323064e7b6f40168fb766a225ad154317ee4c34af312ed6abfa99b7775,2024-11-21T02:11:04.647000 +CVE-2014-4899,0,1,7c3fc6298ede2b946fc850ded6e91c17bb7e8cd379310f6a1ce09bce945fedc0,2024-11-21T02:11:04.820000 +CVE-2014-4900,0,1,5f6fc3dfeed178f63a52d49d2ccd7c13b6841ca5662d4fea3a90dc56dbdf45b9,2024-11-21T02:11:04.980000 +CVE-2014-4901,0,1,57f3bc1e5774b7c2a35e76c15bcfca5ade38701205d8d36fad4df7dda4addbce,2024-11-21T02:11:05.133000 +CVE-2014-4903,0,1,8856e00353c3515376f30e98cdcffb46a93acf936da442794691340d68b77163,2024-11-21T02:11:05.293000 +CVE-2014-4904,0,1,363d954b0f5b5e824cd538fe773ce5112ab4e2b95b4cb56075c6fa488025fa88,2024-11-21T02:11:05.450000 +CVE-2014-4905,0,1,77f9b966b4bbe3acf2f4f21c68949d04977ddb163e01e67ba4ad07969c2670e0,2024-11-21T02:11:05.610000 +CVE-2014-4906,0,1,1acc31195b94e054f2f842371f769572320bdc81ce81c5e2b61f3dde3f56d1aa,2024-11-21T02:11:05.783000 +CVE-2014-4907,0,1,8904074ffaff5a926488d54a0398ee224a42565621a4f6eeb5ea172b8684f3b6,2024-11-21T02:11:05.947000 +CVE-2014-4908,0,1,4e907aab5c23a37dc4f9c8156136a0f6467d75e63d4ea8d6fa08c5940a3e0ec7,2024-11-21T02:11:06.090000 +CVE-2014-4909,0,1,502b89094dc486a2662651060c4ced224e5c06afc64da46dacff7124eb12aad7,2024-11-21T02:11:06.233000 +CVE-2014-4910,0,1,b64436547c0902922f9d84f890fb69d8d24215c4a6eb859f98995b0c41e02cc8,2024-11-21T02:11:06.403000 +CVE-2014-4911,0,1,9d979a8b9dae38d66946a33667f038e586e73430b0134f63dac69389e52ae6bc,2024-11-21T02:11:06.540000 CVE-2014-4912,0,0,3ef81798f27f73566f336afcf9a17318c41df3a64f2db8e58391538332262f11,2018-04-18T18:06:40.613000 CVE-2014-4913,0,0,7495dac57cf79a8a3c06800cc17d384e6c78945e484a29edf5f0cdc55f816ac6,2019-12-19T17:25:15.710000 CVE-2014-4914,0,0,d75c7e166fa3f48f43d33c814159f80204fdad9598016f08d6adc582afadb388,2018-01-17T16:50:32.277000 CVE-2014-4919,0,0,dd8d36ca09a6a53e4a99a92182446a7882bec8dd475586697c8777c87fb2228e,2021-01-19T23:00:21.767000 CVE-2014-4925,0,0,a90d4705af649f03010695a30d12151c7fd267db3aa837dcde100e5c5ee5e795,2017-09-08T01:29:04.153000 -CVE-2014-4927,0,0,2861e65f2929b8d4dab1897ed4189dd36de0a067c6768e7e5c1aec2e0b19ade0,2023-04-26T18:55:30.893000 +CVE-2014-4927,0,1,88f7035f940ffcfc6feb48eaf8d8f4b4650a49e57a88de30bd28f2a543837c84,2024-11-21T02:11:07.343000 CVE-2014-4928,0,0,d0b02d8fb4e89ef25bb9d25cf3d1c2cd73a4edc7253a86eed92a981caa8938ae,2020-06-03T14:55:05.857000 -CVE-2014-4929,0,0,8c40f08f02a31f4758f146b4ec6159e13cb0b996cc268092fad744ed977d010a,2014-08-21T14:44:52.587000 -CVE-2014-4930,0,0,bbed6776bbb15ab7b830fd104d2060d54784d3a60309ca50ecf997a70ff6b2e5,2020-03-26T14:15:11.917000 +CVE-2014-4929,0,1,5501ccdf754533f62b1be22632d57edb3c5eee859d005a34a8298b11e15a9823,2024-11-21T02:11:07.627000 +CVE-2014-4930,0,1,05d5f30a28162e902d9f6a454f4d29ac22f140ec9d9b164a540426b0098ef694,2024-11-21T02:11:07.770000 CVE-2014-4932,0,0,cc4de2fbd247c2820828b5b8f4c38f9c8ddb4d50a5d35fd4093ada4de52907d0,2018-10-30T15:16:44.687000 -CVE-2014-4936,0,0,d3b68c813303c9b9966f9e33242b0c5c18db86d87eb9a27b63792127c10dff5e,2016-12-07T03:00:46.090000 -CVE-2014-4937,0,0,9123c9d313832a609d0a522f571c38c4d2e0e784b590467f312d4ef506316ed2,2014-07-14T18:29:45.683000 -CVE-2014-4938,0,0,ae2e0f684da9b55a8e06a09e93c12618c449ea9b69d5778ceea6356e2687dcbd,2014-07-14T17:42:08.703000 -CVE-2014-4939,0,0,f2d8681220100dc9ac128d8973d58721855e3da27f471067e854f0ee53404d81,2014-07-14T18:27:54.990000 -CVE-2014-4940,0,0,8fb4e7ea93f6dede00cc764965a9f5f316dc1b7ad23f5a8bd448725ffc21bdf4,2014-07-14T18:25:01.167000 -CVE-2014-4941,0,0,a0f840a33a2232cf0522ff03e9983c65a6685cc30cb85209c83a58508c2c26a3,2014-07-14T18:20:50.477000 -CVE-2014-4942,0,0,e54710cd38877f52f4cfe2f54b84b1d3598c192eef27b6f5ea5ce4aaa2452a03,2014-07-14T18:12:38.727000 -CVE-2014-4943,0,0,378cadf067583d9d32a22ae547dffc4d1bed9e2ed0dc1a455f17dc04a0d7ecc5,2024-01-19T17:50:47.343000 -CVE-2014-4944,0,0,1747feb2997cf0abc5c6fe1faa80d36b7d082beaf0ccca9eaa91b309cfef2311,2014-07-14T18:15:23.097000 -CVE-2014-4945,0,0,ee4f6ccc08489085e705b747f89659c4911efa06bb9c325cb3e7b3946235f62e,2014-07-14T18:25:42.827000 -CVE-2014-4946,0,0,54f88541c03320dbfe9f8871768ab58052709b0da8298f9792d09ef259395cb5,2014-07-14T18:34:58.017000 -CVE-2014-4947,0,0,8dd90fef3e9758adb4341c2e13e451de404b086ba64267f2d49b099f93dc6bff,2017-08-29T01:35:10.280000 -CVE-2014-4948,0,0,cfd4d0cbc92c7927a11857d7b0338a78e95d5d238f2190c62e0e61aefc86d03f,2017-08-29T01:35:10.327000 +CVE-2014-4936,0,1,95ce889f183687fbda8f75416411fb12dde7529151ea4f3ab998d6169d96bd38,2024-11-21T02:11:08.053000 +CVE-2014-4937,0,1,319c09ef4b771f8967fd717f06bb2198c17f2504eb5397943035a9eb586802b8,2024-11-21T02:11:08.210000 +CVE-2014-4938,0,1,7d9aefb72e8fbd3809261a7263f2aa45058337a3210515d2c1438ae7084fc0ee,2024-11-21T02:11:08.360000 +CVE-2014-4939,0,1,79ab108bbe837940250fc8976dbbb3e0078a86376e6c91c61f3c99e5ddf78286,2024-11-21T02:11:08.500000 +CVE-2014-4940,0,1,06e64f0f04a0aeb8fd9d5f89e5a0760d500551f78b5895b30eb38cf399366975,2024-11-21T02:11:08.633000 +CVE-2014-4941,0,1,8db6be2ffe36ae74bf7d39b0d70dc5755c90ed56a4f13737614507e34c600610,2024-11-21T02:11:08.770000 +CVE-2014-4942,0,1,060ed907120a5f22f5a78c3be50249521f7c6c28a28df906864db8e5b4ee4408,2024-11-21T02:11:08.903000 +CVE-2014-4943,0,1,35a550bfc7a80cc3aee0274ce56430ce1e930cdb3624092c5e08268309d620c5,2024-11-21T02:11:09.040000 +CVE-2014-4944,0,1,af94da9131c019f360131f794c2ae2c1b4e9ee9da310a7f3cb6ffb5c7b1450a4,2024-11-21T02:11:09.237000 +CVE-2014-4945,0,1,f422290303429bbf7a5541f4dd5c02d539c1a1f44bd436846f765242c8ad0d98,2024-11-21T02:11:09.383000 +CVE-2014-4946,0,1,b029136b1105e43615afd8bdbbe2a73f9f4626677958648b879db47f11ee55c0,2024-11-21T02:11:09.553000 +CVE-2014-4947,0,1,45baa6850c286d7fa8b29944534858e8e6621a09b8226ab565e9543b8aea715f,2024-11-21T02:11:09.700000 +CVE-2014-4948,0,1,e4c392a021907bfb7e185b07b542ff4c029d51e4b1e906d31ded804e449536c4,2024-11-21T02:11:09.867000 CVE-2014-4949,0,0,96c6572fcd9e5bd3ad524c8bb3c676c4a18aa86122f3ef11b7c1e38615987c68,2023-11-07T02:20:40.347000 CVE-2014-4950,0,0,b507014e7a514dc4475260d3e85bb9158a8261b2d571e3087493906583b89feb,2023-11-07T02:20:40.700000 CVE-2014-4951,0,0,97ca382e9e3e56e9b0fae6aca0cd2961f9601686ab8b38a2af76c781ba4c693f,2023-11-07T02:20:40.930000 CVE-2014-4952,0,0,2b5b5fbc68d8a62422ed442dd913f79823ba8f7ea0491f01543aab53604a6151,2023-11-07T02:20:41.163000 CVE-2014-4953,0,0,ef6f1bbd1fd883b89e69351d892e0c950c8f4188bc4fb145a9b591bda9ac35d2,2023-11-07T02:20:41.393000 -CVE-2014-4954,0,0,e69cab644dd647e0a7480336af9ad07c16b8cc7b6d24df44098d98e7299c2af3,2015-09-03T14:54:49.967000 -CVE-2014-4955,0,0,5835de7bf2fa8a3349b0725a76eb3a10f54d733b0e3b0b6a8a502b60373aa01e,2015-09-03T14:56:39.823000 -CVE-2014-4958,0,0,4925c780423336b4ff8166c6bd0d8793712974794bb2c2ae8fe2824cad340ab5,2015-09-16T19:30:20.290000 +CVE-2014-4954,0,1,c9dcd5f0b9b25d98d340a94d5e81cd5e13469583769cf0b745836e154e740f59,2024-11-21T02:11:10.080000 +CVE-2014-4955,0,1,c4b624ac3c9f900ea19cbb00b5fa3fffa5cb5bd86c8939d07155e15b8c91a049,2024-11-21T02:11:10.213000 +CVE-2014-4958,0,1,64dbbd1cb72cbb35566d37dc40908f99d4c48ac9e341e3ed82dceb5843b2dcf5,2024-11-21T02:11:10.353000 CVE-2014-4959,0,0,12010f00c0e846015c72c97ff622dcf4b8589d6d56564cb4ae639e87e952dd33,2018-04-23T19:10:37.177000 -CVE-2014-4960,0,0,89714c04d84b2f0a910e91b39937a0a15ac717bbbb80165b24de05058b2acfd7,2015-10-06T02:37:30.113000 -CVE-2014-4962,0,0,0f471d535be919185f8cb7a7b26965460837ff80df7521fc43fe8a353bbf32c2,2018-10-09T19:49:51.817000 -CVE-2014-4963,0,0,1f7cfaf9eb001fe5990917a1823c65e034408453e5f5472bb19f1eff2984a315,2018-10-09T19:49:51.990000 -CVE-2014-4964,0,0,52cce2a64b58bd86240261da6f57220036a6e54e970f9dfd622121bc1c552489,2018-10-09T19:49:52.177000 -CVE-2014-4965,0,0,ad0e8db35cea6ec401dbb1a147762aa07dd0f2ed295a42ac19dfd402cc6743f3,2018-10-09T19:49:52.380000 +CVE-2014-4960,0,1,5f896d88a977be280da8de39eb53839818c996ad271480b74daf27d4cfd9a53b,2024-11-21T02:11:10.620000 +CVE-2014-4962,0,1,be8b848f80583552fdcedaa46bd438344bd39312573844a030e41d5ddcfd73a6,2024-11-21T02:11:10.753000 +CVE-2014-4963,0,1,b5169c06655986b3c6b847055d36f0f515ffb6c2ed3a93b4d0b145614e54789a,2024-11-21T02:11:10.880000 +CVE-2014-4964,0,1,1601777400d96408589687a43c5ec3362b26683398cc0fb534c6cac0c9b3ab75,2024-11-21T02:11:11.007000 +CVE-2014-4965,0,1,8fcf40e675f9c1c4d184501db2175b0f5c6c5b30dc84c3aab0bc7aebd85098ee,2024-11-21T02:11:11.140000 CVE-2014-4966,0,0,825e429ad24f28fa264d2fe3ccee24e58c7575020703b82c0288ba67c368ca82,2020-02-26T14:40:20.697000 CVE-2014-4967,0,0,b0bca92fa31673e7a05be8a04c3a423676446adf94936f6084edece13c4e3453,2020-02-26T15:35:08.750000 CVE-2014-4968,0,0,6fd1fa8fc55fe08a1d9c6b53f7d3c2addf63b8e836156de879d2978d18dae89c,2020-02-19T19:28:38.060000 -CVE-2014-4971,0,0,ecc642352700202d8aa13ad14ce904bc462ee419bc80cabd0743cf6d4f1e3a1d,2018-10-12T22:07:28.240000 +CVE-2014-4971,0,1,f5369f2b148ccf4b02276ba1c49dfaace2c4948d17a8426705fc96d382b3360e,2024-11-21T02:11:11.677000 CVE-2014-4972,0,0,fde237bee47d6d706adb1e7af1aa447874705e863d2bf094efe2be10301d426b,2018-02-01T18:41:16.720000 -CVE-2014-4973,0,0,27793133583ba2d041eabcb5cbc7c8427d81341743a5e21c3e76295a593fbad0,2014-09-24T14:53:29.363000 -CVE-2014-4974,0,0,e1b1c1ee8292f803166cf1526bb34930894b643d8c9339ff2fc2c988abc8907f,2017-08-29T01:35:10.453000 -CVE-2014-4975,0,0,265d9d2564ac12b6bf3449ef601b78313069b353977d8a04fa3cd4f9cd40c813,2017-08-29T01:35:10.577000 -CVE-2014-4976,0,0,1ebf86e744cdcf7f860b950f790c11a507855320d4f48687f48e2fd422181f08,2018-03-12T17:23:48.680000 -CVE-2014-4977,0,0,f4e3113d1d6e0d909e18a7f92b36abcdb23ec9d0e46702ad433eaa50b949c3e5,2018-03-12T17:23:58.633000 +CVE-2014-4973,0,1,a5b9ca15712c858cc11bbae43e4eaece6ac54fe76be4824807a1b4960190ef11,2024-11-21T02:11:11.960000 +CVE-2014-4974,0,1,cf90d9bf5d7631660dfe3547c78d47320d2951329bebc6054e3c34ce6ec993fa,2024-11-21T02:11:12.093000 +CVE-2014-4975,0,1,bdadc709308e4b75417be02bb91210dcc50de16f4a3430b24d6a422efabe830e,2024-11-21T02:11:12.230000 +CVE-2014-4976,0,1,0bda1b34af76cfcee08a2774fd0a3c681aedd504935e986671c3ca312c3b4f7f,2024-11-21T02:11:12.390000 +CVE-2014-4977,0,1,dec8c8858b8c71619658474ce094d23489ee32ca86d08b5bbd0eb898023efec0,2024-11-21T02:11:12.530000 CVE-2014-4978,0,0,5d840bfa02cd4ef1a7be89d1e6e1a1bc27e6b19caa92fa2251d01b436bf529f4,2018-01-10T19:21:55.727000 -CVE-2014-4979,0,0,8c4ad4949716d7cc083b0cef040f3122d0c06e2ed853388dd0e6a34960195cdb,2017-01-07T03:00:24.897000 -CVE-2014-4980,0,0,c0141ee402b5b596a09171c40454b4421121aeb9f0aec233fa5363e07f8ae952,2018-10-09T19:49:54.473000 +CVE-2014-4979,0,1,d80673120911893d6a7fdd3e20e2322dd5007d1eb80055662328aa7d3dfb1124,2024-11-21T02:11:12.817000 +CVE-2014-4980,0,1,9b122f5f2136daf8633f0efe8483b791f3e1221cc2586998ba4d8c19123b20c0,2024-11-21T02:11:12.953000 CVE-2014-4981,0,0,ac108e546d6ac0b2292127991f89e16e5943633415cd2cae8f97581870166b63,2020-02-20T16:15:21.157000 CVE-2014-4982,0,0,c28397d6889f343203dbc2c5b007531a3dc637a9ddac8b19dcdd91c68685b79a,2023-11-07T02:20:41.813000 CVE-2014-4984,0,0,e855f189cfa991904b2d46cb528313e1dd5417f233588ad5e701cef733c55556,2023-02-01T16:42:36.747000 -CVE-2014-4986,0,0,f023b1c72b48a8f110b8254c3002086f24019c4a7cd72dd56b456b8aff526907,2016-12-22T02:59:16.500000 -CVE-2014-4987,0,0,e3c925ba67a9a9dc2ff74899ce67e686f2d31b592e676f499347adaa27e3b376,2018-10-30T16:27:34.687000 +CVE-2014-4986,0,1,f6079ace2e512bb42db5ce1eed60e35824556e42e75c2fd1457bb3be5cbf73c1,2024-11-21T02:11:13.507000 +CVE-2014-4987,0,1,7cbaf9859ddedf8ad799371b069873f86e1529c5c45b392de6f5564638f211bd,2024-11-21T02:11:13.657000 CVE-2014-4991,0,0,76025ce701c983c00cda832a5e878e0ce9ca8d78d44431dcc39e896680c38090,2018-01-30T15:16:18.420000 CVE-2014-4992,0,0,a829464ee823883487d10636c46e8fb4d44c9323ecb152bae852a50ca31ca956,2018-01-30T15:15:59.200000 CVE-2014-4993,0,0,3d0c39647d13616da75a3c18b6511fdc50fda7202ed33e6012e1bbdec648434c,2018-01-30T15:11:32.647000 @@ -69021,8 +69021,8 @@ CVE-2014-5001,0,0,0012b9b0addcd3d15fd16e2f10e14aacb372c145f225d54d31d46081f40beb CVE-2014-5002,0,0,deec29a117d87508e6b51a325ac46698e45d063e71c5a67d15f5aa7c45d0a72b,2019-05-06T14:24:53.237000 CVE-2014-5003,0,0,fc927b70295203bbb32bda2d07f3046b66040ce6c558dcfd76673e543b75c632,2018-01-30T19:13:38.753000 CVE-2014-5004,0,0,7b1bce533ed0eafb16e0c4b38a752e148517a3b853bedf8b0ea79b67a7a905ed,2018-01-30T19:15:15.803000 -CVE-2014-5005,0,0,da169e321f3cc8a0c35f318fd98a8ee9d3881bb8d724a5c59243809a57c34a89,2020-01-17T22:15:11.547000 -CVE-2014-5006,0,0,413d0739dbc8c81d99e5b52f813ee243bd5a5675080ff2070adfa8a2a957d4b6,2020-01-17T22:15:12.140000 +CVE-2014-5005,0,1,e1b5e09aae71ed3397db278e45ea70beaeaf6c0867396078c8b0c2382ee3eb81,2024-11-21T02:11:15.810000 +CVE-2014-5006,0,1,29ff46a1c9c852718cb3b57c086e9f841a80118d7f093d4e7dd23925e5d1718f,2024-11-21T02:11:15.957000 CVE-2014-5007,0,0,1b06b9fe62a78a271f6a7744e352cde97664e0455b8b822bc1ab645b0a533669,2020-01-29T15:20:55.697000 CVE-2014-5008,0,0,060a17d9370ed195097eed0dc327672b1a24e4dd8ee12936e08d97e71dacb0ae,2017-04-04T16:57:06.027000 CVE-2014-5009,0,0,e766100cf48680940110fe7f6a05d822557e9f8708e7e5c6ec28c7bb44deef87,2017-08-29T01:35:10.890000 @@ -69030,158 +69030,158 @@ CVE-2014-5011,0,0,db192bd3ff39c67a3a6e68c3fbebf02a01bcbfa8e835295916d391cbacb63a CVE-2014-5012,0,0,7c6374fd2ec6c53f8dde2bb5d3efc20cbaa24622427e730720e97452b6891261,2020-01-13T20:59:34.900000 CVE-2014-5013,0,0,3a18490831a625678ddc408bf48d0f0da4a9bd9f8465ec6291b6ec5fd96a11d3,2020-01-13T21:00:48.873000 CVE-2014-5014,0,0,f31f575fca0aea5f164d4555e18969f3ade16510b7aee23c50e14cbcf86dc8ed,2018-05-25T15:25:48.343000 -CVE-2014-5015,0,0,60a7094a9956a479380d59f1227222f1fcb7077ba2285709bea3f0cb2a44ed18,2017-08-29T01:35:10.953000 -CVE-2014-5016,0,0,8fe832b5dff4d28b046cf7a9d20329798df580afdaba0ae62caa0791dbd45ee4,2014-07-22T13:58:23.813000 -CVE-2014-5017,0,0,7ebcc03899506951a89b5d871f972eab09cb816d7efb496fca8278caf9fec172,2014-07-22T14:01:32.023000 -CVE-2014-5018,0,0,95f0c63f5c66a37af4a1def68aac50ce0b74919c94962e16fc584b29da8335b3,2014-07-22T14:01:41.993000 -CVE-2014-5019,0,0,6121d3aba014b145c71aad6aa603683bd1e43d5be18483fdd9c17af070bd8c80,2014-07-22T19:00:15.103000 -CVE-2014-5020,0,0,35d620ba6043ae431b0b3554559cda00e44095d1f63c7abec3cc29632f8b5e98,2014-07-22T19:03:38.433000 -CVE-2014-5021,0,0,f8c767b4987832cffbe4acd5953b5d49e503ab2e292b06b270de2b05c54c6573,2014-07-22T19:10:21.077000 -CVE-2014-5022,0,0,0ae7091277f1c5cc524a61e11d54b03452dab3d51e79773201020ace67845a46,2014-07-22T19:21:44.377000 -CVE-2014-5023,0,0,c0e98580b0b04c13f7a1311bee75bb0bb08062c524db42327f686ec90fd94f87,2014-07-22T15:20:56.900000 -CVE-2014-5024,0,0,69c7d2e75ee10ded0391659aeb3385a81be2615e436e82f57447dd8b019e763e,2018-03-12T17:24:32.027000 -CVE-2014-5025,0,0,16b37d5dcf118fa7e594db4ce61453aba52c16486606da063ed2c8ac933c7d7d,2018-10-30T16:27:35.843000 -CVE-2014-5026,0,0,e62b8ac72364cba7988e2171ed6e56b81d95f895b5be59a83eceb18c1660277b,2018-10-30T16:27:35.843000 -CVE-2014-5027,0,0,c5fbd083f167572b064b7d9b47ee9cc0cdb255b8faccb6a6a868ab5dd7fdaf78,2015-11-27T18:39:22.487000 +CVE-2014-5015,0,1,c3663b3597d62f3c7a2f1c1f8a88d80fc55ffdc3a716960e64f04038e10e8998,2024-11-21T02:11:17.127000 +CVE-2014-5016,0,1,a67e58ba972eb5575e3e3ac420d0dfa58801bc0163ebbe22130a8a3c14d99ece,2024-11-21T02:11:17.247000 +CVE-2014-5017,0,1,4fdcdaa90b5080e0d05abe5b836bff1924437434a01f1824ee1702f1e90e69f9,2024-11-21T02:11:17.383000 +CVE-2014-5018,0,1,4462d71d3bec50ba69e7f11fd175f5598af8f230ebbb57509633c7f89591c4fe,2024-11-21T02:11:17.527000 +CVE-2014-5019,0,1,78b56480e8c543f8b41bf8e2b783b5dc4991ccb4a0c24356ae44c8bbcb293472,2024-11-21T02:11:17.667000 +CVE-2014-5020,0,1,fb62f7ecde20509ee5ceb53fac1158bd68eb3b936912933da7b16d2c75c3f8de,2024-11-21T02:11:17.817000 +CVE-2014-5021,0,1,f85befe83cd1d9c97bcd419c6a89094bbc1f03e18cd593db62f6aa60d34bab8d,2024-11-21T02:11:17.970000 +CVE-2014-5022,0,1,16623339cc9b487c7350ebd7a3244db213a7eb42ad42117f021a6e88ccedfbca,2024-11-21T02:11:18.123000 +CVE-2014-5023,0,1,083b934133ac06d89b88c4f750196592646a288df1a171395ffee676a8e6429e,2024-11-21T02:11:18.273000 +CVE-2014-5024,0,1,5c9879c45fe7360ef9ac3ca82f4c5586a5ba9e85fc6bf6dbd4b6b72350c59b78,2024-11-21T02:11:18.413000 +CVE-2014-5025,0,1,cc1b042857a5113f142e1c94133565ca8f9bea61544b1f165a3f22a61ca439a6,2024-11-21T02:11:18.563000 +CVE-2014-5026,0,1,94dd8dfdcb9e816f1a05fc782592f278d99e7c1d3a77f411e1c1271d353c0e89,2024-11-21T02:11:18.713000 +CVE-2014-5027,0,1,e30871ce0c384b7cd5d26350105ddb80a4d9f2e08d46186c840bbb61bc0dd6cb,2024-11-21T02:11:18.860000 CVE-2014-5028,0,0,6a351c78de8ee74fbc113f64a1de2222e0e38b113ae8eadc634d790c04263ed4,2018-04-24T12:58:15.873000 -CVE-2014-5029,0,0,ec0404a383bab9ff9c7c1ebb9986aa4da2d259303dc2e1da568f725d9575ea97,2017-01-07T03:00:25.037000 -CVE-2014-5030,0,0,216aa96ed25280ab7cad88fc328414162a2ed32af2f9f2d0b76d9c410c14d5d4,2017-01-07T03:00:25.100000 -CVE-2014-5031,0,0,9fe59a540afaf587deeee4a0ff6f5681a6b9ac3f119404f9a1323c4d7c839f8b,2017-01-07T03:00:25.163000 -CVE-2014-5032,0,0,2bb0e2bf189087901b403e6d6c3e19653301025e93139427da249bd913a6d274,2015-04-15T15:19:01.667000 -CVE-2014-5033,0,0,7bee0cbe433012661e99f5213895af15c96993a280a9a97585a750ec41537078,2014-10-16T07:22:55.077000 +CVE-2014-5029,0,1,85e775eb37afd993e7b8487d6b5ad65cb2f6bf6860afe244d60c8b965a4a399c,2024-11-21T02:11:19.173000 +CVE-2014-5030,0,1,79a5c0c2423d3b8b760a3a01302fbfb551c64366ba4ec3a6dba3b283daec34d0,2024-11-21T02:11:19.293000 +CVE-2014-5031,0,1,4700d4c57ebd44612bd20c20e01416376c84625339715ec68197d7c03c9c4032,2024-11-21T02:11:19.403000 +CVE-2014-5032,0,1,5b702ea469135fd78c0d0f26cfa4f772b7d47f0feb4b5e06f30285a43ce7aebd,2024-11-21T02:11:19.520000 +CVE-2014-5033,0,1,20380eba9a22eb841b7774683ec9d2e4b9e0722cf980af2a96111088eaf5c94e,2024-11-21T02:11:19.663000 CVE-2014-5034,0,0,4d304ac1f913a5726f74c67bdd2d93935beca6275e3a6eba585097ffc5f40a86,2018-05-09T19:00:17.810000 -CVE-2014-5035,0,0,190c771d9597e1466e8c6d20fd7d746cdc2e323d52cdfe466006e872252a6782,2018-10-09T19:49:54.990000 -CVE-2014-5036,0,0,946ea4b9d02cd664fa9f7275ee3b0e57de9e00c2829474442e3e6dbb4f7db8e4,2014-09-08T14:32:10.377000 -CVE-2014-5037,0,0,82b1614a09c699b2aff4b945befbb7a9d894732c314f5738a8387bf35317b5e5,2014-11-10T13:32:04.303000 -CVE-2014-5038,0,0,6bf23b998af827eb7e234db29d6da135a8b4f54e3fdba361fda00a0ac72b732a,2014-11-10T13:37:10.073000 +CVE-2014-5035,0,1,2d190b3f392e3e9b5b54e132358444814467a6e5fe22125a2a1086804f2645ba,2024-11-21T02:11:19.963000 +CVE-2014-5036,0,1,0458241fa16402a35622bc233bcd4073080a581a1b0391d18be8c207738fef91,2024-11-21T02:11:20.110000 +CVE-2014-5037,0,1,780b9fa5e44d0e780691ac498f7a073fcf25e452c0c39ef9e850131282b40cbb,2024-11-21T02:11:20.253000 +CVE-2014-5038,0,1,3b5e0b2b1c00c47617abfadfaf330cc0dde0ef79e45a2720ae87a5024d24c21b,2024-11-21T02:11:20.397000 CVE-2014-5039,0,0,bf1d8079212b8d9417eac058c1b14b1b9695d9f7e81d79266013b12a85270fbf,2023-11-07T02:20:42.307000 CVE-2014-5040,0,0,7eeed29bbdda31245c1656b24578e742ebf34f9278cd6c5a0fc46bb904a0afa1,2016-01-05T19:42:07.010000 CVE-2014-5043,0,0,81d392b76c81116395ac7ab88e4a09f364f3caff4e0302170e0428a28328ed14,2023-11-07T02:20:42.373000 CVE-2014-5044,0,0,fc6e1db29937fcd98a65156e85870637bdc26bce4ef521862f90ce29999b6dee,2018-03-27T23:48:59.697000 -CVE-2014-5045,0,0,c1e8bbbcc3c7cca6b18fc47e8fe8a9787e9c0554244c9d1f346802658536a983,2023-11-07T02:20:42.420000 +CVE-2014-5045,0,1,2fe633bfb6754182941db9260da740507a283e52feabb6fe0d8b9ccbf6fb4cd7,2024-11-21T02:11:20.960000 CVE-2014-5068,0,0,3720b5c4f169fa0937f9af85a2e28431a4276ca5ac655df04228a07354cc5b8a,2021-09-13T12:10:26.513000 CVE-2014-5069,0,0,aa45a6b6f95ac409134b055d56048f8070d37392f592958ec19fc7011b0d6d11,2021-09-13T12:10:15.990000 CVE-2014-5070,0,0,f76ca9dc7615b5333175226c53760b5961c89be36fcb5dd6a7743366e055b174,2021-09-13T12:22:25.770000 CVE-2014-5071,0,0,4abb81c5b3b24033a2da833f190f4e209f1408930f731391de1b182f9cdaa2e8,2021-09-13T12:10:21.060000 CVE-2014-5072,0,0,6de5f13233dcf73827a62a36bab83e78f76ddc844f26cf4964d0b729cd90a732,2018-05-09T20:40:22.177000 -CVE-2014-5073,0,0,29c7c9ea6b8c0377da039b95e37c66bf3d60728d86032869203d0c50330bdd7f,2017-08-29T01:35:11.203000 -CVE-2014-5074,0,0,cbdf7cab08f1c5600c0af1584fd5cfc90922160ba31a75fa13f582f46960f4ec,2018-05-25T01:29:00.367000 -CVE-2014-5075,0,0,d75aac92f326ecbe04ee903a15fd54a5fd0a3c0282993d6266e045781b621b1a,2016-11-28T19:12:33.010000 -CVE-2014-5076,0,0,49b77fe5425c8df88b677a6d327ff4fbec6b1afa89650771b93e851d39f9a63d,2014-09-02T19:13:12.623000 -CVE-2014-5077,0,0,92cf4ced6e0f87b7cb6ff5579e2313ab1c57af7236754b6f4bb1bb46ccf70e28,2023-05-19T16:50:38.867000 +CVE-2014-5073,0,1,8d029134f034328d09175e27f3efb3f190f849a026d049e10dc128a133d91259,2024-11-21T02:11:21.867000 +CVE-2014-5074,0,1,62f3d56fddefb0275f68255c6fa162a30d4774410b94db43e4e4568a33f6f050,2024-11-21T02:11:22.020000 +CVE-2014-5075,0,1,77a5ecde8b517b7bf51813d79a2179d2d92ffa57ef233a051e0636d078ad66ef,2024-11-21T02:11:22.170000 +CVE-2014-5076,0,1,de218cf0e906ac6582345c97b2a2b97423169cc294ea621d8c732e8f5c8f078f,2024-11-21T02:11:22.317000 +CVE-2014-5077,0,1,b808f26a0eb26365a4371fd1eeb55a531535a33e8d2edc772bf464d9e31d7a7f,2024-11-21T02:11:22.457000 CVE-2014-5081,0,0,23fa216a16a23cf33b9aa6e41e5da3128b952a75828fe9088cabcfe6db75372b,2021-08-16T18:11:09.960000 -CVE-2014-5082,0,0,36c2bf91a708ffb26609e198e3f6295b1b4e57d67fee5fc883560d36602be636,2015-11-04T16:32:56.260000 +CVE-2014-5082,0,1,d45e4b9f8f9e90350d31cb7fe33866b53c2fdc4b26a314a0d7b7de34baaec1b7,2024-11-21T02:11:22.777000 CVE-2014-5083,0,0,67127e5d9d970a764fbfb41b61c8582bc583d654f3b4e3dea969cea1c46b37da,2020-02-14T19:30:40.557000 CVE-2014-5084,0,0,ceb5fa06a1fecb97f8b5ffb1ddb6b0c790fedc2a09a400acbd0644e2972bebff,2021-08-16T18:11:15.120000 CVE-2014-5085,0,0,ad9da5bf148e7561544dfd38be295cd7261832d2ada2a9ceb5adc5d5502cb32d,2020-02-14T19:56:18.923000 CVE-2014-5086,0,0,8654c5baee851a92980fb9f400df38ce808a76bb63f7a14a03cb12fa63de78b0,2021-09-09T13:38:05.480000 CVE-2014-5087,0,0,e03df241bb489402266ba0ca5df21a6a4329dea4edfc8ad13de0db292295b74b,2021-08-16T18:11:09.960000 -CVE-2014-5088,0,0,295a3df7c3b5a0c0dc03c0b6034d0ab788f7f0fbf8740fe365a9d752741f49e1,2015-09-16T19:31:00.697000 -CVE-2014-5089,0,0,fa7ea5c0e9987974c42e6950b3cb5b6b23f8cf0a553fba02539bcdcf116b2ff6,2014-08-07T12:12:04.307000 -CVE-2014-5090,0,0,822ecfd1e8afae26a36a5afab253daefca61f046a238f9411df686f7b8a6f62b,2014-08-07T12:13:38.153000 +CVE-2014-5088,0,1,af5c1a4bb5318d06b2c2ff1d454ff154267d9fb2d454c1b4fb09866b6f126136,2024-11-21T02:11:23.663000 +CVE-2014-5089,0,1,03bb41f363c5ae877b14a33d5a85da78f1a5d72b51f37953212bc521864788cb,2024-11-21T02:11:23.810000 +CVE-2014-5090,0,1,8ee9291cf40f50762fd8e3ae913bf82457a11e055a9f87a7ed2abd03d0f8118d,2024-11-21T02:11:23.947000 CVE-2014-5091,0,0,3fe9798f5e83e3c48caa591988cf08bee0a90fb54652a3a1c99dc260897c3ed4,2020-02-11T01:38:03.123000 CVE-2014-5092,0,0,d020d123b5de1ded9470887ad2b3eb9c4b494070811be5085ceb9a3c16e14d65,2020-01-21T20:23:09.923000 CVE-2014-5093,0,0,62abc268cb72e7f9e3dad0e40d375b98301e999f5e03d13fc6bda940e2286936,2020-01-14T14:46:22.537000 -CVE-2014-5094,0,0,7f6373ef68285801a062ef7cbf028c613fcb496c596809c6c6fbf56c94d29cdc,2017-08-29T01:35:11.390000 -CVE-2014-5097,0,0,b7e0b389785ace55bb38c418a0434876584a9c9cac0d3a8781bdeb6160d1be9c,2018-10-09T19:49:55.350000 -CVE-2014-5098,0,0,2081216d1f3e5efbb42410fe32fbcc186a37539a28ffca1ef2e5973bbc3018e3,2018-10-09T19:49:55.693000 -CVE-2014-5100,0,0,f376228c349de271ded9a3a887f9d1eecd608dec9717f5a068414eb054937850,2017-08-29T01:35:11.437000 -CVE-2014-5101,0,0,52a877a35acd6f7110f7144d2b7c8400a6b9a4952870de9fe9a9574ac54dcdf8,2014-08-04T15:29:25.050000 -CVE-2014-5102,0,0,1eef72452e4f12ad687b55d211b3486182bef9c192489013f0c8075ea74e2a4c,2015-10-06T02:36:42.567000 -CVE-2014-5103,0,0,b2007d521691c4f647e1a0fb984a270d325537305e959b45ff8735b5ee500013,2020-03-26T14:15:12.417000 -CVE-2014-5104,0,0,60bdff4563a6e211a54a52076ec6f8d8c204ce128bc6e4958ad40464216a2294,2014-07-29T13:04:46.570000 -CVE-2014-5105,0,0,2d0d5b21c614cff313753cff2dc38ea25ea057b6ff1eb711d63b36ba701586aa,2014-07-29T13:05:37.980000 -CVE-2014-5106,0,0,9f8edf23379261997d7caa15a4321022b1404a837745d5c2aaa141d093f82ffb,2020-06-03T14:54:57.137000 -CVE-2014-5107,0,0,e43254f13250e8d592c518f0534dd9f05bafeb3d5ddf43aeec83972e74a554b0,2021-07-15T20:42:50.310000 -CVE-2014-5108,0,0,3e513ea2ce8e164e01959c8855e0e0a5d334b22ac3468c40743cbc4d799a2341,2021-07-15T20:42:50.310000 -CVE-2014-5109,0,0,8ffdea3fbea0048fd6e73e64e1dd03efa4d04bdf20bb8396bc6f181c6b8a9c92,2023-01-31T19:13:35.937000 -CVE-2014-5110,0,0,f690d2816467e871d15c473bd8d0d9024997c6311d3d70e41c6a29d8265b33c0,2023-01-31T19:13:41.667000 -CVE-2014-5111,0,0,129f05cd00f7d55d1ce32a351f74c6f8881b90a31bf18308a33875e8311ac722,2022-04-18T09:37:06.073000 -CVE-2014-5112,0,0,68c3389ff877f86643706d0e72bf0e264dbeadb51469db1960519371f01593f3,2022-04-18T09:37:06.077000 -CVE-2014-5113,0,0,e05672d0f24de4fe67d3fd3605ff02e5a5dd8410a53991a9a2844a217af572d7,2014-07-29T14:18:13.737000 -CVE-2014-5114,0,0,5bd5592eabc9d78a771fd631139b3cd8ab2b3a3b42ca20a7ca939a62005b63a2,2014-07-30T17:02:32.653000 -CVE-2014-5115,0,0,ee7fbaefb6624b7ef767d59b511f2bb113da4cffc1c7616618bb4bc12523b163,2014-08-27T05:37:20.580000 -CVE-2014-5116,0,0,f503ea2d09d474243683ce7eacb1d814ac09e1bdee2f5bd7e6732872e61fdac5,2014-07-30T17:18:48.997000 -CVE-2014-5117,0,0,56b18c94e3a872a373cc71883b7d1f103d7256d530372fe2affac5118c80f020,2017-01-07T03:00:25.787000 +CVE-2014-5094,0,1,5a3ebb6a51089ede50156005edf5623bc093db0dfeb5887b058140c92e3c3283,2024-11-21T02:11:24.523000 +CVE-2014-5097,0,1,f7977d62716ff4f8034cd8f8696b0ce249d255fedb0d9307d3c0bdd53d976847,2024-11-21T02:11:24.667000 +CVE-2014-5098,0,1,29069fc9c75f825b4feffce46df2ec3b4da72fc59768dfcc17c2d6e5d1f97051,2024-11-21T02:11:24.810000 +CVE-2014-5100,0,1,b1c90984ab80af365f231d5a5ef11fa02a4ee0281fe0eb8e3f59e291fdb26375,2024-11-21T02:11:24.967000 +CVE-2014-5101,0,1,0c98071a57963502d6f86ab6d0cca1200f00b47d744a6607ee4caca056dd71df,2024-11-21T02:11:25.123000 +CVE-2014-5102,0,1,e6ee6f787d0a3d48720c6ec723a5eeff80f914dbbc2127e83a9ee22f0a856346,2024-11-21T02:11:25.293000 +CVE-2014-5103,0,1,f660a7133d1197e77cbbad82aa3cb48525d2f48af19e1c0afc126ca1fc979e96,2024-11-21T02:11:25.450000 +CVE-2014-5104,0,1,4cae56650259d667658244a9b78f308256a3caa2e897cdbcaa135b89b73898f8,2024-11-21T02:11:25.590000 +CVE-2014-5105,0,1,e181d0f310de878f47138cb153283b2b806ddd803bed0cfa2f1109bb875368d0,2024-11-21T02:11:25.733000 +CVE-2014-5106,0,1,e5f02661849309bc423e7643d6832c0a7785393acc2ae2f802e149de97d2c52f,2024-11-21T02:11:25.877000 +CVE-2014-5107,0,1,0e06b01e406cc6609f06e5e687382ed5ff307077879be5b7646f8d8d5113ce00,2024-11-21T02:11:26.017000 +CVE-2014-5108,0,1,b9e6a61d303cd9497b626525f1c8a63ba5cad5f370f78f2d6b94a9625efa5dd4,2024-11-21T02:11:26.173000 +CVE-2014-5109,0,1,37276e606ff77cdb88dc977affecf5836a0a215fd7706a997971f9e2bb3d7d91,2024-11-21T02:11:26.320000 +CVE-2014-5110,0,1,96e976e86414f0be895b24666587f8fb71646463a7ee0ff92b6d81142966dca3,2024-11-21T02:11:26.460000 +CVE-2014-5111,0,1,39b06c0fe2997cd5ce2db8b427a8c7c71fdbbba7f526abe10f10833d57865e7b,2024-11-21T02:11:26.600000 +CVE-2014-5112,0,1,d63db64a0daeefb9c3235f992364862661d4829e5604a29cea2d5c6d9c7df1e2,2024-11-21T02:11:26.743000 +CVE-2014-5113,0,1,759fb32462d93619c0e7af74d0e88644aff6c1e2a7704f02f9e868c49b5153db,2024-11-21T02:11:26.873000 +CVE-2014-5114,0,1,1a85d4eb492fcec058873f57cefd9fb6216261668b48f4a5c83bc620301eb443,2024-11-21T02:11:27.013000 +CVE-2014-5115,0,1,96cf4262ae254241e79e8873e7ba2f21af5ff2e8f0e2e466a5f4a32412c2dbb3,2024-11-21T02:11:27.160000 +CVE-2014-5116,0,1,70312a87959c19d822b783533aba9ec1cd78b3444b7c56aef07c0270864f6ce2,2024-11-21T02:11:27.300000 +CVE-2014-5117,0,1,e8be87ea2d2953e984ddc85f8999d2dff89b0b9ce09309fb1fb1558e8c10f364,2024-11-21T02:11:27.443000 CVE-2014-5118,0,0,3219fdf7b0061a8d0b4b46936b8389d14dba52188fd45d8aa7fa7753f06deb57,2020-01-10T14:15:10.467000 -CVE-2014-5119,0,0,b7c6937fd751fdf922ed9f63fbe498e19c0bd3d5b4e0534fa9db6f1d7c93ddd9,2023-02-13T00:42:19.853000 -CVE-2014-5120,0,0,5780552b020a803bee446400d31f4fd99099900835d195f32147f550303aee85,2016-10-26T02:00:09.597000 -CVE-2014-5121,0,0,a2e01c05ac8b7d04d1445b82ab4e14c8c71d61f3e0ce908e304e6bcb50728399,2024-05-21T12:29:46.173000 -CVE-2014-5122,0,0,aa2936f9f03c6d6bf38ecdf4b168496e54d0f5a4e5d7ca4b2d8f0f4d9c2d4f48,2024-05-21T12:29:46.173000 -CVE-2014-5127,0,0,9c1efab500657efda7ec72b98f0416dcf623b3041f96d156dbdd7b0c54d00746,2018-10-09T19:49:57.207000 -CVE-2014-5128,0,0,501459f8216184c58b2b9901d3547aee82f64cedea22dff4568577d6e50b6848,2018-10-09T19:49:57.583000 -CVE-2014-5129,0,0,e390fe9f069297ed52922cdbfde794e7d62cac94ed4fb573e7ef89e0a55f20cd,2019-03-11T19:36:19.887000 +CVE-2014-5119,0,1,c3a97c81a999ef61ce0c0516fd2134771b7789d565937f2d9fe5570911717720,2024-11-21T02:11:27.753000 +CVE-2014-5120,0,1,c570361e440f26caee518b8383d29cc2409bb5a8cfc6a7667aea617ac46986b6,2024-11-21T02:11:27.917000 +CVE-2014-5121,0,1,b363c33a8562c339a052ebe4fd9d931cf5c48cbb165f7c431ae511335f3c7107,2024-11-21T02:11:28.093000 +CVE-2014-5122,0,1,b1517a0f7b0dfea715ee05a8030d4aa5487030a75599af1e5e99865870c5de02,2024-11-21T02:11:28.227000 +CVE-2014-5127,0,1,3dfcaee7aa05497c9337c6a56709d280a509d34867129e69b4aaa0a044078219,2024-11-21T02:11:28.360000 +CVE-2014-5128,0,1,619fffd578b7fec83ae8d17af2957551e321690f491837595e5f3699c8ea9472,2024-11-21T02:11:28.503000 +CVE-2014-5129,0,1,900939a47067363f80cfda3e1243b546fb9c15a78b87e3f05058becbd70c7cea,2024-11-21T02:11:28.640000 CVE-2014-5130,0,0,22d0f03b08b6d1f536519f14a2a0c4b54dfe8f9f1b65cfa53dbc1a58c5bc01aa,2019-03-11T19:22:38.793000 CVE-2014-5131,0,0,837570aa2268556f353380805bb04b56fa832675c923106020aba385f9acd841,2019-03-11T19:26:58.563000 CVE-2014-5132,0,0,ecbbb3c3bb62833215a2d388f003d26aea74369c7a187038505a8ec64376f2ab,2019-03-11T19:24:57.373000 -CVE-2014-5136,0,0,a917e80e07997864a46bb221b378da3dd2b7c54b6ec935e4abb84b8949c4014c,2018-10-09T19:49:59.177000 -CVE-2014-5137,0,0,2b4bb65b798f9a49c6adfe8cec835e435900a83d312ceb5ab7f2aeeb0441db9b,2018-10-09T19:49:59.367000 +CVE-2014-5136,0,1,5b4aa75dde0515445699f32bf85499f60939cdec72b68105083c389bf6e39111,2024-11-21T02:11:29.210000 +CVE-2014-5137,0,1,703966d02011bf340aa1ab225f6ce9b63e1393759dda53b6de641015ee746cdf,2024-11-21T02:11:29.347000 CVE-2014-5138,0,0,862e8bd6d615e0cf367e172569d9a6dc1714201c3806340c795391f57d3d8753,2020-01-21T16:20:54.793000 -CVE-2014-5139,0,0,d9db0fd657b063a5bfd47c6422de5bb44e72d2c6dd7bd4e19851d9a66b2e6bd8,2023-11-07T02:20:43.020000 +CVE-2014-5139,0,1,a5a258ccab2badfa870441b6fa15f475fb80bf955071616bb346eedebfcf13ae,2024-11-21T02:11:29.627000 CVE-2014-5140,0,0,c5975896d856b63ce9fe2742c5f64aff3f94b9d9eaf524731b9bfd9cb5b38dcf,2020-01-14T21:26:01.317000 CVE-2014-5144,0,0,d498f0f3cdbbec55bd2bfcc4065a21f7a2b1d8f53de03eb77f7bc2ef03d8d01b,2017-08-18T12:18:12.707000 -CVE-2014-5146,0,0,d317c1e6d004d46c6ccd021507bdcc3ee9c2733629dd140818f29307658ad82d,2018-10-30T16:27:35.843000 -CVE-2014-5147,0,0,3716cb23634721bf326fd88494928f14c39be1282b20b99ced66c96c429cb7f1,2018-10-30T16:26:53.700000 -CVE-2014-5148,0,0,6a73c8e54d85fe928c170c3876cb20b3e01174c20b69cfbc2ce49296f12a6b11,2017-08-29T01:35:11.907000 -CVE-2014-5149,0,0,bf89fff2b7d7fb1898245bb39172b1690d6a6dcf714f55e192c833521f8f3f2a,2018-10-30T16:27:35.843000 +CVE-2014-5146,0,1,c74788a3d0ab8aae7fac653a3acffd56ae21dfffa7eddce2ba4f4fb635861897,2024-11-21T02:11:30.110000 +CVE-2014-5147,0,1,71b687e1615fe13be5d032cee0b42a0d68b71fa72c275bbce2c60da76f74970c,2024-11-21T02:11:30.297000 +CVE-2014-5148,0,1,8a5b84bbe2b6b986a5c73176ff7bc56a4e11d16dd7b1f750051cc491216c523f,2024-11-21T02:11:30.450000 +CVE-2014-5149,0,1,606849fd29d8b9b4b37b1acfea2267a96ed0f1e936fe0af3a1033a6ac3603daf,2024-11-21T02:11:30.587000 CVE-2014-5157,0,0,20b30f94262d35528c8c4054941678b4012e0d73ca1bb989ac5bc05faea16745,2023-11-07T02:20:43.213000 -CVE-2014-5158,0,0,69b174d059b5613fbc8787663238e346de163fb5a34219ad608f575a9d07052b,2014-08-21T16:49:13.957000 -CVE-2014-5159,0,0,cbb914a4ffff4faac8f656bc14172cec1f496e6b93a106c0c0a79bbaac7e0927,2014-08-21T16:52:27.390000 -CVE-2014-5160,0,0,4b2352f6464a75082758270dbf5c3391ffefca2a37eee1b8ed504162c9b1e1f0,2024-08-06T12:15:31.283000 -CVE-2014-5161,0,0,a5733c5886a7fd117f35743a4d62fb2ad6f5bf3a7398054dce26553f65b41efc,2023-11-07T02:20:43.307000 -CVE-2014-5162,0,0,55a074f06578f9c03bbfb061862adc51ce82414234c86ddb99e28cc655d69793,2023-11-07T02:20:43.360000 -CVE-2014-5163,0,0,0d197e409f0d56efe3be7ebc23f3a7a6c6ce2765c03651d4015b2d3f057df755,2023-11-07T02:20:43.433000 -CVE-2014-5164,0,0,be60a8d6af8d58de5273c6552c79a25c341073bf5d0a8f102ac336defbd87b53,2023-11-07T02:20:43.577000 -CVE-2014-5165,0,0,1673f6b4af57520036f394482d0371df2c3e44d08ce82e653c4f473a5ecf1b1c,2023-11-07T02:20:43.647000 -CVE-2014-5169,0,0,2f5156e26b9f3e702da43f4c481baf202d72c10e60bb82d88fa539633fbedba7,2014-10-24T18:11:47.827000 +CVE-2014-5158,0,1,097590a5987efd36b1800a5843be3e0774e123333a3ad77a7a8a9f35465b88b6,2024-11-21T02:11:30.760000 +CVE-2014-5159,0,1,25480574ff8f00d9162c7beafed572e1d555d25368960acde4f3a7d8bb74c748,2024-11-21T02:11:30.910000 +CVE-2014-5160,0,1,b39416d140cdcc232220a0a3ce329a4a3719042bdeadd395dc39ceeb9cd45806,2024-11-21T02:11:31.067000 +CVE-2014-5161,0,1,e37969a46a603d3695e83a5942a3799c0b5d6baddc25ea29d9caeaeb024a847b,2024-11-21T02:11:31.207000 +CVE-2014-5162,0,1,c04dda9a26d419065cb0a6d95fa1f23107bec2efd39bcb1aecfef15a7c275ac8,2024-11-21T02:11:31.367000 +CVE-2014-5163,0,1,d0275ee71213845b0c2074d73725d501c7b1143bf87cda61726efd92976e58c2,2024-11-21T02:11:31.527000 +CVE-2014-5164,0,1,1609919f73e0f6cd8102a533d5089b98d49bbef87b8a3645c9c093e84319b99f,2024-11-21T02:11:31.693000 +CVE-2014-5165,0,1,d95f232ed19ccfbe97ed0e28f1ea35e9cb169f9e496db3af1a725d6d80e26fb3,2024-11-21T02:11:31.847000 +CVE-2014-5169,0,1,2fbfbf159de9be47f40c7c67cb0e2bff81deabe9f20d790d88bb829202cb6614,2024-11-21T02:11:31.997000 CVE-2014-5170,0,0,84e688df7572f4d2558a9a52961c9fb515a0aff0f3a48ceafd1b9b6d23f1c164,2018-04-27T16:05:23.880000 -CVE-2014-5171,0,0,3b3417077c7023b18790ffebb6f30901e1562d27210221bccbc44a098f3db467,2023-12-21T04:14:54.460000 -CVE-2014-5172,0,0,59f9406f0f629ca7ab957889d86dd276bdc6746bbc87680ac7cd8c859bd275ac,2018-10-09T19:50:00.053000 -CVE-2014-5173,0,0,297b32160de62a1525595d883543d1f80d135a49242ba39bd4b05a6e546b0151,2023-12-21T04:14:54.460000 -CVE-2014-5174,0,0,4d1598180ea9e7a71ee8e27c9235b509d95d45da4496dd43cf3ac9bd671d5090,2017-08-29T01:35:12.157000 -CVE-2014-5175,0,0,65020d8a856b742777349ffd1e6a925cc09818854bc7cb23cfb7d9a8b65d0f6a,2017-08-29T01:35:12.203000 -CVE-2014-5176,0,0,142c52ecdbfc9d7dee1099084b5ba3fd29870685e7d8ea79d9104c31924a1265,2018-10-09T19:50:01.617000 -CVE-2014-5177,0,0,3d90982a9abd8fb876b5cb28402cf2f1ccb97bfba5f55f783369275a584b4e2a,2019-04-22T17:48:00.643000 -CVE-2014-5178,0,0,2bad020b3d199f9f2a01e2d79356f3a70e1f0d65383e6047a67ed5fab5811c9d,2018-10-09T19:50:02.317000 -CVE-2014-5179,0,0,9216d5cc6ff23ec5500ef5acb653b7bd76c780ba127c2ccc4c9d7c16f77e3e76,2017-09-08T01:29:04.260000 -CVE-2014-5180,0,0,99a139a064b09767b837ae0d468f932422efa5dec50a8005ee0ec2bbd5e85318,2014-08-07T12:30:21.913000 -CVE-2014-5181,0,0,5a08374f83ebff664adc476c0085fb4b26c5cea2e586449c7844881d3329e6d9,2014-08-07T12:42:43.947000 -CVE-2014-5182,0,0,16d1887537e1fdab9b44cf29bf7aef74c4772c0824c5785b5150d77dfd5d27c5,2014-08-07T12:46:24.307000 -CVE-2014-5183,0,0,bd52781ebc07251122bf7670f2856b2d9cfa57a69449c022aa7b8e1eae34d12d,2014-08-07T13:30:45.007000 -CVE-2014-5184,0,0,793420341fa7478e397ede0a24739effe1aab6d4162d4b5542517f98a60b8eb5,2014-08-07T13:06:02.500000 -CVE-2014-5185,0,0,3b45cb12461594f27c1153ffc922c515fad0f20a02405a7153ce48f7b9179a6f,2014-08-07T13:14:16.067000 -CVE-2014-5186,0,0,dec8b55fa66b86bddca1215feea999632d7aa9ce02d90eeea29aae364351bcbc,2014-08-07T13:22:43.563000 -CVE-2014-5187,0,0,45b0f0394be6bea44f03d78bf3c989faf3096907f97e3cc3ebfd1fda22af6a1a,2014-08-07T13:25:38.117000 -CVE-2014-5188,0,0,1fe54f0f13c5e50225c1a3f901bb5c9e7e57133de12ffa0e1c62e65c15221fee,2017-09-08T01:29:04.307000 -CVE-2014-5189,0,0,ed19d7b5d6ebda755bbf33eefd1a71eb967df41667e557d4f1af429d4af8b7c0,2017-09-08T01:29:04.357000 -CVE-2014-5190,0,0,a354b6ac2e4498d0aeda893a8ea23ce73c9639744363d706a00c18f2640feb2e,2017-09-08T01:29:04.417000 -CVE-2014-5191,0,0,d1057dad3076f2b5a18d24a01a5792b143b88e5f0080535674517fef7aa13228,2015-09-08T17:51:49.773000 -CVE-2014-5192,0,0,79746b5f9c70fb24675e958d1db3b4911a95bcfd995b9275511f4effdf431994,2017-09-08T01:29:04.463000 -CVE-2014-5193,0,0,97c07229c3e605159e003c5269352b25b8ef1032c2a5cbe621f3d7c5f20490a4,2015-12-04T16:18:00.477000 -CVE-2014-5194,0,0,4134965effd71a954431cead92e91c1fc85fc85ec9a2d7e4959fb302f1e36032,2020-10-27T16:15:12.330000 -CVE-2014-5195,0,0,f977045e62f8a4a7a883ae9a74174a44619b0a3aab89c0116c1c44f289dce865,2017-09-08T01:29:04.510000 -CVE-2014-5196,0,0,f4d23a636fcdeba4538b3b474d49dcf56cc7737e5c78608fb3629d7b93829510,2015-12-04T16:17:12.343000 -CVE-2014-5197,0,0,ba1b2ff4e9ec4aa205a94126bd85f3f6fdeffccbabcfff45bb22cbe845c60cac,2014-08-13T18:29:42.527000 -CVE-2014-5198,0,0,d0a46687b13628393c8a4fb286fd18742e5097c69b53f431cde94e86fa69a7fa,2014-08-13T18:28:50.930000 -CVE-2014-5199,0,0,51ce1cf651a753c824322c0b98f677d7229c69f926e6a0dd7e0c06c26976d476,2014-08-13T18:40:31.903000 -CVE-2014-5200,0,0,988764295bacd4d4bb789e4b7d20bee18f9e6573cb017119afbc6c96c039935d,2017-09-08T01:29:04.573000 -CVE-2014-5201,0,0,7e7229a58c3332b73ea8caa37e28830d0270a59ea2dfc749e1cd413df615fc44,2015-09-08T17:53:07.317000 -CVE-2014-5202,0,0,444ef9565ee65eeac42cd9e7958e5c42b1b52daa8e36f205b122bd0e091f45fd,2014-08-13T17:38:28.040000 -CVE-2014-5203,0,0,9c4a9c850d0161affdcc2c2f126bff52d81a1a1118af2322757a8935b9edafa7,2014-08-28T18:06:14.533000 -CVE-2014-5204,0,0,bcfd2caab4061f61c72bb50aef17bfba95d293a35ceb09348131cb1608261d60,2015-11-25T20:21:45.147000 -CVE-2014-5205,0,0,d456c14822b626cd45431a87940fce1a3bddf2a87fda842d4262c5dc2ea14a05,2014-11-14T03:06:39.750000 -CVE-2014-5206,0,0,6bb37e690f3d437d77663cf803d985c2aca1d17223f31335394e062d0274c1ff,2023-11-07T02:20:43.970000 -CVE-2014-5207,0,0,78b70e2151a9ee84805c9bfa103648b401ca342bf251d6525e307d3c33ac91f3,2023-11-07T02:20:44.047000 -CVE-2014-5208,0,0,76ca2c5afa947496ba31f6af02f71fff8f8d25e5276a761d40ddebd0046b84ff,2014-12-22T19:27:03.713000 +CVE-2014-5171,0,1,e8922107f9baa570a53ce47ba06d0269cfe74ff756962513e49e709df5c3c93c,2024-11-21T02:11:32.280000 +CVE-2014-5172,0,1,5a522df45ef98a24c124b196203afc03f88e6325b47e7043b82200771bd59d3b,2024-11-21T02:11:32.433000 +CVE-2014-5173,0,1,75a92c12c96f678fa6dee010c8b68a24f9aff94b8b582a328c6ddb424796bf42,2024-11-21T02:11:32.580000 +CVE-2014-5174,0,1,e6035f5251c52de41b2a199d440a9c6b27d41d8283d51a96a70dcaabc72f9dcb,2024-11-21T02:11:32.733000 +CVE-2014-5175,0,1,e4d8faa6bfcc343d3de3aaa35874c4b3f6b983e01e178c656dc7542893a76b92,2024-11-21T02:11:32.883000 +CVE-2014-5176,0,1,866e5f04c51d1527c4671d19290ba8595e9472fcbf2f330190dfbb6cd6969a3d,2024-11-21T02:11:33.037000 +CVE-2014-5177,0,1,33ca3c201a6725dcd756de344403c9091d0f962f179e6de0f1ece1879e6217b3,2024-11-21T02:11:33.197000 +CVE-2014-5178,0,1,6546883c7007657afb15c0770ee6721cdd37801a6fe74fafb4205812ee1bc946,2024-11-21T02:11:33.363000 +CVE-2014-5179,0,1,917062c99374480fa80bf71a3c518f1f795413104e6e965e4ddba15eb9d2120f,2024-11-21T02:11:33.507000 +CVE-2014-5180,0,1,91e909969b5de474c239af4c9251239af2ce7d0139826c56529747cdba78551d,2024-11-21T02:11:33.667000 +CVE-2014-5181,0,1,b8693e8eacb950ee4d1ac4fd5e4bd49839e719b90c7d111134ff1e096ac2ef15,2024-11-21T02:11:33.813000 +CVE-2014-5182,0,1,0d6466b738f0a69bc770c70be72f07577d666ef9df7d5a473a069a9d78dc85eb,2024-11-21T02:11:33.950000 +CVE-2014-5183,0,1,395b8adf36070ccd39e82fe21efeb9f0339a248c44c900979c29b861a142f98b,2024-11-21T02:11:34.097000 +CVE-2014-5184,0,1,5b14165d34cbc8ede86b1b71d81eafbb3576a3b93ca780c2c6b4c62f566475ca,2024-11-21T02:11:34.240000 +CVE-2014-5185,0,1,cd359858e2143cf4318068727d65c214ee45d51a61752afb85466f44cd6eea27,2024-11-21T02:11:34.387000 +CVE-2014-5186,0,1,32d4abddcaa43c53c54283981f908c59e72b0198ebff971d5d9ee35ada0c2525,2024-11-21T02:11:34.517000 +CVE-2014-5187,0,1,d72d4e3e08ce968f3d175d2791a222038615f079e1e7dcf25c5f25e8143c1c54,2024-11-21T02:11:34.647000 +CVE-2014-5188,0,1,d25e11e2294d1eafc7a99bb25f94eee00066c1c10a71265a6d79dfeb838089bc,2024-11-21T02:11:34.793000 +CVE-2014-5189,0,1,827c7d6e05a14f9e9ecdab5a133a90bf363f7527228d66fa012b634afb4d9b47,2024-11-21T02:11:34.953000 +CVE-2014-5190,0,1,c5947c9f611f44c066061e759c42dd7184263838c35e0c0228ec2c13f552c2c4,2024-11-21T02:11:35.107000 +CVE-2014-5191,0,1,51ab13c77a27d72393d2ba56fcd4eb9d58f21fe2e007adffaa845320e7f95f38,2024-11-21T02:11:35.260000 +CVE-2014-5192,0,1,fc7e8587fb05a987272b2d38d33b69070e875023c086bcdf4e63e39cb5066075,2024-11-21T02:11:35.437000 +CVE-2014-5193,0,1,f09e0bbfa44113c04ae8d3ad0ab0491339ec9e643a12fe8ce9ccf565fe69d395,2024-11-21T02:11:35.583000 +CVE-2014-5194,0,1,ffcff5a7943c3b4ff2b99d09122fe851435208e02df49d8ac6b7aff057a73a07,2024-11-21T02:11:35.723000 +CVE-2014-5195,0,1,78879b9bdbfb760a50f2478130b41e3b1c50eb4d965de13ef3995408019828c0,2024-11-21T02:11:35.863000 +CVE-2014-5196,0,1,c65767dcb9f1f54688b3dd11a69b32143179bb1410243b560516a739d73239cc,2024-11-21T02:11:36.003000 +CVE-2014-5197,0,1,4e77ae6fe2514333eacae3079d56f904e49b7bc11f81c78363f9ea25d959b84c,2024-11-21T02:11:36.140000 +CVE-2014-5198,0,1,6c206c6b8c08d01228405cc8f5b9e1d7aed620d353dacdccf5c292463265a046,2024-11-21T02:11:36.283000 +CVE-2014-5199,0,1,be763e6e9962f50f6167f1b51d19fe22315b2db84910d995e2cd09cf04fb1226,2024-11-21T02:11:36.423000 +CVE-2014-5200,0,1,e25d6b77caf5593c907894537309aea5d8d6dae269020ce640bd91f21bd54f41,2024-11-21T02:11:36.570000 +CVE-2014-5201,0,1,36b54dc9be3b53c19b8df05b7af31a4896e6d7964822effd724851d6a0b4e5b5,2024-11-21T02:11:36.710000 +CVE-2014-5202,0,1,306ddb4d27f0f1fceb09ec85afc3c720a0ec80e2b933cfb268c8ea53640b6f57,2024-11-21T02:11:36.847000 +CVE-2014-5203,0,1,459045b59ba676aabec5825e16cdfe2d017634daa463d25eeeba34a84cc2d87d,2024-11-21T02:11:36.987000 +CVE-2014-5204,0,1,6f2417561a174249a9d90ce27114e3c8a6a76769905c5ac9ed6856135568b0cc,2024-11-21T02:11:37.130000 +CVE-2014-5205,0,1,499643882c6e4024901b7939d26ab10f2a4df4596037466ef0a257302fb44797,2024-11-21T02:11:37.270000 +CVE-2014-5206,0,1,98657b1d5d27486e1a4dcd5762adfc814c4ea00048722d171f3b36f45d6babd0,2024-11-21T02:11:37.413000 +CVE-2014-5207,0,1,c2b31c84f04ed5324ba64286e503ed3ab17a5ca815837ecd3402606b2870eeda,2024-11-21T02:11:37.563000 +CVE-2014-5208,0,1,dfa8f7c463d1cb23f650f5922e88f24c9922a34da00968dbcc2f26f28fe6b340,2024-11-21T02:11:37.720000 CVE-2014-5209,0,0,208637b66ca47f00b6b0873e0f9050baba174159371149ce81fca06be7d64069,2023-11-07T02:20:44.127000 -CVE-2014-5210,0,0,e06c1aa76627edde0920f8765aef52f00e28dc3a434f3444ab24f549f7184ea1,2014-08-21T16:57:37.763000 -CVE-2014-5211,0,0,ac66fb3661825f2cbddd334eadf7204fa4d9f837c6ca6f917096f45d180d09b4,2015-01-28T16:08:34.020000 -CVE-2014-5212,0,0,7fa0bded447f413417e71f8647cc71c8bdefb951493b76d9a78fcd9fa158ff2f,2015-11-13T16:51:16.570000 -CVE-2014-5213,0,0,094bd85dc4a0f3a64b63ba8d8af551c2f93a829d38cafb39ee888f6a39c4a3c7,2015-11-13T16:51:57.697000 -CVE-2014-5214,0,0,fc16dd8da22892b6d7515f7fd3fe9076bf3621afe45a3dda7fd5c7acae9ac23f,2021-04-09T16:36:15.873000 -CVE-2014-5215,0,0,1449250a06b76402ee8d9539e9d1c76518e8b1338380c1deda37a2749dfcb8a3,2021-04-09T16:36:15.873000 -CVE-2014-5216,0,0,99ae589558874269ab33161dd94b619b934e10dc8f7b6ccb4c5ff544ac150d5a,2021-04-09T16:36:15.873000 -CVE-2014-5217,0,0,781a43890c437dcc98b858d38b872e8fafe37dcbdd080e252c7816ea6b1b86b2,2021-04-09T16:36:15.873000 +CVE-2014-5210,0,1,369e80e5bdbbf95f5daf49f3727481c30977314401da871680733b9967be9921,2024-11-21T02:11:37.983000 +CVE-2014-5211,0,1,9230ce20ab16638217930f3d241f822918258d1e7694912f00fc44a21a7d4e59,2024-11-21T02:11:38.133000 +CVE-2014-5212,0,1,4d8c25faae1f62a5bebdc0aa9506444a7358d7a905b1ba292ba1b2308a2b059d,2024-11-21T02:11:38.280000 +CVE-2014-5213,0,1,afc98cc354eebcfc6dea842689a411635fe3976a7ecf64c31c07eea8150c5457,2024-11-21T02:11:38.430000 +CVE-2014-5214,0,1,71934de67704b8f98531ad51d6bd3161c3d80f5a5d4ed7a1dd37307d1f61adee,2024-11-21T02:11:38.570000 +CVE-2014-5215,0,1,d612a5885b78fc9a20c6d7d8a51cbd801c998f00f5a2790b4c4177a2d3b118bf,2024-11-21T02:11:38.713000 +CVE-2014-5216,0,1,658e9c09284b8210b72237842afaff01e84b75bcab914e1870045ecc214a376f,2024-11-21T02:11:38.850000 +CVE-2014-5217,0,1,264188a23143d04c47bd5761d089bd84a08495f53eef8f2351081a2ffa3a449c,2024-11-21T02:11:38.990000 CVE-2014-5220,0,0,f537d89bd161c84243cf17f173deecbf0c9c01551f80046c52d2e05bbb5e8081,2023-11-07T02:20:44.393000 CVE-2014-5221,0,0,baa42c331f3105d8bddbecf77f5247279e778548fd4e57d6e3add5f2d2a5e659,2023-11-07T02:20:44.743000 CVE-2014-5222,0,0,8f2a2f6465c9aa1ac74ea1e0dd373612064423f80a64cf9a0c4afcb55630c12a,2023-11-07T02:20:45.010000 @@ -69193,172 +69193,172 @@ CVE-2014-5227,0,0,6213992e80017499940c4d70dbb434ee090072485bf444ee74038475019a76 CVE-2014-5228,0,0,721dc4011be2897e25da5e57ab57256eb1c701a71fdbd271329a77fb7089e1ff,2023-11-07T02:20:46.580000 CVE-2014-5229,0,0,eaccda8a78b018ced478226b3b5a2cc916952254beae52c4d20a88494da07639,2023-11-07T02:20:46.813000 CVE-2014-5230,0,0,c1b81b32099ca5d382f1c698ec513b3cdc651abfd400b7a85ae811118a3d72f3,2023-11-07T02:20:47.050000 -CVE-2014-5231,0,0,89761e7707779dc11973c6923d0d79f9c561e09af5b056da82d20935bd4a11a8,2015-11-13T16:52:17.800000 -CVE-2014-5232,0,0,4e70974179a0ce5cc03ace91f81938a2ecaf5d10d26a62420e84045476c1efde,2015-11-13T16:52:38.230000 -CVE-2014-5233,0,0,d2fd8932902298f1080391414b7826198c4a9080bd618dbdc6fb892e048863b3,2015-11-13T16:53:16.803000 -CVE-2014-5234,0,0,6d5913e6563c1089e7c0cb308ed29aae4cd31dd72f82088f3959c6ccdb20d802,2018-10-09T19:50:02.647000 -CVE-2014-5235,0,0,7a519b9a24a9040c129c788f277d89655c376f8af20b028e57fa4461cba2ad7c,2018-10-09T19:50:02.990000 +CVE-2014-5231,0,1,4f7b839cd686eab9d118428124e09cc2cdb0aafd295c0e07e798083784aeb03d,2024-11-21T02:11:39.367000 +CVE-2014-5232,0,1,e52db7ed323f0e9611dc435e323edc2bbfbed2d01d2bf4b30f023ae09188f6ec,2024-11-21T02:11:39.500000 +CVE-2014-5233,0,1,b9093ee004d284841d97cbe4de9df20efa26d4fd8d765cbe09f5a0617bad3620,2024-11-21T02:11:39.640000 +CVE-2014-5234,0,1,58cc7d1adaaea18748e1aac2b9bb69e6a0d0ee85869ea4ff20563d449090b705,2024-11-21T02:11:39.780000 +CVE-2014-5235,0,1,3e0f808fa44a12e1fa0a8a32d11e22b2e91cd7b634b63c74d438c3ffb6d21e34,2024-11-21T02:11:39.927000 CVE-2014-5236,0,0,070c0b6d49cd990b2c6aaa9caafef9f464a7cefddf59132408c3d8a068010be1,2020-02-06T19:54:34.137000 -CVE-2014-5237,0,0,90468310e14d93e29a057f7f5c8288f38ef63146db0fd4eb2bb213f238be1efb,2018-12-18T14:42:36.063000 +CVE-2014-5237,0,1,9ce17a6d64c0dba0a80514a96541b345f7706268d144b658924f05085ea2f9a1,2024-11-21T02:11:40.213000 CVE-2014-5238,0,0,c6b7ed436578c21070bad22b476db8b20c0d6d603e395757b0a4b0d1c5963f34,2020-01-28T19:22:09.283000 -CVE-2014-5239,0,0,0f74e424d8634cadac34d44b9b58ea3deebca933ff01ff3b7517573a2b936d30,2015-12-04T16:19:59.103000 -CVE-2014-5240,0,0,26501acef2ae684759b958f969b3decf78ad370d4265b41d9a9eb30fc3f3d943,2015-11-25T20:22:11.533000 -CVE-2014-5241,0,0,31949d1c60cbb1d623d4dd04787abed71c9acd0f6930acfdf60a183e8e0f8275,2017-01-07T03:00:27.180000 -CVE-2014-5242,0,0,9a4eed0d84baa2b15274588699a1af76085e2368c0a837fe2e5f7e1e54225c0d,2015-09-08T17:55:33.937000 -CVE-2014-5243,0,0,d464492e7bfcefe573c11799736bff740ab6aef20fcf41d8dc86ba7502266638,2017-01-07T03:00:27.243000 -CVE-2014-5246,0,0,90d53d634840cf5f33babadbf92bcf051fe12cac8adec5b505216606381af97a,2017-09-08T01:29:04.730000 -CVE-2014-5247,0,0,94e1828384b65aa538f78d35a9c47c68102b55372c0e45bf5658f0232b89a333,2023-11-07T02:20:47.390000 -CVE-2014-5248,0,0,7528470264dcf360aea603006b56c4f1efdda1d3e8e2daf17d335824558a6b79,2014-08-14T18:55:32.060000 -CVE-2014-5249,0,0,e6218634d9492165e78e9604fbebe68908448dda481a6d1cc8226ac9e2eaef0a,2017-09-08T01:29:04.840000 -CVE-2014-5250,0,0,264e1e14b954a7bcc7bd25a333673c5562f0d0cb312fcba6386bd2aeebf3d061,2014-08-14T19:36:55.270000 -CVE-2014-5251,0,0,1c91e72e68dec5964e32a7ea9033a3cf1e10091719a1cd57894c0b7bdad8031a,2014-10-10T05:23:50.467000 -CVE-2014-5252,0,0,7d73cf44f11edc4d6309dbe93f56927c659cfb16bc040b84d9b27fd1aec83b46,2014-10-10T05:23:50.623000 -CVE-2014-5253,0,0,7896404c47d8dc5e49901a619c0c35839033a302c6080f9efa259cea0b936dfd,2014-10-10T05:23:50.767000 +CVE-2014-5239,0,1,8d1e8940281231d241a4cab1d09ac05c296c7a9c6408bc93ffed70dd36481a00,2024-11-21T02:11:40.533000 +CVE-2014-5240,0,1,beda3a5bf72730347adc5387a3a6c5a0b02d563b04570e44e8cfaac1aa575ec4,2024-11-21T02:11:40.680000 +CVE-2014-5241,0,1,c373ff34386ed245e3486003bd8303a6f79307c319b0c8e360262468b36117ec,2024-11-21T02:11:40.820000 +CVE-2014-5242,0,1,787c199ef37fc7c449af77b3bde586acdc2273b76d6a24c55e473e075b49a4ca,2024-11-21T02:11:40.970000 +CVE-2014-5243,0,1,ec031b48c06a33a6c3177ee1faf4208cc218d461c77c88ee733559fb3e521781,2024-11-21T02:11:41.113000 +CVE-2014-5246,0,1,dd20696ace928e33d05e43d7fb33a106c30fa3ffd09264499e108d94152d0e67,2024-11-21T02:11:41.270000 +CVE-2014-5247,0,1,b4e5f7c8576dd9adb0f234ccd310ea171e992cf55b785e302f439725c1c44b3c,2024-11-21T02:11:41.413000 +CVE-2014-5248,0,1,93ffd654fde9cd44de678aa4bc1eacc30c756c35b7a52fd25e1031aec1240550,2024-11-21T02:11:41.567000 +CVE-2014-5249,0,1,3a49c0b624c9f32abd1445ddbd75f25a36626c3afb91a3150b440becf788a6e8,2024-11-21T02:11:41.700000 +CVE-2014-5250,0,1,9de175c3cec523cd4f1750d397bc13c75c312ab244c99ba8af60bf84673fe5d9,2024-11-21T02:11:41.840000 +CVE-2014-5251,0,1,a71229c8e9f34c3e141842e382232b4773ea449079ecd39d22b93b97e20ab0b2,2024-11-21T02:11:41.980000 +CVE-2014-5252,0,1,bb5ab658321a44d521cf99dd27b2e3c5fb73d5e0064e1a91191fba7e04e27d52,2024-11-21T02:11:42.117000 +CVE-2014-5253,0,1,ce7d282479d10bdb2bff9db718ca816ba6f950714924df5972d7d8c65c7dffc2,2024-11-21T02:11:42.250000 CVE-2014-5254,0,0,35d9fa46640ed68fe6bf5262c9b047499992e0116f2cb5566dd407ab496ce0bb,2019-11-26T19:58:49.427000 CVE-2014-5255,0,0,dd6e2811f96ebd09e6930201d2f3444313dc148a82cf1b9c4b2240513beb24cb,2020-08-18T15:05:57.813000 -CVE-2014-5256,0,0,68298aec714cbf61011c085084f20f64554a41dcfe9cafa606f549cd5dac2deb,2015-05-12T02:01:35.050000 -CVE-2014-5257,0,0,264e6b7fab97b57166ac241819bfa82d35f10b7833c278ac77a5d5d3406ddc1f,2018-10-09T19:50:04.100000 -CVE-2014-5258,0,0,464ffa66721f04211cc1eaa074f9b3e6743cc5a8757cf9759b568b415499e72a,2018-10-09T19:50:04.443000 -CVE-2014-5259,0,0,d98f6139a0a31489bede41d1654deb1a49817b1ae0892398b18003ad086d7fbd,2018-10-09T19:50:04.817000 -CVE-2014-5260,0,0,7dbc8a3751e1eea5b72383123fc121b9f64428906fb7c71c1907f2d3972a8799,2014-09-08T17:49:15.293000 -CVE-2014-5261,0,0,d5f3303cad77dde5c46b8f4e4336399d4e291e24f561942a6f85f7cdbdca0019,2017-09-08T01:29:04.963000 -CVE-2014-5262,0,0,070c99661a966306ee77c1ab25f0ac879950f016aefc6d77fee5b71257e3f159,2017-09-08T01:29:05.027000 -CVE-2014-5263,0,0,66e445265f5d6bf0c0902277bc2db604fb8cabe8cbd1efd2f64faa40ab9b4b85,2023-11-07T02:20:47.583000 -CVE-2014-5265,0,0,23833438825d8d448ddf0c91ddc936c3fcc3fbd91012fc461bb0bb6e8569a00b,2015-11-25T20:38:42.413000 -CVE-2014-5266,0,0,0c6ea6d99af6c88c178fa9a83c64659dac46ae20c92fa128a949557e6978d1df,2015-11-25T20:39:20.337000 -CVE-2014-5267,0,0,d92910d448015e113f89fcac4c7ec3fc291ec72b878bb942e20cc7bf2b81815c,2014-10-10T05:23:53.517000 -CVE-2014-5268,0,0,a25600e28d6086cf67e921e4ec02dba2a9333c2880f564952bfeac55f6894c68,2014-12-01T18:57:11.047000 -CVE-2014-5269,0,0,78309a6a78188de343eafbe2af6cf78e7fa5b3c4c92013abef959a18938df838,2014-09-08T14:47:51.097000 -CVE-2014-5270,0,0,b5964e47b75be918732d65d732242877862bce6f9a087cf3b09f2ee8401b2c7a,2017-11-04T01:29:01.223000 -CVE-2014-5271,0,0,fb148e085bbd1c29784df9bbbef9e9671484aa02e1a3a1578f53440cfba47c55,2023-11-07T02:20:47.697000 -CVE-2014-5272,0,0,308b73c8eb9f752f382b9944f62ec55cbab6984a4b92400a100f20c3f612551e,2023-11-07T02:20:47.773000 -CVE-2014-5273,0,0,3aa2bc5e7fc44684628286576a79417b5383fbdf79ebd9149dea558c2e18733e,2014-10-16T07:23:33.003000 -CVE-2014-5274,0,0,96ef742c9cc0ead4c6efc5d94f7e527e6eaccc02e2cc98a1095cbf153316f419,2018-10-30T16:27:35.843000 -CVE-2014-5275,0,0,84093e7f2361759d8dadaa57dc7c0967ab578ebf24391cc7df066e26d6232896,2017-09-08T01:29:05.073000 -CVE-2014-5276,0,0,4cbfff2fea3a8f1e29579ffba2a8fa476f54f54f10386387306e0193e55013da,2017-09-08T01:29:05.137000 -CVE-2014-5277,0,0,b786364f01a4f2433e5879f0243eb4d9d89abeaec4d2a81b343768d744a9bf62,2023-11-07T02:20:47.880000 +CVE-2014-5256,0,1,4d4cb94c48d1daffc23c585f0cd961ff11eb7e8a58047468c760940cd67bb5dc,2024-11-21T02:11:42.607000 +CVE-2014-5257,0,1,8ea5ab315f47c45f4bf363c687ea9726f2ab768f2c7247d0d0fb5bd29939f6aa,2024-11-21T02:11:42.757000 +CVE-2014-5258,0,1,28950f33046a95457cda9e4df43957452d4889a0253ffeac4b7c70478128715c,2024-11-21T02:11:42.900000 +CVE-2014-5259,0,1,ef6921af33f9239c8e9de626b6c16a0dbd9a01e48edd49240476f5b88f19ba50,2024-11-21T02:11:43.040000 +CVE-2014-5260,0,1,43b876a1584c7dc1d8d405f982975ad1a0db2bd850b66a42a4a97695a851e63a,2024-11-21T02:11:43.177000 +CVE-2014-5261,0,1,fd0d6f91d66ed8ef73396f1067c458cb3f3a234ea92d2507c8592341107ec5e2,2024-11-21T02:11:43.290000 +CVE-2014-5262,0,1,6c80d617cfab4058f954aecbcfefd37a4117a3b36c21303ef7b2b62b21b572ae,2024-11-21T02:11:43.433000 +CVE-2014-5263,0,1,a5f76928b5015d092faa18a459a0c4b14d600930d9d09a894c8d9a51447825a2,2024-11-21T02:11:43.583000 +CVE-2014-5265,0,1,24d564526741c86c8966277e13008e28ca3ff12501ac27e5d25b034b7357cca2,2024-11-21T02:11:43.723000 +CVE-2014-5266,0,1,f3b0162dee190ebf7a78c066aaf611aa279d4faa77070a7c2532d665494c8877,2024-11-21T02:11:43.893000 +CVE-2014-5267,0,1,945710a3a7f942d7ea96c8988872d0d34cfd55e1298e05757c33f09d48ec4dd1,2024-11-21T02:11:44.060000 +CVE-2014-5268,0,1,d5424d586f031e965c568835babb3fc0c4c98a7cd695719b26b2bbb3a5854553,2024-11-21T02:11:44.227000 +CVE-2014-5269,0,1,62d34fcf31cba944720fa05206c499f00574e6e1c6d829ca8ed3f2cf1c390a4c,2024-11-21T02:11:44.367000 +CVE-2014-5270,0,1,8615404978229941d33b0d457de79d5e732a74d5c3dde46e0319d5ae17dac5a8,2024-11-21T02:11:44.490000 +CVE-2014-5271,0,1,6e503dda890f07a3e0e1e84eb28f0c617afd285b13310b24c33a8bc5fe37e4d8,2024-11-21T02:11:44.647000 +CVE-2014-5272,0,1,b6faed85660598c94e1c6bebfceaf7b45d6eb2d5e276b8501f5107862267c70a,2024-11-21T02:11:44.810000 +CVE-2014-5273,0,1,9385b86a2bb25d9fc1ee9f0d8c2477fd4673a28854dea68d8a54695c1f67c076,2024-11-21T02:11:45.747000 +CVE-2014-5274,0,1,4cca37d8a1689ef9bd97e7a9394f84b98af2c0c6203937a0a2ccc89944ea64c7,2024-11-21T02:11:46.020000 +CVE-2014-5275,0,1,325ca104f9c9b336f7f145aa7daf5d6ef95cf9e82e83ab7d603748f959b3205d,2024-11-21T02:11:46.170000 +CVE-2014-5276,0,1,1cc6ca09bace246f725d6d728793cef48e95600cbc6049069e51bc95b96f61e6,2024-11-21T02:11:46.327000 +CVE-2014-5277,0,1,71ea1139b3d9ff67e979343344c856e58baa67a11e11e81bee66c27fd263258b,2024-11-21T02:11:46.483000 CVE-2014-5278,0,0,d6a43c07190f9d47b4e83c6570de092cc72f7dd3cedbf8eb32625bc52392ff54,2023-11-07T02:20:47.933000 CVE-2014-5279,0,0,02c4f64af3f72ef96682638b3140bb3211859fc27d8ba987ee68a0f01f62c9ca,2023-11-07T02:20:48 CVE-2014-5280,0,0,96ac69439c81076422fc294341cc2c98e0dc1d879055aab3b0858eb336a92655,2023-11-07T02:20:48.073000 CVE-2014-5282,0,0,456887f53adbeb629cc5fc1ed8d0cbeb2448fe43398ce9b962562268e03a1c7c,2023-11-07T02:20:48.133000 -CVE-2014-5284,0,0,800dbb06ab673f09836e44bdf8e864dd8d7e1e9086a4dba0f32f126ce29f2d6a,2014-12-02T14:08:15.310000 -CVE-2014-5285,0,0,68d1e9aa137bd96326d939a0d3da524608b90f642c68b788340abf948d16f729,2014-09-05T14:45:40.247000 -CVE-2014-5286,0,0,7616da5db01d044f683b0c8b361cee2f8e242124313f9322bc6a5d66e675b288,2015-02-19T19:05:29.737000 +CVE-2014-5284,0,1,b87f094228e695acf3d743d901ead65f2480f5a643b97d298067c85646c31c9e,2024-11-21T02:11:47.170000 +CVE-2014-5285,0,1,c6cc3ab3f42cf41f2b3ce95dfb71477ad5344b70101eb9fccce868e76626011b,2024-11-21T02:11:47.313000 +CVE-2014-5286,0,1,7c51e0c8813dc8f846f84d551e7e700a5e7374997f86b2fbc40f3ea9729c79c0,2024-11-21T02:11:47.460000 CVE-2014-5287,0,0,b969754d1f739d9e2859b6d54e696328536bab755f7b19742de3915ca4d33139,2020-01-13T16:10:25.830000 CVE-2014-5288,0,0,5c5e1d642ef4b141ecc471ab2cbad5c735a17ac932d0cd08d49ec84ab448f087,2020-02-11T16:08:11.697000 CVE-2014-5289,0,0,f71ee46f92f8b0cac6dfa89c414f2d98c146141c0bb528e4455d1129f9891e72,2019-12-31T16:29:17.437000 -CVE-2014-5297,0,0,ea696b0ee6d35005763c11f894aa51377dd001632b75de10e59713f2cebed29d,2018-10-09T19:50:05.270000 -CVE-2014-5298,0,0,a81adcc819349726d827f1025cd694d7cf8a8406764604e55b4f078ba47f71e1,2018-10-09T19:50:05.617000 -CVE-2014-5300,0,0,171d03d0653d7e3138c5da0e719e0c7298d0a95b60e5e2a74dcce0925b48c57f,2018-10-09T19:50:05.943000 +CVE-2014-5297,0,1,374eac28a7545302dc858f2ca591b3b3e66ba3999e58dfc592fcfba1f4730928,2024-11-21T02:11:48.043000 +CVE-2014-5298,0,1,4563eb42c1a05efebe960d7b8aa167e89894ab3817c1e0a2c26ba697557f2930,2024-11-21T02:11:48.190000 +CVE-2014-5300,0,1,9a5e68c9a5ce268e67cc760fe8fcbf95c5591debd1dbcb18c531b3bb6ceeb7c1,2024-11-21T02:11:48.330000 CVE-2014-5301,0,0,0166e5c3279ec4a9de3c398f1cae3edba0ded87a776ec136fe6da389c1042166,2018-10-09T19:50:06.443000 CVE-2014-5302,0,0,b592255ee8c0ea6fc3666fa678de3043b1d8e0b677a9768bd9a91568784bb7d2,2018-10-09T19:50:07.053000 -CVE-2014-5307,0,0,da485f84655e9238af9aea073de5024e747f88d21e50cc1af20bd0ba79ea1fbc,2018-10-09T19:50:07.647000 -CVE-2014-5308,0,0,2a4ddbc7752feb14755dcba82279c9c5d591dea5fc92c21a8681a6560bc6e37c,2014-10-09T12:55:22.047000 -CVE-2014-5313,0,0,1bc66f694706678dd1882e94bf61eedaf8d63493c78b3a6c576f1026c200b886,2014-09-10T17:43:15.727000 -CVE-2014-5314,0,0,aada2597dd765b4e317e8d12b4a3bf35c69314e844d8683e833a1c66c81011cf,2014-12-30T21:22:00.250000 -CVE-2014-5315,0,0,9c113918a0f23b1073a0dd2de6d7803d3aa25dcd44cf4a65d97dde7f9ba6e86e,2017-09-08T01:29:05.433000 -CVE-2014-5316,0,0,dd24718af7c838e36e58b1efbfad5461023e72b56e730ccc911cf9b5ba622166,2015-09-08T18:01:15.813000 -CVE-2014-5317,0,0,ce6311aaeb291db5616fdaf572a5f8776560c6348fc43093f137e19ce4e5b71f,2015-09-02T17:20:35.507000 -CVE-2014-5318,0,0,dde08f9f93920f70a0ab4f94058f9626df8473e3bafa34664f725ef01027a167,2017-01-07T03:00:27.367000 -CVE-2014-5319,0,0,383d6811b2eef8dc99f92bd3efb8a2f4fd82b7f48334c9c8c6aa2b8380f76176,2015-07-29T16:48:55.813000 -CVE-2014-5320,0,0,a36b80363feb5e149fc2c687b36714879c0e27508e1bff6e58134557c37b1952,2014-09-22T15:29:48.207000 -CVE-2014-5321,0,0,e5cb8534d83daee10cb7081248b152e78c08df76f1f31797c9e1817033e8d363,2014-09-22T13:52:29.043000 -CVE-2014-5322,0,0,f88253aef3a1ff4ff6ccc89d2d0e06d73098e18d898c7f04211c11882916186d,2015-07-29T16:50:15.560000 -CVE-2014-5323,0,0,236e5df94d633deb7fa4554bc6b76911cdc918a3fb1d7a0ed4672836ed62e2d1,2014-10-04T23:56:52.927000 -CVE-2014-5324,0,0,7e58e426b1d5cc84a2aa02b368bf15de7b041310956fb59f817abcf343c01115,2014-09-27T02:58:13.580000 -CVE-2014-5325,0,0,5fe910111fa38ea649d596028c95ad6bb12848b9f1b3e0e9923b83fd20b0b8d4,2016-11-28T19:12:36.387000 -CVE-2014-5326,0,0,b0a1dd929cc6edfd72580dd3d3d17ce9e4aeb12aa42f7ee7889f8add6bb1d56e,2014-11-24T15:39:51.957000 -CVE-2014-5327,0,0,4dbe93f913aa900bb82cc4a6699ba95da848d8ef5e89c5b0da03798fed1c8617,2014-10-15T14:33:29.913000 -CVE-2014-5328,0,0,4c84975e4b70dae7b5905d5974ff7f2a9775dc71c2ede0a92ebc86fa9c0fac88,2014-10-15T15:32:29.830000 +CVE-2014-5307,0,1,9b5f0a1ddfd99ffaed4b2dade60a9c4300a965d7f08b1e762f5b06c385d367ef,2024-11-21T02:11:48.793000 +CVE-2014-5308,0,1,8d382abe105a82d8a4ab2a2ff74bbb5e0ebc9b77f9cc517c5165d934d93066e2,2024-11-21T02:11:48.930000 +CVE-2014-5313,0,1,a83bf27d81e2cc87b65385ceb51722d54194cb76decc217b80d40769bc5faa17,2024-11-21T02:11:49.080000 +CVE-2014-5314,0,1,f27caee8e703d052416081839d6920e1eaf5438e6d20834b417b8530e1ac81e7,2024-11-21T02:11:49.197000 +CVE-2014-5315,0,1,34b44f85dbb947725bf5d4209677d8ecca83d3d2a455448446681f260429f755,2024-11-21T02:11:49.310000 +CVE-2014-5316,0,1,44b41fa6a4e1fe8508b662d6dd81801187bf87ca4008d05c35eb4c4c99129e9b,2024-11-21T02:11:49.427000 +CVE-2014-5317,0,1,782acb5474db0bce7dd85fdb86e7575245c57659d760a5f399e7284d13ea41b7,2024-11-21T02:11:49.540000 +CVE-2014-5318,0,1,0d76382a0cae30b238153fa053ccdae89f00bb4e87a8c21fafb84559e3710351,2024-11-21T02:11:49.647000 +CVE-2014-5319,0,1,60797205460ebb3950ee4505fc055092d17fc562c5cf95cbc8cbac2a8a4bf224,2024-11-21T02:11:49.760000 +CVE-2014-5320,0,1,0f936b8b20cb158b4991e923fed28d79642bd649ec56408921e70fc27171a41c,2024-11-21T02:11:49.870000 +CVE-2014-5321,0,1,9ef1d83a9315299415188dd360267379845175805f8627ec16d9a78e6c6ebb3b,2024-11-21T02:11:49.970000 +CVE-2014-5322,0,1,e7ab241b531bfa63c099b1743720364fd7553667763213517bf81b29d62a35ea,2024-11-21T02:11:50.073000 +CVE-2014-5323,0,1,10d5d41eae2910da7bab2d6993924e4970b4a444815088827161710143ba4ec6,2024-11-21T02:11:50.187000 +CVE-2014-5324,0,1,9be16e84e0f5dc412b44b19ecfbd3e4186075acbd39adfc3546196a5ada02494,2024-11-21T02:11:50.297000 +CVE-2014-5325,0,1,fa5919e50246582c6678a08f5754d1260fd3c342c6cea3a2ac7be5a8076d0620,2024-11-21T02:11:50.410000 +CVE-2014-5326,0,1,3fd588add239a5194c06e2f2aa3c6562d56c90a9d82c5f2c08535e63591d23fb,2024-11-21T02:11:50.517000 +CVE-2014-5327,0,1,c725179c4e8739c07ca7b40d89adb65579d8eb92f0a010fadc9fb5a9ab196b22,2024-11-21T02:11:50.627000 +CVE-2014-5328,0,1,19f2a36bd121b91c84d3a3d528e11d4a1a715d9bc37b7e0bf3d1f89fb6b142f9,2024-11-21T02:11:50.750000 CVE-2014-5329,0,0,9684672d4bff987455f77b5fc5dc2e8a135646962d199ace61b15f5636c68927,2023-09-14T16:12:01.977000 -CVE-2014-5330,0,0,7c6a21a37da445d84a2f828ea3b667a0ace02bb9a6430683ee9b52c86491ff1b,2015-07-29T16:50:35.433000 -CVE-2014-5331,0,0,aa77ebf09fecab5320f51235b97a9d4b2a52d8ccbb44a6b52c55e6d9fdacdcfb,2015-07-29T16:50:53.887000 -CVE-2014-5332,0,0,8ad98ee4ad481abe3ce0cc075ffbfc6016dab019e964e113d4b9d336c4d4aeeb,2016-09-20T03:56:46.313000 -CVE-2014-5333,0,0,53c02676d0fcb9ae3bbc9df1a4e0b62e8f00ea01d961d88b31cec4e6667f7e5a,2017-09-08T01:29:05.527000 +CVE-2014-5330,0,1,4fe84cbec3a5d24f296e93b04ab7bb2daf2a129872400f7c077fd938405ca8a6,2024-11-21T02:11:50.990000 +CVE-2014-5331,0,1,922a2830805e767b0acc8f58ed140a102523bf135972efe84a3e133d8b3e4d35,2024-11-21T02:11:51.110000 +CVE-2014-5332,0,1,08507f91536563728a8a3aa17056a6658e445c5107fe81da3cd8e254ff525c18,2024-11-21T02:11:51.220000 +CVE-2014-5333,0,1,0980050e0505db20d0321a81e5f402e5116a34135aab08d7bb4145244b04e156,2024-11-21T02:11:51.340000 CVE-2014-5334,0,0,5ef49120562e23847008519c569f25e8f672c54f2c62903a771a3c358d95c780,2018-01-29T13:17:07.740000 -CVE-2014-5335,0,0,3f8e3b8070b865731e3464c67f44d82cbde27b674df31d9ce05b1eaf12d36f7b,2018-10-09T19:50:08.083000 -CVE-2014-5336,0,0,202e37a918b20c04c8500b5f2bd52b5f980df102c0fb355973c9bd80583432ab,2020-03-26T14:25:06.063000 -CVE-2014-5337,0,0,43ffd616e57d78198673b4d55dce2d5498e7930c8eab40f16b441bc91a404533,2018-11-19T19:38:54.233000 -CVE-2014-5338,0,0,4e5b291762d08ac030d3dcd0e72d328eee7460c91fd0e1dfd99dc7dd96234977,2018-10-09T19:50:08.193000 -CVE-2014-5339,0,0,251eac125a8d5a3b6ca0d9321d4f1852b11395ea469089a55bd88dad537739e3,2018-10-09T19:50:08.663000 -CVE-2014-5340,0,0,6e4b6d73b3c58205974f0fa09262dc24bf6ac0e12f54ba19d3d41fed471de762,2018-10-09T19:50:08.943000 -CVE-2014-5341,0,0,276c5c395d59ca1a2daff5306aed406a6f80801b96e902f658444a9135642a8b,2015-02-05T15:20:08.403000 -CVE-2014-5342,0,0,36dfe42aa326a80678940ce4058f743fad2385423a1e056870bc293fe89619e9,2014-11-19T19:11:06.400000 -CVE-2014-5343,0,0,477b477da9c8fe18f5d3a79e9cd26a70b947be17f3d064aeeae1f42f8ff400c7,2017-09-08T01:29:05.713000 -CVE-2014-5344,0,0,41f223afabe7c7894e821d6aa85420330bd5db549c7c983b6ccc30862d943409,2014-08-20T17:07:47.857000 -CVE-2014-5345,0,0,234a142069d6896ea0a4f30bed759b6ff21211e82b701fdb715f4d384059c621,2014-08-20T17:17:00.120000 -CVE-2014-5346,0,0,256f67e1a8a4f5d4cc496d81798666ad7518b9b6d721cd85e6eb4afc2a20f5b2,2014-08-20T17:18:44.817000 -CVE-2014-5347,0,0,20ce9085919c8c4fd80ba1b4fdb5296560d3dcf6c77e8a3409a4f4d0198cb68f,2017-09-08T01:29:05.793000 -CVE-2014-5348,0,0,0044151ed5cfd0ca84bc22edaf440dca956f7d14cf365f8786ebe5bdee2fd95a,2014-08-20T17:26:17.443000 -CVE-2014-5349,0,0,2361816a59ee3e4af7eeddec1869d3c90c503735ceda2068d78c8d66a55b8134,2014-08-20T17:36:21.193000 -CVE-2014-5350,0,0,50f67c1c6694776f3970419e5207dc315dc0dac3b5eed608a19477b1bf1acbe8,2014-08-20T17:55:39.393000 -CVE-2014-5351,0,0,cd0214888ef202233ce9035b7f697ed6a820e59e354c2c557d0f5ee7675d4b36,2020-01-21T15:46:49.820000 -CVE-2014-5352,0,0,40e452a722b460a3a6db6886fce94ec851d61eb6b3f2ff8091a59bae226d3b87,2020-01-21T15:46:57.183000 -CVE-2014-5353,0,0,764ff57994f6dfa24f30f3e6f2d0da19c8613df2b6b1aa63dfbfc341d949573f,2021-02-02T18:57:13.267000 -CVE-2014-5354,0,0,1e91231e82f90285757ca354bbb3294eecc512caa1abbce16c7e262c4ddd7309,2020-01-21T15:46:49.820000 -CVE-2014-5355,0,0,dc3ae62e20e80fc4e4493c0207e8ee8604df08c91349225243da416106372d36,2020-01-21T15:46:59.103000 -CVE-2014-5356,0,0,de8da54bacfd45e8b08ab9810eff23a7a7af474934ce76386c36ad38f0d4d486,2017-01-07T03:00:27.507000 -CVE-2014-5359,0,0,97d955cd27ec761d976523209ba246048279b090dbfe2a66667edf7a2f4985d9,2014-12-17T19:30:32.603000 -CVE-2014-5360,0,0,a24492c1f1dc0d571e9cd2eb386eb97937b1f3a6d8a859ae22f991420ab46c1d,2016-04-07T13:40:37.930000 -CVE-2014-5361,0,0,10c213741d7c214115b3f79a6dbc528ad40d2b0dd5ac145afc2331c49589a249,2018-10-09T19:50:09.240000 +CVE-2014-5335,0,1,286715bab7ebe8e21fd25ef20d9e733aabbdfc8dabf31dc48aa797d6509ff8ee,2024-11-21T02:11:51.590000 +CVE-2014-5336,0,1,f345ac05e4807ac7018b04d74fea10b6307d4ad8d90991904a60426db2ce07aa,2024-11-21T02:11:51.757000 +CVE-2014-5337,0,1,ce2056878d079270cfe43955bd90b881ace841f047cce28305722ea5c32bde06,2024-11-21T02:11:51.927000 +CVE-2014-5338,0,1,6a58ec6537fee97ea049df4fc10bd5240a7f43862a583f73052aeb7c042d6fac,2024-11-21T02:11:52.077000 +CVE-2014-5339,0,1,2d0a0392564e373cb07cb2e3d11b6a875da015f5e2611bf22535c8eec06d4b33,2024-11-21T02:11:52.230000 +CVE-2014-5340,0,1,60600708d66705ea62ebe36cff5302202ab2c685bdf7434ada4ddf0c2cba90fa,2024-11-21T02:11:52.373000 +CVE-2014-5341,0,1,958b4b2567608afa2e433deda9fb6f424a8d3115f4a1636807ce263d7a4ebd01,2024-11-21T02:11:52.517000 +CVE-2014-5342,0,1,2b09d95d3bac824160f24bc572151f7d0b3120710129a726a7d68d4f14a96bb7,2024-11-21T02:11:52.667000 +CVE-2014-5343,0,1,89c479741250092e5d4276c52aeedfca2519e1b16dd53048c745e0795399f5b8,2024-11-21T02:11:52.810000 +CVE-2014-5344,0,1,1ef4383c196d74188207d685cc9356cf59e0ab7af15a3a3823a08856fda90c6a,2024-11-21T02:11:52.967000 +CVE-2014-5345,0,1,b1b87d12fadd5da6fee7f85f97a2eb669ab53d6b9393a6e2c4a31cf68d1e308a,2024-11-21T02:11:53.120000 +CVE-2014-5346,0,1,91d02dda301fcd265742fc57c1a166cfb7865b18e1c14174749010870f1adb8f,2024-11-21T02:11:53.273000 +CVE-2014-5347,0,1,fdccbc668988cdc0497654f8e012563bee797e842a0bcb7042f8147846f28be8,2024-11-21T02:11:53.413000 +CVE-2014-5348,0,1,7904be946e4df39e7d4d8a121f2edbef87e94696d699734af5d48b540582cf2a,2024-11-21T02:11:53.573000 +CVE-2014-5349,0,1,7c43661f88081a8fafaa85e1ae63fdb858b8292e225a59857f9266328cdfc099,2024-11-21T02:11:53.713000 +CVE-2014-5350,0,1,285fee3683d2c833bdff5b724045a5902a09d7977bf3e341a46c7cef8be15f8b,2024-11-21T02:11:53.857000 +CVE-2014-5351,0,1,44be51e251d70f291cefc31bfb1b1566258986dac1334a3ef9ccd895e92d1b8e,2024-11-21T02:11:53.993000 +CVE-2014-5352,0,1,309453cf9584282c999569ab669695316974a179eeae04a1431201a84cfbb067,2024-11-21T02:11:54.160000 +CVE-2014-5353,0,1,19f7b2537e654ba44559ce7d7e75fd2fd391445aca1cb8d053b5f1c99f5ca671,2024-11-21T02:11:54.330000 +CVE-2014-5354,0,1,8f9743641a3f6916283dddc320dfbac3ab1805a3954ed96f8354c27f2e13f2de,2024-11-21T02:11:54.500000 +CVE-2014-5355,0,1,6f08b76d2345a99d5f26f67a72248acda062191aae355f005daf7e25ed2c646e,2024-11-21T02:11:54.640000 +CVE-2014-5356,0,1,94cee9c8bba19fb82b5777c547b2e671c64f31460f1ff45eaac60633faa524f5,2024-11-21T02:11:54.813000 +CVE-2014-5359,0,1,d8914c9dfaf7676284694e1e525a24d7ed8b57aeb7681a1031b67a062b10d417,2024-11-21T02:11:54.970000 +CVE-2014-5360,0,1,e0725b9769d3b167bd885b1297b470bebee5dc671acc8b0fdf0bb0ef3e5efc51,2024-11-21T02:11:55.117000 +CVE-2014-5361,0,1,a9e85d97529e909453dfe6f8e15c8cd680709ba8adc73d5a61a47b59b8f45615,2024-11-21T02:11:55.267000 CVE-2014-5362,0,0,6aa06e1f9172c70978a8fa71e3c64dad09185b0ac9b32fa80f01590ebffea5a5,2018-10-09T19:50:09.990000 CVE-2014-5367,0,0,323d27baf51e09cc66e0853f520922ea17bc3dc6809cc2a3315065fc2e7d2225,2023-11-07T02:20:48.660000 -CVE-2014-5368,0,0,bd8d40b1947a7d0b4cdcb6a098e63b688d8f9752394ef7091d419727984d916d,2017-09-08T01:29:05.917000 -CVE-2014-5369,0,0,2c57ab384fe450fb515e4323da9c273a20e9461e0b786741c98c2acd29717ff8,2016-12-22T02:59:16.843000 -CVE-2014-5370,0,0,5a1f13e6fe2e71bc73baa85d6d59676b5ed796b1a308d119f0b06fc54b2cf6ae,2016-08-18T14:59:06.430000 -CVE-2014-5375,0,0,9c03474ce0090d40d634f609ac278736258146a684a103e3688b5b202eefa83e,2018-10-09T19:50:11.270000 -CVE-2014-5376,0,0,37b6579b9a48c695f34c7e0f94d948109f1d986659646a0f309d7f2b38854a42,2018-10-09T19:50:12.443000 -CVE-2014-5377,0,0,fae62adf3d57c2010ef5125550857284db4ec183a78e542ca413e34f5c480929,2018-10-09T19:50:14.053000 +CVE-2014-5368,0,1,b27f54ae27fcfaee3c877043f73e42f6f8701d03924e5f60a425aeddbbebf97f,2024-11-21T02:11:55.587000 +CVE-2014-5369,0,1,85427060db696824901a1873b5fdd2e1767e17828652a49c54f48ed816a99203,2024-11-21T02:11:55.740000 +CVE-2014-5370,0,1,6f7a0ad1d01395d61fa92cb48b07d6f166c124443998ea2ba3824df72c540265,2024-11-21T02:11:55.907000 +CVE-2014-5375,0,1,8e4609c634ffd1def3c280f214ff1fb9a5a4a5d76fc30716ee6fd2bd5827bdb9,2024-11-21T02:11:56.050000 +CVE-2014-5376,0,1,cea56a96595f356901db997165e1de21a014ade5d83fe73d4d6e45caafac1e34,2024-11-21T02:11:56.190000 +CVE-2014-5377,0,1,a90ed88824c46c7a2c9b37df7236ee424060f926ed17cb1b46d799803a4a75d9,2024-11-21T02:11:56.340000 CVE-2014-5380,0,0,7a09ede6e64870b62a2bcd62904eba99f071d7093223e098e4f02f60da6698c8,2020-01-23T15:38:12.677000 CVE-2014-5381,0,0,596128f26f4cec80cec5438f76f3b4f2ad3484231cdcda1816e1eefeaab76bcd,2020-01-15T20:58:23.220000 -CVE-2014-5382,0,0,18789f3c768fd127a170269a64420f7d20ec100de3e3d7a49aade15926715d35,2014-08-21T14:51:43.830000 -CVE-2014-5383,0,0,e8eeb63cd8d8c437a68e64f0a5acd068332d1302048bd5d4a473c2846372fd53,2015-09-08T18:18:32.290000 -CVE-2014-5384,0,0,a304625756eabc003dad41d4ade4d38f8888130f312e1342ebfbfb9148e4f6ec,2014-08-21T23:16:19.930000 -CVE-2014-5385,0,0,c08fda0560a553e1e1c600f93be56b2c8fa205801de2dd33c3e0be8c25fc8216,2018-10-09T19:50:15.867000 -CVE-2014-5386,0,0,fdceb4719b1072e7ceeb3f27cc276e6eaeedc80ee9d552f3f440bcba923d8680,2014-12-30T15:33:33.067000 -CVE-2014-5387,0,0,83f697515b9a185ec5a99a2c03543efc0ac5bfda65fbc8054d6eeaf42e6200bc,2020-07-06T19:45:53.527000 -CVE-2014-5388,0,0,85a880c43cbee0de4f1740257c6872cd8187ec90ca4c99992736074591db7445,2023-02-13T00:42:19.923000 -CVE-2014-5389,0,0,d6369af51836d0ca69f44f4e174df334815cb2aa096595d8ec1a112e0437d52f,2015-11-02T18:03:12.333000 -CVE-2014-5391,0,0,f77a0ad2d072c11064122dd3bb7fcc5e4baff3caaf35a394a0ccc72f3505c500,2018-10-09T19:50:16.227000 -CVE-2014-5392,0,0,32bdcd45b3aa15acf1cad3fe2a335d6cb8537c66731a38ec9443504cd2ea29fe,2018-10-09T19:50:16.943000 -CVE-2014-5393,0,0,3ca4873ad0981549ffad8c0910093bb490dc70f5a94ca7b4e900fe16848d9b2f,2018-10-09T19:50:17.350000 +CVE-2014-5382,0,1,5d7281d2b80c63add44fa4c585993be1924f4bbc5f6878286adb1f590a4a586c,2024-11-21T02:11:56.773000 +CVE-2014-5383,0,1,24bd1551144d0367daa9983bfd81dc5a790b91425562a1f50fecb040249c0c52,2024-11-21T02:11:56.903000 +CVE-2014-5384,0,1,f8a67f1306b1ab0b6ce98ac111698bc6f1e9a48a3c44e2dc12d97a4597017840,2024-11-21T02:11:57.037000 +CVE-2014-5385,0,1,3bf9787a9571c6578da2d76bbebc8a5ff9550c77eefb1bc88a8c2ac691d6b094,2024-11-21T02:11:57.170000 +CVE-2014-5386,0,1,be0c3a8b69e8dad4514d3f729b4505562de3e736edb67cb02e67a98eed301f3d,2024-11-21T02:11:57.303000 +CVE-2014-5387,0,1,cd0ff149d93d776b5e08c7832cee212073242ec1582f1f4b719bbdc9a5e2c63b,2024-11-21T02:11:57.430000 +CVE-2014-5388,0,1,e4955cda779c177bd8cae60a6a0cbdd637c46fee890ef12d616066891b75bbb6,2024-11-21T02:11:57.577000 +CVE-2014-5389,0,1,fb7adcd21b0a567e12c4985595e1d4a0f179e4f5e36aa9166106aa0b03be4e01,2024-11-21T02:11:57.683000 +CVE-2014-5391,0,1,bf9c067dc56424ad54e82e7f6634b2397de86baba7766f6104961213586ecf9b,2024-11-21T02:11:57.817000 +CVE-2014-5392,0,1,def162189570cf4446549d40cca00b9b3109fd9a4a063ee05f8757c911b63c01,2024-11-21T02:11:57.947000 +CVE-2014-5393,0,1,7ba46b784fb5f8a4c30d828550e44076b1d2a6f5acfeb339cd096b9db560c8e9,2024-11-21T02:11:58.083000 CVE-2014-5394,0,0,9511f05bd4fabd9bc82b831ae0b52e2378f781be603da82d807822eb90879070,2018-01-29T19:03:59.157000 -CVE-2014-5395,0,0,0195d7d065ee6913d9a129567d89ac4ba9d5bd4174cb35348a6c4321fee421e3,2019-01-08T11:29:00.270000 -CVE-2014-5396,0,0,d75288329bc4c7a9b27221473211a688ee23ccd72ff744622a2137902a73ff9b,2014-08-28T00:44:02.150000 -CVE-2014-5397,0,0,3e130da957e62b900ce42a090ebcf2ff6f62d612df5dfe625f0b764c4141f580,2015-10-21T16:21:41.030000 -CVE-2014-5398,0,0,1d3a0c09c0bc75cc6e23065e330cb715588a8a6fb1fcf25e05bc032b0e006a6e,2014-08-28T15:22:13.070000 -CVE-2014-5399,0,0,a5524aa23fb89a0c0e66b6081f408472700757f4746a112ff18f327832ea5745,2015-11-02T18:06:00.560000 -CVE-2014-5400,0,0,1c30b33d1fe32d2a59c32a014f62746e86be4ff8a5d15641dae097b723b444e4,2015-04-03T15:09:23.997000 +CVE-2014-5395,0,1,47a3b928572bd2b1e2fedc4c53b18c1209cd703e1ff93a67a244b9ade1d4ce84,2024-11-21T02:11:58.373000 +CVE-2014-5396,0,1,c88015042eafed7fff5e54931f0306499d02855f5a92772fd3641a2eb4872171,2024-11-21T02:11:58.520000 +CVE-2014-5397,0,1,72b09aea9c4650f848a6012ee545971fc5e2f34d65921018bd7666268ccd9367,2024-11-21T02:11:58.650000 +CVE-2014-5398,0,1,252b1afe7f38c468db3775afb310b0096379fd97867db43947dfd3fda3befc63,2024-11-21T02:11:58.750000 +CVE-2014-5399,0,1,6b7374e47e6e44eb3fc894222042b0fb9b15cac7d2d8045ceb8bde09f06e534d,2024-11-21T02:11:58.847000 +CVE-2014-5400,0,1,1aa56eddf7ab7f98d44c459ae9a913eda3e7512158c66de6a9c99801d2467b43,2024-11-21T02:11:58.960000 CVE-2014-5401,0,0,d13f3985efbb96ebedfd2bf0f4481bd867d022d28e72de0ea7b57e9a00b7d51e,2019-10-09T23:11:09.933000 CVE-2014-5402,0,0,6cea6cad7be08d2c4f5b63f31addda57e0ba78ee7bc6d1eeb2b0c954470d8a81,2023-11-07T02:20:49.180000 -CVE-2014-5403,0,0,07c50d2429fe173413e94f00c2067514c967e9b17ebb21505c09857c882a786d,2015-04-03T15:09:52.930000 +CVE-2014-5403,0,1,0c49cb2fa67cd7e84b18176c08aedfe5d860d3cce85fcd67eeaf2a741626752d,2024-11-21T02:11:59.193000 CVE-2014-5404,0,0,630fe60c59dba2982f53a0d8973be797ec9eb229852da84fdb0835f8c747a433,2023-11-07T02:20:49.397000 -CVE-2014-5405,0,0,0a576d9c0fc63003d8370482ff942036f2cb50788200cc43bfa06febd8f50e6a,2015-07-24T14:51:00.063000 +CVE-2014-5405,0,1,a0843af4f4ee61a72eaaa93a8de65c028300c4eced22971a0b8e8258b4c9bb9c,2024-11-21T02:11:59.310000 CVE-2014-5406,0,0,c42e109affb9ade56bb297efef45ab412dfc8e3dd4d62e87755c9faa969c594e,2015-07-08T15:18:06.177000 -CVE-2014-5407,0,0,4585e067d08b5c81b09e1e7b9b0e8d368ed1238695e5fecd15a199fa7de6b73a,2014-09-15T18:12:54.823000 -CVE-2014-5408,0,0,46602f16cdc8ea15b80744de3fd06b0747d78470048a67cf8a0f048a5e29b7c7,2015-08-06T14:56:31.523000 -CVE-2014-5409,0,0,ef85e65511f0910e7235e9f4b100a053eb50985e2a9ae71254ca9495056344cd,2015-03-16T16:26:28.807000 -CVE-2014-5410,0,0,5174e62fe52f15ee05715a77f50710db9a6c88848798482dba760b9ec64bfe6e,2014-10-06T18:41:37.173000 -CVE-2014-5411,0,0,f566618661e1eb4b86f2c5b44ff7ae79c30bac55a1edb0b6c7b18fba3877601d,2018-12-31T14:23:16.887000 -CVE-2014-5412,0,0,9be32c9afe9fbda76d490ca39f8e49d81942bc181fd901b5451222fb8b213909,2018-12-31T14:23:16.887000 -CVE-2014-5413,0,0,a77c87b4ad403d36382f3b4569842e232008d7c5517002ec42786778cd12c8e4,2018-12-31T14:23:16.887000 +CVE-2014-5407,0,1,343e184a96a1bfc8de61d0c5e182870fd39ddd40d9e4e7a20a380863d5a64bbc,2024-11-21T02:11:59.523000 +CVE-2014-5408,0,1,ddd12b084cd73cf82b7d2e5b1d76d9d3ce068c406f6fffe188a70d346f593106,2024-11-21T02:11:59.627000 +CVE-2014-5409,0,1,0792257f31d7d5d0837474ea89ab0c74b094e93eae6ecf3968a17f16b0d4caed,2024-11-21T02:11:59.727000 +CVE-2014-5410,0,1,348d29e35ba23904d6e84e813223d025965a13be06c8b9c655bf2e1b17dfc840,2024-11-21T02:11:59.830000 +CVE-2014-5411,0,1,3063d834f6712fc189c340aa55c5f1b736d4b2f79a1cf4c077fb68d3dd014fd4,2024-11-21T02:11:59.940000 +CVE-2014-5412,0,1,3ee5d2f7ae680221efae9637f97411c80fb68b101f2ddbe1eefa5480c38b1d8f,2024-11-21T02:12:00.050000 +CVE-2014-5413,0,1,ec2683cf20b58ca0608c1d0668fb6f86600ca61819b8cc5a21c8bde939c9d4e7,2024-11-21T02:12:00.163000 CVE-2014-5414,0,0,6c20c05074317403566e4bda96cc37f310e69a307424a5ae45e3e79bc5009b6c,2016-11-28T19:12:37.527000 CVE-2014-5415,0,0,977c161c3ee1e9899789e7fe393a6fc260a0a9c8edb33b8c8c8d25f68c8553f9,2016-11-28T19:12:38.590000 CVE-2014-5416,0,0,4bd7b841b772bd33801d16bfecaea339e783b9289774138b343752f34b68b3c6,2023-11-07T02:20:49.717000 -CVE-2014-5417,0,0,205c0cd88ff47539152dcf4f5bed5bf33b2090a7e61212842192f3e632fada09,2015-08-06T15:05:48.070000 -CVE-2014-5418,0,0,00657cbcf212d9dc5cc5777f4983d25e916c2c71c8b20b3009a6e430ddd70762,2015-01-21T17:36:08.453000 -CVE-2014-5419,0,0,6a1e5f83bc5463a029e519f29dcd0caf132cdf9768210bdadc6a0dc4deaf82f9,2015-01-21T15:54:59.860000 -CVE-2014-5420,0,0,f21eb5259ab8bc6695225e4989a888263033dd27e035758b2dd540065f24d5d8,2014-10-24T17:59:27.783000 -CVE-2014-5421,0,0,ad723069d5c48b5f28f55d4987a38099e5da13477211a854627b19bc490a7df7,2014-10-22T19:19:38.823000 -CVE-2014-5422,0,0,e5354fa93d4a0c3d06f3aa8d657528b9a479e1c5a06d962090add30134af87c6,2014-10-22T19:21:54.127000 -CVE-2014-5423,0,0,cecf221e5529fa3dc019b6f1e2df106fbdd86d8b12dcdafa46e854a1afcd704e,2014-10-22T19:23:04.127000 -CVE-2014-5424,0,0,0234b73eb11508509dc730eccac0f2259991cdbaac9da5419aa5cf8aca36fdd3,2014-11-14T15:33:43.943000 -CVE-2014-5425,0,0,5ae93accf87b9757011c878acd0f8d5e63baa326a213b298cfda8f5a35418126,2014-10-22T18:15:49.573000 -CVE-2014-5426,0,0,04a34299c75f21eb3a5aca6ff4f2a42feb3e03a53639a14b93aa84fe91961a61,2014-11-28T15:13:24.783000 -CVE-2014-5427,0,0,f389014cc175866fbaa83f3165904bbf9c60f6eb095c471f1b99afe95f9bcbec,2015-03-30T17:06:10.200000 -CVE-2014-5428,0,0,9b221acf135d14e8a510674bb63db75ce74ccdd9873eb978d9a22696626bc4ae,2015-03-30T18:45:25.753000 -CVE-2014-5429,0,0,0fc31880d5ab679b54f36ed3b7ca8f764e51a9947a0e34ac01997bfc3dda31a1,2014-12-08T19:30:31.673000 -CVE-2014-5430,0,0,e26f2587eb5a9abc9034eecadc7ab0766e8e450ae5d1b09200572177030c6411,2014-11-07T16:10:59.713000 +CVE-2014-5417,0,1,b0a10f2b9d26347417039e1e7735af9e09ca3dccf97452828098aaf143fbbab5,2024-11-21T02:12:00.540000 +CVE-2014-5418,0,1,7546e156358b0e1b67ba73ed12f01fa934fb5634ea68b7164293734b47112b3a,2024-11-21T02:12:00.657000 +CVE-2014-5419,0,1,b4b032a3995a96cf7b3420754ccf2d220fb55f4b64bbd82ccc22810eba947bae,2024-11-21T02:12:00.780000 +CVE-2014-5420,0,1,2f4029a45ab01abd41233fd8c82390b121ad16b27089ae313fdbdfc08e6c9355,2024-11-21T02:12:00.920000 +CVE-2014-5421,0,1,be23bdb8d6ded12ee1c5a5ff12c0d66d54c280c2d96484c1578dc89611b4a2e3,2024-11-21T02:12:01.033000 +CVE-2014-5422,0,1,3d7c52f0eadc6e8633cf78b5058e1ff514247812401794a1d194341135f0e167,2024-11-21T02:12:01.137000 +CVE-2014-5423,0,1,af119fe1bc097ce8ef7a54bd00a6ff4ed65cfa60f3f260b55dd1c5cdc91d2baf,2024-11-21T02:12:01.250000 +CVE-2014-5424,0,1,6d195c67535b37b625d7e356241a0073b6acda7b8779b218f3acf1a95eecf2ae,2024-11-21T02:12:01.360000 +CVE-2014-5425,0,1,f785b0083e6c2bc41a830fb743e0d8ff62a5cd1dd8d8b57b756dd0bc20a76fd6,2024-11-21T02:12:01.470000 +CVE-2014-5426,0,1,5ee1f488b604d4ad4678c7821940bd5658bd7185cc7eb8342cd4dfbbe4d6e694,2024-11-21T02:12:01.580000 +CVE-2014-5427,0,1,de35d0897c74dfcf0a7298768e8985521d09f7b7a4f82fc4d4f12f1f788f1291,2024-11-21T02:12:01.707000 +CVE-2014-5428,0,1,81e30715069c06231b6bff0a19578dd8eacec9c33af09a7719c181e610586e6c,2024-11-21T02:12:01.830000 +CVE-2014-5429,0,1,eff9ca8ba2c35f8fec28aff2a0b620c8f297c70d0b356b28fa1c9e512e78af78,2024-11-21T02:12:01.943000 +CVE-2014-5430,0,1,a6853558a9eaa476ee18ed31ecd752d7dda355eff93ba2cc9fe17c97d949350c,2024-11-21T02:12:02.060000 CVE-2014-5431,0,0,930dc5ab0a644afdbc4de7336c4bea7209ac6f3b63bda94f0d654ff099a7325d,2019-10-09T23:11:10.560000 CVE-2014-5432,0,0,da7bcb7508517abd1ac4a7a2aa7afa69eb5475c2109d7b76472b0aaa96417d6c,2019-10-09T23:11:10.730000 CVE-2014-54321,0,0,735c6bb607d44482fd993681cd09b3255c68cffd0541d0195339a39df0981df2,2023-11-07T02:20:41.973000 @@ -69366,2255 +69366,2255 @@ CVE-2014-5433,0,0,4f271ef2fe808b12438e9de0c219b142e058b75659d53b4b756f017df8fc5b CVE-2014-5434,0,0,f0004db7e90ddeb84616224079aa714070b359d6e80ca7f80f7c528131d8ac97,2019-10-09T23:11:11.060000 CVE-2014-5435,0,0,4e9a08424e9523852cb974d5843340bb322a8b556f68fa20b15e5c825eaf4b31,2019-10-09T23:11:11.200000 CVE-2014-5436,0,0,58a8618d8b28d4863042988bbd3bb959d16b7900011625a616cac9065c421953,2019-10-09T23:11:11.700000 -CVE-2014-5437,0,0,90420ac00791d3dc3797c8a5b905d9d4ae895c733989acf7326fd32a2a298b88,2014-12-18T17:58:26.267000 -CVE-2014-5438,0,0,0c23e64947d7b259bb371e7cbbec9f88cee0406d0c626f7ae629fee20871ad78,2014-12-18T17:58:54.690000 +CVE-2014-5437,0,1,54ed9f28fe6650cbcceda6ba1b694c9168eeb63281675c89f999b5d1aaa20672,2024-11-21T02:12:02.920000 +CVE-2014-5438,0,1,bef0c3482083f578a3abe6844db28ae3ded064f858f850eedd09db3530aeab83,2024-11-21T02:12:03.073000 CVE-2014-5439,0,0,7f0e30c8e8a6b63b9039a9d71f7c481a0c149f06d06c6f19ff2ed01779dbf619,2020-08-18T15:05:57.937000 -CVE-2014-5440,0,0,c8d7b1c55f23855688f971169fc89347e8a27691aeb3f4ccbf49353deca4212d,2017-09-08T01:29:06.277000 -CVE-2014-5441,0,0,640695c79e2947f60ff5b01df98ce718e08b902f8181184837988c9f45f68875,2014-09-16T18:49:13.530000 +CVE-2014-5440,0,1,7bb5fb23d1e214360b8d06e03f73d536b4b0889d2d94e5e083c8b02a0255293d,2024-11-21T02:12:03.360000 +CVE-2014-5441,0,1,cfefbd88d3b293e97f10788cbccecc5e7acf20ced815a15b9cfa542a0394857c,2024-11-21T02:12:03.503000 CVE-2014-5443,0,0,7ebbd544d965db1b761927389cdda62e68e532ad699d38353f3040f48dcef8d8,2018-04-20T14:55:33.777000 -CVE-2014-5444,0,0,1b7ab37933fd6db142b6e854b7a66bbc7fe79c32fb283818ef6ef05380ac7e54,2014-10-02T00:19:06.243000 -CVE-2014-5445,0,0,134fcf217990257ee1f02703ca3574de9303f24d28794205117b3501a811452b,2019-07-15T17:45:58.473000 -CVE-2014-5446,0,0,003ae770f6bf32a2a06e43b73fa9a00bc59d1172ec0d9156863b3175576cef81,2019-07-15T17:45:58.473000 -CVE-2014-5447,0,0,eac298b9013b97e7a82d47a8d65a939c238180b7458257953c9024385a5faed7,2015-11-17T16:28:02.623000 -CVE-2014-5448,0,0,99295f8a143e5873914e039cb0c4f27d29cc83c3b9c2302d58b10d62c2c4e65e,2017-09-08T01:29:06.463000 -CVE-2014-5449,0,0,9bef2261f77a60f222817a4c793b37cb07e831ad49ce4befd4f2b3e52b161e25,2017-09-08T01:29:06.510000 +CVE-2014-5444,0,1,a07e3c7b4dc31d5aa21608662b0787f959c091c61d797ec113ed8a30d7f6eced,2024-11-21T02:12:03.813000 +CVE-2014-5445,0,1,e632f60173af0dbacc3b8c1d0a3df9b6eaa33a301f73d85c34fe8946ca3f4bcd,2024-11-21T02:12:03.953000 +CVE-2014-5446,0,1,fa783a9603a4500caa6883b60cc5ae3afb8bc71b5614a57c8ab8bffdbc8796fb,2024-11-21T02:12:04.153000 +CVE-2014-5447,0,1,f92e6c3cce5512b48dc4a408c02348ebb10f282f96b566375b0f50dd1755f2c6,2024-11-21T02:12:04.327000 +CVE-2014-5448,0,1,af8506f8190314252eaefa6bd264f8381de8acf704269209e212af110b44dcec,2024-11-21T02:12:04.463000 +CVE-2014-5449,0,1,f6cdd258ac0b4eb056b2f1818ac82b109cc73e75050461f9027e1910343ff54d,2024-11-21T02:12:04.603000 CVE-2014-5450,0,0,f6b74d9617e16c29840ffeb3514fe62d54f12dc9a47851b7f7c890de4b817b54,2018-04-20T14:56:12.717000 -CVE-2014-5451,0,0,36513fce6a8884273bfd55c8dcaa54d412d3ec7027618d96fe6a4349f296ee75,2018-10-09T19:50:19.710000 -CVE-2014-5452,0,0,cc32832004c5a381f8635ebe67df19c7ed65beb06b537b89e4c566d15537bf86,2016-12-22T02:59:16.907000 -CVE-2014-5453,0,0,776d77437e63c7fad0d102ae49ffde4e4a7b5e004865a84ff6daca85b258bdea,2014-08-26T15:16:05.367000 -CVE-2014-5454,0,0,3a0578eceb293d1373f3b272f4f9bfd857fdc4b75f594b226159698fbc7ec534,2017-09-08T01:29:06.557000 -CVE-2014-5455,0,0,9b4276ad5b37432783a02a736f3da5837521a11e8a64b457b3221b87e1bb0299,2020-06-01T15:15:10.840000 -CVE-2014-5456,0,0,0c40d11234dbd0dc292281c573fddd6f3950de13aa089ccb6866cae2464062fe,2015-08-06T16:28:04.287000 -CVE-2014-5457,0,0,4aca130d041d23a66f0d22355eac5f8e0aebc2312160799d27338e143a50194c,2014-08-26T17:21:48.750000 -CVE-2014-5458,0,0,dcc5b9c54696df7ea5442cdb87c122988b405b3cc13e960f532901223ab17a8b,2015-11-02T18:07:11.450000 -CVE-2014-5459,0,0,fefdcc9f9321d7a4a8d55740f2652a42ec2c162ce7f0af0efb89f45011dba77b,2021-03-29T14:38:58.453000 -CVE-2014-5460,0,0,e9a803ca7898de1d3edcd0378445269e79afcf9688ef3b16372c113bb5ac4134,2018-10-09T19:50:20.117000 -CVE-2014-5461,0,0,d7067984ac7ef4f520aac2bd85f91da22a94020486d3a36088a6523f3f6fbdd3,2023-05-03T12:15:13.397000 -CVE-2014-5462,0,0,8ea67cafaad7edad7298001c298dab3196cb5f93cc7d28f38eeb23c2e8ea7b04,2018-08-23T18:29:00.217000 -CVE-2014-5464,0,0,440afa49d357002dfda3fc18d096e078a2f3bd4af06bb868a8a354e2435c8100,2018-10-09T19:50:20.867000 -CVE-2014-5465,0,0,ba07c84751861d03075987b22fed67f65378639b3ad9a1c195864c94ce3d105d,2014-09-03T20:15:36.530000 -CVE-2014-5466,0,0,8b793377f2b510c00caf671bc176c7dd1a184c841f7c4b361aaedd28c9a653eb,2014-12-17T19:31:00.807000 +CVE-2014-5451,0,1,5b20b9ec07620624a1691910b314c248475b52aba741d8613ea79f37d0f38c9b,2024-11-21T02:12:04.903000 +CVE-2014-5452,0,1,e19495cee0bffc0d7390e306b376076f129e5b7aae0a0afd09ba4b29e0210410,2024-11-21T02:12:05.040000 +CVE-2014-5453,0,1,1a4cf71cce7795259e055db1c562cd0319e3813259a0863da54215c5fe85f6d9,2024-11-21T02:12:05.187000 +CVE-2014-5454,0,1,44df30e6eeb2c19438be0daeab2cbc9a7bbb9e995b030110cf3d1835a28f91e3,2024-11-21T02:12:05.340000 +CVE-2014-5455,0,1,6e23e2dfbd348393deb407a6e037d9a86a8e4cd5861b56ff4146fdc69d1c0e69,2024-11-21T02:12:05.480000 +CVE-2014-5456,0,1,3d16df1edeaef9385650f90fa3a792f4933b522657691cfba27f63090b44eccb,2024-11-21T02:12:05.637000 +CVE-2014-5457,0,1,869e66ce2ced79ac07eb765abc3fc559ec8d9f6bf53acfc9e95fc67dbac0e5a6,2024-11-21T02:12:05.800000 +CVE-2014-5458,0,1,068afed810f608e8a5ba7018f47b20f33df0c33ab1d7298887c9590c4df5c492,2024-11-21T02:12:05.997000 +CVE-2014-5459,0,1,4f6cfc18891c14e3bb51f6f8121fa28a1fc3998e51aa6562a014bf2bf5dab8c4,2024-11-21T02:12:06.150000 +CVE-2014-5460,0,1,b2cd04cb6d68b347ff47715f0fd156f185ebb9de3d5827eb1f3ad928a04b3d3e,2024-11-21T02:12:06.317000 +CVE-2014-5461,0,1,99561e544e023d12db4e86de2b22b67eb97b4ebbdb21e0b0ac2b64732e9e2bf3,2024-11-21T02:12:06.497000 +CVE-2014-5462,0,1,c4fe2096831cbf6b34c8c0eb63c6366d1070f27b4ec7892f9e11359e0cc13976,2024-11-21T02:12:06.660000 +CVE-2014-5464,0,1,6905b3c3ab0180c2ae83e63cb008b81a390846d5a888af14d3f63158bd5b518b,2024-11-21T02:12:06.817000 +CVE-2014-5465,0,1,637b2faae90c98d00f5c5ee6fc218204620d42d3a3e257e90443dd103134053c,2024-11-21T02:12:07.013000 +CVE-2014-5466,0,1,d9bee37c6801e4a99edee42bad66f6db011d86f3e551b6651351f78a35fbdd3a,2024-11-21T02:12:07.167000 CVE-2014-5468,0,0,63fc706fd47491c018f45297bfce7d1894f83d87a8c8548a0c41039188127d24,2020-02-11T16:02:39.280000 CVE-2014-5470,0,0,186b2f7c3788bcb00ae4c1c74dddc5d71ce3047a724197f35ade0c1fa27857ff,2024-07-03T01:35:15.277000 -CVE-2014-5471,0,0,2735dc5a18ecc2e1d49c4137642c13945ae457a37337802d0fbbabf8cd2480db,2023-11-07T02:20:50.287000 -CVE-2014-5472,0,0,29bcabd18a938e6f6d051076a2d7fcaf317c8c0b33d59ec3a7f934286246b44a,2023-11-07T02:20:50.383000 +CVE-2014-5471,0,1,f7a1535cc5eb48db6e4be636ebc4ad2448405f0feaaf1802aa7d4e8fec74892a,2024-11-21T02:12:07.697000 +CVE-2014-5472,0,1,71ed07dd3478b0d9ffe556a3f2268bccec2cc73f7a8a513074044db12278dd90,2024-11-21T02:12:07.880000 CVE-2014-5500,0,0,20c2975beae4d864093b57c8c746ab0c5f0c83ebbf1b465af137c5eba07ad5c9,2020-01-28T21:17:09.127000 -CVE-2014-5501,0,0,8fbb97c4b5920b444a484bcc5b57150c9e21fd515f1d63321a494e2848f297b2,2014-10-08T14:44:03.240000 -CVE-2014-5502,0,0,f3cda5045ae21e93c3074eb53f7f4c9bc89c38fa76c31f532823c7c53553c1ee,2014-10-08T14:44:44.543000 -CVE-2014-5503,0,0,f1ffbb70ac27b6c0695baf2d78e3e492e080c2df195c2ce9a50119aca0c5f456,2014-10-08T14:52:18.250000 -CVE-2014-5504,0,0,4e1cbd43f6025e59cd8511238eeedb914c092731f7a8eaac5c7ab7b5cce37f2e,2014-09-08T17:00:51.870000 -CVE-2014-5505,0,0,6ac32e3318a11a467ec08fbc9c8932b2b271d6ab6769f18a7d28156f42a1c0a6,2017-09-08T01:29:06.870000 -CVE-2014-5506,0,0,e309d90565620c974e3da198aac0b6a764dc6e5012c246087e246b98b908dbf7,2017-01-07T03:00:27.850000 -CVE-2014-5507,0,0,2d978e895ee0b4f9e5e091f17694ddeb9fb1e2e63ac42a7331804b073d1cbb43,2017-09-08T01:29:06.917000 -CVE-2014-5508,0,0,89d7ba3878d7710a65926576d276a1561fc7c6228de6b364f6081d941570e024,2014-09-08T16:27:51.960000 +CVE-2014-5501,0,1,b2449289d334d0f8794eb18a6904ae3562ae616cf6777322d7729ffe7133fa98,2024-11-21T02:12:08.190000 +CVE-2014-5502,0,1,07d8508ea8bc33b182b3dd92f7ae71280ae5a5de31770022ea76fc259b574616,2024-11-21T02:12:08.337000 +CVE-2014-5503,0,1,2ee4c21bd720120a07387e064ebc2aa8a750e462c0ec0ed9970d5ec55d362739,2024-11-21T02:12:08.480000 +CVE-2014-5504,0,1,9855ed088d7883c3fa7a232807909d1083fc72baebc60143755d36b4f530f050,2024-11-21T02:12:08.620000 +CVE-2014-5505,0,1,05c901e80e2fba4961cac5dfc25fa296c316f9ba964dea8285a7f6fb7d97005e,2024-11-21T02:12:08.757000 +CVE-2014-5506,0,1,6d7897e3bd9509dc0392c334a362bad15830a1030e0bee5b7f41273f59efbc61,2024-11-21T02:12:08.897000 +CVE-2014-5507,0,1,1fdfdda629c0689878a036857d2b8a1da3de32bac5adeaeb416d05ffb1ca2f85,2024-11-21T02:12:09.040000 +CVE-2014-5508,0,1,59214de1b52f3d19e12c7037a3ae4b086f821d701a43b1b9d04ce0b71d45ddc4,2024-11-21T02:12:09.190000 CVE-2014-5509,0,0,b6ca6eb41804e980d953cbf644380c84cf0467b68d81f492a952765917a006b3,2018-02-02T17:39:25.043000 CVE-2014-5516,0,0,a08a8b33703ff92420c53b35059aa2d86cc4da6c175429764b08358464001a3b,2020-01-15T20:36:35.567000 -CVE-2014-5519,0,0,171cdc591d476859f8450a5e1d6e4d8dddf8582a4fa96a3f3c639f15c274e8a4,2014-11-13T22:51:05.900000 -CVE-2014-5520,0,0,2b28b3b6188539bca5d03f38af65bf60d14f5ca5e080722ceff28a1efee96445,2014-10-31T01:11:41.147000 -CVE-2014-5521,0,0,14b00ad50754c96cc7e068ac84651632d87b899da6848773c8bd6c9513bcd324,2014-09-03T14:15:52.867000 +CVE-2014-5519,0,1,e36661d3c51aed75b6b34267545cbfa3c7aebe9136fa4b7e4150c2f8b51cede2,2024-11-21T02:12:09.590000 +CVE-2014-5520,0,1,884788d4b8d0a42520bd03e2044b34d83d0fd60ff8bec2dbe02f8701dd4f9cd5,2024-11-21T02:12:09.750000 +CVE-2014-5521,0,1,81bda523ec50e870482c6fbc766a02e4b98c3938d4be91ecb7f324a5db72e6ae,2024-11-21T02:12:09.903000 CVE-2014-5522,0,0,5bd027f20b423bafd00c1dc6df0ef8d58623a3f39d514af311d63200789485dc,2023-11-07T02:20:50.727000 CVE-2014-5523,0,0,edbe6fd7a8890cb6d480003e4eefd89b98427d80da7df26fd715cd798617cde8,2023-11-07T02:20:51.003000 -CVE-2014-5524,0,0,02debfed1a65aabc1676980e43873ef4a50c252343e32665b13de145d8d5936a,2014-09-09T14:47:45.523000 -CVE-2014-5525,0,0,75fc4b342b945be08983304558f7f33f5abce70c4d4eeb53d4239df07420533d,2014-09-09T14:55:04.507000 -CVE-2014-5526,0,0,2709a536a22c64d0cfbb521a0fc9a14d47dc0ad1581d205751eb3beab4e4febd,2014-09-09T16:40:16.597000 -CVE-2014-5527,0,0,7450915f76157a02b358755f373d45bda7a397b1206e175f590b0667722aa323,2014-09-09T14:56:28.680000 -CVE-2014-5528,0,0,19bf05d40f98943611fa20a098d4f4b56fc999feee27282b465dc25cfbd3940f,2014-09-26T16:14:04.377000 -CVE-2014-5529,0,0,1299aff46c67a9cb4355391849ffe3bf1b4063f6112d28677516643b99eb284e,2014-09-09T15:04:24.697000 +CVE-2014-5524,0,1,2e642d9574d2cd477d0d7c2a36df8d3a45c0a2506c81d705423a3539bad14287,2024-11-21T02:12:10.083000 +CVE-2014-5525,0,1,a542b0b9634870b0a229efc31022fdf6f6cf47066565ad1130f8b3ae1c57d80a,2024-11-21T02:12:10.257000 +CVE-2014-5526,0,1,5284e745054cb4fdd211c84fc7a98a2db851306b30c68ef9574018645467e228,2024-11-21T02:12:10.420000 +CVE-2014-5527,0,1,61484e4f9df53e91ae9587952ab887a6c71d197e85e0c24e73305bb752c66ecb,2024-11-21T02:12:10.580000 +CVE-2014-5528,0,1,1e8a54886ce3d5dc0a496e462fa06300fbb7818e752dacd0ee742aa3a180e614,2024-11-21T02:12:10.737000 +CVE-2014-5529,0,1,661cf38f58df5b356f3ea6985d026f9d95f0d6f001b59ef7deadd0d2674f6f9c,2024-11-21T02:12:10.900000 CVE-2014-5530,0,0,359bbdc2cb435b97830137aa388dd11469565e7ce8d267c49d4e5b560c044419,2023-11-07T02:20:51.280000 -CVE-2014-5531,0,0,b279db74883c457ed2f3e43891f0f7d3153ece1efb954ae8edd8c4d4fcc6bf15,2014-09-09T16:39:40.283000 -CVE-2014-5532,0,0,f6ce745baf6bb237d6c137d7fd8cb0a2e535e8fd9026e708464077c81a790475,2014-09-09T15:20:06.630000 +CVE-2014-5531,0,1,fce597b4e921db95209ba0f91aa23ba6e932d6ae7887337697135532b65f3eca,2024-11-21T02:12:11.090000 +CVE-2014-5532,0,1,5924f50d4704da0112d9848349a6d440829003f41cff17ce0af96abbf8716d9b,2024-11-21T02:12:11.257000 CVE-2014-5533,0,0,a91d4c5df516a8138afaf4a937609bb04ba7b6fbdc75b3b2d70c96fc5bb87a01,2023-11-07T02:20:51.527000 -CVE-2014-5534,0,0,7e132230d3ba66d3a554c5e1a30435d54ff06f7c5623becbf29473e544987710,2014-09-09T18:07:34.707000 -CVE-2014-5535,0,0,3aa3c0778f4016ab763f22146dd1c40d8c7f43b7d142e6da95e5731484115a50,2014-09-09T15:30:10.027000 -CVE-2014-5536,0,0,a0ed00e63b1cf3a5226e17d0f2cc788f756ab148f78660856e24dacb96e7c199,2014-09-09T16:26:28.920000 -CVE-2014-5537,0,0,c67b77921b9efddb916b8ef74415385cab6a3725e75961fad1c19b0b376a96cc,2014-09-09T17:47:04.780000 -CVE-2014-5538,0,0,1c53c985f1ec250dbb7cff2305d0a72dffb36c61f34ac9706b3647e08ed6a352,2014-09-09T16:31:49.537000 -CVE-2014-5539,0,0,f7c23e8418e3c383032cb11e30446677747a9c9e873b8a947a0b05b5d000fa5d,2014-09-09T16:39:13.563000 -CVE-2014-5540,0,0,50dfc7096fd001a817e8d13a26904745c559549f3c60811473442f4bae4f3d7c,2014-09-09T16:43:04.633000 -CVE-2014-5541,0,0,a7edc4b6aeddcd546073a6f7a903abd32fc8aa925e28c716a704e788cc8aba1d,2014-09-09T16:44:50.073000 -CVE-2014-5542,0,0,83e01789b1108d4915a69172ae879c6dc958b24cdd35d4682abac3babfe3d86f,2014-09-09T16:51:57.553000 -CVE-2014-5543,0,0,8ef8507de35ce0ea28be2e49bf25f4c5ba044731d84decc040f26d9b93793108,2014-09-09T17:37:42 -CVE-2014-5544,0,0,0bc26049c7aca0ac25184fcfb49f8595265c9b754ff11138c64dd5c7b0ae46b4,2014-09-09T16:56:21.027000 -CVE-2014-5545,0,0,ef91b7dec566d062e09ce998f395e901658b9c11653266e50c067dd7a4e8f0f6,2014-11-06T16:34:43.280000 -CVE-2014-5546,0,0,9dbaa97758e86bdb93d2951cd36c2c40dab9b4319969fccb82f6c35fff1e8c4d,2014-09-09T17:37:16.827000 -CVE-2014-5547,0,0,d81b3432bf616ad44b9157db2d3515cc7bfc815b0812344958f0376bf5ae7dc3,2014-09-09T17:40:18.207000 -CVE-2014-5548,0,0,4af65ffd6c86c114edbb1e42d5ba434e0399d5d55500bf0990342200d55524fb,2014-09-09T17:36:36.373000 -CVE-2014-5549,0,0,805ae2c1563349430e95755be1a4fbb7a86a107e3bb87f42035516d42566e26c,2014-09-09T17:36:17.623000 -CVE-2014-5550,0,0,5f1a68853d682f1075daa937b08f083ebacf2b9b0b9d447b6e2e9c0460e65c8c,2014-09-09T17:35:58.747000 -CVE-2014-5551,0,0,bd6eccf52e9b92bfd03ee83568d1c238c88b8151f0d27b18c96544c4e9d5a1f3,2014-09-09T17:35:36.857000 -CVE-2014-5552,0,0,07bdeaf36403d0f27f4d3130b3849d1bdbbea0c91f5ff89da0d90a645b5a7cb3,2014-09-09T17:35:18.247000 -CVE-2014-5553,0,0,33b6b603dc4e171980021cf6eb9e3b7ac1a7cdd19479d46d5b224df777a554ba,2014-09-09T17:52:03.693000 -CVE-2014-5554,0,0,a58ba37fcb9592e6d3cbab6fd1bbf5753320161f0fc4c4ddd0c4760f9b34132f,2014-09-09T17:44:22.353000 -CVE-2014-5555,0,0,8d2e8ec6885e49320f4b76600b6768dce02a34f3a106fceda6d7d3d7a35785b6,2014-09-09T17:48:12.077000 -CVE-2014-5556,0,0,ca388624291d9e94cd27b3595fc2904d8a7c0aa4598719171ea7b4d07d6cc931,2014-09-09T17:48:55.687000 -CVE-2014-5557,0,0,42d2d1eaf5299e7289f91a58196e3e40705c0288f0ab3da60ddf1957a86c513a,2014-09-09T17:57:48.640000 -CVE-2014-5558,0,0,7587a987a2f8f73f06c405b76856af3fd1d27eef7bc4861d4b920b45912b95c1,2014-09-09T18:02:55.663000 -CVE-2014-5559,0,0,db52daf7da438031ab571b4e8d1e65baec23926985002aed4b0f8b2d4150e488,2014-09-09T18:04:57.997000 -CVE-2014-5560,0,0,7c29ca9accf8882de2f7012dd90d782816568577d472bd95462d7a3eb9334557,2014-09-09T18:10:10.077000 -CVE-2014-5561,0,0,b7d2f6fb7268ed490ba590bfda91e628d9109106c5705d8f51539889df8fda5b,2014-09-09T18:09:10.667000 -CVE-2014-5562,0,0,58ee3f8bc4f33174c009d2344a022ac3954d39e9eecef76f651107501328922d,2014-09-09T18:51:13.547000 -CVE-2014-5563,0,0,0daeb2c88a77cb380f92154fcadb5e292f920ea836051d9a22bf0b39d0c046af,2014-11-09T13:45:31.773000 -CVE-2014-5564,0,0,badf8ef55e73124e6ce6634ebdc61ebb23ae7109cb1443f5476c1bee95dfb37b,2014-09-09T18:14:55.147000 -CVE-2014-5565,0,0,8a02e538c98797d5fc3f74beb3b264105cb98cef3bce2a83dcb867681decb1a4,2014-09-09T18:33:02.300000 -CVE-2014-5566,0,0,3a2bad317307a2d1edda38f1727d56b4ebb926b22fdb9e761a9ceaf535849f88,2014-09-09T18:39:19.810000 -CVE-2014-5567,0,0,346f9de4f21046d6ea42c4155c9b68bdd1d7d293631cc28af7515a86e06fcd26,2014-09-09T18:41:47.860000 -CVE-2014-5568,0,0,add1a5ac175524912ddf19e25d6b3ef26fa2866e0a16b470fabc223f71794457,2014-09-09T18:46:07.837000 -CVE-2014-5569,0,0,dffeb22b40970a11693415d1c134c2c5dbaf298bf04ae888d9f6ead9b6ae5d2e,2014-09-09T18:50:27.157000 -CVE-2014-5570,0,0,9cf425b67fe298b20a52932b19c09cb0b7bfd4784f82a6ff3cc82d8b1626f198,2014-09-09T18:50:33.547000 -CVE-2014-5571,0,0,ca1c6d25a5fcb5e0b515134cff3bc6b9df9174c26dd2aed308504274ef10703a,2014-09-09T18:56:31.727000 -CVE-2014-5572,0,0,362e684c4dbd239bae06318bcdb2d227c296580aeb233109971ac65986ade2be,2014-09-09T19:03:02.300000 -CVE-2014-5573,0,0,b798dc01e4077df88b6c145449615746373af5bda88113b882f30e0ea9b219cb,2014-09-09T19:01:40.580000 -CVE-2014-5574,0,0,76c519e68e6723903c181b6dca0ccded51a1140d0242641de32fa47c45530583,2014-09-09T19:18:44.673000 +CVE-2014-5534,0,1,9e0a8fb97825d67adc2132a0a3a0fe51b2fc64638d7535f7e42fe912dd9154cf,2024-11-21T02:12:11.437000 +CVE-2014-5535,0,1,7bbb38211d7fa68bebcdc23b14629c5d052a7a50c0a2724cdcc80adf3a138f04,2024-11-21T02:12:11.610000 +CVE-2014-5536,0,1,933709985ed226a7d7c5f660a9f9695c4e96ba0887557ad66a6ceb6452192ca8,2024-11-21T02:12:11.783000 +CVE-2014-5537,0,1,8413935f722c652ae54dfa0968279a4c8810f4c9a4397f45319af178ff6635cb,2024-11-21T02:12:11.953000 +CVE-2014-5538,0,1,b7eaedd7e4028853df11e7c07fe9996927e519e9f21d65a2bf29b912f24672a6,2024-11-21T02:12:12.120000 +CVE-2014-5539,0,1,ccddd7f44d26a515fbb6dc4f2b8fc949af9d2f8a468c56f27c576495e8b027b8,2024-11-21T02:12:12.283000 +CVE-2014-5540,0,1,557a3a59f9eb006b42414e1e22e1c76d64b65986103ab52512998221e2300a78,2024-11-21T02:12:12.457000 +CVE-2014-5541,0,1,5ff9aa650cdcfe699a95a5c5c6f8d2e5040856963fc32efbe4e49de96808a93b,2024-11-21T02:12:12.627000 +CVE-2014-5542,0,1,79d619f8e75342c018bbff2f32405d3fa493a43fd00873aceabc95c673e652cd,2024-11-21T02:12:12.797000 +CVE-2014-5543,0,1,1849a8800a1d2373466b36aaf1aaca84f34b58d523a46a134a0eaee2d7fa3f1d,2024-11-21T02:12:12.980000 +CVE-2014-5544,0,1,1277a0a74648a43308db0a8dbc101dbf8c44c8e44de88ec57fdd7523670a7a0f,2024-11-21T02:12:13.147000 +CVE-2014-5545,0,1,6ab3061e39e7ef8a48a92c8779a2ebcc72b237fef473137394e7396ce8268f8e,2024-11-21T02:12:13.307000 +CVE-2014-5546,0,1,d0e215dc0937cc5e242140f5ec0f6600d1a899c3a84301a65cd2aa8bc56ee2e1,2024-11-21T02:12:13.480000 +CVE-2014-5547,0,1,a3d3e5eb5ca1e8f835737882c36705ba1fe3ab455e7421c22ff04acf1b8e63c8,2024-11-21T02:12:13.647000 +CVE-2014-5548,0,1,f0107f794e7245295af2e3f46abfb818b18be251b60743d36d87d48024d6dae3,2024-11-21T02:12:13.813000 +CVE-2014-5549,0,1,46dd5e99ffdc35f32bc6943992841897c0f826ff4d2ed4559d0d84915042cbd8,2024-11-21T02:12:13.980000 +CVE-2014-5550,0,1,6d7d146a4aa6392c40bd2af7615e9ed565156993336b81e2cf01af8899f7a714,2024-11-21T02:12:14.150000 +CVE-2014-5551,0,1,28543c5a1bbf9feb09eccd2bfc394e7eec33d3c8ced7c31abde0631d1da4fcb3,2024-11-21T02:12:14.320000 +CVE-2014-5552,0,1,41a46ed40b18d3083fb2acdcf99b01cc9f3015ddb9c8a92c87a76280e0d44851,2024-11-21T02:12:14.480000 +CVE-2014-5553,0,1,fba326e09bba44bbb02488ac9dba268a5ebc17421ce3c731a5fc4215d7b3452a,2024-11-21T02:12:14.653000 +CVE-2014-5554,0,1,91ab68c5cd915dfcbdedbb883a16c400476ef560ca034c717c01dbfb0beb92dd,2024-11-21T02:12:14.820000 +CVE-2014-5555,0,1,9b1746b63083ed13bc9c3017b75846c7aaf849d663140cc091a078019328bbd2,2024-11-21T02:12:14.993000 +CVE-2014-5556,0,1,0ff84806b772a5265511c934b0cf3f03e5614d1223854862d3963b0644ce8ea7,2024-11-21T02:12:15.170000 +CVE-2014-5557,0,1,bf6b9e4e3e27b593660e9941284db6e835d259ad58258f7a23dbcc033787a29b,2024-11-21T02:12:15.333000 +CVE-2014-5558,0,1,eeca7096675d793a56e022f5d36e123c85bda0916e219fb8259568c7ac3da366,2024-11-21T02:12:15.510000 +CVE-2014-5559,0,1,d9def930ba3b61d0f49a3f7eed6cad5d19892f88765f8f6d2d45923575f73904,2024-11-21T02:12:15.693000 +CVE-2014-5560,0,1,eaccefcace05f186166d5778acf275eef289a90257fdb2c4b619329dfe1ba0f9,2024-11-21T02:12:15.870000 +CVE-2014-5561,0,1,581bdf094b8152faf20e380a64871134ed3a23921b5fac91f8430d47e123bb64,2024-11-21T02:12:16.037000 +CVE-2014-5562,0,1,87cdde01db39ca44db407ab775d912b55dffa11a505b840d0d228b4247769185,2024-11-21T02:12:16.233000 +CVE-2014-5563,0,1,ac2bdc2e36172e1d67c56590055ff728f66f9e34fffeb685b32763ee31a2514c,2024-11-21T02:12:16.430000 +CVE-2014-5564,0,1,4a8d83f6826088c481f9e66d6f143302fd563c8617b4f375eeef8ceaf0c4503f,2024-11-21T02:12:16.613000 +CVE-2014-5565,0,1,41d2b6ecdd109d83fb38d739b08a01930f8ffec831e8c3df6a29d83ba024a39f,2024-11-21T02:12:16.790000 +CVE-2014-5566,0,1,556fabb41c50250b69bc512b9528b33b8b548d7ae3c6c6d60643710cb8b9ebfc,2024-11-21T02:12:16.960000 +CVE-2014-5567,0,1,7b3a6a1b3853ad4ec8a6614750067ade59bf2afef9ac5656718abcda33619059,2024-11-21T02:12:17.140000 +CVE-2014-5568,0,1,744f58d203ba6b54bbe15aae21efb5ce161c7459e80befcdb1c5e850922b07a6,2024-11-21T02:12:17.330000 +CVE-2014-5569,0,1,4647afeb51972ec91b867eaf98b4e15d01fb83709e13555d67368d6d20351887,2024-11-21T02:12:17.503000 +CVE-2014-5570,0,1,8a10067a73f288feba7788346dd815fab6ffaed1ac25e7569c560701f6f45bb6,2024-11-21T02:12:17.680000 +CVE-2014-5571,0,1,53b058da44ea6834c0a9f94e985b1eabdc0199628aeab1d010e2d52f26013d08,2024-11-21T02:12:17.853000 +CVE-2014-5572,0,1,69f78fbe9b31c2e1c8e506ae33c0127edc027d8907ead34fcebc27ce7b6510dd,2024-11-21T02:12:18.053000 +CVE-2014-5573,0,1,69e83048985e01cbf0adbfdb704ae23ee233e83c3acbedf136a7aaf26031e9cd,2024-11-21T02:12:18.230000 +CVE-2014-5574,0,1,ada0f0e27124504a8d04a1e457a3055d311245e5d242c8249e457753fd2cdc17,2024-11-21T02:12:18.417000 CVE-2014-5575,0,0,6f8b3bb878b982be41d5ba7d13ff6d629e547982e1f7ea22aecbe7f7e69c9f5c,2023-11-07T02:20:52.023000 -CVE-2014-5576,0,0,aa47ce0c3c02625f9ea1e9952edc214b0c8450b89faf823716d1ea450bbb1dc8,2014-09-09T19:13:03.510000 -CVE-2014-5577,0,0,1d960ddce6b044b2c6a007217d62ee0670d000218d2e383b1d40553994b3e84b,2014-11-19T01:36:02.787000 -CVE-2014-5578,0,0,a5a9b14bc92616ae1319aedfc73a08b769c1c3c381759c084d3b313aa68b7330,2015-11-04T17:55:25.353000 -CVE-2014-5579,0,0,5fd92bc1e7ab539403ba8adc4c2457d299c2fde16004bc69c7e49253b5a704f2,2017-07-11T14:35:11.017000 -CVE-2014-5580,0,0,3bb7ae3c7d4b1524476bc64aa9735a38b5999060388cc867919e9650325ea08b,2014-09-09T20:25:28.070000 -CVE-2014-5581,0,0,8dbde5333177104a2f3a6c05fa473ecbed7bd82a6406778977c55f0fdd5cfc5e,2014-09-09T20:19:46.897000 -CVE-2014-5582,0,0,66c13cdb57dd14f5d13fd9da090690efe1243749734e0b76c795acf8cb902880,2014-09-09T20:37:07.563000 -CVE-2014-5583,0,0,026c8024b8558c1987db38ac19618bba49b419705cf7cdcb014914ade51c194e,2014-09-09T21:03:33.740000 -CVE-2014-5584,0,0,62c4bc9fdb1533b6ae2802794c6cda7caf77f529f832b656a9e541a888749bbd,2014-09-12T03:05:27.707000 -CVE-2014-5585,0,0,94b9b4abb52a10c4e6c6d1b49b9ea2d42357bd9190bdd695aa9b969d8c9728d9,2014-11-09T21:03:50.910000 -CVE-2014-5586,0,0,80db8bef1da346c0d6787c12197009662c1c5a03f56e5b268115b46e706a9ed3,2014-09-10T00:23:52.443000 -CVE-2014-5587,0,0,e4aa68ef07441c9fc8ed7aa16172ac998d7bf4dc199a48f358fecbac786c3d40,2014-11-09T21:10:01.757000 -CVE-2014-5588,0,0,bdfe521ec37f506f9ddf3f88f7a4576737d295045f7f25bf6c97e31330314a2b,2014-11-13T22:29:29.433000 -CVE-2014-5589,0,0,1ea0ac41589066653d0f0ffc150c95ce585e9215cca0ef135fc06e00e69d953d,2014-09-10T00:55:37.387000 -CVE-2014-5590,0,0,762fd04b5f25e232817ce5014d684881f7623a2bae81bd320e733d3cfd26d416,2014-11-13T22:37:28.567000 -CVE-2014-5591,0,0,e5a09c27435835f1ecdc8604050f68ebde3f1b96700b372e96da331690fbfe2a,2014-09-10T01:13:58.653000 -CVE-2014-5592,0,0,e3bb02f5b3153b8dce980736cc4ca1e1116b499bccc7ac2359313be7b06dc34e,2014-09-10T01:22:07.860000 -CVE-2014-5593,0,0,44d95a203102a32a5e9ae582428e16cdfa66e93ac594407198b552640cd1a57f,2014-09-10T01:33:19.880000 -CVE-2014-5594,0,0,58b8b85c0e28b4bf42a6227d4e0b9f270db774e00150176dc53ffacfe3a41062,2014-09-10T01:36:07.957000 -CVE-2014-5595,0,0,a84e7701477faab9ea8ff24761c1899dafb1d040f131c63683b73033994aca0d,2014-09-10T01:47:19.010000 -CVE-2014-5596,0,0,3e0958399558003777041210762db8a2a8033b7ff00cdb228218fcbcd3af43da,2014-09-10T01:55:45.653000 -CVE-2014-5597,0,0,f0791172c22358cf26f37addc56243734e9940dde3d23aecab552caf651627b0,2014-09-10T01:59:11.200000 -CVE-2014-5598,0,0,6793b587a902d7c17bf0ca3dc6e1bb0b3c20891c6f9e3d2895db0963036bd806,2014-09-10T02:01:04.857000 -CVE-2014-5599,0,0,94f7e28bc010a57815064f68a7a3ef8dc21fc93cde8d909587e0508799112f3a,2014-09-10T02:01:55.640000 -CVE-2014-5600,0,0,ca35752e465643834ffd5cddd679eed21841e5998e9299877e5c3e361954473f,2014-09-10T02:02:49.767000 -CVE-2014-5601,0,0,f71dd73f9bf563f090bb8a4b5c28da7554d663350972ba85a6fbd96919ce63ff,2014-09-10T02:04:06.697000 -CVE-2014-5602,0,0,6cd740c36e1e6a4c39defd8ee645874165bace39d3bcf60636b97ca9643af73f,2014-09-10T02:05:00.603000 -CVE-2014-5603,0,0,10f65f7dfdf77ac474a9e8cb3a702a83e2065b8ed4a3094ca2a1a5254c2d8c10,2014-09-10T02:07:50.447000 -CVE-2014-5604,0,0,acf1e04cba5bb913cda427fdb74dc43766f4b5e9157a74522cea5673b09701e2,2014-09-10T02:14:13.247000 -CVE-2014-5605,0,0,a5db84c25386d7df43b49e4e849d2a7db683c115045b37dcc703f1095a184ff3,2014-09-12T03:04:29.707000 -CVE-2014-5606,0,0,8a4c5638fd8670594845ba49fb202d42ba1b0f45379f57956e54601d05aa5ad7,2017-11-30T15:26:04.327000 -CVE-2014-5607,0,0,16d7a0a5c90e3742a8ec546d10f42ace60d9536cd3bfd4d3d6c5fcb4733a961d,2017-11-30T15:26:33.923000 -CVE-2014-5608,0,0,d498ae1a46a661a7019c3e99c1ff69e9dbdc7849515fea46aa9e992ca0596760,2014-09-11T17:09:16.697000 -CVE-2014-5609,0,0,05ab5d9449f415a160faf2919ad6b195f12109a84e61e45b58275231850758ec,2014-09-11T17:08:47.597000 -CVE-2014-5610,0,0,41bce3bd8aac0aee4f112a98d553e87fd62a34978a60964e3b10b4f0606b7f1b,2014-09-11T15:51:54.090000 -CVE-2014-5611,0,0,f5f14a7bec504d8a510f3cd208139f957e2878a74648d13a0f3600ca1445645d,2014-09-11T17:08:16.027000 -CVE-2014-5612,0,0,4450627816ef947834d70f10373a7ff20152c4b98ef11d5470a3880b55a96b67,2014-09-11T17:07:42.440000 -CVE-2014-5613,0,0,d50b7d51da82ab5a19dcc2713bd316fcb9d513b848651b1ba08695134bc832f9,2014-09-11T17:00:20.190000 -CVE-2014-5614,0,0,947ea7255cc859210d223dfcd9d6fea6ba91fc60fe1b50cf07430f4fe1bfe982,2014-09-11T16:59:46.407000 -CVE-2014-5615,0,0,d0ea65f7f8f0c6373a4dcd297caaf4a42f5fb7a61c028a76824db02a0be658f2,2014-09-11T15:17:43.730000 -CVE-2014-5616,0,0,f702aaac6d7b0e9552e19d07a886de2260d7ed948beb482712f64cc29558ea43,2014-09-11T01:58:19.910000 -CVE-2014-5617,0,0,d5a9f1f629b37a9d2e612d9c1f6b53269e11ba15fce5bcd4f143574b01f4ec9b,2014-09-11T01:58:03.737000 -CVE-2014-5618,0,0,1151bd5fe358d2aded30cbc2ca42102a421d3bf86ebf935279c5e25d2a2e5843,2014-09-11T01:57:40.503000 +CVE-2014-5576,0,1,48e5cba66119c05f36dd1090e6041e32550bb437daba5b3650972d37bfa94f85,2024-11-21T02:12:18.613000 +CVE-2014-5577,0,1,67816fb3321b7a325f1372b90094fdbd0f1ebfe1524b3b6983d30e7370a40e99,2024-11-21T02:12:18.783000 +CVE-2014-5578,0,1,a9ab363162989066d86cd8ffefa1a6ae5a20dd1aaf64e2b862a741eed2a8de5d,2024-11-21T02:12:18.960000 +CVE-2014-5579,0,1,e356130bf25fb2e7f3869c2673ede0aee605ce0afa8e82b378230f075397706d,2024-11-21T02:12:19.133000 +CVE-2014-5580,0,1,5eededc332042b282296925248f0a83602c032ba757042dfa663d87ae5a331e9,2024-11-21T02:12:19.323000 +CVE-2014-5581,0,1,113ec1510597bcfc60680b020147e7ee2ef1d539e4c85ac1385f12cbcefbde8c,2024-11-21T02:12:19.510000 +CVE-2014-5582,0,1,b32256f396c16fd1c5af8e6209bd2a54662541f91c34d8d42fa39530d8180f38,2024-11-21T02:12:19.687000 +CVE-2014-5583,0,1,4bf463b569595f58096712e7258c0e27acc4d469ab6648c4881eb4f6466aa056,2024-11-21T02:12:19.877000 +CVE-2014-5584,0,1,ad7ded66dacd40bb71a8b8429500742753c98f4bd607afafcbcd27a5ccfb71f4,2024-11-21T02:12:20.053000 +CVE-2014-5585,0,1,08a30b7be06836d5be73e60a2d4e95b62329773ccf8afeac202bda5407bf6d8a,2024-11-21T02:12:20.243000 +CVE-2014-5586,0,1,7b32d45aa0da368aa6befdb66916e1940efedb23af68293ea7f8e5db37fac543,2024-11-21T02:12:20.427000 +CVE-2014-5587,0,1,66073f3fbf6ae01d358fe1a9cce742be9b0022f84e34fb638d01d6af3932cb73,2024-11-21T02:12:20.600000 +CVE-2014-5588,0,1,5567781b1768dcf21e4d23313647665f570b0d70b35fb92604dbcd4ec4fa05be,2024-11-21T02:12:20.780000 +CVE-2014-5589,0,1,d6f4da409288088a8a5ac1442a9df731c1b1639fea7bec0d4eebd53e8ccb9a22,2024-11-21T02:12:20.950000 +CVE-2014-5590,0,1,a714828f076243f28c0aea1687d984cada8879122e59b0605b4387da893264e1,2024-11-21T02:12:21.157000 +CVE-2014-5591,0,1,63afe6f126b25219014e13639ebf9689475a22380005dc232b5cc1354285074f,2024-11-21T02:12:21.343000 +CVE-2014-5592,0,1,9a33689c9815aa1196ff98b49392c60d4a050dc26a51c07625e751ac6eb46b63,2024-11-21T02:12:21.513000 +CVE-2014-5593,0,1,9ff2f1ae18af9c05d9a36600b6191be69d41abefe830279e03a1c56d63338e72,2024-11-21T02:12:21.677000 +CVE-2014-5594,0,1,74ec0cc0cf3f0ee934dd3dfb0a6723c693c0e13d7368e3289a0151efb015d751,2024-11-21T02:12:21.833000 +CVE-2014-5595,0,1,28ec3d56eb95fb0ea6b80835af2514af078ca03fe61ab316b09a7b9199fc39af,2024-11-21T02:12:21.990000 +CVE-2014-5596,0,1,db001fc29079f01dc388d49e3045099e3e006388e28d94c24f9640a933492ada,2024-11-21T02:12:22.147000 +CVE-2014-5597,0,1,45e0faad68e6237e725b5bff315714b2e8ddbb85de82eacb96c0c57bee6c252b,2024-11-21T02:12:22.307000 +CVE-2014-5598,0,1,ad3d065c6a84eab52df93b345ebe61d9c65f702c5eb080c2a7b43d47575224b2,2024-11-21T02:12:22.460000 +CVE-2014-5599,0,1,951f503c8cebd72452d555c30c0fd9e54a4bdfe88f055c3b52822a9f84ae3153,2024-11-21T02:12:22.623000 +CVE-2014-5600,0,1,4750b02da5236f389b287e310d58839e9f816778a55a974938217ea775b58d7b,2024-11-21T02:12:22.783000 +CVE-2014-5601,0,1,a00e6516f72715aafc4809861637ddee8b2c5ff52303fcff455949eb5bf6f437,2024-11-21T02:12:22.943000 +CVE-2014-5602,0,1,c271b07c4d281e4d17b85bde3f15d24d4940cdc8c0d169458dd77ff48b5586ae,2024-11-21T02:12:23.103000 +CVE-2014-5603,0,1,f5bf3bd1a59dc9e42afbdea85d93caa82b2f76460979e2f7479a4f12d1c5eb7f,2024-11-21T02:12:23.267000 +CVE-2014-5604,0,1,e3bb02cfce751bdfab6f624b4381ea9881e7d0e0018dc436aa44237b676f9264,2024-11-21T02:12:23.427000 +CVE-2014-5605,0,1,0638eb65d735e96381888ae62cc8871243d6e49f2a22794e400c141895a36c84,2024-11-21T02:12:23.590000 +CVE-2014-5606,0,1,c37a67028eafec349526b88f3484c269e0442181c341ac8c5d31ccc26ba849b0,2024-11-21T02:12:23.750000 +CVE-2014-5607,0,1,3cf0fee007d4f340de4ade75e63f16609cccd7947d6ceceaf3d6ba5105bf585e,2024-11-21T02:12:23.927000 +CVE-2014-5608,0,1,94d6dc8cb45337c9592d670c0cc476017cf5426908f7b4d869c50e0318627850,2024-11-21T02:12:24.113000 +CVE-2014-5609,0,1,86516ccfab00e121d72d22ff01635c71a711f616a74b83fd32116b79556f8a59,2024-11-21T02:12:24.277000 +CVE-2014-5610,0,1,4d3eaddfedf33c79f0692feb87774469f869b3ddb4c28cd3e67c94a232cb1676,2024-11-21T02:12:24.443000 +CVE-2014-5611,0,1,f003f40893de3be3ed7efa98c58543ac3e9bf4e02c687d2fc902c7717ba6f8ed,2024-11-21T02:12:24.610000 +CVE-2014-5612,0,1,e600abaa365d312c360339def1b78e6191c7eae1230fd28c4460b3e3a80016d6,2024-11-21T02:12:24.773000 +CVE-2014-5613,0,1,3ad9a868a314690cd232dff379911cb5a00b16520ec20a8794a9e93c7b5a7ea1,2024-11-21T02:12:24.960000 +CVE-2014-5614,0,1,fa6d16f41f8e9086b0dcf9b601169a812ec74747de81c3c0c53bb2477f3b95a4,2024-11-21T02:12:25.127000 +CVE-2014-5615,0,1,99d7b7df97abdfcc6129ae34618f56cb833677e316d471f4c180d8927070d33f,2024-11-21T02:12:25.290000 +CVE-2014-5616,0,1,45fc5c1240e181697374d2fd2d9676319c0135576b8e828902f139952eb2473a,2024-11-21T02:12:25.450000 +CVE-2014-5617,0,1,b938d5852775cd579315023f1dc185864e9212015e985200b747979cbf9b132c,2024-11-21T02:12:25.610000 +CVE-2014-5618,0,1,44c2e04bdcda66ae2548271fa887a0e634a41c0c9ee5d2a54f2731797d9ee795,2024-11-21T02:12:25.770000 CVE-2014-5619,0,0,094cf59baac32d6f6a6c8a8014466b02c7a1e1cdfd74723d9ecf18503869bd4f,2023-11-07T02:20:52.527000 -CVE-2014-5620,0,0,123a535f3f90872ffb48d53b17f131242dc8a38644f1d178bcac8832e39e6c81,2014-09-11T01:57:03.533000 -CVE-2014-5621,0,0,77b96f20b100670cbcc856d94c725783d5555460ab15c42b87d0189b796de0a2,2014-09-11T01:56:45.157000 -CVE-2014-5622,0,0,df987c9dc920710f1984006e29a5281834cb3560b9927b4889ba8bf99ab05704,2014-09-11T01:56:22.907000 -CVE-2014-5623,0,0,c3e7960084dcbaa50dc7f2474bbd26ff0fefa9421e85aaaa7bb5b47b62a0cc7f,2014-09-11T01:56:02.797000 -CVE-2014-5624,0,0,f6bbca9ce4aa6c95e9d3a4a6c9e0a337613291aaac5ce368ca5d9946e9d92ea2,2014-09-11T01:55:44.110000 -CVE-2014-5625,0,0,c2bbf9a6bc6952a4b0a1373d02d001b94d757f7158193194a2b65f851b2124ee,2014-09-10T23:17:41.963000 -CVE-2014-5626,0,0,c5acc77413fa1e303890bd8d2a7e5913b3da1416e4120708c25a73f9a4f7f562,2014-09-10T23:19:13.623000 -CVE-2014-5627,0,0,c42df70c783bc4ff14807eb9d92a7af99eb2fbceabecefda3e19ce6356265509,2014-09-10T23:21:36 -CVE-2014-5628,0,0,61a3a4359b632bfda5af39c3ad183c83d6d8d67a8f3ee0a390be6292d3512114,2014-09-10T23:22:22.627000 -CVE-2014-5629,0,0,86147d355fafe57c6722e1fb98d1757dbfe5377403008ee7ae9a1342e8d53b2f,2014-09-10T23:27:28.740000 -CVE-2014-5630,0,0,627c1a8bdbb8d27ce1ba399dee059c0179caa420a1cc745ea1c904eacb248deb,2014-09-10T23:29:07.087000 -CVE-2014-5631,0,0,501d012ee25be076f1d8ef6352cff629830074b1b5bd029cbd942ad970e5b148,2014-09-10T23:29:44.790000 -CVE-2014-5632,0,0,b92141b32e66365f2d3fef7329e01bc37b840ba3a4d5396f2ed3f0851b283714,2014-09-10T23:30:40.823000 -CVE-2014-5633,0,0,73c16be46235d47cac9665f42c3a3967bc8f5e94157b157bad3a9a9038aeec8f,2014-09-10T23:32:54.947000 -CVE-2014-5634,0,0,5f5dbb93f7eeeb35269266b5fe44bee3b600b0b0afb130e7eeea7e94101dd4b3,2014-09-10T23:34:18.620000 -CVE-2014-5635,0,0,ba48378f36326430ae42a38ef84aee0aa7e3371dbdb14959880f9222f0936aa0,2014-09-10T23:34:56.327000 -CVE-2014-5636,0,0,e9b608890365fae3d596fed8cd4a3b1e14e747a8015a12099a5d9d8fca6160ab,2014-09-10T23:38:05.577000 -CVE-2014-5637,0,0,eed2e06875a09325633128948d21dc803e631e19dd49e5c0f06a34acfab34041,2014-09-10T23:38:56.780000 -CVE-2014-5638,0,0,36a462d39c38c2d2ef69df7796f3207157e8a8aac366e20a8cdd6be326a0ac62,2014-09-10T23:39:34.220000 -CVE-2014-5639,0,0,5140fe1597deb18b9b66c4c5c7057b19cb974bc470cf0436f38e9806d99d8ea1,2014-09-11T00:47:40.897000 -CVE-2014-5640,0,0,0748f506fbeb5d35d8928d669cc0875f16ca5c53b86961cac909633252605174,2017-07-11T14:04:07.393000 -CVE-2014-5641,0,0,513779f138bee9b7e1b59185c73d1ab6e52919d88a97173f037afd49d4711f63,2014-09-11T00:49:30.820000 -CVE-2014-5642,0,0,87557fe7c31ed926d6c476e234c586ca3efebee9db21d682d18c2b976b299245,2014-09-11T00:50:41.820000 -CVE-2014-5643,0,0,aeb307d9163310460983366726f09b034185dc6a0508bea174e497c3e0b6c39b,2014-09-11T00:51:30.523000 -CVE-2014-5644,0,0,75fa2e51dc7b884014f971eb5f466e9d9050dee609e1267d04753e7fcc6d4f77,2014-09-11T00:52:15.087000 -CVE-2014-5645,0,0,a5b9492a26f44529c9075edec60fe7105805d23ea7dbffc3d4499821d5cd0d14,2014-09-11T00:55:50.980000 -CVE-2014-5646,0,0,550a22285e75c7149fdcb5795952b7fa2b688a210369cf92ad84c5965d6a4f0c,2017-07-11T14:28:41.207000 -CVE-2014-5647,0,0,3a691140f4021d7ab5574fba592706f83e2394072d8ff467c861f6c1a0d9494a,2014-09-11T00:58:31.280000 -CVE-2014-5648,0,0,af85347f66dc908af8644775d0a2267800c30d3aa82ac86a2c5d0f86379035af,2017-07-11T14:52:24.587000 -CVE-2014-5649,0,0,c235e59e954e3956d2ca550ca2a520571aacf84d18441a2245194d88dc9d0315,2014-09-11T01:00:24.017000 -CVE-2014-5650,0,0,0a7b31d300ae57c70889f603d02f217b4ff68e65383e033df3f24b09b7c05246,2014-09-11T01:07:21.880000 -CVE-2014-5651,0,0,97b89bdfb5887e5dc1edce61b4fc097d523097d68050da846bee73c3717e02a4,2014-09-11T01:08:10.733000 -CVE-2014-5652,0,0,2950d50205ec2a2658076251626008f226fb65159a89ac7244ffb6947d4423c6,2014-09-11T01:12:28.497000 -CVE-2014-5653,0,0,fdeb76b3d7e4251f8379b124f4acecee631ae29ef8f3d48a59b760a9e6b3f694,2014-09-11T01:13:05.417000 -CVE-2014-5654,0,0,22229dcd1bae8ad8672a7e7a5648698a13918d3fbe8bfc2653fa6be4cd00462d,2014-09-11T01:14:02.557000 -CVE-2014-5655,0,0,eea2587e671af036d7f0a321198865195dce0a9bf2254797d8ea761414578c83,2014-09-11T01:16:40.417000 -CVE-2014-5656,0,0,7b73575cae580e6fabfc311962e050be06419f7be8cb5e777bdbbc3566b84215,2014-09-11T01:20:44.790000 -CVE-2014-5657,0,0,a7392df21305602d319ed9b9bf1277d241c02b216c49a676861dc648cf29c85a,2014-09-11T01:21:23.133000 -CVE-2014-5658,0,0,bb7b89c6ea7112d32102e301dc1242a272bc8a2c2d99ee85b597a63e9beb9be5,2014-09-11T01:22:01.290000 -CVE-2014-5659,0,0,66ed8e3874ed1ab840ae80476392bbcc190be4e966be076203a1a651e4b7c2ef,2014-09-11T01:22:45.417000 -CVE-2014-5660,0,0,4039115ef67bb5b33fdb788ced0b67fdbbee2840cd3ddc67dfc463c8715b0b30,2014-09-11T01:23:26.227000 -CVE-2014-5661,0,0,88330ebf15eda5998de4a10a253fed3a42655966fb4900349eca1ea66561a773,2014-09-11T01:26:32.293000 -CVE-2014-5662,0,0,bf87626ee08b5af276e7bc0c8cc2af0b850038c509fedf96752ec53609433da4,2014-09-11T01:27:37.637000 -CVE-2014-5663,0,0,c07a060ee747bd35ad53b07964439ca3573de46900f48960ef942d88d69c5180,2014-09-11T01:28:23.777000 -CVE-2014-5664,0,0,969d48348d35c1dcb282a69ff97090aaa4fef256769ee5382f317d7e32c0340e,2014-09-11T01:30:09.560000 -CVE-2014-5665,0,0,c59bc158318fb8e8ecb3796270f657412df0ff205d0e8edacfbc460fb5d2b42e,2014-12-03T19:46:28.863000 -CVE-2014-5666,0,0,1dcb8ecbe513d4d958da56dba94f789794d4e8e99c61d4ef30c3e1cccf557bd6,2014-09-11T01:31:18.623000 -CVE-2014-5667,0,0,16cfb844f260668e02f8c68e2be321f4c94765763d18ae7ae8353d3ff2467fe2,2017-07-11T14:43:45.973000 -CVE-2014-5668,0,0,bd8cba83dacf4c1a4b03c5c472ea31294fc4525bf7072abbd82a1234ca5645b3,2014-09-11T01:32:53.763000 -CVE-2014-5669,0,0,d6f138fdd2343050763bfb18250b2384a9dd25c998a1f5a0b7fa87ff74692e8b,2014-09-11T01:33:44 -CVE-2014-5670,0,0,0675ab230a4ad1426fbb53b9d77bdcccb425ef7e8582c0bb46762508252858c2,2014-09-11T01:35:46.547000 -CVE-2014-5671,0,0,ec92bd4f2d0033873fd5f745dca0cddf73b1a49ffbdaf89485f3b8ada51a9c56,2014-09-11T01:37:47.300000 -CVE-2014-5672,0,0,79237bd089f53802a1a623dac4507ad67e899edbe5ea2a8ef583d1b57853dc0d,2014-09-11T01:42:30.570000 -CVE-2014-5673,0,0,a2bf177fe599477850cf4e52f1f058dc5f1ff0e2a8bfef9876462b07f4fbc65e,2014-09-11T01:43:40.430000 -CVE-2014-5674,0,0,8305c877b02d04795197500eb8caeda6da94b0a25be0e80c422cfd535dfc783e,2014-09-11T01:45:26.867000 -CVE-2014-5675,0,0,262b772cd05f51eae7d01067d13574d9631648660aa20a40641d05765a473bec,2014-09-11T01:53:59.453000 -CVE-2014-5676,0,0,31b9743a6f19075b609a8eedc810ce53daf6ab2c6270288a93b12a94a4dc5a73,2014-09-11T13:24:05.277000 -CVE-2014-5677,0,0,bef1789c75276aad08e164586406a97ab2b7e043fa2c1362e0f83d28707dcdad,2014-09-11T13:11:18.347000 -CVE-2014-5678,0,0,39125300257e52e25cb121b295b4ab42f969ca7ff82f1623c6d23d84e626eae2,2014-09-11T13:12:11.543000 -CVE-2014-5679,0,0,e1c8fbd0e39ef58c75be4f090e4c5c4cdc80931d58acc60866c3935f9b5758bc,2014-09-11T13:18:07.670000 -CVE-2014-5680,0,0,332a5b6a8137e42cd38d46fff99f414daae29571623780b49e640db2d7f91d36,2014-09-11T15:17:12.073000 -CVE-2014-5681,0,0,950c34b5e1f1d2039d42178fea2eb5ba183dc64440f22bd2dac77e9c608f67f2,2014-09-11T14:06:35.047000 -CVE-2014-5682,0,0,f1cf2ea5cd82b26e420cd1ecef680f5d8324c0c24b2de2d25051592d015e3659,2014-09-11T13:55:09.733000 -CVE-2014-5683,0,0,db75c0ac16716684f48dff9af81dfd53954cd24c84db6095262b65100205551e,2014-09-11T13:52:50.307000 -CVE-2014-5684,0,0,3121eb8947fe0be9a2c7a31a0a48ab5a25a28e5bf97203d41edb9bfb9e51eddf,2014-09-11T13:54:21.200000 -CVE-2014-5685,0,0,a2eb1211386bcd2d9377128ef3d1684f118c9527d86b439771498669a99c75b2,2014-09-11T15:16:44.713000 -CVE-2014-5686,0,0,6db3052736611edf41ce3ef8ea554edcb1629498b32107a500b8d304464e38b7,2014-09-12T01:55:49.357000 -CVE-2014-5687,0,0,8f219390720370ff96f6a8a0845b0f12a63a3b472919a3a452903c748379825a,2014-09-11T14:15:08.437000 -CVE-2014-5688,0,0,8f8cc48d796cfbcacafbee8135878ce7a8a9826431d5d396cf966f8d8bc8f820,2014-09-12T01:57:47.140000 -CVE-2014-5689,0,0,e10147db40ef283ecdba9f139420c318055754d872062f0d186d8d811fee2c8e,2014-09-12T01:59:11.937000 -CVE-2014-5690,0,0,a22c5c35525fdad8b5db3f5aab15ca7ca7770bcac235dfd1d5742b2d3704d68f,2014-09-12T02:00:28.127000 -CVE-2014-5691,0,0,4c7331093ef74c73f571c24d5d12ee6e0411dd33bd7509c04cbf8803948e9f39,2014-09-12T02:02:28.503000 -CVE-2014-5692,0,0,42006dd89c7cf7584559bd391b3dab5a47ef6fb983ec0c3d6e82513c6e75c39b,2014-09-12T02:08:14.230000 -CVE-2014-5693,0,0,0071bc355979407c426d0b7cf7868371126098963a23f81edb9bd975b894617b,2014-09-12T02:09:23.110000 -CVE-2014-5694,0,0,2b9f678ae7d8ad48a703b743247d5839540cdc28e66ab6eebf2323238fcb489d,2014-09-12T02:10:47.090000 -CVE-2014-5695,0,0,90b3dccecdab5016bf94b8dcf6a113ac2108f021314bb61a25fd6d183d76f7e4,2014-09-12T02:11:29.220000 -CVE-2014-5696,0,0,63aacd81c27ae0e08908ca281e115799877b721e045fdf4e797cde7e607f18b5,2014-09-12T02:12:23.807000 -CVE-2014-5697,0,0,4d376fc63fc5e4b42fb868c9408b618d0b1fedc8eb55ad717b449ae96b2595ea,2014-09-12T02:13:15.313000 -CVE-2014-5698,0,0,3a14a31fb7f19fe9d7f00610cd4f6f06a60605eb46799e6da9fcd202684b38bf,2014-09-12T02:14:03.087000 -CVE-2014-5699,0,0,970892752149c55d97d68f7365106a31bfa15234b1cab03221b2539f27c69687,2014-09-12T02:17:01.943000 -CVE-2014-5700,0,0,eb82fcbf03be55a4d095e91b9f6c70695293d01261b30bce861ca0d20e463284,2014-09-12T02:18:08.820000 -CVE-2014-5701,0,0,45d43415227118f293438bd5a940676deb656efd309e8285383ed33058aae0a9,2014-09-12T02:18:59.527000 -CVE-2014-5702,0,0,fae6d4906187760049a52a6cdacf2b5c235ae250f9d138b6243a37ace045cdb7,2014-09-12T02:19:50.887000 -CVE-2014-5703,0,0,c7e016100ee68a688899fe42ca00c492ce1bba1d44fe7ea5d7a32d26c391ca7b,2014-09-12T02:20:45.517000 -CVE-2014-5704,0,0,436ca7306e18de366520ff03bff752e530ace58f5ee0cb743c47e77cdab69c78,2016-06-17T02:00:14.770000 -CVE-2014-5705,0,0,bb90095ffa690d4b802725bc8dc5608d4c9dbd18291471e89f422aaa37596189,2014-09-12T02:22:50.393000 -CVE-2014-5706,0,0,6d2282ce8ec5c40d89bbec245acf24ebf2b46a0c60ef1e0e0caea82ec45e0cfd,2014-09-12T02:23:41.833000 -CVE-2014-5707,0,0,dd6c07c2e5c9ba55df31be7d12c6dadb5c0580dabdbc0e71088ce720f2522ef8,2014-09-12T02:24:29.193000 -CVE-2014-5708,0,0,ae262562881bb186a8e4afd687e1ff9a62a44b84580caf0a9d6e60a012242109,2014-09-12T02:25:39.807000 -CVE-2014-5709,0,0,3a010b1bd0dea4f45071de791dd6d36ff8428616559787d281fec0b57f30da34,2014-09-12T02:26:40.573000 -CVE-2014-5710,0,0,48793cbfa518aba53fe9c78268d61eb533d047c32bbf8c5a3ad2f07aa32e3ad1,2014-09-12T02:37:25.617000 -CVE-2014-5711,0,0,255c49edebf95df8f3da708413d830fc9026396890ccf4475960ae8ce0d39d0d,2014-09-12T02:38:35.367000 -CVE-2014-5712,0,0,ed21dce7dcb82405100e6bf99ea34890496d9c891b6d4dba471aa849e98f9b9d,2014-09-12T02:39:23.697000 -CVE-2014-5713,0,0,4f84cb44ef2d2ebe18e8ed58fa2c98f1a4d799becbb32d15e34be7f7d60c1b6e,2014-09-12T02:42:13.873000 -CVE-2014-5714,0,0,01cb7d569fc3f56e826e19e5d440c5c5022426d620430b71c0a3113ab951a982,2014-09-12T02:43:09.717000 -CVE-2014-5715,0,0,0aeeb1f6a7b10d46872062f3ab48bf355e72080fd2877fcbebf4a98bd481c44a,2014-09-12T02:44:01.170000 -CVE-2014-5716,0,0,72b1587cf0229054159ac7b674ca187e3d4cf63dcfdbb7ee8fac52c199c47d89,2014-09-12T02:44:49.783000 -CVE-2014-5717,0,0,92e7b8209560c2d068593417d6e258287740098381c3356354b9a35f28526738,2014-09-12T02:45:33.970000 +CVE-2014-5620,0,1,766b50cf2b607dfc8dec987060036c4ed8152b6a6427b44c5ed90501eee2e997,2024-11-21T02:12:25.937000 +CVE-2014-5621,0,1,c6be8db9db98076888f6709e98fc67fea86aa4a50d9559bd7431eae7e0542cef,2024-11-21T02:12:26.090000 +CVE-2014-5622,0,1,9903d37f7b0ccc5c5855fb37c965803768a49fa0821c217607358d0e8853e3a5,2024-11-21T02:12:26.257000 +CVE-2014-5623,0,1,565e6ac31ae2e5da4e45051a0dc974c34f48c041c06b8eff54af885a982e600e,2024-11-21T02:12:26.423000 +CVE-2014-5624,0,1,04a35fc87e65190ad1aa401b70c5d87090ddd4d3915bc0c259ff334b6e4eb489,2024-11-21T02:12:26.590000 +CVE-2014-5625,0,1,883aba33f10a0f60bcb7c684045c136bbb69aba719177d1bffdce32f9b8e78df,2024-11-21T02:12:26.753000 +CVE-2014-5626,0,1,a71604a725782471f98c6b34a1525e49902a30b13c3209528d94bad915e0ee4f,2024-11-21T02:12:26.930000 +CVE-2014-5627,0,1,104f3f78d71a8caf1bf59e40477ead1dc874e16031294c879be29d26a1f6c87c,2024-11-21T02:12:27.107000 +CVE-2014-5628,0,1,9307eca4520aaea0c7ef32e450539a9841e55da3b50321a2925c50a48cd536ee,2024-11-21T02:12:27.273000 +CVE-2014-5629,0,1,8410f9aa011af59705bae112251e6fdb11b1e2630f1446c1d8d4cab9693c14b1,2024-11-21T02:12:27.437000 +CVE-2014-5630,0,1,c61a8494bd4719e788cf9f8faa56547a961fd2d169f960ed8c00323f37e11ead,2024-11-21T02:12:27.607000 +CVE-2014-5631,0,1,966ac16930abab364b224c3c32111f16f13e7c0fce1d6de41ecd85955c97cc36,2024-11-21T02:12:27.763000 +CVE-2014-5632,0,1,4c6437416cdef57dcbe42a0f1eb48edf7ceb5d5f5dae40c2e5a986cb630178ad,2024-11-21T02:12:27.937000 +CVE-2014-5633,0,1,1c94d62dba3520e8f3bb14923c31e7e86c602930c644da15b633c52f0ec33223,2024-11-21T02:12:28.107000 +CVE-2014-5634,0,1,1d82b0f5ade481b50ae16f88e69a0460345264f3b28721c2947440bde3d64ab3,2024-11-21T02:12:28.270000 +CVE-2014-5635,0,1,a7e238ab381cd45e5f359b124dcb5067287f76764a6bf66194d37ff0c9f87d2d,2024-11-21T02:12:28.437000 +CVE-2014-5636,0,1,4d75e73fa65272ef5446c53bb40c831454934ad28c81831aab1b2e26c6d8ddda,2024-11-21T02:12:28.600000 +CVE-2014-5637,0,1,1cdce610e35d836efa44fc2f180083df803ae2cd912339416b145a3afd788dd5,2024-11-21T02:12:28.757000 +CVE-2014-5638,0,1,a1745f58bdd5f6f7b52ffc815fc22110e462bde67f10b960b2238edd731f654c,2024-11-21T02:12:28.923000 +CVE-2014-5639,0,1,cda5fc8e8cdf6f9e28d8bf47456654c8fc16faad1216049c3a57ebe9aab1828b,2024-11-21T02:12:29.080000 +CVE-2014-5640,0,1,f83498e44cf4bd6d7e6faaa2d30ce321db6469f7cf1c3d1f00b38862e50ca06a,2024-11-21T02:12:29.250000 +CVE-2014-5641,0,1,5506440bf048f4498796630c6e8f0253f026baa5cde1114349e7d55730417586,2024-11-21T02:12:29.430000 +CVE-2014-5642,0,1,b52089e29641055d3af15e7ba0659cb408946a3f00ab9d6c06b2a87be28143e3,2024-11-21T02:12:29.600000 +CVE-2014-5643,0,1,49e8dc312e762c8f55f9b51d4fe259650b82776bc8011072f045360b79732380,2024-11-21T02:12:29.750000 +CVE-2014-5644,0,1,3a15f05afa6e9d010178bb1acc2bf631844bf3482fad6ccb8900f52a1a2a735a,2024-11-21T02:12:29.913000 +CVE-2014-5645,0,1,97fcaf0479276edad10308da525e0df628643442b9918c1d7d68f643d03727f2,2024-11-21T02:12:30.070000 +CVE-2014-5646,0,1,3e3133bb005586415f362ce649fdfc88068e8b8c22cb3cbc8790a03699762810,2024-11-21T02:12:30.240000 +CVE-2014-5647,0,1,81b737c967487734db1e07dac5992698ccf3311cf62d946dfda2d346d5bbc526,2024-11-21T02:12:30.410000 +CVE-2014-5648,0,1,c3c155d2dff08e795ad7b102169cc9018c46ada1f8a20bd05c3a5c4a6a6dbdb6,2024-11-21T02:12:30.567000 +CVE-2014-5649,0,1,cc4ac45d76f3a7fd04b8f4bc89a5ac14951630af63cca65c8c56cf03d85c9685,2024-11-21T02:12:30.750000 +CVE-2014-5650,0,1,6e4c2c514da724b5c9f1d4b7ea2e77753183f51bce039eee7393d2ed5ab122f1,2024-11-21T02:12:30.913000 +CVE-2014-5651,0,1,20c88fd16d8656858e0939c5ac8298fa31be3eaef57ac2cb46d90fc426d140c3,2024-11-21T02:12:31.123000 +CVE-2014-5652,0,1,c4c2f47ef4221140b2550d906fff61302bc773231ac3444c1780c6a31d1f9865,2024-11-21T02:12:31.300000 +CVE-2014-5653,0,1,d56f10da0979c43622d5d07342ea6abbac1cfb10deecddeb984bc29804c297db,2024-11-21T02:12:31.470000 +CVE-2014-5654,0,1,fb0440ca6b5dbcf51b7ff4a779edf15b91ebffaa0608fa0e7336937dc0a41a11,2024-11-21T02:12:31.657000 +CVE-2014-5655,0,1,44a0cb516fa9070a028d887cdb5a9e9e92fd9f5a402eadd9babbd459f3aca4c4,2024-11-21T02:12:31.827000 +CVE-2014-5656,0,1,351b16d042cfc74ac9dcc7f1c6573b8a148b9283cf5edf82c7cbebee68943995,2024-11-21T02:12:31.987000 +CVE-2014-5657,0,1,c581bb7db8ccbd55122c1d43bde4ef419b5e8c6724047ecb22253255b44aa6b6,2024-11-21T02:12:32.933000 +CVE-2014-5658,0,1,086f5c6a4b0438168ca0088a90f85b8dab6550c46596fc27438c54a361f1d723,2024-11-21T02:12:33.143000 +CVE-2014-5659,0,1,b82950d46e7818b9c1829d5d2275bbf6a13618651b3582bda0c27842dfd1ab54,2024-11-21T02:12:33.317000 +CVE-2014-5660,0,1,c7506ba0bf17a532d89fa804e7d6895178d9877db21834a15b832fa09d3b7659,2024-11-21T02:12:33.490000 +CVE-2014-5661,0,1,53945f44782a6c70b70d0a76e1e76b2c84f97c4c3d04ea4c9f2bd1046f4cad9e,2024-11-21T02:12:33.670000 +CVE-2014-5662,0,1,e4f6a319d68b713d1b4beb4a25f7b7c37a212a75912333694d23bda058b5fd40,2024-11-21T02:12:33.840000 +CVE-2014-5663,0,1,74270e1358a1c0cc8180fd550660bcbd273f62c4ebeee417b1793e6982995ac5,2024-11-21T02:12:34.013000 +CVE-2014-5664,0,1,331439f82c9932fd3fc226e58ab0163860af027a8bc9d2b79a0db337727348b1,2024-11-21T02:12:34.187000 +CVE-2014-5665,0,1,b1045571b180c63ae985c68c8cc442884070e36b64db2a92fbb6a0220882a37b,2024-11-21T02:12:34.357000 +CVE-2014-5666,0,1,658f1a61e7b158b2444c9f22be1dd55f432024dff5091c5bbfc336a7c7d30992,2024-11-21T02:12:34.530000 +CVE-2014-5667,0,1,c95433004138ca21aaf291d2f726aa21cba14065cddb6ddb097f8699ee2a840a,2024-11-21T02:12:34.707000 +CVE-2014-5668,0,1,c0c6fe062bed5c38e93b1f846a17552568bed0770faaebff82b2fe544caef9f6,2024-11-21T02:12:34.890000 +CVE-2014-5669,0,1,14eac5ee533b9587d1c9e37c75a4c3f21138d7773548755867c949d15e6bb770,2024-11-21T02:12:35.060000 +CVE-2014-5670,0,1,e30bff18b183ace2a934965701b0c37e3c71ce9551c97a05da57f4572b81e4aa,2024-11-21T02:12:35.230000 +CVE-2014-5671,0,1,7b536a520b5c3f667d217336e084518a3a5900f9e58b08f4e66b1c2c61fa99e1,2024-11-21T02:12:35.400000 +CVE-2014-5672,0,1,87d4950847e006028197f8bf3eef66808b604d20e720e5eb8288dfb9e74ed0e8,2024-11-21T02:12:35.573000 +CVE-2014-5673,0,1,b998d3774e4f55d7985969b8f731ea86ac1673a10932c96f2f49f8cf5fe644a1,2024-11-21T02:12:35.753000 +CVE-2014-5674,0,1,41393b868d0e7029bac129209d9d4e3716270ccab69bd2c8746f8b83e6da31d7,2024-11-21T02:12:35.933000 +CVE-2014-5675,0,1,84ab7ec1e7670b8f0640ff9f9eb368dabf97ae769779164306f2acd245b09cea,2024-11-21T02:12:36.093000 +CVE-2014-5676,0,1,64eb267011599ea844697dea64b55898ec1ec64a1a7b549995953a49ca7b5db2,2024-11-21T02:12:36.260000 +CVE-2014-5677,0,1,55d3f4970c2a05329cdf288d39150572d8c47b44571f5790917eb5ee1100534e,2024-11-21T02:12:36.440000 +CVE-2014-5678,0,1,afca42910464daf14f367ab06aaa66c364195c42f684ef0ae69a69611db4c289,2024-11-21T02:12:36.610000 +CVE-2014-5679,0,1,73a9dde6622333d4c0d3fb232c1cca30b3fba7997fd48817e47d8eea571d6b17,2024-11-21T02:12:36.780000 +CVE-2014-5680,0,1,f258a7f5101373ab2ea927a39985bbe19b5acf706d98da0a4f904a2a951dee5d,2024-11-21T02:12:36.937000 +CVE-2014-5681,0,1,634587b24d7fbb94f20fb178434c252cae2372e78ce9e884888f19cc1d91e0aa,2024-11-21T02:12:37.130000 +CVE-2014-5682,0,1,e3e069791139101eb733828f01000994f80f41d4a670256d599d767f2a89b80f,2024-11-21T02:12:37.303000 +CVE-2014-5683,0,1,2b224dc19f2abed01c4f175bd95c3848ef365ad1413b2e276650a2437bb18603,2024-11-21T02:12:37.460000 +CVE-2014-5684,0,1,ffcd8b772443f386222c9c288fad316ae362b888f9d9b5c7513cf3242005a150,2024-11-21T02:12:37.613000 +CVE-2014-5685,0,1,de760be0c61cc4455679a0d22cf1b8923aa82dd49a097a3b9942121878dceb6c,2024-11-21T02:12:37.773000 +CVE-2014-5686,0,1,1daa2addc28613ccb4605a54a8eecfb762971e99222f4343105b911b31b6fbad,2024-11-21T02:12:37.940000 +CVE-2014-5687,0,1,6815eddd764c5fe19e985b0a92171e36f659dad3d23d7a74bd4dbd412844b67e,2024-11-21T02:12:38.097000 +CVE-2014-5688,0,1,c6de85a12e99b6612c77a638d2fd61eb4796e8969605f60829615af04823cda6,2024-11-21T02:12:38.250000 +CVE-2014-5689,0,1,82e03763ed68323f04d9f169abe7f9c41d9e0352f970f49709472f6657691f65,2024-11-21T02:12:38.417000 +CVE-2014-5690,0,1,e32db406bb9e3f247a184a9d180f641ebc94ddefa74b35e2ca65a38aeadfaaf8,2024-11-21T02:12:38.573000 +CVE-2014-5691,0,1,de4a65d9e60b962d7a423da363e720fe9fc7b7d125e6b77b469f5e79d279f104,2024-11-21T02:12:38.730000 +CVE-2014-5692,0,1,21b950960d1aa4e6d658c9e47b55ee1a10bc695dbdc1f6c153994eaddbef26da,2024-11-21T02:12:38.887000 +CVE-2014-5693,0,1,aafc53ac0f9ca963a83d128bfb843fd3b12fe91c225200355d4ae5c71a3a3a8c,2024-11-21T02:12:39.043000 +CVE-2014-5694,0,1,12115e28557f5dd951b3998f2e6beab72bd324f391dc3440716df504dcf7f860,2024-11-21T02:12:39.203000 +CVE-2014-5695,0,1,8defe81718605eaac905506fc9ac471985b581ba9c768dae09bddce125ef962c,2024-11-21T02:12:39.367000 +CVE-2014-5696,0,1,127f8534f19030f3f74af739c6c6493d2f8ddb0d9d73f0dbe0c912f169e26b1c,2024-11-21T02:12:39.530000 +CVE-2014-5697,0,1,2550d0f033102873040ed3bfdece2b996d2c5664163dc960b0055155942a4e7d,2024-11-21T02:12:39.700000 +CVE-2014-5698,0,1,c0322f42b2f5720ebab1b932cbcdf45a1b3034f357ac4b5d6ccefd27247383da,2024-11-21T02:12:39.857000 +CVE-2014-5699,0,1,56c31737f9554be9f0f774f76878db5fffbd721bdc39722001273a9b41490bf6,2024-11-21T02:12:40.010000 +CVE-2014-5700,0,1,e1d3d8cd95a3e754772294df443dbe432dafa9c706b1255b6ea03d6cd07a12fd,2024-11-21T02:12:40.173000 +CVE-2014-5701,0,1,9186537b273ca7ccb189a838bd37e5b38f37fd48fc89704905feb0c053ebf859,2024-11-21T02:12:40.337000 +CVE-2014-5702,0,1,ad2957f694c4284b3a4cdd0a86680414ed5558029c97e3ed336518de5b3bff75,2024-11-21T02:12:40.490000 +CVE-2014-5703,0,1,551e856e4f2d2a2c5e5cd428c2d435bef9e6289d4fff5c207803c4da02edd4b1,2024-11-21T02:12:40.650000 +CVE-2014-5704,0,1,c744703db0a6bce8baca8df77602ecb1b72d42eb006f4e60feebed811192f753,2024-11-21T02:12:40.820000 +CVE-2014-5705,0,1,9a264974b1d874eec67905eb107fecc8abb22979595e98fb936d4542ca154bb6,2024-11-21T02:12:41.003000 +CVE-2014-5706,0,1,ef5d97b881ed38ee9daa77b098dc3c9efed87981e59d2cae5331d909167244c0,2024-11-21T02:12:41.170000 +CVE-2014-5707,0,1,63bc8d3a8cf36b3b4d18b59caa2acc3c714db994875cc3a536e6f2721925aca5,2024-11-21T02:12:41.330000 +CVE-2014-5708,0,1,e31d8e3db4ea9d77588e2b4f926eed3d9bd59c7581110c72aed23f0c0f6905c7,2024-11-21T02:12:41.510000 +CVE-2014-5709,0,1,f8eea927272dc7f321871f4d26b8447c431aafbcac1ccea849a62dd4de13e31c,2024-11-21T02:12:41.690000 +CVE-2014-5710,0,1,dbb99e8305941e6268d127932cbd7d7d03cae019b2b63023c0b2c3f2fcaeabc2,2024-11-21T02:12:41.867000 +CVE-2014-5711,0,1,2c90e9141f0c48b415645c8e8fd9081d3a9f6cf4f0724bac5fd8e483bf3de50b,2024-11-21T02:12:42.030000 +CVE-2014-5712,0,1,6af23993d91d70d98051940a18c55ff03be0e591ffa01901d0119ea9cadc18c3,2024-11-21T02:12:42.203000 +CVE-2014-5713,0,1,204b714c85eb53bc5fdf6fefe24158837f2e4a0805d5aec4bd84fd9f06f5d394,2024-11-21T02:12:42.373000 +CVE-2014-5714,0,1,3abb09b973cf0a88d14e004e8d6d204a9c0e267e12c54d5944c265b40be90ddf,2024-11-21T02:12:42.533000 +CVE-2014-5715,0,1,e7d0741d7990478e759541442eb1e0e4cc2b69dd9e67fcd3038c9d55586d5753,2024-11-21T02:12:42.707000 +CVE-2014-5716,0,1,93222ced476d2127a9e53eeffe7ba23d67e1475bf54d5f4c3dbadb7a2e270170,2024-11-21T02:12:42.873000 +CVE-2014-5717,0,1,e7583adc2bc6d18a3da233157baa52418f1c7841f107bbf97f93a9b4422bc3ae,2024-11-21T02:12:43.043000 CVE-2014-5718,0,0,a6f60b69b3051a9d4072a287ab4636f760ec7301139e00173678fd83bc1bd611,2023-11-07T02:20:53.453000 -CVE-2014-5719,0,0,829e5587de719e288c840785fb881490540ad7c7e052d5465e2ebe808f442f5c,2014-09-12T02:47:34.097000 -CVE-2014-5720,0,0,cabb329f1fa7b67236a2711b1a3230008958082c35ac7b00ce26ee110ac0afcb,2014-09-12T02:49:06.707000 -CVE-2014-5721,0,0,0f9cb18d2884243d223a25ebc5d7933f26c74a3857f9902eedf6dee7e8016ba5,2014-09-12T02:50:36.350000 -CVE-2014-5722,0,0,13414a1096e3fc23582b3f94686f0cc8061272168ecfc9238c1c56ca675dda3f,2014-09-12T02:51:34.150000 -CVE-2014-5723,0,0,58fb76bcbbf0e80000a4292fc768ab54286b2391b1608ab0ae82380a423a0fb2,2014-09-12T02:52:15.040000 -CVE-2014-5724,0,0,a05d3b03da7bed04080e26b294e5dd9a312f5b3a76adcf19f337b6f4d5fbc8e8,2014-09-12T02:53:10.417000 -CVE-2014-5725,0,0,bdbe6d4dbfe2394ce309019dfccca30dcd213e21dc9478f2da5f4c71adb98cf6,2014-09-12T02:54:15.590000 -CVE-2014-5726,0,0,9722dc422683b0db6d65554174be3f8ba656fe449836101dd589384953fba478,2014-09-12T02:55:31.357000 -CVE-2014-5727,0,0,32e9b204cec54f3960a09b282e9a40321a9bbdfb0025d9110afae340ce556f87,2014-09-12T02:57:10.483000 -CVE-2014-5728,0,0,a456ff47cedb292df4ef0454d70467166bd9f413f0830bf6c15c4e22bbc35357,2014-09-12T02:57:56.657000 -CVE-2014-5729,0,0,de83a20973a43c3a2c06c2bb9a014145b8708b3d32a461565000db205840ccbb,2014-09-12T02:58:46.547000 -CVE-2014-5730,0,0,919e45795f5276c522097571d48d8abd32f5021b4aebc5e070faead03ed9daf6,2014-09-12T02:59:56.627000 -CVE-2014-5731,0,0,2d92ddeeef0fb91fba215539cfdbb4535a337f954386aacd6a4d488df95c8dbc,2014-09-12T03:01:07.177000 -CVE-2014-5732,0,0,cbfe25a8820ff96f76725b45a86415e14431657f93bbbc5c1bc0f825fecd1bcd,2014-12-10T18:21:13.517000 -CVE-2014-5733,0,0,49ecd0b82d09309caed70d729057be34aac723eab187c32807ee939c77a3239b,2014-09-12T03:02:49.663000 -CVE-2014-5734,0,0,fc0c1633e8bf783d10e4dbfbe99b0672312aebece93763c6d60d1c3857667bcb,2014-09-12T03:03:41.837000 -CVE-2014-5735,0,0,074066a2c62b2e09cccab18a0f99021e4f2cf6e10eff25f8ae5d30cf60acfaf7,2014-09-12T02:56:17.420000 -CVE-2014-5736,0,0,436af218187e6b4bdf6ace7056815bdfa0ea0ea7b25e9e494bc74e45cdc87c25,2014-09-15T17:48:40.067000 -CVE-2014-5737,0,0,657a46feb3e6ff8be710e3739aa1249bb6a2cfb5301eddcfd09a8695ed995d2e,2014-09-15T18:52:20.460000 -CVE-2014-5738,0,0,f66865f40f51cdc46dcb8b6db186fbd14bd8dee393406398454c846d9c3b7e6b,2014-09-16T01:24:28.890000 -CVE-2014-5739,0,0,d1a680a90dc6840197ca85b1a2c0746b03b6dc03915573b13bfdb614fd337e62,2014-09-16T01:24:03.267000 -CVE-2014-5740,0,0,6f5235c5a7bab125456a257b51bab34f260cb918ec281d2f8747756a45de6397,2014-09-16T01:21:41.283000 -CVE-2014-5741,0,0,71e9c1e588e43a71f4b931c3a0682e7f34bc6abce9fa5148b29f980634fd9739,2014-09-16T01:25:22.343000 -CVE-2014-5742,0,0,52a54c17d8f0c86f6df476e316127c0524cbe62d72d31b4e9ef0c4f4b3b77c24,2014-09-16T14:52:31.387000 -CVE-2014-5743,0,0,b8463a67b1517c8f9400d22189c0d399481d3bc6f62d6cce2b53742146088d91,2014-09-16T14:52:09.590000 -CVE-2014-5744,0,0,3a7e23e0b55526cf3652e4468b848bc3960bd551c3c764d310f0ab01c165b8bc,2014-09-16T14:51:40.433000 -CVE-2014-5745,0,0,1b32dbcf9df28fe67f7770d02acd5c86b3bf9d6f8052d91c2e7a696288bed472,2014-09-16T13:49:57.803000 -CVE-2014-5746,0,0,451b7c70384eebb2660bf544e672add0946193f13d7189857146f92a0051d3bb,2014-09-16T13:49:09.630000 -CVE-2014-5747,0,0,317077309c7665fa5932028b02ed1619663b5dfe9e3108fb891728383d1512d3,2014-09-16T13:48:13.380000 -CVE-2014-5748,0,0,5f9fb08cb7ac97cc7ef64558288f616a870db41c1790c706336d3e14fa32c3c5,2014-09-16T13:48:49.677000 -CVE-2014-5749,0,0,293814fa0e14ae0b015e69e063d77f1d6675b0f3e7572dee15214c0016f08a08,2014-09-16T13:50:19.803000 -CVE-2014-5750,0,0,49b2a84baf454e7a33863de6a6f984959d38b40d4011062b88c8a73df4e8f0bc,2014-09-16T14:19:07.213000 -CVE-2014-5751,0,0,65c214a13f4d2c8823f8d95d6c1b8e9a57fd7a924ce154bd172fdea78a1ac55b,2014-09-16T14:18:36.087000 -CVE-2014-5752,0,0,4d0aeb129b0bc9081e1725e78692e917b3421db9f74b8e099d18a7211d8ba357,2014-09-16T14:50:21.280000 -CVE-2014-5753,0,0,707eb0a0e2a065cf155ab4eaff5507414348afef6e149e13e3c06dd0b3d35b21,2014-09-16T14:51:11.623000 -CVE-2014-5754,0,0,c679ffedd8f0a213773e234e8e3e13d3ce5267ebd95e62a5723ae40c4c46b2a6,2014-09-16T14:50:51.327000 -CVE-2014-5755,0,0,5534c24a81ac37eaa837ff556e4c22ce813199a63b09549dd79d66dbb4641fe2,2014-09-16T14:57:34.260000 -CVE-2014-5756,0,0,b3cb3787c9e8656a62f8e4edd393ad34ced8c9fab0149c45eed5e513334a6760,2014-09-16T18:25:45.057000 -CVE-2014-5757,0,0,692b450f28686b6d7fae9d80348ce29b0e6ec41a31d7209d6d2c9115d810ce73,2014-09-16T18:25:20.243000 -CVE-2014-5758,0,0,c0327ba3e8488e4584a6cb43dae81c11f8423075678933afa64cbff296212f6d,2014-09-16T18:24:51.917000 -CVE-2014-5759,0,0,f0a0d570652fc42582a72e8094d5d8b228afd64ff03c9ab45fff173aecaf7cb4,2014-09-16T18:24:30.260000 -CVE-2014-5760,0,0,bc3d403613674f02a37d9e4f479d6e2b48bc996c56bc53f9fbb3c9b4501bcaf6,2014-09-16T18:23:43.197000 -CVE-2014-5761,0,0,4266b0343bad0f61ff6cccaaa949b279f68cdd9e53983904f4e28d4974878d51,2014-09-16T18:23:11.633000 -CVE-2014-5762,0,0,00c26032f863fc9844f5315090b7b3b87d54066c0c50ece0dd162e60dda14db8,2014-09-16T18:22:54.510000 -CVE-2014-5763,0,0,1c5e22a6b8b74a56f902ec00b462ad6470646e7ed9f7af964ec75c74c4f9cdf7,2014-09-16T18:22:34.307000 -CVE-2014-5764,0,0,3b3720e68b97f88fe11ea5c5476a7456ff64a6028bfb250ae1ec99542b21c03f,2014-09-16T18:22:13.353000 -CVE-2014-5765,0,0,fb390081aad911aedb78cffa26def0060dfa937b0fadac7aa6a7c1fba7157c9c,2014-09-16T18:21:50.697000 -CVE-2014-5766,0,0,91a6c7b403ceac11d3eeb8983d9fa93e37fd7db29493a3e8d1de9c7796ad2137,2014-09-16T18:21:31.713000 -CVE-2014-5767,0,0,66adec38165bf843df8b703c04edc907313dd4f3a1a1139e448b34c9337d4278,2014-09-16T18:21:08.587000 -CVE-2014-5768,0,0,c7e87fe1802af80b7b5199046c9317e63652c0208028507113dcc2a85a8a7d4d,2014-09-16T18:20:48.120000 -CVE-2014-5769,0,0,6800917adacd1e47bb2f3eccbddcb729c8b145595c254b488d8773274238eaef,2014-09-16T18:20:03.730000 -CVE-2014-5770,0,0,23b0fdeea147a15177f490f8600c0c0c23c23f3285d62dd2997a37b95b6b5b92,2014-09-16T01:22:37.907000 -CVE-2014-5771,0,0,606e1208c27929139fd0c7e2b9c1cd877962b016b87e9ab16debdf9b977488cb,2014-09-16T18:19:44.183000 -CVE-2014-5772,0,0,15950a5ccacac25e31b5aa27921c1d190433e3ad1b4c84b40dbc5c52d97de378,2014-09-16T18:19:07.213000 -CVE-2014-5773,0,0,34c8eb646f8ce314e2f25ad990302951450f338ffb5a38fdfbf54ff26852d8a6,2014-09-16T18:17:50.107000 -CVE-2014-5774,0,0,2c0f0df300823e1fa20a840fabf0fb8d8f9112616693224c833b6be0ea9a1673,2014-09-17T12:53:27.823000 -CVE-2014-5775,0,0,7ea532fe7a44133806f42fad65128e79f50a8a702c3072458698f265772fd409,2014-09-17T12:53:54.793000 -CVE-2014-5776,0,0,da3f44cfab5d0b0aa7267cd659d9c3d3bfd5471df39204dee7f936f6dc70653a,2015-02-05T17:37:54.817000 -CVE-2014-5777,0,0,1286f3708908f6777fdd32a08cb19c0fd5b93f35859fa8c92a744e103c26c8b8,2014-09-17T12:55:04.403000 -CVE-2014-5778,0,0,ff89d660d94eb990804dad40f9cabf0dad04915c4c38bf9581a179f18d982d9f,2014-09-17T12:55:48.527000 -CVE-2014-5779,0,0,b290cdb7b345f81619cab13f0f134763525231c310753d88f2020e046250f6c6,2014-09-17T12:52:43.653000 -CVE-2014-5780,0,0,8e2eb0911bcc9ed447cab85fe2f843d06ff341a763f74c094c297dfa66114be4,2014-09-17T12:57:43.963000 -CVE-2014-5781,0,0,771799a8a6d14332debb74e527d6db96a66d89848abf6eefe57d37433aeb814d,2014-09-17T12:59:17.213000 -CVE-2014-5782,0,0,d667ae5b16bc308d4733091b9fec74589d3c83b0104298ff1197ab732b5f824f,2014-09-17T13:00:30.947000 -CVE-2014-5783,0,0,8b19d06f26d4d9a31ae028234c7d4f89ede29f9e9e26bff232221c66049c56e6,2014-09-17T16:05:19.997000 -CVE-2014-5784,0,0,30f0b72a59c3450e823f19b11452f462a24c193177b08bf4cb04de805e64da7a,2014-09-17T16:07:34.357000 -CVE-2014-5785,0,0,d0b99b1a66dc3f402df9e943a977ce543f30045a7f7a9d60f5fb64ad8ef03505,2014-09-17T16:11:13.620000 -CVE-2014-5786,0,0,e35c023511d13ee219f9c9fdc89cf2f80728f7484d8528575211b530bac50ebf,2014-09-17T16:04:04.963000 -CVE-2014-5787,0,0,8ba784ec92fccf0cd01f0269bc13625631b1550905ff19a1a0f64e6b78f5c1f7,2014-09-17T18:58:10.427000 -CVE-2014-5788,0,0,5692376dc79f85ed6221b78ac5d7b25aca3efc51a39081dc9e83bf91d96b7cfe,2014-09-17T16:15:54.250000 -CVE-2014-5789,0,0,54e32980a171c13ca78d4e937307d962f6a43996d934a704f6cd6675124bf9a4,2014-09-17T16:17:20.500000 -CVE-2014-5790,0,0,69af6846d58afeff5de62af522d4ab710858dd0cc17a2e6ebe21852e657d01b8,2014-09-19T01:28:43.133000 -CVE-2014-5791,0,0,788a6a715a4d7be3d92326bd2d85c79ec6e56af9ab79c57dca1e1f80fb885f4b,2014-09-19T01:28:11.617000 -CVE-2014-5792,0,0,fece5f0aa35025286c023d274914ee8193e50e4fb3c71c7845f8218da0316541,2014-09-17T18:57:49.943000 -CVE-2014-5793,0,0,fa2a2edda3b9aeb165d218c26fc8bfb5cd0a34535c7773527547506531d4b714,2014-09-17T18:57:05.020000 -CVE-2014-5794,0,0,c8de43a684cf1219c80ce4caab0ee085696f66e1d706f13b973fc277ec6c6aff,2014-09-17T18:56:18.757000 +CVE-2014-5719,0,1,4328cb9c3d25223375a586b1121704bbfa5f44ba9c889b2856bd1df777d2744b,2024-11-21T02:12:43.227000 +CVE-2014-5720,0,1,fe8f8da7046f2983c6189cb2e6ad7a37619cbceb5b8d7209253153f76a50b5de,2024-11-21T02:12:43.390000 +CVE-2014-5721,0,1,dd8181f67cf5488f6c383dc9ac5ba8a58de21860c849a6a671f873be3278e4d6,2024-11-21T02:12:43.563000 +CVE-2014-5722,0,1,556ac2426b9de5f8b25111610d43bce557450c3eac1d16aba1bba673c6ff9e71,2024-11-21T02:12:43.740000 +CVE-2014-5723,0,1,ec1596e32c12a80f4cb79b11b99ec494e9e38bff4089da40d237967535ead422,2024-11-21T02:12:43.907000 +CVE-2014-5724,0,1,359f875f5cd72cf74e542e0beb412ebb0cdcb7c6e103669842261a2f3bdbe28e,2024-11-21T02:12:44.077000 +CVE-2014-5725,0,1,c2024cc8223d96c852cf7334a1cf95c201aee2d31770f0202b8ee684baef6ed7,2024-11-21T02:12:44.240000 +CVE-2014-5726,0,1,cb1a3f9a283e688a487807e1fcf69ddff937b15251a23f4000fd7a7891edd704,2024-11-21T02:12:44.407000 +CVE-2014-5727,0,1,658e66f5c85c49ceaf6b1d6c852e05020cbc599c8db215f321b0f049e9cf5a13,2024-11-21T02:12:44.567000 +CVE-2014-5728,0,1,857a4305ed0dda3c84fd420f8e2834e9d0017464e4228a693c0fed3fadc89960,2024-11-21T02:12:44.737000 +CVE-2014-5729,0,1,f5743aefeb22cf0c296494738c1602bb029a3eb9e0d35576fa516d869c8ae51f,2024-11-21T02:12:44.917000 +CVE-2014-5730,0,1,ead214fb8600d183fbcd757dd98e6674669b10d683050a71a0452b0e199e39a8,2024-11-21T02:12:45.097000 +CVE-2014-5731,0,1,1da449ffedc39bef703aefe6d923ca47537a3289ecbdfeb787a2fb0707c114eb,2024-11-21T02:12:45.277000 +CVE-2014-5732,0,1,399b068f12fbf0aa37381926f1c26f3e56d40b3e355ae7e2ce71a74da9657a09,2024-11-21T02:12:45.443000 +CVE-2014-5733,0,1,0a045e27388c420c72255bd665149aa19bf506bca758844bbba8ccc82c681da6,2024-11-21T02:12:45.607000 +CVE-2014-5734,0,1,d01153c24ec6f0ab1bf4f3d7225d0adefcee17db4b213a79d9444c762929a509,2024-11-21T02:12:45.770000 +CVE-2014-5735,0,1,1a03f79da11668ea1a68df21e68a7e3e4842e00dba7c6d16e9bc493eadee44f5,2024-11-21T02:12:45.950000 +CVE-2014-5736,0,1,2ffdb64b2aded8954004f026a70da86a59592f78adeae5649079e71459a122dc,2024-11-21T02:12:46.373000 +CVE-2014-5737,0,1,3dce94ecbfcc62e60e461c117a687922fcfc8bde103ad798c393f37b36812879,2024-11-21T02:12:46.667000 +CVE-2014-5738,0,1,eee85654d1ae69fb432f67d4850f21803c0ef1fa3128af8d1655f0c8bd83d06d,2024-11-21T02:12:46.837000 +CVE-2014-5739,0,1,6db530e033ebfc8bb047ff5bc33d12a8a7b735f65716bc7dc1db746753e8cfd5,2024-11-21T02:12:47.003000 +CVE-2014-5740,0,1,a0c7bea04ea948091d91c242d7f0edb4050a9553eff908b3cd88cecd8c1346d7,2024-11-21T02:12:47.180000 +CVE-2014-5741,0,1,dc907d6cf7d318b70ef0acc0da27cb4cf5b0437d145c69603f80cb5c3b697ce5,2024-11-21T02:12:47.343000 +CVE-2014-5742,0,1,111de80486e50410e5bfc6895c01cdf529f6d9600a6157864c7f9811659cb573,2024-11-21T02:12:47.520000 +CVE-2014-5743,0,1,bc1d420d919c74b28ea53441eebbc1f2d5571d10bbe2ee2ef2809f99de3dedef,2024-11-21T02:12:47.693000 +CVE-2014-5744,0,1,c9e83383f571fad404b16ce6e815386c638a14fa1abaed9fe39624c31fff1775,2024-11-21T02:12:47.863000 +CVE-2014-5745,0,1,9219d462d8177547f263637b6af90075ccf49f14fba0dcd145918818ed2e03ae,2024-11-21T02:12:48.030000 +CVE-2014-5746,0,1,8c37d147aa24520537478336d94527ec11b516942a16562ee119c2d8f16a848d,2024-11-21T02:12:48.193000 +CVE-2014-5747,0,1,ff33101abb370146213288fe61924c62185d3e6b4e2a20f7a8dc99751315784e,2024-11-21T02:12:48.363000 +CVE-2014-5748,0,1,8a90d3a2737b668491c6bd964cfeba153d5b0fc0e22364062211ad6cf1aa2290,2024-11-21T02:12:48.527000 +CVE-2014-5749,0,1,f2a8367213fd9a425250feeb7f7801fc5a01b307b849a933e4bb1408ad69f43c,2024-11-21T02:12:48.690000 +CVE-2014-5750,0,1,7700e004f99021fde369b5341a662f67b0aa304addb43f782268b84903af8600,2024-11-21T02:12:48.853000 +CVE-2014-5751,0,1,b5369e28a99fccc714d62a750fb8460be1d7628246b96b3e664f9a52174e6dfd,2024-11-21T02:12:49.020000 +CVE-2014-5752,0,1,97432849168bdc0234d2a954822769105315c0cdf19cde196f4b06ac9e4ea736,2024-11-21T02:12:49.190000 +CVE-2014-5753,0,1,2b77401700fb3ad0f69305125fd5bbc54bf32bc0b9236c04b1bc0242e9794f46,2024-11-21T02:12:49.363000 +CVE-2014-5754,0,1,f0d47119526bbe46d493ac8cd4a00c993c5acde352f041814294f9d6d91438b0,2024-11-21T02:12:49.530000 +CVE-2014-5755,0,1,55310528693a6d724fbbf5b04bf4e6b75333ae9ee868b9d4f405cc584dd23c0e,2024-11-21T02:12:49.707000 +CVE-2014-5756,0,1,48398c56f29ed841930cfa19b1afaf2e6ad425ef0f4523b1d2e9105cd14d9fea,2024-11-21T02:12:49.877000 +CVE-2014-5757,0,1,35b1286b3b210783ec0379008af759d98523f0e59b45fe82273b8106a1dc5677,2024-11-21T02:12:50.027000 +CVE-2014-5758,0,1,b0b8be9573d99051de4adac15c23c3856d7ba6bb4b73a998114754f686287cf2,2024-11-21T02:12:50.210000 +CVE-2014-5759,0,1,ea4d494b5234585d0d227e1918cdd4599303eb909b40acc7b1c2a7a0a352388d,2024-11-21T02:12:50.373000 +CVE-2014-5760,0,1,209169cd54b6dad984a5692c21fedef297febc29f8d9aa4dd83d0ec8b525fc5a,2024-11-21T02:12:50.537000 +CVE-2014-5761,0,1,e8ce749378325e1c7875fa933c3b007c77202f7362e06872102194262ef05219,2024-11-21T02:12:50.700000 +CVE-2014-5762,0,1,044a4c964573a314705d1e48c35c3bf9310495482f972c0b2812328ba9f6ab1a,2024-11-21T02:12:50.863000 +CVE-2014-5763,0,1,1917cebe0a76c7a0627cf254adbc479daa94979ee570e0aebc7918b3aa53c593,2024-11-21T02:12:51.033000 +CVE-2014-5764,0,1,61bbf451754e6f9b870dcaae94a075ee5bbbb11c48eed1854179f7ac8b905d35,2024-11-21T02:12:51.197000 +CVE-2014-5765,0,1,1d42923aea9cef3c7077320a789f707a65af60237cbde127610e1b1aa8793105,2024-11-21T02:12:51.363000 +CVE-2014-5766,0,1,42b19794f7122c68a010de2fa87b8987bb21b20192e8f021faa930b7ea5df348,2024-11-21T02:12:51.530000 +CVE-2014-5767,0,1,294dd0e93677818d4213a9e6e949880ffa80b96da47bf4fe2aa93b7d09994f2c,2024-11-21T02:12:51.723000 +CVE-2014-5768,0,1,afbe0803ce306dda718e9543b9cc4f6aac1bb67e16521c06dd664c922e6de998,2024-11-21T02:12:51.897000 +CVE-2014-5769,0,1,23b6d788227eede962369f1c218b56ba6fa35c209ec120fabf632277264e474a,2024-11-21T02:12:52.073000 +CVE-2014-5770,0,1,b41c5770a6a765e41f37ce8f97371a2952234c5e2f8e9add1034fa768d1934aa,2024-11-21T02:12:52.230000 +CVE-2014-5771,0,1,8a071c862a4afcc803f3421c967a25b8e4328ae22a92816bd6e98ad8fd27d74a,2024-11-21T02:12:52.400000 +CVE-2014-5772,0,1,e90adb2b5beb7595cb68e56c0250a210b5f63395ebb04bcc941c6ac68921f926,2024-11-21T02:12:52.573000 +CVE-2014-5773,0,1,ae761df551f9be9c7647d170b3531f789520e729706b0cc2e94f0015581c5696,2024-11-21T02:12:52.737000 +CVE-2014-5774,0,1,f646f73258fde3762edab84eb6bbadc077798173fe01593faa400330e1b02dd5,2024-11-21T02:12:52.907000 +CVE-2014-5775,0,1,3281da5313abe1eb4aad700f7a3cf66bf9f8b265ea7a78924bc7001c1cfbd863,2024-11-21T02:12:53.073000 +CVE-2014-5776,0,1,9dfbff9229b65cbaa5f2e375185ef0538ab1b57814417d194c2fb8da2d11af67,2024-11-21T02:12:53.250000 +CVE-2014-5777,0,1,858c7f3fa2cf5ff624599e235dbc8281bbe35bb4900741b73f5cd0cdb5c5bb54,2024-11-21T02:12:53.417000 +CVE-2014-5778,0,1,54dd1be07b4a8c53be70dbb996b00ac440d207b5ad22393f8c8950aeabf1c91b,2024-11-21T02:12:53.580000 +CVE-2014-5779,0,1,2c032c46acf5412a65469a61d60021a8ac45788b82ebc1410be1aeb7854bf2f7,2024-11-21T02:12:53.753000 +CVE-2014-5780,0,1,9e75e0dace3be297ea36027fcdaa369c06b42d1d7854a266570ca427381cfb8c,2024-11-21T02:12:53.920000 +CVE-2014-5781,0,1,729f0444c270aa81bb3481297bd6392f731e4b89e9150c98cc2e9f8641b9cf0d,2024-11-21T02:12:54.073000 +CVE-2014-5782,0,1,4e428a01ee7bd8d202f875bba5b973de48ea25290fb6cbd3db9948f01d01c06b,2024-11-21T02:12:54.240000 +CVE-2014-5783,0,1,964f5a2897a5679683e62ca27b6b7fc8862898944d63e7d78b0a00251bf7f72b,2024-11-21T02:12:54.410000 +CVE-2014-5784,0,1,11b4c6fcd9f2496f85dd0e9cca50d69933c8781fc701930738db4ac13a600ff8,2024-11-21T02:12:54.573000 +CVE-2014-5785,0,1,5b23d7acf270a61b1faeb4655566b778db9bf024b5d966352e236d279ca3752d,2024-11-21T02:12:54.740000 +CVE-2014-5786,0,1,79ee1c9dc56656b403e325e31fff1674f75102b5224d9f79b09032b38f9e8f00,2024-11-21T02:12:54.907000 +CVE-2014-5787,0,1,4057f52bb2197edd73ae96f127691fe22a2c19baae0db193c0f393e1e0642329,2024-11-21T02:12:55.073000 +CVE-2014-5788,0,1,db8b5223798c0090e62b8546891c0b36f9ec1601dabe95b9837d8a4a28d99533,2024-11-21T02:12:55.247000 +CVE-2014-5789,0,1,140a612bfc5e8efc6515e3aa5bd0089b39328598396109fabd015f6ae1624a5d,2024-11-21T02:12:55.413000 +CVE-2014-5790,0,1,dd39572baafcd6d6913b7ecd59321b898f3c5e963481dc492e951c62026dac91,2024-11-21T02:12:55.583000 +CVE-2014-5791,0,1,895d0f10cf721c8925a5c1dd95b71c0aef20793b1e8f721b4dd0942bd1715454,2024-11-21T02:12:55.750000 +CVE-2014-5792,0,1,fc93d313cae5c5ced9764a2b3eb3250b3407d65ee2e7529461d6047d9b5ab1e1,2024-11-21T02:12:55.930000 +CVE-2014-5793,0,1,0f673458059fccaf3eab1393a934182f5e85dae3376caa6f1f1046ec80bf65c5,2024-11-21T02:12:56.107000 +CVE-2014-5794,0,1,06e008a82c0dae49ed156bd47b2a8d59fdfddea7c7980976af312c43df37c537,2024-11-21T02:12:56.280000 CVE-2014-5795,0,0,0dcbc80fe4e47c7a5ccc0be54d92e4ad4708ee07164e1cdde61df88fda438521,2023-11-07T02:20:54.207000 -CVE-2014-5796,0,0,925b1e8b6ce0fa1edfa669aab508eceb3f70d5e25549ad70024414563cdf3157,2014-09-17T18:54:46.410000 -CVE-2014-5797,0,0,a7648be54bbbf235b21eafdc279f73c00174925bdd542061547efdfc10e8d039,2014-09-17T18:56:42.053000 -CVE-2014-5798,0,0,d7fbd351adc07226be0dcc803a2fdc1ac23e8579ff616bc8f285ce20b4ea8956,2014-09-17T18:55:13.630000 -CVE-2014-5799,0,0,8e3ebfd6d2a8af0568a2ccaa1050b82aabf3b6a4b8ee67fcd23a4ff18fc37171,2014-09-17T18:55:57.177000 -CVE-2014-5800,0,0,e3416c0112c1b2726e4b5364204ae3ffd11cef185ea75e0463738e35b145a59d,2014-09-17T18:55:35.317000 -CVE-2014-5801,0,0,72f137a44866ca5c0e0250a02cb3e2277b6c9d9dbb2487033f3343f189624d20,2014-09-17T18:54:09.927000 -CVE-2014-5802,0,0,b96fcc9ceae9b4df3ee0b71c1870e92a5889e4920a693fde270ce7740f8d0e4c,2014-09-17T18:53:49.507000 -CVE-2014-5803,0,0,7130b0f6df9c2dd345613e6ea0616822359a16b80f0952a3e35aa3f211788a02,2014-09-19T01:27:39.133000 -CVE-2014-5804,0,0,73935dbabf0a50a6b274fd013da5698d1aa8f56b27651ca9d9606290eb37ece0,2014-09-19T01:27:04.617000 -CVE-2014-5805,0,0,c95fadde73ec69996eeeef574d94a080336939a2c99b77203215973970b85840,2014-09-19T01:26:14.070000 -CVE-2014-5806,0,0,d21fe9ffa7e2f17a6533cccf5e7357f66393ecbe55db6303d71b85ccfa276766,2014-09-18T18:52:02.567000 -CVE-2014-5807,0,0,f284bb1806d93afcc31384a162772e0be55b5135352bd8bd0931c07359bd48be,2014-09-19T19:39:55.100000 -CVE-2014-5808,0,0,67fc7d2b70d48e427fbda2f2793109359bc3c3b0eef2a60b3ca6c94ead87257a,2014-09-20T23:35:35.117000 -CVE-2014-5809,0,0,34d39c70bcc8e3d967cdc0d8eb24fe2b8f132d65c3670d12069d8aeefe60942f,2014-09-25T18:26:53.310000 -CVE-2014-5810,0,0,39699d92f022f4f8208b1aa6224bc74bedce3f9d2f5ce0d7e01a63dc0198e18d,2014-09-20T23:36:26.367000 -CVE-2014-5811,0,0,0ecf5eb67eec5db34c403cc23208aa3aff88ea40cc2a9633a3ed00bbd22c793e,2014-09-20T23:37:33.527000 -CVE-2014-5812,0,0,5084895d8655066db73c43bc262eb57f0ebadf1c1c9d850d046568eb130ad7c5,2014-09-20T23:39:19.480000 -CVE-2014-5813,0,0,00acc1901661d3a7df5db4600d1d6fb4a956e240ec1837489ee44f03f72a398d,2014-09-20T23:40:07.167000 +CVE-2014-5796,0,1,bb6bf9430080a8dd493b6e3af8859fc68013dbb5d819b9dbf7973852607cd30c,2024-11-21T02:12:56.467000 +CVE-2014-5797,0,1,a30bece2de009cfcdf6827fbdad71206519e19774f0b7a384c3ebab55a8c8667,2024-11-21T02:12:56.630000 +CVE-2014-5798,0,1,08937ea441db395deead1625455b8aed7c1ecbd179c863ee18400aa81e3ec887,2024-11-21T02:12:56.810000 +CVE-2014-5799,0,1,d7cc2e3f8d64dca0a0328f85cfad9d5bc6163a21710d32f5f807301ce8fc1dad,2024-11-21T02:12:56.977000 +CVE-2014-5800,0,1,e94e102a92582569451dc13d6f82cf6688c5c54e9baf4684b13eecbadcaf6319,2024-11-21T02:12:57.150000 +CVE-2014-5801,0,1,cbbaef6e3476c020599537dd91125b7f4c95b1a68c3d6233e6ed8dff13872ceb,2024-11-21T02:12:57.323000 +CVE-2014-5802,0,1,254534a2d902ce29cb8e906d938f18323b2a41277cb8c946293740379a55c6ff,2024-11-21T02:12:57.493000 +CVE-2014-5803,0,1,c571d15ccbc8d9466f73afe0772fdbb608cf8a6c4c9b8d852e4717eb5e9ad57c,2024-11-21T02:12:57.667000 +CVE-2014-5804,0,1,a24927dca5de29f2e6aa8790a4bee276c74fc2e91c1091fd2b9312404d255721,2024-11-21T02:12:57.847000 +CVE-2014-5805,0,1,359e8b2aae3042b5191e0943e146cbbf0b416d0d8177792a2bd2a4db73f14089,2024-11-21T02:12:58.027000 +CVE-2014-5806,0,1,feb26f1b577e156b42c407fc856a82003fa0b9e87ca9a027c87d0f9b39044ad4,2024-11-21T02:12:58.200000 +CVE-2014-5807,0,1,b5c76b18840a5e4ba18dc3672e5776df0bc6e4b994c93dab402762a640609ed4,2024-11-21T02:12:58.377000 +CVE-2014-5808,0,1,5ea1a2b541146f683102126d821f38bfea5d9b948ff1f836a4e9ad07007187a8,2024-11-21T02:12:58.553000 +CVE-2014-5809,0,1,2a2f434c13b617733cdb2ee41490899682e8a7b1ac7325e8ba6cb8c0b38beb3a,2024-11-21T02:12:58.730000 +CVE-2014-5810,0,1,d3a0f391b06f9332803fc30c5e35ced0f7420c48421c14800bbf931da5967be4,2024-11-21T02:12:58.903000 +CVE-2014-5811,0,1,c15d3ebb7dd58936c7a9a34e4fee666e14c4b9dcef0736524552d6577a89b161,2024-11-21T02:12:59.070000 +CVE-2014-5812,0,1,e69a7dc1b126e247648d66e72bb788ed6a90dfd9d1e8a5f673cb6d328f6e3ae7,2024-11-21T02:12:59.240000 +CVE-2014-5813,0,1,7bb2ff86d1b2206da13a8205cb2ac72df042291e892be40f3801669f0d80a8ac,2024-11-21T02:12:59.420000 CVE-2014-5814,0,0,777a69f91c08e01dc40df98b8924477a69a4778196ea5b498f4f2cf4d3d299d2,2023-11-07T02:20:54.363000 -CVE-2014-5815,0,0,03f3b1a1f7f0c87b6507cd35afa833d77d63cb242d2a4c34088a904ce0181590,2014-09-20T23:44:12.513000 -CVE-2014-5816,0,0,f92394ebca45a78c75c095d9ced34f7429c097d1079d35a4a32959200b1638fd,2014-09-20T23:42:29.497000 -CVE-2014-5817,0,0,ace3ea7cf26e6030e447ceb31f969c8fb1cdde367b105c554a47a8580d677194,2014-09-20T23:43:22.467000 -CVE-2014-5818,0,0,88043395ec890566519bc1b6be2b8f6233fed15f65cc0b3fa60ee96b397327fc,2014-09-20T23:45:22.077000 -CVE-2014-5819,0,0,830d466102bcbaeb3d04977420b43f92a2d3de2300e50766ab7a5c6511fbdfc7,2014-09-20T23:46:12.703000 -CVE-2014-5820,0,0,c677e23651afde7c5f0286e2d68f39980cf189267dbeaa6bbb407cfa901d7b88,2014-09-20T23:47:16.673000 -CVE-2014-5821,0,0,17e79e6558513769c2d3330bd9115e50cb583385cc860e4b6f531033c719f809,2014-09-20T23:50:20.427000 -CVE-2014-5822,0,0,c9ea7e2ab38480ccc1cf637fee92382fc7c022c6f77f98aec9440c9ba85c30e3,2014-09-20T23:52:00.380000 -CVE-2014-5823,0,0,50faead72183d1089cd68d03f1a72768361d4d8afea2f9cf5cc844aa5a29f948,2014-09-20T23:58:14.447000 -CVE-2014-5824,0,0,16128ab0884380a205fac3f997c4ae200877e544474e4d1f0589c2d9249be0e7,2014-09-21T00:02:55.637000 -CVE-2014-5825,0,0,9938cb22f81190e28c9cd507388eda7e9b1e6c8052b2699ef737898af3eb38bd,2014-09-21T00:05:55.703000 -CVE-2014-5826,0,0,1e9b5f2263839939f16793dd5f92719873f95ce4ee1f167f4777d830f052b691,2014-09-21T01:16:15.287000 -CVE-2014-5827,0,0,2fa6fda52eb3f1b3a9be0e6283baf7d7956b30ede115054bb83c3ded5720545f,2014-09-21T01:15:07.943000 -CVE-2014-5828,0,0,c47c0a9d464c8d33dc13855ed6e01e83bee5563483a4769c762eb9e1334e4505,2014-09-21T01:14:25.037000 -CVE-2014-5829,0,0,18614afc736fe861057d5f9d492702ac90fe8ecad668314a30605d7345dbcd9f,2014-09-21T01:13:41.943000 -CVE-2014-5830,0,0,e15f2ce761135beb7d2e9f12ef8399b821277aaa8fb3c0354e57ad834cf9b198,2014-09-21T01:12:56.927000 -CVE-2014-5831,0,0,bae7d783e418d813ed26c43cec51b684da4829f445868ce829bbb99d506799f9,2014-09-21T01:11:47.347000 -CVE-2014-5832,0,0,c39a7b6ead48845c851b1b1c75146b593eba09c5bf9830d59e8066512eb4daa4,2014-09-21T01:11:00.847000 -CVE-2014-5833,0,0,54445c1260512249abc52535662c33a61fcb40be8c35dc389f543933eb8c3b51,2014-09-21T01:10:22.940000 -CVE-2014-5834,0,0,6864a64ed285c1706252ebb80b2051216837a3bca4d4005a240f521576c003a0,2014-09-21T01:08:58.063000 -CVE-2014-5835,0,0,3b6be92790ef7d8ff41a8e5536b0ac3816b72eb00d46722b6cb70e9d5b2ef0b3,2014-09-21T01:07:55.530000 -CVE-2014-5836,0,0,6f3c9c12f03e32a44f4e0a4cbbd96573528728eb7025d3f96301befdefd1126f,2014-09-21T01:06:43.313000 -CVE-2014-5837,0,0,5b860de1310e41bbaf4c08bc3c595f74fdb19dad6635375cb560c41780b90006,2014-09-21T01:05:21.187000 -CVE-2014-5838,0,0,35312a5ffa69ab52a9e0a94a6c44dedd4e7ad63c2717a62648ccc04d402777fb,2014-09-21T01:04:34.530000 -CVE-2014-5839,0,0,c92d1cb6cf5124e72f53952b926f7d0256e8913503c9976a43cf5bf1951a2aa1,2014-09-21T01:03:53.357000 -CVE-2014-5840,0,0,84956dec28f1ab2e794050a0d1f0770ee2804f6341624536f447fc6d89be6eb4,2014-09-21T01:59:05.133000 -CVE-2014-5841,0,0,a111b6c9edaadb0207fccb927d39d2207bcfb79fc0883de5d80dadc7b1bd2b00,2014-09-21T02:03:38.903000 -CVE-2014-5842,0,0,243d6e85bbc5d8f444af1d35fd8e32972f46f05ba9c85ef0ccb996ffb16a80c9,2014-09-21T02:05:27.950000 -CVE-2014-5843,0,0,b7682faf960007073bae769ce9114e19209d5e300e8fa78cd09c406570241706,2014-09-21T02:06:35.657000 -CVE-2014-5844,0,0,858be74da3f3c10fdf340546127638418079b4e91503bb261031144c32ecf686,2014-09-21T02:13:20.573000 -CVE-2014-5845,0,0,33ab8e4c199fe54d69ff811f7edaa822a8f04d9e842a9ed28100fe436bd0f6e8,2014-09-21T02:23:07.323000 -CVE-2014-5846,0,0,a24e2596993f33c9980c127b2f255617ccf68c59ba4f36128d19a03b04d138b5,2014-09-21T02:24:48.880000 -CVE-2014-5847,0,0,ec21489e0f463c35669143a75dda79650c10f1eef9841a844e10cea94c25affc,2014-09-21T01:55:03.473000 -CVE-2014-5848,0,0,906b2b70f1f2e4ce9dfb87ec050d8b5774fe6635ed481a49cdf3f7e7cd6dfca2,2015-11-10T18:57:11.937000 -CVE-2014-5849,0,0,991239d814323479ce13024ae6aeea18819811d1a6e5907be2ec76101f0a660c,2014-09-21T01:53:22.003000 -CVE-2014-5850,0,0,0dbe109e023c5e426c210e02a6d0df56d0757ea695241eac9d9883045a7f3268,2014-09-21T22:00:51.580000 -CVE-2014-5851,0,0,125653bdcc9c0d4abe77e6b427034fb89d9ffe6a6422d44abb71282902d41184,2014-09-21T22:01:56.583000 -CVE-2014-5852,0,0,bb56f122d8fe64c241b8d687ca20c23a5ae8c3b34f5b59f14b36a78780237ab8,2014-09-21T22:03:12.990000 -CVE-2014-5853,0,0,8779604edadfa9ddafebfc21a32774f537e0765f094d40fe4a368023fd0cb345,2014-09-21T22:04:02.943000 -CVE-2014-5854,0,0,34031063ea29b2ba287df76a02c2f645051cab0ffa421e5f8e9572175ef1df07,2014-09-21T22:04:51.740000 -CVE-2014-5855,0,0,07827d689ac66d1709e4804c6873437aa4b0cfddce3237ff46a9148bdc61f3c0,2014-09-21T22:05:30.990000 -CVE-2014-5856,0,0,5827373b5614df21ffdaa9d0bda4d29164c693901ceb120e129c4415d78f879e,2014-09-21T22:06:28.977000 -CVE-2014-5857,0,0,4cfc59eadd6d4746cfdd81718b7b67519ff14373cf8e023cf90180c9e2fae752,2014-09-21T23:28:11.350000 -CVE-2014-5858,0,0,ae51596f7e262b6d5180df9dc01b28d32b64c96dff4c99d7014752ad348a5aee,2014-09-21T23:31:44.120000 -CVE-2014-5859,0,0,651f196fc2ecbae0efc71c41ce35352663d404a8044adfaae12f123359008223,2014-09-21T23:34:26.497000 -CVE-2014-5860,0,0,95dbe8c06c2266473c577972e0d295fc386193f16a9345c58425e371c21aa9d9,2014-09-21T23:33:49.060000 -CVE-2014-5861,0,0,85e7ca3567f9b06cf64a1ec06e5fe19aa55e03bedc7e6815fdd817907c4981f2,2014-09-21T23:30:36.510000 -CVE-2014-5862,0,0,e55bb608b32de166b9a5afeed7d78173d962e541e2f988a029efa64b2b660bf0,2014-09-21T23:20:07.643000 -CVE-2014-5863,0,0,0149fe6ecb07b326e429c0914ef44296b31613c6c97792fed9a0d3280c85d3af,2014-09-21T23:23:51.943000 -CVE-2014-5864,0,0,965c7d1c9f497fa026aa99628280eebce51fea1b469265f55203686d6c2d5940,2014-09-22T00:03:12.440000 -CVE-2014-5865,0,0,ef31280390e33d5c661e4544ce403a5388200c1b22ffaceb040f82df572662fd,2014-09-22T00:04:44.410000 -CVE-2014-5866,0,0,7d3c792152c6f734d91b950dd0de4338f9b6ee5ef765ed552dae801c8c9847b8,2014-09-22T00:02:28.550000 -CVE-2014-5867,0,0,cc28d13b2441b9023b3f5f0ffa817795abec1ce6c32ba23d8ca012c8dc53841b,2014-09-22T00:01:54.847000 -CVE-2014-5868,0,0,a86510e69ca3088956d80d33313ee86e52ce5652a136f753d4a43751aaaba530,2014-09-21T23:57:35.280000 -CVE-2014-5869,0,0,bf0ae7711eacf11d17bec9badeccd077b2a15617d670106d150f01144d84cee5,2014-09-22T00:00:53.143000 -CVE-2014-5870,0,0,5dc60aa483523a722f2880657d1e7b9b75e2dee443c1929ab13e38d376d35d38,2014-09-21T23:58:21.593000 -CVE-2014-5871,0,0,bac1a6124eff8251315d77d11a907cd72b43282717d210af03d749ee8f7842e4,2014-09-22T01:08:29.227000 -CVE-2014-5872,0,0,db6b017b65e193e2ba3816f015e79b4a12c121e8d8af80fce2ff9ba756f99e77,2014-09-22T01:07:37.117000 -CVE-2014-5873,0,0,4627081d2c5f325a86055334b579f676b65b0619d04d8da853ad3fd8ebd44620,2014-09-22T01:07:00.913000 -CVE-2014-5874,0,0,883c543c2ffe1829257ae1ebeb5c1f7086278a352870063931e3e8e91fa05671,2014-09-22T01:06:23.660000 -CVE-2014-5875,0,0,af5487d48fd4d8a204ed63193f6a6fff60236e63b9deed6b6b953916fdf448f5,2014-09-22T01:05:43.363000 -CVE-2014-5876,0,0,72684918ed83200c3e55cfab4165b2e174801f242f12443cb8d2a2f36ae539b2,2020-02-24T15:02:08.797000 -CVE-2014-5877,0,0,43eeec287daa6074cb05691041976fadbbffaf1bd0422e5661431a42a73dea25,2014-09-22T01:03:39.283000 -CVE-2014-5878,0,0,c428a99ecdfdc15ffda7b860b3d480b98275f5f555e1f9a703c3cbc9a9ac63f0,2014-09-22T01:03:06.830000 -CVE-2014-5879,0,0,7e34605d10e8c8a7fbfe5234434d3f52e9647e7c584d81cc07fef61a242a68c1,2014-09-22T17:31:50.797000 +CVE-2014-5815,0,1,e8136084f39cd3cabb9237cbb84c0f829b219a4a9bc12ed7fbe51a17103dbb64,2024-11-21T02:12:59.603000 +CVE-2014-5816,0,1,5b1ff60ae506a2d4208262eae3ad68773d95925ea243f83be8e0de5bf660126a,2024-11-21T02:12:59.767000 +CVE-2014-5817,0,1,69065129788b31659bd75166a1e562a55bd8776ed0890ed11947a687b84f0e97,2024-11-21T02:12:59.943000 +CVE-2014-5818,0,1,4844281a67e7c2bed1c8bc16744c18bf48e71cad3e708ccdcdd126126c53168b,2024-11-21T02:13:00.120000 +CVE-2014-5819,0,1,30a54369a5e7052a63e6b3f778982869bad5fd234075c4659c63ebbd086f4a41,2024-11-21T02:13:00.297000 +CVE-2014-5820,0,1,bcbfcfb67e3b969b1733db827d881620fca1736152cfcc40d7844f15f6dbfc63,2024-11-21T02:13:00.480000 +CVE-2014-5821,0,1,48869764deae16e84f44fe2b9b54c8bc6acdf47e4446a6a93a1182a3b7ef727b,2024-11-21T02:13:00.653000 +CVE-2014-5822,0,1,1da0f4a4bac58c2bafe65d6e9755e7df39c170207756667f332c9cafeec6a856,2024-11-21T02:13:00.817000 +CVE-2014-5823,0,1,d64c33ed42447fd134a812c847bd073eef148d0b1b42c9daa80e80d226bbee80,2024-11-21T02:13:00.990000 +CVE-2014-5824,0,1,d3e7e65331858b4f84fffb9d5b5fa4a66f19ab8056f184f09c07a3e9461673f0,2024-11-21T02:13:01.163000 +CVE-2014-5825,0,1,f6bb6600ad91a47fbe2c3a41b6c392a0b70cfd780dd50c09ecd65fa52be38c5f,2024-11-21T02:13:01.330000 +CVE-2014-5826,0,1,48d952c9a16553e1d83f50a4087eca6efd7b69f8931166b381ea42e157b05b4a,2024-11-21T02:13:01.500000 +CVE-2014-5827,0,1,1c72d1102c916293e3730708a6c600472ab75c6abead86c873485904628f12ae,2024-11-21T02:13:01.677000 +CVE-2014-5828,0,1,6980d7fc4196ccfdca026eff0320f93a29912d9631418fe863ba57c7eb156c0a,2024-11-21T02:13:01.850000 +CVE-2014-5829,0,1,b781fe19ea71a6f44734472bd965e1e86c84ea20b1dd0154b0a174d3074f383c,2024-11-21T02:13:02.027000 +CVE-2014-5830,0,1,8a6904ff4df3c271d17ba5e0ad7ef947d9867034cca1f6321354ed4377fcca96,2024-11-21T02:13:02.197000 +CVE-2014-5831,0,1,0fed067c914d98757e87d4d004a50ed552059aa1b2a7e0ad0c45624713af9658,2024-11-21T02:13:02.370000 +CVE-2014-5832,0,1,1ea73e182449c818a4c5e7a60d0564b39883ebcd77c0603ed55a7b0a6708834f,2024-11-21T02:13:02.540000 +CVE-2014-5833,0,1,be48f62f6181577aba67b0f1c47e34104d61263157b4a206537173c8dc759a15,2024-11-21T02:13:02.713000 +CVE-2014-5834,0,1,69399ffee6e6ef6380a6abf7de4a6348b48d822cedc2839f45c89f473d45a819,2024-11-21T02:13:02.890000 +CVE-2014-5835,0,1,8eb90a037b9a6bf876cff8b328ce5f33f3995ee36c1a55dbc8c2a5e33b51b99f,2024-11-21T02:13:03.063000 +CVE-2014-5836,0,1,1415213cd880c5b3bd907f8481aa28d7c5e69b9bd777885e6828e59e75f81480,2024-11-21T02:13:03.240000 +CVE-2014-5837,0,1,0a128393395dd26b8d257b43f5360edd6fd2c5feabb4c018983b4e7c0cf0e55a,2024-11-21T02:13:03.407000 +CVE-2014-5838,0,1,ad2629ef0e3407194ddcfb8ebbcdfd24a22f175b53c73fdada382bce1d528e5a,2024-11-21T02:13:03.580000 +CVE-2014-5839,0,1,015a0d2f812f056d1dcc8fcbf51e90058c6b675f1faea6a323a7197a7e91aee4,2024-11-21T02:13:03.743000 +CVE-2014-5840,0,1,f521c6c5c65a688c7cfe74b24f1a6f8867641a7f18627500f3bfb9c34347cd8c,2024-11-21T02:13:03.917000 +CVE-2014-5841,0,1,5fd6012b758bcfec8ee69bd2d4fb1843facdfd4d08b0e961432d54d032e7f2c1,2024-11-21T02:13:04.090000 +CVE-2014-5842,0,1,70319804c73b1e8cab3831fe6ce1a4563badc253e9571dbe604360bc989c3947,2024-11-21T02:13:04.260000 +CVE-2014-5843,0,1,78bdb4a1281b176e366c76e72c33d3c18918843760fb7cf692595ab01649f448,2024-11-21T02:13:04.443000 +CVE-2014-5844,0,1,c0d5846057ec67de52730f1791621165128bf45397196b43d9dcb49df7c0b360,2024-11-21T02:13:04.617000 +CVE-2014-5845,0,1,fb2b1e5ab3902ed73cca579ace31f1e20dfb22b18dcb27383b05b7b2ada8380d,2024-11-21T02:13:04.790000 +CVE-2014-5846,0,1,50fd24df5edd28e36e88b81bf6bfd49d7d8283f1c05669b56cc83f780fd3f14d,2024-11-21T02:13:04.970000 +CVE-2014-5847,0,1,27779155fafd0223900323befbf81810604ebc7b512c0bf02a4ea4eef48efe3b,2024-11-21T02:13:05.153000 +CVE-2014-5848,0,1,5df68390955d0b742202981a8a50515c24ad56186817be40ee6925ca9b8bd226,2024-11-21T02:13:05.330000 +CVE-2014-5849,0,1,bc970cd5c543919044e74951a4d33b52b7d5c39db27e90fe7f08bb7f463d53be,2024-11-21T02:13:05.500000 +CVE-2014-5850,0,1,01b499e94b901cecb7ed3ea9dd8ffa304d7676615baece457e18570b7978e71f,2024-11-21T02:13:05.680000 +CVE-2014-5851,0,1,06fca2f8da1d66335070f802a8cbe5c39a97b60c0329c62fa5737411551ecb95,2024-11-21T02:13:05.857000 +CVE-2014-5852,0,1,9a5092d53a161970c484ae9d7f05d472f371b7e123aa7ca4db592b31056a123d,2024-11-21T02:13:06.020000 +CVE-2014-5853,0,1,de41c78a3b093c0a1309ced63980634833fce5f4fc8da562217243b7c975fd9e,2024-11-21T02:13:06.187000 +CVE-2014-5854,0,1,9509ec9bdccee4bdec9f77cfbcc0f598b537050beb16569a8d25d5099b0b06dd,2024-11-21T02:13:06.363000 +CVE-2014-5855,0,1,146a8efb80cb1533d32e5b96d8e34b0fb5773d17ee70637948a922288ffe5efa,2024-11-21T02:13:06.550000 +CVE-2014-5856,0,1,003b316f6a0dcb2f57d4c19e8d7e0676d54693a866919cd875eb28506c3343ee,2024-11-21T02:13:06.740000 +CVE-2014-5857,0,1,119f2f6bbd8e1dffd897d391fbb17755adc9fb1b17d118b4273ad81707175187,2024-11-21T02:13:06.947000 +CVE-2014-5858,0,1,1ac446d3e8dc2cfae3bafb2c8bed35b820cd272cfcb11995177f1c25625f5871,2024-11-21T02:13:07.140000 +CVE-2014-5859,0,1,61e6e7be3754828bd1d69e9a6c2c413051ccf5d02e5d0a4dbf3505804b19de5b,2024-11-21T02:13:07.313000 +CVE-2014-5860,0,1,d8359c3b47e54651c5c77866ab1d32c7a185882db1281844ff0692825cff8f81,2024-11-21T02:13:07.483000 +CVE-2014-5861,0,1,1f87fd15784ca877c696384b3fc290710bc1151b337f22cd7cc560a7d073ddb5,2024-11-21T02:13:07.653000 +CVE-2014-5862,0,1,1572f11263ddce1d2951bd7f28a9d3360d88e80e62a23885131d1bfda9392de0,2024-11-21T02:13:07.827000 +CVE-2014-5863,0,1,e9402085c545290310cf4c3e749fdfc8335a48b5a0956c22e7765ca503c258ef,2024-11-21T02:13:07.990000 +CVE-2014-5864,0,1,8b198a6e2dd9a629a96fe91538872511bfd90a08b7b9ba456f91887d79660df3,2024-11-21T02:13:08.170000 +CVE-2014-5865,0,1,97c9dfa56e25da1125fa6738789d9d543a793919cbc20cb5a1c86a0b75466562,2024-11-21T02:13:08.343000 +CVE-2014-5866,0,1,a3c85a214ae4e76812c374ae747f8043c93aca73db64c3ad70b4f4b1360384a2,2024-11-21T02:13:08.510000 +CVE-2014-5867,0,1,2afb6f4d4a848c69d3311dec209eb7723258dcdfaaff1d4bb09b44a68bc19718,2024-11-21T02:13:08.677000 +CVE-2014-5868,0,1,5c10364db36029c732b2babcbb571efe22bafb5d7c306c0b6e364e252f71ccd9,2024-11-21T02:13:08.850000 +CVE-2014-5869,0,1,74aa78078d74bf4d03c3b65da48ffcacb4575eb1b101899744db7a75c176483c,2024-11-21T02:13:09.033000 +CVE-2014-5870,0,1,4fdb1f7366daea8e944e78d9f46eae2e43a85333c91b47550a1c67a74af4d590,2024-11-21T02:13:09.190000 +CVE-2014-5871,0,1,dc97eb7edba5f20330075dbaceadddf1d464bb6113926bfcad459aa8ca03cf9b,2024-11-21T02:13:09.377000 +CVE-2014-5872,0,1,312affb0efb91b5fca60b3373ccd1b54cd4b7424ec19d7ab7d3ad5fa504848e5,2024-11-21T02:13:09.547000 +CVE-2014-5873,0,1,18f38d54fff192570a0b09671591fd78d396764bf2eac792952c5f2c7a4d49f3,2024-11-21T02:13:09.723000 +CVE-2014-5874,0,1,f500e730e40c33a81781b42e8967e0d294b5079cf89efb523dd3dc96a1ec383f,2024-11-21T02:13:09.900000 +CVE-2014-5875,0,1,ad351f74ebf884d0eb59c0cf72ceba21c29661f86233b1163f82e235cf0b0cf4,2024-11-21T02:13:10.083000 +CVE-2014-5876,0,1,96b2f8a58839357ff8690dfc985b267fc2bb4b785df7c43945d9632ff1fe8a42,2024-11-21T02:13:10.283000 +CVE-2014-5877,0,1,cacabfb8b282e99c39d25b9a910f3e72c420cc20a725512acac810192eb80cb6,2024-11-21T02:13:10.467000 +CVE-2014-5878,0,1,9f1b8de44e87525866d707210aa9025b199c082516a17aeaf39cd0cbd2c9a69c,2024-11-21T02:13:10.643000 +CVE-2014-5879,0,1,2e7128942cf89586c1924a650e7a2030c7264423dfcc150e9c85743d2a58b669,2024-11-21T02:13:10.820000 CVE-2014-5880,0,0,c36b5125e50e218d18f0662567a69fe58eeca4eb31f02ad8b1b735af479407be,2023-11-07T02:20:55.157000 -CVE-2014-5881,0,0,a5ba4bd4a1c5e18d0c78b7a35355724ebea93fcc921428ad5338ae31c988beff,2015-12-18T19:55:33.770000 -CVE-2014-5882,0,0,5ef66911a533f8007e5929cccabd0e2c26f4c79934322dc49b5d701e6d373e0f,2014-09-22T17:33:33.237000 -CVE-2014-5883,0,0,f4cf71f54712737fd049c5e7ce2bb773b3d5748f766f0e4bb561ee30afd5fccc,2014-09-22T17:34:29.270000 -CVE-2014-5884,0,0,152a627eb1ac41145b13421c0fc793a6dcc12d10b9fc1fb47994dfe37351fe3d,2014-09-22T17:35:14.350000 -CVE-2014-5885,0,0,400c7dd47e05607a26bea55d8404be7669213a368b033d43a98450365157fbb9,2014-09-22T17:36:05.630000 -CVE-2014-5886,0,0,46d1b3df3e827e371366fc4605ded6562b13f858df5bfb6e11f85c47a46416f2,2014-09-22T17:36:52.647000 -CVE-2014-5887,0,0,0271f342f333ba8f7f4311606b1dd5ff2411989d9aa1d7707a5c4dfbdc41022d,2014-09-22T17:37:35.853000 -CVE-2014-5888,0,0,d505793b02839d587b7f76ab89ba6deb467007d6ae2cca901beea439e7e7be0d,2014-09-22T17:38:36.087000 -CVE-2014-5889,0,0,b5dac94babb9f0b848de906561ebb90a49aaca9e71a87820a0228e2d365b1219,2014-09-22T17:40:35.667000 -CVE-2014-5890,0,0,832dfb09955764ff382408290df72207bbdbbb1ca41de463c79695839f7f67ac,2014-09-22T17:41:23.700000 -CVE-2014-5891,0,0,604dd73291dd3e64550d19438be0308a85505ea1d612b3b6b136ed3d18fc1357,2014-09-22T17:42:58.170000 -CVE-2014-5892,0,0,334d75168116e3a7fafe9aecf0f551a02225db9747ebf551a5e71f783a207a42,2014-09-22T17:43:48.360000 -CVE-2014-5893,0,0,5d989399d1c70683eecbeff752483c7b59ca4c24bde6c5af075af3822570af44,2014-09-22T17:44:46.110000 -CVE-2014-5894,0,0,510f936b08ff90b35835c90a9f641ac83b8fe045976132768d3f41b3b9f06454,2017-07-11T14:06:19.240000 -CVE-2014-5895,0,0,57b321fca6a80018679c9d708087e39ced0f72f5cb1702848eb1c89d8ee18886,2014-09-22T17:46:29.410000 -CVE-2014-5896,0,0,e47cc82ed4808fdd3c50020d96ff7cd35ee9732ace9a1b347b35be5673b4dfa5,2014-09-22T17:47:20.660000 -CVE-2014-5897,0,0,26e8c663163ddbde78e94e6600c3348f4a3459cf4e72a26159007ae9a912b809,2014-09-22T17:48:19.723000 -CVE-2014-5898,0,0,70d72a4f56dfc30e2008a82fa9b8db19cd47241df9b28bde2117728b03e7650b,2014-09-22T17:49:08.787000 -CVE-2014-5899,0,0,d021cac083682baafa6b0378afce29f2e7e2f4129d76f4ff164d2ea547ad64cc,2014-09-22T18:58:30.070000 -CVE-2014-5900,0,0,db75c765366d95aa03e85390c20d4e63f2c126bac212e2973d67acddc5cf66ef,2014-09-22T18:24:11.843000 -CVE-2014-5901,0,0,47d227aa50cf94369710a114497b9b3ec571c229afc48a7d72ed832298f21f95,2014-09-23T00:19:54.400000 -CVE-2014-5902,0,0,f4047e99d7c5515b7400de842e19a01a53551ebb79343eda02efb959dc31c9ba,2014-09-22T18:45:14.587000 -CVE-2014-5903,0,0,d79de97ee00549c7f455715f69e1c9dc1ea34cb48f221162910251b4a7cc115f,2014-09-23T00:21:36.263000 -CVE-2014-5904,0,0,8c0bd594488bbd86be0ad41b881d255f9af518e7573e88740c607148dd607955,2014-09-23T00:22:22.797000 -CVE-2014-5905,0,0,b874b752627bd444c72bb7108636085a39f9afa1e5e0aefc8caeaa5d4a6af12e,2014-09-23T00:23:04.233000 -CVE-2014-5906,0,0,e7cbab497947cb8158df82f56ec296077e32b97e9152ec206e93a60922035b78,2014-09-23T00:24:01.297000 -CVE-2014-5907,0,0,19cc54f3dc4a82768dd3bb23f0daba6710189805caad12ebc0dd37a146a389e9,2014-09-23T00:27:58.097000 -CVE-2014-5908,0,0,e2635984376249f296c60dff2f4defc77ca0d765a0d9911b857486588564488a,2014-09-23T00:37:27.640000 -CVE-2014-5909,0,0,ae7b3af1635d2d32c9aa085aeeade8bd54a9495d6e8c703eb4cd02cf2ebc390e,2014-09-23T01:09:51.053000 -CVE-2014-5910,0,0,8fed42297b12136e1d35e517d62b534064ef7d1dc58509f610de477033679b82,2014-09-23T01:03:51.187000 -CVE-2014-5911,0,0,d430d9f561463820b766bf48a0ea3f50504b3ea8e8394309ae15c81691453354,2014-09-23T01:09:11.067000 -CVE-2014-5912,0,0,2d265be1c81479672b714df5c4a83300cb4ca0395bf042a6a97ad0cb27293cf0,2014-09-23T01:08:32.317000 -CVE-2014-5913,0,0,d304b20a04038d543f809cb6ead297e92e5318a9d8fa02201c040107bbdff55e,2014-09-23T01:07:54.503000 -CVE-2014-5914,0,0,6f134fc12de93a47473d9c1d650d23619f10db95fe56bc9c16afecebe1911ad3,2014-09-23T01:07:13.893000 -CVE-2014-5915,0,0,a2f284d5d265fdddb3498ca65a3a69be5de1261db65163f8eda2561beeaecc4c,2014-09-23T01:06:29.360000 +CVE-2014-5881,0,1,b3a6cc4ebf3df6ab43d3b178192a103b8ade74031382ebff8f857f6232f4374c,2024-11-21T02:13:11.010000 +CVE-2014-5882,0,1,ab26767f3fb615674fb0a8c55d120c0d3e009e1a260524d58c7dcc0231c390d2,2024-11-21T02:13:11.177000 +CVE-2014-5883,0,1,11f18a4c70645fa32fe44f0055cd6b6d8a2d8de4f7130cecf8fc38cfb01f6991,2024-11-21T02:13:11.347000 +CVE-2014-5884,0,1,5262debdcf17a3d4d15466a84767bebd503b155cb30507cad5be81c571f2c6bd,2024-11-21T02:13:11.517000 +CVE-2014-5885,0,1,8ac8e20347a049bb97758ab7d3a732774d116ad28ee98c15cd3730db1180b247,2024-11-21T02:13:11.707000 +CVE-2014-5886,0,1,9a958ec9bbc0efddf0f0f3c99da6f37ab2d6fd513c9f3c9066b832baae4a74e6,2024-11-21T02:13:11.890000 +CVE-2014-5887,0,1,7d9507c8915b07fa4a847b3decce5bf180af16f34c81ed9be60e9f857dc4680c,2024-11-21T02:13:12.070000 +CVE-2014-5888,0,1,98f5a1abbc10ad708482d60ff888b2b9ea1c019899f66d365a3a0692c5b4681a,2024-11-21T02:13:12.250000 +CVE-2014-5889,0,1,fc9ca8a0eac6358e839a93c0a4835372e373728370aabfc5f4510275945ab0ce,2024-11-21T02:13:12.427000 +CVE-2014-5890,0,1,b1e3335a57f19fcbb70858fc8ce1ece4b2e653979254bc20772b756b04b56b67,2024-11-21T02:13:12.600000 +CVE-2014-5891,0,1,56cb500856e1cfbf68123a595b7684b51984e60c6faa057cdda9e69037e3483e,2024-11-21T02:13:12.770000 +CVE-2014-5892,0,1,49dbe84e7656e733d6fc448e18f8bbd98e102791c848c258f4d4123b9b08052d,2024-11-21T02:13:12.940000 +CVE-2014-5893,0,1,f366726c2729c23c6ffef67bd3893a4d9f5a0f4a9846c0ba0c2b3846d7f8d736,2024-11-21T02:13:13.117000 +CVE-2014-5894,0,1,90d940e51bdbd9e8fcb2ddc8b762360a0f5d58b830668334aef8c9d3f048edc3,2024-11-21T02:13:13.297000 +CVE-2014-5895,0,1,76aa65f2c05525fc80ae4a2c78d485d916f2995fbf41c371d5adedad7b931448,2024-11-21T02:13:13.483000 +CVE-2014-5896,0,1,6a65b53d78419b14ced8354b4233974650bdf5d9731948dd268ed7016c177543,2024-11-21T02:13:13.647000 +CVE-2014-5897,0,1,8dd117b7d9eb02d2e77d8bd1925f8eea09eefc63b18e5ba5d3c2599d79ea4e18,2024-11-21T02:13:13.817000 +CVE-2014-5898,0,1,ccd380d323802dcaeff24346d91f1185def682de6263448503e45f25652eef5f,2024-11-21T02:13:13.983000 +CVE-2014-5899,0,1,24c7bee7a5aed363d066636869a46029ff4fc6cd50b556c3077d05f6d8f55460,2024-11-21T02:13:14.143000 +CVE-2014-5900,0,1,1c667330e30f8dc1fd29ef88b696319a7b65f1bde69ca26f8b0bc782204ab48f,2024-11-21T02:13:14.313000 +CVE-2014-5901,0,1,680e7f5e31e09d02a8729a7ddd113c3013413f4358213ba65c909ac80bf06a5f,2024-11-21T02:13:14.487000 +CVE-2014-5902,0,1,52fa2b24e4540c5271b79e9aaa6d7f56adcb3729680ad674d7fbb9b87646a07a,2024-11-21T02:13:14.657000 +CVE-2014-5903,0,1,69e0160def9b55e059686da7c30146b698cc70ed692db8e531353b53d1de866b,2024-11-21T02:13:14.820000 +CVE-2014-5904,0,1,1e52db5ad09c6fc1ce0e817e8a5999d0d35f27d73c4c9a50556d598bb5a16be1,2024-11-21T02:13:14.983000 +CVE-2014-5905,0,1,201974fe2075a7fcf259b36bf25393f70bafd11f3c2a584b600e04dee09786ef,2024-11-21T02:13:15.147000 +CVE-2014-5906,0,1,c690c79059f5d9bd773ec4e02d1d691cf03b8210f9ec4aa6d1ff7ccb10f9d0c7,2024-11-21T02:13:15.313000 +CVE-2014-5907,0,1,b043fe3fda9a73b053e5a1dee2fd8e12738a819b27a4bdfd7a1c5d8306c669bd,2024-11-21T02:13:15.490000 +CVE-2014-5908,0,1,9d4d8c3bddd71b70c8ff8a024c18149539be189671c5fbc3d5eea44cb6b21465,2024-11-21T02:13:15.657000 +CVE-2014-5909,0,1,6e73164c30f0f22ef930d926310449ce82758de0762f589a750fc522f409e756,2024-11-21T02:13:15.823000 +CVE-2014-5910,0,1,3c9c0894c7c04225c89f67ff216d4e02cf3aeec8418d9b6f19fcc8f2465d7e24,2024-11-21T02:13:15.993000 +CVE-2014-5911,0,1,aaa62c8b6dc5ce75fcfc4ad745fe4f0d2b29a66e9f838f622fff6e32132ac4ac,2024-11-21T02:13:16.170000 +CVE-2014-5912,0,1,6bbba283a8809339cb666f13771b953c41944f5924fa60cb7baaf7adee162caa,2024-11-21T02:13:16.343000 +CVE-2014-5913,0,1,009104a61aeeeeba745a663ccc89e44a41acde5c1237905a2ea5520ede43db82,2024-11-21T02:13:16.523000 +CVE-2014-5914,0,1,b732754dc76d00c050e6988494b260c01d86642a27d3d969a0552b7b0067c12d,2024-11-21T02:13:16.703000 +CVE-2014-5915,0,1,65cd2c90803d30ca7e44e4285ab5e7de880be1dc466efa8da1c0bec7819f6958,2024-11-21T02:13:16.877000 CVE-2014-59156,0,0,7526cc5f34826f587a8d626d148b82d1257629f8871da41b1e8373d65cd0d38d,2023-11-07T02:20:42.003000 -CVE-2014-5916,0,0,fc68de01323750e8103b448bb4993d93972bbb73b9d149ef8342ebd006fc5f84,2014-09-23T01:05:50 -CVE-2014-5917,0,0,cd202296c979e4b928908bc599d8e7cc9ccf23727c4bd648f6bbe02bfc5949cd,2014-09-23T16:26:47.463000 -CVE-2014-5918,0,0,b70b3e3dcd023acc7323130c7aa11b1c6e2c7572112384478f1505b6581bae97,2014-09-23T01:05:14.580000 -CVE-2014-5919,0,0,2a31d1d5fbb3c1ea7c8e7f45274659d3dfe88a733a6170029a5881d9344a7869,2014-09-23T01:04:31.360000 -CVE-2014-5920,0,0,fbc4da45304149e1cfa5fd6874f94b2d0e514cba4daac72ed5ac76d387fd4126,2014-09-23T01:03:18.483000 -CVE-2014-5921,0,0,ad5a2b514818a7c59ad196a4734b3682c615d5708bd061c54dda025fd519302a,2014-09-23T16:28:44.747000 -CVE-2014-5922,0,0,76b2a1e01b752bfc5718a3d7a3f42fcdb5b9e2d389ff8ea77e4491a032b776cf,2014-09-23T16:29:39.843000 -CVE-2014-5923,0,0,d35b6e6049f97e53a04c38c2e8d9fc97788cb08ae3317cefd429c5309b2e461b,2014-09-23T16:30:41.813000 -CVE-2014-5924,0,0,8eaa0705fd6072f96d418bf82a5bbbbeec292851cb329bfa41b9f3de9533953e,2014-09-23T16:32:11.550000 -CVE-2014-5925,0,0,471c975c90734a7d4887f81abbea64097f7fd83ae9486053a838202b555dda9b,2014-09-23T16:32:54.927000 -CVE-2014-5926,0,0,35f20fb150013d1a8281db062467d2b2f74fb7dbc00a455c36f82cfeb435bd40,2014-09-23T16:41:15.943000 -CVE-2014-5927,0,0,0d1a76c74f7b97b2b1743fab5281c65c948aaf69ba2af737d29276f90d2b54a1,2014-09-23T16:45:17.623000 -CVE-2014-5928,0,0,b548330b3f52961902a8622056ad3a0a859a62c252747872c26d7ab3864e726b,2014-09-23T16:46:11.593000 -CVE-2014-5929,0,0,db9108a939182ec65a14f52f2aa5b9f7d5115aa0c63d6d8dca2b1cc48aa3354c,2014-09-23T16:46:56.593000 -CVE-2014-5930,0,0,908978469c7102c2e56ce65c8829800442b0533303216fb339b0e51793466784,2014-09-23T16:47:40.847000 -CVE-2014-5931,0,0,2c763be5fe05fb69086ccff6aba2e077b0b485ca787aa15c6382767ef2695822,2014-09-23T16:48:27.457000 -CVE-2014-5932,0,0,eba5d8f8abcf54760e33e07d022d612d6b77c388ae2b62be9a00493fae1f8a64,2014-09-23T16:49:34.960000 -CVE-2014-5933,0,0,e39709d627dc9a90c23dfe4d570271e6c80ab440c6e81ed133a6fd7bdba46e4d,2014-09-23T16:50:33.243000 -CVE-2014-5934,0,0,c86f63c7f938d30bc34fe72c1972665137f39e523d7fc08e4c20d89e136dbb98,2014-09-23T16:51:34.370000 -CVE-2014-5935,0,0,d90839e9f94d41b9062885542183d71c6013939c99c0c2993b7c682084c746b5,2014-09-23T16:52:24.950000 -CVE-2014-5936,0,0,1973da783190799fc0b4f3618889cf956a528882df9a9c08a2dc0fcb76d1f282,2014-09-23T16:53:10.920000 -CVE-2014-5937,0,0,5270ce7d93272fd74c548ccfcc6233d8d527bf855fc633780fdd6cb2473c48a4,2014-09-23T16:54:03.013000 -CVE-2014-5938,0,0,6d84c0397f95424bd51239d5b928d88ccf6288ef96e595526ded709891d5a4b1,2014-09-23T16:54:50.767000 -CVE-2014-5939,0,0,844554fff68e544db3e3c5a5fafb8f5654c832b2b5fd68e45a1e744001fea27c,2014-09-23T16:55:36.063000 -CVE-2014-5940,0,0,a7dd583c048262ee08ba3449985f8901494e740b0b083219f2bf2820f023bb83,2014-09-23T18:50:44.497000 -CVE-2014-5941,0,0,4f0633259bc1cbd04fd3f4a7a7f2f39f0c3ff2f1f7fed55f47746a891e6b9db0,2014-09-23T18:51:30.123000 -CVE-2014-5942,0,0,6bca17253acd6d24cf8359651be78e30dd4436c6fbd6b9fd0f57a1809f2b95be,2014-09-23T18:52:21.670000 -CVE-2014-5943,0,0,abcdea41db16f889c0516b2a9caa4ee1bb693e6cb4661af0fc6a9a6d7837e747,2014-09-23T18:54:25.687000 -CVE-2014-5944,0,0,545fe21b60265656cf183ecd64612fad9494e7f54b4102fa909e5bb00e5af1fc,2014-09-23T18:55:13.673000 -CVE-2014-5945,0,0,0f6c8d80d31e913cf4df67526d8556697ca841e0f7f89be9b57d56d01bf91c73,2014-09-24T01:34:05.757000 -CVE-2014-5946,0,0,2068991b160942c4f58af53c463e760e0f68511e1b2e206fa80d14b57d879160,2014-09-24T01:33:37.257000 -CVE-2014-5947,0,0,256a58eb82c84a3cd1dfe9c376460eec8fe1f3e738414b4ab8ebe69b66bb7056,2014-09-23T21:05:51.323000 -CVE-2014-5948,0,0,c7f731efa9cb0381ee7229434c3fcce609c0e8d87d71c4d90f5cd5859104c834,2014-09-23T21:03:20.587000 -CVE-2014-5949,0,0,e90083de6aae0a5b43d4365a8d07d3df1addad0172d5c67c58baff1db57ec710,2014-09-23T21:02:44.320000 -CVE-2014-5950,0,0,06c563971b1f531a9b0818b5e7d1f1ed1404474495dcbac236513aaeee1b8c34,2014-09-24T01:33:10.693000 -CVE-2014-5951,0,0,14a10062dcd3236b9c0352bc26d3942958dc4cefca73e98fb1f6c029b73c6dd2,2014-09-24T01:34:29.853000 -CVE-2014-5952,0,0,a11d805a00d9dcfbb8c8b5a63257be91b15223ca4c6ddaed173539851c833a42,2014-09-24T01:35:14.430000 -CVE-2014-5953,0,0,4468bfca74f5bb20410b203e98a505392bf36db9c5dce6ea960fb624f88804ed,2014-09-24T01:38:13.997000 -CVE-2014-5954,0,0,15ff6c41b1cfa7748f4754aa80a7089aeca9f45e6a40415d197d6829f1dfadb8,2014-09-24T01:41:13.907000 -CVE-2014-5955,0,0,df6ee52707b39de6d18508a91c85e4582ee87f6990115d48155e4fa6316df20f,2014-09-24T01:42:15.750000 -CVE-2014-5956,0,0,14f3c82858e6dc72150d08490a96ace850eb9663f14077985468d364bcd00b1d,2014-09-24T01:43:30.627000 -CVE-2014-5957,0,0,05ed1b8e86069ea75a20be6486e8c864eee1482231cef31aeb373eee7db8a32d,2014-09-24T01:44:31.800000 -CVE-2014-5958,0,0,3eab860154de0ce3f1d350408b232d48da740a855133a9937d9dff20ac127b8c,2014-09-24T01:45:35.943000 -CVE-2014-5959,0,0,9ae2e2b3f86bededdd82d7a2b552da59843b177c60b31147fa5e30802b11f9e0,2014-10-02T18:14:18.220000 -CVE-2014-5960,0,0,a6f22f740d65f0f775b2d0f34180c17f8f835a0fb1344acf4bf0f04c5ac92882,2014-09-24T02:26:04.910000 -CVE-2014-5961,0,0,b8508594bb537c788d3dd0f588a50ea63279b5cad0eb3124b84de118f99c2f8d,2014-09-24T02:27:05.460000 -CVE-2014-5962,0,0,8dcc0c8f7c5367a5675ab1968057f7ffe08d721ba42f0ab00b8d81d64ae65ec4,2014-09-25T01:24:29.033000 -CVE-2014-5963,0,0,a1d4960f557ab09ba465ed08115ccc33166e186b89f21b3e01f3f113a2509a82,2014-09-25T01:22:31.450000 -CVE-2014-5964,0,0,3817277aeb89a8c8dbc218b2ea31076cb7d581b120bba5b9804cecaae1ab954d,2014-09-25T01:21:42.917000 -CVE-2014-5965,0,0,5373aeab633725e4ea90d8972b5728a0ed554e9c31be87b3b2ffaa09d057921a,2014-09-25T01:19:15.833000 -CVE-2014-5966,0,0,26e7673504a02c7708bfa223ac80f2d8251dd28bbacb054587c400436bec4552,2014-09-24T15:32:41.437000 -CVE-2014-5967,0,0,98ec889d092d96392cca0824b5f5206f591ca7993b98461bb51e834c1c3b756a,2014-09-24T15:31:44.120000 -CVE-2014-5968,0,0,f3a5590c9191165d88507f836f4660ef41c7b9f81ebc7c41a11e74fce8ef3d66,2014-09-24T15:18:38.070000 -CVE-2014-5969,0,0,9d6f39ecdbc41d9c372db8634ecb2bf80d5c35b429e521f2a7a02c15d70a9f2c,2014-09-24T15:18:14.727000 -CVE-2014-5970,0,0,4767351c639ca82d576209f55b62d0984a136143eeb00c7f6bab19337b8b8c86,2014-09-23T17:49:30.200000 -CVE-2014-5971,0,0,0f152185e4e58d284f0d46eb081ac1990d95b0af02a842e9679dbb835662a9a3,2014-09-23T17:48:31.917000 -CVE-2014-5972,0,0,5b17f56c1d38f0ab47e43c8b0e5d36b82e8609e0df41f5c8b565d52509621081,2014-12-03T19:45:50.427000 -CVE-2014-5973,0,0,50408bdf99b362ae89e97cc912eed05020abf0519d06fdaf7f2351b553fb2aa2,2014-09-23T17:44:30.110000 -CVE-2014-5974,0,0,825cee12f1da9e030ddae5ddcfd8cd454c4938defe0f1c394c065ab4be201107,2014-09-23T17:43:41.703000 -CVE-2014-5975,0,0,bd35bdb84e77cccc8fa0207228c732ce7495014b4329ca8a2e85601b0769afef,2014-09-23T17:29:41.723000 -CVE-2014-5976,0,0,74e28f5dd1f82eaeaa21e27a8f92844b51d0793c29c5475235bb0fad66c4d331,2014-09-23T17:43:02.407000 -CVE-2014-5977,0,0,bab8a8574507ab0dad9bf5d1bc04c81d94d8329583b1086344e6934a27bc388e,2014-09-23T17:47:20.147000 -CVE-2014-5978,0,0,713d6fd9d905856b7b3fea5514aae6e8b23b97e8e9aa6e22622311b961222bdc,2014-09-23T17:46:15.880000 -CVE-2014-5979,0,0,33664b42c7ad1af324698147f7e34d0a66b212518afb4cb852a5883aaafc12e1,2014-09-23T17:28:07.423000 -CVE-2014-5980,0,0,575322364945d6a6ce1db99a103ffeb34b365de4fb8f135ea01d3b863e817502,2014-09-23T17:26:28.780000 -CVE-2014-5981,0,0,ad143bceefb81758ce04d9617571ee076d9c6d1843bb3f5f26eb37d7c4e8f086,2014-09-23T17:25:30.170000 -CVE-2014-5982,0,0,be3c05eea9365e322a954ee3d68768dfae59120b3e4f70cffd6e7208c9562a31,2014-09-23T17:18:47.297000 -CVE-2014-5983,0,0,8adcc9a154a554b6d48f3abcae0005c1a238aad3fe8e3ed3f32fc067f76bfdca,2017-07-11T14:29:47.617000 -CVE-2014-5984,0,0,8db54d2763519e28dbcd0f6f54409d60c4fabc1505bc688933f15f624d1471fe,2014-09-23T17:23:07.507000 -CVE-2014-5985,0,0,52ae490f17071131089017b58c1cf1eb279d6e499f4e8971e0161acbe8164cd1,2014-09-25T12:50:23.783000 -CVE-2014-5986,0,0,d6c90bdf864e4a89a354820a564df31c5b6f6697de114aded2c07ac4c215e46f,2014-09-25T12:58:32.280000 -CVE-2014-5987,0,0,09461ac5519b46f75a96b747a2cc28107f1973cbcc40a774d1c609972853d2a6,2014-09-25T16:31:41.943000 -CVE-2014-5988,0,0,1e7f5168c19331f0063512436725b5251fe34df059b51e5110d8c33668d3781f,2014-09-25T16:19:19.247000 -CVE-2014-5989,0,0,89961e6e335c2b2b6aacb8f33d2da335b3a733ed25b3ddc9f10f98438c6294a0,2014-09-25T16:20:07.200000 -CVE-2014-5990,0,0,b261bb2e8aa4582cd525306ea9a262854adf4c4c98c934ed2f2e92a1c094339b,2014-09-23T20:08:38.897000 -CVE-2014-5991,0,0,7bf0c0fc8bc18e3388ed564d398c232e8c29263cec909b1372d2163b37663e26,2014-09-23T20:23:43.650000 -CVE-2014-5992,0,0,0e01a5619446e8314c020ed32686143761e81558e36ba7267c4e16da0147b4d0,2014-12-03T19:46:09.973000 -CVE-2014-5993,0,0,d6b466c64c7ad142139dba4f67197c0b19f389a8facc5d23da76e3956a3dbfa4,2014-09-23T20:23:08.727000 -CVE-2014-5994,0,0,4cdcba66162380d7e54dd560d6a8c83e7bef00d594a1c9c17a6f1c28f072fb4d,2014-09-23T20:03:25.360000 -CVE-2014-5995,0,0,bc2f6ea1ce26d8a81b16143d72f556162f74f67cf1f6fb0bd9ec93d0c0af9a7b,2014-09-23T20:04:52.707000 -CVE-2014-5996,0,0,e6b568820b92e0f1f0c0b059f7a4e2b64f2107794ec8f5a025957c714b098648,2014-09-23T20:06:45.083000 -CVE-2014-5997,0,0,528a28610ba36e2e9b34df51b280d2de52c9b1165b33b25e4dccfa6b7326a4b2,2014-09-23T20:13:15.653000 -CVE-2014-5998,0,0,aab617cd584e9ce5225c52520bd32b40d7c73dff0933f89ff5838aacbcab1dec,2014-09-23T20:13:56.983000 -CVE-2014-5999,0,0,940b4504e9a441303fa5d7f5e09b628c3373b2b5aa907c00e4edc764964b57e0,2014-09-23T20:10:42.213000 -CVE-2014-6000,0,0,85d613f3ce7d5d38a9105316188fef432862999260313cd39fa6b68af6d90595,2014-09-23T20:53:34.200000 -CVE-2014-6001,0,0,9a2f40f7820b6cd5b7e3a507a46896ca1dfe49367d66fb7ff51e391ba167240d,2014-09-23T20:59:27.707000 -CVE-2014-6002,0,0,8b7951609717474a659eb0a699a48a77a13c0d11b680d5a49b35d2fe830ef37e,2014-09-23T21:01:02.817000 -CVE-2014-6003,0,0,c4dc74c00291c061200cfc3997b9165fc0d75ffe41755cd6153cdc9ffd1dcefd,2014-09-23T21:00:16.257000 -CVE-2014-6004,0,0,461234a2901c38362246c4aa4b471b314cb36c224c452851881fc269f73b23db,2014-09-23T20:58:20.127000 -CVE-2014-6005,0,0,43ce71ad9dda5e9793ede56144f9fb3aa3910766d304aced81b97c15732dc149,2014-09-23T20:57:36.360000 -CVE-2014-6006,0,0,858883ce88c30b65ddbb5ff492ddee1fbe30a6f77d226812bafc0d6a14809ac5,2017-11-30T12:54:31.617000 -CVE-2014-6007,0,0,b55002abcc6bc28b5c7e75a38fd3054cee7a82f2cf62d7d62b09cbf6d583a706,2014-09-23T20:56:07.547000 -CVE-2014-6008,0,0,1d9c12e23c414c5abd41fee00b3f68698d0a962ae5da55630658f1da1be21924,2014-09-23T20:55:31.157000 -CVE-2014-6009,0,0,3feae8d013262da23aa44fc2c9d9ea43623c01ebf21c8c4dac6c00efa9a5bcd5,2014-09-23T20:54:54.640000 -CVE-2014-6010,0,0,53afd02e571da496c8cfb7b2e38a3c1118e9ed934517409d4dd97f3aef55fec6,2014-09-23T20:54:15.513000 -CVE-2014-6011,0,0,6b08a61f44009df0b704832fa827ba568e37e2370c6c8126f30fa13bcafae117,2014-09-24T01:26:51.890000 -CVE-2014-6012,0,0,9ad617a92a38c11198d4ff1ffc58d7c0d361ca7f8778e80cbf07b92ace5cd94a,2014-09-24T01:32:21.880000 -CVE-2014-6013,0,0,b860a203e5fdeeba4ade94c3bdf113a7e0a80ba32ab20e64535092be6877d491,2014-09-24T01:31:38.647000 -CVE-2014-6014,0,0,259979563642dd853bcc08bfed62942f3926912d4acee3fffe13f0a3f5d88a11,2014-09-24T01:31:00.723000 -CVE-2014-6015,0,0,dc020c03fd73baa380935387ed6bd8b81756a5788d91c8ce0a2a93d760a65384,2014-09-24T01:27:27 -CVE-2014-6016,0,0,10978b741f7bbf5c0ae6b8761b05688c3382a8958e2fbb6e721584371086915c,2014-09-24T01:30:23.287000 -CVE-2014-6017,0,0,65380e1d46bc7c0f451c7885d7cab649211dbf3a1db6be3ed54040ea6468b126,2014-09-24T01:29:49.427000 -CVE-2014-6018,0,0,8e551c3401dfaa16c2b151173bf0baac77ba4bd1984e1dee5dcbd37b4021a664,2014-09-24T01:29:12.110000 -CVE-2014-6019,0,0,8e50aaf14ccc677c8284c3ca5e3194d46a31f98f9b7ed5add825eba457ad50c5,2014-09-24T01:28:34.860000 -CVE-2014-6020,0,0,8164076c4df5a7e0ef983418759120b0f97374761e74786118e68dd25f753fde,2014-09-24T01:28:00.563000 -CVE-2014-6021,0,0,bbb10c54c623ebaa86aeee54985372573ecbe384a1c00ba6cacd9b47362e316d,2014-09-25T18:29:32.600000 -CVE-2014-6022,0,0,5a64c5e8386a2bd82ac334d45f22406a937cbf3085dad64b35c78e1cad9f9f10,2014-09-25T18:30:39.840000 -CVE-2014-6023,0,0,625ecf6fac77293832eb6c9da3fa94d8168c8d9eef139ece1763eb2890327f39,2014-09-25T18:31:23.903000 -CVE-2014-6024,0,0,a12f6e48b17b4ac5f28c39436ec6102e712f04fdf73d35e29833b84936371b6d,2014-09-12T02:06:37.777000 -CVE-2014-6025,0,0,823d59aaee7e694c985dfa1ff44c5e06e19dd84ecbd9d4c2b66c14ebbb765801,2014-09-21T22:07:34.837000 +CVE-2014-5916,0,1,9afce5e955089eee347a3ac24236bb8768e88525431243b1b0e3f6c6a0e41c86,2024-11-21T02:13:17.063000 +CVE-2014-5917,0,1,593ef79654ea922e91ac7dee65f5d4e803e1fbeb3718a3d44ebab72fef03edca,2024-11-21T02:13:17.257000 +CVE-2014-5918,0,1,6181304b8126cf4d63147e9ade9659de3c81c4a50e21c88301453130a3c168db,2024-11-21T02:13:17.433000 +CVE-2014-5919,0,1,deb3dcf21632f23e5af8357af1e1e8d2f6f649db2c0a399eca1a1bfbec9e384f,2024-11-21T02:13:17.610000 +CVE-2014-5920,0,1,444cff7607bbebeeaa2e86941ba5adb67e69fa02254aafff5a095bfb087eb5c8,2024-11-21T02:13:17.787000 +CVE-2014-5921,0,1,d5b8a377c6735ef6ee7a57405a608bd5c1ba17b818c970f9358c3ad5932f6350,2024-11-21T02:13:17.957000 +CVE-2014-5922,0,1,4395c9ffde2f3416c300f6887e7f4ab42a0ec4d0ee70c5482399d9075456fac9,2024-11-21T02:13:18.127000 +CVE-2014-5923,0,1,73e5111c64a30311b822e6d4d613d5bcef7077e55195584b8843fd53125b79ed,2024-11-21T02:13:18.300000 +CVE-2014-5924,0,1,4e0cf5f3fa4163d5b03ad6e080dfb692c74a1d1424ef80d52087b0ff6bfacf32,2024-11-21T02:13:18.467000 +CVE-2014-5925,0,1,ae2809837c6f955717f00473868e1ae387185198cb004f0d3f7a3bc03faef9c0,2024-11-21T02:13:18.630000 +CVE-2014-5926,0,1,e13b364539eb7bb939cc08ce563748f8f8cf045d690f1bbbcecdae894cb82d47,2024-11-21T02:13:18.800000 +CVE-2014-5927,0,1,0bc5e116fdbe6119b041715cdce8fe02d26356318c7503224c698913ff5f951d,2024-11-21T02:13:18.973000 +CVE-2014-5928,0,1,b23dc3f1a488d3e89fe2530c1ba9aea0bac47b63ee78ce2c84f67d078ca4538a,2024-11-21T02:13:19.160000 +CVE-2014-5929,0,1,9fc591badf8d55c6420eeb55f69f8e5e3f3c0fddc694c151f2eb4388933622cd,2024-11-21T02:13:19.340000 +CVE-2014-5930,0,1,f6d17c429e17f154e2b9cbd8b475394a99cbe3d1c9bab9b1212cf96fbabea34b,2024-11-21T02:13:19.510000 +CVE-2014-5931,0,1,71790ce61329df75475cdbdac7aa7750279413f9c972b89113ca53b68c997f52,2024-11-21T02:13:19.690000 +CVE-2014-5932,0,1,e960b6a72fc47ad13acae1fbb551deedd770d3b1ebb22d63b6bad75ec4d85a37,2024-11-21T02:13:19.863000 +CVE-2014-5933,0,1,b645efd63c8f6a33680e82f8908a106499f8072f19d57f3fd53fa52b85e78a74,2024-11-21T02:13:20.037000 +CVE-2014-5934,0,1,650045ddc0163c6edfc420291b0dafbd40fa2f6646d4ac86904f6d6aeed9a887,2024-11-21T02:13:20.207000 +CVE-2014-5935,0,1,310cbbdc028d9edf091043805dc30e703a58afb01e8252d5f9474bc22c81fd93,2024-11-21T02:13:20.380000 +CVE-2014-5936,0,1,2fdf2c45d189bb652f24c86587f20fd0ad5c25aff836a2e7bca4e7fcf83ea123,2024-11-21T02:13:20.550000 +CVE-2014-5937,0,1,74886d7e7e5b9a608bd1ec5bf7e31063b417430a76f671593dde8e6e4f1c8202,2024-11-21T02:13:20.713000 +CVE-2014-5938,0,1,c873b9bb26a7df6327d989f6b871bdbdc7d2c275d76e6aaeb2f8766e8f1a9def,2024-11-21T02:13:20.890000 +CVE-2014-5939,0,1,881c398c113787eabe95fa3cd2f006d816150dac71244d94b48effe28ca7c86e,2024-11-21T02:13:21.057000 +CVE-2014-5940,0,1,cff67a93c1720368b98ae9bd4c00ec25ce3bb0f3c7590d30ec5ab73c6760b698,2024-11-21T02:13:21.223000 +CVE-2014-5941,0,1,88a6508c13a41035a49721306b0c6732991688d64d78be7e70cae311c01d841e,2024-11-21T02:13:21.397000 +CVE-2014-5942,0,1,d94edf9acc1d2fbd0ae132cdeabee70c7f87ea6e404b4f80f08280f7946059d8,2024-11-21T02:13:21.567000 +CVE-2014-5943,0,1,08937754132adfae92b443fcf425a97b3b3ddcf989ef387ed872110de5baf93b,2024-11-21T02:13:21.750000 +CVE-2014-5944,0,1,70b344b56debda8c38ec2e0b97faded2aef2fecb09196f7be1a5ccff7e581c0e,2024-11-21T02:13:21.923000 +CVE-2014-5945,0,1,07bfa1813a9b4780e9e3219a030406a9df4865263164a31ac2d8e26014604c43,2024-11-21T02:13:22.107000 +CVE-2014-5946,0,1,700a5cc788c80960ad3b1089f0e9f8698643d76c095583f026f2649c186b04e1,2024-11-21T02:13:22.290000 +CVE-2014-5947,0,1,1c071e4339e145510bfe7ed4851ae857d6f9f0b6db1d947a7af752e54d894873,2024-11-21T02:13:22.470000 +CVE-2014-5948,0,1,bdfa366ff4442bc4eeea40f1cc1b1ec7903dd4501df02d6dee6178def4cc684a,2024-11-21T02:13:22.640000 +CVE-2014-5949,0,1,ec7b03bd91fa1e979b41e373d0f0871ebf14fbb8e2f619192c7b5e2843c43fcb,2024-11-21T02:13:22.813000 +CVE-2014-5950,0,1,4d914876ab449dcdb7f1cb6e902b8cd42ec3d191ac678f7f7cb1d817dcacd3de,2024-11-21T02:13:22.977000 +CVE-2014-5951,0,1,78abffc351dce2ce3703215d1a351f16155289ee4ae138d69d317e5ee2f8cc1d,2024-11-21T02:13:23.147000 +CVE-2014-5952,0,1,4f8636803f65dcc953107340059ad72e8984fb36376f225e24d96b8ce2546bf3,2024-11-21T02:13:23.330000 +CVE-2014-5953,0,1,def7fab02fd14fcb3052b16e5b7e6e1cef42239428cf589f08a8c7bff0ef69f6,2024-11-21T02:13:23.510000 +CVE-2014-5954,0,1,dcde89e79a178e318a3bf7fe2bd8f4971dc697aee4b30149c40852982e267bd9,2024-11-21T02:13:23.690000 +CVE-2014-5955,0,1,9bdf41a881c625e5541263f9ca6bd984c64d4d125b89bf9b6c8f51ef329ba717,2024-11-21T02:13:23.860000 +CVE-2014-5956,0,1,81c95540ec2491fc241c88497a0c9b6be86758f53028bc322b84d6d91da19225,2024-11-21T02:13:24.027000 +CVE-2014-5957,0,1,32a9d265b3118454e2df1c9c8a23e9c63a8509a76b5b10e7664eb6cbbb4bf035,2024-11-21T02:13:24.190000 +CVE-2014-5958,0,1,7797431575275be81220092b035837cb00759e757c541131a6f862ec19b59dad,2024-11-21T02:13:24.357000 +CVE-2014-5959,0,1,5bc68ebf3fb56baeae2464e652974db3643d7a4b07ac6700d462e58134925eb4,2024-11-21T02:13:24.520000 +CVE-2014-5960,0,1,200ba29155496f8b1d64d141202b2d076afbd733d08b493ca4e305c826c2a841,2024-11-21T02:13:24.690000 +CVE-2014-5961,0,1,6d3f45df4304de3c6c11bf275df3415e82382d823e0fbceeee3a61dea5037744,2024-11-21T02:13:24.853000 +CVE-2014-5962,0,1,170e162e10080db0e88a086403eb4840b1ff8cf9f967134c5a5df9153671d571,2024-11-21T02:13:25.030000 +CVE-2014-5963,0,1,ff25f68407477054f970c9defdeef515ceec424bca6b96cbebfc246c13b4a363,2024-11-21T02:13:25.200000 +CVE-2014-5964,0,1,e04c4596550bb8f3b5ebd4e2dc2bd3953bb0e93850e27809e470662f8cbf6bdc,2024-11-21T02:13:25.373000 +CVE-2014-5965,0,1,93d11b300df20288af44293682b13d873a88e81adf4cb30ce1695473ff37ef2e,2024-11-21T02:13:25.550000 +CVE-2014-5966,0,1,383e5cd51351896e068899723d9b8fc87cc04d5149eaf77ba6b4dc62b798892c,2024-11-21T02:13:25.717000 +CVE-2014-5967,0,1,15bf94e2c51421b3d12337cc51fa8fdbdfc2a5ebcac2bb752543fa12e27451d4,2024-11-21T02:13:25.887000 +CVE-2014-5968,0,1,c7a4fcf01b0eadaf110937d6396dc6a3c186d3b8e40da11e60076c566eadcdf4,2024-11-21T02:13:26.060000 +CVE-2014-5969,0,1,d69944f41e672b17921ddd062e3cc71478dd12b7472cc5cab136ef7dfc2a9c32,2024-11-21T02:13:26.233000 +CVE-2014-5970,0,1,e5b708a8d999146c21f560eee0032195b18f54cf1a841fe02bf2ca45f487f9a1,2024-11-21T02:13:26.407000 +CVE-2014-5971,0,1,980728821977fde9ba87062cacb7f81447673687ad0122f4f3591a0a94daf8a8,2024-11-21T02:13:26.593000 +CVE-2014-5972,0,1,81cd0a76e5c5f5580345a3c133ad1defdcab460803e55536cf6eb72c63f075d4,2024-11-21T02:13:26.767000 +CVE-2014-5973,0,1,296f105d1143c7b90d1bc1d8ec3ef5eb0db3456838e30f3a4a01fa12f91e025f,2024-11-21T02:13:26.943000 +CVE-2014-5974,0,1,0819eac11461757c0e063cae54ff613d3f2e012b4e825c96635f2c29077eadcf,2024-11-21T02:13:27.127000 +CVE-2014-5975,0,1,e57bdab9493865f376f82eb43d250661cbadc67ee07212bade10d83dfe893e80,2024-11-21T02:13:27.320000 +CVE-2014-5976,0,1,32a4ed0323f8358942d35af475fafa41379b3f1ada9ae859c796855f58acec6d,2024-11-21T02:13:27.503000 +CVE-2014-5977,0,1,1e52afb8d43446972f2bd27691318dac71a00005f5405b5d8a20e2ff25bfd4b5,2024-11-21T02:13:27.680000 +CVE-2014-5978,0,1,09ac86d3d9aca2e941bf5ac305ffb21bc32043fc7e2658410449c4aa6c14c42c,2024-11-21T02:13:27.860000 +CVE-2014-5979,0,1,21d37a6823c07ca9a87c719927b64b3fba2875bed10b77359c170e3349de1d5d,2024-11-21T02:13:28.040000 +CVE-2014-5980,0,1,d0bcd47e805788d706aed869f8462008c8fda84c4f7c2f4bf7be75e549b8b5f5,2024-11-21T02:13:28.220000 +CVE-2014-5981,0,1,c9245c275fdb41eacde87869861fad03b437cb37366cb3366d536083ec82e68a,2024-11-21T02:13:28.390000 +CVE-2014-5982,0,1,7c9a8539d4be3b431917b254064371f3501a23fc51acab53fed2389fce8866ee,2024-11-21T02:13:28.570000 +CVE-2014-5983,0,1,e3516602045b427e6fb15a6f0b36b94662b691d17eb0e47434860ba8dcf1ed09,2024-11-21T02:13:28.747000 +CVE-2014-5984,0,1,34af285a8b2e9b2282f2e6ccd27adf25899d120dfaaaa247dd5ecdf24d171332,2024-11-21T02:13:28.940000 +CVE-2014-5985,0,1,c70488d7bcdee54ccdb03b41e4d63c9571bedccda67a4364a0e3e4ea6132436f,2024-11-21T02:13:29.113000 +CVE-2014-5986,0,1,3d1a1ff41641e2a1b0664ce1e476e5d442b644e1b77dafd889fd335253d75467,2024-11-21T02:13:29.280000 +CVE-2014-5987,0,1,6c7d7c6d5e6030baff3e506316e8ba4c9da09d482c02c0befa17caa0443dbd3f,2024-11-21T02:13:29.450000 +CVE-2014-5988,0,1,dd2ba9f971bad880dbe1f2537a9c3dc63638ee08dcb679c6a607e07b7c2715a1,2024-11-21T02:13:29.623000 +CVE-2014-5989,0,1,a083bcac89146bedbdcdbfe953d68bf9a64fba3781dc8755e335666ee40a96f8,2024-11-21T02:13:29.800000 +CVE-2014-5990,0,1,649db8acf7670d69eccbd945b14d2563a55936da3bb7395c832953854ff8072d,2024-11-21T02:13:29.973000 +CVE-2014-5991,0,1,1a4d7bf74368d36f99bed1160a45f60553ec1682e62b5789560b36e0ee2e570c,2024-11-21T02:13:30.157000 +CVE-2014-5992,0,1,31d32143a3acbabf014a6b549f391f554998342680c13dfca159ab0964e77d32,2024-11-21T02:13:30.337000 +CVE-2014-5993,0,1,49354c0ce2aa9856be826e8e067b20adb8b57ca3d515d2e5229da955e63f05be,2024-11-21T02:13:30.513000 +CVE-2014-5994,0,1,9c6edf1cb1cec53af4cb070ce441a7d74fc7957f0adf846c07dd855e45c74fde,2024-11-21T02:13:30.680000 +CVE-2014-5995,0,1,c6e17f1c68bc1a0065102876ab70a6afe38fc16b2d9196b9fe7735b29c74e6a5,2024-11-21T02:13:30.860000 +CVE-2014-5996,0,1,e9c2825faa3ed2816fad397cda071e17b2b5eb74114d438f1fb9e1598c9decb5,2024-11-21T02:13:31.040000 +CVE-2014-5997,0,1,c6c3f02b9bc7a2cbd7c60c4a9ac8aea1b5e74cfc19901ffb9f06c3fbeab040a7,2024-11-21T02:13:31.220000 +CVE-2014-5998,0,1,a6e2aa5bfeb9eea4928d73094ce32ca8245cb10cbc8084321542f2fd478ffaf7,2024-11-21T02:13:31.403000 +CVE-2014-5999,0,1,90b26d67213505e0d915a11ef8122febb511c047623ddcfb922360e65cfb0305,2024-11-21T02:13:31.590000 +CVE-2014-6000,0,1,c41560d3dfdc172540d04fda05d7f457e6fea8e5260d6edb9e2435ab86e613a2,2024-11-21T02:13:31.790000 +CVE-2014-6001,0,1,69dc9d18ea33e889208fe1161a100edba1f361b523b57f23d15154b8c8992ef9,2024-11-21T02:13:31.960000 +CVE-2014-6002,0,1,e8775bd6ed94f0af1ad950e66250536748ec3f0ba8bc7e5395d8c809c5bf5376,2024-11-21T02:13:32.143000 +CVE-2014-6003,0,1,47d3d48bd2bbe6fd8887d4bd1c9cf09ecc3807c19ed0313e4a0e65c343d8ca40,2024-11-21T02:13:32.340000 +CVE-2014-6004,0,1,77c4fb9ecd707f3ec932a4f4962786f0da532c2baddd0181ec98817508fc3425,2024-11-21T02:13:32.530000 +CVE-2014-6005,0,1,d094582ac5dc9c4c6b02428873e6ed4bc302dbc22ae504db3052aa5d5aaca8e1,2024-11-21T02:13:32.723000 +CVE-2014-6006,0,1,be6e9c3e2ad68997bd57f51741925638eb4f99431c55f83eb9e3c75647a931b2,2024-11-21T02:13:32.910000 +CVE-2014-6007,0,1,3a997747c4f5354eae08bf212e4d1d4d28067f05261d43b804af712e4ba28ccc,2024-11-21T02:13:33.123000 +CVE-2014-6008,0,1,59903e8cb9c238997911600a57026afa319e0389b825c42670abe188056c21a8,2024-11-21T02:13:33.327000 +CVE-2014-6009,0,1,1991bbc999bbe1d99dd3f39ed88a5d261b52f7b146211dbb4f684ee6a763f155,2024-11-21T02:13:34.077000 +CVE-2014-6010,0,1,810c3a3f6897bee90096198d596ae65372fe149fc2195c9afbf2cfac671074a1,2024-11-21T02:13:34.263000 +CVE-2014-6011,0,1,f69699cce5c4b09e01d68ce1a35ce45274aad5219259c9d5568be8ec731719d8,2024-11-21T02:13:34.440000 +CVE-2014-6012,0,1,4b27738a7b593d952443947ff74f2e3b2935d03d41cb01678d3e2df7a848539a,2024-11-21T02:13:34.610000 +CVE-2014-6013,0,1,7064d3bdc07b2c3041c741dc5335edd4a7d120f5667720efa83bb114017a35a7,2024-11-21T02:13:34.790000 +CVE-2014-6014,0,1,b1777ec7f62199445889a93f9b0ed67c352bad5ed5443432762f6baef2f437e8,2024-11-21T02:13:34.960000 +CVE-2014-6015,0,1,cbafe2542546825d8529ca4ca399df4f4eeb24ce702f0a1d6c6692fa345e9f96,2024-11-21T02:13:35.140000 +CVE-2014-6016,0,1,6fbb589dedc096e548f83a277b1d950e4206b94c2e1c7ca49c33605d5244ed1d,2024-11-21T02:13:35.320000 +CVE-2014-6017,0,1,76981ca6170eec3aea19753d77fdae1801b47be91fe17f3445e7126f90c8e776,2024-11-21T02:13:35.487000 +CVE-2014-6018,0,1,c4603416706afacec001f9ccc6e9598a186e6707d05562239dd37c5cb51ef443,2024-11-21T02:13:35.667000 +CVE-2014-6019,0,1,447f5e3b48057a33ff23de0f71e306305631a24076c2b96e3b6856793fee0433,2024-11-21T02:13:35.843000 +CVE-2014-6020,0,1,94759571b4bb65ccefe37cd6ebaa2f219fcbddaa302d5f188c52901a7b5e0ae2,2024-11-21T02:13:36.017000 +CVE-2014-6021,0,1,19037b4777b775a64957a3438b66156e22b2bd901a8b91867fd687922f61a005,2024-11-21T02:13:36.193000 +CVE-2014-6022,0,1,f61c325bfeb18c3383ddbffa7628c4e4ef3ed7211d51234854768b3da368387f,2024-11-21T02:13:36.363000 +CVE-2014-6023,0,1,7d1af1fd4f3792af363396fcadf7ab29f8edbff35361862a8488b04cfeed9609,2024-11-21T02:13:36.537000 +CVE-2014-6024,0,1,5d6ad39144d0888114920fccf8361c2adacd3baad36b671aec318ca9f3012aeb,2024-11-21T02:13:36.740000 +CVE-2014-6025,0,1,e23c114522f10ddd1db4c880af86abb03492f7948b87a8683ee8d5a48a2ae905,2024-11-21T02:13:36.947000 CVE-2014-6027,0,0,fc208e280d74011b2624e45b3e7b414b65d20bd72fd5df7fd8c2c2c9101b2446,2018-02-05T14:29:16.050000 -CVE-2014-6028,0,0,2821eaa5bb3a065792d90b5ea4cafe0c3fd94e89cdea394c2c20b8c16a3551ce,2020-01-30T15:48:35.430000 -CVE-2014-6029,0,0,fb824df342331356d71fc6eb4a5b08077966852ab6d599368d59f5df940ec864,2020-01-30T15:48:35.430000 -CVE-2014-6030,0,0,e6113b8af3e2a9b9b40372e3ca15b744336d12ad377c3675c7a2f98a402a5f0b,2014-11-06T19:49:14.047000 +CVE-2014-6028,0,1,f8da0ffc2c1619f03f193be1e7d0bec1dfc426a0d431fab49af429bb230f8523,2024-11-21T02:13:37.333000 +CVE-2014-6029,0,1,42d00f32ec493a70059916c973c12763a78268da4b7e4ce2dbb014b45db6fb5f,2024-11-21T02:13:37.467000 +CVE-2014-6030,0,1,11a0a60d259f2dbe631aadc5c7dfca10d923b87856318b04091f52a0caef4d05,2024-11-21T02:13:37.613000 CVE-2014-6031,0,0,b81b5191575ba3ecd1797c675d2af63c3fb94d1898fa39011d769d4daf37b17d,2019-06-06T15:11:36.407000 -CVE-2014-6032,0,0,1a5fff1663b9dd968a1af006b9925a73c4b963dbea63c065b4e558738bcc31fc,2017-09-08T01:29:07.073000 +CVE-2014-6032,0,1,49ee5d4846c0171fc1f140dec164da9e34d15e8ffbf566d42c3205db9ce6f255,2024-11-21T02:13:37.963000 CVE-2014-6033,0,0,e5c0a846d1dfe158a6a241f58e24e36d2bf548eeb8a2c2de7288531a3c67c47f,2023-11-07T02:20:56.233000 -CVE-2014-6034,0,0,143c8fa8c07a254df7fdb9fdac4f7f4d40be63196ba3f0b40beac48c7c0b8933,2014-12-05T13:45:42.600000 -CVE-2014-6035,0,0,153cd555d6ccffb3eac7eab5dd6efb913d67d26ae5c471a1f882bb6207838c30,2014-12-05T13:33:00.720000 -CVE-2014-6036,0,0,4a48544b97591d1f502dab9214d4a56bebfff42a2c0c2b2afb716f01ca5b3d06,2019-07-15T17:45:58.473000 -CVE-2014-6037,0,0,ddb00140b0fb2de2339ce83449bd6116fa63eb54229f73e9e328ad376378e670,2020-03-26T14:15:12.497000 +CVE-2014-6034,0,1,b5e83bdb112306d0e9bf6c814b7aed4889143825a1c864ed18ebb41f3d969281,2024-11-21T02:13:38.180000 +CVE-2014-6035,0,1,c2b1f7dd9d9c2535559baa470c367264bad3edf9fbccab16c254eafc0a1f02e9,2024-11-21T02:13:38.327000 +CVE-2014-6036,0,1,8aaa566803afadb8626a53691c75d96c26acd35755f2231dbc0ac6e8cce72126,2024-11-21T02:13:38.467000 +CVE-2014-6037,0,1,ba2e805798ca559ba86593b767c35c0472211fb0f3b340985d04eff465c3023b,2024-11-21T02:13:38.613000 CVE-2014-6038,0,0,b86a0ea3fa75a17cf7b6a1380491c33b5d76d6ef25a3c009afe8a859d446d47e,2023-02-01T17:01:46.817000 CVE-2014-6039,0,0,f1a0c4f0ae9e88b44238ac9db7e953f280fbaa85aef8a1311ef0ab9a01709f1f,2020-03-26T14:15:13.247000 -CVE-2014-6040,0,0,6cff5114bc496e2ccf07ce9a27222ec1ea75df87d5cb56017c7aa33c6a2c4b53,2023-02-13T00:42:20.830000 -CVE-2014-6041,0,0,5a33dc703e19006f0e303dbc712d4f0ed2dbd39fdb3626127b88e1a08cf58b98,2017-09-08T01:29:07.137000 -CVE-2014-6043,0,0,fef31f112fc9e5e308abea243f2971c3e622424e38bf2db5dc8288bfe0224f2f,2020-03-26T15:15:12.273000 +CVE-2014-6040,0,1,e2344083312d3c245d661a4b0c0735d9aaed08e0e51c40359581f9eaede4c9f0,2024-11-21T02:13:39.747000 +CVE-2014-6041,0,1,7ab3a74c5b2db6ad91e85d8cb33c12bf7cac953578bc16e9cf312f8ee6976f7d,2024-11-21T02:13:39.917000 +CVE-2014-6043,0,1,93136cf7aff23f8b4588bdf931ecfa510c1aa7cf0ec38508d8e898c6936bc0d7,2024-11-21T02:13:40.127000 CVE-2014-6045,0,0,ada2b32e6d71f3d4a1d885d54626b8eeba86c85d87a70a19469e0a215a04f9dc,2018-10-31T19:55:23.037000 CVE-2014-6046,0,0,5798e3d63e137a7fe273422095ee8360f7327c54c2c229fc8cd6b3aaa93f8630,2018-11-01T17:11:19.677000 CVE-2014-6047,0,0,8bf2828d9be7fe09f021141d906b6990e7b90fe5de9ae7de46a192a423b498f9,2018-10-23T18:46:02.987000 CVE-2014-6048,0,0,d0bead8ddf7c369f5f1edea9d8d595ec9154aa01527c54cbb1964f7abeafcf08,2018-10-23T18:55:48.327000 CVE-2014-6049,0,0,729d461c00cabff6932a132d2f034f30fbcdc750d9a875b3ed34134a06086b93,2018-10-23T19:05:28.563000 CVE-2014-6050,0,0,4720da1fe94f6fcbea8254d87c57b5513881113d08fc2dc3fc987ed39f5d1cb5,2018-10-23T19:17:04.090000 -CVE-2014-6051,0,0,7417eb55aa4c8033e77c59b97cb7aaaa333c7394662f0357671429fc2255beff,2020-10-23T13:15:12.627000 -CVE-2014-6052,0,0,7912bf9590d33129c4c4b7f2a210eaa432e710a14990810b99e0a8df9f9ed33e,2020-10-23T13:15:13.063000 -CVE-2014-6053,0,0,df8356b9aef04ab040f1afa1d800ac95686bc3d859cee2f4a0f14ce708d6c80e,2020-10-23T13:15:13.203000 -CVE-2014-6054,0,0,b0ad1f32e1bd6beae8eefd5ca1bde4ddac51b6a3f4b3884ada1d9a09f8fe2925,2020-10-23T13:15:13.390000 -CVE-2014-6055,0,0,87a0c6d820bab797399a868dd205a384c28b24d208f3fa735118557df66424d2,2020-10-23T13:15:13.517000 +CVE-2014-6051,0,1,9609cc9b70d3c04b6961a09d93d15a4653649e81217782f59c60de05c2846240,2024-11-21T02:13:41.863000 +CVE-2014-6052,0,1,f30cfb1e2b951e56731782be433aa1126e9ff811b57312fce710f79f8e7e0a48,2024-11-21T02:13:42.110000 +CVE-2014-6053,0,1,dc8ec2e803af44e6acb0881118823213e3f43368c0caabbcf3d2c70917931087,2024-11-21T02:13:42.387000 +CVE-2014-6054,0,1,5a9e6f5854316bff8da5bee08ae395d499267b0b45dc67d3087680fc0de2a908,2024-11-21T02:13:42.613000 +CVE-2014-6055,0,1,7d6a32242f1c488b1d7715b8485d4324f6579b492edc7ee63c22a5dd31ab8e3d,2024-11-21T02:13:42.990000 CVE-2014-6059,0,0,6dbbfa80da6246690f6342eec826e3450d83452ba4d3aeba7a12d526dbcc0385,2024-01-05T14:36:21.020000 -CVE-2014-6060,0,0,40886713250d326b180787021e57786942723322465f37ee73a903b3e24a3463,2016-06-23T11:56:41.017000 -CVE-2014-6064,0,0,926420feb76ef4da681c9871f43a85aea0f763e83bbb9698b5625289bf7be417,2018-12-18T14:42:44.563000 -CVE-2014-6070,0,0,078fa4d8ca71fc5588bae84a649ba484149ce5b459156f44208456d0e511b2b0,2017-09-08T01:29:07.340000 +CVE-2014-6060,0,1,142a59637697266b95dd11b61b5c7cb044c049b6a127e422652f883b0952483b,2024-11-21T02:13:43.363000 +CVE-2014-6064,0,1,600ecf02d649ef45d79d2e9ac655f72b57cd168d82d0d9bf2e94599bf5959774,2024-11-21T02:13:43.547000 +CVE-2014-6070,0,1,0d4f0e30b1a9bd539be186491267f72a0b00b3d672cf33c4c416b87e240a6353,2024-11-21T02:13:43.687000 CVE-2014-6071,0,0,322f3b35962fb4789ab4095ab3600ab64df850449c4a6c33d5967e05ef36d1c9,2018-11-30T21:29:06.833000 -CVE-2014-6074,0,0,23c8dbb02c2a919f3056f635e1cce5f9fb0ca10de24e85735005404334b7dfb1,2017-09-08T01:29:07.387000 -CVE-2014-6075,0,0,c15fd993f79931e172c92f83fc8e65f00eff097eaf12d5992bb71b61d7531a09,2017-09-08T01:29:07.450000 -CVE-2014-6076,0,0,a9a8112bb543277670d2b790f47ab0ad3f72a2c6e81cf5f4f4241d5c8319ef6f,2017-09-08T01:29:07.510000 -CVE-2014-6077,0,0,c7bcbfaa51f21db20242e328fbf3bcbc7ddffd4909cb834356b9d36c49fb7e72,2017-09-08T01:29:07.573000 -CVE-2014-6078,0,0,3da79db36c225586288566b1f4f2f30b0d4d7b57f76a7eaac9e41109502e9c57,2017-09-08T01:29:07.620000 -CVE-2014-6079,0,0,ee11f22788496b282af62f95465069cff226909d0ec3897511c867073fcda436,2017-09-08T01:29:07.713000 -CVE-2014-6080,0,0,56b882125eb785aeef747a679f455d471375274cf102afb04e12d0454920313d,2017-09-08T01:29:07.777000 -CVE-2014-6082,0,0,1f5ca892e1521bae60e9e8cffb916ba1568c9cb7fb3f8e53312c94b3fdc415b8,2017-09-08T01:29:07.823000 -CVE-2014-6083,0,0,9957cfce162db8dc6dd18f245e0cf75e14e1f1d03323f2db941beff6d22d72f6,2017-09-08T01:29:07.887000 -CVE-2014-6084,0,0,471bcae8b36c3647e4ea51231f422db071dcd84c934489924e2b69681ea8e0f3,2017-09-08T01:29:07.933000 -CVE-2014-6086,0,0,840e04e5ed0afb1f490fc81a3ee785fb4a6247907e6009e4c0a501cc59aa42c8,2017-09-08T01:29:07.997000 -CVE-2014-6087,0,0,8182d0cf9f1de0ec8a4dcc2eebb5e1130e6b71f587e0943ec9a05c5e1ed899b4,2017-09-08T01:29:08.057000 -CVE-2014-6088,0,0,4b80383693f5474b1d748a92ccde68d4fa7a205b01631ef81e0bd691208d1a6c,2017-09-08T01:29:08.107000 -CVE-2014-6089,0,0,36f2690cb4ebf1aef8aeaeaf4782a4a67d2afe8089ac42b19f23d3f6e68b7e59,2017-09-08T01:29:08.167000 -CVE-2014-6090,0,0,798ada6b3b5711617d96b43e3131dbbe0d11adf02e5d713e9e0a5ada53f34e7b,2015-04-27T17:00:12.463000 -CVE-2014-6091,0,0,371639779a1a9578f262215a1dc8c9d56f51939c5731e14c4d072915dfe9a2f1,2017-09-08T01:29:08.230000 -CVE-2014-6092,0,0,447499487f1ace181d035ea9c0e2ddd8f8fb8f36b07c60f8930d7f18c6b82cb1,2015-04-27T17:46:00.623000 -CVE-2014-6093,0,0,8e06b3f3fbd918ff9b5cf79b6c565c9f9e46d3a08402560e563be69332cf0b0e,2017-09-08T01:29:08.293000 -CVE-2014-6095,0,0,4a7003445cced93ef487f49c7ac8d15fa8e50d1722754c815f987672afe2e4d8,2017-09-08T01:29:08.370000 -CVE-2014-6096,0,0,943c18d9b2868ede725d39ec4607c6e716383de51ce201e397d687a03d6297ec,2017-09-08T01:29:08.433000 -CVE-2014-6097,0,0,5591ed7f07b5693973f548d6be7afa91e398a79c00e1ba37cd01497b3895f83d,2017-09-08T01:29:08.497000 -CVE-2014-6098,0,0,e12a0ad8f6dc0fa9b9315ecf70ac4fc988fc9675cd1b6ff0f553f8ca82180955,2017-09-08T01:29:08.543000 -CVE-2014-6099,0,0,902a6b6f85cbe8d6bf22e7d92529b325ef9169585e24e3e2a57a73c1c726e6c5,2017-09-08T01:29:08.607000 -CVE-2014-6100,0,0,2f7394fd61a860a5fed548eadb2c48a2bbe0292197f35f1c0ee51a9fca5655f1,2017-09-08T01:29:08.683000 -CVE-2014-6101,0,0,dbbfffb85c0ffeec06ec8bdbd30556ade5ad335290efd66471f2bececbe3c029,2017-09-08T01:29:08.747000 -CVE-2014-6102,0,0,a08c545e47efe7626818e3f416c608f476e0bfec45a89f589a97c036a13d61ec,2017-09-08T01:29:08.807000 -CVE-2014-6105,0,0,b3b324066645e2f6b2e49d56c1710db88108e56c91d35e410025a88cf20dd35d,2017-09-08T01:29:08.870000 +CVE-2014-6074,0,1,9016d079b84d389ddcecb05f052802581844f8670baa4928e478b553aeec1f3f,2024-11-21T02:13:43.977000 +CVE-2014-6075,0,1,d312e2a2b3aa299e66b96f20de24863f3530bf2e6c85e3921222689e140b2364,2024-11-21T02:13:44.087000 +CVE-2014-6076,0,1,4940e25fc3a8984eba755596b70ae5330c2528fba7439eeaf9ee6f346ae9c6d8,2024-11-21T02:13:44.193000 +CVE-2014-6077,0,1,495393c4b1e225891331b93ef61362172fb427a36b6ab46483276471ba74965d,2024-11-21T02:13:44.293000 +CVE-2014-6078,0,1,37fa791bcf5ccc783868802deb098f9eb09a486c72c151cde0078e9f3cede30a,2024-11-21T02:13:44.407000 +CVE-2014-6079,0,1,bbc8ac65a2f067131c4bc48fe5222d69d87f93ab6cfcd839a122cd0c7d540390,2024-11-21T02:13:44.517000 +CVE-2014-6080,0,1,4f6c7409340b3943e16cf721db12af9b83bf2bcc05f48c1db3d88e5ce77ee336,2024-11-21T02:13:44.633000 +CVE-2014-6082,0,1,9a2f9609988303f1c4d00b3cda081ee4606f162c89a1a769be4a0d325b171487,2024-11-21T02:13:44.747000 +CVE-2014-6083,0,1,5b700b961e74431762ad0f2f485beb4c7fe51efb12fd08c9abce40638bca62c0,2024-11-21T02:13:44.860000 +CVE-2014-6084,0,1,c396f065ff5e2329ff46f356f46358513652c52773c866f13f70341ae50aef9a,2024-11-21T02:13:44.970000 +CVE-2014-6086,0,1,e044a87b3e7a0aee6352fc314ee061ff250f5ae09a968ec6663ff63397d5a3ad,2024-11-21T02:13:45.090000 +CVE-2014-6087,0,1,bd08c1c5d9b6e0f190e32748db627533e4d01d547d374468a9b3401f8434dec7,2024-11-21T02:13:45.200000 +CVE-2014-6088,0,1,913125b8e8167df1964dadca98d561edc4cd72d4aa3fd0d0379c9aa58c1004fb,2024-11-21T02:13:45.313000 +CVE-2014-6089,0,1,fbec6744e7d0599426a6cc8bdd52fa3c5fc4868597f73773cde9af674d2c1df3,2024-11-21T02:13:45.430000 +CVE-2014-6090,0,1,2d6ccf1c467990e3a1e7e0bdbd5b38c1831cac016e89170c7fb8cd09943a15c3,2024-11-21T02:13:45.540000 +CVE-2014-6091,0,1,bbcc8b77418f06ede481da0b3c154ee58328e4296a49cb63d0574f429becccee,2024-11-21T02:13:45.653000 +CVE-2014-6092,0,1,0a55a55af8c54d3c9a93d8b4992290b30f0405591994d0515bce1077075b1ef0,2024-11-21T02:13:45.767000 +CVE-2014-6093,0,1,2e61ce50be2fa74d9242d1e8a76913f507cd47216a3a10e2be362df46cdc94b5,2024-11-21T02:13:45.883000 +CVE-2014-6095,0,1,356e0eccabe93ed1d3e50da01df443dd5a7d35355f29046cb435dabdd9466239,2024-11-21T02:13:45.993000 +CVE-2014-6096,0,1,bd91aa003decd93709251db20f9deee2bcf9e77b187aa8a57eb16bd6e4cff768,2024-11-21T02:13:46.117000 +CVE-2014-6097,0,1,c31de9cc8ac5120672c960e1d3da98b0fe816f7ae449432b39272e7789b1abff,2024-11-21T02:13:46.240000 +CVE-2014-6098,0,1,359b5465bba712bfe161112ef7ddb46d3dbf95ad734ce96aaba1c2c42a21e9b6,2024-11-21T02:13:46.363000 +CVE-2014-6099,0,1,a6df8fd30f6d832a5b5a4faec40ce0d934586b9f25ba5be8fba6fb3fe4f3bb66,2024-11-21T02:13:46.520000 +CVE-2014-6100,0,1,7b45213920f543d998a9429f33f9a10cab566c6c88f4c289317ad49b2babeae8,2024-11-21T02:13:46.730000 +CVE-2014-6101,0,1,1495adf21be7b39a46fab60cf69dce99f4f1826a73f593cfc93d09ad2be5fb50,2024-11-21T02:13:46.880000 +CVE-2014-6102,0,1,b99e3480baea413fba3cd36f4e62dd1b3ec7858e8e3009b9c27715200eb21e67,2024-11-21T02:13:47.013000 +CVE-2014-6105,0,1,8a6a76fea1ff6f225bfc7081b7a4014a380b316e61a44f36cd8e464129fd1ffc,2024-11-21T02:13:47.137000 CVE-2014-6106,0,0,6691b7cd95be74d60dfb4e5415d239c602721475f8ea6b85164c251eec579dfb,2017-09-22T23:06:16.367000 -CVE-2014-6107,0,0,4d644c1b67f018c35e9435b812f5cc9ffd15d72d7db964fb03400ba5d0134c20,2017-09-08T01:29:08.933000 +CVE-2014-6107,0,1,62b41af0ffe0123f2ac7f39c6606701e181b6d33ce3bc5517c44f2aa4db5a086,2024-11-21T02:13:47.407000 CVE-2014-6108,0,0,74619547ae87c111faf317d5295e650a2275e1768b5ff836ae10be0caf221274,2018-05-22T15:11:18.050000 CVE-2014-6109,0,0,249d75118d6c4398a211d0c0e5cbeffb57054fe14bc180f51b271be043234346,2018-05-22T15:12:19.973000 -CVE-2014-6110,0,0,733bbeefe4f1e1f493ea906b5695b97eea8f8d2c077afb22b52c87c846386520,2017-09-08T01:29:08.997000 +CVE-2014-6110,0,1,72f53080ed6ae00372a26bbba5cd9bdb77b8cddd1c7d4728d44a12ae567beabb,2024-11-21T02:13:47.827000 CVE-2014-6111,0,0,7951b58e77017af4fabc032958bcc8fff9bcc96410cfd696a933c9d81edafcc1,2018-05-22T15:14:09.467000 CVE-2014-6112,0,0,fc660c85accf127c5caeea9ff7d2e10d548fc31c0ce716eda8152acf8500c1c5,2018-05-22T15:14:26.200000 -CVE-2014-6113,0,0,6c2d344c99b1545ca71e41378afb1df8ce09b40b84dc817f4f799b9f72444a34,2017-09-08T01:29:09.057000 -CVE-2014-6114,0,0,f445978c288f8c766fd281dc2581329aa14d6b8ede20ea6769b7ba9b1d7ca61e,2017-09-08T01:29:09.120000 -CVE-2014-6115,0,0,b2c8cc9a80c1d56b3e04a788b9a3c89b7e29d5e4c2e21529538440b8a24c8e96,2015-02-25T16:48:19.330000 -CVE-2014-6116,0,0,0f67c978e5e10d2d4f2a34b13449416aa4d123b8920fa5af81139b3bbabfc4b1,2017-09-08T01:29:09.167000 -CVE-2014-6119,0,0,780058b7bc67cec1f4aae08c179ea14d8f9d6a2d1c2bfbe40b2582f54b5720d0,2017-09-08T01:29:09.230000 +CVE-2014-6113,0,1,f0108559013cf50f67625eae4a2e17f1307aaa921baba11b25097d7d5e48fa95,2024-11-21T02:13:48.180000 +CVE-2014-6114,0,1,bf25a8eb92cd12bb74f68deb559095e92b87428f769a3142f68ad6975f40c7ca,2024-11-21T02:13:48.283000 +CVE-2014-6115,0,1,2da2588d2a5cf6b65731bfe9eaed4ceaa234c74e40586dd36826b44a156c4667,2024-11-21T02:13:48.400000 +CVE-2014-6116,0,1,b75cbb60df6aafd19f38687f162e3ae71ca002a71955bde0f2ead3cdd7d4abc1,2024-11-21T02:13:48.510000 +CVE-2014-6119,0,1,b2e67a79a36d2e7d290a12565c354e27038ccf250d89a9be072d81c47babeddb,2024-11-21T02:13:48.623000 CVE-2014-6120,0,0,07cab88519e3e3b832ad6b85cd8423f6dd754f9552e122c70ff8d8f2a6155bc9,2018-05-11T14:00:55.067000 -CVE-2014-6121,0,0,6154dab19051b934248ed9fb7dc58e765b6e1d780696ee7e5555c8e99b47724b,2017-09-08T01:29:09.277000 -CVE-2014-6122,0,0,75048498f5f3775d2b321c7c5ab82db053f4cab171e7003452002f5e97ab76f5,2017-09-08T01:29:09.340000 -CVE-2014-6123,0,0,378f26cbf63fc9aa456b05154d81bd7ef4884cea7fda2443b41a71883cdcd2ff,2017-09-08T01:29:09.387000 -CVE-2014-6125,0,0,add19bf332bb39094886aa42ef77629c1a027b1ac7c78f790dd7cd676b6ab607,2017-09-08T01:29:09.450000 -CVE-2014-6126,0,0,c03e6d2a380b161df8db9150f006bfdcfa84e92d4fca9b79ce2f013d26e559da,2017-09-08T01:29:09.497000 -CVE-2014-6129,0,0,2e586ce0df623bd751f8a407eb9d8feea9dbb97af42c5122cd1cd07c02b0c047,2015-03-18T15:04:55.400000 -CVE-2014-6130,0,0,ad13950aa4e4c24eb5e266b0b7e9b0aa5bd023b9f3d00fe9f922056a35616c82,2017-09-08T01:29:09.543000 -CVE-2014-6131,0,0,36dc3cfdc046c6b2176952dcde3d564393f33795c9adc39b8e07a0fb71016c83,2015-03-18T17:00:47.657000 -CVE-2014-6132,0,0,61c94497bb0aae9e319635855a5a97ad9659343fa0bb694ad1e939358bc92f42,2017-09-08T01:29:09.607000 -CVE-2014-6133,0,0,fc037ef1ba2c6de35761ff60523844ae346245287e4d874f519aa5cf79030a44,2017-09-08T01:29:09.653000 -CVE-2014-6134,0,0,753e7b4b99fab740114f22c2cba16945838a1ce54cde4cffc10f301f53ba884b,2015-03-25T20:47:58.740000 -CVE-2014-6135,0,0,e904782caa75ed4c82d84b13c036070f2bf6a0d117166dca1e2082660a1355ea,2017-09-08T01:29:09.700000 -CVE-2014-6136,0,0,fdfaeb0c0947dbf6b357c9b6f08e4dabfde1ff0b0372b7db2c2aeb7dc3453e2c,2017-09-08T01:29:09.747000 -CVE-2014-6137,0,0,1aa61185efd81f417c5a11761d7d05260cee710243af2b990ced12d65deb82bf,2017-09-08T01:29:09.807000 -CVE-2014-6138,0,0,a8e0cf28f031cf7af7821cfbba9eb7c4e73413278a5577b9cb20460d682729b5,2017-09-08T01:29:09.857000 -CVE-2014-6139,0,0,3b9aa38d84b7517e3192c48a7219e22777ced548ede194c74f0c387b747a115d,2015-02-17T12:35:28.203000 -CVE-2014-6140,0,0,ba3349478c1ddab045114537f2e12efb556cd4a52654b631971c6eaeab3df3aa,2018-10-09T19:50:22.007000 -CVE-2014-6141,0,0,13ce49dbdb4ceb837d469ed4ed6c64f71959d8e93787c57cbb3658a1eaead05e,2017-09-08T01:29:09.917000 -CVE-2014-6143,0,0,9d6e21d46827daf01e28f9b6232ca22719b0f9c3d12231b847ad0c6f051c4c12,2017-09-08T01:29:09.980000 -CVE-2014-6144,0,0,3fccabd19cbbfbb16bfffafa5ec7bc88d908643809ac5dd9e2736053fc715b33,2015-11-19T19:01:09.913000 -CVE-2014-6145,0,0,f7b688128f15bbd2e2de52a2ecd0eb66d428f637e72d4282b1c85c14e589dc26,2017-09-08T01:29:10.027000 -CVE-2014-6146,0,0,a64ab9fe2f7cb753b707e8b6cf45b5a412a989a3c420b779cb35ab726fba4164,2017-09-08T01:29:10.073000 -CVE-2014-6147,0,0,38d388de159bdba1f67fe84defb69e69241ab2447d17c3a7033ec76372fa5250,2017-09-08T01:29:10.120000 -CVE-2014-6148,0,0,a83500828afa0c3f6f9c515a208c69ce302f3e2da8d80739df735e194ce5bee5,2017-09-08T01:29:10.183000 -CVE-2014-6149,0,0,e7a00823431fa583ca8e26fd17af22cb146d6d1b35fe35b0ed3e98882080a8f2,2017-09-08T01:29:10.230000 -CVE-2014-6150,0,0,5debf10478bc9f997af9d6a5857a43468ea3730d0058e8fc37484572fa3cadc2,2017-09-08T01:29:10.293000 -CVE-2014-6151,0,0,4c9e154fd0be4c7f0b318a9558d56e0ebc7f88a14a692bec002cb99c4abd822d,2017-09-08T01:29:10.340000 -CVE-2014-6152,0,0,68ce4199f83736d5a22eb471a0a71e68e72e2ad973314c4452124348c9bfd77c,2017-09-08T01:29:10.403000 -CVE-2014-6153,0,0,c2663acc92c7a50dc418e3efc863123efe9303683743c2386b2a0d1fe102ead5,2017-09-08T01:29:10.463000 -CVE-2014-6154,0,0,7d4f14be041f0863d91a03b6b687509b3bdd6797472ab55e9487c9e2801df200,2017-09-08T01:29:10.510000 -CVE-2014-6155,0,0,23b88c7d2e1a334f8fcf1c3e35524bb067d911997ebfcdf79155ff216fca85eb,2017-09-08T01:29:10.573000 -CVE-2014-6158,0,0,5d56bde84367c4ec5bc00f476bf71b1239186bc10e60c53e03cc093e79051642,2017-09-08T01:29:10.620000 -CVE-2014-6159,0,0,4766164309475afb62927bf0c56404c3e06c9c0c1405091361c85b8ed942f823,2017-09-08T01:29:10.683000 -CVE-2014-6160,0,0,4de152151c7ad6122e99bf84b87b8c160807067b5a8324e13474eb01e6e3b135,2017-09-08T01:29:10.747000 -CVE-2014-6161,0,0,c4a60458ffcfdae2db87e9541339ac83192cbd9bf63dc0f251dd986b4f0b9141,2017-09-08T01:29:10.793000 -CVE-2014-6163,0,0,6e6de63028869fadc25ab8640f1e2bcc51678e6d2651a1d8f0aec593ff319235,2017-09-08T01:29:10.857000 -CVE-2014-6164,0,0,42f4f67786c28a454d7d346bf06cb17ee4e98842c2a7ebcccae62321f9e47469,2017-09-08T01:29:10.917000 -CVE-2014-6166,0,0,3b8fbcd684fe0d42bea22129367021f5aea0f12a9eeb74dcd277a73982785d36,2017-09-08T01:29:10.963000 -CVE-2014-6167,0,0,70f9da96019c756b88506394963e5b000a471e8ed8138d35f1889145a2cde4f6,2017-09-08T01:29:11.027000 -CVE-2014-6168,0,0,0ca1223e9b782049bb72307e96a675facebd1b5bafabb4f8ae4856a65378c861,2017-09-08T01:29:11.090000 +CVE-2014-6121,0,1,a87a4c01f3076b38f20d75715009a116ac891485baee7291c3370c5f2cc80a84,2024-11-21T02:13:48.870000 +CVE-2014-6122,0,1,357865f3b6fcd9f94f2fa617cdd7887dd1719b8622c0d0e93b56a2fe747fca16,2024-11-21T02:13:48.990000 +CVE-2014-6123,0,1,69e0f31eceb2dbf08367ccb7303a4fefd0a8ebd5437dcff265227db3a941646c,2024-11-21T02:13:49.107000 +CVE-2014-6125,0,1,ba6447b8148dc0b319061541f0855422fc826b65f93c47c9147322ee13fabec1,2024-11-21T02:13:49.227000 +CVE-2014-6126,0,1,a2ea73fecf608a5ca3b832634ec565cc044a3ab8612613445bb99521ec45bc7e,2024-11-21T02:13:49.340000 +CVE-2014-6129,0,1,15b27168ba9d2c72ebfd00cefbefea9650dd38c8aeeadcc1bba0a703286abdb6,2024-11-21T02:13:49.457000 +CVE-2014-6130,0,1,842eb0ab271e8a99581d1e5278020a6304649ef7d0f6f814e5e9d9f47baa2b56,2024-11-21T02:13:49.580000 +CVE-2014-6131,0,1,f41ceb674619f14e1dcdf9cbc86dabd415e783206df18bfd11a329b1e7eb99d4,2024-11-21T02:13:49.703000 +CVE-2014-6132,0,1,f9afb4edfb018074a1c566b7539aa02f55acb5645542e88ec86660610ce900ae,2024-11-21T02:13:49.853000 +CVE-2014-6133,0,1,0e2962f37da66e966fbccecad44e7fad244a1e2310ae3afa6f0bd8ecff0b9130,2024-11-21T02:13:49.987000 +CVE-2014-6134,0,1,041dfca291727a6a48df6425b760b0fd3d660e0f0b22d0e94f862c7fed8b6a45,2024-11-21T02:13:50.117000 +CVE-2014-6135,0,1,b44a1bfc9e333e7e7ca8c2dde093f7da39570d19c9cb936d00297ad6b9e92dfe,2024-11-21T02:13:50.257000 +CVE-2014-6136,0,1,d2a43c0425c3bd3a9d15d58164fffd1a322ce96880534b46221745d8c146be61,2024-11-21T02:13:50.383000 +CVE-2014-6137,0,1,ac4681e8fc4b8430a27e56862d062b142b918f7e2c4d3148f5384a3b8f6086a0,2024-11-21T02:13:50.503000 +CVE-2014-6138,0,1,d6b5957a7de9323fa4b27a8d95da96877a64807c566a068780d7f913024c47eb,2024-11-21T02:13:50.630000 +CVE-2014-6139,0,1,4e825d69124bbc748ddfde99c0b5fed8ae30849a2f1758bcf0c4345934522aa4,2024-11-21T02:13:50.750000 +CVE-2014-6140,0,1,6eb00cdb6135bc671547b78d25e9651fd0efc33e2e9d25c092659a089d3d2234,2024-11-21T02:13:50.863000 +CVE-2014-6141,0,1,c9b1b8a7042531517b92afca7587afaec73053e3dc456cca04699434ef369be4,2024-11-21T02:13:50.997000 +CVE-2014-6143,0,1,5b3b4b04b3a0884738166a8f2fee47cd13c3e34a32aaf1733438832c549368e0,2024-11-21T02:13:51.140000 +CVE-2014-6144,0,1,646b7fae205aa4b6ac1841af029885ee92d92e91be69810c86366d7571a0d05c,2024-11-21T02:13:51.257000 +CVE-2014-6145,0,1,9bc57181395d51fa902056786740989918562eac84ecd5381d77dc6791498742,2024-11-21T02:13:51.390000 +CVE-2014-6146,0,1,bb12f7e4d5545d9ffc11bce7de14338ce7167e6cdb7d0d10be54180da18ea8f9,2024-11-21T02:13:51.510000 +CVE-2014-6147,0,1,14f2d7a5fcba9b718f94530062bc403fc8f31f171c02b59cdc96f3fe29d7b86a,2024-11-21T02:13:51.637000 +CVE-2014-6148,0,1,d4c41edd75c4dec8d60d2f497482ea4941f6771a2475eaefcd4cbc1936b22a86,2024-11-21T02:13:51.753000 +CVE-2014-6149,0,1,c7b312df3fab3b432135a57c1787fa6d3bfce9a0e9f67b31f07e842b08266f69,2024-11-21T02:13:51.897000 +CVE-2014-6150,0,1,d5ec262fec9443f9dd01ad7448eb118ebc55998abfc708d4fb71a24fcaafb032,2024-11-21T02:13:52.040000 +CVE-2014-6151,0,1,7ecdff0678db901ece1a2dc3248266994db4a6fc720c7a85e9ebf86bee34f0b5,2024-11-21T02:13:52.170000 +CVE-2014-6152,0,1,e5d066528eea7c37d8a5c88b8484b82efdb043b30b5acedf434ec631c747db4d,2024-11-21T02:13:52.310000 +CVE-2014-6153,0,1,14fb8650bb780faa2a01cca5fc0c8d3d705b95d598dcb6d739e9bfb80da149be,2024-11-21T02:13:52.443000 +CVE-2014-6154,0,1,58abb96e7e590b05b36bfc70a828c5fa0c0fad749c2312ad52f1a9417f31289b,2024-11-21T02:13:52.593000 +CVE-2014-6155,0,1,ca5e453ff02ec4cb95e5f372dc9d833803a7a79efa8d8bb3196b7c34e4e528dc,2024-11-21T02:13:52.727000 +CVE-2014-6158,0,1,edf32191418b01dbcbf5f8a424532e43a8447ed2cb634a30baa307ffd520d3c0,2024-11-21T02:13:52.863000 +CVE-2014-6159,0,1,c9b4ee6e253d1845b2bacce311066351a867618864547f1753c62b235ad07c2a,2024-11-21T02:13:52.990000 +CVE-2014-6160,0,1,a88fb66246817619d46482bb8a27a67606da36c797cad33ba0190ed19e6642a7,2024-11-21T02:13:53.127000 +CVE-2014-6161,0,1,eaf1ad35c92478b2473be29c3af27534180d8da4e67490cb9e510f19fea58398,2024-11-21T02:13:53.243000 +CVE-2014-6163,0,1,df505f95c88edf1dfe9e4e42bc3d0a671fbfede0203c626e3fd93b680963498a,2024-11-21T02:13:53.363000 +CVE-2014-6164,0,1,51959da55d633e2b6378b2d2bf51634a7674fae32bcb1c1a20798672bdf9a188,2024-11-21T02:13:53.483000 +CVE-2014-6166,0,1,8e51710b70b2cd50e1f3238f44cb6d2e8334aee91e31fa2262a9fccd4343133c,2024-11-21T02:13:53.600000 +CVE-2014-6167,0,1,0f9317ccfe8ec0852e6bc7f07bdb07968b580d254924cac63968ecd6027cdc74,2024-11-21T02:13:53.733000 +CVE-2014-6168,0,1,2e1dba0c91328d9e7081f30e2b54daef8675c4f5eff6d22ce098f622d0937bb6,2024-11-21T02:13:53.867000 CVE-2014-6169,0,0,bf3047ef8ec325e1be71fe8c1b9a5c56497c5133c44cfe7888ea48c769e436ff,2018-05-11T14:03:02.620000 -CVE-2014-6170,0,0,47559b7d57d1ac01134fe9818a6d7f47f088dde261029bb8ea6f1cde57d52b23,2017-09-08T01:29:11.153000 -CVE-2014-6171,0,0,f5a9f54b35e374c4eeb484aa99d237d8c9c314dcb749255c3c7ba8a5aefd185f,2017-09-08T01:29:11.217000 -CVE-2014-6172,0,0,730db4d7e75bd2540b96f7d5a6bcad7a746170df9777b2762eb530635bb8ebf0,2017-09-08T01:29:11.277000 -CVE-2014-6173,0,0,bbff4167cea38d3b57f76bdac720699d4fbc0a1e8ecbf6bce7bf6152e826142b,2017-09-08T01:29:11.340000 -CVE-2014-6174,0,0,a37260c8ac4ab90c8aa477981799cb1c2c5a4c8d11ff40ba7828beda674c95d2,2017-09-08T01:29:11.387000 +CVE-2014-6170,0,1,b244ed6b6f997a3325b4e2ec1ae44d1c0bbaa2b43286faf6b130f588e9e8823e,2024-11-21T02:13:54.110000 +CVE-2014-6171,0,1,4382736d2c020908cce1f93df1941e38bd0199841226a2fda431150f5ba66fc9,2024-11-21T02:13:54.220000 +CVE-2014-6172,0,1,ffc775fd6abc32935cbe44bdf8f2bc5dc8bb7747dcfd735725e61ef90924cdf8,2024-11-21T02:13:54.347000 +CVE-2014-6173,0,1,e43186f2454861de687f1891afa2bad91ad4fb713a3377138a54925facdda8cd,2024-11-21T02:13:54.460000 +CVE-2014-6174,0,1,8f55b4dffcd398a6a234e49dd51433a0a60a51417a9d35ed6f615cf5b3edf1b7,2024-11-21T02:13:54.590000 CVE-2014-6175,0,0,b35006e20b94a576cca741ef414dbc84820e7806545e6e6d4d19bda16a612d54,2015-06-08T18:06:35.770000 -CVE-2014-6176,0,0,6f60167c55886b82793562a8a41cfd09f05dd81481f8d00eed4c07947c5da73f,2017-09-08T01:29:11.480000 -CVE-2014-6177,0,0,e05af83a91427b4fe693a370a0bb2809218f5e5c66466e5911865a59a50cd1af,2017-09-08T01:29:11.527000 -CVE-2014-6178,0,0,6a0e738af02c59507f6b0345956d92c7d31412c41266848309cccc021c3a2d86,2017-09-08T01:29:11.590000 -CVE-2014-6179,0,0,80bb439144d10836584f1331cdc43d6ece623a69edd14e336eacba8db3478e8b,2017-09-08T01:29:11.653000 -CVE-2014-6180,0,0,ba2795f04220bae4d2f27836732fc13e0bba8914099ea3dff936adeb1bf686e7,2017-09-08T01:29:11.700000 -CVE-2014-6181,0,0,9452d2b405667ee5eae19d0251f0108056102ca7bf7e10c24fbaa4417c9c88d9,2017-09-08T01:29:11.747000 -CVE-2014-6182,0,0,d70e04a6279c367ef519c9fef296c0c31cdae55296a4eaf0234a88416139869a,2017-09-08T01:29:11.807000 -CVE-2014-6183,0,0,990df892bda7d9952891c1395f574392539e96bfb7e7d410312603b649f05924,2017-09-08T01:29:11.873000 -CVE-2014-6184,0,0,ed0a6650e99b54700d5342930a7906cf494989239adf6aa92462ca030df9a4c1,2021-09-08T17:19:30.890000 -CVE-2014-6185,0,0,ec9891cda799d205befb89b7055970857479607817bd4285822aaed2edad8c09,2017-09-08T01:29:11.933000 -CVE-2014-6186,0,0,ceec79de3e76fca1793fc8311bb290779cb08275a7b30755c3e94213a62c46f0,2017-09-08T01:29:11.980000 -CVE-2014-6187,0,0,d462f91e3910a92da27d6808c6a26aed5d63f4505b150b6b4b99b9ae452e0afc,2017-09-08T01:29:12.043000 -CVE-2014-6188,0,0,0923b4ff4fc1aef91e1caa8206436314b225b9c8773343698cbb02b477d9573b,2017-09-08T01:29:12.107000 +CVE-2014-6176,0,1,8f335d3901a3450d04ed0eef5edde30386a2680cfcb67a1caf3c4edeb028c3af,2024-11-21T02:13:54.847000 +CVE-2014-6177,0,1,67f8fadbcad12df9e4ec05bba013bf76747876fc3eefad711e910cd957e8749c,2024-11-21T02:13:54.977000 +CVE-2014-6178,0,1,9fa430d244e2173edd6ca95d9cc5af494582b3cd3d41e507a6ab7313b363ad6a,2024-11-21T02:13:55.103000 +CVE-2014-6179,0,1,207bd69472069d4fd8d614706399b738a6aa794c7eb5e62b3b00855a9fba67bf,2024-11-21T02:13:55.240000 +CVE-2014-6180,0,1,7b90101cc5c19128b12f8d36b479c15ec40b39ca633eeeec72412c9df7567b7c,2024-11-21T02:13:55.370000 +CVE-2014-6181,0,1,fa9149c07cf51f29e3d6c4ebc20e232a1f47caa2d26ec71081b82f7dc000df2e,2024-11-21T02:13:55.487000 +CVE-2014-6182,0,1,19296e2636dcd595342b9da8eed0014a7f49a3f42e55942d57cacb452178f7fb,2024-11-21T02:13:55.603000 +CVE-2014-6183,0,1,9aa961b3586e605bef3830459e174cab6ebbee11ad3913205ce674dae391e63e,2024-11-21T02:13:55.713000 +CVE-2014-6184,0,1,7e2da637b8c2a8714ff91eed7ccdfc77a0bb968c45481b6587879f2f3dc76058,2024-11-21T02:13:55.840000 +CVE-2014-6185,0,1,39cc2d494d9c32ba61b46f9bbbf621aac997658659fe343730cc954f52ccdf09,2024-11-21T02:13:55.960000 +CVE-2014-6186,0,1,96197fbbe7836c71d0d6c66ae615bf96c95d2a6d2a496b57baa102f3532dc2e7,2024-11-21T02:13:56.087000 +CVE-2014-6187,0,1,53d4754e3ca9ae37cf217ec554805450bc8479382cf50ead142aa984cb7cb019,2024-11-21T02:13:56.207000 +CVE-2014-6188,0,1,30067dc37974609511ab1e6423f43426bace05476576a934d23bd3bda734e7ff,2024-11-21T02:13:56.333000 CVE-2014-6189,0,0,7fb8972317891275d25ffdd60df97d333b49bacd87d27bc42b3c32b266c8c024,2017-08-25T18:35:24.947000 -CVE-2014-6190,0,0,9cce522796d175f0c5d1395d016019cc708c057996ae9d114d1633a726b7c800,2015-05-26T17:54:58.273000 +CVE-2014-6190,0,1,737fcd526601dfe1fc3a829ba2d5e4ff26b6fd3c798b4e63535995ba855ae43f,2024-11-21T02:13:56.590000 CVE-2014-6191,0,0,69c7fd128ce917f9b79067cd79f4981fdd49ed910f93eb99c2a5266eb78e0d2f,2017-09-23T14:45:04.827000 -CVE-2014-6192,0,0,2ffb5ab08dfa6098d7d86e3328930258ad8dd97acd23d3357df61112250d0a50,2015-05-26T17:05:02.343000 -CVE-2014-6193,0,0,df7a52f3af036d04faa69b78f604ab87a8703b01e9b3694f4639f1904e556da1,2017-09-08T01:29:12.153000 -CVE-2014-6194,0,0,1cfbcd91dcd3bfd152c2c804001472744f77f9a2d6bc5937a8dcea246f798126,2017-09-08T01:29:12.217000 -CVE-2014-6195,0,0,17f58b199da4b13f4a13537ae2d4720c503ea7c8f221e944eb1e76fcd1fd5550,2023-02-14T15:51:38.987000 -CVE-2014-6196,0,0,baf07564619ae386c159a7eaa62f0083af19da32598b88cf8b2684a4dd952c58,2017-09-08T01:29:12.357000 -CVE-2014-6197,0,0,466d98ec88abdc2605d398079fc9e263c985c26217d61825d59ed20d67f92a8b,2017-09-08T01:29:12.417000 +CVE-2014-6192,0,1,f199e51ab94b00bc31b92599961e0d3dddc954c75a675a70e444f3b6a28d05cd,2024-11-21T02:13:56.833000 +CVE-2014-6193,0,1,55c8df4041636b3c20d5811958e9fb8af8c3a8437c57401bd8eaa9f68766c898,2024-11-21T02:13:56.957000 +CVE-2014-6194,0,1,f8c236655e68351e17b0ef46b704a95b28c43d039e446f4ce95045a227686f09,2024-11-21T02:13:57.083000 +CVE-2014-6195,0,1,f22e0bf243a9ead70bbcf98392e8273a2a2458e07b7156a367944b7a7f0f78d4,2024-11-21T02:13:57.220000 +CVE-2014-6196,0,1,14f2e114b4a3f15cd3a7ae7c4086b1b13b6bec8fc2bd19d3ea1f613fb78c023a,2024-11-21T02:13:57.363000 +CVE-2014-6197,0,1,cd3f9b4698e53d683699371d449062a34e31e3e3502ec892bc077221d33c17fb,2024-11-21T02:13:57.500000 CVE-2014-6198,0,0,1d33c638a3ae2e8bd097a6e7a2bc68f216558f42357512026eb829e10c57bab8,2017-09-23T01:29:00.217000 -CVE-2014-6199,0,0,90104d02dfd82d305da3ce5db1218c96606374cd55f40664c9fac16579425764,2017-09-08T01:29:12.480000 -CVE-2014-6209,0,0,52f639d0c7502555ba7ab79f9a8ea0ea447d0512e1f57383bdf04f157be0e774,2018-09-27T10:29:00.400000 -CVE-2014-6210,0,0,ce293880d5cc403df30e1f6a5eef93c07011c7fd08e6f14dbb8787ff8146baaf,2018-09-27T10:29:01.293000 -CVE-2014-6211,0,0,cbe2de70e7a378a6c42729d409c3ab609c42d293b93a6d25036f6351c6f7ea86,2019-09-30T16:19:41.927000 -CVE-2014-6212,0,0,c18a69f5346191a731f9ca6a45c1545a5d4108a987de8d122b4a9b94c17675e8,2017-09-08T01:29:12.667000 -CVE-2014-6214,0,0,b8bdf8a5ff5db562945f21bb9c7b12dfd93bd6886c05000648e32dd732b6d1dc,2015-08-11T17:51:33.083000 -CVE-2014-6215,0,0,8b62ac44c400068fd0b040933c66e1018dbfbb8922d8563c0b0c54afd564e081,2017-09-08T01:29:12.730000 -CVE-2014-6221,0,0,1135b333cd28b8a036033628455217c89f1c72c4e9f5319bc1897095155fffc0,2016-11-28T19:12:44.187000 +CVE-2014-6199,0,1,33eb60cf6f9e11381f7bcebd656984e63f328433be94fb3bac901b312f1f0d22,2024-11-21T02:13:57.747000 +CVE-2014-6209,0,1,72c5d4cbb81d85f91decf245f05fb54b467f46950e96d5c346c51427ca9c4227,2024-11-21T02:13:57.873000 +CVE-2014-6210,0,1,9341ae157c85729d707d9c4d1109dc9fb1f6fee4fdb67ca664a05ee91bd15a3c,2024-11-21T02:13:58.007000 +CVE-2014-6211,0,1,393a48cc0e3b9ad39c39a98b0bd5baa41b8e7cef46731c0c0678b964600f4df6,2024-11-21T02:13:58.123000 +CVE-2014-6212,0,1,1692f5d5faf8bf674121e08c83aacedb8eb71e04e5317f5fbdb9db416990207f,2024-11-21T02:13:58.247000 +CVE-2014-6214,0,1,ffa65288db40de6164c9e2b7e89a2d5977ca0cfd962d6da1b51f62249014f3d9,2024-11-21T02:13:58.380000 +CVE-2014-6215,0,1,43fa82baaff516812cc21ecbe0335939f1bed66dee5bbe04c84e4bdacf78efab,2024-11-21T02:13:58.510000 +CVE-2014-6221,0,1,d7fb99fcc0eef25088d64ff0290e068fa44d56ec05a60c98805ff6b61b2cc140,2024-11-21T02:13:58.633000 CVE-2014-6222,0,0,c6446c1965d177d169075fdd9eba49220e8806daab3822c0814eb91bd3b21841,2015-06-08T18:37:35.587000 -CVE-2014-6228,0,0,a3453d1ebbf4a02dcda165ddd14d86b8dd11d4acd48d62ab260b0464f51605cd,2014-12-30T15:34:11.723000 -CVE-2014-6229,0,0,1fd0249776bc6a7c92673370d20eed21f086332ff3e1553412ca5c8748ea5c21,2014-12-30T15:34:41.053000 -CVE-2014-6230,0,0,d29c6f01acc87e04d744e6b97314f19aa5423e27607bd9a8283c2ccb47b0e625,2022-12-23T14:32:44.107000 -CVE-2014-6231,0,0,bfd157887ea6e270834a55b3df84adda85ac2125f93f719df9792906e9b247a8,2017-09-08T01:29:12.793000 -CVE-2014-6232,0,0,3fda8de7964f8da8eb43906751a189e9d50695e29c22eecfc4a87bd13d2e5a7e,2017-09-08T01:29:12.857000 -CVE-2014-6233,0,0,9401a89aa227a81ebeca66caf310c26f84281955f2bf7b4f0d2a0bf6cecb1d2c,2017-09-08T01:29:12.917000 -CVE-2014-6234,0,0,1e82a7efad41f69cb3a5ff60dff49d6a8ecd05c85744586c7a83f64062b48680,2017-09-08T01:29:12.967000 -CVE-2014-6235,0,0,7a6b3aad4ff73cc26691e2b5d30d49766a986c94f0e705130c85530b8dd01171,2017-09-08T01:29:13.027000 -CVE-2014-6236,0,0,423ca8ff0f5f4513b0326e6ef9e5d1b1d1891bef1f10cbef5e1902901fc9e96a,2017-09-08T01:29:13.073000 -CVE-2014-6237,0,0,33d8880d9dafe909c98f00f226603f8a99ac53bfdd725b0e19d43f1ba54e298d,2017-09-08T01:29:13.137000 -CVE-2014-6238,0,0,1a2030e41b41dfe66f529231584e4a008c1fc4704246ea7de756bc77bf5c2870,2017-09-08T01:29:13.183000 -CVE-2014-6239,0,0,7ba8fbe2cd4a54ad0e7f990e40798d47e057cd3d75f000114343aefcefdaae0d,2014-09-11T19:48:15.473000 -CVE-2014-6240,0,0,7abc3513f571fdd2d674b23ac19467a46109cf35e784026eb49fc2db81c8909a,2014-09-11T17:06:34.047000 -CVE-2014-6241,0,0,48d17871b45c0189625c387e535425f53ccda9bc36995afdc49dd924c9fac2f0,2017-09-08T01:29:13.247000 -CVE-2014-6242,0,0,d6205a90d0e8eb9e16f272752dd4295ce3cf20a37c69f1d888f0b2e76d27102a,2018-10-09T19:50:22.537000 -CVE-2014-6243,0,0,858cd8c762ac997da85978b8ed2d347d83f261d435383588a1bab1e8d69379fb,2018-10-09T19:50:23.443000 -CVE-2014-6251,0,0,e390ac7f171bd374679232a6ac4aff9bc4dba8961ebf949dd1c1e9b1aea53698,2014-10-27T15:04:17.327000 -CVE-2014-6252,0,0,c4e3d0c26f3960d8b90b48d01ca7e103391a130883ba4b3fa4f40ca10980d3a2,2018-12-10T19:29:04.390000 -CVE-2014-6253,0,0,eba24348f0c375ce42539417788dfdf5cdcfd9329a3970fc452f12f7bb276f73,2016-03-21T13:16:08.370000 -CVE-2014-6254,0,0,af509c3409626c8046c39f1cc8fb572ac85fbb691b327b78d7b4c6812eea309d,2014-12-16T14:06:13.617000 -CVE-2014-6255,0,0,e65e4317dbf5f4265fb8d9e0f32b99e6dc46e58c957c1a334a535d09f5eceb71,2016-03-21T15:43:37.927000 -CVE-2014-6256,0,0,becece87e90e5937217a6c81fbea387a18fa7e2652f400920499f12410a6776b,2016-03-21T15:44:57.293000 -CVE-2014-6257,0,0,ebca3ea34e114764a2dea2ef0acdee5089cef525caa053d111bcb37415f285c8,2016-03-21T15:51:08.240000 -CVE-2014-6258,0,0,5b4cd2a983b0288e7ddd54d1c650794a09591cfa4d0a7d1be40f8f69137693fc,2016-03-21T15:58:24.537000 -CVE-2014-6259,0,0,d9afe74eacc89346166231246652df8a9cec2f07738df08e12631fd54c3830ff,2016-03-21T15:59:22.187000 -CVE-2014-6260,0,0,af548d6ed7631fb6dd4f6cb040cce4f6f9e4ee2fcc68c7349a0edd43027a9606,2016-03-21T16:00:20.787000 -CVE-2014-6261,0,0,4cd305d2984e606d86aaf9517b768510acad421e974d09ef5c0ed8c6e162e016,2016-03-21T16:01:15.387000 +CVE-2014-6228,0,1,3d4d8952f5c74b31c511b5f1e2536322ff5af1298e812abd628a8dcd60ba16d2,2024-11-21T02:13:59.183000 +CVE-2014-6229,0,1,3fcd2e3feaa02c4e075c8d2fe677de1cc4689cd82d3ccd5eb048532514274c39,2024-11-21T02:13:59.330000 +CVE-2014-6230,0,1,8234be492856f4eaa6509a245fd35c7fc51893d60a85e10832a6fbcd292a9a62,2024-11-21T02:13:59.463000 +CVE-2014-6231,0,1,58676e5c95f2b31029c2b545a9eb42685db22ad3b8d73cf4978ecd338ee242e0,2024-11-21T02:13:59.613000 +CVE-2014-6232,0,1,ac0b4d82592bc52ee85652802099d51cfca3a74f4be3e98435e15c6536c37802,2024-11-21T02:13:59.750000 +CVE-2014-6233,0,1,a0d28eed3e20ca93e8f07c20025ab60085ca5b782e70e12e2bb36beca020fbdd,2024-11-21T02:13:59.887000 +CVE-2014-6234,0,1,e6fff492b715d91db1590a92a0aea26b101e924e1aaadc9d5447ec249c439a56,2024-11-21T02:14:00.027000 +CVE-2014-6235,0,1,34389e8424df1d7ef920a69477df2b417097bcfd5191c08a0365ef874b43f6b5,2024-11-21T02:14:00.170000 +CVE-2014-6236,0,1,50b64a058b814935d8c2f73a8310e9f33c8e12176651c9eec36dd8711b630bcb,2024-11-21T02:14:00.323000 +CVE-2014-6237,0,1,0c9c3b802254c759e76048871d5bd3fd9f99d8bb97340eb8b875964fad44446f,2024-11-21T02:14:00.470000 +CVE-2014-6238,0,1,ca9aee7c45f0b26170f4d63482a0b7f80af69ba80e7af189310d7f8754780207,2024-11-21T02:14:00.610000 +CVE-2014-6239,0,1,649e962ce1b9826476781a86b892b749fe82418204f9388ceaa759b353b05472,2024-11-21T02:14:00.753000 +CVE-2014-6240,0,1,247423ed612fde5714bbc3eb3f6ed944661435702536e7ceda3e2d88f7157d0f,2024-11-21T02:14:00.900000 +CVE-2014-6241,0,1,7236e7c6b076d243ae4b0855c77de1b1499297057ea26dd97131b0781e195c8c,2024-11-21T02:14:01.047000 +CVE-2014-6242,0,1,826c61b5451a6a3ab7c785f547d35853c279bc2f9ae4f17179ac7428a8825d7e,2024-11-21T02:14:01.193000 +CVE-2014-6243,0,1,27fc455abfeed766c110a23a7a2c26a650a1458f72f017bca0bf47c3f80a4dbd,2024-11-21T02:14:01.347000 +CVE-2014-6251,0,1,973b6326f877619054b4b19e57e295b9ba8ee9d9355f8a733762cd983652d281,2024-11-21T02:14:01.490000 +CVE-2014-6252,0,1,b5e0342ceb892455d533dc87f1242ccd96a612c0220b68f87c645119c2f8e5ee,2024-11-21T02:14:01.630000 +CVE-2014-6253,0,1,0226f8c50ef7485d4a7a851553f46d719f8592efa03742e3a494e372628fe74d,2024-11-21T02:14:01.783000 +CVE-2014-6254,0,1,16697ebc327fc1e0596176315665fc25bf5a6d77c2bb01f75dec91f7404e411a,2024-11-21T02:14:01.930000 +CVE-2014-6255,0,1,1e287831cd028024dccb64edc6291c3d55ac8a9b2fa7e55087ae9124d1241216,2024-11-21T02:14:02.077000 +CVE-2014-6256,0,1,73d24ca22a9168490af676c13c31d184b7bcc839cb5d6afccb8c3f5e15802d5e,2024-11-21T02:14:02.233000 +CVE-2014-6257,0,1,f5dda97502e7971801b44f53ac9cde1cad5f471fc194fa64939b93aebc5af8c6,2024-11-21T02:14:02.407000 +CVE-2014-6258,0,1,fde4360032dc1ae77bb25cb90625a7f9e6956732bb22a7ef846965dbe3cfd978,2024-11-21T02:14:02.557000 +CVE-2014-6259,0,1,ab3991eca6ae5138b138796c6239b40c9ff2be96b85e9bd15258fd3191dcf2f3,2024-11-21T02:14:02.710000 +CVE-2014-6260,0,1,4bc089eac1cd92a08e46f60d506732411f6f9e85ca67f40ade20a7f48cab7639,2024-11-21T02:14:02.900000 +CVE-2014-6261,0,1,8c739d78f557355e725e19f2174f4fca1174379f40ea2c5a3ca05fa95a0dfd5d,2024-11-21T02:14:03.060000 CVE-2014-6262,0,0,4d73990cd060477b0944624d0fb1da8c79795795a7b1e1932de3e5ab3f7c91c2,2022-01-01T19:51:42.883000 -CVE-2014-6268,0,0,071365316c103e56c6d74b542de9a53359a955fd9d3bd342e4e23e7f05b38a5e,2017-09-08T01:29:13.433000 -CVE-2014-6269,0,0,e0669194de11c5823379ee9d4b339e9c2faf5ff5d8e1c5447451d7c99d4a3f78,2023-11-07T02:20:57.473000 -CVE-2014-6270,0,0,97a9e3424b41e596b5dd3c54341de8bcc330a39e4d465ad3dddd838cc96be40c,2017-09-08T01:29:13.510000 -CVE-2014-6271,0,0,9a4f8618549eaa54022872ec7700bdca1f6ee0b2e1c183fca44c1c77ef2aa9ee,2024-07-24T16:47:47.667000 +CVE-2014-6268,0,1,a4496332920c1037afd3e8cf30d6545aa8a94f02823861f647da0765f77f4519,2024-11-21T02:14:03.390000 +CVE-2014-6269,0,1,ee01ab600f3c59814d9a36b700ed54fc060c491336b1196abf326f3bbea78711,2024-11-21T02:14:03.530000 +CVE-2014-6270,0,1,ab110cb33ef9ac39645e851a009cd7e5812e135930668db8380c283499891767,2024-11-21T02:14:03.690000 +CVE-2014-6271,0,1,c1adb704553eafc5a5b31ad3b113935902d9a2235b7f06b9b14c6531d6409321,2024-11-21T02:14:03.873000 CVE-2014-6272,0,0,4f6aa02a84a1fdfa6a8c7961080b5c230814a1eaa52ed9f7f4221d26e18efb3f,2017-12-09T02:29:03.687000 -CVE-2014-6273,0,0,8d9e21493226ddc6cceffec2eb04b105fcf2c517aa2126add0a29fbbae6a407f,2020-01-08T15:22:40.690000 +CVE-2014-6273,0,1,6cd6878e88a4668cab85dde309dc217a0550786dd2e2a690e315ab214ec57a1b,2024-11-21T02:14:04.503000 CVE-2014-6275,0,0,d9772520db18162781d8d9f0f1d8081d1b5ef8cded4300f34c5eff374aa212ad,2020-01-14T17:38:38.020000 CVE-2014-6276,0,0,4bbdc109314e1f63e63b87bd4226a430c51970d3cfa141d078600b05e1d95623,2016-04-20T17:24:22.203000 -CVE-2014-6277,0,0,26b5376a5c8a9da59b0be340e3250ea7d2e409bf535b413ccc4d0ce1c9533e3a,2018-08-09T01:29:01.437000 +CVE-2014-6277,0,1,0a65cb674dcc6513ea32395ae8ba546c08ebe38bc4b5c880524d6206c2e6893d,2024-11-21T02:14:04.890000 CVE-2014-62771,0,0,5a153fa2bfd5c0c7ee05a6852cedffa8c632e4daff5c8cd6077970b3b799f6c7,2023-11-07T02:20:55.980000 -CVE-2014-6278,0,0,a93d545332477bb41ca5d55e4a9ca1258fbfb07d94c5db34313327fe75f1c0d6,2021-11-17T22:15:36.700000 -CVE-2014-6280,0,0,9ba8792247c5491bc09dd450e95a11046a8fc7853333a027384002b4c841ce21,2018-10-09T19:51:20.630000 -CVE-2014-6283,0,0,1d1ab3ab2f8de9888dcd67244dd4dc036578b32fcb023a5abb26bbf19c551364,2017-09-08T01:29:13.793000 +CVE-2014-6278,0,1,e8619119e819dd63504ff6c97cb6d5bae47f83897edf96f75e7aebd38baa8d9e,2024-11-21T02:14:05.110000 +CVE-2014-6280,0,1,c139f4c4bfb4b51f2875e4529a552dc2f2011a0b33012e1763613bbade045ea2,2024-11-21T02:14:05.347000 +CVE-2014-6283,0,1,1737691f5e65f75fd2ad376c65c13d5a805583db46a1bb1b51143b98d6a60d26,2024-11-21T02:14:05.500000 CVE-2014-6284,0,0,ca3bd97457aa6da49c335daeb9a2ac40e54333257423f9182823880a68d4b49b,2015-06-09T15:48:56.567000 -CVE-2014-6287,0,0,743a52c69f88e06604dd04870e5816634c1cba62b22899d285743f39fe1cd7d3,2021-02-26T21:56:10.323000 -CVE-2014-6288,0,0,d5e92ae6b9ddd1d9954427f836bc9c09669a2592d6ff0c1aea240377f5cda407,2014-10-10T05:24:48.333000 -CVE-2014-6289,0,0,8f7439822b5e9d72450413629264bf9eb82babf656297a2ee4cca38d792dd9c9,2014-10-06T17:22:35.360000 -CVE-2014-6290,0,0,a99464e42f9c79198968abbea0f9231800fb4cec8ef332f9ae1740d04a3d9f7b,2014-10-06T16:26:18.797000 -CVE-2014-6291,0,0,f7de98a01ee8368eca79fe0cfef33b40fba5a104d7477595791a3779c812e3ee,2017-09-08T01:29:13.857000 -CVE-2014-6292,0,0,35820020740e2acd42838d045b3d1c772c9f985b146b2216bef031c448d1f401,2022-02-03T19:31:36.170000 -CVE-2014-6293,0,0,a7d6eb8bb0eea95adc7e98b886578114cf4b990561ab8b36d6c63893175d2ce4,2014-10-06T17:39:53.623000 -CVE-2014-6294,0,0,79837fb1de958ffc45ad612e0f50933621d5e0b5f2a7c82bb1eb37833b7cafe8,2014-10-06T17:46:49.057000 -CVE-2014-6295,0,0,de46c2f0538604edeb8482474afeb30133c62ed96183afd666c3e31bb09f450c,2014-10-06T17:46:45.557000 -CVE-2014-6296,0,0,525c2a64b6bdb70442be8401df9294a9e49a7946d9ec4623b93404e8807e720a,2014-10-06T17:46:56.337000 -CVE-2014-6297,0,0,63d37fc7d240bce2a2fd7206fe7e2836bc5cb9cb12a89e5fded485e0380cbc0e,2014-10-06T17:09:21.373000 -CVE-2014-6298,0,0,57e67385271dff233e622f6cc2c1ff5f248335149c90523a4478f7a6e458d183,2014-10-06T17:09:01.153000 -CVE-2014-6299,0,0,07d4500da387b8763b856b417c6b68f503299990ea54568fa76587d670d7391f,2014-10-06T18:02:49.170000 -CVE-2014-6300,0,0,f862fa11df90238f572372befeeb6f044e415c5783bcbfcf465cda273b18f46d,2018-10-30T16:27:34.687000 -CVE-2014-6301,0,0,da265ac976e2d24481398bf316be0e234f4d69f8b2b682eb74e84f264ffecb55,2015-02-19T18:52:49.143000 -CVE-2014-6302,0,0,c1e86079bd3ff8a344f0ab188e28057349db0f3dcd910cec3f88498a235f1998,2015-02-19T18:53:16.237000 -CVE-2014-6303,0,0,198ae3fc0ef8aee020adabea3780a4731f99364208008576959edf58309467ef,2015-02-19T18:53:54 -CVE-2014-6304,0,0,b15c9e32f622372f423da499198bb07411a595b0dcbdb4ed709c792497bddf3d,2015-02-19T18:54:17.407000 -CVE-2014-6308,0,0,4c1017b18c4cfa70313958a8f217e31b98b6605eeeabf45dda5a064e609a4399,2018-10-09T19:51:21.007000 +CVE-2014-6287,0,1,36f4b527a83d1af026392cf4f1ccce76cbcf052d465bdcdcf04e276cf7e16b20,2024-11-21T02:14:05.803000 +CVE-2014-6288,0,1,c93491fa385555a27ea2c8f9100900334955997983e39e4682d7b02805e1641c,2024-11-21T02:14:05.970000 +CVE-2014-6289,0,1,5544d1d0f66f2b2e08a32abf49bd9560401266235d2d8c30a82c688ce0328250,2024-11-21T02:14:06.130000 +CVE-2014-6290,0,1,316526d1236f339652ab05ef73e4eabbc0c38e3b4530a6ff5b6089d9075e3806,2024-11-21T02:14:06.280000 +CVE-2014-6291,0,1,2b4740e2ad67dc27e8f12d31e025c380621f26ba62ce0110ac1547ee72fbff8d,2024-11-21T02:14:06.420000 +CVE-2014-6292,0,1,0badb73ac9e1673ea7edbbf3d7afe6b842eca7eda3d47b131db12504b4b7a045,2024-11-21T02:14:06.567000 +CVE-2014-6293,0,1,b00648bdf78483bf4ba2439560af6b80347fd897999cabf65402d9118297d436,2024-11-21T02:14:06.737000 +CVE-2014-6294,0,1,25becfc07291b4bf548699b74af222f5fcc73ea384d779766a52d0f47aaf639a,2024-11-21T02:14:06.883000 +CVE-2014-6295,0,1,b0a690c49b11c38e4403d67a9f1e4cca388cc7cf453c1cfa044153e4879b2db6,2024-11-21T02:14:07.040000 +CVE-2014-6296,0,1,7e537f17c5679efa111b34e85c6e46f2fc458669f65d27162dc4a71b059a7868,2024-11-21T02:14:07.200000 +CVE-2014-6297,0,1,9b523963d65b20e5e4a6bf6536ab85e093c2646a4e360814247632610885f787,2024-11-21T02:14:07.370000 +CVE-2014-6298,0,1,51d18273609fbda42c17a3b56c22057f46ca3d702a9163c0555b1c89b8db6b5e,2024-11-21T02:14:07.537000 +CVE-2014-6299,0,1,7a1733bcdf071f303cea65edb424b67358197b083a14e3f3b009ee4987ed8cb7,2024-11-21T02:14:07.703000 +CVE-2014-6300,0,1,0473e4a3f240d415c570bd31bce3598f7178be299879ef5b3c90966ded3e363f,2024-11-21T02:14:07.877000 +CVE-2014-6301,0,1,372850a03269bb3f193377cf19cf9277fc7e61290944f221951763c694935150,2024-11-21T02:14:08.073000 +CVE-2014-6302,0,1,4cc6c3b585331a0feaae155b418e9336a04bcf99d9afc5156bb887db9091e06a,2024-11-21T02:14:08.230000 +CVE-2014-6303,0,1,ba7f138e4e2061d64845c6f2c443fd7723af32fc5b8ac59cf2c0f79f4dc1b24a,2024-11-21T02:14:08.373000 +CVE-2014-6304,0,1,ce2cd2d2f02303b410cc649296c6c73910355aaec85ebe74438bb7b7e52f07f7,2024-11-21T02:14:08.517000 +CVE-2014-6308,0,1,26d96fd4c30325880eebf46aa7c34eb909607ca56e4574d9ee14c8a2fda875ca,2024-11-21T02:14:08.667000 CVE-2014-6309,0,0,73da654cd9295022c16d818154ba411020a6fd4265c5992954afc2f4d2d55686,2021-04-21T19:07:40.627000 CVE-2014-6310,0,0,7400ee2a4748f98eeac63530c4704bac4370af393021f0c5380ddd44cadbd154,2020-08-18T15:05:57.937000 CVE-2014-6311,0,0,5838678022361a264cd6eafd57acffb5c72b102cb8e30ac12dbf244d8d2f2862,2020-08-18T15:05:57.813000 -CVE-2014-6312,0,0,97f31555983809565def2f987dca88b0db4f010ee54bf447e1937f2467bc7c55,2014-10-22T17:33:23.453000 -CVE-2014-6313,0,0,bcc97718f775435eb2e17434a6b13795e09c2062a9230f3cd286c01ead59a9b4,2014-10-22T14:58:22.163000 -CVE-2014-6315,0,0,26fa51a7dfc8271f7fa9e14844ce46f71369f39bbd0a71b5bdc1f09457918ec9,2018-10-09T19:51:21.457000 -CVE-2014-6316,0,0,77e3f27f55aaaab8dcbaa1c20d60d6f1980c1a6fca542ba0762788d78d4d1c16,2017-09-08T01:29:13.967000 -CVE-2014-6317,0,0,bf2376db87d53aebc01b4239dfa239f9e3855249239fb9f49a544a104e44e66f,2019-05-15T13:17:20.077000 -CVE-2014-6318,0,0,5a67899de7f02fc4d1ab1dc1d4984e2734cfa4de599e1514cbd98ec58770fd9e,2019-05-14T14:11:33.293000 -CVE-2014-6319,0,0,7cc59d3becd8b8a956f0402fc3c6941482f0f219af7ae5a4881da501830b2a25,2018-10-12T22:07:31.253000 +CVE-2014-6312,0,1,8f9e4aadb58da01c33a0c774134fe0aebe4fe6e60ec455ca9d98c0387745827c,2024-11-21T02:14:09.277000 +CVE-2014-6313,0,1,728d4c0fea931a12c2fb3ab80d5347a575594f83ab8b52ca87a1a937a8aac696,2024-11-21T02:14:09.413000 +CVE-2014-6315,0,1,c4259b132d31095a8cb4297e6bb47450ebbe63d1c38b38870f2fdf7e7a519488,2024-11-21T02:14:09.573000 +CVE-2014-6316,0,1,d6b1542b4538b07335d659e45b6825adcca4d6f78d98f80d314b2e640533af48,2024-11-21T02:14:09.730000 +CVE-2014-6317,0,1,8b8a2a04ce61bdbd7a7d0e796ae15349572dfa95640465b47bd8a2e68d12ebab,2024-11-21T02:14:09.887000 +CVE-2014-6318,0,1,011d7e182a57913b2c4dda22dd8bbd87da6fbee9e639c0e0abe4107c2868db27,2024-11-21T02:14:10 +CVE-2014-6319,0,1,8a1bb1635059f915b06b18d3a39f5ea8f4d3c5a47e2b10e0d6b73db10302b707,2024-11-21T02:14:10.120000 CVE-2014-6320,0,0,76c8f77996b730bdeae8e4ba8b6ebff8725d5257f572553a82807cde78b3c641,2023-11-07T02:20:58.380000 -CVE-2014-6321,0,0,6128afb10379e884a02c7d71daaca130d09a3a59cdaa12dc3ca58f59da0bd734,2019-10-09T23:11:27.700000 -CVE-2014-6322,0,0,10d7429b214197002d4d6866c8c1a6b8828c9be9f3e7f53b7a23780777ee58fb,2019-05-15T13:22:02.440000 -CVE-2014-6323,0,0,f603844aa317d8ee5a7bb4f0fb882b550544464e3122d682717f778ef7916032,2018-10-12T22:07:32.723000 -CVE-2014-6324,0,0,357f076aa58686ecc2b31395957e64aedf446efd6c1519fa39547c3d9a38ac15,2024-07-16T17:48:24.083000 -CVE-2014-6325,0,0,98ccb9d0371d31f66267172cb97bda70bf0320bb6abb65c1fa187f00b274eee3,2018-10-12T22:07:33.787000 -CVE-2014-6326,0,0,89190d4f5c96029ababbbf7b16e7014e83c2b02586109fac6793f469878003f4,2018-10-12T22:07:33.957000 -CVE-2014-6327,0,0,af48424d091a80d0aa30f1a0c8812a16401fdca928cee2d463ae605152975a46,2018-10-12T22:07:34.097000 -CVE-2014-6328,0,0,bb861d0edfb7b3dc7dab3894b0cfd64d92139e5bd4d1416ff196519e768ac742,2018-10-12T22:07:34.287000 -CVE-2014-6329,0,0,7cc752c6f0869db68beb35e85e751ca129cb610a45d13510d4e978b8025203d6,2018-10-12T22:07:34.427000 -CVE-2014-6330,0,0,827ba0bdfd62f4524cde435112c59c5dbfbe893ff7bdfa98df5e7cd38510594d,2018-10-12T22:07:34.583000 -CVE-2014-6331,0,0,a3b7c5a0bcc50b55d7965580f1da44b76ac2b92ce579422ce02f300ea23d8452,2018-10-12T22:07:34.770000 -CVE-2014-6332,0,0,7a227c670135625ee2824f567c9e045442a5ee043b1510f59784c11e73185f67,2019-05-15T13:30:56.027000 -CVE-2014-6333,0,0,2ab98eddf68c663440a4c6839ad3cbc11e3eaa5bee07b9348599c9b9dd7ce4a2,2018-10-12T22:07:36.957000 -CVE-2014-6334,0,0,c3df22f3e4ceb98b1ac6fe801affa5b1dbbd2a14a49a89d66c9b46188569937e,2018-10-12T22:07:37.363000 -CVE-2014-6335,0,0,a2304a32a57ae3866d98359d1185caee4b8dd867f074679656dd1e8c7ef046df,2018-10-12T22:07:37.770000 -CVE-2014-6336,0,0,e3ced40e907fe10cb92d776ea36a9340bb8852e9df38486bdc3879de2718bce7,2018-10-12T22:07:38.207000 -CVE-2014-6337,0,0,152b5f78bd5a2889ec61b20b7574e57f5f1ffa3cbd5c34c916f20d2b1fe653bb,2018-10-12T22:07:38.410000 +CVE-2014-6321,0,1,7b7f4fe440f8658b482b31670373390160027ec8cb78dccf8ab0f34f4f7417ab,2024-11-21T02:14:10.253000 +CVE-2014-6322,0,1,c6ffe77338f0b8ff085d9a53294ee0c0a6a1ffdc8ac57a4d5d0a7c58d230ca1f,2024-11-21T02:14:10.390000 +CVE-2014-6323,0,1,818d52e80627a9bdb9342c211dfec301c16d211bfe74167812152e16152551b9,2024-11-21T02:14:10.513000 +CVE-2014-6324,0,1,c2e7883c0816606c098db54f38e458e2523878b049c31bc0a1a6b06c4310ffa7,2024-11-21T02:14:10.637000 +CVE-2014-6325,0,1,5e155841cc522f940fa446faf3705f90ba8d688889ae0270e52d6c7790ecdf63,2024-11-21T02:14:10.773000 +CVE-2014-6326,0,1,b9c5bdf2918c1b45a3547766ec2ed79a3e27a39f41ec7c54e9fdab684cbcbaeb,2024-11-21T02:14:10.883000 +CVE-2014-6327,0,1,45da9f4e3a96fad1b8a46423b5e530b337eb88c9042089be5024c249be412560,2024-11-21T02:14:10.997000 +CVE-2014-6328,0,1,e69ec51fb4bf6f9d08f927577d9c7db3b1b6043c75d7c5c4b4e596022203658f,2024-11-21T02:14:11.103000 +CVE-2014-6329,0,1,8468d477ee72bf302c081b3063e597686dc3394492ba362acb5b75bdc6de6798,2024-11-21T02:14:11.210000 +CVE-2014-6330,0,1,30e07480455b58cf8c53f16449d86e33911ab6cf937d024a2a2a531d8faca3f8,2024-11-21T02:14:11.330000 +CVE-2014-6331,0,1,b55f0e4bcb8701107bc1b54e500854c2002d0ef202a997664819198e81ae9d0c,2024-11-21T02:14:11.440000 +CVE-2014-6332,0,1,49e32334525531fe2c0c60f1fc45e2d50ae0e12e371a29b8d3b83895865ef93f,2024-11-21T02:14:11.563000 +CVE-2014-6333,0,1,1f470a7cb3dc51c6bc1df7420bbb958ffcc01d9236279a896863da6d3bf25c4d,2024-11-21T02:14:11.723000 +CVE-2014-6334,0,1,4bfb52c7fae27b0f9eb5fe661f98f7b33bc426ce5a77d26aecc25fb2f1390c84,2024-11-21T02:14:11.860000 +CVE-2014-6335,0,1,7038db204bda4c1e4518ff35bfba32e8d2e08af72e633693cedb9a947b893e37,2024-11-21T02:14:11.970000 +CVE-2014-6336,0,1,68b17b281f670841a8400547e4d0442f7e82401d9769c66bfc4191211b9c20b3,2024-11-21T02:14:12.077000 +CVE-2014-6337,0,1,030e452db1aaa7dc4d0347aa9fea36ae162b8496f54735b63be9ba2e295a30da,2024-11-21T02:14:12.190000 CVE-2014-6338,0,0,73e4a8908d49ef880d055645598894e4d25629e2b84ac73282c6b80c6243804a,2023-11-07T02:20:58.740000 -CVE-2014-6339,0,0,c0031a1d61fa292aa0164465e0cf269b90b46f9fbdb23a5025c34f13b7352e12,2018-10-12T22:07:38.803000 -CVE-2014-6340,0,0,9ae6b1dfd5538edb9f5760feecf0e4905b37f33c7a85439d0d436d993beb9f86,2018-10-12T22:07:39.177000 -CVE-2014-6341,0,0,ed523f4bfabee88c3e5f879f87cfc274c53f5fa2ed6b620757e73f6e63808af1,2018-10-12T22:07:39.520000 -CVE-2014-6342,0,0,ff77caf2cbc049984422664afe6324b100e37641a3939319dd39e76cae198c07,2018-10-12T22:07:39.880000 -CVE-2014-6343,0,0,430bc15fbd637fa316e42dce3a996fb9f5da3b3ea373d3ee6f07c7a2db114a68,2018-10-12T22:07:40.160000 -CVE-2014-6344,0,0,8591fe3e57963be47182b16e8c1fc0ba256549b0850fa384231de1d8a53ba1d9,2018-10-12T22:07:40.427000 -CVE-2014-6345,0,0,05ec12c3685b1555af9e449497ac84f8101e04c46e4d1502be427e680f85d934,2018-10-12T22:07:40.740000 -CVE-2014-6346,0,0,54d26a520be7dcfab0b06bb45c28607eb8115d931f5290d572ee01a8545cba8c,2018-10-12T22:07:41.007000 -CVE-2014-6347,0,0,7d21039d86c4e17a2390dfa712bd7a32d7300f1a4b27cbc8196dbbaad9e0f7f4,2018-10-12T22:07:41.303000 -CVE-2014-6348,0,0,e5cbf95bc431bab6427d430c34e8ac185cbd7dabb2829abfd245b50219a24a12,2018-10-12T22:07:41.647000 -CVE-2014-6349,0,0,a1df5a85f3557295e6c0c604f23d99dd33eeb2f51da7c75b855ad1fb3d9af242,2018-10-12T22:07:42.020000 -CVE-2014-6350,0,0,2b1bde979761394b08a28ac22d54a6d8f4282fbac886a9ed8b504c7ff81e23f2,2018-10-12T22:07:42.317000 -CVE-2014-6351,0,0,eaaa39ce94afe5b91d1bad3136fad2eb975eeef6185fcebc2b3a818f153b3516,2018-10-12T22:07:42.693000 -CVE-2014-6352,0,0,72b5bdfd293bec682771a4889ecd1845e8a43b3f47cb4bb01b74bc0b51a41a55,2024-07-24T16:20:19.387000 -CVE-2014-6353,0,0,54def2610ded35abd05b29b4e008ccff598292263fcbf37995702570901c1f11,2018-10-12T22:07:43.943000 +CVE-2014-6339,0,1,5acbee7e5898cf600b46d6ee4098241ad959b688012ae0cecdbc9dd93899ae56,2024-11-21T02:14:12.320000 +CVE-2014-6340,0,1,3835fae956ae4d7c2fc9b397bde22be7d58588df717d52630caabc630f5a56fe,2024-11-21T02:14:12.433000 +CVE-2014-6341,0,1,c5c0e47ea972c78adc4c045e8b164e1953e0dd1fa35bf2705615fe907e7c12f1,2024-11-21T02:14:12.540000 +CVE-2014-6342,0,1,73b2b9914934dc9c1f2088d6bcc35086fe5464cdf6a1a514e8af98d89d1a5bc0,2024-11-21T02:14:12.663000 +CVE-2014-6343,0,1,c8c666fb93b2b5fa9514fa539e469a581024335ed4627f889b985ed26e14e8f6,2024-11-21T02:14:12.777000 +CVE-2014-6344,0,1,7a387a4c05731216e013d0732e27fab56dcfdc8a85a51466a93210a59cec6346,2024-11-21T02:14:12.897000 +CVE-2014-6345,0,1,d7f62061d33eefd8cf09c0e76ab038c2cca8bc4847473419c8a67b65b2a37910,2024-11-21T02:14:13.013000 +CVE-2014-6346,0,1,c762be01fd50752c4b4dfc25ced70c2d781be6dd51a2211739f5f2668a754485,2024-11-21T02:14:13.150000 +CVE-2014-6347,0,1,71a8aade2405bf42605cec7e09a0783347fbd74f64f761c743ed0000f6f38456,2024-11-21T02:14:13.273000 +CVE-2014-6348,0,1,4b646eda9dd33d27e3d2a548360c60ae755884a4e7314446eeb6690fb753ce56,2024-11-21T02:14:13.390000 +CVE-2014-6349,0,1,9de11d905647f0112c949edfa4479beca92faf48d9706b99361a641cbe976a3b,2024-11-21T02:14:13.517000 +CVE-2014-6350,0,1,d3fa359f7ed4a6808a06381a7d14ce341da9776c4236d8ae05ee1d252508e30f,2024-11-21T02:14:13.633000 +CVE-2014-6351,0,1,34627570c7b87b198f266dac87d204f0b51b04efc46f3f45f96deabb56d1e1fc,2024-11-21T02:14:13.750000 +CVE-2014-6352,0,1,e17e3c5fa9a410c1aed572bf254ce2a05641aa01bf11abd053616b9697613fcc,2024-11-21T02:14:13.877000 +CVE-2014-6353,0,1,16ff5269113e4fefb09d8f2751adef4702eb65f065160e1ae761b8c83645c686,2024-11-21T02:14:14.013000 CVE-2014-6354,0,0,a969e607f7977ac2a38b085fe4f74b6c7379c8ec9ce488ae2469527ba0582764,2018-10-12T22:07:44.350000 -CVE-2014-6355,0,0,b8728e76c9d988225c82996e299851cf30d098abd67847f3c82269fbbcefa87f,2019-02-26T14:04:02.387000 -CVE-2014-6356,0,0,f8dd4e3fd2aa86a10696fbcabd727f998831cf6dd6b5c0a701469bcc4f6cab88,2018-10-12T22:07:44.850000 -CVE-2014-6357,0,0,ff07fb6397854151637dd3d59211b96c770682a509685dfe55ff7b36a3ac1ace,2018-10-12T22:07:45.037000 +CVE-2014-6355,0,1,357c3ce4f7327ea53f5867e77ee20065c38f1280ce04f02b6d82eef09e47f7c1,2024-11-21T02:14:14.243000 +CVE-2014-6356,0,1,3c5421a4bde42f40a3ec0661beab5326ad2da1407604b81bb863cd7331b475ca,2024-11-21T02:14:14.353000 +CVE-2014-6357,0,1,d906bbc91fc4e1759f1f6cf9263948c717a26aa7a687dce03537d3ef91c155db,2024-11-21T02:14:14.467000 CVE-2014-6358,0,0,c6321d077b04fda3bee5d66def05d58bfe67820333f0d61b369b3f0df9dbce0e,2023-11-07T02:20:59.087000 CVE-2014-6359,0,0,9bed68deeb7c585254d60f24f128e2d3876890ec33964fedf0a1a58649f4ddec,2023-11-07T02:20:59.300000 -CVE-2014-6360,0,0,d999d760c8594c2b932e2d1b8dc5437968d4c0da7768ce26f62dcdfe458a859d,2018-10-12T22:07:45.257000 -CVE-2014-6361,0,0,2ce4f19bfaa9da70c6345080a5962687c9e9866ef4b42ece560f147f7b212b08,2018-10-12T22:07:45.413000 -CVE-2014-6362,0,0,ea9fc5b195b6bca674e7543f495ad5e5f6952895fb27afaa50d1d72a0ec08238,2018-10-12T22:07:45.600000 -CVE-2014-6363,0,0,acc09e757e76ebe01b7dcdd8f272d8dc447c671087b5362b92cbd5fdc0a3df2b,2018-10-12T22:07:45.943000 -CVE-2014-6364,0,0,c2febbb68b2ba79f91e325d65cfe00832d685dc0263ee9aa7b472e952b3e6d8c,2018-10-30T16:27:52.233000 -CVE-2014-6365,0,0,3eebfb00df4a6ebca0c5ecf5757acc4b593e843480b89c481854ece2f4aba7f8,2018-10-12T22:07:46.647000 -CVE-2014-6366,0,0,bc0169bff31b24bf9d9ecd5309f1eff70de3051cc0092e1b4f411e6f79e29669,2018-10-12T22:07:46.817000 +CVE-2014-6360,0,1,5e21b75d8bbecd1645ee66244027a8b4d5239df35f79da053bbacdc3dc07ec36,2024-11-21T02:14:14.610000 +CVE-2014-6361,0,1,83a3ec69e2f8f07015710c23f3dd689a1cfcd68b425064550fcdd13284d7ce2b,2024-11-21T02:14:14.723000 +CVE-2014-6362,0,1,2de3813c2c62612aa6a0508869a0530f239b8d7922c1cc2a3ac6fe158d51eebb,2024-11-21T02:14:14.840000 +CVE-2014-6363,0,1,85898abe2fd03993c8b2238c9cee5f628576b32620c8a390944cc452c60f84c8,2024-11-21T02:14:14.953000 +CVE-2014-6364,0,1,995d2ec7aac5540339a670b17fcd27e0635d5cf5044862311597e4d323885cd2,2024-11-21T02:14:15.090000 +CVE-2014-6365,0,1,612c3476dc8aad4749991e71bad12937ce3a2cf4c8b1954f0aa4d61a5da589d7,2024-11-21T02:14:15.207000 +CVE-2014-6366,0,1,4b7e75af7b8ba0c285e860745a36278261469dd688a1f44cd1ec13bfd7646cac,2024-11-21T02:14:15.323000 CVE-2014-6367,0,0,7ad28ba130189614b8fe1c6cd9746303ae37e477c7029c936fef20a6497948b7,2023-11-07T02:20:59.660000 -CVE-2014-6368,0,0,ec9646705d2c0c35097ea31bdc84d844fda40fecf7b15789a10128908b85f3b4,2018-10-12T22:07:46.990000 -CVE-2014-6369,0,0,2ab9efcb39009484fa7326b48b1619794df9839a237d0f4bef91dc239b36d220,2018-10-12T22:07:47.177000 +CVE-2014-6368,0,1,d7e840a75727e706f6b7d541d6b8f04c1b6db25f5570d584395f51b2507fa0f8,2024-11-21T02:14:15.457000 +CVE-2014-6369,0,1,3ca5befc9320612c1b63f306b3a700a756d4bb105fa64ceb66ec0d9649662d39,2024-11-21T02:14:15.577000 CVE-2014-6370,0,0,c3f55b4e73b47284e636a8c1d75edac734a663a1572cfb78d9e25f064c297d8a,2023-11-07T02:20:59.880000 CVE-2014-6371,0,0,b5bd546be84d744827ad8101ccd1fa6b50169c28d2b3fd58147fecf91f9991fd,2023-11-07T02:21:00.117000 CVE-2014-6372,0,0,3b2aa936a1082fad46757271119595fb90b08384d255f84f5849c20a4893f971,2023-11-07T02:21:00.363000 -CVE-2014-6373,0,0,e7ec168cfc47c230c36042341eaff9b53ee1575a1a40f511027db5507cae6538,2018-10-12T22:07:47.367000 -CVE-2014-6374,0,0,7054b88ec7e7c776254e7303000c860076bf1a59fe98ee206b30a1bb18039dfd,2018-10-12T22:07:47.553000 -CVE-2014-6375,0,0,e4ba35caffa04d9a47a1f61320eee65eeeca0b8d7c9cc106b4c8a8fc49505adb,2018-10-12T22:07:47.693000 -CVE-2014-6376,0,0,015f63c6cab9e52c0ce9d75e131124a101cfdd5d39f9602d421626bac02cbc82,2018-10-12T22:07:47.880000 -CVE-2014-6377,0,0,99e31ad594e682af5df5cb1f44b1ba9f1889262ae3c6f8a0058048099832c543,2017-09-08T01:29:14.073000 -CVE-2014-6378,0,0,67a1167f4fbc19bacaecc0ae86325fdeb5eec4291f2962afef1b8e706a9ebc88,2017-09-08T01:29:14.120000 -CVE-2014-6379,0,0,ccf046157fcdbf1f3cc07ab1541f1a106bf73041bc509879c08dbbad6971e756,2017-09-08T01:29:14.217000 -CVE-2014-6380,0,0,70a1f40fe3d70600faaf88334327b748460f860510136d08eac7bce401e09f4d,2017-09-08T01:29:14.260000 -CVE-2014-6381,0,0,61966575faab5042332965a81421742a06c4c1a10f17b9709754de6d52c0c3a0,2014-12-16T13:54:08.217000 -CVE-2014-6382,0,0,0845f6605d1f0c3453bd0a4426174de58c85f414cb560eaf69f08a87546eadd0,2015-02-04T05:03:08.350000 -CVE-2014-6383,0,0,cb530a489a7063605187a0248f9a9d07572df5329cbc15e0e1ff4d9bc3e1373f,2015-01-26T19:35:16.607000 -CVE-2014-6384,0,0,d83559f73561912406e268da8b27c7632106f5890b506c0b6ac1e9a15daaffde,2015-01-26T19:35:42.747000 -CVE-2014-6385,0,0,18c693cf3c6743df1efd581dd8eda8c117d9695b3b11b4e0b699f936c18299fb,2015-01-26T19:37:47.727000 -CVE-2014-6386,0,0,ef82c1e20abd6fddce3e54b667e7069b568034a8a8ee66cf3efaa7bdfccd296c,2015-01-26T19:38:14.557000 -CVE-2014-6387,0,0,972e3cbc4b72a77f92f3f7627c7f26ba687ffa97ddb3c5305d3a355fcf6350d9,2021-01-12T18:05:59.507000 +CVE-2014-6373,0,1,57b4588eac07782c325b8ea70a27f351a8d156a8a74429c2e3728563ccadca10,2024-11-21T02:14:15.740000 +CVE-2014-6374,0,1,59b133851becbb53c1a95d307d5a29c8774bf646b7075a8896aca9b9a55c22a8,2024-11-21T02:14:15.857000 +CVE-2014-6375,0,1,4831ece27f1b3ee0e720790e0109abd3e44713b1c91c86fcb51fc5695e1f2fb1,2024-11-21T02:14:15.973000 +CVE-2014-6376,0,1,fc10f9ddb11050e611d4de2a05ac7cd4bf52a0a282141548adb4fbe0ec00e7c3,2024-11-21T02:14:16.083000 +CVE-2014-6377,0,1,88a62dd0e496755ddfbc73f0dfcdc727429afb9b3cdb6bfaf4a929460fe024df,2024-11-21T02:14:16.203000 +CVE-2014-6378,0,1,d3bc129bbb85826882d57d4fb21fd44624249de572db5c5b76e37e3a8d83d7a0,2024-11-21T02:14:16.377000 +CVE-2014-6379,0,1,dc6bef5ab1269afbc6ab865af2538eaacf48b76a7512ceb6b61e539348203229,2024-11-21T02:14:16.550000 +CVE-2014-6380,0,1,4ca1da039f5e6716f0c4e9d41c571103a8bbb26c2a85b7069a772b46302448cc,2024-11-21T02:14:16.733000 +CVE-2014-6381,0,1,99f8239f5791ff2cebcdba174e24ddedb1a1389c62825e2c12d97eecd2132102,2024-11-21T02:14:16.887000 +CVE-2014-6382,0,1,b54514a8c819e28cc4d6d76fdf13caf99c8b70fadb0f6d6298cb9a5bff4f7150,2024-11-21T02:14:17.027000 +CVE-2014-6383,0,1,ba8c99d214bd516e0b90f3b82eca7a181b19db9c74448e12de1d7ae64228c4d4,2024-11-21T02:14:17.180000 +CVE-2014-6384,0,1,fa1fa2ab8644778e726076a27a42761c3ffcd0591604652826d0667e7d842298,2024-11-21T02:14:17.330000 +CVE-2014-6385,0,1,75891fda4ee922c5c6186802e57e23a992822680eccfc096201313671e43a835,2024-11-21T02:14:17.497000 +CVE-2014-6386,0,1,87a05c0bf21b9f29708170249a5dbb119c6199ace52b3bcca817c76859b81e2d,2024-11-21T02:14:17.650000 +CVE-2014-6387,0,1,847c4edd4edbff940bc85bbe901c80be2c488b69c04d737c660bb829433bf506,2024-11-21T02:14:17.800000 CVE-2014-6388,0,0,12f3ce7c137bfe0765d68119caeb7cfc8dada96a9a6b2446d364aa74c4dd90ac,2023-11-07T02:21:00.773000 -CVE-2014-6389,0,0,cad73347ec1c88f3955ef944343f00ae78ebbc3947c86a62e6caddd8575ff04c,2017-09-08T01:29:14.323000 -CVE-2014-6392,0,0,3db4ef1e4fe085e0638122cb471c43a37cb37498a278324f315c328222f3f3f4,2024-08-06T13:15:27.023000 +CVE-2014-6389,0,1,c71c4990d620663080394278fd998030930d5855206a65fe3e3421c25efd7a59,2024-11-21T02:14:17.980000 +CVE-2014-6392,0,1,1728962655dbd4d54597dfaa3e5d3e1f66dc855658d5d3dabb6c029707a390bb,2024-11-21T02:14:18.120000 CVE-2014-6393,0,0,43d76059da78ad5015fd5bfe8333a1086660d3510e767febac7e3c8cd7f4e226,2021-07-30T16:36:04.447000 -CVE-2014-6394,0,0,f9d29995346dd1a27f941fddd5be7eae240f45195f583c62fd35d1e336f0f9bb,2017-09-08T01:29:14.403000 -CVE-2014-6395,0,0,92184a2aefd3b7037f480e16eee81c1021d8086a8a1934d26adf4b6e3c966cad,2020-02-26T13:35:52.343000 -CVE-2014-6396,0,0,8aa32c6225d6c38aa1295206740ff46768ef124d9ad1b7d5d14f3fc3b0d205d5,2020-02-26T13:35:52.343000 -CVE-2014-6407,0,0,5a7244abd24aee4db317638a7e51358df80fb78ec45922e067a90ec2a1df32f3,2014-12-15T19:36:08.617000 -CVE-2014-6408,0,0,f7223d097c408050d56c602803039de94d369943b4cd043fe2165927a9cf0e4e,2014-12-15T19:36:46.870000 -CVE-2014-6409,0,0,203b4f393d099ff8b73631d9a3b9ad7a14c86a363b7983a46569f07b97282b4e,2017-09-08T01:29:14.467000 -CVE-2014-6410,0,0,045fcb90f8fc0b56ccca1032743133d84f1df844471ce78cae971fb591c94b00,2023-11-07T02:21:00.947000 +CVE-2014-6394,0,1,1c8ea496c0ce4c4c9ee1dc5693979f3fa91eca20ce4e0e218fa0cdb39653680c,2024-11-21T02:14:18.437000 +CVE-2014-6395,0,1,84acbfbada391b24f266d06d3b34d4cf27e2398a0db16198880c5cd0d1433286,2024-11-21T02:14:18.603000 +CVE-2014-6396,0,1,961d9107f72d58a891759fb6a990753be45a6153ecece62fbc01c365a358896e,2024-11-21T02:14:18.763000 +CVE-2014-6407,0,1,675b07320b016b3b8dd2f0ace68fcfc904e7b24af1bec5c2ad6882c3a45a5cd8,2024-11-21T02:14:18.907000 +CVE-2014-6408,0,1,53f5cf71375da753e454b75c277ed614c276159c837265cd2f95f0977b395c39,2024-11-21T02:14:19.053000 +CVE-2014-6409,0,1,2843b577f44032036a015ad26c1a08ba8f7c9511528b4659ba6bf8648467cf8e,2024-11-21T02:14:19.210000 +CVE-2014-6410,0,1,33fd50774c6617acb519d2601ffd820a742afd70bce00b4c3bef70d6ecc366d8,2024-11-21T02:14:19.360000 CVE-2014-6412,0,0,1ad3c34912a7058910f0e860c8ceae65080f65be2392bc3ec72bab24cff865aa,2018-05-17T14:38:33.827000 CVE-2014-6413,0,0,afbfdc56cf17da4e45a10f142243bb1b911e68e4f4413560ce7cc046407f80b6,2020-02-11T18:57:15.880000 -CVE-2014-6414,0,0,429758d4c8d622c78d87ed1650fa54a8579499246ff4871226289d30802e4572,2018-10-19T18:54:23.657000 -CVE-2014-6416,0,0,811328a7971f38c85f884fb54dd7d277d537ac3bac01fdc3d646e4f1afcbc763,2023-11-07T02:21:01.040000 -CVE-2014-6417,0,0,f84d34a03568d6c704b3a11cbd3aada7fd2bf2dfcb85771b5166db17760dc5e7,2023-11-07T02:21:01.200000 -CVE-2014-6418,0,0,9dcb3fcf177fc63966341099f0c07bb92d09b29ae80fb3c5f582415ebdb82565,2023-11-07T02:21:01.263000 +CVE-2014-6414,0,1,7cba7ccbdf162343e5ca5b90a01c34154ec672d7d3b61dbaa7e5e295b5f2103e,2024-11-21T02:14:19.853000 +CVE-2014-6416,0,1,66174c5826b015015c00076ceaa5687c86011f5de8b5dcc919effe25264c73ca,2024-11-21T02:14:20.010000 +CVE-2014-6417,0,1,10e584e4c61b331b6e30f4cf5c5b4fd4d1a0f2401f9f52838ddda0c76fde6701,2024-11-21T02:14:20.173000 +CVE-2014-6418,0,1,91332c76da577177fcdbc672bd56998380e506e5bb4e3dd1a5c17eb625e692ca,2024-11-21T02:14:20.347000 CVE-2014-6420,0,0,297989176b308bd9717f9adce252c9abefa5ab2aed62efe6d569e950e0e90555,2020-01-03T21:15:41.957000 -CVE-2014-6421,0,0,7a92396ff718916526649b6413917d39b16dafe6b20de25067a180b1da00a242,2023-11-07T02:21:01.367000 -CVE-2014-6422,0,0,a78f1fc5a95990e8fbb2d739c97a194a9ae8412e3575a4b66ffc06820a574bd0,2023-11-07T02:21:01.447000 -CVE-2014-6423,0,0,53cbf385f7ba3fb92dfc624f931dbc486447f1c41b445837b4c56f367b5cd771,2023-11-07T02:21:01.540000 -CVE-2014-6424,0,0,83303f9a2e0bbab5b0a7aade4de208a1cd6b89377b83a82e9bf24ea552483d6d,2023-11-07T02:21:01.690000 -CVE-2014-6425,0,0,1c7e7c894d7c5b96138b17598d3067b9c8fdcdd842788ab2319edced6de674eb,2023-11-07T02:21:01.770000 -CVE-2014-6426,0,0,7a8b482b95b54db10b56d94f9eb3aeb4d6dffd26db0acaec233f37e13840657f,2023-11-07T02:21:01.837000 -CVE-2014-6427,0,0,fe677801a92b5b607b7554c2214977e60fb27d42975b25c282b03933104aa5b6,2023-11-07T02:21:01.910000 -CVE-2014-6428,0,0,688693e51d52dba89a27b9becc6b102bbc42b56dfcac22bf7ebff4855d915b39,2023-11-07T02:21:01.987000 -CVE-2014-6429,0,0,a3d1cf06c4803df0a7782f86f3fc0578f474729a11058b540a548b2a3ff6e1e4,2023-11-07T02:21:02.063000 -CVE-2014-6430,0,0,d00456adde7f08c3bcb82a1d1c7a90667e7335fdc0ee4dfe732b4ad18efbe1c8,2023-11-07T02:21:02.137000 -CVE-2014-6431,0,0,69175d24765743d8520c81f691e158510e606a484653628a0fd5b35de5dad9fb,2023-11-07T02:21:02.210000 -CVE-2014-6432,0,0,31bcef6fb60013e95779d98e578320a08224893883de182f9dd05c5e6e952f7c,2023-11-07T02:21:02.280000 -CVE-2014-6433,0,0,1b8be0b3432bc1296db21caae11ef75c926cf8d3a2af359d6c79b54dc2852875,2014-10-08T15:00:14.650000 -CVE-2014-6434,0,0,c7679cd3822dba75fc1d5b137ce30e074fc2716689a9fbc744533d460ef26e5e,2014-10-08T15:02:21.993000 +CVE-2014-6421,0,1,c085bed20ea346fe21797618363105da2ec1b85f18a584f05f47830089892d79,2024-11-21T02:14:20.647000 +CVE-2014-6422,0,1,8e29ed97d8c9b8dbf9123efb37c3adf1b1b69b4ad331005e0cf1d250d5894cc4,2024-11-21T02:14:20.807000 +CVE-2014-6423,0,1,52d5d06c6c73887d7946afce5f7af3e613806397f47c3b2d5274ded9c44b8828,2024-11-21T02:14:20.953000 +CVE-2014-6424,0,1,4ece9bb272235b677db779adb89df7417e2d3b22033a7ff53a3b89ce8662438b,2024-11-21T02:14:21.110000 +CVE-2014-6425,0,1,e1c96fb594732b12a7cde4c1a59a843cc392c19a4fd8c8106791b45faf5263d6,2024-11-21T02:14:21.260000 +CVE-2014-6426,0,1,811a9420637dbed0a81f2c128a0d657d4603dadb1925118cccaffcffd6c298d5,2024-11-21T02:14:21.397000 +CVE-2014-6427,0,1,88d2e57c2b4976c34eef4d986e90f53e7acd0ee890a7ba8983f923ec1b0f284c,2024-11-21T02:14:21.537000 +CVE-2014-6428,0,1,e136abd942e770f5a45d1f7a9663d9929f5b43701e0b93011483de8410f1dd53,2024-11-21T02:14:21.677000 +CVE-2014-6429,0,1,3e26ada2f75215e093726af014b3896dab59c44d87ed8cdb4e134c73b0b89b62,2024-11-21T02:14:21.827000 +CVE-2014-6430,0,1,51be1d91a8b44f3be37a0e64ff76328be445df0b276262ffaa16c65ddae086bc,2024-11-21T02:14:21.983000 +CVE-2014-6431,0,1,3208d7c633078f4abe7d0d86e2d1d6f3bb5859b713c47e56469c076e50e6acc9,2024-11-21T02:14:22.137000 +CVE-2014-6432,0,1,852162f77c43275c984b715795e16545190e9cba902c963539788a3f8784c80f,2024-11-21T02:14:22.297000 +CVE-2014-6433,0,1,8b2af757b6635f3499151d8026f10b5bfc4c2eaf091bb4db7109118ac6c5c26b,2024-11-21T02:14:22.443000 +CVE-2014-6434,0,1,3590232ddde6d2092c86e36fc0598c82f03e7ffb076a68a2f0cf2aa264867027,2024-11-21T02:14:22.573000 CVE-2014-6435,0,0,7f34a4cded80125b80c9cefa0621cca66a6888b2d30bc4b258eb439f3e8169d0,2018-01-31T15:24:06.313000 CVE-2014-6436,0,0,695a664bcb244092d38bfacce8aa276e4a4bb90b86dedc3dce67a10329d260bf,2018-10-09T19:51:22.863000 CVE-2014-6437,0,0,73812d0abb717c83e4b1b70629db38a85921c17ecde61e3a1031d0e84c3007d9,2018-10-09T19:51:23.207000 CVE-2014-6438,0,0,3d3f29715fa83fcfdc46ce6d3df53402b2e8ed569ac246b931b8ae55ea1dea90,2017-09-11T18:25:34.627000 -CVE-2014-6439,0,0,aa690d660696504e2cd56b38f6d2f328ba2165a1b2c5094cd2162955b0b5a9fe,2018-10-09T19:51:23.537000 +CVE-2014-6439,0,1,6b4101b531313a97aabc5b6e55a275dae7ca33f90bc4e27c0f7db6f054868887,2024-11-21T02:14:23.343000 CVE-2014-6440,0,0,34de1a5bd0234e2e41f0b96f2c63a35e4462621947a5ce0e04fd9488427278fb,2017-04-03T14:21:56.013000 CVE-2014-6444,0,0,11a6cd7d33dd3216a81b2585f5bd0e827cf7309dab78a9a37a5a1fcfc3c15dc1,2016-01-12T01:21:16.257000 -CVE-2014-6445,0,0,7607cf258d6b498957d262071b163c50adad7312e7648d9bbc749d1cdf25c1be,2014-09-30T15:06:45.900000 -CVE-2014-6446,0,0,c4bbbab311c5f99da8dc7682fe1a385e09a938e09e6ed82023e34e8fc067bd7d,2015-10-01T17:08:44.133000 +CVE-2014-6445,0,1,6d60f2eebf400dd53f28f657083e7fcf9d85f75f99ce556cdcfddd61531f7565,2024-11-21T02:14:23.807000 +CVE-2014-6446,0,1,19718236e7e279905b08ffbde814a08fd81589f6bd9d73646ef2d2e2b5c0ab57,2024-11-21T02:14:23.950000 CVE-2014-6447,0,0,ca8b1e386dd1105ba5467b91381cadbfcd988d77af7985c3122d69ce1f7074cb,2020-02-25T16:48:58.123000 CVE-2014-6448,0,0,024d61e4e151c35a69c243f825652881228c6e6142fc29d141323fa951691318,2020-01-24T19:43:32.387000 CVE-2014-6449,0,0,9cf608be513216f260a5da36eaed4dddfec3844eee29fc18a1a04374948d74ac,2016-12-08T03:06:08.203000 CVE-2014-6450,0,0,39ec80a33549abaaf9303966a97e59234773c5d3e77f3d7fcee78103c1789a18,2016-12-08T03:06:09.233000 CVE-2014-6451,0,0,001d66b4fbe5f37f29b17d91d66eb294cc16c7d8d26af66aeefc02474d905d35,2016-12-08T03:06:10.233000 -CVE-2014-6452,0,0,b8eb55cb7e088eaf77a1355de14367cded08268259744f6025b27ff9cdeac211,2014-10-24T07:28:12.653000 -CVE-2014-6453,0,0,55d8ec507426b7f8b0b3e31ba9d896533442d0e53ebea447fbefe2ee8357a000,2015-11-17T15:38:16.600000 -CVE-2014-6454,0,0,80eb4946dda2ef47291df78b7672475bab83c994c8f747f860820aae85743009,2015-11-13T16:55:15.267000 -CVE-2014-6455,0,0,223e402254cb1f1338f4ecba7d5332ab6adb1e34ccb2457775ac13557f0b95ca,2015-11-13T16:55:30.640000 -CVE-2014-6456,0,0,6b256ac8dcf8e7c49f1c1be14eb8996c874e2cb65689dad4fa4535217a9b8401,2020-09-08T13:00:34.710000 -CVE-2014-6457,0,0,1e2a81cfdbfbf2c21df3b719d487df4e035fce37a0b61cf08d79cb8513241bbd,2022-05-13T14:57:17.313000 -CVE-2014-6458,0,0,b0fd8be4dff9d7cde8ab4c2dcc7b7122dd9dc54dbc1f4ad1bcc97fafb2fef56a,2022-05-13T14:35:15.657000 -CVE-2014-6459,0,0,910b351a25dec0a3c52aea9489adeeb293c3f592ad24628c24edd40d4fc4d06f,2014-11-19T03:02:32.727000 -CVE-2014-6460,0,0,769f29d27c714adb59f9bfbe77b98a578abe5e31e94c0e1beca5b1e154797912,2015-11-06T15:15:52.117000 -CVE-2014-6461,0,0,18822f56db68db73c88d835a661bc07b6216f5b334522f0ed16bc9d305d84c87,2015-11-06T15:15:13.993000 -CVE-2014-6462,0,0,0828837d95163d0e1ac30ca15b57c0c7d117cac377316b5b3d1cc3b93ca4126c,2015-11-06T15:14:43.657000 -CVE-2014-6463,0,0,2072677579a148725424d3a367d90928485b51930ad8a35b99919b05588c98a7,2022-09-20T20:29:16.103000 -CVE-2014-6464,0,0,c28a38a030628332311170fa80a7eb4d4ff63a754f32241b9b8a857bbd554403,2022-08-26T16:15:04.173000 -CVE-2014-6465,0,0,10593719b227ee56f74ae211b4641ea1ff09e438f62705eb9e77c35b4e624080,2015-11-06T15:10:35.467000 -CVE-2014-6466,0,0,d969241e3ea1ae28bcd9e36be15d8ba952556ae38ffac76a1ae8acd63a4e56a0,2022-05-13T14:35:35.207000 -CVE-2014-6467,0,0,ae800aaa176d1fb7e8c78fadf3f92294d6a0ddf5d624093405608f98c88843be,2015-11-06T15:15:31.220000 -CVE-2014-6468,0,0,35845f6c00efe88ea8e2e7dd0e40e66ec12f22ed20249f505aa8df33ff4ad789,2020-09-08T12:29:40.483000 -CVE-2014-6469,0,0,2b44b86ab5ef1efe9165ae1d9513401ab6b481b785135bdbd185e0d7eb9ca30a,2022-06-30T19:52:03.697000 -CVE-2014-6470,0,0,15bdda981ef981da5ab06a8a445c7602c14228b13124629678ff0d5407844b29,2015-11-06T15:57:23.983000 -CVE-2014-6471,0,0,9ac1fae03fb1781ab04a890fb53088a8680f1f8f33d8fe9e5a580d376eafdb80,2015-11-04T18:14:28.403000 -CVE-2014-6472,0,0,ab8a0b4f09114683d0c08de11955e1b2d5c39bbeff5476cbd885a5899bed075e,2015-11-04T18:14:56.820000 -CVE-2014-6473,0,0,add1feaba32fa9f7022c0633b7b3e2a94ba73d8b994d0abe73909431480a4265,2015-11-06T15:57:36.413000 -CVE-2014-6474,0,0,0f13271c3e73af967e231ff39bbbcad495d047a71885ccd18a30e51bf19843b6,2022-09-16T19:56:16.373000 -CVE-2014-6475,0,0,db839a703d621521ccd505a5d8723ca91dbff40799727a853cae0e44f1c6da0e,2015-11-06T15:09:10.333000 -CVE-2014-6476,0,0,557301a172be7beff2f7eb83e64f8277a9cce3f4c60a2789d81084689cc653f5,2020-09-08T13:00:34.710000 -CVE-2014-6477,0,0,9403872cbee825271f754cdc8522ca6cb50db20bd3cf1add78413381ea36baa8,2017-09-08T01:29:14.527000 -CVE-2014-6478,0,0,d58d35bc31292c0534e98fcb6094797620c29b5f2fedf8996d6dca62e24c2d1a,2022-08-29T20:50:12.107000 -CVE-2014-6479,0,0,93a8cfac6873982057fe35baf30e84bd0adb2237dbf5040e544128a3ebee7022,2015-11-04T18:15:09.560000 -CVE-2014-6480,0,0,355d1c38c3475f38614711df96c4ed2ecfce1e2df6defa05f7552dfd1b47ad4d,2016-12-07T03:00:57.750000 -CVE-2014-6481,0,0,3c6e4383b43b795e07c8e4a5a8ffede93ca73f299d9a671555640e8b41260b21,2016-12-07T03:00:58.767000 -CVE-2014-6482,0,0,d79b26358b8a7d3f179c94fb0475a2ba110b58565bcf7158207e2060540a005a,2015-11-06T15:08:04.317000 -CVE-2014-6483,0,0,1c40590c6b401a8048fa340eafa96cc4a3d2686dc92a6f55ac4b86c27143fb25,2015-11-06T15:07:37.937000 -CVE-2014-6484,0,0,90992b441e8823f2374cfab8c5ff48543d1e6312d50a90b2b217b8b80ff0f21c,2022-08-26T16:04:30.447000 -CVE-2014-6485,0,0,b0e64fd48316709c67d4da70ca69e454ecdfabf7473143d946b983f4a90a2ed7,2020-09-08T12:29:40.483000 -CVE-2014-6486,0,0,b2ae5e3c1e46a08ea98fa296bc8afed5930657976ec832171da05bf370ed23cc,2015-11-06T15:10:03.067000 -CVE-2014-6487,0,0,49bfd5d176dda24798987276f778d9cd6302a54521ed82f90ff9ba5048db3b9b,2015-11-09T19:05:23.353000 -CVE-2014-6488,0,0,f7b9f9c6ed8e0f28ccfd758745db6da8ec4f5a5cf896b67cc4eca37a3f971e7a,2015-11-06T15:10:56.943000 -CVE-2014-6489,0,0,88ec8f0f4299e9490cc4d94e9cd9253a91979759f35be80df0c7712b550c0152,2022-07-13T14:13:50.523000 -CVE-2014-6490,0,0,0a047550ffec902ad4140d76b15c743c21b9c12f4a630efaf50f229c7410c20c,2015-11-06T15:57:49.527000 -CVE-2014-6491,0,0,f00abf8bf91ecf07e766f7369ce73311ed94e1b4510c40104ecc420ab96b3b2d,2022-07-01T14:17:14.437000 -CVE-2014-6492,0,0,970a27f8ce1183c15c3fac42f2455e3061cf2df21a83877a33f1fbe0f2192db3,2022-05-13T14:35:35.163000 -CVE-2014-6493,0,0,a23ff46c5dcb1d320970b07af86389c2040c41efe01d2e468d53e4bcea7d3a5d,2022-05-13T14:35:35.183000 -CVE-2014-6494,0,0,6a5859bf479969a76f8ee5cdfa7772b24e54cc506dbd054d94a84888c2acb0d1,2022-08-29T20:50:06.527000 -CVE-2014-6495,0,0,cf8c70b3e4a584ed3deadb14cf5d92f75d3ae27dcf5e852dc5b6004fa4538e8e,2022-08-29T20:49:55.217000 -CVE-2014-6496,0,0,2ecf2ea186538a8f120872b75a29f44a0cb7f3c60d69d43c2bc6bd99ca678a65,2022-08-29T20:50:20.680000 -CVE-2014-6497,0,0,6ce06f5395c622cdf2f30b08584b685651258bdec5a8efdca4517df0ade97790,2015-11-06T15:58:08.193000 -CVE-2014-6498,0,0,337091ca4feb19419c095259868faf25f0498e7e156c0b3a321df219b4f1b972,2015-11-06T15:17:28.730000 -CVE-2014-6499,0,0,9d055074bbc6c0857f777678ee49f7da1f91721f7cd57f6a7e7efecc18941a6f,2015-11-06T15:16:54.590000 -CVE-2014-6500,0,0,053d76c333ec52d655e99eea6e904b132144e2c299b3459f883750bc83cb6f44,2022-07-01T14:15:54.387000 -CVE-2014-6501,0,0,790b0dc9350d26334cb0564d36611fc4cf26cd8bb21322fb586bc8ec7a1570c9,2015-11-06T15:58:16.807000 -CVE-2014-6502,0,0,233665481ed17fe1427a4841a03bb350990a6843a51ff1da5f3937d50ecc5e27,2022-05-13T14:57:17.323000 -CVE-2014-6503,0,0,51c76feea78c5ab377dfedccb4349de9e715bd6427a4cca9c06fb1754ea34330,2022-05-13T14:35:15.740000 -CVE-2014-6504,0,0,a8703c46214308076742effcf9220e4230fb800ccc3aa7f956ab8a251d9e55c8,2022-05-13T14:57:17.330000 -CVE-2014-6505,0,0,fe95c6678cb5ca257fd1adaf3c86e3eb9bfa2e86f7340e3cdfd2c37f64bdba2f,2022-08-26T16:11:35.897000 -CVE-2014-6506,0,0,015931cf0d58b70c88e561dea4612c1b04da032adf1f999305c4d3fea7ebf876,2022-05-13T14:57:17.337000 -CVE-2014-6507,0,0,631aa27c6c042540551ac2f1258b9d5f19b4b1648454b3a7a1b476eed83a7e4b,2022-08-29T20:50:16.093000 -CVE-2014-6508,0,0,305d4321a81d4034edfee72d4ed3b3c8c2327de714f03b69ed1c0ebf11ac2d47,2014-11-19T03:02:49.290000 -CVE-2014-6509,0,0,a815e34d55b5c304c4d05d903c765bf4cdb5d22d57ca1c3e0325dcaf60c0d3d0,2016-12-07T03:00:59.813000 -CVE-2014-6510,0,0,5ed90920e881705c3addba12fad4c1a597083f285e42d69331594419fb1548ed,2016-12-07T03:01:00.937000 -CVE-2014-6511,0,0,2fa2cb38c531d2d4bb3c3a073600b010c01a55991f85aa2c6c2dbd8eca64ca71,2022-05-13T14:35:35.230000 -CVE-2014-6512,0,0,7b01e4c19cbe533ebc45ceef2d79528339930891bfd7538760e965962ccb7755,2022-05-13T14:57:20.743000 -CVE-2014-6513,0,0,f3484c7d8d7545d78bbd149b9d7c3aa1ee075c65b2aaefa793fec0c669a7622c,2022-05-13T14:57:20.750000 -CVE-2014-6514,0,0,01e9a452206e7bfbffe4bd796e53b98f34bdae3a31971cfa966ac732e1539c97,2016-11-28T19:12:48.747000 -CVE-2014-6515,0,0,bb83c25bdb12ec41c4483a852bdfece63da5702096a5e4b23fc84b031d7f928f,2022-05-13T14:35:35.300000 -CVE-2014-6516,0,0,1ca8c760a9a45277b52705e5474bd0b3777ac78a9eb7b43aabe50f5b066b4616,2015-11-06T15:17:11.833000 -CVE-2014-6517,0,0,a711b03f0f87d5a6756e0461f7b4358cc08959e4aa8f709bd3b021f9a700e0e6,2022-05-13T14:57:20.757000 -CVE-2014-6518,0,0,3f800945c9d1241610d3cf00824763124a472b4718bad35299c8418447d6ed49,2016-12-07T03:01:02.017000 -CVE-2014-6519,0,0,79f6aae98deb6389fdb1c27da77acc95baca8b88e5fb9de8b30d1ce919bc5726,2022-05-13T14:57:20.890000 -CVE-2014-6520,0,0,29f961e225ce0420ccf4c1ce8c2bdc8776a46e48b1005ebe59ad984fe695a948,2022-08-26T15:59:15.103000 -CVE-2014-6521,0,0,cba8e0c8805a721c1e943d3c43eb9ca085ea1a88e693a6ed908d214fe7ce4bd8,2016-12-07T11:22:00.577000 -CVE-2014-6522,0,0,b89653562f4489b3e59c9fd55a374e9417558bb008b5e73de5ece551bfbd3cfe,2015-11-09T19:05:51.510000 -CVE-2014-6523,0,0,c5d36024cb5c5d8f54641ac3da21b976685a39ea68c5b04b643a7d62a747323d,2015-11-04T18:15:51.157000 -CVE-2014-6524,0,0,fab9cd1b2b146d8607ae88f550db0b5280d18f663c1d61d970cb07213a2300f4,2016-12-07T23:38:27.817000 -CVE-2014-6525,0,0,5f238c8c8dbd2f8ad289b12501267a29330537ee2b85d8ce1052f7b381552feb,2016-06-17T02:00:26.067000 -CVE-2014-6526,0,0,49bfad928df6d9d719bdd241ac9a9d4259af1090e656013b5ae4a5fdd944b66b,2016-06-17T02:00:27.067000 -CVE-2014-6527,0,0,295eeb3b2e75ad40cf194d7bad857c78f2d3748306960ebd2a4e7126f97cfd0e,2020-09-08T13:00:34.710000 -CVE-2014-6528,0,0,516e4349f7f9b93e53ef9a152350c87e15877be3d5618fdd04249f3bf2a1ee68,2016-06-24T15:38:52.517000 -CVE-2014-6529,0,0,24f723795fe8b79a0552c5005bb34acea6da13efee8c72703f241120ea3072d0,2014-11-19T03:02:50.587000 -CVE-2014-6530,0,0,babbd50f9a7d44032a9137c927a2d0356ac887091496c30938154d532f4ec68b,2022-07-18T18:47:02.217000 -CVE-2014-6531,0,0,f2dbae0fd07bf8e1360a809a05fdb58b89ae86a87bf82f275df2b5224f5f6a09,2022-05-13T14:57:20.720000 -CVE-2014-6532,0,0,07e61d525c722812df5079d7762727f8ff166e599df8426c5f821b9c172ad7e2,2022-05-13T14:35:35.100000 -CVE-2014-6533,0,0,0746b030aa3b5accc829441650b61d77157b360e2f88d988bf252ba6bf3bf3c6,2015-11-06T15:16:37.100000 -CVE-2014-6534,0,0,42ca4e73862cc7a711e638e686e859d5c0c502df0b6b0f0faa961302838806e2,2015-11-09T19:06:15.480000 -CVE-2014-6535,0,0,b4e0297798ae401fcb4ae13c9336d37c1bce4b0ec47560b5e2558de2461b97c9,2015-11-13T16:57:46.967000 -CVE-2014-6536,0,0,8e33d191e3b01b99213e9cc17e966edb1394ffff4bf30b6db887dcff1eda3ffa,2015-11-10T16:29:21.717000 -CVE-2014-6537,0,0,45a0d927de16aba63ae571d1aff8ccf6b305b0ae9a939eaabd1fa5a4a453e18f,2015-11-09T19:06:34.947000 -CVE-2014-6538,0,0,c6895d11d400249d5084cb2ada0ca549605328f8cc60e7d2713d2ff624fd56a5,2015-11-09T19:06:48.953000 -CVE-2014-6539,0,0,93ee2c7912fda6c92104a99994ccfc2c3b514a9ca8bec301dbe61e05e292d415,2015-11-04T18:15:22.940000 -CVE-2014-6540,0,0,27e0c51009f333805c1d4beda5e3bc5e23ea2d042aabbf3180e05d7db22e258f,2014-11-19T03:02:52.007000 -CVE-2014-6541,0,0,fbd5d4cbcdfdefe5e1eca93213bf4356a992c2b497a341d0c89a83ff23925bc1,2016-11-28T19:12:49.810000 -CVE-2014-6542,0,0,092ba51a1144e4ee9884200fc5184078557e0d237740cb52427f846a9a28dc70,2015-11-09T19:07:04.697000 -CVE-2014-6543,0,0,88fdb119a7bce994d83f2fa59491bc93ee3a74fb3bdf39add5ff8f6391804686,2015-11-10T16:18:39.143000 -CVE-2014-6544,0,0,e19b25eb1516a79985153544886f396c187ebcfb1e280a987e1c4882587f082d,2016-05-11T18:13:30.973000 -CVE-2014-6545,0,0,59b0045dad8e4d52a2a8e692a751063dda00198110b0c60a654358b226d6fced,2015-11-17T15:37:29.090000 -CVE-2014-6546,0,0,317142c895e4530a235149d52c8e5bcb926ec3b0bb0833cf71a88ec95dc923b1,2014-10-24T07:28:36.670000 -CVE-2014-6547,0,0,8af5447287171d464238b3fa56207c468223e673787ada6c341781628f488bd8,2016-05-11T18:12:35.297000 -CVE-2014-6548,0,0,aa898565f0e7533b7368c8b2b5330c00d3cd9cd6ef05345b8096b3748905a815,2016-06-24T15:55:41.017000 -CVE-2014-6549,0,0,99ada6851ca8bf2a8f66349093599b0ab1a0b5f67933f34ba170abc3ed4d4db0,2022-05-13T14:57:20.737000 -CVE-2014-6550,0,0,cddf62cecd45fbad87c3712b71c97bdb06f3ce700f38658e575500014f5853ea,2015-11-04T18:15:38.120000 -CVE-2014-6551,0,0,a2e80e465338a1cb843ad2cbe68b9c2d0f2a9e66e4ae245777c756c106f608aa,2022-09-15T21:04:27.100000 -CVE-2014-6552,0,0,59f328a8fc7492cb4fa29992a63f6f997361981b3346cdc6984a042acb9f8bc5,2015-11-10T16:30:00.203000 -CVE-2014-6553,0,0,339fe06ece24bac61f4b8742027a2a2df96596aee2b455ae264e77ffb18259d9,2015-11-10T16:21:32.737000 -CVE-2014-6554,0,0,e6f23092b96c45bf12887b8ae96b4c4f541c782ce6b71c448b67b46dea965ac6,2015-11-13T16:58:04.040000 -CVE-2014-6555,0,0,6e1ed469a4ad345ab49b237eac86988369bace26ba94f6c169397d14d3c1075c,2022-07-18T18:47:19.293000 -CVE-2014-6556,0,0,c35bc7c4c16a38d7e15cd5fc90864e9a84fd5dd0ff4f3ae1369ba143d4f08b5c,2016-06-24T15:55:34.517000 -CVE-2014-6557,0,0,fd377ba082e1a3367a59b6fc45ad38518568005d8d49e1c9a94c8602da2ae134,2015-11-13T16:58:25.540000 -CVE-2014-6558,0,0,33d62df0dab4578ed2778ce2e167f0fa613029a9579b47adcd38f7c780f55520,2022-05-13T14:57:20.730000 -CVE-2014-6559,0,0,abb77d1ffdf14e42005fbcdcf0c1275864e397c51848da1ec305dbeaa9e1c977,2022-08-29T20:50:35.767000 -CVE-2014-6560,0,0,ce3b382ed98a87c18b4581b25a2956996c656bdcaf15c2635285be1f376e910e,2014-10-24T07:28:40.217000 -CVE-2014-6561,0,0,4b2c38948c77d8ed557190a32d5d195a0c864dd991310197d18c52c8950bd9d5,2015-11-04T18:17:02.700000 -CVE-2014-6562,0,0,6447e9c14c579e88851d70917da187d6704d9787717038c805f3d76bef42dc77,2020-09-08T12:29:40.483000 -CVE-2014-6563,0,0,778bde21f73330d50bc56181502e1eb13fd84566127d8fad75c1e7e9a3d8e54a,2014-10-24T07:28:41.217000 -CVE-2014-6564,0,0,a7a96237be2d10d34fee7daf4d891dea6b7374449c4e948af02764781a969166,2022-08-26T16:11:48.723000 -CVE-2014-6565,0,0,5bb81e1178a8ca81825399fb04c6f2b60aa587518c2c6b4b445a5f95f19cbbf2,2016-06-24T15:56:01.987000 -CVE-2014-6566,0,0,8d043a88d267010669a0710944b1f49177f3b4b43070174022aa88cc545745e6,2016-06-24T15:54:45.777000 -CVE-2014-6567,0,0,3b97b69dc48d408d1f548e742bbd3dbc590e6e0b3c2e7f3e05c81c658f07c6f4,2016-11-28T19:12:50.827000 -CVE-2014-6568,0,0,95b5130a01ee84e555bd2a59cc817497838174c56e5e66410112014934680211,2022-09-16T19:56:20.463000 -CVE-2014-6569,0,0,ceb7481294e3932fd49669c50293651207019342743a871483567eaee52c8273,2016-06-24T15:56:08.003000 -CVE-2014-6570,0,0,a89ae0626753a49c48e1686e0b4d3c5acccea477e4df755906216082cc65ac88,2016-12-07T03:01:05.483000 -CVE-2014-6571,0,0,973c21bd7f87d76a732d68d686d6c8b9bd2f4f89be9efa028d46772dc9c82c67,2016-06-24T15:56:14.160000 -CVE-2014-6572,0,0,40a22339bcd6c8d41d457043565eb1b699836ecfdf731ec33c4b06c26ea37926,2016-06-24T15:30:26.553000 -CVE-2014-6573,0,0,93b6725d4e8b7eaf7153260e2ed3ebd7d733e6aee8dbec66378232a47572c756,2016-06-24T15:55:55.813000 -CVE-2014-6574,0,0,ecb52d2dae5957392b4b67657410bf1e6e282250eff43a76596bcb86b078d246,2016-06-24T15:54:59.747000 -CVE-2014-6575,0,0,1917cb5383d44df7e7a40c670853ba5dfae56dd13386540560bc27f4b597cb55,2016-12-07T03:01:06.453000 -CVE-2014-6576,0,0,2775d3478f3705129c58d00d6fbbde763a9042ea71784c9e27248a40f239dfa7,2016-06-24T18:35:17.723000 -CVE-2014-6577,0,0,73ce6d0e5ce574abd197b15cc635ba6f6701ea3331379d7de138b3144cb49161,2016-11-28T19:12:51.920000 -CVE-2014-6578,0,0,13ead22c8e1c7f67250ec474c6aa1ce98b69158acac303a5ba23a86ffccbcbfc,2016-11-28T19:12:52.953000 -CVE-2014-6579,0,0,8c297df69b276ca4696b4603b61af8028ec5d09406519a222fd60fed5ec98944,2016-06-27T14:30:16.920000 -CVE-2014-6580,0,0,c20ffafb4b5a3f2c956cdb8bbcd5c103624844c8b3ca697da644a3cf8c3bbb13,2016-06-23T11:54:03.167000 -CVE-2014-6581,0,0,32bd7381444edc228623a9313607acd82d9553bd35a8965d0cbd5094a15ea8fa,2016-06-23T11:55:16.093000 -CVE-2014-6582,0,0,2885cdf95a77f2e323c3e5b2b749bd7bc59a299f790ef644baadf027d10e6c6d,2016-06-23T11:57:12.363000 -CVE-2014-6583,0,0,59ae6dd9d3303ef3b1f4548c59252ae530b21fa096a007c14fe397ac49ca8206,2016-06-23T12:03:06.753000 -CVE-2014-6584,0,0,9807476eb9892b3e033d72172e14379796c73b58a581a2ba97b9beeef8e49562,2016-06-23T11:55:26.547000 -CVE-2014-6585,0,0,307cf319fd1e7dd71951767fedb61b94c6823934f30dc64570e4b0b707b564e9,2022-05-13T14:57:20.857000 -CVE-2014-6586,0,0,742de13b392a55b50605e7c68be0200c597a1dda694612d5c7026056d8e5a8c8,2016-06-23T11:55:51.093000 -CVE-2014-6587,0,0,d2487f062ba2de7a168ee1db587eeee06992212dc70e3f2f197a552fc44d268e,2022-05-13T14:57:20.863000 -CVE-2014-6588,0,0,9206998a52cfd85ac3c51e6f5e4ad46f85c53d1b2b0a194d0b9351d1af326ed4,2018-10-30T16:27:35.843000 -CVE-2014-6589,0,0,0007d3092f62b56b691d4b7c08bb255c9abe2d7c93e3edd25fc8eb6c2bb336ad,2018-10-30T16:27:35.843000 -CVE-2014-6590,0,0,e41c209a2494a0982d1c53179dd387763830c41b064d27df5d5b352ab6b18d32,2018-10-30T16:27:35.843000 -CVE-2014-6591,0,0,647f18e19c4198fabf876dcd35b5b13c7c8a1a8d21b73391e9c5608ad8e70d9a,2022-05-13T14:57:20.870000 -CVE-2014-6592,0,0,b86a89f82df2287620477e6e43626a137e30239c5c8b9028310e50d50137a304,2016-06-17T02:01:06.257000 -CVE-2014-6593,0,0,74e2e1c979e313c607be821a00bb7cb27dcafa3fc6f214d09a608f91c3114768,2022-05-13T14:57:20.880000 -CVE-2014-6594,0,0,fc870ff33e7075f968d79e601995dd96298079268f8479ba31c488cff9843497,2016-06-23T11:52:35.647000 -CVE-2014-6595,0,0,fd3ab2aad3d448f31f63166d16b216feea2d4fe17975a96c9d9f8a3e15db3606,2018-10-30T16:27:35.843000 -CVE-2014-6596,0,0,a7fee12944f54969a7eb2eaebbbd3c1a361c717951ef924894784ecb51804125,2016-06-23T12:00:00.340000 -CVE-2014-6597,0,0,709c7a9d6277e9046b6935cad351be42eac76e80b0a59bdf22ebfee324991d06,2016-06-23T12:03:14.800000 -CVE-2014-6598,0,0,ef06922fba67692e67803e9df771b277b5b4c2f029fd81511a4c49a6d6a6c4fe,2016-06-23T11:53:26.650000 -CVE-2014-6599,0,0,27f94e661652fbd1664ea7d4327b2ac57d35dbcf46e047c8e88769a63e33910a,2016-06-23T11:55:07.997000 -CVE-2014-6600,0,0,3168eec7abea665a3f9c8f7700bd09f26b2d4dd2cfe354806923bca7ef7c94dc,2016-12-07T03:01:08.563000 -CVE-2014-6601,0,0,10d0b81ac3d543135c5de92593b2c55afd61fd1f6783fa65ae74717059b94e94,2022-05-13T14:57:20.763000 -CVE-2014-6602,0,0,a402d3c7cc3a067e4d9e40bea7b5b0dabe6d8fdb3f14b625049ee3591f91e6dd,2017-09-08T01:29:14.590000 -CVE-2014-6603,0,0,1872a8d8ead99fadfbbd83df818b434a19da6320ff7976e38361c1e8900331c7,2018-10-09T19:51:23.957000 +CVE-2014-6452,0,1,e2e371e5d2396aa2bae179787cf9ef9641268028f2af82255ece2223626c748d,2024-11-21T02:14:24.923000 +CVE-2014-6453,0,1,4138680a184f4380c9a308be8596448610c7b403d863922e05f535fce45dbdd4,2024-11-21T02:14:25.030000 +CVE-2014-6454,0,1,f63fc55c63d05a9b5bab35ba029077d8568aa3a1cb59146a565a930ba6585ff9,2024-11-21T02:14:25.137000 +CVE-2014-6455,0,1,1f21c9e06f2ca266a5b98b396e578be753e4d532ad711d1e4b1b3674a06d2f43,2024-11-21T02:14:25.243000 +CVE-2014-6456,0,1,4189483dcc10cb99e80ddc64b397de9db572c7a9fe0c4798a36ac621b700ad4e,2024-11-21T02:14:25.360000 +CVE-2014-6457,0,1,5273f48f7a0d6e948f1617dbc1fe96455eb7116d9388c28d4d0cee8989eec795,2024-11-21T02:14:25.497000 +CVE-2014-6458,0,1,69aabbecba78a946fa68c05d4f60bf6e941a73ba96e9316bcc40ce1b9aacb456,2024-11-21T02:14:25.653000 +CVE-2014-6459,0,1,1b73f37eab884241b4b98181dda349672106bce792a698ed2bde04ade617c70b,2024-11-21T02:14:25.783000 +CVE-2014-6460,0,1,93eb5afebce1d7a65c55df3b3b527c0d1131d27c809425402daae823b33276e9,2024-11-21T02:14:25.893000 +CVE-2014-6461,0,1,0d210a99ca3fb25fd9f5fe2fd4b869ba9b68c3b98c4ac561e1e9ca484961f569,2024-11-21T02:14:26.030000 +CVE-2014-6462,0,1,c8893de28b1c6abbac9fb6f173af7e51aa08b2f63a1fae810aad8ee8577e18f2,2024-11-21T02:14:26.147000 +CVE-2014-6463,0,1,9830509a84fccae0f5175556b3c9825ccc1e858c8e775daeb7539443b66e4fea,2024-11-21T02:14:26.260000 +CVE-2014-6464,0,1,b806bc9840f183de6e97529cf5a2562e8cb279eaeaf765f03bb92cac896a5bb5,2024-11-21T02:14:26.393000 +CVE-2014-6465,0,1,9e0a26e58e9d1dd62e53026590df066894531ed6f5b7198a4fa40a451d715ca5,2024-11-21T02:14:26.540000 +CVE-2014-6466,0,1,0a2e909e2b65da8124830b58a1f5e9c77b7e429ec9b5ab6ccd73c8c9779dc8c9,2024-11-21T02:14:26.650000 +CVE-2014-6467,0,1,5b2a4a4f7e0ba16833534aa8f0720d44c9fc9e1a6f03d5ad7f8d48539e7cfd3f,2024-11-21T02:14:26.803000 +CVE-2014-6468,0,1,d5934afbd2a47926a6bfe2e1e94af1a2acc56a6e87e068580daa5f44637e473b,2024-11-21T02:14:26.923000 +CVE-2014-6469,0,1,ec5aca56445893314ed311e7bd61b60ae2537523677bb1a46c722c36d5e652cb,2024-11-21T02:14:27.057000 +CVE-2014-6470,0,1,2f2cc7ecbb61e23295005008b23af7363a15030a737453e8283f9deb1baf2b1f,2024-11-21T02:14:27.197000 +CVE-2014-6471,0,1,968c73ed3e62ae5dcd95f217d2cbe41a464809450e102649f28903154c588f5e,2024-11-21T02:14:27.313000 +CVE-2014-6472,0,1,854a9a86652d260a2a3da48abd62fb14fb0e9290a86128ab01d99b8204409c1e,2024-11-21T02:14:27.437000 +CVE-2014-6473,0,1,4638468060f90f49805b26a26d60a9c1b5c8322cb8bdd77451a90e5c9892b7b4,2024-11-21T02:14:27.557000 +CVE-2014-6474,0,1,de52831d4927b2501442f9adee1ddcc5b28179fa78621ed0c54b53617f9f1589,2024-11-21T02:14:27.677000 +CVE-2014-6475,0,1,0742dfd8c7daef6ec4c17b074d336ad6bd738dc03b301864a6d77b9dd765415e,2024-11-21T02:14:27.800000 +CVE-2014-6476,0,1,ba65dfbac1000a6cfa7ad23d554e33b4b6d50f9eb0651c4c9d69ed62c40b33dc,2024-11-21T02:14:27.917000 +CVE-2014-6477,0,1,37bed5aa181dfe3f0dae3040288aa90724286f67ed65d6e91546b8d5ec99b103,2024-11-21T02:14:28.043000 +CVE-2014-6478,0,1,5793d97826be405ac03bbb98e1d335b63ac54a97b81ec2d24eb6cfffc6b97497,2024-11-21T02:14:28.160000 +CVE-2014-6479,0,1,c0e8b79ee22030961b6b51510ab135bd88ddf93034527c7ff2f2081b75a57fcc,2024-11-21T02:14:28.297000 +CVE-2014-6480,0,1,57bbe728c6e6586fc4d59cfe5629c1cf457ab575a2b478f7046a5da35bb53d1e,2024-11-21T02:14:28.433000 +CVE-2014-6481,0,1,7db0ca646c2a78bee7b01c7b9b06b9877c8382cf633a55feee53062615a97339,2024-11-21T02:14:28.563000 +CVE-2014-6482,0,1,efc67054c563c5273fe8fb6f399d6c30252aaeedf0bd6d980e7de3f7933e15ce,2024-11-21T02:14:28.680000 +CVE-2014-6483,0,1,0398be1e70aa2541707da759e98a4ec6b314f5f74209eae011d00210190810bf,2024-11-21T02:14:28.797000 +CVE-2014-6484,0,1,e8f9bf84e8f8c93e4282c7be3d69d8984ad568892608ee7fafa4c7ee8d254497,2024-11-21T02:14:28.913000 +CVE-2014-6485,0,1,e9cf34c3a3b204e489667c2dabb45634ba4b43fa5a1d62b06e96bc77f542ab7d,2024-11-21T02:14:29.030000 +CVE-2014-6486,0,1,e0402eddf37bf12bd2a173b059b9238af5e039d14e2f4ec5f3686a251563ec9b,2024-11-21T02:14:29.153000 +CVE-2014-6487,0,1,28ee70c951fed135c11a1aa3be9df64abe1d638097d8e028ae0e72fe3f6a6784,2024-11-21T02:14:29.273000 +CVE-2014-6488,0,1,5f2d8e9047a9316f5a9f9d624bd3c61ecb68d6988c9575878d77a49a0a5062ce,2024-11-21T02:14:29.383000 +CVE-2014-6489,0,1,5cf8b4e02a4cfbc34ca50cddaeb7bc95c732469e9955be7a5dac3d819feb080a,2024-11-21T02:14:29.503000 +CVE-2014-6490,0,1,c77c38530cd911d270da13b301f227e9260452c84aa66d73dd7fc06aa3fd11b7,2024-11-21T02:14:29.630000 +CVE-2014-6491,0,1,8986d396b58aa9d3925fdf406446ed81e48cc217a5c2f68cb56d6a6dd06c8315,2024-11-21T02:14:29.753000 +CVE-2014-6492,0,1,4fc21501e5800a4a26fa97498605a3443ea3272bc39c1d701e740b1af5cc8168,2024-11-21T02:14:29.910000 +CVE-2014-6493,0,1,e6ef7d851261cf18721aebdafd15e8d51246f556a82c4bbd72330e77c62df1f0,2024-11-21T02:14:30.047000 +CVE-2014-6494,0,1,d8ef2a4367ec5109ad6f7fe747e55719ed79b9795f9a6b7bebefb21eb634f2e2,2024-11-21T02:14:30.190000 +CVE-2014-6495,0,1,bc5b57f78ab8030469c34757bf5538222a0ed21891590b21bbd109eed0608f3b,2024-11-21T02:14:30.330000 +CVE-2014-6496,0,1,1478bbb886e337be76773ad757d168262433a27fd9d328ab804708defe895227,2024-11-21T02:14:30.450000 +CVE-2014-6497,0,1,86326d17d4c77aac110dee5e3c67e3a88d0a7402482e82eb666715a0b463c1b1,2024-11-21T02:14:30.580000 +CVE-2014-6498,0,1,7db61db74479576fd8f37d0515ab54b0bdfca064c85f53866d5748c1ca159842,2024-11-21T02:14:30.690000 +CVE-2014-6499,0,1,26fc924ee349c3395a5bcd9ae2b8d4b3c8aa506a09de89c41de9589ceec6aa29,2024-11-21T02:14:30.803000 +CVE-2014-6500,0,1,983a29d64fdd41f58664034fcdb9b3fe219cc1dc7fbcf90099af5345c6615a61,2024-11-21T02:14:30.920000 +CVE-2014-6501,0,1,70294762c5a91376eb10ec8c9dafb5f1138603bc38193d91f16724531a411a76,2024-11-21T02:14:31.057000 +CVE-2014-6502,0,1,3eb9106edc9301de7df8637e11e2dcc2385a3c786972076a3066ef6e3f5e19ae,2024-11-21T02:14:31.180000 +CVE-2014-6503,0,1,15149f0984b6302a680a82e4f1e2dab1115f78d8fb67d11cfe59042919f50466,2024-11-21T02:14:31.333000 +CVE-2014-6504,0,1,86d220184029447affddf6772afeaf57bc31020414864f8b1ef4600d59d28480,2024-11-21T02:14:31.477000 +CVE-2014-6505,0,1,b8e88b5c7dbb3409aa26476ccd4e510bb6472fe29fb0d49e3826f1e06fba65af,2024-11-21T02:14:31.633000 +CVE-2014-6506,0,1,b0c18ec63d3dd85aa2e403b95cd5ac2eb391877e6ba2b101fecb917665f1498e,2024-11-21T02:14:31.770000 +CVE-2014-6507,0,1,32d33d95bf2e0368385bb2f61bf5bc320f601d501ccb4c6d6dcf7e6201f548fc,2024-11-21T02:14:31.947000 +CVE-2014-6508,0,1,c83d4e4e8de2faf2ccb9ac5b91685b911ad686d464a5a53f17b05d1ba6faa267,2024-11-21T02:14:32.087000 +CVE-2014-6509,0,1,b6201c94cef50dce50d42266ff8a7fa79ab72d598b42f947265f747ee5f72d94,2024-11-21T02:14:32.203000 +CVE-2014-6510,0,1,c1fe09a99d70dc66e54e9bab7670c2d655c5e4047549d9f499b82f71c1df53ad,2024-11-21T02:14:32.320000 +CVE-2014-6511,0,1,9ff281ea7a04dfc5e2e0fdcfab4a9ce14afac6f1b0871abe5adf1525f49fbee6,2024-11-21T02:14:32.440000 +CVE-2014-6512,0,1,10df118208a84d0b8f984e37c2b6a82f6f51b3c9035c5d290be8595eabb87cac,2024-11-21T02:14:32.623000 +CVE-2014-6513,0,1,a5a804c4a4f5d23d2a2c48bce0e2f78972f28c41b9962620f7350ed5add670a3,2024-11-21T02:14:32.797000 +CVE-2014-6514,0,1,06c63176c536356de2c9ed1bc7a0ddfc1d3338bbfed3f40610d2da021aa5c592,2024-11-21T02:14:32.950000 +CVE-2014-6515,0,1,e7a798c4920b9a95b8570e2fd636e39918de2dc4a589a3217cc821903b39bcdc,2024-11-21T02:14:33.080000 +CVE-2014-6516,0,1,7d5fd26ccc2f46e3437f0e91a0c3aa547c3fa5380a782d4b49748f11c291a01e,2024-11-21T02:14:33.227000 +CVE-2014-6517,0,1,913c686b1f4987e8d19a9b9c0a297e216745b540bb6f111c1753a9f17bd5b6fd,2024-11-21T02:14:33.350000 +CVE-2014-6518,0,1,ae07bf58afdbbc3059aacbc03feee28a9d898bd7deb9db229d60b2886243b8a2,2024-11-21T02:14:33.550000 +CVE-2014-6519,0,1,1a4c5fa55fb605d1a30ebddb4e5e8aca73e11f582bc1bb0bf4311e2c94fe0641,2024-11-21T02:14:33.697000 +CVE-2014-6520,0,1,89a60cc338d4b7b6dbc6e0cb74a2c8e9b422cc695b08cc664ec83fc0b73f8bcf,2024-11-21T02:14:33.870000 +CVE-2014-6521,0,1,e9a90e05f699ce7e6388d38ca158f84e750f62e64ef170b13178cd3004709de4,2024-11-21T02:14:34.020000 +CVE-2014-6522,0,1,d234ee16b24da951aa2e020bc4268ec4df67ec2c85368621c701c8aa429bd9b8,2024-11-21T02:14:34.150000 +CVE-2014-6523,0,1,4ba9ce6c7430be6fb39454726f374dea95516aa44ca5f477e6f4909dd6b19b1c,2024-11-21T02:14:34.280000 +CVE-2014-6524,0,1,f3ae293911fd00b26bebcd05a04e036537876291fd2e5f00c9d9138c8de60777,2024-11-21T02:14:34.423000 +CVE-2014-6525,0,1,2d06c5478a58ecdbc00beebe55579168e209aed12347809e399fd84593262ca8,2024-11-21T02:14:34.550000 +CVE-2014-6526,0,1,438162cb0d495ee03c22639c69ef83b41a2c0923715f37815b198df649aac555,2024-11-21T02:14:34.697000 +CVE-2014-6527,0,1,5d3bc4dcdf0ed39e20aa91553d18b896848eda82581967b38565af861f0f53d4,2024-11-21T02:14:34.827000 +CVE-2014-6528,0,1,bbf5bafcfa2b5e73f447e77ffda9bf368c1a9f24091216cb71cab3e327819841,2024-11-21T02:14:34.973000 +CVE-2014-6529,0,1,f5ba2b9aac9e36d92ee9741b6f7af4d7f08a658467e4987c411c70a9539c4a1f,2024-11-21T02:14:35.110000 +CVE-2014-6530,0,1,f06346be8a809547eebe0392db3463244210cece08220379098c4bf2dcfe1cdd,2024-11-21T02:14:35.250000 +CVE-2014-6531,0,1,8727ac23402395de9f5b28acab849c52d9fd2a967ed391ed2ee1bf0cc91bc84b,2024-11-21T02:14:35.410000 +CVE-2014-6532,0,1,7d534b546d4b93450827c3f5da3d83fdbe68edacfb528178f333219748b42b3d,2024-11-21T02:14:35.610000 +CVE-2014-6533,0,1,bb80980bc9a4e86892512722c4ee5a633bd22fb816bd08eeb492cdd5c21f4993,2024-11-21T02:14:35.787000 +CVE-2014-6534,0,1,d7de68332eed3d2dde82eb05f4be30cbe235344c5f46b31e7e9263fef9adbe32,2024-11-21T02:14:35.927000 +CVE-2014-6535,0,1,d247584056c84db554a75c3927a8a3d4e91e98faae402ace8292538aeb1a99a3,2024-11-21T02:14:36.057000 +CVE-2014-6536,0,1,dab6aff36fc7d0dbef8d8c5dada9a64ccd2db7ede2140bcff9a2826d55684ec2,2024-11-21T02:14:36.183000 +CVE-2014-6537,0,1,5da43bf1fd5dddc59d35e7724e4293964e30fee01a05b2b0765f26b41451ab0e,2024-11-21T02:14:36.310000 +CVE-2014-6538,0,1,c82f90fd952086b2a1a9ee1241a5c93f30c09952d55d42a3fb23b7171924c74c,2024-11-21T02:14:36.440000 +CVE-2014-6539,0,1,49854e934064e52b1515745660add30d721e77966e4cfba50e1e71562b58cfe5,2024-11-21T02:14:36.557000 +CVE-2014-6540,0,1,de179afdbfcc6a99723e35e64eec9603e791ba16bfc0672d0c2bb6bc25ad7230,2024-11-21T02:14:36.680000 +CVE-2014-6541,0,1,795f666eeeb4a4d18a2531192bd932fe2fab3045f96bac7beabfddf8193e5d09,2024-11-21T02:14:36.820000 +CVE-2014-6542,0,1,e0008678ec65afbc78bea367f4693b672225828a7df8e07713161a73b6ee4c9f,2024-11-21T02:14:36.937000 +CVE-2014-6543,0,1,d802570042864a7d53e95cb424f874cb3e29e48256158e85ef2a2b441a74b82b,2024-11-21T02:14:37.063000 +CVE-2014-6544,0,1,d23958cf38d561205dff0beb5e983c8f2190372a426646c7b514fb076c1e8a3d,2024-11-21T02:14:37.190000 +CVE-2014-6545,0,1,990f20a9bd8159bfc9120df2a033b31352bd8efa7ec5906c38c1b5004654be43,2024-11-21T02:14:37.310000 +CVE-2014-6546,0,1,311e39aba528f2d6bd2bcf3a0236e462a01b4717c94f483eccd35990d9702f6a,2024-11-21T02:14:37.423000 +CVE-2014-6547,0,1,7d6a324151f99ef0030b39277571ce54fa4c9a4f2dec53c082d30f29b5297a4e,2024-11-21T02:14:37.537000 +CVE-2014-6548,0,1,24c7469c4af56fc77e109d38c34558acaf30bd9b63cbe2322718e0625719ab6e,2024-11-21T02:14:37.660000 +CVE-2014-6549,0,1,6eb0b4ed922eac6fd66fe0e2ff3a92efdc9403e91b4e0cef5ce7dbf979ff5a82,2024-11-21T02:14:37.783000 +CVE-2014-6550,0,1,74802aadc0532248e69c902b2a1a2219ea03e322b22f426efbea9e82e4ad9074,2024-11-21T02:14:37.917000 +CVE-2014-6551,0,1,6b5e174c6bd2534ef1fbc680dac218e6c62556f15fac3a2983b66f7f87ad73e7,2024-11-21T02:14:38.040000 +CVE-2014-6552,0,1,c14fdfaf03a587a07f376290f3fc02ec973c6071e03ef10ddf38286061e13184,2024-11-21T02:14:38.183000 +CVE-2014-6553,0,1,b5097d33b4541232d624bfaa18a74ef899e6fcb7fe2c720b557cbb497eb99a24,2024-11-21T02:14:38.307000 +CVE-2014-6554,0,1,2a930513a7f94cc2e79039f72181b3be88201e98c677ea09dd3c71fbcb6e8997,2024-11-21T02:14:38.427000 +CVE-2014-6555,0,1,43b86ec123fec655863ec2fabcc8ee6b4854b4292300334dc503d3e7d922d611,2024-11-21T02:14:38.553000 +CVE-2014-6556,0,1,28a04dbd2b7ce86a55065a130198b75387a3177e0b4bf9450b17015e0496db75,2024-11-21T02:14:38.723000 +CVE-2014-6557,0,1,405da7e4d0b67b33cb6488654a223cff5c2e147a9023139f2befff9fcb674bad,2024-11-21T02:14:38.843000 +CVE-2014-6558,0,1,1a7384a2b591d40177bffe0e833240b09659218e1d6645459b81eed7ef0ca01f,2024-11-21T02:14:38.967000 +CVE-2014-6559,0,1,9978c8856dca4118cbe4e9a26f27a7e0764a1fe4ecd98d179d9dba44456f1f8c,2024-11-21T02:14:39.137000 +CVE-2014-6560,0,1,c7e15cadf8d08c915f76465c718b5aa4f2833dfd2f53007671821219b3084c0b,2024-11-21T02:14:39.293000 +CVE-2014-6561,0,1,576bca53c06fb871cf828959d6821be855c1b56f94c6e91b5e14247398eb92ad,2024-11-21T02:14:39.430000 +CVE-2014-6562,0,1,c74e809d815a8184eb0add864d6d1b37de1eb3227c2e989ebe3f0a45ddcd44f1,2024-11-21T02:14:39.557000 +CVE-2014-6563,0,1,06a518cdb2539c821c90222ed034ed59da6209dad284bb271b12849e27756104,2024-11-21T02:14:39.690000 +CVE-2014-6564,0,1,c61e3fe6a352ab451923a0417564af1646dbbe43e19f85ccc857b6c43f845afe,2024-11-21T02:14:39.837000 +CVE-2014-6565,0,1,0db2eac9030f524435bc22ed93b541992f7d0eb749b2dcb98aa3c85139fca7d2,2024-11-21T02:14:39.953000 +CVE-2014-6566,0,1,eeadf2fdcfd5bdc393dd88b0145966f23d30533b05f00fbce4d586ebf16bedd3,2024-11-21T02:14:40.077000 +CVE-2014-6567,0,1,2747b52d951204ab3f81fcbded4a7c56575878eb1851646d5e082f09733db749,2024-11-21T02:14:40.203000 +CVE-2014-6568,0,1,d80a475e3c6c75573720093a8c1d74ac8df0a7710dbcfeba518a478b80ce8b0a,2024-11-21T02:14:40.340000 +CVE-2014-6569,0,1,0ff0c300cde1959f0a7bd7440196a570594cf1ce774d74b7c24791c7daf2b193,2024-11-21T02:14:40.517000 +CVE-2014-6570,0,1,aae49d8eecbdec81ad59a974ab9a54bd1cdbf2ed0af7a901f0e03aaee38616a0,2024-11-21T02:14:40.637000 +CVE-2014-6571,0,1,29e9af8a28aea87f04467393fc28e8754c7abda8cb33533b6e14c86a1368264c,2024-11-21T02:14:40.757000 +CVE-2014-6572,0,1,3cb6a77a57d5a2fceb30fbe97652ceee235b41a2fd90d87539df3fd99e6b3605,2024-11-21T02:14:40.880000 +CVE-2014-6573,0,1,8ac185fafd61a63a0ff79e2f140a0c0ae0460cb7770c8fd016f8337aab612295,2024-11-21T02:14:41.007000 +CVE-2014-6574,0,1,4b13e55e77d9c5c576521813812f62a983c2a46b6f6d01d4147aa8d8fb31816d,2024-11-21T02:14:41.127000 +CVE-2014-6575,0,1,5bf229700a988dff2cc61332f8089074ba46286d2aef8fae304c4d327a736d90,2024-11-21T02:14:41.260000 +CVE-2014-6576,0,1,b5354ca36f38d99a5c7daa564248872cad7fe6981bdfee511707046c9ba6a857,2024-11-21T02:14:41.390000 +CVE-2014-6577,0,1,c65fe79ee3c66555e33323d1990fa7bea03d5410477fbacdd799eb0afadda6ff,2024-11-21T02:14:41.517000 +CVE-2014-6578,0,1,bbf66b0eb10e8e80d60e36c889d859f32842800db23eb9f340abea1923a5647e,2024-11-21T02:14:41.647000 +CVE-2014-6579,0,1,f5c5928e5a4d407ec5f50dfbf0fa03f48c77116c5d35cc01bb746d5c0a195126,2024-11-21T02:14:41.783000 +CVE-2014-6580,0,1,8ee82d2597703b080286c60444fa5979431ada9e01ea5b0ab3fc457965b930f9,2024-11-21T02:14:41.913000 +CVE-2014-6581,0,1,cdac807b9e50fa9c6b476ef764c143eebb9dfded1957140a6355ee3da9e557df,2024-11-21T02:14:42.043000 +CVE-2014-6582,0,1,adfff6962789a6c8078078202e2dafd70a980040ecde8a16059b3c180368bb7b,2024-11-21T02:14:42.167000 +CVE-2014-6583,0,1,47abcd7a6e6364f2c5ac15f7bf3ca0cf746636e4d36002f62fbc5cd904e72401,2024-11-21T02:14:42.290000 +CVE-2014-6584,0,1,7dfdad5686b80ea683883b7f291958b8a822138a4d7c9b7bc9c1c341366f79d7,2024-11-21T02:14:42.407000 +CVE-2014-6585,0,1,eddbea782cf6a305833e855db9d187c5d8196d55ddc021e4246c98f3489c85ca,2024-11-21T02:14:42.537000 +CVE-2014-6586,0,1,44e4d697fa377b4c879850c45d5c1614129682c4b2e29f9c16981089507be3cd,2024-11-21T02:14:42.690000 +CVE-2014-6587,0,1,e13e05893497031bfbdf4ee1baaf4df6e9134da245fcb7671a95b07d667a1dcf,2024-11-21T02:14:42.803000 +CVE-2014-6588,0,1,9812f5b9ab8414ea1c88f5c9b06408fbecce953334b5d6a652947f7400e89afa,2024-11-21T02:14:42.940000 +CVE-2014-6589,0,1,2f360cddee222342314c6a4b36b19bb474fa1e0e49236689941f09ffb8edd65f,2024-11-21T02:14:43.080000 +CVE-2014-6590,0,1,a46010b72eca734330e1fcfe4a95a279aa23860ea05edf26d476f54aa1388de7,2024-11-21T02:14:43.207000 +CVE-2014-6591,0,1,f4cc1b4c273baa1af211ce8ae203bfb4cd5b73e8d4175b8de0bcfae916dfb1e1,2024-11-21T02:14:43.350000 +CVE-2014-6592,0,1,e15664e356cbe7d34c2ea50c07fa633175f5c503b6997f572390ecab83cf69e7,2024-11-21T02:14:43.487000 +CVE-2014-6593,0,1,6652fb8f1ae3820768771e78056d2bbc0832fbb28fa810edd7b02ee28b77e6e6,2024-11-21T02:14:43.603000 +CVE-2014-6594,0,1,487f9764fdc83fb7e282b24f0e90b1da02fb0f55294f4930095ed0894ebe3739,2024-11-21T02:14:43.800000 +CVE-2014-6595,0,1,28444917c0f550df7900a4a580867b897b519405df236fd38bb4c5f7b51e4a36,2024-11-21T02:14:43.927000 +CVE-2014-6596,0,1,3d8994ec9403df66365bdb11455262305f8b2c237df38799f1681a7d78db4ff7,2024-11-21T02:14:44.060000 +CVE-2014-6597,0,1,65235a1e64f877114d911d850676a7671c46ce9c8c84a58693dd8b10f4039b76,2024-11-21T02:14:44.180000 +CVE-2014-6598,0,1,3c27c82061ed674a276f2f2555e33caa060034ba2102d9a34eb3fd6c1e7aff10,2024-11-21T02:14:44.300000 +CVE-2014-6599,0,1,c00e2b35a21ed573fa364787385b71173e9f3beee281e5513047877649694613,2024-11-21T02:14:44.423000 +CVE-2014-6600,0,1,9808e3a27f13925145b702527a81586568a87e69d1c3e58a2d0c6fa4320069e2,2024-11-21T02:14:44.543000 +CVE-2014-6601,0,1,5f973959f45af2861a30159e8b15e29351887e61dd0f21cc1b04f86461fe1be1,2024-11-21T02:14:44.660000 +CVE-2014-6602,0,1,43bdacfe3077d70598f1e395a7dd9cb2c522b9db6c347decf8c7e2b0499b7a69,2024-11-21T02:14:44.833000 +CVE-2014-6603,0,1,5a522f4bc5aaa6f677c537165784038caa790fecc3ea446c2ef02262bf313d25,2024-11-21T02:14:44.990000 CVE-2014-6604,0,0,3a7ed328958ce7bebce7bbf923fb97f6ca601a8c642a5264d42b8c77cfd51873,2018-04-19T19:16:37.100000 -CVE-2014-6607,0,0,b4695d767922b7f44cbc4d8c7b70b21fab286932b9e4ae8917bfe3ee6482efda,2014-10-07T23:18:47.217000 -CVE-2014-6609,0,0,dd38b279b27d3e0056ce397de4fd4e245ff684db564f954f2f4af40ed8bc4229,2014-11-26T21:51:09.983000 -CVE-2014-6610,0,0,39734536ce9774e5cc99d0dd394d3bd4e9dcf40b5d6f11d672f079010f325364,2014-11-26T21:33:43.760000 -CVE-2014-6611,0,0,2468f58de550772a577a3b9d42624e19ee392e37dd672158cd9d3e63178a937c,2015-01-28T00:40:07.417000 +CVE-2014-6607,0,1,d20dc9e4cf5cb2a74bc3312ab4ac714709f880eb989491fada172ff4b8e3d92b,2024-11-21T02:14:45.297000 +CVE-2014-6609,0,1,edba5d8fcd3543b9dc13f01592af36827b3911cd43e05c57c62f515d83d7bec4,2024-11-21T02:14:45.450000 +CVE-2014-6610,0,1,ced88cde12277571f896819d320ffd5698ae60cc71b0858d6f8be80006b67f66,2024-11-21T02:14:45.603000 +CVE-2014-6611,0,1,5dfa6869eb3e517bda912da58dce0f6d6203380888db7b028ca32b9a0d5fdca8,2024-11-21T02:14:46.070000 CVE-2014-6616,0,0,308cd43b185318bd8cd8a4a920994fae59357954fce9555b624c708b9bf7e694,2018-10-09T19:51:24.583000 CVE-2014-6617,0,0,c1d00f8e9abf48fa0e52329f90249661259e739ef8e5a2a21db2b87d533a0309,2018-10-09T19:51:24.867000 -CVE-2014-6618,0,0,9d525c774a11af52725f534ea40ef6e92cd1b6ce7052fb48d08839b0b022c4b3,2017-09-08T01:29:14.717000 -CVE-2014-6619,0,0,b8129c904289bcf6c83c02b70cbf076fe7dd2ce02c1d58d053d2a60930c5d7f7,2017-09-08T01:29:14.777000 -CVE-2014-6620,0,0,32e59ef590ab747369e0d9fe8c9781e1ed971f21762ec600f769b2eba04b534a,2014-11-10T13:38:19.597000 -CVE-2014-6621,0,0,124b5a2f0a896198f2b7c393c7c738c505b399b734b62fd42efa1a1b42a7db86,2014-11-19T19:16:23.003000 -CVE-2014-6622,0,0,c09dd1d2e2021143ef66f8db700ac68b240064ee9060ace600abf03a22c5f2a0,2014-11-19T19:17:01.163000 -CVE-2014-6623,0,0,c49a9c06915f735b2a1324ee65ef02813d0caec135b92c1df2c06dfee69420e0,2014-11-10T13:39:48.623000 -CVE-2014-6624,0,0,857750acc476989092b09762f6e2a41e254e3087acaff9ab333384f0e651d3ba,2017-09-08T01:29:14.840000 -CVE-2014-6625,0,0,91f53fa8f6eeb0d2f9936ed4f5e3972deb6b3040e114b5e812e7eef0f246067f,2014-11-19T19:34:53.010000 -CVE-2014-6626,0,0,551d23e81b63b789cdf81a453f48d5a914eebe738e8669a96c1053a14010fd94,2014-11-19T19:22:27.907000 -CVE-2014-6627,0,0,da75e7fb4faa55c9d064ce82eec2755df307583223ddb2fbbd6e5bef097e4ca6,2014-11-19T19:30:56.807000 -CVE-2014-6628,0,0,862ef8f141e89cf759f2e1408fd7de9b8730b278d1d3ada1013db0f57ff30cf9,2015-05-29T14:46:28.697000 -CVE-2014-6631,0,0,1c9e824bc0f1e0074f029a8d098240289492c4382dcac9568f0baf977041d78b,2014-10-09T18:07:25.947000 -CVE-2014-6632,0,0,7e1d5d7fa4982675f3606090164103008ca2e144643cce59182dade897897e20,2014-10-09T16:46:40.220000 +CVE-2014-6618,0,1,14c4eaa14dcc51cadabf3bfd035613e3f42e890e9eb38f4ff0256547531d8f86,2024-11-21T02:14:46.547000 +CVE-2014-6619,0,1,d33470ee7afb5502ef12563874bf26c6dbab09a05d120e74bf2c23180f74f2a1,2024-11-21T02:14:46.757000 +CVE-2014-6620,0,1,122df0035950f201b76b016496d965ac6e6640cb06281107d5bc6d4cc769f8d3,2024-11-21T02:14:47.030000 +CVE-2014-6621,0,1,8bf3287f9777f7b83d1b12b5d555570195d27495605ab9690cfec60a65f1cbd4,2024-11-21T02:14:48.033000 +CVE-2014-6622,0,1,66a35e2fbff3e530d708db95ace12daed6d93e72c2d3e45d58ea9fffc10912c6,2024-11-21T02:14:48.247000 +CVE-2014-6623,0,1,e49a9ec742ea070782613324d42aaf5b4bfbb0ef432b5922c37383bb2a029576,2024-11-21T02:14:48.833000 +CVE-2014-6624,0,1,2533f37192c4141eeaa82eaac04fd19ddce0ac59e8a736ec2dc7a4cf1584af29,2024-11-21T02:14:49.077000 +CVE-2014-6625,0,1,e4296f9060907c470a1244b996c67bb3911716a75fd84a31252cc0d1e1a3467a,2024-11-21T02:14:49.313000 +CVE-2014-6626,0,1,e7dfc0c608e0c9a16e80de70a32f9c07b69bc1d88a07235ce5404bbb1415f6af,2024-11-21T02:14:49.530000 +CVE-2014-6627,0,1,e02e62b4d8869bf8212b9b949b6f38564d57e6677148c92d37831f72d4f7ae57,2024-11-21T02:14:49.767000 +CVE-2014-6628,0,1,6127a89e9e5efef7306209bcc77271ab3f357247ab4e27bbb14a60051268f6a8,2024-11-21T02:14:50.007000 +CVE-2014-6631,0,1,d93795020473a827f4deb2a5dba0735da9d914c776b9edd955b1d6c37b4df756,2024-11-21T02:14:50.237000 +CVE-2014-6632,0,1,09e62c08ee6896cfe25f201b43ac1519ea3feb46dd60f4d345a100479b6d8149,2024-11-21T02:14:50.460000 CVE-2014-6633,0,0,2c2bf1f7908b9d0dccdecd88545b04ea86c1c6f4538ca3e29619ba62ca6447c8,2018-05-22T17:45:18.147000 -CVE-2014-6635,0,0,3e455d4681d948dd8d0748306282a3d8c1543443826e1791a599cc96bc97785d,2017-09-08T01:29:14.887000 -CVE-2014-6636,0,0,a12dad23eb5207c28fda4924c0915cc6bcd25f6aaa7dcf58391b9f75fb1c33c0,2014-12-15T19:37:23.713000 -CVE-2014-6637,0,0,aa06a751e448af7efbfb7cdb05e88ba0edca07cb31646c17224039f4db5d727d,2014-09-26T13:36:54.650000 -CVE-2014-6638,0,0,ae2a486c08519ac6ce6cca9a182efb619ec0bfe938218fd053ea78657a62b63a,2014-09-26T14:22:24.217000 -CVE-2014-6639,0,0,0582d0dbab1c38573a0c5971231290a1191cc09403133608954e4716242220f7,2014-09-26T14:04:02.997000 -CVE-2014-6640,0,0,be4a21a5227ad5ff2443595c5886f984cdde2a550a9bae8cdcefd8d0a1e26f19,2014-09-26T14:11:17.357000 -CVE-2014-6641,0,0,0f9147da131586345cc31e77f65975e8fce60d94c2998aa1db902ec84b5050d1,2014-09-26T14:16:23.317000 -CVE-2014-6642,0,0,1f8978d1c87190232deda68bb26653f04ad24c5338dca4bc24562689dcf063b6,2014-09-26T14:15:35.767000 -CVE-2014-6643,0,0,fd8d9ca6b07799812abacdcd08a98223d011f7838bbe8c117b61457dda1dc709,2014-09-26T14:13:05.847000 +CVE-2014-6635,0,1,a96be761a6f225bb84f9dc95036d08d61e28720d9d177d81c8489ef07535e476,2024-11-21T02:14:50.907000 +CVE-2014-6636,0,1,ea1f9a30885b88128a91cb9db193b37c6d48be361062d6fbc4ad99f0a480263d,2024-11-21T02:14:51.117000 +CVE-2014-6637,0,1,d3ae4f9d1541eafd5afb2ae45e1693d72854a8c5f2371482133773eacaf7f53c,2024-11-21T02:14:51.323000 +CVE-2014-6638,0,1,69b999cf5de0436b3d3aba0506b8e4255db553b1f1d2332e2e626b8e11216928,2024-11-21T02:14:51.523000 +CVE-2014-6639,0,1,23d7dc740848889bf283897cb1c2278afedb12412f19c42ffbb97d5c66b42c23,2024-11-21T02:14:51.750000 +CVE-2014-6640,0,1,643e5bea9d6d0c64705cc139a87cbaedc9be72d6117babb8793fb13415312a46,2024-11-21T02:14:51.970000 +CVE-2014-6641,0,1,46d2ade5e9dfbd678042bdf065267c9b8facd5fe753de2e0366c84a2deab6676,2024-11-21T02:14:52.197000 +CVE-2014-6642,0,1,d4ad97caf20571ab1d49aa10707170d16b729de9d28b932d2f46047cdd40762d,2024-11-21T02:14:52.390000 +CVE-2014-6643,0,1,fef10a82908f04d5a3121b0e61caa007f1ee9732cb92bca9c785addaab2596df,2024-11-21T02:14:52.607000 CVE-2014-6644,0,0,4692baa5cc399da3563059f4da6da75a95bbcf287fb0333930f793cfa1be0cd6,2023-11-07T02:21:04.263000 -CVE-2014-6645,0,0,d1ff4024278dc489549f8cee94e377958c30b123523c8e6aef71f0a0c7fb1785,2014-09-26T14:18:52.920000 -CVE-2014-6646,0,0,c595caffba87e893710de5ee60a95bfa95230253550cfa55045fe44288259d7e,2014-10-24T07:28:45.640000 -CVE-2014-6647,0,0,0ef1cac9ecf47574f8ea09497a1cf1b4dcd7c620890c0cc4b3d8fa5b3cf46263,2014-09-26T14:35:33.677000 -CVE-2014-6648,0,0,a3bc309e0b28ce81f585e394a2253254751bb1e5ce14650b138fafde3d314d95,2014-09-26T14:31:43.113000 -CVE-2014-6649,0,0,3c2e61ae990df0c778cedf4c8bf75d64d42a8c37797f18ffddb2496e1ca8c3a8,2014-09-26T14:28:54.587000 -CVE-2014-6650,0,0,2d90d556ef8bc1f3fc1d02e54c0628fc191fed44061b80ceee55c8d3946f24b0,2014-09-26T14:45:27.453000 -CVE-2014-6651,0,0,c3d13263a0a6ff5e69867c93df459ee33b5f9b33f78fae053a7600fb950b1ade,2014-09-26T14:46:07.863000 -CVE-2014-6652,0,0,1906b69c639fa9cb9afe863713f7dd437db9c2993a2d7c504a666dcf562d4339,2014-09-26T14:51:37.793000 -CVE-2014-6653,0,0,32467d46a45e548adc9a8f8ebf2905fef1e6af5806d4993c6016395795fe25ab,2014-09-26T14:53:37.253000 -CVE-2014-6654,0,0,e89ebcc79abe243aa07367c7681877f4398469d4b68f959334a4d2cf44f1ff48,2014-09-26T15:03:42.687000 -CVE-2014-6655,0,0,d860dc8390ce9627496055bc9620765c0bcc94249b627a45b891f07962122785,2014-09-26T15:05:32.290000 -CVE-2014-6656,0,0,9938401914eec1794c6c5399681cc81b47334985739b9b857315db1fc5ae941f,2014-09-26T15:12:24.770000 -CVE-2014-6657,0,0,998931ad53462d133130cb61f29a7a48934bf46478500bed981099feab04c142,2014-09-26T15:23:38.897000 -CVE-2014-6658,0,0,32c09827d0b9adbf937d0e9435d0aba1837765c12cad80036117226fb3881ec0,2014-09-26T15:24:24.570000 -CVE-2014-6659,0,0,e90fae75ea3e4ccf8d89739e60163569f3a05122c0fc1092a44596cbefa07b73,2014-09-26T15:34:56.553000 -CVE-2014-6660,0,0,beaec8d9bc4170c7d449124a3a13504b907ed6deae8ffb6d59d7206931141995,2014-09-26T15:36:17.543000 -CVE-2014-6661,0,0,16c222789e0b9c33ad2bb951e4cb8c0bd0f0177ebda8d4f0b82ce62ec7913ee5,2014-09-26T15:55:07.827000 -CVE-2014-6662,0,0,ca5be74159f25b92963b76a1b117cb3aaba49395e8db7ce8c8b7def436de68e1,2014-09-26T16:47:57.253000 -CVE-2014-6663,0,0,01e989692c9f006f39fece2b34a3c66b6ece48ff77ee44446f3570de2c0c739e,2014-09-26T17:58:23.143000 -CVE-2014-6664,0,0,530a6bf15e26b9ac0976d8ab40a1f7d17ea60067ca1cc0427e8399addd1434bc,2014-09-29T17:59:43.937000 -CVE-2014-6665,0,0,60171de9e61ac1697e8ed88d13e254f6e3daf87741c640be3bb43164522a2c8b,2014-09-29T01:34:54.873000 -CVE-2014-6666,0,0,64f5857283d6ec2eaa751949c32d913ed69ca679c6c2c6003ab97033c4716b07,2014-09-29T01:38:41.097000 -CVE-2014-6667,0,0,91b65432d03f70d39c2ad7dfbef22da112e2e77c08d9ffc1b39f62b1f41be115,2014-10-03T12:19:15.527000 -CVE-2014-6668,0,0,5d904264fd7b2221a613fefa68b0c5e496adcd139ba29f52d0cd630b5dae5d39,2014-09-29T01:49:34.987000 -CVE-2014-6669,0,0,cef7d3b258f29fe3b2980d3a360289e0fee13059a88267eea75319b3db0d5dbb,2014-09-29T01:50:26.023000 -CVE-2014-6670,0,0,0567c3b5f592950d7f38e9ffa49658338a5123636e527c350e72335f6b2bf6c5,2014-09-29T01:36:40.773000 -CVE-2014-6671,0,0,c11cb53659b2271e371ba37c19a57c776573fd8a5b34f4a8ac1c44469371d083,2014-09-29T01:51:30.260000 -CVE-2014-6672,0,0,97a4f16191efc5f17633d7f0741a4a67bdc36c98b08ad932d95b03eaa935e5d9,2014-09-29T01:52:29.967000 -CVE-2014-6673,0,0,ed68855be20313636cdb9caf0863f834db5b94016c4f0426f869c2d0e430b67f,2014-10-03T12:22:02.653000 -CVE-2014-6674,0,0,d6bb2889ed939094c67744708f94d42002643babc0d3543abb74d2e370bb0b00,2014-10-03T12:22:59.047000 -CVE-2014-6675,0,0,bab0c36738497bfa460e0e6daa8b63033088061090204b5c205b1f1dfa469373,2014-09-29T01:53:42.537000 -CVE-2014-6676,0,0,87c8d4d7480609d59fedd985fbfefbf8e86ee330087cc2b67ec324dcb79b84bb,2014-09-29T01:56:25.003000 -CVE-2014-6677,0,0,27d819c95a67a17244652e4c31e0d09d76f988001368ce092cb3d42193d3593c,2014-09-29T01:57:39.273000 -CVE-2014-6678,0,0,f4d1c85539790c05483a36b5a3bbbf45faa004bd13a7184aca231a4df1320b56,2014-09-29T01:58:35.763000 -CVE-2014-6679,0,0,edf57cb0b017751c8fa4aeb701ba0cf335f2ae6e631cfa7f8a127660c15315b2,2014-10-03T12:23:46.130000 -CVE-2014-6680,0,0,5de26809d8bbeef0e46e44df84a2739278a57bef61fcf85604bb92c03ac67380,2014-10-03T12:25:20.297000 -CVE-2014-6681,0,0,cc1beba2a732c245b983e85d5a5fd0cd1f3e19897f3348a572854ac21f30bb17,2014-09-29T01:59:34 -CVE-2014-6682,0,0,fec638a87234df8826ea786cf60d356c212cbcb87dc48fe24f23188862ebb5a3,2014-10-03T12:26:07.080000 -CVE-2014-6683,0,0,c89738e4ce0566dc5105e88f3db40a152527412625de8de4de28fec51c5767c5,2014-09-29T02:00:23.833000 -CVE-2014-6684,0,0,a3ee858c532b052f4c7fdfa39d5292d3058673d88e2db5b3e74699c0d5d71188,2014-09-29T02:01:12.557000 -CVE-2014-6685,0,0,d126613906ef9718c6a3206e229e782db27850bef95f84e8e0226e6e2758f200,2014-09-29T02:02:00.217000 -CVE-2014-6686,0,0,cc4d0b416872eb913846ebdf98c67cb1588a97d48745465036cdd1c05e7c911b,2014-10-03T12:26:58.383000 -CVE-2014-6687,0,0,4241258e12541a3e40a13e6384948331266aa9e208806eb17ca733ca67cc4c65,2014-10-04T23:46:14.633000 -CVE-2014-6688,0,0,ae2504009d964ecf4ded948bb545a56e646a5d70052baf11e79f5d1eac1c8e66,2014-10-04T23:46:59.857000 -CVE-2014-6689,0,0,05c1055da9c05830cd74be92236cba92d1f772353955d746e8ca90d0cc2092a5,2014-10-04T23:47:53.767000 -CVE-2014-6690,0,0,819d3bb7ba5d867638f1f0be795f21c0922bf4864adfa5ad6420c0ff0fd4ec7f,2014-10-04T23:48:44.490000 -CVE-2014-6691,0,0,e45ea2e07c82353e26d27edd24a79188ffd47fae5dc6aa49d5d7c6cd4cff1a49,2014-10-04T23:49:53.997000 -CVE-2014-6692,0,0,a0287c8e918ff323afb0598b427f800cd46a47b732275a56a46216143dce9be5,2014-10-04T23:53:01.407000 -CVE-2014-6693,0,0,216d0a529029f2d2fefdd1426b0c4986e0691fb3993368cde0ddcd54ad13ba8a,2014-10-04T23:57:32.807000 -CVE-2014-6694,0,0,9204920d78c24c457080c36bfc82387283566874bb8cc04a3733daf0a25d765b,2014-10-04T23:58:21.607000 -CVE-2014-6695,0,0,aea38f410127884f9bc91c88aac7f8e3d7428e43df150b120ddbf1fa1b797621,2014-10-04T23:59:12.567000 -CVE-2014-6696,0,0,47a9f74c6c5278379562b2429186a7bc4acea23bfcf5f0de384a4e67d6b2ac23,2014-10-05T00:00:01.117000 -CVE-2014-6697,0,0,43d56f63397274487d629122d641baec7babbd5c3a4455d60fa85872b3db2347,2014-10-05T00:01:35.580000 -CVE-2014-6698,0,0,dfd0c7dd99093aed70c207e189ba2aeac51bf7a08aac63703d63adc0ed2bbebe,2014-10-05T00:04:43.537000 -CVE-2014-6699,0,0,377203fbb8b4b37c96d55ca69557d97da6e795d4d7d4f4fc0954ad30799147e0,2014-10-05T00:06:28.280000 -CVE-2014-6700,0,0,4294bbbe56eb4bd24eb4eb0a99e2dc74e90ff8f97bda41afe003374f79d780d5,2014-10-05T00:07:29.380000 -CVE-2014-6701,0,0,7e7e829547a2ca18e221995c1b77addc42b205fb85ad668240d5ab7138878c5b,2014-10-05T00:08:22.933000 -CVE-2014-6702,0,0,6243cf9a34f401d02c7f5d4cfa82830c5cf2c59da724253f422b346efd3e3cc1,2014-10-05T00:09:11.107000 -CVE-2014-6703,0,0,5e06a7c9e507f926d8bca891f3efa4984e652e329ecae97ea9ee8883a09d6e60,2014-10-05T00:12:12.187000 -CVE-2014-6704,0,0,d683a2639baef498fe944bf8d8bb2b70eeecab67aa844db7f73c5272334a20fa,2014-10-05T00:14:25.047000 -CVE-2014-6705,0,0,e1a6c88343a086961f4b080c5d7a0d5be0d0a5d26b4371416707b6130b41ea29,2014-10-05T00:15:09.893000 -CVE-2014-6706,0,0,092665450126f342333c6101b79e4f2ba12d4dd8e38e8bfa5664f02bbfdbe1a4,2014-11-14T13:58:30.697000 -CVE-2014-6707,0,0,cdc5b274e1deb04a5a5745990c2bd0d186828faa75fcf24f943467ab53ceb6d0,2014-11-14T13:58:32.227000 -CVE-2014-6708,0,0,0d88361170912856aea9cc7e003a93ed5a83b91954c55570b36acabdf25d5e45,2014-10-05T00:13:17.897000 -CVE-2014-6709,0,0,d31f6e0effcb8b7389ef38860c98408cd242bc67c453403dde5a940047fb77bd,2014-11-14T13:58:33.777000 -CVE-2014-6710,0,0,7eb808f320d649581ad7f6a5c19287612dd0f5f2be11132c530bba8a162df0c4,2014-11-14T13:58:35.323000 -CVE-2014-6711,0,0,b4f2bb48b2399cc25b6f1f51c7c916b16f54460e817f607e25a8dab4af3af193,2014-11-14T13:58:36.837000 -CVE-2014-6712,0,0,6a31a3d27a4782e47701068aad58d99bfa141ac0d2be6462e350fb66d7ca0e43,2014-11-14T13:58:38.277000 -CVE-2014-6713,0,0,40854cafbe796c8493158ef42458a2c33676581697fbdcc0c8c6afc630a9b468,2014-11-14T14:26:04.033000 -CVE-2014-6714,0,0,bb05f00183c696e6dc5cf68239ccae17ef914222dbf6085022174b8a2d36400c,2014-11-14T13:58:39.683000 -CVE-2014-6715,0,0,d0bd97d6d456d98e867895a2caf1ca4333ec27ae9b564496e2a7e7ead28e245d,2014-11-14T13:58:41.387000 -CVE-2014-6716,0,0,fe295afc365de45c95195ca2b1749b1c8d82dd3f0c53079fde7215a600891792,2014-11-14T13:58:43.213000 -CVE-2014-6717,0,0,8c5755ecb30756349193857eb3c052c1e4165e06481798e0deaf9ebd4f79fd24,2014-11-14T13:58:45.057000 -CVE-2014-6718,0,0,d7217726de40c391a088a5d7697564e6b189f5a36de45a9bfa0598c2c488cef0,2014-11-14T13:58:46.760000 -CVE-2014-6719,0,0,d0f27f3d4c52b61854314bdf27a051d6efcdc446c2482599cf4f295641923839,2014-11-14T13:58:48.323000 -CVE-2014-6720,0,0,7e911cba20ef31b138ff0674d11a9f87a74d7cb500206645bea9a337a61906e9,2014-09-26T15:34:11.660000 -CVE-2014-6721,0,0,90c8519721c0db7e4279023b37e1c67c64fe5ef691e7b512c7d61ad9eecc071b,2014-11-14T13:58:49.917000 -CVE-2014-6722,0,0,1690f8d95e231337d5616efe2b98e356a87a5f214b113b5694565f3e739a3f40,2014-11-14T13:58:51.543000 -CVE-2014-6723,0,0,0cf5dec2af5765116a134ff7a9de3362220aef168170cc62c83a31b332fadc63,2014-11-14T13:58:53.123000 -CVE-2014-6724,0,0,868450ccd0eb9810cdd2f5bb1ae9cb95ab138e4447ca69ce68e6eaf63af6f7b8,2014-11-14T13:58:54.623000 -CVE-2014-6725,0,0,d65808ac38e86e361a5e7396fa3248e0b6b13370bf82965b2a06ba26c038eadd,2014-11-14T13:58:56.090000 -CVE-2014-6726,0,0,842a0806e3c293c53be704e5466c70d49d9a17da4bbb16ae3b5fc9a021e5c55c,2014-09-26T14:44:39.543000 -CVE-2014-6727,0,0,8be6cf8f5a868a01c5d7c8446c32b7cd781e2e4049606118461ef22388cf979e,2014-11-14T13:58:57.513000 -CVE-2014-6728,0,0,37da928e74d9a6e5541531dfc9984952c335b828862e72e61ca98b2d20822f64,2014-11-14T13:58:58.983000 -CVE-2014-6729,0,0,82c59aff447cb3c75a0ab6c8adaaa8e7946b75f7e31acc11cee88a030d6e6b85,2014-11-14T13:59:00.513000 -CVE-2014-6730,0,0,5c2239d02f52a81d6aa76e23ca8ffb88decb59bd4a5a649ed39495d9536431a8,2014-11-14T13:59:02.060000 -CVE-2014-6731,0,0,51d90eecf5aa78f61b7ad17ecc426acc661325c9e64f127a47cfec23bda735e5,2014-11-14T13:59:03.593000 -CVE-2014-6732,0,0,cc7391ee0d0e4a40703ff99a41b1884da939c83154da6bbbf47970212f2afe2e,2014-11-14T13:59:05.107000 -CVE-2014-6733,0,0,7fcd104cc7b002ed5e9d3692fff77ac0eb80fedf19519dbf78d97adbdd399093,2014-11-14T13:45:43.990000 -CVE-2014-6734,0,0,4e267b81499d89277925018950586b138953012eb91df5a39692378422e121c9,2014-11-14T13:59:06.640000 -CVE-2014-6735,0,0,df2b6f1e17cb57c0b6b2e21ee70186367d7e956c69f4eeec41b934bc478b9603,2014-11-14T13:59:08.250000 -CVE-2014-6736,0,0,080d192229df91383953182858ed58a16187e58e6ef1800e0062368ec8931a32,2014-11-14T13:59:09.687000 -CVE-2014-6737,0,0,72e0b4f3d81dc5e618a6b8896a147e7e65e99ceeef80df34505c9ad5d16f79a2,2014-11-14T13:59:11.203000 -CVE-2014-6738,0,0,68255882724ec823157bbadc888e11fe135cf17f5dde7e3561a355c195ed5739,2014-11-14T13:59:12.750000 -CVE-2014-6739,0,0,29835a5e26d3bcd2194e0cd7d9c28eb32123e3786031bb3932f9ae6a77a194f3,2014-11-14T13:59:14.237000 -CVE-2014-6740,0,0,7cb005395cb2a037f7de6ddda525326309a63ab59c9c95998fda9f54b02430ba,2014-11-14T13:59:18.687000 -CVE-2014-6741,0,0,d4b1eab30df0f567ae8c92ef1a2206d135fcbdf946574ffd9b2634df1d84e567,2014-11-14T13:59:20.110000 -CVE-2014-6742,0,0,d7309ed4603680b090b03ce0d2dd9a64bd1cf077ea8ead4f852e4d545526da84,2014-11-14T13:59:21.643000 -CVE-2014-6743,0,0,775502274a757a89fc2ceaeafc81b9eebeacddcbf7ceb19a48419d94f50749cf,2014-11-14T14:27:15.843000 -CVE-2014-6744,0,0,cab7a116eff1b274d6001142dbbef1e0c691284a8d13b9c2d9807d70bd95a169,2014-11-14T13:59:23.190000 -CVE-2014-6745,0,0,59057dcfaac4948104302f699e91615664820327ad227c564f853e079a499385,2014-11-14T13:59:24.800000 -CVE-2014-6746,0,0,1a3c118bf7aa9674b93835eed4798e12061203e9f6a9208ee1273e62b752f57b,2014-11-14T13:59:26.283000 -CVE-2014-6747,0,0,f3ae78ed97018b15f5ed76bd0addefdfdef91596382296fa7285854dab049970,2014-11-14T13:59:27.817000 -CVE-2014-6748,0,0,d3249e3e4df6902cea41565d3c557c6b3a3cebe47cb31882b1ebddf209f83758,2014-11-14T13:59:29.283000 -CVE-2014-6749,0,0,965fcf484aa3a95703274ed72b0d8b640676f2c70ab13193eb5cdf2062c4cb2a,2014-11-14T13:59:30.830000 -CVE-2014-6750,0,0,33fa74326c3ea7b0cc28674a6e2ddb297c168a37fc9bf3c63cfbaf4294339077,2014-11-14T14:28:08.197000 -CVE-2014-6751,0,0,ac5b6d9b193865ac4da0f4be3ce255a9b1caf8f8827ef2cbce86e4111c7ef9f8,2014-11-14T13:59:32.330000 -CVE-2014-6752,0,0,bb3786a66d4da0403949f286b66302c0af3ee47ae9788f2040f8a37560c00a7c,2014-11-14T13:59:33.940000 -CVE-2014-6753,0,0,13f5ad9e8dea60fdf3cbb31f658d1dc06cb8f35fa80999614f9105d52947324f,2014-11-14T13:59:35.457000 -CVE-2014-6754,0,0,22c1ab72e913c8436fff395f27a15fad0572493ce2597b90c16674c14a149c8f,2014-11-14T13:59:36.987000 -CVE-2014-6755,0,0,cae755ebdbad60ff3439558ba982f2b9029b8b879a9190be902303368b0b2829,2014-11-14T13:59:38.473000 -CVE-2014-6756,0,0,8e9d4e0022b95ce48726c31cb396f721cf3132d44ae3b1e68d70d528dc9f4a9d,2014-11-14T13:59:40.007000 -CVE-2014-6757,0,0,60525c0033700251339a1b55d78c2355174b9e1c5d39f2bbe97ff07accfe56f6,2014-11-14T13:59:41.520000 -CVE-2014-6758,0,0,7f13dd145e0f4122efe81f514e64b9b9f0670c81edc559bd88e5ef68d245d880,2014-11-14T13:59:43.020000 -CVE-2014-6759,0,0,4a2f36c1baacfaf41859244d89727d7ef0be9de16024b5a3bffb75410234c7fb,2014-11-14T13:59:44.537000 -CVE-2014-6760,0,0,f6b1dea7e075c92d6853606bf51d6e7d25e7d8af32df2b5a5e63a229696df9be,2014-11-14T13:59:46.037000 -CVE-2014-6761,0,0,2e0568e0a5f73173f470d95c3d1e3264ca4ea9da0b714bdaa5be38c599ffa716,2014-11-14T13:59:47.553000 -CVE-2014-6762,0,0,771481789379964ae3337bec2a589775ea1c65bf249e60113b9a44c35fa90ecf,2014-11-14T13:59:49.100000 -CVE-2014-6763,0,0,4b4355713171c675e2dac86ac2c873859bc3c38372ca95291fb9122ff218009b,2014-11-14T13:59:50.710000 -CVE-2014-6764,0,0,351daec6018b13fef7705e95ea9fd4c8fd3ee23eb1eb6b0c25ed173a45a2664f,2014-11-14T13:59:52.397000 -CVE-2014-6765,0,0,07c88a5d71cb5992eddc32e4e6431282513b2be00dfb351a28b85c205864314c,2014-11-14T13:59:54.007000 -CVE-2014-6766,0,0,dd25b735b7fd47e060756b28e5509422c74ad0076287671f292c0e44a0936b52,2014-11-14T13:59:55.507000 -CVE-2014-6767,0,0,da73d56d11af6c02986937c3d309870c1a589243a4e6a917a72d536a121fb799,2014-11-14T13:35:42.877000 -CVE-2014-6768,0,0,0736963bd5b9fa461ca399d691a86278936150d35d47f950a0588b1d39d3e47e,2014-11-14T13:59:56.993000 -CVE-2014-6769,0,0,bd0e352876ae4e322608fa9526801bd1b11bfe3736dc65ebdd0ac041f9c0e410,2014-11-14T13:59:58.523000 -CVE-2014-6770,0,0,db20b697e4a34946640b512474d70c9c970bc2a6961a2da3bc8d57440fdf40cb,2014-11-14T14:00:00.007000 -CVE-2014-6771,0,0,ea4ccabf6b58534400ef49f9caec8ad10e358f30800d7f382570754f9a50268c,2014-11-14T14:00:01.773000 -CVE-2014-6772,0,0,ad27aec0e3f0d9fa1303b73cc0646d8e514a6bdb6be88bb21dafa8b3f90c5a4a,2014-11-14T14:00:07.527000 -CVE-2014-6773,0,0,ca5a81d26b50f0efdbd8245beb9bfe428125fd9c6c54276a9e90afb624f8ce4f,2014-11-14T14:00:11.290000 -CVE-2014-6774,0,0,cb6c5604da4eb2514b16fb50d6f6841f66f9651dcfff1af69407ec2b3a03744a,2014-11-14T14:00:18.277000 -CVE-2014-6775,0,0,9478e3fc5df2f92d83cdc65e7a98693af32c8bc786806f783176c85b0fd14add,2014-11-14T14:00:19.777000 -CVE-2014-6776,0,0,92b5d8a640d93a0509c5e76b3ab5369cb13deff3cd9bee2b46e94bcf7910f59e,2014-11-14T14:00:23.357000 -CVE-2014-6777,0,0,1555ceee90ffbad07fd8171262c46ee15debadc8457110877090928253ca427f,2014-11-14T14:00:26.497000 -CVE-2014-6778,0,0,2ed7c551eb5f6e78cf7cec279e627cca824f64220df43ffe102a018cc30d7067,2014-11-14T14:00:27.810000 -CVE-2014-6779,0,0,4198696e1ccb5cad5c15c731c730e31cf79c499731ddd78af949e4defa420471,2014-11-14T14:00:29.327000 -CVE-2014-6780,0,0,f2b977541a0a560b6b187afa142e2bde98039e090bebdc770e1f6993ce49e981,2014-11-14T13:42:28.067000 -CVE-2014-6781,0,0,660f6439080e1ae0c5802ed17d163b84f089420a020c5825086ad97260ad94b4,2014-11-14T14:00:30.887000 -CVE-2014-6782,0,0,167b0b06de9f4c8a8781a05c9e9c9fe5964599a99727265f65ecdb042a2f2115,2014-11-14T14:00:32.467000 -CVE-2014-6783,0,0,52809bdd5eeec6001fb4bcf3849dde63ef797b7769353b0164172f12e2c42742,2014-11-14T14:00:34.013000 -CVE-2014-6784,0,0,a4cb9d538332c15b8ba20cfa6e5c60e405e95e9bd92356ff85b192d73444403b,2014-11-14T14:00:35.547000 -CVE-2014-6785,0,0,2f198b588e93594905b8b0c9437297c4f7f2387bbcff9f8ec51594f3c67089c8,2014-11-14T14:00:36.997000 -CVE-2014-6786,0,0,65a115333247ec77cb853f8ba7efaa9c8fc85f4a293eb47f8bb5e25e2ec3d9ea,2014-11-14T14:00:38.357000 -CVE-2014-6787,0,0,b3840cf99c70cf63035b0ad1afbd4ba05c0c33327cf6d42e319bddcd533d9786,2014-11-14T14:00:39.967000 -CVE-2014-6788,0,0,25d6150a3e361fb4d2023e060f038858d87e92696efea6947ff599970c78232f,2014-11-14T14:00:41.453000 -CVE-2014-6789,0,0,5ad6789436f11ffe16ca97654422cd57e4df769271b4d67e0f6f69e80f9ec351,2014-11-14T14:00:43 -CVE-2014-6790,0,0,9da2508267c1af29e3ad14431cce39007eec68173172cb955373e440473432a0,2014-11-14T14:00:44.517000 -CVE-2014-6791,0,0,b40e199931c1cd8f1509f34a71f9e019947c09425f667bf46fa09c7e2f2ee68b,2014-11-14T14:00:46.093000 -CVE-2014-6792,0,0,10c0c946fd3c229065016d7d72e1f1ec41dbec3b0c827920f6a50e299d465fdf,2014-11-19T01:57:58.157000 -CVE-2014-6793,0,0,7d1bc3c5047ee09a108413aa4fccd8e320b468cac9b54737bee1210676fb0b7d,2014-11-14T14:00:49.140000 -CVE-2014-6794,0,0,a52b3dc56335d8e2e35821d9c96ef59a133f5325678a1c6edcff91076a1ae170,2014-11-14T14:00:50.593000 -CVE-2014-6795,0,0,181324a2b7d6f39149de80f5a5b684679809573841a6a61c0373227562287d8e,2014-11-14T14:00:52.017000 -CVE-2014-6796,0,0,92caf26782bfaa9e504d040c4961a6a467275516597783d21827e2efa9a12294,2014-11-14T14:00:53.580000 -CVE-2014-6797,0,0,d36dc22b03aa87c21ddd9d30946c4391a65901f9eacde9f565d79f233f2f4b85,2014-11-14T14:00:55.110000 -CVE-2014-6798,0,0,1cd686b2037c08af158d3fae496d2fa181f7779b63e4e0c567874f3657d61fe2,2014-11-14T14:00:56.643000 -CVE-2014-6799,0,0,fbe2eec1d2d897f53e0b56e0ac346ab19811598ff86dc6759d235b022c650151,2021-04-09T17:11:14.180000 -CVE-2014-6800,0,0,32437767c246b9b24eb32b337b19e81385b73e84d080deeac9dbbe22619172cc,2014-11-14T14:01:00.033000 -CVE-2014-6801,0,0,9d5eda724e502b341fe4bb2ce890efb9c33237e29721911de5dbcf424244554e,2014-11-14T14:01:01.707000 -CVE-2014-6802,0,0,3e070849cab86f5185db748104362f460da7f030dde48a4c8535cf45a4468ca1,2014-11-14T14:01:03.427000 -CVE-2014-6803,0,0,ee1c6c6fe853b0607065d5371bf093439698b956a27c83d588165111abef1b04,2014-11-14T14:01:04.910000 -CVE-2014-6804,0,0,81f7182e27e03d40ce8661a67757b6c7477923f988e268cae9a7a89d77d21e70,2014-11-14T14:01:06.440000 -CVE-2014-6805,0,0,e8722210b5c5b6bab3df08a0873f6f32f2cdd9b8e2ce0a9632dcb0527d666c98,2014-11-14T14:01:08.177000 -CVE-2014-6806,0,0,139ff361a862051cb30380642aa4362ba72c92ea559a9e8c7be921ed800d2ad7,2014-11-14T14:01:09.707000 -CVE-2014-6807,0,0,057b3bcaea607d1a014adec407b891a3db69ea4563e395d82c0aec4a629c2135,2014-11-14T14:01:11.223000 -CVE-2014-6808,0,0,a00d9f531bebc60f212d8c7964e5a4f7e67ab81c74964a5809e83bf4d4972ecf,2014-11-14T14:01:12.723000 +CVE-2014-6645,0,1,a9c68c42698092a6c6b65d8b901d4132984e0c5752c66a09cf28db96c77ce81a,2024-11-21T02:14:52.823000 +CVE-2014-6646,0,1,a17023341cb9c200f41406a9abd4dd7c76812a05bb5601f5d82e3d80c74e95ec,2024-11-21T02:14:53.030000 +CVE-2014-6647,0,1,02efec838a9336f516ea668d0cdea4a536c7cb48489f0c0b905752928eed9a94,2024-11-21T02:14:53.257000 +CVE-2014-6648,0,1,623e09b94a5433b9ab47d8377de009b13ae84524e73680f308f923d5ad1b34b0,2024-11-21T02:14:53.457000 +CVE-2014-6649,0,1,ee6f40b0f5303eb4d2221488a9f2bbc738e3447dbdcf24eff0e5411b650fbe33,2024-11-21T02:14:53.650000 +CVE-2014-6650,0,1,d2c253dca09a6022ad328919415ae9b5a4e89d01cf28fd82e236b0d7bf6f54ea,2024-11-21T02:14:53.863000 +CVE-2014-6651,0,1,00d93419ce6c179c14a1fb27aa1e616b62edb05c740f748b613d2be49900db32,2024-11-21T02:14:54.070000 +CVE-2014-6652,0,1,a2a087a93a7292de71cd60f085424477012386ae5913263b4d6e6575513c7209,2024-11-21T02:14:54.320000 +CVE-2014-6653,0,1,c457bf1d26e7be16fe7444def7b17d49f31b6c2345cbace54226775baee5d679,2024-11-21T02:14:54.523000 +CVE-2014-6654,0,1,79d9a22348a2b52e5a37df1880669b32ab609b5e553428b9efd24b6c4fbd5711,2024-11-21T02:14:54.730000 +CVE-2014-6655,0,1,1f1d893dc6102f7510d74f29913cf0ed4506f7a78d6b83a2c2f48fad45f5a018,2024-11-21T02:14:54.917000 +CVE-2014-6656,0,1,aa59c17de467c78ff0344b68772e38f7b6d81aafe5f855285e2d069dfa18f650,2024-11-21T02:14:55.127000 +CVE-2014-6657,0,1,6648d22baa14bf56452dba28e121949cffea14af9c7679c6d5364f34cb066f04,2024-11-21T02:14:55.363000 +CVE-2014-6658,0,1,d53d98b239098a5f8a831168b05732bd33e73b3dfdcff1e8b72a818c2cd5c27d,2024-11-21T02:14:55.560000 +CVE-2014-6659,0,1,9a4a9da2b35c5b0cb3bbd8f8fa3b820cf1e112efde15ca116aba64bd15524c77,2024-11-21T02:14:55.740000 +CVE-2014-6660,0,1,d761140fa2b7c00e2e656a7e87786450c6762c6d1b8b309a057784f37a627fcf,2024-11-21T02:14:55.950000 +CVE-2014-6661,0,1,b4fd16082d1624999028d249e2f1ea6e00da90d3d3a8acd0d6a989033652821f,2024-11-21T02:14:56.130000 +CVE-2014-6662,0,1,339ac482a94f3ebb9aa6135c6f6c8ac1bd7cac6648e5dd45b461e0cb8f43c2fd,2024-11-21T02:14:56.350000 +CVE-2014-6663,0,1,8abf8792bc4821e62160af838ba6530a4b2bc14476c0cf3cae1f80cbf2db4858,2024-11-21T02:14:56.550000 +CVE-2014-6664,0,1,ed5aa49782622fed890ff4ca5f9e139d6accdaf4a40ff1ae9fbc0e40a772cd68,2024-11-21T02:14:56.730000 +CVE-2014-6665,0,1,499f045e91f7c06bc53639aee148cea02966b0bb78303e572eda5b0b8744fa63,2024-11-21T02:14:56.927000 +CVE-2014-6666,0,1,4434d5ff9bcd04e69ce48a04298269ce99a29dcca386c34a3e6c1b951b6400dc,2024-11-21T02:14:57.107000 +CVE-2014-6667,0,1,9988da8c3a8bff4458cdac899bc7c4be4c228ca2a1a3e61dfc9862a76ee2f540,2024-11-21T02:14:57.297000 +CVE-2014-6668,0,1,a51153e4a2307ab1ae2dc5b245e49ba36c93c457aebf6d8fa028ece7ba7cc1fa,2024-11-21T02:14:57.493000 +CVE-2014-6669,0,1,0fd3799f54bcca81ac912edbc60b3d35f2eaf13c2a4184fe2c56dcfd2259d5d1,2024-11-21T02:14:57.663000 +CVE-2014-6670,0,1,8ba7461986873699ef46a1c87b1c4195c986f4817f4fed4d3e339c8fa20b128e,2024-11-21T02:14:57.813000 +CVE-2014-6671,0,1,d749dfed7744759c1afb74394a4d24564035f0e6a883652522b4cf44a2e2383e,2024-11-21T02:14:58 +CVE-2014-6672,0,1,d45e8f99047c1bf4c03a2fc62233a11a61723709aa0de37f80d8f24d3beef427,2024-11-21T02:14:58.197000 +CVE-2014-6673,0,1,b89707ab75d327ad1ca5a336e32df2bf897b5435b06d14149164255107adfb15,2024-11-21T02:14:58.930000 +CVE-2014-6674,0,1,2715d722745484a8200692edc8bfea052b35f608c6bfda0acc9fa1621a7fc8ae,2024-11-21T02:14:59.207000 +CVE-2014-6675,0,1,765bf156fef7e0464d76d46536ac8c4a7e6d253a229e13443cbf49136bb975e9,2024-11-21T02:14:59.440000 +CVE-2014-6676,0,1,312c2a12fe2a0e1df2ada788d1c911d864c9dbc1221bbe0de42291deaa8e8f14,2024-11-21T02:14:59.647000 +CVE-2014-6677,0,1,61747c61a9d4b0964082fd3400e4eb632723d5a16499a66fd7682b2a82408980,2024-11-21T02:14:59.890000 +CVE-2014-6678,0,1,4c15a9fdd0e3b8129bc661e936129f09459e03299b8af54547312afa474aa83d,2024-11-21T02:15:00.133000 +CVE-2014-6679,0,1,914d90b416d54ef309978f0c0f285811aced460bd5288915497bbe2d3f7a6be4,2024-11-21T02:15:00.373000 +CVE-2014-6680,0,1,64ad5df53f949eab4268fa27fca3d471d46627348d3181c33e5961a7aa9e577d,2024-11-21T02:15:00.643000 +CVE-2014-6681,0,1,07c4b2cad33eacaa01e83bb9f94d429d313f8603e1a7df86fb16230dae6c62c4,2024-11-21T02:15:00.897000 +CVE-2014-6682,0,1,b8de8237f72b17c75833cbd62e0037907d3b3dc1fe8701e2adf99492e4423e49,2024-11-21T02:15:01.133000 +CVE-2014-6683,0,1,dc67f2744e5db6fb273d71d99d0f2af4e007638f20944e0017d5e97dfad3915b,2024-11-21T02:15:01.330000 +CVE-2014-6684,0,1,364408f9057dc64074f3247f12d03c33ab5626811c093c14676f38e61b73ed46,2024-11-21T02:15:01.540000 +CVE-2014-6685,0,1,0d1deffb7a7b2911bc18f7e7df58ef1f12c83998439dac09525a1717fc31008e,2024-11-21T02:15:01.750000 +CVE-2014-6686,0,1,05e2eb2aa35647f4d77e18dc6901a7cdd5982bd20066f1b042101d93763e4ee6,2024-11-21T02:15:01.983000 +CVE-2014-6687,0,1,51994250d6070f9b1e7c56dd8d5db6f5adf65b096d45d002215788a1dd1949b5,2024-11-21T02:15:02.180000 +CVE-2014-6688,0,1,126330b7390e4a248741ecfda784b97e503c2fbb3202d7ccc1c1e7e215e1a6e2,2024-11-21T02:15:02.380000 +CVE-2014-6689,0,1,bf756ee7f1346aafadb60f63fee6bcd90de183905a2763c8402bef5a75fc502a,2024-11-21T02:15:02.567000 +CVE-2014-6690,0,1,35aa5312472fa17810f2b35b114382a40e485aee065f4c13fdb69c91f2539c85,2024-11-21T02:15:02.777000 +CVE-2014-6691,0,1,95ce3472b6b0fcdb6dd02dae7a96f3984f6999757f0e791b81bdb548907299d9,2024-11-21T02:15:02.993000 +CVE-2014-6692,0,1,713bd2e712f54e93a9fb481d07234a5ceca8be9edeee4c5ba1e5b74300b9f388,2024-11-21T02:15:03.193000 +CVE-2014-6693,0,1,08dea93c4dd855b66781bb391c2e10b1dae573647d19d5a236ac2591fdc18821,2024-11-21T02:15:03.383000 +CVE-2014-6694,0,1,73d9cd4905ce8dc0d19f5c843a053e914fa8265af33ed38add73b7783915d9bf,2024-11-21T02:15:03.610000 +CVE-2014-6695,0,1,c7e0c3d04662135c6e2f211ab1d00e41a7ecffeff95afa4b47ca7e11af75b610,2024-11-21T02:15:03.793000 +CVE-2014-6696,0,1,028efa79b60917a8f8a955cbded3fd5907a2ef938f4f365fa457402c542d5f9f,2024-11-21T02:15:04 +CVE-2014-6697,0,1,2d09e009ac647803aa2187fcd7469d80f5a20659c7e923376ddc13c144579307,2024-11-21T02:15:04.197000 +CVE-2014-6698,0,1,b449fb30007172a2f6e4d858be87dcef103a287a76988a34bc9c9669544680da,2024-11-21T02:15:04.400000 +CVE-2014-6699,0,1,340213a2e21c56eee9baa82171beb4ad19ff77ced5681e8838468547082ff112,2024-11-21T02:15:04.600000 +CVE-2014-6700,0,1,aef46b6b7b675819d40bf1f9335ed74825f9a3555836c350360b0a166f08fd32,2024-11-21T02:15:04.800000 +CVE-2014-6701,0,1,269989c7c7bc10de626bcc858c0a6437c3517e5a0133f43f1f730a25e9a345a6,2024-11-21T02:15:04.993000 +CVE-2014-6702,0,1,22eeb30fb18517c6426cae0c15c24f19274f030524d8d45211f23a6d6e67185a,2024-11-21T02:15:05.187000 +CVE-2014-6703,0,1,4d8ad1e3dafbc390a16daf90c4fee6fbcd562c33058677d13e43a1d8c816451d,2024-11-21T02:15:05.380000 +CVE-2014-6704,0,1,0e5ac9a678751954c32e3a172c69accd490cba8751a7eb35996ccd3f0e8f13d7,2024-11-21T02:15:05.577000 +CVE-2014-6705,0,1,84636aaecc2bc3cdba6c927bb150226a835512f6fa0da93a371b740844e8d9cf,2024-11-21T02:15:05.760000 +CVE-2014-6706,0,1,97556b1ae7d4a328f8ec47604240889e90da59a164d79f1e3de45586e1e81118,2024-11-21T02:15:05.950000 +CVE-2014-6707,0,1,96df4d78c7a7abbf46671f7730ec4a835e71092acbf16c4f5487e30033712725,2024-11-21T02:15:06.153000 +CVE-2014-6708,0,1,bf053b0fdc63c881244367dd8d24d312ddd5884722c9a9a5947b59a8fa90251f,2024-11-21T02:15:06.350000 +CVE-2014-6709,0,1,9a21a6f928cf1acb7892d96a99850ced040846947818b628e9fe2302cd9ac62b,2024-11-21T02:15:06.540000 +CVE-2014-6710,0,1,40ba0c5c477de78b205e5115876a384ee3a9daff821e3bd96dbe0081ebeadf28,2024-11-21T02:15:06.740000 +CVE-2014-6711,0,1,617f05707b3c72e1027774a6921787429def2673b7a5f054fdca5fc2dfb22d18,2024-11-21T02:15:06.967000 +CVE-2014-6712,0,1,da6d338a70c4022bd5b86919be2f9e13465a1ced4fe451155a355068f22b0b38,2024-11-21T02:15:07.163000 +CVE-2014-6713,0,1,c86f53e7cf5e268c1e71d2d36f006eecec007e2087252432e1b9b5ebfb0d98b1,2024-11-21T02:15:07.357000 +CVE-2014-6714,0,1,b64e227d41fa5a2d500bb592e85d8cd58d51b281b568e4a6d4f1aa09b04ca311,2024-11-21T02:15:07.593000 +CVE-2014-6715,0,1,9aee12d0374ab4c4213d7248dc5529c02fa725bc74d88c06d51f8e0aef8bc9bc,2024-11-21T02:15:07.793000 +CVE-2014-6716,0,1,3abceb2a3f48d9c2e2783df9d19fcb50538a15470ac982a05289a9748229aaa4,2024-11-21T02:15:07.987000 +CVE-2014-6717,0,1,6973f7a189d2acad1bc8665fd90f8d05aa0ac9b86d812e4c84db57ddcdea3efa,2024-11-21T02:15:08.180000 +CVE-2014-6718,0,1,ca5bdffe8b1c9d22977b190f2a0b510bdec25e5db7e442cd6d5c4f78c620ffa3,2024-11-21T02:15:08.423000 +CVE-2014-6719,0,1,baab9fd85299407b7b5686e920993e7d0e63dbd8b9e4d765ce49caacb61d13f5,2024-11-21T02:15:08.620000 +CVE-2014-6720,0,1,f65d90be9b7dcfd6c7d255a8717f1cca2262331022eb21c3c64630224ae99eec,2024-11-21T02:15:08.807000 +CVE-2014-6721,0,1,57fe0ecabe5022a14eaac51e506206064691e936555afc8019c38871d8f60007,2024-11-21T02:15:08.993000 +CVE-2014-6722,0,1,2dbbbf276f5ebda4f1eb07dab8ac32d167edb2cb74c71ea5c3dd442511dcbfbb,2024-11-21T02:15:09.200000 +CVE-2014-6723,0,1,b98e86c1113f267927c634629d536013fdb7ba554c57b3adb60ac263c1de5448,2024-11-21T02:15:09.407000 +CVE-2014-6724,0,1,d3c882b7e53619cbe637117b89dc9a112adc5f4cb16fbd408fce2d7e647e7abd,2024-11-21T02:15:09.600000 +CVE-2014-6725,0,1,a87efe95dcda149e751cd163426a9c9b82f18d1dee0c8defc0a843b9ee861037,2024-11-21T02:15:09.803000 +CVE-2014-6726,0,1,cd855807bded96acd5e803be20403d453241369ede3f42220038deb9681c7b39,2024-11-21T02:15:10.007000 +CVE-2014-6727,0,1,31b5dabb6526135f36bad98349b810ca9cdd89afe7aea7123a54ccf8743b4713,2024-11-21T02:15:10.200000 +CVE-2014-6728,0,1,2881309c3814cca0de35753624962387c4dda4a54b5873253ae8718b62385e87,2024-11-21T02:15:10.377000 +CVE-2014-6729,0,1,868e841e9f8f1170bd2930810ed194ed57159983374786e4176223bc190795ba,2024-11-21T02:15:10.563000 +CVE-2014-6730,0,1,457c39934b59e3149d567719c2f292f21d71b57fe209955160cc05f818fb1cdc,2024-11-21T02:15:10.743000 +CVE-2014-6731,0,1,08e92a2dc801c1fcb8fe5ffd4566401ee32d0a5042c6ecd709bf5bebe1a8ceff,2024-11-21T02:15:10.920000 +CVE-2014-6732,0,1,6b21b7a2607d5846a6eb59cdad95fa4dd9fe024723d208be07f41dffeeece2e1,2024-11-21T02:15:11.100000 +CVE-2014-6733,0,1,505a6b2dc218e2d9d46b87b4788c68f163d810ba249363002c773c6ea4396546,2024-11-21T02:15:11.277000 +CVE-2014-6734,0,1,3b2d3d660aa3735f2a45a151a715e316956d2301de7a217b232152cdc160f6a3,2024-11-21T02:15:11.460000 +CVE-2014-6735,0,1,608ac848edad5fb81f5818a73c3526dae3c494e34883e8a2a448457ca836c154,2024-11-21T02:15:11.650000 +CVE-2014-6736,0,1,fbd1a1539767c19404175827869da4dd7a6148654495f2921546015fc49d1e99,2024-11-21T02:15:11.823000 +CVE-2014-6737,0,1,965770de606644d95dd34baab521aa775ef55055515e577d9d85346446a0f330,2024-11-21T02:15:12 +CVE-2014-6738,0,1,60842ae7c30c873e7a6529c68eb2af336977018ede80ab1057255984199f8867,2024-11-21T02:15:12.187000 +CVE-2014-6739,0,1,534aa80a77280f9f3e8cef1cfbae563ffb1d1053dcbe3aedf94f61b72eeafbdf,2024-11-21T02:15:12.380000 +CVE-2014-6740,0,1,4a01438941b6b7072b8c11a9b1369b7e5ae5cdee82efa44e8570452c7c1b5675,2024-11-21T02:15:12.560000 +CVE-2014-6741,0,1,729801e330831864fa60fa86d1b2a51334df6cb54f76980a241e3a754422ff07,2024-11-21T02:15:12.750000 +CVE-2014-6742,0,1,3120b319076685c2c265d157f340f621393577af337c224eca6038099ee07997,2024-11-21T02:15:12.920000 +CVE-2014-6743,0,1,f805fa6238b05fc04581ad76ca00b971eea858a4c82471706b2e779628598896,2024-11-21T02:15:13.100000 +CVE-2014-6744,0,1,84225b2b8a1599d8752d638465a3850b01babdd8a61cf1a32ce9eaa7ba471347,2024-11-21T02:15:13.293000 +CVE-2014-6745,0,1,e79648e760aeebc17b228e647a9cfada96618bb2517955dab78d7f341549bfca,2024-11-21T02:15:13.473000 +CVE-2014-6746,0,1,6120cd5e99a248840e3af5c76eec8b94ab9d0f5966e4eed04dd2283b168e4b90,2024-11-21T02:15:13.670000 +CVE-2014-6747,0,1,c5fb65862b7eb995362f9bafb1f400168ba9682ac0256791491ca7862753b313,2024-11-21T02:15:13.857000 +CVE-2014-6748,0,1,660f3fb21dbb1482e0dccb1e3ad944b33653cbc1d654f2e7511eb851a106c595,2024-11-21T02:15:14.040000 +CVE-2014-6749,0,1,3263a9675eb8b9c960e27b6a93f6019fdb3a7586dc9d8eb215040152e7d100ac,2024-11-21T02:15:14.227000 +CVE-2014-6750,0,1,283f18f8db420425065d126fc9b11810c2268cb870e7e96e10a43aa372a83409,2024-11-21T02:15:14.407000 +CVE-2014-6751,0,1,b2e1cfd658a19a54591bc20bd2064dff5da2068d7981753be9a1af3c55b0cc3e,2024-11-21T02:15:14.607000 +CVE-2014-6752,0,1,24d7f793ad65c942a01cda9ab27f8983528cc062fb9513f61ff03a6bf22f0917,2024-11-21T02:15:14.810000 +CVE-2014-6753,0,1,b63be83c5e5a32498152b52744ea9547d41cf1a0f54333945ddd95e90a5a4bda,2024-11-21T02:15:14.990000 +CVE-2014-6754,0,1,72515dbfc9435c28f37bc87d00ad2ca1345ac6713e546597e2958cf6e7ff9f5b,2024-11-21T02:15:15.190000 +CVE-2014-6755,0,1,a4ec6a7abeb7ccc1bf49340636515460e90546ce09b99afd5e4e1b2208160314,2024-11-21T02:15:15.387000 +CVE-2014-6756,0,1,99f05e545b7020e222b75c6def4a94fc0b7fc215cf81a607e200e6977188dfc4,2024-11-21T02:15:15.577000 +CVE-2014-6757,0,1,b49b729240bb6cba85f26f238b3368754e21d64a05b317595471189e688190e2,2024-11-21T02:15:15.763000 +CVE-2014-6758,0,1,067868c31095f004821b21a8eb785c68d93dbe7d962cabb03480adb2f68fc195,2024-11-21T02:15:15.950000 +CVE-2014-6759,0,1,1f6290959b18d97f132a121b569c236de0ea641ac682a6602a2578c46807775f,2024-11-21T02:15:16.130000 +CVE-2014-6760,0,1,57698833405abe5a8a3bce79a330f859bd904b181b0acafdfddf0f46e3510439,2024-11-21T02:15:16.313000 +CVE-2014-6761,0,1,7473c1a48cc974472c4a3d390f2edfb6b0dab90994eade891d61746c58ff151d,2024-11-21T02:15:16.500000 +CVE-2014-6762,0,1,ef7461e3e12b1cf608b9c67191a5248dac391c8cdafa83cd78b6fb68e1423e17,2024-11-21T02:15:16.690000 +CVE-2014-6763,0,1,d42490b8daf2e2887414a7821bb2c105f0763c9dd7680228b6fadd3e5d4b8fb8,2024-11-21T02:15:16.870000 +CVE-2014-6764,0,1,40a673f7023e48d085710926dcdba54b86e82b48d11e85ed1d2742a844e95234,2024-11-21T02:15:17.057000 +CVE-2014-6765,0,1,e0cde19ab8f396c8aabf278a59f34b747730aaa2bff1d04b5eae98e697a9cba6,2024-11-21T02:15:17.247000 +CVE-2014-6766,0,1,d552fb5df346a4b3810da22cabbd9b498e71e831847765a21d6d7dcfb016c53c,2024-11-21T02:15:17.437000 +CVE-2014-6767,0,1,17cf4e3db983d63704ac2a9e6168c5bb3ed3788e3fefbbe7834fb7e91866869f,2024-11-21T02:15:17.630000 +CVE-2014-6768,0,1,90a78dd695c71b3d00e6a8634f477531d2d5228157299b1e3014f50286e7fd34,2024-11-21T02:15:17.823000 +CVE-2014-6769,0,1,5f8a070812488908bf88ced5a98d560774545896b82ea8d9eedbe773a190f357,2024-11-21T02:15:18.027000 +CVE-2014-6770,0,1,149466ab9f7cf526e22abe7c12ffbf977d8ab401408ba6cb384db5b1bc76c084,2024-11-21T02:15:18.210000 +CVE-2014-6771,0,1,4a0c0cac90a025580f00d513f11dc614dd468dd1b688465282288c13b18c8ee0,2024-11-21T02:15:18.387000 +CVE-2014-6772,0,1,6348a9d99f502f4efaa0146623ade45c1e8470e3488a5c27e274b5623388e968,2024-11-21T02:15:18.583000 +CVE-2014-6773,0,1,493237b47526204c9e62e33193f9c2090c0601c8f7b9e3053980695bf7d1ab8b,2024-11-21T02:15:18.780000 +CVE-2014-6774,0,1,006b127d34e17f246049cdf2d0e4bbf494b2241e16a2d5265f4863c7d9903ca9,2024-11-21T02:15:18.960000 +CVE-2014-6775,0,1,0cd01c49bb81410eb8d38c6439c44c11362e80cc28207da31579f2d16df36d90,2024-11-21T02:15:19.137000 +CVE-2014-6776,0,1,e6c8088d215e055d933ca37467cf7a32e100fd2afe620d23cad2c3f91c3eea3a,2024-11-21T02:15:19.310000 +CVE-2014-6777,0,1,f78f925d1278b1b9f8c78a167fcf692c7506a930a52d5f0129b370731953b814,2024-11-21T02:15:19.510000 +CVE-2014-6778,0,1,736b0bbb38c969e7c5be835c74b73d4f395ecfdaa242bc259e70ecba282e02da,2024-11-21T02:15:19.693000 +CVE-2014-6779,0,1,ed485a9466ff0b5b0c17673d7f45033c8f79613f34246af1afb44f58a89143b4,2024-11-21T02:15:19.883000 +CVE-2014-6780,0,1,31a035ef332eeab85fed64f1c0328e651dd0cff266fc954d5f254aa084e96860,2024-11-21T02:15:20.080000 +CVE-2014-6781,0,1,fb816fe3bd29181c1017dc3bb84bf67fee3b799bad857d2b108607d64e066c5e,2024-11-21T02:15:20.277000 +CVE-2014-6782,0,1,520ae1adf1bb53a899b9ef75640ee03760fe86bfde6d39e258301dc8eb909caa,2024-11-21T02:15:20.473000 +CVE-2014-6783,0,1,73ba26a0ba84c51b6a087acd14e1eb21868672be727a4d882a4e3be505e1509d,2024-11-21T02:15:20.660000 +CVE-2014-6784,0,1,47c9e366986a7b50d900232a7652626c825c28564332b730132804156c07ac87,2024-11-21T02:15:20.840000 +CVE-2014-6785,0,1,9be6e4fe48d967b3670455050e1531f437c6995e3dd75a1fb9e1651a9a526f0b,2024-11-21T02:15:21.017000 +CVE-2014-6786,0,1,760ef01bbd1a8944e42375bb4a9161e3ce66a459bfed03c81317b3a31037b575,2024-11-21T02:15:21.200000 +CVE-2014-6787,0,1,87a7efa7471804a4a50c974e0b132e8a84522858cdaef739e41390f6d5582ceb,2024-11-21T02:15:21.380000 +CVE-2014-6788,0,1,f2403161c175cf0ce96047e83fdb6b0e48036cd13bacc24601e039d45ad36f46,2024-11-21T02:15:21.577000 +CVE-2014-6789,0,1,bd47470169c34aa913230c5bbbfbcbc2773f9fb1df2a044dc11598bca7d3ff3d,2024-11-21T02:15:21.780000 +CVE-2014-6790,0,1,568899a9ddbb75bcd14b0ba0853d2174dcf3680d480afe57635930f69205372e,2024-11-21T02:15:21.970000 +CVE-2014-6791,0,1,9ff8b2bb4046284b60e0a9d62854d58a33c20edc53dd27836a018b9f33f48564,2024-11-21T02:15:22.153000 +CVE-2014-6792,0,1,6d0760e9f8e4e30aad24e80614475a67612823f0667c6b8a37a42803f2f6d09a,2024-11-21T02:15:22.340000 +CVE-2014-6793,0,1,4974d9f74237a6ef4ebf5273e9c6e3c1adbd38d2ba6456b5e2349b15c81d718f,2024-11-21T02:15:22.520000 +CVE-2014-6794,0,1,90660fa8dcfcaabe7621be8c8a606d498e0000be6ae5d322864102ae1ad00c95,2024-11-21T02:15:22.693000 +CVE-2014-6795,0,1,be49c4b3501ddc635485cec0a7cff407bd694f64d445a7eef60a9d1b22db8c24,2024-11-21T02:15:22.870000 +CVE-2014-6796,0,1,41d377c8470e51c8a71dbd5ba3a5bd05889175c18468b3e5f2be20fae62b43af,2024-11-21T02:15:23.047000 +CVE-2014-6797,0,1,2c6d7e1106996e2afb1a5e6be13df931c283dfba90fdf85304629c779284a6e5,2024-11-21T02:15:23.230000 +CVE-2014-6798,0,1,c9c62df572fbfc0c9e0cfa23cf4cd8899000dabd99b756aee6e0d9aaba3fcff1,2024-11-21T02:15:23.407000 +CVE-2014-6799,0,1,5561dd91510ade8718bf53a7ee8bfb8ea4e396e39ac4df3993b9e60ed2f765d4,2024-11-21T02:15:23.577000 +CVE-2014-6800,0,1,275a596fe3f0242a1f748d637aae853735023598f7dfacad095c2c2af89cfa74,2024-11-21T02:15:23.757000 +CVE-2014-6801,0,1,e9ddf97b1f52021ce2afdbb976593286fb284f1abaa6e1953499901bcc46159b,2024-11-21T02:15:23.940000 +CVE-2014-6802,0,1,eaa0312d99a87932c9e57201495ff0236305a94251617f0aab339c76d1455ce9,2024-11-21T02:15:24.137000 +CVE-2014-6803,0,1,96fa3b332707c2d283a30d25162c71bb002287ab810772fe3fc29da747d92dbb,2024-11-21T02:15:24.323000 +CVE-2014-6804,0,1,460ae54e885809eb1e5be8afb1cb3c296fe890c0c596f35b5bd337c42a3e02ae,2024-11-21T02:15:24.507000 +CVE-2014-6805,0,1,881883cbc3fda116906abfe84ab24285d4ea4578d291c0cee4db672ba5fb2820,2024-11-21T02:15:24.713000 +CVE-2014-6806,0,1,213eaa8417539f4ff653fddf202b88ee5dc17fd1c461813e123e9631618f7a5f,2024-11-21T02:15:24.933000 +CVE-2014-6807,0,1,4358c64ad26a026c34ec189e4e822c02bb46295ce066980bf057b66afb44c3db,2024-11-21T02:15:25.123000 +CVE-2014-6808,0,1,b903d121194ed2aafd1735d586456c0cb2d221857196f48258d073ec8c3b5304,2024-11-21T02:15:25.313000 CVE-2014-6809,0,0,9c44621b0b28ee261a339a4bdc909b4d2ba31ae49b7a98b59ea348434e97e0a9,2023-11-07T02:21:05.680000 -CVE-2014-6810,0,0,d18e0a17ba653e719c18eca8f4f969730456d9cb2c75222d91e82363cabe6c35,2014-11-14T14:01:14.177000 +CVE-2014-6810,0,1,a460e21500dbe4ce95a05479b92b33ba95364c090dbae9bca0921d3be43f9dec,2024-11-21T02:15:25.517000 CVE-2014-6811,0,0,b1bb795445c50bd3ba352ebe40a92ed9d3f6b2cdeaef2c0163130e0295ee6bb6,2023-11-07T02:21:05.970000 -CVE-2014-6812,0,0,6835883cce6b7558e7adcaedb3bed20bcde22f00795414f18c2f7d4a2c264b79,2014-11-14T14:01:15.630000 -CVE-2014-6813,0,0,dd51d2844e4a2f6f85bc66c3b6f0559fa1a74e6d6376206cc0f78953828fb21d,2014-11-14T14:01:17.207000 -CVE-2014-6814,0,0,c86e5f6375dcdda29888c51c056e7e9522e8a06d1282e80970d3fc204aea5ca3,2014-11-14T14:01:18.707000 -CVE-2014-6815,0,0,4e877993e0bce04f3a524a6fdcc9264862843581317e159961bcdb780174daf8,2014-11-14T14:01:20.223000 -CVE-2014-6816,0,0,ff7463fa9b3d6775d0aba1f94c6126389fc252a27ebf69e6d8795cba14de4e5e,2014-11-14T14:01:21.770000 -CVE-2014-6817,0,0,9483c3bf8d25410f6b3436318ba778fba0865675ba81277dbc7d8199b7383ec2,2014-11-14T14:01:23.350000 -CVE-2014-6818,0,0,e7596b2e8df1da5f613151469c5d65b850f2146f6de2714ca62c6bc736ad0c4d,2014-11-14T14:01:24.820000 -CVE-2014-6819,0,0,93b247adae5446e324d14bfd1ea3d3b6df2d8ed1e97a65ecbf1d66640b239d59,2014-11-14T14:01:26.303000 -CVE-2014-6820,0,0,8db756be3351162280f8bf08f156a7721cc103aa63487bda4c9caba00dda7951,2014-11-14T14:01:27.820000 -CVE-2014-6821,0,0,6b100365561101c09af9a29efbe1c962a482d822db344fc693e6f9c976534ce7,2014-11-14T14:01:29.287000 -CVE-2014-6822,0,0,06bdc8f878e36b8465f833c8c8d756f80f3ba27e9751b1a6cd14c02f00edc8b2,2014-11-14T14:01:30.757000 -CVE-2014-6823,0,0,e39b72595a061a3ced0761fe45296714019ab0d067d6d0adaa7ea6295a9cf8fe,2014-11-14T14:01:32.290000 -CVE-2014-6824,0,0,a5caf703772f69e4381dda8b44f4bf9b44aa99bd02cd7f9b8febad8ed9e45ad6,2014-11-14T14:01:33.790000 -CVE-2014-6825,0,0,c00d4a49f6e91053030e0e2440feb572f8e8ad36b46325e0e134825e973fc641,2014-11-14T14:01:35.257000 -CVE-2014-6826,0,0,c638515967d77f7179cadb87f2ba17e4aac43b3b1b85757a2b9bddbb2cda8531,2014-11-14T14:01:36.867000 -CVE-2014-6827,0,0,a00a122a63e1cd9b1ce32245c04c84dce003459f10ec10336405c62698e5c436,2014-11-14T14:01:38.477000 -CVE-2014-6828,0,0,e7afa3eae10bad96521b3f664e0ea4c4fb73855749b86c1dadb9c8a695d7141f,2014-11-14T14:01:40.103000 -CVE-2014-6829,0,0,c81846714887c2b0db7066d761a761813c87484f754476287b45ce0104752837,2014-11-14T14:01:41.573000 -CVE-2014-6830,0,0,0ead310001bfd990badf308892cfc38f6708850c90e9e884adc1e83e7aefe331,2014-11-14T14:01:43.133000 -CVE-2014-6831,0,0,a8e1295b84e4225a31895cba2bbf397acd1a96c4f0fcaf65e2e411c2aa701bc1,2014-11-14T14:01:44.603000 -CVE-2014-6832,0,0,227e470fab0ed6efd957e8bb95f619767478eda979770c5ebb8f914f01e86773,2014-11-14T14:01:46.087000 -CVE-2014-6833,0,0,cb9c027978e298efc3effe0420b9fe6783718e30a6d8849d77f9344ead18b2f3,2014-11-14T14:01:47.587000 -CVE-2014-6834,0,0,57b2c4c1139d1869a6104a7036837a3081616e848228af9df1ac3808e60672eb,2014-11-14T15:23:44.733000 -CVE-2014-6835,0,0,130301c7b7d70c7346473a19839f9af63de5927e10565fb5fe6a631884bcf861,2014-11-14T14:01:51.997000 -CVE-2014-6836,0,0,1ae39dd1d450ae444ff298924e7d34197bef0f9b6bf49a7bbedeadad7f61de27,2014-11-14T14:29:16.597000 -CVE-2014-6837,0,0,6aa58c60bccee40b3e3adc31b237b6ebb4165bca6ed68986ede0eb4ccc23b4c1,2014-11-14T14:01:53.903000 -CVE-2014-6838,0,0,d50e6a6c8116caa65bfae89c80ea5aec07a897d1cab99730d6ce3521f3e3d52c,2014-11-14T14:01:55.527000 -CVE-2014-6839,0,0,f9abae30c0052818dcb5ee06d8a85b5044df993179c2fbff186393a0427de782,2014-11-14T14:01:57.107000 -CVE-2014-6840,0,0,d3a557e21dd1941d8d7920f69e85599fcb1c121921711e73f156f7889993ce1d,2014-11-14T14:01:58.527000 -CVE-2014-6841,0,0,e2bef341594d5061ae15a560c8a7e512393a19f66363de9dc6d19f05fc0e4ace,2014-11-14T14:02:00.060000 -CVE-2014-6842,0,0,7dbcf170a09310b2d58a3dd68965b88834481a3de7979f6c3d16a75fda5b5601,2014-11-14T14:02:01.577000 -CVE-2014-6843,0,0,fedfff037c3357914be26e68a6c26fec3860202c5ef6eddd904846cf86ce80a9,2014-11-14T14:02:03.043000 -CVE-2014-6844,0,0,a981519dc2a5e77c6a9b60c2c3f93c5db52dadac4f6fbc9f184293caf0215624,2014-11-14T14:02:04.637000 -CVE-2014-6845,0,0,78a8e09bda77db7654c5544de5d833ba3ba3adca625e87897746da7de3e8cf52,2014-11-14T14:02:06.187000 -CVE-2014-6846,0,0,90671d0ac2341a358fb99dac71c7af5dc7920b5da8d318e626f6724c8b1d1f12,2014-11-14T14:02:07.687000 -CVE-2014-6847,0,0,b3698ee8cdb7ba9e5917cb14c086aeb340fdc37fc6ef457ca39dae7c5bb3ca71,2014-11-14T14:02:09.373000 -CVE-2014-6848,0,0,44fefb508b6a8e46ec5c23843858af1cb9cfc77c9634b99e0fdf14ba48d0fae9,2014-11-14T14:02:11.077000 +CVE-2014-6812,0,1,89be87d40415180007649bc99301fc90def00cac779006bfd38515d9541604a8,2024-11-21T02:15:25.723000 +CVE-2014-6813,0,1,1f793de92e34110ab15c89d52d5b60a3335e4f33c60ae179b591eaa6c99c29a6,2024-11-21T02:15:25.913000 +CVE-2014-6814,0,1,532641fcf4cf763867785309ef48ee7c02e83d0c0fb2fe2f645e82307ddea7f5,2024-11-21T02:15:26.100000 +CVE-2014-6815,0,1,db115267460af9c10cf5a590608a545857b573a2f1764329886ef7f1d3a279dc,2024-11-21T02:15:26.297000 +CVE-2014-6816,0,1,2c371a97155d7cbee1bb5dab2cbfc67f4d684b91631c64c0d28ed8365386c4f6,2024-11-21T02:15:26.487000 +CVE-2014-6817,0,1,cb740587e2fec4d4231483c15f9bcb187116fa0001118488b20daf623ec91742,2024-11-21T02:15:26.673000 +CVE-2014-6818,0,1,ab2f5c22f85a5956b8c385b204caf16e9def9ba69d065f709361cf45344ca747,2024-11-21T02:15:26.850000 +CVE-2014-6819,0,1,c458fca84b5197a9792c80ed9a4b6f4df580d8034eb4bc0b09dfcfed6456c737,2024-11-21T02:15:27.037000 +CVE-2014-6820,0,1,8cde665b5a058e3d21dfb9079d6753c87c9c80662fecaa9dff25e8a66676c444,2024-11-21T02:15:27.223000 +CVE-2014-6821,0,1,655270774d082d725bead712830c2f4e844a36ec860e0783a3eacff1fd9b622d,2024-11-21T02:15:27.420000 +CVE-2014-6822,0,1,e8bab005a401ea0586de3b1ddc83b448306854afc5674923eccb86d18dff1977,2024-11-21T02:15:27.597000 +CVE-2014-6823,0,1,c984a6dd29591bddfe93ceddf0ceefa928a89ee3f625b77b2543afc6f9b7d33e,2024-11-21T02:15:27.773000 +CVE-2014-6824,0,1,3e5bb86ea2dececd8d914f71c06bffe8eb5e4567e86989dfbd892efd424d82ec,2024-11-21T02:15:27.947000 +CVE-2014-6825,0,1,4719c63a0846f6a3843537b3bd3d825897cd23c5bc45a80693b35d598199de9b,2024-11-21T02:15:28.113000 +CVE-2014-6826,0,1,f7350a7ddd1ed498929944c2351d26351be38c4d0b0a100a6fc4fa44b99cc5a5,2024-11-21T02:15:28.287000 +CVE-2014-6827,0,1,0ebcf3b738f68aa527ed4afe6874eca0ad161b83cb98db95146b6da43cfb564b,2024-11-21T02:15:28.467000 +CVE-2014-6828,0,1,b0689f66e11396c13cf3a79bb0520e6b0a5beea843b8036ca5b5dec8c45ae78c,2024-11-21T02:15:28.660000 +CVE-2014-6829,0,1,2a57a7580bdca3975e5f2ad00f4f6a5462202549f69dda7b23d2c032f706b623,2024-11-21T02:15:28.840000 +CVE-2014-6830,0,1,3853eaf8f0f299b245de1ec5f7c3bc6687fcb369c695c0b091220957d8482dbf,2024-11-21T02:15:29.010000 +CVE-2014-6831,0,1,46107dca5109978734a829a034c13f852887ec05d9f7d09619e6f5352c3b7b87,2024-11-21T02:15:29.190000 +CVE-2014-6832,0,1,ef5759aa57e06ad624653ef83be3b000b30deab39fa2405fb07c24c5ca0c7987,2024-11-21T02:15:29.370000 +CVE-2014-6833,0,1,1de5fbc8576376d9157f2d491c65bea87d2b6653a9ff9a8cd31085858183c75a,2024-11-21T02:15:29.553000 +CVE-2014-6834,0,1,7af33f8fb1139b96fc9b71c4bb1e72a1b8ca8a5b18b7228b26e31010159fe256,2024-11-21T02:15:29.743000 +CVE-2014-6835,0,1,ea2a287fc5a7ae9b6b7d6e29fe74c8c7c42d2875b0709a90fb4d9590bba8f5bb,2024-11-21T02:15:29.923000 +CVE-2014-6836,0,1,8da37e194ad6ed57e2cdb521973bd4caa0e9609e31de598e43a466fade89e5d4,2024-11-21T02:15:30.090000 +CVE-2014-6837,0,1,a1829cf96a07db9cbe4eeb726ac8795901f768eb3c5ba09c12a53d4b726c0171,2024-11-21T02:15:30.290000 +CVE-2014-6838,0,1,4a8adef91e32b58b82d04476c223f47786dbf1769821c5b8ac52bacfae524003,2024-11-21T02:15:30.480000 +CVE-2014-6839,0,1,017f7ed36b32a34e0e6773a04a839196774eb072657a22d81c2751b89af8049f,2024-11-21T02:15:30.667000 +CVE-2014-6840,0,1,167956cde1d8703096e4a5ee72f022c828803f2ce4636c88da76bbc80a6e552b,2024-11-21T02:15:30.847000 +CVE-2014-6841,0,1,5ab0bd7a55b2a2e7d8532d073539b1f9092542f33acb6c08861166bcb2383864,2024-11-21T02:15:31.030000 +CVE-2014-6842,0,1,65af9ebdd792d814c8beeea4cbbb61ce4946376c9408a6b878cc8814dfbdd196,2024-11-21T02:15:31.223000 +CVE-2014-6843,0,1,0ff1663301e72c777d8174520544442c7c282fd097b5ec342ba6679baa73e7d5,2024-11-21T02:15:31.417000 +CVE-2014-6844,0,1,de2ae4daf4dc594ca6def6eb8ae050863bb9421b5cb5765d282854d666cda1d9,2024-11-21T02:15:31.610000 +CVE-2014-6845,0,1,3a58b93d92753b13ea1d9366bce35cabe4b54b110d24542a752d9814a91058f3,2024-11-21T02:15:31.823000 +CVE-2014-6846,0,1,6cf61465c58f0d5cb0bb09962dff7ce39452830c1955cb7ff5a2ab5c1da271da,2024-11-21T02:15:32.010000 +CVE-2014-6847,0,1,1be4e75fb814643038883248998fdc73925ba6cf0374123237be90e91ba08177,2024-11-21T02:15:32.207000 +CVE-2014-6848,0,1,b6d3fbebc8d41a7a8f204ab3df0b5ec463b7293cc4f58bcbf9135ed6b4aa245f,2024-11-21T02:15:32.387000 CVE-2014-6849,0,0,24b8cd1097eddc2d496c0c0c0b0b235e7701c0d30972b6e728b329a0cb2356ba,2023-11-07T02:21:06.457000 -CVE-2014-6850,0,0,13fe5981fcdb81dbdd4cb34cddc3f77ea871f76f3e4e6709be5f9bbd8b52db42,2014-11-14T14:02:12.763000 -CVE-2014-6851,0,0,1df9d98e75625558747d4bb3bf1a35224ff3247988eaa99ac6b9490812d721fb,2014-11-14T14:02:17.250000 -CVE-2014-6852,0,0,c7a6443be9b5a8abeb26247ba69a927104409225aa7ddf877f2e56f9276de69b,2014-11-14T14:02:18.797000 -CVE-2014-6853,0,0,d7e65834de9b6e387f6f3b9cf83788d14b1a217ad7e40af0157a8440bc6611bc,2014-11-14T14:02:20.267000 -CVE-2014-6854,0,0,0b605be287d2810034f32997b949cf1e95d148bbe4c89309809e2e1f43fb53ea,2014-11-14T14:02:21.703000 -CVE-2014-6855,0,0,db93e806f6751c941b56989ef28648e65dedd387351b9eb1dc3a92fb4a0c7d04,2014-11-14T14:02:23.267000 -CVE-2014-6856,0,0,69eb5284ac86f033c42e9a6987056a4ad021d396ebcc5dc9f3ced264f3994da1,2014-11-14T14:02:24.767000 -CVE-2014-6857,0,0,19b803437f716d13a7c51a140464ff706a0a466cd09ad81fe59a8296e8db989f,2014-11-14T14:02:26.267000 -CVE-2014-6858,0,0,c1b3d72f716f2403f9599224fc9a241205c3856b18489db38222517e80d81072,2014-11-14T14:02:27.783000 -CVE-2014-6859,0,0,1b17701fe33f73672f29d7b97464226b051493a6b322035cca15711749665d1c,2014-11-14T14:02:29.283000 -CVE-2014-6860,0,0,8de92973d8879c057a926dc2108cfbba24701a27eeccfd89e8f5d3562fd641ad,2014-11-14T14:02:30.753000 -CVE-2014-6861,0,0,121ca556c19912858ca313e19d33dbaf77324c71a6f23f4d0808cac9004494ae,2014-11-14T14:02:32.267000 -CVE-2014-6862,0,0,ff6b9487339592b591732bd11d978c62f648dbee2c0d88697f361928f5cafcb4,2014-11-14T14:02:33.753000 -CVE-2014-6863,0,0,7d0d1dcc6feec6cd24826b313c69192ee69aa9c8571b3661a934c52848a9f9ee,2014-11-14T14:02:36.503000 -CVE-2014-6864,0,0,685477522c375746af7cc56e24f57b0fbab51610d1e4927f7926f34207be5f0f,2014-11-14T14:02:38.033000 -CVE-2014-6865,0,0,0755e72c3bdce0898cc73a9c5b6ce6095f92113af8ec4f673f13307df8e0d939,2014-11-14T14:02:39.503000 -CVE-2014-6866,0,0,2e846b5fac0653208fe04686e6140e44765fd3db433b8b7d9d47cd6c1d0e9910,2014-11-14T14:02:40.877000 -CVE-2014-6867,0,0,cd06e138eb5440a88d4cee83934ecec59b2bef53dc3d6859cd37564bcfc4e566,2014-11-14T14:02:42.270000 -CVE-2014-6868,0,0,e3dcaa5102a27273f10793df03895447270c4a46bb72988daaaecc2aacac7c0d,2014-11-14T14:02:43.737000 -CVE-2014-6869,0,0,166ac58b2270be3cf1e5943f94a2b724e6420a5fbf129d0f8fd548c9cdac3e8f,2014-11-14T15:30:34.473000 -CVE-2014-6870,0,0,efba18d65064ef940e0be6ea57b310d51f82fed68978b50883439e6ad0734bfc,2014-11-14T14:02:46.723000 -CVE-2014-6871,0,0,697325cd8de9e50268f147efc2f484e536a32d7ed906525f529b4af55695cbd2,2014-11-14T14:02:48.300000 -CVE-2014-6872,0,0,3c163ab260fd377eaba2a874ccdd601d74fb2292ba819b0860a901c0516e2cf5,2014-11-14T14:02:49.803000 -CVE-2014-6873,0,0,b4c444d27027beb16babfdb943136f7f46ecf8cfc8211566a10375df88944ccb,2014-11-14T14:02:51.193000 -CVE-2014-6874,0,0,2a1084bc05ae15082cad562f363b2016ae0260f806dd28097c485133a9e2845f,2014-11-14T14:02:52.630000 -CVE-2014-6875,0,0,41b30f5c6c4bd31ac49748c7fed965fc2aab44b8582de6e410fc67a49d3bf31c,2014-11-14T14:02:54.037000 -CVE-2014-6876,0,0,e4966aa952b4cb414c8b9a24c8b54d6e9a9289c4e74be0be9aeaf244cf5a57bd,2014-11-14T14:02:55.507000 -CVE-2014-6877,0,0,12ae864f96f3137afd1ef267f6b8900b69b7bb56edae320812776eec24c9005c,2014-11-14T14:02:57.023000 -CVE-2014-6878,0,0,68ea377c95351d1a2b65ceca394d4e958d393057a84b2656f2b95466599109fd,2014-11-14T14:02:58.617000 -CVE-2014-6879,0,0,f6d652505705651bb2586a024ae90b1fda8f39d891e56bfd6b5ecc9a70bdfc78,2014-11-14T14:03:00.193000 -CVE-2014-6880,0,0,530498f70e063e53087e3513f9404f0f92775b8d632be52aa199e63b1ac582f4,2014-11-14T14:03:01.727000 -CVE-2014-6881,0,0,4b02640da7a88ec9cba6898d8901fcfc68e88af1388551af4aa7e881d5ee464e,2014-10-16T07:27:09.123000 -CVE-2014-6882,0,0,f45be7b62eebad58a44e93b15a39ad4e207da7c3c4db13aad42f7259b5a499c7,2014-11-14T14:03:03.240000 -CVE-2014-6883,0,0,47a270f2fa68dd116311d283fbdcd3fe13b10f4966727e9f402daa2d4d18b23a,2014-11-14T14:03:04.727000 -CVE-2014-6884,0,0,20a8aa9ab01a86ef762a7e3c897a5fead0b4ad70d0cc7e3680fba6cad485b195,2014-11-14T14:03:06.257000 -CVE-2014-6885,0,0,386db210afead791dfa5b57393346a3bdd2c10422c797f1b948fe744b58a436e,2014-11-14T14:33:22.013000 -CVE-2014-6886,0,0,32700ffe294771e30c0a49be8f85c2aea1b515ac82d83263dc1fe1b5ae418dbc,2014-11-14T14:03:07.790000 -CVE-2014-6887,0,0,7be9967f45fb4319d5286c020166fb6285aed3ef132f90b542e43cc053a92b70,2014-11-14T14:04:15.627000 -CVE-2014-6888,0,0,bf2fc190438c44967856c9cd4f24487021cc8cefefe6747b1847794ba45c8803,2014-11-14T14:03:09.320000 -CVE-2014-6889,0,0,b5fb7d6f851d903aa62221c5c38477ac9aabd9b8f74956d1a7c50f8262a33be0,2014-11-14T14:03:10.807000 -CVE-2014-6890,0,0,35029308a5672f576c3c11ae03f4c5d70f3b63d86f486e49258cf6d0c339b6aa,2014-11-14T14:34:29.757000 -CVE-2014-6891,0,0,fde633928e5e0d7253f370c2c0bdbae8e434300981cd97bc5cc8148bf8c5272c,2014-11-14T14:04:17.253000 -CVE-2014-6892,0,0,e8df413d0af2b2862173781b396f7fafeb95c1b2c8003ba550624fe20bcffa3d,2014-11-14T14:03:12.320000 -CVE-2014-6893,0,0,860d1c4147137f21bfe38d446535e7cb0f91c9af91aa25f7c8de7be5481f9d71,2014-11-14T14:03:13.917000 -CVE-2014-6894,0,0,8f8a76d2e47d35a9fa9f3721f120897d7033d5495336ffa46313a816a4cfd8af,2014-11-14T14:03:15.477000 -CVE-2014-6895,0,0,b3fded1a06895fc1d8ffec91e6336f6bd016c0d2a2bdba3437b2f23b0d5aa1f1,2014-11-14T14:03:16.883000 -CVE-2014-6896,0,0,2af94ab5364b3f2e89fc812a5db90ca03eb42ee51bb844596bb09d424295efa2,2014-11-14T14:03:18.337000 -CVE-2014-6897,0,0,9606a0de61219221f43e35e5ddf69b67a2f758e6f0c33dbe1c082ea2dbd402dc,2014-11-14T14:03:20.027000 -CVE-2014-6898,0,0,14f6262afc75ac8bb4f3236b24ee4f8453a13ee21eda3fbd910face795f0b216,2014-11-14T14:03:22.137000 -CVE-2014-6899,0,0,f742c37c3d9a5bc48c233f6e371be17081f34fb59efef8732165679a595e77bb,2014-11-14T14:03:23.573000 -CVE-2014-6900,0,0,1c0200bc241f903a485716a77ff7d8d58529ec6139b9dbecc837bf3bf70077ed,2014-11-14T14:03:25.090000 -CVE-2014-6901,0,0,47d5d0df5036c037bf018daa1adea3d77068c2ce7236a8d030d69fb121eafe0e,2014-11-14T14:03:26.557000 -CVE-2014-6902,0,0,efd2295b6c4550be1c94a41ea3ca61f32e7bce7314afcc158139cbf6b3b65213,2014-11-14T14:03:28.073000 -CVE-2014-6903,0,0,a2f5437d41ccd39d01367c8806ee74edf40118913b9811732c3353b97c3b7092,2014-11-14T14:03:29.573000 -CVE-2014-6904,0,0,b7070c7ed18ab6ac5520bc951e496c907838eeb22a04f33e70215d24cada0f07,2014-11-14T14:04:18.787000 -CVE-2014-6905,0,0,77820d69c09d0a3bcb0be46635aa44dd018e2a5506ddd303f765ed62399f6ec8,2014-11-14T14:03:31.043000 -CVE-2014-6906,0,0,c0674ddaae763abe7a69bc65240f3a1a534603871c751be6a37bebad89380cfb,2014-11-14T14:03:32.607000 -CVE-2014-6907,0,0,8e14262b5572433ee2a4d3c8e7027e72178406db2a5afa08a001a0586e23c44a,2014-11-14T14:03:34.123000 -CVE-2014-6908,0,0,ca17d064d1c0dc5d9b20ff68eb6b1210ca737638f725a651f2783d66c6bc86af,2014-11-14T14:03:35.683000 -CVE-2014-6909,0,0,7555923b15b9e459cffe42d7f23cc3f1805146578bc04a5510200c2d5881edfb,2014-11-14T14:03:37.263000 -CVE-2014-6910,0,0,550b082d183fda6b8a66ee7556844d45766fd2bd8a5e064f7d2bdc5edb2aadf8,2014-11-14T14:03:38.887000 -CVE-2014-6911,0,0,12c9ccd8b6a5cf0c33e57af31e6a4683f832735b6aacda21f4026d140430f0ca,2014-11-14T14:03:40.387000 -CVE-2014-6912,0,0,ed366b6f5f4a1e55471b276e7f56f0e45420f50f2632ece54bd2fb413ede7382,2014-11-14T14:03:41.887000 -CVE-2014-6913,0,0,1634a774366cbd95fed2f0c532c0aadabb415cb7f37a35aa0eb33e3c615552ce,2014-11-14T14:03:43.373000 -CVE-2014-6914,0,0,8649811f1978c270158807190e83c605ec7fb567b1f0a32a5fbbd5f78c7125f3,2014-11-14T14:03:44.873000 +CVE-2014-6850,0,1,785aa97a65d8a9508e5eea95e7f39c6816904adcb3dff9042d9b4b44f5aead8a,2024-11-21T02:15:32.587000 +CVE-2014-6851,0,1,765d3f8554ca609d4abf98ec9652fa3b85816f6bb661c8ad0bf82a5830020194,2024-11-21T02:15:32.777000 +CVE-2014-6852,0,1,f37a949bd180ba5a27a61c1173da714e9122a93c6b8896361474d3119ac0b20b,2024-11-21T02:15:32.950000 +CVE-2014-6853,0,1,a4736f67c63bcb47fb356b503b440dd3ec947911a3dfe330f06ed57b6f8a7a3b,2024-11-21T02:15:33.133000 +CVE-2014-6854,0,1,ec9b7887f25805dca074fbfe9c02da05bdd5abb3caa15c858f934241623920fd,2024-11-21T02:15:33.320000 +CVE-2014-6855,0,1,5522d061693643691ccc30545545ea4aace93278173c7ef88fb7214f0f1a0cdd,2024-11-21T02:15:33.500000 +CVE-2014-6856,0,1,b26091daf818853e0ced5b74d936fd4a9d480353f1488592b6d945b27ced778f,2024-11-21T02:15:33.700000 +CVE-2014-6857,0,1,ca17d851d63966e0cd7c0a73703420ece28965397c9f82e35abcb33954ecc1b9,2024-11-21T02:15:33.887000 +CVE-2014-6858,0,1,58a02555a59d1aed662b0499ace7ac5ff8ef7c592fbb5d8a94ef51f66b2effc8,2024-11-21T02:15:34.073000 +CVE-2014-6859,0,1,ef8cf27ded1889eb31c7ce5737c55f4532500e4c9f5b0a39fc15e7b1e4f579bc,2024-11-21T02:15:34.253000 +CVE-2014-6860,0,1,1ee74eb6621600f08252d80594a9efbd51e828fcae408a9bd6d6f76e7adabd97,2024-11-21T02:15:34.433000 +CVE-2014-6861,0,1,cb367c1acc220473f72cc77cfcb8be84114c542616baad92af9d0d8e900b5fa7,2024-11-21T02:15:34.610000 +CVE-2014-6862,0,1,cd32cd685974c414065d0b7eab132c9cd0ac6e432954bc166d156fa1386d1d52,2024-11-21T02:15:34.813000 +CVE-2014-6863,0,1,6924fecccc97c9206261c0679406c113c40955a1c3eab1a564e3af5b1f157195,2024-11-21T02:15:34.997000 +CVE-2014-6864,0,1,8c77d9c86de228f0049bae49de0ebc276af4866fbf86de4b8b1ace07863acc0d,2024-11-21T02:15:35.170000 +CVE-2014-6865,0,1,a4008cff2a9502a386ee8ca231f75522c6e8c5a7c63aaec89f4be4d6edf6daf0,2024-11-21T02:15:35.353000 +CVE-2014-6866,0,1,6a94f722f9407d4935b99f36438b89d4510b4ba679abd885d9b488a925db9b92,2024-11-21T02:15:35.530000 +CVE-2014-6867,0,1,9225e5b7bbe7a4a7f6328d0d5293e77c3f1306d3ff54a30f2a3b5b187b7b9dd6,2024-11-21T02:15:35.707000 +CVE-2014-6868,0,1,d406131189de81ef13d0b79b98dc82e9f5f98786ec181ce722b73bb9885eb468,2024-11-21T02:15:35.887000 +CVE-2014-6869,0,1,c4379443e1d3e10473b51b5db170d966bcd1861621394595478e328b7dfed246,2024-11-21T02:15:36.067000 +CVE-2014-6870,0,1,9a56462839cdb309bf15b780e554baeca21d56c0986b9384a0a27b1a4137b06b,2024-11-21T02:15:36.243000 +CVE-2014-6871,0,1,70a42e71d8698ad088027caf15ad3627e38562ce39143f3003a21b43b208bce1,2024-11-21T02:15:36.417000 +CVE-2014-6872,0,1,4a3a3f5a65e5463dc59d2ddc15fb5ffe939eacabed1bce6eea46021ba5daa026,2024-11-21T02:15:36.587000 +CVE-2014-6873,0,1,049b40d4d7ef425d240a78da7cb6175acc6e79ca963a9519b3022db374e989d1,2024-11-21T02:15:36.763000 +CVE-2014-6874,0,1,111db974481b2e0786f13d81639ed18a9beb574bb5f940bcfad9c139afb30edd,2024-11-21T02:15:36.947000 +CVE-2014-6875,0,1,51a83872bc82fccafe1ea312986c7d42269bd99d52b6970d49918bd89acc19ae,2024-11-21T02:15:37.123000 +CVE-2014-6876,0,1,dbd26abbbc542c1ac8089dcd02901019efc9da43f1a723e6064d95654c244a27,2024-11-21T02:15:37.303000 +CVE-2014-6877,0,1,1c12bc143a5fea1b53e5b53b484f1b946d8e8c501a487bc858db790cc71f1079,2024-11-21T02:15:37.480000 +CVE-2014-6878,0,1,a11337a32f575dcc50b7e4316b9acb626fe43016dc6c7fd9339a829b91c0bf12,2024-11-21T02:15:37.660000 +CVE-2014-6879,0,1,5ac1b5c3c71aa7ba0280fa30507a09cd295bf006d3860a19be06ab45bcd247cb,2024-11-21T02:15:37.840000 +CVE-2014-6880,0,1,064e427d4df41299bb1407b99a746042e8b1f2a1fb747849860aaef1a87773d6,2024-11-21T02:15:38.010000 +CVE-2014-6881,0,1,4af285995a49119614df7b13f814d1d669d56da79932b2725e836db61baf6f13,2024-11-21T02:15:38.190000 +CVE-2014-6882,0,1,376c86309a04ece7d560bf60e15addab808a93ff5a837e3fd881689302b18b43,2024-11-21T02:15:38.363000 +CVE-2014-6883,0,1,5236fdf89c4a9d1ce814c388578f5cc3577b438f7da1a8bdc0b2b8c9620cbb58,2024-11-21T02:15:38.537000 +CVE-2014-6884,0,1,e9c048a72814895ddec7392204cb2e19f80e148dd4085e2c3a86da91e4aece8d,2024-11-21T02:15:38.700000 +CVE-2014-6885,0,1,e334f676b6bc445d6f7ec4d574dddc735a1e43727a9b00ed893e8cb90285e49e,2024-11-21T02:15:38.893000 +CVE-2014-6886,0,1,2ea002d0f28a19d5ada8333ce72aba5a86c847fb09143f20f879639d2a4338a3,2024-11-21T02:15:39.093000 +CVE-2014-6887,0,1,db0874d759db5ade1d4632bb06fdb65a353affd15bd24185ae93f9e350045521,2024-11-21T02:15:39.273000 +CVE-2014-6888,0,1,c37c68fe82e6c11e4002161c5a5c054a9cfce88326579d3bd471b644441668f1,2024-11-21T02:15:39.457000 +CVE-2014-6889,0,1,8e2e87b3bf9aac35f1264c7b597a81b13a3fa78b5504a31cd5132668c8c37110,2024-11-21T02:15:39.630000 +CVE-2014-6890,0,1,eb25dcf475f25744fb211806f35bd629313203223b18666c9f0a368c895bfff2,2024-11-21T02:15:39.813000 +CVE-2014-6891,0,1,ec95cd629d88032aeaf06213a4651095c96618d22b5bf749f9121715eee9c798,2024-11-21T02:15:40.010000 +CVE-2014-6892,0,1,2b34e4ee4fd97d266cbea57771ab424bb48bd7df32e42054db11b5d5f7aed76b,2024-11-21T02:15:40.190000 +CVE-2014-6893,0,1,4bb7abb0ede744cff1254a3769cdd4ad2076a835f1627993296a978556a72b87,2024-11-21T02:15:40.363000 +CVE-2014-6894,0,1,89496647adc89fd38b40e8782c4bc31a9bdbb6b0f7089cb74d4a2113313ccfed,2024-11-21T02:15:40.540000 +CVE-2014-6895,0,1,597d195af94ac1557bdeed3ce3bf52385448e35779817214b7e05caa94e87f93,2024-11-21T02:15:40.717000 +CVE-2014-6896,0,1,3e78c7bb908008a162d3a5db5862e417cf669694081d9c662ff2d8d8144dfa45,2024-11-21T02:15:40.903000 +CVE-2014-6897,0,1,fe80fd4d46145d4ccc3101690954755126f58af622be9df98ac5ba0918d0f457,2024-11-21T02:15:41.080000 +CVE-2014-6898,0,1,a3782beafb9e291a1a60bd33529293d44916a4d0ed0e311bb3b93832dee74e67,2024-11-21T02:15:41.260000 +CVE-2014-6899,0,1,eb518511deed6dae9195676b1b16c8fd41b9d675c244c4286adbcdc3baf29eb1,2024-11-21T02:15:41.437000 +CVE-2014-6900,0,1,977044e8d806cea1d08557e5532d64709a9d9141391dfb384b419a33dc844c61,2024-11-21T02:15:41.633000 +CVE-2014-6901,0,1,9f8227a476bbdcb18c967bdbe3ea10ae378622c1b5b6459aa5c7d953076ae805,2024-11-21T02:15:41.817000 +CVE-2014-6902,0,1,5f453b539ecd701be696961bc25e8797ab9e16b52fa5aa7ac7fa877c977da1d8,2024-11-21T02:15:42.013000 +CVE-2014-6903,0,1,604b13ad74b38a859d9d4aee58a204d3832dce6d023ce4dfc788cafed4330204,2024-11-21T02:15:42.203000 +CVE-2014-6904,0,1,0a52e1cf7de72c4b7c47e7a585e982edf879346db042c70388c4cc8f1954eadd,2024-11-21T02:15:42.387000 +CVE-2014-6905,0,1,66a6b31dcc60307106390214684a266eaafcec4f9c40a2fa4d26fd06888387b4,2024-11-21T02:15:42.563000 +CVE-2014-6906,0,1,e33d4ded782737f866915e200be08d307aa110191c62b745ff1b3997557463ec,2024-11-21T02:15:42.747000 +CVE-2014-6907,0,1,7cb68df90d4a67871da2357e5f7ab40fa9f1b287c98e192b72990890c7afaaeb,2024-11-21T02:15:42.933000 +CVE-2014-6908,0,1,528a1515fefa81adb94f3ecd065052816186b9c78066175f4ee07c2343e8a65a,2024-11-21T02:15:43.117000 +CVE-2014-6909,0,1,3aba63d0031ea7b7e0afa7b60321826f6a0945b81728cb3142d8f304609cce48,2024-11-21T02:15:43.293000 +CVE-2014-6910,0,1,87a498215fc09af29ffeee9cac1e6fe56142b75c8889c6aad40e9a13f39c88fb,2024-11-21T02:15:43.470000 +CVE-2014-6911,0,1,5f4308e4d67d00e178d3d8e8bce7ab37b2ef25e511d7836080c2cc7a71660e60,2024-11-21T02:15:43.650000 +CVE-2014-6912,0,1,755de025c6e12d82a59782653a5510c58e8e6f4780dbca887b5116ab7e2ffedd,2024-11-21T02:15:43.827000 +CVE-2014-6913,0,1,4da9a6cf0a2e7037ac84c465865676e9c1bab162511ea517d708a9b49a179a8d,2024-11-21T02:15:44.003000 +CVE-2014-6914,0,1,e884ceed9dfebc855d4c013638148ac9484ec713f978a5031daae207614287f6,2024-11-21T02:15:44.183000 CVE-2014-6915,0,0,f0c76ccbf27c7fa2e7e9ec606f9a7ff9af9bdceb34b2cf6b8f71d7178301782e,2023-11-07T02:21:07.127000 -CVE-2014-6916,0,0,096e8d66c9306efa6e24929b8d41354d5b3f3c0d01ddd1adb8072b9e69685314,2014-11-14T14:03:46.407000 -CVE-2014-6917,0,0,4a8f2c62c561d08066ebd08ce5e668ae95d6a9a3b5395dca63b29534eff05e55,2014-11-14T14:03:47.953000 -CVE-2014-6918,0,0,b237bfbb75e900878616eff165a25cb0c02fc51558a4d9cfc1d085fe6f7c9e08,2014-11-14T14:03:49.530000 -CVE-2014-6919,0,0,eca3dc714d51f6644d17144fd322800a3f9319eeb2b2d49975e3d29e57e5299f,2014-11-14T14:03:51 -CVE-2014-6920,0,0,93bd0595c9be68f0aab4920348729ddb0cdf84de36f2cbe150c46140dc1d3581,2014-11-14T14:03:52.467000 -CVE-2014-6921,0,0,c9ac5c5c462e8b75c9d2a93692d32409717422cae8eae0d8772d2c490dae0526,2014-11-14T14:03:54.360000 -CVE-2014-6922,0,0,1b06cd3fc3fd038614e23c815dc7ec060b20f9fc63349aef8090a29aad78c64d,2014-11-14T14:03:55.860000 -CVE-2014-6923,0,0,2f2df7b8d121141608786e064a89e6bbdbf6b5e780925b3cb79b291566333dc9,2014-11-14T14:03:57.377000 -CVE-2014-6924,0,0,57db76de6e9d94da4095b829c573ad00391a88ec11ffdcfc15e66195538d82b9,2014-11-14T14:03:58.923000 -CVE-2014-6925,0,0,c16d63ef076648fb93c6f231efc3fbf0ae5b85e969b204489a7e5911b5d76105,2014-11-14T14:04:00.437000 -CVE-2014-6926,0,0,2e66b44d9956b28630592db83dde0589256fc4a16f4e30883f2636078c948b59,2014-11-14T14:04:01.940000 -CVE-2014-6927,0,0,73a30b8fdefd00f6f7a7517f1c8359d0a3bd40afe92dd47034735f56ab8ad51f,2014-11-14T14:35:34.270000 -CVE-2014-6928,0,0,aed07f65a41b153e5183cbfcebd78de65cdac04bd5871cfa4caee609bba168a4,2014-11-14T14:04:03.457000 -CVE-2014-6929,0,0,425d9c910721139c0dbbd7169aa2db7df568ad75fc45ec95251b19a725279ebc,2014-11-14T14:04:05.033000 -CVE-2014-6930,0,0,5a2e6b26be8ab8704bcf47db3f41ccbd1e9e15b0e9d4f5354c41dcd2d8b81ddc,2014-11-14T14:04:06.580000 -CVE-2014-6931,0,0,5aee6cbd780a69384935739ff2ca4e3468b3a74d14016cb1d376da844f3ae785,2014-11-14T14:04:08.097000 -CVE-2014-6932,0,0,7ac71f20466bb1c10c74af3486b9119cdd5a33a91b8b965d25a0148fcbf4dbd6,2014-11-14T14:04:09.580000 -CVE-2014-6933,0,0,0d4e78f2d23b05366567567c1299ee9ada0b46ee455a94976ffe2bc12454ce29,2014-11-14T14:04:11.143000 -CVE-2014-6934,0,0,a9e996f5add49a05460d8bf956684abb50bf94f3a08c804b16d31ddd24d534a4,2014-11-14T14:04:20.333000 -CVE-2014-6935,0,0,d78a253ee5e8440a5d3f0c2919386587ad16ae34294eb11943ab5bd6d78a01da,2014-11-14T14:04:21.897000 -CVE-2014-6936,0,0,bbdcdee77f55832876cef4fa1fce2df604e8fd07e62ce05e9b4ed5d656d395eb,2014-11-14T14:04:23.410000 -CVE-2014-6937,0,0,ca3a61a4eb0a1cadfe50d0bec03c4b67f406abc5eea242ef43f58df0c49ddfff,2014-11-14T14:04:24.910000 -CVE-2014-6938,0,0,14a963d1d13d3005d13a618b55d4d7503e072eb9441e78b754263e84b4f125c5,2014-11-14T14:04:26.443000 -CVE-2014-6939,0,0,10ee3215c3e117e214e235e602f4d9e25b12667bceece84168089057f6a71435,2014-11-14T14:04:28.147000 -CVE-2014-6940,0,0,8a1fd47a2e5c7d5b6531ec7cb5df7eea28944f33a625788492c4a66b516d1590,2014-11-14T14:04:30.740000 -CVE-2014-6941,0,0,c9e9fa3e334d14b2f9953c9a0788743d37eba3c34d223da63529a3b4bc905a8f,2014-11-14T14:04:32.287000 -CVE-2014-6942,0,0,872c1e0214bb8aff29a5196070c8cb0c3379e486c06033c3572830edaea1e686,2014-11-14T14:04:33.820000 -CVE-2014-6943,0,0,94b7f5c00493d954b21d3846c2e07d0126b5402f65f5ec02a9b1845e151aff76,2014-11-14T14:04:35.303000 -CVE-2014-6944,0,0,8cd133215ce2f54416279701e908f31d9e102267a5b89799603ebd6a29e7879e,2014-11-14T14:04:36.820000 -CVE-2014-6945,0,0,ac33e07637fd79021bb9bc52003071e58cf325e919578c02f08a62b3c6207030,2014-11-14T14:04:38.273000 -CVE-2014-6946,0,0,bddde4c5dec0b43e4b3b41c2479bdc45411f83feb9ec96c4b94d607d8ce56ec4,2014-11-14T14:36:27.060000 -CVE-2014-6947,0,0,9ea21ef0558cfecf19f53ba0ad4fe81ddd0ac27f87e6ca59247965b6613897cd,2014-11-14T14:04:39.773000 -CVE-2014-6948,0,0,628b6deb2c6cb534cabe25b4a698be9211289d398fdf9088ffab4ebc59a092a3,2014-11-14T14:04:41.307000 -CVE-2014-6949,0,0,e9719b6da9de851f8e4a42f33af60f6dfc07c2a112b89e5f9d7fe8ef3de60e3c,2014-11-14T14:04:42.790000 -CVE-2014-6950,0,0,07d888367241b79abb99354c38ce3639aaaa9ea8f16612d61b31f74eb0236f92,2014-11-14T14:04:44.320000 -CVE-2014-6951,0,0,3e3461678d3bed140b042b9f66862381b6a2139e4ade98b2f80fec59e9705af5,2014-11-14T14:04:45.853000 -CVE-2014-6952,0,0,b831fd142a3f2e12264f7520dd909a424462a39b0f7928ac68bb447c6ee8b42a,2014-11-14T14:04:47.290000 -CVE-2014-6953,0,0,4ad68ba1c1805ced2841e4982a438eaee48d4f910a30f18da7638e438640ccad,2014-11-14T14:04:50.353000 -CVE-2014-6954,0,0,dacf91f097f1e02a6ce4e6b3fe2b3b588e5ea76639e579f645afa0d4b7ea8942,2014-11-14T14:37:28.320000 -CVE-2014-6955,0,0,82da7b9b8e548a738fcd2f7894931be758333d2aeac20cdcbf098c040e5db534,2014-11-14T14:04:51.853000 -CVE-2014-6956,0,0,548048e775ce28731d57b82fbc69ad6c4160039e34c7cb1ae703df8bae1711b7,2014-11-14T14:04:53.370000 -CVE-2014-6957,0,0,40e831fd14f0e5a9ec02285a4c153c2551a0c7cecd4a86c2f15e359269165aab,2014-11-14T14:04:54.917000 -CVE-2014-6958,0,0,f267d2ea70213871b77207c0473ac29aa2ee96f16ea9b26a24490b61d45af243,2014-11-14T14:04:56.573000 -CVE-2014-6959,0,0,3b102b5b9c4d0cca796c08c8e956e6090761818ff6a0732df15b1b8aa1aedc84,2014-11-14T14:04:58.043000 -CVE-2014-6960,0,0,aef1c87defa1536742f2233a5912f70eea90598bf7cbf697949fbb04ad524624,2014-11-14T14:04:59.543000 -CVE-2014-6961,0,0,348b86c40a10f0cb0731b7e92a9a17b065175b3c1d9ff090f3e7668a10efb8fa,2014-11-14T14:05:01.057000 -CVE-2014-6962,0,0,afa03640203c17b7912a6ea109ba0ff734aa2d6a3eb37c824cecfba9686f6341,2014-11-14T14:05:02.730000 -CVE-2014-6963,0,0,291fdc4ae379a5342f5a0d705efe5814e294dbd1203f602e839ee0d7d9903b79,2014-11-14T14:05:04.277000 -CVE-2014-6964,0,0,5e1aa2c86c709722b5d10adec6b1a06907c724407fc38ddb7b08c922f7b1e5e0,2014-11-14T14:05:05.717000 -CVE-2014-6965,0,0,89d7f9c0672d76fe3c1071a7af27e94af946fe6f164472186c4357789eeff707,2014-11-14T14:05:07.217000 -CVE-2014-6966,0,0,27d7a44689d9bae1f2ce84882b30cb32813c9e07d4e05a07d0f095e793ca6cc9,2014-11-14T14:05:08.730000 -CVE-2014-6967,0,0,7ad8676d27da75bfd542cc429ed7c2b025cb456e7ab75d8325985ede696ad516,2014-11-14T14:05:10.247000 -CVE-2014-6968,0,0,f6c95770728c4c3f3b8b16727c072b151866ecba8c6e5b4744baf565d906dd87,2014-11-14T14:05:11.717000 -CVE-2014-6969,0,0,9ed96853f531fbbff1b0e84cb8e97b021384a2d233e18afe4047d129b3bcc4ac,2014-11-14T14:05:13.310000 -CVE-2014-6970,0,0,d3d914ed9c40bf2d83a550242065ef5c95eb689a62b3654fb54d8c05967aa785,2014-11-14T14:05:14.763000 -CVE-2014-6971,0,0,ee849a6ebfe5c4f50171c3503637db9f5108251430ee3bc05d6ec3689b435cf7,2014-11-14T14:05:16.217000 -CVE-2014-6972,0,0,8b7841b497ac0e5daf71c39990413f09a0cbccc2e45dacaa63c128e82cd31894,2014-11-14T15:22:46.177000 -CVE-2014-6973,0,0,2823590a029a1b251d825cdfead5546e8b402f46e33bb63aba80a9e5448f1227,2014-11-14T14:05:19.233000 -CVE-2014-6974,0,0,7eacedfe4072ae8ca99d1a26dc3f0b14787bf751a62f9d235522b517694b9562,2014-11-14T14:05:20.733000 -CVE-2014-6975,0,0,e40a1de4bac41597afa6352a3f5809ba97db510bb217fefb87755be3e9e87de3,2014-11-14T14:05:22.280000 -CVE-2014-6976,0,0,cb7d1baad1719c77c598a8528e0bed2d6b12df42588b8f764c8343d038ae09ad,2014-11-14T14:05:23.733000 -CVE-2014-6977,0,0,54f2413fdf9bbf41db27c4223c5328d5fa12170a9f4121add2131ca18244846e,2014-11-14T14:05:25.187000 -CVE-2014-6978,0,0,b109c52050b71c7065c7d5848e57c1695f900d4f4e024b0236eab459c14d5240,2014-11-14T14:05:26.640000 -CVE-2014-6979,0,0,bb062faeba7911adbe15495a0db557cc155a972031a3b3706df5148d141e7e98,2014-11-14T14:05:28.093000 -CVE-2014-6980,0,0,e740e40f6176d3f4dd2a352d815ef437e0b697b30c632513c739e961361a3d9e,2014-11-14T14:05:29.627000 -CVE-2014-6981,0,0,88172153b5778c4bc66e494c074d8572bfdefeb491e0c5167601d0f7feeb46db,2014-11-14T14:05:31.157000 -CVE-2014-6982,0,0,56f5e81bef139959a3279d4add3518bcd078edbb20e260f67f2fece4408d29f9,2014-11-14T15:31:37.423000 -CVE-2014-6983,0,0,0a645c827b8ea35c89381a3932073fa9136aa9cd6ac9e4bc888b43f449070d52,2014-11-14T14:05:34.157000 -CVE-2014-6984,0,0,bebf8ee8bbf48360e227d2a389be9daf67500bf00d14853af34c14ad5ae3db8e,2014-11-14T14:05:35.657000 -CVE-2014-6985,0,0,a971fbdd1725b8bc924606842929e03cbd6208834ea3e5adc33ed230263c4e84,2014-11-14T14:05:37.393000 -CVE-2014-6986,0,0,6bc42258b9b2c1c543010f4b039696f96f8d1e5efc4c57414c6a437f63bdb9e5,2014-11-14T14:05:39.253000 -CVE-2014-6987,0,0,f99be3fd41094349d160d75131807d286b97906f0ee121f5bec64580ff6a0c83,2014-11-14T14:05:41.017000 -CVE-2014-6988,0,0,339fbf48ec1b0fd4f65d69a23473a25f2d5218feea358eaaccc871a8c0686614,2014-11-14T14:05:42.613000 -CVE-2014-6989,0,0,40ec8cb549893433cb92572de1f92d59c54039196a85322581bf5a138d49ec31,2014-11-14T14:05:44.097000 -CVE-2014-6990,0,0,065c1d9ca6e4f2eb3162a5375c3696bb0748e1ba1651655450ed8d52970133ef,2014-11-14T14:05:45.580000 -CVE-2014-6991,0,0,6da53dc2b01190bdea24779964619c42bf21eb55f538df7d3e2c8bc358ebf49d,2014-11-14T14:05:47.067000 -CVE-2014-6992,0,0,bf1820e3c366eed8c8b35e4e29852e5fffbac378a48092071a1da0e192d8e01c,2014-11-14T14:05:48.473000 -CVE-2014-6993,0,0,15251e57e663ab8873a89f95f0121cf8c8fbb0e0010da6df07d2301e083ca193,2014-11-14T14:05:49.957000 -CVE-2014-6994,0,0,38dd44dc5798a5d3f9b0428124fbe986d64df74f7ee6cd025178c0fb66aaba76,2014-11-14T14:05:51.440000 -CVE-2014-6995,0,0,03b8e3d87f0d0e81287ee3442e189e20fe6ba04fec64e8f8f6a0ee2f370409f8,2014-11-14T14:05:52.897000 -CVE-2014-6996,0,0,383b8ffddca34d24c9684aa7268845db060b0c3590c3c4f3c77f5d38378db04f,2014-11-14T14:05:54.380000 -CVE-2014-6997,0,0,8c2b580ba6a7214a9b2430086deb263b578cc0c44cee4a1acd6557d7754e0269,2014-11-14T14:05:55.910000 -CVE-2014-6998,0,0,7640fbc79a22ac6004f2c66ab39db3f343a08295a998f655c69128d5a5b861aa,2014-11-14T14:05:57.427000 -CVE-2014-6999,0,0,8cb872dc6834278e67d405b420ddd99ace3ac53d73b52d34ed7a442aa05c5a7a,2014-11-14T14:05:58.910000 -CVE-2014-7000,0,0,610b1e112d557671a22c1b501ad1458309e6b65ed0eef29a1f5d64e1cbac72ad,2014-11-14T14:06:00.413000 -CVE-2014-7001,0,0,4ee5e8617a718262b0b5d4dec76f34cdb9b346862cf41e86a2184e39d7626251,2014-11-14T14:06:01.897000 -CVE-2014-7002,0,0,5de6482ecbeae53167678bd5dca8dd2ab7dae9d40ff513dc81e422299cc7a57e,2014-11-14T14:06:03.413000 -CVE-2014-7003,0,0,1af0727766d15532556309afbc71bc702fa178b6f1cd9ec07cfaa4abe80cdd57,2014-11-14T14:06:04.960000 -CVE-2014-7004,0,0,28bdb0909f7c345a5b072bf33a12281636621c89f3eccb48c86c1d39047da449,2014-11-14T14:06:06.477000 -CVE-2014-7005,0,0,32ab79bd89384e79dd01e285468bc05ca58ca131e1eb4bd693e000ac1297db09,2014-11-14T14:06:07.977000 -CVE-2014-7006,0,0,0cca3e52beefe49238550a71a9c26bb485d05018199b8ac1ccd4ee0349d4a909,2014-11-14T14:06:09.477000 -CVE-2014-7007,0,0,8df60dc55b96de61ff081a01b171bfe77a167946a5d0b51559fb47cb9e4587e5,2014-11-14T14:06:10.960000 -CVE-2014-7008,0,0,6e90c077531d86d4f18f1bc70fe74112de69cd793040427d1b9e59b27c9b4df0,2014-11-14T14:06:12.447000 -CVE-2014-7009,0,0,fabb8a88a481cdf1e92fc28bd1b73358b4981badac685f376ed0435c1f8ea9fb,2014-11-14T14:06:13.947000 -CVE-2014-7010,0,0,dc868f248b6a9625820227fe00d7d40144fb094323d5ca1e05cb908cdd29cae2,2014-11-14T14:06:15.460000 -CVE-2014-7011,0,0,e0ce73a3f8a9b45bb01b8a851ea41579752600e18771d9490f2ba383d7e89c66,2014-11-14T14:06:16.930000 -CVE-2014-7012,0,0,386bcfacc1d83afb3fb5a79c2ef6269dcc113c7b806dc5a23d3b1ecf36aa9552,2014-11-14T14:06:18.460000 -CVE-2014-7013,0,0,d60f1bf03fc00018ad6ebf7a38ba918fd19d0943a8e6f075523ada7dd65e658f,2014-11-14T14:06:19.963000 +CVE-2014-6916,0,1,1d7bb28bbe644ac475c8e662fb6c4a6ff4233ab093da03773c060e5270bd59d3,2024-11-21T02:15:44.373000 +CVE-2014-6917,0,1,4b1b0b005326343adbc017938565ef00dce1f7ee2615d678ede56a7efc57a47d,2024-11-21T02:15:44.550000 +CVE-2014-6918,0,1,1a6a6c1597c046b03eaed03ccf3187d5e36e9a609e30957af56b89ff7fdeee04,2024-11-21T02:15:44.730000 +CVE-2014-6919,0,1,a1dff456d24d46a54f7a85085613cf304dff955397fe3489996654eb2d6c3d99,2024-11-21T02:15:44.933000 +CVE-2014-6920,0,1,61c899ba71f07f6235b72ae6db448f06d421aa62f6699588e45394265989dcac,2024-11-21T02:15:45.113000 +CVE-2014-6921,0,1,bde6415597766834a7b7e703734c3487216c303b71957b172af687a1f37a80d5,2024-11-21T02:15:45.297000 +CVE-2014-6922,0,1,daa5d1798dfc53266a5057b24b2e9e650a813a75c829bcef8dbcf6f18212b92f,2024-11-21T02:15:45.480000 +CVE-2014-6923,0,1,07acf67f30efdf7a16bf990303d2bfd45a1f5d647ca5609015834de5be23faae,2024-11-21T02:15:45.660000 +CVE-2014-6924,0,1,5002992a143947ec8fabfa02bd8707ca3ca66aa7d56ea9fc0b479f7c74366093,2024-11-21T02:15:45.833000 +CVE-2014-6925,0,1,2df583be1fd423bf310100d80b910ecdae5ee6bb9e6f576b66d4a6861fe83b25,2024-11-21T02:15:46.020000 +CVE-2014-6926,0,1,79d494368e59009572f898b5815c0700d97d4efda1dcae04f4775d32f5c86fc1,2024-11-21T02:15:46.207000 +CVE-2014-6927,0,1,6ffcb66fdd6669843375ccdf67e9cc8b71a713b4ad7d4de3433500c9d46d4bc8,2024-11-21T02:15:46.397000 +CVE-2014-6928,0,1,b58d3378b84575fdaec5faae0db04f62cbcd898991c51844c5703032befa1cf9,2024-11-21T02:15:46.610000 +CVE-2014-6929,0,1,23c044bd129e61eca373d6df8cc9545a1c88f5fd5100b5ab06a37807a34c17f8,2024-11-21T02:15:46.803000 +CVE-2014-6930,0,1,c83930ef6de95e4feeb39cad8b43617288ca2635e63a57b01b55a9249295d5a9,2024-11-21T02:15:46.997000 +CVE-2014-6931,0,1,2d339bb8a9285ba6d4b4886e4afc02cc4361068164486b41437f0f0d0555801d,2024-11-21T02:15:47.183000 +CVE-2014-6932,0,1,32b7bf877ff7cb2fb653d22135e8b2b58af89f3de1ea0f61b34560364037f8f9,2024-11-21T02:15:47.363000 +CVE-2014-6933,0,1,b6062f20146d7bf3c792c3fd804f1ebce1fe974fa8916e01076f37a97d6c5fa6,2024-11-21T02:15:47.547000 +CVE-2014-6934,0,1,c155db86a918b4dccc34564c1f29f6a327f94ae26e7665c5471a5cc808243f83,2024-11-21T02:15:47.730000 +CVE-2014-6935,0,1,f863dfc8b3b1409fab8009688762fb50a40813a14d57b5217c2f5b735c4ace10,2024-11-21T02:15:47.913000 +CVE-2014-6936,0,1,1420bbbee18b1b56342faaf77c1823681b52f59acccc346afdcefe6766305794,2024-11-21T02:15:48.123000 +CVE-2014-6937,0,1,150557889cf30487362e66f10e5286f14f3108f555529930548010ebfb15247f,2024-11-21T02:15:48.307000 +CVE-2014-6938,0,1,8fa5764c0b0638d9c58f951e0d185034cc6a437ac34cd9cd4f193f078d763d17,2024-11-21T02:15:48.493000 +CVE-2014-6939,0,1,729fa6eccf0ead87075ee07ac9a541327d5734082e6539461a9ebb814e2e05c5,2024-11-21T02:15:48.680000 +CVE-2014-6940,0,1,dccea2b5e7d8febfdcdc02a5fb486c371bf8f889fc39adc19e7231d07b2ec796,2024-11-21T02:15:48.857000 +CVE-2014-6941,0,1,92f3333ed090a6bec165abcd9f03428364e811e954be50cbdfdeddeb9cabea10,2024-11-21T02:15:49.053000 +CVE-2014-6942,0,1,925e5bc4d4204c46686dfcf2c9b5c345f1323f0479a9e6f622bffec8a530703c,2024-11-21T02:15:49.240000 +CVE-2014-6943,0,1,918ab41f8a0b850cf88c3386e7266425f9b45ce97290f04b9904de521297c5e0,2024-11-21T02:15:49.427000 +CVE-2014-6944,0,1,d7b4d15860b7956db4298f21b21dfac96c2dc2697f6bdaead784b69915df4247,2024-11-21T02:15:49.607000 +CVE-2014-6945,0,1,ff2d306e0fe67a443c507017ac74aeab1ebdc9d1629a694c37f78a502bd82663,2024-11-21T02:15:49.790000 +CVE-2014-6946,0,1,f039620bf213ee360d766db326203b4a16168243a60f4352bb3d71e015772e1b,2024-11-21T02:15:49.983000 +CVE-2014-6947,0,1,3c675b19b15ef2423ad6d31681fa590b4030274e651704a5854ab92ef241faab,2024-11-21T02:15:50.183000 +CVE-2014-6948,0,1,a7ebadb09a8cf898e82ea1fbca3cc82573909e89b03d5fd3e8fe5fb588301f47,2024-11-21T02:15:50.363000 +CVE-2014-6949,0,1,a6f04c07e550d4f556e6ba542bbf43b9f9d94795a04ed4b55f72a0b48b080cc1,2024-11-21T02:15:50.540000 +CVE-2014-6950,0,1,2f2bf17d9486d36956aeaa1d641e870bfbadfe47950a0d900a52ed2387beb41e,2024-11-21T02:15:50.730000 +CVE-2014-6951,0,1,ee10391d92e0d02f19c68c86352d021542fa837881e76a613ba1cb18d5cb73c6,2024-11-21T02:15:50.913000 +CVE-2014-6952,0,1,438692e0e08bc63474ba599783231b96d2aff83c5eef817b6bf862b0d2e3d11d,2024-11-21T02:15:51.100000 +CVE-2014-6953,0,1,3bb83276a5ad8ed1ba915866f95a572faee01eeef983d721441c13a422c0eac5,2024-11-21T02:15:51.287000 +CVE-2014-6954,0,1,d110d1d6058d8439270d688ff7ed0c7b7a9f44d877b1c2af691c1e13955a3156,2024-11-21T02:15:51.470000 +CVE-2014-6955,0,1,d83d6aa093c2415fe1339c0cf023ea84b5434a37add8fb34fc6a08845963256d,2024-11-21T02:15:51.663000 +CVE-2014-6956,0,1,0f0841d380ff472b396dd985c22b68743cb85c7be1fdd715d40f6ec0f205fdcf,2024-11-21T02:15:51.847000 +CVE-2014-6957,0,1,f7941d5217be8cb77b419894dbb5c63b4e606e568e7bde6cf0e4482d90c9867c,2024-11-21T02:15:52.043000 +CVE-2014-6958,0,1,65c9cb7f5bde3449ae45bcecc014ac2abecc3aa854717b5569f9afe53eeaf3b7,2024-11-21T02:15:52.233000 +CVE-2014-6959,0,1,ff41abf064a5995ae8cb9a64ac98949ced9d65b7723676c446f0dea0dc2fd2fc,2024-11-21T02:15:52.423000 +CVE-2014-6960,0,1,1c6790b5e777a3c630d06dc4af3e0385441877483803969b65a0a1256871a6e3,2024-11-21T02:15:52.620000 +CVE-2014-6961,0,1,3fbef176f4fff761861cd41147b7edc7759747d9396fd4499167fa0a13923e52,2024-11-21T02:15:52.817000 +CVE-2014-6962,0,1,3cd22431f574593cb046b42cb76d6718bcd624a7f8e6ceeedd6fe40f013666a9,2024-11-21T02:15:53.033000 +CVE-2014-6963,0,1,2d5a0435ceed1b777a5b25b99155ecad051c4804942ab7b3a82aa7de8ee2e639,2024-11-21T02:15:53.227000 +CVE-2014-6964,0,1,5dd526adece46f6104272ff0db16ffcc6f058dce41b35b7b5bc3cd09094eab36,2024-11-21T02:15:53.417000 +CVE-2014-6965,0,1,6babc58d99631d48a1c1002274251a4734e942e1c2177311d246d0d3711b76bb,2024-11-21T02:15:53.600000 +CVE-2014-6966,0,1,e0c064c32cb4bcab119218e9b2300d2ad72b2446a1936b804f7ce326580c28e7,2024-11-21T02:15:53.770000 +CVE-2014-6967,0,1,e804f596e8df7c58ee42d8227469fab4cb4ca80013efa88e938549e7aa4bba08,2024-11-21T02:15:53.957000 +CVE-2014-6968,0,1,a3ac6e7e38966be1b174c42fa33c9e2c0a1d7a9137be4ef062ee73ddea7073d2,2024-11-21T02:15:54.147000 +CVE-2014-6969,0,1,bc480b045e051d15db3c32a58d8b51101cdd402cb43669c229d8771c619f32e9,2024-11-21T02:15:54.330000 +CVE-2014-6970,0,1,b6165200a5773c9de7f5ab9487be989dc1e58b4c201a975baaeb60752b19ca42,2024-11-21T02:15:54.520000 +CVE-2014-6971,0,1,ba18f94e2a3ed427158dd75d54730ec0ac60e3ab0abfce76e51a3c241f8e9b14,2024-11-21T02:15:54.703000 +CVE-2014-6972,0,1,a9adf03d6c802ca37c154748eddad0332d64648391f91d0ef623843690e7d647,2024-11-21T02:15:54.897000 +CVE-2014-6973,0,1,b41b578682b1fc37a6d85bb39b57c7af3e331d1a44c5a9abe4abb708e1fc1b8e,2024-11-21T02:15:55.103000 +CVE-2014-6974,0,1,b2ce1650beb1b7fc9b06d3f2c998250f01bbd21c6137726c9a2ad7f347ed21b6,2024-11-21T02:15:55.290000 +CVE-2014-6975,0,1,eff43595c43174139ba260e700d5e92ba114a4911e3b65ffe57e10be521148af,2024-11-21T02:15:55.473000 +CVE-2014-6976,0,1,f44e93c57391a526b28726d9f6d2badbe91dac8bd5e827097bbac5cf0374c716,2024-11-21T02:15:55.647000 +CVE-2014-6977,0,1,ce710b33be549e812a677c16ed4aad4d0d18bf0d87ee0de3422e4f866f117ec9,2024-11-21T02:15:55.823000 +CVE-2014-6978,0,1,e949d28f21766e93c2397152000aca9ee844aca50c5bacc2bd9aef094a7aa3f1,2024-11-21T02:15:56.007000 +CVE-2014-6979,0,1,2ea2ba4b4ab767fbaf422f18fcac2b1ebb72810995bfd7c71b9ae7e5c23df77e,2024-11-21T02:15:56.190000 +CVE-2014-6980,0,1,f84a18b64e063e904a3bfbeefdb2aad89ce8482ad89735dd6c00c8889d97662c,2024-11-21T02:15:56.380000 +CVE-2014-6981,0,1,c56e61970d1011639044a7936fdc7eeaaea76c480379470d4c29fbd741e74f99,2024-11-21T02:15:56.563000 +CVE-2014-6982,0,1,ac828f78c714bd84fafbbaf86c7ad67a49552a642be620d25f91937736f11f2c,2024-11-21T02:15:56.760000 +CVE-2014-6983,0,1,a7fb775d6f830bd541edd09f1e2cc2a50b52ad4a096541238871eaf325435351,2024-11-21T02:15:56.967000 +CVE-2014-6984,0,1,adb5cf3385ba35b628f724345c745dfab9ec68a833c0f593e3a3678936535f28,2024-11-21T02:15:57.160000 +CVE-2014-6985,0,1,59816faf8739643f3fca9b0d53d642b09e7d76ecd9013bd2ef68a9e907cee91a,2024-11-21T02:15:57.347000 +CVE-2014-6986,0,1,fea73cd05544ee4a19745af222ac42c2cb4e960456c5d12a2f8fe30fc3b75440,2024-11-21T02:15:57.523000 +CVE-2014-6987,0,1,886687dba56677ae107c51ce82dfb5920f5389dbcc4a1b731dd4dbc9194d6e04,2024-11-21T02:15:57.697000 +CVE-2014-6988,0,1,8421b396a14b5de1a7a396d558711b3a312bcfb4dfa622f26bc4c4ac1fd3b51f,2024-11-21T02:15:57.873000 +CVE-2014-6989,0,1,a906f551e7db1cdfa29b21dd3399ea5f8605173a4f1ea4fdf10c2662d01f34fa,2024-11-21T02:15:58.053000 +CVE-2014-6990,0,1,8bdc6e3979af5cb36c63eb4e7a6ec4adc51b54e3d69687cfb1fb80cabb26e234,2024-11-21T02:15:58.237000 +CVE-2014-6991,0,1,a01807e4808580d5ab7c3bb354b2dc5156e00275f0016aa85faeb26192904b93,2024-11-21T02:15:58.413000 +CVE-2014-6992,0,1,89f9bd39fa11be4e36fd174ffab89586ad3afba8fcc49c0fded345a9cbf18c51,2024-11-21T02:15:58.590000 +CVE-2014-6993,0,1,26835b9601290342e9fa10ede4670c6037c9f27a7e0fcc4156c9205e2817bfc7,2024-11-21T02:15:58.777000 +CVE-2014-6994,0,1,08f313981a2f3658f0e338ad868c25f036cb8b394edb6f810a9b9b56a8327029,2024-11-21T02:15:58.950000 +CVE-2014-6995,0,1,f8cb7faff3eee2a9464171569d7547572bbb6b99059d321554dfa2e8e9ae9c7d,2024-11-21T02:15:59.137000 +CVE-2014-6996,0,1,d9b627e7f8e31e4176434dbf5dc3e1c3136ee951adc9b580925812f2907a5c6e,2024-11-21T02:15:59.310000 +CVE-2014-6997,0,1,66e15cd5a0385382ba40ba797604d7227057c41284329ada59c47b35add020a5,2024-11-21T02:15:59.487000 +CVE-2014-6998,0,1,6d30ff844ae565c6c345dad58996a54a6f74d297e2ebe9e542347a97f0f48d07,2024-11-21T02:15:59.673000 +CVE-2014-6999,0,1,4ddd6f432f82a8e8fe852f5484a1e6168de51df9e6346020267f6afcb77040db,2024-11-21T02:15:59.860000 +CVE-2014-7000,0,1,738f56dee025f5315d29e92f361ca08906065c8309105abb43e9b04341e046ed,2024-11-21T02:16:00.073000 +CVE-2014-7001,0,1,477dd520d33963a9b27ee3ee33f1d46b77da604c1620a12a24ace1a7a8154a30,2024-11-21T02:16:00.257000 +CVE-2014-7002,0,1,b56bc7d1b84747a735879e9f35c25d10315a7cff186d83b22e8d95a4e56103d5,2024-11-21T02:16:00.433000 +CVE-2014-7003,0,1,8afa91d57058cbb654b8f09ac6daf27487a90109711a12aebee3e27bbf5cf914,2024-11-21T02:16:00.603000 +CVE-2014-7004,0,1,04757c75d80f2d8a75e448100d57307bffef5b34b7d36e0b71230fdbe4c7af77,2024-11-21T02:16:00.773000 +CVE-2014-7005,0,1,377d7120ffe7dc75d343187c9db84ccd9514415ff2f824f7e1b245bb78a81254,2024-11-21T02:16:00.950000 +CVE-2014-7006,0,1,67d2dc90ba31e86d7971a75baf34cd5723aa97782ea38cb353c7b0233618fedb,2024-11-21T02:16:01.130000 +CVE-2014-7007,0,1,dfd927e75ad5ae71e28feeb80ce933d5746cd1a749209d3d1c90cfa180e5653f,2024-11-21T02:16:01.327000 +CVE-2014-7008,0,1,311ecd4f8d953870f3fd76c55de10fd38ed65cb7f427bb58155136638c90fb5c,2024-11-21T02:16:01.507000 +CVE-2014-7009,0,1,e64d5c22162e102f7aef2653f2e26b98ec10626c8e8458bb62dbdf9fe6c99c0d,2024-11-21T02:16:01.693000 +CVE-2014-7010,0,1,6fd5695166983a002905890287880b078b9e6f8b6545021df0b0a81bb2a944b8,2024-11-21T02:16:01.873000 +CVE-2014-7011,0,1,c26e1aba8d61547e177e70125c7286afccbcd05bc47ae21d98bb57231ef5aab3,2024-11-21T02:16:02.050000 +CVE-2014-7012,0,1,965b19035275194a16f916d0bda0f38e8503817f4f7166c00404c7a00550d255,2024-11-21T02:16:02.233000 +CVE-2014-7013,0,1,caeaa1467ae3e8dfc6764134b54050636aeef0ea8567cd2fea64c77e8104d3db,2024-11-21T02:16:02.410000 CVE-2014-7014,0,0,ce21360ee6f4d7de531404a48fd58dc9139074a706a90c68d917f2d8383e757d,2023-11-07T02:21:08.040000 -CVE-2014-7015,0,0,e0dee99597b7014d3df2344c803b43a960b61f88286497c4b07e23b2b4f8cc94,2014-11-14T14:06:21.493000 -CVE-2014-7016,0,0,3312599bbb61bd735c4a47bb9f7da00ba282b17579d15bd464bff18f19f9cb11,2014-11-14T14:06:23.057000 -CVE-2014-7017,0,0,8f39af98c548ef3f304566a785208b0f3a45ca3fdb801451c71ee5e904afcfd9,2014-11-14T14:06:24.540000 -CVE-2014-7018,0,0,7af392792c02bca3cdb0f7dda536941ebdc82390e22f52714e87d9c8b0ac2459,2014-11-14T14:06:26.040000 -CVE-2014-7019,0,0,c8f4ec44824785168ef266fd5193494351859b6bbd306a29e6f7538555495bf4,2014-11-14T14:06:27.540000 -CVE-2014-7020,0,0,9507b120c1e812e092741e2f42dc8927ce6b11486eb4b5ecae0d4218d494dfbc,2014-11-14T14:06:29.040000 -CVE-2014-7021,0,0,368c4200d18d9ff34c5c2e9f10ae994f6928565dc53ecf8b30761115563ec71a,2014-11-14T14:06:30.573000 -CVE-2014-7022,0,0,ec6c5634bce0800a972c4dd98880f67c4880eec60d0fd84bae94706b6dacb8e7,2014-11-14T14:06:32.073000 -CVE-2014-7023,0,0,7de8ca751c3649898b0e7256d177ddd05f09a8b463243bb803d4ea0ad12f2274,2014-11-14T14:06:33.590000 -CVE-2014-7024,0,0,ff74efcb1137824dbb24a8384a67fba365a506956e8f287ffd2fb3e14db252bd,2014-11-14T14:06:35.107000 -CVE-2014-7025,0,0,11bee5bab47b5e3aaa325e7945acfa9c0e2d364e029bd3a6ca6fe3293c9b4a6c,2014-11-14T14:06:36.543000 -CVE-2014-7026,0,0,ec78baa0f7aee6b7bed794cb601de65506d56c77eea780402bf8f0f11b517386,2014-11-14T14:06:37.967000 -CVE-2014-7027,0,0,de48d71327bfb3f80904d09c66fb1a391b3ecb3bf44bc3a586227eebf915cb58,2014-11-14T14:06:39.527000 -CVE-2014-7028,0,0,88a1e4b3ea2ee77f62dbe8b2282f34137c37bc8054b326c5f74a77a69ff14af9,2014-11-14T14:06:41.077000 -CVE-2014-7029,0,0,bb4806065c8865508fcbb3b01f7e64d865ac91077bd2325446307e1089940042,2014-11-14T14:06:42.560000 -CVE-2014-7030,0,0,5f76cfb3439c9d492d5e4dc04311d446b9b2198309a5186039a5f8a41c192453,2014-11-14T14:06:44.077000 -CVE-2014-7031,0,0,e6e464bda1bebfcf9acfb1139ceb0161265baa568c044f8e68686e9af50d7ca1,2014-11-14T14:06:45.590000 -CVE-2014-7032,0,0,304fdb3ae491397e4e2bb3f1074d023764dfc0ac1bfe5df7f8180d11b9e31fb4,2014-11-14T14:06:47.387000 -CVE-2014-7033,0,0,469abe696b05779c2c6d7f0866a86a1d41c4028e175e7be626538e4be0ff4b5d,2014-11-14T14:06:49.170000 -CVE-2014-7034,0,0,14949282da7cdd42ce3be131427c58739ec79234daf25d8cc37438cce1719eb4,2014-11-14T14:06:50.797000 -CVE-2014-7035,0,0,facc4fd4cf6e49105acb36cd9a2641458cd7e536b011f912c60ff47e7618aa2b,2014-11-14T14:06:52.297000 -CVE-2014-7036,0,0,534340f2ff84dce0adbbf2dbb8bfb22dc0967cb5ab841752b0cb4a6e5bdd25e0,2014-11-14T14:06:53.810000 -CVE-2014-7037,0,0,d2cba9e116e74baf2208d6bc9b035fa312252b991772390219a416e8e9a4d62e,2014-11-14T14:06:55.310000 -CVE-2014-7038,0,0,43f538f66efc5a0c9ad9f347bb92dc3cbfb62bf8ff2fecbcbb9adb1fe0e25b9b,2014-12-29T18:24:19.357000 -CVE-2014-7039,0,0,703bbb7bc8333bb3b0e81946f5cdb59e2ae7d57563c96580667bb6016b90dc2e,2014-11-14T14:06:58.313000 -CVE-2014-7040,0,0,df752d3efa2c8bb27ed54b80f43838fcc810331450911bf5b97c5b0e975f11f3,2014-11-14T14:06:59.797000 -CVE-2014-7041,0,0,679e23897b29337d95abcfa90d66f31ec7b4ab58714df1e3ec10ab4c456c8295,2014-11-14T14:07:01.280000 -CVE-2014-7042,0,0,db198955c833abbabf9aa9f650c060841319cd06a7da8bb948630e373b355c43,2024-08-06T13:15:35.490000 -CVE-2014-7043,0,0,03b4d65083446f9c65cc7361c07ac8e1850c3c51a82b557ccf21e09a43ad55f7,2014-11-14T14:07:04.283000 -CVE-2014-7044,0,0,1d41bf09ddf845283a05e370faa8421a4366b01485587d02fbb366d598d4646a,2014-11-14T17:10:15.843000 -CVE-2014-7045,0,0,20a5cd0a4191deb5ad84964202c6c6b980f988bed5b64a3a08d5d4e3831719a0,2014-11-14T14:07:07.250000 -CVE-2014-7046,0,0,6f58cb90c4eac1793ea74a4e210466f039045f313fac2c7bb403cd5fee954751,2014-11-14T14:04:12.643000 -CVE-2014-7047,0,0,ab762dab8c0338a14866de28368f29ef8bee225ccd4676d0fed12e9ea2cc0048,2014-11-14T14:04:14.177000 -CVE-2014-7048,0,0,a58e5ac2c78b4b4d3f824d446dc2428157d123f5694f2cb692bd2c0be72ec1da,2014-11-14T14:07:08.737000 -CVE-2014-7049,0,0,b793da187fce0c9767ffcb8d185f00addaba53ad050604aed5dc08411f79f991,2014-11-14T14:07:10.203000 -CVE-2014-7050,0,0,b65a1515a3aece41a83c5451afc525dd900e6f3749120e574e56d3329e9daf96,2014-11-14T14:07:11.643000 +CVE-2014-7015,0,1,eb9c65193e32117ea6246ae3bc8e90609a16b85fc25487fdbeb7231ca6646c60,2024-11-21T02:16:02.613000 +CVE-2014-7016,0,1,f742da05717ab7270ba4ad854a82e9957a391b97cb65ecb27d15c2169b4c64c9,2024-11-21T02:16:02.813000 +CVE-2014-7017,0,1,e06497b30bd5aaaaa8a6749b6125698ad456c6b8b0db421a013313ecc6b27d53,2024-11-21T02:16:03.020000 +CVE-2014-7018,0,1,7dc54947589c68b9ec191413afb57dc25e85fc163626228d7fe15ada0dabc9e4,2024-11-21T02:16:03.220000 +CVE-2014-7019,0,1,571c7837d28bfd71e9808121a9fa04fcaf065ca80c3186391702e19a7d417e31,2024-11-21T02:16:03.440000 +CVE-2014-7020,0,1,acc1ed0d84a310b957fc5ba90afb75512049bfd01e1ae170a15b92fb6e097380,2024-11-21T02:16:03.620000 +CVE-2014-7021,0,1,106e98ec1be71352b0909c8f502c3b375631352950369b1621c0e4b95fbe7756,2024-11-21T02:16:03.790000 +CVE-2014-7022,0,1,e5e118b1218e15ec3f60006b6c9bcbcbbc8167c211cea6c016f6d3f80f32740d,2024-11-21T02:16:03.973000 +CVE-2014-7023,0,1,e52ba5302a92f5450eb646f6baede51c4e2cf3165849c0c7e4038cd9aaed7eb7,2024-11-21T02:16:04.170000 +CVE-2014-7024,0,1,bec53ab71d6e83c6cbf35aefec13f973ab4d02fac629a93d7368d572c4c28136,2024-11-21T02:16:04.353000 +CVE-2014-7025,0,1,9cbaaeeedeb008978630d8b987402eccddb14044b3eef0b891adcf0ce8f9544e,2024-11-21T02:16:04.533000 +CVE-2014-7026,0,1,4dbefcaf2010b1ca5ca75442f9fc973ae62939a92a8b775a184d947fd75bb7ed,2024-11-21T02:16:04.720000 +CVE-2014-7027,0,1,bcdc89cf062cf14fd8eea46fdd58ed6c2c05eb4baf08f68382db7910ab25782f,2024-11-21T02:16:04.900000 +CVE-2014-7028,0,1,e7bcc10b388dfe39a568931a221e5b7544fc2bdb587184721ec9442067962122,2024-11-21T02:16:05.083000 +CVE-2014-7029,0,1,c231c88268efaec5a2bf4948007783d4480d9afeef4d274c9135442a0dff1f3d,2024-11-21T02:16:05.270000 +CVE-2014-7030,0,1,907094fd9000065134eed76dd14d78ca48eb5cbfa0608b70c0f5a36aa62e9243,2024-11-21T02:16:05.457000 +CVE-2014-7031,0,1,5a1e242ddded94eb3497b9cb37687dc7aaee0f514f967b50d4560400df8bc50c,2024-11-21T02:16:05.627000 +CVE-2014-7032,0,1,9e1445df0655a88b0506649c4f02d07945c272d6f9211f34699cdba985a7c1d0,2024-11-21T02:16:05.793000 +CVE-2014-7033,0,1,2573513274f4431e895266387ccf3b156a4849217cba66f427606463dc3492d0,2024-11-21T02:16:05.970000 +CVE-2014-7034,0,1,28359606aad08a5b36ed9b259ad98172b8886389e1755bc0be40ea3ff3052df6,2024-11-21T02:16:06.150000 +CVE-2014-7035,0,1,08aaf65908f2b978eadac25a97a06e36c8d7659b44fa812846a7bd5e1a333a07,2024-11-21T02:16:06.333000 +CVE-2014-7036,0,1,d0a60cd360d8a5c706faf9160b0ba7901d8db5d43dd372af6d18d11d4107cf3e,2024-11-21T02:16:06.510000 +CVE-2014-7037,0,1,ac4af4bfb68a96a4f6fc3c22b47f98ba023026d7aa4ea7ceceb40615cf4ce4ef,2024-11-21T02:16:06.693000 +CVE-2014-7038,0,1,d0753b8e007d5839ffdbab873abe9cd59bdf2568708ffd828fefa55d57d36250,2024-11-21T02:16:06.873000 +CVE-2014-7039,0,1,29a73372902e7bee18bfbc9c107d48663056e19a8b9eb6fd36c28cb0cce5329e,2024-11-21T02:16:07.060000 +CVE-2014-7040,0,1,a3363f234e1cdef1381d50bdffbb403c1eed011ee30a59e8f95a3844eb4290db,2024-11-21T02:16:07.250000 +CVE-2014-7041,0,1,68d2dded55c9df69ab6352fed699206e98996ab512d3b05e69288d2935777435,2024-11-21T02:16:07.440000 +CVE-2014-7042,0,1,93e7f77bc0689f944fafbdbd8d9c46b7717ec05c0ad244e9b60d9773dfbf18a7,2024-11-21T02:16:07.637000 +CVE-2014-7043,0,1,9ffa25535fc91e2ec0e4161a092d659315cb7327210e765bf7f0f67157ebf101,2024-11-21T02:16:07.900000 +CVE-2014-7044,0,1,632e85552ae8beb220d67a41be886cb63a093e4add2d74ea69b3eef977d3eb13,2024-11-21T02:16:08.133000 +CVE-2014-7045,0,1,1745f2b450ad0598034c71a0f0bdc7b53aa2c2edf2418c54d100c263ce7b0f44,2024-11-21T02:16:08.370000 +CVE-2014-7046,0,1,a3957092d30ff92c2e9f4199848bac706b683c9829f22b8ee1bde5623537c40a,2024-11-21T02:16:08.610000 +CVE-2014-7047,0,1,770bfb52be3bf501f34a1e9c39f348044530702f4939e7f0226f94054c37c971,2024-11-21T02:16:08.827000 +CVE-2014-7048,0,1,548b7f09c7acc7627d2a69a9f72d792693b045e4eda18db08634b755d87f9433,2024-11-21T02:16:09.057000 +CVE-2014-7049,0,1,62eee1a3a18779aa6af0290f34f32d4482f22b8bb4d21fe6478ccca635027c24,2024-11-21T02:16:09.850000 +CVE-2014-7050,0,1,c1d51b89192ea221f2ad6257b8e47a9b568f11a6ec057851e832e9f8ecd4daac,2024-11-21T02:16:10.030000 CVE-2014-7051,0,0,7bca4e4c98b1fe6b99c605edb54b422cbc7c9aa355f451fcdf104b9497eb6fc1,2023-11-07T02:21:08.573000 -CVE-2014-7052,0,0,eb85e36c9d164a18037e130a242e6d235f1241c2ce298b1d1de009e94342da3a,2014-11-14T14:08:13.480000 -CVE-2014-7053,0,0,9b25b9d7c16ac93d8c46abbf167dbec99514f7aaea196fdcbcb3ca10c22b3ecb,2014-11-14T14:07:13.377000 -CVE-2014-7054,0,0,b8f1927909458a9b26cfac7642c6ac61568107cdf0db154c6a87e9a2072e861c,2014-11-14T14:07:15.237000 -CVE-2014-7055,0,0,1e1e4f152cce3c985cab30aba653ce82f12cfb9c547a6e59c5b5053ad4a0eed4,2014-11-14T14:07:16.720000 -CVE-2014-7056,0,0,9578fb8603d705813a1eda20cb15ce245fccd610099bf04dbdfba24bc3292ab6,2014-11-14T14:08:14.933000 -CVE-2014-7057,0,0,a22e0f0f44c165138c9edcb28255d0166d90a3a17ce5bd9cb0b1b20a901fd5a9,2014-11-14T14:07:18.253000 -CVE-2014-7058,0,0,85e00de401dfdd8601e935425cdad0e5b979c7c163a75febb20d91c1267a5a7d,2014-11-14T14:07:19.737000 -CVE-2014-7059,0,0,aa71288745b7eadaad4a84dd01492a2221ada65c47a0f5bec9034f78b35de4b9,2014-11-14T14:07:21.270000 -CVE-2014-7060,0,0,477fea45665db959155ea865f08e70b7842696dae4f7c534e288bb371fbeea0d,2014-11-14T14:07:22.723000 -CVE-2014-7061,0,0,89611110349fbe9ce12344deb925caf7c7d5def144e0dc7175e53bf8a39692e2,2014-11-14T14:07:24.207000 -CVE-2014-7062,0,0,dc076296794ff77e64f1737a34985479670167dcdff8d3eb65523e2fdf3ac509,2014-11-14T14:07:25.503000 -CVE-2014-7063,0,0,e697f74897d4adb67f8b375340044a71d0c73742e372dae85238d845b35430ac,2014-11-14T14:07:27.237000 -CVE-2014-7064,0,0,32887a1dc7f1f7409460d59ab0186ec5ad3fc73bf326361fae20f28e978627fd,2014-11-14T14:07:28.897000 -CVE-2014-7065,0,0,98ae143ff39daad54f2f62371f1c9b60e9f718b8f30b6172a3362af901368ea8,2014-11-14T14:07:30.363000 -CVE-2014-7066,0,0,70491eb535568e8ca145e119b682d9f9688247aced1b4d2235282117e7fb1bd4,2014-11-14T14:07:31.863000 -CVE-2014-7067,0,0,76350e247e1e2414c17b7d29e8c0fcd3a084d4a1d2f571de876e7f42d2074152,2014-11-14T14:07:33.380000 -CVE-2014-7068,0,0,cabafd8ef50d5b7d70aa43f8a54d1d15e7b340347cc0cd6d3b9fa5131225ca7a,2014-11-14T14:07:34.897000 -CVE-2014-7069,0,0,761179d2b7ab44bedec519e00b4b59fd8fb724829263b70d05c034889ec37c09,2014-11-14T14:07:36.817000 -CVE-2014-7070,0,0,5444ec6dc5d8fe138d9a9e5bad76eeb3bcb69eafeb2f40035810a71d2e6de946,2014-11-14T14:08:16.403000 -CVE-2014-7071,0,0,6a56c06be0dc5bb7691b13865b03a559b855e87b04632f73c529a0697040d743,2014-11-14T14:07:38.333000 -CVE-2014-7072,0,0,b371eb75036f75fd1f89286d8c4c45e4dc503a0bbf20563029d9d41cec0dd2e3,2014-11-14T14:07:39.867000 -CVE-2014-7073,0,0,40e5ea3cd7f3c41be72775782d48cb8112a442801e1528c8fc927889ce6f55b2,2014-11-14T14:38:30.377000 +CVE-2014-7052,0,1,0ebd69b9a1688af6264a236b84d85c3b9be4a02f904f3da48b63e626c582cf99,2024-11-21T02:16:10.247000 +CVE-2014-7053,0,1,b428d9532a55c2811913cc8f8c94e6ed1171a5a57ec233731735bf5ebe8ff7be,2024-11-21T02:16:10.427000 +CVE-2014-7054,0,1,2d92616f3230544e91d15340379d06cf219bf7fc5ef34b88a27ccbc81120683d,2024-11-21T02:16:10.603000 +CVE-2014-7055,0,1,cbdb1fb7e560eefbbc77d197f60750464342fb36a420185a0be89f684cd38694,2024-11-21T02:16:10.783000 +CVE-2014-7056,0,1,a532ed97a5aea6718f81585b9de5c6c193863d7250aeabf85f64d5211ce278b5,2024-11-21T02:16:10.963000 +CVE-2014-7057,0,1,bc8f29e7bf925d7a101ee054472dd2004437afb3984954f6f5a9e7c3f4752fdb,2024-11-21T02:16:11.137000 +CVE-2014-7058,0,1,f52911c963a9191da7b6d08d6f56d9f51a8066824eb9e62a59e42752d68d7a23,2024-11-21T02:16:11.323000 +CVE-2014-7059,0,1,77c0ad29d3dc813e8572bf5c4afb189806039bf5fd41c7d785c22ca5068e7541,2024-11-21T02:16:11.503000 +CVE-2014-7060,0,1,dcf34efea9a57802463ad4ce7a4fe5b7a2da9feb4687a676516c0261b3fef465,2024-11-21T02:16:11.697000 +CVE-2014-7061,0,1,768a7a76f0a9f17cb8ec82d85aa63ef3df1d8db3b36ff364b8fc6015b5653578,2024-11-21T02:16:11.870000 +CVE-2014-7062,0,1,cf758dcf2a8049515bd3fc0ac4ca1a05b91afaa1f6967497e85997f955a8216d,2024-11-21T02:16:12.053000 +CVE-2014-7063,0,1,def2eb3ad46fab70ba3229eefb8ed507c3ea6e7b08948c7370b5074735bec577,2024-11-21T02:16:12.233000 +CVE-2014-7064,0,1,e29190a4301178e9b56fed745e704b3d51dbb41ecab1f63fabd8e2ff31d8ba7d,2024-11-21T02:16:12.417000 +CVE-2014-7065,0,1,17717c75a6e28c0cf82b911210d1efdd83ce9fdf02091cce8d2999e3bd17f2eb,2024-11-21T02:16:12.590000 +CVE-2014-7066,0,1,24a287c69259e22d03e750187bf3a830967a8eeffee3f87547455ea97380b7a2,2024-11-21T02:16:12.760000 +CVE-2014-7067,0,1,5e516d320c88d6ed3dcf148faec9b13664b0343760f415d333da6f00821767f2,2024-11-21T02:16:12.940000 +CVE-2014-7068,0,1,3f87ee34ccc255f05d77915aac7d4777e0daa68bbda8ca29979fa7e552ca5443,2024-11-21T02:16:13.130000 +CVE-2014-7069,0,1,d20c4b05289b785fe683a8f9ac8666bb88d581a0de49f625129dc989b31827ea,2024-11-21T02:16:13.307000 +CVE-2014-7070,0,1,9d9496082a8dde0cef8a3587dc0c7adddbe852ade4fe7ae4108f30ec33078398,2024-11-21T02:16:13.483000 +CVE-2014-7071,0,1,592d88af350557fa19ffd197d1e6a84555e5b5036f4043c0e836c2e32463f2a2,2024-11-21T02:16:13.657000 +CVE-2014-7072,0,1,11d0d8394d58412089c9feea6c4f594c75923bb14b4a5bb865da9821c9cf15af,2024-11-21T02:16:13.840000 +CVE-2014-7073,0,1,c1358214ae61a2ac940d5af6875acce57ff42124f80edf23cda2858a6f860440,2024-11-21T02:16:14.020000 CVE-2014-7074,0,0,893cbeb147df243386916e96cdceee5b21bf4d7d6b6d36bc7f983ac71ed45ee8,2023-11-07T02:21:08.940000 -CVE-2014-7075,0,0,a65760ec235037a472f8ac09a11670912bbdeaafcb601f805003f06d776a253b,2014-11-14T14:08:17.950000 -CVE-2014-7076,0,0,fe4b517a567cc5d69f0acc35f665f421282ee9e5a08e6e03a1744efc16457a8b,2014-11-14T14:07:41.320000 -CVE-2014-7077,0,0,9e6c86d83ff4e75cc9b9815a32f1b365f378278936c77af0b509b6b235ade938,2014-11-14T14:07:42.837000 -CVE-2014-7078,0,0,e19ab4916e21fb94943e4aeabba1f3cd7b6d463d71c6236368532ff71a85b8e8,2014-11-14T14:07:44.383000 -CVE-2014-7079,0,0,bb453c3392d153a01e68d615d8a494b48e0a61109c53cfc38efdb7c892e97f53,2014-11-14T14:08:19.467000 -CVE-2014-7080,0,0,d852e746a6f399437b5cf2a4d9184d0285e455df716f002718469e93c0fcaa27,2014-11-14T14:08:20.950000 +CVE-2014-7075,0,1,e254a984770f72b6b7263688ba6588e2e75cc1197713f348350f5d140b335148,2024-11-21T02:16:14.240000 +CVE-2014-7076,0,1,de475d15a08dc27357ed52c610057c7766c8ee3f38d72866464fbf5db6058dbc,2024-11-21T02:16:14.420000 +CVE-2014-7077,0,1,9da5f96ae8d8efd7e22371fe92ab90f2c226871585f9b18c37755fef32e4bbfb,2024-11-21T02:16:14.623000 +CVE-2014-7078,0,1,cb4a89f8dd4bf62b903f07eab50d70692905e90aef562e60e6c846f65e421b37,2024-11-21T02:16:14.807000 +CVE-2014-7079,0,1,af8598dbc0689f81984fbaaeb96e0f590fcb7bab959403b313e92601ade0dee7,2024-11-21T02:16:14.993000 +CVE-2014-7080,0,1,f45e5e6983de813187c8a63d551514cb64fd8cf0b78bd5f6058b0bf96980b782,2024-11-21T02:16:15.183000 CVE-2014-7081,0,0,80e174bb8944966c9377e28d5ccd018de5d8c37dc9e85ba63aaf59a41419908b,2023-11-07T02:21:09.200000 -CVE-2014-7082,0,0,8683cf0aaa4235a89687a92d2ecd5bc9eaa19d9052e05db6f7925bcb9fdcd23e,2014-11-14T14:07:45.867000 -CVE-2014-7083,0,0,2825b704f08ec0d30ad892cdd8e81a917b57cfe74cbbfc141adfa6d62b89cde9,2014-11-14T14:08:22.450000 -CVE-2014-7084,0,0,cc7a72653342dd313eb7b10c11b094807ac404e9dba9f16684a7f243d01b3f7c,2014-11-14T14:08:23.950000 -CVE-2014-7085,0,0,8c5ace36e325e7e9300c4ff5cc9bca4a1d7e13dc1ce2eeb79c0aa1749a74138e,2014-11-14T14:07:47.337000 -CVE-2014-7086,0,0,1f3e06d04752dbed441a339694ed4d0ea4a9acbaec423419afdfda7215dfbb72,2014-11-14T14:07:48.790000 -CVE-2014-7087,0,0,fced65ad2f62f1011dfd59f57148694b277d4bfb8b7ba1acca340e6872caabb4,2014-11-14T14:07:50.117000 -CVE-2014-7088,0,0,b5a99a241569ec3410730df54408422706cb5dac592ab01262ef25cf0321b99f,2014-11-14T14:07:51.650000 -CVE-2014-7089,0,0,d9e374eec0a7712688172e4fe286b4594d33f67e8896af91eb39272c4b1b7af2,2014-11-14T14:07:53.150000 -CVE-2014-7090,0,0,c58e9325f6b88569dab1c30c54dd89dc2593f2a6f7c72e99b68004359d26a0a2,2014-11-14T14:07:54.633000 -CVE-2014-7091,0,0,bd0782a7ba7bef5f82165216fec6ac3b339e39d3d47a3fbef725962b7beb528d,2014-11-14T14:07:56.213000 -CVE-2014-7092,0,0,aba9acb7289343e6fc7e14fd6daf4ed714b32c904b27e16d20b9f1e42280a148,2014-11-14T14:07:58.040000 -CVE-2014-7093,0,0,2eec6cd3fb38a9637d2ecd383c97ed8d9aff1101a054b8bd827f32360ebaf63e,2014-11-14T14:07:59.947000 +CVE-2014-7082,0,1,21c7625e2cf3c421c5d42969ab3cafcbd0fc7fcd39e115278e8ea7e648105a58,2024-11-21T02:16:15.390000 +CVE-2014-7083,0,1,90f731a5dd611b362726511b6e57fa9296f741e516d3fd848af6da014320d101,2024-11-21T02:16:15.573000 +CVE-2014-7084,0,1,343749e18815ed2e225491ac87d01c19895ab27a9435d5d8f3b080abee9e1647,2024-11-21T02:16:15.743000 +CVE-2014-7085,0,1,d98dad093e4316acb3737fe6de2e903ce9e73427dafdc293236a3eb9d519393e,2024-11-21T02:16:15.927000 +CVE-2014-7086,0,1,1ebc4021a3eab204e6c238dcbf210f9e9d1187df829988b1856488e69bf06da9,2024-11-21T02:16:16.113000 +CVE-2014-7087,0,1,76635547990606bd596fb6a2d892609dd7daccb84373ae4e0d70e845d236d368,2024-11-21T02:16:16.303000 +CVE-2014-7088,0,1,e8eb8edf6feabb7a140cd154b158ed5ffb0a10b7af518ee781d39835a67e08f6,2024-11-21T02:16:16.490000 +CVE-2014-7089,0,1,34625f7a73ca777f647e4ad0a8493d16b9357d3b806786f0ef5e1a2c372af6ce,2024-11-21T02:16:16.670000 +CVE-2014-7090,0,1,e957153c3f1b02779aea13e67fc7706d3dba57699f3da36bfb067767cc957067,2024-11-21T02:16:16.850000 +CVE-2014-7091,0,1,327f15772bf1668b63de33c041206c5b821f9b13ec6170de448ae73d7a8acebd,2024-11-21T02:16:17.050000 +CVE-2014-7092,0,1,8b9dcca9f62aaebf5aae5d48514c511b848a0148f3e1175932b62c8d475644b6,2024-11-21T02:16:17.233000 +CVE-2014-7093,0,1,d4283306fc518386c8a2df9d9834e7ba0f425a6d9f541dfd97d57b7fc52a617d,2024-11-21T02:16:17.420000 CVE-2014-7094,0,0,385ffe84cad0ee81fda9b073034a807921c8d4b03fce36d7976d8e943c1330a4,2023-11-07T02:21:09.503000 CVE-2014-7095,0,0,c51e781af9027bd979c8b84c3ffad57e66cf1dc1a601314a58fa5033bae434e5,2023-11-07T02:21:09.770000 CVE-2014-7096,0,0,b77ceb66a43d9c5e57d8034a1737f6964dea239a678967a9985b8e92c3b012e4,2023-11-07T02:21:10.013000 CVE-2014-7097,0,0,abb305a477bfb6a22641688ed404fcb0d9983a88804f7002200bba28e1dfc313,2023-11-07T02:21:10.277000 -CVE-2014-7098,0,0,bbef25733c2ef3ff682e48a515c8c0fcc0d2dee4f07826fb008dc47eb8765628,2014-11-14T14:08:01.400000 -CVE-2014-7099,0,0,bb814477d1ac95e1daaffc0d70311962be6336c2abd6a7aaa53e456d2411d558,2014-11-14T14:08:02.933000 -CVE-2014-7100,0,0,06d166c62c3f10cf7afec086ecc851f99aa44864f29e765b509779f59e5dc54a,2014-11-14T14:08:25.467000 -CVE-2014-7101,0,0,c2d9fc2e3d2104f835af358a3293da920e4a7c3c0249ad69cadb4290b4594967,2014-11-14T14:08:04.417000 -CVE-2014-7102,0,0,74caf0cd3433e5abb042b58367a97b9fd8ed6cd614584d9bebaeb60f8a65cacd,2014-11-14T14:08:05.917000 -CVE-2014-7103,0,0,41aa9f29106c10ccf9b744e22fa393bff2251a8e98b8069c0b13359644217fa3,2014-11-14T14:08:07.433000 -CVE-2014-7104,0,0,8d47aac118158321bf23e5690e0665bfa1c92a074d47df898c368ee2eb42565d,2014-11-14T14:08:08.950000 +CVE-2014-7098,0,1,76b6a66cd89a0073270dd005ae9ec7e440d08ba890328c4982e61c6abe44d293,2024-11-21T02:16:17.667000 +CVE-2014-7099,0,1,1058d6ddc6e539ef2cfeae78fa67cad6eadecaf598ac7c7a942f4d44faac6eb1,2024-11-21T02:16:17.850000 +CVE-2014-7100,0,1,05c723d491ef678adf497efcb39c08106af2a1a2fb92ac4a1e9f3cf57e077aac,2024-11-21T02:16:18.027000 +CVE-2014-7101,0,1,c007854c1a0f5f6e7ccf1a01417c2e5ddaf8119094450e7761d0714ed92d33d1,2024-11-21T02:16:18.217000 +CVE-2014-7102,0,1,d904e194ce89717429f4f92db1af853bae6d2b196e52dc38f9750d1744239ed6,2024-11-21T02:16:18.413000 +CVE-2014-7103,0,1,6e4785274b9069e89950c12a4571cc10c182c3d3d8624bb68b4c724353054b1a,2024-11-21T02:16:18.600000 +CVE-2014-7104,0,1,feb1e1341ba61e6dbcddfa43e1b16edfbdc113cec3b4d6767f6c289978a1a8be,2024-11-21T02:16:18.787000 CVE-2014-7105,0,0,886436ad48774ac5b34944573e15741dcd88293c5ce3b119594b49b61a99b25b,2023-11-07T02:21:10.630000 -CVE-2014-7106,0,0,eb14b22425d542870ac3d9ff6cb1b4db07afdc820e70e580d6161ccc0fe59217,2014-11-14T14:08:10.433000 -CVE-2014-7107,0,0,53ea3cbf9004ef6270b0d47708dcd599a8d6662ed64b31aac6d6db696b942191,2014-11-14T14:08:11.950000 -CVE-2014-7108,0,0,11914b7098cdbd7835fb171c384dad0232f4f016735df52d9ced2d7a188c04d1,2014-11-14T14:08:27.030000 -CVE-2014-7109,0,0,598ad340b0a8b4f6eb9723f43fd2bfa464694e8aae2dc63d0220ee9ae08288ea,2014-11-14T14:08:28.577000 +CVE-2014-7106,0,1,ceac075713933a243c52f8b4475484285ca0e52cbb0078d100ee56f20ac8a9d5,2024-11-21T02:16:18.987000 +CVE-2014-7107,0,1,b7ed3baf81aefbc382ec1bf776c732ab47306d1a639134c204fb9fb19e081731,2024-11-21T02:16:19.187000 +CVE-2014-7108,0,1,420f16bcd83acca4c13a4ec1c63b41169dc50f3412016ba659e87c3c37cf8503,2024-11-21T02:16:19.383000 +CVE-2014-7109,0,1,ca85138e8bf8156c531ffdc3d1d6dbe55f78bcbf9fa3c668582392f9559c3398,2024-11-21T02:16:19.587000 CVE-2014-7110,0,0,da2d1246ca11293fb5be0cef865798dcda3503eddb91f189d67266bf82c5764d,2023-11-07T02:21:10.917000 -CVE-2014-7111,0,0,c850d8ad70b8a50b0bb713a3f4890bc379e6285e645927c750fdd6d5f5ec0bfd,2014-11-14T14:08:30.060000 +CVE-2014-7111,0,1,49c564d4136cf2f7ccc54c4b54695e70689c8cc292ead47186571170ce34837f,2024-11-21T02:16:19.800000 CVE-2014-7112,0,0,a0667ed57474988689339393c1dadfc01bf465d2254f87e75ffc8c4ae7ec4dbb,2023-11-07T02:21:11.190000 -CVE-2014-7113,0,0,638d0f758454542f650396c8185418d1aad50c2011785f81a21693071b7e0414,2014-11-14T14:08:31.593000 +CVE-2014-7113,0,1,7a99c0d1e834ed5c5e1f3f814dc64d0ca568e06a9af266c7aa555a5977cad9bd,2024-11-21T02:16:20.033000 CVE-2014-7114,0,0,1d7424b724704c6a1be4a6c7be637e18a8243623281059b362c9c25edec16fad,2023-11-07T02:21:11.437000 -CVE-2014-7115,0,0,621b3ac6f57f264806715782204e4bdf68a83a5b17c1559ee79f95ec60fd0876,2014-11-14T14:08:33.077000 -CVE-2014-7116,0,0,64ac2264dae81b446478b0dd79eee9ae72ad23d5f29f2b1ebb75e8b57d0f19dc,2014-11-14T14:08:34.593000 -CVE-2014-7117,0,0,45d405f27ceca67044b29f71daa3db8a42db9c15c946336c6b1a550b01747539,2014-11-14T14:08:36.110000 -CVE-2014-7118,0,0,f7ff489e014f3599ed17796a0007daaefca5fd973fe33ddc8b6bb35c62f95643,2014-11-14T14:08:37.610000 -CVE-2014-7119,0,0,77baab535ac9ab833e51bb377dfe9a9601b2a4e32e5941824f670c79eb795af2,2014-11-14T14:08:39.110000 -CVE-2014-7120,0,0,cae2354973e7a12137e70017127861d90b7d5add88000da7b80a111c00b36d76,2014-11-14T14:08:40.673000 -CVE-2014-7121,0,0,7b7959e8aeb1a681e30056924de1906cc3064a6bb76851de3f52e1367a48fcac,2014-11-14T14:08:42.157000 -CVE-2014-7122,0,0,aeb6a38e405db18e0562080e3d515a0e79ca23642b74e2e832ee79817bfc2439,2014-11-14T14:08:43.703000 -CVE-2014-7123,0,0,698bd4933c21fd06a8ef376f073cbc047fc06d1afb80523e5c6c60839e908b95,2014-11-14T14:08:45.207000 -CVE-2014-7124,0,0,5049b783d73f0d565b8f8434d466b5bc450babf28401ddc346702bf1ea109c2b,2014-11-14T14:08:46.737000 -CVE-2014-7125,0,0,65d49ce6e4048cc4e817ee7a76838c26c2944953c1d022c4b4c74ddf43185154,2014-11-14T14:08:48.237000 +CVE-2014-7115,0,1,81340a6548f92399b4bcefbb8ca642d40040363517b4411cec235a36abf2e2c8,2024-11-21T02:16:20.263000 +CVE-2014-7116,0,1,c321aa4a4d63f7b4ddea7629d2c9ace75d6d94c67fc74fce7934b1254a81e12a,2024-11-21T02:16:20.463000 +CVE-2014-7117,0,1,425aac011a0c66cabf2f4bf3a4373ebeb11960114438d829f1758c1453ff687d,2024-11-21T02:16:20.653000 +CVE-2014-7118,0,1,62eb4ce95105f77f5fb0274b9ffd638950cfe14d51290e40daaee945ce4aa718,2024-11-21T02:16:20.843000 +CVE-2014-7119,0,1,049599c7b62154112fac269184e5573baa370011e81febe9d48e9797c7b4c097,2024-11-21T02:16:21.030000 +CVE-2014-7120,0,1,51a2015dcf1219d72c94ff07eb4158741715c5cd16c4bba9c16ec9b467098790,2024-11-21T02:16:21.227000 +CVE-2014-7121,0,1,f8e07f2dafd857711f99b1f19a80a61d40e9c3d0dfb80d7da25aafcefab849bd,2024-11-21T02:16:21.423000 +CVE-2014-7122,0,1,41a610492313da39dff38f47b371872e0ba76f3424e9f02ce2ec31d455519078,2024-11-21T02:16:21.607000 +CVE-2014-7123,0,1,6fe70e13521f3627c7d7ef2d91e8cb52094a335655642e2d9ef1407c84bd2eb8,2024-11-21T02:16:21.790000 +CVE-2014-7124,0,1,9a4b2a2f1c8032662fadbe32ab01417ba5ad8f4b2576d01af77165f975db7226,2024-11-21T02:16:21.990000 +CVE-2014-7125,0,1,cf49938d26f56b3b90302cac5e8a809cbaeb93601b3f154db85c8791ea0817cb,2024-11-21T02:16:22.183000 CVE-2014-7126,0,0,9bfb56006421722b91a9994b46afa2760188b4115a3e051fdd51182bcda898ac,2023-11-07T02:21:11.750000 -CVE-2014-7127,0,0,810b77e13367bdf84b30ebcc0ba48af14dd4497fc609f54efb03805ba0f59648,2014-11-14T14:08:49.690000 -CVE-2014-7128,0,0,74efb360c5ad5943d5e32206e260015f01d5b943f0da0fccab6aeceb8c62b4f8,2014-11-14T14:08:51.160000 -CVE-2014-7129,0,0,0155c610aaf0f1dc5b44152101970afedb698a4fd2f06afb592437867557bb75,2014-11-14T14:08:52.690000 +CVE-2014-7127,0,1,6e2e5426a8a07923cdeb6c367ecfd91f298618850f51d68891b10504fd94209e,2024-11-21T02:16:22.387000 +CVE-2014-7128,0,1,b896b628fe91ac575c11a20ef288ec7c919750d9ff301dc334c164cf65705f57,2024-11-21T02:16:22.570000 +CVE-2014-7129,0,1,11b8c2d3bdd5c4a5f47df6525afd59754fb577b5f8b5ddd75a36b23b77eceebd,2024-11-21T02:16:22.760000 CVE-2014-7130,0,0,bac83cc2bbdde61a4a79b63c1acf76d7b18b183bae153916350d38932f1792b8,2023-11-07T02:21:11.993000 -CVE-2014-7131,0,0,600349099effb03221bc563f6ddef09cb6c9a17bf0ea83002f3ae8d246612aea,2014-11-14T14:08:54.207000 -CVE-2014-7132,0,0,99dc9bae719ff5402466e6c8669e0d8683fc0ee6d13c900db5ba9435c66f62b3,2014-11-14T14:08:55.690000 +CVE-2014-7131,0,1,de1a19f1e66c4d1bee2a6b4f6b72453e56df0477ff5cd3de1956853fd0c4b8e0,2024-11-21T02:16:22.967000 +CVE-2014-7132,0,1,0cbe1f3fe8b94f3ed0b94a471ff5e0d8cdc3b91f180a658877118e5e47d31d5c,2024-11-21T02:16:23.157000 CVE-2014-7133,0,0,00b677088d2f9c8797dc290850d00e9d7bfc02f964dddcb5734ee3b54be87885,2023-11-07T02:21:12.227000 -CVE-2014-7134,0,0,6ccee7f3ad6478158551a958b07c2c6ae54ddb6d0bb0b2a4d8eacb777997f4db,2014-11-14T14:08:57.207000 -CVE-2014-7135,0,0,5f9c5360114a58ff82880df10d12e1b3540c63d0296f8e919b4e9993bd4ab9ed,2014-11-14T14:08:58.677000 -CVE-2014-7136,0,0,854f9a871ccd918c787a9d09a994fd081cdfb10709b6fa8e464bfc1d87104879,2014-12-15T19:50:07.737000 -CVE-2014-7137,0,0,d4f4007b853671c4665120840277a28bb2c198bf7b42ec3d994f1a34e53b0f93,2018-10-09T19:51:25.287000 -CVE-2014-7138,0,0,09d732dd7f86044b1f24e5c4899009cefa7e1b62aef4003ca2134c7cc4db1e02,2018-10-09T19:51:25.693000 -CVE-2014-7139,0,0,859fdc28f074df629f450fb252cce2e6fed741c83c3175f5e019dfa0a162c2a4,2018-10-09T19:51:26.270000 -CVE-2014-7140,0,0,094c9fefa6d2b723517c6f479942ae809cd5685a1aaef09e5fef849682a386c6,2015-11-25T20:35:15.927000 -CVE-2014-7141,0,0,ca664f9abc2fe724d372601ca9f91577e0f848491dce4c587df46399c20f1c7e,2016-11-28T19:12:54.170000 -CVE-2014-7142,0,0,d203a362d346de09b0c19282993143bb25cde958172f19368a7d03dbd7d165e7,2016-11-28T19:12:55.373000 +CVE-2014-7134,0,1,90153fda84b782b5798cd3b7777b64ab7ae987d5756eb7d8a27d8f2163d15cae,2024-11-21T02:16:23.370000 +CVE-2014-7135,0,1,c3f45ac3455448f753de4545c7e47497c03cb7623c3d6145289258b4fdbd7c9a,2024-11-21T02:16:23.550000 +CVE-2014-7136,0,1,72513d0090a17ebf7bc24060f6e05a29a7e7d50a2a5d3544c680528c19b6e02a,2024-11-21T02:16:23.743000 +CVE-2014-7137,0,1,99cf493b406621e8dad7cee3cb83946e5d50eb7aa8bfa67dc8b6129dc1d36134,2024-11-21T02:16:23.907000 +CVE-2014-7138,0,1,b4e9de0f9f3a8dd0a8ebdc4deeb0f9812193e048c48062017a8163cc215d85d1,2024-11-21T02:16:24.060000 +CVE-2014-7139,0,1,7f6dfe9137a9a986b5d655fac15fb058bacda4fc4cc5c1baa9b401b022fa1f72,2024-11-21T02:16:24.220000 +CVE-2014-7140,0,1,c53419d017c46fad8ed912ed8e480fe6803a48644e411e1686687a30bde5d417,2024-11-21T02:16:24.370000 +CVE-2014-7141,0,1,ad54a186f858df850bd59756c764aa3986450ab7168d45ca7edc10716543b701,2024-11-21T02:16:24.517000 +CVE-2014-7142,0,1,2ef09ee430e5c5b886e1136af52d5af252c9da63c1648a603a89c92b19b27a6a,2024-11-21T02:16:24.693000 CVE-2014-7143,0,0,3fa85a7ba53724cb81adfeec507dc25153b50297b36961e9a9e3f7f711b2358a,2019-11-14T14:45:50.167000 -CVE-2014-7144,0,0,1618f94577c8d10f0a39647454da97c6243ca9e8fb05e8eed2d795033311959f,2016-11-28T19:12:56.453000 -CVE-2014-7145,0,0,cfc04e2db5a6df28bf9257f7b8e850d099b94954dc77d14471c036a1ba41f0e7,2023-11-07T02:21:12.543000 -CVE-2014-7146,0,0,f6650f39fd2c0ba7ea51a847adebf52673dd3947ee658df62789865196170f8b,2017-09-08T01:29:15.013000 +CVE-2014-7144,0,1,7f82bef635d9cc0252ffcc221b85914a43ed52fc0a51bf034e9c70d98bb58e4e,2024-11-21T02:16:25.030000 +CVE-2014-7145,0,1,5ca0668d9d4336811df389abed8dce1a62052b789f655dc50ac4507b0099ccb3,2024-11-21T02:16:25.200000 +CVE-2014-7146,0,1,75978059921d8560374196ed7e4200f97dda2c78768b8d67184dc26cc796139a,2024-11-21T02:16:25.370000 CVE-2014-7151,0,0,ee8a2de529992dc55d1dbff402623b4c4d0e103acb83b30b0db29a16b64cde59,2016-01-12T01:22:11.287000 -CVE-2014-7152,0,0,8ab67447332e960bcf1e26aaab98af3dcd47eafac04db6cb681c6a0cd31f5542,2014-09-30T17:14:00.620000 -CVE-2014-7153,0,0,a9ed67619c6f755594014ae1c895954368157b057addf397c02d93a5794c9a59,2014-09-22T15:17:58.113000 -CVE-2014-7154,0,0,0ddb097d9b153df3063432664c16d80c41cb6437d30a6a07ed236107e55cf34e,2018-10-30T16:27:34.687000 -CVE-2014-7155,0,0,fe705da2b89e9e0bc26612e487d396b9567b06e885e4a4f69254cfa064dec48a,2018-10-30T16:27:34.687000 -CVE-2014-7156,0,0,31b0051fec70d7b9cfd334e6c18c5598c1a5ddb3086a51d41f06db11ac5a097e,2018-10-30T16:26:53.700000 -CVE-2014-7157,0,0,aa65ddd46e22d5b9f61758aaf7d76b39c8571f2b63bc1a2eb5ed506b5300425a,2017-09-08T01:29:15.073000 -CVE-2014-7158,0,0,162be160a3070e7ae09e451bf98e6eea204f9c83918dfe32eccea1487608bb3a,2017-09-08T01:29:15.137000 -CVE-2014-7169,0,0,83fdeb2e04e063b4237d1b8ab5d2af1dfe566f1e08364caabab174dbb93ba576,2024-07-24T16:47:57.690000 -CVE-2014-7170,0,0,71e3e0158df7d2cb5aed111849ad755d24f45eb9cba8cab0d0e45522a573b5eb,2019-07-11T14:03:33.747000 +CVE-2014-7152,0,1,cf9b67fbce270b6d90e860506a4c8ad9a63903a109c39b3be476c5162a3535c2,2024-11-21T02:16:25.673000 +CVE-2014-7153,0,1,7920fd47123113ede523085f72dea939fc7a2546d7af45a31b65d42572035f74,2024-11-21T02:16:25.817000 +CVE-2014-7154,0,1,3eb955a3644ccb28be090e76c0893821871e64a22ed03368a09e21d3e4c7ed64,2024-11-21T02:16:25.950000 +CVE-2014-7155,0,1,01354bf92aaa04617c0c4b5de31f97bfd47d5bf61e96add128e966573cb5756b,2024-11-21T02:16:26.120000 +CVE-2014-7156,0,1,c3edbdf7df8e721039478f849ff4a173994e8b32ebb0d8e6b6732a8914ef50b3,2024-11-21T02:16:26.290000 +CVE-2014-7157,0,1,31330848286306979038ad1d1cd81ce51144a156ed2eb0b75946c14c92076827,2024-11-21T02:16:26.460000 +CVE-2014-7158,0,1,1309b327042f98165c1a08d21f859376c3f179c7e17f3b526744b1938c4ba6d9,2024-11-21T02:16:26.603000 +CVE-2014-7169,0,1,277635b41c94c9f815c03537119055c06a9476b660978243f2879d4cfa65136c,2024-11-21T02:16:26.753000 +CVE-2014-7170,0,1,b3bd95c24762ab3d1c69db5ab9b803d48a7a07f749a765c0d2eb50371d4dad59,2024-11-21T02:16:27.263000 CVE-2014-7173,0,0,23b311bc6963c1af3d18f408eb0563f95bf5d3960c4beccea0ba4be988649749,2020-06-02T13:24:09.123000 CVE-2014-7174,0,0,8d2221ff0aaed3a395aca672e36967d395dbe97f118a91ffb3062d4241a6d8cf,2020-06-02T13:51:27.387000 CVE-2014-7175,0,0,b606cb205c977b39de95d285668ce1dc32b6d81d9416471fa37cc7b6fde655a0,2020-06-02T13:51:29.823000 -CVE-2014-7176,0,0,640e69654d99261d03c68d79fb80c5c0f35afc348d1a5403b2cdea6718951776,2017-09-08T01:29:15.200000 -CVE-2014-7177,0,0,33f3259e61a84295d2f6ca38eafdbc8c3d71922f860c1eb6ca19ff6c30a57ed3,2017-09-08T01:29:15.263000 -CVE-2014-7178,0,0,34a80a42cbef5b55267ac4eb016a0763c36126dcbf056cb83279d3c921c110ac,2014-12-17T02:46:29.930000 -CVE-2014-7180,0,0,022b34d94442013e4c0bad8cebc3ae3480fd4586c387419683201315d9810235,2017-09-08T01:29:15.323000 -CVE-2014-7181,0,0,1c93c6516cfa8c20f0513d536d72934246c7fc7310ce4cfa287eb61ae548231c,2018-10-09T19:52:17.757000 -CVE-2014-7182,0,0,7a77dfbf6088febabc57886f84390460bbcdfa91da043590f54cbab7238faa57,2023-05-26T15:00:51.330000 -CVE-2014-7183,0,0,c0ad07d57542fbda9b1c2b4863327bc2a7e23bc66795eb5df41a357536adfc8f,2018-10-09T19:52:18.493000 -CVE-2014-7185,0,0,8a2ffeb1624b1099db8804890362d943c0be0f1acaa1ce711fb67f106dadfd33,2019-10-25T11:53:59.117000 -CVE-2014-7186,0,0,0fe60ede18376cbcb6dd5827fe2b81b83ec23459d9e5d21cbbc0aeedcdad61b5,2018-10-09T19:52:19.070000 -CVE-2014-7187,0,0,166f038012ce8cfabc1650e83c91e8c9f23a6ed7de3447154ef027459575970a,2018-10-09T19:52:54.273000 -CVE-2014-7188,0,0,598512ccedbff35d902a17b328a5d26075b727191f9fec0845aca74f4a68ef55,2018-10-30T16:26:53.700000 -CVE-2014-7189,0,0,30968ae1b78fd5c4a1f5cdf84dd7168f3b738d208591376e36cb590d93252ce5,2023-11-07T02:21:13.457000 -CVE-2014-7190,0,0,9b0851983509dd54b61f8247682ded37f022f885cf882486caa5552dd12baf99,2014-10-01T19:30:45.557000 -CVE-2014-7191,0,0,db904c80e0cba6b00175c15b8048a025615ccce7c9179db9a76792d4d9a99476,2017-09-08T01:29:15.590000 -CVE-2014-7192,0,0,fd37f87731667ef844ed4bedc9dbeb3b42d7d496034b93fb58bdf1d46418bb52,2017-09-08T01:29:15.653000 -CVE-2014-7193,0,0,4ffb71d93dca80d3f975463407a1cac72bdcd197a5586762ea1266d1f813eb3b,2021-07-19T15:19:59.683000 -CVE-2014-7194,0,0,e745468d8e89e21fcec77e372f8fae99e37dea28b480f0f7a1c687fa94134e68,2014-11-21T14:58:57.503000 -CVE-2014-7195,0,0,54a6b70805a5b5f8acd9eff405774cfca884d460d1448c7791ea39e2a168af3d,2014-11-21T15:42:36.407000 +CVE-2014-7176,0,1,bd7e8f7001eed67d54235e34debc218b7f3d262e76bf6a16757d99c4099fab3e,2024-11-21T02:16:27.880000 +CVE-2014-7177,0,1,5084be9fce8d40db2a985bd745675177eb3838e0d436ab9750c5138d75b3c222,2024-11-21T02:16:28.033000 +CVE-2014-7178,0,1,ea7ba419a96d31050f94b4e4e3648bdfbdde554b350822b3a97f282c381735fb,2024-11-21T02:16:28.200000 +CVE-2014-7180,0,1,810a367b2ad952ca82c04146a0c49c3cf32a17479748a7be25546d1d242533e5,2024-11-21T02:16:28.347000 +CVE-2014-7181,0,1,eea04b1f19bd8d1d03ad3fc0452066b01c1569ae000c8a635066c183ab92705a,2024-11-21T02:16:28.500000 +CVE-2014-7182,0,1,3fdc1c81ff3168ead086aea7955923892b679888bd831701382023939c6c380f,2024-11-21T02:16:28.647000 +CVE-2014-7183,0,1,92cae8e9d3b5bc99c2018b8613289919deeed35b68e311455f76405e8504b685,2024-11-21T02:16:28.827000 +CVE-2014-7185,0,1,0c39c4c2d1a02f002dbb5eabcca33b2b8a75272a6a01e9f81e0e7d564ae00b8b,2024-11-21T02:16:28.973000 +CVE-2014-7186,0,1,85b8c1ae5a2f7c46a54e11b2a016681f3ec4a4167f8e0c6a605cbfe64ecad4e7,2024-11-21T02:16:29.170000 +CVE-2014-7187,0,1,eb1b438265d8da57986b26198b74ced5d5a8e88c445dc10c7b2485307d5094e5,2024-11-21T02:16:29.490000 +CVE-2014-7188,0,1,d29cdca40d4ef19215fcb41efc2e4199ab2d5ab39ae8c696e8a787701cd13b18,2024-11-21T02:16:29.813000 +CVE-2014-7189,0,1,7c7166f356fa0c2e3b914ba4bc90de1438688c1612987fe3a69d36511c0e1baf,2024-11-21T02:16:30.013000 +CVE-2014-7190,0,1,14cf2112487695dafe0c2e7faef4cc06362591d03a3aa7a3cd006153cb1554bc,2024-11-21T02:16:30.137000 +CVE-2014-7191,0,1,53cffbca638e8c024cadd9945bef35d48ab5296424a9065ec6a92f82ddedce32,2024-11-21T02:16:30.300000 +CVE-2014-7192,0,1,9b55ecbba954950da21b51e26260e33f3bd7e15f37e8fee54483892f865f087d,2024-11-21T02:16:30.497000 +CVE-2014-7193,0,1,0a6cbc844297b513a6fa5fe0dca70f3aa71e691dfc8dcd7d7fab3fcf05f538f7,2024-11-21T02:16:30.670000 +CVE-2014-7194,0,1,20499eaa844962aad3861f18e8273d268fba55f3e6a562d5eb6d7803ee65893c,2024-11-21T02:16:30.820000 +CVE-2014-7195,0,1,df2f3e533a16469ed70561ea93e312387db6bf9b037fb07ee04317ac41317fe0,2024-11-21T02:16:30.970000 CVE-2014-7196,0,0,2b5de1aada1b0247f4eabcad090304f36aff77964536987ce55733b4543df370,2023-11-07T02:21:13.657000 CVE-2014-7198,0,0,f38c0501ae0c902d26f02e470fddc251b4dfdd212e7e9c8df70722641a28a038,2019-04-01T14:59:08.710000 -CVE-2014-7199,0,0,62d0a9439dc47a574114cbb9f2b884679e3e1e3557b5626f66d5a9a4dd241dfc,2014-10-04T05:21:46.947000 -CVE-2014-7200,0,0,af659717e3f152e3bf0627e6b26f1c3f6292ab92a56909a8963f01a7c774c502,2014-10-22T14:22:41.860000 -CVE-2014-7201,0,0,80355309e54f55cd0fd311711a1795a5ddf152ab2a9a9b29222575db4d1f8cdb,2014-10-22T14:26:18.077000 -CVE-2014-7202,0,0,270931e24c4c4bdc8e52d160b662242426db085edbf01ca45618ed10161aab8f,2017-09-08T01:29:15.717000 -CVE-2014-7203,0,0,40e2974821c334d6a689ff621cb9fa9c3fc68c2ab63f356dcef907bc4489b1d4,2017-09-08T01:29:15.763000 +CVE-2014-7199,0,1,22202ba1b9fd9d888d8f8f4ba09a286b5851c7b54b13c56a9a3576467df04ad5,2024-11-21T02:16:31.300000 +CVE-2014-7200,0,1,5b1c4d747b09e4f2247a1128155230c52f8100d7f2a00dab778d0e9885100a1f,2024-11-21T02:16:31.460000 +CVE-2014-7201,0,1,03661c001fb050779d6e190c06c39ac345e3770fe0314bc7b56fda6e5997b0ec,2024-11-21T02:16:31.620000 +CVE-2014-7202,0,1,eabfe7a50b3b1c51aa927d2ff72a581109d24adb87f7d15c3c28297f979a7ed5,2024-11-21T02:16:31.783000 +CVE-2014-7203,0,1,f50ecc522fb1418495d2a3843437d29f2c4879a473b7fb9b7466d8b4b88e90be,2024-11-21T02:16:31.937000 CVE-2014-72038,0,0,9c1a3783e6eb249ee480ef4e43c7612aa0e374694a3309642488a1c6667e8d5c,2023-11-07T02:21:07.907000 -CVE-2014-7204,0,0,00c993285437313fb84aec438fa41e734dc581702c4417771b4e043f1ef1f908,2016-08-30T14:10:07.707000 -CVE-2014-7205,0,0,acf6b06b678a385253d11faf1e7a22ad092e20a0f729f3ea889860a6b07291be,2019-07-16T12:20:55.777000 -CVE-2014-7206,0,0,5edffacf3d2d19d00403699d5aa3fbefd45847426d355670a1be7f2cb54387b7,2020-01-08T15:22:54.567000 -CVE-2014-7207,0,0,43d931803772ab1f0fa16e3448e33555abec75458e158c5c3db99d47b5044b66,2014-12-24T03:00:46.897000 -CVE-2014-7208,0,0,16ce8c9991f9cb41419272399802e0d6518d0c5863a67ccb06c9dccaba801da9,2021-05-14T19:57:00.300000 -CVE-2014-7209,0,0,4f8a39218b8c0bf5f8fc0ea9c7a0de74361e26b1ce4e6e0bfcc7207647b2156d,2017-09-08T01:29:15.950000 +CVE-2014-7204,0,1,8aca94042638c0e98e3773298470fd48015002176d7f81664edafafd18f6fe07,2024-11-21T02:16:32.090000 +CVE-2014-7205,0,1,852376eb2315bc0be21b6c7bde1c9bb3736772f6855fc13bd44e81410284c870,2024-11-21T02:16:32.257000 +CVE-2014-7206,0,1,f980acda51e784d583a00eda20c5eacad2f19f8a943e9cd8661080364b0a3fd1,2024-11-21T02:16:32.430000 +CVE-2014-7207,0,1,9d7e9e62e117a976fb152882475932d62224c4475c4a858978bab563e9286b80,2024-11-21T02:16:32.570000 +CVE-2014-7208,0,1,269f1e1302227f87b9827f92a87d5e8995606c598f8e7034d10d680c45800f97,2024-11-21T02:16:32.723000 +CVE-2014-7209,0,1,43e93d2d8b8e6dad100fcf177eb05730e47126bd3530df76868c0f5eda1d6f75,2024-11-21T02:16:32.860000 CVE-2014-7211,0,0,8c2444e0dec6612b68c62bf1aa00b0e0bf79d5dcfec26984d76b2618c5f44fce,2023-11-07T02:21:13.993000 CVE-2014-7212,0,0,37dcbae6cffde220038026127ca19ee7dfdf710813746d7e1951422983051b11,2023-11-07T02:21:14.217000 CVE-2014-7213,0,0,d5aaf9aa82a9d84be333e8bee6cc038d083149f513a8d4870ccaeef71d96641b,2023-11-07T02:21:14.460000 CVE-2014-7214,0,0,46b95b83a89e03d8aa2b6ada5962a8f7d68c2e1270f2c8f9b9b0d5d25e01e68f,2023-11-07T02:21:14.773000 CVE-2014-7215,0,0,41f9b09e6dce2db98c55612d01dfbb619d70d48a89511c544d472de9a081b156,2023-11-07T02:21:15.010000 CVE-2014-7216,0,0,4601881a4e58d6154e1552331bc6b9c08ae063224fc4fcd59d2e2843b5d73152,2018-10-09T19:53:27.853000 -CVE-2014-7217,0,0,8a10bd7f2ec87563fce0712a568dde235d852a6e76f81205f1419271507cd10d,2016-04-04T13:15:00.763000 +CVE-2014-7217,0,1,e59bc5bd585f52cb818675e0c5efdf105973ecbb4774323fad9f52adf9802b17,2024-11-21T02:16:33.223000 CVE-2014-7221,0,0,50a45f400c64860562ada2d6cac2a9f54f9909badda0857107459f1456f12820,2018-01-30T19:22:28.533000 CVE-2014-7222,0,0,9e7d28508125b1e945d824c6073fdde92cd2423c27a5ce9753f6f730f428301c,2018-01-30T19:21:48.140000 CVE-2014-7224,0,0,643d1b03334d252376f26fa8f22616158e4de7e75ffcf0f9fb4709cca0ed8c54,2020-02-12T14:38:22.013000 -CVE-2014-7226,0,0,9f31a0ae167fd3b27bca3ea6d21d23dbd563d6f15aec7a1980f9e2a8fe949930,2014-10-10T19:59:58.357000 +CVE-2014-7226,0,1,a4f9f739d0d931ae66373366d7f4b75ed47f6147fa68696a3c9a3c3caff7c278,2024-11-21T02:16:33.890000 CVE-2014-7227,0,0,b7c0d9798b646f094dae7bc34f0a74a1e73b7c215e21b1bcf1b2e63e5b94bb8f,2023-11-07T02:21:15.303000 -CVE-2014-7228,0,0,523b13b762571d84d9f239231ac8ec91095769f18994c5cacfd1471a0f0aed97,2016-05-09T15:36:26.267000 -CVE-2014-7229,0,0,53cedbb7328e474e81fe314ed07e4eb0e639a04fb0c50eacb3e7cf01181f78ac,2014-10-09T20:52:48.763000 -CVE-2014-7230,0,0,bcc8a5c45e3fa48c04becc5fa41dec27f9ee071bab4eafaa1e1fcf80e6c9c417,2018-11-16T15:29:42.567000 -CVE-2014-7231,0,0,2a47a63d0aa1e7fd8f284f2b71fab5da972ae166616305f7f646cc7dc24a790c,2018-11-16T15:28:56.250000 +CVE-2014-7228,0,1,ca48ff6e80c9df5d55369a07e0e2f7b8c47a76309ace49d98df2c2d4d99f2195,2024-11-21T02:16:34.053000 +CVE-2014-7229,0,1,537093a06a0c95cf3b2d50186150fc901eb0c7ae80e1b04db2c5994b9eabf168,2024-11-21T02:16:34.207000 +CVE-2014-7230,0,1,a99a591292f15093b41e3ee696b1949dbd73fce5fc7ca9e7cb3c37c5b23ab128,2024-11-21T02:16:34.357000 +CVE-2014-7231,0,1,3ea55d5052ce4a925164643420bc81e6ea9762f06a2af035eda5b78e9c4ae76a,2024-11-21T02:16:34.520000 CVE-2014-7232,0,0,a557e67be43de0229ca11b3f50f0c83c920166186db1314dafedf03af431da8f,2018-03-28T01:29:03.200000 CVE-2014-7233,0,0,423cf8198d9cd764dbab1eb1cc6bdf4d10df0c4b3b5e9949ddd1589d97c1852e,2018-03-28T01:29:03.293000 CVE-2014-7234,0,0,b0e6697bbb40e088b5edf2f22fc1fcce6742a459b108fd6809c00746cf41df3f,2023-11-07T02:21:15.373000 -CVE-2014-7235,0,0,ad867f981f81345507453258e0ca4dc45a6c883bc8fd03d309a72fb27cab9aeb,2019-12-10T16:01:50.690000 +CVE-2014-7235,0,1,3c644004d4c88dab36c6046a1f0ac11232b28a6195d8a09bd5ee0d9435f9bf6d,2024-11-21T02:16:34.997000 CVE-2014-7236,0,0,8d98647a528d807eeedeb3d6c634e6163eaf49191eda9f03f25182441cd9d410,2020-02-20T15:23:27.913000 -CVE-2014-7237,0,0,259503760db48256c0302211e335611e2bf4cd077324fcdf54595a9594890cb4,2017-09-08T01:29:16.167000 +CVE-2014-7237,0,1,eda7689e54d7fc05f8e2e5ba313e51b5177fa96d1b173e2c368bb148536d3ac9,2024-11-21T02:16:35.327000 CVE-2014-7238,0,0,76b67fb92987a69d03d4c9e3e51c1816900a4dcf66c46899165e48f8431b6fa5,2020-01-24T19:10:32.123000 CVE-2014-7240,0,0,91374c1694c76d83fb0c1d95d6c6af5c723c92a2ce1137ce176ca01a483d64e6,2017-10-12T16:47:57.753000 -CVE-2014-7241,0,0,5c1ab3ed4db80cf9008231709d1e5685da66b74cb42b48c662075902ea0d8cad,2014-12-19T14:07:45.157000 +CVE-2014-7241,0,1,70d2126460d23de1035f8ce05b067a14653224da1735639b81ee3c550caddde9,2024-11-21T02:16:35.803000 CVE-2014-7242,0,0,35d3d1058deb1b97ae53aeae366926bf03ae429879186ab538c1c8350b361536,2017-11-08T16:02:29.370000 -CVE-2014-7243,0,0,f7f4fdb29573a2a9ac7284aa4b9d4fa260153b2eb34c2ed9c82d6ff15c0de90d,2015-10-28T18:11:30.340000 +CVE-2014-7243,0,1,4b73529a1441cec145a647dd7e1728c8e55bcfa56ef946cf5749f68f276f2f26,2024-11-21T02:16:36.043000 CVE-2014-7244,0,0,4784033a07526d1fa6ab0e531e2f990e1acfed1512be0c9159203889a7cee09b,2023-11-07T02:21:15.460000 CVE-2014-7245,0,0,5a7667e4343b7cfc45e835c86f478030d7aad9aea0d592ae004e60bf5f3c9e87,2023-11-07T02:21:15.710000 -CVE-2014-7246,0,0,6ab9371d304b69e354f039e9ba6a94f3af8544767c9e86056bbe4c43f23c0773,2015-02-10T18:09:15.920000 -CVE-2014-7247,0,0,490d094f4d7cec17e689bbe9adc76371509415b1867b8765ef74ff8e89035544,2015-02-24T16:18:01.973000 -CVE-2014-7248,0,0,0a5188f1f28b054614a8d27210308a3bfd0271070f5692d90a81a20923203ff6,2014-11-17T13:45:19.320000 -CVE-2014-7249,0,0,d29fc9d2a7f1bd3e4ce83016956c2a3f86be214e6cdc36a56295579ac82d090e,2014-12-19T17:13:09.670000 -CVE-2014-7250,0,0,c8b9207b9a5d1c17e279268d9b2e8c6589d780aabba8c5352e360fd753e7cb68,2014-12-12T20:28:21.973000 -CVE-2014-7251,0,0,00e04f4b817a65c9339d9df37526597ee1ba6946170219084b2574f26957905e,2017-09-08T01:29:16.217000 -CVE-2014-7252,0,0,a26f2a2a69630be120a32c0237475eb029ef752e9097e44f3c37b24724d8065f,2014-12-08T13:55:38.113000 -CVE-2014-7253,0,0,1b1477e25faad1a10ba41cfb701ad987a2cdd6069a0a451c5de873cd0f4e4327,2014-12-08T13:54:39.737000 -CVE-2014-7254,0,0,7f58e28ed5870acbc540bef00c77ab67bf4c08e697b2ae25f78bd2b1ebc297a0,2014-12-08T13:58:35.097000 -CVE-2014-7255,0,0,18aad01892b36ad38eb7660e5fa0b5f18cdf56189fb40f129880f0d607d9c70b,2020-07-31T11:13:20.827000 -CVE-2014-7256,0,0,e23186b4c2b85c197451e22ef2385bd1442110f590ec191d014f8a70a167e698,2015-10-28T18:14:20.903000 +CVE-2014-7246,0,1,2e951ce647b29c04d6e78c988f31706d7ba13a948fad9ae5d7204a811515d307,2024-11-21T02:16:36.197000 +CVE-2014-7247,0,1,e59b0c971cd605a93d36b8685447ce1a1796a46fb7d9d49edba3d41419ba4fd6,2024-11-21T02:16:36.310000 +CVE-2014-7248,0,1,b18f7c18aba9605303a4ebd2962a21d9f52c19f0f222ec7193fdd13509bb8c75,2024-11-21T02:16:36.433000 +CVE-2014-7249,0,1,12a711e248d03cdbb941e05b815017c65147856fa48daae189d3f405651efb41,2024-11-21T02:16:36.550000 +CVE-2014-7250,0,1,f4b84fbb10b9e2cb77de7b0b004bbe05bb2c2e7a2a3c249f3a6737f6b0c67169,2024-11-21T02:16:36.703000 +CVE-2014-7251,0,1,6512358746dcd89966af4a6d64f0f2bdafb9efee88f519d08fc2a3b9939f5369,2024-11-21T02:16:36.820000 +CVE-2014-7252,0,1,36ca0a33ce3bcff492afaa53325f069ab8fd2e4b2a9376bfa94b3f737f3c1efc,2024-11-21T02:16:36.950000 +CVE-2014-7253,0,1,e5082240186788de0ac29b32b8fa0ccb22ea8fc062d52220895a4ee4b7afdf2d,2024-11-21T02:16:37.080000 +CVE-2014-7254,0,1,52a4db193ae3fb536060473e20fad209d2e3a1d3727efb4dcb78d640ba3de2a5,2024-11-21T02:16:37.200000 +CVE-2014-7255,0,1,424a5a424ccbb0947c56fc5796665b4801a9b77f13ed173380b42f61022dae44,2024-11-21T02:16:37.320000 +CVE-2014-7256,0,1,e096b49c5daa9cea6e5766ea6155c0c495d624811035b7871ab82f9cadcf0d8b,2024-11-21T02:16:37.443000 CVE-2014-7257,0,0,3320e854e927112a92c0ebadf640d5cb7cf9b880e1e4f83c1c2d2e37d19b14a9,2019-12-16T16:53:01.830000 -CVE-2014-7258,0,0,f257900e0109d5aed08b87c3e08bf280fe54f9b7a889437f9a41063df0e4a9ec,2014-12-05T19:50:20.333000 -CVE-2014-7259,0,0,a3df7a864459d81ba04a92de4143f092882d8e75fd213d7084ff2c8dd5b87b5b,2014-12-05T19:46:04.317000 -CVE-2014-7260,0,0,5aa6360335e2fa682d01ef747d801a75ce0492aa485c3d923da1fd0a1a492ea8,2014-12-12T20:30:27.993000 -CVE-2014-7261,0,0,a1e9a6ad72d32055f2d3491b85ed70382bf61c217d6153195d1d37c8e9700a61,2014-12-12T20:31:45.107000 -CVE-2014-7262,0,0,e47a383a3492bde7e3fa4d0592fcd6e915d5be04d1519586b36d69a0ded07f31,2014-12-12T17:14:13.920000 -CVE-2014-7263,0,0,05da306ac6469c2db6c2514db3b970dbd778211562d59d7447523194bd8b456f,2014-12-12T17:14:42.107000 -CVE-2014-7264,0,0,28cc63f07b7ec62a6fd8678175ff41f49d09962169c1d27d9bf68a0ffae350ed,2014-12-12T14:21:38.633000 -CVE-2014-7265,0,0,bc7d2c7fd42dd97d6d2f01d03bef7f86167158cdaa2355f903412f66887ac43e,2014-12-12T20:32:18.560000 -CVE-2014-7266,0,0,82af844f6f5919e627b588c3e22ac83413a938c9ddd9d02dac45e631562901ec,2015-02-02T22:50:50.260000 -CVE-2014-7267,0,0,6125706bf13c5cc225d65dca791ab6ef6da13fcd79e1b28f016570ba2dc6b3f5,2014-12-19T18:58:30.760000 -CVE-2014-7268,0,0,c815de00faacdea83cd72680a109c7e2c654e23b65c49809e863c5e103da86c6,2014-12-19T18:59:01.650000 -CVE-2014-7269,0,0,6a14a0dabda7af6ea08bafd183d9580f5be1b868ae877879e1cde77730357de3,2015-02-04T03:33:28.540000 -CVE-2014-7270,0,0,e3ebdf4086fb5e80bba1f13ce7ccfe932a723f1d78926498e1d14b14c6680921,2015-02-11T16:42:06.653000 +CVE-2014-7258,0,1,2d8809740ad86ad5cbc9795f7d39d08da1560cfe0ce53171ed985f6774cc0618,2024-11-21T02:16:37.690000 +CVE-2014-7259,0,1,9d18e55659277121ff5f11b7ecf3c00a430177736e6904c8cc5646f36055a37c,2024-11-21T02:16:37.807000 +CVE-2014-7260,0,1,69ee4fb485587063c33d39eec8d44023ba0b87e0864fa937eb867c81ef044d2c,2024-11-21T02:16:37.923000 +CVE-2014-7261,0,1,91af90928c99cd14dceeb1f374d6b953da040d934cee381dc79c11bdd493e1a4,2024-11-21T02:16:38.037000 +CVE-2014-7262,0,1,585a0ad7a73ae934a466f255b85a0de195d9e4ab2181d7b0d4680c787f9b9df0,2024-11-21T02:16:38.150000 +CVE-2014-7263,0,1,d3028b0bd0e354e98f860e11a0e47f059b90b8ba4432b1f778c855fbbb6bb1bf,2024-11-21T02:16:38.267000 +CVE-2014-7264,0,1,6f630b17118972d2c266efdcc4d3edb49f8497c152bbff2f7ce203026ddb5a4c,2024-11-21T02:16:38.377000 +CVE-2014-7265,0,1,0a5a8213519c9683326bcf17b1fa0538646b61605d26a97889b3dcb18d878a21,2024-11-21T02:16:38.490000 +CVE-2014-7266,0,1,8ebd433c572cc0b9a502967a2067308e91b586c112a265b311c5d1b03f9e7b5a,2024-11-21T02:16:38.603000 +CVE-2014-7267,0,1,af0e6bd50a62138e0fbb0b10e4d268b101e9dad3f216132a95ed4794c2a92636,2024-11-21T02:16:38.720000 +CVE-2014-7268,0,1,fa79bb86107637e998942e0b37756f83bc7797da907469a131dd6ef13a753235,2024-11-21T02:16:38.833000 +CVE-2014-7269,0,1,b86f723d002c968574feae77fafc4654f05a560f61087cf1cac62f21c361cf2b,2024-11-21T02:16:38.947000 +CVE-2014-7270,0,1,ae5de9383b5c2166aad2585e12d114647b8043f1af92c84b39aba38d8da11836,2024-11-21T02:16:39.070000 CVE-2014-7271,0,0,155644b5a6b2097a063d82e9250ea25c12c4738e2774e51f5e9600a9b798325e,2018-03-27T23:50:11.713000 CVE-2014-7272,0,0,04ac013b031ecb7299e97aeba42183530016986d0bbe31babac8c672e6bc6c5d,2018-03-27T23:50:43.917000 -CVE-2014-7273,0,0,ad394c811cd31c8d72e6efb51d855e0a6e8ca4af4ab16b89acbdc2e7ac6af3cf,2014-12-19T19:14:18.030000 -CVE-2014-7274,0,0,6e9f1b42be28dc2130bfc691a599604b901b3693d9e0974ef1d6c1bc0e639743,2014-12-22T04:09:18.610000 -CVE-2014-7275,0,0,c4064848a440885457393b6cf844a480708781ee1290305d646814e537cd734d,2014-12-22T04:10:02.863000 -CVE-2014-7277,0,0,448002af6776055b0316a7edf13dc0be8e2a419fd889b2e9bda53fb1b1e6620e,2017-09-08T01:29:16.277000 -CVE-2014-7278,0,0,f4b6342a375b23e62e727b13d67e2a3164df172c79ff1089d2b4a1cee370c491,2017-09-08T01:29:16.340000 +CVE-2014-7273,0,1,30f67c329fd4e4e8b62b05fa4bcef8986e8b63f10f525dfa3f42862fc8d554fa,2024-11-21T02:16:39.507000 +CVE-2014-7274,0,1,87cced4aabb655420df5ef3c3b12838ae01a8155a40e74e50066406ebe88f559,2024-11-21T02:16:39.663000 +CVE-2014-7275,0,1,15ae075734d712a580d80978d2797973accdc75837655806ba436354e0e6aff2,2024-11-21T02:16:39.813000 +CVE-2014-7277,0,1,debf1af4744cd07b4d53e202541d2497fbf23abef1b2297e503345342cd34a16,2024-11-21T02:16:39.977000 +CVE-2014-7278,0,1,7b36f1cc7f903b3df92ab278bc07c4315e3a427f70e886237c79813779076aa1,2024-11-21T02:16:40.123000 CVE-2014-7279,0,0,4ab2dbe6dac52e5a1c98de81968d799ce569e5b7924ea39112f35663357bdd56,2017-03-28T13:46:28.147000 -CVE-2014-7280,0,0,61d2e4cebd9f2724a719962d7f3a768e57f37a12a00bc73316e7e7c2576fc77d,2015-09-08T18:20:33.190000 -CVE-2014-7281,0,0,dfab11a5c5ec2af814cd22f49dda681382e80e7b58a93536edab3558b6a6aba6,2014-10-24T13:02:07.830000 -CVE-2014-7283,0,0,bf9ba855ab187af3a7c9fc80082e4fe34c79322896780ddd8c3a958fc98d5b09,2023-11-07T02:21:16.187000 -CVE-2014-7284,0,0,61435dfa7cf85877f220b068afa359833ff8de40b78801a7a24379e97db29bba,2023-11-07T02:21:16.257000 -CVE-2014-7285,0,0,2e8de8ba6f38e66fbe112864405825ed50573ec2d49af77a2f9e4846f4134a4f,2017-01-03T02:59:12.377000 -CVE-2014-7286,0,0,d8b5de6526b86c0d6a9a3d609c9d290fc9d233b0ae6f8dc562a0becb831a8378,2019-02-26T14:04:00.980000 -CVE-2014-7287,0,0,68e9c09b89eb44229c73cc791d3ee13bb5c9d4904dfb8ac5ff7a7debed6aac29,2017-09-08T01:29:16.387000 -CVE-2014-7288,0,0,30a5c739bf12cd906af6697e3e56b5d6100c09806ef445731a9375bd3b411122,2017-09-08T01:29:16.433000 -CVE-2014-7289,0,0,3ec781d0c5dc32af80c8aa518e336380d0641a070823da9c192022383489ffb3,2021-08-04T18:56:05.773000 -CVE-2014-7290,0,0,3ba3fe0f804792b7814e42fbe03bfe6345ce14ba94e08164f3b921b070439fce,2017-09-08T01:29:16.497000 -CVE-2014-7291,0,0,15ff60fff2be3490f7c082be642715d05c28d1aeaabe8855f2996c56863e9f15,2017-09-08T01:29:16.543000 -CVE-2014-7292,0,0,d7af191a84551b321aecba62b6ff77b6aebeffd5d88c29331fb34dfc15095fb0,2017-09-08T01:29:16.590000 -CVE-2014-7293,0,0,783e3f943035210220fef6a8cbfb46ca1d9abfe4e6a03a3312188b40396cd6c0,2015-01-05T21:05:41.567000 -CVE-2014-7294,0,0,07cd4d984f7f244fb212dab13c9e6e25fcb3dca2d3f2df4c42de1b087db800ba,2015-01-05T21:06:20.053000 -CVE-2014-7295,0,0,3f072bb99a5e782ae60411f27151d100dfae29dacef340291c78bb3ab2670a4c,2015-08-06T16:28:35.580000 -CVE-2014-7296,0,0,7dd0e37bd3688b4b8b245bbeafb851f9491fe1f71e2ee0c54dcaaa1c35d6e934,2014-10-10T01:28:26.877000 -CVE-2014-7297,0,0,db6367dee585940e0cfae7b8684236526599d5919b475985513993cd53613fe3,2020-01-10T01:15:08.960000 -CVE-2014-7298,0,0,2d388557fe3cb7d9c3707378b398f91ccf948b35891fb49e00db5f1467fad2de,2014-10-24T14:00:21.457000 -CVE-2014-7299,0,0,0da0f1360e3658673427c3f69e5b898bcd269eb245fa81e56caf4f20b88c9455,2014-10-08T17:38:50.137000 -CVE-2014-7300,0,0,eacd7d1b774d592f3373ee439655fce69540a7f1e3b2249b1fd929157639acba,2016-08-31T15:08:43.307000 +CVE-2014-7280,0,1,cf69cae957b384418b0a4b231dc10170a4a4755cc7208b0d8f3c8ac97f687f4a,2024-11-21T02:16:40.440000 +CVE-2014-7281,0,1,c4cb5b9db25724e037236fa11f4e0b3232027c21a3e9985a414b2edb8b95260a,2024-11-21T02:16:40.593000 +CVE-2014-7283,0,1,0ecf69ef0e4011d0ec6c6c693ceb88a80874f86b2a510631b9861f3529fb74af,2024-11-21T02:16:40.760000 +CVE-2014-7284,0,1,61b40ab5798ce80b96dd076e7018e34b7d844161100933539e91994a07ed1365,2024-11-21T02:16:40.910000 +CVE-2014-7285,0,1,8cf898f039139e32d8c8f6c631e96219eae611e901535cc9535bd1a3ec4cd421,2024-11-21T02:16:41.050000 +CVE-2014-7286,0,1,3e86e0349924a0f4bdba0631af82c321c305b710bc3aa9ec885678a76a71c12f,2024-11-21T02:16:41.160000 +CVE-2014-7287,0,1,f4ffaff4cec5180ff5f4db84566fcbb21578236fd43b4b7100ce7cf7dbc5888e,2024-11-21T02:16:41.277000 +CVE-2014-7288,0,1,f624520ed63db7ad5be12c2ac3dc4962a3e21164f281b1573eca20fdf00206bc,2024-11-21T02:16:41.383000 +CVE-2014-7289,0,1,40165a53e7a097a500b43c1a294adee0b8f821148d6b588c766a6e9c6e4134c9,2024-11-21T02:16:41.490000 +CVE-2014-7290,0,1,3952331ec404eaefbc15b347698c95d6734856515a3aeed918eed22d29dee807,2024-11-21T02:16:41.607000 +CVE-2014-7291,0,1,52694a1e4b7e625f72586c4ea5d1e26fbb7fa3f995a29e4c9f70b61bcf124c4a,2024-11-21T02:16:41.743000 +CVE-2014-7292,0,1,5000bf7cfdf471b1aab5a8eed666170d9923cc5905101ec8ae1da1f37f1acb20,2024-11-21T02:16:41.887000 +CVE-2014-7293,0,1,2d11098c01b179f0c38fc052128f4dbbf4a6f85ee46e0d29b1f2e89568ead595,2024-11-21T02:16:42.023000 +CVE-2014-7294,0,1,3d2e83b94df4c3c62c554c43b3555637409a2e396d9a6a33a8f8d4b6019c1b65,2024-11-21T02:16:42.150000 +CVE-2014-7295,0,1,e7930242f57a6d5841ec01dc2c25297b97cade1c92308ef24c640c8cb58273ab,2024-11-21T02:16:42.290000 +CVE-2014-7296,0,1,0592d201f150055d6005553f5f786f2ec2fdb7b134ee965ec6cf5b324435f660,2024-11-21T02:16:42.440000 +CVE-2014-7297,0,1,106215d8b2ef1b7abef9a2d1640d0993b67457ec74703e77cf9545ad9829f81c,2024-11-21T02:16:42.577000 +CVE-2014-7298,0,1,526d1722fb6329c11ed0bc39740cb340e9c75c4893b22ff29fd6f6a8218a12d5,2024-11-21T02:16:42.713000 +CVE-2014-7299,0,1,f4dd3f6ea8e788b69b2f3aebdef251e12005c4471dc5380554e604ed0376f9c2,2024-11-21T02:16:42.840000 +CVE-2014-7300,0,1,f317d55209d41f1c879c5875b1d82b210ac7bd1d46a551e5d1a614f791b6cfb1,2024-11-21T02:16:42.970000 CVE-2014-7301,0,0,e9880d4ac2d814727b2a25acd970a9f932a56479532495e22d2b52d1e516868f,2020-02-04T14:24:21.710000 CVE-2014-7302,0,0,d74f21bc89eafb19c4b4c44d74bb90a42626cd3d91068622ae904dfe7585eb62,2020-02-04T14:24:15.897000 CVE-2014-7303,0,0,bfd2393db45148befa117b6aedd96e8fdf00a8beab1c2ca04555828daa7ab2a5,2020-02-04T14:24:19.350000 -CVE-2014-7307,0,0,2eb41830244dcfe4d5c96e14ee81cea1ef5388daabc0df6cada849c6bc783b69,2014-11-14T14:09:00.147000 +CVE-2014-7307,0,1,4c150b106b19986f5c92c0028b0580c46c2f643fa21d9f65326e644bc26c64d3,2024-11-21T02:16:43.543000 CVE-2014-7308,0,0,3fdd673a2a8f15a260dfe33e74a7876ae1f0bdca9a656cb600c5c9bb1c3c82fa,2023-11-07T02:21:16.573000 -CVE-2014-7309,0,0,ff1769e070f7493ee26e0501e68814dc1d6b74e1946b3e0e412654ce2b6858ee,2014-11-14T14:09:01.630000 -CVE-2014-7310,0,0,b7b6341698e3c7ca4e9c760ce3fb7c635e79b664f585dbfb7e897b814f6c4baa,2014-11-14T14:09:03.130000 +CVE-2014-7309,0,1,e54d120df355fd9cd61f8519b4f68f7740accda1f9864a3abada6eff0c5e88f3,2024-11-21T02:16:43.760000 +CVE-2014-7310,0,1,8b26579ad0e6e69572c2cac3ef78ba0edb8f8f70005050958d31d3673b2af980,2024-11-21T02:16:43.947000 CVE-2014-7311,0,0,a1367558db7d3be92149070699d804c09a9a68e46a7a4300006e3be7c4b8b0bf,2023-11-07T02:21:16.823000 CVE-2014-7312,0,0,f40d479f1eec051d50cc1e148680d92356415ba65fc0d5c8153a0887dbe1c509,2023-11-07T02:21:17.037000 -CVE-2014-7313,0,0,6237d6a54b260a173e17eba62b50ddef06752f596915182195d43bdbda575799,2014-11-14T14:09:04.647000 -CVE-2014-7314,0,0,8c81581afbf70ed1a15f116ed7d5ef28b776a6411d0a6feaf46b4e7b166409c7,2014-11-14T14:09:06.380000 -CVE-2014-7315,0,0,03e6c792b538577e8155b9fd65c58d06496a007c22a14f6a869bf408ca7a2af7,2014-11-14T14:09:08.053000 -CVE-2014-7316,0,0,79c1f7955fd494ffc2015e0449385b6261cac89bd27312276e6314149bb2f491,2014-11-14T14:09:09.553000 -CVE-2014-7317,0,0,4f5eb98b7471d8f6d650698c5512ce0a3db143762162611c6436ecf8f5b6de3f,2014-11-14T14:09:11.117000 +CVE-2014-7313,0,1,cc7aa1a9c9e1f3b4c3d1e9176ba2d30a134edcd0c79c39c5969b53cea44cb6e6,2024-11-21T02:16:44.163000 +CVE-2014-7314,0,1,4274f6d845784ac1ab344c60af559f8b684181020ad5ebed916dedd83251b261,2024-11-21T02:16:44.350000 +CVE-2014-7315,0,1,7097a925fe05c37cc387ac6f27afb9a5d763ce859981d2ec9b1c28c7507fc85b,2024-11-21T02:16:44.527000 +CVE-2014-7316,0,1,70d2e4c813afd18c2e2e980eb081542226872c83a3ef702cc26d4f7b16a6e13f,2024-11-21T02:16:44.700000 +CVE-2014-7317,0,1,0bdc42f90cb2f9c884da68475ea1768f0d4ff025e78131f32a4b0c8476c71438,2024-11-21T02:16:44.870000 CVE-2014-7318,0,0,322d19f0850379b586f1a94424932e8b992b9a73187b5be1e5f73fca967d1f73,2023-11-07T02:21:17.320000 CVE-2014-7319,0,0,1435cb56020f9c80b08e2fbdb10163a05ef60adfb650962f3b33830a3fbb27cb,2023-11-07T02:21:17.527000 -CVE-2014-7320,0,0,7de515b85c4394d2220ca9d935c07aa370817023d2f3cd19aac3a121c373f109,2014-11-14T14:09:12.600000 -CVE-2014-7321,0,0,7a0072e848465ac3e3373fb54d6ff5e165e2466adfb8e2781aec04cec2f4a4d7,2014-11-14T14:09:14.117000 +CVE-2014-7320,0,1,56c690d2487627225f4ef7fd252f2642c2593a46182a8a28dfda8f7f1f8c0de0,2024-11-21T02:16:45.077000 +CVE-2014-7321,0,1,884dc11162826ef7de32da85b148d9613bf9541b071078a831e680974c72996d,2024-11-21T02:16:45.257000 CVE-2014-7322,0,0,2671f07d63b5bc16ab4450ea0ab940438f2249479f107fd7cc4764f3b57f8f04,2023-11-07T02:21:17.777000 -CVE-2014-7323,0,0,5ef1d2c6e2a0e1561e20da315e720243d277086f308a739fa72b30df75fa8dbc,2014-11-14T14:09:15.587000 +CVE-2014-7323,0,1,c9611f8e513532e267807b64eb3f51b2ae8d74608d5cda5f20f428cbff2b0c97,2024-11-21T02:16:45.447000 CVE-2014-7324,0,0,8b86aaede659f85d7cae822492339af9baa65e4e9ae37176fabd1f3321fd8e32,2023-11-07T02:21:18.007000 -CVE-2014-7325,0,0,6854ad7032a57bddb4ab85b58d83006d490b4946df5a7a1acd283b1d7e23bdcf,2014-11-14T14:09:17.133000 -CVE-2014-7326,0,0,ef24f00b0fac4141dcd7a68121e29700d7fe85b7b8c02533de861cf6ede4bf4c,2014-11-14T14:09:18.600000 -CVE-2014-7327,0,0,5f862caf04fead0b9f2de496aa574421d0caf6218d7f1c0c77130e914b8d6d62,2014-11-14T14:09:20.133000 -CVE-2014-7328,0,0,44429fb85436df54609509848d808810f50de8fe1f5a6279287b95d08638bbbe,2014-11-14T14:09:21.600000 -CVE-2014-7329,0,0,119b0a85fa82603cc4eb70f84d1000c6e24dc8ec2075451617db5ff251bb53b9,2014-11-14T14:09:23.133000 -CVE-2014-7330,0,0,9b26d26c5a5092a7ac8c2c04aa61539fad16288b16d1fd6632cfb89d88fa6972,2014-11-14T14:09:24.617000 -CVE-2014-7331,0,0,053754aeb69434ed4673a3bc79b864be18658766285525bdfc37d32864b401fd,2014-11-14T14:09:26.117000 +CVE-2014-7325,0,1,22a9cd873003c524fe3fe3f6b3469ed3ef72da8779052388e26c3e354ac58ead,2024-11-21T02:16:45.640000 +CVE-2014-7326,0,1,8751713e1a67e9fe2a6803bb9881d736df2d944ec17c4fb8d307ef416af2fb30,2024-11-21T02:16:45.817000 +CVE-2014-7327,0,1,369f990d60ab48ad2d119db15eb19520ccddb500bcfd04bebdf85580ea9f491f,2024-11-21T02:16:46.003000 +CVE-2014-7328,0,1,965f125997c865b6d0891f59cd3f237a11c1b5fbd714cc42da51b8544086f05c,2024-11-21T02:16:46.190000 +CVE-2014-7329,0,1,ac31442617f63a99c45a6572ce7a4b8326f0203bf2e235968d6039b495df63e1,2024-11-21T02:16:46.370000 +CVE-2014-7330,0,1,54648fb46abb1cd0617df74ab99bffcacbca2dd9e061c1dd2e29e1e083e4b999,2024-11-21T02:16:46.553000 +CVE-2014-7331,0,1,c3b4bcd3c802fa05137264d7ed73307d107948752af206fc28d61733c573776e,2024-11-21T02:16:46.743000 CVE-2014-7332,0,0,3e3b012e03977f398fded352ea583cae986acb410a0968dd9c03979de5dafc27,2023-11-07T02:21:18.293000 -CVE-2014-7333,0,0,107a003f03a9859305e3eeaf5c12bf00eb5559b62ff196a54a2d5d2239a916fc,2014-11-14T14:09:27.617000 -CVE-2014-7334,0,0,006789b77d0b89ef62e3f281ab7837ff0d9b48e8c73cc89e429b412a7702f176,2014-11-14T14:09:29.117000 -CVE-2014-7335,0,0,8614e112713b8662368d4d6424ed35a1fc3800baa91a52e339d40b05df644b40,2014-11-14T14:09:30.617000 -CVE-2014-7336,0,0,0d48e4d586e71ad56270276703eae92b5415345221107814e5b4f894bd77f1c2,2014-11-14T14:09:32.120000 -CVE-2014-7337,0,0,d98e9d7779ace8da7d2e46c5283b8faa2733c6a5ba3b2bf715aa98e35dccc586,2014-11-14T14:09:33.650000 -CVE-2014-7338,0,0,81c5aa889265e2e1cd8f9349aae06f9661e79026fc88b9d9091b2acca1a746b7,2014-11-14T14:09:35.167000 -CVE-2014-7339,0,0,bcafefdeff19b50f4bf8bbc6d4c0fb1f37e8e5b8c0b089dc77e013e643051c7a,2014-11-14T14:09:36.493000 -CVE-2014-7340,0,0,07d466069c064343d07581b2f5c5b564472b506aa65de88949f482506ec5e3dc,2014-11-14T14:09:38.057000 -CVE-2014-7341,0,0,78dfb937a73332a95b81cb9d54a2338d1d8e82750402766e9687ab9771434858,2014-11-14T14:09:39.637000 -CVE-2014-7342,0,0,af39a90eec9373b42754eceef5456c6695d6b4e813717f6c14c7aa60c7288bb3,2014-11-14T14:09:41.120000 +CVE-2014-7333,0,1,9e2602e511f10907c1e8e1302d186ab99025da7b0b2c6b5a5c47ad441e41ea1c,2024-11-21T02:16:46.957000 +CVE-2014-7334,0,1,5dbabff0aaf966e01aa6d3bb3dbe1bc0f7a27559fa5a9d55dc39824bbd4527d0,2024-11-21T02:16:47.147000 +CVE-2014-7335,0,1,5514afc7e900782b53a474a4873ceb7b5be1944c9d03c3599a21e0f7a7cc16db,2024-11-21T02:16:47.333000 +CVE-2014-7336,0,1,11e49bee858dfabb2edbc5421b96b4217927ec7751be4993dfec82b31f9438d6,2024-11-21T02:16:47.527000 +CVE-2014-7337,0,1,ca7afe5b20fdb824d0ec3442e08e2a21b115cf47e8c3ba240d512f72b09578fa,2024-11-21T02:16:47.720000 +CVE-2014-7338,0,1,19c0552f7137b0b2c803db0c5dcce9d62fa5e9cf6ebec4ddbfcc8bfe32177e73,2024-11-21T02:16:47.907000 +CVE-2014-7339,0,1,a46d6703949b13714fa30c444b9dd4151e035d163707151530f0d7e30eb0ffd5,2024-11-21T02:16:48.090000 +CVE-2014-7340,0,1,c8b2c01ac65f10c781d8d604022abf0da2e9d7b5bc75aa2087135c5d2dcb83ba,2024-11-21T02:16:48.633000 +CVE-2014-7341,0,1,3970eea14ec79632b059abbd211d336d496857f1a2f35adf2963128a26be5d99,2024-11-21T02:16:48.827000 +CVE-2014-7342,0,1,0dd25e823a28c19a18f1cd4adc8b71c5cc3e219c53ad8b21024523182511d478,2024-11-21T02:16:49.017000 CVE-2014-7343,0,0,87e3df3eb8a7d908ca97b4b3afe47c4b0208524a859e45b7ac31d46049e7a746,2023-11-07T02:21:18.613000 -CVE-2014-7344,0,0,350ec97157355c0ede6b635434def07b16b214584e44f1649051a9b089b2b6b5,2014-11-14T14:09:42.620000 -CVE-2014-7345,0,0,657678f82b33ff9dec83faae6c427c6417fd47105523cd550fd8213e12d00880,2014-11-14T14:09:44.167000 -CVE-2014-7346,0,0,59ff8116a46078e885a244719bbc09da6d6e70779225ea6e083bc1eda0e473a8,2014-11-14T14:09:45.667000 +CVE-2014-7344,0,1,81a3269bac486ac395b02e6d4ebdce915261448b2b0373860a7e9f6e797bb7c9,2024-11-21T02:16:49.227000 +CVE-2014-7345,0,1,0219942357f08ac5ade47ccdeb120bb5f3880b0f6b70eb6bb95d015ff02f7f10,2024-11-21T02:16:49.407000 +CVE-2014-7346,0,1,f598da1af4b72ee81b7f69886ee6ddaeaddebb9049b28163f201907f091d37b7,2024-11-21T02:16:49.600000 CVE-2014-7347,0,0,e633b8d3525af6bd3f03e08e39a76b73da310040fe3c4a67430450a0af9938d5,2023-11-07T02:21:18.967000 -CVE-2014-7348,0,0,4b0ef7a8aeaa5a0b1fd7a8f1d0339312630d248311b4359f70dffd9091b6af07,2014-11-14T14:09:47.153000 +CVE-2014-7348,0,1,2f8f0a7b198faae6641d309914cc439c213d1d75a4ef0e8f88d14acd273372f4,2024-11-21T02:16:49.823000 CVE-2014-7349,0,0,58e5e13ad381628c6bfa816b638ace09fce8e614f5b20e1dcc50df7925c3b6b3,2023-11-07T02:21:19.190000 CVE-2014-7350,0,0,204f27cf8c53020e0b1e92dc9723ee946442e1f10a09e0283b3c7500c5412f0a,2023-11-07T02:21:19.420000 -CVE-2014-7351,0,0,57838b9a3b2897354fa20c1ddbaae5fac7d5f1ccf2bb417edb76ab5e061311ef,2014-11-14T14:09:48.667000 -CVE-2014-7352,0,0,dd3361fcf2b6411e4ca3227dc06fb141e0003f530c1ed54a0e3b6fb6f319b3d9,2014-11-14T14:39:32.917000 -CVE-2014-7353,0,0,2a685a0936705082dd3b8ef0b367b11c9e77e86f74e38821bdf520f21613162e,2014-11-14T14:09:50.137000 -CVE-2014-7354,0,0,cf8336eaab3c891c51d0f4b5cf0ac4a241399d6e0f9930fa498b98b402b0f20b,2014-11-14T14:09:51.623000 +CVE-2014-7351,0,1,085d8c092ca3525d33bb0cfd14c9e204c6dc08ec6a511c53c16de74ad0a0012c,2024-11-21T02:16:50.040000 +CVE-2014-7352,0,1,a3d51851f81a79f7911ed6e75e12c1d8ecbd90c70a98330cbc58275145b95fc2,2024-11-21T02:16:50.227000 +CVE-2014-7353,0,1,f9301b5a36a39bcbaad31e4215e3f108af096bd4e608765d20c95205394c3d7d,2024-11-21T02:16:50.443000 +CVE-2014-7354,0,1,d8f0fb93557528f8ba46d95c397d32923d4b936ccd2ab7b2425102880cc98926,2024-11-21T02:16:50.633000 CVE-2014-7355,0,0,8d752be42df1fe22312adba8c67a47e7a94581b452dc19c082ca1a93200d75e8,2023-11-07T02:21:19.700000 CVE-2014-7356,0,0,16195fed7f4617559a72ee672a8e2b60df7bc858476c1ea011e3cf1edb793710,2023-11-07T02:21:19.910000 -CVE-2014-7357,0,0,3a561b119bbc9622fe6b9307bed44938e9f98d97a407a0dd248628810f2b72bc,2014-11-14T14:09:53.170000 -CVE-2014-7358,0,0,65b59d18744177f1ece4e540882c1500c3ac02eb3fdd0eae5166c650f7eeb9e3,2014-11-14T14:09:54.653000 -CVE-2014-7359,0,0,fa28ba03065c11dc6d56123fbf9a7d07f60a611468c9dacca5276ce215c0c061,2014-11-14T14:09:56.123000 -CVE-2014-7360,0,0,90dcc881d235bfbd9bcc25c289893a41371836cc9fadb40fc81098edde530a2d,2014-11-14T14:09:57.733000 -CVE-2014-7361,0,0,174f4b46ef057a8e7bb9ae9e7c778c03c4182af39b1fcc26ebd42bc7a48ccb8f,2014-11-14T14:09:59.247000 -CVE-2014-7362,0,0,3a3fe92aa5619a39e0703ebde80e083d0e0a0916b12dc03978b47e0d782f4537,2014-11-14T14:10:00.747000 +CVE-2014-7357,0,1,9340855bec97298f0985b5d19a5be506840c9d6d2e0cd57777ed4eb063e4d139,2024-11-21T02:16:50.867000 +CVE-2014-7358,0,1,6dba93e0c7a166f35e8892f41b2d5756aae4f8e970dc9d0a5770b0e427fd44f7,2024-11-21T02:16:51.063000 +CVE-2014-7359,0,1,fb579a37fc9389cb3b2ccfc52c1be1d24a3d7162cdfc2d7e5e7afd348d259459,2024-11-21T02:16:51.253000 +CVE-2014-7360,0,1,0809195d362b6336fc181a989996f5b69117e4fbd1c19ae15a89992c350fad48,2024-11-21T02:16:51.443000 +CVE-2014-7361,0,1,79930fd46b43d9cfac0414d455b4429a1dea9517bbf8b3a7fd3d5b3cd7fddde1,2024-11-21T02:16:51.630000 +CVE-2014-7362,0,1,16739643067ab0d6bef9a993f9cfb2fb44a0acc3f1790563875bbb91de476824,2024-11-21T02:16:51.820000 CVE-2014-7363,0,0,6d9917d54c7b49ee0dde92e3ef6efbbf194151db17e77db2c5bf0a2ee2afb248,2023-11-07T02:21:20.187000 -CVE-2014-7364,0,0,e0f90fcad9a1520c918b7980684ca69da6fcfc8fe8c1035f18116d0dc0a2ccc2,2014-11-14T14:10:02.250000 +CVE-2014-7364,0,1,b9c8a708de9748b59db4662205344897749b3a30f4f8815576c777bb313658df,2024-11-21T02:16:52.023000 CVE-2014-7365,0,0,7a92dff23f618e9805c194701d3843fea11bf5e517dc37455ae341f7d8fa8c82,2023-11-07T02:21:20.403000 -CVE-2014-7366,0,0,10b9582eba00d874d1b2cbf655b86b98b67957e491345bda1744c77b35a621cb,2014-11-14T14:10:03.767000 -CVE-2014-7367,0,0,8638ef83147d5870fe769d82c4824995d78ea766758928817bdcc24b99ef222f,2014-11-14T14:10:05.280000 -CVE-2014-7368,0,0,ad6295df7f759566b6b559e071c06811a411cbdfa3f1487851ab496b4b6202bf,2014-11-14T14:10:06.797000 -CVE-2014-7369,0,0,4ee57ae2953ce8ef35a6ca16914fa3af7db1d392f6eb5ba6d22b1c4d074bb18b,2014-11-14T14:10:08.267000 -CVE-2014-7370,0,0,6b468dd2a2d9e047367363b4a3a6ad82480a27c5d3ff258d72a57c24ffc042a3,2014-11-14T14:10:09.937000 -CVE-2014-7371,0,0,4c72db8968bf0aa47d7fe2f7e6d3ab664cb92a0fba632da9975435b62a9965e8,2014-11-14T14:10:11.673000 -CVE-2014-7372,0,0,eb4b78c288be1ade5e2900c871a4da6736580b485d56f042e856c52e9df95d9a,2014-11-14T14:10:13.157000 -CVE-2014-7373,0,0,29fcb828f5f2af8d9a3d28be53d97b09f418d9cff6453664ae3839dc187ac737,2014-11-14T14:10:14.877000 -CVE-2014-7374,0,0,b8c06a8e82a9b0dccf391a462d795a8f58e3c0cefcad9806b557306e692ac9e3,2014-11-14T14:10:16.517000 -CVE-2014-7375,0,0,03eae1e7492b047356a61b04143f839583cd6d15ac3cde1649e6eb5030e07bd5,2014-11-14T14:10:18.283000 -CVE-2014-7376,0,0,9165b8dbd58ed844e19b753a4a068c9ec95f865384d88812c4854f2aa93ad6b6,2014-11-14T14:10:19.907000 +CVE-2014-7366,0,1,47ae6218f6555eca9fce603db5bb2cef44d54eb352b23f48f1829e96d88d2cb9,2024-11-21T02:16:52.237000 +CVE-2014-7367,0,1,6f6fe9fe27d3cf56267aab33c3d4b2c55a2ac65208f136d92e4373c0b31ed9aa,2024-11-21T02:16:52.430000 +CVE-2014-7368,0,1,44d93983aedbcaa2b13b0285ec47fa470e44a4824bcb5d71de362e98059a0838,2024-11-21T02:16:52.623000 +CVE-2014-7369,0,1,87d9b826088dc77d35734450e8ec61aaf2a71fb33174ac878fb454f0f5b8215a,2024-11-21T02:16:52.843000 +CVE-2014-7370,0,1,5177eab5e4e78b6075f3bfa84d36583ffa19d77e5262b3a994b2fa7e4095a002,2024-11-21T02:16:53.030000 +CVE-2014-7371,0,1,9ac1e9ce75693c3c942238d92ead4196e27b6a1d67d506ff3df66b3d91c9eeaa,2024-11-21T02:16:53.220000 +CVE-2014-7372,0,1,fd1af72c956dfbac01aa5c1bda6f645e9424dd4bfdaa5a008fe4dd398efb49cd,2024-11-21T02:16:53.407000 +CVE-2014-7373,0,1,53f53b312f6f2fe2d08a2258ced52bb4cfb3c636eeb0c3f79dfda40278c92a0e,2024-11-21T02:16:53.590000 +CVE-2014-7374,0,1,0c9f260621f2eadca05bbd5cc42d6a0301d8c04ce9371bde22a36f8bf0b756b5,2024-11-21T02:16:53.780000 +CVE-2014-7375,0,1,87eb301363fd28c0dbf11a0961a4a7d2b05d3a1394954c53ecd195b39c49bc02,2024-11-21T02:16:53.953000 +CVE-2014-7376,0,1,9395693b4c79b4ab21cdc436099d9652e5396e2c4146a507ea497e1abb2e0bc5,2024-11-21T02:16:54.137000 CVE-2014-7377,0,0,cbb1d62f5f9ef0c1d527f70044ad8b7360ec2d311de44193f1bfeeb040ba623d,2023-11-07T02:21:20.727000 -CVE-2014-7378,0,0,f8a2b06362588d2e650aaf61c3cf330291d7df39d5d38f2921cc570f7f6f40ea,2014-11-14T14:10:21.470000 -CVE-2014-7379,0,0,8b9f19ee336c2dd80b94bf7bb0d22292792f1fbb0bcfa7265c436439c036aa79,2014-11-14T14:10:22.970000 -CVE-2014-7380,0,0,5f9e4a9f3b1f13f23ed152c89b2ffb9d3c09077b2c36a8005557f20946c02229,2014-11-14T14:10:24.440000 +CVE-2014-7378,0,1,ba8f5006409fdc085c61cec333d7f80a25013a798545e6c7a7cdcea55f02f5fd,2024-11-21T02:16:54.337000 +CVE-2014-7379,0,1,1fabf0b733f03ffde9b83f8435d2cb708f7898713fb9edad66aed43f0cc16518,2024-11-21T02:16:54.523000 +CVE-2014-7380,0,1,98a7782a749ac54cb2d3b898d6596a04d98aa4f8c206ff40c0f101a4f3b3861d,2024-11-21T02:16:54.707000 CVE-2014-7381,0,0,c76592708af738452aef01e29bdc3818ab009463b1692dedb125e4227135281b,2023-11-07T02:21:20.970000 -CVE-2014-7382,0,0,595e06b6a98c29a853299febb5d8d83afcf7b2e72274f5e9c43715cd94be019a,2014-11-14T14:10:25.970000 +CVE-2014-7382,0,1,144ebd03c8d1c3d55b2fd9866148dd14bae89cb3938d64528a09f16f3d869ec0,2024-11-21T02:16:54.910000 CVE-2014-7383,0,0,7750ac43d66f82149ff3c9e30b86781ec2b4063fba647d0d73e96ab3381084e8,2023-11-07T02:21:21.220000 -CVE-2014-7384,0,0,29c8fc979615d397e5dbed48d378d013e0dc5e73ed7cb23a186472a40c76ec08,2014-11-14T14:10:27.440000 -CVE-2014-7385,0,0,6d6997c7e3260a3e1c0449d3d770ce0e33dcaa40076b9c72970a78f1d1be02f2,2014-11-14T14:10:29.003000 +CVE-2014-7384,0,1,c394f42a12e600bf09f1caa15092d9e1356a8790616ae4591500d5af8d92b5e2,2024-11-21T02:16:55.107000 +CVE-2014-7385,0,1,ebdb5b1cdf47c4dc088cd71f40fc9322b9bb47fad0a15e99d3c711392cba11da,2024-11-21T02:16:55.290000 CVE-2014-7386,0,0,493ebcdb705b146e65331e45fb2a1a25171a01d6e50c53a12e643fb38290ff23,2023-11-07T02:21:21.457000 -CVE-2014-7387,0,0,4b666667751437178c1f9e4aaf8f6edafd5052a6e5bb9491cece5b62409bff46,2014-11-14T14:10:30.627000 -CVE-2014-7388,0,0,3bebcdf4ffcb6a2dd67ad5db705beeaf911ee0f7e1174ee73b22d0d8db930528,2014-11-14T14:10:32.113000 -CVE-2014-7389,0,0,af814f77194dce064e5a4f03d1da6fdaecf7508883d6e28074a1f3cec52734fd,2014-11-14T14:10:33.613000 -CVE-2014-7390,0,0,df09c1bc69533803955102ee71c7ae15db4eb6e47f04ec3f84449698a2b5d5d5,2014-11-14T14:10:35.097000 -CVE-2014-7391,0,0,6175c894499ad6905faeed531b18adf0411d93e6c66cd9689f663e30850b4239,2014-11-14T14:10:36.647000 -CVE-2014-7392,0,0,fee2b7b10dbd027b9a770a6eb60a49624342545c7701b382772773d3b9413286,2014-11-14T14:10:38.193000 -CVE-2014-7393,0,0,56a5fd14d29b3f4cd8bc73877dbc21b41bf9012dab3da5f1f3704f73825b3830,2014-11-14T14:10:39.723000 -CVE-2014-7394,0,0,efda8dd23f2548b0f58357f85daa1123341b4ce0f4b57a64c655f8d0cfc607a2,2014-11-14T14:10:41.240000 -CVE-2014-7395,0,0,bc9f0be91d0ac22f38a920e1dd31eb24e7141df9874e8e0f5430b0003f0b1f75,2014-11-14T14:10:42.723000 -CVE-2014-7396,0,0,b17d77bd43769eb8de557370e0c5e55a99c51bc10ccf76019b15bf5e95f7f349,2014-11-14T14:10:44.270000 -CVE-2014-7397,0,0,d1d4ebb72f03925bbd274ba02a5075a3f4c9576b8293b2d6d70e783a4e33a915,2014-11-14T14:10:45.773000 -CVE-2014-7398,0,0,db8cfefd479b438295275d1c73ee2b607d1d1470c8babf6b362be4dfdab997d6,2014-11-14T14:10:47.303000 -CVE-2014-7399,0,0,0bea9286ef71c3a93b422c407f203caaddc3c837a7667218acfd1c341b72e528,2014-11-14T14:10:48.837000 +CVE-2014-7387,0,1,2dbf839a8eedf4255fdf5babc2bd509bc9a3736a4c2a14c4b637082ced2d0788,2024-11-21T02:16:55.493000 +CVE-2014-7388,0,1,d6b6cae5c42d3aad759eae513dcb635ee9e42dba3139b9a9f311f9c116f01748,2024-11-21T02:16:55.683000 +CVE-2014-7389,0,1,02666c90b207f6ca37c9d87235befc3c57c80f3a2fe81b75d07c4a5b67c2478a,2024-11-21T02:16:55.873000 +CVE-2014-7390,0,1,f488b9460cad85ca2a4048576eaa2ed544002c0bc6f2e635e9c1de594ad0d2f7,2024-11-21T02:16:56.070000 +CVE-2014-7391,0,1,9d397bc0d6f9c76d0d6d1822391a5ecb2e85fde13f5f774739beac2036009651,2024-11-21T02:16:56.270000 +CVE-2014-7392,0,1,b9c561220e1063c9801da5ed29bf8364a8614b15d82f97c092d222cba94389d1,2024-11-21T02:16:56.450000 +CVE-2014-7393,0,1,786111d7698542e2075d5acdddf468ecf16eaf6ccdbefd9ac8f3f2af6227b29e,2024-11-21T02:16:56.633000 +CVE-2014-7394,0,1,848495e779fb837b9d35a54d52faa78e2ab15e294e5e1a5aad2c7f12e2cb42bb,2024-11-21T02:16:56.813000 +CVE-2014-7395,0,1,6d71d2f4b227e7d0ee3e7b74cf64425dc7ba836ea908d50f9be3f9165bbaafca,2024-11-21T02:16:57 +CVE-2014-7396,0,1,d03e9dc1d6892640f8558c0980be7bb37933ea963786fe6034484d7bffd15217,2024-11-21T02:16:57.180000 +CVE-2014-7397,0,1,096e1617f20231200e1dd1a74eb33261b2f7160da4c2e73533bcdd9233f41b6f,2024-11-21T02:16:57.370000 +CVE-2014-7398,0,1,a74f8aca73ee02dc26c63c88e5d7c8bdbe51efd302c06cc80b0214c33dcdbe00,2024-11-21T02:16:57.547000 +CVE-2014-7399,0,1,9e12cdecdbd478974aff07f2153c07a04e707d34278498083f52aa3e2473c6d4,2024-11-21T02:16:57.747000 CVE-2014-7400,0,0,dc1a69411e508b4d6158a78c9cce38cdb495e3f6702ce1a986936fd9ea3f9381,2023-11-07T02:21:21.783000 CVE-2014-7401,0,0,546d06ef4499dfc318f4d58b0d14000eb05fa201d475e3531831f66e88269646,2023-11-07T02:21:21.990000 -CVE-2014-7402,0,0,30c647b00c3cb3ec529786d0b765426da8bf7d18a584d5927feb29f46664f964,2014-11-14T14:10:50.320000 -CVE-2014-7403,0,0,afa5161a5b30a2b4ee36d0a3dfa52e12b789ab9b0105c360098e1748c9b8c46d,2014-11-14T14:10:51.773000 +CVE-2014-7402,0,1,c9e5c63d18ccb03ddb8c953ff697bbebcf22eca17e032cce878e3a4831011896,2024-11-21T02:16:57.963000 +CVE-2014-7403,0,1,49fe1bc0cc808949771ce8728b23f706cc985282d365d08fbcac980f11c23b3e,2024-11-21T02:16:58.143000 CVE-2014-7404,0,0,1893f8901708a7e53653ccb2134685cce71a04456e3d3dcd83fbe06222cc9f10,2023-11-07T02:21:22.243000 -CVE-2014-7405,0,0,1a2abb1e831b9f10c02c3788f250cc90a754bb6cf487d8de6c23dfe0229f72d6,2014-11-14T14:10:53.227000 -CVE-2014-7406,0,0,e75b2a85d48ffd84292d4d3c7bf98baaf590b1fea15aa351a482f5c00d1cb81b,2014-11-14T14:10:54.727000 -CVE-2014-7407,0,0,3fe67bf6d2085ffebffcc54cc164be8f69776b107b839213bf06039a89cb991a,2014-11-14T14:10:56.147000 -CVE-2014-7408,0,0,1c09b96df9b212709a3ce182604c9184386f9bc00b85e4fa2339ad9d6afdd532,2014-11-14T14:10:57.743000 -CVE-2014-7409,0,0,7a146e86cee0ac4f8fd3a1535849036fc36409951a4564aa6df5833e945df9f5,2014-11-14T14:10:59.257000 -CVE-2014-7410,0,0,76341875e287963dba7b7b9aaf476a1f92a313b7a3c5311dc4001bb505051183,2014-11-14T14:11:00.837000 +CVE-2014-7405,0,1,2ae76bd5c1206534713af533c976f56df7b6e50b49a3ebee19290b18c4c97859,2024-11-21T02:16:58.350000 +CVE-2014-7406,0,1,e54739e6871ff579048f58a34a4f2e5438c2981601923c9a232b79207b24fb19,2024-11-21T02:16:58.537000 +CVE-2014-7407,0,1,e37e7a0f414db2ca5e075bfe4e37d333737ee6dbaa609a5658bd3b3f77909412,2024-11-21T02:16:58.723000 +CVE-2014-7408,0,1,23798b767ca091625a8a028db35c41d617f01c46db91cd7cfde25540b814437a,2024-11-21T02:16:58.913000 +CVE-2014-7409,0,1,ab01c50d8f5630ba07e528b625e45a148e752334e03cd14e338950d4545280fe,2024-11-21T02:16:59.107000 +CVE-2014-7410,0,1,2fc24c962cf58433521ab6b191d770fd4791a4e0901fa144ba80926256e6f491,2024-11-21T02:16:59.297000 CVE-2014-7411,0,0,3070c3ebaf1482e3f64f5fbbac780c49a82987bbd93ff4e2a750316b1007c457,2023-11-07T02:21:22.503000 CVE-2014-7412,0,0,2e64bfe82c8967b37f538778bda0956241cafb08de7cb59a8c3958a2df4d419d,2023-11-07T02:21:22.713000 -CVE-2014-7413,0,0,785785c2aed45d9877d7fccdc252f1037182fc4886dc048ec1e01173f34cb93d,2014-11-14T14:11:02.307000 -CVE-2014-7414,0,0,0a7973168e3c1b5ad092b0ea7b73d7a92429109bb1f5f95b376017b712aa9948,2014-11-14T14:11:03.820000 -CVE-2014-7415,0,0,40b517e5e4d2cd7b4647a4dc6e52722b78e9f73a1978cb17a956596ec2111f40,2014-11-14T14:11:05.353000 -CVE-2014-7416,0,0,2dfc4e19c318e955b0fa00ce8881a3d8d980c30113132ccde00fe70569cb7099,2014-11-14T14:11:06.853000 -CVE-2014-7417,0,0,adf8a13cdb6c75764c3b56d8b060c6cdf80a6a0b8193885cb0d2cf5ade0468c2,2014-11-14T14:11:08.307000 -CVE-2014-7418,0,0,d21b1aa2c2a2ef75ddb4a63b85ade4a8b887c9711d1e18e3c562be6600fd7236,2014-11-14T14:11:09.760000 -CVE-2014-7419,0,0,b94f739974e1c45429fab084dee8f96a1c94470840636af19f13ad66f4c1e00e,2014-11-14T14:11:11.230000 -CVE-2014-7420,0,0,d8ba7ad501d56ed3bca94b23a488b9993dfeeae8b90abc2704819a791ed0ebb6,2014-11-14T14:11:12.683000 -CVE-2014-7421,0,0,2cd72094379705425eaac024cc97a1cfebe020ed7634d7a64ebabce6a30e2aa6,2014-11-14T14:11:14.183000 -CVE-2014-7422,0,0,65418b31d77c76d2d56cd7aa167157ef9e774350254e9c9bf50809be0f6929ed,2014-11-14T14:11:15.697000 -CVE-2014-7423,0,0,ea5d8de2aa014341aff7c9fa64dd072dfc5398beff9252bd110af57ea38ff813,2014-11-14T14:11:17.357000 -CVE-2014-7424,0,0,b5b46408ec6a37eab17fc6c6863894e0ad81cfeb864ca24f4aceaef0ecb93956,2014-11-14T14:11:18.840000 -CVE-2014-7425,0,0,b28067ea62d3773edfb932d44515190f2258cc462047f5df8044bb39448f9f4a,2014-11-14T14:11:20.323000 +CVE-2014-7413,0,1,c431a55671f48791c8382762ca4f1f6c608111d0dfa03cb982911920c87c9620,2024-11-21T02:16:59.510000 +CVE-2014-7414,0,1,975979dcb71c14cd7ca9f9da6aea012b5eba1c23f58ac9679ce193f7ed44e5b7,2024-11-21T02:16:59.690000 +CVE-2014-7415,0,1,16ce72e0d0489668d02474a6f6c5bb4c039a4c6eff8a80a46c4e679786d3a944,2024-11-21T02:16:59.860000 +CVE-2014-7416,0,1,1540c659d2d86f808ae71c96a1b495bc4672e977912d3fc388b78567bbc3516b,2024-11-21T02:17:00.057000 +CVE-2014-7417,0,1,4a9542f8f6bced748c798ac69db0f2fe43a73f30e2d703965035fd061b816335,2024-11-21T02:17:00.250000 +CVE-2014-7418,0,1,f1a8494ff2d28aecbfc377064ee752ffd85a49f9ddc349eef6e178b59b564931,2024-11-21T02:17:00.447000 +CVE-2014-7419,0,1,c90dcd42776db95ba2774b07486d23da924238bb3205f3b6f4fd16dec9ecbfe0,2024-11-21T02:17:00.647000 +CVE-2014-7420,0,1,3b77b2a9a6632f7cce7c4e9abc523e58024cda06bb7a1016fb4603ba25f952b1,2024-11-21T02:17:00.847000 +CVE-2014-7421,0,1,df6436b996d833095a4502babee059d18b8a865a7e4e307c1e2c054e3160bbaa,2024-11-21T02:17:01.030000 +CVE-2014-7422,0,1,8366728257a928a1fe0442378f46f6513eef4c10e4a46c4c8c9d11fa6347058c,2024-11-21T02:17:01.223000 +CVE-2014-7423,0,1,6b36fd089917b64e8f71bd068000001d8d24f0fb4da6393f52c08779a4856f71,2024-11-21T02:17:01.420000 +CVE-2014-7424,0,1,103fed5b1c186b79e45a5c43b1b89e4886a85c902e11091ee1bf5d5841107b87,2024-11-21T02:17:01.610000 +CVE-2014-7425,0,1,09f6ab1797125850bf1afd304d3435c409fee21bb98da60ae48f68142b600252,2024-11-21T02:17:01.800000 CVE-2014-7426,0,0,e8af99a773f3290b9fcf8acc81c72d2a3d1ea76f1e2cb0e60d5a67ac76701728,2023-11-07T02:21:23.060000 -CVE-2014-7427,0,0,a63d49328e73b2085d56ed4bdbb63b75e9bc9462c034c0e6f6b2574e0e4e6cfc,2014-11-14T15:24:42.103000 -CVE-2014-7428,0,0,8bd7ce16aeb92848d81518723881b0dee4b4ae398778d7de1c81b8bfdcab97ed,2014-11-14T14:11:23.417000 +CVE-2014-7427,0,1,e80b4801de2c0e3180e9c41dbb22362e4cad7205c7b8220f20e0427c90425ace,2024-11-21T02:17:02.010000 +CVE-2014-7428,0,1,cea4e4a2165f52d2dde104b63b322b55cd7d169e1862d7f9d43210faba52cca3,2024-11-21T02:17:02.207000 CVE-2014-7429,0,0,359fdd4fc28727e3c388fdcb48d0991db84384454d4429059dfe45401253cb70,2023-11-07T02:21:23.290000 -CVE-2014-7430,0,0,011a49b080dfcc956c0b5ad1c18eb83d776d39a8bce5657da00c5cdc104c60bc,2014-11-14T14:11:25.107000 -CVE-2014-7431,0,0,63d440fcfaab804318678dc547351b1aa351f21c49b10a6c51f3ac07bd643678,2014-11-14T14:11:26.777000 -CVE-2014-7432,0,0,71e73ceb751718d0384abbbcfd850736e595f659267b3abf403956689be75bc5,2014-11-14T14:11:28.403000 -CVE-2014-7433,0,0,ac0173d7647885ae4e5651fb21a2c84827bc11239db21e353f8ece127e832a16,2014-11-14T14:11:29.967000 -CVE-2014-7434,0,0,8c79f7f7877e80484e24cf038b22edc509433b608817ae7dc1916a4867b313d6,2014-11-14T14:11:31.497000 -CVE-2014-7435,0,0,e5b89c86b8952f0189f43b45879cfea956436730ef7378cdb01655d4e40e6f38,2014-11-14T14:11:32.950000 -CVE-2014-7436,0,0,63340f9a04554252fe454864b6438de0c9c809ae656eee78e565fe69fd79503f,2014-11-14T14:11:34.437000 -CVE-2014-7437,0,0,3d60bcc61bf379b59cef92c57b7c10eb2a1ff233e3625ed484bedff9ac4e2685,2014-11-14T14:11:35.983000 +CVE-2014-7430,0,1,bc2d6fe514952a2033809cad1f77ea10febdeed725cad24fa72c6d6789569f69,2024-11-21T02:17:02.417000 +CVE-2014-7431,0,1,23585d05d26faaa3d63e0651d3392af4358452e38dcdb259d510160f375c5c24,2024-11-21T02:17:02.610000 +CVE-2014-7432,0,1,6cbb930709a933f4521a574b7b51510a23254d9d582bd3b8180dfda86709b613,2024-11-21T02:17:02.797000 +CVE-2014-7433,0,1,61a1d8e5f4fca6e343f02add1aa52c30adb3650316780cff9eef8a911c27d609,2024-11-21T02:17:02.983000 +CVE-2014-7434,0,1,cbdc785a0fa9f30e55054ae1b33e0bcaab7a5d14bcfece3e8f63b0a60087c0f9,2024-11-21T02:17:03.180000 +CVE-2014-7435,0,1,641c498041ebb1ed55186b6cd27bec8e327ac501a5c50f65454590b024151d60,2024-11-21T02:17:03.380000 +CVE-2014-7436,0,1,1d136ac5d7ea528add4efd23e75d39767f997e4b5c8d33a9071eb9daf5882dd2,2024-11-21T02:17:03.587000 +CVE-2014-7437,0,1,8dd39e84cf35a9e44dbb8b60d010221b7f4885d1bd93d9b8e3d20dc22dd74bf0,2024-11-21T02:17:03.790000 CVE-2014-7438,0,0,3d299bf7b009c6b1076e5c31f693c2c43834ea55fe1a2d6e91e3ccd7cf372000,2023-11-07T02:21:23.633000 -CVE-2014-7439,0,0,a15cf73a7debc2c1dc17f09eba7ce0e342593da4e47c9c5a4da577c5ba963051,2014-11-14T14:40:24.707000 +CVE-2014-7439,0,1,7a88a3f4542a8956d5d9ef9c4c9019462160b1fdd67529e3cf5d8c12cc475474,2024-11-21T02:17:04.010000 CVE-2014-7440,0,0,31efd42a0d26c5a51e2ef586d80620f156fd9b17685a1f95dddfea9ebbad0e83,2023-11-07T02:21:23.870000 -CVE-2014-7441,0,0,70510c4088bfa008ab3a9057a245e9e2ae21372015622da1b830c9f94b7cb823,2014-11-14T15:18:55.983000 +CVE-2014-7441,0,1,7d372ee2312b4378c56ffe18fc12a9dc2464c436153d96b7cc2167558b08b8e2,2024-11-21T02:17:04.243000 CVE-2014-7442,0,0,d6a781521cbcec3e6041deed320348e5ad4577fe429f5ce0f0ac1bb0ada1620b,2023-11-07T02:21:24.110000 -CVE-2014-7443,0,0,9cc34a99e9824c7b52273cb3ca948d49cb5d5689a67d7d13d87214a0e59efc72,2014-11-14T15:26:29.917000 -CVE-2014-7444,0,0,6d11be69258f330ddb2cf0b9560987d3f0df1c495f09eea4d41a570dd25684f1,2014-11-14T14:11:40.530000 -CVE-2014-7445,0,0,25e28c01f50ef5b2c0c56196b6ba3c8a856097ffdc5564b7afc3c8a51ef7bcff,2014-11-14T14:11:42 -CVE-2014-7446,0,0,b7baef8e770c8b1840654b66f826c74707c75d0a34a1d694e2ca40e5ca6e7a6d,2014-11-14T15:29:05.600000 -CVE-2014-7447,0,0,4699be7c83cdb904c5718461285c85456276c8b529325579e183090151597695,2014-11-14T14:11:45.030000 -CVE-2014-7448,0,0,08a749c907e2ba9b22d2d6e2790e8f8fca128f69f83a9fe95c1e57c9f34b84cb,2014-11-14T14:11:46.517000 -CVE-2014-7449,0,0,255eae7801ffcfc52b8edaa11082d9735b296db12ea5c2285a70dbac572ea0fc,2014-11-14T14:11:48.017000 -CVE-2014-7450,0,0,ad0ee52b585ec8bc6fc4a99b47409980d6bacbe65f1238eba8eedc1b4adabe08,2014-11-14T14:11:49.487000 +CVE-2014-7443,0,1,4f4a33ceba5cb3020e9d55e2def4583a785dc4b600bb5a4b575e829cfae51a65,2024-11-21T02:17:04.460000 +CVE-2014-7444,0,1,40183be377d608eecd0619033965cf5a7af5800621eb9b2be7446ee535cff63d,2024-11-21T02:17:04.657000 +CVE-2014-7445,0,1,87645fdb0404094fa55cef43e7ce03ae3b971bb2177a24370c03ec54445c3fbf,2024-11-21T02:17:04.847000 +CVE-2014-7446,0,1,c93641a378e672586aebf1b61e16e7d1789bf3a2c8aeb07dff698df6434ac53d,2024-11-21T02:17:05.037000 +CVE-2014-7447,0,1,7136abcec616aed2ad621bcfd316f154fdd827055373400275e0627dd77c7943,2024-11-21T02:17:05.223000 +CVE-2014-7448,0,1,ccb6ef1260b1f4cf1e95a18788f85d5b9d82e3cc95227446121cdc0dd6e053ce,2024-11-21T02:17:05.420000 +CVE-2014-7449,0,1,0f64b30f9841b8de7d52429a856a64dbfd651a53ab94e7ae799f1afff80774d6,2024-11-21T02:17:05.610000 +CVE-2014-7450,0,1,4b6d768b7d2589d5da7618103e297572599813d50244ab445f782f51c784cc25,2024-11-21T02:17:05.800000 CVE-2014-7451,0,0,17316bd663e15a4c7a207a6c38ae54d3864ef63ac79fd9f83b86b7a3a2eec84f,2023-11-07T02:21:24.390000 -CVE-2014-7452,0,0,436e1ecdaeb9111d662af7c9baf0bb0d03d2369a42212773b9c85a2dc112190f,2014-11-14T14:11:51.017000 +CVE-2014-7452,0,1,0e5d3caca63866ef2c9c1af7d8bbb110070a62c5c08dadfe72f0a7e9a7f340f5,2024-11-21T02:17:05.997000 CVE-2014-7453,0,0,056e857cdb4b21ed7f449ae61db0b45a4cc672ceea883dbbf8b36e36c094e288,2023-11-07T02:21:24.697000 -CVE-2014-7454,0,0,c3895f82770f4f79aabc8f6bd179a73bccd7fa3d6949a9b811d19d92df2cb966,2014-11-14T14:11:52.517000 -CVE-2014-7455,0,0,6b13ee33be3376e0ee606b9896cc67115170d182f216b66efff1a197ebab7f51,2014-11-14T14:11:54.063000 -CVE-2014-7456,0,0,0a89db0c0674d6471e13f16d666d286ae1e78aac0dbf81e1b79c9b1de161104b,2014-11-14T14:11:55.550000 -CVE-2014-7457,0,0,4d2655a6d1e7809145ab97087bd7e0a1d6a1ad5ab2cf5522184722e985c06753,2014-11-14T14:11:57.097000 -CVE-2014-7458,0,0,14a905f353664f70ceb2a791066c862a1dee406bef230db5f1a98b2fd89c82be,2014-11-14T14:11:58.580000 -CVE-2014-7459,0,0,5c639e1974db5640df833d82a78800124909cb707253ca74d263e80810da70c0,2014-11-14T14:12:00.347000 -CVE-2014-7460,0,0,11c3a3410c08f279fa031ad95b2b00e139a9359e8b3548b5d958f13fcbe290c8,2014-11-14T14:41:12.280000 -CVE-2014-7461,0,0,f9accbaf83838a63857165b2216cd91ad7e637f78623ac8dbf13756d65cedc0f,2014-11-14T14:12:01.893000 -CVE-2014-7462,0,0,d8576522f0a2513bdb3c61ba96337ae190d6886a05e9d0c8b4e01951926d3fd0,2014-11-22T02:59:26.347000 -CVE-2014-7463,0,0,b64adf9890e7ed0079f2a78cb0874e8d570279cb9214f3a1a8b3d302402a9419,2014-11-22T03:00:59.773000 -CVE-2014-7464,0,0,ad200877ee7cda0851843c08939714430eff1023f0c97e9e8430506ffd5a0fca,2014-11-22T03:00:08.130000 -CVE-2014-7465,0,0,0275021372e1f87577d7a66d4e0c90342b08a2900e439038f4044328c8051f6b,2014-11-22T03:00:42.240000 -CVE-2014-7466,0,0,dba5bfb03e09bc53aea82fdff64652477294ffd8d1e769dc22b0dd85c33b1ae9,2014-11-14T14:12:07.940000 -CVE-2014-7467,0,0,e8f03f23db2b01a30d032ce479c35e8a29884f29db40a510d96f1761e25f354e,2014-11-14T14:12:09.443000 -CVE-2014-7468,0,0,e66209230113bd5488f059e184ff2f41b48f6312dd62834e6dc7790ee8f7c290,2014-11-14T14:12:10.973000 -CVE-2014-7469,0,0,0b22e7ff56149f2ea4249c842ecc9683bf7c5fd7c7dacbc5b846b17e53cb67c7,2014-11-18T17:34:59.363000 -CVE-2014-7470,0,0,c423f4fd9da94539cc4bc2b7db4202fe03f30f88c9b3145d806ddf3a743da9a9,2014-11-14T14:12:13.973000 -CVE-2014-7471,0,0,026524978b6773429476fe6dfe26750c7a08a7e0e543b67e8f76362b7577f2ca,2014-11-14T14:12:15.427000 -CVE-2014-7472,0,0,f0a255de38f31dbc3aae858899a81db549acf54ec624de1d9a60b621802be971,2014-11-14T14:12:17.223000 +CVE-2014-7454,0,1,6647238534fd75236364bac6e49645c7a26decf71077b9f201fcc2672b1ec1ff,2024-11-21T02:17:06.220000 +CVE-2014-7455,0,1,2b02b53b17d40b24364a8f6098a370112fa1f3bb24dc09b60d474b59c2e25a59,2024-11-21T02:17:06.423000 +CVE-2014-7456,0,1,1ed75ff875a70e462a743664bc3fbd3f8d976b8ffb6d23d6d03f7341e2304e71,2024-11-21T02:17:06.617000 +CVE-2014-7457,0,1,7c81f37608755465377eb36b12b533a319113eb90da5e664433e516b07acf5de,2024-11-21T02:17:06.807000 +CVE-2014-7458,0,1,6851b09206ef1abad1507a83d992f68e1f9763c947ebdcfad0429f7482b2a9b8,2024-11-21T02:17:07.003000 +CVE-2014-7459,0,1,3b8c163a069ea96f8db4e181b1ec3b82a6727cb3da472a0d6a40ca085c689c28,2024-11-21T02:17:07.193000 +CVE-2014-7460,0,1,e2bf05cf8bb5d1d094b6fbb41fbe5a11894104bbd7f791e688f064e077c026c7,2024-11-21T02:17:07.380000 +CVE-2014-7461,0,1,5526af0a53cc81c6630e4ba35cbc867f6c561a2d58f944a404947be0cb6f51c5,2024-11-21T02:17:07.583000 +CVE-2014-7462,0,1,9d1435d21cae334b34ef5c27802b81a0acfe70989b52f4cee048a79063ddadb1,2024-11-21T02:17:07.777000 +CVE-2014-7463,0,1,117231f706d49e256390560690b591c0a6807500c83c8220b47cb928b9e809a5,2024-11-21T02:17:07.990000 +CVE-2014-7464,0,1,c19f4393fbabb1340e6e9e73639a40a4c500a5d11bb8902a5d95bf9029bf0aa8,2024-11-21T02:17:08.177000 +CVE-2014-7465,0,1,d809dbc90847f69963f0eab608363e522c9011528780edba54b6af35452d8e03,2024-11-21T02:17:08.367000 +CVE-2014-7466,0,1,48eaeb3a02ad2a3f07437bbebab3a7a1f0fc635ea2aa7cca8f737a535cc297c0,2024-11-21T02:17:08.550000 +CVE-2014-7467,0,1,302a36d10c7a41bcf847c2ef0640865500564f207a3e8869b6f055b825cb45a5,2024-11-21T02:17:08.740000 +CVE-2014-7468,0,1,cdecbbf6ea3d42f1cdf021b0cfbaf72d4809657a6c3e231691361285126c8c2e,2024-11-21T02:17:08.913000 +CVE-2014-7469,0,1,a226f17f229f9dae4c1bb71d85ee5c7030d2ba9209c2196a92a354f976ffa54c,2024-11-21T02:17:09.097000 +CVE-2014-7470,0,1,c5711318a84ab5bce3557967eb98718d44e9f367fb6577b2579d778043cf7d79,2024-11-21T02:17:09.300000 +CVE-2014-7471,0,1,c89eb9cb6c320ba4999b394387b8eba88dd95cbcae8bdc8bd3efaffd2372a89b,2024-11-21T02:17:09.487000 +CVE-2014-7472,0,1,d18dd7ffb9e718fa1011d10b84a3ad1251f4b9c1ecb4ba38881b3433d840fc5e,2024-11-21T02:17:09.687000 CVE-2014-7473,0,0,0c2c825094e4e2620394b6fc82057e66c4c1b803b790d40beb0ad6225bfe7e45,2023-11-07T02:21:25.053000 CVE-2014-7474,0,0,9ff79f8fc9f8ae3ae6500166e9cad1b95d5571b162b1821f483aaa3fe58ca5c5,2023-11-07T02:21:25.267000 -CVE-2014-7475,0,0,3f51f082e4e1785406a116e7196e23a00909b5b091fe88c9937a8bbb22588077,2014-11-14T14:12:18.617000 -CVE-2014-7476,0,0,0937dcf3b36feed6e257982bff90a29dd5d014d8f7d9a4db0d4b39a3f3c4261c,2014-11-14T14:12:20.303000 +CVE-2014-7475,0,1,cf0b0c5b862844fcb02a59c49ab67321a2ff577e910441e2d5f4fee179401ff7,2024-11-21T02:17:09.920000 +CVE-2014-7476,0,1,8180c36aa8285993ab7c1d1f87ff7e22eefc521b51a67a2d577b1d955de40789,2024-11-21T02:17:10.123000 CVE-2014-7477,0,0,ba20d514a190aa1443e6575f8e5a6c08caad3b6aae0025afa9cfa55814debe4a,2023-11-07T02:21:25.510000 -CVE-2014-7478,0,0,27fb8ed48ec565ac499ef71eb85501ece6d99979603c780c240c9b90647e79ad,2014-11-14T14:12:21.740000 +CVE-2014-7478,0,1,3a919bfca99a4c1acdf0f349c6a4f49eaed635c88c56c1bd5dca896d783f7085,2024-11-21T02:17:10.390000 CVE-2014-7479,0,0,82ca8f5a1ec486936860b13c04bea93dbf27d8a14bfe5995f5e9b91bea4cee09,2023-11-07T02:21:25.757000 CVE-2014-7480,0,0,5462941025cdd204650651334fa0c6e8af00241b693fad5f3367217ae467509f,2023-11-07T02:21:25.980000 -CVE-2014-7481,0,0,32cd580caba68af10d3768b17fdd007e9e4cd0d3afde161ba28a01067330eb0e,2014-11-14T14:12:23.177000 +CVE-2014-7481,0,1,109387e7c99048c2d8aab546181e627c614e9ccea2d8e78bc2fcc4d93bb8d7f4,2024-11-21T02:17:11.300000 CVE-2014-7482,0,0,9feb87540e499b941523e5ed0f2fae7b2c780f732b3c28750ff29e94f7ffc34a,2023-11-07T02:21:26.233000 -CVE-2014-7483,0,0,4ec74122725ad4fe1c8f11c8cbd4a56e100c3743d03ef4dce17e78304ec744e3,2014-11-14T14:12:24.647000 -CVE-2014-7484,0,0,e8e15a82ad3900bf1bd8d442e4a09c5ee57a1c09d22c68dac5e00929b6f347bd,2014-11-14T14:12:26.133000 -CVE-2014-7485,0,0,f8d25c7ccb0c4a4ac8d2e4082e0002bac3197449e2b8718ee11ab4ec6bb38582,2014-11-14T14:12:27.633000 -CVE-2014-7486,0,0,03dc2ef347cdb3d61644badbdd334516877b5c0ec88b7890f45380426598e14f,2014-11-14T14:12:29.117000 -CVE-2014-7487,0,0,5ef76ed0d998c8a9cc28496bf472ff747119bce00a0445fee68476183edc055e,2014-11-14T14:12:30.633000 -CVE-2014-7488,0,0,aff14bc586a666ed41420b8bf130fd5d2e98ec1636755ce72d9e9b5cfba363f8,2014-11-14T14:12:31.947000 +CVE-2014-7483,0,1,0447ef461677166a220788614f6ed32e8337ae8537753e7b5c5b8c5f800d547c,2024-11-21T02:17:11.590000 +CVE-2014-7484,0,1,a8548f9d87464a03beccb1c347ff6c72b4c13e44cb045bfce83701f3c3df501b,2024-11-21T02:17:11.857000 +CVE-2014-7485,0,1,353abb3d64d80d51facb24bd09662155ed52df7bde8a76898b10aeb7d1a9aba0,2024-11-21T02:17:12.137000 +CVE-2014-7486,0,1,8d1ba0c647cb8fddf60b312b53ca08d0dfb7e0d8cb947fc109a7d1e69e797a20,2024-11-21T02:17:12.393000 +CVE-2014-7487,0,1,75e36522bba66a87a297f4019c441b5ffc631b2d5338d5360d6428cd46b099e8,2024-11-21T02:17:12.663000 +CVE-2014-7488,0,1,2af928c9091eb81b2f6e857917c5eb28eb5848d20ca2d89aae0380c4def691ec,2024-11-21T02:17:12.963000 CVE-2014-7489,0,0,1f47010aa346df73733678bb78df7535245b5771993017b747250f261d98f4a0,2023-11-07T02:21:26.510000 -CVE-2014-7490,0,0,9d04222485fe3b5cdbaac9861c9f372c74ea599157f4b3c8deced8d06e2bbcac,2014-11-14T14:12:33.570000 -CVE-2014-7491,0,0,82db98c852512c084663524634ff30e69c818efa4d5cc6410571bf1bebbba258,2014-11-14T14:12:35.273000 -CVE-2014-7492,0,0,8b8cc9fa409a9bb4f963fcbd4fa6ccceddd62e1689fc4c9b0e00b3520fd51fae,2014-11-14T14:12:37.057000 -CVE-2014-7493,0,0,9ce11daabe7faee87c8585aa121c95aef6f36f5effec0caa60971c23b7b18697,2014-11-14T14:12:38.557000 -CVE-2014-7494,0,0,f5dd4430da4bc5e3538dcd4bb2339f57f1af5657e066715f8442a6426ceb9322,2014-11-14T14:12:40.057000 -CVE-2014-7495,0,0,a0d7715f1734eb25226d85004a86c60c13bfe993a045bfc0bc10e27429242147,2014-11-14T15:21:59.107000 +CVE-2014-7490,0,1,613ca5e5bd7793537af4e2e7b726a69b8a835c54aa03f43097c3d79286057fa7,2024-11-21T02:17:13.247000 +CVE-2014-7491,0,1,e0b0148dc549eb41a33956e80987a0c7337e5f49241dcc8e1b7094a775c62485,2024-11-21T02:17:13.507000 +CVE-2014-7492,0,1,ef00739019a603cfe957121862ce5c5d0d878dd8bd059e9694c75aeaeef0f442,2024-11-21T02:17:13.777000 +CVE-2014-7493,0,1,420260cec878330451e08c3642fa0ad33cf0c26a4581d57e319ee321a935aac3,2024-11-21T02:17:14.050000 +CVE-2014-7494,0,1,611860d3fe16e05d46d671513444b40a6138db7a37621b0dcfc47852e5603b4b,2024-11-21T02:17:14.770000 +CVE-2014-7495,0,1,6f8ade2164bd28300f449d14a627e22b76bf2c4de3b4eacc4a4f83e2dc1bbd73,2024-11-21T02:17:14.957000 CVE-2014-7496,0,0,4bbeccfe1ef1ee5dc2f945ae9eefd1a10d088553b74e3ebffb1edab8e1b97e84,2023-11-07T02:21:26.783000 -CVE-2014-7497,0,0,cd5307bb8bd9c5d55c5e557842e9df2f097c2602715d24e9c6c01a6d4a64e381,2014-11-14T14:12:43.400000 -CVE-2014-7498,0,0,4d956ee5703622afa2d31b6bb835c9acc4ee6a64595e89d018293655ba7c7d4d,2014-11-14T14:12:45.027000 -CVE-2014-7499,0,0,26d27c5c3c50fdea5262e18b056ea3c92ad2797dfe9723d1fe6c8aee5282f204,2014-11-14T14:12:46.527000 +CVE-2014-7497,0,1,5ea763cf8e8d47b6f2e61720a757f9aaa563f41e2b761075929516fc8a8035d8,2024-11-21T02:17:15.157000 +CVE-2014-7498,0,1,9797d0f1260e9afa0656b3df000861f5094217e0ca38f8555d3a11f3bffe8624,2024-11-21T02:17:15.350000 +CVE-2014-7499,0,1,7033c2b306c9224b6c1d9c373cbb30bd1fd81f21e1c055e66cc041dda2fb7bc6,2024-11-21T02:17:15.530000 CVE-2014-7500,0,0,5ae6ae7e5daaa76fa6f6b5775ac206c314a55bd98bc9af2401d360e9d8bd8653,2023-11-07T02:21:27.037000 -CVE-2014-7501,0,0,d717c0e1df9a2072c5ecd3b5696e5e500e879f21d4042c7411c817378b588c2c,2014-11-14T14:12:47.980000 -CVE-2014-7502,0,0,6556730bfaca8a77d54c0842413781958a73553c1d7e7e408d39ebe79782e133,2014-11-14T14:12:49.510000 +CVE-2014-7501,0,1,f47f0cdfb1d67a415a34142fde52d83aad8d88aef7ea10619b710df32ee4671e,2024-11-21T02:17:15.733000 +CVE-2014-7502,0,1,d11d53752892a5e97891b2c70c68a4d957ad01e275ac116c0249064645b003a9,2024-11-21T02:17:15.927000 CVE-2014-7503,0,0,fb12901875f54f1cc9e8dd788e9f69d929169269e1b15d33e77e298e04e4496e,2023-11-07T02:21:27.297000 CVE-2014-7504,0,0,7f63e7022af1e6975ff5c176330ae9fadee3aa4dcf784c45533b82156ba2fee4,2023-11-07T02:21:27.547000 -CVE-2014-7505,0,0,5a961467b4f698264da737de6441f6a39f204c24efbb3fb08e5a33e762357297,2014-11-14T14:12:50.857000 -CVE-2014-7506,0,0,ff0909591757f4a1acfc2fdf87f63b790aad4a47c660cf695ed276d0a5c1da78,2014-11-14T14:12:52.667000 -CVE-2014-7507,0,0,bc67a56844a0ee3a7c125d9e30ced13dc11b2f1ac6f2282980bbd554a92b206f,2014-11-14T14:12:54.137000 -CVE-2014-7508,0,0,12681afdd5a99c9b5c5a51d72d5c06f2ef1415432106ceecd37039542c64630f,2014-11-14T14:12:55.683000 -CVE-2014-7509,0,0,9e065c908b52a24b9269872cee4adabcc73c8be28ed927446423d382691c7c79,2014-11-14T14:12:57.327000 -CVE-2014-7510,0,0,a08064455e3b7238906884fb523e02566b4e957200bf1666869c0352909e275b,2014-11-14T14:12:58.793000 +CVE-2014-7505,0,1,72643cf738a602c6bc3283577477581189e4d2ebbcfa86739ef45fd8787ecab0,2024-11-21T02:17:16.153000 +CVE-2014-7506,0,1,2811fdd2653399f1ca1e3562a93533c02e371a0d353cea1465bae1351cacba49,2024-11-21T02:17:16.380000 +CVE-2014-7507,0,1,dc840745ad20d32f8c5c1ead399c3d6e173efbf17b51a40e56b5381c5bef28d8,2024-11-21T02:17:16.580000 +CVE-2014-7508,0,1,17ad9e804846276e03bd6e44813625c2dc7d9d2108879e5b163c41d48a5cfe6e,2024-11-21T02:17:16.780000 +CVE-2014-7509,0,1,4851c1766bf33b48f0bd7e2f13012e69d4e082bad6ee1e5633aef657012efcef,2024-11-21T02:17:16.987000 +CVE-2014-7510,0,1,316fc04ec2421ff8647d4f8424b7ed8d17de1d46047d877d4b8cb3bd4e5c9476,2024-11-21T02:17:17.180000 CVE-2014-7511,0,0,b3bf5b867b458540e06fc89c42a95ed32173e5e710cf16a5fbbf377a3b642b7b,2023-11-07T02:21:27.820000 CVE-2014-7512,0,0,82f59d8c61b32e29c2b58d8075a1ec8ad3b893470e475d67c44c55b779df620b,2023-11-07T02:21:28.037000 -CVE-2014-7513,0,0,e8cf1562b457de1bd78ea14b59bbb18d7d19aa2e1c10d2a900cde81f91f96801,2014-11-14T14:13:00.327000 +CVE-2014-7513,0,1,f6151b4386d14aff0d18d7bf87ee141c148a6b18c81a483a0911f4125d9ff66b,2024-11-21T02:17:17.393000 CVE-2014-7514,0,0,651e3e472533581647d46833f066a0a12584181fe9d34434dbfef66ec17d5c74,2023-11-07T02:21:28.290000 -CVE-2014-7515,0,0,af9a3f0b5bad2da67e4e46eb12a55b0403469cf38ad0a4ed3073b922a1a71eab,2014-11-14T14:13:02.107000 -CVE-2014-7516,0,0,61877a2fd50b8f2572ed0c4598fb5ac6a04811f722f878dad45b519aba639312,2014-11-14T14:13:03.607000 -CVE-2014-7517,0,0,27cd992d84d14547c6ab8df979373d443d8e367cb393e162994f8022f4f5035c,2014-11-14T14:13:05.107000 -CVE-2014-7518,0,0,96b9eb83b1877110627c8b7b791ad18db90c46fdee3a0a2d24a7a737c5d23a91,2014-11-14T14:13:06.623000 -CVE-2014-7519,0,0,a21bb2cb2d747c4a5bdf2da57e18cc17c3c69f94f9a0b28e41b3599cc991b0a0,2014-11-14T14:13:08.123000 -CVE-2014-7520,0,0,17de08eb003823023c34694fb93f727af73d8ea7754989573da3054d78ee8be3,2014-11-14T14:13:09.623000 -CVE-2014-7521,0,0,dc73a9d8bd6a1883a1bfea1b25ed72d3ad2d53402aa3aafcc6c498050d8e114b,2014-11-14T14:13:11.077000 -CVE-2014-7522,0,0,e2341dcbc7237c1f7bed88b4c204e6777a430226c4ae64eccb833f5e67c50c38,2014-11-14T14:13:12.547000 -CVE-2014-7523,0,0,bbc0a6a9dd0a751d48617429bff0be352a466b653f0dcb165dff30eeaa770eb9,2014-11-14T14:13:14.047000 -CVE-2014-7524,0,0,6c8e4890220cf17e52ac518b004ac9402ea5e46c3df30f078a425209acf77768,2014-11-14T14:13:15.563000 -CVE-2014-7525,0,0,809dc7ef9a35c341c176ee8244f0f855141dce5fc853a6067b4a1f291fa2650b,2014-11-14T14:13:17.017000 -CVE-2014-7526,0,0,4b2c9e0317848fa884909bd4c9ca3ec38e924c80b9f20cbd7facb4ec9525aaf6,2014-11-14T14:13:18.483000 -CVE-2014-7527,0,0,d78d2c75ab0d6cfb619f5ebe800ec0f8be4d3b25abf6967fef14349932e99336,2014-11-17T18:32:28.400000 -CVE-2014-7528,0,0,136a3718b9d61cc9f104b6bb4af13d553259dda6372e31022256928292e2132f,2014-11-14T14:13:21.487000 -CVE-2014-7529,0,0,d6d1641b347aaa4e780409f25ed09e167dc50aec836c14c3763da1be91297cae,2014-11-14T14:13:23.097000 -CVE-2014-7530,0,0,1b4a5be5b4ad965b2f23d364ed802757ecfdfb5faa8a24276f4c5447e1278ea3,2014-11-14T14:13:24.657000 +CVE-2014-7515,0,1,7308d9ecf98ed7a0f56c529905acbd53993479c970bc191eeff044893849a24e,2024-11-21T02:17:17.590000 +CVE-2014-7516,0,1,bc545038180a0766b964b7cd1aa1b4f0f6613d84e50ea7134cd7d98875ff720d,2024-11-21T02:17:17.770000 +CVE-2014-7517,0,1,5a214ad64ca3f00406ccca79896d2550bfbce056369fd1daed98b537121be002,2024-11-21T02:17:17.973000 +CVE-2014-7518,0,1,9684c333ccb42ae0c693c07b7d380848be64a3a6c2e941332e96332680291595,2024-11-21T02:17:18.157000 +CVE-2014-7519,0,1,359878728d247e4d8214b0307633a880402fb5fb78cef033df59757df80c86dc,2024-11-21T02:17:18.337000 +CVE-2014-7520,0,1,15c1ea8dd8de61bf34245ffd2ec03e67d16b2a347db45c7df2b0f0e78189e78e,2024-11-21T02:17:18.520000 +CVE-2014-7521,0,1,ea557fca8fd75a7c3e6e96f1afa3e97894d7140a55c85578953165c5f43c3466,2024-11-21T02:17:18.703000 +CVE-2014-7522,0,1,f056b78424bfea325de3728e99e8ad744877452ae78ec0038feb1dcd8b8bca17,2024-11-21T02:17:18.873000 +CVE-2014-7523,0,1,21fa9101fc61c4470c58f5adae0abfd71124113b452998ff9415bb6083bb0e5e,2024-11-21T02:17:19.050000 +CVE-2014-7524,0,1,0b2e213e2ff69ce6c107df36d25b5eea7ec41c46348aed6decb8043fe338b3b7,2024-11-21T02:17:19.233000 +CVE-2014-7525,0,1,66cf2305baa4eaf7a6ff122aee254f0e632f3fed7ff4cb52236c1d7b0baef00f,2024-11-21T02:17:19.417000 +CVE-2014-7526,0,1,c22422541e364380a76e60489b8120036f84ddd913fc53ddd19da0b1860bf42b,2024-11-21T02:17:19.607000 +CVE-2014-7527,0,1,3ef727d86c4de728d4faa2cea4e89a4e75ac9e6ff81a4e51d3f24502190bbadf,2024-11-21T02:17:19.790000 +CVE-2014-7528,0,1,b6c74beb258cc9e54b0769dea34e03147c73f90c7d58539c0ddf12d699384523,2024-11-21T02:17:19.967000 +CVE-2014-7529,0,1,155df30622384358d5b63e2cc3bed8fb88f0e0d8ce8fba05def09c0d132be1b5,2024-11-21T02:17:20.147000 +CVE-2014-7530,0,1,2ac3dfebef6154728f17ecd24da30acec5027d55a722653246a6dbb50720f782,2024-11-21T02:17:20.327000 CVE-2014-7531,0,0,78f6ec490ff1458337ec505015791452341a6271d4d34a97a293f766ab93bc5f,2023-11-07T02:21:28.700000 -CVE-2014-7532,0,0,e636e179d000c356061c9aa890dd9f94548cfcdb777ef9a4c50392a47155392d,2014-11-14T14:13:26.097000 -CVE-2014-7533,0,0,d0e6a0dee9c34e2d01f31d024a8293cbee0f2f02dae1c4fbc3c7aef92c83f98d,2014-11-14T14:13:27.657000 -CVE-2014-7534,0,0,1d7f87f12623d52d0c9ee6ebf06eb1e9859ae0c5b6eabc09175997f9a9c50046,2014-11-14T14:13:29.300000 -CVE-2014-7535,0,0,c6b5578fe02e79271d8cd0a2328bb21770b0f3aed4820a339baaff679d0faa37,2014-11-14T14:13:30.830000 -CVE-2014-7536,0,0,b435d9d9da55ab4d4fcca5a41d224e26abc70d0f8ad1e7c1f56a4d397c2babde,2014-11-14T14:13:32.267000 +CVE-2014-7532,0,1,49e766f5aaf73db1eac3024ca27e2b74c233ef9cc0c909bea23b0eca7fbd773b,2024-11-21T02:17:20.527000 +CVE-2014-7533,0,1,355943d70a75511b8354ebfc3f53ecc53a162998470b710928686d5e33ebf44f,2024-11-21T02:17:20.710000 +CVE-2014-7534,0,1,60c9241eb3a67642a3b25b8764645b59853b244bf010bc60100299ff67f38485,2024-11-21T02:17:20.910000 +CVE-2014-7535,0,1,ad84e2cbccef6d89474c60854a3e96c72cae2a28d94556dd6802962a6a94be75,2024-11-21T02:17:21.090000 +CVE-2014-7536,0,1,823b735153cb13d0706191c4bef2c3f7908fe55baf5a660eaa99cca6b6721384,2024-11-21T02:17:21.303000 CVE-2014-7537,0,0,be2eb38bcc30a353d71d4eb774747bc7aeb2e739f919683cbd78c1e13f3e90e0,2023-11-07T02:21:28.947000 -CVE-2014-7538,0,0,496edb5d566347ec4ea908ec9904e789e7ecc49aafb871571006b8510cfb42ec,2014-11-14T14:13:33.737000 -CVE-2014-7539,0,0,3272728889e4544280deecc68a44db48713aa229d698ddb44f4a1634c0876448,2015-02-11T16:50:03.780000 +CVE-2014-7538,0,1,5d926238c678601d215317d4646d5a41664909951678914fe1185e755416ce01,2024-11-21T02:17:21.503000 +CVE-2014-7539,0,1,b867f92fd744cd6140cf4009f19b5976464e231d0009e1b1fde5a4b2644794c9,2024-11-21T02:17:21.683000 CVE-2014-7540,0,0,53b4cc8e56d6a9d53f351bf2a33c570b34034c464f1d1d5c4c2c2ea3e8edfbe8,2023-11-07T02:21:29.180000 CVE-2014-7541,0,0,3fd02f9633ed215c6e115b6c4ddc95aa1aac159531f080622f10fe5b7abe5964,2023-11-07T02:21:29.407000 -CVE-2014-7542,0,0,cc907cc89e4c77c011679de18a24efb5fb3058f2502db37f8e19255fb9bff9d8,2014-11-14T14:13:36.753000 -CVE-2014-7543,0,0,15c72c37097f627de078e37f65ad3a2233d8b8e7781840b24aea95b25616443e,2014-11-14T14:13:38.393000 -CVE-2014-7544,0,0,b19607b35686fa22db9cc67645ad5a8b7988e95a2bba404fa36ba777a233259f,2014-11-14T14:13:39.893000 +CVE-2014-7542,0,1,60b93a55c2831dbcc9b71ab547b692e82839a8a92cc4be314c18f1d979df2c09,2024-11-21T02:17:21.897000 +CVE-2014-7543,0,1,6038b25017c20566b4621df57dc7c7dc23dae7a616419fc7566021fd602d1941,2024-11-21T02:17:22.080000 +CVE-2014-7544,0,1,fbd333e3f1eb64b754141f59ec00f1ca01a196fa5d2344ace7531463dcf2d01f,2024-11-21T02:17:22.270000 CVE-2014-7545,0,0,e336cf871770193afb2871df06b88d5cebbc3d4bac7d604446b84008b3d0bb04,2023-11-07T02:21:29.740000 -CVE-2014-7546,0,0,969b43997cf1880b9bd9c8f516154d0fc773ad7e8c39fe94fa402e4831b07514,2014-11-14T14:13:41.363000 -CVE-2014-7547,0,0,c5622748bdd645c96af6113b356d5968e3a4f07d07fab8ccee0a18fd51ce15e1,2014-11-14T14:13:43.380000 +CVE-2014-7546,0,1,3165e77caed46406e896761f495d75df609661d3f2039f744b672dec3d851e5d,2024-11-21T02:17:22.467000 +CVE-2014-7547,0,1,33bbfeb51203d7c4f0d6e447ee894e79d93c3d6c7ef343f943e13a4eb3559bb9,2024-11-21T02:17:22.650000 CVE-2014-7548,0,0,37d0f5d781a73b2ec922bd11c8928b11442f4a832c10c38d0131b460c41a4d11,2023-11-07T02:21:29.973000 CVE-2014-7549,0,0,738de725042417253a7449b116f1c3432cb24a02be24e5b4345e3d10cc498609,2023-11-07T02:21:30.227000 -CVE-2014-7550,0,0,00d7a502cf134e8aad491162f36b709f392819aba6a187b644c0b1ad02dfa475,2014-11-14T14:45:35.230000 -CVE-2014-7551,0,0,031863a186cf0fad7a129f220ecad41c94534df0d0ad4e3b4cdef40ecd8f2311,2014-11-14T14:13:45.270000 -CVE-2014-7552,0,0,6788d0a242177d6b87b54294da56b0144b19f6c429314ca981dd875f23b31b3e,2014-11-14T14:13:46.943000 -CVE-2014-7553,0,0,50c44b1042ea8759dfea233efd6075d823d41eb15ba1dfde21f63e3e8104cec7,2014-11-14T14:13:48.553000 -CVE-2014-7554,0,0,c0f36d2d3815d2be06242cbc16efbc5e376f051dc0713b2a452d3b79239ce800,2014-11-14T14:13:50.037000 -CVE-2014-7555,0,0,2e15602303b43c0c85799be28311c989d292db34ffccbdc8f4f5a1380f3bdf0e,2014-11-14T14:13:51.537000 +CVE-2014-7550,0,1,c5128c6b6f6d5f7914a0a2c834c367a06074c8a6a625799cc3d0ba5422f672e0,2024-11-21T02:17:22.860000 +CVE-2014-7551,0,1,0ba515d750bc48b864351ec059a1f3fb0357dc2cf3cd487f45688c00a2bfc85b,2024-11-21T02:17:23.060000 +CVE-2014-7552,0,1,b2887bd96e6fde1fdbb6c922cc3d8e9c5037baeda46975636272fc65bd169f83,2024-11-21T02:17:23.250000 +CVE-2014-7553,0,1,8948188ca5f98d7f0b57c3a2757c5d5302e8c921aea231753ebce163c8037dde,2024-11-21T02:17:23.430000 +CVE-2014-7554,0,1,b8788a6b1a7d53d9acf3726f14418d1c89f70e19f07961309e75cf6301015a69,2024-11-21T02:17:23.610000 +CVE-2014-7555,0,1,f40813c407ba4e5285221614282b3b9e6ad5673f98a1c16a0700659344aa52ef,2024-11-21T02:17:23.793000 CVE-2014-7556,0,0,f1b23b53c1fb1b416afc3c256aaf882121f048704877140b843bf3fc9cc9de4f,2023-11-07T02:21:30.507000 -CVE-2014-7557,0,0,0a73e20e61bd7b238cb0e83e73a5b9e5a03c3328f9b92f25f6cfe5568c37a68a,2014-11-14T14:13:53.117000 -CVE-2014-7558,0,0,df41e0f0725d55404a2751497764bd39ed09d13a0681a7ce975c547ee6a62ed2,2014-11-14T14:13:54.583000 -CVE-2014-7559,0,0,290839ec10959b0aaf1b0d591a44c0abbf19d3e3bda16e7822b302630d7635de,2014-11-14T14:13:56.053000 -CVE-2014-7560,0,0,63d1b006f85d75ca05ac3a555090b15ed9e36c6c94a8367dd26ddfa2c710a6f2,2014-11-14T14:13:57.553000 +CVE-2014-7557,0,1,8792859e7b3abc8fe1393c0782d245e736829ff5fef00ce70570bcf222c37730,2024-11-21T02:17:24 +CVE-2014-7558,0,1,5ed8fca00f0ec8a5c2b3a5591f3e6a816e7b0f39f834c9241ed81aba267c457b,2024-11-21T02:17:24.193000 +CVE-2014-7559,0,1,0b149c7b85d85b6aa7ea47ded3aca922e757cf8fe626f0f8e4607b42554464c7,2024-11-21T02:17:24.390000 +CVE-2014-7560,0,1,567bb3bbfc10b057138b088e13f8d0260f2783c960e9ce7f414c8b43c2de98e5,2024-11-21T02:17:24.573000 CVE-2014-7561,0,0,d0d644d4c01ac0099e188bef8cd96560ccded318ca01a27d91dab1392ce23828,2023-11-07T02:21:30.790000 -CVE-2014-7562,0,0,1a5d4d30b016a31a8d4654d4bd09da311a8472aae0a1b518cd1506a008496eb0,2014-11-14T14:13:59.007000 -CVE-2014-7563,0,0,eecbfd7ca7114fa558a08e2a2fd3de6b22d2de496b52f48f2f574b9d3da7c197,2014-11-14T14:14:00.490000 -CVE-2014-7564,0,0,dd9ac120dc35198c5db77a3d7f17c249b844171a8424c0ab16363835f227bab2,2014-11-14T14:14:02.070000 -CVE-2014-7565,0,0,59a293dc6428d182e41ad7bfb73217504a5a61859ee13d8130f2df9e3f997e8e,2014-11-14T14:14:03.493000 -CVE-2014-7566,0,0,3a8789d806b3541b0e5affc0f481b83d8c770aa6f182f9aba21b764e94fe91b4,2014-11-14T14:14:04.930000 -CVE-2014-7567,0,0,27b64e407b9087fdf94327e4e745701a60d827c466662902978dc9b4da8cc1cb,2014-11-14T14:14:06.430000 -CVE-2014-7568,0,0,cc46c4692b2f71850759315c2a34c9cb3192ca129ce5c092ce171239adef85a5,2014-11-14T14:14:07.960000 -CVE-2014-7569,0,0,d735d656ad477cfd2a97c340f54a912d742dbf50f4481e058253338e3889e6cf,2014-11-14T14:14:09.430000 -CVE-2014-7570,0,0,f1593c0cb2bdd2c68bf56827c41303a2f5c9f56b94d27eb279760cb07d7b8552,2014-11-14T15:25:38.487000 -CVE-2014-7571,0,0,58e00c78cfbf6c610197e8171e435073d7d5560f6187ba2abfb0875e84b333e9,2014-11-14T14:47:01.133000 -CVE-2014-7572,0,0,fd915a255a38280fd94ad197ff99e3e7e82e2c6514fae01b4f88294da098cb1d,2014-11-14T14:14:12.290000 -CVE-2014-7573,0,0,535f83ccb29e2f3f65420621b0484c1cceba1e31417907e68101fa4b61c554bc,2014-11-14T14:14:13.837000 +CVE-2014-7562,0,1,7af25cca88954da98859bb673da63134b1df60a68a7ce23422ca5b28beaacca7,2024-11-21T02:17:24.770000 +CVE-2014-7563,0,1,e1e299ef839ff907e04167cd9a9e36838cdf26d0ac380c5ea2c5b93f766508be,2024-11-21T02:17:24.950000 +CVE-2014-7564,0,1,1675f797b48a88b0539278b1aa7bdf041298f01ecf73044edafe004625c4b9e1,2024-11-21T02:17:25.127000 +CVE-2014-7565,0,1,352b5df1b8765fe7d82985683a687e96d23b7faf54285aef497ed0d4895f1885,2024-11-21T02:17:25.310000 +CVE-2014-7566,0,1,fbfbb919378348df3a8996d457544a74999c6c24187f217508f06fbc35d0d3b5,2024-11-21T02:17:25.490000 +CVE-2014-7567,0,1,ce340933ea4727418b98a4a3d10bbeb41a5869fd0a43b1fb568bdce7cc629827,2024-11-21T02:17:25.667000 +CVE-2014-7568,0,1,8a32b16ff78ef0f12910adaad28869248b62acfb1c2cf61edd961dfeaab1e042,2024-11-21T02:17:25.847000 +CVE-2014-7569,0,1,997f572ba99abdd4b5468eeac68c9b7ac660b0aac1070f8f4f5f65833a860fcd,2024-11-21T02:17:26.033000 +CVE-2014-7570,0,1,95d68718989ffedb2ba2f2a92317ad53fdce81c2626ff5a2f712a4c2d2214bb8,2024-11-21T02:17:26.217000 +CVE-2014-7571,0,1,817ebbad556709c120e079b1c35788dcd709ef012011d0cd4682b3692a30767d,2024-11-21T02:17:26.440000 +CVE-2014-7572,0,1,80225b6c78d6389da938afdf54c2766aeb6c861d313b674816895e4df98c83ca,2024-11-21T02:17:26.650000 +CVE-2014-7573,0,1,b81e53bfb963b91b67dfd38f4ad8d2d3610730ca302c2c58d4964f27d457aee3,2024-11-21T02:17:26.850000 CVE-2014-7574,0,0,f1f123712bfc6934075aebb25dbf5086fcd946384cf6138ff4215bae991c32ba,2023-11-07T02:21:31.087000 -CVE-2014-7575,0,0,0a0b8b0d656d3de0f666d2f8dee25882d9e7f298e262091cee485b0e41b7c4a1,2014-11-14T14:14:15.430000 -CVE-2014-7576,0,0,2c65f70f2ab35ae0f8b057d6111f965e2abbf31cf2b2a03c15d8acb70a5515ea,2014-11-14T14:14:16.947000 -CVE-2014-7577,0,0,5ceb6c1d08b61dbb0a59fad31cd545c9e6cf41cc78d478353d5eab49b6055990,2014-11-14T14:14:18.433000 -CVE-2014-7578,0,0,81ae3f194ed3745f40c104e912f65a0d6b6db9cecd3ca21bd70a7993aeef47b2,2014-11-14T14:14:19.997000 +CVE-2014-7575,0,1,83872c01d7d5a9a1e548b3220d4e471c7a2d31c1e7b35b4ee4f31d67f6461afc,2024-11-21T02:17:27.067000 +CVE-2014-7576,0,1,28e2b49ffd2f3a3d41fbe11e05885bcec5efd2e983d18990ee5ef8bb2f6d21cc,2024-11-21T02:17:27.263000 +CVE-2014-7577,0,1,c41b3f5962b29ab70dcfc7c7db0dc4560b406191283695ea4fdfa050667799d7,2024-11-21T02:17:27.450000 +CVE-2014-7578,0,1,83cf9d5baab65cf9e3594d474265996cf9e41918a7c5ae30c8a32ea11542c34a,2024-11-21T02:17:27.633000 CVE-2014-7579,0,0,c8c4fb13c09a70ff22f07e45df3f23309d4ebbce25b9fd79ab787606fd3b2c08,2023-11-07T02:21:31.343000 -CVE-2014-7580,0,0,8bea9040cd426f8922fc3a212a1af4c6c38754bea75b6e4e8ccd94eb51779c0e,2014-11-14T14:14:21.463000 -CVE-2014-7581,0,0,19d29cb4cfb23b0a9ae51fa75d279773abca2e7940079c7921703c2ba90b9d61,2014-11-14T14:14:22.963000 -CVE-2014-7582,0,0,03f13e8ca77009a118789e670fb905c5031bcf0b591ebc96beeee5095708d579,2014-11-14T14:14:24.480000 +CVE-2014-7580,0,1,1c00747ffdb017d64f52222c64f6383e745da822827805b31ca580be9862d2d0,2024-11-21T02:17:27.833000 +CVE-2014-7581,0,1,cbed66c0ee3a7e2bfebddb43f48eb351f3415667722098ade3c3cc9dff4ea43f,2024-11-21T02:17:28.020000 +CVE-2014-7582,0,1,3e1e312cc21de536261543020eb4e8c7f51bfaa177cd06346add1df7f0c87b93,2024-11-21T02:17:28.207000 CVE-2014-7583,0,0,ff3c2ea586f892519ac1d76056ab3785618be9eca6d7e5e6d01dd14c875367bd,2023-11-07T02:21:31.583000 -CVE-2014-7584,0,0,493976f34dba2d3dd48a04fa47a492f16a61b940a063273f52604a3c0beffa3f,2014-11-14T14:14:26.057000 -CVE-2014-7585,0,0,470141cb3901315daa17991517ebec16e01e4306da491c377a0530dbe8699b28,2014-11-14T14:14:28.060000 +CVE-2014-7584,0,1,fb4436362aef61aae9c17b5f086b55e6444105e4a77e885a0864e72da6c19e03,2024-11-21T02:17:28.400000 +CVE-2014-7585,0,1,58074cc2b7498f28a435a8162097975327f32415ff22c40c6c35ae9eb3920c36,2024-11-21T02:17:28.587000 CVE-2014-7586,0,0,e8205cd7a815edc01fe96f68bd35f26ad15ec1798b3181bb73ddd68cd4cc1497,2023-11-07T02:21:31.810000 -CVE-2014-7587,0,0,ca85500986b99da7ad8be47704a79b4cf8f9699718481c06d630dcb25f290278,2014-11-14T14:14:30.027000 +CVE-2014-7587,0,1,9ac8da97cc8dde74bf11531a4f7af8c1dd0704b2e3f99950c040df1116fdd00b,2024-11-21T02:17:28.790000 CVE-2014-7588,0,0,b90c429c079d2380c8a21fb33360b87985e33d4fde480daf00788936e9cd6c19,2023-11-07T02:21:32.037000 -CVE-2014-7589,0,0,66bae8e47b512de43ab3abe5879834d7553dfe23d950afc17162d30da5893420,2014-11-14T14:14:31.967000 -CVE-2014-7590,0,0,e7e46c4d8662bb7ec57d77304587877b30efd0903aceb0dc8969bc1d69ef9a4c,2014-11-14T14:14:33.653000 -CVE-2014-7591,0,0,91320b7a0b1ba81b10ffc3b14e71b5374a39624662ae8b37d4afea2c414a7d82,2014-11-14T14:14:35.920000 -CVE-2014-7592,0,0,01baa937e82552c8a6f6e49ccd9e769c9384ffeb72dd35ccf14a67b82b9d9600,2014-11-14T14:14:37.420000 -CVE-2014-7593,0,0,76f2254c2a2e89869449695f4037f04fd605ca400856d9032853f64a3e04c46e,2014-11-14T14:14:38.873000 +CVE-2014-7589,0,1,3c40b30587b7c6cc44bcbac91117d401a1f1339e4fde93080109f7a70c38f611,2024-11-21T02:17:28.990000 +CVE-2014-7590,0,1,f7a5186b2952473646cff5a7a959d2a991bbb857c6b4db0bca9d39327e53d1f7,2024-11-21T02:17:29.170000 +CVE-2014-7591,0,1,0b8f1d33944d0316aeef28e3938ed5fd1a99e8f55d329fcbc1167b87b846b658,2024-11-21T02:17:29.357000 +CVE-2014-7592,0,1,47fc076240ce05c25c239a0da7a984921613927d6a8777e8eff0d4b7af5d8175,2024-11-21T02:17:29.537000 +CVE-2014-7593,0,1,c21c0fafa4f9b6052b55c330920ace6d7c0ed9d0bd5b59eea30ad9ea7239bb51,2024-11-21T02:17:29.733000 CVE-2014-7594,0,0,33360a92fab0f8ff45502ffdd4ac69901295ddb493ef5a7dd2bd4e1b7931b922,2023-11-07T02:21:32.297000 -CVE-2014-7595,0,0,5af734462adfae7bb5388ff5c2c119f9e3bab1a8ded1d27119c7b33469e78da6,2014-11-14T14:14:40.373000 -CVE-2014-7596,0,0,131ddb8468039c1610728df571ce3f35c67ed2997e3774efa4a3949899a5cdfa,2014-11-14T14:14:41.873000 -CVE-2014-7597,0,0,57d645807f9eb429f805164cfd4d6b26e962473f47ff47010d6a0a8c93faa8c2,2014-11-14T14:14:43.357000 -CVE-2014-7598,0,0,6e9394169b4bee710232d612973642841033258f8cf40b4b10c409962f4eabd4,2014-11-14T14:14:44.983000 +CVE-2014-7595,0,1,e4401d4ca98e459459c91bd7ff60fd624512c53232d08f107d141e7a53540cd2,2024-11-21T02:17:29.953000 +CVE-2014-7596,0,1,1cc99abf5cd6bf3fefbd455e41fa5acac3a6e4df68e01fae70a4c0afd1bc34e8,2024-11-21T02:17:30.143000 +CVE-2014-7597,0,1,87f83ec0d1b725ef3e712c80b8000ff89b68e095d1c0ededa825ed75f7dce150,2024-11-21T02:17:30.333000 +CVE-2014-7598,0,1,b63738d1bd32131e9f0edfafbb1d06b9cad0e27b08008c7b8c610c6b949f3cdd,2024-11-21T02:17:30.517000 CVE-2014-7599,0,0,af6e98a86b8207b4cb5f1d591e0a8571efa57c47e1fa91745b97c8cded12f610,2023-11-07T02:21:32.540000 CVE-2014-7600,0,0,9345da4a452518bdaa038e5c9be4135fba5640430ff605194bd164aba0748a3d,2023-11-07T02:21:32.743000 CVE-2014-7601,0,0,a7d0682d2acbffea1d668429d5cd1693cec5c3a3ce4185059bb737deebc604ee,2023-11-07T02:21:32.977000 -CVE-2014-7602,0,0,37d44f21f24f892d7b3ff0c6bf3ee392dddc80f2ca909bb39dcf6c5f6d12ffc2,2014-11-14T14:14:46.500000 -CVE-2014-7603,0,0,4c640a5e33afbd61e4fa310797499f656f930e42feff3adc5574411c366a0793,2014-11-14T14:14:47.983000 -CVE-2014-7604,0,0,9bb1b47f6106821652fb6b9d1d1b4e4348e69115d3895409f593987e2217690d,2014-11-14T14:14:49.467000 -CVE-2014-7605,0,0,189d2cfd04927b59f607ccc791d5db37840480d583af5a6a1581149cdfaaa0a8,2014-11-14T14:14:51.280000 -CVE-2014-7606,0,0,2efbfa490b81757ce73cc99422128a5af862d2ba7e092ec64998b57480cc904b,2014-11-14T14:14:52.970000 -CVE-2014-7607,0,0,8e86636a851407085c729688918b75e7cf1caf558a6b98e3ba1891262496ee8e,2014-11-14T14:14:54.843000 -CVE-2014-7608,0,0,06a9217115ef9c6d5ea9ede52fea8c3af0601fd3054fb354eba7be8ca671a7d5,2014-11-14T14:14:56.330000 -CVE-2014-7609,0,0,6beb0b6029697e178002f91a23ff2a3a62cf3c81b702cbb865ccfb58649ac959,2014-11-14T14:14:57.860000 -CVE-2014-7610,0,0,1e9dfed1b94ecccc82d6cdeda47eefd95772eaa1e75520353fac23df06a27eba,2014-11-14T14:14:59.377000 -CVE-2014-7611,0,0,3216f6c7fdc42bead9ce1b3a620546a8c509d381f8bf334fe025ef90cc248138,2014-11-14T14:15:00.893000 -CVE-2014-7612,0,0,54bf47f0c3444f155270569e986ddc93c6340b94c92d8ed309302f5cbf21cfd6,2014-11-14T14:15:02.267000 -CVE-2014-7613,0,0,171a63ea549c16e7251e8f70b5cbc588b0ac7fc7e9446079674e438167fe22d5,2014-11-14T14:15:03.753000 -CVE-2014-7614,0,0,09b71eee3784e1964e592c1718133f56adbf7cd366486f00176ab750f6ef6440,2014-11-14T14:15:05.267000 +CVE-2014-7602,0,1,0be703c73e437e87453c742a4112215b86d945079a7608c93606a6219587a165,2024-11-21T02:17:30.747000 +CVE-2014-7603,0,1,397bf8531fc1832d4be726c079b6303f093e29415099fc6b6b06c508023f3e28,2024-11-21T02:17:30.940000 +CVE-2014-7604,0,1,e41b98e9cfcd18e8fd60099671b720487af466984895ebbb40757973fbd5882c,2024-11-21T02:17:31.123000 +CVE-2014-7605,0,1,12d49644ce5c910cd07580ad5a522b3d2ffa1a2cbe19dfa59caa64356165b406,2024-11-21T02:17:31.313000 +CVE-2014-7606,0,1,e0879b15a10ae0c21961b7af00189672cc8d21771de32065cc53c5bee6460b12,2024-11-21T02:17:31.500000 +CVE-2014-7607,0,1,1c7031a65effd749b24092b2b86c16bd826bcf0dd430ab9b5fd622d9380fd975,2024-11-21T02:17:31.710000 +CVE-2014-7608,0,1,5c989ed22a02a3436c5141abb7784b16e826546b56c9197c2bc2c27e49e380ec,2024-11-21T02:17:31.900000 +CVE-2014-7609,0,1,1e4b3ef18af392371465bfe9183e2e4ff3ddce29ecbfaa8f5c55cfd17f4ee79e,2024-11-21T02:17:32.113000 +CVE-2014-7610,0,1,b834cb10e399564fdd595a3142cb3f482b2597854ce0e93299d5daeb8cb00838,2024-11-21T02:17:32.323000 +CVE-2014-7611,0,1,5046a418e78006c0777308a17beb76e6ea3217aa50ae138a0573eed5c27e3c73,2024-11-21T02:17:32.510000 +CVE-2014-7612,0,1,b4405ccb0e7bc8fd72698daa1363d98ad8535c0b2e5a7e5564535841d1cb0947,2024-11-21T02:17:32.703000 +CVE-2014-7613,0,1,421ff253d0cf26f8bd29806d9d661dd98878d072a6f106a75c4badeb838e783b,2024-11-21T02:17:32.910000 +CVE-2014-7614,0,1,852cd27423097d7522885db25c3b922cd7faa49878289847f15593bb934c3489,2024-11-21T02:17:33.107000 CVE-2014-7615,0,0,4abd28d342ca2e89452b2b4eceb7473217c26aa8fd6b0c0a5cc150a1164e83a0,2023-11-07T02:21:33.293000 -CVE-2014-7616,0,0,f2633c55d0157aa99892950b6d3491bfb0a95c59eff32f4a14b98834d72d7d9d,2014-11-14T14:15:06.767000 -CVE-2014-7617,0,0,07e8121e6bd14dd22f5f01a7c95ab336e6cccd39c65f96dc6a0f44094d0629bf,2014-11-14T14:15:08.190000 -CVE-2014-7618,0,0,744e7b0f4dd2110c577a6d06f008807b362a917ef3d2d02e0e56788be627f6a5,2014-11-14T14:15:09.910000 +CVE-2014-7616,0,1,400b710332e05dd344a6b29304331b1d203f470e10a5b7eebb3b890f14d530a6,2024-11-21T02:17:33.317000 +CVE-2014-7617,0,1,1f644f23f4ac69e4faed6eb36c4d6be617d0665c5eacd91d97c82737608c7820,2024-11-21T02:17:33.510000 +CVE-2014-7618,0,1,9a4ba362ebe8b62d014adbe36a1067ba20ee2acbfb499057fbf1e31fb107e85f,2024-11-21T02:17:33.710000 CVE-2014-7619,0,0,8509ae1654801f011b101807460e05b6da57bf9285d25c31b86fdb945af31397,2023-11-07T02:21:33.607000 -CVE-2014-7620,0,0,4f61c6f79bc1dee06e1b665ca993c3a07452af2c89cdebc9994db41c94b7b43f,2014-11-14T14:15:12.613000 -CVE-2014-7621,0,0,2474d0d0c2ba85c075665580f22e15656e633601d3c4e1f58197a30c71476bfc,2014-11-14T14:15:14.113000 -CVE-2014-7622,0,0,6ac9c89df399e31110b053e3641f615b53baeedbcc51a6a134d307bb4b0c5d80,2014-11-14T14:15:15.647000 +CVE-2014-7620,0,1,f38785cdea36f97225253d3aa2f4332a70724aaf55f99602a007cb55a608b77f,2024-11-21T02:17:33.913000 +CVE-2014-7621,0,1,87ce0963f2ca1e3e4fe52337e48f2ad7281fc15a37da1b4a779e388ee7ad6663,2024-11-21T02:17:34.100000 +CVE-2014-7622,0,1,30cf4da71b72f663a1ac1d306465a2b7f46e2659ddab013baa5d0491a99c64ae,2024-11-21T02:17:34.290000 CVE-2014-7623,0,0,95e19a507ce502ee1b737b3b9233f8254434cb8186a76d2719bb9d0f02bda507,2023-11-07T02:21:34.030000 -CVE-2014-7624,0,0,e999bd0fff9897d7c159eaf0e776fcc43a6a6885b77081fa42ca0ee64e6c0c36,2014-11-14T14:15:17.113000 +CVE-2014-7624,0,1,7b5a3791934f07c6cb7472a01623dc272c13ebdb22bae247d82a46514e4c7bbb,2024-11-21T02:17:34.510000 CVE-2014-7625,0,0,ff6a362982f2fa3679a6574f23e8e0651b7b49602b68bc1900324a45a48a571b,2023-11-07T02:21:34.250000 -CVE-2014-7626,0,0,e84a65b4a870ba3f5f513f83167f56667c4ec2fb8324780c320855ff9d2d73a9,2014-11-14T14:15:18.613000 +CVE-2014-7626,0,1,9bf83b46e16f8e518eefb1e7813e7e60c991ab9d292dcbd1ebae0ad9803c98f4,2024-11-21T02:17:34.730000 CVE-2014-7627,0,0,fb30f754fbef1cc6da3d5c004a97b5e793637fb0b66f6836a82d1ec9eb5bf682,2023-11-07T02:21:34.480000 -CVE-2014-7628,0,0,4c5b6d25b6e41fadc6ec81f4a18b438b0b2fb3f4b1f883ed6c62fd080c2f3540,2014-11-14T14:15:50.433000 -CVE-2014-7629,0,0,6caaccd1b672a47eb60b42473eaa4e7771657c52dd4af193ec91c021b4a6c07e,2014-11-14T14:15:51.963000 -CVE-2014-7630,0,0,b9437e53d041b8d5cc0841ce59420ae24a2a530a0a99a31f6e2f11cf477abbbe,2014-11-14T14:15:53.447000 -CVE-2014-7631,0,0,e609d5b422eb54bd71876515036641fadecceacc359a0f82ef121c0d215a5d05,2014-11-14T14:15:54.853000 -CVE-2014-7632,0,0,d644f71157d071f5d396b4e70ee35531902d51061de37cb5108306375ab50a8f,2014-11-14T15:19:59.180000 -CVE-2014-7633,0,0,37b95de472cfdbbec6e8abd4d97ba6a59c2939f13cb2bd8f7dc89aba73ca8688,2014-11-14T14:15:57.840000 -CVE-2014-7634,0,0,cd5697dd0253b6b87bc115e4209aaa1bbc331a561fa68f671441e411e9921088,2014-11-14T14:15:59.307000 +CVE-2014-7628,0,1,a6bcf7c239187ac34b25231f03336c567d6565ba5abf6f6cfcb9283b7b415731,2024-11-21T02:17:34.953000 +CVE-2014-7629,0,1,28147be8275f23ad1278bc804b0fdf27470b6ebec0f8628aaf7741e3fc8ec1ce,2024-11-21T02:17:35.137000 +CVE-2014-7630,0,1,e24d6aeaa0683b8a4f5c28f107a3cbbe8e393b5d79df41ebf9e2a1681a3e05a9,2024-11-21T02:17:35.327000 +CVE-2014-7631,0,1,b39afc1e9e13166f46b1c74f09097d0471141eac3b959cee462a56541ce5a629,2024-11-21T02:17:35.513000 +CVE-2014-7632,0,1,ed66a43cc3287d708bd5077cb5cc30c0a76a082e546cde906d468f0727e35ca9,2024-11-21T02:17:35.703000 +CVE-2014-7633,0,1,34060a8da4e3951d172a0ec6777cd71374f561cfd87bd3e7bd660d8f3aecf04f,2024-11-21T02:17:35.910000 +CVE-2014-7634,0,1,ed0f00d76df566ea99c9cb5b8356380d3041dff58b19cd1315ea24a3301fe341,2024-11-21T02:17:36.093000 CVE-2014-7635,0,0,a98fa06fa6d8c0d4f1c3e3ce348abb0ff0f5c7e35b4869f87ca2b80bb1463e1d,2023-11-07T02:21:34.763000 -CVE-2014-7636,0,0,4cd69cb291aa8095d9ccb3c5276c31729177870d0f9bf5df3b25ad6056f0e254,2014-11-14T14:16:00.887000 +CVE-2014-7636,0,1,e0847c6ea214af3232c47e3c9c84401cb8344bf72dc7c75013cf0994b389fa54,2024-11-21T02:17:36.297000 CVE-2014-7637,0,0,53a9ba82049afcbc1e0fe74135e820ae4dbd0ff17585187cdc8a1314129bb091,2023-11-07T02:21:34.980000 -CVE-2014-7638,0,0,85050286b1424c58d045ab9c1e90f66a84f681071744bf7dc2d43571194c7be0,2014-11-14T14:16:02.497000 +CVE-2014-7638,0,1,12f82f2aa57dc081c2158a592c2e1c78c78c043a40a0fb685561b2ddc26483ad,2024-11-21T02:17:36.503000 CVE-2014-7639,0,0,62b16e3e205773a8ca0c285b84bbd39761c354fcfa5d808ad50ff2e45b297234,2023-11-07T02:21:35.210000 -CVE-2014-7640,0,0,031fe25c3b296ffcb496391cfef1972f350765bfbdf6421cd10177a9608ad060,2014-11-14T14:16:04.183000 +CVE-2014-7640,0,1,732c2dffd2628c1fa4e8063725bf5d69347a0af0e15bc94ff54ea931288e4ea8,2024-11-21T02:17:36.750000 CVE-2014-7641,0,0,8680d453dafd0553d89735538796c615e8132bbcae706868f3f6b33b46e142c9,2023-11-07T02:21:35.447000 -CVE-2014-7642,0,0,7759904adf0a9277f6b88b89cecfda2da749c81461f5e1708e82b433abb7a9ce,2014-11-14T14:16:05.827000 -CVE-2014-7643,0,0,9edac98ca62edae5313688377c6dc1403c5adb9decf933ca7f20a1d337613710,2014-11-14T14:16:07.263000 -CVE-2014-7644,0,0,d3b3dbb616eacc769d1cd41b546b4ce0c521239bb35450bdc3cec5736b37cfaf,2014-11-14T14:16:08.777000 +CVE-2014-7642,0,1,887f9cf8609f471bf590e02c1a8069e32e561a963e41acd42c06af75b965c3a8,2024-11-21T02:17:36.947000 +CVE-2014-7643,0,1,18043191c5451f00787da79956bb579230f2c5b7975ed966d132c7f20e10c7a3,2024-11-21T02:17:37.147000 +CVE-2014-7644,0,1,a04c640833f8c9c41c66172b7cb81ceabbe8905737bd64b330bdd957e2a4513c,2024-11-21T02:17:37.337000 CVE-2014-7645,0,0,53d28d80f59ceb36699168a20ad27a6f37528867ad910fcdc1f7947d549489f7,2023-11-07T02:21:35.703000 -CVE-2014-7646,0,0,d2c70051bbe1a42306711928ef3da1eba4f967dbc62e2affdb12d403e863fed7,2014-11-14T14:16:10.327000 -CVE-2014-7647,0,0,9b024dbf56bd18891c148eb7fd09e6442f8ce0b874eeaacb1d75655cadc33ec8,2014-11-14T14:16:11.827000 -CVE-2014-7648,0,0,eccd206f389165b5a8f944f4520fa4b0b28730593252cdee10c2bea9c79904fd,2014-11-14T14:16:13.327000 -CVE-2014-7649,0,0,63511aa35085b2b9f1c78ecc509e7d4fb25dc3d7290323c7bfcd4427418acdb4,2014-11-14T14:16:14.827000 -CVE-2014-7650,0,0,3fba6c910a3c8b5b361c7e219fc7a8f1db5f79ca6e04afeef8a475f35af2f2a5,2014-11-14T14:16:16.373000 +CVE-2014-7646,0,1,0962992a9eac44d615c4d12cdb9c5600f08e19fe3883d82101fcdc3ecf1a270c,2024-11-21T02:17:37.540000 +CVE-2014-7647,0,1,5fb104d62b9c939f01a02b72d0d979b287ed2f6f0a3300c086dc30f7acbb0a58,2024-11-21T02:17:37.723000 +CVE-2014-7648,0,1,02e995b745cc697ee8a3a381b9b22b08d4456627fb5d583aa7bcc8a4f6717eaa,2024-11-21T02:17:37.923000 +CVE-2014-7649,0,1,b30c4b23de3941cb071962384f7af588b19908301fd2fde3999cebc5c8ae852f,2024-11-21T02:17:38.110000 +CVE-2014-7650,0,1,45a83ccdd219f0fa452a870c2b3e9f6a6a8669d27d63868de3bf37a4d1f48be7,2024-11-21T02:17:38.297000 CVE-2014-7651,0,0,b087d78d03f4ada5406994959bd723aa60634393066d3c98a097e558231e4f6e,2023-11-07T02:21:35.943000 -CVE-2014-7652,0,0,1ee07984f700c56d231c403471e3a561e88c5faa34a5a2d0db8616ad0f89590b,2014-11-14T14:16:17.890000 +CVE-2014-7652,0,1,a7b2c209f75fc1b3ce3af64a8234ddf98958a09e4f0a78a82d28f6cf63038610,2024-11-21T02:17:38.493000 CVE-2014-7653,0,0,6bf35059c35cf6a8a5407d35a08ebb44be6f335509a09d56de3d2dbe9f961a48,2023-11-07T02:21:36.167000 CVE-2014-7654,0,0,9f65746d3e3e57fc0a0cb4ed4d0a622ce97b65457bb4f5b2913d05f4f7f010fb,2023-11-07T02:21:36.407000 -CVE-2014-7655,0,0,575f7b9cf0852590832cce395a4ab61af7c00476d0381ea2927adf58e107ea79,2014-11-14T14:16:19.357000 -CVE-2014-7656,0,0,5546c840603725cfe275e99c319a2caafb5a8fad3b7828dc6b5fb39fafcc845e,2014-11-14T14:16:20.953000 +CVE-2014-7655,0,1,839298b8925c738d5462d345d2ad66b5736c50b7ad4bfc4f01bdef0f0f21ffd4,2024-11-21T02:17:38.717000 +CVE-2014-7656,0,1,289397329c2f62246d92bf4476bc56db1f660d782b213947f90babc5eb0abe9e,2024-11-21T02:17:38.897000 CVE-2014-7657,0,0,68d3703a99d070a030dfc1b66d9283e9b5feabec5c841d58539d82528f55385e,2023-11-07T02:21:36.677000 CVE-2014-7658,0,0,27c06d39460d6c1afe0a003b6b39e9b6ded3e4b934c62fc1097b5678f7cd74f0,2023-11-07T02:21:36.890000 -CVE-2014-7659,0,0,575ef114fa443f6291501ff8c7455dcf8ea89be51439328dcd368eb2db5bd682,2014-11-14T14:16:22.453000 -CVE-2014-7660,0,0,30669ef20fde6ee26f0ef92f1b7a0365473214c3dc37771d8b674880fcc08658,2014-11-14T14:16:23.890000 -CVE-2014-7661,0,0,744a596bf204cc4d4c9ef9ac53bb386dba3e2cdbe6865a5637fc62cd5764cd5a,2014-11-14T14:16:25.360000 +CVE-2014-7659,0,1,b6e55d824e3fa55237f48e60848550ef74b96d90d7fcd45fd8744c4c938d095c,2024-11-21T02:17:39.113000 +CVE-2014-7660,0,1,a093b788f3a4b3c872d62a80998999d6dbd28dc23b2d10d6959b40a59fea12d6,2024-11-21T02:17:39.303000 +CVE-2014-7661,0,1,d4dbf2e1246e3ae33c711222be2384bf43fbea00c1e95102163daa1c7afcb839,2024-11-21T02:17:39.493000 CVE-2014-7662,0,0,0c9fddc83a93a9efb842166f2eaec502ff5bffaad68f8510cdcc2eac7b071a28,2023-11-07T02:21:37.143000 -CVE-2014-7663,0,0,1d5a368b0c796214619cfec8b83276ba59dddbefab07cb3aeaf61a7cc79b94d3,2014-11-14T14:16:26.843000 -CVE-2014-7664,0,0,7a2f3390580cfa1a0d94da311637b5bcb816cee26f8e352ad83db4b5f6407120,2014-11-14T15:28:15.467000 +CVE-2014-7663,0,1,467ce12a2d6cde0380670db2b3f9841f349b3b11f2b5c8ce0fdc7f07979e1b36,2024-11-21T02:17:39.697000 +CVE-2014-7664,0,1,2d74bc164979f6c658596f3c744d7136e604fab3a13e35917085f31d24056397,2024-11-21T02:17:39.880000 CVE-2014-7665,0,0,260ec445bfc267afdb46b4d493b742aab395fb08c2fa9865ed18f524b59f15b7,2023-11-07T02:21:37.370000 -CVE-2014-7666,0,0,170ea0242c9cc60d7afe78f3aa2fa90ea282829e0a845c035bde472a9115a5c1,2014-11-14T14:16:29.767000 -CVE-2014-7667,0,0,f53b5e8e98bbea5fd93eb8402d8df433c5762c4145f8f6a4fb877f2877ab05f2,2014-11-14T14:16:31.297000 -CVE-2014-7668,0,0,838b32c36b4757175c9d6698f09df2ca9eea3161688a3682e5526b6b589649d0,2014-11-14T14:16:32.813000 +CVE-2014-7666,0,1,85ecd8d5504b4bdc2f8d92406ed10ad63c26f2cbcc977e732fbd21dc6ddeb86e,2024-11-21T02:17:40.093000 +CVE-2014-7667,0,1,e1503edeb063aa1c8bcdc7c858600c42f9b75e25ce8ace81b9bb44242941bbe5,2024-11-21T02:17:40.273000 +CVE-2014-7668,0,1,c46b162541e6343783bb2e2b459cd6f6665c1df5c8da264ee87107ab35314c07,2024-11-21T02:17:40.463000 CVE-2014-7669,0,0,331172e50daaef0bb8ee98194e0c8d57e06e65351f714e7272f40a5f797494cf,2023-11-07T02:21:37.603000 -CVE-2014-7670,0,0,6318f58c49d276165b70a7d068c2e958118f53550d483e2e3349c4d4c1b2cf39,2014-11-14T14:47:50.877000 -CVE-2014-7671,0,0,65efc329ee3ad8d465468a9326ac25c1cb73369867db2e3e56c7a93da8fdd5b3,2014-11-14T14:16:34.297000 +CVE-2014-7670,0,1,4d15889d8b4c3712d886f207dfef58eb245816d05c754dac4dbe0301e21e20cd,2024-11-21T02:17:40.670000 +CVE-2014-7671,0,1,613074e4d2f80372b786be9d7d11494bd7d305b6241a4119c76783bba8ba5845,2024-11-21T02:17:40.883000 CVE-2014-7672,0,0,9a35eca4fcee63f68a882ca65ac336ae812a4043f1c991a0ad263e441f0f6245,2023-11-07T02:21:37.833000 CVE-2014-7673,0,0,645036a7b27918dcd0a5cf2199a62e0ea538822b26020a78cc3837a8ff5c2bf1,2023-11-07T02:21:38.063000 -CVE-2014-7674,0,0,4f16562db6b31d64a2f8d25645ee6a290233b5c2319861c820f534f6835fc78c,2014-11-14T14:16:35.893000 +CVE-2014-7674,0,1,9b6ea61add4f2892a7df12005a0c3f3eadaa981d294bacd07217504431741415,2024-11-21T02:17:41.107000 CVE-2014-7675,0,0,e4aa37df570dccb8a2d6d0309c187f51df1e5cb3f69a811ef287efb52a47ae3b,2023-11-07T02:21:38.317000 -CVE-2014-7676,0,0,63f6245195821e14e19eae2fcaec8698a89ad4e5cab383e06729809b11cf0b06,2014-11-14T14:16:37.440000 -CVE-2014-7677,0,0,c3b44a2bcd0c2c199f91c245564fa7b98defcff2ae2cc3ac01d5cb52eb1d38b1,2014-11-14T14:16:38.940000 +CVE-2014-7676,0,1,3140aa2e2aade3d5917d64e00fa69ed3638873095c6fa8e683b17a5c63776942,2024-11-21T02:17:41.327000 +CVE-2014-7677,0,1,9eadf4e387d92af25b711515aac52af4caaace9d649a3d804c2dfddd7979b3d3,2024-11-21T02:17:41.523000 CVE-2014-7678,0,0,dbc0993bef21e0273f5ceab0c594fb14d394a4e13e55149347fccac6bc415e10,2023-11-07T02:21:38.567000 CVE-2014-7679,0,0,711d862559f5253365245ce12fb93e0f44ecb1feffcd5d788f0f41cfad94a225,2023-11-07T02:21:38.777000 CVE-2014-7680,0,0,0b7c6ece74a393b32bffceaf0c10fb78cf270a2398d1d718046bdbfb08f5a8a8,2023-11-07T02:21:39.010000 -CVE-2014-7681,0,0,1da03eb3f71ca47dd5892c9ae5a9bf687aece194df2a73b70a92aaa2d9dc753a,2014-11-14T14:16:40.410000 -CVE-2014-7682,0,0,d0014562281d2c3ed64187b64f49d1b9a6a84c4c3f9fbc8ff4a63d07a5a5d2bd,2014-11-14T14:16:44.927000 -CVE-2014-7683,0,0,27cc7a57873c575079c2f94209d0b44d713e3a375d72aba66fa93033d6e6cb2b,2014-11-14T14:16:46.457000 +CVE-2014-7681,0,1,f5ff1cef82c5b4f318851a52e1791618e7f135ecebf5bfda074274a889971d24,2024-11-21T02:17:41.763000 +CVE-2014-7682,0,1,af8335caaebf8c2cd75882e229d7552e9991e166f3736d92744918c493e9e327,2024-11-21T02:17:41.950000 +CVE-2014-7683,0,1,9c58d6c8b1929a5bf779d95dd122ca3e7b1b59112ba9b8ae8c286db907114cfa,2024-11-21T02:17:42.137000 CVE-2014-7684,0,0,2b334df5f933610a671d70a8dc2c86b067f488bca9c7f2c8b1fd75d4817978d2,2023-11-07T02:21:39.270000 -CVE-2014-7685,0,0,be0721c414ce669621bd6b107926bf443c505ddaa368c280b16fab1786cb0708,2014-11-14T14:16:47.940000 -CVE-2014-7686,0,0,44e43cde009b6f92f9eaf0342bed3999967d077b8c8ba282f84ed77199cd5c0e,2014-11-14T14:16:49.457000 +CVE-2014-7685,0,1,4a4e4bed051d442b640e0095801f121b31221b2c7918718640aff4bdf708ff35,2024-11-21T02:17:42.333000 +CVE-2014-7686,0,1,3467d6fd3cb9bf3c1a720476a6afb59f2d63af4e02f31e3075a8af596ad19949,2024-11-21T02:17:42.513000 CVE-2014-7687,0,0,1a41dffafbbfc13fc1a1eec82724d8a097de48191e5948238f548f7fb24f88a9,2023-11-07T02:21:39.497000 -CVE-2014-7688,0,0,5df459d340e9cb7ab4cc594c13d9aa71d54770a062dd6fcc4cb21c2d9db1bc86,2014-11-14T14:16:50.990000 -CVE-2014-7689,0,0,9220ba51b51713788ee3967ada80a660f053f735964c8e7c21e4e3b011059629,2014-11-14T14:16:52.520000 -CVE-2014-7690,0,0,a9aaa2af5c8161224fba19c46ca29fda5a8474a1733523f5f53cbcdaa24c4797,2014-11-14T14:16:53.973000 -CVE-2014-7691,0,0,bde34fd79feb31a18960745774eb2be8dc51c44c02ff1a5bf04bcb43c534ee1b,2014-11-14T14:16:55.490000 -CVE-2014-7692,0,0,31d7bb93fff1f9c36b25e07bff9bfb63d3bbc4b40c27abcc04952d7f44626da2,2014-11-14T14:16:57.443000 -CVE-2014-7693,0,0,35257fa1d4f2ba3254bfa275f29c2074b46ac23075250cd56b8ada1da6d5bab4,2014-11-14T14:16:58.833000 -CVE-2014-7694,0,0,49060db8bb2dec1e5a2117fc2b4ef0ae60f73db87e99a51117cd694671c08d33,2014-11-14T14:17:00.367000 -CVE-2014-7695,0,0,cb233ce37cb1dddcae7f3a7064d3144bf96ca95eb4f0152a10e4ff0f341cae64,2014-11-14T14:17:01.880000 -CVE-2014-7696,0,0,e8b6567aad84859a7a586d1fc13c7bb2fd99c8f62e8cbbfe09333c060b90a661,2014-11-14T14:17:03.397000 -CVE-2014-7697,0,0,932d0bd3bbb6be29b2e95adade26b0e21aa194e5fa6a88d8a1b9648dfa8d6ed7,2014-11-14T14:17:04.977000 -CVE-2014-7698,0,0,202ce9b9d191aa3c564c839f2c2799cecb4bbcadbb403e8d333a257808f4746d,2014-11-14T14:17:06.443000 +CVE-2014-7688,0,1,ef2b0c123498ff38da8cd54d0c5cbc56f02a0aec19bfe1cbb37ebb6216279e63,2024-11-21T02:17:42.713000 +CVE-2014-7689,0,1,25d2df17c20eed33d8515d3fb60b31c8196530b61d6876f43227cdb5fc56ca0f,2024-11-21T02:17:42.900000 +CVE-2014-7690,0,1,1a054dbb68232ba17bfa47bea7a85a4262e4c08a1a095bfd631c74df48ec59d6,2024-11-21T02:17:43.083000 +CVE-2014-7691,0,1,f46b753b37e7487b000c23e6d07827700f1cf9a9b4e9f11cf62218ce7069aa31,2024-11-21T02:17:43.273000 +CVE-2014-7692,0,1,4309617aa865daea6a76e9b2cb7807e981ac84f33105a32a8537b273920622f7,2024-11-21T02:17:43.457000 +CVE-2014-7693,0,1,4379423832478187be313ee9d8934684fb9601a646f372afc6127e3f64351649,2024-11-21T02:17:43.643000 +CVE-2014-7694,0,1,7d9c3a50154f6cc9bbeef168cd8b57c0d18ef1f54fa86bc26018769127c98c99,2024-11-21T02:17:43.827000 +CVE-2014-7695,0,1,43e143ea77aeccc39e4ea082e71a3c9ee41f74eeb022118265cd938f983326bc,2024-11-21T02:17:44.007000 +CVE-2014-7696,0,1,18a0344495373051f6fc94f09f220045ca37ca5b35a0082ec386ef1f10183a53,2024-11-21T02:17:44.190000 +CVE-2014-7697,0,1,63cc194ada322c06039f69aa5d5a71ff15ea41fe6a5866bdb71dea3e4f85aca2,2024-11-21T02:17:44.370000 +CVE-2014-7698,0,1,aa982c5db6075ee85b0fb2dd444845a47fd8de913bb077f7adfb00a1a2b07d0d,2024-11-21T02:17:44.550000 CVE-2014-7699,0,0,b679414a22e90b3cd3877c366d42e42cb569f4d67aa9db290649f0bbea310922,2023-11-07T02:21:39.880000 -CVE-2014-7700,0,0,768594e2baed68d191b693fc5b3f28992dac6d096b4b8e692c9c88fb79216666,2014-11-14T14:17:07.943000 -CVE-2014-7701,0,0,95f3fd7950787ef7d4795d40b56aa62d0912bff4b3e1d746db3a00554b21a6f1,2014-11-14T14:17:09.447000 -CVE-2014-7702,0,0,fd1c408ab6c8b01c8e7e08f51ecc52ff91925ac5223b6b9caac3a6d058168a92,2014-11-14T14:17:11.053000 -CVE-2014-7703,0,0,1783c5c33bdde6bc76d2b5ff7face0514bedaf1adb706070dbfd7841ca1ef930,2014-11-14T14:17:12.883000 +CVE-2014-7700,0,1,f5ba23ef67db66c316dfb887848309f5f594e3d237fbda8191d89bf08d00e756,2024-11-21T02:17:44.753000 +CVE-2014-7701,0,1,6498ddee0ff85897051fee924e95235e80565aaa6bd3cc8cdadb356a51faa871,2024-11-21T02:17:44.950000 +CVE-2014-7702,0,1,ba16cbd61ee9a6a6cc5a40a9e267285c5db69633ea7f47f6fe41e5b5a208ff3e,2024-11-21T02:17:45.133000 +CVE-2014-7703,0,1,0f06e8b00c79687c9ec34c8420bcd8a2d507f45e296594db09485987b9119f68,2024-11-21T02:17:45.327000 CVE-2014-7704,0,0,b6b4b9973ec2075601c6a973739954dd99d321600cc488af8a7a68a58782287f,2023-11-07T02:21:40.127000 -CVE-2014-7705,0,0,91b681525a8e0861f4a19eae8c6321005b0f49abd202d76fa4d633ff84540f49,2014-11-14T14:17:14.413000 +CVE-2014-7705,0,1,d8353b709233cefdac58f0ec6090b86e12dc524ab5d71376e6f25eb760b5521f,2024-11-21T02:17:45.530000 CVE-2014-7706,0,0,947f3e203e5716640ece6d64b74f60ba3d96c9aaf65e81bf4a99886353fda72e,2023-11-07T02:21:40.350000 -CVE-2014-7707,0,0,a1dadfab8b586e07bfa92dd3c357b3b41fee649d5d77934777ae70a4e89196a9,2014-11-14T14:17:15.900000 -CVE-2014-7708,0,0,edf56ebc2d030edaa3ab6aab77cbd2e67b7106f56dfbbdf6e9c11217804c4e7b,2014-11-14T14:17:17.400000 +CVE-2014-7707,0,1,98668a9205d7c1a8fcf76fecf607cc550a45e36ae4170b173064a866341d4aea,2024-11-21T02:17:45.727000 +CVE-2014-7708,0,1,aaa6c67771ede622e7e91930936114e982850f990f68d47bf2d49bd99131cbb6,2024-11-21T02:17:45.910000 CVE-2014-7709,0,0,727736fa0a5b4696ab8e6bc1ff142ea47a11d1d687ee218a4ea7a2d201709fa0,2023-11-07T02:21:40.603000 -CVE-2014-7710,0,0,fdb69e9e094012af835ab6e27c0bb27aed7b3609505a34b11bd9e90c900c7986,2014-11-14T14:17:18.900000 +CVE-2014-7710,0,1,a882215c07ffdb75beb9ff8544003a7a1e0a3b9fe92a026564822f366c78490f,2024-11-21T02:17:46.110000 CVE-2014-7711,0,0,286a424363141e1a4813e0381e93e01f9de6284e64fb7f43a7e6859f7f4bbb8f,2023-11-07T02:21:40.830000 -CVE-2014-7712,0,0,73aedd18e616073202db2f273b99ca2f8ef829d07a67f969442c302467aaf1aa,2014-11-14T14:17:20.417000 -CVE-2014-7713,0,0,cf72f1f240be15cfb820b12c8cb91fb7da0a2e3289c27483b61cbd0823c924a3,2014-11-14T14:17:21.900000 -CVE-2014-7714,0,0,d3e50746070e69015364075592bd1cf666a4c95652f6a0018f17e56736d4a1de,2014-11-14T14:17:23.400000 -CVE-2014-7715,0,0,6cdd1f29230e8883970944a9d08b466ba47161026385a4f4051cd4d506758cdf,2014-11-14T14:17:24.933000 -CVE-2014-7716,0,0,f4e0909a35caba0ff3ffd5be335fb6e6d5fabc471c15b674f3a2eb02ceb74820,2014-11-14T14:17:26.370000 -CVE-2014-7717,0,0,3bcf18a64c6c2d8a1c4e3dc53b0b0d9a0d56f9593e14805a14b9f2488d9864fb,2014-11-14T14:17:27.887000 -CVE-2014-7718,0,0,fd8840de506ed318d63f0b82c8ab71b15e18bf5025420f549c5936db39dd232f,2014-11-14T14:48:54.107000 -CVE-2014-7719,0,0,c0bfe618ab801d6433fe2cb4036dea67e6bf9a291c48ed34aae2ef0d87cfb7d0,2014-11-14T14:17:29.370000 -CVE-2014-7720,0,0,6af1ac11b4985af34cffcb2d4f1fdf7f33b54b4abe2f33245fdbfd1829a002f4,2014-11-14T14:17:30.857000 -CVE-2014-7721,0,0,7087992597276eb914be895b0230c6cc5f212d53a4df1bca34a1ff41ec426e3a,2014-11-14T14:17:32.387000 -CVE-2014-7722,0,0,1e26940247468ecc967d2efe9c63106469dffec6648afcea7a7e2f854e0792e3,2014-11-14T14:17:33.857000 -CVE-2014-7723,0,0,dfbb345d01e56fa20c2fbe19b9af1b65e08c99569418339ba7e3ffa74ae2ab3f,2014-11-14T14:17:35.387000 -CVE-2014-7724,0,0,b60b37410e13056eacc8db5dda1e4536bf033573e9a1216f953bf433ed80d9df,2014-11-14T14:17:36.857000 -CVE-2014-7725,0,0,64f0ebd04d83297c4f0740bd9245f93c7344ded3df40fb9bc4a1a618de33466e,2014-11-14T14:17:38.357000 -CVE-2014-7726,0,0,ab87b16a293638fd6583f64fc9e82948f4c29f08c345bfc646a8f0617829e386,2014-11-14T14:17:39.887000 -CVE-2014-7727,0,0,450e33d51eac447547287fa53ef9a23164d3478c8ed9e60236266f5817fd3edc,2014-11-14T14:17:41.387000 -CVE-2014-7728,0,0,3ec2a4a600feadfda41d553df75927cff4aea188551513941fb317c429ce27b8,2014-11-14T14:17:42.887000 +CVE-2014-7712,0,1,b595a2e9c3c84126fade4d017b4ffe2723f56f68a4ea5031754213eeaf6c1e26,2024-11-21T02:17:46.317000 +CVE-2014-7713,0,1,c1bfad1050e513dc84e592bdff7dea641dc3b34c6cc2294f8828a70129f2a095,2024-11-21T02:17:46.503000 +CVE-2014-7714,0,1,0615370227c34041179e2bb7a9afbc025a77d781b9eebf61b27c40d68e7ebd67,2024-11-21T02:17:46.703000 +CVE-2014-7715,0,1,172b2803b7b3f9e4e436ce74174f6139b58c2aa0819c4df9bbfedd3453564678,2024-11-21T02:17:46.897000 +CVE-2014-7716,0,1,59943de147824a65c2adfde0068a52bde7861c165f08f0e8092762dade03793c,2024-11-21T02:17:47.097000 +CVE-2014-7717,0,1,3f8d465ece944aa39257eba9160ea5a9e2678743c0c42119849de15069ec6a26,2024-11-21T02:17:47.287000 +CVE-2014-7718,0,1,ae66d57b7f85acdb08e4ca11b7c7d6302f828475c3a00340fbf7d93eb7ee2a51,2024-11-21T02:17:47.470000 +CVE-2014-7719,0,1,ead35aa37d85826a4b1040eb029397f7283461cbaadc3fe5042e3db2424e8cfb,2024-11-21T02:17:47.690000 +CVE-2014-7720,0,1,49dcd6d96c41f11f2b36c28b7478c7f373e4fdaef18ca840d588bd90594ae66c,2024-11-21T02:17:47.877000 +CVE-2014-7721,0,1,b6d943c2772aabd5d410d7ec5bb995536151bd101390fd57f672ed18912a2400,2024-11-21T02:17:48.053000 +CVE-2014-7722,0,1,5a753582df17f5649ff6885bf291e1ba19972c2758124de627f5d366dce5cc5d,2024-11-21T02:17:48.243000 +CVE-2014-7723,0,1,3303a950226d2ee6f8b83b2f767c6d8635e6ce518f289b102087b1c074ce03a5,2024-11-21T02:17:48.437000 +CVE-2014-7724,0,1,47563cd776a8438215c88a3b48aaf8f7af875e99970faa88ca7d8ffd48bbf25f,2024-11-21T02:17:48.630000 +CVE-2014-7725,0,1,29622103ced7e9b042c7a55cb7f60b7ff0f4b5febd899d60a4c42ad8555bd984,2024-11-21T02:17:48.897000 +CVE-2014-7726,0,1,e4ea143f66d5178daa1a76bab9310a91614e1db968525c71287cb27ae837dead,2024-11-21T02:17:49.077000 +CVE-2014-7727,0,1,7d23996a064d56f05c3269ac2e7013cbc15d2940b8f3437dc5814187387bba42,2024-11-21T02:17:49.267000 +CVE-2014-7728,0,1,bf831c303f8d2433129a519a9776c8812d4383e3d3865e48d4192d072238e063,2024-11-21T02:17:49.457000 CVE-2014-7729,0,0,87b8429215a665f9256901e68cf8196e6f00bdb2d5073e0bac750579cd899e86,2023-11-07T02:21:41.170000 CVE-2014-7730,0,0,110427e79fca32aefd9bc17e17d8dd3fd208daf1ce8b2dac29951c2d3f3da31f,2023-11-07T02:21:41.390000 -CVE-2014-7731,0,0,7c322a70ee831155d7ba96208d3d170dc3b5bd9a26bc8e340f3f0182bf444c5f,2015-02-11T16:54:10.500000 +CVE-2014-7731,0,1,65b28d47dc1efaa35ea34631bca305d10ef5c75443dc4657128f9995532aca7f,2024-11-21T02:17:49.673000 CVE-2014-7732,0,0,829f9697d7a15b515189fcacbe434ba1f5bcba8deba8f79494cd9936bbc43ac7,2023-11-07T02:21:41.640000 -CVE-2014-7733,0,0,817286b9e172d4ece3a74c5fdcc40f854425b2668d60d16b7645626426537309,2014-11-14T14:17:45.937000 -CVE-2014-7734,0,0,6783f3ec73096cc7619977eb407543f3764839000ffb6d3d9b6c91747fe5dcac,2014-11-14T14:17:47.390000 -CVE-2014-7735,0,0,d366e9822a481741c284a94c31cea15ee575ecf8654dbb1c04d73ebe7cd27055,2014-11-14T14:17:48.920000 +CVE-2014-7733,0,1,c0e7579272513418371136d1d217f64bf59c4d82c2ba1bc87773faa14c3b865a,2024-11-21T02:17:49.880000 +CVE-2014-7734,0,1,2652fc455d9af320f753cdb552db08037eb1ad4c0faf1d56920b4af17ab554bc,2024-11-21T02:17:50.060000 +CVE-2014-7735,0,1,e3d412bd761808bf0125bc171327ab02538e2fff1386d444ec1994d5b98ae475,2024-11-21T02:17:50.247000 CVE-2014-7736,0,0,d1d99c521d54c38e3a82391d0d8f906021a71bfbcaf8ece2ad53e44397bc4cec,2023-11-07T02:21:41.880000 -CVE-2014-7737,0,0,288344b6cb706014a715079000ed21ecff85178b5833fbc3bf413ebac047730a,2014-11-14T14:49:51.880000 +CVE-2014-7737,0,1,65975543b54c2dba9a7fb2826b206646ddbd655ffafed00ba36721da4ef461f8,2024-11-21T02:17:50.443000 CVE-2014-7738,0,0,e461fa6b43316c0c780c0cb836e70f562941fd1d2567c218ec0774b904775e06,2023-11-07T02:21:42.097000 -CVE-2014-7739,0,0,317e7bf712cd8a4600ddb1f1a5caaafa56e5d57bb978eb1acbd32dad694c43c0,2014-11-14T14:17:50.607000 -CVE-2014-7740,0,0,8f06cb38033ff91efc601f3f6206e0c1856fb01e6f06406b8c77553d2c86efd5,2014-11-14T14:17:52.060000 -CVE-2014-7741,0,0,b167334930b29649bb5f593763cc779b5dc0ddcc1d79575f5305dfda3b30c650,2014-11-14T14:17:53.623000 -CVE-2014-7742,0,0,84420ea844ee3634dc0fccb182c7ec4b9914388f05fd0c85a7cafa00cf47e890,2014-11-14T14:17:55.110000 -CVE-2014-7743,0,0,3da40a3432e6bf0e2bf41e606327fc2e514c3111c5f92400c96b4b019520d880,2014-11-14T14:17:56.547000 -CVE-2014-7744,0,0,fdfd59362908188351fa0eb879333c1d0e53b657550135a9adcfe17c8f14cbf2,2014-11-14T14:17:58 -CVE-2014-7745,0,0,ef87a73de68107b008e37b33c869f93e6bb5e1b8bb9cbe556b25a7b4f3e3c88f,2014-11-14T14:17:59.453000 -CVE-2014-7746,0,0,9de72fca370b842ffc6e9ce2799f702bbc9dcac96f8238c42019c25c337cf8a4,2014-11-14T14:18:00.907000 +CVE-2014-7739,0,1,d1287add44782a9bcb0ee72044e9498e8578af043188850712fe473185d66a10,2024-11-21T02:17:50.667000 +CVE-2014-7740,0,1,294e566afe284fd4b3708edcb1492fd4c4b9a3a289c2c73b5e85a3a68fc2096d,2024-11-21T02:17:50.857000 +CVE-2014-7741,0,1,1e325499c0551d58f9595db2800c8545d0359a3dfa8a4663a472b80935aa80e6,2024-11-21T02:17:51.050000 +CVE-2014-7742,0,1,61dc26e114cdcfcc77f0dcb9731b4077e338b06fb66c6a1176265cfe5164c53c,2024-11-21T02:17:51.330000 +CVE-2014-7743,0,1,ad5964ceb331ed61dee528fca0b695ffc7d3bf93c7153af676cc33cf1df8ea7d,2024-11-21T02:17:51.557000 +CVE-2014-7744,0,1,9afb223d79ef905f4b0fe85e85e3d5873516d94801ea16206e8be5aa7cd13847,2024-11-21T02:17:51.753000 +CVE-2014-7745,0,1,986860c7ed6ec7f75ae8210761818ea12997ac0971737a8344b28aeaaf3c4804,2024-11-21T02:17:51.943000 +CVE-2014-7746,0,1,098a94c393f6f87ea481d2025eedb53fb80dd868be82ccc295046eb03fb9c92d,2024-11-21T02:17:52.127000 CVE-2014-7747,0,0,9904fb8a9696b9477d2310997b338fc39a3c157077e1d36d714d29744e5522f7,2023-11-07T02:21:42.380000 -CVE-2014-7748,0,0,c6fb7016dba3cfae64ab8dc0022c9efe82814837715690f57feeb34176f11e7e,2014-11-14T14:18:02.377000 -CVE-2014-7749,0,0,e82258e5517413b9b3350f7ddead9ffb2a55662a97edf6bf0407bdec7424ea70,2014-11-14T14:18:03.890000 -CVE-2014-7750,0,0,48138da36eed295e40e4b4017ce19919beabf34812783d4d1b75a47e019d8184,2014-11-14T14:18:05.437000 -CVE-2014-7751,0,0,e0e23e3f4387c2c5f28852019d3bc5f8cf5ec38157a35b6e6ab47cf63670488f,2014-11-14T14:18:06.923000 -CVE-2014-7752,0,0,d4c522613ea1d4de2fda3da5d7745d0678525e61f992178488decc087dac6109,2014-11-14T14:18:08.440000 -CVE-2014-7753,0,0,fb5c0445da9a91ccef6f6975c7ed6bce3e4b986938db5ade7bebaa2153ecbffd,2014-11-14T14:18:09.847000 -CVE-2014-7754,0,0,53fa8ac3962504519829f5eb3cd2c6e3e4836337d763b08d737a9b1b926eeb3a,2014-11-14T14:18:11.313000 -CVE-2014-7755,0,0,9e60837b4854c2bec6f6618e3f8c8ae2a26973055d35d4025791524e44ffc9ff,2014-11-14T14:18:12.817000 -CVE-2014-7756,0,0,4ec55664368b46fc039dbfd0543b3bcee8e59165bf567ecd69d0aa09b2e9427d,2014-11-14T14:18:14.317000 -CVE-2014-7757,0,0,828e382c77658fb1e75bde2266ce421b9b63296a204e0c7b02ec81549abdddcb,2014-11-14T14:18:15.830000 -CVE-2014-7758,0,0,60c9c077ac1b551cd9f52a1adb85dc637d13e644d75b06811354dba9788ca84a,2014-11-14T14:18:17.393000 -CVE-2014-7759,0,0,e233342b3d7a0e28f58516b7cf9ef4e437dee47c02088e065ba5878f1b59d3e6,2014-11-14T14:18:18.863000 -CVE-2014-7760,0,0,116994e8e9c51ef45d279aa675ead5c9c95a72484925c238ae7fa8dd2d3b3d66,2014-11-14T14:18:20.643000 -CVE-2014-7761,0,0,6b3485acd6008eb8c13bdfcdddb480fc2a8e4d6a87d298291b0faa7a72e57edb,2014-11-14T14:18:22.333000 -CVE-2014-7762,0,0,307297fff65a08b2e72a9a33dab8169172ffed3fdd062e489bf67f9def2f796f,2014-11-14T15:27:22.397000 -CVE-2014-7763,0,0,54c38da510d24a32403e5b9460cf7ad92cb797173d7790a5bc650c464ed7b62f,2014-11-14T14:18:25.457000 -CVE-2014-7764,0,0,959a10124baef3c6ae720d4a73f029802bd45a30a7d41739366eed26070d3625,2014-11-14T14:18:26.957000 -CVE-2014-7765,0,0,1b0714ba82c938feb702dfdb9c772a49a57e91c17d206b6d3586c1032de73c85,2014-11-14T14:18:28.507000 -CVE-2014-7766,0,0,a2faa86a7e528cbaf9a40981d865bc1a4734584c855d8ff784774f9346309929,2014-11-14T14:18:29.957000 -CVE-2014-7767,0,0,a3b32a406fadd0faf6eba22fd987ec60130543cd88b03aab92dbc442495cd4b5,2014-11-14T14:53:15.820000 -CVE-2014-7768,0,0,ecef9a98945facc7bca64eb873dd71f196dbcdbf585aa5d0e48106ae97b13acc,2014-11-14T14:18:31.443000 -CVE-2014-7769,0,0,dded259afcfaaf6c431e669f973b25a8a0de3b3e4ec45a60f6abecac77d5973f,2014-11-14T14:18:33.020000 -CVE-2014-7770,0,0,d29548b73bbf60916e6e02e4c2bfdc349230134cea56a8df7380052541a2b8bd,2014-11-14T14:18:34.490000 -CVE-2014-7771,0,0,f91c54f65ee857c774196c46f1215cb9aa593168d6fe553737ce24e4e0af4c6f,2014-11-14T14:18:36.007000 -CVE-2014-7772,0,0,93bc7ac38c9e53c127a466fd635aba9c5fc8b75044e65de1866d47c75b68e7e4,2014-11-14T14:18:37.477000 -CVE-2014-7773,0,0,36b083b40295ce4ab30cb7024ea41ac94aece9b8fd9a5bc5cefc5907e7dce2c5,2014-11-14T14:18:38.990000 -CVE-2014-7774,0,0,ab2a221722b3869fda4e756cfbc53ceb3dbb3c5ee2e3a36f9ace09262d4e0eab,2014-11-14T14:54:14.377000 -CVE-2014-7775,0,0,3183468d3d0306c08839c9f03ab1e8ba8f4296aeac05b05ad6b37cf5db074648,2014-11-14T14:18:40.477000 -CVE-2014-7776,0,0,89d13c4adb45ffdb68807edf27bedf51b9b33ec59ec38b00f101757814e3ccec,2014-11-14T14:18:42.007000 -CVE-2014-7777,0,0,3cc79c49e8e39b1e6cee52213114458f157e14d840fa732d299b88eb2b0f8b0d,2014-11-19T01:36:32.427000 -CVE-2014-7778,0,0,c97ee7daa5723ad7d20d048bb9ff0ba154f9baf97ae09581fdcf1ae5bb219054,2014-11-14T14:18:45.007000 -CVE-2014-7779,0,0,5ea6fa4b1be329898f4dc045f9907e8aabb853de642a20fcfc3f437b65bba4ce,2014-11-14T14:55:00.337000 -CVE-2014-7780,0,0,5b1ed615446c35126cecc824dd6fc9bf7ad9cb8dafe2e3d0e7aedf061b5bd070,2014-11-14T14:18:46.540000 -CVE-2014-7781,0,0,7c68b1613e65de8a7d7194bbabd50b69f3b289c3cfacdd17b525ecfce49c124a,2014-11-14T14:18:47.993000 -CVE-2014-7782,0,0,1b0ec299d98e252751a89b888a0820dcb6085dd0ad60bd17bfd294cba937444e,2015-02-04T05:04:00.660000 -CVE-2014-7783,0,0,021a93365e7fbb81e556244ac607a79b017e8c9eb91c374da86e60d60c517a28,2014-11-14T14:18:51.007000 -CVE-2014-7784,0,0,36c4b215fb2f77163810b53bb4a0f0022037824d82ad5b9cae74ce159b90de62,2014-11-14T14:18:52.493000 -CVE-2014-7785,0,0,a8f3ee9b95dc156410829e683407a869715e88882fbf32994a01cf3ca1c3a921,2014-11-14T14:18:54.027000 -CVE-2014-7786,0,0,34d29382a931069038e6e911727c22dcc04d0025b60a61711c23631c69e16284,2014-11-14T14:18:55.510000 -CVE-2014-7787,0,0,28408f561d40a35414a0d2cb05388f2e3a93edc5c383d246029dece10b4d4ea9,2014-11-14T14:18:56.993000 -CVE-2014-7788,0,0,de9ad0db1073444dc1d3588e8541552cc3c3774bf26e0f1ae8ae1a9935b6f7f7,2014-11-14T14:18:58.477000 -CVE-2014-7789,0,0,12e3277f22a6c545d4f641181db0eee5c61a8ecb6b058872492052a6b94e51f6,2014-11-14T14:19:00.040000 +CVE-2014-7748,0,1,20b60f571962f299976698b10bfa35ba81f9438c63a0c55f8e23432bd714da50,2024-11-21T02:17:52.327000 +CVE-2014-7749,0,1,0bb2bf541843793c205c6279ce9ccaaf38f410e4bfd50ca5016093563e38e756,2024-11-21T02:17:52.510000 +CVE-2014-7750,0,1,8d3935d978788525fbf70995a51415fa108f1f359535455e6bbef8c274cf2ddc,2024-11-21T02:17:52.700000 +CVE-2014-7751,0,1,cd27684e31914a43db4b9b999e0fcf2b6ed54e8ca86f6ad35d11d572a6f1762d,2024-11-21T02:17:52.890000 +CVE-2014-7752,0,1,30bf840c357b2b55bd8ee774f19235b6d654423849f240c441176e73d2f09384,2024-11-21T02:17:53.073000 +CVE-2014-7753,0,1,2471ecbd61e73e1a47402e3f1e761414092bf1045430cf991aedd3b25eeaafcc,2024-11-21T02:17:53.263000 +CVE-2014-7754,0,1,a50942b4d3b10cdd705e4dd31e89210c1ba78726d4a1f3dc755911a5d040f3a9,2024-11-21T02:17:53.450000 +CVE-2014-7755,0,1,1365cf377db7814b788e992cfa3a88ef54371437b0026c1c1111f83d0e02c1f1,2024-11-21T02:17:53.637000 +CVE-2014-7756,0,1,38d49321d15d5e4040feb370555d36f39bcbe19a5a5b363f02cf1453eb883482,2024-11-21T02:17:53.817000 +CVE-2014-7757,0,1,ec2f8bb307fe9e689175eff45b6439f22263e60b2d02ab7df5aa0ab39d615df4,2024-11-21T02:17:54.023000 +CVE-2014-7758,0,1,a7b2916c424fa359613dbf0ac88dfeeb64c625936f1812bbbc14d586e5ee9ffe,2024-11-21T02:17:54.220000 +CVE-2014-7759,0,1,57031106c6b139d39ffa337fdc0f46a52567e11920e77a7cff75a1a91f64b3a5,2024-11-21T02:17:54.410000 +CVE-2014-7760,0,1,98dcda37cda62dca57d97a84024a0a012f8d80ddf712f88c9334c16861f435a4,2024-11-21T02:17:54.593000 +CVE-2014-7761,0,1,49f768414cab4f1dbaf259aa826b2320d37622c555263f724dd504a26a27628b,2024-11-21T02:17:54.787000 +CVE-2014-7762,0,1,feef3cdbb19f015fba17a6380d00e615932a63ddb3af526d87a0cfaed36b53f7,2024-11-21T02:17:54.977000 +CVE-2014-7763,0,1,42809a4f1065e17457ccc65e47ed2e5aade6fb55b5047ca98e9a736f30c5fc4d,2024-11-21T02:17:55.157000 +CVE-2014-7764,0,1,663fdc377579dae79587ae46c467cc50ada53aa04e03f99bec53e2466e5d14a2,2024-11-21T02:17:55.343000 +CVE-2014-7765,0,1,e51ad8207e2a0fb01fe57339c03b8c1d8e5f5fab306ff433d4c1b7eab3572ea1,2024-11-21T02:17:55.527000 +CVE-2014-7766,0,1,4fad211eb6b80ca4a68e51c4b26b4b6cae6ce2bf44582b92e6494800065d0bd8,2024-11-21T02:17:55.710000 +CVE-2014-7767,0,1,4f97b213867a3705809eba8a0da6f2ffd05f7c92cec89fc4ad4fba59d1f693db,2024-11-21T02:17:55.900000 +CVE-2014-7768,0,1,c59cf9446cd4ee8ccd45e4ae9a40a5168a45917bfa5792eff1a1e9d4d1f90931,2024-11-21T02:17:56.107000 +CVE-2014-7769,0,1,40591625caacdbf1cbac489cc1466ed5de3284dd2e229688dbd8d966362a5c36,2024-11-21T02:17:56.293000 +CVE-2014-7770,0,1,c406146befbf92e389d1997ce4a4120e63925ff3471ccac828b388cd51801652,2024-11-21T02:17:56.477000 +CVE-2014-7771,0,1,d61c239ee353f27f8cb0055232eb1ee76e4608180912dae49701a4aa026be2f3,2024-11-21T02:17:56.660000 +CVE-2014-7772,0,1,085cae99d520af84ae08f0e30d5d0b4195279b06538ff8918d57f47834157a1c,2024-11-21T02:17:56.863000 +CVE-2014-7773,0,1,f6fd2aebe67a8007585f598e3f38c868f12428a50ab6b738d602678fe939de63,2024-11-21T02:17:57.057000 +CVE-2014-7774,0,1,a9817c98f3bf69836596a09b0ab1fb1fd93eaca849ac11ea56da5d8199684ddd,2024-11-21T02:17:57.247000 +CVE-2014-7775,0,1,7876f0e56b7240171e31a44c31426e5b027b84bef6e717088328caaf465aebe9,2024-11-21T02:17:57.453000 +CVE-2014-7776,0,1,a3cabc395507f5db820de06c5b5b0c5d4c022725e8a51475630b96c1af151506,2024-11-21T02:17:57.640000 +CVE-2014-7777,0,1,bcf8593aa58b9063701dd78235b0dd208c16af65f63ee4fc3602ffdb4daf360c,2024-11-21T02:17:57.830000 +CVE-2014-7778,0,1,8dbfccfdaedfc2ea4adfadcba7ccd58cfdb15dcd9ec76954ef55246ac4a27a18,2024-11-21T02:17:58.020000 +CVE-2014-7779,0,1,a901c8501b1f95c26fa7da5aa3a9a43c780ca4db64af5ac240fa4accec9aa6e5,2024-11-21T02:17:58.213000 +CVE-2014-7780,0,1,ad8ba08cc82edb84cfb1c0e0a3867cf473059a4b1af37bb6411657d591de5352,2024-11-21T02:17:58.420000 +CVE-2014-7781,0,1,f79ab2cd1d91e3e884558d486dd1446a564a6450798a681c919ea1b5ec5cbc35,2024-11-21T02:17:58.610000 +CVE-2014-7782,0,1,f8532ec686709777902ac4681f7289206d32a4ae741ad8c77af8506c7c8c82d4,2024-11-21T02:17:58.800000 +CVE-2014-7783,0,1,b4748819e5591293cbfbd3510696dbc64cee08b4603a3a54c783e1d80d27d9d7,2024-11-21T02:17:58.987000 +CVE-2014-7784,0,1,bdc25814f3a6dc73d2e502d3463b26bd5578c696e35dc87acae9acf453617f87,2024-11-21T02:17:59.173000 +CVE-2014-7785,0,1,2bb9eadcce99ff3c4eef7f0deeb9423c68bb65aed239e7c4b9483d40d3b7b82e,2024-11-21T02:17:59.367000 +CVE-2014-7786,0,1,948b5b179dd5e257e6977d8dffaa4d36baccfe4bde8736f8a3d6114ef72799f2,2024-11-21T02:17:59.563000 +CVE-2014-7787,0,1,5fc68de8df0f146427c3be16dc5ad3e0601a23404215eceb65e72da8e2969974,2024-11-21T02:17:59.753000 +CVE-2014-7788,0,1,aa59b78da8b046ffff5322c4f42198f1f6ae7643152d1551ace153404e5a8522,2024-11-21T02:17:59.950000 +CVE-2014-7789,0,1,aebd483ab6f693119af16428edffa911f66cdd417772a058cab326a80399e861,2024-11-21T02:18:00.157000 CVE-2014-7790,0,0,564544c76dd47fe05624bac3230a405a96d3977f870b18ccd877d440e206da14,2023-11-07T02:21:42.870000 -CVE-2014-7791,0,0,5711d6eeabb38dfc3440dbd849b67ec7034f10b9b7ecbaf6b99099a7b314bce7,2014-11-14T14:19:01.527000 +CVE-2014-7791,0,1,43bbd59d50c72468df7a971a7de4a90cf2b3032e131da4beac1a04447733b7f0,2024-11-21T02:18:00.367000 CVE-2014-7792,0,0,20645c786c96435b3ffe77964204c228e3d238f11b8547a0836cb771da93c242,2023-11-07T02:21:43.100000 -CVE-2014-7793,0,0,3a91df7ddd5527d2324db16dfce786abeae16b43d5ab916584e5faaa2aa08689,2014-11-14T14:19:03.010000 -CVE-2014-7794,0,0,95a21f56011e3d94bb8a86fa77d12d0abe272f96e27b84a7e0bb91112bc7dbf0,2014-11-14T14:19:04.447000 -CVE-2014-7795,0,0,a8c707e6014e44aee6a8e0478d264e6c6f695bd7db1d76954edf1294d5650751,2014-11-14T14:19:05.870000 -CVE-2014-7796,0,0,4b7f6c3dcde41ed8d78a46b7e268e414d8b7055660f541128300bd460eeddb1e,2014-11-22T03:03:42.677000 -CVE-2014-7797,0,0,ec889a780a045828ab72d1d263d4b8dc416c8c4cdc87d7b189cf7a96a917d412,2014-11-14T14:19:08.730000 -CVE-2014-7798,0,0,6dae586fc6405efe437bc6c20f61c113dedd8030902fc7fdcedac5a36c2594ac,2014-11-14T14:19:10.120000 -CVE-2014-7799,0,0,330cd613720e60b480c63ae8e2b23234d295e92e1544d659252d2b82631a861f,2014-11-14T14:19:11.590000 -CVE-2014-7800,0,0,e1018ee63c541c1b9091f4fab2c6fdc46bc27ba97d4c7476f7891c71bbf9c65b,2014-11-14T14:19:13.107000 +CVE-2014-7793,0,1,9e9f6fa2dc9b4fceda0cc7afee719cb2f9d35d53f3f3b7ecda42db9d5e505c90,2024-11-21T02:18:00.580000 +CVE-2014-7794,0,1,a049a426883bc766df6060c6e7baf8e89c4a60d355c7ee6429e0e26c695e666c,2024-11-21T02:18:00.777000 +CVE-2014-7795,0,1,c00cd70d5a758f82513e4000eab4041923a0e122d5ad973226c8d6c224f09f03,2024-11-21T02:18:00.967000 +CVE-2014-7796,0,1,92e41cc5e0403676dd6b0139b8756955580e24068612d7b9b14913d6f418b3d5,2024-11-21T02:18:01.160000 +CVE-2014-7797,0,1,7ddc9787aa8004510010f6d6d18847bfe70f3e3e012cda6c2c6f442ff0174dfb,2024-11-21T02:18:01.360000 +CVE-2014-7798,0,1,9d6f52668efac57011a5afc8c59ab50b80eb20b5505d4cba9d3e8ab0614d0f14,2024-11-21T02:18:01.577000 +CVE-2014-7799,0,1,a72e57239e0c84d0d28d0d6490df274688c405e0d9d27a4eb8cb6585fc3b714d,2024-11-21T02:18:01.777000 +CVE-2014-7800,0,1,3bbb17dda08eef5090c2afa3e9911683d73b3ab6b5ea2884e5cb565b09ba82ba,2024-11-21T02:18:01.977000 CVE-2014-7801,0,0,6432ef0f93529892001cb469dd6aa14a26796ce18fb77425d890fa5d491a2464,2023-11-07T02:21:43.380000 -CVE-2014-7802,0,0,ea98778f2c2fa0de323cec0adc569b744f04c95b0fdeb4cd178c2084fee0c0dc,2014-11-14T14:19:14.560000 -CVE-2014-7803,0,0,16cf82635133be14cbe346b9eb4339c23e78518d94bab41a5bf3bb984bbc357d,2014-11-14T14:19:15.997000 -CVE-2014-7804,0,0,16593e6161c12b269320aebdb1e58903c003244df77e43b20e8306df8115f4cc,2014-11-14T14:19:17.590000 +CVE-2014-7802,0,1,5c5320202594f0b06f94f5ed5f866abc6d0d083e4e2d3e9c9678fc0aa7042dbd,2024-11-21T02:18:02.190000 +CVE-2014-7803,0,1,1ec8c2b792336c30b31797a4af2de340147ebc6e91b8471b1f0d1543fa1bdbb6,2024-11-21T02:18:02.390000 +CVE-2014-7804,0,1,5baea5a5cb8f79dbd4e27c5503c8c18a939301ee6ed70b39f12bdd89f312efcb,2024-11-21T02:18:02.600000 CVE-2014-7805,0,0,fb5061d36c7393a54dcd673fe672f25036042dea63e0e7ec025b86f8544c1b50,2023-11-07T02:21:43.637000 CVE-2014-7806,0,0,0b080a5114551f78d16d831fd842a8b224f71ef265cdd75a402b7b10e31fb6f1,2023-11-07T02:21:43.883000 -CVE-2014-7807,0,0,76a13a0c96ac3bc7325fddc9dd107ae9e626e25677871b951d0c8c279135fce0,2018-10-09T19:53:28.727000 +CVE-2014-7807,0,1,36c8d350483e173bc99f0eef46a6c22658e196fbb8d1e76b93dc2a13c689d885,2024-11-21T02:18:02.830000 CVE-2014-7808,0,0,3c75cfc6bafb3fc1b0002d1d5df48b7270c0476d05d1142671302060880eb74e,2023-11-07T02:21:44.257000 -CVE-2014-7809,0,0,2a02718a7b75478eaf4900b076449385db819a64267e64b3d8d2817c851e1875,2018-10-09T19:53:28.947000 +CVE-2014-7809,0,1,f779a313bd0cedf04f77b8f3e792fcd8959b2432c5a2a816e4dacf16854a78fc,2024-11-21T02:18:03.063000 CVE-2014-7810,0,0,4c36303463f5febf61132aa03c4f8cde3208564d08ec27587721ee3b75070d9e,2023-11-07T02:21:44.353000 -CVE-2014-7811,0,0,6a4a2a47faa5f5cbb3471b6f40b0d551b32020ddef2ca5073a2a6605349532af,2023-02-13T00:42:20.953000 -CVE-2014-7812,0,0,de36785e7a5a59efde23f2ac673bff6d8cc07d2e4426799da639830d376869b2,2023-02-13T00:42:21.067000 +CVE-2014-7811,0,1,89e1d20368510c3bf02b18ffb252f8d4f7c167d4c98ceddefc9e344ce17866b3,2024-11-21T02:18:03.450000 +CVE-2014-7812,0,1,54af962503eb764efef11915f9e75481d1047ce15005eb86c29daaf4c943e792,2024-11-21T02:18:03.563000 CVE-2014-7813,0,0,b8303ecdd4f6c04339f3bc84a497e2342d57d0f2b54cdf31097ffcfa72aa23f5,2017-11-07T13:13:01.367000 -CVE-2014-7814,0,0,02ec82ce70eb3e68de6d2eda7c83e16d819660a0c3005172aa29fdba40ec60ce,2023-02-13T00:42:21.370000 -CVE-2014-7815,0,0,035170855d601df72bfed595f9cdae910280f8bfb5351e87b4281fec3072f659,2023-02-13T00:42:21.433000 -CVE-2014-7816,0,0,d2949220ef0494be23c9fdc1af22f395c0862eb4f90d8c9d0bbaf372102776bb,2015-03-04T16:41:08.017000 -CVE-2014-7817,0,0,0584559df7276ae5b3a753a7a4097fff19dd9bc40d88a00f4555ba36105d5a04,2023-02-13T00:42:21.650000 -CVE-2014-7818,0,0,0768e40070642148baa5591d343e886032237d11bac0a32f9e9b179b4fb12308,2019-08-08T15:43:52.230000 -CVE-2014-7819,0,0,c35c694d160df4b9d69fc51d386e595ef30143b37fa85a8ff6bc46768965ce0e,2023-02-13T00:42:25.267000 +CVE-2014-7814,0,1,aad7b32fb26928926b475fa81a412122ffd63da512f5973b95802220c4beeb30,2024-11-21T02:18:03.790000 +CVE-2014-7815,0,1,bdf727e27de052daff6579142ac9cb6213c5294f375e192636d8419a8336bd16,2024-11-21T02:18:03.897000 +CVE-2014-7816,0,1,8520562533715a0d5952b60033b55da3faece33706040c8fbfd72303de5e117e,2024-11-21T02:18:04.057000 +CVE-2014-7817,0,1,f98c15faa23291a54e8a49a1a6b5758711c1a374f6a82614f587f9a2a3a91f6f,2024-11-21T02:18:04.183000 +CVE-2014-7818,0,1,9153102685c7d5ce170cb869430f49b9522bdb9665620d898502319cfef85a8d,2024-11-21T02:18:04.337000 +CVE-2014-7819,0,1,c1c8c031e32cb76e96e92b6c728f7d9f28ad7d49618c43c7d97ef0250bbb4162,2024-11-21T02:18:04.480000 CVE-2014-7820,0,0,6ea82c14ab95643408ca9e19429921bdb09e31e9437f44c998822741d7cb6b38,2023-11-07T02:21:44.597000 -CVE-2014-7821,0,0,7bf207bf3a1bb6c841c222c0aa2ae1ed7292e7e670aa068541e2787b952efcc2,2023-02-13T00:42:25.673000 -CVE-2014-7822,0,0,f78bf4ad3eb8fa21b0ae588b14d824b8396a2e134c0d7d72bd4c64613fc02fea,2023-02-13T00:42:25.770000 -CVE-2014-7823,0,0,86b0f7e3527f3062e5ee4f0fb13580523cb55f9cc3093f474b846b1e2a958ceb,2017-01-03T02:59:12.767000 -CVE-2014-7824,0,0,2ee4a791e19201655bbdeee7c4f373942cbe1e30e20cf71a6c0cf7bd768b6a26,2023-12-27T16:36:58.353000 -CVE-2014-7825,0,0,6c1564f3e04fe86a875cdf7563953ff2c55c245cd94d23d8c3c71e6a918114fd,2023-02-13T00:42:32.963000 -CVE-2014-7826,0,0,206163a30ce6421703b3f102fff9e316f42803bb7aab71ede77e8a5b1de7dd2e,2023-02-13T00:42:33.107000 -CVE-2014-7827,0,0,88847cb2a231d68027ccce139beca02b0b40659b7f59c787cccff0081349b4f8,2017-09-08T01:29:17.073000 -CVE-2014-7828,0,0,a7a4e0401897d105524ee90fbb14e3e023a00fe9f4045793f81019bff0fb43bc,2017-09-08T01:29:17.137000 -CVE-2014-7829,0,0,f32cbb1ac5d3cde7c4463e012b9e6f84b5cac873eaaa3b1da48a1275a817347b,2019-08-08T15:43:52.230000 -CVE-2014-7830,0,0,8decaa44d405ed0ad128c88ab6d65b04795e225ff4a93dfb417282487b928907,2020-12-01T14:54:45.183000 -CVE-2014-7831,0,0,24f8987bcfb33ca4a4b55eb67442d4488426b9bf1fa810e36a4d41820959fbe9,2020-12-01T14:54:45.183000 -CVE-2014-7832,0,0,120de66ac0b228b45f42323581eb4147e164516a89e1759867ea2c9081c33ab9,2020-12-01T14:54:45.183000 -CVE-2014-7833,0,0,bbad8c9877631e69be4b0b14598b70e25329e73f9fbe2f05ba924332df03a3ec,2020-12-01T14:54:45.183000 -CVE-2014-7834,0,0,6464db4a7f4600bcf7a0985a6459912def6724dfebc6f2db2efd808b74030969,2020-12-01T14:54:45.183000 -CVE-2014-7835,0,0,39942ec95edff0b8f5d3a90d7b81213dc62636c9b0396888c7cd64757348693c,2020-12-01T14:54:45.183000 -CVE-2014-7836,0,0,b36fd3445ec0a754344bd62a991652f0d5490c1a818fe83a60ea0d28c3c18847,2020-12-01T14:54:45.183000 -CVE-2014-7837,0,0,efc8efc4c1558a72a782de095eed0e5da345ce854e918ac12d4abf4466a7f6a7,2020-12-01T14:54:45.183000 -CVE-2014-7838,0,0,1add9e31f18470c05f66698dc7ca96a51b1b4117aa191d51d7a9b448d846ded3,2020-12-01T14:54:45.183000 -CVE-2014-7839,0,0,4252bdef55620d1e1b4a3a9ffa1ec61b9374d011c34f80d876436997f657303b,2015-04-23T01:59:36.727000 -CVE-2014-7840,0,0,8e1e9cc65351eb57bed68008592e1e5feac6fdec372dd35476d82758e6daa3dd,2023-02-13T00:42:33.533000 -CVE-2014-7841,0,0,aca0bf3155ed3a420c30877985a9bbf42873c3882b6da488337e5d60144a3264,2023-02-13T00:42:34.773000 -CVE-2014-7842,0,0,16d81e13f14c318f2238cfe3db59e7beebe09414a661bda3519274a7f4fd3867,2023-02-13T00:42:34.887000 -CVE-2014-7843,0,0,5f0b3f83f80c13e56d4e0f8477598697e3ecc0eaf614540641cf797b92fa0668,2023-02-13T00:42:35.690000 +CVE-2014-7821,0,1,74876a041aadb84d533572ae5fc768a5e7f5707da22ef85b7c8211f548408f77,2024-11-21T02:18:04.623000 +CVE-2014-7822,0,1,2e5cffee1ee3456b00a917881960ad3f2c484d2bf2018d3228db8a6f4c688cda,2024-11-21T02:18:04.763000 +CVE-2014-7823,0,1,0b5248f8a92cb957d3d450299bca5b040de57d71b8c835c65f179caaad231e6f,2024-11-21T02:18:04.920000 +CVE-2014-7824,0,1,0472121c2b6f5924a046c7bf5cede987b8dda85ae6c8612389a12d3d0fccd2c2,2024-11-21T02:18:05.043000 +CVE-2014-7825,0,1,b364f959bfc50b33e97f14b131596949aca0a01fb68673deb578c1243e248c61,2024-11-21T02:18:05.173000 +CVE-2014-7826,0,1,1ea21766157565479ff68fac5211c6dbafbededec0c2dee0ceee23cc91ab4cfb,2024-11-21T02:18:05.310000 +CVE-2014-7827,0,1,b6f9c6cc8ad7a77a0fb0eb069e1c1da25d78fb3db5b5be0b2394e15217134a2c,2024-11-21T02:18:05.453000 +CVE-2014-7828,0,1,884ed4d5c45849c9fc4b5689d750bed130c80723559ae88e5bdbc1d61fd3c4b7,2024-11-21T02:18:05.573000 +CVE-2014-7829,0,1,ac356f6bafe35b8f9acf39eb21df77e683dca23c764e232cdc16c78137629bc0,2024-11-21T02:18:05.687000 +CVE-2014-7830,0,1,8fe251bbffd468a58be34048953094e3bbdcfb60a8da728747ea4f832c746a70,2024-11-21T02:18:05.830000 +CVE-2014-7831,0,1,28e88b50811d92631a9503b1fa58df9ed0901d6f79bc1139bf67a7af4c7bdad0,2024-11-21T02:18:05.960000 +CVE-2014-7832,0,1,ec10629450e6b54faca14cb231a598801fe31b6e270c12f621029e8159c52ebd,2024-11-21T02:18:06.077000 +CVE-2014-7833,0,1,1a69851582dffd89c0dd11bb79348775d9784da8ec406ca42499c1e045f46370,2024-11-21T02:18:06.190000 +CVE-2014-7834,0,1,29f4e30b6d79cfba6cddcd5c0a7c466f2ca7eaae3cc5c292f5a3fb23fdc9e6e6,2024-11-21T02:18:06.310000 +CVE-2014-7835,0,1,54a0861f31645dcd7529258a8249e52d18c3ad46c4bfbd13da33067e257aecd7,2024-11-21T02:18:06.427000 +CVE-2014-7836,0,1,054a0a6e3b203fe81eb1c472f5435a14c976a7f08fd6aa26c7da6263b49e22d8,2024-11-21T02:18:06.540000 +CVE-2014-7837,0,1,307690fda30679b324ed64f96b0c42fff33dd8d74490d3225a88837f22ccaa09,2024-11-21T02:18:06.667000 +CVE-2014-7838,0,1,b684eab7960410e237603fb18a906b99dcbd0a16e98f40ceda64b11ff6c7093c,2024-11-21T02:18:06.787000 +CVE-2014-7839,0,1,1daa4d43c6657bd35daa460ab53c2242083bb930073d3de6424dab31babf05c6,2024-11-21T02:18:06.933000 +CVE-2014-7840,0,1,e193077134d2a1f9545ffa2abdd3fece956e4956b87d88a12bba3476c98f5792,2024-11-21T02:18:07.060000 +CVE-2014-7841,0,1,d90fd61d7184962a9f67502a7f29af17cf899568044b81d56c428668dd6ef7f5,2024-11-21T02:18:07.190000 +CVE-2014-7842,0,1,4377cdd9fe87b47e8d5f4bce7876e1a9b4856c9e66105bf3b4f15088b6effc4a,2024-11-21T02:18:07.357000 +CVE-2014-7843,0,1,685cd30d6b1e28179aa4fcb4257e39e96f177e7864281dd634dd2ce63d78a5e8,2024-11-21T02:18:07.547000 CVE-2014-7844,0,0,a9c6007a729535f1773e6339987e1b1d97a7444612d424ec1a0a2a537feca1e6,2023-02-13T00:42:36.047000 -CVE-2014-7845,0,0,c2ea750476aca7bf4a78065f80dfd62ea1283046dd363424833718b231df6b5d,2020-12-01T14:54:45.183000 -CVE-2014-7846,0,0,fc3cdfe15f8cceb5bcf32aa428def6c9ad9be3d119d8b564f6abbc52d5ce9eb7,2020-12-01T14:54:45.183000 -CVE-2014-7847,0,0,9258a837c9be313fed9b82a5deb4b0f3087fd4ab388513f876926c5dca9dec76,2020-12-01T14:54:45.183000 -CVE-2014-7848,0,0,fc7a394588a1ebad5947f02c2228ef1cf6cd131d6920a0663dbc31886bea9e3a,2020-12-01T14:54:45.183000 -CVE-2014-7849,0,0,b98f448f121ce3c392b8af829e1a7781177e52916a29bfdd6d21506c6c1e90a8,2017-09-08T01:29:17.277000 -CVE-2014-7850,0,0,6340d8d82fea10b197ddfb1d643e0a27ac5b39cf2852486186f4747042b320c8,2015-02-17T14:36:43.483000 +CVE-2014-7845,0,1,117c1e4ef151bc50c6a10cbf30b6acacc804f30f2e03ba166fdb1438bdb83eb3,2024-11-21T02:18:07.790000 +CVE-2014-7846,0,1,1513172a5873985733a486f012c36afadbceeab3c10348e07394d15a721b8652,2024-11-21T02:18:07.913000 +CVE-2014-7847,0,1,f1667d9805b94a0f07e9e43387b3879fa28ce33b51134bed87ac9a19cb5e6349,2024-11-21T02:18:08.033000 +CVE-2014-7848,0,1,50d7b168e1df43f8ae47d72b845aa9c8d2ef49229a8752795bf357b09ebf617d,2024-11-21T02:18:08.150000 +CVE-2014-7849,0,1,6de72052b07a4ac814afc56abf339614449d5d63f209ea98ee528b4202052032,2024-11-21T02:18:08.273000 +CVE-2014-7850,0,1,3d832c89501736bc372e3ec005dc7d215ce4c4d0cfffeb2b3ce153e6f2ad99d9,2024-11-21T02:18:08.403000 CVE-2014-7851,0,0,1e6a6c113dee50690c7a577bb4c7865661a51837adbe696f371552bd8e64174c,2023-02-13T00:42:36.810000 -CVE-2014-7852,0,0,51585853b3071450e2fc1a70354d73cdde9c4b8e2be4a4707e9836d1e00dcc75,2017-01-03T02:59:13.033000 -CVE-2014-7853,0,0,fd47efbb30f054c29296a723cefaf9f677949ff214d68751d677a95577e1f3b3,2017-09-08T01:29:17.323000 +CVE-2014-7852,0,1,3b33c90b3724ad395d268721d116feda5dd6ef66d1bbf83b7c78c13f2cecfa9a,2024-11-21T02:18:08.633000 +CVE-2014-7853,0,1,60c508cd04fa2397dab959f9d3a5261171b5a8937bd1e82a6abf1bad55b85ed9,2024-11-21T02:18:08.740000 CVE-2014-7854,0,0,0bad34b62c4c084acf0bfddf1cb9e0b98ca497ddf4dd2929a83e1a09e51089bb,2023-11-07T02:21:45.193000 CVE-2014-7855,0,0,38c4e6f61368af011ef08e3127cc8729ce5915b7d9727b3f6b9523c96f1133a2,2023-11-07T02:21:45.400000 CVE-2014-7856,0,0,3cf98eb615f25822f1e8ca5e682e32f10e01a45188b9a89a444d4692f13a1324,2023-11-07T02:21:45.673000 @@ -71622,55 +71622,55 @@ CVE-2014-7857,0,0,820eb33bf4c57b36b3e657d4d8dc147f4cd86dff14ebe7042deb752fd76618 CVE-2014-7858,0,0,9949903746c809dd44fd5c763ca55e92d66c2d34bf31dbb998245d3c6a27f3b4,2023-04-26T18:55:30.893000 CVE-2014-7859,0,0,cb01f2779fb1f3476d3e74e81b5705c36aeb5cd6ea5676abbd36bca7f61f37ec,2023-04-26T18:55:30.893000 CVE-2014-7860,0,0,2e4e5090247bd38d24ca1c3793710c5fcfe740df84dd7809d452de9855dab8b9,2023-04-26T18:55:30.893000 -CVE-2014-7861,0,0,1d21419ab54d12e34996fb74cd011b46de3f2dee11a683a846f88bb7d4377258,2014-10-10T05:25:21.510000 +CVE-2014-7861,0,1,bf5d0f13b244c8fd1adea0d8562b0432ddf3a82dc783776b9a5c970773d07dfc,2024-11-21T02:18:09.530000 CVE-2014-7862,0,0,0b43f7bbd643a8b2167ba87fcd76ce6da0fdd1d0883ef8803cd5257786c180a1,2018-10-09T19:53:32.010000 CVE-2014-7863,0,0,d5e81a83c1495178e3d9bb873efc31e39318848e536312588162b382e893c5e8,2020-02-13T16:30:45.727000 -CVE-2014-7864,0,0,2f6958473dbb3dd547e1edddb3a8f820f5e1c95535ba7ee5205b4a3cac8cce73,2018-10-09T19:53:32.680000 +CVE-2014-7864,0,1,ecf66e4209e25dae2e5356f3fc03bac88f6ea3bcfe298b3a07d3574a59379ff5,2024-11-21T02:18:10.010000 CVE-2014-7865,0,0,c698e66207efb2c55e4c80aac98930a9a041ac79c1cdec8427eef834c565d16c,2023-11-07T02:21:45.963000 -CVE-2014-7866,0,0,3440c4f56c308ae9a9f1f60f99ec39993ae8c1275769b45abac56097a16ae333,2019-07-15T17:45:58.473000 -CVE-2014-7867,0,0,eb29a3d0bb4764059cbb1f3ad5e324d4dba6e338f8052827b5c041a467c9a381,2019-07-15T17:45:58.473000 -CVE-2014-7868,0,0,200fdef41476a6c7259734d3c0f8fa5e286c2ba67cb34bd5738a639b04d47083,2019-07-15T17:45:58.473000 -CVE-2014-7869,0,0,62703976f5e480720997f589202dfe21be93bd17dd2b3ad1cae99f52c149aeea,2014-10-07T17:33:21.073000 -CVE-2014-7870,0,0,3421962eb1527d3f72ce773c600eb2ece2c260842f1ea26ed4b1f81c1a0ed59d,2014-10-07T23:15:40.370000 -CVE-2014-7871,0,0,df9f7ac5c792476f95f28e45923a4a0e555691b8342cd1cdbc4f5cecc9e9f050,2018-10-09T19:53:34.213000 +CVE-2014-7866,0,1,0df0312188aad7a052573262102ed6770b919b8b1cd1209a1abbc55b8e05f846,2024-11-21T02:18:10.173000 +CVE-2014-7867,0,1,9662a6319bd8a37212806b34ad88dec7aca4f1721c006ede41b4f1d49d9b9d73,2024-11-21T02:18:10.323000 +CVE-2014-7868,0,1,7f047c3d1981f3f1c15f7f8a8c90a8d4f5186938dd67fa9fb3a77fa233fa1757,2024-11-21T02:18:10.457000 +CVE-2014-7869,0,1,24c954f744cde70c353dafc6e96e7a9079b388d91a6147ecdc310729e853af82,2024-11-21T02:18:10.600000 +CVE-2014-7870,0,1,e22d0f79e5d36bc1bd10a70bfcea7fc28540dd03ca3bd87ade38a27d5e780f60,2024-11-21T02:18:10.730000 +CVE-2014-7871,0,1,a5f24f624c96979619ddedf8a1d358167a92e80f744061409b7d4b3dd221eb57,2024-11-21T02:18:10.873000 CVE-2014-7872,0,0,f6fe8d597dc8c72fdb1bb57dc9eba34f8e1c5f160fb75aa4c10f4afb9be9c26e,2016-12-06T02:59:23.487000 -CVE-2014-7874,0,0,136c9a4942172918ddb69d572cd162544fa75b1af851678216e8a92363eba496,2017-09-08T01:29:17.497000 -CVE-2014-7875,0,0,5c957ec39220856aaba294f1c28449750acc271755a78e1a2feec2c874751ba8,2017-09-08T01:29:17.557000 -CVE-2014-7876,0,0,381088725d80a29d027eff004a55c445e1d8911a912dac8e7d205e8fc85814b5,2019-10-09T23:11:59.170000 -CVE-2014-7877,0,0,47d3d97517002a99af5d545a91823dca464706dbce9ac43036bc7429a9adc489,2017-09-08T01:29:17.607000 -CVE-2014-7878,0,0,731788c1bbdfc8bc658a13270cc382a33917f39a48db9d7a763f6d9a45b14b00,2017-09-08T01:29:17.667000 -CVE-2014-7879,0,0,3c7bc61f22a530335a2630611bfd5cc25dfabddfc0acfa55470b72fe60712fc0,2019-10-09T23:11:59.450000 -CVE-2014-7880,0,0,945481cf167bad80b64815c5d5c4fe90a41e3be6fe12d8652e7ad005f5045253,2017-01-03T02:59:13.093000 -CVE-2014-7881,0,0,a5e6c3e58cfb6371415c4e1aa8f65e9ef504777807b3a675c608490ef03b0dda,2019-10-09T23:11:59.607000 -CVE-2014-7882,0,0,40085ade54fd2de18022f0c66207aefb9a2f59c783a18c9dd18d8a14cd8c3df3,2017-09-08T01:29:17.717000 -CVE-2014-7883,0,0,eb312f2a049cc4b767363c0125e5b9ff04f4923b887e816f24f003e2e66ffa1c,2019-10-09T23:11:59.827000 -CVE-2014-7884,0,0,32b3d7be53329fea18beae25e6cbe3db58396306ace5a21b7463677848f0d5e3,2019-10-09T23:11:59.983000 -CVE-2014-7885,0,0,af19445beac5df920dbe1d80eed8d2511d645d994bd1005389dec5d4a3d2ad6e,2019-10-09T23:12:00.077000 +CVE-2014-7874,0,1,fe163fda0b42e4dfe4313ddfb8493683319377c9b1b3055a919234ce96596023,2024-11-21T02:18:11.157000 +CVE-2014-7875,0,1,2a171216aa234f00acc9c8e08872b44cf032200ba956fa655cd59960b80b2727,2024-11-21T02:18:11.270000 +CVE-2014-7876,0,1,25944cdd31c2e87f2f3c38d05ecc5e0345f1c1560749d2d2c9093fe6f5c1f91c,2024-11-21T02:18:11.387000 +CVE-2014-7877,0,1,1cc6cf33d9536967b7f975694dc38b1bf5da0f1aaee39041517ce0e7175340e7,2024-11-21T02:18:11.490000 +CVE-2014-7878,0,1,3a8e391bb23fc41d7c6dbe7ba5fb5a16489699586933f806bb0045c08caffa85,2024-11-21T02:18:11.597000 +CVE-2014-7879,0,1,106be0d2468fe26bf62255c33daf6945e33e129aa341733430aca29ceaa81810,2024-11-21T02:18:11.697000 +CVE-2014-7880,0,1,1d38e498f86e87ad95a5a25973e3f3dd46e617fed07a1c4c7c3f83bc985ce86c,2024-11-21T02:18:11.803000 +CVE-2014-7881,0,1,eaaaf8593ad6772ef64348418a88c037531fd30de16e9276c19181f890264041,2024-11-21T02:18:11.910000 +CVE-2014-7882,0,1,fe95925fc08aa34e1cca8be20c4ff46ad292fd60511af04472d73e3f153c7989,2024-11-21T02:18:12.033000 +CVE-2014-7883,0,1,6dd577ad75b542938077d2c8f92baccbf5b67c4342ef350741eda6e99e8f61ae,2024-11-21T02:18:12.157000 +CVE-2014-7884,0,1,13daf4420cc95ae62e8d93be5e7753b754c2dc76be9f77e4d67da93cdf932aec,2024-11-21T02:18:12.270000 +CVE-2014-7885,0,1,4cc3bd3df9b8fa109312f85a4943456cb3cf4b1ea95b92b119d7709306036a73,2024-11-21T02:18:12.387000 CVE-2014-7887,0,0,5319549bfe36748810063921c75cad2bf90da248c6b88c0726e33e87e3c18796,2023-11-07T02:21:46.133000 -CVE-2014-7888,0,0,550101890afab882ef40523bcb56b163318b523786d5d34c9adad222a68e8de7,2019-10-09T23:12:00.187000 -CVE-2014-7889,0,0,433a5fa06eb9ee5b13fd4c3932c8f89c808aa4638dbac188954ec4863e0b8451,2019-10-09T23:12:00.343000 -CVE-2014-7890,0,0,89402b84119aaf18c5cfcc5369d675686bc8c41881b69d56298d71a86f62b50b,2019-10-09T23:12:00.513000 -CVE-2014-7891,0,0,60f845f33b646f4f19cad554794f405d7fbe4ec704e65fe7729e0ebaff37d631,2019-10-09T23:12:00.623000 -CVE-2014-7892,0,0,447712d2feecdbe12b15b97661576704fc99426607e7da3cd3471ef8fb9cab04,2019-10-09T23:12:00.747000 -CVE-2014-7893,0,0,25fec964a118ef358578da90e6cbc2beaef01449eb65919f2424de074e351d0c,2019-10-09T23:12:01.140000 -CVE-2014-7894,0,0,9190a1ba8e1ec62f8df16b0213c986d3ad8d85d0c4d1e92389a6bad91ea950d0,2019-10-09T23:12:01.280000 -CVE-2014-7895,0,0,8ca49cd0935e7e3fa1389c3cea3841fcd85e25b89bb8ff5caeaa2a48d9090c49,2019-10-09T23:12:01.373000 -CVE-2014-7896,0,0,ee7dfec4219ce6bdeacebab50f415ae4e82ba631c9eb391dc60e216e878c52be,2015-03-12T02:00:32.270000 -CVE-2014-7897,0,0,41e80e94620f602282c4bd12b1d3c622142259cdc4f497ff4222caf7eadd8e78,2019-10-09T23:12:01.547000 -CVE-2014-7898,0,0,a6d7c73469e76425cdc4e626e9c1ee509f38bc8c9ffd95ec06eccc00983d5216,2019-10-09T23:12:01.687000 -CVE-2014-7899,0,0,e6829e28a7613aa9247ec8f9ad400e1a4b145686b1adaf5f385090dd29ee457a,2023-11-07T02:21:46.450000 -CVE-2014-7900,0,0,83abe653d5321e87cd25d2129f735aba54f258fad826c741442714c5b154fe1d,2023-11-07T02:21:46.723000 -CVE-2014-7901,0,0,7a4ed677755b68d74b523c7be61743c8e58e6520da1f5156943454319a98186c,2023-11-07T02:21:47.160000 -CVE-2014-7902,0,0,515336e75873aa71609492c8b6d4d01d206fb80b0eac0d80c9b71524bbdf0932,2023-11-07T02:21:47.577000 -CVE-2014-7903,0,0,93b0a7f0c248656d5db3b1ee1dd689a3963f56d319e5260c50384c5a74412ab7,2023-11-07T02:21:48.020000 -CVE-2014-7904,0,0,178fd01e977fa0114d25c3d9e65b1016ffd7b0a77500cccc8b2f7700e88c7452,2023-11-07T02:21:48.270000 -CVE-2014-7905,0,0,8da2c31b9b4d41e553f3d9e13610d98f8ad95d52716dcbe34d466485b50c7847,2023-11-07T02:21:48.683000 -CVE-2014-7906,0,0,11963e4b080a4d86e65a451384f087961d9670735f8b8970d8529781586a81f0,2023-11-07T02:21:49.197000 -CVE-2014-7907,0,0,0c1defaa84b039d5446f8f3596a4b17c2193bdbf94e98d41efbe8b161e6b781e,2023-11-07T02:21:49.437000 -CVE-2014-7908,0,0,c53a96af7ccf5dfc5882220e1b1da0ba5e2068caa88fe9aca76895ad90fade8f,2023-11-07T02:21:49.920000 -CVE-2014-7909,0,0,d6c239d09c7205854509fece143e2822cf873e1318d0760f90062c358446cecf,2023-11-07T02:21:50.370000 -CVE-2014-7910,0,0,57de6f841cb09d5012968436639d15a9080df309ee09df0e981488fc38d8f98c,2023-11-07T02:21:50.770000 -CVE-2014-7911,0,0,d232e8811a1a631bef4b08192b60dae42df51bb4e42822c3d9a3017cc1c01ae7,2023-11-07T02:21:51.250000 +CVE-2014-7888,0,1,5bbdca0bdea81c3a8f9ad7d6455955a45056f5b1219109571b9fe9ac63f0c2bd,2024-11-21T02:18:12.510000 +CVE-2014-7889,0,1,86deac50939c670d40b54cda81ad3d50921d51b48e38e1a91d09da7bf1381bfc,2024-11-21T02:18:12.620000 +CVE-2014-7890,0,1,23a0ebd6291bee65eeb2d32edaefed7246eaddaba924d81788b27683c9301510,2024-11-21T02:18:12.733000 +CVE-2014-7891,0,1,78e9af2a76d693058bb202fb5599bc78114b7c931beab27437973d450f2ede89,2024-11-21T02:18:12.843000 +CVE-2014-7892,0,1,3459f61b57333e0574c4400ec65c87d13a28b224231aedd2f04b5b4977f54357,2024-11-21T02:18:12.950000 +CVE-2014-7893,0,1,3f888ed2e55b795def595eea8b5d3ecd7175d21a04bdc4b82c0e276bf63b298a,2024-11-21T02:18:13.080000 +CVE-2014-7894,0,1,80111376ffa5a1e0c4ee0f7314b06492e4e26a3921e5a830a5b0f8e3b0c90992,2024-11-21T02:18:13.190000 +CVE-2014-7895,0,1,704d7c9aa7edf79e044e4b2409ab442398e2228f054a8efd4ee36d1a570d3896,2024-11-21T02:18:13.300000 +CVE-2014-7896,0,1,e95bd7271993fe202e98c2f193443069fc2ee156d687aafb405835e015a81df3,2024-11-21T02:18:13.407000 +CVE-2014-7897,0,1,cceaa21a878021d1fd045dee4ebc2d10c7e963e6ed110bd32d9fc593954f10f5,2024-11-21T02:18:13.513000 +CVE-2014-7898,0,1,57a73fca2dc0986eef71d4ccf2c70bf5faf2dc214192ae27c0739b8143cb500e,2024-11-21T02:18:13.627000 +CVE-2014-7899,0,1,8909c52d5c32b1c032abc412e022f0c1c41ff1fa5d56ec3eef3bed0194a93798,2024-11-21T02:18:13.743000 +CVE-2014-7900,0,1,be5b8652ff2814519eb9b083d27d0cd1f773649826a1d94d9c11d3ce8c004b25,2024-11-21T02:18:13.863000 +CVE-2014-7901,0,1,846f677bd1ae7f8a8ff52560fb604c6923ef62abfb2c243daafbcd4b0a7507df,2024-11-21T02:18:13.980000 +CVE-2014-7902,0,1,ef85b3b8cd93256946003189e7ebf0b3fb9664fd5b6cdc99602e2f0372213d31,2024-11-21T02:18:14.080000 +CVE-2014-7903,0,1,4bdd6d3635ac05bdb3603adc4d02e789012fa85e23d112bda6c999dd0446c922,2024-11-21T02:18:14.193000 +CVE-2014-7904,0,1,886b66cc297bdf02dec0cbe8afaa1540ebe5453ab0ad78801336e0767909ef13,2024-11-21T02:18:14.303000 +CVE-2014-7905,0,1,24ce019e77a2ffc5d077ecf0f53c38598a0d6468916b731681be7fa1637f95d8,2024-11-21T02:18:14.417000 +CVE-2014-7906,0,1,583346f1c33caf65aef0ef6866e54a71b63cb78805d7579acd353a869d33317e,2024-11-21T02:18:14.530000 +CVE-2014-7907,0,1,999999af2e85dd3368f6e7e0519807f0eb4eaaee1a549a8de1502c99c19c2937,2024-11-21T02:18:14.647000 +CVE-2014-7908,0,1,12f11b863084c1f4d5fca55983e6ddd5c25e6a8f31ef7845f339277ada151005,2024-11-21T02:18:14.757000 +CVE-2014-7909,0,1,30e0521d9f5da08f9c0f22e0a981233e45ad48ecaeed690e58299bbb3a2bf597,2024-11-21T02:18:14.870000 +CVE-2014-7910,0,1,ba8d6c509730cec3233c4f4d338f56c8baa1f29fa6efc4f2fa750cd99c3f1080,2024-11-21T02:18:14.990000 +CVE-2014-7911,0,1,8d1f56659b9f6a14b4771651d2de552e32e3985bc9868fd3400e91d9393a334b,2024-11-21T02:18:15.143000 CVE-2014-7912,0,0,e31debe2f34b8f9392710c93ad5342cb41cc8f987d63f9f66fee65ddf803087f,2023-11-07T02:21:51.733000 CVE-2014-7913,0,0,32dea60a6c8cc68132e19d797ff555330152f9b0e94fc12442c21c0a157ca130,2023-11-07T02:21:52.137000 CVE-2014-7914,0,0,0604fb6af16bbeb09a1d8094754c90f75546b5d20ddf26ecef893d02dd15b437,2020-02-26T19:14:02.530000 @@ -71680,105 +71680,105 @@ CVE-2014-7917,0,0,ef6dd50c0bf0d81102a1cb34923e2efddd4b59afb04457dc22fee023e35d32 CVE-2014-7919,0,0,e4bb47f34b1b2d654ba51b937c1dd222731ab944aee4d3132fc6dfb0fe7cd865,2023-11-07T02:21:53.227000 CVE-2014-7920,0,0,c4263b664150a0032429a63e8e2c8970877b3754808628be1ff408697f58a68d,2023-11-07T02:21:53.493000 CVE-2014-7921,0,0,9d9414d1f18a5100eb21cc5c07ab6a5eab42b158c3f431a051251247ba00b278,2023-11-07T02:21:53.767000 -CVE-2014-7922,0,0,2ecd008fb021e02b0a9412830867a0011c7449bf6f2293160ae03a6f2fd589ff,2023-11-07T02:21:54.023000 -CVE-2014-7923,0,0,d1306509a063d334077ed7914700312210c7d99f6f2677aad63a30dea6737f88,2023-11-07T02:21:54.320000 -CVE-2014-7924,0,0,bc86d67629ba921c9affc6ce768352157eff6cf0cc8b1e21beaa15cd5e1f0e05,2023-11-07T02:21:54.787000 -CVE-2014-7925,0,0,587b0b61a018396d5d28cd7806a2fc4d8a62144ca7805e45aef44e396134701c,2023-11-07T02:21:55.257000 -CVE-2014-7926,0,0,6eb78fb3e288013a9b07858c84fdc1bbd1749a5dfacb67b9377ddc5b34a7ff53,2023-11-07T02:21:55.760000 -CVE-2014-7927,0,0,b7d8ab74ae2d893e2ddf14b5172fc746257636e6af932371847509bbf97352e4,2023-11-07T02:21:56.203000 -CVE-2014-7928,0,0,17537c0c35254a2d6881b57eb996d774d33c8d44cef7d762cb0687dcf4bb8a14,2023-11-07T02:21:56.580000 -CVE-2014-7929,0,0,177285b6c741b15e0aad30fc9342917a0110dc5ec9318eef3348f34a4d5455de,2023-11-07T02:21:57.003000 -CVE-2014-7930,0,0,c07b41f8c6fd15e7505a40b0a559b4c5435c989dba254ba6a1b9149751629256,2023-11-07T02:21:57.423000 -CVE-2014-7931,0,0,063a56368c64145b28dcbc1ba8c3ea32d9fc83ee66e0972da1b0a66065f4457b,2023-11-07T02:21:57.880000 -CVE-2014-7932,0,0,9be34b2cf5c2c051ba66b52ad380cdedb5a02146bd5ec182e31689a59b5eda6a,2023-11-07T02:21:58.287000 -CVE-2014-7933,0,0,8ebdea401570302d83fc0b20a6d165581835921f6c5679cc4c7f9d7b363c6db4,2023-11-07T02:21:58.700000 -CVE-2014-7934,0,0,70ea775de1d2a500391277ba956c3768b88bbaff2063ea8fa5ca66c0e15fb61b,2023-11-07T02:21:59.107000 -CVE-2014-7935,0,0,5911e3e1b25d47c8495d9453e7265db98c85eb08bac61f0d7beed7d0a6504c96,2023-11-07T02:21:59.500000 -CVE-2014-7936,0,0,a9077b112282f542b490bb1a3cb7d2f2068507be671a9528927e5c7b9529a78e,2023-11-07T02:21:59.960000 -CVE-2014-7937,0,0,e95c7d940d81018bb52386d70f92f4db56a6eeb5f510c1b214a2ee655fbfb949,2023-11-07T02:22:00.443000 -CVE-2014-7938,0,0,a2ce5e1c970f45efbf616b1e3426c893a5517643eba327a6f717e86e97232be0,2023-11-07T02:22:00.863000 -CVE-2014-7939,0,0,98e7f7e52180f067521e639b608d73f717dea2da086ada9d7bcdb3938ae1837b,2023-11-07T02:22:01.230000 -CVE-2014-7940,0,0,98b09617ae5ddc09cda1cef5bd4730cc32e04cb3b989d6b0a1eb1db29505a853,2023-11-07T02:22:01.640000 -CVE-2014-7941,0,0,9a8c31d4a931e14c6a1bb0fe5be72324d746a4f214d231f3bb27a20f61cdf352,2023-11-07T02:22:02.063000 -CVE-2014-7942,0,0,13aa4a9c09b0a4e73096d7e4d860f7e95ad704ecaf84d1d615168ad5bc5b539f,2023-11-07T02:22:02.437000 -CVE-2014-7943,0,0,b270713f46cf1510185807647289f7430b4edfee66bef91e4f7a8c3f544c8014,2023-11-07T02:22:02.793000 -CVE-2014-7944,0,0,b85a3f15dea181f6a0b0f0594abc39ac1cc1084eb9f1524a7dc11b7f182d3711,2023-11-07T02:22:03.240000 -CVE-2014-7945,0,0,bce660516ba8824b5c2ff62f5b24423e574ed2693304c8899eebd0158d144bb8,2023-11-07T02:22:03.730000 -CVE-2014-7946,0,0,05a1134fb6baca5a6582771b61a8500651b26c79e877b53d2177d06c861dc082,2023-11-07T02:22:04.260000 -CVE-2014-7947,0,0,98a20d7332262a697563eb0001a16d1080a11b6267b0d737e601d7e2ac854269,2023-11-07T02:22:04.810000 -CVE-2014-7948,0,0,bbf67d86b1096033d828a18da62e5fc39501281140d9923d4c92f027ab696fce,2023-11-07T02:22:05.237000 +CVE-2014-7922,0,1,da10921895f81162dd627da36a7a42fb25fb8807cffc2d5c2f23687b8e63f112,2024-11-21T02:18:16.230000 +CVE-2014-7923,0,1,1615bd86eae059ffe106de8fb8003a4c8905884959be6f51221613c3571c6d56,2024-11-21T02:18:16.343000 +CVE-2014-7924,0,1,031f6d7609484d82963933f754a0a8cdb675669ed9337eb951c0b6fb3487bfbb,2024-11-21T02:18:16.527000 +CVE-2014-7925,0,1,e6ce2fbf3254624ffeabd8cfd5321454f8004a51c55aedfb504c1db57e87eb7f,2024-11-21T02:18:16.650000 +CVE-2014-7926,0,1,4ffe0141b09a5bff67649b888ab3c509321776c4ed327ae72459d7a3e3db7fdf,2024-11-21T02:18:16.780000 +CVE-2014-7927,0,1,202c648eb3dcdecf856f88118d62d57d653d702611ebd78e385f745b620dc0ea,2024-11-21T02:18:16.933000 +CVE-2014-7928,0,1,ac246044c02022dab4aff33fa11b83313cbc69dae109881a3fb534031a0d6873,2024-11-21T02:18:17.103000 +CVE-2014-7929,0,1,697a3065106d29316ef9b5025c8b4d401aa2e5ad2170cff5a5b93e317b486dfa,2024-11-21T02:18:17.243000 +CVE-2014-7930,0,1,d614fe9412cf8b4ed68957e25b16da755264fb01da9066389d05531a3e6c1142,2024-11-21T02:18:17.373000 +CVE-2014-7931,0,1,1f9c54ee3c52ee9a2d229d0975757c63c51d0c30e33b0cd63f4e3e99c94342db,2024-11-21T02:18:17.493000 +CVE-2014-7932,0,1,8ff2f4e295b6938ca7542beabd806911572f5f8f5da6c1beafe2b8d02a77b943,2024-11-21T02:18:17.617000 +CVE-2014-7933,0,1,e69a3059dab22eceedbd0d1c13c8a130990b15c85a9b35bb67a0ce52896f20a6,2024-11-21T02:18:17.733000 +CVE-2014-7934,0,1,10f91c292acf65ebde0a0464a9cbc53d5dc4f139784ead87ba3a86bbc6a1a114,2024-11-21T02:18:17.863000 +CVE-2014-7935,0,1,63126d56010b5326743e4ffb37941380693e7d72a8f62d40e30a7ef97f821916,2024-11-21T02:18:17.990000 +CVE-2014-7936,0,1,10d26cce5847ff9126ebcbf3449602c3022d78b2a72adb83e8fcb186b03d48ef,2024-11-21T02:18:18.113000 +CVE-2014-7937,0,1,a60f138d04529fa41d018f495f9738214726a12c557f92e3d8ac70a636125cad,2024-11-21T02:18:18.233000 +CVE-2014-7938,0,1,722b9b9277755c976c74491bc6c972a8684b414f08661d39a39b31b7567b3c3d,2024-11-21T02:18:18.363000 +CVE-2014-7939,0,1,b0aa7d1d7acdfb6d1eb750b8770d62246c30df29a17978cf8138418745332ea2,2024-11-21T02:18:18.487000 +CVE-2014-7940,0,1,700a760858ada7b9acc95b8ff6c593b0c80cfc972a71f5f2459de0d79268a583,2024-11-21T02:18:18.607000 +CVE-2014-7941,0,1,063817a2da39ea2f3cc50306ec3ab4cae827e710dc692d246070955ac00ae31c,2024-11-21T02:18:18.757000 +CVE-2014-7942,0,1,7a09d1e6ddc3ff0fb7b65b48d8cc14b8f8dfe084bc513ba601a8aa60a9c179c3,2024-11-21T02:18:18.880000 +CVE-2014-7943,0,1,39ec499d58cc83d75fb82a90cd8c1c66c1b45d4340859b2063c8e1f745d0904c,2024-11-21T02:18:19.007000 +CVE-2014-7944,0,1,33887dd3ab610d7927284bd9fd3589ac49c4c14765fed99b883b2ab1ff093924,2024-11-21T02:18:19.130000 +CVE-2014-7945,0,1,22a79495dbf897598c252cd1f81c1717e9b017a4e118e13aae563b1ca1e39bd1,2024-11-21T02:18:19.263000 +CVE-2014-7946,0,1,bd7e804fa90af75915c22bd09d9459fba224c4dc5bc8107323c14e8fdf5a53ef,2024-11-21T02:18:19.397000 +CVE-2014-7947,0,1,a8a0ef81c646a46fc81f53c8507d27d6cf04cb92d3c1625be5e76298882adda3,2024-11-21T02:18:19.523000 +CVE-2014-7948,0,1,a5bc59ee9f46cda2c858210cdaea072436219b9b087e8166a9b15019d3b5fed4,2024-11-21T02:18:19.643000 CVE-2014-7951,0,0,beb8779a52652b95582a792bf3e07cafcfaad2115feb4f29080b3602c1d5da62,2023-11-07T02:22:05.750000 CVE-2014-7952,0,0,8d3d3043fd2826f79fcc0cc9f8dd48a6882a7fdea4117f4545a1e565c8178ae2,2018-10-09T19:53:34.620000 CVE-2014-7953,0,0,bb9412ab87c1f5fd2d7b3b12f6468a7881236261bb89842f9c5cc85d0eb91a95,2023-11-07T02:22:06 CVE-2014-7954,0,0,a4343759ece7dfe6fa8884718ce3555e6dc3d26ed8c70804c33d3d2ffbf5ee1e,2018-10-09T19:53:35.510000 -CVE-2014-7956,0,0,68e15458c505b82e9b612550ebe00f7afa105e58cf3320db2d5d735df5552bd6,2018-10-09T19:53:35.853000 -CVE-2014-7957,0,0,d081344f17361c6a77430d9ef1626516fc66acab51cff6dca0f35d589badd703,2018-10-09T19:53:36.167000 -CVE-2014-7958,0,0,acf3aeac8d7803c2854ccb863936ac72177d2b3005304dbe08dfdeb463b45055,2021-12-16T18:20:47.253000 -CVE-2014-7959,0,0,447de13a79e0acde2314c4e02f6792f1d163cb46bc116fd2d913324d60c1d28f,2021-12-15T21:02:41.447000 -CVE-2014-7960,0,0,77279a444fdb9ee62706663dae725386882054a6c3e8a98561f43a3041560024,2017-09-08T01:29:18.497000 -CVE-2014-7967,0,0,392ee4ff4148e01443926f88e0cf24073419d28c3e7090346e21a64a40a03cb3,2023-11-07T02:22:06.137000 -CVE-2014-7968,0,0,0dfbee2126afdf179c087912bc3b3c40ca06a62584d033cc6cdfa5687e03565e,2014-10-23T14:39:38.623000 +CVE-2014-7956,0,1,cd7f187cb14608e3f41e7361013a637dce5689483ac8019829d2001dbbdb5b1f,2024-11-21T02:18:20.340000 +CVE-2014-7957,0,1,b699344a15b2176d079bf3ed52a6ddcfd289df4fd8204e3b32b0f1c44bfbc844,2024-11-21T02:18:20.467000 +CVE-2014-7958,0,1,9b845dedf6dcb23a4fa32c65ef9a8d974610acca79b9d6bb1d90fe95856627d0,2024-11-21T02:18:20.607000 +CVE-2014-7959,0,1,07640952c5c75fdafbfa6dfb8f46eb5f4b386a3fa0b49b52d42db8eecb18ae64,2024-11-21T02:18:20.763000 +CVE-2014-7960,0,1,5b272dc38ebc0ec0f4f57c30e56782fd96f7a4760f9d917a544c71f228b140ce,2024-11-21T02:18:20.913000 +CVE-2014-7967,0,1,9b84361db1f5247fe13687a78b1d7d98d48ecde687f243f728a152fb4c70f81e,2024-11-21T02:18:21.050000 +CVE-2014-7968,0,1,6ac21fbae463408a6c5968ef3689c6dfd9c6f0906e633783ee3a4de94c76046d,2024-11-21T02:18:21.147000 CVE-2014-7969,0,0,5e19a0f1afba10574f95547350d34c482c78e0310fb1282b4eaadab06f6aa14a,2023-11-07T02:22:06.387000 -CVE-2014-7970,0,0,6c2d8ecae693dbdbde7e1d75f8b474b5099f3f05797c50c3a8d30ce9e3960304,2020-08-14T18:14:52.910000 -CVE-2014-7975,0,0,23470ba4c0d87347069cfb1f2a01e54ce59efa4bc5112f158ae95a0b806f9318,2020-08-14T18:15:24.977000 -CVE-2014-7978,0,0,03973e99452958abb6fde20b11fdda5d1b796232d99eae9de7992d338a3453a3,2017-09-08T01:29:18.793000 -CVE-2014-7979,0,0,4d50c0e691a34273c34d00316b5f3517d447fa1754911d886a0134753fe42049,2017-09-08T01:29:18.840000 -CVE-2014-7980,0,0,da8e9938e6c4a762ca22f58c422e504b0709dba9e594f488549d1c9ed1c4aa85,2014-10-09T15:47:56.947000 -CVE-2014-7981,0,0,9f8f49b8e264966dc9388081e3eedc423ec48e494c0e736ae221f7653c1ad93a,2014-10-10T01:32:06.653000 -CVE-2014-7982,0,0,37f1c8734ed454bb443ca6f71c1b36c662dba29895f9c25bec8adccf1a32bc18,2014-10-10T01:50:21.317000 -CVE-2014-7983,0,0,b167395d91c6dae10c135659638ac84849ced1c87dcee76b855b6f9517282ce0,2014-10-10T01:43:17.563000 -CVE-2014-7984,0,0,f9010c91f4c82b9c0ce1d6914bec06f9dc2c28eb320910922c5ab977e4dd5a6f,2014-10-10T01:49:00.073000 -CVE-2014-7985,0,0,95f9d75061156f732849f1b93272e5c215f2c6da7d9a76392e92b61bce5e15cc,2018-10-09T19:53:37.323000 -CVE-2014-7986,0,0,fc3abbceab2b894b8001ada8988b56a3decaf7551ce4b19c04beb1268b9218e4,2018-10-09T19:53:37.713000 -CVE-2014-7987,0,0,a0e747e07a59a5af7d66550bff0b285dd1c11f6ce3423297b8f4beecb689598b,2018-10-09T19:53:38.120000 -CVE-2014-7988,0,0,5f033d027f1e5115b27dd621e22128c54000dd0adb5742cc1ae150031dd36081,2017-09-08T01:29:18.903000 -CVE-2014-7989,0,0,cbfe5178ef896c56e066a0713f66eb5a755aefe0ade0667c7c000bd7285bafbe,2017-09-08T01:29:18.967000 -CVE-2014-7990,0,0,966478f8e15f9c4fc95773c2e83ce499958cff2f1781089a95d4b5ea6135896b,2017-09-08T01:29:19.013000 -CVE-2014-7991,0,0,df8c8f1a95a813c0de9f7cf8a9a67a4d9d5b929dbe20e372a96da09c59830727,2017-09-08T01:29:19.073000 -CVE-2014-7992,0,0,4621ca027dc2e154cea9a769aadfff54ca27cc79981d45b8b9c729f52809b49e,2017-09-08T01:29:19.120000 -CVE-2014-7993,0,0,3b2fdeacb38e048ebd71d249dc4c607ccba16e0fb27fbee8c6f315e1448999ff,2014-12-24T15:28:35.363000 -CVE-2014-7994,0,0,0df6118b13d5b91ed0ecf7de03f42b6a905ac07f6b1950debed126f0d80471cc,2014-12-24T15:38:44.717000 -CVE-2014-7995,0,0,3339486b85b8fc666f6afa30f64849dc73aa73ab2580f6728dab50355b5b5d71,2014-12-24T20:17:33.820000 -CVE-2014-7996,0,0,6f74b6f21a9ea45440b320c414a93671cd327eebfa55c78f37e3a98b7fcaf216,2017-09-08T01:29:19.183000 -CVE-2014-7997,0,0,7b8cf05e33a3f1f4492d621a51d586abeec5077834003856bac875c14087c150,2017-09-08T01:29:19.263000 -CVE-2014-7998,0,0,33f3e6ac9fbe17dcdbc74763881b8a329191aeff5e1e0b9e2e5643d9ae3f05b9,2017-09-08T01:29:19.310000 -CVE-2014-7999,0,0,6f9c8defb7d219bca4278d0c071d5973da956872331987b190cf3ee04551ff18,2014-12-24T20:17:49.977000 -CVE-2014-8000,0,0,2c66c9017f2fef07a63f6d2cb10cdc36738a6bf704723d72febf9cfe61499924,2017-09-08T01:29:19.370000 -CVE-2014-8001,0,0,f5a84cbc36fbfafe8b111d324ba0bfd6a09c11accccfd093ce1f811584095885,2014-11-26T20:21:37.827000 -CVE-2014-8002,0,0,5f0631d4401215aa28adedb9a0478f01688279d1a3d82977346f695755549c3f,2014-11-26T20:24:27.010000 -CVE-2014-8003,0,0,434baaf84cdfeb2835318197f44461d169fa81820ff013c432926d5882741f08,2015-01-24T02:17:29.593000 -CVE-2014-8004,0,0,d84993f3337d7f7d76bd24445ecc10dcd0ffda7cb38fad2abe3fc63179893e51,2017-09-08T01:29:19.417000 -CVE-2014-8005,0,0,a9e2be6cdfe65bbb0ca97f26bac896795f55451be24fb2564eb84465920c9250,2017-09-08T01:29:19.480000 -CVE-2014-8006,0,0,8fc137c22e55cfd80f277672b4f7fbcef976519c4902bde5e629c4e776571c75,2014-12-17T20:32:32.267000 -CVE-2014-8007,0,0,be0c871e5b8442ed72a830c38ef50d2aeb62971ca20b1fe0f3cff3a12f29898e,2017-01-03T02:59:15.437000 -CVE-2014-8008,0,0,70465d1abdfa99546742328aef6e810a1f0598c0ac7e3142b50f62ef9d835eb4,2017-01-03T02:59:15.487000 -CVE-2014-8009,0,0,ca897c652080e650c5c7a753ca2bf7d3606a2abebd839bd5caf92fde70ae5590,2015-01-24T02:19:23.120000 -CVE-2014-8010,0,0,c40618128439d8eab60e76dd99a0fa1a0dbed9dac77a4ea1cbaf08e728e28014,2017-01-03T02:59:15.533000 -CVE-2014-8012,0,0,f99cab46819231061dc8624cdca63e15e6d938377633945a813c8b668d8fcbc0,2023-08-11T18:54:47.730000 -CVE-2014-8013,0,0,fea1273157dc797ce9fcf4a51d29c6e36f744bf723f96ce37bd539b6ab363e92,2015-11-04T19:28:40.613000 -CVE-2014-8014,0,0,bc2926e495f2171e50be64715a3061e6224a0237614fa79c3435aa03c83e5911,2017-01-03T02:59:15.640000 -CVE-2014-8015,0,0,527d19b5afc2471e095fc41a4de39de0373defa9955d981b8c4f400c0c80f850,2017-01-03T02:59:15.720000 -CVE-2014-8016,0,0,df7b4b6bac7458c2c418d0ccf326f36d36fda10aff1671eea79e614cb563b1e6,2014-12-19T13:50:18.720000 -CVE-2014-8017,0,0,d5208fe30bd1f4901e69b9e80be56f311a20fa223fc2147c2ae59e140af0198a,2017-01-03T02:59:15.783000 -CVE-2014-8018,0,0,b546b7ddb1904a5775d11220c4423b0b3253b7b4edd62fd6baad88bced74dca6,2017-01-03T02:59:15.830000 -CVE-2014-8019,0,0,12ef58659f1163e212ac9261616fe9ad37ad9f3bff1636976d3721a2c45e5264,2017-01-03T02:59:15.890000 -CVE-2014-8020,0,0,39c5c4ca381d2620dd321f0547381d838729effc35c629892261bc0b52c0779a,2017-09-08T01:29:19.543000 -CVE-2014-8021,0,0,f2fa12ef06db66799522229778e5078b1c0c610a8c06a9a008e1e2d8785edb42,2017-09-08T01:29:19.607000 -CVE-2014-8022,0,0,3bfd43e378ca97553282efa838b7cb4ca83ef6db404c634bd2c0660701035e7c,2017-09-08T01:29:19.667000 -CVE-2014-8023,0,0,393c8ba7aeba245ed907abe44e11b1b986a36f93cf22b684dd160b386783827c,2017-09-08T01:29:19.730000 -CVE-2014-8024,0,0,2f12f4ffd710ba544d7ef642513a8f643c52277d9da37d9c85ddb301a3817b7e,2017-01-03T02:59:16.157000 -CVE-2014-8025,0,0,b7b35eeff5b9803e99cfa80a03fcd321dda1c2e4873371c34b7072d716b6c1b0,2017-01-03T02:59:16.220000 -CVE-2014-8026,0,0,cd12e5b2f9d9ee5f525083c861711d72ba3dda1de4130fd76f0ccb6bb45f1ccb,2017-01-03T02:59:16.283000 -CVE-2014-8027,0,0,c0ed5294235f624a4a207252e94aa2c9c72240dea6ceb7d9af1a86796103c828,2017-09-08T01:29:19.793000 -CVE-2014-8028,0,0,218266ce5eac415dac748a64447baf1f3a85cceae9a6620c834d382246b52230,2017-09-08T01:29:19.857000 -CVE-2014-8029,0,0,5f68eeaffe5beb57e7edeba12a200856e6f74e61db4743fa1c54a5f8bcd513bf,2017-09-08T01:29:19.903000 -CVE-2014-8030,0,0,07e235547e8845b5032678a8f2f4756466ef2c3e2a7474dd875a853de0cca521,2017-09-08T01:29:19.967000 -CVE-2014-8031,0,0,91f5fad1dff88236b9c55c06add38e974505896933050967abd75eaa4de952a1,2017-09-08T01:29:20.027000 -CVE-2014-8032,0,0,2fcbb4b0ea1b6db77a2cb7bd40fd3fc014c0b43c403577c1d574e7c679bd17a9,2017-09-08T01:29:20.073000 -CVE-2014-8033,0,0,506ebd134f9504a5cded28f4ed1b8bcf08bc4a7cc656b94d751a8c0996c2e9dc,2017-09-08T01:29:20.137000 -CVE-2014-8034,0,0,21c0f2c3daed7c9f03670e11a150179e13e6ba3f3807e8904e2165036bbc04ea,2017-09-08T01:29:20.183000 -CVE-2014-8035,0,0,ca312656e1bd3f42de8cd943d32e4019b9f434da460164bd0876ff8c34098867,2017-09-08T01:29:20.230000 -CVE-2014-8036,0,0,1fb43ebfde7d7a2153da8f23433819e02eeb32498d9f6aeafe6b3cb07663aef5,2017-09-08T01:29:20.277000 +CVE-2014-7970,0,1,e5bcfa7cf06da4fcce4326f8be1b7b11550424f203640c759d5694131673f22c,2024-11-21T02:18:21.293000 +CVE-2014-7975,0,1,4e024c76fdf386ab19469fd0b8870e6bd969fde18d5f1440038fea3a5bdb0139,2024-11-21T02:18:21.480000 +CVE-2014-7978,0,1,7a61fbefbe967e4a6114b7ad5ad5f946715530d9500dca122869d48c86f34ff1,2024-11-21T02:18:21.650000 +CVE-2014-7979,0,1,6391e5925524bd8ad3896bc8a6e7a8e58ff8dc243fe791adccffaf25717a1bbf,2024-11-21T02:18:21.790000 +CVE-2014-7980,0,1,933a08da1c82a00bf40dc0e19028bd75a1ce8d13b80fd452e4fd5295f9eb1f10,2024-11-21T02:18:21.923000 +CVE-2014-7981,0,1,f15cca6aadfd9fcd1ac9d69a93e6c89a59e6afff22d28a87764689c46af8f560,2024-11-21T02:18:22.063000 +CVE-2014-7982,0,1,900b4028c372d8f8ad76798b91abb9c5454a0d710dee3b1a49e9ef2f3771f301,2024-11-21T02:18:22.210000 +CVE-2014-7983,0,1,4ddae23a0cfafd8a5859494b581586a7ae82346ad624294b1318cdb6d5968ad5,2024-11-21T02:18:22.367000 +CVE-2014-7984,0,1,48ac602d1b8e9b153673fd5ccb4e02acc8fef4394845767ac1ba6ab9369d42e9,2024-11-21T02:18:22.510000 +CVE-2014-7985,0,1,0560d872f480e15988ce59c487b5c66f8d2cf9f99ba2ab57d6b9506cc12b266f,2024-11-21T02:18:22.643000 +CVE-2014-7986,0,1,94401ca2815fe970254b721accdbd1349020ce2179b4693bb1929b4415f03bce,2024-11-21T02:18:22.783000 +CVE-2014-7987,0,1,925c44d639e853900e771cb634ce969d283945a3a993020c6cb2ee3c8435525d,2024-11-21T02:18:22.927000 +CVE-2014-7988,0,1,2d1acd4e0e0a11e8a3279bed9293a5e355cf1dff20a3094933a022f0f0c6a334,2024-11-21T02:18:23.063000 +CVE-2014-7989,0,1,01a81eaa10826258aee6380a3d2aff73c86656bf60e8488894ddb9d23fdcbd57,2024-11-21T02:18:23.170000 +CVE-2014-7990,0,1,0b52420cbc9370038ca2ca80a878432f6da681cda0566c2f49f11ea5eefc73f7,2024-11-21T02:18:23.293000 +CVE-2014-7991,0,1,db53a035bcef982997bb5368a72b050f092b4e338c39b7644e386f0f6291d4ec,2024-11-21T02:18:23.403000 +CVE-2014-7992,0,1,11d139b015e90539f8fb7e0df01a20651b3f7b9b2c1c420f5f6adf5876f87821,2024-11-21T02:18:23.510000 +CVE-2014-7993,0,1,553d7ba5db7ff42f24e69c44bca37c6ce3d6afbfa1cfecff939bf63b70089588,2024-11-21T02:18:23.620000 +CVE-2014-7994,0,1,dacefb91cd92d412263281d059c018159dc160ec6ed2fc91b0d3cd2d891588c4,2024-11-21T02:18:23.730000 +CVE-2014-7995,0,1,9448c6ea8838558197e76c4cf3a83a12189b0f61e9e76d0790c7aa7b7886552c,2024-11-21T02:18:23.833000 +CVE-2014-7996,0,1,870acf781beb8ae1b47379ae335ae4568a4029600e7794418cf8cf35601ad696,2024-11-21T02:18:23.947000 +CVE-2014-7997,0,1,5f1c6bcce94eb1c509f0a6d5ccede0a7f8faaef4120c018f2c32d2f23698ba0f,2024-11-21T02:18:24.057000 +CVE-2014-7998,0,1,1c26e418444b346b583ca2079df4d15a08df15b4fa800ea19c45eecf318a95b0,2024-11-21T02:18:24.163000 +CVE-2014-7999,0,1,a7fbf8d5f1f63ed6b7cbaff6b9df3ffbd63e5fec2a6e08dc5c46ef57bed43ce4,2024-11-21T02:18:24.277000 +CVE-2014-8000,0,1,6e55466d4a187325add6c23111b98078e6665c9ffe01715397bd6935e9425e43,2024-11-21T02:18:24.383000 +CVE-2014-8001,0,1,bd0d880619d3f0d1c43342eb62900d7e69f73af3a68df761c79ee25b96d62283,2024-11-21T02:18:24.490000 +CVE-2014-8002,0,1,a609b55f8bb535dc69d0523a8f5de01cce7bda6e9bf16efb86a58f7ea771a01a,2024-11-21T02:18:24.590000 +CVE-2014-8003,0,1,964d3097bb71abd6e384c24bcfd75634ae3f510c7d0455296232178a2208bfc6,2024-11-21T02:18:24.693000 +CVE-2014-8004,0,1,b1f028713363456f497b210c6ba355477dea8c3e7fdb63777aacb10dd1da3ea7,2024-11-21T02:18:24.800000 +CVE-2014-8005,0,1,1c08b9d948e7263cd7940fb3f10909eaabb3dd954ebaaf0b4d5044c5b749f242,2024-11-21T02:18:24.907000 +CVE-2014-8006,0,1,56f1a5c1a6d7f96194b374fe07b60fc53ea88bae3dc07eec357112c21baa2d28,2024-11-21T02:18:25.017000 +CVE-2014-8007,0,1,76e279145e0fd2ddf272701f0634201059dedcf9d1493f3df7efed8ea5846160,2024-11-21T02:18:25.127000 +CVE-2014-8008,0,1,173831989183684c7170d884947dadec1e9e6819f7138f40a0bbc686e99f9bd4,2024-11-21T02:18:25.240000 +CVE-2014-8009,0,1,2f82603505de43e69e756c8d8e309f1ad9a58f43fe63c752433ccf79dff5946b,2024-11-21T02:18:25.353000 +CVE-2014-8010,0,1,d42a072566ceb00bfc8c29d2390273c3bcf8a704b161e7ca0f4371ff370e2104,2024-11-21T02:18:25.463000 +CVE-2014-8012,0,1,70fe40f49f18e18ff2f2c416e437d295d900331799a7e0e6d277044fc1f195dc,2024-11-21T02:18:25.570000 +CVE-2014-8013,0,1,238b9a273e2b41474961e03c93f091842c3ea826e39d1b9bdd58b4ed144c864f,2024-11-21T02:18:25.680000 +CVE-2014-8014,0,1,31e54472a445898610dd25412834dc7e7705cfcf425741873589f0d7a6b2cfda,2024-11-21T02:18:25.797000 +CVE-2014-8015,0,1,ab4bbbcbd298b6b050eae9aa9a22ab870e0f9281193ed9eca49222b42c9e9d3a,2024-11-21T02:18:25.903000 +CVE-2014-8016,0,1,a84f1ed7b4fdb52b3bc706cb76ab281422776c947986406dc4295486353fe21c,2024-11-21T02:18:26.007000 +CVE-2014-8017,0,1,e8420871109fff74e0c83011797cce19f90d2d72fe85cdc085f9cc384467a54a,2024-11-21T02:18:26.130000 +CVE-2014-8018,0,1,daa6d32e7907c61bd934d2695d4bfc7adebe8c64af66a37a371be81685781351,2024-11-21T02:18:26.240000 +CVE-2014-8019,0,1,b9e6e8d8c75f90716510a5a120fd5ab680d7d6fdc9eeccf044bb3cef7208cfa4,2024-11-21T02:18:26.350000 +CVE-2014-8020,0,1,0c98fda6f51f3b26dbddab61d620450ab1fcbded41fa934dc7150f8057a1ca25,2024-11-21T02:18:26.453000 +CVE-2014-8021,0,1,7d46871f3fc9802daa63cbb941c58324f3c06317b2ded7d9cbc9cfa4c47d9eeb,2024-11-21T02:18:26.567000 +CVE-2014-8022,0,1,18a1daf463b293f3c717dc45fbe92a85d1650d22d228d4dc2e1ba760461faf9b,2024-11-21T02:18:26.677000 +CVE-2014-8023,0,1,42a848c1502fe7174bdd713c6887e694a5c7c2d4b1206d7c506b4f45d0670cab,2024-11-21T02:18:26.787000 +CVE-2014-8024,0,1,54f53f4e7b127fa0482a3c3e79c9a16c31c1c078c9625891cbd9abc5c9e0d6df,2024-11-21T02:18:26.897000 +CVE-2014-8025,0,1,2a969e0754188f586bcbef6e59a1df48721330f8ed76336c499892d436f181a1,2024-11-21T02:18:27.007000 +CVE-2014-8026,0,1,e38baa5b6aac37c090f630f655f840ee6ea76f6fac22cac6c248c0467c192b2a,2024-11-21T02:18:27.123000 +CVE-2014-8027,0,1,9c285605c7920a9a46ed4945ef045e82f74470506b93fda9ce5d4ba6a089e4eb,2024-11-21T02:18:27.240000 +CVE-2014-8028,0,1,875a769cf70b6ce3361ddef9b0c6b94c5c40688b22f4a2bae25ccb646d5db951,2024-11-21T02:18:27.363000 +CVE-2014-8029,0,1,db2872c6c09942bfd1c97b26a6297e3490d09979e52bfbed1d7a650dce1b7050,2024-11-21T02:18:27.470000 +CVE-2014-8030,0,1,8c075d1a20ec9a854f26f6d1c493e20515ed903553976834761b8887b5f7fd4e,2024-11-21T02:18:27.573000 +CVE-2014-8031,0,1,b88a6f06347433ab9c5e6e30bd88129c849152faa9312339eae28ac4a5a8dbf4,2024-11-21T02:18:27.677000 +CVE-2014-8032,0,1,ca58f517c90dfb60c7fa9b85944900db47c515dfe4c36813824606ba2b1bb7d1,2024-11-21T02:18:27.787000 +CVE-2014-8033,0,1,2f4a4aeef194e656d89fef97929a2434fe04b93baaee68e43012f349bc03d592,2024-11-21T02:18:27.897000 +CVE-2014-8034,0,1,a4d3455696d04b4582baaeae03ce622c1d6f2c89119604bd0affe1a53eff2036,2024-11-21T02:18:28.010000 +CVE-2014-8035,0,1,2f221c07c552be0172e284d881b3ba69d04427d2ff807784bd752258bb238b90,2024-11-21T02:18:28.123000 +CVE-2014-8036,0,1,b2952d5bbd8c8d5fa0f875d41da10de9cf89202cf68270c2ecbcda80e5cb31a8,2024-11-21T02:18:28.227000 CVE-2014-8038,0,0,8994a7386ce28bc0494d99684158bc211cb5527db716022c6e98553101a1325b,2023-11-07T02:22:07.033000 CVE-2014-8039,0,0,b91fe6904f93c564d81ace32bfd7dc2b3d7cf834b7dfca3d783ce0c18a85fab6,2023-11-07T02:22:07.250000 CVE-2014-8040,0,0,05f26626ad86f8d06f740ca85afe87628fdc2d32455d12730526168656bafc21,2023-11-07T02:22:07.537000 @@ -71809,112 +71809,112 @@ CVE-2014-8064,0,0,47cbaaf47d17ce99afae9643961e658925804cf13496d34acd91b03491de03 CVE-2014-8065,0,0,eb1738f70c1429fa221a69ff1d004f9c09124803de8404fca901bd2e8907b2f7,2023-11-07T02:22:13.690000 CVE-2014-8066,0,0,9cc225dffc072c1db11eb8596ae3bfc030a2832975ad8cf1d02060b31da16925,2023-11-07T02:22:13.960000 CVE-2014-8067,0,0,50144b52c5e0bda90d310454ad432b72888539f4603a9d02b8a81b6e45626eaf,2023-11-07T02:22:14.193000 -CVE-2014-8068,0,0,d26ea02a94009f98ee2e7170632ca440ed9c26576ad595c4ad457500841ce9b0,2017-09-08T01:29:20.323000 -CVE-2014-8069,0,0,07f95cc334c9c3d23f710e1c1c570cde9b0ff87ac00d1aa2b8b2b9f62d9b91b2,2014-10-21T18:00:57.057000 -CVE-2014-8070,0,0,1b4ea43ed1bbc32e9cae05e4375d2357dcdd1a3bd3b6da9f755d0fcc594d401a,2014-10-21T18:07:20.157000 -CVE-2014-8071,0,0,605ddd5532f20ab4967b65721f214a303339fdc6d88fce05ed15663729c7c6ab,2017-09-08T01:29:20.417000 -CVE-2014-8072,0,0,12e63dfd2b34010817f570741652d055e5f09076c0ba64266cd65c16ebdb2e4c,2017-09-08T01:29:20.467000 -CVE-2014-8073,0,0,bcee27cee23e1322a9a7bb3f310f8cc87f7d5d4f49d07c852bf34ec1c0e9f6fb,2017-09-08T01:29:20.513000 -CVE-2014-8074,0,0,1906ff43cea938b2ec1e3f04d4824c68761a276732cbcd270bbe54b92e052751,2016-04-04T13:15:07.937000 -CVE-2014-8075,0,0,8605bd9e292c70d2759d532249c1548e1ee2fa3d1a99260ef71d7232695c8c00,2017-09-08T01:29:20.573000 -CVE-2014-8076,0,0,d05f91686360213759aea9ab7b5b00a4bcfcf287cc7bf1789a5dbaae3dfc6de8,2017-09-08T01:29:20.620000 -CVE-2014-8077,0,0,085ae8e290e00fc5f15a7dc02aef6191221d970edf817c49f6f418005a0e8c5e,2017-09-08T01:29:20.683000 -CVE-2014-8078,0,0,3c6a9b6f429c818d008a66b6d605251b6d4164897bb186af72f51b3e0bd55eef,2017-09-08T01:29:20.747000 -CVE-2014-8079,0,0,dff99141e9113c3e16dc567327b869499b4cd69ccf33e18590b312cd0adf8b4c,2017-09-08T01:29:20.793000 -CVE-2014-8080,0,0,d3256a59e477e0ac5531454c4d4fcd80633722e9d034763cced42413385a17d1,2018-10-30T16:27:34.687000 -CVE-2014-8081,0,0,1f54f2d64277206aa70b7991f530da463e3023af348e70c30b8d276cba480ecd,2018-10-09T19:53:38.510000 -CVE-2014-8082,0,0,7ac2d44ceabf5c2b5d1ebf6d7438992918ce28d94fdae8de52ade8993fd438fe,2018-10-09T19:53:39.137000 -CVE-2014-8083,0,0,3d03d3682a9fc70220f10f29c5abf0cc8eab19c397e6ed0eb1669c687b9bad03,2018-10-09T19:53:39.807000 -CVE-2014-8084,0,0,16194e90e8a107c32dc0f120bdd861f02bf15ae2072e951a926a484954446456,2018-10-09T19:53:40.277000 -CVE-2014-8085,0,0,e685676684a3791c0d62857164ca95ed67a26c81eab7f1c86f296afd36c53da5,2018-10-09T19:53:40.760000 -CVE-2014-8086,0,0,da353a8f23216ad41920fcca29247131644a5df4d33b38f8fee312b90b878640,2020-08-14T18:16:04.350000 +CVE-2014-8068,0,1,e013e10b21a02d38e7f0a75f90bf628c391c38ab7cdbafb17d89c43e954f2d98,2024-11-21T02:18:28.743000 +CVE-2014-8069,0,1,c02072e31ee2c1b589e0b9b599aa27df61fdfbea70fef9b6336c4f09e8911fa6,2024-11-21T02:18:28.850000 +CVE-2014-8070,0,1,e186a37627f9e6b68208e89b077ca542a3795b31467eb9eac439dbd944e2d015,2024-11-21T02:18:28.980000 +CVE-2014-8071,0,1,570333ff01afb8399f769dba60b539487b693b5f7b5bd8c7d241844254ac5954,2024-11-21T02:18:29.117000 +CVE-2014-8072,0,1,a191194eee4c8ee705cefa284e338852546af7b700d6c7548797700fdb8ecc68,2024-11-21T02:18:29.257000 +CVE-2014-8073,0,1,2bd86abf00d07fadb39eeba01bf7c93b872549d3a2591723a5fdc744d8680fd3,2024-11-21T02:18:29.397000 +CVE-2014-8074,0,1,d88c6ca9f51499793af1853154406ab448af0afc7dbba833265f1f01b1b0e044,2024-11-21T02:18:29.533000 +CVE-2014-8075,0,1,ed29ca76dc17ede927758943bf41af8cb6dad444f98fce8de55a0879d62e8ac9,2024-11-21T02:18:29.670000 +CVE-2014-8076,0,1,504339f6ba410365b1d153006bab484431b82c173b0ed7b42b44d85d0c551aee,2024-11-21T02:18:29.820000 +CVE-2014-8077,0,1,ebbe3cec7cb9a01bd5d061dfc4023781d1549525045b873a3763ec86ee047b95,2024-11-21T02:18:29.967000 +CVE-2014-8078,0,1,4e8762f981816c66d348752932344846c870e51632e7b8e8965d61f81ca6c133,2024-11-21T02:18:30.110000 +CVE-2014-8079,0,1,031558f30ff158abc1196cbb84d58204b18b7e6f28b252a448e57caa8dcc21e9,2024-11-21T02:18:30.257000 +CVE-2014-8080,0,1,bf49a4d04d545129e7e9974c64fae0e8f13c83a6787bc03162b13d20220d761c,2024-11-21T02:18:30.393000 +CVE-2014-8081,0,1,627cbed0fb7ec1bde0bd6b8815514fd358ab510b44f0c5a1b96aa1f3a9deec52,2024-11-21T02:18:30.563000 +CVE-2014-8082,0,1,73af654c1f16f64fefda461245968b524a7a7023b9f1e537633d7ee3644a1e85,2024-11-21T02:18:30.713000 +CVE-2014-8083,0,1,c50a0cff6c3749897372bd5a6b30c77a9849a1b306dd71a24d48503387d572fd,2024-11-21T02:18:30.857000 +CVE-2014-8084,0,1,81da33712f1b9697b66a4478f904a5451d71a778296def55cc1291c454298d97,2024-11-21T02:18:30.993000 +CVE-2014-8085,0,1,fb01d7f1efc680f6b0264b525311ac176a75da88ef06a3f724f12d9ac5355fc9,2024-11-21T02:18:31.127000 +CVE-2014-8086,0,1,f6d969010a3ceea21987466f86c4d6023168fa9fd8c104dc54278a1a2762e65b,2024-11-21T02:18:31.267000 CVE-2014-8087,0,0,7a5a7f9a91759c345accf337193ae8d23ba10e357606a6fcb977f3d58043d2f5,2017-10-25T20:07:25.047000 -CVE-2014-8088,0,0,2687dcbb1872c1b0dc4ec876e41420f261db359e3c8948ddaf95aa985b15a95e,2017-11-04T01:29:01.270000 +CVE-2014-8088,0,1,8ec676b0f54958de1be57ac058164f1ef1d94abd51c778d77e5de1f2882f96f9,2024-11-21T02:18:31.580000 CVE-2014-8089,0,0,35a6599ea135d3a4f1d42638017c69daf0e9dbe296d72f654804ec46d5450cf7,2020-02-20T15:04:53.720000 -CVE-2014-8090,0,0,90e01ce0626f5cdc8c7399963691ea3fbf024e0ce4d188d4444034f53efd11f7,2017-01-03T02:59:17.017000 -CVE-2014-8091,0,0,6740be736e4c885c774e291f85141cdbfbd78ed5e1822cd4777d8b94b11ef991,2023-02-13T00:42:37.047000 -CVE-2014-8092,0,0,830b71f1571888dbe791afda54dfa962bd2528a61065d83c7fddd2c3097b66e7,2023-02-13T00:42:37.457000 -CVE-2014-8093,0,0,a9ddd05583c1eab3f9261f4cb3873f1fa7bb6bcd16d671387b443bcf28781ef7,2023-02-13T00:42:37.837000 -CVE-2014-8094,0,0,f6dbcbc3df50416d4dc3490337b30f506f6a4eca77aa065be627c13fab104e78,2023-02-13T00:42:38.443000 -CVE-2014-8095,0,0,cdb47098e76297510dad1840906ab18a74b6dd7ce4c76b59a8373dd77b45ba3e,2023-02-13T00:42:38.590000 -CVE-2014-8096,0,0,fcaca0d3cc3a77a73849ac2d4b4b45caa83cca8e6b17222c403b50e751108a3a,2023-02-13T00:42:38.713000 -CVE-2014-8097,0,0,c07ed69ff75f632e902cee0629d28b7a65031fbe387060a754094261493d1ae1,2023-02-13T00:42:38.827000 -CVE-2014-8098,0,0,2cc5fb42b85cb11ee6fb5fa4c1b17a8832bc81fad3deeb325e639f78e1bceb95,2023-02-13T00:42:38.947000 -CVE-2014-8099,0,0,5c9032a1109d61b065d6a5ac6e951362e0a92be4231575362abbbd2971c97bf0,2023-02-13T00:42:39.540000 -CVE-2014-8100,0,0,6003ea572b7b2a2681c699efc53cab887d0205ea2dda077b85eeba6bfe5d6230,2023-02-13T00:42:39.663000 -CVE-2014-8101,0,0,1f6215e7a86ddace230360e269d5e1d206f5879ffef4cb44aa19272f5c459ee6,2023-02-13T00:42:39.790000 -CVE-2014-8102,0,0,b36237e9cbb521b817868542aad6239798d31d64c696802f87e6bc5ff906e95e,2023-02-13T00:42:40.290000 -CVE-2014-8103,0,0,c0312ef99139ac1f4f03fbed82e8563a941ae3a3370c9c7088a97ab085a8b1e1,2023-02-13T00:42:40.393000 -CVE-2014-8104,0,0,ae147d6d4e40f71644125776ec277e564a21b989f0f2d78669dd6e36d843a47a,2020-05-12T14:21:35.453000 -CVE-2014-8105,0,0,012c49730861decf0f11ad46d85a8d6082a3931d16647c59b5ea490e45bdf9a4,2023-02-13T00:42:40.520000 -CVE-2014-8106,0,0,9f1c3e8a14609b8b1c319adcea09b09a42b953b1c404fe1030229f36471ad2d8,2023-02-13T00:42:40.813000 +CVE-2014-8090,0,1,4e7b23725f5ff1c7edf27bc15df1f5433d710012f14b8cd47b394167ea872752,2024-11-21T02:18:31.870000 +CVE-2014-8091,0,1,123fa1aaed4c6f0fc315990860c46d2883e1b7ad8348ef51030fddb4b8d88344,2024-11-21T02:18:32.013000 +CVE-2014-8092,0,1,2ad611414b4b8f2bec9ea773d7d10af5680912e7d33c03db7b5bf2b7509334bc,2024-11-21T02:18:32.187000 +CVE-2014-8093,0,1,2bc62c6f48e9caf0d9a4686d986551577fbaaa23960edec6ee762c20eebb451c,2024-11-21T02:18:32.333000 +CVE-2014-8094,0,1,29b9191368ab17c8b92fe87f0c1d628ca0f227b20a3b2c4908435b8af86d97f1,2024-11-21T02:18:32.497000 +CVE-2014-8095,0,1,93ecbfded3f5b8b24ca1c8e89ba0b5fc14b9ce0702252bfad87c93b84ba95628,2024-11-21T02:18:32.650000 +CVE-2014-8096,0,1,7eb7e1963ccfc8f7f3783695ea330798d82f34c99151124e3a11e175486a4b41,2024-11-21T02:18:32.790000 +CVE-2014-8097,0,1,ab66a8bcd27d270cf8f0d9412e1718285c65da2cf1837531dd395431accfc4e8,2024-11-21T02:18:32.950000 +CVE-2014-8098,0,1,05a83cddbc5780881520499c661971ff611efbde0ebd6c4065d41c9ff36c9b10,2024-11-21T02:18:33.093000 +CVE-2014-8099,0,1,78761642ed12cbd75cbc13b830ffb2cbd0b745e99e6017d01998eb04fb44d10f,2024-11-21T02:18:33.250000 +CVE-2014-8100,0,1,9858daf80c247c52345ec0972c8b8c80c0930d8fa893256416cc50c81101c12c,2024-11-21T02:18:33.387000 +CVE-2014-8101,0,1,595acae4ce280be2a75a84f2f1749a73901d5ea326411563aa7fd54aa151d870,2024-11-21T02:18:33.540000 +CVE-2014-8102,0,1,d5f03d8312d303299df1c8b76437aa091b169e792b4f746c8e944cdbab92ca3e,2024-11-21T02:18:33.680000 +CVE-2014-8103,0,1,60852e4f97a3776f12514b7a8df0ca5deaa7f6dd605c3ce9ef34b0bf3e47c54b,2024-11-21T02:18:33.827000 +CVE-2014-8104,0,1,a30116599231490afe32d83a90feef9398a133bf1b4a297695844823863a908d,2024-11-21T02:18:33.943000 +CVE-2014-8105,0,1,625aefe97271f0b9b1b527b3a2ccf12d45737fc25e400b4823a2e039281dcdbe,2024-11-21T02:18:34.077000 +CVE-2014-8106,0,1,f7aebc67c3fe59fa34cc46a55bee2bae511d78b207cd1d867729b8276bfa7ff7,2024-11-21T02:18:34.197000 CVE-2014-8107,0,0,d1ae159a3785f1b18d366983f04c37d746a40f1c4c7ab598d1a382b42d046c27,2023-11-07T02:22:14.800000 -CVE-2014-8108,0,0,d01ccf4ab8e0aa1c293dc94ecd7a4813b164cc12bcc751e3e1a38f2c34e1d673,2017-01-03T02:59:18.097000 -CVE-2014-8109,0,0,80d1a75d6ad5058d826fdad366c5fca078b28367c9789106be7faf3654c70c6a,2023-02-13T00:42:40.890000 -CVE-2014-8110,0,0,86dbd4e25f651c646d83eb18558e406c32428549bc0513746e59d9f038b24cd4,2023-02-13T00:42:42.083000 -CVE-2014-8111,0,0,3377338df151e8ae4fa9373468a5b9f6cf4da26176057d97457e1ef6e1a6cd2f,2023-11-07T02:22:15.097000 -CVE-2014-8112,0,0,42206142f99d837e85a5b5b2c14f70d15cfff2dc40bc890e8c7a0b8ef7d9ecad,2023-02-13T00:42:44.870000 +CVE-2014-8108,0,1,45d72542bf269a4136505ec1ec8038038abb76a523f684fa93d725aa9ef969ac,2024-11-21T02:18:34.343000 +CVE-2014-8109,0,1,a1f800bd66ccff5559577007c2225ff3bb9b48b4054fbc1065376bf90c3dc048,2024-11-21T02:18:34.483000 +CVE-2014-8110,0,1,8f40c7e0d25400412c10b17305562e1f594ba4272bbd05649dcd9660bbdc61e9,2024-11-21T02:18:34.700000 +CVE-2014-8111,0,1,49a8ca5c9241fddfd020e31deb6b45efd45125d3220a910325b62e50c7634f26,2024-11-21T02:18:34.823000 +CVE-2014-8112,0,1,9207cf89a993c1a3d3204ba73d504a2091d8d5fc1deaec6ce815dab118c004c2,2024-11-21T02:18:34.970000 CVE-2014-8113,0,0,313da64d10ac879b32e84b6fdd444e81176e8b32579d55395a2b1661644d98b0,2023-11-07T02:22:15.203000 -CVE-2014-8114,0,0,74b17ddaf78e893431f9ab99e4a62249f473ae4032c5f3a554e74285549f27dd,2019-04-12T19:29:00.223000 -CVE-2014-8115,0,0,58e2e7fffefe531845f705eaa6ba5b16a1a294b277c2a37ca37a018fbf05ad69,2015-03-23T16:53:32.317000 -CVE-2014-8116,0,0,a27eb27bb38a968fd1ca42854d0eb1a05646c0d3b984ff5bebf76dc96e8bd328,2018-01-05T02:29:54.040000 -CVE-2014-8117,0,0,07b3571fa06f43a3ad1a02da355e60bf68f0a31e81396f05d9ccdda4ca5f396a,2018-01-05T02:29:54.103000 -CVE-2014-8118,0,0,1f048e4f1bbef412785fd826960333233a5a41f732e32014e5699a8c2a8f8b4e,2023-02-13T00:42:48.030000 +CVE-2014-8114,0,1,9e8e2dfb4d07b3f95c342c12b026789b26dfac5512369e9f468ba1681b10d8ed,2024-11-21T02:18:35.133000 +CVE-2014-8115,0,1,2c6c159539d914ed512e47cdad839177a1a2cb7293721d8ddd91eda8e0aab9be,2024-11-21T02:18:35.253000 +CVE-2014-8116,0,1,71d58f90b85c26a473acd9dd1aa8bf343aa3bcbf0b8a87eda2f8d3d471aabea4,2024-11-21T02:18:35.370000 +CVE-2014-8117,0,1,14848324562d7b51f2e610d0e365ae1ecee875ff0ce1537db4846551b0b481b8,2024-11-21T02:18:35.520000 +CVE-2014-8118,0,1,6d857e9dfd504526638119987d48c270d09077802c446e7e83ac4b16da5fe2f4,2024-11-21T02:18:35.663000 CVE-2014-8119,0,0,12f0f74b647c22a35d4c6b3229c9043921eda93f46c87eb0bfebe256498eb1ad,2019-04-22T17:48:00.643000 -CVE-2014-8120,0,0,552b538e31b54fe9d561a42d94aa8c701508e170ae77aede3961d16dc6a3ca05,2023-02-13T00:43:11.030000 -CVE-2014-8121,0,0,3f03f5593e8516217833f1cb54082c2d1bf4df4097e98d64fd606a9c8928b5c4,2023-02-13T00:43:11.447000 -CVE-2014-8122,0,0,0e46b0fc788aa3a0ef9049fbd2deae937ad8753a1979e774c557d1903d29b7aa,2017-09-08T01:29:21.263000 -CVE-2014-8123,0,0,a146dd99839ed4cb890a68869630ead6772a395454243edbea06a4557b6ea5be,2014-12-05T17:20:14.730000 -CVE-2014-8124,0,0,92eacffc6b87468ea48084ba35a7046b2d05fc35f21403dbfd00bb31750eacd2,2023-02-13T00:43:19.807000 -CVE-2014-8125,0,0,71d1a7b2daea1e0ab37109340b644172fba9eb265838042ed8e1f84b5f674677,2015-05-26T17:56:16.943000 +CVE-2014-8120,0,1,28f3f337c3f9a9cd9dba3c1989ca34da886eb31e88ad8623ca8f6d41f0403a92,2024-11-21T02:18:35.920000 +CVE-2014-8121,0,1,ca338b215c9681d558de918e75951dbd2f58ef5ac0ad6b74852f5ef01ae32a6d,2024-11-21T02:18:36.023000 +CVE-2014-8122,0,1,a863d581e8a83a08e987f345b3fec112b06a4c43466332094bcff3d8c8bdcadd,2024-11-21T02:18:36.170000 +CVE-2014-8123,0,1,00de8d8bca1e3aaeca238bfb3640deab51bfaf7633de8d120b73b90586d39819,2024-11-21T02:18:36.307000 +CVE-2014-8124,0,1,2dd6010d03e3c4bc7234bcf610416339a72c9c94efaa374ff37b16145ae5b8b4,2024-11-21T02:18:36.417000 +CVE-2014-8125,0,1,dd7637d22047cddd4bc4271f9f66834a8b8ee947cf3ebe7746d9b0e755db3407,2024-11-21T02:18:36.540000 CVE-2014-8126,0,0,fcd34fae6cda22bf131951ec4797656982570041636140e02f2d62b380a44ad9,2020-02-05T16:24:38.887000 CVE-2014-8127,0,0,2170af3aff9ea471e0fe8390e0f379ab3cfeddaaa4fc75c583fcb30c2a5a4986,2023-02-13T00:43:20.217000 CVE-2014-8128,0,0,bcd1757590f68fc1ef1d5b1d12ff7f17aab758cceebc45780afbd2c42f883b46,2020-02-14T18:17:13.817000 CVE-2014-8129,0,0,90a1cc02b5e8f717becab03ec4529b84bb3adb683ed06105a7cc0d63c45ee89d,2023-02-13T00:43:26.640000 CVE-2014-8130,0,0,9285aae022d3a93f1f4f1b0a8d8e889353fce34f2c60a62b377ae575229c6f92,2018-04-05T21:07:22.410000 -CVE-2014-8131,0,0,711d08e9082604327a267c459360a8844a7fbf951301cb9a8f2cc296d5caeecc,2015-01-06T18:57:12.013000 -CVE-2014-8132,0,0,75ebce0eb0c398d32cd4d3e846a47d60593b484469e62fb734505c8dc50b3ccb,2018-10-30T16:27:35.843000 -CVE-2014-8133,0,0,4bae6a12f8ee71a05a23f089dcc1a306814f85b7af4b09779926f1c72000f893,2023-02-13T00:43:26.857000 -CVE-2014-8134,0,0,e7501363bcaa75ca5eaee348d54ce3fb33071778f7ea5cf84b922f59f030004a,2023-02-13T00:43:29.740000 -CVE-2014-8135,0,0,200953b4f341a0e655ddccb8c7d34e49075c8c35461febc8cb9f55b4e5786db5,2023-02-13T00:43:34.073000 -CVE-2014-8136,0,0,b08aa5e39644ddebc05cbc70e8c6d491815489b7c049367237538689cd0c90fe,2023-02-13T00:43:41.873000 -CVE-2014-8137,0,0,211f8ec310d4dced317b41a0911234a4b59c42145b8c212fff689a1a601d91e4,2018-01-05T02:29:54.243000 -CVE-2014-8138,0,0,c29adb27fffd3010d0d31cac0352ed75a503a952e98df9845cf0e3610393bb68,2018-01-05T02:29:54.337000 +CVE-2014-8131,0,1,0e36458326942a9688ddc5da6ea745b04a789f249dadaeee4800211b0362dca1,2024-11-21T02:18:37.353000 +CVE-2014-8132,0,1,5913611cf0fb5da4644bac93bf79cb77bca5d955e76f8aca3bef5e70289f80cc,2024-11-21T02:18:37.503000 +CVE-2014-8133,0,1,d4372c3926f43c57b47cc1a3788e54479e0ce560d8d7c5761bf602a525a11dbf,2024-11-21T02:18:37.647000 +CVE-2014-8134,0,1,d49f9cfc99cda393ffb16378005ccc46f887973e76e0832e15e165e324512f2b,2024-11-21T02:18:37.820000 +CVE-2014-8135,0,1,f92c8e92462c1318d04fbec97e6fd208a27d9d04202171057970943fc5435a10,2024-11-21T02:18:37.960000 +CVE-2014-8136,0,1,3efc7320774026f5640a2a5ca7d19fa281bacfa926d87d7869cd371b6afbb87d,2024-11-21T02:18:38.067000 +CVE-2014-8137,0,1,ee28b71a25e0658d4e13ff119a276e510a23946b5468ffc11223e2657f50c38e,2024-11-21T02:18:38.190000 +CVE-2014-8138,0,1,f1c556c987813c48de6c51f3cd6af75239bded2a7f3778a638db94feba3ef2b3,2024-11-21T02:18:38.327000 CVE-2014-8139,0,0,5f29c1951cb14ae40247774c5afe842748a870219f83753ee63de411a28189f2,2023-02-13T00:43:47.090000 CVE-2014-8140,0,0,c57b93a2e1c64aef66e8d2e35c6652c023af0aa785196b0c925f98ba18f2d5ab,2023-02-13T00:43:47.870000 CVE-2014-8141,0,0,f68bc18b9f81c635c6620bc5ef6ba9d121bd16f63598efad3b050536b455571a,2023-02-13T00:43:48.900000 -CVE-2014-8142,0,0,52a1d5147b42a00a279cd59413b13facb6a206694632ffd2fc35a565eca4ae63,2023-11-07T02:22:15.750000 -CVE-2014-8143,0,0,4725d0d746c817c78934fb8fa3c5858654bae2713c993e1ed7603567f60d3f92,2017-09-08T01:29:21.340000 -CVE-2014-8144,0,0,b94b3b3ed2a30a5f0e02726a62acd984c09e55a73c5bd3e53306a0f52327ef9c,2017-09-08T01:29:21.403000 -CVE-2014-8145,0,0,bd53d15621a2ce38414fc1717e56a66259a858a66de38e4819e8d444be78271f,2019-03-01T23:17:24.297000 -CVE-2014-8146,0,0,9c52563d2058568925c0e396db8088700aaa7d9eec2a88cac24488cd945d2952,2019-04-23T19:29:19.757000 -CVE-2014-8147,0,0,593cd0bfbf3c28c8621fe02af0c48fb240b67d27a174ad83ae852233844550a6,2023-11-07T02:22:15.890000 -CVE-2014-8148,0,0,4c56a77e1aaf3d6abcd1aed7e5fcc65469a01236d884c3b2fdd839382e4f7ec1,2018-10-30T16:27:35.843000 +CVE-2014-8142,0,1,16c77bb47e99e9c8ef37cf540ca1a8bd95a73c0868000ea2ab17b2a3131023ed,2024-11-21T02:18:38.793000 +CVE-2014-8143,0,1,41489e08be606984bba00d1703f2486d02588dff32f3e923f34685995b2a6785,2024-11-21T02:18:38.957000 +CVE-2014-8144,0,1,08314dc822b93257bb9116aedcef4cb41e352b6c7dfb04409d1afae19781158f,2024-11-21T02:18:39.090000 +CVE-2014-8145,0,1,b27d62c0c1145f63353af5e2409f3a26dbf0ec68096d89899b82e5b4acc32eed,2024-11-21T02:18:39.203000 +CVE-2014-8146,0,1,d01fe4180743667436eba37155b7c0275325faab4ccf42afafd7ac62b62527c9,2024-11-21T02:18:39.330000 +CVE-2014-8147,0,1,2b2e3e28df99409a1146b13b9d38f9152f164f1960b1318d60ab93799a7a97a9,2024-11-21T02:18:39.523000 +CVE-2014-8148,0,1,98801d2c3063aff99a776ebffa9781ab17d99cbe97a852a7bf2494522b0cb6e2,2024-11-21T02:18:39.687000 CVE-2014-8149,0,0,5a9eec110d3d970d78edddf9a702407e40615fcbcc87fb318515d71605526a86,2017-07-03T17:25:18.217000 -CVE-2014-8150,0,0,61c80a01f706b3592beaa04948e08b94595a9b511440eb6052f6f19ab21a66c5,2018-01-05T02:29:54.430000 -CVE-2014-8151,0,0,f4312775fcf3ecdc1a38beded28fadc3b84f34d2c87b69a292f355a8e7d03330,2017-07-01T01:29:07.907000 -CVE-2014-8152,0,0,d50361df9d641b97ab6eb06e495e582363a773b07923e0008c4f1f4eef01aa23,2023-11-07T02:22:16.033000 -CVE-2014-8153,0,0,cef2e50e7177e45bedec9bdc399c6ed0cdc1c3b41a56546fea9a7f226b6de6c5,2015-01-16T00:37:24.223000 -CVE-2014-8154,0,0,e54944ba2b2f15085e4e73e8ac78adec1d8de4393bec7e45dee7b559d48db28c,2018-10-30T16:27:35.843000 +CVE-2014-8150,0,1,f1eb82d5774f176b32c4f4f87a6cb3508848699a51048d296bd2dfc84ad12236,2024-11-21T02:18:39.917000 +CVE-2014-8151,0,1,61c91d58ebf320b9b21ed7cf17c8e4db34ddf425d2ab2e26b47d119f49d06157,2024-11-21T02:18:40.093000 +CVE-2014-8152,0,1,e5df1a7ab4b062a8bf390a31c1e62f01d6fa23b5bddf8f0d53c37f5d2c057d89,2024-11-21T02:18:40.220000 +CVE-2014-8153,0,1,9d9c3eb13af25d5cb1a8cae7fd4aad134cdbf43eb0ea865774fb16d33cc815de,2024-11-21T02:18:40.333000 +CVE-2014-8154,0,1,1a39a87decb7b9aa857ffe3a3244f974f9e94c1f5110bdf4e34cfa902c1f1547,2024-11-21T02:18:40.437000 CVE-2014-8155,0,0,f1827a8ab8b5ef16f00ddda5933feee9f964fdca3e5abff3db6ecd1b8d7aa6fe,2023-02-13T00:43:50.393000 CVE-2014-8156,0,0,1f473e196175a8d9591d0e268970b7ec3a0cc1d436e3417a19934829955fa2c7,2017-10-11T19:23:59.350000 -CVE-2014-8157,0,0,920c9e6f916edf10aeb7b70f49ab3144af238a8b6f27172650a578f64d48fe0e,2018-10-30T16:27:35.843000 -CVE-2014-8158,0,0,2cfdc223d178a58c300c99124a834a4344b92445ffac9b23a689ed9798d195f8,2018-10-30T16:27:35.843000 -CVE-2014-8159,0,0,6e496acb2832a381aa8c0a87ffa0a2793f5c4318728bf846c34810c1dd3f0e2d,2024-06-06T19:46:16.053000 -CVE-2014-8160,0,0,de1f42a25875ab87ec104fe3cd2253138cfb6db49b28dabf71546c3fc1fbb3fc,2023-02-13T00:43:57.847000 +CVE-2014-8157,0,1,401cd0b175fc2a26b6701299e17df127176f11f1cafdac435a1de80ef745b9e3,2024-11-21T02:18:40.740000 +CVE-2014-8158,0,1,3cd413df9c7bf8038437030c3b28168c1e3e09f7569bbc1fcf54d4a9c528980b,2024-11-21T02:18:40.867000 +CVE-2014-8159,0,1,8b29a3bfdb0c66131d609a01f3fc3cc48c1fcfe8fa8d8b6bbd2a82890f8164d5,2024-11-21T02:18:40.980000 +CVE-2014-8160,0,1,ab4a8ac1d3292df888f45a04ee37ed6cd8a32f34ec9b54bbe0ae641186b233fd,2024-11-21T02:18:41.123000 CVE-2014-8161,0,0,c62409d7deac7df2fbe04d8d7319076e3fe6f5f0e54b447a9b28c6972db342ef,2020-01-31T15:24:43.387000 -CVE-2014-8162,0,0,f476b3ac5f30aafb93f9d535a525177c8c3e998f719b4485ffb4770073948e40,2023-02-13T00:44:04.957000 +CVE-2014-8162,0,1,ee9a77f836e87366160004a60ec946beba6528aafefcf4dbb87f29bfe4fb6f3d,2024-11-21T02:18:41.387000 CVE-2014-8163,0,0,ba5430d5bb2b49a94c55930769dfc29e19280dbefeeecee8d5ca75414b11421f,2017-09-05T18:21:27.977000 CVE-2014-8164,0,0,dfa8d467efdb2e4d8f36923e3f0e0c8ae3bea222ab910bb002b6da95f569ac88,2022-07-14T12:03:51.360000 -CVE-2014-8165,0,0,a14fc0b665b645f78e0e389c68357d3697dd089700f9adc35da1a1bf21fc4181,2023-02-13T00:44:07.593000 +CVE-2014-8165,0,1,97a53a9f28c6ad96576e03b5e0be9af0fcf4d18a73810887f6755776c51a1b11,2024-11-21T02:18:41.710000 CVE-2014-8166,0,0,f71be866069f1771f4bafd106bbfe6831787d963aca734e9522d6efaaf84be58,2020-10-23T13:22:04.257000 CVE-2014-8167,0,0,93677cd02bf0584872266d9353bbbc40605c2eab95467f48199c586f9f9fd5b7,2019-11-15T16:10:40.130000 CVE-2014-8168,0,0,e750fa61f01d6a7aff0fcea41a7dad9e40dd5e061a346828183fd1715e416c8b,2017-09-04T17:31:05.980000 -CVE-2014-8169,0,0,6798c9cbc1d3c219eb9e3e90567efc4b37456f3397346ad9c97cd307103c83f4,2023-02-13T00:44:12.453000 +CVE-2014-8169,0,1,20def9e8f1df75403415729cd2a5c437a6a5f5945e662338caa535cb9e5eb87e,2024-11-21T02:18:42.137000 CVE-2014-8170,0,0,e3a58199281eaa42db5bf869d43e500dfe833b55983013d11c6b1203f2e2ada0,2023-02-13T00:44:12.787000 CVE-2014-8171,0,0,0a74e37d50b76c4110a06c18781c206ef610ea1b2306049ec1b8a31a7657e3f0,2023-02-13T00:44:18.270000 -CVE-2014-8172,0,0,3b9cdace4e5218657c46092a6b6d99fd90ab2a48578447ab7c2927f7e52b2e0c,2023-02-13T00:44:18.660000 -CVE-2014-8173,0,0,c9fd6d6cdae27d0ed7be34f288cffed59644e902d3a9e961cd4608ca63b111c9,2023-12-22T20:17:47.843000 +CVE-2014-8172,0,1,b76ea3f46a2f347ea103c86812f06addb342be9fd83871e264de11548d722615,2024-11-21T02:18:42.470000 +CVE-2014-8173,0,1,1c47287421ed95574afe09ca1719b16b19b09bea3918592cdd4fd275cd7f6283,2024-11-21T02:18:42.580000 CVE-2014-8174,0,0,5e416924a13efcb45510c394c5824e5566fb2a25804a2741869ae2470bf0ca83,2017-09-28T15:30:17.243000 CVE-2014-8175,0,0,0f2382f3f6475c59245122280179751ae507be35e3c081896ff3531daa515f88,2015-07-09T15:44:55.770000 CVE-2014-8176,0,0,734652deb90729b18db2a84b6832698774745c9e8a1cc70d3d3d193d86a0f42b,2022-12-13T12:15:13.217000 @@ -71981,22 +71981,22 @@ CVE-2014-8236,0,0,8f4ecf00c23a861fe6ec9688dc9ff31aafb23a6c413c59710e5af79533b66d CVE-2014-8237,0,0,5b18ca3ed97ce4ab915c43dc3f991abde1600ee97339a7a49b82dab2ae664230,2023-11-07T02:22:29.267000 CVE-2014-8238,0,0,962ce2bc7a72d9efc99c35d27a4db2691bd554f3ead8c53536e15dfa35062b1f,2023-11-07T02:22:29.497000 CVE-2014-8239,0,0,6c8e78a3ef876ee989974bc0d1a76f63cf186fb8a051beaa713ac6082100667a,2023-11-07T02:22:29.750000 -CVE-2014-8240,0,0,20aa07b67c32c7d647ed10bbd016e66ffff07e9d9a900977749aaabf1851324d,2017-09-08T01:29:21.573000 +CVE-2014-8240,0,1,ff7b7883e62025f3f79b1f4687a0187ca493b1619cbbb4f76e596f8bf91b2aca,2024-11-21T02:18:44.870000 CVE-2014-8241,0,0,39ad7041f0dca98dd6f4743796d90d6825b84ca7f4fd764523c7220ea1161694,2016-12-20T02:59:05.867000 CVE-2014-8242,0,0,883ccb5a11fea543fffc32f46268bcd8e505dff5c371b2c1cd5f0e4bd4a56edc,2020-05-19T19:55:20.283000 -CVE-2014-8243,0,0,5ad8aa382bb8060014625c55dd96b93aed6475c657e3fa562a8cae75c637998d,2014-11-04T02:38:06.157000 -CVE-2014-8244,0,0,71015917e7a4a8ab2b02b6181f0f6153f7eb8e9ad6090445484b4c1fb31d8df9,2014-11-04T02:42:20.657000 -CVE-2014-8246,0,0,8442e14208e5878a115ad676e6afe93996a5d3f21edaa662a3688a55600306b9,2021-04-12T14:14:24.010000 -CVE-2014-8247,0,0,3817c9c3ae58b1493980bcd33f21cb338ae7578fefdb8f70bae3b1bd68f15122,2021-04-12T14:14:24.010000 -CVE-2014-8248,0,0,2a9542753cd0ec9f88fe64c69f43de684f82946410b126162cd36b79c1cb6f2c,2021-04-12T14:14:24.010000 -CVE-2014-8266,0,0,f830d848e21dfca529b0ae913a9628bd708e33ef1d711b09e1ea6960bc75faa4,2015-02-02T22:55:17.507000 -CVE-2014-8267,0,0,5e1883cc149f531d233015d3dd588da316f53d62ef10dcbdb50803883ad361eb,2015-02-02T22:56:49.677000 -CVE-2014-8268,0,0,4e142c8375da719842c3316c5618fe76026923433e18b73a6ea33e581ccdfd95,2015-02-02T23:20:31.893000 -CVE-2014-8269,0,0,b59b479762e8fcfa868478b73f79112993f40c3925435effba3df4ddefb352fb,2014-12-16T14:54:15.430000 -CVE-2014-8270,0,0,5ddf2e7a2dfa66480c2001fe1f175a16ec8468bbe4d16ab4ed2e969cf229b1b9,2023-08-02T19:00:29.757000 +CVE-2014-8243,0,1,2fd09a432ba91af123f918cc607c602777407773dbb3c85a80d404cf4de96251,2024-11-21T02:18:45.360000 +CVE-2014-8244,0,1,9d96562d5582f7a144aa9919830f374272a5205bef0b4eb3f24485f46452ddd9,2024-11-21T02:18:45.487000 +CVE-2014-8246,0,1,057a2000dff5a06e1958cee8b89893ef8b62bbfbc895ce01ee4358e414aa3c53,2024-11-21T02:18:45.603000 +CVE-2014-8247,0,1,26e41f39b2b1eb9373dfffac5d72ef11616ef12029e15a634be0f0c31f5a760f,2024-11-21T02:18:45.720000 +CVE-2014-8248,0,1,d4739b17db1b163bb0329970255c06a63e479ef3ad67dc1b730fedfc5580fbef,2024-11-21T02:18:45.840000 +CVE-2014-8266,0,1,71514c45081854ea47575937fa5c505be2794d01d6b76fe0af17d75a775b8844,2024-11-21T02:18:45.957000 +CVE-2014-8267,0,1,2b24c3f6fd492752366061033f0ab0f5cb8834969ed5ff71142b6db597a83814,2024-11-21T02:18:46.070000 +CVE-2014-8268,0,1,dc834be1b8df9df2d7f7e426666e3278fa2420a2e0e80224cea268d71e58d1a0,2024-11-21T02:18:46.180000 +CVE-2014-8269,0,1,dbe4ce67fa384698a3a933a973aa8501ac9dd5b535f394a8b51a8a5782026526,2024-11-21T02:18:46.290000 +CVE-2014-8270,0,1,52bd409046f6ed688adce5711cfc96fd1bd1ace09f88c8339166620f7ef7cbda,2024-11-21T02:18:46.407000 CVE-2014-8271,0,0,6c9325e35d7028d0e34733077be8c628714adcaf821d2ca08f17ece8cc1b1151,2020-02-11T15:33:07.277000 -CVE-2014-8272,0,0,c11c9ecfa6e3d16d2fb4951fdfb71d0caffef2c3003b9b128286d73f25e4bc82,2015-02-05T20:13:24.463000 -CVE-2014-8275,0,0,6da98d510f9053c4a975050536c00f0fe4102243c2ec94434834c87943911a18,2017-11-15T02:29:05.437000 +CVE-2014-8272,0,1,ae467b44c2a45cbc086a3acaf72befaddb649ccc836813323bd170cf90b4757e,2024-11-21T02:18:46.637000 +CVE-2014-8275,0,1,3225c10606132b9c8132facf95e3d0ae479bec06795c37919d7286e420783936,2024-11-21T02:18:46.753000 CVE-2014-8276,0,0,2d8ec2fa232ef0cb8d5dd16b12adfcb1e4d83e7d0261b88432d67272fd25c35a,2023-11-07T02:22:30.133000 CVE-2014-8277,0,0,ea188abb31226ee2ead003578034136dfed132a09fbf6da1b91255223b703fcd,2023-11-07T02:22:30.373000 CVE-2014-8278,0,0,1d15359970efd579454909d4304273fc5f968495ba26a42b74d78cd176885f61,2023-11-07T02:22:30.710000 @@ -72014,234 +72014,234 @@ CVE-2014-8289,0,0,2a2c3869ead755bb9d6aeb0c75305ca9203eb2afb72e4394473209713c41b0 CVE-2014-8290,0,0,3679216c6e07957ddf41060236dbfb8fea68aa29defb35877529827edbf7fee8,2023-11-07T02:22:33.560000 CVE-2014-8291,0,0,d0ca59403ed227774e90e7a89973948553dbb7770c14f1ea212fddb05863a9a1,2023-11-07T02:22:33.907000 CVE-2014-8292,0,0,82fad89cd435a1e0f3cd380f7fa8e2ce30485c9081c21c89d39c1fb7834bd41e,2023-11-07T02:22:34.210000 -CVE-2014-8293,0,0,1dcb8238578aa3c5dee95ea7ac666a371968ed5d7b6d2c3ba2aff33f88188c5c,2014-10-22T13:05:30.177000 -CVE-2014-8294,0,0,18561071fa5c83a34c192633bf1daffec88da28eb0a8fa43c51c9985579986c8,2014-10-22T13:44:22.910000 -CVE-2014-8295,0,0,e714f9c03efd3fce6f5c5593867c096fb4b4e222ac15d1072f63646b4a5318d3,2014-10-22T01:40:58.487000 -CVE-2014-8296,0,0,146c2b7f1a121600ed7404d4089af2d5e9867dfdf12a652b8681ad261705bc5f,2017-09-08T01:29:21.620000 -CVE-2014-8298,0,0,355039f989db0dfedc961246c3e7c9389cc097da31092ef2afc42ad519756460,2016-10-26T02:00:41.397000 -CVE-2014-8301,0,0,a01bd854bb51ac488f1b678210506e1ffea222b1c235cd0ba511e833a3b976b6,2014-10-23T14:10:50.217000 -CVE-2014-8302,0,0,781343536d7021ede9d9333933eb5ceca44545a868a3286d917a98c360cade6f,2014-10-23T14:14:40.357000 -CVE-2014-8303,0,0,9e5f12e2528d94efaf3ef31b7d50a6a64a5ec8657e8f135125f24d70557ef771,2014-10-23T14:15:17.520000 -CVE-2014-8304,0,0,06f9c60649d05d7623ea2e798f1187b7baa0b6a73ef625b309af704ec9eec9a9,2014-10-21T02:43:11.423000 -CVE-2014-8305,0,0,987aaffebe668ae4c558c4d7363c7e6298bd1cb6e539026a8b8f5bd83ebb3aae,2014-12-16T17:25:49.700000 -CVE-2014-8306,0,0,7aa8f60a296e7b9d3e687c9eeda18f73dfd1b374382107e8fce6012905333e9a,2014-12-16T17:26:12.217000 -CVE-2014-8307,0,0,4db1eef5aeee18b4d286856378f7ed303af7c98b52a0d0fd33a1bb30074356d7,2014-12-16T17:26:50.997000 -CVE-2014-8308,0,0,c6da26d766f0b8c92989e72fdfa4dd271ec08079ba8375b33874334702066cf3,2018-10-09T19:53:42.370000 -CVE-2014-8309,0,0,d1d22c0f5d181927616f76910e1017ef2350d03fcec657165cbfca1dd4f75ae5,2018-10-09T19:53:43.027000 -CVE-2014-8310,0,0,0b282e8d243b405c6bcb9b9e928715a2a5ad007c985560739d589da27cab53c0,2018-10-09T19:53:43.637000 -CVE-2014-8311,0,0,44dc9499850cc5472b44937835eb427459acff2dac51b9cb2d57b57d54d0d979,2018-10-09T19:53:44.323000 -CVE-2014-8312,0,0,53f330ceffe71f46f0c5055b266eb65b86934ba7d388cbd980ca3976a5d95a9b,2022-10-06T15:20:09.903000 -CVE-2014-8313,0,0,cfedba194f4c6ff0a1a42d8f7f4481a60844fbdcf7361b3c35bace002ed73b5e,2018-10-09T19:53:45.637000 -CVE-2014-8314,0,0,b77efdfeac5472f3c40ac6f1bfc9487ed24649c13db81883808ea8bdfa5e0bd6,2018-10-09T19:53:46.353000 -CVE-2014-8315,0,0,e1f8b2ed43058f009660fc15abc85e8328145b02797f36dab6be1e92c5191359,2018-10-09T19:53:47.603000 -CVE-2014-8316,0,0,2a891bf181328696fa8499f252d945241377aad983bd1c0d7cf06a9d5742a169,2018-10-09T19:53:48.587000 -CVE-2014-8317,0,0,96cb55f8d08e452911a1424e3605880b270e7637b31e95bac4a5fe671d285197,2017-09-08T01:29:22.263000 -CVE-2014-8318,0,0,d4a7e07fb4031d513d024eb7bfaabd681dc662179e8fb63681c32359804ba158,2017-09-08T01:29:22.323000 -CVE-2014-8319,0,0,3e8fcb393163c420e5eae5393b567763cec6317c76cc2dae1e260b15648e0b8d,2017-09-08T01:29:22.387000 -CVE-2014-8320,0,0,d10b2780afd856b44bae73925d09bf3d327b100631d3c24bc9e96fc9e9bba31d,2017-09-08T01:29:22.450000 +CVE-2014-8293,0,1,7003bfe35c733d82946c19304d198113e534bf447d551193d776573799c967ea,2024-11-21T02:18:47.210000 +CVE-2014-8294,0,1,5493e52a40f0889dc7c3fb6b68266bcf69cc267a1636cf2cacf72b6f2b8088f4,2024-11-21T02:18:47.350000 +CVE-2014-8295,0,1,cdf088967d10d976ff13e04f67f61cacde07e561fa4365f70b2428bb8fb4c180,2024-11-21T02:18:47.480000 +CVE-2014-8296,0,1,438b71bcb1dbe28bce3bed3f2612d3a54b28328732fcf137b097cdb7d103f323,2024-11-21T02:18:47.627000 +CVE-2014-8298,0,1,f52291963bdb7a8eb09a21b91ea38463b4da8427e9eceec8dcd86aa7bb81d02d,2024-11-21T02:18:47.790000 +CVE-2014-8301,0,1,4b747b87fd3f62ebd76ac0978018a75b8845ba12aa28cc18e4719538f3ed20b0,2024-11-21T02:18:47.937000 +CVE-2014-8302,0,1,b114011c61005bc896283efedfeef06d35a82bc040b4aed4243d16241de85251,2024-11-21T02:18:48.080000 +CVE-2014-8303,0,1,d5daf5da3c39a8cf5cbbe62b59bd47e3ad1190d9e8b8f6490d241f72e0898a2d,2024-11-21T02:18:48.220000 +CVE-2014-8304,0,1,c408cbdf02afaf5c15cb75b12c362816531620cda281d7c4a9011e83f6dd2bf4,2024-11-21T02:18:48.360000 +CVE-2014-8305,0,1,322829dfa462529f5d600e78fbc352891588cba1bf48e002a4783b4d1005ab76,2024-11-21T02:18:48.497000 +CVE-2014-8306,0,1,6972df72d8c9bbe87fa8ffe369c076300c9a4174227ca3fd66e485ca868adf70,2024-11-21T02:18:48.637000 +CVE-2014-8307,0,1,ba90e35dc42cfb11e1d561a634e2da2913941d0af1d6e2495ce609674eafb59e,2024-11-21T02:18:48.770000 +CVE-2014-8308,0,1,bcac3300c27a2039f4ed5d4b30ca83ac566bda89843041632fcbcc7c608445ae,2024-11-21T02:18:48.937000 +CVE-2014-8309,0,1,22f702cd845ddc197baaed6ed698dd00d58b1730ac0deb35aa3af76e658c340a,2024-11-21T02:18:49.967000 +CVE-2014-8310,0,1,c63b55a8955d2f3c199bec7257639a5d77617f97b01f8e46711fa60b662d79ec,2024-11-21T02:18:50.163000 +CVE-2014-8311,0,1,ee17406f424832aada7c81b66a0bdb3d93f3092c9f7f037100bb53c5ed45b925,2024-11-21T02:18:50.313000 +CVE-2014-8312,0,1,52908a478871357b371588336f7fe619912b843587830f265b541dd7966ca24a,2024-11-21T02:18:50.460000 +CVE-2014-8313,0,1,87c5a4dfe2020654e9021757ae199d37eb51491d272f6d8439a906b5fbf86736,2024-11-21T02:18:50.610000 +CVE-2014-8314,0,1,4a9faa083ba47bc70e7dad85d8d06f9a1700d559cfca2c09b3433ed9fa7879c2,2024-11-21T02:18:50.753000 +CVE-2014-8315,0,1,b2440d44e6a46a7bf1271f587f545556a1a5640008587339d70950ce110e0ab2,2024-11-21T02:18:50.900000 +CVE-2014-8316,0,1,3302adce7ef55e8f58f920531b32daa4a2c5451c8f7431915536d4e42a065de0,2024-11-21T02:18:51.040000 +CVE-2014-8317,0,1,58590d536dbac23a75ee27e1c40ce4cfe1e42d44054f28f72b5c290d4067337c,2024-11-21T02:18:51.187000 +CVE-2014-8318,0,1,bff06e3cb7c06afc6771a0e673faad3f76c379ba996911fcd932e169e50b0fd1,2024-11-21T02:18:51.337000 +CVE-2014-8319,0,1,ed29f5aa5e9dfb20f67cb96f66f105d9b161465918fc43faba59ad1d4627e58b,2024-11-21T02:18:51.487000 +CVE-2014-8320,0,1,c052bd4e5860ba1bc6bc915e09ac9d1c088dc37bdc77dab715b345da350dfa2a,2024-11-21T02:18:51.633000 CVE-2014-8321,0,0,94d87928205578ea6ea697a884c880ee1e020c1cbde7898c9eab2bfbc6a2440b,2020-02-05T20:30:14.387000 CVE-2014-8322,0,0,6a2921a04027d8f74b5046225de822503a16915f08730f9d86bc0f7ebedf166c,2020-02-05T20:32:08.313000 CVE-2014-8323,0,0,2f3c5d944f373e02b1f726dce5f77c25f801d18da21fb59bef3b7737777b99cf,2018-10-09T19:53:49.277000 CVE-2014-8324,0,0,69d385c58e5fd25d07fd645fb028aa8332554c7dddf82475fc873dab72dbc359,2018-10-09T19:53:50.073000 -CVE-2014-8325,0,0,53519cb8d515945dc6171e438e25b73aff3d15a09746e20bab0396c2b9f06bbb,2014-10-23T15:51:33.813000 -CVE-2014-8326,0,0,61d4c29e5e15c3f30a9c3790a50ee205eb7fb044d94dff3127ed07ef8314ded8,2018-10-30T16:27:35.843000 -CVE-2014-8327,0,0,4eaaeed998141c9fed608a751bd35f0068c321c896df957024feb72f85a447a1,2017-09-08T01:29:22.513000 +CVE-2014-8325,0,1,2a8905152b8c37a5d73351fe9991c2fb961fd8457d9822977ac1bad5d98306a8,2024-11-21T02:18:52.417000 +CVE-2014-8326,0,1,babe4cb43cf288aa849f02221caa656e38331a31332942917205c3e07b9e1239,2024-11-21T02:18:52.557000 +CVE-2014-8327,0,1,d4361f6680cad9f152e0095f16a8788cb88c59042d138523767525adbc5738a1,2024-11-21T02:18:52.720000 CVE-2014-8328,0,0,6620a749098e3f63384de7dadfb6745e474a073b94c8eea2fadec227d14b763f,2020-02-05T21:59:51.277000 -CVE-2014-8329,0,0,6d551e71c1bd0a439c4f8a6aecc6b7cd15a499f3c4a4a8a54c84ff59f2953873,2014-10-23T00:02:08.430000 -CVE-2014-8330,0,0,20f8581e0010bc19b93a14e1e4fa25c9eeba9b894430c346d0a7447ba3336e1d,2014-10-22T23:35:35.560000 -CVE-2014-8331,0,0,5581545e779ce01396ee276179a4d02c47cbec95e09f18eabd55adc14ca74aac,2017-09-08T01:29:22.560000 -CVE-2014-8333,0,0,71578e6ece46048965a2468f29b2dc34fc1c1c62947376673be0c973a880122d,2019-04-22T17:48:00.643000 -CVE-2014-8334,0,0,d223d8d544d131f8b1ad0b8e31bbcf0dbc11505553f0ef4f7bc4b1aedc24ff3f,2018-10-09T19:53:50.743000 +CVE-2014-8329,0,1,985da1c50aac27bbbae48ca82da54d38e6211a28a324d8af8543420e77a6bf42,2024-11-21T02:18:53.050000 +CVE-2014-8330,0,1,7e72f74f478633433bb69c94b0a4020b3ac2ede5b587d4c2ec9af973240cf3b5,2024-11-21T02:18:53.190000 +CVE-2014-8331,0,1,b5489b1cf8cf4d0fa826b5815c801372c42d5e9921ca17bfc5445d39844256ec,2024-11-21T02:18:53.327000 +CVE-2014-8333,0,1,28ddee461dc1f0c7a1066c1474feada9ba95995e6264b3db2174af90e2bac68f,2024-11-21T02:18:53.477000 +CVE-2014-8334,0,1,b2fb2435a39cd29166585f57f3b896bb3f286704838846ef1bde306c787ce3d1,2024-11-21T02:18:53.627000 CVE-2014-8335,0,0,aae34a4e34c47ebac823bde894fe3dd4e95b7b806cd4da5b220751399b33a673,2018-01-19T14:47:17.460000 CVE-2014-8336,0,0,55f37834c26d7c2dadc0940515e8b00f7409e04b75497465cbf1f994a4c73cc0,2018-01-18T22:16:01.103000 CVE-2014-8337,0,0,4bb36d9f96dcefac9ab5d6c272fd39f82711a4b44957e2691c7eab3f33895d86,2020-01-15T15:29:15.433000 CVE-2014-8338,0,0,75f9000f823ab7da50177961cb15197a25586a48795aa21684c80eb61ef501d8,2020-02-06T15:09:08.200000 -CVE-2014-8339,0,0,07cb91c9eb8bc8d106bca7bf2dfc4366bc027861844151dab7008662dc984d13,2018-10-09T19:53:51.603000 -CVE-2014-8340,0,0,249c25a52a8ec7b558c55e35c153a3828c1af67cb299f6a9476d5f6f321137ff,2018-10-09T19:53:52.040000 -CVE-2014-8346,0,0,8b91241f7f51d88996b8627b75273107975000fbd32f78b97e81ca59e3aa24c8,2014-10-24T14:24:35.290000 +CVE-2014-8339,0,1,b8bd0d4961684afe87bbe74c9b553d34a941339d5fe5b7f5d6d584556491da8c,2024-11-21T02:18:54.373000 +CVE-2014-8340,0,1,06fe052f75348fed78e4c5d176404044fa416759f0e817d3a92ea8b98e862b99,2024-11-21T02:18:54.520000 +CVE-2014-8346,0,1,36c080e660a17f161450ea72956cd23d952667576387c56d359ac30d804e9541,2024-11-21T02:18:54.660000 CVE-2014-8347,0,0,915bf60b41a43a008905ac9fc0214a3b2e3f9a0254df685aae197cf52256349b,2020-02-13T14:14:06.547000 -CVE-2014-8349,0,0,24c722855cc874683c94170a5dfa4c4e87e31d8d9c94a9fab9c0bc673107dace,2015-08-06T16:39:43.887000 -CVE-2014-8350,0,0,d7d12543bb1888f1b4f8e5c9853c28d575de8b3f79de258a5afe8e7ccdd3cf9d,2017-09-08T01:29:22.747000 -CVE-2014-8351,0,0,d681af0c5d5ced0facf48ffe5ec3247f4bec88249bbb4171ac5c4be3982f8d3b,2017-09-08T01:29:22.793000 -CVE-2014-8352,0,0,11133f75091aef0bd40de58b91b6eecd53327356d95e8ea7ad87b2002f500c78,2017-09-08T01:29:22.857000 +CVE-2014-8349,0,1,b216a161ea481a8ff0f5788f1cd9c764aaab1ac0217b06eb43ef5bd04095cdd2,2024-11-21T02:18:54.947000 +CVE-2014-8350,0,1,535a15cfe356663c1caef1246de45388c93d42efe557ac06066dba29a058267f,2024-11-21T02:18:55.087000 +CVE-2014-8351,0,1,09248783dea2220738035b98dc3dff1744d243cdfb6f1354006136ad51d95bd9,2024-11-21T02:18:55.230000 +CVE-2014-8352,0,1,99be473fdc3e5fd8c41c7765300fb3ea8fe7f4aca1c44a131aad7cdf4b1113ed,2024-11-21T02:18:55.390000 CVE-2014-8354,0,0,84ae88693c2fa1c43519376aa0123237e7c215a66009defa7958fbe762119ccc,2017-05-09T12:40:36.700000 CVE-2014-8355,0,0,0696f1777332d1fcb79421fa584ee1e3f504130bfe41ca08eb6d8a8f4fc44e62,2017-04-17T18:18:54.163000 CVE-2014-8356,0,0,95cee32ab4139e561327cc8031ffdc361150dbee23b6de0d8badc7397c75ec6a,2019-12-04T20:25:20.337000 CVE-2014-8357,0,0,66e370058ec9c91f89dcebd0db37ae328d32db4167ca0a61cdcab9d8c9e36601,2018-10-09T19:53:52.230000 CVE-2014-8358,0,0,8da70e04c97b77a091e7097f93e33bac295c71d6584781c31fc785fd5c4d1375,2017-12-29T14:18:04.417000 -CVE-2014-8359,0,0,9a1c86139170c5b9480585758cbbf65297e18607bd2f9eb14ebc2d3be301d4ba,2017-09-08T01:29:22.917000 -CVE-2014-8360,0,0,b9c47713877ca615e06fc36cd1e0a2e80861355a1530d60ffade0e568b0d9042,2015-04-15T15:21:22.443000 -CVE-2014-8361,0,0,b905589f2e4c081afc4c3abf512577848f83b2ffdf23bb54a1f5988b04114b78,2024-06-27T18:35:21.117000 +CVE-2014-8359,0,1,2060889ec123959092066e755aaaf1e8c791a0dcec8f304dfe6509eff92b391a,2024-11-21T02:18:56.360000 +CVE-2014-8360,0,1,9e2b69268eb9703c6818e09952e1e0854218009fa3cfdcca57c9c021136a6ed1,2024-11-21T02:18:56.510000 +CVE-2014-8361,0,1,e9770d51b1de632c7f15569909a4b50dac9adf69d0be77c8359a8d63e703da45,2024-11-21T02:18:56.653000 CVE-2014-8362,0,0,50ea7ff16283583aa0758c1ecb1fc727da966762d7763802116f208b052ad5b7,2017-01-25T18:12:12.377000 -CVE-2014-8363,0,0,b4344f19fcd06f13d2cd725543dee49bd086c3630f46a8272c4142ed9c829725,2014-10-25T00:21:23.937000 -CVE-2014-8364,0,0,76e54366fe7384d53c589e92a28d0b5c502b6c6d82653890b3239972af652a6a,2014-10-24T12:58:26.160000 -CVE-2014-8365,0,0,6dfb42238594c099ac8f1307a56fdc25cdf6b1dd7bf9f65668d4802d789f0b9c,2014-10-24T12:51:44.157000 -CVE-2014-8366,0,0,085b19a7d86acb288844d8768a635f4dab5671b5efd10864c1b4426d311b2345,2020-09-03T12:05:51.713000 -CVE-2014-8367,0,0,ef2e1a0c95322a96f65d2486e001e056107c0eb45b3f07e049e7ba8f3102fda7,2018-12-18T17:27:39.320000 -CVE-2014-8368,0,0,e18a10b5d85a6598bdfebfafe351e7a2a5c10ef25d6ea4a01e4d654774959e78,2018-12-20T17:51:41.530000 -CVE-2014-8369,0,0,74526fc1e0af38a46e5dd0fa3a2972f00d02632cac369055dfaa00cde7cafedc,2023-11-07T02:22:34.917000 -CVE-2014-8370,0,0,325aab89f99cea6a9a736ae85a72a63b024e2e1578360aad8bbb1a5c765ca39e,2017-09-08T01:29:23.120000 -CVE-2014-8371,0,0,2c6a57b34e6c736ef3d264549a8acfeb172b5405bb0504efece69cd3041d1338,2018-10-09T19:53:52.510000 -CVE-2014-8372,0,0,5cd3b8025473086172d6f1d0cb295157c539f84ffc188d8776dd3fb10e2a3d79,2014-12-12T14:00:03.030000 -CVE-2014-8373,0,0,b8c6b827864a339395476edf3473072519b63c2b21739f6367727e4b34e1ccee,2018-10-09T19:53:52.730000 +CVE-2014-8363,0,1,98b2f596bac62353e7f2114d78091d2fd673664d302b6df682bd130afc61723d,2024-11-21T02:18:56.987000 +CVE-2014-8364,0,1,cf6b413081ec0c718cd62fdae5b0af1eaa71607ff643cbdb7645e81a99e95f1c,2024-11-21T02:18:57.150000 +CVE-2014-8365,0,1,0c62fdbf61394ea53bf9d2763f60177ab54f60b2e65f3ccb7145cf5ee28682e6,2024-11-21T02:18:57.290000 +CVE-2014-8366,0,1,1c41fb7475378b17c45cd13765ec121bd4aacd0501addd2f9d5284f1f9e96658,2024-11-21T02:18:57.427000 +CVE-2014-8367,0,1,658d59d057857a8154051b4fd2f3c39b27c9e7cc477321d20ff2405bf0542913,2024-11-21T02:18:57.567000 +CVE-2014-8368,0,1,2894968f239784519ed6a2663ee8c03d8f2d88db9f9d2afa6de15d546a23bae4,2024-11-21T02:18:57.707000 +CVE-2014-8369,0,1,9b9f421d313ec4d35212afd27472978af2f21f3b0b910ac7a3b3e08eaff907af,2024-11-21T02:18:57.853000 +CVE-2014-8370,0,1,b58fe6173d6dd6fe46a0c84042bd5128da4f14414276ae11d84ee4f59825ec5f,2024-11-21T02:18:58.043000 +CVE-2014-8371,0,1,06edcea5120afcc14620d60f23887bbd31cfe6f3ae6a80b2d420e26004a2c0e8,2024-11-21T02:18:58.203000 +CVE-2014-8372,0,1,9e6be0e0ee301818e3d03bd60925d10ddd3c5e5a9d123fa6c4d0bc18287f829d,2024-11-21T02:18:58.370000 +CVE-2014-8373,0,1,be1d74320a8fd479a589d122358cdc9ba038279071487ac4df4b0b7e6ded68d1,2024-11-21T02:18:58.510000 CVE-2014-8374,0,0,faf247d041da2ea67ac1fcc9d8b2e515df2b61b981256ef7d9bf261857ecedc9,2023-11-07T02:22:35.030000 -CVE-2014-8375,0,0,a5985fa8db7660f594867ba4d67ef6d3c757e47fbd0fe4bb05e229020517e5eb,2015-08-06T16:41:02.020000 -CVE-2014-8376,0,0,15bdd5d9a1a0f2344d6f726e9cabeae7cd805e3af864d352cab1dbf5f6d0cdaf,2015-01-07T14:22:33.910000 -CVE-2014-8377,0,0,560232c9fe53f65c37a40f55bb9842e70d1a6a4374500e8699a65394b0651881,2017-09-08T01:29:23.167000 -CVE-2014-8378,0,0,14f706b1366b2487541e6bc140f5576324701de46a4613d66c2bc6b4df8913dc,2017-09-08T01:29:23.230000 -CVE-2014-8379,0,0,e9edbaaccf840555a162da7b23a2bc7133c31bfadd7f263621694a583b97db2c,2014-12-16T20:00:55.077000 -CVE-2014-8380,0,0,7d19d6ccff7513f7bad86db9f578038f2524be0db92376100e94aa89577de0d3,2017-09-03T01:29:01.310000 -CVE-2014-8381,0,0,a9d41bec1512857a1bb4e937acf02850a61231f958374786e968aad140055e80,2017-09-08T01:29:23.277000 -CVE-2014-8383,0,0,311a42ce338949b6578f69eb238deb84366871741051566772260468a1852b88,2015-05-19T16:25:58.073000 -CVE-2014-8384,0,0,331c23aa8aa745d0eae3e0f2e7b429c8259f70637f1c4fc2b78268ee6824ce3d,2015-05-19T16:31:16.713000 -CVE-2014-8385,0,0,5ccf876f37c7ff39c80bead9692cff7ea53d7e4f5d90ce14b102737c930f5547,2015-02-13T23:20:16.770000 -CVE-2014-8386,0,0,11a3ba75c29582f57ccf87caa64c1b02fc34ec45101da78cd93d5884935be3ff,2015-01-21T17:38:41.747000 -CVE-2014-8387,0,0,5a52892babf279d03298e2682a2abdf30ceeee12e4c39445026c67d843fa2d3c,2018-10-09T19:53:53.150000 -CVE-2014-8388,0,0,f57581ee6c924acdcac34b7b4f3289fb4e324a4b3e6440a669f02615f9b1431a,2014-11-24T14:09:54.730000 +CVE-2014-8375,0,1,748158b19a2b678d21c8a16a10ea85af025ae4fb86a8ef934e0affc16cce7714,2024-11-21T02:18:58.670000 +CVE-2014-8376,0,1,630330fff4cca645a477d5d6cfab20365e234f1fcd8f1787fd2a5b865173e60c,2024-11-21T02:18:58.813000 +CVE-2014-8377,0,1,533e92da1ee438d3747563321f835d272275c4c337e15c45d6fcdda1616de065,2024-11-21T02:18:58.960000 +CVE-2014-8378,0,1,fef9bfc1f127b4509de5652951649972488972fbc4301287bef42e3997194594,2024-11-21T02:18:59.100000 +CVE-2014-8379,0,1,f10eae13ab97bf68dd0fed9f61c9f6fec7701b4bbbb413aeb2999c5f2fa20516,2024-11-21T02:18:59.237000 +CVE-2014-8380,0,1,cca1ac4947432290beffde3801fbd7f4a073895e83f7d64ce3896542bfbb9944,2024-11-21T02:18:59.380000 +CVE-2014-8381,0,1,3952edc956d86e58d1e4e581f7988e3521a96a965ecafe23ed51ef8f9a5e2c16,2024-11-21T02:18:59.517000 +CVE-2014-8383,0,1,68c65a050e153e6f27518eaab5a4b11159e54d349ccfded3c9c1f0407b63eb2a,2024-11-21T02:18:59.657000 +CVE-2014-8384,0,1,abf17fb0a6fe3c72c22470bb29a135bb3685715f25346b9d6970764f2ea7bb86,2024-11-21T02:18:59.803000 +CVE-2014-8385,0,1,40f0f84f302876e124c53673583691e4c62c8533743841cc6e75cebd07ab028e,2024-11-21T02:18:59.953000 +CVE-2014-8386,0,1,cd369ada67f71dbfd0e2a57b1206388e2c82df91dde16a70cc007e9358d0e53a,2024-11-21T02:19:00.113000 +CVE-2014-8387,0,1,54099405ee607b89169f1272ce4b4ffea89ac7ada5ae931c8282383f90341806,2024-11-21T02:19:00.260000 +CVE-2014-8388,0,1,93756f819e61a4f5eeee77c8599e01698b320cb43c99aef2dce32dda9de55a2f,2024-11-21T02:19:00.403000 CVE-2014-8389,0,0,ba0da7d264d5c39a8f772b04a25224e17d66a1b3d39b8552e1c412ffb7bc9b55,2018-10-09T19:53:54.480000 -CVE-2014-8390,0,0,3e8751ca5dfe8ecf149f09061fc2968c353727140bbc51fd546a20537768b3c9,2018-10-09T19:54:00.963000 +CVE-2014-8390,0,1,c6857fa09dbbec59b84b2cb32533c9d8104b4a6cac5748766059f2b1fbae4905,2024-11-21T02:19:00.703000 CVE-2014-8391,0,0,0f88f9abf5840860e8c1346533b384d55d11038d23befd66c4b523d709b0b066,2018-10-09T19:54:04.870000 CVE-2014-8393,0,0,f8825b925743fb8e0aaae698d4740a5a6dc6d7b9adf2cefa3c1d4989c1187625,2018-10-09T19:54:07.527000 -CVE-2014-8394,0,0,ffd24553dd2cc3781d081ffa822a38d25fed80a1f019d6c2a66272b09ab29eb6,2018-10-09T19:54:10.497000 -CVE-2014-8395,0,0,546373a707582d4519188e5506049beebdb0567377f546d85f8ab837b4877f9a,2018-10-09T19:54:10.760000 -CVE-2014-8396,0,0,d19b15823da40323635acc810470f08a0007a43db2c943cb0718778b43859180,2018-10-09T19:54:11.010000 -CVE-2014-8397,0,0,fe36acf69e9da525f30da2fc5a3ce057a25e1568fe1a63234c03d634776f6023,2018-10-09T19:54:11.260000 -CVE-2014-8398,0,0,df0197f34c1335650ffe8d22de6b708d173bc655b407342c0ab00a8b07a09cf3,2018-10-09T19:54:13.573000 -CVE-2014-8399,0,0,0be35cda2510d1b08b05b3b8b60a842f5cdbb45475203599bb3796c01c81e17f,2014-11-03T20:45:46.347000 -CVE-2014-8412,0,0,278ffe5f252406d6bd6f99cc7bc3fdae29f71ceaefb750e8ca3d685af025864b,2019-07-16T12:22:45.360000 -CVE-2014-8413,0,0,08ced2ed19e93a5e587c17b0c6926caf0fbc47551edf737c9bbd5698779db13a,2019-07-16T12:22:49.330000 -CVE-2014-8414,0,0,271b117c914c23e3d04c207397b972a4d9e73bcd684d5500a0e88131c80a4f61,2014-12-30T21:18:32.467000 -CVE-2014-8415,0,0,28cc4482d6e6e44f376afdf704502c55717b83b22b7f2f1a56804c97524eb901,2019-07-16T12:22:52.597000 -CVE-2014-8416,0,0,63596c310e5698dd11858eca470eeb2109fa9be03e99b7d6057e43fc8e1362da,2019-07-16T12:22:55.220000 -CVE-2014-8417,0,0,5e385c9fc4d729eeba48c73b4a7258a193dc00f47650a130339595e1ed280069,2019-07-16T12:22:57.470000 -CVE-2014-8418,0,0,f77310cfc2034d8c2c06d42adcd838dfdf238a9e1b1ed9b98fba254901292dbe,2019-07-16T12:23:00.283000 -CVE-2014-8419,0,0,463bcab65aa7fc187a47754a516b552d27396a71898168e14f81e9f8cbf4fd84,2018-10-09T19:54:15.713000 -CVE-2014-8420,0,0,49f711e890af76fafa770170b1bd38b69fc3cd5991a940fd74237d8b0679ff68,2018-03-12T17:25:44.200000 +CVE-2014-8394,0,1,7463024c8c538a49307d356a15b3b030ed04a0e56dd5b7dc052a010250bc2982,2024-11-21T02:19:01.130000 +CVE-2014-8395,0,1,b8ffb1323c726690e91b12a4d8c02ee6bd27ee9fbb725d82bb5cdf940edc6cd8,2024-11-21T02:19:01.267000 +CVE-2014-8396,0,1,7d94dbe7d6d61745505d8b4c9eb05d44275767965460c3825ca10974cf062339,2024-11-21T02:19:01.410000 +CVE-2014-8397,0,1,90c2853da9852c44fe6d8337b11193b27530742154c6c069d09800104c2ae458,2024-11-21T02:19:01.553000 +CVE-2014-8398,0,1,c798b8964c9b1048f529aaa085f31d4b8fe3f2ddcab5a666d0e66575cad0763d,2024-11-21T02:19:01.693000 +CVE-2014-8399,0,1,ea88207a64c2fd22eaa958b6ebb8c188c31fc72eb5dee8bea3361339fa37b303,2024-11-21T02:19:01.840000 +CVE-2014-8412,0,1,f37ae43add090194e761c93d4910c1c038ba04868f4e2f04d622013c35b1c778,2024-11-21T02:19:01.960000 +CVE-2014-8413,0,1,6cca5714cd03e01a4f1bcbf986954fb6b955c4fd59533a1ede465739058acebf,2024-11-21T02:19:02.120000 +CVE-2014-8414,0,1,8b9dab3f4810d88a35a352749b6896305fd8d11086c3a11b16b279f8e137553e,2024-11-21T02:19:02.270000 +CVE-2014-8415,0,1,bbb2373077ca983db4f03d727bef742a7cba44fa1162ab02db227087afc52763,2024-11-21T02:19:02.417000 +CVE-2014-8416,0,1,dbcc9078bc4e365102bdb9c02d4c7b5d16025a913c091ad03623d9d2e9c986b3,2024-11-21T02:19:02.560000 +CVE-2014-8417,0,1,4df9685051c8899e73f31cfe94d0401175a043b99a9f817c3032298e4cc5da00,2024-11-21T02:19:02.703000 +CVE-2014-8418,0,1,fd2ab1e87b7a4228c8a1d1b120d563276e1721cf122327d7e10c3ef180e8ad97,2024-11-21T02:19:02.850000 +CVE-2014-8419,0,1,318edc052e752fb80ea0b4630f434f6254d334a35106f809c1a70adfd57784c8,2024-11-21T02:19:03.017000 +CVE-2014-8420,0,1,a56596187d31a1d2ee0f27896418214cb76838964ce8d48d95719dabdbba0b6b,2024-11-21T02:19:03.163000 CVE-2014-8421,0,0,ef526826e1c1a79869b49049eaa5e1cd7a092256b563465be17eaf9ab86f52c5,2021-09-09T17:47:20.180000 CVE-2014-8422,0,0,5c59394fe51c7c0957670d43531bb59561d858fdbd797d22021c8f594bca28c8,2021-09-09T17:49:20.757000 -CVE-2014-8423,0,0,a33c8e3d05270d24b8b6193301e41eae1028e723996480b410f3a2c4be656625,2014-11-28T18:00:48.010000 -CVE-2014-8424,0,0,3cbe8209579451405d96830fd558183ee00f51551776757d86049f841046281c,2014-11-28T18:04:19.763000 -CVE-2014-8425,0,0,fbffce8f0af60341f5900f8f48d7beb0bc4bbff3053a88bb676f0761c4c687b3,2014-11-28T18:17:20.053000 +CVE-2014-8423,0,1,ad4537d83d021e0cfc598eddbd77724f5da8848be7cf6922f283c512407ac489,2024-11-21T02:19:03.620000 +CVE-2014-8424,0,1,81495e52a428f3dbff1c08f5c6ab65cebe1523e363754581a325db111429ccf2,2024-11-21T02:19:03.757000 +CVE-2014-8425,0,1,ebeddb84d53fbbbf3259ab5dac6a25f92af645c6d879cd5f952dfaad6632ae7e,2024-11-21T02:19:03.900000 CVE-2014-8426,0,0,b1cfaf3cabfbf33a74d4cff3b2de6f4ef72045628981f52335b1a7d6a96fc1b9,2017-09-01T20:50:24.550000 CVE-2014-8428,0,0,c63c7a1386e0aeb8be2459eb68ff92852e2076feaa6967923168dd9ecef05aec,2017-09-01T17:04:27.547000 -CVE-2014-8429,0,0,91a47acaaaa6be09235347d2a400752bb9f819271ef7540156eb485c6df0f45f,2018-10-09T19:54:16.823000 -CVE-2014-8437,0,0,f81c0e5608d94e7807de42c89fbe05899474f231c4bcf895cd8e85605979dd06,2018-12-20T17:51:50.953000 -CVE-2014-8438,0,0,d093f923872f706a309108012047242314cd7307493fc2e6f2957a61078a155d,2018-12-20T17:52:19.487000 -CVE-2014-8439,0,0,f2c763809c0783acb10be0c234d516456cb9520b31ee902f0e4c64ada998de53,2021-09-22T14:22:20.497000 -CVE-2014-8440,0,0,74d79f57fd7d1d9243b1f01d3bbc3aa4185a98fb5c71434533a1b41789c59468,2018-12-20T17:52:24.987000 -CVE-2014-8441,0,0,80decc5448d2c3c58c699d6e724e04a36ddc19578c029c8e8ed15e3d80999d0b,2018-12-20T17:52:35.140000 -CVE-2014-8442,0,0,40d36699374affd650bff567119bbcc333974c9e23f86052fca6db8383abb5b3,2018-12-20T17:52:48.703000 -CVE-2014-8443,0,0,ce061b963c3ce649da08f3683976ae5734c558b872b9cf253046db66c2ef8883,2018-12-20T17:52:57.610000 +CVE-2014-8429,0,1,28131c621ce7a70bd08c8763a2c716254d9fa550f54a2227f54b5a98cc7a675f,2024-11-21T02:19:04.347000 +CVE-2014-8437,0,1,a21120cc0f42a51a1f7b45767efa6ef52a26a438c8b079091be12bbe6dd7b0b4,2024-11-21T02:19:04.490000 +CVE-2014-8438,0,1,11ba6222120aef199d6b4d495f1cd5d960f1d7e523bf45c4fb29560d7deab429,2024-11-21T02:19:04.613000 +CVE-2014-8439,0,1,9b52a158a9b56cda9f6b8b1e96d22073b76bafec70eb25d554ebc5862c2835e7,2024-11-21T02:19:04.740000 +CVE-2014-8440,0,1,032dcb91fd02204ed417d73e3f34debae53789337309f330c968bb894ad341f9,2024-11-21T02:19:04.877000 +CVE-2014-8441,0,1,889477600adcda419399457dc938d01da0cdc24dc05ba62602eff879998cc0bf,2024-11-21T02:19:05.007000 +CVE-2014-8442,0,1,f02c27c71da7612826cf0223a83a1e5eefa208fd8143fc9163b082465c93c239,2024-11-21T02:19:05.137000 +CVE-2014-8443,0,1,c5ac1f11eb144b87cc585e201e66f6e440fd19166fde0e924929f93f7ba4265b,2024-11-21T02:19:05.267000 CVE-2014-8444,0,0,e2493cf949f72e7eadc312ffbc0ce892b87a69f1a057a96cdb56beec23544c82,2023-11-07T02:22:35.763000 -CVE-2014-8445,0,0,45de99ad2d94d4ebd8dedb8dc16706185f0a574fd5c50b53b8893d7856d6082e,2014-12-12T00:43:44.443000 -CVE-2014-8446,0,0,c6e0dbde1958b2ed6fed5d0dd97f5baf264814cceeb25b4dba23084399e17a23,2014-12-12T01:15:46.777000 -CVE-2014-8447,0,0,1f11c5ae3d2eb496b969cc22bb2b27201847a03e72a2ad9ec5e2f6d371e7b590,2014-12-12T01:18:22.887000 -CVE-2014-8448,0,0,509fba642c13c7ce4ded6f24e46f683c948b38bec12c46b07c51c6402b56ad63,2014-12-12T01:19:36.530000 -CVE-2014-8449,0,0,bd6bd1b2d54604c72cb9355f7bceacd1b2be529a69d2d3950f6f59902655b635,2014-12-12T04:04:55.020000 +CVE-2014-8445,0,1,99e9d20b60d750962706eb1019d0c1fe38995fb052eb9e6692d1361f8306ce2f,2024-11-21T02:19:05.403000 +CVE-2014-8446,0,1,f40d64755c6a1fe72eaaaeed908f37a480a37095c2d50fa190c08ac9113108fc,2024-11-21T02:19:05.527000 +CVE-2014-8447,0,1,3678f93cf0486402273cc44d30fdbda100b9501d9291b69c532fa86617f128b2,2024-11-21T02:19:05.673000 +CVE-2014-8448,0,1,4ab14b2dbb144e7015a84706a321814b26f5c6c735538ba18435ca7c5d220b93,2024-11-21T02:19:05.813000 +CVE-2014-8449,0,1,16dc1e004b9206973c62384dbbc26a139f6fe66663c4e2a4e85116329f11b083,2024-11-21T02:19:05.953000 CVE-2014-8450,0,0,154806f45cf156449f4b04f3233887c87a842c0c6212de6db386291ca33bb969,2021-09-08T17:19:29.470000 -CVE-2014-8451,0,0,4444ecf372b533120aa0a27ffae5a1b9077ca9f41840c1ebad1f613006ca5e51,2014-12-12T01:21:37.190000 -CVE-2014-8452,0,0,9db620d45bee7182982b2f883248a97f103c93a9be299f3d3bd110b458ae0a45,2014-12-12T01:30:39.283000 -CVE-2014-8453,0,0,8ccb7db701c09a62c57a133e5600e0be7d9979661fdf0726f846c983f1bf967d,2014-12-12T01:26:15.370000 -CVE-2014-8454,0,0,b16abf4c1cd36a7a88b83bcc0a2fa2071d0d6dbe832c526f739d82ea63d15c7b,2014-12-12T01:31:45.283000 -CVE-2014-8455,0,0,214c0022bf856dc71e085c05d63c8f80dfccf9541b54ffd8cc3fde58c49e6226,2014-12-12T01:32:33.927000 -CVE-2014-8456,0,0,143d26c9366bfd871b16e4b025517150ae5c4645ddd8aafe3f22f98e5c1873f1,2014-12-12T01:33:50.617000 -CVE-2014-8457,0,0,49af651aee1d47e901d545a7782a376a6add5ac2817bd7ee4a2f2d2ec9cf8e46,2014-12-12T01:34:39.663000 -CVE-2014-8458,0,0,b9b5e146d6726c08f040d6f6c5fe0009d680cecaaaf3671fdad25e14b42ae45b,2014-12-12T01:35:35.757000 -CVE-2014-8459,0,0,fa281768a79bc2f01c9eb4f6fcbe9bde6fd1e063fc5b760218a22f3b75da1489,2014-12-12T01:36:24.010000 -CVE-2014-8460,0,0,0588c05a89b67df846fd3ce9ac6e0c6105435c7d8c35dc89ec02b2892cca0576,2014-12-12T01:36:58.823000 -CVE-2014-8461,0,0,1465b16cd8c57d271aacee97ee422dac4db2cd37e931bc2f212844ce29015b1b,2014-12-12T01:39:37.577000 -CVE-2014-8469,0,0,b25b274d4367331b9eece3314f89bb2816f41a8482f2e26fa4de23e999a6030f,2017-09-08T01:29:23.777000 -CVE-2014-8471,0,0,b0bc79e9c77fe27fd0a1ab05820e812378b2c54f45979df288dc86d3e8ea2195,2017-09-08T01:29:23.840000 -CVE-2014-8472,0,0,18a6411a6ef3633918e55dbe5eb828ef5f3695fd3bce3f04fa0b517f84245c70,2017-09-08T01:29:23.887000 -CVE-2014-8473,0,0,fcada0251b225c220cd1debed46cda5c2087c363cfacbbe8fb7f2b34592c0d02,2017-09-08T01:29:23.933000 -CVE-2014-8474,0,0,e9177b094025d76845e4fc535758df10d82d29e1d80c9cb1174f56ee67410ddf,2017-09-08T01:29:23.997000 -CVE-2014-8475,0,0,f8861933ee8b9be2febb7a36e8b90f6d951327a02e8bf20fc4f66ed2522d3c09,2017-09-08T01:29:24.060000 -CVE-2014-8476,0,0,4490471b2368e726a0da8fce738df4877a448a402ce84fbf68d3fdbedea8d8e0,2014-11-14T15:01:54.237000 -CVE-2014-8478,0,0,4779e8bc3e3da5b597ff1b70a7f23bc428894898436eec72621537c7d62dbf48,2020-02-10T15:15:19.247000 -CVE-2014-8479,0,0,0974ed98864b3d816307d6faf5ea455cf5d844a48bc648eb561c79a6c91919bd,2020-02-10T15:15:19.527000 -CVE-2014-8480,0,0,65db07117135cf69987ad258a310d419ae9e23d9085120d8a87a509a6c9fe220,2023-11-07T02:22:36.153000 -CVE-2014-8481,0,0,d6264ae91963d0c5fad03c31e34379d44642ee656f5cfba324bd3b69930b69ea,2023-11-07T02:22:36.230000 -CVE-2014-8483,0,0,1c27eefb1427c7b9298b2ba9b18b275f912526bc33c33cd36ebddf617add4fc7,2018-10-30T16:27:35.843000 -CVE-2014-8484,0,0,c0e7c092b25dbbfc9c08fe0732412fac29ed5484bc10dfaa7d68ab8ba9f2db34,2023-11-07T02:22:36.300000 -CVE-2014-8485,0,0,07bb9d55b55bb9590c73e960a96eea3628b666a020e965df620c155437e074bc,2023-11-07T02:22:36.377000 +CVE-2014-8451,0,1,a8eab94cf2d272f690957ea1bf084b7cfa4cb082c9909cd6828315d568608bce,2024-11-21T02:19:06.223000 +CVE-2014-8452,0,1,fc3e64f3b7af9ae2c36e7a21ead5bcc1c366b567acd5b7e937150eac73a5d748,2024-11-21T02:19:06.370000 +CVE-2014-8453,0,1,e8e82f05c224914750b1c1bb39b960e9a9338369b963d2dccee4ea8e892ad91c,2024-11-21T02:19:06.497000 +CVE-2014-8454,0,1,05925c6c66b521cbd86c07b0f9ececcf6476dd2415e14a5bd6aa94b1365c4445,2024-11-21T02:19:06.627000 +CVE-2014-8455,0,1,c50933006b1854291459872d81d671518a6a89f5c31c4713d3a77bbde1f60c9c,2024-11-21T02:19:06.750000 +CVE-2014-8456,0,1,9882739059e7f76664ea6bc01002549b4dd1ba12afaa42c4fbb7dc5b74735e65,2024-11-21T02:19:06.883000 +CVE-2014-8457,0,1,b1ee437c1ef76e5cb6089f33ffb93fc19056823c9d7645447ce7bca1dffd155d,2024-11-21T02:19:07.017000 +CVE-2014-8458,0,1,2f3c8e80c5319a3b6c1a63036cecb96aa7ae4545a3a385bf5879e9e6bb57ec2b,2024-11-21T02:19:07.147000 +CVE-2014-8459,0,1,65a1190089846e44f47d76daa17641efe025fce2f144c9d073445a1b9e8c3eba,2024-11-21T02:19:07.283000 +CVE-2014-8460,0,1,6f58d52ec8de6280d2498829691599725c78366308f4c19b4d9115e68234b820,2024-11-21T02:19:07.410000 +CVE-2014-8461,0,1,8fb56b2e237351fc4d228068fe26545c80add3423027b7c5635a78c7378195d6,2024-11-21T02:19:07.540000 +CVE-2014-8469,0,1,67a297ee5d3192724d7e771c96420b46f9fe8c15c8db53012c8f4c8e251a0b59,2024-11-21T02:19:07.673000 +CVE-2014-8471,0,1,8457f8d17cd178f92d01a9c4816b65269246ee975a14a3e1bd7f5747fe8ca5bc,2024-11-21T02:19:07.830000 +CVE-2014-8472,0,1,23082b12a0ea3197fd5579b860bdf22deee1e51557e48ab1ba2e8faad57de647,2024-11-21T02:19:07.973000 +CVE-2014-8473,0,1,08345e752b764575908215a322eee9f0819e7292e9f08e088ecb301b6a1190e9,2024-11-21T02:19:08.157000 +CVE-2014-8474,0,1,5211f27db9265d8e1b6f41e42cf66e6a9eb6df0185923d3570a9855bcfcf3b95,2024-11-21T02:19:08.313000 +CVE-2014-8475,0,1,e64f82c678b19d115eaee7ec831d58c686180cf13759ee5b9fc4961a26f007cc,2024-11-21T02:19:08.463000 +CVE-2014-8476,0,1,d2725121b8969927860a8039dacbd19af760a8e0c8f530b453b14dbf5673309a,2024-11-21T02:19:08.610000 +CVE-2014-8478,0,1,b8c8e50403ac3f315353e77c2a598f3bf99287fec62521c440ff6c54d75ed9ff,2024-11-21T02:19:08.760000 +CVE-2014-8479,0,1,c3395144bc080dcc5774cd0b0c9b86d73f5a07d8a9559336eacdb7a3d1884b20,2024-11-21T02:19:08.900000 +CVE-2014-8480,0,1,4bcfd4dea4292a7f9bce694ef255e4091bdedd4b10e641247959a0c729bc86d8,2024-11-21T02:19:09.043000 +CVE-2014-8481,0,1,92f353da6e552f7d5f3da5dd778298361c812bf9148a4b4e0b2fac43ce07e8c3,2024-11-21T02:19:09.200000 +CVE-2014-8483,0,1,c36aea27235c007ff7d2a7574268248ee09ef0483419d3fa230abd77c1a1312a,2024-11-21T02:19:09.360000 +CVE-2014-8484,0,1,c7b7081d96f15ea4b61aa97c0821baa6e73278fa28b73acc138bd54f86bbc3ec,2024-11-21T02:19:09.520000 +CVE-2014-8485,0,1,5c649d3a50f3d239857e926adfbd09940cdec351d339ba7eb54d423cb2fa27e0,2024-11-21T02:19:09.697000 CVE-2014-8486,0,0,6873488169c8569076d8671eaa7d0fed00a57cb91bd4b9029fb15cb25ca08b62,2023-11-07T02:22:36.453000 -CVE-2014-8487,0,0,541a4af72eed5cd55f3e95d6103db23cde492648b70c60c46708f396bbb14b4b,2018-10-09T19:54:17.997000 -CVE-2014-8488,0,0,48937c72dbad57ab2a9d630d9f7bb0ec148c9f33ed1e08b1649cbb72650fc23d,2015-09-03T14:57:26.963000 -CVE-2014-8489,0,0,1a182d27fac8331176550df4ddceace69b5990b326998cdf0151242f313aca55,2014-12-16T13:54:43.200000 +CVE-2014-8487,0,1,ab2e948f8eed2acaaea7da03b970dce78d90f658921935ea054f9f5ed4ab7dd6,2024-11-21T02:19:09.887000 +CVE-2014-8488,0,1,ca700dd2c4860c0170024716bc3ed4fc3c238fa14455901ec9c0933ce13e0d61,2024-11-21T02:19:10.027000 +CVE-2014-8489,0,1,a7caa7bd52fca45bc1f71f367196126a199731022792ddc08f1233cab95a49eb,2024-11-21T02:19:10.170000 CVE-2014-8490,0,0,abe5189778368b89aa0b94d492ddc0701a95b7e1232bce19d3d601073c13b2dc,2020-01-30T17:13:52.740000 CVE-2014-8491,0,0,79dff7aea9b5e6441d296d7f631219c2609014fa8745f9f8e321864f8d3690fb,2017-11-08T17:04:26.820000 CVE-2014-8492,0,0,8a5ff3c92add00112ce56c6b407603d7a5b1ff7f56f25f405428d70e047f9a89,2017-10-13T13:46:33.947000 -CVE-2014-8493,0,0,60f95b3122f9eeb39d5f61d73b56df277aa566bb762ffa813d3b0b06915c6c2b,2017-09-08T01:29:24.120000 -CVE-2014-8494,0,0,bd1191df00d5e90df3b05f46bc7eeba1dffbfea61a3eaae431443b7826f18465,2017-09-08T01:29:24.183000 -CVE-2014-8495,0,0,24cf36d680d304d719336092dc75aa10b78254009a0d8318e0676a9bfc8ec547,2017-09-08T01:29:24.230000 -CVE-2014-8496,0,0,feb53a840ccff1125eb47ed2a0b95a4059a6483ccc982858a7b08210b492b833,2014-12-10T18:29:33.513000 -CVE-2014-8498,0,0,19c352b76f3f04cb7c052c9dd0fcf983abebb0c58737166c316ec092192a1983,2019-07-16T12:22:14.657000 -CVE-2014-8499,0,0,072a8a63544d8436016cbba9970ee3802f21011123f63b09febcd4afb4a795c6,2017-09-08T01:29:24.357000 -CVE-2014-8500,0,0,4e1cd50de0f4fa6ac1e6a9603a74a2d9f2e199972eb63485748e987c2a32c852,2017-01-03T02:59:19.830000 -CVE-2014-8501,0,0,ef37e732187d6f8d2566ebae6f56412398c64dddd7f9db74c4606c8da0d1649a,2023-11-07T02:22:36.613000 -CVE-2014-8502,0,0,92635d5480d7402649cea133ea0150c9ef0b27d32e40c8df540b005ca6e49404,2023-11-07T02:22:36.690000 -CVE-2014-8503,0,0,70cd94cb54f9b1286affb5bee5280ec38dab7bee12ab336099a28067ca28529c,2023-11-07T02:22:36.770000 -CVE-2014-8504,0,0,a2e6deb255e95f854a30ced07a88edce866984f8589a2b88181ead5c800735c5,2023-11-07T02:22:36.850000 -CVE-2014-8505,0,0,f293d3d122c2f16f61b165ed344badf724730bf04200b326fe517431a9f3f656,2017-09-08T01:29:24.417000 -CVE-2014-8506,0,0,8417ef057e98f819f6a10eed0d24fd0904b8285babdbfe9f4f76e515364d2e7f,2017-09-08T01:29:24.467000 -CVE-2014-8507,0,0,dfd94fd39e7fd7220339024905633d42c5fe5464bd2899c38f9d741979642790,2015-08-06T16:41:30.707000 -CVE-2014-8508,0,0,ffb6de348ad7805f8ac6c39d58c087d0d3252849f69fcff86d116e4d673232d4,2015-08-06T16:44:22.400000 -CVE-2014-8509,0,0,9a6ce2b68d1c76bb30be6a577174a0a8991672fd747deeaaeb76bee8b80af46a,2014-11-03T20:56:33.140000 -CVE-2014-8510,0,0,4c92fe92b295f186d4d89862e6c0572ee2c20a98412271ef7571bfd6a7ed0667,2014-11-10T13:42:29.113000 -CVE-2014-8511,0,0,24499040c905356b561227eb7ae16e8840b06e7c6d435e2813f0915b1159e179,2015-02-02T16:49:22.903000 -CVE-2014-8512,0,0,e3aeaa879b5e795cbc89ce3c9121976b3fd652de94a2836de7e622c2eaff8bc3,2014-12-29T23:11:59.473000 -CVE-2014-8513,0,0,9743245e754a9390583feca7034a8f560d438abc9c2ad13de28b58f6e02c2e96,2014-12-29T23:12:32.693000 -CVE-2014-8514,0,0,92b0016573b8dbca1ada59d21f9c3a09705c79959e00016a868ce27a8518b69a,2016-12-31T02:59:14.200000 -CVE-2014-8515,0,0,25e904ebe135b3cf405da9b5a633502b7935ed96bcd20651d9d2fc2e0ba91230,2014-12-16T03:30:20.633000 +CVE-2014-8493,0,1,3a3a5a19b64529a336a257be3850a8c3644f05c7c8235fbe37fcd546f42c1577,2024-11-21T02:19:10.743000 +CVE-2014-8494,0,1,98d5d876ea4b23dd6007e19a6f3335361d528004b9b46c78e0b6c80de8b9d8be,2024-11-21T02:19:10.893000 +CVE-2014-8495,0,1,1baf011dbf8e39922eb1483767874d82c722cccbd0894c23a02c83c19165ee68,2024-11-21T02:19:11.033000 +CVE-2014-8496,0,1,2de75e6edd1cc92e17a6b0213c9df3e6a0fe12a55e4246aa67d5abb781e9c8ba,2024-11-21T02:19:11.173000 +CVE-2014-8498,0,1,de24e4a4dc8c4302df29b323196c965d3f3d086b9f46e8bd269b431eb1fecf97,2024-11-21T02:19:11.320000 +CVE-2014-8499,0,1,7628dd771a3725ac26d65aaa8feb4e0e1b745dc0ce927b61265821a1133f3a3e,2024-11-21T02:19:11.477000 +CVE-2014-8500,0,1,a973f18a4c1ee7a09b5b558c9e00b66014121ce01179578b460766b33beb7d31,2024-11-21T02:19:11.630000 +CVE-2014-8501,0,1,5be45c7234e6efa992bc547a8bf673323561a98ab5f38ce68f03346bc7cea0d9,2024-11-21T02:19:11.823000 +CVE-2014-8502,0,1,d5514a6202cce00a476306c73ea0bab0b2c0d9863a3897945125a536104c5893,2024-11-21T02:19:12 +CVE-2014-8503,0,1,59b43102c6e70c4ce530eebce39d7035179e9ea7f850237735ee0cb131dbd5a6,2024-11-21T02:19:12.187000 +CVE-2014-8504,0,1,eff1713b50e9b951683778c39ad44299a6ae61a141c50cec86bd4b136fb9a77b,2024-11-21T02:19:12.377000 +CVE-2014-8505,0,1,8467a3318fc579bf8867f0af1f508f352b0595e9cc8e847c5edcbf76c0db7553,2024-11-21T02:19:12.553000 +CVE-2014-8506,0,1,71e2c7f0af20c91b4b4b7c7ccc7a95c0cdc097a36ed73281f6c4fa4b4625def5,2024-11-21T02:19:12.697000 +CVE-2014-8507,0,1,2b3a1336bd138d8087945085cae63740c0520fac9cfd2d812d2f7a5047f5e756,2024-11-21T02:19:12.837000 +CVE-2014-8508,0,1,9d2ad9da108769c0cb1c076d8b49828950e59fb9965f4bc1c8c930a968f7e16c,2024-11-21T02:19:12.990000 +CVE-2014-8509,0,1,b4dd44cc5a0f4ab6993bdfe8234188bc1d12081842f0bae4e48e36de9e6d8920,2024-11-21T02:19:13.140000 +CVE-2014-8510,0,1,ee5b529ec27372e475467562ec0c90489651a468cc08e58a902056a3db7137b6,2024-11-21T02:19:13.300000 +CVE-2014-8511,0,1,213719f6567fe2f82858d33cf6f19e2da57c0461b6cb65eba3a0f1b72a19231b,2024-11-21T02:19:13.443000 +CVE-2014-8512,0,1,1334be3307477a907ede0e442ae42eaa106b66fbca59a1700b3b523ee31bb97a,2024-11-21T02:19:13.587000 +CVE-2014-8513,0,1,ac14f022b7ce19679cf58a3076bdd05c3e16c3cdf8966a1772b1af4c9caa13f5,2024-11-21T02:19:13.723000 +CVE-2014-8514,0,1,1870700a11adb6096967d1a868ce7cf0311453e0ffe4d959e4064aa1555a9d70,2024-11-21T02:19:13.863000 +CVE-2014-8515,0,1,a5ffd2226f92b0c4e718911e32114ba23d71f698cd7ed7041d16504690fdeee8,2024-11-21T02:19:14.010000 CVE-2014-8516,0,0,1e38097c977c2169ef49651d5e5c510ec7df8a946fb817a15001e65cb82d2832,2020-01-15T15:14:20.080000 -CVE-2014-8517,0,0,9c2eeee47304aef9c4fdeb2234f3e669657abf2cc804243c72d517e5b8d43bb8,2017-11-06T02:29:00.227000 -CVE-2014-8518,0,0,6fa8380f2d5824ac78106c5755ac5e54a3196abb8e7b95d735233f33a0c3432c,2014-11-19T03:03:01.713000 -CVE-2014-8519,0,0,2ad759f0532967e525beed6f1884cbd020965a9fbe14a99acc3a983fcbb2b23f,2014-10-30T14:45:31.300000 -CVE-2014-8520,0,0,d2ab4aafcb997890f752fb5e3e097548f3ecee4f394499ed7707654a8f28deba,2017-09-08T01:29:24.527000 -CVE-2014-8521,0,0,d6159ac897c70091d518a79291a7b8ccd946e14bb6ef76347af6933884e5cff3,2014-10-30T15:23:52.817000 -CVE-2014-8522,0,0,4df629b7da941de8c413c74413ee2580e2f9cde0552ed836e1ab9501c426ac52,2014-10-30T15:18:08.857000 -CVE-2014-8523,0,0,e4762103e5c0c660d71dd039f61e39c5503639832847d91040d366645a1864c7,2014-10-30T15:17:14.697000 -CVE-2014-8524,0,0,69d00ddf6b2e50039b724b70eb203831129ed27fe77c6650bc48486de05af8f2,2014-10-30T15:16:21.657000 -CVE-2014-8525,0,0,f5b4aa5ee60760d66d78ea223a7802da4fe7fe76bca90d4a59a4a58f448e16a8,2017-09-08T01:29:24.590000 -CVE-2014-8526,0,0,c812d614dd4d4515cdf0a1ca42b267fc8e9de4344bfc4340844af0da1e75e0b0,2014-10-30T15:30:42.377000 -CVE-2014-8527,0,0,66d18103ec77ac23f9e44eae3d294c0c4b39fae575ae165c36466413aba7d1a5,2014-10-30T15:29:30.370000 -CVE-2014-8528,0,0,3f421a684167ee9ca214b0ed97445360e136e4d9b9e555e54d0967fb3f13c71a,2014-10-30T15:28:40.190000 -CVE-2014-8529,0,0,5a6e34d52a639a891c8247ce8751e70d8f68b1a7d5d05e6199eee8f5e9fa5bb1,2014-10-30T15:26:50.257000 -CVE-2014-8530,0,0,760f97f79eb3d3fe19a5fbf2ecbce27119e3144469110fd7bab5877af8168d91,2014-10-30T15:24:52.417000 -CVE-2014-8531,0,0,9ea98b9255ad93bae2f993c7a55aeb3fd23e35d64182304b7fe693f70c542a5d,2017-09-08T01:29:24.637000 -CVE-2014-8532,0,0,38459e74db80780d2709eeff6d63e5224565fb23d950707d85a03b496c4fa9f2,2014-10-30T15:33:15.973000 -CVE-2014-8533,0,0,94ec708ea6c3114e9af275f785871fceba1210525227b1b0c27d93c1bd10738a,2014-10-30T15:35:29.347000 -CVE-2014-8534,0,0,c082656d9b30ef3677eb4155520c8159777d040179d24277e268e21948bca6e5,2014-10-30T14:44:21.167000 -CVE-2014-8535,0,0,3aa2e9d39cb1975130f79a9457c7bad8e965a9bc52740f404421a3ae43802585,2014-10-30T14:41:11.147000 -CVE-2014-8536,0,0,28f11f56802494f716a6c8029ca938caac93972034eedb73c2a7b65a8036190a,2017-09-08T01:29:24.700000 -CVE-2014-8537,0,0,8d519c616fda70223024d58fad68b95d5f94f9a3e99a02f56dd187e3c64a7c88,2017-09-08T01:29:24.763000 -CVE-2014-8538,0,0,2299848cc5abffc3ac823d3d54e9b3f6b71c5056352441087eebd3f35f5ad1ff,2014-11-14T14:58:02.367000 -CVE-2014-8539,0,0,3ae541313605afcc7f8b3e8ec89ace2acc4473b77d03f6d84c0afa7dcdb35ba0,2018-10-09T19:54:20.823000 +CVE-2014-8517,0,1,3dd3678e492998200617b8a19ad3342a8c549b7ed48e5bc0ed80eea88912668b,2024-11-21T02:19:14.307000 +CVE-2014-8518,0,1,346008a4d3d1ad4ca18da857504a0b269136cf1e69a2e721dd2d7235b2abdf5b,2024-11-21T02:19:14.467000 +CVE-2014-8519,0,1,4f25cc03b6f15ac8792f7752fd0cfcc1b2a3af0679f545f2ee1bb2686f809a12,2024-11-21T02:19:14.603000 +CVE-2014-8520,0,1,0d6f0fc57d72aa634174ff0080b09f1766129ce9cbf2fbe3d2e0f4a5e745afe6,2024-11-21T02:19:14.737000 +CVE-2014-8521,0,1,4ae14a7e4fbd9118444f57a68ce1cad1f09812267499f34363c0217b13094a75,2024-11-21T02:19:14.873000 +CVE-2014-8522,0,1,f71ca9b387da92a43af14426457760983049058c9d38a559f0276cb4c1d1d93b,2024-11-21T02:19:15.003000 +CVE-2014-8523,0,1,df7bf7b4c94e48e35b59612b4a8948995caf21f3875eefe61f5f8d35634fc521,2024-11-21T02:19:15.153000 +CVE-2014-8524,0,1,93397b717d8b3738374f1325cbaabc56549f85d851d80988ed8e324f46e57bf9,2024-11-21T02:19:15.293000 +CVE-2014-8525,0,1,bccb78c9fe28bb1dc56599d3ccd6e2d5d88253eee4287135080a8d73acd5639c,2024-11-21T02:19:15.427000 +CVE-2014-8526,0,1,164d083a87a6317efe169500c3c710c4a2df6b4f1783ab00984b1a71128fda8f,2024-11-21T02:19:15.567000 +CVE-2014-8527,0,1,632120fa54b55cccdff59b021582b0382ef9b7d131b924b6a33cf6f7f530ec74,2024-11-21T02:19:15.703000 +CVE-2014-8528,0,1,7b5d974c672e31b8db20f8dad56d6470524112d52df2cce25c297402507f8ea9,2024-11-21T02:19:15.833000 +CVE-2014-8529,0,1,4049b0beebc3789a955a798bcea24a44e7424250b650904f6cb3fc7c75c8238a,2024-11-21T02:19:15.970000 +CVE-2014-8530,0,1,74633aab086a2b7a0eb509c83d1014417bc291d89877ea2af75838bf1c9e91c6,2024-11-21T02:19:16.120000 +CVE-2014-8531,0,1,561256b6706bfda7c743660712e7b6180b72ce7e57359bd5761738e80e0c592a,2024-11-21T02:19:16.260000 +CVE-2014-8532,0,1,aead14d82af76c0e91644e8f79ed79d7116164c2f48d90012e2a8403c759670e,2024-11-21T02:19:16.430000 +CVE-2014-8533,0,1,9d346cd89220b89c232be569b024496ff7ac651841d41ebd9cd10b6c71c0b269,2024-11-21T02:19:16.570000 +CVE-2014-8534,0,1,78c3cdec2d386bf144610bc9e74b509baeea950a06d63b1a3545ca89e594af3b,2024-11-21T02:19:16.707000 +CVE-2014-8535,0,1,c506cca880f42047de135137761dff61704b89a233ed3c5b4fa9be72b1d2b567,2024-11-21T02:19:16.843000 +CVE-2014-8536,0,1,2d030c9ae37a56b84f8c188d5e16232b58dc148cd33be4ece667aa384e44087d,2024-11-21T02:19:16.980000 +CVE-2014-8537,0,1,8a8ebb3aa2f21c503b0e43ea1b324d7fb0452bc352a7c1738ea3c168e89db0e8,2024-11-21T02:19:17.120000 +CVE-2014-8538,0,1,0325ec3ec52278de978db9a4407c3e2c00ef019e5d0fb74d95e1ad46932d8ab8,2024-11-21T02:19:17.260000 +CVE-2014-8539,0,1,5b8d0d71bf33f20f5d25b0e219c5894895c94394ceb7fc948f532bd186d03853,2024-11-21T02:19:17.497000 CVE-2014-8540,0,0,d278cb54e7384a5475049bbd9bf3e39b4df457d6c3c5b9725e5c30ca04f6cd8e,2018-01-18T22:48:32.213000 -CVE-2014-8541,0,0,2198909071fc49628013b9573847714c598d6bdd510b505f62ddbba25c1fc74f,2023-11-07T02:22:37.153000 -CVE-2014-8542,0,0,84f5c6f01258513d832dfba06ff73a28e637ce85759eead47fc99b678e3083c8,2023-11-07T02:22:37.220000 -CVE-2014-8543,0,0,b50ebe3980983db6518cc2f9eb0d635343fd4a76b1b33459903d38bd5a78ed10,2023-11-07T02:22:37.313000 -CVE-2014-8544,0,0,993cb45ab662000cc2b5d05e385c48fa3c156a9d929542250c3e32a17cdb497c,2023-11-07T02:22:37.400000 -CVE-2014-8545,0,0,8aa0ff90fc1447585549ee661000f6586270304b3bdbfd932c36b9fb1118583c,2023-11-07T02:22:37.480000 -CVE-2014-8546,0,0,c9205268405f69be6c37d140117de65d0ee5b06d6ebd8511584bdef7a285ab14,2023-11-07T02:22:37.570000 -CVE-2014-8547,0,0,347003c7097970f6a97e5239d74569656f9e22ec839fcedbe75efdc02c86c6ea,2023-11-07T02:22:37.653000 -CVE-2014-8548,0,0,d71cd74bf54f2cdb370101f02b80d7e20d057ebb86bd604b7b51b1cb1c0b11df,2023-11-07T02:22:37.737000 -CVE-2014-8549,0,0,59b6a8cdb33febe395514677c8c6c4d10698b7f70c3732a549aec56b44870c73,2023-11-07T02:22:37.820000 -CVE-2014-8551,0,0,f3e344d3e84d73eff9031b0510bcea31ef0ead150e97a8083d08a2e70f82c029,2014-11-26T16:53:19.637000 -CVE-2014-8552,0,0,03eb4a0f3e1a1572d7bb696bc7eaf687814fa1c7f9cba5c741f15b6ceafd446a,2014-11-26T16:54:50.050000 -CVE-2014-8553,0,0,d558207e7a725de74954e0cdca2675eefa1936c761d43358b93a22a5caebbba6,2017-09-08T01:29:24.823000 -CVE-2014-8554,0,0,0ab194336d2116bd197444f5117090e8d23c4d8f3792aa2a50593e47495d45e4,2021-01-12T18:05:59.507000 -CVE-2014-8555,0,0,0ea1ed9051a041a5013499280cb13ec44102922878b6ccc792f44afbb6102dad,2015-10-05T21:45:17.767000 -CVE-2014-8557,0,0,77cb75d833a4e57f7a11e7de8a2d9552428725888076316678d6fe67a0e4db29,2017-09-08T01:29:24.950000 -CVE-2014-8558,0,0,5851d117a50e5dd4d7855745dfc57e9ba74cb0299974f62ed22b46f8a79c4990,2014-11-26T18:50:45.463000 -CVE-2014-8559,0,0,1e5e0876abc80f5232f61739977cf0a94ffd8a127e11a942aabe55bd15fcc2ef,2020-08-13T17:42:43.860000 +CVE-2014-8541,0,1,0457d199e42fa6e36f732d2609b71c806326f65110bfa435ae291b750b9a7c95,2024-11-21T02:19:17.797000 +CVE-2014-8542,0,1,70fc64b1ebf71726ef523578ae10fe749ff1ad0c3a6f62471a0efc3998a90521,2024-11-21T02:19:17.960000 +CVE-2014-8543,0,1,f8267335ca218f036f043f936220b58c120781c21af6b4a543971869b79b1da0,2024-11-21T02:19:18.123000 +CVE-2014-8544,0,1,3ff2d901d7b871c3bb0cab90eb543444badeb84426b6a6d3ac33372a284de5df,2024-11-21T02:19:18.297000 +CVE-2014-8545,0,1,40d2a9e5fcae6b22aca9f62e5208537902dad01264370e30069dd236bf448a85,2024-11-21T02:19:18.460000 +CVE-2014-8546,0,1,d7c83e6e4df36359dbfdc10d9f06ce94492753d2b1d804a1180099c31de09c96,2024-11-21T02:19:18.623000 +CVE-2014-8547,0,1,8109d704a2a4eb1c51334ad12cd60d474cfa0a3f48121f5335d564817f68f5d5,2024-11-21T02:19:18.780000 +CVE-2014-8548,0,1,8baea2883db1acae36d7a66ce34c1e26398681e89011cdf1ac70147da95059e5,2024-11-21T02:19:18.940000 +CVE-2014-8549,0,1,aacaedadd52d9746c9fb206856c75c0d94e06ce721be7f68f590de3c842be0cd,2024-11-21T02:19:19.097000 +CVE-2014-8551,0,1,6a7411c7f19442da350016713910d74d020e13c26573176a86d599f62ed70508,2024-11-21T02:19:19.247000 +CVE-2014-8552,0,1,73a7bb5de34a373388e2377cdf66351268af2d9d7accc1b8d695c0cdd7f06210,2024-11-21T02:19:19.387000 +CVE-2014-8553,0,1,06c9b06f17abaf090d68f7cf1465f753bb31481a50e59f47f41e7050787b3881,2024-11-21T02:19:19.530000 +CVE-2014-8554,0,1,23b263827ce05a468a4bf2eb4e32d6b82e2a66daea3a109766211808c9f9da4b,2024-11-21T02:19:19.677000 +CVE-2014-8555,0,1,94326464ff92a8f28c5f7c6b6f193bd0e601433d30b568cc40bab66595343c73,2024-11-21T02:19:19.833000 +CVE-2014-8557,0,1,f115028b71b15697000fd99d44852c55b4ede5f0202d28f34807b951a4a9d25f,2024-11-21T02:19:19.980000 +CVE-2014-8558,0,1,b102325a702ed1a672e5547189da1757cf156fa37a78b77f5b02ee8c0333ae81,2024-11-21T02:19:20.120000 +CVE-2014-8559,0,1,c986fec32c4445dab8d51329c9b8413cafa4c8da3d013883deedacbe4f9d7c1e,2024-11-21T02:19:20.253000 CVE-2014-8561,0,0,263ba96e7bba1a2b023564f467acaf0523ba8c868039e67bc673e1a86b00f166,2019-12-19T13:42:24.250000 CVE-2014-8562,0,0,527fe5c19f86cd4b58d6e6945cc2885b5d23d2e51a3d75fae91dddee660cb23a,2017-04-17T12:52:58.923000 CVE-2014-8563,0,0,3111a231a255c263c8c9af0a987a45c2c223b00295870c240840ec2eb84f6cbe,2020-01-29T14:52:43.230000 -CVE-2014-8564,0,0,895e60001910d17ab200ea3dcc992d06be4162b9f7db1ceb7bec637e94718db7,2018-10-30T16:27:35.843000 +CVE-2014-8564,0,1,b0a98c0484ec31a374f05c76cd96bf50fe9df3316960f7434a984e111b2b6744,2024-11-21T02:19:20.943000 CVE-2014-8565,0,0,7b6e36710a4c9c0dbde32f3687348d5e43de3f65b8803804767b5ea8cb9ad233,2023-11-07T02:22:38.020000 -CVE-2014-8566,0,0,d45a993f4d7dfa850dc4cf9fe45d72cde3d7ee5f00717f8da0706bb8b0d0bbe9,2019-12-27T16:08:47.953000 -CVE-2014-8567,0,0,42af3e451e9b3c19f405d4c4d68cb7cc1186737b1e4594b0b78f518aea22616b,2019-07-09T12:29:11.947000 +CVE-2014-8566,0,1,ec450580a30f3c00317a0f703655c5b2f97031bd363de853342a2b61ba5b0251,2024-11-21T02:19:21.123000 +CVE-2014-8567,0,1,723a799ecaf144e674a841523eb7fffffa9c6f8672f93713329d35349b290e25,2024-11-21T02:19:21.280000 CVE-2014-8570,0,0,6ea1abd9b5e3f473b2f431e042766e55089dc5270067c7e805b6d68a7520f3c8,2017-04-10T20:26:59.530000 CVE-2014-8571,0,0,b111ebcb6f0e92783a630a4c76e3c35c3eea1fb5dc54a0d8cbf7d7e6cf165177,2017-04-05T18:50:45.960000 CVE-2014-8572,0,0,0ad83d410be0b1fc1eb1778d84d080f0c83c56a9a4c228c883fbc21863a2e83d,2017-04-11T01:11:55.313000 @@ -72249,110 +72249,110 @@ CVE-2014-8573,0,0,91d5a69b3bcfb962a537d18fa66ee4aab12fc61aff655e2920f0fd359a8296 CVE-2014-8574,0,0,13446ffd2c3155e7795f0a3ad2d74222078aed894788d39ee4d7ccf1912c5e1e,2023-11-07T02:22:38.310000 CVE-2014-8575,0,0,23ba876a481d7a4cfb2ad39be2197781d77b2eb95f3423c6155b8e0a518b63aa,2023-11-07T02:22:38.543000 CVE-2014-8576,0,0,1420fb84e00792cb1be365fcd0561afb96ae61640fda92ad9b7309dab632f2cf,2023-11-07T02:22:38.800000 -CVE-2014-8577,0,0,93ddaaef1a466e41ad2cb2c06fd946e053313357b43c5e032db54b83bc66d40a,2017-09-08T01:29:25.013000 -CVE-2014-8578,0,0,121ded646891c168dfd81cefc7ab2d73be70decd281f2d6a4e51296cdcd1917c,2021-03-09T15:07:11.377000 +CVE-2014-8577,0,1,ecd587b9630814008fe068fec9a7571922c2cb3abc62f2bcb282d61d8b4aae33,2024-11-21T02:19:21.923000 +CVE-2014-8578,0,1,2e78b83c6b6d576e1e48493518f48eb7a1afa38fbda1c4f1f6d1d79d6f179570,2024-11-21T02:19:22.070000 CVE-2014-8579,0,0,b272e20d000ecf1e22ec9600477cc11b6465f7b4c803ee43f6539a1ab828c963,2018-01-26T15:13:01.047000 -CVE-2014-8580,0,0,122863f90fbc3a09d849026f05c7407a69a26d31561d974b58b5a6478961f798,2017-09-08T01:29:25.073000 -CVE-2014-8582,0,0,a4b18792f41ac689dc0013d82ba1c5df324de28be6834db9fca4069d18e1ca0e,2017-09-08T01:29:25.153000 -CVE-2014-8583,0,0,1c705d1640358681fa3856a338077bd66398f51fd358e4d9d2519c53580aa958,2017-07-01T01:29:08.513000 -CVE-2014-8584,0,0,045854f4b2ad8e031885933b03888d5cd3ba9a9741ca143373c2707182f726c4,2014-12-11T13:46:34.127000 -CVE-2014-8585,0,0,f268cc0c690c8b3365ff5e74e1cb811c2337e187a6a6728d543bbfcb39e4a17d,2020-05-05T12:21:05.580000 -CVE-2014-8586,0,0,31eff0bed79db279ea792be9d06832815b1e7554480105f5c237c61d978643fe,2017-09-08T01:29:25.263000 -CVE-2014-8587,0,0,91026f504160f91cdf1949355fe90d6d946feb35095beaa98721a6e81c44e604,2023-10-03T15:48:10.677000 -CVE-2014-8588,0,0,132ce1c1485a2907f7f4941508de0822312d1907474d6aec38785bfaa3c19542,2018-12-10T19:29:04.607000 -CVE-2014-8589,0,0,a5243077974dfb1b2f5a356c178f16f0bfbb518c952b6f9462b0938628688f0e,2018-12-10T19:29:04.810000 -CVE-2014-8590,0,0,4cf5d47febb9360ae0d754280c395bcd0fe7f82ac177ccefe82d7c205549df71,2018-12-10T19:29:05.013000 -CVE-2014-8591,0,0,a886af9e1905e3b7fb1622a8701788fb4e68521603cc1fa326a03161df767f3b,2018-12-10T19:29:05.280000 -CVE-2014-8592,0,0,b5783ec9880dc307839f82eaed65303f5e5fc3967716b68836b0deaf114a3058,2018-12-10T19:29:05.640000 -CVE-2014-8593,0,0,4e14c5880315b44ae603352de9d6ef24690e18b0a76bed5d4c9851dfd818e73b,2017-09-08T01:29:25.480000 -CVE-2014-8594,0,0,f5d6865d9785744ef5a03ce62dab657a2e749ddbd7403b7aa4e34c21e9e78b24,2018-10-30T16:27:35.843000 -CVE-2014-8595,0,0,441ca188ca94532a6b6f8912ee3e1d7c228f516a62a96a6667f37957a80ea1c0,2018-10-30T16:27:35.843000 -CVE-2014-8596,0,0,929ad05e78502835d0a333c0dbbd73c50d00f404313949446ef83384ca97af87,2017-10-03T01:29:00.450000 +CVE-2014-8580,0,1,8cab022a67a7bbb7f402ae20cfaa4e64a239312e6b788cb0cd50c837a1d18d16,2024-11-21T02:19:22.360000 +CVE-2014-8582,0,1,d7c972addc2c58e0b78ca6f5b33a8baea30035c31e9009906a0ea44ece2938cc,2024-11-21T02:19:22.510000 +CVE-2014-8583,0,1,003f97b7590510f458614463ff9fc137fb302d3dcf3ad96cf4cf2e722025779a,2024-11-21T02:19:22.653000 +CVE-2014-8584,0,1,6ad3fbdcdcb7003514716842fcbc848437da0035dd509534f6e99c35c85cacc0,2024-11-21T02:19:22.800000 +CVE-2014-8585,0,1,f4dd007528f697d32e50739d34ff4073207d1a7cd81fba212775166d0fb55c1f,2024-11-21T02:19:22.937000 +CVE-2014-8586,0,1,de4b368ba107be3bf8f3dc25e44ebe96398a08cd6a3da8410875c15f34004551,2024-11-21T02:19:23.100000 +CVE-2014-8587,0,1,2092d4dcb673032e3acb0b77384683aaac73159e5e0db38a546e4d29e6c512ea,2024-11-21T02:19:23.250000 +CVE-2014-8588,0,1,3a01ed2a32b41eef605afbc45ae718405ff3ab125821d59ff33404bf1158ed35,2024-11-21T02:19:23.450000 +CVE-2014-8589,0,1,54e060c9cb53fa28d72f4e52904540300b0cef83fb04418df616548ab27ffb68,2024-11-21T02:19:23.593000 +CVE-2014-8590,0,1,b372276e4879a37698df95a18e90c9f7a0fb1f73d220d875ed66474160a57f6e,2024-11-21T02:19:23.730000 +CVE-2014-8591,0,1,a83c7a050426f12b850faa06afbf09f6df590d490af85cac48252150b4d0585c,2024-11-21T02:19:23.870000 +CVE-2014-8592,0,1,fa44ab2ea745f748393a3b0777b813b5478581d208cd9c822feeb52bc1916113,2024-11-21T02:19:24.017000 +CVE-2014-8593,0,1,a9a03fe12bb39fdd9a10e0141ac5d3ede82c02ed8ecbbb4ed908f4cce092b112,2024-11-21T02:19:24.173000 +CVE-2014-8594,0,1,289b4fb577de39111e6493f3a8a0e271f9507017badcdafb678c05dc12722af7,2024-11-21T02:19:24.313000 +CVE-2014-8595,0,1,8077d7187c2086253ee13d528864bcaa4646606c303953d7d01db8ac7440a64f,2024-11-21T02:19:24.480000 +CVE-2014-8596,0,1,2e9369e21734b1acf5c32b90aae576d57689f7afe920095edf0bab6dffb04f3c,2024-11-21T02:19:24.647000 CVE-2014-8597,0,0,ca12c86418187ef35dc51789d47fdcee74c95a30f07633b0b5d89d0e698860b8,2022-02-24T20:20:05.740000 -CVE-2014-8598,0,0,e15d084d6798f9964dafc6b6f2eb35caafc56fb965e945b9f268f2e3e7ce2547,2017-09-08T01:29:25.730000 -CVE-2014-8600,0,0,37fb77efb4307169cfa7fe17635fd86d1737b1ecdff55da86eb0c51a6f47dc3d,2018-10-30T16:27:34.687000 -CVE-2014-8601,0,0,ad17a1e879437db1c568020e7eba0a2638a14231c4bbb9574740e24ac0799771,2016-09-06T14:30:17.777000 -CVE-2014-8602,0,0,2fa57524da89e099a84ebbe22973e727ff48b6b5a9482a7c1dab12c8912d035f,2016-11-28T19:13:26.333000 +CVE-2014-8598,0,1,20a6f259061dbbc98f7521b4f3e968cf39b5ad3cf866e077de297f38c66be489,2024-11-21T02:19:24.947000 +CVE-2014-8600,0,1,5f3ee052f044d1e075eac106306283944d4d85d3d83868e6c9596da2748f1537,2024-11-21T02:19:25.093000 +CVE-2014-8601,0,1,4d13cf8fbf0aa7bd2ddffeb2b2e3c84403cc246f34592115420ee3eaf552f367,2024-11-21T02:19:25.237000 +CVE-2014-8602,0,1,61f2b5537755d84588a04c961b0c6d8979cd0fbe75a1d8f37199eea506f3d4bb,2024-11-21T02:19:25.387000 CVE-2014-8603,0,0,705689ece4fc60f3abba5aaf881e31989eba6714ccc8b533dcc30125ae9e58bc,2015-06-11T17:32:08.147000 CVE-2014-8604,0,0,afde6b369cbfee984368b4a06760b28babca1ba3aa25aff578e068abac80a770,2015-06-11T17:33:15.763000 CVE-2014-8605,0,0,ccc41892b6b1d31339f9f68b305aa2b52364df51bf42012db6a5d0b68dfd90a6,2015-06-11T17:35:10.423000 CVE-2014-8606,0,0,e7a0143c82c1265591ff5be1b425442d8bf645629a27a77db84337cd0e760090,2015-06-11T18:33:27.423000 CVE-2014-8607,0,0,addb19231ea4ac886f9efc8d389d1cd9cac15381d282c945a20dd1000e6d6731,2015-06-11T17:53:06.120000 -CVE-2014-8608,0,0,5706269cac7ceb63378bd26d903889ad27a3ed93db7602ee12bd684a50d7447b,2016-12-16T02:59:03.367000 -CVE-2014-8609,0,0,2419e9ce8fb193b50b361c304f873ece5bbb82d37206a15bbab2c67ea3491361,2014-12-16T18:15:13.620000 -CVE-2014-8610,0,0,fbf2791e43bd5a552305fae6e51bd30c5c94cdf8658a5734f8f81e03f38386ec,2014-12-16T20:06:17.377000 +CVE-2014-8608,0,1,4d061508fc559707baf362ad37aaf49eeda9da4c1f9c0500fe6ce2d7d61e359e,2024-11-21T02:19:26.267000 +CVE-2014-8609,0,1,d0e7cf8f23b1940d6ce2fe20037f0012fc9b875a5e783e64df51ca51fc296a4f,2024-11-21T02:19:26.430000 +CVE-2014-8610,0,1,6574f602af5d0e8867d65e57c8e6b00e9a6993971a3fa7bd8d125fa660e0b5de,2024-11-21T02:19:26.590000 CVE-2014-8611,0,0,f71c571ce5461fce456b38354618664def617b9b1758fb138fd5156f396853c6,2016-04-06T12:40:30.873000 -CVE-2014-8612,0,0,dcab5a560b7ef02232c5103ba9891ab02462fe0d757d0205b3c167311b0b90ed,2018-10-09T19:54:22.667000 -CVE-2014-8613,0,0,6feeb23941b016b23a4ada27d6045da516653ed7b76c55155c4216fbaaa81249,2015-02-04T05:09:45.440000 +CVE-2014-8612,0,1,26870436773bff4ca50fdecfb80ad275f80d7d4b7b21f9aa67df29834698ccf4,2024-11-21T02:19:26.933000 +CVE-2014-8613,0,1,198a3d60b1d1a33ef1811f43f2edc0dda287ff18c2e826f483be6dcadd0c7b1f,2024-11-21T02:19:27.107000 CVE-2014-8614,0,0,4bdf63487e0f67d2379d9f6bb250e481f4a9c83d25e2fcde926f2e40465bfbb3,2023-11-07T02:22:39.313000 CVE-2014-8615,0,0,548a602a549e443d9f0d5ecfe12d1e769d81f28633cef6873294b88ccdc7345b,2023-11-07T02:22:39.360000 -CVE-2014-8616,0,0,47914db7b247cafa1f13631f1ea5a43aabeca0132afa06bda7bacde5c4d56284,2017-01-03T02:59:20.347000 -CVE-2014-8617,0,0,bdd672258217270d52d6d210e069c81f481c65a3239b491f627ccd203e159f0c,2015-11-19T17:43:09.690000 -CVE-2014-8618,0,0,94f39439658de6a9d7d17badebe02ab16c3e3e56dd459b324b437cf6d862426c,2017-01-03T02:59:20.407000 -CVE-2014-8619,0,0,9e9b91cdc22cf2010cb45ffbc2e46942f1b247b5c403e9c7a45ac4c7c7ff0c26,2017-01-03T02:59:20.457000 +CVE-2014-8616,0,1,43415729b7eec9624c879c20161c0c6b9aaa37b22771d57d42cdaf3c8041df35,2024-11-21T02:19:27.290000 +CVE-2014-8617,0,1,056a61175cc215e3f0083454c2610ae999418cc475a1d423f4ec8dc96fb6697f,2024-11-21T02:19:27.433000 +CVE-2014-8618,0,1,1ddf1ea26c5e4299e2b2819efd7c66b9f2f2b78397e19c4b0ccebb4c3eb00ea3,2024-11-21T02:19:27.580000 +CVE-2014-8619,0,1,aabef7c664c0c4a9ae888a0e11efbab2140f38ca0c5346fe6ce4c0cf034005ed,2024-11-21T02:19:27.730000 CVE-2014-8621,0,0,5ad760d42f2e06eb070bf968889f70934307e4af021e224ce1f89cd47e0de614,2017-10-25T20:12:48.680000 -CVE-2014-8622,0,0,63129de862d589ea6c87881edde434964f9d11735c7a8c5f95bf41d05e1ea7ee,2014-11-06T19:09:38.593000 -CVE-2014-8625,0,0,673a93c90ef27561f7ceabd945dd8a8cd3064f1b9a298b9954d424e66810294e,2017-09-08T01:29:25.793000 -CVE-2014-8626,0,0,3d5a59c1ca019f0d608a6808c3cdd307423805e78e0f2422cdf43f4c574f841f,2023-11-07T02:22:39.440000 -CVE-2014-8627,0,0,8199c48ace89f4a6abf4f71541ff296e258cc70a9c3010822953a0ee473cb83f,2023-11-07T02:22:39.503000 +CVE-2014-8622,0,1,8ed1f9a938ee6034b51bcad4feccd6095c63f60fa87f339690b1dbf1f24f74aa,2024-11-21T02:19:28.020000 +CVE-2014-8625,0,1,c46d0c4954fb3b0ec68f9ab3ce631f46730b2252868bccadbc29211267773d18,2024-11-21T02:19:28.163000 +CVE-2014-8626,0,1,9f83aad05b10cbab319d0ce0dc1208705bbfdd5817b84bf435fde5a80789198e,2024-11-21T02:19:28.310000 +CVE-2014-8627,0,1,f3f4734a45cd79a5db605358c21f2280f7313f30f0793335b82e727dda7cefd6,2024-11-21T02:19:28.453000 CVE-2014-8628,0,0,e8fe91db8b103a43763566c5d0dfff891d80ae8dc60fe0ea01daa0b452ad0b70,2023-11-07T02:22:39.873000 -CVE-2014-8629,0,0,22f44855a853ed931ed4945cbf74c42efb06f920e3e1e691e64d3598b54b1543,2017-09-08T01:29:25.840000 -CVE-2014-8630,0,0,56ab85f8483bc81c08baad67cdf626b978d4ce2cd1620249c7e825ea105d34e3,2017-01-03T02:59:20.563000 -CVE-2014-8631,0,0,71e350b8d312f58e9c0ee511ea675718743114b3b88d9be16519f193e2763b0e,2016-12-22T02:59:19.737000 -CVE-2014-8632,0,0,8e9ebe1e1096e52bf8f9b9224bff045564340412ec48cf385c864797adc961d7,2016-12-22T02:59:19.783000 -CVE-2014-8634,0,0,a00c2fad938e0a36a0e0246f6a5f7000a905f2385ab66f669e670b9fb444a773,2024-10-21T13:55:03.510000 -CVE-2014-8635,0,0,d931b22e866f9db25934bffdaeb5f755426d00d622fe4f8cdfe325460ce5a3b3,2017-01-03T02:59:20.860000 -CVE-2014-8636,0,0,949924c17556b8cb58e8e160bd7d5acc278d8709bc858d7ec6373d895828a9a8,2017-09-08T01:29:25.997000 -CVE-2014-8637,0,0,38cb2144ea48d3c4c3e18e9af734924b0e5e81d314d99a9c9adcb2dc152ff59d,2017-09-08T01:29:26.060000 -CVE-2014-8638,0,0,9fa7e4122f41f12321f5eda55dcb8e33a94accb82038cd3d3e4be0552da4eef3,2024-10-21T13:55:03.510000 -CVE-2014-8639,0,0,9da3b56b07489bfaf9ce8731e6277aa14669a5c240890db4695a4e4aff1f088a,2024-10-21T13:55:03.510000 -CVE-2014-8640,0,0,7c57dd1bf65ae55a78d9b10d3482699e0474f89a0456eb3672880e2d7e1f276b,2018-10-30T16:27:35.843000 -CVE-2014-8641,0,0,31e8eb0e9546c3ce8bd054cf10c14f4c1fd2e1528d1c5706244f79a7a939ed95,2024-10-21T13:55:03.510000 -CVE-2014-8642,0,0,ecb94dc0ce3bd8cec93da37a6d3656ed85fb8c39b5eb5a6e0101e1f4273240d1,2018-10-30T16:27:35.843000 -CVE-2014-8643,0,0,e883bbea3065ffccb52ced5817b625aaf5fab4bf77558aaa730210ee7aed35e5,2018-10-30T16:27:35.843000 +CVE-2014-8629,0,1,074b62a2372b421bee9689938fd14ad604e20ab68d56dbdcf3ff55a8011985b2,2024-11-21T02:19:28.690000 +CVE-2014-8630,0,1,77806f68c10f27cc18e9f03530c7c88518deeeb0a9dba4117ce4a9aa229cc688,2024-11-21T02:19:28.833000 +CVE-2014-8631,0,1,074ae8d1b2d119e9cb80a3294b5dc529a3d2d8ecb16df07e92d5c375718cb265,2024-11-21T02:19:28.953000 +CVE-2014-8632,0,1,8ab1c13e9cc3905bf4223bb85dd52792e485be487c9fcafbc532674d344dd389,2024-11-21T02:19:29.080000 +CVE-2014-8634,0,1,8edd772bf4769432e4d6fcdc3620a2a69e4f940fa1f726883792740101ed9455,2024-11-21T02:19:29.210000 +CVE-2014-8635,0,1,df16545fb05c8bb15ddee340db9ff33739b94f74d81e11bd22fe45f8ba530922,2024-11-21T02:19:29.370000 +CVE-2014-8636,0,1,22651a05f949dd60dd79ff41525c05ffeb8553fd5b1cd24d9419df6cb3e05e79,2024-11-21T02:19:29.520000 +CVE-2014-8637,0,1,a8a7264826cc0689898a3a351e5ba20d6c5f618f614ca84823abc1e0847bddcb,2024-11-21T02:19:29.670000 +CVE-2014-8638,0,1,f0ca74a40a99f4a99fcbfa97ce7b7be76ee00e78ee5b74f4e199e13af11d1acf,2024-11-21T02:19:29.813000 +CVE-2014-8639,0,1,7bd495b4d8d14cb5963c3b258bd1ff98442063af95a2ff6cdc0933c015d6e969,2024-11-21T02:19:29.973000 +CVE-2014-8640,0,1,acee12a0c61a3fa02dcb68d83c0e542f27af3a9aea20cbcb40313fc6b866c568,2024-11-21T02:19:30.133000 +CVE-2014-8641,0,1,68fd05325489f25282e9f2328bd4439052b59376b9835d2fa56b94a4008b4547,2024-11-21T02:19:30.280000 +CVE-2014-8642,0,1,fda72cef3bdec1c2ba90fa1162e927cb5eeff9304676bddd1e289c973ba46a9d,2024-11-21T02:19:30.430000 +CVE-2014-8643,0,1,67a118988859294e1fc3206035d922b16b4ad2ce0eaee42e9638f9f28ed353b0,2024-11-21T02:19:30.577000 CVE-2014-8645,0,0,ce726cb490bda2b5876610e9598c72e450ecbfcd4f0cea59a819932e36bdec8d,2023-11-07T02:22:40.350000 CVE-2014-8646,0,0,5cc2614cc2db526841ccb7e49a30acc60e8fa2d816d6594e7e0f5a07c7ca28cb,2023-11-07T02:22:40.580000 CVE-2014-8647,0,0,2bcb2475ec2b0281fd421448300087dccba3f6bb1ec488aa32ace08730155f0f,2023-11-07T02:22:40.833000 CVE-2014-8648,0,0,1325dd9ae3272deec53a8be614ae927e1e794cc65e25726e274960576291fda0,2023-11-07T02:22:41.063000 CVE-2014-8649,0,0,2eeff67b55aa11694dac1c4aa67666c333007c4b47fe1769856696c571e14d92,2023-11-07T02:22:41.320000 CVE-2014-8650,0,0,fe7c68dbf7726e49f41d439f4d0abdee2def913f1f4d858c6e826df264a33a13,2019-12-19T18:08:32.470000 -CVE-2014-8651,0,0,c31df5c7143c9eccd16b2c94e9958c7bc2fe9e50a98f0137d6bc923f3e9f05cb,2016-12-07T03:01:20.377000 -CVE-2014-8652,0,0,89be067b405968f8d510603ee7646cfcf564dc4bce8f031db841df5f7d311e11,2014-11-14T13:44:20.257000 -CVE-2014-8653,0,0,92a8b598495656d71db2a7514c4775128854f9b48844ae2b4665a1b58fabe474,2017-09-08T01:29:26.573000 -CVE-2014-8654,0,0,a9cb7dd9e54a5f60930ad6d164c35b42fbe285ccd4d6bf3aae05745926ee6d3a,2017-09-08T01:29:26.637000 -CVE-2014-8655,0,0,8c338806a2f9e95eb0bdcd1b67ecb351a2a08f234234a617f1a136d7ddcc6f30,2017-09-08T01:29:26.700000 -CVE-2014-8656,0,0,e35c583879f539dd735f8aeaa8ba359597a018e11072ca888fbce05e6beee8b6,2014-11-06T19:20:36.130000 -CVE-2014-8657,0,0,90f6bc884092c61fb4da71459e6ddaabd6b351358955ede000c1c4345687ea3c,2017-09-08T01:29:26.763000 -CVE-2014-8658,0,0,ec30e349c531203bc3dbc6c24daa98fbd1b815f6e592855213196a2525437fdc,2018-10-09T19:54:25.150000 -CVE-2014-8659,0,0,b30d3636e259a0e8490da8b4883eb667199d82baac969ed03badfb9586dcbd48,2018-12-10T19:29:06.157000 -CVE-2014-8660,0,0,a71f396a7987b3ed1e96135e456a73c62d14935a882aec8993bd9951a37cc23b,2018-12-10T19:29:06.250000 -CVE-2014-8661,0,0,42ca71f46127ace04725d05b025b8b48e91d082f26e635e513e744277169feda,2014-11-07T03:04:02.020000 -CVE-2014-8662,0,0,8fe5e9052f2933cf066da9db0fde51b1a22c6bc5a3120ab8635c28327cba2b17,2014-11-07T03:09:39.500000 -CVE-2014-8663,0,0,a666dd8fcd858bcd20cfcb04a722f7abc86557a93d3744376aed13895f7034cd,2014-11-07T03:17:19.040000 -CVE-2014-8664,0,0,7cec0ffaeef6e3d86a1cdb644d119cc112b0088d6afc09b4c1963bb965b2277f,2017-09-08T01:29:26.887000 -CVE-2014-8665,0,0,f322daa2835b45c029128d8979ad622f6455a154a10cdc0cb92672315ac34913,2014-11-07T03:31:47.240000 -CVE-2014-8666,0,0,7e2a8d298e8cc8ce7f3fa69ad18ffa492b22189b46176ed6137b8f5106038840,2014-11-07T03:36:48.870000 -CVE-2014-8667,0,0,d6bfae468180edd746f63a6aa06064d2b2daafeca5ccea18536960b15e4c885a,2014-11-07T03:39:49.517000 -CVE-2014-8668,0,0,8a9fc54f05f2af65f62315b5209c9ca311e914855f66096aece8f7d1e1cf9cdc,2017-09-08T01:29:26.950000 -CVE-2014-8669,0,0,e7ba00f3a8079f9f4ee6871d33d89ac394efc5d3ff484b4381a62753ec415ed7,2014-11-07T03:45:21.120000 -CVE-2014-8670,0,0,a7c6be2c0b027efe67f5122d9acbc28509832f5c0ec1390ed7f3b86587051f4b,2017-09-08T01:29:27.013000 -CVE-2014-8671,0,0,30ba6203fb2bc9d74b084976271189fb6011fb8ead70e871038583d8fa3284a5,2015-10-28T17:56:12.280000 -CVE-2014-8672,0,0,ca11772d5d02badff270a13298d30fa9ed3b7c9945add13262c44d6d80543cca,2015-05-12T17:30:03.937000 +CVE-2014-8651,0,1,134af85f26950af6bff8cfb277c4f0b1d6ba68c509f60affcc742c672d382cf3,2024-11-21T02:19:30.903000 +CVE-2014-8652,0,1,67863e81baeccad6d296043e2fe3a10b759a40457387c2d88cd47bb163cae182,2024-11-21T02:19:31.057000 +CVE-2014-8653,0,1,cfea63672338808eb6823e96a2f46e289fef7eb9c489c9a3a54cff4d4bf9bc29,2024-11-21T02:19:31.193000 +CVE-2014-8654,0,1,d70f8dc1f4a368eb7881f19a096fcb0bd2de201b424a76bb7361295558fd7031,2024-11-21T02:19:31.337000 +CVE-2014-8655,0,1,2006a5b696e23fe45eb138985cba8d63528d18f6bf065b578342a66eb9eeaf35,2024-11-21T02:19:31.487000 +CVE-2014-8656,0,1,69c2e3e09cb5097b60ab63ee6bb5767e8428ff2c226b6a8ed4a1c01a301de936,2024-11-21T02:19:31.627000 +CVE-2014-8657,0,1,a67720f0103a8d1e325ebcfff6fd60e98bc250a230d1872d47cf922413bb9b87,2024-11-21T02:19:31.777000 +CVE-2014-8658,0,1,f66040780723ea20ed49ec38b4529a72d946888fd8ebce133c2b908f71895166,2024-11-21T02:19:31.927000 +CVE-2014-8659,0,1,a7a654c44ee8180a3c60b66870f5a08e3fa7c435ced6acb42cc093c514f39c5f,2024-11-21T02:19:32.093000 +CVE-2014-8660,0,1,41ed388649f818496bdd8f1d4720540254fc6b6cf19330bc177bac38955ad6b6,2024-11-21T02:19:32.233000 +CVE-2014-8661,0,1,91a875f40b73efa4bd54f733252970c165f5e45b59d3542457e53c2989cf6611,2024-11-21T02:19:32.377000 +CVE-2014-8662,0,1,048134801e27ef40329a46be49dc42be5448cceaa82187bc7958ae0aeb883234,2024-11-21T02:19:32.557000 +CVE-2014-8663,0,1,ea946bb6fd26646b8ab174267df6195bee6de160e5b96d5a0134eef27ff9e51e,2024-11-21T02:19:32.710000 +CVE-2014-8664,0,1,5434af3e58ade07d8f76681fdfb7786523513571557fa7a374c4299b29764b90,2024-11-21T02:19:32.857000 +CVE-2014-8665,0,1,68c62bf93e2201ef0b844dad774b2c02f7e08e83517aa24acf175624f7c47c11,2024-11-21T02:19:33 +CVE-2014-8666,0,1,a8221c9298b4a89e86c1d999f16ba5587a2616db1170386392e5dad94bddbb79,2024-11-21T02:19:33.143000 +CVE-2014-8667,0,1,25e7d9f267fbc06e977b2e0282ad3f411e068cf93af4b29a258f078b2a879fc1,2024-11-21T02:19:33.287000 +CVE-2014-8668,0,1,4f503b9cb0eebffddb174597e04e4ca91051b33448d58611b15e64507d94c541,2024-11-21T02:19:33.420000 +CVE-2014-8669,0,1,15e98c2f8528107e2425e3e20c8083ee194a69b22c588b483f48a7dc9fd16e19,2024-11-21T02:19:33.567000 +CVE-2014-8670,0,1,de07637be7b19002299d9d3ce82c5a52a2229db4f229ea43d0f764a4e653cb70,2024-11-21T02:19:33.723000 +CVE-2014-8671,0,1,0a5c074baef295549c0d285fa69a02ca338bfe64d69433d953d1f741cb8f03b3,2024-11-21T02:19:33.860000 +CVE-2014-8672,0,1,bbe352027187f8fd1708a6ab2c6da10fa2edda5f20b0066b49a8f8e413745486,2024-11-21T02:19:33.990000 CVE-2014-8673,0,0,fa19850f230c1df0272a359f1fddd37a6b9c7d4c36087304e139bbfe6e6431dc,2020-01-08T15:54:39.087000 CVE-2014-8674,0,0,9bccb880127ea765e36d56eb791674f9d2541d410863bc4fa61e4ab192f5392f,2020-01-10T18:19:23.727000 CVE-2014-8675,0,0,543dcfecb6a50a7326af4d2f5c55866a93659eb6b0569998f6551e97a8e9d6f5,2017-09-06T02:17:30.837000 CVE-2014-8676,0,0,df5f8884702f2e7f64c5e67431fc01367cef7ce983058d2218ffd9faf23928e5,2017-09-05T18:06:37.493000 CVE-2014-8677,0,0,f2b8b76a174e8968bf32682b68c117cf6a10104bbdf7413ee70d76d560855dde,2017-09-06T20:17:47.237000 -CVE-2014-8678,0,0,41455402a3d452e4d12e33d80497ea0aee2d4337e9bd87e75af3b2bc6eeb58bb,2015-02-17T15:22:44.590000 -CVE-2014-8680,0,0,ad14d2e638076c135bd4c65241b24e3932852ead1ca6a54d4f042814a86d4ccb,2019-07-30T18:15:12.350000 -CVE-2014-8681,0,0,8aaea778210383c75051dddebf1b6bcb7f4783bf28ccff5a98d901b05dbff96e,2017-09-08T01:29:27.073000 -CVE-2014-8682,0,0,7d7d94d54da557d00ec05f3b65e4c392ea62998710af0dec86329e010e87bb53,2018-10-09T19:54:28.557000 -CVE-2014-8683,0,0,aebfef3c89f4cd5b87276f62e77e71fd0cd0eea24701eb048e7d75244a4eb27d,2018-10-09T19:54:29.183000 +CVE-2014-8678,0,1,3635f0f1f935525be65a5ff36985950d9bc8daa217d5d64c36522a77b0460b08,2024-11-21T02:19:34.850000 +CVE-2014-8680,0,1,fe1c84f33dabfa0fd67729462f86405dcc7cb30ed9c8c64d4a29f1cce09319cc,2024-11-21T02:19:34.987000 +CVE-2014-8681,0,1,8d6aeee0e3d15de8dee72c317de1f9560b31789505667536720b4edcc639097a,2024-11-21T02:19:35.130000 +CVE-2014-8682,0,1,3e3953cba49d2f490c493f65cd14ab30e2e8887bbd0c1fe4ca79ccc4fb1b21ac,2024-11-21T02:19:35.277000 +CVE-2014-8683,0,1,28b6dba4ed3969caed7f26936049c454dfe299a63987fa18cd09bcbad0193c6e,2024-11-21T02:19:35.430000 CVE-2014-8684,0,0,2c062563acd73c2e699aeab136d2175623c26a1ed4fa9c1738932bc90973c60d,2017-09-28T18:47:52.277000 CVE-2014-8686,0,0,d931bbab687015d306874b3add3353866dff111b3e52d3bd103690219f1a3cb0,2017-09-28T18:19:39.897000 CVE-2014-8687,0,0,e1ddd8eecd98cfc052aab9077539b93a77f74d90e3d1c372ce2d3864890949b3,2017-06-16T17:40:38.270000 CVE-2014-8688,0,0,bd216bec3a8714c1daec652081f7b4df13e8e13f484d021025a7e1d26872274e,2020-05-13T12:51:07.873000 -CVE-2014-8690,0,0,fb27dad001b8c6214a3c10357c2344a18f9b4f486b762ac603efec491d5d27d5,2017-09-08T01:29:27.263000 +CVE-2014-8690,0,1,a3868571134b1c730121bb924ffd8ceb1cac919e5145b355b1931d71c8049e37,2024-11-21T02:19:36.197000 CVE-2014-8701,0,0,d83afbac8318ac4a8cba63982b1dfbb0243ee2bb51af69f7002a7ff17fa944aa,2017-03-20T17:00:41.407000 CVE-2014-8702,0,0,66f5f847f1c7865a3f1325f6b1805490fef0262e8dddeaac8ea9d7856a24fedc,2017-03-31T01:59:00.220000 CVE-2014-8703,0,0,10a0ef023517a3ac4a04a562089738dccd69c602b594f4852ac7067682111d83,2017-03-20T16:58:19.263000 @@ -72361,101 +72361,101 @@ CVE-2014-8705,0,0,1c4d3295ab342a5caefffd485af61a82f95985a68d19e99aa7802f9405a6f7 CVE-2014-8706,0,0,fc85df7e936c5ccfc6956aecc6f657ac91123e66abdf255b7408d72e2c074118,2017-03-28T01:59:00.257000 CVE-2014-8707,0,0,9b762b4ad1d816ed8b02de101f18853b5027da840979da1233dcd8f7218daab4,2017-03-20T16:49:32.103000 CVE-2014-8708,0,0,2923c17eb2f44ede0ff1c1b0e2dddfa29593f9997738ba75fd4ea07e32221c36,2017-03-20T16:55:31.447000 -CVE-2014-8709,0,0,4f09b4cc0a0a58410a4f2880627059b61aa315eff1ae037677285ad9485a1b2a,2023-11-07T02:22:42.030000 -CVE-2014-8710,0,0,3a0a1fa527cbeb9e22b89e7013f8702880c07681dc45b56d4ab5e6a0672abb97,2023-11-07T02:22:42.290000 -CVE-2014-8711,0,0,f9f6d0aaa569210677b59e83d8249cdb760010ae9f5bd7f0f0623200a10eaa0b,2023-11-07T02:22:42.463000 -CVE-2014-8712,0,0,0cf549a06d22584a5c21dfba4dacfd190acf5294a52666630f0281c0459703fa,2023-11-07T02:22:42.527000 -CVE-2014-8713,0,0,18cdced37080d715deec43c5298d4107be1e61bddc183a73207d448f9ff4773b,2023-11-07T02:22:42.597000 -CVE-2014-8714,0,0,637eecbf07b4f93626ccd31588a0b36f50724056a6b0f073e9ff6f55e0d9f26e,2023-11-07T02:22:42.673000 +CVE-2014-8709,0,1,8205370f62d263ab7c9d5eb06205a98e8abfb9b0df8d8b045a4272d1cf1ea106,2024-11-21T02:19:37.453000 +CVE-2014-8710,0,1,e26e757ddb292110e99eafbddba1fe0e4bb4d8a26dcf919c594d5be5c9dbc34b,2024-11-21T02:19:37.593000 +CVE-2014-8711,0,1,465045e9e5674798c55efb9060b46eb40cecd5ff353d8ef5ef517c5fb8a23fb7,2024-11-21T02:19:37.757000 +CVE-2014-8712,0,1,f4be92ffacac7704fcc6753ca87209661b3f7398299184508bdafed3d99abc85,2024-11-21T02:19:37.917000 +CVE-2014-8713,0,1,e76fb2c2954e33d54343ffb3aeb7f0169c867d3eedf80e3b618058403a32b525,2024-11-21T02:19:38.080000 +CVE-2014-8714,0,1,5910f2266b5b6bea28b31d70c3de19212c4fe666d932f5f60a0a56eee6344f4f,2024-11-21T02:19:38.253000 CVE-2014-8716,0,0,b717640e7dba1eaa3f5c10a4f6d72a04e057cd36fe1b4d7f2142bec9844ee815,2017-04-17T13:00:00.317000 CVE-2014-8722,0,0,75f4000c83826a8d9dfde0a228bf5ddac8fce172a2795c5898fe5ff7c14b545d,2021-06-02T16:15:07.823000 CVE-2014-8723,0,0,d6242943f1ea97a5d0f65624ee3f259867d4ded128c96eed510beb2462aa332e,2017-03-20T16:49:11.273000 -CVE-2014-8724,0,0,8f311803a41fe20f305b588a3c188f22d4a7025d8e38a3d41686a6adf640cf91,2023-05-26T17:46:26.677000 -CVE-2014-8727,0,0,2aaed04d65be5faab5738310b8bf7aac0d6d1f2ffa94d9639da112accbdf714e,2017-09-08T01:29:27.387000 -CVE-2014-8728,0,0,28d55ed48ed90ab0741829cf0d01766f474e9971a2e2da2d8abc06697148b2cf,2014-12-05T15:50:42.553000 -CVE-2014-8730,0,0,c4bc438cdc4c679cfc9b7fa694c0440b4d52439d3422f84e425d7213d29ad6d4,2017-01-03T02:59:21.893000 +CVE-2014-8724,0,1,97645bd0d86aaf19459e29c030e81de0dfde8b503fbf1246c0491eef6b2ac53e,2024-11-21T02:19:38.917000 +CVE-2014-8727,0,1,d300c3671e99d5745cc51930a1b42d23456e57d970ba0221bdfc4b41e58e644d,2024-11-21T02:19:39.060000 +CVE-2014-8728,0,1,2ac8020f8fd11acfe77e0e0511f152636eaf69516678875ce21c8c9a55df35c6,2024-11-21T02:19:39.210000 +CVE-2014-8730,0,1,c92683f5b5a18b33b5715070c66c4bc333b1e4572d0e3008e07409c667797089,2024-11-21T02:19:39.347000 CVE-2014-8731,0,0,90ca6a1d7a13cf516076ab0aceb0e87e21d96e8c469be5cc0ff7bd8f7da853f1,2018-10-09T19:54:33.527000 -CVE-2014-8732,0,0,2f687714b705cae9c8d719713e5b9a3ed4074a2085fc9d523f88d6134181e409,2018-10-09T19:54:40.043000 -CVE-2014-8733,0,0,445a5b87dd2a3abc76b6653f2017e1a63a2d30dd873a6da5519ef4fe6bb31d3b,2015-02-11T17:20:03.777000 -CVE-2014-8734,0,0,c850782c69205018987c3bab06d30c1ffb1fac169f15eb3e3e94b2bbf1d3263e,2017-09-08T01:29:27.573000 -CVE-2014-8735,0,0,0d34b8b73c62d8a23a2af98739fc1a0a55c25898475fc57ab5add8d51002daf4,2019-07-16T12:21:21.717000 -CVE-2014-8736,0,0,e553241c1a0d5566e8e4a57b4b204c640d193f63113c403f26f17dc0f47b2402,2014-11-13T14:24:03.127000 -CVE-2014-8737,0,0,3d28cdb47067ca8f918a6ea94237232428acd46e63f45ccadda3226b064986ed,2023-11-07T02:22:42.837000 -CVE-2014-8738,0,0,84bec13e65fcb4da316028bee6f726f48ed2bb190e5f76e9b4a523e17948ce8d,2023-11-07T02:22:42.920000 +CVE-2014-8732,0,1,7e288431979770a60be19646147955a9c8826288082ff2ffc58b9efd89765c74,2024-11-21T02:19:39.663000 +CVE-2014-8733,0,1,60aed453eaedc992562f9281d0c4c5ec32181534439ecb38c265d403ee8b8591,2024-11-21T02:19:39.800000 +CVE-2014-8734,0,1,2143e07b22fa59e201fe2dd37e7b6c28b666de8fbeeb3716313b630dc2ff840d,2024-11-21T02:19:39.933000 +CVE-2014-8735,0,1,d0c451198087ffbdd23d4dcf52daaa9e221f16d30154d630aa9ce15c33651d54,2024-11-21T02:19:40.073000 +CVE-2014-8736,0,1,b91278839cd883b52a67e7affcfcccbeb8e61f83b0c02d747dfc3e60df8f2350,2024-11-21T02:19:40.223000 +CVE-2014-8737,0,1,a57062af8835038186b79c19a772afc8a3f14689868c49995a599b70b37e8fad,2024-11-21T02:19:40.370000 +CVE-2014-8738,0,1,a8069c39f4087f1d8b56e6bb6b3d4409841817c636e131fa795b05d59dfa37ea,2024-11-21T02:19:40.563000 CVE-2014-8739,0,0,fc8a5cf934b23fd01b4d7e493341bc40c4bbe86b53c6a2019c8a00961d4b663a,2020-02-12T18:37:09.537000 CVE-2014-8741,0,0,c35a03b1c4301503b146d012fa436688ee27afd8cda5b20f35b87556bedd6ea1,2020-01-29T20:25:32.363000 CVE-2014-8742,0,0,71afe2646052dc58a854d95b0505aa0e52b5cbedf08e0d25b76c35f5e4214a71,2020-01-29T20:17:54.137000 -CVE-2014-8743,0,0,15bd2f5ce4e5b0cc0c6a7b347223f6aa596074701a5f45299b7087ead58e8767,2017-09-08T01:29:27.637000 -CVE-2014-8744,0,0,ffc16d7ba2130749285d70d61ca531b9ea1769df53a4b0555b897f1b0ee93c0c,2017-09-08T01:29:27.683000 -CVE-2014-8745,0,0,8d4d6b429ec78abe55408f22b180b409723c90dc841b71b2c3bff28c8e4b873c,2017-09-08T01:29:27.747000 -CVE-2014-8746,0,0,eb45cc54ec11eeeb00a558bed22b7e3df3a292f3f3d2305be9911c7ad0bddb02,2017-09-08T01:29:27.793000 -CVE-2014-8747,0,0,8f25ce3f17c93d92279687ef55543a014cb51dbcf3ef31f8dfa6410fb3184816,2017-09-08T01:29:27.857000 -CVE-2014-8748,0,0,d4a6b758c7fddf818e074ede691180f3ca0911c3e005546094dc13d22fc3bac5,2014-10-16T02:24:11.507000 -CVE-2014-8749,0,0,4b5b1f8073a59e45cc0835bfae57d9c17d93d953529ab2488745e7321ada32b9,2014-12-01T18:31:22.373000 -CVE-2014-8750,0,0,44a5f748e526a4731f34b4fc32864c595a70ad231f0e77cbd01260c34dc01a17,2018-11-16T15:06:16.980000 -CVE-2014-8751,0,0,7c60165e50cc6bf79bac5b38ffe84eb3609a67970d33edf43270e7b4cff9a9f9,2014-12-17T19:42:03.427000 -CVE-2014-8752,0,0,4c779e571f3245f3075f2946de7d785ae1124b7bb5543b3e0339a23837a2d3a6,2015-01-03T01:31:30.940000 +CVE-2014-8743,0,1,3805e1a34efd6c72e27ce891ae90c104e6a7d27a43a9c91932104668293cfbb2,2024-11-21T02:19:41.167000 +CVE-2014-8744,0,1,4dc35f962d640a2094c0e7773ffae9158f7f8dd816b947b4c383a4e631a127c1,2024-11-21T02:19:41.310000 +CVE-2014-8745,0,1,10d761ba570407c9dd131da136b09ac06d267383c30fcee4447717c8b30054f0,2024-11-21T02:19:41.453000 +CVE-2014-8746,0,1,2908309cffb0e1dbd89e905650f27463afa0129c5c03ae1166487b56d1338cc7,2024-11-21T02:19:41.597000 +CVE-2014-8747,0,1,d3bfee826c2c2cbe11c7066bf5ca94160c70f1e9a8151a717ee76e7d777727d9,2024-11-21T02:19:41.747000 +CVE-2014-8748,0,1,b510aed70510d868624309556d3306d8f296301c41c772d722b44600652eb5c1,2024-11-21T02:19:41.893000 +CVE-2014-8749,0,1,be18c4185b0fcd267ba6a98e109a403d2c61bdd639ed6cba9323d4820c5b23f8,2024-11-21T02:19:42.033000 +CVE-2014-8750,0,1,347014888e3ea88a776cd2335ff338ce193aee8405c6757a1b3bf482cdd12a23,2024-11-21T02:19:42.170000 +CVE-2014-8751,0,1,67371ff476cf38f33eae19d49fd100d543301895159dc0b7285a3e9367fce473,2024-11-21T02:19:42.333000 +CVE-2014-8752,0,1,36228d3001b62f75a2b31022ab1f313474ddf634c1224587da46fe7a2df2ff15,2024-11-21T02:19:42.463000 CVE-2014-8753,0,0,80b13e63ee3fb8c3dbe12a70e82b06c2f7c308f1d47fdab390ef7139849f1a08,2017-09-06T19:45:23.013000 -CVE-2014-8754,0,0,41e5c48fc8bfdafce58871eea93fd78b396b1e9addd814d17ceaf9eb047475d8,2017-09-08T01:29:27.903000 -CVE-2014-8755,0,0,0f26762882935187aa42d711a7bd3fbe73de7eecc9b2c7b6a5d3c67602291b12,2014-12-16T20:07:25.397000 -CVE-2014-8756,0,0,925eeca5a0676fef532ea49528a395dc76e0a36a6017c176cd27f2c36de1911a,2021-11-09T19:59:00.140000 -CVE-2014-8757,0,0,e739ee289d735868619368c0b2a2966df95205ca9009928f6182a00620b49e15,2018-10-09T19:54:43.527000 +CVE-2014-8754,0,1,3be6871d462ba29f2aa077b0c1b900b7d656d864935029179abf9dec6f98753f,2024-11-21T02:19:42.743000 +CVE-2014-8755,0,1,8d9cfda9cf6baf6369a146033d1cf1419b35922c3b7bc610cfed816a3cf04e3c,2024-11-21T02:19:42.893000 +CVE-2014-8756,0,1,224caad7fa578520f519d69fcf4966b335d56ae7080698c5d6a472e84b66eda2,2024-11-21T02:19:43.033000 +CVE-2014-8757,0,1,186957be804f8dcdb36aacb905027a2d8e6df397af5e43dffa28018c2d87707a,2024-11-21T02:19:43.177000 CVE-2014-8758,0,0,4dd1d580fa507ef9bed3ec3f5152f8d605c04368413d59641179749ba0cf27a0,2017-10-12T16:45:32.547000 -CVE-2014-8760,0,0,661a084be70385d7c9fe5ed552635e27d100f7d142f83561824bd44bf5db5d04,2015-09-10T15:56:32.570000 -CVE-2014-8761,0,0,76435c03e1de74907ae0111df756b252539470d5f809da8cfcccf87b4e7fc9d9,2015-09-10T15:56:52.240000 -CVE-2014-8762,0,0,13cd767eb9355ea62680696738f07c8f47bbe70de1aa6fe7f2288ebcff43a382,2016-04-04T13:15:16.127000 -CVE-2014-8763,0,0,150e9f60f3c18efd9fb4fef713b90246ec09c40a264547ed9118df4f16e48e58,2016-07-15T15:19:32.613000 -CVE-2014-8764,0,0,f83ebabe37b21831cda43543e2e4f39654856c4c8f1088a88af52c4c98efdbc2,2016-07-15T15:19:57.987000 -CVE-2014-8765,0,0,74db2d177daae4bd237a28760e042dc32802511b7492c3413fb300b2342456b6,2014-10-22T15:08:43.623000 -CVE-2014-8766,0,0,a318eac4e2448132b43909eaf5da54dd5e67194c6b7100ae4509727e9d88f074,2017-09-08T01:29:28.013000 -CVE-2014-8767,0,0,003e2569b8b48d95ebaf07d887676769dd04370c3db8d1ddf959246c5e4542e0,2018-10-30T16:27:35.843000 -CVE-2014-8768,0,0,0965906717bba98f9fe24431dbd1b9f2d6e9a77960b6a49c0d021076c84011fd,2018-10-30T16:27:37.467000 -CVE-2014-8769,0,0,3fd87e1f74535039f4cc12e8fbef84098bde9d7147dacef468a916ac88ba0bd5,2018-10-09T19:54:45.917000 -CVE-2014-8770,0,0,20a5ea6b48087f87e09292a814cafb921c8808449a25637618c8a1736ad4bdd6,2019-07-16T12:21:26.047000 -CVE-2014-8771,0,0,b4064ddbeb84355cca066cc129d4402a4d4e845a14dcb1937260951b884d00e2,2014-12-05T15:35:48.220000 -CVE-2014-8772,0,0,626419ba35a60a6e20be35486ddbc6573d490d44b1bd612a1a67d63995c1db3c,2014-12-05T15:28:41.013000 -CVE-2014-8773,0,0,feed7473370e615700ac7055694e16dbf39a9ea3f15630feacfc6fd4ea0ad4cb,2019-10-22T17:23:37.007000 -CVE-2014-8774,0,0,d8cfd6d5b5851abd7dc01f356f135ff67ba016f09dea7e82c116617d0c7be85b,2019-10-22T17:23:37.007000 -CVE-2014-8775,0,0,ea001ee3920d22c9b983b1e898b25927469177e7490c79de31868576f2c9c835,2019-10-22T17:23:37.007000 +CVE-2014-8760,0,1,0b02c1b5efb877bb51c0d9ceb73687ea65e78de0aae90f37c54be82e4774d8b4,2024-11-21T02:19:43.450000 +CVE-2014-8761,0,1,00b87e78d1e0b5000574c95262ac9724690282c4d11089d17a35764727dc72c6,2024-11-21T02:19:43.597000 +CVE-2014-8762,0,1,b0cd7a84c262b663ed53a9cda8f95f1dce680b886c651f726ea53fb52a6f787d,2024-11-21T02:19:43.713000 +CVE-2014-8763,0,1,76d1d511cd4bee2d9cf17852c567fe84cb608642afbe35a85117da01db0c4f45,2024-11-21T02:19:43.840000 +CVE-2014-8764,0,1,5b9b5ac39264a7789f16b63760cb006c59a44fefd89ef293fabe062903b6d866,2024-11-21T02:19:43.947000 +CVE-2014-8765,0,1,ea8580228e258535c12123b9d79eaa3c1662e63d52f00e86c670be0f53ae88b1,2024-11-21T02:19:44.053000 +CVE-2014-8766,0,1,10a65d437d03ca7c4468571cec683e9997eeabc25b4e53b8f89b1301ff280541,2024-11-21T02:19:44.193000 +CVE-2014-8767,0,1,83b6b0bf98193edcf95abaaf81a687b6b47c960c2fbc531a8b37f309a90a75ea,2024-11-21T02:19:44.327000 +CVE-2014-8768,0,1,519962f95b446998d89bb529571a8b275a9334f4fa7e29dff9fb2eacefa13e80,2024-11-21T02:19:44.503000 +CVE-2014-8769,0,1,cded6136d8f07eafea1e360109e9b19964a73bf97b272bdf81f16dcfaa9222e7,2024-11-21T02:19:44.663000 +CVE-2014-8770,0,1,27988d77e73b3a5f493bed95baf6d78cb854e1d5a9ed3f2f2707da8d2aa8d1c5,2024-11-21T02:19:44.830000 +CVE-2014-8771,0,1,e7f47ffd600f7d913be02e76e69cf0f22be0d74ecab16a59214250c5fbd5a401,2024-11-21T02:19:44.960000 +CVE-2014-8772,0,1,6f370ee376d77b60e2f19478249a5d6400bea3ff86b9420a674e16ecd25589a1,2024-11-21T02:19:45.093000 +CVE-2014-8773,0,1,64c2560c48cf94886eb33b054f3ef150b236a28436f81776c50f2d6c47ceee74,2024-11-21T02:19:45.230000 +CVE-2014-8774,0,1,015fae3c418d46359254dc726f1669e8fb9c1c460322501ab1095bc2a3ca5c17,2024-11-21T02:19:45.370000 +CVE-2014-8775,0,1,837e4b4abafe983f66a09418d2a99fb79d275c1fd7e70afc4c365cca318cc1e4,2024-11-21T02:19:45.507000 CVE-2014-8778,0,0,84549922bc43a8b7238dac77d5fd42def848f013e9f86c9896bef6a870f9acbb,2018-10-09T19:54:47.027000 -CVE-2014-8779,0,0,676c03cf6a01b94d632827d0958540804e972d38ed431f3e6212fb1b2c6e78b3,2018-10-09T19:54:47.230000 +CVE-2014-8779,0,1,a3396541f157aebcddf575029d6919c25308222006a52f13a54909274b31f79e,2024-11-21T02:19:45.783000 CVE-2014-8780,0,0,daf1c8c1c93026d29a6542e8bd30ce6ffdba0803d03e407cb38258b7fd4f4c0d,2019-04-25T14:06:42.727000 -CVE-2014-8788,0,0,555dfe5cb5b037da05f0924d8f112851b158b3341e06d5b5bc0cbe2c0b2046f2,2014-12-05T15:47:51.850000 -CVE-2014-8789,0,0,1120113d4f3eb87d75b5cf6145660f0c921231ad224759921a8727c50c1eaa28,2014-12-05T15:50:04.087000 -CVE-2014-8790,0,0,06af7a00cd297398d8309fcb8ef09c1e4fd89118190132eeeae4d0a0d65e515d,2018-10-30T16:27:48.750000 -CVE-2014-8791,0,0,1885a3695591066476076f2729e6abda9a06ca40eba284483b50a4fe5295f5b8,2018-10-09T19:54:47.653000 -CVE-2014-8793,0,0,f95d77df7beb9aab06aece578535e7e9dfc66ae79300097f81fe185a96a029eb,2018-10-09T19:54:47.980000 -CVE-2014-8799,0,0,d6193dc9f05b561dbe130e05d293535015c4326090917669e05cfc0c3d7e036f,2020-02-05T16:09:23.660000 -CVE-2014-8800,0,0,60141b8a4781c7981b335c38113ba6bfcd475dab3a4591f032bdecf8342c2a52,2014-12-05T19:17:43.807000 -CVE-2014-8801,0,0,35996c5495664efeb256a4048f97e4449c4269ce3c695afe20a33b6cbfd5fcb5,2021-03-23T22:13:58.267000 -CVE-2014-8802,0,0,2b0a2689d7b65399406e6cf493f18651d54733ba23d17eb4cebad6affba7d9cb,2015-01-26T12:56:42.870000 -CVE-2014-8809,0,0,6ced324e5cf23ef4253448fa710c534776eb0ec70ecaba9349236f3d10e8a084,2018-10-30T16:27:51.623000 -CVE-2014-8810,0,0,16df0b9fe32752af5943ead0171ac2da081feb1b9fd6ad3c924e545d496f3d4c,2018-10-30T16:27:51.623000 -CVE-2014-8816,0,0,b677994e538447d762f23b13fa6fd5ee686200f2af57a37e5a065858ce19d64d,2017-09-08T01:29:28.387000 -CVE-2014-8817,0,0,3193585a243926b58f983e53bf3e6277acfb5518f59a4c47437a84b45a8d3de4,2017-09-08T01:29:28.450000 +CVE-2014-8788,0,1,f7c031db63f7485a40e37443b87f5e0e38adc038e6e9add3182e49d955287ab0,2024-11-21T02:19:46.067000 +CVE-2014-8789,0,1,c7d611205ed680b0dcb8b30c3ffda766842e293e8be17ba76aba1943a54f4253,2024-11-21T02:19:46.203000 +CVE-2014-8790,0,1,61f3fc633ee522c3648f70c61b39335f2f8c925bb0a8ac45ea96ded5130d70aa,2024-11-21T02:19:46.340000 +CVE-2014-8791,0,1,7320bbbcbb69021b86fc2df21737c1af70e24e16391790d027b93401214304fe,2024-11-21T02:19:46.477000 +CVE-2014-8793,0,1,1e7092d70787a15877f261c3168496ab29d395fb9952116f0b0ef65c3c224e4c,2024-11-21T02:19:46.620000 +CVE-2014-8799,0,1,9296a26a89461d358f8f89a9e893bd4bc0ecf352aa2919a1300c0b10086bc98c,2024-11-21T02:19:46.773000 +CVE-2014-8800,0,1,db638d6f7bdd345c95e98f1e07345eb577f0c6b5c8426563b5bc06b29f027941,2024-11-21T02:19:46.913000 +CVE-2014-8801,0,1,76f30c2e318da09e09f82ed26a9f8978d5885c34d53e035397605419f5d8f7a8,2024-11-21T02:19:47.063000 +CVE-2014-8802,0,1,2df19a23e095c1711ab68ee6ad38d7101c047ce2820659e21fe3fc9222738c6b,2024-11-21T02:19:47.220000 +CVE-2014-8809,0,1,65fed0487e5df1dfbeb16eefbc9620853a9815cec437fd2c06fdc45f795444db,2024-11-21T02:19:47.360000 +CVE-2014-8810,0,1,6380212b809cc5d26be71e450079f71952e73acf43ad72e354719f879ae8c043,2024-11-21T02:19:47.520000 +CVE-2014-8816,0,1,b87a532b710f181f6f12e503d053e0f50fcf963f908171da94383730889e9038,2024-11-21T02:19:47.670000 +CVE-2014-8817,0,1,a9b7a1cec440c76440ca69b8107d84bc4f7d864dab6e5e04cda66303a8e059f2,2024-11-21T02:19:47.787000 CVE-2014-8818,0,0,c0bd578fd6f64d9c0b93a36ee58c86f4196102221c6fd89009ec999d443c5009,2023-11-07T02:22:43.370000 -CVE-2014-8819,0,0,80c386a82e6f0294d699476f1b048c3380dc923d5540f4dc948e955baa46c18e,2017-09-08T01:29:28.497000 -CVE-2014-8820,0,0,66eef980d1cf725fade69840d798c8d337e320af8e14144dec7a10d6e18752d9,2017-09-08T01:29:28.560000 -CVE-2014-8821,0,0,800a387815021f4c2b31e791946d6680a83a5dd5b8f2096b4c5c40f1ad43e6c0,2017-09-08T01:29:28.620000 -CVE-2014-8822,0,0,1fe22333e8b55416fb3322f15cd64987fa0d161726e164a6cb38182e28ee7164,2017-09-08T01:29:28.683000 -CVE-2014-8823,0,0,df292862463f51da66131fbdc594f4f25b6c723e3f7f0e417a49e7d7688a289e,2017-09-08T01:29:28.730000 -CVE-2014-8824,0,0,d4ae02f776e9521c26b5a2e61f9a5d4b078960cccb23e66c74bcdc49db76bb5c,2017-09-08T01:29:28.810000 -CVE-2014-8825,0,0,7e9f092367d56d21fb65b44d7b2bd8eaf292dc2036ab5d588a7b1ea77a6e7073,2017-09-08T01:29:28.870000 -CVE-2014-8826,0,0,c369ddfae748333dbb3f16fae88f13874031e6bc11a47355d11f5e50afadd5d0,2020-07-17T18:15:12.470000 -CVE-2014-8827,0,0,aa5868130616cdd779968345a7263bb7edbeb6edcd5be5a0da307301df4ac6a9,2017-09-08T01:29:28.980000 -CVE-2014-8828,0,0,04af66787cab73cadfa6c6c55c509c137d5ade384fb3bcb2e8e61a08cd74ad27,2017-09-08T01:29:29.043000 -CVE-2014-8829,0,0,37949baff04dc79202f74f5bff1f8ca67079cf533c198fb2856de030064c880a,2017-09-08T01:29:29.090000 -CVE-2014-8830,0,0,e97a988965faa0178f24bf20733ce548a5805276fe72f5eb7f302c87c0c1cabf,2017-09-08T01:29:29.137000 -CVE-2014-8831,0,0,d318d2a4c3330abc533d55f1fc1c51ec8e08e25db296df6b5cb8212fa68e69dc,2017-09-08T01:29:29.200000 -CVE-2014-8832,0,0,b2a02e9645452cdf55299c096b03c74128ed74bb736b15f1a09329cb3e48960c,2017-09-08T01:29:29.247000 -CVE-2014-8833,0,0,522f38e374938f1dedb4f38d09febebed00783b4af446869c1ddad386b0dc802,2017-09-08T01:29:29.323000 -CVE-2014-8834,0,0,ca5a9bcda375473593deba1e43eff7ee6b3f05eb75b247366377da03458fef01,2017-09-08T01:29:29.387000 -CVE-2014-8835,0,0,74c714875f0083acf5047f1fc446ebda3e53bdad2aa7c1792fa6f339ce5bc632,2017-09-08T01:29:29.450000 -CVE-2014-8836,0,0,07e96f37f812d58ae2e27febc3c7171cdf2535bc2f5a0c1261f3b321d29a2c15,2017-09-08T01:29:29.513000 -CVE-2014-8837,0,0,2db456ddf4a1546fe7f451afa3621ac90bbeb2846e384567f0e60fa0b19526bb,2017-09-08T01:29:29.560000 -CVE-2014-8838,0,0,44d32235f13da3f26243d3483eb11a6bf9a124daf76a1a3d9825f9df9d7609d0,2017-09-08T01:29:29.620000 -CVE-2014-8839,0,0,9d725165585be9ea4053a6b89f3441712ca2b4019140a7d4536ce0ca9b1fd9b4,2017-09-08T01:29:29.667000 -CVE-2014-8840,0,0,89a846158e34cbaa408a6b366b43390c9f02881870011b3c93322c69d6dada26,2017-09-08T01:29:29.730000 +CVE-2014-8819,0,1,5ba031d9729e39d03a4d872fd59c30dad03912c38de7fe03cfad7739f9039667,2024-11-21T02:19:47.920000 +CVE-2014-8820,0,1,5465153d6d784a44135f20a267ff35bba0b7e729c23d4152b9325475b93d15ff,2024-11-21T02:19:48.033000 +CVE-2014-8821,0,1,4b65f321ea50395de22adaad3bff608368161b90d968445385d1636f28cd1984,2024-11-21T02:19:48.150000 +CVE-2014-8822,0,1,19f92c1e938c7f68119d173d7a68507b7437a33a971e714ec5a993f2be70a119,2024-11-21T02:19:48.260000 +CVE-2014-8823,0,1,00087b72c61a2cdd9b857c00e8fdc6f0d6aa1dee924495311f8d537caada536a,2024-11-21T02:19:48.383000 +CVE-2014-8824,0,1,4b9cc27db3627b93d3b7128bf2241c8e77bdcddf3f02b213d342f127a0bd11fa,2024-11-21T02:19:48.507000 +CVE-2014-8825,0,1,7cfe6fd5320ad5452715caef6dc017de3b4727a174bc86ff29b6f4774f037b42,2024-11-21T02:19:48.620000 +CVE-2014-8826,0,1,1b561db8717318c765f3765901cf5bc2bdb97da162673f97bb51aac4b968e924,2024-11-21T02:19:48.733000 +CVE-2014-8827,0,1,bc460aeccf965fbbda72b49d313b7087fdefdda4f64cbf018b7813a031d89af9,2024-11-21T02:19:48.887000 +CVE-2014-8828,0,1,dc9a0803fef971455e2f088bc06783829b8bf94d3bae662e02b83088e9a2bc78,2024-11-21T02:19:49 +CVE-2014-8829,0,1,6fe233a930f8f0dd349cad37b9b4aa7d4d0bc0a4414dddef0b4e2863fb49ffe8,2024-11-21T02:19:49.123000 +CVE-2014-8830,0,1,8189d3993db20f4c362e3fc71286de2408722b36bf841f7bcb01dbb01a2fa53a,2024-11-21T02:19:49.237000 +CVE-2014-8831,0,1,7e94922fc0b36b87aa355c238a7178c8375bcda4cf0037b0a5bad1d243ea5555,2024-11-21T02:19:49.353000 +CVE-2014-8832,0,1,da59af4c24fc0306da4c1618cb2418e3939bd769ff123f0bc20d222cf995fe7c,2024-11-21T02:19:49.460000 +CVE-2014-8833,0,1,4879c94c96107d4eae149cd6046fcd0bf48b25377ca9037ff72b1cc490d7348a,2024-11-21T02:19:49.577000 +CVE-2014-8834,0,1,f81f361d333eec52b76dff75e996a382a7f0edc9c09127f6753fcc7708bb68cb,2024-11-21T02:19:49.697000 +CVE-2014-8835,0,1,2b7664f0f3cf0d9f388db021e4d201bf74fb5a53ffc077e9b89f4fecd2d04dee,2024-11-21T02:19:49.820000 +CVE-2014-8836,0,1,b429c273a2c052ce0f24f7118897791be68ba0dae4710ef5dcaaebb860132626,2024-11-21T02:19:49.943000 +CVE-2014-8837,0,1,572d4a603c4a18ea581466d8aa6ca6daecae2b76e51b8ab8970827f058776e90,2024-11-21T02:19:50.060000 +CVE-2014-8838,0,1,5879c179643a6fa333bde9eb612cf00e7361cda927446fa20b2ef51d828e3737,2024-11-21T02:19:50.187000 +CVE-2014-8839,0,1,9e294b7c57b2eb5b0f8d70334ac4207449629a1d73051b07e368dcbe175d6645,2024-11-21T02:19:51.150000 +CVE-2014-8840,0,1,ea9726a0104f2193eddb54f69d49c5c327c356acf99858bf230b39a3f371d9a6,2024-11-21T02:19:51.273000 CVE-2014-8841,0,0,f8d821dacb24fbd0649b8aecc2358235953f69560e220280f56f3d4f104f078b,2023-11-07T02:22:43.760000 CVE-2014-8842,0,0,b204206d0037bdc685af950e6bc316de840615643a34a38b2ad42319602203f8,2023-11-07T02:22:43.787000 CVE-2014-8843,0,0,10051f68c287ed14d838c7dedc647a10e458dd68d272e26db51d2cf154a2b5ee,2023-11-07T02:22:43.813000 @@ -72481,54 +72481,54 @@ CVE-2014-8862,0,0,ec3f10c5d90cd865328d4052c712ab097a7e875b2caf65ca3c002cb02a6d5a CVE-2014-8863,0,0,0cd5e2859e1c7c6a48982b420e9417e7e2bc91d78e1fd8112eefd88c564889d1,2023-11-07T02:22:48.833000 CVE-2014-8864,0,0,37362ef1569e40905e9c3e347fb392e7c125c7d135ba15bc0814572f59abdb32,2023-11-07T02:22:49.157000 CVE-2014-8865,0,0,6bece681cbb5e026866f26db7c37755bf8395c29a1dd270fa069632d07527d3b,2023-11-07T02:22:49.413000 -CVE-2014-8866,0,0,bc491a357a1b0c77e6d1ea03f1c7e084c27707e1fb3ce2fea69512578e2a0654,2018-10-30T16:27:35.843000 -CVE-2014-8867,0,0,a936c0738fffa968910153ea02a71a413f00a9b43014d539dd741e46f8795c78,2018-10-30T16:27:35.843000 -CVE-2014-8868,0,0,a84d94eb3519d25d9fdd7656ef1a05b069a5a75bd2cc1a007c28161d1b776634,2018-10-09T19:54:49.260000 -CVE-2014-8869,0,0,45d73efa59383289640bc9a95ec526708b36c8190297efeb768835bb875d48b0,2018-10-09T19:54:49.467000 -CVE-2014-8870,0,0,ec98ab08284004983290a26582810e42e440c892fe5072927cd0e45141469aed,2018-10-09T19:54:49.793000 +CVE-2014-8866,0,1,1bb796f2190f14786e652cb08577ea6973d0456e5e199620c7d22665303ce24e,2024-11-21T02:19:51.723000 +CVE-2014-8867,0,1,a91badb327aff1583335cb805e2d14028592ba6a64107c0b75b1595431a34f9d,2024-11-21T02:19:51.883000 +CVE-2014-8868,0,1,0cb8ec8acd4dc42d35ab2f4daa20dd6ad3bfaee2768ff4147ff10a808a8570a6,2024-11-21T02:19:52.050000 +CVE-2014-8869,0,1,bf9a24e61d8ef9b11643ce4040900705609edc42443431c931046b0e9a88d679,2024-11-21T02:19:52.190000 +CVE-2014-8870,0,1,060fbf3e7b0a82399fbc1589e232a3a41095affcd986fd1f455cbc64a6e662c5,2024-11-21T02:19:52.340000 CVE-2014-8871,0,0,01166f9d0290fe5d0d2ac7cf9ac171dc69c551c43fc8965a071f0167c2887868,2019-08-27T16:12:02.633000 CVE-2014-8872,0,0,460b07dcfb10e56b59988055e28ca6ab9d096f807e1e252e57741cc28538d716,2018-10-09T19:54:50.277000 CVE-2014-8873,0,0,17034c2c61b049fafe3c03e530bc4bd9386d3fce45ef3cf94e0d56bbdadbfdf7,2015-11-10T16:32:30.283000 -CVE-2014-8874,0,0,926a1b9d2ae09ef25256a8dc1b18a85cc1c9b3d3aed733d97a415cf349119b1f,2018-10-09T19:54:50.510000 -CVE-2014-8875,0,0,426047ebb20372846bf74462a009429d3092bffd87c65a623aeeae8b5b1ff443,2018-10-09T19:54:50.730000 -CVE-2014-8877,0,0,9f3d0aa38e2268b4e6b04017b1353231faac6e64f86c70a9095998d845352053,2018-10-09T19:54:50.997000 +CVE-2014-8874,0,1,345ac659c56ca46434e48edd8764059009ac2f4083f4b90df2c7d4eb95673cf7,2024-11-21T02:19:52.933000 +CVE-2014-8875,0,1,26492e288ba707120d2e30fbb09d350babc2c8b9052cafb6fb3c6031e960caa0,2024-11-21T02:19:53.080000 +CVE-2014-8877,0,1,64a9c0e4e78638ac09550b720ed9a065485e288c9221998ee9f05d956089611f,2024-11-21T02:19:53.220000 CVE-2014-8878,0,0,9afe979d29d4c87bc2dbc1f260bfc6e0f4e5cd81c92dd6c7b05c43cc068d3083,2017-10-06T19:13:20.860000 -CVE-2014-8884,0,0,c00788b2032b4aeb2925fbf32875fef6cd439c9263ed119010d9619253616025,2023-11-07T02:22:49.827000 +CVE-2014-8884,0,1,859a7c6841fef780f51a5f52ca85f545b471343cbfcd019c0394239748ed7ae9,2024-11-21T02:19:53.483000 CVE-2014-8886,0,0,db7ce5589704762880b2e5a17ec11dfd77807bd5e2363246b4fd933292bcace7,2018-10-09T19:54:51.307000 CVE-2014-8887,0,0,3c31a7203146ec5d5ec40789cd697f9c8a3bb20e888205f0b2c4b92e951c840d,2015-06-08T18:42:53.200000 CVE-2014-8888,0,0,681b5797bd79e00d059e1f68bf2b6080a29749067becd4d486c959c4783df103,2023-04-26T19:27:52.350000 CVE-2014-8889,0,0,eeb5f37de6269c96c9fba9315246982e08ff5ed6a2d21e19b75a1c95a1653f25,2018-10-09T19:54:51.637000 -CVE-2014-8890,0,0,45752ccbfa34c86c53d5d57b67e746806b62b5eb18610ce85aea42eabd5b8186,2017-09-08T01:29:29.793000 -CVE-2014-8891,0,0,a7ec75b2c25854b5ae539ed78fcb738a1f56f54320f3e3c264d2120680676438,2019-07-16T12:23:10.690000 -CVE-2014-8892,0,0,9327a164a966464a6aa4a872e676319f03d25fa235a0839cc1111001c96cc67e,2019-07-16T12:23:13.627000 -CVE-2014-8893,0,0,53959fdc8c98f7f9a35bf7d3cea894a17b37c9bbe96b29db414733ae947c3e11,2017-09-08T01:29:29.857000 -CVE-2014-8894,0,0,13268f0774aef48b1285e4ef369117ba14dcf98a145be79f1a4a40c065f3b2fc,2017-09-08T01:29:29.950000 -CVE-2014-8895,0,0,a5b78a92e0d7718090d09e26255c2df290725eabd03d3f706ee4fd5b0dc1d05e,2017-09-08T01:29:29.997000 -CVE-2014-8896,0,0,7f5a1091494eed00ef68321f165afda68247e70b16d0da5d332b1b556406a09a,2017-09-08T01:29:30.060000 -CVE-2014-8897,0,0,9e13aafb5b4625aab29d58af21ca2d53219782850c559a99e27448eb06879942,2017-09-08T01:29:30.107000 -CVE-2014-8898,0,0,2773acc5054f797d1685fb6a79746a4b09b217056e70cb818b27e33985fb848c,2017-09-08T01:29:30.167000 -CVE-2014-8899,0,0,05bd18c4c039f3d72f617a47f31adcf47be65aba57fae243c5b5098941b0247d,2017-09-08T01:29:30.230000 +CVE-2014-8890,0,1,a740763840affcabf994c0be68c01eaa4561b271841b2a328c542060703026ff,2024-11-21T02:19:54.160000 +CVE-2014-8891,0,1,55df98c1cd7b26d121fc038aab4deb0bde6806e10c8ea141248a3a74e2abc4be,2024-11-21T02:19:54.267000 +CVE-2014-8892,0,1,e14bcdabba78c4ca8c9faf9f4ffe898000bdd61e357426eb032af341c106723c,2024-11-21T02:19:54.400000 +CVE-2014-8893,0,1,ddcbe2e9f0c7e1e1cab1f4653e26cec623d3be3bd36b956ca0f0c815e13c6c92,2024-11-21T02:19:54.533000 +CVE-2014-8894,0,1,17333fa51a12f149d9b601dc425e88b54b58b86da264c53b10e6b5cd55ab7bcf,2024-11-21T02:19:54.633000 +CVE-2014-8895,0,1,b0c14dbd925d3d9400e5436c2e623a41f321f4df83262de2626324ca6842396e,2024-11-21T02:19:54.737000 +CVE-2014-8896,0,1,f72346dd99eabc279e7fcfc0163ca2f9f0ba5c641cfbd34c8110636edb04596c,2024-11-21T02:19:54.843000 +CVE-2014-8897,0,1,3b8eb00fd7cea8730eabf9b124d89326675ecba916792db319417f1a5b3ddfc5,2024-11-21T02:19:54.947000 +CVE-2014-8898,0,1,65a98099516a66936f62584f5d872e1ac39d552e2c177574a6b4654e717380d6,2024-11-21T02:19:55.050000 +CVE-2014-8899,0,1,d87bcaa608d59444498ee457c7703bf66f5fa65e886d3250fd8f677b95c9caf0,2024-11-21T02:19:55.150000 CVE-2014-8900,0,0,2eb8fecfd79f1ffe2d0fd34c98dacb6c680be1ec91ac4a387fe87eac230b4fe0,2017-09-03T13:17:28.680000 -CVE-2014-8901,0,0,fc6fe5b07d4d62da6b320cadef4e090b71c206126b76627d6e8fd477bac6e8dd,2018-09-28T10:29:00.807000 -CVE-2014-8902,0,0,7b8494e65980a9298e735454f5af9a385cf77f7c030d4a3539ab8be0df29b8bf,2017-09-08T01:29:30.357000 +CVE-2014-8901,0,1,2e6426dd202f743310a0c70284b4d557e27055096e01265d4af1c385a03297e4,2024-11-21T02:19:55.357000 +CVE-2014-8902,0,1,4bece7826e96bb422b17379ffef7a8b90f6ea230e606804a7564a410d050034e,2024-11-21T02:19:55.467000 CVE-2014-8903,0,0,db6166900e00a82e62e498141e678a3ea06363333cc8239f57138946129f89dd,2017-08-14T17:14:54.933000 -CVE-2014-8904,0,0,789f3b8c60dcc9789f9101bce1cce92fe02d786fe25d7546a37762e1e2285724,2021-08-31T15:44:01.620000 -CVE-2014-8909,0,0,c732a8c73238c0595fd9867de5c43620d11d290ae8dda6f4218553894df47903,2017-09-08T01:29:30.467000 +CVE-2014-8904,0,1,91a2ae3df5bb7d82df06590d53f1a3170cc15b0cbbd1207a0c6a9d485edee89a,2024-11-21T02:19:55.710000 +CVE-2014-8909,0,1,ced093649ac0478b0d4e41a663aa340f8e9211ece5907892acc459d1ac79f8ee,2024-11-21T02:19:55.837000 CVE-2014-8910,0,0,41984615349c1c44899f48667f8383121ca4ed46c0f3845e18ea8b69644f9784,2017-09-22T01:29:01.203000 -CVE-2014-8911,0,0,0df2db92aa39978705099dae280668ec7e79fa55903395f53352d0283b5d4a71,2017-09-08T01:29:30.527000 +CVE-2014-8911,0,1,d31523660f96eec43dcdd2835311b4d27406f9bd2dd380e5752e54e60a43eaaa,2024-11-21T02:19:56.070000 CVE-2014-8912,0,0,88be48910f2ee3ce4c7417ba93f084c48dab93d7eca60437c37c1f239bc744a4,2016-12-24T02:59:03.837000 -CVE-2014-8913,0,0,5d8d9b13613fe7a2305fb5d235af325eda9a8a10619633b542e61858f3f04ab0,2017-09-08T01:29:30.577000 -CVE-2014-8914,0,0,b509ec0a8b5675cbd9de751a1e77a9dda2cc0502930b2c671602495d6f6a388a,2017-09-08T01:29:30.637000 +CVE-2014-8913,0,1,9466277b7149dca6727e3fbf7ce64482a9b1a78d1f47005171e27d4b71f4c9ad,2024-11-21T02:19:56.297000 +CVE-2014-8914,0,1,3960fed9c7b41ce50925ccf47fa121b5dddc4e506606869b295c04db40ac760a,2024-11-21T02:19:56.407000 CVE-2014-8916,0,0,78ae2a8e8b117c1f23a097570bff40a339cee02f55a1fddcef8c1b192f225a6a,2015-10-05T19:47:09.900000 -CVE-2014-8917,0,0,bf4028219ee6fb18b44140ca8b6187782aa4296bc17862f4b564d3c450796c83,2017-09-08T01:29:30.700000 -CVE-2014-8918,0,0,aa0e159153594cc80385000f4d28429ad9122ea7d2defb53dbf4968e2b549b3a,2017-09-08T01:29:30.763000 -CVE-2014-8920,0,0,30c6d4baf5a2c0d693421a97b45f402ea9aa3356fdc99741548ec9131098cefa,2017-09-08T01:29:30.810000 -CVE-2014-8921,0,0,b5e5e58b89600966a342d6b2fdd367b4ce2500c1796eabb74a8fdd1cc30c57bf,2015-03-03T17:45:00.037000 -CVE-2014-8923,0,0,af3662fd9c142968be1ceec52cd0dd0f01620ecee3a15e2c4bff26a1112f5744,2016-08-31T15:17:48.167000 -CVE-2014-8924,0,0,d22fec91f481f98778038e6218656c6a4ef3f783a6ca01c60f9e36809797cb78,2017-01-03T02:59:22.110000 -CVE-2014-8925,0,0,afc11a30533a9a503775da9c5a7bd66383ebc8cd7d0e0ddc8a23de20f99ace41,2015-03-25T20:51:54.360000 -CVE-2014-8926,0,0,4cf8871b1e3e0aab33e56c9698253c1011ab2411c982acb439895a805f372e84,2015-05-26T17:51:17.620000 -CVE-2014-8927,0,0,d054bfeec2cdafa5c6171c2b4a7ed66a810170da7c1b7012ba90c9aaf0c9b466,2015-05-26T17:55:14.727000 +CVE-2014-8917,0,1,3b46f6ca543bbe9de7029b794ba92f4d088ce8ab9d9d85c1386914fbc9ca369a,2024-11-21T02:19:56.617000 +CVE-2014-8918,0,1,8904f079fa9deb0432c628eac8f1f86a53d1410d33306e4a05195cb33a82874b,2024-11-21T02:19:56.740000 +CVE-2014-8920,0,1,7ef6a86eb846427b1b7a106d79ae3ef68d424e51aa25d0f927fea2f6e46cde5c,2024-11-21T02:19:56.850000 +CVE-2014-8921,0,1,e5aecf95fc1470298b88d459f234928d3be4cf44d991bd83546675910bff850f,2024-11-21T02:19:56.957000 +CVE-2014-8923,0,1,e10bfa52e5f6a4191abe44fa48e4b9129372603d9345d343716e0c75d085a1b3,2024-11-21T02:19:57.060000 +CVE-2014-8924,0,1,c3feeec419ba75725dadaeb58a00ed0f875736a71fc12aeb44c48ba33a0530b7,2024-11-21T02:19:57.167000 +CVE-2014-8925,0,1,a5956ba4be0903799a2d85b2f364772f7813c8c8155a642c68061580fdfea7bf,2024-11-21T02:19:57.283000 +CVE-2014-8926,0,1,69f283cf82a0b52c33b96e12737f8e255c9ce85a6acf8fd270f3814dd5915f3d,2024-11-21T02:19:57.400000 +CVE-2014-8927,0,1,729c69fe5721a91e8e6337e2183659834f32dfb28f860a75133007f680c03a1c,2024-11-21T02:19:57.507000 CVE-2014-8928,0,0,36a855092ff2ab5e316fcba741b7c32c8bda08c2a23de744d99c830389625470,2023-11-07T02:22:50.400000 CVE-2014-8929,0,0,7a6888d557e16a656127adfcbb5ad8f836fbce516d76d217ad7a0a3792744de6,2023-11-07T02:22:50.633000 CVE-2014-8931,0,0,7ee952b680c66459e9723931a7cdcc70c68e4745ee0f8af79421715298298caa,2023-11-07T02:22:50.877000 @@ -72546,24 +72546,24 @@ CVE-2014-8942,0,0,45edb8445523af78460924b45a91d23f6b68be7676b66c8347773e4b974eb6 CVE-2014-8943,0,0,6b8dc42dfa5efda525864975c4dccf181ea2d0ed8075250290284d2fb0f52449,2020-06-02T18:46:59.650000 CVE-2014-8944,0,0,108d081a405e6ab5dba577d10dae3b6af81606a9001696a28249a5343cdc2728,2020-06-02T18:48:18.230000 CVE-2014-8945,0,0,d6bc0787e9d5aaf811a2b3beab4aa4766195e7af8d93851f5fc0d8542fa91ece,2020-06-02T18:49:45.983000 -CVE-2014-8948,0,0,68a09c79715d49f268539528f8b7a06dd356733d137254e152173e70e49d5438,2014-11-17T16:30:07.307000 -CVE-2014-8949,0,0,759d75e045801ab36ccaf43e2f837071af1b75c0d95481fcb7341ffc5d5ef027,2014-11-18T02:04:07.360000 -CVE-2014-8950,0,0,d00b323f45dbaf2a499699f383ebabe6d491a6a9d756f5e61ed9951b49308966,2017-09-08T01:29:30.857000 -CVE-2014-8951,0,0,36658ebe0a15ad89977ad71e32a86e73fbc348b0ba999ffb0cf7dc58adf940e3,2017-09-08T01:29:30.917000 -CVE-2014-8952,0,0,0ed466590702885d7d0de6b137b58bc2ad913796c7ca4218853c38c2d6111472,2017-09-08T01:29:30.967000 -CVE-2014-8953,0,0,6534f74e9322d402b0ff244b98b71970f4567b609a3925e248cec13d8add66ae,2017-09-08T01:29:31.013000 -CVE-2014-8954,0,0,9888feb872fe4766dfb747f33d5d89bc53fbd1cf2db2f5af2ea99c56ee5ca228,2015-08-06T16:45:11.600000 -CVE-2014-8955,0,0,405f158dccc5ee17cf20fa72f4b544822b5075bb75433bd4fcf3bd01f9e03c22,2017-09-08T01:29:31.060000 -CVE-2014-8956,0,0,17790bf0028531d3e0324aeb3d71a5cef7d620ce0653944d7ecfcf2c7ca8bb70,2014-12-16T03:32:42.733000 +CVE-2014-8948,0,1,111c3fecc2143f86f740ea139a1ef503a4fbfa0cde26888f8126a0f2d96925bc,2024-11-21T02:19:58.993000 +CVE-2014-8949,0,1,2f621c60e6194c123071c92d86ef423797987cd8687650ee1ec06515aedccc32,2024-11-21T02:19:59.157000 +CVE-2014-8950,0,1,5a6908de6597d9bd3f5257c0767cef0e686dacba61a35ad98e52a5978e900afd,2024-11-21T02:19:59.300000 +CVE-2014-8951,0,1,fca6175be42b7449ab6fc595178f2bae09f4c4fd0eb94767819f3ff4822f65f5,2024-11-21T02:19:59.440000 +CVE-2014-8952,0,1,00ed58244ffeea38f6ce75334afca3a3ddafc1647dabbd2491fd23abd1979cfb,2024-11-21T02:19:59.583000 +CVE-2014-8953,0,1,3de7d4c5958510ec7e9e997f3fa422e144f1d3d1f910216338243c9ff871babd,2024-11-21T02:19:59.723000 +CVE-2014-8954,0,1,3ab94b976cc8cd901cd2759b35ecc688cc4856ccbc372b968fe6f57e75f6802b,2024-11-21T02:19:59.863000 +CVE-2014-8955,0,1,3e7de450bc35316f82bef7eca27bdfa7dc86ced434e5adaaeec81ee158d210eb,2024-11-21T02:20:00.010000 +CVE-2014-8956,0,1,e132f6e0cc729f82be23c71d3d5081b9f4f4eb12b69b4dd76d680ee0779d661a,2024-11-21T02:20:00.150000 CVE-2014-8957,0,0,0c75d9f8b8fbab6aa2276fc3133cea80169f74cce9c505075620f4e3d746a9fa,2017-10-12T17:41:20.397000 -CVE-2014-8958,0,0,ffd697fff0db9ea54d614f136b3ad56291995bff481ec8ffcda577086b201b12,2016-12-22T02:59:20.783000 -CVE-2014-8959,0,0,d9eacecb3dc9a752df7b4ad829de99f905323605ed9db2ccecbd7b6c4e5a2f29,2018-10-30T16:27:35.843000 -CVE-2014-8960,0,0,b01135e21e08310491dd409ab6dd484c67d2122ad853c31fabcb9b06b8c5e427,2016-12-22T02:59:20.923000 -CVE-2014-8961,0,0,041622075f74accb4154915756e78d03fc85079afc34a5df25c11e6013be8aaa,2018-10-30T16:27:35.843000 -CVE-2014-8962,0,0,06430ad206bc2c43a5294da9231f7b115fbaf2173710d823abbb94ec50baa013,2023-11-07T02:22:52.513000 -CVE-2014-8964,0,0,2e293d42008d3e48c84f8872ecd85e42fa63af31700bc8d91d9d838dfec31e39,2022-08-04T19:58:40.263000 -CVE-2014-8966,0,0,4c53564fed54b19a5d434aec342f82c3c384c2533ec728bf5a019a3d71be27b6,2018-10-12T22:07:48.067000 -CVE-2014-8967,0,0,f39d0fcb6df8eea66f2ea7861da4368d445a955fe087de077643ce60b91c3074,2015-10-30T19:01:00.500000 +CVE-2014-8958,0,1,4b5f9e30b6a981230cfb93775f4a23a6fedc3d62f0a28f64e57dba4209b0d255,2024-11-21T02:20:00.440000 +CVE-2014-8959,0,1,e93e7b4c80f9efcfb79901f96d42b6ae61522690f6ce435832076ec95aaa4cc7,2024-11-21T02:20:00.600000 +CVE-2014-8960,0,1,1f78fcf511f451eafb6836d71dbbd3ee49e97267ae6089f8abbd1ba3a17c7d2b,2024-11-21T02:20:00.770000 +CVE-2014-8961,0,1,43c5bc61136ec7c7a05ea03005292915fa8b6da38031be8c7f766c1439b47f58,2024-11-21T02:20:00.920000 +CVE-2014-8962,0,1,e8c4982ae5645513c9d29080c356ec048bda6aa3d5645c266751f840eaed3dbe,2024-11-21T02:20:01.073000 +CVE-2014-8964,0,1,e4d18749ac989087d9d19f14b19af2d5305993682f736613948ab20a150093c9,2024-11-21T02:20:01.223000 +CVE-2014-8966,0,1,147b3655785315a4d52c5bc6a7a400ac7b96bfdea483e4a19b2f5ce1dd1999d1,2024-11-21T02:20:01.413000 +CVE-2014-8967,0,1,0edc5318a57e5020b9bc9c9a7c6415404879ab90a95458ec9926a9e34b973c46,2024-11-21T02:20:01.523000 CVE-2014-8968,0,0,70ecb2a315880f58cc760c612ae1c1d5724e723d8549d600a3811c267a3c9b58,2023-11-07T02:22:52.607000 CVE-2014-8969,0,0,04510c5a63d197a92c4cbc672bd4fd857625b809162a10e192c693a454e4c44b,2023-11-07T02:22:52.830000 CVE-2014-8970,0,0,16a336b600696236769ea2bef96e2cbb0fceb96d7e439f0d34c5a9efb4c5d899,2023-11-07T02:22:53.090000 @@ -72582,186 +72582,186 @@ CVE-2014-8982,0,0,07ed04d3f90431c8692731b8c09fc7d0208d7e6e0584a9cfc5c44753c3f646 CVE-2014-8983,0,0,ddcb3830de4cf480de6e9a76fb1f1fbf255d3fdb991c332d00cdf41513dbd87e,2023-11-07T02:22:56.457000 CVE-2014-8984,0,0,4be19a0dea4757346f607ab705c3906b7ddddec45a312672a05d84a1870d2003,2023-11-07T02:22:56.737000 CVE-2014-8985,0,0,3ae4da9003b559287de241c1daf438a085c627f620dd134ea67f1efcf9f41325,2018-02-23T17:47:15.993000 -CVE-2014-8986,0,0,de195e1577e7534c5731fb6232f99b606175528be85d89a18e69224fb2676d2f,2017-01-03T02:59:22.173000 +CVE-2014-8986,0,1,25e608e0cec08de85bcb40f7bf0463ca5c31aa0a8fc946a28e0aba93e8ce3724,2024-11-21T02:20:02.010000 CVE-2014-8987,0,0,6e117d15c2eabd5d8921a055ae01c5127ca7dcbbd39fdaf6f8b8af13ce23fb98,2015-08-25T19:36:23.130000 -CVE-2014-8988,0,0,aa320c875a3266386c74db150fabc560fc4487c49cc5e8ecbf2b8290aa95b426,2017-09-08T01:29:31.120000 -CVE-2014-8989,0,0,7cdbaf693702d6f1463010b93e948ba2fce2ddb92b04c623f49d0e5c63dcb576,2017-01-03T02:59:22.313000 -CVE-2014-8990,0,0,4ebe07e4dcefafc0bb571ee4bcf9041a4d375faff6eae97ef0f34c57d095b602,2017-07-01T01:29:08.797000 -CVE-2014-8991,0,0,ab6471b9dce524f05a0e5be55a2366709424e1649ce9101276f1e0ef3f58d06a,2021-03-15T16:17:41.703000 -CVE-2014-8992,0,0,ff990b3bc43584fea58aa808698b47f69d6b6e4547e079e76e4d7d129b3c7929,2019-10-22T17:23:41.210000 -CVE-2014-8993,0,0,0ecc3a0b5abce8e77bf682a9b7df6a200cef5429bd355222b9c75dd34b42e057,2018-10-09T19:54:52.980000 -CVE-2014-8994,0,0,4113525f51f01188ce74a0e9b7263e993cb8d3a32410d1f2b5e73454d62d6e72,2017-09-08T01:29:31.183000 -CVE-2014-8995,0,0,7b651125a23a26f65a5b8c1cd22799056628303f8439cabd45a17b9aa0a85eb3,2017-09-08T01:29:31.230000 -CVE-2014-8996,0,0,2f60bd88a66967c7f291944d6fc03d1940ce4d0a75e2e791d586d5530a367c00,2017-09-08T01:29:31.293000 -CVE-2014-8997,0,0,ecda9c6e02e9c982108d72f4ab16d5f6531fdf2625bee09ee2acd80e3489dfb8,2017-09-08T01:29:31.340000 -CVE-2014-8998,0,0,efcaf8d8b03cbc23ef46097ac7f185ea01849d0e5bb805900a1701dae3d473b1,2017-09-08T01:29:31.403000 -CVE-2014-8999,0,0,c03b3004cf914a2f30f69db3aee47769b4685c780ee049b6f91463a0e5977913,2014-11-24T13:58:05.770000 -CVE-2014-9000,0,0,d2ea38f820fe69eebcc81fa0cd18760626d23c0004716efbc15a8f29060d1dae,2014-11-20T15:00:44.677000 -CVE-2014-9001,0,0,0aad7616d6314fd1ac98ad36063e66a91c3a3a25343ac7c0bb8f3e551881bd40,2014-11-20T15:09:04.390000 -CVE-2014-9002,0,0,ce0cbb4e026b5675e3329e8450ac85d80f7cc81ee56633172b1be74f7910d879,2017-09-08T01:29:31.467000 -CVE-2014-9003,0,0,6ed3ac1d32c84f9b838add0b5840c242aafd0d5323a098b6230d4e87319288ed,2017-09-08T01:29:31.513000 -CVE-2014-9004,0,0,34198ed5f47f4db468789815c221be1a72f355733cb2774dc51ed7e28f09f08f,2017-09-08T01:29:31.560000 -CVE-2014-9005,0,0,7c87f281adfe4fb811a3f911ad417df19e8b3155c0adb58299b6dfcb3db6c014,2017-09-08T01:29:31.620000 -CVE-2014-9006,0,0,2b54614a13489df799bb4a2a2aa238fc6c63afb51c2aa1df7e508ea665f9b3aa,2017-09-08T01:29:31.667000 +CVE-2014-8988,0,1,28ef3af0362fd3841b5a488ae5a1fdf50703b42d8a960472ca79d96af3c41c8f,2024-11-21T02:20:02.327000 +CVE-2014-8989,0,1,5570bac75ade7dab1171c6023c5950eb016515db9f5c5e90f66bdd5244e79006,2024-11-21T02:20:02.480000 +CVE-2014-8990,0,1,554b4264e7badd37d68e08e606a7f734b0845258b88fc7a9b7657ca37c554205,2024-11-21T02:20:02.660000 +CVE-2014-8991,0,1,c986801a870c3d012038d14dc9de344d4d8be92593fa786ae1975d950fd7ef0d,2024-11-21T02:20:02.833000 +CVE-2014-8992,0,1,82d923ed773c1f1be06876eb361c3acbf14fd4eb7c7b1431a780224e1b7199cc,2024-11-21T02:20:03.003000 +CVE-2014-8993,0,1,55d95f931511323bed556335c0e4c54cfa78bb3aa8cc5fac35415ca43ece561d,2024-11-21T02:20:03.147000 +CVE-2014-8994,0,1,1ed779139ca14ff5736d91dba139c1bc91e6807e51af0092dc3c52b1e22ef24a,2024-11-21T02:20:03.310000 +CVE-2014-8995,0,1,d67b4187ae8a3990a4c5bac9614d86b07214ef3cea0a29e472fa11b28f048cf9,2024-11-21T02:20:03.453000 +CVE-2014-8996,0,1,bca6b3ce20906f00535f95dc2fc370cc39db1e287a5c9b14cb825be6e45e866b,2024-11-21T02:20:03.587000 +CVE-2014-8997,0,1,50479e63594584cf8b63ecdcb811187cca7a833a2c7418e4770aa991e410f662,2024-11-21T02:20:03.733000 +CVE-2014-8998,0,1,a1040485f225f5bc9d9be12d066fb6309aff318b59b7ea89fef86d587aea04d2,2024-11-21T02:20:03.883000 +CVE-2014-8999,0,1,9f88e766d4a2aa59420235645b5d2ebfd064b49d5252e9b82c05e4ca59a0e55e,2024-11-21T02:20:04.037000 +CVE-2014-9000,0,1,e2aac6867c656547a066a08f867288ea7f56bd7faaeecfcebd2f19d62b58e5d2,2024-11-21T02:20:04.250000 +CVE-2014-9001,0,1,a968bb0db41b3293540ec989adb78030d0abb92c6b5382a8b2cffd8e810c3aa8,2024-11-21T02:20:04.390000 +CVE-2014-9002,0,1,77a6007cfcf56f6fc9b879085caf87de649bc208a0d868a69b24c1f86bf3c821,2024-11-21T02:20:04.530000 +CVE-2014-9003,0,1,2d860def8dbb10174b76149ac1f9396ab6432125a6f4db0f88d57da654e75afa,2024-11-21T02:20:04.667000 +CVE-2014-9004,0,1,7319c9d348254300b195aaaad492cfeb10c833dcc5f8911e7b15deee8827bd72,2024-11-21T02:20:04.800000 +CVE-2014-9005,0,1,4034be5a84d52159d1e4b246af46524eb068077e98bc147cc39a900ed51c5c54,2024-11-21T02:20:04.930000 +CVE-2014-9006,0,1,8fe2ef9e18884fbefb3f229a223cda4d1233f368bf52705cfdef51929543888a,2024-11-21T02:20:05.063000 CVE-2014-9013,0,0,773948ca3b767297aaa5eff0e7574eaa0622e8075368b4745b4052f0e48a3ad1,2019-11-08T00:44:46.227000 CVE-2014-9014,0,0,aa3ee291f03a1800a22a62405b4ea371f6f06e4d447922bf4a7b0d1454bfd492,2019-11-08T00:24:49.097000 -CVE-2014-9015,0,0,4cc78a6f49e4333bbbd03bf1b29d5bad28931ad3f4463ba942ecf3f742afabbf,2018-12-20T17:53:11.393000 -CVE-2014-9016,0,0,0794f7dbaad3822d73b98644b9054f220e3397a0798208353ad10994003f3e6b,2021-04-20T12:50:47.807000 -CVE-2014-9017,0,0,44e1d563114339d4db9080ecf370083ed40901b5e9948e2dfc967a04a10e7d12,2017-10-12T17:40:49.347000 -CVE-2014-9018,0,0,58c6798568697060d1533c12bcd7bb272f80269b3d9a2183878deca309bc1b04,2017-09-08T01:29:31.730000 -CVE-2014-9019,0,0,dab2a2a254327784ba4a7172ced102639896f4512144d9bd6d9309235c0d0bf9,2018-10-09T19:54:53.277000 -CVE-2014-9020,0,0,3fbcf774be19024519822630ba2da20e5976d2477714762a59ebbd74d8b7e463,2018-10-09T19:54:53.717000 -CVE-2014-9021,0,0,da7e48d9890ed9c17b8aa9ff0de73301c500affed7b01ec8fd68d2f64010e5c2,2018-10-09T19:54:54.293000 -CVE-2014-9022,0,0,d4a8b93daf51f828b17ef2ac7065037343d1b7fa5c11d89b9ca7b3df536126f4,2014-11-20T19:15:46.273000 -CVE-2014-9023,0,0,e5cfc97901e76a360b273bb6ad30fb5c4b977bfe39cad460db46c39cb3698cd6,2016-06-02T02:19:42.183000 -CVE-2014-9024,0,0,ad77e1a89d4839d4e9caaef23d9951d884e649a433ce1207aa6a28368df5382b,2014-11-20T19:05:59.963000 -CVE-2014-9025,0,0,663d1374fd0bf6945b16d7c1ef39f277b02fb53c12163a45b5717f5a996c3c00,2014-11-21T13:02:31.670000 -CVE-2014-9026,0,0,e6598518ca4e899a21ae12bd48ee94d0b716f41a7135dabcf41f134e0c02c9c1,2014-11-21T02:43:26.583000 -CVE-2014-9027,0,0,bc3af14f053a8a58185e22652a01b99b5e0aee2471d0942a6a3638c0310d74bc,2017-09-08T01:29:31.933000 -CVE-2014-9028,0,0,3194fe24c9a45cb42b0b62bbcd90897c6372ce9cacbbce90372be9ce2c9dbb31,2023-11-07T02:22:57.310000 -CVE-2014-9029,0,0,3af3fe79541486b7dc19273fcdc284248d38c88c8fa644fa1d689d184678e840,2018-10-09T19:54:55.560000 -CVE-2014-9030,0,0,15a17e3d0bb0a3c08321f37975e15f023c568c00e0ee7ad8a812255f0230e603,2018-10-30T16:27:35.843000 -CVE-2014-9031,0,0,ce792440a52e019dc932fcdaabecec43d4ef062d8af34d93bde21b107a524ea2,2015-10-05T21:43:29.597000 -CVE-2014-9032,0,0,16c82dc331f1be8c39a37f27dbcb0edc60d1587411df680174b16550ff057873,2015-10-05T21:41:48.663000 -CVE-2014-9033,0,0,d0d2265a81bf86a00a93bd63f52380273c95e972799b27d5c6a9b79344ab3431,2015-11-02T18:11:41.213000 -CVE-2014-9034,0,0,656d719f9f67134bf55fab88f6b5407368f3c6fa44805e6e6e76078cf95a9514,2016-04-04T13:15:32.333000 -CVE-2014-9035,0,0,32c98b6c9ea29a767dd2b090fc198e38f8ba733a416b0ab89ffb1d625bae1add,2016-04-04T13:16:52.757000 -CVE-2014-9036,0,0,4507fbabf0661abbd9c78bd2275fbb8c998a20f669c07f929b3506437bebd3f0,2016-04-04T13:17:57.587000 -CVE-2014-9037,0,0,49c194a1e4f5fb4f1a4ce2db823623625b5e88540b3dfc869c5cef301278b1f9,2016-06-30T16:58:39.460000 -CVE-2014-9038,0,0,0c703fdf493bf31a862275f95101ab4e67839d2833af37f054337e2708369500,2015-10-05T21:40:15.117000 -CVE-2014-9039,0,0,7b91a33b5ffac00d7c09eef775aa2330f20f321df6119641c9cb5f9e548f4656,2016-06-30T17:06:17.933000 -CVE-2014-9041,0,0,a0f3c0ae6e7623783d4bdb2aa50dd3cd0d763295faf93aafbc03dfd5c5197cf4,2015-02-05T14:19:27.143000 -CVE-2014-9042,0,0,941226c4958eebd5564562f271b7ec4334dc9289d37a42271d6db4246b84e32b,2015-02-05T15:20:32.917000 -CVE-2014-9043,0,0,716c8ff054283c4c43ce9e88df24581f3489d1af6bf8ee9595d4381e2e3324df,2015-02-05T15:21:12.090000 -CVE-2014-9044,0,0,90268108c48a28ef578cc3f9e310c2b633ed9af0c928c0b654851c434c8d5371,2015-02-05T15:22:26.543000 -CVE-2014-9045,0,0,48843a37f2ea4f6957d2877d5e97eb565680cc6810891fb1fb3d5e65ae025df5,2015-02-05T16:15:30.880000 -CVE-2014-9046,0,0,a1230bd4a78c238bfc3e1737af595409ca084accb9a53028399bbb4bcf7f3fa9,2015-02-05T16:15:49.897000 -CVE-2014-9047,0,0,967234f6c648c10ccd7cab0ed95971b20544d9580e2ce2afb1016d6ad63a59cc,2015-02-05T16:18:06.037000 -CVE-2014-9048,0,0,0095b8d4c4e6862a6ad1c059594e12b34d9d48ce151e37de594b7ec216b2a100,2015-02-05T16:18:42.863000 -CVE-2014-9049,0,0,ade87c521ca38116c0aa9f85c2df4ccc93888e07d36231c2e36675977d5a204f,2015-02-05T16:19:19.803000 -CVE-2014-9050,0,0,87273bbad78b5234a9495b0630e72eb5e67520ab50d3f9865ce0971d9ff2e148,2015-04-30T02:01:22.070000 -CVE-2014-9057,0,0,07a940d55f4d88064f0cd516790e7d5b6ce0fd1a9c72ae4b145ab2d8b1b6ded1,2015-11-17T04:12:03.350000 -CVE-2014-9059,0,0,ab1ab5b1cb3975fe127a44f26fdce6b0229a4ae8bf210ba73fb7865a493b705d,2020-12-01T14:54:45.183000 -CVE-2014-9060,0,0,bf40933d6f3214d43c1e528c1834d4e1c2353309545c3e8fbc897dafd19a445b,2020-12-01T14:54:45.183000 -CVE-2014-9065,0,0,20a3c087fcb7a9a137e3b740289025feddc460c1a9cb80a21fdf33658f4fb448,2018-10-30T16:27:35.843000 -CVE-2014-9066,0,0,6025ae65154a10a7d25752cb3e3b55a9e49168807f93d8a8b99cd84d31141a29,2018-10-30T16:27:35.843000 -CVE-2014-9087,0,0,dd3d7bd56deb9dd120785b062061ecf6b6a6fd8e2b86c88e1f126c65467496c3,2023-05-18T18:08:04.067000 -CVE-2014-9089,0,0,4090c9c0d86af3aadf55f5e25d28f6311aa5bed66e41cd5d5a513690db1a1316,2017-01-03T02:59:22.503000 -CVE-2014-9090,0,0,4e309758d11b9ed540c404d6fdfef56e6bb89f1909d498fb63feeb02ee637353,2023-11-07T02:22:57.570000 -CVE-2014-9091,0,0,af1ea6a5ca92d2c2db071dc711d4ba0ebac8b7c871027455f169f1508858b575,2014-12-11T18:24:34.323000 +CVE-2014-9015,0,1,dc752030bd3b937121586df493b0979f0a20432ae2f9447893bb323d206aecc7,2024-11-21T02:20:05.497000 +CVE-2014-9016,0,1,db2e50acb157f1ab8d859630c40a1aa4952b667a17c5f9840518e95b6887c34c,2024-11-21T02:20:05.653000 +CVE-2014-9017,0,1,fb3dc0c6e204c2ceaf2ad58d7b6143467557b7cea253228fe9b8cb5a9aa88e36,2024-11-21T02:20:05.810000 +CVE-2014-9018,0,1,ea291401d3fcf194f0d3d9a3bcd11caa49a2fd809386514ef2f37029b3915320,2024-11-21T02:20:05.950000 +CVE-2014-9019,0,1,d18a0c8fc44aeca1be1bdfa7a32437d79bb66e30dc78972e1cff3862143bddf8,2024-11-21T02:20:06.103000 +CVE-2014-9020,0,1,03885ce022584e588eaa0d47931c74c4ac682c49f4c5afabc491502c7d43367e,2024-11-21T02:20:06.250000 +CVE-2014-9021,0,1,78e2aaf8c6dc66a0fe13441a9dda18adcb684ae7df844721932001f91601ec39,2024-11-21T02:20:06.397000 +CVE-2014-9022,0,1,64f25175aa8846b6b77a9db174879ba6d2bc9e88017cb69ff0ce2e4cd891dc79,2024-11-21T02:20:06.537000 +CVE-2014-9023,0,1,76e14d1fb9491a6a13ce23f41a7a69d1921e98027a807dadca46810548b404f8,2024-11-21T02:20:06.673000 +CVE-2014-9024,0,1,fcef3895d0e3e01ca51555905fc887ed31fdbdadcd2b5c9c3111f191637e99e3,2024-11-21T02:20:06.813000 +CVE-2014-9025,0,1,f2263eb7deaa4ccb78a29c58a2902264071ec5b13b0e4a6cf9253cd6c09f4357,2024-11-21T02:20:06.960000 +CVE-2014-9026,0,1,2eb578ee0495bb3ff53a0ab902c79781e9e9b9b7ff99632f898f17aebda68ae1,2024-11-21T02:20:07.107000 +CVE-2014-9027,0,1,f806c0ac89d83bca96e7c2583a276057faebbdaaa33846f954c77e8d01881b94,2024-11-21T02:20:07.247000 +CVE-2014-9028,0,1,632e9ba5be8125adb3703446a79a171b8dfc91efb8b331a1d3455875d64f82c5,2024-11-21T02:20:07.390000 +CVE-2014-9029,0,1,999e5615ea2f54a683c14ff9e3a84f17470430289a58286b926a59b987bd910d,2024-11-21T02:20:07.553000 +CVE-2014-9030,0,1,a5824c0b6b886bad4683a03fb0dfc3a3a4caf3a71c60bc2fa25886b30dd50cef,2024-11-21T02:20:07.720000 +CVE-2014-9031,0,1,d9822b9c5e89f495c9c28bbf29b733e28e4ff20f0e3688fdaa7d4e862a77a140,2024-11-21T02:20:07.883000 +CVE-2014-9032,0,1,5b76ab6a4c2b1a106f4056d449a831789f2b43471a964b25b61ae3429b6976d1,2024-11-21T02:20:08.033000 +CVE-2014-9033,0,1,d365b3979dbbec7997e234cd18fa5d17b5b9b371846907e9b212f0403df1ef71,2024-11-21T02:20:08.180000 +CVE-2014-9034,0,1,42f646ffc3eef6c6fda1eaec5612a70c150d67ae039d570ad73ac5849e6c42cb,2024-11-21T02:20:08.323000 +CVE-2014-9035,0,1,9a1cd32593fe84b48088c47360c8f2f67ab0371089d94e77931647faa419d330,2024-11-21T02:20:08.480000 +CVE-2014-9036,0,1,f7e3ef9520a6a1c1c1b95c1aa214abaf0429716a0a5552edf4955f1bd32fad0c,2024-11-21T02:20:08.627000 +CVE-2014-9037,0,1,6eb2eef89f8fa44dd11761448d40e547b73a130e6faff74eaf2656a02c996e11,2024-11-21T02:20:08.780000 +CVE-2014-9038,0,1,9c357e512c137256fee52cca23343e700fcb9e7cb492365859ddeaea5f677e27,2024-11-21T02:20:08.933000 +CVE-2014-9039,0,1,014bda6b56389798273c1678ff5c267d7eb716ba2482aba9c32da9e6c1e5999c,2024-11-21T02:20:09.083000 +CVE-2014-9041,0,1,1b8ec3a5a15c26aa9fbe9d5dbc2bcc0cd6124aa532b2986a843ed96fa60478d4,2024-11-21T02:20:09.250000 +CVE-2014-9042,0,1,1576f25baa2db8cfe1b54b6256eaa8639f19225152193f6b83419251a4910f62,2024-11-21T02:20:09.400000 +CVE-2014-9043,0,1,f91949cba7fe18b0384b2d41aa7c6dfe7eeaadfef1d86140b3de633dd2420eae,2024-11-21T02:20:09.550000 +CVE-2014-9044,0,1,cf4bd39969faf7571ed55068b3f03d98b065b373072c1b1e057c79383bb7c93a,2024-11-21T02:20:09.697000 +CVE-2014-9045,0,1,e7bf390c3e74227a1f322888fb244bc1466c592fd5acf3110b8de767d47eaf5f,2024-11-21T02:20:09.830000 +CVE-2014-9046,0,1,8f31c09670206f24ebe2b2331ae2142a4bd347e23c7a91401bdce3137a48a83a,2024-11-21T02:20:09.970000 +CVE-2014-9047,0,1,01f3559bb211bacd5d45bcc1e7f024e85fcb505d0dba1f87238cde6c60c3a081,2024-11-21T02:20:10.117000 +CVE-2014-9048,0,1,3bf2ba82333aa2e404ee7576e6e756c89994d7b7d1bd75f4a6e886419eb3d6bb,2024-11-21T02:20:10.263000 +CVE-2014-9049,0,1,cefbf64e02f5213b4fd29eb313eea1f2a508de93ee1c93f2549cf35cc3ae8352,2024-11-21T02:20:10.413000 +CVE-2014-9050,0,1,a3ae38c7b55df1c697e4a6f166699439900c42413655934faa46692ff2193ad3,2024-11-21T02:20:10.553000 +CVE-2014-9057,0,1,3d2cdb1b1adb4271f472367282cfa12f08954b2b3c66827ab05a7f016614d24f,2024-11-21T02:20:10.710000 +CVE-2014-9059,0,1,2993af06b1dd97ff6f8c0f3214a828806b27a653c12d0e79343f516a002d0e4e,2024-11-21T02:20:10.857000 +CVE-2014-9060,0,1,c787cabc59b04f05349178a02440d4557704037a97f36c5cdb6dba13ec8c7fff,2024-11-21T02:20:11.010000 +CVE-2014-9065,0,1,a4f1ec0c3b7e7902d8f7e5c13bbaacc1545ab813b7cf34232542ea1b73be5934,2024-11-21T02:20:11.160000 +CVE-2014-9066,0,1,11d804136ad6bf9f44a41c8f6147d9b36a8e8e1cd40b19a68466e12fca4099da,2024-11-21T02:20:11.317000 +CVE-2014-9087,0,1,5c66b4a5a4e95cb45f68a4350720b8c791a8990eaccbf406913521d0f69e072d,2024-11-21T02:20:11.467000 +CVE-2014-9089,0,1,0e2c569f311b1f2b0d3bcd92b6589b1e39667d0761d28134168066d16bce1b71,2024-11-21T02:20:11.597000 +CVE-2014-9090,0,1,634b93faaf77a6967bb4ebc4ff7373243f4a0e618d89462047dbe94940553341,2024-11-21T02:20:11.750000 +CVE-2014-9091,0,1,a54b07dc3f227309a28601c3a3e43c66aecf00977be7d8dedbb0876a053a3dc6,2024-11-21T02:20:11.927000 CVE-2014-9092,0,0,6fa97e178cd0dd2fd9360ff1c554ea8234588472f4ff216f8eec6e1137b75625,2018-07-12T01:29:00.400000 -CVE-2014-9093,0,0,f815c760a2f602a573ae2bcbe39cd2b3c542d8e865aa9e10750e5e9aedf6eb09,2016-12-03T03:02:02.467000 -CVE-2014-9094,0,0,20e5f588393847e46a42ea723baec638739d8a298c2ac8db6188873e4560025a,2019-06-05T11:29:00.233000 -CVE-2014-9095,0,0,53bfd0ac24dda835b7ff9b7d188d10025702a6266f298b064ae44416c179f9bf,2017-11-08T02:29:00.943000 -CVE-2014-9096,0,0,3b3d3263291412ca3e63fe1507e6e9df3c18e1084defe11e129250e82a5b9b59,2014-11-28T13:53:59.927000 -CVE-2014-9097,0,0,8f5e711461bc3343e79e3844743e8204e58dd03f9dd9e965c7f172ae17117f76,2014-11-28T14:10:46.033000 -CVE-2014-9098,0,0,74231787ffea3b708bec2d2a098b7e3a21b7975d764ca6cc1fc979d7b282f4dd,2014-11-28T14:14:07.100000 -CVE-2014-9099,0,0,34345b30ad30f91532550fcbec066c359a43573e1a7768bce4f1a0ea31b54aa0,2014-11-26T21:55:22.127000 -CVE-2014-9100,0,0,9822111fb4305814a5ed6e23769ceba8399e5deb47cb955e62c45e596f7b1d2c,2014-11-26T21:55:55.440000 -CVE-2014-9101,0,0,d90b1f5a993325a0b87539bf4fd9962cf3f04297884deccc5f627fb7531e1793,2015-02-18T18:53:35.180000 -CVE-2014-9102,0,0,2c2f654670a419e31f534be5e9b1f9a0926f11a82cca2498586c9da76fbfb2ae,2014-12-05T16:53:55.813000 -CVE-2014-9103,0,0,9972470ad942729dbaf4be26e83368e0e5dc3561b66161ac38e125019417d9af,2014-12-05T16:53:06.687000 -CVE-2014-9104,0,0,6c1819b627c021d4991f8b91d264df6d1e137be21329eaa88a451671af7e3d23,2018-10-09T19:54:57.060000 -CVE-2014-9112,0,0,6f4b14dd2c91e10c197ec8192135758685aeef725315f2692a6b7b3cd2adbbbb,2017-09-08T01:29:32.120000 -CVE-2014-9113,0,0,51d486304b64e35a6724172c90c17d8f53408bee141b732a81b68d0205cd894e,2014-12-15T16:27:42.293000 +CVE-2014-9093,0,1,3d419606e99a3a51cddc29c2f10faad0a6990c011abc22c4209c838862ebeb2c,2024-11-21T02:20:12.250000 +CVE-2014-9094,0,1,988a6177c39d58126dc374a4f48213b6b307cfd60042e18f0a510879825e6dbe,2024-11-21T02:20:12.403000 +CVE-2014-9095,0,1,e93e0faf25bab1c7e5aeddc9ae41fba9bd8c0091ff6098f49e7ca86a57b96319,2024-11-21T02:20:12.540000 +CVE-2014-9096,0,1,d1fc597e6149a4933ab8aa5ad9909031e882ccb8f3f9b02867693984b5c244c3,2024-11-21T02:20:12.667000 +CVE-2014-9097,0,1,00dc0f27e935b7cc85b5efa4faa03f87f3ab8d0a6df1bf1a8c6d5d5e7e026af7,2024-11-21T02:20:12.803000 +CVE-2014-9098,0,1,09f60bc7c15c39ac5494649441b12b478b7638887b06e44914537f87a1e73281,2024-11-21T02:20:12.940000 +CVE-2014-9099,0,1,4261292a2d574b7fa1916d9b5ece4d3b0a75d4dde5fad379dd3dbb2045b55e17,2024-11-21T02:20:13.080000 +CVE-2014-9100,0,1,d8d2a6cbfaa4f68543ef61b8a41e882b07ec336dfd03e8e6b955d20170d69532,2024-11-21T02:20:13.223000 +CVE-2014-9101,0,1,7a937c5cfccecc8cd52dced96d155ca6df5c76235c5a6cb4cf875d47687eb501,2024-11-21T02:20:13.367000 +CVE-2014-9102,0,1,be113572b69a3ce0a0c784440fbd65f75bdba4a14cdb73ffd4628d3432b165d2,2024-11-21T02:20:13.517000 +CVE-2014-9103,0,1,201eb38c8b0fc46aec84001229ec31a039e6783937cfb8692ca34ca5f253a621,2024-11-21T02:20:13.663000 +CVE-2014-9104,0,1,7080987ee9914a38f63e6aa00d93739747824a9c26092bdbcb2151d4ed772b7d,2024-11-21T02:20:13.803000 +CVE-2014-9112,0,1,197e500120b7356f2cf598a83d0906b4606ab9487111686387d47427fa0fa653,2024-11-21T02:20:13.950000 +CVE-2014-9113,0,1,d1980f5484b7cc3db59a5d5925c93f242c3ddd4b105dc497fb006ab8dff8b18f,2024-11-21T02:20:14.117000 CVE-2014-9114,0,0,08b69425c457034103c6df19df52feca9fab18e4769a81ca41f62429e79581f5,2023-11-07T02:22:57.787000 -CVE-2014-9115,0,0,cfda523c0fdca7041bf4fe90cf2126da5d3131ca2c75922d381af7d6a98c156e,2014-12-23T19:12:08.460000 -CVE-2014-9116,0,0,851e1783e982593a011a2c0e66924312b65f77342dc0e13620a39b61a9a20a27,2018-10-30T16:27:37.717000 -CVE-2014-9117,0,0,40e15c1b997b2ed33c707314ad3354d39f43d7188b5adabf0bcedcd2d0093f72,2017-09-08T01:29:32.247000 +CVE-2014-9115,0,1,b14c955964d5fef6080d66e5231cc359a961606a939b742b662b994ba6353253,2024-11-21T02:20:14.463000 +CVE-2014-9116,0,1,c01a8ab59ff48a3ceb3beb7ad5702e8a5591c580a450c3aaef82739d553d5b4f,2024-11-21T02:20:14.610000 +CVE-2014-9117,0,1,61a60db120f5bd70bb0949eb40224c994198f8d47d2141784218afe233f8defa,2024-11-21T02:20:14.790000 CVE-2014-9118,0,0,a799b21e514d05a5e9b0a998ffec86524823909f81de6cd4e7607309bb6c84ba,2018-10-09T19:54:57.370000 -CVE-2014-9119,0,0,03c48d6d7b5ebade5f48c3a95e59f6ef6581c8c3e70d1949dc42828ee264849c,2017-09-08T01:29:32.293000 -CVE-2014-9120,0,0,3831349d296ba6bcea270089380e2d77ccadcf81594e76cbfb84be1f271a8b9d,2018-11-08T20:49:39.263000 +CVE-2014-9119,0,1,88c69401094a239f9cc0a4e6b0790fef92e84545e0ca1b1bf7facf28314657b4,2024-11-21T02:20:15.083000 +CVE-2014-9120,0,1,55c78d44cd549e59ffe5a9dca8153f99d536dd35287564a0abd592b38b2d7aba,2024-11-21T02:20:15.220000 CVE-2014-9126,0,0,770241e6fc62d3ff78c3e3a10db81462f9216f4181c4fb7e8164e6e6ccd6d977,2020-02-10T14:58:21.370000 CVE-2014-9127,0,0,49687190b828d64fe09edc17b5cb900646df1232980183a23fd999480cf1c405,2020-02-10T14:56:14.973000 -CVE-2014-9129,0,0,0d4035a6f25e9648701c0a947291d29be107cb233c4942931e9c6d3e83da5c00,2023-02-02T17:54:42.667000 -CVE-2014-9130,0,0,f88b1481b76eaf2b067a13ff8cf85e0f938cf8957c013c2ee8973f7b6c7ce36c,2017-12-09T02:29:03.967000 -CVE-2014-9134,0,0,84c1ad4fc19c6f05c46059af3a249b48a27a51de6d1f3222ca09d4b8a273001f,2014-12-05T16:58:07.673000 -CVE-2014-9135,0,0,9cb15cd9a199284b03605dfc7014797f8956ddca4de1cb89eac1766f8041e183,2017-09-08T01:29:32.403000 +CVE-2014-9129,0,1,e86b92696e970b2e76cde868b26394cbf8626cd68d03a0593369039efcbd41b2,2024-11-21T02:20:15.630000 +CVE-2014-9130,0,1,bbc08b38c99e4e7287c94d74dce44db7785c04204b7f70eba0fc81bc4ae9d788,2024-11-21T02:20:15.763000 +CVE-2014-9134,0,1,039115ee52cdac757821ef878f8e90bce65612a50e7ce187d9c3e4f6c94a16b7,2024-11-21T02:20:15.933000 +CVE-2014-9135,0,1,50df5b6adb56e8bb5ff4bf5a801a9223a0dfd0d49f065fe6c3fa84c5e64ff96a,2024-11-21T02:20:16.070000 CVE-2014-9136,0,0,fdec188b2268a1e87b1c98c1f25521217e765affaa136e178ef0eb0997122ba2,2017-04-05T18:51:25.057000 CVE-2014-9137,0,0,5177e0aa68e05b71cd50e5e508c0a3f1200fae2d3ecab06cb277049b331941a2,2017-04-07T12:10:45.547000 -CVE-2014-9140,0,0,ecb54577fc9cffb1cc2a118bf1e646dc0fd0fefffd97c99c763d5e5dc52d5af9,2018-10-09T19:54:57.967000 -CVE-2014-9141,0,0,fcb5b48dea6bf8a936fa844578fc2c48a123be851c5ffc36304f67b791a8ef0d,2014-12-17T16:17:56.877000 -CVE-2014-9142,0,0,f9e82333b1b9a2d8790a626e78a1681c181e92730647c3164c3384924804b639,2018-10-09T19:54:59.183000 -CVE-2014-9143,0,0,18be239044d2c8881ad45e9bb9f98735769ef89c4883278d80e4cb7293177599,2018-10-09T19:54:59.450000 -CVE-2014-9144,0,0,40ebc447aa31458e5fdf6e972a221a6657e587fb8292c3261b265a2a66cd84fc,2018-10-09T19:54:59.717000 -CVE-2014-9145,0,0,e42ac99a7749ff31f298b5f0d6888384ddcf43ea68ab0ec58fd648d1d70d36f2,2015-04-15T13:20:08.653000 -CVE-2014-9146,0,0,9f6803234a238a9a83705e1e25d66c45d26cb00da27e412aae19d99fe3845d60,2015-04-15T15:11:49.467000 +CVE-2014-9140,0,1,d51ab0d2610c31f3ea7b8c74a039185d2e33fc600090ebcb4117e6aa66d2a543,2024-11-21T02:20:16.440000 +CVE-2014-9141,0,1,39bc577a3cc2c100183ff0f76f1829e1f420848f103a4eb9f35aafea164815af,2024-11-21T02:20:16.607000 +CVE-2014-9142,0,1,4d70edb6d1ff7a3790724a07850fe268ada7c9c8f3debd328348cdda9084fe4b,2024-11-21T02:20:16.740000 +CVE-2014-9143,0,1,5956b6dfdbd9e3fccc25a916d309deb714f8b5b97d87b02e1697cdd6273d14f0,2024-11-21T02:20:16.890000 +CVE-2014-9144,0,1,2cbc3c672680b90597eaef8c6488f07d5cd0c3ac5d4ebd9c0930bd543f656f0e,2024-11-21T02:20:17.037000 +CVE-2014-9145,0,1,be96966ccc288542f06df7ac50a2c675726330a90214d09ec826be040407918c,2024-11-21T02:20:17.177000 +CVE-2014-9146,0,1,06e5d0e8ff0a7efa3d8c94d1f13a883929a587e5484a72580255d8309c91f781,2024-11-21T02:20:17.310000 CVE-2014-9147,0,0,00b294dacef2e6a9303d001721a108672f2fed6a2947160625fb72907f6da31b,2017-10-25T19:44:19.117000 CVE-2014-9148,0,0,4e600334e8daf493e58285f5572b1c8ec03c34b59385e7c9fa4ad670283ed948,2017-10-25T19:45:14.163000 -CVE-2014-9150,0,0,f28682ed7bcd98aa80a6010e9257204aee25871a40967e1499284b42c0fb2865,2014-12-17T16:35:51.743000 -CVE-2014-9151,0,0,06c9ca426d1a0e21ac83694f3ab8cd1eeecec757e94aed0de8208a860222f6a2,2014-12-01T19:08:59.047000 -CVE-2014-9152,0,0,be7fb098827e87d0f05207a83c5c08e4b35a3561f1fa3618f684905b09b3eadc,2014-12-01T19:04:46.007000 -CVE-2014-9153,0,0,1852fe3a0151bd62e5dc4286a28ef9334fbdff3a30a23b3a5ba8e0cbe7223f7e,2014-12-01T19:07:27.190000 -CVE-2014-9154,0,0,59bd739983a682bc345e74585d02d50f06d7b4e8f99f02180fb6d28be4347f40,2014-12-05T16:32:24.930000 -CVE-2014-9155,0,0,565ceaf371a314db9a7df10e83e92282637c016a54717a3daedce1a87946f1c9,2014-12-05T16:10:56.670000 -CVE-2014-9156,0,0,d8e68076b6f619078f4af9051bf6f4fd924cd6008e80510a17f25c8459b60727,2014-12-01T19:15:55.913000 -CVE-2014-9157,0,0,25f2e7a07445fb463b309b296fc12d6eb152478e4b0d875cf8a5e2b104d6b069,2024-07-19T13:02:55.980000 -CVE-2014-9158,0,0,9e594330e6883ce054afa992a164552596d2d4233052544abefd7afe2a0b3cde,2014-12-12T01:40:25.750000 -CVE-2014-9159,0,0,509d5f2dd5a7b8088aee0d037a7af644ed36efde6f1510e915a6157e2c645ecd,2014-12-12T01:40:55.657000 -CVE-2014-9160,0,0,5bae4029507e5450b4ce949da937cd00adbc4dab93c07ba69378d2cba9487060,2017-01-03T02:59:22.783000 -CVE-2014-9161,0,0,ca459bbe1b6e6a795aed715185f92f97caab1bb5566f28c17f011185d031fa89,2017-01-03T02:59:22.860000 -CVE-2014-9162,0,0,57e22c4a9635f5696a67f5ce939680865d8c32bb272b5849dc87db20b1c2da2e,2018-12-20T17:53:41.017000 -CVE-2014-9163,0,0,4f20fa5a7ba6e6cbfe0fed355bcde1dcbf92a72b331df1c1928d326909689d3f,2018-12-20T17:53:32.830000 -CVE-2014-9164,0,0,7e8f7b08ef8f1308c93da078543d3a095df27874615463b090c964a0016e1dcb,2018-12-20T17:53:19.847000 -CVE-2014-9165,0,0,be3fa84c1b3206d116612df50407d6d64c57655419b844efe826324c7bd3ac75,2014-12-12T01:45:28.383000 -CVE-2014-9166,0,0,1078886f7ffeeda66b1e087344d881dad0e9df5c8f0a66990feb29744e470ba4,2020-09-04T14:05:38.223000 +CVE-2014-9150,0,1,a322e7d702c7c37b132c5a942efec16510db2df64811db70ebcf079909f102e8,2024-11-21T02:20:17.723000 +CVE-2014-9151,0,1,ee2a43ae7608658b1528f09d58e3822ee111dd5db92c9c44d5684948c3cc896f,2024-11-21T02:20:17.867000 +CVE-2014-9152,0,1,dd8520ec72b50b6d41ebbabe74059358e3c30b8e0ae41e9162883b82ea9c7598,2024-11-21T02:20:18 +CVE-2014-9153,0,1,53f9d050b68c7a3abe0ed34acd4db7de2a74bd59129bc3a33fdce6f2410961e4,2024-11-21T02:20:18.133000 +CVE-2014-9154,0,1,e86fea1ed0689501eaecdda8eafdf940e3ddfe6f4c245a7c47d99afa388c3ade,2024-11-21T02:20:18.273000 +CVE-2014-9155,0,1,4057aac8abe2afef78f4c7899c1f1b085aac498d15873488b9a63ddda7a26815,2024-11-21T02:20:18.413000 +CVE-2014-9156,0,1,6a1a00bd64964d5c82d55fb388afb1ff214201bae891fa47ff462f73fb648aa0,2024-11-21T02:20:18.550000 +CVE-2014-9157,0,1,04463c4a7b4b0b3dea8234d6490c056de5cebb44fa1898c57dd3613d7b740a98,2024-11-21T02:20:18.703000 +CVE-2014-9158,0,1,de9186797dc746734eced1eb721b6970e77a41f5138f359ee8fb485228daf0f1,2024-11-21T02:20:18.857000 +CVE-2014-9159,0,1,3a7dba2ba246a58b49738674ba12bb5626782b07e0a386e9395a46d18f9e4d83,2024-11-21T02:20:18.960000 +CVE-2014-9160,0,1,3b13f59df58925fef44d3ad5a61e4f4991e274b9781341d09f4453d2e4aff94b,2024-11-21T02:20:19.067000 +CVE-2014-9161,0,1,8447faf588c56d39c6105866effba8699c769db0f4f78e36932c10daaec7c540,2024-11-21T02:20:19.183000 +CVE-2014-9162,0,1,b253d42e1bc619a7befd5c6d9ecd05b303fbd5f6ae00a80f58d18e558683331b,2024-11-21T02:20:19.300000 +CVE-2014-9163,0,1,edc225b5879ac1351c08e8158fafd9f47c2632a64c92f78e1934f3b5cc083702,2024-11-21T02:20:19.423000 +CVE-2014-9164,0,1,0643fd2115d115bcf70a3624fad8abf099eeb5cd0d5e0ca3757bba5d61cd0a1d,2024-11-21T02:20:19.520000 +CVE-2014-9165,0,1,39e41bcc887d35b695e3adb0b2910de88427405fd8e518d3257f54ef18c45241,2024-11-21T02:20:19.623000 +CVE-2014-9166,0,1,30c575b3c54d20c85d4a499d21d122f9127618169b26c16f496326e81ea8f93a,2024-11-21T02:20:19.743000 CVE-2014-9167,0,0,b0644d3929964c975fc6d85e1177a4dae04b4eee9d945efc92d513f8b6e708a2,2023-11-07T02:22:58.193000 CVE-2014-9168,0,0,160743b1129a6f81ced4f1bb61b2f949525aef6c6d84d03078fad358c82e5b17,2023-11-07T02:22:58.410000 CVE-2014-9169,0,0,09ece534c868a3dfbad9736a4e56e0854053f36fb398cd6322a6c31524f8abb0,2023-11-07T02:22:58.647000 CVE-2014-9170,0,0,9706518f4426ada6fbae0e0f5aa0877c4517a9de5d896e89085eeb54e52068f2,2023-11-07T02:22:58.887000 CVE-2014-9171,0,0,1e248cde3c29bc913f735cf346631bb70cc1ee17822cdc191d9a3d4eb49beaa1,2023-11-07T02:22:59.117000 CVE-2014-9172,0,0,56aef4a83bc799e9d805a2378b50b0a2b546c1e7303e3f792c00f190fa138b82,2023-11-07T02:22:59.343000 -CVE-2014-9173,0,0,d1b531d6133bafd70480cd244faa48d2a16f30790d871a33f4067fbff29a2ffc,2017-09-08T01:29:32.527000 -CVE-2014-9174,0,0,505d70b8fb6188f7901576abc4042df81104fb57585224f7543a6b3ae3b434af,2017-09-08T01:29:32.590000 -CVE-2014-9175,0,0,d5ae7272841d012fedb6b7aedbfe6466af65df02eebebb24c07c7b47a4a047d8,2017-09-08T01:29:32.637000 -CVE-2014-9176,0,0,d0267d0ae52c9db50dcb47e565f633a3862baff7fb66506f574b5c3f5428ebdc,2017-09-08T01:29:32.700000 -CVE-2014-9177,0,0,979aaa2926b2e33f8f44c571313b65cd8b373ba09273a603cd8c8e8fb11d15b9,2017-09-08T01:29:32.763000 -CVE-2014-9178,0,0,d27f6654367fb98537e7ee1faccfca148d968e35de1543a3fb3fa43c1102b249,2018-10-09T19:54:59.967000 -CVE-2014-9179,0,0,19ea7e990aa3d8e7bfdfbd5776185444418dfdfdf9f0a3ee07827b426d455ebe,2014-12-03T19:08:07.943000 -CVE-2014-9180,0,0,e3a472ac8cdb1f490494fb51713e34ddec22fea272e947584dc916fd86794142,2014-12-03T19:58:40.883000 -CVE-2014-9181,0,0,e4495dac7b401ea91285c61d84ad2b89d3e1d942406429388c60c9b8175d9df7,2021-12-10T16:58:44.170000 -CVE-2014-9182,0,0,cda58aed7aba7bff8acf670acd40a113e75de75cb9efd5673e38c727c17ab1bf,2014-12-03T18:39:25.743000 -CVE-2014-9183,0,0,3e9bc9acf76a9b953eae04eb291049519dbc362c33e9472452d8a4d085ad5e4c,2014-12-03T18:41:57.997000 -CVE-2014-9184,0,0,d27c9b52ccf80e39ec06a290ebadd3141b22aeabc3e73dc1985af951cef61e7b,2014-12-03T19:00:36.893000 -CVE-2014-9185,0,0,e080a5ad63c37625cacc59d62138b4b612ac4b25f918d0cea69581cab24ec206,2018-10-09T19:55:00.467000 +CVE-2014-9173,0,1,5a1bc742eac33d5314959f04dd1ec2eea98c72397b2e7998b0a8575b3e6f1939,2024-11-21T02:20:19.940000 +CVE-2014-9174,0,1,388dab2938f3661fd5a307fe66a00f51c9a7abc0f204e3d7a2d4da946f357daf,2024-11-21T02:20:20.077000 +CVE-2014-9175,0,1,4472c73d57e019cc5873706abe3c69898c5d275658132d9ff908c7ec063d4155,2024-11-21T02:20:20.217000 +CVE-2014-9176,0,1,8b8035e58c44757109bab05f90d1a5ada35618d46be64d223bae4f17a65def2c,2024-11-21T02:20:20.363000 +CVE-2014-9177,0,1,c5fc2e4b1f80855c9f4f9c2305cf2b285ff9c3ec1bf6a1887f9b48c017b63493,2024-11-21T02:20:20.497000 +CVE-2014-9178,0,1,0fae89d7b857777870ae3ec9f4cfaccb0485ef5484e5972beaa86c31c3258ad0,2024-11-21T02:20:20.630000 +CVE-2014-9179,0,1,ae30f3d119a5b8cc593e806c3d280bc919a146747893f56f95f3b57195c31bef,2024-11-21T02:20:20.787000 +CVE-2014-9180,0,1,7c3105ecb00a025ea9ca0590355c2a17ee3d67ef49be0130c5fc711b00bfd8e4,2024-11-21T02:20:20.930000 +CVE-2014-9181,0,1,756169a8d73eefed7e79179da52bad9ab34191077298a6cf45b8bde05afbb2d4,2024-11-21T02:20:21.067000 +CVE-2014-9182,0,1,5aac052b06e7a4aafbd8c857dae50536796cb70f6aa47fc4638b83c94b459023,2024-11-21T02:20:21.220000 +CVE-2014-9183,0,1,414feed90b2f3056f7bcc463e39906b3cbe224444a9d76a334873df91ca30517,2024-11-21T02:20:21.360000 +CVE-2014-9184,0,1,2cce67de247ff95a04cf424e701ab06d3a3cdb6cd7f3e6eaa44a43232a53f873,2024-11-21T02:20:21.497000 +CVE-2014-9185,0,1,457ec4e177c0bc9a3c7857500336b3436b44dca5ee2dc667e81ab54f5d5687a1,2024-11-21T02:20:21.627000 CVE-2014-9186,0,0,ff87f1e9b76cd212619ca414897b06c263b1a9094baf289267d2bd6493fb78b0,2019-10-09T23:12:24.250000 CVE-2014-9187,0,0,02863d2932c3393c581e8cda12b66e2f8a95e95b568652692e61949b43734ff3,2019-10-09T23:12:24.390000 -CVE-2014-9188,0,0,7b05c5fe1e8ab5e1a355dca97568cdc1067108e61e6f1acdfea49d6c041f634d,2014-12-29T23:15:03.177000 +CVE-2014-9188,0,1,5ef9124820dc751f360beffda3e98c8912ebf8db3dba9b76782f397a6d3523bb,2024-11-21T02:20:21.997000 CVE-2014-9189,0,0,4d6e4df394867b3098a25785fda0060e74ef6de677ec978a33038e8367cf280e,2019-10-09T23:12:24.530000 -CVE-2014-9190,0,0,689b9c72312ef9e4b99acc7ea632a7e3606761cc0d48f3f8fadceb7f8578b77e,2015-01-12T21:34:14.610000 -CVE-2014-9191,0,0,dc1df203bd9e7bee59fbb0dc9a4f2496587060e27545d7e175eee3af48057646,2016-12-08T03:06:26.910000 -CVE-2014-9192,0,0,c17905ff9d35a9cd0db0e5834193427f1fe5a434ef14e4a4595125ed5ab9d4f8,2019-02-01T18:06:44.377000 -CVE-2014-9193,0,0,dacbd06bac7e10b2ebc263d8d6d486902c02849a08a76bb59b5c98e366154591,2014-12-22T15:35:56.060000 -CVE-2014-9194,0,0,6983e3737388812bf87f2ba0a3c188248fe8a12a98b96d5158d31e72d207e355,2015-03-24T16:49:07.557000 -CVE-2014-9195,0,0,4321e567325aaa0c335659d6235c42ef789315456a6d3b8a07ae25a8177d6cfb,2018-11-29T14:43:56.267000 +CVE-2014-9190,0,1,f3b4bd1f58a5a25e972932711e3bf62ae569e67be926fef6886fd0e105e6879e,2024-11-21T02:20:22.230000 +CVE-2014-9191,0,1,5013d6729734b4db6618d04feeee8e2afb69fd4f023bda86cbd7643bf13a9ae3,2024-11-21T02:20:22.350000 +CVE-2014-9192,0,1,2b477ed4f4f3bed2d7252a0e67e8cc6d0c0596d4e8b80f92211d33ff52ac6a1b,2024-11-21T02:20:22.457000 +CVE-2014-9193,0,1,f795e6932f050998f41e01e8248bcf59fecb1bf8a38fb456d9ea698c2bbabdeb,2024-11-21T02:20:22.563000 +CVE-2014-9194,0,1,13fa11842c109ecbeff7671a028d77cdc279209ddbbbfc9baec140cfce839b7a,2024-11-21T02:20:22.677000 +CVE-2014-9195,0,1,ccd3070acc8eccdaeaa47931bbfcb212fbc3e6c4214ff529a7ea8242d6268a12,2024-11-21T02:20:22.783000 CVE-2014-9196,0,0,905019849a9067b2b739fb5b72212a1de78d7f2b5ecc5b3389bc6b563c3c7a6c,2016-11-28T19:13:44.760000 -CVE-2014-9197,0,0,d74c6caab13ff3192b05a3bcf8d9168899bf4743e7fce5590df17dc8218eeb94,2015-01-28T18:52:02.290000 -CVE-2014-9198,0,0,1c19fa51744addb23bfd801c10f390cd1d70332c4212bb31fc3425442d0c56d8,2019-04-15T12:30:07.633000 -CVE-2014-9199,0,0,6184af3453cca017a245c11abdcabcaab25498c95669ef1e8be9dbfb20a391ba,2015-01-21T21:06:32.130000 -CVE-2014-9200,0,0,7959f458dcd6446ff305915f963f8efc0451596f6a0498181c28de07914d6750,2016-12-31T02:59:14.593000 +CVE-2014-9197,0,1,f3d1234436cd78ae48e7b93b7aa23cdde8ef5f57fce0895e9e6d2a6bcad3ba16,2024-11-21T02:20:23.007000 +CVE-2014-9198,0,1,194609103e96850c6deb296ad2d16f1c4b83f595e8bf266c2f72d14c2f838515,2024-11-21T02:20:23.120000 +CVE-2014-9199,0,1,6f21448085eca3718550f0e60a6cd23c771df907633f03f270773018f88eb2c0,2024-11-21T02:20:23.240000 +CVE-2014-9200,0,1,eeb5bbd29c29f39c6b60847fce449341b00cea44eb4cff1aae9c8241fe0bf514,2024-11-21T02:20:23.350000 CVE-2014-9201,0,0,d0c806f8235c034daad10fa149d3928f3028970ce0f4c4df5990a52765700a0c,2015-06-05T17:59:22.703000 CVE-2014-9202,0,0,c424e8fa83e4f77a2681edda50750128894a891bae6834cee00d474c7110a689,2015-09-29T19:34:03.657000 -CVE-2014-9203,0,0,eda836dc421c74bfd7d7700adb2d8e74118cda1b1caecabe7ab2a6a231253de7,2015-02-09T19:26:44.123000 -CVE-2014-9204,0,0,0bb9da39a36a53a23aba34eaf80638c935dbd096adaf216d920228f2259e6181,2018-04-10T15:44:35.230000 -CVE-2014-9205,0,0,c3dd513e35a0f14c8002b567e9b83deb2f400e71dd762d801fac7ed8ef67c301,2015-03-30T18:46:19.227000 -CVE-2014-9206,0,0,d21f1c05c0b07af73483496eaa656e00d4ed0cc482923927a40fa0e91e074500,2016-08-26T18:55:50.537000 -CVE-2014-9207,0,0,21e59073e4d6506e38c452b73b19d53bd739109101a7558173a730f56266a7ac,2015-08-06T16:46:08.910000 +CVE-2014-9203,0,1,32fdc2e801dde7e2d3bf47c60f427453a9e32f9ac91128d0c2b21a56c346a5ff,2024-11-21T02:20:23.690000 +CVE-2014-9204,0,1,d20c38bb7a47afb53f52c7b7dea433c87ef7295fd88755c5ccca4ba4afc319aa,2024-11-21T02:20:23.810000 +CVE-2014-9205,0,1,d74f0001f467970c5480c4f77ebd80a753c6b7aa6722fd9041f3827bc93fe16e,2024-11-21T02:20:23.920000 +CVE-2014-9206,0,1,53de871a77fb19afbeb0d2468c42c9bae5f7474b2c8ac1de2f903e89e1764a92,2024-11-21T02:20:24.033000 +CVE-2014-9207,0,1,ca731737f3b78407d82a2de4ca87d58bdfd41d75afa5bbb9b284a51632e45dbd,2024-11-21T02:20:24.140000 CVE-2014-9208,0,0,08f6c764867918f4a1648fcf36f1f23af68d95bdd657df9b207027ae59b314ff,2017-09-16T01:29:00.733000 -CVE-2014-9209,0,0,edf267b22be44a705d0738fd985f55e84a4b04628a173607aef6d6862304fed1,2015-03-31T17:02:49.090000 +CVE-2014-9209,0,1,e4d274b07b08f7242f3c210f640d1e1b30f368d38edc0c3aebe1a2e102930259,2024-11-21T02:20:24.360000 CVE-2014-9210,0,0,f51f1b0931ebdfca93b234e7809f6c18ade264ca6d95aad24abcbce4cf88ee37,2023-11-07T02:22:59.827000 CVE-2014-9211,0,0,c628bac1e0c19ef03bf31a79151c42f893037a099ceae97f290396c596fbdd4d,2020-02-05T21:05:57.453000 -CVE-2014-9212,0,0,d41e8b95bba14a1a502d2381439734ad5d2ccd04b5df60731ce498abe9954c08,2014-12-06T01:38:31.303000 -CVE-2014-9215,0,0,39fcd461c0eea1173c054e6cd1204b2a5e24f7446977f7b1eedebe9950b34c5c,2018-10-09T19:55:00.870000 -CVE-2014-9217,0,0,8894f6a55b1be3eb427dea34d0351379faa15a39817ba278f3862c5624b1e496,2017-09-08T01:29:32.857000 -CVE-2014-9218,0,0,7a71db35d7383347e283c0d9495bc95291d75d579ff5bc316b6705e9d20d8ec9,2017-09-08T01:29:32.917000 -CVE-2014-9219,0,0,fc487a95fbbcb98faedba0cbaace3bf78b8c0e06ac1e0dadedbd21f991e685b1,2017-09-08T01:29:32.980000 -CVE-2014-9220,0,0,dbe91c9401bbb70b6fb326535dd046f01072a17e272f6f80d3ebd5c659c010e2,2018-10-30T16:27:35.843000 -CVE-2014-9221,0,0,4b6aeba6991acc41347fe8af87a5a24ba586f8c19385df537bad4dad150425c7,2023-11-07T02:23:00.090000 -CVE-2014-9222,0,0,f568c5c281bd4442a7b0f7afdd35c56f1f6a04285364871ac7f4d13fbce45aa9,2018-08-31T10:29:00.290000 -CVE-2014-9223,0,0,8ee8f3ff379393951b03bb2d234c42aeb492d0ed5f55e2f48be6670bcc4638fa,2016-09-06T13:44:32.667000 -CVE-2014-9224,0,0,9b8a0b3de867e7d598d5f0d87aa5089a1f959aa11c8a072f6df738ba31881952,2021-08-04T18:56:05.773000 -CVE-2014-9225,0,0,88da82d6d5e3f015c97f401ec469c25e278eeb9eb84736adcba76bd813a5feba,2021-08-04T18:56:05.773000 -CVE-2014-9226,0,0,e7d2078378f0bd2bbc49ae13e0236f36c3fb1bc313c8cdba5e81ccd59a658e0f,2021-08-04T18:56:05.773000 +CVE-2014-9212,0,1,a4e6b51548b7d9f98c0a5f0c337d7b22e000452ef7d4ab93db842863f977f163,2024-11-21T02:20:24.660000 +CVE-2014-9215,0,1,8bfd35d0b551d49a3ba9d40330024848a4f991a67ee2532d70fe9d01ea9ba39f,2024-11-21T02:20:24.813000 +CVE-2014-9217,0,1,f57df02f9e2f1b098b72d4eb4add7daf5d620d48c2589cdea0e0896a023f7700,2024-11-21T02:20:24.960000 +CVE-2014-9218,0,1,e4228f7f514768d3e5fdc06c371581dd7f80a5e342e6e7c7c4fc5d398bff7dcc,2024-11-21T02:20:25.100000 +CVE-2014-9219,0,1,c9fed0ea674261766cdb597e17c81cb3f464f4bb6b250182fea5eda5fc746b64,2024-11-21T02:20:25.270000 +CVE-2014-9220,0,1,d8600f735f2bce45a4dce49a72299aba58414c117ef3a8e946fc12caefb7bc2f,2024-11-21T02:20:25.427000 +CVE-2014-9221,0,1,d2a035553d6b1bde98757d3eb19e903302648e5064908b1bfcb93bff46faca44,2024-11-21T02:20:25.577000 +CVE-2014-9222,0,1,9d597669b94ca8451e411ae9fb76adf784f0c8a16f267cc0b3b5461508729431,2024-11-21T02:20:25.733000 +CVE-2014-9223,0,1,fcfbb67ed72e8e4f33792b1285d229cb263d865d277dac52e33439225971164b,2024-11-21T02:20:25.887000 +CVE-2014-9224,0,1,6634f1ef6ed73b0ab3c8804be659a0a2188629eee262a5b25c0ed15baa2f9873,2024-11-21T02:20:26.030000 +CVE-2014-9225,0,1,4ea4120b6c7d1bac2a29808c6d4da91189034674db40e1642fff9ec9a873b14c,2024-11-21T02:20:26.143000 +CVE-2014-9226,0,1,fff9f836f6e924a15ef4b3187e365a7ca46d90b608769bfdfb432cefd153f0b0,2024-11-21T02:20:26.260000 CVE-2014-9227,0,0,3e5546e0c5683077fab93b801e3cac1fb2b27dcd0ad2a1ad61a0490dbf7d9530,2017-09-23T01:29:00.277000 CVE-2014-9228,0,0,aa787950c6fd04cbfae4573bc521dfb936790b45c79639c23fea98fe9d6e5380,2017-09-23T01:29:00.340000 CVE-2014-9229,0,0,569fbd7476c4e4b0482860d13e14c9f59a19a37e5a1cac1e8a0bd3aff57934c5,2017-09-23T01:29:00.420000 @@ -72769,52 +72769,52 @@ CVE-2014-9230,0,0,c31f1a9d9b884976793f4222fdc5222ab7c910878736570defe955ab0dd353 CVE-2014-9231,0,0,9348e8cfdfb68a03b57230411637f31b15bd167dbfe969fa285ab9150b013275,2023-11-07T02:23:00.253000 CVE-2014-9232,0,0,8d5236b0068bca450a5c7f9b649cda2117f36c2bb517e1073e045573e5158ff1,2023-11-07T02:23:00.470000 CVE-2014-9233,0,0,feef1966f6e4b9e96c17889ff375ce9616fbc0748335c64bf222b1da0f514004,2023-11-07T02:23:00.750000 -CVE-2014-9234,0,0,cc443aa50bc55b1fbfa59dda7480e89253745829a30802bc4391775e03a303a6,2014-12-05T14:12:19.360000 -CVE-2014-9235,0,0,d838ac9d0ddbfa5498d56bb23243f3ee75f31de835f2d74a6ba42cdcdb5837ec,2014-12-05T14:10:46.923000 -CVE-2014-9236,0,0,89bfe8f5edaf47ee8c86ddb8277b8d72ebc0701c15870644d7676d049fec95b5,2014-12-05T14:05:32.687000 -CVE-2014-9237,0,0,c06c4a6bee8d116f100a8968392aa6cc6d8b8963da30f171460a1eb0cc6e216b,2014-12-05T14:04:50.373000 -CVE-2014-9238,0,0,0eecd8a13bbab0f24cb086f531b8e16ceded02cf3af68e26cf168d8f6b9264ed,2017-09-09T01:29:01.470000 -CVE-2014-9239,0,0,1f9f299ae515081fd76276c5f7f06afb8046626794416e26a38f6e87c363edb4,2020-06-03T14:54:57.137000 -CVE-2014-9240,0,0,f1d428ed112e662cbdc1f15bf4c33857385307692cd2ff3c8eb5703d6c257d5a,2014-12-05T13:56:03.697000 -CVE-2014-9241,0,0,e2e9455960f94d1c357661fcce239334a9781592b9f7705c0959c26b22cadc73,2014-12-05T13:55:17.387000 -CVE-2014-9242,0,0,a50386bb8cc146ff68114d93e6f69d338a756881ed57ac5d9eac0237ea76327b,2014-12-05T13:54:38.073000 -CVE-2014-9243,0,0,4a7fa98d7bdd66ad34cae00de386b65be2dd465c45a235cf12e2bb5ab83040af,2014-12-05T13:50:55.243000 +CVE-2014-9234,0,1,0d3e8c78384b831b182ea836d0819b8bafc2822d7b86c2101b429b11f87c5925,2024-11-21T02:20:26.893000 +CVE-2014-9235,0,1,44fe1dc85eb454d6cd7534d163412ea2cd8f4c84fc24c359dc43283d91c7f57a,2024-11-21T02:20:27.040000 +CVE-2014-9236,0,1,e2af79e536d144cb8eb6bc915ef59fb7f6004aaaee2c497319f5db9629b3acab,2024-11-21T02:20:27.190000 +CVE-2014-9237,0,1,8de5a5a9732d4c9cdd173efd60b7f25ef0ffc7e29ed900258dbe582626b0b4fe,2024-11-21T02:20:27.330000 +CVE-2014-9238,0,1,1bd8159e0e90f1caeefa52bbfcf026951aeb13090d612c4d4ff06833e89f00d2,2024-11-21T02:20:27.490000 +CVE-2014-9239,0,1,877cc0e335625491f2a126c2bbdbf0ccb1cabe2e6a92088aca5a523a39753177,2024-11-21T02:20:27.637000 +CVE-2014-9240,0,1,0dd1a28e710af7c4ac200211149f94a28ccbaf18148650412c7b5d6162aec451,2024-11-21T02:20:27.793000 +CVE-2014-9241,0,1,ae05c6c25270d8f256964565ccf7a678f5a4cc996a911291bed03a8218c5f0a0,2024-11-21T02:20:27.937000 +CVE-2014-9242,0,1,650ee565bdb37e24a29e541298c1ca0f1141e516cd6b6d5f7e5da0c13f07f7b7,2024-11-21T02:20:28.083000 +CVE-2014-9243,0,1,84c8ee1bb5e5a3dd08e532c3adc92c3795e77c2cf426aadb2e9542473480fcbc,2024-11-21T02:20:28.230000 CVE-2014-9244,0,0,e1d177d074fa20fc0481e39ea07cae112b7209e00d55376fc556294237992249,2023-11-07T02:23:01.057000 -CVE-2014-9245,0,0,bc77d7167d8b6e7c939a39c9aaf948311c180b25e361920f5e3364cfff6774bb,2016-03-21T16:03:23.103000 +CVE-2014-9245,0,1,f2de558e13e1964a0e4d14b45f83f898741e044defcea61ef687ab2aebda948d,2024-11-21T02:20:28.390000 CVE-2014-9246,0,0,7a186e38a90987c811c8f6b5dffc7ab3956df216ae4716b05cd196c326ab5d58,2023-11-07T02:23:01.280000 -CVE-2014-9247,0,0,59576bf41ff15a5db428daa38cfa7401ff50cd13ecb8382c22e2c61b9e10c3a4,2016-03-21T16:20:02.023000 -CVE-2014-9248,0,0,603713acd56283f39e11e7aba02c40cd8c7ab61b128415910c37cacb536ed021,2016-03-21T16:21:33.283000 -CVE-2014-9249,0,0,d54718d1262e967d7121b01708320bc4f98665170e8f38686d2d3d8597bb9a2e,2016-03-21T16:22:25.257000 -CVE-2014-9250,0,0,767c07e3fbfedad07ed90ae767c4fbb077737348275e9a2b51585c50576a4bea,2016-03-21T16:23:32.640000 -CVE-2014-9251,0,0,750f98f661759f2e6fced49e3b5f0fa7a219833634c94809a5d7244126c98f64,2016-03-21T16:31:49.427000 -CVE-2014-9252,0,0,29d57d65947c31cff7df4650c996ee1d1cd0b1bb7f2bd8b6830aa15b64549966,2016-03-21T16:36:16.473000 -CVE-2014-9253,0,0,04914893e7b6a120b75ff40c5fce8f0f7f2752b54c52c7c0720707aee95429ad,2017-09-08T01:29:33.043000 -CVE-2014-9254,0,0,37084c2ba898e8e7d7717b1ff395f1653faa258f1d3e837e49a20d317f2f9809,2015-01-03T01:30:19.640000 -CVE-2014-9258,0,0,7f2c0b506a1ec61ae58fa4aaff56a1b6cc1d4e4da69c24cbdb86e94cfd8a85da,2015-04-18T01:59:34.683000 +CVE-2014-9247,0,1,1800dee26b71987091f9082f5a0aa20148d4546d2a8f9c8ab04b40291a38e1b3,2024-11-21T02:20:28.523000 +CVE-2014-9248,0,1,4a678711dc8847a26c9dd7d4762ab2c60b23caa97d1a905447ba75f97bffae80,2024-11-21T02:20:28.650000 +CVE-2014-9249,0,1,46cc045cea082661fcf9ec061de80f5164d9cab7cb1fe506eefed34680925f42,2024-11-21T02:20:28.760000 +CVE-2014-9250,0,1,611e3112f6749092bf2ab6a08357e36f96c20a7ec5138ecb264abcbbb8f624fc,2024-11-21T02:20:28.880000 +CVE-2014-9251,0,1,e318b4172958e2c4242e424de6534e04edccfcd6464be8d39f07a810a60ce792,2024-11-21T02:20:29.007000 +CVE-2014-9252,0,1,7094b4e2e0fc4df505d3c3e620cdb35e1a40cfb0a9e5bfc48969eeaaa42420c2,2024-11-21T02:20:29.140000 +CVE-2014-9253,0,1,13d5dc57aec43fb36b83f5551cc1e78ed4fcffd75f05a7dbf5de062eea19a042,2024-11-21T02:20:29.263000 +CVE-2014-9254,0,1,39ea3101016be2f9a7f2988df50f4799b7b257eddbb00c21294650ec75a85309,2024-11-21T02:20:29.420000 +CVE-2014-9258,0,1,b06471976c1233b299de8b39ca5260040f584fb77f647286718757efefa7a82e,2024-11-21T02:20:29.577000 CVE-2014-9260,0,0,8ca7359d30fa0db212c6f7cf43e3dd1636f75d59fd03e83f4ddd440b2c3d83fb,2017-08-15T16:23:52.770000 -CVE-2014-9261,0,0,f5f4d518469b85f9682604001131d9548afb53c0c97143f98ff107926d1c094d,2020-02-18T18:20:01.690000 +CVE-2014-9261,0,1,74ec1aa5903c234c2c775eeeb35aec2ea241761c2162a1d805eae23328a59eb3,2024-11-21T02:20:29.873000 CVE-2014-9262,0,0,3fdb08f0393659f3ca4754e011f636fa453dccd3a3c2512c9883829c51fe7279,2017-08-15T16:48:25.343000 -CVE-2014-9263,0,0,3fd57e5c14d135359fcc25ce732d5a0be5890f809dc2d87b42c936e1dc92d010,2014-12-23T17:17:27.763000 -CVE-2014-9264,0,0,2ed4812c58aa7eea0144b99cb48718e8fd96de55b4b676754afa278aa78090db,2014-12-12T17:15:08.610000 -CVE-2014-9265,0,0,e4b328743f74a5c1bf6549d74cf8a3ed999dec445d10be051735c68a32f4ba1a,2014-12-09T18:50:37.650000 -CVE-2014-9266,0,0,c09d399998fb767f4ee5e3896001769d2b77f25c4fbe4c69db5e95504dba7cbb,2014-12-23T17:13:37.580000 -CVE-2014-9267,0,0,661786073c8990cdfa1e1240c3bdeb2cad81e694e976477a1f9a608beb380de8,2014-12-09T18:48:53.287000 -CVE-2014-9268,0,0,91712d372c5907bc6293fc2e85ffdb76dc227a43c117b6a912a8c4e4b6b31f94,2015-12-16T19:00:54.173000 -CVE-2014-9269,0,0,8c28e97c102d4b7c9ad09ed1b4c97e8bd8a466b0ca6eb164f01933b27f4cb8bc,2021-01-12T18:05:59.507000 -CVE-2014-9270,0,0,96759d3ceb6a374b727be8555a4f701fd4ce06f3a810febbf9ae91c1a346c94a,2021-01-12T18:05:59.507000 -CVE-2014-9271,0,0,0f338a33e3c77eeb2944140a0cde6685f81270129cd972f2c3db40024a1e069f,2021-03-04T20:30:55.123000 -CVE-2014-9272,0,0,129a386b9ff772a548d9df1d308d770aefd9e08c6b5df070101167aa109eac3c,2021-01-12T18:05:59.507000 -CVE-2014-9273,0,0,dd6901e7a7fb98172bfe0d74435bf5e6be1b70f4bb21afce675bf92bce74a7b1,2018-10-30T16:27:35.843000 -CVE-2014-9274,0,0,17d9cefcedcb28bba12fecb6c5653d1949aa600cf570505780b8bde5da3f42f5,2016-12-22T02:59:21.250000 -CVE-2014-9275,0,0,f1bfc05b73ad9ce81ee315e1629c65961f0a90baee43a38bd53703e91f5d2a7d,2016-12-22T02:59:21.313000 -CVE-2014-9276,0,0,b43b08116848404cfdd4dfc8a2651af9c0c2b2013c23e8d153b834cb09ade1ff,2015-01-06T14:16:03.267000 -CVE-2014-9277,0,0,2807d925869dfe0a000748cb67531da24d49692ac21da0dd44e4bb87f04a1b3e,2015-01-06T16:46:13.193000 -CVE-2014-9278,0,0,674deef2d09ceebe16f77d9fd350334d651b8b1ad7a93d76cd8641f30160c27d,2017-09-08T01:29:33.167000 -CVE-2014-9279,0,0,d4b2e37507ce2def84602697fb90b81907c40a788f93a78543b8e482f2105ab7,2021-01-12T18:05:59.507000 -CVE-2014-9280,0,0,301fb934f6bd970336fb0a2b1cd4340ca91c2f8d301e553e12f3849d198c658a,2017-09-08T01:29:33.277000 -CVE-2014-9281,0,0,c7721abe7841ca1970bf23544ea4512e9a5b0cca19641bf86a04ff6ba389bd49,2017-09-08T01:29:33.340000 -CVE-2014-9282,0,0,1d63a01b56a6d2d41feb195a00af27209151a4045ce99afd8534f6d7764d1384,2015-02-25T17:14:19.617000 -CVE-2014-9283,0,0,863d424c7175bbbace1fa1296a0abc03810c8690d521e8f938087f19b848cf00,2015-03-03T17:47:37.100000 +CVE-2014-9263,0,1,dbb6a1bceea854ee9d9ce461f1863808049f4ceb40f59aeab92cd47308db7975,2024-11-21T02:20:30.173000 +CVE-2014-9264,0,1,30cb096a0635efd531e11957ab40b343eddfaa532cbe883a635b2e82c2b12808,2024-11-21T02:20:30.323000 +CVE-2014-9265,0,1,fae3f25723bfe5b10cf640732475e1e4c0a3dd5f9c1b7011eedd1751e4bb951a,2024-11-21T02:20:30.467000 +CVE-2014-9266,0,1,63c7491e866dee1c7220a7682fbad83f22ebbb0b1a279259e71f5c7b37bb0131,2024-11-21T02:20:30.603000 +CVE-2014-9267,0,1,d302e57c16375845e7c00851e7589c678bfb32832298e5e5322fa78eb3caca75,2024-11-21T02:20:30.740000 +CVE-2014-9268,0,1,cedd6e8ad561e2a06d02baef34c435926b53346107dbffadee6a187d76b51c21,2024-11-21T02:20:30.887000 +CVE-2014-9269,0,1,627bfc9d4aba4e6c336894968fe11929cd1c718837d384f89dd2dc25423e8d90,2024-11-21T02:20:31.033000 +CVE-2014-9270,0,1,9415bd8a16144dab130bb21aa8de75b84a57a7acd1138202b787c4d64546177d,2024-11-21T02:20:31.207000 +CVE-2014-9271,0,1,e39eac149f043fdcdecd5f4bb998d7f96caebfb606b381f14fee72f7c9e411b5,2024-11-21T02:20:31.370000 +CVE-2014-9272,0,1,a0f30661cd8d791b5dad8fefcd14d90427647f27b038b4548024ee067c170850,2024-11-21T02:20:31.550000 +CVE-2014-9273,0,1,6a75da6edc0fafabd9e2c6ccc0514d2515f14cc9a979ecd016b84a6dc0138c99,2024-11-21T02:20:31.717000 +CVE-2014-9274,0,1,431ae3f6bbcf34a115c71bd274c442a3aab8c5ca992ed59bf7baefc6efd7ac31,2024-11-21T02:20:31.863000 +CVE-2014-9275,0,1,c6dcc152756c157a4cfa84e2443f2e25334c80405675307e440108a563e145af,2024-11-21T02:20:32.023000 +CVE-2014-9276,0,1,1c15d9a388df6cdb62de2e1c328dee3279352f3d9658bf743147f8da794053a6,2024-11-21T02:20:32.200000 +CVE-2014-9277,0,1,015513f7d57987736906f44aff5897734173db17888e700af718385f4113d401,2024-11-21T02:20:32.380000 +CVE-2014-9278,0,1,3d1223091a926066d882c9ce3573dfab2da0f4514a9b006439d105d3ea2fef87,2024-11-21T02:20:32.547000 +CVE-2014-9279,0,1,931e913cfe72187253282af1e26854a7ffe293b76f4261e8b3a58baeca71a5e7,2024-11-21T02:20:32.707000 +CVE-2014-9280,0,1,9621be2c464bbf060883a4048dd1c6226a7640845fc343449af4ee4c8d1700fb,2024-11-21T02:20:32.980000 +CVE-2014-9281,0,1,2122d794dff7266c75e03cbe5f33d57ffc5adb996e641ff86ee056c9aad538b5,2024-11-21T02:20:33.160000 +CVE-2014-9282,0,1,37e0a1a3628b79f829560bf3ef49c0db36464ba714ddf142488118715d2d29f6,2024-11-21T02:20:33.320000 +CVE-2014-9283,0,1,5e941b1abc2892531382261fe5d6f0eb3a8087893424216d8b48c7a340942237,2024-11-21T02:20:33.450000 CVE-2014-9284,0,0,33a4d445ebbe22166c5a256f5bd547f392141644ea8390a5b74141fc70be886f,2015-06-16T15:59:44.057000 CVE-2014-9285,0,0,fd421a5ad6a19327fe6e947745b840f02fc78f9670041227a4f30bf8a50c7985,2023-11-07T02:23:01.750000 CVE-2014-9286,0,0,bf18bec6bbc1ab5b6078e7968950ab6c98f1249a72fa103d5f0f00dbed115a09,2023-11-07T02:23:01.997000 @@ -72823,273 +72823,273 @@ CVE-2014-9288,0,0,963c0b8453022b2a2da82c7f4c747078cf0f41e9b23eabed66ea2a2fdcafe1 CVE-2014-9289,0,0,0a7dd7324cf24ad486269ce8658fc1648a50e687e0a23f566c46ed574058d3a4,2023-11-07T02:23:02.717000 CVE-2014-9290,0,0,5206796f5766c782589e9c8790e79a364e8d726aee9a14128d0367558047f87e,2023-11-07T02:23:02.960000 CVE-2014-9291,0,0,305ec9e214a6eb787604c2546ed07874fb0fbbe3b324ba9e2d80d24739c8aa57,2023-11-07T02:23:03.187000 -CVE-2014-9292,0,0,a64b5096a32456b6b07a072e84d36a1ecd74c15e5a2bb4406e601ea934e05b29,2014-12-08T18:51:32.607000 -CVE-2014-9293,0,0,da6bcf4c0480e9c14c35868b5c9e437b6f2b0dd350f46d80d4df0d2212811a7b,2021-11-17T22:15:37.470000 -CVE-2014-9294,0,0,4aea518575308b5fc2678adff6443dfb5ce82e5e73c7d073c851aeaa76c9b863,2021-11-17T22:15:38.177000 -CVE-2014-9295,0,0,3a92c36b9c431e4ce5f90f4447e2f558d529b4928ef1cf9dd961a6ee53942c4f,2021-11-17T22:15:38.877000 -CVE-2014-9296,0,0,1be46e1f532bc28b6f30213b8517fa8ac55eff33c9d603987af50c6791cf0524,2021-11-17T22:15:39.130000 +CVE-2014-9292,0,1,44f9c0e8fdc952fb11693d9b7d29a4e79c9eae450410848d1c469c930e6d271f,2024-11-21T02:20:33.793000 +CVE-2014-9293,0,1,afd6d98a62c070ddee99c8ea035ca88dd6963cbe33467b5138dbffdc718858b5,2024-11-21T02:20:33.933000 +CVE-2014-9294,0,1,e610f513e230daf0fd1674f3f25db9fdcb08fa3a51edc1deeb9949913ec2a177,2024-11-21T02:20:34.133000 +CVE-2014-9295,0,1,7ebc6528afe18b1e0393274d7985027292814a8927c18fa3531f823c1215d52c,2024-11-21T02:20:34.317000 +CVE-2014-9296,0,1,028ad60b2720571ed4ed4db9c02cf6ef376d6ba5bc0a9482ea903ab2c0e4319d,2024-11-21T02:20:34.507000 CVE-2014-9297,0,0,33271685de836c8863c34c9d03713c8be1c3bf1afd95ea1f91620df8b764c167,2023-11-07T02:23:03.483000 CVE-2014-9298,0,0,aa5e4a5da3eb8838db8d961225aa657a9e5a3fb879304b28d42bee347d15bdc6,2023-11-07T02:23:03.520000 CVE-2014-9299,0,0,64201b6ed4142e0a2723d50fb2197ea047e0657d0e272f23b2ef1e403bf2859f,2023-11-07T02:23:03.547000 -CVE-2014-9300,0,0,d252a27cde1f9330d417ebeabd89230b890c49792e0f305764cecd1176202ada,2015-02-17T15:51:22.690000 -CVE-2014-9301,0,0,dd82c5cfe927d76b431a3cf7fa2c095af4d604a529c7b185b315a61c5ab28eb9,2015-02-17T15:29:28.307000 -CVE-2014-9302,0,0,c1b35554ceacf7b3f9fb24cb501b8a08691c084850a408fa7cdf8c5d01f090b5,2014-12-09T20:06:35.503000 -CVE-2014-9303,0,0,bc7a9f50282b09558b6a652415dbb6d4fc3823d679fe981d441e8628831df733,2018-10-09T19:55:02.200000 -CVE-2014-9304,0,0,37295982ca944abfece8e2892f1ba916ca44d197cdfb5aa2d1919b5c2d27d600,2021-12-10T16:58:44.180000 -CVE-2014-9305,0,0,b360b4ebe9e4c61c5b1735a7b158f2cec221358116172a41d834ef846d0f4a88,2014-12-09T18:21:00.867000 -CVE-2014-9308,0,0,a86bfa3b1ac80cc58b7cd42d9ba883e642a59e614fe010a6c676923afd3c93fd,2015-01-16T16:29:21.680000 +CVE-2014-9300,0,1,876d80ca6193af6686eee5417b74606d0e62c9cc0556fcd27c63f23e3cd93681,2024-11-21T02:20:34.757000 +CVE-2014-9301,0,1,22be8b7f81c2169a3140a1b7fa8235d56418d3e54a85104671b0ebd5ed1560a0,2024-11-21T02:20:34.910000 +CVE-2014-9302,0,1,ed055e104fddafe94e18056add67d5581d79e8efc5ae62d3da590e9cf0a51cef,2024-11-21T02:20:35.087000 +CVE-2014-9303,0,1,ca6fd95d202dedb416a7962272ac7b3bcb02772d60b1aaa9be7326a4e81de684,2024-11-21T02:20:35.247000 +CVE-2014-9304,0,1,896d98e2e2d5a022912cb8c7fd42f1e94ffba457800c72f7dd8b5c9bb7997277,2024-11-21T02:20:35.410000 +CVE-2014-9305,0,1,a47d39ea48b7b9fc33b8de207e490892da70742877b55dde440511059a5755d9,2024-11-21T02:20:35.577000 +CVE-2014-9308,0,1,276345cfd20a05f9d2683a77b16b00f580c3da5bddf101273cfe3ebece91056a,2024-11-21T02:20:35.733000 CVE-2014-9310,0,0,245ebb0a877be771526472ce70bf61dda929601ffa7f0b69c97302f1fa1960f7,2017-06-12T21:48:14.467000 -CVE-2014-9311,0,0,2dad81bcda91796dfa4aafe711d8962b8b8cf183023859f8808f6e9d9a954112,2015-04-15T15:15:13.267000 +CVE-2014-9311,0,1,d9d6f717c82f275de0b0cddf108c7316ee00b6014a0dfb55254e67abeba1c5bc,2024-11-21T02:20:36.070000 CVE-2014-9312,0,0,04e18ca274a3bf93fe498616d0ee2086653567f2844c8079e995d41ffbe00bb5,2019-07-08T16:23:31.677000 -CVE-2014-9316,0,0,2fa558903e112fc2a6662bf0e434e382a850b27584e86ed6e1002c7df167e3e9,2023-11-07T02:23:03.690000 -CVE-2014-9317,0,0,2ff54b7d36b90cef8476e9b0ada6de9f6a1b2f8fba8eaea79e04db1688571e01,2023-11-07T02:23:03.743000 -CVE-2014-9318,0,0,bb93a01acae51f63f67a57e1ee5ccac4dde09ed69c64e99536d80e5db3327c86,2023-11-07T02:23:03.820000 -CVE-2014-9319,0,0,507fad6c26da1d8056a36707b6d75593b9c776dd0e23f09dd7f9f03a71c9dc53,2023-11-07T02:23:03.913000 +CVE-2014-9316,0,1,3fc6849d99e26c67cb663600ffb784bf1b241e977c196e6a8ece107a506ec5a3,2024-11-21T02:20:36.387000 +CVE-2014-9317,0,1,e8e5fbbe004f1b707aa8a7d23db72f3ab057bfd78e39ed2de8542ae5beff2de6,2024-11-21T02:20:36.540000 +CVE-2014-9318,0,1,ee7c82fbc1d1faeead6604641d102bb90da3e3bff3cc0ebc51a072b6ff160439,2024-11-21T02:20:36.700000 +CVE-2014-9319,0,1,396d7ec100f7ef475c18e2ed592cc3885fd63eceebfb53e9bcf05111c7071937,2024-11-21T02:20:36.850000 CVE-2014-9320,0,0,531d9c093ecc8420e4f75c31513918272c28bd5a3d3b3ef263afab764ba1d5fd,2021-08-17T15:52:28.390000 -CVE-2014-9322,0,0,0d2e63c20a5a5582a161c3fd370df70582b7f7253da97a05aa61db9c1f4f7465,2023-11-07T02:23:04.003000 -CVE-2014-9323,0,0,c3805af3873c8423c51d118085e5361d60ed8ef0c9664f8dbb0ebfdb02f67675,2021-03-05T15:23:15.653000 -CVE-2014-9324,0,0,3c1f514c87e05af562819c8d2473b6a264d2a0d594da251b4c3dc9313da6dfdb,2017-01-03T02:59:23.970000 -CVE-2014-9325,0,0,2e7bdee5beea581128f1d299bfd86eaf9d200fe36ecab9fb76e359c27e081539,2015-01-03T01:29:25.627000 -CVE-2014-9326,0,0,fa300fd9531322c1cac98bccd97fac6ab0152ed435c496a26a2de164f0c8db6f,2017-01-03T02:59:24.050000 -CVE-2014-9328,0,0,8fc691946449c34805b6fdb8531711df9e4fc728c239338c8ffb62140efe2c00,2017-01-03T02:59:24.127000 -CVE-2014-9330,0,0,eb83394f324155000365e4bdd45bd9990a126accee7cc0d45811b7e9a25a4418,2018-01-05T02:29:55.133000 -CVE-2014-9331,0,0,cef4bde971af315e8ce3f3d62a84dd347e5a3a1406a538c855b3a6e1d4a3f6d8,2018-10-09T19:55:02.433000 -CVE-2014-9334,0,0,846b3f43ea8917a59d2a9cb527aea73b50237a9110992ccb40cb7db803dd4a99,2017-09-08T01:29:33.387000 -CVE-2014-9335,0,0,faa7a28d0d6cfd0e20d960b2de79e6b04ae83ba34862507a337001a0b1081815,2017-09-08T01:29:33.450000 -CVE-2014-9336,0,0,a2c92358d3ae826998bdac3b9129bf28b0e38d7f768a35e281728c14a32523e0,2014-12-22T12:45:49.147000 -CVE-2014-9337,0,0,bd9152ff83eb51ddf20be600ea6113c477dbfacb64484b39de52578f504abe75,2014-12-22T12:47:41.733000 -CVE-2014-9338,0,0,bf24e525ea6c11b77e45d1ddac80710dc49c276f4fe7eb6eef50d1563d28bee4,2014-12-22T12:48:08.217000 -CVE-2014-9339,0,0,c5c739f862e0239550ed6fb49d8b3e435e6b0c4990861bbef5741e501e8db465,2014-12-22T12:48:58.110000 -CVE-2014-9340,0,0,9f14a6287e3d28dcca838498c17d9ebc6ddf86760292c8780a5c57c6851ab624,2014-12-22T12:49:24.833000 -CVE-2014-9341,0,0,88ce05fa7bc13afa0d789d4d32990892f6044406404581f254053cc3c0e652f5,2014-12-22T12:49:52.007000 -CVE-2014-9342,0,0,07e725b66c0702bc6c029f337b1625813a69d6d64fdb661bf7a270e1d1cc273c,2021-05-03T11:15:07.657000 -CVE-2014-9343,0,0,8ef8dc4ab1d35dbde2372aa99c3f31d7ff16b2312bb69943b272c95b024284fd,2017-09-08T01:29:33.513000 -CVE-2014-9344,0,0,ed246ffe06b571c5f451e85d582e25c962edf68e2e44f56395cabe5b7a34716b,2017-09-08T01:29:33.560000 -CVE-2014-9345,0,0,5f04c432cf94114828ba366d64fee1bcb68ef2b703aec694384cbfd2873c249e,2014-12-09T21:49:10.090000 -CVE-2014-9346,0,0,057b484562676601b8ece47258b5bbab7acc71c3a78c56c39479956249447efe,2019-06-26T17:43:55.300000 -CVE-2014-9347,0,0,11efa875f61bb647897b1e1cd3ece85a25361f75f11935eefb7936b6f25a2daa,2017-09-08T01:29:33.667000 -CVE-2014-9348,0,0,e0f28326c55772b93f33a35c0488061e2f107493c5955c8800c337764d333ca2,2017-09-08T01:29:33.717000 -CVE-2014-9349,0,0,6a7866914ace917b9574fe8b72f3132aba53718f6d383a754fa0ed9685910daa,2017-09-08T01:29:33.763000 -CVE-2014-9350,0,0,00f33eea5a241bf7abf5a5d918e92da0f5f7222fd20d74c5d0894532a4ef7523,2017-09-08T01:29:33.827000 -CVE-2014-9351,0,0,00416af6faa34ca1cfe2ee429579693fcb4291140cdf15de2acaf1a2f88d3ea5,2014-12-10T16:56:45.950000 -CVE-2014-9352,0,0,20e2a650d51f3ecbaba936ccafab2b28ae21aaecc0405c13f1a883ede5589f84,2018-10-09T19:55:02.903000 -CVE-2014-9353,0,0,689496d5025d921f3d34debaa143a40ccadbd55750b8dd73e340cc466bd3b432,2015-02-06T16:06:56.100000 -CVE-2014-9354,0,0,0648bb045caf7afb6914da2d7b9b31cff9b58429a05cd914435c3ab8a4ca1502,2015-02-09T14:04:24.070000 -CVE-2014-9355,0,0,6d57dd0875ab30abf71d5a63ccaef144c6ed36d8f303930eacb17ad05dfe27e3,2019-07-10T18:03:02.750000 +CVE-2014-9322,0,1,1d544cf9c83326bf14655036177779eaba223ffb85974c033ffa3f6b49c8e55a,2024-11-21T02:20:37.153000 +CVE-2014-9323,0,1,13b65093680854ceecad87286bec8be37cfe8db493388020583fb08244261ec8,2024-11-21T02:20:37.347000 +CVE-2014-9324,0,1,352da1e55b6b289852d6106e81296c43f85b0d5e90308dc97b2c8312ad88ffb6,2024-11-21T02:20:37.503000 +CVE-2014-9325,0,1,dae6f2df2020f6f42dc39d05f2b77838f8992ad0cdf6b1720aa59d645523788e,2024-11-21T02:20:37.650000 +CVE-2014-9326,0,1,86d2d8fe098075c563f3aae9751dbac694a61f028da6d9980b2d1d498cc88ab9,2024-11-21T02:20:37.797000 +CVE-2014-9328,0,1,1f5af3ba4cbf9bf1b81705b99422da26d813e935a6fbd5fe654b06a94be50d65,2024-11-21T02:20:37.940000 +CVE-2014-9330,0,1,40a57fd1c3128d6b102d8ea0b237970491feeb9c752f49406f422c4fc7be65c6,2024-11-21T02:20:38.093000 +CVE-2014-9331,0,1,e5f683d39a0b385a345fa90c3cf765773374ccbb23f74dfc786fea0478afc526,2024-11-21T02:20:38.253000 +CVE-2014-9334,0,1,3a75c84e2cafefa09bd829b30cea964ae2a9323bde87bba878408fc93674aa08,2024-11-21T02:20:38.400000 +CVE-2014-9335,0,1,19a836517c51f9b4bdbcdc62f5ac8b489df415b81572f0938498989bd880f72a,2024-11-21T02:20:38.537000 +CVE-2014-9336,0,1,e2ad6aba25a93688b22bbb786ad3e9b6bd6f2059ca27b483fb965d0f63d1949d,2024-11-21T02:20:38.670000 +CVE-2014-9337,0,1,95ab67d7fc33cef6aa3e222ffec9231b83231155edc2d8b186e450f18a826a9f,2024-11-21T02:20:38.807000 +CVE-2014-9338,0,1,4d7a42e2d423ad6ea1f2aa509cf9882867b84b9fa627e4df0859346e99ac344b,2024-11-21T02:20:38.970000 +CVE-2014-9339,0,1,f0dedb87ef7e4fe6374ff337d05b5ec27afbb3e5002680932d7954b8eaa1639d,2024-11-21T02:20:39.120000 +CVE-2014-9340,0,1,dba07fbb6ee77a96dfc82bf4fcdeb0a9ba1f35bd13c48682624e55d42e02886c,2024-11-21T02:20:39.257000 +CVE-2014-9341,0,1,17b20a241b3937da472548a62734f7c198b5c763502354fb3f11f435a160417f,2024-11-21T02:20:39.400000 +CVE-2014-9342,0,1,9bc9eb00292effe37a66c080289743efc787cba8e3e83864874194a3738ca53e,2024-11-21T02:20:39.537000 +CVE-2014-9343,0,1,d450c7c1667b7f24a81fe1b0cfc16123e10eb435c52a0afc339681c8842b508b,2024-11-21T02:20:39.690000 +CVE-2014-9344,0,1,82e0fdea02297fc63e329fc54f4b2905fa52708547cb8a45de31486da48ebfb3,2024-11-21T02:20:39.867000 +CVE-2014-9345,0,1,c03cb1f55bfce644114247686f61b2c374638f98655d18cafeeef5bed32c9c2e,2024-11-21T02:20:40.027000 +CVE-2014-9346,0,1,c312a9e5dca07d09ec23a613cd27f9797862b2a06cbe0a39ffd2b7e3a32d1365,2024-11-21T02:20:40.177000 +CVE-2014-9347,0,1,0acf49e1b8346e0b2af08dc9a537626b5972c74a0d7c70b146751c0e574bb1d0,2024-11-21T02:20:40.327000 +CVE-2014-9348,0,1,c9d3fa0ac9fd159aaed5a61da796fa61b303c332d9219e05a06fce07f156cd19,2024-11-21T02:20:40.470000 +CVE-2014-9349,0,1,1d718e115eec743b33bacd9910811ca0a480d268607bd4e14a351d8d9d7bd89e,2024-11-21T02:20:40.613000 +CVE-2014-9350,0,1,ffceb9af90bee32a80c9222b6e00bceceb61e7e632e83202c0410066a24fb188,2024-11-21T02:20:40.760000 +CVE-2014-9351,0,1,901aaea70e4e30b84378a87f535761c7f5b61676b146608d2a7bacecc547e476,2024-11-21T02:20:40.913000 +CVE-2014-9352,0,1,c5f6a84c62122b94b19d22391b6305aeb22209302aaac7e706d07637ebadd777,2024-11-21T02:20:41.073000 +CVE-2014-9353,0,1,189b42aa205194092186209915d8353b0c59828f2e9264fe5f40de9d91e2e8d9,2024-11-21T02:20:41.217000 +CVE-2014-9354,0,1,9220cd0208cae6fad03752c4324211e5d4031d9ebed2de904cae32a0bac1ddc7,2024-11-21T02:20:41.363000 +CVE-2014-9355,0,1,a41b5d6bcab8888a70b5e4a19ef2415e7f7f30c4a2b88211a06497bbd17066b1,2024-11-21T02:20:41.507000 CVE-2014-9356,0,0,69a66399aec88ca0770e43d716171e645a66c73ab96ad8a151cb436941dd5a95,2019-12-11T20:30:20.937000 -CVE-2014-9357,0,0,87a3651260f72f09644e2a7b348b006b98184e421debdce89330672ae25d46ce,2023-11-07T02:23:04.363000 -CVE-2014-9358,0,0,33140c4fd26ce1d6e21da19c64e8f7f845393db81cf99c24b5ed0f4a43e4acaa,2023-11-07T02:23:04.413000 -CVE-2014-9360,0,0,564f8a608a446487d99560576ab03dba0c8acfcd0c5e68b954e696150a22d6f7,2018-10-09T19:55:03.543000 -CVE-2014-9361,0,0,90a3fad8cd3186f57a1dcaa3379784bf47b73ba4f50463113881d1c94882466a,2014-12-11T13:49:30.813000 -CVE-2014-9362,0,0,a0c19e49bb301ef851ab81a6f86d39edb33fdf079ac02ba700671531b7ab0904,2014-12-11T18:56:30.747000 -CVE-2014-9363,0,0,21e2fd80ff964b1f6158d5e22fc5744378727dfedeca13f3fd82ee3b25c34d28,2014-12-11T17:34:46.403000 -CVE-2014-9364,0,0,983f142a742c1f212bbf691c87eb6ae00dee8a8182811570dc826bed70ffa72b,2014-12-11T17:36:33.220000 -CVE-2014-9365,0,0,f0102267176b1f1390cef4bfe70d27a8e3c625d12d2fc22e6336d9efdbd4a21b,2019-10-25T11:53:59.117000 -CVE-2014-9367,0,0,1b8f38f6d2af03c0130ebd30984a8fa4c16b84f8a004aee4aa2da032e7684e95,2015-01-03T01:28:02.843000 -CVE-2014-9368,0,0,7e5ac803f0b502c19b0476db0c1dd816cc37fe9af6036aff2f2e688b2b554fcc,2014-12-22T12:50:14.757000 -CVE-2014-9369,0,0,6a24330acb04ad79a7eda59b05cafe80c38921bcca5facae10b32b1826865b93,2015-03-09T15:09:42.213000 -CVE-2014-9371,0,0,632e17665ebcce231853fe26a87052e7719e15f0497a6040fd26021653507bef,2015-03-07T03:30:36.313000 -CVE-2014-9372,0,0,d929bfc58d90a03bae82d4d0398253cc372c3030cf8132a5256a057762ed16d5,2015-02-17T15:16:10.733000 -CVE-2014-9373,0,0,a28fc75d7aa8edaa83bdc5ada4756a054c46e0d68108bbc4602db3a1118a1b51,2014-12-17T19:50:34.187000 -CVE-2014-9374,0,0,8e80bab06284db8225ca6dce99b067dfae22df0e19d027a315106d2c98c2f140,2018-10-09T19:55:03.777000 -CVE-2014-9375,0,0,e4ff1c58ba7a7c5c81728db726e2e390ca34be4c0ccf7e5650c72fe85b6dd519,2015-02-17T20:16:18.947000 -CVE-2014-9376,0,0,5f00ff67d479536249a3bad2974eab1c4a35edce4e869e1f4e178db8dcbaeca4,2020-02-26T13:35:55.470000 -CVE-2014-9377,0,0,96da2b8545f1bb5c13aae0c6a57f444d826566447ffa8eecea4e0e926597bb57,2020-02-26T13:35:55.470000 -CVE-2014-9378,0,0,ca62c7ed02458598d99be0869195e2a818dd2b513753ff22365e9f1829fee247,2020-02-26T13:35:55.470000 -CVE-2014-9379,0,0,ebdca751146ba9d657a5692fa9ef6c4dd35eb5259c044276ded57da5a0931d0c,2020-02-26T13:35:55.470000 -CVE-2014-9380,0,0,dc7e50d03867234d1a333809aa403715374b001a68e9762a86fcd1554bd8f129,2020-02-26T13:35:55.470000 -CVE-2014-9381,0,0,0fa4a4c2f88ee011c5c90fe5e148e7cac5fb8fdfff3c820137d5c6c2e4ba1821,2020-02-26T13:35:55.470000 +CVE-2014-9357,0,1,7e479611c5922ffd6dc6c055f2a8ed0b6507eb7f263e65b5a523a38c6a9b2dfb,2024-11-21T02:20:41.767000 +CVE-2014-9358,0,1,de106d59e40b37a3aa559b873b81307936417fc4c4348c2c99e4d5fc76b0fcc4,2024-11-21T02:20:41.893000 +CVE-2014-9360,0,1,d27495f01b53027d006301519dfebeedc6d3fd5122b3bdf4179d490aec3f1b6a,2024-11-21T02:20:42.030000 +CVE-2014-9361,0,1,c1128fe51c6e7b104a1bed4ecf92e92d25ad040e78efb0fdcb5c83cb651a197e,2024-11-21T02:20:42.163000 +CVE-2014-9362,0,1,2821e65c9719e8effa140fec5893931425cb94debd1314634a3b1a668fd5a2fd,2024-11-21T02:20:42.310000 +CVE-2014-9363,0,1,9f99aa0f1350cf5c15be53fad9a46559c6da190a9834710938e950eb79103902,2024-11-21T02:20:42.440000 +CVE-2014-9364,0,1,2cf4464e347426151895ee20f06e205898bec0484f69be6de056185dbe064371,2024-11-21T02:20:42.567000 +CVE-2014-9365,0,1,221a49d7b9ab5db8413e711f217ab7baad65530ecfc0b129cd946a847e1d3081,2024-11-21T02:20:42.697000 +CVE-2014-9367,0,1,07e75bdd081b81963d36eb8cdc8700ace107feba5ab8f833c9e161fd59680269,2024-11-21T02:20:42.873000 +CVE-2014-9368,0,1,549d9d043df3061b227977ba3b8e8b2ed264fe39c1960b544650074dd2a82d9a,2024-11-21T02:20:43.030000 +CVE-2014-9369,0,1,1091fead64a8d7e746a9b734d49171a485fd7c651becf2075936a8eced22d3a6,2024-11-21T02:20:43.157000 +CVE-2014-9371,0,1,e5b34d7804c536b5674e48b0d279317bfdb93b059560b44ce6dbd727ac4880ac,2024-11-21T02:20:43.293000 +CVE-2014-9372,0,1,659c7a3f2574ae36b41e42d69ecc6a6cfe8dd52e5918a4bf7b03ddc8b511b42c,2024-11-21T02:20:43.423000 +CVE-2014-9373,0,1,7f67c13bb29fc4de3f204ebc353dd8614dc90f5b273a5794a55b7ac3442eb52f,2024-11-21T02:20:43.557000 +CVE-2014-9374,0,1,cf0dba146bbbaf8552c385a0bf905e05f10510e6626c810e34bf8ff3afb9f452,2024-11-21T02:20:43.697000 +CVE-2014-9375,0,1,50f66aef6b8cf5b06dd4e3aca659f0279a97078e1aa215c84b1977b55597d5f1,2024-11-21T02:20:43.860000 +CVE-2014-9376,0,1,3402d7f4f911aabfc25b170a282835c07ad552447c47c809725f3111cb1a894b,2024-11-21T02:20:43.997000 +CVE-2014-9377,0,1,c43a2b23182e2d3e04da8a27d52ea4864d1785be98eba9d492552e4ad4638f63,2024-11-21T02:20:44.140000 +CVE-2014-9378,0,1,feb729100c4049ee494fb80fe78e6acc0196886d9f3819fc0e89d4353953fc26,2024-11-21T02:20:44.277000 +CVE-2014-9379,0,1,00ecc4d5f598473d240840c36ef52dccd1db5f7ee2561243bf45bebbab07f4dc,2024-11-21T02:20:44.410000 +CVE-2014-9380,0,1,b4d907f953a9f8c75d0cf5f43eaaf2819e42c6ed4a3ab10d2d4db2676a141902,2024-11-21T02:20:44.543000 +CVE-2014-9381,0,1,6d6fdb4577a28026abb25afd18d4e88f0c22190d3f4169da5eef0028aa78406f,2024-11-21T02:20:44.683000 CVE-2014-9382,0,0,b7766f35fd55004c38bf49615896a5a27fe8b2e74084bce3cc0066e3a092a222,2020-01-23T13:23:29 -CVE-2014-9385,0,0,4fe78dcd7fb3ff31c6a9d63979c0df79fb6f96c568a8d57e1bd13b0a290ce40c,2016-03-21T16:15:50.807000 -CVE-2014-9386,0,0,b64c8efa6c1e3c9915f8d3ff2be9e71ab543145e778ab968dfce0f8bf2ccee7c,2016-03-21T16:17:15.147000 -CVE-2014-9387,0,0,c683f39c513b5668823653f7bd71f6d06c59137794ebc37aa64c52c1f8414492,2018-10-09T19:55:06.917000 -CVE-2014-9388,0,0,1901452d53a2d402904339e88a3f7c6bafacb29eb2eaefc39e756f56ce8cd024,2017-01-03T02:59:24.173000 -CVE-2014-9389,0,0,ef983d051c086bd229c712e6651ab494e408b0593a3358e70f904bc8d0af44e8,2015-01-06T16:46:57.693000 +CVE-2014-9385,0,1,6055d4c1daa4deb48b7e9d2d635ef6b929b7217d0f6f8cbe8b332d7c793855e7,2024-11-21T02:20:44.987000 +CVE-2014-9386,0,1,9f312ef5a58cfe5bd57442ef6421a6cffb400b16a6767157a33be6ae9bb3544a,2024-11-21T02:20:45.100000 +CVE-2014-9387,0,1,13b94e54cd4d2fe6286fc4125996067d43e73991a85f26c7b54aca613a41b1c9,2024-11-21T02:20:45.217000 +CVE-2014-9388,0,1,8e1939f7d3a50a55aa09dd780be309a6bc83a6b26dfb5688ec940ae24b434c3e,2024-11-21T02:20:45.370000 +CVE-2014-9389,0,1,fa6bbaa66450b5083f5c7a9f407f66f10f7d0d7170352a27fd1ff602d5d92275,2024-11-21T02:20:45.520000 CVE-2014-9390,0,0,f9d39a64ef120332036e59c41ffb0f6d2eb76b30dca4967c60e6118eb65d5276,2021-05-17T19:54:37.887000 -CVE-2014-9391,0,0,93d8ba26350ecd093d5d9c69f2467c714b94b8421136162c5be8600dadf06da8,2015-01-03T01:26:35.437000 -CVE-2014-9392,0,0,e74cf81e52d25866d170aad736d45dcf25a989f5d59291f05498f39019c0976f,2015-01-03T01:24:29.157000 -CVE-2014-9393,0,0,aa0366cfe3a9efe048aede1776e142531d82f9a491814619031a1c08ed9f7196,2017-09-08T01:29:33.870000 -CVE-2014-9394,0,0,3aecc72ab2776c6308eef79e111c9f2ee9fb1bcb2b6fdf65f424cbdcb893a716,2017-09-08T01:29:33.933000 -CVE-2014-9395,0,0,467c6b286bea21110708292cd36cfe9c7203595e1d66d158f2067c748ee3cc6b,2015-01-03T01:22:54.327000 -CVE-2014-9396,0,0,1f0b08f44c99e2b716e6f033771e7bacf3955e54ca348fd8d572e8c3562c9a8a,2017-09-08T01:29:33.980000 -CVE-2014-9397,0,0,2ef67aec8fbe7c1ebd5c182a225bf7fe38bb788202bbc28f141bcbb984875d6e,2017-09-08T01:29:34.043000 -CVE-2014-9398,0,0,389e8100b59c8ac299f161dbb331e81c79ac432e70d303c0e18b02b143fa63cc,2015-01-03T01:18:29.870000 -CVE-2014-9399,0,0,8d043ace6bf2e9c413f45500cbbaff27376e4d298e051abd7315e76ce7c37b7e,2015-01-03T01:17:54.247000 -CVE-2014-9400,0,0,4330a1216c7b9715939b2610ef6ae1e833ce5dca92dfe35cf48b6ab995077fa2,2017-09-08T01:29:34.090000 -CVE-2014-9401,0,0,12c28e20af82191ca90c229b8f530ce8f49702273fb214a2fc1f03cd889c4349,2017-09-08T01:29:34.137000 -CVE-2014-9402,0,0,90a7f3a86dd0243a05ac08f26e7660b1a2080a6fca7143a638e3bdc76324d676,2023-02-13T00:45:18.867000 -CVE-2014-9403,0,0,e6645919644f8d32d79b6adcff25d9d0c788867616478ccf26afd1bf4d4e0dc5,2015-09-29T00:31:41.397000 +CVE-2014-9391,0,1,30da3e15b72473259a2f84773685ea4801f6f80c51ddba87989888b1d8dab278,2024-11-21T02:20:45.840000 +CVE-2014-9392,0,1,0124f041588f53b5ac8c2dfabf28c0f61a4927d0f5eef11a8f607f9784c1b829,2024-11-21T02:20:45.980000 +CVE-2014-9393,0,1,1465c9f51d5c2c9db99a9b5cc06e0f12c6217ff90df4e67734f7c2e314b75c3c,2024-11-21T02:20:46.120000 +CVE-2014-9394,0,1,5f3eaaba5795b5c3ab48a7bafa1a93b851ebfdb42e0827fa804e04a5daffa5bc,2024-11-21T02:20:46.267000 +CVE-2014-9395,0,1,e18867b323ebce5efdb13bd447828a5c2b33a06fccb70b091f84f2a84c0be224,2024-11-21T02:20:46.417000 +CVE-2014-9396,0,1,8913056c32e1861fdb08b9a5308d97dbaf5ae78aefd07a4e030824ccfcf49e9e,2024-11-21T02:20:46.573000 +CVE-2014-9397,0,1,f4792a7e29626a0c0884842243b5956648d14265e3ea5eac4654c31bec7e0dd0,2024-11-21T02:20:46.720000 +CVE-2014-9398,0,1,f1981706e8a352df91d9297c550400d93353f4cea6cc36b21320c1875dc52ffb,2024-11-21T02:20:46.860000 +CVE-2014-9399,0,1,08f5320c1ce27628d3e10c1ad767b35140cdc9fc91afa565272f40e1235168b4,2024-11-21T02:20:47.010000 +CVE-2014-9400,0,1,c61245eecc95d14173bc5386717de772ee4023612ba7fe5c20df7ea811447d94,2024-11-21T02:20:47.150000 +CVE-2014-9401,0,1,b709f5e2b9d02c80886f742695bcb1581ae5d351eb43ee574c698acd0098f22b,2024-11-21T02:20:47.293000 +CVE-2014-9402,0,1,faba391a535bf54ed082d89a04e7c39708dea30656c522746e68375c60bec2e2,2024-11-21T02:20:47.440000 +CVE-2014-9403,0,1,cd7d028fa86c9d8b5af1c4952752334e8243d196aedcdd85650d61d20dae3559,2024-11-21T02:20:47.600000 CVE-2014-9404,0,0,b15027e3861d9b67da46e5b2d145085b5f9812ddc99dc18aa51f9d8b297b00b4,2023-11-07T02:23:04.750000 CVE-2014-9405,0,0,e81b3be4574af52c7bcc9f52aabf5e833fa04445728214d9da8df1cc4104b5fb,2020-01-13T19:11:40.310000 -CVE-2014-9406,0,0,757884b092bf678695ad482c64d901987305b8a9952de97662ce2eb469fd2c85,2014-12-18T19:44:31.070000 -CVE-2014-9407,0,0,fee1f5d3de9b169a886812adead7f430a6748b23dc40dbeae0e4abfece067efd,2014-12-19T19:15:58.717000 -CVE-2014-9408,0,0,9398d0d389b11bc3b26ba3f31b52fc856f6892951942222edeb62b291fa5e9a3,2018-10-09T19:55:07.153000 +CVE-2014-9406,0,1,7a2c8030c59718a80efbc94fc76a8a489790b2f6f94ff9287d65e618a83b768a,2024-11-21T02:20:47.927000 +CVE-2014-9407,0,1,d31a515c79e5e6a552c318336ce3e0d9608c9758e038fcafc87fb00e312be789,2024-11-21T02:20:48.073000 +CVE-2014-9408,0,1,a908fb59b442a71b70c15b289eccad596d4e73b84b22373607b7e5cc0df2eda2,2024-11-21T02:20:48.220000 CVE-2014-9410,0,0,5f2c2fc731f55ed73bd627634034749dc0b8b07b1afe475985abf90870b97f41,2020-11-17T14:15:11.103000 CVE-2014-9411,0,0,1cdd1b53c3ef3ddf7d18496f584d88c896e886f0a4ea5f4f5083d644feb10861,2017-08-23T13:40:56.513000 -CVE-2014-9412,0,0,0053ddb4dc6c2a8153b7c07cc7966ddfbce171bf387868d65eea575ed8bb40f9,2021-04-09T16:36:15.873000 -CVE-2014-9413,0,0,ce1d7977ba1240738bead42ea59632a0bbbaf47b10145ee854e9422db97a4180,2017-09-08T01:29:34.183000 -CVE-2014-9414,0,0,296bd75a758958eed4eb46b648adcd3e720f4700f844ca29d08355a1a9c7937b,2023-05-26T17:46:26.677000 -CVE-2014-9415,0,0,b12ada31d31dae389680b59bead2b574cd091294dc706423412728da6f9790f1,2019-05-20T17:29:00.313000 -CVE-2014-9416,0,0,077bf2b197a15bb334b6a2a66df6f48ea5896928e7884373f1b86eb8f69a158d,2019-05-20T17:29:00.423000 -CVE-2014-9417,0,0,90f4ad7924573e76b8ea41fece0d8be1a322e509197786355ff6a003c53b4eea,2019-05-20T17:29:00.500000 -CVE-2014-9418,0,0,ffba4dd687922cf21b541539d4020fae3c110c9068297ea2adb01a50cda92449,2019-05-20T17:29:00.563000 -CVE-2014-9419,0,0,f369d27a7265ec7c035a3f2555be64ec8c659504f0327241b13fe2cdbc212d3d,2023-11-07T02:23:04.887000 -CVE-2014-9420,0,0,2ca155c9cc8d08d5e64d669f58e426fb04c1abbaa2135130190c1542b4f773b3,2023-02-13T00:45:21.630000 -CVE-2014-9421,0,0,02e5d8f83c055137f61376a5adea5f0bf35118ed4d5631979729d1e9d79a7914,2020-01-21T15:46:57.183000 -CVE-2014-9422,0,0,27c8e7a0cf99a84ef981b8b2b672e59145d9cb55a8a19433f70fca6bfaa62123,2020-01-21T15:46:57.183000 -CVE-2014-9423,0,0,dbadccf52a483c15e53cbfc8cff4f8c35dff181abefb76aad09cc936bb620341,2020-01-21T15:46:57.183000 -CVE-2014-9424,0,0,55bdda0c39ccc1cb32dee00597a52f0dc9d40ef04ef47b61da3a378a5e610d68,2014-12-30T15:35:22.727000 -CVE-2014-9425,0,0,dccca6d22e6a40ca8c10cd53a77b3ca62bb27fbd6d878e5c45a7840efff9cab2,2023-11-07T02:23:05.040000 -CVE-2014-9426,0,0,9fbd66fb1971644fa8a55b6898eec7531f8e5c661bb3c377fa47ee5179065b3d,2024-10-29T15:35:02.883000 -CVE-2014-9427,0,0,cdf611994b2bbdb6383e0c3ae8d5b7d74beb486f34c9d704c2cf8812d341710e,2023-11-07T02:23:05.237000 -CVE-2014-9428,0,0,dab4fb56a8e7f25bde74bf56cfa79dff31b355fde3d82e45f5476f14c98784f0,2023-11-07T02:23:05.363000 -CVE-2014-9429,0,0,545088f5923f35de470761ad7721527bc41230312934d94b14622336a9798a18,2017-09-08T01:29:34.293000 -CVE-2014-9430,0,0,bea2aa7d990e47b342e4e1f69927431dfe3b0d1a237503b1bf1d55ba562aa410,2017-09-08T01:29:34.340000 -CVE-2014-9431,0,0,87bcc0307b4844d32e2d1ef8144a87311afb25af35ed5937e3c7f069e782c5cf,2017-09-08T01:29:34.403000 -CVE-2014-9432,0,0,b17eebfb2a3b04c1d949c856d18dd2ea841623fd569f59ab9cefe90373bc8c07,2018-10-09T19:55:08.043000 -CVE-2014-9433,0,0,10bc1ab4469c4b263442982e87acf6fc1c37d8090405381bba6ba9eb83b909e2,2018-10-09T19:55:08.560000 -CVE-2014-9434,0,0,5565b7d3173a0d9f78cef6edae2b161bd6910d0eb0c7fb00a72d886b8e02146d,2015-01-05T21:07:42.207000 -CVE-2014-9435,0,0,ace00b1ffdc975cca5eb3142cb343c5c750ed9e198fb7ddf42965122a3d4fe38,2015-01-05T21:08:23.817000 -CVE-2014-9436,0,0,232c9ef881ce9c0d2757b942f3daa439edb4bec2a611b7afc9fe3d027c057d93,2017-09-08T01:29:34.577000 -CVE-2014-9437,0,0,dcfcc19e31572d3f350ef4d2ce66c391aaed2d10c6a10e7f8adca1e7540ac90f,2017-09-08T01:29:34.637000 -CVE-2014-9438,0,0,e3f2dffadec91bda887cdf2dcb47571c0099fd91b562d9c71d23224a589b80ce,2017-09-08T01:29:34.683000 -CVE-2014-9439,0,0,362bb7f1672582d4abb216b06352768660c827d3d667c3dba3f3cad7bb3d7461,2017-09-08T01:29:34.747000 -CVE-2014-9440,0,0,cda3663ee9cca06ce7b1caa290d06d65ba9cb71c74be7ec607764abe60fb13e2,2017-09-08T01:29:34.810000 -CVE-2014-9441,0,0,77ac8db81eba5c2f6d571169de92c9e74538166034666339e65328ae36eb0c7c,2017-09-08T01:29:34.857000 -CVE-2014-9442,0,0,03b209c8bc4b3c62bde2c5442c8e6076b0a92d1e2d93dba265e1f650e2a36117,2015-01-05T21:15:49.747000 -CVE-2014-9443,0,0,96a118c1598e40f5be8891028e60897031a5d2e2089d91ca3f7c72277f64260f,2015-01-05T21:16:11.530000 -CVE-2014-9444,0,0,5510bf86b1ca2299b31513836f8eb6411ae6f5e49c115abb1d2e6e51a45c7628,2015-01-05T21:17:38.903000 -CVE-2014-9445,0,0,c979d09ab289939814eff98d96372c854b046a8779ddaee8b7b06d7cd4aed979,2017-09-08T01:29:34.917000 -CVE-2014-9446,0,0,d11f37161e963afa9cdc99870b0ea118bebee6aa57feeef9440de933982d1450,2015-01-06T03:00:39.297000 -CVE-2014-9447,0,0,90e9e7a596be66a2c1240934a46bc5829ccea2f2ab85c9c7e5ae4177ac040d9f,2015-04-18T01:59:42.700000 -CVE-2014-9448,0,0,3bb91de3e8db73d17fda666350f6bfd093edb3ec4249fa1454b19fbdc63561df,2015-01-06T03:03:17.777000 -CVE-2014-9449,0,0,3546d2da66cc83f5af3194bb32c07e4a7ee6b47dc8bc98c07dc7e818e08de637,2017-11-10T02:29:01.403000 -CVE-2014-9450,0,0,bbffb7a12a6eede110046a4807f600a5961c6501afef7af10c8c28a884a0ee32,2015-01-06T03:05:24.713000 -CVE-2014-9451,0,0,2f85b273b510d84c8829584a1c3d29a2ebf65f06b67900db1174570c53a27acc,2017-09-08T01:29:34.997000 -CVE-2014-9452,0,0,9eaee4635da221d0ea8fb765b4e78d76aaa358d3cbcaf0c5450fb9d6ba76f4ad,2017-09-08T01:29:35.060000 -CVE-2014-9453,0,0,ad7c8ae4ee326684bb58f3818f5fd36b1da868cd0d839a819c39e878cf3c12f4,2017-09-08T01:29:35.107000 -CVE-2014-9454,0,0,081a735dfb815f86a45945ce584397367106232f7248f0efdb4dd4383be782e3,2017-09-08T01:29:35.167000 -CVE-2014-9455,0,0,0de4f3080f67f0d112108a66de3ee0e7a43502f9d092a1957ffc3bda99e0f562,2015-01-06T12:14:22.280000 -CVE-2014-9456,0,0,c97ea70e774a9765c82248e02eeaa763061c0b8102da69bf9c2f8a282219809e,2019-04-15T12:30:07.850000 -CVE-2014-9457,0,0,411d6813ec5f1d82d1c0bacef3aa97b0cffac263f620fdb51adafdf430f6f99f,2015-01-05T23:41:59.340000 -CVE-2014-9458,0,0,b06b4fc2c9c7abefbba0c7bc9598c37c6918fa07a070756ce895e5d404765771,2019-04-15T12:30:07.913000 -CVE-2014-9459,0,0,ea200a7f898d712d81a672a0108caa49db20ac6da1a25388ad61a7757747636a,2015-01-14T02:59:01.860000 -CVE-2014-9460,0,0,d6fef58ac18f362bf14113363aabb9e62cad7991c762f9c544706c42f47bf893,2017-09-08T01:29:35.230000 -CVE-2014-9461,0,0,a4deada5f18bfd005d192f19de10841bf280bf4ec0eda434f285a320b69304e6,2015-01-05T20:05:25.410000 -CVE-2014-9462,0,0,6ab48d525bd816ee4787674c57eef77113026178897a4e5154e26d2290f34340,2018-10-30T16:27:35.843000 +CVE-2014-9412,0,1,4c781846f68d9e98563476b215c7019f42b76b1bcf43a358186115739c48e016,2024-11-21T02:20:48.680000 +CVE-2014-9413,0,1,ac1d81f1779fc98885d0b86468e59f2d9981bb88395883aa2f11e77fee824f50,2024-11-21T02:20:48.860000 +CVE-2014-9414,0,1,dfc2da684c03738bde8bc274caa57f0e15015340cceda79bcc5ea8f56dfd1b3c,2024-11-21T02:20:49.010000 +CVE-2014-9415,0,1,e819a04848394407e01631baeed0abfd588f12f96c65333c117b32fb6f13a6b1,2024-11-21T02:20:49.170000 +CVE-2014-9416,0,1,658e2eabae80ffc65fce4dca9063f96a18a6903de31991cf958123b5bb537a2d,2024-11-21T02:20:49.307000 +CVE-2014-9417,0,1,aaa1ed9a52ff1194363880d0bdb2b35d165eed6b5776d45b7f06af33ff084ebb,2024-11-21T02:20:49.443000 +CVE-2014-9418,0,1,b5c22537554505d3cd25e1e6fa6dbdec2342f5a011917722d02587fb983f1823,2024-11-21T02:20:49.580000 +CVE-2014-9419,0,1,4f3b0b2cefc8c9c4fe96a9a89dffdb657cf53e7984f046e1f3078d208f16d226,2024-11-21T02:20:49.720000 +CVE-2014-9420,0,1,5c990073486d2ee18f6d4264e5fe1136964f4c998547c6846cf486aa0fd05efe,2024-11-21T02:20:49.890000 +CVE-2014-9421,0,1,06b80728cbb81504ffe1afc3170d99d8d658cbf38ce3ccdea78273f8a56e95cf,2024-11-21T02:20:50.053000 +CVE-2014-9422,0,1,e3bd565eafa0c53fa624177e17e2d5b64d3a5941808104c5179641b3d0596c95,2024-11-21T02:20:50.213000 +CVE-2014-9423,0,1,04993e3eda893896bfeddd63f0edf9bcb0a4afaa2a21525bb17184c37d692bb8,2024-11-21T02:20:50.370000 +CVE-2014-9424,0,1,ac72624459c10f435549c47343cefffce02ad1835e710c37d9eaaca2ae7ba37d,2024-11-21T02:20:50.523000 +CVE-2014-9425,0,1,aa1669204c2542287352e984e012fa9fd91e3ce8ab2ce1f52caaeceba03d0baa,2024-11-21T02:20:50.663000 +CVE-2014-9426,0,1,ba2352aac8bdf16f46450036f63bb69a9ed306829c1cfb73b89b46cbf22d84d0,2024-11-21T02:20:50.830000 +CVE-2014-9427,0,1,3054cf7bd435d21ec04c62d839c1276f82820556b737c2bdc6ea28898bf7856c,2024-11-21T02:20:51.043000 +CVE-2014-9428,0,1,57ee7c38437df5caf16b3ccbd4910816cd6b4bd84597fa571dc95714b083ce5f,2024-11-21T02:20:51.210000 +CVE-2014-9429,0,1,276ed3d835eda6e0c047f421a32f09aa42d26edabbe0ef2525d78ac9a96c277d,2024-11-21T02:20:52.217000 +CVE-2014-9430,0,1,f54f051858ee26c42d008803e2cc7fc573dcbc97696b1cb4d2d80eaea3832fd9,2024-11-21T02:20:52.373000 +CVE-2014-9431,0,1,040e0792ee49c490380c20c334d112c7e07758004e8f1aeb27eada2fa0a4b501,2024-11-21T02:20:52.507000 +CVE-2014-9432,0,1,a4930451ab101c0c59861c0e7266ccb9368b208439157b123f4e0f544d8f589d,2024-11-21T02:20:52.647000 +CVE-2014-9433,0,1,4a417968c24d451f651d05a0992394b2028e8022edf786d5438ddbe6497b8b79,2024-11-21T02:20:52.793000 +CVE-2014-9434,0,1,2956b5007ca7eff11ae87d35706804b040d143f02eccefd901b4ac8bc31be8be,2024-11-21T02:20:52.937000 +CVE-2014-9435,0,1,a63f650cba04b300b3b1099829110082fd083c9f3994474ffb378791519614d7,2024-11-21T02:20:53.067000 +CVE-2014-9436,0,1,e38fcafb3bcea6dc9c2a1cb66604b5e7a22c790c1635adf166d8d617c7fe89b9,2024-11-21T02:20:53.213000 +CVE-2014-9437,0,1,7f44a936b668d58936b1539c56cbbd60ff4da4cb5147936cd68806f13adfbc44,2024-11-21T02:20:53.347000 +CVE-2014-9438,0,1,f723018aed8247711dcae916cf186765f081275d467db71fa1c2f5977bb28771,2024-11-21T02:20:53.480000 +CVE-2014-9439,0,1,cae076a574d63eeefa74f7ef827bad28514c14a4d4c7fed2fa0f71526dc630fe,2024-11-21T02:20:53.610000 +CVE-2014-9440,0,1,9dbaef7ee30c290312b65ae2274773164013f595dbaa47753619a1c22aec2407,2024-11-21T02:20:53.740000 +CVE-2014-9441,0,1,391c4664641723f93708426479576cd99313854778246e8980db2334ac46cb64,2024-11-21T02:20:53.887000 +CVE-2014-9442,0,1,c5e3faf88ae3adc4c0a0b2c923bbbbee3390116216ec6b18950a13d48b51187e,2024-11-21T02:20:54.023000 +CVE-2014-9443,0,1,fcd787fccb9f0c29002c4ef1f33e622f48f769b38cc91eccad5e1a995081e710,2024-11-21T02:20:54.160000 +CVE-2014-9444,0,1,4f69df45f8208a4edca6a639c0f4ebb548fcbe2413b5e66528c86c50d9ac4bf7,2024-11-21T02:20:54.290000 +CVE-2014-9445,0,1,5c2206c798ad792ca92147c8759a495b064b45e7f3e4dfd7a5c322b12719d219,2024-11-21T02:20:54.420000 +CVE-2014-9446,0,1,2e8a9d385d69f1e76dd980a12d83e7abf2d18a953b4214766ec9315768c2ec35,2024-11-21T02:20:54.557000 +CVE-2014-9447,0,1,0ac3c886cf8fd8a869b23d8bc20290b997b1b8571d838f19f7fba64d963cfbf6,2024-11-21T02:20:54.693000 +CVE-2014-9448,0,1,db80874649d8213c8415f8746a06928bc46f2b3fd3b76b351ea016862dac6577,2024-11-21T02:20:54.840000 +CVE-2014-9449,0,1,6199e107edda9ea683d576d745f88a7486d943ee431dbe9a4fdefb206f605b60,2024-11-21T02:20:54.987000 +CVE-2014-9450,0,1,6723547f5e8b4684dd6f11d7e90b71310b755e2c73038d39f8d153436e2d5ff9,2024-11-21T02:20:55.137000 +CVE-2014-9451,0,1,b99e8e997fab8b01872964e95620c3d3118cab13097410a5c6a395f674a72ab5,2024-11-21T02:20:55.293000 +CVE-2014-9452,0,1,5c1313e6957fd5411fa70c68a714034952538817843c12ce2016d03a47a0a9f1,2024-11-21T02:20:55.440000 +CVE-2014-9453,0,1,e263f996d67770660b5828efc5c3ae62d907ba1060a4177c2a44052aac04b76f,2024-11-21T02:20:55.580000 +CVE-2014-9454,0,1,ed16ce71695a7348f681bd4c1e339a3409bd3b358f9d1f8762ae31fa94744c67,2024-11-21T02:20:55.727000 +CVE-2014-9455,0,1,8f86ae0875b857dcb45ce0729fd54136c45fc519737dd68b5cc1bbd9b9fa8e37,2024-11-21T02:20:55.867000 +CVE-2014-9456,0,1,b6d728847d675c355a7181799f0098ad564b6392b631a79d15886cc7867c2c15,2024-11-21T02:20:56.010000 +CVE-2014-9457,0,1,2c139284dc19806c969dd9fe41c09114d6c9b97e33b4c945823ba14a47276a64,2024-11-21T02:20:56.150000 +CVE-2014-9458,0,1,0bb4ad9fe726138ec0af942cfa935b78b1beda1b0c5169e9f856c1532a003f46,2024-11-21T02:20:56.280000 +CVE-2014-9459,0,1,b5b75e61999100d78e6ecf49a76e8d5c4e41030b8901b3751c8dfca8804c9302,2024-11-21T02:20:56.430000 +CVE-2014-9460,0,1,9c9d28ac67acc4399f356883076e54a23618c0714b5246cf7f1a7ca9ec9c5db2,2024-11-21T02:20:56.567000 +CVE-2014-9461,0,1,5bb7992ec0f861699a12d9cf8e6db8e308db2280b8bd0dc8c7c02168961fffcb,2024-11-21T02:20:56.707000 +CVE-2014-9462,0,1,8754958b8e2b3f8dc38c32edd54a6a423c6b7b41d599734a89b6e556466a942f,2024-11-21T02:20:56.850000 CVE-2014-9463,0,0,9d974d3ebdf0cb4dc6869d4192191d736fc1c9ce5d2f14e657b98c2355cae93b,2017-09-29T18:11:13.500000 -CVE-2014-9464,0,0,85826d18a277b27ee57ff073e47b0a9b721f78c0231ecf1af94ae75ae90ce508,2015-01-05T18:31:24.437000 -CVE-2014-9465,0,0,1052fa6573f3ad4fc7656a0b32810e0a69e087af406fd086fbe72ab94a125fa1,2016-04-07T21:09:33.500000 -CVE-2014-9466,0,0,ba242aef77c86273150a76e3884003415d59eb774507bb85890339342d72e54d,2018-10-09T19:55:09.090000 -CVE-2014-9468,0,0,e12ad5d191b5d2249691a8e32c6e791131dd105252e4bddeb9f51ba849746d10,2017-09-20T01:29:00.610000 +CVE-2014-9464,0,1,241c3bcb220c0a7cbcfacb3ba8cc57bb9f836a6326aabf40741ff2bcfa67cc59,2024-11-21T02:20:57.183000 +CVE-2014-9465,0,1,c841d873fb1486278dffff07ca3b9577679b5ab31f058dafb25d723801e51203,2024-11-21T02:20:57.337000 +CVE-2014-9466,0,1,d8ed6e31dd4002b75c2d11576c37104d0e440d07aa7c636f945c93501d12dfa0,2024-11-21T02:20:57.517000 +CVE-2014-9468,0,1,0f52278117041c1d2da1e70b4b8ccd5f024f0a1a8d6ff06e7bcdf6159cf79654,2024-11-21T02:20:57.663000 CVE-2014-9469,0,0,7aea45123bee739e02374f1d8d82a32e06edbd5a25546d98e304af00b0772740,2017-09-01T14:52:10.477000 CVE-2014-9470,0,0,0c1802c4294b2e0d1807489a2d40bf6eb35fe76fff775e3071f5af7630655ccb,2020-02-12T16:11:16.900000 -CVE-2014-9471,0,0,b62584f4453f0e4945829ba83d91051a54eecb7fb769c4c5334a9504730ff61e,2020-12-08T15:18:46.443000 -CVE-2014-9472,0,0,5633a18bc8fb2ad16a1b350fe193ea23033e376dc96a2a25dcef10d2ef4488e3,2016-08-23T17:45:51.740000 -CVE-2014-9473,0,0,a2b7c51942cf48ea0bbc7d59fdc2c73f60de14694bf1cf124968c08cad3a939c,2015-01-08T19:06:48.267000 +CVE-2014-9471,0,1,00c1297d651dd50385488500e8d1203faf9620d5b145be8169de1ce16f8a2ebb,2024-11-21T02:20:58.100000 +CVE-2014-9472,0,1,b54cb27ff128557a9952b1abe40be93825db50ef28983a6bcb12126010ee2ea9,2024-11-21T02:20:58.267000 +CVE-2014-9473,0,1,7571b9bd30db0f961e729a8aac4fb9385b5939bc857ca962751978ca78c8f378,2024-11-21T02:20:58.453000 CVE-2014-9474,0,0,57ccf9a702661b836af19604f5ba151aabadcc79e2b2962e4a0c5d31af128dcf,2017-11-05T23:16:45.277000 -CVE-2014-9475,0,0,498c47d5b8e4825818b5708836c75150e42d14141200286bf67efc95a959e84a,2015-09-17T18:14:14.977000 -CVE-2014-9476,0,0,f30738482a2099ac1bf81e357de9909477aa0940863413fce189f3ddbfefd506,2015-09-17T18:14:52.977000 -CVE-2014-9477,0,0,3fa4ae9eabf2c8692bcd781026da66e90e8d6cc134f8f31d5847555521de06de,2015-01-20T14:22:55.680000 -CVE-2014-9478,0,0,e47fa02e46fe11aaa14fc81941084aa70c4ece2e59f570ed29dc700f507b9f64,2015-01-20T14:24:36.943000 -CVE-2014-9479,0,0,cec374a28baf35c1fb9a04e1b9d09caf1e7a1fb4ffbc3b03cedc875aabd13043,2015-01-20T14:25:00.050000 -CVE-2014-9480,0,0,603c9ad78855e32a75935ba67449960511bfde8c02254b19ce3b82bdc26e00d5,2015-01-20T14:25:43.597000 +CVE-2014-9475,0,1,50e7c88a3b6a9f1d5e0d968ed9662674d74b9354712e09e421e97dd8790d8f86,2024-11-21T02:20:58.770000 +CVE-2014-9476,0,1,227478be070aa5aad5888fe5ebd7c61e3505da96e3471da38ffccde8bd6d2f70,2024-11-21T02:20:58.897000 +CVE-2014-9477,0,1,21e5b9ef325cba035b205585905744f519033d1d4abe1989cb4e2fc764a39462,2024-11-21T02:20:59.037000 +CVE-2014-9478,0,1,b995c8a01656978f1e8066e9f632e413bc7a8ee412025138de91e758e3cd4ac3,2024-11-21T02:20:59.197000 +CVE-2014-9479,0,1,bf9dfdb04c331cc008363fdbf2e9033c52a33bf65f49e1a318ee8c67dc405d9d,2024-11-21T02:20:59.327000 +CVE-2014-9480,0,1,458f87205982d19eab0a04ecbe8049cfa5f5dfdad868bae367d3ee24ca17d0cc,2024-11-21T02:20:59.460000 CVE-2014-9481,0,0,95ff6e451eca8db8dca4885dd5c83b63287c89f4f781f7bc15a42fcf12ae0c49,2020-02-05T16:53:05.167000 CVE-2014-9482,0,0,418975147698f21e57a8c2f9e484e0a62fe804ffb11905769c7c0e0d8ecdf332,2020-01-29T19:08:23.243000 CVE-2014-9483,0,0,ed631ff7ee8a76285e591997191c915a4146cee77599321aea8dacab003790f0,2017-09-08T01:29:35.357000 CVE-2014-9485,0,0,2640b6625a21b21e0fcf322bd3aaca9d12de41f61cb11aa6fcc967fa6c2e54e0,2024-01-24T21:15:08.147000 CVE-2014-9486,0,0,d9f5f769ab0ebbc969f58e7af5138e1c414f401f2009c8dcf8d6573470797dd4,2023-11-07T02:23:06.033000 CVE-2014-9487,0,0,7248faa297bab1f88ee1ed8c0f84aad3c0ab4d831dc2d654265ca30087a0ee65,2017-11-08T17:09:59.203000 -CVE-2014-9488,0,0,222f5eb75402c513581e96a52e945335895d56afa58d5e0d8188272d66c3c539,2018-10-30T16:27:35.843000 +CVE-2014-9488,0,1,7f1f5549229407dc32d3aeb05841ef3255afbf745e23b5d221aae3ea283ee8df,2024-11-21T02:21:00.337000 CVE-2014-9489,0,0,f6487e2d141c190321d60f61c04b23c845410bf7859df641fb86627c4cc51b80,2017-11-08T16:20:11.777000 -CVE-2014-9490,0,0,d73830afa27c725e0e13c3234d5e9d99c1ecfad4ab3c6a965f0a9b9e5c1eb956,2023-11-07T02:23:06.087000 -CVE-2014-9491,0,0,2cb44fa1248f636af8929585d0e1f7b1821b2f469a74a35f91d4ad6a22ed2ddb,2017-09-08T01:29:35.480000 +CVE-2014-9490,0,1,beac0f34da3fe6e4a8d1f970ba3f05adc1bb7fc91e382581400f518f3f039c63,2024-11-21T02:21:00.650000 +CVE-2014-9491,0,1,02d1b1605911f9ca42c7031a6a48812455acd4ddd347c5443e659ffa12c8f61d,2024-11-21T02:21:00.793000 CVE-2014-9492,0,0,93da0e3fef0aa8d76c174a1e4d68c5e57d840c9179dd9cbb0982d023507bb857,2023-11-07T02:23:06.150000 -CVE-2014-9493,0,0,d6a2e48883920bc71937d2c9f4a22e3dc14e6bff409cd02ee18dabc74556a732,2019-02-01T18:09:20.413000 -CVE-2014-9494,0,0,80e065614f65b569e5b98e11ce6b6b74644211a621c38f44c71a982fd3a847af,2023-11-07T02:23:06.197000 -CVE-2014-9495,0,0,9774caec53ff8d00021be4abbdca1dffa18fb5895468c0bde7bbd0e8662b174b,2016-10-18T03:45:18.687000 -CVE-2014-9496,0,0,96cf58ec0c46e4cb92f7c4869bc29e843a7e7ddff88bcd774eb66284ab5ee6f5,2020-11-20T17:34:08.147000 +CVE-2014-9493,0,1,635ef3595c65454aeb9f4797c92db4a5fd5c9dc4635420bb4ca5ac96a33396b3,2024-11-21T02:21:00.950000 +CVE-2014-9494,0,1,5e9000755b89e9d3343b545b4991e9784fdd005c8329a76d1f8877face975c7b,2024-11-21T02:21:01.113000 +CVE-2014-9495,0,1,c55f70e2c4d24fd850abc427d150672452750a2a050bd268a0d36cdd0b90f0ab,2024-11-21T02:21:01.240000 +CVE-2014-9496,0,1,6918bd9acde285bdee8377f9fb59daa4775708b543bfbf5f5ecb9ae19164b477,2024-11-21T02:21:01.430000 CVE-2014-9497,0,0,59b3b8a4d85ba205bf9bf3545226333636b773bd3faa10c0cb8767393a56ac43,2017-09-03T13:16:46.477000 -CVE-2014-9498,0,0,30872df8fa86fba55c29af4e3c2e08f6aa988c3522a27fb2f3da38b0ee2bd1e8,2015-01-12T19:08:39.787000 -CVE-2014-9499,0,0,2b6afcd2efdbafdb650a4c5999ed23fab678bf280bdb3fdae5ec0feda6dc7e42,2017-09-08T01:29:35.590000 -CVE-2014-9500,0,0,4f8418e12565fc558d6aca5f5aa303de3f98cdc7f5ba3543fe934d087ea467d7,2015-01-12T19:09:14.817000 -CVE-2014-9501,0,0,f0e713dc277437718630f930b6c434c7f76a604b9252c0a1543e0a812017774b,2015-01-12T19:09:57.957000 +CVE-2014-9498,0,1,4ff5003ad991ba01f0638221fbc5e863308bcccb05f6a897d0818da452cc008b,2024-11-21T02:21:01.780000 +CVE-2014-9499,0,1,74e37f4b9032c060ddc467ac810d5d125034f5e99dae6454334acc15af9fadf5,2024-11-21T02:21:01.933000 +CVE-2014-9500,0,1,730edb6d7910195294223d552424fc995f5711d32a1af1592b0b05ad7f7e7c43,2024-11-21T02:21:02.087000 +CVE-2014-9501,0,1,365dc3f21a3286b64af5d22c2292e02ae0ba79171336608e7c01ea792cd68cda,2024-11-21T02:21:02.240000 CVE-2014-9502,0,0,9d7e64bcca3f781663ff298152ba1bea2d0c97f8da6f178889b2167eda4e191a,2018-02-27T18:55:55.920000 CVE-2014-9503,0,0,37d92ee425b57b55f48ab2b48c0c30fa2ee374e2547d1f6a4f6d41b2e2215fba,2018-02-27T18:58:41.437000 CVE-2014-9504,0,0,527fe4613d60f998b109aa51ecad02fbf524b1817c39d713d0afabd53f4f9660,2018-02-27T18:45:31.980000 -CVE-2014-9505,0,0,8427c8462e10947abfe0cde56f3ae1ded3fdda49738b5e76739c59e3c2cdec24,2017-09-08T01:29:35.653000 -CVE-2014-9506,0,0,9bd9aa9d5f330f305dc86370f9ac8ea5e0d997890a1fd6b2e4aeaeb1613005b4,2017-01-03T02:59:24.580000 -CVE-2014-9507,0,0,9e7eabbfdf7babd84653deb4091196b0db208c3f2ad25f08ad9a34ef43bf38d0,2015-01-14T02:59:02.050000 -CVE-2014-9508,0,0,295f094447b23104452bb7a461dd8bcf3a2193833b1a8e4ccbafd703a000779a,2016-11-28T19:14:03.887000 -CVE-2014-9509,0,0,e8c3e180fbdc76f55c4fb5d712acc83f3617fe542d8969993e44348a0ab2f3dc,2015-01-06T14:42:09.207000 -CVE-2014-9510,0,0,19193e66fd5db68f4c1e456f32a619257e3e6ab946f404bae7f293cab5d11768,2015-01-13T01:49:29.583000 -CVE-2014-9512,0,0,2ab5a92bff5ea988b46f3c00235ff6b672ecc142bd47d1d0aa5028bc6e300774,2020-07-28T20:15:12.060000 +CVE-2014-9505,0,1,3a022eb47bc13fc6c3e132fe0278451dcbaa7c0a786502c2a3bd607881fc3172,2024-11-21T02:21:02.830000 +CVE-2014-9506,0,1,0c3ddca2f1b016ade781b234baf97aa43c50f3bb70fc10fa8b6e7522f2abe996,2024-11-21T02:21:02.987000 +CVE-2014-9507,0,1,0274a64adbb08e5c8cc7dfea95d1511f71dbe2f5c2f474e62812e3b18fd64480,2024-11-21T02:21:03.133000 +CVE-2014-9508,0,1,319c12223e7a87d19fc2acbbd3aebd395d62a40ee34b9ae5d159b845cf2d1d5e,2024-11-21T02:21:03.290000 +CVE-2014-9509,0,1,2f06dc3b4ea3ee41b053cfde2e7002e719ce684c1e3c8a2d3512d6f1ad03a738,2024-11-21T02:21:03.463000 +CVE-2014-9510,0,1,95220b0d55c63c1d61a74e2d52fb5e1b28e648b8975803b3235d887af1890f30,2024-11-21T02:21:03.620000 +CVE-2014-9512,0,1,0a8a1dfae6c6cc1d080e4cdd86b21860630ba7c1a55cbbaafadc35283c07fcba,2024-11-21T02:21:03.770000 CVE-2014-9513,0,0,e745d9fde65a85ae96dae0b70254a67ff78cb9eebe7681bd336ec22167e84fd3,2017-09-08T02:22:47.890000 CVE-2014-9514,0,0,23d982d511dc4dd5b0ee4d20d13ec854282abd7ffd4e0f326a23013c9c55db06,2017-08-31T13:46:55.820000 CVE-2014-9515,0,0,152a4fc755c424efe371779645f9d6aeb10209c0f007f159e1b12840db4466e9,2024-08-22T15:35:01.630000 -CVE-2014-9516,0,0,6e198e840f166756d5e58760115938c2a398eec9cfd4aedac45b0f03710a6db7,2015-01-06T16:48:32.723000 -CVE-2014-9517,0,0,279a156651ad5993cc16d034460157adb07f2c6a29e6d67e65e7aceb275abac6,2023-11-17T20:01:31.690000 -CVE-2014-9518,0,0,5942cce75c2632a7a5abda187d30833574a9d1d9769e051797a5faa5f3a6d96b,2015-01-06T17:37:17.063000 -CVE-2014-9519,0,0,d9c14bf96d96b9ca1176ff101adb6913d57dcfd2d62f696f48035708a426ebb1,2020-11-30T14:58:45.100000 -CVE-2014-9520,0,0,d9a12368d60ce3d75f605fdcf7aa727c79ab15dbcc7bbb1056ac39072c7f97c6,2020-11-30T14:58:49.383000 -CVE-2014-9521,0,0,af32c8a0c34e4b3e18f2dd037f3e3673707ace75a59820c413b3b208f9f2931e,2020-11-30T14:58:49.383000 -CVE-2014-9522,0,0,4fe1d7cd9bf36b0985bb57613ca0ee8c7ae90d144f94518ecb2e2dd6f44d3a22,2018-10-09T19:55:09.497000 -CVE-2014-9523,0,0,4cd35dd69490719bb7224e18fe18d82375e4b4d02730ed78e372c305324770f4,2015-01-06T16:55:57.487000 -CVE-2014-9524,0,0,9bb90314a78ba30289242a0559e626ba03cb4e6aa999b7904e4ef0ed564f955c,2015-01-06T16:57:47.140000 -CVE-2014-9525,0,0,dddbd94ac04cd99a4339b40d521608d6bdefc8a15f0a69bbb0a9b6e3f0a65b7d,2017-09-08T01:29:35.763000 -CVE-2014-9526,0,0,732ebb8e695337feed0158ad4b523c5916fe1bbd0fa9bfda92fc342f6f34fad7,2021-07-15T20:42:44.600000 -CVE-2014-9527,0,0,08447d00f07adbe30d67632c3188c55ea8d78958d9298342c4b82969568c73d9,2017-02-11T02:59:00.433000 -CVE-2014-9528,0,0,56e915a3017bdc7d152505cadc2d43d150081ca2d1b5c95653ca76f4f5761873,2017-09-08T01:29:35.887000 -CVE-2014-9529,0,0,99214e5bd7615d801fb839012c50a870e243ae5d08cc3be775cc52cbde3094b4,2024-03-14T19:58:34.480000 +CVE-2014-9516,0,1,848f25439d7528bcd521d34d35f7667f5c68dfcb2c5291c4166acab9b2bac938,2024-11-21T02:21:04.567000 +CVE-2014-9517,0,1,c8d503fcf23357c8725e849f8f374d748e3ef11f7d254528eb4d122d456e176c,2024-11-21T02:21:04.703000 +CVE-2014-9518,0,1,05ce2a782cc2044d0c63b48d320bb073f6a0e31676071404bcc0a8473b046dab,2024-11-21T02:21:04.847000 +CVE-2014-9519,0,1,31b94186a5ae6f6b7a869d281f5eae46ab6f0e95bffb051b5a0598a45d2e6d3a,2024-11-21T02:21:04.993000 +CVE-2014-9520,0,1,eb78226209a20a7e11edd6f4b15a6858ba9363de604f3617cb78ced9b47df15a,2024-11-21T02:21:05.157000 +CVE-2014-9521,0,1,ec3d907dd7919ebc32a3bf2e70e752fddf20f3ba967ef364e96ac72fdad3d351,2024-11-21T02:21:05.317000 +CVE-2014-9522,0,1,a55d1228a5d5aa540dda4fd69c71d8d51972701c29c584c0d6104562d46a75f0,2024-11-21T02:21:05.460000 +CVE-2014-9523,0,1,dfb936d46fa8e7929cfa20b7804582c59154b7dd936240bf49a4332fd80d1f20,2024-11-21T02:21:05.607000 +CVE-2014-9524,0,1,b69cb40dfb5d6d42e7b940d7727a44994471f4ef37d0672db71068c1492d67f9,2024-11-21T02:21:05.760000 +CVE-2014-9525,0,1,44b3291b44df6cb6db458d86536272f7c176f4c3d6f8f76f0a38fcf21983a3f8,2024-11-21T02:21:05.910000 +CVE-2014-9526,0,1,c9068fb1a551d9163a230313d680772e397ab0a26b17da28bce067c38eb581e2,2024-11-21T02:21:06.043000 +CVE-2014-9527,0,1,1485fd34f6fa4447aca764de9caf0dc64694c79483dce6ca98837cc14ef3a5ca,2024-11-21T02:21:06.220000 +CVE-2014-9528,0,1,1649deb43f8edecad10ec3ca0b2fa9c53eb73cc8ea61ac5cc2099c96c4ec82c1,2024-11-21T02:21:06.370000 +CVE-2014-9529,0,1,253bdc9db2ee9a33daaaacc0249ba33d6072d8a02fa908a9d0b278e673634c7e,2024-11-21T02:21:06.540000 CVE-2014-9530,0,0,90e2d8024d2a206fa628a35d35009fabb91a18adf03f45c9d6eb6978bc4c07f8,2020-02-10T15:12:13.393000 -CVE-2014-9556,0,0,0f6a53aa056c6aea1965c6fa07b016af5b1bf652ec7de0e205ed0222cb04e124,2018-10-30T16:27:35.843000 +CVE-2014-9556,0,1,4f2d4369633feab33d16d3de1760e5f8ea9fcba0294cc178dc7b98d20d4482ed,2024-11-21T02:21:07.040000 CVE-2014-9557,0,0,a61dcfcde6f468385d09f5f4bfd7e0cd5865e3277a01a5c86af07477da9ecb67,2020-10-02T14:56:02.080000 CVE-2014-9558,0,0,7f784d8c8d97b695f42d073f17c3df4f3f581bf6d65f5c7c55f9d0e007efbcb9,2017-08-31T15:52:32.157000 -CVE-2014-9559,0,0,79f2312b189680c5022911b4c812f057a6c9f3438b8a6294e20460ee4bbcb1fd,2015-02-04T03:37:56.367000 -CVE-2014-9560,0,0,d7a89955abb05b02e75f0df135824da770f30b94664c3ab3e51347116ef9af31,2015-01-16T16:30:21.007000 -CVE-2014-9561,0,0,31344de4ee8682b076a1755bdb1f848ff97362f19f8e987aa041d41dc3fa5b8b,2015-01-16T16:30:34.867000 -CVE-2014-9562,0,0,0851481edf91d3c82cac2c1b111da6de8cab14f03a1283c7ec5c1bad59ecfd5b,2015-02-05T16:08:44.040000 +CVE-2014-9559,0,1,f57cfbd0334a2740857f140172cf66e1b5ed73fb9bf346819923ff28af790681,2024-11-21T02:21:07.500000 +CVE-2014-9560,0,1,1dce7de2cb3f906b4a93b6d019ac6bcdef0d94b0a029fec115e3cf2051ee813c,2024-11-21T02:21:07.650000 +CVE-2014-9561,0,1,5bdceaf5344b57b7b3ef2010a331d87493587c671c8039e188d1799e590e8eed,2024-11-21T02:21:07.820000 +CVE-2014-9562,0,1,9b5730778235cd458c9d0004e5d221351c8efed628810cb5248f32bf80d11eb1,2024-11-21T02:21:07.967000 CVE-2014-9563,0,0,9a6a3ced36c5077157a84429a220be15e7320a8687e5b0cfdb33d17ade4f1df8,2021-09-09T17:12:02.863000 CVE-2014-9564,0,0,e01272d79bffec368f48481c38317b47d60daf344aa9608b858d18d0b9147eb6,2017-08-30T13:49:49.410000 CVE-2014-9565,0,0,8ffdb402cf51b3d83df254c4076b601233d7b7dbb5a1077b49d952c61ae231b6,2017-09-12T15:28:21.673000 -CVE-2014-9566,0,0,74b3d88bb10912115b97bb8d1c32aef0f8c4dbd616c222678c6f346aa1ab1227,2015-03-11T19:19:27.490000 -CVE-2014-9567,0,0,02a4b653694b127f7c8780122475b60cde6e9fafa9ff029c8b88f81ff1de4522,2017-09-08T01:29:36.217000 -CVE-2014-9568,0,0,f6344c975a9d488072eda17ccc9aec1b3752142345d9b9271a1b78fb757fca29,2019-07-11T14:35:34.273000 -CVE-2014-9569,0,0,4adeef1fb9c055a29898375ba6e9b5b805fc3341b219a0c79c2d6d51d4893b31,2024-02-14T01:17:43.863000 -CVE-2014-9570,0,0,6065c8eddcf6cf008b1a5cc1bf7bec3a637454f294129816a079752518e4abe8,2018-10-09T19:55:10.247000 -CVE-2014-9571,0,0,71f10ef6dc6f0b8b021db46392c320c6853e6983aa5615733ce9ac194a736e32,2017-09-08T01:29:36.263000 -CVE-2014-9572,0,0,456ff07342585dde04cf82707b0dc660cc2c5c8302ec665b2546806d50a13434,2017-09-08T01:29:36.327000 -CVE-2014-9573,0,0,0a27b995b36b32e2ab729bc62287a453abf1c1b82cd22c0016b7988c046e13fb,2017-09-08T01:29:36.387000 -CVE-2014-9574,0,0,cb565269d9bd05d5d65d98509e5a18cb0200570c2cbc5e5e361a5348f63c0227,2017-09-08T01:29:36.433000 -CVE-2014-9575,0,0,83e45490a46e1493f76ad49d3fa90d7008345651dda7a3ce775e002d1be7519a,2015-01-08T19:43:42.520000 -CVE-2014-9576,0,0,eb77863dc653b432d6488d3bd6f894cb3be2e0e79545439b14a4429f7ec89b25,2015-01-08T19:44:57.597000 -CVE-2014-9577,0,0,38ffcf49dd19f6cfd214fd986e830d555e7ef36ae131a31c6ea75c4db413d0ce,2015-01-08T19:50:15.517000 -CVE-2014-9578,0,0,29418ef95dd15f2dd47cb4ed0666bf911cb63aba7e983b34a80a7780cde936e2,2017-03-07T02:59:00.203000 -CVE-2014-9579,0,0,14762cb8afad73ba84053bb6587be3e29261d9a8782625bbf88edc86c6458841,2015-01-08T19:54:27.763000 -CVE-2014-9580,0,0,89d968429fca5d26f829eeb398c42ce941b8909575dfbe77575ce6fc748b80f8,2017-09-08T01:29:36.497000 -CVE-2014-9581,0,0,026a968239bcab6532d332df959bad3c811fbdb680d23463d65f23ea9ccda5a7,2015-01-11T02:59:28.117000 -CVE-2014-9582,0,0,e4297fba7aa68d5ed382a57ef138aae77cdfaa95134a1280aff50a2421b535b7,2015-01-11T02:59:29.103000 -CVE-2014-9583,0,0,2bb820f9edb7ac3527d3cb40290424bb628012924ffbf394cf74efd393b3bd9f,2018-04-27T01:29:00.617000 -CVE-2014-9584,0,0,93d0556660b9c39c43b4e4673cbd9d70700c1b34d6fbd291a78953350f20b190,2023-02-13T00:45:22.080000 -CVE-2014-9585,0,0,210b4579e32199f70cdfd5f2efaf7ba2ebcac364e5fb794dbc5f0dbe14b79b1d,2023-11-07T02:23:06.927000 -CVE-2014-9587,0,0,99ba24d66d8abd70a0d756d1c6c3e0531b86c068e63fb6e778b39f8d2a4b4bf5,2015-01-16T17:19:05.703000 +CVE-2014-9566,0,1,c50717b4dc62a20d4457f9fe129f8702228a11273e308705d447ff589a44d3f4,2024-11-21T02:21:08.600000 +CVE-2014-9567,0,1,22b574a3a959c311884e5d17d0064254e14f285f358729e1fce111affa00fa67,2024-11-21T02:21:08.760000 +CVE-2014-9568,0,1,865a7ca913748c8791199f5f7bdc21a673f08ae4ceb47be5b13259a626187cbc,2024-11-21T02:21:08.927000 +CVE-2014-9569,0,1,2862b64de9f7232d546e1feca6eb79d97ccdbf023f0afeba0a85f47db6298adb,2024-11-21T02:21:09.060000 +CVE-2014-9570,0,1,5f634935c1ab90c45bca891db916e69e2dd1b5819d9315d6bd05e51f01ee2c9c,2024-11-21T02:21:09.210000 +CVE-2014-9571,0,1,63d797dc6a83b50e50aa7ef718428291998fee082c9bbfe32db43d7d91495c43,2024-11-21T02:21:09.367000 +CVE-2014-9572,0,1,8fc0009106dc6c7408ed6b73a754cea7a4b704853eda1e2e1878f793613eff66,2024-11-21T02:21:09.523000 +CVE-2014-9573,0,1,1c6775deadff10214df663298739ad64cc57e0f0255c555bc3333ac05e9c5308,2024-11-21T02:21:09.677000 +CVE-2014-9574,0,1,e5aef7bf0cea3cf58e7c9409c9db345454466edbd5988a2e5af4c73ffba35234,2024-11-21T02:21:09.840000 +CVE-2014-9575,0,1,c785fc5cfbfa7439e0da5c9396795ff2bcb0b0d77d9b1adb6109e2af4348a6fe,2024-11-21T02:21:09.997000 +CVE-2014-9576,0,1,6c2da02808f49fc7596ef40e341909a886a9822c3975fb2d1c969f986e134739,2024-11-21T02:21:10.160000 +CVE-2014-9577,0,1,831fe66399b4ae7876806a174fade7381b59988cea26ba11683ed6bd2c97db7f,2024-11-21T02:21:10.323000 +CVE-2014-9578,0,1,821e1f648d0f4b5ca0afd79f307077858cf5c8c39f9e37e72d703eddb8a646a0,2024-11-21T02:21:10.467000 +CVE-2014-9579,0,1,958b1d543b7c0ce4eb5ef352c8aadc3efc44755adec5e250a27dc13ce135c5f9,2024-11-21T02:21:10.613000 +CVE-2014-9580,0,1,0954ea5f1f9642c20f4416b26ecf46f3c13c46d777dad8684ccacaac944ba680,2024-11-21T02:21:10.780000 +CVE-2014-9581,0,1,cf72d76e1c0133ddeca549b2820b8c9e4533d9c55800c72461079f40782d8ea2,2024-11-21T02:21:10.930000 +CVE-2014-9582,0,1,3c72a5d7053081c5e2a32dc08821868298a61c67fa1fd6332df3a237337082a6,2024-11-21T02:21:11.080000 +CVE-2014-9583,0,1,7455c9e4f9f8ee3ad106433e1063dd08e18ac9affa5631180337e9f472af06b6,2024-11-21T02:21:11.230000 +CVE-2014-9584,0,1,66761ef26150cde4b61b3c35c25a2509d2cec7a06e36e4b542d46124cb7e1628,2024-11-21T02:21:11.387000 +CVE-2014-9585,0,1,43ac1f623eea930ca4a5928ae29aaa737fea6725dd7ca79a1f749e99b39df22f,2024-11-21T02:21:11.590000 +CVE-2014-9587,0,1,b976b38634a62e982b47c7b7d9dae9c64e0282e0c81573527f190a4b04f33a5f,2024-11-21T02:21:11.807000 CVE-2014-9588,0,0,2bea724f74fdb12afcd8503e53656f6bbdc781ba17e0ea35f5101dfca1bea8ff,2023-11-07T02:23:07.030000 CVE-2014-9589,0,0,3165ce0558578ebd3f8591696bc04100ba130b7ce1cde167a178d8364b2c35b8,2023-11-07T02:23:07.480000 CVE-2014-9590,0,0,8903c3fb201b502e908e53586c95c9c9ac7eb45be096f378d095c619ed52203f,2023-11-07T02:23:07.747000 CVE-2014-9591,0,0,9566e5a648d4e39968938dfc09e7125e234c06f9eb1b1789375ea8618298768a,2023-11-07T02:23:07.987000 CVE-2014-9592,0,0,147f15a7adbc6a16a0355803e35efcc19aa735a65c974b8c882622f16f3566dd,2023-11-07T02:23:08.227000 -CVE-2014-9593,0,0,176cbad71117544438ff54c826b2119f4030477381c3a717fa96a30160a93b62,2015-01-16T18:34:29.713000 -CVE-2014-9594,0,0,0a056bedadeb355e67cadfeae5394742bfc61254021f171f92bd70b33dcc1983,2018-12-10T19:29:06.437000 -CVE-2014-9595,0,0,0c167bfaf325bd858760b198e805eb3db65a7017e33d758c1274736b921aaea1,2018-12-10T19:29:06.530000 -CVE-2014-9596,0,0,ae6fe64357be46b1749b6e78e98d984403f6a3919db19f3af2e37821eb6f4ad2,2015-01-16T18:31:00.697000 -CVE-2014-9597,0,0,7580ef9c9e17692e3dc3600b5b4da37375da17e91d8f4ae09e13a7949fb4b3d7,2024-02-14T01:17:43.863000 -CVE-2014-9598,0,0,61f9b61524aecc4cf13fef5e087c37d5206ec675b1a037eedd55c41a8e5afa5b,2024-02-14T01:17:43.863000 -CVE-2014-9599,0,0,8ec2b8f0e98410d0fdcbe9a0de165f9b6dfcfa4f9b7264ff1223d1729c90b974,2017-09-08T01:29:36.560000 -CVE-2014-9600,0,0,d4b65e05a5b701209583a84e46cf6b2fc1bff3ae27caf4c4439c5ed1b54150de,2017-09-08T01:29:36.607000 -CVE-2014-9601,0,0,f5197d549a1735deca82d5fd654c41e8ab229ec695a9dd211e8a752e30fe41db,2018-10-30T16:27:35.843000 -CVE-2014-9602,0,0,2c5d56c02a9d0635d93766edf6d9bfff249f5c5b462c4904bc51cc8a26e825eb,2023-11-07T02:23:08.543000 -CVE-2014-9603,0,0,3c5ea98216dd602899d9323848f1a520fd903d06e1db5316b9391e19c1d3f64d,2023-11-07T02:23:08.603000 -CVE-2014-9604,0,0,dd82215455e697b9670c184dff4c1b21a639ce9d99f0e9c276aafac384dd7046,2023-11-07T02:23:08.667000 +CVE-2014-9593,0,1,661e621196d118796ee394e8e05deca96c088a29ee02c2806bb65563f7dd7af7,2024-11-21T02:21:12.030000 +CVE-2014-9594,0,1,25fe20cfae019140e13e6df9426e65e48267d6339da27f847547b017d525f904,2024-11-21T02:21:12.180000 +CVE-2014-9595,0,1,6e1bde8ddf7405735080dd7c3dc11a380876fb998b3e4df14bfd78e502672886,2024-11-21T02:21:12.327000 +CVE-2014-9596,0,1,939600f66977ef6d977f23f56f452b4ee0ac21926c8a10a768a987cf453f4266,2024-11-21T02:21:12.460000 +CVE-2014-9597,0,1,bb0a1edca7e7e6c5f5d29b706b8eec823b76d7a8f4a285026d2a18742a7a3825,2024-11-21T02:21:12.600000 +CVE-2014-9598,0,1,3ff97391dc35a0f407bb83d2538045c437eaaaeb01ebef1014149d618781b746,2024-11-21T02:21:12.730000 +CVE-2014-9599,0,1,a4b9717e68223da6bda2e90b69cd3ad605bd9d50b3ba9db682a63e988c4eefe9,2024-11-21T02:21:12.867000 +CVE-2014-9600,0,1,76e4ee056933b40b4b614f22ea174b3a76c215a52e3efda6c4df5db787e525c4,2024-11-21T02:21:13 +CVE-2014-9601,0,1,325f47ea1a4ea41c3780498b2d4c616a6ed4a523166c66e3cef03d95a8853433,2024-11-21T02:21:13.140000 +CVE-2014-9602,0,1,c2cfefabceef4917b138d466b37a7ed9dcfe19314a888889bad05f3bc5f81fd0,2024-11-21T02:21:13.283000 +CVE-2014-9603,0,1,20e56ed19428a56e26c83ef9207c9746ff2ff1faee5f0e9917fe4e40c726fb13,2024-11-21T02:21:13.420000 +CVE-2014-9604,0,1,e1b2b48e43d943c6f185c3347452e9abf852f2a4c26ff1a23b62fa13625a2a0a,2024-11-21T02:21:13.550000 CVE-2014-9605,0,0,e4418dafd164fdde351444a4a645f948f80f5f86640b63caa920790f761498f6,2019-02-01T18:23:07.387000 CVE-2014-9606,0,0,38f6050a23e0d000656aae655cf9116276d6c54133182608963655a13e7fe74d,2020-02-20T16:30:23.103000 CVE-2014-9607,0,0,846f793c3069354e16b2af5913b5f7251223d7b3eca33a6e0d547c89fad4249d,2020-02-20T17:00:45.157000 @@ -73105,10 +73105,10 @@ CVE-2014-9616,0,0,b85d797e92103450174ab19e896595a28212450a9a14be67e6077e3254a3a3 CVE-2014-9617,0,0,2d24f48c2aa69106627d89b1bf6b1f8667682f671a1c5cea8729e0d2f311033a,2020-02-20T17:09:25.477000 CVE-2014-9618,0,0,03bdd3828a762ce843ffc0b72538928157aeefff1cd88e230a924afa5767ec84,2017-09-29T13:47:03.047000 CVE-2014-9619,0,0,3f4e08beb6e2f3387f47769270364bea8983a90ad3ab8e5d9c64cdb3b586acd9,2017-09-27T19:48:35.060000 -CVE-2014-9620,0,0,42141535b32e941f8aa3514ece1311514b97d6845d500b3046a6db9ca84d4cf3,2018-06-16T01:29:00.507000 -CVE-2014-9621,0,0,d9e9fee3cc98d93a076aa7c3c2c60f6b316b84a008afff5d811f28157ac6b390,2018-06-16T01:29:00.663000 -CVE-2014-9622,0,0,bc03184971e0705196cde3e86307b277f79da042a34baad76a69b1f2e9c6e1f1,2017-07-01T01:29:09.450000 -CVE-2014-9623,0,0,58015abf74d0b2fedb775918ed6ff17db73d81ef8366eb77e28a25680eacbbc4,2016-12-07T03:01:39.207000 +CVE-2014-9620,0,1,ef2ec1236bd53ff3def1d7fb568e109af86c3e698621fb5c5739febb9f0fddd6,2024-11-21T02:21:15.837000 +CVE-2014-9621,0,1,3476c0ac50072aca64c98f0e63111e4caa3cc38a370ae0ecc4787aa6cc3ec0ff,2024-11-21T02:21:15.997000 +CVE-2014-9622,0,1,b9f5d6d4eefb016e00148c5f5c0dd58263e41124d389c1bbb83d1aab37add199,2024-11-21T02:21:16.153000 +CVE-2014-9623,0,1,6db5f79b0a79dce853bfc496089298bcedfdff72992bb00ade5a750911d2affd,2024-11-21T02:21:16.293000 CVE-2014-9624,0,0,94f8b1b63a6af43466c50296bb4b5e1e8c28af4907fefe0a105f957a88199826,2017-09-20T18:11:11.927000 CVE-2014-9625,0,0,975e0baf4ddbb7911f66bf1240d7fe6e880cc14ac459405fff361c643e705173,2020-01-29T16:46:14.767000 CVE-2014-9626,0,0,0597dbba408be79578ca5ca1b1371c7199e8f4f0c54c7078b4d3ebb4b4201781,2020-01-29T20:02:13.203000 @@ -73116,64 +73116,64 @@ CVE-2014-9627,0,0,832aa29713631105f464ea9120011bd8810759f20e19a0774179195ca6f4dc CVE-2014-9628,0,0,899205d2058f5d157552164aac590bb629d1ab555324096f3f528e6f1bb5174c,2020-01-29T18:09:59.937000 CVE-2014-9629,0,0,bf255c9cae7d4a889016d17144fd6762564e792b20042dccadf1e0f5cc13d617,2020-01-29T16:43:08.100000 CVE-2014-9630,0,0,78a3245dc50d09c57b62f758d94e56479d04b95c1606536a2d075f7a1ce8e018,2020-01-29T16:17:38.310000 -CVE-2014-9632,0,0,182aaedca63abfa0447119cd261f6149e2c3793fe1bf69d8f3fe26921da86759,2019-02-01T18:07:55.897000 -CVE-2014-9633,0,0,25fb1beb12ea273a07b945159cfb2714dcadf56bde7b5f674b8a240cfe7c553f,2015-02-04T16:39:35.367000 +CVE-2014-9632,0,1,5eebc4425cefbe865b4ae24d0a9e1f2fffe4f2aede344a7138a6696d957d1856,2024-11-21T02:21:17.523000 +CVE-2014-9633,0,1,20fd13d64ca84924b6402f98ad0b0bd5159a47cd457c3d186ae7854cab855953,2024-11-21T02:21:17.680000 CVE-2014-9634,0,0,1b51d320633a19294832b4616e7ac37e44b84f58c8b3a1587bfa986d9d4055e4,2017-09-21T18:47:39.513000 CVE-2014-9635,0,0,e3df4b59b91aa2edb2db6fef02b89166c481b347ca254d39385731042e16f014,2017-09-21T18:47:08.483000 -CVE-2014-9636,0,0,12e541154adc2ccf0043cbfb609407d792c3a2db8f6287c5d61eb82b1516605a,2019-12-16T20:24:14.587000 +CVE-2014-9636,0,1,c311717c6eb0538f616652c1ce082b459f72f344c8627d039efbf8275cc71260,2024-11-21T02:21:18.103000 CVE-2014-9637,0,0,c01b321ad33ce0aeca7f5e4c09349d4dcd029349f71f316f6dda37f597f48164,2017-08-30T01:16:52.017000 -CVE-2014-9638,0,0,fa4e34e9518aa464f11cf72cfb91da6dd65cfefeb9f1a7a2c0250648820ba94a,2018-10-30T16:27:35.843000 -CVE-2014-9639,0,0,4b1e187d1c770d90eaeb54bb567a914e9301647e5df9554f2d5b98b745548697,2018-10-30T16:27:35.843000 -CVE-2014-9640,0,0,35a05ed2f502cb18ef2aee05a040acf552dcf4504d0720d3b311cd5fae474f0d,2018-10-30T16:27:35.843000 -CVE-2014-9641,0,0,c696bdb8677949df319416e04cf5c011c3a8be9bc7bdbdc27bb58f1cb453b920,2015-02-09T16:02:16.967000 -CVE-2014-9642,0,0,0b7f6f7c7bc7512a53020400edcd25d8928610c5552b300a55edf317e06e7a29,2015-02-09T16:09:34.770000 -CVE-2014-9643,0,0,8e56786f30e830e26bb9217e8e173476abb23bdd424823dc74106ae6e69b9d9d,2015-02-09T16:09:53.927000 -CVE-2014-9644,0,0,19ed760f7d4e94140c9dfa01153d4b2a39bed0dd2a370c101e0148d4367190ea,2023-11-07T02:23:09.017000 +CVE-2014-9638,0,1,4baa886b6d1207ef20e4872e4e08474cd4a2b47d57f1c0016dfd2d37dc336a48,2024-11-21T02:21:18.423000 +CVE-2014-9639,0,1,1869acee112059a1a04f9211a56d738e986cf6b45081ca45b31a7118b3ce7efe,2024-11-21T02:21:18.553000 +CVE-2014-9640,0,1,76bf5a7c0138cfa4a96f8dbb9a47959f1f18b3fa578dc40196bd2d73fb5b4431,2024-11-21T02:21:18.670000 +CVE-2014-9641,0,1,ef33d6ef692fdd6d4e4b611a2f3efb68a98ec9d8572503048510c97902789413,2024-11-21T02:21:18.827000 +CVE-2014-9642,0,1,469ef0d7058d0cb3ced1f38858872c93bd84e3fccd8266d5838cdf41fd4634b9,2024-11-21T02:21:18.977000 +CVE-2014-9643,0,1,b1cc4598e0c1c6cd8add81020b028c9c2c31e64d110c8c69abac20f80ed756b6,2024-11-21T02:21:19.143000 +CVE-2014-9644,0,1,9ee8513ecd2374d9f09c9fdec6ca0af0c257e1998f383125f350194af683e9b0,2024-11-21T02:21:19.303000 CVE-2014-9645,0,0,f296b741cd838764d1041f0c2859a7cdd4dbeb91ce529f44c2e3bed8f02fe8d9,2019-04-03T15:29:00.447000 -CVE-2014-9646,0,0,b950d64a48fbb389961d2ba87096f2719bf5b30f7fed06bfdc5013e4719a6033,2015-02-21T03:01:40.627000 -CVE-2014-9647,0,0,f9289a9aeedb3ac4ab881176ba611baf641af7417c5468692737b6a060fe027b,2015-02-21T03:01:41.597000 -CVE-2014-9648,0,0,288f0371d0c28bcb1918988d11263b99ef28a070bde9a30b724839948819715d,2015-02-21T03:01:42.547000 -CVE-2014-9649,0,0,ee8e8d1164165c0c1c28604ff7d3740bb9683769dc91293f4611f14e9a1689fb,2023-11-07T02:23:09.137000 -CVE-2014-9650,0,0,c4efd7c49af2d59b5e9380d07b289de9def1e31389decea86bfba0063798f15e,2023-11-07T02:23:09.237000 +CVE-2014-9646,0,1,942ed01d8a2d4658921a7970a93e06b666ecae97f6c6a8bc7d69295805837d5c,2024-11-21T02:21:19.697000 +CVE-2014-9647,0,1,8d00aa06b906c401994c95dd073003205389344d50126b9c2d91d87a69538aa9,2024-11-21T02:21:19.850000 +CVE-2014-9648,0,1,b66250606d3a8074164ee3c95a321fab6ecd2e443fe20a153044fb6b97b4f5a1,2024-11-21T02:21:20.003000 +CVE-2014-9649,0,1,07d07599e392bd77cb2158652fc6074b43f51e2c6d490798cfc4320981a837f6,2024-11-21T02:21:20.157000 +CVE-2014-9650,0,1,b0233f7b1646927721cf4310221c3f452cc1e376c698a0d4133117f725f708c2,2024-11-21T02:21:20.307000 CVE-2014-9651,0,0,766535eb47261c9645939557526a1483d2ed044ab0cbf4ce67a2755dabad14d8,2017-07-01T01:29:09.623000 -CVE-2014-9652,0,0,0b9dffda515ab7b728760db86526b690ef1dedab365de064dd63f458f3ec0313,2017-07-01T01:29:09.687000 -CVE-2014-9653,0,0,a8cf66f69f55bde3a68fe44689ebc5d9ef3b0595be7a3063f01f9fc9c9cd3005,2018-06-16T01:29:00.837000 +CVE-2014-9652,0,1,72867d3545e7c4fa1f270dd6e86913c9ff390968a89f3c30da4dfaacd25f5740,2024-11-21T02:21:20.620000 +CVE-2014-9653,0,1,d81fca0119df8ac2321a7a893e52ff3055804529a94f74480b948c81a5f91658,2024-11-21T02:21:20.830000 CVE-2014-9654,0,0,8e9573b58d3fa42ab897807f6168c7ef6f45e1a4f0f5c9e9fa2939eb5fdc3b31,2019-04-23T19:29:22.083000 CVE-2014-9655,0,0,6c89d0383b97e36b086748f19d43f57ffb24aee5da606c27a1b8d02982397342,2018-01-05T02:29:57.557000 -CVE-2014-9656,0,0,242b411da196036891ac322aacd039bdc19d9c0cc5dc34e1bf2622d2036e1211,2018-10-30T16:27:35.843000 -CVE-2014-9657,0,0,dd3e0d5f01f7dab9f484c86f258c3166aeb56253ed994feef1fb640ca3688735,2018-10-30T16:27:35.843000 -CVE-2014-9658,0,0,063cd449526d016119f666eed54ee06eaa7b5c8135a71b116a2e0a92dc78a55a,2018-10-30T16:27:35.843000 -CVE-2014-9659,0,0,71fad14fd800508849502ecb99cf5bb7e51d70d539edc9d4fae0dcc84aa61e2c,2018-10-30T16:27:35.843000 -CVE-2014-9660,0,0,511b5fd244dab123f7025d3ee639277bd988b919b75f5065350f1842052d8214,2018-10-30T16:27:35.843000 -CVE-2014-9661,0,0,f02aee81600f8139b7d2078d92737cfe819779415521df37caf959a84424b988,2018-10-30T16:27:35.843000 -CVE-2014-9662,0,0,7de277812ca446b23a7b43a9946c057b20de80ae1916ce41fc406fa1b235da8c,2018-10-30T16:27:35.843000 -CVE-2014-9663,0,0,a6469e738287b91dd229825baa188dc856ac776218ba9050c723cce1d481b194,2018-10-30T16:27:35.843000 -CVE-2014-9664,0,0,ec09a76f66e47bd4f83483c82269399bed3f98c718d9d0bb76b25674b2847176,2018-10-30T16:27:35.843000 -CVE-2014-9665,0,0,74ed1d223b96d1067221d94512b35d7a9aa5e1a1fbb8d0785eb55f65fe92243c,2018-10-30T16:27:35.843000 -CVE-2014-9666,0,0,0f2322dbc22066dad23bb3953a54d98b7cd86f9c4b87a7eff9165370aa61ede7,2018-10-30T16:27:35.843000 -CVE-2014-9667,0,0,f97d0610f31fa52a53b95ad8c125640237211515347922824e0befb228a22649,2018-10-30T16:27:35.843000 -CVE-2014-9668,0,0,41003569ac71c15eacfb10cfd6ba8172d900578b726453e4b49c5e233c034668,2018-10-30T16:27:35.843000 -CVE-2014-9669,0,0,39510640a945cdbe05e2d8b8bed683f26ec3c3370006abb0d2e839f8f35a35bd,2018-10-30T16:27:35.843000 -CVE-2014-9670,0,0,8f64db8214ecee21d1827f5065b51194d8586315035d59814f82bacf08c89410,2018-10-30T16:27:35.843000 -CVE-2014-9671,0,0,be35479f5cba219b7b7b6231f0228567c7113ce170b39fcc860d4f05b7fa2561,2018-10-30T16:27:35.843000 -CVE-2014-9672,0,0,165d4f143d6bb9ce8d4d4950c6bdfd215b1666f64568c58dda4def3c9b3d5542,2018-10-30T16:27:35.843000 -CVE-2014-9673,0,0,605fb1e49927379bc1ce8dab4472db6b44c8aca6b8d943553b5c274b0e866e37,2018-10-30T16:27:35.843000 -CVE-2014-9674,0,0,5409d2e6980925c664d8c4e00af22d0b37ec6d3af875655fe433bd9a3ffb71e6,2018-10-30T16:27:35.843000 -CVE-2014-9675,0,0,8823c8bd45b919e77b838baa23de1ec8885eb4d7335440b4b0eb9af4b41383db,2018-10-30T16:27:35.843000 -CVE-2014-9676,0,0,c893ff426ddfa169c1ee050a25a5133217c42ccca87e61f552d76adc0987ff8b,2016-11-30T02:59:08.390000 +CVE-2014-9656,0,1,331350994ca0dcfcc2910c237cc1dd5f8637a40dd33153ee02f8e6bf1a4a806e,2024-11-21T02:21:21.357000 +CVE-2014-9657,0,1,f220e628beecc5bd94b84ade44abc78cca4ab69fc62f01057e3abd4c28258400,2024-11-21T02:21:21.543000 +CVE-2014-9658,0,1,da40e8fed59839ade277cf7b1f79ae553bad3384d7782e655ee6e4abcf981c6b,2024-11-21T02:21:21.737000 +CVE-2014-9659,0,1,76bf87b8f0a528fe5d76c4e4565c4d521305d936ebc105516d9ffaa7eebad135,2024-11-21T02:21:21.923000 +CVE-2014-9660,0,1,893bf7ec99f4df65066c4648b48f9ad462e639a99434638d403accc63429f5c6,2024-11-21T02:21:22.077000 +CVE-2014-9661,0,1,5ed209c2d7046525e4c86761f70de355633f37d744234af955cdbcf0477ce726,2024-11-21T02:21:22.263000 +CVE-2014-9662,0,1,bf64ca88cada82eece325d660488c6e842a23214afba3a813747b5f392fc4fe5,2024-11-21T02:21:22.443000 +CVE-2014-9663,0,1,c7415445f8238feccf51fa43543e8e175217e6051a09f43d7775a1d4293634f3,2024-11-21T02:21:22.600000 +CVE-2014-9664,0,1,769fe9b41ce8bf08c4bc1dfefdd7a85bd2c8ede2a0e314add0ccd097ca1a6057,2024-11-21T02:21:22.803000 +CVE-2014-9665,0,1,0f47b1d57096eb011aad15af5ff334685ec2a8b77b525b7f2d5f7aff558c4eed,2024-11-21T02:21:23.033000 +CVE-2014-9666,0,1,e95ca15e86bac55f7828ec902bb4507fc3b2f9bd4f7faeaeaa7a30ead6dbf435,2024-11-21T02:21:23.207000 +CVE-2014-9667,0,1,835d5ba96ba749203fa1349eb16a80a47baf1371e812f248b6e1f48e2da19dea,2024-11-21T02:21:23.397000 +CVE-2014-9668,0,1,0b7e5b4cc46dfbb7b95c480908f384519290b0cf58aace4388619b74fa8f666b,2024-11-21T02:21:23.580000 +CVE-2014-9669,0,1,83114c806d0f5b25e497bac443464908aceb26fef21af6d054cf8fa3f1ca693e,2024-11-21T02:21:23.750000 +CVE-2014-9670,0,1,c157f330b0aecc031571cc36f91714e2f93877ff869ac3f4d5989e7d1f1af019,2024-11-21T02:21:23.937000 +CVE-2014-9671,0,1,8b3dfe1c16271e8c47a8f7f1f0a4696dc8b780e5b078d215dc0708cdb7aa8d2a,2024-11-21T02:21:24.130000 +CVE-2014-9672,0,1,015983117d950371d5887e1887268ee6cf35f2484c61d2e9dbc88ef04b34f0d2,2024-11-21T02:21:24.333000 +CVE-2014-9673,0,1,b2717c3cc4c8d1f3f4a3fda946bdd360558fac1d79618981d7b71afb29c3d944,2024-11-21T02:21:24.520000 +CVE-2014-9674,0,1,763cedee685c6b42070a605b1a9bdd760babe98f6422dad5258ab700c2f44281,2024-11-21T02:21:24.710000 +CVE-2014-9675,0,1,90758c043fb09e14a9b3eaa508c1f4f79231f513e7480ce48a432d5bba2f7c22,2024-11-21T02:21:24.913000 +CVE-2014-9676,0,1,f2339450ee9deed835442a6943231f2c6ec0b2fb51cebbcc144580f26fa6d00d,2024-11-21T02:21:25.093000 CVE-2014-9677,0,0,6fba57dd41296fa8c3ee26c8636d795744ca22b619bbd330cd03185b1d7739c5,2017-10-27T14:53:48.930000 CVE-2014-9678,0,0,b735b137cfd4058aa0bf28a255240e824c09e9fda48d9a0bc4a0707530c23339,2017-11-08T18:04:16.590000 -CVE-2014-9679,0,0,d49ccb69cd05dbede1d8c810970bdf30b93f267049795f02687aa58258f3001d,2018-10-30T16:27:35.843000 +CVE-2014-9679,0,1,83da5ad75f12d118370577e70fee8262842798100cd7d84b65be0ee7d397b922,2024-11-21T02:21:25.603000 CVE-2014-9680,0,0,ceb16fcb71176e4c7c38d7eb05998aa9f8c8e864766af11d5fd25315b3e979f5,2018-01-05T02:29:57.617000 CVE-2014-9681,0,0,4371664e2e155a4f7b79c3b4a208f7061351eec4806ba266db42df625abe6db5,2023-11-07T02:23:09.683000 -CVE-2014-9682,0,0,d010553e6479fb90d77926343278c30878c76dcb2393023b7eea3625bd25b1c2,2015-03-02T20:26:09.110000 -CVE-2014-9683,0,0,38c667148a9b0d7ca9f166ce1cb906c9d5ae7521ea3e00d6db2ec4f0804771b6,2023-11-07T02:23:09.753000 -CVE-2014-9684,0,0,26af3a673e35fde1ab62290f23d422dfa9b2636b16016c6b27f9b9f0705cd1f4,2017-01-03T02:59:27.127000 -CVE-2014-9685,0,0,1fb441b48bb2dde4d156a2fd332eabb7f4d750f7e6aab775fe1f494de2cbea4e,2020-06-04T13:16:46.677000 +CVE-2014-9682,0,1,c21728767d5509e5d5a81aa10d0e8f63a1c8702551581071e1ba7ca1da45375c,2024-11-21T02:21:25.983000 +CVE-2014-9683,0,1,3812180dbe3ba360fa3e584ca8f2676abf4541e30d1fe7ef822fb673a64b32c9,2024-11-21T02:21:26.150000 +CVE-2014-9684,0,1,e24f11c07cb4bd2f6013073db411003aa09551a15a990743d7aae6934db04b8b,2024-11-21T02:21:26.357000 +CVE-2014-9685,0,1,66db48ad3f4a1305990b6c6aaa52d2328d989fa99f09f71d484cf647c66b65bf,2024-11-21T02:21:26.510000 CVE-2014-9686,0,0,18dfeb695d3411d7dc10590ed78d77f106c2f2334145cfc5b77b3ffbd939e59d,2017-10-06T18:03:15.213000 -CVE-2014-9687,0,0,002043772b0c305db4e141c9c6727478c368e1bb0b4c30623ceb40821c95eded,2016-12-06T02:59:27.990000 -CVE-2014-9688,0,0,9e27c39ff973a607c4f1a95cafc628d1eb4d8b630038ce25a62b54e2e408f2d6,2015-03-05T18:00:12.373000 -CVE-2014-9689,0,0,7aef53c28bc4bd9bb5ea0ca49b080209bb1cdc4860bb2b94badf792f056759d4,2015-03-09T17:51:13.727000 +CVE-2014-9687,0,1,813f53f4d086be24e0c844ca0e56280570ed9a3ba3d0f2f27d1760f4cca44b4a,2024-11-21T02:21:26.807000 +CVE-2014-9688,0,1,28997c043465dd761746d6e0a109f32d6e8e4dae14b093058f9fc50ea066d4d1,2024-11-21T02:21:26.960000 +CVE-2014-9689,0,1,ceae939e9b86e2aa0b78a679c01c67914684f6463194de525065d88662c4a76f,2024-11-21T02:21:27.097000 CVE-2014-9690,0,0,c1dc2010bef07460c4cfadfdab1ec12eb83d1d373a66ef05caa3a93092a4a64d,2017-04-05T18:32:58.193000 CVE-2014-9691,0,0,75eb65a1bf9e2e84c14c65f8e790970f25bfa3461e2824e5b497caf6b52f5e3e,2017-04-05T23:59:38.847000 CVE-2014-9692,0,0,3632a5695a1097a2dc2b2f18181e1b0eec7751f109c7afa6baf066dcf14db5a8,2017-04-05T23:53:04.640000 @@ -73185,20 +73185,20 @@ CVE-2014-9697,0,0,2ba4d7db06c7db3c3554aa0ab48a4621ad4071f6fa59efbfebc5b89c0a3fc6 CVE-2014-9699,0,0,bab64936f3d25776a1861ca788081c2d78cb3e77a08c901d7bf7389bbafdc237,2019-07-03T13:59:42.127000 CVE-2014-9701,0,0,33b563f0fecf3875258160053860268c17aaa40ded6a5ca648578152715f0238,2017-08-17T17:49:02.840000 CVE-2014-9702,0,0,aba88cd35cd00f7fc798f013b969aec4916bb411cf79715d8d1d1098104b1598,2020-06-04T16:10:55.837000 -CVE-2014-9705,0,0,ffb3dae1b24ae854b6e18b384a29397ee8e29f9e01d80c35073a4ec6fd914038,2018-01-05T02:29:57.697000 -CVE-2014-9706,0,0,dab087de637f6b43c09aedf7472b036f0a3d789fc04a22c39262cd1c4a35c9d0,2023-11-07T02:23:09.983000 -CVE-2014-9707,0,0,f3f0da0dd23176009bff7b48793751e03810f0cb1f74e70d9f379145a5f7b68d,2018-10-09T19:55:10.497000 -CVE-2014-9708,0,0,a58485dd5d13f63313201e171ccbf4c7071f2f78afb86fdda3d0c62c0b05a8ea,2023-06-22T19:49:41.650000 -CVE-2014-9709,0,0,522fd8cb1ed3ac15385200e838c2f111b54be02bf3dbdc2c42e4561b41bea449,2022-11-09T03:04:19.033000 -CVE-2014-9710,0,0,f514e062cb8031246b8fab363c970bc7255f8574eab40cdc6d15e956627c3fbf,2024-07-17T15:28:07.730000 -CVE-2014-9711,0,0,74ddc290b0d1e2a5603379cbfcfe3b06afce0cdd6e5c04339b6543682c30ea3b,2018-10-09T19:55:11.637000 -CVE-2014-9712,0,0,35c320e642c4b46324ab583a30f538ccf7280d37fff2ebe44a09a52d0a4799e0,2016-06-23T12:00:12.700000 -CVE-2014-9713,0,0,74f4c7c34888648b86caaa075d3e9cf7c284e774722aeec4d6562e6b7b33af53,2016-12-22T02:59:22.157000 -CVE-2014-9714,0,0,c70d271491231bd07d83ad4d160c00415f0ab101c4fff78bca1eced115b56d68,2016-06-24T15:55:49.237000 -CVE-2014-9715,0,0,14a9d045994a09e3e32a8bcb27540840c164a362d21e7e5cbb0124ced3ddbabe,2023-11-07T02:23:10.130000 -CVE-2014-9716,0,0,0600cd1ff620e3f864499f4a3377eb420380699adb45d92ebbecdaa7682ca077,2019-01-30T17:56:46.207000 +CVE-2014-9705,0,1,d16d0e55318ddc73fdfed31d5cb0b26c1b8b1679513488c916bcd05efd594ae3,2024-11-21T02:21:28.890000 +CVE-2014-9706,0,1,4d8a3c78906d7488e1f848a13cdfbf9c53db3c40caa5fcf6237f27b1540ed266,2024-11-21T02:21:29.100000 +CVE-2014-9707,0,1,f53006fa4905a4d341f183be72c59e0042500fbbc1db9ef86ff32a186a7c33eb,2024-11-21T02:21:29.230000 +CVE-2014-9708,0,1,429c03c79e488d5062067271a07eca4f4963dedb11fcad97a7788d71c7cce0c8,2024-11-21T02:21:29.390000 +CVE-2014-9709,0,1,e139e627574869f489071b221f98252119962027e56186b76495f587d1f0839e,2024-11-21T02:21:29.703000 +CVE-2014-9710,0,1,91e7deadf386ac4935510a2ff9ef72cbb849b691b422db9a85d817e0a9d2b773,2024-11-21T02:21:29.943000 +CVE-2014-9711,0,1,dbabd38b323d3e4a206a6f4d5fa8791bf768ddba1847457fa91634fa1e1bb147,2024-11-21T02:21:30.093000 +CVE-2014-9712,0,1,f0424b76c9a2626c01df9546d3b82f45e9e0355ccfe1936b0cf5c0026852a978,2024-11-21T02:21:30.277000 +CVE-2014-9713,0,1,219d59324a9871db6eb329bbbaf43f25436696912b9e56ed4543c1e37ccc24c7,2024-11-21T02:21:30.437000 +CVE-2014-9714,0,1,2a01aa483441215962e8fe94be8c405e7d4f00cf7e581c6b9a7d75da876c2249,2024-11-21T02:21:30.557000 +CVE-2014-9715,0,1,46454936a0aec4b08a4f9a5c152306a60ed899c60798e936df063c49df7c3f5b,2024-11-21T02:21:30.750000 +CVE-2014-9716,0,1,7cf5fbb95dae5b15628ca805a464d9d5d677853bad374313389913cf8dbede8a,2024-11-21T02:21:30.927000 CVE-2014-9717,0,0,15af9978e3b0d8f38746dc65e766023545130f29d031ae7afff1d66d141fa279,2016-08-12T01:59:05.210000 -CVE-2014-9718,0,0,6b85d10caf24d9fe8ae9d777b7f6972b56efaef89f1b38c2d8b232334a52eefd,2023-02-13T00:45:32.650000 +CVE-2014-9718,0,1,57d2ee23322b40fba499f5b2ba882a306c9563971c071419af678f46bc2964fe,2024-11-21T02:21:31.253000 CVE-2014-9720,0,0,59a821063dc31f495b6d1859fad2ea7c778dc68824d15caa3abd87b800565900,2020-01-28T16:42:34.383000 CVE-2014-9721,0,0,865c0c3d5da61b2b75af2574cf5be14fcabb1083012c81e694840dd6b653a537,2017-01-03T02:59:27.173000 CVE-2014-9727,0,0,d6f0cbdb4e340827fab449c4c3b7aee5e48d3b1c545f13d3967dadb45c342868,2023-11-07T02:23:10.243000 @@ -73466,203 +73466,203 @@ CVE-2014-9998,0,0,b26ec1897f7fa7cc6800f6737b286dadf7c8d9828593218d53465834f1a868 CVE-2014-9999,0,0,e70159e3d480509281e05f92915b1597f5481a030f071a3d1c2704a451fb2fec,2023-11-07T02:23:13.957000 CVE-2014-99999,0,0,66cbcc9d491bc90abc4698047fa4bbaffe0716fc44f5d24b37eea28d475168b8,2023-11-07T02:22:57.133000 CVE-2014-999999,0,0,dfec4f27d40687f2495dfbf2fa4206e25c634cec77490a098fcdd2cf5d3baab6,2023-11-07T02:22:57.097000 -CVE-2015-0001,0,0,0e817e3ffa0202b9d6646988dd00048ee3b7c5c9312d7fbdb76e7c88f7369b25,2018-10-12T22:07:48.240000 -CVE-2015-0002,0,0,f723555ba0a1efaac00e63170b29ccb5fcff842fa906e32ee321179e4d4801ed,2018-10-12T22:07:49.053000 -CVE-2015-0003,0,0,38a45e2431a8a87869e7cc2eeabd3e00ed7b3b2fce19eae0f6758047fc9df19e,2019-05-14T19:39:48.313000 -CVE-2015-0004,0,0,92a458da08d1455689b923dfd1e6a35e8a916a11f1ff0181d25497f64dfba502,2019-02-26T14:04:02.387000 -CVE-2015-0005,0,0,5dadb29f7121145299ff2285dfed1bb03fdbf98388530e4fe06c90feef42ce37,2019-05-08T22:03:15.720000 -CVE-2015-0006,0,0,2cbf5c62cc1b3edde20e2116da120242a9d3209f480c1cd84f53f0b0958f8200,2019-02-26T14:04:02.387000 +CVE-2015-0001,0,1,e10e8389ddb2a61e5a59722284be296b59c6f1a090aa7df1595a9f208bc3133f,2024-11-21T02:22:09.790000 +CVE-2015-0002,0,1,97de336ecf85065780b113c07a0e6bd7a6291a6e79739e3ebc13b508cc7682f9,2024-11-21T02:22:09.913000 +CVE-2015-0003,0,1,a01246b0c7ddbca102870f8db2b823c8fca384a6237467996bce19ec66592656,2024-11-21T02:22:10.043000 +CVE-2015-0004,0,1,3ebcac432991252fc5167e37d4256e226607724a18415a451e0ba8e03beed982,2024-11-21T02:22:10.170000 +CVE-2015-0005,0,1,f56b1314025b697085bb09e27280b4427ff334030ac04033f4f4fd17667f3071,2024-11-21T02:22:10.293000 +CVE-2015-0006,0,1,14a8e959ece1e435f3672fe941053c7b9a20560c4c3ab9b898ac2f1355e18083,2024-11-21T02:22:10.427000 CVE-2015-0007,0,0,7eef119c077408d0293a09120d80ecc55d7a9f39216d3e3075449980670c54ce,2023-11-07T02:23:14.037000 -CVE-2015-0008,0,0,b24c92b4012d51e1d172a59345721b4542c9f2c276cc7bdb70ae9b63e4aff255,2019-10-29T19:15:13.547000 -CVE-2015-0009,0,0,792d6f2e5cd067a17c5c0e16f603216cb1f51ca3aaa8cbfa44912a52f347fccc,2019-10-29T19:15:13.890000 -CVE-2015-0010,0,0,ee5a7e6b7e15e860bccd89671cf2d179607db88b05c68c080b52369c53b39ee1,2019-05-15T17:04:22.547000 -CVE-2015-0011,0,0,5a885acb7e55593125d8ea56eb5fd8f9e7e4edaaecd63199220219a0141c33d4,2019-02-26T14:04:02.387000 -CVE-2015-0012,0,0,68ade293cbe21e983f890c1a8ebf7eb200ff57edef9d5706c3382b80e3a62b4a,2018-11-20T20:29:31.673000 +CVE-2015-0008,0,1,d7f975c419f19c2f897ec8b84ddd85122d656ed52c466156b87d1c7ee1ce6f9f,2024-11-21T02:22:10.560000 +CVE-2015-0009,0,1,3700b693092466fe321522249e164b9020d8f12232cabe0c6f7f09f700ab3276,2024-11-21T02:22:10.690000 +CVE-2015-0010,0,1,ce828af772d42f424eaac5393c1f57b0889e025fd2bf207ed9945f93f3d23c8f,2024-11-21T02:22:10.820000 +CVE-2015-0011,0,1,7fa79c1992c01a9ed191df482b8a9ca1af83fdefd949f2358ca4a04cba48b40c,2024-11-21T02:22:10.943000 +CVE-2015-0012,0,1,5bd126c422e0834ce6013e33c72a2ccc4bcc23c12cae83c8ba3f261f48ab2f7e,2024-11-21T02:22:11.063000 CVE-2015-0013,0,0,68d8eded47fb96931f62948bd08869621666cf2f6cbe49f092f3faf92359bea2,2023-11-07T02:23:14.287000 -CVE-2015-0014,0,0,6f0a11e0e8724186b937401cc0f788160831431a27a66325b886ba6d98540ba1,2019-02-26T14:04:02.387000 -CVE-2015-0015,0,0,8f7fbc7304cff4cc9ec0d403beb0809d66a9e4d84bb8d4d46838bb9b7e1ac1f4,2019-02-26T14:04:02.387000 -CVE-2015-0016,0,0,657da6087d601d50c38eb30ac0a61c768cc1dfdc7a0a3a143f004e5b43d4f8ad,2024-07-02T12:18:05.317000 -CVE-2015-0017,0,0,838c3c5eb1eeafee501b9cacdcd1f8ca19f3fca05e89f7e44eb244c32e517f52,2018-10-12T22:07:57.897000 -CVE-2015-0018,0,0,e8504d601c81daa9016e95fa072e9ce9772f4ac4332151844480259f1875c4a6,2018-10-12T22:07:58.210000 -CVE-2015-0019,0,0,cd62d4930df83622b0c01e8badbc7bc3f1ac00643de5a7915e22e61545fbe67a,2018-10-12T22:07:58.570000 -CVE-2015-0020,0,0,6b476047f02f155d13ec069c8d107ba5249deda6960b6b0f2d90d78f0bb23a9a,2018-10-12T22:07:58.927000 -CVE-2015-0021,0,0,73d037a51f9edc3036d560d9f411da6768f140387a16210c93b1125016d18911,2018-10-12T22:07:59.303000 -CVE-2015-0022,0,0,3bedbd4786e0d8cef8982a62a7b9433b8058f7043523685c359b08519d86aa4a,2018-10-12T22:07:59.617000 -CVE-2015-0023,0,0,4329a78b41ddeb2ee9799d6091ec956b0eb58b0d190e31c09fcee83bcb400339,2018-10-12T22:07:59.880000 +CVE-2015-0014,0,1,15ea2f3de5c0eb52b959a0605651bdc65924402726d332fa1f45547972d1548b,2024-11-21T02:22:11.223000 +CVE-2015-0015,0,1,9bb9c9991fe76a4f8789886bf4da9be72c11d57d7a2e0f001992d2c67a23792a,2024-11-21T02:22:11.340000 +CVE-2015-0016,0,1,4b0adfc86f210933be16f89ad715363aadee4c13ccaa6e728639c1fac5e84a77,2024-11-21T02:22:11.483000 +CVE-2015-0017,0,1,68348173fc535e37c81685565f3323183581bd38e262b508ac3dc877f8f098e4,2024-11-21T02:22:11.637000 +CVE-2015-0018,0,1,627b4874972781b2dc89a6c3b76531763a9939a2ca74cb48dc5af5825aff9ef6,2024-11-21T02:22:11.763000 +CVE-2015-0019,0,1,366887341e51ac010d71d5906f1be652b33992665b99621ad59c5aacca1d1ae8,2024-11-21T02:22:11.890000 +CVE-2015-0020,0,1,68317f7bd0d011c7c9743713582a32b31b41589fb39a2ab893066433c6899d89,2024-11-21T02:22:12.017000 +CVE-2015-0021,0,1,aae95ae650be093392813fab79aa0e74fa06fcb3b8d2fe8babfc0d597a8f005b,2024-11-21T02:22:12.143000 +CVE-2015-0022,0,1,bcdb3e4cc5abd56e72fa37248fca8750fde629054e39047d0bf708bfc644b162,2024-11-21T02:22:13.740000 +CVE-2015-0023,0,1,71f6723910c10827fd5ba03947e210d47b7637c16822cd9eb6f9e670f47240ff,2024-11-21T02:22:13.857000 CVE-2015-0024,0,0,778c8f3980dd72cca35876534a6d62ba5db50052026543112b4016f48db91839,2023-11-07T02:23:14.567000 -CVE-2015-0025,0,0,29fb364183ddc976ae271effe248aeb62ad79eb1190dbf00c34a1f70fce050dd,2018-10-12T22:08:00.287000 -CVE-2015-0026,0,0,8cf4246c2184dada5ba2ea1a92796e13a5193ae6af6270360474a17730f6e0be,2018-10-12T22:08:00.587000 -CVE-2015-0027,0,0,5fe09e709c0a2007496f77c2276aca65a89d5a6049ca488a653cd88cec894632,2018-10-12T22:08:00.927000 -CVE-2015-0028,0,0,e0094fb3d07b193fa8528749e48c73c1e75e83619a22848d785aca4cec3920b3,2018-10-12T22:08:01.273000 -CVE-2015-0029,0,0,10fe5584341a732fc310b08c0de53bf461a1cfbc42dc8228afb58feb0bebe16e,2018-10-12T22:08:01.507000 -CVE-2015-0030,0,0,23c3be05fffe7afecf997dfae5bef5cdfa6c782af880ebdceb47e13c31eb7a7c,2018-10-12T22:08:01.740000 -CVE-2015-0031,0,0,a3f2df76dccda3405079808de88f7ea5fc786356be2408d865175f3cc2df95d0,2018-10-12T22:08:01.990000 -CVE-2015-0032,0,0,d058ca4cf3fbdf4fb18db3ac8a41870a9630c02b9c916ab9cd6939acb4d2c692,2018-10-12T22:08:02.303000 +CVE-2015-0025,0,1,16f05982b06259f29b59f0355a4f9fae17ec62d52d6ce813aa587f8bba73a9c4,2024-11-21T02:22:13.990000 +CVE-2015-0026,0,1,8181be9bfe8c86e581015e6b5a02de76c61522131fc12740689115fcd5b3524e,2024-11-21T02:22:14.103000 +CVE-2015-0027,0,1,1b6c8a7d1d23e532e76d93c97cc3f3fcb3ff5654ba5e9fe88de4c3dddadf47bc,2024-11-21T02:22:14.213000 +CVE-2015-0028,0,1,70bf2cffdc864cdc1791332635413686444fb524858a2101d64de16c606336d6,2024-11-21T02:22:14.327000 +CVE-2015-0029,0,1,f0203c423c503598cca4caa9a18e6671c77a44ae982258ce11cd4d2e0d0f113e,2024-11-21T02:22:14.450000 +CVE-2015-0030,0,1,169d7f5433eb167f1a492b50b17c57507c61d262747264f4bc84c5d3f7a0e41b,2024-11-21T02:22:14.563000 +CVE-2015-0031,0,1,97ff1368643b7a045b009fde7700bb85465fdea90a5f7e0045ec95f187b54009,2024-11-21T02:22:14.680000 +CVE-2015-0032,0,1,7427747c48c09cc69029cd1199f6e25d7e69f5e793a94a6fc8827f596ffa43b3,2024-11-21T02:22:14.793000 CVE-2015-0033,0,0,7bfcb28f1d5963a29e6d5aadde15dd63bf6a193729259166cb3c0a366f155134,2023-11-07T02:23:14.850000 CVE-2015-0034,0,0,b66b38bd70a672a284f390ed4d22dd36adc53140ca457297182d86d87bff158c,2023-11-07T02:23:15.053000 -CVE-2015-0035,0,0,7ea28b944fbebe22d21b76a3cc4779b6b62ece2f25aaade5fa675234b551b3ab,2018-10-12T22:08:02.897000 -CVE-2015-0036,0,0,45d57078b0272e3010adff30c87827017f6e50e243a3dceffca59a09dea51bdf,2018-10-12T22:08:03.257000 -CVE-2015-0037,0,0,418cda3edd7674cf4380090a57d48db0ec21e6df77e4d90405ec6cb57f737a2a,2018-10-12T22:08:03.663000 -CVE-2015-0038,0,0,dc03c1befef787319c0df606b1233fcf1e03c2acf885509246cffd9e2f4063d7,2018-10-12T22:08:04.023000 -CVE-2015-0039,0,0,558dce2da22be867e3d0899f82efed4e43e87b436b9caf95871ee79875995f53,2018-10-12T22:08:04.383000 -CVE-2015-0040,0,0,bfde8048cd848b669fda87d7df0459d3bb2e730e299d5e880bb384ef985e06e8,2018-10-12T22:08:04.633000 -CVE-2015-0041,0,0,0ca958a61703e1201f8725f9f822cf182cfb73dd4d8b1692837d704ad6a14bfe,2018-10-12T22:08:05.163000 -CVE-2015-0042,0,0,4b1aa3add25c23f9b11eca902a26923892938b74ddb65730b9d56668d4b3fc40,2018-10-12T22:08:05.443000 -CVE-2015-0043,0,0,68db8c56bd528d0441e3a879a7d99eabd6e60a718c9b6d1ba893dde90ef0fc59,2018-10-12T22:08:05.787000 -CVE-2015-0044,0,0,7c7d5b92920710f6e1a18bc8e7ad9e61436c8845922747863c1dcc6abac8c206,2018-10-12T22:08:06.087000 -CVE-2015-0045,0,0,0ca875bee574d016390253e66c9a7ba2f6ab0dbfab4fafc23c663f297546130d,2018-10-12T22:08:06.383000 -CVE-2015-0046,0,0,a4550251cedd40eab010e8ece68100f0d3e510eab1d0c6ab55b0bc6b0f91dc6d,2018-10-12T22:08:06.727000 +CVE-2015-0035,0,1,e271262eec9ea86e48748f1b788b4886a1af0ae3f175acd8007985e7291a11aa,2024-11-21T02:22:14.947000 +CVE-2015-0036,0,1,92c8690db8f6e756110fa6b9b80166fc5c24be3bd3657f102b9e3ad9b33d4705,2024-11-21T02:22:15.057000 +CVE-2015-0037,0,1,d962d52abb1e809218260487606f0bb59c9866e5444f43d19f438c466d77b420,2024-11-21T02:22:15.167000 +CVE-2015-0038,0,1,968a98cd10a87bb8873284175951785601cbaf835c16fde16ad85ea27ac0c7f8,2024-11-21T02:22:15.290000 +CVE-2015-0039,0,1,2ed5b36872ec8ebf472a66d2d2c0e2f3d6871b2efe334712837f9e2ccda5e177,2024-11-21T02:22:15.410000 +CVE-2015-0040,0,1,11d86f77d020d0514599632c263abc2cbf1f545b49955e25cbf1f083961b742f,2024-11-21T02:22:15.523000 +CVE-2015-0041,0,1,3b7e72f0a4f0a1b387d162479c62c5408d8e4b74ea4648d056a214377e5673ef,2024-11-21T02:22:15.637000 +CVE-2015-0042,0,1,2a1b5a3b5c37dd1496b5813c8794de34007908e8fc3650472be5029927b3cf4f,2024-11-21T02:22:15.743000 +CVE-2015-0043,0,1,5c54e346f6012710e2aba9802a605a1a9f582c661cc75f3395685a90f6afd227,2024-11-21T02:22:15.850000 +CVE-2015-0044,0,1,6b45a8481cdc10a54990b54b440ca6633988048fd5d1f785408d3b7ecc595c1a,2024-11-21T02:22:15.960000 +CVE-2015-0045,0,1,1afed5351fd2f195a9f7438463e9aac58e838bced06683206c121ca4ef1b755c,2024-11-21T02:22:16.070000 +CVE-2015-0046,0,1,87c52a1592b9b8367499d37d7ce6afd54817887ef6f0925946eea39391d8b55a,2024-11-21T02:22:16.180000 CVE-2015-0047,0,0,1552aa42d2648b97aa964aa4c6f927c67430df90eb512a8665a9e9a5aacd4448,2023-11-07T02:23:15.417000 -CVE-2015-0048,0,0,2a61b15ea82bada043003be04a6af26aee5c63ca921e05774ac3667aa111651b,2018-10-12T22:08:07.117000 -CVE-2015-0049,0,0,5812511763df6c9e86f30a9c6d6657624885b5ffa90c0d69e01c09c6052dac67,2018-10-12T22:08:07.477000 -CVE-2015-0050,0,0,608ad1e49a9f4f648beeb2e4d40c8fe54d027da11d782aaf0e537a711880a428,2018-10-12T22:08:07.850000 -CVE-2015-0051,0,0,d0834d3bbe04ed9cf6a5aed4ed513acd0692ca02b686eb038f1da2943fbaae0b,2018-10-12T22:08:08.740000 -CVE-2015-0052,0,0,70e4353365e7bd5751325368f0d1b8b2f832d485339ce64f14592e5434bb21cd,2018-10-12T22:08:09.053000 -CVE-2015-0053,0,0,2da1473c907fe0fcbbdd4db7879df0c79aa8de3672d0e469776096c8697a7faa,2018-10-12T22:08:09.383000 -CVE-2015-0054,0,0,921833311dcd647df299ad0ca545184377fae3fc58d6dea2b86a9f604d88b25b,2018-10-12T22:08:09.740000 -CVE-2015-0055,0,0,14cf7ccddadb0b0b20f7b760160dc416a5d0cc064d7503cedba7a7aa37eae4cd,2018-10-12T22:08:10.023000 -CVE-2015-0056,0,0,17200d8b95c2ec2ed8d1b56cfcfcb054c3b18f21c4c5eab17ae491c1c1275745,2018-10-12T22:08:10.367000 -CVE-2015-0057,0,0,f3914c9be993679137434de91e0a19ce1fcc2f760441ad060620796af9103dd7,2019-05-14T18:50:39.423000 -CVE-2015-0058,0,0,85e2636249feaa96d6252a77720badd01c7d7d91344495aa5914c346d2325c82,2019-05-14T18:51:42.067000 -CVE-2015-0059,0,0,11142ae96934df7952854ddfdee7549a368cfc433d94ccd189bb64707903505e,2019-05-14T18:58:33.687000 -CVE-2015-0060,0,0,354529848d195f785dec7e6e38761910cb20725ea6f19bfa5e399ceb4b80bd4c,2019-05-14T19:01:07.927000 -CVE-2015-0061,0,0,9494ac03556dd26a1ed2779597aaef5b3958a39ea09f07dc8e6e34ccc0906d52,2019-05-14T19:10:54.283000 -CVE-2015-0062,0,0,1dc43a26898342ef04ab82404c77aa49922f10f3821b9ff190f5519b0f22db82,2019-05-14T18:34:21.100000 -CVE-2015-0063,0,0,c99d67382d5ffd573723b5273014a6c9af49c8a059fd2027748d83c045c61af8,2023-10-03T15:36:12.207000 -CVE-2015-0064,0,0,777c2bc66029c9fd8407cefba7a09e31d009bd48c778b001fb76d20e0bf1adb1,2018-10-12T22:08:14.727000 -CVE-2015-0065,0,0,0cdbc17c3c998089d69a5286840b9af82ddda101ae04641c79532f1e59de6cd6,2018-10-12T22:08:15.367000 -CVE-2015-0066,0,0,6c0e44b5ceb7734ce409b8e729937bb5cacc91fa7655c6962d2551aa6e6410d3,2018-10-12T22:08:15.867000 -CVE-2015-0067,0,0,364dd3bcd9fae1dffb3ef54c10c47b47f172156349064c111eec8d4b807ddd06,2018-10-12T22:08:16.163000 -CVE-2015-0068,0,0,695a33eb66ce4cbd6918d26ae0f7af7d0671e5bbfe7f119a51fb6ddf4dcc8f70,2018-10-12T22:08:16.447000 -CVE-2015-0069,0,0,1e8e25339a8a536cf5860e82e215fddd4fd7075c12683445c2adab319910fee5,2018-10-12T22:08:16.837000 -CVE-2015-0070,0,0,b1128da92ecc81f475d68cbc6021505b4d6bf765d5cc7f06495acdda44157872,2018-10-12T22:08:17.133000 -CVE-2015-0071,0,0,8424e2a191dd6c8de8f7c019a364067413c15b18789febd2f847efc255ebb8a7,2024-07-02T12:18:20.457000 -CVE-2015-0072,0,0,efdff85025028d2c3e18eba7414fc0c9e0727f78d7b4985806d16103385d4862,2018-10-12T22:08:17.727000 -CVE-2015-0073,0,0,863e372260cfbe8aa8b141850270e8c1bdfbf05b0e64b222d1a2210acd2a46cf,2019-05-14T18:36:50.477000 -CVE-2015-0074,0,0,5b43b9316cec840d3997efadc9f6507da7daa9640d1b7ae84835ef88c063d1f3,2019-05-14T19:21:39.627000 -CVE-2015-0075,0,0,bf182f336658782e17062b1406a8bf2ade5e5de6ad7d947407f21f75afec39d1,2018-10-12T22:08:19.853000 -CVE-2015-0076,0,0,745a8f35446cd06a2be85be11ed9b60d6f48f333dae9a6424825903b50d0849e,2019-05-14T18:38:11.873000 -CVE-2015-0077,0,0,2bf421aa0b4077cca3d308f12add705f08c3e8f7c7d9010bba65929b31d0e652,2019-05-14T18:58:58.407000 -CVE-2015-0078,0,0,74d96e88756d4ce88662b83dc0b6de269802ee3c36460714094dbdb8251323e6,2019-05-14T19:01:47.787000 -CVE-2015-0079,0,0,be92db58e2d95d9a395c293d85c1ae5037db86bd36ca45d31777f86fdb6e5dc7,2019-05-14T18:53:41.210000 -CVE-2015-0080,0,0,aba705eaac63bf9efc948c306b8838acf9e5637ce83e8ac2348ae4d22b521ed9,2019-05-14T18:52:28.177000 -CVE-2015-0081,0,0,e72d39dd32f26cdeb03110f07cf93ebb01509af9fdda09cbf78939a4db64db50,2019-05-14T18:51:25.300000 +CVE-2015-0048,0,1,42cfc6e0246fd844c7b0522e2699ddd674a3ab82337b908ce7e879277c99170c,2024-11-21T02:22:16.317000 +CVE-2015-0049,0,1,e9eff1dcdf037208a189eb915f4c307b8d7a49e2086d5c58adb30edf4cc7f6f8,2024-11-21T02:22:16.437000 +CVE-2015-0050,0,1,2fcf8f7263d9e259f8b44f6e154e825779fdfa84e92323be3c6c59122cccfd5e,2024-11-21T02:22:16.547000 +CVE-2015-0051,0,1,3aaa695fd94042710979af23125d378cb199c477f9314ae0f4da6ec68f0cb4e2,2024-11-21T02:22:16.673000 +CVE-2015-0052,0,1,5a91a89ad02541ba9855d0977053054f2010ccf44ca163bdcf96b65400afcd72,2024-11-21T02:22:16.783000 +CVE-2015-0053,0,1,24520d5a30d4cbda03a9af4f7843b34fa2565be79d591d88701ef244caf9168d,2024-11-21T02:22:16.893000 +CVE-2015-0054,0,1,d586e3d5f1e75caaee33672eb6dec44b15f2039c291a292bc99759c0aa24c0e0,2024-11-21T02:22:17.010000 +CVE-2015-0055,0,1,e885f03d510c925d3c86c4cfea7e70ef3c3ed56c0da36a0d55b889e970cb5ce7,2024-11-21T02:22:17.130000 +CVE-2015-0056,0,1,7ba200733c22b6d745f1e01edfab445909860e0bca94d49f3fb708064ba39f5b,2024-11-21T02:22:17.240000 +CVE-2015-0057,0,1,a077d0a9ca2813ba01c38014677e37ddaf7b6325ddfeccac51702ac4c192e901,2024-11-21T02:22:17.347000 +CVE-2015-0058,0,1,748acc6645ccd3390f0d88eebd022c20dd1715c725710b8153df193a632d0b67,2024-11-21T02:22:17.477000 +CVE-2015-0059,0,1,5d0385fa6812061898a5a13f85df16b4398c0accbd12ed95baad55befc519ee1,2024-11-21T02:22:17.587000 +CVE-2015-0060,0,1,a9d72975174572a71ad2f177aa26ea51049b3b4dbaa845a9f76fe24a501e36f9,2024-11-21T02:22:17.700000 +CVE-2015-0061,0,1,b45302ef2e8adfc5b24946465292ea02db40ddd47c78a2466652246bcf971c85,2024-11-21T02:22:17.810000 +CVE-2015-0062,0,1,0a605713c423ee870fdd9aca0b2f7c65c19a931bd762de26a81253fe46501e61,2024-11-21T02:22:17.923000 +CVE-2015-0063,0,1,cf3f84e5328edc516b31b51efc7203b647edd3f2b4d52db1017340e75c2e98b8,2024-11-21T02:22:18.050000 +CVE-2015-0064,0,1,8c20bc1f4a24291125697fa5129c0b103f97257f4717080647e158559e272930,2024-11-21T02:22:18.163000 +CVE-2015-0065,0,1,bbbd299af1c35e0d62c4d47dcabe87dd71d294802881fd2d85bc346461e82093,2024-11-21T02:22:18.273000 +CVE-2015-0066,0,1,4b4c0a8b4de544177e5d1c86e7e4faa591008fd2f85d258b9640df6e0b853adb,2024-11-21T02:22:18.397000 +CVE-2015-0067,0,1,43afa286fab98a2f062190ecc80f1c4ddf8a9e6eb3ad3cf03054c3254fcbbc8c,2024-11-21T02:22:18.510000 +CVE-2015-0068,0,1,078976a75a8bfc5628ecf1063fb1e63ae0521f5f9520315a13ba8f34a4891f17,2024-11-21T02:22:18.623000 +CVE-2015-0069,0,1,19847739871da056cf481ffde623d3ddb503c5f2504bf3043ec80697387816b4,2024-11-21T02:22:18.740000 +CVE-2015-0070,0,1,8b4bfe2d995eb84f69012004636a927093966931f903b3a627a77d690346fc40,2024-11-21T02:22:18.850000 +CVE-2015-0071,0,1,ac3cdb0bc22f5a6461ffdd2ce44654b1ab40196a220b33a68fdd76f1a2796b94,2024-11-21T02:22:18.963000 +CVE-2015-0072,0,1,6ef996855b29c323de46b91deb927943d3cbea175d243f5f8df4c1794b3e63fe,2024-11-21T02:22:19.087000 +CVE-2015-0073,0,1,bb7a31a23e875a82036b028ed98ebc93f91d48ea565c10891a30327dc9abfe2b,2024-11-21T02:22:19.213000 +CVE-2015-0074,0,1,169064c933f79a7488e47b6ac1c7397a100585e58df38fe3ebc281be47ae91b2,2024-11-21T02:22:19.333000 +CVE-2015-0075,0,1,114362d1803172b3d07fb98957b2949ccbf6318582b16fc2a7fcca201d9f47a0,2024-11-21T02:22:19.447000 +CVE-2015-0076,0,1,ff4eb77bfbcbee97b3e42910be791ff9b128fb1db51d3b7571fd6cda8b3ad42f,2024-11-21T02:22:19.550000 +CVE-2015-0077,0,1,e3975f8c06b850ddfe40075cda774b154412aee9e3bf3884484d8c2194c76fdf,2024-11-21T02:22:19.670000 +CVE-2015-0078,0,1,5012a4f6cd2cc5acde4fa03e3e7ad644f83e1f56ddfb815fe40fdbbb5774ef4b,2024-11-21T02:22:19.780000 +CVE-2015-0079,0,1,891b1acb15e577dbd2806f40afd4a4aafd2ff99491bcbf5626a8ba66089d8101,2024-11-21T02:22:19.893000 +CVE-2015-0080,0,1,6a7a6e1f148b4fdc30fd74db5b02e920365e4b529c7b04637fc8017b2b5144dc,2024-11-21T02:22:19.997000 +CVE-2015-0081,0,1,7e6f60902969510757ff678ea24720bf0ff228c03ed0adab7e0e1a580b191431,2024-11-21T02:22:20.107000 CVE-2015-0082,0,0,b47d616d8578e89f8b0ea19109fa23b326791f8b9c1996184268124d5e9be21d,2023-11-07T02:23:15.930000 CVE-2015-0083,0,0,a6a566bba6f5e89e37003f32f7e48b19e7aa18a8c26ee09edc9a0b8453c2466a,2023-11-07T02:23:16.213000 -CVE-2015-0084,0,0,e1698a46e53675dd6fd13ed4dfa368720c79046bd483d0e8c725502866a5d195,2019-05-14T19:23:08.660000 -CVE-2015-0085,0,0,47b8f81bf464fa9536955803a106ab6eaef5251f679835a061140934f5531a1f,2018-10-12T22:08:22.460000 -CVE-2015-0086,0,0,e93e80e0e425967fd430a233879dc9b68dc9a917496fae364d71ad32702c7e8f,2018-10-12T22:08:22.710000 -CVE-2015-0087,0,0,3eaa95835e838dd0f99c1fe2ce147c08043e563f29c3f5c3ade59f1901f64729,2019-05-14T19:25:36.353000 -CVE-2015-0088,0,0,8260a67433ee30cebb3131751d135469b7f4481e6a0833aa0e9c671a03c75471,2019-05-14T19:06:56.293000 -CVE-2015-0089,0,0,9fd1143a63a297b1b20dc2c94475b14a3726b97961a78dc70eac2f575dcb18c1,2019-05-14T19:10:16.457000 -CVE-2015-0090,0,0,a0b1713fbba9315c5895c025d958d37b7546423bd427cf447c68f56a39139c84,2019-05-14T19:07:22.170000 -CVE-2015-0091,0,0,9dc915d5e00823af282b998926731c72346ae422d23eb977e1c078fb990ca281,2019-05-14T19:08:44.467000 -CVE-2015-0092,0,0,cc14497fd9bb7ddec70a365a7090e763b515c75f9c36576731d51db7b168d7a9,2019-05-14T19:09:03.407000 -CVE-2015-0093,0,0,b43703416bae0c2caabfd7f8b1c39f95462f291ab1f229dc562cb0f4e32f834a,2019-05-14T19:06:18.497000 -CVE-2015-0094,0,0,b827083a93d08926305fdad1842ed7aa0ca8a77436fa926e033050e11a708b6f,2019-05-14T19:26:37.243000 -CVE-2015-0095,0,0,feb42d747db123b834fe216360ff9db7d8c54f8f51786ed5063cf748de831e61,2019-05-14T19:53:32.237000 -CVE-2015-0096,0,0,10cecc171314072301733e4979a60f5356e75847f578fa3047b195c2a9b13746,2019-05-14T19:47:14.040000 -CVE-2015-0097,0,0,6bcadf8788a8385479677b491c0fa973483ea6a9f86de772ad22e38543327c23,2018-10-12T22:08:26.150000 -CVE-2015-0098,0,0,88a3114d97a9183c08ab77decb920df3328463d03caa2d765b9addbabfd9edf1,2018-10-12T22:08:26.477000 -CVE-2015-0099,0,0,38304f771b30dcacbd98873187e51245e2bd2f3f2337d41b192fbc3db9d4be4d,2018-10-12T22:08:26.743000 -CVE-2015-0100,0,0,3a2c8ba18cc38adb9a6d59540c96d1ad6da44b2699c9cc84e1792d74a03ff698,2018-10-12T22:08:27.070000 +CVE-2015-0084,0,1,188f6e979deb74f9f839aa2e6c17618e1867fb5e03534cd782108e3c6012006f,2024-11-21T02:22:20.257000 +CVE-2015-0085,0,1,da35134ed35652c07f160ea1488b80c64747d28f12d994a7c5df6de6c170e41b,2024-11-21T02:22:20.383000 +CVE-2015-0086,0,1,be8c662a82a917a03e1a51e248adbe7c69e02332c28d8676a5d54ee47aff6e94,2024-11-21T02:22:20.510000 +CVE-2015-0087,0,1,a0b75fb2a0bcad53ad0940027521b762aecb0e26d9c3f0655e83cb1fda5a07a1,2024-11-21T02:22:20.627000 +CVE-2015-0088,0,1,a4e6dbbe810ff88ed7a85fed7316ab5b356e3dec716c8ce18eb9746ceff23e7b,2024-11-21T02:22:20.750000 +CVE-2015-0089,0,1,d9685815a322330a2377eaf4a99decdee5d79e99aef1cb0d4d7a940a830cbbba,2024-11-21T02:22:20.863000 +CVE-2015-0090,0,1,8d7c8c2cab3b847221aaafb842149f245d8f5c06be3be9c0a601fcc119abb0a5,2024-11-21T02:22:20.980000 +CVE-2015-0091,0,1,f9b1f7c07ad324947e86b0b2230d85d3169d99165f97e5e72640b7236608ce89,2024-11-21T02:22:21.090000 +CVE-2015-0092,0,1,ee6274b7e8042865306dfd641ac81d1c7cdfaa229c07ddddeb90db4837cdff97,2024-11-21T02:22:21.200000 +CVE-2015-0093,0,1,cda793699401b94c5abb1ee074b3322349a92f884d1b93fa84738876f86d8b54,2024-11-21T02:22:21.320000 +CVE-2015-0094,0,1,a13eeef12fc7ae7d425195dcb1ca185ddad0861d4b4d02bd6818f91b454a2d5b,2024-11-21T02:22:21.423000 +CVE-2015-0095,0,1,cb97de47a2fa3c0bba6043c930a49c6bc0f66be23caf4c6a273d2f246fc2d40e,2024-11-21T02:22:21.530000 +CVE-2015-0096,0,1,701f941a466d4fa154fa2976901afb0d0f0e9adad65c2b844532abf52a79e26a,2024-11-21T02:22:21.663000 +CVE-2015-0097,0,1,46b17f9ef49a32e7a02458f227e572b17ede96fad276235d9db1b2118357178e,2024-11-21T02:22:21.783000 +CVE-2015-0098,0,1,8c952de79bcbd55cfdf056ec4fd4ecadf15ca1186602cd37a7a59e0cdeb9e796,2024-11-21T02:22:21.883000 +CVE-2015-0099,0,1,7aecfc62a8d53c344d1dcda283bceebfa7ff22eb06e595b5f1d68eda2eb2c914,2024-11-21T02:22:21.987000 +CVE-2015-0100,0,1,f1c257cba4c30a730512c576a23c9205a64c9b7b61736aa6c757869e08932983,2024-11-21T02:22:22.090000 CVE-2015-0101,0,0,48d80f54e0dfd0f19079b581a75453a8489b7af5611b4ec9faa7fa74045b3e67,2017-09-08T14:13:58.773000 CVE-2015-0102,0,0,008a112efccc751e606d7cfceb677bd7b5d4a970fcb82eb5f70e05f4a9cdfbfc,2020-02-07T19:33:41.133000 -CVE-2015-0103,0,0,cd9ad2b2646d6d9bb9b2040f500de08a00990c9a40cbdc0295a9723a72934754,2015-03-24T14:46:36.277000 +CVE-2015-0103,0,1,8015eb48ae80dd332393a0079597e2ee35842b025b644274ed2131a4f31b88d4,2024-11-21T02:22:22.433000 CVE-2015-0104,0,0,b6a253cc3f203bb7a6a542f56f7885b411894a54b684cf609841dd426f804cc2,2017-04-27T19:50:43.077000 -CVE-2015-0105,0,0,7f9e83bc81cbe13b89a7f76890dd77375399309132c949b7b9bd994e88523221,2015-03-24T14:54:44.173000 -CVE-2015-0106,0,0,38a83ffc98eeaf83c0360a3045a1fb1f81676f4454bac63f13fa10a32eb726f5,2015-03-24T14:53:54.253000 +CVE-2015-0105,0,1,91717ffd0a08fff3e8a5be7d70e0984acfed28ef6ee757244dafe3142080c371,2024-11-21T02:22:22.677000 +CVE-2015-0106,0,1,f7ad62d9978074202a39a58f8bf794206074b5d4de47a1362994484cbf91e2d1,2024-11-21T02:22:22.793000 CVE-2015-0107,0,0,e48a9289c1a3c0f3576456ab079b6c7edc7c643313a8d39e1da8605a6d69748c,2017-04-27T19:51:00.373000 -CVE-2015-0108,0,0,bd68c4cffbb916162689a70eb8822df98c040d6fba22f5504a4b3c70dd72fadb,2017-09-08T01:29:37.840000 -CVE-2015-0109,0,0,b6bdd143ec0cf10fcb099e46481532c4574f45d431c6d23a0f1bca71a87e1450,2017-09-08T01:29:37.903000 +CVE-2015-0108,0,1,1f5452cc4a7e519d93e8a3b4571d1496eaa12ca5c2cf44364de87546d8c71ffd,2024-11-21T02:22:23.013000 +CVE-2015-0109,0,1,95742588943789d617b32a3976f79a6c63dc19dc0ef0bf2aa1b85cd6856ea629,2024-11-21T02:22:23.120000 CVE-2015-0110,0,0,c76e16b807621f8e8804b5c0bad6bdbc2801c9319db9f7c38700a4670ad868b3,2017-09-26T18:29:07.217000 CVE-2015-0112,0,0,35daaa520b76bfd727ee79601ab29727d2942ff0517e36eae52baacd3acec637,2015-06-25T15:08:06.867000 -CVE-2015-0113,0,0,6d680a1a924b9315141a4c51fd3eb05a058797c281be0873898612c0352414bd,2015-04-27T17:48:46.027000 +CVE-2015-0113,0,1,85a9dfed571183b763c3c962f7a4437a627f0174a7955d60134ab2364b98da69,2024-11-21T02:22:23.470000 CVE-2015-0114,0,0,b5f3318b947f35fdab1b98a76bf1319dcee82c6b4c4dda589fb605558a2f9f98,2017-09-05T13:32:40.963000 CVE-2015-0115,0,0,b3bdce1ced899be81b0c42acac2ffc63de6d950c667acf3b89627abf3b847ab8,2015-06-29T16:26:26.923000 CVE-2015-0116,0,0,062cff11c40fd35b604d8090f98a5cbc0fcf12c2d8d5e595a57763f2c3fe963a,2016-05-26T12:24:11.660000 -CVE-2015-0117,0,0,96ab1bd4d1c96e5860a8e9f51cd36963713df5ef24621003ce4534d47814fcf0,2019-10-16T12:40:30.513000 +CVE-2015-0117,0,1,228e08683fd3d3aca6e25cbe11420f64f054e7c55168279d89dbd86be419969a,2024-11-21T02:22:23.913000 CVE-2015-0118,0,0,9fd5a9a04b7152c2e3e4e24c621f3bfe97142ac86d405fe78fd0229a10d00739,2015-06-29T16:27:51.200000 -CVE-2015-0119,0,0,aaadfd2deafd99ae9be579e62f98e2867eb142a3da9d2daaf2998bf0f7b37895,2015-04-06T16:49:43.067000 -CVE-2015-0120,0,0,6b488bbe2c89e6d750a209d58d0b73385ecbf8f2c9b13cf8d6bb4328fcc58c9c,2015-05-26T18:00:13.533000 +CVE-2015-0119,0,1,e97bc28f939ae6214c57469ade34d403fc910684b62f109b873a5cfbe9cd8c14,2024-11-21T02:22:24.137000 +CVE-2015-0120,0,1,830f16ff994f509704f09934d35901d8af19f4046bce0778d18e6a2ccd65b5bf,2024-11-21T02:22:24.250000 CVE-2015-0121,0,0,5b323835885191d7ad084f4715d0198d5f07e6705d665a1c992c73d9313632de,2016-12-03T03:02:16.220000 -CVE-2015-0122,0,0,d9203d8cf66dd312d22f57d3ecb06f56e65f3ab85ff007a4dfab65d0157e2cbb,2016-12-03T03:02:17.313000 -CVE-2015-0123,0,0,9943ba502556657e170b63910bac18b1b66b92be40e97c53d7f7c0e4f92d3dcb,2016-12-03T03:02:18.470000 -CVE-2015-0124,0,0,2c7dd1c62308c7c4b2c6b30c0fb03ad5a3bdead564d37f470e5f64f414f17330,2016-12-03T03:02:19.627000 -CVE-2015-0125,0,0,758b92251188372aba87a9c6a8d73fb0a182978be114fc86d4c96da460f14f47,2016-12-03T03:02:20.720000 +CVE-2015-0122,0,1,99636339415416b696652dae96603e32f844d539ede5f30acd951cf6af787e17,2024-11-21T02:22:24.477000 +CVE-2015-0123,0,1,70039f53cbb20b59457e447af3fca1e798c2cf3b63039952472ce29da4be2e44,2024-11-21T02:22:24.583000 +CVE-2015-0124,0,1,e25605604f2930f1e3c01e9fea83e33cd45d8f25b19d04a0280b4cd41dcbc273,2024-11-21T02:22:24.693000 +CVE-2015-0125,0,1,2f598a4d7e2d49bae32ed833d6c118bc83bbd5a00927c518aee128d28765e2a8,2024-11-21T02:22:24.803000 CVE-2015-0126,0,0,c2c8adb0770dd7b628d3b186246becab442da3fd21a35da28b047dbe2eecd8eb,2015-06-29T16:28:57.510000 CVE-2015-0127,0,0,4863063f6dd7c5c8da02666f2f082b358b9043471fd03f3a55bae6ab885c5b18,2015-06-29T16:30:08.430000 -CVE-2015-0128,0,0,90cf7b02c46068c475ae83438bea5a0bf9407d7ad643a14877d768d019f525be,2016-11-28T19:15:58.897000 -CVE-2015-0129,0,0,ed7d30df7181ab867e8f5c06a4f943af63bec8a7ef8b7a2789be7bbd0f2f3f21,2015-09-11T15:42:06.547000 +CVE-2015-0128,0,1,fab457bdf04b86c2bcb9859768bb88896232b22149469480001ab9db5430e0aa,2024-11-21T02:22:25.143000 +CVE-2015-0129,0,1,bc838cfdc6209671bf057eac9320f2bebacf03794c2d3dc38caa7c360598ddaa,2024-11-21T02:22:25.257000 CVE-2015-0130,0,0,f39522dae021b4b6d51bbbb24e83c3ccaf85dc79aa4c11bcf04d9caf92444cf6,2015-07-20T18:19:00.927000 CVE-2015-0131,0,0,04df995127a42b241a077730c1695a4541fdceeb67fdc16b16bd40723ce0dfc4,2015-06-29T16:36:32.717000 -CVE-2015-0132,0,0,c8bd518f8a1307d9e11876fce51f440ae623fdf9860ab713633e601d869eabce,2015-03-18T16:13:19.190000 -CVE-2015-0133,0,0,5b6d86f008bde3007f1339aa339b0b91104e15e3a4e0b06195662636edb22ad9,2015-09-11T15:45:40.367000 -CVE-2015-0134,0,0,076c10bcea968c91501ab81da0cafcf78c3e2045f61a4b5bdb582543ad1e36e6,2019-10-16T12:40:30.513000 -CVE-2015-0135,0,0,ee041ecb7b7f77b1e018a3d9ab682ca7ee3998f2e7b48a78d11a57ef18343bd5,2019-10-16T12:40:30.513000 -CVE-2015-0136,0,0,84d007740e093fda22b66df6fc3ce7a2bc317da887083206a781c602de8c822d,2015-03-24T14:28:53.453000 -CVE-2015-0137,0,0,eae9489186513e2641dd321d1125135a7636644a26333a9ae9ec0d3794f76eeb,2015-03-24T15:11:58.077000 -CVE-2015-0138,0,0,942510dee5952e3dbc327970cbac1407e944dc55f127244f065f085601cc7e87,2017-01-03T02:59:27.957000 -CVE-2015-0139,0,0,77db8db05e795bb09437792324f0de4451fabcc6ad2cf89d0be572f4de06c707,2015-09-11T15:50:33.197000 -CVE-2015-0140,0,0,ebd290ff45a698479227346a75aeecc8aea5ee67720e7acbadbf2233ca0e9251,2015-05-26T18:01:04.377000 +CVE-2015-0132,0,1,63dcefb5d3e96ca71ab487e3c23a08b43bc6498693ca8dc16b17327666c6d961,2024-11-21T02:22:25.580000 +CVE-2015-0133,0,1,4a59cba11325f1c9e50a2886dd0e87d0d9b9241ee7ba4b5ca0b54ce8d9df9bf6,2024-11-21T02:22:25.700000 +CVE-2015-0134,0,1,0ddd1c418f845c8939cd1cae4756f9bdd2668e387ab3473a72ad19e79bda7fe7,2024-11-21T02:22:25.807000 +CVE-2015-0135,0,1,799332c23465c6379b9f23f5045bcf7025f675a304a6611c27ece1b6e73db826,2024-11-21T02:22:25.917000 +CVE-2015-0136,0,1,7407030e65271963d89b86282dcf1d9c585942557aae4d1ca64ae118567790ed,2024-11-21T02:22:26.030000 +CVE-2015-0137,0,1,5a57b7a6405c99b8ebbd20345b95dd7a918b9de0ed064bad760000a7826844a5,2024-11-21T02:22:26.140000 +CVE-2015-0138,0,1,d4efd1eb7bca771d5e10fe2b50079469c8aeaedfc207cb4bfc45dd266e19875f,2024-11-21T02:22:26.253000 +CVE-2015-0139,0,1,b056628bb9e7439ee455246ff24442811fc5ee624fdb125e33a5e6b8c43d1dab,2024-11-21T02:22:26.397000 +CVE-2015-0140,0,1,be7866e1bfbec0e0d8fe74ff5570b8fd684b0127b2cb6f7fa293a37d3f8566d8,2024-11-21T02:22:26.507000 CVE-2015-0141,0,0,261fa2408c0c3c2dcc71c643ff3d227324fcaf9b9ab3aa5f4429a4bd1df43b96,2015-10-05T19:36:44.823000 CVE-2015-0142,0,0,d4fd5f0d9266fc2b7ec9a76c525b82c64324fa8c5df248f464dc900e2cb29725,2015-10-05T20:26:06.747000 CVE-2015-0143,0,0,7564eb81a087ed01ca7548bf975f98779636c22412d7f2ab13df53ed627fa819,2015-10-05T20:27:28.183000 CVE-2015-0144,0,0,bed393aac5dc60bcc064940ac9a7213bd9b3a90d90be81814ebfb8ce9bf4e8b8,2015-10-05T20:35:57.483000 CVE-2015-0145,0,0,6548e2113226b183c0dd47cf17a8347914f10f9bc9baecc9693b7fae31e8fd8c,2015-10-05T20:43:59.440000 -CVE-2015-0146,0,0,3829433a0a7d895560d8615653aef0b256dc56de6f01be86cf5aeb2af2d371e3,2015-03-18T14:51:03.147000 -CVE-2015-0149,0,0,7f6055bbfbcf65a0a2cf9d5cf3afaeff2c5921340f9322d9a88878710550b32e,2015-03-18T14:52:07.253000 +CVE-2015-0146,0,1,024c0ec63e1ce944d4d06ac6425829d4960a556e5e54a572b2c74e0c7997e1a8,2024-11-21T02:22:27.190000 +CVE-2015-0149,0,1,11a67939d014f4b38f30e7c7cacc591e0cee7110d09c076fb5fdd9c4ece91b9b,2024-11-21T02:22:27.290000 CVE-2015-0150,0,0,7eafe29853eae446553ce1b953f7d95d68855c4b10d76775f4cc6997435da3ae,2023-04-26T19:27:52.350000 CVE-2015-0151,0,0,8f81cf2bd7c4d8ca62221b1ec7e12c4a86c44bd0da3de2dbbb7ebc270236f1d8,2023-04-26T19:27:52.350000 CVE-2015-0152,0,0,d29bbe56e751b55ee0e168b2a5b5349de846656fb0ca51a9846f9963aea25a22,2023-04-26T19:27:52.350000 CVE-2015-0153,0,0,9422ebfcb2153960ea57516081a1c56f66720ab9423dba749e7e7e18636e443a,2023-04-26T19:27:52.350000 CVE-2015-0154,0,0,08d838156cc2bb657afaa9388f7c2e4c19e60a298531837640bc197d88909812,2023-11-07T02:23:16.923000 CVE-2015-0155,0,0,8fb2edc4b8ecdcffeb787ece81107690029f2f0d805def0ac550f062b19080d9,2023-11-07T02:23:17.143000 -CVE-2015-0156,0,0,cc52539df775a72c45bda474cd416fdcb41e1d3c74c21fa9cb73719a5e1559cd,2015-05-27T12:33:01.617000 +CVE-2015-0156,0,1,2f49cf9a0fc58a4679a7fd23dfa4b3159eef3edc768a1518d8edaef86243412d,2024-11-21T02:22:27.923000 CVE-2015-0157,0,0,82894a18cb3d279e4e3a3f58feb792e7165af65cebe2ece59f89fb22a339a0e2,2017-09-22T01:29:01.327000 -CVE-2015-0158,0,0,37c5da1190148b7813dd29152f702e138b76f3c479b13f01aa9039788adf7690,2015-09-29T00:33:26.063000 +CVE-2015-0158,0,1,78c0aa6cb96a0b7d780d387971025091d1c2b87b20f5615eea3d5d00f21492e0,2024-11-21T02:22:28.167000 CVE-2015-0159,0,0,2d9b31acb666781e483db4e3abc41be163e9e23f0fda0ce320eddc80b7450239,2023-11-07T02:23:17.467000 -CVE-2015-0160,0,0,ec7077cb4ea8733b7f3093f061043abc947e284de131b553e3a616e46ebcfa71,2015-05-26T18:01:50.267000 -CVE-2015-0161,0,0,cf717a4b15d44156fd6b5559e85c1457f3132422c0847529d0c9020ca38c43b3,2015-05-26T18:02:24.830000 +CVE-2015-0160,0,1,cc0c21942d423ec6d30a21f84453e7538ab634d6768363de5cf8bfc588b8e938,2024-11-21T02:22:28.320000 +CVE-2015-0161,0,1,4a460b8b8161ad7df6d861c881a573bb4fabd2d3b4ec8871331a572254f5778c,2024-11-21T02:22:28.423000 CVE-2015-0162,0,0,1d349d8600002713425580fe6cecd852bec28d5b65ad85ba7cdb9353b4759370,2017-09-27T17:18:44.247000 CVE-2015-0163,0,0,15e669b12717c16bf6c1286dc17dcdb359acd5be6270b197b072555a07a012b8,2023-11-07T02:23:17.720000 CVE-2015-0164,0,0,2c6931050c3b42dfe0bb12a2af8fac90f5dab6335ad3f67d1d9cceb1c7862834,2023-11-07T02:23:17.953000 CVE-2015-0165,0,0,0a6b6e9cda4de064127af163650fdf99adeaab997c1d590734b09031c3bccfc5,2023-11-07T02:23:18.190000 CVE-2015-0166,0,0,8865da8ce7e748ad8051a1437acdf640283f1fef861734e7231fde5fc78ed7a1,2023-11-07T02:23:18.417000 -CVE-2015-0167,0,0,2bbc41c8100c525aa0fbac3ef4d2df89b7a7d3610912573d41b0ae8295b8fb07,2017-09-08T01:29:37.967000 -CVE-2015-0168,0,0,e8fd466c0869f340c2d2b3251fde2fb5e1b2fa48c3577e0cf02e5c1343ca121c,2015-05-26T18:02:42.767000 -CVE-2015-0169,0,0,76a0ca9169d60bc9c612ab481f7cd3419482a000a7c3e88ed9e017657c4c9a5b,2015-05-26T18:03:17.533000 -CVE-2015-0170,0,0,6a41d8afed9fdf773fe816287295a5f453922b6bda4f1157daa8599ce6d1b4fe,2015-05-26T18:03:54.093000 -CVE-2015-0171,0,0,5ceee97c4ca6d88b2090e1eaf820ac1e05da4b1d5742a4070295e6f86e7e740a,2015-05-26T14:59:52.557000 +CVE-2015-0167,0,1,40e7bb3cc1a839b5efa0e6a57e162a28585f0c147a158cc19e9b98622d985b9f,2024-11-21T02:22:28.700000 +CVE-2015-0168,0,1,be682dc46c70b49fa7d85c858eacc55d827a5adb2707354bb780d650bcfdcb5e,2024-11-21T02:22:28.813000 +CVE-2015-0169,0,1,fe218e53e5e62e514b4771a8169be7e6717d2149bb1d98fb1e05f1f5948afdb8,2024-11-21T02:22:28.927000 +CVE-2015-0170,0,1,08e40708239af61380fe05465c7a534c3fdef7b2ed131138fd16e30b4c282f9e,2024-11-21T02:22:29.037000 +CVE-2015-0171,0,1,7c9ef88107fd8c2ee9a7b4a027673e256603af05fefcd53e9375c255565ebf1b,2024-11-21T02:22:29.150000 CVE-2015-0172,0,0,691ccc92c477354ea00d666b698e59469ffb83eb775e15aea625f9c4d7e03046,2018-05-17T17:34:21.813000 CVE-2015-0173,0,0,aea76986806b4729a7abcc5413547619f70449ef6cab129dba23482d0e982c13,2017-09-23T01:29:00.467000 -CVE-2015-0174,0,0,91006b5085b11526afeb6c481f43276b9e600536a4b47acfa24af756b9d56082,2015-11-30T19:47:21.767000 -CVE-2015-0175,0,0,529bbbff57c38d72b0d804c6de962c6d87538542ba715374ceffa44fba7bdaed,2015-11-30T19:47:44.887000 -CVE-2015-0176,0,0,8fce08788a365e22cb26cc9b7f53d7112bb18633a31c30a2f904bfb186925a42,2017-02-08T14:26:17.520000 -CVE-2015-0177,0,0,5a8d71253d37b7dedbb881e00a7f30690cc9ed733ffe28a432c07282296a5b35,2015-09-11T15:42:57.607000 -CVE-2015-0178,0,0,16042b34b7a51b9a874b02b3b1e032e869c95629bee2c57605014cc6169159fb,2015-03-18T14:52:38.910000 -CVE-2015-0179,0,0,5bffa3f7afbf8ff5c10e3ee8cde5ffef60cf9458f499a822f78c0f114654f3ed,2019-10-16T12:40:30.513000 -CVE-2015-0180,0,0,9c27bbcb505cc8c6a74066169219de0f2c211bec7ca106614cab2f9e62be9135,2015-05-26T17:57:50.927000 -CVE-2015-0189,0,0,1594cc03930f51a07ff4fbba45f3ca4ea8aa002791357a1150dbeac7b837617d,2017-01-03T02:59:28.003000 +CVE-2015-0174,0,1,607d0346054b774c5a5f93012524815aa13abb452be294aba383fe9da3a9379c,2024-11-21T02:22:29.483000 +CVE-2015-0175,0,1,510fb7c14b64b650de69edfb9c39f2b6a1425c56ef280dd20d5dd108a3b48337,2024-11-21T02:22:29.597000 +CVE-2015-0176,0,1,ca5dcd1bc061960c3e07400db073affa0ada11f242a4dddf083ca9ce46d33a35,2024-11-21T02:22:29.710000 +CVE-2015-0177,0,1,7aa4b9e850509d80b1703f7b124497b8e0733496ee82eb515119360eada10130,2024-11-21T02:22:29.827000 +CVE-2015-0178,0,1,b536de79889c1688e0d88d215adf82c0794b476720e9b146e244d6cf20fceb7c,2024-11-21T02:22:29.943000 +CVE-2015-0179,0,1,78f62f515360aac64d19fad1bd665ae8411ab956db1d2aa744e5f8f56cb97966,2024-11-21T02:22:30.057000 +CVE-2015-0180,0,1,1930fe4f0afe2ea6e4cdce7c1761d1c8f5be59ff84d801bfeed87069f72633cd,2024-11-21T02:22:30.193000 +CVE-2015-0189,0,1,9d4cd52de205cad97e7dbb9b6bee31be45494ef872d8961ae9389e8746a839c4,2024-11-21T02:22:30.320000 CVE-2015-0191,0,0,02a60ee957cc66ceb18a9c902c8aa82aeae524cdaeec5a7b0f745037bf3c255c,2023-11-07T02:23:18.767000 CVE-2015-0192,0,0,0a10f48d40c599ec68a8f7ff2fa07ef9a498508aff59a6507f4a40567e37784d,2019-06-03T15:51:40.560000 CVE-2015-0193,0,0,d7c0b1e7a7c08c5c7930d251e5eb8ade86f2a54a05281ce081f9f55ac1f1b598,2015-06-02T11:47:53.627000 CVE-2015-0194,0,0,bb817ed6b364466deb088b6089921ec773e040def05d168e4722bbd554ccef74,2017-08-14T17:15:57.420000 CVE-2015-0195,0,0,29cec34719b3b4c027aaeb8db9080780bab0fe5f5951d4f35c8d95a6f04834dc,2015-10-05T19:44:37.093000 CVE-2015-0196,0,0,c225946e317c7f0b37d37a8ce531076f19b0d2f1c6cd72cdb69dbec39cb681b1,2015-06-29T16:40:21.520000 -CVE-2015-0197,0,0,7b9d7230880f022901ca1c258da211111d162aede76d3acd10e1ad1e82cc9296,2016-12-31T02:59:15.747000 -CVE-2015-0198,0,0,d6c591721f356f9fda4ba888595da071ce655933dd5259d156d969836d12d63e,2016-12-31T02:59:15.797000 -CVE-2015-0199,0,0,998f1ccf0b1b14847793251f908bd2338b6587960b301f3c9dd88cba5caea57c,2016-12-31T02:59:15.843000 +CVE-2015-0197,0,1,d62b84945db27d9948e2c3c38d24383b320f398a672ae302897648c23dd3f4ba,2024-11-21T02:22:31.167000 +CVE-2015-0198,0,1,fbc9a8e0ca3306beec82c79efb3f7ae1031695263f393e68247179b224772a62,2024-11-21T02:22:31.297000 +CVE-2015-0199,0,1,66f95271d0eb968cf7c41b47c03477ef87b3ae720aae52402c42e76e559906b4,2024-11-21T02:22:31.420000 CVE-2015-0200,0,0,af00624084beb6358b1c1c77dd2ba8cea69704471862cf271c8b0bb08d74e5f8,2019-09-30T16:19:41.927000 -CVE-2015-0201,0,0,90a5f118cf18539e48fe272bb61263149d8017423dabbea76678099591106e10,2022-04-11T17:18:31.240000 -CVE-2015-0202,0,0,48e0390ebf0d50d489539aab15b1d84ebfdd892345bbd56f052eec5d7f8a79ea,2018-10-30T16:27:35.843000 +CVE-2015-0201,0,1,04310888d1c4962a9038445fd91699b2783960dd6ffe322cf84bfc3be37b4e9b,2024-11-21T02:22:31.707000 +CVE-2015-0202,0,1,256947ff602fd6f7b1e6200fcb43c1ca97a559842553cdf9509004ce745f0596,2024-11-21T02:22:31.853000 CVE-2015-0203,0,0,8764cbfaa093709ece317cf7830f0a0c40bc9faeab6587f2496df337e362bb5c,2018-03-18T14:05:39.007000 -CVE-2015-0204,0,0,046b3d24104306f25172cdbbfa676ff6ca54d6715f853af91ce10d5a6fd12294,2018-07-19T01:29:01.700000 -CVE-2015-0205,0,0,58aaaef5c63eb24a75531fd04918d5b021fc3074107257014a672a7df50f481b,2017-11-15T02:29:05.890000 -CVE-2015-0206,0,0,c54a7f75a9c6d7b24b3cdf394c8e727b5335b0f5bd4a0eba16b3b3691da814aa,2017-10-20T01:29:04.393000 -CVE-2015-0207,0,0,c98ffeea40d173c2704de2db492bc49e61c7de68b47540c693225dc1c649338f,2023-11-07T02:23:19.273000 -CVE-2015-0208,0,0,9f8df98a851b43b3ae9080273fdec5a82076ee94d3065450923ffeb1f2eb8909,2023-11-07T02:23:19.350000 -CVE-2015-0209,0,0,d74410d417c1453b19a972f2d9a0cb7078e70824c3ec00b74f050f565d708de4,2023-11-07T02:23:19.410000 +CVE-2015-0204,0,1,2abb7b4327d6b998c05d9124422bde1cbc924aac778bc6f28121d5fba137bbd0,2024-11-21T02:22:32.127000 +CVE-2015-0205,0,1,2921dbb72d8529a7518f90f03c3d7cd64a74ed7a833d93737b8d1bb05fdb9850,2024-11-21T02:22:32.377000 +CVE-2015-0206,0,1,461c979b32404b92d9e421af1e8cc9f0c10980375c6a19c34797228c5808af34,2024-11-21T02:22:32.597000 +CVE-2015-0207,0,1,b2707cd84c8e12a65741b75fa24437bbbd77cadea5df4cbdc077c573a02412e9,2024-11-21T02:22:32.803000 +CVE-2015-0208,0,1,90e2a7e056727fb5a8eed29d27340704a131ef5617d3dc9e1e9e32294ffb1f9c,2024-11-21T02:22:33.020000 +CVE-2015-0209,0,1,2cc3f2272b6c6920619039701590dda9933796d9d6843fba62b39e97f26d2ee8,2024-11-21T02:22:33.237000 CVE-2015-0210,0,0,f0fb45f454efb88ec181c9d6aaddf2717b0d757aacfbfda150f9e420994b8ae5,2017-08-31T18:59:52.497000 CVE-2015-0211,0,0,051eea39056f18fb6928d95c98bde545b0ed61d23ac6e21d5a5e6e41c6d3ea67,2020-12-01T14:54:45.183000 CVE-2015-0212,0,0,2a37af4d231f70c69fe722c342eebcfc888f4fa2b0583ac79e75599b30684ff4,2020-12-01T14:54:45.183000 @@ -73672,328 +73672,328 @@ CVE-2015-0215,0,0,a20b3581427f14cfa49e4532a5a7f589464cf103f80d89615a77d2b80c446c CVE-2015-0216,0,0,21ecf8b9a8ca285345fd51c018dcef340b18185eed10797069c9102c9f488887,2020-12-01T14:52:42.637000 CVE-2015-0217,0,0,89fa7a15b2b2af8170c772f91883cc0c1d44467d8757ab5eef0c7746626ef637,2020-12-01T14:54:45.183000 CVE-2015-0218,0,0,b9f50b927964b71ec8a085a6c9ef86b12180f559b0a558e969662caace22aacc,2020-12-01T14:54:45.183000 -CVE-2015-0219,0,0,ced9fbcb34a4b449cd61b0ad96cf0d985360600f60e7b8584929ff8ead5fbebd,2016-12-22T02:59:22.860000 -CVE-2015-0220,0,0,a6bbd19e4d634672bba9f5d5fb33a52c947be9da73e0d0dd71151b08b7083f79,2016-12-22T02:59:22.940000 -CVE-2015-0221,0,0,1cf9fa0ad4262ad12c099a5e0452f0872dbc830bdd28e7ffc0fe0524b151e540,2016-12-22T02:59:23 -CVE-2015-0222,0,0,8a80a67714a1e1a8a73563d44d95fbfc5928f095143cb571583f29eb6968488a,2016-12-22T02:59:23.080000 -CVE-2015-0223,0,0,64d25843fa66f29064746567eefd0320d6ec5ec2136ae4d10b3c59d80b37447c,2018-01-05T02:29:58.337000 +CVE-2015-0219,0,1,26adf15e7d21ff19474cec63cd2015a02db56b9ca8c10de8dd50d32cc6bf7256,2024-11-21T02:22:34.657000 +CVE-2015-0220,0,1,95952ee966bed9c9361e1d791f1c39a527772a0f42fdfbc5dadb96971c86aea7,2024-11-21T02:22:34.803000 +CVE-2015-0221,0,1,8acce09b7639d8a6a02487ab72e69b9ccd3b3f62383275800f2ab07b55a689aa,2024-11-21T02:22:34.950000 +CVE-2015-0222,0,1,174ed11fa8cfe34a2e73452573cf78aadf736ba55fd006092d83a02b4187d30c,2024-11-21T02:22:35.093000 +CVE-2015-0223,0,1,5c990e446c510e814ddeade578d1d9eb8d0d882857563d470f2908b28c5721b8,2024-11-21T02:22:35.243000 CVE-2015-0224,0,0,dc75aa7f107e2a2031cf04f3af32a7387032f5cd97dc84e25be57a244aee8c89,2023-11-07T02:23:19.653000 -CVE-2015-0225,0,0,d6645cd1ac0fb02fb47daccedc64e528a64468538f6017b35ecd817a0dbc041e,2023-11-07T02:23:19.760000 +CVE-2015-0225,0,1,277ce79818f84a9900cac7ac924fcb08fb48f6f34c9612c28d356cb0eb09968b,2024-11-21T02:22:35.510000 CVE-2015-0226,0,0,edcf696f4a4110a3304077bcd7c3f64107d9f5fc8021ebeb1d0ca1ea60fdf824,2019-07-23T23:15:18.880000 -CVE-2015-0227,0,0,9081feaaeb31f56134bc9d22e004d32f3470d48b978f0c13f90e1ad55dec53ab,2018-10-04T10:29:01.137000 -CVE-2015-0228,0,0,8959cbf09c491450d70626a3e3663a1331c8e53ee46b70ede6c57ed03670b67d,2023-11-07T02:23:19.863000 +CVE-2015-0227,0,1,1f744177155655f70f11e87e77a49f457ad1b1a36ca2c9dca674cffa309fba1a,2024-11-21T02:22:35.787000 +CVE-2015-0228,0,1,165c75d16b50339920e1ba90121ee6f0118fd1d33fabddfb1f4c94079cc08d20,2024-11-21T02:22:35.930000 CVE-2015-0229,0,0,c5aef3799f651af91802ddcb45f9e79042db7dbb2c48aca4ed46f17a4e75916d,2023-11-07T02:23:19.990000 CVE-2015-0230,0,0,cc9a09a6b91fdf48ef9c418736124a7834084b524098a6bd3bb3f845026ca67b,2023-11-07T02:23:20.257000 -CVE-2015-0231,0,0,2ad9fa93d66e8949e84511ee7b0ed3b38022f302621f33769b131c0a5f266f16,2016-12-31T02:59:15.997000 -CVE-2015-0232,0,0,1840deb05f8605bea357ac99334bd7333aa1e0ca60c79a80d95825756a52e383,2023-11-07T02:23:20.520000 +CVE-2015-0231,0,1,9c38a75b5bbe3b21d799f74433c29a517e33a7f216faa565b064310f8e77613a,2024-11-21T02:22:36.180000 +CVE-2015-0232,0,1,bfd5c15452d405ee26d56d049e372037f23108039c4716351f35eb05ca5034b4,2024-11-21T02:22:36.370000 CVE-2015-0233,0,0,f207f93ba46ce26e0d764c055fedcafa823843c1605dad902da814a3ae0d5bca,2017-09-08T11:56:40.397000 CVE-2015-0234,0,0,7d82f4d8e2dcf2ebaa082dfbee6a0cbd2f9f0b8462b0000a25442b090ad9c06e,2017-09-12T15:23:51.443000 -CVE-2015-0235,0,0,24e6a8ace16dc64a0687675529e891563d4e59935c7c1ccaa83cddc65b809777,2024-02-14T01:17:43.863000 -CVE-2015-0236,0,0,2de887e1d3561362203d8d6f67d09e690d6e3c3045bf1229a2b8553c95d02019,2023-02-12T23:15:29.867000 -CVE-2015-0237,0,0,cb218d2c6296a008e2b5060b8f73f72ba2d689f77d21e0ab7225335f45f205f2,2023-02-12T23:15:29.960000 +CVE-2015-0235,0,1,c8935a4e88fd6a475c7934bdcc09b86d3684e5c2c3aecd68911b0fdcf249c969,2024-11-21T02:22:36.780000 +CVE-2015-0236,0,1,93054588fba865cd02d7e2701b1913e42e82729f8386191073c899c167650ee6,2024-11-21T02:22:37.230000 +CVE-2015-0237,0,1,1ba46c73e4ca1fcdadff01299c5c5253e4ea61679034820378b193da3fc528dd,2024-11-21T02:22:37.377000 CVE-2015-0238,0,0,0c51f4df23bf8189e96dfb2367aaad898134e4132f23398672d74f8e6c0a51da,2017-10-10T11:57:32.827000 -CVE-2015-0239,0,0,b1718ab435f0e784b88b4af51cdb455a1bfefa7e74c8762591d2dc3a2b48292a,2023-02-13T00:45:44.713000 -CVE-2015-0240,0,0,9b052c3ac20e47624c9eda87d726eacb028360d4b5283280b6d76deaba736469,2023-02-13T00:45:47.043000 +CVE-2015-0239,0,1,5f6f26be80f5c3a779ad166606323aa267afcc71bc8f9843179bd8fca612ea9b,2024-11-21T02:22:37.637000 +CVE-2015-0240,0,1,bd7cf8ff55f72a1ebb96ae52ded3e41c81ef783c34347f4be3ad55a1a25177f2,2024-11-21T02:22:37.833000 CVE-2015-0241,0,0,27aefd97d9a39987318a52fa4d3ae161b791a072ccac6aa3faccd59e55d8119b,2020-01-31T20:01:31.817000 CVE-2015-0242,0,0,96f07a68ba628915d3b2803b505d1fcfecf6d0d494a1d11f0a9cb0c613270d82,2020-01-31T20:30:23.317000 CVE-2015-0243,0,0,0080d4d86712d100aa0b7a489a7625d8a309805fc4086c31f79318d24755d541,2020-01-31T20:31:53.710000 CVE-2015-0244,0,0,2e29b1ef64b101f36884e00afc5011eb8d5e2f6b9be80d04965a08ea91db5c07,2020-01-31T20:18:24.033000 -CVE-2015-0245,0,0,c02282c3e3836e5e2392c307a31a7de9b6020fc986b9dfd070a2e04d3de7c4f0,2023-12-27T16:36:58.353000 +CVE-2015-0245,0,1,2996c5077cecb28ac463268852113a3ed8c63a201f94176e3c61159b4fc68e51,2024-11-21T02:22:38.547000 CVE-2015-0246,0,0,e16d33c5f6d916f6b9823e7eca8c54e988b6ee0ccd92cf5c15e9063369878c1f,2023-11-07T02:23:20.877000 -CVE-2015-0247,0,0,50dba9dc638db4c439dcc9fc48f269b898af6b72961aaa2b9a0d1820fbbed4f2,2018-10-09T19:55:33.920000 -CVE-2015-0248,0,0,372ce0fc1e681ba83f8757d761a3edab29256c3297b14a4ac46d65aa244a3595,2018-10-30T16:27:35.843000 +CVE-2015-0247,0,1,4ca74038eb99ab9ce70925dc0db967f838795ecefc039631a2ff8be7d7de45a1,2024-11-21T02:22:38.717000 +CVE-2015-0248,0,1,c856967604ce0d1aaa3ed5b5469fef53af0552b6c1bbde6e0586a20f6f844500,2024-11-21T02:22:38.860000 CVE-2015-0249,0,0,8d8356d99e572b2e4d4f9431caede2e5954b539efdd383e46251c56cb430afa3,2023-11-07T02:23:21.120000 -CVE-2015-0250,0,0,0f17189e1cee7cd59c2befdf4e3de07918c83d3cbc67bf8e1c30bb199108ecad,2017-11-04T01:29:01.910000 -CVE-2015-0251,0,0,90db8167dc9170b98a21a4bcbfa9f6bad280632cdbd44db00af4bb2cd286fa84,2018-10-30T16:27:35.843000 -CVE-2015-0252,0,0,07e82e6150e0b85ab41c8132be64ea83f6d17adb3b6d5436352aa9d83859666d,2023-02-05T21:10:03.387000 +CVE-2015-0250,0,1,9d970b46c53fed15db15cfe115b9cde4332a5649a555f3d2b1e2dcec1a236f77,2024-11-21T02:22:39.153000 +CVE-2015-0251,0,1,5bbbc6e4a17579a2d20cdee1ddffda3c37a2795395fde310325dc0a564d06c85,2024-11-21T02:22:39.283000 +CVE-2015-0252,0,1,8a99150d6c405d6f7ca882e9ed2ec70db217d5a8a85a2de156a392d7677f37d9,2024-11-21T02:22:39.457000 CVE-2015-0253,0,0,afd720f005c6cd38757901c54fca55cdd1f4ff0c8f7d4188e8c1d01387462252,2023-11-07T02:23:21.217000 -CVE-2015-0254,0,0,debb36bbda3bb48119fcb8d72cd2bdca847bdfea239086b382b17128fdf1b5e6,2023-11-07T02:23:21.340000 -CVE-2015-0255,0,0,290740bca1e60d5c41a5112b4c363ddd23e2505a388adbb9ff02384d8136cec4,2018-10-30T16:27:35.843000 +CVE-2015-0254,0,1,8819acd8be3a0631e2d848e488ca3d1ab53e4e67c1af42acdfa7f6d9f78d3bdb,2024-11-21T02:22:39.837000 +CVE-2015-0255,0,1,978e909edec9db79c5181e0f602fb0ba300357b28b77874eb294e8c6d0020e4b,2024-11-21T02:22:40.097000 CVE-2015-0256,0,0,3ab9a81d28edd98ca33458924d86a24cd079f974f3dd0fa33b54cb633ae51d08,2023-11-07T02:23:21.450000 -CVE-2015-0257,0,0,f247e39438ab46808b8000368760ba5029076790148943052288a499ae88d21b,2023-02-12T23:15:30.157000 +CVE-2015-0257,0,1,3343265f4a06d1821a8b05d179a72e6bcf25859735735c06a66a7a7bdf5ec212,2024-11-21T02:22:40.267000 CVE-2015-0258,0,0,3ce950fde9632fe8d267687612298575e63c71fc11748b7eb692badc7a8ed80f,2022-01-01T19:54:41.480000 -CVE-2015-0259,0,0,7ae0aa9daa3ec441d6abf0f4904a32c2bb504daece74380504b4062b272e90da,2023-02-13T00:46:05.350000 -CVE-2015-0260,0,0,a23275f87bf8cbe3c4873875a7a20a94ccb6391828363263859720d175594959,2020-05-28T16:58:54.290000 -CVE-2015-0261,0,0,ea92d7868e61837a611d3d09b2c01a9b752060796ad747e8d62a537a60e94431,2018-10-09T19:55:36.997000 +CVE-2015-0259,0,1,b4a55e57cec6aa9df87ddcffc966a4df69d26fdcb6e38af706746ecd3bdd1542,2024-11-21T02:22:40.493000 +CVE-2015-0260,0,1,d98b53b93152a45445a78d233aa79649c90770c8d5fc3a8559b4886f36d426df,2024-11-21T02:22:40.617000 +CVE-2015-0261,0,1,9bacce3463fdbaa4daee533a4119506575d0a43389dd3e883211be56a5082260,2024-11-21T02:22:40.740000 CVE-2015-0262,0,0,91b482c122d492497260317ab8bd1c7107356838133f2d4333c5ca3d834c82a9,2023-11-07T02:23:21.750000 CVE-2015-0263,0,0,daae3fdf23323022fcec33e2aea0f38ed38863b64158d6bb7cf57cae585ba89e,2023-11-07T02:23:21.967000 CVE-2015-0264,0,0,cbcdc352a876abbbe9a54a1342a53d503051c50952480036983d6d38b7c9fb4c,2023-11-07T02:23:22.037000 CVE-2015-0265,0,0,7cdac49afa84aa23dcd0994e7a1ee03dbd6a2ed2cbb4612cf14c553a001b9911,2023-11-07T02:23:22.107000 CVE-2015-0266,0,0,2daf3b0ea5034dd46cfbeed789714863d4c75ec5e388ae3c6dc2b71db52541f3,2023-11-07T02:23:22.187000 -CVE-2015-0267,0,0,81ab20bdbb4bb00c312f4f31d97cba957857776c22f906db4ee716953f487055,2023-02-12T23:15:30.287000 -CVE-2015-0268,0,0,7427c133d14572924f845942687a62717b804abb89bfb9f5c169ca94d1afbb52,2018-10-30T16:26:52.653000 +CVE-2015-0267,0,1,d4b5d7a0417c7953277e347e760a06a90a11f81d168a2269c3948c0cd3366ec0,2024-11-21T02:22:41.370000 +CVE-2015-0268,0,1,6627fc3a12b4b3141d87841b49c02f3fecf0298fe07c743cacd2d2695dadec36,2024-11-21T02:22:41.480000 CVE-2015-0269,0,0,3a28b5bb79f46b1210685260b072b907e75a91a3ae70dffd0e61995215db690d,2017-06-08T13:38:14.167000 CVE-2015-0270,0,0,e7ef5bf564971f3237545a767d0d8ae2bdfb8ce154cf9f7482011acbd870c442,2019-10-30T14:27:42.587000 -CVE-2015-0271,0,0,d3a286cc8b4d29bb82785662bae71fd9424cbd32fd683eea12ccc7df388bd6c2,2023-02-13T00:46:08.943000 +CVE-2015-0271,0,1,c2141bb44a55565d741701a5d148a4e87ec6251cae5178d6335d74bb4ffbe4d0,2024-11-21T02:22:41.830000 CVE-2015-0272,0,0,c9a9502a61e6ed49b677a64046c41839de7b15dbbd5282e7fd100c305968d573,2023-02-13T00:46:18.793000 -CVE-2015-0273,0,0,c4a49d55000d309cc80f5990c93d4ca11cd92a2cd47d217df877618a5b471b6c,2023-11-07T02:23:22.293000 -CVE-2015-0274,0,0,b61bc530d91a29fa1ca7da70ef412354863f9721eec2a9f667ab75102283a825,2024-02-15T18:55:03.743000 +CVE-2015-0273,0,1,6e958576e44c713524ba5a3f232cdcf985d00eb7b72d101ae229641ff8e26b9c,2024-11-21T02:22:42.160000 +CVE-2015-0274,0,1,ad46be90da1cbe6d43cc34b49e94d8924d2130dbbbda55a4fefb4ab39a66bf04,2024-11-21T02:22:42.363000 CVE-2015-0275,0,0,00885f0fdab514aa8ddb2c4a78012d5f88d93918dfd746e3284ad22845fab283,2019-12-27T16:08:55.810000 CVE-2015-0276,0,0,fd3db1824bb6f77bb5ee57bababae024a90a2b82de51b6676a89e0d1e093f969,2020-05-28T16:58:56.713000 CVE-2015-0277,0,0,216886ae991fa51dda6cb3b5aa8333a0736159401e5667be3781f89438f185dc,2023-11-07T02:23:22.433000 -CVE-2015-0278,0,0,31ad5d4ba61c64ac888a169aab52161dae156b1aba149bb1221d88e43008c7d7,2023-02-12T23:15:30.490000 -CVE-2015-0279,0,0,5a79118d4a0fbaf2c5680cb71be523d5fc4534bce1138d0c82230ee8786766f8,2019-07-23T20:15:11 +CVE-2015-0278,0,1,3c1c4c6122d2ec03c0c83cd5dab4c6e7a1d8e175c5e2a031cde58c8dd870649b,2024-11-21T02:22:42.857000 +CVE-2015-0279,0,1,8cb4b2fb9a05039d35c9ea8e816cfdb6b83fba339f9438244316d629dcbd1424,2024-11-21T02:22:42.980000 CVE-2015-0280,0,0,4965352af94e09f8785484c0005c486dd8296f98efb2f4551df5a2ccd29e822f,2023-11-07T02:23:22.513000 CVE-2015-0281,0,0,9721e1146596901c844163d4b69205d7abfad7564e1ca3a8f564442b1c254075,2023-11-07T02:23:22.743000 -CVE-2015-0282,0,0,191b399e778f12c2403c83173401e04b11cf05353062646b9c04b10ec7770532,2018-01-05T02:29:59.227000 -CVE-2015-0283,0,0,fbe383366ad740c4cce135ba1416e356d8aba5fdc318bd0ea98deac45a6d75ea,2023-02-13T00:46:32.437000 +CVE-2015-0282,0,1,9f1a1439dda943fcc541202512b4c46b5ebbd770bb15cc3151aaf91872a1a770,2024-11-21T02:22:43.130000 +CVE-2015-0283,0,1,081fef4596148bc059398c3d41e791fa1fc417f31dd364f6cf090eec03cc3d26,2024-11-21T02:22:43.233000 CVE-2015-0284,0,0,1f4901f26204c81a10e5d11965428eeb88bddd4faa0428815300a0ca5bd61cf9,2023-11-07T02:23:23.043000 -CVE-2015-0285,0,0,9833f249302c1fab58ba94e739d9d947d1f5f41cd3efb41f4b4dea2681faef9a,2023-11-07T02:23:23.110000 -CVE-2015-0286,0,0,299dc7aff4fdc48f08db893da2f90bb8747f33d5e1c5e42186bf4a86d97ca355,2023-11-07T02:23:23.180000 -CVE-2015-0287,0,0,136720f9f09909ebd823b3b5c3bbebdfaf24729975ac7c9851c62c8316b9a18a,2023-11-07T02:23:23.300000 -CVE-2015-0288,0,0,536b6311d08d375775de181235804f5e6da05403d5dbf6d250300ee9556c7374,2023-11-07T02:23:23.427000 -CVE-2015-0289,0,0,a37311d6e23f1992f1377b8413de3bce7e99880ac0290d1eb6577c09f86ba5dc,2023-11-07T02:23:23.550000 -CVE-2015-0290,0,0,5c5533d61452c1e789a1aaa13f765b153b0f404b750e2a9c8731975e33bab318,2023-11-07T02:23:23.670000 -CVE-2015-0291,0,0,a381cd74c7b86fa9a73b0d1e80653353917c483edba0d922dd16cd7096f91498,2023-11-07T02:23:23.747000 -CVE-2015-0292,0,0,15f61bb3099a6d0c637650b2d5c18f48fd1b2e447196105931494afaa3d3ab87,2023-11-07T02:23:23.813000 -CVE-2015-0293,0,0,30ac1fdd843720a24a6d827cc05051512e90099db0c5b47b7d6890b0890d137e,2023-11-07T02:23:23.900000 +CVE-2015-0285,0,1,578628e93285ce1b6ece8fb84b62f224229b9766f2c8601883f59731582f5e8a,2024-11-21T02:22:43.490000 +CVE-2015-0286,0,1,498f5808d2e5c45e0083c37e367bf1d675450b3b05d78e34cdcd460963bdcd87,2024-11-21T02:22:43.700000 +CVE-2015-0287,0,1,766eef8e319b0fd5452dc2b64de9b4e169248be4495fd6e3cb06759cb31bfbc8,2024-11-21T02:22:43.930000 +CVE-2015-0288,0,1,673ba3fe7e22f8f9393be0a46213281102c5e3bfdaf79d7b1b48045d420e821d,2024-11-21T02:22:44.170000 +CVE-2015-0289,0,1,e06a51717adc2652dd65f43e81826217f974f4f0e739fc22675ecb331fde9eba,2024-11-21T02:22:44.390000 +CVE-2015-0290,0,1,aa9f3d3d464fec9d1ac72037a45d03adaaf9d754787531aa11526ab30435b5ab,2024-11-21T02:22:44.620000 +CVE-2015-0291,0,1,6d682eae6a5c2f1dcaffb49b4f4e54da59ba97b5a4a0e0f01bd508effa241eaa,2024-11-21T02:22:44.830000 +CVE-2015-0292,0,1,e42ae44a3094877a93a06ced4c5db393ba58357f88d2fab3cbafbc8fbc02e406,2024-11-21T02:22:45.030000 +CVE-2015-0293,0,1,dec2cfb6626588e7d94376f352e3492a2045b7342391e941b4998a1f6355c743,2024-11-21T02:22:45.253000 CVE-2015-0294,0,0,3b9cce6926c5007098956b509496eee3aa522211aa68a789d344d21b1dfeb793,2020-01-31T15:24:13.133000 -CVE-2015-0295,0,0,719a4cff616430e225144e8b9fcbd46f166b875992069894d04d59b7ba889f7c,2018-10-30T16:27:34.687000 +CVE-2015-0295,0,1,ca8133d1d4d9ad206c910c93d2eef9f55a902adcaef31bdde0cdfd00328b5fbb,2024-11-21T02:22:45.603000 CVE-2015-0296,0,0,347c644cdf049506aaf4f1553cf2557059e8773bba5462f8cbce7187879d9e3f,2017-11-01T12:46:52.997000 -CVE-2015-0297,0,0,0c41ae3cb186cb27de23e8101de751fa3dd86506c4e1d7a1b6b349e991568ade,2015-10-05T21:33:54.643000 +CVE-2015-0297,0,1,c8257e9f5b75c79d8ee38875f234809d6fdc68a0bc2b399c076aab60106cd3dd,2024-11-21T02:22:45.853000 CVE-2015-0298,0,0,f7c5df8b4cc9f02aa6ea348490d7f7fc64c569d06845c7bc8973779c5cea50bb,2015-08-25T18:05:56.953000 CVE-2015-0299,0,0,e2dee15af6d9583e4eaf1d110b708692e5406eb5cb794fc6a2c77bb9095fd952,2015-09-30T16:14:52.337000 CVE-2015-0300,0,0,90e957d184b18d65bf865359ce9c21d12ce9a9a42f1d64ddbfb20da5a92094c2,2023-11-07T02:23:24.067000 -CVE-2015-0301,0,0,34e06749f3f3929ecbef4b3a7ee560d45c5c943e654741e1a7e316102526e556,2017-09-08T01:29:38.607000 -CVE-2015-0302,0,0,cd4231247decea9f8750e9b48512234309c2f2c00bb15f7003ab71c74dae26b9,2017-09-08T01:29:38.700000 -CVE-2015-0303,0,0,f3b6dad0b746eefe1433c3220846d33f509b8dcc17188c86c0d3ea6f447a1928,2017-09-08T01:29:38.777000 -CVE-2015-0304,0,0,951feb7d6441d2d8e5838b04622527fa4fc5a4f7fd6ef8661bddaf5939c645c6,2017-09-08T01:29:38.840000 -CVE-2015-0305,0,0,fa05da97d27da0458086f5e2191f1ac357f2515c76caa0f57378ce32fcb160af,2017-09-08T01:29:38.917000 -CVE-2015-0306,0,0,53ddf5bd546eb337f76eaec5c65bb68d58bde351ca36896a284bd28ef8f47bdd,2017-09-08T01:29:38.997000 -CVE-2015-0307,0,0,35e795b30db2df8d137f4047aad7d09cad2eb00abc9d3a0a78b2295f75c2daf8,2017-09-08T01:29:39.077000 -CVE-2015-0308,0,0,bc19a56b4568eed2587688d26bfca1d65389749f3d1f9b6c81509ab7ef23ef6c,2017-09-08T01:29:39.183000 -CVE-2015-0309,0,0,9ff43db19625acb75947ff45d6c5dcd7333366b3402e42fe67dc89da415abd8f,2017-09-08T01:29:39.263000 -CVE-2015-0310,0,0,a824c91396105c6b86b2970783a12719d200adc0b6d6b827e81a2543f09a5b3b,2015-11-13T17:08:35.050000 -CVE-2015-0311,0,0,e56fe258128d9f97b1e99a8441a9d0b3d45412f7983c2a54b7e40eaab0650836,2024-07-02T17:41:45.947000 -CVE-2015-0312,0,0,6581a035ac721da2b72f6b43139c0a6774fe6f35a9df4f8dbeec9ee67c2351ce,2021-09-08T17:19:29.487000 -CVE-2015-0313,0,0,32b537c35671e60ff577889083856d742cdab09c92204ae3c3745aca85e1df3c,2024-07-02T17:41:33.407000 -CVE-2015-0314,0,0,78fa829b3ec9c8b8ac6e159aefe040116b3dcb97608004938c17f0320c5f4fc1,2017-09-08T01:29:39.513000 -CVE-2015-0315,0,0,44160ebeec789324073af70bd7f7c8813d95e4ee227f6c35c0b4b66dc021d1d3,2017-09-08T01:29:39.577000 -CVE-2015-0316,0,0,541714a8fcf5fed7bfad669891ec3c15ea1abcf3a78a0c054b76f2eecb0134d5,2017-09-08T01:29:39.637000 -CVE-2015-0317,0,0,8e7666721b1c1a6f8a47477ac0bb132a3e788a7cd8a3cedca0021623f9cb19e1,2017-09-08T01:29:39.717000 -CVE-2015-0318,0,0,8d2150141899dfa7db082c6329775cfda4875c3dd4f6480ca028106d992aa38f,2017-09-08T01:29:39.777000 -CVE-2015-0319,0,0,0a3878faff03749bad44b26af23a8e5994e8bc1e3f370d7fce0e621d15d3149a,2017-09-08T01:29:39.857000 -CVE-2015-0320,0,0,111d357967e247b1e4e1f017556a89119b4fc0cfa9bf67b91d4e88f18828a917,2017-09-08T01:29:39.920000 -CVE-2015-0321,0,0,9aed02f883eb9becd3d16f32e7794b88d98f02392edc622cc7b52cb441be4a7e,2017-09-08T01:29:39.997000 -CVE-2015-0322,0,0,f34c0cd803e5f06ffa112ef48066b7f54426f002c5fc9de4ac7b5429c5c1b07f,2017-09-08T01:29:40.060000 -CVE-2015-0323,0,0,59e8a00453b631174126f18f0c48c59944392fd78a741b011ed05eef2fb8173b,2017-09-08T01:29:40.137000 -CVE-2015-0324,0,0,96f9a4fb988575ef690fe2c9a84804b1e4e5e178a31ae5a42c413b57bd1044c9,2017-09-08T01:29:40.217000 -CVE-2015-0325,0,0,e0bfac687041abcd6297a26fde2b20747585e00ffc1d69cba4a79fc4cef48036,2017-09-08T01:29:40.277000 -CVE-2015-0326,0,0,51ed9bd3e70594778a404b7a23e216aa7746f83023154aea29bf0996bd36620b,2017-09-08T01:29:40.357000 -CVE-2015-0327,0,0,674f6f602935c2e4559a2caf8e1772519aac60a4e8dae70f628a0d4b584fb109,2017-09-08T01:29:40.420000 -CVE-2015-0328,0,0,54007f4e2c825ff644da0972c5e24e0d5e926e977de7a5f1048226b5308ffdd9,2017-09-08T01:29:40.480000 -CVE-2015-0329,0,0,0f8c628148b740754b22e98569a3153fa8d74c5b3eaff107c70148c9a0b52e6c,2017-09-08T01:29:40.560000 -CVE-2015-0330,0,0,0302b0df1a1e639b610896a5795e7d167e11390550f4393d5e986a1e5f2a80ac,2017-09-08T01:29:40.637000 -CVE-2015-0331,0,0,a4147198e557c12b1fb2b60ff94be85ec12953cab0bb7d6f154da0bef3e6da64,2017-01-03T02:59:31.440000 -CVE-2015-0332,0,0,c64ad659d9c974bd020810e50221f312995c658bfeeba44f5e71889b193c2d04,2017-07-01T01:29:12.077000 -CVE-2015-0333,0,0,7e280348f3a9a02fdb7a6606627ac47d4b774399138fc7be64a14434ecf2669c,2017-07-01T01:29:12.157000 -CVE-2015-0334,0,0,8512075377baab66499045a75390b2468dc271aaa0f0fc4113e5f44bbc71a9c4,2017-07-01T01:29:12.233000 -CVE-2015-0335,0,0,40de0c0c11f1f2d3bfe842a775055be292dde9f27ecda87d15e247908af71454,2017-07-01T01:29:12.297000 -CVE-2015-0336,0,0,169c88da730117bb8d95a2e9d1bd21a99ad48d8ed898eaebf27ca19f32f6090d,2017-07-01T01:29:12.343000 -CVE-2015-0337,0,0,2ade66a8a2ea442c24f6de7a50643ad9b209e12877a75569fcd9392a27fcba75,2017-07-01T01:29:12.407000 -CVE-2015-0338,0,0,76c9472b1faee5b76c9aac41fedb1dd33eb452dbe646294504882c45dd680e54,2017-07-01T01:29:12.483000 -CVE-2015-0339,0,0,dc3f9e7f1b4cf8de3086d61fca91d68a9695d8010596b240fbb052bbdde5980e,2017-07-01T01:29:12.547000 -CVE-2015-0340,0,0,093c6d0d36894160554122fe53d052be33bfff45e435f02d2a7161473e969e9a,2017-07-01T01:29:12.607000 -CVE-2015-0341,0,0,e85aebddb9e3ca809176fea8d5f1e24e48f44c38c394d4155273ffc5ed044c07,2017-07-01T01:29:12.670000 -CVE-2015-0342,0,0,64dafb2a519e1d16c2f2117b06d1105b1f51697df84eb44c795cc3a3ffbdc300,2017-07-01T01:29:12.733000 +CVE-2015-0301,0,1,873b7c1b7db97f56c7788e0099db079af1d2f1219d9686ab01738f3a2963dd1d,2024-11-21T02:22:46.207000 +CVE-2015-0302,0,1,2c64b75c1a65e44ceedb562d682ba172e088b35172cc3cf4f24bc6e7183b8b3c,2024-11-21T02:22:46.367000 +CVE-2015-0303,0,1,81b4e3bab4ba0a9f8bebaf925e6b137db5e63ad2472f0789650becd5cc8fe11b,2024-11-21T02:22:46.507000 +CVE-2015-0304,0,1,9d41083f9262be0fbc4e1fd30cf17535eb9dd61c57c36b9d7704d9658bd7d0dc,2024-11-21T02:22:46.647000 +CVE-2015-0305,0,1,c477f7f72cb79f99e9de1435a0fa927e774070f3e650c005d3f8ed1d10b877b6,2024-11-21T02:22:46.803000 +CVE-2015-0306,0,1,df4fe4e01b333c0ba32f0be86c17018a16ab3af1e66663cb0ab0d2ee666ce479,2024-11-21T02:22:46.927000 +CVE-2015-0307,0,1,c1d9cab75fa4b32c05da71d7d15d296552bc877a73ee95626208a23081c1cace,2024-11-21T02:22:47.063000 +CVE-2015-0308,0,1,92f2c044d5146a5039e38e36f4ba119a669b7b217e079f6fd4f1923a4490aee5,2024-11-21T02:22:47.210000 +CVE-2015-0309,0,1,f90e8e1476ffe79292d834255d36b53ef1c8e7803ed82b7ca844f040fdff74e2,2024-11-21T02:22:47.360000 +CVE-2015-0310,0,1,03c9a9179b85b2d471b312980fab81a4d64a4bf1983f24cf3cc9c39c8222694b,2024-11-21T02:22:47.480000 +CVE-2015-0311,0,1,f00317b309f40bd5e703d963ff295cbcfb2ae8725dc0e28c3c933ed59e214535,2024-11-21T02:22:47.597000 +CVE-2015-0312,0,1,b3b502d5bb20a9e9f7614d0be49c3e0332de478dcd418bc920cbe2138ed43a06,2024-11-21T02:22:47.727000 +CVE-2015-0313,0,1,f6dae7d1a12192ab9eff0a44a94f7f10d35cb7b6137760aca9e1efbeb17419e1,2024-11-21T02:22:47.853000 +CVE-2015-0314,0,1,3292504d8320d19852fe4fe400cc5088e69a59f5b35d22072c809824aae4e224,2024-11-21T02:22:48 +CVE-2015-0315,0,1,728af4e581e002b7c91787055145c786f94061f4c7b4c1c27177082d937037fd,2024-11-21T02:22:48.120000 +CVE-2015-0316,0,1,57c4901ddbee0781b72d65c6051553f90f1ac502cb3dd077fcb04659cd82cf67,2024-11-21T02:22:48.243000 +CVE-2015-0317,0,1,122bf481b77e2294e99088d15f813c21a60486fb3f434236bf9b98ac350394f4,2024-11-21T02:22:48.363000 +CVE-2015-0318,0,1,05159933927779a1b8390c7d31230710dd4abd0ebd23e046fe9680c1957689e0,2024-11-21T02:22:48.483000 +CVE-2015-0319,0,1,46ef0b71080e9e0bb3061d670a5065cf43b996fc9dc5d86bc11ef9faecb60d49,2024-11-21T02:22:48.607000 +CVE-2015-0320,0,1,7a88d432d6e714cab47a15a3cd0eb19789bb0e29aa487339a4d6b8368e7be61b,2024-11-21T02:22:48.720000 +CVE-2015-0321,0,1,6cd8d646c3a976f4d8e5796cbcfee89447ae907aff82d65030236fc8c6c46496,2024-11-21T02:22:48.847000 +CVE-2015-0322,0,1,f5c1d7319f68b0a0e9426acfb3ae09a135575e7a78b3008feb2338f53a2f2318,2024-11-21T02:22:48.973000 +CVE-2015-0323,0,1,1a5ae3140695e004fade45a49eeef37c99fedaaeaa7df8d6106140c3b4a77764,2024-11-21T02:22:49.100000 +CVE-2015-0324,0,1,66bcdf32df27bd8a0d5ae2d7621298229711b5c853c4f53df35d8b7c85a3a885,2024-11-21T02:22:49.230000 +CVE-2015-0325,0,1,d194c17014c25134a151b95d7cc188713c2f9e7075f65b93857b295eccb54f3c,2024-11-21T02:22:49.360000 +CVE-2015-0326,0,1,4d0cdd2f5fd77e388da61dfee58f64360d18720bbc537c17a30725aa3e3f49bf,2024-11-21T02:22:49.487000 +CVE-2015-0327,0,1,2fa76dac1f1721654b7b0604d4a084ff398e2a7d53f9e053d203c7dc0b67c902,2024-11-21T02:22:49.623000 +CVE-2015-0328,0,1,080c0b3f12f76e01f24f35a9ae245a45f254a4ee3097f4f7153a1e13529bf9de,2024-11-21T02:22:49.750000 +CVE-2015-0329,0,1,f24c6b63eba6e253ce1fa2c05c5fb81b9882885634d9f4a002b284c3b09d51dc,2024-11-21T02:22:49.877000 +CVE-2015-0330,0,1,634fc387b492a21589109c35737d9ba09ecb4c5ecbaf3fa231b1a765be7bf60d,2024-11-21T02:22:50 +CVE-2015-0331,0,1,400924696c28e053773cb4b75caf14490901a3e7739f9c6539143ff29a063914,2024-11-21T02:22:50.123000 +CVE-2015-0332,0,1,bdaace0b5d653063cb0784155681f0881def425242cfadb471005985420f5b9a,2024-11-21T02:22:50.243000 +CVE-2015-0333,0,1,d19219588961d518df529c22e8a1c32285000a86ad3afeb1bda0b56131424596,2024-11-21T02:22:50.370000 +CVE-2015-0334,0,1,a5ac5771731bcad723cff2946de9098455aad3135b0b48cb249c4cc4e1dc1100,2024-11-21T02:22:50.480000 +CVE-2015-0335,0,1,5833ff44bdf4e9c5e4d698db24cb7ca7e42e34fa3163c8f5c2fb8d6e9d1169a3,2024-11-21T02:22:50.593000 +CVE-2015-0336,0,1,457b1dc8a6eb6cdc555850779755aa7ddd6995df11f6ebb5f1d27455f089f147,2024-11-21T02:22:50.710000 +CVE-2015-0337,0,1,0e39c827b3fcdac2aa04a47691e62ed63ae6e67d62fefeb99d98d7d5d0e3d898,2024-11-21T02:22:50.830000 +CVE-2015-0338,0,1,50ad8b2234cc08522b4178f7a05d80c3ac02380ab37a41747fd2957d9c366f3e,2024-11-21T02:22:50.953000 +CVE-2015-0339,0,1,776e1d0b8aba64c7fac4b14b85529e6ca5ca2ece68fe3aa618336ce91b2bfe36,2024-11-21T02:22:51.070000 +CVE-2015-0340,0,1,cf8c3a624a25f335fceec45ececa698e2eaa9dcfb8dc38ccc603a338b1d34b29,2024-11-21T02:22:51.187000 +CVE-2015-0341,0,1,7647063a52a19674bcd9278ad1071364b8eeb2fbaebf2ea4e243e1a7f9e1905b,2024-11-21T02:22:51.310000 +CVE-2015-0342,0,1,c6bf6c6bfb1ba9d800ce892447835f7271a8d79e5690e384dd1835b635026063,2024-11-21T02:22:51.430000 CVE-2015-0343,0,0,b5bb89ab6c9c285617608dff236a7d5f9eb6e9b69a6c38446103af172023ab78,2016-12-31T02:59:16.797000 CVE-2015-0344,0,0,15d7ecf83604e7084e307abf483458f1772f3c92653fd0b92cbf044fd9f3f356,2016-12-31T02:59:16.843000 -CVE-2015-0345,0,0,45859c674c2a83bb19cc2325b8203f4c6318a202893f07e5ce6aeb6172839a56,2020-09-04T14:05:43.617000 -CVE-2015-0346,0,0,972bc14cb30fa07563bea7ce304edfbbfbde4c165042617431cdf25616bab31d,2018-10-30T16:27:37.467000 -CVE-2015-0347,0,0,41dabf41527a274547cc17709219fff46bcf5cb44e0998f3c60da9ceedb8a93f,2018-10-30T16:27:37.467000 -CVE-2015-0348,0,0,197a47e10e59f3ac39d1a1788c3a4e6920b4e04a01d35c1760a3fad7ca24d676,2018-10-30T16:27:37.467000 -CVE-2015-0349,0,0,c14b54625aa3df3ddc9e6d9f9c9efb628f36ab5c6fd5888d999109b4fcbb7ed5,2018-10-30T16:27:37.467000 -CVE-2015-0350,0,0,5adf43bde3aef8520449dedaf0ad9470f21f4f24348037756892b136b32253d0,2018-10-30T16:27:37.467000 -CVE-2015-0351,0,0,c08f3b0a3825318617aa00df11e19aa778ed77810d56704675e6116b34aa6c79,2018-10-30T16:27:37.467000 -CVE-2015-0352,0,0,0935bf57900a3df09df58b052f91b5a30a683c72ae60a71e4d3b322cb3e47e64,2018-10-30T16:27:37.467000 -CVE-2015-0353,0,0,799924dce7d41c0a9a316715a50a9831d1151ec1759aedca28daf736b8d1167b,2018-10-30T16:27:37.467000 -CVE-2015-0354,0,0,fe0922444d6603a6d5ead9cad4f1a9dd9c017247e9b54c5141593ed3e8941dad,2018-10-30T16:27:37.467000 -CVE-2015-0355,0,0,646a08201db0ff951bb3b9ca87f83ea3a55c85116008a7b77fe30cc30cbe383c,2018-10-30T16:27:37.467000 -CVE-2015-0356,0,0,f58a6a9a8d321e43f0c1e56f027111ddeb99b0ca8624561868e5ccad41e42cf9,2017-01-03T02:59:32.533000 -CVE-2015-0357,0,0,6776884b07f9337386dcac5fdbccc5118915ef1fe16c68aa534c8b2a8701cefa,2017-01-03T02:59:32.613000 -CVE-2015-0358,0,0,03883f6171074cc91e13eb28fc85141a24bb0c583c1ba4b05f6d0838e41cbd4c,2018-10-30T16:27:37.467000 -CVE-2015-0359,0,0,a8dd9fda6bcadda638a98636d7cb0eeeae58d5b52ac9e13aaf0b3cb00de1b9f8,2017-10-07T01:29:00.507000 -CVE-2015-0360,0,0,47be4878f45c8e5daa4d68229b88e5042002a0167ca2d8a957c64d44ee1512ac,2018-10-30T16:27:37.467000 -CVE-2015-0361,0,0,7a2af6d9c6b079d1a91b38638ac2834b3d541120f56aca12707359660ca32917,2018-10-30T16:27:35.843000 -CVE-2015-0362,0,0,7df15eb636af3cdb6ddbb8bb3b35f4a66b65e24ff5ffef7cb3934318a1f9f756,2017-09-08T01:29:40.683000 -CVE-2015-0363,0,0,0856f451c7fd07a39e31d36970694e043a860ab1f3ddd16e98793552e0c280b2,2017-09-08T01:29:40.730000 -CVE-2015-0364,0,0,fac6a1f5a57dd6aed29b95c139fd5f25c3703b229521d52137497704637c12c6,2017-09-08T01:29:40.793000 -CVE-2015-0365,0,0,bc6b4a7a1755eaabdc87fdab96ef69075c1a675898dc8d55a1344fce7a5de86c,2017-09-08T01:29:40.840000 -CVE-2015-0366,0,0,0e2782eb87ab6248d9fd062efb06d0f4eac8e53dce7d844ee942bfdec5f986e2,2017-09-08T01:29:40.903000 -CVE-2015-0367,0,0,4cb3f1fab020c2f2b0c1506cd0e36022ae9c07ed6328192fbba5abc3f9017e0b,2017-09-08T01:29:40.950000 -CVE-2015-0368,0,0,893fd0a24f17b47bc919bdf17281de3623ce163e5366dd7576d08b4b8e3d2883,2017-09-08T01:29:41.013000 -CVE-2015-0369,0,0,f6acdab54200cc89d1c9afd7e3262632ca3e682bebbf7283cccc1a41e9f64202,2017-09-08T01:29:41.060000 -CVE-2015-0370,0,0,f900a8e2a0a298a67b1098e96e3272ecb1269103f7ee722ea40ce8f589d325ce,2017-09-08T01:29:41.107000 -CVE-2015-0371,0,0,11d773777d700bf0664d91a5e60064c6b7597e746d2f6db1662ee199a226b1cf,2017-09-08T01:29:41.170000 -CVE-2015-0372,0,0,97925f187250a11dc081033fe176c77460895b62a9cfe69cd14436aee3f24441,2017-09-08T01:29:41.217000 -CVE-2015-0373,0,0,f8e8e24484639e3e4833889f09131a67eeffa35496ee46911400485648ef632f,2017-09-08T01:29:41.263000 -CVE-2015-0374,0,0,972370f3ec2d7d6640331341c0695e314f2618225fce7cb4e50e01d993278eaa,2022-09-20T20:44:15.890000 -CVE-2015-0375,0,0,8561757723cb3a3061c9b5a24c96ca355ae24fda9159e94f7f2f0be9ff220106,2017-09-08T01:29:41.387000 -CVE-2015-0376,0,0,e27f8aa76e567799ed515356ce61d3c5139725fcaf20e052484dca3700cddc9e,2016-06-29T15:06:57.297000 -CVE-2015-0377,0,0,b5f6964cbd98ff5ac78fe0a0768a239c777e15408404763d32fab105d40a8fe8,2018-10-30T16:27:35.843000 -CVE-2015-0378,0,0,773eff9a3d24206ea5277ce2ab4eb28a32b556c23a0d8f4078d93d11614396df,2017-09-08T01:29:41.513000 -CVE-2015-0379,0,0,b6ba0fcd0c90c443bb83d44e5e50727da659a021a1f66223473135e49c17c81a,2017-09-08T01:29:41.590000 -CVE-2015-0380,0,0,a7b4b81b7f01ea267399b2a59f9ab3ef6c8e81f90b36ce109fc4e1af5e77a3d8,2017-09-08T01:29:41.653000 -CVE-2015-0381,0,0,6a35c9000f9e5a0c17d431bbf603f6e320130c8826b75edd7cb7963f45bff4b4,2022-08-30T17:30:08.483000 -CVE-2015-0382,0,0,197a81fe9d63da281d7027d08c8a3dbe08801eb235f45541aab0fca48dc18818,2022-08-30T17:36:47.363000 -CVE-2015-0383,0,0,8bf1c40e8f96119dc474c82806e04f7a1cd31b160ca9f4426cbcac631890f486,2022-05-13T14:57:20.773000 -CVE-2015-0384,0,0,fc457c32d5aad376622f18ef35108785e0609786238910e57255e21bf31f5e5c,2017-09-08T01:29:41.950000 -CVE-2015-0385,0,0,97296c6d10faa94e3c391ef69466c8cd7cf6549f00660b096270ed46e3834620,2017-09-08T01:29:41.997000 -CVE-2015-0386,0,0,7807527ab32c6f534278e06e41250ae2826113b69415c997f75a50838160518c,2016-06-23T17:54:55.607000 -CVE-2015-0387,0,0,ed620be0b1ce8a791e7d69264fccd2ba05e5776ce33ae537da94adaf72bb913b,2017-09-08T01:29:42.060000 -CVE-2015-0388,0,0,2f57b7f96446089fa79b89ff3d96512ed8b5c16c476b5debbb1cf0270c9ce091,2017-09-08T01:29:42.123000 -CVE-2015-0389,0,0,7934c989540a979bafa5355b577c75fc33f88fb73b546d9e65a96777032e3cac,2016-06-23T17:55:24.513000 -CVE-2015-0390,0,0,b0622ae4a1f0410c4aaee078bdf423a8c81a9a0da77936d1c5218082b182d8a2,2017-09-08T01:29:42.183000 -CVE-2015-0391,0,0,1abba8c9cacd82ee5cc7f7b3e5bddf4ab299fdbb2f6e7aead520a41df7e0231e,2022-08-26T16:03:49.777000 -CVE-2015-0392,0,0,7118c4ae0a4feef4cf03f9f81151681906f201a5d1029bf35230c264cf13b3b8,2017-09-08T01:29:42.310000 -CVE-2015-0393,0,0,43b654f7f76ef19971aa45240cf87fdaa5740d1f60c15312668155f661db60c0,2017-09-08T01:29:42.373000 -CVE-2015-0394,0,0,65c20341ff6baa1d09150407eef873037ca0f40fc257c59a8586e66138bbccda,2017-09-08T01:29:42.433000 -CVE-2015-0395,0,0,b970c40d6d9c34c547b89d3192042c59cda94615bd33850b8d1b87ccca4f01ca,2022-05-13T14:57:20.900000 -CVE-2015-0396,0,0,478c0dd13551e967782769cb26a40bc0b11cc92ec94bc9e87610426a0673c538,2017-09-08T01:29:42.560000 -CVE-2015-0397,0,0,239bf5e4e96a49602907fa6a42f75091e6f7cc83ebcf14c36dfd513a458fe8fc,2017-09-08T01:29:42.623000 -CVE-2015-0398,0,0,376695a45466ad9c0e35c70b695f9911d20e0aee4b67ebe803c66177a238be1e,2017-09-08T01:29:42.683000 -CVE-2015-0399,0,0,b63dae1e02112c0e2f3c8e30150b2838e25e11399b3f606b5b39e208b3a5a51d,2017-01-03T02:59:33.817000 -CVE-2015-0400,0,0,2195260167ba53728738ba10a5ba0c489b39a752cd24fe49e6709155e1666915,2022-05-13T14:57:20.910000 -CVE-2015-0401,0,0,caaca4156ca7d6c4d7a94c38072fbb0f1afe5eaf471798c4e7ca104aee44991b,2017-01-03T02:59:33.957000 -CVE-2015-0402,0,0,bf152cd07bfec804bbaebf612fe58eaf46d1969cd96e4c2f503ff163a2c8e4a2,2017-09-08T01:29:42.810000 -CVE-2015-0403,0,0,5fa7c849e4600bb8e9f98a85fe3e52518069e785bd910c3c4075c51dbaf673af,2022-05-13T14:57:20.920000 -CVE-2015-0404,0,0,03030699a13115ee5d1333e54732e2496acca2a05bea718b3c8d136cb22f6bea,2017-09-08T01:29:42.920000 -CVE-2015-0405,0,0,a879cca7585829f8a06c05a1be1ebd9f4131b8b04f50367caaadfd7eba7a9367,2023-09-12T14:45:07.473000 -CVE-2015-0406,0,0,3c79cb6847cd4d3e1f28acdddb77dbbd49c497bbe324e216c95b0b5acd6bc14c,2022-05-13T14:57:20.787000 -CVE-2015-0407,0,0,9d4345c5c9df3091c466b5e2965c75cdcb851945c5545e155bc693129a4dee8f,2022-05-13T14:57:20.793000 -CVE-2015-0408,0,0,83cde422b0d1a9d4980f807846e8f38d46b06d55300203a1449d06925293ee5a,2022-05-13T14:57:20.803000 -CVE-2015-0409,0,0,02ba7e8a523446d73fe36ccfd19bd506e45f7b554f498f2735f6bb718a9b03cc,2017-09-08T01:29:43.217000 -CVE-2015-0410,0,0,3452020bab1649d08e5cb1383207b285dcb52be649f714c5c11f10762a2d6602,2022-05-13T14:57:20.810000 -CVE-2015-0411,0,0,31ac583332f1410d98ef73b10f7828b9e220d77fb202c855fca5300fccaa5d48,2022-07-01T14:14:30.270000 -CVE-2015-0412,0,0,4d11425e1a229473e90d341203200328cdc4cb54bc8dc5c40f7aa3c669b11eb4,2022-05-13T14:57:20.827000 -CVE-2015-0413,0,0,2f2b203a2d381468dde020f10ce704a184f8a63e26e430c2ca0b8b28827f4680,2022-05-13T14:57:20.837000 -CVE-2015-0414,0,0,ab2e641902f6cb2b2b35ff37e2cee85b8ec75dbce46fd605d6e99ef69a2a5bfb,2017-01-03T19:00:07.867000 -CVE-2015-0415,0,0,ebb6456c9b86b2579bd8dfd1d44d9efe99d09621f2e7356e2945bc6b709669af,2017-09-08T01:29:43.577000 -CVE-2015-0416,0,0,bbfa2e919ab6c38dbbd9f6d025f2c2654758453116fd8cccaf69f610a93b592b,2017-09-08T01:29:43.637000 -CVE-2015-0417,0,0,4cc4c066d785b07413691407a7a64c12668bcd0f6f2f91dd11aeb4c60450d2b8,2017-09-08T01:29:43.700000 -CVE-2015-0418,0,0,e1d9ebc207bdd677a13aad764a11703889a2016627df80e2a77f8fa2381fdd60,2018-10-30T16:27:35.843000 -CVE-2015-0419,0,0,c89516bd8f439ed083439010f0fb66f90c8f53953ad33806e0ee5ac037d5cb4f,2017-09-08T01:29:43.827000 -CVE-2015-0420,0,0,aa80ff77865c4f895351f2b1653733fb6012d6f47fe1b2a1f0e10e4e0208441a,2017-01-03T02:59:35.287000 -CVE-2015-0421,0,0,a9b7ff0fbbd5de659df1d73ddd3d28b7524afad3b623f8966a4d9b6a207809ca,2022-05-13T14:57:20.897000 -CVE-2015-0422,0,0,444ba925155e9e8c4f0d526fd71d7ae46e1d9cbb9a3024c453ce169ff49e1e03,2017-09-08T01:29:43.933000 -CVE-2015-0423,0,0,06859ccd29f6c248f274daed89aa19690d4b880808bb41b6e13ec6bb58fe4084,2023-09-12T14:45:07.473000 -CVE-2015-0424,0,0,41cbaff736fbbb959db7b529220a2f45c126de31b2f764717744bdf80e254837,2017-09-08T01:29:43.997000 -CVE-2015-0425,0,0,07892bbffcfd90b2cd93cb83ff99fa4ab70f4ed68bf620fcca56b6a642465823,2017-09-08T01:29:44.043000 -CVE-2015-0426,0,0,91b543ba145ef792bff358be4bcd0a1eaa871a29781ebd44ecf26f4c0b88b9f6,2017-01-03T02:59:35.597000 -CVE-2015-0427,0,0,ff3ac4beaedcc26747841f6aa8b430d01aa2a05993e6077977a5ab820523a19c,2018-10-30T16:27:35.843000 -CVE-2015-0428,0,0,896bc671b0a10fc931d20c83c3b19bbd58b6029fa45adbc37776902eeb93c57f,2017-09-08T01:29:44.137000 -CVE-2015-0429,0,0,208e9a05f09b9ce89ff55b5445d04a54880157574d6c7d98e7927779135e19be,2017-09-08T01:29:44.200000 -CVE-2015-0430,0,0,0e5524940c8677b30fa15a3ae2927a124041e961caeb43583fa49d4a6c63ae56,2017-09-08T01:29:44.247000 -CVE-2015-0431,0,0,17bb526b12d555e433c54d3e1169107f6bb13d61f094734d707ae5d3ff8d3acd,2017-09-08T01:29:44.310000 -CVE-2015-0432,0,0,5ffcc1570054cf149a750855da01c1cbd1924a49d33aa0de9dbe1d04f4400e44,2022-08-29T20:57:09.867000 -CVE-2015-0433,0,0,ecb591a2df14f605738bd2ddc8700a156ff926dfe17d5a568790ed8fad198139,2022-08-26T16:03:57.593000 -CVE-2015-0434,0,0,e78d0342387d297a1c5b17f15ba6d5efdfef3a6a73aa3fc170840a83da66395d,2017-09-08T01:29:44.433000 -CVE-2015-0435,0,0,e9fb0e37e820c0842267a84339e00e9e303b060dbbedb964ef08750bb5211e0b,2017-09-08T01:29:44.497000 -CVE-2015-0436,0,0,c9c226e8c8f72357a5880d8cb90aba4a5204c9730da88d2951a1c850ee5aeb62,2017-09-08T01:29:44.560000 -CVE-2015-0437,0,0,0b73bb407d047aea30e5df127611de8c1ca700f5ff286257868cb0c6f5197abf,2022-05-13T14:57:20.847000 -CVE-2015-0438,0,0,b9330b83ec5f9f43edceeaa3a285a622d540819de2476e484dd3e3140a0cdec3,2023-09-12T14:45:07.473000 -CVE-2015-0439,0,0,dd8076b1eed0fe8c80fdc2bf7fec3f685de9e100f77a476fbb777f16c033e2ef,2017-01-03T02:59:36.427000 -CVE-2015-0440,0,0,a66863592ea88a408682a2e6706b0d7bdc82999cb823fb5be17710e9dec6e61f,2015-04-17T19:13:38.753000 -CVE-2015-0441,0,0,0444f77d5fa10b82cc91bda2ca1d169133858ba7e6845745a160aeb627d7f5a3,2022-08-26T16:04:02.173000 +CVE-2015-0345,0,1,06228aea09e9f4b5ea4ab00891490dd50d64ce7e1ea3310796d5504022517ce0,2024-11-21T02:22:51.777000 +CVE-2015-0346,0,1,9bbf7bb3877aa8871e4af4b7ef6aafd930c87864e9f02e4963f99fe4a5f59047,2024-11-21T02:22:51.880000 +CVE-2015-0347,0,1,d44c98aafa2206052f8ab7cc2245857a69db2d497a7ee432ce2f451075ad003c,2024-11-21T02:22:52.020000 +CVE-2015-0348,0,1,c135914c7438d889441b9905dc0647cb4db2218a72976dc552fd2cc710f3f4ad,2024-11-21T02:22:52.153000 +CVE-2015-0349,0,1,ce14de0de06e828bf4d9f5b305c2d603405d1bee30f9c759913788c525e7bfd8,2024-11-21T02:22:52.293000 +CVE-2015-0350,0,1,0b370a2062445bac678ac317f7b3a1709413506b27815703e5ab0af3f350263a,2024-11-21T02:22:52.453000 +CVE-2015-0351,0,1,87e255c5ace24de26fae3faade2093c08590071c83e9d819b2bac9b72d22fe25,2024-11-21T02:22:52.590000 +CVE-2015-0352,0,1,fd780cde0ac580222395bd9d7cc5d4f97a378e3497ef75eb9022e96c801c1cd6,2024-11-21T02:22:52.723000 +CVE-2015-0353,0,1,c69b3337d96f2cd71ef24980f4c435fb152f705971c7e666ca89fabdde8962c2,2024-11-21T02:22:52.853000 +CVE-2015-0354,0,1,8189818966cc8455db015c4d8b69567d7644b48a6f87652b9a8d119770bc1e06,2024-11-21T02:22:52.987000 +CVE-2015-0355,0,1,b2341c83000a46df78980927624015a243a3b72e195d82059a344e9429d30a1c,2024-11-21T02:22:53.123000 +CVE-2015-0356,0,1,db146d14da7f8cecfd224898f96fb4c3faf1a95bc741e26b1dfbba3478f67edd,2024-11-21T02:22:53.260000 +CVE-2015-0357,0,1,e3a330fa8fb4adbd93801d16a9ac58e32d2f02e88cf96f091dc039959d676728,2024-11-21T02:22:53.383000 +CVE-2015-0358,0,1,d07dc91762a9870442ae2a6b80e19fa901d257a1dcced03d9a2e9ec539a85b80,2024-11-21T02:22:53.607000 +CVE-2015-0359,0,1,4a6abac82cd25f43be248a01774f5847ea64a4b90e1541f360e658b89202444f,2024-11-21T02:22:54.493000 +CVE-2015-0360,0,1,34a2c7387a5ca3d1ab4533b01294693a09627564296aa0b236d08b6e05444d8a,2024-11-21T02:22:54.613000 +CVE-2015-0361,0,1,4b3bc9c4f1971b38802dd692307b8dbb886eb33c465421ca381bcbcf9eb81ce8,2024-11-21T02:22:54.737000 +CVE-2015-0362,0,1,97edbd77b8e2e5d8eae8efd7fa273bcee27fc585b2ccd718d8638cba1da71f3e,2024-11-21T02:22:54.890000 +CVE-2015-0363,0,1,88f0059c5dd64a3f0689ad7bcb902a2de03e63b8b7eb2098227c4b882002c4ce,2024-11-21T02:22:55.010000 +CVE-2015-0364,0,1,0361eb1082daf0add58affb2072ab1a3d694271eec1f9628c5b14b60dd0a0bcb,2024-11-21T02:22:55.123000 +CVE-2015-0365,0,1,70903debbdb726610416031cf1ece4f41965f0c4d8a2cae9f7d79f9e04bff0e5,2024-11-21T02:22:55.237000 +CVE-2015-0366,0,1,6e774056af60d07ba77dc46cb40641e150a4950484aa153b8b981e6bf9cb3c27,2024-11-21T02:22:55.347000 +CVE-2015-0367,0,1,da9d794207c4f33902198142a77e56f45f313cdbdcc0b4fc9c848cfa5868cd78,2024-11-21T02:22:55.467000 +CVE-2015-0368,0,1,f0c878b343f5cde38229a3e199fc55de3b42e2465b3dbdf5a6a2b965c1c203dd,2024-11-21T02:22:55.580000 +CVE-2015-0369,0,1,99d07f21ff5e33bb3cfc697b3c2e056fc41ac1c228a241030096be0a0cef72c0,2024-11-21T02:22:55.693000 +CVE-2015-0370,0,1,a2e3f6a704c8d2895a3bf752a3a65014f36475314368589e56274a05dd805b8f,2024-11-21T02:22:55.820000 +CVE-2015-0371,0,1,eb5f18b5f956f44ff4efe12ac2f3f32e2ff9faffd7d23bcdcc486773f44fff30,2024-11-21T02:22:55.937000 +CVE-2015-0372,0,1,2f2abf8ee616a578544786eaa695e39aa886886a06a7eb06c7282d63a8aa56bc,2024-11-21T02:22:56.060000 +CVE-2015-0373,0,1,5a52ea2f83f05c585699d5fd428cb7761cef8f5336d728aff2bc3d82a77a6903,2024-11-21T02:22:56.177000 +CVE-2015-0374,0,1,a696d25e50652b59b831129b61dbc16cebb32331f9c4f90fa63b3a08c6e3c53f,2024-11-21T02:22:56.287000 +CVE-2015-0375,0,1,3dcf2f2cccfdb01e5f5478d1469ef95da4899ca50c9353bd66cf3fc6ba794aba,2024-11-21T02:22:56.480000 +CVE-2015-0376,0,1,6450d6a5d4879b60c9704b1a47a77848ec31b0f0b9ee5e21dc36944e5f538948,2024-11-21T02:22:56.600000 +CVE-2015-0377,0,1,04e51952426bd8f997aab1790947182b8109d60cc4a4c2df04fdff4767e1b02a,2024-11-21T02:22:56.720000 +CVE-2015-0378,0,1,8e80849e91680b25643531633be5c2b00cacde44a08ed4e902fa2af38fa57d13,2024-11-21T02:22:56.857000 +CVE-2015-0379,0,1,5ed3c0b0c91700ead4ab79a675353fa1451971f4c627a59a014b266872d8e4c8,2024-11-21T02:22:56.973000 +CVE-2015-0380,0,1,d7dd97d01bdf0437c9a8509d87dc70ef44f54a081aee6a8afa0a97a1762ae8bb,2024-11-21T02:22:57.090000 +CVE-2015-0381,0,1,734352ba4dbf90837c161ee7ab485390046c509f42413cb75afbf376a61d707f,2024-11-21T02:22:57.210000 +CVE-2015-0382,0,1,fd8d765bc139b0cff43d571ec1cbf15a53fe82ddbe10a9f2775914d83c8b0dc9,2024-11-21T02:22:57.400000 +CVE-2015-0383,0,1,c0bfcddb408bcf2f13cbb1c89a726f0aa3d309a6eb9c31f0cceb6f766eda21a8,2024-11-21T02:22:57.637000 +CVE-2015-0384,0,1,3fe8ef0b97564c63808038b6cbad62dfe72915ed6f76504e62c5410af7efc1aa,2024-11-21T02:22:57.797000 +CVE-2015-0385,0,1,f66e2b8419a116211e48a0320224afe2c8083c307f3eb55b6d5b15b1a15febe4,2024-11-21T02:22:57.907000 +CVE-2015-0386,0,1,dde598a1345fac5578be9487a4128657dff3abd2375b45cfcffb6d12b1ec69d4,2024-11-21T02:22:58.023000 +CVE-2015-0387,0,1,48e53efe84616a1fad67b11c9deec99949f6612e5d3072a3cee9e19283698be2,2024-11-21T02:22:58.130000 +CVE-2015-0388,0,1,affc1c9771b21d77ac5ceb461fa2cbe43c46079da754b094158eb15a6b16324b,2024-11-21T02:22:58.240000 +CVE-2015-0389,0,1,048a6f03ac8e722e62e75bf9c108b2a2fc6183b9ba73477255390c5fe47e5899,2024-11-21T02:22:58.367000 +CVE-2015-0390,0,1,775ce052fe10236ff210580a16c95cae4484490f3c8dc3f4b41770d9238fbc99,2024-11-21T02:22:58.483000 +CVE-2015-0391,0,1,0ef67df03b5c7170c6031a16a2e6690036f2bd1baaedc23901f938f6160ba576,2024-11-21T02:22:58.603000 +CVE-2015-0392,0,1,6333cee25f4e268496f49fb603e4f07714e63f829882bdbed8461e777ca21604,2024-11-21T02:22:58.750000 +CVE-2015-0393,0,1,892513aaf0214622d597ed23e5b2c94861648ae5096d1d11818cec59efdf8d9d,2024-11-21T02:22:58.877000 +CVE-2015-0394,0,1,4c08dedd0ce194d383e7f32059c84cf85718c67114949dfe7890beaa9d39047c,2024-11-21T02:22:59 +CVE-2015-0395,0,1,95f6a697bca320f7ef141636ef051aedb0bfe48c2cffa7ab660e38c32a6a8e1b,2024-11-21T02:22:59.110000 +CVE-2015-0396,0,1,5ea131821cc29a4ef4fd0693f6c9d601d7807161253fce7da43ad4df64538e7c,2024-11-21T02:22:59.273000 +CVE-2015-0397,0,1,7dd1d87a74c0aebe83aeee7e31b96d475db317e25015b112a958acbf80583e70,2024-11-21T02:22:59.397000 +CVE-2015-0398,0,1,559b47bce4a5e1d1177e2648d16fc0c9f9ac1a5673064bd81a10b1bef6aa88f7,2024-11-21T02:22:59.510000 +CVE-2015-0399,0,1,5e36001cab266e2dcc48749a4e76c407b08ed67659e58d1d734d2a59834ff4d4,2024-11-21T02:22:59.620000 +CVE-2015-0400,0,1,be5be92f1acf1a4f3a7bf98bda66450affbbb18c17930d62e06cfa12202c0e4b,2024-11-21T02:22:59.733000 +CVE-2015-0401,0,1,a4645f9fa7e3fd2c948e5d832be0d665b66196659a34db8da3994c3c076d7b39,2024-11-21T02:22:59.873000 +CVE-2015-0402,0,1,fed2ea7a6e04b187689c81ff93dfdaf8d8ab65d908a50797e706a7714b38025d,2024-11-21T02:22:59.987000 +CVE-2015-0403,0,1,7e6ba50af4a93afb4027587fe9e0b2d9fa936384c32460bc6fd8cd508b2c8569,2024-11-21T02:23:00.110000 +CVE-2015-0404,0,1,c03f7ab8d0e45aa223949592634532de2bd1c3d8d5c14837e03c922d83703aae,2024-11-21T02:23:00.247000 +CVE-2015-0405,0,1,bf75f5f9c54985c73bf4f8f39d8f9ce5c2a4f9353ed2ffdb5eaee28cf99c597c,2024-11-21T02:23:00.360000 +CVE-2015-0406,0,1,b7670d412383c40f859b4708e2c9c54fc43f21a1ae100187a853201d00abec14,2024-11-21T02:23:00.477000 +CVE-2015-0407,0,1,d2380601187972e0f6a1cb7d76acb80a4a05398713ab27a943a105c36ffb175a,2024-11-21T02:23:00.620000 +CVE-2015-0408,0,1,e2473185f3a9de416de462d3a7c69eb541cb7d2ff77f1463517628fd02e8b9ee,2024-11-21T02:23:00.780000 +CVE-2015-0409,0,1,bf78ca84f0c45703c03794b75a48e095fab194457a4f1bc90dfa7da5bf85b447,2024-11-21T02:23:00.950000 +CVE-2015-0410,0,1,646da17b1cd14643c7001e5dfba2fb4864c1bb5c35bf35ea6c3a44b5cd03d557,2024-11-21T02:23:01.080000 +CVE-2015-0411,0,1,7c8ffbbc7fe05be91c7a7df663bd0ef0e6acea23e2dd12051f0f37ae62dbc1f3,2024-11-21T02:23:01.253000 +CVE-2015-0412,0,1,12672f5aacc317362df1199f41722c44e5c8290b7079ff0607a964d6f3c8ff58,2024-11-21T02:23:01.463000 +CVE-2015-0413,0,1,283fb32083c947b853987ffb97335a5f2827aa4ffdc7fe4ba827bf2f9043fca7,2024-11-21T02:23:01.630000 +CVE-2015-0414,0,1,acd43580acfaeb09afd00921a7f149d123a9a03b2b25f4c2bbe91d54bd705679,2024-11-21T02:23:01.773000 +CVE-2015-0415,0,1,68bbe105c0f391ea757d7d5f0eaa35db8da722a5f8376a105dc5d5782facb4f7,2024-11-21T02:23:01.893000 +CVE-2015-0416,0,1,e4d07582eecfdaea32a2bf654fdd21d28f1e09fea739053cd3c0c5647ccb8e6e,2024-11-21T02:23:02.017000 +CVE-2015-0417,0,1,4cac39015ce23a2c002db86f24b5c945f4698c9e5f777a1c36f7d7c55a3d3412,2024-11-21T02:23:02.143000 +CVE-2015-0418,0,1,2aa589f941aa6c45dcdbaa580a79298ebd4dca497e832c6026b159f535e4016c,2024-11-21T02:23:02.263000 +CVE-2015-0419,0,1,e1da3867a27b5e8d55c2f7a7697e160eaf5705a94081ea7f808af038416f764b,2024-11-21T02:23:02.403000 +CVE-2015-0420,0,1,a92f82e8faa178a282c3646673d6328c4e0b4311d9cf17b63ff1446df80c15ee,2024-11-21T02:23:02.520000 +CVE-2015-0421,0,1,028b8653d0bee8e760b13ebd71cef808d499dae7488573b13bb8e72dc0428f41,2024-11-21T02:23:02.660000 +CVE-2015-0422,0,1,d7f6654f94ff86c1e2eb782ee665d9907e44dde620dcdf84f0a105c9229a777d,2024-11-21T02:23:02.807000 +CVE-2015-0423,0,1,3757f6303b7c6145dae7928aa0b90d9ad8b252ceee1211d93c99352be1f5ef41,2024-11-21T02:23:02.930000 +CVE-2015-0424,0,1,f76d6361c7919c5641b394eb4f859be364e40dd3896c9a8da04b4305b43b8adf,2024-11-21T02:23:03.070000 +CVE-2015-0425,0,1,752658e68dc04465c60783c25888a8d26edf4c4a2ccba06d05bbc46918fae280,2024-11-21T02:23:03.187000 +CVE-2015-0426,0,1,5b103cdeae8a9112c1090c0ef40d8774a669560a3d180a21bf48b3fec11ccb9b,2024-11-21T02:23:03.303000 +CVE-2015-0427,0,1,a503295be59b0b200a922a339b508c26ec29ac19b2e9df49e294d6532da65c51,2024-11-21T02:23:03.417000 +CVE-2015-0428,0,1,70d4f4f05ce0f498656e8cf2fb6c6a0a97b5d1ba1225ca36506d3069cd58e934,2024-11-21T02:23:03.533000 +CVE-2015-0429,0,1,85b33884ae3e5b454c8dc9cd903bbdc848f3a0efbe0ee8f657d3155be0289f0b,2024-11-21T02:23:03.650000 +CVE-2015-0430,0,1,bbb754307df3baa8cf71759620468c703581ec2f15bd98ae8d47a2c4c633e8ff,2024-11-21T02:23:03.770000 +CVE-2015-0431,0,1,826fbb5c02300ef7318757d20f97847d24e5dc634d8d45ba73a7aa450311a1e1,2024-11-21T02:23:03.890000 +CVE-2015-0432,0,1,1229e9ea0d210aa1dd91171b587cdc7b133fe8d798333a89ce194ab2b846f371,2024-11-21T02:23:04.017000 +CVE-2015-0433,0,1,19d1b83f63e3a16029afe120ed2c021de7ae41ee94b4cdaa3f2a41d574ef3eb1,2024-11-21T02:23:04.210000 +CVE-2015-0434,0,1,7bd9a1d2db9632e6a0c620f4907eeb6973402d1ce1ee0432c007d66073fa5333,2024-11-21T02:23:04.423000 +CVE-2015-0435,0,1,fd41403aa2775040f73bb7b90f0363efb66a6c73a913519c5eb7a3ab8dbd4445,2024-11-21T02:23:04.547000 +CVE-2015-0436,0,1,88272bc16dcba01bd190c1f37ef28da2da152855cbbc0b5f7670ee64bfe76e5d,2024-11-21T02:23:04.670000 +CVE-2015-0437,0,1,01efd8eae994b45775662a660e680dbd80d76476c74c44fa7c58bd9d5ce9d7da,2024-11-21T02:23:04.790000 +CVE-2015-0438,0,1,118916eabe6863968de8e98d2233c3b2cc2b049362787660f7f643ae00377416,2024-11-21T02:23:04.917000 +CVE-2015-0439,0,1,5c2c985a874985aef580f0c4ba727d5cb11febce01e1d322d62804019a8c9db7,2024-11-21T02:23:05.027000 +CVE-2015-0440,0,1,da0a284b9d00887bd2435397f50629a812db8b30870504b004af3f3b3be07291,2024-11-21T02:23:05.143000 +CVE-2015-0441,0,1,8189ccf51f2f0aa17428c614dbaf322fdb0be9d2ad72fd40a721b185fb5ad330,2024-11-21T02:23:05.253000 CVE-2015-0442,0,0,e9ebf192b0ee88ea1b7258e621222aedaa6de600e0640eea7d2f27ccec4156f5,2023-11-07T02:23:25.617000 CVE-2015-0443,0,0,451cde1224fbc2162de53bd83b8fdcfad5d19988730ccb39cf51b9632c92246a,2015-07-16T16:14:04.630000 CVE-2015-0444,0,0,634104a0bc62edbeaf168fe271313c3edc3471522b5f8895e0d47105f8fc5dca,2015-07-16T16:15:55.733000 CVE-2015-0445,0,0,5ab495d505ba3dab874dabcc067a813221e3588f117065b3864ad5b393adbf0c,2015-07-16T16:17:00.847000 CVE-2015-0446,0,0,17817969fe8c8e305fd8e2a02d47cc36442d35d80405c41428a3156f9e6361b7,2015-07-16T16:25:15.827000 -CVE-2015-0447,0,0,dc7ab419e3aeb104590d1ad48a21b22cf37d794b407a7343895d0dde662f28f1,2017-01-03T19:34:34.077000 -CVE-2015-0448,0,0,7d68fd64b03e624524727cbb445d5fbbb32fa972bb1cd99d3f3f2bc2638f7d0b,2017-01-03T19:04:57.987000 -CVE-2015-0449,0,0,6c68d307714c92b40e10da9042a2671e63e8665674f9d5b99a7cbee989c09399,2017-01-03T19:00:35.217000 -CVE-2015-0450,0,0,0936061d44e421c0b4811ec83af3631e9a9ce0b83b64bd84b88004e7397c577a,2017-01-03T02:59:36.753000 -CVE-2015-0451,0,0,e90c87ef5d3b52257d63691a920b60c653995e94bbd1873aa4ff07bf53ccc082,2017-01-03T02:59:36.817000 -CVE-2015-0452,0,0,85f7b2048b6a7e85849e096a1105ace8cf2c75cd47d9adbbf99c45ec5269f957,2017-09-09T01:29:01.533000 -CVE-2015-0453,0,0,1f443ea55ffbba77b27d1af45aa1f2c7ce24f12ca8bd169a7f0f32cc37b8149a,2017-01-03T02:59:36.863000 +CVE-2015-0447,0,1,cfa1b04e7455902ce3f9666029e2eb65ac295d9d22a260b1bb1a425a178269a7,2024-11-21T02:23:05.843000 +CVE-2015-0448,0,1,a47ed9973509948066a5205c74b2abebf17ce68bd4e0d0f98722ad507943b8bb,2024-11-21T02:23:05.963000 +CVE-2015-0449,0,1,74c9c1439a0bf1b46ba779af184ff349e26111cb643c55e4e858e4af504b1800,2024-11-21T02:23:06.077000 +CVE-2015-0450,0,1,cf2ce352222cbd2e94da0aab094ce7d12e745c22d5a7d2992f3a5f427c24599c,2024-11-21T02:23:06.187000 +CVE-2015-0451,0,1,21a5bc8a941b2a73c397eeff500853a252f8250d151c18d38ff9f0ad80bac24b,2024-11-21T02:23:06.290000 +CVE-2015-0452,0,1,c841941dfd5c5f4d7c554795603e99c463d41abf6f7b02e1bfefaa6b6bc67f07,2024-11-21T02:23:06.400000 +CVE-2015-0453,0,1,54e1736f1d972354086038e39283178769e47baed314740e3af9a5d34a62105c,2024-11-21T02:23:06.513000 CVE-2015-0454,0,0,cc71c77e6d3bf8a0d576ea15abe0dd013e98c16eceeb9b94a32634f850e0a411,2023-11-07T02:23:25.923000 -CVE-2015-0455,0,0,b55f1c73641d7bafbbe2ba3aea07a459d81a38e460590c6f577559c2e14535df,2017-01-03T02:59:36.910000 -CVE-2015-0456,0,0,b9c9983703e22d625180e05571c9230c5a3737e6eb198ae161d5fe67cc0ab2d3,2017-01-03T02:59:36.973000 -CVE-2015-0457,0,0,6bb9854516f5a84802d8410eb26389fe774607351bc798c039671601bd1de7b9,2017-01-03T02:59:37.020000 -CVE-2015-0458,0,0,9a5c131985e01dbe2585d05a2dbe4392291ac8491c1408a78aaa2e7c94634fbe,2022-05-13T14:57:20.990000 -CVE-2015-0459,0,0,ba411730f6fc4c6aed7d2a93b00f8def2ca092e678647983093dadd05fab7e1f,2022-05-13T14:57:20.997000 -CVE-2015-0460,0,0,06577f516d6d5a8f343985e7f0a51f59943b1026df525b8cd82dd1170286d598,2022-05-13T14:57:21.007000 -CVE-2015-0461,0,0,77900c5e60bd1a9aaabf3a97badfd40f2846c5b765ad992f2cd4f414d485c8e4,2017-01-03T02:59:37.380000 -CVE-2015-0462,0,0,3aa8404e3c23465a142919fc48fe6a122122a95b242101296d7f73ead936fd33,2017-01-03T02:59:37.427000 -CVE-2015-0463,0,0,6aa63c7cf429cd028b3236ff2effe4136e7005bc8e793e7a23c6972069c078f5,2017-01-03T02:59:37.487000 -CVE-2015-0464,0,0,2f6f897495742373e5dcd96d121e530dbe790a89a16082a9cb300e7ba05a2ebe,2017-01-03T02:59:37.537000 -CVE-2015-0465,0,0,2c7bb1e08acd40e58ca8a4dcd715e8c4176182cff7906aa9ab1fae6006c66b94,2017-01-03T02:59:37.583000 -CVE-2015-0466,0,0,b52b01f28f97db4915a9f8a1ad1c6909a5aa00de9939789b67c00fbb8f169515,2017-09-09T01:29:01.580000 +CVE-2015-0455,0,1,0c31902a5837409cb9081dabdab10a3471b865c00c449c0ea06801c50eba4f1f,2024-11-21T02:23:06.640000 +CVE-2015-0456,0,1,40627ce451092567ddcf036fdd549a5546a7f82161a6c0f304cf0888eb825f7d,2024-11-21T02:23:06.743000 +CVE-2015-0457,0,1,583200364e5886fb3a6bef6a4169ff64bfb2199c4fb53c3f6cc7badca3aff74b,2024-11-21T02:23:06.857000 +CVE-2015-0458,0,1,6d095f83551fb2b370765805704e753ef13d7471e9180a5dd5751daf873722af,2024-11-21T02:23:06.967000 +CVE-2015-0459,0,1,bd6270054bbdea7a1ad986efdae3ba44d70dd0a5fd1a9dbd889aacbe23ec9a11,2024-11-21T02:23:07.130000 +CVE-2015-0460,0,1,53a8ee534ec955a6d99a80351f3d6cba03ee6961798b5f906e9256dc5ab474df,2024-11-21T02:23:07.300000 +CVE-2015-0461,0,1,14ad80f9b905e1bcbc5bc6333d62529b8382e70f75fe9357a1e02f165328f6fc,2024-11-21T02:23:07.443000 +CVE-2015-0462,0,1,cd5f602bf493dd94489896585307062552deea3f78d32e9d631c4dcc822b1215,2024-11-21T02:23:07.560000 +CVE-2015-0463,0,1,b04e0533905456b15ca863e2c3db2a58e9019ff09797a8c4d43445063a167a3d,2024-11-21T02:23:07.677000 +CVE-2015-0464,0,1,f9ea0fde76c4b0d36f9252a6cad859c302177a2057c8b486e5e0cd42ef72df41,2024-11-21T02:23:07.813000 +CVE-2015-0465,0,1,c6e34eadc79564e0169ed7be8c0816545a348387f393c279e000dcd52dca22db,2024-11-21T02:23:07.930000 +CVE-2015-0466,0,1,f086eea673d004270ba3c2b8e7c52457c385401cb45de8f7e812e0c41ed0f7ba,2024-11-21T02:23:08.040000 CVE-2015-0467,0,0,f2e5dde16b5f5020308ae7d30b8f9d6e3a5f6386b7829beb28c5bb49313700cb,2017-09-22T01:29:01.843000 CVE-2015-0468,0,0,3adb58aa017cec08fca89cc99165b4bbe22f761c2975cd9f37a95aad11863fee,2017-09-22T01:29:01.890000 -CVE-2015-0469,0,0,e8aecc6a121d46020cecef7eeed1e66cd219c1b975c857695817b24356594d0b,2022-05-13T14:57:21.050000 -CVE-2015-0470,0,0,e5f570d041446e2af57c63a5232a55a4527ee773214a3de708e5b793475e5196,2022-05-13T14:57:21.057000 -CVE-2015-0471,0,0,fa8482c556671590ec21e5e79410dacad1308b92833d1eb50091003774ec8eb2,2017-01-03T02:59:37.880000 -CVE-2015-0472,0,0,c03efe0eba82b5a65c3cf591e442597f65bbbfd79e6dc318ace36b17d7a876ce,2017-01-03T02:59:37.927000 -CVE-2015-0473,0,0,0ebccc17882b61eca6092c8c9daa68f4529a40ee1da552a3a8c858be6c603b52,2017-01-03T02:59:37.987000 -CVE-2015-0474,0,0,e1ceb19eca0b205a453de3d7855324596364020098458338020c179e43de0cbc,2017-01-03T02:59:38.050000 -CVE-2015-0475,0,0,05746820406ee39e2089d8f52705669f78a6243e8778c9e95b01bc6995d7843a,2017-01-03T02:59:38.097000 -CVE-2015-0476,0,0,b92a24e94e61e6cf62b5d10bb0e3e3efa49edab2627753d0b747a7ff684cc1b2,2015-04-17T17:57:24.873000 -CVE-2015-0477,0,0,41b6f4188cf06669e5a1622b4558d3495c51a8df409cded63b3186149d32e84c,2022-05-13T14:57:21.063000 -CVE-2015-0478,0,0,26c4e7a8a2b8f37e955ace17768efd1fdcc0c12edb42fa597142de4d51010fa8,2022-05-13T14:57:21.070000 -CVE-2015-0479,0,0,78c9ce538b9718bceccab4e2b114bc63993e06de1169b91c50e14ec193942063,2017-01-03T02:59:38.410000 -CVE-2015-0480,0,0,3e7895dbed01d50f4c748c374bf955e7d914d586d095b6c1f6fd96ccb79af790,2022-05-13T14:57:21.077000 +CVE-2015-0469,0,1,ea73b9f259d0bcf8641e091bc5ce197fe301f9c910ab109a69402b3fdfce7412,2024-11-21T02:23:08.380000 +CVE-2015-0470,0,1,afdea576ea77cb6f32b135294cdcc3fb197fe07942b995cf2a3e7f6fa8f83715,2024-11-21T02:23:08.543000 +CVE-2015-0471,0,1,1252f70a8834a304e37626fcd48cfd8095c3663d2992977f49433e5353589ea3,2024-11-21T02:23:08.667000 +CVE-2015-0472,0,1,5e6691e68b865fd940e93639d3464082770e76f6928b6ff83da231f3add48426,2024-11-21T02:23:08.770000 +CVE-2015-0473,0,1,09bb69f7c2cb298cdce7d424b72181f4898971f6db16bf91bb1451eb7e40bd91,2024-11-21T02:23:08.877000 +CVE-2015-0474,0,1,d6959eb15a4fe06e1c642fafd48260865e63ef7cb7279df19021e5be2f06c327,2024-11-21T02:23:08.980000 +CVE-2015-0475,0,1,8296dfa2fa9bb43047b47805750035dfeb79035e94bd00fa694fd0fcecd7e892,2024-11-21T02:23:09.090000 +CVE-2015-0476,0,1,5e7faed572d86568f4f0b4a059a0947717701fe5df3fb4d5ad183495a0fb2aad,2024-11-21T02:23:09.197000 +CVE-2015-0477,0,1,8f03e695f86dc50f8c28400d48aff0897d521c86af3f2b9a29b54e506dc8dacf,2024-11-21T02:23:09.300000 +CVE-2015-0478,0,1,8fc4e01a4980ecd5391181564ee475f943b37aecf3b5618405515da1235277fd,2024-11-21T02:23:09.470000 +CVE-2015-0479,0,1,824d917b685fb1223cebf1b648707b3ea7562ddcb80cccf5e243302497db4965,2024-11-21T02:23:09.650000 +CVE-2015-0480,0,1,8927d46c0e9562142ec7017b177f579b0888992fc9f32fb9f938435071a61024,2024-11-21T02:23:09.760000 CVE-2015-0481,0,0,99a2495ebbf64ea738a86220f5f4ae0f1971661da74f67125280c2e7c9c447e9,2023-11-07T02:23:26.460000 -CVE-2015-0482,0,0,29f6eabb607d5cdda8fa4bc8ef9767914618c52d01a26cd78d182a7f14accb68,2017-01-03T02:59:38.583000 -CVE-2015-0483,0,0,c35590d6710667530ef10f4752c1ef07dc151f3c9a60096e524ea1dc5b49ac3e,2017-01-03T02:59:38.630000 -CVE-2015-0484,0,0,4914c9d82bed1acb51ca242a19177156494f1a51e8d4891a89b52ab64c28e177,2022-05-13T14:57:21.017000 -CVE-2015-0485,0,0,796f576d2e5ee40691231a4ca9b56e9ef3a99816187bf6473fdb854ee3dc0ff9,2017-01-03T02:59:38.753000 -CVE-2015-0486,0,0,54bb2b518c21cd138abd29b6daa36da183c5753a2e12fddcf6427dd1778a4f1f,2022-05-13T14:57:21.023000 -CVE-2015-0487,0,0,b24c0a45128f52b28ed0cf48a74b188f619b4f3b37d87269c7a1761bd06481c1,2017-01-03T02:59:38.880000 -CVE-2015-0488,0,0,778816669cbabc8eb2377f6c21995b4599562be6e37f6c50f402d9be0d70d0ac,2022-05-13T14:57:21.030000 -CVE-2015-0489,0,0,4a0bf691647883cadbf59e7d48ee9a7c2ad2ebf57fd86c5f52999fae251a9aca,2017-01-03T02:59:39.050000 -CVE-2015-0490,0,0,b8d307fcde7ecd68f04828e31c472f86eaf66562cb3a4dc66d06400018011612,2017-01-03T02:59:39.113000 -CVE-2015-0491,0,0,9149a3a9b1641621542f2e093705c3f417f3d3f31e65e6f88b67e71b73ce1a7f,2022-05-13T14:57:21.037000 -CVE-2015-0492,0,0,c36219950273c34608e71c0ebce57c40df16b8518dde97e083998ad461249570,2022-05-13T14:57:21.047000 -CVE-2015-0493,0,0,9b0b2233a2ae1e50b13617b7aa60e61988d43a789dfc60c7a2a2326f8423943f,2018-10-09T19:55:38.483000 -CVE-2015-0494,0,0,2206c839175741b7ba4daef30ea62aaeaa1a521ea6bcaf14d746215fbec1a9f1,2017-01-03T02:59:39.410000 -CVE-2015-0495,0,0,c9e7eeffc1a9051b44115307557306f3f55ab5cba8913e4d5b01f6bff353288b,2015-04-20T17:40:05.907000 -CVE-2015-0496,0,0,6db6abaeb69e5abe8a22cca030317bf056ae198cc4d6894dafbeeec5a582e896,2017-01-03T02:59:39.457000 -CVE-2015-0497,0,0,bb26243b1880488591933d80e69d851951f9ade4ab364d6fac081e8416e769f1,2017-01-03T02:59:39.503000 -CVE-2015-0498,0,0,872bafd6db15d797b536387c7d7c07d2e4bca8117143efb5480f1ba703f5dc91,2017-01-03T02:59:39.567000 -CVE-2015-0499,0,0,bd8d00c661991b99cbf3efccdf32198eabc57cd71a3fe38772a29cf9e9790d33,2022-09-20T20:44:25.953000 -CVE-2015-0500,0,0,1c4cb078a15d67dace320aba1d84dd2d5296d97d113840aca4b715d814ea3d74,2017-01-03T02:59:39.707000 -CVE-2015-0501,0,0,0c1fd4201cb2942442ff84a19fa046d2aca851e94cc9eb74785bcda6094a458d,2022-07-19T17:01:31.627000 -CVE-2015-0502,0,0,a86dee1563c0ab8a55329cffd4a23e24ebb687a7f4e3dd90f1ce0a9e75baacd3,2017-01-03T02:59:40.067000 -CVE-2015-0503,0,0,c8facfb93cb01da95ec615ff412cf770dc97c37b03a99bef0b6f12f41bb726bb,2017-01-03T02:59:40.113000 -CVE-2015-0504,0,0,b66fa6cf58a084c48a94729b85b9f845eb466d146c3eb73e87c66b4bfc0c4667,2017-01-03T02:59:40.160000 -CVE-2015-0505,0,0,f250b11bfa7a3177b4de811f40d3df14b3a3edf54bb98c8ae1871d86fa9d4bf4,2022-09-16T19:56:23.933000 -CVE-2015-0506,0,0,d5773fda3114900018b5d898d9a8b396306cfa6f9d5e8b019f17e287cdfb9ea2,2017-01-03T02:59:40.287000 -CVE-2015-0507,0,0,9efab8f8aeb3fc5ab43b7b04c28d22302211571b4477fb52e8c932eb034325f7,2017-01-03T02:59:40.333000 -CVE-2015-0508,0,0,fc8fb5ca1deb99a1d7a5983c29b8ff4fe795d4b44c3d49126f72ce11ece4a0be,2017-01-03T02:59:40.397000 -CVE-2015-0509,0,0,5b65d8676df7cadc2010b5cd8ddd9219e323606a347195e96f0d57dbde2647d7,2017-01-03T02:59:40.457000 -CVE-2015-0510,0,0,8069941215dc62306836cbc2371508c75a7e5e0ae720e5e65fa2134ac01d82f0,2015-04-17T17:38:26.873000 -CVE-2015-0511,0,0,364bae64acef1163b7268f31be52c82627e2ab6361e8da3880dc589ea17fd29b,2017-01-03T02:59:40.490000 -CVE-2015-0512,0,0,5dbe18866d03ecb912de95bbe68dfc98f3de1429a91889c579bdf6de4213f9d4,2015-09-17T16:33:08.677000 -CVE-2015-0513,0,0,f867490eaabb34ca8965fbe8738fa994dd76dae047581586e3ad6c44fadc8950,2017-01-03T02:59:40.550000 -CVE-2015-0514,0,0,e30bad10565773b7e076231c1112c1cc0995cb63c7d6fb89cda5f36a2876ed74,2018-10-09T19:55:38.903000 -CVE-2015-0515,0,0,803719fb79417beea8e052e735dbb8808cb985ac18ae4cc53e849927ec2cc4ab,2017-01-03T02:59:40.707000 -CVE-2015-0516,0,0,ad38e9737397d5cba476f682336ad58166deb1d03214f98d6a4d3bf801032816,2018-10-09T19:55:39.483000 -CVE-2015-0517,0,0,07aa3806ed6faa34381d04d6c1a8b4783108392b0c1e2cb8a811caa623f54525,2017-09-08T01:29:44.700000 -CVE-2015-0518,0,0,81a18c3affdf7b984e335c9ac22665423b4208c8fce19b77ab57d52737da340d,2017-09-08T01:29:44.763000 -CVE-2015-0519,0,0,21de973913f812bd9ef532d7f89e91e8be6d57ac3b8c55932209bf1441464462,2017-09-08T01:29:44.827000 +CVE-2015-0482,0,1,e773839b1178a72fa1f15980f088993f74abf0d96f9194bcd677303d9868bf81,2024-11-21T02:23:09.963000 +CVE-2015-0483,0,1,6f24354b5d37be998733aa51f16ba27b870b50dcd32f1e47b8c3e142308bbf14,2024-11-21T02:23:10.073000 +CVE-2015-0484,0,1,303fcafd8dcca00b0712d218d7d17e346dda093fad93ae1d435291af9a18e1f0,2024-11-21T02:23:10.183000 +CVE-2015-0485,0,1,6fee948b8a1134618c55805d5329ec3e48f60d082a226e91d1ae57bbba35b5a3,2024-11-21T02:23:10.313000 +CVE-2015-0486,0,1,92ecda8c13eb6c195dcc489f603c110ad486d04d2904e2f158905c0a5b171a8a,2024-11-21T02:23:10.427000 +CVE-2015-0487,0,1,715137527f5f54b118cf097cf4b2eef3b107bf401d6bdcedabd4eb59f46af5c7,2024-11-21T02:23:10.540000 +CVE-2015-0488,0,1,28c0b8cca359ead03982049e0074909eee5d823c50f2b158ae23301537778439,2024-11-21T02:23:10.650000 +CVE-2015-0489,0,1,9f6a6e4535f22c1bdede97999067e99ddbb34a434406db03b642de7fa0359aa5,2024-11-21T02:23:10.820000 +CVE-2015-0490,0,1,c96926e1f3f8633e8eb14b0a4727133d0cc459a4ba9e81908f57b6eba01fc1a2,2024-11-21T02:23:10.927000 +CVE-2015-0491,0,1,28497931a23c2e3eba2a5185c667663dc5df617f9ad9dd7d193379762bba5651,2024-11-21T02:23:11.040000 +CVE-2015-0492,0,1,65a3b21184e5ca0f158395e0d23c5c9e9b037d730c040e105ffc07d1295d87f3,2024-11-21T02:23:11.190000 +CVE-2015-0493,0,1,5ba88022bf8e5c7386ada9fd991f20738267fedcda975d97f3a1e1671176d99c,2024-11-21T02:23:11.313000 +CVE-2015-0494,0,1,c47786e187bce7496e6ba4e82d100255de99bb771e9e48a01b935d04a897921a,2024-11-21T02:23:11.427000 +CVE-2015-0495,0,1,94f4458a149f9d4c367dfd921feb61df921ec7b3444442153296c7b717441a71,2024-11-21T02:23:11.537000 +CVE-2015-0496,0,1,4e20506b082686666c31a7beec3b32900c7f99af4180521a10b9ec58ab51d9f8,2024-11-21T02:23:11.647000 +CVE-2015-0497,0,1,584f12344ac9393695e39272e221b29ba811e44ca12aa984be9ca3da30c2b0a1,2024-11-21T02:23:11.753000 +CVE-2015-0498,0,1,7a43bc83fbf5e212a93254099dd9d66d3b91fd4e88c3edf89243865149d9d2a8,2024-11-21T02:23:11.863000 +CVE-2015-0499,0,1,953e50fb7f37490980e579bbaf65fac459afe115f05834d15e6ae844cb3279fe,2024-11-21T02:23:11.973000 +CVE-2015-0500,0,1,51ee79e024910850bc4cdeeea6005f7237971c67f32141f387df5563d98025de,2024-11-21T02:23:12.160000 +CVE-2015-0501,0,1,a1507b64891ce3d1781c32c671e1805347520d9269a7f00c23582bbc502480e2,2024-11-21T02:23:12.303000 +CVE-2015-0502,0,1,ccb588643a20b832e040e9a70d0c42b4fb77e60b643866460f959d3b2fbdcd7b,2024-11-21T02:23:12.453000 +CVE-2015-0503,0,1,4f31e88b3c6de5e10e36bde5c2b469725ccffcdbf1d1560835d03f7449762978,2024-11-21T02:23:12.570000 +CVE-2015-0504,0,1,9a17039c184e006b66a2f2db1011b4a6ecbc54fb4b849f47728aa89610df5414,2024-11-21T02:23:12.680000 +CVE-2015-0505,0,1,de926dcc8556f4cdb96d4db581f28fe89445d7cd0aa33d9042b6d952d1cd5cba,2024-11-21T02:23:12.800000 +CVE-2015-0506,0,1,f6f5db1a2962850be425b920bc0d40b4f56e6878b2b48f14f62349d92342b28f,2024-11-21T02:23:13.003000 +CVE-2015-0507,0,1,be25612b00ee3e86157842c2cee9306a59d3ea585c0b7ab95a29bba3f1065a99,2024-11-21T02:23:13.120000 +CVE-2015-0508,0,1,1ce9072e218a812601a1c4f59fd48c255143d0e54d6d09a508358c6184fc6c49,2024-11-21T02:23:13.230000 +CVE-2015-0509,0,1,c4e68ab2a81b13b64d5d9b0420aa2b5f1fe070bdfc7920b59b5a258033a1b4d3,2024-11-21T02:23:13.340000 +CVE-2015-0510,0,1,f6863502072867080692ded0124f037272a59193f64dd12e27cb648228d2b2dc,2024-11-21T02:23:13.447000 +CVE-2015-0511,0,1,3a2fb75320798a40fc291e2a278ecbc7a4c5512e66c3e08bcf6e3252a6271152,2024-11-21T02:23:13.553000 +CVE-2015-0512,0,1,653ef660be593af3955a056bc62a4a055bbe4893e117b8236c77048307239340,2024-11-21T02:23:13.660000 +CVE-2015-0513,0,1,eceff7092ea5ab0b9c6a9af55c0a9e57e6b0fac8d97c46df009b8df3018262f2,2024-11-21T02:23:13.757000 +CVE-2015-0514,0,1,4669d7b2d7859775c3264e0980b6916f966166f30f61affb040d32bddd5e60ad,2024-11-21T02:23:13.860000 +CVE-2015-0515,0,1,bb1be4ff69bf3d28bb8bb980db64de392dc974958b0f739286a0f330a57ecc92,2024-11-21T02:23:13.970000 +CVE-2015-0516,0,1,9d1d6dc325f8528dc093eb9fa659e117228c702a2d1a7e717c5fa02fb57bd676,2024-11-21T02:23:14.073000 +CVE-2015-0517,0,1,28db6cd337ad184d44bdaee25ae8c6b77768bcfc6a20710b0e11a07e9e5da17e,2024-11-21T02:23:14.187000 +CVE-2015-0518,0,1,04306683bd34c60d7f1688405a77958284422529d6c5fea0c294b216238dda97,2024-11-21T02:23:14.303000 +CVE-2015-0519,0,1,169dcb530fa505df41751907d60d5992142bedb562c7db9d3f70f6456c75d18f,2024-11-21T02:23:14.410000 CVE-2015-0520,0,0,90e9a68a852bb9e0e2414486f0aa848efa699b2f2b7c3a5ce13e25667e8f29ca,2023-11-07T02:23:26.970000 -CVE-2015-0521,0,0,88dc1e0ccd1eea239fd8a502e76784754721311aa7a77139ba20cace88df886e,2015-09-11T15:44:03.917000 -CVE-2015-0522,0,0,883943efd56f5636899d6a00791385408b24d349ec0778b9178c51b44a85c659,2015-09-11T15:44:58.383000 -CVE-2015-0523,0,0,fc9e54bce27da58057b3a7c36e63f8d30751a3e8db0c942850d0cfac1a031386,2016-08-24T19:26:26.800000 -CVE-2015-0524,0,0,0a4db708a3710adcd09f4793d0343ff66d8a8cc9a8bb2275e8fc365f00a00afd,2018-10-09T19:55:39.950000 -CVE-2015-0525,0,0,23129246f4ca5cd3a060623d4ca2b6c9d0cef2f5dd9b1302235bdaf9c4bdcc1d,2019-02-01T18:14:02.750000 +CVE-2015-0521,0,1,fc6c37d57485ebe3503eb12ec255b6c4028b35708af1d088899b29a3796b972d,2024-11-21T02:23:14.530000 +CVE-2015-0522,0,1,f2875fb6cea40fb869c0b888889da5fcc3482cf1eae600838c31444ba9509336,2024-11-21T02:23:14.630000 +CVE-2015-0523,0,1,e7d69a88d237a287a78cf37dc9a1fdc710f66c88c4e659b4ce3bc169c185a6fb,2024-11-21T02:23:14.733000 +CVE-2015-0524,0,1,700abd46420223f79a5b7a7d53174f1c66c0d68f30ad682fe82f370d8adae24f,2024-11-21T02:23:14.837000 +CVE-2015-0525,0,1,83dd142f051cbbeca5419f958d8686b220c6466518ebd9fb8d979726cf1f29e7,2024-11-21T02:23:14.943000 CVE-2015-0526,0,0,8ad2f7bc33c11003336e6d509adcfe17b65159dccd57bd23680d12d56a618ede,2017-09-23T01:29:00.513000 -CVE-2015-0527,0,0,b8122ab2173cae33e59fdf3d2537be9518365d5b63d85055998343dca5b6ca13,2015-07-28T15:19:40.467000 -CVE-2015-0528,0,0,87580c13317b162b821bcdeb40a52f17241c51a2e3306e2d6487b640c0155410,2016-08-24T19:28:46.967000 -CVE-2015-0529,0,0,48a5412d00ffb2f83f56d1fdeb77e26b494ca9603a97dc142a1a86f22561d5be,2016-08-23T18:00:22.947000 -CVE-2015-0530,0,0,b7896b04415303bc50b2142a37c03982850170ea5d42b0eef7ebb53cdf0fb257,2017-01-03T02:59:40.817000 -CVE-2015-0531,0,0,999b3dc1f86c50ccaf59a2580346f11ff5f263ec5e9a3e15a8c915884ee68ece,2016-04-01T01:04:33.933000 -CVE-2015-0532,0,0,4dedd17efebbaca37db9fcbf01ce1b78a6e69aa2d39a91bcfa46ff2e275b90f8,2016-04-01T01:05:07.263000 +CVE-2015-0527,0,1,b91df1fcbd0ec2a0fe011d8355292c864e5580d83f2261712b3b271e43ca4129,2024-11-21T02:23:15.160000 +CVE-2015-0528,0,1,6b9539a9127fa1548739145793c767cdebc67e939c281bebc06f3637b4aff5e3,2024-11-21T02:23:15.257000 +CVE-2015-0529,0,1,a8b458017670abf40236b69819032461ab2edb0d9b70dd38ab101bc47267743c,2024-11-21T02:23:15.357000 +CVE-2015-0530,0,1,f35d36158afcbf4372f1ce81ff81f8b6ea0ea883dcea7e7994586c4bbaf803ba,2024-11-21T02:23:15.460000 +CVE-2015-0531,0,1,6f738e6f9ebce9039992e217c224463d3cf8430add35dd2090e199b98a3793ed,2024-11-21T02:23:15.567000 +CVE-2015-0532,0,1,e478617ae6216a7441c748520fb012e57c055501d3ad459356f81ac14cf655b8,2024-11-21T02:23:15.670000 CVE-2015-0533,0,0,fa37a98317db960230c954302f7e8a369a53ed03fce45794bca280a597cd3865,2021-12-14T16:10:29.300000 CVE-2015-0534,0,0,493fe7d224507a85d700de672dd013c7be614117004a05db359c9cd32fc41726,2021-12-14T16:09:25.340000 CVE-2015-0535,0,0,643a0900bf9c16f6b516b398eb25794f4cde0004f0577518c5ae35ebee80e857,2021-12-14T16:02:28.347000 CVE-2015-0536,0,0,6c72e614a81c4eaacff9ec8c0f57457687054c14a6d40451432c4fd784655c58,2021-12-14T16:10:52.230000 CVE-2015-0537,0,0,8e919d684f9961704e977a3e17004fdfaeea4f4c145629e5d2860ce4f4cd54af,2021-12-14T16:02:05.190000 -CVE-2015-0538,0,0,97479b194d23050a66d4eb568496691a8a090ef7046a0418016fa814aaa58ebf,2016-04-01T12:47:21.953000 +CVE-2015-0538,0,1,970231377c83cf939afbb72f63ddeea1af2026de1d12ab407dd19503657a8c82,2024-11-21T02:23:16.333000 CVE-2015-0539,0,0,a02216e2a655703b853d77a908dff0d74cad88203075bbae0e1498ee2f4159d4,2023-11-07T02:23:27.297000 -CVE-2015-0540,0,0,342551e57d4749575513a56ff12911a100ec9ead91a83b04975561ae9d2c2b6c,2015-05-27T13:50:45.977000 +CVE-2015-0540,0,1,8fa9f8722cd8ef4053526832b25a46bf2ac4cd40a237999a49c5903c2bfbda7e,2024-11-21T02:23:16.460000 CVE-2015-0541,0,0,0cc687a7c5e4b5b564e9b426dcb26fda6bb4be7f5e1840f26e10c39090372634,2022-05-01T01:35:02.987000 CVE-2015-0542,0,0,0e4b0ab4f213b6a374376b347cbf25d725fc55b9f962bf9e4aaa07804309a019,2017-09-21T01:29:01.007000 CVE-2015-0543,0,0,f34f03fe60aae7cc94e1d90d9eb816712207b0012d49561d4c28bc0922b44fc6,2016-12-28T02:59:02.993000 @@ -74005,19 +74005,19 @@ CVE-2015-0548,0,0,f25cd46ab3a2f6936f4c942644b0be289b2419bf60b9ca80e75be3529589d2 CVE-2015-0549,0,0,7d50a0c6987c47b575249b01e36551867a20b3436936162afab5dabc4285f1ca,2017-09-23T01:29:00.607000 CVE-2015-0550,0,0,46ee9924b937f030d5232d7c30e66abc03d313e260f11110f4a0a77150ab5411,2017-09-23T01:29:00.653000 CVE-2015-0551,0,0,9cd70444d18bac0d0a962bb55e148dee597a78c044904f2c2d7f940916314fe7,2016-12-28T02:59:03.290000 -CVE-2015-0552,0,0,83e9da1ba9e3e609a80c807a03cb44e33e1bb273ed830914be08cfc7b7a55efe,2018-10-30T16:27:35.843000 -CVE-2015-0553,0,0,06261e93b1ff4db9f1979bfbff38db65c17e04e0993405a08e55d64528fffdfe,2015-01-22T21:00:58.983000 -CVE-2015-0554,0,0,3aa529afa157e9507eee0380f4752718d83728ae04de87243b602b5b31eb428b,2015-01-23T20:43:03.387000 -CVE-2015-0555,0,0,97a6af8108904bfee2209f201f97f9cba797fa374e7437a6dc562e4e807a5137,2016-04-01T01:05:18.733000 -CVE-2015-0556,0,0,d04f7363dbd7f643e5a356797f86463865ae4491cd56e8d6d44138ade4e4bdfb,2017-07-01T01:29:12.983000 -CVE-2015-0557,0,0,e526132dabaca741902385aad62ee4b23e7021b422f61629bee31dcec3881e12,2017-07-01T01:29:13.047000 +CVE-2015-0552,0,1,80a82248544ad61774416088504eeae00db1ca95f300768b9f941ca643c62fba,2024-11-21T02:23:17.683000 +CVE-2015-0553,0,1,686f16e85cfdbed0962e7578287a9545c6c65172cfb6d3b57ddc228cbace0465,2024-11-21T02:23:17.793000 +CVE-2015-0554,0,1,cddb04d860dd79a4293da4a11d8defc6e629284df83e38ffee6626d23f25455e,2024-11-21T02:23:18.040000 +CVE-2015-0555,0,1,591ba3de239c9242c9199c20bcf09c8a10279b1f9830aedcd0967ea3c18705a0,2024-11-21T02:23:18.183000 +CVE-2015-0556,0,1,d4fa5f3ad1205d957146c02e696004e5fe2632fbc66b12347634340a515489af,2024-11-21T02:23:18.320000 +CVE-2015-0557,0,1,96ab22d569de220b3a36c683cda161811c122fe04488ea58feb8d93102c5bb27,2024-11-21T02:23:18.443000 CVE-2015-0558,0,0,b3022447c4cf7c39d7d80adf8758d11e914c127c05f0a7331f0ea1b6b2fa775f,2020-01-24T13:47:24.710000 -CVE-2015-0559,0,0,467d1130aed5801e2c17b7a725d5040d73b761b85720872809693420b891f63d,2023-11-07T02:23:27.630000 -CVE-2015-0560,0,0,321b4ed6356be61f091bacc1e0369dfc9ea74e6d07df937132ee45be393ded22,2023-11-07T02:23:27.697000 -CVE-2015-0561,0,0,cbdc700928be71c19af9984d5ea5acc9da9b562f4cbca38684895c80de781447,2023-11-07T02:23:27.753000 -CVE-2015-0562,0,0,5c24a5127437d4c5de0e6e37f01c5a9aabdcc020bc3f7c4f80a418b9baed6343,2023-11-07T02:23:27.820000 -CVE-2015-0563,0,0,3f43060108c71e5e1c2f0eed55eb48b8a1f944df46be78087b737ac63299c84a,2023-11-07T02:23:27.883000 -CVE-2015-0564,0,0,85d5d501d59a577c78302e6d096418b5727db0923fb78b8ca3cf0d1702954ef5,2023-11-07T02:23:27.957000 +CVE-2015-0559,0,1,86ca15b03df64f1c95932a53a95faa6061b5ad3c28ab9af4a3dcdd5e7f779b31,2024-11-21T02:23:18.703000 +CVE-2015-0560,0,1,ebf638dbe72aaf12d4522beb093686f2300785ed46afd240fcdc825e3aa3964f,2024-11-21T02:23:18.847000 +CVE-2015-0561,0,1,3225769f6f9983e33f038f85eb65c40f32e5e70d63ff53901d91fa1cd6fcd1fe,2024-11-21T02:23:18.990000 +CVE-2015-0562,0,1,21fac0db9bd3a79a175ef0be3fdeb3be6dbab6a26db6dbddf8e815715e767d95,2024-11-21T02:23:19.150000 +CVE-2015-0563,0,1,970ab9f6e148e50dae782cf53113f813907dfe03bd2dc2763699c798704940b3,2024-11-21T02:23:19.313000 +CVE-2015-0564,0,1,4677852db7422a732f989d52de4541ea7c7facf241daeb943407c04db547d40e,2024-11-21T02:23:19.480000 CVE-2015-0565,0,0,2dea3d57e900de26ac68854ec90a9e634f91f3575e0514e7fb5da8678871fd88,2020-03-05T18:16:44.467000 CVE-2015-0568,0,0,7b1f310b1ac41c2a6a209668a54c272c5aa0038bb9103b03d8a2a5ff70ee9861,2020-08-04T19:05:11.727000 CVE-2015-0569,0,0,4d0b7c9c25e806ea825dbcc48cded66f6a6e3302103530ab8fd15eb1055ab76b,2020-07-31T18:45:52.403000 @@ -74028,171 +74028,171 @@ CVE-2015-0573,0,0,54f9fba99b6f32f73d83213f0fbe338258225fb972e880dbef5bbf253c995e CVE-2015-0574,0,0,243ce0ca518ec8153a3acc1b38759157fc7b38e7ea8f50a56c5ad7d102353a2f,2018-04-19T01:29:00.957000 CVE-2015-0575,0,0,da4a0d0ecc58ee01281eee2795e45797f21060bb9bca00f5da4aa87bca581089,2017-08-21T17:18:45.253000 CVE-2015-0576,0,0,63a3f0bfa3eb4a77a7fb1d20cd76bf26ea62ec30acc9dec7e63ce2f9f90c74a4,2018-04-19T01:29:01.033000 -CVE-2015-0577,0,0,48c02068747eceb136d125bed0a74d472de2c5bd7c847b1fcf44de5ada875bb2,2017-09-08T01:29:44.873000 -CVE-2015-0578,0,0,6d0ef874e74502e59ffde16f37d748485d1ddc8d75f9121f1b4043d7734efa5d,2023-08-11T18:54:47.730000 -CVE-2015-0579,0,0,d3af31170c1ad8cfd966e62890879cef78ca84da776528492aeca8bfe4bc1988,2017-01-06T17:41:19.747000 -CVE-2015-0580,0,0,17e853e318c924e49302deabd6115adf59e88340730efa49e7d7b15ca76f42a8,2017-09-08T01:29:44.997000 -CVE-2015-0581,0,0,08726db4f56efb0a25b58c6994a4b2f026649ba1dd4342b5f3ee0048d229db67,2015-09-17T16:32:49.990000 -CVE-2015-0582,0,0,208c340bf648ab0bec2f9020dc8c82ecc04f43d6875571b70f2c9cfa2701c638,2017-09-08T01:29:45.060000 -CVE-2015-0583,0,0,dc4686c454c669ffe90938f5a8321a59a9a8a0884c18a04f94d4a3a526cdf7fd,2017-09-08T01:29:45.123000 -CVE-2015-0584,0,0,c019a57c83decb583c01715bb0d4ae120dde7826e0d86e9ce5d34daba7172b33,2015-11-27T19:17:57.280000 -CVE-2015-0586,0,0,dd46e19829de3ea7f50b1f6cf028c63558ae5889aaf9f7e5d6d87169f4de8557,2017-09-08T01:29:45.183000 -CVE-2015-0588,0,0,c02e303bd1ade372c56164371516051cf0ee96948cae74fcb5147eb0c4bc8be8,2017-09-08T01:29:45.247000 -CVE-2015-0589,0,0,264e0fda669d17a90ac8242f1c85665464182fd3e6cc5118e89b32d3a3f73a6f,2017-09-08T01:29:45.293000 -CVE-2015-0590,0,0,a4951f9a00e5d6f17e4488143e6b825f5a94be58769a4a0826a83cb0d073b1a9,2017-09-08T01:29:45.357000 -CVE-2015-0591,0,0,932b703c4add7c97b4f4238e30dcd9d02658512991495290fa7bcd238ec4d84a,2017-09-08T01:29:45.403000 -CVE-2015-0592,0,0,34ad65a9b6a88623625579a2a6f2ebfd56f8027799a24174cee89c42c501ba16,2017-09-08T01:29:45.450000 -CVE-2015-0593,0,0,e47f0c2d2348d48e65ed0efaa54d3a5e028730bb01cf79f8edbea22e70dc0c1d,2017-09-08T01:29:45.513000 -CVE-2015-0594,0,0,7195c5fae1401fbb47d8f4eba7754f30650fe4635294ea6edb7b4906d5376f6f,2015-11-02T18:31:56.057000 -CVE-2015-0595,0,0,9963ce389ebf44de6ff535e5668d3292d942e96cf32dd04981cc7218b6b044dc,2017-09-08T01:29:45.577000 -CVE-2015-0596,0,0,e6e95cfc818aa8593722ecc05a0d58c9f1688f7e927546d60241bd2a26845839,2017-09-08T01:29:45.637000 -CVE-2015-0597,0,0,14d5054e51d296f310f1baab29b7e484b7cbb099836bb15975392307fbce1a9e,2017-09-08T01:29:45.700000 -CVE-2015-0598,0,0,7f3850c3f842532c727fa31b2938b04ad245a21d99bb656010e6c49898f77682,2015-11-02T18:32:13.800000 -CVE-2015-0599,0,0,227864d0dd62e38ed745f5500900c0d216e2cdd3c2071696425a4d8e12cc54a0,2017-09-08T01:29:45.747000 -CVE-2015-0600,0,0,ac2a762f180bb2cb2becbc4c93a0b22db8d01d23c5ea95efd79d3aee4994d8e0,2017-09-08T01:29:45.810000 -CVE-2015-0601,0,0,801851726bc09189b065db47bf81a177a224369fa8353d7893bb3260cc027a98,2017-09-08T01:29:45.887000 -CVE-2015-0602,0,0,e97b1f6b383436f9e4e15d9db9230726f4024658981008dc7883e97b74af7d22,2017-09-08T01:29:45.933000 -CVE-2015-0603,0,0,6496f785869b3983d878950f5ab929a72313e4bdda6959e1b0f222210ec1e93f,2017-09-08T01:29:45.997000 -CVE-2015-0604,0,0,6ce45122868f18f1cdd87ee0b6ddc81567069515997d77f947c1ac87a135f8be,2017-09-08T01:29:46.043000 -CVE-2015-0605,0,0,552a5952e2d2eb93a7e8824ba4b48537e4f870d68cfd6ddae17ae290297fe326,2018-10-30T16:27:22.513000 -CVE-2015-0606,0,0,a3171acceb65d8fa1a9091abd4e0316e8e1ab211cd736f8acd27a1e1d1690cee,2017-09-08T01:29:46.170000 -CVE-2015-0607,0,0,50b1179f9a80cd9118083065b4fd870f856f9fe1ff14526f1ec0155326e986d6,2015-03-06T16:17:32.077000 -CVE-2015-0608,0,0,c855d8d1eed3915ddb5c6713c9fa2a3a3a62ed81c4e4159474c1d866955d05a1,2017-09-08T01:29:46.230000 -CVE-2015-0609,0,0,beecc675ac460dc8f8a6e1a53d23c1a48dd744053114bc98f11cab3712334eec,2017-09-08T01:29:46.277000 -CVE-2015-0610,0,0,364073d3a089b10502c0b7577ca151f35a679cf8dafecc6f7048720a79dfedae,2017-09-08T01:29:46.340000 -CVE-2015-0611,0,0,b2b30af038d042493aff26f820ab4121762ed8028d6d7244ed5b66db4d599208,2017-09-08T01:29:46.387000 -CVE-2015-0612,0,0,040775a9c9412f1dd6a554be03b9620988133fd1a83fee6d219b45846418e129,2015-09-29T19:32:57.033000 -CVE-2015-0613,0,0,5bfbc4c8c8012f9e7ed93698baffd5b0383d7fd57888f62f5c4fef904792a752,2015-09-29T19:32:43.423000 -CVE-2015-0614,0,0,c333169a8bc751b2f4165d023a3d39a062b6622bfda0ce990e4e286c3d0ec70e,2015-09-29T19:32:18.487000 -CVE-2015-0615,0,0,367072db181cf309286f70f724063448cce06cdef94ac4b54e7bf3a5d5f1fb05,2015-09-29T19:31:47.787000 -CVE-2015-0616,0,0,21abe6db632e2a8a994e95f90a077ac11da61c342109c2fc35b3d80703e5e6c3,2015-09-29T19:31:33.927000 -CVE-2015-0617,0,0,56e08fefd0a025b00015401379fd5127111c2ddad93a5a79a1ebef4791a85e57,2017-09-08T01:29:46.450000 -CVE-2015-0618,0,0,ee325d53b4de801771eb0fa31526d2c8c0557a99178212f1b6894555b23784b4,2015-11-27T19:18:36.707000 -CVE-2015-0619,0,0,69faf971c5f6936ed24a6043427f9b282eb85f9306a8c05fca59216eb2dd6842,2023-08-11T18:54:47.730000 -CVE-2015-0620,0,0,118a4db079183cc0bbdb02ecaa12a7843024fbe1a3a9f14e150f86453e944c80,2017-09-08T01:29:46.543000 -CVE-2015-0621,0,0,8b8cd3058221e04e0f013d6612af15cdb439194759f6ed64295997dbb6c332a9,2017-09-08T01:29:46.607000 -CVE-2015-0622,0,0,c4cd571e62599d18fc142ceb5aca72434633e6e2dcd22814b6a525c6a3268748,2015-02-19T19:32:14.750000 -CVE-2015-0623,0,0,04ce8638a5b030c85f5df09287f787c06559c65de1d9b0c89794d9beb3751548,2015-02-19T20:00:14.220000 -CVE-2015-0624,0,0,509603b0a47b0b508e4956393884fc0479008a5309232e52b085ef5f42dc133d,2018-10-30T16:27:22.513000 -CVE-2015-0626,0,0,16f6aba545223f99628a99705e119a569e25c7406c6957d4eae3e3de78438683,2015-02-19T19:59:55.080000 -CVE-2015-0628,0,0,0053e31686f1ec0ae2a0265fc6e04ae79d431388f88030f0aaf42be87e91f6f5,2015-02-20T18:37:13.717000 -CVE-2015-0631,0,0,54622145c93b247f5d5f5605ddb441ff29a6237267d68ffff2a73ad2139b0934,2015-03-04T17:14:15.987000 -CVE-2015-0632,0,0,9246df7ccc66caf119028e03785a9ca4f13fe906d5e8b19a06b754afe39737ce,2015-11-02T18:30:21.703000 -CVE-2015-0633,0,0,82961fe3e620b6d5218d556007316412a8c9c5d70da2e052d1f8819f446ee363,2019-04-15T12:30:08.180000 -CVE-2015-0634,0,0,fe1df981b11d53fcbc572ac43e542d94ca1088fb944b31d534948395f158cf37,2017-01-06T17:20:36.843000 -CVE-2015-0635,0,0,9ae8eed1ec7ad7d076526baba8c3e5e3565e8da82d6a48d8082d9f1bab64968d,2015-10-01T17:13:36.103000 -CVE-2015-0636,0,0,b2216976e7eec5de6fa35539ce6857acc4d8069f169905d253426fe7559030e7,2015-10-01T17:13:51.290000 -CVE-2015-0637,0,0,b13cce05f7d332333e1dfb8f8181825d18861a22aaa0b817e9b5d8779e06fd2a,2015-10-01T17:14:04.900000 -CVE-2015-0638,0,0,6b6c01eef12048365063f7f2548d74b9b7834bb686f117ef075fe0c815268726,2015-09-04T18:50:50.547000 -CVE-2015-0639,0,0,8841fb0222efcef9fe5345b324ac1c5efde1214a7d94d35abd441d4f6962af75,2015-09-04T18:51:05.907000 -CVE-2015-0640,0,0,6e566c8dc67df2aaeb7306abf8fdb2efc9cb262e0851858c542d9f55b322f78d,2015-09-04T18:51:13.420000 -CVE-2015-0641,0,0,97446a8e919af9ac49bfddf3f2fafa4db14a443e69b120f5a61098b0ead98b5c,2015-09-04T18:51:27.640000 -CVE-2015-0642,0,0,ecc3fe635398f737de45f8a94c83abc6dcf92259c970d67b2429af4f8e482009,2017-05-12T01:29:00.217000 -CVE-2015-0643,0,0,c74c1d6dc264729bf0dcc47f3a7c509a29fa5eb7e430de26c283fe1cf5cc0c2e,2017-05-12T01:29:00.293000 -CVE-2015-0644,0,0,ea6a8bcc94c3979d8a9ceb1174b7ce2d57206658cfd1aa2ac18125452ef4f0e3,2015-09-04T18:55:13.630000 -CVE-2015-0645,0,0,643d05045deb3f97fe7b95d6725dbf13b9fb1a5547691a34d87deab65c8c484e,2015-09-04T18:57:06.397000 -CVE-2015-0646,0,0,6b5451fd3582ecdfb948acdbd6dde9b92e675914433522a61bfe386b749c3bc5,2017-05-12T01:29:00.357000 -CVE-2015-0647,0,0,2032c044d97eda4ed4378fb52e03567e190fbd9d84f5f697b68006d8980f50c9,2015-03-26T18:26:26.130000 -CVE-2015-0648,0,0,41329d5a29f07381b25132f6620510f308cd7f16bd42251c18d8d56654a64c96,2015-03-26T17:52:58 -CVE-2015-0649,0,0,44e937eba021fa8b112a4ae01a44831fa6877f65d58e850f88cd2bfac2df27ed,2015-03-27T07:33:16.003000 -CVE-2015-0650,0,0,930c1bc272bd332383992aae56c65241db645316579f6e09c4c573770340ec39,2015-09-04T18:57:35.183000 -CVE-2015-0651,0,0,6c7c00923da8b5f3956b9c6cd18eedc46d89d2a2db311ee420a1b4ba8bdad911,2015-11-02T18:29:56.257000 -CVE-2015-0652,0,0,c99519bc1c13f3ca4929cb09d33575308827075def186c336acb0387ed98f483,2015-09-11T15:45:22.507000 -CVE-2015-0653,0,0,6916511a9d83da1f42c4749ad6ecc9568d56a8fe8fa37b8d124420cca8bf6a8a,2019-06-11T19:03:00.210000 -CVE-2015-0654,0,0,dfc56ef387d9ca2ce2c7c7fdb46a8761dad1dd3c940fa7b971075fbad898b6b5,2015-09-11T15:50:15.837000 -CVE-2015-0655,0,0,7ed3b73efcbac34830d8b59cb6fd0d9d949d20bca06b31cc52e0675a0f4d0873,2015-11-02T18:29:41.237000 -CVE-2015-0656,0,0,aaef052d2c364dac5bf716aaac15db971459120dccc0de8298f904e10c01cb3d,2015-11-02T18:29:23.963000 -CVE-2015-0657,0,0,6cda686c58f8f26cc287f999cac12665331697bc0d345c03e65f372d687dc5a2,2015-11-02T18:29:11.927000 -CVE-2015-0658,0,0,5f02eb954db8385e71b950b8dc8a6f452829b8129dcb0eb37b69d7ea515ac2f4,2015-10-22T14:37:19.143000 -CVE-2015-0659,0,0,496d974285e257b8b7f6f37078b078b9f42ce67fb490e68660264b1e25ea851f,2015-11-02T18:28:57.733000 -CVE-2015-0660,0,0,8bb612678b64e0986fe1d8dc8d1066c71c14c43ca5193f6ca3b47d834e26ab91,2015-10-28T02:17:57.233000 -CVE-2015-0661,0,0,f0e8ca32875a3a1917a47874434883abb2e3c57bfdc3e29ad66b39ac33cc5dfa,2015-11-02T18:28:12.293000 -CVE-2015-0662,0,0,b51aff27c5b7831e7cd1136bd77e0f82a1b4b38ae20fb591df4d3cefd5575532,2015-10-28T02:17:33.963000 -CVE-2015-0663,0,0,aa86808504ec621f119b350e16b1815ca1617dc0d08326b438c8c011b186e1f7,2015-10-28T02:17:01.397000 -CVE-2015-0664,0,0,60378c3da2d09302490830b9f5c2766cff1592d05134552c8657d30cf80092ee,2015-09-10T16:05:39.487000 -CVE-2015-0665,0,0,284a7cc4185aaebfc1030875500fb4801518791eb955d18ef8fa9b532e57f988,2015-10-28T02:16:45.083000 -CVE-2015-0666,0,0,1357fd18f0c799542484bf43fa86b7309b7bda8eb7e0558069b0e9acf370fbbc,2015-09-29T19:31:23.037000 -CVE-2015-0667,0,0,b6cc47cd3684f3be22affb1479fafb354eeb92af919e2624f0a61a7ecec6d871,2015-09-10T16:06:04.767000 -CVE-2015-0668,0,0,560527d64fe15a74863cbf559471800b3ddddcca0ddcfb175d54578717460fca,2015-10-01T17:15:16.600000 -CVE-2015-0669,0,0,d65b4c317bb7b68d48edd9744cfd17c65fade598f31c3ffa272d23eac3f419cf,2015-10-01T17:15:35.457000 -CVE-2015-0670,0,0,8141ad98b5214eb5efbe968f8a1c8f26646c43941da560a196bb8df413f76cfd,2015-10-22T14:40:06.637000 -CVE-2015-0671,0,0,9fa6f3792e7d347a61246a0ef8bcfebf7218e23234bc4e6b7c3259e0e086c9c3,2015-03-20T14:46:31.087000 -CVE-2015-0672,0,0,e82bee50bc117e433d2e35f1592c9c7439849ba158a57f70c3aaf78b6f312908,2015-09-04T18:58:02.777000 -CVE-2015-0673,0,0,bf89b238e3eb2a636693f59b2daa7c49017e15d8ce0ce1f996bea5a86d232515,2015-09-04T18:58:56.387000 +CVE-2015-0577,0,1,1d17a5e6f8a312c9dc389405ca0ede79c7430ab9e4a57cf78ff15bfdc5c4262d,2024-11-21T02:23:21.030000 +CVE-2015-0578,0,1,8f89a0e9b45421aa5c980fea0083d60626b7d1e4bea21808b52e9c69ab61d99c,2024-11-21T02:23:21.140000 +CVE-2015-0579,0,1,6db2559c0a0a9607fb56ca123020d86aff2307377b17f890ac167ae756342fac,2024-11-21T02:23:21.257000 +CVE-2015-0580,0,1,31cef7edc2ac16eb96b3d4c62cb00cd4ed07bde41894e01470b4adc7a9774662,2024-11-21T02:23:21.360000 +CVE-2015-0581,0,1,ca8ea471ba9951f9781e0ccba6e7da7b46ba128ae57a2d0836560f20d492fda2,2024-11-21T02:23:21.463000 +CVE-2015-0582,0,1,a5351889e087245977d9252bc639652e9e841b17ca2aec29f885a79ca7e8a385,2024-11-21T02:23:21.563000 +CVE-2015-0583,0,1,bdb6d350339c748ea9372bcc992f997a16a9516e5d6f25ce632ea5c4bdb24c9b,2024-11-21T02:23:21.670000 +CVE-2015-0584,0,1,1d683ee2d4ea7a67c46230cb93e4c77f7355fedae09be19046ec843accb6ba35,2024-11-21T02:23:21.770000 +CVE-2015-0586,0,1,6b7e4e627b13a8eda7b9f612a65c20e756309bfad80e99d054096b461347b397,2024-11-21T02:23:21.873000 +CVE-2015-0588,0,1,ce9ccc08c1c4a7810d846df9b221504c6a05fef191a096ae0444e4752fd7fe94,2024-11-21T02:23:21.983000 +CVE-2015-0589,0,1,1d11f7049e3c5f423f7e9a40420bf2109263b62822364bfbd76673c4e652db25,2024-11-21T02:23:22.090000 +CVE-2015-0590,0,1,c2aa163cb4526ed4e2665fd8026c20bb15d6d51145b8cc9c936e04c464c26d6a,2024-11-21T02:23:22.197000 +CVE-2015-0591,0,1,f82c0837aaf7f4fc787e88ce41fcfdf56224e57000a9a24269a323ce86e25c8f,2024-11-21T02:23:22.303000 +CVE-2015-0592,0,1,487bc62acb26535cee1fed0977dc1e44928d0ba155091f39393e2a4e4adf77dc,2024-11-21T02:23:22.417000 +CVE-2015-0593,0,1,0c3906e01b7367ff702761f1fde1062ad3102a1a73252e687eb90a79d8b27897,2024-11-21T02:23:22.523000 +CVE-2015-0594,0,1,d8f5aaecef0d583b8a18cfec869ca1f5b76eb6e875f83a5ac932f93043269d4c,2024-11-21T02:23:22.630000 +CVE-2015-0595,0,1,384779b2db93d7a976d2f0fb4b2aae48cd2d57892f559d7f0286c9da7c81ac48,2024-11-21T02:23:22.737000 +CVE-2015-0596,0,1,a72e0523439d7db0a2409ee66cad9250655ccfeb9024c2053c9036978afb3f51,2024-11-21T02:23:22.840000 +CVE-2015-0597,0,1,d4353c8dd07d3c3c2aafefce6ab3691799f0593a30b202efa78203ff4b0132d0,2024-11-21T02:23:22.947000 +CVE-2015-0598,0,1,8ab030be0adb4de3cf80c3776812c64d6e5fb64dc6f8e29ea28b73a261f2313c,2024-11-21T02:23:23.067000 +CVE-2015-0599,0,1,e93520831d75864200ec169f0ded62d8b467c81e975ef4d13868b5ca425f0eb2,2024-11-21T02:23:23.187000 +CVE-2015-0600,0,1,37edff35b6316fe3915c960bc49b0c829e62e298971af37aa7549a9582195359,2024-11-21T02:23:23.300000 +CVE-2015-0601,0,1,94bc710507b5b5df2a75f28936111ebd355ef60c30ac358b8a47cc918406b35e,2024-11-21T02:23:23.423000 +CVE-2015-0602,0,1,7610cc1b668f4748bc1956533bb199885f4c1dc9b4226bea3543e6ec53ac4830,2024-11-21T02:23:23.540000 +CVE-2015-0603,0,1,908f48c648c9b190c8fbebbe28a3459667dd7c36d0f4817047c869448ddbeef8,2024-11-21T02:23:23.647000 +CVE-2015-0604,0,1,7a99319b03b122dbb302e39cad96612e1a04239c2028f09f7ddff46e327c4048,2024-11-21T02:23:23.750000 +CVE-2015-0605,0,1,5a681cc752f913edd9167bffcffbd11e1db447c62cc505f4cbff5799615d28db,2024-11-21T02:23:23.853000 +CVE-2015-0606,0,1,20b279c9c42dc7ee3076e63f923cb9d168c1bd2b1cf83afbcbf0229c9b1f1c12,2024-11-21T02:23:23.957000 +CVE-2015-0607,0,1,40e203ed989db9a45aa637669dca312bff481ab1f8823279729936706090f413,2024-11-21T02:23:24.060000 +CVE-2015-0608,0,1,670756774765255e29566d01106136cff92ec5dd815e2eb164afa4e6f63bcebd,2024-11-21T02:23:24.163000 +CVE-2015-0609,0,1,896d36b2e989d340afffa68f052bf5d56a6dc56b78c7c1ca953e4d04fcd3a90d,2024-11-21T02:23:24.277000 +CVE-2015-0610,0,1,799a8d1e94f9d44ebdce85493758c0875f82c1ef6c30adb82f9a8d425a59e7ad,2024-11-21T02:23:24.390000 +CVE-2015-0611,0,1,ed64c2aa5c59799bb187e8b7b827c8ed61e15363862e225068b36e645fdede7c,2024-11-21T02:23:24.497000 +CVE-2015-0612,0,1,7d8c5731029cb210ecd8b47fa48fe1ec5bafd1501191120d3cb9c34753b86a1b,2024-11-21T02:23:24.600000 +CVE-2015-0613,0,1,26183d00022dc0c1594b04f2b9a2cb1e1413fddd8a9d482587521742dbc1100c,2024-11-21T02:23:24.707000 +CVE-2015-0614,0,1,5d4f7721a01ad9b23a88f28279be13c736fa0f363584570c89817c1af5e039a3,2024-11-21T02:23:24.810000 +CVE-2015-0615,0,1,b9135a791959591cc7e162ed82b24aa72f29b431608686aecc7e6912c5ad7533,2024-11-21T02:23:24.920000 +CVE-2015-0616,0,1,55847109f11fb687d8006e37856c8d3a7d2b717d20d4ff5fcb90c07c123ca176,2024-11-21T02:23:25.030000 +CVE-2015-0617,0,1,f250d990b7d85640777df03d6ddd644b491f422cb1ec0c079aa97a24376abad5,2024-11-21T02:23:25.140000 +CVE-2015-0618,0,1,34abe7d7647941230dbf3afd329f45b050a333bb3d8ba73aba705864e031ab9c,2024-11-21T02:23:25.247000 +CVE-2015-0619,0,1,b77423f58b9ec4b40ec55e14c02083992515251807de84f71e5853870935472e,2024-11-21T02:23:25.350000 +CVE-2015-0620,0,1,9a276393d12b907aa63a6992beb1f861bc72da69ce9f5246a6713d542111bd8f,2024-11-21T02:23:25.460000 +CVE-2015-0621,0,1,4c6945fe306244d793e1f419d0d9806a33771cbfd4ff091363cffac1d780d7b8,2024-11-21T02:23:25.563000 +CVE-2015-0622,0,1,152d107778079605dccf7706beb15591e00b8497b0486c6860e8a4334ac6a983,2024-11-21T02:23:25.673000 +CVE-2015-0623,0,1,b65913f5574f23bea30165213dd9f970a85f45154044436dc86433e659515642,2024-11-21T02:23:25.780000 +CVE-2015-0624,0,1,0e75a0935146103dc380fef5c29b1f73134a9da4cf5952168800dd32fbd546c2,2024-11-21T02:23:25.880000 +CVE-2015-0626,0,1,07d5d611e29241277a7ade3e2e6c181393dcf75dea59c465922e446db63f6e1b,2024-11-21T02:23:25.987000 +CVE-2015-0628,0,1,e6410ab593f2cae5d6b399fdbb19ea681297bf897edf03d64e270004cb93680a,2024-11-21T02:23:26.097000 +CVE-2015-0631,0,1,853b35a12c5e61d11abd1137c0213f5813e1bc0a3423c4acb46ab8dd1cf046bb,2024-11-21T02:23:26.210000 +CVE-2015-0632,0,1,a70f564f2334e07984d82435880e78eced1e572427e81828eb50f9be35d8d91e,2024-11-21T02:23:26.327000 +CVE-2015-0633,0,1,a8d65bf6e6a211f4541beb26fb8a7d029c5fb68c3401aaabbe227a33653efcf9,2024-11-21T02:23:26.437000 +CVE-2015-0634,0,1,f42e0fcbde186d70ebf30d7b008d9d5a2453f7a23e684c598c82eb2e3429c21c,2024-11-21T02:23:26.557000 +CVE-2015-0635,0,1,60fe43e4cd86a10151f5a2cc5b4db391c1fc34949dac39e3ff5a946d6ec48d1c,2024-11-21T02:23:26.667000 +CVE-2015-0636,0,1,6effe54d1cd08bdb40f12efd30a891140896e9695c70e9a07aa5c1f678b755aa,2024-11-21T02:23:26.777000 +CVE-2015-0637,0,1,1df486f25f83560d5ea400068a8d0f1d91919b7fe19f0f1c5b058e2f6dd2b392,2024-11-21T02:23:26.887000 +CVE-2015-0638,0,1,02c29be0da70c1cb4e6ab902eb0e24d662d342fab3c682d484d1050e56d79097,2024-11-21T02:23:26.997000 +CVE-2015-0639,0,1,7f15882ec21d02ac756b93b92de41eb9e1009b35d51e72cbbd26bfe49e7802f1,2024-11-21T02:23:27.110000 +CVE-2015-0640,0,1,e35fb10245e1812709bddfd7bcae59bb37a1485e49ce8571dcc709323496fac9,2024-11-21T02:23:27.220000 +CVE-2015-0641,0,1,8036edab3ef8164da9ca9b27b60366c7d121ae9f40adde358c19e14784960b43,2024-11-21T02:23:27.337000 +CVE-2015-0642,0,1,5e993d44033e844fe5ff9ff2e527b024b7bfbe56b1b58a1842b0ee859e58b197,2024-11-21T02:23:27.457000 +CVE-2015-0643,0,1,12b97d958dc3ba1ef9dbc754b31db9539dbdf54fc47193200db326992d39f957,2024-11-21T02:23:27.583000 +CVE-2015-0644,0,1,30589a4a323c521715c334d2024f23ff70dd57270d13b88c48ed585a26f17c72,2024-11-21T02:23:27.710000 +CVE-2015-0645,0,1,344924d349e1f1f244683e8e65b8821bf1bd33b9f86c3a5c866985d8bde49179,2024-11-21T02:23:27.827000 +CVE-2015-0646,0,1,6ae6e1bf40c80d42e90909ad0ffd7ee57ef0cfd899cf1961d589e9cdef37d55b,2024-11-21T02:23:27.950000 +CVE-2015-0647,0,1,303cad32f57755918bd6817043297d940582150710fd6538a4d3d16e3af019ae,2024-11-21T02:23:28.063000 +CVE-2015-0648,0,1,3a1d485414fc0479fceac576f1dd9bcbc27c2a5b64ac669bf172430ef62bc339,2024-11-21T02:23:28.203000 +CVE-2015-0649,0,1,b12226035c6aa13679f3f1dfaed63b355091e0ad90d9c0f9f0a554d8b5804ded,2024-11-21T02:23:28.323000 +CVE-2015-0650,0,1,abb76bc4106f0bc1818b2be26ee00a44dace38a6fae8c84aea4c0246b7c7f150,2024-11-21T02:23:28.430000 +CVE-2015-0651,0,1,cb344c93f95ae8cde535f1e538518b8bad4404bcaddd7c5593aec4cd45f86025,2024-11-21T02:23:28.537000 +CVE-2015-0652,0,1,48d898b82b07a8390159eed764806b4eb9a4855c1da290ace0a1c4311b57817d,2024-11-21T02:23:28.633000 +CVE-2015-0653,0,1,94de6d666940ed88f25244ea93f89c7ed5ea8e329f7532c238c14d64f3a9fe5f,2024-11-21T02:23:28.730000 +CVE-2015-0654,0,1,f108b3bbe21fc72b45c6afeca4f7441337533b56b0ba0feb1cd5f095c7132a1e,2024-11-21T02:23:28.830000 +CVE-2015-0655,0,1,3fd326bebc83365e9704295cb931631d46aa30ca3901e3024d30406d545e7214,2024-11-21T02:23:28.920000 +CVE-2015-0656,0,1,86ebcdb2056545a93ea29da01b2077696b50b7679271af9c392baac5f8d72632,2024-11-21T02:23:29.017000 +CVE-2015-0657,0,1,f364b4b0b7d7c027a890c7c44d096a0c6ee48d650d92224d3b714910b963baca,2024-11-21T02:23:29.117000 +CVE-2015-0658,0,1,0b17fa48564536a1ce3f45d79c0dd69ad9ee25e1b9a9c90b1cba071555d61c7b,2024-11-21T02:23:29.213000 +CVE-2015-0659,0,1,d410366d226af9434af1ec4c0ec2d592eeb60b686cf655eb9f95a8320c271564,2024-11-21T02:23:29.320000 +CVE-2015-0660,0,1,0b0a6f62ddc55f5fea57455ed48d96e34b88305166ead40ac71b5ff84e7ef27a,2024-11-21T02:23:29.420000 +CVE-2015-0661,0,1,83a7558db444821791fec9f08f831c5f86da2940aa4d25e300b358d979f3ea06,2024-11-21T02:23:29.517000 +CVE-2015-0662,0,1,f54ce06a72111d90ac378bb1079a1815c8769515b59f3a4f9682e97dc6ba8b41,2024-11-21T02:23:29.610000 +CVE-2015-0663,0,1,e9cb668c5a21c3a38e49c41ee2154b68b600fadbd6741065de86587bd199cb3b,2024-11-21T02:23:29.710000 +CVE-2015-0664,0,1,d1446cfbb36e72fea74c8905f16ca6a7681f9f2f3d7917b321b183bd82045661,2024-11-21T02:23:29.823000 +CVE-2015-0665,0,1,eaac1be3ead08bab3dd26f94fd4e7805c0b606a57f115b64a918c5e9f5dde1d4,2024-11-21T02:23:29.930000 +CVE-2015-0666,0,1,18548c48b4643b924f6f64701a088438c7364018d4fde6e85464ecf4615d1cea,2024-11-21T02:23:30.033000 +CVE-2015-0667,0,1,62e98b32ad8db8ed86be1c4cc10134f4d5c444e79595894fa4aa5c00f393bfc5,2024-11-21T02:23:30.150000 +CVE-2015-0668,0,1,1500ba7e3fd7106a3c76860ad32d1ef638637d7c9b4d049e182d6d6f1945bce0,2024-11-21T02:23:30.253000 +CVE-2015-0669,0,1,3178b3ff11d4e2b68a8ca66abdfcc2f2494f10edf6eef92cdf070e4412620b78,2024-11-21T02:23:30.360000 +CVE-2015-0670,0,1,a733a2de93e64d98773950e042d70878279be4314df2fd6a60db88db61260dd0,2024-11-21T02:23:30.467000 +CVE-2015-0671,0,1,fa792555bdc157e6a8eeff4b92290b7c28f1b14179c8be8e1427379528f3a036,2024-11-21T02:23:30.570000 +CVE-2015-0672,0,1,899522d8b6960aaf66e4d23d056285eee82a76d0c8a0044d9efda27b9532c94d,2024-11-21T02:23:30.670000 +CVE-2015-0673,0,1,4c9e70adcc69e8a9483b71caf9636bcb0e79aa2746d07c6477ab5e8dc9e152f3,2024-11-21T02:23:30.773000 CVE-2015-0674,0,0,a1d0597cca8010c1363654286e50eea649be2ccdcbfd02cc92b5b5aaa9fe220c,2017-07-31T17:54:44.030000 -CVE-2015-0675,0,0,daedcf1cd57c642ac14e43ae6b468eab603e9ba51edcf6a41682feba69b890aa,2022-05-26T15:11:51.237000 -CVE-2015-0676,0,0,821e322375128c18695d0ffa0f1347e664857517c9fc5619e1af353f5823330c,2023-08-15T14:52:02.310000 -CVE-2015-0677,0,0,6c27d8531a421e32d71710f9e93aff1c0200a9443b40d0df39fe3512e8542eeb,2023-08-15T14:52:02.310000 -CVE-2015-0678,0,0,d0e79406c6e694c04dc97b5a67a12657c6bca64b354edfc94d053e5d9c5abe61,2015-10-01T17:16:20.283000 -CVE-2015-0679,0,0,ea867a845af6b21d001426be2b134832fc7719d93b809fca5eaf88d4763a0dcf,2021-04-15T18:54:58.583000 -CVE-2015-0680,0,0,5253f4d8cdbdc2d9d0dfb3fa81508068a1a4468de01a75f38a08bdcc9f0650ed,2015-11-30T19:48:02.270000 +CVE-2015-0675,0,1,eb7fca679a9a66b948f7debfb3cce3f6fcf90348e5be0137a7e42f8865679ed6,2024-11-21T02:23:30.980000 +CVE-2015-0676,0,1,63393bf2820ce00ce1c6522382f9db55e39588a359c2316ae90ebf296ba28aac,2024-11-21T02:23:31.090000 +CVE-2015-0677,0,1,d02a61fc9ff77ba806cd131cae406f4a8cab8b536f83540b6b05a9521a70f332,2024-11-21T02:23:31.243000 +CVE-2015-0678,0,1,b64483b0c2ea4e78d51c5732e23394f63de4a01cb6e6231d3e000ad5a3ae048c,2024-11-21T02:23:31.367000 +CVE-2015-0679,0,1,6bd3c23f645cae74736b6a66257a4a939e00e24b52305a010f1766e004a63472,2024-11-21T02:23:31.480000 +CVE-2015-0680,0,1,1c96a0a895ad7bb78265bd63923daf671060c86f1ec5f367da5017ad5de89c03,2024-11-21T02:23:31.583000 CVE-2015-0681,0,0,95df02fa28bb30599e6930ad8c867641a0f20a1cd9d7df6ce35fc760d0f31876,2017-09-21T01:29:01.070000 -CVE-2015-0682,0,0,7561ff33a68beed164478e78382027870eb165c0cfa237381f4195895651b4a4,2015-10-28T02:16:33.223000 -CVE-2015-0683,0,0,8d8d0388b7f1eeb8e88006d19efd8f32d2b5cf38d11b47e1b694f11b1cb86c58,2015-09-29T19:31:06.410000 -CVE-2015-0684,0,0,b6861cc86fb3a8ed623a4a044737ae5519eb658bdd6807eb1cd92bff34e99308,2015-09-29T19:30:54.957000 -CVE-2015-0685,0,0,59fae4ddc4f3ad73a45c2b494b62ebe346d76dcbace4c641e632a4044a16699b,2015-09-29T19:30:42.867000 -CVE-2015-0686,0,0,1567d3f659acbbbc7054a853386b32e1098b2de090ea18a0afd48c59474d7124,2015-09-29T19:29:20.383000 -CVE-2015-0687,0,0,56eaf6be2a272ed1f4a5f403a8b8b7fd93fd0486d624f2d53302b0d184e91e1f,2015-09-29T19:28:03.370000 -CVE-2015-0688,0,0,30c6aabe0c259f90a409e06029ad3b14082774372de0d0cc1bb8351c789ce5f0,2015-09-29T19:27:50.590000 +CVE-2015-0682,0,1,9e96edfd76b397b4e2c57c6b7cf812b85a7a94d1c2c4570f677f785436fa67e8,2024-11-21T02:23:31.810000 +CVE-2015-0683,0,1,e95cc669a7278bdfd9e216d5dde1a42ef257c72af2a008603e49af2ba9f05cf1,2024-11-21T02:23:31.910000 +CVE-2015-0684,0,1,53a91b5729cb766d869e840b988917d458e147adc7675a90ced91f73aca05834,2024-11-21T02:23:32.010000 +CVE-2015-0685,0,1,2009518a0f8e2d4814c7b68338889703321c1d3f82d6f81d9b475503dce89799,2024-11-21T02:23:32.110000 +CVE-2015-0686,0,1,b2592de466322ec2a18e73b25e557e036930bddb00a1d20731dbe99a2a059cc7,2024-11-21T02:23:32.210000 +CVE-2015-0687,0,1,39888002e3b925a7490366472126b47940731c029b4a0c747e6a9562a7cfebea,2024-11-21T02:23:32.313000 +CVE-2015-0688,0,1,34e2b1a57ce10092a293400a979056bb4302791f80509ba4c98b266ee11d6e75,2024-11-21T02:23:32.420000 CVE-2015-0689,0,0,38f9d0f1112fa43e082aac8c9b0cf9623b9861864e80cd706950cfac83b95fb6,2017-09-22T23:42:01.867000 -CVE-2015-0690,0,0,6961fd0d4e709e1c4fe4498f6e2dbdd1e4d042b15fe6162c9025e3b57cb8eee7,2015-09-29T19:27:40.637000 -CVE-2015-0691,0,0,ffe4ddbaeaaf355e6711d5f55e80c0cefa079b0ac4d215d782830db5643d7128,2017-01-06T16:05:14.267000 -CVE-2015-0692,0,0,2f421891881466b6cfe13198c2b2b86663b576bf658cfa23f96342b3ea322a6c,2017-01-06T17:20:39.437000 -CVE-2015-0693,0,0,06502a66d325a621bfb40fb04e4b7b9c768bfd2f1d0b6ead916813b96b420de8,2017-01-06T17:12:58.957000 -CVE-2015-0694,0,0,3e921f8d8ce97d1c75577736f29a0601ac3935a5eab25a6aaedc75c2395131ef,2015-09-29T19:27:29.840000 -CVE-2015-0695,0,0,89504cc3f97e8e2c601af7912abc10424c63ecf9f2748ee95f74b71192217ed6,2017-01-06T15:29:26.277000 -CVE-2015-0696,0,0,a784f4fd8ee3415cce48c1497d4d0d32a310417958b7f19d83108fbfc7ef62e8,2017-01-06T17:09:37.897000 -CVE-2015-0697,0,0,b552d0f8f4822b1cf3c53c58892a9472ae1cc4b6318c119d352463bfc23f22d3,2017-01-06T16:32:24.160000 -CVE-2015-0698,0,0,c2346e168e80a5fce749a39199ff61ecce53af0ad5ba486e986846c575efc2c5,2017-01-06T17:09:40.850000 -CVE-2015-0699,0,0,831e487f82dd513083d2895e2b53508dc4e28f3ae759b5c56eaa78b9279ab50f,2017-01-06T16:31:52.810000 -CVE-2015-0700,0,0,a6e237cb5b9c266a773007730b3878fc93ec4eafa8689e4e9bdc825b71f01db8,2017-01-06T16:06:04.167000 -CVE-2015-0701,0,0,207a4b463d064ae43db0fff474694db4419e850433ff6382dd05baf5ec6d6296,2016-11-28T19:17:01.440000 -CVE-2015-0702,0,0,2e8ddc1acd2b940f328c79bec9909e0e934ec254ecdc854cdf19569cdc91066a,2017-01-06T15:29:36.823000 -CVE-2015-0703,0,0,a5fd630a9635ab278caf73dc7c786ef7804e81563bbd329e07495beef215f09d,2017-01-06T15:52:16.740000 -CVE-2015-0704,0,0,ed69fb2eea458608127d9fd13dd523c6ff6b1b2fbdd032e1278616ce2a181c3e,2017-01-06T16:29:04.350000 -CVE-2015-0705,0,0,c182f9284ef65b54ddf8ec83d8bd28ab3a527f004bd219562d885157ae1a6ef3,2017-01-06T15:30:25.660000 -CVE-2015-0706,0,0,0b99aca4f5f82ff0534bc400fa3be4922aa5fc468e68309a3235825ffbabb637,2015-04-23T16:49:02.237000 -CVE-2015-0707,0,0,a27327fbef75bfea3b9fda8009cf93dfc8b6c7a896ac85db4d52db3842d654a1,2015-04-23T16:48:19.207000 -CVE-2015-0708,0,0,808fa31b4f3416f0fa1d1c83869a18e26e9abcc9bde48570ac5f71b9981dc33d,2015-09-10T16:03:37.527000 -CVE-2015-0709,0,0,78146f626d12de18ffc8a64d0760a9d5cd52250ae951ba17bbf23bb0daa1039d,2015-09-10T16:04:03.620000 -CVE-2015-0710,0,0,65208bfba977b902aead9cb819df6885129372c9723625c795a73048e63dca55,2015-09-10T16:05:51.237000 -CVE-2015-0711,0,0,b97b612333ff7330003c06d3d0cb362638da8d881a7f73278af72ba5a1f3e132,2015-09-10T16:07:19.700000 -CVE-2015-0712,0,0,560f0327cc651abfb4b864c583b3d241c579e581a7b419e444c736c9b92485dc,2015-09-10T16:08:13.947000 -CVE-2015-0713,0,0,c13f93517995c9f0f6a3db32f94c17805c7d8c961b4e7705d86815a550b3058f,2015-05-26T17:47:03.403000 -CVE-2015-0714,0,0,0761a274f0d47d299542e626e4aa06826a879cbdaa773d92f6c51ef5e5e900c7,2015-09-10T16:09:37.427000 -CVE-2015-0715,0,0,8d589773dd56c65967360bee1e8e88d3ac0cd9737ba91deae3462b630314b40d,2015-09-10T16:09:57.660000 -CVE-2015-0716,0,0,e975873c67b14eb0c5232f246add480d9efd802125ec040fd70a3923f8927e24,2015-09-10T16:10:12.830000 -CVE-2015-0717,0,0,38f385767aa7cb8fd911709d78b89a10d89eabf0e8c3c07c712fcf50799525a5,2017-01-06T16:28:59.943000 +CVE-2015-0690,0,1,5ed1e5ccb1c2045954b58b23216daacb993f0ae42243da994672bc59baea49cd,2024-11-21T02:23:32.647000 +CVE-2015-0691,0,1,92aad741f5663c19ec6187eb282faa0ee0e9198f285ee6c5bfcfef19c706c0db,2024-11-21T02:23:32.760000 +CVE-2015-0692,0,1,089c39ffe4793e36aa86424d0a1399c64f43a76138fa8d749960def963e7f858,2024-11-21T02:23:32.880000 +CVE-2015-0693,0,1,17ba02070138f6e7d8bcd8b290a6e44882fb9c254b7af5b41ed4e0597910785e,2024-11-21T02:23:32.990000 +CVE-2015-0694,0,1,aba232326ccf20073b5649be8079105a841f6561ce8ae97a96533a5774b30dd5,2024-11-21T02:23:33.090000 +CVE-2015-0695,0,1,9f9d26fd68ff03f4faf3a2c383a8904afb938f5c7ff5d54fb048cf61adf945ad,2024-11-21T02:23:33.193000 +CVE-2015-0696,0,1,b32b900059bd7c043dc3d591ccef5b9e00a4b59e546cb754c6715ea94827878c,2024-11-21T02:23:33.337000 +CVE-2015-0697,0,1,df88f5d1977bf132a4c59037ed7500cc11d8add2dc4473b165ad0c0368860f24,2024-11-21T02:23:33.450000 +CVE-2015-0698,0,1,02c42d677f4ef83583e1c471ffe0692e8eae07367929935740308a8bef60f406,2024-11-21T02:23:33.557000 +CVE-2015-0699,0,1,7620ed107c7204fa71d3a946dd0a019dd1cf6876934ef02b0ca8da390ef19f8a,2024-11-21T02:23:33.660000 +CVE-2015-0700,0,1,d76c2502f565bafd7094351a7540806fee97b38d577d65b383aafe4ec2b1fdcf,2024-11-21T02:23:33.760000 +CVE-2015-0701,0,1,cd4f898904fb306b03b67f175c3fa9b9912b12204a701ffb96dac4182c4c5ad5,2024-11-21T02:23:33.863000 +CVE-2015-0702,0,1,edae32ed47ba9063781dec83f2860826bf92a7b30710ad2de8f6dcf1183f0a77,2024-11-21T02:23:33.963000 +CVE-2015-0703,0,1,fd5c0ef467eb996d6d8c30d765055e37357d208f97c641a1bff6f509ddaf1612,2024-11-21T02:23:34.077000 +CVE-2015-0704,0,1,c88f2ee851c9ba4898b24caaaf2b21ef94e8c560bedad8a855746174638cb6f8,2024-11-21T02:23:34.197000 +CVE-2015-0705,0,1,d4c8b48f5eab16d5e3ce42c3bb2ac1a84f71ce82d84cc7c0c6da003af451be22,2024-11-21T02:23:34.317000 +CVE-2015-0706,0,1,20658be2575b28340f52fdbce92094716c04c260042b3b949e1b3dcfe411f3ad,2024-11-21T02:23:34.430000 +CVE-2015-0707,0,1,d5dfcdb80aab709e75032b09f2b201adb3d05b5f53a896bb86c717e76e6520eb,2024-11-21T02:23:34.537000 +CVE-2015-0708,0,1,e0c873daf6ab9060eafb221e67cffef98c45483dda4194a526db7bda1469aa9e,2024-11-21T02:23:34.637000 +CVE-2015-0709,0,1,d4c96a169aed4f3a9c1cd2b827382711e0ad15c2f485950fb6316166e1e8afa6,2024-11-21T02:23:34.743000 +CVE-2015-0710,0,1,c37b902f9d9a28e63f25e97a7579b076b857598b7ad026e39986e91bb004d34d,2024-11-21T02:23:34.853000 +CVE-2015-0711,0,1,f651328d531b06bad295f17c52f1389cfb0b12895c32f2588299d887d931cfcd,2024-11-21T02:23:34.963000 +CVE-2015-0712,0,1,fc0adec577f3a79a5e197d9af5d2e27009aca1c31623793b4bb4844fdd887324,2024-11-21T02:23:35.080000 +CVE-2015-0713,0,1,46313861d855c5d6ecc51c2439f664a88a30dc169b89aa36170a97a19e45b48d,2024-11-21T02:23:35.193000 +CVE-2015-0714,0,1,8783ec339fe370aa15678dc2e1355d9e170d1db3e832093b59c19a44e8fd1cd4,2024-11-21T02:23:35.310000 +CVE-2015-0715,0,1,11b377d7bbd558b0433dfae34a4dfdefeb07377d554334b5f71a46d24f1432ce,2024-11-21T02:23:35.410000 +CVE-2015-0716,0,1,a2cf4ab7cadf4488369cd879157bb60a63d5a454489b615025b1352d5fb31282,2024-11-21T02:23:35.520000 +CVE-2015-0717,0,1,f9dc807df4ea6985973080e2dd91add8d8cc4d17912cdcd7430f7820c4fa0f58,2024-11-21T02:23:35.633000 CVE-2015-0718,0,0,fac09c05ecf52d2d6c2a597dd4cc6903733d453fba0ae74578cc67cae3930f4d,2016-12-03T03:02:55.883000 CVE-2015-0721,0,0,d7f1179943174c634f18b39b53b840b0afd12cc41d9108527d1934a65ce0ec94,2017-07-30T01:29:00.413000 -CVE-2015-0722,0,0,6cd8042e1c1479a706b5e948ec6f49829242471f25a8af86de1bd99bfb6d9c64,2015-05-26T17:40:56.050000 -CVE-2015-0723,0,0,5c2199e96d3416c10f6894c8b197a36b3fa0b0a15fd97efec8843aaebb291336,2017-01-06T16:05:02.860000 -CVE-2015-0724,0,0,1e32d8c33fcb65c2774dccb7d0ca6c66192b876295ba0ea447df259d68bed845,2017-01-06T17:09:43.883000 +CVE-2015-0722,0,1,361a16fdb7d4bd4ce3e579858c0fde5eadf0564645a7b6e78144206cd351688b,2024-11-21T02:23:36.057000 +CVE-2015-0723,0,1,9c20131094781018f9710a2b00b35cfdab6a147d208be779eb81fef9a40a308a,2024-11-21T02:23:36.180000 +CVE-2015-0724,0,1,3677e3857f81d24c852d46736947ea67cbc0f56dff34525a23a4a39a4ed3e08a,2024-11-21T02:23:36.293000 CVE-2015-0725,0,0,4f3ffc7ddb05c92e01f952e14b87dac2c6a18359e161379b53227eb436967f97,2017-09-22T01:29:01.953000 -CVE-2015-0726,0,0,921add09bfb87e1d297f1954ce5ad6d06ad0a59a7bf4df4adf8678b9ac9c34cf,2021-04-16T17:27:07.230000 -CVE-2015-0727,0,0,11a6f96376f1017c3bac9156b7d26b5386757393f2e24f36598241ddcd2ad220,2017-01-06T15:30:58.430000 -CVE-2015-0728,0,0,914dd4cdfcc486d2a68e81ee2ef33347d8ad30b8c9c8370cddf6b45691fe6e6b,2017-01-06T17:12:05.433000 -CVE-2015-0729,0,0,0291632040857caa488296c2f443156629931883a8d6c9a7a8d50ef33ec26d2e,2017-01-06T17:13:57.947000 -CVE-2015-0730,0,0,2c0c80c28934361a19e1442743e2f5b4c59a8bc3c4cd5923355af066ac1f0fc1,2017-01-06T15:30:55.477000 -CVE-2015-0731,0,0,094b31c82e551ce2881f4e31fecd5ef891a2c6a91af28203c417f4f4cd1c28f3,2017-01-06T17:13:11.330000 +CVE-2015-0726,0,1,cdab77ab6a509aef6b54ed9c76b0d57e5efc02f6a65a5192bf0472a00747e413,2024-11-21T02:23:36.530000 +CVE-2015-0727,0,1,1036074e667c400108eee0c162f3f12835fda03babfddfa278efa9beeb2207be,2024-11-21T02:23:36.637000 +CVE-2015-0728,0,1,7ad56055affbfaa3b3fa8aa52fcf432986236b342ad5c0ef0e5fd79bba6dedd2,2024-11-21T02:23:36.740000 +CVE-2015-0729,0,1,67742daafa1622661a8a688db8a437c2d4739776f15d7bf3ef0cfe02743912db,2024-11-21T02:23:36.840000 +CVE-2015-0730,0,1,c4139d2381323b85bcf8bb8d3a51bc494a7b10c63a95949c8f8ae2276c39145b,2024-11-21T02:23:36.943000 +CVE-2015-0731,0,1,16f544c12bf51feb775622d97f84ae7aa3851ef19184424275585928c2f1a5ce,2024-11-21T02:23:37.043000 CVE-2015-0732,0,0,71f5df2b170ac5758c4e135c8e102bd374df58697cd405178cd5e1dfa635de88,2018-10-30T16:27:22.483000 CVE-2015-0733,0,0,cad1f52755f3c80b3dee8be4eab853901d1e27bd2e63d4940b16f922b25b2262,2017-01-04T14:58:59.507000 -CVE-2015-0734,0,0,4c901c939240fc5bf50afc05dc856471a718f48aa95f3f5b351f670a9f8f6e84,2018-10-30T16:27:22.403000 -CVE-2015-0735,0,0,c47f7d74018a28117ea6f3e737854b7a77b57d95e7ebb7f21cf02448cb97a5e5,2017-01-06T15:31:08.167000 -CVE-2015-0736,0,0,2950f3da700d7a0e459195befd32151b3ea2b0ac04ef6b5ecb56f3cb9f88bd5e,2017-01-06T17:12:55.347000 +CVE-2015-0734,0,1,af9367c7dc91a0021effe053b6d7255c2e90b5e8b877214d4bd19032beebba21,2024-11-21T02:23:37.377000 +CVE-2015-0735,0,1,5ed9a63d4d6a3c06b151d2f799b5cdf7344c3a5ca3b45d14decf13788b2bd1dc,2024-11-21T02:23:37.480000 +CVE-2015-0736,0,1,d7c1bbcbf1e79ed49b2c69e8d350772101f6215aa311f804e72297fe9bb089d7,2024-11-21T02:23:37.583000 CVE-2015-0737,0,0,da8552fc87bae123ef289bcd555fa5a0a827f24879814f215a589e071810fc14,2017-01-04T14:59:12.147000 -CVE-2015-0738,0,0,f043969b186db56f880703e85637c5b954c3a3d8def035ee066b2477cef971ca,2017-01-06T17:12:51.063000 -CVE-2015-0739,0,0,48e7f10a0afc449df0d2ddcf8e669837c07d5256cc918c18582711f9e1a35bf1,2017-01-06T17:09:12.457000 -CVE-2015-0740,0,0,558cb61e1810a2e49e757812090df451bcf827bb299df9116ac77e10f53ad41e,2017-01-06T17:03:22.267000 -CVE-2015-0741,0,0,7dbf3754afd486b8245675e471e732566c8959a887b7d467251509b3f2a39041,2017-01-06T17:03:08.377000 -CVE-2015-0742,0,0,42bf4238e4b27649e9572cf012b38acc533b8fabfa4c343b26f07336e926786a,2023-08-15T15:37:09.590000 +CVE-2015-0738,0,1,472b375ce0f93345eabd15e54b778f414346865974b8d654c8f71c83a965dc2e,2024-11-21T02:23:37.793000 +CVE-2015-0739,0,1,ea7ddaf08a3396ef258e4bdaca04ac4904c892d424a2e0793a8bae77b61bc6a2,2024-11-21T02:23:37.900000 +CVE-2015-0740,0,1,c4dd96073ebbed0ca60db03c94ac660a61ec78b21f4d0dfab42729fb9bf5375e,2024-11-21T02:23:38.010000 +CVE-2015-0741,0,1,556d6bca2883b9ef7f22da078aef73546b1e5febc4b030daa7474b75bbc95156,2024-11-21T02:23:38.117000 +CVE-2015-0742,0,1,1f4cd3a99ba49718e1dd9ce513b77335f8861f641a1009550945aff7f80ddb0d,2024-11-21T02:23:38.227000 CVE-2015-0743,0,0,87e8c8f37d00f65a9c4e9d61465c95dc2e60fbffe2b664e4ca0f53e84f12bf6e,2017-01-04T15:44:17.420000 CVE-2015-0744,0,0,82b5f981d5ed36901da1179bf4fb57c25cdafa08686affe8fdf85ac11ad93e10,2017-01-04T15:44:13.873000 CVE-2015-0745,0,0,8a674c6208fe2ca7c1eb2a068bd960188f3b49d29ad69266ce6beb0a56455599,2017-01-04T15:44:10.483000 -CVE-2015-0746,0,0,a89e445d552ec8180a4bc0d731611c4b55eb124c61725d5bd59c26563eefb49f,2016-04-06T12:47:42.120000 +CVE-2015-0746,0,1,3ed2718d733416a89dfdbe9e40c6ab4bca45cb3be313ec03ef76b714ea748cc0,2024-11-21T02:23:38.673000 CVE-2015-0747,0,0,b935f7c1a52d13929612bd7662205b575efe3607828d5d6d0a4d98e6871cd3cf,2017-01-04T15:44:06.467000 CVE-2015-0749,0,0,68fa2cee02b1a6b5d6a37de770e84f8de6d058c4e58eb9a3e676204c704cd154,2020-02-21T18:47:24.163000 -CVE-2015-0750,0,0,1dbbb9aae4e1e97e2e7a1b52ea7b17f697a8d71a4d0431d2241a22c5bf5fec1b,2015-05-26T17:40:04.830000 +CVE-2015-0750,0,1,15b73645c88c98b3bab68fa7ab39c13ba5c4d6585ebbeed81f04280c311e5d48,2024-11-21T02:23:39 CVE-2015-0751,0,0,96b24937d31e1b1534450de8f47f405818d4703a3cb7ea91f039cda4c7411869,2017-01-04T15:36:38.417000 CVE-2015-0752,0,0,726e327218330227e11c9b479c9688a15671f75e5eaa5a78bb0f4e0354212928,2017-01-04T15:34:50.540000 CVE-2015-0753,0,0,26395f55882346e8901e338747a1014f1377090ed7264612098613108ff2dfd2,2017-01-04T15:34:44.883000 @@ -74219,8 +74219,8 @@ CVE-2015-0773,0,0,5ed3489265ac41f2826e4ba447a19bcb068a22d8fddac91ef4861c09a280bf CVE-2015-0774,0,0,0ca8c7514bb11d24fef62341d484eda18ab383a8efcb47609a536fe52803d6f6,2017-01-04T16:06:05.377000 CVE-2015-0775,0,0,ce0010b780c7aa63c462a7b295b80914ea9f90dde55dd3ed096b38f1b832643f,2017-01-04T16:06:09.677000 CVE-2015-0776,0,0,f9cf24840e4435d6cc52b8f35765f97b5f1089487888e889819e0c415e5b2f0c,2017-01-04T16:06:12.927000 -CVE-2015-0777,0,0,2f742e8a84c137ed87b586cc0fadfc3d8def590413ed7e3117e48c988340c281,2023-11-07T02:23:29.723000 -CVE-2015-0778,0,0,a113171dfba8d00ff69b1005bff1ff50c4929ddc1bc8aca96ef980ea1ab98758,2023-11-07T02:23:29.970000 +CVE-2015-0777,0,1,ddf5c4825cd823ff86847583699ba4637517eed313f2aa4642fc63100317272c,2024-11-21T02:23:42 +CVE-2015-0778,0,1,ae02e8da9573adb4b466684ba8ac7a905cad7a9498547e9bb7497a3afad102e8,2024-11-21T02:23:42.110000 CVE-2015-0779,0,0,8aa96488eac888df393af79501147b76d7f3f0a45b93ac4231723d71be7a44b8,2023-11-07T02:23:30.240000 CVE-2015-0780,0,0,bc622dcc80b7928d44c310d0ae7c1838ba0dcc429169eddd3984bd17c64ea9a5,2023-11-07T02:23:30.483000 CVE-2015-0781,0,0,8a6866e44e629315d727e123dceb3a073147edbe24f52bcd0d0b3ec3f49b0f31,2023-11-07T02:23:30.787000 @@ -74239,53 +74239,53 @@ CVE-2015-0793,0,0,07d5246f735e4bd09544519f22bfb5b0b2479f2ded39511d20b60e0151c93f CVE-2015-0794,0,0,4389ac0c13889c0910eb146ba990fb9f5e2932d101b1c76842ea3ab1c0644f33,2023-11-07T02:23:33.973000 CVE-2015-0795,0,0,50a6a2459835af851999a40516dcb9e9f78be0e078314d45083c5c22287bab94,2023-11-07T02:23:34.263000 CVE-2015-0796,0,0,10fa164ae51f08b8cb4565afeebaded38c82a3c77d74215d85244905662c141e,2023-11-07T02:23:34.497000 -CVE-2015-0797,0,0,0721772d1ad38abe4395bb1a263ff88923cd1ca7b2428b9b3ad6826b85ca5b92,2024-10-22T13:54:41.943000 -CVE-2015-0798,0,0,bb012d0b5cd368d580ce1a7fbc6e1865968bed2da5eba801859cf43f3b1cc906,2016-12-07T13:36:15.370000 -CVE-2015-0799,0,0,6a2cfc2bf60f4cb3c593ae81d986025908a834da748c47342e9dc7ffffe2a594,2018-10-30T16:27:35.843000 -CVE-2015-0800,0,0,a343e278cfdc8f7bb3ac08c048ec3b4f9bcb566d0232cfc13ad1ae10224901b9,2016-10-04T02:02:07.240000 -CVE-2015-0801,0,0,c6910bfae9f2f4dd1f5579f3d569f379fdfc4fb8dedf0c52ed1f5fe905db29e8,2024-10-22T13:54:41.943000 -CVE-2015-0802,0,0,1b36c5c581b7e5b7a2c0b361c8af4357d82d1153fb982c92f9cd9ed4e2cd9677,2018-10-30T16:27:35.843000 -CVE-2015-0803,0,0,6274c073ee1512d14899701d88a980e3d819b2591b01b97dbd72f5e59f6b0a79,2018-10-30T16:27:35.843000 -CVE-2015-0804,0,0,f4e2d13ea18b8ae30fac9a282a36578ba00ba9fbb873f21550eb4fe314c42530,2018-10-30T16:27:35.843000 -CVE-2015-0805,0,0,9554f0d3f58258e9b46d7b126dc9f07b8fbb63bd0e6f2742bc65653cc72171cd,2018-10-30T16:27:35.843000 -CVE-2015-0806,0,0,dc429eeee890032267b5f455f233737749bbf9efe9080d74d5f0268e61c55a46,2018-10-30T16:27:35.843000 -CVE-2015-0807,0,0,a7025207865e672aeb58ec131b987bed40670989e21e9d87fa7ea7de16d63226,2024-10-22T13:54:41.943000 -CVE-2015-0808,0,0,62433af11112563b7b005c68d386b51e3fd3dcfef74ade4afa4d9252446764ea,2018-10-30T16:27:35.843000 -CVE-2015-0810,0,0,a3fefa2762dfa4f7c4d903e3c8797abd6f23fdc125c88dd43aca154d9465ad29,2016-12-07T03:02:20.887000 -CVE-2015-0811,0,0,d21fe4ef01233c19c5a2b531d2b95139e7883fd2f1932c5b10be1b81a46c0276,2018-10-30T16:27:35.843000 -CVE-2015-0812,0,0,c0a4fc33201983f7b708899f381a45b15b651fd194c34948e40ff2d327bb1252,2018-10-30T16:27:35.843000 -CVE-2015-0813,0,0,a77c914b7dce4d878de1cf0a86e8a8fcc5b10178558160c4cc8bbcb40aa02859,2017-01-03T02:59:43.333000 -CVE-2015-0814,0,0,038804910e75fddf10d24ee520c6ffc40b3e9e62816d039217dad65847a69099,2016-12-07T03:02:25.137000 -CVE-2015-0815,0,0,716b6496c64cfdd5653570bb5eab6b681c415fa79cdb679cd3c4ab25574d1f6c,2017-01-03T02:59:43.410000 -CVE-2015-0816,0,0,709ec1118d875aacf3f7ec1526830989504c7f05895994efeb8e3752d0564191,2017-09-17T01:29:01.170000 -CVE-2015-0817,0,0,36f5099f1606e771b00e592333c44499ddf1769c49bdafc81c2c439f750a150b,2024-10-22T13:54:41.943000 -CVE-2015-0818,0,0,c67e3cd5357d332b5a1f1104c391e9de2988e1ea7868c6ea887ed1f3efbb60bb,2024-10-22T13:54:41.943000 -CVE-2015-0819,0,0,912b1376c6659d3044b027ec425f1927a2b8497650b63ec599cef951103c41f9,2018-10-30T16:27:35.843000 -CVE-2015-0820,0,0,71521924f415cf6c53c3fc2784ca4a7e5544215bddef148051191d1677279d81,2018-10-30T16:27:35.843000 -CVE-2015-0821,0,0,fcab832e15bfcae1828bf5747f68aaf816ac6bd9c2f1215f70ae49d4c69dc6af,2018-10-30T16:27:35.843000 -CVE-2015-0822,0,0,10737e6144393ea4af18c45c4eae2f7e348a5aa3783303634d548e3554c173fd,2024-10-21T13:55:03.510000 -CVE-2015-0823,0,0,48e08e99c5cdd7ad60a73409ae0b6eca5022d7a76ce5414436ed1fc7b2f81369,2018-10-30T16:27:35.843000 -CVE-2015-0824,0,0,17958a13540c2b6e178b920289abd3e90ed9913e4b7344aadb37986c0032150c,2018-10-30T16:27:35.843000 -CVE-2015-0825,0,0,f8bcd99a9e5c87942cffd3e3d1a75bade9a514539c05571174268481a3a15a13,2018-10-30T16:27:35.843000 -CVE-2015-0826,0,0,8a37a2cf5f0ba93a8fe4bf656c7d03c0ddc96f867d015fb6b08e8d24489ea328,2018-10-30T16:27:35.843000 -CVE-2015-0827,0,0,8b91a4c756ac13886cdc043d53b052d2233a919e49c5a5e68a88f0306fe8833e,2024-10-21T13:55:03.510000 -CVE-2015-0828,0,0,6968bedd3f3062b98bf0996d9ca9b4a621a3b67fff2863375bbd62052c1ff516,2018-10-30T16:27:35.843000 -CVE-2015-0829,0,0,00c6c65b16cb62f843685d133dc7717de22f6c85c679544aeb264cea7b7c609e,2018-10-30T16:27:35.843000 -CVE-2015-0830,0,0,b4931d5271f135e8e943f37c9d619765d3cb4327a493464fa39c77fc18932d19,2018-10-30T16:27:35.843000 -CVE-2015-0831,0,0,c960ac93ed7152feb9673d7f9979876159a63810f2ded9b680fcc649182dd837,2024-10-21T13:55:03.510000 -CVE-2015-0832,0,0,ec0e0834605d6d2a3763caa28288389146b4a299b6b0c05ad2950d0e80bef696,2018-10-30T16:27:35.843000 -CVE-2015-0833,0,0,464fbf6b304dd4001afc79cb32b362470c281e2f3167c24ff00bfbe4d11a1096,2024-10-21T13:55:03.510000 -CVE-2015-0834,0,0,734c3eadd3bb28eb02033954b36254382865a06e18d0281d458a8cdf6ec38827,2018-10-30T16:27:35.843000 -CVE-2015-0835,0,0,5a6f7e579a8bc55dca51cf66bf89e30d1f2fa3a6443e8d589154aca02a53b4d1,2016-12-22T02:59:29.330000 -CVE-2015-0836,0,0,10d29b4b7537f6a1799eda96787fd57efaec9a01c1c04b1a0c4a7a6351b43158,2024-10-21T13:55:03.510000 +CVE-2015-0797,0,1,78fcadfc8ce8cf4675f420e9497f7674ab7f76db1a5d16e38563d213a50b2ebf,2024-11-21T02:23:43.737000 +CVE-2015-0798,0,1,e12502c7a5c5cff2445cc237c02360f3d14476ed93fe7ef1eb2c63c0d21e23dc,2024-11-21T02:23:43.927000 +CVE-2015-0799,0,1,26f4dbf4a349e0ba85bd0069a39cae395133eda9195d659d60a045fe38245b40,2024-11-21T02:23:44.077000 +CVE-2015-0800,0,1,eff52a097d739ac87291cf6ba1787bcf492ca883e312e14546ea28194c200212,2024-11-21T02:23:44.217000 +CVE-2015-0801,0,1,8bc7523fde1440f8e380e238c92ef230c1c27c9e550b00274c1152ed545923f9,2024-11-21T02:23:44.350000 +CVE-2015-0802,0,1,2b630590fc5b27b206f17b925368fab4ad61605e93cb78900d63aacf856c2c1d,2024-11-21T02:23:44.493000 +CVE-2015-0803,0,1,d1b3526fa42eafcc49ee1e2677d9348698c1edc3ee75e4018101e0dae4d31dba,2024-11-21T02:23:44.627000 +CVE-2015-0804,0,1,08837756d75f87792255bf049c7f7051e92d3f2a452f60df52065e5936d9bb7b,2024-11-21T02:23:44.770000 +CVE-2015-0805,0,1,ba4a6115aa70f243f5ac8ae6c1a05a71e887fe126fe4d4c1fa1cde2ecccecdb9,2024-11-21T02:23:44.913000 +CVE-2015-0806,0,1,6f73eafb8e97e6667c98abcc8da7da5a24513bbdc0f7e62fa2f410416df8b895,2024-11-21T02:23:45.050000 +CVE-2015-0807,0,1,4f1343fa4dfd8efe5110c4c224b0d95d1b69a630f3c19a76a051a37394c05328,2024-11-21T02:23:45.183000 +CVE-2015-0808,0,1,bfd55ebd390727aa0efa64d5a479b75e022ddca3740f7d8a78e167c1fa6d3d95,2024-11-21T02:23:45.337000 +CVE-2015-0810,0,1,91bc5b76d9ec986d80d10a141954f620fa08783decb79c38845b6380479f7cd7,2024-11-21T02:23:45.467000 +CVE-2015-0811,0,1,cb873d660926d3d6305ce61d695908a096d7b042c324066c089c55f49cb6997f,2024-11-21T02:23:45.590000 +CVE-2015-0812,0,1,f3425270d4c5d950d67ed632eff2bb445827e22354d455eb09b64bcab8b93f4d,2024-11-21T02:23:45.717000 +CVE-2015-0813,0,1,09c96e2ffa5e97936c9ce7a9b87de265766266b2099784059da0c1e1aa4456b1,2024-11-21T02:23:45.847000 +CVE-2015-0814,0,1,77c48c9b7e4d364841873736f1cfb752a9660c65cc101f651b4a7c9332d7e9f0,2024-11-21T02:23:45.983000 +CVE-2015-0815,0,1,66e4b553712e0ed810437213797aa6774412c352ed580f0fda7b766fe304eb76,2024-11-21T02:23:46.120000 +CVE-2015-0816,0,1,5030e3dd676359f1ff02b1c7170f2330d9a6efb2d37d8b47440524d45c17201f,2024-11-21T02:23:46.260000 +CVE-2015-0817,0,1,895d0b3f800f1984bdcca60dc71cd78958caa48bc4188dda51458c73a4b5955f,2024-11-21T02:23:46.417000 +CVE-2015-0818,0,1,2ee23148096709f61ab65f393d11cf1fb0c550e0949d9047a1d478cf3a676cca,2024-11-21T02:23:46.567000 +CVE-2015-0819,0,1,ec0e3c7fd43c4a561fa4cd71276714bd967de5f92e924d25c2bf83906269ba85,2024-11-21T02:23:46.710000 +CVE-2015-0820,0,1,3f3c536987d96eeed3580b538e4adb749b0c72959dffcdebf7cb6fd5640a8547,2024-11-21T02:23:46.890000 +CVE-2015-0821,0,1,a7f147138e56bf67a78edbd9f295ef3e5b17a2210af8477aa4649bb54a9e0e8a,2024-11-21T02:23:47.063000 +CVE-2015-0822,0,1,c11ccfcb01bdc6e7b702fa5838ddae0afe394c6d0ab4e2884e91152678ee62b8,2024-11-21T02:23:47.237000 +CVE-2015-0823,0,1,91865f1be3afe433c7dc53d43c7a1f53c63269f7b12649601a2e0799d611c159,2024-11-21T02:23:47.417000 +CVE-2015-0824,0,1,5d12b3810ca26242916db568703f616d58854195568d281c521e0df87facef5f,2024-11-21T02:23:47.590000 +CVE-2015-0825,0,1,da205ac1558877d89df36af5638fe844a9f3fd09724587dcc733bd9d46585be7,2024-11-21T02:23:47.777000 +CVE-2015-0826,0,1,82bba21affd98976023433f7b305225382676c986601c697f339eb9d562bf2a7,2024-11-21T02:23:47.940000 +CVE-2015-0827,0,1,3a55b13e3d712b875c71496dbb602ce60a17e8bf691cad1ef39ac0e301080119,2024-11-21T02:23:48.130000 +CVE-2015-0828,0,1,cdb6aa136acfa9923f406fd6c0d2f889b8cab519319558d9fe13760522a94e99,2024-11-21T02:23:48.320000 +CVE-2015-0829,0,1,2f06a01d7ade13b64383cb65c19c0cece5e7b0c22e901ec964dd5ad25c2bf488,2024-11-21T02:23:48.503000 +CVE-2015-0830,0,1,7ed0d018a6cd57656488a6a5aa1d12e257903ad59717659b380baa30e566a5f2,2024-11-21T02:23:48.723000 +CVE-2015-0831,0,1,e34e0c9e8c74ced56d111ec7283c17975f00c67c7f287af9ced53705930a3de2,2024-11-21T02:23:48.937000 +CVE-2015-0832,0,1,d230d5c903072137be1e656136c470f0c001c0832e716ec214e5e5670a2dd88e,2024-11-21T02:23:49.107000 +CVE-2015-0833,0,1,bff23f2c75ec68083f9971691cdd343d72541442fc5598ffe5b80d4818bc138d,2024-11-21T02:23:49.263000 +CVE-2015-0834,0,1,ed9e7e125e85e18ce07ea86f19dd4c7ad17e4eb4c205d2e7dba08a752b173228,2024-11-21T02:23:49.430000 +CVE-2015-0835,0,1,07ea582670fb1e707a06669d9be4dda679ad20a238ddb94f166b80243819a2d2,2024-11-21T02:23:49.597000 +CVE-2015-0836,0,1,22b4fe7999d33a31c79791a0c8056420b4a692d9eb5705568cf40b8e28461966,2024-11-21T02:23:49.770000 CVE-2015-0837,0,0,c2e9e15b846996d05861a3845e8b25334b083794fde75e8e4aa66a306223a998,2019-12-14T13:59:09.573000 -CVE-2015-0838,0,0,69e74d27e70af955fd04d7e7c07a2341c4f4710c12662b14c59ab18bae69232e,2015-04-01T03:09:39.097000 +CVE-2015-0838,0,1,70ae9f3720cb2e8f10b42f4ce63bd359a665658b2282eb1833b0820143a58ad6,2024-11-21T02:23:50.060000 CVE-2015-0839,0,0,099290d14ce6e472d78b30f974db9fd0c45b0deeaedfcd6e0c3ee761b15793b9,2017-08-25T11:42:07.007000 -CVE-2015-0840,0,0,3eb165288cecc6b9b73e0b51dceb8562ed5c6d5d9736dbd232a69a777c05b3ee,2017-01-03T02:59:43.630000 +CVE-2015-0840,0,1,7b5381efcd8c3fbfde3f8b79633cec3ac8a4ce3384788197e8a648f40111d86e,2024-11-21T02:23:50.293000 CVE-2015-0841,0,0,2ec358815f13aa063da58c7c4c66213a5055c9f4d2914c7a5c65e60215eca528,2019-12-11T02:28:59.877000 -CVE-2015-0844,0,0,db1291cafb0d48527b3bd8352cf1d9af31b81dde086372f6a9d1570daa726e18,2016-06-28T18:21:34.650000 -CVE-2015-0845,0,0,377d9b83ad3686d62f13871c1533ee2fc826322c3a2dc1aac79fdb4feba85810,2015-10-09T17:25:47.310000 -CVE-2015-0846,0,0,fb51efd00afe701ebedc34371126b9437f90f8c3f7ec12c782ef811737e7ebce,2015-04-27T15:11:47.283000 +CVE-2015-0844,0,1,2da639791b4109f08af125297eb7fc6de06138949600087d494a5ae47d537eba,2024-11-21T02:23:50.500000 +CVE-2015-0845,0,1,09f4e8827844dd79b9bdba1a1baa5a6e16503229df5b7687d24c12a3499ed517,2024-11-21T02:23:50.620000 +CVE-2015-0846,0,1,57197a6ee67ff21ef1538f2ee5466681fe46137d10109f478e2e7dc4fd040dbe,2024-11-21T02:23:50.720000 CVE-2015-0847,0,0,94416c0c8971708229e61afd28790784d4a771de694c2ccda6722dc30a3fe3d4,2016-12-31T02:59:18.733000 CVE-2015-0848,0,0,cc40475c23837a090c29189adf71d970d4e46a5538691664e90bccec20cd4d53,2018-10-30T16:27:35.843000 CVE-2015-0850,0,0,9f0df40524af702e4b038ef854f11554d51147e23124c4e1e0cb101858186066,2015-06-03T13:18:32.067000 @@ -74300,120 +74300,120 @@ CVE-2015-0858,0,0,92f2fc91483289bab9821e528a150fa8a4b801fcd05da1ba04435940e775b7 CVE-2015-0859,0,0,87029459a3090ec663ced3626b3b67f49baa326f5e3540a89fe38f9211f186bf,2015-12-04T15:15:53.927000 CVE-2015-0860,0,0,25a63620e6a6db257e08170dc1f7ebbf5574177dee96173013876553a2dad3e6,2017-07-01T01:29:13.157000 CVE-2015-0861,0,0,979a9428bbeea87734a8a23e6d9550e3ccc928fd846811c8dfa756665b7c4bf3,2019-02-01T16:42:15.603000 -CVE-2015-0862,0,0,11ebee10b20fb58e790f059fb37b572d98a83c07092746536c26695f99578b7c,2015-01-20T17:45:26.290000 +CVE-2015-0862,0,1,9b370c74b0019eef778dbbeebf41950a77d610ca7d9da87e43b05fee265dc9cb,2024-11-21T02:23:52.513000 CVE-2015-0863,0,0,0d82a3baa247d236d4caa6754972453f3a5f38f1ddb2d68df33e21caf3eba032,2017-04-04T15:19:41.140000 CVE-2015-0864,0,0,bc56451cf3c55485f0e5fc4ae2d417bd5481272bd56825d00907b1d0519579a4,2017-04-04T15:20:37.377000 -CVE-2015-0866,0,0,04eb3ba8f9e7c74409efc8eb8c9bde72fe41f3da15c8a74c67a9cf976aaca631,2018-10-09T19:55:40.733000 -CVE-2015-0867,0,0,f87ae56b7deb9604e2a79968308e40ad51bcc20c2b67391e723b3606e0e6b3e5,2015-01-23T20:37:34.227000 -CVE-2015-0868,0,0,b311c07690483fa70bd88e2838f4a9f89a01f1ebfb3da7aeb10d08f57c8696cb,2015-02-03T04:02:23.253000 -CVE-2015-0869,0,0,97a71aab5335f42a58421fee4db5a0ca6a3d32dc96058d4fd297f1930feb6810,2015-02-04T17:31:34.807000 -CVE-2015-0870,0,0,c2163333b091d263c9ca938a2a8ddeb3f134cf8691f87eede3b61a409122c9f5,2015-02-03T04:13:07.403000 -CVE-2015-0871,0,0,57ffa45c9fabdba4e0685260e846f51ec6069134528738670c7107e75b3680b8,2015-02-09T19:25:45.623000 +CVE-2015-0866,0,1,e657039fbcebbb1b4bc2768baca61c42a281b85f9b885335fd1b4cb1dd6a7e61,2024-11-21T02:23:52.957000 +CVE-2015-0867,0,1,f49df5d85fbd3c755223830ef78f8b94a68a281183f8bbf20b5561b8df2426ec,2024-11-21T02:23:53.100000 +CVE-2015-0868,0,1,9110f62e9646f5247b98244467876e2ab66256bad639dc0417ecc18be748d1cb,2024-11-21T02:23:53.220000 +CVE-2015-0869,0,1,bb7058ed3f9291592cea391edc2952fc86d7f155bf6a9b2ea4b7a086afac3e64,2024-11-21T02:23:53.333000 +CVE-2015-0870,0,1,4f4e0415eed338ab948b874bb07a1ab5a2342ffac02e4db65e32e30958ec52f9,2024-11-21T02:23:53.440000 +CVE-2015-0871,0,1,e3907fd9725d14e457a00257e24a162fddc3c0c69d007b51191942e4af67d4b0,2024-11-21T02:23:53.550000 CVE-2015-0872,0,0,df9310e81c0d5fc0de674687b42c4d02f6e3ea29b5b9b3c5bef9fcc28abbf19c,2023-11-07T02:23:35.503000 -CVE-2015-0873,0,0,b0518fadaaf7e15fd2f08881688aead204f072994a540abd8aeb11014c1fc7c1,2015-02-13T23:34:02.750000 +CVE-2015-0873,0,1,bc3ac64ddab58276223a0fb9ea87fe872be4f84b451ba636a15823e2090a226f,2024-11-21T02:23:53.677000 CVE-2015-0874,0,0,fc4e6f76c4f31699860b92b8482dcc01d7ec5fc3d3167aa04ba55b29c2f230a5,2017-10-10T14:49:38.353000 -CVE-2015-0875,0,0,7a046851b84780b43a22652e2e8025201ee44fc2520fc05ea7c373dbfddc42a2,2015-02-20T01:56:25.903000 -CVE-2015-0876,0,0,a369880ca297eb3b15b3ecaf42e09f25932395ea78c93b71d536ac48c04ab89c,2015-04-07T14:12:27.863000 -CVE-2015-0877,0,0,8ac8dba06ffaf9783d0264ea65e0122672dc5bb7ecc798de1a4fc0d6be9c4aea,2015-04-06T16:55:48.963000 -CVE-2015-0878,0,0,33d76b67922372d180a1d1ed9b23c1f648ef31d4cda861f167d87cc26b4edb32,2015-02-20T18:39:59.013000 -CVE-2015-0879,0,0,bf1fba3b80d643d2736f5c3d9f43cf81ed30f29d06e65f58d9564b3238698256,2015-02-20T18:40:17.700000 -CVE-2015-0880,0,0,266244b1f70ac7f4868a7ccea229904e8dd62059d6ea42fc3a3628584ebd9f6a,2015-03-24T13:56:09.257000 -CVE-2015-0881,0,0,a8aa25582dc34f4125587bbb51af9209d58258fcc8a3d149cbe2a5a78dac3e65,2015-03-04T17:13:07.110000 -CVE-2015-0882,0,0,e168f6c022d5a72b1cd2121b66081cd1dcd64c0159cd02dc46733a7e1cdf78c3,2017-12-07T21:33:25.403000 -CVE-2015-0883,0,0,993a15ed926b77b2b4426c97d5457e9d8444d1f5977e7bc730551d2d31095b0b,2015-02-27T17:34:25.117000 -CVE-2015-0884,0,0,779cf44d25f4dfe8dae4004b631b2c807b9649fefc6ae1e5393bf0b3f01eff91,2015-11-19T17:00:02.763000 -CVE-2015-0885,0,0,a90123eb701d7e85ef47d644cb802e31c915682d65f9914af1dc536bc5d2682e,2015-09-24T16:46:37.200000 -CVE-2015-0886,0,0,061b6cde182bd3f6669b700c5ce5bd85351d7cdb4abaa69a298a61388d95e70b,2023-11-07T02:23:35.823000 -CVE-2015-0887,0,0,ccece58f1ccc020696a8ed83e0ba4828d8b3a0ed54890f77a47910181adb7e63,2015-03-04T17:20:43.703000 -CVE-2015-0888,0,0,491b62b019d715829a6d599a5f73bbadbb8b766419fa459e9ea42c5228a74960,2015-03-02T20:56:02.223000 -CVE-2015-0889,0,0,a590a5e1ab8890ca4c49d802b70e0d98093add968bea4c51df8a14edef0d4fe4,2015-03-02T20:54:05.667000 -CVE-2015-0890,0,0,d96358e4c69286c89c187a32c57135972c9ae20bfb4e3fef0c8d619a133fe0fa,2015-03-03T18:01:18.290000 -CVE-2015-0891,0,0,a6a35c15bbcaaa5d73fbfefed3db3ecc0cf04d90e2ea031861fb0f66d61f3d43,2015-03-23T16:16:26.623000 -CVE-2015-0892,0,0,ab1f6d1c3364c04d101abadd49e340053648a3ba0069ca71581e64fc1bd778f1,2015-03-23T15:57:42.243000 -CVE-2015-0893,0,0,70f82e2a6f1e17cb2a2e49940f9b6651d27d5a5de28e6f4f6c9d6b36a92cf117,2015-03-23T16:16:40.700000 -CVE-2015-0894,0,0,c57df52f4ed28ccf94cb2fdb66fa613a3edbd461515514ca453d815deb188b6e,2015-03-09T13:21:58.930000 -CVE-2015-0895,0,0,a1256ad890ab9388473f4bfbe7f145a87eb939ca43e5b659c461cf4f1303ce88,2015-03-09T15:09:16.447000 -CVE-2015-0896,0,0,702649d69d613b684017959e791a239d0a6b5f4f8de0bc363a26cb7401ee5850,2015-03-19T13:41:37.083000 +CVE-2015-0875,0,1,f7d71d072abc5df1aa9673dad479364cdda00b29bce0a5a414081cc1456f9564,2024-11-21T02:23:53.900000 +CVE-2015-0876,0,1,156797cc1a60f609ffce9e40ec56e59e434a780e5d5f9d4b39eec89e4f0447fd,2024-11-21T02:23:54.030000 +CVE-2015-0877,0,1,d70d59c2b11977b7923864f81c029107e9aa97c4a3c679694feb93b66d1311ed,2024-11-21T02:23:54.147000 +CVE-2015-0878,0,1,de3561c31e7c0ace1d8cdbc844ddbcba758cc2b3baa035aef4b684182dba56c4,2024-11-21T02:23:54.250000 +CVE-2015-0879,0,1,5174715f71dfcdac70a6d1d7f6af9efab07091bdd58848a6e52c6884334db3ef,2024-11-21T02:23:54.373000 +CVE-2015-0880,0,1,21e6b5d708a305a5f214fcd427457212e4db1de59553bda2716bf18a9694e2cd,2024-11-21T02:23:54.490000 +CVE-2015-0881,0,1,3e44f43fa3324da4d757f03686e76be4d8726af19d6bff3d24892401cd854226,2024-11-21T02:23:54.703000 +CVE-2015-0882,0,1,b97efbd5219e863b4d8280e29efb671bcd37904789a58227084a8872ef818ff1,2024-11-21T02:23:55.560000 +CVE-2015-0883,0,1,8984329f05bedd2cc68ec8a37531d52076a9924bc779385cd47c590c691d591c,2024-11-21T02:23:55.703000 +CVE-2015-0884,0,1,88687f864343da3c81fe807933977a939788f2bc70a209da4d2b914236df5c97,2024-11-21T02:23:55.833000 +CVE-2015-0885,0,1,fee2b8f17b8f9585d30c5231667efaeb8fc732deb5eafb5a6984d4dd472aa774,2024-11-21T02:23:55.960000 +CVE-2015-0886,0,1,4ba28c48607295e2c1fda8b53f03da9e13ed5ac39b978f7864efca5919dbe9ee,2024-11-21T02:23:56.073000 +CVE-2015-0887,0,1,f1739df839c28f9c6413188df1adb7ff13e378a373bfd0725922d4b21e8e09d0,2024-11-21T02:23:56.217000 +CVE-2015-0888,0,1,e72fd24f51e865f9ea08fcfc4872ccab840d0510444f891f78e75e06de9484c9,2024-11-21T02:23:56.357000 +CVE-2015-0889,0,1,a67a54fa68ce27aa8bdb03a33d17732c38ff75e343e62bff2f2cda4b5a4c7221,2024-11-21T02:23:56.473000 +CVE-2015-0890,0,1,a0c833e48a80bb7afab0ee2a2a5139cfd97b249be24c2f11864025b91cdf2893,2024-11-21T02:23:56.583000 +CVE-2015-0891,0,1,bc0ca61f45bb2b1d3bf095117b4a2aea17af4ac0b95dccec22e5056ff62cd56c,2024-11-21T02:23:56.717000 +CVE-2015-0892,0,1,2a936c109f16d533c8e266d618282a1662868045a85dbc9f510823480e632e35,2024-11-21T02:23:56.843000 +CVE-2015-0893,0,1,6bb728f84e0ede59e31846f5bfbe2de294ad3798b85c7a6ecc44f46ba465a5f1,2024-11-21T02:23:56.960000 +CVE-2015-0894,0,1,7240b6e1f43304e158141c6f817791651da9555ce6ec0bfc963eb50b4f514c83,2024-11-21T02:23:57.077000 +CVE-2015-0895,0,1,1afcf4fd06c66270bea35772b7860e9bdd2ed609523ca176db4d0122c5135e56,2024-11-21T02:23:57.190000 +CVE-2015-0896,0,1,d9250cce830d68df135664c21dde6656448d0f1fa1d84c29a794b01d48469167,2024-11-21T02:23:57.307000 CVE-2015-0897,0,0,11756ad69c345d568e91982fca2c5331611c946253b6c369d8bf4f82fbc6c5f6,2023-11-08T17:51:36.943000 -CVE-2015-0898,0,0,c55e30c50d1a5af4de2c6772c483d0ab443ebc3eaed5839a1058dfb8906b1be3,2015-03-27T07:35:38.560000 +CVE-2015-0898,0,1,95f258d1fffa4253954fe5794735b888020db6fff5abcf52f2df97bac2d32523,2024-11-21T02:23:57.560000 CVE-2015-0899,0,0,5cea0537ad8605faf9c5b2b59f94bbe1a8072e22d80e79b1066c8e3a8fd38e63,2018-07-01T01:29:00.457000 -CVE-2015-0900,0,0,ac7625124ef6677e97047d81d06deb6628b22072ce07865d7e12ede0a530b3e5,2015-03-31T17:06:28.347000 -CVE-2015-0901,0,0,afc2e080400186e016df39e5f3241326ccda97f66eaa49295a2daeda07d741c6,2017-07-17T13:18:03.563000 -CVE-2015-0902,0,0,9c40a74e137e9e838c731c694ecf96147eb0a40d7737dd2fa57026d75cfaf3e4,2015-04-03T15:15:24.940000 -CVE-2015-0903,0,0,9bf8ca643cbc66bfa677dc58e05652fac78e53a6a229066f9ef9eb39855fc79e,2015-04-06T16:57:11.507000 +CVE-2015-0900,0,1,cc2373b8a0a1dbb3250c1b20062c4ad7ffae7672361374f4d7470bd8877eae95,2024-11-21T02:23:57.810000 +CVE-2015-0901,0,1,67a4b8fcc709f7ffb2cca84b189cdd121f8bc33bd6d23748d8687d240b09655a,2024-11-21T02:23:57.923000 +CVE-2015-0902,0,1,6745e6057f2343ca185e4236596ae5d69623fcc66cfb7acd166b7dd4c7a197ce,2024-11-21T02:23:58.033000 +CVE-2015-0903,0,1,a6097576222368863d21148d56cc18a319a101c37f4a54284a881effb85ea0a6,2024-11-21T02:23:58.143000 CVE-2015-0904,0,0,d3425bf26baf5bb51b6ef17de34e4d0083a38452a8f1ec9350fe738021d72b2f,2017-07-31T19:12:35.610000 -CVE-2015-0905,0,0,68e6fe94bc2ebcab7fee1180c52af28e28c25fb15a37bbd02f28cf5ed93be248,2015-11-24T18:10:58.730000 -CVE-2015-0906,0,0,697644b428a72c6ae373863b69996d174f2cbf0a68672dca017d87aff498316e,2015-04-15T19:01:22.697000 -CVE-2015-0907,0,0,356d34955b42799b9426cbd765de121b12ec28d34cf0e0f4275e1f5fd8a97461,2015-04-15T20:16:39.447000 -CVE-2015-0910,0,0,240a2322ccbf48034a0743bb3b75c5987737d7edfb5aae0be0f0af084f538195,2015-04-24T16:51:42.797000 -CVE-2015-0911,0,0,6f9cef3413773a3795c9c5b9d205c9768ed16e69dd8b94e8401e49e84633e946,2015-04-24T16:52:07.297000 -CVE-2015-0912,0,0,e07fdad99d3cc424e7c750fcebcc60910768b40d19b22776f525b0ff4e924e67,2015-05-01T14:22:36.537000 -CVE-2015-0913,0,0,f5d42ee02f3f20346318b9b6e24e02ad2fa82d405f7c5348eba60ee5f497927c,2015-05-04T12:59:47.110000 -CVE-2015-0914,0,0,76ca1c580350d4e09f0bb7c32cfe86890cf9deb29d75dada74234c48b7e6095f,2015-05-01T14:23:49.363000 -CVE-2015-0915,0,0,f939514ef83078b09260fca838469cc3d5c274aaab75616f8f408c0ce20bd330,2015-05-22T14:09:21.170000 -CVE-2015-0916,0,0,e162bcfd2312d0694a9d7a7210dec04666688a78772624de045552066fc082ea,2015-05-22T14:09:40.517000 -CVE-2015-0917,0,0,ce534e7083cdb36b7644f976a41541e30c90c44b23edaf8e09dc79d4a742a276,2015-01-08T19:54:44.513000 -CVE-2015-0918,0,0,6303a2b3ecf062a1815b81010578b755333fec5faf3411e3f8f207d6e1d95da3,2015-01-08T19:55:17.137000 -CVE-2015-0919,0,0,a177b6ff7ba517310a6d8b88bf4f3a91aa9b4afb38c1ea34b76447cdd1714803,2015-01-08T19:55:29.857000 -CVE-2015-0920,0,0,eea41abfce177f6482a81c3c50327b4910fbdf14f9576457185a4943fedd1bb7,2017-09-08T01:29:46.670000 -CVE-2015-0921,0,0,6254ba58c60c65ecacbbfca4c3f34ea9166cc80d12c36589b2f32c285e9f119e,2017-09-08T01:29:46.747000 -CVE-2015-0922,0,0,adb05a051e091ff9dd8df102ec6ce25f8def54eeed8648d3fb6d01820b4ab03f,2017-09-08T01:29:46.810000 -CVE-2015-0923,0,0,bc3bb99232408dea6222be6f3169e8c31e7837645d2aee5bb3651366ed282c20,2015-02-17T17:11:49.160000 -CVE-2015-0924,0,0,25135302f06ba44c28960c36ebdd1baabe6ec0dc0c1df5704704181080f66680,2017-05-27T01:29:00.607000 -CVE-2015-0925,0,0,ad0082cc6f2c7590789d88da36824f6d8b73e98f08d53b9c0c0199b87bd0207a,2015-01-24T02:26:31.593000 -CVE-2015-0926,0,0,56162e20cd26eee937562f263f9807917a9a325e64dd1188084095e63f158af9,2015-02-03T15:20:38.383000 +CVE-2015-0905,0,1,50c434f770ea9d0acb37e0e9aef85b58c39abee7ae74e103deafea1d9b73da6a,2024-11-21T02:23:58.357000 +CVE-2015-0906,0,1,7cc7a02985e0ad187c1308f87633fcb55b4562526cf8b6ca7ddfbd2c4a950548,2024-11-21T02:23:58.463000 +CVE-2015-0907,0,1,8240dbea6c5cdb912c6df17432c6d39e1d9d806e2e71fd8314ddc9400a2d1864,2024-11-21T02:23:58.580000 +CVE-2015-0910,0,1,7105667ffa99754b639584fa93698bc6e07bc48f7d04eebbc86e79545d1ad138,2024-11-21T02:23:58.687000 +CVE-2015-0911,0,1,f7d309788d6dfd75135468caf6aacc963bc549747f5f0a5e9369779152a5f228,2024-11-21T02:23:58.797000 +CVE-2015-0912,0,1,0a842b669d8a078863dbe738fa78ba9330ee000afdb80c47ec72b5ddce0c4260,2024-11-21T02:23:58.907000 +CVE-2015-0913,0,1,b1916c25824cf87422355e7079d3e790205157c7f3f810bab7a000b5d4791c2c,2024-11-21T02:23:59.013000 +CVE-2015-0914,0,1,71d0d8ca287c79d54bbeb143845dc66d74330d4e0f29b1a420e88f6b2a029575,2024-11-21T02:23:59.143000 +CVE-2015-0915,0,1,7834621200a833efc262ad204ef717a200a34a5a5e39b5f9fda06d6323d417e7,2024-11-21T02:23:59.263000 +CVE-2015-0916,0,1,86267f25fac7b4433e65f8914397034715c25cf1f70906efec1b78fa8541a1df,2024-11-21T02:23:59.370000 +CVE-2015-0917,0,1,1a4d75920eb5c9ecd7c54b9ffd5cefbdb37963aa82e90e6d37612ac7b5e82f70,2024-11-21T02:23:59.463000 +CVE-2015-0918,0,1,6722d6961225e1ed01ad1218370bac2179fc8ce2c21d1e6c12fea482dce25014,2024-11-21T02:23:59.603000 +CVE-2015-0919,0,1,2de242743fca1357b443d6e8f87efe34c1cd0c58958bea49830248738e8511af,2024-11-21T02:23:59.747000 +CVE-2015-0920,0,1,fa6afcd85da40cb4b5f38ec120713b6b27be5dc89935c18290a651e38d53512f,2024-11-21T02:23:59.897000 +CVE-2015-0921,0,1,50642cd53c1e7638a8aabfd781472b155d1c7804d3ba77cbef8406af33fcf27f,2024-11-21T02:24:00.047000 +CVE-2015-0922,0,1,75800da540033ccb816b776f9b740f6606fdd59c2b107c1817bf6470e79d6fc5,2024-11-21T02:24:00.203000 +CVE-2015-0923,0,1,6c92380e9e05abc6b9565bb62c69c168c70d904728161bc9415997ad68dfd277,2024-11-21T02:24:00.367000 +CVE-2015-0924,0,1,35d3b912c00283e34638cc08c8a4e0f8821b2e812df0116e5e190cfa4577e3e9,2024-11-21T02:24:00.477000 +CVE-2015-0925,0,1,211e10dcc8f2377529d397ac1442827d0b75d49d6cc5c5dea4cdbead116dba5f,2024-11-21T02:24:00.593000 +CVE-2015-0926,0,1,0b9628d7a83e806de281434ffab2dfa899c866284fdd69129a6840a700c079f4,2024-11-21T02:24:00.697000 CVE-2015-0928,0,0,3c52d5357e780fe1266a73158767783d73c25765c8881e5d46d46a3d53b58def,2020-03-05T18:51:27.237000 -CVE-2015-0929,0,0,bd9d6557ef675ec721dc5412e169e047d4508dd43a490e35874b0c62b8af9766,2015-02-04T17:33:26.457000 -CVE-2015-0930,0,0,3278cc78ed6060153ffa2875a2d878c5b308e2823c3398730a20b56f1d264ee5,2015-02-04T17:35:10.207000 -CVE-2015-0931,0,0,739dfb4bd425e036b3d60d00439ebf705f886ce18cb8c2678aad7fbebf030288,2015-02-17T17:17:34.827000 -CVE-2015-0932,0,0,acf043da486356e2470fbc8f0523d0f5cfd7297a3af08bee9841c422bd6121c2,2015-04-15T17:02:00.537000 -CVE-2015-0933,0,0,8e4ae28a86c0d6c224faf4982d92f76555dd14f047d50aa40dbf0f1bf6a7fc85,2015-03-04T19:09:01.737000 -CVE-2015-0934,0,0,cb22a8bc1f879253b0b705a60428cf56689166655aedc9129a9378bba7b0ade6,2015-03-04T19:10:01.063000 -CVE-2015-0935,0,0,cb3cf7fcf85fe5f9e55fbd5ea6bc703a403dc7ca784bdfb161dd5ab2e4dd646d,2017-09-07T01:29:00.337000 +CVE-2015-0929,0,1,9cd48137363814eb7711f3be8bab551c7bf9e3122ab15ef1e9326bab631e6d1b,2024-11-21T02:24:00.930000 +CVE-2015-0930,0,1,ac68e917c0c50cf761903c38987ba35fb69eb621b02cf566039e4c21333da948,2024-11-21T02:24:01.043000 +CVE-2015-0931,0,1,3567858478201b51ee9ca5c3ac617d281371719b133183d0261656f51db35321,2024-11-21T02:24:01.157000 +CVE-2015-0932,0,1,971ccd03f5a25f1bdc237cb13458e80e540f0fb56289297ad62fcd4add8daac1,2024-11-21T02:24:01.270000 +CVE-2015-0933,0,1,f9fbcc4c3713ed0fd7fef6ba7cb274381debacca5b420a5de82eb9123565dd47,2024-11-21T02:24:01.397000 +CVE-2015-0934,0,1,a6b74181d856db28caa85f6bc4ee144ac649c82cc86ef21efda5830dead98e7a,2024-11-21T02:24:01.520000 +CVE-2015-0935,0,1,7dc7af60d5317c2f243a0c2fa7866d6a2383da29712f1feb9385cc889259784c,2024-11-21T02:24:01.630000 CVE-2015-0936,0,0,e6b461e1f16f94b3d56e828e90a554db63311b475b945887e0ed8c118673edf4,2021-06-17T17:41:56.570000 -CVE-2015-0937,0,0,ac4de3e39f8251f2b93e1b2eead5844e7579be004e8e0db38c3e783d644cc267,2016-12-08T03:07:01.447000 -CVE-2015-0938,0,0,f69ba3590de1595eae8bfb38507b8132d4bb0f04443e628ff01dcc3340d91b98,2016-12-08T03:07:02.367000 -CVE-2015-0941,0,0,184f845b0770e39a9e2883a0a50326c9b17a6a1164d66f957d0bf74d252851a4,2015-03-24T16:11:18.117000 +CVE-2015-0937,0,1,80c6793230376e5302690fc1d011680c347c616cef26295cbaa7f5f3c9665b0a,2024-11-21T02:24:01.897000 +CVE-2015-0938,0,1,1644f3abcd3e8a01c9084a06d0da5d74c1b46a7709f365e221ef73de90d167a9,2024-11-21T02:24:02.010000 +CVE-2015-0941,0,1,58b66182e9563d8d7cfbc1f474ae946bc0a933150996091d45cb929e5c03edc3,2024-11-21T02:24:02.123000 CVE-2015-0942,0,0,8d756d802950b1955788fe67ee3f911e875a7518e1423765c679983a2249fc6e,2023-11-07T02:23:36.233000 CVE-2015-0943,0,0,1e90ebd1c8c26ed9875cd3cb7a8fd3cfa55205b3a44a9560227fb4a9de3ed97d,2015-08-31T17:44:36.893000 CVE-2015-0949,0,0,aa84481e95caf6788a311265c7da647240c0a74fb212421ebbd6bb781fa9c0ff,2020-02-06T15:10:16.530000 -CVE-2015-0950,0,0,c19b88c5ba91ed0628dc5611d21a8cc98f1d80f9b97be9ecf8462c73c4ac5db6,2015-04-06T17:03:06.397000 -CVE-2015-0951,0,0,fe5af4affaecd6f3f17cbc76140880660f86f4565d935965a1d657756a58f5e5,2015-04-06T17:07:21.830000 +CVE-2015-0950,0,1,dd2605586552ed0d917d005f43a7087fee038cabf80f77a98a0d633d37368a8a,2024-11-21T02:24:02.490000 +CVE-2015-0951,0,1,b802888ad034c369f1938c741f586ba005f82710c6527caed1434607ba5bd851,2024-11-21T02:24:02.607000 CVE-2015-0955,0,0,5e860ce724cd9f21f9155d95a893969eba13f13a09ba757bc4cffa5a6d5418ad,2023-11-07T02:23:36.543000 -CVE-2015-0961,0,0,9e893b90e6ac25916ca35a331ed79ce6029c37ddc08e9e9a082d65bf3c14a4da,2015-05-27T13:54:36.710000 -CVE-2015-0962,0,0,ccff5ce7b754e861552869e94d6770f8ecc7d7ddbcff798e0c5c8f4a4c45b576,2015-05-27T13:58:43.973000 -CVE-2015-0967,0,0,364191a139326ab4bde9ffdb4028225ad4cc45d5aaf525848e6a83a1c52db74a,2015-04-20T17:42:39.160000 -CVE-2015-0968,0,0,6d44b2afd7204f5c76bf43a64b774ba683c1d334f63de365150cd920190a84e5,2015-04-20T17:44:42.970000 -CVE-2015-0969,0,0,98a698159207b459a01c1c68618daf4c818febd68fd91bb81989c3b302cdd634,2015-04-20T17:45:42.577000 -CVE-2015-0970,0,0,8acab781ba8956dc0da47639ab5844d9a863a603c524e26ca5728a588e8126c7,2019-09-27T16:44:28.233000 -CVE-2015-0971,0,0,fe1ad42b256a586c6c7695e21f0ec0e2da11a1b53f584460eba8191e6bc180e3,2015-05-15T15:13:25.893000 +CVE-2015-0961,0,1,a1b3a1018ef2002874250407312a7d1dba0e16efdfc2b5f37a61799f75fbdba6,2024-11-21T02:24:02.750000 +CVE-2015-0962,0,1,e2cac74b432f437af4577c6dbb06d5a0e8eb1eb39a4b409b02d46cdb559181a4,2024-11-21T02:24:02.870000 +CVE-2015-0967,0,1,6b762a3e4b03e486f2fedcfc8836db2a3fdc5ad1d7221fb70df3bac39908cc68,2024-11-21T02:24:02.987000 +CVE-2015-0968,0,1,4dba708bad7891df4b8a5fb51451831cdbeefa4318172ec24632a0ab934797d9,2024-11-21T02:24:03.107000 +CVE-2015-0969,0,1,a148495d45820e5292347843914b46b3351cd53793df1f2e46a5729d87ca27b5,2024-11-21T02:24:03.223000 +CVE-2015-0970,0,1,246f100452a3041ccd13ef61e15312c05b5f4fc0755c4b4d3cb3e7162a4c228f,2024-11-21T02:24:03.367000 +CVE-2015-0971,0,1,1d5fa57192d4e1629e69bb460613ee0f1cb31a65b2c01dd5f477589ae042dc05,2024-11-21T02:24:03.480000 CVE-2015-0972,0,0,13a4b8c6ef17ab64f1fb0b583479c02c9508b9578186aba569147c4411ed7607,2015-06-24T17:50:23.243000 -CVE-2015-0973,0,0,68eaec9323199d783bace3e5c2615086955fd739151902f1903c1a081de9375d,2024-07-19T14:15:04.343000 +CVE-2015-0973,0,1,ed4b2ad8ab552a08abaa38dede0c3e52ef42584b15b541f6ad9c5fe7d640fb38,2024-11-21T02:24:03.720000 CVE-2015-0974,0,0,258cdcfae939df11916595c4876ef9eaccdc2ba26fd1dea8a6d5276161c32b70,2017-09-12T15:37:58.493000 -CVE-2015-0976,0,0,2459cd195fd89a053ff7217ae74342de6e3b68fd8bae7e138d0af08dc7cf7405,2015-04-03T15:16:34.467000 -CVE-2015-0977,0,0,5944267d3fb952b169bc9eb9bd7b1770691968e29cc26b84f3c43f8b400515a7,2015-02-27T17:41:21.397000 -CVE-2015-0978,0,0,e1ce0f7b4d1b8a4642f0a38c3ea68a49cbafe8498f1001e4997eee5fb0088c73,2015-03-16T18:29:54.637000 -CVE-2015-0979,0,0,5c4878ed8641c02da549d9a7e50dd28cbe3fd8359537cb5f20b28f7e8efbc777,2015-03-16T18:34:25.583000 -CVE-2015-0980,0,0,29cb2a79ba7e073e5af81c67b1dcdc43444a49cb1647d46a1ec6d0258b9801d4,2015-03-16T18:35:17.020000 -CVE-2015-0981,0,0,7b40239ee17f30353ae40ff4f0b027687b98d344db52144b5de0db0136a1f912,2015-03-16T18:35:51.893000 -CVE-2015-0982,0,0,107dcf733ce1107cd8b6ce1092a3c65ae492ad5f283dac14154458c6527869e9,2022-02-02T02:07:38.720000 +CVE-2015-0976,0,1,8b3786fa5837e458e40339dc37502a1ad59f23a11258d03b5d6e28759939f334,2024-11-21T02:24:04.063000 +CVE-2015-0977,0,1,04e474091c0eff920eb8a300846271def1c7ef4b8fa59666d3b0551293c285ff,2024-11-21T02:24:04.217000 +CVE-2015-0978,0,1,fcf35bea12b0d9ccf7066098ff5971b52d120d2b0f688ecd72c15b68ed103258,2024-11-21T02:24:04.333000 +CVE-2015-0979,0,1,5d4eabb8478042824a54b48974e3942f0abe00ca922d7b3cfbf7c3fc2e77e928,2024-11-21T02:24:04.457000 +CVE-2015-0980,0,1,ec28f132d647ecb93a2d02d7e05d159899e95d7a9bc6fbda52549e3d28ff7571,2024-11-21T02:24:04.580000 +CVE-2015-0981,0,1,c6f46f854e8ffec0ac9f016370bae96f8933eef72bb88005acf82b5d42f29a68,2024-11-21T02:24:04.697000 +CVE-2015-0982,0,1,cbabcb84fa74b183f0e70830257cfe5b5e15b25f096033d8cc7d02e1c4d4f20d,2024-11-21T02:24:04.807000 CVE-2015-0983,0,0,f71fb2ee8b01d210caddc69c534354b9671a84fdeeb1f798eca9b1883c6520d3,2023-11-07T02:23:36.893000 -CVE-2015-0984,0,0,b5f2e3a61cc694c264c175dae1ea1fe143bbb4ce2d2b7fb508841b7bf0a58e47,2016-04-06T12:47:05.940000 -CVE-2015-0985,0,0,54ab00edeb9ce302f037edc9ee289838bb7e3b0457a29a5a9cfcefaf47c78e46,2015-03-31T17:10:30.727000 -CVE-2015-0986,0,0,418e13f40710cda3fa31439d44808b8ca28e31cf7d0d48f98c709c6fd17ac48f,2016-12-08T03:07:03.273000 +CVE-2015-0984,0,1,6dddd24fd6f5f0d486c28bdc5274e1c6be2477a616bd75f0dd85c95e1cea46b8,2024-11-21T02:24:04.940000 +CVE-2015-0985,0,1,ca872114d8c3e62d505ac75eb24f0135e4ba8ae2eec0106476ea97956782a3f1,2024-11-21T02:24:05.057000 +CVE-2015-0986,0,1,06ab1f6fc46400dc0433ab74630886779325e2218f5c3df0bb18caa7fadee602,2024-11-21T02:24:05.177000 CVE-2015-0987,0,0,46a53839f86e3e55b82f8bb5ab541fae7096549a7b838602db1f04d19c5e7591,2015-10-07T08:13:09.337000 CVE-2015-0988,0,0,a387c6aaddf9d1c975cf5c4c1d7c5d461cb215a15a56f2cf2c0f04bbce910d07,2015-10-06T23:49:11.530000 CVE-2015-0989,0,0,61eb8f40d91eec0ece9d7f3c7ac69c606418abf90e250192fa0a9323444a679e,2015-06-29T17:11:48.773000 -CVE-2015-0990,0,0,7efaf5735bdd5d957283238dabd7643ee376f5183396390277a9c2a11f4d667f,2015-04-03T15:17:54.550000 -CVE-2015-0991,0,0,6a3576da62a4f6c79fb04d53e247439804ca3f6a52ab68c82b8f0f46eab02478,2015-04-03T15:18:16.283000 -CVE-2015-0992,0,0,f096b6fad20df43791d65f31e8cd9e2719e55c3e3d236011f4339f9365d297f7,2015-04-03T19:28:17.873000 -CVE-2015-0993,0,0,afcf303581236f3eea1370f790c5d3fbbe1c28600c81c0586302ae41735e681d,2015-04-03T19:31:22.627000 -CVE-2015-0994,0,0,fbd4b96723223cddb50917a8f86a27c1b531daa88f0b26ea729afe4c2ee886f3,2015-04-03T19:32:06.957000 -CVE-2015-0995,0,0,5e31c54f90ff965921f8fb3c1ae84baddae8692a980f1a9e5b045564893f8e09,2015-04-03T19:32:31.863000 -CVE-2015-0996,0,0,c42f1c825df074134084cb40131f9f3770368da323e3a2c983a2dfe7b4d6fcfe,2021-05-14T15:24:42.063000 -CVE-2015-0997,0,0,275497a9cd276701962ee3bb964b012b81e254637e5bb5ba6d2b8c5f358ec030,2021-05-14T15:25:03.967000 -CVE-2015-0998,0,0,15de91169d1fdb168d543a7e98b83b180dc535577829ce9ea6288796e79af5c5,2021-05-14T15:24:55.217000 -CVE-2015-0999,0,0,d505152a6bd92ff42ccc7a5496c9d81ac989d5de7829c4c7e7c556bf2fc1d704,2021-05-14T15:23:43.047000 +CVE-2015-0990,0,1,701393491406c315f4d13026b9e18e56c1139ecdf1ec682449707a1fcd4d026c,2024-11-21T02:24:05.640000 +CVE-2015-0991,0,1,b60927a03d72deaff6a81a80923ce7fae717741cf17a013612657a6f3ae97c68,2024-11-21T02:24:05.757000 +CVE-2015-0992,0,1,5bfb2b924e8f47e07e813390807e26fd85fd98c845854243c2656e866b6be0b5,2024-11-21T02:24:05.870000 +CVE-2015-0993,0,1,2f355d3e7c66326e1673bb5d2d064e3bb7408b5193af8b5be653f5ff8bb6cc60,2024-11-21T02:24:05.983000 +CVE-2015-0994,0,1,396ef050119e9fca6aae0cf98faa64f73c0629807772890460c703b0070e7dcb,2024-11-21T02:24:06.087000 +CVE-2015-0995,0,1,a2c57fda918b532c2c6e0d20320ca2b26775a5c48c322dba380b1264eb0a467e,2024-11-21T02:24:06.197000 +CVE-2015-0996,0,1,92f135e79ad08f70eb9b9ace3a2c4ab4cb9a6b05b3bbcacfe7df1cdaf5f47037,2024-11-21T02:24:06.317000 +CVE-2015-0997,0,1,2221f48d5d81813eacb545de4e9e6e8eefc30656d7d8f9c31940f584d8d6c93c,2024-11-21T02:24:06.437000 +CVE-2015-0998,0,1,940186b37019fcff385f88cca7f7c1a0121bd6016422a1829f7863b01b6db609,2024-11-21T02:24:06.567000 +CVE-2015-0999,0,1,e1138ac5a345acbdf9f645329ab3b6619200b3babe91d253e19c9e01869bfa7e,2024-11-21T02:24:06.687000 CVE-2015-1000,0,0,331eecdd206bde2b1fe99c458afaf889b059b7defb567e935efaee8d92407a93,2016-11-28T19:17:12.800000 CVE-2015-1000000,0,0,e2a22bb3b1ca6b400038cfafd3b6dd2ec26da7c8a367a0272263bf38103b0419,2016-10-27T01:59:04.507000 CVE-2015-1000001,0,0,afb3eea23a488c11fbf7776218d7cdd7a259de58d67c3cd167a57b1b290e3d69,2017-03-07T02:59:00.283000 @@ -74515,7 +74515,7 @@ CVE-2015-10076,0,0,9210c897602e39c391ea874a147bdef95a967a819084b30a29e788ef85b24 CVE-2015-10077,0,0,5d91af8d4827c848932124816258c1623ae1606b679f16cb85bfcaf3364f47e9,2024-05-17T01:03:05.287000 CVE-2015-10078,0,0,5fcaf94d2f436cc6ec055ee9e00c828c2d8088bf92296e21dc50788dff88f8b0,2024-05-17T01:03:05.413000 CVE-2015-10079,0,0,a0bdeb4d2ef1d100fa0ab7e83dd6ce2b8b8f77534775cdb981229fb5fcbebf50,2024-05-17T01:03:05.530000 -CVE-2015-1008,0,0,34b3e69e5bdc1ca51db748e4c896043dc3adb9f1e66408038b56a9f9a06d6ba4,2016-04-06T12:47:24.647000 +CVE-2015-1008,0,1,79983faf5d48342c7a8bac1fb1bf12edf90a261a21c19315096ef6ca2aed9ef0,2024-11-21T02:24:29.023000 CVE-2015-10080,0,0,00d2ddf2f6b05ed9b84b7353e395ad1270d55f7f79d9a26cfd60bd2ec303defd,2024-05-17T01:03:05.653000 CVE-2015-10081,0,0,4ea6481bb1c399ed9cceb644448c617e11399b4b3779c636309e00853a05f262,2024-05-17T01:03:05.760000 CVE-2015-10082,0,0,900e17178b138d8306b3a3ab30034f716f990a1a216a824d4092b4bbaf2c0e12,2024-05-17T01:03:05.867000 @@ -74570,235 +74570,235 @@ CVE-2015-10126,0,0,d24af66aadadb4085b0d2afc1199dd82ac17e76530b08ff8cd8404f802025 CVE-2015-10127,0,0,17396c3f601bd23f598555b22f52e8970c7d6aa16bdc9aead2d94bfc45a21654,2024-05-17T01:03:11.270000 CVE-2015-10128,0,0,4b74dfcf8e85f238f51237454ee18515e6ae2b98227228e8467ca7c351e5d2c6,2024-05-17T01:03:11.390000 CVE-2015-10129,0,0,c9d9f4e076bc772ffe885930800ddd04d615cd389a403650fb0301e93747ba28,2024-06-26T16:15:10.157000 -CVE-2015-1013,0,0,f5248af7fe7f4b3ec39461ec99a46f8b2729b6a18062858ad761109a07b13073,2015-05-27T16:44:25.970000 +CVE-2015-1013,0,1,d45771018032cf1fa277df500fa7e8ca151da16cf87de53fdf5c8d4af1962234,2024-11-21T02:24:29.620000 CVE-2015-10130,0,0,b904691d0113f88020e47d45faaa89fb435f722f5a50e7c83f331d7dab1b3355,2024-03-13T12:33:51.697000 CVE-2015-10131,0,0,6fa196f3deb151bb6f53db5764d2c4ac10b2246c44c7ed49902b754778cc4f6d,2024-05-17T01:03:11.663000 CVE-2015-10132,0,0,898352d17c2a031a63216c67017f475c45b63f55727866a07f2542402b3978e4,2024-06-04T19:16:53.743000 CVE-2015-1014,0,0,a34c5b2605613c49da4312e27a8fb757ad156faac8c85a1bbac03872fc6bf5ce,2019-10-09T23:13:03.937000 CVE-2015-1015,0,0,f6baeb83e33413e410ad8da49b1ff6834287b336cd15468838eab3dc4ab58957,2015-10-06T23:49:39.873000 -CVE-2015-1026,0,0,5ed402b4dc2b22e17ca9b47c7a34242f21a4f76355a0909f050e4d5281b39038,2018-10-09T19:55:41.077000 +CVE-2015-1026,0,1,b7d23f9b55b5a79326f127929d53150789dff01aa4aadeacdeb78ef39180be4f,2024-11-21T02:24:30 CVE-2015-1027,0,0,4da8c8342af741a05efa0f6fb80b4c80eae5f311938c9f4267a370c462dcf41b,2017-10-10T11:56:09.433000 -CVE-2015-1028,0,0,0f9ef98867f210fdb01d4faab1c67f44594c93b478a00c6bea1aaec085863bc7,2023-04-26T19:27:52.350000 -CVE-2015-1029,0,0,1c09fe24d29eb3912f3c446d5ce9ea2437522b6f76eaec62c8b6c4fb323c3402,2019-07-11T13:44:52.067000 -CVE-2015-1030,0,0,5817beb69b3bf10039422cc5c0f4864575a8f8931f4026e4f40657cfc2c2400e,2015-02-04T05:17:31.017000 -CVE-2015-1031,0,0,d75edc8b980273137df5692f1b718adeaa09ae35571ed3bf0a6a687a1c7c3aa2,2015-03-04T19:10:17.720000 -CVE-2015-1032,0,0,afaad7ef21a9ea0ba0e27e47ce07e14144c5529dfefc0a1f3b548d72bc988021,2018-10-09T19:55:41.280000 -CVE-2015-1038,0,0,70961525cf97412d1003531782bf606d36bb01f1f5ffba1b605a6dba61bb460c,2017-09-08T01:29:46.873000 -CVE-2015-1039,0,0,3b51835047851342ac80eeabecfba4791c82de6dcf5c34aebfbf6b046c137647,2015-01-15T22:45:10.183000 -CVE-2015-1040,0,0,b4be4bc4fe9d9d7832103dbee0cbcbd05debf2d118eb6d09ed82af2ce49f1a4a,2015-01-15T22:46:19.107000 -CVE-2015-1041,0,0,deccc05db81d6a3d28547f1a241eb4e28053e761579241c098ff0c3e3dd2c044,2017-09-08T01:29:46.933000 -CVE-2015-1042,0,0,14850f1d61d35ac3d48bbe903acdc55386223a87c608f33c0e3f13c28c762f09,2021-01-12T18:05:59.507000 -CVE-2015-1043,0,0,d5c7a0e1e22e37c58bd07bbf1b4d540f2d1fe50b370c1d279a06163fd26e7427,2017-09-08T01:29:47.013000 -CVE-2015-1044,0,0,0ef1597b04e76409b45aca61a2cff553958b4061fb3016bd584dc3ab1a6b48e7,2017-09-08T01:29:47.077000 +CVE-2015-1028,0,1,f70c3542286c3cd8016ccd2e48c4ba272067b334e708adce69d4a41abb625007,2024-11-21T02:24:30.293000 +CVE-2015-1029,0,1,0d1e19bb8ed4d9e5a6e947aab2d5467a6335bf52059212f9167c9c47b96ac3ab,2024-11-21T02:24:30.460000 +CVE-2015-1030,0,1,b096b94dd815d8833678c2b3d36a267ab529e9c11f9aac9882d51a6423b3cee8,2024-11-21T02:24:30.613000 +CVE-2015-1031,0,1,1ec2e910a6280c185db0052f4e634e3e1d047ffacbf302af417dec9cd51ebff0,2024-11-21T02:24:30.753000 +CVE-2015-1032,0,1,9f9178e43db08e9c495349e488004e53ef0fd97f777d46393d6bd25af2f4f769,2024-11-21T02:24:30.917000 +CVE-2015-1038,0,1,1525b6cb5c2a881f7f9981d221d97b18d08dc246267734b403aa82d2f93b24d2,2024-11-21T02:24:31.063000 +CVE-2015-1039,0,1,32a00b42f64309d806ff4db84d4f97afded4e6331f5845e8919d6b81dba0a018,2024-11-21T02:24:31.233000 +CVE-2015-1040,0,1,faa4a4b40fe5d24eb0bf62a9419b882994f4bf8d9a0a099986208a9ac5ee3ba2,2024-11-21T02:24:31.390000 +CVE-2015-1041,0,1,ba81038027927167b6a43a53cbbf7ff9445563981cc8268ca72e3d1596101ce9,2024-11-21T02:24:31.567000 +CVE-2015-1042,0,1,4d207ee548fd077ce33eb9285b880822328633cf33d85c6b13cdd82a14abcd69,2024-11-21T02:24:31.740000 +CVE-2015-1043,0,1,bca00b8bcb111bb08912dbc96508f32435df9f44bab5e83a44bcf48dab391c7f,2024-11-21T02:24:31.897000 +CVE-2015-1044,0,1,707bb25959b2cd31929894efc8a1d9201fcd4017e784adfaffd16ed935f2ee13,2024-11-21T02:24:32.060000 CVE-2015-1045,0,0,814e7317eccf3e8be81be3c7d21cb8d58e18b2d63ad83afa23a17646255ff1d9,2023-11-07T02:24:02.907000 CVE-2015-1046,0,0,98c7715d7012c435bf70426ad171977de645f5851c0b2018a083437a56652ca2,2023-11-07T02:24:03.147000 CVE-2015-1047,0,0,8ed440f46c8b6bb6570a5de5c20621955fc697b6b2614b34069262de664d428f,2018-08-12T01:29:00.293000 -CVE-2015-1048,0,0,7d14e13d5c22d9b14ef8f2349d3473f8bf6c3167ee80db723926afce9d177719,2020-02-10T15:15:19.653000 -CVE-2015-1049,0,0,794626c83bde61de18e0174d6f9c9dfebbc27ec8d2a2bf80d7794dc811b8ad32,2020-02-10T14:15:12.063000 -CVE-2015-1050,0,0,eab38cc5453459a718244f71d42d5dfea81ca3213bffe8e264e1aefc04e1407e,2018-10-09T19:55:41.607000 -CVE-2015-1051,0,0,7ccd4742e91e254ab701917f1eb7e124f4bbbe07288648f4d324ff9476460a69,2016-08-23T17:28:46.477000 -CVE-2015-1052,0,0,a86e0291c95a3ddc1a318f02578a15b3eca178c991859db6d3518c675ea5a0cf,2015-01-15T22:47:42.763000 -CVE-2015-1053,0,0,f056cb9941a16b3f0052cd470c976798bd57ba86b4e7918c20172dad787bcabe,2017-09-08T01:29:47.183000 -CVE-2015-1054,0,0,b893d163c98468457030c91c99eccaa22c11102735d1a2feda4368ddc697c637,2017-09-08T01:29:47.247000 -CVE-2015-1055,0,0,12595a338156b64910b15c02b1d6cdf3b138b657ea4779b710769bdb2c543ced,2019-07-08T16:23:34.443000 -CVE-2015-1056,0,0,623319585e233ce4607f67f169d45fe76ffef1173a93a63b47fb4aa59d982694,2018-10-09T19:55:42.043000 -CVE-2015-1057,0,0,f3ca9ea365cc0a0c5986b2ca7c76c04f7d4cfa481c14e4ee37fe18593285487e,2017-09-08T01:29:47.373000 -CVE-2015-1058,0,0,fa21ea06a01272bec53cdf715ced8cbaf8d628575ff890d5d9e2f09f46122b78,2017-09-08T01:29:47.420000 -CVE-2015-1059,0,0,2c11a9ca63471cc4d9f867f1669f213beb680c4f3236e3f6c210f12e8aad2408,2017-09-08T01:29:47.480000 -CVE-2015-1060,0,0,9a8bd527d20f101553c9dcf7d1b0d86c60c2769561fe4fb4de65637eeb35d285,2017-09-08T01:29:47.560000 -CVE-2015-1061,0,0,b120a83a60b9b0a958ca91a6dcaa945c05da62c88d039d8279f535fe9f33fc8c,2019-03-08T16:06:31.997000 -CVE-2015-1062,0,0,76c478a7e23057dde5e98f76194a8ae8ad302a14046b7dba8f84c1c1b8860038,2019-03-08T16:06:31.997000 -CVE-2015-1063,0,0,37d62ca018061afd562a9d4076094c9e0acd59fe96d9ced50ab22fd385455f4d,2015-09-11T15:49:45.573000 -CVE-2015-1064,0,0,7979cd8f0f24fd659caec396ea1e422ec31e377ae9f8e223e5b57e8dff8c7052,2015-09-11T15:48:52.670000 -CVE-2015-1065,0,0,74b12892b8b98e1124cb9fb2a0db875d36fd53b6f88f47c9b2d74eef6aa8f09b,2016-12-08T03:07:05.977000 -CVE-2015-1066,0,0,6f67bb3f219ef13cff6da68b60abf18423c42cff5d344a3e5689cbe6d38b39cf,2015-09-11T15:51:19.727000 -CVE-2015-1067,0,0,fdb98705269cb21d7dc03162ca27cd3c5321ffdddc95479ab1b9fed644efac29,2019-03-08T16:06:31.997000 -CVE-2015-1068,0,0,a3b6c31d860a055cde2f9816bfa9a8250f3379a2ad3c0964f4d233b955bb28d1,2019-03-08T16:06:32.170000 -CVE-2015-1069,0,0,b76e4aee7912dea147688319c8e5c6a8696d0c05aaa5151f9ab4181a7d22c841,2019-03-08T16:06:32.170000 -CVE-2015-1070,0,0,daaafe0c0a2f55ff50245c09ab14d521fa6cd7306772b07a8d3527e0888f1860,2019-03-08T16:06:32.170000 -CVE-2015-1071,0,0,0ae78b6777ca33f7b4d59e1179aa3ffcb29ede5b449a19cae89891bd8ab9952b,2019-03-08T16:06:32.170000 -CVE-2015-1072,0,0,28f0e3be4328aebca2694f6cc02f0e7bef728840d3d3a7a6ba8ad35179a7dc01,2019-03-08T16:06:32.170000 -CVE-2015-1073,0,0,1fbd88df7a25eb391300474a215884d0facc8b5b58358704bbb9f9bdc25e5237,2019-03-08T16:06:32.170000 -CVE-2015-1074,0,0,536fd7c38bfb12203f5c18557e736e3a52e11c676ca6726a1ff41739f2753e30,2019-03-08T16:06:32.170000 -CVE-2015-1075,0,0,a73b46e705db41d28fff3b7499530f9402d67b9b14fd6191708aee63962d617f,2015-07-28T15:16:33.053000 -CVE-2015-1076,0,0,ed44eee024c4c30f0f6a96b144d9e42eab15a7dc60696810475015c547433c37,2019-03-08T16:06:32.170000 -CVE-2015-1077,0,0,0deb0ec4d124670faa131d3b578188c66bed726cd6ec7a66c3525d1bda609935,2019-03-08T16:06:32.170000 -CVE-2015-1078,0,0,aaad8de4e60f7dbdc5e43bd0ece52da1578cd0649e8f7b21bc994b49f272289e,2019-03-08T16:06:32.170000 -CVE-2015-1079,0,0,5652f7f239145ef9927df2ae16823a825d8ff5ba409908441be4046ddacef05b,2019-03-08T16:06:32.170000 -CVE-2015-1080,0,0,3e6b6a68ed7d86a96f9d894ec20ef9f300d12014a9f1f2a882a3cf8edf103302,2019-03-08T16:06:32.170000 -CVE-2015-1081,0,0,e377d42d85e3c437435b10bb91c7eba710b2a722c150aaede64a54f74a9adc31,2019-03-08T16:06:32.170000 -CVE-2015-1082,0,0,d941052951290c1579a8cb79310cdd38e5e42b319e7c99ce4f159b3b0a65b539,2019-03-08T16:06:32.170000 -CVE-2015-1083,0,0,8e7eb287f9b01e6196ce50ae2954ecd9f74b3940b0313a0425e57f2bfeadbfd0,2019-03-08T16:06:32.170000 -CVE-2015-1084,0,0,8d2c8498c7f38863c23694701298434da7a8ee8c072fee30e69a92eca7e19e9b,2015-09-30T17:39:28.537000 -CVE-2015-1085,0,0,c5a087216f29876ed981e365e51256fb6f92fbc607c18dac36991c85702a3d94,2017-01-03T02:59:43.973000 -CVE-2015-1086,0,0,d5d9faabae37ba4cd8ed7407c6a2b47ac866fe8e522071a5274ddb9d31999764,2019-03-08T16:06:32.170000 -CVE-2015-1087,0,0,818cb70c87f7794efdb545b70ef1a74a0ed8b73054466a182c0c4988175b7c56,2017-01-03T02:59:44.020000 -CVE-2015-1088,0,0,90e91a082f579831d98a78ac09dbdad8057b2f55fa09f371e2bf23ebae8408ea,2017-01-03T02:59:44.083000 -CVE-2015-1089,0,0,c03690ec5b90a7c50479211b80ae54fa1b47cc836bf59295dfd56e781338ac5b,2017-01-03T02:59:44.147000 -CVE-2015-1090,0,0,f3b9a6dd447b4917381d93e7b98fd9ff913895aeed10c229f418574da3007ebb,2017-01-03T02:59:44.207000 -CVE-2015-1091,0,0,d508262316f37a765340bebe55c51ed9408c41edcb30d8462e1bfe90545e4b5c,2017-01-03T02:59:44.257000 -CVE-2015-1092,0,0,05c7a2d115e6a2ad7f5377879d859180cf64248d64cbb4155e4866613b117f12,2019-03-08T16:06:32.170000 -CVE-2015-1093,0,0,c322fdc42025e26586f0df4a2c3c144838fd6394d90a5c4a0f62791332089766,2019-01-31T19:11:18.410000 -CVE-2015-1094,0,0,c21d1b64a48ffa07031331f93484c7535d4eb9a6363ba4786b5b23ed97ea97ac,2019-03-08T16:06:32.170000 -CVE-2015-1095,0,0,bd015c44db57a0e576e6165938d2196ab4978b25dc663b821ca4ebab438d0fb0,2019-03-08T16:06:32.170000 -CVE-2015-1096,0,0,86f840e79f585daa83fb6567d5e5a8afd289ab4b4233db238e474e1f16dfb2ca,2019-03-08T16:06:32.170000 -CVE-2015-1097,0,0,f6511e198f8f85333815f5bce2c982b539b83f736edb360beb90910a538ecd64,2019-03-08T16:06:32.170000 -CVE-2015-1098,0,0,9af0d327d4c365a430597a27a3a87ab95583c9586bb831985183f387e0969b70,2019-09-27T18:42:26.707000 -CVE-2015-1099,0,0,275b2e2d1100ece23b90fb501e4150e867875f95623e66619f2060044dcff9c4,2019-03-08T16:06:32.170000 -CVE-2015-1100,0,0,8fa407e6a331379da9bdb0ffdc422101494b1361b7e5b7f6dfd1016500191855,2019-03-08T16:06:32.170000 -CVE-2015-1101,0,0,d73b6c04bc8c94659027117ef27f26d1bef22b73cf4e6544a8b0e0400e87ad58,2019-03-08T16:06:32.170000 -CVE-2015-1102,0,0,06b1797a61415ab7342f1da12cff0f8d9bed0a94ef76693628a003d7f11d6f95,2019-03-08T16:06:32.170000 -CVE-2015-1103,0,0,c4b87e8e83943042b7769cc0d1ee1c5af835156ba428c6f39bae42c665af088d,2019-03-08T16:06:32.170000 -CVE-2015-1104,0,0,a7f6dafbeec289f61e63e5e0ce112ce0c6724596e4860bfd809c7c2a67923e6e,2019-03-08T16:06:32.170000 -CVE-2015-1105,0,0,c0b3a1daff8d48834b54570fc8a15348269e35aace64dc942ccf390f0c84a8bb,2019-03-08T16:06:32.170000 -CVE-2015-1106,0,0,6f1908139ed6223777ab2108fff67515c0e2caa735eb2edca25b26e69b522691,2017-01-03T02:59:44.613000 -CVE-2015-1107,0,0,67b75208e600e8d67ed1c4db2a0038f9ad88f4728c0ece7c91c113b0db07f936,2017-01-03T02:59:44.770000 -CVE-2015-1108,0,0,622644842b8851ede255c00fc49dca099dd53bc38b6a48be7ac0c1b0984e3568,2017-01-03T02:59:44.990000 -CVE-2015-1109,0,0,3fd2cc1078f7c2010cc476dac27e7d597f133a412ca6e8ff5b0a1ba7411c3049,2017-01-03T02:59:45.053000 -CVE-2015-1110,0,0,cc3730a59c00013036f919135444b1af92a3d5ff72b7da27a9dee4ae0ef4fd0c,2019-03-08T16:06:32.170000 -CVE-2015-1111,0,0,b676a54772d4138bcf3dde62b41dea7ce9d1248228b4f390945f6ff964386a4b,2017-01-03T02:59:45.160000 -CVE-2015-1112,0,0,01f3cf534f50cd5a83d3775cdcc8e0340be78d90ae1be3eaad11c29efa625fa3,2015-11-30T19:48:37.803000 -CVE-2015-1113,0,0,70ea03ffcbd04fe8ec50b48b626b2f711dffb8878420b573805060840707773b,2017-01-03T02:59:45.223000 -CVE-2015-1114,0,0,44f9c2f1708af1f15f76b1ab135543aabb56e9908e6c3936f343ef1f0b29a0e5,2019-03-08T16:06:32.170000 -CVE-2015-1115,0,0,4ce3987ac30ae8b5acde4ea9a42e81b90a3c6cf5d9a78990dddee6f835d5e276,2017-01-03T02:59:45.333000 -CVE-2015-1116,0,0,0a1fa354a31055ec84f35f411c1203b3a7104151386b3d624c1634363b30aa93,2017-01-03T02:59:45.380000 -CVE-2015-1117,0,0,7bc90b37b6b368b402c51167315ca20826d84f3e3a4c3ff6f248da13e4b4206e,2019-03-08T16:06:32.170000 -CVE-2015-1118,0,0,3a0b2cb5ef036e0873a31772c7d073299c03dc474511418550b62476063351d1,2019-03-08T16:06:32.170000 -CVE-2015-1119,0,0,e217c47fafdd030842eaa4a28fc5ab599780059661feae82db1446905b095aec,2019-03-08T16:06:32.170000 -CVE-2015-1120,0,0,519d2e53126f344fc2be7fc15a8588928024273f5124647c38fff28478bbe716,2019-03-08T16:06:32.170000 -CVE-2015-1121,0,0,b0fffde6ae46d680f0ad03b0d9bdb9492b36c865b0372b058d1b3b2f75d5fcf3,2019-03-08T16:06:32.170000 -CVE-2015-1122,0,0,9e2b68db22b2c132e5627ce5ddd69bdfd6a508d537e8b3f168a7099183536265,2019-03-08T16:06:32.170000 -CVE-2015-1123,0,0,07ab4bc99931bae2e937a9697a956a70fbbb705b4023067814deb44f6c3dc128,2019-03-08T16:06:32.170000 -CVE-2015-1124,0,0,4584ac2cb54a71889e57888a1369e6b6373c3543decd55c257c8814a1624986c,2019-03-08T16:06:32.170000 -CVE-2015-1125,0,0,6971d683e844b0889b41aaf2ea16d5dae42e2e0fc0258a2cf34a1d1a36f09d22,2015-09-11T17:57:13.817000 -CVE-2015-1126,0,0,4f4bff0f45d3ae9ae208f616f04a69d1695f99cdf96766b6b19c323c6e16c813,2015-09-11T17:57:26.173000 -CVE-2015-1127,0,0,4079589051803d316e3682a4e5b72579610b4a9fb53b1415d2e2711f5dc45bd7,2016-12-03T03:03:05.743000 -CVE-2015-1128,0,0,fa2bea1d49e86ccaad36eee6396618a41a19b20046bdec23632530689e60ad59,2015-09-11T17:58:20.630000 -CVE-2015-1129,0,0,4d71e58f5b94c66ea9197aef58147f05690fc1053c0c51aa6fa91d245a15e7f3,2015-09-29T19:27:12.043000 -CVE-2015-1130,0,0,d0a74a6bd38a597de3396c9caf2ce415243d26a8aa8c92a326162ba035a65f83,2015-09-17T17:41:02.383000 -CVE-2015-1131,0,0,91f439059005a0015edf75a43f7877d90d9215b7349195bab6fd8126947e9633,2019-01-31T19:44:24.643000 -CVE-2015-1132,0,0,30d560bb558dc5b2aa1252b71a88bb33b4d5393bea994f3c52fc87d5d65d5a05,2019-01-31T19:45:07.943000 -CVE-2015-1133,0,0,ca94cbcdfb0e19f7ad50a73b1ea90c02f5fb29dd32c41a072a85e8cc34ca5f8e,2019-01-31T19:45:24.660000 -CVE-2015-1134,0,0,2dae08d9ab24c924a5deca91b9de1e85d0b162db3a776c47d381dbeb2b305f90,2019-01-31T19:45:40.270000 -CVE-2015-1135,0,0,87860b723b9956b17f04e0da2ecda2dbc6a839c19a78716dc715263fa0614692,2019-01-31T19:46:01.913000 -CVE-2015-1136,0,0,2e0cf457ae8ec4910ffd687fbe35c334464039eb7760e2ffb475e381eee3261c,2019-01-31T19:46:14.257000 -CVE-2015-1137,0,0,6ece353b4c0dafe6d2add021cbb3c63fc0c5c81039379c4d55dbaf9a8dea0612,2019-01-31T19:48:15.007000 -CVE-2015-1138,0,0,df05b258e5f98fea636c41d17644c94993864c78cfa8ab2dbe6659c57c24c41b,2015-09-17T17:47:15.977000 -CVE-2015-1139,0,0,433f0da0750615249101b18e2ef831b2b21643a69d70e6d20de3f6c7c5037d95,2019-01-31T19:48:39.307000 -CVE-2015-1140,0,0,8fe9cbc8c20722626bba10316755e00fa5aacf413bdcbaf2a15fe963532617eb,2019-01-31T19:39:20.263000 -CVE-2015-1141,0,0,eb3a586dc8b6fedd4803a33394a9848adc603cc27c078b3e2de57692a93bcc70,2015-09-17T18:39:24.187000 -CVE-2015-1142,0,0,0eaa6a62e70905fb38f67a67de46a200a05b372b6a122190f8796d442f440444,2015-09-17T18:39:47.717000 +CVE-2015-1048,0,1,be161248c2ea773362dd2ebcdfdc7e01949678daa272b0145a7a2c5302a6e125,2024-11-21T02:24:32.427000 +CVE-2015-1049,0,1,c43da9a9cab778e345c401c4f3cb682c7ac430ed7485665c8049237e92096ca5,2024-11-21T02:24:32.573000 +CVE-2015-1050,0,1,a7a6593fc70e723ef8ab72863e4835b09e89c938204fd1b98f03db78262ff59c,2024-11-21T02:24:32.750000 +CVE-2015-1051,0,1,70d774372a89f84d2b583161e5728dbd95e595295301687ba5c32a6549528f6b,2024-11-21T02:24:32.910000 +CVE-2015-1052,0,1,34223a3e3c3c8ee03f0950d4cf043219e48b19f4b4aec01d6514b65107310d13,2024-11-21T02:24:33.077000 +CVE-2015-1053,0,1,1f917ed87dfcdc92566e2c37fe56bfe8f508be2b4c7e2191a70179929b049f9c,2024-11-21T02:24:33.230000 +CVE-2015-1054,0,1,d4d78c4219f3002af13f594c2f8eda9f1bab908fc671d4a7ea125c2778539397,2024-11-21T02:24:33.397000 +CVE-2015-1055,0,1,0ce25276cc6493cfa13e207084e88b16727b7bba978f74bffe0c77c3205a158c,2024-11-21T02:24:33.553000 +CVE-2015-1056,0,1,1c214075a7e0d6cdf9f86c248987800b75acaf3bf0d4a811f20c695dd1155b6a,2024-11-21T02:24:33.710000 +CVE-2015-1057,0,1,1e717c1a85a4422d56b3789518efdbbcd878a9f0b66f151fd58982f8a23cdc8c,2024-11-21T02:24:33.870000 +CVE-2015-1058,0,1,05c0b5561c3e132c7f75496a3f5d077e2082e9bf27f8a5e004466b2ac3169c78,2024-11-21T02:24:34.030000 +CVE-2015-1059,0,1,e111217342c629d02deabf33bbf1f7e8f7a6758e97a792797cafe9196648c159,2024-11-21T02:24:34.217000 +CVE-2015-1060,0,1,79f54b1ef2e384196eabed76430a68b0a9a3545cf5c86b27d2993ce20d0707d5,2024-11-21T02:24:34.373000 +CVE-2015-1061,0,1,6d24595523a304d8348ef1321dc08f6c547d3b07e76cac79911c423620282355,2024-11-21T02:24:34.540000 +CVE-2015-1062,0,1,c7f221f84b770a796e2468bc4fa616cdd79e048b76f7779fbc9dd2dd1c0f1ae9,2024-11-21T02:24:34.740000 +CVE-2015-1063,0,1,45accc3fcfd48ee1584fcc3a02ae493eb6bdd76af27066b85bdbafe29724f25c,2024-11-21T02:24:34.900000 +CVE-2015-1064,0,1,9091089a5ca40aab97cfc10d9d07dc55df7b14d3594513b2dfe91d2fb9f3895c,2024-11-21T02:24:35.053000 +CVE-2015-1065,0,1,27937124386c6ef47db241880736dbf947e54dac67929bd1240ff65ac0adcc54,2024-11-21T02:24:35.200000 +CVE-2015-1066,0,1,d3e891c1081747ce4bdfd2ae5c249eafb05f8276400a7d8ad03b263a371bffb6,2024-11-21T02:24:35.360000 +CVE-2015-1067,0,1,c6abf579fede72717c93ba5eaf5f80475660e0527d8e994f4a4672266f8b1118,2024-11-21T02:24:35.490000 +CVE-2015-1068,0,1,f487d65621905d9a42a151d1c7886006077bc41599d7cfdd878d24c245ad8fe6,2024-11-21T02:24:35.660000 +CVE-2015-1069,0,1,10949dab0c99d677dd47e8942c20df7712e0cbc12b416d01e24d3e70b321756c,2024-11-21T02:24:35.843000 +CVE-2015-1070,0,1,a8f5cd0d01414ad4b4dbb1fddf90a0537ef268e4f7ce52b60af5976f87a45ddb,2024-11-21T02:24:36.013000 +CVE-2015-1071,0,1,382cd87547ddc57c74fb38077ab92c184d1b250bf270f5dd632f27fd5ba55093,2024-11-21T02:24:36.153000 +CVE-2015-1072,0,1,37f676925d1ff805e3146e00cc89cdbbc760800d225cbec5554ed53209130c15,2024-11-21T02:24:36.307000 +CVE-2015-1073,0,1,520e8af535ac2ffee6dfd529e05851c6847ce822c08bac124e0e6f6b49f96339,2024-11-21T02:24:36.440000 +CVE-2015-1074,0,1,2a47ca16d9044c64cc825b0714c7be9df86944b892470bcb39eb68b16cbe5c6e,2024-11-21T02:24:36.597000 +CVE-2015-1075,0,1,b2d2aa6f076d37346a45f48cadbe4f67bc41638c8d8fa56e6d03c5025147e4c5,2024-11-21T02:24:36.743000 +CVE-2015-1076,0,1,c0f8f409b61a55374cbaae5084df79780684c4d6f59f66d4d7f73d34c54fc917,2024-11-21T02:24:36.873000 +CVE-2015-1077,0,1,3f4eedaf5fed6c07557028362b1d3052118299a1abce1aa7df12c2b669053e38,2024-11-21T02:24:37.023000 +CVE-2015-1078,0,1,77ac4eac8eed6c16320e465788a6e82a355246fc71a7d977885ba822afd9d2a0,2024-11-21T02:24:37.190000 +CVE-2015-1079,0,1,9a4a421fead0cc4b30b726f9df37f0cbaec8a3ffcf734ebeead9ec4c68e690b4,2024-11-21T02:24:37.343000 +CVE-2015-1080,0,1,1870a42f7ea3df19201aabe94833d2365147d44f49b18c1d0324c90898a07ab8,2024-11-21T02:24:37.487000 +CVE-2015-1081,0,1,cddd38a71562f5b6cbcac423b791aad588a833994f7c43d081fecdafa7c98341,2024-11-21T02:24:37.627000 +CVE-2015-1082,0,1,712a47540df96499d4cad1001dca5d7898d7be977c157a221af98af19e60743b,2024-11-21T02:24:37.773000 +CVE-2015-1083,0,1,f8f67e4b70b30929675096bb412bdf00ddf3214d45ddc60a88088c3af522d1a2,2024-11-21T02:24:37.910000 +CVE-2015-1084,0,1,bd3d5451afa938fbe662a8bec43c335696f77540fc16ba378a5eda5103085118,2024-11-21T02:24:38.047000 +CVE-2015-1085,0,1,c16c26a18f24fa709d3e2c79639e16f34c57acc4db64eb87be547edc4084cef8,2024-11-21T02:24:38.180000 +CVE-2015-1086,0,1,0ade18b4f76c6311346fe4cccb5197cb9cf4039b0f7676be523a72e402e00b4e,2024-11-21T02:24:38.313000 +CVE-2015-1087,0,1,217a7168f4d0158612d022131421e8c9554c3bee6114595c45bb2acd899fef82,2024-11-21T02:24:38.443000 +CVE-2015-1088,0,1,9148bf375eece494f93323b8284bf37807db253d6f4085068b6af54bf4add0c9,2024-11-21T02:24:38.567000 +CVE-2015-1089,0,1,34846c941272fc8c6dbc8969ac0a822c30211f3b2ae986a91ca4d2ed37432263,2024-11-21T02:24:38.693000 +CVE-2015-1090,0,1,0c0f8412b76700eb9493b6a0a8054f56eba73fd88fc35f4eac1aebeb9455e46a,2024-11-21T02:24:38.837000 +CVE-2015-1091,0,1,f8d460e1b21de0091f9033503e1c1e36c02d0ef0d4ce71d54f6f95f60e7afd9a,2024-11-21T02:24:38.960000 +CVE-2015-1092,0,1,5ef334677f9dc1849656883f850d30488ca28bdb8b829e98a68fe3f73e39868b,2024-11-21T02:24:39.093000 +CVE-2015-1093,0,1,a92192c05faeb1d385ac6a5b800b26a6b170fcfccfa314eff9fa08f7b112cc56,2024-11-21T02:24:39.237000 +CVE-2015-1094,0,1,ee584e4ce8b8883468524451f1d3465bc426fa9aa0665b76c619557dfe116c61,2024-11-21T02:24:39.380000 +CVE-2015-1095,0,1,7f5cbded29eb17478fc13506048c704077a059ee3927f92144cb57393fd0824c,2024-11-21T02:24:39.503000 +CVE-2015-1096,0,1,4fe1913a0e3bd7a73619d6407cce02ee87a0e06dedce8391a4c09bc52a64c1d9,2024-11-21T02:24:39.640000 +CVE-2015-1097,0,1,2e79e1d5feafd8c2b90a88bcebb68ea071752f6323622036953a80236f54c6a3,2024-11-21T02:24:39.783000 +CVE-2015-1098,0,1,5816784ff3f2891a1cdd001398872bb9f9a80ea13aeb5869d8b36d45f57c9440,2024-11-21T02:24:39.943000 +CVE-2015-1099,0,1,f51c008bc8722e0587c2d9677d00983e156fddefdf97533507ce63dd65b5de08,2024-11-21T02:24:40.083000 +CVE-2015-1100,0,1,60f88f5355c4226178567f5a08673ad526d948d8ccd431a6a374b3d478341eb5,2024-11-21T02:24:40.220000 +CVE-2015-1101,0,1,1fb600fe1ba64b2f70facd15b39999c776289eee2c7329bd31e71da8364b95c5,2024-11-21T02:24:40.370000 +CVE-2015-1102,0,1,1c09405a7c9467fb9ab1172a7a4322057c14675b5de953b05373e40621e97c18,2024-11-21T02:24:40.513000 +CVE-2015-1103,0,1,e7253f6903c7fbc4fc6df92795de9727b0e7b8fd1c601d2eef3442cdc7d23ed8,2024-11-21T02:24:40.657000 +CVE-2015-1104,0,1,7b288524ff32b716047207821562d8f06808d476dd9cf36bdc29b85601aa70f8,2024-11-21T02:24:40.800000 +CVE-2015-1105,0,1,46f0510b359e6aca60a6a6f17ee1f2093ba4d0e0e1802eb24ac61d80797bf54f,2024-11-21T02:24:40.960000 +CVE-2015-1106,0,1,f0cb14c6465c61433d3dbe5944294ac416cda3ff01915c35af94583352188cde,2024-11-21T02:24:41.107000 +CVE-2015-1107,0,1,dcb02360384fc9066f2364b4b1823f678250573043fb3602b8f8fcdadbec3ce4,2024-11-21T02:24:41.233000 +CVE-2015-1108,0,1,38df3ba23f1d882a30dc4c2095d2ff9fd755580a7cedd7ea3c27b7dadd7ed340,2024-11-21T02:24:41.360000 +CVE-2015-1109,0,1,55bbb779414d89315dbfefb1598cc4fa2c67d980da66a17893e114a7fbfc68e1,2024-11-21T02:24:41.483000 +CVE-2015-1110,0,1,81ff85761d9381fab7259c86a7ba217345e4246bc347ddfb4cd266acedb4ccbd,2024-11-21T02:24:41.597000 +CVE-2015-1111,0,1,615a1e1cc7aa8808bdf3653e0d02f92e5c62f28307da9dcacd4ed3e1798ae4b9,2024-11-21T02:24:41.720000 +CVE-2015-1112,0,1,67462d699be2d0ad3b381877c27f45dcdba9b3ae7e9996bf1a462ebfca7b3607,2024-11-21T02:24:41.840000 +CVE-2015-1113,0,1,55ae8f3e45b1ce624069ebf566279397fd13bc8f8ba42ff65b4f10e5021f19b9,2024-11-21T02:24:41.973000 +CVE-2015-1114,0,1,11017b520ee61017d291970618b6d59ff3f93428ca3a3129bf3fefdd807819b8,2024-11-21T02:24:42.093000 +CVE-2015-1115,0,1,825dd8becdd4ad5ec988dc28f95bf37b857a5e081be684455bc66235a8a1748f,2024-11-21T02:24:42.230000 +CVE-2015-1116,0,1,b6e8ad5f9ead88d3a26de1eb89746b99723939ad4cad77903fd20fb4a2be2658,2024-11-21T02:24:42.353000 +CVE-2015-1117,0,1,96020e15cfca1e2ce3eef18cbd74da0aaddff3f829bcbdfa19e9de831375a8f6,2024-11-21T02:24:42.473000 +CVE-2015-1118,0,1,6c14d9f0a43c9861e601719b467c99f776d6b9dcb1374bc4268995f92cd526a8,2024-11-21T02:24:42.613000 +CVE-2015-1119,0,1,84416336053fc9ba5635d0872130a0420342fe43beca07a35f2aa4d667e4db6d,2024-11-21T02:24:42.777000 +CVE-2015-1120,0,1,432aeba3bd3ebcd9a4e3586bb3349a4f8a522ae6b16c133f8cdc6b8b3415ea65,2024-11-21T02:24:42.940000 +CVE-2015-1121,0,1,41ada90d63410f16b22167d4bce19eaa82b85d816fd5c36d9dd029cf3553de6a,2024-11-21T02:24:43.100000 +CVE-2015-1122,0,1,504b0ca548ca0eddaefb0e7b3278d08f5399a51c895e4d63bba3af0cdc6ca6be,2024-11-21T02:24:43.270000 +CVE-2015-1123,0,1,ea7fb066abcb225d89e27ca21ff5ba843ed9052167a091285880f56f1f821897,2024-11-21T02:24:43.433000 +CVE-2015-1124,0,1,a16f2c45cf5a6f70869a5437638b9f72e90c8deb39c6e845e34a7c482ba8b427,2024-11-21T02:24:43.567000 +CVE-2015-1125,0,1,6152f06395af19b49ced33d3a8f57dfba6a244a01187357ff05fe7906a5436e0,2024-11-21T02:24:43.713000 +CVE-2015-1126,0,1,1609630b6a30ceeff0aade412fc898c20c78fd1db56c7c8aa7e1ffd09c19383b,2024-11-21T02:24:43.833000 +CVE-2015-1127,0,1,abe575f5ef93fb175f52d2c8b2ae3895cdea31cd30c6d28d0679c51ef8a8b811,2024-11-21T02:24:43.977000 +CVE-2015-1128,0,1,a2c83b934e5f65e6623686d4c36ffa68e2150dcee60097addea7f32f8dd0c394,2024-11-21T02:24:44.100000 +CVE-2015-1129,0,1,7f986c7cab7453044694fe1f3023549b5daa0d6c36ed72efe26d2f70c86f61e4,2024-11-21T02:24:44.243000 +CVE-2015-1130,0,1,7ded966bbc51bf07b4075a658e371fffb1d3575a962c587918e9ed9638a60d22,2024-11-21T02:24:44.383000 +CVE-2015-1131,0,1,2f214098f5a7ffc5e03d84e42a7a6708f94d6c7e6d0031edfd7a2e2ec5231dde,2024-11-21T02:24:44.530000 +CVE-2015-1132,0,1,4109b24d1fa9388361a99b5217f25f0a6dc28b042ffae818721b70c68223dc7c,2024-11-21T02:24:44.653000 +CVE-2015-1133,0,1,7a8a965efa31520948f4d2289176346a3bfb241fd071cfc77c4a2768898bf98b,2024-11-21T02:24:44.787000 +CVE-2015-1134,0,1,aff0d9203c10ebd1bdd5e164bca9b680d875e3e964b955caaef9e7d26c9be86b,2024-11-21T02:24:44.927000 +CVE-2015-1135,0,1,0a6fca1550a28874e72fd12d9933ffe4dfb395bdf013dd2b2d621b4637ac68b7,2024-11-21T02:24:45.103000 +CVE-2015-1136,0,1,e76a1c2be1c36bff8b780b73c51ef0b9e5d797400445cf7c61181de02743cef6,2024-11-21T02:24:45.240000 +CVE-2015-1137,0,1,90bfaa9220cfa5577f938757adb575a764627e35715f035fe18a24a2aeda7428,2024-11-21T02:24:45.370000 +CVE-2015-1138,0,1,c4115a1e6861f6ef56fce06de76459582f7940669990be1b49717caa8a20a2f0,2024-11-21T02:24:45.490000 +CVE-2015-1139,0,1,d78ee8803465026b9403c666d5450b2698552c0183caae552d23081ba5ea7ae4,2024-11-21T02:24:45.607000 +CVE-2015-1140,0,1,5702c7c3759cba5294e5cc7d61190925d96b6d1c272c083d1e4b9ca428a38071,2024-11-21T02:24:45.730000 +CVE-2015-1141,0,1,b68f64d202a6dac0c4941d65af714871bf72246a2d81c7e8ae5b0b554f1f10db,2024-11-21T02:24:45.847000 +CVE-2015-1142,0,1,d1e5c60410f9f7fd72235888f9c2a72f6fe71416bf4f0863a90c7890d896b7fa,2024-11-21T02:24:45.957000 CVE-2015-1142857,0,0,20a2a9171a12632127758e02bddf4ac956640fc76533b2628927bf0b58a9ba3c,2018-02-15T17:23:40.853000 -CVE-2015-1143,0,0,e5513f37c2ee2674a273e21f92253818523c5191adea3266d5e4d7b78c65b391,2019-01-31T19:27:57.370000 -CVE-2015-1144,0,0,cc39be1c76e40d0bac2dd5ac551f8c4dea5a9c0b6c40257cf4abacf2367e04ee,2015-09-17T18:42:10.600000 -CVE-2015-1145,0,0,6cbeffa11868ea55371a362e7e7fdd4c07a8a7247e04c052377705491fa1c5e0,2019-01-31T19:27:08.777000 -CVE-2015-1146,0,0,da3249f9a4120250abdbbb27907500dfec15f3e3502eacb3ebcebf07b10a8301,2019-01-31T19:25:56.087000 -CVE-2015-1147,0,0,a3929891a63ca17091d7bd2cff9394f5ad14ba6b18e16223217877b2f0c20c41,2019-01-31T19:24:26.630000 -CVE-2015-1148,0,0,f6cf1f28021e2b56fe1ae47b59dea1093b09dffe540ddd14677356a55de7869d,2015-09-17T18:43:13.020000 -CVE-2015-1149,0,0,20846892de23a281009d4c1d90aaef28fcaddec7d13bce3cb6c08cea3e225e0e,2015-09-11T17:58:43.063000 -CVE-2015-1150,0,0,fe35804c7db5fca36dac0264b31e0521bbacad68c47be1782298779e6bad1b09,2016-04-01T01:05:29.750000 -CVE-2015-1151,0,0,3c5d0126ded460fa5e3b94b0d8161e34b74d0927822754a304ff623826c2f707,2016-04-01T01:05:40.783000 -CVE-2015-1152,0,0,0b542d116cc86c4af09e39ed4c2980c49f85f06b7ea7985b2869046bb0b4525d,2016-12-03T03:03:06.900000 -CVE-2015-1153,0,0,ba995e6299b4de587eb395425179a55e9c941f0c05da89fcb3ef761c1593ed93,2016-12-03T03:03:08.040000 -CVE-2015-1154,0,0,d5fd2bdc84e19f199cce4f65d7a6851f8de75ba034efefd85692fcde69a1b820,2015-07-13T17:56:13.737000 -CVE-2015-1155,0,0,b519c42c648b17c6b6245cf4516204e7ef4c09374914a7e1ca6d68398fed6170,2017-01-03T02:59:45.443000 -CVE-2015-1156,0,0,bb797eb1dc50cb91fd88015125a3b34812c803c1b1cc716920de1a0e7d20bf44,2016-11-28T19:17:22.007000 -CVE-2015-1157,0,0,e2422517065204ee58235741bec602af848ad9603fca7d1edb588c17639e665e,2016-11-28T19:17:23.147000 +CVE-2015-1143,0,1,9583f695410fb95ea67f141aeb80212e0d1e06e7a6a72b169d55c5276808de58,2024-11-21T02:24:46.077000 +CVE-2015-1144,0,1,d927cfe91145f8f1634a790d2dff3736430ee60e9a90d7f182b9712d1bcf440f,2024-11-21T02:24:46.217000 +CVE-2015-1145,0,1,7c2953ec97a1abdaecb8a5b229e4e43101e990bc814b94309262fdfee76ccafb,2024-11-21T02:24:46.343000 +CVE-2015-1146,0,1,caeea4ae35f586572e274fa6c59da7e0ab7838c1c3c9a829ae68ae0806af271d,2024-11-21T02:24:46.463000 +CVE-2015-1147,0,1,9840a31b7c083cf630ee51ab58cca7ed5215baebca3bbccba0f1a5c9967f3a0d,2024-11-21T02:24:46.577000 +CVE-2015-1148,0,1,5d96f86ff6a9ad9d2452099031a1d34d63282f3c0cb7488b98be999f13a0ebf8,2024-11-21T02:24:46.690000 +CVE-2015-1149,0,1,1f414a03e31a229ebefa5ac3d74e80526b6adb0648219c917a33fef25aeac90c,2024-11-21T02:24:46.810000 +CVE-2015-1150,0,1,04f2522d28d0774a70a4ce473d982a515a1b8b807626f82e4e47767ebfe2ecd6,2024-11-21T02:24:46.920000 +CVE-2015-1151,0,1,87bba4a37af8d3429db84c817482ba43240eb174f265b5d5b47884a303aa4af2,2024-11-21T02:24:47.037000 +CVE-2015-1152,0,1,96b7d3a9f252e12d1289323e3afa502e939c47b72c01650bbe857d304f431cca,2024-11-21T02:24:47.150000 +CVE-2015-1153,0,1,85cc156090556154ad3cf7dc9f73f01bbead19df19d68cf5419f2dfc50063aef,2024-11-21T02:24:47.293000 +CVE-2015-1154,0,1,92c43a598c6db283908b0f4564ed446cd09740087c9853cc9839b1907da329ed,2024-11-21T02:24:47.433000 +CVE-2015-1155,0,1,0c7244c39e337304fd5a16d0388843885ae4b91cd68264504b694fb52ce66972,2024-11-21T02:24:47.570000 +CVE-2015-1156,0,1,f842f0687cad8f80bae1ab930d42f387b9b240f387df286b1e7a55800a2405d3,2024-11-21T02:24:47.710000 +CVE-2015-1157,0,1,a4db8420075a05f1d7ceea62eb68b6d8b817a47f19725c295b4a7f4800385824,2024-11-21T02:24:47.830000 CVE-2015-1158,0,0,74d43e66096857714b0eb99eae036ed9e999c41c9b1f29d68529399668a5dde3,2017-09-23T01:29:00.717000 CVE-2015-1159,0,0,558d3996d00f3cc0950aad56760cb900bfb92003ee813feaf68d9a87436ebd2b,2017-09-23T01:29:00.777000 CVE-2015-1160,0,0,a131bb245995ea69df9cf918c1985e9b88725e8b9927a23f07bb0d2983e9896a,2023-11-07T02:24:04.667000 -CVE-2015-1164,0,0,536fd184041105221faa369c3f3fb6d413a57aeeed25b505a63304a97949a048,2017-09-08T01:29:47.607000 -CVE-2015-1165,0,0,e5a965099330aee0ff65327763651b1aa5fe2a575a99cac1a6f0a9d089097424,2015-10-28T02:16:09.127000 -CVE-2015-1169,0,0,5bbcd9cdceee17bd9a5b8f8d09937952bee7c3d861e91626e47b125da515b484,2015-02-11T19:47:17.193000 -CVE-2015-1170,0,0,0919dfda5da12b8848337ece12bc1fdc0ad0d48ee417db8ac3eca466f8a8d43f,2016-12-08T03:07:22.887000 +CVE-2015-1164,0,1,6e5d7b4a2f175a9db9d2608e12ce7caf7db13d1ba3d6c4da2b4f1f0a03611d98,2024-11-21T02:24:48.283000 +CVE-2015-1165,0,1,6b8844781b5b1a1f6ca60e4bb20cbcbc1531ec6beda34c14e6cc94e6a5c3afb2,2024-11-21T02:24:48.437000 +CVE-2015-1169,0,1,dab8a33e5dc8b8156507fd674ae57c95ef3bc1dbe109491fbdb135dc8cf8f984,2024-11-21T02:24:48.597000 +CVE-2015-1170,0,1,3186b0038a686d4220d200b0bcae6e17b3ae59ed2d61ce1ad036fa3dee16fb49,2024-11-21T02:24:48.740000 CVE-2015-1171,0,0,139e1986f07f114f002edfdb6b6679b11f96e22883843c6e6876e6a35f17b103,2015-08-31T17:45:40.707000 -CVE-2015-1172,0,0,4762d59186e1296e5074a4a893f98fd1496a6717567ead033ea5fe0d9e84e485,2017-07-17T13:18:04.047000 +CVE-2015-1172,0,1,d7dee12c8d6528d262f950a1e4df418aa4108e583b7d60711ebe7d093b2a6970,2024-11-21T02:24:49.033000 CVE-2015-1173,0,0,8b256ea6174b7fa515b96ddff6b2093a11e6620cc756f72a4ff086e1f1387498,2015-09-17T18:43:35.940000 CVE-2015-1174,0,0,e44b0c6c2baa9c0d8d6f465abe34ad67af3d5f5145d2e60d1897d8ad04bc37ca,2017-08-07T12:48:41.077000 -CVE-2015-1175,0,0,3b65a239e2439875e806badc1f5fc12cecb8892aadce51838b21f503ea752e35,2018-10-09T19:55:42.467000 -CVE-2015-1176,0,0,64f3f9da98dea6262c542debd26237dc7e0fe4774fcb59e12276807cfd0fb2d3,2018-10-09T19:55:42.873000 +CVE-2015-1175,0,1,2a6934e21aff5c8995cb25549aa0e4f6fbc54ea6bfa597f09cebfa756d49512a,2024-11-21T02:24:49.463000 +CVE-2015-1176,0,1,5f53849bf17f4fdffda940e27f8914b4d0af87609de9f4e415ef4bf6b0fcac59,2024-11-21T02:24:49.620000 CVE-2015-1177,0,0,1b3f0358f11f58db5fdf8a20d32f0e3219f75bcde28e56b45386294ad5a7ffe7,2018-10-09T19:55:43.263000 -CVE-2015-1178,0,0,f39ee99b0cbac3cf6b29f126415597c40ffb5f9a2e10759cb569fef8e8c20d95,2018-10-09T19:55:43.530000 -CVE-2015-1179,0,0,64d99c7dfb3ece92922f2a8a2eb70d214731e8d35881e633c8319160b18a6c1f,2018-10-09T19:55:43.793000 -CVE-2015-1180,0,0,835238cbd3a34d93bb3baeb47b7bd3245d8f7bb0cb3bd86eedc7a4d50b7c5ae4,2018-10-09T19:55:43.983000 -CVE-2015-1182,0,0,464e3172f774ce7b5e1a1e9a1e6297f8cd3b633f6e1ee9c576e9ba178aa6f423,2018-10-30T16:27:35.843000 +CVE-2015-1178,0,1,e63bb67eec65ff13be5cc9bc7f95b0ded91d8b0ad1030b37eb868f705c3130dd,2024-11-21T02:24:49.913000 +CVE-2015-1179,0,1,8646fc696bd57f58c33cb34e3671cd5b7597d5ff9c297939884fe2c9a0c2b226,2024-11-21T02:24:50.073000 +CVE-2015-1180,0,1,eaee66ecd68c1e4109244849df8f4bdae8c4440ed27957548a6cc67297ed32ea,2024-11-21T02:24:50.227000 +CVE-2015-1182,0,1,99a18b6d229da37f20db223528760ecce94c1b6d0a154f336e6ae478b7f7ac9e,2024-11-21T02:24:50.367000 CVE-2015-1187,0,0,c8bb8ffb41127f4284beedf8ada0242a1042c2d1370ad1574c81129deae08c56,2023-11-08T20:19:37.313000 -CVE-2015-1188,0,0,530737c894994552484b130fe39f8c304c63bdff6a4a71350f8432613066aedc,2021-01-05T17:43:25.920000 -CVE-2015-1191,0,0,aa86fe12113c3d3ff3f5a13e34b1b8d0f71c71b7fae3950811f7744053c296b8,2016-12-03T03:03:11.230000 -CVE-2015-1192,0,0,6cb05417bf963ad1a9a91bc490da6059464eb368decab9d4eea3eb734c6592ed,2015-01-23T21:40:58.007000 -CVE-2015-1193,0,0,232e8bd131f45df6365a30a6d9b140fd2ffb8301c16a4704ec0c09d3e33bc609,2015-01-23T21:49:20.240000 -CVE-2015-1194,0,0,3c83ff4db260a83ce44a827e45f00b73a9119e148eee31b860e3199d98462dff,2015-01-23T21:56:17.600000 -CVE-2015-1195,0,0,1607625f1cd7d4c36563a32b639585984cd5d07740d5a28147b36968f0aea65c,2019-02-04T18:52:44.363000 -CVE-2015-1196,0,0,528c374059ef9f330588833a180900fae48c6a43d6c68cb20d065190ec0cd5b6,2018-10-30T16:27:35.843000 -CVE-2015-1197,0,0,cbbb714693f0895d794c5293c8cfcdd410e58c0939f3dedde9a9c3a5f12a9bbd,2023-12-27T15:15:43.853000 +CVE-2015-1188,0,1,e4c59b4b98da0b63ce324357be86841643ad458b07e0cc07657ab061cc6da52e,2024-11-21T02:24:50.690000 +CVE-2015-1191,0,1,4daef975930eb7c6e7871246fba0b207ca4c876959fd2005f60613baca4d380b,2024-11-21T02:24:50.843000 +CVE-2015-1192,0,1,b8a677bf3d53a356cf0533cb234142abc85488b26580df627c53d68fbc312040,2024-11-21T02:24:50.987000 +CVE-2015-1193,0,1,32c3717f4db379bcb5ebf9b643402a2e8f08c654c187c48e9317f5f645bedf6d,2024-11-21T02:24:51.133000 +CVE-2015-1194,0,1,bc0339330c184be484c6c73ba0f0cfd418c19422f74e6fed9caea0a8abf84a22,2024-11-21T02:24:51.273000 +CVE-2015-1195,0,1,2fcdce4258cd3a6e24f12e3bb94a17ecd5409be687888604cb2944c5b2e6b0a9,2024-11-21T02:24:51.413000 +CVE-2015-1196,0,1,72ee1df9a7dc93f5b2ecba208f33e819e7a56376b94f12aa91ff3099f2016b74,2024-11-21T02:24:51.553000 +CVE-2015-1197,0,1,ff2d73987ac43592a60401860ffeab728336e9bf86efe0e542e8aba92cb21f70,2024-11-21T02:24:51.670000 CVE-2015-1198,0,0,3314d32ff0c77a4d7bb5439a40b92476b6920de53ae8b641e51e38b9e444c7e4,2017-09-06T19:22:09.053000 CVE-2015-1199,0,0,f299e5efeb13038514726731ba09513f5eadcc9b9321d50f5d310a5ee6916416,2017-09-05T18:21:10.897000 -CVE-2015-1200,0,0,89cd4b6b57f95328fa2b5bb740fb7bd115ff80c60505f40faef0427c8e80767c,2023-11-07T02:24:04.873000 -CVE-2015-1201,0,0,3aaa75df590a3a8610235bac3b4930349eee09390f74a313c5aa904d2d3cd3b1,2015-01-22T17:33:03.570000 +CVE-2015-1200,0,1,89728a74c460422c987165b7f9f0c35e901cb88c80d09ed8f8eda50d05d3c497,2024-11-21T02:24:52.123000 +CVE-2015-1201,0,1,cfb2c020550b9f93847aa7dcd109cea39479ba3c2bb85c4dd3af9fcb3af6bca4,2024-11-21T02:24:52.280000 CVE-2015-1202,0,0,f01afa2209a00ad407c9b332f13a5c0aa21fd62781ae2214078fb72256cfe374,2023-11-07T02:24:04.950000 CVE-2015-1203,0,0,78934578297b51095cfbf485993880f425d6dd2351c5c5b194f8d51782fac62d,2023-11-07T02:24:04.983000 -CVE-2015-1204,0,0,7f79bc963916f476d63d84296354c5d3be54d9c0dab332b6df3db54cea974d2b,2015-01-23T21:08:21.107000 -CVE-2015-1205,0,0,057ccce05a9600741c919c5d86acede7e29c2493287ef0aa5979663a88494b1e,2023-11-07T02:24:05.020000 +CVE-2015-1204,0,1,e24988700dca715556606edefcad09554f7cf1b939d5013e690abbd29baa9590,2024-11-21T02:24:52.447000 +CVE-2015-1205,0,1,ef3b2155884bd2f697606441d2c0571c6014acc9ad314b0700b806e5dc80b41f,2024-11-21T02:24:52.597000 CVE-2015-1206,0,0,3546174fd6af6acf22205479b0a46b3d42b50c7db4f3341571933bf807150e4c,2023-11-07T02:24:05.327000 CVE-2015-1207,0,0,1f9049436e1deef7e9409be625256f540e9010ee0ad81e9bf8cdcc8fb918be73,2023-11-07T02:24:05.813000 CVE-2015-1208,0,0,1f471861604325851b0d830fbd8f43f1aad8e754a4af43b5afd575d09856a45a,2023-11-07T02:24:06.220000 -CVE-2015-1209,0,0,0acf411af0120816983543e401453338714e2201259fcc77c320a3ad536cf83f,2023-11-07T02:24:06.480000 -CVE-2015-1210,0,0,74f76eea55d6121187b0420c9ff059fcd8d4de12a9f7dda5d4eb3b389373e8cf,2023-11-07T02:24:06.807000 -CVE-2015-1211,0,0,dfd5d9873cf384734564e208938f7cbd93da1d9a5729a487aeeb639ff907bd7b,2023-11-07T02:24:07.283000 -CVE-2015-1212,0,0,35227723dd1a3ff79d67b1deb2eef1247a18ac9bf42763751fb2470988b6e6c7,2023-11-07T02:24:07.680000 -CVE-2015-1213,0,0,df9c0f7b2ac2dc23e685acb469a279ce45f4e08ad9270a2eeb196da44d0295c4,2023-11-07T02:24:08.210000 -CVE-2015-1214,0,0,af1b69dfb2bdc80593d8e9a2c3c098f6a6225127a63327a8d11cc39f05ba0315,2023-11-07T02:24:08.620000 -CVE-2015-1215,0,0,8a828a50f29d9fb94114af03fef38d287f33ab3cc971048a9e2fb5c9f5f340ca,2023-11-07T02:24:09.033000 -CVE-2015-1216,0,0,8e2df73bef8bffc363a1e3d8fe6db3d894ae7d00c9f28a18270bc608b5931f9f,2023-11-07T02:24:09.457000 -CVE-2015-1217,0,0,ce1ac0a2cd9233a32806a6004272d33a5a8eefb01ad5722f4f6e6679c0ea5759,2023-11-07T02:24:10 -CVE-2015-1218,0,0,4c3585600625c7d9710db81a53c897d02a70449a53e5d7533b02e7a4ddef504f,2023-11-07T02:24:10.387000 -CVE-2015-1219,0,0,0c13222701e4839e329cbd1e28d4a24ead247a77a565ec718947e1c08217c8cf,2023-11-07T02:24:10.770000 -CVE-2015-1220,0,0,8703b6c2d841eaab821c760463b2dc13be27b50db2de92be3d7366f1d2d60d25,2023-11-07T02:24:11.150000 -CVE-2015-1221,0,0,0f009de1cd4c36e5425eb99171d327cb1cf9e6aeecb05b05d5086a1d16773eaa,2023-11-07T02:24:11.570000 -CVE-2015-1222,0,0,790d533b575988b753edca349340fdfae4c16672cdaa2d18f68bbe07d29fcc91,2023-11-07T02:24:11.990000 -CVE-2015-1223,0,0,4c1853309c1855f53e7508702f1285a0fb4720379ff42f71ecdd14f7186aea4f,2023-11-07T02:24:12.370000 -CVE-2015-1224,0,0,cdd7a0b3b72ad4c564792f1c01ed19450c6e18180f44b3eab581603190b216ef,2023-11-07T02:24:12.823000 -CVE-2015-1225,0,0,e77b8d6ca7a0d11dfdbd3f6af4cc3aba8f0f868e9ff93083b50bc42fedc2ba2e,2023-11-07T02:24:13.233000 -CVE-2015-1226,0,0,d4d7c611937fefcec139bc350b892f68ec4da16594cd4879fe1582b751c00f7e,2023-11-07T02:24:13.643000 -CVE-2015-1227,0,0,766237c37f5bb379cb06d7ee137cfd643a2b6c58fc696f9b961af1632be7e71e,2023-11-07T02:24:14.110000 -CVE-2015-1228,0,0,b5560a9085255bf34bb00ef9caaee0fb4296e30135330c5e218aa865d1bca1ad,2023-11-07T02:24:14.500000 -CVE-2015-1229,0,0,3724483f8a3b29b94ad85cb51d5b6f07088b8ae3f370925d795ab9322fcf3116,2023-11-07T02:24:15.040000 -CVE-2015-1230,0,0,d15eed36e5e7285e3f65f28142330674843ef2c1ac055604812df92aa9462191,2023-11-07T02:24:15.450000 -CVE-2015-1231,0,0,1bd4587956eb7f4bbb4bd3958a7a3e753f6012fe078323ea24a1e67b653aee47,2023-11-07T02:24:15.910000 -CVE-2015-1232,0,0,7cac8102ee251ee6b2031f18541963fb363cd5c2462c1b2a8e6737625bceb685,2023-11-07T02:24:16.440000 -CVE-2015-1233,0,0,efcb083aca1c0a4e4ae242371dafe6412045c5aa1bb51dec10db83a3345e5692,2023-11-07T02:24:16.857000 -CVE-2015-1234,0,0,ae9f009bf61577afb1d619297fef8244a43f2eaa61ffcf1acff3157f1342c336,2023-11-07T02:24:17.330000 -CVE-2015-1235,0,0,c324d7e25544f60e974a52875b97793d2235bcbd6c71da206819cff21cc71534,2023-11-07T02:24:17.750000 -CVE-2015-1236,0,0,0bbbe96f39dbfa4bd2a21a008e8caa226d71947dfeebdcbdcbbfb9468e1312c1,2023-11-07T02:24:18.080000 -CVE-2015-1237,0,0,483ded288681e5d04a52136d5cdbadd2c7e928ef05ea2b9e3edd0360ac20ae43,2023-11-07T02:24:18.463000 -CVE-2015-1238,0,0,56e16bd2fd35bff98f33087cf34983b7178c792101e16e6dbd470fa38ef9cd71,2023-11-07T02:24:19.087000 +CVE-2015-1209,0,1,da84dda145f534d12f547993cc869462babe4b5f2860c0876a7a1738de86d5f0,2024-11-21T02:24:53.117000 +CVE-2015-1210,0,1,3659faee7dae8d66a059af49f73c47c2e40830150ca5b4929ed1e6d2dc6f3ffb,2024-11-21T02:24:53.263000 +CVE-2015-1211,0,1,52b846e9565f03102f16831730f6fb2a9f9c692f93bf44f78e56785cb6c2523d,2024-11-21T02:24:53.413000 +CVE-2015-1212,0,1,5f427f66f7bf6a7ee424a1e6cffabff5eb8d4015f3485fa3c7e902824f345e07,2024-11-21T02:24:53.557000 +CVE-2015-1213,0,1,aea45c542a1d48e2b2999f486b25ada9360d310a788c508647c43f0b0225043a,2024-11-21T02:24:53.710000 +CVE-2015-1214,0,1,4ad0b4c501d4980be4f2264e5977e223ff30aa899fb84d3a67c39ae6b777c51a,2024-11-21T02:24:53.833000 +CVE-2015-1215,0,1,547c91f8c21007ebaef807015c4183d7536642ff424d5c28d4726eb9406c2ebb,2024-11-21T02:24:53.960000 +CVE-2015-1216,0,1,3c8ceb76f65c1c5db555ee3a2c6a5fb0009caa309ff04f15015c2706381f3936,2024-11-21T02:24:54.080000 +CVE-2015-1217,0,1,7ce7d2e5bf39d1e155f839020a430d7e0fd7fa1fdb49c37f19768de83f92b17c,2024-11-21T02:24:54.203000 +CVE-2015-1218,0,1,830b1781762a484a765219d7feca6e3b3062e6341953a41e7f46bc6b5d3b2a4b,2024-11-21T02:24:54.333000 +CVE-2015-1219,0,1,b5fc73fee98f0e7b1bc53391bb1885e2491b7d0e8c8660cff2ab2e071fea28b5,2024-11-21T02:24:54.453000 +CVE-2015-1220,0,1,ac08d6cc42bc4b388ac31ae5698af5002b80e53aee9c0ebdfaa143651d9e3f2d,2024-11-21T02:24:54.570000 +CVE-2015-1221,0,1,d1ba98f3dea434f29af39490852fedfb183b2fcdd37912afd2074ffe9bf0f858,2024-11-21T02:24:54.700000 +CVE-2015-1222,0,1,a24c5ec21c1e17d250bb66ff6b1fcf49d073308e212e60b0c7fa8d9a6c940b56,2024-11-21T02:24:54.823000 +CVE-2015-1223,0,1,a578ddc3b7fd17e1a8f5c5bd26c75dad4df29d1e036b3b76aee8ee44c2a33e34,2024-11-21T02:24:54.950000 +CVE-2015-1224,0,1,aea350b73bab6c8fe9334035173304f5fb93b1211f787fcdf7ea1ca5907cd561,2024-11-21T02:24:55.063000 +CVE-2015-1225,0,1,eded99c9607e4533a029b76281870f5952fcebb7c16dfe684077941ae1ecef5c,2024-11-21T02:24:55.210000 +CVE-2015-1226,0,1,0fc4395f5b9d4d4f5d0db321e16c7498f0897988d3f32d03435420bcc31fde4a,2024-11-21T02:24:55.340000 +CVE-2015-1227,0,1,d97ae14455cde3a68c9171ad1e9e5097389f1b954a3d68632511d97a6e74bcb5,2024-11-21T02:24:55.460000 +CVE-2015-1228,0,1,f9f689aa4d9b5cf664b9eaf3591280dd56bb30aa18b09ba0e13f66612204e1b4,2024-11-21T02:24:55.593000 +CVE-2015-1229,0,1,0c32153b9345d83ff82c8bc7b877cf9ada07f43232c4b9f6a0dc5b1fa7a18f5d,2024-11-21T02:24:55.753000 +CVE-2015-1230,0,1,1db3fc6bd30c9e98cf2f8b3c4529efc95fd5b6e04cbcd877c7efe554b709f1d7,2024-11-21T02:24:56.560000 +CVE-2015-1231,0,1,f833cb5a0902e1581a03ccd3cc3ebe0d46bddff915a11f1a6333bbb52ba0b984,2024-11-21T02:24:56.753000 +CVE-2015-1232,0,1,c221df933ce371304950623a453d1aa08d0b58d6f1c8d581e2e9354b9fa5e677,2024-11-21T02:24:56.903000 +CVE-2015-1233,0,1,009758c96d6f01dd3c5455a2e105500c887f5eed5483c12504ef2d75b32f1f70,2024-11-21T02:24:57.020000 +CVE-2015-1234,0,1,24e4e9066794d5d3e410ea5d1269a677dfb46256fb9fab5d0c5aa4c58dc5d19c,2024-11-21T02:24:57.163000 +CVE-2015-1235,0,1,49c2e2e1ece210e22ff725658515b9fa64fac24129362dc66228f288f14665ef,2024-11-21T02:24:57.300000 +CVE-2015-1236,0,1,9bb475b291a4c7e3be5d1b0e05260509747199cae49b241f8e2859c0208c1be3,2024-11-21T02:24:57.440000 +CVE-2015-1237,0,1,e3f6413542fe733bdb229e185ac21f0c2a707ab44b694f4c6694deeddd6e5521,2024-11-21T02:24:57.597000 +CVE-2015-1238,0,1,58a796b21b05855ffaf3adf34de1fc30f37a116c4a8ce94b9e190ea6cd6d0ede,2024-11-21T02:24:57.737000 CVE-2015-1239,0,0,0bda6e19f44223c0eb73b8c416fab414e5a8117289f94ded3ba69c4928f6c198,2023-12-29T18:05:05.527000 -CVE-2015-1240,0,0,cdb7153141fee86b9d8f7a85d4c06284284e1d08be0793b2b99aab6976334bc5,2023-11-07T02:24:20.103000 -CVE-2015-1241,0,0,f0391a4f5436d71bd2c87bca85c5119980353c7a1661db9d5116211df5ebbd3a,2024-01-26T18:56:55.317000 -CVE-2015-1242,0,0,34cbff36a77481cdb470fe0f56451041f00c4a906142cabbac2a14b2b0ef9da4,2023-11-07T02:24:20.857000 -CVE-2015-1243,0,0,df812dbff70028026c2a30eff3781981bbc3b0d5f588d42320d622915f09ecb7,2023-11-07T02:24:21.317000 -CVE-2015-1244,0,0,a006f28558ed248c255925a21c3ece7976388ccea9424f6a3c1549e78f5b4d96,2023-11-07T02:24:21.753000 -CVE-2015-1245,0,0,be13a0b90cbe1af7227928258d4c8a4e3ab33fd2c2d7dae02663e323ad4cf7f6,2023-11-07T02:24:22.167000 -CVE-2015-1246,0,0,faca3405efb6115542c13903ac2ed990440714a578ca1e954d4bd9b760076a0e,2023-11-07T02:24:22.587000 -CVE-2015-1247,0,0,03e78cc8377d7a82417715dc423d7f1e151f40d4cf855d51ff5f06000f4495c4,2023-11-07T02:24:22.970000 -CVE-2015-1248,0,0,8591babba0f052b402410b5e77f17991106395ec190bfbc696d9723790bcabc0,2023-11-07T02:24:23.383000 -CVE-2015-1249,0,0,97e07e825ffebb03aafbe0632dee9ad90ca894a91b9b8fcb0d5cb4c7ff094a1b,2023-11-07T02:24:23.860000 -CVE-2015-1250,0,0,800334e569860a8eaa0e17286d4c2200aa4b2b0f9e7590176dadf7021492c87a,2023-11-07T02:24:24.353000 -CVE-2015-1251,0,0,260c0c06b12389623423e9d9fa01dc803e70d6c6e7824f2f897bc9709daebb67,2023-11-07T02:24:24.873000 -CVE-2015-1252,0,0,4d7d7dfe8386b0d343c267ccc0344d7d179c86d497f17f41a054a81b2f760165,2023-11-07T02:24:25.303000 -CVE-2015-1253,0,0,f205b91801e55097dfac506ad4009f9766a290cb6ff13f9d40461f6176f78b40,2023-11-07T02:24:25.653000 -CVE-2015-1254,0,0,9b53e5052b7a431a575492f50d230c6e2814542a91382c02600879935386b997,2023-11-07T02:24:26.037000 -CVE-2015-1255,0,0,cacce376debc6e49fb1e9b2b20eccfb919e5ec41e9fb9994cf7a428ef0a18efe,2023-11-07T02:24:26.437000 -CVE-2015-1256,0,0,3309ccc08fad1a075e7a129334994b8fa4f69ce6833d31462ad980d1cd98fd57,2023-11-07T02:24:26.870000 -CVE-2015-1257,0,0,1fb2531da92fb5e98e08f29100d017b11363dd87c348a629b3b97eaecde2129f,2023-11-07T02:24:27.287000 -CVE-2015-1258,0,0,56ea17669cac52cfc3fc369e7da71f96bfd67c1f9bfdb3eaf06ea74acc657df1,2023-11-07T02:24:27.810000 -CVE-2015-1259,0,0,cf829c003c3c35b975aab10818899531c9dd5b4b369b4da1da9e00f3c5d8d69f,2023-11-07T02:24:28.217000 -CVE-2015-1260,0,0,6490a85b903da00377ed3dcf80789cd9797940a9b5a73cf2ab9556e33253eff3,2023-11-07T02:24:28.633000 -CVE-2015-1261,0,0,fe33d3f5601e912b14380bf8d7b56bf1bb6f7526bd9dc74efe2f62cdcf48b975,2023-11-07T02:24:29.010000 -CVE-2015-1262,0,0,46b9285b8ed8432ba682f892e5c8a938dce10d0766c14b2bd3b5f08d89d74dda,2023-11-07T02:24:29.440000 -CVE-2015-1263,0,0,21b4a98cb3ddb324283a1e85f5756fc5bf134c8bd20bbe8deba6697ad49c627d,2023-11-07T02:24:29.700000 -CVE-2015-1264,0,0,4ea3a67129b5e1728125d1e36df3c1553ab67fc16216208cc9d4d845eec7403b,2023-11-07T02:24:30.343000 -CVE-2015-1265,0,0,fc3d5c4ef18515fd8496ef1661acc3fe6398cd2db12eed726cd74133447cd03c,2023-11-07T02:24:30.747000 +CVE-2015-1240,0,1,aa5c0768aa98c3b03a07e5d4836b6af21aefafe5acc7026d4436131dfaca46b0,2024-11-21T02:24:58 +CVE-2015-1241,0,1,7269ab44fe5c72167615e68de329b03d007ae05079f7648f91bc1439fdcd30ba,2024-11-21T02:24:58.127000 +CVE-2015-1242,0,1,306cadf5557b0de8303891a94341143af015d105fb50d61bb0caef74ef44eae4,2024-11-21T02:24:58.267000 +CVE-2015-1243,0,1,3ee4f9ef1f79029f6652c014427348d17d530f91d02a1c74d9a4b7ceff40e238,2024-11-21T02:24:58.390000 +CVE-2015-1244,0,1,65da0160ba3fa5d457300de8ccb29986c1afa7f145979d021a6152c6f21cbbb9,2024-11-21T02:24:58.520000 +CVE-2015-1245,0,1,a41bdf4f9c881d77a2a8b89a91e00e850821ae265db3a067e49e703d515b2401,2024-11-21T02:24:58.650000 +CVE-2015-1246,0,1,949125fac2073069d5cc0224229e6ef78fb13dd1071dae18e13df9547f9d876c,2024-11-21T02:24:58.770000 +CVE-2015-1247,0,1,ae099d2e981e7a570c977794076eddec31a60a7e36ce734b878423d5ab8a93be,2024-11-21T02:24:58.903000 +CVE-2015-1248,0,1,02d83669fbcc7cca2900b189f30a82701af02fcef518b199396b63dce7dfd9c2,2024-11-21T02:24:59.040000 +CVE-2015-1249,0,1,d2417aa01b7bec9157c929c5924acc0d78733365b4188e47a362a1be641dcd5f,2024-11-21T02:24:59.170000 +CVE-2015-1250,0,1,fade7841ddd1bc753439e4dd9c3c8a25709691c6f3fa57e7d2645f750813d7cd,2024-11-21T02:24:59.323000 +CVE-2015-1251,0,1,3462d108062d82287d1f76d12e9b5c9fe6154c8584431ce4430fdd13490c056c,2024-11-21T02:24:59.453000 +CVE-2015-1252,0,1,bf7c5938f418d6f128d5e54e76822249e039d67cd16aab25b405f9a2446406f0,2024-11-21T02:24:59.590000 +CVE-2015-1253,0,1,d2ad46707ffa1b1f189ecddb6002916702d9916cd1255b31c3492314849a0f34,2024-11-21T02:24:59.720000 +CVE-2015-1254,0,1,ee7be3d6dfc7cf5599e8a213e40d64ec21ad97ee16b5495d534924c2d78503d8,2024-11-21T02:24:59.853000 +CVE-2015-1255,0,1,35a1a88653b2d077c9ed5a8d80799388c8ad2f523a49d1f272be97e83cdcdec6,2024-11-21T02:24:59.980000 +CVE-2015-1256,0,1,37820e4446a5a560215c24f8b32f136b69979fe6f8ae138b4e29e743864da051,2024-11-21T02:25:00.117000 +CVE-2015-1257,0,1,b558d9965c813e013d3ce4da53f0ee5c5f4768bff2c57ec4e1cb51ac3f196cec,2024-11-21T02:25:00.257000 +CVE-2015-1258,0,1,f7f78103f878ec2620832c19f327cf15372fea6c79e70402e65ec2aabf7cbdc4,2024-11-21T02:25:00.400000 +CVE-2015-1259,0,1,fea1dfdbccdfa6e725fe25b52cd047ee4f46afef074f2ed304aa95b71e79de22,2024-11-21T02:25:00.540000 +CVE-2015-1260,0,1,b8c35f0f2e34d66cce7c343e58611bcce7e5ff25dcdc5fba64f637ed2758dc2c,2024-11-21T02:25:00.663000 +CVE-2015-1261,0,1,1100736bc80b7c25a66d7a1e8d4cee0f3f8059c015c7461ff21c564ccd4cb168,2024-11-21T02:25:00.790000 +CVE-2015-1262,0,1,224e59b165c889b70f545dd21890f5427bd372138403875618a134a7ba35b1dc,2024-11-21T02:25:00.913000 +CVE-2015-1263,0,1,df2710e9a7e6a6a08326e6460c42cfe8891b0fda906d80cde313386712409c83,2024-11-21T02:25:01.047000 +CVE-2015-1264,0,1,ead215fd3f75f031230051f2ab500ca099de8f58fb5709414ba06314186c4009,2024-11-21T02:25:01.173000 +CVE-2015-1265,0,1,39377013dd02c20559c121f8ef8b4cc8f22155792c1969fcd71192f87831bdc5,2024-11-21T02:25:01.317000 CVE-2015-1266,0,0,34fe9685e3cc34e7a7c176b07075c6deaa3054cca9e166d0f8f8ee598f4f9ec0,2023-11-07T02:24:31.113000 CVE-2015-1267,0,0,1227dbb958ca50036388327dae9db221b5880304a91fc6db6d8d9d3334b7c025,2023-11-07T02:24:31.493000 CVE-2015-1268,0,0,108256721d2be3381391e7bbd3f3124a746c650e3b9c6073ff3023b7cce9b748,2023-11-07T02:24:31.913000 @@ -74838,24 +74838,24 @@ CVE-2015-1301,0,0,04d81c0397bcb2498dfb0a9f2c2bd360efd8c68b41a847f03e1f69c02e7679 CVE-2015-1302,0,0,d2875b0085de35da3444f3f7789f1b093f745d133ced51dbf4a6d6085a2aa1eb,2023-11-07T02:24:46.690000 CVE-2015-1303,0,0,73b9f9ea142afa2e06a9b9ed7fce0a77918e0abec07ceec061996600b6430efb,2023-11-07T02:24:47.060000 CVE-2015-1304,0,0,b18ede4a19e30c7f2e5c702003504368473d485e479fa08eba74a717e8251d64,2023-11-07T02:24:47.480000 -CVE-2015-1305,0,0,dadcc52b3e33e3c35cceb40e798965b6d489d13d67c954fec22aa4ba612ab683,2017-09-08T01:29:48.217000 -CVE-2015-1306,0,0,0a7791df575ba3cc949483aa3f70ab12d07385c7f767a45ac179aa36d8293370,2015-11-19T17:00:57.037000 -CVE-2015-1307,0,0,f0a3367cb0d6a801d7b49aafe9429156a61d0cfa02c7a9a6328fd8a254a75a1b,2015-01-26T19:40:38.947000 -CVE-2015-1308,0,0,e6515675860d74366994ffc360366e82a1c162426c2ef27cd08bad87255f0392,2015-01-26T19:40:58.417000 -CVE-2015-1309,0,0,b2a190d7d7d27981eecd1695caa711bd20b9806016e7085dafdf6369d61413d5,2022-10-06T15:20:09.903000 -CVE-2015-1310,0,0,615db25e5867fc7a35ef2bddbe749c8b4f439b5e1e87e68b98ac1d544e048eb4,2018-12-10T19:29:06.780000 -CVE-2015-1311,0,0,76ba976c3e596541286e5568b5b846c144e74843aa296ecbe564d1e749a911e2,2023-12-21T04:14:54.460000 -CVE-2015-1312,0,0,0c8591478aabc20562ac0293977e3584aa636c541903a172dd33079966e8c7ad,2018-12-10T19:29:06.890000 +CVE-2015-1305,0,1,28a9700cb9a5b22ab73bae5cbfb49087519c3bffed08846bd7981c18d76b1adb,2024-11-21T02:25:07.400000 +CVE-2015-1306,0,1,5012251a8780be406edc04aea0e15f14765093f7b1ea0d2b27b7e34be92d4448,2024-11-21T02:25:07.567000 +CVE-2015-1307,0,1,07997e13118570d29ee860378da586df266d6473676ce6a27f5a9996037b774d,2024-11-21T02:25:07.723000 +CVE-2015-1308,0,1,02b837623bc98754af0adb97be364701b20ea230beb5ab84fc60948a5f4014d6,2024-11-21T02:25:07.910000 +CVE-2015-1309,0,1,481ad59bbda70891aea8c536ddeb1e912cf38cca19027f05487a6241af05601e,2024-11-21T02:25:08.080000 +CVE-2015-1310,0,1,43d96edc9ee36390eea1da5a98587c4e36795654c42368fdc83944f3db777be0,2024-11-21T02:25:08.263000 +CVE-2015-1311,0,1,793b3f6e770d404eeb554ebc59b4e7bf9a66617ab4bde1ca6b4c50443fe6253f,2024-11-21T02:25:08.403000 +CVE-2015-1312,0,1,62b5aa23628f685458d364a8d5d5cbe7d5c5fa876d737fdb991d3e4a8d494bed,2024-11-21T02:25:08.563000 CVE-2015-1313,0,0,8205505d6d2f310157078cff77ae2e875249549fd4bb47807c32666c9f9250d4,2023-07-06T18:25:35.530000 -CVE-2015-1314,0,0,b1e8f34240691feb7362040ad56b52caef762e4e86f0951116d0763e88562fba,2015-04-17T18:07:05.493000 -CVE-2015-1315,0,0,9a52d132ff32ac3cdcda48cc5b77a8154de0d9fb0bf7272345a011479eb909e1,2015-02-24T17:04:45.847000 +CVE-2015-1314,0,1,7dcaf7c19e97add041a946cc3e680d3955c468e2eed09c65038ce155c7ecf197,2024-11-21T02:25:08.900000 +CVE-2015-1315,0,1,ef5892c82d66ea71ecefd6c38f9873d322c34bc03318da92d5a37ebd1671004e,2024-11-21T02:25:09.063000 CVE-2015-1316,0,0,e15ea65b984e2a15c093c67319c08b9ba9a08faaa6f163551186746212a07699,2019-10-09T23:13:10.847000 -CVE-2015-1317,0,0,e7509e7f3d7ffb43aa884cca1a51842fc22eb1419d8e87275103aa88534c7307,2015-09-29T00:38:52.317000 -CVE-2015-1318,0,0,ca27cd2d5ad0e305413481166ba035a0f44ba030fcf6befcf980e47a30a29ac8,2018-02-08T02:29:00.270000 +CVE-2015-1317,0,1,60d8414af5e2e2bded55b9b61bc78f4acb043b12741188fc01d9dcc756924535,2024-11-21T02:25:09.303000 +CVE-2015-1318,0,1,6db21223f102f35105cedf6e37cb17bd152f2a9554fd6adba4da7ad013a46864,2024-11-21T02:25:09.430000 CVE-2015-1319,0,0,2add9e838c2dff7f487107f1eee12c4ff1306913d5b90538ba858c11f011746f,2019-02-04T18:59:57.640000 CVE-2015-1320,0,0,9e2a4a6cd0720f29246d95183e2e6f7f52df2aba50f90a1613f62037d2810b4e,2019-10-09T23:13:11.047000 -CVE-2015-1321,0,0,27763b2ea08cdf57cd706fb4b07c719fa3839a666cdba046915c888a0c1c62ff,2015-04-30T18:27:28.467000 -CVE-2015-1322,0,0,13eb30e4c2c3e4153a319c4e58fbe470b9dee8719a050b5026ce1f83e99ec3f8,2016-05-26T13:48:48.450000 +CVE-2015-1321,0,1,47534816101e8201daa39eaabaf1be4d93869a86d43d1691e6e7e155f805aacc,2024-11-21T02:25:09.800000 +CVE-2015-1322,0,1,f1cfa5f877e4a7c587950be9a7e03af56329094da0fc7536ded04390ca09c341,2024-11-21T02:25:09.920000 CVE-2015-1323,0,0,3a1bd8191f852c75d570aac44e02167a1ab7d03f7501125337b39c89bc0b547e,2017-07-25T17:14:06.770000 CVE-2015-1324,0,0,0a0bdbd40de055d210c5162237ed77d97d4fe516a025b11181ca7eb9e79c094c,2017-08-30T15:54:07.747000 CVE-2015-1325,0,0,f15bf46e260fb698766bfcc1e8beefcffab1e40a0b201e042d6bff2bee4217f5,2017-08-30T15:20:10.600000 @@ -74878,130 +74878,130 @@ CVE-2015-1341,0,0,341f4b1c3dc92fb7c4710f4fc1f5efd5ab81b86964087fd160617a4100c44e CVE-2015-1342,0,0,ed242915e5941c8841ac9922837f7ce2ce8a4d291031d580ae5f6484b184b26c,2015-12-08T20:37:57.727000 CVE-2015-1343,0,0,70d504c15f95f482e8c070f1e13fe314a008c250632019df07c521e3a759c761,2019-10-09T23:13:12.080000 CVE-2015-1344,0,0,0b0bb895402fe860ca24c2f9ead86af19ef413439ed32106d5cdede70bfffa56,2015-12-08T20:34:27.030000 -CVE-2015-1345,0,0,b3eba78ae21fff43e431a0a7af753f11d361764e4e254eb35277c4ec4426b8ed,2018-10-30T16:27:35.843000 -CVE-2015-1346,0,0,2573772be341629b70754f35a7092904712dc9513a07f5a78bb9fb2dcf87c211,2017-09-08T01:29:48.277000 -CVE-2015-1347,0,0,37cb8c216b17ad8ff11a9e1d70eaa1425b2fadf62775da5ddea7adb5b043b200,2015-01-26T13:49:55.650000 -CVE-2015-1348,0,0,b1c32da7ac5fe58d55bdf8c7003ae4d31d5e3572db0559bb8b2d808172dcfae3,2015-02-04T16:40:28.240000 -CVE-2015-1349,0,0,0232c9754e800664ecfbe7fb92341aa70dd424250b13e5a597c66492dc316dda,2018-10-30T16:27:02.577000 +CVE-2015-1345,0,1,ee8ec15f05221b3aea794a70169ceacfde113776fa0c2ba52ac8497242090154,2024-11-21T02:25:13.057000 +CVE-2015-1346,0,1,ba6a6f64ae85ee6f256a492a429bd238e2bf80a2620de3365df3ca4bc87e94ed,2024-11-21T02:25:13.220000 +CVE-2015-1347,0,1,b95cfd1fabf90003e5e454416f7b4f46e9ca0ee58c886391558b64f9fb3ae371,2024-11-21T02:25:13.400000 +CVE-2015-1348,0,1,b8d3d5652d496fc8894e874cbe623baf33a8e0bc6aff74fe5f7702cf27026ffe,2024-11-21T02:25:13.563000 +CVE-2015-1349,0,1,02187e4e3f1efa510a59581771ad3b184cbd84aafc0d49c6141ec1406a312d82,2024-11-21T02:25:13.717000 CVE-2015-1350,0,0,8250f125338d4d0a8ab26cdcc4fb76966e2f194ca6e58f260d1422c9d5cdff38,2021-07-15T19:16:09.750000 -CVE-2015-1351,0,0,a962584564b5ba12e5201da81baf39fa8dc229ba3aae7323477a20c97c418b0c,2023-11-07T02:24:48.360000 -CVE-2015-1352,0,0,f4560c27e15de227198a9e63d484e838fef9dcea9794948abbafba165b75f2f6,2023-11-07T02:24:48.433000 +CVE-2015-1351,0,1,748464aa1ae4e3219da9429e96e8dbacba2793144a51a02726448b5e029c3380,2024-11-21T02:25:14.073000 +CVE-2015-1352,0,1,93df929659d6befd35fb3927a96da8e69ade967504ddb1eed2c8d61a42c20f32,2024-11-21T02:25:14.290000 CVE-2015-1353,0,0,65588c3232adc64f9bfc0c5fcb45d7d2d715b353fa7fd86e993c70e380acbe64,2023-11-07T02:24:48.523000 -CVE-2015-1355,0,0,e2cd612f63f1606555dcaeec2233dad7292f1cd36fbd084d0d4268c1ebe22329,2015-02-18T18:35:40.870000 -CVE-2015-1356,0,0,c32bf15ff56b0019db79ca07307b4e0a4d0b21d3469150ea8faf460a3fe8cb9b,2015-02-18T18:37:01.150000 -CVE-2015-1357,0,0,a7c21bea5aa94f995fe60a38964de2c9f1fb9d3441dff1da344d78220b4bbecd,2015-02-04T05:19:39.717000 -CVE-2015-1358,0,0,6460755a2ed03c0d4cddd044d37565a9edbfe460e6f0538e443ce69b37d24a1e,2016-11-30T02:59:19.423000 -CVE-2015-1359,0,0,a49935b5ac4f8ddfe39d46ed92bf229108f11e0d7acc1416a542d477a6f7865c,2015-02-21T03:02:33.703000 -CVE-2015-1360,0,0,ec043844afacdaa926932f37f680475c621ba930ebdfc687015471eec4efda36,2015-02-21T03:02:34.750000 -CVE-2015-1361,0,0,6d372d627686125fb943d2473eae0ea6933a0b8c478ebeedd53456962d71d2b4,2015-02-21T03:02:35.767000 -CVE-2015-1362,0,0,0432392f09d582f53bb805e4988ea8e0867249ed4accc5587af2c501b161d8ce,2015-01-28T16:17:39.437000 -CVE-2015-1363,0,0,543d0b133ccc3555e0fbafe859fdfe89ad0112511314c3b2cc4047c4b120e22b,2015-01-28T16:03:07.367000 -CVE-2015-1364,0,0,14bdc42f1cf31eed1bcdb23fa4adc3d4d6cd4b2dca93746301b6572e607dc65d,2015-01-28T15:53:42.703000 -CVE-2015-1365,0,0,d148ee212fb3f3472b70cba13b35293d16fa5c0166eac3b42742aa8a88ce4e75,2018-10-09T19:55:45.233000 -CVE-2015-1366,0,0,f18a5d234eb20b82a2a51412f1a553cf8e668a91344c8e02c5d1a1bfbef45ac0,2018-10-09T19:55:46.123000 -CVE-2015-1367,0,0,e707d210e9b902bc3cb54cb605dbc1dd96399270b903c257086dbd13df599a32,2018-10-09T19:55:46.967000 -CVE-2015-1368,0,0,11f0c47e4bfc63cbe257efc505f967c990e422d7603026f0935ee7df14c9c34b,2018-10-09T19:55:47.450000 -CVE-2015-1369,0,0,b564f59874b7ed296173edd87e995db1acb6a14fea77fab0886fc29a7e92bca0,2015-01-28T19:35:13.797000 -CVE-2015-1370,0,0,188a6bff4f359c4177c9e2a19125b6aa03ee6f5aa98275bbe93a189b6e74b118,2015-01-28T19:39:15.917000 -CVE-2015-1371,0,0,a20dc48d160184e09e75d7e707c6340e2a4bbc9e31a106221adc48a25747c04c,2015-01-28T04:13:01.867000 -CVE-2015-1372,0,0,b08584b2c31fae333272ac9ee5927c88a01fbfbf403b8cd9b3df4075e1e3504f,2015-01-28T04:13:27.020000 -CVE-2015-1373,0,0,8f9a44cca5d82f623d009fd1bcb1e8df7a56603f6afd46699dcdad22b8e7e932,2015-01-28T02:24:27.563000 -CVE-2015-1374,0,0,31e2d70eff6294d5826fb4b1f93b369611144472418ad2c05c9b8375ae46d697,2015-01-28T02:24:48.327000 -CVE-2015-1375,0,0,a04126af2452c75fb9b8a1dca8e8a29789fb29daba527dbdd82762b90d876019,2018-10-09T19:55:48.513000 -CVE-2015-1376,0,0,4ee716fc5887e9eba09d3d0a2620b6e1bfaa29ce35a3b6959f4449f00e46ecf9,2018-10-09T19:55:49.047000 -CVE-2015-1377,0,0,8c1d4cfaa9105ba28e2084ff37e0b644ded6ab7442fe27ec403784dd7e40dcf7,2015-02-11T19:45:04.067000 +CVE-2015-1355,0,1,4ea05d4ec0899a8f83fcbbac6fbedf320aa31bbc866d58ab9ebacaa81760518c,2024-11-21T02:25:14.520000 +CVE-2015-1356,0,1,43c84f928ab6a309f312cd6089c0db1e96db5fe8823636f9da6131b10af4b81f,2024-11-21T02:25:14.677000 +CVE-2015-1357,0,1,4d208b8daa892f1cd0ca74985614d837d8f2b6aa6b92a4bc2573e5a5e251795e,2024-11-21T02:25:14.830000 +CVE-2015-1358,0,1,7c4bab088aed66f1153b088d079977c623665bdf02d1c720a75ea3dcb20f0402,2024-11-21T02:25:14.990000 +CVE-2015-1359,0,1,763674444a64125fe6878fdc41b08162096cf62081598105d4b3f8d4be7f64ed,2024-11-21T02:25:15.150000 +CVE-2015-1360,0,1,d3f7ac1566c02daafd23fcfb590041d0bff1a46732ae37458e360c30165f86f4,2024-11-21T02:25:15.307000 +CVE-2015-1361,0,1,ce7293c90aa1fde58dac965d84975e5d2fae29b02f8828d50b2c351892019410,2024-11-21T02:25:15.463000 +CVE-2015-1362,0,1,15cc0ebbbdbebdf20204026fcf42c108a570d40470200fe4ef36be8bcd42bb5a,2024-11-21T02:25:15.610000 +CVE-2015-1363,0,1,807b27324606e3a227ba43fa162a575358bf787c5501af73b0a4e3b3dcee2fe5,2024-11-21T02:25:15.757000 +CVE-2015-1364,0,1,f2c44de53d96238b7b2b3c6442ded043a8b20718f9a6a7ce1f1575e247e7b31f,2024-11-21T02:25:15.930000 +CVE-2015-1365,0,1,abb946a1f46664351e8eec785cccf99a975d6f8008a48e4651c67b777e4de247,2024-11-21T02:25:16.090000 +CVE-2015-1366,0,1,1dae626671df58470d53c76666154c054a0a5a1fbf6a5b417c3fc26a29c1979f,2024-11-21T02:25:16.263000 +CVE-2015-1367,0,1,000ed25f856c63686867723a9ebf78a102030585601a66a0391fcdbb2dee7447,2024-11-21T02:25:16.420000 +CVE-2015-1368,0,1,6f524d7267e7c01084dd3c7d34f477e1ca0db39341561a427b6f5e80d0655e9a,2024-11-21T02:25:16.583000 +CVE-2015-1369,0,1,be2d25e7b468a0d1d72bbd30965918f5d46738a867d5f596d8190915ee79ca02,2024-11-21T02:25:16.753000 +CVE-2015-1370,0,1,401fccfb075289c873f224717c83352484b9d47393e640ca8ea051421a4fa8ff,2024-11-21T02:25:16.877000 +CVE-2015-1371,0,1,3c273b0afd89bb05519e9de30292c2cc7e83525aeaeb774f0b5c6754172289f9,2024-11-21T02:25:17.007000 +CVE-2015-1372,0,1,4a92f3da382b6ed5ea43e3db352e6d895fa00516ba9460b373a91bb49e3d9d50,2024-11-21T02:25:17.153000 +CVE-2015-1373,0,1,d1ee24fd1c6245f6e2555da783412b30b9ff9ba815ae1cf3fce87bb959682da2,2024-11-21T02:25:17.307000 +CVE-2015-1374,0,1,1c0f82dbc7e79da74e15e814dcd56aa10566f299e923b51e002c4ab979eba3e7,2024-11-21T02:25:17.463000 +CVE-2015-1375,0,1,e24a517f0fee8f0d79288889d59eec366052799dea5b213a124f09aed0c92978,2024-11-21T02:25:17.610000 +CVE-2015-1376,0,1,3a1abb3bea12ff070162eeee90144651cd3ff334c14d84a329b6819d05f28fbb,2024-11-21T02:25:17.783000 +CVE-2015-1377,0,1,7db931d2f3eca4b451bd9a5515084b7c8826bc02e5c0fadfcedc3cf78d08862a,2024-11-21T02:25:17.943000 CVE-2015-1378,0,0,99cf63b7cca2d88064d540f9b160ef1b783ef69699b0f0b8194327e22f069c95,2017-08-16T19:05:45.323000 CVE-2015-1379,0,0,1b953d1ae89c6c481112b181f3d965974511a137bacd640c146d9fed522857ea,2017-06-15T19:36:37.950000 -CVE-2015-1380,0,0,4ad7fb032dd720555eacdff92c0a6152162ca1d6e2b045abafde727628cce99e,2018-10-30T16:27:35.843000 -CVE-2015-1381,0,0,1f367f9ad0221485a6817f831fe7ef1290ec7919efe893bbd9e7ab7ccaf4f3d5,2018-10-30T16:27:35.843000 -CVE-2015-1382,0,0,d447253463e0b96c2ea9e8b317321c2892edbb738fc2b47a788a17b4de0da8a1,2018-10-30T16:27:35.843000 -CVE-2015-1383,0,0,162301886a671c085e33ad34a0954037e4a0941474dca7ba6f588369e3c3134c,2024-09-25T13:10:58.457000 -CVE-2015-1384,0,0,cd9b8dd636cee83624f561a5fcdefe401c750b28230944273a94bed8894e1871,2018-10-09T19:55:49.513000 -CVE-2015-1385,0,0,1cb965c5ee98441680d3c1f1c7768517246a8cfe484410abdeba1ebdb7eb0ca5,2023-06-15T19:57:37.947000 +CVE-2015-1380,0,1,48978bd051bf58561358e8b05e3b597e9e35ef448ce0b7b364e1ee65439e329d,2024-11-21T02:25:18.407000 +CVE-2015-1381,0,1,3565448740d7ed71687f43c5849f94a7a6272d888087556ff98f8f793410bfe3,2024-11-21T02:25:18.563000 +CVE-2015-1382,0,1,827c73d91f2ad4096688ebbb38a70633d6fb3d799c6b38127326c240e0f7f63f,2024-11-21T02:25:18.720000 +CVE-2015-1383,0,1,6fb73a7b0c6252071887e064d1c4fdbe6953c0b48edcfc01c54fdbecf7f62dd2,2024-11-21T02:25:18.877000 +CVE-2015-1384,0,1,6006cd4a772dc60e8184470a102ce3e16a7515ed7e2672946234cc50d956b3fd,2024-11-21T02:25:19.027000 +CVE-2015-1385,0,1,cc08de031187c04403f2c7d8a5c0dd062dcdce1bc67c6ba888c2b42d57992ba2,2024-11-21T02:25:19.187000 CVE-2015-1386,0,0,16974db8920b7aaf9a998c51b8b141893d1526a6715c870f1289136b2fabe30a,2017-08-31T19:01:00.123000 CVE-2015-1387,0,0,f38f9c319bd904229f135b76eea0c492335ae30e9b49f4faaf2b7ebfd4ac38cd,2023-11-07T02:24:49.193000 -CVE-2015-1388,0,0,0016509ca5509f6c0b19edde2e363f02e55459bf67f232ebb6a02889bec90465,2015-03-26T13:15:37.900000 +CVE-2015-1388,0,1,cfa60f2888fc249a35114f55b72ffff14fbdbfa30494fed247ccd52b7bf86abb,2024-11-21T02:25:19.483000 CVE-2015-1389,0,0,eda8afcc916e9cf6a6f3e1f1b6aecda740aeeecd9bdea4227e0c12054dafca66,2016-12-31T02:59:20.250000 CVE-2015-1390,0,0,e300ab240f9405ab52330d6d168b912180fd6974a5a06c4176c736da46176eb1,2023-09-08T14:26:50.920000 CVE-2015-1391,0,0,e4c0cde5a32d9698ea50dd68c6e20617431a58394b9c78cdfa962b6f4352ee28,2023-09-08T14:26:44.737000 CVE-2015-1392,0,0,5310d218435117045bdc5dc6434a41db934076c58bd066f8d4dea8fe6ad29117,2015-05-29T14:46:43.307000 -CVE-2015-1393,0,0,cc2c40508ce9327d138121b4392d632400df3bbfe626f6c94b22e95d038e2ff9,2019-07-08T16:23:37.147000 +CVE-2015-1393,0,1,2ae908b6c9d16a9c305cf0d17f14415d67c98cf5ac2af8d6790760df46646155,2024-11-21T02:25:20.273000 CVE-2015-1394,0,0,427f6be7e82b9575462d684f73ebb64a064d23f6ad1ef4031d74c2fa5aacd61c,2020-02-11T22:14:38.023000 CVE-2015-1395,0,0,1851dc4fbd4e3b0d0a805f6d61072524d7e78a64894043371aa1f910cdbed2a2,2017-08-30T01:13:07.380000 CVE-2015-1396,0,0,8c982decd909047befa7724cd2ed29ae4224fd6a7dd3e39ee453b7fa3e15a935,2020-02-17T18:15:11.683000 -CVE-2015-1397,0,0,6d5a1c9d79e9c42c80de680d5c481b29e530946b25cc0126faaaf8ab1e2509d6,2015-05-12T02:03:26.630000 -CVE-2015-1398,0,0,8a2d7b995947c92c59b4a922a2ca9a01e168951fd36e381ab92763bf0afc7213,2015-05-12T02:03:27.600000 -CVE-2015-1399,0,0,811079188ce136b4bc77ab820db1a4c702a2ee6d09782683e9c9f6e9a3e67277,2016-04-01T18:36:50.937000 -CVE-2015-1400,0,0,9749cd871fa17a4f0473067531d4cd37bcddc8e79285d592cf5a06ad86838396,2015-02-04T16:58:43.390000 +CVE-2015-1397,0,1,b2180a08d0755f28d9f46733d1743b8bfc9215102cec1f3d177c825388baa385,2024-11-21T02:25:20.860000 +CVE-2015-1398,0,1,859b350b7ed06ea54d2e5f2be9aa9ae8bf2058763d7b87069e4a9b776fb448a2,2024-11-21T02:25:21.017000 +CVE-2015-1399,0,1,a9dc27a49794a9232aad5a2b7e7cbe702cb9441b76c95d456de3bddcf925f32d,2024-11-21T02:25:21.163000 +CVE-2015-1400,0,1,a4159f53a1e41360d0e424c7d709622698f5b6335bfd4799b43d4abacb57768c,2024-11-21T02:25:21.317000 CVE-2015-1401,0,0,82d224ae092eacf248e74a8a217a43075b675d2f792a5f24c18f0b0f0f613e6f,2017-09-08T15:56:22.617000 -CVE-2015-1402,0,0,3c302bda91778eb33778384c3829050fa6ab4feedc4cce82d6fd01abc3afeae0,2015-02-04T05:23:50.233000 -CVE-2015-1403,0,0,d0528c5db12b05147e614ac33c777fc14354c089328dea61dab416cc9263acc3,2015-02-04T05:16:12.767000 -CVE-2015-1404,0,0,523e20d5c876a9b7f155a7d44572c8062ba3061b70c1ab26569cd69d9f41afc4,2015-02-04T05:24:15.327000 -CVE-2015-1405,0,0,1eafd0d9530d8fbe2b0e905203d3abbb8564b0249ed4f7e44cc0e14e22b8610b,2015-02-04T05:13:45.097000 -CVE-2015-1414,0,0,d96de23043b99d6ba9da0949188076651182a30f9b0487a369c605dc09338d68,2019-05-30T14:57:55.370000 -CVE-2015-1415,0,0,27e2033e7708e4292f45315d9efacf9ba2357e40053e705ee349e51776068b1a,2018-10-09T19:55:50.513000 +CVE-2015-1402,0,1,afeb1167523825dce5231abd3e68e7d1d0faa6b7ab48189cc580dbf0b60cfe9f,2024-11-21T02:25:21.630000 +CVE-2015-1403,0,1,9b62382e4a001422713467796cc769d869dc9d7a62d5748d17af1f4b9f88f3e8,2024-11-21T02:25:21.780000 +CVE-2015-1404,0,1,05e29397edb1d22297d381671109deb54f72203db838d6f6835849650d80ab8f,2024-11-21T02:25:21.930000 +CVE-2015-1405,0,1,cfd221e9616d3dc5eec1039cc4465b865b59a1eddb1d099f05aa68bcc1432b58,2024-11-21T02:25:22.077000 +CVE-2015-1414,0,1,6a731553a8a0255f83cb272295b34c15917cf0cbfd944d1671b630d8faecb587,2024-11-21T02:25:22.227000 +CVE-2015-1415,0,1,5a33a9e5eb180b27f69e0a0490da8dcdd09de32a94f36fd43450a14f92dd8b2b,2024-11-21T02:25:22.380000 CVE-2015-1416,0,0,e78d9818ce7f02ac252b29f7ebb59bb505db486527f79515b54ba2201040f66e,2018-03-13T19:53:21.370000 CVE-2015-1417,0,0,a713a1ab4bd04039083c62289ba181a9e17107cba005092cefee267e62fc949c,2019-03-20T13:14:14.760000 CVE-2015-1418,0,0,04da0bc1ffe67b74f0d82eda4e20fdb936dfa45de6969a561c537a291fb7af5a,2018-04-07T01:29:00.797000 -CVE-2015-1419,0,0,71bb42f98c277af7ba19dc3cb196797209eb411d4a05b574de1f736927e30233,2024-07-17T15:31:01.647000 -CVE-2015-1420,0,0,c70b358eaeeca6a9b12930ef5b666d981eba8b52cafe5aa1bf2d98fb7d7215ee,2016-12-28T02:59:03.993000 -CVE-2015-1421,0,0,d5af7249a77359d287124baab3d49fe5adefb485af5bae54f795a8716ff8bd45,2023-11-07T02:24:49.410000 -CVE-2015-1422,0,0,3d4a7635e292a4fc28b2f7e515ea195e9aeacfafdb4698ba46a457f4f1c10f6f,2017-09-08T01:29:48.590000 -CVE-2015-1423,0,0,6014988201e182e5a74c8de258341e755f4575d3657efeb0892e5557ac26cea2,2017-09-08T01:29:48.653000 -CVE-2015-1424,0,0,4116d16b07096e158dffd0b4810f800d14ab35eab9d8ed35c673eb1029a245a8,2017-09-08T01:29:48.717000 +CVE-2015-1419,0,1,788907e226dd582581c311f5f19591e99e16d8405ffcffc6c8964f3f0ddb78a3,2024-11-21T02:25:23.003000 +CVE-2015-1420,0,1,552c486239874b813580f0f493aa9c0eb73b9c42366cc8b2d848e8082049246f,2024-11-21T02:25:23.157000 +CVE-2015-1421,0,1,7073a20ce7c393806879fd9dad7c91910f49a35612ef507b7cd4a452140fc825,2024-11-21T02:25:23.313000 +CVE-2015-1422,0,1,ddb49966f21e460218aa491a87cc146dff2e2ebde7a39736df6307078a39d095,2024-11-21T02:25:23.490000 +CVE-2015-1423,0,1,e146691d14c0f169c109eb622ce7e8f67d3fca45fa688f873234c69b8628b494,2024-11-21T02:25:23.643000 +CVE-2015-1424,0,1,97d03d210fb4bce9fb75254dce17cfd1d1b83e02437b94f90f7ffd70de76fb63,2024-11-21T02:25:23.790000 CVE-2015-1425,0,0,9bfec89d47bca3e22e8f30ae732970a2ca4135b40ac8c318cf135a3e5499d056,2020-02-27T18:59:28.923000 -CVE-2015-1426,0,0,2e41d983b9642ff5a7b11f63d5a105bad55cd48bfe5366bf34840786f367804c,2019-07-11T13:00:07.330000 -CVE-2015-1427,0,0,e19ba9264ae917422048e1959af26f0957882e4a1f048aa9f96e0930b337385d,2024-07-16T17:56:22.883000 -CVE-2015-1428,0,0,55a0c9506efa5a9d698deda8afdbb01c4dc5ba93d978c5cc92bc5e2763668ce8,2018-10-09T19:55:51.513000 +CVE-2015-1426,0,1,6893e853804ed0faba32d0ae37ea6f5047208026900d910b6e5a59df0dd227b3,2024-11-21T02:25:24.083000 +CVE-2015-1427,0,1,1d1d484b6ec5feeda8e15f48df33796e289a12a6b419e2510a3ff0250134c671,2024-11-21T02:25:24.233000 +CVE-2015-1428,0,1,6f0f91b0b4d424dd62ce9eb39b1873ef394f3b4ff573f502893be38e66762ebc,2024-11-21T02:25:24.393000 CVE-2015-1429,0,0,000e2d283681e0d7be87a596d5ee9932a6f607e1fb077facbab0652f18784dc0,2020-08-19T19:12:04.920000 CVE-2015-1430,0,0,00662bf5d8fe94b1595d731962c4f266fa4fd2a7dfdcc22e87cdf6edef7aca1e,2017-08-31T19:00:16.810000 -CVE-2015-1431,0,0,ee632140356641d4f2edf4e0f1979300971383c595ea6bc0fd472b554db916d8,2017-09-08T01:29:48.873000 -CVE-2015-1432,0,0,a7efa2c7ce44a55a7e75362011dbb075a64ec5ec0fd9a6584f0de3c9697c91e0,2017-09-08T01:29:48.933000 -CVE-2015-1433,0,0,03acc7c170b5dbba9aef1ad7dd9c49e09b55614b3ef2f3d528f21d98e6873476,2018-10-30T16:27:35.843000 -CVE-2015-1434,0,0,c7e3e3c94ed390767904d814ec587aa12b14c770e34c53a46cf3f85d70c2caa5,2019-03-13T15:54:02.003000 -CVE-2015-1435,0,0,dd2a11fb74778d3c96a7fdd25f2550014b29133defe12851eb3cc6ffa8d42339,2019-03-13T16:14:22.137000 -CVE-2015-1436,0,0,b630332e81d98a7103ae1a4e2ab24d28998e37780477b7c410d317df33299534,2019-03-13T15:52:46.190000 -CVE-2015-1437,0,0,453ef4f7fffadc3f494ac18c745b5d5052de2f98083ae78377ce1d1340984dcc,2018-10-09T19:55:53.373000 +CVE-2015-1431,0,1,084c162c9ef106f7df1895256d5b55977e164d5a72470b81e0f0fbf177b41a9e,2024-11-21T02:25:24.820000 +CVE-2015-1432,0,1,b1c6ac9a86e53a81bcbb962c74f59b9794906c6b11093dd94ace0fbb57d4c92c,2024-11-21T02:25:24.973000 +CVE-2015-1433,0,1,3a5429244547bd7f4e84cee9e8b09840b496acb7427b3c56c45956e8f8e56954,2024-11-21T02:25:25.117000 +CVE-2015-1434,0,1,6a71cef370014c37433b6eefc3243010651b76f3724525d2b9bc557fd7db7682,2024-11-21T02:25:25.260000 +CVE-2015-1435,0,1,f5a20d32648d1bdbde8f3eddba9c768e4c6fab8ec9a5473c27e5be05eee56424,2024-11-21T02:25:25.407000 +CVE-2015-1436,0,1,fc209eddc87202e3b79759357b968ec774bf0e746deea2c8b7fa1a08a7b99f0d,2024-11-21T02:25:25.553000 +CVE-2015-1437,0,1,22b4b97e19cde993296a28b67f7e0cad9feec6710df5601e514627602d77133c,2024-11-21T02:25:25.700000 CVE-2015-1438,0,0,dd0f4226f5398317b527cb3a5587c8d700055f19c6ae711fb9ee90bd03696c0b,2017-07-31T17:43:32.453000 -CVE-2015-1441,0,0,ad7bf74b095f96182c69fb283ca3735865dde5b77ffea05afd4bfa88b3937533,2015-02-04T17:02:32.590000 -CVE-2015-1442,0,0,d4e3c888b58ee85fb7ea80a46f7f5a3586148621b0551d0fed60aab3b0a81719,2015-02-09T14:14:34.497000 +CVE-2015-1441,0,1,62a839a81d83384bbfab51dc715075360cba86778d168646c2a843a32c19d890,2024-11-21T02:25:25.993000 +CVE-2015-1442,0,1,fa6670da9030b092ac11a2b83422caaa361a8b3a5ca84c995c2e343fc719da9c,2024-11-21T02:25:26.170000 CVE-2015-1443,0,0,f47343121a6e34ebe93b6b58d342ae2c39a2d8512676e725ed6da1ad2c5ab3b2,2017-09-06T17:46:57.260000 -CVE-2015-1444,0,0,f84a019232910be66f4f8532363b93b06439dbce9cd4b539fb3c2b5cf3107647,2019-02-04T21:24:33.980000 +CVE-2015-1444,0,1,0c4b5e12883c381f9c0d4dbfb25d22d7578bc93531aa6431796398dffda8d82f,2024-11-21T02:25:26.460000 CVE-2015-1445,0,0,9dd083af8ac28495a99deb35e2eaee78b3297ab49379faf4a0f39cea099e554c,2017-09-07T15:41:27.427000 -CVE-2015-1448,0,0,8e5a8abe7ae155c0d593db8a79ef4c03626d3491e94ed01cddafbbfcc1137c82,2015-02-04T05:27:01.120000 -CVE-2015-1449,0,0,6aa599ead36df5b26b69504961af45eba71738c7057c4da546672e9d3897fc30,2015-02-04T05:27:31.590000 -CVE-2015-1450,0,0,43c9bd10a7c0c25e411a9c5ddab6ab4f162f9e83a8fb83fbc4193b6237c966d5,2015-02-04T05:27:50.590000 -CVE-2015-1451,0,0,8fe6c40c02b9bdfa75ae5f333758b68b6f85cf2ee5517ba9e8ae51b6409aba17,2015-02-19T18:58:47.767000 -CVE-2015-1452,0,0,299ee0f42378004fee1fd9420c98d24836a394ca1ed834b2c190a39df758a6df,2015-02-19T18:59:16.610000 -CVE-2015-1453,0,0,2024ae42cfd19c2bb557fbe5150e275692d1e3b93592aeabda2128f47ef88051,2015-11-30T19:49:23.873000 -CVE-2015-1454,0,0,fee09b75c75266aeffbc54f4bc06154e7607ef33e95ee4fddca328b5ae7296c2,2019-02-05T18:13:48.523000 -CVE-2015-1455,0,0,912bba1654bcce2a6081c90ddcd4c2aeece63837687f9b38cb22b350f3d2d005,2015-02-19T18:59:27.860000 -CVE-2015-1456,0,0,3498c1dad03175a2a63fbc289c7d6216f5521f46a404821ec0dea5dabcbab6b4,2015-02-19T18:59:40.657000 -CVE-2015-1457,0,0,d25613f24dfc8fb4b261b7aab6a9c1cbce182ba59fb5aa0d9476ef0ab52b6792,2017-09-08T01:29:49.293000 -CVE-2015-1458,0,0,d71766949d031a7c07e984788be4b5c71064de355c19c9c2474d14f0e51ff7b0,2017-09-08T01:29:49.340000 -CVE-2015-1459,0,0,4e7c28aa9af6d9aced16715da421c83e6dde56fd1c85acbfa99e3e29db227b73,2017-09-08T01:29:49.403000 -CVE-2015-1460,0,0,65d1570457c7658f9c82f3eac3233b812b78e88eae66edaa152a045cd17ac2fa,2015-02-04T17:51:51.757000 -CVE-2015-1461,0,0,cf4c0a022569d2565bdb49269d0543070cd4d1f445539cb93950c6f7e4a62561,2016-12-07T18:09:31.960000 -CVE-2015-1462,0,0,3af06882d2ebeaa30c4663a80e1ab1c6da47af615f2f81ba49576f777a3d5dd3,2016-12-07T18:09:33.100000 -CVE-2015-1463,0,0,03dd4d74a540c7c695f3a930075b30c17aca6b5d70423707f9e8a3896731ebb0,2016-12-07T18:09:34.193000 -CVE-2015-1464,0,0,0b6423b182356356fa7ffa751583d4a69bac359396f84320cfa45435ecf6f0a9,2015-10-28T02:15:51.970000 -CVE-2015-1465,0,0,e5bc6127054f7cf7de70ec8e1e91fffa8ac8c39a9adf15072c98bfd6db345723,2023-11-07T02:24:49.790000 -CVE-2015-1467,0,0,e88deeca1dce0cc36f18ecfd4afb1ef5733c80898717a5f47bac6ce8df8242f1,2018-10-09T19:55:54.247000 -CVE-2015-1469,0,0,5d908f76b0d41274797a3932011b9a371c3b13fc0adcc010ad2116fe4ca8fde0,2015-02-04T17:53:27.097000 -CVE-2015-1471,0,0,7c6c5441b42eead4468fce1be992e4f6603e83fc34e779ed7f02251ca579c23d,2015-02-13T20:57:29.697000 -CVE-2015-1472,0,0,40fe2d13cfdf766aedb8105d8398d1fbab00cc4b43d98588a5502b61ced03787,2023-11-07T02:24:49.893000 -CVE-2015-1473,0,0,a05501673bf5efd24a608e1064e5bddb196c5470b00e31d55f6242e2acf4f84c,2023-11-07T02:24:49.967000 -CVE-2015-1474,0,0,90808fcce841e055ebd8019b532a0edd2c8950797304c1995394e614e61fef65,2017-09-29T01:34:48.013000 -CVE-2015-1475,0,0,e66b5eab2af8d198124e91e85a04cf66dedbb348652118cdd396709402f4f715,2017-09-08T01:29:49.513000 -CVE-2015-1476,0,0,6c1bfa7ab4b1ca564019f10a1fec8112aac40d41c7b95922d939ac395a8c781c,2015-02-04T19:40:11.557000 -CVE-2015-1477,0,0,9e4e85edc332507e738bfc4f398b6d65fb1618adfc290f0d535c558dac9abeed,2015-02-04T19:54:25.207000 -CVE-2015-1478,0,0,76b50ba8bdbe1f51af9fd83f789da46ee8ed2028c673d716154f1425dc92f447,2015-02-04T19:54:46.053000 -CVE-2015-1479,0,0,fe8abe9e7f642e71397bbc821ff2ff60d6b2a89a4e1e78f079889093955108b0,2015-02-06T20:40:06.400000 -CVE-2015-1480,0,0,e493bc3b3b26a3bb84f39a1e77c706df49978f0eede816fdcefb19527e41e4c0,2018-10-09T19:55:54.623000 -CVE-2015-1481,0,0,380407f5b57688231947df73c257b18047094872851a323980c833708bcde311,2018-10-09T19:55:55.107000 -CVE-2015-1482,0,0,b2ed0790f27c2e692cd56ada5813ff99cce3905a34d6cfd70d2fa3a3b6b6878a,2018-10-09T19:55:55.467000 -CVE-2015-1483,0,0,1a6506db546a9be07d80882e377d45b78860b8518a12e7bce979d4e88e953953,2015-03-12T14:24:32.907000 -CVE-2015-1484,0,0,06e33d9a9e041ffa790bb590fc812ebff094ad78d704e5e8b1f470e12f2d341b,2017-01-03T02:59:48.053000 +CVE-2015-1448,0,1,0080c0349fd37cdf3f7f292cb61123e87eb8d658157121a28b6f8f465ab66bc0,2024-11-21T02:25:26.773000 +CVE-2015-1449,0,1,8d81a2f52a14da4932f32f00145bb6aa81b88cf2498762d09b5ab3d13138d31c,2024-11-21T02:25:26.917000 +CVE-2015-1450,0,1,f259d09039bfeac69de71f782e9d42c35b976ca3027edf956fa78a6d967b9d97,2024-11-21T02:25:27.053000 +CVE-2015-1451,0,1,3782c4212c3bbf64439a6d532ea3140063263a359d810b09c95e3811e2b4a4a8,2024-11-21T02:25:27.200000 +CVE-2015-1452,0,1,ffecb5a100935c737358793b49144d1e4b58ea1284a9b018fae27ebbea8b2a65,2024-11-21T02:25:27.353000 +CVE-2015-1453,0,1,de7fb98e083a6c58a1364e10dbb0c30c306c90b50cf96dd129851e0427f1af84,2024-11-21T02:25:27.497000 +CVE-2015-1454,0,1,23d24aedbe89b847e515232363698c2893014d498ff5ab95588299ce642d34fc,2024-11-21T02:25:27.650000 +CVE-2015-1455,0,1,369c38e55c0dece36a9b5c30549260afcaaeb3d453d6c0ed7a959c7a94750415,2024-11-21T02:25:27.800000 +CVE-2015-1456,0,1,7ad8194af3746416cab71d30b55985f5d73205a9612ff3afd283b271fef33be0,2024-11-21T02:25:27.950000 +CVE-2015-1457,0,1,193513c040aa3f38175477787ac5be03035c02eafaeced0b3bba6c25d5aed470,2024-11-21T02:25:28.090000 +CVE-2015-1458,0,1,55287f8aad386e9cd13caeb3338983a387f90ccf528996aaf8551051b26cd5c4,2024-11-21T02:25:28.240000 +CVE-2015-1459,0,1,bd776133c16771bc234ed7fa5150092c32710ae217eafa951994fad903d663fd,2024-11-21T02:25:28.380000 +CVE-2015-1460,0,1,e1a25e2af02c7631434abd7b26526d54e78810f65f9cb874d86be5d34ce47595,2024-11-21T02:25:28.537000 +CVE-2015-1461,0,1,a8552e34f9affb86507f90eac85b10352e174e3089852a8dec0b056b2afea376,2024-11-21T02:25:28.673000 +CVE-2015-1462,0,1,ed24ac1a7dc93a14b67e485f16fe683cda46321ab7bda160129699e1a88acdb0,2024-11-21T02:25:28.823000 +CVE-2015-1463,0,1,f6524869a3c07056856ed7b1c9021228b2dd8313892e89057d8d55784a29ccd4,2024-11-21T02:25:28.973000 +CVE-2015-1464,0,1,c497b5788319b0a90844a1daaec299945d0a9cc58fa6212723284573dc5af4a9,2024-11-21T02:25:29.127000 +CVE-2015-1465,0,1,2034969401cbdfac648224fbb23ad8d0cbbbab368d82982ed4e9d6db248a20bd,2024-11-21T02:25:29.287000 +CVE-2015-1467,0,1,58557de0d9e8945d47c950bdce5cfd67f93a977764f28ebd1fa7dd625f8b8710,2024-11-21T02:25:29.470000 +CVE-2015-1469,0,1,4b475bce0dcad9e9b19ac4d8a5c323b894a2d1d8982130d27927f7397be16261,2024-11-21T02:25:29.617000 +CVE-2015-1471,0,1,9934b437100196c07b63d458a083749c5f38235067f56ec2f4fc983e8bd12453,2024-11-21T02:25:29.757000 +CVE-2015-1472,0,1,3112c42bc26fa1a2d4e75f016497c3b4865502bc025be2998753f4bdb2d20108,2024-11-21T02:25:29.903000 +CVE-2015-1473,0,1,3a509a8a2f50c9bdf2bffcfe926a5d1a0fe6fffe3ae5a8f4fe79f484bf742c25,2024-11-21T02:25:30.083000 +CVE-2015-1474,0,1,997f13f068f03d84d5f5b586e1c3bd7cdc15390e87451ba1bcdd44b2dffc8ad3,2024-11-21T02:25:30.240000 +CVE-2015-1475,0,1,0e13e50a3b01ad176fbd6ff9fda8f4199b0ee2f36c6b067d998f78435eb4b6a5,2024-11-21T02:25:30.393000 +CVE-2015-1476,0,1,9250ac5dfe706c90329bc2fc3636f82a6bd10e45774ce0194d3caf2948af1ce8,2024-11-21T02:25:30.537000 +CVE-2015-1477,0,1,948c443af7179b497587adf7131ee21f6a6dba1a596c73d9d87480e30f924d20,2024-11-21T02:25:30.690000 +CVE-2015-1478,0,1,3e57103b47d6be64c9ddf6386744f6b23da340035738428ae31b6060cff98fac,2024-11-21T02:25:30.833000 +CVE-2015-1479,0,1,b39edf985573495f985e7386ea732ca396abf436f9c725a376765694c0769666,2024-11-21T02:25:30.980000 +CVE-2015-1480,0,1,8f46c5d2cbcfec08713dc73df7a420dd4b946cf64b01c3b2c12e2305306c963a,2024-11-21T02:25:31.147000 +CVE-2015-1481,0,1,01820c17c8d7b3ea6b40e1e8af05a5c1092370d0e644203155e8567428effb3f,2024-11-21T02:25:31.323000 +CVE-2015-1482,0,1,0f13f30d54336c0f8b9abfadb791ba604fe694a242004ab054e1be7a59b6feab,2024-11-21T02:25:31.483000 +CVE-2015-1483,0,1,faf44792e50f800c1642487f9453601ff0a9d29e6b0431455990e145d3b87f21,2024-11-21T02:25:31.637000 +CVE-2015-1484,0,1,f751a603b4ff5d964432e04958c5705d8320fbb13e7b7c22b6ef01ce642117c7,2024-11-21T02:25:31.773000 CVE-2015-1485,0,0,fea288a4f77d9702cad0ab95c630de5fd719a18a919294ceb9d448a1cb64949d,2017-09-22T01:29:02.157000 CVE-2015-1486,0,0,2fbbb5afc1d6a03ec39b4ebaab75f671d2db4413ccf8621144729d6e2bfc4f4d,2017-09-21T01:29:02.647000 CVE-2015-1487,0,0,dc1757b025d47d6ab76d7e7ea6bc8ecaf2f31b4ea99210d45cd26b5903df1680,2017-09-21T01:29:02.697000 @@ -75011,22 +75011,22 @@ CVE-2015-1490,0,0,608014ffa6e1697cfd16e8d0e84405ccbfb214da217537f11d66241f6b636e CVE-2015-1491,0,0,22fbb51db8dd98f897e2f297fe335ba24bccdab558b6580625611686b70714c9,2017-09-21T01:29:02.883000 CVE-2015-1492,0,0,f29fc8202eabe818fb8acbaa2cf5aefd0f36ccaf59af2abf4d5c2b2fc6114cb2,2017-09-21T01:29:02.947000 CVE-2015-1493,0,0,71d13477c7e30e67050db7ec593b4f682238ca71709def00b169a5aad163fbed,2023-11-07T02:24:50.163000 -CVE-2015-1494,0,0,627803a81f577086db66a8370d143d630e67cdd63cd22c2a1169c02fc7da7ea6,2021-09-13T10:46:48.023000 -CVE-2015-1495,0,0,692e5d18a6af23171bccef8ad8fce2b0fc88813055b7e68ac1cd1632a44a4e18,2015-02-17T17:54:11.033000 -CVE-2015-1496,0,0,fd8967143ded077b55396085912a8b6e37837ca9d224fd708df3a1b6af9f2b56,2015-02-17T17:55:25.643000 -CVE-2015-1497,0,0,96988b13625d570b776ee4355e77355203dd8cdb6f49b61866e67da21f8f90c4,2017-09-03T01:29:01.467000 -CVE-2015-1498,0,0,4dc44792d393794fb777778a000e0db8e68e978089d5995655b208bd561e6222,2016-05-18T22:36:31.527000 -CVE-2015-1499,0,0,e8bbac2db12bfe812d0d2f36ee91284c4a6b475fb66d797faf3fb0dd86cee09b,2017-09-08T01:29:49.560000 -CVE-2015-1500,0,0,dc41d359329e3735a9bafdb77819aeb5b0c5afd7287fd5468eaedf5327bb585e,2015-02-17T17:32:31.120000 -CVE-2015-1501,0,0,7c3db357adb909a0c9d0c58d21375c32310cf89a212dda5061d74d27e28fdc48,2015-02-17T17:33:00.540000 +CVE-2015-1494,0,1,a59d643371fbdfa51e88af85f14241e50feaf5cd5f77e06f651f211c86cf25b1,2024-11-21T02:25:33.097000 +CVE-2015-1495,0,1,68545e1bd78728552088d83001a0c62f7afee592b2506a0dc24d55fb3cf26b18,2024-11-21T02:25:33.257000 +CVE-2015-1496,0,1,619b8de173e369a4f01c3954e2240a27a77c9523ca9a547e805e7b8dda769b56,2024-11-21T02:25:33.407000 +CVE-2015-1497,0,1,d6f98586adc850580680dbae844ddfd6c7b263e22b18f830c5067eaf690df122,2024-11-21T02:25:33.557000 +CVE-2015-1498,0,1,fd7d5ddd65aa9779fc4e5f14e5dd43dfaca8b6ac809c29caa9ec5f4f17be5e18,2024-11-21T02:25:33.717000 +CVE-2015-1499,0,1,113d3fad780bc6deaf6382eb4ed061c04c10ea858dacf5eb941e96c4d418abba,2024-11-21T02:25:33.870000 +CVE-2015-1500,0,1,8ec6241a475c7e976a3f34adc0294086ee9949af406aa132c0b61d5c062ff8cb,2024-11-21T02:25:34.017000 +CVE-2015-1501,0,1,c06c56320c330a0175800569bb662685e2b9dafcbb3edf94fbb3a4d48e886b14,2024-11-21T02:25:34.183000 CVE-2015-1503,0,0,07ba8fd4b58ed4e11973b0545ae8d1d7d28e763d3887dccab8e3d4b9e6fbb9ac,2018-06-12T18:03:31.320000 -CVE-2015-1512,0,0,31391ab7d9b396333b0904f677cb215dfdbdf605eeb7c94081c27663e5c5e1b2,2017-09-08T01:29:49.623000 -CVE-2015-1513,0,0,f69424608655a6d0cc387c56a9e4553c03c6d2c930a616ee9b52f80d58016371,2017-09-08T01:29:49.687000 -CVE-2015-1514,0,0,6dc0002c43a4e9e3abe74af5d3900b27c2324c193b9ea7897fdb4ec2e95cbcc0,2018-10-09T19:55:55.797000 -CVE-2015-1515,0,0,74b9a2d8ffacd334fac86af8aa6e30359984e71041d771ee09cbd21dfe4b65b7,2015-02-21T01:23:36.187000 +CVE-2015-1512,0,1,4201878568876ac32af0bcf5a3174424947a95a8858bc1d05720e8b406281ab1,2024-11-21T02:25:34.507000 +CVE-2015-1513,0,1,67c9cf51ead2fbb6129425edd51b25353334646a159ff09ec72a4de0b513ee3f,2024-11-21T02:25:34.667000 +CVE-2015-1514,0,1,7233d072380fbedef6467b275631f678ec2d1e3c0de3543bc038eaa50f3f1bdc,2024-11-21T02:25:34.823000 +CVE-2015-1515,0,1,65e8ef43c09948e511c0a6a0f57acc1361570d419cbec83f5f34b3539fcd0617,2024-11-21T02:25:34.990000 CVE-2015-1516,0,0,ff7959cf7a36d55df3e7dedd0634239f2c7f8fa38228d4071f8ca07cf66f5a72,2015-09-04T17:29:40.657000 -CVE-2015-1517,0,0,1cccabd290be0c7542a38365eb18a5bf29df464dd7911476588d5c3ada2ff775,2018-10-09T19:55:56.013000 -CVE-2015-1518,0,0,af59b3869a135ea6d4789c0f7ba3f19e923aed3a1dcfa6eb144fb5ca943c00b3,2018-10-09T19:55:56.373000 +CVE-2015-1517,0,1,e7857f647ca792a7a01be4f132f00aa39828184b668d218d2a8d104f06a4612b,2024-11-21T02:25:35.300000 +CVE-2015-1518,0,1,05426f5f3b87fd26b1dec0b8259fad6602af32e5730e872cee18f27dca08ec27,2024-11-21T02:25:35.460000 CVE-2015-1521,0,0,05ca7caf0b06e096cb0cbe8f0e1bc31b87da6de4f76bd657c1105fe5ac5c67ad,2017-04-27T17:46:50.707000 CVE-2015-1522,0,0,0e3e415785552789908f10143a9bbbef03116ee9df8a6f26b2654ba67f6c2e52,2017-04-27T16:48:41.433000 CVE-2015-1525,0,0,7428486c43cdad269d636ec505ed894bab0d47422af6b8b02f63a6d1b61aae34,2023-11-07T02:24:50.357000 @@ -75040,171 +75040,171 @@ CVE-2015-1537,0,0,6e5d0936e220d29ab8c5585856bc0bfd9b0ebe8de1465b671fd5136fdb37e4 CVE-2015-1538,0,0,0a1622fd1ae8847fcbd329f56e77ae4b1d9994c5fe008029fd4055d4a865aefb,2017-09-21T01:29:02.993000 CVE-2015-1539,0,0,1b556d98533fe5d1d1da21ce7e1fb440707c5e30492da34ad571be6a6ae26c60,2017-09-21T01:29:03.057000 CVE-2015-1541,0,0,08b51506234ff1805ac80e0d452764e6983afa0b8b787f61db9e3209a3940fe4,2015-10-01T16:33:49.977000 -CVE-2015-1545,0,0,862d527540d50d6f370836864086d02c50fc31a801e1286c6d5812242fcebd69,2023-11-07T02:24:50.533000 -CVE-2015-1546,0,0,b2fc2d3c66dd13fa3bd9201f096fb7ec5580a1b93b11098ca65cf6502993b59c,2023-11-07T02:24:50.620000 +CVE-2015-1545,0,1,64c2a4dd4f0945e7263431661edf1f94f7d003356a7a059440758bbf23a43c96,2024-11-21T02:25:37.720000 +CVE-2015-1546,0,1,d695491572064e392c9d21a9c967ee087a42f90c6ff1d450c2c2b158c55932e2,2024-11-21T02:25:37.930000 CVE-2015-1547,0,0,5de1c26a40548c6dc08f38210214c43a7315d32f3c9c34f19a5ae3674a6b57ce,2018-01-05T02:30:00.103000 -CVE-2015-1548,0,0,2d4ee2957fdcbc46eab292009af165670794076aeb10eb88e66cf796bd5b4c1e,2016-12-22T02:59:34.440000 +CVE-2015-1548,0,1,958ab72c8f043e11eca9e22756e2df61af64faf54d5253d8f6ef6e7a52ae7474,2024-11-21T02:25:38.270000 CVE-2015-1550,0,0,6e5461c95e29613074e51b14c90979b865063e85c52a861df50258c57dfb25a5,2015-05-29T14:47:00.713000 CVE-2015-1551,0,0,c65e06a70a5f623394ee4b8b0b7700c3d3c7d32a60b2dc7132df265e8e2cb0fe,2015-05-29T16:29:14.097000 CVE-2015-1554,0,0,38eff312b21ff640a9983bb1866a354a2d7353d2bdabe5eb67e4c6286ff004a9,2017-09-05T18:42:05.410000 CVE-2015-1555,0,0,2081e1455c34f47d7496f128141decc9ddcad6630a0cd2025c4ddc2773798d52,2017-08-15T16:04:05.200000 -CVE-2015-1558,0,0,13b92890211e835fe70378f91289e3f0eb0b3f5ab3525f14885129491d1130cb,2018-10-09T19:55:56.797000 -CVE-2015-1559,0,0,66c57f462a2556c1588d31b68069f97e4174cb75b3ec1b38f3c2a298a6c3a746,2017-09-08T01:29:49.873000 +CVE-2015-1558,0,1,ffb8938ecdc6b96d57249b257e7dfa52cc79e9f8fc3f9e53ba12863ba5a9da00,2024-11-21T02:25:38.930000 +CVE-2015-1559,0,1,8d79837a7a48f14c2116112a571144b4561454117ef6edc729c63a9dea07fdb2,2024-11-21T02:25:39.090000 CVE-2015-1560,0,0,d935a3b3b06ec30d1de52ed95cf755ae0d4ca18c44a16d29cff61b9bad69cb33,2019-07-30T20:15:11.943000 CVE-2015-1561,0,0,54a0abd1f3bb37dd0192f52293ea9a90d10bb8c3aa0e6c18dcba8d98b0c83aec,2019-07-30T20:15:12.037000 -CVE-2015-1562,0,0,687b2ef19f4b35f470ab64f5cce0b45daa64608f136eb6db2c20f416aa8dbaa6,2015-02-09T19:16:57.963000 -CVE-2015-1563,0,0,90e01aaff0c27f2fdd184b452737ddc652fa47cefa9f9b73f2a16d51b3db8748,2018-10-30T16:26:53.700000 -CVE-2015-1564,0,0,c25f937f3e428b63fe728d3764d73841fc831afbf89b284c6a889d108a28ffe4,2015-02-09T19:28:43.237000 -CVE-2015-1565,0,0,de471b82ce40b0e8545895e62dc32b09968d1a8fbc5a7f66ddae1cb25b6708b1,2015-02-09T19:29:06.327000 -CVE-2015-1566,0,0,fa07a80b84914810c14cef20e3b26b591e22762521cd31c86f15d721b23b385b,2015-02-09T19:28:40.237000 -CVE-2015-1567,0,0,3812bc0008e55f82d642c3335eff5281d997c44ba471397e3a6b596d9d25e73b,2017-09-08T01:29:49.920000 -CVE-2015-1568,0,0,8641bba09c3453ce906e1dbfc6e7324b84b229456ae9c68ec0ecc41b0511e912,2017-09-08T01:29:49.967000 -CVE-2015-1569,0,0,830e1ec3d441f165a51e3e0ebbb01dc764d1e053f4f4de22706450f51bed4204,2015-02-11T19:44:15.410000 -CVE-2015-1570,0,0,b41ad3f65de40d3a32ac3bf79b3c7448f06e02013e5a4326bd0244ba86c64f29,2015-02-11T19:35:06.533000 -CVE-2015-1571,0,0,ba2bba8f637d23e11e5ca2d50b4afa95f3e934da85c7436aa4835a3867561616,2024-08-06T05:15:34.607000 -CVE-2015-1572,0,0,1f0839985237b84ec491126b2e4d437166caac53a36995be257e5aa6fcf47e92,2017-11-08T02:29:01.083000 +CVE-2015-1562,0,1,42a778a778f72ca4804121db5e4455e26de13cea639738a21cc7a8a488af8dd3,2024-11-21T02:25:39.553000 +CVE-2015-1563,0,1,35806bc70eeeec23f0d029e1b455d3e6eca1794fbafc85db4bc58099a49a7cba,2024-11-21T02:25:39.700000 +CVE-2015-1564,0,1,cdc1245dcfad77a211e5e46f1ccb1076650896b8ece66fe56728693549525a9c,2024-11-21T02:25:39.853000 +CVE-2015-1565,0,1,7356f6c25d0a52f0e81527174a9feec26c5337b66f2f303cabdae47c4f231cda,2024-11-21T02:25:40.007000 +CVE-2015-1566,0,1,e883c7567efc98fde25daccdf6267ba1c2786580986517424dec77fc26885022,2024-11-21T02:25:40.153000 +CVE-2015-1567,0,1,be646f734f39104c5b9c88bb33fd1eeaf57c36beb4d2ccb8fd1361b526fd4eba,2024-11-21T02:25:40.300000 +CVE-2015-1568,0,1,1a2c696d700592c49d6a818bbea564ddaba9df3481a8992c2720b76c366223b9,2024-11-21T02:25:40.457000 +CVE-2015-1569,0,1,4ed26cd1f80cb11ed859de4f4a973076d8d8c1da4292dd7b2effcda8f983538d,2024-11-21T02:25:40.600000 +CVE-2015-1570,0,1,89db29f5c1b424db2c0b069b1997bbb5d9fa8b62a87ddc4d03dc5b680d172570,2024-11-21T02:25:40.760000 +CVE-2015-1571,0,1,40fed532a9a5c6ce33b100206b265cbd4ec899827c15e574dab4131a42d20d7a,2024-11-21T02:25:40.910000 +CVE-2015-1572,0,1,cd23f704144abe35c246a982321a924f4fdfee0fe57b4d2d6cc9f84c06e9f66c,2024-11-21T02:25:41.060000 CVE-2015-1573,0,0,a1000ed07e280d6df41ea321fc6bdf162357ee3aef3443063ac3b58863ef1395,2018-01-05T02:30:00.210000 -CVE-2015-1574,0,0,b4960073e8d76b50950e4ce4c14fb5d916095585516e1debd82821105d8181ab,2018-10-09T19:55:57.700000 -CVE-2015-1575,0,0,1f632733390999f72ddbb1501d5374beef04c02fbfdb1bfc176780a6a6d35673,2015-02-12T17:51:58.757000 -CVE-2015-1576,0,0,8a556b5595ed25bca2d9d6b9921fd0ba265ed54e8305d2edc24575175bfd5190,2015-02-12T17:52:23.413000 -CVE-2015-1577,0,0,39f757537cfb5cc92c5c341e43bc2a9f926754772436ad62e00fbffd73a252df,2015-02-12T17:53:25.307000 -CVE-2015-1578,0,0,ca89f44d289497fec483e5ad7dd60074fba204d1e6862055ff679574b3a61a7d,2015-02-12T17:53:47.947000 -CVE-2015-1579,0,0,6b7c914717b8bdcdc9432fe5d7611ef5180795ee2e233bc61bade2ac9776e17c,2017-07-17T13:18:04.157000 -CVE-2015-1580,0,0,8c1b904afafde28404e6d9dcd79e3aa1c879363c1fdc2319de9a91e0ea652ca3,2015-02-12T17:54:54.743000 -CVE-2015-1581,0,0,ff02ddb46c5a16bba251b24ca520c8c0c8d9df092f19a9827d4ef0e16361790b,2015-02-12T17:55:14.353000 -CVE-2015-1582,0,0,8a80f648e34a4beebfc83541d77cda9958eca94224ba6e8402b2191b7afcb012,2015-02-12T17:55:44.807000 +CVE-2015-1574,0,1,2b02ad8629f4e2bf6a3df522255f370619dcbac349576e1f11a31300ba14a23a,2024-11-21T02:25:41.393000 +CVE-2015-1575,0,1,895a03d2331267d385439e672372bda7e827af6481c040189020726090b1bcc4,2024-11-21T02:25:41.540000 +CVE-2015-1576,0,1,cb82390d8a3596a8ef0a1a3b446935d12ee92c39d9e41034a0beb2243f6c9d69,2024-11-21T02:25:41.687000 +CVE-2015-1577,0,1,fa47f4fb0c83a02b3b67e14be9d807f2b901c2c1bda6ae1ebb7123122fd6e140,2024-11-21T02:25:41.843000 +CVE-2015-1578,0,1,132377add4dc857728d5d4e42eba9974bdb5688d51eca047b21ec0f78f121a79,2024-11-21T02:25:41.997000 +CVE-2015-1579,0,1,eff56db57ede9b29e7199d1269d0dbf90ab6cdbc2425e0be299c36cdecc985b6,2024-11-21T02:25:42.147000 +CVE-2015-1580,0,1,bf1e1f36bcc3f322c27dc164022df2080550ae7a53ea29fc9777ad5c8e85a237,2024-11-21T02:25:42.300000 +CVE-2015-1581,0,1,c262351fd5b5d5df9d7493facd8f6a4dc8001ebc9116b9d912558a56f82d9a46,2024-11-21T02:25:42.443000 +CVE-2015-1582,0,1,c548f11c32c4e25242a9de21ae02872fde61f823a2643a01eedb85de6f198034,2024-11-21T02:25:42.597000 CVE-2015-1583,0,0,6d04de59fe8413d52c02563e21bf3b7a8e8aa0fbaa01c8117c3e8c5121c053d9,2020-03-04T17:14:49.297000 -CVE-2015-1585,0,0,64bcae3a778bd9b386a9bf36a0712bcb16fa6605707e1ff9768457e7c6727807,2018-10-09T19:55:58.153000 -CVE-2015-1587,0,0,fa83b46820ea72af9b83c62c4e885f17592086e42d23a22429a61a76898a1a59,2015-02-21T01:33:49.950000 +CVE-2015-1585,0,1,37d16383851de8923dcfa6da5bd60a3b0daa38598496e6cc81336c07206b45ac,2024-11-21T02:25:42.900000 +CVE-2015-1587,0,1,a7628663c5776b1403c13409e18382f751b09b494440e2bf4295340b55752f84,2024-11-21T02:25:43.053000 CVE-2015-1588,0,0,30e17112cf8ef4f41b1f9cc47ed286449289559f52948432923ae1e91f6a8a45,2018-10-09T19:55:58.560000 -CVE-2015-1589,0,0,57e4286b872b127fa0ac4761d8f65d3bd7b41db7ace2b022466e101f3d76fa17,2017-09-08T01:29:50.077000 +CVE-2015-1589,0,1,0a048d37415081a782ea9a98608098987ce403de31f48bb370dfed0e5a608cce,2024-11-21T02:25:43.380000 CVE-2015-1590,0,0,22742d0c67f0833ce903a1f217ea62ee4bd34972621630194fd2c22139e52bdb,2017-09-13T18:03:38.427000 CVE-2015-1591,0,0,8130dbb39309ad4d382fcef7d05d5bb79e8162a76fad3845cf681a27d19c1e4d,2023-11-07T02:24:51.020000 -CVE-2015-1592,0,0,7054ec6b62323ac15ffd90d4178277b2dee7bdeb18149caef33ec4f229600ac5,2019-10-09T00:20:52.437000 -CVE-2015-1593,0,0,1b50d98a713a04ebb94d13dab533954323da38c405ce22fcfd112fb5b2c18ee3,2023-11-07T02:24:51.093000 -CVE-2015-1594,0,0,da55269a5c0aa7cf54fb0a0a61424f9c887268da223c8d335c04620d749d6a42,2016-08-24T19:55:04.207000 -CVE-2015-1595,0,0,762bf0980ef01c5abb2fc16e9c82fdea99f778f2a4016b152b20e9fa2da658e7,2015-07-15T15:07:32.277000 -CVE-2015-1596,0,0,f94d3faa00aaa2fd37905bb336de62857632a74ee9868d95a268e94a0c1cf0cc,2015-03-09T15:23:47.180000 -CVE-2015-1597,0,0,71d96c568a33c729b145e6d8090eb117396a5a3aaa4061da5110cb6623649ebd,2015-03-09T15:15:52.173000 -CVE-2015-1598,0,0,73f4c0f20c00245a224ff67c8c8de656298bb41fd3ba32f106cbf2d1abca817d,2015-03-09T15:17:36.567000 -CVE-2015-1599,0,0,d4f66d2c9fba9ed23ea7374b9174274b01709fdbd6cc1efe213dc32c17b526d9,2015-03-09T15:57:16.423000 +CVE-2015-1592,0,1,388ae1fc2584cb947d4d11e2f532cd7d5e132a20925a9f4aa7b8bf2fbef6298f,2024-11-21T02:25:43.847000 +CVE-2015-1593,0,1,5a53eb3d7c5dfb464ac64fc42cef0367e8a2889d401c679dae4eb9fb54609da1,2024-11-21T02:25:44.013000 +CVE-2015-1594,0,1,0ccce49ce135121419de6a8aa37216312621cc113c825411c03b73eb31fc856f,2024-11-21T02:25:44.200000 +CVE-2015-1595,0,1,5fb115af239ce834e9ff39c52970e0e3a565e6a1fb556c3ea2ddc3945ad114e4,2024-11-21T02:25:44.343000 +CVE-2015-1596,0,1,65cbc1bda43cb2735756c40b06d00b69203b722c9a5747678195e8a58f90c5cf,2024-11-21T02:25:44.497000 +CVE-2015-1597,0,1,b320effde58b322bffcf0b2bb71ee82355cca9aa42dd1f3142ee6f08c820fafd,2024-11-21T02:25:44.640000 +CVE-2015-1598,0,1,78598f7472389b91430ba006f00ea0c0540dfb6eddeb3c000200727afc66ee13,2024-11-21T02:25:44.787000 +CVE-2015-1599,0,1,e127e86b03eb11240e1169bbd5e5fa1a3566fe45c637af8970a93065df4e5700,2024-11-21T02:25:44.930000 CVE-2015-1600,0,0,5f2608abdbde66b6f065a72461a1a3f2f80020df5a7f79d9d1c27d54ce06e4e0,2018-10-09T19:55:58.903000 -CVE-2015-1601,0,0,46902468ffe4ac5dc2b02022676d4a6d5a307ba78cc5a7610f722edf55f638cb,2016-11-28T19:18:22.457000 -CVE-2015-1602,0,0,2e4190f82416839a2ddf94c3dd82be8156cc6d6c316b6fcb41c0e503a2a3e193,2015-04-23T04:54:15.190000 -CVE-2015-1603,0,0,b176fc4a645435e1282d7f44a59256ed6eb6d9bb08ce610bd5fc0c610d6349d4,2015-02-21T01:38:27.337000 -CVE-2015-1604,0,0,f78cdf88075b89a369764fe2ea180d0e6a33b09bf87c8c981501598fdf3c5e31,2015-02-21T01:40:33.790000 -CVE-2015-1605,0,0,995f77b5e7ff3c933e2d6c66e2e94959a85409727fed1810313e5f9e42058ee4,2015-02-25T16:58:46.123000 +CVE-2015-1601,0,1,3bcb14b74a9375ef50ce27719b50dd166d72cff90cf3a3795ce1aa2eb78e63f2,2024-11-21T02:25:45.227000 +CVE-2015-1602,0,1,32b3ca1a111cca92033e1d4c05c9efa282c01932eeecc7ea6008b2abd4fcb7aa,2024-11-21T02:25:45.380000 +CVE-2015-1603,0,1,5294f4c367660caa273a3120859a41fe7e6565c5d4a97cd1ba27861702bb062f,2024-11-21T02:25:45.523000 +CVE-2015-1604,0,1,0e8353896c8d610d28edc0195dbaf335c6ffc9bc4d1ba5b6fdf837b9e3acefe3,2024-11-21T02:25:45.690000 +CVE-2015-1605,0,1,256685123807d86beafad873721d5863e99a8c6a05114bf961516d468e1d5ba0,2024-11-21T02:25:45.837000 CVE-2015-1606,0,0,d8a94538b8cf1aba3dfa74043e4b6c71be05813e8f9d063775c1cc2c39d79c71,2023-11-07T02:24:51.260000 CVE-2015-1607,0,0,09c13e79614ffd0caef5b4004765929e345cbc598ff200ee7888e3ec62fb5016,2023-11-07T02:24:51.330000 -CVE-2015-1608,0,0,fad76937384fcf261957a564b2dc14b57af559001a081e7703ebe14365964340,2016-12-31T02:59:20.453000 -CVE-2015-1609,0,0,6f7badd03ac24b9b31ba1fef65b95bf6b3941880c86a065cb940b2f5457cba38,2017-07-01T01:29:13.530000 +CVE-2015-1608,0,1,9183fd55aa364c1f918255a9b835bc87c4d3cc5ec4ad0c06f5b5fdb9a7bfb487,2024-11-21T02:25:46.290000 +CVE-2015-1609,0,1,d7f27958bee0d3940e0af3cc7ddda9ce900972b8c2318048277d349713c23ba7,2024-11-21T02:25:46.480000 CVE-2015-1610,0,0,b130238ebc4c6fa1b01694b42eed8a5fb0ddeaadfb5770b80c011647237a10b3,2017-03-23T10:46:11.690000 CVE-2015-1611,0,0,ed7a359d8cc7e06efc86e118ae5f93b47ee76486acdc1fc945b942544c31ab07,2017-04-11T17:27:05.717000 CVE-2015-1612,0,0,87465148d606a3eb892e159c341e4ea587ad639492afba194561139ac3878428,2017-04-11T17:28:04.343000 -CVE-2015-1613,0,0,ae518b18f5e9c498b4019976f26e717b5bbb0040858a08fcdb8aa834800fe29a,2015-02-17T17:13:41.533000 -CVE-2015-1614,0,0,a29dc8331e5f30ef0cdf4b03843458fc8fc4a52ba5dcc7d50214e3d77303c3d6,2018-10-09T19:55:59.280000 -CVE-2015-1616,0,0,56afdd23a7fad188a09f063ef954b71373280bb80435264a95d4e2f32f942267,2015-02-18T18:56:09.010000 -CVE-2015-1617,0,0,7395dd45ea244effe79078412fafede6e5591a4df0800ed952515e70fcc1cfca,2015-02-18T18:56:23.323000 -CVE-2015-1618,0,0,b897acff871932de24530d722662a0cc313199bc2c1911aafb91274b9f848441,2015-02-18T18:56:38.323000 -CVE-2015-1619,0,0,8f8597ae70b7edfd33cc3e6fbf2e7b047e1687356cbb624495b467902b7182e6,2015-02-18T18:57:00.027000 -CVE-2015-1621,0,0,1bab7b8585fd8e330fc3efd21cc5d9761588429485ba6c3ba90df0a8de7ed416,2015-02-18T17:56:46.573000 -CVE-2015-1622,0,0,38237f8bbaea450fec67d4abbcc5fe79b35a2cdd49bd1219c4402036fa9db236,2018-10-12T22:08:27.337000 -CVE-2015-1623,0,0,ae35a8adad733fd35f030a4b33adbf35895588ce26c48d709b9aa94d0adaa76a,2018-10-12T22:08:27.680000 -CVE-2015-1624,0,0,9907c3906a8e64c6eda6e51449030d2d1699fc09bf26697a6ec7a505a28475c5,2018-10-12T22:08:27.947000 -CVE-2015-1625,0,0,5019728ec5ddeda42cc575ccef021363aa71a6fe9ef25bd8f54f1263b2dc5e72,2018-10-12T22:08:28.257000 -CVE-2015-1626,0,0,06df1e5c1ead43f6e6ac2b3fb844155d2d4a4b97bec68649f75e672ec2ab8c00,2018-10-12T22:08:28.617000 -CVE-2015-1627,0,0,e000fd80d2a056246445abec3e8d2a08a0ede5456f2d6c0e4053f9eaa314b44d,2018-10-12T22:08:28.963000 -CVE-2015-1628,0,0,0be74e6314d1e2623285190a08fa38578431907716c12c179683493e079b2a34,2018-10-12T22:08:29.273000 -CVE-2015-1629,0,0,75d4d0738927a6252de606eb3e7a8233a91be9cfa512414c62c3646e1c99a190,2018-10-12T22:08:29.523000 -CVE-2015-1630,0,0,97946a4655338530a7938ea3670c96c3de59a70f7bd408f51e691c328b3b4acc,2018-10-12T22:08:29.743000 -CVE-2015-1631,0,0,7cfde5647a58c270da0259c179bb431e6b01570a98abc07fa163cbf9e29071a5,2018-10-12T22:08:30.057000 -CVE-2015-1632,0,0,f729009bf81e2fc67f28b9f1598eeaaf11919a47fb3f4fb4d6ca2765057521c3,2018-10-12T22:08:30.290000 -CVE-2015-1633,0,0,e284c82da7d8fab5c3f5b14080c22e54279c9c952bbd74bac8114114ac9b1eca,2018-10-12T22:08:30.557000 -CVE-2015-1634,0,0,38392049e039e95fe563e0ab7ce5fde1f7e1c8a8ad934e7eb137885f769653e0,2018-10-12T22:08:30.930000 -CVE-2015-1635,0,0,e4b4587ffe15b326dcb371af824394d5d6605ed2d9d8ec4524ee93bb800ea7b4,2019-05-14T19:53:21.813000 -CVE-2015-1636,0,0,0d6ae2b4904de4d4cca772378801a32804161e1171b08c19167a065d922403a2,2018-10-12T22:08:31.947000 -CVE-2015-1637,0,0,74d16a1bf2051427e52eada3f0e3784b8fda12ec1970659a0f9f3b5e4861ec0b,2021-04-07T17:15:11.950000 -CVE-2015-1638,0,0,8bb9d03dd8081318c5083ec90d3b4c3a8d7e1a6944a4a0c3857427f9b58f142f,2019-05-08T22:03:15.720000 -CVE-2015-1639,0,0,a7ff8f25ac2d528b8368badf316ae3492f0d84070eb652417766404dca15793f,2018-10-12T22:08:33.010000 -CVE-2015-1640,0,0,fd605648b3af988cbc285cb1a0e07c6c15c4f3ea4e15e865fde82b35e40a865f,2018-10-12T22:08:33.273000 -CVE-2015-1641,0,0,3e0bb186b6d084d06a758dea92f669a0e831f94f1dfd47de90f8b4e8e8a30656,2024-07-24T17:06:41.523000 +CVE-2015-1613,0,1,b6a7f413ce7676d71429dd0fe2fea998d3078d7c4814f0d23d141bef4beba786,2024-11-21T02:25:47.160000 +CVE-2015-1614,0,1,a0549e15b8794cf03e631744bac0d2daae8d3e83c499b0ec6d2c8652af8855ff,2024-11-21T02:25:47.317000 +CVE-2015-1616,0,1,a8d0eb74319133c9739688e2a0357830ae75a2056edece5abdd0152ec3825907,2024-11-21T02:25:47.467000 +CVE-2015-1617,0,1,c91ca048ffde93fb68cc000ee47a402d087a746efc53fd1240487aee3b1d8d7c,2024-11-21T02:25:47.620000 +CVE-2015-1618,0,1,4dcd30663d099c6f10fc7c093bcad9af8fde851474d7282efcb6c05fca4c6374,2024-11-21T02:25:47.767000 +CVE-2015-1619,0,1,da5265259814ed3dec36ab02c44f155b5526b8532c2257f2e14490e23cf4156a,2024-11-21T02:25:47.930000 +CVE-2015-1621,0,1,878970358cd5a13366a8fac8f6ebcae3cc093eac69d8e9d837d9ceb136cbbdc2,2024-11-21T02:25:48.077000 +CVE-2015-1622,0,1,5f9fe6c5a066acdf8d878404b28c212efffbcbfd5ad89b16d95cd86c6d690e9e,2024-11-21T02:25:48.233000 +CVE-2015-1623,0,1,c4ec106c6b32e3bdbebb9a155a11485891ef7663381b15bd3ec546cc51b8c2ab,2024-11-21T02:25:48.353000 +CVE-2015-1624,0,1,03ec0a840d94ed514c4f354b2cec67e9079e2fe0837ad6357368cac9a406b8ec,2024-11-21T02:25:48.477000 +CVE-2015-1625,0,1,924952c8e0934e07aa69ae655bc96481de4c77150bbfec459d1ba9a1adc75ff4,2024-11-21T02:25:48.593000 +CVE-2015-1626,0,1,a0f7595352a9f4dcfc4289fe71985b031338dc460f18de4ca648992dc4ad8bf9,2024-11-21T02:25:48.717000 +CVE-2015-1627,0,1,1d910b113ab3bdb3df91fa3c9628d867614f66ac98ede72567f000baacf69dc4,2024-11-21T02:25:48.847000 +CVE-2015-1628,0,1,b077833c0a6ffa85e61fb3595e1e4a563192da31e5edc2787577258704663c10,2024-11-21T02:25:48.960000 +CVE-2015-1629,0,1,03ae1d0c3632a453473d0cd1bb882340013eb6869fcdd63af6e3e66d67b12dfd,2024-11-21T02:25:49.067000 +CVE-2015-1630,0,1,dd75a74b3a0788fac0a305e218028d6c907e0306e7395c58419372df7fd5d8e8,2024-11-21T02:25:49.183000 +CVE-2015-1631,0,1,03667a483e1243265f30f30306abe95b1ef80c22c851a59ca8f4d997e413ab9e,2024-11-21T02:25:49.303000 +CVE-2015-1632,0,1,0cb2ad97c3d58cf395101ae85bc13357c6a60e1926e33477edcf3a7f3f9b4890,2024-11-21T02:25:49.413000 +CVE-2015-1633,0,1,22cdc39cee4498c3aad84f287479e3d54bead92f36ad55b646ee4dbd33ba2eb9,2024-11-21T02:25:49.520000 +CVE-2015-1634,0,1,34b778231e8620a788cf7de3365ae6086fd4af5ff457b093063e94c1ee51d6c7,2024-11-21T02:25:49.640000 +CVE-2015-1635,0,1,06ef15424b2ecd39e93df19b23000e2778c71f164a1cc9516f84102596f70178,2024-11-21T02:25:49.760000 +CVE-2015-1636,0,1,9b7f0d94040e78ea04d6334617eb17078eaf048986595747aa29eb318dca51bd,2024-11-21T02:25:49.890000 +CVE-2015-1637,0,1,b6c9e447c1320cc11b1463bfe282820f1340bc5f695dcdffe36c20c24d13086f,2024-11-21T02:25:50.010000 +CVE-2015-1638,0,1,83571ad62d7fb0e555004a77dd35980eae877b4a8e279f49242eed08c94c6740,2024-11-21T02:25:50.140000 +CVE-2015-1639,0,1,9b490d10ff7438a9c2c54be931bb85a74341374c054bb57a6e686fbc828ba74d,2024-11-21T02:25:50.263000 +CVE-2015-1640,0,1,871e00aa901b9ec1c5ae099090f89e5c445e568c425f59fa9f43cc57759d59aa,2024-11-21T02:25:50.390000 +CVE-2015-1641,0,1,b5a9ba2accc58f348df1518127a7a048ce2f69723e29629cc32197c35f633a3f,2024-11-21T02:25:50.510000 CVE-2015-1642,0,0,9b5f63e9c3fdcae425cc27f7eeb2782afe537b08b19f8e5baac9f9908bf90dfb,2024-07-16T17:34:22.490000 -CVE-2015-1643,0,0,36b19c692e9ef1fcffe6fb4943eb124e3225a474579fc315c67b7774c1b726fb,2019-05-14T19:59:23.087000 -CVE-2015-1644,0,0,2cdaaaf587320554f4b82bb18a4fb198cbdf2ad09d931be218c14437084a76ff,2019-05-14T20:10:07.177000 -CVE-2015-1645,0,0,4a26d25d02bba931c642349b91aa3bb910bc91cbf5141b60e93810e51c159cd5,2019-02-26T14:04:02.400000 -CVE-2015-1646,0,0,c9a6f16e2cc312fd864d5a461468037891bd3fa7b774dcfa8be95b2dbd39a6a0,2018-10-12T22:08:35.133000 -CVE-2015-1647,0,0,e641d249b8e3b7aaba7bfd6167adae91d08ba75416a56b13fd0b57adb4c4684f,2019-05-14T18:51:38.177000 -CVE-2015-1648,0,0,3c5726f2b671a02150b549506f9927759338784cad9b755a053ff17cf6ced69e,2018-10-12T22:08:35.680000 -CVE-2015-1649,0,0,b97d4f4570f6fab050173fbb48f8fa84bca979fe377d36ed0caeccc0f1cd1d36,2018-10-12T22:08:35.930000 -CVE-2015-1650,0,0,372b63e767b80feae971ecf94fd2945d2068ebdaf616f0d8c1290cd9f2042495,2018-10-12T22:08:36.150000 -CVE-2015-1651,0,0,fc7867137646f755ce4938530ec1698a118105251512ce0cc259477cbcf7c62b,2018-10-12T22:08:36.383000 -CVE-2015-1652,0,0,efd16ee67fce6c65fd345c04c9902015d81053c613e0e1b242de5dcd754f3d48,2018-10-12T22:08:36.680000 -CVE-2015-1653,0,0,80d4786e68c4bcfcd5600368d4f27bae0a69229344ce27491ec64052a7b9771e,2018-10-12T22:08:36.993000 +CVE-2015-1643,0,1,c939a2919ceee334cf56b00c335d7d4212e554019d42a87af89ee430fbcf06b6,2024-11-21T02:25:50.753000 +CVE-2015-1644,0,1,1cd17c6297c7c30befb86cac87b09d6a94e67de627b93b34fa15ab25b7f99058,2024-11-21T02:25:50.873000 +CVE-2015-1645,0,1,01828013465b6bce8552ee8f9c1bdbabbc13acc9878c2e4419dcfddce21e5609,2024-11-21T02:25:51 +CVE-2015-1646,0,1,637820240e08ed9460bd1b1d8ee1a222ffd0f4d71a9989c8e1a323ee5521e60b,2024-11-21T02:25:51.120000 +CVE-2015-1647,0,1,70c488414dbdb0ccf4a1cf3206143e9e30bbcc1c3d94334fe5055052c373c246,2024-11-21T02:25:51.230000 +CVE-2015-1648,0,1,e239441c0eeecfcb68e5d98797731eeccccbb2ebd16d96e1eddda3888eb74054,2024-11-21T02:25:51.353000 +CVE-2015-1649,0,1,08edf4a723a9c8f3f32beb0840d8f65c0ad80e733be1fed718a0ab0bcc4b34a3,2024-11-21T02:25:51.463000 +CVE-2015-1650,0,1,c7ebf834d0efcf005b04b167207a3fb01264172983393a18327058d8cafac782,2024-11-21T02:25:51.593000 +CVE-2015-1651,0,1,d57e4c404ff8dd4bc5a874dd6ea638f37a77326923db3c9dbf8abc2d70c76e23,2024-11-21T02:25:51.710000 +CVE-2015-1652,0,1,e5e24ff1e916674bb2d8bc10706b8692d03b6a9f6d35549c072965b8941038aa,2024-11-21T02:25:51.810000 +CVE-2015-1653,0,1,e148265e8137850e4c4d08722d54fae82e2f7efffa7572e3aed6f14fa374a926,2024-11-21T02:25:51.927000 CVE-2015-1654,0,0,5440812858868af3030bc671978a846a0621d9e449f7c714c09b3703c2f37eff,2023-11-07T02:24:51.760000 CVE-2015-1655,0,0,5c563d7f582d7e837d14b826e07dc327cb2a71845a4fa7a92092e711bdc525ae,2023-11-07T02:24:52.030000 CVE-2015-1656,0,0,564399d4b366dfbd657f6842a1e4944beca44b6bd6d5280d90ad1a5921660a6e,2023-11-07T02:24:52.270000 -CVE-2015-1657,0,0,3a921cde909da46271fe59338fab9fed315a1dac3f5694cab4f2481d9b5f1f06,2018-10-12T22:08:37.227000 -CVE-2015-1658,0,0,1657dc9eab0e182c0d75042ba1a258772561f05039f9a7517c932f370be28139,2018-10-12T22:08:37.527000 -CVE-2015-1659,0,0,f0df8820cee5b9149d4571563bbaa78f3a9a8d9862dc22dcc7c47c961343f4b9,2018-10-12T22:08:37.883000 -CVE-2015-1660,0,0,5fa1ca93d1490bb762ea342692e33d54ea1b659c99570495944884e25047ac53,2018-10-12T22:08:38.227000 -CVE-2015-1661,0,0,c0d8b5d1b526bb9099cc94fd2755d72241950ce5988df6afca6a3febc4d70734,2018-10-12T22:08:38.493000 -CVE-2015-1662,0,0,78f2cc6fbba935ad2578484feffd80d786e1e6fc95bcf9c9576de151e1462821,2018-10-12T22:08:38.837000 +CVE-2015-1657,0,1,482d2617efc7b71a9a1961e2bfb69e7d131baff84b7aa7c0090b9d2870d63683,2024-11-21T02:25:52.103000 +CVE-2015-1658,0,1,1f07c429046fe7bd00797cc41d10f4a2debcb2e7752fb299dbdfd60b42a11f81,2024-11-21T02:25:52.220000 +CVE-2015-1659,0,1,bafdb2cfef0a45c540599cae38178c7bc966bedf4d090dc272722fdc357dc205,2024-11-21T02:25:52.353000 +CVE-2015-1660,0,1,c0f1eeafaad2949a1be350f76cec441bf4be22c04227fb272497887021ee2f4e,2024-11-21T02:25:52.477000 +CVE-2015-1661,0,1,22158a69571e7e6602399d977696495659ceabd9b848fdb22c49b9303b464c40,2024-11-21T02:25:52.583000 +CVE-2015-1662,0,1,8d20c873111da9f96ac777d4bc3feacb9acd638bc6a28a1fef0d663c9ca83ee6,2024-11-21T02:25:52.703000 CVE-2015-1663,0,0,4e475b22da852a8ce07447b0ab1a99059bf8c3188ec7f8fef0d98166f954fcfe,2023-11-07T02:24:52.550000 CVE-2015-1664,0,0,79dfbcf6041e8573454863ec2cfbd948a495d8d34064a3e9179968fc82c8a081,2023-11-07T02:24:52.763000 -CVE-2015-1665,0,0,1ad12c93e95712aec041e714bb345f671f3f19b62c9ce1423472fd19fedcfb10,2018-10-12T22:08:39.040000 -CVE-2015-1666,0,0,70145fd95e341de32deb13d34caea5796fd3d4a637e20958cf383a6c192f3721,2018-10-12T22:08:39.400000 -CVE-2015-1667,0,0,4879f1070a2f190814415ed4d9eb98dad7ccd2a6f974a67b155e61234b08379d,2018-10-12T22:08:39.633000 -CVE-2015-1668,0,0,8c315714dce466659e72b4afe0c02561d3450d3c088f9487855611257e624c09,2018-10-12T22:08:39.947000 +CVE-2015-1665,0,1,6ce56219e0cde7edcec56e2613862b49d1fc9575a9dcbcfa91dab179c33d3a89,2024-11-21T02:25:52.860000 +CVE-2015-1666,0,1,b679dce07caa49b3f50bf5e9a70bd704eb1e5d2f4ab83c9479080cd096d44010,2024-11-21T02:25:52.973000 +CVE-2015-1667,0,1,3833cd3870be2dbd674fa329bb18556e4194461131d8887b461b814d57681b6d,2024-11-21T02:25:53.083000 +CVE-2015-1668,0,1,c6039bb22f4e78094436d4031d27cef06453ea9c004556b6f1e73cf1f9bf3b28,2024-11-21T02:25:53.203000 CVE-2015-1669,0,0,9e9377f53a9179c1e8bf02f36eb329dab88689648a3ef1206b44b2d15a59829f,2023-11-07T02:24:53.023000 -CVE-2015-1670,0,0,59079c5be3a41a6018ab505769be74bba17198b5dc700d63376d8a368e840a84,2018-10-12T22:08:40.290000 -CVE-2015-1671,0,0,901cd094168506fc5d0b214cee219cf51f307c49b929c0e0835436a7eb124716,2024-06-28T17:26:19.513000 -CVE-2015-1672,0,0,d938bafa3fcae5ccea5c22c7b320cfd076ff554e61db43badd1f1a2b18c96068,2018-10-12T22:08:40.900000 -CVE-2015-1673,0,0,fca44c80a71a9741f4e9cfd2a799243857326b76d6f93540fca05f9b0612a3e9,2018-10-12T22:08:41.260000 -CVE-2015-1674,0,0,7f770c81af5f16509f563a093cb2a34d12141dc72400b50d722390e9184cd218,2019-05-14T20:30:42.203000 -CVE-2015-1675,0,0,e8b626cbfb819c1993c26fe8d564ca499a40a0e83f50b8211c9c1a8d1540c50f,2019-05-13T20:21:00.653000 -CVE-2015-1676,0,0,e9aee8d46060cf6fd0a9be6c9b621f74a05e90caf79192054e6896bdd9c981c8,2019-05-13T19:55:41.997000 -CVE-2015-1677,0,0,0bf3f3bf87c15bb0c9167aa57c1084e08a568ecf12e5193f7e392cca107ddbe0,2019-05-13T20:17:59.367000 -CVE-2015-1678,0,0,b03cb9e2235413eee510c309a89c7f3570327360529156014f7953089266fe3c,2019-05-13T20:24:32.237000 -CVE-2015-1679,0,0,e41f42275ce871ef6b95fe4ad3c2fd3176936e67cf93b0cd288109d2fa4b185d,2019-05-13T20:30:17.430000 -CVE-2015-1680,0,0,894e2b3169a72755ed2faaac8f52cd336b9710fd8c6b0af7e6debde42bfdbd4a,2019-05-15T17:01:00.790000 -CVE-2015-1681,0,0,d054cb45fb2d6febffa978430130cde158181e3db2cdb60589613353202e14c5,2019-05-14T13:21:44.990000 -CVE-2015-1682,0,0,a9a36d495660de08ec339deb9ec1206966cacf71d7d80c59b9b2774a51ae8b40,2018-10-12T22:08:44.213000 -CVE-2015-1683,0,0,a86caa0739f9c9cb0ba1eee107f8b70dab3fdd3a2afd5bcf21b8a113c6280126,2018-10-12T22:08:44.650000 -CVE-2015-1684,0,0,44a7cda62952a9364260f8436422f236e0138912d601fba95d881bca4f771ac8,2018-10-12T22:08:44.917000 -CVE-2015-1685,0,0,ff118c6985633cc76b2f5c93fccf94924dc198b9fdebb54d6df8ae800be88f42,2018-10-12T22:08:45.417000 -CVE-2015-1686,0,0,117ace39f399997bf194c7e653dbd2a784a90133b29c8b7d3065f97860e5d18d,2018-10-12T22:08:45.680000 +CVE-2015-1670,0,1,88751eff371e826cccf31d77f9356ff238df2b36c80966d4d5a6f8f267019b65,2024-11-21T02:25:53.337000 +CVE-2015-1671,0,1,ecaecb829f860f3d8806785e43dc32c04dae8233cee04ad0d53ad91122fef071,2024-11-21T02:25:53.453000 +CVE-2015-1672,0,1,cb2a99bdd812da288255fa19d8a9e83dfcb5fc9239993beb91b2a2b0ca16131d,2024-11-21T02:25:53.590000 +CVE-2015-1673,0,1,674b216947fad8001c31216316bfb1de9cb11da576e84d1e2a8320762c1b3538,2024-11-21T02:25:53.720000 +CVE-2015-1674,0,1,fdad3dbc5ce33c49a1e27b74f87c6a7d728b9864fef4e13bf6bf6db0f8b9e2c1,2024-11-21T02:25:53.823000 +CVE-2015-1675,0,1,ad975b93a8665e3143b2c25f4608a1595c110d1fe6050fdd0b2e2292c149dadb,2024-11-21T02:25:53.960000 +CVE-2015-1676,0,1,621b2d4d1f73a1e9919c88fafcf305caa46a322e02746ea0f8e57ade770422fb,2024-11-21T02:25:54.080000 +CVE-2015-1677,0,1,804c0375223b148d482f927926d952e702529a7f9a77e6a2edb98c781bbe9f30,2024-11-21T02:25:54.200000 +CVE-2015-1678,0,1,920cdea9ebca89ef74c35bdcdadb96c3b898cd7def1a96cfe8ac9a76036ab37a,2024-11-21T02:25:54.347000 +CVE-2015-1679,0,1,42397bba2c7c271de47cf814d8109bddabdf39aeeda8129a56d378002187ff1d,2024-11-21T02:25:54.470000 +CVE-2015-1680,0,1,17ead57bbe0a10a55cfda15ec1aa371dadc5e9e387974d5e77203b0cc5829412,2024-11-21T02:25:54.597000 +CVE-2015-1681,0,1,b9eef59615ba989b69dcf59262ba77e5b0205d2f1e1bbcd0cc1900cf4df2aa25,2024-11-21T02:25:54.717000 +CVE-2015-1682,0,1,b5ae43debae1f729d462c7b4d5ab6a29b0fbfb1a86856c45287a20b61f7f0975,2024-11-21T02:25:54.843000 +CVE-2015-1683,0,1,933e3f40ec5bf6f1c680afa77c1e4d1deaf18e6ab064c2a5e4f4421fc33b9bd0,2024-11-21T02:25:54.967000 +CVE-2015-1684,0,1,0024c3d9695054d1849e45bea9364822780a37a65e3b69391a136a14a8804101,2024-11-21T02:25:55.080000 +CVE-2015-1685,0,1,682a317a809bb5981657431b4f49e31cd9fd6dc7bb945e0682be8be2892d811e,2024-11-21T02:25:55.203000 +CVE-2015-1686,0,1,1e5c8cc884df225ca2113279a09e8014c292b61f1d05a7be977d328efbe7f9dd,2024-11-21T02:25:55.320000 CVE-2015-1687,0,0,9e2cab682d860d2d4d38fa1cf25428cf1eb91c94dc915b8e0e72d0e7aa295cbb,2018-10-12T22:08:46.183000 -CVE-2015-1688,0,0,5e964ec210661faf4456f996e0e397802941b68ec612b943d48618d8ef7508a0,2018-10-12T22:08:46.400000 -CVE-2015-1689,0,0,21f3e2ed55d3b206529705274c614cea9bbc77de08eeb423e2c3f501c07bfbd7,2018-10-12T22:08:46.777000 +CVE-2015-1688,0,1,f53e37cd898cd8bd824e0afe1aeb50a14a1019ff96176c8a4c44a1d931d443b0,2024-11-21T02:25:55.580000 +CVE-2015-1689,0,1,2e75d90515eab13806471cd6e450f1b2a6f949d5edd5231b92ca9e0ab83bc402,2024-11-21T02:25:55.707000 CVE-2015-1690,0,0,e144a43b2dc938468cde26da31fac7c59ce10d54c719a866c760dd94fdc01cdb,2023-11-07T02:24:53.383000 -CVE-2015-1691,0,0,509359e6dd990388dc8cbdbe5bb0e8fdf8c2b135a2d7519439feba2a25d7a807,2018-10-12T22:08:47.120000 -CVE-2015-1692,0,0,28e15b9a9bcea1a60d748ec14e4d587a261d00e6c621a73b69c344fe3f36f1ad,2018-10-12T22:08:47.477000 +CVE-2015-1691,0,1,f5287571c0f8f9979cfada2ab33ad8c7a33403b5bd14b8808ddcb1c5f028464f,2024-11-21T02:25:55.860000 +CVE-2015-1692,0,1,74dc3b91171137a53a98fd318f1e3eb9cdab06f8e457e91d12d05b95c9bea91c,2024-11-21T02:25:55.987000 CVE-2015-1693,0,0,804326c008dd61d595bbc98724c6bd3a7213c91fd2eb35a7e85a4478c841ee9e,2023-11-07T02:24:53.610000 -CVE-2015-1694,0,0,f839140acc115a735a24d4b39b9f1128f3d88f006da5011f389ed9965d909fff,2018-10-12T22:08:47.870000 -CVE-2015-1695,0,0,0c9e21be2a723b9f7a79e5d1b7edcc552ae249149b0636198ef28e1489dfdbee,2019-05-14T20:45:13.370000 -CVE-2015-1696,0,0,02474be30a1a956fb38e551074230820bfe12d89a3239ee220dc2d9175c5bd11,2019-05-16T16:30:28.657000 -CVE-2015-1697,0,0,81b44390b66239dac1cf8b7fe79729c27ce553be513dc688059bf8fc6a61068a,2019-05-15T18:13:26.793000 -CVE-2015-1698,0,0,aaf47cc2798e2dea9f4cda16ec091c33d3f9fcbf0afbfa2119daf59892c4956a,2019-05-15T18:17:29.790000 -CVE-2015-1699,0,0,6fe5462da1b7f0ad46c911f385eff9e397e8c0292ab5de4dd9aedf19607b0f32,2019-05-14T20:51:20.523000 -CVE-2015-1700,0,0,75cfc99f57071420d81efb1fe05feb0b3cf82feed393c20fdc7ef3ae242aa820,2018-10-12T22:08:49.777000 -CVE-2015-1701,0,0,3c25c1e445278a8a0aa3c318f17f385bbc18b68cf9436f74d4dabe4ffac246e5,2024-07-16T17:34:33.033000 -CVE-2015-1702,0,0,d55891a7a87149d39da2cfbed3c1f89505095f182b7d6f09e92e74e958b23848,2019-05-15T16:56:02.190000 -CVE-2015-1703,0,0,4632f69894e73aabbfbdcd9aa47433aba7b4cb50d9187aa56fa7e3eef9a7dee2,2018-10-12T22:08:51.230000 -CVE-2015-1704,0,0,b614cc7671c33baddc732f94943c66d165499a223a0db33257c6caac12005b4e,2018-10-12T22:08:51.573000 -CVE-2015-1705,0,0,5ce1682bd1ffbd6126c05ea43701a79c697d3d467ffce0cf4466571d6222db6d,2018-10-12T22:08:51.980000 -CVE-2015-1706,0,0,32938de1f1a607d98bc750499364c570228558d3c4053010db24e7000cafb34c,2018-10-12T22:08:52.353000 +CVE-2015-1694,0,1,c70626de2ba23cc71087210d5b71f9071f458901bb7d2e11da96e61dadb5e78e,2024-11-21T02:25:56.137000 +CVE-2015-1695,0,1,18673984c0c082050a4de8bcf351feb929a9f296be6b67b54a9628dd0d338bce,2024-11-21T02:25:56.260000 +CVE-2015-1696,0,1,e894d05d78454ade431b97a7c8ea358079a4c74dbff4ebaad8017f40bb6843ae,2024-11-21T02:25:56.393000 +CVE-2015-1697,0,1,579f409dd1971dfab0cb8c3d520872b494f8c62d4f698a8d4ee2fd807efd3e9a,2024-11-21T02:25:56.513000 +CVE-2015-1698,0,1,4b5368a69bfaef919ffeca08f71a36791354618f853905aeceae898736a03842,2024-11-21T02:25:56.640000 +CVE-2015-1699,0,1,25b6e15a18fcd667c2737f9759e8b1c046af7320793d3a549e91683a45c275cc,2024-11-21T02:25:56.767000 +CVE-2015-1700,0,1,bafc385e57c94a022168d1e2e649fe60e862faa8d29762a40cb66fadc91f3efc,2024-11-21T02:25:56.943000 +CVE-2015-1701,0,1,c84cb84488e9ae0d3754a645ab820c9808ee13d2c9d8c44fec412da12a401015,2024-11-21T02:25:57.643000 +CVE-2015-1702,0,1,15c677540ffc6d41e92012a3a28cc6736326aa0b987a46e4f14362237f2d75ad,2024-11-21T02:25:57.800000 +CVE-2015-1703,0,1,e59a184ac36b357acf7353fd10830b9b55805cc6fa7903ef8724fbdfff8a254c,2024-11-21T02:25:57.963000 +CVE-2015-1704,0,1,2e76f684222ef29116aff770dc79d6b713a422b56cb5d948c68acb68b4be9baa,2024-11-21T02:25:58.077000 +CVE-2015-1705,0,1,5e339f39fff168e9189b3b719f8098396608dd831ae53de30a6ae589054beb10,2024-11-21T02:25:58.193000 +CVE-2015-1706,0,1,4922fbe3fab9e98d4fd3536996ff243ad682d138021cffde85500059fbb2d4f4,2024-11-21T02:25:58.310000 CVE-2015-1707,0,0,cff7c17b179aab584e77493fcad6c51d80d939a789f3ea286fa48bc7c4c287d3,2023-11-07T02:24:53.933000 -CVE-2015-1708,0,0,5e2c1f031b97a30bf4b20114eb69f37fc3cf20b49d517e245b549165bbafa549,2018-10-12T22:08:52.667000 -CVE-2015-1709,0,0,c181a363549d6759212930a6ff93fc5003a4a9a1410d176fde2a167e4de3f7e2,2018-10-12T22:08:52.997000 -CVE-2015-1710,0,0,81cd189778436d163c65d98013e1996eae5a6847267a7a6e0c7627ec32904137,2018-10-12T22:08:53.387000 -CVE-2015-1711,0,0,1bde8a610892a0c48b7d5858491be0f5a1f50d8a4ce04638f60d3b1f5301ce4f,2018-10-12T22:08:53.777000 -CVE-2015-1712,0,0,8529231298e66a1e9f10d5d7324e04331c1f846fbd8d2c6dbafe507f5e82ab78,2018-10-12T22:08:54.103000 -CVE-2015-1713,0,0,a241a8ed134bbdc6d1bbda7301faf298d3e925e0fb009e8e7ddfa16c3ec6392d,2018-10-12T22:08:54.400000 -CVE-2015-1714,0,0,e257a0124625366fda22efd810e2e9dd27c2f363bb282f397c88da6eea3a8388,2018-10-12T22:08:54.697000 -CVE-2015-1715,0,0,89d426642b435047ddf5ab4b57149c27d3578a075b6f07f66ef2960cf43ca6c6,2018-10-12T22:08:54.997000 -CVE-2015-1716,0,0,c51c20c033d11461558f9def502b5cd5873af86898d5f05417db07c54d9f543e,2019-05-15T16:02:39.457000 -CVE-2015-1717,0,0,c89dc8c0235d44bac08377edd16a30a07edb17b8a836c7df4b05cb877cd6fcd3,2018-10-12T22:08:55.587000 -CVE-2015-1718,0,0,8989b7c90fe14168c433adee50a1f9adaa29621f92060c00c9e03921c887b920,2018-10-12T22:08:55.947000 +CVE-2015-1708,0,1,8b309492116ae2277e22e8f9a890b363142e89a7c456f16edf0e32bb416b722d,2024-11-21T02:25:58.447000 +CVE-2015-1709,0,1,201106ae0aceddc5a962a960d810802c87fbad8ba286c1dbbda21549eef669b2,2024-11-21T02:25:58.570000 +CVE-2015-1710,0,1,287975f4550a82a31cd373993815b2a1b9155967e7ca9a15829510e4f9a955df,2024-11-21T02:25:58.687000 +CVE-2015-1711,0,1,47362748d3f48995a6efc9a8785bdd4bc938ddc2222238632f2bbd6a41fc0867,2024-11-21T02:25:58.803000 +CVE-2015-1712,0,1,339ab2ea9a8b89d19b45c1ebced507cce42ce6cf7850ea103af5d55587b550ce,2024-11-21T02:25:58.913000 +CVE-2015-1713,0,1,0bd9643c030f5f0bc63dbf8ded093c0622a15139610162cce4cbb9e9a1f9bfb3,2024-11-21T02:25:59.027000 +CVE-2015-1714,0,1,5610c82e1d1cc3ee29e584c246d9d4e01a6e96b42209589a4fb916b1de4717c4,2024-11-21T02:25:59.140000 +CVE-2015-1715,0,1,4a195c97640f40b37c8558c47449f9498a44846c739fad150c111d368d55d460,2024-11-21T02:25:59.253000 +CVE-2015-1716,0,1,6b52ca9ec06f7150adad367c5fef2027b2c1b5a16e0f002880c0d5aec8cf760b,2024-11-21T02:25:59.363000 +CVE-2015-1717,0,1,7f077ae65fd93d8ca8fae46606ecd3143b1937848aa7c5b27e71152f6bdc0b29,2024-11-21T02:25:59.490000 +CVE-2015-1718,0,1,a788647b76b2dd136c5aaa8b1e7e013bc34d34f44688eeee79b606f101df3bf9,2024-11-21T02:25:59.617000 CVE-2015-1719,0,0,b36c9aadf8dfd8db3f749d4db370d63a9db41e07fc263917c7d8f27c9d3c7552,2019-05-14T13:12:05.337000 CVE-2015-1720,0,0,b1a09fc8342e643ccd4b12e8a5a1d1c5fe15fad49cdc7e82cf83f97ec3bc5f95,2019-05-14T14:25:12.770000 CVE-2015-1721,0,0,3a7e17c6bb7647b196ecda046e2f6d914efb59d58daaa50539d61577e923ed72,2019-05-14T18:47:47.570000 @@ -75259,8 +75259,8 @@ CVE-2015-1769,0,0,08ca1d7d72b52918fea984b3b2dcd839154975c2a966dfdc1630a78c611dec CVE-2015-1770,0,0,26f4eff8a8aba3b498d5117a507c015df9dc67115de4876945c5c7de5de2646a,2024-07-09T18:27:09.967000 CVE-2015-1771,0,0,679623db77ba1c89bb153226e94183753566c568328ca3104b6ab8912866b3ec,2018-10-12T22:09:12.590000 CVE-2015-1772,0,0,4eb3b08aebfe44491e3d5c602524ab25162b28cc516013f370e8b5b474c3ef23,2023-11-07T02:24:55.250000 -CVE-2015-1773,0,0,514af64958c24000b40a84303561db5e238b541d97a92dc6bdd87f8dc1e3f5b1,2015-10-05T21:33:11.160000 -CVE-2015-1774,0,0,7349dd0e46f2fcd5a40ddbb4d15236bc5c3d1f1699ab623f1b8c40c801cc8ce3,2022-02-07T16:32:02.450000 +CVE-2015-1773,0,1,7db665980d2381d492569a379287b8fb718a3e43785bc00e72717310ec677e8b,2024-11-21T02:26:05.997000 +CVE-2015-1774,0,1,6dfc5b83a9461666384636b3c06277828eda2ab637086fe8feccc5a29d97e944,2024-11-21T02:26:06.110000 CVE-2015-1775,0,0,41edd8dfe089a1159934bf8b3e018896fcfb58c64ea6a0b5aac71ded7de61f06,2015-11-04T02:44:43.570000 CVE-2015-1776,0,0,5c8371a2e9ae0b81d55d0fc8effd3071db9dac2b1e7ed2593150daeeb1bdfd35,2023-11-07T02:24:55.347000 CVE-2015-1777,0,0,6769ec17abeb0cdf5a64e752fa0275a78ff8ae59b0fb38cf0e3ad563618cc17d,2019-04-22T17:48:00.643000 @@ -75268,12 +75268,12 @@ CVE-2015-1778,0,0,73fd6100752d81ffcdbf4209887fda8438fe2839f5df16afbbc61f97e94c53 CVE-2015-1779,0,0,a81a7cef48f0bd170c627e59af8a77d7a12cbd1397e14b56e6733cdf580adad1,2023-02-13T00:46:39.133000 CVE-2015-1780,0,0,674da6d5ff34cd5b5491365052560dfd18c277bd84148560ee155a700a3d0f89,2019-11-25T16:31:34.330000 CVE-2015-1781,0,0,2602cae808e8dd4b1f31f750385d8f415d91c059786e15a3aadeaddbfc85d983,2023-02-13T00:46:42.317000 -CVE-2015-1782,0,0,2d3c256f26279c26ceaabb83fb602a026934b25df15a8457ed0bbf308b50c719,2023-02-13T00:46:46.077000 +CVE-2015-1782,0,1,fa8e8930661a5193de4c00eadad1297a045235a30bcc00278c79aa598c3ab83c,2024-11-21T02:26:07.240000 CVE-2015-1783,0,0,a47a9ac69a3bcb15b55670411c90993043bcd0d7ff28237ab0f2fba41abfa3f4,2017-08-24T16:10:31.187000 CVE-2015-1784,0,0,c7498056b8d12fd5830699c306b1a8838524fa1f563554837b9b4667ae3552e1,2022-07-14T17:34:23.820000 CVE-2015-1785,0,0,22e6c271f1d755da8caa226c846c09c8afafcd48cc370b49f7ed7cf75422d4da,2022-07-14T17:35:01.457000 CVE-2015-1786,0,0,7c24a49ffec3f1970c4928c48f7b5151459db272ec56aadabc70e2d6e0eea02c,2017-06-15T13:08:14.053000 -CVE-2015-1787,0,0,bfd644aab07ec35c297d037ccca7691168b9a357c86df620e4975693bbdff8fa,2023-11-07T02:24:55.487000 +CVE-2015-1787,0,1,3c3012f4593d15d1a42e18ceec938dab5123034015c9a054d74df547e5bd7c6b,2024-11-21T02:26:07.933000 CVE-2015-1788,0,0,d9cf1551cc3a319da7c4086c795e5516b2330c4e3a1f9d45be414451a2449a38,2022-12-13T12:15:14.860000 CVE-2015-1789,0,0,eb88435a5696f38b110395dea8ebce39af2814131593870af555ac9e7361aa88,2023-02-13T00:46:47.770000 CVE-2015-1790,0,0,ef7c2dd154846f9847f9578662f58cb3c13103cca4731492c22b98562636b2dc,2022-12-13T12:15:15.290000 @@ -75284,13 +75284,13 @@ CVE-2015-1794,0,0,f9880015d915b087a0c27a83bc00df5f350f1f254bf70d2a692e0830b4a442 CVE-2015-1795,0,0,dec57240d11a0ac38d2724ca6059053a6a82c3369ca6dfda31244889b9f95a4e,2023-02-13T00:47:04.907000 CVE-2015-1796,0,0,3e85ec31b4f7d89367cd3805a8e3718aac86a415ccd45ab465b82a88d3e7931e,2016-11-30T02:59:49.947000 CVE-2015-1797,0,0,59fdbbaa58ea48f8abe843bd1b9262975b4c9f0aaaaf422aefd0179152ab7615,2023-11-07T02:24:55.847000 -CVE-2015-1798,0,0,7a24bdbac967d1a8a219003a53c537e2952bd9437be48d2c3aee8576066fcb67,2023-02-12T23:15:30.947000 -CVE-2015-1799,0,0,cd7c887282b4ffc476252c68181d3aa5546159939b9e1188c05cbbb2a828c0c2,2018-01-05T02:30:00.447000 +CVE-2015-1798,0,1,e9c022ea9df820201e1dd2d5db7381cb8251dbfb14928f2985a870d784891733,2024-11-21T02:26:10.010000 +CVE-2015-1799,0,1,46010ee19e29e694f1f2767fcfedfad6a288a90d0b8a93512b0f589ffadeea1f,2024-11-21T02:26:10.183000 CVE-2015-1800,0,0,b57c1d280621410e14eb393070c1d616af49d708e83fdce255853e056834b35e,2017-08-29T14:33:00.427000 CVE-2015-1801,0,0,289e13355e7671141c27e4005dfaac029085834b9e1e3e4ff346f59147309c73,2017-08-29T14:50:10.663000 -CVE-2015-1802,0,0,ef44953866376c93a5e445da031e7614f2cc7f964ca0b5a9ee15124f0cd1a90c,2016-12-22T02:59:35.190000 -CVE-2015-1803,0,0,fc9256b5d77726496c29bb1d2a1c23c6ea6f7f0df172057f2214836b98c0629c,2016-12-31T02:59:23.123000 -CVE-2015-1804,0,0,5135b8b7284ab2857ea9d89f0cf0fadf66f41482556683a95ca6b8853b8d8061,2016-12-31T02:59:23.203000 +CVE-2015-1802,0,1,1e40e9e4e688d1354f5f8a0c0fe315ff9e218ad886aa6798dc2f75adf2606e5a,2024-11-21T02:26:10.547000 +CVE-2015-1803,0,1,b741adeba694daa6fea1236011eb756c61b44d60c3088bebaa51f47ea1429f2e,2024-11-21T02:26:10.673000 +CVE-2015-1804,0,1,16fdef9df656a04c8207cc24752155c6f75c84cd8950f94607b09d20701f787f,2024-11-21T02:26:10.813000 CVE-2015-1805,0,0,e1aab0c852edcd431a9e449a8483d72fafc178d0a89a5dc2548650cd67420313,2018-01-05T02:30:00.557000 CVE-2015-1806,0,0,9d4d389f0809fce0c9987dd61219be4f9fab170f8612cc484ed2f0f8a730e34a,2016-06-15T16:48:42.313000 CVE-2015-1807,0,0,aba292e2a221ff1e4df86c9fe371688810076671e74f454c1fb887316a761225,2016-06-15T16:58:08.120000 @@ -75301,19 +75301,19 @@ CVE-2015-1811,0,0,e2aa4222f0efb1c57cb6cfb2d315804d1b583bafdf47916a25062226c1c732 CVE-2015-1812,0,0,34251196d189e08f3d7a1ca4673dfc7bd09f946ee2fa179bff4b9355f926d2cd,2016-06-15T17:02:03.183000 CVE-2015-1813,0,0,10cf238992dc3d80295a3a84aab46a9f8c851b85e05e6a1d9a20cd1c052528f3,2016-06-15T14:35:56.543000 CVE-2015-1814,0,0,855ae68e2be852760b946fc6eff280f5665e7ca9119d3f968be9bc06c0154700,2016-06-15T17:04:49.110000 -CVE-2015-1815,0,0,0fac56e73965b06da60985df93e4d23f50accf3cfd0011163592797794761b61,2023-02-13T00:47:06.383000 +CVE-2015-1815,0,1,0c43af9e195ae17333b2f05d731730c8a12847d9322ee7cdfcc3840edfab1241,2024-11-21T02:26:12.193000 CVE-2015-1816,0,0,0c6dd3c72d7f39c1b95a8cbf77aded30c63c9e7bbdf5892022694a0f29563f35,2023-11-07T02:24:56.247000 CVE-2015-1817,0,0,a324e79cf6d2f402f28d16ec407f69751d23b2526f99c35cadaf908309824265,2017-08-29T14:04:14.193000 CVE-2015-1818,0,0,649a5673cf52feec155d377e7b2f8b5a2c656927ee451a9ff613947f16fff02c,2018-01-05T02:30:00.617000 CVE-2015-1819,0,0,62e40aaf81cc6e1134699cd2288bcb4ab94274bda274959d4f9de880b8262ab4,2019-12-27T16:08:55.810000 CVE-2015-1820,0,0,f6ab03dbee4b1699200f96751c627fbdb004bf6ad5c9cffc5474ed506d0ccab6,2017-08-21T16:34:31.777000 -CVE-2015-1821,0,0,5f03091b30d93f8db6aaa1eb89781edf74d168c5fe91c7d246b5273ebae9b332,2023-02-13T00:47:10.323000 -CVE-2015-1822,0,0,8f3cc76044567de90ecdd36529c4c2ea322433c64fe333f4db5628ce2cba3f29,2023-02-13T00:47:16.263000 +CVE-2015-1821,0,1,7552c9fecff3aacdacc7cec3ebf20ea03b460b9a6bfc71c4823f586442b53b48,2024-11-21T02:26:13.080000 +CVE-2015-1822,0,1,019eed7f71bf9f503f0ebc7818654e83e2f973de57bcaa64662c0a71b13ba736,2024-11-21T02:26:13.210000 CVE-2015-1823,0,0,5a5ea93ce710a090506d039fc83f826971ac153bdadc71488cc543c4670401bc,2023-11-07T02:24:56.357000 CVE-2015-1824,0,0,39e5727efcad0b88efe5150c2f6900506426ef8914650d3aace92d6ae86a5f6f,2023-11-07T02:24:56.583000 CVE-2015-1825,0,0,d10619ded8abc164ebe61afb931dfc6c94ea045c4801019b08f930459cf47362,2023-11-07T02:24:56.847000 CVE-2015-1826,0,0,8c1c7d7ae4d65f855e4c55d7c2a678052f6d27fd98a37ff231c82a7059ecea98,2023-11-07T02:24:57.107000 -CVE-2015-1827,0,0,348707c39d49c52fb3cd12dd1f6e7e33df2a873e0b34dc770fd3e7bb0848e895,2023-02-12T23:15:31.143000 +CVE-2015-1827,0,1,b2618d11887c5ec4b529b68c59df9997755edc58846e601b37ad430b1ca0837f,2024-11-21T02:26:13.400000 CVE-2015-1828,0,0,c9a13bc01bb3883cb21ca14551fd5c93a7663e8f51a86cf62669deffc4e6da70,2023-11-07T02:24:57.380000 CVE-2015-1829,0,0,b6253f237e8451c19a76f86ef6a6425f28793fcae70054f68993c256492c7e37,2016-11-30T02:59:52.367000 CVE-2015-1830,0,0,89ab1fbb5cdbfc0067888bf20d71732de3ff602d096f3297334cef106d6d3400,2023-02-13T00:47:16.570000 @@ -75328,82 +75328,82 @@ CVE-2015-1838,0,0,5b5f049d36ecdfc4ab5f8b0699861f42f84957776721d3e69e6cc2c644a0f7 CVE-2015-1839,0,0,f86ea514fcea1f14682c084a8e5564e9e36cb95b0571e257f9a1c4068d288c67,2017-04-19T19:36:03.260000 CVE-2015-1840,0,0,ec9b423c633286ec8c9a97e01a4c09d5fd5c29eb97f2f58ffe515424a7bfd18f,2018-10-30T16:27:35.843000 CVE-2015-1841,0,0,433196d90f69361c30c9807b01e729b3719d6024b86ac3aa9b7501d19dd25a2b,2015-09-09T18:32:34.077000 -CVE-2015-1842,0,0,d0488c645748b8f05098206270fff3a8db49491df451411c3f21705bb1ba45cb,2023-02-13T00:47:19.560000 -CVE-2015-1843,0,0,15d668f194971e00ed0702d4ea2145a2a731e53ef0c2542b5930cfa2de53a7bb,2016-07-26T01:59:04.310000 +CVE-2015-1842,0,1,3abf68063139fec0afc85695900085125bbd2a5728dfe3dd51b5752c11836a9f,2024-11-21T02:26:15.220000 +CVE-2015-1843,0,1,5bb991d7cf83b4cd764d9841cc01dc822e7a28bc530643ea158fabea4e8e1b82,2024-11-21T02:26:15.337000 CVE-2015-1844,0,0,a60bd0d2dbb7d6d2d7a81e9658d5732f71f9a4c373dffa15adb29dc8d335b0b1,2023-11-07T02:24:57.983000 -CVE-2015-1845,0,0,b2e61f206c4e5ccfb8e2f9e7ebe596ab6aed7e4e22c50859977e7a04c8d8b13c,2016-08-02T14:42:20.513000 -CVE-2015-1846,0,0,e452da6dc61672df98fd12199c01afba2985c331f59a7c0d636c578b978758df,2016-08-02T14:43:10.867000 +CVE-2015-1845,0,1,6261b0776633c8143f0f27805fb90e1fc0ce1e61ece64cda575f20c4e14d22da,2024-11-21T02:26:15.570000 +CVE-2015-1846,0,1,7aa47fff614a7498dd2fddd226882b4adc053dc8f8cbb2acd612097b9051c450,2024-11-21T02:26:15.680000 CVE-2015-1847,0,0,1afbdd35d5b69a501146a8aeb9a1d5262b01539f6143e90a22bbeae9e6c080eb,2017-08-04T17:00:48.817000 -CVE-2015-1848,0,0,4e61b5e62a8778fa191ba5efe76da74f5a05159b94337c33396594a9ee75e3c1,2023-11-07T02:24:58.063000 +CVE-2015-1848,0,1,5f0e336cb3e951be1eea8926d4fdbcae6356f1416b157db20fd5f5b343d905d6,2024-11-21T02:26:15.890000 CVE-2015-1849,0,0,af03a667f2797fcaa9a7ada19b06ed837dd567dcbde002367b488fd47914559e,2017-10-04T17:36:39.577000 CVE-2015-1850,0,0,fb74dd9521c9e0ce51349a90f70fc6ce7c448bd70e65de14d7a46bd2d2d18785,2023-11-07T02:24:58.143000 CVE-2015-1851,0,0,9573e9f76fddf6efb77110bb00af5e83424d13e0d2a07818bf833fead2e643b0,2016-12-28T02:59:05.183000 -CVE-2015-1852,0,0,870d88e922b54049fb45b60473b84153085c95b7b4d9e8241fb1e05d0e951d29,2023-02-13T00:47:21.937000 +CVE-2015-1852,0,1,70b71b53e1776a11ca7aa5f2dd9875064c274138cf2b912ea2a8bac2f75958ef,2024-11-21T02:26:16.257000 CVE-2015-1853,0,0,7d39d449cf44ea176971a766a8cb9186556af9893f18a34d7714042d1e894985,2023-02-13T00:47:23.053000 CVE-2015-1854,0,0,ab3b0435d8de35f7f80722d737c8c58ac842f6083d0a01c4ae9b64fc09cd3fc0,2023-02-13T00:47:25.493000 CVE-2015-1855,0,0,b2245c50304cb99b8c5590d3f59add0812db033bc1546a7cab579ec163c74aa7,2020-09-30T12:27:21.570000 -CVE-2015-1856,0,0,af1f4e834c076122809b8a9a942b20e25e0744296d03318232d3229bab16d358,2018-01-05T02:30:00.680000 +CVE-2015-1856,0,1,add77a8396f3b715a5e9157d42b69f053fdf4424b7989a7b11651e5c28f89a6d,2024-11-21T02:26:16.767000 CVE-2015-1857,0,0,43761b011a11ceb064c8fddadf326af6f1ddc371b7b3590d990523fdd0551be7,2021-06-16T13:41:51.887000 -CVE-2015-1858,0,0,72ee66683061443763e0f63dead29995593de861334ea1c9ed5592e74d3f2a25,2021-06-16T12:44:00.727000 -CVE-2015-1859,0,0,ebab16507ce1dacc75fc8b936166dd59aef3acba21a1039df483d69b0f58fb18,2021-06-16T12:44:00.727000 -CVE-2015-1860,0,0,5f01322787b2088ef9809744cc12abdaebc380ad6c34fd6779d3649c3de3fafc,2021-06-16T12:44:00.727000 +CVE-2015-1858,0,1,3b8452d8dd58eebb2359ae1dc702b0ff9c4fe164df2f8ef0410750a62a344120,2024-11-21T02:26:17.027000 +CVE-2015-1859,0,1,6b8c434cc21e413abe7ebeb209cd968a3057804417c7a696481b17ed047f45e4,2024-11-21T02:26:17.183000 +CVE-2015-1860,0,1,aaf70d7213c7aac728b55c6ca67c82caf75b9b2cd5ff9178e12d4a8bafc5f726,2024-11-21T02:26:17.310000 CVE-2015-1861,0,0,15f545c0b67146c39a31ef6830790c005a4a4a1ba22f9463009f839b3cf2a147,2023-11-07T02:24:58.523000 CVE-2015-1862,0,0,5756a9309afb54d80b8adb341cc5b9b85cec85d6282e1388a6bcf4e47c350a13,2018-03-08T16:03:17.727000 -CVE-2015-1863,0,0,22a6af2ddf0d58fa64cb762a5f458a87615d1925c69438773ff43ad46dc8bf55,2018-10-30T16:27:35.843000 +CVE-2015-1863,0,1,1c1b29e812efb70cc9b406452c892c5016bb5d623659c298da0490e08beb4b5b,2024-11-21T02:26:17.590000 CVE-2015-1864,0,0,d4504581ba1b29c579351afd041d1a07597cdef0dd03ecf95354ebdcb964c69b,2020-05-28T16:59:04.713000 CVE-2015-1865,0,0,082d531609174813afe2181a861e87c8e30566f16330970b86fab8f97be17960,2017-09-27T16:13:17.647000 CVE-2015-1866,0,0,b7e2a003daff92a2a4d5eca7994c7ab43397344a8ab66fac2f7cfb35653990dd,2017-09-27T21:11:52.917000 CVE-2015-1867,0,0,97015ff84494f5fd1ed2e7f6cb4a427db870cd54e823189b8b1f49d3aa7aeb01,2023-02-12T23:15:31.517000 -CVE-2015-1868,0,0,5d0ec034157ad6b44f25a43fe260fa955eb6fb23af2fbad1f030a0c0f91bcb53,2016-12-28T02:59:05.243000 +CVE-2015-1868,0,1,502eee8e541d8d86b95ca2760031b04850b821b375e57083ab174be812211bdd,2024-11-21T02:26:18.213000 CVE-2015-1869,0,0,17e3e6c91e30629e2bbb17eadcef5250a9ed80328715b5c8092a6260290de71c,2023-02-13T00:47:28.060000 CVE-2015-1870,0,0,e04fc847352174dad920ab73a202d0c25a6241465ab58138c88850f2994da064,2023-02-13T00:47:32.113000 CVE-2015-1871,0,0,cc6348d1ff12affb128fc2321e2662812f6f1663070ea23e72c68c61986e0651,2023-11-07T02:24:58.833000 CVE-2015-1872,0,0,97364d42669712d429119bd40570f544c40caec375e23bf91c3918cbd450149e,2023-11-07T02:24:59.053000 -CVE-2015-1874,0,0,b555b83efe4d0b066a585f21d8ad8b42df344b072a296d7b820b0ee914626d0e,2016-08-04T03:17:10.073000 -CVE-2015-1875,0,0,519ca9287b8614d6667f5257ae5a69ca8b61df3fe21f0b74ab242370d704a3b1,2016-08-04T03:17:28.997000 +CVE-2015-1874,0,1,46ed8e140aad9eb051f2bce0c731891494ca03e24306c0a85c62e349756e2e1c,2024-11-21T02:26:18.763000 +CVE-2015-1875,0,1,890235cce8d841d9699a7bf2be4b5c71474fece2f8f9be4e0eba2c2024b13acf,2024-11-21T02:26:18.923000 CVE-2015-1876,0,0,d15d896ceae0256e4162353768e3c763fb9db39538c5c4b3b498124ef3a5519e,2017-09-06T15:11:55.237000 CVE-2015-1877,0,0,d8e4127a1f393c57ee8bbcba33acb91bb1449f6f37118b8b3dace1e39f7a1556,2021-06-14T14:01:20.897000 CVE-2015-1878,0,0,cf1f6e35d9600e398c7c0a96ade0cfdfe942841b01ee500ff3fbe64982fe1749,2017-09-07T21:38:05.550000 -CVE-2015-1879,0,0,4210414d0921add5f53a6fe7c8836253d47e02ab806e7b86863f6507fa0e6f1a,2015-02-20T18:49:30.713000 -CVE-2015-1880,0,0,b101f8ae4f0ff0563e91582c7913b346e71bf7aba346d8a8118e3e576ce6610f,2017-01-03T18:39:40.913000 -CVE-2015-1881,0,0,781327b718d18b7e1ea01475264d8c8574512130095a10341c20b2f13346de4e,2017-01-03T02:59:51.897000 -CVE-2015-1882,0,0,6b2c7a570069b3223872b8b2ca044e1e756527aaa0115969d270e6f09c1770ae,2016-08-04T03:18:06.237000 +CVE-2015-1879,0,1,f07ea5c70512588e74a28614cbfd9fda021e2f34250d92981e803cbfbb1bbb5d,2024-11-21T02:26:19.513000 +CVE-2015-1880,0,1,d11a1eb5a1211a8c96f8b6ef60412fced2510fd6635e0bcc432b3c0032258185,2024-11-21T02:26:19.667000 +CVE-2015-1881,0,1,f781f24127f5448711460937d943931680f1f48947af7ad9370981227bd5d321,2024-11-21T02:26:19.830000 +CVE-2015-1882,0,1,4b42d9aa96d9edcd61207ec94d29631b2aa54899afed94456943bb213e0c3e8e,2024-11-21T02:26:19.987000 CVE-2015-1883,0,0,8ed2c20ac88397005d0400c70e8a5947e810a1983ccbab41d8c73d5108608427,2017-09-22T01:29:02.640000 CVE-2015-1884,0,0,138cacefb72e11467a166b6832eabcc7f186bb6cb4bc0d494e1f5939991a088c,2016-12-28T02:59:05.307000 -CVE-2015-1885,0,0,cf143a216dd8615e2b7cc582246fb0f4c051b7dfa7929349b02853ecca747924,2016-12-22T02:59:35.847000 -CVE-2015-1886,0,0,8ee186a31a6db9cf8cd27feb854a7e7261fe08f446b6ee303afdaa0d9f0392da,2016-08-04T03:22:48.120000 +CVE-2015-1885,0,1,b2ab791a69ac909aee91cf1cadd1238d5c6722e9a34c304d5d0d5a720cabc19a,2024-11-21T02:26:20.420000 +CVE-2015-1886,0,1,6cead08f606e8a3ebeff07d4988efaf4be91b0a148f16e9d29c8aff2ecf601c4,2024-11-21T02:26:20.540000 CVE-2015-1887,0,0,e605545d3b8671953848bddc3ef6ccd29b2ea253d60da6a8f2f926cba8637483,2017-09-22T01:29:02.703000 CVE-2015-1888,0,0,80b5144fe7f9ef183643fcf10719013b9c526c0ce82da68591b78bc603f0851b,2015-10-05T20:49:52.117000 -CVE-2015-1889,0,0,26550e3f2327d1669896cca5b595b09e2aca209cd07d94a63ee73db12b904eb0,2017-01-03T02:59:51.943000 -CVE-2015-1890,0,0,8a659f50ed7fceadf52295a11c3e951917f232870dd6e15204bedbcf585fd0d4,2016-08-04T03:25:01.400000 -CVE-2015-1892,0,0,f5f02deed12c545728e677ff28b1ec560e2ae3f3c5b76d8548dff3c9121c9b15,2016-08-04T03:25:56.670000 -CVE-2015-1893,0,0,fe7ef0b6ed8fcb86e0ea50d43140a22b4acbce908f224b53f3dcac970dd807a1,2016-08-04T03:26:17.437000 -CVE-2015-1894,0,0,05c0902d25b6e84af2c901e5799e50aa154df6420768fec1bb49d20207cf85a6,2016-08-04T03:26:33.627000 -CVE-2015-1895,0,0,81496d53bddce6855e26abceddcdb28ff6569cebf925becdacda3407ca57263a,2016-08-04T03:26:54.347000 -CVE-2015-1896,0,0,31a751c4dfe57170490334c39cd19a4a1c730ce4b01cedeec8aa399e88c5440d,2016-12-08T18:56:30.100000 -CVE-2015-1897,0,0,c4a8796e03226169c2f4bf67a7e4d2fcc915ebc8786874b922b20a666b4471b2,2016-12-08T18:56:38.430000 -CVE-2015-1898,0,0,8975193240e1827ddfe355757db0d67a4db82bc45f677a94128b361e056d9c7c,2016-12-08T18:56:43.820000 -CVE-2015-1899,0,0,f011d7bdce74e3f58fa9324c6039595c7f9fcdda6978a656646cdfe6a8db5707,2015-05-26T16:38:20.937000 +CVE-2015-1889,0,1,4b72585ff60a51a06e3b6209a79c418bf2cf2183b49d49d476be9606a959aea4,2024-11-21T02:26:20.900000 +CVE-2015-1890,0,1,ab0f53685e0a598ec6215345d141a57758b6d8fe9d1f2c4d07acb368b6083ebb,2024-11-21T02:26:21.010000 +CVE-2015-1892,0,1,ddfcefee7a76e11aa55758f2166ec3e28c7407d5e4d75efe4c7874f0ac0c47c0,2024-11-21T02:26:21.123000 +CVE-2015-1893,0,1,a6302adb8cd4d367da269bac4ff6a4254b23a8488bc3b737551a52e8954e9801,2024-11-21T02:26:21.247000 +CVE-2015-1894,0,1,4a03f66812694d1792a226388de72d343b356f4c04bc1b3f750daabe0aecd531,2024-11-21T02:26:21.363000 +CVE-2015-1895,0,1,2d4dc6d9450093aaa9e2d7c063cadbdab0b099d1d4e2f65d86c7bae52ac786ea,2024-11-21T02:26:21.473000 +CVE-2015-1896,0,1,f508f387438fccebc4bf1a7aa28f459d2bf184fb27a66d74b162b179106dfac7,2024-11-21T02:26:21.590000 +CVE-2015-1897,0,1,feee74ee443225d51e5863520706a777e9db3b4c45273b5304568f4c41ad8d1e,2024-11-21T02:26:21.707000 +CVE-2015-1898,0,1,96f11e43c269859b827aa45ed0cfb652b23f2a7236b0f32164bcb1b9c99ff8b2,2024-11-21T02:26:21.840000 +CVE-2015-1899,0,1,b9a316a510105ddc745a7eb3c1ea83284dd8affbd5925a60b39ddebfbd51d958,2024-11-21T02:26:21.960000 CVE-2015-1900,0,0,de3023bb3a5feb937b0c76be6815ba436aa633af82581fc7954ea0a9075fb1bc,2016-08-04T03:28:14.230000 CVE-2015-1901,0,0,aec39edd1df5158be1d39955b4762c1fea01bb50b9afdf1d9f9bc2a567ffed5c,2016-11-30T02:59:54.523000 -CVE-2015-1902,0,0,4aa876554d02dddb26adf4dbfae6d0eecd7d0a330fd79f3e8243848dcea0dd2f,2019-10-16T12:40:30.513000 -CVE-2015-1903,0,0,d190f9b1b44ff46786446a7f5b01ae8de2282dafc17fc53996ed557a9235529c,2019-10-16T12:40:30.513000 +CVE-2015-1902,0,1,095a665029113920db8b6fb2c823558ecd2be4ffa1bc813bf74c74051d1c9930,2024-11-21T02:26:22.330000 +CVE-2015-1903,0,1,1b2277c3ec3c4c9aa88ad5a439df7002321f145b218b8e2fad1738e5320269f1,2024-11-21T02:26:22.457000 CVE-2015-1904,0,0,61106c834cde7702faeab2ac780c74186483570f05595837737872fc77f14de8,2017-09-21T01:29:03.397000 CVE-2015-1905,0,0,7300c340a061fb95320de9717247156b9faf52675022c758b79dc881c2a81744,2017-09-21T01:29:03.523000 CVE-2015-1906,0,0,90b96de09813a9075841de1836e164e3f61816934e3dca403f82e66aeda50af8,2017-09-21T01:29:03.710000 -CVE-2015-1907,0,0,9ecf887d93a1081505d3f15e84fbafeb36309d7e8c605f62222c9ecd17cdf833,2016-11-30T02:59:57.837000 -CVE-2015-1908,0,0,27748b58cd36fed4c4fe8333a6a4e5ea768bb034f53ac060761436a5f599f765,2016-11-30T02:59:59.040000 -CVE-2015-1909,0,0,d80bf360e1f75e6cc81311542de580353c228b245612d9388cbe17e3b8afb8b0,2015-05-26T16:37:51.360000 -CVE-2015-1910,0,0,a895c19b2a9be40bb221eba86cd758d6719d49f27ef6f968837134a0616a5897,2015-05-26T16:34:25.873000 -CVE-2015-1911,0,0,01daf1037225edc8387244b5c07de1ccb701d59d96ef6e8cd1dc2f9b99438959,2016-11-30T03:00:00.103000 +CVE-2015-1907,0,1,858017ed6df460293231e165ad0a85afd03ae0b11b74e379ee5e7148b8ff5c76,2024-11-21T02:26:22.983000 +CVE-2015-1908,0,1,4ae80eb2e9c441c74fd4de2e9bc72b30d3c976e180595b1f62e74f6f5afc86a0,2024-11-21T02:26:23.110000 +CVE-2015-1909,0,1,55ce31f1649d6fd868bbd2d200706c4b9f3ab439c1afe50cb7e909552c3a3740,2024-11-21T02:26:23.230000 +CVE-2015-1910,0,1,e19d3f44c72aaa00480994c475f701cd20a5088b809aac084f6b11eed94dfd82,2024-11-21T02:26:23.353000 +CVE-2015-1911,0,1,699331f2c953e1dae4ca389abfeb6f16c297c40cf0bfb6c06d4bfd03b3a287da,2024-11-21T02:26:23.470000 CVE-2015-1913,0,0,9d1c0f3d4047dd5ab35b7864926f36d383a53c3d4c74de815e84186f720f9006,2016-11-30T03:00:01.383000 CVE-2015-1914,0,0,a038e9f4dccbb7f564aaa47ce40daacebca82f1f9d003890b3a5bc725f30679b,2019-06-13T13:52:58.653000 -CVE-2015-1915,0,0,6715be96dd2d7ca901e34097df9755c0055062058ac2001c17443e61dc3f6be7,2016-11-30T03:00:02.587000 +CVE-2015-1915,0,1,0d6996f33488e1d3564748b867890876bfb6f920b28d9fa1dda55de13115f9e1,2024-11-21T02:26:23.867000 CVE-2015-1916,0,0,8390515e408de875009cf558206b775dd4e601fe8b3fb41bfb2d108b918d3bd3,2016-12-28T02:59:05.760000 CVE-2015-1917,0,0,079b925f0503f8c58ed36a67d8195c65397b4557254c8eb6f41e11a43fc7450e,2017-09-22T01:29:02.810000 CVE-2015-1919,0,0,8b171f038cee0f091a2b21d8e1f64d67beffa97f0064be6e248616e65e220c1b,2016-11-30T03:00:03.650000 -CVE-2015-1920,0,0,8f6e75285e74d188be7ff4207e6362cf51203e68232e311e52f1bff3eea6560b,2017-01-03T17:37:37.797000 -CVE-2015-1921,0,0,33482af50b76fae2cab3a16073ec84b9593ed913f8570b4a07373af6011a7083,2016-08-17T19:11:11.687000 +CVE-2015-1920,0,1,c9665efbda2b40d9f8e25a75661fe72ebd457452dd637a0cfc23631427b5feec,2024-11-21T02:26:24.343000 +CVE-2015-1921,0,1,2ab4f0d4d98a2162aa55120f0d52341436cef50f52c35b0fd4e3b2c426677c02,2024-11-21T02:26:24.480000 CVE-2015-1922,0,0,a8677d036ea7e2711657316b7fc8ef998298f32512a05f25ee04975a2da4bd4b,2018-09-26T10:29:10.333000 CVE-2015-1923,0,0,227a6d18893293e1c9d29d280866705c03b1fed7f9db01ed41f0abb7b7a4b2fe,2016-12-28T02:59:05.823000 CVE-2015-1924,0,0,b69327f5ad150719206a3617ef99d76615668f412fa65a730e2c114e7c235840,2016-12-28T02:59:05.870000 @@ -75516,89 +75516,89 @@ CVE-2015-2028,0,0,b9ac8d46afb85afa9e124801f19ea674e04bfc118dc844416a6f8b98cbb3cf CVE-2015-2029,0,0,ebf3f4e0d444b78ec1a3cadbf3e8ac883da4cfabbf8834f3c321a21275efbff4,2015-10-05T21:10:10.757000 CVE-2015-2030,0,0,3abf54b6dd102a6e2876f717c7a53e8d42e3e33c4a419e9220d0e4f743fd16af,2015-10-05T21:12:08.833000 CVE-2015-2031,0,0,aa5847ba0379c840577c2568e1cce74e8bb1e91c44617ac999f17f0cc60ccc5f,2015-10-05T21:27:54.933000 -CVE-2015-2033,0,0,32dbe15d3733223446ac29182b743d9a03ecaafe6e801760015653407a312913,2016-11-30T03:00:39.517000 -CVE-2015-2034,0,0,d65c04ee7ca860edec8aecc85214e09d23754e7f2d4dc3c9ea86119578150850,2016-11-30T03:00:40.610000 -CVE-2015-2035,0,0,fe3144bbbf123c8b67212603140f78cd1037fca4452e7e639f472e3ed9373af6,2016-11-30T03:00:41.517000 -CVE-2015-2039,0,0,069f01f1a57d6595799762c1502f934bfb61d438efca7fda11f66aed6e3ca161,2017-09-08T01:29:50.230000 -CVE-2015-2040,0,0,b3e7cc258a9ab1eabd044bb812dce4eb69c9b601f591a7f8c1f528a510e2f100,2017-09-08T01:29:50.293000 -CVE-2015-2041,0,0,ccb7dd1fd7b9e87db015407a1a1da1ba819050b4798a34f49e9509ed5d452915,2023-11-07T02:25:03.137000 -CVE-2015-2042,0,0,cf2164a9f5a077ce64915356977622eb525afa1f576fbee08c36dfaf207e03ff,2023-11-07T02:25:03.267000 -CVE-2015-2043,0,0,891c78c271e7a47c4abdb899ecfe89c3ec2df3ff6a20ca46e50d083d9264344a,2015-02-26T19:07:02.437000 -CVE-2015-2044,0,0,b58a627422a794d54a9d41860db01b550d61e6346e2251c4bd6515b8e1948b51,2018-10-30T16:26:53.700000 -CVE-2015-2045,0,0,8550b77154d78be93cd1d1af752bab7ac89eb1136574d641f4ddeaa47f58019e,2018-10-30T16:26:53.700000 +CVE-2015-2033,0,1,555718e3329e9fe6e4131f904305be90fe4dc26279edd9108c5ed010d667b919,2024-11-21T02:26:37.470000 +CVE-2015-2034,0,1,580aa6691a41bf420173cce6cb026a1e822092df07ca3fd33064bdf5e55c0682,2024-11-21T02:26:37.610000 +CVE-2015-2035,0,1,8f78a13d9ddc07c4ee1176ece3834cac609200abb8eaf2cf7ff3e7f665cf99f6,2024-11-21T02:26:37.757000 +CVE-2015-2039,0,1,d47a52dbf4c368992d55ceac94dbb1e412b405f8efd2f4653077ae2d17c68070,2024-11-21T02:26:37.920000 +CVE-2015-2040,0,1,b1be29f78a58054c00e1ad455b3f5d3266d1b75ec2897adf16f810fcbea3b80f,2024-11-21T02:26:38.050000 +CVE-2015-2041,0,1,6df7dc906e716ba16d3d2189ec4e91d92988f33ba5c511e1818ce89d36b9a25a,2024-11-21T02:26:38.190000 +CVE-2015-2042,0,1,af8a7da36aa59cec39543556bf96a02fbc4645c08f2b605862e432c263b01080,2024-11-21T02:26:38.363000 +CVE-2015-2043,0,1,3fae60d7d34403ca078b8a6d442cebdf0b80ef0a026744ee26f766aa9225ec30,2024-11-21T02:26:38.510000 +CVE-2015-2044,0,1,c24c91f38e096c1903054a03b3ed6eb2030a13feb41520281e94d924334246dd,2024-11-21T02:26:38.640000 +CVE-2015-2045,0,1,9d7387feb4e7914aa029823fe9959cc0d5274c02ef41aaa1b17b5ddb0f6e0e63,2024-11-21T02:26:38.800000 CVE-2015-2046,0,0,c90758b043c0b328e59956784959656187109c7eb8f9834e7f886076bd71e63b,2017-09-01T14:56:39.550000 -CVE-2015-2047,0,0,02720eaf1e48aa3168a182845b21feaf8c4dbfa213152a00d8a03858dbe5d835,2016-11-30T03:00:44.707000 -CVE-2015-2048,0,0,48a88bb170dd57dace6ecfe47ff9342e109734b4710b0d12b677b24063bf01cd,2023-04-26T19:27:52.350000 -CVE-2015-2049,0,0,e148c769144f4e66cfb8d7e0033276efeaaeffa4af93b857d2b736382a5c9a9d,2023-04-26T19:27:52.350000 -CVE-2015-2050,0,0,8f435e74719cdc2b6f7ece52e0f95dbbf1c368ae8bae9e1684981a9931c3181b,2023-04-26T19:27:52.350000 -CVE-2015-2051,0,0,517cd37ecc5976f567c4d0073af006b1bd075f5dcd773ab89e0015eeebc1daf6,2024-07-24T16:05:08.900000 -CVE-2015-2052,0,0,d264c36264e456f20846e4c36f41f60b8ed98fa5b94df717a0eceeb08afd1eed,2023-04-26T19:27:52.350000 -CVE-2015-2053,0,0,68fba4c55705a4435ad5af90d6590b1ceb9e5b3f94ac7b731551c9f339699979,2016-11-30T03:00:45.767000 -CVE-2015-2054,0,0,4e02c8b5fc7fce5b084be4cd633e01ef700394975f32e0ad7f229df69da0dc72,2016-11-30T03:00:46.893000 -CVE-2015-2055,0,0,9ed77c9d896915478c9fd02571439477fbb6eecf20722421c95e9b6f8ad820ce,2016-11-30T03:00:47.767000 +CVE-2015-2047,0,1,6644c27684ee56735ae10bc7f7d6ad5a5d39515c38d587f33a8221976db9e650,2024-11-21T02:26:39.107000 +CVE-2015-2048,0,1,6b67715df4cdcdde4f402b8b2e9dd404452a771762e94c81c55d8eed89403e5d,2024-11-21T02:26:39.240000 +CVE-2015-2049,0,1,950434bed8b6d03be0f3c8875fd19b8c1c2ba14d72d66f454ed94aa8107601fe,2024-11-21T02:26:39.380000 +CVE-2015-2050,0,1,20aa9fed135d84ee383170f6fac0c2a8748820d03602155705b407cbfa97ab5f,2024-11-21T02:26:39.523000 +CVE-2015-2051,0,1,6ef9c81891ab1e055bf2619ddeb8d05893b5edc6df6febecfe6e9926744cf3a0,2024-11-21T02:26:39.670000 +CVE-2015-2052,0,1,25c5133531cea8fa8e945fbe926bd78fd80286ecc722857d2b5350c30b94533c,2024-11-21T02:26:39.887000 +CVE-2015-2053,0,1,f6b5087af2ee2fb9398e264b0aa289d7ffd7f65121ae3dd61214ca13393b70c7,2024-11-21T02:26:40.020000 +CVE-2015-2054,0,1,6d61be2ff5867176e24eceee49d665ea13a49565145c939a39d121773275b7f6,2024-11-21T02:26:40.163000 +CVE-2015-2055,0,1,9d82ad3104c3cd9ce1d97c91532a421208a31de28b1326fdad5aec3a6f9ebd95,2024-11-21T02:26:40.307000 CVE-2015-2058,0,0,059620cf03f50744e0e6362fde52d4a9c29fe4bc813df5c23e1fa7b71da697b4,2016-11-30T03:00:48.767000 CVE-2015-2059,0,0,823826ad2c4a4eec2a8871ecfddc8ce3ed43a475cf6bde0f43ed815961f9e2a1,2018-10-30T16:27:35.843000 CVE-2015-2060,0,0,0047fe184b041a9f49c2a50b759c050380c6f3f708ff0637797fbd64452e295b,2021-04-26T11:45:21.097000 -CVE-2015-2061,0,0,3ec18cbac1162eae15489dd75f20e14ce0059aeb70d0e782ffe24351f7a0ef5b,2016-11-30T03:00:49.877000 +CVE-2015-2061,0,1,b4a78302692f2e5565f1267194e5c58a857e92b9490113d6879375fececf4ccf,2024-11-21T02:26:40.893000 CVE-2015-2062,0,0,2992db12dbf0b1ce508744589bcd5e43341096dd008e80e68de8034e2818de6d,2020-02-11T01:30:37.820000 -CVE-2015-2063,0,0,0814b54ca489a5f394a8ef1a3452809bb0a526c3f64f2d87bfe1ce6a1df83a5c,2015-04-09T18:23:46.487000 -CVE-2015-2064,0,0,160aa98305b75ed0c56eef027b29e51d5f67e125b97bf22d372e159d366d9dfe,2016-12-31T02:59:23.920000 -CVE-2015-2065,0,0,418a0d2bc9a9675aa8f641db6327d2df81e01c239f9bc2071769e2c3c49e428f,2016-11-30T03:00:50.877000 -CVE-2015-2066,0,0,e44881c4cd9ce7953049f47e5cad88a76db1491de82480947b4014e009bc289d,2016-12-31T02:59:23.967000 -CVE-2015-2067,0,0,ae6a891be82fe25d20968292bf057c6cdabf34342304dd2fd7902fc50af60641,2020-07-06T15:07:39.593000 -CVE-2015-2068,0,0,7f351e144a60057d4de21ddf0f903af049a15515f45adb70ae0d751772c22730,2020-07-06T15:06:37.483000 -CVE-2015-2069,0,0,b80f9656e81b5ba3f5ec1569b77206f8a0ede5912bc85ce17983b756b1a4197b,2016-11-30T03:00:54.113000 -CVE-2015-2070,0,0,946d506f8ad5e0cacce3d80d7a75f2f1439aba86cafb019408497774ca3612a0,2016-11-30T03:00:55.207000 -CVE-2015-2071,0,0,110a2ba7f434a7090a94ccff53a5c70871d804aaaee089967161ebfe9bbdb3b8,2016-11-30T03:00:56.190000 -CVE-2015-2072,0,0,eef77f5d4c3bcfe56be03e5e0f3fe63d164ec33c06bf1d49e2c6a5a2101a424e,2018-10-09T19:56:01.937000 +CVE-2015-2063,0,1,ee158ba1ce5d5c18ffac1cbce2d0e48f1ba3a2b0ce90ddce8eb7e6c358bc6d55,2024-11-21T02:26:41.167000 +CVE-2015-2064,0,1,4fe4c846c485192be70951fff0e6df742c3c4e2f335db35c6e793517d244e113,2024-11-21T02:26:41.303000 +CVE-2015-2065,0,1,fbe8c9134faf8e1cca304e9b505f6ca8feccce3f2b78f98e3959957da4f66b59,2024-11-21T02:26:41.437000 +CVE-2015-2066,0,1,50c0962fdebbce3bff574e7bfcd8810746cb20a0de21bba9f4a26deebdc2d953,2024-11-21T02:26:41.577000 +CVE-2015-2067,0,1,4e772627bc558637812f2febd89114b73a518da93c59729edc5220c725a55cee,2024-11-21T02:26:41.713000 +CVE-2015-2068,0,1,e6976a3b48434e4ae9a807145cc1117296bd83532839c02452d5e86d224649ca,2024-11-21T02:26:41.843000 +CVE-2015-2069,0,1,e9b8dd2cd328dd743f33ee87454e9159092021a226f20deaeb57826a759836cb,2024-11-21T02:26:41.987000 +CVE-2015-2070,0,1,eab3c2b9ef6ed74dc213991ceec651777ac8c232dcf632124cb1fdeae6b11f4a,2024-11-21T02:26:42.123000 +CVE-2015-2071,0,1,a5a6023a8336abf6c0906336cccfa5016bcb039950c91a11921c7eebd0d10e11,2024-11-21T02:26:42.273000 +CVE-2015-2072,0,1,c6d8659566dcf27c5627f1d43736e55445fe025a7f7bfa6f52f80330da8f367d,2024-11-21T02:26:42.417000 CVE-2015-2073,0,0,43cdbe845a609eeaf7c6cc136bc8b73f38b96db2175bc670807f2ebd7300de86,2021-08-13T19:02:35.103000 CVE-2015-2074,0,0,0f67efd4dd6fefbe9965ec0639923419ac6d33e3cb6d2f22683bfd46a9b1a19b,2021-08-13T19:06:41.553000 -CVE-2015-2075,0,0,8652f68dfccab2ccef8431a644b1c817c84946a0fcdb64d4ea8fc653fab0a60e,2018-10-09T19:56:02.233000 -CVE-2015-2076,0,0,c8e1765ceb879c42b2e5bbbdc5d6ee4827d43e3180969f9ab3668afbb69347ce,2018-10-09T19:56:02.623000 -CVE-2015-2077,0,0,2f3501bc6067d18bf43095264f1d4a7f72a242a33d0ced505c5d94b0bd21b282,2016-12-31T02:59:24.047000 -CVE-2015-2078,0,0,9cdb2568143d4f74d64119ad94ab8a6ffd8d94dc9acefa5405505fd7749ee289,2015-02-28T02:59:46.500000 +CVE-2015-2075,0,1,2694d70d6e164af9dd9b3e9e836e2b3e2745fd44586713f960168ba55ae06c26,2024-11-21T02:26:42.887000 +CVE-2015-2076,0,1,bef07acb5abc042388f949bf2b95898201d65c4bde672b061ccd133e1de3ad7e,2024-11-21T02:26:43.033000 +CVE-2015-2077,0,1,eb712091fdfbf874036473994f2c1122a13ae599dd00717652a48e4b2368a2c5,2024-11-21T02:26:43.177000 +CVE-2015-2078,0,1,b2bb1cdb308a0d3f4a7ab2e663480e5ed406e9d99c94f00900b9c336d5693c21,2024-11-21T02:26:43.343000 CVE-2015-2080,0,0,857ec602b7eb7a8c0ba59f87be3e692c39d1178cf8e94b4e5659d95d78c862bd,2019-03-08T11:29:04.430000 CVE-2015-2081,0,0,a0dc60bc95aebba3eb89bbeaf3498c3ea429de636777e33f1d01f047831968e7,2018-03-19T15:24:18.363000 -CVE-2015-2082,0,0,ed45c0f8fad33fa2e415de02df75c9cb6609bd3599ec45461b7ab39e40aeff99,2018-10-09T19:56:03.843000 -CVE-2015-2083,0,0,c9bbe2090bdb3be78f75bcfcd7e3f1821d0d3609999da9e5a1bdd968f5bd965f,2016-11-30T03:00:58.223000 -CVE-2015-2084,0,0,e37559bad295e54a70e927c3cbcc1386424251df49a372e92f4b636d50c85790,2016-11-30T03:00:59.240000 -CVE-2015-2086,0,0,c2d92a19a685a784f9fe7f487b2d34383aaa70dc809d19ae87647e561146402e,2015-02-26T19:14:49.033000 -CVE-2015-2087,0,0,8bfa5c36476475b13e60cddae894e9873d07dbb569975c39782f2643c1608dd3,2015-02-27T17:43:49.587000 -CVE-2015-2088,0,0,ff6760bb0a8f02c1cd4725a20d1c8aae2aab42c367e0351b41c125cad32134c8,2015-02-26T19:15:04.213000 -CVE-2015-2089,0,0,5c10dcd8b3a9486ba92c3fc6e2b2d9847bdb630b4c227e30509a8599c07538c4,2016-11-30T03:01:00.333000 -CVE-2015-2090,0,0,434ee8afa32997fcf97ca09130d6b82b88a7bc542fa340f2dcece1b65c430ef4,2016-11-30T03:01:01.457000 -CVE-2015-2091,0,0,6c0ba3cfba41a81ea5b192078b91828466fa8898d99d0d5e67c7822a46e643d6,2017-09-19T01:36:55.890000 -CVE-2015-2092,0,0,f0d865a5a4deb7e64a22dcfbf113b994a4df81ad32bcf46f92298a86e7b1051b,2016-11-28T19:19:23.937000 -CVE-2015-2093,0,0,fcfdabf577f95730f6300308a7b6d9275842029f237995595af7ac82c169f59d,2016-11-30T03:01:02.443000 -CVE-2015-2094,0,0,2155de7ff010b8d55bca638515040f0d4ab4a1edce0080d28f77881ced8f3548,2016-11-30T03:01:03.410000 -CVE-2015-2095,0,0,bddde78c32835f3668affb05696c80de71fce7f49e47249a5529ecc910015b8b,2016-11-30T03:01:04.443000 -CVE-2015-2096,0,0,9e956c8714a2fd5962756ac9c8cef6e2d12132df596087301207d46356a6d2cb,2016-11-30T03:01:05.567000 -CVE-2015-2097,0,0,bc091b6c14bd45a94719740a12ab3052ed371d142cde6cd7fb40cae112a20544,2016-11-30T03:01:06.567000 +CVE-2015-2082,0,1,10e5c272bb16df80d032f4d6d106b231c811c009aff760502d9aea2d6cce779b,2024-11-21T02:26:43.810000 +CVE-2015-2083,0,1,c2687f406b8b09f0a6344256aa538fb45425917cc930e680c728fbaff5c2ec4f,2024-11-21T02:26:43.977000 +CVE-2015-2084,0,1,2ea7cc409ec78263e6e5caa2f96a701aa107e3c23cac09ce8752d47be7af464a,2024-11-21T02:26:45.623000 +CVE-2015-2086,0,1,5956faf0d3d01e65feee92dc2b520dcdf95e819a2278e83916f84207a9b2b2b2,2024-11-21T02:26:45.840000 +CVE-2015-2087,0,1,75f0896019ddef42bf2c97e8611b18dfa57d7883748a67f227f7b90313e3c80b,2024-11-21T02:26:45.967000 +CVE-2015-2088,0,1,01e05c1bbd295e9a49d787802d6b0105fcd05c553e0a1402d744f52c92c0d701,2024-11-21T02:26:46.100000 +CVE-2015-2089,0,1,651edcb826b6291faec34a37f857de0eb27886d44487cdfed03c29db9a810f81,2024-11-21T02:26:46.240000 +CVE-2015-2090,0,1,698e89d2c5534cc56eee01cecc8f7f06c26b56d4c9961326e948cbf2d39b490f,2024-11-21T02:26:46.380000 +CVE-2015-2091,0,1,fb56c4eb78ecaf44c8c727d50a5d489985746e7a1da252ed5748f0ab9e6f361f,2024-11-21T02:26:46.520000 +CVE-2015-2092,0,1,74ddcbb907b443f895ba5115ed50f0c7c04bf9671184a88afb3cd920733ffcc8,2024-11-21T02:26:46.663000 +CVE-2015-2093,0,1,08ef20a913b9f40547e5efaad9d26722909c446295f2b2f7b3eb4579bb1de8d1,2024-11-21T02:26:46.797000 +CVE-2015-2094,0,1,7c5b43fbccf5e7445701fb9155bebc47e7bf42fd04bb651391e6578ba2e23dcb,2024-11-21T02:26:46.937000 +CVE-2015-2095,0,1,62bef10ff9464b0377f5eb39e50ff7682be7abf194966d8135e47188fab9b929,2024-11-21T02:26:47.077000 +CVE-2015-2096,0,1,a3dafbc93709f0043d496b07a5e0ad90bae79297d12176d56921220a9fb035cc,2024-11-21T02:26:47.217000 +CVE-2015-2097,0,1,12c13a19103cf0daa0ba24dfc2951e3399525c8eda879a5d165198f89ecaf381,2024-11-21T02:26:47.360000 CVE-2015-2098,0,0,9af455cf0de49f6800532501d1c91e70b9c1be84e6421f2efd96eba940ba62c3,2021-08-03T20:02:03.520000 CVE-2015-2099,0,0,2f5654c4e893bade35e40f2b5261d8148f421b53d3d9b6549bc12b50ebf177dd,2021-08-03T19:55:26.383000 CVE-2015-2100,0,0,f182038ebe0e83cf342c6dcd66db08f85aa1eaf5626ace6b6051e378cd6fe7b8,2021-08-03T15:54:57.923000 -CVE-2015-2101,0,0,077841241a7062ca9509d6c1fd007eb9863034d86fde0c261a8a445e73a72bd8,2019-06-14T13:30:00.530000 -CVE-2015-2102,0,0,b5ea27da42dc23e460ec33320d1d5c6cb6e8dcf5a181c778e9cbf8874e28e475,2018-10-09T19:56:04.107000 -CVE-2015-2103,0,0,316b7917ed06b35fdb26579286e73d099a4de13ef395e5dbb372410ff4c4188c,2018-10-09T19:56:04.497000 +CVE-2015-2101,0,1,fe00ffedf5e9cf0b52d58dcb5aba604edb68ea134a5fa344b27b33275776a1b1,2024-11-21T02:26:48.020000 +CVE-2015-2102,0,1,3d826fea37eb605ba8dbe8dfa1e9c669cf4629bdecad3d29c35a9b5a69db2bb1,2024-11-21T02:26:48.167000 +CVE-2015-2103,0,1,84ec8d3070cebc5399a304d629eb2bb077e83498ed9a2ccb8ad39c2fe5b2c9f8,2024-11-21T02:26:48.310000 CVE-2015-2104,0,0,2d646e249d54ef5c3233860234893440f490b8a316f592d18e3a48e7b186849c,2023-11-07T02:25:05.710000 -CVE-2015-2106,0,0,fcc423808ef6526c3021d313887887b561dd7262eafe8aaf48ba87592a6ae603,2016-11-30T03:01:08.727000 -CVE-2015-2107,0,0,296aebed74f49ac2a56d167dfa2166bec939eea95906438a2b33556729fcc731,2019-10-09T23:13:28.237000 -CVE-2015-2108,0,0,c3510812cc19c04e486f57366aaa5226ea1b8ca0e12764bd87f7a2ae8f8c92f3,2016-11-30T03:01:09.867000 -CVE-2015-2109,0,0,55990d7e58a6513272b21a2b337be3d7cbb2a470a35e1a9b41679fe2867d0e27,2016-11-30T03:01:11.007000 -CVE-2015-2110,0,0,1d33e076106234f30427127cdeaa0c133fd6f3b68d13e311576fbcb65b487b4d,2019-10-09T23:13:28.487000 -CVE-2015-2111,0,0,71cea2207ccce4cad9cff0e4d2d69da604a495c983d30f49ea9a7b64f97631e9,2016-11-30T03:01:12.163000 -CVE-2015-2112,0,0,9a4feef34c0fa257f25de7db269e591f57862c7e07890885c2764b966bd107f8,2019-10-09T23:13:28.657000 -CVE-2015-2113,0,0,945d382911be90ff3a93dcfd7c228e5c77cda8565de9bff75190bc93b08ea85c,2019-10-09T23:13:28.847000 -CVE-2015-2114,0,0,a515f086f13666fe4adfa8803653e654114307bb088abc4533b7a3567a06fe0f,2016-11-30T03:01:13.100000 -CVE-2015-2115,0,0,a4e50b2cf1f06d8f37781ab98d447e1cec4e507f445eabca24a60f03669c195c,2016-12-03T03:04:03.003000 -CVE-2015-2116,0,0,b18d50d0bd739202caf7233bac548771a07c4993f8b1b97a8eb20b53bbde071d,2016-12-03T03:04:04.050000 -CVE-2015-2117,0,0,8615d7c4c6afac39543ff2eca664e0aa3685d0ae644538696035b2d7887ab6a1,2016-12-03T03:04:04.987000 -CVE-2015-2118,0,0,1680860214527afbbafa3e9267a2c3deb689a98b2afbc312124929a837858c8b,2019-10-09T23:13:29.173000 +CVE-2015-2106,0,1,44be1180c231f2e5ca26370c3d0870bfa8a424d056fbfa0c2ff2fd0ec1119a67,2024-11-21T02:26:48.473000 +CVE-2015-2107,0,1,cfb093b27a532f9d74dd6c86a171e31f39f819f791fc8589ffebedc799a5e8ad,2024-11-21T02:26:48.587000 +CVE-2015-2108,0,1,dba3e787dab44d6d56ce313913ef2e1a44b1ff16bbd6be5a8e2983e6d516cc95,2024-11-21T02:26:48.690000 +CVE-2015-2109,0,1,cac9feef923a0932c4c1b92053c348a778b1b6cfdec48d2fad3666f0c1dad03e,2024-11-21T02:26:48.800000 +CVE-2015-2110,0,1,b59ac690fd1e78da57e01fcdbdf76d42e4703fd0e41af727c7a19a5669143745,2024-11-21T02:26:48.907000 +CVE-2015-2111,0,1,3af9ba173bc694e6655421e384e8e174b914e696727309aed8fe6a70839c6ed4,2024-11-21T02:26:49.013000 +CVE-2015-2112,0,1,06bea414a0f63e2a14c2d7d5b7f69e2fff65c75d30389b5ee08319cdc7692d44,2024-11-21T02:26:49.123000 +CVE-2015-2113,0,1,18808d586e73ec79efcbf21c1a29ac95b801328e9d618dd9d610c229be6bca85,2024-11-21T02:26:49.237000 +CVE-2015-2114,0,1,499935ba019e277c421008c6e865d5330b66923f6f05b20d61e88c9c27eef7f5,2024-11-21T02:26:49.353000 +CVE-2015-2115,0,1,9406180d8593b953092c7b34336b6f61525f1fa3941f1b64c31827e2e4f61c10,2024-11-21T02:26:49.467000 +CVE-2015-2116,0,1,a8c0111efffe8fe9aed79af63fdb9439b6f6d7ccfe3637f41b10c3fbf39d232e,2024-11-21T02:26:49.577000 +CVE-2015-2117,0,1,3de3c98633d5e19bf4f59b2a4b3050403d12afd596613b29d7e5a664316690c9,2024-11-21T02:26:49.683000 +CVE-2015-2118,0,1,e0de91130bb2ce24213ee7afdfd4e37fa13efa841c767097142ee5f1aac331fc,2024-11-21T02:26:49.797000 CVE-2015-2119,0,0,dab9715d3cdc39c4b6a8ba07a3ecd350c7159b038afb8d9dc54103b00dd681f7,2023-11-07T02:25:05.977000 -CVE-2015-2120,0,0,53d545722fda9dc8dd8c8a9b45dca1689962dd6b4e3fb5fe03ac2f4c82c6abb6,2016-12-31T02:59:24.110000 -CVE-2015-2121,0,0,ee00c9a014a89c646c3414c558266c32b37189dd7895259b2f5b08d856767a79,2016-12-03T03:04:07.097000 -CVE-2015-2122,0,0,c15d1640d5a58a62e0258cc684212030e76462acecfc835a566373a6297039a5,2016-12-03T03:04:08.253000 -CVE-2015-2123,0,0,9fba5a7de82d086faa12d342f15bc3835af2f368b226b4e8b1b730e60cda758d,2016-12-03T03:04:09.270000 +CVE-2015-2120,0,1,9058d7958eef9a75639488ad1f5a5f0b7cc20ac5f98dcd9b6a87402ede80a452,2024-11-21T02:26:49.920000 +CVE-2015-2121,0,1,2a253b30dbf0e355ad2e08d6388399fc8e43a39b75dd5eea502a68d19e7f8498,2024-11-21T02:26:50.017000 +CVE-2015-2122,0,1,72ea021d7a3d5194c6e5396155e0c7702cef281ab80f70cc9baa643537b41abe,2024-11-21T02:26:50.127000 +CVE-2015-2123,0,1,e07de17682e7059cf2635c84baaf150cd5cd4d4ec7d1a9cdec53cf2eece91677,2024-11-21T02:26:50.237000 CVE-2015-2124,0,0,a915506026c34defc4a500d62e5b8a50805e1e2d02ad013d92eaea8ca6ee6738,2016-12-03T03:04:10.300000 CVE-2015-2125,0,0,f2637e6b32183863c49256c07251e3e6c0d90706172845bc0730fb2ddf26b850,2019-10-09T23:13:29.610000 CVE-2015-2126,0,0,677875468bbecbeb76a1d72f10f84d0a5c0b07c00867419bc905c39bdb6bf0e6,2016-12-28T02:59:07.183000 @@ -75624,92 +75624,92 @@ CVE-2015-2145,0,0,a01c0982379f182afd71266de16507f60e01e9f89cd559c0a8c75054a6d5e2 CVE-2015-2146,0,0,ec144ec1ca91a80b4bc5702f0620415afd13444285af6fa772741438bfc31a25,2017-10-11T17:59:37.210000 CVE-2015-2147,0,0,28c7f30fdcc35682a066f4841cb085416974e1cdf59ac90018765be919dc46c9,2017-10-11T17:55:23.450000 CVE-2015-2148,0,0,b42683fdc01ab6f9d9cbdecf2c6ccd4e41b41e359d75f35eac8072aefecf53e2,2017-10-11T17:56:25.780000 -CVE-2015-2149,0,0,156a7719bf22765ec61a35ff63b5819ad544769ac9fdeff8e797ba17895ade65,2016-06-23T17:55:37.937000 -CVE-2015-2150,0,0,fb973c831925f658acce710ca2beff41c222ff58a3496e18c7267aa2f0ab6ea3,2023-11-07T02:25:09.333000 -CVE-2015-2151,0,0,cfd5a6f95cc4603878ae1ed56c0ac07a61e2dadc1cad91328b333bea9c9fdfed,2018-10-30T16:26:53.700000 -CVE-2015-2152,0,0,85cf21195abe3524c439a837cddde2cb99268ce1b2bbc30663994ffcc9c556d1,2018-10-30T16:26:52.560000 -CVE-2015-2153,0,0,edc5e5dac9b8477b49185b24a39b4a0d2b0e4d0e5e7c833d437625ca0d486e32,2018-10-09T19:56:04.717000 -CVE-2015-2154,0,0,c7dbdf43080c65b16f85b119ece27252a71acbc4f13aad6af64b82e5ad1be4f4,2018-10-09T19:56:06.200000 -CVE-2015-2155,0,0,4b5af4ae611f73db40a8a5f45477b57724af8d2e1a762b72901b21836dca1a23,2018-10-30T16:27:37.467000 +CVE-2015-2149,0,1,cb89f53ac477bdf7277f27d313fb3e5de8d258c808da12f73769ce2c84433b21,2024-11-21T02:26:52.613000 +CVE-2015-2150,0,1,eebafa3a2d7956e348d67ff41821cc512f5a7348b4966a88b6f11f969951107d,2024-11-21T02:26:52.747000 +CVE-2015-2151,0,1,4cd4fc9cda020aeb89ee492d074f137a88126479b5046b5fac9e5841c0f7bbe0,2024-11-21T02:26:52.950000 +CVE-2015-2152,0,1,27571a9f04a42fa22b8bd9aa192d3942efb7a779e019a27fb0e779b53fb7b761,2024-11-21T02:26:53.137000 +CVE-2015-2153,0,1,5ea4b1d3799d9633f41108c83785c6ff8adf3236f27d2b1dbfe96fe9adc450c9,2024-11-21T02:26:53.283000 +CVE-2015-2154,0,1,50d5ccb11ce45b2e9aad1da68f2ad3e3b71cc565d9422ac4cf59e41dd12b1273,2024-11-21T02:26:53.440000 +CVE-2015-2155,0,1,0bd3ea4b78d2a3cc6fad4fb5ab58035e34985a2d622f17f1669ba4451d0f48c2,2024-11-21T02:26:53.597000 CVE-2015-2156,0,0,3479b44c6b6a9fc1759e23365d52fc240a62851aaef11178b8ef57306c8d0304,2023-11-07T02:25:09.667000 -CVE-2015-2157,0,0,4d94f6be6ec189726edc88712d3d5549dc818da37625dfb6776c84147973ed98,2019-03-21T17:04:58.450000 +CVE-2015-2157,0,1,c1aa53b4e93dc778af1411457c517350608739d30f757f5e61a98aeaf39cba3f,2024-11-21T02:26:53.940000 CVE-2015-2158,0,0,00658c813ceb2292b05904f79382a08c8f44cb98bb45602a7ab21a19139f5166,2017-11-01T12:51:26.647000 -CVE-2015-2165,0,0,30889bafb7d9522e7ad0536e81cdc04aa30dcb685a1cb5218caba9aaa367fa78,2019-06-14T13:39:47.423000 -CVE-2015-2166,0,0,b25614b9fc55fc03a8faa9f2057f136d2e97febc7bc7b6e6461b1143b3dc097e,2016-12-03T03:04:13.723000 -CVE-2015-2167,0,0,b3755c43ab2deec7e7b68039d24b537c613a16d29188d62b522ebf55bfddb43d,2016-12-03T03:04:14.833000 +CVE-2015-2165,0,1,aaf5688a9c63a23d49ea35f9419986828b18697e363b23246eff5fb7aacd8752,2024-11-21T02:26:54.227000 +CVE-2015-2166,0,1,d3f5ad10e378c3950f8e4619109ebb1c0860df286dc0d444054557aaaab0d284,2024-11-21T02:26:54.373000 +CVE-2015-2167,0,1,96e06d23e668d5867124fcd3f52b755ce1687103314e468bc1746c0f1fdae62b,2024-11-21T02:26:54.510000 CVE-2015-2168,0,0,46e846cf1bb09ac07af828dee20f2a5fdd85ccc4b5a43e086e5ad0e76bd3ea4b,2023-11-07T02:25:09.897000 CVE-2015-2169,0,0,9df14bccef888a4ac01b0cb924854d210b1bdee008e89068dac2de841862d798,2016-12-03T03:04:15.943000 -CVE-2015-2170,0,0,ba8a52af2ac736f5da3b8d7389a93c6cebae86ff77693dcdd83cdad264091700,2017-01-03T02:59:52.740000 -CVE-2015-2171,0,0,07828377f059a541cadb35eb28d9b5ca1a71bc2d341238163815eef0cb7b6bd2,2016-12-03T03:04:18.053000 -CVE-2015-2172,0,0,a54e5ab50ece44ec01afe168fb80c64a06d44cf3f1c1b65e21c1c70a8b3f914f,2019-02-05T18:24:59.563000 -CVE-2015-2177,0,0,dbc8102410c5f49be41740d93f7dc6eb7ddebbe0822dca06d7305a690b105ae0,2018-06-02T01:29:00.467000 +CVE-2015-2170,0,1,c32a0532b7b86bff4c72522c6262efd736332cb77e29c9e7ee1444358c3d6906,2024-11-21T02:26:54.810000 +CVE-2015-2171,0,1,e066e6d82f589b2efc444d60b2bb0d83fd56c30d13a07e565bcac036ed57afb2,2024-11-21T02:26:54.950000 +CVE-2015-2172,0,1,cabed987d96e2d041c8265c892003b623711b37dc62e5faa8fe8a380bbaf8cbb,2024-11-21T02:26:55.100000 +CVE-2015-2177,0,1,ebc431a2b241a7b246cb1d98a85c2f1f323d2752908e9725d4b9ee7fa37c19e4,2024-11-21T02:26:55.260000 CVE-2015-2178,0,0,d17e51698231af6117dcfa0384dd21e4d46a84f38c210b3e708a4bf2cc1ec19d,2023-11-07T02:25:10.013000 CVE-2015-2179,0,0,7bba4a9f70998209421e855596ae6a24e447d52b6b19268588308c72f6c44de7,2023-12-14T20:35:06.720000 CVE-2015-2180,0,0,a3dbde0161c2cb7e20fcc8f5874c9d80cf683bb8e2e9ae794f1058c031013868,2018-10-30T16:27:28.983000 CVE-2015-2181,0,0,2a3126d4eed2acc53792726aa015a139fe5a780bfc59050357732f07c1317a4c,2018-05-02T15:19:38.783000 -CVE-2015-2182,0,0,52885ccb52772ac4cb344beba1ab670d3b4f2c245d52308e0bbb4e04c51a5bbb,2015-03-11T19:38:08.387000 -CVE-2015-2183,0,0,5560501b5ee491873763139b81f6d9ed300335c2ca909aa5299ab824ff5d6040,2015-07-28T15:05:21.760000 -CVE-2015-2184,0,0,7d5048fcc0805d6bf2ea5d39be11db285da9e5b2fe5541fdbc0b6ceee42521ae,2015-03-11T14:55:06.483000 +CVE-2015-2182,0,1,154e335f17876bf66e03300a2f7fd2311e6340187cb13d20982e0e0d3ab3a7bd,2024-11-21T02:26:55.873000 +CVE-2015-2183,0,1,896944cf57cd829df20c992087933aa6c2d03e6eb3b1823135c5d9caf5c7e434,2024-11-21T02:26:56.030000 +CVE-2015-2184,0,1,ce991b4a1c88d7642e35e4c3a81946df5f8ae9fb5139fbf4045e626f48b03e46,2024-11-21T02:26:56.190000 CVE-2015-2186,0,0,369d0630b9feff8f459323bac876cb33cce4415d130fd99b4ee78c939b70c818,2018-03-02T14:18:23.683000 -CVE-2015-2187,0,0,035734052e7e1500d98e8b2b045b118443ef75ab62cafcc551bd18f171e225b6,2023-11-07T02:25:10.480000 -CVE-2015-2188,0,0,42f985bb7d03b2887466fedb67996b7f11d18cc3c30a9f9c876f031988884364,2023-11-07T02:25:10.563000 -CVE-2015-2189,0,0,4283ba77b2946b2c12da0e7cc6a45087601ec565745305a3e7dc91700545125c,2023-11-07T02:25:10.667000 -CVE-2015-2190,0,0,25f35142c38405d0c18fec6913985d66657d34bb473e3be5ac5851aa47b4ab3d,2023-11-07T02:25:10.770000 -CVE-2015-2191,0,0,a02745662bce3d26d684decb11471f5c802b273aaa1adb3182c15b89a0eb0466,2023-11-07T02:25:10.847000 -CVE-2015-2192,0,0,f9ab4902acd28ca18e4fc1704415e1f760b3da6e15135faab17fe7346bd1430d,2023-11-07T02:25:10.947000 -CVE-2015-2194,0,0,3ecd418d325f9472f3f399363a1c15874c33f0ca0d2430207d935a113e8de909,2016-12-03T03:04:20.287000 -CVE-2015-2195,0,0,33051524583e75110f0515d92e8d130a166af8f2b5d76106151022f75b765113,2018-10-09T19:56:09.077000 -CVE-2015-2196,0,0,77002919348d847e51325bc058b5266628700405210299718d3ba7a385abd5fd,2015-03-04T19:11:55.953000 -CVE-2015-2197,0,0,a07059f2751a2bea212308956870bf11633882b94fb977b31299644c4c925906,2015-03-04T19:13:23.187000 -CVE-2015-2198,0,0,c03275fa5cac0eb3d97a4a534e58795c6d2c498be6cf9853ebb4236c6954f50c,2015-03-04T19:13:39.313000 -CVE-2015-2199,0,0,b1caedf4d08f8a20977ba334713aadea331c035f70295785330a5e9f63fd58fb,2015-03-04T19:14:02.187000 +CVE-2015-2187,0,1,5f89e9562344cd49f92e912a7b8fe7d988908915453b1c96d9df2b5ced990bdb,2024-11-21T02:26:56.483000 +CVE-2015-2188,0,1,b71f30978c54873821091427fdcfe08ff179c243b43c226e45b746e2f1d92894,2024-11-21T02:26:56.633000 +CVE-2015-2189,0,1,4936f99bd1983614206bdd6f44db09ed2c586f93d62aeac94c8e3602aa748b7f,2024-11-21T02:26:56.817000 +CVE-2015-2190,0,1,a883a36cc4e7cfc9cfe93f2b46fabca00e843dee4c9f9a7140c080b8e1f1e256,2024-11-21T02:26:57.010000 +CVE-2015-2191,0,1,778bfe3003cd4d6d745e74412922e6d462d44c1e64d092b90469b65399cbc6f3,2024-11-21T02:26:57.173000 +CVE-2015-2192,0,1,eee63b4ebf25ad6339ea6ae595750ebe5615fba1a7e02566c660946cd53bf36a,2024-11-21T02:26:57.347000 +CVE-2015-2194,0,1,a9fb5486286afa099ac22d57cffa57cd1eb5f6c5b0ea2764e1d70988687b7301,2024-11-21T02:26:57.490000 +CVE-2015-2195,0,1,fbcf67878f7108ad1af14d37049eb5876ff772cd18a163b977702a72db18c151,2024-11-21T02:26:57.633000 +CVE-2015-2196,0,1,7df0ca255ec6797b225ddfcc5a1f00750bb4673f8aa52316a758e8b3f4413e69,2024-11-21T02:26:57.777000 +CVE-2015-2197,0,1,528fd1aa28493037b8e77b7f07d2bb77a1dd67474df3ff7d4c90d5ea6e20ca76,2024-11-21T02:26:58 +CVE-2015-2198,0,1,aea26870143279bb98cedda38551503757008098036e99f37f0c1cc1f3d17ff1,2024-11-21T02:26:58.940000 +CVE-2015-2199,0,1,9705a7138583fa7b1619c9765726c48fba2c3aebca1ecf914f368b69d4b606a7,2024-11-21T02:26:59.237000 CVE-2015-2201,0,0,5f76655ce4102d09a4458572729cbbe372143db94ccee9bfbf3ce2ccfe53ddd9,2023-09-08T18:55:29.563000 CVE-2015-2202,0,0,56cf7cea1efb0003ff1cf7d1107fdd0408c67d49e06a6f4b5fe359ee0aac249a,2023-09-08T18:57:27.627000 CVE-2015-2203,0,0,567c09055cc7b9f024d2fb9efa63f19df636337aed1256a3f90909c3b6919ea9,2023-11-07T02:25:11.133000 CVE-2015-2204,0,0,45b14e7ce8429fc2aa8d07f4c246152bd3a1315cf6a3f56cb0353a60fd5793f0,2023-11-07T02:25:11.217000 -CVE-2015-2206,0,0,8123180f0686721928c75e38061a8964d2860217af06e13d2b305275b8409bfa,2016-12-28T02:59:07.247000 +CVE-2015-2206,0,1,81b88675235164128b687504969bfa7aef6065a2eff3bf4217709cc505830db4,2024-11-21T02:27:00.010000 CVE-2015-2207,0,0,9ea3db10831c1e93656ad1c4c4fda6465655bba7b17f34e08736d051a9e2c63c,2020-02-11T22:06:00.567000 -CVE-2015-2208,0,0,41fcdb707321d0e31845ab756e9c44436d65be943c13d884e7e4571b48f9e2ef,2015-03-12T16:42:18.143000 -CVE-2015-2209,0,0,2812cd1c2ae5257e886d458f777bb29148c9a5d00c27280d47889971553245af,2016-12-03T03:04:21.303000 +CVE-2015-2208,0,1,415c00f29c149655c0ea9e82e067d61f34651a528f522828a6f2ea586be66151,2024-11-21T02:27:00.343000 +CVE-2015-2209,0,1,ab196691e0d8ab474177f41e9cd766fc0a7b534f0b95f1ab15360aec0f024a02,2024-11-21T02:27:00.500000 CVE-2015-2210,0,0,9a81e21891c8b8f7bb9fedfef1e4eb1eac13bfc7fed2303c22dce58977bf0c41,2018-10-09T19:56:09.233000 CVE-2015-2212,0,0,a7066e9623b7e310e5ebc3f558e2f9137abc0bbddde6974af57ce0001a50b184,2023-11-07T02:25:11.370000 CVE-2015-2213,0,0,060616e4f228d78bd3605369e853195ebd19f58a3247e580f9e2a60f06138088,2017-11-04T01:29:02.897000 -CVE-2015-2214,0,0,0acc178a074a3c496b58afae52affcc35a16621afa0a63237b8949c7e96bf311,2016-12-03T03:04:22.397000 -CVE-2015-2215,0,0,30e2eef1b0136ea265fc7d75ed2de9adf879a89bddb8d71d88f9a465cdbc0773,2015-03-05T17:29:29.113000 -CVE-2015-2216,0,0,6792ff21a52c9fd00eff6d83d4f6a918175e50487c901cfce1b1e96dc87e4301,2016-12-03T03:04:23.443000 -CVE-2015-2217,0,0,2ab594a70d415b144876fc0531aefcae24a2342c17cddbc20dafebb1cb7b6c09,2018-10-09T19:56:09.437000 -CVE-2015-2218,0,0,1de3326a67185855e89ed4bb2fb491c05ca9d2c97d54336fe66482d2e98dfd40,2016-12-03T03:04:25.553000 -CVE-2015-2219,0,0,2ddbe5366dafbe117a9885f685f22fe227b073d252bea8df52f757a2522e5b15,2016-12-03T03:04:26.663000 -CVE-2015-2220,0,0,1e950a30a800a58942e63b41b3ae21ed4e25aa33e04a9d7c4887089d37a9e8ed,2018-10-09T19:56:09.843000 -CVE-2015-2221,0,0,2210418b1bd3f7c46586771f5789585d126b1a8995d2904dd1780f2d8893fcb2,2017-01-03T02:59:52.803000 -CVE-2015-2222,0,0,be681c647499f1a4069883b78dd90dc80df5bb65c0601ca11b1b39e1109a05b3,2017-01-03T02:59:52.833000 -CVE-2015-2223,0,0,0b5355ab896f948d5bfeccc4e775153c7583e7c29435dac4fca69c1a42299c40,2018-10-09T19:56:10.170000 +CVE-2015-2214,0,1,fd777230912b5284800bb9a580cb3ada6834adce4fdd32ed6776b5ed1480dd23,2024-11-21T02:27:00.963000 +CVE-2015-2215,0,1,6deaf8f881fee55282afa26e7d6f7f25b1ff971a5df49a4095753a37d27f0bbe,2024-11-21T02:27:01.097000 +CVE-2015-2216,0,1,3b72ba2ad4ec62d87c8bcac2024ea7f5610b591623b034ed599184f1c5d68e7e,2024-11-21T02:27:01.247000 +CVE-2015-2217,0,1,8ed99c9725fe25d244163a29ef1198f3c05063c87771a48618429a1a98be91e7,2024-11-21T02:27:01.397000 +CVE-2015-2218,0,1,468f0b85d642f34f16a56abbf863d6a81e1e8300eb83488aeb496e359898ea09,2024-11-21T02:27:01.540000 +CVE-2015-2219,0,1,bbfc89d141fd3fdda5f50fd45ba3a11c089a762ebd3c2c06b5c97bafd043d117,2024-11-21T02:27:01.687000 +CVE-2015-2220,0,1,ba9075ec4d9a016b7edbe69ee2faf05c8216719b6ee858bc37f510bbe2693392,2024-11-21T02:27:01.830000 +CVE-2015-2221,0,1,6f209eeea01d1628cce967b1f303877c6980fca2b1b54d5ddd6e5de0485ed1b7,2024-11-21T02:27:01.983000 +CVE-2015-2222,0,1,b21dfb46021dd0ef2f89fa3665f6fc00b2d8d034f045a6f29b8cac28f2e13168,2024-11-21T02:27:02.133000 +CVE-2015-2223,0,1,d6b438c456d17de0d68d844365da73bfdb2cb748cfc5c8d38cbc3c5f9d58bb07,2024-11-21T02:27:02.330000 CVE-2015-2230,0,0,e878100afcccf57e3bf991db87d17c4fdb00e4d775c119e592d05b65b2537813,2020-01-17T13:06:39.477000 -CVE-2015-2233,0,0,1909dae578b42a081937c0ae40b3c2c4f50f7e30a7e5c17775e22a3449d28be6,2016-12-03T03:04:32.193000 -CVE-2015-2234,0,0,27b5f8c3178b0e55ae7c7967ce6a87fa862ec9039e40668c319760a799cb401f,2017-01-03T02:59:52.880000 +CVE-2015-2233,0,1,36ab65104e2d4d45d6c6193a8e9d6e8ab1fa85d66be48661803802754f246831,2024-11-21T02:27:02.663000 +CVE-2015-2234,0,1,ba00119482f2693a0d877ee366671e7d857d879797d300cc23ce7b1ec5dbddd0,2024-11-21T02:27:02.807000 CVE-2015-2235,0,0,31b9a8ea28e5edc680f8e17e4b5b8f697fc6bca5cf144ca6b9ce19747019a757,2023-11-07T02:25:11.603000 CVE-2015-2236,0,0,3d64c2929b436fe3fec8bef1999486da406baa1ccda421f2b885d868024bc4b3,2023-11-07T02:25:11.640000 -CVE-2015-2237,0,0,a73fa6eaa92686be59f3d5c11ca0fdd317b47e669eaadcb4cb32154b42b20952,2018-10-09T19:56:10.497000 -CVE-2015-2238,0,0,b9915d9861f63356027069e7b9a2e2ffdd58145b02e25911c5d2aeb0e2877507,2016-11-18T19:05:04.933000 -CVE-2015-2239,0,0,8a48798ac48f2e1bcc394d114f302d43a81f33758e155c9d9c19068383f7a284,2016-12-03T03:04:34.383000 -CVE-2015-2241,0,0,7dae9567788465da82e7080afb40fb39b6c58f92833935c7aff9ed8c9d5bca55,2016-12-03T03:04:35.397000 -CVE-2015-2242,0,0,3a97721172117f81bdc2582b55f149e6fc1343904314fb53e7ada05c298cd4af,2015-03-10T17:29:25.200000 -CVE-2015-2243,0,0,e1746182f5d4333efb9bd4ecd588c5ae01079c94ec591dc55bc4c7ed15395871,2015-03-10T17:29:55.750000 -CVE-2015-2244,0,0,74088a26d94f14a6981bf43acc6832896881df9ae7a90b5813dddafb794a1893,2015-03-10T17:30:08.343000 +CVE-2015-2237,0,1,ec318d548b042dea23c419d6ee64228c25195e39fb0e6dae92c4bca68dd9b284,2024-11-21T02:27:02.997000 +CVE-2015-2238,0,1,b4d4c4c225b062565f7d809d872291266a0846c7250447468136320df93b9026,2024-11-21T02:27:03.160000 +CVE-2015-2239,0,1,0718a6a638d3589dd953937d67f3f790cd19ed02d8b8837f16878cf0e31bffea,2024-11-21T02:27:03.323000 +CVE-2015-2241,0,1,9b7c28fc0b956b927b75b621538c1e74eceb51322835e14a4810042b0632f07a,2024-11-21T02:27:03.467000 +CVE-2015-2242,0,1,3f559a722c1841e95e9c49f012bd9511cb8c0386f1f30c480859c8c8f2a11fae,2024-11-21T02:27:03.603000 +CVE-2015-2243,0,1,33f9c9ec264cf8de88d1ac5649f158a7b3838f68ded1471d29a7edaee4e4147d,2024-11-21T02:27:03.743000 +CVE-2015-2244,0,1,2ef0a90c4d18788237a43236b78e80df1df2bb0bc23a22b96a16b317297d65e9,2024-11-21T02:27:03.880000 CVE-2015-2245,0,0,6d6968a46268694f6689b0b5862b44fdcc9d5fd08cff804562cd3c3836be1d4e,2017-07-03T14:50:07.553000 CVE-2015-2246,0,0,718508825d419615681eb246295d6bc04488df2499f53e1c9871836b6b06a67c,2017-04-07T17:51:51.867000 -CVE-2015-2247,0,0,edea466ad08797c0e1dca4d59d35885c4e5bf9ad71774dce6aa6a40fc1880ff3,2015-04-13T21:51:04.467000 -CVE-2015-2248,0,0,d26f5922554d1593ed63413211d3a5fd0301020d436a6560ad9e551cfe2ebc3a,2018-03-12T16:47:12.363000 +CVE-2015-2247,0,1,244ade51921901c01038257be7a3a9f0fc3b909a6da0827df7ac6b1208b8ad88,2024-11-21T02:27:04.297000 +CVE-2015-2248,0,1,0dd3234116a53d46656c0f43e4f8d6509408e6274bc58b65c7f1a8a586e1b425,2024-11-21T02:27:04.440000 CVE-2015-2249,0,0,d0b52767f729256952c3bbd397c410ad74dcd225b98bc67f6511944950fa4b8a,2020-01-28T21:18:03.597000 -CVE-2015-2250,0,0,2a9ec0b7c30f4c4d7e8dad67de453856cdd7cc119611d3a9a72647d619b9cde1,2018-10-09T19:56:10.747000 +CVE-2015-2250,0,1,1ab6bffff2b2d15f47cf13a3334bcc28fbd43c67e94602616293314e2847d851,2024-11-21T02:27:05.243000 CVE-2015-2251,0,0,2b0df9d50ae8d73eb0f3683c56a43517c837c6d9adafb059f5ec7ff0dd59bdfc,2017-06-20T14:11:04.457000 CVE-2015-2252,0,0,2a0d7e2b1f712321a99d067b6187f403c6afe8acb3991dcefdc97af40bb60806,2017-06-20T13:39:01.577000 CVE-2015-2253,0,0,f6ad7779147234bf1049b75bca218d4e8edda74410563d0895450fe6075b2cfc,2017-06-20T14:23:31.357000 CVE-2015-2254,0,0,e1f81f34fa0b43d920ce9f5cfa88c776efb64f65bc2f7ad034f1ddfe22adf811,2019-03-14T13:43:59.253000 CVE-2015-2255,0,0,73e00c78323315891ccbfa0a434faece77cdd077a9f6ca0b522437f60d178cd2,2017-06-16T13:01:40.827000 CVE-2015-2263,0,0,3296f2c77a299cd027a5180e9f1206bae04b44c025397a8465c4f259c218c905,2017-03-29T13:45:31.787000 -CVE-2015-2264,0,0,abeeceb1c6d5e76d277084dea9d6f4bda18b481deeb54bcaf6967b8d0399c70e,2015-03-13T19:00:29.593000 -CVE-2015-2265,0,0,76b03a066cff6f0009a382fe47587b435d011288167a5a7af826a8b00547fed6,2016-12-28T02:59:07.323000 +CVE-2015-2264,0,1,c2f30ee51b043d5307504d20ca7541286a9c04368d8ee68c586d3f8d8b7e5da1,2024-11-21T02:27:06.470000 +CVE-2015-2265,0,1,8e5d28f24a447290c983f1ec02d45137a5c5e55aefab673a8c74360e86eb3f95,2024-11-21T02:27:06.587000 CVE-2015-2266,0,0,f9a5c1736933ad72d1862bdafdfeab96f0489f3229d20aa94213b1b3668a78aa,2020-12-01T14:54:45.183000 CVE-2015-2267,0,0,6f0b8ce26db10fbb7bcc3926e8972292ad639445eaca5c7a2ab515af14d71627,2020-12-01T14:54:45.183000 CVE-2015-2268,0,0,c13a15906ea64bec4ad238799ac15df0a56057ac8ceeb92dd56fffd19f2705ee,2020-12-01T14:54:45.183000 @@ -75718,39 +75718,39 @@ CVE-2015-2270,0,0,8a43a8fd9b3bbce1f91716cc604b45a417dd9461f66d90a687869f9f27a8be CVE-2015-2271,0,0,02037be5d8cae690b2c5c66973ba041313805fb742a8d998493d8ae803297a56,2020-12-01T14:54:45.183000 CVE-2015-2272,0,0,59c8314a3e96232fccfa38dd47fcc44d64253c6918db0bbcde90f20cea9eca16,2020-12-01T14:54:45.183000 CVE-2015-2273,0,0,fd453be7c3d1c1793257dafe7ec2771ac731832df25ce546e53a4cd421c9f0e4,2020-12-01T14:54:45.183000 -CVE-2015-2275,0,0,bb18e2032251791a085e836a47b90d9df25e34f59e2b23f9ecb11223ac33c301,2018-10-09T19:56:11.217000 +CVE-2015-2275,0,1,b79ea81933b604f8a0ac376d8629575fbe4acb883a9edf00d3f662e3f709dbb2,2024-11-21T02:27:07.960000 CVE-2015-2278,0,0,7a884e5ab9570e8d9f330fe874fe8fe9a2f43fecc8d7c85e4dc6aee5c38ec111,2018-10-09T19:56:11.780000 CVE-2015-2279,0,0,9551d21413870c9f0d036f539edf1435487fe6b82455e295afe0cbac7edfbbd7,2018-10-09T19:56:12.327000 CVE-2015-2280,0,0,f2f8a8e8d04664f4c456d660d1968b6983b0d395072b3a174c07ae356794478b,2018-10-09T19:56:12.937000 -CVE-2015-2281,0,0,ac3496eed67e2a56dd8099ba013a29dcceee17ff122549fa1fa51b5ae6e0e98a,2018-10-09T19:56:13.467000 +CVE-2015-2281,0,1,32985e91bfe995fa07af74891256b3b1a8d9b8c4fd4d546848a632683be0c362,2024-11-21T02:27:08.587000 CVE-2015-2282,0,0,5931ddb303ac4ab0143aaba6b54ca8d52f66d5df7985ebe6604a443fa10fa2ab,2018-10-09T19:56:14.093000 -CVE-2015-2284,0,0,c64dc8c2c5f48575612827a35dbda2c2bf895ac51c89f79260d425b6f9fad788,2015-03-25T21:13:12.290000 -CVE-2015-2285,0,0,e8f36c709078c7667a95e40c4335234ef22e6785062404fa2369374a7bd913a1,2015-03-13T14:05:22.597000 +CVE-2015-2284,0,1,1866dd7c2c5935919996738dafe0d055594fd2bad3e86b75208e06d56d36ec15,2024-11-21T02:27:08.863000 +CVE-2015-2285,0,1,1a85dd0ca179c7dc4cf73d9990ef6097454e4a1ce368ddb36f7103d5eb2950f0,2024-11-21T02:27:08.993000 CVE-2015-2286,0,0,a1202f41b87f7b6878cb8d0cf108f9db5d3073f99a950d19f2c0db64d7b6485b,2016-03-22T13:13:47.267000 CVE-2015-2287,0,0,a50cb2351b0abf60313d28967e8f7623893f16414972711aebc66526db1da1bf,2023-11-07T02:25:12.530000 -CVE-2015-2289,0,0,a47a9cd72af2b173ab8149c9a22f031a98da9d1f689f68f43c39703f40cdb416,2018-10-09T19:56:14.530000 +CVE-2015-2289,0,1,604dc38d1b29f4c3806af2fe7652eff8bb12ee2085248b3a20902058303e70bb,2024-11-21T02:27:09.277000 CVE-2015-2291,0,0,0e81383f811fae789a6772c0deab1948ea1885ab2de5f321b41bbdd512232906,2017-08-24T16:16:25.230000 -CVE-2015-2292,0,0,89e8b4ed8198d0d53dd70dfabcd5ca82f362b3e2045f14fb868f088748f8db2a,2016-12-03T03:04:42.790000 -CVE-2015-2293,0,0,60d2068cb06aea39ee905ba44893bc530ee694c96ba2239ed4054f4bd2fbff43,2015-03-18T16:13:37.877000 -CVE-2015-2294,0,0,6512c44a86796d2def31e44d24de0434f999c565fbaabb07bcaaa4f6b1b1de4a,2019-05-30T14:57:55.183000 -CVE-2015-2295,0,0,d467560f8c880bbd7969d38e0f31de068838de8267ebab46f15b7c2e2e2b7e71,2019-05-30T14:57:55.183000 -CVE-2015-2296,0,0,a69c7dc339cec7263d3c647bbc54b7ad25b1a1cfcf4ffb96f5389300065b233b,2021-03-18T13:19:51.930000 +CVE-2015-2292,0,1,7af2230f781a2812c04896d048929082591ccd187a1cd02e55c0bb0074ec1635,2024-11-21T02:27:09.570000 +CVE-2015-2293,0,1,67efebd510094c4486e4a4421adff9ae2834098e99fa9ec0babca892ca6a889b,2024-11-21T02:27:09.720000 +CVE-2015-2294,0,1,ca474dad93b454a0e0404e8493e5e44ff747fcebc6eea23f071ae92390c00a9a,2024-11-21T02:27:09.857000 +CVE-2015-2295,0,1,95af3b7c94f1bad08acdbe7a96c927d107d11b34400262b0f44518023f919fa0,2024-11-21T02:27:10.010000 +CVE-2015-2296,0,1,c6686efe8611b7ccf95d38e8ae7eaee7585e7d27b42e7d607f0aed99e7f3938c,2024-11-21T02:27:10.147000 CVE-2015-2297,0,0,19914d425f1854737f16301e60553760ada616fa21229c962b34abc6b9744a74,2017-10-13T19:58:09.220000 CVE-2015-2298,0,0,22d726411af6390ae2434a4b2211cfcccf26fda45a75968b351756d0c0d7e22c,2018-01-29T13:31:09.310000 -CVE-2015-2301,0,0,3268735ce7689c350469f88673deb5600e14cf605038f2be19ac8ad67234dd3e,2023-11-07T02:25:12.740000 +CVE-2015-2301,0,1,0210657398a4dba4c963709ccdea92b7b50accf18e426f0699352c0c0f155e4b,2024-11-21T02:27:10.587000 CVE-2015-2302,0,0,c928b8935e88ce144d202146fa88bed3f2f91929b80187ceebfc62234d6eec64,2023-11-07T02:25:12.870000 CVE-2015-2303,0,0,521ea6c1159c5bce96773cb4b684fd6c34872aa6bde9cf4014d3cfa9fd284f02,2023-11-07T02:25:12.923000 -CVE-2015-2304,0,0,0bd767122e80e270f93fa13ca73683bc2de69a7534ff9f3d474a0ae64625b890,2023-11-07T02:25:12.960000 -CVE-2015-2305,0,0,8ae13b0dd1fcb482e138cbdc043c68321a18ad6d25669d679c1271c38752e849,2022-08-16T13:29:48.220000 +CVE-2015-2304,0,1,9bc0bdcf0c9a1c8434174c5ad426d15a01fb1ddf58beb5a6f01da2d756bb7453,2024-11-21T02:27:10.810000 +CVE-2015-2305,0,1,05ddb08cfead8fa760d9c737048cb4b4842ad82f02953a520c61e592299f5629,2024-11-21T02:27:10.973000 CVE-2015-2308,0,0,d1640659b81eef275d4c8961c5733e51dfbfe9e1b3448422c25d9d938add90db,2016-12-03T03:04:47.417000 CVE-2015-2310,0,0,0ae02fb4d2780ab05a8815c19b604de880cf4c65a543957715f89ba54f09736a,2019-12-11T21:07:51.073000 CVE-2015-2311,0,0,8f78bbf84ea60e4b8f2f908bfe3f398ea2442d0235eacaf2d8fc72c8834356c9,2017-08-17T14:35:21.067000 CVE-2015-2312,0,0,cc09c6ec5deeba19eeac6113b80ebea01889e4fbcfab80055aad1f5f0ef212f5,2017-08-17T14:40:24.387000 CVE-2015-2313,0,0,7d10ef76214ccc9119b29ea05358dde5e2f3cf4eb762c55cdfffa26f711667b7,2017-08-17T14:59:09.750000 -CVE-2015-2314,0,0,9c4795e97e8c2435cf7fb1a92f03783caeb19c387fbcc8c15fe85c895a9e6055,2018-10-09T19:56:16.013000 -CVE-2015-2315,0,0,090e12723cb6e2790a7f8bc9003eb416511591c2bbca067061deee58db2b9679,2018-10-09T19:56:16.483000 -CVE-2015-2316,0,0,ff73fc19152e7d39d487d0b061e39886b37a434155b351b58aa4cde54eefbee2,2018-10-30T16:27:35.843000 -CVE-2015-2317,0,0,5422a5dae723c1da6280e372e8e5d2f18d8558a9646542c740720cde33bca411,2018-10-30T16:27:35.843000 +CVE-2015-2314,0,1,02ff395b724b958257e3f1dacbbcce91df2d6e5a869f26d1c48b2e239d33a3a7,2024-11-21T02:27:11.723000 +CVE-2015-2315,0,1,09566afed3ed782a0074043d5dbd1649df494326f71d82d3193ab69e8569081c,2024-11-21T02:27:11.860000 +CVE-2015-2316,0,1,d172c00e01766e02dc44eac9a55c9188bda2d29ce83f6762a29b3d76021fb66e,2024-11-21T02:27:11.993000 +CVE-2015-2317,0,1,6bc61f60fda7699d10f3457f54edfc3d77fd6c1d976572e40e607393a8920f99,2024-11-21T02:27:12.140000 CVE-2015-2318,0,0,08920bc5e52bf860e8bb5ee3b0da631e02c8d7ae248c7f7626c6a4b438ae56a4,2018-01-30T19:19:53.747000 CVE-2015-2319,0,0,652d141290b69499ee230641f944db9ef0af306d51b0ffd0772957c20f573ec4,2018-01-30T19:20:42.263000 CVE-2015-2320,0,0,18235dcbe36ac62f1dce97f7c0483d3a1e37ed4010986a803bd7961c4d9f63d0,2018-01-30T19:21:03.907000 @@ -75763,11 +75763,11 @@ CVE-2015-2327,0,0,50840f8e0f59701253dbc0e967f51355feb6e2c8da474da6ef4eab39acc815 CVE-2015-2328,0,0,e2e9a3bc37098c73834cde00a1b6f73a0b487b9d242f539d8cd9c494cecc83c1,2019-12-27T16:08:55.810000 CVE-2015-2329,0,0,52fe3ef48e348806f42cd287b0450baa0f4106b0f62469249e08aa1d5933d9ab,2018-02-26T17:49:25.213000 CVE-2015-2330,0,0,a41d2d5a9dfdec65d975566b8f7caf77bc43115c1a33b62c9040e00e141a2243,2017-07-01T01:29:14.467000 -CVE-2015-2331,0,0,a5f98d79fd5e244426bbffb4966e5b6c780e1438b7ba30200c93ef6ff1973c80,2023-11-07T02:25:13.380000 -CVE-2015-2332,0,0,52595d6c080ddc48d9b7740b1b8c5c51cc4216ce90e9e2c1942d843f4e44a6ca,2016-12-03T03:04:52.837000 -CVE-2015-2333,0,0,75fcfe7519ef490e70848c4db102e39ae607cc8fb23e6541b4193d32107e7f78,2016-12-03T03:04:53.870000 -CVE-2015-2334,0,0,78eb1c79ac5b7fad86cf81e6755e0464d46b5149b3b7f65d22e668531c891f6b,2016-12-03T03:04:54.900000 -CVE-2015-2335,0,0,892696313742d4ef7be9f94e6d525567ac9b7c0540dcbcf28334e8c0d9ebb4c9,2016-12-03T03:04:56.057000 +CVE-2015-2331,0,1,418b0acf6164b901e958753434b96e9f94e5f74348191904e8f83301eff14ece,2024-11-21T02:27:13.997000 +CVE-2015-2332,0,1,7905335f50d38bf38e57097560a382c7038ab6b19c95c1bf2b3910b6b022edf1,2024-11-21T02:27:14.147000 +CVE-2015-2333,0,1,ae8ba7ade999ba743ea6bd6a71a5776c1a7cf71eaac847e128ce50571f305c76,2024-11-21T02:27:14.283000 +CVE-2015-2334,0,1,3793c7fba6bb69f44087b64b4a3fb1ab941a213600e0dcf3300748b04d42f6dc,2024-11-21T02:27:14.413000 +CVE-2015-2335,0,1,645a2587475bfef34d968b04336766e2e1176dd9d379dc696f3c950bcc2969ff,2024-11-21T02:27:14.547000 CVE-2015-2336,0,0,e9c158940eaf14dc46c86db55c35bdc4704fc7c8138aabb8331812806441a644,2016-12-31T02:59:24.657000 CVE-2015-2337,0,0,c8087ccf291d84024b1e6d3e91ab6306bb754c7d0db6ede03056cb70bdc33035,2016-12-31T02:59:24.717000 CVE-2015-2338,0,0,f4094c4cc98f3618e524120292f9da7a862c47ba90873ed937a4dd59ef4cd823,2016-12-31T02:59:24.780000 @@ -75778,13 +75778,13 @@ CVE-2015-2342,0,0,439ee479984e4549052fa7a7cff5d9b9eb09a40a8ba9ec659cb5b6699b0604 CVE-2015-2343,0,0,e6553a2156f62a629db626b5df2c057719d89cd62ec0a7fd7d33f209053361cf,2023-11-07T02:25:13.660000 CVE-2015-2344,0,0,ded7c6571fe1a20c642e864b13600bd1e6551db57750889ff2ab3abcab8383cc,2016-12-03T03:05:04.667000 CVE-2015-2345,0,0,37280f04913219928c072e73c6ed12b9669bb086ea1a3d110964687f4cb0eff0,2023-11-07T02:25:14.063000 -CVE-2015-2346,0,0,9738ed1e33e3f779aabb8dc44c64b4ee010a05e89abccc6d12a289c872035481,2016-12-03T03:05:05.793000 -CVE-2015-2347,0,0,1a2f9c378ed8b60f87a8c4448acd8d3a1d8a7154c1db2d27a0226b4c62cd8725,2015-05-11T15:12:02.753000 -CVE-2015-2348,0,0,6f6abc859a8a7dfba7de3925a1655ffaf10607e97ddf89699c8dfcb044316be9,2023-11-07T02:25:14.463000 -CVE-2015-2349,0,0,434c4e2cb145f06884d375ec3b183bbdf742942987d168bb55d20d68b4616834,2015-09-29T00:41:21.953000 -CVE-2015-2350,0,0,3428e513313a4b4b8771bd54aaabaf51aab0a3ae2a0396b60be61e7f7880873e,2015-09-24T18:12:26.597000 -CVE-2015-2351,0,0,4619ecb17f9bd8e9ad813638fad49874c86e8695c65935e9ca78911800726aff,2018-10-09T19:56:16.890000 -CVE-2015-2352,0,0,4334a3e15360ca7b271f5fe6f1d9ee4081f62d8773af2e95333ca7e6d790bb16,2016-12-03T03:05:09.123000 +CVE-2015-2346,0,1,371682694b4cfbb1d3a6645b19cbe330ff09d61adf2bc1a8acf0682df80a9888,2024-11-21T02:27:15.837000 +CVE-2015-2347,0,1,2c69d867e0858c0ef484ee0861b9d1ce2ba8e16a1abbe3f7c4fc9839c8b0956e,2024-11-21T02:27:15.967000 +CVE-2015-2348,0,1,f4932a73cf5874e3750c6da7af086b53727f4b4c38be1b0114c6099d14502ce7,2024-11-21T02:27:16.107000 +CVE-2015-2349,0,1,1ef7eb61f89f0bba17d85985303aa59fc7615e1c2a174ca76d969d056d092cdc,2024-11-21T02:27:16.270000 +CVE-2015-2350,0,1,723fb222b2a4100e688bd6fcebd5451c49d893bd2e54233203fc444a989bdce8,2024-11-21T02:27:16.403000 +CVE-2015-2351,0,1,cbfeff11ba5eaf4304e7dc8341d51d448f737a388044c3e04202c823dd5080d7,2024-11-21T02:27:16.530000 +CVE-2015-2352,0,1,9be90f7010f6883a7080a090b5f30428b9db0cf3e23cab32d0ea47b2184afab3,2024-11-21T02:27:16.657000 CVE-2015-2359,0,0,796839e667fa2602438d924ddffba78a264fdfadce9599a08b025e39b6eae1c3,2018-10-12T22:09:12.933000 CVE-2015-2360,0,0,1e7e9fc0bee2d3524ea2ae01f937953068ebb8265499842f48cb83b1d1d26e6b,2019-05-14T20:39:03.247000 CVE-2015-2361,0,0,7bfb33f6b3a13394de716eb6385abd9f706ee615061556664d2a188b43288c4a,2019-05-08T22:03:15.720000 @@ -75985,26 +75985,26 @@ CVE-2015-2555,0,0,289d6b39247c7505998da075260643f07770c3f788ad634571f4b2d2f1db79 CVE-2015-2556,0,0,2ac512292900a082de4d6818295674eaafeece8d1793d0535e6440484365d530,2018-10-12T22:10:04.920000 CVE-2015-2557,0,0,f0100bf6ca4d5e02f82216a03cf68457d6077abd14d80a8d07afd6a9afc4287b,2018-10-12T22:10:05.123000 CVE-2015-2558,0,0,a764c0da3aeb4616a2f18ab864e2357069edbe6035d37a1b20e996b1fa508f8a,2018-10-12T22:10:05.437000 -CVE-2015-2559,0,0,6266cf939252b47bea2d00078f1e98b248156403f065d20a85f45180db678258,2019-02-05T18:52:06.460000 +CVE-2015-2559,0,1,35aa1e29b8968509d296c5d3a64684570b0316d54420c2af3ef285e8792c4ae6,2024-11-21T02:27:36.367000 CVE-2015-2560,0,0,5d66352fa50fe586919dad404939a33e0b3bbdb0d67b517be7dd7d2ce0571d24,2018-10-09T19:56:17.640000 -CVE-2015-2562,0,0,d3089671e190319717aeb6e720f9db79307ea87b5b474ed88cf52b2f46bea01f,2016-12-03T03:05:12.670000 -CVE-2015-2563,0,0,a35dfc70a13de4179fb9e3cd74f4a9a03ff9517508a1c53d5b62497d42042a5c,2015-03-23T13:30:28.020000 -CVE-2015-2564,0,0,c15198cd41cae136c822018f78d31f23a958b1e9f73892979ffe16051148f270,2018-10-09T19:56:17.967000 -CVE-2015-2565,0,0,8c8c1d3576a205ae355b1d209ab4abc2272a039096178668370584f259fb145b,2017-01-03T18:02:05.457000 -CVE-2015-2566,0,0,7e95fc5b861c8ac6bae9ead40d3c47738424806e78cb4ce0ee25b5c1bc5c984a,2017-01-03T18:11:36.520000 -CVE-2015-2567,0,0,ffe00b86319d7e76951434e2b81b98ff0affd85f422f5f32c4f1e2337934cd17,2017-01-03T18:39:24.333000 -CVE-2015-2568,0,0,ea0d85c2fe1b481ace5df9028f83714b5719db5298a9dece919b52e1c421732e,2022-08-04T19:58:49.217000 +CVE-2015-2562,0,1,fea19ac77b7eb7a8418e53a82b567f3c810c18526ecb56c51de6fed03aa3b7d1,2024-11-21T02:27:36.647000 +CVE-2015-2563,0,1,ed96f1e0f5ba5b44ab479a376419e6f9eaa2814d57041fa85e0def55b2cf329d,2024-11-21T02:27:36.780000 +CVE-2015-2564,0,1,bac48f980165c62a6b56216131b1ab157a162aa8fc7dfcc3ba7581d8957998de,2024-11-21T02:27:36.913000 +CVE-2015-2565,0,1,c65eac7688c74773607507390e0eb69f833ade3da6039779c51417fd09edd5bf,2024-11-21T02:27:37.060000 +CVE-2015-2566,0,1,1a5dd1915b17594667efb8e1508670d9d6d0406536067b37bb16777b558b2601,2024-11-21T02:27:37.170000 +CVE-2015-2567,0,1,ef62159d29474209de63ce3253185481bb0105ffde192492031c2e7a2b653da0,2024-11-21T02:27:37.283000 +CVE-2015-2568,0,1,8f844eaad0a025be36c3d941ede17bab55c0e7b94810e22e888f8fcf22c7c5ba,2024-11-21T02:27:37.407000 CVE-2015-2569,0,0,61ac1c2e32717140c9c2e8b491692fca17284d271e5a114e282c0fa4b66c8950,2023-11-07T02:25:23.110000 -CVE-2015-2570,0,0,5723cb98bbbde6ece554d5b25a9686fe2df3ed6045b744a4a9ddc2f76d6f2482,2017-01-03T18:37:36.817000 -CVE-2015-2571,0,0,7f08c3c5b5579461f3abd3a5b87bff433a1d8b92d9b5ef5607b374a128a05dcd,2022-09-08T21:00:55.747000 -CVE-2015-2572,0,0,3d3e26d3a09b466cc2c0d09b9388ced7cea95df47ec6d1a60a18ae8340372aeb,2017-01-03T18:40:32.623000 -CVE-2015-2573,0,0,c45d1396a6d176bb9d70b84b866ee216e8d20213e66cb687177b47a7d4ed46eb,2022-09-08T21:01:04.380000 -CVE-2015-2574,0,0,9b42bff70243c638eda641cba1335d2b59bdf8ce617982cd496c82ab33573d11,2017-01-04T16:24:18.133000 -CVE-2015-2575,0,0,9cf076933304353f71884fcbfee3ee2ee6e692f7d3ba05580fef8d9de122053a,2017-11-10T02:29:01.607000 -CVE-2015-2576,0,0,ec710375ec1efbcf265e35255fdcbe94ccc1a495812e2621194e472a3490da40,2017-01-03T18:39:30.163000 -CVE-2015-2577,0,0,2e6dcc56ad6a6b2e4c02099e60185e25d6594a7e7b07e08fd24fc7db342d6fa5,2017-01-03T18:21:30.997000 -CVE-2015-2578,0,0,dc47ee69b672b7a82ff86de40d798cd46e5b8bfd261b03cf78fa577d4b80133c,2017-01-03T18:39:17.723000 -CVE-2015-2579,0,0,b8f2af34111ad5910c4b52e11c6fd7e750a2dccfde16ec0861cb7c02cc4efad5,2016-12-03T03:05:18.890000 +CVE-2015-2570,0,1,2c89a994f9e56fef18bba62a0a190b16e9cc7093413e5142cb1e86532bfa307a,2024-11-21T02:27:37.590000 +CVE-2015-2571,0,1,3398bdcd41788db18cf57820d5dd6a08f8526a4b289ddfe035bfb9777a1456ad,2024-11-21T02:27:37.700000 +CVE-2015-2572,0,1,d16e3f6a4dd62c929ea0358478229737d72e2c5de433a760b1ac414a6615aefb,2024-11-21T02:27:37.870000 +CVE-2015-2573,0,1,779d93b7a6bfeb2a0a09da90cdfc06b833319fdcd33f214092e831edaad8e8fe,2024-11-21T02:27:38 +CVE-2015-2574,0,1,95cb5b39ebb561f29ca24089f5afac3c6d4be52436707c0ff2a43139accafee5,2024-11-21T02:27:38.160000 +CVE-2015-2575,0,1,e8f97ba2de4fa6c196c9806ec01b3a22af5f9868b71734324211db86a9cb8b19,2024-11-21T02:27:38.273000 +CVE-2015-2576,0,1,c57974148b6094676fc112e085d26b98d568498782ac5cc0faf44f0393d31ab3,2024-11-21T02:27:38.393000 +CVE-2015-2577,0,1,d2a540b01e100dde6fc488cacd282b01529ad014641a43ddaed4aa195e56e920,2024-11-21T02:27:38.507000 +CVE-2015-2578,0,1,d9badd66607d36d6c13e7d30fec2887bc03bc97a5ffd276303c782a4022f9551,2024-11-21T02:27:38.620000 +CVE-2015-2579,0,1,57c325766d65ecaaeac54d87b79e8ec12c6534478f531cd0142d1cc0eaada0fa,2024-11-21T02:27:38.740000 CVE-2015-2580,0,0,ce305a078cfaafaeb124845d48b57257bd7fb28ef5180fe62edaf5eb5eaf5b3e,2017-09-22T01:29:06.357000 CVE-2015-2581,0,0,0b92e346ce53c7aebb236158e85c66f63ca7578ed370d49869bbe87514b107b6,2015-07-17T13:44:20.707000 CVE-2015-2582,0,0,d68808479b98a661a9afb583b657b3739492d5b6d672a544530c7a24db6ae178,2022-09-08T21:02:15.887000 @@ -76091,52 +76091,52 @@ CVE-2015-2662,0,0,cc91074bfdf3988a3214afbc43c997c115e0d5d91e2acb42477216b6050444 CVE-2015-2663,0,0,caba90b5f13528fb205f749e1c43a51b086928427cd16f0798b15ffa1acd9d22,2016-12-28T02:59:07.760000 CVE-2015-2664,0,0,ecebd7c4f71394158126c1d027415c7f8fc9059992e9c8a00eef5e148bfb2b21,2022-05-13T14:38:25.750000 CVE-2015-2665,0,0,eb3bcd822e7132b70785d9e39ebc59cede9b11ee1c5189ab0eb84580b892daf9,2017-11-04T01:29:03.803000 -CVE-2015-2666,0,0,1364af7cfcd878486157b88c4f89d55daad78014d4a924d9c9f00ffa2d3110ec,2024-03-14T19:59:23.823000 -CVE-2015-2667,0,0,72a5b05efc264bbd372f78975ba32bf3f45bbea84e47e7b5765e27b649956f58,2016-12-03T03:05:35.877000 -CVE-2015-2668,0,0,3657fb8e3c0220583c6c88afa3029c629f9d13ddc29a319252884e1628f8e7de,2017-01-03T02:59:53.693000 +CVE-2015-2666,0,1,9b6470abe1e401a6e57a817bff240385b2fe3394e6fe04507156d23645dc202b,2024-11-21T02:27:48.717000 +CVE-2015-2667,0,1,dc178c2d62192f64237f912e7601572d580a5624fe76c4175d71dcdc5f7c2d53,2024-11-21T02:27:48.863000 +CVE-2015-2668,0,1,c2165c445d22039109d41e93b90185e92f74e94fb7660464d0d16ddb7f695c27,2024-11-21T02:27:48.997000 CVE-2015-2670,0,0,58ed612846a8732eddfbb998aac12e3c9fb7e97e8a1f4f227ba83261f31e44a5,2023-11-07T02:25:24.210000 CVE-2015-2671,0,0,4a0646331c261c557edf464c2e3309289c059e8355efc97a08e1a96580e5a1ab,2023-11-07T02:25:24.570000 CVE-2015-2672,0,0,187e048c575731c5c71badcee75c4ca928d866fce00372de3da0f0ed47f9a866,2016-05-06T16:46:26.207000 CVE-2015-2673,0,0,bc757e5756bd6d8584ae58a993f2600082999dee6697d5c216378c43f01931d4,2017-11-01T12:05:17.933000 CVE-2015-2674,0,0,603e7ee5f733f5cf131bd697483d57d94dc38141ef229834e187ade6a460dbe4,2017-08-21T15:00:33.017000 CVE-2015-2675,0,0,50accb7af58cd92f5a53706f9e9e1c748fc345bd3eb4e9bf378f0724678e4f7d,2023-02-13T00:47:36.580000 -CVE-2015-2676,0,0,278f8e14c5a0f517a306e0d427bf0f8ba51b93f89b10acaec95d92e4d5a06e3d,2016-12-03T03:05:38.080000 -CVE-2015-2677,0,0,98176a8daa780f257909eef49ddda8babedd2beaa84d79bbbaa52c09f313b567,2018-10-09T19:56:18.453000 -CVE-2015-2678,0,0,4d1c25a52b51303349010f31f72bee959fdb84d2b1531d81dbabbd43d94ab8cd,2016-12-03T03:05:39.237000 -CVE-2015-2679,0,0,30b5b59e31fdcee3da660aea184544823f37b6b1c22039df8d2ccef4e6c99b6b,2016-12-03T03:05:40.313000 -CVE-2015-2680,0,0,8d698a66777c75b607376a79fb1b93b3cbaadbd6eba6f80be2d409d2bebae0d8,2016-12-03T03:05:41.423000 -CVE-2015-2681,0,0,42dba0e24ab12be6a6fb495a928812e86724f0a44d497d4fabdd98122e2bfe33,2016-12-03T03:05:42.517000 -CVE-2015-2682,0,0,929f5e723372793e0e1d699b58745d3eebc184e984fdd1498c70c29a41333e3e,2019-02-05T18:15:00.493000 -CVE-2015-2683,0,0,1c50e1c31f01b48339ed75d0239f1401204885f2ae18079042741a23685152ad,2018-10-09T19:56:18.843000 -CVE-2015-2684,0,0,60c4bbde080e7270881c27440946c74b939661aaef11349fddfb98c333f9e03c,2016-12-03T03:05:45.643000 +CVE-2015-2676,0,1,935569054f08c9ebbfc6047f3ac17486abe54dc78274f794c22619ae8acafa71,2024-11-21T02:27:49.793000 +CVE-2015-2677,0,1,e31ceb97949d7f0650b9003f224d44583e2fb57bc25227df9bec13635fd44c07,2024-11-21T02:27:49.933000 +CVE-2015-2678,0,1,d931828989e7f91b013297ebd0bcd66fa6b1844f52453cf9b03eeb0750f45f2d,2024-11-21T02:27:50.067000 +CVE-2015-2679,0,1,a3b90d3b1a40724b950db0cffcb43436f2489d730506212118dce76e62433a43,2024-11-21T02:27:50.220000 +CVE-2015-2680,0,1,a7e604d80836ecbe92c908f074c020e25832b14b5d70b82244ff19188cbaab79,2024-11-21T02:27:50.380000 +CVE-2015-2681,0,1,cef0fca781f45fbac70f0dc45cbd8a0e83fc5c908accd029b264bbff8d5a5bc5,2024-11-21T02:27:50.530000 +CVE-2015-2682,0,1,523943e654c5be227f439f77b2a8b396b177b05dca8f2e08c9084ae8449cca0f,2024-11-21T02:27:50.670000 +CVE-2015-2683,0,1,901af8f5bc53f0132dd2f37064b0766126254ae1fd067f369dcf74d0ce4a9f95,2024-11-21T02:27:50.820000 +CVE-2015-2684,0,1,a9c85b09392ddf55ecc9eac17ea157d67f3c2ba46314f82f553b78fe32e7e2b1,2024-11-21T02:27:50.973000 CVE-2015-2686,0,0,72ea23c69fd6d4be9d9109a26218f0668be3ff63bbc11dbaacd8a6aad780be9b,2016-06-27T23:57:09.427000 CVE-2015-2687,0,0,687c183936de83ded76c82b5929891f968005d4907eff618c0b6d4db79311bd1,2017-08-24T16:49:33.893000 CVE-2015-2688,0,0,bb2eacd5247a3957325212dd57f43bab90bf4ca96b3742f1c69fba01e031108f,2020-01-31T21:05:27.990000 CVE-2015-2689,0,0,2e8881dce6684db5570b41b22cffed32e46e3622c5763c9e91317f7b22850838,2020-01-31T21:16:30.537000 CVE-2015-2690,0,0,436e0f8b8bc9ac85ddd2ea933944e9eb54dd92a452807a83babe6ad5c6559c2a,2018-10-09T19:56:19.390000 CVE-2015-2692,0,0,7db31e8b57b3b2074714a2ea8010d94f6ea26e1800d149017f0e2f7d8cac6d32,2017-06-20T13:17:49.340000 -CVE-2015-2694,0,0,223b9aa9602e642bbe2adcf4b3906307fa71b09374da5366c9cf0e8bda3e837b,2020-01-21T15:46:59.103000 +CVE-2015-2694,0,1,9261c9e8ecab916463cbbdd3ad2de41f5d54f5af1b8a1ee5f542e4bcf19c26c2,2024-11-21T02:27:51.870000 CVE-2015-2695,0,0,988429702d4bf77c8f52fd4863efd8018bf05010995399bf7a05b017a5077c4a,2021-02-02T19:05:02.277000 CVE-2015-2696,0,0,912d6acb9145ef37fd82760e8f80464fe2ccd49fc8b572962327807f851b4622,2021-02-02T18:51:52.900000 CVE-2015-2697,0,0,ce5e5031665dcff32b80aafd5941808ae78ccb9cac7467042647971cd875b344,2021-02-02T19:06:45.520000 CVE-2015-2698,0,0,6bc5bd86424fe5f5e2e33882dbb76322d7b79bc82a27b2677ffb4ed0de2164e1,2020-01-21T15:47:11.527000 -CVE-2015-2701,0,0,54420974fcac19c21538cc01f5ab6c44558af4e018fe559dcd1fec9216106d2f,2016-12-03T03:05:46.817000 -CVE-2015-2702,0,0,ee6e431581b8292cd49ef906507f9761acc99697fcaaab93510fd342f0d202c2,2018-10-09T19:56:19.810000 -CVE-2015-2703,0,0,b49d5b9cd828456bda9a45bcd762d03340b982bc6148bd01cfbc3e0b3dd3a7e2,2018-10-09T19:56:20.343000 -CVE-2015-2704,0,0,ef9b16096bf20f05ec47c72c1ede5c8d56b2e5468de597be9fc02a9c4a318d89,2016-12-03T03:05:48.987000 -CVE-2015-2706,0,0,0facd706ba8221ac160642bbef61015e33d92196c0d4bac6e8eb4f24c30bf4e2,2016-12-07T18:10:21.967000 -CVE-2015-2708,0,0,258b94a8ccb7dd389e1387e9690d840b2562da27bbe7ddef1ad27d73d54f5924,2024-10-22T13:54:41.943000 -CVE-2015-2709,0,0,1ffc80eb346bbf58b18be5cefd70747f43e824863c5ea7a7c1aab92bb8cad525,2023-09-12T14:55:31.563000 -CVE-2015-2710,0,0,1bbe6c9cce5c0f28b62222dce3e22afad33da78b0ea706164c623072a87914a1,2024-10-22T13:54:41.943000 -CVE-2015-2711,0,0,7ec0f8ce54b6d5062984f61a0548a309771ea33bfecbc0fe182e89f75ac69800,2018-10-30T16:27:35.843000 -CVE-2015-2712,0,0,164a8230b4f441bcd76b5003463026ed0413a7127798651d8b70b8b9324e19f9,2018-10-30T16:27:35.843000 -CVE-2015-2713,0,0,3c77f739ef298deee8ff32d98151f6e9c7dc32b3ecaa836e3fd658ad8a125e25,2024-10-22T13:54:41.943000 -CVE-2015-2714,0,0,975afa921e9d9b01cea679b2739f470bad6d77aa6d69e8b37837270fdb54389b,2017-01-03T02:59:54.333000 -CVE-2015-2715,0,0,9f6e1432a834c549acb97873b101c9b589ebc03e9143f6d0e0c0a1551fa381a9,2018-10-30T16:27:35.843000 -CVE-2015-2716,0,0,d4173ace0916d8503ac71471b952a252ef0713ecca9c8845fcd85175511b7b8b,2024-10-22T13:54:41.943000 -CVE-2015-2717,0,0,3ccbe0bbced6a9a67f52ffeabcab461c21c9ead41e4f4f9ad2e4d9f250dff7b5,2018-10-30T16:27:35.843000 -CVE-2015-2718,0,0,87eb531bce59d0e8fb2863e396563365f7f0293909e44e1cb14172a44e158f33,2018-10-30T16:27:35.843000 -CVE-2015-2720,0,0,8f1def5c00c8fe39093cd00716889421f0346ec85c15c1e5ecff841ce0e3fbb9,2017-01-03T02:59:54.803000 +CVE-2015-2701,0,1,d21a7c4e1911c1bf01c803514c050f2ef14847a9abb248f7e74b83cfc0d54cca,2024-11-21T02:27:52.670000 +CVE-2015-2702,0,1,6fdd6f38c049c1c4cc5e15e3e277f132b856e66ad70c14b0d00473a07797c86f,2024-11-21T02:27:52.810000 +CVE-2015-2703,0,1,e7d8ac665133f763ce68f4647e193e3e1a45513c422fabe4285298ef487562c4,2024-11-21T02:27:52.957000 +CVE-2015-2704,0,1,053dabc437f718592c0babc5eb2ea38278fce295a49634d4f22371ef37b5a56e,2024-11-21T02:27:53.120000 +CVE-2015-2706,0,1,e71e0f061aaed128fc9a4a4538a76bdbb005f9c622f5f510d11c9b529eabdd66,2024-11-21T02:27:53.263000 +CVE-2015-2708,0,1,bf1662464cc892a2c02879857b8ed1370572e524150ff4dc47cd5f91a6cd56f4,2024-11-21T02:27:53.383000 +CVE-2015-2709,0,1,8f942df4967659e82bda60e37c6ae5aed84f8f55e5218a7f0872b31db7b4c09a,2024-11-21T02:27:53.513000 +CVE-2015-2710,0,1,df5f49ab0c259cbb39ac056349213865a0411a4b2563aed0ecbf6c605702b315,2024-11-21T02:27:53.640000 +CVE-2015-2711,0,1,54afa78b52e0d5981a2131e519a9d07e38da370f47193179eac6961fc98e5667,2024-11-21T02:27:53.767000 +CVE-2015-2712,0,1,b02f38ab0b4e512a0acb6680a4b74ea0b3c15415e38358f87c0a722c294574a9,2024-11-21T02:27:53.870000 +CVE-2015-2713,0,1,7f714bb4e8764d974c47194ce970dafb95c26906137ce00249fccc1de1e7c86b,2024-11-21T02:27:53.980000 +CVE-2015-2714,0,1,bbc2658ec475c1bba191a255584ba1c04ddd1f0a85d61399d25a712ecbf226aa,2024-11-21T02:27:54.090000 +CVE-2015-2715,0,1,1bba631d79a6b6c24af9dbe7d483c22bd389a24acab7457adc93ccc5013ff81d,2024-11-21T02:27:54.220000 +CVE-2015-2716,0,1,a082448d1c6c0d8772244beace20d0ad31e783482057839443df61730e4d438b,2024-11-21T02:27:54.340000 +CVE-2015-2717,0,1,787341e62fb9c4e246d5ef57ed685cae835861892e099447be4d01038318cdac,2024-11-21T02:27:54.483000 +CVE-2015-2718,0,1,bfe3f790bf0b19915eeed547178ae6ea19550fc1c8d0294d68431188e750e614,2024-11-21T02:27:54.597000 +CVE-2015-2720,0,1,1768a42f36799264f10745048b745dd3244a7d5c9aa103f4b3c743c403c25209,2024-11-21T02:27:54.707000 CVE-2015-2721,0,0,1511824fbb4c50a8bd9200a7eab99408b1e79a9af9946811b96f686c2b528ee5,2024-10-22T13:54:41.943000 CVE-2015-2722,0,0,13c1014120657a84bbb53a540c4baad79683ab7179fb0c78b490357d073d8569,2024-10-22T13:54:41.943000 CVE-2015-2723,0,0,826a9754781c8f2a29bcdc4db523b4db7be490dc76361391282d6dde5f6ab7c0,2023-11-07T02:25:25.303000 @@ -76161,52 +76161,52 @@ CVE-2015-2742,0,0,931e26b5fd467cb96d013d07d98a24987707bff058899576655f1d23e795a9 CVE-2015-2743,0,0,7c67a66e81d56e4a5fdb8f6b583458d30cd5d53c99c4b9ecad11a95628d66a40,2024-10-22T13:54:41.943000 CVE-2015-2744,0,0,5c43e4e2d436d715782329e6abbcde223814288b78322c92dc3875ae4d55851f,2015-08-10T12:51:02.540000 CVE-2015-2745,0,0,910630cc1150cfcc8a68ec3fa6963e5449ad84a1f0b3992f11685126e62f3af0,2015-08-10T12:51:41.867000 -CVE-2015-2746,0,0,fb4b5fe0437110dac9545713472c8a55b0d697c812fe4afcfdd2c99a0b238399,2018-10-09T19:56:21.157000 -CVE-2015-2747,0,0,93c8f3f6697ac51f902a045f2b2c3704a51ec97e88758ee16a0ff5ec64b9bbd3,2018-10-09T19:56:21.623000 -CVE-2015-2748,0,0,32e46768372fe3f187950c2764dfdcac632e619e6abf64a4309df6f2a8a52829,2018-10-09T19:56:21.953000 +CVE-2015-2746,0,1,56d8fe03944dcf51f3c30af9de9528910e20795e8f2024e771c5cec7edf36b3c,2024-11-21T02:27:58.060000 +CVE-2015-2747,0,1,58d212aa820391f04840a3adfdf470ec9650de23277400d7010df7d1a9c0f979,2024-11-21T02:27:58.193000 +CVE-2015-2748,0,1,bc74d8845a39c0df63d862a0c9aea02986d9f6c2c4662220ed685c8b343a8628,2024-11-21T02:27:58.330000 CVE-2015-2749,0,0,b99d310779df8a57dc962b22542c19e188643e3510671c88b1b45abca6aa9154,2017-09-21T17:06:05.003000 CVE-2015-2750,0,0,559fd662d7fecdcd42948f22d66f5f44cc60bf911b9a1f2a7e9dad9868fc78c3,2017-09-20T19:15:47.117000 -CVE-2015-2751,0,0,3e5085257d22c8cd9fc4246c828003b7fba2053462067cf6ace6e15cedf1292a,2018-10-30T16:26:53.700000 -CVE-2015-2752,0,0,84588846c3bf7a5ef2ef25ddd5b9ec0d4e69185e3129f53a11854ad98734f6fa,2018-10-30T16:26:53.700000 -CVE-2015-2753,0,0,99fa28a280a3b12547dcaa433bc526d713c492208131612048fd152e898ef07f,2016-12-03T03:05:52.190000 -CVE-2015-2754,0,0,ddf464db02ffdbb6212c4b9c2915e9c8ca3f02292f9aad39ee19262e6c931e04,2017-11-08T02:29:01.147000 -CVE-2015-2755,0,0,abd57674096b4f00eccf40c2b3ef927afe9bf9260b469779675e3bab03426f4e,2018-10-09T19:56:22.357000 -CVE-2015-2756,0,0,f56540b5c4913dd03732494e583993096a7cd66f87c1c80c31f75adc9310f81e,2018-10-30T16:26:53.700000 -CVE-2015-2757,0,0,774934a1469b77c73e2a98a86e2c94c3046911a9e1b40fcc3be4e778b3c2307b,2016-12-03T03:05:55.613000 -CVE-2015-2758,0,0,db2abc93c081bb231a7a5997426290c7197c063b99bd312fc40dac64c61706c5,2016-12-03T03:05:56.707000 -CVE-2015-2759,0,0,982c1b1a0af7f79b1ba4c759a6897f9136aff4cb01bd158897a7b3ab7f1a283d,2016-12-03T03:05:58.597000 -CVE-2015-2760,0,0,e941d5ad3697a94a1c6cc115e868d8530d8e48bd1165d02367aff5f4bc30714a,2016-12-03T03:06:00.130000 -CVE-2015-2761,0,0,9dae2ee170d25410647460a1ceefe289e7047376b500fae61f683f310a0da707,2016-12-03T03:06:01.287000 -CVE-2015-2762,0,0,4d1f81f745989922b26afc4c8dd5ffef3dee0398f11f6d098ee044248d3a92f0,2016-12-03T03:06:02.410000 -CVE-2015-2763,0,0,6c5f40747ddfca68bd1eecb7008352d3eb9aff65755fdf7e174405dc158ba4ce,2016-12-03T03:06:03.520000 -CVE-2015-2764,0,0,fbabe96ce706aca4e08df5809dcf4d89e1c3232d02de2e08004e0c7e80a5292a,2016-12-03T03:06:04.630000 -CVE-2015-2765,0,0,04e621cc6ff382587fa24cd1c153e57de8e4689448e5934e171ec66bc2e97131,2016-12-03T03:06:05.710000 -CVE-2015-2766,0,0,44a5ddb07501d63d1344dfdd8fcb325620001987e8a777d8d650fd1168ec2e87,2016-12-03T03:06:06.770000 -CVE-2015-2767,0,0,1f05749bdf4353031a343771c036742e0317cfd1e0bf851417d308c7e0e37f5e,2016-12-03T03:06:07.927000 -CVE-2015-2768,0,0,b203c7e73be09cdd134e68cfaf7c74970bd5eb586dbc82e61ff3bcbd0f5cfeb3,2016-12-03T03:06:08.943000 -CVE-2015-2769,0,0,3157992e677569c00dcff077cb2e58dda7c664e2dbb2cc39e320094615b3b533,2015-03-30T19:46:00.303000 -CVE-2015-2770,0,0,36641ad2c9c4bf574926b026bace512ab7e62088212fa0c6000c3f3e8aa8d54e,2015-03-30T19:46:53.337000 -CVE-2015-2771,0,0,2ca9411e83ec6db186aebbb77bab7f42a4f98b888f3be3a6a5cac222799d2965,2016-12-03T03:06:09.927000 -CVE-2015-2772,0,0,088764d2f17f7db96a913fc5717640fe07c4df35ca3df7a4b7ee339bee536c27,2016-12-03T03:06:10.913000 -CVE-2015-2773,0,0,dd81cc251c95c5271393908507f4e939ee1051e547f457221a98c191dac19877,2016-12-03T03:06:11.883000 +CVE-2015-2751,0,1,575f8392177fc3c2437cdec75a552fd53a154f0bb9fe8539fe8023b6830fa816,2024-11-21T02:27:58.797000 +CVE-2015-2752,0,1,9ef4b289b95ebb92e6d6b00f54ebb91c244a76c24c7f4c0ed0e0dfffe25fc2e4,2024-11-21T02:27:58.940000 +CVE-2015-2753,0,1,8cdc56bd981b62b45da6083a4e0e5f4cce7158350dd03ba4cedeb7b9b9edb941,2024-11-21T02:27:59.090000 +CVE-2015-2754,0,1,7306d191906b93d43541b6f1098debfe0c82fb056b6e605db4a2fb5c11be1482,2024-11-21T02:27:59.247000 +CVE-2015-2755,0,1,e97cd2daf580f225b00cc32854ffca139ca95904e5851ef74965fb59c306af86,2024-11-21T02:28:00.120000 +CVE-2015-2756,0,1,fb4c5ee44d6433c4e341b4f2b1fbd76ed05abacbb9fadab21696ac9b9a5790d1,2024-11-21T02:28:00.273000 +CVE-2015-2757,0,1,d43d81531a482d48bbf40329696b33dcdb3fcedd8408a21f790cb69f9ce1d957,2024-11-21T02:28:00.427000 +CVE-2015-2758,0,1,e9b566c3457d7c89713f15b7691fb1df0dabd2ee5c0a6b7fe95c128310de4b2b,2024-11-21T02:28:00.567000 +CVE-2015-2759,0,1,6689982f48d05186e3cfe8d87226ec84470d13c60e3a57086baacce76fc79516,2024-11-21T02:28:00.703000 +CVE-2015-2760,0,1,e370acfbfd3415e10bf44be4bca1581c18407c8737d2e786f91f166eb92caf2e,2024-11-21T02:28:00.837000 +CVE-2015-2761,0,1,87c8881d68a41d74963281b51424993475f70ef98e9b449927145f6c69cd0c9b,2024-11-21T02:28:00.967000 +CVE-2015-2762,0,1,62227410483a769799d9478325e7f30d78abebe5c77e72b1e49d925481bdfffe,2024-11-21T02:28:01.097000 +CVE-2015-2763,0,1,74bafc2b86366457de14c9d689d0d81ee55cf52be7325e8831eb3cd5711244b7,2024-11-21T02:28:01.230000 +CVE-2015-2764,0,1,e92c871a0d851e93e5faf5bd8c69a06f0b925e719425efa3028ec89bb8edac88,2024-11-21T02:28:01.370000 +CVE-2015-2765,0,1,3a2a812b2739415bee746bb23adf7af487feb2d54d9fadd2bef34fd3a73656a5,2024-11-21T02:28:01.507000 +CVE-2015-2766,0,1,7be285f602cdfa76137ae4beb3a1a70de3d5c9551b507065e5f482fb95572961,2024-11-21T02:28:01.647000 +CVE-2015-2767,0,1,b5bfba6c9a6b0aa8654beb6932e10800487f790a28157d7ea3679c0d4a22baa3,2024-11-21T02:28:01.787000 +CVE-2015-2768,0,1,afd545b4293d4dc75d123e27cfdd1532af939774435e159773024c85d8fb9228,2024-11-21T02:28:01.923000 +CVE-2015-2769,0,1,918b06218071f9ddc49b4214db6eef2ac8f5aae37353f850c5aedc337c86ca80,2024-11-21T02:28:02.060000 +CVE-2015-2770,0,1,499ce4176caaa57816783cec06a01fe763c1c7a5acaa1ed984ad10b6cf36217a,2024-11-21T02:28:02.193000 +CVE-2015-2771,0,1,a04cb8a1002c16c37a0abf5264cd8bf2ab18cf09f52855ddf788f2d23f4341d8,2024-11-21T02:28:02.323000 +CVE-2015-2772,0,1,9b46c4c432158df59201e3fbeca924a8ee79dec7d000b8f92be5f6a681b0e2f5,2024-11-21T02:28:02.463000 +CVE-2015-2773,0,1,8817ee23b54598cd7a5baa040ad1dbd46b11583b68b022045c209d83cb547edc,2024-11-21T02:28:02.607000 CVE-2015-2774,0,0,1556d34711a24af60e95460fad7c073d9a1a689d3837e7dab7c9de93fb788876,2023-02-21T19:09:49.203000 -CVE-2015-2775,0,0,349a2fd5a99dba3e7ae99b1306fe07f14d4437f59704a9fd18d7c1d79c5559f5,2016-12-24T02:59:10.977000 -CVE-2015-2776,0,0,12d0db9ef5dca1005f1a08abde11d75f62e2b91903cc091c6a1df30f7adc44bc,2016-12-03T03:06:15.037000 -CVE-2015-2778,0,0,370b7abc1266c6d1ef1151933f29dffc0af6f5e41ac805f883696cf8a5b79f2e,2016-12-03T03:06:15.947000 -CVE-2015-2779,0,0,6a842ba3eff5dc0c7ab083e5a6948707ba621034c38ca8144ad4c855791d3c31,2016-12-03T03:06:16.960000 +CVE-2015-2775,0,1,2430f3f3fbd888d56f152aa6e44522717baf10cabdfcaefe6ce072aec09eac27,2024-11-21T02:28:02.903000 +CVE-2015-2776,0,1,c3516e1250d723260b7e2b5b7360770bdfe4a79729aa1f47079e3a2448691fd1,2024-11-21T02:28:03.057000 +CVE-2015-2778,0,1,f66db7230744532d91814b3500f167bd2fc871f6424c0e42699bd3e4320b747d,2024-11-21T02:28:03.197000 +CVE-2015-2779,0,1,7d6f86aae9b83ebc2499eddd10dca81e63b1edd5f2737a57158faa21952cbf25,2024-11-21T02:28:03.340000 CVE-2015-2780,0,0,dcf92d2f5b1aa349e2e890ce9fc4ace7164c70b7088c32b51e9b8342e411b7bf,2017-11-07T20:13:14.847000 -CVE-2015-2781,0,0,af2f7191400ec35c34497527f6596ec0938c9c7029b587b9c92fefb96ec96fc2,2018-10-09T19:56:22.907000 -CVE-2015-2782,0,0,b4c1680796e865f770e63bbe16a080c586198fb816ab41b6821ebe7a1cbf8cc1,2017-07-01T01:29:15.357000 +CVE-2015-2781,0,1,aa8a031e77ee186bc7c6451d45014eb18bd2d17090ab80b2f1fe65cd48c092a3,2024-11-21T02:28:03.620000 +CVE-2015-2782,0,1,55cec52610ceb94483d149a6bc47cacc737fc93f299168b3b157746489fe7370,2024-11-21T02:28:03.763000 CVE-2015-2783,0,0,368bddaeafb97773e9698c0e25428608a161583940e972eb765f8b78276e0eeb,2019-04-22T17:48:00.643000 CVE-2015-2784,0,0,ee0304eb1867d35da263dbf62ec0ebf313c7d990be0e45732debe0dee26edbe1,2020-01-29T17:05:05.083000 -CVE-2015-2785,0,0,587bb5c4eecc645c7f5f97220fed3062b09f3c9adafd74ff91af90f58d5789bf,2015-03-30T19:17:38.793000 -CVE-2015-2786,0,0,240ea131a7613e630ad19cb571ed346cd8593c710c37a105015bf003540185ca,2016-12-03T03:06:21.353000 -CVE-2015-2787,0,0,5358401b8e73486138409260e7791aa932cfc7e6ecab5a03f50116da46be0a22,2018-10-30T16:27:35.843000 -CVE-2015-2788,0,0,5095bda867b9b49ea70eefe4851006093ef2049ef40ae88a3bc5eb96ab9cbe3d,2016-12-03T03:06:23.773000 -CVE-2015-2789,0,0,24e92b8b6a5bf84045845fb667a5bd7103e24e2fcaa9c0f29052ebc31a36f22d,2016-12-03T03:06:24.853000 -CVE-2015-2790,0,0,8c9e74191a690d6606eacc931f7feee5126570397b78c52b8203fb264852aab7,2016-12-03T03:06:25.993000 -CVE-2015-2791,0,0,3226ab5052108d58662dc1f46d1bbbf428ce1bd3bf2014a8c20744e7765e0da5,2018-10-09T19:56:23.233000 -CVE-2015-2792,0,0,a1d09312ac99a64c19ea5070aa9453b66b297534427e2138b0860867e1626b31,2015-03-31T17:30:25.310000 +CVE-2015-2785,0,1,cb872f0f9a3714d7af7792278ba6db42712ff79baec84228011be752b957bd17,2024-11-21T02:28:04.250000 +CVE-2015-2786,0,1,47c8e8ac8578e326bc5f8ee609bfd6ee565dfd341c06a0c25a9b4abeafb6cd49,2024-11-21T02:28:04.360000 +CVE-2015-2787,0,1,bf7d07f019c6c64c7897262b18c83833b061c67e819b87e2e42dad71bf733063,2024-11-21T02:28:04.520000 +CVE-2015-2788,0,1,7ef36d41bff6276608bd551494831040c98bdba65b1d7e3c87badaf011738c53,2024-11-21T02:28:04.707000 +CVE-2015-2789,0,1,108a4c915d9ace539f62c54e372f088aaf25342e2756b32e2f8b0968d7d49c9a,2024-11-21T02:28:04.823000 +CVE-2015-2790,0,1,a90aa34e729d02a2c14ac74e6642736a411a1d4d71b8a6737e74a3d13d6b99e4,2024-11-21T02:28:04.970000 +CVE-2015-2791,0,1,f06ce5b1cc3a230c43f169d463c8441f633316b67597c0f7b8049718e1ec2113,2024-11-21T02:28:05.110000 +CVE-2015-2792,0,1,39a46b4f0eb97d5f333e71dbf49ac5bfb0c5bdf7229fa4086bbc1aed0c3a1376,2024-11-21T02:28:05.250000 CVE-2015-2793,0,0,001949e34d7d1bbf00972803fde307e89871553796b785fa5ff186158fd1b7c4,2023-11-07T02:25:26.167000 CVE-2015-2794,0,0,c5ff3347372108b72ff59fb24fe30169df9fe5351c1056a6d346a77c183eb994,2017-03-02T02:59:00.273000 CVE-2015-2796,0,0,0b867deac825f1a7ed1f11237e119131a7e9d44adc0d028683264f48235c282d,2020-05-06T16:01:49.143000 @@ -76217,41 +76217,41 @@ CVE-2015-2802,0,0,fef7651486095d5b78c60601c9000668bd3f8801c30b4d8a62a7017474f696 CVE-2015-2803,0,0,41fd63b71d430b7a3ec72cf4e66c2761dc70fa4e75a25d72b09dbe388979c762,2018-10-09T19:56:23.623000 CVE-2015-2804,0,0,9bc3872bb4d6b433a90ffd7e6da9f3f1570f0627f6c36495dd4f5df15ccc344d,2018-10-09T19:56:24.187000 CVE-2015-2805,0,0,dd82976103eb6415d2541903ff6e63f802345ec7e135fd3fe6ddb4b4f80b3877,2018-10-09T19:56:24.607000 -CVE-2015-2806,0,0,5b446b958d22a72ccea0a580cd4ba7214f048a7b288e08379d5d84527a168e7e,2023-11-07T02:25:26.320000 +CVE-2015-2806,0,1,f9d8dfe421a2bb9d89ce0e03cf619566ce5669bffb6d7f24741b60994ab7d365,2024-11-21T02:28:06.847000 CVE-2015-2807,0,0,2195590a4af514259941f6ea478a33b6e4e9651acf7b42e31bc683eb22c0ab25,2016-12-22T02:59:42.740000 -CVE-2015-2808,0,0,08a72d84dafa475b3325a665acc7ec2f06e53e1233a6b76a8ab6cefcab380d2c,2023-09-07T17:15:37.500000 -CVE-2015-2809,0,0,0f5a8bdccbf8e613a285b135eba5d7b59669528eb5ce0d0fd041ce8ac09d8c15,2016-07-29T19:08:16.193000 -CVE-2015-2810,0,0,851f03dd4b0f3726f8f4d79c7f377cb74f494cebb261424d9a860c60ad9d34ac,2016-12-03T03:06:32.493000 -CVE-2015-2811,0,0,59a19498c58e98d30af29de2f781c826062f5974025b9d55258d82bad49f4d2d,2018-12-10T19:29:06.983000 -CVE-2015-2812,0,0,19e5d62e46a836076023392ba5bcea7bf1ffd35726803fcd0881c7efb57f0586,2018-12-10T19:29:07.357000 -CVE-2015-2813,0,0,41f1499092f6f62fc0a6448bdf9f0e62824fbca5d1938350b57cfae066debcd5,2018-12-10T19:29:07.560000 -CVE-2015-2814,0,0,01bc378207e13faa69bb00664536eb0d726925b6e71b1f485cf1d318b3259a29,2018-12-10T19:29:07.733000 -CVE-2015-2815,0,0,30d82b9999cb4aea8fa3f5bdd3701ce7908ea15da89dccbe52f7eae1235d8e45,2018-12-10T19:29:07.797000 -CVE-2015-2816,0,0,55894c156804ce4758b3615d5c7d39c06421edfae74b7bab9b73fb6cff20dd15,2018-12-10T19:29:07.967000 -CVE-2015-2817,0,0,40a7604b128fb0718a5ba7d60c1589879d5bd989570e7d25b3b2bbbe212904b1,2018-12-10T19:29:08.107000 -CVE-2015-2818,0,0,f13699feb6c10f9d5b2a6cc4e1cb0db140ebd78f7cec90823449b693f7b021be,2018-12-10T19:29:08.233000 -CVE-2015-2819,0,0,a1f8df42ab8d00e1a23ecc3393e4a17c33f4ac5b5959b11abe00ac2b6e3a0ac3,2018-12-10T19:29:08.310000 -CVE-2015-2820,0,0,ac2afcb605c7838f05edd78058af5be38ae7d6a87f4030d39ee227224125d276,2018-12-10T19:29:08.467000 -CVE-2015-2821,0,0,87ce36f698120dc266eaaac73027507d01f4b8b9f0eada54375693d3ce1b38ed,2016-12-03T03:06:44.527000 -CVE-2015-2822,0,0,27048b25f1ad5b5228b3bbb71d2027fb2f09302d5cdac5eb39752c91df06c995,2016-11-28T19:21:57.340000 -CVE-2015-2823,0,0,2722db18fc4b10f66dae3db6f8a4195eab1668d57b0540527c382811178f5266,2016-11-28T19:21:58.403000 -CVE-2015-2824,0,0,66942d1baaeeee01aa3e8a60d852fd03bccb3efe966e8051e453419b1ea0acbe,2018-10-09T19:56:28.280000 -CVE-2015-2825,0,0,0148b39631d390799da741b9d85f5f0199b2f4813a7e2e0b3bed80784b330e74,2016-12-03T03:06:46.747000 +CVE-2015-2808,0,1,66c2f5faa565d09772a2a9f3107c8e93819fbf9b3e63c4832730e0043a7ef38f,2024-11-21T02:28:07.190000 +CVE-2015-2809,0,1,e485639dc76dec914de77abce9f54721ccedd663120633623db661c65ae3b864,2024-11-21T02:28:07.560000 +CVE-2015-2810,0,1,fa48db7f8fd2033fc4b5f627cb00f71b0a9088261f4f66121c3cfcf7c8faa260,2024-11-21T02:28:07.700000 +CVE-2015-2811,0,1,2d9cd2c090964d847db13a27c5cf8f4712449c0cf74a5cbd1b703d0d9f6ceca6,2024-11-21T02:28:07.837000 +CVE-2015-2812,0,1,a2f3fc223624dd539e0860c30f73b11dbbb05c272a1391d1454ea2a0f1e5d121,2024-11-21T02:28:07.983000 +CVE-2015-2813,0,1,f290839f97919e7b76c953b5c4de5b1a8a15cec79dd41032e42378e9626c4ec7,2024-11-21T02:28:08.123000 +CVE-2015-2814,0,1,196be373e51f6e586a923962f72afc66e6d97c1871e6eae62194bfe8cadd3bae,2024-11-21T02:28:08.260000 +CVE-2015-2815,0,1,36b6fd79579fd8993575f92a1c4178db316277b3e3bffea90bee1887601f45b7,2024-11-21T02:28:08.397000 +CVE-2015-2816,0,1,2a7b800aa121796b927e803d96bf09bacd375e61c0324ee61b0d1d745762391c,2024-11-21T02:28:08.537000 +CVE-2015-2817,0,1,689448bbc2d4870e4971f7153ca04c41febff371f685bfafe5ee07cf4183acde,2024-11-21T02:28:08.673000 +CVE-2015-2818,0,1,8a7c263709c11056af5c9e27ceb5ff9d6aef601bd461b56e31cd681dca1fef57,2024-11-21T02:28:08.817000 +CVE-2015-2819,0,1,4c496ce023453d842fcd39a6da103ca5c0688c98524eb7b22070d954dd51eef8,2024-11-21T02:28:08.950000 +CVE-2015-2820,0,1,25a8f1d75aebddb040424b53f9f8d91a1f7787b763f8ab1b9a842fa0ca2a8ab8,2024-11-21T02:28:09.093000 +CVE-2015-2821,0,1,00e47a2bd16f3bd1e57fbc1547c02f180d999ccde4981394c4ba2b0cff38f054,2024-11-21T02:28:09.240000 +CVE-2015-2822,0,1,3bd0cc48598ac7418ef1d33bb9864fd6c0f8410b0d45f07d5015f0d6cca69ce5,2024-11-21T02:28:09.383000 +CVE-2015-2823,0,1,b78bd0bdf7d34664aace1f475bee8eaa245b284b4172c07e89ff9ac400313cb8,2024-11-21T02:28:09.547000 +CVE-2015-2824,0,1,7bf50f5c2458e0900ef941ada628c5a33953bb66ac15dd855c31f50753068b59,2024-11-21T02:28:09.697000 +CVE-2015-2825,0,1,d881349ad226520d465e6283f27b95d6662feba4baa4a7ae88af204a7648cc2f,2024-11-21T02:28:09.850000 CVE-2015-2826,0,0,7229d7378a36197237c52b4a9c626cd44284135a3e85c2f7677450cc47f6b29b,2018-10-09T19:56:29.170000 -CVE-2015-2827,0,0,fe7699bad60f44a0dae5007293f0bd33bce2dc16508a479c8d334d00a63db2c3,2021-04-12T14:17:22.530000 -CVE-2015-2828,0,0,5fe0fe682d06e3468b96348e3a0614d4a5f719a8cf9956151333478c2ff31ca2,2021-04-12T14:17:22.530000 -CVE-2015-2829,0,0,10fe6eab7a7a3f4e8bb88015063a0412d49cb0826d144ef483f3b57de90062ef,2017-01-03T02:59:55.380000 -CVE-2015-2830,0,0,092b98461f620c71952b148f3726726f5de88318c842d95b6763a8403d4e920a,2023-11-07T02:25:26.630000 -CVE-2015-2831,0,0,8cd5d3b48e43977ca286e2493a73755a9eadf7d57d1ff965a79ec5c61e1fa036,2016-12-03T03:06:51.043000 -CVE-2015-2838,0,0,f49fc568a98cb2b1dce2875b29e694b832284e73022eed55d5f59363c70582fa,2018-10-09T19:56:30.203000 -CVE-2015-2839,0,0,843314b19209195b2dc6c9fccc971e5e2247e7166600ab1043e07af269bbd67b,2018-10-09T19:56:30.670000 -CVE-2015-2840,0,0,2a310169cd4d71ecabd7c59f30ada233d2aef28ef7c05b6fec69f0d04fe5337a,2018-10-09T19:56:31.077000 -CVE-2015-2841,0,0,fcc0e62ec97c9e9f29152fc6c74af4700285b9f58dc9551a6a1b15998d47f188,2016-12-03T03:06:55.090000 -CVE-2015-2842,0,0,3cb5ba9f39784412200f065cf9ad41c0fe13236b5c5d71e3f8f2bf264ad5206a,2018-10-09T19:56:31.483000 -CVE-2015-2843,0,0,3751583a0e929e0b4f5ce392731c9a5ae401ad27e7cd08250575511f00eb2b6c,2018-10-09T19:56:31.873000 -CVE-2015-2844,0,0,bfd1f8e060e9e9c5c568dd07b5efefb2ea2f6a13a5995d34f146639fab1cdd60,2018-10-09T19:56:32.343000 -CVE-2015-2845,0,0,172bc454b8d3a14543d7af9dc899be35946e6ea13d00bc27c817934c5a172e48,2018-10-09T19:56:32.717000 -CVE-2015-2846,0,0,43b9742832583c3769b8058b6d8952d405368b6ab2194a8a2613ceb0e79adc9c,2016-12-03T03:07:00.717000 +CVE-2015-2827,0,1,d0d69ae53577f57a9c38ea6b2bcc0c35b1821588724c14c97ad8ae8b83bf8f3e,2024-11-21T02:28:10.147000 +CVE-2015-2828,0,1,b64b4cd9af33a0d64b3e007bfc0c424e75c9acd13fd3abe4673b38ed2f5aa53a,2024-11-21T02:28:10.290000 +CVE-2015-2829,0,1,1ad67a02e46d3f72d24aab4d44a7f255acd53e28114d3411891362400804c2e6,2024-11-21T02:28:10.433000 +CVE-2015-2830,0,1,eecfb56e895518447f59cabcda4f69b8a7873e263c19770136a229810cc44796,2024-11-21T02:28:10.580000 +CVE-2015-2831,0,1,c3a67e1ce8777621fa51fca7da7e9dbd2af27b2fe94529bbfd0ef9b8a6aa08a6,2024-11-21T02:28:10.737000 +CVE-2015-2838,0,1,a6b3763a033341d748a8e8dbc7c4fb1d97b8b7d722476761e79bdde94cd5d113,2024-11-21T02:28:10.873000 +CVE-2015-2839,0,1,1da6bf53b687a4565879031e2c89b3f3a90dfa33b8d87d4e7c67fc92573176ef,2024-11-21T02:28:11.010000 +CVE-2015-2840,0,1,2823d2925dabaf63fa8a5d380fe85c70395b2bf2678b061daaca71596a231185,2024-11-21T02:28:11.137000 +CVE-2015-2841,0,1,56b9c3b240c42049fed4b227c0081a51fb3e13d0ab9bd7fc70d630249887b0c5,2024-11-21T02:28:11.280000 +CVE-2015-2842,0,1,5b0ff191aa82bc835a7b80aee60a3e02ca93d9f363749ca983d96f788194ee68,2024-11-21T02:28:11.413000 +CVE-2015-2843,0,1,3b87cc3c8218376c813cf0034b134c0f5b4e1965cadad63e069a7ad54284c65d,2024-11-21T02:28:11.550000 +CVE-2015-2844,0,1,69b36546ad78cbefbe3510b88cabbdca1cf2e061e476cac6b91a98dd1334047e,2024-11-21T02:28:11.683000 +CVE-2015-2845,0,1,5cdfa0c746295cf88e8005af859920b384dd6512daa74ed09ad1272979bd8df8,2024-11-21T02:28:11.820000 +CVE-2015-2846,0,1,cc98b7f10e951a9f6f11b07d875ede7b8907a849451b2d03584e0e1d8a078906,2024-11-21T02:28:11.953000 CVE-2015-2847,0,0,21e7cedb00235ea8e57adb6364a677e8df6d931c851cd4daf46baaf8c5b1e8ef,2015-07-27T18:04:04.827000 CVE-2015-2848,0,0,0459ad518f7fdb83a18098df3227d50a76b0069f2facf88e93b9b5eef57160f9,2015-07-27T18:04:47.903000 CVE-2015-2849,0,0,a0bae2baae52fa520e391ee35db0f0722be90fd8585580a3502c931f4133462c,2015-07-08T21:46:52.280000 @@ -76318,30 +76318,30 @@ CVE-2015-2915,0,0,afacf0f90104656404ac7366d615f9ac05397a50ed66402b8b62a4ddaf7fb6 CVE-2015-2916,0,0,5a5881864c6b380acd5b7f20cb6d3f5c3530cb981482f5bf357b59ec8a7c254e,2015-09-30T18:19:18.363000 CVE-2015-2917,0,0,86fa2dceb870bbf992373c23054f4268c3868a6bd7ee16837e48014cca45940a,2015-09-30T18:19:31.053000 CVE-2015-2918,0,0,c5245d3a26f0c6a68a5c625e920d0810e8a3635cf19c7aa98da2dbcaad8e2a80,2015-12-31T20:41:43.143000 -CVE-2015-2922,0,0,c0dc316ab84447b71020dd57885a3479764daba11aa959b88217d58d987c9354,2023-11-07T02:25:27.527000 +CVE-2015-2922,0,1,d2dc8be21a84f5dc354e2af07c6aa8ebddb545003002a2f047b2c1d27d600760,2024-11-21T02:28:19.130000 CVE-2015-2923,0,0,33dd8ca4615352fb493502fa36d142a93a656d58526c085aae03d656d816b628,2020-02-28T16:22:06.510000 CVE-2015-2924,0,0,e84980de3880a13f53e750257c73f750c29fa2061c377f71bc7be6b2a31f11e9,2016-12-07T18:10:51.847000 CVE-2015-2925,0,0,3c28180a24aa89b9c75cb270e0ad02c91d307eeaff5053993709348b82e9ff48,2024-07-17T15:29:49.973000 -CVE-2015-2926,0,0,69d172d0b77f69b932f80d09c94f134dc86fbbdb77a842f4bdab90e12e731dc8,2018-10-09T19:56:33.577000 +CVE-2015-2926,0,1,f0d40fd731678d3b86bb31ed58e93eae582f7c80fd8bf0542a1def0913e2cac8,2024-11-21T02:28:19.813000 CVE-2015-2927,0,0,ffd7ce087dfc59efe5f3d6125dca76b5a742860c486d2ef8d889285d921f86ff,2023-11-07T02:25:27.703000 CVE-2015-2928,0,0,b6faa23d4a4831562f8f330fb27e2484439c80f79aa6bfe750bfe0e228f24be4,2020-02-01T16:12:19.540000 CVE-2015-2929,0,0,1dfc54e6a9f71708c5e83f61508f18b1160c9191a3843ece254d5dd163f27744,2020-02-01T17:28:13.673000 -CVE-2015-2931,0,0,bac417e340513c25318acc501ad16e059cb7cdd03c823316edb03290bba45d9c,2016-12-07T18:10:54.283000 -CVE-2015-2932,0,0,5f0f678f5bc69b1be9098e74ba8178b6c8f537f26c748fdd466d0918323c772c,2016-12-07T18:10:55.410000 -CVE-2015-2933,0,0,8a22853e66a65088da613401dd5b4a8c6dc54af036059741edfce87c684431b2,2016-12-07T18:10:56.567000 -CVE-2015-2934,0,0,b4803c1e3a79d6ac3a70dc48e17bebb29b63d09d1a66e9c05a4c8bd425f267c7,2016-12-07T18:10:57.690000 -CVE-2015-2935,0,0,b0328aa5d24b189848be59fdea37ba947decde328e0f24c843a0dfc879cc8056,2016-12-07T18:10:58.787000 -CVE-2015-2936,0,0,90aeecff26a5a28200537e025bdcf8b99b55e15d698ce3d60f479fac87aa22da,2016-12-07T18:10:59.800000 -CVE-2015-2937,0,0,7260ae5ad535f1d90bc0f7f528dfe27a925735b9c7fa8e6bfc10627c23418b39,2016-12-07T18:11:00.833000 -CVE-2015-2938,0,0,14c02ab0c3249b9b9e3ac67db498dd6a0031f35332af86536681910a59094be2,2016-12-07T18:11:01.973000 -CVE-2015-2939,0,0,a9a1751900a548e8af3a079e742d5bbcd04d2d092c4653ae05357b7ba525c527,2016-12-07T18:11:03.067000 -CVE-2015-2940,0,0,9f1e986bf1b4effff0e683e7ad289fe49ac083bcddefb70e45cca2bb23cc98dc,2016-12-07T18:11:04.270000 -CVE-2015-2941,0,0,efda2faf3856ec3ca5821376839c82363d8e589421bdee6a264c9d34fa3ee40c,2016-12-07T18:11:05.317000 -CVE-2015-2942,0,0,cb51a8174b811f8056b8034e092f40569385a56d3f2cbb435c804b6ecdc03547,2016-12-07T18:11:06.490000 +CVE-2015-2931,0,1,aa4f2bb73628a4ee17113c3cfce10da992c37fd2b6da0af2f4e7bd02ee278fc4,2024-11-21T02:28:20.307000 +CVE-2015-2932,0,1,e7785875374b390275425d77ccce26fe739a16b8b77f86dc35c3b9e9be3e5774,2024-11-21T02:28:20.460000 +CVE-2015-2933,0,1,7b2b84862739a1a98963d020bbad95cdb4247490a60659d7e7895106ace3c247,2024-11-21T02:28:20.610000 +CVE-2015-2934,0,1,a595b8d694179be2bb4d5b834b209c44f5c9ad17593a12dfb122b8ce925fad6e,2024-11-21T02:28:20.773000 +CVE-2015-2935,0,1,bad2ba10d01c6abf68bad16826ad7093084d00e97e8a1bde519eae45225d6b81,2024-11-21T02:28:20.923000 +CVE-2015-2936,0,1,813836c4135ef6990ff3b33bf599c38c72d421754055bf9849ac68cc8a6e44a1,2024-11-21T02:28:21.070000 +CVE-2015-2937,0,1,72a58ee4f13010e4795d726b6213da316b63e4f1bd2b8a66c38901c697b57ffe,2024-11-21T02:28:21.230000 +CVE-2015-2938,0,1,817348553b82c2a1b97c0526be7d2aadd648e6e4020e0bd2b98af32023d1482f,2024-11-21T02:28:21.387000 +CVE-2015-2939,0,1,fe4f95428c818cdb305dac9fff75d4cc9b6b0cdd6706001093dd1bbfcb2b8780,2024-11-21T02:28:21.533000 +CVE-2015-2940,0,1,73daa4650553be03db6f92697c951071655ad841f6e0f24c14475def8aafc428,2024-11-21T02:28:21.677000 +CVE-2015-2941,0,1,af40235bdda91a3eaa98537f2027522b7234d2e2781df3421e39277e6783a7c9,2024-11-21T02:28:21.810000 +CVE-2015-2942,0,1,226418de570bb2222801db74843459659125cbcdf19cdaedc98a6756121e21ba,2024-11-21T02:28:21.967000 CVE-2015-2943,0,0,469916ef6ea657504dfa064646bb48ad937a5b33fe811152c3eac63775859f0e,2017-09-08T20:45:24.990000 CVE-2015-2944,0,0,6f6a110062d58bc9e6a28572ae3c4de0a5ccedfdd68dacbf1a71116f41d7c694,2023-11-07T02:25:27.987000 -CVE-2015-2945,0,0,b9b8ef8f9654662b13ae45c252ffb806fd396dcf4f4d5355ca4a6e7373d05570,2015-05-27T16:53:48.417000 -CVE-2015-2946,0,0,ec87cf250afd3141ef69b7de3882d5ee68aa1c1c471437ed6f9a9559fc7deadf,2016-12-03T03:07:17.203000 +CVE-2015-2945,0,1,7db9b9c0b8277d6f07ebae64642aa9cb49aed62e2ac33fa2063a2474fabc7f9c,2024-11-21T02:28:22.337000 +CVE-2015-2946,0,1,21c94f538bc511815a1a91fbe141e43228b5aab2385aff54ee373f63dc343ea5,2024-11-21T02:28:22.443000 CVE-2015-2947,0,0,d8afd6850891f7acbd389fbce89efa637b5af9cb153579aa37429643d96436c7,2017-04-25T13:26:45.927000 CVE-2015-2948,0,0,e06cfb02adcd6307a0ab2ef89297d5d248556bfddd8886ee89134fbb1e417412,2016-12-03T03:07:18.393000 CVE-2015-2949,0,0,b2e89faf76bd740ad1a8b6e8bce05eb8744a002183eb4675de6a80d9799ccbd9,2016-12-03T03:07:19.517000 @@ -76397,80 +76397,80 @@ CVE-2015-2998,0,0,e0b03e23527c3a05867f7bcd7f70d2c05bd692f014fb6c07cb8423008ff56e CVE-2015-2999,0,0,4e992a637fea4c0b2262962255aaacc031f5467ae637b4b9be58a1428921c30e,2018-10-09T19:56:36.297000 CVE-2015-3000,0,0,e7f79fb1a3f1eb4f66b7ee27666a766248f4f98453490b0bcb4fa2fa6e37aff3,2018-10-09T19:56:36.717000 CVE-2015-3001,0,0,e32ab36f0225bbae280b2bcb1e40213e7b7d75a0c15809b3418f20a17f5c52eb,2018-10-09T19:56:37.123000 -CVE-2015-3002,0,0,18195bfcd32b19a6e4e218e38e2caf881d44a038613270974884ab70e9917f67,2016-12-03T03:07:49.567000 -CVE-2015-3003,0,0,2b7ea990f7fc919bad1117bd373ad9e66875c5cb4e4cd3e75b03b82273751ecd,2016-12-03T03:07:50.710000 -CVE-2015-3004,0,0,69ad82bd3e355f0895c777da6e3b2493ed4aa92f2fc26a3516fdcfce85849f27,2016-12-03T03:07:51.727000 -CVE-2015-3005,0,0,1f018d69aec0029108b457b31103cc00f0c6fe3c0b8acf7c85724f9447f96d6f,2016-12-03T03:07:52.740000 +CVE-2015-3002,0,1,07d307acd293523a9a1e0751553c6fd69d3c427c1747e0ed1c351c30ab9ea007,2024-11-21T02:28:29.117000 +CVE-2015-3003,0,1,ea742752b7a05a173f81edeee5bf3437e885968ade2511a341a4d8a52925d74e,2024-11-21T02:28:29.263000 +CVE-2015-3004,0,1,9d9f6fa36c9cb880cd985f55f4444bbd53b3230a31f651e289511302c5b06d44,2024-11-21T02:28:29.417000 +CVE-2015-3005,0,1,3b8c942224f10111c8cb0397a437db3ed0c37b94fb2f1faf41f5f3189854dd7f,2024-11-21T02:28:29.587000 CVE-2015-3006,0,0,5ef5daee242ac1b6e8db053a9e805ee96237ee8581a28019ea9d6e3cab0336a0,2020-03-10T13:39:00.367000 CVE-2015-3007,0,0,7bbe08e7f88e1fe9414bb1d9a1454340459b183e4710beadc7f778b7f293f712,2015-07-15T18:31:28.153000 -CVE-2015-3008,0,0,0bd2a09595b26f74bfcfee267e1f62d0a21e4d29e17c3682a00930a02ad9190d,2018-10-09T19:56:37.577000 +CVE-2015-3008,0,1,711c7f71d6e3ed95517ff4ca5b3fcc4803ae0a9c88c88fa528f28bb700f78411,2024-11-21T02:28:30.050000 CVE-2015-3010,0,0,cad04905bf25f16debb663d12e611a412d21d79843f7cfc3697040fb728467dd,2016-12-03T03:07:55.100000 -CVE-2015-3011,0,0,4c8a0c8b30917afcc247658cf1c1e8b5881d3d94617f33a5fea74024b0f201e7,2016-12-03T03:07:56.227000 -CVE-2015-3012,0,0,b20e757bc93161d2f3dce3603676f8da0894dca768ac8c4dc043daebcdd38c5e,2019-02-11T19:39:32.810000 -CVE-2015-3013,0,0,681117650f5fea266b4edcd2fa3bee5149bbf4810bd14d150116a69a137a1e08,2019-02-07T15:02:05.970000 -CVE-2015-3026,0,0,29d0a7288ec67e12827af53b2821e16173023da37a30e60bc10ae093314f4b04,2018-10-30T16:27:35.843000 -CVE-2015-3027,0,0,73ab7f20165e7f68c10644d649d2a1d2fd36e47b71599efc307d8dd75d66d1ad,2016-12-03T03:07:58.243000 -CVE-2015-3028,0,0,c9a10c6cc49ef455ab50396c80fe0ca7f991cc7b80aabdc67fb8f5017cd5c9d4,2015-04-09T18:26:14.237000 -CVE-2015-3029,0,0,278f91f61fa942d7fcd22a2d10aa4adec9d70f37690114e9e07a0bb234ffba22,2015-04-09T18:26:34.253000 -CVE-2015-3030,0,0,9f2d57b7cc7e14938eb53f35d97de608f25d93880bd01f5e18e37a10d36b7238,2015-04-09T18:27:19.737000 -CVE-2015-3035,0,0,320eebd0e9d4f555a7b7fdfaf3fcf51b9e64ef0e0d54d9f82ba5a6d7aa367768,2024-07-16T17:58:47.867000 -CVE-2015-3036,0,0,ce25fc981c4006a3cc80590897aa533366626c11863cb28b16d9dff4eeddaaa2,2016-12-08T03:08:21.660000 -CVE-2015-3038,0,0,207f3bd3f0c5a8006d100d5198df8828f119030f2506af7522a776703173e8fb,2018-10-30T16:27:37.467000 -CVE-2015-3039,0,0,7329bd64c92cd295e17cd253d4be72a0859caf5973870bd3e95ad139bc823c1f,2018-10-30T16:27:37.467000 -CVE-2015-3040,0,0,fe0f22b735eb89656d740d9b605961214f5f3704d98926b0a85aa0172fa24edb,2018-10-30T16:27:37.467000 -CVE-2015-3041,0,0,99a733fe709341acce0249c3d11388370ffb4d45a05475435f260faf1861ed1f,2018-10-30T16:27:37.467000 -CVE-2015-3042,0,0,6fe0c9ad4e5187e3083b99d745e5db71b8b55aee7eba579c68997741c2860283,2018-10-30T16:27:37.467000 -CVE-2015-3043,0,0,b8dc312d8d6fad23f8c2d584131b062781de505e1b0af5251dcb811afc6a16e6,2024-07-16T17:34:42.773000 -CVE-2015-3044,0,0,3884537807e5019b56803795baa4feaa1bfd7a06f75abe87b524849de3e1ea15,2018-10-30T16:27:35.843000 +CVE-2015-3011,0,1,1e526bef8a541fff6f31c9fe621bf34a29ebd67f71e64858d9715f5a06e0eb74,2024-11-21T02:28:30.397000 +CVE-2015-3012,0,1,050b18bfc1552f9535b0aef76de4d1afd03109198d99a214ff56ab9da468a15a,2024-11-21T02:28:30.547000 +CVE-2015-3013,0,1,b605cc43041ff2caf269dbb9be2ae35695bd87f67e54485553c3ecebde0d5277,2024-11-21T02:28:30.700000 +CVE-2015-3026,0,1,bea6d887ffb01b563521bf7d9c01963bc321c139d2d2254d1da27ab3204f1b0d,2024-11-21T02:28:30.853000 +CVE-2015-3027,0,1,d0af201dab138dcf3c0835b7cee52b20f59ea3e03a9e007506aaec5514962ce4,2024-11-21T02:28:31.020000 +CVE-2015-3028,0,1,3d362f4f87a63f2d82ddacb1e02e93c445c64b23d52aff3211c841f9e50271e6,2024-11-21T02:28:31.177000 +CVE-2015-3029,0,1,627c20e80aa646946f94cff34002cb19f94cb1f63e734cde7ed1861642627821,2024-11-21T02:28:31.323000 +CVE-2015-3030,0,1,7407af46445fb093e80e76ef678411195f8557645c914fd4c66d234fc275ad30,2024-11-21T02:28:31.463000 +CVE-2015-3035,0,1,fe907ec28ce4edca97ac0c6c87d2cf78bda01b42e799329b15005ba07e1b4d24,2024-11-21T02:28:31.600000 +CVE-2015-3036,0,1,287b7aeb20d79d62067e685166d873214cf83d4818fec5ba856a45598ea44555,2024-11-21T02:28:31.787000 +CVE-2015-3038,0,1,a16c9ef34a5ec3adefd07bb7cc7bb399a4018daf6c04879b23f3780609b8c9d4,2024-11-21T02:28:31.947000 +CVE-2015-3039,0,1,a9bdace0537a9c1a71c3ee58a5af90230df74978c17038e43da4115c505a4f86,2024-11-21T02:28:32.073000 +CVE-2015-3040,0,1,6af9ff1a7d4d619643bbf909cd0963c73c4ee7a27be8d6458d91bd60095a9e67,2024-11-21T02:28:32.227000 +CVE-2015-3041,0,1,2449eec52bc4e97755a5c998facf4b4e3418dfdc4bf13d570468eb7b29c60279,2024-11-21T02:28:32.373000 +CVE-2015-3042,0,1,221c8cd47e9639bc3a8f28b9e04ed92dc4fa0854477fb1f16621aac92fc6283d,2024-11-21T02:28:32.513000 +CVE-2015-3043,0,1,d7ba9bc35828aec2c6b49ef6b77f70d808d7866e512b6ec7318f37f9bfa5fa7d,2024-11-21T02:28:32.663000 +CVE-2015-3044,0,1,aa37ff61a793e77423f4096d8d70dcc4ecca3b5574151270baf627bd34856f19,2024-11-21T02:28:32.817000 CVE-2015-3045,0,0,7247b26e06c0e841aa6dc6d83e32aee805acfd8bbb1c795bb2a354636ede17c0,2023-11-07T02:25:28.660000 -CVE-2015-3046,0,0,c19038550d8a92bd42e69d734d1141a98ce12ec4fbef66fddd9b101e969eac2e,2017-01-05T20:09:52.370000 -CVE-2015-3047,0,0,ad018d86c216410a615cd97f13ad4328f28fd37c68b5316fcac5cb88dc42cfdc,2017-01-03T20:03:30.573000 -CVE-2015-3048,0,0,beb28d1ae767634067db4ee9ae85726480986a0c25b8bb571aa8a1c5ab2f30fb,2017-01-05T20:09:36.993000 -CVE-2015-3049,0,0,e2db6ea04f8d5fee46eea903562323b9f6fb528dac752c12ac50a4031a7b1907,2017-01-03T20:03:19.337000 -CVE-2015-3050,0,0,8e735c018a3b3d44a6c9ee369ed831279329310bdf9f848a5ec5662ed371666b,2017-01-03T19:58:21.070000 -CVE-2015-3051,0,0,0db0d1b35f6d4044a7d87a642250acf82ea0ab8482ec21223eae36471fb5d26b,2017-01-03T20:03:51.983000 -CVE-2015-3052,0,0,93303c8f53aa962d539b0a5c21afa69854d2f4a8d687ec6562d19fe95bdd5603,2017-01-03T20:03:25.073000 -CVE-2015-3053,0,0,13dc8ce88552a0a6b4c75edd6386c217ab1286c1bbe4270bfce161ee69d6a00a,2017-01-05T20:03:33.977000 -CVE-2015-3054,0,0,f3d9a7b64f23072714abb148fccfa53f7946cae65474bef7d80ddfea9149bde7,2017-01-05T19:53:21.097000 -CVE-2015-3055,0,0,d42ee5b835a84b6cdae4fea59f2dc17e053aea033483002f0fd8eeaa441045b4,2017-01-05T20:03:01.753000 -CVE-2015-3056,0,0,69bace2c2e6f90894fcf151c8c7c5f4b0ef7e0e5e4e4852f28408fcd1fd4270b,2017-01-03T19:39:04.780000 -CVE-2015-3057,0,0,a09d7b1cabfb839e3c6b6d78ed649a4ba5035388610566a74057ca59a54dad5d,2017-01-03T19:46:38.063000 -CVE-2015-3058,0,0,898c7fec60f165215d9f838653f0c99ddeb605165c3ef08d56198a7b2ee2771f,2017-01-03T19:38:49.307000 -CVE-2015-3059,0,0,596e3993965d92b9eee0252b028fd895bdd29e5102c4c73246d94c3236ec5492,2017-01-05T20:09:25.163000 -CVE-2015-3060,0,0,5cf2c6073a0ae946d7d389c92574a907dc23c3f25586f9f3ccbea62f92baafae,2017-01-03T19:02:37.577000 -CVE-2015-3061,0,0,8687f2639a8497c2f9fbf6b55df76f7d55dde287d501815ed36b77d09d856f7f,2017-01-05T19:53:23.940000 -CVE-2015-3062,0,0,3f40a4c6903105e44bfe98cd55fa082d2e06c8c0359491c84a9b9fb9dfd6a78a,2017-01-05T19:53:36.553000 -CVE-2015-3063,0,0,e7b629a3a30e8099ae00c5fc6e01eff33a5818fed00f29a017666caa66c655e2,2017-01-05T19:54:33.387000 -CVE-2015-3064,0,0,a9c9c6570d61f7a6f20fee01102af9543508fd0fee1f49cc1f5889951797cfd3,2017-01-05T19:53:55.273000 -CVE-2015-3065,0,0,d990613972dd70890f0ccb36f8fbdf5789e5423f2120ceb159d291146f014580,2017-01-05T20:09:20.943000 -CVE-2015-3066,0,0,e94caf772482d62c6063de1d82cbd0c4f5b8aa0b33e959e08991cb522ad2a768,2017-01-05T20:09:17.037000 -CVE-2015-3067,0,0,197a9f8e53b5acbfcf236fadde8e8d957a79a4372085e06102b8270fef04e277,2017-01-05T19:48:53.937000 -CVE-2015-3068,0,0,c0d90127bbef39ab5ba72e8b373c42304e0dbee80f30e882b4440eb0a547472a,2017-01-05T20:06:13.187000 -CVE-2015-3069,0,0,ff83c3d8aa3e133fb523bb7bb1eab450d97c2c691316096f51ba58b450fef1b7,2017-01-05T20:06:04.090000 -CVE-2015-3070,0,0,9cdc32d5ef942b1cdee85df9f87f8dc635cea70a027959d79aa3c3d48859fc4d,2017-01-05T20:16:59.210000 -CVE-2015-3071,0,0,cf555c80db7fe232856b942af6ea292d2890a6d9f7b02011c49e47b5505a55fc,2017-01-05T20:14:46.037000 -CVE-2015-3072,0,0,8f22dd3a9a7a19c48e8c9cea6e90a044a68ebaef865f6295b85e3d74489190b5,2017-01-05T20:14:38.580000 -CVE-2015-3073,0,0,65bfac6ae8901fc267f413d2331e35674b4282ccc259bb446d10b3d10b252402,2017-01-05T20:06:01.730000 -CVE-2015-3074,0,0,82a74a20ac5423781d4d3471044a6baa700241731e25f0f9a0f81140012a34d2,2017-01-05T20:04:10.700000 -CVE-2015-3075,0,0,9c1c6a5efea0ca8189250687177cd3a9b07bfbb20d381ad8f25a9427e06378f9,2017-01-05T20:12:19.420000 -CVE-2015-3076,0,0,0db9e4b29cf105914bc89d9a2f6d6edc76b268ff52c9d49a3c1c1cc636d8ec1c,2017-01-05T20:14:51.520000 -CVE-2015-3077,0,0,d0bd6e5987fd766054516267fb9549d33b9a3f92f0f23da9e71bc89074884c0e,2017-01-03T02:59:58.537000 -CVE-2015-3078,0,0,d219dfaa35683979d9f37ea3c993dc25dea2cc9b018b3b61cff613bb5df36711,2017-01-03T02:59:58.633000 -CVE-2015-3079,0,0,808fcfcea0f62c37ab0119501f4433bbf4ee1acdd1bb10263a0d14a0a67e22cd,2017-01-03T02:59:58.727000 -CVE-2015-3080,0,0,2a373ec65aed8fabb3dda003ea8560380ba8c422ca2dd101cce1b1fe74b44df0,2017-09-17T01:29:02.687000 -CVE-2015-3081,0,0,75ece1168ba7822b9166c4fb67efe4f9b17cb527cf6b2f600721a1cd192d0691,2017-09-17T01:29:02.763000 -CVE-2015-3082,0,0,f2f830b55db77ce542dd34135cdcf6a667244f2a449a56f203d07c172b4a05a9,2017-09-17T01:29:02.827000 -CVE-2015-3083,0,0,62a4587bae33a5442a4aa7aa20d0e69f3a8d5d3a6d8bceb44c3733abdfba06a9,2017-09-17T01:29:02.907000 -CVE-2015-3084,0,0,14bd2c31f90b0fd27dc1ed202458d9c51364b8eadd6079c8b7c201211b7e7e99,2017-01-03T02:59:59.193000 -CVE-2015-3085,0,0,d521a107cd1ceda7443f71606e83a062b4cd869629d071d2ddc048a4938fab36,2017-01-03T02:59:59.303000 -CVE-2015-3086,0,0,3c96ddc95d52c302188819ef6f48161314963d725c31e33755e38c359ec3bcdc,2017-01-03T02:59:59.397000 -CVE-2015-3087,0,0,c413d3ea3b1069d4d79295304354bc64016472dc897a28dc16fbe6479b0e4e99,2017-09-17T01:29:02.983000 -CVE-2015-3088,0,0,2a3d4ae4b6f1309b719e77aeb70949f88c190015eed744056dcb11b2b569b4d7,2017-09-17T01:29:03.047000 -CVE-2015-3089,0,0,88e30932e5bd4b885e1ae72a95971d13df815ce0deea423841c28e16ff048b0b,2017-09-17T01:29:03.123000 -CVE-2015-3090,0,0,37f80f27938b0a19211f8040c57c42b987e9c3a57acb77ddbdafdb5e3064eeab,2017-01-03T03:00:00.037000 -CVE-2015-3091,0,0,18364d5e94e4bf40ab836a5a30ba7e0fa955d0b5cbba2a1cb8eafa4249534536,2017-01-03T03:00:00.117000 -CVE-2015-3092,0,0,9b1f5b6846bda81c75e55ff4803c899daed37ed7534b24ebfb8b4445cf185600,2017-01-03T03:00:00.210000 -CVE-2015-3093,0,0,a72954963fd3ebddcf03b76a9643c07b82205c95ede519ba78c69458e37d17ce,2017-09-17T01:29:03.187000 +CVE-2015-3046,0,1,2dd70d93c86df3a913854e753f94c5028ab4e5e711e079e913a1455156cd245a,2024-11-21T02:28:32.983000 +CVE-2015-3047,0,1,fdad0559c12f55cb04656d79b96f35db083d853ee5a3f750456e12dfecd2bac0,2024-11-21T02:28:33.110000 +CVE-2015-3048,0,1,436c004615d7f7356edcbf91789d989d5511e6e6f19dae9d1a775dc8bffde639,2024-11-21T02:28:33.240000 +CVE-2015-3049,0,1,f574a1df5e2e138df788db5ac4065797cb6e37dcb59ca688ae6a1c47196bd2ac,2024-11-21T02:28:33.387000 +CVE-2015-3050,0,1,e2ac277be75a48f98ed17015797520f92cc2212b016eb3dc12be5ce58102039c,2024-11-21T02:28:33.520000 +CVE-2015-3051,0,1,f0737fe4f8eacea49960eed3e883ed8859ebd13edcd45cf8cb97797d8e10291d,2024-11-21T02:28:33.650000 +CVE-2015-3052,0,1,69dc06ef19bd8ac3cfc35a3f3ec2addfee1a1a3467180396c9f731159ded5816,2024-11-21T02:28:33.803000 +CVE-2015-3053,0,1,d20b2fe5dc4ee7483522be9f4fd2dd633c96d1a18fe647368221976b5ea24749,2024-11-21T02:28:33.943000 +CVE-2015-3054,0,1,121ba0d5d5437f4868b4684f0c98d1063e1d5c9c24e429188872b3a29d6b6627,2024-11-21T02:28:34.083000 +CVE-2015-3055,0,1,0b31555137c700f16538e12aa11f71c7fd4961f9185dca7186eab317c00731ba,2024-11-21T02:28:34.233000 +CVE-2015-3056,0,1,fed62e50404b70e76afe42d7145cdeba63a98491d22b31e8f5ee7fe585c8b108,2024-11-21T02:28:34.373000 +CVE-2015-3057,0,1,84c48315ed64cd9f4e0cbe03ef214d86556d6e82de29e6611c4346f770585a35,2024-11-21T02:28:34.540000 +CVE-2015-3058,0,1,7560dc7fcddd63694bcd550562ad50226351e29f3238b3e78e473313a710e8e3,2024-11-21T02:28:34.683000 +CVE-2015-3059,0,1,21019c92d1626cd2c1c89ab97a11dbcb6cb21272bdf4030834e967f7faf6813f,2024-11-21T02:28:34.830000 +CVE-2015-3060,0,1,89c9e7adc1a7bcb9ce556d7c466f9f5033f1dc060ce356b3770d92d44441264e,2024-11-21T02:28:34.977000 +CVE-2015-3061,0,1,0643977cbe4c8d1689647ca6de04242ac7eddaa841725209f4ca34253e1d0c41,2024-11-21T02:28:35.140000 +CVE-2015-3062,0,1,8559ec37587177aa26ecb544005d6be3366c1e6df08300217cbaa90619e712c4,2024-11-21T02:28:35.287000 +CVE-2015-3063,0,1,d5ceda10774b05b399acb772a542acd6f3511cc2c12e37bc38f6bfa6c535f5ad,2024-11-21T02:28:35.427000 +CVE-2015-3064,0,1,83526532e94ccca5e043b01182a46834d8e36deab782d1839309d5a37d3dbc69,2024-11-21T02:28:35.570000 +CVE-2015-3065,0,1,ec7be01466d3e66921388faeb39a381302e1cf3d28d1269072158eb27e210f6b,2024-11-21T02:28:35.707000 +CVE-2015-3066,0,1,764562f15f3cd72237b52b28695acc2512e7cd32e44492fd9a7ae49c83555c6b,2024-11-21T02:28:35.853000 +CVE-2015-3067,0,1,c41610aa31e80da4e47520f222baaa6fd1690cb6c72fe4a98c92dc2d493014d5,2024-11-21T02:28:35.990000 +CVE-2015-3068,0,1,9fd049170063f66efb2c85f7208ed852e7857046078b11633c8804a42e14b545,2024-11-21T02:28:36.130000 +CVE-2015-3069,0,1,36bee0b2fc48ca19bc4c5c6fcf9687857478912fdde06ac101191c0b4a6c24f3,2024-11-21T02:28:36.267000 +CVE-2015-3070,0,1,76edf104359746a337486b73bd919094995177f05990a425d89e85b8ac017638,2024-11-21T02:28:36.407000 +CVE-2015-3071,0,1,c7cca3cb1c0a56081bedb2c9c700096e65f7ee84d83df946dfae196ba4c97119,2024-11-21T02:28:36.540000 +CVE-2015-3072,0,1,f762ab4ecd64d20420799a9d7af0871d1d779bd11a21b1116fb7c325ee7c5dec,2024-11-21T02:28:36.673000 +CVE-2015-3073,0,1,1d4a4b0b92b3230dbd6e47b2b155e0dff34dbf25690ce0a2a1d0d4da322b31fe,2024-11-21T02:28:36.810000 +CVE-2015-3074,0,1,fe77d4800e7c84db0c4457344a87796a5961995e2108adf953fc958116564132,2024-11-21T02:28:36.943000 +CVE-2015-3075,0,1,537b0620827dd0ac171e268b7f39ac33073499fe7a0049bdaaf03c586caee11f,2024-11-21T02:28:37.070000 +CVE-2015-3076,0,1,f194f6fc2cc8e353bd55ef32afecd3fe9952f41ca2a606b47175747c8c959705,2024-11-21T02:28:37.200000 +CVE-2015-3077,0,1,44147444b8326c7d45e12c8acc1b7ab450ff6ba69d17c86463e2473a9f1ebc44,2024-11-21T02:28:37.333000 +CVE-2015-3078,0,1,06983add564165b85db43739b40557efb068afba300b1c4d4b383ba56570cce0,2024-11-21T02:28:37.470000 +CVE-2015-3079,0,1,17435486eb3cdbdf9c70f8512090e7bb4007d1262b735b758b278d60a33440c6,2024-11-21T02:28:37.590000 +CVE-2015-3080,0,1,c590537c7fdf8016d5b61ff56669b0533038ab6f158807ce1ce8a3a438445326,2024-11-21T02:28:37.710000 +CVE-2015-3081,0,1,cebdb79e83832f21da2ad0752370e60653abf493c4ffd95851c3fa2e03478e3e,2024-11-21T02:28:37.843000 +CVE-2015-3082,0,1,c6039ea01fb06391e1821879a0e4bd60d091146197c7eb9f867f5c1e54789d27,2024-11-21T02:28:37.967000 +CVE-2015-3083,0,1,c0c3ea46931c458ae44b43aeede962c049c54b7503ed5885b54bef9102dcc39a,2024-11-21T02:28:38.087000 +CVE-2015-3084,0,1,53c3e08df4aaac15c72f8c487d74e3e158b082afb465c0d37bc9b64e718b19aa,2024-11-21T02:28:38.227000 +CVE-2015-3085,0,1,9ca2f099de2ea0039ce580b9346fdecf59d2c8df53a6dd63eda4077128657798,2024-11-21T02:28:38.353000 +CVE-2015-3086,0,1,4158e4f64de7a76d8e4ce0e1e8489d722df164a2c49c7d82f475d0a3178885d9,2024-11-21T02:28:38.480000 +CVE-2015-3087,0,1,80d42546c2b4d99cf5ef35110ca7d55ce4e834513607906ab433638585f1a959,2024-11-21T02:28:38.607000 +CVE-2015-3088,0,1,fe9690a48a4a85d3410f729b7f2d2521f35319ffd4528e7225565acc94d7dffa,2024-11-21T02:28:38.740000 +CVE-2015-3089,0,1,abe5de1eef735fbc4f9e7b1477e75fc1c8f35872792d60c167ead75bee57c2d4,2024-11-21T02:28:38.873000 +CVE-2015-3090,0,1,0fdb9359053f485e9240e87ea3fdeccbc05ad96ed6906bfdd464fbd9970348d9,2024-11-21T02:28:39.003000 +CVE-2015-3091,0,1,811e5909bf2219ed116bad1f322fb77c74edc7f1976796a1b711933f16e10555,2024-11-21T02:28:39.130000 +CVE-2015-3092,0,1,e53a5870934a622a293fa2fcdc0f6fef71ed9a60f56ea0824fcffe63c86684c2,2024-11-21T02:28:39.280000 +CVE-2015-3093,0,1,645405fd13e7eb48c6923e6767db98911ca9f92ff8056c0f7076bfa0711678a4,2024-11-21T02:28:39.407000 CVE-2015-3094,0,0,0f33c628122a199ea89986b21250af9dd3e02e44e68641474c48a0a92da2e2d4,2023-11-07T02:25:29.320000 CVE-2015-3095,0,0,cbd5a31f5d85058406cb153388b5c6e21acc6499630926c366713d2a28cbf995,2021-09-08T17:19:31.010000 CVE-2015-3096,0,0,fcbf7807d19f357215a39a9ea87ac7dc3f3a5c76c7d42cc4dd4d0a40ee41f4ad,2016-12-31T02:59:26.627000 @@ -76517,19 +76517,19 @@ CVE-2015-3136,0,0,8b9bd9789d568a6770be013b09f9a720e93c4a18df67df9274b9ec861aea4f CVE-2015-3137,0,0,cac47106b4a5a10b84bae3c7a08aa1fddda30647dc1bee8dca000b5df0d2ec20,2017-09-22T01:29:11.873000 CVE-2015-3138,0,0,2d9c5a01d46b5309e88c1d18e489e69459c8369c0cd0d79d6d55f402e3906a79,2018-10-30T16:27:33.013000 CVE-2015-3140,0,0,0f5e143c91a0803ac7011714d4922fa219be6ff1f7a1ac101e1eec8c2a93e32c,2019-12-04T19:55:59.130000 -CVE-2015-3141,0,0,ec21fff0d3c2007b15691633526a10d9d29dfdcf6af0d82d5e82c51f45eedb4c,2016-12-03T03:08:30.403000 +CVE-2015-3141,0,1,38ac2ba3ed81c321798b07d7f2e2316c439e6a03e9b117a16df024d8754b5c9e,2024-11-21T02:28:45.543000 CVE-2015-3142,0,0,6b128d5a4587d9a8bd90a641022117136fbdb4ae3031a1af7c8cc0cc4cc708bb,2023-02-13T00:47:37.453000 -CVE-2015-3143,0,0,6cae94d61d047d0059338789ff05c19a09a7542a814dbbf55f1da1b3ae8d88fe,2018-01-05T02:30:04.773000 -CVE-2015-3144,0,0,b6cf4b93ffecb369227f64a60fecb91496a02ec9fad2ce1babe1e93fc5fab649,2018-10-17T01:29:22.930000 -CVE-2015-3145,0,0,bb363abb64d7844aa4d3bd1640d9e43baedbad51afecc3cd8a37001f113aa790,2018-10-30T16:27:35.843000 +CVE-2015-3143,0,1,131c5876f9f8f34909ed0611eadc97d0ea41c4b22078af0381101b68a635fbca,2024-11-21T02:28:45.827000 +CVE-2015-3144,0,1,d8a8637b1e2613763210ba994302eb5494b43734d6a665acf685481cd432ad7a,2024-11-21T02:28:45.997000 +CVE-2015-3145,0,1,b657209141058e65e118f2519f417729ca6c4c2384e8db51437d111a74bac1f0,2024-11-21T02:28:46.150000 CVE-2015-3146,0,0,9190eedab3647db4469f926b55f5baa60541672da4b6a36340cd506a877cfaed,2016-04-20T15:07:16.900000 CVE-2015-3147,0,0,888d251a8aeec2d0e04e0da8eee469de3467722fc5657ef8d773b91d063a398a,2023-02-12T23:15:31.680000 -CVE-2015-3148,0,0,10b2989a797aa0fece00ed8de1740bd7836307ea5a3a18be23181be8d626949c,2018-10-30T16:27:35.843000 +CVE-2015-3148,0,1,b9e6e7106b97b986745e2f9f08929ace88cd2988fef493368ac76c892ae07c20,2024-11-21T02:28:46.560000 CVE-2015-3149,0,0,ec9683d730caba75949208f4286ed02253b8e57b531ac376933a5e5bbab15988,2023-02-13T00:47:41.760000 CVE-2015-3150,0,0,b764eeff48db5190ff8852a70a204aae29bc3d96b69fa4467bc796e86bd12b5d,2023-02-13T00:47:45.137000 CVE-2015-3151,0,0,2ea2cead4e8aab315cc2212c0f4b55fa2772e96407de328d4d36aa5bc11fb965,2023-02-13T00:47:45.943000 CVE-2015-3152,0,0,8159377159d474d521b02ede300accaa1add5cd1de066774ffb2c91ac301a084,2022-08-29T20:05:17.527000 -CVE-2015-3153,0,0,76a3627dd880324ae62bcb827c8083e51e365f8bfead0de32100abb9abc30771,2018-10-17T01:29:25.897000 +CVE-2015-3153,0,1,6445c7f9e424b24b8d1f3176c1aee4368a192a617380a651f7c49a9887e1454f,2024-11-21T02:28:47.230000 CVE-2015-3154,0,0,0b4a056e3a081960b5a03b51d29f290540291879bf705c285a6eb77bd90490ac,2020-01-30T18:51:54.060000 CVE-2015-3155,0,0,30a69f97b8cbe0a0020f61f7e7d46bb3b9111915b80cde978ac4533af87072cf,2023-02-13T00:47:46.313000 CVE-2015-3156,0,0,c89e37d4bce1ef94ca80245669502a4b02a909a679aaedd3a8488e3149359965,2017-08-25T14:53:15.763000 @@ -76669,113 +76669,113 @@ CVE-2015-3289,0,0,a92635ad280b9c52ecf91d1a5e7279387524c4e1bd61b854c9fc514e32be70 CVE-2015-3290,0,0,508b4ddc6fd84858bbcd6b98b801ba73a4a80d7258c6990272e6635838865d93,2024-02-05T20:15:29.457000 CVE-2015-3291,0,0,6b0c1ec56f6418b7a477e1cd6478a16ed7f9808305ec544774561c65045072ca,2016-12-22T02:59:49.007000 CVE-2015-3292,0,0,28e55a451abb1577c86561b330b539f18b64afdf39be9001d223d8608011fbf2,2016-12-03T03:09:19.583000 -CVE-2015-3293,0,0,1fed9e1728c042aaed61be5f7f0e16304338bbfd4705f903f248b265cfc14c17,2017-01-03T03:00:00.837000 -CVE-2015-3294,0,0,a962a7400cc22bdcb03b0cd21721b732332faee1c8cd4c45b2baccc4aa558642,2023-11-07T02:25:36.117000 +CVE-2015-3293,0,1,228f2f02df56013c9abdf55c6eac5d332543168e422eb660a54424bb99f9f87f,2024-11-21T02:29:05.613000 +CVE-2015-3294,0,1,edc487f8e0d020c2bd6294a8b5e51253983680801cb6239a667bbc1b8e91fe04,2024-11-21T02:29:05.763000 CVE-2015-3295,0,0,29a673dad50145ac1e56e06d0ae473697f51afcbf7384f11091470b7d34df0f0,2017-06-14T19:41:58.337000 CVE-2015-3296,0,0,4605dd684d76ba34b29a184cc2bfda1f351175e3aecfaecf9f46334ef0eca7c1,2017-09-28T17:06:54.370000 CVE-2015-3297,0,0,f01431e84b05fc809b9ff8efc5df9adc4a67448fd08470047b683ff576df68d1,2017-07-14T13:16:06.657000 CVE-2015-3298,0,0,512c0c6ff373aa0bd371304332b086aa88f24c663d634a89d9c64e0d1c98e153,2022-04-08T14:46:14.567000 CVE-2015-3299,0,0,97f3c225b2fecae64b0791ccc9f918b875ff162bc9a96b35a425bcac9998752f,2017-09-25T21:27:46.910000 -CVE-2015-3300,0,0,10b1ec8eefa52fe09ae16e91f028ae9288d0563ab65470cc4fcdb50d56e947a5,2018-10-09T19:56:50.360000 -CVE-2015-3301,0,0,36e1e4b18fa40d244cb8e3abc56d5a6fa067fab671599a87665c7f05f9fa4a78,2018-10-09T19:56:51.250000 +CVE-2015-3300,0,1,2f23fb78131b95d9c4d232046eb9248298da03f636e418f2b114acff200068f9,2024-11-21T02:29:06.750000 +CVE-2015-3301,0,1,0fb5a62c94038db54ddb869aabc14f666fce4a91304b820b99ca77a0a468bd40,2024-11-21T02:29:06.923000 CVE-2015-3302,0,0,d3feae92259b31d9bd680d54b453c404c116039d4fe09b4cde69b6d31c20fcb6,2018-10-09T19:56:51.813000 -CVE-2015-3306,0,0,a1a5d0e19688fcfc234dc69b37b25fc3c93bbd09c8b852675f7a57bd774ef6d2,2021-05-26T20:15:08.027000 +CVE-2015-3306,0,1,f17d1abb85f474c5d98f1246ae88791aa8f4dadf8a6e846ed9c111dac432cb1b,2024-11-21T02:29:07.220000 CVE-2015-3307,0,0,9a4a31bb993a65ad88554f68dd395b355de031f1ec3b037651d3495ea67c2dfe,2019-04-22T17:48:00.643000 CVE-2015-3308,0,0,56b74eba54f847afffe6b2897bdec48c7dc7c2d3d5444bb120955b3fc1f5fbf3,2016-12-22T02:59:49.163000 CVE-2015-3309,0,0,07cd4e14c16602460945222ce075d5760724e3d227704549072767ffbb4f0086,2020-02-19T16:38:52.440000 -CVE-2015-3310,0,0,e81ce1d3fd5abf47cc34e5cef49af9b5c8f648efa5d7a3900873a49e2d565095,2020-02-24T15:55:38.160000 +CVE-2015-3310,0,1,4a3a4059a7ea919f7959aa5500e913d495b57857137920ae9e3fa2c6cf9c15e8,2024-11-21T02:29:07.940000 CVE-2015-3313,0,0,bd867153e05a67fd10d67a30b074753dd55b4000de72c3293a678f7996a5e2d1,2017-09-11T13:55:31.513000 CVE-2015-3314,0,0,355401417efcf8d5b184530cededf13000438e77a7b644faf1e20fbb2e980564,2017-09-11T13:57:26.983000 CVE-2015-3315,0,0,94cc7bed046ea931a87ed48c59c0e93d59cc8d5f211e9c8c893fc4b708e39dd5,2018-02-19T02:29:00.263000 CVE-2015-3316,0,0,15d39ca08695e017fed4b521abd207b31ff9f36cfcf186f498c516e2d3b73962,2021-04-09T18:50:38.677000 CVE-2015-3317,0,0,bc565ecf963b2e9a7657f89c6b1df2e87e27a9a56bd2e748cf2aa6d5b2d282ba,2021-04-09T18:50:38.677000 CVE-2015-3318,0,0,14b6a53ca7a59736f1e898ae49ec6e7944d8fd9d7822a54ca55b4433b9921d30,2021-04-09T18:50:38.677000 -CVE-2015-3319,0,0,56b6ffaf633841dc262e537aeaf74843c58ed97e13ea60350f4aecd559444750,2018-10-09T19:56:52.233000 -CVE-2015-3320,0,0,b97cd9d23d9aa50145f52c36e060c57d71dd6188781f2fb67a63d0bb2c781f25,2017-01-18T02:59:00.593000 +CVE-2015-3319,0,1,7be0914794b6c7565119e061fcd1652e6dd12570bc37514bb0d3ef4d9378ada8,2024-11-21T02:29:09.040000 +CVE-2015-3320,0,1,71227410fc386b50650002d6a1c4f776da1e311b474ab817360fd5c3fd3aba8d,2024-11-21T02:29:09.190000 CVE-2015-3321,0,0,546793968da8a90ddaca24e62dba5df3e198dbe0c0c28b55517b77c8e6b33845,2017-10-17T15:31:10.453000 -CVE-2015-3322,0,0,b5a28bf4845fa95df2d2b79d930cb730583c25cdd6556b000ca898bef0bcccac,2017-01-18T02:59:00.750000 -CVE-2015-3323,0,0,735a937147b523cf8695836c4b6edfa7e10b8e156622466a487da0eb2b18b08b,2016-12-06T02:59:54.617000 -CVE-2015-3324,0,0,70afe6259f2721426ed131ec740c7d9187822965dc082ddc1445896678b06ff0,2016-12-06T02:59:55.667000 -CVE-2015-3325,0,0,4213a71d801d7748fe8e2252aaf2938ac0ada2748727c73d08da24d1fc6fd2f3,2015-06-25T15:50:09.833000 -CVE-2015-3326,0,0,bc925114e720525e1db22ad4e93e4a3ab4708865b1d54061021954e2cf06314c,2017-01-03T03:00:01.100000 +CVE-2015-3322,0,1,b77ce18f7d3d1e9c3ef0f3199205324bce17025dd8a7d7c1ffc6a0df78c444ca,2024-11-21T02:29:09.507000 +CVE-2015-3323,0,1,60e9ef3f5ea1078fd3a1607f1b6e634d5e222d389b4ab9de0eb98e1c5424e238,2024-11-21T02:29:09.660000 +CVE-2015-3324,0,1,73fe4918e342d45963b88fdfe3e1ddf52b00337e35990692c17b1802b83784b1,2024-11-21T02:29:09.820000 +CVE-2015-3325,0,1,2d327bb0a36e6525d3ba384c254962fed0e512e19a01ec978857455c279aa520,2024-11-21T02:29:09.967000 +CVE-2015-3326,0,1,90e7fd9d09311780197eb4fe4a2849f3563e77fb5f78360b33c7d7e3f465df4f,2024-11-21T02:29:10.123000 CVE-2015-3329,0,0,58fd616774d03eace3d45fe07d0b770aaa3271b3f116e2a54c68466dbfa8e46f,2023-11-07T02:25:36.413000 CVE-2015-3330,0,0,a081c0af870ee08baa35a65cd96250a64f3bfd781a2b4fb5668dcda8de8f54fe,2023-11-07T02:25:36.520000 -CVE-2015-3331,0,0,0ada1f4e8a182af8ac92d92e4fc8ea39f62981cf3eacf4010ef73f188b19d927,2023-11-07T02:25:36.660000 -CVE-2015-3332,0,0,6c58e40231133a2c60dd55bd236efaea25b8dd8c68d291c8b4850ce48eb1cb02,2016-04-11T18:54:08.853000 -CVE-2015-3333,0,0,016369e0d712259ded265283218361bcf4a98590b9e5ee80640d3c09171b0318,2017-01-03T03:00:01.180000 -CVE-2015-3334,0,0,258ca06c5671d09321a21da5a63f841793285122c4590e88ee9d90790136e9ae,2018-10-30T16:27:37.467000 -CVE-2015-3335,0,0,070b35f186873b85fca2b84718ecd40d067cca59b3eafc5f2255c3c0a7ab445a,2018-10-30T16:27:37.467000 -CVE-2015-3336,0,0,1554786e36d261c2bdf22384bc46686a54ce9340450b216cb508076b210cebba,2018-10-30T16:27:37.467000 -CVE-2015-3337,0,0,f56774fb390108cd0973f8cb24ca2d35c680883dcc17095f278dc46421575d57,2015-06-25T16:07:10.257000 -CVE-2015-3339,0,0,53b316bcf9d5094366c05e2958bf71c19208d638724ef0fd96eaf793073741bd,2023-11-07T02:25:36.860000 -CVE-2015-3340,0,0,0ef00e3bd1bb5eb153e5b096976d7ec195876ebebd973d26155bb4f9a0cb29c9,2018-10-30T16:27:37.717000 -CVE-2015-3342,0,0,462a87985fb07b9f3fca80c528da6db28ec75e656bf3f242ec10222ade89e5ee,2015-04-23T04:56:38.507000 -CVE-2015-3343,0,0,b391a7cc8253faad294850bea31da538dfcd094146f3e574d1b713567cb749eb,2016-12-06T03:00:05.103000 -CVE-2015-3344,0,0,402aa3801e42976dc6049847744030bbb401aecd58b701f272d5e61c5abe9541,2016-12-06T03:00:06.073000 -CVE-2015-3345,0,0,32859ce3189a0546f5078abf42c21562f2eadb22b966ebd733f547cc6f5a4aab,2016-12-31T02:59:29.517000 -CVE-2015-3346,0,0,d2a0140702e93a08a8fe18193f3474d99ded97f0faa426731b16d1f931d58d79,2016-12-06T03:00:07.120000 -CVE-2015-3347,0,0,fae27bfee1f63415f3311e3b68594264b8198ff559941748146474ff32079519,2016-12-06T03:00:08.120000 -CVE-2015-3348,0,0,0b71f0743e3025d40c6877ceaa28cdcd23dadf57073076cb23bc2d566e6f8306,2016-12-06T03:00:09.073000 -CVE-2015-3349,0,0,ca70718f61d34bbf9c8bd19d64b3937e43a9dada7634e5217352c84edd14dfcc,2016-12-06T03:00:10.027000 -CVE-2015-3350,0,0,a9afe19b115831068c953da21ab384680aed2f0a9a6a0025a1082ec0757c38db,2016-12-06T03:00:10.950000 -CVE-2015-3351,0,0,76ea3f7d5c96c293359062afde64ccc3a94888c9e889b62282132c3871dddc80,2016-12-06T03:00:11.903000 -CVE-2015-3352,0,0,7777f123df6c5c09025ebf79778f3944ffffd1638d8e81047c841df831974af0,2016-12-06T03:00:12.840000 -CVE-2015-3353,0,0,adf73ad4e664b2a3f548a1daf6d26417d8def46d8313810527cde148e85ffb8f,2016-12-06T03:00:13.857000 -CVE-2015-3354,0,0,ba47cc07d64afe0f18007c1e80d638cab823329cda0aa18de677da3a9851d0af,2016-12-06T03:00:14.793000 -CVE-2015-3355,0,0,529b4a4b9206fd73175d8d73f4edb7e06afcc4ac7a6523268790408dc59255a9,2016-12-06T03:00:15.747000 -CVE-2015-3356,0,0,fe181902da14ed5d20ed3fd3ea9efeee66ea4e93086bfbb5b0e1ab54cbe65438,2016-12-06T03:00:16.763000 -CVE-2015-3357,0,0,5b2cd837fc8eebc46d2270f4ebf9f1b5dde6f47f10eda1b15b27fe9126254901,2015-04-22T22:16:14.487000 -CVE-2015-3358,0,0,c22e343ee64bedb0f61be14ac7e4a5765b6b8bfc0788e37dd7c0575439e4b625,2016-12-06T03:00:17.763000 -CVE-2015-3359,0,0,ccfae1bf4863a279739e2760886eb6e0052d9d97467f6cc5fbdf7c7762865d5c,2016-12-06T03:00:18.717000 -CVE-2015-3360,0,0,8ca14a0885fe132a812cbabf8e5c9aeeea73adc60126debf9359cba044af0257,2016-12-06T03:00:19.717000 -CVE-2015-3361,0,0,b4f22be60a0e93493f11760a67dd2e3a79b8ba93ba228feb8b714857eda327ef,2019-02-07T16:31:40.557000 -CVE-2015-3362,0,0,8c98ea6fbccfb07acc372807bbae2f559a90416a97793b169a5da871aeefa74e,2016-12-06T03:00:21.687000 -CVE-2015-3363,0,0,35849453a9a878fa964318fffea7a5308b9d015f13ef86d16245282b19587c3e,2016-12-06T03:00:22.653000 -CVE-2015-3364,0,0,6749f300e9ccf10b52568da6c7cbd6a76d14b503b79a95928acfeedcedfde0d0,2016-12-06T03:00:23.607000 -CVE-2015-3365,0,0,8260ff16ba53cb6b6003f985de19849c2ca2b5137aedf7958f87424bd6b5dfd9,2016-12-06T03:00:24.543000 -CVE-2015-3366,0,0,d3559b726be02e5f25f3ec74544ca12d629757d5e3e89b455432277d19d0adc4,2016-12-06T03:00:25.467000 -CVE-2015-3367,0,0,f72c2fe6fe43de45c31b4335bb0c43b7230c537db3e24df5c9b68163752f508d,2016-12-06T03:00:26.437000 -CVE-2015-3368,0,0,2acb2422a186e0f06382f1fd440b31ad72be533caa151ba4be10645ac6a05cfc,2016-12-06T03:00:27.327000 -CVE-2015-3369,0,0,f53599902deeb7a75a9ebcd512613e8e2966db6bb59caa4408fedb6eead6cc0a,2016-12-06T03:00:28.263000 -CVE-2015-3370,0,0,c1640abc3d286020952587a60ed5ab489c3f21ffb78354610988283bc60a4832,2016-12-06T03:00:29.200000 -CVE-2015-3371,0,0,68719a32c3e81e0658e70b1e5459d200e678c13a23ad849684cb84c127f4fd87,2016-12-06T03:00:30.093000 -CVE-2015-3372,0,0,6aaa4838578901fdb4c67e53fd6631b002497def3d97aab8244c7b70bb155e05,2016-12-06T03:00:30.983000 -CVE-2015-3373,0,0,6dd8b973f05a7aa857e529bc5cab11b802a147cc4a376f32fcc1d821c0d3c961,2016-12-06T03:00:31.890000 -CVE-2015-3374,0,0,afd43d2b31b200d2d704f2ec4ef765d9fe951cf87ca5a38b674b1642ab639dde,2016-12-06T03:00:32.890000 -CVE-2015-3375,0,0,5efdbc5ff9b0e9394963a6b22d45b229cb87742de7d0a6a5a89c278c10644143,2016-12-06T03:00:33.797000 -CVE-2015-3376,0,0,890edacdf8b46bfe09b051eed628560d55fbd0cb199acf0a844c0098e8253505,2016-12-06T03:00:34.750000 +CVE-2015-3331,0,1,d1380d1f73b58d66db63b4c5743f51ef0231a9af483bf2e2a1aa6e81cfd01b5a,2024-11-21T02:29:10.717000 +CVE-2015-3332,0,1,9692be10e68402bdc2cbb4fc4444048827f1fb87b7062978d7acacbb758e414d,2024-11-21T02:29:10.920000 +CVE-2015-3333,0,1,d3108e31eb29f09fb6a3afc4adab0434a34ed09faf562bde907cfc04293aa548,2024-11-21T02:29:11.093000 +CVE-2015-3334,0,1,9d23b80518f174813a5fd5abce125de3f8ae7aa5c204bb17d5311f89aa8aa462,2024-11-21T02:29:11.250000 +CVE-2015-3335,0,1,4cc793c021ef4daadaf40da2002b892833e2656140f3edc07dc0c40b3ca52f48,2024-11-21T02:29:11.413000 +CVE-2015-3336,0,1,96916d2d73e3a119261c0b3d48fb21d039b45b67af5385cb2b9717f94ffa1f2a,2024-11-21T02:29:11.570000 +CVE-2015-3337,0,1,0ace31a48f03a4ba4d69d2f25c071b4e943d3f0d3e2c4c672a831c2c566a5a1e,2024-11-21T02:29:11.733000 +CVE-2015-3339,0,1,25d11d92b4d11fbe8d230e077492ec2fd077245a4a6b7e8d3c6f0c3eef642cf1,2024-11-21T02:29:11.893000 +CVE-2015-3340,0,1,b1c3cc3a15224fe50da97b33ea79a83e92b6bad75841683b28f61bc0a0957ab3,2024-11-21T02:29:12.080000 +CVE-2015-3342,0,1,76463dbd1c168720827dc64ba462f1d88f1e08464fc6dee4ead4c8ba9a7c93e4,2024-11-21T02:29:12.267000 +CVE-2015-3343,0,1,bb84ff7604ba41f1fbc3618c58c88ec33957693b89857e989b9d22412034bdce,2024-11-21T02:29:12.423000 +CVE-2015-3344,0,1,82b6bd28c5bbb69eeeecb7628301cb8eb3d3f6e6e56a6f71f74157e921837a7b,2024-11-21T02:29:12.577000 +CVE-2015-3345,0,1,897fe1f84ac0912b7f7425dbb0783009208baa7b1a0662ddc4aeffeb959d914f,2024-11-21T02:29:12.730000 +CVE-2015-3346,0,1,802d4786d8f2f41e862e8f40db0a571d00cb8df2751f51a2b5caa0e8646a48e4,2024-11-21T02:29:12.877000 +CVE-2015-3347,0,1,cb4ebd786b5be29490aae3bc44973764cc19ea80d2d3df4b7592fd64bb150834,2024-11-21T02:29:13.030000 +CVE-2015-3348,0,1,e564bee6e1eaa9d659d52cdf44fdce50d4add9347965778b18e543df9e6c5f04,2024-11-21T02:29:13.173000 +CVE-2015-3349,0,1,a85e7593dd559d54ad059daeb27fda504634a4dda7a8e3c1b6a11c2f50332452,2024-11-21T02:29:13.313000 +CVE-2015-3350,0,1,a6e04971dc62144cff73fca336474577c976fa338263714128d38957f8ee6d9e,2024-11-21T02:29:13.450000 +CVE-2015-3351,0,1,725be29bab6b3bf7c13df1db1fdfbf67fb4952d58673586ad2bdc5035cfc9bda,2024-11-21T02:29:13.603000 +CVE-2015-3352,0,1,c9c3f3dd7b66707aba3dfe9884fd7c45ca41e01d23f995ba0674802e5c133712,2024-11-21T02:29:13.750000 +CVE-2015-3353,0,1,4d65921d483871b054951ee1cdde670d77e161ebbad5a9600699483de3750458,2024-11-21T02:29:13.890000 +CVE-2015-3354,0,1,0e5398de6fa5871b796f725a53136454289b16d47721881920519c76a0f7cdfa,2024-11-21T02:29:14.040000 +CVE-2015-3355,0,1,3b763bc07609b9b3ee9d23e33fbc0d373a71871869db0fc476893f96f2541ba2,2024-11-21T02:29:14.210000 +CVE-2015-3356,0,1,15a36a43dfa4fb12b9ffe5c3442a398e5c707e1d0547e19041b3136ef5ab7eb6,2024-11-21T02:29:14.353000 +CVE-2015-3357,0,1,7bbf3b2c64b4d1509dce0b9759ec6ed9de265233391ac836293e44029422dbe5,2024-11-21T02:29:14.497000 +CVE-2015-3358,0,1,f16bc63ff05d54f52735d4ea2135808b6b3e907f21d11f020b7f2ba2e1889c0b,2024-11-21T02:29:14.650000 +CVE-2015-3359,0,1,fe476e65ebcd53373d830443d3f765379ceb9e7319ba2146dcbc53c99dc1e037,2024-11-21T02:29:14.807000 +CVE-2015-3360,0,1,0048e71fd1ab15ffbe54b459a29fcd0a98b8dd2dd51ff39c99df250032299d56,2024-11-21T02:29:16.040000 +CVE-2015-3361,0,1,22a02a5a06d5d1db7e64e1eddfca8063ae411dce79a10db53ad4826782735fbf,2024-11-21T02:29:16.237000 +CVE-2015-3362,0,1,4c4f68820bfe6b423cbb5f3f59b62db5e383840ecbabd56130e2dda8042297f4,2024-11-21T02:29:16.483000 +CVE-2015-3363,0,1,8c1169a5a50a746294ee32e24e53b0aba443e5a620fb1df315d739034f3ddf4e,2024-11-21T02:29:16.630000 +CVE-2015-3364,0,1,fbcedb82d868b1df99971cbff838d2bdcc919d9d05c934f85dbb007263011197,2024-11-21T02:29:16.773000 +CVE-2015-3365,0,1,20e52bfbcec03595d67f855ae2532a573e08c7c5be91820fe70c6d1ce0848fbc,2024-11-21T02:29:16.917000 +CVE-2015-3366,0,1,e0812e5acd0973326c5c3597452ec261f485bae152de78087835bb057b426ebd,2024-11-21T02:29:17.060000 +CVE-2015-3367,0,1,481cb75527987ae03c5f39bdb1dcb21bf63e59a578477f5940872601c99a3bf4,2024-11-21T02:29:17.200000 +CVE-2015-3368,0,1,3d8c131056033b5f515221d09763d694542a1add7c20809a907361b3cbc30230,2024-11-21T02:29:17.343000 +CVE-2015-3369,0,1,a6ea493cb962fa42c53d02a444cdcae9329398f139dd9d0b650caeaae4d8feca,2024-11-21T02:29:17.490000 +CVE-2015-3370,0,1,cf0761121380d57761d0b109b538b70f8b0d472e8ab44359bd18fc4b505af664,2024-11-21T02:29:17.640000 +CVE-2015-3371,0,1,c983382da5497994206a29cfcc367cb8160de1ad89f245c62c4f7aeeccd0c6ad,2024-11-21T02:29:17.793000 +CVE-2015-3372,0,1,8a93824b30b95eea6f60ea1d7c61b75ff9fbcde8ea495822972f7da346e17014,2024-11-21T02:29:17.943000 +CVE-2015-3373,0,1,a9468e676d8433c7f675e6ba5d0141628366437aec5783398bc2fcbcc0d6b4e3,2024-11-21T02:29:18.090000 +CVE-2015-3374,0,1,03946b6151c3277f744b22640043d5ea97abc11bfa7982a4b54b83134e657d08,2024-11-21T02:29:18.230000 +CVE-2015-3375,0,1,6627ae9c11728b7895e777bc2dbd9ba79611420307a63cdddd31ef1aa9b3de8c,2024-11-21T02:29:18.380000 +CVE-2015-3376,0,1,a56eb982b5b1100af865da0c9ebcd4e36365117a1bdfe1424e7908813a9206b6,2024-11-21T02:29:18.523000 CVE-2015-3377,0,0,2c8bf72b38f2e8c7ae8c6294724bdf21441fec35a3b3848e0d7f07f6bdc9f859,2023-11-07T02:25:37.227000 -CVE-2015-3378,0,0,91978d09e8ae518721c6c634a9270a35f026bad8b4f3fce94d51a00f04390b51,2016-12-31T02:59:29.577000 -CVE-2015-3379,0,0,4008c140a926b973bbe975e3a2b38bd35be20c2fc9dd568e89c9336d612936f8,2015-04-23T16:40:23.697000 -CVE-2015-3380,0,0,39abc4fcade0bc9883cbb46558c1ec11aa4b160505fb66502b7cd03d3f34372a,2016-12-06T03:00:35.623000 -CVE-2015-3381,0,0,5f9a310557e7fe3cf15e3acf1defbe996b7aac31b3ea2a21872c643a17c60554,2016-12-06T03:00:36.563000 -CVE-2015-3382,0,0,8a9bcc9af033c0c419435d9883bc45e11c06fa05e829c2994be82e57635eb80a,2016-12-06T03:00:37.517000 -CVE-2015-3383,0,0,64e8d59935c273ae54c7f8cb521d80f3f49fdbfe002f23ed0861795a106a4635,2016-12-06T03:00:38.407000 -CVE-2015-3384,0,0,3342ed7ab53611967c7e65391e9b1bcac6f91aa893567a33c9ffdfab413fd2d6,2016-12-06T03:00:39.313000 -CVE-2015-3385,0,0,ed72e6502db5d0caa09a471e75a54e8382b15e4e6cc5520605e87bde801e5833,2016-12-06T03:00:40.187000 -CVE-2015-3386,0,0,8ea0e71296beaa8920ec38229afc1a428178fe17b1066581e8a9bef68df82f89,2016-12-06T03:00:41.077000 -CVE-2015-3387,0,0,961c10113ae29879f9d777c50c1c681af60493fa1a33290be20124b063d9201a,2016-12-06T03:00:41.970000 -CVE-2015-3388,0,0,c2dcf68c60888b4738d570863c3071a2ec8ebbf541c95c8e6adc6d085cd951f6,2016-12-06T03:00:43.173000 -CVE-2015-3389,0,0,618163c5eabffaa73db99d967f10c45668e919969873596981a9c9241d192173,2017-09-08T01:29:50.357000 -CVE-2015-3390,0,0,5a9c494c6fb7bb5accc5ce30d8d3157bd3f31b30b23d95c72457d2deb3823846,2017-09-08T01:29:50.403000 -CVE-2015-3391,0,0,6b39f2c7cafb89ede55b97aa079061f959167802edaa9a29e54e57610290a250,2018-04-07T01:29:00.877000 -CVE-2015-3392,0,0,32fe22ab72670a015c8789280d019e2692998aeb86a0bb52c4e8ca14274bf505,2017-09-08T01:29:50.527000 -CVE-2015-3393,0,0,b030ca4051a371fe93b96535fcef73464a997464cd521f5345e5b70ce4b2c90f,2017-09-08T01:29:50.577000 +CVE-2015-3378,0,1,2ae4e9dacf7a2cad41cb9772745886314c1a81453e0d4e65b4b3660ace009206,2024-11-21T02:29:18.687000 +CVE-2015-3379,0,1,a5dc2fe89b9308db0f0d17be59dbbfc406cfa324443bc8eb1c94083c84b8d5ec,2024-11-21T02:29:18.843000 +CVE-2015-3380,0,1,cab2a0211ba9e8412758e8e15604aa6151fc63d46b6671f7a9978b3a9872abd7,2024-11-21T02:29:19.003000 +CVE-2015-3381,0,1,9fc31c98927a9dd52b40c1aceddd538fbbf77fac0d9ba41b3ac74cca526a29fb,2024-11-21T02:29:19.170000 +CVE-2015-3382,0,1,2a5060a50c27930f30a0c789c42c8f4d670476a647393f23a0a12d03228815ee,2024-11-21T02:29:19.327000 +CVE-2015-3383,0,1,11ada5718329fa03d4f541b475adc71ccbec19c7296971aa80fefd5cb4af5b2c,2024-11-21T02:29:19.470000 +CVE-2015-3384,0,1,b54578517cc8aab4b9b502b7934f59c180bdd68410780bf3c2bdc2e2f1cec8b6,2024-11-21T02:29:19.620000 +CVE-2015-3385,0,1,4ca5b14b0ce859d4ec69fc317e215ff0207d35fa65acecf62e7b7e3421ce0a05,2024-11-21T02:29:19.760000 +CVE-2015-3386,0,1,6fd6aa96cb2d0ec3a70524ac2a9c84ca35f82cb47b19d1a37aec15e05d790eaf,2024-11-21T02:29:19.910000 +CVE-2015-3387,0,1,aa539b74879fe9ef1b6d4fcf277071796bcdb6322c92fa8e40bce1aa57381a47,2024-11-21T02:29:20.050000 +CVE-2015-3388,0,1,502c2bd075c3419f35a85aee83c63de7f02a8f4d2ea6dcc0951c41d6082cc66b,2024-11-21T02:29:20.193000 +CVE-2015-3389,0,1,fb539c044d056dcd616819ff09f77988d5698b6513ee7d166974f49c703faf2c,2024-11-21T02:29:20.327000 +CVE-2015-3390,0,1,36735b148a8620a802a61891cdd7a8bf30ee20595c401a65fd3457680ec14743,2024-11-21T02:29:20.460000 +CVE-2015-3391,0,1,8cb611077c36f93570a189e03ba44d5a887fd6e704b3105a9a27f17c4009ca11,2024-11-21T02:29:20.607000 +CVE-2015-3392,0,1,fcab7c9712b6cab1cb03d0a4a26cbcfd2427b9c36d56968a7e3b384b8f279e77,2024-11-21T02:29:20.747000 +CVE-2015-3393,0,1,bdc4830f5ae36998352c537b635cdd4e2cea75c15e0d37db2a6203e31bc2eb6a,2024-11-21T02:29:20.890000 CVE-2015-3395,0,0,7c1eb91810a9a726308db441b6dfe32bcf8eabbd8432da3316939fa5ebae099d,2023-11-07T02:25:37.560000 -CVE-2015-3397,0,0,8c5afd78a64fdcc62075e5a3c8886eaade1f51248b1eedc81c5d4ebf571651c9,2016-12-06T03:00:51.313000 +CVE-2015-3397,0,1,d5b04f95c0f0920cc9b79b1b0a9195338af4cdc20c98fa2c840165e00839eb96,2024-11-21T02:29:21.210000 CVE-2015-3400,0,0,0ef52a6cf94ec73661f154ebd6cfb9e15e7a868a5e7e6315172b2cf34a6b55fd,2017-11-08T13:03:08.917000 -CVE-2015-3404,0,0,0d12af08e1f50b1a968d80603f6c10b42c529bab3c78118715468cd55ec01086,2016-12-06T03:00:52.457000 +CVE-2015-3404,0,1,c3c0c89dde8a75bb40219cfcfc3211a228bf6d25f4774545a81f18fe44a58052,2024-11-21T02:29:21.523000 CVE-2015-3405,0,0,c4cf82b6939271c3d30b55ce3c8b84d6dbf1e663889f6fc1c0732ffa33848cf0,2023-02-13T00:49:44.940000 CVE-2015-3406,0,0,30278727e17d88c3697f2db467af2df1df40ecbb0f08f6b432f40963f15b83f9,2019-12-16T19:48:00.870000 -CVE-2015-3407,0,0,ac262b03331091eb804bc1a7f0a7c82edc1b9579d75fcdaecbada9116ac1e231,2017-11-04T01:29:04.410000 -CVE-2015-3408,0,0,4024321b88cbe713e1ccec322a970da21697ddfd7ebf265bab57377a1a69f30e,2017-11-04T01:29:04.473000 -CVE-2015-3409,0,0,1fcd690b1fe97839ef734bcea82640ae7bf30b054919490d3dce0be3a8cedbb8,2017-11-04T01:29:04.537000 +CVE-2015-3407,0,1,e422c8956a6ef8f915d43a830ded9d4e9d5a925df3661008be5a6c011360cc71,2024-11-21T02:29:21.950000 +CVE-2015-3408,0,1,498a69a16de6a96d68be13e5b2285951c1b9c31e5c4ef3d708863b431283c9f0,2024-11-21T02:29:22.090000 +CVE-2015-3409,0,1,39b445514168a08152c1def1ae2aa820cf26bcffb66c547dcf925ef09decfcca,2024-11-21T02:29:22.233000 CVE-2015-3411,0,0,6d8fcef924a65e981de9d9e11ce6f5acd453128319eaf6b230204028b3e9aa26,2023-11-07T02:25:37.707000 CVE-2015-3412,0,0,08b1b6cabe9a7a2d9246803a67a23f3f32cc728a8751f932bee7d1e18862c7be,2023-11-07T02:25:37.800000 -CVE-2015-3414,0,0,4bed2b1de9be58a8551b02e03b83ba9ef1255411bd6f1792f9df60870bab936e,2022-08-16T13:32:25.600000 -CVE-2015-3415,0,0,364ba870709e2404bcb2b8db4d4f7d55a256191d3df3d12633d9657f69fc28d2,2022-08-16T13:33:26.213000 -CVE-2015-3416,0,0,90d9bbfa24eeffd3b8bcea01bc80e730ce0a96010ecc1ab60160fb9ccdaaf7a2,2022-08-16T13:28:40.593000 -CVE-2015-3417,0,0,7b969cd3c7b0c24bd5e978150b36837709c0b1e7ee2f0b8ebf6447962777e508,2023-11-07T02:25:37.947000 +CVE-2015-3414,0,1,4636bdf6804bd8743c87c9d104b3960e612b28e95c14f56d6f538f0d0b4daece,2024-11-21T02:29:22.753000 +CVE-2015-3415,0,1,fc9758013ef8917195da56132e96d06d0648e39ecca74244996f28aa5fb98963,2024-11-21T02:29:22.937000 +CVE-2015-3416,0,1,eb8d123ff5778aea29414e9c34fd6b8f2fce92a65604450fa8dee99aa94e1f03,2024-11-21T02:29:23.137000 +CVE-2015-3417,0,1,9acefc44d178d72a254d25c826006989125e8fe55fa749ac6c2ecb99923294b1,2024-11-21T02:29:23.327000 CVE-2015-3418,0,0,9696591e796872f3e6ab8f591338d24219a0e0de42b92d5ceb9451f58da47285,2023-11-07T02:25:38.023000 CVE-2015-3419,0,0,12fc6a643f0b4a9241c50f159d199f123a68276d5d6076858e2dcc1634de768b,2017-09-26T17:37:28.723000 CVE-2015-3420,0,0,793dc22bd486fb852fab5979d2598750bc0b933681e7ae33ded45f530db97fa0,2017-10-05T15:17:59.780000 @@ -76784,11 +76784,11 @@ CVE-2015-3422,0,0,05e0610b18f057e2b9deeca96d973698d6593835b7b58e7fcbf9a92ffd24e6 CVE-2015-3423,0,0,64e5572e5a6c59fe77692237204dc1d0bc75cc62606d8c21d65a3d2e3097629e,2020-02-12T18:32:28.407000 CVE-2015-3424,0,0,c27b16c48801cccc5eb5343aeafe4887d93b87e24157e60a430162601bb68acb,2019-12-11T03:01:50.780000 CVE-2015-3425,0,0,f091f161262fd30cec26afb9880c2909f0ccd4be33a28de3919bb19e0b588f9d,2019-12-11T02:58:59.507000 -CVE-2015-3427,0,0,0941bd28a06d73f7a99869fbe9be17e6f64a46636b95a63b2b84174cdf67bed1,2016-12-06T03:00:54.720000 +CVE-2015-3427,0,1,8066b5d547edb5a15e7dcecd4cd04c5be4c6327610145d199281df9919fe9907,2024-11-21T02:29:24.607000 CVE-2015-3429,0,0,7c93567a27102a652785f01681741ad0359b46554ea98fc24e445b4fdd4aa36f,2018-10-09T19:56:52.890000 CVE-2015-3431,0,0,69e36023eee5066aaa4172cc2bb2a5f927982f18d5bbbd058734cf4559389e58,2017-09-28T18:33:41 CVE-2015-3432,0,0,9e263e542b72d38b16bcd2ca016a7764f876b661da38d314ec48c9b8d0fea1a5,2017-09-23T14:40:58.257000 -CVE-2015-3435,0,0,6930573dd1c2dad0bc9cc853405c638b2c3982cb2417ada0eaa35a0e541df26e,2016-12-06T03:00:56.973000 +CVE-2015-3435,0,1,71ec7794af13fe4d47ef9f0baaf90b57f0a0a444a9a82e146eb10a7b3917bd38,2024-11-21T02:29:25.203000 CVE-2015-3436,0,0,c38adbfd62608efffec0fd6451b43fbf428db7bfff2e53161b169b9b94a09669,2016-12-06T03:00:58.270000 CVE-2015-3438,0,0,58977c9c29b33de115342bce8630a55bf525c1adfe30c5176e32d35af38672d8,2016-12-06T03:00:59.427000 CVE-2015-3439,0,0,58e72edf75db94d76acf4fcfef594a7f2b79e6c296c861fc152d782faf1214b5,2016-12-06T03:01:00.537000 @@ -76796,23 +76796,23 @@ CVE-2015-3440,0,0,a0eaa12e6a4d14604b415228e1f22b1cd74911807f1e880d9b6937078a19ff CVE-2015-3441,0,0,43a3a1772cdc7be564cdeba149c2a5798c3700737c86858e50cb21f53bd58964,2017-01-18T02:59:00.813000 CVE-2015-3442,0,0,2e31e428258de7185b7e0e0bfa6e6edfe49fc621d059eae23af285c3b124fb25,2018-10-09T19:56:54.687000 CVE-2015-3443,0,0,80cededc3840d62e717e11d20295bda1d721dbe3987c3010b5255042783d7896,2018-10-09T19:56:55.047000 -CVE-2015-3446,0,0,3f7c2f96f257cc50256f53feb9493ed06eaa04c9324b150b1db1109ebce95851,2016-12-06T03:01:03.863000 -CVE-2015-3447,0,0,2c2a91c950f7681231676fabea1521665f8e1956340980d9946af7e8902e33d2,2018-10-09T19:56:55.453000 -CVE-2015-3448,0,0,938aded7830367586dccb628bfeae96b503f22e102e31fc9cfafe92a05248f0c,2016-12-06T03:01:05.943000 +CVE-2015-3446,0,1,7c36f4949f25a5618c7803a83d0abbdca0d0cd4215751065b243482ecc977eb8,2024-11-21T02:29:26.407000 +CVE-2015-3447,0,1,e79f4d77a25a31c082f1607749a07503ca87eb7f3852638bbf7657ae1c3a1b6c,2024-11-21T02:29:26.553000 +CVE-2015-3448,0,1,d319290fff52bc05a99d3c822a225fa65a1db5365d30d8bc16265d428fa777a5,2024-11-21T02:29:26.700000 CVE-2015-3449,0,0,c53153e7a8cc80d0f2cd89ccfb9ae561a7bc838e01493dbb4b7e980c7a810c01,2016-12-06T03:01:07.020000 CVE-2015-3450,0,0,5f8ea37278c93c4a072a3f47dbdbff240589851d80688168fc308248845e5f5f,2017-09-10T11:20:05.560000 -CVE-2015-3451,0,0,c6f887c77db6203f35cc172d895cf16a6d1d8068eb44a0dc5aae66a527df1f3a,2020-04-29T13:17:10.467000 +CVE-2015-3451,0,1,e895ff31164ed47144f78889368ead04244c5c975c294098143d3e7931fa99eb,2024-11-21T02:29:27.140000 CVE-2015-3454,0,0,0208729d0ed93ecf154d0216b52133229a0ce215c2fdaf39a46a7abc41bc71f3,2017-09-07T18:11:29.350000 -CVE-2015-3455,0,0,06513531d024c28c47cb4e5ac94402c00d4f42c050c1356855973343c03fc8d2,2019-12-27T16:08:55.810000 -CVE-2015-3456,0,0,37521ebccf9ce699c619f7f589f764db5a3580fab55459b2d8480baaa1b768c6,2023-11-07T02:25:38.537000 -CVE-2015-3457,0,0,53e102bf12c59dec6577ce576d472f261776e5648f5da942a64b4924f88cb996,2016-12-06T03:01:10.083000 -CVE-2015-3458,0,0,9633b65c40bafdcf0822d3a6c818b53143ba46447683c03215ae2d7bcb341dd6,2016-12-06T03:01:11.223000 -CVE-2015-3459,0,0,60bd783a46edce09cd917667d0ef1ad6b1e990e3dcb4d3bbef299874df1aba6e,2017-01-03T19:16:30.773000 +CVE-2015-3455,0,1,c2db3cdae12914a0add75e5da6e99e5e5bdad4365ccb0e2759973ec134bd4dbe,2024-11-21T02:29:27.457000 +CVE-2015-3456,0,1,a5bbd45b991588604d2d16f5d94858197f5e02e13e3041739bf550cbab867f55,2024-11-21T02:29:27.637000 +CVE-2015-3457,0,1,d393d6d46731869f959591326f6eb0b5a291f8997686ca3c64d6c06474aea7dd,2024-11-21T02:29:27.827000 +CVE-2015-3458,0,1,64b7352d805dab9c859ca2894173263b14209e9867aa7385e99c4740217da332,2024-11-21T02:29:27.970000 +CVE-2015-3459,0,1,353bdf8a42d011d792bc6a5b5bbcb0fd863216d858c93e0aedd088e9dc416a3b,2024-11-21T02:29:28.110000 CVE-2015-3569,0,0,c0c21f087b4a4b5d933bb3402294fff523f1032d006f6ad7af8d29264c45bc05,2023-11-07T02:25:38.743000 CVE-2015-3571,0,0,427ce142a570eeb0b075c6355f6d66dc718e4f95bb4aac9e630e9ec26fbc4cbb,2023-11-07T02:25:38.990000 CVE-2015-3572,0,0,8d2da4edfbb1d004cbcb7ea5ac57c55431018668b7ba48e28b1bbfde0512d325,2023-11-07T02:25:39.277000 CVE-2015-3591,0,0,4329e94bda4c795060bad08f9040cacbf3fa040f8176036a0b3bce92128d1581,2023-11-07T02:25:39.527000 -CVE-2015-3610,0,0,edbaea365119c6556d29a0cc48be62df63e1d438288b855356cc448d3a027d62,2015-05-07T14:26:42.527000 +CVE-2015-3610,0,1,c497d5d7bd70987a71e017bf9a89c771de76c97f8700b6d6fade68ab17b6ed20,2024-11-21T02:29:28.337000 CVE-2015-3611,0,0,25c558cff39ef490bf23f494ed3fe551a040b5b5442120451d089b23901359ae,2020-02-05T21:44:43.560000 CVE-2015-3612,0,0,e440448a105cfe0dc61bbeb8de28f2047a50d8376912f0be276aa94aea6b0768,2020-02-05T21:35:35.687000 CVE-2015-3613,0,0,78fbf8af05693b870d4e80860374a1715278dbefd263b843f0ee666dce962316,2020-02-05T21:17:13.417000 @@ -76822,20 +76822,20 @@ CVE-2015-3616,0,0,9f631663161d764dc1d73ff569f3d406b08ecb85e57045a7beab21d4205931 CVE-2015-3617,0,0,6afc5922b7bf5e667c2f0cbe558ec41c41e0bc09cb9895ba560c32df53ad2ab7,2017-08-29T14:42:25.447000 CVE-2015-3618,0,0,9688b309d62f687b85d37bfb0496847c828f1e7c7a923575ff39c68cfbbd73ce,2018-02-26T16:32:40.073000 CVE-2015-3619,0,0,1d3c84f8e0341960465955254c2cced6aa32841a59fd0faf98c5ccbe265e5513,2018-02-26T16:31:26.383000 -CVE-2015-3620,0,0,60d5658279c8a8bce007bdcd7e929e0c76396fa4a3826bc1e0c5a55b6f4eba9a,2018-10-09T19:56:55.827000 +CVE-2015-3620,0,1,fe198b2d8b3ae72cd9c96e677d6a853c9ea7c8b2a58d1f329eb3b7a3384ad403,2024-11-21T02:29:29.827000 CVE-2015-3621,0,0,033c041530ae0a337119412e8bd6f122ef62d42b5a3cd71d9678e9edc77348f2,2015-07-21T15:12:50.050000 -CVE-2015-3622,0,0,9fd3ddf5aa8c0a4e889529b637b85692c6921f3f3cfc3520013e98847b41fe66,2018-10-30T16:27:35.843000 +CVE-2015-3622,0,1,cfec1b7c683ffdea71608218e006b06a6c505ef6aeec1ee607cda170bd740a8b,2024-11-21T02:29:30.140000 CVE-2015-3623,0,0,1862a2de5e69518a8c8a2167bd82726274bfc67966a9105cce5db3d7f48b050a,2018-10-09T19:56:56.313000 CVE-2015-3624,0,0,c97b7dd0717a16bf17afb8e2587196f8a9eaa29eb4e49a96895935fcbde49283,2018-10-09T19:56:56.593000 CVE-2015-3625,0,0,debb94c4b32102b92bbe0292b2e2bdb98053ef19ef6286ae0c2c420ae34ea3ca,2019-06-13T16:51:40.267000 CVE-2015-3626,0,0,f19ff8786165181822a5cdc946b79581927e3226125ce40cd758d9698e84564c,2016-12-03T03:09:28.490000 -CVE-2015-3627,0,0,8d56dac68f3695c1842c38cc1362e9c7ced184ad403dcde080b03505f0b2e40d,2023-11-07T02:25:39.687000 +CVE-2015-3627,0,1,7ac282471fb52eb67cbc155c344c5e9dab5e9d7b9e8db88f8f55e9a87972671e,2024-11-21T02:29:30.930000 CVE-2015-3628,0,0,a24ee22fbef06c0d5eb53b91b8a0e35e74ac6c2b7244eca4fc4b54133f9f2286,2019-06-06T15:11:36.407000 -CVE-2015-3629,0,0,9e7e9938881f17e84b90b103c61913a316a1cbf0ba56d9b5016a486f4bbf3645,2024-02-02T02:07:17.243000 -CVE-2015-3630,0,0,a93dfe25016a6c0341e4bfcb4425f2ded1380b23d18d6e873a2fa7a331ff6c27,2023-11-07T02:25:39.820000 -CVE-2015-3631,0,0,e830e6fd6f947714f46260e9894d8f717f37efcb37632616d16410971b2bb545,2023-11-07T02:25:39.880000 -CVE-2015-3632,0,0,c97e28a4c3e7ab5c95d4db810c06e2e0f54ebc05ac8bc6403dd7c63866ce86c2,2017-01-03T03:00:02.397000 -CVE-2015-3633,0,0,918e8d542c0a86c8565896ea358516f4d737c3c7e5527602f7b30cf4dd00bf04,2017-01-03T03:00:02.447000 +CVE-2015-3629,0,1,405edf1f5a48aa5ed1a9dfbcf4b0d1586c4a6281b6edd9841ec13edb61ca9b0a,2024-11-21T02:29:31.253000 +CVE-2015-3630,0,1,aa5c1c2e295cbe304782e2e067ccc54064428dc118f49bc7cf2edf78a24e10c3,2024-11-21T02:29:31.437000 +CVE-2015-3631,0,1,c136c64c592b9aefca5b3d217ddebf2962483314369e30970c75626bed89e0a5,2024-11-21T02:29:31.603000 +CVE-2015-3632,0,1,30fac9eb83d1e1deec89a8e62e646b5d969a6cba77c2c5da35fbbe0b7d275c75,2024-11-21T02:29:31.763000 +CVE-2015-3633,0,1,9a2246541cf618f5cdff36386e9efae1c8d803244f36878d26b3b561ceaef9e2,2024-11-21T02:29:31.930000 CVE-2015-3634,0,0,e9b3e9b9e78cb9242ab359267e1a6e62b3927372e13c51d32a38b2e9f0ed2ad1,2017-06-15T19:36:53.840000 CVE-2015-3636,0,0,5d2db1ebae8c3262cbedfa1d1d65014e2ac1bcdb114a248a06be7912f2bba427,2019-04-22T17:48:00.643000 CVE-2015-3637,0,0,d1497ec503b799f79aa89c15a320a081cc11a506a88714abaf7c9f0c4616e7c6,2018-01-11T18:17:27.220000 @@ -76845,9 +76845,9 @@ CVE-2015-3640,0,0,c85a8c8e07701bd5604bad3e836aa237563855dbb927a64fcfa22c1877f2f2 CVE-2015-3641,0,0,d7c80d6ad468e54c63d2853ed4a4adac9b9829aee66884ed37a6dc09f95edf02,2020-03-18T17:07:12.760000 CVE-2015-3642,0,0,ef37797bca42311ba7817506f0b5dda5ec4f562f6b592e6c3b2364599e6bc7c1,2017-08-09T18:30:51.247000 CVE-2015-3643,0,0,886a2ca15bdc642d5bc45adf5b8dc2e8988820d5b03dfcbbc6cd9b5b4b725732,2017-10-11T18:36:57.990000 -CVE-2015-3644,0,0,b3fa276819ede49c0031440e82ce68fcc7a00b7300078e4a219943ca4c3fd5e0,2016-12-28T02:59:14.043000 -CVE-2015-3646,0,0,e4c3c990c6395d3d5703bc91f6a50c4a2f6d3eb19146cadf09d2f2dc3e1270a3,2020-06-02T19:04:33.107000 -CVE-2015-3647,0,0,99ec8fd03f0a0f7b1124371a159b9df4176d81560cf2024e27e8642c41e54e69,2018-10-09T19:56:57 +CVE-2015-3644,0,1,c89d786e7f03d3fb42537a5e5357472974a451f15c452e2b57f5a8c154b8baf1,2024-11-21T02:29:33.547000 +CVE-2015-3646,0,1,d11c64434a33e2ecd0f3475d679440bb3fbdcfeabbf16d3dd610321352315b94,2024-11-21T02:29:33.693000 +CVE-2015-3647,0,1,0599541405de95cebefb4494bea0de05ae460949a0a294e1ab54bfe6fcc1be51,2024-11-21T02:29:33.850000 CVE-2015-3648,0,0,2fa5970c8d1554e45389117c46fbeb806ccf59bb2336f5bd640a2e3d18fdf074,2018-10-09T19:56:57.377000 CVE-2015-3649,0,0,070e9e741f8c1a652cff7288070962b0824d134e738bfd186e2f51e77495f908,2020-11-05T14:55:33.790000 CVE-2015-3650,0,0,ed47fec377d2ac3220a837db9e1991534d2227981891a321e9ef22a8b29294c6,2016-12-28T02:59:14.107000 @@ -77006,14 +77006,14 @@ CVE-2015-3804,0,0,773b005138dbde9a562e1e24d8b728dd305e27e0da2cf14167cbd4a560af48 CVE-2015-3805,0,0,ab3eb65b1c05a886c738a185afb8ec483e19415f8f1c431d5cc5f6c619ed2915,2016-12-24T02:59:15.603000 CVE-2015-3806,0,0,28811331a23891ec2eb6779e32e4706ff05d2d28cac9c45d46c1f31a769e573f,2016-12-24T02:59:15.667000 CVE-2015-3807,0,0,f6756260e2e4dba54d49cca1403bb9000a9db6ba994f76abf221f60ee3c0e50d,2019-03-08T16:06:36.827000 -CVE-2015-3808,0,0,a5085b345ed5ddd89793f0f362395f85eb0e67d4af74971beeeb95343b2aa812,2023-11-07T02:25:41.560000 -CVE-2015-3809,0,0,adfbe1188053650fb7cef721f7b3e168a0384d9f27a44c98026409fa7b789c73,2023-11-07T02:25:41.617000 -CVE-2015-3810,0,0,cc44d1aa61958871f12105468804d66b75a88526435df54f3a09a15460ddd028,2023-11-07T02:25:41.673000 -CVE-2015-3811,0,0,1d4025e61ac0c35dc65c6e8fe56739e677f746b669dc45b96d637b2be24038ba,2023-11-07T02:25:41.730000 -CVE-2015-3812,0,0,671e5fe0ee592b90db9806fdedf5a21d5d5d0e6a9cb1b7b8a1ce092b3c38546a,2023-11-07T02:25:41.793000 -CVE-2015-3813,0,0,945f3742f1494907a05448348cafd58955457f3e8ebebfe6e539fcb9b4a5fab5,2023-11-07T02:25:41.867000 -CVE-2015-3814,0,0,d24eb30adbae749744bdf5168a29211f159efc9d459e89471166fdd015252cf5,2023-11-07T02:25:41.930000 -CVE-2015-3815,0,0,d66e5ce0d6c7cdac153d999c139369c90cd4a217f543317e26d79627e49572e8,2023-11-07T02:25:41.997000 +CVE-2015-3808,0,1,ccd60e014712a1933ac1bf64b0609aaeff4fb3b4996c7a32bf9e346ba2d49e09,2024-11-21T02:29:54.093000 +CVE-2015-3809,0,1,cad55233be2a160fe27e2766d451ed8ee5853708ad3bf0dd2e579f25fe4997f8,2024-11-21T02:29:54.250000 +CVE-2015-3810,0,1,a92355b702f2bfb96d71647ef333b81c394edcf0a2f69840ebe1b2ad0e33ffe9,2024-11-21T02:29:54.403000 +CVE-2015-3811,0,1,f5979bdee33c3e54b44848eb7f7e87d2bd0f80fd01a68c2359b71a3c12155eaf,2024-11-21T02:29:54.560000 +CVE-2015-3812,0,1,f300c7dc05a0f194465fb0226a64e1db6d2c1aa2bb9e1f334eac283ce13fba6f,2024-11-21T02:29:54.720000 +CVE-2015-3813,0,1,07eee67d2bfd2bf1078eb8c6970fde6783f65cd343b8f0480d8c77d3a2c58dfb,2024-11-21T02:29:54.890000 +CVE-2015-3814,0,1,738d9247b2b4cf62dc38071f30809df7c409d9634cce756a1c036fc981a59ae0,2024-11-21T02:29:55.043000 +CVE-2015-3815,0,1,06240ee29d754c779e368d31b3d921d5d230984cbacb94567bf3fcb7a50fb257,2024-11-21T02:29:55.203000 CVE-2015-3823,0,0,7dc17db6243a33a47f86008373ecf0b183fd9d98127b021a90eace6069b9fd80,2015-10-07T14:28:37.023000 CVE-2015-3824,0,0,abed41f1e89e2d5d162a21efcc0ec76d3a0a642b10685411056e38f224d8ddb8,2017-09-21T01:29:08.290000 CVE-2015-3825,0,0,2e2cd186221eade397cc3ef2a56ccf95810928b50480658dab8f82bc191f507d,2023-11-07T02:25:42.077000 @@ -77063,7 +77063,7 @@ CVE-2015-3881,0,0,183c548e12e22638321b41785a429fe69e1eb26c7ed28c5d4428b9f161737a CVE-2015-3882,0,0,6ca9ab104d1d5a38b5fd62a3a3377bdf2e6bbbc6cc222a8c61d1cfab594f89df,2017-03-20T16:59:36.923000 CVE-2015-3883,0,0,cf891fcd5bc844c156c03f497d96ae3dce00770524c882570b8c023724531b56,2017-03-20T16:51:44.313000 CVE-2015-3884,0,0,cfbe10ba9ed6411c745da9848ed2ca406ea7e005c3aea026ca16a7d6077e101a,2023-01-27T20:05:53.900000 -CVE-2015-3885,0,0,951b8c27dabdd1fb4d9fe29d2dfda29907175391a0d5eedc1ac02013dfe20a8f,2018-10-09T19:56:57.780000 +CVE-2015-3885,0,1,66fd6a331b0a339804531ddf69123e06bad45a29033d48e59ac0c9e36def9d14,2024-11-21T02:30:01.300000 CVE-2015-3886,0,0,37ebebd8e2110fef6951a9eb21be8e3e2c02bae9e5b0a5eafc4e8decb8a482ad,2017-07-25T18:15:12.477000 CVE-2015-3887,0,0,1f7e7114399aaa85cf717d329e9469c19c644012ba74b8ee58806f5c362ca5d8,2017-10-03T17:47:03.077000 CVE-2015-3888,0,0,aea64d0bd5abedae4e0546754525c321943068c85cc8ba245f7246e17e624abe,2018-02-01T21:09:43.690000 @@ -77071,20 +77071,20 @@ CVE-2015-3890,0,0,42f866fe23bfe176a7529c3873ccd29fd90c3eb63a1a69ee8dd39dbc938d88 CVE-2015-3897,0,0,7b8b4dba1b9f943ce64bb80b752fd4d47a3772daebf63db154ae3cffc5be9135,2018-10-09T19:56:59.327000 CVE-2015-3898,0,0,b87d96fa7ec9d5875a77ec30bb278992a62e19f02326c17a233af10bf59fe4cc,2019-04-30T12:48:53.463000 CVE-2015-3900,0,0,b579160c2e420a05bef5914583f6d8d588a50d41872965bfa2fa13f217d56f60,2019-04-22T17:48:00.643000 -CVE-2015-3902,0,0,a4df3e187d798f91c167b84b41b94545a12a67e1d86c72359c598f00ad1d1001,2016-12-28T02:59:15.277000 -CVE-2015-3903,0,0,33e66d6d0658d8d115883c9504d96347ffca4b632e64dda6d1a0ef4f9e8fdcab,2018-10-09T19:56:59.843000 +CVE-2015-3902,0,1,b191b20475af0060e6c2076b75d0936a68a7a7e8fecec3ac150fe7fe28cbce11,2024-11-21T02:30:03.283000 +CVE-2015-3903,0,1,a0d390a2e15919139f598ed04c431f5f248bff465321ef8590a748c25f8e7f26,2024-11-21T02:30:03.460000 CVE-2015-3904,0,0,48eefb0810b796397de058e29b52260462a6cdf40e1c33c8359218e401457691,2019-06-25T15:56:18.777000 CVE-2015-3905,0,0,604812a903b70adabb0c3b3d8dd0daae0ec43fe2d47bd5253cf5bfd0f7fa1c7c,2016-12-31T02:59:30.220000 -CVE-2015-3906,0,0,28e1f8ed853d6b010fd0172691675ed3bfdfb12dc55353aa29a972fc666f8bb9,2023-11-07T02:25:42.753000 +CVE-2015-3906,0,1,9a0d802e39ad9320dbf42459abefa56a19fe70442f5c61a79d124c4ea661c917,2024-11-21T02:30:03.940000 CVE-2015-3907,0,0,a35cdd13431b26dd65d2345fd3c4ed481d22e9150aaf538a3846357070f35047,2019-07-11T13:39:29.950000 CVE-2015-3908,0,0,6ab6c7725fbd7f0563ce3724c0e5746d2c4375584d50f25fb3b9444244b83e32,2019-09-16T15:15:09.887000 -CVE-2015-3910,0,0,234484cf02561d423f907fe7b9e9ed44c1e4a6520fab4f6fccce7b37d0cb50a8,2023-11-07T02:25:42.830000 -CVE-2015-3911,0,0,7f9126058d57a58418623fe7934d72b8a09355048c07182d7a7a968468a973b4,2015-05-22T14:05:17.267000 -CVE-2015-3912,0,0,17707c3c4309748c348940a019597c6fda346ea0cc6ec5ae24477c30112df980,2015-05-22T14:05:42.860000 +CVE-2015-3910,0,1,712ae0c9f15cebaf54e7957536bba6260dcbe6e7db6d0f0a0e53be6a535ff84c,2024-11-21T02:30:04.430000 +CVE-2015-3911,0,1,a1de9cac7581c0fe8493a2582541b61e649e4e579eedb28125c5bb2c93ef6f07,2024-11-21T02:30:04.553000 +CVE-2015-3912,0,1,cc15b2986bdf4a3d58cad25089eb1376a382b369f5424e4e29cbbc4966f0c748,2024-11-21T02:30:04.707000 CVE-2015-3913,0,0,04beafd0a86193dd38bd18c84996ebc32fbaff19f0c59a61792ca18844936981,2017-06-22T19:00:17.147000 CVE-2015-3919,0,0,7a339bb500544488524c45c1d1e569c96b74357d2693670bebeb89e8313251b1,2023-11-07T02:25:43.113000 -CVE-2015-3921,0,0,d38953ae6a46c54c6cadee3cbf73cfb74c13e4779ff90e633d741deda6bd1a5b,2023-11-07T02:25:43.543000 -CVE-2015-3922,0,0,245adfd22187ff82398f08f52f34d78e4d4694025333bceddf005bac6db02309,2023-11-07T02:25:43.600000 +CVE-2015-3921,0,1,9ae373b11a32c2b6b0a10db6fc7d1e6a4c60d2e9494de8213f7c341b9e0a2e34,2024-11-21T02:30:05.050000 +CVE-2015-3922,0,1,860ead3029b4ea783ea2eb64e42731eb6fdaa2ae0cc59bd4c80982b9a1bdf11b,2024-11-21T02:30:05.210000 CVE-2015-3923,0,0,4ec1471c3f32d2673eb28166b2e8121eab176dc6dddde8e1a142e5defe9f17ab,2023-11-07T02:25:43.657000 CVE-2015-3931,0,0,4e3fe66f5acb71e337752c8196a3362657ea03475d7a3e133f89176915b4e305,2017-07-26T17:13:53.513000 CVE-2015-3932,0,0,7dd7159346565a67d07a59c66b3a0e220372c8783283bae52b035ed8c37c36f3,2017-07-26T12:12:20.070000 @@ -77131,33 +77131,33 @@ CVE-2015-3974,0,0,c6737ba772b290959899af9a0d1f994a5a0493eb728709328f068ed5f2f908 CVE-2015-3975,0,0,6b03f78939fd1a361d76ee59ca764c93656b142bcae79504b2b4137f969cdd9d,2023-11-07T02:25:44.680000 CVE-2015-3976,0,0,53db6e7e4465dc876f1a34abd351f4f22d8455f6d80622d79e9351b5078d4208,2017-09-06T15:01:03.897000 CVE-2015-3977,0,0,55ddf54b447fe386ce6d408e32c4702a7e0d73cb6a2eb48581fafe32606b9976,2015-11-16T19:26:07.793000 -CVE-2015-3978,0,0,f74e1ac3b40aed7997449d7312dd72f3b4a3bc4623b7bce0b3d4bbcd007607be,2018-12-10T19:29:08.687000 -CVE-2015-3979,0,0,af22de3e4c91ddfc3e32c39728e65d3d547d6ef0d19aeafa90b3fdcd41558795,2017-01-03T03:00:02.743000 -CVE-2015-3980,0,0,633cd8c7eb3992a70cc0ea821c62746dd2592062d59fc9e0975c82906bf8894c,2017-01-03T03:00:02.803000 -CVE-2015-3981,0,0,c127b7b92b03bd370ea9f24bb4e7974000418ae481008a8f8bbc1efeb755da71,2018-12-10T19:29:08.797000 +CVE-2015-3978,0,1,e5617e95643432458f5ec2d1f7469dd06561c1663ae814acc21599b0857b7cfd,2024-11-21T02:30:11.490000 +CVE-2015-3979,0,1,bb24c810c9fabcceb564ace616cd7ceb71c89616cac1ed7ceed445fc3ce5de43,2024-11-21T02:30:11.663000 +CVE-2015-3980,0,1,dc6b58db5cecd8c7b5c638e6c0e84c26c3f9cf23d0db4ffa8528455cdd25d300,2024-11-21T02:30:11.837000 +CVE-2015-3981,0,1,458a84c60c3cdcc6dd700c8d1a2978df33fab502ccfa76e1eefd4686d9c16cf3,2024-11-21T02:30:12.010000 CVE-2015-3982,0,0,bcd5172d319a35a0df4dbd2e539d8546e639dda4c91a97e3087fad4f02247e83,2016-12-06T03:01:43.527000 -CVE-2015-3983,0,0,e211d6cc63a33aac638981b972e1285434c1c9784efe354a26a7a19c5c867bc2,2016-12-31T02:59:30.533000 -CVE-2015-3986,0,0,c3a44e5298f79cbfc329a0162f10ee0701bebd7a0e42f369aee6142a4158af76,2018-10-09T19:57:00.733000 -CVE-2015-3987,0,0,bf5c10e90e24089b249d7a5ec4103550e9c02a3c0977ac3f50221479a78e5d80,2019-02-11T16:11:19.560000 -CVE-2015-3988,0,0,d469ba45486ad6a24c0091f4c3e52d81c1aace8ca5b7b6466347887d09bb8f56,2016-12-24T02:59:15.917000 -CVE-2015-3989,0,0,c22279f70806bddf9cc271c8049cb5ec50fb6dd26d1f3ade7e86340041adbb81,2016-12-06T03:01:46.933000 -CVE-2015-3990,0,0,c93a7ac6b2aad6ceb1ed65eaede5386981046549a84e3e8ebffa835e500c0ad4,2023-11-07T02:25:44.987000 +CVE-2015-3983,0,1,cf588f671db0e81b827a0815b0be878d07c389c5cb346abaf444665ff280e7e3,2024-11-21T02:30:12.373000 +CVE-2015-3986,0,1,44694e2c9157646982043579606287bc609e488e925ad866096413a75b87469d,2024-11-21T02:30:12.560000 +CVE-2015-3987,0,1,7ce3f43115b56b762b7e2c65b70d3516dda9e85368642b885e3745bb8678133b,2024-11-21T02:30:12.770000 +CVE-2015-3988,0,1,cbdd1206d61e16239af71505ed089e9ae90d4bd614d05c81e0fffdca398236be,2024-11-21T02:30:12.940000 +CVE-2015-3989,0,1,8f50574a9b1f29969523d9789d6062d273f4745fa4cd66a607ed1387749bdb43,2024-11-21T02:30:13.117000 +CVE-2015-3990,0,1,520767e6cc3190f5d3ce09405ff11d24819c0369257ebc9f56abeb969dc09534,2024-11-21T02:30:13.283000 CVE-2015-3991,0,0,84ae94ed376c4250e9c0e55db5771f5bb2f740864afcd17deb6c3299a9bb57ee,2023-11-07T02:25:45.250000 CVE-2015-3993,0,0,002eadc9d3e4da8f9fb2ae3e2f12b781d54130eeedda84f56315b26112158597,2016-12-06T03:01:47.903000 CVE-2015-3994,0,0,6d93ad61cba92702ff3e9fc896acf3c17d118b41ccafe4021118396cb68efbac,2018-10-09T19:57:01.203000 CVE-2015-3995,0,0,48c4546833d58aed564360d30352ebe342a4516306ff01c10a3aeba135b21e1e,2018-10-09T19:57:01.593000 CVE-2015-3996,0,0,1dd4eadf8d87a2fdfc9507aa723d0516f9a71a2c374133439e9f3e8b81816f81,2015-10-28T18:41:26.763000 CVE-2015-3998,0,0,38d7effe2175f79ae858d436560ca63f1af0006bc58ac7e8581b5ae8c0da01a1,2017-05-24T15:15:28.360000 -CVE-2015-3999,0,0,cdd6366bd2e63673d14ec3e70d9efff70f3cc3bba207e33fcb9648270317afe4,2015-05-21T17:14:20.250000 -CVE-2015-4000,0,0,b70338cbebfbd971c239263714a75903bf98f9f2ed5dcb3eaa6afb63b5585512,2024-10-22T13:42:14.500000 +CVE-2015-3999,0,1,7a6dc805672fdb6a204de9c4060f826e2c94a8024e130b8903444dfd69d361a4,2024-11-21T02:30:14.483000 +CVE-2015-4000,0,1,3e2c6af4d5e8a5d53510621410e96fa8f061f9f88fa7b9c821783cd71756a1a5,2024-11-21T02:30:14.667000 CVE-2015-4001,0,0,56dd8e73df82bca8b4b2cd6791614470add6600ecab6179545fbc984aa4c7e91,2016-12-28T02:59:16.997000 CVE-2015-4002,0,0,9a016b19b7f1f5264d1e02390b2e52e544e91f4d0bbc2c6e260a8c9f42c4f883,2022-11-03T02:03:00.567000 CVE-2015-4003,0,0,1663647f69d196d45f7ddaac4d302f3f425a9887a3bb80e74aaa3111df4c6d10,2023-01-20T03:01:28.860000 CVE-2015-4004,0,0,bc80aba5333354e4bbada7ba99bdf9cd0bc67b027a5a88b1790f57efacc10f96,2022-12-12T20:21:46.777000 CVE-2015-4010,0,0,a9287d690880a72ad88fc8a533777ec3f18445394aca9bcc0a19c77d944c9493,2019-10-09T23:14:08.113000 -CVE-2015-4016,0,0,0c3cd546d2defd12982306f516185755864231fa807c0ff40049273ffff1696d,2022-02-07T19:43:59.803000 +CVE-2015-4016,0,1,b3fb23b743159e5c614bdc50a4bfa587d33ae93f09331e939240e81f7e606610,2024-11-21T02:30:16.283000 CVE-2015-4017,0,0,21e1d6df93f5b01ffabf10a6750a5d19984ef4d941f62eb0ce30f4ea9716773a,2023-11-07T02:25:45.667000 -CVE-2015-4018,0,0,0524b8787a7133e5dd49b1a28e7091764bfb9c2caaced3a9dd9927dcfb7b1602,2015-06-25T16:22:24.707000 +CVE-2015-4018,0,1,252ae84ec8bb0cddc993080461519fdafc76c9cc9282d2fcdd6abb21726c2be0,2024-11-21T02:30:16.650000 CVE-2015-4020,0,0,09b9d84b31860c656ff2c395444247c1e46ea0bb880ead035ffe2db022596d58,2017-12-09T02:29:04.637000 CVE-2015-4021,0,0,f67da18b14249790274c26c48f1d4b8d448481e38787d07fbb95b6ef6c5e88f1,2019-04-22T17:48:00.643000 CVE-2015-4022,0,0,3cc83e2085f5db4c853cb1d8246cb34f00dbdbb7a699358967a43bd61074cd9a,2019-04-22T17:48:00.643000 @@ -77192,11 +77192,11 @@ CVE-2015-4057,0,0,7488d679ffa3f87ca4fc6e9ea5903bb8f4975018d879e2ad523b4caf7854f5 CVE-2015-4058,0,0,09bce978874ae31e7b68acd056d2a52d5ce007e34ed964afd729740aa5c22c03,2023-11-07T02:25:46.077000 CVE-2015-4059,0,0,9de2de35a37c4f86b608c528e444abc71fc70766c39f6154f612e84d205f476d,2016-12-06T03:02:02.043000 CVE-2015-4060,0,0,46d280b12ee9f095bde474b88859c9a8b995205a602002535e0abf6114e44895,2016-12-06T03:02:03.170000 -CVE-2015-4062,0,0,6af5da968386eab1ef11e286c1ff58e43817eacfec2bdeca6b1e78dce0a6b37a,2015-05-28T14:54:38.603000 -CVE-2015-4063,0,0,8a3826bb9e0dd4e43443d76ede2b7f6813c0fc555251e597352cb31351e16c1d,2015-05-28T14:55:12.653000 -CVE-2015-4064,0,0,c1b2dddd7ddf49ba460d23b47a1afe9cfe274a93bbba985a3424e15dfe8ec79f,2015-05-28T14:56:46.797000 -CVE-2015-4065,0,0,731c64f8eae59f9f935bdb6f3ca4b53499e7ceb09ed1f620e972c48210696d95,2015-05-28T14:57:33.967000 -CVE-2015-4066,0,0,daf6e7afff8fe8743e4979de78b30f1af08c2953a040d67afc9a9c4adb945fef,2021-08-19T16:27:34.220000 +CVE-2015-4062,0,1,acb58a7060ccbfca333146bf4fbb1117b9f17a1009c0f41eebd63f92bc98b444,2024-11-21T02:30:22.843000 +CVE-2015-4063,0,1,d9e5161d3749950b22eb76c5df741a697ff1a36b06ea9489309b72e426c992f6,2024-11-21T02:30:22.993000 +CVE-2015-4064,0,1,1e84e4541adf0b44b51f2cb2107d24f64a8aedc413eec20521b9979db9675dd9,2024-11-21T02:30:23.150000 +CVE-2015-4065,0,1,afeae9a92680ba9fdf72672a534a2dd6b6d923f665c77a6bab311ef50497bbae,2024-11-21T02:30:23.307000 +CVE-2015-4066,0,1,a0d124c8643d80a413285f81253c4964815722b9f93dd32d452dac390535d0b7,2024-11-21T02:30:23.453000 CVE-2015-4067,0,0,349c8d38b3068409605211862436433a8d95ffeb47273db0bf396cd2706b8c66,2016-12-06T03:02:04.310000 CVE-2015-4068,0,0,d13a75750439d7e6618afd9bc5127767d464cc2395c773bcaf612058efdae863,2024-07-16T17:58:57.337000 CVE-2015-4069,0,0,6a27412a833300915fc06fb202aef0a29ac42fdf646e899961f00c7547c710f5,2016-12-06T03:02:06.420000 @@ -77213,8 +77213,8 @@ CVE-2015-4082,0,0,57971f6d3aded6fdf23fdea559c003481751eb6a2aa066f2cfd1cb63cb33c4 CVE-2015-4084,0,0,e3f02632fbfa9b5add9e6a89977bbe24a8be23e92151ef6bcab9d0b55df4b6b3,2018-10-09T19:57:04.157000 CVE-2015-4085,0,0,0393e9313d4aa6a081318de12abae78b598d6728f7b95660b0db0392276c1c53,2017-09-18T16:54:58.397000 CVE-2015-4089,0,0,df239deb890fc0179a88538d23682686b7941b1da181dc57bb145a29f036138e,2019-09-01T06:15:09.963000 -CVE-2015-4091,0,0,9755ee8a4dd5f84065f05725563549195d168b52ad0e29dc1c4c087dfcdc89cf,2018-12-10T19:29:08.890000 -CVE-2015-4092,0,0,09906f40ca762c0b811c6681f04c455b2e2eba8b3eb4dbc95b3779749e10314d,2018-12-10T19:29:09.047000 +CVE-2015-4091,0,1,abdba6799a4d4f0a80dc950f26e43396323d72ee48d362bd84fad2547a2bee1b,2024-11-21T02:30:26.023000 +CVE-2015-4092,0,1,f2dd246bca8d62a7d9b1ffa1de0a0b50f57570ebc9b96f8e65ed98fef602df7f,2024-11-21T02:30:26.177000 CVE-2015-4093,0,0,3116a6cfaded1da4770be501d6142451a1e64d952607cde3b482611ea3052fdf,2020-08-14T17:30:33.120000 CVE-2015-4094,0,0,9dd57e50d81a0537f85f1fc968e56bc3989c09bc8778bacdfdc6df096754ab32,2021-11-09T19:59:23.843000 CVE-2015-4100,0,0,cadf550c6a1e1ab5598dadbf66371553d1a5e8831e57f2b9ec66276fc00ac611,2022-01-24T16:46:02.597000